text
stringlengths 10
3.23k
| document_url
stringclasses 318
values | source_url
stringclasses 318
values | country
stringclasses 137
values |
---|---|---|---|
Nonetheless, in the context of this study, it is suffice to denote new media as the use of technologically advanced tools that have the ability to enable us to communicate, transcending boundaries, time and space.13 Taking this into account, another important aspect of new media is its level of interactivity.14 The interactivity provided by new media can clearly be explained through the concept of Web 2.0. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Web 2.0 Web 2.0 is defined as: “A catch-all term used to describe a variety of developments on the Web and a perceived shift in the way it is used. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
This shift can be characterised as the evolution of Web use from passive consumption of content to more active participation, creation and sharing”.15 Based on the definition above and for the purpose of this study, Web 2.0 is referred to as the development on the web content from merely reading what is written on the web page to a more interactive one where users can posts questions, thoughts, and external links, as well as create ideas amongst others. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
One important feature of Web 2.0 that is relevant to this study is its focus on user-generated content (UGC).
12 “What does ‘New Media’ mean?”, Iowa State University Studio for New Media, http://newmedia.engl.iastate.edu/about/what_is_new_media, (accessed August 1, 2016).
13 Fernandez, Kevin.
“The two waves of cyberpolitics in Malaysia: what does the by-elections barometer tell us?.” Department of Political Science Central European University 27, no.
1 (2010): 597. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
1 (2010): 597.
14 “What does ‘New Media’ mean?”, Iowa State University Studio for New Media.
15 Joshua Stern, “Introduction to Web 2.0 Technologies”, http://www.wlac.edu/ online/documents/Web_2.0%20v.02.pdf (accessed August 1, 2016).
17 User-Generated Content (UGC) UGC is also referred to as user-created content (UCC). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
There is no commonly accepted definition of UGC but it nonetheless comprises of “[…] various forms of media and creative works (written, audio, visual, and combined) created by Internet and technology users”.16 Some of the examples of UGC are images, infographic, videos, blogs, and comments.17 In addition, social networking sites or social media platforms such as Facebook and Twitter also operate on UGC. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Social Media Platforms Although there are differences between social media and social networking, people have been using these two terms interchangeably.18 In this regard, social media is defined as “forms of electronic communication […] through which users create online communities to share information, ideas, personal messages, and other content […].”19 On the other hand, social networking is defined as “the creation and maintenance of personal and business relationships especially online”.20 While there are differences in framing social media and social networking, both utilises the same web-based platforms which includes Facebook, Twitter, Instagram, and Tumblr among others. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
In this regard, this study will use the term social media platforms to refer to these sites.
However, as will be demonstrated, Daesh is not only using web-based 16 “Participative Web: User Created Content”, April 12, 2007, Organization for Economic Co-operation and Development (OECD), http://www.oecd.org/sti/38393115.pdf (accessed August 1, 2016).
17 “User-Generated Content (UGC)”, Techopedia, https://www.techopedia.com/ definition/3138/user-generated-content-ugc (accessed August 1, 2016). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
18 Fauzia Bruke, “Social Media vs. Social Networking”, December 2, 2013, Huffington Post,http://www.huffingtonpost.com/fauzia-burke/social-media-vs-social- ne_b_4017305.html (accessed August 1, 2016).
19 Pete Schauer, “5 Biggest Differences between Social Media and Social Networking”, June 28, 2016, Social Media Today, 20 Ibid.
18 platforms to communicate and conduct other terrorist-related activities, they are also using mobile messaging apps. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Mobile Messaging Apps Mobile messaging apps includes instant messaging applications that are accessible through hand-held devices such as iPhones, androids, iPad, tabs and the likes.
Some of the mobile messaging apps are Telegram, WhatsApp, Wickr and SureSpot.
However, it is important to note that some of these applications are also accessible through the web but are commonly used on hand-held devices. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Nonetheless, the emergence of new media and Web 2.0 as well as the utilisation of both web-based social media platforms and mobile messaging apps have dramatically changed the landscape of how people communicate and conduct their daily businesses.
In fact, such easily accessible technological advancement has led to greater immediacy and remarkably reducing the digital divide. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
These advantages have also benefited Daesh in their quest to spread their propaganda, recruit and radicalise, communicate and network, fund their terrorist-related activities, train potential recruits, plan as well as coordinate attacks.
Hacking activities are also found to be among Daesh’s activities. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
It is important that we understand why terrorist groups are adopting the internet as a tool to proliferate their ideas while simultaneously placing themselves in a vulnerable situation by exposing themselves to multilateral and state-control intelligence gathering agencies.
Before delving further into the possible uses of the Internet by terrorists, the following section will look into some of the reasons the Internet appeals to terrorists. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
19 T E R R O R I S M A N D T H E I N T E R N E T : T H E F A T A L A T T R A C T I O N 2 T he Internet serves as a space for terrorist sympathisers and followers to gather and exchange views while reinforcing their worldviews.
This is particularly appealing to terrorists as it provides them anonymity and freedom to conduct various terrorism activities to a certain extent. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Kathy Crilley of the Internet Studies Research Group, City University, asserted that amongst the many reasons why terrorists are utilising the internet include anonymity of communication, easy access to the Internet where little technical knowledge is needed in building a website, links to like-minded individuals that leads to the building of large networking, source of revenue where donations can be obtained through terrorist websites as well as the ease of bypassing national laws with the Internet being owned by no one.21 The ease of bypassing the national laws was echoed by Professor Bilveer Singh of the Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
In a workshop organised by the RSIS, Professor Bilveer Singh stated that terrorists take advantage of a weak legal system.22 Such is the case of Indonesia in which the country’s legal system is deemed relatively weak to deal with cyber radicalisation and this has led to the terrorists taking advantage of the limitation.23 21 Kathy Crilley, “Information warfare: new battlefields Terrorists, propaganda and the Internet”, in Cyberterrorism, ed.
Alan O’Day, (Aldershot: Ashgate Publishing Limited, 2004), 69. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
22 Bilveer Singh, “Countering Online Extremism – A Perspective on the Indonesian Case”, lecture given at the Workshop on Extremism and Terrorism Online: A Multidisciplinary Examination of Current Trends and Challenges, 14 October 2014, Singapore.
23 Ibid. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
23 Ibid.
20 Additionally, Dr. Anne Aly, Professor at Edith Cowan University, Australia, argued that individuals with inclination towards terrorist ideology would go online to gain information, strengthen personal identity as well as for social interaction and entertainment.24 Regarding the use of the Internet for information purposes, she cautioned that terrorists seek only information that reinforces their worldview and disregard ones that are not in line with their thinking. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
This leads to the purpose of building personal identity where the Internet is used to strengthen their credibility and support that bolsters their confidence and view of the world.25 The Internet is also used for strengthening social contact where propaganda can reach a wider range of people as well as for entertainment with the need to escape and release tension.26 She further argued that one of the appealing factors of the Internet is its user-friendly nature given the practicality of various social media platforms. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Thomas K. Samuel of the Southeast Asia Regional Centre for Counter- Terrorism (SEARCCT), Ministry of Foreign Affairs, Malaysia, had also given his views on the appeal of the Internet for terrorists. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Dubbed as ’Terrorists’ Show and Tell’, he maintained that the use of the Internet, particularly social media, makes it easier for terrorists to view what other terrorists are doing and subsequently replicate and duplicate successful tactics.27 Furthermore, in an interestingly framed ’The 6th Sense Effect: ‘I See Dead People’, he continued to argue that the online media has the ability to keep alive prominent terrorist figures that are deceased such as Anwar Al-Awlaki, where his sermons have known to have radicalised a number of people. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
He also suggested that the World Wide Web is the best place for terrorists to hide.28 24 Anne Aly, “Focusing Attention on Terrorists’ Audience: A Framework for Developing the Understanding of Extremism and Terrorism Online”, lecture given at the Workshop on Extremism and Terrorism Online: A Multidisciplinary Examination of Current Trends and Challenges, 13 October 2014, Singapore.
25 Ibid.
26 Ibid. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
25 Ibid.
26 Ibid.
27 Thomas K. Samuel, “The Perfect Storm: The Terrorist Message and the Online Media”, lecture given at the Workshop on Extremism and Terrorism Online: A Multidisciplinary Examination of Current Trends and Challenges, 13 October 2014, Singapore.
28 Ibid.
21 Moreover, the Internet is also useful for terrorists as it provides the much needed speed in facilitating online activities. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
This includes gathering information on potential targets and recruits as well as to disseminate propaganda, news, videos of supposed battlefields in a much faster way than conventional newspapers and in real-time.
The cost of conducting terrorist related activities online is much more economical and far more lucrative than to conduct activities in the physical world. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
For example, conducting credit card fraud online would be much easier than to conduct a bank heist given the need for weapons, gadgets, getaway cars and not to mention the risk of getting caught.
Moreover, by doing such activities online, terrorists could also gain more from credit card fraud activities as it could be done in a much larger scale than robbing a bank as well as the ability to evade capture. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
In this section, we have established that some of the appealing factors of the Internet included a wider audience reach, security, easy access to network, speed and learning materials as well as weak legal system that allows terrorists to roam almost freely in the cyber realm.
However, the various usages of the Internet have yet to be ascertained. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Therefore, the next section would seek to identify the various purposes of Internet usage by the terrorists before going into a detailed look into each of the purposes.
22 3 T E R R O R I S T S ’ U S E O F T H E I N T E R N E T : A N O V E R V I E W T errorism and the Internet has gained the attention of experts from various fields. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
For example, James A. Lewis of the Center for Strategic and International Studies (CSIS), argued that the Internet is being used by the terrorists as a “[…] tool for intra-group communications, fund- raising and public relations” as well as to “[…] steal credit card numbers or valuable data to provide financial support for their operations”. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
29 Fred Cohen states that in the past, cyberspace has been used by the terrorists for the purposes of planning terrorist attacks, funding terrorist activities, coordinating and monitoring of ongoing operations, to gain attention and political actions by providing websites that promoted the holding of protests as well as propaganda activities where information and narratives were disseminated.30 Another useful read when identifying the use of the Internet by terrorists was by Barbara Mantel who maintained that experts in the field have argued that the terrorists use the Internet for five particular purposes; (i) to research on potential targets and communicate among each other, (ii) to provide training manuals such as bomb making, (iii) to raise funds, (iv) to conduct media operations by disseminating videos and messages to justify violent actions, (v) as well as to radicalise and recruit members.31 29 James A. Lewis, “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats”, Centre for Strategic and International Studies (CSIS), December, 2002, http://www.enhyper.com/content/0211_lewis.pdf (accessed 17 May 2014). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
30 Fred Cohen, “Terrorism and Cyberspace” in Cyberterrorism, ed. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Alan O’Day, (Alder shot: Ashgate Publishing Limited, 2004), 150 31 Barbara Mantel, “Terrorism and the Internet: Should Web Sites that Promote 23 Theohary and Rollins have also suggested that terrorists are exploiting the Internet to create awareness of their struggle, to spread propaganda through media arms such as Al-Qaeda’s As-Shahab Institute for Media Production, to recruit and radicalise as well as to train terrorists by publishing bomb-making manuals.32 In addition, Madeleine Gruen also commented that the Internet can certainly be used for indoctrination, fundraising, recruiting, inciting violence and terrorise.33 Additionally, Zahri Yunos ascertained that the terrorists’ use the Internet to promote cyber terrorism activities such as videos relating to their cause through dissemination of manifestos, propaganda statements, materials for explosives, attacks, bombing and hostage- taking as well as for inter-group communication and inter-networked grouping, coordinate missions, meetings and to recruit new members.34 Gabriel Weimann added that terrorists are using the cyber network to “distribute their propaganda, to communicate with their supporters, to foster public awareness of and sympathy of their causes, and even to execute operations.”35 The Organisation for Security and Co-operation in Europe (OSCE) had produced a report based on an Online Expert forum on terrorists’ Use of the Internet. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
In the report, it stated that some of the uses of social networking tools by terrorists include recruitment and incitement, planning/strategic communication as well as public outreach and glorification of violence and some perceived successes.36 Terrorism be Shut Down?”, November 2009, CQ Global Researcher, vol.
3, No.
11 32 Catherine Theohary and John Rollins, “Terrorists Use of the Internet: Information Operations in Cyberspace”. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
33 Madeleine Gruen, “Innovative Recruitment and Indoctrination Tactics Extremists: Video Games, Hip Hop, and the World Wide Web”, in The Making of a Terrorist: Recruitment, Training, and Root Causes, ed.
James J.F.
Forest (Westport, CT: Praeger, 2006).
34 Zahri Yunos , “Putting Cyber Terrorism Into Context”, STAR In-Tech, February 24, 2009.
35 Gabriel Weimann, “How Modern Terrorism Uses the Internet”, Security Affairs, 2005, http://www.usip.org/sites/default/files/sr116.pdf (accessed November 3, 2014. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
36 The Organisation for Security and Co-operation in Europe (OSCE), “OSCE Online Expert Forum Series on Terrorist Use of the Internet: Treats, Responses and Potential Future Endeavours”, 2013, http://www.osce.org/atu/102266?download=true (accessed October 15, 2014).
24 This is by no means an exhaustive list of the studies to identify terrorists’ use of the Internet.
But the general purposes of the use of the Internet by terrorists can be derived. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
There are many purposes identified by various experts and practitioners in the field.
Nonetheless, there are essentially nine general purposes for the use of the Internet by terrorists.
The figure below illustrates the various usages of the Internet by terrorists in the effort to further their cause.
As can be seen in Figure 1, there are essentially nine purposes for terrorists’ use of the Internet. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
These includes dissemination of propaganda through terrorist websites, chat rooms, forums and various social media platforms; radicalisation of potential individuals as sympathisers/supporters and recruitment of new members; Terrorists' Use of the Internet Propaganda Radicalisation Recruitment Communication / Networking Funding Training Planning Coordination of Attacks Data Mining Figure 1: Terrorists’ Use of the Internet 25 networking and communication among members of a terrorist group or between terrorist groups; funding gained via the Internet to support terrorists related activities; training for the purpose of equipping terrorists with the necessary skills to conduct attacks; coordination of physical attacks via the Internet; and mining data for potential targets to attack or individuals to radicalise and recruit. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Several of these elements can also be grouped together, for example, planning and coordination of attacks.
It should be noted that all of the above Internet uses by terrorists falls under the category of ECM.
These uses are online activities that essentially help to facilitate, in other words, enables, terrorist attacks in the physical world and also to achieve a terrorist group’s larger objectives.
The following part will focus on Daesh’s use of the Internet. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
26 DAESH AND THE INTERNET 27 T errorism has gone through many waves.
The earliest of acts that could be deemed as terrorism began with the Sicarii or the Zealots of Judea in the first Century, followed by the Assassins or the Nizari Ismalis, a Shia Sect in the 11th Century.37 Particularly with these two groups, the overarching method chosen to spread their discontent was to assassinate their enemies. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Modern terrorism however has seen the rise of a more sophisticated, ideologically based attacks against their perceived enemies. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
This includes the likes of the Irish Republican Army (IRA), the Revolutionary Armed Forces of Columbia (FARC), Peru’s Shining Path, Japan’s Aum Shirinkyo, Germany’s Red Army Faction (RAF), the al-Qaeda and its splinter groups such as the al-Qaeda in the Arabian Peninsula (AQAP), the al-Qaeda in the Islamic Maghreb (AQIM) as well as Somalia’s al-Shaabab, the Philippines’ Abu Sayyaf Group (ASG) and Indonesia’s Jemaah Islamiyah (JI). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
These groups have been known to adopt tactics such as bombings, Kidnappings-for- Ransom (KFR) and attacks using chemical gas among other things.
At present however, there exist a much more gruesome and influential force known as the al Dawla al Islamiya fi al Iraq wa al Sham (Daesh), also referred to as the Islamic State (IS).
Daesh grew out of an al-Qaeda faction known as the al-Qaeda in Iraq (AQI).
The AQI was established in 2004 by Jordanian Abu Musab al- Zarqawi38 for two main reasons. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
The first was to rid Iraq of foreign 37 “Early History of Terrorism”, Terrorism Research, http://www.terrorism-research.
com/history/early.php (accessed March 1, 2015).
38 Al-Zarqawi had met Osama bin Laden earlier in 1999.
Their encounter did not go well as bin Laden was offended by al-Zarqawi’s arrogance and “rigid views”.
In this regard, the animosity between the two had already began in late ‘90s. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
More on this 4 T H E E M E R G E N C E O F D A E S H 28 occupying forces, namely the United States (US) and its allies, while the second reason was to replace the Iraqi government, which was dominated by the Shi’a sect, with a Sunni led government.39 Given that the AQI was led and dominated by mainly non-Iraqi citizens, another organisation was created to include Iraqis for the purpose of strengthening AQI’s image and standing as a legitimate force fighting to liberate Iraq.40 This organisation was called the Islamic State in Iraq (ISI) and was led by an Iraqi known as Abu Omar al-Baghdadi. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
The ISI was allegedly established with the merger of a council called Majlis Shura Mujahideen fil-Iraq, formed by the AQI, and three other minor groups.41 The following chart shows the members of the council and the three minor Iraqi groups that formed the ISI.
Table 1: The Creation of ISI Later in 2013, the ISI was renamed as the Islamic State in Iraq and al- Sham (ISIS) or Islamic State in Iraq and the Levant (ISIL) by Abu Bakr al-Baghdadi and subsequently the Islamic State (IS) in 2014. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
However, governments around the world, including Australia, France and Malaysia, officially refers to the IS as al Dawla al Islamiya fi al Iraq wa al Sham or Daesh42 to degrade its status as an Islamic State.
account could be found in Michael Weiss and Hassan, “ISIS: Inside the army of terror”.
Regan Arts, 2015.
39 IHS Jane’s, “Islamic State”, December 11, 2014 Jane’s World Insurgency and Terrorism, pg.
4-5 40 Ibid, pg.
7.
41 Ibid, pg.
7. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
4-5 40 Ibid, pg.
7.
41 Ibid, pg.
7.
42 Daesh is preferred as it sounds like the Arabic words Daes which means “one who crushes something underfoot” and Dahes which refers to “one who sows discord”.
For added information on this, read “Islamic State, Daesh or Isis: the dilemma of naming 29 The atrocities of the group quickly grew and became one of the most notorious terrorist group in recent times.
They were able to gain support from various parts of the world including the Americas, Europe and Asia. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Their large force, coupled with their military capabilities and skills, led them to successfully take control of a number of cities in Iraq and Syria. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Their methods of executions include publicly torching their enemies, as can be witnessed by the burning of a Jordanian pilot, Muath al-Kasasbeh,43 throwing of homosexuals to their death from rooftops,44 the rape of children and women of Yazidis,45 and beheadings of several of their perceived enemies and parading their severed heads to the public.46 Such acts had led the al-Qaeda to condemn Daesh. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
In a statement made by Ayman al-Zawahiri in 2014, the al-Qaeda decided to cut ties with the organisation and denounced the group’s violent actions.47 Although the al-Qaeda had denounced Daesh, there are several other terrorist groups that had pledged their allegiance and support to Daesh. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
According to a statement made by Ban Ki-Moon, United Nations (UN) Secretary-General, 34 militant groups have pledged their allegiance to Daesh as of December 2015.48 These include groups such as al- the extremists”, The Week, December 2, 2015, http://www.theweek.co.uk/isis/62422/ islamic-state-daesh-or-isis-the-dilemma-of-naming-the-militants (accessed October 10, 2016). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
43 “Jordanian pilot’s “obscene” burning death by ISIS sparks outrage in Mideast”, February 4, 2015, CBSNews, http://www.cbsnews.com/news/jordanian-pilots- obscene-burning-death-by-isis-sparks-outrage-in-mideast/ (accessed July 20, 2016).
44 “Inside look at ISIS’ brutal persecution of gays”, December 2, 2015, CBSNews, http://www.cbsnews.com/news/isis-persecution-gay-men-murder-lgbt-muslim- society/ (accessed July 20, 2016). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
45 Gianluca Mezzofiore, “Iraq: Yazidi girls ‘raped in public’ and sold to Isis fighters before release”, April 9, 2015, http://www.ibtimes.co.uk/iraq-yazidi-girls-raped- public-sold-isis-fighters-before-release-1495594 (accessed July 20, 2016). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
46 Jake Burman, “Evil ISIS fighters yelling Allahu Akbar parade SEVERED HEADS from pick-up truck”, January 18, 2016, Express, http://www.express.co.uk/news/ uk/635560/ISIS-Islamic-State-Libya-Bin-Jawad-Severed-Heads-Parade-Terror-Oil-Ras- Lanuf-Sidra (accessed July 21, 2016). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
47 The Telegraph, “Al-Qaeda cuts links with Syrian group too extreme even for them”, February 3, 2014, http://www.telegraph.co.uk/news/worldnews/middleeast/ syria/10614037/Al-Qaeda-cuts-links-with-Syrian-group-too-extreme-even-for-them.
html (accessed March 1, 2015). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
48 “UN chief: 34 militant groups allied to Daesh worldwide”, February 6, 2016, The Gulf News, http://gulfnews.com/news/mena/iraq/un-chief-34-militant-groups-allied- 30 Ghurabaa in Algeria, Islamic Movement of Uzbekistan (IMU) in Pakistan/Uzbekistan, Tehreek-e-Khilafat in Pakistan, Boko Haram in Nigeria, Al-Shabaab in Somalia and Jund al-Khilafah in Tunisia among others.49 In Southeast Asia, this includes Bangsamoro Islamic Freedom Fighters (BIFF)50 and the ASG (who pledged their allegiance for the second time in 2016 - previously in 2014 - and named Isnilon Hapilon as the leader)51 in the Philippines amongst others. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Furthermore, it was also reported that the spiritual leader of JI, Abu Bakar Bashir, had also voiced his support for Daesh.52 In another development, a new terrorist group called Jahba East Africa in Somalia had also pledged their allegiance to Daesh in April 2016. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
In addition, a Brazilian-based terrorist group had also pledged allegiance to Daesh, making it the first group in South America to have done so.53 Known as “Ansar al-Khilafah Brazil”, the group had pledged their allegiance on July 17, 2016, just before the Olympic Games scheduled in August 2016.54 Another factor that contributed to the rise of Daesh was the influx of disillusioned individuals to Syria and Iraq, who have been radicalised by the idea of an Islamic state and the existence of a Khilafah in this to-daesh-worldwide-1.1667028 (accessed July 21, 2016). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
49 “Islamic State’s 43 Global Affiliates Interactive World Map”, December 2015, IntelCentre, http://scl.io/JGXPdMa7#gs.MVwntZM (accessed July 21, 2016).
50 “BIFF, Abu Sayyaf pledge allegiance to Islamic State jihadists”, August 16, 2014, GMA News, http://www.gmanetwork.com/news/story/375074/news/nation/ biff-abu-sayyaf-pledge-allegiance-to-islamic-state-jihadists#sthash.fVNkSVuo.dpuf (accessed July 21, 2016). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
51 “Abu Sayyaf rebels pledge allegiance to ISIS”, January 11, 2016, The Manila Times, http://www.manilatimes.net/breaking_news/abu-sayyaf-rebels-pledge-allegiance-to- isis/ (accessed July 21, 2016).
52 The Jakarta Post, “Sons, top aides abandon Ba’asyir over ISIL, form new jihadist group”, August 13, 2014, http://www.thejakartapost.com/news/2014/08/13/sons- top-aides-abandon-ba-asyir-over-isil-form-new-jihadist-group.html#sthash.JfnldNqk.
dpuf (accessed March 5, 2015). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
dpuf (accessed March 5, 2015).
53 Elsa Vulliamy, “Brazilian Jihadist group becomes first in South America to pledge allegiance to Isis”, July 19, 2016, Independent, http://www.independent.co.uk/ news/world/americas/isis-brazil-rio-olympics-2016-jihadist-group-ansar-al-khilafah- terrorism-a7143116.html (accessed July 21, 2016). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
54 Lisa Daftari, “Brazil Terror Sect aligns with ISIS as Olympics approach”, July 19, 2016, Fox News, http://www.foxnews.com/world/2016/07/19/brazil-terror-sect- aligns-with-isis-as-olympics-approach.html (accessed July 21, 2016).
31 day and age. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Many have travelled to these war zones from all over the world including from countries in Western Europe, former Soviet Republics, North America, the Balkans, the Maghreb, the Middle East, and Southeast Asia.55 Termed as Foreign Terrorist Fighters (FTFs), the number of such individuals now in Syria and Iraq was estimated to be around 30,000 as of December 2015 with the most coming from Tunisia, followed by Saudi Arabia and Russia.56 Another concerning development out of this influx is the travelling of women and girls as young as 14 years old into these war zones who are mesmerised by the ‘romantic idea of Jihad’. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Determined to help in the war, women, including girls, have travelled to Syria and Iraq to offer themselves as brides of the so-called “heroes” of Jihad.
On 17 February 2015, three British girls, Kadiza Sultana, 14, Shamima Begum, 15, and Amira Abase, 15, travelled to Syria via Turkey.
Earlier in December 2014, Sharmeena Begum, sister of Shamima, had travelled to Syria.
In mid-March 2015, another British woman was arrested in Ankara, Turkey for planning to go to Syria. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
The news came after the arrests of three other British males, two 17 year-old boys and a 19 year-old man, in Turkey while enroute to Syria to join Daesh.57 The development of militants fighting in a foreign land is not an unprecedented event.
In fact, the world had seen a similar event unfolded during the Cold War era. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
As a result of the Afghan-Soviet War (1979 – 1989), many individuals from all over the world including Southeast Asia had gone to Afghanistan to lend their hands in fighting against the Soviet forces.
The end of the Cold War saw the return of these former Afghan fighters, known as the ‘Afghan Alumni’, to their home countries and they subsequently started their own militant activities and organisations such as JI, Kumpulan Mujahidin Malaysia (KMM) and Rabitatul Mujahidin. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
55 “Foreign Fighters: An Updated Assessment of the Flow of Foreign Fighters into Syria and Iraq”, December 2015, The Soufan Group, http://soufangroup.com/wp-content/ uploads/2015/12/TSG_ForeignFightersUpdate3.pdf (accessed July 21, 2016) 56 Ibid.
57 The Guardian, “British woman held in Turkey on suspicion of trying to travel to Syria”, March 17, 2015, http://www.theguardian.com/world/2015/mar/17/british- woman-held-turkey-suspicion-travel-syria (accessed March 19, 2015). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
32 Based on this experience, many countries in the world, including Malaysia and Indonesia, are concerned with the returning fighters from Syria and Iraq.
Embedded with violent ideology and agenda, as well as the expertise and experience in guerrilla warfare, the fear is that they are capable of initiating terrorist-related activities in their own country.
This concern is not without basis as can be witnessed in the case of an attack on the Brussels Museum in Belgium on 24 May 2014. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
The perpetrator, Mehdi Nemmouche, was believed to have travelled to Syria in 2013 to join a terrorist group in the country.58 In relation to the influx of foreigners into Syria and Iraq to join Daesh and other militant groups operating in the areas, another major and probably the leading factor that led to the rise of Daesh is the group’s own well thought-out media strategy. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
While the battle for the land of Syria and Iraq is very much in the physical world, their media strategy however lies very much in the virtual world, through the use of the Internet.
The Internet is being utilised by Daesh for various terrorist purposes.
These include networking, planning, funding, training, data mining and coordination of attacks. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
However, as like most other terrorist groups, Daesh’s main usage of the Internet is to spread their propaganda to radicalise and lure potential recruits into joining their ranks.
In this regard, the following section will focus on the use of the Internet for propaganda purposes, including the various platforms used to disseminate pro-Daesh materials. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
It will then be followed by Daesh’s other usages of the Internet including radicalisation and recruitment, communication and networking, online funding, training, planning and coordination of attacks, as well as data mining.
58 Mark Tran, “Brussels shooting raises fears over European fighters returning from Syria”, June 1, 2014, The Guardian, https://www.theguardian.com/uk-news/2014/ jun/01/brussels-shooting-raises-fears-around-fighters-returning-from-syria (accessed July 21, 2016). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
33 5 P R O P A G A N D A “Behind this mask there is more than just flesh.
Beneath this mask there is an idea... and ideas are bulletproof.” - Alan Moore, V for Vendetta P rior to the emergence of Daesh, many terrorist groups have resorted to using the Internet to promote their cause and gage support from the rest of the world. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
For example, terrorist groups such as Aum Shinrikyo, the Japanese Red Army, the Shinning Path, the ETA and the FARC amongst others had created websites for the purpose of publicising their causes.59 The IRA, in the effort to form a united Ireland, also created a website to promote their agenda.60 Nonetheless, the Liberation Tigers of Tamil Ealam (LTTE) is believed to be among the first to use the Internet to spread the group’s propaganda.61 The civil war fought between the LTTE and the Sri Lankan government had led to a large Tamil diaspora around the world, particularly in 59 Counter-Terrorism Implementation Task Force (CTITF) Working Group on “Countering the Use of the Internet for Terrorist Purposes, May 2011, http://www. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
un.org/en/terrorism/ctitf/pdfs/ctitf_interagency_wg_compendium_legal_technical_ aspects_web.pdf (accessed 20 January 2015). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
60 Lorraine Bowman-Grieve and Maura Conway, “Exploring the Form and Function of Dissident Irish Republican Online Discourses”, 2012, http://www.google.com.my/ url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0CD8QFjAF&url=http%3A%2F% 2Fdoras.dcu.ie%2F17637%2F1%2FIrish_Republican_Online_Discourses_FINAL_NOT_ PROOF.pdf&ei=-wH9VLeMIM2eugTr-4L4DA&usg=AFQjCNGiJUP3lNl9cxzFnHABxU3R- IHKGA&bvm=bv.87611401,d.c2E (accessed December 14, 2014). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
61 Janaka Perera, “LTTE a trend setter in cyber terrorism”, Asian Tribune, October 27, 2007, http://www.asiantribune.com/node/8018 (accessed on June 27, 2016).
34 Canada, United States (US), United Kingdom (UK), Australia and France.62 In this regard, the Internet was useful for the LTTE supporters within the diaspora as it allowed them to stay informed of the situation at home while simultaneously spreading the group’s propaganda. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
The al-Qaeda is also known for their use of the Internet to promote armed jihad in achieving their goal of an Islamic caliphate.
In ensuring the success of their propaganda, al-Qaeda formed a media arm known as As-Sahab.
The purpose of the media arm was to spread their propaganda and ideology through videos and statements of their leaders.63 Online magazines including Inspire and Resurgence were also published to reinforce their propaganda. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
As with the al-Qaeda, Daesh too is using the Internet to promote its propaganda.
Nonetheless, unlike its predecessors, Daesh was able to manipulate the Internet to an even greater height by creating a massive media legion. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
According to Charlie Winter’s ‘Documenting the Virtual ‘Caliphate’’, Daesh has about seven media agencies under its central media command, including al-Himma Foundation, al-Furqan Foundation, al-I’tisam Foundation, al-Hayat Media Centre, Ajnad Foundation, al-Bayan Radio and A’maq News Agency.64 In addition to that, the central media command has 37 other media offices operating in different provinces including Aleppo, Damascus, Jazira, Fallujah, Nineveh, Baghdad, Khurasan, and Sinai among others,65 while simultaneously spread the group’s propaganda. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
The need for such massive media movement is not surprising as Daesh aims to stringently control outgoing information from within its territories.66 62 Peter Chalk, ‘The Tigers Abroad: How the LTTE Diaspora Supports the Conflict in Sri Lanka’, 2008, http://journal.georgetown.edu/wp-content/uploads/9.2-Chalk.pdf, (accessed 7 March 2014) 63 “As-Sahab: Al Qaeda’s Nebulous Media Branch”, Stratfor, September 8, 2006, https://www.stratfor.com/analysis/sahab-al-qaedas-nebulous-media-branch (accessed June 29. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
2006 64 Charlie Winter, “Documenting the Virtual ‘Caliphate’”, Quilliam Foundation, October 2015, https://www.quilliamfoundation.org/wp/wp-content/uploads/2015/10/FINAL- documenting-the-virtual-caliphate.pdf (accessed June 27, 2016).
65 Ibid. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
65 Ibid.
66 Mah-Rukh Ali, “ISIS and Propaganda: How ISIS Exploits Women”, Reuters Institute for the Study of Journalism, 2015, https://reutersinstitute.politics.ox.ac.uk/sites/ 35 This is to ensure that no unwanted information are being released to the international audiences, but those in line with the group’s propaganda.67 This demonstrates that Daesh recognised the importance of the media and the Internet in spreading their propaganda as well as to garner support from the international community. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Daesh has been diligent in promoting their cause on the Internet via various social media platforms including by producing Hollywood-style videos and high resolution online magazines such as Dabiq and IS Report.
Though these publications are mainly published in the English language, it is also being translated into various other languages including German, French, Arabic and Indonesian68.
Daesh’s Online Publications Dabiq, now in its 15th issue, is Daesh’s leading online magazine. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Dabiq magazines are useful in understanding the group’s motives and their propaganda themes.
It is also helpful in the examination of how Islam is being manipulated by Daesh to promote and justify the group’s establishment and acts of terror.
For example, even the name of the magazine, ‘Dabiq’, is in reference to an Islamic hadith (Sahih Muslim 2897). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
In the hadith, the name Dabiq is referred to as a place in the Northern countryside of Halab or Aleppo, where alleged events leading up to the end of time would take place (near Dabiq).69 Furthermore, Daesh ensured that the hadiths quoted in the publication were from amongst the most trusted sources such as the ‘sahihain’ to justify its establishment and al-Baghdadi’s appointment as its Khilafah.70 Hence, the use of such authentic collections of the Prophet’s Sunnah is likely default/files/Isis%20and%20Propaganda-%20How%20Isis%20Exploits%20Women. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
pdf (accessed June 3, 2015).
67 Ibid.
68 Translated issues of Dabiq in Indonesian language can be downloaded at https:// baaqiyah.wordpress.com/category/artikel/ (accessed July 11, 2016).
69 “The Return of the Khilafah” June-July 2014, Issue 1, pg.
2-3 Al-Hayat Media Centre. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
2-3 Al-Hayat Media Centre.
70 Harleen K. Gambhir, “Dabiq: The Strategic Messaging of the Islamic State”, Institute for the Study of War (ISW), August 15, 2014, http://www.understandingwar.org/sites/ default/files/Dabiq%20Backgrounder_Harleen%20Final.pdf (accessed March 1, 2015).
36 to attract disillusioned readers as it can be seen as providing legitimacy to Daesh and the lands they claim to be controlling. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Apart from that, Dabiq also aims to call upon all Muslims to support Daesh and emigrate, along with their family, to the land they call the Islamic State.71 According to Dabiq’s second issue, titled The Flood, “the first priority is to perform hijrah from wherever you are to the Islamic State, from darul-kufur to darul-Islam”.72 Furthermore, it went on to suggest that if one was unable to immigrate to the Islamic state, one should organise a bay’at or pledge of allegiance to the Khilafah and publicise it.73 Additionally, Dabiq is also a source for Daesh to reveal their alleged enemies including specific individuals as well as countries whom they regard as taghut74. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
In the 14th issue of Dabiq, under the article titled ‘The Murtadd Brotherhood’, Afghanistan, Iraq, Algeria, the Philippines, Tunisia, Libya, Pakistan, Bangladesh, Indonesia, Malaysia and Egypt were among the countries Daesh labelled as taghut.75 In its 15th issue Break the Cross, Daesh reiterated their justifications for regarding Christianity and secular states as their enemies.76 The impact of such call was staggering as many terrorist groups around the world had pledged their support or allegiance to Daesh. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
These include Boko Haram in Nigeria, Jund al-Khilafah in Tunisia, al- Ansar Battalion in Algeria, IMU in Pakistan/Uzbekistan, ASG in the Philippines, BIFF in the Philippines, and Mujahideen Indonesia Timor (MIT) in Indonesia amongst others.77 In addition, attacks in the name of Daesh have been recorded in Australia, Bangladesh, Belgium, Egypt, France, Indonesia, Turkey and the US amongst others.78 Malaysia too 71 Harleen K. Gambhir, “Dabiq: The Strategic Messaging of the Islamic State”, Institute for the Study of War (ISW), 72 Dabiq, “The Flood”, 2nd Edition, June-July 2014. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
73 Ibid.
74 Taghut refers to worshipping of anything except Allah.
75 “The Murtadd Brotherhood”, Al-Hayyat Media Centre, April 13, 2016, pg.
28.
76 Break the Cross, July 2016, al-Furqan, http://jihadology.net/2016/07/31/new- issue-of-the-islamic-states-magazine-dabiq-15/ (accessed September 2016). | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
77 “Islamic State’s 43 Global Affiliates Interactive World Map”, IntelCentre, December 15, 2015, http://scl.io/JGXPdMa7#gs.VWFCxW8 (accessed June 11, 2016) 78 “A timeline of Daesh attacks worldwide”, Gulf News, July 3, 2016, http://gulfnews.
com/news/mena/iraq/a-timeline-of-daesh-attacks-worldwide-1.1856495 (accessed 37 was not spared from attacks by Daesh. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
On 28 June 2016, the Movida nightclub in Puchong, Selangor, was attacked by supporters of local Daesh militants.79 Following years of no attacks, this was the first successful Daesh-related attacks on Malaysian soil. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
It is believed that the perpetrators had received orders from a Malaysian Daesh fighter in Syria, Mohammad Wanndy Mohamed Jedi.80 As a result of the attack, two suspects as well as 13 other Daesh-linked individuals were arrested in a series of operations around Malaysia.81 In addition, in a statement made by the Malaysian Inspector-General of Police, Tan Sri Khalid Abu Bakar, those who were arrested had been recruited and given instructions through social media.82 The Islamic State (IS) Report is another online publication by Daesh. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
In its effort to portray Daesh as not only an organisation but a state with a strong governing structure, the IS Report offers an insight into Daesh including events that unfolded in Syria, Iraq and the region as well as interviews with Daesh’s “prominent” figures. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
For example, the first issue of the report, published in June 2014, looked into how Daesh prepared its Imams and Khateeb through education.83 In an article covered in this issue was an interview with Daesh’s Head of Consumer Complaints Division, who spoke of how his team went on the ground to inspect restaurants, shopping centres, wholesale outlets and slaughterhouses to ensure that these premises and business conducts were in line with Shari’a.84 Such publicity stunt and media strategy may mislead many to believe that Daesh is legitimate, and that it is an obligation for all Muslims to travel to Syria and Iraq to join in the struggle. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
July 11, 2016).
79 “Puchong Blast Work of Daesh Militants, says IGP”, Bernama, July 4, 2016, http:// www.bernama.com/bernama/v8/newsindex.php?id=1261026 (accessed July 11, 2016).
80 Ibid.
81 Farik Zolkepli, M. Kumar and Michelle Tam, “IGP confirms IS behind grenade blast in Puchong”, The Star, July 5, 2016, http://www.thestar.com.my/news/ nation/2016/07/05/it-was-a-terrorist-attack-igp-confirms-is-behind-grenade-blast-in- puchong/ (accessed July 11, 2016).
82 Ibid. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
82 Ibid.
83 Islamic State (IS) Report, “Propagating the Correct Manhaj”, June 2014, Issue 1, Al-Hayat Media Centre.
84 Ibid. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
84 Ibid.
38 Apart from publishing online magazines which would be translated into several other languages, Daesh also releases magazines for specific languages such as Dar-al-Islam, a French-language online magazine, Konstantiniyye, a Turkish-language online magazine and Al-Fatihin, a Malay-language online newspaper produced by Daesh-linked Furat Media.85 Another publication by Daesh worth monitoring is Rumiyah which was first published in September 2016, and bears resemblance to Dabiq. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |
Nevertheless, it must not be overlooked that Daesh and its core operatives are not the main sources for spreading the group’s propaganda and radicalising individuals.
In fact, unaffiliated sympathisers are the ones actively spreading Daesh-type propaganda.
This represents Jared Cohen’s third type of Daesh’s digital fighters. | https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf | https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf | Malaysia |