text
stringlengths
10
3.23k
document_url
stringclasses
318 values
source_url
stringclasses
318 values
country
stringclasses
137 values
For example, one of Daesh’s main sources of revenue, sadaqa or private donations, are believed to have been facilitated through the use of crypto-currencies by transferring Bitcoins to Daesh owned accounts.174 The use of Bitcoin by Daesh was further strengthened by the release of a document entitled ‘Bitcoin wa Sadaqat al-Jihad’ (Bitcoin and the Charity of Violent Physical Struggle).175The document promotes the use of Bitcoin and Dark Wallet to provide total anonymity and thus, avoid detection from authorities.176 The document also aims to serve as a 171 Ibid.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
172 “What is Bitcoin?”, March 20, 2015, CoinDesk, http://www.coindesk.com/ information/what-is-bitcoin/ (accessed August 2, 2016). 173 Ibid. 174 Beatrice Berton, “The dark side of the web: ISIL’s one-stop shop?”, June 26, 2015, Alert No. 30, European Union Institute for Security Studies (EUISS), http://www.iss. europa.eu/publications/detail/article/the-dark-side-of-the-web-isils-one-stop-shop/ (accessed August 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
175 Taqi’ulDeen al-Munthir, “Bitcoin wa’ Sadaqat al-Jihad“, https://alkhilafaharidat. files.wordpress.com/2014/07/btcedit-21.pdf (accessed July 28, 2016). 176 Ibid. 60 guideline for the management and utilisation of Bitcoin.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This is done in the effort to set up untraceable donation system “[…] that could send millions of dollars’ worth of Bitcoin instantly from the United States, United Kingdom, South Africa, Ghana, Malaysia, Sri Lanka, or wherever else right to the pockets of the mujahideen […]’.177 Bitcoin has also been used for extortions.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Such example was in the case of the bombings at Mall Alam Sutera in Serpong, Indonesia on July 9 and October 28, 2015.178 The perpetrator, known as Leopard Wisnu Kumala, was also responsible for placing two other bombs on July 6 and October 21, 2015 at the same mall but the bombs did not explode.179 His modus operandi was to place these bombs at the mall and later contact the management‘s mall via e-mail to demand for bitcoins.180 It was reported that he had demanded for 100 bitcoins but only received a small fraction of it following the first bomb attack.181 He was then captured on October 28, 2015, following the attack on the same day.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Although he was deemed to be acting alone, it was revealed that he often watches videos of Daesh,182 prompting that the perpetrator may be a supporter of Daesh. Nonetheless, the use of social media platforms such as Facebook, as well as the usage of Bitcoin to collect funds in support of Daesh have changed the landscape of funding for terrorist-related activities.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Most importantly, the impact of such approach has led to the decentralisation of both the requester as well as the funder, and not to mention the far reaching effect of the call to donate in the name of religion. 177 Ibid. 178 Mei Amelia R, “Ini Alasan Leopard ‘Lone Wolf’ Bomber Mal Alam Sutera Minta Bitcoin”, October 29, 2015, Detik News, http://news.detik.com/berita/3057156/ini- alasan-leopard-lone-wolf-bomber-mal-alam-sutera-minta-bitcoin (accessed August 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
179 Rinaldo, “Video Detik-Detik Leopard Menaruh Bom di Mall Alam Sutera”, October 29, 2015, Liputan 6, http://news.liputan6.com/read/2352798/video-detik-detik- leopard-menaruh-bom-di-mall-alam-sutera (accessed August 2, 2016). 180 Mei Amelia R, “Ini Alasan Leopard ‘Lone Wolf’ Bomber Mal Alam Sutera Minta Bitcoin”, October 29, 2015, Detik News. 181 Ibid.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
181 Ibid. 182 “Tersangka Bom Alam Sutera Kerap Tonton Video ISIS”, October 30, 2015, CNN Indonesia,http://www.cnnindonesia.com/nasional/20151030230011-12-88541/ tersangka-bom-alam-sutera-kerap-tonton-video-isis/ (accessed July 27, 2016). 61 9 T R A I N I N G B efore the rise of Daesh, al-Qaeda had also utilised the internet to disseminate training materials.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
A stark example of this was the case of the 2013 Boston Marathon Bombing in which the two brothers involved learned to make bombs by reading al-Qaeda’s Inspire magazine article entitled “Make a Bomb in the Kitchen of Your Mom”.183 Additionally, another manual prepared by al-Qaeda known as the Encyclopaedia of Jihad distributed via the Internet “provides detailed instructions on how to establish an underground organisation and execute terror attacks”.184 Apart from that, Al Qaeda also published a monthly e-magazine called Al-Battar.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In a number of its editions, the magazine outlined “detailed instructions on physical fitness training, the use of firearms, how to plot an assassination, wilderness survival skills and how to organise and manage terrorist cells”.185 Also on the Internet are documents such as “Mujahideen Poisons Handbook” that contains various “recipes” for homemade poisons and poisonous gases”.186 Like the al-Qaeda, Daesh also uses the Internet to provide training materials, particularly for aspiring Daesh fighters.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
According to a report by Mary-Ann Russon and Jason Murdock of the International Business Times UK (IBTimes UK) who infiltrated Daesh’s communications, 183 “Al Qaeda magazine on pressure cookers: ‘Make a bomb in the kitchen of your mom’”, April 16, 2013, http://www.washingtontimes.com/news/2013/apr/16/al- qaeda-magazine-pressure-cookers-make-bomb-kitch/ (accessed 20 August 2015). 184 Maura Conway, “Terrorism and the Internet”: New Media – New Threat?”.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
185 “Dot-Com Terrorism,” The New Atlantis, Number 5, Spring 2004, pp. 91-93. 186 Counter-Terrorism Implementation Task Force (CTITF) Working Group on “Countering the Use of the Internet for Terrorist Purposes, May 2011. 62 Daesh has been using the social networking platform Telegram, to plan hacking operations, provide weapon instructions and trade tactics.187 According to the same source, Daesh has a lot of channels and chatrooms on Telegram for the purpose of disseminating such materials.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
For example, on how to make ‘home-made’ bombs and poisons, as well as on how to use missile launchers, armoured vehicles and launching attacks on “…enemies’ fighter jets from the ground”.188 Such online materials could be dangerous as it could be easily accessed by home-based Daesh supporters to acquire skills to make bombs and conduct attacks in their home countries.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In a counter-terrorism operation conducted by the RMP in May 2015, 12 suspected militants related to Daesh were arrested while they were mixing chemicals to make a bomb.189 One of the arrested individuals had admitted that he learnt to make the bomb, with a potential 500 meter blast radius, via the Internet.190 In another case, a 14 year-old boy from Austria was charged in 2015 after admitting to downloading bomb-making instructions on to his PlayStation console.191 Additionally, a Daesh-affiliated Telegram account responded to a declaration of war by Anonymous against Daesh, following the Paris terror attacks in November 2015.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This was done by alerting their supporters of the cyber attack threatened by Anonymous and gave detailed instructions on how to prevent supporters from getting hacked by Anonymous.192 The instructions included “don’t open links unless 187 Mary-Ann Russon and Jason Murdock, “Welcom to the bizare and frightening world of Islamic State Channels on Telegram”, International Business Times UK, May 23, 2016, http://www.ibtimes.co.uk/welcome-bizarre-frightening-world-islamic-state- channels-telegram-1561186 (accessed June 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
188 Ibid. 189 Farik Zolkepli, “Suspected militants nabbed while they were making bombs”, The Star, April 27, 2015, http://www.thestar.com.my/news/nation/2015/04/27/cops-foil- terror-attack-plans-suspected-militants-nabbed-while-they-were-making-bombs/ (accessed June 2, 2016). 190 Ibid. 191 Shadia Nasralla, “Teenager in Austrian ‘Playstation’ terrorism case gets 2 years”, Reuters, May 26, 2015, http://in.reuters.com/article/mideast-crisis-austria- idINKBN0OB1J320150526 (accessed June 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
192 Pamela Engel, “’Idiots’: ISIS responds to Anonymous threatening its ‘biggest operation ever’ against them”, Business Insider Malaysia, November 17, 2015, http:// 63 sure of the source”, change Internet Protocol (IP) constantly, and “do not talk to people [you] don’t know on Telegram” or through Twitter direct messaging”.193 In relation to information on hacking, Telegram channels associated with Daesh’s cyber communities also posted books regarding hacking techniques.194 This showcases the ability of Daesh to counter possible threats, in any form, against them.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Apart from that, it also highlights the reality that Daesh is adamant in fighting their enemies both in the physical world as well as in the virtual realm. www.businessinsider.my/isis-anonymous-response-paris-attacks-2015-11/?r=US&IR= T#xTvZKfuKWSO4Tb5v.97 (accessed June 1, 2016). 193 Ibid. 194 Mary-Ann Russon and Jason Murdock, “Welcom to the bizare and frightening world of Islamic State Channels on Telegram”, International Business Times UK, May 23, 2016.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
64 T here have been several instances of the use of the Internet particularly social media platforms, by Daesh to plan and conduct terrorism-related activities.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
For instance, in a report by Newsweek, it was highlighted that arrangements for the delivery of donations gained through bogus humanitarian aid were coordinated via social media platforms such as Kik and WhatsApp.195 In this regard, WhatsApp was used as it contained features such as ‘Location’ whereby a user can send his or her exact location to the person who will deliver the donation.196 Kik was used as it allows users to create an account without having to provide his or her phone number, hence, able to maintain anonymity and avoid detection.197 In another example, Daesh attempted to ‘attack’ Facebook and Twitter by respectively liking pro-Daesh postings and hijacking hashtags with pro-Daesh content.198 This operation was reportedly planned through a pro-Daesh Telegram channel that encouraged supporters to conduct the attacks to “…dominate the post and make some serious da’wah” (teaching of Islam).199 Nonetheless, it was reported that the plan to attack both Facebook and Twitter were futile as there were insignificant number of participations.200 195 Janine Di Giovanni, Leah McGarth Goodman and Damien Sharcov, “How Does ISIS Fund Its Reign of Terror?”, Newsweek, November 6, 2014.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
196 Ibid. 197 Ibid. 198 Jason Murdock, “Isis tried to launch a social media propaganda ‘attack and it was a shambles”, International Business Times UK, April 8, 2016, http://www.ibtimes. co.uk/isis-tried-launch-social-media-propaganda-attack-it-was-shambles-1553879 (accessed June 2, 2016). 199 Ibid. 200 Ibid. 1 0 P L A N N I N G A N D C O O R D I N A T I O N O F A T T A C K S 65 Planning and clear examples of coordinating attacks via the Internet by Daesh is found to be relatively limited.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This may largely be due to the fact that Daesh is in a ‘hot war’ or direct combat with designated physical territories, against its enemies. Therefore, the majority of the attacks taking place in Daesh-controlled areas may be coordinated in the physical world rather than virtually. This however, may not be applicable to those who have or will answer the call by Daesh to strike in their own respective countries.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This is also evident in Southeast Asia where Telegram and WhatsApp have been used to plan attacks by Daesh supporters and facilitate movements to southern Philippines for terrorist training purposes.201 Furthermore, with increasing reports suggesting that Daesh is planning to orchestrate coordinated attacks across Europe,202 more online communication for the purpose of planning and coordinating attacks may take place in the near future.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
201 Royal Malaysian Police (RMP) Official, interview with author on July 26, 2016, Kuala Lumpur. 202 Emily Smith, “ISIS planning ‘special forces-style’ attacks in Europe, report says”, CNN, January 26, 2016, http://edition.cnn.com/2016/01/26/world/isis-attacks- europe/ (accessed June 6, 2016) 66 T errorist groups are also utilising the Internet for data mining purposes.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Data mining in this regard refers to collection of information of particular places and individuals as potential targets for attacks as well as recruitment. For example, in the case of the September 11 attacks, the al-Qaeda operatives involved in the attacks used the Internet to collect information such as flight times and to share information and coordinate their attacks.203 In this regard, Daesh too has been utilising social media platforms for the purpose of data mining and gathering of information.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This is particularly evident in the process of selecting individuals for radicalising or recruitment purposes.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Based on a research conducted by Dr. Robyn Torok, Rebecca Turner of the ABC news agency reported that “recruiters identify potential targets by monitoring Facebook conversation threads.204 By looking at the amount and frequency of Facebook posts a subject had posted, the recruiter will then engage the subject to speak about more personal matters such as their hobbies and interests.205 The process will go on until she or he is invited to join a private group for a more in depth discussion on issues relevant to Daesh’s propaganda.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
203 United States Institute of Peach (USIP), “Terror on the Internet: Questions and Answers”, http://www.usip.org/publications-tools/terror-internet/terror-internet- questions-and-answers (accessed 20 July 2015). 204 Rebecca Turner, “Islamic State recruiters create complex network of Facebook accounts to entice Australian teens”, ABC, December 24, 2015, http://www.abc.net. au/news/2015-11-30/islamic-state-using-facebook-to-gather-new-recruits/6968890 (accessed June 2, 2016). 205 Ibid.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
1 1 D A T A M I N I N G 67 Furthermore, according to an interview with an RMP officer, Daesh recruiters will often vet potential targets through their Facebook profiles to observe on how frequent these potential targets comment on Syria and Iraq to assess whether they are genuine sympathisers or supporters of Daesh.206 They will then conduct further examination by adding them as friends and will only engage in private communication only after they are certain of the individuals’ faithfulness.207 The use of social media to prey on potential targets and radicalise vulnerable teenagers and individuals is evident and should be taken seriously.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This is expected as the pool of available data, or in other words, access to potential recruits that these terrorist elements could attain from Facebook, Twitter, and Instagram are in abundance and easily accessible. Therefore, it is only necessary that nations and the international community take concerted steps to halt, or at the very least, limit the reach of Daesh around the world. Hence, a compressive approach to this must be developed.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Nonetheless, before presenting several possible recommendations looking at both offline and online approaches, several observations can be made. 206 Royal Malaysian Police (RMP) Official, interview with author on July 26, 2016, Kuala Lumpur. 207 Ibid. 68 B ased on the previous examples and discussions, a number of key observations can be made.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Amongst the observations identified include Daesh’s use of the Dark Web, the use of the Internet to prepare and facilitate the movements of radicalised individuals to Daesh-controlled areas, increase in hacking activities, intensive usage of social media, and the challenges that counter operatives face when dealing with Daesh’s use of social media platforms.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Daesh and the Use of Dark Web As a result of rigorous counter actions against Daesh and their use of the internet, some Daesh operatives and its supporters have relocated to the Dark Web for increased security.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Dark Web is defined as the “portion of the Deep Web that can only be accessed through specialized browsers”.208 It is important however to note the difference between Dark Web and Deep Web where the former is the deepest layer of the latter.209 In this regard, Dark Web provides the users with ultimate anonymity and it is “[…] inaccessible to most but navigable for the initiated few […]”.210 As such, in the effort to access websites operating under Dark Web, special softwares such as The Onion Router (TOR) or the I2P (Invincible Internet Project) is needed.211 TOR allows “[…] users 208 Gabriel Weimann, “Terrorist Migration to the Dark Web”, June 2016, Vol.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
10, Issue 3, Perspectives on Terrorism, http://www.terrorismanalysts.com/pt/index.php/pot/ article/view/513/1013 (accessed August 2, 2016). 209 Ibid. 210 Beatrice Berton, “The dark side of the web: ISIL’s one-stop shop?”, June 26, 2015, Alert No. 30, European Union Institute for Security Studies (EUISS). 211 Gabriel Weimann, “Terrorist Migration to the Dark Web”, June 2016, Vol.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
10, Issue 1 2 O B S E R V A T I O N S 69 to hide their Internet Protocol (IP) addresses and activity through a world-wide network of computers and different layers of encryption (like the layers of an onion), which guarantee their anonymity”.212 There have been indications that Daesh is utilising this platform to conduct its terrorist-related activities, from spreading its propaganda, to communicating, to purchasing weapons, and to conduct its attacks.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Following the shutdown of Daesh-related websites and accounts by the group Anonymous, it was reported that the Dark Web was used to spread Deash’s propaganda in order to conceal the identities of its supporters and its content from hacktivists.213 Furthermore, following the November 2015 Paris attacks, Daesh announced the operation of a website in the Dark Web that stores terrorist propaganda materials online.214 In addition, there is also the likelihood that weapons are being purchased through the Dark Web by Daesh.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
For example, the guns used in the Paris attacks were thought to be bought from a Dark Web vendor called DW Guns.215 The use of Bitcoin by Daesh operatives and supporters as mentioned previously, is also an indication that Daesh may be conducting more activities on the Dark Web. Bitcoin can be used to conduct purchases of illegal goods on the Dark Web, extortion or money laundering.216 One example of this is a site called “Fund the Islamic Struggle without Leaving a Trace”.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This site, available on the Deep Web, “[…] invites donations for Jihad through transactions to a particular Bitcoin address”.217 More illegal goods can also be obtained through the Dark Web that may benefit Daesh in their planning and coordination of attacks. For example, documents such as “fake passports, driver’s 3, Perspectives on Terrorism. 212 Beatrice Berton, “The dark side of the web: ISIL’s one-stop shop?”, June 26, 2015, Alert No. 30, European Union Institute for Security Studies (EUISS).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
213 Gabriel Weimann, “Terrorist Migration to the Dark Web”, June 2016, Vol. 10, Issue 3, Perspectives on Terrorism. 214 Ibid. 215 Ibid. 216 Beatrice Berton, “The dark side of the web: ISIL’s one-stop shop?”, June 26, 2015, Alert No. 30, European Union Institute for Security Studies (EUISS). 217 Gabriel Weimann, “Terrorist Migration to the Dark Web”, June 2016, Vol. 10, Issue 3, Perspectives on Terrorism.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
10, Issue 3, Perspectives on Terrorism. 70 license, ID cards and other products for use in the UK and US, Australia and Belgium among other countries”218 can also be purchased via the Dark Web. In essence, the Dark Web has created an environment where illegal activities can be invisibly conducted. Such an environment is conducive for terrorists to carry out their terrorist activities.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
With the increase in counter operations on online terrorist-related activities conducted through conventional search engines such as Google and Internet Explorer, a drastic shift in the use of Dark Web can be expected. While access to it is intricate, it is not impossible. TOR browsers can be downloaded or purchased via the Internet easily.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In fact, there have also been suggestions that certain captured Daesh terrorists operating in Southeast Asia have had TOR installed in their computers.219 Preparation and Facilitation of “Migration” In addition to the usage of the Internet to spread propaganda, communicate, radicalise and facilitate recruitment, one interesting use of the Internet by Daesh that sets the organisation apart from other known terrorist groups such as al-Qaeda, is its ability to prime aspiring mujahideens and to facilitate their movements to perform “migration” to the so-called Islamic State.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This is done through the publication of guidelines and manuals, which can be obtained via websites and forums as well as dissemination by supporters from their own social media accounts. One particular publication that touched extensively on the preparation needed to make the migration to Syria and Iraq was ‘Hijrah to the Islamic State’, 220 published in 2015.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In this publication, Daesh focused on explaining a step-by-step procedure on how to travel to Syria and the preparation needed to 218 Beatrice Berton, “The dark side of the web: ISIL’s one-stop shop?”, June 26, 2015, Alert No. 30, European Union Institute for Security Studies (EUISS). 219 Royal Malaysian Police (RMP) Official, interview with author on July 26, 2016, Kuala Lumpur 220 “Hijrah to the Islamic State”, published online by the Islamic State (site retrieved no longer accessible).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
71 make that so-called migration to the “Islamic State”.221 This publication also provided would be travellers with practical advice such as what to do when they arrive in Turkey, which hotel to go to, which cell phone service provider should be bought (it was advised that Turkcell should be purchased), and what to say if you were detained by the police in Turkey. Included in this publication too is a guide for women to make their hijrah.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
At the end of the publication, a list of new Twitter accounts were provided with an additional hadith on hijrah. Hacking Activities While several terrorist groups in the past have deliberated over the use of the Internet to conduct hacking activities, Daesh has made it into one of their modus operandi. For example, in January 2015, a pro-Daesh group had managed to hack into the US military Central Command (CENTCOM) Twitter and YouTube accounts.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
During the attack, it was reported that CENTCOM’s Twitter account’s icon had been replaced with an image of a masked man along with the words “Cyber Caliphate” and “I Love You ISIS” whereas CENTCOM’s YouTube page had posted two pro-Daesh videos.222 While CENTCOM, the body that is responsible for coordinating the coalition against Daesh in the Middle East,223 may be a strategic target, the impact of the so-called attack was however minimal.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
221 The document argued that three, and only three bags; a satchel, a backpack and a suitcase; are needed for the travel to Syria. It went on to advice on what should contain in each of the bags. For example, the satchel should include vital belongings such as passport, plane tickets (in which one was advised to purchase a return ticket so as to not arouse suspicion), mobile phone, wet wipes, tissue paper, pen and paper among other things.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
As for the backpack, it was advised that one should have at least one change of clean clothing, a jacket, footwear and other electronic items such as laptop, tablet, portable Wi-Fi modem, plug adapters, etc. As with the suitcase, the listed items to be included are sleeping bag, long-johns, toiletries, camping plate and sewing kits.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
222 Spencer Ackerman, “US Central Command Twitter account hacked to read ‘I love you Isis’”, The Guardian, January 12, 2015, http://www.theguardian.com/us- news/2015/jan/12/us-central-command-twitter-account-hacked-isis-cyber-attack (accessed June 3, 2016). 223 Adam Hoffman, and Yoram Schweitzer, “Cyber Jihad in the Service of the Islamic State (ISIS)”, Strategic Assessment, Vol. 18 No.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
18 No. 1, April 2015 http://www.inss.org.il/ uploadImages/systemFiles/adkan18_1ENG%20%285%29_Hoffman-Schweitzer.pdf (accessed June 3, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
72 It was also reported that about 19,000 websites in France had been hacked by groups claiming to be affiliated to Daesh following the Charlie Hebdo attacks.224 The attacks, which resulted in a Denial of Service (DoS), targeted various websites from tourism pages to military websites.225 Additionally, in another attack by a pro-Daesh group,226 Facebook and Twitter accounts of the RMP were hacked in July 2015. The group replaced RMP’s avatar with the word ‘Khilafah’ or caliphate.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
According to Mary-Ann Russon and Jason Murdock, two journalists who had infiltrated Daesh’s Telegram network, there were at least three known pro-Daesh hacking groups; Kalachnikv E-Security, ‘Online Dawah Operations’ and ‘Muslim Safety Tips’.227 These groups had reportedly been engaging in discussion regarding “…privacy, hacking tips, malware and data breaches…”.228 In addition, there have also been reports that another three of pro-Daesh hacking groups namely, Caliphate Cyber Army (CCA), Sons Caliphate Army (SCA) and Kalacnikov.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
TN (KTN), were merging to form a new group called United Cyber Caliphate (UCC).229 The merger was announced on April 4, 2016 on Telegram.230 Though the merger may indicate that pro-Daesh hacking groups were focusing on strengthening their position in the cyber world, no major cyber-attacks have been reported in the last couple of months following the merger.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
224 Paula Mejia, “19,000 French Websites (and Counting) Hacked Since Charlie Hebdo Attack”, Newsweek, January 15, 2015, http://www.newsweek.com/19000-french- websites-and-counting-hacked-charlie-hebdo-attack-299675 (accessed Jun 3, 3016). 225 Ibid. 226 “PDRM’s Facebook, Twitter accounts hacked”, Malay Mail Online, July 13, 2015, http://www.themalaymailonline.com/malaysia/article/pdrms-facebook-account- hacked (accessed June 3, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
227 Mary-Ann Russon and Jason Murdock, “Welcome to the bizare and frightening world of Islamic State Channels on Telegram”, International Business Times UK, May 23, 2016. 228 Ibid. 229 Mary-Ann Russon, “ISIS cyber army grows in strength as caliphate hacking groups merge on Telegram”, International Business Times UK, April 5, 2016, http:// www.ibtimes.co.uk/isis-cyber-army-grows-strength-caliphate-hacking-groups-merge- telegram-1553326 (accessed June 3, 2016). 230 Ibid.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
230 Ibid. 73 These developments clearly represent continued threats by Daesh and its supporters to the peace and stability of the international community through cyber-attacks. It also shows their determination in making their presence felt across the globe. Intensive Use of Social Media Platforms Based on this research, much of Daesh’s presence online is via the exhaustive use of social media platforms particularly Facebook, Twitter and Telegram.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Such vigorous use of social network has not only led Daesh to gain more supporters but has also been used as a tool to conduct psychological warfare, as well as to target specific groups particularly for the purpose of spreading propaganda, radicalisation, and the recruitment of individuals. Wider Reach Compared to terrorist groups such as al-Qaeda and JI, Daesh has managed to exploit various social media platforms more extensively.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This has enabled Daesh to expand its reach across various continents while at the same time attracting tens of thousands of supporters. The phenomenon of foreigners flocking to war-torn areas is not exclusive to Daesh as can be witnessed during the Soviet occupation of Afghanistan during the Cold War. Nonetheless, the number of FTFs journeying to Syria and Iraq to join Daesh is significantly larger and occurring at a quicker pace.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This could be a trend largely due to the savvy use of the Internet and social media platforms by Daesh and its advocates. Psychological Warfare The extensive use of social media has also led Daesh to have the upper hand in the physical war in Iraq and Syria as well as in the virtual world. In other words, the ability of Daesh to appear bigger, better and more violent than what it actually is reflects the successful psychological warfare tactic adopted by the group.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
A significant example of this was 74 observed during Daesh’s successful operation to take over Mosul, Iraq in June 2015.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
During this operation, about 1500 of Daesh fighters were up against thousands of Iraqi soldiers but Daesh was still able to take over the city despite being outnumbered.231 According to an interview of Commander Barzani of the Kurdish Peshmerga Forces by Jillian Kay Melchior, Commander Barzani explained that the attack against Mosul began through social media, before the actual physical action took place.232 In the report, Commander Barzani stated that: “They started this almost one year ago, [using] all the media — social media, Facebook, the Internet — [to show] how they are killing the people, how they are taking their kids, how they are killing children, how they are taking the women, females, so it’s really psychological war, and I can say that they are succeeding…”233 Echoing this, Qu Tianlu, Chia Jeng Yang and Beatrice Chan in their article “Terrorism of the Islamic State: Social Media Strategies”, stated that Daesh was also using “Twitter as a psychological weapon to confront and intimidate Westerners by projecting the image that they reside in various Western countries”.234 Furthermore, according to Mah-Rukh Ali, Daesh believed the tactic of “overwhelming the enemy with fear and terror” and went on to state that Daesh even justified this tactic through hadiths.235 231 “Terror’s New Headquarters”, The Economist, June 14, 2014 in Adam Hoffman, and Yoram Schweitzer, “Cyber Jihad in the Service of the Islamic State (ISIS)”, Strategic Assessment, Vol.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
18 No. 1, April 2015 232 Jillian Kay Melchior, “peshmerga commander says Iraq needs ground troops to fully defeat ISIS”, National Review, September 21, 2014, http://www.nationalreview. com/article/388505/those-who-face-death-jillian-kay-melchior (accessed June 3, 2016). 233 Ibid.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
233 Ibid. 234 Qu Tianlu, Chia Jeng Yang and Beatrice Chan, “Terrorism of the Islamic State: Social Media Strategies”, The Wilberforce Society, February 2016, http:// thewilberforcesociety.co.uk/wp-content/uploads/2016/02/Wilberforce-Society- Social-Media-IS-Paper.pdf (accessed June 3, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
235 Mah-Rukh Ali, “ISIS and Propaganda: How ISIS Exploits Women”, Reuters Institute for the Study of Journalism, 2015, https://reutersinstitute.politics.ox.ac.uk/sites/ default/files/Isis%20and%20Propaganda-%20How%20Isis%20Exploits%20Women. pdf (accessed June 3, 2015). 75 The ability of Daesh to transform social media network into a form of psychological warfare is certainly chilling.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
While efforts to limit the online reach of Daesh are ongoing, actions to circumvent the use of social media as a psychological weapon is greatly needed to ensure that successful counter operations against Daesh could take place. The Expanded Role of Women Even before the emergence of Daesh, women have always played a considerable role in terrorism activities.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Their roles include being mothers, recruiters, logisticians, martyrs as well as to courier money and weapons.236 Besides having an all-female Daesh police squad, Daesh has been very successful in attracting more women to travel to the so-called Islamic State and has managed to alleviate their role, particularly as successful recruiters of potential fighters.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This is largely due to the usage of social media platforms as a means to directly communicate and network openly with supporters and potential recruits. For example, in the case of JI, the style of recruitment used then was more selective and mostly confined within family members of a terrorist.237 Now, in the reign of Daesh, women are openly preaching and urging female sympathisers via Twitter, Facebook and Tumblr among others, to make their way to Daesh-controlled areas.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
What is even more daunting is the fact that these women have been very successful in their bid to lure females to join Daesh. Aside from the case of the female Malaysian doctor who has been enticing women to join Daesh, another significant example of a woman recruiter is Umm Ubaydah.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Her posts on social media sites such as Twitter include advising others on what to bring during the so-called migration and what to expect upon making the journey to informing 236 R. Kim Cragin and Sara A. Daly, Women as Terrorists: Mothers, Recruiters, and Martyrs, 2009, Praeger Security International Reviewed by Kennimrod Sariburaja, SEARCCT’s Selection of Articles, Volume 2, 2011, (SEARCCT: Kuala Lumpur), pg. 125. 237 Kennimrod Sariburaja, al-Jemaah al-Islamiyah, 2013, (SEARCCT: Kuala Lumpur).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
76 potential female recruits of their future roles.238 She reminded her followers that the role for women in Daesh-controlled areas does not include going to the battlefield but instead, to remain at home as wives of the fighters, to bring up their children as well as to reach out to other women online.239 Umm Ubaydah and “Diary of a Muhajirah” / “Bird of Jannah” are two of the many examples of women recruiters. Another example is Umm Layth.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Suspected to be Aqsa Mahmood, Umm Layth is thought to have links to the disappearance of three British teenagers namely, Kadiza Sultana, Shamima Begum and Amira Abase, who were believed to have fled to Syria in February 2015.240 Terrorist Narratives for Everyone One interesting observation that can be made from Daesh’s extensive use of social media is their ability to tailor the narratives to fit the characteristics of potential recruits regardless if they were from the West or East, male or female, young or old, and second generation migrant or native.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Undoubtedly, Daesh’s utilisation of social networking platforms has greatly contributed to the success of reaching out to the targeted individuals with the right kind of narratives. Adam Hoffman and Yoram Schweitzer’s article on “Cyber Jihad in the Service of the Islamic State (ISIS)”,241 painted a clear picture on the different techniques adopted by Daesh in approaching potential male and female recruits.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
For example, in capturing the attention of a potential male sympathiser, Daesh uses images of epic battles and glory on the battlefields, while in attracting women, softer images such as kittens and messages of female empowerment often appear.242 238 Katie Zafadski, “Meet the Female Recruiters of ISIS”, NyMag, September 4, 2014, http://nymag.com/daily/intelligencer/2014/09/meet-the-female-recruiters-of- isis.html (accessed June 4, 2016) 239 Ibid.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
240 Kimiko De Freytas-Tamura, “Teenage Girl Leaves for ISIS, and Others Follow”, The New York Times, February 24, 2015, http://www.nytimes.com/2015/02/25/world/ from-studious-teenager-to-isis-recruiter.html?_r=0 (accessed June 5, 2006). 241 Adam Hoffman, and Yoram Schweitzer, “Cyber Jihad in the Service of the Islamic State (ISIS)”, Strategic Assessment, Vol. 18 No. 1, April 2015. 242 Ibid.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
18 No. 1, April 2015. 242 Ibid. 77 Nonetheless, in recruiting individuals from the West, particularly second-generation migrants, Daesh often plays upon their feelings of isolation and the difficulty in fitting in with Western culture.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
According to Christina Schori Liang, in this Western part of the world, Daesh often targets those with identity crises and individuals who have been victims of Islamophobic sentiments.243 On the other hand, in Southeast Asian countries such as Indonesia and Malaysia, which have large Muslim populations, their strategies may be slightly different.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Aside from the duty of Muslims to conduct jihad, Daesh’s narrative in this region involves labelling local governments as un-Islamic and reinforcing the idea that Muslims should be living in a place where shari’a is the supreme law guiding both political and social aspects of life.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
For example, a video made by Indonesian fighters, believed to be in Syria or Iraq, had encouraged their fellow citizens to join in their so-called jihad and specifically mentioned that the Indonesian police and military forces should repent as well as refute the state ideology of Pancasila which they regard as a pagan ideal.244 Daesh’s ability to tailor their propaganda materials and narratives to lure potential fighters from all over the world by utilising social media platforms must be dealt with effectively.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Using these platforms to expand the role of women as well as psychological warfare also makes the fight against Daesh even more complex and intricate. Challenges to Countering Daesh’s Use of Social Media Apart from identifying narratives that could specifically counter the tailor-made propaganda by Daesh for individuals around the world, another observation that challenges the effort to counter Daesh is their flexibility in adapting to counter measures.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Relevant authorities have long been attempting to counter the threat posed by Daesh, 243 Christina Schori Liang, “Cyber Jihad: Understanding and Countering Islamic State Propaganda”, Geneva Centre for Security Policy (GCSP), February 2015, www.gcsp.ch/ download/2763/72138 (accessed June 5, 2016). 244 Vita A.D. Busyra, “ISIS-Trained Indonesians Ring Alarm Bells”, Jakarta Globe, June 20, 2014, http://jakartaglobe.beritasatu.com/news/isis-trained-indonesians-ring- alarm-bells/ (accessed June 5, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
78 particularly in their use of the Internet to spread propaganda, radicalise and communicate. This is done by blocking and censoring their sites and accounts as well as the ones belonging to their supporters among other efforts. For example, blocking the access to one Twitter account will result in another account being created by the blocked user. What is even more concerning is the fact that this same user, albeit with a new account, is still able to have his or her followers from previous account.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This is made possible by his or her followers re-tweeting his new account. For example, in the case of a Twitter account with the handler Yusuf (YusufAl-Britani), he tweeted to his available followers to re-tweet (RT) his posts to try and reconnect to his former followers.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Upon his return after being suspended, he tweeted “Please follow and RT, trying to get back to all our Brothers after suspension, jazakallah”.245 This approach is effective given that by re-tweeting, Yusuf will be able to gain his initial followers and maybe additional ones too. Apart from that, Daesh is also concentrating its effort on challenging the counter narratives put forth by various nations.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In an online publication by Ansar Al-Khilafah titled, ”The Media War Upon the Islamic State: The Media Technique of Misleading the Masses”, Daesh explained the techniques adopted by the rest of the world to refute the legitimacy of the group.246 It went on to explain the foundation behind nations’ efforts in countering Daesh, which involves media deviation, propaganda and psychological warfare.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
They claimed that these include distorting events, casting doubt upon the strength of the fighters, exaggerating Western strength, blaming the fighters, particularly for the West’s ill treatment of women and children and “promoting hypocrites” whereby they claim that the West uses organisations and groups that appear to be like Daesh fighters but are actually for government’s agenda.247 Furthermore, following 245 YusufAlBritani personal Twitter account, accessed May 24, 2016.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
246 “The Media War Upon the Islamic State: The Media Techniques of Misleading the Masses”, Ansar Al-Khilafah Publication, December 2, 2015 (20 Safar 1437), https:// archive.org/details/the-media-war-upon-the-islamic-state1 (accessed June 5, 2016). 247 Ibid.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
247 Ibid. 79 Anonymous’ pledge to attack Daesh via cyberspace, a tech savvy group within Daesh reportedly sent out a message via Telegram instructing Daesh followers on how to avoid potential hacks.248 These are but some of the examples of Daesh forming their own version of counter-messaging efforts as well their techniques in overcoming threats by the so-called un-believers. Two observations stood out from these developments.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Firstly, how effective is censoring and blocking access to social media accounts of suspected supporters and terrorists? It is established that by blocking access to Twitter accounts belonging to Daesh or its supporters, another account, with a different handler, would appear. The second observation is that the terrorists too are monitoring the moves of authorities, governments, civil society, organisations and scholars who are working against them.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
As a result, they too are constantly designing new propaganda and counter-messages to maintain their legitimacy and pool of potential recruits. This would certainly complicate efforts to counter the group. Nevertheless, the following section will attempt to provide some possible recommendations that can be utilised to limit Daesh’s reach around the globe.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
248 Anna Dubuis, “Anonymous: ISIS has issued these instructions to followers on avoiding being hacked”, Mirror, November 17, 2015, http://www.mirror.co.uk/news/ world-news/anonymous-isis-issued-instructions-followers-6845219 (accessed June 5, 2016). 80 D aesh’s skilful use and the ability to maximise the potential of the cyberspace has given the group leverage and is now one of the most forceful terrorist organisation in the world.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In response, relevant nations have been in full gear in the battle against the group and an international coalition led by the US was created. Known as the Global Coalition to Counter ISIL, the cooperation involves over 60 countries including Australia Canada, Egypt, Germany, Malaysia, United Arab Emirates and the UK amongst others. The coalition’s approaches against Daesh are in various forms including military assistance to capacity building and countering the narratives of Daesh.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In relation to the efforts made to counter the narratives of Daesh, particularly via the Internet, many countries have taken the necessary steps to combat Daesh’s propaganda online.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
For example in the US, the Center for Strategic Counterterrorism Communications (CSCC) was formally established in 2011 to “systemise U.S strategic communications to counter the appeal of violent extremist ideologies among foreign populations, particularly as related to Al-Qaida and its global affiliates”.249 Within the CSCC, is a team known as Digital Outreach Team (DOT) that is responsible for countering extremist propaganda online through direct engagement via social media.250 TThe CSCC was also responsible in the establishment of the “Think Again Turn Away” campaign that espoused to criticise Daesh through YouTube, Twitter and Facebook among others.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
249 “Centre for Strategic Counterterrorism Communications (CSCC)”, Counter Extremism.org, 2013, https://www.counterextremism.org/resources/details/id/404/ center-for-strategic-counterterrorism-communications-cscc (accessed June 17, 2016). 250 Ibid. 1 3 R E C O M M E N D A T I O N S 81 Meanwhile in the UK, the country’s government created the “UK Against Daesh” Twitter account in 2015.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
The purpose of this was however not to counter the narratives of Daesh but to inform the public of the UK’s effort in combating Daesh.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
For example, its latest tweets dated June 17, 2016, were mainly informing the audience of strikes destroying Daesh bunkers near Al-Baghdadi, and another spoke of the arrests and prosecutions of Foreign Terrorist Fighters (FTFs) in several countries.251 Nonetheless, focussing more on countering the narratives of Daesh is Quilliam Foundation’s campaign called #NotAnotherBrother.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Forming part of the campaign was a film released in August 2015 aimed potential supporters.252 In Saudi Arabia, a strategic communications centre to battle Daesh’s propaganda online was launched on 8 July 2016. Known as the Sawab Centre, the United Arab Emirates (UAE)-based Centre was established in collaboration with the US and forms part of the Global Coalition to Counter ISIL effort.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia