text
stringlengths
10
3.23k
document_url
stringclasses
318 values
source_url
stringclasses
318 values
country
stringclasses
137 values
In other words, with the use of social media platforms, Daesh has managed to create a force unseen during the pre-Daesh times with the ability to recruit thousands of foreign fighters from all over the world in a short span of time. It is interesting to witness that even individuals with no direct links to Daesh are able to create a massive wave of support for the group. Daesh utilises the Internet for various purposes.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Daesh utilises the Internet for various purposes. This includes facilitating recruitment, communication, funding, training, planning and data mining. Additionally, increasing use of the Internet for hacking purposes is also evident in the case of Daesh. Most concerning however is their use of the Internet for spreading propaganda which has proven to be successful in facilitating recruitment and radicalising.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
The ability of Daesh to turn killings of civilians and raping of women and children into something noble and virtuous is alarming. Hence, it is of utmost urgency that such a force created by Daesh be halted or at the very least limited. Furthermore, the exploitation of religion in this case is apparent. The continuous distortion of versus from the Quran and hadiths further gives credibility to their actions and the creation of the so-called caliphate.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
It is against this background that the online mobilisation of religious entities is paramount. Designing a counter force that could quash their beliefs, in their own style and language, would benefit immensely in the effort to counter the threat of Daesh. 104 The mobilisation of religious movements however would only focus on the religious-based propaganda of Daesh.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Therefore, in response to the political, economic and social aspects of Daesh propaganda, it is useful to project the images of the critical situation in Syria and Iraq as a result of Daesh’s control as well as Daesh’s current weakening state. The images, in the form of counter-messages, would be able to play up the emotions of the readers/viewers on the sufferings of Daesh’s victims and to cast doubts in the minds of the readers and viewers of the legitimacy of Daesh.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In reinforcing the effort to counter Daesh’s propaganda and presence online, two elements have been proposed. The first is to disseminate the counter messages through active online platforms. Active communication is required in achieving goals that online counter operations set out to do. This would allow for better communications between the disseminator and the recipient, limiting the ability of Daesh to intercept with their own counter messages.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In this regard, using active and interactive social media platforms would also require a certain degree of technical know-how. Therefore, the second reinforcing component involves enhancing capabilities and technical knowledge of the counter-messages’ disseminators. This element is crucial in ensuring the effectiveness of the counter-messages.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Factors such as whether the counter-messages are reaching the right targeted audiences - whether it is yielding the intended impact or if it is being accepted positively or otherwise - could be analysed through various online monitoring and analytic tools. Apart from that, it is important to bear in mind that Daesh supporters are active in producing and disseminating Daesh’s propaganda.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In this aspect, to support the efforts in countering Daesh’s presence online, the counter force should also seek to proliferate counter-messages and match the volume produced by the former. One way to achieve this is through limiting bureaucratic procedures in the process of producing counter-messages. Consequently, another important aspect is to design counter-messages that are versatile and based on the culture of the targeted audience.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
This element is important as effective 105 counter-messages should resonate well among its recipients. Elements of sincerity and honesty in the messages would also be of added value in the effort to draw the recipients’ attention. Another important element in support of the counter-efforts is strengthening offline measures in combating Daesh’s presence online.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In this regard, some of the online measures that could be strengthened includes fortifying national laws in order to monitor social media platforms, empower parents, teachers and local communities as well as enhance engagement between authorities and the local communities. These approaches would function as preventive methods as it serves to detect, respond and deter any potential terrorist-related activities whether online or offline.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
The third and final element in supporting the efforts against Daesh online is the forging of Public-Private Partnerships. Acknowledging the limitations that governments may face, particularly in terms of credibility and technical knowledge, PPPs could result in producing finer and more effective outputs.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
In this instance, private companies and NGOs could also play relevant roles in combating the threat of Daesh online, whether through training the government officials or by conducting counter-propaganda activities themselves. Essentially, fighting the force of Daesh, whether online or offline requires a concerted effort at the international level and from various segments of a nation; from the security forces, to the civil entities, NGOs, CSOs and academicians.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
However, further research is needed to close the gap in knowledge currently present in the fight against Daesh. Creative ways in dealing with the threat must also be formulated and last but not least, the drive to ensure its success is also crucial. 106 R E F E R E N C E S “A timeline of Daesh attacks worldwide”, Gulf News, July 3, 2016, http://gulfnews. com/news/mena/iraq/a-timeline-of-daesh-attacks-worldwide-1.1856495 (accessed July 11, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
”Abu Sayyaf rebels pledge allegiance to ISIS”, January 11, 2016, The Manila Times, http://www.manilatimes.net/breaking_news/abu-sayyaf-rebels-pledge-allegiance-to- isis/ (accessed July 21, 2016). “Al Qaeda magazine on pressure cookers: ‘Make a bomb in the kitchen of your mom’”, April 16, 2013, http://www.washingtontimes.com/news/2013/apr/16/al-qaeda- magazine-pressure-cookers-make-bomb-kitch/ (accessed 20 August 2015).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“Another 14 Individuals Nabbed, Suspected Of Links To Daesh Militants – Police”, Bernama, May 21, 2016, http://www.bernama.com/bernama/v8/sp/newssports. php?id=1247986 (accessed June 1, 2016). “As-Sahab: Al Qaeda’s Nebulous Media Branch”, Stratfor, September 8, 2006, https:// www.stratfor.com/analysis/sahab-al-qaedas-nebulous-media-branch (accessed June 29, 2006).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“BIFF, Abu Sayyaf pledge allegiance to Islamic State jihadists”, August 16, 2014, GMA News, http://www.gmanetwork.com/news/story/375074/news/nation/biff-abu- sayyaf-pledge-allegiance-to-islamic-state-jihadists#sthash.fVNkSVuo.dpuf (accessed July 21, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“British ISIS Fighter, Recruiter, Fundraiser Shares Experiences In Islamic State On Facebook”, May 24, 2016, Memri JTTM, http://cjlab.memri.org/lab-projects/tracking- jihadi-terrorist-use-of-social-media/british-isis-fighter-recruiter-fundraiser-shares- experiences-in-islamic-state-on-facebook/ (accessed July 27, 2016). “Centre for Strategic Counterterrorism Communications (CSCC)”, Counter Extremism.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
org, 2013, https://www.counterextremism.org/resources/details/id/404/center-for- strategic-counterterrorism-communications-cscc (accessed June 17, 2016). “Daesh lost quarter of its Iraq, Syria territory in 18 months”, Gulf News, July 10, 2016, http://gulfnews.com/news/mena/iraq/daesh-lost-quarter-of-its-iraq-syria-territory- in-18-months-1.1859950 (accessed July 15, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
107 “Daesh regains areas lost to Syrian government”, Gulf News, June 21, 2016, http://gulfnews.com/news/mena/syria/daesh-regains-areas-lost-to-syrian- government-1.1850089 (accessed July 15, 2016). “DAESH tells followers to use Telegram messaging app instead of Twitter”, Daily Sabah World, November 18, 2015, http://www.dailysabah.com/world/2015/11/18/daesh- tells-followers-to-use-telegram-messaging-app-instead-of-twitter (accessed June 1, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“Dot-Com Terrorism,” The New Atlantis, Number 5, Spring 2004, pp. 91-93. “Early History of Terrorism”, Terrorism Research, http://www.terrorism-research.com/ history/early.php (accessed March 1, 2015).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“Foreign Fighters: An Updated Assessment of the Flow of Foreign Fighters into Syria and Iraq”, December 2015, The Soufan Group, http://soufangroup.com/wp-content/ uploads/2015/12/TSG_ForeignFightersUpdate3.pdf (accessed July 21, 2016) “From Hijrah to Khilafah”, in Dabiq: The Return of the Khilafah, June-July 2014, Issue 1, Al-Hayat Media Centre, pg 34. “Hijrah to the Islamic State”, published online by the Islamic State (website address can no longer be found).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“I Only Roll with The Real” Tumblr Blog, November 16, 2015, http://sorrows-of- tauheed.tumblr.com/post/133337777337/to-those-who-have-sense-how-many- children-can-you (accessed May 27, 2016). “Indonesia’s Muslim cyber warriors take on IS”, The Star, May 8, 2016, http://www. thestar.com.my/news/regional/2016/05/08/indonesia-muslim-cyber-warriors-take- on-islamic-state/ (accessed June 17, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“Inside look at ISIS’ brutal persecution of gays”, December 2, 2015, CBSNews, http:// www.cbsnews.com/news/isis-persecution-gay-men-murder-lgbt-muslim-society/ (accessed July 20, 2016). “Iraq takes full control of Fallujah from Daesh”, Iran Daily, June 27, 2016, http://www. iran-daily.com/News/154004.html?catid=3&title=Iraq-takes-full-control-of-Fallujah- from-Daesh (accessed July 15, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“Islamic State, Daesh or Isis: the dilemma of naming the extremists”, The Week, December 2, 2015, http://www.theweek.co.uk/isis/62422/islamic-state-daesh-or-isis- the-dilemma-of-naming-the-militants (accessed October 10, 2016). “Islamic State’s 43 Global Affiliates Interactive World Map”, December 2015, IntelCentre, http://scl.io/JGXPdMa7#gs.MVwntZM (accessed July 21, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“Islamic State’s 43 Global Affiliates Interactive World Map”, IntelCentre, December 15, 2015, http://scl.io/JGXPdMa7#gs.VWFCxW8 (accessed June 11, 2016). 108 “Jordanian pilot’s “obscene” burning death by ISIS sparks outrage in Mideast”, February 4, 2015, CBSNews, http://www.cbsnews.com/news/jordanian-pilots- obscene-burning-death-by-isis-sparks-outrage-in-mideast/ (accessed July 20, 2016). “Khilafah Declared” in Dabiq: The Return of the Khilafah, June-July 2014, Issue 1, Al- Hayat Media Centre, pg 7.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“Launch of the Sawab Centre”, US Department of State, July 8, 2015, http://www. state.gov/r/pa/prs/ps/2015/07/244709.htm (accessed 17 June, 2016). “Participative Web: User Created Content”, April 12, 2007, Organization for Economic Co-operation and Development (OECD), http://www.oecd.org/sti/38393115.pdf (accessed August 1, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“PDRM’s Facebook, Twitter accounts hacked”, Malay Mail Online, July 13, 2015, http:// www.themalaymailonline.com/malaysia/article/pdrms-facebook-account-hacked (accessed June 3, 2016). “Puchong Blast Work of Daesh Militants, says IGP”, Bernama, July 4, 2016, http://www. bernama.com/bernama/v8/newsindex.php?id=1261026 (accessed July 11, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“Raqqa is Being Slaughtered Silently, Syria”, Committee to Protect Journalists (CPJ), https://cpj.org/awards/2015/raqqa-is-being-slaughtered-silently-syria.php (accessed July 15, 2016). “Sawab Center Launches /#DeludedFollowers/ Campaign to Expose Daesh’s Methods of Recruiting Foreign Fighters” WAM, January 10, 2016, https://www.wam.ae/en/ news/emirates/1395290133434.html (accessed June 17, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“Slap Jamie Oliver and Subscribe”, available at https://www.youtube.com/watch?v=us PV2cXhxp0&feature=youtu.be (accessed July 14, 2016). “Terror’s New Headquarters”, The Economist, June 14, 2014 in Adam Hoffman, and Yoram Schweitzer, “Cyber Jihad in the Service of the Islamic State (ISIS)”, Strategic Assessment, Vol. 18 No. 1, April 2015.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
18 No. 1, April 2015. “Tersangka Bom Alam Sutera Kerap Tonton Video ISIS”, October 30, 2015, CNN Indonesia, http://www.cnnindonesia.com/nasional/20151030230011-12-88541/ tersangka-bom-alam-sutera-kerap-tonton-video-isis/ (accessed July 27, 2016). “The Media War Upon the Islamic State: The Media Techniques of Misleading the Masses”, Ansar Al-Khilafah Publication, December 2, 2015 (20 Safar 1437), https:// archive.org/details/the-media-war-upon-the-islamic-state1 (accessed June 5, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“The Murtadd Brotherhood”, Al-Hayyat Media Centre, April 13, 2016, pg. 28. “The Return of the Khilafah” June-July 2014, Issue 1, pg. 2-3 Al-Hayat Media Centre. 109 “UN chief: 34 militant groups allied to Daesh worldwide”, February 6, 2016, The Gulf News, http://gulfnews.com/news/mena/iraq/un-chief-34-militant-groups-allied-to- daesh-worldwide-1.1667028 (accessed July 21, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“User-Generated Content (UGC)”, Techopedia, https://www.techopedia.com/ definition/3138/user-generated-content-ugc (accessed August 1, 2016). “What does ‘New Media’ mean?”, Iowa State University Studio for New Media, http:// newmedia.engl.iastate.edu/about/what_is_new_media (accessed August 1, 2016). “What is Bitcoin?”, March 20, 2015, CoinDesk, http://www.coindesk.com/information/ what-is-bitcoin/ (accessed August 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
“Who is Shaykh, Imaam Yusuf Al-Uyayree” at https://archive.org/details/ WhoIsShaykhImaamYusufAl-uyayree (accessed May 27, 2016). Abigail O’Leary, “‘Jihadi Princess’ jailed after using WhatsApp and Twitter to share sickening ISIS propaganda”, May 18, 2016, Mirror, http://www.mirror.co.uk/news/uk- news/jihadi-princess-jailed-after-using-7998203 (accessed August 2, 2016). Adam Hoffman, and Yoram Schweitzer, “Cyber Jihad in the Service of the Islamic State (ISIS)”, Strategic Assessment, Vol. 18 No.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
18 No. 1, April 2015 http://www.inss.org.il/ uploadImages/systemFiles/adkan18_1ENG%20%285%29_Hoffman-Schweitzer.pdf (accessed June 3, 2016). Agamoni Ghosh, “Isis reportedly burns Daesh fighters alive in Mosul for losing battle for Ramadi”, International Business Times (IBT), January 13, 2016, http://www.ibtimes. co.uk/isis-burns-daesh-fighters-alive-mosul-losing-battle-ramadi-1537604 (accessed July 15, 2016). Al-Baqarah (2:204-206).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Al-Baqarah (2:204-206). Translation obtained from Abdullah Yusuf Ali, The Meaning of Holy Qur’an: Text, Translation and Commentary, 2005, (Islamic Book Trust: Kuala Lumpur), pg. 74. Alberto M. Fernandez, “Here to stay and growing: Combating ISIS propaganda networks”, Islamic World Centre for Middle East Policy at Brookings, October 2015, http://www.brookings.edu/~/media/research/files/papers/2015/10/combating-isis- propaganda-fernandez/is-propaganda_web_english.pdf (accessed June 16, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Al-Mumtahanah (60:8-9). Translation obtained from Abdullah Yusuf Ali, The Meaning of Holy Qur’an: Text, Translation and Commentary, 2005, (Islamic Book Trust: Kuala Lumpur), pg. 1219. Anna Dubuis, “Anonymous: ISIS has issued these instructions to followers on avoiding being hacked”, Mirror, November 17, 2015, http://www.mirror.co.uk/news/world- news/anonymous-isis-issued-instructions-followers-6845219 (accessed June 5, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Apparat Report in “The ISIS Internet army has found a safe haven on Russian social networks — for now”, Tetyana Lokot, Public Radio International (PRI), September 12, 2014, http://www.pri.org/stories/2014-09-12/isis-internet-army-has-found-safe- 110 haven-russian-social-networks-now (accessed May 27, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Armando Cordoba, “A secret app called Wickr has become ISIS’s number one recruitment device”, News.com.au, April 14, 2015, http://www.news.com.au/national/ a-secret-app-called-wickr-has-become-isiss-number-one-recruitment-device/news- story/07857ae05909639df75df65dff960137 (accessed Oktober 7, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Ashley Carman, “Filtered extremism: how ISIS supporters use Instagram”, The Verge, December 9, 2015, http://www.theverge.com/2015/12/9/9879308/isis-instagram- islamic-state-social-media (accessed May 25, 2016). Ashley Carman, “Filtered extremism: how ISIS supporters use Instagram”, The Verge, December 9, 2015. Barbara Mantel, “Terrorism and the Internet: Should Web Sites that Promote Terrorism be Shut Down?”, November 2009, CQ Global Researcher, vol. 3, No.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
3, No. 11 BBC, “Can Iraqi militants be kept off social media sites?” June 25, 2014. http://www. bbc.com/news/technology-28016834 (accessed March 5, 2015). Beatrice Berton, “The dark side of the web: ISIL’s one-stop shop?”, June 26, 2015, Alert No. 30, European Union Institute for Security Studies (EUISS), http://www.iss. europa.eu/publications/detail/article/the-dark-side-of-the-web-isils-one-stop-shop/ (accessed August 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Bibi T. van Ginkel, “Responding to Cyber Jihad: Towards an Effective Counter Narrative”, March 2015, International Centre for Counter-terrorism (ICCT), http://www.icct.nl/ download/file/ICCT-van-Ginkel-Responding-To-Cyber-Jihad-Towards-An-Effective- Counter-Narrative-March2015.pdf (accessed July 14, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Brandwatch, “Marketing: Top 15 Free Social Media Monitoring Tools”, August 2015, https://www.brandwatch.com/2013/08/top-10-free-social-media-monitoring-tools/ (accessed November 15, 2015) Break the Cross, July 2016, al-Furqan, http://jihadology.net/2016/07/31/new-issue-of- the-islamic-states-magazine-dabiq-15/ (accessed September 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Brooke Satti Charles, “Funding Terrorists: The Rise of ISIS”, October 10, 2014, Security Intelligence, https://securityintelligence.com/funding-terrorists-the-rise-of-isis/ (accessed May 23, 2016). Catherine Theohary and John Rollins, “Terrorists Use of the Internet: Information Operations in Cyberspace”.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Charlie Winter, “Documenting the Virtual ‘Caliphate’”, Quilliam Foundation, October 2015, https://www.quilliamfoundation.org/wp/wp-content/uploads/2015/10/FINAL- documenting-the-virtual-caliphate.pdf (accessed June 27, 2016). Charlie Winter, “ISIS Is Using the Media Against Itself”, the Atlantic, March 23, 2016, http://www.theatlantic.com/international/archive/2016/03/isis-propaganda- 111 brussels/475002/ (accessed June 23, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Christina Schori Liang, “Cyber Jihad: Understanding and Countering Islamic State Propaganda”, Geneva Centre for Security Policy (GCSP), February 2015, www.gcsp.ch/ download/2763/72138 (accessed June 5, 2016). CNN, “What is ISIS’ appeal for young people”, February 25, 2015, http://edition.cnn. com/2015/02/25/middleeast/isis-kids-propaganda/ (accessed March 1. 2015).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
2015). Counter-Terrorism Implementation Task Force (CTITF) Working Group on “Countering the Use of the Internet for Terrorist Purposes, May 2011, http://www.un.org/en/ terrorism/ctitf/pdfs/ctitf_interagency_wg_compendium_legal_technical_aspects_ web.pdf (accessed 20 January 2015). Counter-Terrorism Implementation Task Force (CTITF) Working Group on “Countering the Use of the Internet for Terrorist Purposes, May 2011.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Dabiq Transalted, https://baaqiyah.wordpress.com/category/artikel/ (accessed July 11, 2016). Dabiq, “The Flood”, 2nd Edition, June-July 2014. Dabiq, Issue 11, August – September 2015, pg. 64-65. David Sim, “Iraq: The battle against Isis goes on in ‘liberated’ Ramadi, a city reduced to rubble”, The International Business Times (IBT), January 20, 2016, http://www.ibtimes. co.uk/iraq-battle-against-isis-goes-liberated-ramadi-city-reduced-rubble-1539005 (accessed July 15, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Diary of Muhajirah Tumblr Blog, “Who are you to mock the Mujahidin”, February 20, 2016, http://diaryofmuhajirah.tumblr.com/ (accessed May 26, 2016). Diary of Muhajirah Tumblr Blog, available at “http://diaryofmuhajirah.tumblr.com/ (accessed May 26, 2016). Doug Ammoth, “What is Tumblr”, Time Tech, May 19, 2013, http://techland.time. com/2013/05/19/what-is-tumblr/ (accessed May 26, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Elsa Vulliamy, “Brazilian Jihadist group becomes first in South America to pledge allegiance to Isis”, July 19, 2016, Independent, http://www.independent.co.uk/ news/world/americas/isis-brazil-rio-olympics-2016-jihadist-group-ansar-al-khilafah- terrorism-a7143116.html (accessed July 21, 2016). Emily Smith, “ISIS planning ‘special forces-style’ attacks in Europe, report says”, CNN, January 26, 2016, http://edition.cnn.com/2016/01/26/world/isis-attacks-europe/ (accessed June 6, 2016). Eric Schmitt, “U.S.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Eric Schmitt, “U.S. Intensifies Effort to Blunt ISIS’ Message”, February 6, 2015, The New York Times, http://www.nytimes.com/2015/02/17/world/middleeast/us-intensifies- effort-to-blunt-isis-message.html?_r=0 (accessed June 3, 2016). 112 Eva Muhajirah Tumblr Blog, http://noussaybahafsa.tumblr.com/ (accessed May 27, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Farik Zolkepli, “Suspected militants nabbed while they were making bombs”, The Star, April 27, 2015, http://www.thestar.com.my/news/nation/2015/04/27/cops-foil- terror-attack-plans-suspected-militants-nabbed-while-they-were-making-bombs/ (accessed June 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Farik Zolkepli, M. Kumar and Michelle Tam, “IGP confirms IS behind grenade blast in Puchong”, The Star, July 5, 2016, http://www.thestar.com.my/news/ nation/2016/07/05/it-was-a-terrorist-attack-igp-confirms-is-behind-grenade-blast-in- puchong/ (accessed July 11, 2016). Fauzia Bruke, “Social Media vs. Social Networking”, December 2, 2013, Huffington Post, http://www.huffingtonpost.com/fauzia-burke/social-media-vs-social-ne_b_4017305. html (accessed August 1, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
html (accessed August 1, 2016). Felicity Capon, “New Islamic State Propaganda Targets Russian Recruits”, Newsweek, March 27, 2016, http://www.newsweek.com/new-islamic-state-propaganda-targets- russian-recruits-317282 (accessed May 27, 2016). Fernandez, Kevin. “The two waves of cyberpolitics in Malaysia: what does the by- elections barometer tell us?.” Department of Political Science Central European University 27, no. 1 (2010): 597. Fred Cohen, “Terrorism and Cyberspace” in Cyberterrorism, ed.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Alan O’Day, (Aldershot: Ashgate Publishing Limited, 2004), pg. 150 Gabriel Weimann, “How Modern Terrorism Uses the Internet”, Security Affairs, 2005, http://www.usip.org/sites/default/files/sr116.pdf (accessed November 3, 2014). Gabriel Weimann, “Terrorist Migration to the Dark Web”, June 2016, Vol. 10, Issue 3, Perspectives on Terrorism, http://www.terrorismanalysts.com/pt/index.php/pot/ article/view/513/1013 (accessed August 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Georgia Rooney, “Creating interactive video with Annotation”, October 21, 2015, MWP Digital Media, https://mwpdigitalmedia.com/blog/creating-interactive-video-with- annotations/ (accessed July 14, 2016). Gianluca Mezzofiore, “Iraq: Yazidi girls ‘raped in public’ and sold to Isis fighters before release”, April 9, 2015, http://www.ibtimes.co.uk/iraq-yazidi-girls-raped-public-sold- isis-fighters-before-release-1495594 (accessed July 20, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Google Analytics, “Features”, https://www.google.com/analytics/standard/features/ (accessed November 15 2015). Hannah Farrell, “Islamic State poses as dead journalist to entrap Facebook friends”, News.com.au, January 10, 2016, http://www.news.com.au/technology/online/ islamic-state-poses-as-dead-journalist-to-entrap-facebook-friends/news-story/75d4b 8ef1e02d1047d88014482ca25df (accessed June 1, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
113 Harleen K. Gambhir, “Dabiq: The Strategic Messaging of the Islamic State”, Institute for the Study of War (ISW), August 15, 2014, http://www.understandingwar.org/sites/ default/files/Dabiq%20Backgrounder_Harleen%20Final.pdf (accessed March 1, 2015). Harriet Agerholm, “Isis using Whatsapp and Telegram to sell sex slaves”, July 8, 2016, Independent, http://www.independent.co.uk/news/world/middle-east/isis-using- whatsapp-telegram-sell-sex-slaves-iraq-facebook-a7125551.html (accessed August 8, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
HootSuite,”HootSuite lets you do more with Social Media” https://hootsuite.com/ (accessed 15 November 2015). NineMSN, “Sydney man investigated for ‘supporting murder of infidel”, Nine News. co.au, April 28, 2016, http://www.9news.com.au/national/2016/04/28/05/41/ sydney-man-investigated-for-supporting-murder-of-infidels#HTvDWcfkkYfomrxD.99 (accessed May 31, 2016) Medgar Evers. BrainyQuote.com, Xplore Inc, 2016, http://www.brainyquote.com/quotes/quotes/m/medgarever101375.html (accessed July 11, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Israfil Yilmaz Tumblr Blog, https://web.archive.org/web/20151019005614/http:// chechclear.tumblr.com/ (accessed May 27, 2016). Ida Lim, “IGP confirms IS linked to Movida nightclub blast”, The Star, July 4, 2016, http://www.themalaymailonline.com/malaysia/article/igp-confirms-is-linked-to- movida-nightclub-blast (accessed July 19, 2016). IHS Jane’s, “Islamic State”, December 11, 2014 Jane’s World Insurgency and Terrorism, pg.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
4-5 Internet Live Stats, “Internet Users”, http://www.internetlivestats.com/internet- users/#definitions (accessed July 22, 2016). Islamic State (IS) Report, “Propagating the Correct Manhaj”, June 2014, Issue 1, Al- Hayat Media Centre. Ivanpal Singh Grewal, “Defining Terrorism”, April 1, 2016, The Star, http://www.thestar. com.my/opinion/online-exclusive/making-progress/2015/04/01/pota-terrorism/ (accessed August 1, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Jake Burman, “Evil ISIS fighters yelling Allahu Akbar parade SEVERED HEADS from pick- up truck”, January 18, 2016, Express, http://www.express.co.uk/news/uk/635560/ ISIS-Islamic-State-Libya-Bin-Jawad-Severed-Heads-Parade-Terror-Oil-Ras-Lanuf-Sidra (accessed July 21, 2016). James A. Lewis, “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats”, Centre for Strategic and International Studies (CSIS), December, 2002, http:// www.enhyper.com/content/0211_lewis.pdf (accessed 17 May 2014).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
114 Janaka Perera, “LTTE a trend setter in cyber terrorism”, Asian Tribune, October 27, 2007, http://www.asiantribune.com/node/8018 (accessed on June 27, 2016). Janine Di Giovanni, Leah McGarth Goodman and Damien Sharcov, “How Does ISIS Fund Its Reign of Terror?”, Newsweek, November 6, 2014, http://www.newsweek. com/2014/11/14/how-does-isis-fund-its-reign-terror-282607.html (accessed June 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Janine Di Giovanni, Leah McGarth Goodman and Damien Sharcov, “How Does ISIS Fund Its Reign of Terror?”, Newsweek, November 6, 2014. Jared Cohen, “Digital Counterinsurgency: How to Marginalise the Islamic State Online”, Council of Foreign Relations, https://www.foreignaffairs.com/articles/middle-east/ digital-counterinsurgency (accessed 5 November 2015). Jasmine Jawhar, “Bringing the Battle against Daesh Online”, The Journal of Diplomacy and Foreign Relations, vol.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
15, Number 2, December 2015, (Institute of Diplomacy and Foreign Relations (IDFR): Kuala Lumpur). Jason Murdock, “Isis tried to launch a social media propaganda ‘attack and it was a shambles”, International Business Times UK, April 8, 2016, http://www.ibtimes.co.uk/ isis-tried-launch-social-media-propaganda-attack-it-was-shambles-1553879 (accessed June 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Jillian Kay Melchior, “peshmerga commander says Iraq needs ground troops to fully defeat ISIS”, National Review, September 21, 2014, http://www.nationalreview.com/ article/388505/those-who-face-death-jillian-kay-melchior (accessed June 3, 2016). Joanna Paraszczuk, “IS Supporters Praise Paris Attacks On Social Media”, Radio Free Europe Radio Liberty, November 15, 2015, http://www.rferl.org/content/is-supporters- praise-paris-attacks-on-social-media/27365116.html (accessed May 27, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Joby Warrick, “ISIS Fighters seem to be trying to sell sex slaves online”, The Washington Post, May 28, 2016, https://www.washingtonpost.com/world/national-security/isis- fighters-appear-to-be-trying-to-sell-their-sex-slaves-on-the-internet/2016/05/28/ b3d1edea-24fe-11e6-9e7f-57890b612299_story.html (accessed June 2, 2016). Jonalan Brickey, “Defining Cyberterrorism: Capturing a Broad Range of Activities in Cyberspace”, Combating Terrorism Centre 5, no. 8. (2012), https://www.ctc.usma.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
8. (2012), https://www.ctc.usma. edu/v2/wp-content/uploads/2012/08/CTCSentinel-Vol5Iss81.pdf (accessed October 1, 2014). Joshua Stern, “Introduction to Web 2.0 Technologies”, http://www.wlac.edu/online/ documents/Web_2.0%20v.02.pdf (accessed August 1, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
JustPaste.it Official Website at https://justpaste.it/ Kareem Shaheen, “Iraqi troops seize control of districts of Falluja from Isis”, The Guardian, May 30, 2015, http://www.theguardian.com/world/2016/may/30/iraqi- forces-enter-fallujah-in-attempt-to-drive-out-islamic-state (accessed June 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
115 Kashmira Gander, “Isis: Bradford man jailed for sharing extremist group’s Dabiq propaganda magazine on his Facebook page”, The Independent, April 24, 2015, http://www.independent.co.uk/news/uk/crime/isis-bradford-man-jailed-for- sharing-extremist-groups-dabiq-propaganda-magazine-on-facebook-10202642.html (accessed May 31, 2016). Kathy Crilley, “Information warfare: new battlefields Terrorists, propaganda and the Internet”, in Cyberterrorism, ed.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Alan O’Day, (Aldershot: Ashgate Publishing Limited, 2004), pg. 69. Katie Zafadski, “Meet the Female Recruiters of ISIS”, NyMag, September 4, 2014, http://nymag.com/daily/intelligencer/2014/09/meet-the-female-recruiters-of-isis. html (accessed June 4, 2016). Kennimrod Sariburaja, al-Jemaah al-Islamiyah, 2013, (SEARCCT: Kuala Lumpur).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Kimiko De Freytas-Tamura, “Teenage Girl Leaves for ISIS, and Others Follow”, The New York Times, February 24, 2015, http://www.nytimes.com/2015/02/25/world/from- studious-teenager-to-isis-recruiter.html?_r=0 (accessed June 5, 2006). Korean JoonANg Daily, “ISIS reaches Korea”, January 21, 2015, http://koreajoongangdaily. joins.com/news/article/Article.aspx?aid=2999929 (accessed March 5, 2015).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Laura Smith-Spark and Nic Robertson, “Who was Copenhagen gunman Omar Abdel Hamid El-Hussein?”, CNN, February 27, 2015, http://edition.cnn.com/2015/02/17/ europe/denmark-copenhagen-gunman/ (accessed June 1, 2016). Lim Yan Liang, “Government bans newspaper published by ISIS”, July 22, 2016, The Straits Times, http://www.straitstimes.com/singapore/government-bans-newspaper- published-by-isis (accessed October 10, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Lisa Daftari, “Brazil Terror Sect aligns with ISIS as Olympics approach”, July 19, 2016, Fox News, http://www.foxnews.com/world/2016/07/19/brazil-terror-sect-aligns- with-isis-as-olympics-approach.html (accessed July 21, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Lorraine Bowman-Grieve and Maura Conway, “Exploring the Form and Function of Dissident Irish Republican Online Discourses”, 2012, http://www.google.com.my/url ?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0CD8QFjAF&url=http%3A%2F%2 Fdoras.dcu.ie%2F17637%2F1%2FIrish_Republican_Online_Discourses_FINAL_NOT_ PROOF.pdf&ei=-wH9VLeMIM2eugTr-4L4DA&usg=AFQjCNGiJUP3lNl9cxzFnHABxU3R- IHKGA&bvm=bv.87611401,d.c2E (accessed December 14, 2014).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Louise Stigsgaard Nisse, “Inside ISIS: The Making of a Radical”, Narratively, http:// narrative.ly/stories/inside-isis-the-making-of-a-radical/ (accessed March 1, 2015). Madeleine Gruen, “Innovative Recruitment and Indoctrination Tactics Extremists: Video Games, Hip Hop, and the World Wide Web”, in The Making of a Terrorist: Recruitment, Training, and Root Causes, ed. James J.F. Forest (Westport, CT: Praeger, 2006).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
James J.F. Forest (Westport, CT: Praeger, 2006). 116 Mah-Rukh Ali, “ISIS and Propaganda: How ISIS Exploits Women”, Reuters Institute for the Study of Journalism, 2015, https://reutersinstitute.politics.ox.ac.uk/sites/ default/files/Isis%20and%20Propaganda-%20How%20Isis%20Exploits%20Women. pdf (accessed June 3, 2015). Manovich, Lev. “New media from Borges to HTML.” The new media reader 1 (2003): pg. 13-25.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
13-25. Mark Tran, “Brussels shooting raises fears over European fighters returning from Syria”, June 1, 2014, The Guardian, https://www.theguardian.com/uk-news/2014/ jun/01/brussels-shooting-raises-fears-around-fighters-returning-from-syria (accessed July 21, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Mary-Ann Russon and Jason Murdock, “Welcom to the bizare and frightening world of Islamic State Channels on Telegram”, International Business Times UK, May 23, 2016, http://www.ibtimes.co.uk/welcome-bizarre-frightening-world-islamic-state-channels- telegram-1561186 (accessed June 2, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Mary-Ann Russon, “Alrawi: Isis has built secure Android messaging app to replace Telegram, says Anonymous affiliate GhostSec”, International Business Times, January 14, 2016, http://www.ibtimes.co.uk/alrawi-isis-builds-secure-android-messaging- app-replace-telegram-says-anonymous-affiliate-ghostsec-1537948 (accessed June 1, 2016). Mary-Ann Russon, “ISIS cyber army grows in strength as calipahte hacking groups merge on Telegram”, International Business Times UK, April 5, 2016, http://www.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
ibtimes.co.uk/isis-cyber-army-grows-strength-caliphate-hacking-groups-merge- telegram-1553326 (accessed June 3, 2016). Maura Conway, “Terrorism and the Internet”: New Media – New Threat?”, http:// doras.dcu.ie/515/1/parliamentary_affairs_59_2.pdf (accessed 25 January 2015).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Mei Amelia R, “Ini Alasan Leopard ‘Lone Wolf’ Bomber Mal Alam Sutera Minta Bitcoin”, October 29, 2015, Detik News, http://news.detik.com/berita/3057156/ini-alasan- leopard-lone-wolf-bomber-mal-alam-sutera-minta-bitcoin (accessed August 2, 2016). Michael Weiss and Hassan, “ISIS: Inside the army of terror”. Regan Arts, 2015.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Regan Arts, 2015. Mubin Shaikh in Laurie Goodstein, “Muslim Leaders Wage Theological Battle, Stoking ISIS’ Anger”, May 8, 2016, The New York Times, http://www.nytimes.com/2016/05/09/ us/isis-threatens-muslim-preachers-who-are-waging-theological-battle-online.html?_ r=0 (accessed June 9, 2016). Muhajirah Aisha’s Twitter account (accessed May 24, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Olga Khrustaleva, “Russia’s burgeoning ISIL problem”, AlJazeera, December 10, 2014, http://www.aljazeera.com/indepth/features/2014/12/russia-burgeoning-isil- problem-20141297415936963.html (accessed 27 May 2016). Omar Abdel Hamid El-Hussein Facebook post in Laura Smith-Spark and Nic Robertson, 117 “Who was Copenhagen gunman Omar Abdel Hamid El-Hussein?”, February 27, 2016, CNN, http://edition.cnn.com/2015/02/17/europe/denmark-copenhagen-gunman/ (accessed June 1, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Pamela Engel, “’Idiots’: ISIS responds to Anonymous threatening its ‘biggest operation ever’ against them”, Business Insider Malaysia, November 17, 2015, http://www. businessinsider.my/isis-anonymous-response-paris-attacks-2015-11/?r=US&IR=T#xTv ZKfuKWSO4Tb5v.97 (accessed June 1, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Paula Mejia, “19,000 French Websites (and Counting) Hacked Since Charlie Hebdo Attack”, Newsweek, January 15, 2015, http://www.newsweek.com/19000-french- websites-and-counting-hacked-charlie-hebdo-attack-299675 (accessed Jun 3, 3016). Pete Schauer, “5 Biggest Differences between Social Media and Social Networking”, June 28, 2016, Social Media Today, http://www.socialmediatoday.com/social- business/peteschauer/2015-06-28/5-biggest-differences-between-social-media-and- social (accessed July 3, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Peter Chalk, ‘The Tigers Abroad: How the LTTE Diaspora Supports the Conflict in Sri Lanka’, 2008, http://journal.georgetown.edu/wp-content/uploads/9.2-Chalk.pdf, (accessed 7 March 2014). Procommunicator, “Free Social Media Monitoring Tools”, http://www. procommunicator.com/free-monitoring-tools/ (accessed 14 November 2015). Qu Tianlu, Chia Jeng Yang and Beatrice Chan, “Terrorism of the Islamic State: Social Media Strategies”, The Wilberforce Society, February 2016, http://thewilberforcesociety.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
co.uk/wp-content/uploads/2016/02/Wilberforce-Society-Social-Media-IS-Paper.pdf (accessed June 3, 2016). R. Kim Cragin and Sara A. Daly, Women as Terrorists: Mothers, Recruiters, and Martyrs, 2009, Praeger Security International Reviewed by Kennimrod Sariburaja, SEARCCT’s Selection of Articles, Volume 2, 2011, (SEARCCT: Kuala Lumpur), pg. 125. Rachel Briggs and Ross Frenett, “Policy Briefing: Foreign Fighters, the Challenge of Counter-Narratives”, Institute for Strategic Dialogue, 2014.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Rebecca Turner, “Islamic State recruiters create complex network of Facebook accounts to entice Australian teens”, ABC, December 24, 2015, http://www.abc.net. au/news/2015-11-30/islamic-state-using-facebook-to-gather-new-recruits/6968890 (accessed June 2, 2016). Resolution 2249 (2015), November 20, 2015, United Nations Security Council, http://www.securitycouncilreport.org/atf/cf/%7B65BFCF9B-6D27-4E9C-8CD3- CF6E4FF96FF9%7D/s_res_2249.pdf (accessed August 1, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Rinaldo, “Video Detik-Detik Leopard Menaruh Bom di Mall Alam Sutera”, October 29, 2015, Liputan 6, http://news.liputan6.com/read/2352798/video-detik-detik-leopard- menaruh-bom-di-mall-alam-sutera (accessed August 2, 2016). 118 Sam Webb, “ISIS use Instagram to post sickening bodycam footage of murderous assault on civilians in Iraqi city”, Mirror, May 15, 2015, http://www.theverge. com/2015/12/9/9879308/isis-instagram-islamic-state-social-media (accessed May 25, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Shadia Nasralla, “Teenager in Austrian ‘Playstation’ terrorism case gets 2 years”, Reuters, May 26, 2015, http://in.reuters.com/article/mideast-crisis-austria- idINKBN0OB1J320150526 (accessed June 2, 2016). Socialbakers, “Facebook Statistic Directory”, http://www.socialbakers.com/statistics/ facebook/ (accessed May 27, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Spencer Ackerman, “US Central Command Twitter account hacked to read ‘I love you Isis’”, The Guardian, January 12, 2015, http://www.theguardian.com/us-news/2015/ jan/12/us-central-command-twitter-account-hacked-isis-cyber-attack (accessed June 3, 2016). Taqi’ulDeen al-Munthir, “Bitcoin wa’ Sadaqat al-Jihad“, https://alkhilafaharidat.files. wordpress.com/2014/07/btcedit-21.pdf (accessed July 28, 2016). Telegram website, https://telegram.org/ (accessed June 1, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
The Guardian, “British woman held in Turkey on suspicion of trying to travel to Syria”, March 17, 2015, http://www.theguardian.com/world/2015/mar/17/british-woman- held-turkey-suspicion-travel-syria (accessed March 19, 2015). The Jakarta Post, “Sons, top aides abandon Ba’asyir over ISIL, form new jihadist group”, August 13, 2014, http://www.thejakartapost.com/news/2014/08/13/sons-top-aides- abandon-ba-asyir-over-isil-form-new-jihadist-group.html#sthash.JfnldNqk.dpuf (accessed March 5, 2015).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
The Organisation for Security and Co-operation in Europe (OSCE), “OSCE Online Expert Forum Series on Terrorist Use of the Internet: Treats, Responses and Potential Future Endeavours”, 2013, http://www.osce.org/atu/102266?download=true (accessed October 15, 2014). The Telegraph, “Al-Qaeda cuts links with Syrian group too extreme even for them”, February 3, 2014, http://www.telegraph.co.uk/news/worldnews/middleeast/ syria/10614037/Al-Qaeda-cuts-links-with-Syrian-group-too-extreme-even-for-them.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
html (accessed March 1, 2015). The United States Department of Defense in “What is Terrorism”, Terrorism Research, http://www.terrorism-research.com/ (accessed August 1, 2016). The video of the film could be accessed at https://www.youtube.com/ watch?v=JqO79tlWkmk (accessed October 7, 2016). The Washington Post, “Inside the battle for Ask.fm, the site where Islamic State recruited three American teens”, December 12, 2014, http://www.washingtonpost.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
com/news/the-intersect/wp/2014/12/12/inside-the-battle-for-ask-fm-the-site- 119 where-islamic-state-recruited-three-american-teens/ (accessed March 5, 2015). Tumblr, “Press Information”, https://www.tumblr.com/press (accessed May 26, 2016). Twitter account of user, (accessed May 24, 2016). UK Against Daesh Twitter Account, (accessed June 17, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
United States Institute of Peach (USIP), “Terror on the Internet: Questions and Answers”, http://www.usip.org/publications-tools/terror-internet/terror-internet- questions-and-answers (accessed 20 July 2015). User A’s Instagram account (accessed on May 25, 2016). User B’s Instagram account (accessed May 25, 2016).
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Vita A.D. Busyra, “ISIS-Trained Indonesians Ring Alarm Bells”, Jakarta Globe, June 20, 2014, http://jakartaglobe.beritasatu.com/news/isis-trained-indonesians-ring-alarm- bells/ (accessed June 5, 2016). Wickr website, https://www.wickr.com/personal (accessed June 1, 2016). YusufAlBritani personal Twitter account, accessed May 24, 2016. Zahri Yunos , “Putting Cyber Terrorism Into Context”, STAR In-Tech, February 24, 2009.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Interviews Elina Noor, Senior Analyst at the Institute of Strategic and International Studies (ISIS), Malaysia, interview with Author on June 30, 2014, Kuala Lumpur. Royal Malaysian Police (RMP) Official, interview with author on July 26, 2016, Kuala Lumpur. Lectures and Workshops Ahmad el-Muhammady, Lecture at The Content Creators Workshop on Countering the Narrative of Violent Extremism on 19 May 2015 in Kuala Lumpur.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia
Anne Aly, “Focusing Attention on Terrorists’ Audience: A Framework for Developing the Understanding of Extremism and Terrorism Online”, lecture given at the Workshop on Extremism and Terrorism Online: A Multidisciplinary Examination of Current Trends and Challenges, 13 October 2014, Singapore.
https://docs-lawep.s3.us-east-2.amazonaws.com/thematic2f/pw_1/1721911410576.pdf
https://www.searcct.gov.my/wp-content/uploads/2020/03/Terrorists-Use-Of-The-Internet.pdf
Malaysia