Pakistan Security Report 2018

Pakistan Security Report 2018

Conflict and Peace Studies VOLUME 11 Jan - June 2019 NUMBER 1 PAKISTAN SECURITY REPORT 2018 PAK INSTITUTE FOR PEACE STUDIES (PIPS) A PIPS Research Journal Conflict and Peace Studies Copyright © PIPS 2019 All Rights Reserved No part of this journal may be reproduced in any form by photocopying or by any electronic or mechanical means, including information storage or retrieval systems, without prior permission in writing from the publisher of this journal. Editorial Advisory Board Khaled Ahmed Dr. Catarina Kinnvall Consulting Editor, Department of Political Science, The Friday Times, Lahore, Pakistan. Lund University, Sweden. Prof. Dr. Saeed Shafqat Dr. Adam Dolnik Director, Centre for Public Policy and Governance, Professor of Counterterrorism, George C. Forman Christian College, Lahore, Pakistan. Marshall European Center for Security Studies, Germany. Marco Mezzera Tahir Abbas Senior Adviser, Norwegian Peacebuilding Resource Professor of Sociology, Fatih University, Centre / Norsk Ressurssenter for Fredsbygging, Istanbul, Turkey. Norway. Prof. Dr. Syed Farooq Hasnat Rasul Bakhsh Rais Pakistan Study Centre, University of the Punjab, Professor, Political Science, Lahore, Pakistan. Lahore University of Management Sciences Lahore, Pakistan. Anatol Lieven Dr. Tariq Rahman Professor, Department of War Studies, Dean, School of Education, Beaconhouse King's College, London, United Kingdom. National University, Lahore, Pakistan. Peter Bergen Senior Fellow, New American Foundation, Washington D.C., USA. Pak Institute for Peace ISSN 2072-0408 ISBN 978-969-9370-32-8 Studies Price: Rs 1000.00 (PIPS) US$ 25.00 Post Box No. 2110, The views expressed are the authors' Islamabad, Pakistan own and do not necessarily reflect any +92-51-8359475-6 positions held by the institute. www.pakpips.com, [email protected] TABLE OF CONTENTS Foreword 11 1 Overview of security in 2018: critical challenges and recommendations 15 Muhammad Amir Rana and Safdar Sial 2 Security Landscape of Pakistan in 2018 33 Safdar Sial 3 Militant landscape of Pakistan in 2018 71 Muhammad Amir Rana 4 State responses: anti-militant operations 81 Safdar Sial 5 National Action Plan (NAP): progress, 89 impediments and way forward Ihsan Ghani 6 The gap between theory and practice of 101 “Fourth Schedule” Sher Ali Khalti 7 Competing with each other: AQIS and IS-K in 107 2018 Farhan Zahid 8 CPEC security in 2018 115 Anam Fatima 9 Karachi operations: five years on 123 Zia Ur Rehman 10 Military courts: sunset and beyond 131 Najam U Din 11 Reviving India-Pakistan Relations and 139 Kashmir in 2018 Ershad Mahmud 12 The troubled Pakistan-Iran border 149 Muhammad Akbar Notezai 19 Annexures 169 20 Timelines 193 LIST OF ACRONYMS AAT: Allah-o-Akbar Tehreek FIA: Federal Investigative Agency AJK: Azad Jammu and Kashmir Fr: Firing ANP: Awami National Party FR: Frontier Region AQIS: Al-Qaeda in the Indian HG: Hand Grenade Subcontinent HRCP: Human Rights Commission of Arm: Army Pakistan ASP: Ansar ul Sharia Pakistan HuA: Hizbul Ahrar ASWJ: Ahl-e-Sunnat Wal Jamaat IDP: Internally Displaced Persons ATC: Anti Terrorism Courts IED: Improvised Explosive Device ATF: Anti-Terrorism Force IMNW: Ittehadul Mujahideen North BAP: Balochistan Awami Party Waziristan BC: Balochistan Constabulary ISAF: International Security Assistance BH: Beheading Force BLA: Balochistan Liberation Army ISI: Inter Services Intelligence BLF: Balochistan Liberation Front ISIS: Islamic State in Iraq and Syria BNP: Balochistan National Party IS-K: Islamic State Khorasan BNP-M: Balochistan National Party- ISO: Imamia Student Organization Mengal Group ISPR: Inter-Services Public Relations BRA: Baloch Republican Army JI: Jamaat-e-Islami BSF: [Indian] Border Security Force JID: Joint Intelligence Directorate BT: Bomb Blast JM: Jaish-e-Muhammad CIA: Central Intelligence Agency JuA: Jamaatul Ahrar CID: Criminal Investigation JuD: Jamaatud Dawa Department JUI-F: Jamiat-e-Ulema-e-Islam-Fazl Civ: Civilians Kid: Kidnapping CPEC: China-Pakistan Economic KP: Khyber-Pakhtunkhwa Corridor LeJ: Lashkar-e-Jhangvi CTDs: Counter Terrorism Departments LeJ-A: Lashkar-e-Jhangvi Al-Alami [of police] LI: Lashkar-e-Islam CVE: Counter Violent Extremism LM: Landmine Blast CVE: Counter-Violent Extremism LoC: Line of Control DGMOs: Director Generals of Military Lvs: Levies Force Operations MDM: Muttahida Deeni Mahaz DSP: Deputy Superintendent Police Mil: Militant ETIM: East Turkistan Islamic Party MQM: Muttahida Qaumi Movement FATA: Federally Administered Tribal MWM: Majlis Wahdatul Muslimeen Areas NACTA: National Counter-Terrorism FATF: Financial Action Task Force Authority FC: Frontier Corps NADRA: National Database and FCR: Frontier Crimes Regulation Registration Authority NAP: National Action Plan SA: Suicide Attack NATO: North Atlantic Treaty Sab: Sabotage Organization SDLF/A: Sindhu Desh Liberation NEC: National Executive Committee Front/Army NI: Nationalist Insurgents’ Attack SDRA: Sindhu Desh Revolution Army NIC: National Implementation SECP: Securities and Exchange Committee [on FATA reforms] Commission of Pakistan NP: National Party Sect: Sectarian NPP: National People’s Party SM: Sipah-e-Muhammad NSA: National Security Advisor SP: Superintendent of Police PkMAP: Pakhtunkhwa Milli Awami Party SSP: Sipah-e-Sahaba Pakistan P-ml: Paramilitary Forces ST: Sunni Tehreek PML-N: Pakistan Muslim League-Nawaz TA: Terrorist Attack Pol: Police TLP: Tehreek-e-Labbaik Pakistan PPP: Pakistan People’s Party TNSM: Tehreek-e-Nifaz-e-Shariat-e- PTI: Pakistan Tehreek-e-Insaaf Muhammadi PTM: Pakhtun Tahafuz Movement TTP: Tehreek-e-Taliban Pakistan QWP: Qaumi Watan Party UBA: United Baloch Army RA: Rocket Attack UN: United Nations RCB: Remote-controlled Bomb WB: Working Boundary Rng: Rangers METHODOLOGY AND VARIABLES The PIPS conflict/security database and archives are the basic sources relied upon for this report. The archives and the database are the outcome of a meticulous monitoring process on every relevant incident in the country on a daily basis. A regular follow up is conducted in liaison with PIPS correspondents in the regions in order to keep track of daily developments on such incidents. PIPS compiles data from sources including newspapers, magazines, journals, field sources and screening of official record. More than 30 English and Urdu dailies, magazines, and journals, and various television news channels are monitored to update the database and archives. Regional daily newspapers and weeklies from Peshawar, Quetta, Gilgit and Karachi are also monitored for details of incidents reported in the local media. Correspondents in provincial capitals are the primary source for PIPS to verify the media reports. In case of a major incident, PIPS teams consult the local administration and journalists for further details. In cases where PIPS finds it difficult to verify facts of a particular incident, it gives preference to the official statements in that regard. PIPS security reports utilize eight major variables with their respective set of sub-variables for analysis of the security situation in Pakistan. The security landscape is mapped through a combination of quantitative and qualitative approaches. Quantitative methods are used, based on PIPS Conflict and Security Database, to measure the scale and level of violence. Meanwhile, the qualitative approach dilates upon changes and developments on the militants’ front, state responses to these developments and projections of future scenarios. The following eight major variables with their sub-sets of variable are used in the PIPS Security Reports: 1. Attacks: This major variable has a sub-set of five sub-variables i.e. (i) terrorist attacks including militant attacks, nationalist insurgent attacks and sectarian-related attacks; (ii) incidents of ethno-political violence; (iii) cross-border attacks; (iv) drone attacks; and (v) operational attacks by security forces against militants. Since Pakistan’s security landscape is very complicated with a diverse array of insecurity indicators in different parts of the country, the type of violence in one geographical unit is often different in its nature and dynamics from security landscape in other parts of the country. For this purpose the mentioned sub-set of variables is carefully monitored and analyzed in the security report with a view to suggest specific counter-strategy for each type of attack in these areas. 2. Clash: Another variable used is of clashes which include four sub-variables, i.e., (i) inter- tribal; (ii) sectarian; (iii) clashes between security forces and militants; and (iv) militants’ infightings. The number of such clashes and their geographic location is taken as an indicator of parallel trends unfolding simultaneously with major trends and patterns of security in different areas of the country. 3. State Reponses: It has two sub-variables: (i) security measures, and (ii) political and administrative responses. The first takes into account the security forces’ operational attacks and clashes with militants, search and hunt operations and terrorists’ arrests, etc. The second variable entails the government’s political and administrative measures to maintain law and order and reduce insecurity and violence. 4. Casualties: Casualties include both the number of people killed and injured. Casualties among civilians, militants and security forces are treated as another indicator to measure the levels and trends of security in the country. 5. Attack Tactics: This head takes a comprehensive account of various tactics used by different actors including suicide

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    237 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us