,

Pakistan and the ISIS: Steering Islamic Militancy in the South East Asian Region, Post 2001

Pakistan has a history of nurturing non-state actors to fulfil its own strategic interests vis-a-vis India and Afghanistan, making it a germane ground for hardcore Islamist militants. Mention can be made of hardcore al Qaeda militants, including Khalid Sheikh Mohammad, who is a Pakistani and according to the 9/11 commission report, is tagged as “the principal architect of the 9/11 attacks.” It is a known fact that following the devastating terrorist attack on the U.S. mainland in September 2001, Pakistan (under the Military rule of Musharraf) despite joining the U.S. led war on terror, did not make any sound and effective reversal in its policy of nurturing and courting militants. It has shown its counter-terror efforts by just capturing top al Qaeda leaders such as Ahmed Omar Saeed Sheikh, murderer of Wall Street Journal Correspondent, Daniel Pearl in 2002; Abu Zubaydah and a few others. Whenever Pakistan acted in the direction of countering terrorism, it has mainly been due the presence of an international pressure. Going back into the history, in the aftermath of the 9/11, in the consecutive months, Pakistan’s sponsored anti-India terrorist groups- Lashkar-e-Taiba (LeT) and Jaish-e-Mohammad (JeM) carried out brutal terrorist attacks in India including on the Indian Parliament. Henceforth, only under the intense U.S. and Indian pressure to prevent the heated up warlike situation in the South Asian region, Musharraf on January 12, 2002, banned militant organisations including LeT, JeM, Sipah-e-Sahaba Pakistan (SSP), and Tehreek-e-Jafaria Pakistan (TJP). It was only a tactical move as these militant organisations re-emerged under different names or started working as charity organisations. The anti-India militant groups along with the Taliban and the Haqqani network continue to flourish in Pakistan with not only massive state support but also with an expansive societal reinforcement. It has also been a host to the chief of al Qaeda- Osama bin Laden for years unknown.
In the recent times, there has not only been wide acknowledgement of Pakistan sponsoring terrorism, but also an increased international pressure to eliminate terrorism by stop making a distinction between the good and bad militants. To evade international criticism and pressure, Pakistan banned Jamaat-ud-Dawa (JuD/LeT-involved in 2008 brutal Mumbai terrorist attacks), and its charitable arm- Falah-i-Insaniyat (FIF) and the Haqqani network in 2015. Such measures have remained an empty rhetoric as the militant organisations and their affiliates continue to flourish in Pakistan. It is evident from the fact that recently in 2018, the Financial Action Task Force (FATF-an intergovernmental body to combat money laundering, terrorist financing, and other related threats to the integrity of an international financial system), placed Pakistan on the grey list. The reason is being- its failure to curb the anti-terror financing and to constrict the funding of militant groups including JuD and its affiliates. Pakistan’s lack of seriousness in dealing with its militant groups has once again come to the fore. The newly elected Imran Khan’s civilian dispensation has overlooked and ignored the expiration of an ordinance that has proscribed militant groups like JuD and FIF under a UN resolution. Resultantly, these militant organisations are no longer on the list of banned outfits. It clearly signifies Pakistan’s lack of will and intention to get over the scourge of terrorism.
Such ill-willed and dual policy of dealing with terrorism has resulted in continuation of Pakistan being a hotbed of Islamic radicalism and militancy. The homegrown radicals and Islamist militants have not only backfired at Pakistan, but also posed an imminent transnational and global threat. Being the only state in the South Asian region, which sponsors terrorism as its official policy, has always been and continues to be a gravitational force for Islamist militants across the globe sharing the broader ideological goal of ordering the world along the “true Islamic lines” based on Sharia. It became evident with the presence of savage ISIS in Pakistan, immediately after the proclamation of Islamic Caliphate by the ISIS emir Abu Bakr al-Baghdadi in June 2014 in Iraq. It is alleged that its presence openly came to the fore for the first time, when women and girls from a radical and militant mosque Lal Masjid’s madrasa, Jamia Hafsa, consigned a message to Abu Bakr al-Baghdadi. It stated- “the caliph, and to our brothers, the mujahideen…we pray for you every night here in the land of Pakistan…Oh Allah, establish the Islamic Caliphate in Pakistan and everywhere.” A faction of notorious militant organisation of Pakistan, Tehreek-e-Pakistan (TTP), Jundullah pledged its allegiance to the Islamic state. Also, a cooperative relationship got established between ISIS and Lashkar-e-Jhangvi al-Alami (a sectarian militant outfit). It brings to the fore an easy convergence between various Islamist militant groups in Pakistan and beyond based on similar ideological affiliations and goals. For instance, as the ISIS consolidated its position, the head of the TTP’s Orakzai zone was officially appointed as the chief of ISIS’s Waliyat-e-Khurasan in the Pakistan-Afghanistan region in January 2015. A report mentions the estimates provided by a London based think tank, Royal United Services Institute, that ISIS had recruited around 2000 to 3000 persons in Pakistan. Thence, Pakistan is the motherboard of Islamic militancy witnessing strong connections between Islamist militant groups inclusive of the ISIS and the growing transnational ferocious nature of the ISIS has impacted the security landscape of the South East Asian region.
The South East Asian (SEA) region constituting of around 270 million Muslims, is gnawed by the growing threat of extremism and militancy. In recent years, the violent strides carried out by the ISIS have brought to the fore the security challenges the SEA region is grappling with. This region has provided several hundred radical Islamist militants (around 1000), in particular from Indonesia and Malaysia, who travelled to Syria and Iraq to support an Islamic state in Iraq and Syria, when it established its “true Islamic State” in 2014. To energise these Islamist militants in support of ISIS- Malay language was used to propagate ISIS agenda and Katibah Nusantara (the South East Asian fighting unit created by their calculated move by bringing together Malay and Indonesian- speaking militants) was created. This strategy of targeting the local audience in their respective regional languages who could not understand Arabic fared better by not only recruiting but also radicalising the populace at large. Furthermore, it is the radical Islamic schools in Indonesia, Malaysia and other South East Asian countries, which have received considerable amount of funds from the Salafi conservative groups. It has helped in making a dent in their overall culture by making it more radical, thereby conducive for the ISIS to exploit. In this context, a report mentions Fred R. von der Mehden stating that the Dewan Dakwah Islamiyah Indonesia (the Indonesian society for the propagation of Islam or DDII) promotes the extreme hard line views in Indonesia and is considered as the Saudi’s channel for the same. Likewise, a string of Islamic radical schools in and around Poso on the island of Sulawesi, Ngruki Islamic boarding school in Indonesia; and Islamic study groups known as usrah in Malaysia have become a soft centre stage for extremist groups including of the ISIS.
Not to mention, ISIS has been supplementing the already existing Islamic radicalism and extremism in South East Asia related to its separatist tendencies predominantly in the southern Philippines, southern Thailand, and communally strained Indonesia. It is also the established and the growing interconnections between Islamist militant groups, their separatist elements and the ISIS contributing to the heightening threats of Islamic militancy in the South East Asian region. For instance, the Muslim extremist groups- Abu Sayyaf Group (ASG), Maute group, Bangsamoro Islamic Freedom Fighters (BIFF) in southern Philippines; and Jamaah Ansharud Daulah (JAD), the largest terrorist group in Indonesia have declared their allegiance to the ISIS. In fact, the ASG leader Isnilon Hapilon was named as the ISIS emir in South East Asia in 2014.

The notoriety of ISIS was noticed in 2015, when it unsuccessfully tried to establish a mini state of its own in Indonesia’s regency of Poso on Julawesi Island. Many are of the opinion that ISIS was staunchly capable of having its transnational influence from 2013-2016 (at its peak), which had ultimately manifolded the recruitment of the Islamist militants across the globe. Thereafter, U.S.-allied forces supported by US airstrikes expelled ISIS from its self-proclaimed Islamic state of Raqqa (Syria) in 2017. Despite such efforts, the ISIS extremist ideology and terrorist activities continued to thrive worldwide. It is alleged that after ISIS lost its territory in the Middle East, it eyed the South East Asian region by pushing its control over the territory to make it as its alternative front for substituting its losses in the Middle East. According to one report, “ISIS has publicly accepted pledges from various groups in the Philippines and has called on followers in Southeast Asia to go to the Philippines if they cannot travel to Syria…Asia, and particularly South East Asia, will likely [also] provide key staging posts for the group.”
It was in mid 2017, ISIS- comprising mostly of the ASG and Maute militants, supported by the BIFF and AKP (Ansar Khilafah Philippines), seized the Marawi city located on the southern Philippines island of Mindanao under the leadership of Isnilon Hapilon. It is not surprising that in Marawi ISIS affiliated militants from other South East Asian nation- states as well as from Saudi Arabia, Somalia, and Chechnya were involved. The ISIS in Philippines followed a strategy similar to the ISIS central by capturing a territory followed by a formal declaration of a Waliyah (province). It led to five-month siege by the militants marking open uncontrolled gun-battles on the streets, army targeted by the militant’s sniper fire, and in retaliation military’s air attacks that bulldozed almost the entire city. More than 1000 people lost their lives, and more than 3000 were forced to evacuate the region rendering them homeless, signalling the frightful ISIS presence and its expanding Islamic militant summons.
Nothing deterred ISIS and its affiliates in carrying out ferocious terror attacks in this region. To mention a few brutal terror incidents claimed by the ISIS includes- two suicide bombers blew themselves at the Jakarta Bus station in May 2017; car bomb attack outside a shopping mall in Southern Thailand in May 2017; family of six suicide bombers including children blew attacked three churches in Surabaya in May 2018; sword wielding ISIS militants attacked provincial police headquarters on the island of Sumatra in May 2018; attack on a military checkpoint in a suicide car bombing in Basilan, South Philippines in July 2018; double bomb attack on Roman Catholic Cathedral of Our Lady of Mount Carmel in Southern Philippines in January 2019. There is no denial that physical acts of terror have immediate visible devastating effects incurring worldwide condemnation. Similar has been in the case of ISIS. However, one cannot overlook the ISIS threat posed by their contribution in sowing militant ideology and increasing radicalisation worldwide. ISIS transcendence and cross cutting of geographical national boundaries has been a result of massive exploitation of the modern technology. Being a dispersed global terror movement, ISIS through the digital and social media platforms has stimulated the visualisation of the “Caliphate”, invigorating radical, Islamic communities, solitary radicalised individuals, and sleeper cells by carrying out “online jihad” in SEA as well.
In a nutshell, the presence of the ISIS threat in the SEA region is more than just the presence of its ISIS leaders or its affiliates. It is the trans-regional and glocal nature of the ISIS, carrying out terrorist activities in the name of promoting “jihad,” which has brought various militant networks in an interconnected web across the world. The sharing of the similar ideological moorings has brought forth the memories of the Afghan-Soviet conflict. Learning from the past, in the aftermath of the Soviet invasion of Afghanistan, militants from South East Asia and other parts of the world went to Pakistan to get training along with other “holy warriors” to wage “jihad” against the Soviets. Thereafter, they fought in Kashmir by supporting Pakistan supported anti-India militant outfit- Lashkar-e-Taiba. Likewise, the likelihood of militants and their established network in Pakistan (state sponsoring terrorism in the next-door region) to collaborate with Islamist militants from South East Asia and ISIS at large cannot be ignored. It is the “ideological affinity” between various militant groups sharing the “true” Islamic cause, which underlines the transnational and cross regional nature of radicalisation and the terror threat posed by the ISIS and often in collaboration with militant groups present both in the South (particularly in Pakistan) and SEA region along with other foreign fighters. Such an existing state of affairs has made the SEA region a theatre of terrorism.
By – DIVYA ANAND (RESEARCH SCHOLAR)
SCHOOL OF INTERNATIONAL STUDIES
JAWAHARLAL NEHRU UNIVERSITY

DIGITAL IDENTITY VERIFICATION AND PROTECTION AGAINST FRAUD AND THEFT – EXPOSED VULNERABILITY

Any views or opinions presented in this article are solely those of the author.

By the third quarter of 2018, the world faces the largest heist of identity and records in United States’ history. In September 2018, the social network Facebook forced 90 million people to log out and log back in again. According to Facebook, around 50 million victims plus an additional 40 million that may have their “access tokens,” stolen. Access token is a digital key that Facebook mobile app creates when a user log in and allows the same user to stay logged in when the Facebook mobile app wants to open another part of Facebook inside a browser. An access token does not include a user’s password, but if this allows the user (or hacker) to stay logged in, having an access token means a malicious hacker can completely control the account.
This vulnerability was a Facebook protocol known as “single sign-on”. A single sign-on creates a new access token, and helps a Facebook user who is logged on to a mobile app or browser, open another part of Facebook inside the same browser without logging in again. The hackers took advantage of this vulnerability to steal the tokens. Facebook later acknowledged this vulnerability has existed since 2017 and was related to Facebook’s “View As” function. This “View As” function allows a user to view his or her own profile as if he or she was someone else. Take a Facebook user Bob. Bob can change his Facebook privacy settings to allow say, his girlfriend, Gail to only see certain posts. Then, to check that the changes to Bob’s privacy settings actually worked, Bob can use the View As feature to look at his profile as if he were Gail. Bob is not actually Gail, and Bob do not have access to Gail’s actual account. It is just a pretence (view as). But these chains of bugs can allow a hacker, to acquire Gail’s access token, and then log into Gail’s account using that token, therefore taking full control of Gail’s account.
In July 2018, Singapore’s largest group of healthcare institutions which include Singapore General Hospital and KK Women’s and Children’s Hospital – has been the target of a cyber-attack said to be the most serious breach of personal data in Singapore’s history. Prime Minister Lee Hsien Loong’s personal particulars, as well as information on his outpatient dispensed medicines, were stolen after specific and repeated efforts to attain them. About 1.5 million patients who visited SingHealth’s specialist outpatient clinics and polyclinics from 1 May 2015 to 4 July 2018 have had their non-medical personal particulars illegally  accessed and copied. The data taken include name, NRIC number, address, gender, race and date of birth. According to blogsites and facebook commentary, internet investigators shortlisted three countries to have state level deliberate cyberattack capabilities, United States, Russia, North Korea, and China. Considering Singapore hosted a Trump-Kim summit which was successfully completed on 15 June 2018, many cybersecurity experts have ruled out the US and North Korea. Internally, a committee of inquiry and investigations are undergoing, pointing to a failure to report by a senior IT manager who noticed unusual traffic and penetrations. This vulnerability is caused by a rogue access point.
A rogue access point is a wireless access point that has been installed on a secure network without explicit authorisation from a local network administrator, whether added by a well-meaning employee or by a malicious attacker. Somewhat like a distributed denial of services, a large number of false request can be submitted, resulting in denial of bona fide online services or shared services. Although it is technically easy for a well-meaning employee to install a “soft access point” or an inexpensive wireless router, perhaps to make access from mobile devices easier, it is likely that they will configure this as “open”, or with poor security, and potentially allow access to unauthorised parties.
According to the 2018 Child Identity Fraud study by Javelin Strategy & Research, more than 1 million children in the US were identity theft victims, resulting in losses of US$2.67 billion dollars in 2017. Javelin found that two-thirds of the victims were under the age of eight. Another 20 percent were eight to 12 years old. Children are more likely to become fraud victims after a breach because their core identity elements, like Social Security Numbers (SSN), are more valuable for criminals. Criminals can have a field day with a child’s SSN because it has never been used before. When a bank or other financial institution pulls a credit report, they are not going to find anything, and so the criminal has a clean slate to work on.
Criminals can also buy a child’s SSN on the dark web for about two US dollars.  A child’s SSN is typically used to create a “synthetic identity”. The criminal takes this legitimate (stolen) number, adds a different name, birthdate, address and phone number to start a new and bogus credit file. The criminal can build up the credit score on that synthetic identity in days and then apply for loans and credit cards, get medical treatment or file fraudulent tax returns.

ABOUT THE WRITER

Dr. Matthew YAP, Singapore
Country Director (Singapore), IACSP
Fellow SFAS, Fellow CIISCM, SrMIES
PhD (Australia), MBA (UK), B.Eng.Hons (Singapore), LL.Dip (UK)
International Civil Aviation Organisation (ICAO) AVSEC PM, ICAO National (Airport) Inspector, ICAO Safety Management System (SMS)

Dr Matthew Yap serves as the safety and security advisor to two construction joint venture consortiums who were each awarded SGD $1 billion airport development packages in Singapore Changi East Development for Terminal 5. Amongst his national consulting projects include AEROCITY, New Delhi (2018), SAFE City, Singapore (2013), the Singapore Airshow (2010), and the first Singapore Formula One night race at the Marina Bay street circuit (2008). Dr Matthew Yap offers insight into cyber trends in the commercial and construction landscape and cites case studies of cyberattacks, breaches by ransomware and bandwidth thefts. Dr Yap has both military and police service experience and served a tour in United State Central Command (USCENTCOM) as the Senior Singapore National Representative for Operation Iraqi Freedom in 2003, participated in civil aviation capability development for Baghdad International Airport, Iraq in 2011 and Kabul International Airport, Afghanistan in 2012. Dr Yap is a visiting lecturer in the NATO Maritime Security Centre of Excellence in Istanbul, Turkey and delivers keynotes and speaks on cybersecurity at international conferences, most recently in the 2018 Defence Security Asia (DSA) and the 2018 IACSP Security Symposium. Dr Yap also serves in the Board of Directors for the Volunteer Law Enforcement Officer Alliance (US). In 2018, Dr Yap was presented the Skillsfuture Fellowship Award by the President of Singapore, Mdm Halimah Yacob, and Total Defence Award by Ministry of Defence presented by Senior Minister of State, Home Affairs.

, ,

Interactive map: Africa’s border security challenges and requirements

Nations across Africa are investing heavily to enhance their border security capabilities in an effort to effectively deter illicit cross border activity. For example: The launch of the Border Management Authority (BMA) in South Africa proved the significance of joint operations to maximise border security and improve the resilience of border authorities.

To give you a better understanding of what challenges Africa’s borders are facing and the requirements they need in order to combat them, we’ve put together an interactive map which gives you a glimpse of:

  • Threats faced by some of the major countries in the continent
  • Steps and actions taken by authorities to combat these threats
  • Major spending by each country to solve their border security challenges and develop upcoming requirements

Download the map for more details>>

The report has been developed in conjunction with the Africa Border Management & Security Expo taking place in Johannesburg, South Africa from 20-21 November.

Source: https://bordersecurityafrica.iqpc.com/landing/interactive-map-africas-border-security-challenges-and-requirements-1

SECESSION AND THE POLITICS OF POWER IN AFRICA April 4TH 2018

Click title to read more

2017 nov: An Appraisal of Nigerian Counter Terrorism Strategy November 14th 2017 (pdf)

2017 nov: An Appraisal of Nigerian Counter Terrorism Strategy November 14th 2017 (pdf)
Click title to read more

Author: Emmanuel Musa Jatau – bishnme at yahoo.com

Abstract:  The 19th century jihad of Usman Dan Fodio remains a turning point of today’s crusade by Boko-Haram to establish a caliphate in Nigeria.

The country has encountered diverse security threats, putsch or coup d’états, religious conflict, resource capture, secessionists ideas, the rise militia groups and today Boko-Haram. As such, this paper examines the two motivating forces of terrorism in Nigeria, and point out the importance of inter-agency cooperation for effective implantation for counter terrorism.

However, the paper equally applauds Nigerian counter-terrorism strategy and security experts in the war against terror in West Africa.

Keywords: Terrorism, Counter Terrorism, Islamic Caliphate, De-radicalization

Al Shabaab The Cancer in East Africa November 10th 2017

Click title to read more

Online Dating a Visa to Europe November 5th 2017

Click title to read more

Terrorism an intellectual war 19th October 2017

Click title to read more

Boko Haram 15th October 2017

Click title to read more

National Security in Nigeria 10th September 2017

Click title to read more