Nexus of Crime and Terrorism: The Case of The Abu Sayyaf Group
Nexus of Crime and Terrorism: The Case of The Abu Sayyaf Group
Nexus of Crime and Terrorism: The Case of The Abu Sayyaf Group
DSpace Repository
2016-12
http://hdl.handle.net/10945/51611
THESIS
by
December 2016
11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the
official policy or position of the Department of Defense or the U.S. Government. IRB number ____N/A____.
12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE
Approved for public release. Distribution is unlimited.
13. ABSTRACT (maximum 200 words)
The purpose of this study is to provide a clear understanding of the nexus of crime and terrorism,
using the Abu Sayyaf Group (ASG) as a case study. This terrorist group in the southern part of the
Philippines has evolved as a hybrid organization, combining terrorist and criminal activities to achieve its
objectives. Moreover, as a terrorist organization, ASG effectively employs criminal tactics for its survival.
This group draws its strength and resilience from collusion with various lawless elements and other
criminal groups in Mindanao.
This paper examines the theoretical framework of Makarenko’s Crime-Terror (CT) Continuum to
provide compelling explanations of the interaction and interoperability of crime and terrorism in the case
of the ASG. It also highlights the Philippine CT strategy and approach to counter terrorism and discusses
some notable gaps and problems, particularly its failure to recognize the ASG as a hybrid organization.
This thesis concludes that the current Philippine counterterrorism strategy, although effective and in good
shape, seems inadequate against hybrid organizations. Thus, this paper proposes that the Philippines re-
examine its current CT strategy to be more appropriate, effective, and responsive against hybrid terrorist
organizations.
i
THIS PAGE INTENTIONALLY LEFT BLANK
ii
Approved for public release. Distribution is unlimited.
from the
Tristan J. Mabry
Second Reader
Mohammed Hafez
Chair, Department of National Security Affairs
iii
THIS PAGE INTENTIONALLY LEFT BLANK
iv
ABSTRACT
The purpose of this study is to provide a clear understanding of the nexus of crime
and terrorism, using the Abu Sayyaf Group (ASG) as a case study. This terrorist group in
the southern part of the Philippines has evolved as a hybrid organization, combining
terrorist and criminal activities to achieve its objectives. Moreover, as a terrorist
organization, ASG effectively employs criminal tactics for its survival. This group draws
its strength and resilience from collusion with various lawless elements and other
criminal groups in Mindanao.
v
THIS PAGE INTENTIONALLY LEFT BLANK
vi
TABLE OF CONTENTS
I. INTRODUCTION..................................................................................................1
A. MAJOR RESEARCH QUESTION..........................................................1
B. SIGNIFICANCE OF THE RESEARCH QUESTION...........................2
C. LITERATURE REVIEW .........................................................................3
1. Definition of Terrorism .................................................................4
2. Terrorism and Crime ....................................................................7
3. Financing Terror and Responses ................................................13
4. Approaches to Counterterrorism ...............................................18
D. POTENTIAL EXPLANATIONS AND HYPOTHESES .....................25
E. RESEARCH DESIGN .............................................................................25
F. THESIS OVERVIEW AND DRAFT CHAPTER OUTLINE .............26
vii
IV. THE ABU SAYYAF GROUP’S KIDNAPPING ACTIVITIES ......................65
A. ANALYSIS OF THE ABU SAYYAF GROUP’S KIDNAPPING
TRENDS ...................................................................................................65
B. MOTIVATIONS, RANSOM SCHEME, AND MODUS
OPERANDI ..............................................................................................74
C. FACTORS THAT CONTRIBUTE TO KIDNAPPINGS ....................76
D. CONCLUSION ........................................................................................78
viii
6. Empower the Communities and Encourage Citizen’s
Active Participation ...................................................................120
7. Effective Law Enforcement Operations...................................121
8. Intensify Information Sharing ..................................................122
C. FINAL THOUGHTS .............................................................................123
ix
THIS PAGE INTENTIONALLY LEFT BLANK
x
LIST OF FIGURES
Figure 14. ASG Estimated Ransom Amount (Period Covered 2010–2014). ..............73
xi
THIS PAGE INTENTIONALLY LEFT BLANK
xii
LIST OF TABLES
xiii
THIS PAGE INTENTIONALLY LEFT BLANK
xiv
LIST OF ACRONYMS AND ABBREVIATIONS
UN United Nations
xvi
ACKNOWLEDGMENTS
First and foremost, I would like to thank our Merciful and Loving Father for the
guidance and good health that allowed me to complete this paper.
To my wife, Vicky, and my children, Alexandra, Andrea, and Arthur, this thesis
would not have been possible without your support, patience, and utmost understanding,
and for that, I say thank you!
I am also very thankful to Professor Tristan Mabry, my second reader, for sharing
his invaluable time and kind insights on the subject.
And to all people who helped me accomplish this deed and overcome many
challenges, I offer my sincere gratitude.
xvii
THIS PAGE INTENTIONALLY LEFT BLANK
xviii
I. INTRODUCTION
Significantly, the Abu Sayyaf Group (ASG) has been the dominant group in terms
of kidnapping in Mindanao. It has perpetrated a number of high-profile and sensational
kidnapping incidents, especially following the death of its founding leader, Abdul Razak
Abubakar Janjalani, in December 1998. Janjalani’s death resulted in the temporary
cessation of support from foreign terrorist organizations. Because of the collective efforts
of various nations to combat terrorism and dismantle their global networks, support from
foreign terrorist organizations has been reduced. These factors further drove the ASG to
turn to criminal activities, particularly kidnapping for ransom, as a source of income
either in support of the organization or for personal gain.
This thesis will focus on the criminal and terroristic activities of the ASG. The
ASG provides a good example of how crime and terrorism intersect. The criminal
activities of the ASG have been lucrative.1 The funds obtained from these activities have
become the backbone of the group’s operational capability. Thus, this thesis asks, has the
ASG's embrace of organized crime methods made it a more lethal terrorist group? Also,
1 McKenzie O’Brien, “Fluctuations Between Crime and Terror: The Case of Abu Sayyaf’s Kidnapping
Activities,” Terrorism and Political Violence 24, no. 2 (2012): 326, DOI:10.1080/09546553.2011.648679.
1
how can the Philippine counterterrorism (CT) strategy benefit from understanding ASG
as an organized crime organization?
Despite the neutralization of key leaders, the ASG remains a major threat to the
peace and order of the country. The Philippine government’s responses seem to be
ineffective in dismantling a small terrorist organization and thwarting its criminal
activities. This fluctuation from terrorism to criminal behavior creates confusion about
the appropriate approach and strategy to combat these threat groups.
Some counterterrorism experts in the Philippines believe that the problem with
the ASG should be handled by the police, and they must enforce the law. The ASG,
2 Chris Dishman, “Terrorism, Crime, and Transformation,” Studies in Conflict & Terrorism 24, no. 1
(August 2010): 56, DOI: 10.1080/10576100118878.
3 Ibid.
4 Rommel Banlaoi, “Current Terrorist Groups and Emerging Extremist Armed Movements in the
Southern Philippines: Threats to Philippine National Security,” National Defense College of the
Philippines, accessed May 16, 2016, http://www.ndcp.edu.ph/nsr.php.
5 Ibid.
2
however, operates in mountainous and far-flung areas of Basilan and Sulu, where the
police could be ineffective. The local police are not adequately equipped and trained in
jungle warfare or in counterterrorism operations. In most cases, the ASG is better
equipped than the local police in terms of firearms and equipment. The Philippine
government may benefit from thinking of terrorism and crime as two different things;
thus, it may require two distinct approaches to combat the threat. Zack Fellman claims
that there are instances when the ASG still engages in acts of violence such as bombings
and assassinations, which make them more difficult to comprehend and confront.6
Mckenzie O’Brien argues that despite its small numbers, the ASG will continue to
pose a threat to the Philippines because of the ASG’s ability to recruit young and
aggressive fighters through financial rewards.7 Potential members are enticed to join
because of monetary reasons and not by their Islamic beliefs.8 Criminal activities have
become a common tactic among the terrorists because crime is a lucrative way of
generating funds for the group’s operational capability.9 Most terrorist groups realize that
embracing organized crime methods would make them more effective, stronger, and
more lethal.10 Despite their rampant criminal activities—or more accurately, because of
their embrace of crime—some terrorist organizations remain an active threat, capable of
executing bombings and other violence.11
C. LITERATURE REVIEW
To address the major research questions, this literature review will critically
analyze, evaluate, and compare prior research studies and other scholarly sources related
to the thesis’s main theme. First, this review will provide a critical analysis of the
definition of terrorism and who terrorists are. Second, it presents a theoretical framework
6 Zack Fellman, “Abu Sayyaf Group,” Center for Strategic Studies and International Studies, case
study no. 5 (November 2011): 5−6.
7 O’Brien, “Fluctuations Between Crime and Terror,” 326.
8 Ibid.
9 Ibid.
10 Ibid.
11 Ibid.
3
that explains the nexus of crime and terrorism. Third, it provides basic knowledge about
the ASG as the main focus of this paper. Finally, this review will present a preliminary
discussion of a comprehensive and holistic approach to counter-terrorism by examining
the responses of other countries.
1. Definition of Terrorism
Although experts and scholars have different definitions of terrorism, all of them
broadly agree that it is a “kind of activity involving the threat or application of
violence.”12 Leonard Weinberg states that “terrorism is the calculated use of violence or
threat to coerce or intimidate governments or societies in pursuit of political, ideological,
and religious ends.”13 He defines terrorism as a “politically motivated tactic,”14 which
involves the use of threats or violence to achieve widespread publicity. Harmonie Toros
and Luca Mavelli agree that, among more than 100 definitions of terrorism, one common
characteristic that emerges is the political nature of the acts.15
This special political charge of the violence is reflected in the legal frameworks
that address terrorism and countering terrorism. Weinberg claims that most countries,
especially democracies, have made terrorism a crime in their domestic law. He claims
that such countries as the United States and the United Kingdom have made an effort to
broaden the definition of terrorism “to criminalize a wider range of behaviors.” 16 This
effort led to the legislation of a more expansive terrorism law and having a clear legal
definition of terrorism both in the United States and the United Kingdom. According to
James Beckman, the Patriot Act supersedes “hundreds of provisions and amended many
federal statutes” regarding anti-terrorism.17 He claims that the main goal of the law is to
12 Weinberg, Democracy and Terrorism, 11. See also, Alexander Aguirre, “The Philippine Response
to Terrorism,” Journal of Policing, Intelligence, and Counter-Terrorism 4, no. 1 (August 2011): 10,
DOI:10.1080/18335300.2009.9686923.
13 Ibid., 47.
14 Ibid., 10.
15 Harmonie Toros and Luca Mavelli, “Terrorism, Organized Crime and the Biopolitics of Violence,”
Critical Studies on Terrorism 6, no. 1 (April 5, 2013): 73−74, DOI:10.1080/17539153.2013.765701.
16 Ibid., 11.
17 James Beckman, Comparative Legal Approaches to Homeland Security and Anti-Terrorism
(Aldershot, England; Burlington, VT: Ashgate Publishing, 2007), 27.
4
enhance the ability of federal law enforcement to counter terrorism. Beckman writes that
the Patriot Act widens the definition of terrorism by including domestic terrorism as
“prior to 2001, the U.S. law only defines acts of international terrorism.”18
The Philippine anti-terrorism law, the Republic Act 9372, otherwise known as the
Human Security Act of 2007, defines terrorism by stating that anyone “sowing and
creating a condition of widespread extraordinary fear and panic among the populace, in
order to coerce the government to give in to an unlawful demand shall be guilty of the
crime of terrorism.”19 It outlines how terrorism is punishable under Philippine law,
specifying that those convicted “shall suffer the penalty of forty (40) years of
imprisonment, without the benefit of parole as provided for under Act No. 4103,
otherwise known as the Indeterminate Sentence Law, as amended.”20
Violations under the following provisions of the Revised Penal Code, Republic
Acts and Presidential Decrees, constitute crimes of terrorism:
a) Piracy and mutiny on the high seas or in Philippine waters (Art. 122)
b) Rebellion or insurrection (Art. 134)
c) Coup d’etat, including acts committed by private persons (Art.134-a)
d) Murder (Article 248)
e) Kidnapping and serious illegal detention (Article 267)
f) Crimes involving destruction (Article 324)
g) Law on arson (PD 1613)
h) Toxic substances and hazardous nuclear waste (RA 6969)
i) Atomic energy regulation and liability (RA 5207)
j) Anti-hijacking law (RA 6235)
k) Anti-piracy and anti-highway robbery law (PD 532)
l) Laws on illegal and unlawful possession, acquisition, manufacture,
dealing, or disposition of firearms, ammunition or explosives (PD
1866)21
Chester Cabalza, a professor at the National Defense College of the Philippines,
argues that there is no clear definition of terrorism in the Human Security Act of 2007.
5
The legal definition as embodied in the law is vague and highly prone to abuse. 22 He
claims that the Human Security Act “is one of the most incoherent, disorganized, and
disjointed laws the Philippine congress has ever passed.”23 He argues that the law has no
clear standard objectives that will guide law enforcers; thus, it allows the law enforcers to
have their own preference and interpretation of who are “engaged in terrorism or
conspiracy to commit terrorism.”24 Moreover, he notes, the crimes enumerated by the
Human Security Act are already punishable under the Revised Penal Code of the
Philippines.
On the other hand, creating normal criminal categories for terrorist activity has
some real advantages in the Philippines, as elsewhere. According to Pauline E. Eadie,
“practically and legally it is extremely difficult to differentiate between rebels, bandits,
insurgents and kidnappers on the one hand and terrorists on the other. Consequently it
may be pragmatic for the Philippines to prosecute offenders as criminals as opposed to
terrorists.”25
While it can be useful to prosecute terrorist acts as crime, still terrorism should be
understood as distinct. Paul Wilkinson argues that terrorism can be a “weapons system”26
used effectively by various non-state groups, regimes, and governments.27 Wilkinson
emphasizes the idea that historically some governments and regimes used terror in a more
brutal manner than non-state groups. States have more power and resources to implement
their policies of terror to oppress and influence people for political ends.
22 Chester B. Cabalza, “Deconstructing Human Security in the Philippines,” Academia, 4−5, accessed
April 17, 2016, https://www.academia.edu/2137055/Deconstructing_Human_Security_in_the_Philippines.
23 Ibid.
24 Ibid.
25 Pauline E. Eadie, “Legislating for Terrorism: The Philippines’ Human Security Act 2007,” Journal
of Terrorism Research 2, no. 3 (November 11, 2011): 30, http://jtr.st-
andrews.ac.uk/articles/10.15664/jtr.226/#.
26 Paul Wilkinson, Terrorism Versus Democracy: The Liberal State Response (Portland, OR: Frank
Cass, 2001), 15.
27 Ibid.
6
insurgency will evolve into a terrorist organization.28 He argues that terrorism is a
“special method” of armed struggle and that it is possible to use terror or violence against
civilians or non-combatants without engaging in a full-blown insurgency.29 Most
insurgents believe that terrorism is just an auxiliary weapon, and any insurgency that
relies solely on its effectiveness may ultimately prove counterproductive.30
However, Alexander Aguirre points out that to achieve political ends, terror can
be used as a tactic in combination with guerilla and conventional warfare.31 He argues
that terrorism can be compatible with political movements, especially if these movements
employ violence and terror as their main strategy or method to achieve their goals. 32
When this violence occurs, the international community can “tag rebels or insurgents as
terrorists and criminals,” who must be condemned, confronted, and eradicated under the
rules of law of civilized society.33
7
According to Makarenko, there are four distinct points on the continuum of crime
and terror. The first point of cooperation between organized crime and terrorism is the
alliance. In this point, criminals and terrorists collaborate to acquire crucial skills,
knowledge, and support critical to each group’s operational capabilities.36 This
relationship may exist for the short or long term as long as both of them mutually benefit
from such collaboration.37 (See Figure 1.)
On the second point, Makarenko asserts that the capacity of criminal and terrorist
groups to employ both criminal and terror tactics for their operations constitutes the
second component of the continuum.39 Organized crime groups use terror tactics against
rival groups, and they engage in terrorism to force the government into negotiation and
compromise.40 In the absence of foreign support, terrorist organizations tend to engage in
illegal activities to support their operations and perhaps even the survival of the
organization.41 Significantly, organized crime and terrorist groups often revert to their
traditional organization and structure, rather than cooperating with each other to avoid
8
inherent problems of security and other threats of close alliances. 42 Because members of
criminal organizations are only motivated primarily by greed and personal gain, they tend
to be weak and can be easily recruited by state security forces.
The fourth and final point is the “black hole.”45 This level thrives in weak or
failed states in which criminal and terrorist organizations have converged, a safe
environment for them to conduct unrestricted operations.46 Two situations emerge amid
the “black hole”47 syndrome: first, primary motivations focus on criminal objectives; and
second, a “black hole state”48 emerges in which political and criminal hybrid
organizations gain substantial political and economic control over a part of a territory or
an entire country.49
Similarly, Helena Carrapico, Daniela Irrena, and Bill Tupman argue that terrorists
and criminals tend to cooperate to enhance their capabilities and learn important skills
from each other.50 They assert that there are two debatable issues within academia with
regard to the nexus of crime and terrorism. The first issue relates to the nature of “the
To understand terrorism and crime fully, Steven Hutchinson and Pat O’Malley
provide a compelling discussion about the links between terror and crime. 56 They argue
that there are some “predictors” regarding the types of criminal activity a terrorist group
would engage in. Because of the terrorists’ political or ideological motivations, it is
improbable that “organized crime and terrorist groups will foster a symbiotic
cooperation.”57 Although cooperation between terrorist and organized crime groups can
be beneficial for both parties, this will not last in the long term because both
organizations still want to maintain their respective operational security. Hutchinson and
51 Carrapico, Irrena, and Tupman, “Transnational Organized Crime and Terrorism: Different Peas,
Same Pod?” 213−215.
52 Ibid.
53 Toros and Mavelli, “Terrorism, Organized Crime and the Biopolitics of Violence,” 73−74.
54 Ibid., 73.
55 Ibid., 74.
56 Steven Hutchinson and Pat O’Malley, “A Crime-Terror Nexus? Thinking on Some of the Links
between Terrorism and Criminality,” Studies in Conflict and Terrorism 30, no. 12 (October 26, 2007):
1096, DOI: 10.1080/10576100701670870.
57 Ibid.
10
O’Malley claim that terrorist groups aim for publicity, which is totally opposite to some
organized crime groups.58
Where does the ASG fall on the continuum? Santiago Ballina, in his article “The
Crime-Terror Continuum Revisited: A Model for the Study of Hybrid Criminal
Organizations,” applies Makarenko’s continuum to two case studies: La Familia
Michoacana and the ASG.59 Ballina claims that in the case of the evolution of the ASG,
the key factor is internal in origin, tracing back to the cultural and social nature of the
organization.60
To understand the ASG, Ballina suggests a careful analysis of the group’s social
and cultural background, which encompasses the broader context of the Tausug tribe and
other ethnic minorities in the southern Philippines.61 According to Ballina, the strange
characteristics of the ASG—“hybridity, fluid network configurations, and even the drive
towards criminality”62—have been the result of the ASG’s unique cultural and social
environment. With this, the author proposes that a three-dimensional model should be
used because this model is a comprehensive analysis of clandestine organizations,
comprised of ideology, profit, and social/cultural dimensions, which overlap with each
other.63 See Figure 2.
58 Hutchinson and O’Malley, “A Crime-Terror Nexus? Thinking on Some of the Links between
Terrorism and Criminality,” 1100.
59 Santiago Ballina, “The Crime-Terror Continuum Revisited: A Model for the Study of Hybrid
Criminal Organisations,” Journal of Policing, Intelligence and Counter Terrorism 6, no. 2 (October 2011):
129−130, DOI: 10.1080/18335330.2011.605200.
60 Ballina, “The Crime-Terror Continuum Revisited,” 129−130.
61 Ibid.
62 Ibid., 129.
63 Ibid., 129−130.
11
Figure 2. Ballina’s Three Dimensional Model.64
Sam Mullins also argues that “terrorists and organized criminals share the same”
or comparable systems of influence and organization, demonstrate the same type of
behavior, and behave and interact with each other similarly.65 In addition, Mullins claims
that terrorists and criminals have performed the same activities to achieve their
objectives; as such, criminal skills are essential for a terrorist to survive and perform his
tasks successfully.66 Mullins points out that crime and terrorism can be analyzed in three
main dimensions: methods, motives, and profiles.67 Using these dimensions, Mullins
explicitly compares some similarities and differences in crime and terrorism. Mullins and
Makarenko share the same idea about the methodological similarities between organized
crime and terrorism. They argue that both crime and terrorism have used similar tactics
and capabilities in terms of intelligence, counterintelligence, targeting techniques,
employment of networks, and adopting a cellular-type structure.68
12
Although O’Brien’s work focuses on one case study, and specifically on
kidnapping, he provides a decent explanation of the historical fluctuations between
terrorism and criminal activities.69 He shows that the ASG provides a glimpse of how
crime and terrorism intersect. O’Brien also supplies other frames of analysis to clearly
understand these connections.70
Any threat or nefarious organization around the world will not survive without
money or sources of financing. Jennifer Hesterman claims that money and the source of
financing are two crucial factors for any type of terrorist organization.71 The
uninterrupted flow of funds is critically important for the operations and other critical
requirements of the organization.72 Terrorist groups may use various methods to generate
funds and acquire a steady flow of cash depending on the environment or country in
which they operate. Groups can rely on the support of other states or engage in criminal
activities domestically or through transnational crimes. In some cases, terrorist groups
mask their financing by employing charitable organizations as conduits to receive
donations from wealthy individuals sympathetic to their cause. This section highlights the
arguments of Michael Freeman, Aurel Croissant, Daniel Barlow, and McKenzie O’Brien
about financing terror. Freeman writes that every source of terrorist financing has its own
distinct characteristics and is best explained by various criteria, while Croissant and
Barlow argue about popular sources of financing terror and claim that every terror group
has its own peculiarity when it comes to financing activities. On the other hand, O’Brien
argues about the preferred methods of some terrorist organizations.
Freeman explains the “six criteria” that can be used “across a typology of four
previously mentioned primary types of terrorist financing: state sponsorship, illegal
activity, legal activity, and popular support.”83 He explains that the first criterion is
quantity, which simply means that a particular terrorist group becomes more effective
78 Croissant and Barlow, “Following the Money Trail: Terrorist Financing and Government Responses
in Southeast Asia,” 139.
79 Freeman, “The Sources of Terrorist Financing: Theory and Typology,” 463.
80 Ibid.
81 Ibid.
82 Ibid.
83 Ibid.
15
and stronger as it gains more resources. Terrorists always choose an option that brings
more money for the organization. With more funds, they have more flexibility to conduct
attacks, recruit more members, and protect themselves against state security forces.
Additionally, these groups also use some of their funds to help the communities where
they operate, while in return receiving protection and crucial intelligence from the
populace.84
The second criterion is legitimacy, which is very important for a terrorist group.
This criterion must be established and justified from the very start in order for the
terrorist organization to sustain its existence, win the support of the people, and attract
more members to join the struggle.85 Legitimacy of the terrorist group’s strategies and
tactics are equally important to gain popular support. Freeman claims that there are
several ways in which tactical decisions about financial sources affect the legitimacy of
the group.86 He mentions that one of these is avoiding illegitimate methods of acquiring
funds, which can be counterproductive for the whole organization. Funds coming from a
“broad support base” have been a good indicator of legitimacy. If members of the
terrorist groups are utilizing funds for personal gains or engaging in corruption, it would
undermine their legitimacy. In some cases, terrorists must seek financing sources that
demonstrate and support their legitimacy, and they depart from corrupt practices within
the organization.87
16
can infiltrate a terrorist organization.88 Most members of criminal organizations are
easily turned because they have no strong convictions or ideology and are motivated by
their personal interest and greed for money.89
Reliability of financing sources is also important for the terrorist organization and
is the fifth criterion. It means that the sources of financing are foreseeable and steady.
Freeman claims that these features of financing “often depend on factors of geography
and demographics.”90 For instance, in the case of the Kurdistan Workers’ Party (PKK), in
order to have a steady and reliable flow of revenue from drug trafficking, the group must
be strategically situated near the trafficking route, or they must have access to the
majority of the population who are drug users. This concept also applies to the FARC and
the Taliban in connection with their drug smuggling activities.91
The sixth criterion is control. Sources of financing can have an influence on the
way a terrorist organization controls its members and operations. As Freeman argues,
“money is often associated with influence and power.”92 He points out that if cell leaders
of small units are allowed to make decisions regarding their own financing sources,
senior leaders lose their command and control of the lower units. Thus, decentralization
of fund management in an organization may result in less control over lower units, and
lower units may commit acts not in line with the organization’s objectives. Some terrorist
groups do not want to be indebted from the support of other states or private sponsors
because these sponsors tend to influence their operations and influence them to do acts
that are counterproductive or totally irrelevant to their cause.93 The last criterion is
simplicity. It means that it is valuable to do something as simple as possible in terms of
financing sources. Terrorist groups choose to employ methods that require
unsophisticated skills and little effort but may result in gaining a steady flow of funds. It
17
is also important that the methods must incur lesser cost and be more desirable than other
means.94 Freeman asserts that although terrorist groups have proven flexible and can find
new ways of financing terror, several sources of financing have inherent weaknesses.95
One of the countermeasures that he suggests is enhancement of states’ police and
intelligence agencies’ capabilities and an active legal approach to put more pressure on
terrorist groups.
4. Approaches to Counterterrorism
The United States assists its allies to improve and expand governance and
collaborate with other partners to degrade the capabilities of terrorist organizations
locally and globally.98 The National Strategy for Counterterrorism of 2011 has four
important principles that guide the U.S. approach to terrorism and the Global War on
Terror. These are “adhering to U.S. Core Values,” “building security partnerships,”
“applying CT tools and capabilities appropriately,” and “building a culture of
resilience.”99 The United States upholds these core values because they enhance the
security of the nation and protect citizens against acts of terror. Additionally, these core
values aim to achieve the following: “respect human rights, foster good governance,
respect privacy and civil liberties, commit to security and transparency, and uphold the
rules of law.”100 This strategy promotes strong and lasting collaborative partnerships with
allied countries to eliminate and dismantle terrorist organizations and actively engage in
counterterrorist activities that include intelligence sharing and joint training and
operations. It also adopts active cooperation to counter violent extremism through
appropriate community-based resilience programs.101
Byman writes that intelligence is one of the five fronts in counterterrorism, and he
emphasizes the significance of close collaboration and cooperation with allies and other
partners.108 Benjamin Netanyahu claims that one of the central problems in
counterterrorism is the reluctance of the security services of one country to share
information with other foreign services.109 The British approach also adopts the
effectiveness to counterterrorism of enhanced intelligence cooperation and collaboration.
104 Dunn and Hassan, “Strategic Confusion: America’s Conflicting Strategies and the War on
Terrorism,” 60.
105 David Bonner, “United Kingdom: The United Kingdom Response to Terrorism,” Terrorism and
Political Violence 4, no. 4 (December 21, 2007): 179−191, DOI: 10.1080/09546559208427180.
106 Ibid.
107 Ibid.
108 Byman, The Five Front War: The Better Way to Fight Global Jihad, 3.
109 Benjamin Netanyahu, Fighting Terrorism: How Democracies Can Defeat the International
Terrorist Network (New York: Farrar, Straus and Giroux Press, 2001), 138.
20
Establishing relationships and working closely with domestic and foreign counterparts
helps “to predict, prevent, deter, and suppress acts of terrorism” and neutralize the threat
groups.110 Cooperation and collaboration unite all efforts of those who are involved in
the fight against terrorism. Enhancing bilateral and multi-lateral engagement strengthens
border controls and sharing of intelligence.111 It helps in securing quality and essential
information through regular intelligence exchange and conference between countries.112
Since World War II, British military intelligence has been conducting joint
intelligence operations among the tri-service. Several branches make up the British
military intelligence. The British Army is the only service with an Intelligence Corps.113
The Royal Navy and the Royal Air Force also have their own intelligence capabilities and
assets to support the requirements of the British Army.114 In addition to this, military
intelligence works closely with other secret services such as the Security Service (MI5),
the Secret Intelligence Service (MI6), and the Signal Intelligence Service.115 In terms of
counterterrorism, the military has only a supporting role in which they provide crucial
intelligence to support other law enforcement agencies. In the British case, the
collaboration of various government agencies is how they synchronized their efforts in
line with their main strategy of “the four Ps: pursue, prevent, protect, and prepare.”116
118 Pedahzur and Perliger, “The Consequences of Counterterrorist Policies in Israel,” 338.
119 Clive Jones, “Israel and the Al-Aqsa Intifada: The Conceptzia of Terror,” in International
Terrorism Post 9/11: Comparative Dynamics and Responses, ed. Asaf Siniver (NY: Routledge, 2012), 126.
120 Jones, “Israel and the Al-Aqsa Intifada: The Conceptzia of Terror,” 129.
121 Ibid., 133.
122 Ibid.
123 Ibid., 134.
124 Ibid.
125 Daniel Byman, A High Price: The Triumphs and Failures of Israeli Counterterrorism (NY: Oxford
University Press, 2011), 370−371.
126 Ibid.
22
Just like any country with serious concerns about terrorism, Byman claims, Israel
is also affected by terrorism’s psychological power.127 Many Israelis alter the basic
pattern of their daily lives, which may mean not using the bus or going out to eat or
shopping at malls.128 Terror attacks, especially against innocent civilians, undermine the
credibility and capacity of the government to ensure peace and security and to protect its
citizens. Despite widespread terrorist attacks, Israelis remain confident in the capabilities
of their government to counter the threat of terrorism.129 With this kind of popular
support, the Israeli government involves the people in active and passive measures and
encourages active participation of the community to join the fight in order to conquer
their fear.130
Andrew Tan claims that Southeast Asian countries adopted holistic and
comprehensive approaches and strategies to counterterrorism because the threat of
terrorism in this region was multifaceted and emerged from a long history of self-
determination.131 He claims that Singapore, Malaysia, Thailand, Indonesia, and the
Philippines reap the benefits of bilateral and multilateral cooperation to strengthen
political, economic, and security cooperation.132 For instance, after the 9/11 attacks,
ASEAN countries issued a joint resolution in support of the UNSC Resolutions
condemning terrorism and enhanced security and economic cooperation to combat the
threat.133 Countries like Malaysia, Indonesia, and the Philippines signed a counter-
terrorism treaty to strengthen border security and sharing of vital information in terms of
border controls.134
127 Byman, A High Price: The Triumphs and Failures of Israeli Counterterrorism, 372−373.
128 Ibid., 370−371.
129 Ibid.
130 Ibid.
131 Tan, “Counter-Terrorism in Southeast Asia Post-9/11,” 207.
132 Ibid., 216.
133 Ibid., 215.
134 Ibid., 216.
23
In his book, The British War on Terror, Steve Hewitt claims that there are short-
and long-term solutions to any violence posed by terrorism.135 He points out that long-
term solutions require bigger involvement of the government to provide comprehensive
solutions to the root causes of the problem.136 Some Southeast Asian countries have
employed the military approach, but they complement it with a comprehensive strategy,
which involves political, economic, and social instruments to win the hearts and minds of
the people.137
The response covers all the phases of the development of terrorist acts
(before the attack, during the attack and after the attack), with the
corresponding countermeasures, namely: the proactive phase (prediction,
prevention, and preparation), the reactive phase (counter-terrorism
actions), and the post conflict or consequence management phase;
135 Steve Hewitt, The British War on Terror: Terrorism and Counter-Terrorism on the Home Front
Since 9/11 (London: Continuum International, 2008), 120.
136 Ibid., 123.
137 Tan, “Counter-Terrorism in Southeast Asia Post-9/11,” 220.
138 Aguirre, “The Philippine Response to Terrorism,” 51.
24
The response also includes close coordination and cooperation with the
international community in fighting terrorism.139
According to Eusaquito Manalo, the Philippine response to terrorism “remains
reactive, rather than decisive and strategic.”140 He argues that terrorism should not be
confronted by a military solution alone or employ a war-fighting model to counter the
threat posed by the terrorist groups. Manalo asserts that the problem of terrorism in the
Philippines requires effective police measures since basically it is a problem of law and
order.141 He points out that the successful linkages and alliances between local and
foreign terrorist organizations and other lawless elements in Mindanao can be the results
of the government’s incomplete strategy and lack of complete understanding of the root
causes of the problems.
E. RESEARCH DESIGN
This paper presents a single case study of the ASG’s terrorist and criminal
activities in the southern part of the Philippines, though some of the group’s terrorism
25
and illicit activities in central Mindanao will be also addressed to support the analysis of
its networks and capabilities.
The first chapter of this thesis provides a brief background, including the
definitions of terrorism, the crime-terror continuum, the ASG, and the holistic and
comprehensive approach to counter-terrorism. This chapter will consist of the following
sub-topics: major research questions, literature review, significance and goal of the study,
potential explanations and hypothesis, research design and sources, and thesis overview.
Chapter II presents the history and relevant background of the ASG. This chapter
explains the ideology and leadership of the group. It also discusses the strength and
capabilities of the group and explores the compelling factors why they evolved from an
Islamic movement in the early 1990s into a terrorist group and then became a bandit
group.
Chapter III explains one by one the various points of Makarenko’s CTC and plots
the ASG on the continuum. It will discuss definitions of organized crime and its
26
similarities and differences with terrorism. This chapter also presents an analysis of the
ASG’s resilience.
Chapter IV discusses the kidnapping activities of the ASG. Although this group
has also been engaging in other criminal activities, the kidnap-for-ransom scheme is the
most prominent and preferred method to amass millions of pesos. These illicit activities
enable the group to procure powerful weapons and other essential equipment that boost
its operational capabilities to confront government forces in the area. It will examine
ASG’s motivations and factors that contributed to the relentless kidnappings in
Zamboanga peninsula and provinces of Basilan and Sulu.
27
THIS PAGE INTENTIONALLY LEFT BLANK
28
II. CASE STUDY: THE ABU SAYYAF GROUP
On September 21, 2015, three foreign nationals and one Filipino were abducted
from Samal Island, an island resort in Davao del Norte in the eastern part of Mindanao.
The kidnap victims were John Ridsdel and Robert Hall, both Canadian; Kjartan
Sekkingstad, a Norwegian; and Marites Flor, a Filipina.142 The four were staying at the
Holiday Oceanview Samal Resort, where armed men abducted them using two motorized
boats. After six months, the ASG posted a video clip on the Internet, showing the four
kidnap victims pleading for their lives with armed men standing in the background.143
142 “3 Foreigners, Filipina Kidnapped on Samal Island.” CNN Philippines, September 25, 2015,
http://cnnphilippines.com/regional/2015/09/22/3-foreigners-Filipina-kidnapped-Samal-Davao-del-
Norte.html.
143 “Hostages Plead for Their Lives in Abu Sayyaf Ransom Video,” Daily Mail, November 1, 2016,
http://www.dailymail.co.uk/video/news/video-1220989/Hostages-plead-lives-Abu-Sayyaf-ransom-
video.html.
144 “‘They Will Execute Us’; Kidnapped Canadians Held by Philippine Militants Appeal for Help,”
LFP Press, March 10, 2016, http://www.lfpress.com/2016/03/10/they-will-execute-us-kidnapped-
canadians-held-by-philippine-militants-appeal-for-help.
145 Julie Alipala, “Head of ‘Abu Sayyaf Captive’ Dumped on Sulu Street – Police,” Philippine Daily
Inquirer, April 25, 2016, http://globalnation.inquirer.net/138928/head-of-abu-sayyaf-captive-dumped-on-
sulu-street-police#ixzz478SrHGGn.
146 Julie Alipala, “Abu Sayyaf Releases Norwegian Hostage,” Philippine Daily Inquirer, September
17, 2016, http://globalnation.inquirer.net/145010/abu-sayyaf-releases-norwegian-hostage.
29
24, 2016, Marites Flor was released by the ASG. She was left in front of the residence of
Sulu Governor Abdusakur Tan II.147
Even more recently, a series of kidnapping incidents occurred along the border in
the south between the Philippines, Malaysia, and Indonesia. On March 29, 2016, 10
Indonesian sailors were abducted in the waters off the southern Philippines.148 The ASG
demanded a PHP50 million ransom for the release of these hostages.149 On May 1, 2016,
the 10 Indonesian sailors were freed in Jolo, Sulu, dropped by unidentified men in front
of the house of Sulu Governor Abdusakur Tan, Jr. The Indonesian employer of these
tugboat crews allegedly paid a PHP50 million ransom to the ASG.150
Similarly, on April 1, 2016, four Malaysian sailors were snatched along the
territorial waters of Sempornah, Sabah, Malaysia.151 The ASG demanded RM30 Million
(US$10 million) as ransom for the release of the sailors.152 On June 8, 2016, the captives
were released by the ASG, but there was no confirmation from either the Philippine or
the Malaysian government that any ransom was paid for their release.153
The funds obtained from the ASG’s illicit activities were used for the
procurement of powerful weapons and other essential equipment, which enhanced its
operational capabilities. It is also important to note that this group had intensified
kidnapping activities by operating beyond its traditional area of operations and staged
daring and successful cross-border kidnappings. Ransoming hostages is significantly
important for the ASG as a source of financing.
147 Elmor P. Santos, “Freed ASG Hostage Marites Flor: We Were Treated Like Dogs,” CNN
Philippines, June 25, 2016, http://cnnphilippines.com/news/2016/06/24/Abu-Sayyaf-hostage-Marites-Flor-
recounts-captivity.html.
148 Alipala, “Abu Sayyaf Releases Norwegian Hostage,” Philippine Daily Inquirer.
149 Ibid.
150 Ibid.
151 Roel Pareno, “4 Indonesian Crew Members Kidnapped,” The Philippine Star, April 16, 2016,
http://www.philstar.com/headlines/2016/04/16/1573493/4-indonesian-crew-members-kidnapped.
152 “4 Malaysians Released by Abu Sayyaf: Philippine Military,” Channel News Asia, June 8, 2016,
http://www.channelnewsasia.com/news/asiapacific/4-malaysians-released-by/2854376.html.
153 “Abu Sayyaf Frees 4 Malaysian Sailors It Kidnapped in April: Philippine Military,” The Star
Online, June 8, 2016, http://www.thestar.com.my/news/nation/2016/06/08/philippine-military-confirms-
sarawakians-released/.
30
This chapter highlights the historical background of the ASG to include its
ideology, leadership, organization, strength, and capabilities. It also explains the ASG’s
employment of terrorism and crime to attain its objectives. This chapter argues that the
ASG has become a hybrid organization that is fluctuating between terrorism and crime,
depending on the prevailing situation on the ground. Although this group has been
officially labeled as a terrorist organization in the Philippines and listed as a foreign
terrorist organization by the U.S. Department of State, it has been shifting from terrorism
to organized crime because of the personal interests of its sub-commanders and members.
Furthermore, it has become a stronger and more lethal terrorist organization by
employing criminal tactics for its terroristic activities.
Two such students—the late Ustadz Abdurajak Abubakar Janjalani and Wahab
Akbar—earned their master’s degrees in Egypt and Syria, respectively. When they
returned to the Philippines, the two joined the Muslim fundamentalist movement, Al
Islamic Tabligh, which had been active in their home province of Basilan.155 Although
there was no concrete evidence to substantiate Janjalani’s activities and movements in the
Middle East, many believed that he travelled to different Muslim countries and met
influential Muslim scholars and Imams, which greatly influenced him about radical
Islamic teachings and thought. In 1988, he “went to Pakistan, where he studied the
154 “Handout on the Abu Sayyaf Group,” Combat Arms School, Training and Doctrine Command,
Philippine Army, 2007.
155 Manalo, “Philippine Response to Terrorism: The Abu Sayyaf Group,” 31.
31
Islamic revolution in Iran.”156 While in Pakistan, “he reportedly met and befriended
Osama Bin Laden,” who helped him organize the ASG.157
Janjalani, a former mujahideen in the Afghanistan war, founded the ASG in the
early 1990s. Janjalani was greatly influenced by the teachings of Adbul Rasul Sayyaf, an
Afghan resistance leader and Islamic professor, about Wahhabi theology. This knowledge
led Janjalani to the concept of an Islamic state; thus, he formed an Islamic movement
whose aim was to form an Islamic state in Mindanao.158 This movement grew in
popularity and became known as the Abu Sayyaf Group, so named to honor his mentor.
Many scholars mistranslated ASG to mean “Bearer of the Sword,” but “Abu Sayyaf”
really means in Arabic, “Father of the Swordsman.”159
To get financial support from other terrorist groups in the Middle East, Janjalani
temporarily renamed the group as Al-Harakatul Al-Islamiyah160 (AHAI) in 1994 to
emphasize the group’s original vision, which is to establish a “highly organized,
systematic, and disciplined” organization of Islamic fighters.161 It is also believed that the
International Islamic Relief Organization162 (IIRO) had provided financial support to the
AHAI.163 The ASG established associations with Al Qaeda in the 1990s when Janjalani
156 Rommel Banlaoi, Al-Harakatul Al-Islamiyah: Essays on the Abu Sayyaf Group, 3rd ed. (Quezon
City: Philippine Institute for Peace, Violence, and Terrorism Research, 2012), 52−53.
157 Ibid.
158 Banlaoi, Al-Harakatul Al-Islamiyah, 15.
159 Garret Atkinson, “ASG: The Father of the Swordsman,” American Security Project, March 2012,
1, https://www.americansecurityproject.org/wp-content/uploads/2012/03/Abu-Sayyaf-The-Father-of-the-
Swordsman.pdf.
160 Al Harakatul Al Islamiyah−Founded by Abdurajak Janjalani in 1993 as an Islamic Movement
when he and his other followers officially decided to break away from the Moro National Liberation Front
and became a new group of Mujahideen.
161 Banlaoi, Al-Harakatul Al-Islamiyah, 34.
162 This organization was created in 1978 by the Muslim World League and is currently based in
Saudi Arabia. It collects “donations, zakat, and sadaqah” to provide socio-economic assistance to
“Muslims in war-torn and disaster-affected areas.” In 2006, the U.S. Department of the Treasury tagged
IIRO branches in the Philippines and Indonesia as terrorist front organizations. Source: Berkeley Center for
Religion, Peace, and World Affairs, https://berkleycenter.georgetown.edu/organizations/international-
islamic-relief-organization.
163 Banlaoi, Al-Harakatul Al-Islamiyah, 17.
32
met Bin Laden while in Peshawar, Pakistan. Janjalani also established links and became
closely associated with Ramzi Yousef of Al Qaeda.164
The Mujahideen Commando Freedom Fighters (MCFF) was the origin of the
ASG.165 Banlaoi claims that this response is a reaction to the alleged atrocities committed
against Muslims in the Philippines.166 This group attracted several members in the
provinces of Basilan, Sulu, Tawi-Tawi, and some parts of the Zamboanga peninsula.167
In 1991, the ASG split from the Moro National Liberation Front (MNLF) because of the
latter’s failure to advance the group’s main goal of having “a separate and independent
Islamic State in the southern Philippines.”168
The ASG believes that peace talk and political settlement with the Philippine
government are not the solution for the apparent oppression, economic marginalization,
and injustices against the Filipino Muslims.169 For the ASG, the peace agreement
between the MNLF and the Philippine government was a “betrayal of four centuries of
struggle of the Bangsamoro170 people.”171 Abuza claims that in the early years of
separation, the ASG attempted to sabotage the ongoing talks between the MNLF and the
Philippine government.172 The group was tagged as a terrorist organization when it
bombed M/V Doulos, a Christian missionary ship, docked at the Zamboanga City port.173
164 Zachary Abuza, “Balik-Terrorism: The Return of the ASG,” accessed July 10, 2016, 2,
http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?PubID=625.
165 Atkinson, “ASG: The Father of the Swordsman,” 3.
166 Banlaoi, Al-Harakatul Al-Islamiyah, 53.
167 Ibid.
168 Zack Fellman, “Abu Sayyaf Group,” Center for Strategic Studies and International Studies, case
study no. 5 (November 2011): 2.
169 Ibid.
170 The term pertains to the description of the national identity of Muslims in Mindanao, Philippines.
Bangsamoro people refers “to those at the time of conquest and colonization were considered natives or
inhabitants of Mindanao and the Sulu Archipelago and its adjacent islands including Palawan, and their
descendants, whether or mixed or of full blood, shall have the right to identify themselves as Bangsamoro
by ascription or self-ascription.” Source: “Bangsamoro Basic Law Document,”
http://www.gov.ph/2014/09/10/document-the-draft-bangsamoro-basic-law/.
171 Banlaoi, Al-Harakatul Al-Islamiyah, 25.
172 Abuza, “Balik-Terrorism: The Return of the ASG,” 3.
173 Banlaoi, Al-Harakatul Al-Islamiyah, 17.
33
Then, from 1993 to 1995, the ASG began abducting locals and foreign nationals to
include an American missionary and 11 Filipino tourists.174
Although the ASG had been involved in several kidnapping activities, it remains
and continues to be an Islamic terrorist organization. Banlaoi argues that this is an
offshoot of the 9/11 attacks when the United States tagged the ASG as a foreign terrorist
organization.175 He claims that the designation of the ASG is also a viable justification
for the deployment of U.S. troops in Mindanao to assist and train the Armed Forces of the
Philippines in counterterrorism.176 Arguably, the United States intends to protect its
interests and maintain its influence in the Philippines. Khadafy Janjalani tried to revive
the ASG by returning it to its roots as a genuine Islamic movement and employing
terrorism and other forms of violence as its political weapon. 177 When Galib Andang, an
ASG sub-commander in Sulu, was captured in 2004, the ASG began its series of
bombing attacks and disregarded for a while its KFR activities.178
Zack Fellman argues that the death of Andang allowed Janjalani, with the support
of other radical sub-commanders, to control the entire organization and redirect its efforts
to the main political goal of the group—to form an Islamic State in Mindanao.179 He
claims that two key bomb experts of Jemaah Islamiyah (JI), Umar Patek and Dulmatin,
went to the southern Philippines and linked with the ASG. While seeking refuge with the
ASG, Patek and Dulmatin trained several ASG members in bomb-making techniques.180
These linkages of the ASG and JI led to a series of terrorist attacks in the
Philippines: the bombing of the Davao International Airport in 2003, the bombing of
Super Ferry 14 in 2004, and the bus bombing during Valentine’s Day in 2005. More than
174 Luke M. Gerdes, Kristine Ringler, and Barbara Autin, “Assessing the Abu Sayyaf Group’s
Strategic and Learning Capacities,” Studies in Conflict and Terrorism 37, no. 3 (2014): 268, DOI:
10.1080/1057610X.2014.872021.
175 Banlaoi, Al-Harakatul Al-Islamiyah, 90.
176 Ibid.
177 Rommel Banlaoi, “The ASG Group: From Mere Banditry to Genuine Terrorism,” Southeast Asian
Affairs (2006): 256, DOI: 10.1353/saa.2006.0001.
178 Ibid.
179 Fellman, “Abu Sayyaf Group,” 3.
180 Ibid., 4.
34
150 persons were killed in these incidents and hundreds more were wounded.181 These
terrorist attacks demonstrated that the ASG as a genuine terrorist group, motivated by its
political and religious agenda, which has the capability of conducting terrorist attacks
outside of its traditional area of operations.
While the ASG’s strength has been diminished drastically—to not more than 400
combatants this year—it can still conduct violent attacks because of its capacity to arouse
strong local support from the Muslim population.182 According to Gracia Burnham and
Dean Merrill, a former ASG hostage and author of In the Presence of My Enemies, the
ASG had several supporters from different villages in far-flung and mountainous areas of
Sulu, which made it harder for the AFP to conduct pursuit operations.183 Zachary Abuza
claims that the ASG has emerged as “a serious security threat to the Philippines” and
arguably a threat for peace and security in the region.184 It is one of the smallest and
arguably the most radical and dangerous terrorist group in the Philippines, and is known
to have strong Al Qaeda and JI links. The ASG forged alliances with some MILF
members and became a critical partner for JI.185 This group had also linked with Misuari
Group members or armed men loyal to MNLF leader Nur Misuari, who oftentimes act as
mercenaries or provide sanctuary for the group in exchange for payment.186 Ferdinand
Napuli claims that the ASG offered high-powered firearms and monetary rewards for
potential young recruits to build up its ranks.187
The various sub-groups of ASG or other lawless elements can still forge tactical
alliances during the conduct of operations and criminal activities.188 However, it is not a
tactical concern for the ASG if they operate as one big group or independently; this group
has the capability of staging small-unit and “high-impact terrorist attacks” not only in
Zamboanga Peninsula, Basilan, and Sulu but also in other parts of the country.189
The ASG is also capable of employing guerilla tactics. The ASG can pin down a
unit up to company size, typically when troops are ambushed in a pre-designated killing
zone.190 According to Banlaoi, “one important strength of the ASG, despite its small
number, is its superb ability to solicit local support.”191 He also claims that one purpose
of the ASG’s kidnapping activities and other criminal acts is to acquire a huge amount of
money in order “to build up its manpower and help the local communities.” In return,
these communities will provide protection and serve as safe haven for the terrorists.192
These ASG-controlled communities also provide crucial logistical support—firearms,
explosives, and ammunitions.193
When the ASG is engaged in its area of operation, it has a “superb capability” to
support besieged members in a short period of time.194 The ASG is extremely effective in
its traditional areas of operation, particularly in Basilan and Sulu Provinces, because of
its mastery of the terrain and crucial support from other armed elements operating within
the area.195 More reinforcements are expected when the engagement area is near Muslim
villages or Moro National Liberation Front (MNLF) and Moro Islamic Liberation Front
36
(MILF) camps.196 Although the ASG has no direct links with other armed groups or
secessionist movements, most members of the group have relatives either in the MILF or
MNLF.197 Because of tribal, religious, and cultural factors, they may help each other and
fight one common enemy. Banlaoi argues that these alliances can be established by
examining the fact that some ASG members are disgruntled members of either the MNLF
or MILF.198
Contrary to popular belief and some media reports, “the ASG is not a
homogenous organization.”202 This organization is a “highly factionalized group of
The vision of Abdurajak Janjalani when he formed the ASG was to establish a
“highly organized, systematized, and disciplined organization.”206 To achieve his vision,
he recruited young, passionate, and “highly educated Muslim leaders who had studied
Islamic theology in Saudi Arabia, Libya, Pakistan, and Egypt.”207 Janjalani’s vision of a
truly organized Islamic resistance movement has an Islamic Executive Council (IEC) that
serves as the main planning and execution body of the ASG. This council is composed of
15 Amirs.208 Under the IEC are two special committees.
In 1998, combined forces of the military and the police killed Abdurajak
Janjalani. This event caused a crumbling of the ASG’s organization and created a
leadership vacuum. The original organizational structure envisioned by Janjalani was
short-lived.209 With no overall leader that would steer and control the organization,
discontent grew among its original members, and it “became [a] mere network of various
armed groups with their own respective Amirs leading and controlling their own loyal
followers.”210 See Figure 3.
203 De Castro, “Abstract of Counter-Insurgency in the Philippines and the Global War on Terror.
Examining the Dynamics of the Twenty-first Century Long Wars,” 144.
204 Banlaoi, Al-Harakatul Al-Islamiyah, 36.
205 Ibid., 38.
206 Ibid., 34.
207 Ibid.
208 Ibid.
208 Ibid., 34−35.
209 Rommel Banlaoi, Counter Terrorism Measures in Southeast Asia: How Effective Are They?
(Yuchengco Center, De La Salle University, Manila, 2009), 50.
210 Ibid.
38
Figure 3. ASG Organization Envisioned by Abdurajak Janjalani.211
39
radicalization in the Middle East. This primary goal implies a radical view that an Islamic
caliphate in Mindanao can only be achieved through armed struggle. The ASG aimed to
form a social and political system similar to the Islamic Republic of Iran that is free from
infidels or non-believers in Islam.216 To achieve this goal, each member of the ASG must
attain the highest level of religious and political commitment through a rigid process of
radicalization.217
Banlaoi claims, “The ASG has two major factions operating autonomously in
Basilan and Sulu provinces of southern Mindanao.”218 It is important to note that “the
Basilan and Sulu factions of the ASG are also factionalized.”219 It has no devoted leader
on whom its members could rely for their survival.220 Different sub-groups of the ASG
“have mixed objectives, from Islamic fundamentalism to plain banditry.”221
From an Islamic Movement in the late 1980s and early 1990s, the ASG became
known in the Philippines as a bandit group because of its immense involvement in
criminal activities, particularly in kidnapping and extortions activities. During this period,
it also perpetrated several bombings and other violent attacks targeting innocent civilians
and government troops. When financial support from Al Qaeda was cut off due to the
discovery of the clandestine operations of Mohammed Jamal Khalifa, the brother in law
of Osama Bin Laden, in the Philippines, the ASG resorted to KFR as a primary means of
acquiring crucial resources for the survival of the organization. Since then, the ASG has
actively engaged in KFR as its major source of funds because support from international
terrorist organizations has been limited due to extensive counterterrorism measures of the
Philippine government in collaboration with its regional partners and other allies.
In 2006, the ASG again fluctuated between terrorism and crime and adopted
criminal methods to pursue its objectives. The Philippine government’s successful
counterterrorism measures coupled with focused military operations led to the arrest and
neutralization of key ASG leaders and members.226 Notable in this effort was the
neutralization of its Amir, Khadafy Janjalani. Another key sub-commander in Sulu, Jainal
Antel Sali, was killed through intelligence-driven military operations. This setback led to
the drastic weakening of the ASG in terms of strength and capability to conduct terrorist
attacks. The death of Khadafy Janjalani created an internal rift that further worsened
relationship among its sub-commanders. The ASG cleverly recovered from this setback,
however, when it unleashed a series of KFR activities from 2008 until 2011. The ASG
amassed millions of dollars from these operations, which lured young Muslims to join the
group.
225 Gerdes, Ringler, and Autin, “Assessing the Abu Sayyaf Group’s Strategic and Learning
Capacities,” 268.
226 Banlaoi, Al-Harakatul Al-Islamiyah, 90.
41
E. CONCLUSION
Despite its small size and mostly operating in southern Mindanao, the ASG
remains the most brutal terrorist organization in the Philippines. In the absence of foreign
funding from foreign terrorist organizations, the ASG has been changing its strategies
and tactics and becoming more resilient. The ASG’s employment of combined terrorist
and criminal methods makes this group more resilient. It also enjoys a robust support
network, alliances with other lawless elements and threat groups, and collaboration with
foreign terrorists. Through its aggressive and effective criminal activities, principally
kidnap for ransom, the ASG successfully generates funds for its sustenance as well as its
terrorist and criminal operations. Although the military approach may decimate this
group, it seems ineffective to prevent further terrorist attacks or more specifically curb its
KFR operations. Facing a hybrid organization, the Philippine government must consider
as well a hybrid response that comprises a balanced application of criminal and military
approaches. It is important, however, that comprehensive political and socio-economic
measures must be instituted to deter others from joining the ASG and to prevent future
acts of terrorism and crime.
42
III. THE ABU SAYYAF GROUP’S PLACE ON THE CRIME-
TERROR CONTINUUM
Knowing and understanding the definitions of terrorism and organized crime can
be helpful and crucial for the Philippine government to come up with effective
approaches and responses against a hybrid organization—the ASG. As Banlaoi points
out, the ASG has mutated into a “hybrid violent group.”232 It is incorrect to view this
organization as an ordinary criminal group or genuine terrorist group because it has
227 “United Nations Convention Against Transnational Organized Crime and the Protocols Thereto,”
United Nations Office on Drugs and Crime, accessed August 15, 2016,
https://www.unodc.org/documents/treaties/UNTOC/Publications/TOC%20Convention/TOCebook-e.pdf.
228 Mitchel P. Roth and Murat Sever, “The Kurdish Workers Party (PKK) as Criminal Syndicate:
Funding Terrorism Through Organized Crime, A Case Study,” Studies in Conflict & Terrorism 30, no. 10
(August 20, 2007): 901, DOI: 10.1080/10576100701558620.
229 Roth and Sever, “The Kurdish Workers Party (PKK) as Criminal Syndicate,” 901.
230 Ibid.
231 Ibid.
232 Rommel Banlaoi, “Duterte’s Challenges: Terror, Crime and the ASG,” Rappler Philippines, May
13, 2016, http://www.rappler.com/thought-leaders/132875-duterte-challenges-terror-crime-abu-sayyaf.
43
shifted into a “dubious multiple character” that demonstrates the attitude of a brutal
criminal group and dangerous behavior of a terrorist organization.233
This chapter argues that the ASG has reached the first three phases—Alliances,
Operational Motivations, Convergence—of Makarenko’s CTC model. This CTC model
illustrates the interaction—and interoperability—of crime and terror on a continuum,
which theoretically explains the convergence of crime and terror at a central point.234
This chapter is organized as follows: First, it highlights various definitions of organized
crime and some significant similarities and differences as compared with terrorism, but
this section deals more on organized crime since several definitions of terrorism have
been discussed in Chapter I. Second, it outlines and explains one by one the four points of
the continuum—Alliances, Operational Motivations, Convergence, and the “Black Hole.”
Third, it discusses the case of the ASG and considers its position on the Crime-Terror
Continuum. Finally, this chapter highlights some significant sources of the ASG’s
resilience.
Defining exactly what organized crime is, like terrorism, arouses debate among
security experts and lawmakers alike.235 Jay Albanese defines organized crime as a
“continuing criminal enterprise that rationally works to profit from illegal activities [and
whose] continuing existence is maintained through the use of force, threats, monopoly
control, and/or the corruption of public officials.”236 For the Federal Bureau of
Investigation (FBI), organized crime is defined as follows:
237 “Organized Crime,” Federal Bureau of Investigation, accessed July 15, 2016,
https://www.fbi.gov/about-us/investigate/organizedcrime/glossary.
238 Harmonie Toros and Luca Mavelli, “Terrorism, Organized Crime and the Biopolitics of Violence,”
Critical Studies on Terrorism, 6, no. 1 (April 05, 2013): 77, DOI: 10.1080/17539153.2013.765701.
239 Toros and Mavelli, “Terrorism, Organized Crime and the Biopolitics of Violence,” 78.
240 “United Nations Convention Against Transnational Organized Crime and the Protocols Thereto,”
United Nations Office on Drugs and Crime, iii.
241 Ibid.
242 Ibid.
243 Ibid.
45
liberty of at least four years or more serious penalty]…in order to obtain,
directly or indirectly, a financial or other material benefit.244
It is committed in more than one state; in one state but a substantial part of
its preparation, planning, direction or control takes place in another state;
in one state but involves an organized criminal group that engages in
criminal activities in more than one state; or in one state but has
substantial effects in another state.245
Jennifer Hesterman asserts that the UN Protocol, also known as the “Palermo
Convention,” provided a universally accepted binding document that address
transnational organized crime, and it proposes globally accepted definition of debatable
term such as “trafficking, confiscation, and organized crime.”246
On the other hand, Howard Abadinsky suggests another contentious issue about
the definition of organized crime. He argues that conventional crime is different from
organized crime, and one variable that distinguish them from each other is the
“perpetuity.”247 To illustrate this point, Abadinsky compares Jesse James with the Al
Capone case: both of them, criminal gangs. The Jesse Games Gang, which is considered
a conventional crime group, ended in 1882 when its leader died, while Al Capone’s
imprisonment and death did not keep the organized crime group to which he belonged—
the U.S. mafia—from surviving into the 21st century. Abadinsky suggests eight attributes
that constitute organized crime: “1) has no political goals; 2) is hierarchical; 3) has a
limited or exclusive membership; 4) constitutes a unique subculture; 5) perpetuates
themselves; 6) exhibits a willingness to use illegal violence; 7) is monopolistic; 8) is
governed by explicit rules and regulations.”248
244 “United Nations Convention Against Transnational Organized Crime and the Protocols Thereto,”
United Nations Office on Drugs and Crime, 5.
245 Ibid., 6.
246 Jennifer L. Hesterman, The Terrorist-Criminal Nexus: An Alliance of International Drug Cartels,
Organized Crime, and Terror Groups (Boca Raton: Taylor & Francis, 2013), 25.
247 Howard Abadinsky, Organized Crime, 10th ed. (CA: Wadsworth, 2012), 2.
248 Ibid., 3.
46
Both terrorism and crime employ and benefit from illegal activities, and they tend
to have similar structures that make them more effective and efficient as an organization.
Significantly, organized crime has been a global concern that requires a collective
response of various nations. Criminal organizations cross borders and take advantage of
the concept of “open borders and free markets” among democracies.249 Criminals have
no political objectives; they use intimidation and violence for money, which they, like
any terrorist organization, must have in order to survive.
249 “United Nations Convention Against Transnational Organized Crime and the Protocols Thereto,”
United Nations Office on Drugs and Crime, iii.
250 Hesterman, The Terrorist-Criminal Nexus: An Alliance of International Drug Cartels, Organized
Crime, and Terror Groups, 4.
251 Michael Freeman, “The Sources of Terrorist Financing: Theory and Typology,” Studies in Conflict
and Terrorism 34, no. 6 (May 20, 2011): 461, DOI: 10.1080/1057610X.2011.571193.
252 Ibid.
253 Kjell Hausken and Dipak K. Gupta, “Government Protection Against Terrorism and Crime,”
Global Crime 16, no. 2 (March 26, 2015): 60, DOI: 10.1080/17440572.2015.1019612.
254 Ibid.
255 Toros and Mavelli, “Terrorism, Organized Crime and the Biopolitics of Violence,” 77.
47
B. MAKARENKO’S CRIME-TERROR CONTINUUM
This section illustrates the interaction and interoperability of terrorism and crime
using Makarenko’s CTC. This continuum has four distinct phases, which can explain
collaboration and alliance between terrorists and criminals, and it supports the hypothesis
that the ASG has evolved into a hybrid organization.
1. Alliance Formation
The first phase in the continuum plane is alliance, which basically pertains to the
collaboration between organized crime and terrorism. But organized crime and terrorist
organizations have realized the inherent organizational and security problems present in
alliances. These problems emanate from differences over “priorities and strategies,
distrust, danger of defections, and possible competitions over turf and money.” 256 To
survive and continuously exist, a terrorist organization must always follow its “guiding
principle” and must maintain its operational security by maintaining utmost secrecy in
recruitment, preempting infiltration, and punishing disloyalty among its ranks.257 Thus,
despite obvious advantages of alliances between crime and terrorist groups, this mutual
relationship is only temporary and both organizations still intend to cut off any
connection between them.258
The alliance as the first relationship between organized crime and terrorism as
illustrated in the Makarenko’s CTC is also called the “basic level of cooperation.”259 This
kind of relationship may exist for a short or long period of time, depending on the mutual
cooperation between criminal and terrorist groups.260 At this point of the continuum, the
association between terrorists and criminals are growing stronger in order to learn and
acquire certain skills from each other. Both of them intend to seek “expert knowledge”
48
such as “smuggling, money laundering, counterfeiting, or bomb-making techniques.”261
Also, these alliances can occur to get “operational support” such as access to smuggling
routes, procurement of firearms and explosives, and other important logistical
supplies.262
One good example of this kind of alliance is the case of the Albanian Mafia263
and the Kosovo Liberation Army (KLA). The Albanian Mafia has been known as a
notorious organized crime organization in terms of producing and trafficking drugs. This
group has also been involved in other illegal and criminal activities such as “human
trafficking, arms trading, contract killing, kidnapping, etc.”264 The terrorist perspective of
the Albanian Mafia is best explained through an alliance with the KLA, a terrorist group
that fought for the liberation of Kosovo from Serbia. To protect its organization and
continuously survive as an organized crime organization, it must create an atmosphere of
social and political instability, which further explains why it needs to maintain an alliance
with a terrorist group.265
49
Figure 4. The Crime-Terror Continuum.267
2. Operational Motivations
50
Although organized crime groups have employed terror to achieve their objectives
and apparently engaged the political dimension, notably the main purpose for such
actions was merely “to secure their operational environment.”274 Sustaining their illegal
activities to maximize financial gains remains the primary motivation for these groups
resorting to terror tactics. The series of car-bomb attacks carried out by the Italian Mafia
in the 1990s is a good example of how criminal groups influence their operational
environment. Although these terror attacks seem to give the lie to studies that hold that
organized crime seeks to remain unnoticed by the public, the Italian Mafia, as one
example, has realized the effectiveness of reaching a wider audience—through terroristic
acts.275 Thus, after a series of attacks, terrorism as an operational tool “forced the
[Italian] government into negotiation and compromise.”276
On the other hand, many terrorist groups have opted to maximize the use of
criminal methods as an operational tool to secure crucial funds for its future operations.
The FARC277 is a terrorist organization that extensively engaged in the illegal drug trade.
Other terrorist groups such as “Basque Euskadi Ta Askatasuna (ETA) in Spain, the
Kurdistan Workers Party (PKK) in Turkey, and Sendero Luminoso in Peru” are all
involved in various criminal activities.278 The ASG has relentlessly engaged in
kidnapping, and these criminal activities have become its main source of funds.
51
motivations and aims.”280 These groups have evolved into a hybrid organization in which
their “motivations, organization, and operations” have converged. As Makarenko points
out, this convergence makes it “analytically difficult” to distinguish where is the thin line
that divides organized crime and terrorism.281
3. Convergence
The final point of the crime-terror continuum is the “convergence thesis.” At this
level, both organized crime and terrorist groups have converged into a single entity, but
they are still capable of transforming themselves into an entity that can be seen at the
opposite end of the continuum.282 See Figure 5.
At the “convergence thesis,” both criminal and terrorist groups have reached the
category of “hybrid organizations” and acquire some hybrid characteristics.284 Thus, both
criminal and terrorist groups have now the capacity to transform into crime or terrorism,
and totally change their “aims and motivations” as an organization. In this case, both
52
criminal and terrorist groups have departed from their original identity of political or
criminal entities.285
In “New Age of Terrorism,” Brian Michael Jenkins argues that terrorists are not
“monolithic,” which means that their actions are shaped by “culture, ideology, and
politics.”286 He claims that terrorist groups are capable of innovating tactics, exploiting
the latest technology, and learning from other organizations’ successes.287 As Makarenko
asserts, terrorist groups can shift their operations to crime because of financial gains,
while organized crime groups can turn themselves into terrorists to gain “political
leverage” and disrupt the judicial and legislative process of the government.288 With this,
Makarenko offers two independent components of the convergence thesis: political crime
and commercial terrorism. Although both of them are independent variables, they are still
related to each other as explained below:
a. Political Crime
Political crime pertains to a particular organized crime group that seeks political
objectives, and at the same time has been motivated by the financial or material gains of
its actions. This category is further sub-divided into two parts.289 First, it encompasses
criminal groups who employ terror tactics to further their political objectives by gearing
their terroristic activities toward the disruption of the political or judicial processes of the
country. These criminal groups exert much effort “to block anti-crime legislation” and
gain political control through direct intervention in the political arena and activities of
some government institutions.290
The second category under the first component pertains to the capacity of a
criminal organization to employ terror tactics to attain control or monopoly over
53
economic sectors and financial institutions of the state. In this case, however, the ultimate
objective of a criminal organization is still “to gain political control over the states.” As
Makarenko argues, in a modern era of free market and capitalist economy, economic
strength is one of the crucial components of having a strong political power. The
convergence of crime and terrorism in Albania is one good example of this political
crime. Since the Albanian Mafia had been linked to “Pan-Albanian ideals, politics,
military activities, and terrorism,” it procured arms and military equipment for the
KLA.291 Additionally, members of the Albanian criminal and terrorist groups have dual
and interchangeable membership, and they share the same recruitment base to beef up
their strength.292
b. Commercial Terrorism
54
terrorism sways the government and law enforcement units to focus their investigation on
the political aspects, rather than initiating criminal investigations after the attacks.
Second, terror tactics serve as leverage against the threat posed by rival criminal
groups.295 Some terrorist organizations demonstrate this kind of convergence in which
they have evolved primarily as criminal groups; examples include the FARC, the ASG,
and the Islamic Movement of Uzbekistan. These organizations are mostly involved in the
drug trade, kidnapping, smuggling of arms and goods, and other illegal activities.296
At this phase, both terrorists and criminals have successfully destabilized the
political situation of a particular country and sway the popular support against the
government. The final phase of Makarenko’s CTC model refers to a specific situation
wherein weak or failed states become a suitable environment for the convergence of
organized crime and terrorism. At this point in the continuum, an ideal and safe
environment has been achieved by both criminals and terrorists for their violent, illegal,
or unrestricted operations.297 As Makarenko argues, the “black hole” is the biggest threat
to international security because at this level, political crime and commercial terrorism
have reached a point wherein both organized crime and terrorist organizations “gained
economic and political control over a state.”298 When this situation emerges, two types of
situation will prevail. First, the “black hole” syndrome can trigger chaos, display
characteristics of anarchy, and show signs of political instability that can lead and
develop into failed states such as the case of Afghanistan.299
Second, the “black hole” can create a “criminal state” such as North Korea. To
protect the regime and secure their control and power, these nations extensively use terror
55
tactics. A sector of elite government officials arguably uses their power and position to
maximize profits from various illegal and criminal activities.300
The main goal of the ASG is to create an Islamic state in Mindanao, and this
group realized that armed struggle and linkages with other foreign terrorist organizations
56
are crucial to this goal.304 The M/V Doulos incident marked the beginning of the ASG as
one of the terrorist groups in Mindanao. This terrorist attack was publicly acknowledged
by the ASG, and its popularity immediately spread in the Southern Philippines.305 Soon
after the 9/11 attack in the United States, the ASG was listed as a foreign terrorist
organization by the U.S. State Department.306 This designation led to a stronger
cooperation and collaboration between the United States and the Philippines to combat
terrorism, particularly the threat from the ASG. According to Linda Robinson, Patrick B.
Johnston, and Gillian S. Oak, to defeat the ASG and its local and foreign affiliates, the
Philippines must enhance its military capability in terms of intelligence gathering,
training, and more-capable special units.307
In this period of pure terrorism, the ASG perpetrated numerous notable terrorist
attacks such as bombings, assassinations, mass executions, beheadings, and kidnappings.
Atkinson claims that the most prominent signature of these atrocities was its “extreme
ruthlessness and wanton disregard for life, especially those of Christians.”308
The period of 1991 to 1995 was the initial terror campaign perpetrated by the
ASG in which several high-profile terrorist attacks—mass killings, bombings,
beheadings, and kidnappings—were executed as a way of introducing themselves as a
“full-fledged terrorist group.”309 The “Ipil Massacre” was one of the worst attacks
perpetrated by this group in collusion with some members of the MILF in 1995. In this
incident, the ASG raided the municipality of Ipil, Zamboanga Sibugay Province, killing
304 Manalo, “Philippine Response to Terrorism: The Abu Sayyaf Group,” 37.
305 Banlaoi, Al-Harakatul Al-Islamiyah, 88−89.
306 Linda Robinson, Patrick B. Johnston, and Gillian S. Oak, “U.S. Special Operations Forces in the
Philippines, 2001–2014,” RAND Corporation, accessed September 16, 2016, xxii,
http://www.rand.org/pubs/research_reports/RR1236.html.
307 Ibid.
308 Garret Atkinson, “ASG: The Father of the Swordsman,” American Security Project, March 2012,
5, https://www.americansecurityproject.org/wp-content/uploads/2012/03/Abu-Sayyaf-The-Father-of-the-
Swordsman.pdf.
309 Ibid., 6.
57
80–100 innocent civilians, looting millions of pesos from commercial banks, and burning
the center of the town.310
310 Stephen Cohn, “Countering the Lingering Threat of the Abu Sayyaf Group” (master’s thesis, Naval
Postgraduate School, Monterey, California, September 2007), 20,
http://calhoun.nps.edu/handle/10945/3332.
311 Atkinson, “ASG: The Father of the Swordsman,” 6.
312 Ibid.
313 Banlaoi, Al-Harakatul Al-Islamiyah, 62.
314 Ibid.
315 Atkinson, “ASG: The Father of the Swordsman,” 6.
58
Superferry 14 bombing on 24 February 2004, killing 116 people and
injuring 300 others. This incident was regarded as the worst man-made
disaster in Philippine waters since 9/11 and the worst terrorist attack in
Asia since the 2002 Bali Bombing.
59
level. This kind of alliance enhances each other’s operational capabilities, proficiencies,
and skills in terms of conducting terrorist and criminal activities. When lawless elements
successfully abducted its victim, this group will immediately transfer the hostages to the
ASG, and in this case, the ASG will just send a team to pick up the hostages along the
pre-designated point, which is normally somewhere along the coastline of Zamboanga
Peninsula.320
320 Based on the assessment of the author from one of his Development Reports as Field Station
Commander, 9th ISU, ISG, PA. The area of responsibility of 9th ISU covers the whole Zamboanga
Peninsula, Basilan, and Sulu Provinces.
321 Mayola, “Crime and Terror Nexus in Terrorist Financing Philippines.”
322 Ibid.
323 Makarenko, “Terrorism and Transnational Organized Crime,” 175.
324 Ibid.
325 Alvarez, “A Case Study on ASG Group Kidnapping for Ransom,” 82.
60
Because these groups’ principal motivation is money, they are more ardent in
various illegal activities such as kidnapping, arms and drug trafficking, extortion, and
gun-for-hire. These criminal organizations, however, could be tapped to procure firearms
and explosives for the ASG. Since these lawless elements can easily blend in and roam
around and have the mastery of urban operations, they are more efficient and effective in
providing safe haven and logistical support for the ASG.
On the other hand, the ASG benefits from this alliance with various criminal
elements through sharing of knowledge, expertise, and techniques in conducting
kidnapping operations. Criminal groups and lost commands of the MILF and MNLF
seem to have perfected the conduct of illegal activities in Western Mindanao. Despite the
presence of numerous military and police checkpoints coupled with a naval blockade off
the waters of Zamboanga Peninsula, abduction continuous as a major concern and has
failed to stop. Lawless elements are known to be good in this method of kidnapping
wealthy Filipinos or foreigners in Zamboanga Peninsula. In the absence of foreign
funding since the 9/11 attacks in the United States, the ASG has relied on criminal
activities as its operational tool to acquire funds.326 Aside from this kidnapping spree,
this group has also been involved in extortion in the form of zakat (a religious tax), arms
smuggling, “counterfeiting of goods, illegal drug sales or serving as bodyguards for local
politicians.”327
D. SOURCES OF RESILIENCE
61
Province alone, “46% or 115 of its total 251 villages are affected by the ASG, in Basilan,
25% of its 187 villages are affected by ASG.”330 Moreover, he mentioned that ASG
leaders have also “mastered the skills” of colluding with various lawless elements to
conduct kidnappings and other criminal activities.331 He argues that the problems
emanating from the ASG are an offshoot of long decades of conflict in the Southern
Philippines. These “complex tensions” sprouted the collaboration of “criminal, political,
and militant groups” with shared common objectives and goals for the betterment of
Mindanao.332
62
violence in the southern part of Mindanao, but it has also become the primary source of
resiliency of this terrorist organization.339
E. CONCLUSION
Without money as the life blood of any organization and cessation of foreign
funding from other international terrorist organizations, the ASG will remain a “hybrid
organization” and will not forego strong alliances with lawless elements and other
criminal groups in the Western part of Mindanao. Criminal activities will remain a potent
weapon or operational tool of this group. The ASG had acquired millions of pesos from
63
its kidnapping activities; thus, abandoning these criminal acts may just create opposition
and conflict among its sub-commanders and members. If money is the lifeblood of any
organization, it can also be the root of internal conflict and jealousy among and between
its members.
64
IV. THE ABU SAYYAF GROUP’S KIDNAPPING ACTIVITIES
James J.F. Forest claims that getting the exact data about kidnapping incidents
globally is quite impossible to achieve because of the complexities of how governments
and families of kidnap victims respond or handle the hostage situations. 342 In most cases,
details of the negotiations and ransom payments remain secret because in most countries,
it is the prerogative of the victim’s families to seek or not seek the help of the authorities
to resolve the situation. In most countries and as part of their counterterrorism measures,
it is a state policy of no negotiation or concessions to any terrorist organization. In some
cases, however, the government policy of no concession or no ransom payment may put
the lives of the kidnap victims at risk.
To clearly understand the main source of financing of the ASG, specifically the
Kidnap-for-Ransom (KFR) operations, this chapter highlights and provides an in-depth
analysis of the ASG’s kidnapping activities and trends from 2000 to 2014. It also outlines
and explains the motivations and modus operandi of the group. Some of the factors that
contribute to the relentless kidnappings are also discussed in this chapter. The period
covered is sub-divided into six distinct periods and highlights some notable factors and
explanations about the decline or surge of kidnapping incidents in Mindanao, especially
in Zamboanga Peninsula, Basilan, and the Sulu Archipelago. Additionally, this section
discusses the ASG’s motivations, ransom scheme, modus operandi, and significant
factors that contribute to the relentless kidnappings in the southern part of Mindanao.
342 James J.F. Forest, “Global Trends in Kidnapping by Terrorist Groups,” Global Change, Peace &
Security 24, no. 3 (October 8, 2012): 313-314, DOI: 10.1080/14781158.2012.714766.
343 Philip Alvarez, “A Case Study on ASG Group Kidnapping for Ransom: Okonek-Dielen
Kidnapping” (master’s thesis, Ateneo De Manila University, January 2016), 2.
65
During this period, kidnapping activities served as the main source of funds of the ASG
and its continued existence. In the same manner, the kidnappings allowed the group to
project itself as a dedicated and genuine Islamic movement in the southern Philippines.344
See Figure 6.
From 2000 to 2014, an upsurge in ASG’s KFR activities led to a total of 225
recorded incidents, with 623 kidnap victims. The group carried out both high-impact and
small-scale kidnappings during this period, targeting locals as well as foreign nationals
within and outside the group’s traditional areas of operations. See Figure 7.
For 2000 to 2001, there was an increase in kidnapping incidents, which can be
attributed to the death of the previous Amir, ASG founder Abdurajak Janjalani. Based on
the assessment of the AFP, during this period, the international terrorist organizations,
specifically Al Qaeda, cut their financial support to the ASG amid the death of the
group’s founder.347 Also, this period was characterized by instability for the leadership of
the ASG because some sub-commanders were aspiring to become Amir.348
In this period, the ASG was heavily involved in kidnapping activities. In year
2000−2001 alone, there were 142 incidents of kidnapping that resulted in the death of 16
victims; all of them were attributed to the ASG.349 From 2000 to 2001, the ASG gained its
notoriety in the conduct of kidnapping due to its involvement in the series of high-profile
kidnapping activities in the towns of Sumisip and Lamitan, both of Basilan Province; Dos
Palmas Beach Resort, Puerto Princesa, Palawan; and Sipadan Island, Sabah, Malaysia. In the
town of Sumisip, Basilan, 60 public school teachers and children were abducted and used as
346 Source: Office of the Deputy Chief of Staff for Intelligence, OJ2, ASG Kidnapping for Ransom
Activities (Quezon City: IRAD, 2014).
347 Alvarez, “A Case Study on ASG Group Kidnapping for Ransom,” 55.
348 Ibid.
349 Banlaoi, Al-Harakatul Al-Islamiyah, 18.
67
human shields by the ASG when they entered the town of Lamitan.350 In 2001, they
embarked on a cross-border kidnapping where 21 tourists were abducted in Sipadan Island,
Malaysia. Then later that year, despite intense military operations, the Philippine government
was caught off-guard when the ASG abducted three Americans and 20 other tourists at the
Dos Palmas Beach Resort in Palawan.351 See Figure 8.
For 2002 to 2007, a drastic decline of kidnapping incidents was noted. This
decline of kidnapping incidents was primarily attributed to the arrest and neutralization of
some key personalities of the ASG. The intense military operations conducted by the
AFP drove its key leaders and other sub-commanders to seek temporary protection and
relief in central Mindanao.353 Also, during this period, the resurgence of bombing
operations of the ASG was noted. During this period, the ASG was preoccupied with
bombing operations, which was also a factor in the decline of kidnapping incidents.354
ASG’s support teams in urban areas became preoccupied with procuring IED
68
components and casing their possible targets for bombing operations. These bombing
operations were believed to be conducted in collaboration with other threat groups—JI,
Rajah Solaiman Movement, MILF-Special Operations Group—and other lawless
elements operating in the southern Philippines.355 See Figure 9.
355 Gerdes, Ringler, and Autin, “Assessing the Abu Sayyaf Group’s Strategic and Learning
Capacities,” 269.
356 Source: Office of the Deputy Chief of Staff for Intelligence, OJ2, ASG Kidnapping for Ransom
Activities (Quezon City: IRAD, 2014).
357 Cases wherein the ASG does not conduct planning and surveillance and simply seizes the victim
when the opportunity arises. They will ask for a small amount of ransom payment so the families or
relatives of the victim(s) can produce the money in the soonest possible time. Thus, the ASG has no burden
of keeping its hostages for a long time or engaging in long negotiations.
69
that year was the kidnapping of ABS-CBN correspondent Ces Drilon and two of her crew
in Sulu on June 2008.358 See Figure 10.
For 2009 to 2011, kidnappings continued to be the trend, but this time, more
affluent individuals and foreign nationals were the preferred targets of the ASG. Also,
this period shows that the ASG was slowly improving its operational capabilities and
support network in terms of conducting kidnapping operations.360 See Figure 11.
358 Alvarez, “A Case Study on ASG Group Kidnapping for Ransom,” 56.
359 Source: Office of the Deputy Chief of Staff for Intelligence, OJ2, ASG Kidnapping for Ransom
Activities (Quezon City: IRAD, 2014).
360 Alvarez, “A Case Study on ASG Group Kidnapping for Ransom,” 57.
70
Figure 11. ASG Kidnapping Trends (Focus on 2009−2011).361
For 2012, this period recorded a decrease of ASG kidnapping, which can be
attributed to the extended detention of several kidnap victims who were abducted in 2010
and 2011. See Figure 12.
For 2013 to 2014, the ASG engaged in both small-scale and high-profile
kidnappings. Based on the data obtained, some kidnapping incidents are not reported or
361 Source: Office of the Deputy Chief of Staff for Intelligence, OJ2, ASG Kidnapping for Ransom
Activities (Quezon City: IRAD, 2014).
362 Ibid.
71
recorded because some kidnap victims were released even before it came to the attention
of the police. Sometimes relatives of the kidnap victims opted to stay silent and negotiate
with the kidnappers without any help from the authorities. Small-scale kidnappings
became the most favored scheme among the ASG and other lawless elements because
negotiation would only last from a matter of hours to a few days. The ransom payment
from this scheme ranges from a minimum of PHP5,000 to hundreds of thousands of
pesos (US$150 to US$2,000).
With regard to the ransom amount, the Philippine government vehemently denied
that ransom had been paid for the release of some of the kidnap victims. The military
insisted that full-scale military operations had pressured the ASG to free some of the
hostages. There was one video clip uploaded to the Internet, however, which showed a
crisp stash of PHP 1,000-peso bills allegedly paid by the German couple who were
363 Alvarez, “A Case Study on ASG Group Kidnapping for Ransom,” 59.
364 Source: Office of the Deputy Chief of Staff for Intelligence, OJ2, ASG Kidnapping for Ransom
Activities (Quezon City: IRAD, 2014).
72
abducted last 2015 between the waters off Sabah, Malaysia and Palawan, Philippines.
Nevertheless, it is general knowledge in Mindanao that most kidnap victims paid a
certain amount for their freedom. In most cases, the Philippine government is not privy to
the ransom payment between the abductors and relatives of the kidnap victims. Caren
Gwen Mayola claims that in 2010, the ASG earned around US$704,000 in ransom
payments.365
As already noted, there are instances when relatives of kidnap victims opted to
negotiate directly with the abductors utilizing reliable contacts or middlemen who could
establish reliable communication lines between the families and the kidnappers. Because
of the limited information about the ransom payment, the only data that can be obtained
is from 2010 to 2014. This data is only an estimated ransom amount paid to the ASG
during the said period. See Figure 14.
Table 1 shows the number of kidnap victims, to include their nationalities, who
are still in captivity of several threat groups in Mindanao. At present, the ASG is still
holding 31 kidnap victims. Some of these victims had been in captivity since 2010 and
2011.
In her book, 10 Days, 10 Years: From Bin Laden to Facebook, Maria Ressa
argues that the core motivation of the ASG is relatively hard to comprehend as compared
with the motivation of Al Qaeda, which is simple and universal in nature. 368 She claims
that the terrorism problem in the Philippines is not ideological because “the root causes of
the problems” stem from the unaddressed grievances of the Muslim population such as
rampant corruption and a bad political system in which only the elite have control and
influence over resources and little is being shared with the people.369
Forest claims that terrorist organizations resort to kidnap for ransom “to achieve
two kinds of goals: political or financial.”370 He also writes that terrorist groups are
motivated to get involved in kidnappings because of vengeance, protection of their
organizational secrets, or to create an environment of fear to coerce and control the local
367 Adapted from Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the
ASG Kidnapping Activities (Taguig City: Production Branch, 2014).
368 Maria Ressa, 10 Days, 10 Years: From Bin Laden to Facebook (Mandaluyong City: Anvil, 2012),
9.
369 Ibid.
370 Forest, “Global Trends in Kidnapping by Terrorist Groups,” Global Change, Peace & Security,
322.
74
populace.371 Forest asserts that some terrorist groups’ motivation is also to seek publicity
or attention.372 As Phil Williams observed about the phenomenon of kidnapping
activities in Iraq, most terrorist groups use kidnappings as a way of getting much
attention because it provides a sense of statement and importance for the organization.373
Cindy Combs’ argument about hostage taking and kidnapping is similar to Williams’
claim.374 She argues that because audience and public attention are crucial to any terrorist
attacks, this tactic has been proven effective.375 Thus, it is appealing to the terrorists
because they can control both the length of the incident and media coverage.376
Based on recent information obtained from various field reports, there are three
main reasons why the ASG resorts to kidnapping. First is economics; the lack of access to
personal advancement prompts the locals to engage in kidnapping or to join the ASG in
this criminal activity.377 Second is the socio-cultural reason; the funds that the ASG
obtains through its kidnapping activities also help the communities and in some way
alleviate poverty in those areas by providing financial assistance to the poor families.378
Thus, the people would continue to support the ASG, and this group may win the hearts
and minds of the populace within its area of operation and influence. Finally, although
ransom money is being divided among its members for personal sustenance, it is also
crucial for the group’s operational capabilities.379 Funds obtained from these criminal
activities go to the procurement of firearms, ammunition, explosives, speed boats,
371 Forest, “Global Trends in Kidnapping by Terrorist Groups,” Global Change, Peace & Security,
322.
372 Ibid.
373 Phil Williams, Criminals, Militias and Insurgents: Organized Crime in Iraq (Carlisle, PA: US
Army War College, Strategic Studies Institute, 2009), 111, quoted in James J.F. Forest, “Global Trends in
Kidnapping by Terrorist Groups,” Global Change, Peace & Security, 24, no. 3 (October 8, 2012): 322,
DOI: 10.1080/14781158.2012.714766.
374 Cindy C. Combs, Terrorism in the Twenty-First Century, 4th ed. (Upper Saddle River, NJ:
Pearson/Prentice Hall, 2006), 144.
375 Ibid.
376 Ibid.
377 Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the ASG Kidnapping
Activities (Taguig City: Production Branch, 2014), 3.
378 Ibid.
379 Ibid.
75
vehicles, and other operational requirements either for the next kidnapping activities or
bombing attacks.380
First, the Philippine government has failed to implement strictly the “no
negotiation with terrorists” and no-ransom policies. Some local politicians are requested
by the families of the kidnap victims to facilitate the negotiations and the eventual
payment of ransom.384 Caren Gwen Mayola claims that local politicians are the most
preferred hostage negotiators because of their connections with the ASG.385 One good
example of this situation was when a local politician was utilized as hostage negotiator on
380 Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the ASG Kidnapping
Activities (Taguig City: Production Branch, 2014), 3.
381 “Philippines Travel Warning,” U.S. State Department, accessed June 30, 2016,
https://travel.state.gov/content/passports/en/alertswarnings/philippines-travel-warning.html.
382 Ibid.
383 Ibid.
384 Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the ASG Kidnapping
Activities (Taguig City: Production Branch, 2014), 6.
385 Mayola, “Crime and Terror Nexus in Terrorist Financing Philippines.”
76
behalf of Warren Rodwell, an Australian citizen who was abducted in his residence at the
municipality of Ipil, Zamboanga Sibugay Province in 2012.386 Such politicians can
effectively facilitate the negotiation because they know exactly who can be employed as
negotiators who can effectively communicate with the ASG.387
386 Geoff Chambers, “Freed Hostage Warren Rodwell Kidnapped After Love Took Him to Philippine
Region of Mindanao,” New Corps Australia Network, accessed June 30, 2016,
http://www.news.com.au/national/freed-hostage-warren-rodwell-kidnapped-after-love-took-him-to-
philippine-region-of-mindanao/story-fncynjr2-1226609494451.
387 Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the ASG Kidnapping
Activities (Taguig City: Production Branch, 2014), 6−7.
388 Ibid.
389 Ibid.
390 Ibid.
391 Ibid.
392 Ibid.
77
matter as compared to some small-time kidnapping syndicates in other parts of the
country. Confronting a terrorist organization that employ criminal methods and
collaborating with other lawless elements have been a daunting task for the PNP-
AKG.393 The ASG has emplaced a network of support agents and has learned a lot in
KFR activities in collaboration with other lawless elements.394
Finally, the Philippines’ extensive coastlines and porous border, as well as the
inadequate maritime patrol and law enforcement capabilities, make the country more
vulnerable to cross-border kidnapping. This kind of geographical situation is the primary
reason why the ASG brazenly abducts someone within the territory of Sabah, Malaysia
and within the territorial waters of Indonesia. The coastlines of Zamboanga peninsula
alone seem to be an enormous job for maritime units of the police, Philippine Coast
Guard, and Philippine Navy. Most kidnapping incidents led to the recovery of burned
vehicles near the coastline in which the abductors transferred the kidnap victims into a
motorized boat then sped away, going to Basilan or Sulu.395
D. CONCLUSION
The ASG’s evolution into a hybrid organization and combined use of terrorism
and crime as a tool made it a more challenging threat for the government, particularly the
relentless KFR activities in Mindanao. These illicit activities have greatly affected the
economy and tourism industry of the southern Philippines as well as the international
reputation and image of the country. The ASG attempted to politicize its cause by
justifying kidnapping as part of its ideological and political struggle “to establish an
independent Islamic state”396 in Mindanao. Actual motivation remains fund generation
and the personal gain of its members. Funds derived from ransom payments are used for
personal sustenance and to procure logistics, firearms, watercrafts and other war materiel.
393 Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the ASG Kidnapping
Activities (Taguig City: Production Branch, 2014), 6−7.
394 Ibid.
395 Ibid.
396 Fellman, “Abu Sayyaf Group,” 2.
78
The ASG remains the most serious threat and is continuously the primary concern
with regard to peace and security of the country as a whole. The fusion of terrorism and
crime enable the ASG to survive and remain a formidable foe, and this group would
continue to evolve and adapt to the counterterrorism measures and strategy. Joint and
integrated efforts of all stakeholders are crucial in this aspect and present efforts must be
readjusted to confront and effectively address this concern.
79
THIS PAGE INTENTIONALLY LEFT BLANK
80
V. THE PHILIPPINE GOVERNMENT’S APPROACH TO
COUNTERTERRORISM
Daljit Singh claims that some Southeast Asian countries, particularly the
Philippines, have a long history of political violence in which insurgent groups employ
terrorism as a tactic to achieve their objectives.397 He points out that because of
continuous violence and threats of terrorism, Southeast Asian countries’ economies,
foreign investment, and international reputations are heavily affected.398 Rommel
Banlaoi asserts that, based on the 2013 Country Reports on Terrorism published by the
U.S. Department of State, terrorism remains the most pressing security concern of the
Philippines. Specifically, the country remains vulnerable to threats and other acts of
terrorism emanating from non-state actors who are “involved in insurgency, banditry, and
other violent activities.”399 The Philippines’ war against terrorism has been waged for
almost five decades. This internal conflict has drained the country’s resources, and it has
burdened the country’s economy and law and order.
This chapter discusses the evolution and salient points of the Philippine
counterterrorism strategy and examines the four critical approaches—inter-agency
cooperation, legislation, intelligence collaboration, and military operations. Although it
seems that the current CT strategy and approaches are doing well against the ASG, they
have innate weaknesses and need further restudy to be more responsive in recognizing
the ASG as a hybrid organization. This chapter contends that to implement effectively the
national strategy for counterterrorism as embodied in the National Security Policy (NSP)
of 2011−2016, the Philippine government must rectify its errors and inherent weaknesses
on these four approaches to counterterrorism.
The chapter is organized in six parts: the first part highlights the Philippine
counterterrorism strategy and policy. The second part examines the inter-agency
397 Daljit Singh, “Responses to Terrorism in Southeast Asia,” Journal of Policing, Intelligence and
Counter Terrorism 4, no. 1 (2009): 15, DOI: 10.1080/18335300.2009.9686921.
398 Ibid.
399 Banlaoi, “Current Terrorist Groups and Emerging Extremist Armed Movements in the Southern
Philippines,” 164.
81
coordination and integration and how it functions and supports the fight against terrorism.
The third part discusses the legislative measures focusing on the anti-terrorism law that
was enacted to combat terrorism. The fourth part outlines the intelligence approach and
measures and how other government agencies contribute to strengthen gathering and
sharing of information. The fifth part explains the military approach in which the Armed
Forces of the Philippines lead the role. The sixth and seventh parts outline some of the
significant problems or gaps identified in relation with the CT strategy and approach.
Lastly, the chapter concludes and analyzes how the Philippine counterterrorism strategy
can assist in understanding the ASG as a hybrid organization.
400 National Intelligence Coordinating Agency, The National Anti-Terrorism Strategy, Anti-Terrorism
Council (Quezon City: ATC Secretariat, 2009).
401 Ibid.
402 Allan J. Behm and Michael J. Palmer, “Coordinating Counterterrorism: A Strategic Approach to a
Changing Threat,” Terrorism 14, no. 3 (2008): 175, DOI: 10.1080/10576109108435874.
403 Manalo, “Philippine Response to Terrorism: The Abu Sayyaf Group,” 73.
82
that all actions are done within the bounds of the law. 404 As stated in Section 2,
Paragraph 1 of the HSA of 2007, “it is the policy of the state to protect life, liberty, and
property from acts of terrorism, to condemn terrorism as inimical and dangerous to the
national security of the country and to the welfare of the people, and to make terrorism a
crime against the Filipino people, against humanity, and against the law of nations.”405
Aguirre writes that as a member of the United Nations, the Philippines actively
adhere to international conventions as well as to some bilateral and multi-lateral treaties
that would “prevent, suppress and counter all forms of terrorism.”406 With this
commitment, he claims that the Philippines became an “active proponent and signatory to
the ASEAN and APEC Declarations” to combat terrorism and actively cooperate and
collaborate with its regional neighbors and other allies.407 The Philippines ratified and
signed the UN Security Council Resolution Numbers 1373, 1267, and 1390 on terrorism.
Manalo asserts that to enhance cooperation and to effectively combat terrorism, the
Philippine government must engage its regional partners and other allies, particularly the
ASEAN, and the United States.408
83
5. Synchronizing internal efforts with global outlook
6. Legal measures
7. Promotion of Christian and Muslim solidarity
8. Vigilance against the movement of terrorists and their supporters,
equipment, weapons and funds
9. Contingency plans
10. Comprehensive security plans for critical infrastructure
11. Support of overseas Filipino workers
12. Modernization of the Armed Forces of the Philippines and the Philippine
National Police
13. Media support
14. Political, social and economic measures409
In June 2009, the Anti-Terrorism Council (ATC) approved the National Anti-
Terrorism Strategy (NATS). The goal of this strategy is to effectively counter terrorism
and to achieve a “physically and psychologically secure environment conducive for peace
and socio-economic development.”410 It has the following objectives:
1. To protect life, liberty and property from acts of terrorism
2. To condemn terrorism as inimical and dangerous to the national security
of the country and to the welfare of the Filipino people
3. To make terrorism a crime against the Filipino people, against humanity
and against the law of nations411
Several concepts guide the implementation of the strategy. First, it must be a
comprehensive approach that considers the terrorist threat as hindrance to economic
409 “Fourteen Pillars of Policy and Action Against Terrorism,” Official Gazette of the Republic of the
Philippines, accessed May 18, 2016, http://dict.gov.ph/wp-
content/uploads/2014/07/MO37_s2001_CriticalInfra.pdf.
410 National Intelligence Coordinating Agency, The National Anti-Terrorism Strategy, Anti-Terrorism
Council (Quezon City: ATC Secretariat, 2009).
411 Ibid.
84
stability peace and security.412 As stated in the National Security Policy (NSP) of 2011–
2016, counterterrorism requires a comprehensive approach that takes into consideration
the political, economic, diplomatic, military, and legal aspects to fully understand and
properly address the root causes of the problems.413 Second, it is collaborative in the
sense that it involves the entire government machinery and is in partnership with the
private sector and local communities in developing and delivering an adaptable anti-
terrorism strategy.414 Public awareness of the threat, understanding of the government
measures, and active support and cooperation with law enforcers are crucial to the
success of the strategy.415 Through the national anti-terrorism strategy, the Philippine
government may be able to achieve a secure and peaceful environment conducive to
progress and sustainable development.416
Generally, the NSP outlines a three-tiered defense system that comprises the
“enhancement of the intelligence capabilities, protection and security of vulnerable
412 “Securing the Gains of Democracy: National Security Policy 2011−2016,” Official Gazette of the
Republic of the Philippines, accessed May 10, 2016, http://www.nsc.gov.ph/index.php/national-security-
policy-2011-2016.
413 Ibid.
414 Ibid.
415 Ibid.
416 National Intelligence Coordinating Agency, The National Anti-Terrorism Strategy.
417 “Securing the Gains of Democracy: National Security Policy 2011−2016,” Official Gazette of the
Republic of the Philippines.
418 Ibid.
85
targets, and enhancement of readiness and preparedness in the event of a successful
terrorist attack.”419 According to this document, to achieve all of these, the Philippine
government must enhance its security counter-measures, apply effective legislative and
legal measures, and employ effective mechanisms to prevent or preempt terrorist attacks
and prevent individuals from resorting to acts of terror.420 Ananda Devi Domingo-
Almase claims that the NSP provides a strategic guidance “to strengthen public
institutions, protect the environment, combat terrorism, engage in regional cooperation,
and modernize the armed forces.”421
419 “Securing the Gains of Democracy: National Security Policy 2011−2016,” Official Gazette of the
Republic of the Philippines.
420 Ibid.
421 Ananda Devi Domingo-Almase, “What the Subject of Security Really Means: A Look Into the
Content and Context of the 2011–2016 National Security Policy in the Philippines,” National Defense
College of the Philippines, 88, http://www.ndcp.edu.ph/nsr.php.
422 Manalo, “Philippine Response to Terrorism: The Abu Sayyaf Group,” 14.
423 Lynn E. Davis, Gregory F. Treverton, Daniel Byman, Sara A. Daly and William Rosenau,
“Coordinating the War on Terrorism,” RAND, March 2004, 2,
http://www.rand.org/pubs/occasional_papers/OP110.html.
424 Ibid.
86
Davis et al. claim that the policy makers in the United States realized that “the
instruments of counterterrorism,” such as “hostage negotiations, intelligence cooperation,
and international legal regimes” are connected; thus, it requires close coordination
between the Departments of State, Justice, and Defense, and the CIA.425
Inter-agency coordination can effectively address the root causes of the problem.
With regard to terrorism, it is essential to address the underlying reasons that drive
certain individuals to become a terrorist or commit acts of violence and understand the
socio-cultural aspect of the environment in which they thrive and operate.426 Zachary
Abuza argues that the majority of Southeast Asian countries have “weak political
institutions, decentralized politics, poor resources,” and are marred by rampant
corruption. Weak institutions and lack of government control make them more attractive
to terrorist groups.427 He claims that corruption has been prominent in weak states; as
such, rivalries between state security forces over jurisdiction and illegal activities have
been a common problem. To clearly understand the terrorism problem, there must be an
in-depth analysis of the situation and consideration of various underlying factors, which
in this case, requires an effective and active inter-agency cooperation and coordination.
Integration of efforts allows maximum synchronization of all activities and prevents
jeopardizing the strategic approach of the government. Additionally, when inter-agency
mechanisms have been set up, they provide effective monitoring, feedback, and
assessment of all concerned agencies, which ensures that all efforts are appropriate,
suitable, and relevant.
Command and coordination structures, which are coherent and responsive, have
proven critical in any counterterrorism approach. Bruce Hoffman and Jennifer Morrison-
Taw emphasize one of the elements that is important in counterterrorism: “an effective
425 Davis, Treverton, Byman, Daly, and Rosenau, “Coordinating the War on Terrorism,” 3.
426 State Department and Department of Defense, U.S. Government Counterinsurgency Guide
(Washington, D.C.: Department of State, January 2009), Preface.
427 Zachary Abuza, Militant Islam in Southeast Asia, Crucible of Terror (Boulder, Colorado: Lynne
Rienner Publishers Inc., 2003), 18.
87
overall command and coordination.”428 They claim that prior to any attack or
disturbance, the government should have established a functioning command and
coordination structure. This is important to prevent confusion, competition among
agencies, duplication of efforts, and inefficient gathering and dissemination of
information.429 The Philippines has its share of bad experiences with ineffective inter-
agency coordination. Two examples are the incompetence in handling the Sipadan
kidnapping on April 23, 2000 and the Dos Palmas Resort kidnapping incident on May 28,
2001.
To defeat the ASG and other lawless elements in Mindanao requires active
participation and cooperation of all government agencies and institutions. Terrorism
posed by the ASG, particularly its relentless KFR activities, is not only a concern of the
state security forces, but it is the problem of the nation as a whole. Thus, the government
must direct all agencies to participate and work together to defeat the ASG and other
lawless elements in Mindanao. A command and coordination structure that is properly
organized and coherent will lead to an effective integration and sharing of intelligence
among different agencies.430 This structure allows utmost synchronization of efforts in
which all actions and programs of concerned agencies are in line with the national
strategy on counterterrorism.
C. LEGISLATIVE MEASURES
The Philippine government has adopted several legislative and legal measures to
address the threat of terrorism and crime perpetrated by various terrorist groups. After the
9/11 attacks, the Philippine government entered into several international agreements.
The intent was to collectively contribute to the government’s anti-terrorism program and
strengthen global cooperation to fight international terrorism. As a member of the UN,
the Philippine government demonstrates its sincere commitment “to prevent, suppress,
428 Bruce Hoffman and Jennifer Morrison-Taw, “A Strategic Framework for Countering Terrorism,”
in European Democracies Against Terrorism: Governmental Policies and Intergovernmental Cooperation,
ed. Fernando Reinares (Aldershot, UK; Brookfield, Vt.: Ashgate, 2000), 9.
429 Hoffman and Morrison-Taw, “A Strategic Framework for Countering Terrorism,” 9.
430 Ibid., 16.
88
and counter all forms of terrorist acts in accordance with the UN Charter and UN
Resolutions or declarations,” particularly with UN Security Council Resolutions 1267,
1373, and 1390, UN Global Counter-Terrorism Strategy, and other relevant international
laws.431 These international commitments and agreements also include law enforcement-
focused arrangements that support the anti-terrorism program, including mutual legal
assistance treaties and other international relationships, such as the Association of
Southeast Asian Nations (ASEAN), the ASEAN Regional Forum (ARF), and other multi-
lateral engagements.432
The Philippine anti-terrorism law, the Human Security Act of 2007, states that
anyone “sowing and creating a condition of widespread extraordinary fear and panic
among the populace, in order to coerce the government to give in to an unlawful demand
shall be guilty of the crime of terrorism.”439 It outlines how terrorism is punishable under
the Philippine law, specifying that those convicted “shall suffer the penalty of forty (40)
years of imprisonment, without the benefit of parole as provided for under Act No. 4103,
otherwise known as the Indeterminate Sentence Law, as amended.”440
Alexander Aguirre points out that the Philippine government enacted the Human
Security Act of 2007, which defines terrorism as a crime and provides penalties for such
acts.441 He claims that in order to be used for law enforcement operations this definition
was formulated without appropriate legislative policy on terrorism. This terrorism law
further states that the State recognizes that counterterrorism requires a comprehensive
approach that includes political, diplomatic, economic, military, legislative and other
factors.442 According to Aguirre, however, this approach should take into consideration
what the root causes of the problems are without recognizing them as a justification to
conduct terrorist acts and other forms of violence.443 It should be noted, however, that the
law in itself is not a strategy to combat terrorism.444
437 Bobby Tuazon interview July 31, 2008, quoted in Pauline E. Eadie, “Legislating for Terrorism:
The Philippines’ Human Security Act 2007,” Journal of Terrorism Research 2, no. 3 (November 11, 2011):
28, http://jtr.st-andrews.ac.uk/articles/10.15664/jtr.226/#.
438 Eadie, “Legislating for Terrorism: The Philippines’ Human Security Act 2007,” 28.
439 “Human Security Act of 2007,” Congress of the Philippines.
440 Ibid.
441 Aguirre, “The Philippine Response to Terrorism,” 47.
442 Ibid.
443 Ibid.
444 Ibid.
90
To suppress terrorism financing, the Philippine government ratified some laws
and executive orders to cut the flow of funds and freeze the assets of the local and foreign
terrorist groups. Rommel Banlaoi asserts that in 2001, the Philippine congress approved
the Anti-Money Laundering Act as one of the countermeasures for this purpose.445 To
further bolster the legislative approach against terrorist financing, President Benigno
Aquino approved the Republic Act Number 10168, otherwise known as the “Terrorism
Financing Prevention and Suppression Act of 2012.”446 This law is the response of the
Philippine government to its commitment to the “International Conventions for the
Suppression of the Financing [of] Terrorism and other binding terrorism-related
resolutions of the UN Security Council.”447 This law requires banks and financial
institutions to report dubious transactions involving funds that have possible links to
terrorists, and to freeze properties, funds, and related accounts of suspected terrorist
groups and individuals who are associated with Al Qaeda.448
The enactment of HSA of 2007 and other related laws to combat terrorism in the
Philippines has resulted in the apprehension of several terrorist personalities, particularly
members of the ASG. Although there are some criticisms about the Philippine anti-
terrorism law, it serves as deterrence for an individual to commit acts of terror or any
forms of violence.
Cabalza argues that the Philippine anti-terrorism law is too broad and only
reinstates the crimes listed in the Revised Penal Code of 1932 or Republic Act No. 3815,
which is an 84-year-old law now.449 He claims that the crimes that are listed in the HSA
of 2007 are deemed punishable under the Revised Penal Code in which there must be
clear parameters in converting common crimes into terrorism. The HSA of 2007 is the
only Philippine law that strictly penalizes torture and imposes stiff penalties and fines on
445 Banlaoi, Counter Terrorism Measures in Southeast Asia: How Effective Are They? 78.
446 “The Terrorism Financing Prevention and Suppression Act of 2012,” Congress of the Philippines,
accessed August 18, 2016, http://www.congress.gov.ph/download/?d=ra_results&ra_title=terrorism.
447 Ibid.
448 “Philippine Experience in Combating Terrorism” (lecture, Training and Doctrine Command,
Philippine Army, February 20, 2013).
449 Cabalza, “Deconstructing Human Security in the Philippines,” 5.
91
law enforcers.450 Although it is a benchmark for the Philippine law to prosecute
terrorists, it needs some legal amendments to synchronize its provisions and make some
logical connections between its sub-sections. This law is a combination of 62 sections
and 22 provisions without “discernable structure, no headings or sub-headings, and no
groupings of sections.”451 Cabalza asserts that this law “authorizes preventive detention,
expands the power of warrantless arrest, and allows for unchecked invasion of privacy,
liberty and other basic rights.”452
Singh argues that each state must fight its terrorism concern within its national
jurisdiction employing its full capacity and resources to defeat and destroy any terrorist
organization.455 He asserts that this national effort must be reinforced with sound and
effective intelligence cooperation with other countries because of the transnational nature
Additionally, collaboration and relations among regional partners and other allies
are crucial in counterterrorism strategy. Intelligence sharing is one of the critical
advantages of this endeavor because cooperation and collaboration unite all efforts of all
countries to combat international terrorism. It establishes good relationships to work
closely with domestic and foreign counterparts “to predict, prevent, deter, and suppress
acts of terrorism.”460 To strengthen border controls and sharing of intelligence, it is
important that concerned countries have strong and regular bilateral and multi-lateral
engagements.461 These kinds of activities enhance cooperation and sharing of critical
456 Singh, Terrorism in South and Southeast Asia in the Coming Decade, xix.
457 Ibid.
458 Manalo, “Philippine Response to Terrorism: The Abu Sayyaf Group,” 19.
459 Ibid.
460 Aguirre, “The Philippine Response to Terrorism,” 54−55.
461 Tan, “Counter-Terrorism in Southeast Asia Post-9/11,” 216.
93
information through regular intelligence exchange and conference between countries.462
Tan notes that after the 9/11 attacks, ASEAN countries issued a joint declaration and
agreed to cooperation to combat domestic and international terrorism.463 He points out
that these nations agreed to strengthen national mechanisms and sharing of intelligence,
and to support all actions and initiatives of the UN. One good example of this is the
regular intelligence exchange between the U.S. Pacific Command and Southeast Asian
countries. Also, notable in this endeavor are the Global Counter-terrorism Forum (GCTF)
and the ASEAN Defense Ministers Meeting Experts Working Group on Counter-
terrorism.
The threat posed by the ASG as a hybrid organization requires not just efficient
and effective means of recruiting reliable informants and collecting quality information,
but importantly, this information is being shared among other intelligence agencies and
units. Arguably, sharing of intelligence has been one of the weaknesses and perennial
problems of the Philippines in its fight to destroy the ASG. Daniel Byman claims that
“Israel’s intelligence services are fabled around the world for their efficiency, skill, and
seeming omniscience.”470 He points out that the successes of Israel in counterterrorism
depend on its efficient and constant sharing of information at all levels and closely
integrating intelligence in all military operations.471 Relentless KFR activities can be
preempted or prevented if all intelligence agencies have quality informants who have
good access and placement on the ASG and other criminal organizations. David Bonner
claims that intelligence operatives and informants are critical factors in a successful
counterterrorism approach, and their cover must be protected at all times.472 Hoffman
467 Hoffman and Morrison-Taw, “A Strategic Framework for Countering Terrorism,” 11.
468 Iztok Prezelj, “Improving Inter-Organizational Cooperation in Counterterrorism: Based on a
Quantitative SWOT Assessment,” Public Management Review 17, no. 2 (May 17, 2013): 211, DOI:
10.1080/14719037.2013.792384.
469 Ibid.
470 Daniel Byman, A High Price: The Triumphs and Failures of Israeli Counterterrorism (NY: Oxford
University Press, 2011), 369.
471 Ibid., 370−371.
472 Bonner, “United Kingdom: The United Kingdom Response to Terrorism,” 192.
95
and Morrison-Taw argue that proper use of information is critically important to any
counterterrorism campaign.473 They point out that the most important tasks in this aspect
are the coordination and dissemination of intelligence, which can only be done through a
centralized intelligence organization that can effectively relay information to the tactical
units.
According to Condoleezza Rice, “true victory will not come merely when the
terrorists are defeated by force, but when the ideology of death and hatred is overcome by
the appeal of life and hope, and when lies are replaced by truth.” 474 As Benjamin
Netanyahu argues, “while military measures should not be the first option, they should
never be excluded from the roster of possibilities.”475 On the other hand, terrorist
organizations, whether state or non-state actors, must feel that the likelihood of extreme
military retaliation is expected if they would resort to violence. 476 Along that line, Israel
responded with massive military operations and a series of targeted killings of suspected
terrorists. Clive Jones claims that this military approach led to the arrest or killing of
senior leaders and destroyed the military infrastructure of Hamas. 477 Despite the brutality
of this method, it received “wide public support in Israel.”478 Decapitation of the terrorist
organization by targeted killings may not end terrorism or stop violence, but it served as
deterrence and saved hundreds of innocent lives.479 This war-fighting strategy adopted by
Israel disrupted the enemy’s plan and damaged their capabilities to conduct further
attacks.
473 Hoffman and Morrison-Taw, “A Strategic Framework for Countering Terrorism,” 15.
474 Daniel Byman, The Five Front War: The Better Way to Fight Global Jihad (Hoboken, New Jersey:
John Wiley & Sons, 2008), 180.
475 Netanyahu, Fighting Terrorism: How Democracies Can Defeat the International Terrorist
Network, 134.
476 Ibid.
477 Jones, “Israel and the Al-Aqsa Intifada: The Conceptzia of Terror,” 127.
478 Ibid.
479 Ibid., 128.
96
When former President Gloria Arroyo declared her “Fourteen Pillars of Policy
and Action” to combat terrorism, the Philippine government enacted General Order
Number 2 “directing the Armed Forces of the Philippines (AFP) and the Philippine
National Police (PNP) to prevent and suppress acts of terrorism and lawless violence in
Mindanao.”480 The AFP is specifically mandated to strengthen and develop its
counterterrorism capabilities and to conduct sustained and focused military operations
against the ASG and other terrorist groups. On the other hand, the PNP is directed to
strengthen its security measures and police visibility to protect vital installations. They
are also mandated to develop and strengthen their police counterterrorism capabilities,
particularly in urban fighting and hostage situations.
97
Nevertheless, the main thrust of the Philippine government against the ASG is
through focused military operations. The end state of the AFP’s focused military
operations is to downgrade internal armed threats so that “they can no longer threaten the
stability of the state and civil authorities can ensure the safety and well-being of the
Filipino people.”483 Even if the AFP destroys completely the ASG, however, terrorism
and crime will persist as the main security challenges for the Philippines if the political
and socio-economic condition in Mindanao remains the same. To complement this
approach, the military has been instituting some measures to undermine ASG’s popular
support from the communities under its influence.484 Santiago Ballina claims that with
the help of the United States, the Philippines adopted a whole-nation approach through
various socio-economic measures to reduce poverty and provide essential public goods
for the poor communities where the ASG thrives.485 He claims, however, that this
strategy still heavily focuses on military operations and does not adequately address the
broader and root problems in Mindanao such as marginalization and weak institutions.
The military approach will not completely eradicate the threat, but other approaches will
be futile without taking into consideration the role of the military. On the other hand, the
government should take strong measures and feasible strategies to address political,
social, and economic issues.
483 “Internal Peace and Security Plan Bayanihan,” Scribd, accessed July 30, 2016,
https://www.scribd.com/document/46302366/AFP-Internal-Peace-and-Security-Plan-IPSP-BAYANIHAN.
484 Peter Chalk, Angel Rabasa, William Rosenau, and Leanne Piggott, The Evolving Terrorist Threat
to Southeast Asia: A Net Assessment (Santa Monica, CA: RAND Corporation, 2009), 133,
http://www.rand.org/pubs/monographs/MG846.html.
485 Ballina, “The Crime-Terror Continuum Revisited,” 132.
98
officials claim that the ASG has become a bunch of criminals, but there is no compelling
countermeasures have been introduced to fight this so-called nexus of terrorism and
crime. The approach remains the same of employing a war model to counterterrorism
without completely understanding the underlying root causes of the problems and
knowing the precise category of the ASG as a threat group. Terrorist and criminal
organizations are two different entities; thus, they may require different approaches to
defeat and deter their violent and criminal activities.
Lack of strong political will to implement the comprehensive strategy and
approach to counter terrorism.
To effectively eradicate the ASG and other lawless elements in Mindanao, the
current administration may consider exerting strong political will to implement the most
comprehensive counterterrorism strategy, a strategy that deals with both the terrorism and
criminal nature of the ASG. Strong political will may encompass prosecuting some
unscrupulous local politicians and government officials, particularly members of the
military and police, who are supporting and colluding with the ASG. The current political
leadership must push and exert strong pressure on all concerned departments, agencies,
and LGUs to do their mandated tasks and responsibilities to completely defeat and
eradicate the ASG’s terrorist and criminal activities. Implementation and enforcement of
important laws and executive directives for different departments, agencies, and LGUs
also require strong political will. No matter how good the security policies of the national
government are, if some concerned actors are not doing their jobs the effort may
inevitably fail.
The Philippines has a weak legislation and criminal justice system to
combat the nexus of crime and terrorism.
The anti-terrorism campaign of the Philippine government is anchored on the
HSA of 2007 or the Philippines’ main anti-terrorism law. Arguably, this law seems
ineffective to protect the people and the state against terrorism. The current anti-terrorism
law needs some critical amendments to address certain issues and gaps in order to be
more effective. As part of the legislative approach to combat terrorism, this law should be
a potent tool of law enforcement agencies to effectively prosecute suspected terrorists and
their associates. On the other hand, this law has a vague definition of the term terrorism,
99
and terrorism offenses are merely copied from the old version of the Revise Penal Code.
This law treats criminal offenses under the old Revised Penal Code as terrorism, thereby
creating “a condition of widespread fear and panic among the populace.”486 Some of the
provisions of the law are contrary to the protection of human rights and privacy. In
addition, it does not explicitly define the tolerable or acceptable penalties and damages.
Notably, as of now, this law has never been used in court to prosecute suspected
terrorists—directly or indirectly involved in terrorist activities—because some legal
experts argue that this law is legally and basically hard to use.
Intelligence politicization and competition among intelligence units of
different government agencies hampered the effectiveness of the current
counterterrorism strategy.
Politicization has been one of the challenges of the intelligence agencies. As
Robert Gates claims, “the problem of politicization is as old as the intelligence
business.”487 Mark Lowenthal argues that the problem of politicization is like “two
spheres of government activity separated by a semipermeable membrane.”488 He explains
that policymakers are free to offer assessments of intelligence while intelligence officers
are not allowed to influence policymaking.489 Politicization may destroy the credibility of
the intelligence organization in terms of providing inaccurate analysis and assessment.
Accurate and timely intelligence are important for policymakers to help them in their
decision-making process, and the intelligence community can provide these
requirements. Intelligence’s main role is only to support, and it cannot cross the line to
influence the jobs of policymakers. In some cases, policymakers offer input on or accept
only intelligence that is advantageous to their political interests and personal gains.490
Eduardo Estévez claims that politicization of the Argentinian military intelligence led to
486 Eadie, “Legislating for Terrorism: The Philippines’ Human Security Act 2007,” 30.
487 Robert Gates, “Guarding Against Politicization – Central Intelligence Agency,” CIA, March 1992,
https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/volume-36-number-
1/html/v36i1a01p_0001.htm.
488 Mark Lowenthal, Intelligence: From Secrets to Policy, 6th ed. (Washington, DC: CQ Press, 2014),
6.
489 Ibid.
490 Cristiana Matei, “Overview and Functions of Intelligence in a Democracy.”
100
the South Atlantic Conflict, in which the intelligence services provided inaccurate
interpretation of the collected information.491
491 Eduardo Estévez, “Intelligence Community Reforms: The Case of Argentina,” in Intelligence
Elsewhere. Spies and Espionage Outside the Anglosphere, eds. Philip H.J. Davies and Kristian C.
Gustafson (Washington, DC: Georgetown University Press, 2013), 222.
101
the attacks. The whole-nation approach will not work if one of the actors is not doing
their mandated tasks.
Some politicians down to the local level have been suspected of coddling
and supporting the ASG, particularly in the kidnapping operations.
Source of funds is important to any organization, and the ASG’s main source of
financing is KFR operations. Reportedly, some local politicians in Mindanao are not only
coddling this group, but some of them are also financing this criminal activity. Even
though it is common knowledge that some corrupt politicians have been conniving with
the ASG, no one has been convicted or sanctioned for this misdemeanor.492 Additionally,
some members of the ASG who are employed as private armed groups or militias of
some local politicians contribute to the problem.
Most of the kidnap victims are negotiating and paying the ransom for their
safety and freedom.
According to the Special Report on this subject conducted by the Philippine
Army, there are cases wherein a kidnap victim’s family paid in full or through installment
basis prior to the release of the hostage.493 The ASG provides proof of life photos or
video clips posted on the Internet or sent directly to the families of the victims prior to
receiving a portion of the total ransom payment.494 In some cases, the ASG uses the “pay
now or be kidnapped later” scheme in which the target is threatened with kidnapping,
forcing the victim to pay to avoid being abducted by the group. The ransom is less than
that of abducted victims due to minimal operational expenses; the group refers to this
money as a board and lodging fee. The ASG also conducts checkpoints, targeting local
residents and temporarily holds the victim for a couple of hours until a certain amount of
money is paid in exchange for their release.495
492 Based on the experience of the author as Field Station Commander of 9 th ISU, Intelligence and
Security Group, Philippine Army based in Zamboanga Peninsula.
493 Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the ASG Kidnapping
Activities (Taguig City: Production Branch, 2014), 4.
494 Ibid.
495 Ibid.
102
The ASG seems to favor direct negotiation with the victim’s family or relatives
due to the prospect of higher and actual ransom payment.496 In some cases, however, the
ASG also uses mediators or third-party negotiators, especially if the group is unable to
directly communicate with the victim’s relatives.497 One example is the kidnapping
incident of Randelle Talania of Titay Town, Zamboanga Sibugay Province in 2011. He
was just a nine-year-old boy that time when armed men took him in front of the Titay
Elementary School.498 The ASG utilized one village chieftain from Basilan to
communicate with the families of the kidnap victim. This man, who acted as mediator,
informed the families about the ransom demand and other requirements of the child.499
The knowledge and expertise of the negotiator is crucial during the negotiation
process. According to Peter Dobbs, “the nominated negotiator needs to be fluent in the
kidnappers’ language and preferably have some knowledge of the region.”500 He claims
that a good negotiator must immediately establish rapport with the kidnappers, ask for
proof of life, and make sure that demands are clearly stated before making any offer for
the release of the victim.501 In addition, some local politicians and prominent individuals
also facilitate the negotiation for the release of some kidnap victims.502
Some ASG sympathizers—Muslim and Christians—act as tipster or
spotter for the terrorist group in exchange of monetary rewards or a share
of the ransom.
The spotter plays an important role in kidnap for ransom activities as he or she is
often tasked to come up with a list of possible targets who are either capable of paying
496 Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the ASG Kidnapping
Activities (Taguig City: Production Branch, 2014), 4.
497 Ibid.
498 “Gunmen Free Abducted Boy in Zamboanga,” Philippine Star, accessed June 30, 2016,
http://www.philstar.com/breaking-news/727137/gunmen-free-abducted-boy-zamboanga.
499 Based on the experience of the author as Field Station Commander of 9 th Intelligence and Security
Unit, ISG, PA during the conduct of operations to rescue kidnap victim Randelle Talania.
500 Peter Dobbs, “Kidnap and Ransom Today,” Catlin Group Limited, October 2012, 18,
http://www.catlin.com/flipbook/kidnap-and-ransom-today/files/inc/342692550.pdf.
501 Ibid.
502 Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the ASG Kidnapping
Activities (Taguig City: Production Branch, 2014), 5.
103
the ransom demand or are connected to personalities or entities that are capable of
paying.503 While the ASG is currently constricted in some areas of Basilan and Sulu,
some of its members are residing in urban areas and are being utilized as spotters for
possible targets.504 When the target is chosen, casing and surveillance follow
immediately. There are also cases where the ASG does not conduct planning and
surveillance and simply seizes the victim when the opportunity arises, however.505
The military and police have failed to dismantle various lawless elements
and private armed groups that provide operational and logistical support to
the ASG.
In the execution of kidnapping activities, especially outside the traditional areas of
operation, the ASG taps local criminal groups and other lawless elements to kidnap the
target in return for a share of the projected ransom payment.506 In some cases, criminal
elements conduct the kidnapping themselves and then transfer the victim to the ASG. To
get a higher ransom payment, the ASG engages in the negotiation because it has already
established a brutal reputation of beheading its victims if demands are not met on time.507
In this case, the lawless elements would either be paid for their expenses or wait until the
ransom is paid.508
The ASG also utilizes proven and tested tactics and possible routes to transfer the
kidnap victims to Basilan or Sulu. Lawless elements and the ASG excel in both the
planning and the execution of their kidnapping operations.509 In fact, despite naval
blockades along the waters off Zamboanga peninsula and the Sulu Archipelago, the ASG
has successfully evaded government forces and gotten away by utilizing only small
motorized boats.510 The presence of several military detachments and other checkpoints
104
in various places and strategic choke points in Zamboanga peninsula appear to be
ineffective.511
One good example was the kidnapping of Rodney Rodwell, an Australian citizen
who is married to a Filipina and residing near the center of the municipality of Ipil,
Zamboanga Sibuga Province.512 The ASG executed a daring kidnapping operation by
boldly abducting Rodwell from his residence despite the presence of various military and
police outposts in the area. These security measures do not preempt the ASG from
abducting someone in the middle of the city or town center.513
The collaboration and coordination between criminal organizations and the ASG
in conducting joint criminal activities seem to be very effective and efficient.514 The
group takes advantage of small islets and mangrove areas for hiding and evading
pursuing government forces prior to being transferred to the group’s temporary
encampments.515 Notably, the geography of Basilan, Sulu and Tawi-Tawi is a key factor
in the conduct of ASG kidnappings as the different islands provide ideal escape routes
and safe havens.516
H. CONCLUSION
One of the challenges for the Philippine government with regard to terrorism is
the ASG. The ASG has been fluctuating between terrorism and crime, and has become a
serious security concern that poses a tremendous threat to the internal peace and security
of the Philippines. To come up with an appropriate counterterrorism strategy or approach,
it is imperative to grasp this nexus of crime and terrorism. Although the Philippine
511 Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the ASG Kidnapping
Activities (Taguig City: Production Branch, 2014), 4−5.
512 Julie Alipala, “Australian Kidnapped in Philippines−Military,” December 5, 2011, Philippine
Daily Inquirer, http://globalnation.inquirer.net/20281/australian-kidnapped-in-
philippines%E2%80%94military.
513 Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the ASG Kidnapping
Activities (Taguig City: Production Branch, 2014), 5.
514 O'Brien, “Fluctuations Between Crime and Terror,” 326−327.
515 Office of the Assistant Chief of Staff for Intelligence, OG2, Special Report on the ASG Kidnapping
Activities (Taguig City: Production Branch, 2014), 5.
516 Ibid., 4−5.
105
government’s counterterrorism strategy and approach has successfully apprehended or
neutralized several ASG personalities, the ASG remains a capable and resilient
organization. The case of the ASG as a hybrid organization requires some changes on the
current strategy, and intense military operations alone will not work. Since KFR is the
main source of financing of this group, the response must be coupled with a
comprehensive national strategy to stop KFR activities and dismantle its network and
support system.
106
VI. CONCLUSION
The nexus of crime and terrorism—as exemplified by the ASG—has been one of
the challenges in Mindanao. Most terrorist organizations have learned to adapt to the
current security environment in order to survive and be more operationally capable in
terms of conducting attacks and securing a steady flow of funds. Although the ASG had
been involved in other criminal activities, this paper examines the ASG’s kidnapping
operations because it is one of the major concerns and made the current CT strategy seem
ineffective or possibly inadequate in eradicating terrorism and crime in the southern part
of Mindanao. Additionally, the ASG’s Kidnap-for-Ransom (KFR) operations, as a case
study, provide a good window into how the fusion of terrorism and crime can be clearly
understood and analyzed. This can help policymakers and state security forces to come
up with a comprehensive set of countermeasures. Knowing and understanding precisely
the ASG’s place in the Crime-Terror Continuum model will help policymakers to come
up with comprehensive policies and approaches against these security concerns.
Additionally, understanding the ASG as a hybrid organization will help lawmakers to
enact appropriate laws that will effectively prosecute terrorists who employ criminal
methods as a tool. The ASG’s strength or influence might be reduced, but if the root
causes of the problems are not properly addressed, then the terrorist organization will
continue to survive and will persist as a perpetual threat.
The following is the summary of findings generated by this research:
517 Banlaoi, “Current Terrorist Groups and Emerging Extremist Armed Movements in the Southern
Philippines,” 164.
107
numerous armed groups in Mindanao that are engaged in various terroristic and criminal
activities, the ASG has become a more formidable and resilient organization.518
2. The Philippine CT strategy remains focused on a military model approach
to confront the ASG.
The threat posed by the ASG is not just a military and police problem. The
problem of terrorism and crime posed by the ASG and other lawless elements in
Mindanao requires a whole-government approach. This approach pertains to collective
efforts and shared responsibilities of different government agencies, departments, NGOs,
and other private sectors and stakeholders.
Although the Philippines’ current CT strategy and approach have resulted in some
notable accomplishments, particularly the arrest and neutralization of notorious key
personalities of the ASG, the threat of terrorism and other violent activities, especially the
rampant kidnapping activities in Mindanao, persists. This concern greatly affects the
peace and security situation of the country. One of the objectives of inter-agency
cooperation and collaboration is fusion and synchronization of efforts to destroy the ASG
and its criminal activities. An effective oversight council, along with appropriate
mechanisms, is crucial to engage and unite the efforts of other actors in national
government agencies and civil society.
3. The current anti-terrorism law of the Philippines (Human Security Act of
2007) proved to be incoherent and ineffective as a legislative measure to
deter or prevent terrorism.
The Philippine anti-terrorism law is too broad, and it just reinstates the crimes
listed in the Revised Penal Code of 1932, which is an 84-year-old law as of this
writing.519 The criminal offenses that are listed in this law are deemed punishable under
the Revised Penal Code, in which there must be clear parameters in converting common
crimes into terrorism.520 As discussed in Chapter I, anyone that commits a felony as
enumerated by this anti-terrorism law shall be prosecuted as a terrorist. For instance,
518 Banlaoi, “Current Terrorist Groups and Emerging Extremist Armed Movements in the Southern
Philippines,” 164.
519 Cabalza, “Deconstructing Human Security in the Philippines,” 5.
520 Ibid.
108
anyone who commits murder can be prosecuted as a terrorist. This violates our universal
definition of terrorism because it must be politically or religiously motivated.
The HSA of 2007 has no exact definition of murder or how it is different from
other acts of killing innocent people. This law defines terrorism vaguely or not at all. The
law does not even provide an exact or accurate categorization of the terms terrorism,
mass murder, or hate crime. This law has failed to provide a clear distinction between
terrorist and criminal acts; thus, any violation of felonies as enumerated in this anti-
terrorism law shall be categorized as terrorist acts.
4. The support of some local politicians and the populace within its area of
operations has made the ASG more resilient and effective against the
intensive counterterrorism efforts of the government.
As long as some local communities in Mindanao remain sympathetic to the ASG,
even the best CT strategy and approach will appear ineffective. Undeniably, popular
support is critically important in any war or conflict and winning the hearts and minds of
the people serves as a potent weapon of the ASG. Sympathetic communities in far-flung
areas of Basilan and Sulu provide crucial support that renders intensive military and law
enforcement operations futile. The support coming from corrupt local politicians down to
the community level to the ASG has been also one of the concerns in those areas. This is
one of the reasons why the ASG can evade strategically emplaced military and police
checkpoints and even naval blockades off the waters of Zamboanga, Basilan, and Sulu. In
addition, it can continuously conduct successful domestic and cross-border kidnapping
operations.
5. The cross-border operations will persist because they are strategically and
tactically important for the ASG.
At the tactical level, trans-border kidnapping operations undeniably improved the
group’s capabilities and reinforced their resolve to conduct more high-impact kidnapping
cases due to their tested schemes and perceived high returns in terms of monetary
rewards. Strategically, successful kidnapping operations within the territorial waters of
Indonesia and Malaysia have made the current CT countermeasures and efforts of the
Philippine government ineffective or inappropriate to stop this menace.
109
These kinds of violent activities have put the Philippines in a bad situation and
marred the country’s reputation among its neighboring countries and regional partners.
From a bigger perspective, shifting of the ASG’s activities from terrorism to crime is just
an offshoot of its drive for money and power. But it could be possible that kidnappings—
as a criminal tactic—have been employed as a tool to generate funds in the absence of
foreign support and strict implementation of laws against terrorist financing.
6. The lack of good governance, law enforcement, and sense of security also
prevent the people from resisting ASG’s criminal acts.
Although some local communities or tribes in Zamboanga Peninsula, Basilan, and
Sulu Archipelago have been against ASG’s violent and criminal activities, they opt to
neither take any appropriate action nor cooperate with the military and police because of
possible repercussions if they do so. In some cases, there is no government presence or
semblance of control and governance in those far-flung areas, which makes it favorable
and advantageous for terrorist or criminal organizations. For these communities,
supporting or helping the ASG has been more beneficial than cooperating with
government authorities because in some cases, the ASG has been providing financial
support to poor and unfortunate villages. These areas are tactically important for the ASG
in that they must be controlled and influenced for safe haven, logistical support, and
recruitment bases. This is one of the compelling reasons why this group has been
supported and protected by some Muslim communities, particularly in Basilan and Sulu
Provinces.
Despite the complex identity of the ASG as both a terrorist and a criminal
organization, the response of the Philippine government has not changed. As a result, the
government’s efforts have been less than successful. Although intense military operations
are crucial in any counterterrorism strategy, the military approach alone has proved
inadequate to defeat the ASG. Philippine President Rodrigo Duterte has ordered the
110
Armed Forces of the Philippines to intensify operations against the ASG.521 In response
to this, the Philippine military deployed more combat troops in Basilan and Sulu
provinces. The success of military operations in addressing the ASG, particularly its
criminal activities, cannot be measured by the traditional military parameters alone. In
fact, when the AFP takes the lead role to eliminate the ASG, the probability of success is
considerably low.522 The presence of several military forces in Basilan and Sulu
supported by some units from the PNP Special Action Force has failed to stop the ASG
from conducting kidnapping activities. Recently, a South Korean cargo ship captain and
one Filipino crewmember were abducted in the southern Philippines.523 The ASG
cleverly executed this KFR operation and successfully evaded naval blockades off the
waters of Basilan and Sulu.
Much has been written on how to defeat terrorism in the Philippines, but which
method is the most effective approach to eliminate the ASG can be a subject for debate
and depends on existing variables. Therefore, this thesis offers significant
recommendations to effectively combat the nexus of terrorism and crime, particularly in
the case of the ASG, as enumerated below:
The Philippine government must undertake an in-depth study of the root causes of
terrorism and determine appropriate responses to resolve, eliminate, or prevent the same
causes from coming back. The Philippine government should address the
marginalization, injustices, political oppression, and other grievances of Filipino Muslims
because these issues provide inspiration for others to commit violence. 524 The strength
and resilience of the ASG lies in the weakness of the government to adequately address
521 Trefor Mos, “Philippines’ Duterte Ramps Up Fight With Islamic State-Linked Militants,” The Wall
Street Journal, accessed November 3, 2016, http://www.wsj.com/articles/philippines-duterte-turns-his-
attention-to-abu-sayyaf-extremists-1472539403.
522 “Internal Peace and Security Plan Bayanihan,” Scribd, accessed July 30, 2016,
https://www.scribd.com/document/46302366/AFP-Internal-Peace-and-Security-Plan-IPSP-BAYANIHAN.
523 “Korean Abducted in First Philippines Cargo Ship Raid,” Rappler Philippines, accessed November
3, 2016, http://www.rappler.com/nation/149945-south-korea-ship-captain-kidnapping-philippines.
524 Manalo, “Philippine Response to Terrorism: The Abu Sayyaf Group,” 74.
111
these socio-economic and political issues. Thus, it is important that the Philippine
government take the issues into consideration and act accordingly to address the
“fundamental political, economic, and social grievances” of Muslim Mindanao. 525 To
address the socio-economic and political roots of terrorism is crucial for an effective
counterterrorism strategy because terrorism proves to be politically and ideologically
motivated.
The AFP Internal Peace and Security Plan “Bayanihan” focuses on winning the
peace and not just defeating the enemy. As such, its main objective is supporting
community-based peace and development efforts, especially in conflict-affected areas.
This campaign plan aims to promote the culture of peace. Thus, the AFP supports
counter-radicalization and peace building initiatives, especially in Mindanao. For
instance, the AFP facilitates the conduct of the Bishops-Ulama Forum. This forum is one
way of engaging religious leaders from the Muslim and Christian faiths to enter into a
dialogue in promoting the culture of peace and non-violence. It also serves as a platform
to know the issues and other concerns to enhance further the implementation of peace
education in the madrasah educational system.
The role of Local Government Units (LGUs) has proven to be crucial in counter-
insurgency, particularly in the case of the Philippines where internal conflict has been one
of the perennial concerns. The prevalence of extreme poverty, social and cultural
marginalization, ethnic discrimination, lack of efficient politics and the increasing
economic difficulties in the Southern Philippines are some of the factors that drive
Filipino Muslims to engage in violent extremism or crimes.526 This kind of political and
socio-economic situation tends to be a good opportunity for the ASG to entice Muslim
youths to join its organization. Empowering the LGUs can be instrumental in averting
these outcomes, particularly at the local level. Empowering the LGUs pertains not only to
525 Manalo, “Philippine Response to Terrorism: The Abu Sayyaf Group,” 74.
526 “Assessing ASG’s Capabilities and Vulnerabilities,” Special Report, Intelligence and Security
Group, Philippine Army, May 4, 2016.
112
more financial support from the central government, but also encompasses effective
mechanisms on how they can participate in a forum that will help other government
agencies and institutions eliminate various threat groups.
One of the measures initiated by the Philippine government is the creation of the
Peace and Order Council (POC) at the regional and municipal level. The POC is a
convergence mechanism wherein LGUs are encouraged and influenced to take the lead in
addressing the underlying causes of insurgency and terrorism. The AFP conducts regular
consultations and meetings with leaders of local government units. Since some of the
POC members are political leaders elected by the people, they can influence or task
community leaders to support the fight against terrorism and crime. The military and
police can coordinate with LGUs on how to enhance intelligence networks, particularly
in some far-flung areas that are frequently visited or under the influence of the enemy.
527 William F. Fox Jr., “Legal Aspects of Terrorism,” Terrorism 12, no. 4 (January 8, 2008): 302,
DOI: 10.1080/10576108908435790.
113
The military and police should employ all-source intelligence, which means
fusing multi-source intelligence data into a single correlated picture. To promote
intelligence fusion, the Joint AFP-PNP Intelligence Committee (JAPIC) was created at
the national level and simulated down to the provincial level. Intelligence efforts are
coordinated and controlled through the different Joint Intelligence Committees at all
levels of the AFP hierarchy. Operations and intelligence fusion centers were also
established in the military area commands. Moreover, the AFP coordinates with other
government agencies and departments that are involved in combating terrorism.
Enhance and upgrade the current capabilities of the military and police to meet
the current demand and challenges of the overall anti-terrorism effort of the government.
Technological advances could help a lot in this effort. The Philippine government must
pursue and continue the AFP Modernization Program. Although these upgrades are
primarily intended for territorial defense, the acquisition of the latest military hardware
and equipment can also be crucial in counterterrorism operations. Delfin Lorenzana, the
secretary of the Department of National Defense, points out that he will continue
modernizing the AFP through acquisition of aircraft, sea craft, and other essential
equipment to enhance the capabilities of the military.529 Additionally, the DND has been
530 “New Defense Chief Lays Out Plans for DND, AFP,” GMA News, July 23, 2016,
http://www.gmanetwork.com/news/story/574836/news/nation/new-defense-chief-lays-out-plans-for-dnd-
afp.
531 “AFP Modernization ‘Will Continue as Scheduled’ Under Duterte Admin,” Update Philippines,
July 2, 2016, http://www.update.ph/2016/07/afp-modernization-will-continue-as-scheduled-under-duterte-
admin/6925.
115
These territorial borders proved to be a huge challenge to secure because the AFP
and Philippine Coast Guard (PCG) lack adequate equipment and tools to continuously
conduct security patrols and effectively secure the country’s territorial waters. In
addition, these weaknesses can be offset through multilateral and bilateral cooperation
and collaboration with other Asian neighbors. Abuza points out, “ASEAN is the
appropriate organization to take the lead on counterterrorism, as the mechanisms and
processes are already in place such as the annual meetings of heads of state, foreign
ministers, military chiefs, intelligence chiefs, and police chiefs.”532 The AFP cooperates
with neighboring countries like Indonesia and Malaysia, with whom the Philippines has
existing border patrol and border crossing arrangements. These arrangements help in
securing the tri-border area in the Sulu and Celebes seas and restricting the travel of ASG
and other terrorists to and from these countries.
A traditional military approach is only part of the solution against the kidnapping
operations of the ASG. According to Alvarez, “ASG kidnap for ransom is a simple
problem complicated by several intangible factors, which requires a complex solution. It
necessitates the cooperation of all stakeholders and a sincere desire to end the
problem.”533 The Philippine government should adopt a comprehensive strategy that
integrates all concerned government agencies and institutions. Moreover, this paper
provides policymakers a logical and ground-based understanding of the kidnapping
operations of the ASG. The following recommendations are inter-dependent parts of the
solution to reduce cases of kidnapping in the southern part of Mindanao:
532 Abuza, “Militant Islam,” 249, quoted in Eusaquito P. Manalo, “Philippine Response to Terrorism:
The Abu Sayyaf Group” (master’s thesis, Naval Postgraduate School, Monterey, California, December
2004), 75−76, http://calhoun.nps.edu/handle/10945/1218.
533 Alvarez, “A Case Study on ASG Group Kidnapping for Ransom: Okenek-Dielen Kidnapping,” 93.
116
1. Strict Implementation of the “No Negotiation and No Ransom”
Policies
Corruption must be stopped at the level of the local government units, and those
who are involved in the said malfeasance must be investigated and sanctioned if found
guilty. To get rid of corruption and malfeasance within the ranks of local government
executives, in the police, and in the military, strong political will is also a key factor.
Although the Internal Revenue Allotment (IRA), a revenue share of the local government
units from the Philippine national government, undoubtedly plays a major role in political
activities, this is often not enough to finance political ambitions. As such, some
politicians would resort to other sources of funds, such as kidnapping activities in
collusion with the ASG.
The Philippines must strengthen its border crossing and border patrol
arrangements with its neighboring countries in the south, particularly Indonesia and
Malaysia. To control movement of terrorists and criminals along the borders in the south,
it requires responsive and appropriate border procedures and countermeasures. Joint and
coordinated border security patrols with regional partners along with sharing of
information are crucial to prevent movement of both individuals and funds that have links
with terrorist and criminal activities. There should be more responsive and regular
exchanges at the operational level, and those more extensive linkages should be
developed among multilateral agencies of each country operating in the border areas.
Doing these measures would mitigate the lack of or inadequate operational data
concerning terror organizations, plans, regional associates and sympathizers, and among
others.
118
ideologies.”534 They assert that the government needs “to look beyond the traditional law
enforcement approaches in which authorities intervene just before or after an act of
terrorism.”535 Counter radicalization programs and initiatives must be one of the key
programs of the government “to deter individuals from radicalizing or becoming
radicalized.”536 The Philippine government should appropriate funds in various
community-led initiatives of moderate Muslims.
534 Hedieh Mirahmadi and Mehreen Farooq, “A Community Approach to Countering Radicalization:
A Partnership for America,” The World Organization for Resource Development and Education
(WORDE), v, accessed November 7, 2016, http://www.worde.org/wp-content/uploads/2010/12/WORDE-
Counter-Radicalization-Report-Final.pdf.
535 Ibid.
536 Ibid.
537 Ibid., iv.
538 Ibid.
119
increasingly become a significant medium for radicalizing Muslims and for the ASG to
recruit potential followers by posting radical statements and articles. Integrated and
coordinated efforts should be undertaken to counter ASG propaganda and radicalization
online.
It is estimated that there are between 600 and 1,000 madrasas in Mindanao, with
a total student population of between 60,000 and 100,000.540 This advocacy represents a
major step in upgrading madrasah education in the country and in developing young
Muslims to become progressive, peace-loving, and responsible members of the
community, which in turn will help lure them away from joining the ASG and engaging
in KFR activities.
539 Syarif Hidayat, “The Madrasah Islamic Education in the Philippines,” Mi’raj Islamic News
Agency, accessed October 11, 2016, http://www.mirajnews.com/the-madrasah-islamic-education-inthe-
philippines/59697.
540 Ibid.
120
support this cause. It is crucial for the people to know their true strength, which comes
from their unity to fight the threat and stop the relentless kidnapping in Mindanao.
In one study conducted by Alvarez, he points out that one notable characteristic of
the Tausug tribe is its deep sense of familial ties.541 The bond that unites these Tausug
tribe members became their strongest weapon against the ASG. The elders of this tribe
inculcate an old tradition and culture of closeness and alliances between family members
and relatives by blood or intermarriages. Tausug know very well that strong alliances
stem from the basic social formation—the family.542 These alliances are what make the
entire Tausug tribe very strong. Alvarez cites the case of one place in Sulu—Barangay
Bungkaung543—where a strong family bond evolved into “multi-family alliances.”544
Residents of this barangay strongly opposed the influence of the ASG and its kidnapping
business, which shows that power lies in the unity of the families in the said area.545 This
kind of alliance among Tausug families can be a good model for other Muslim tribes to
emulate in order to resist the threat and influence from the ASG.
541 Alvarez, “A Case Study on ASG Group Kidnapping for Ransom: Okenek-Dielen Kidnapping,” 94.
542 Ibid., 95.
543 One of the Barangays of the Municipality of Patikul, Sulu, Philippines.
544 Alvarez, “A Case Study on ASG Group Kidnapping for Ransom: Okenek-Dielen Kidnapping,” 94.
545 Ibid.
121
rivalry among security forces.546 He also points out that lack of enough police personnel
is one of the factors why the police in England and Wales failed to preempt or prevent
terrorism in its area of responsibilities.
546 Louise Richardson, “Britain and the IRA,” in Democracy and Counterterrorism: Lessons from the
Past, ed. Robert J. Art and Louise Richardson (Washington, DC: US Institute of Peace, 2007), 77.
547 Scott N. McKay and David A. Webb, “Comparing Counterterrorism in Indonesia and the
Philippines,” Counter Terrorism Center, February 27, 2015, https://www.ctc.usma.edu/posts/comparing-
counterterrorism-in-indonesia-and-the-philippines.
548 Richardson, “Britain and the IRA,” 82.
549 “Water villages are settlements that are usually built on the water. Houses often float on the water
or are located on stilts and rarely on small islands.” Source: http://hiddenunseen.blogspot.com/2012/03/top-
10-water-villages-in-world.html.
122
Philippines. Some residents of these water villages are also believed to act as spotters of
potential kidnap victims in Sabah.
The British intelligence approach in Northern Ireland is one good example of how
effective collaboration among intelligence units of the military and police could be
crucial in any counterterrorism operations. Despite several sub-units that are operating
against one specific terrorist organization in Northern Ireland, a clear guideline outlines
how intelligence collection and operations will be conducted. Thus, serious lapses and
problems have been avoided with regard to coordination between the military and the
police.550
C. FINAL THOUGHTS
As terrorism has been evolving and becoming a global concern, various nations
have tried different strategies and approaches to combat terrorism. Although the current
Philippine CT strategy and approach have been successful in decimating the ASG, it
needs further restudy to be more responsive and proactive. Terrorism and crime remain
one of the security concerns in Mindanao, particularly the relentless kidnappings of the
ASG. A strategy and approach must be perfected that is appropriate against hybrid
organizations such as the ASG. Moreover, this perpetual concern of terrorism requires an
in-depth assessment and analysis to come up with a rational and comprehensive set of
countermeasures and responses.
The current deployment of more troops in Basilan and Sulu provinces clearly
suggests that the Philippines heavily relies on fighting terrorism with a military model
approach, and massive deployment of troops and intense military operations do not really
deter or prevent terrorism and crime in Mindanao. Although this approach—as stated in
IPSP “Bayanihan”—intends to involve and encourage the active participation of various
stakeholders, still it seems inadequate and weak in terms of getting the complete support
and cooperation of various concerned government and private agencies and institutions.
123
The Philippine government remains reactive to the terroristic and criminal
activities emanating from the ASG; the countermeasures and approaches that have been
developed and employed do not really deter or prevent terrorism and crime in Mindanao.
Due to the multifarious socio-economic, political and cultural factors that contribute to
the prevalence of kidnapping in Mindanao, the solution to the problem would necessitate
a whole-nation and integrated approach. Various terrorist groups, particularly the ASG,
will continue to pose huge challenges to the Philippine government in the next few years.
The ASG will still see kidnapping as a lucrative undertaking as this has largely sustained
the group and part of the communities where it operates. It is expected that the ASG will
continue with abductions, both within and outside its traditional bases. IED attacks and
other forms of violence will also continue against the military and police and to the
innocent civilians.
124
LIST OF REFERENCES
Abuza, Zachary. Militant Islam in Southeast Asia, Crucible of Terror. Boulder, Colorado:
Lynne Rienner Publishers Inc., 2003.
Abuza, Zachary. U.S. War College. “Balik-Terrorism: The Return of the ASG.”
Accessed April 22, 2016.
http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?PubID=625.
Alipala, Julie. “Abu Sayyaf Releases Norwegian Hostage.” Philippine Daily Inquirer,
September 17, 2016. http://globalnation.inquirer.net/145010/abu-sayyaf-releases-
norwegian-hostage.
Alipala, Julie. “Head of ‘Abu Sayyaf Captive’ Dumped on Sulu Street – Police.”
Philippine Daily Inquirer, April 25, 2016.
http://globalnation.inquirer.net/138928/head-of-abu-sayyaf-captive-dumped-on-
sulu-street-police#ixzz478SrHGGn.
Alvarez, Philip. “A Case Study on ASG Group Kidnapping for Ransom: Okonek-Dielen
Kidnapping.” Master’s thesis, Ateneo De Manila University, January 2016.
Atkinson, Garret. “ASG: The Father of the Swordsman.” American Security Project.
March 2012. https://www.americansecurityproject.org/wp-
content/uploads/2012/03/Abu-Sayyaf-The-Father-of-the-Swordsman.pdf.
125
Ballina, Santiago. “The Crime-Terror Continuum Revisited: A Model for the Study of
Hybrid Criminal Organisations.” Journal of Policing, Intelligence and Counter
Terrorism 6, no. 2 (October 2011): 121–136. DOI:
10.1080/18335330.2011.605200.
Banlaoi, Rommel. “Duterte’s Challenges: Terror, Crime and the ASG.” Rappler
Philippines, May 13, 2016. http://www.rappler.com/thought-leaders/132875-
duterte-challenges-terror-crime-abu-sayyaf.
Banlaoi, Rommel. Al-Harakatul Al-Islamiyah: Essays on the Abu Sayyaf Group, 3rd ed.
Quezon City: Philippine Institute for Peace, Violence, and Terrorism Research,
2012.
Banlaoi, Rommel. Counter Terrorism Measures in Southeast Asia: How Effective Are
They? Yuchengco Center, De La Salle University, Manila, 2009.
Boumghar, Mouloud, Frédéric Ceuppens, and Nabeel Rajab. “Terrorism and Human
Rights in the Philippines: Fighting Terror or Terrorizing?” International
Federation for Human Rights, 1−48. https://www.fidh.org/IMG/pdf/ph493a.pdf.
Bures, Oldrich. “EU’s Fight Against Terrorist Finances: Internal Shortcomings and
Unsuitable External Models.” Terrorism and Political Violence 22, no. 3 (June 8,
2010): 418−437. DOI: 10.1080/09546550903463434.
Burnham, Gracia, and Dean Merrill. In the Presence of My Enemies. Wheaton, Illinois:
Tyndale House, 2003.
Byman, Dan. “Fighting the War on Terrorism: A Better Approach.” In How to Make
America Safe: New Policies for National Security, edited by Stephen Van Evera.
Cambridge, MA: The Tobin Project, 2006.
126
Byman, Daniel. A High Price: The Triumphs and Failures of Israeli Counterterrorism.
NY: Oxford University Press, 2011.
Byman, Daniel. The Five Front War: The Better Way to Fight Global Jihad. Hoboken,
New Jersey: John Wiley & Sons, 2008.
Carrapico, Helena, Daniela Irrena, and Bill Tupman, “Transnational Organized Crime
and Terrorism: Different Peas, Same Pod?” Global Crime 15 no. 3−4 (August 11,
2014): 213−218. DOI: 10.1080/17440572.2014.939882.
Chalk, Peter, Angel Rabasa, William Rosenau, and Leanne Piggott. The Evolving
Terrorist Threat to Southeast Asia: A Net Assessment. Santa Monica, CA: RAND
Corporation, 2009.
Chambers, Geoff. “Freed Hostage Warren Rodwell Kidnapped After Love Took Him to
Philippine Region of Mindanao.” News Corps Australia Network. Accessed June
30, 2016. http://www.news.com.au/national/freed-hostage-warren-rodwell-
kidnapped-after-love-took-him-to-philippine-region-of-mindanao/story-fncynjr2-
1226609494451.
Channel News Asia. “4 Malaysians Released by Abu Sayyaf: Philippine Military.” June
8, 2016. http://www.channelnewsasia.com/news/asiapacific/4-malaysians-
released-by/2854376.html.
Combs, Cindy C. Terrorism in the Twenty-First Century, 4th ed. Upper Saddle River, NJ:
Pearson/Prentice Hall, 2006.
Congress of the Philippines. “Human Security Act of 2007.” Accessed August 15, 2016.
https://www.senate.gov.ph/republic_acts/ra%209372.pdf.
Congress of the Philippines. “The Terrorism Financing Prevention and Suppression Act
of 2012.” Accessed August 18, 2016.
http://www.congress.gov.ph/download/?d=ra_results&ra_title=terrorism.
Croissant, Aurel, and Daniel Barlow. “Following the Money Trail: Terrorist Financing
and Government Responses in Southeast Asia.” Studies in Conflict & Terrorism
30, no. 2 (February 24, 2007): 131−156. DOI: 10.1080/10576100600959721.
127
D’Alfonso, Steven. “Why Organized Crime and Terror Groups Are Converging.”
Security Intelligence. Accessed October 27, 2016.
https://securityintelligence.com/why-organized-crime-and-terror-groups-are-
converging/.
Daily Mail. “Hostages Plead for Their Lives in Abu Sayyaf Ransom Video.” November
1, 2016. http://www.dailymail.co.uk/video/news/video-1220989/Hostages-plead-
lives-Abu-Sayyaf-ransom-video.html.
Davis, Lynn E., Gregory F. Treverton, Daniel Byman, Sara A. Daly and William
Rosenau. “Coordinating the War on Terrorism.” RAND Corporation, March
2004. http://www.rand.org/pubs/occasional_papers/OP110.html.
Domingo-Almase, Ananda Devi. “What the Subject of Security Really Means: A Look
Into the Content and Context of the 2011−2016 National Security Policy in the
Philippines.” National Defense College of the Philippines, 84−106.
http://www.ndcp.edu.ph/nsr.php.
Eadie, Pauline E. “Legislating for Terrorism: The Philippines’ Human Security Act
2007.” Journal of Terrorism Research 2, no. 3 (November 11, 2011): 24−33.
http://jtr.st-andrews.ac.uk/articles/10.15664/jtr.226/#.
Fellman, Zack. “Abu Sayyaf Group.” Center for Strategic Studies and International
Studies, case study no. 5 (November 2011): 1−10.
128
Forest, James J.F. “Global Trends in Kidnapping by Terrorist Groups.” Global Change,
Peace & Security 24, no. 3 (October 8, 2012): 311−330. DOI:
10.1080/14781158.2012.714766.
Fox, William F. Jr. “Legal Aspects of Terrorism.” Terrorism 12, no. 4 (January 9, 2008):
297−315. DOI: 10.1080/10576108908435790.
Freeman, Michael. “The Sources of Terrorist Financing: Theory and Typology.” Studies
in Conflict & Terrorism 34, no. 6 (May 20, 2011): 461−475. DOI:
10.1080/1057610X.2011.571193.
French, Erik. “Kidnapping Risk on the Rise in the Philippines.” Global Risk Insights,
April 9, 2016. http://globalriskinsights.com/2016/04/kidnapping-risk-philippines/.
Gerdes, Luke M., Kristine Ringler, and Barbara Autin. “Assessing the Abu Sayyaf
Group’s Strategic and Learning Capacities.” Studies in Conflict and Terrorism 37,
no. 3 (2014): 267−293. DOI: 10.1080/1057610X.2014.872021.
GMA News. “New Defense Chief Lays Out Plans for DND, AFP.” July 23, 2016.
http://www.gmanetwork.com/news/story/574836/news/nation/new-defense-chief-
lays-out-plans-for-dnd-afp.
Hausken, Kjell, and Dipak K. Gupta. “Government Protection Against Terrorism and
Crime.” Global Crime 16, no. 2 (March 26, 2015): 59−80. DOI:
10.1080/17440572.2015.1019612.
Hewitt, Steve. The British War on Terror: Terrorism and Counter-Terrorism on the
Home Front Since 9/11. London: Continuum International, 2008.
Hidayat, Syarif. “The Madrasah Islamic Education in the Philippines.” Mi’raj Islamic
News Agency. Accessed October 11, 2016. http://www.mirajnews.com/the-
madrasah-islamic-education-inthe-philippines/59697.
129
Hoffman, Bruce, and Jennifer Morrison-Taw. “A Strategic Framework for Countering
Terrorism.” In European Democracies Against Terrorism: Governmental Policies
and Intergovernmental Cooperation, edited by Fernando Reinares, 1−29.
Aldershot, UK; Brookfield, Vt.: Ashgate, 2000.
House of Representatives of the Philippines. “Republic Act 9372: An Act to Secure the
State and Protect Our People from Terrorism.” Accessed August 10, 2016.
http://www.congress.gov.ph/download/ra_13/RA09372.pdf.
Jones, Clive. “Israel and the Al-Aqsa Intifada: The Conceptzia of Terror.” In
International Terrorism Post 9/11: Comparative Dynamics and Responses, edited
by Asaf Siniver, 126−143. NY: Routledge, 2012.
LFP Press. “‘They Will Execute Us’; Kidnapped Canadians Held by Philippine
Militants Appeal for Help.” March 10, 2016.
http://www.lfpress.com/2016/03/10/they-will-execute-us-kidnapped-canadians-
held-by-philippine-militants-appeal-for-help.
Lowe, Aya. “Kidnapping Cases Could Rise Amid Philippine Election Season: Police.”
Channel NewsAsia, February 20, 2016.
http://www.channelnewsasia.com/news/asiapacific/kidnapping-cases-
could/2533198.html.
Lowenthal, Mark. Intelligence: From Secrets to Policy, 6th ed. Washington, DC: CQ
Press, 2014.
McKay, Scott N., and David A. Webb, “Comparing Counterterrorism in Indonesia and
the Philippines.” Counter Terrorism Center. February 27, 2015.
130
https://www.ctc.usma.edu/posts/comparing-counterterrorism-in-indonesia-and-
the-philippines.
O’Brien, Mckenzie. “Fluctuations Between Crime and Terror: The Case of Abu Sayyaf’s
Kidnapping Activities.” Terrorism and Political Violence 24, no. 2 (2012):
320−336. DOI:10.1080/09546553.2011.648679.
Office of the Assistant Chief of Staff for Intelligence, OG2. Special Report on the ASG
Kidnapping Activities. Taguig City: Production Branch, 2014.
Official Gazette of the Republic of the Philippines. “Fourteen Pillars of Policy and Action
Against Terrorism.” Accessed May 18, 2016. http://dict.gov.ph/wp-
content/uploads/2014/07/MO37_s2001_CriticalInfra.pdf.
Official Gazette of the Republic of the Philippines. “National Security Policy 2011−2016:
Securing the Gains of Democracy.” Accessed May 10, 2016.
http://www.gov.ph/2011/08/18/national-security-policy-2011-2016/.
131
Official Gazette of the Republic of the Philippines. “The 1987 Constitution of the
Republic of the Philippines–Preamble.” Accessed September 10, 2016.
http://www.gov.ph/constitutions/the-1987-constitution-of-the-republic-of-the-
philippines/the-1987-constitution-of-the-republic-of-the-philippines-preamble/.
Pareno, Roel. “4 Indonesian Crew Members Kidnapped.” The Philippine Star, April 16,
2016. http://www.philstar.com/headlines/2016/04/16/1573493/4-indonesian-crew-
members-kidnapped.
Philippine Star. “Gunmen Free Abducted Boy in Zamboanga.” Accessed June 30, 2016.
http://www.philstar.com/breaking-news/727137/gunmen-free-abducted-boy-
zamboanga.
Rappler Philippines. “Korean Abducted in First Philippines Cargo Ship Raid.” Accessed
November 3, 2016. http://www.rappler.com/nation/149945-south-korea-ship-
captain-kidnapping-philippines.
Ressa, Maria. 10 Days, 10 Years: From Bin Laden to Facebook. Mandaluyong City:
Anvil, 2012.
132
Robinson, Linda, Patrick B. Johnston, and Gillian S. Oak. “U.S. Special Operations
Forces in the Philippines, 2001–2014.” RAND Corporation. Accessed September
16, 2016. http://www.rand.org/pubs/research_reports/RR1236.html.
Roth, Mitchel P., and Murat Sever. “The Kurdish Workers Party (PKK) as Criminal
Syndicate: Funding Terrorism Through Organized Crime, A Case Study.” Studies
in Conflict & Terrorism 30, no. 10 (August 20, 2007): 901−920. DOI:
10.1080/10576100701558620.
Santos, Elmor P. “Freed ASG Hostage Marites Flor: We Were Treated Like Dogs.” CNN
Philippines, June 25, 2016. http://cnnphilippines.com/news/2016/06/24/Abu-
Sayyaf-hostage-Marites-Flor-recounts-captivity.html.
Schmid, Alex P., and Garry F. Hindle, eds. After the War on Terror: Regional and
Multilateral Perspectives on Counter-Terrorism Strategy. London: RUSI, 2009.
Scribd. “Internal Peace and Security Plan Bayanihan.” Accessed July 30, 2016.
https://www.scribd.com/document/46302366/AFP-Internal-Peace-and-Security-
Plan-IPSP-BAYANIHAN.
Sha, Alizah. “Locals Helping Abu Sayyaf.” Yahoo News. Accessed November 29, 2015.
https://sg.news.yahoo.com/locals-helping-abu-sayyaf-030319057.html.
Singh, Daljit and Institute of Southeast Asian Studies. Terrorism in South and Southeast
Asia in the Coming Decade. Singapore: Institute of Southeast Asian Studies in
association with Macmillan, 2009.
Siniver, Asaf. International Terrorism Post 9/11: Comparative Dynamics and Responses.
NY: Routledge, 2012.
Smith, Samuel A. “Financing Terror, Part III: Kidnapping for Ransom in the
Philippines.” Strife (blog). January 26, 2015.
https://strifeblog.org/2015/01/26/financing-terror-part-iii-kidnapping-for-ransom-
in-the-philippines/.
Star Online. “Abu Sayyaf Frees 4 Malaysian Sailors It Kidnapped in April: Philippine
Military.” June 8, 2016.
http://www.thestar.com.my/news/nation/2016/06/08/philippine-military-confirms-
sarawakians-released/.
133
Tan, Andrew T.H. “Counter-Terrorism in Southeast Asia Post-9/11.” In International
Terrorism Post 9/11: Comparative Dynamics and Responses, edited by Asaf
Siniver, 207−229. NY: Routledge, 2012.
The White House. “The National Strategy for Counter-Terrorism.” Accessed August 10,
2016.
https://www.whitehouse.gov/sites/default/files/counterterrorism_strategy.pdf.
Toros, Harmonie, and Luca Mavelli. “Terrorism, Organized Crime and the Biopolitics of
Violence.” Critical Studies on Terrorism 6, no. 1 (April 5, 2013): 73−91. DOI:
10.1080/17539153.2013.765701.
U.S. State Department. “Philippines Travel Warning.” Accessed June 30, 2016.
https://travel.state.gov/content/passports/en/alertswarnings/philippines-travel-
warning.html.
United Nations Office on Drugs and Crime. “Organized Crime Has Globalized and
Turned into a Security Threat.” Accessed October 21, 2016.
https://www.unodc.org/unodc/en/press/releases/2010/June/organized-crime-has-
globalized-and-turned-into-a-security-threat.html.
United Nations Office on Drugs and Crime. “United Nations Convention Against
Transnational Organized Crime and the Protocols Thereto.” Accessed August 15,
2016.
https://www.unodc.org/documents/treaties/UNTOC/Publications/TOC%20Conve
ntion/TOCebook-e.pdf.
Weinberg, Leonard. Democracy and Terrorism: Friend or Foe. NY: Routledge, 2013.
Wilkinson, Paul. Terrorism Versus Democracy: The Liberal State Response. Portland,
OR: Frank Cass, 2001.
134
Yildiz, Ulas. “Combating Commercial Terrorists: The PKK Case.” Master’s thesis, Naval
Postgraduate School, Monterey, California, December 2015.
http://calhoun.nps.edu/handle/10945/47898.
135
THIS PAGE INTENTIONALLY LEFT BLANK
136
INITIAL DISTRIBUTION LIST
137