text
stringlengths
10
3.23k
document_url
stringclasses
318 values
source_url
stringclasses
318 values
country
stringclasses
137 values
The Centre utilises “direct online engagement to counter terrorist propaganda… including messages used to recruit foreign fighters, fundraise for illicit activities, and intimidate and terrorize local populations”.253 The Sawab Centre uses platforms such as Facebook, Twitter and Instagram in efforts to counter Daesh’s propaganda online.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
One of its recent campaign was the #Deludedfollowers campaign on Tweeter and Instagram to expose Daesh’s recruitment methods online.254 In Southeast Asia, members of the Nahdlatul Ulama (NU), one of Indonesia’s leading Muslim organisation, is taking up the role of ‘cyber warriors’ in the attempt to challenge Daesh’s propaganda campaigns.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Apart from tweeting, the group also hosts several websites as well as an Android app and web-based Television (TV) channels to promote its 251 UK Against Daesh Twitter Account, (accessed June 17, 2016). 252 The video of the film could be accessed at https://www.youtube.com/ watch?v=JqO79tlWkmk (accessed October 7, 2016). 253 “Launch of the Sawab Centre”, US Department of State, July 8, 2015, http://www. state.gov/r/pa/prs/ps/2015/07/244709.htm (accessed 17 June, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
254 “Sawab Center Launches /#DeludedFollowers/ Campaign to Expose Daesh’s Methods of Recruiting Foreign Fighters” WAM, January 10, 2016, https://www.wam. ae/en/news/emirates/1395290133434.html (accessed June 17, 2016). 82 brand of Islam called ‘Islam Nusantara’.255 In Malaysia, the country’s authorities and relevant agencies are also gearing up in the effort to combat Daesh’s propaganda online.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
The setting up of a digital counter- messaging centre to combat Daesh’s appeal online is well on its way and is expected to operate from mid-2016. The effectiveness of these initiatives however, is yet to be ascertained. In fact, there have been comments that several attempts to combat Daesh’s propaganda online previously have not been particularly successful.256 Nonetheless, it is still important that countries and civil societies alike continue with their efforts to at least limit Daesh’s reach online.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Even more imperative is that these efforts are continuously enhanced and strengthened to meet the changing nature of Daesh’s online modus operandi, particularly its propaganda, radicalisation and recruitment agendas. Against this backdrop, several recommendations can be of use to nations and relevant agencies in their bid to enrich endeavours in opposing Daesh’s presence online.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
The first of which is the need for the virtual mobilisation of religious movements to counter Daesh’s manipulation of religious scriptures. Secondly is the need to “bring the real Syria and Iraq” to the cyber realm to counter the economic, social and political aspects of Daesh’s propaganda. To reinforce these efforts, utilising active online platforms and enhancing technical know- how are imperative.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Following these are the proliferation of counter- messages, strengthening offline measures in combating Daesh’s online presence and finally, the need for Public-Private Partnerships (PPPs) to create more compelling and concerted efforts in combating the threat of Daesh online. 255 “Indonesia’s Muslim cyber warriors take on IS”, The Star, May 8, 2016, http:// www.thestar.com.my/news/regional/2016/05/08/indonesia-muslim-cyber-warriors- take-on-islamic-state/ (accessed June 17, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
256 Alberto M. Fernandez, “Here to stay and growing: Combating ISIS propaganda networks”, Islamic World Centre for Middle East Policy at Brookings, October 2015, http://www.brookings.edu/~/media/research/files/papers/2015/10/combating-isis- propaganda-fernandez/is-propaganda_web_english.pdf (accessed June 16, 2016). 83 Virtual Mobilisation of Religious Movements “This is what hurts ISIS the most. It is Muslims speaking out.”257 - Mubin Shaikh The role of religion in Daesh-led propaganda is foremost.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Daesh legitimises their acts of terrorism while at the same time gain thousands of followers from all over the world by distorting the meanings of terms that are sacred to the adherents of the religion. Islamic texts such as the Quran and hadiths are constantly applied to reason with the masses and to justify that Daesh and its supporters are the ‘defenders’ of Islam. In essence, the manipulation of religion has become a powerful ‘tool’ for Daesh to appear legitimate and righteous.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
How then should nations overcome such a powerful driving force? One possible way is to mobilise religious movements in the cyber realm where many of Daesh operatives function. In this regard, such a movement should be created, particularly at the national level. This is important as movement(s) at the national level could tackle religious concepts or issues specific only to the country, thus targeting supporters and potential recruits at the local level.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
A similar approach is observed in the example of chat videos called “ISIS and ice cream”.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“ISIS and ice cream” is a series of monthly video chats conducted by Imam Suhaib Webb who is based in Washington.258 These video chats, broadcasted from ice cream parlours, aims to “refute the religious claims…” of Daesh.259 As a result of his effort, members of Daesh have threatened to kill him, and branded him anpostate.260 257 Mubin Shaikh in Laurie Goodstein, “Muslim Leaders Wage Theological Battle, Stoking ISIS’ Anger”, May 8, 2016, The New York Times, http://www.nytimes.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
com/2016/05/09/us/isis-threatens-muslim-preachers-who-are-waging-theological- battle-online.html?_r=0 (accessed June 9, 2016). Mubin Shaikh is a Canadian former member of an extremist Islamist group who is now working on countering radicalisation. 258 Ibid. 259 Ibid. 260 Ibid. 84 These threats show that Daesh is affected by the online chat videos, demonstrating - to a certain degree - its impact on refuting Daesh’s religious-based propaganda.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Hence, the need for the virtual mobilisation of religious movements. Nonetheless, in establishing such a movement, careful considerations in selecting the right individuals, identifying as well as crafting religious counter-messages to be disseminated are of utmost importance. The following are possible guidelines to be considered when creating a virtual religious movement.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Selecting Suitable Individuals First and foremost is the selection of the most suitable individuals to be the voices behind these movements. In order to achieve this, a careful look into these individuals’ background is needed. Hence, it is important that these individuals be selected from the available pool of local religious scholars or imams. It is also beneficial for these individuals to be fluent in the Arabic language.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Selecting individuals readily armed with the necessary knowledge to combat Daesh’s religious-based propaganda would be less time-consuming than having to train, for example, terrorism experts in theological doctrines. Furthermore, selecting Arabic-speaking religious scholars or imams would also allow them to converse with Arabic-speaking supporters and Daesh fighters – whether local or foreign - hence, enhancing their credibility among the targeted groups.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Additionally, choosing religious scholars or imams with established rapport within their communities or nation is also imperative. This criterion would further strengthen the credibility of the counter- messages being conveyed. Moreover, selecting well-regarded religious scholars or imams with sizeable followers could also attract non- targeted groups to grasp and spread the counter-messages whether through online means or via physical communications.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This would allow for the messages to travel farther and reaching a much wider audience, including those with limited access to the Internet or even older generations who are less Internet savvy. 85 In terms of the individuals’ characteristics, charisma is an important criterion to possess. Such a characteristic is essential in attracting the targeted audience to take notice of the ‘messenger’ and thus after, the counter-messages. Another possible characteristic is versatility.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Another possible characteristic is versatility. In this instance, choosing individuals that are versatile in their delivery methods may have a better chance with the Daesh supporters whether local or international, who come from various backgrounds. For example, the method of delivery may differ for someone with an established religious background as compared to someone whose knowledge of the religion is rather perfunctory.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Identifying and Developing Religious Counter-Messages Secondly, based on this research, a number of religious-based narratives propagated by Daesh have been identified which include Jihad, Hijrah (migration), the End-of-Time Prophecy, battle between good and evil and the need to urgently act against apostates and oppressors of Muslims. Other narratives also include the use of religion to justify acts of terrorism such as the killings of innocent lives and persecution of religious minorities among others.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This is by no means an exhaustive list, but it nonetheless provides an idea of Daesh’s religious narratives to take into consideration when attempting to craft reasonable counter-messages. Hence, a more detailed examination of Daesh’s religious-based propaganda should be conducted in order to create more in-depth and robust counter-messages. This future study should also include analyses of Daesh’s religious-based propaganda in the national context.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
For example, what are the specific religious elements proposed by Daesh that attracts Malaysians or Indonesians to join the group? What are the most profound Daesh-type religious narratives in Germany or Turkey? Answers to these questions may result in creations of more effective targeted counter-messages. 86 Nonetheless, in developing religious-based counter-messages, it is important that the Quran and legitimate hadiths are applied to directly and strongly refute Daesh’s religious-based propaganda.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This is also to ensure that these counter-messages are reliable and credible. Quran verses and hadiths that advocate for the peaceful co-existence between the many faiths and cultures, the rejection of violence and killings of women and children, obligation to parents and family, protections of religious minorities or non-Muslims, safeguarding crops and cattle from destruction, as well as other related verses and hadiths could be the foundation for developing strong religious-based counter- messages.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
For example, the establishment of the so-called Islamic State, led by Abu Bakr al-Baghdadi, through indiscriminate killings and persecution of religious minorities and non-Muslims, could be challenged by developing counter-messages based on several verses of the Quran. These include Surah Al-Baqarah (2: 204-206) which states; “There is the type of man whose speech about this world’s life may dazzle thee, and he calls Allah to witness about what is in his heart; yet is he the most contentious of enemies.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
When he turns his back, his aim everywhere is to spread mischief through the earth and destroy crops and cattle. But Allah loveth not mischief. When it is said to him, “Fear Allah”, he is led by arrogance to (more) crime. Enough for him is Hell-an evil bed indeed (to lie on)!”261 In addition, the following verses from Surah Al-Mumtahanah (60:8-9) could form the basis to counter Daesh’s religious-based propaganda or narratives in relation to aggression towards the so-called enemies of Islam.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
The verses states; “Allah forbids you not, with regard to those who fight you not for (your) Faith nor drive you out of your homes, from dealing 261 Al-Baqarah (2:204-206). Translation obtained from Abdullah Yusuf Ali, The Meaning of Holy Qur’an: Text, Translation and Commentary, 2005, (Islamic Book Trust: Kuala Lumpur), pg. 74. 87 kindly and justly with them: for Allah loveth those who are just.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Allah only forbids you, with regard to those who fight you for your (Faith), and drive you out of your homes, and support (others) in driving you out, from turning to them (for friendship and protection). It is such as turn to them (in these circumstances), that do wrong.”262 These are but some of the Quranic verses that can be used in response to Daesh’s manipulation of the religion.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Nonetheless, individuals’ interpretations of verses could vary and based on the current findings, Daesh has the ability to dispute efforts against them, including the religious-based counter-messages. Hence, the utilisation of religious scholars and imams is necessary to allow for theological debates to take place between the former and the supporters of Daesh, with the aim of persuading them otherwise.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
By adopting this strategy, these movements would be able to create a strong religious force on the Internet with profound credibility. Additionally, mobilising religious movements online would also be able to refute the supposed well-read Daesh recruiters and supporters. In essence, the main intention here is to target and engage directly and forcefully with Daesh and its supporters in countering their religious-based propaganda and narratives.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Apart from enabling direct engagement with Daesh and their supporters, such a strategy will also enable counter-terrorism agencies to get a better understanding of their thought-process and reasoning to allow for better constructions of counter-messages. However, careful considerations must also be taken when communicating with terrorist elements so as not to be seen as creating a space for terrorists to speak their mind and make their stance.263 262 Al-Mumtahanah (60:8-9).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Translation obtained from Abdullah Yusuf Ali, The Meaning of Holy Qur’an: Text, Translation and Commentary, 2005, (Islamic Book Trust: Kuala Lumpur), pg. 1219.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
1219. 263 Bibi T. van Ginkel, “Responding to Cyber Jihad: Towards an Effective Counter Narrative”, March 2015, International Centre for Counter-terrorism (ICCT), http:// www.icct.nl/download/file/ICCT-van-Ginkel-Responding-To-Cyber-Jihad-Towards-An- 88 Apart from that, mobilising such movements should only target Daesh’s religious-based propaganda but not their political, social, or economic- based propaganda.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Therefore, non-religious based counter-messages must also be crafted to target the latter aspects of their propaganda and likewise, be disseminated online. One possible way is to showcase the dire events taking place in Daesh-controlled areas in Syria and Iraq in response to their projected images of the good and secure life in these conflict areas.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“Bringing” the Real Syria and Iraq to Social Media Based on the findings of this research, Daesh and its legion of recruiters would often project images of the fictional happiness and comfortable lives of people living under Daesh-controlled areas - where food and basic necessities are available in abundance and could be obtained easily.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Apart from that, the image that Daesh has a strong governing structure, with departments and enforcement bodies for the day-to- day running of the so-called Islamic state, further makes it interesting and convincing for deluded individuals. As such, counter-messages could be crafted in ways that features the reality behind those images.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
For example, counter-messages could highlight women and children being killed, innocent lives who have lost their family members, their houses where they grew up, as well as the thousands of civilians fleeing their homelands. The idea here, is that while terrorists can win the hearts and minds of individuals to join their ranks - through showcasing the oppressions against Syrian and Iraqi Sunnis and so on, counter-messages should also emulate such images to develop the very same sentiments.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
The only difference is that the focus is on the perpetrators that resulted in the killings, fleeing, abasement and abusing of civilians including women, children and the elderly. Unlike Daesh who blames the Syrian and Iraqi governments, the West and its allies, and apostate leaders and governments, the counter-messages would be focusing on Daesh as the perpetrators responsible for these acts. Effective-Counter-Narrative-March2015.pdf (accessed July 14, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
89 Additionally, counter-messages could also be developed surrounding Daesh’s weaknesses and failings in terms of its governing structure and military capabilities. Moreover, as of July 2016, Daesh has lost several of its strongholds and military strength. These include the cities of Fallujah264 and Ramadi265 while battles between the group and the security forces are taking place in Raqqa266 and Mosul267.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
TThe aim here is to showcase the images of Daesh’s weakening governing structure and military might. Simultaneously, it is also intended to prompt the audiences to question whether it is possible for a so-called Islamic State to falter.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Hence, this will cast doubts in the minds of the audiences, of the legitimacy and capability of Daesh in the establishment of the “Islamic State” that was to return “Muslims’ [their] dignity, might, rights and leadership” as stated by Abu Bakr al-Baghdadi,268 aand what more to expand its territorial controls as projected in the End-of-Time prophecy. The drawback however, is obtaining images, reports and current happenings in Daesh-controlled areas in Syria and Iraq.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This is because, coupled with the tight control of outgoing information, any individuals and journalists who they deemed to be against them have been severely punished. In this regard, obtaining crucial information, images and reporting of Daesh’s brutality can be rather difficult.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
One possible way to overcome this setback is by engaging with relevant groups and individuals who have access, whether directly or 264 “Iraq takes full control of Fallujah from Daesh”, Iran Daily, June 27, 2016, http:// www.iran-daily.com/News/154004.html?catid=3&title=Iraq-takes-full-control-of- Fallujah-from-Daesh (accessed July 15, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
265 David Sim, “Iraq: The battle against Isis goes on in ‘liberated’ Ramadi, a city reduced to rubble”, The International Business Times (IBT), January 20, 2016, http:// www.ibtimes.co.uk/iraq-battle-against-isis-goes-liberated-ramadi-city-reduced- rubble-1539005 (accessed July 15, 2016). 266 “Daesh regains areas lost to Syrian government”, Gulf News, June 21, 2016, http://gulfnews.com/news/mena/syria/daesh-regains-areas-lost-to-syrian- government-1.1850089 (accessed July 15, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
267 “Daesh lost quarter of its Iraq, Syria territory in 18 months”, Gulf News, July 10, 2016, http://gulfnews.com/news/mena/iraq/daesh-lost-quarter-of-its-iraq-syria- territory-in-18-months-1.1859950 (accessed July 15, 2016). 268 “Khilafah Declared” in Dabiq: The Return of the Khilafah, June-July 2014, Issue 1, Al-Hayat Media Centre, pg 7. 90 indirectly, to these areas.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
90 indirectly, to these areas. For example, agencies involved in crafting the counter-messages could get in touch with associations and individuals who are managing refugee camps related to these areas. In this way, the agencies would have access to individuals (the refugees) who have witnessed the atrocities committed by Daesh. This would be valuable in developing counter-messages as they are also victims of Daesh’s actions.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Another example would include engagements with organisations working within Syria and Iraq to combat Daesh. One such organisation would be the ‘Raqqa is Being Slaughtered Silently’ (RBSS).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
RBSS was formed in April 2014 by local activists in Raqqa following Daesh’s takeover of the city.269 Working anonymously, it is believed to be one the few sources of reliable journalistic information left in Raqqa.270 Another source of information could be through engaging with Daesh FTFs who have repented and returned to their home country.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Stories of their experiences and why they chose to turn their backs on Daesh could be converted into short video clips and posted on social media platforms such as YouTube and Facebook as well as sharing links to these videos on Twitter and other platforms. In addition, these stories could also be converted into narrations to be posted on platforms such as JustPaste.it.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Utilising former FTFs is crucial in developing effective counter-messages as they offer “credible voices of change”.271 Apart from that, getting in touch with the immigrants who have fled their countries could also be beneficial as they would have access to family members or friends who are still in Syria or Iraq.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
One such example could be seen in the reporting of the International Business Times (IBT) on the supposed killings of Daesh fighters by Daesh for losing the city of Ramadi.272 The report quoted a source who was an 269 “Raqqa is Being Slaughtered Silently, Syria”, Committee to Protect Journalists (CPJ),https://cpj.org/awards/2015/raqqa-is-being-slaughtered-silently-syria.php (accessed July 15, 2016). 270 Ibid.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
270 Ibid. 271 Bibi T. van Ginkel, “Responding to Cyber Jihad: Towards an Effective Counter Narrative”, March 2015. 272 Agamoni Ghosh, “Isis reportedly burns Daesh fighters alive in Mosul for losing battle for Ramadi”, International Business Times (IBT), January 13, 2016, http://www.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
91 Iraqi resident now living in the US, but remains in contact with his family in Iraq.273 It is hoped that by developing online counter-messages that projects the images of the “real” Syria and Iraq under Daesh’s control, and leveraging their sentiments as well as critical thinking, the political, social and economic aspects of Daesh’s propaganda could be countered.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Nonetheless, to truly win the hearts and minds of the people of Syria and Iraq as well as potential Daesh recruits around the world, governments must play their roles in securing the lives of its people and in rebuilding cities destroyed in the battles. This is because part of Daesh’s propaganda is also about the supposed plights of the people of Syria and Iraq. Therefore, the governments must show their commitment in enhancing the lives of its people.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Only then could Daesh’s narrative, particularly on the plight of Sunnis in Syria and Iraq, be weakened if not subdued. Dissemination of Counter-Messages through Active Online Platforms Apart from mobilising religious movements and projecting the images of the real Syria and Iraq, dissemination of counter-messages through utilising active online platforms and enhancing capabilities and technical know-how could further reinforce the fight against Daesh’s propaganda and presence online.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
It is important to note that the counter-messages can take multiple forms such as videos, discussions, debates, microblogs or vlogs which can be broadcasted on the Internet. Given the extensive use of social media platforms by Daesh in spreading their propaganda and radicalising individuals, it is only logical that the dissemination of the counter-messages should use the very same platforms. These would include social networking sites such as Facebook, Twitter, Instagram, YouTube and Tumblr among others.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
It is also important that the ibtimes.co.uk/isis-burns-daesh-fighters-alive-mosul-losing-battle-ramadi-1537604 (accessed July 15, 2016). 273 Ibid. 92 dissemination of counter-messages use communication platforms such as Kik and Telegram to target specific chatrooms or channels used by Daesh to communicate amongst each other or with their supporters. This would also be practical for more direct communications to take place.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Optimising Active Online Platforms The method in which counter-messages are delivered plays a significant role in attracting the intended audiences. Hence, if a counter-message is in the form of an audio-visual, then an interactive video would be of significant value. In this case, YouTube is one of many excellent examples for the creation of interactive videos.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
By using its annotations tool, viewers can click on any items with annotations to view the next course of action or take them to another related video link and so on. For example, a counter-message video could post a question like “what is Jihad?” or “under what circumstances are armed Jihad permissible?” in which viewers can click on.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Creators of the videos could also suggest several answers in which viewers can select, which would then lead them to another action or video that explains or answers the questions.274 This would be of great benefit to the viewers as it is more engaging and an interesting way to create awareness on the subject matter.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Similarly, if a message is in the form of comments, short posts or blogging, it is useful for the virtual religious movements to ensure that the engagement between the creators of the counter-messages and the reader exists. An example of such engagements could be to enable readers to post questions in which the author(s) of the post could respond in a timely manner.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This would allow for a more direct and immediate interaction between the disseminator of the counter- messages and the potential Daesh supporter. 274 For more information and examples of YouTube videos with Annotation, refer to Georgia Rooney, “Creating interactive video with Annotation”, October 21, 2015, MWP Digital Media, https://mwpdigitalmedia.com/blog/creating-interactive-video-with- annotations/ (accessed July 14, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Another interesting video with annotations is “Slap Jamie Oliver and Subscribe”, available at https://www.youtube.com/watch?v=us PV2cXhxp0&feature=youtu.be (accessed July 14, 2016). 93 Enhancing Capabilities and Technical Know-How Another important element, particularly in countering Daesh’s presence on the Internet, is ensuring the effectiveness of such efforts.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In this regard, it is crucial for the movements to enhance its capabilities as well as its technical knowledge to monitor Daesh’s propaganda online and its online activities in general, to target the right audiences to spread the counter-messages as well as to monitor the effectiveness of the disseminated messages. Such enhancements are crucial given the digital environment that they are expected to operate in and the ever-changing nature of technology.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Therefore, utilising online monitoring and analytic tools are of utmost importance in examining the effectiveness of the counter-messages.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Such monitoring and analytic tools are beneficial as it could “pinpoint who to target, where to find them online, who they are connected to, their trusted sources of information and the keywords they are searching for”.275 On top of that, these monitoring and analytic tools, particularly those that analyses social media platforms, could also “identify if the messages are reaching the right targeted audiences as well as how receptive these audiences are towards the messages”.276 The following table shows several of the available, and easily accessible tools to monitor the various social media platforms.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
275 Rachel Briggs and Ross Frenett, “Policy Briefing: Foreign Fighters, the Challenge of Counter-Narratives”, Institute for Strategic Dialogue, 2014. 276 Jasmine Jawhar, “Bringing the Battle against Daesh Online”, The Journal of Diplomacy and Foreign Relations, vol. 15, Number 2, December 2015, (Institute of Diplomacy and Foreign Relations (IDFR): Kuala Lumpur). 94 Table 1: Easily Accessible Monitoring and Analytic Tools277 No. TOOL PURPOSE NATURE COST 1.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
TOOL PURPOSE NATURE COST 1. Google Alerts Notify users via e-mail of new content on the Internet (blogs, websites and social media platforms) based on users’ keywords. Monitoring None 2. Google Analytics Able to measure how audience are interacting to users’ website contents, and track downloads and video plays among others on the page.278 Analytic None 3.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Google Trends Able to analyse search terms on Google based on interest over time and regional interest where it could provide data on which region and country searched most for the term, as well as related searches that people may search for. For example, if one was to type ‘how to make a bomb?’ the tool would be able to show the amount of times, by years, that people have searched for it. It could also let the user know in which country and region these terms were most searched for.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Analytic None 277 Ibid. 278 Google Analytics, “Features”, https://www.google.com/analytics/standard/ features/ (accessed November 15 2015) 95 4. Boardreader This is a tool suitable for monitoring content and keywords on forums. Monitoring None 5. Omgili Similar to Boardreader, this tool serves as a monitoring tool for forums, message boards and discussion threads. Monitoring None 6. Social Mention This tool both monitors and analyses various social media platforms including Twitter.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This tool is able to analyse data as well as influence based on four elements: strength, sentiment (positive, neutral, negative), passion and reach.279 Monitoring / Analytic None 7.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Twazzup This easy-to-use tool is able to track the name or term on Twitter that is of interest and immediately get real- time updates, most active influencers, top retweeted photos and links and the top ten keywords related to the names or term searched for.280 Monitoring None 279 Brandwatch, “Marketing: Top 15 Free Social Media Monitoring Tools”, August 2015, https://www.brandwatch.com/2013/08/top-10-free-social-media-monitoring- tools/ 280 Ibid. 96 8.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
96 8. HootSuite This tool allows you to schedule messages for future publishing, as well as analyse how well user’s “… social media efforts are being received”, amongst others.281 Analytic Yes 9. Klout This tool measures the influence or impact of users’ links, and recommendations as well as how people interact with user’s content across various social media platforms.282 Analytic None 10.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Monitter This tool allows users to key in up to three keywords and monitor what is being said on Twitter in real- time.283 Monitoring None Nonetheless, other aspects that can support the countering of Daesh’s propaganda and their presence online should also be considered.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In this regard, aspects such as the proliferation of counter-messages, strengthening offline measures as well as the need for Public-Private Partnerships are all essential elements in aiding counter-messaging against Daesh’s propaganda and the group’s presence online as a whole. 281 HootSuite,”HootSuite lets you do more with Social Media” https://hootsuite. com/ (accessed 15 November 2015). 282 Procommunicator, “Free Social Media Monitoring Tools”, http://www.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
procommunicator.com/free-monitoring-tools/ (accessed 14 November 2015). 283 Ibid. 97 Proliferation of Counter-Messages An important element to bear in mind when developing and disseminating counter-messages online is the fact that pro-Daesh tweets or posts appear on a daily basis.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
It was estimated that around 90,000 tweets and social media responses appear each day in support of the so-called caliphate.284 In this instance, counter-messages to Daesh’s online propaganda, should also emulate their speed and consistency. However, to produce thousands of counter-messages and let alone to target each of their narratives would be daunting and near impossible.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
It is therefore imperative that the few counter-messages being put forth daily should at least be substantial to refute the major themes that Daesh uses in their propaganda. Apart from that, bureaucratic procedures must also be limited as producing fast and forthright counter propaganda materials is of utmost urgency. This is essential as Daesh’s supporters do not need to go through various levels of approval before a tweet could be posted.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Hence, these are able to produce narratives very quickly and effectively. Those involved in spreading Daesh’s propaganda will probably compose their tweets, Tumblr blogs and Facebook postings in the comfort of their own home, writing about what seems to be closest to their hearts.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
A case in point is the Diary of a Muhajirah in which she would post on her Tumblr about her thoughts and day-to- day experiences under the Daesh-controlled city of Raqqa.285 In this regard, the feelings of sincerity and relatability from the posts enabled Daesh to have a stronger hold over their readers. Another equally important element is that these counter-messages must be in line with the targeted audience’s culture and background.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
For example, applying jargons used by youngsters in Britain to design counter-messages may not relate well to those living in Southeast Asia. 284 Eric Schmitt, “U.S. Intensifies Effort to Blunt ISIS’ Message”, February 6, 2015, The New York Times, http://www.nytimes.com/2015/02/17/world/middleeast/us- intensifies-effort-to-blunt-isis-message.html?_r=0 (accessed June 3, 2016). 285 Diary of Muhajirah Tumblr Blog, available at “http://diaryofmuhajirah.tumblr. com/ (accessed May 26, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
com/ (accessed May 26, 2016). 98 This would mean that counter-messages, like Daesh’s propaganda, must also be tailor-made to fit the intended group’s cultural and religious backgrounds. In this regard, by proliferating counter-messages - and taking into account limiting bureaucratic procedures, as well as cultural and religious backgrounds of the intended audiences - counter-messages could be distributed more effectively and timely.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Hence, it could also yield a bigger impact due to its much wider reach and influence. Strengthening Offline Measures in Combating Daesh’s Online Presence Apart from taking the battle against Daesh in the cyber domain, reinforcing efforts in the physical world would greatly benefit in the combat against Daesh online.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
These would include strengthening national laws regarding the monitoring of social media, empowering local communities, parents and teachers including religious tutors, as well as enhancing engagements between enforcement agencies and local communities for information sharing and intelligence gathering. Strengthening National Laws to Monitor Social Media Regulating the monitoring of social media platforms may prove to be an intricate process.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Issues regarding freedom of speech and privacy would surface and pose challenges to securing communications that utilises the various available social media platforms.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Nonetheless, monitoring these platforms is crucial in order to detect, respond and deter any possible spreading of terrorist propaganda, radicalisation, recruitment, communications between individuals and known terrorist elements, activities of data mining for the purpose of planning terrorist attacks or recruitment of individuals as well as other terrorists-related Internet usages.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Hence, it is necessary for countries to develop laws specifically for regulating the use of the Internet by terrorists to 99 conduct terrorist-related activities.286 Furthermore, it is crucial that the law be expanded to include monitoring terrorist activities on the Dark Web.287 The move by the RMP to make the monitoring of social media the focus of 2016 is both vital and timely.288 However, it is necessary for nations to conduct such monitoring with veracity and reliability.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This is important so as to not open up any avenues for the public to question the authenticity of its findings and thus, the response to it. In other words, monitoring should be done with utmost care and integrity to target those who only poses threat to the national security, with particular focus on terrorism-related offences.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Empowering Parents, Teachers and Local Communities Parents, teachers and local communities are the gatekeepers to the individuals of interest as they are the closest and have direct access to these individuals’ lives. For example, in assessing changes in behaviour and speech, how much time they are spending on the Internet, their circle of online as well as offline friends and so on. As such, empowering these groups should also be on the agenda in the effort to combat Daesh’s presence online.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In some of the cases, it was found that parents of the individuals who have conducted terrorist activities or those who have travelled to Syria and Iraq to join Daesh, had no idea or inclination towards their children’s radicalised state. In the case of Aqsa Mahmood, it was reported that her parents “were totally unaware of her radicalised mind-set” and described her as intelligent and sweet.289 Therefore 286 Royal Malaysian Police (RMP) Official, interview with author on July 26, 2016, Kuala Lumpur.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
287 Ibid. 288 Ida Lim, “IGP confirms IS linked to Movida nightclub blast”, The Star, July 4, 2016, http://www.themalaymailonline.com/malaysia/article/igp-confirms-is-linked-to- movida-nightclub-blast (accessed July 19, 2016). 289 Mah-Rukh Ali, “ISIS and Propaganda: How ISIS Exploits Women”, Reuters Institute for the Study of Journalism, 2015. 100 empowering parents to detect any changes in behaviour – tailoring towards radicalisation – would be useful as a first-line of defence.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Therefore, in detecting such behaviour, the monitoring of the environment outside of their homes where they are likely to spend part of their time, such as schools, mosques and local squares, is also important. Hence, empowering teachers including Imams and religious tutors, as well as the local communities are invaluable when detecting any potential individuals with any inclination towards being radicalised.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Enhancing Engagement between Authorities and Local Communities In ensuring the effectiveness in empowering parents, teachers and local communities, it is important that communication channels between these societal groups and authorities be enhanced. This would include authorities’ engagements with schools and local communities to build upon the element of trust and to open up platforms for more direct communications.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
The trust gained and established platforms would ultimately be useful for relevant information – acquired at the grass- root level – to be delivered more effectively. Such engagements would also allow for the information to be disseminated more promptly and through appropriate channels. Public-Private Partnerships (PPPs) Engagements between the public sector and relevant private entities are equally important in supporting counter efforts against Daesh’s online presence.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
To enhance this effort, governments, security forces and other relevant government agencies could engage with communication companies such as the Internet-services provider Google, social-media platform providers such as Facebook and Twitter as well as cyber security companies for the said purpose. This is to strengthen their approaches in countering Daesh’s online presence to fight the group’s propaganda, radicalisation and recruitment processes as well as other Internet usages.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
101 In other words, PPPs could serve to fill the gaps in both knowledge and skills relating to securing the cyber space.290 For instance, companies such as Google or other private cyber security companies could conduct capacity building programmes on utilising available online tools to combat Daesh’s presence on the Internet. This would include conducting training on online monitoring analytic programmes as well as on how to make counter-messaging videos more attractive and relevant.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
As such, lab sessions, seminars, workshops and forums could be jointly conducted between relevant government agencies and the private sector to share information, knowledge and skills. In addition, government agencies could also give mandates to private security companies to conduct counter-propaganda activities in a bid to heighten the sense of credibility.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Nonetheless, it is also important for such partnerships to be formed with care hence, the creation of a Standard Operating Procedure (SOP) is needed to ensure that any relevant information or intelligence of possible radicalised individuals or attacks be relayed in a secure and efficient manner. Essentially, to at least limit Daesh’s propaganda and its presence on the Internet, both online and offline measures are required.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
On top of that, it is also fundamental that the government, society and relevant private sectors take concerted efforts in combating the threat of Daesh online. The following chart is an attempt to put the proposed recommendations into perspective. 290 Elina Noor, Senior Analyst at the Institute of Strategic and International Studies (ISIS), Malaysia, interview with Author on June 30, 2014, Kuala Lumpur.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
102 Figure 2: Recommendations for Countering Daesh’s Propaganda and Presence Online Figure 2: Recommendations for Countering Daesh's Propaganda and Presence Online COUNTERING DAESH’S PROPAGANDA AND PRESENCE ONLINE Virtual Mobilisation of Religious Movements “Bringing” the Real Syria and Iraq to Social Media Proliferation of Counter-­‐Messages Strengthening Offline Measures to Combat Daesh Online REINFORCED BY Dissemination of Counter Messages through Active Online Platforms Enhancing Capabilities and Technical Know-­‐ How Public-­‐Private Partnerships (PPPs) SUPPORTED BY 103 C O N C L U S I O N W ith the emergence of various social media platforms today, Daesh’s messages and its presence online have managed to reach and impacted a much wider audience as compared to its predecessors.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia