[University of Defence] at 20:46 19 May 2016 Comments on Terrorism and Violence in Southeast Asia

Total Page:16

File Type:pdf, Size:1020Kb

[University of Defence] at 20:46 19 May 2016 Comments on Terrorism and Violence in Southeast Asia Downloaded by [University of Defence] at 20:46 19 May 2016 Comments on Terrorism and Violence in Southeast Asia ... "Terrorism and Violence in Southeast Asia brings together in a single volume the leading authorities on politically motivated transnational violence in one of the key theatres of the war on terror. The compelling range of contributors offer insightful analysis combined with lucidly written and historically nuanced accounts of the evolution, appeal, and capacity of transnational terrorist groups in Southeast Asia. Paul J. Smith has compiled an edited collection that will be essential reading both for students as well as those with a more general interest in this important, yet too often neglected region." -David Martin Jones, University of Queensland "This book offers us considerable insight and fact-based information on the issues surrounding terrorism .... While the chapters in this volume mainly focus on Southeast Asia, many of the themes apply to both organized crime and terrorism more broadly. This book should be useful for both academics and policy makers. I highly recommend this book to anyone interested in these crucially important issues." -Margaret E. Beare, Nathanson Centre for the Study of Organized Crime and Corruption, York University, Toronto "This timely and informative study of terrorism and transnational security threats in Southeast Asia is unique in examining the threats and challenges from different national perceptions and in consideration of complex political, social, and economic factors affecting policymaking. Moreover, it highlights regional vulnerabilities to international violence and Islamic militancy.... The incisive insights, research, and new policy directions suggested by the authors of this illuminating volume warrant the priority attention of government policy makers, including the United States." -Rear Admiral L.R. Vasey, Usn Ret., Asia Pacific Strategist and Founder, Pacific Forum CSIS Downloaded by [University of Defence] at 20:46 19 May 2016 This page intentionally left blank Downloaded by [University of Defence] at 20:46 19 May 2016 Terrorism and Violence 1n• Southeast Asia Transnational Challenges to States and Regional Stability Paul J. Smith, editor Downloaded by [University of Defence] at 20:46 19 May 2016 An East Gate Book ROUTLEDGE Routledge Taylor & Francis Group LONDON AND NEW YORK An East Gate Book First published 2005 by M.E. Sharpe Published 2015 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon 0Xl4 4RN 7ll Third Avenue, New York, NY 10017, USA Routledge is an imprint of the Taylor & Francis Group, an informa business Copyright © 2005 Taylor & Francis. All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. Notices No responsibility is assumed by the publisher for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use of operation of any methods, products, instructions or ideas contained in the material herein. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Terrorism and violence in Southeast Asia : transnational challenges to states and regional Downloaded by [University of Defence] at 20:46 19 May 2016 stability I edited by Paul J. Smith p. cm. "An East Gate book." Includes bibliographical references and index. ISBN 0-7656-1433-2 (hardcover: alk. paper) - 0-7656-1434-0 (pbk.: alk. paper) 1. Terrorism-Asia, Southeastern. 2. Islam and terrorism-Asia, Southeastern. 3. Qaida (Organization) 4. Transnational crime-Asia, Southeastern. I. Smith, Paul J., 1965- HV6433.A785T47 2004 303.6'25'0959-<lc22 2004007994 ISBN 13: 9780765614346 (pbk) ISBN 13: 9780765614339 (hbk) Contents List of Figures vii Introduction Paul J. Smith ix List of Abbreviations xix I. A Transnational Perspective of Terrorism in Southeast Asia l. Transnational Violence in the Asia-Pacific: An Overview of Current Trends Alan Dupont 3 2. Militant Islamic Extremism in Southeast Asia Peter Chalk 19 3. Al-Qaeda Comes to Southeast Asia Zachary Abuza 38 4. Understanding al-Qaeda and Its Network in Southeast Asia Rohan Gunaratna 62 II. Regional Perspectives on Terrorism Downloaded by [University of Defence] at 20:46 19 May 2016 in Southeast Asia 5. Al-Qaeda and Political Terrorism in Southeast Asia Carlyle A. Thayer 79 6. Terrorism and the Political Landscape in Indonesia: The Fragile Post-Bali Consensus Anthony L. Smith 98 7. The Philippines and the Challenge of International Terrorism Paul A. Rodell 122 III. Southeast Asia's Ideological and Physical Enabling Environment 8. Countering Radical Islam in Southeast Asia: The Need to Confront the Functional and Ideological "Enabling Environment" Kumar Ramakrishna 145 9. Terrorism and Transnational Organized Crime: Tracing the Crime-Terror Nexus in Southeast Asia Tamara Makarenko 169 10. Trading the Tools of Terror: Armed Groups and Light Weapons Proliferation in Southeast Asia David Capie 188 11. Border Security and Transnational Violence in Southeast Asia Paul J. Smith 211 12. Media, Information Revolution, and Terrorism in Southeast Asia Shyam Tekwani 227 About the Editor and Contributors 249 Index 253 Downloaded by [University of Defence] at 20:46 19 May 2016 List of Figures 1.1 The Cold War National Security Continuum 7 1.2 The Post-Cold War National Security Continuum 7 9.1 The Crime-Terror Continuum (A) 174 9.2 The Crime-Terror Continuumn (B) 175 9 .3 Converging Threats 179 Downloaded by [University of Defence] at 20:46 19 May 2016 vii This page intentionally left blank Downloaded by [University of Defence] at 20:46 19 May 2016 Introduction Paul J. Smith Within hours after the September 11, 2001 terrorist attacks in the United States, law enforcement officials in the Philippines reported on their experi­ ences with an earlier plot involving airplane bombing and suicide missions that was uncovered six years earlier. This plot, known as Operation Bojinka, appeared to have had similar elements as the 9/11 attacks. Police discovered the conspiracy when an accidental fire broke out in a Manila apartment build­ ing. Police later uncovered evidence that indicated plans to assassinate Pope John Paul II. However, authorities would later find a laptop computer that described the Bojinka plot in great detail. The essence of Bojinka was a plan to simultaneously bomb eleven U.S. airliners as they crossed the Pacific Ocean. A secondary plot involved hijacking an airplane in the United States and crashing it-in a suicide attack-into CIA headquarters or the Pentagon. Later, investigations would reveal that Khalid Sheikh Mohammed, a key tactical planner for al-Qaeda until his arrest, was linked to both Bojinka and the 9/11 attacks in the United States. 1 Moreover, Ramzi Yousef, a key opera­ Downloaded by [University of Defence] at 20:46 19 May 2016 tive in the Bojinka planning, was also linked to the first attempt to destroy the World Trade Center in 1993. The Bojinka linkage to 9111 demonstrated that Southeast Asia had played an important role in the attacks in the United States. But it would not be the only connection. A subsequent U.S. congressional investigation revealed that Malaysia had also played an unwitting although important role in the 9/11 attacks. 2 Two of the principal hijackers, Khalid al-Mihdhar and Nawaf al­ Hazmi, had participated in a meeting in early January 2000 in Malaysia, which also involved another man, Khallad bin Atash, who was linked to the ix x INTRODUCTION bombing of the USS Cole in October 2000. Later, al-Mihdhar and al-Hazmi would board an international flight from Bangkok, Thailand, to Los Angeles, where they entered the United States unhindered. On September 11, 2001, the two men would later board American Airlines Flight 77 and crash it into the Pentagon. Within weeks of the 9/11 attacks, international media sources began to report that Washington had declared Southeast Asia to be the "second front" in the global war on terrorism, although U.S. officials have tended to resist such a characterization. 3 Nevertheless, the perception of Southeast Asia as a "second front" largely stemmed from the initial U.S. focus on the Philip­ pines. In particular, the United States sought to counter the Abu Sayyaf Group, which had been waging a guerrilla war and conducting terrorist attacks­ including kidnappings-against the government for years and was known for its extreme violence. In December 2001, attention turned to another group, previously unknown to most governments in the region. Known as Jemaah Islamiya, the organization was implicated in a plot to bomb Singapore gov­ ernment and Western targets in Singapore, including military targets con­ nected with the United States. Singapore's Internal Security Department (ISD) arrested fifteen people in relation to the plot, thirteen of whom were alleged to be members
Recommended publications
  • (2008): Perspectives on Terrorism
    Table of Contents: Accounting For the Waves of International Terrorism ………….…...3 By Dipak K. Gupta Interpreting the PKK’s Signals in Europe…………………………...10 By Vera Eccarius-Kelly Review Essay: Top 50 Books on Terrorism and Counterterrorism…15 By Joshua Sinai PERSPECTIVES ON TERRORISM Volume II, Issue 11 Accounting For the Waves of International Terrorism By Dipak K. Gupta “Without the pen of Pain, the swords of Washington would have been wielded in vain.” - John Adams dvancements in sciences come through painstaking observations. Scientists’ astute observations of the seemingly chaotic world pave the way for what is known as “knowledge creep.” Terrorism research is certainly no exception to this rule. One of David Rapoport’s singular contributions to A our advancement of knowledge has been his articulation of the four waves of international terror- ism. Rapoport (2006:10) defines waves with three characteristics: a) a cycle of activities characterized by ex- pansion and contraction phases, b) covering multiple nations, and c) “driven by a common predominant energy that shapes the participating groups’ characteristics and mutual relationships.” By studying the history of ter- rorism since the 1880s, Professor Rapoport identifies four distinct waves fueled by common ideological fervor emanating from anarchism, anti-colonialism, socialism, and religious fundamentalism, respectively, with the first three waves lasting roughly 40 years each. Although the “wave” theory has gained a firm footing in the extant literature on terrorism (Sageman 2008a), to my knowledge, not much effort has gone into the examination of the causes of, and the process by which mega ideas saturate nearly every corner of the earth.
    [Show full text]
  • Commission Sensitive Memorandu.M for the Record Interview of Hamdan
    Commission Sensitive Memorandu.m for the Record • Subject: Interview of Hamdan Bin Gharib Al- Shalawi Location: Conference Palace, Riyadh Interviewed by: S A Ja eline Ma ire (FBI-Penttbom) 9/11 Law Enforcement Privacy 9-11 Commission) (OS) Interpreter: 9/11 Law Enforcement Privacy Also present: Col. Jaber (Mabahith) Maj. Khalid (Mabahith) Maj. Habib (Mabahith) Interview Date: October 22~231 2003 MFR Date: October 23, 2003 MPR Prepared By: DS The interview commenced at approximately 10:15 pm. It was led by S/A Maguire, pursuant to an agreement between the Commission and the FBI (which had requested to interview Al-Shalawi back in June but had seen no movement on that request until the Commission asked in late September to interview him as well). DS asked questions after BfA Maguire had concluded her questioning. • Although he was made aware of the availability of an interpreter, Al-Shalawi declined that option and the interview was conducted entirely in Englieh, in which he plainly was fluent. He appeared quite relaxed throughout the 3-hour interview and very intelligent, answering questions apprQpriately without any evident comprehension problems. Background After introductions, Al'-Shalaw1 was asked to provide his professional and educational background. He currently is an Assi~tant Professor in Linguistics at the Imam University and is entering his third year in that position. He received his B.A. from the University in 1413 (Hejira) and found his further education delayed by the Gulf War, during which he remained at the University as a teaching assistant .. cONFLD!lftI1tL • Commission Sensitive , 9/11\""::,;,:,;:::::::::::,::""""""""",,Personal Privacy c::==ve .
    [Show full text]
  • Constructing” the Jemaah Islamiyah Terrorist: a Preliminary Inquiry
    No. 71 “CONSTRUCTING” THE JEMAAH ISLAMIYAH TERRORIST: A PRELIMINARY INQUIRY Kumar Ramakrishna Institute of Defence and Strategic Studies Singapore OCTOBER 2004 With Compliments This Working Paper series presents papers in a preliminary form and serves to stimulate comment and discussion. The views expressed are entirely the author’s own and not that of the Institute of Defence and Strategic Studies The Institute of Defence and Strategic Studies (IDSS) was established in July 1996 as an autonomous research institute within the Nanyang Technological University. Its objectives are to: • Conduct research on security, strategic and international issues. • Provide general and graduate education in strategic studies, international relations, defence management and defence technology. • Promote joint and exchange programmes with similar regional and international institutions; organise seminars/conferences on topics salient to the strategic and policy communities of the Asia-Pacific. Research Through its Working Paper Series, IDSS Commentaries and other publications, the Institute seeks to share its research findings with the strategic studies and defence policy communities. The Institute’s researchers are also encouraged to publish their writings in refereed journals. The focus of research is on issues relating to the security and stability of the Asia-Pacific region and their implications for Singapore and other countries in the region. The Institute has also established the S. Rajaratnam Professorship in Strategic Studies (named after Singapore’s first Foreign Minister), to bring distinguished scholars to participate in the work of the Institute. Previous holders of the Chair include Professors Stephen Walt (Harvard University), Jack Snyder (Columbia University), Wang Jisi (Chinese Academy of Social Sciences) and Alastair Iain Johnston (Harvard University).
    [Show full text]
  • The Muslim 500 2011
    The Muslim 500 � 2011 The Muslim The 500 The Muslim 500 � 2011 The Muslim The 500 The Muslim 500The The Muslim � 2011 500———————�——————— THE 500 MOST INFLUENTIAL MUSLIMS ———————�——————— � 2 011 � � THE 500 MOST � INFLUENTIAL MUSLIMS · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · All rights reserved. No part of this book may be repro- The Muslim 500: The 500 Most Influential Muslims duced or utilised in any form or by any means, electronic 2011 (First Edition) or mechanic, inclding photocopying or recording or by any ISBN: 978-9975-428-37-2 information storage and retrieval system, without the prior · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · written permission of the publisher. Views expressed in The Muslim 500 do not necessarily re- Chief Editor: Prof. S. Abdallah Schleifer flect those of RISSC or its advisory board. Researchers: Aftab Ahmed, Samir Ahmed, Zeinab Asfour, Photo of Abdul Hakim Murad provided courtesy of Aiysha Besim Bruncaj, Sulmaan Hanif, Lamya Al-Khraisha, and Malik. Mai Al-Khraisha Image Copyrights: #29 Bazuki Muhammad / Reuters (Page Designed & typeset by: Besim Bruncaj 75); #47 Wang zhou bj / AP (Page 84) Technical consultant: Simon Hart Calligraphy and ornaments throughout the book used courtesy of Irada (http://www.IradaArts.com). Special thanks to: Dr Joseph Lumbard, Amer Hamid, Sun- dus Kelani, Mohammad Husni Naghawai, and Basim Salim. English set in Garamond Premiere
    [Show full text]
  • Hat Yai – Sadao Motorway Hat Yai – Sadao Motorway
    Department of Highway’s ì Projects Siriphan Jitpradithsiri, Ph.D. Department of Highways, Ministry of Transport, Thailand ì Hat Yai – Sadao Motorway Hat Yai – Sadao Motorway ì Project Locaon Hat Yai – Sadao , Songkhla Province , Linking to Malaysia ì Sector/Subsector Infrastructure and Transport Hat Yai – Sadao Motorway ì Background and Ra?onale ì Due to the rapid economic growth, traffic volume along Highway No. 4 has increased up to its capacity ì An Inter-City Motorway would be an alternave highway system that enhances a higher level of service and safety to the highway users ì The Hat Yai – Sadao Motorway will be a connecJng route between Amphoe Hat Yai, Songkhla Province, and the Thai – Malaysian border. Hat Yai – Sadao Motorway ì Objecve ì To establish Hat Yai – Sadao Motorway as an alternave highway to enhance higher level of service and safety to the highway user. The motorway will connect Thailand and Malaysia through Sadao and Padang Bezar Customs house. Hat Yai – Sadao Motorway ì Scope ì Feasibility Study ì Detailed Design ì Investment OpJon ì Land AcquisiJon ì ConstrucJon ì Operaon Hat Yai – Sadao Motorway ì Esmated Cost ì 10,000 Million Bahts ì Financing Plan and Arrangements ì Depends on the results from a feasibility study ì The possible opJons are : Public investment opJon, Private investment opJon, Public and private joint venture Hat Yai – Sadao Motorway ì Proposed Implementaon Schedule Ac?vi?es 2012 2013 2014 21015 2016 2017 2018 Feasibility Study Detailed Design Investment OpJon, Land AcquisiJon ConstrucJon Operaon Hat
    [Show full text]
  • 65 Question History Test. See If You Can Get 100%
    65 QUESTION HISTORY TEST. SEE IF YOU CAN GET 100%. HERE’S THE TEST: 1. 1968 Bobby Kennedy was shot and killed by: a. Superman b. Jay Leno c. Long-haired pot head d. A Muslim male extremist between the ages of 17 and 40 suffering from pre-traumatic stress disorder. This murderer was a twenty-four year old Palestinian immigrant named Sirhan Sirhan. 2. In 1972 at the Munich Olympics, Israeli athletes were kidnapped and massacred by : a. Olga Corbett b. Sitting Bull c. Arnold Schwarzenegger d. Muslim male extremists between the ages of 17 and 40 unable to cope with the strain of competition between nation states in which they saw medals as signs of warlike domination 3. In November 1979, the US embassy in Tehran Iran was seized and taken over and 66 hostages are taken. This seizure was an outright attack on American Soil. The hostages were held for 444 days and were released on the day of President Reagan’s inauguration. The embassy was taken over by: a. Lost Norwegians interviewing candidates for kinetic Nobel Prizes, for potential future acts of valor they might commit b. Elvis c. A tour bus full of 80-year-old women d. Muslim male extremists between the ages of 17 and 40 strained by the invasion of infidels on their soil and unable to attend US universities on scholarship. One of the participants in the seizure of the embassy may have been Mahmoud Ahmadinejad, the current President of Iran who holds a Ph.D. in traffic and transport engineering from Tehran University of Science and Technology and was a 23-year old student at the time.
    [Show full text]
  • Read the Full PDF
    Safety, Liberty, and Islamist Terrorism American and European Approaches to Domestic Counterterrorism Gary J. Schmitt, Editor The AEI Press Publisher for the American Enterprise Institute WASHINGTON, D.C. Distributed to the Trade by National Book Network, 15200 NBN Way, Blue Ridge Summit, PA 17214. To order call toll free 1-800-462-6420 or 1-717-794-3800. For all other inquiries please contact the AEI Press, 1150 Seventeenth Street, N.W., Washington, D.C. 20036 or call 1-800-862-5801. Library of Congress Cataloging-in-Publication Data Schmitt, Gary James, 1952– Safety, liberty, and Islamist terrorism : American and European approaches to domestic counterterrorism / Gary J. Schmitt. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8447-4333-2 (cloth) ISBN-10: 0-8447-4333-X (cloth) ISBN-13: 978-0-8447-4349-3 (pbk.) ISBN-10: 0-8447-4349-6 (pbk.) [etc.] 1. United States—Foreign relations—Europe. 2. Europe—Foreign relations— United States. 3. National security—International cooperation. 4. Security, International. I. Title. JZ1480.A54S38 2010 363.325'16094—dc22 2010018324 13 12 11 10 09 1 2 3 4 5 6 7 Cover photographs: Double Decker Bus © Stockbyte/Getty Images; Freight Yard © Chris Jongkind/ Getty Images; Manhattan Skyline © Alessandro Busà/ Flickr/Getty Images; and New York, NY, September 13, 2001—The sun streams through the dust cloud over the wreckage of the World Trade Center. Photo © Andrea Booher/ FEMA Photo News © 2010 by the American Enterprise Institute for Public Policy Research, Wash- ington, D.C. All rights reserved. No part of this publication may be used or repro- duced in any manner whatsoever without permission in writing from the American Enterprise Institute except in the case of brief quotations embodied in news articles, critical articles, or reviews.
    [Show full text]
  • Al Qaeda Finances and Funding to Affiliated Groups
    Al Qaeda Finances and Funding to Affiliated Groups Strategic Insights, Volume IV, Issue 1 (January 2005) by Victor Comras Strategic Insights is a monthly electronic journal produced by the Center for Contemporary Conflict at the Naval Postgraduate School in Monterey, California. The views expressed here are those of the author(s) and do not necessarily represent the views of NPS, the Department of Defense, or the U.S. Government. For a PDF version of this article, click here. This paper provides a case study of al Qaeda finances and funding to affiliated groups. It is based in large part on my observations and experience as one of five international monitors charged by the UN Security Council to oversee the effectiveness of the measures adopted by the Security Council against al Qaeda and the Taliban. Some of the material in this paper is drawn directly from the five reports our monitoring group made to the Security Council during my tenure.. Considerable mystery and intrigue still surrounds the al Qaeda terrorist network and its sources of funding. We know more today than we did three years ago about its financial tools and structure, but we still have not identified much of its sources of supply and funding. And much of what we know may only be conjecture. The CIA has estimated, for example, that it cost Al Qaeda’ some $30 million a year to sustain itself during the period preceding 9/11, but the agency is still not sure what al Qaeda needs or expends today. And we still do not know with any precision just how much, and from whom, al Qaeda raises its money, or how it allocates it.[1] The roots of al Qaeda’s financial network, we believe, trace back directly to the extensive recruitment and financing networks established to support anti-Soviet jihad activities in Afghanistan.
    [Show full text]
  • National Security Case Studies Special
    National Security Case Studies Special Case-Management Challenges Robert Timothy Reagan Federal Judicial Center June 25, 2013 This Federal Judicial Center publication was undertaken in furtherance of the Center’s statutory mission to develop and conduct research and education programs for the judicial branch. While the Center regards the content as responsible and valuable, it does not reflect policy or recommendations of the Board of the Federal Judicial Center. Contents Table of Challenges .......................................................................................................... xi Table of Judges ............................................................................................................... xiii INTRODUCTION ............................................................................................................ 2 TERRORISM PROSECUTIONS ..................................................................................... 3 First World Trade Center Bombing United States v. Salameh (Kevin Thomas Duffy) and United States v. Abdel Rahman (Michael B. Mukasey) (S.D.N.Y.) ....................................................................... 5 Challenge: Interpreters ............................................................................................. 24 Challenge: Court Security ......................................................................................... 24 Challenge: Pro Se Defendants ................................................................................. 24 Challenge: Jury
    [Show full text]
  • Download (2MB)
    BAB I PENDAHULUAN POLITIK PERDA SYARIAT Dialektika Islam dan Pancasila di Indonesia Ma’mun Murod Al-Barbasy i POLITIK PERDA SYARIAT MA’MUN MUROD AL-BARBASY ii BAB I PENDAHULUAN POLITIK PERDA SYARIAT Dialektika Islam dan Pancasila di Indonesia Ma’mun Murod Al-Barbasy Kata Pengantar Prof. Dr. Din Syamsuddin, MA. iii POLITIK PERDA SYARIAT MA’MUN MUROD AL-BARBASY POLITIK PERDA SYARIAT Dialektika Islam dan Pancasila di Indonesia Penulis : Ma’mun Murod Al-Barbasy Penyunting : Ahmad Mu'arif, S. Ag., MA. Pemeriksa aksara : Mumsika Desain sampul : Amin Mubarok Tataletak isi : Dwi Agus M Diterbitkan pertama kali oleh: Penerbit Suara Muhammadiyah Jl. KHA Dahlan No. 43, Yogyakarta 55122 Telp. : (0274) 376955, Fax. (0274) 411306 SMS/WA : 0812 1738 0308 Facebook : Penerbit Suara Muhammadiyah E-mail : [email protected] (Redaksi) [email protected] (Admin) Homepage : www.suaramuhammadiyah.id Cetakan I : Desember 2017 Hak cipta edisi bahasa Indonesia © Penherbit Suara Muhammadiyah, 2017 Hak cipta dilindungi undang-undang ISBN: 000-000-0000-00-0 iv PENGANTAR PENULIS KATA PENGANTAR BUKU berjudul “Politik Perda Syariat: Dialektika Islam dan Pancasila di Indonesia” yang ada di tangan pembaca ini pada mu­ lanya merupakan karya Disertasi dengan judul: “Islam dan Negara: Studi Kasus Perumusan, Perdebatan, dan Kontroversi serta Peran Politik Muhammadiyah dan NU dalam Proses Pembuatan Perda 12 Tahun 2009 Kota Tasikmalaya.” Karena isinya dirasa penting untuk dipublikasikan, maka saya merasa perlu untuk menerbitkannya dalam bentuk buku, tentu setelah membuang beberapa isi Disertasi yang dirasa tidak perlu untuk terbitan sebuah buku. Buku ini mengangkat tema besar tentang Perda Syariat dan juga peran Muhammadiyah dan NU dalam proses pembuatan Perda Sya riat.
    [Show full text]
  • IN THIS ISSUE: Briefs
    VOLUME IX, ISSUE 32 uAUGUST 12, 2011 IN THIS ISSUE: BRIEFS..................................................................................................................................1 SOMALIA’S FAMINE CONTRIBUTES TO POPULAR REVOLT AGAINST AL-SHABAAB MILITANTS By Muhaydin Ahmed Roble ......................................................................................3 INDONESIA’S “GHOST BIRDS” TACKLE ISLAMIST TERRORISTS: A PROFILE OF Armed tribesmen work- DENSUS-88 ing with Yemeni Army By Jacob Zenn .........................................................................................................5 THE BATTLE OF ZINJIBAR: THE TRIBES OF YEMEN’S ABYAN GOVERNORATE JOIN Terrorism Monitor is a publication THE FIGHT AGAINST ISLAMIST MILITANCY of The Jamestown Foundation. By Andrew McGregor ..............................................................................................7 The Terrorism Monitor is designed to be read by policy- makers and other specialists QADDAFI ALLY ROBERT MUGABE CALLS NATO “TERRORISTS,” yet be accessible to the general public. The opinions expressed THREATENS TO EXPROPRIATE WESTERN FIRMS IN ZIMBABWE within are solely those of the authors and do not necessarily Mu’ammar Qaddafi’s policy of using Libya’s oil wealth to build stronger ties reflect those of The Jamestown with sub-Saharan African nations through financial aid, investment and arms Foundation. supplies has resulted in a distinct lack of support in many of these nations for NATO’s military intervention in the Libyan rebellion. Among the most Unauthorized reproduction or vociferous of Qaddafi’s supporters has been the long-time ruler of Zimbabwe, redistribution of this or any Robert Mugabe. Zimbabwe has been frequently mentioned as a possible place Jamestown publication is strictly of exile for the Libyan leader and there were rumors earlier this year that prohibited by law. Zimbabwean troops had been sent to Libya, rumors that gained strength within Zimbabwe after the nation’s defense minister declined to issue a straightforward denial (Zimbabwean, February 25).
    [Show full text]
  • Jemaah Islamiyah (JI)
    Jemaah Islamiyah (JI) Name: Jemaah Islamiyah (JI) Type of Organization: Insurgent non-state actor religious terrorist transnational violent Ideologies and Affiliations: Islamist jihadist Qutbist Salafist Sunni takfiri Place of Origin: Indonesia Year of Origin: 1993 (formal establishment) Founder(s): Abu Bakar Bashir and Abdullah Sungkar Places of Operation: Indonesia (primary operations); Malaysia and Singapore (cells); the Philippines, Cambodia, and Thailand (possible operations) Overview As Known As: • Islamic Organization1 • Jema’a Islamiyyah7 • Jemaa Islamiyah2 • Jemaah Islamiah8 • Jema’a Islamiyah3 • Jemaah Islamiya9 • Jemaa Islamiyya4 • Jema’ah Islamiyah10 • Jema’a Islamiyya5 • Jemaah Islamiyyah11 • Jemaa Islamiyyah6 • Jema’ah Islamiyyah12 Executive Summary: Jemaah Islamiyah (JI) is a jihadist group in Southeast Asia that seeks to establish a caliphate in the region through violent means. The group is led by its co-founder, Abu Bakar Bashir, who pledged loyalty to ISIS in July 2014. JI first raised its global profile after carrying out bombings in Bali in 2002 and 2005, killing 202 and 20 people (mostly foreign tourists), respectively.13 Among other violent operations, JI is known for its links to the 1993 World Trade Center bombing as well as the 1995 failed “Bojinka” plot, an attempt to bomb 12 U.S. commercial airlines in the span of two days.14 JI has links to al- Qaeda and the Abu Sayyaf Group (ASG), a Philippines-based terrorist organization.15 1 Jemaah Islamiyah (JI) Analyst J.M. Berger has stated that JI is defunct.16 Nevertheless, the group remains a threat given its extensive network and ties to both ISIS and the Nusra Front. Australian authorities in particular have expressed concern about JI foreign fighters returning to the region.
    [Show full text]