The Use of Intelligence in Indonesian Counter-Terrorism Policing Amira Paripurna a Dissertation Submitted in Partial Fulfillment

Total Page:16

File Type:pdf, Size:1020Kb

The Use of Intelligence in Indonesian Counter-Terrorism Policing Amira Paripurna a Dissertation Submitted in Partial Fulfillment The Use of Intelligence in Indonesian Counter-Terrorism Policing Amira Paripurna A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2017 Reading Committee: Jonathan Eddy, Chair Mary Fan Mark Cammack Peter Lape Program Authorized to Offer Degree: School of Law © Copyright 2017 Amira Paripurna University of Washington ABSTRACT The Use of Intelligence in Indonesian Counter-Terrorism Policing Amira Paripurna Chair of the Supervisory Committee: Professor Jonathan A. Eddy School of Law The world over, one of the most pressing issues confronting law enforcement agencies today concerns responding to and preventing terrorism. In general, counter-terrorism (CT) efforts fall into two categories: pre-crime and post-crime. Unlike post-crime efforts that respond to terrorist acts that have already occurred, pre-crime CT is generally understood to be “proactive,” where intelligence plays a key role in preventing events and acts of terrorism. Proactive CT necessitates strong cooperation between counter-terrorism actors and among the relevant agencies to share the intelligence they collect. In fact, intelligence sharing is fundamental to counter-terrorism cooperation. In places like the U.S. and the U.K., one of the most effective and influential manifestations of proactive CT has been an approach called Intelligence-Led Policing (ILP). ILP is currently considered to be a “promising” model of policing, a model that may positively contribute to prevention and reduction of serious crime, including terrorism, organized crime, and trans-organized crime. The core framework of ILP is proactive in nature: it offers a collaborative approach to law enforcement based on information sharing and police accountability, and enhanced by intelligence operations. i This dissertation has sought to examine how and whether this ILP model is influencing the way the Indonesia is currently responding to terrorism. With this objective, it assesses and explores the ways that the Indonesian police and other counter-terrorism agencies collaborate and share information, using an ILP lens to analyze their strategic, tactical, and operational procedures and mechanisms. To drive effort, this dissertation addresses three main research questions: (1) What formal changes has Indonesia introduced into its policing structures post- Suharto and post-Bali Bombings? (2) Does the restructuring that Indonesia has undertaken represent an adoption of ILP as a primary strategy? (3) Do the Indonesian police and intelligence agencies collaborate and share information to prevent terrorism—and if they do, how? This qualitative study involved a thorough review of the extant literature, as well as analysis of in-depth interviews with key informants at counter-terrorism and security intelligence agencies. They consist on police special unit on counter-terrorism (Detasemen Khusus 88, Densus 88), national intelligence agency (Badan Intelijen Negara, BIN), and military strategic intelligence (Badan Intelijen Stratejik, BAIS), national coordinator of counter-terrorism (Badan Nasional Penanggulangan Terorisme, BNPT) and Indonesian financial intelligence unit (Pusat Pelaporan dan Analisis Transaksi Keuangan, PPATK). For additional background and context, interviews with academic scholars, members of parliaments, former jihadists and human rights activists were conducted. Through this analysis, the dissertation found that in Indonesia, current counter-terrorism policing relies primarily on intelligence to target, prioritize, and focus intervention. In this way, it reflects characteristics of an ILP strategy; in particular, it seems to reflect ILP most in how the agencies enhance law enforcement intelligence. However, while law enforcement intelligence has successfully driven police actions on counter-terrorism, police are operating under a ii fragmented intelligence structure. Collaboration and information-intelligence sharing happen in limited ways, generally on only a strategic level. At the same time, operational and tactical approaches have been shared only in informal ways. This study concluded that law enforcement intelligence has formed the backbone of CT policing in Indonesia; however, a number of essential elements from the ILP framework are missing from Indonesia’s efforts. Among other things, Indonesia is missing an integrated intelligence structure, especially formal policies and guidelines, mechanisms for sharing information within and among agencies. The result of this study provides an important first step in understanding the current implementation of CT policing in Indonesia—particularly, the pre- event aspect of CT. It also contributes to a better understanding of how information sharing could be improved among law enforcement and security intelligence agencies for improving terrorism prevention measures in Indonesia. Ultimately, this study recommends that the government provide guidance and promulgate regulations establishing coordination mechanisms to support the appropriate, effective, and timely sharing of both intelligence and sensitive information for law enforcement. In addition, it recommends the adoption of legislation to clarify how intelligence may be used in criminal proceedings, enabling a balance between the importance of intelligence products and protections for a fair trial. Safeguards will be needed to keep the democratization process on the right track while promoting security and public order. Keywords: counter-terrorism, criminal justice, crime, intelligence, info-sharing, policing, proactive, prevention. iii Table of Contents Abstract ....................................................................................................................................... i Acknowledgements ................................................................................................................. viii Dedications ..................................................................................................................................x Glossary ...................................................................................................................................... xi Chapter I: Introduction .................................................................................................................1 A. Statement Of Problem ..........................................................................................................1 B. Significance Of Study ..........................................................................................................6 C. Purpose Of Study .................................................................................................................7 D. Research Questions ..............................................................................................................8 E. Assumptions And Limitations .............................................................................................8 1. Assumptions ...................................................................................................................8 2. Limitations .....................................................................................................................8 F. Methodology ........................................................................................................................9 1. Sample Design ...............................................................................................................9 2. Data Analysis ...............................................................................................................10 a. Connection Of The Outcome Of This Study With Interview ........................................10 b. Examination Of The Statutory Framework....................................................................11 c. Comparative Approach ..................................................................................................12 G. Ethical Issue .......................................................................................................................12 1. Informed Consent/Protection Of Rights ......................................................................13 2. Data Security And Maintenance .................................................................................13 H. Organization Of The Dissertation ......................................................................................14 Chapter II: Theoretical Framework .........................................................................................17 A. Introduction ........................................................................................................................17 B. The General Overview Of Law Enforcement As A Counter-Terrorism Approach And The Emergence Of Intelligence-Led Policing (ILP) ..........................................................18 C. The Mix Between Law Enforcement Intelligence And National Security Intelligence And The Call For Information Sharing......................................................................................26 D. Conclusion .........................................................................................................................29 Chapter III: Indonesian Counter-Terrorism Legislations And Legal Aspects Of The Use Of Intelligence In Criminal Proceedings .........................................................................................31 A. Introduction .......................................................................................................................31
Recommended publications
  • The Protection of Indonesian Batik Products in Economic Globalization
    Advances in Social Science, Education and Humanities Research, volume 192 1st International Conference on Indonesian Legal Studies (ICILS 2018) The Protection of Indonesian Batik Products in Economic Globalization Dewi Sulistianingsih1a, Pujiono1b 1Department of Private and Commercial Law , Faculty of Law, Universitas Negeri Semarang (UNNES), Indonesia a [email protected], b [email protected] Abstract— Batik is one of Indonesia’s cultural heritage whose existence has been recognized by UNESCO since 2009. It has become the identity and characteristic of Indonesia that needs to be preserved and developed. Indonesian people can preserve it by recognizing its products’ existence and conducting development efforts by improving the quality of its products. In Indonesia, batik has been passed down from generations by wearing, producing and marketing its products. The article is the result of a study using a socio-legal method. The data collection was conducted through interview and observation techniques. The research subjects are batik business owners in Indonesia. This paper reveals the challenges and obstacles faced by the local batik product business people in Indonesia in the face of economic globalization. There have been legal efforts to provide protection for the Indonesian batik products. The problems are how the protection is applied and how the country and the community perform the protection. The other objective of this paper is to analyze the readiness of the local batik businesspeople in Indonesia in the face of economic globalization especially from the legal perspective. The article exposes the batik business owners’ weaknesses and seeks to give sound solutions which is hoped to be applied by the batik business owners in Indonesia in order to survive in the globalization era.
    [Show full text]
  • Advanced Windows Integration with Eagle, Garuda, & Harpy Joe
    Advanced Windows Integration with Eagle, Garuda, & Harpy Joe Mistachkin @ Tcl 2016 https://eyrie.solutions/ Overview What is Eagle? • Eagle (Extensible Adaptable Generalized Logic Engine) is an implementation of the Tcl scripting language for the Common Language Runtime (CLR). • It is written completely in C#. Superficially, it is similar to Jacl; however, it was written from scratch based on the design and implementation of Tcl 8.4. • It provides most of the functionality of the Tcl 8.4 interpreter while borrowing selected features from both Tcl 8.5 and 8.6. • There are some extra features that are not present in native Tcl, mostly for dealing with Windows and the .NET Framework. What can Eagle do for me? • Help you to seamlessly integrate with applications, libraries, and system components on Windows. • Help you to securely deploy applications and packages written in Eagle or native Tcl to your users. Integration Like Tcl before it, Eagle enables integration. • COM components via [object] command • .NET Framework via [object] command • Databases via [sql] command • Native Tcl/Tk via [tcl] command • Native DLLs via [library] command • Web via [uri] command • Other protocols via [socket] command • Command line tools via [exec] command Case Study: Win32 How can I prevent the native console window from closing? • Using the Win32 API via Eagle. • With the [library] command, you can access native APIs, including those provided by the underlying operating system. • The necessary code can be found in the script file: – examples\Win32\ex1.eagle Case Study: COM Can I use a COM class? • If you have the Primary Interop Assembly (e.g.
    [Show full text]
  • The Post-Revolutionary Transformation of the Indonesian Army
    THE POST-REVOLUTIONARY TRANSFORMATION OF THE INDONESIAN ARMY Part II* Ruth McVey The rebellion of 1958 marked a turning point in the development of the Indonesian army, for it provided the central military leader­ ship with the means to establish its ascendancy over the officer corps. Had there been a compromise in the settlement of the insurrection, General Nasution might have continued for some time to inch his way toward control, in the manner in which we saw him progress during 1955-1956,* 1 and the relations between the army center and the power­ ful territorial commanders would have continued for some time to be roughtly equal. But the central military command moved with great success against the rebel forces, whose failure was apparent within six months of their revolt. This victory both eliminated Nasution’s principal rivals for army leadership and gave him great military prestige,with which he consolidated his personal position and re­ shaped the army's structure. Of even greater significance for the army’s ultimate role in Indonesia, the rebellion--or, to be more exact, the State of Emergency proclaimed in April 1957 in response to the regional crisis--allowed the military to expand its activities into the economic and political spheres. This expansion provided the army leadership with vital sources of finance and patronage, strengthening its position over the officer corps and enhancing the army's status in the society as a whole. The proliferation of the army's functions and of its members' contacts with civilian elements that resulted from this development increased the chances for extra-military alliances and civilian influence over individual officers, but in another and ultimately more important sense, it diminished army disunity.
    [Show full text]
  • Chapter Iii Discussion
    perpustakaan.uns.ac.id digilib.uns.ac.id CHAPTER III DISCUSSION A. PT. Garuda Indonesia 1. History of PT. Garuda Indonesia Indonesia has a national airline as a pride of the country. PT. Garuda Indonesia (Persero) Tbk, or known as Garuda Indonesia (GA) is the national airline of Indonesia that owned by the Government of Republic of Indonesia. The company is a BUMN (Badan Usaha Milik Negara) or Stated-owned Enterprise with company slogan The Airline of Indonesia. The management office as the main activity of the company is located in Jakarta at Management Building, Garuda City, Soekarno-Hatta International Airport, Cengkareng 19120, Indonesia. Garuda Indonesia also has a branch offices and sales offices in some cities in Indonesia and all around the world. The main hub (airport) of the airline is located in Soekarno- Hatta International Airport, Cengkareng with other hubs are in Ngurah Rai International Airport in Bali, Kuala Namu International Airport in North Sumatera, Sultan Hasanudin International Airport in South Sulawesi and Juanda International Airport in East Java. Taken from Garuda Indonesia Annual Report 2009, the story of PT. commit to user Garuda Indonesia was started when Indonesia was fighting for its 7 perpustakaan.uns.ac.id digilib.uns.ac.id8 independence. The first commercial flight of Garuda Indonesia was started in 26 January 1969. The first flight was from Calcutta to Rangoon using a Douglas DC-3 Dakota aircraft. For the first time, the name of the airline was Seulawah and then changed into “Garuda Indonesian Airways”. (Garuda Indonesia Annual Report 2009:22) The name of Garuda was given by Indonesian’s first president, Soekarno.
    [Show full text]
  • Pdf | 1014.98 Kb
    West Papua Report July 2015 This is the 134th in a series of monthly reports that focus on developments affecting Papuans. This series is produced by the non-profit West Papua Advocacy Team (WPAT) drawing on media accounts, other NGO assessments, and analysis and reporting from sources within West Papua. This report is co-published by the East Timor and Indonesia Action Network (ETAN). Back issues are posted online at http://www.etan.org/issues/wpapua/default.htm Questions regarding this report can be addressed to Edmund McWilliams at [email protected]. If you wish to receive the report directly via e-mail, write to [email protected]. Link to this issue: http://etan.org/issues/wpapua/2015/1507.htm. The Report leads with PERSPECTIVE, an analysis piece; followed by UPDATE, a summary of some recent news and developments; and then CHRONICLE which includes analyses, statements, new resources, appeals and action alerts related to West Papua. Anyone interested in contributing a PERSPECTIVE or responding to one should write to [email protected]. We also welcome suggestions of resources and analysis to for listing in the CHRONICLE section. The opinions expressed in Perspectives are the author's and not necessarily those of WPAT or ETAN. For ongoing news on West Papua subscribe to the reg.westpapua listserv or visit its archive; the list is also available on Twitter. CONTENTS This edition's PERSPECTIVE is an exclusive interview with Zely Airane of the #PapuaItuKita on creative ways they are raising issues involving West Papua in Indonesia. In UPDATE: This Issue highlights the recent Melanesian Spearhead Group summit in the Solomon Islands where the United Movement for the Liberation of West Papua (ULMWP) was given observer status.
    [Show full text]
  • The Growing Militarization of Counterterrorism in Southeast Asia
    Philippine flag flown in war torn Marawi. (iStock) 138 | FEATURES PRISM 7, NO. 4 Sending in the Cavalry The Growing Militarization of Counterterrorism in Southeast Asia By See Seng Tan here is a growing consensus among security analysts that the Battle of Marawi in the Philippines, which lasted from May to October 2017, constitutes a watershed moment in the evolution of the ter- T rorist threat in Southeast Asia. Pro–Islamic State of Iraq and the Levant (ISIL) militants threatened to turn Marawi into “the Mosul of Southeast Asia,” with their astounding ability to operate large groups capable of controlling territory and exposing the inadequacy of the region’s security services.1 Although member countries of the Association of Southeast Asian Nations (ASEAN) had pondered the question of possible participation by their armed forces in counterterrorism well before the Battle, it is undeniable that Marawi has become the catalyst behind the regional drive to militarize counterterrorism efforts in Southeast Asia.2 Cooperative frameworks furnished by ASEAN have since taken on added significance, especially the defense-oriented arrangements that bring together the defense establishments and armed forces of the ASEAN countries as well as those of external powers including China, India, Japan, and the United States. The growing militarization of counterterrorism efforts will neither be easy nor straightforward, given long- standing regional sensitivities and the potentially diversive ramifications that excessive securitization could have for democratic life within ASEAN countries. Battle of Marawi: Game Changer? At their retreat in early February, the defense ministers of the 10 ASEAN member countries identified terrorism as the single biggest threat to their region, even as they recognized a number of other regional security challenges including the South China Sea and North Korea.
    [Show full text]
  • Australian Foreign Fighters: Risks and Responses
    Australian foreign fighters: Andrew Zammit Risks and responses April 2015 AUSTRALIAN FOREIGN FIGHTERS: RISKS AND RESPONSES The Lowy Institute for International Policy is an independent policy think tank. Its mandate ranges across all the dimensions of international policy debate in Australia – economic, political and strategic – and it is not limited to a particular geographic region. Its two core tasks are to: • produce distinctive research and fresh policy options for Australia’s international policy and to contribute to the wider international debate. • promote discussion of Australia’s role in the world by providing an accessible and high-quality forum for discussion of Australian international relations through debates, seminars, lectures, dialogues and conferences. Lowy Institute Analyses are short papers analysing recent international trends and events and their policy implications. The views expressed in this paper are entirely the author’s own and not those of the Lowy Institute for International Policy. AUSTRALIAN FOREIGN FIGHTERS: RISKS AND RESPONSES EXECUTIVE SUMMARY Conflicts in Syria and Iraq have attracted aspiring jihadists from across the world. Australians have joined the flow of foreign fighters to the region, raising concerns that some will carry out terrorist attacks in Australia should they return home. The record of past jihadist foreign fighter mobilisations, including Australia's own history in this regard, demonstrates that there is a potential threat to Australia’s security. However, a range of factors will shape that threat, including how Australia responds to returning foreign fighters. The Government's response has mainly focused on increased resources and powers for police and intelligence agencies, but also includes an important non-coercive element termed Countering Violent Extremism (CVE) that has received less attention.
    [Show full text]
  • Dictionary on Comprehensive Security in Indonesia: Acronym and Abbreviations
    Dictionary on Comprehensive Security in Indonesia: Acronym and Abbreviations Kamus Keamanan Komprehensif Indonesia: Akronim dan Singkatan Dr. Ingo Wandelt Kamus Keamanan Komprehensif Indonesia : Akronim dan Singkatan 1 Dictionary on Comprehensive Security in Indonesia: Acronym and Abbreviations Kamus Keamanan Komprehensif Indonesia: Akronim dan Singkatan Dr. Ingo Wandelt November 2009 2 Dictionary on Comprehensive Security in Indonesia : Acronym and Abbreviations Kamus Keamanan Komprehensif Indonesia : Akronim dan Singkatan 1 Dictionary on Comprehensive Security in Indonesia: Kamus Keamanan Komprehensif Indonesia: Acronym and Abbreviations Akronim dan Singkatan By: Disusun Oleh: Dr. Ingo Wandelt Dr. Ingo Wandelt Published by: Diterbitkan oleh : Friedrich Ebert Stiftung (FES) Indonesia Office Friedrich Ebert Stiftung (FES) Indonesia Office Cover Design & Printing: Design & Percetakan: German-Indonesian Chamber of Industry and Commerce (EKONID) Perkumpulan Ekonomi Indonesia-Jerman (EKONID) All rights reserved. Hak cipta dilindungi Undang-undang. Not for commercial use or unauthorized distribution. Dilarang memperbanyak sebagian atau seluruh isi terbitan ini dalam bentuk apapun tanpa izin tertulis dari FES Indonesia. Tidak untuk diperjualbelikan. Second Edition Edisi Kedua Jakarta, November 2009 Jakarta, November 2009 ISBN: 978-979-19998-5-4 ISBN: 978-979-19998-5-4 2 Dictionary on Comprehensive Security in Indonesia : Acronym and Abbreviations Kamus Keamanan Komprehensif Indonesia : Akronim dan Singkatan 3 Content I Daftar Isi Foreword ...........................................................................................
    [Show full text]
  • MOE Steve Ijames
    27-CR-20-12953 Filed in District Court State of Minnesota 1/14/2021 1:33 PM Steve Ijames EDUCATION • Bachelor of Science degree in Criminal Justice Administration, Drury University, Springfield, Missouri • Master of Science Degree in Public Administration, City University, Bellevue, Washington • Graduate, Missouri State Highway Patrol Law Enforcement Academy • Graduate, Missouri State Highway Patrol undercover narcotics investigator training program. • Graduate, Drug Enforcement Administration (DEA) undercover narcotics investigator training program. • Graduate, Mid States Organized Crime Information Center (MOCIC) narcotic investigators Criminal Intelligence Techniques training program. • Graduate, Springfield, Missouri Police Department Academy • Graduate, 186th FBI National Academy LAW ENFORCEMENT/PROFESSIONAL EXPERIENCE Poplar Bluff, Missouri Police Department • April 1979 through February 1981-Patrol Officer • February 1981 through August 1982-Narcotics Detective Springfield, Missouri Police Department • August 1982-1000 hour Springfield Police academy training • January 1983-uniformed patrol officer • September 1985-undercover narcotics investigator and Federal Drug Task Force member-Commissioned Deputy Untied States Marshal • October 1987-uniformed patrol • July 1988-Detective-criminal investigations and undercover narcotics investigations • September 1989-Sergeant-criminal investigations • April 1990-Crisis Action Team leader/sergeant (SWAT) • December 1992-Lieutenant, Special Operations Commander-overseeing all SWAT and narcotics
    [Show full text]
  • Al-Qaeda: the Many Faces of an Islamist Extremist Threat
    a al-Qaeda: The Many Faces of an Islamist Extremist Threat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE ISBN 0-16-076897-7 90000 9 780160 768972 al-QaedaTh e Many Faces of an Islamist Extremist Th reat REPORT OF THE HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE JUNE 2006 109th Congress Union Calendar No. 355 2d Session Report 109-615 al-Qaeda: The Many Faces of an Islamist Extremist Threat ___________________ REPORT OF THE U.S. HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCE APPROVED: JUNE 2006 TOGETHER WITH ADDITIONAL AND MINORITY VIEWS SUBMITTED: SEPTEMBER 2006 Available via the World Wide Web: http://www.gpo.gov/congress/house http://intelligence.house.gov/ September 6, 2006.—Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE Keeping America Informed I www.gpo.gov WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Offi ce Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 ISBN 0-16-076897-7 i PERMANENT SELECT COMMITTEE ON INTELLIGENCE OF THE HOUSE OF REPRESENTATIVES PETER HOEKSTRA, MICHIGAN, CHAIRMAN RAY LAHOOD, ILLINOIS JANE HARMAN, CALIFORNIA TERRY EVERETT, ALABAMA ALCEE L. HASTINGS, FLORIDA ELTON GALLEGLY, CALIFORNIA SILVESTRE REYES, TEXAS HEATHER WILSON, NEW MEXICO LEONARD L. BOSWELL, IOWA JO ANN DAVIS, VIRGINIA ROBERT E. (BUD) CRAMER, JR., ALABAMA MAC THORNBERRY, TEXAS ANNA G. ESHOO, CALIFORNIA JOHN M. MCHUGH, NEW YORK RUSH D. HOLT, NEW JERSEY TODD TIAHRT, KANSAS C.
    [Show full text]
  • A Lesson from Borobudur
    5 Changing perspectives on the relationship between heritage, landscape and local communities: A lesson from Borobudur Daud A. Tanudirjo, Jurusan Arkeologi, Fakultas Ilmu Budaya, Universitas Gadjah Mada, Yogyakarta Figure 1. The grandeur of the Borobudur World Heritage site has attracted visitors for its massive stone structure adorned with fabulous reliefs and stupas laid out in the configuration of a Buddhist Mandala. Source: Daud Tanudirjo. The grandeur of Borobudur has fascinated almost every visitor who views it. Situated in the heart of the island of Java in Indonesia, this remarkable stone structure is considered to be the most significant Buddhist monument in the Southern Hemisphere (Figure 1). In 1991, Borobudur 66 Transcending the Culture–Nature Divide in Cultural Heritage was inscribed on the World Heritage List, together with two other smaller stone temples, Pawon and Mendut. These three stone temples are located over a straight line of about three kilometres on an east-west orientation, and are regarded as belonging to a single temple complex (Figure 2). Known as the Borobudur Temple Compound, this World Heritage Site meets at least three criteria of the Operational Guidelines for the Implementation of the World Heritage Convention: (i) to represent a masterpiece of human creative genius, (ii) to exhibit an important interchange of human values over a span of time or within cultural area of the world, on developments in architecture or technology, monumental arts, town planning or landscape design, and (iii) to be directly or tangibly associated with events or living traditions, with ideas, or with beliefs, with artistic and literacy works of outstanding universal value (see also Matsuura 2005).
    [Show full text]
  • Counter-Insurgency Vs. Counter-Terrorism in Mindanao
    THE PHILIPPINES: COUNTER-INSURGENCY VS. COUNTER-TERRORISM IN MINDANAO Asia Report N°152 – 14 May 2008 TABLE OF CONTENTS EXECUTIVE SUMMARY AND RECOMMENDATIONS................................................. i I. INTRODUCTION .......................................................................................................... 1 II. ISLANDS, FACTIONS AND ALLIANCES ................................................................ 3 III. AHJAG: A MECHANISM THAT WORKED .......................................................... 10 IV. BALIKATAN AND OPLAN ULTIMATUM............................................................. 12 A. EARLY SUCCESSES..............................................................................................................12 B. BREAKDOWN ......................................................................................................................14 C. THE APRIL WAR .................................................................................................................15 V. COLLUSION AND COOPERATION ....................................................................... 16 A. THE AL-BARKA INCIDENT: JUNE 2007................................................................................17 B. THE IPIL INCIDENT: FEBRUARY 2008 ..................................................................................18 C. THE MANY DEATHS OF DULMATIN......................................................................................18 D. THE GEOGRAPHICAL REACH OF TERRORISM IN MINDANAO ................................................19
    [Show full text]