Malaysian Political System (Security)

25
1.0 Introduction Since the ending of communist insurgency in Malaysia on the 2 nd December 1989, an insurgency in Malaysia that lasted 21 years, 5 months, 2 weeks and I day since 17 th June 1968 (Navaratnam, 2001), Malaysia has not been into any conflict that could undermines Malaysia's sovereignty for over 2 decade up until recent events which took place in Sabah. Less than 300 militants infiltrated Sabah on the 11 th February 2013. Those militants claimed to be from Sultanate of Sulu and their objective is to North Borneo as their territory. The attack was led by Agbimuddin Kiram which is the brother to Jamalul Kiram III that claims to be the legitimate Sultan of Sulu. When the militants arrived at the shores of Sabah which comprise of the land of Tanduo, Lahad Datu, Semporna, Kunak and Tawau, Royal Malaysia Police (RMP) immediately have blockade for roads leading to and away from those vicinity. RMP immediately assign their Marine Operations Force to cut off any supplies of logistics or militants that will attempt to infiltrate from Philippines. Coordination of security forces of Philippines is established where Philippines security forces will sever routes that will enable infiltration to Malaysia. Kiram remain defiant of Philippines President Benigno Aquino III s’request to retreat back from Sabah. Kiram is bent on to claim back the North Borneo as part of his territory under Sultanate of Sulu (PDI, 2013). On 1 st March 2013, gunfire exchanges occur between RMP and Sulu militants in Lahad Datu. The attack subsequently follows by a new more attacks in Kunak and Semporna. Operation Daulat was then declared by Malaysia s’ security forces on the 5 th March 2013 where security forces were given mandate by Prime Minister of Malaysia Najib Tun Razak to take any action against the group. Operation Daulat was an operation in conjunction with RMP and Angkatan Tentera Malaysia (ATM). Royal Malaysia Air Force sent fighter jets to bomb Kiram suspected location where he resides. Mortar fire continued after aerial bombardment has commenced. The conflict ended with most of 1 | Page

description

Describes security of Malaysia in light of recent events faced like Lahad Datu incidence by security forces of Malaysia. It also states the Malaysian's policy in the aspect of national security.

Transcript of Malaysian Political System (Security)

Page 1: Malaysian Political System (Security)

1.0 Introduction

Since the ending of communist insurgency in Malaysia on the 2nd December 1989, an insurgency in Malaysia that lasted 21 years, 5 months, 2 weeks and I day since 17 th June 1968 (Navaratnam, 2001), Malaysia has not been into any conflict that could undermines Malaysia's sovereignty for over 2 decade up until recent events which took place in Sabah. Less than 300 militants infiltrated Sabah on the 11th February 2013. Those militants claimed to be from Sultanate of Sulu and their objective is to North Borneo as their territory. The attack was led by Agbimuddin Kiram which is the brother to Jamalul Kiram III that claims to be the legitimate Sultan of Sulu.

When the militants arrived at the shores of Sabah which comprise of the land of Tanduo, Lahad Datu, Semporna, Kunak and Tawau, Royal Malaysia Police (RMP) immediately have blockade for roads leading to and away from those vicinity. RMP immediately assign their Marine Operations Force to cut off any supplies of logistics or militants that will attempt to infiltrate from Philippines. Coordination of security forces of Philippines is established where Philippines security forces will sever routes that will enable infiltration to Malaysia. Kiram remain defiant of Philippines President Benigno Aquino III s’request to retreat back from Sabah. Kiram is bent on to claim back the North Borneo as part of his territory under Sultanate of Sulu (PDI, 2013).

On 1st March 2013, gunfire exchanges occur between RMP and Sulu militants in Lahad Datu. The attack subsequently follows by a new more attacks in Kunak and Semporna. Operation Daulat was then declared by Malaysia s’ security forces on the 5th March 2013 where security forces were given mandate by Prime Minister of Malaysia Najib Tun Razak to take any action against the group. Operation Daulat was an operation in conjunction with RMP and Angkatan Tentera Malaysia (ATM). Royal Malaysia Air Force sent fighter jets to bomb Kiram suspected location where he resides. Mortar fire continued after aerial bombardment has commenced. The conflict ended with most of Sulu militants either arrested or killed and Malaysia established new security zone over the region to prevent any intrusions in the future. Eastern Sabah Security Command and Eastern Sabah Security Zone were the security zones established. Sulu militants that were arrested were charged under Security Offences (Special Measures) Act 2012.

This paper will attempt to identify weakness in Malaysia security and politics. Role of security forces being carried out will be briefly discussed and lastly this paper will attempt to investigate possible ways or mechanism that could prevent such event from happening in the future.

2.0 Background

It is important to identify the type of warfare being carried out in the Lahad Datu Standoff incident. Different warfare requires different strategy, operational and tactical knowledge. There is nuclear warfare which meant states will carry out using nuclear weapons but theory of Mutually Assured Destruction prevented such warfare from happening during

1 | P a g e

Page 2: Malaysian Political System (Security)

the Cold War when nuclear was likely to be carried out. Conventional warfare meant that military operations ordered by the state to be launched on another state .Conventional warfare is where states that have the most advance in military capability or soldier will win the war considering generals knowing how to fully utilize force multiplier to their advantage. There are biological warfare, chemical warfare, attrition warfare, armored warfare, electronic warfare, mine warfare, space warfare and so on.

The warfare that is being carried out in this Lahad Datu Standoff incident is considered as Asymmetrical warfare. Asymmetrical warfare or also vaguely known as irregular warfare, limited warfare, unconventional warfare, terrorism, guerrilla warfare. Asymmetrical warfare has long existed since the beginning of human establishment on earth though the term hasn’t been coined yet. Tribes that established in the early ages fought enemy by ambushing them or adopting “hit and run” tactics to achieve objective. Conventional warfare is a new warfare compared to asymmetrical warfare because to carry out conventional warfare meant to have a standing army. A society must have organized agricultural and societal planning to channel additional resources such as food and money to maintain a standing army.

The ambush at Beth-Horon in year AD 66. There are more than thirty three thousand troops from the Roman Empire March into Beth-Horon attempt to suppress a Jewish insurrection (Bloom, 2010). The Roman army of that time was the most fearsome army with their superior training, discipline and equipment. The Roman army was good for only vanquishing enemies in an open battle and not more. They would wear their heavy armour and cling on to their weapons advance to the battle field to face their enemy slowly in formation. Roman army will first launch their javelin which is called a pillum at the enemy, when the enemy charges toward them. Infantry of Roman army will then charge towards the enemy with their scutum which ia a shield weighs approximately 10kg and a gladius, a double edged sword (James, 2003). Cestius Gallus that has no battlefield experience during the siege apparently call off the attack and give the order to retreat. The Jewish people must have recalled back what is written in the old testament at 1 Maccabees 3:16-23:

When (Seron, leading the Syrian army) approached the ascent of Beth-Haron, Judah went out to meet him with a small company. But seeing the army coming to meet them, they said to Judah, "How can we, few as we are, fight against so great and so strong a multitude? And we are faint, for we have eaten nothing today"

Judah replied, "It is easy for many to be hemmed in by few, for in the sight of Heaven there is no difference between saving by many or by few. It is not on the size of army that victory depends, but strength comes from Heaven. They come against us in great insolence and lawlessness to destroy us and our wives and our children, and to rob us; but we fight for our lives and our laws. He himself will crush them before us; as for you, do not be afraid of them".

2 | P a g e

Page 3: Malaysian Political System (Security)

When he finished speaking, he rushed suddenly against Seron and his army, and they were crushed before him. They pursued them down the descent of Beth-Horon to the plain.

Spurred on by their past victory of Jewish people in Beth-Horon at166 BC, the Jewish guerrillas ambushed the retreating Roman army in a treacherous mountaion path. Roman army with their heavy weaponry, shield and equipment could not outmatch the more agile guerrillas (Goldberg, 2002). In the end, more than 5,700 Roman soldier under Cestius command perished and suffered humiliating defeat.

This conflict clearly showing that warfare that is asymmetrical in nature existed long before the term is coined. The conflict illustrated above is just one of much asymmetrical warfare from the ancient times to present. Conventional military tries to suppress uprising but lastly guerrillas exploited geographical feature (mountainous terrain) to counter the conventional military and gain a tactical victory. Geographical feature therefore is an important variable to determine the outcome of the battle.

Asymmetrical warfare is a good exploit of power difference between sates and insurgents. Insurgent that are carrying out asymmetrical warfare can coerce the enemy into a stalemate in a tactical way, thereby lengthening the conflict and enemy will eventually lose the political will during the stalemate (Herrerra, 2001). For countries, even millennia, weaker opponents have sought to neutralize their enemy’s technology or numerical superiority by fighting in ways or on battlefields that nullify it (Goulding, 2000).

Asymmetrical warfare has usually been viewed as wars that was carried out by the timid and have no pride in any victory that would have gained. Conventional military will view the insurgents carrying out asymmetrical warfare as cowards. For the insurgents, the method or the process to gain victory does not need to be conventional, most importantly is the winning. To have state’s military viewing insurgents carrying out asymmetrical warfare as cowards is not a good motivation towards the military effectiveness in carrying out their duty. What the state should view insurgents should be highly effective militant that is hard to eradicate and they are operating in aground they usually will be more familiar than the state’s conventional army. Insurgents will be ever more fearful too if they could get their hands on Weapons of Mass Destruction like Chemical, Biological or Nuclear (Tucker, 1997).

The fascinating scenario that will happen during asymmetrical warfare is the conventional army will neither win military, nor they are defeated militarily. In most cases, conventional army’s superiority not only does it not guaranteed victory; it may under certain circumstances prove to be counterproductive (Mack, 1975).

11th September 2011 terrorist attack on United States captured the public attention of a new phase of warfare. Terrorism definitely is not new but globalisation has elevated terrorism to be carried out in a global dimension. The president addressed this topic very eloquently to a West Point graduating class:

This is another type of war, new in its intensity, ancient in its origin-war by guerrillas, subversives, insurgents, assassins, war by

3 | P a g e

Page 4: Malaysian Political System (Security)

ambush instead of by combat; by infiltration, instead of aggression, seeking victory by eroding and exhausting the enemy instead of engaging him…It preys on economic unrest and ethnic conflicts. It requires in those situations where we must counter it, and these are the kinds of challenges that will be before us in the next decade if freedom is to be saved, a whole new kind of strategy, a wholly different kind of force, and therefore a new and wholly different kind of military training (Kennedy, 1962).

Terrorist that emerged shows that they do not abide any rule of law and respect no national boundaries. Terrorist equipped with no advanced technology can create destruction in a scale never thought by world leaders. Conventional military is unable to prevent such attack because terrorist does not fight face to face. The perception of threat, security, strategy and tactics has evolved in our era of asymmetrical warfare. Terrorist that operates in urban terrain exploited the vulnerabilities of the given terrain and mingle inconspicuously among innocent civilian before they strike. Terrorist in Iraq and Afghanistan uses their featureless desert to plant Improvised Explosive Device (IED) to main military target.

Sun Tzu in his book “Art of War” Stress a lot on the concept of asymmetrical in warfare. Sun Tzu wrote:

All warfare is based on deception. When confronted with an enemy one should offer the enemy a bait to lure him; feign disorder and strike him. When he concentrates, prepare against him; where he is strong, avoid him (Sun Tzu, 1963).

With illustration of the above quote, a good military strategist or tactician will always look forward to carry out a battle by exploiting variables asymmetric I nature. Any armed units that are up against enemies which are stronger will utilize asymmetrical warfare as their force multiplier to increase their probability of success.

Max Boot (2013) did intensive research on asymmetrical warfare and analyse the history of guerrilla warfare from ancient times to present. A huge databases compiled by him detailed that insurgents have been getting more successful since 1945 but still lose most of the time (Refer to Appendix I). Conventional military tactics do not work against an asymmetrical threat. Threat perception for military leaders and decision makes have to revolutionize to understand that state will always be more prone to asymmetrical threat than conventional threat. It is important therefore to train police and military to handle such threat effectively.

3.0 MMalaysia’s Ddefence Ccapabilities and cost of Lahad Datu Standoff Incident

Malaysia’s defense capability is clearly on the upper hand in the conflict. Though our defense budget is much smaller than other state in Asia, but it is still sufficient to win an asymmetrical conflict with Sulu insurgents. (Please refer to Appendix II for more information)

4 | P a g e

Page 5: Malaysian Political System (Security)

Figure 0: Shows the military budget increment of Southeast Asia Countries (Military Balance, 2013)

With Malaysia’s defense budget in year 2013 to be RM15.4 Billion, it is doubtful that Sulu Sultanate could match that amount of money. Our active security forces of around 109, 000 people in the least estimate could easily win the insurgents with only a few hundred people. Malaysia military assets which are acceptable in world’s standard easily outmatch the insurgent’s asset.

The cost of the asymmetrical warfare carried out by Sulu militants incurred more cost upon Malaysia than on the group of militants themselves. During the conflict, citizens of the region were unable to carry out everyday lives normally due to fear of being caught in crossfire. Economic activity came to a halt and citizens were forced to stay at home all the time due to their own security.

5 | P a g e

Page 6: Malaysian Political System (Security)

Royal Malaysia Police were the first organization to be ordered to handle the conflict. There were 2 VAT 69 operative died in the first battle when they were ambushed by Sulu militants. Few more officers died following another ambush in Semporna where they are around 30 police officers.

Royal Malaysian Air Force sent F/A 18 Super hornet and Hawk fighter jets to do aerial bombardment in the area where Kiram and his militants were known. Cost of fuel and bombs to carry out the attack is enormous. Mortar attack also being launched after aerial bombardment has finished. Thousands rounds of ammunitions were being expended with Malaysian military sending their armored personnel carrier to support their operations. Such equipments were needed to be transferred over long distance from West Malaysia to the conflict region and fuel to run it incurs high cost.

After the incident, Malaysia decided there is the need to establish permanent security zone in the area with will be under ESSCOMM. Such move incurs additional cost to Malaysia as those security zones will attempt to prevent infiltration of militants into Malaysia in the first place.

4.0 Weakness

4.1 Geopolitics

Geography is an important aspect to consider in a state. Domestic politics and foreign policy of a state is always dictated by its geography therefore there are exists a field of study named Geopolitics. Geopolitics is study of how geography affects international politics and international relations. Regimes and government may change over a course of millenniums, but geography of a region remain the same therefore it is important for leaders to realize the importance of geography and use it as their advantage.

United States of America is located in North America. USA is a very well buffered state and protected from four directions, North, South, East and West. South of USA would be Canada where both states are separated with a lot of lakes and some of the lakes are massive. Such geography will make it hard for Canada to attack USA because of those lakes that will hamper any military capability Canada has to offer. To the South of USA, state of Mexico exists where vast region of desert separated Mexico and USA. Any military operations to attack USA from Mexico will have their military travel over the vast desert that will give USA ample time of warning to prepare for imminent attack. There is Atlantic Ocean and Pacific Ocean in the West and East side of USA. Such oceans effectively serve as USA’s protection should they be attack from sea. To have naval capability that could cruise the long distance needed to reach USA and have sufficient military power to attack them will need a lot of research in military technology. It will give USA a fair warning should any state are attempting to overpower USA militarily. Figure 1.1 refers to the map of USA that serves as illustration to the description given below.

6 | P a g e

Page 7: Malaysian Political System (Security)

Figure 1.1: Map of United States of America

Geography therefore plays a huge part in the security of a state. Malaysia separates in two parts which are West Malaysia (Peninsular Malaysia) and East Malaysia. East of Peninsular Malaysia is the South China Sea where the region serves as a secure border to any nearby states. West of Peninsular Malaysia is the Straits of Malacca where it is possible to kayak from Indonesia to Malaysia. Security in the Straits of Malacca is therefore much stricter than South China Sea. Possible of military attack from Indonesia whereby they will travel across Straits of Malacca is very easy.

Figure 1.2: Map of Malaysia

7 | P a g e

Page 8: Malaysian Political System (Security)

Figure 1.3: Map of Sabah and Philippines

For East Malaysia that is located in the Borneo, more security measures will be needed. Sarawak borders with Indonesia and span a length of 2, 019.5 KM. such a long border will requires a lot of security to safeguard Malaysia’s sovereignty. In Sabah, though it is separated from Philippines with the Sulu Sea and the Celebs Sea but there are approximately 7,107 islands scatter all over the seas separating Sabah and Philippines (PPHT, 2010). For any potential military or terrorist to travel over the seas to Malaysia does not requires impressive blue-water navy. Any small ships could travel from Philippines to Sabah easily by leapfrogging over all the islands (refer to Figure 1.2 and Figure 1.3). It will only take 20 minutes ride on speedboat to travel from the nearest point of Philippines to Malaysia. It is no surprising for some Philippines citizen to drop by Sabah visiting their relatives and go back Philippines in the same day (The Star, 2013). As the border is loosely guarded, it is very easy for anyone to smuggle firearms to Malaysia and begins an assault when the time is right.

Military leader and political leader knowing the geography in the region could potentially be volatile should assign more assets to guard the area. The culture in the region amplifies the instability of Sabah as relative of Malaysian might be just leaving over the border of Philippines and they will travel to Malaysia by leapfrogging over islands illegally. In September 2013, 7, 068 illegal Philippines immigrants were arrested and deported back to their home country. It is very easy therefore to travel over the Sulu Sea to Sabah and interested party would want to smuggle arms and explosives too to initiate a conflict (Borneo Post, 2013).

Before the security Forces Royal Sultanate of Sulu attack Lahad Datu there are about more than 6500 security forces that include Royal Malaysia Polices (RMP) and Angkatan Tentera Malaysia (ATM) located at Sabah. There are about 4 PGA (Pasukan Gerak Am)’s battalion which are Battalion 14 PGA, Tawau, Battalion 15 PGA. Sandakan, Battalion 16 PGA. Kota Kinabalu and lastly Battalion 17 PGA, Lahad Datu and one battalion of Battalion Kesembilan Rejimen Renjer Diraja which is located at Tawau, Sabah. The Battalion

8 | P a g e

Page 9: Malaysian Political System (Security)

Kesembilan Rejimen Renjer Diraja’s ong was composed by University Malaysia Sarawak’s previous commandant, Prof Dr Mohd Fadzil bin Abd Rahman.

Though there are permanent battalions of security forces stationed there, the attack is still carried out on Malaysian soil. Such encounter will make everybody hesitant into thinking whether the security forces positive there are effective or not to stop any illegal activities. Battalion placement might not be strategic enough to be alert the security forces of any attacks. As the geography of the area makes the region volatile, security forces should hold more exercises in stimulating a conflict to better equipped themselves. Security protocols should be revised too as the protocols in used currently might have been rendered obsolete.

4.2 Security Forces on Unfamiliar Terrain

Terrain of geographical region is imperative for security forces to understand in order to win any conflict. Special operations forces of a state are therefore often be called to handle a conflict asymmetrical in nature. Special Operation Forces of Malaysia is known as VAT69 for Royal Malaysia Police and Grup Gerak Khas for Malaysian Armed Forces. A brief description of various terrains and their challenge will be discussed together in comparison with the capability of SOF and normal infantry.

Geographical feature is important to influence the outcome of battle. It is a factor that could be used as a force multiplier. Utilizing geographical feature could enhance the capability of an armed unit or be destroyed should the unit does not have the sufficient knowledge to utilize the terrain. There are all kinds of geographical feature of terrain on earth where battles have taken place. Battle could happen in urban environment, arctic region, mountainous region, tropical rainforest/jungle, desert region and ocean fronts/naval condition.

As asymmetrical warfare will not have the enemy confronting the state’s military face to face, it would be certain that guerrillas or insurgents will want to maximize their probability of success by operating in treacherous terrain which in their mind will hinder the effectiveness of state’s armed forces. Infantry forces of a state are trained to fight in open ground and face the enemy head on. Such technique will not be useful when fighting guerrillas as they will avoid head on confrontation.

SOF however is trained to counter the tactics used by insurgents, guerrillas and terrorist. Weaker player will charge the nature of the battlefield to make it irrelevant for conventional military to conduct in. Conventional military will create too much collateral damage in their hunt for insurgents of guerrillas where publics support for the government will grind to a halt. Conventional military would also incite more enemies as they lay damage on everything.

In tropical rainforest, guerrillas will hide in thick rainforest where they will not be spotted from aerial surveillance. Rainforest provided them with food and water that could sustain them in an indefinite amount of time. Guerrillas could fake a track for infantry

9 | P a g e

Page 10: Malaysian Political System (Security)

soldiers to follow and lead them into an ambush. Force multiplication using geographical feature is undeniably effective. Government spends billions of dollars in strengthening defense institution primarily aimed at conventional military but conventional military is not meeting the threat that asymmetrical warfare provided.

In urban environment, terrorist could operate deliberately in a manner where collateral damage is ensured should the terrorists be compromised. Terrorist could operate invisibly using urban terrain as its camouflage. SOF will need have their element of surprise and speed to either arrest or kill the terrorist before any harm could do to innocent civilian.

In arctic environment, personnel will be exposed to extreme cold. Blizzards and snowstorm will last for days at a time. Snowstorm can be guerrillas force multiplier by being mobile in that environment hoping they could slip pass defended territory unnoticed. SOF trained in different geographical settings will be able to identify how guerrillas will exploit the environmental condition and counter it with suitable tactics.

In mountainous region, acclimatization is important to the performance of troops. Without proper acclimatization, it will be fatal to anyone. High altitude mountain warfare for example in the Siachen Glacier poses a lot of environmental threats to any troops operating there. In that region, there will be crevasses which are very deep at 50 meters or more, a fall will certainly break bones of the person who fell. Strong gust of wind that will kick up snow which could blind any personnel is dangerous where they could be heading to a cliff yet has no visibility. A valanche risk is very high too in high altitude region especially there are new snow fallen. For combat, low barometric pressure will affect the bullet’s flight trajectory in high altitude mountains.

In desert region, daytime and night temperature might differ greatly and operators need to well prepare to face those temperatures. Sandstorm can happen any moment that will hinder the progress of anyone caught in it. Insufficient water supply might lead to severe dehydration and ultimately death. Featureless desert plain will make the silhouette of a person very distinguishable thus it will be difficult to stay concealed.

In ocean fronts/naval condition, it would mean either coming in contact to the target beach covertly or fighting terrorist in the middle of the ocean. Both pose severe risk to the operator. Ocean fronts might be full of corals that will shred mobile speed boats. Huge wave will pound speed boats to the cliffs and destroys the boat and everything in it.

Malaysian security forces during the conflict are not familiar with the terrain of the region. A group of well-prepared guerrillas will research the terrain in their area of operation well before launching any attacks. Security forces in such instances might be easily exploited by those guerillas as all the time most of the security forces training were in a controlled environment and not having real life simulations of conflict all the time to keep up with their capabilities.

Should PGA battalion positioned in the area by carrying out their supposed objective every day when they work, it would be possible for security forces to know most of the terrain in territory like the back of their hand. Such information will be useful to use as

10 | P a g e

Page 11: Malaysian Political System (Security)

valuable intelligence that could use those terrain as force multiplier for the security forces. Topographical map will help security forces to understand the region to some degree but it can never be replaced by security forces going into the region constantly prior the conflict to know the region completely.

Malaysian security forces in the aspect to terrain has failed both physically and misinformation. Physically depicts where security forces aren’t regularly exposes themselves to train in harsh environment where there might be mangrove swamps and oil palm plantation. In the aspects of information, Malaysian security forces has failed to carry out their most basic job which is to identify their area of operations and have knowledge on any region of their terrains that are under their jurisdiction or area of operation. As such, force multiplier using terrain could not be utilized by Malaysian Security Forces.

4.3 Personnel’s Integrity

No state or organization could function well if the people within it are not cooperating with each other with a common goal which for Royal Malaysian Police is to give security to the state and community. The enemy will be operating in an effective manner should the enemy group gave internal source of their target organization. Intentionally withholding information that could assist in the assault upon Malaysia is a serious integrity breach.

A Malaysian Special Branch officer Corporal Hassan Ali Basari has been convicted for intentionally withholding information about the Sulu intrusion into Sabah. He was charged under Section 130M of the Penal Code. High Court Justice Ravinthran Paramuguru sentenced Corporal Hassab Ali Basari with the maximum jail term under the section as he noted that the accused was not an ordinary member of the general public. (TheStar, 2013)

The withhelded information led to the intrusion of Sabah successfully carried out by the Sulu insurgents. Security forces were being brutally murdered by the insurgents with their corpse mutilated. Families of the security forces suffered from the loss of their loved ones. Infrastructures destroy needed rebuilding cost the government money. Lots of money was also spent on deceased security forces family to ensure their future is secure.

An act of seemingly withholding information has led to a catastrophic event that caused Malaysia and Malaysian citizen to suffer from it. A police’s job is to protect the people but due to one police personnel integrity, security forces were injured and killed while they were trying to maintain the country’s sovereignty.

Security forced that is tasked to protect our country must all the time be committed in their job. Security forces personnel must be trustworthy and accountable. This Lahad Datu conflict has shown the great impact of one personnel’s integrity that can cause so much damage and harm to the people and the government. Royal Malaysia Police therefore must screen their personnel properly to ensure officers to be integrity and prevent such incident from happening again within the organization.

11 | P a g e

Page 12: Malaysian Political System (Security)

5.0 Role of Security Personnel/ Agency During The Incident

5.1 Royal Malaysian Police: Special Branch

Malaysian Special Branch within the Royal Malaysian Police was established by British Administration in the early 20th Century. Malaysian Special Branch was formed exactly like the British Special Branch set up in United Kingdom. Special Branch was very effectively infiltrating the chain of command of the Malayan Communist Party. During the communist insurgency, work carried out by the Malaysian Special Branch was praised as “one of the finest establishments of its kind in world”. (RMP, 2014)

Special Branch therefore in this incident, their role is to gather intelligence that would give them an anticipation of the assault. Special Branch could then inform relevant Branch within the Royal Malaysian Police to prevent the assault from happening. As there is the failure of one Special Branch officer to notify his superior of the impending assault, intelligence of the matter was never collected and because of that the assault was carried out.

As the result of intelligence failure in the beginning, the assault was carried out. It is then the role of Special Branch to gather any intelligence they can on the group of insurgents. The number of insurgents has to be identified with the family background of insurgents be checked. Weapons and firearms used by insurgents will be investigated to ensure security forces operating in the area know what to expect from the insurgents.

Collaboration with foreign intelligence service in the Philippines that has database of background of the insurgents is imperative to the resolving of the matter. Cross border crime is hard to be solved with just the country where the crime is being committed. International Criminal Police Organization (ICPO) is created to tackle the issue of transitional crime in a world that is increasingly globalized. ICPO works to coordinate all criminal information into one huge database that could be accessed by their member countries. Obtaining cooperation from Philippines for this conflict therefore is important because the insurgents were originated from Philippines.

As Special Branch will do their best channeling valuable intelligence back to HQ regarding on the issue, security personnel could then carry out action based on the intelligence. Intelligence such as location where insurgents were spotted, villagers that were harboring the insurgents, supplies route of the insurgents from Philippines to Malaysian etc. These intelligences are crucial to assists security forces to resolve the conflict as soon as possible.

The role of Special Branch after the conflict is to analyze the weakness that lead to the intrusion and draw out plans to patch the security loophole. Such attack on Malaysia is grave intelligence failure; Special Branch will have to revise their Standard Operational Producer for the personnel when there is possibility of their kind of conflict occur again.

12 | P a g e

Page 13: Malaysian Political System (Security)

5.2 Defensive/Offensive Forces

Various security forces of the country took part in the Lahad Datu conflict. Due to information being classified and not much information released to media, there is no certainty which unit operated in the region. With absolute certainty VAT69 and PGA did took part as security forces during the conflict.

The role of Defensive/Attacking forces is to suppress the advancement of the insurgents further into Malaysia, eradicated possible insurgents hideout in the region, cut off insurgent’s supplies of firearms/ food and lastly sweep the whole region to make sure all insurgents are either killed or arrested.

Coordination of the security forces is important because the security forces are not from one organization but from Royal Malaysian Police and Malaysian Armed Forces. Chain of command to give order to the security forces must be clear to ensure correct actions are carried out. As the insurgents have intruded into Malaysian soil, the first priority for any security agency of any country is containment. Cordon off the region to prevent insurgents from advancing further into Malaysia is crucial to prevent any insurgents projecting their influence over a wider region. Containing their presence and influence in a certain region will be easier to deal with by the security forces.

After containment of the area, the Malaysian Armed Forces sent jet fighters to carry out aerial bombardment and mortars to bomb possible location of insurgents before advancing into insurgents’ occupied area. Having aerial support and bombing the ground could potentially eliminate insurgents hiding in the area without any harm done to our security forces. Aerial support could also increase the morale of our security troops to be motivated in the fight. After bombardment, it is then the task of security forces from Royal Malaysian Police and Malaysian Armed Forces to move into the area and purge out any possible insurgents.

No war or conflict could sustain without stable supplies of food or firearms. It is therefore important to cut off any possible supply routes of the insurgents that might be supplying them from Philippines. Pasukan Gerakan Marin and Royal Malaysian Navy will need to coordinate their petrol routes effectively to make sure there is no loophole where insurgents could potentially travel to Sabah easily. It is also their task to arrest any insurgents that are attempting to escape back to Philippines through waterway. Presence of high speed patrol boats armed with impressive array of weapons will demotivate the insurgents that are fighting in the area where their hideout could spot these patrol boats from beach. Morale of insurgents will drop even lower when they know they no escape routes left as advancing into Malaysia or travelling back to Philippines is impossible with security forces tightens up their security in the area. Such sudden morale drop hopefully forces remaining insurgents to surrender without any further bloodshed.

After the insurgents were either killed or arrested by initial assault by security forces, the whole area must be swept again thoroughly to ensure no more insurgents remain before declaring the region café. Patrol of seas in the region need to be remained alert to prevent insurgents carrying out second assault on Malaysia. Illegal Philippines immigrants arrested

13 | P a g e

Page 14: Malaysian Political System (Security)

should be deported back to their home country as soon as possible if they are found to be innocent. Illegal immigrants pose a direct security threat in the region.

5.3 NATIONAL SECURITY COUNCIL

Role of Malaysia’s National Security Council (NSC) is crucial to this operation because it unites all armed forces under this agency. Military experts and academicians working within NSC will form a plan which is beneficial to Malaysia. Though there are no reports or information regarding National Security Council’s role in this issue but we will attempt to highlight the role of NSC would have been in this operation.

Insurgents claimed to be form the security forces from the Royal Sultanate of Sulu and their motive is to claim back part of Sabah as their territory. International law dictates that any actor has developed a territory more will be the sole of owner of the territory. Malaysia has certainly developed Sabah more for the past decades than any non-state actor. NSC will also try to delegitimize the insurgents’ credibility as Sulu Sultanate as a state to make sure the case will not even be brought forth at the international courts of Justice because Sulu Sultanate is not a sovereign state. Ordering Royal Malaysian Police to First handle the conflict is therefore important because it shows Malaysia is handling the issue by treating the insurgents as typical illegal immigrants that are on Malaysian soil. Should Malaysia sent soldiers to defend the region, it would seems that Malaysia has indirectly recognizes the sovereignty of Sulu Sultanate. Our soldiers in the operation are to back up Royal Malaysian Police and that shows insurgents are illegal immigrants even though they are wearing army uniform and it is Police’s Standard Operational Procedure to arrest them.

If the security forces of Sulu Sultanate wish to be recognized as legitimate state actor, any conflict carried out should abide the Laws of Armed Conflict, Geneva Convention and Hague Convention. All these law limit military action and attempt to protect human rights of everyone. The following case study is where Malaysia sees insurgents as criminals instead of recognized legitimate forces. Insurgents did not operate within the boundaries of law.

On March 1, 2013 the intruder has successfully cordoned off by the police. When the efforts of the police surrounding the intruder has manage to emotionally stress to the insurgents, and the insurgents waved white flag as mean as give up (Bernama, 2013). According to the International war laws of the Geneva Convention of 1949 through the protocol (i) Act 1977 states that white flag is a sign of surrender opponents and attack back opponents action is a real war offense. But what happened instead was the insurgents take advantage of police obeying the law and try to retaliate in full force when police officers. The police officers manage to firmly hold their ground even they have sustain serious injuries and insurgents retreated. Most attacks by the insurgents is a violation of international law notably in the 1949 Geneva Convention protocols (i) the prohibition of article 37 states:

1. It is prohibited to kill, injure or capture an adversary by resort to perfidy. Acts inviting the confidence of an adversary to lead him to believe that he is entitled to, or is obliged to accord, protection under the rules of international law applicable in armed

14 | P a g e

Page 15: Malaysian Political System (Security)

conflict, with intent to betray that confidence, shall constitute perfidy. The following acts are examples of perfidy :

a) the feigning of an intent to negotiate under a flag of truce or of a surrender;

b) the feigning of an incapacitation by wounds or sickness;

c) the feigning of civilian, non-combatant status; and

d) the feigning of protected statues by the use of signs, emblems or uniforms of the United Nations or of neutral or others States not Parties to the conflict.

2. Ruses of war are not prohibited. Such ruses are acts which are intended to mislead an adversary or to induce him to act recklessly but which infringe no rule of international law applicable in armed conflict and which are not perfidious because they do not invite the confidence of an adversary with respect to protection under that law. The following are examples of such ruses; the use of camouflage, decoys, mock operations and misinformation.

In conclusion, insurgents carrying out attack on Malaysia’s security personnel have violated all International Law. They will not be recognized as legitimate state actor and the issue will not be able to be submitted by them to the International Court of Justice attempting to claim parts of Sabah as their own territory. Malaysia arrested those insurgents and could charge them under our Penal Code Section 121 for Waging War against the King.

6.0 Prevention of Such Conflict from Happening

Establishment of Eastern Sabah Security Command (ESSCOM) commence after the conflict was resolved. It is a security area covering around 1,400km of the East Coast of Sabah from Kudat to Tawau. The purpose of ESSCOM is to strengthen maritime security of the region to prevent any future intrusion, terrorist activities or privacy that could happen in the volatile region (TheStar, 2013). Security threats halts economic activity resume their normal daily function. Strengthening security of the country will also give confidence to foreign investors to invest in Malaysia thereby benefits Malaysia with more prosperity.

ESSCOM will be task to build more police stations in the region and purchase more speed boats to patrol the area with vast maritime border. More Pasukan Gerakan Am personnel will be reassigned to the area to provide more security in preventing further intrusion or terrorist act from happening.

Security forces that are task in the region to protect our nation's sovereignty must constantly in training to be agile and resourceful during conflict. Training should never stop after personnel have completed basic training. Training needs to be constant to build the correct muscle memory and reflex into a person. When a conflict present itself the personnel would not need to think but react instinctively from the training they have received.

15 | P a g e

Page 16: Malaysian Political System (Security)

The strategy of eradicating remnants of Sulu terrorist would be to relocate villagers living close of the seaside to be move few kilometers inland. This is the same strategy during our Malaysia’s communist insurgency where there are establishment of New village whereby people where relocate there. The purpose of New village is to sever any attempt of the population to provide help or supplies to terrorist that will be a threat to our country. This concept of New village is equally applied in Lahad Datu.

7.0 Conclusion

We can conclude that the conflict of Lahad Datu in year 2013 awakens the security forces to the trend of warfare that is going to be carried out in future which is asymmetric in nature. Security forces should update their training to fight asymmetrical warfare in addition of their basic conventional warfare skills. More real life conflict simulation exercise should be carried out by security forces as part of their training to be ready them for any future conflict.

Malaysia's geopolitics clearly shows that the region in Sabah will be an easy target for insurgents and the government should have strengthen the security in the first place instead of waiting for an attack to happen then to establish various security zones. Security should be better train in various terrains so as not to be defeated by insurgents in our country. Border control requires a lot of human assets to guard it. Technology however could be better used to monitor our border without expending much human assets. Thermal imaging system that could detect heat radiation is effective in detecting intrusion even in complete human visual blindness. The system will not be affected by fog like humans. The system's detection range is very far which could decrease personnel stationed in the region. Infrared vision or night too should be employed by personnel patrolling the region to be more effective. Unmanned Aerial Vehicle too could be used to monitor our border for intrusion.

Preventing intrusion in the first place is always better then handling the conflict when it happened. Security forces of Malaysia should all the time be prepared for any conflict. Threat perception plays a huge role in the alertness of security forces.

16 | P a g e