One of the great challenges to democracy in Australia and internationally is to understand the lack of political engagement among the young.

Young people are less likely to vote, to join a political party, or to engage in interest groups than at any time since democratization.

The 2016 Australian Election Study is designed to address this question by examining engagement in and attitudes to politics, as well as replicating many questions from the previous Australian Election Studies.

Australian Election Study logo

Other sections cover the respondent’s interest in the election campaign and politics, their past and present political affiliation, evaluation of parties and candidates, alignment with parties on various election issues, evaluation of the current economic situation, and attitudes to a range of election issues including global warming, taxation, education, unemployment, health, and refugees.

Opinions on social policy issues including abortion, equal opportunities, same sex marriages, and Australia’s security were also covered in the 2016 Australian Election Study.



“If we knew what we were doing, it wouldn’t be called research.”

Albert Einstein

What is a genuine experiment?

A true experiment is blind. It is when you try something not because you know what will happen but in order to see what will happen. These are two entirely different strategies. One is inside-the-square and the other is outside-the-square.

My view of the lack of real experimentation in selling and business has been because of a dominant preference for short term gains. So, there is not such a strong tradition for genuine blind experimentation as there is in science.

Wealth  Health  Productivity  Security

1. Wealth: Better decisions = better bank balance

Your career, business, investment and commercial success is directly related to the quality of your decisions. Every day you make decisions that will either increase your wealth or decrease your wealth.

2. Health: Poorer choices = poorer health

Your physical, mental and emotional health cannot be separated from the pattern of choices you make. Every hour of every day you are designing your future. If your designs are weak your future cannot be strong.

3. Productivity: Faster strategies = faster results

The possibilities, options, strategies, tactics, pathways, networks and environments that are available for you to think about will either accelerate or inhibit your own personal productivity and results.

4. Security: Deeper thinking = deeper security

Your survival and growth, in a darwinian sense, cannot be separated from how you make your decisions over time. If you don’t do your own thinking others will do it for you. These other people, institutions or authorities may not do it well at all or even in your best interests.

NOTE: School of Thinking is science-based so it is not for everyone. It is a curated experience for real thinkers and only for those individuals who are interested in becoming highly skilled thinkers.

Apply only by email.


By Dr Keith Suter

Wikileaks’ latest document dump revealed the extraordinary capacity of the CIA to hack into everyday devices. The continuing revelations about the extent of the cyber spy industry demand changes at the government and personal level.

Cyber-warfare is now the fifth dimension of war (after sea, land, air and space). We must therefore become accustomed to stories about information technology, both on its use and its misuse.

The latest controversy is Wikileaks’ release of alleged CIA documents. Over 8,000 documents can be found in this consignment, with more to follow.

The documents suggest that the CIA has overtaken the National Security Agency (NSA) in running some of the US cyberwar work. These documents allege that CIA scientists have discovered weaknesses in IT systems which they can use to hack the IT systems of almost any target—overseas or at home.

Traditionally the CIA dealt with overseas threats and the FBI with homegrown ones. Now apparently, the CIA is active at home and abroad.

Hacks of some domestic IT-based equipment include fake ‘off’ switches—homeowners think they are turning off the equipment, when in fact the television is being activated to record what is happening near it and transmitting the information back to the CIA. Another controversy relates to modern IT-enabled cars, which can be ‘car-jacked’ by gaining control of the car remotely and then driving it, say, into a tree.

Early indications are that the documents are authentic. Doubtless they will be subject to US congressional enquiries but no one is questioning their authenticity—for the moment anyway.

The controversy has seven major implications.

First, IT is a good servant but a bad master. What was welcomed years ago as a way to make life easier—such as typing documents and accessing information instantly through Google—has now created a monster that monitors our lives. All uses of internet-connected equipment can be monitored. The right to privacy has gone.

Second, there has never been a right to privacy in some states, such as the communist states in Eastern Europe, or in modern China and North Korea. Citizens know instinctively that they could be listened to at any time. There quickly develops a culture of caution when talking over the telephone or indeed in some buildings, such as hotels. With the loss of the right to privacy, it is likely that people in Western countries will also develop a culture of caution and be careful about what they say or write over the internet.

Third, the fact that such material can be leaked suggests that the CIA is not as good at security as one would hope. This concern is augmented by the claim that other similar CIA material is due for release.

Fourth, there is a need for new ways of conducting government security checks. For example, security problems may arise from idealistic staff becoming disenchanted when they learn how operations are carried out—cases like Daniel Ellsberg and the Pentagon Papers, Chelsea Manning and Edward Snowden. The real world of government may be more brutal than what is anticipated by some idealistic new recruits.

Fifth, still on the human factor, there is a risk that people with access to sensitive material may misuse that access for personal motives, like tracking down former lovers. As with other crimes and scandals, such people are quietly sacked rather than put on trial (for fear of the general public learning more about the situation). The challenge from the first century Roman poet Juvenal remains: “Who will guard the guards themselves?”

Sixth, if the CIA can identify these flaws within IT equipment, so can others, such as terrorists. One of the frightening aspects of the so-called Islamic State is just how well a group of terrorists operating from a desert hideout have been able to use IT. Other governments, such as those in Russia and China, will also be following this controversy to see what they can extract for their own cyber-war ambitions.

Finally, in political science there is the concept of “incrementalism”, whereby major long-term change happens in small steps or increments. These may result in unintended consequences. CIA’s expanded role in IT has come after the 9/11 terrorist attacks. It seemed like a good idea at the time to expand the role and budgets of the intelligence agencies. While the Islamist terrorist threat has not fully materialised in the US, a whole new spy industry has been created.

Dr Keith Suter is managing director of the Global Directions think tank. Among his many roles, he is foreign affairs editor for Channel 7’s Sunrise program.

This article is published under a Creative Commons Licence and may be republished with attribution.

Published March 22, 2017