Terrorism in the Indo-Pacific: the Year Gone by and the Road Ahead
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
ISIS Propaganda and United States Countermeasures
BearWorks MSU Graduate Theses Fall 2015 ISIS Propaganda and United States Countermeasures Daniel Lincoln Stevens As with any intellectual project, the content and views expressed in this thesis may be considered objectionable by some readers. However, this student-scholar’s work has been judged to have academic value by the student’s thesis committee members trained in the discipline. The content and views expressed in this thesis are those of the student-scholar and are not endorsed by Missouri State University, its Graduate College, or its employees. Follow this and additional works at: https://bearworks.missouristate.edu/theses Part of the Defense and Security Studies Commons Recommended Citation Stevens, Daniel Lincoln, "ISIS Propaganda and United States Countermeasures" (2015). MSU Graduate Theses. 1503. https://bearworks.missouristate.edu/theses/1503 This article or document was made available through BearWorks, the institutional repository of Missouri State University. The work contained in it may be protected by copyright and require permission of the copyright holder for reuse or redistribution. For more information, please contact [email protected]. ISIS PROPAGANDA AND UNITED STATES COUNTERMEASURES A Masters Thesis Presented to The Graduate College of Missouri State University In Partial Fulfillment Of the Requirements for the Degree Master of Science, Defense and Strategic Studies By Daniel Stevens December 2015 Copyright 2015 by Daniel Lincoln Stevens ii ISIS PROPAGANDA AND UNITED STATES COUNTERMEASURES Defense and Strategic studies Missouri State University, December 2015 Master of Science Daniel Stevens ABSTRACT The purpose of this study is threefold: 1. Examine the use of propaganda by the Islamic State in Iraq and al Sham (ISIS) and how its propaganda enables ISIS to achieve its objectives; 2. -
The Maute Group: New Vanguard of IS in Southeast Asia?
www.rsis.edu.sg No. 107 – 31 May 2017 RSIS Commentary is a platform to provide timely and, where appropriate, policy-relevant commentary and analysis of topical issues and contemporary developments. The views of the authors are their own and do not represent the official position of the S. Rajaratnam School of International Studies, NTU. These commentaries may be reproduced electronically or in print with prior permission from RSIS and due recognition to the author(s) and RSIS. Please email: [email protected] for feedback to the Editor RSIS Commentary, Yang Razali Kassim. The Maute Group: New Vanguard of IS in Southeast Asia? By Joseph Franco Synopsis Skirmishes in the southern Philippine city of Marawi highlight the emergence of the Maute Group (MG) as a potential new magnet for other IS-inspired militants in Mindanao. Manila must act swiftly to contain and defeat IS-inspired militants in central Mindanao lest a protracted conflict increases Mindanao’s attractiveness as a hub for foreign terrorist fighters. Commentary ON 23 MAY 2017, security forces attempted to arrest Isnilon Hapilon who was allegedly recovering from injuries sustained in a previous battle with the Philippine military. Hapilon was recognised by Dabiq, the online magazine of Islamic State (IS), as the “emir” or leader of an Islamic State “division” since October 2014 but stopped short of designating him as a “wali” (governor) of a wilayah (province). What was intended as a short raid degenerated into a series of skirmishes in the city centre. Fighters from the MG, Isnilon’s Abu Sayyaf Group (ASG) faction, and other armed gangs coalesced into an ad hoc combat unit to resist the Philippine security forces. -
Counter Terrorist Trends and Analysis Volume 6, Issue 1 Jan/Feb 2014
Counter Terrorist Trends and Analysis Volume 6, Issue 1 Jan/Feb 2014 Annual Threat Assessment SOUTHEAST ASIA Myanmar, Thailand, Indonesia, Philippines, Malaysia and Singapore SOUTH ASIA Afghanistan, Pakistan, India, Bangladesh and Sri Lanka EAST AND CENTRAL ASIA China and Central Asia MIDDLE EAST AND AFRICA Syria, Iraq, Yemen, Egypt, Libya and Somalia INTERNATIONAL CENTER FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH S. RAJARATNAM SCHOOL OF INTERNATIONAL STUDIES NANYANG TECHNOLOGICAL UNIVERSITY 2 ANNUAL THREAT ASSESSMENT Terrorism and Political Violence in 2013 Southeast Asia peace talks were held in January 2014. Iraq, too, remains besieged by sectarian violence and constant attacks. In Yemen, Southeast Asia has seen some of its insurgencies and conflicts multiple insurgencies and a robust threat from Al Qaeda in the diminish while others have continued unabated. In Thailand, the Arabian Peninsula have hampered an already difficult political restive south continued to see violence in 2013 while Bangkok transition. In Egypt, Morsi’s ouster has seen protests continuing witnessed a political crisis with protests against the government to plague the country while the military attempts another turning violent. In Myanmar, reforms have moved forward but political transition. Libya, meanwhile, faces a persistent security communal violence continues to plague the country and has challenge in its southern border region and the success of its evolved from targeting Rohingyas towards Muslim minority transition after Gaddafi will depend on the militias which communities in general. Indonesia continues to face a potent deposed the former dictator giving up their arms. In Somalia, threat from radicalization and concern has emerged over the al-Shabaab has intensified its campaign against the role its “hard” counterterrorist approach is playing in fueling government in the wake of a hardline faction emerging further extremism. -
De-Radicalization Program in Indonesian Prisons: Reformation on the Correctional Institution
Edith Cowan University Research Online Australian Counter Terrorism Conference Conferences, Symposia and Campus Events 1-1-2011 De-radicalization program in Indonesian prisons: Reformation on the correctional institution Milda Istiqomah University of Brawijaya, Indonesia Follow this and additional works at: https://ro.ecu.edu.au/act Part of the Social Control, Law, Crime, and Deviance Commons DOI: 10.4225/75/57a4200e2b5a3 1st Australian Counter Terrorism Conference, Edith Cowan University, Perth Western Australia, 5th - 7th December, 2011 This Conference Proceeding is posted at Research Online. https://ro.ecu.edu.au/act/13 DE-RADICALIZATION PROGRAM IN INDONESIAN PRISONS: REFORMATION ON THE CORRECTIONAL INSTITUTION Milda Istiqomah University of Brawijaya Malang, East Java, Indonesia [email protected] Abstract De-radicalization program has long been the subject of investigation. There is a steadily growing interest in examining the positive results on how Islamist terrorists agree to abandon violence and leave radicalism. Despite their attractiveness, it is widely accepted that de-radicalization program on terrorism in many countries is still questionable for its effectiveness. This article presents an overview of the de-radicalization program run by Indonesian prisons and investigates critical issues surrounding the analysis of their effectiveness and outcomes. This paper argues that Indonesian prisons and especially its correctional system need to be reformed in order to achieve a successful result of de-radicalization program in the fight against terrorism. Keywords De-radicalization, correctional institution, terrorist prisoners, Indonesia prison INTRODUCTION In the immediate aftermath of Bali Bombing in 2002, Indonesian citizens discovered to their fear that their country was perceived as a part of global terrorist network with links to Al-Qaeda. -
Course Syllabus Georgetownx
TERRORISM AND COUNTERTERRORISM SEPTEMBER 24, 2015 – DECEMBER 2, 2015 Course Syllabus GeorgetownX August 31, 2015 GeorgetownX: Terrorism and Counterterrorism SEPTEMBER 24, 2015 – DECEMBER 2, 2015 TABLE OF CONTENTS Core Faculty ............................................................................................................................................................ 2 Interviews ............................................................................................................................................................... 4 Faculty Support Team ............................................................................................................................................. 4 What is the course about? ..................................................................................................................................... 5 Key Questions .................................................................................................................................................... 5 What does the course include? .............................................................................................................................. 5 Course Section Outline ....................................................................................................................................... 6 What will I learn in the course? .............................................................................................................................. 8 What should we expect from each -
Counter-Insurgency Vs. Counter-Terrorism in Mindanao
THE PHILIPPINES: COUNTER-INSURGENCY VS. COUNTER-TERRORISM IN MINDANAO Asia Report N°152 – 14 May 2008 TABLE OF CONTENTS EXECUTIVE SUMMARY AND RECOMMENDATIONS................................................. i I. INTRODUCTION .......................................................................................................... 1 II. ISLANDS, FACTIONS AND ALLIANCES ................................................................ 3 III. AHJAG: A MECHANISM THAT WORKED .......................................................... 10 IV. BALIKATAN AND OPLAN ULTIMATUM............................................................. 12 A. EARLY SUCCESSES..............................................................................................................12 B. BREAKDOWN ......................................................................................................................14 C. THE APRIL WAR .................................................................................................................15 V. COLLUSION AND COOPERATION ....................................................................... 16 A. THE AL-BARKA INCIDENT: JUNE 2007................................................................................17 B. THE IPIL INCIDENT: FEBRUARY 2008 ..................................................................................18 C. THE MANY DEATHS OF DULMATIN......................................................................................18 D. THE GEOGRAPHICAL REACH OF TERRORISM IN MINDANAO ................................................19 -
The East Turkistan Islamic Party (E.T.I.P.) University Honors Capstone, Spring 2014
The East Turkistan Islamic Party (E.T.I.P.) University Honors Capstone, Spring 2014 Author: Kathryn Appelman Advisor: Tricia Bacon, JLC This study investigates the motives, history, leadership, impact, and future of the East Turkistan Islamic Party (E.T.I.P.), a little-studied ethno-nationalist separatist terrorist organization in China’s Xinjiang province. Basing findings on existing literature, original Chinese news reports and press releases, and firsthand interviews with experts, it concludes that while E.T.I.P.-proper does not pose a significant threat to U.S. national security, issues surrounding it present significant foreign policy problems vis à vis China and the human rights community. However, ETIP members in Pakistan are likely cooperating with known enemies of the United States, and the United States should continue its CT efforts against them without infringing on China’s sovereignty. The East Turkistan Islamic Party (E.T.I.P.) I. Overview and Literature Review ETIP, or the East Turkistan Islamic Party, is a religious ethno-nationalist terrorist organization, made up of Uighur separatists who aim to establish a fundamentalist Islamic state in the West Chinese province of Xinjiang. In the United States, it is known largely for its connection to Al Qaeda, its threats against the 2008 Beijing Olympics, and its members detained in Guantanamo Bay. However, in China, ETIP is considered a serious threat to the internal security of the country. The study of active terrorist groups will always be a murky subject, but ETIP takes “murky” to a new level. Members of ETIP are Uighur Muslims; however, much further information, such as education level, structure, or community support, even the size of the organization, is tightly guarded by the PRC. -
Individuals and Organisations
Designated individuals and organisations Listed below are all individuals and organisations currently designated in New Zealand as terrorist entities under the provisions of the Terrorism Suppression Act 2002. It includes those listed with the United Nations (UN), pursuant to relevant Security Council Resolutions, at the time of the enactment of the Terrorism Suppression Act 2002 and which were automatically designated as terrorist entities within New Zealand by virtue of the Acts transitional provisions, and those subsequently added by virtue of Section 22 of the Act. The list currently comprises 7 parts: 1. A list of individuals belonging to or associated with the Taliban By family name: • A • B,C,D,E • F, G, H, I, J • K, L • M • N, O, P, Q • R, S • T, U, V • W, X, Y, Z 2. A list of organisations belonging to or associated with the Taliban 3. A list of individuals belonging to or associated with ISIL (Daesh) and Al-Qaida By family name: • A • B • C, D, E • F, G, H • I, J, K, L • M, N, O, P • Q, R, S, T • U, V, W, X, Y, Z 4. A list of organisations belonging to or associated with ISIL (Daesh) and Al-Qaida 5. A list of entities where the designations have been deleted or consolidated • Individuals • Entities 6. A list of entities where the designation is pursuant to UNSCR 1373 1 7. A list of entities where the designation was pursuant to UNSCR 1373 but has since expired or been revoked Several identifiers are used throughout to categorise the information provided. -
Is China Prepared for Global Terrorism? Xinjiang and Beyond
IS CHINA PREPARED FOR GLOBAL TERRORISM? XINJIANG AND BEYOND DANIEL L. BYMAN AND ISRAA SABER SEPTEMBER 2019 EXECUTIVE SUMMARY While China has never been a particularly strong counterterrorism partner for the United States, recent China has long faced low-level violence from the East tensions in trade and rhetoric make cooperation Turkestan Islamic Movement (ETIM), which seeks an especially unlikely in the near to medium term. independent Xinjiang. To counter the ETIM and other Differences in approaches to technology usage separatist Uighurs, the Chinese Communist Party and oversight and criticisms of China’s human (CCP) has passed laws regulating, and in some cases rights violations have added to the tension. restricting, expressions of Islamic and Turkic identity. Though, superficially, the United States and other Such levels of control have been used elsewhere in liberal democracies are still setting the global China where the CCP has felt threatened by separatist counterterrorism agenda, China has found opportunity movements. Since the 2014 “Strike Hard” campaign, to independently strengthen ties with states facing China’s crackdown in Xinjiang has escalated to terrorism threats. If China moves towards taking a include internment camps, forced labor, and daily leadership role in countering terrorism and its policies indoctrination programs. The CCP has also made great become the future standard, counterterrorism could use of technological advancements to surveil Xinjiang become an additional area of contention between residents. Besides surveillance cameras equipped Beijing and Washington. with facial recognition, the government also collects information such as biometric data, data usage, and location. This sweeping approach is used to combat INTRODUCTION what China considers to be a serious terrorism threat. -
Extremism & Counter-Extremism Overview Radicalization And
The Philippines: Extremism & Counter-Extremism On January 27, 2019, two bombs detonated during Sunday mass at the Our Lady of Mount Carmel Cathedral on Jolo island in the southern Philippines province of Sulu. The first explosion occurred inside the cathedral, which was followed by a second blast just outside as soldiers rushed to the scene. At least 23 people were killed and more than 100 others were wounded. ISIS claimed responsibility for the attack. In July, Indonesian police revealed the attack was carried out by a married Indonesian couple who attempted to travel to ISIS territory in 2016. The couple was stopped in Turkey and deported back to Indonesia in January 2017. It is the first known suicide bombing carried out by Indonesian deportees. (Sources: CBS News [1], CNN Philippines [2], BBC News [3], Guardian [4], New Yok Times [5]) On June 28, 2019, two suicide attackers bombed a temporary camp of the Philippine army’s counterterrorism unit in Sulu. The attack killed five soldiers and wounded several others. ISIS promptly claimed responsibility attack, though a police official maintained that the attack was locally-planned and carried out by Abu Sayyaf Group (ASG) militants. In July 2019, DNA tests confirmed the identity of one of the attackers as Sulu-born 23-year-old Norman Lasuca, making him the first known Filipino to carry out a suicide bombing. (Sources: Straits Times [6], Associated Press [7]) Overview Both Communist nationalist rebels and Islamic separatist insurgencies have wreaked havoc on the Philippines, especially on the southern island of Mindanao. As a result, several thousands of Filipinos have been murdered in bombings, assassinations, kidnapping attempts, and executions. -
Bibliography: Boko Haram
PERSPECTIVES ON TERRORISM Volume 13, Issue 3 Bibliography: Boko Haram Compiled and selected by Judith Tinnes [Bibliographic Series of Perspectives on Terrorism – BSPT-JT-2019-5] Abstract This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliog- raphies and other resources on the Nigerian terrorist group Boko Haram. While focusing on recent literature, the bibliography is not restricted to a particular time period and covers publications up to May 2019. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Stud- ies. Additionally, full-text and reference retrieval systems have been employed to broaden the search. Keywords: bibliography, resources, literature, Boko Haram, Islamic State West Africa Province, ISWAP, Abu- bakar Shekau, Abu Musab al-Barnawi, Nigeria, Lake Chad region NB: All websites were last visited on 18.05.2019. - See also Note for the Reader at the end of this literature list. Bibliographies and other Resources Benkirane, Reda et al. (2015-): Radicalisation, violence et (in)sécurité au Sahel. URL: https://sahelradical.hy- potheses.org Bokostan (2013, February-): @BokoWatch. URL: https://twitter.com/BokoWatch Campbell, John (2019, March 1-): Nigeria Security Tracker. URL: https://www.cfr.org/nigeria/nigeria-securi- ty-tracker/p29483 Counter Extremism Project (CEP) (n.d.-): Boko Haram. (Report). URL: https://www.counterextremism.com/ threat/boko-haram Elden, Stuart (2014, June): Boko Haram – An Annotated Bibliography. Progressive Geographies. URL: https:// progressivegeographies.com/resources/boko-haram-an-annotated-bibliography Hoffendahl, Christine (2014, December): Auf der Suche nach einer Strategie gegen Boko Haram. [In search for a strategy against Boko Haram]. -
'Battle of Marawi': Death and Destruction in the Philippines
‘THE BATTLE OF MARAWI’ DEATH AND DESTRUCTION IN THE PHILIPPINES Amnesty International is a global movement of more than 7 million people who campaign for a world where human rights are enjoyed by all. Our vision is for every person to enjoy all the rights enshrined in the Universal Declaration of Human Rights and other international human rights standards. We are independent of any government, political ideology, economic interest or religion and are funded mainly by our membership and public donations. © Amnesty International 2017 Except where otherwise noted, content in this document is licensed under a Creative Commons Cover photo: Military trucks drive past destroyed buildings and a mosque in what was the main battle (attribution, non-commercial, no derivatives, international 4.0) licence. area in Marawi, 25 October 2017, days after the government declared fighting over. https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode © Ted Aljibe/AFP/Getty Images For more information please visit the permissions page on our website: www.amnesty.org Where material is attributed to a copyright owner other than Amnesty International this material is not subject to the Creative Commons licence. First published in 2017 by Amnesty International Ltd Peter Benenson House, 1 Easton Street London WC1X 0DW, UK Index: ASA 35/7427/2017 Original language: English amnesty.org CONTENTS MAP 4 1. INTRODUCTION 5 2. METHODOLOGY 10 3. BACKGROUND 11 4. UNLAWFUL KILLINGS BY MILITANTS 13 5. HOSTAGE-TAKING BY MILITANTS 16 6. ILL-TREATMENT BY GOVERNMENT FORCES 18 7. ‘TRAPPED’ CIVILIANS 21 8. LOOTING BY ALL PARTIES TO THE CONFLICT 23 9.