Journal |
Utilization of Cyberspace by Terrorist Groups and the Applicability of the Malaysian Law on Terrorism
View Abstract
It is an obvious and undeniable fact, that the cyberspace is become a powerful method which is increasingly and quickly utilized by terrorist organizations to achieve their gruesome and nefarious goals by hitting innocent individuals. This paper has conducted a critical and comprehensive study on the literature review aiming to answer several inquiries about utilization of cyberspace by terrorist groups and the applicability of the Malaysian law on terrorism. The meaning, characteristics and goals of cyber terrorism will be highlighted.
Furthermore, this paper will clarify how terrorist groups invade the cyberspace with highlighting on “ISIS” as an example. In addition, this paper will indicate how the Malaysian Law addresses the terrorism. This paper has proved that the terrorist groups become more sophisticated and complex by adopting the cyberspace. Moreover, this paper discloses how terrorist groups exploit the cyberspace. Even if Malaysian law adopts many measures and precautions to counter terrorism, but, it still needs more efforts to deal with terrorism, by regulating the “Bitcoins”, introducing a clear definition about the meaning of “lethal device” to encompass harm programs and viruses, and distinguishing between clicking “like” or sharing the terrorist items with use explicit words to glorify the terrorism and without use any explicit glorification words. The lawgiver must take into consideration the possession of terrorist items orpublications for academic and innocent purposes. Finally, under SOSMA, the power to intercept the communications must be subjected on the judicial oversight and the power of arrest must be based on objective test.
|
2016 |
Labanieh, M.F. and Zulhuda, S. |
View
Publisher
|
Report |
Protecting the Homeland from International and Domestic Terrorism Threats
View Abstract
This paper collection entitled “Protecting the Homeland from International and Domestic Terrorism Threats: Current Multi-Disciplinary Perspectives on Root Causes, the Role of Ideology, and Programs for Counter-radicalization and Disengagement”, seeks to add insights without needlessly repeating what has been heard and read elsewhere. What separates this paper collection from the many others on this topic is the multiplicity of perspectives represented, both domestic and international, that span the spectrum of social sciences. To do this, over forty authors were asked to provide perspectives on various aspects of terrorism: root causes, dynamics of Violent Non-State Actors (VNSAs), the role of ideology in terrorism, and potential solutions for counter-radicalization, deradicalization, and disengagement from terrorism.
|
2010 |
Kuznar, L., Fenstermacher, L., Reiger, T. and Speckhard, A. |
View
Publisher
|
Journal Article |
Modeling Islamist Extremist Communications on Social Media using Contextual Dimensions: Religion, Ideology, and Hate
View Abstract
Terror attacks have been linked in part to online extremist content. Although tens of thousands of Islamist extremism supporters consume such content, they are a small fraction relative to peaceful Muslims. The efforts to contain the ever-evolving extremism on social media platforms have remained inadequate and mostly ineffective. Divergent extremist and mainstream contexts challenge machine interpretation, with a particular threat to the precision of classification algorithms. Our context-aware computational approach to the analysis of extremist content on Twitter breaks down this persuasion process into building blocks that acknowledge inherent ambiguity and sparsity that likely challenge both manual and automated classification. We model this process using a combination of three contextual dimensions — religion, ideology, and hate — each elucidating a degree of radicalization and highlighting independent features to render them computationally accessible. We utilize domain-specific knowledge resources for each of these contextual dimensions such as Qur’an for religion, the books of extremist ideologues and preachers for political ideology and a social media hate speech corpus for hate. Our study makes three contributions to reliable analysis: (i) Development of a computational approach rooted in the contextual dimensions of religion, ideology, and hate that reflects strategies employed by online Islamist extremist groups, (ii) An in-depth analysis of relevant tweet datasets with respect to these dimensions to exclude likely mislabeled users, and (iii) A framework for understanding online radicalization as a process to assist counter-programming. Given the potentially significant social impact, we evaluate the performance of our algorithms to minimize mislabeling, where our approach outperforms a competitive baseline by 10.2% in precision.
|
2019 |
Kursuncu, U., Gaur, M., Castillo, C., Alambo, A. Thirunarayan, K., Shalin, V., Achilov, D., Budak Arpinar, I. and Sheth, A. |
View
Publisher
|
Report |
Detours and Diversions Online Strategies for the Dissemination of Right-Wing Extremist Content
View Abstract
Since the beginning of 2021, ISD Germany has been researching right-wing extremist actors on alternative platforms on the internet. Three reports were published as part of the German Federal Ministry for Justice (BMJ)-funded project “Countering radicalisation in right-wing extremist online subcultures”. The last report in 2021, “Detours and Diversions – Online Strategies for the Dissemination of Right-Wing Extremist Content”, provides a summary of the projects central findings and presents them in a comparative manner.
This report thus combines the methodological and theoretical groundwork of the report “Wegweiser” with the results of the empirical research of the reports “Fluchtwege” and “Stützpfeiler Telegram”, and puts them into context. The report presents a comparison of data from established platforms and Telegram, and thus helps to gain a better understanding of the behaviour of far-right actors on the selected platforms. It also includes a comparative analysis of the strategies and linkages of far-right and radical right actors on established and alternative platforms. This research is based on the empirical data collected by the platforms. Given, that data collection is different for each platform, and given that this project also explores alternative platforms, it also furthers the exploration of data collection options, which are described in more detail in this report.
|
2022 |
Kuchta, R., Hammer, D., Gerster, L. and Schwieter, C. |
View
Publisher
|
Journal Article |
For God, for Tsar and for the Nation: Authenticity in the Russian Imperial Movement’s Propaganda
View Abstract
This paper will examine how extremist organizations manage to present themselves as credible actors in the eyes of potential supporters on social media. This paper will address this question by exploring the role of authenticity in strategic narratives, which is believed to help these groups achieve this purpose. Apart from introducing this new theoretical concept, the paper will also apply it to a new case study of the Russian Imperial Movement (RIM) – the first far-right organization to be designated as terrorist by the U.S. and Canada. By conducting discourse analysis of the group’s social media propaganda on the Russian network VKontakte, the paper will show how the RIM makes its strategic narratives authentic and, as a consequence, creates an image of a credible and trustworthy actor and thus manages to reach out to its target audience.
|
2021 |
Kruglova, A. |
View
Publisher
|
Book |
The Taliban’s Virtual Emirate: The Culture and Psychology of an Online Militant Community
View Abstract
Applying cutting-edge psychiatric theories to an analysis of online Taliban literature in four languages, Neil Krishan Aggarwal constructs a game-changing narrative of the organization’s broad appeal and worldview.
Aggarwal focuses on the Taliban’s creation of culture, evoking religion in Arabic and English writings, nationalism in Dari sources, and regionalism in Urdu texts. The group also promotes a specific form of argumentation, citing religious scriptures in Arabic works, canonical poets in Dari and Urdu writings, and scholars and journalists in English publications. We see clearly how the Taliban categorizes all Muslims as members and all non-Muslims as outsiders; how they convince Muslims of the need for violence; and how they apply the insider/outside dichotomy to foreign policy. By isolating these themes, Aggarwal helps us craft better counter-messaging strategies.
|
2016 |
Krishan Aggarwal, N. |
View
Publisher
|