CENS – GFF Cyber-Security Workshop: Towards a Secure and Resilient Cyberspace

Total Page:16

File Type:pdf, Size:1020Kb

CENS – GFF Cyber-Security Workshop: Towards a Secure and Resilient Cyberspace CENS – GFF Cyber-Security Workshop: Towards a Secure and Resilient Cyberspace 12–13 JULY 2010 MARINA MANDARIN HOTEL SINGAPORE REPORT ON THE WORKSHOP JOINTLY ORGANIZED BY THE CENTRE OF EXCELLENCE FOR NATIONAL SECURITY (SINGAPORE) AND THE GLOBAL FUTURES FORUM (INTERNATIONAL) WITH THE SUPPORT OF THE NATIONAL SECURITY COORDINATION SECRETARIAT (SINGAPORE) Contents Page Executive Summary 3 Welcome Dinner Speech 5 Welcome Remarks 6 Welcome Address 7 Keynote Presentation 8 Panel 1: Overview of Cyber Threats 9 Panel 2: Technological and Legal Tools 12 Panel 3: Implications for Homeland Security 16 Panel 4: Cyber-Security from a “Real World” Perspective 19 Panel 5: Cyber-Threat Mitigation Strategies & Policy Implications 24 Panel 6: Roundtable Discussion: Policy Takeaways & the Way Forward 27 Rapporteurs: Jenna Park, Clinton Lorimore, Yeap Su Yin, Yolanda Chin and Ng Sue Chia Edited by: Ng Sue Chia This report summarizes the proceedings of the conference as interpreted by the assigned rapporteurs and editor of the S. Rajaratnam School of International Studies. Participants neither reviewed nor approved this report. The conference adheres to a variation of the Chatham House rules. Accordingly, beyond the points expressed in the prepared papers, no attributions have been included in this conference report. EXETI CU VE SUMMARY Online terrorist communication has driven concerns that anticipation of current and impeding cyber-security threats. violent extremist groups/individuals have advanced from Similarly, the need for a whole-of-society approach towards disseminating propaganda on the Web to conducting cyber-security was underscored by Mr. Peter Ho, Head multi-level outreach activities and possibly planning of the Singapore Civil Service and Permanent Secretary cyber-based attacks on par with real-life wars. While for National Security and Intelligence Coordination, in his the threat of cyber-terrorism seems impending, it also welcome address. highlights a range of potential cyber-threats to national security that needs to be addressed fairly quickly. They The implications that cyber-security breaches have on range from online financial fraud to the pilferage of national security are broad and far-reaching. Indeed, personal identities and state information by criminals and Ruth David highlighted that a key challenge to state-backed hackers. cyber-security is perhaps in the development of counter-attack strategies that would be followed through Recent Botnets, or Internet Robots, attacks have illustrated by governments, corporations and private Web-users alike. the ease at which cyber-attacks can be conducted. A Given the dependency on Web-based technologies for network of computers could be infected and, thereby, daily operations and day-to-day chores, states, corporations setting off a domino chain of database and systems crashes and individuals are inevitably affected when a seemingly without the need for a highly skilled computer engineer to remote network or database crashes whether as a result of carry out the attack. The mainstreaming and incorporation an unintentional technological fault or a deliberate attack. of advance communication technologies into such devices as smart phones and game consoles has drastically changed It is generally agreed that to counter cyber-threats, there the way information is owned, exchanged and modified. needs to be collaboration among all sectors of a society Anyone with a Wifi-enabled phone, for instance, is capable and between states. It may sound Cliché, but, the threat of transmitting information to the cyber-community and certainly lies in the borderless and virulent nature of cyber- altering public perception. attacks of any sort. As such, cooperation and collaboration are imperatives to outwitting, outlasting and outlawing the As such, the Centre of Excellence for National Security perpetrators and malwares per se. Against this backdrop (CENS), a research unity of the S. Rajaratnam School of the Honourable John Grimes and John Savage stressed, International Studies, and the Global Futures Forum (GFF), over and above other recommendations, the importance with the support of the National Security Coordination of information sharing and international partnerships in Secretariat (NSCS), part of the Prime Minister’s Office, moving ahead of our adversaries. Singapore, jointly organized a two-day workshop (12–13 July 2010) on “Cyber-Security: Secure and Resilient David Auscmith, on the other hand, opined that Cyberspace” to deliberate on ways to counter current and cyber-defence is only as effective as our existing intelligence emerging cyber-threats from a whole-of-society approach. or knowledge of the threat allows it to be. Similarly, The workshop was held at the Marina Mandarin Hotel, Alexander Lim articulated the Interpol’s preference to Singapore, and was well attended by a multi-disciplinary train law-enforcement personnel to better understand cast of research analysts, technologists and national the uses of existing tools over random investments into security officers. technologies that may not add to existing intelligence over the current threat scenario. Anthony Lim also added that The workshop commenced with a welcome dinner lecture applications cannot be expected to “defend themselves”. It (11 July 2010) by Sheila Ronis where participants of the was asserted that the best way to prevent an application workshop gained an overview of the challenges to national attack is to ensure that the gap between software design and security. She noted in particular that a synthesized approach information security is bridged. Moreover, Tyson Macaulay that combines foresight tools, hyper-accelerated learning also argued that most anti-virus software is no more than and integrated government decision-making processes 60 per cent effective at detecting and removing novel pieces are the pre-requisites to the successful countering and of malware. He argued that it is only through information 3 C- ENS GFF CYBER-SECURITY WORKSHOP sharing and gathering from multiple sources, that Interdependency (CII) relationships. A shut down in one cyber-resilience could be built. component of a critical infrastructure, he emphasized, could bring about major disruptions to systems. As such, Applications security aside, Lori Lessner spoke on Manabu Nabeshima mentioned that the incorporation violent extremists’ presence and their modus operandi of CII analysis would not only give policymakers a fuller in the cyber-sphere. In particular, it was highlighted that picture of the impact of a critical infrastructure shutdown violent extremists are switching from the traditional but also offer them a range of possible scenarios. As for “call to prayer” Web-postings to the creative usage and Japan, existing policies and measures undertaken in the uploading of rap videos online to appeal to a resentful and field of information security aims to perpetuate the tradition “online” youth group. On the same theme, Sarah Womer of public-private sector cooperation. It was argued that shared with participants how a closer examination of the as what is being protected belongs to the private sector, “online enemy” and their activities in the cyber-sphere Japan’s information security policies have been designed could provide vital indications of impeding real-life plots. to allow room for the society to take appropriate measures In the Philippines’ context, Nicolas Ojeda argued that a to secure their own information networks and systems. general lack of understanding by key government and private stakeholders over the seriousness and impact of As a final roundup of ideas and suggestions put forth during both current and emerging cyber-threats have thus far the discussion panels and syndicate sessions, the workshop impeded any improvements in countering, for instance, closed with a roundtable discussion on the immediate the Abu Sayyaf Group’s communication with the world actions to take. It was generally agreed that: through new media technologies. 1. A legal framework needs to be established. As current Similarly concerned with cross-sector cooperation and the responses to threats tend to be reactive, expertise dual functions of Web-based communication technologies, can be better consolidated when a legal framework is the finance and telecommunication sectors face a dilemma in place; of securing their networks and making their services as 2. An operational definition of “cyberspace” would reduce accessible to public usage as possible. Gunawan Husin conceptual ambiguity and allow for workable solutions added that the financial sector, being the first line of to be devised. However, this should not be at the defence, is under tremendous pressure to counter the expense of developing high impact solutions; possible abuse of online financial services and products 3. There needs to be a holistic approach towards for criminal and terrorism purposes. There is also the cyber-security. To this end, three areas for development difficulty in getting financial institutions based in different were identified. The first was the need for robust jurisdictions to conduct regular checks on suspicious technology to protect information assets, namely financial acts. In India’s case, Srijith Nair mentioned that through the development of secure applications. despite the new cyber-security measures in place, a The second was securing the expertise to develop well-thought-out and cohesive cyber-strategy is still and manage the systems in place which requires lacking.
Recommended publications
  • Propectus2016.Pdf
    /&(175()2 1$ 5 ,2 &2 * 8 ( 1 5 7 ,$ ( 6 5 $ 7 7 ( 6 5 $ 5 ( 2 + 5 7 , 6 8 0 2 ($5&&7 6 0 ,1 ,$ , 6 6 < 75 $ < $/ 2 0 )) 56 25(,*1$))$, The Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT) Ministry of Foreign Affairs Published by: Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT) Ministry of Foreign Affairs, Malaysia No. 516, Persiaran Tuanku Ja’afar, Bukit Persekutuan 50480 Kuala Lumpur Malaysia Tel : +603 2261 1900 Fax : +603 2274 9487 www.searcct.gov.my Copyright 2016 Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT) All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without the prior permission of the copyright holder. ISSN: 1985-093X The Honourable Dato’ Sri Anifah bin Haji Aman Minister of Foreign Affairs, Malaysia The Honourable Dato’ Seri Reezal Merican bin Naina Merican Deputy Minister of Foreign Affairs, Malaysia Datuk Othman bin Hashim Secretary General Ministry of Foreign Affairs CONTENTS INTRODUCTION About SEARCCT 2 Vision, Mission Statement, Objectives and Focus of Activities 3 Facilities 4 THE HEART OF SEARCCT 5 TRAINING PROGRAMMES FOR 2016 11 PROGRAMMES HELD IN 2015 43 EVENT HIGHLIGHTS 51 PUBLICATIONS 55 PROSPECTUS 2015 1 SEARCCT - Ministry of Foreign Affairs, Malaysia About SEARCCT The Southeast Asia Regional Centre for Counter Terrorism (SEARCCT) was officially launched on 1 July 2003 by the then Minister of Foreign Affairs, Malaysia, the Honourable Dato’ Seri Syed Hamid Albar.
    [Show full text]
  • House Testimony May 2017
    Trends in Terrorism in Southeast Asia Testimony to the House Foreign Affairs Committee Sub-Committee on the Asia-Pacific Dr. Zachary Abuza National War College 17 May 2017 DISCLAIMER The views expressed here are the author’s personal opinions, and do not reflect the views or policies of the US Department of Defense, the National Defense University, or the National War College. 1. Trends in Terrorism Southeast Asia is home to over a dozen armed Islamist groups that seek to overthrow their governments or secede. Most are small and very localized. At times they have tried to link up to transnational organizations. But most Southeast Asian groups tend to be very localized and with limited resources. They also tend to be highly fractious and fluid, with allegiances within groups and between them changing frequently. That said, they remain consistently lethal, despite concerted government efforts to disrupt them. In the mid-1990s, a network of radical Salafists, known as Jemaah Islamiyah (JI) pledged bai’at to Al Qaeda. But they did not engage in attacks against Western targets until 2002. Previously, they served as a back office for Al Qaeda and were largely engaged in sectarian conflicts in Indonesia, in which some 6,000 people were killed. After the October 2002 attack in Bali, JI was able to perpetrate one major attack a year, more or less through 2009. But that point the group was weakened by arrests and hobbled by factionalism, between those who wanted to double down on the Al Qaeda line, and those who saw it as counterproductive and espoused a return to sectarian bloodletting.
    [Show full text]
  • ICCT Situation Report
    ICCT Situation Report The Use of Small Arms & Light Weapons by Terrorist Organisations as a Source of Finance in the South and Southeast Asia ICCT Report June 2020 DOI: 10.19165/2020.1.04 ISSN: 2468-0486 ICCT Situation Report: The Use of Small Arms & Light Weapons by Terrorist Organisations as a Source of Finance in South and Southeast Asia Authors: Méryl Demuynck, Tanya Mehra, & Reinier Bergema This situation report was produced within the framework of the Collaboration, Research & Analysis Against the Financing of Terrorism-project (CRAAFT). Funded by the European Union’s Internal Security Fund – Police, the project is being implemented by a Consortium led by RUSI Europe, along with the University of Amsterdam, Bratislava-based think tank GLOBSEC and the International Centre for Counter-Terrorism (ICCT), based in The Hague. Funded by the European Union ICCT Report Méryl Demuynck, Tanya Mehra, & Reinier Bergema Introduction As the current global security landscape is marked by the multiplication of intra-state conflicts, the rise of transnational organised crime, and the spread of violent extremism, the circulation of approximately one billion small arms and light weapons (SALW) 1 worldwide has become a major source of concern for international and state stakeholders.2 The United Nations Security Council has, in particular, repeatedly drawn global attention on the risk that “terrorists benefit from transnational organized crime in some regions, including from the trafficking of [SALW].”3 While arms trafficking is considered as one of the “most resilient factors of international organised crime that affect state security,” 4 weapons, including SALW, distinguish themselves from other illegally smuggled commodities in two important respects.
    [Show full text]
  • TERRORISM' ISSUES in INDONESIA- a STUDY of TWO MALAYSIAN MAINSTREAM NEWSPAPERS Dafrizal Samsudin, Faridah Ibrahim
    TEKNOLOGI MARA Centre For Media And Information Warfare Studies JOURNAL OF MEDIA AND INFORMATION WARFARE VOLUME 3 DECEMBER 2010 ISSN 1675-1302 ^oTTs^ pousi pousi p°L,si pousi ^^ POLISI POL UNDERSTANDING PROPAGANDA FROM THE PERSPECTIVE OF GENERAL SEMANTICS Mohd Rajib Ghani POL.S. POL.S. POL.S. POL.S. POLISI POLIS. POL.S. PO _ ISI POLISI POLISI POLISi OL.S. POL.SI POL.S. POLISI POLISI POLISI POL.S. P FRAMING OF TERRORISM' ISSUES IN INDONESIA- A STUDY OF TWO MALAYSIAN MAINSTREAM NEWSPAPERS Dafrizal Samsudin, Faridah Ibrahim |jgj S||j|j ™^I ?Ot-'S. POL.S, POL.S. POL.S. PQL.S. POL... p0Llsl POL.S. POL.S. PC P0U81 MPJS^SWI^ .— POLISI HULlbl P0LiSl POUSI POLISI POLIS Faridah Ibrahim POL.S. POLIS. POL.S, POL.S. POL.S, POUS, POUS. POL. —..«. POLISI POLISI POLIS POLISI POL.S. POL.S. POL.S. POL.S. POL.S. T' ^ DISSECTING CRIME NEWS: CAPTURING THE VALUE OF STORIES Sharon Wilson, Faridah Ibrahim LIS! POLISI POLISI POLIJ US. POUS. POL.S, PQL.S, P0LIS, P0LIS, pQL,s, pQ| ,„ ^ _ ..:,„ .•••• - ~* - ••- •-' -Tr^J" "" " POLISI POLSSI POLISI POLISI POL.SI POL.SI POL.SI POLISI POLISI POLISI POLISI POLISI POLISI POLISI P( FRAMING A PANDEMIC: ANALYSIS OF MALAYSIAN MAINSTREAM NEWSPAPERS IN THE H1N1 COVERAGE Chang Peng Kee, Faridah Ibrahim, Normah Musbaffa ""« ~* P0L,s, P0L1S, P0L1S, P0Lls, pous| pousi pousi pousi pousi _.._^ POLISI PO THE TECHNIQUES OF POLITICAL AGENDA SETTING BY BLnrrpoo. & A LOOK AT CHE' DET.COM AND RAJA PETRA SSSSJK ILOGS Mazril Hameedy Mazlan, Mariah Muda g.^^^,^ POLISI POLISI POLISI POLISI POLIS! POLISI POLISI POLISI POLISI POLISI POLISI POLIS.
    [Show full text]
  • Terrorism in Southeast Asia
    Terrorism in Southeast Asia name redacted Specialist in Asian Affairs name redacted Specialist in Asian Affairs name redacte d Specialist in Asian Affairs name r edacted Specialist in Asian Affairs name redacted Analyst in Asian Affairs name redacted Specialist in Terrorism and National Security May 12, 2016 Congressional Research Service 7-.... www.crs.gov R44501 Terrorism in Southeast Asia Summary Southeast Asia is home to more than 620 million people and around 15% of the world’s Muslim population. The region has faced the threat of terrorism for decades, but threats in Southeast Asia have never been considered as great as threats in some other regions. The rise of the Islamic State, however, poses new, heightened challenges for Southeast Asian governments, and for U.S. policy towards the vibrant and strategically important region. Southeast Asia has numerous dynamic economies and three Muslim-majority states, including the world’s largest Muslim-majority nation, Indonesia, which also is the world’s third largest democracy (by population) after India and the United States, respectively. Although the mainstream of Islamic practice across the region is comparatively tolerant of other religions, Southeast Asia is also home to several longstanding and sometimes violent separatist movements, as well as pockets of Islamist radicalism, which have led to instances of violence over the past 30 years. These were particularly acute during the 2000s, when several attacks in Indonesia killed hundreds of Indonesians and dozens of Westerners. The threat seemingly eased in the late 2000s- early 2010s, with the success of some Southeast Asian governments’ efforts to combat violent militancy and degrade some of the region’s foremost terrorist groups.
    [Show full text]
  • Country Reports on Terrorism 2007
    Country Reports on Terrorism 2007 April 2008 ________________________________ United States Department of State Publication Office of the Coordinator for Counterterrorism Released April 2008 1 Country Reports on Terrorism 2007 is submitted in compliance with Title 22 of the United States Code, Section 2656f (the ―Act‖), which requires the Department of State to provide to Congress a full and complete annual report on terrorism for those countries and groups meeting the criteria of the Act. COUNTRY REPORTS ON TERRORISM 2007 Table of Contents Chapter 1. Strategic Assessment Chapter 2. Country Reports Africa Overview Trans-Sahara Counterterrorism Partnership The African Union Angola Botswana Burkina Faso Burundi Comoros Cote D‘Ivoire Djibouti Eritrea Ethiopia Kenya Liberia Madagascar Mali Mauritania Nigeria Rwanda Senegal Somalia South Africa Tanzania Uganda Zambia Zimbabwe East Asia and Pacific Overview Australia Burma Cambodia China o Hong Kong 2 o Macau Indonesia Japan Republic of Korea Laos Malaysia Mongolia New Zealand Philippines Singapore Taiwan Thailand Europe Overview Albania Armenia Austria Azerbaijan Belgium Bosnia and Herzegovina Bulgaria Croatia Cyprus Czech Republic Denmark Estonia Finland France Georgia Germany Greece Hungary Iceland Ireland Italy Kosovo Latvia Lithuania Macedonia Malta Moldova The Netherlands Norway Poland Portugal Romania 3 Russia Serbia Slovakia Slovenia Spain Sweden Switzerland Turkey Ukraine United Kingdom o Northern Ireland Middle East and North Africa Overview Algeria Bahrain Egypt Iraq Israel, West Bank, and Gaza Jordan Kuwait Lebanon Libya Morocco Oman Qatar Saudi Arabia Tunisia United Arab Emirates Yemen South and Central Asia Overview Afghanistan Bangladesh India Kazakhstan Kyrgyzstan Nepal Pakistan Sri Lanka Tajikistan Turkmenistan Uzbekistan Western Hemisphere Overview Tri-Border Area Argentina 4 Belize Bolivia Brazil Canada Chile Colombia Dominican Republic Ecuador El Salvador Guatemala Honduras Mexico Nicaragua Panama Paraguay Peru Suriname Trinidad and Tobago Uruguay Venezuela Chapter 3.
    [Show full text]
  • Marawi: a Game Changer in Terrorism in Asia Rohan Gunaratna
    Counter Terrorist Trends and Analyses www.rsis.edu.sg ISSN 2382-6444 | Volume 9, Issue 7 | July 2017 A JOURNAL OF THE INTERNATIONAL CENTRE FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH Marawi: A Game Changer in Terrorism in Asia Rohan Gunaratna The Evolution of Online Extremism in Malaysia Nur Azlin Mohamed Yasin A Rebuttal of Al-Qaeda and IS’ Theological Justification of Suicide Bombing Muhammad Haniff Hassan Abrogation and the Verse of the Sword: Addressing Sunni Extremists’ Misappropriation of Concept and Verse Mahfuh Halimi Counter Terrorist Trends and Analyses Volume 9, Issue 4 | April 2017 1 Building a Global Network for Security Editorial Note IS Ingress in Southeast Asia As the Islamic State (IS) terrorist group evolves keep the security challenge posed by IS in into the next phase of its life cycle, it is check, more needs to be done in places like the operationalising its so-called wilayats Philippines and Thailand with coordinated (governorates) in different parts of the world. In operational efforts and timely intelligence June, with the loss of ground in Iraq and Syria, sharing. IS has made significant territorial gains in the Philippines along with carrying out a high profile Third, IS online followers, supporters and terrorist attack in Indonesia. The operational sympathisers are now moving from open social strength and sophistication exhibited in these media platforms to encrypted ones such as latest developments in Southeast Asia is Telegram, Whatsapp and WeChat. This adds a concerning for three particular reasons. new layer of complexity to keep track of vulnerable segments of youth susceptible to First,W IS will stay alive and relevant through its radicalism and disrupt any terrorist plots that wilayats notwithstanding its defeat in the Middle may be planned and executed through East.
    [Show full text]
  • Preventing Terrorism : a Case Study of Malaysia Ahmad
    PREVENTING TERRORISM : A CASE STUDY OF MALAYSIA AHMAD NAZZAN BIN ABDULLAH UNIVERSITI SAINS MALAYSIA 2018 PREVENTING TERRORISM: A CASE STUDY OF MALAYSIA by AHMAD NAZZAN BIN ABDULLAH Thesis submitted in fulfillment of the requirements for the degree of Doctor of Philosophy March 2018 ACKNOWLEDGEMENT In the name of God, the most gracious, the most merciful, I would like to take this opportunity to express my gratitude to the All Mighty and to the great Prophet for his Sunnah, which have guided me all along. First of all, my heartfelt thanks to Tan Sri Dato’ Dzulkifli bin Abdul Razak, former Vice Chancellor of USM who paved the way for senior citizens like me to pursue higher education. He also approved my application for a rebate of the semester fees, without which I could not have continued my studies as a pensioner. My gratitude to Assoc. Prof Dr, Zainal Abidin and Assoc. Prof, Mohammad Zaini for their wonderful supervision. I would like to thank the Commissioner of Police, Dato’Mohammad Fauzi bin Harun, head of the Anti Terrorism Unit, Police DiRaja Malaysia, Bukit Aman, Kuala Lumpur, for his lengthy interview which gave me a clear insight into the workings of Counter Terrorism in Malaysia. Also my gratitude to ASP Mohd Rabi of Bukit Aman for much of the information on the deradicalization and rehabiltation programmes. My heartfelt thanks to Prof. Rohan Gunaratna of the Strategic Studies Unit, Nanyang Technological University of Singapore, Prof. Andrew Tan of the University of New South Wales, Sydney, Australia, Prof. Kumar Ramakrishna, Prof. Yang Razali Kassim, Prof.
    [Show full text]
  • Malaysia 2019 Crime & Safety Report
    Malaysia 2019 Crime & Safety Report This is an annual report produced in conjunction with the Regional Security Office at the U.S. Embassy in Kuala Lumpur, Malaysia. The current U.S. Department of State Travel Advisory at the date of this report’s publication assesses Malaysia at Level 1, indicating travelers should exercise normal precautions. Exercise increased caution in the eastern area of Sabah State due to crime and terrorism. Overall Crime and Safety Situation The U.S. Embassy in Kuala Lumpur does not assume responsibility for the professional ability or integrity of the persons or firms appearing in this report. The American Citizen Services (ACS) unit cannot recommend a particular individual or establishment, and assumes no responsibility for the quality of services provided. Review OSAC’s Malaysia page for original OSAC reporting, consular messages, and contact information, some of which may be available only to private-sector representatives with an OSAC password. Crime Threats There is considerable risk from crime in Kuala Lumpur. This includes around-the-clock street crime that occurs primarily in densely populated urban centers and affects locals and foreigners alike. The most common crimes include petty theft (particularly purse snatching and pickpocketing), smash-and-grab thefts from vehicles, and residential burglaries. Violent and more serious crimes are considerably less common. Other types of common non-violent criminal activity include credit card fraud, ATM-skimming, and cybercrime. Most purse snatching incidents involve thieves on motorcycles who stalk victims from behind before grabbing their purse, phone, or other valuables. Pedestrians distracted by their children or their mobile phones are also more vulnerable.
    [Show full text]
  • Malaysia Statement -- International Terrorism
    CANDIDATE to the MALAYSIA UNITED NATIONS SECURITY COUNCIL for the term 2015-2016 PERMANENT MISSION TO THE UNITED NATIONS (Please check against delivery) STATEMENT BY H.E. AMBASSADOR HUSSEIN HANIFF PERMANENT REPRESENTATIVE OF MALAYSIA TO THE UNITED NATIONS ON AGENDA ITEM 107 ENTITLED “MEASURES TO ELIMINATE INTERNATIONAL TERRORISM” AT THE SIXTH COMMITTEE OF THE SIXTY-NINTH SESSION OF THE UNITED NATIONS GENERAL ASSEMBLY NEW YORK, 7 OCTOBER 2014 Mr. Chairman, At the outset, allow me, on behalf of my delegation, to extend my heartfelt congratulations to you on your election as the Chairman of the Sixth Committee. I would also like to extend my congrat ulations to the other members of the Bureau. 2. My delegation would like to align its statement with that delivered by Iran on behalf of the Non-Aligned Movement (NAM), Egypt on behalf of the Organisation of Islamic Cooperation (OIC) and Lao People’s Democratic Republic on behalf of the Association of Southeast Asian Nations (ASEAN). 3. My delegation wishes to take this opportunity to thank the Secretary General for his report A/69/209 on “Measure to Eliminate International Terrorism”. The report indeed has provided all of us with the updates on measures being taken by Member States and international organisations in combating terrorism. Mr. Chairman, 4. Malaysia would like to express in the strongest term our condemnation of terrorism in all its forms and manif estations, as well as all acts, methods and practices of terrorism irrespective of where, when or 313 East 43rd Street Tel: (212) 986 6310 Email: [email protected] New York, NY 10017 Fax: (212) 490 8576 Website: www.un.int/malaysia whomever commits it and the reason behind it.
    [Show full text]
  • SEARCCT-Selection-Of-Articles-2020
    SEARCCT’S SELECTION OF ARTICLES 2020 Editor-in-Chief CHUAH TEONG BAN Managing Editor KHAIRI BIN OMAR Editorial Committee ZURINA AHMAD TEJUDDIN JASMINE JAWHAR SITI FATIMAH NURAIN MOHAMAD PUBLISHER Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT), Ministry of Foreign Affairs, No 516, Persiaran Tuanku Ja’afar, Bukit Persekutuan, 50480 Kuala Lumpur, Malaysia. Tel: (603) 22802800 Fax: (603) 22742734 E-mail: [email protected] First published in 2020. ISBN: 978-967-15656-2-9 SEARCCT is dedicated to advocating the understanding of issues pertaining to terrorism and counter-terrorism and contributing ideas for counter-terrorism policy. The Centre accomplishes this mainly by conducting capacity building, research, counter- messaging and public outreach. All rights reserved. No part of this publication may be reproduced, stored, transmitted or disseminated in any form or by any means without the prior written permission of the publisher. All statements of facts, opinions and expressions contained in this work are the sole responsibility of the author and do not necessarily reflect those of the Government of Malaysia. The Government of Malaysia assumes no responsibility for any statements of facts or opinions expressed in this work. Articles in this publication were commissioned in November 2019, and may not reflect Malaysia’s current political environment. 2 CONTENTS 1 ISLAMIST VIOLENCE IN MALAYSIA: REFLECTIONS 05 - 24 FROM THE PRE-GWOT ERA WITH SPECIAL REFERENCE TO THE MEMALI AND AL-MAU’NAH CASES Ahmad Fauzi Abdul Hamid 2 APPLYING
    [Show full text]
  • The 2018 Southeast Asia Counter-Terrorism Symposium: a Collective Approach
    THE 2018 SOUTHEAST ASIA COUNTER-TERRORISM SYMPOSIUM: A COLLECTIVE APPROACH Event Report Centre of Excellence 4-5 October 2018 for National Security Nanyang Technological University, Singapore Block S4, Level B3, 50 Nanyang Avenue, Singapore 639798 Tel: +65 6790 6982 | Fax: +65 6794 0617 | www.rsis.edu.sg Report on the Symposium organised by: Centre of Excellence for National Security S. Rajaratnam School of International Studies Nanyang Technological University, Singapore Supported by: Ministry of Culture, Community and Youth Ministry of Defence Ministry of Foreign Affairs Ministry of Home Affairs National Security Coordination Secretariat Prime Minister’s Office, Singapore Rapporteurs: Nur Diyanah binte Anwar, Joseph Franco, Cameron Sumpter, Romain Brian Quivooij, Prashant Waikar Editor: Joseph Franco The Workshop adheres to a variation of the Chatham House Rule. Accordingly, beyond the speakers and the presenters cited, no other attributions have been included in this report. Terms of use: This publication may be reproduced electronically or in print, and used in discussions on radio, television, and fora, with prior written permission obtained from RSIS and due credit given to the author(s) and RSIS. Please email to [email protected] for further editorial queries.2 Contents Executive Summary ......................................................... 4 Introduction .................................................................... 6 Opening Remarks Ambassador Ong Keng Yong ..................................... 8 Opening Address
    [Show full text]