Beruflich Dokumente
Kultur Dokumente
0 Introduction
Since the ending of communist insurgency in Malaysia on the 2 nd December 1989, an
insurgency in Malaysia that lasted 21 years, 5 months, 2 weeks and I day since 17th June 1968
(Navaratnam, 2001), Malaysia has not been into any conflict that could undermines
Malaysia's sovereignty for over 2 decade up until recent events which took place in Sabah.
Less than 300 militants infiltrated Sabah on the 11th February 2013. Those militants claimed
to be from Sultanate of Sulu and their objective is to North Borneo as their territory. The
attack was led by Agbimuddin Kiram which is the brother to Jamalul Kiram III that claims to
be the legitimate Sultan of Sulu.
When the militants arrived at the shores of Sabah which comprise of the land of
Tanduo, Lahad Datu, Semporna, Kunak and Tawau, Royal Malaysia Police (RMP)
immediately have blockade for roads leading to and away from those vicinity. RMP
immediately assign their Marine Operations Force to cut off any supplies of logistics or
militants that will attempt to infiltrate from Philippines. Coordination of security forces of
Philippines is established where Philippines security forces will sever routes that will enable
infiltration to Malaysia. Kiram remain defiant of Philippines President Benigno Aquino III
srequest to retreat back from Sabah. Kiram is bent on to claim back the North Borneo as part
of his territory under Sultanate of Sulu (PDI, 2013).
On 1st March 2013, gunfire exchanges occur between RMP and Sulu militants in
Lahad Datu. The attack subsequently follows by a new more attacks in Kunak and Semporna.
Operation Daulat was then declared by Malaysia s security forces on the 5 th March 2013
where security forces were given mandate by Prime Minister of Malaysia Najib Tun Razak to
take any action against the group. Operation Daulat was an operation in conjunction with
RMP and Angkatan Tentera Malaysia (ATM). Royal Malaysia Air Force sent fighter jets to
bomb Kiram suspected location where he resides. Mortar fire continued after aerial
bombardment has commenced. The conflict ended with most of Sulu militants either arrested
or killed and Malaysia established new security zone over the region to prevent any
intrusions in the future. Eastern Sabah Security Command and Eastern Sabah Security Zone
were the security zones established. Sulu militants that were arrested were charged under
Security Offences (Special Measures) Act 2012.
This paper will attempt to identify weakness in Malaysia security and politics. Role of
security forces being carried out will be briefly discussed and lastly this paper will attempt to
investigate possible ways or mechanism that could prevent such event from happening in the
future.
2.0 Background
It is important to identify the type of warfare being carried out in the Lahad Datu
Standoff incident. Different warfare requires different strategy, operational and tactical
knowledge. There is nuclear warfare which meant states will carry out using nuclear weapons
but theory of Mutually Assured Destruction prevented such warfare from happening during
the Cold War when nuclear was likely to be carried out. Conventional warfare meant that
1 | Page
military operations ordered by the state to be launched on another state .Conventional warfare
is where states that have the most advance in military capability or soldier will win the war
considering generals knowing how to fully utilize force multiplier to their advantage. There
are biological warfare, chemical warfare, attrition warfare, armored warfare, electronic
warfare, mine warfare, space warfare and so on.
The warfare that is being carried out in this Lahad Datu Standoff incident is
considered as Asymmetrical warfare. Asymmetrical warfare or also vaguely known as
irregular warfare, limited warfare, unconventional warfare, terrorism, guerrilla warfare.
Asymmetrical warfare has long existed since the beginning of human establishment on earth
though the term hasnt been coined yet. Tribes that established in the early ages fought enemy
by ambushing them or adopting hit and run tactics to achieve objective. Conventional
warfare is a new warfare compared to asymmetrical warfare because to carry out
conventional warfare meant to have a standing army. A society must have organized
agricultural and societal planning to channel additional resources such as food and money to
maintain a standing army.
The ambush at Beth-Horon in year AD 66. There are more than thirty three thousand
troops from the Roman Empire March into Beth-Horon attempt to suppress a Jewish
insurrection (Bloom, 2010). The Roman army of that time was the most fearsome army with
their superior training, discipline and equipment. The Roman army was good for only
vanquishing enemies in an open battle and not more. They would wear their heavy armour
and cling on to their weapons advance to the battle field to face their enemy slowly in
formation. Roman army will first launch their javelin which is called a pillum at the enemy,
when the enemy charges toward them. Infantry of Roman army will then charge towards the
enemy with their scutum which ia a shield weighs approximately 10kg and a gladius, a
double edged sword (James, 2003). Cestius Gallus that has no battlefield experience during
the siege apparently call off the attack and give the order to retreat. The Jewish people must
have recalled back what is written in the old testament at 1 Maccabees 3:16-23:
When (Seron, leading the Syrian army) approached the
ascent of Beth-Haron, Judah went out to meet him with a small
company. But seeing the army coming to meet them, they said to
Judah, "How can we, few as we are, fight against so great and so
strong a multitude? And we are faint, for we have eaten nothing
today"
Judah replied, "It is easy for many to be hemmed in by few,
for in the sight of Heaven there is no difference between saving by
many or by few. It is not on the size of army that victory depends,
but strength comes from Heaven. They come against us in great
insolence and lawlessness to destroy us and our wives and our
children, and to rob us; but we fight for our lives and our laws. He
himself will crush them before us; as for you, do not be afraid of
them".
2 | Page
3.0 MMalaysias Ddefence Ccapabilities and cost of Lahad Datu Standoff Incident
Malaysias defense capability is clearly on the upper hand in the conflict. Though our
defense budget is much smaller than other state in Asia, but it is still sufficient to win an
asymmetrical conflict with Sulu insurgents. (Please refer to Appendix II for more
information)
4 | Page
Figure 0: Shows the military budget increment of Southeast Asia Countries (Military
Balance, 2013)
With Malaysias defense budget in year 2013 to be RM15.4 Billion, it is doubtful that
Sulu Sultanate could match that amount of money. Our active security forces of around 109,
000 people in the least estimate could easily win the insurgents with only a few hundred
people. Malaysia military assets which are acceptable in worlds standard easily outmatch the
insurgents asset.
The cost of the asymmetrical warfare carried out by Sulu militants incurred more cost
upon Malaysia than on the group of militants themselves. During the conflict, citizens of the
region were unable to carry out everyday lives normally due to fear of being caught in
crossfire. Economic activity came to a halt and citizens were forced to stay at home all the
time due to their own security.
5 | Page
Royal Malaysia Police were the first organization to be ordered to handle the conflict.
There were 2 VAT 69 operative died in the first battle when they were ambushed by Sulu
militants. Few more officers died following another ambush in Semporna where they are
around 30 police officers.
Royal Malaysian Air Force sent F/A 18 Super hornet and Hawk fighter jets to do
aerial bombardment in the area where Kiram and his militants were known. Cost of fuel and
bombs to carry out the attack is enormous. Mortar attack also being launched after aerial
bombardment has finished. Thousands rounds of ammunitions were being expended with
Malaysian military sending their armored personnel carrier to support their operations. Such
equipments were needed to be transferred over long distance from West Malaysia to the
conflict region and fuel to run it incurs high cost.
After the incident, Malaysia decided there is the need to establish permanent security
zone in the area with will be under ESSCOMM. Such move incurs additional cost to
Malaysia as those security zones will attempt to prevent infiltration of militants into Malaysia
in the first place.
4.0 Weakness
4.1 Geopolitics
Geography is an important aspect to consider in a state. Domestic politics and foreign
policy of a state is always dictated by its geography therefore there are exists a field of study
named Geopolitics. Geopolitics is study of how geography affects international politics and
international relations. Regimes and government may change over a course of millenniums,
but geography of a region remain the same therefore it is important for leaders to realize the
importance of geography and use it as their advantage.
United States of America is located in North America. USA is a very well buffered
state and protected from four directions, North, South, East and West. South of USA would
be Canada where both states are separated with a lot of lakes and some of the lakes are
massive. Such geography will make it hard for Canada to attack USA because of those lakes
that will hamper any military capability Canada has to offer. To the South of USA, state of
Mexico exists where vast region of desert separated Mexico and USA. Any military
operations to attack USA from Mexico will have their military travel over the vast desert that
will give USA ample time of warning to prepare for imminent attack. There is Atlantic Ocean
and Pacific Ocean in the West and East side of USA. Such oceans effectively serve as USAs
protection should they be attack from sea. To have naval capability that could cruise the long
distance needed to reach USA and have sufficient military power to attack them will need a
lot of research in military technology. It will give USA a fair warning should any state are
attempting to overpower USA militarily. Figure 1.1 refers to the map of USA that serves as
illustration to the description given below.
6 | Page
7 | Page
Though there are permanent battalions of security forces stationed there, the attack is
still carried out on Malaysian soil. Such encounter will make everybody hesitant into thinking
whether the security forces positive there are effective or not to stop any illegal activities.
Battalion placement might not be strategic enough to be alert the security forces of any
attacks. As the geography of the area makes the region volatile, security forces should hold
more exercises in stimulating a conflict to better equipped themselves. Security protocols
should be revised too as the protocols in used currently might have been rendered obsolete.
10 | P a g e
Malaysian security forces in the aspect to terrain has failed both physically and
misinformation. Physically depicts where security forces arent regularly exposes themselves
to train in harsh environment where there might be mangrove swamps and oil palm
plantation. In the aspects of information, Malaysian security forces has failed to carry out
their most basic job which is to identify their area of operations and have knowledge on any
region of their terrains that are under their jurisdiction or area of operation. As such, force
multiplier using terrain could not be utilized by Malaysian Security Forces.
Malaysian Special Branch within the Royal Malaysian Police was established by
British Administration in the early 20th Century. Malaysian Special Branch was formed
exactly like the British Special Branch set up in United Kingdom. Special Branch was very
effectively infiltrating the chain of command of the Malayan Communist Party. During the
communist insurgency, work carried out by the Malaysian Special Branch was praised as
one of the finest establishments of its kind in world. (RMP, 2014)
Special Branch therefore in this incident, their role is to gather intelligence that
would give them an anticipation of the assault. Special Branch could then inform relevant
Branch within the Royal Malaysian Police to prevent the assault from happening. As there is
the failure of one Special Branch officer to notify his superior of the impending assault,
intelligence of the matter was never collected and because of that the assault was carried out.
As the result of intelligence failure in the beginning, the assault was carried out. It is
then the role of Special Branch to gather any intelligence they can on the group of insurgents.
The number of insurgents has to be identified with the family background of insurgents be
checked. Weapons and firearms used by insurgents will be investigated to ensure security
forces operating in the area know what to expect from the insurgents.
Collaboration with foreign intelligence service in the Philippines that has database of
background of the insurgents is imperative to the resolving of the matter. Cross border crime
is hard to be solved with just the country where the crime is being committed. International
Criminal Police Organization (ICPO) is created to tackle the issue of transitional crime in a
world that is increasingly globalized. ICPO works to coordinate all criminal information into
one huge database that could be accessed by their member countries. Obtaining cooperation
from Philippines for this conflict therefore is important because the insurgents were
originated from Philippines.
As Special Branch will do their best channeling valuable intelligence back to HQ
regarding on the issue, security personnel could then carry out action based on the
intelligence. Intelligence such as location where insurgents were spotted, villagers that were
harboring the insurgents, supplies route of the insurgents from Philippines to Malaysian etc.
These intelligences are crucial to assists security forces to resolve the conflict as soon as
possible.
The role of Special Branch after the conflict is to analyze the weakness that lead to
the intrusion and draw out plans to patch the security loophole. Such attack on Malaysia is
grave intelligence failure; Special Branch will have to revise their Standard Operational
Producer for the personnel when there is possibility of their kind of conflict occur again.
13 | P a g e
d) the feigning of protected statues by the use of signs, emblems or uniforms of the
United Nations or of neutral or others States not Parties to the conflict.
2. Ruses of war are not prohibited. Such ruses are acts which are intended to mislead an
adversary or to induce him to act recklessly but which infringe no rule of international
law applicable in armed conflict and which are not perfidious because they do not
invite the confidence of an adversary with respect to protection under that law. The
following are examples of such ruses; the use of camouflage, decoys, mock
operations and misinformation.
In conclusion, insurgents carrying out attack on Malaysias security personnel have
violated all International Law. They will not be recognized as legitimate state actor and the
issue will not be able to be submitted by them to the International Court of Justice attempting
to claim parts of Sabah as their own territory. Malaysia arrested those insurgents and could
charge them under our Penal Code Section 121 for Waging War against the King.
7.0 Conclusion
15 | P a g e
We can conclude that the conflict of Lahad Datu in year 2013 awakens the security
forces to the trend of warfare that is going to be carried out in future which is asymmetric in
nature. Security forces should update their training to fight asymmetrical warfare in addition
of their basic conventional warfare skills. More real life conflict simulation exercise should
be carried out by security forces as part of their training to be ready them for any future
conflict.
Malaysia's geopolitics clearly shows that the region in Sabah will be an easy target for
insurgents and the government should have strengthen the security in the first place instead of
waiting for an attack to happen then to establish various security zones. Security should be
better train in various terrains so as not to be defeated by insurgents in our country. Border
control requires a lot of human assets to guard it. Technology however could be better used to
monitor our border without expending much human assets. Thermal imaging system that
could detect heat radiation is effective in detecting intrusion even in complete human visual
blindness. The system will not be affected by fog like humans. The system's detection range
is very far which could decrease personnel stationed in the region. Infrared vision or night too
should be employed by personnel patrolling the region to be more effective. Unmanned
Aerial Vehicle too could be used to monitor our border for intrusion.
Preventing intrusion in the first place is always better then handling the conflict when
it happened. Security forces of Malaysia should all the time be prepared for any conflict.
Threat perception plays a huge role in the alertness of security forces.
16 | P a g e