Connecting the Dots a Social Network Analysis of Law Enforcement’S Role in the Decline of Jemaah Islamiyah

Total Page:16

File Type:pdf, Size:1020Kb

Connecting the Dots a Social Network Analysis of Law Enforcement’S Role in the Decline of Jemaah Islamiyah Connecting the Dots A Social Network Analysis of Law Enforcement’s Role in the Decline of Jemaah Islamiyah Peter T. Carey GOV 679H Undergraduate Honors Thesis Department of Government University of Texas at Austin May 2010 Thesis Supervisor _________________________________ Professor Patricia Maclachlan Department of Government Honors Thesis Advisor Professor Kenneth F. Greene Department of Government Connecting the Dots A Social Network Analysis of Law Enforcement’s Role in the Decline of Jemaah Islamiyah The Jemaah Islamiyah (JI) terrorist organization in Indonesia was founded in 1993, carried out a series of deadly attacks such as the Bali bombings between 2000 and 2005, and subsequently suffered a cataclysmic decline; it carried out only one attack between 2006 and 2009. Existing arguments about why terrorist organizations end fall short of considering all the possible mechanisms that can be influential in a group‟s demise. I argue that one of these existing mechanisms, law enforcement, is one of the driving forces behind JI‟s decline. I strengthen this claim by drawing on social network analysis to quantify how law enforcement changes and disrupts a terrorist organization such as JI. An evaluation of the specific circumstances that facilitated the success of law enforcement efforts against JI has implications for broader counterterrorism efforts, suggesting cases in which similar law enforcement tactics may be effective in weakening other terrorist organizations. 2 Table of Contents Acknowledgements……………………………………………………………………4 List of Figures……………………………………………………………………...….5 List of Tables………………………………………………………………………….6 Chapter 1 The Declining Strength of Jemaah Islamiyah……………......………..7 Chapter 2 The Rise and Fall of Jemaah Islamiyah……...……………...……….33 Chapter 3 Jemaah Islamiyah‟s Attacks and the Evolving Law Enforcement Response……………………………………………………........…..59 Chapter 4 Supporting the Law enforcement Narrative of Jemaah Islamiyah‟s Decline through Social Network Analysis……...……………..……..91 Chapter 5 Conclusion: Why Law Enforcement is Effective against Jemaah Islamiyah and Implications for Counterterrorism…………………..127 Appendix 1 Jemaah Islamiyah Attacks in Indonesia: 2000-2009…………...…..143 Appendix 2 Coding Jemaah Islamiyah for Capability: 2000-2009……………...144 Appendix 3 Indonesia Regional Security Ratings: Terrorism………………..….145 Appendix 4 State Terrorism Vulnerability Index: Indonesia………………...….146 Appendix 5 Node Attribute Codebook and Dataset………………………….….147 Appendix 6 Relationship Codebook……………………………………………..150 Appendix 7 Individual Degree, Betweenness, and Closeness Calculations……..152 Works Cited……………………………………………………………………...…165 Bibliography………………………………………………………………………..169 3 Acknowledgements I would like to thank my primary thesis advisor, Professor Patricia Maclachlan, for her continual patience and constructive criticism throughout the entirety of this project, and for inspiring me to pursue this topic when I was a student in her International Relations of East and Southeast Asia class. Professor Kenneth Greene was influential in laying the foundation for this thesis, and his guidance in the early stages is greatly appreciated. Professor Ami Pedahzur directed me toward the newest relevant research, and I truly would have been lost without his direction. Finally, I would like to thank my family, for without their loving support this thesis and many other things in my life would not be possible. 4 List of Figures 1.1 Number of JI Attacks per Year: 2000-2009………………………………….12 1.2 Annual Casualties of JI Attacks……………………………………………...13 1.3 Coding Jemaah Islamiyah for Capability: 2000-2009……………………….15 1.4 Koschade‟s Jemaah Islamiyah Graph – Bali Operation October 6, 2002- October 11, 2002……………………………………………………………..28 4.1 Jemaah Islamiyah Operational Network 1985-1989………………………..112 4.2 Jemaah Islamiyah Operational Network 1990-1994……………………..…113 4.3 Jemaah Islamiyah Operational Network 1995-1999……………..…………113 4.4 Jemaah Islamiyah Operational Network 2000………………….…………..114 4.5 Jemaah Islamiyah Operational Network 2001…………………...…………114 4.6 Jemaah Islamiyah Operational Network 2002……………….……………..115 4.7 Jemaah Islamiyah Operational Network 2003………………….…………..115 4.8 Jemaah Islamiyah Operational Network 2004……………..……………….116 4.9 Jemaah Islamiyah Operational Network 2005……………...………………116 4.10 Jemaah Islamiyah Operational Network 2006………...……………………117 5 List of Tables 4.1 Jemaah Islamiyah Operational Network Overall Structural Criteria…….…118 6 Chapter 1 The Declining Strength of Jemaah Islamiyah Jemaah Islamiyah (JI) was founded in 1993. The organization carried out numerous terrorist attacks between 2000 and 2005, the most devastating of which was the 2002 Bali bombing that killed more than 200 people and injured hundreds more (Rabasa 2006: 153). But after reaching the peak of its operational capability in 2002, JI‟s membership began to decline along with its ability to carry out attacks on the same scale as the Bali bombing. JI nearly fizzled out of existence (Pavlova 2006: 777). There is wide consensus that JI is weaker today than it was at the height of its operational ability in 2002-2005, but the extent of this decline and its causes are less clear (Rabasa 2006: 147). Why has JI weakened over time? Answering this question has important policy implications not only for Indonesia and Southeast Asia, but also for counterterrorism efforts around the world. A study of JI‟s decline will hopefully reveal the changes within the organization that weakened JI. By understanding how the organization responded to both internal and external pressure, we may be able to identify the circumstances under which this pressure may effect similar changes in other terrorist organizations. Although terrorism will likely persist for quite some time, this is not necessarily the case for individual terrorist organizations. An understanding of the forces that weaken terrorist organizations, such as JI, allows governments to craft more effective counterterrorism policies that may hasten the demise of similar terrorist organizations. 7 The extensive body of literature about JI is extremely helpful in understanding the narrative history of the organization and how it changed over time. While many of these sources note the improving counterterrorism efforts of Indonesian law enforcement, they fail to convincingly argue that law enforcement is one of the primary forces weakening JI. Making the argument for the importance of law enforcement in JI‟s decline combines general arguments about why terrorist groups decline and ultimately end with the specific circumstances of JI‟s decline. Applying these arguments to the case of JI leads to valuable insights about the effectiveness of law enforcement that have broad implications for counterterrorism. I argue that law enforcement, specifically arresting and killing JI members, is one of the driving forces behind JI‟s decline since the peak of its operational capability in 2002. I strengthen this claim by drawing on social network analysis to show how law enforcement changes and disrupts a terrorist organization like JI. The remainder of this chapter lays the groundwork for the social network model of JI‟s decline. First, the problematic task of measuring the strength of JI is accomplished. Five indicators of JI‟s strength over the past decade all point in the same direction, illustrating the trend of declining strength since 2002. Next, the existing arguments about how terrorist groups decline and end are outlined, along with their shortcomings for explaining the decline of JI. I argue that law enforcement was effective in capturing and killing JI members, thus disrupting the relationships that allow the operational network to function. The basic concepts of social network analysis are presented, along with their applicability to the argument that law enforcement was one of the driving forces behind JI‟s decline. Social network 8 analysis identifies the central members of a terrorist network and quantifies the structural changes in the organization after members are arrested or killed by law enforcement. The real-time application of social network analysis allows law enforcement to target the most influential members of a terrorist organization, maximizing the disruptive effects of arrests. Finally, an outline of the following chapters previews the development of the argument for law enforcement‟s influential role in JI‟s decline. Defining and Measuring the Strength of Jemaah Islamiyah Over Time The narrative story of JI illustrates the significant changes in the organization since it was officially founded in 1993. After its founding, JI evolved into a highly organized group with a defined leadership and an estimated membership of as many as 5,000 individuals by 2002 (Patterns of Global Terrorism 2002). At the peak of its influence JI maintained active cells in Indonesia, Philippines, Malaysia, Singapore, and Australia (Rabasa 2006: 147). This once robust transnational organization soon began to weaken as these overseas cells disbanded or were broken up by law enforcement in the years after the 2002 Bali bombings, and today JI maintains a significant presence only in Indonesia (ICG 3 May 2007: 1). Estimates of its membership in 2009 were as low as 200 members (ICG 24 July 2009: 3). JI weakened over time, but measuring the decline of terrorist organizations is a difficult undertaking, especially considering the limits of unclassified information. In the existing literature about why terrorist organizations end,
Recommended publications
  • Australian Foreign Fighters: Risks and Responses
    Australian foreign fighters: Andrew Zammit Risks and responses April 2015 AUSTRALIAN FOREIGN FIGHTERS: RISKS AND RESPONSES The Lowy Institute for International Policy is an independent policy think tank. Its mandate ranges across all the dimensions of international policy debate in Australia – economic, political and strategic – and it is not limited to a particular geographic region. Its two core tasks are to: • produce distinctive research and fresh policy options for Australia’s international policy and to contribute to the wider international debate. • promote discussion of Australia’s role in the world by providing an accessible and high-quality forum for discussion of Australian international relations through debates, seminars, lectures, dialogues and conferences. Lowy Institute Analyses are short papers analysing recent international trends and events and their policy implications. The views expressed in this paper are entirely the author’s own and not those of the Lowy Institute for International Policy. AUSTRALIAN FOREIGN FIGHTERS: RISKS AND RESPONSES EXECUTIVE SUMMARY Conflicts in Syria and Iraq have attracted aspiring jihadists from across the world. Australians have joined the flow of foreign fighters to the region, raising concerns that some will carry out terrorist attacks in Australia should they return home. The record of past jihadist foreign fighter mobilisations, including Australia's own history in this regard, demonstrates that there is a potential threat to Australia’s security. However, a range of factors will shape that threat, including how Australia responds to returning foreign fighters. The Government's response has mainly focused on increased resources and powers for police and intelligence agencies, but also includes an important non-coercive element termed Countering Violent Extremism (CVE) that has received less attention.
    [Show full text]
  • Al-Qaeda: the Many Faces of an Islamist Extremist Threat
    a al-Qaeda: The Many Faces of an Islamist Extremist Threat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE ISBN 0-16-076897-7 90000 9 780160 768972 al-QaedaTh e Many Faces of an Islamist Extremist Th reat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE JUNE 2006 109th Congress Union Calendar No. 355 2d Session Report 109-615 al-Qaeda: The Many Faces of an Islamist Extremist Threat ___________________ REPORT OF THE U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE APPROVED: JUNE 2006 TOGETHER WITH ADDITIONAL AND MINORITY VIEWS SUBMITTED: SEPTEMBER 2006 Available via the World Wide Web: http://www.gpo.gov/congress/house http://intelligence.house.gov/ September 6, 2006.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE Keeping America Informed I www.gpo.gov WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Offi ce Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 ISBN 0-16-076897-7 i PERMANENT SELECT COMMITTEE ON INTELLIGENCE OF THE HOUSE OF REPRESENTATIVES PETER HOEKSTRA, MICHIGAN, CHAIRMAN RAY LAHOOD, ILLINOIS JANE HARMAN, CALIFORNIA TERRY EVERETT, ALABAMA ALCEE L. HASTINGS, FLORIDA ELTON GALLEGLY, CALIFORNIA SILVESTRE REYES, TEXAS HEATHER WILSON, NEW MEXICO LEONARD L. BOSWELL, IOWA JO ANN DAVIS, VIRGINIA ROBERT E. (BUD) CRAMER, JR., ALABAMA MAC THORNBERRY, TEXAS ANNA G. ESHOO, CALIFORNIA JOHN M. MCHUGH, NEW YORK RUSH D. HOLT, NEW JERSEY TODD TIAHRT, KANSAS C.
    [Show full text]
  • Counter-Insurgency Vs. Counter-Terrorism in Mindanao
    THE PHILIPPINES: COUNTER-INSURGENCY VS. COUNTER-TERRORISM IN MINDANAO Asia Report N°152 – 14 May 2008 TABLE OF CONTENTS EXECUTIVE SUMMARY AND RECOMMENDATIONS................................................. i I. INTRODUCTION .......................................................................................................... 1 II. ISLANDS, FACTIONS AND ALLIANCES ................................................................ 3 III. AHJAG: A MECHANISM THAT WORKED .......................................................... 10 IV. BALIKATAN AND OPLAN ULTIMATUM............................................................. 12 A. EARLY SUCCESSES..............................................................................................................12 B. BREAKDOWN ......................................................................................................................14 C. THE APRIL WAR .................................................................................................................15 V. COLLUSION AND COOPERATION ....................................................................... 16 A. THE AL-BARKA INCIDENT: JUNE 2007................................................................................17 B. THE IPIL INCIDENT: FEBRUARY 2008 ..................................................................................18 C. THE MANY DEATHS OF DULMATIN......................................................................................18 D. THE GEOGRAPHICAL REACH OF TERRORISM IN MINDANAO ................................................19
    [Show full text]
  • Commission Regulation (Ec)
    L 126/38EN Official Journal of the European Union 19.5.2005 COMMISSION REGULATION (EC) No 757/2005 of 18 May 2005 amending for the 46th time Council Regulation (EC) No 881/2002 imposing certain specific restrictive measures directed against certain persons and entities associated with Usama bin Laden, the Al-Qaida network and the Taliban, and repealing Council Regulation (EC) No 467/2001 THE COMMISSION OF THE EUROPEAN COMMUNITIES, (2) On 16 May 2005, the Sanctions Committee of the United Nations Security Council decided to amend the list of persons, groups and entities to whom the freezing Having regard to the Treaty establishing the European of funds and economic resources should apply. Annex I Community, should therefore be amended accordingly. Having regard to Council Regulation (EC) No 881/2002 of 27 May 2002 imposing certain specific restrictive measures (3) In order to ensure that the measures provided for in this directed against certain persons and entities associated with Regulation are effective, this Regulation must enter into Usama bin Laden, the Al-Qaida network and the Taliban, and force immediately, repealing Council Regulation (EC) No 467/2001 prohibiting the export of certain goods and services to Afghanistan, strengthening the flight ban and extending the freezing of HAS ADOPTED THIS REGULATION: funds and other financial resources in respect of the Taliban 1 of Afghanistan ( ), and in particular Article 7(1), first indent, Article 1 thereof, Annex I to Regulation (EC) No 881/2002 is amended as set out Whereas: in the Annex to this Regulation. (1) Annex I to Regulation (EC) No 881/2002 lists the Article 2 persons, groups and entities covered by the freezing of funds and economic resources pursuant to that Regu- This Regulation shall enter into force on the day of its publi- lation.
    [Show full text]
  • Paradise in the Shadow of Swords
    Paradise in the shadow of swords In defence of Islam? An analysis of al-Qaida statements from 1993 to 2004. Mathias Rongved Master Thesis, Department of Political Science Word count: 32 920 UNIVERSITY OF OSLO October 2008 2 3 Table of Contents TABLE OF CONTENTS...................................................................................................................... 3 PREFACE.............................................................................................................................................. 5 CHAPTER OVERVIEW ..................................................................................................................... 6 A NOTE ON THE SOURCE MATERIAL .................................................................................................... 6 A NOTE ON TRANSLITERATION AND TRANSLATION............................................................................. 8 A NOTE ON DISTRIBUTION................................................................................................................... 9 1. INTRODUCTION....................................................................................................................... 11 1.1 GLOBAL JIHAD ........................................................................................................................ 12 2. RESEARCH QUESTION AND RESEARCH METHOD ...................................................... 16 2.1 DEFINITIONS ..........................................................................................................................
    [Show full text]
  • Draft ASA Conference Paper Cultural Perceptions of Tourism And
    Draft ASA Conference Paper Cultural Perceptions of Tourism and Terrorism Michael Hitchcock and I Nyoman Darma Putra Introduction Michel Houellebecq's controversial novel 'Platform' (2002) manages to combine an account of sex tourism with an horrific terrorist attack in Thailand. Whatever the merits of the book, which was originally published in French in 1999, the author is eerily prescient about how tourist resorts could become terrorism targets in Southeast Asia. Houellebecq may be concerned with Thailand, which has suffered attacks on nightclubs and centres of entertainment, but has not experienced the same level of terrorist violence as other Southeast Asian countries, notably the Philippines. There the militant Islamic group Abu Sayyaf took 21 hostages, including 10 foreign tourists, from a diving resort in the Malaysian state of Sabah. The kidnap earned Abu Sayyaf US$ 20 million, reportedly paid by Libya (Rabasa, 2003: 54). The worst outrage to date occurred in Bali in 2002 where over 201 people lost their lives when three bombs were ignited. In this case the bombers were rounded up relatively quickly and on admitting their guilt where quick to point out why they had acted as they did. Thailand, however, is arguably one of the most iconic of tourism destinations and the fact that the real terrorist outrages have happened elsewhere does not detract from one of the main messages of the book: tourists are easily attacked and some of what they engage in may be used as a justification for attacking them. Houellebecq is of course a novelist and a very opinionated one according to some of his critics, but he does investigate the cultural ramifications of terrorists attacking tourists.
    [Show full text]
  • Paradise Defiled Lewis, Jeff
    www.ssoar.info Paradise defiled Lewis, Jeff Postprint / Postprint Zeitschriftenartikel / journal article Zur Verfügung gestellt in Kooperation mit / provided in cooperation with: www.peerproject.eu Empfohlene Zitierung / Suggested Citation: Lewis, J. (2006). Paradise defiled. European Journal of Cultural Studies, 9(2), 223-242. https:// doi.org/10.1177/1367549406063165 Nutzungsbedingungen: Terms of use: Dieser Text wird unter dem "PEER Licence Agreement zur This document is made available under the "PEER Licence Verfügung" gestellt. Nähere Auskünfte zum PEER-Projekt finden Agreement ". For more Information regarding the PEER-project Sie hier: http://www.peerproject.eu Gewährt wird ein nicht see: http://www.peerproject.eu This document is solely intended exklusives, nicht übertragbares, persönliches und beschränktes for your personal, non-commercial use.All of the copies of Recht auf Nutzung dieses Dokuments. Dieses Dokument this documents must retain all copyright information and other ist ausschließlich für den persönlichen, nicht-kommerziellen information regarding legal protection. You are not allowed to alter Gebrauch bestimmt. Auf sämtlichen Kopien dieses Dokuments this document in any way, to copy it for public or commercial müssen alle Urheberrechtshinweise und sonstigen Hinweise purposes, to exhibit the document in public, to perform, distribute auf gesetzlichen Schutz beibehalten werden. Sie dürfen dieses or otherwise use the document in public. Dokument nicht in irgendeiner Weise abändern, noch dürfen By using this particular
    [Show full text]
  • Counter Terrorist Trends and Analysis ISSN 2382-6444 | Volume 7, Issue 4 | May 2015
    Counter Terrorist Trends and Analysis www.rsis.edu.sg ISSN 2382-6444 | Volume 7, Issue 4 | May 2015 A JOURNAL OF THE INTERNATIONAL CENTRE FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH The Call of ISIS: The Medium and the Message Attracting Southeast Asians ANTON CHAN Myanmar at The Crossroads: The Shadow of Jihadist Extremism LAURA STECKMAN The Road to ISIS: How Indonesian Jihadists Travel to Syria and Iraq MUH TAUFIQURROHMAN Impact of ISIS’ Online Campaign in Southeast Asia NUR AZLIN MOHAMED YASIN Counter Terrorist Trends and Analysis Volume 7, Issue 4 | May 2015 1 Building a Global Network for Security Editorial Note Southeast Asia Focus e are pleased to release Volume 7, Issue 4 (May 2015) of the Counter Terrorist Trends and Analysis (CTTA) at www.rsis.edu.sg/research/icpvtr/ctta (ISSN 2382-6444) by the International Centre for Political Violence and Terrorism Research at the S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore. W TheW threat of the Islamic State of Iraq and Greater Syria (ISIS) has reverberated in Southeast Asia, from where individuals, including young women and individuals with families, have travelled to conflict zones in Syria and Iraq. The seriousness of the threat of ISIS however, comes from Southeast Asian fighters who will return home from battle with fresh combat skills, radical ideologies and extensive networks. The potential for these Southeast Asian terrorist returnees to mount attacks and to further radicalise and recruit other individuals, is therefore, of notable concern to governments in this region. In this issue, Anton Chan discusses the medium and the message used by ISIS that has appealed to its legions of supporters in Southeast Asia.
    [Show full text]
  • Asian Conflicts Reports
    Asian Conflicts Reports ! The New Face of Jemaah Islamiyah ! Maritime security in East Asia ! China’s terrorism risks ! A homecoming for Kashmir’s jihadists? Issue 7 | August, 2009 Council For Asian Terrorism Research The new face of the Jemaah Islamiyah A=Nelson Rand On the morning of July 17, 2009, twin suicide attacks were launched almost simultaneously on the JW Marriott and Ritz Carlton in Jakarta, Indonesia. Nine people were killed, including the two bombers, and over 50 were injured, many of them foreign nationals. Among the inured were eight Americans. The double bombing broke a four-year lull in terrorist attacks in Indonesia, the world’s most populous Muslim nation, and reveals the new face of Jemaah Islamiyah [JI], Southeast Asia’s largest terrorist network. Just a day before the attack, an Australian think-tank warned of a possible resurgence of attacks because of competition among extremist factions of JI seeking to establish dominance. The report, released by the Australian Strategic Policy Research Institute and entitled Jemaah Islamiyah: A renewed struggle? argues that two recent developments– current leadership tensions and the release of several former JI members from prison–“at least raise the possibility that splinter factions might now seek to re-energize the movement through violent attacks.” The authors were right. One of these splinter factions is led by Noordin Mohammed Top, a Malaysian born accountant-turned-Islamic extremist. Nicknamed the “moneyman,” Top fled to Indonesia after the Malaysian government’s crackdown on Islamic extremists following 9/11. Top is believed to be responsible for numerous attacks in Indonesia, including the 2002 Bali bombings which killed 202 people and injured more than 200, the bombing of the JW Marriot in Jakarta in 2003, the bombing of the Australian embassy in Jakarta in 2004 and the Bali bombings of 2005.
    [Show full text]
  • Security Council Distr.: General 8 March 2007
    United Nations S/2007/132 Security Council Distr.: General 8 March 2007 Original: English Letter dated 7 March 2007 from the Chairman of the Security Council Committee established pursuant to resolution 1267 (1999) concerning Al-Qaida and the Taliban and associated individuals and entities addressed to the President of the Security Council I have the honour to transmit herewith the sixth report of the Analytical Support and Sanctions Monitoring Team established pursuant to resolution 1526 (2004) and extended by resolutions 1617 (2005) and 1735 (2006). This report was submitted to the Security Council Committee established pursuant to resolution 1267 (1999) concerning Al-Qaida and the Taliban and associated individuals and entities on 7 November 2006. The report was discussed by the Committee, and clarifications were made by the Monitoring Team. The recommendations in the report are currently being considered by the Committee. I should be grateful if the attached report could be brought to the attention of the Council members and issued as a document of the Security Council. (Signed) Johan Verbeke Chairman Security Council Committee established pursuant to resolution 1267 (1999) concerning Al-Qaida and the Taliban and associated individuals and entities 06-62270 (E) 140307 *0662270* S/2007/132 Enclosure Letter dated 7 November 2006 from the Coordinator of the Analytical Support and Sanctions Monitoring Team established pursuant to resolution 1526 (2004) addressed to the Chairman of the Security Council Committee established pursuant to resolution 1267 (1999) concerning Al-Qaida and the Taliban and associated individuals and entities The Analytical Support and Sanctions Monitoring Team established pursuant to Security Council resolution 1526 (2004) and extended by Council resolution 1617 (2005) concerning Al-Qaida and the Taliban and associated individuals and entities has the honour to transmit to you its sixth report, in accordance with annex I to resolution 1617 (2005).
    [Show full text]
  • Estimated Age
    The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. Since 2003, we have published the calendar in a daily planner format that provides our consumers with a variety of information related to international terrorism, including wanted terrorists; terrorist group fact sheets; technical issue related to terrorist tactics, techniques, and procedures; and potential dates of importance that terrorists might consider when planning attacks. The cover of this year’s CT Calendar highlights terrorists’ growing use of social media and other emerging online technologies to recruit, radicalize, and encourage adherents to carry out attacks. This year will be the last hardcopy publication of the calendar, as growing production costs necessitate our transition to more cost- effective dissemination methods. In the coming years, NCTC will use a variety of online and other media platforms to continue to share the valuable information found in the CT Calendar with a broad customer set, including our Federal, State, Local, and Tribal law enforcement partners; agencies across the Intelligence Community; private sector partners; and the US public. On behalf of NCTC, I want to thank all the consumers of the CT Calendar during the past 12 years. We hope you continue to find the CT Calendar beneficial to your daily efforts. Sincerely, Nicholas J. Rasmussen Director The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics.
    [Show full text]
  • Searcct's Selection of Articles
    SEARCCT’S SELECTION OF ARTICLES PATRON DATO’ SRI ANIFAH HJ. AMAN HONORARY ADVISOR DATUK MOHD RADZI ABDUL RAHMAN EDITOR-IN-CHIEF DATIN PADUKA RASHIDAH RAMLI MANAGING EDITOR JOHN SAMUEL EDITORIAL COMMITTEE THOMAS KORUTH SAMUEL AHMAD TAJUDDIN MOHD. SAID MELVIN CHEAH CHEE AUN SHARMINI ANN NATHAN KENNIMROD SARIBURAJA HALIMAH ASHARI PUBLISHER Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT) MINISTRY OF FOREIGN AFFAIRS No. 516, Persiaran Mahameru 50480 Kuala Lumpur MALAYSIA Tel : (603) 2261 1900 Fax : (603) 2274 9487 Email : [email protected] Website : www.searcct.gov.my SEARCCT is dedicated to advocating the understanding of issues pertaining to terrorism and contributing ideas for counter-terrorism policy. The Centre accomplishes this mainly by organising constructive capacity building and public awareness programmes, as well as enhancing information sharing through networking, research and publications. All rights reserved. No part of this publication may be reproduced, stored, transmitted or disseminated in any form or by any means without prior written permission from SEARCCT. ALL STATEMENTS OF FACT AND EXPRESSIONS OF OPINION CONTAINED IN THE PAPERS PUBLISHED IN SEARCCT’S SELECTION OF ARTICLES ARE THE SOLE RESPONSIBILITY OF THE AUTHOR OR AUTHORS. THE GOVERNMENT OF MALAYSIA ASSUMES NO RESPONSIBILITY OF ANY STATEMENTS OF FACT OR OPINION EXPRESSED IN THE PUBLISHED PAPERS. TABLE OF CONTENTS FOREWORD i Datuk Mohd Radzi Abdul Rahman Secretary General, Ministry of Foreign Affairs Malaysia EDITOR’S NOTE iii Datin Paduka Rashidah
    [Show full text]