Uyghurs protesting against Chinese re-education camps in front of Parliament House in Adelaide this year.
The re-education centres are linked to a return to core Communist ideology under President Xi Jinping and party obsession with 'stability maintenance'.
A meeting between Russian President Vladimir Putin and US President Donald Trump will be the focus of much global attention this week.
The interest and theatre around the Helsinki meeting may be high, but meaningful negotiation is seriously restricted for many reasons.
Donald Rumsfeld, George W. Bush’s former secretary of defense during the war in Iraq.
The question is no longer how to repel all threats. Instead, it's how can we organise ourselves as a society to remain ourselves in the face of these multiple threats.
Cloud services are flexible, but are they secure?
Outside IT projects managed without the knowledge of IT departments are on the rise. What are the risks and possible consequences?
David Davis: In search of a new deal on security after Brexit.
Leon Neal/PA Wire
When it comes to ongoing security co-operation, mutual trust is crucial – but that is currently lacking.
US leaders have lashed out at China, but would likely be unwilling to start a war in the South China Sea.
US Navy handout/EPA
China has taken an incremental approach to cementing its control over the disputed waters, making the US and its allies powerless to stop it.
Moneypenny, as played by Naomie Harris, has been told that “fieldwork isn’t for everyone”.
With its first ever recruitment advert, MI6 is reaching out to women and minority groups. But like their fictional counterparts, will they still end up doing desk work?
Poorly secured IoT devices could lead to attacks on national security.
As more physical objects are becoming digitalised, it is leading to greater national security risks.
Virtual reality is helping train counter-terrorism officers.
Josh LeCappelain/US Deparment of Defense
Virtual reality, augmented reality and serious games can help train people to respond to terrorism and kidnappings.
Keeping up appearances at the Gold Bar in Subiaco, Perth.
Paul j. Maginn
Ultimately, most regulatory interventions in nightlife precincts are about imposing particular ideas of social and moral order not only within these spaces but also in the city more broadly.
Malcolm Turnbull would do well to take his lead from Emmanuel Macron on climate change.
An uncertain world and a possible free trade agreement are among the reasons the French president's visit is an important one.
Police march down Swanston Street in Melbourne.
Nils Versemann / Shutterstock.com
Security in cities can make some people feel safe while excluding others. New ways of planning and policing public space are needed to ensure cities are safe and accessible for all.
Facebook’s revenue model is based on gathering and using the data shared by its audience.
Facebook must confront deep challenges if it's to become a force in the global fight against false narratives.
Every month, over two billion people worldwide log into Facebook.
Facebook's users have wildly different expectations about privacy and security. What may look like inadequate oversight in some places may be considered an overreach in others.
Zapp Photo shutterstock.
The government's plans to store our biometric data are currently going through parliament. The data could reveal more than we'd like to those who seek to access the information.
The prime minister conceded that the UK must continue to abide by European Court of Justice rulings, even after Brexit.
Revelations about the fitness app have turned up the heat on the privacy and security risks of wearables.
How do harsher measures to counter possible terrorist attacks impact our relation to political life and to citizenship ?
Counter-terrorism policies have social and political impacts on citizenship, identity and our perception of self and the Other. Through the British case, Lee Jarvis discusses his latest research with Sylvain Antichan.
Bad news on the doorstep. How to stay safe?
Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?
A yet to be fully-caffeinated person browses the web.
Online usability demands keep trumping security measures that are designed to keep our data safe online.