HomeWild Blue YonderArticle Display

The views and opinions expressed or implied in WBY are those of the authors and should not be construed as carrying the official sanction of the Department of Defense, Air Force, Air Education and Training Command, Air University, or other agencies or departments of the US government or their international equivalents.

Thinking through the Unthinkable: Reducing Terrorist Threats in and around the Straits of Malacca and Singapore



This article describes how the United States government can help shape a common sight picture of maritime threat detection in the Straits of Malacca and Singapore (Straits) by working cooperatively with Singapore’s Information Fusion Center to identify, target, and eliminate or reduce the threat of maritime terrorism. The geography of the Straits and the volume of shipping trade that passes through its waterways make the Straits a prime target for terrorists, and an ongoing security concern for the Indonesian government. Despite multi-nation coordination, joint maritime patrols and even local information or fusion centers, there remains much to improve Indonesia’s security posture and counterterrorism capabilities in and around the Straits.

Jakarta’s concern over the Straits, and its nearby ports, is no different than other mega cities that are grappling with similar terrorist threats within their own ports and waterways such as New York City in the United States. New York City’s police department (NYPD) is profiled as a leading example to others in how the department leverages its officers, analysts, and technology to identify emerging threats and foil terrorist plots. US assistance to Indonesia can come in many forms but the NYPD is an organization that would benefit from directly advising and supporting Indonesia and other countries in the Straits region against common threats and common enemies waging regional and international campaigns of terror.


After 9/11 it is no longer far-fetched to imagine that some terrorists might one day try to steer a floating bomb into a port in the Straits of Malacca—the way hijackers flew commercial planes into the Twin Towers . . . the Malacca Straits—with 50,000 ships carrying all the Middle East oil bound for Asia, 2/3 of the world’s liquid petroleum gas, and 1/4 of its sea trade passing through every year—provides the potent ingredients needed to concoct just such an explosive splash.

Yun-Yun Teo

Indonesia is one of four nations that surround the 900-kilometer narrow waterway known as the Straits of Malacca and Singapore (Straits). Through these Straits pass thousands of vessels transporting most of the world’s oil to the largest economies—an attractive and target-rich environment for Islamic jihadist terrorists plotting their next big attack.1 The Indonesian government, like others in the region, is trying to identify and thwart terrorist plots that have the potential to truly inflict damage, such as the hijacking and sinking of an oil supertanker at any one of several chokepoint locations in the Straits. The objectives of such an attack could be to disrupt maritime trade, undermine confidence in the Indonesian government and other countries bordering the Straits, and temporarily disrupt critical oil flow to countries throughout Asia. Any or all these effects could badly impact Jakarta and the rest of the country, domestically and internationally.


US Coast Guard Maritime Enforcement Specialists and Malaysian Maritime Enforcement Agency coast guardsmen pose for a group photo after conducting a visit, board, search-and-seizure training drill as part of Southeast Asia Cooperation and Training (SEACAT) 2019. This year marks the 18th iteration of SEACAT, which is designed to enhance maritime security skills by highlighting the value of information sharing and multilateral coordination. (US Navy photo by Mass Communication Specialist 2nd Class Tristin Barth)

Figure 1. US Coast Guard Maritime Enforcement Specialists and Malaysian Maritime Enforcement Agency coast guardsmen pose for a group photo after conducting a visit, board, search-and-seizure training drill as part of Southeast Asia Cooperation and Training (SEACAT) 2019. This year marks the 18th iteration of SEACAT, which is designed to enhance maritime security skills by highlighting the value of information sharing and multilateral coordination. (US Navy photo by Mass Communication Specialist 2nd Class Tristin Barth)


Jakarta is a megacity that, no doubt, views the Straits as a major area of concern with regards to the threat of maritime-launched terrorist attacks. It is arguably only a matter of time before a terrorist attack is executed with devastating effect. But Jakarta is not alone in her struggles over maritime terrorism. Another megacity, New York City, has similar challenges in securing its ports and busy waterways and the NYPD has developed certain counterterrorism capabilities that could be leveraged by other large cities facing domestic and international terrorist threats. New York’s “finest” (NYPD), specifically the NYPD’s Counterterrorism Bureau, is an example of a leading terrorist-fighting organization that could assist Indonesia and her partner nations in providing advisory and technical assistance to local Indonesian, Singaporean, and Malaysian counterterrorism officers who currently work at the regional Information Fusion Center (IFC). Such support would not just benefit the IFC but would also benefit the NYPD since all countries involved are cognizant that terrorist networks are no longer purely local or regional but operate globally. The very same terrorist threats against the Straits, in many ways, could be from the same terrorist groups that may be threatening New York City waterways and ports.

While the NYPD and the IFC may seem like very different organizations they have remarkably similar mandates – to monitor, detect, and prevent terrorist attacks within their areas of responsibility. The NYPD has responded to these threats by building up a highly reputable, credible, and effective team of analysts and agents in its Counterterrorism Bureau who have identified and thwarted terrorist plots similar in complexity and level of sophistication as those that may likely be plotted against Indonesian and/or other flagged vessels transiting through the Straits. The NYPD would train and advise selected officers and analysts from the IFC in analytical capabilities and establish new relationships of collaboration in the fight against Islamic jihadism terrorism. Indonesia and the three other coastal nations bordering the Straits would greatly benefit from such an initiative, but the NYPD would gain skills and contacts as well.

The article provides background on the Straits, the nature of the terrorist threat in that region, background on past and current levels of cooperation in the region through regional maritime centers and introduces the reader to the NYPD and its history and capabilities associated with counterterrorism. The article also gives recommendations on how the NYPD could assist the IFC with counterterrorism in the Straits through a three-staged approach including Assessment, Planning, and Execution. The results or benefits of such an approach would be formalized and mutually beneficial working relationships between the NYPD and IFC, as well as an increase in technical knowledge and skills on the use of predictive analytics to fight terrorism. Intended outcomes from this initiative would be documented situations where the use of predictive analytics by the IFC prevented terrorist acts in the Straits. Certainly there are other US organizations that could also provide assistance to the Straits, such as the US Coast Guard, the Federal Bureau of Investigation, the US Navy, etc. This article highlights one US government agency, from the local police level, that is unique in the similarities it has with Jakarta and the ongoing terrorist threats both Jakarta and New York face on a daily basis.

The Maritime Threat

A terrorist group with aims to undermine the Indonesian government by staging a crippling attack on the maritime domain would view the Straits as an excellent location to do so for a couple of reasons. The Straits is a narrow channel of water, bordered by four coastal nations—Malaysia, Singapore, Thailand, and Indonesia, characterized by “shifting sandbars and shoals, submerged rocks, unpredictable currents, the sudden, fierce squalls that are encountered in the Straits, not (to) mention unmarked wrecks . . . to this must be added the risk of attack by pirates…the maritime traffic congestion and concomitant risk of collision, . . . and recently terrorist threats.2 At its narrowest point, the Straits are 1.5 miles wide which must accommodate more than 200 vessels daily, each typically weighing more than 300 gross tons.3 Additionally, the Straits are mostly shallow, with much of their depth in the funnel area of less than 23 meters, channelizing maritime traffic, despite traffic management and reporting protocols in place.4 Consequently, there are a number of natural choke points in the Straits that pose a high level of risk for maritime traffic if a tanker were sunk at any one of these choke points.

From an economic perspective, the volume of shipping traffic that passes through the Straits is staggering. Approximately half of all global trade and one-third of the world’s crude oil supply passes through the Straits on an annual basis. Disruption of this trade could impact local, regional and even international financial markets, shaking consumer confidence in their governments’ ability to safeguard trade and protect its citizens.5 For example, researchers Giacomo Morabito and Bruno Sergi have developed economic models that show the financial impact of maritime attacks on countries like Indonesia through variables such as gross domestic product numbers and bilateral trade agreements.6 While they argue that the level of impact from any given attack varies on the country depending on its level of population, direct distance from the attack, and volume of current exports, countries like Singapore and Indonesia could observe a drop in GDP as high as 1 percent (in a given year) which is significant as this would be an impact from only one terrorist attack such as the sinking of an oil tanker resulting in a blockage of the Straits.7 Moreover, if one is to associate institutional confidence with market stability, then any publicized terrorist attack could shake confidence from financial investors and insurance providers. On a regional and international level, such an attack could trigger an external drop in investor confidence by international institutions such as Lloyds of London, who may charge higher premiums for countries, including Indonesia, to insure their vessels that are traveling through the Straits or even recommend rerouting ships, incurring greater costs and indirectly achieving one or more of a terrorist’s objectives to upend, redirect, and undermine.8 The nature and seriousness of the terrorist threat in and around the Straits should not be underestimated.

Nazira Rahman has called the Straits the “second front of global terrorism” following the 9/11 attacks in 2001.9 There are three major terrorist groups, mostly Islamic Jihadists, including Abu Sayyaf, the Islamic State in Iraq and Levant or ISIL, and Jemaah Islamiyah or JI operating across Southeast Asia, including Indonesia and Malaysia. As recently as 2016 one researcher had estimated upward of 1,000 ISIL fighters had returned to Indonesia following their fighting in the Middle East.10 According to Rahman, dedicated ISIL recruitment in many of Indonesia’s provinces is active and ongoing.11 The main terrorist group in Indonesia is Jemaah Islamiyah, or JI, which seeks, like ISIL, to establish a region-wide caliphate across Southeast Asia, potentially connecting to other Islamic states in northwest and northeast Africa, the eastern Mediterranean, and Afghanistan.12 Thus, a well-planned attack in the Straits resulting in massive loss of life, and sunken super tankers with massive oil spills, and a clogged waterway would fit into a terrorist group’s agenda—one which included the use of terror to influence a local populace and undermine a sitting head of state and his or her cabinet. A collective response to such threats may be the wisest move.

They Have Help, but Is It Enough?

Indonesia has several cooperating neighbors and allies in the region, including the United States, albeit in a limited capacity. As a member of the Association of Southeast Asian Nations, Indonesia signed the Bali Accord II agreement in 2003, concurring with its other member nations that maritime concerns should be addressed regionally, in a more comprehensive approach.13 Following that agreement, Indonesia partnered with Malaysia and Singapore to conduct joint naval air patrols of the Straits.14 The United Nations’ International Maritime Organization became heavily involved in assisting Indonesia, Malaysia, and Singapore to adopt a cooperative mechanism, a framework and funding vehicle whereby each user state and other stakeholders in the Straits could ensure safety in the local sea lanes.15 The United States, for example, has actively supported Indonesia and the other coastal nations in safeguarding and protecting the Straits and has even contributed financial assistance through this fund. Support from the United States has also included donation of patrol boats to the Indonesian Marine Police, donation of maritime-air surveillance capabilities, and participation in numerous capacity-building exercises with the Indonesian Navy, as well as other navies in the region.16 These exercises, such as Cobra Gold, are conducted jointly with the Indonesians and their neighbor nations.17 Many of these joint patrols and exercises are in coordination with three regionally aligned maritime domain awareness information and reporting centers, located in and around the Straits.18

One of these centers, the Regional Cooperation Agreement on Combating Piracy and Armed Robbery Against Ships in Asia Information Sharing Center (ReCAAP ISC) produces ad hoc and planned weekly/monthly/quarterly, etc. reports on piracy or armed robbery incidents within the Straits. The ReCAAP ISC strictly reports on past events and provides recommendations to those that may view or download their reports, but the information does not contain synthesis or analysis components—just the facts. Thus, this center has limited capability in assessing, fusing information and informing others of likely or emerging threats in the Straits. While the ReCAAP ISC focuses on standardized reporting, the Piracy Reporting Centre (PRC) of the International Maritime Bureau, located in Kuala Lumpur, attempts to be a one-stop reporting shop of piracy attacks as they are in progress.19 The PRC collects reports from any shipmaster on any piracy event on a vessel, and immediately relays that information out to all vessels in the area, presumably alerting them to the event and advising them to stay clear. This information is also relayed to local military and law enforcement agencies, likely decreasing response time for officials to react to an event while in progress. Both the ReCAAP ISC and the PRC, then, are reporting vehicles—the difference between the two is in typically how fast each center produces the report and disseminates it out in the region.20 By design, both centers are reactive rather than proactive. A third regional center, located in Singapore, offers more promise in the way it is structured and managed to be a better candidate for further maturation and development.

The IFC, established in 2009, is staffed by the Singaporean Navy full-time as well as liaison officers from the other navies border the Straits, including Indonesia and Malaysia. The IFC is a relatively new center dedicated to developing primarily a shared maritime picture of the Straits. It is the only center of the three with a dedicated, full-time, round the clock team of security professionals from the countries bordering the Straits. It is also the only center that regularly hosts maritime information sharing exercises in the region. While the IFC also provides near real-time reporting of events in the Straits to shipmasters and governmental representatives in the region, it is the best technologically equipped and positioned to assume a more proactive role in detecting emerging threats before they materialize in the Straits. For example, technological features of the IFC include a dedicated portal/user interface for the Straits showing vessel tracking (real-time visualization) in the Straits as well as limited analytical tools that pull in limited amounts of structured data into sense-making models to interpret events and issue reports as needed to proper authorities for action. This analytical tool and engine, however, requires continuous improvement, does not accept or fuse unstructured data, and is constrained by challenges with interoperability, funding and limited technological expertise in the region.21

Compared to the other two centers, the IFC has the governmental support, facilities, staffing, and focus to be the more suitable center for further development, and the introduction of proactive techniques regarding counterterrorism. What the IFC lacks is skills and technology that is decidedly more proactive than reactive, focused on anticipating events, rather than simply reporting on them. In other words, the use of predictive analytics would be a vital and necessary addition to the repertoire of capabilities at the IFC. Predictive analytics is a term to describe both an approach as well as a supporting collection of software tools and applications to predict future behavior based on emerging structured and unstructured data. The goal of predictive analytics, according to Brian Lozada, is to “anticipate the outcome of future events by answering the following three questions: What happened? What is happening? What will happen?”22 Predictive analytics aims to address the who, when, and why questions regarding patterns of individuals’ (i.e., terrorist leaders) current behaviors; and forecasting, which concerns their future behavioral patterns.

Brad Hill of the IBM corporation defines predictive analytics as a set of tools that enable a user to access up to four different types of data—interaction data (email, chat transcripts, web click-streams, in-person dialogues), descriptive data (attributes, characteristics, self-declared information from suspect individuals and groups), attitudinal data (mostly from social media), and behavioral data (orders, transactions, payment and usage history).23 There is a wealth of data that, when fused correctly, can provide alerts or clues to an informed consumer of data about the likely movements and intentions of bad actors. Predictive analytics is one of the few areas of counterterrorism that, unfortunately, is practiced by those that have the critical mass and funding to support and manage such sophisticated, expensive, but effective capabilities. While the IFC may not have these capabilities yet there exists the potential for the United States to increase its current level of support in the region by introducing its partners, as in Indonesia, to these skill sets particularly when we are fighting the same fight—terrorism.

New York’s Finest

Fortunately, the United States government, including at the state and local levels, are heavily invested in thwarting terrorist plots at home and abroad. Given that Indonesia’s capital, Jakarta is the capital and seat of the federal government, whose officials are charged with national security including that of the Straits, it makes sense that there are other mega cities that face similar security challenges in its immediate waterways and straits. New York City certainly has similar challenges to Jakarta in that it, too, plays host to thousands of ships that visit its ports and harbors. There are other major port cities in the United States that, arguably, could also have been included in this paper but New York City stands out from the others. New York City is the highest-profile US city in the country, if not the world. For that reason alone, the author looked to counterterrorism resources that are employed there in combating domestic and international threats to the security and safety of its waterways and residents. In New York City, the agency tasked with preventing terrorist attacks in such a high-threat environment is the NYPD, which many consider to be a world-class, best practice terrorist-fighting organization in addition to its more traditional law enforcement functions.

Due to similarities in population and threat profiles from Islamic jihadist-inspired groups operating in and out of Jakarta and New York City, it is reasonable to claim that the NYPD or New York’s finest is well positioned to help others fighting a common enemy. New York, like Jakarta, should concern itself with anticipating the motivations, agendas, and movements of a growing network of Islamic jihadist-inspired groups that seek to threaten the security of her ports, harbors, shipping traffic, and citizens of all countries passing through her borders. Unlike Indonesia and the IFC, however, the NYPD has some capabilities that are quite advanced—capabilities in the form of techniques, methodologies, tools, and technologies that may help others in their fight.

The NYPD has an impressive track record of foiling many terrorist attacks, mostly accomplished through what is termed predictive analytics.24 The NYPD Counterterrorism Bureau’s internal operations and practices may be proprietary and classified, but much can still be shared with the IFC that would not compromise NYPD proprietary data, techniques and procedures.25 The NYPD has an information center that is similar but more advanced than the IFC regarding processing and analytical capabilities. NYPD’s Real Time Crime Center (RTCC) is a collection of integrated crime-related information systems that support the end user querying the system to look for criminal and terrorist-related indicators that determine the validity or credibility of a threat on the city. The RTCC consists of local internal databases containing crime-related data, internal computer-aided dispatch data, sensor data (closed-circuit television feeds, license plate readers, radiation and chemical sensors), external city data (location of schools and other public/key infrastructure sites, etc.), State databases (department of motor vehicles, terrorist watch lists), external information aggregators, and social media information (Facebook, Twitter, various chat rooms, etc.).26 NYPD analysts use the RTCC in coordination with predictive analytics and proprietary models to stop the terrorist act before it progresses beyond the initial planning phase . . . before things are blown up and people die. The IFC seeks to do the same thing that the NYPD does with the RTCC and predictive analytics—use advanced technologies and techniques to stop terrorists before they execute their deadly attacks in the Straits.

Some would argue or question why the NYPD or any other US government agency would assist the IFC. Firstly, the NYPD, like other terrorist-fighting and law enforcement organizations around the globe, understands that identifying and prosecuting terrorist networks is not local, it is a global endeavor requiring cooperation that transcends international borders. As such, the NYPD has a long history of working with law enforcement and counterterrorism agencies of foreign countries before the 9/11 attacks and continuing today.27 Secondly, the benefits outweigh the risks when it comes to this potential information sharing agreement between the NYPD and the Indonesian Navy and the IFC. For example, NYPD would gain a partner and an ally in the global fight on terrorism, be able to extend knowledge and share its contacts and information. NYPD counterterrorism officers are already working with their counterparts in Afghanistan, Pakistan, and Indonesia so working directing with the IFC would create new, and quite useful, working relationships.28 The IFC would not be the only beneficiaries from this venture –NYPD officers would benefit. The NYPD Counterterrorism Bureau with its staff, methodologies, processes, and information databases would also receive more detailed information on terrorist groups and their activities in and around the Straits which could enrich and mature understanding on developing similar threats in New York City and help prevent another 9/11.

A Common Sight Picture

In May 2018, 68 participants from 12 countries, including the United States, Indonesia, Malaysia, Singapore, and India, met as colleagues and security practitioners at the annual Southeast Asian Maritime Situational Awareness workshop in Bangkok to discuss regional information sharing requirements within the region, including the Straits.29 Post-workshop polling results overwhelmingly supported the need for continued information sharing and the need for posting of liaison officers to facilitate learning and nurture working relationships through operations, exercises, training and mentoring between and among Southeast Asian partners and the United States. Therefore, there are clear signals that a common approach, a collective strategy is in the clear interests of the region and that assistance would be gratefully received. The NYPD is an example of a best practice organization with a vested interest in supporting the IFC. The analysts and officers of the NYPD Counterterrorism Bureau have the skills, abilities, and experience to assist the IFC in improving their ability to develop and apply predictive analytics in identifying and thwarting maritime terrorism threats in the Straits, but would also benefit from the initiative through increased exposure to Islamic jihadist terrorism operating within the Straits and other agencies’ approaches to counterterrorism that may have applicability back in New York. Given the interest and likely support from Indonesia, a set of recommendations should be characterized by practicality, deliberateness, and a spirit of cooperation and joint resolve.

It is envisioned that selected officers and analysts from the IFC, including officers from the Indonesian, Malaysian, and Singaporean navies, would be trained in predictive analytics to identify and target emerging terrorist threats in and around the Straits through a consultative, mutually benefiting multistaged approach in coordination with the NYPD. In the first stage (Assessment), the US Department of State with local leadership from ambassadors and country teams of the four nations that border the Straits would actively support the formation of a governmental memorandum of agreement outlining scope, expectations, and expected benefits from this proposed information and sharing exchange between the NYPD and the IFC. Following the signing of the agreement, initial funding would be allocated by the United States government through the UN’s International Maritime Organization funding vehicle, the Cooperative Funding Project, to receive and distribute the funds to the IFC, in keeping with other previous financial contributions from the United States to partners and allies in the region. In this stage, following the agreement, officers and analysts from NYPD’s Counterterrorism Bureau would conduct on-site sessions and workshops to identify and confirm current or “as-is” capabilities relative to desired or “to-be” capabilities. From this “audit” would come a prioritization of gaps between to-be and as-is assessment.

The second stage (Planning) would be a detailed training and acquisition plan, including training goals, curriculum, and funding requirements for off-the-shelf hardware and software tools for use at the IFC. This stage would result in a detailed, managed project plan designed to up ramp and upskill identified officers and analysts at the IFC to employ predictive analytics in their daily work at the IFC. In this stage, users and user roles would be created to mirror existing practices and protocols that are used by the NYPD to as realistic degree as possible. Training would be given on how to use predictive analytics to foil terrorist plots using realistic scenarios. For example, NYPD would train IFC officers and analysts on how the use of geospatial data, geo-tagged social media activity, online search history tracking on individuals belonging to suspected groups, etc.30 Project managers would carefully track and manage milestones, training plans, deliverables, and benefits relative to the plan throughout this stage based on the scope agreed to in the memorandum of agreement.

The third and final stage (Execution) would be the execution of the “train and assist” visits by the NYPD Counterterrorism Bureau and the provision of technical support to the IFC on the use of predictive analytical tools to work actual cases of emerging terrorist threats in the region. If we were to use the model of crawl-walk-run, common in military training, this would be the run phase. Trained officers and analysts would be evaluated on their ability to use predictive analytics to identify and address emerging terrorist threats in the Straits. These individuals would be heavily coached, procedures would be updated and refined to local conditions, and lessons would be captured and incorporated into an environment of continuous improvement at the IFC. Networks and data feeds would be tested and optimized during this stage between New York and the IFC and likely Jakarta. The result of this final stage would be a trained and functioning team of individuals in the IFC that had demonstrated mastery of predictive analytics and had successfully incorporated this skill set and capability into their existing processes and practices with tangible effects.

The benefits of introducing predictive analytics as added skillsets to the officers and analysts assigned at the IFC would be measurable and substantial. There would be constructive and effective working relationships between the NYPD and the IFC. There would be an increase in technical knowledge and an advancement in the use of advanced technologies to increase the speed and probability of thwarting terrorist plots in the Straits and prosecuting those groups. This initiative might encourage other western powers to lend more support to Southeast Asia in fighting terrorism where the threats are increasing and our ability to harness advanced technologies will help us address these threats with increasing speed and lethality. What happens or could happen in Southeast Asia has the potential to impact US national security interests at home or abroad. Our willingness to help our partners and allies sends signals to others. We demonstrate our resolve and our character by how we share our skills, our expertise, and our strength. What can happen in the Straits can happen on our shores and in our ports.


1 Nazery Khalid, “With a Little Help from My Friends: Maritime Capacity-Building Measures in the Straits of Malacca,” Contemporary Southeast Asia 31, no. 3 (2009), 425.

2 Donald B. Freeman, The Straits of Malacca: Gateway Or Gauntlet? (Montreal: McGill-Queen’s University Press, 2003), 165.

3 Shicun Wu and Keyuan Zou, Maritime Security in the South China Sea: Regional Implications and International Cooperation (Farnham, England; Burlington, VT: Ashgate, 2009), 158.

4 Michael Leifer, International Straits of the World: Malacca, Singapore, and Indonesia, vol. 2 (Alphen aan den Rijn: Sijthoff & Noordhoff, 1978), 55–56.

5 Martin Purbrick, “Pirates of the South China Seas.” Asian Affairs 49, no. 1 (2018): 11–26.

6 Giacomo Morabito and Bruno S. Sergi, “How did Maritime Piracy Affect Trade in Southeast Asia?” Journal of East Asian Studies 18, no. 2 (2018), 260.

7 Ibid., 262.

8 Graham G. Ong, Piracy, Maritime Terrorism and Securing the Malacca STRAITS (Singapore; Leiden, The Netherlands: Institute of Southeast Asian Studies, 2006), 29.

9 Nazira A. Rahman, “Multilateralism in the Malacca Straits and Singapore,” Marine Policy 44 (2014), 232.

10 Nathaniel L. Moir, “ISIL Radicalization, Recruitment, and Social Media Operations in Indonesia, Malaysia, and the Philippines,” Prism: A Journal of the Center for Complex Operations 7, no. 1 (2017), 93.

11 Ibid., 94.

12 Ibid., 96.

13 Wu and Zou, Maritime Security in the South China Sea, 171.

14 Ibid., 174.

15 Khalid, “With a Little Help from My Friends,” 430.

16 Ibid., 432–33.

17 David Rosenberg and Christopher Chung, “Maritime Security in the South China Sea: Coordinating Coastal and User State Priorities,” Ocean Development & International Law 39, no. 1 (2008), 55.

18 Christian Bueger, “From Dusk to Dawn?: Maritime Domain Awareness in Southeast Asia,” Contemporary Southeast Asia: A Journal of International and Strategic Affairs 37, no. 2 (2015), 158.

19 Ibid., 158.

20 Ibid.

21 Ibid., 170.

22 Brian A. Lozada, “The Emerging Technology of Predictive Analytics: Implications for Homeland Security, “ Information Security Journal: A Global Perspective 23, no. 3 (2014), 119.

23 Brad Hill, “What is Predictive Analytics? “ YouTube, 9 July 2013.

24 Matthew Quinn, “A History of Violence: A Quantitative Analysis of the History of Terrorism in New York City,” Homeland Security Affairs 12 (2016), 5.

25 The author worked as an Associate Partner with IBM Corporation from 2004–2012 and had direct contact with some of the IBM contractors within his consulting practice who supported NYPD’s Real Time Crime Center (RTCC), including IBM’s chief architect of the RTCC. The author’s assertion is, therefore, based on his understanding of the general nature of law enforcement as it relates to counterterrorism and the amount of information that can be shared freely without compromising agency protocols or “classified” operations.

26 New York City Police Department, Developing the NYPD’s Information Technology (New York: NYPD), 3–4.

27 Jonathan Dietz, “Inside the NYPD’s Anti-Terror Program Overseas,” NBC News, 3:14, 13 November 2016, https://www.nbcnews.com/nightly-news/video/inside-the-nypds-anti-terror-program-overseas-808044099960?v=raila&.

28 Brian Nussbaum, “Protecting Global Cities: New York, London and the Internationalization of Municipal Policing for Counter Terrorism,” Global Crime 8, no. 3 (2007), 222.

29 The author served as one of the facilitators from the Daniel K. Inouye Asia-Pacific Center for Security Studies during the Maritime Situational Awareness IV workshop held in Bangkok, Thailand during May 14–17, 2018.

30 Lozada, “Emerging Technology of Predictive Analytics,” 120–21.


USAF Comments Policy
If you wish to comment, use the text box below. AF reserves the right to modify this policy at any time.

This is a moderated forum. That means all comments will be reviewed before posting. In addition, we expect that participants will treat each other, as well as our agency and our employees, with respect. We will not post comments that contain abusive or vulgar language, spam, hate speech, personal attacks, violate EEO policy, are offensive to other or similar content. We will not post comments that are spam, are clearly "off topic", promote services or products, infringe copyright protected material, or contain any links that don't contribute to the discussion. Comments that make unsupported accusations will also not be posted. The AF and the AF alone will make a determination as to which comments will be posted. Any references to commercial entities, products, services, or other non-governmental organizations or individuals that remain on the site are provided solely for the information of individuals using this page. These references are not intended to reflect the opinion of the AF, DoD, the United States, or its officers or employees concerning the significance, priority, or importance to be given the referenced entity, product, service, or organization. Such references are not an official or personal endorsement of any product, person, or service, and may not be quoted or reproduced for the purpose of stating or implying AF endorsement or approval of any product, person, or service.

Any comments that report criminal activity including: suicidal behaviour or sexual assault will be reported to appropriate authorities including OSI. This forum is not:

  • This forum is not to be used to report criminal activity. If you have information for law enforcement, please contact OSI or your local police agency.
  • Do not submit unsolicited proposals, or other business ideas or inquiries to this forum. This site is not to be used for contracting or commercial business.
  • This forum may not be used for the submission of any claim, demand, informal or formal complaint, or any other form of legal and/or administrative notice or process, or for the exhaustion of any legal and/or administrative remedy.

AF does not guarantee or warrant that any information posted by individuals on this forum is correct, and disclaims any liability for any loss or damage resulting from reliance on any such information. AF may not be able to verify, does not warrant or guarantee, and assumes no liability for anything posted on this website by any other person. AF does not endorse, support or otherwise promote any private or commercial entity or the information, products or services contained on those websites that may be reached through links on our website.

Members of the media are asked to send questions to the public affairs through their normal channels and to refrain from submitting questions here as comments. Reporter questions will not be posted. We recognize that the Web is a 24/7 medium, and your comments are welcome at any time. However, given the need to manage federal resources, moderating and posting of comments will occur during regular business hours Monday through Friday. Comments submitted after hours or on weekends will be read and posted as early as possible; in most cases, this means the next business day.

For the benefit of robust discussion, we ask that comments remain "on-topic." This means that comments will be posted only as it relates to the topic that is being discussed within the blog post. The views expressed on the site by non-federal commentators do not necessarily reflect the official views of the AF or the Federal Government.

To protect your own privacy and the privacy of others, please do not include personally identifiable information, such as name, Social Security number, DoD ID number, OSI Case number, phone numbers or email addresses in the body of your comment. If you do voluntarily include personally identifiable information in your comment, such as your name, that comment may or may not be posted on the page. If your comment is posted, your name will not be redacted or removed. In no circumstances will comments be posted that contain Social Security numbers, DoD ID numbers, OSI case numbers, addresses, email address or phone numbers. The default for the posting of comments is "anonymous", but if you opt not to, any information, including your login name, may be displayed on our site.

Thank you for taking the time to read this comment policy. We encourage your participation in our discussion and look forward to an active exchange of ideas.

Wild Blue Yonder Home