Skip to main content

Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region

  • Conference paper
Intelligence and Security Informatics (PAISI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7299))

Included in the following conference series:

Abstract

Cyberspace is an attractive medium for computer-savvy generation of terrorists due to its anonymity, psychological impact and also it’s potential to inflict massive damage. There have been numerous studies by researchers in Europe, the Middle East and North America in analyzing the illicit activities and terrorism in cyberspace. However, there are limited studies on similar cases in the Southeast Asian region. This paper presents an exploratory research on illicit activities and terrorism in cyberspace, focusing in the Southeast Asian region. We examined the Web 2.0 media by using an automated collection and analysis tool. Our findings indicate that the Web 2.0 media hosted in the Southeast Asian region supports illicit activities and terrorism in cyberspace such as the spreading of propaganda, recruitment, as well as planning and coordination. Although our findings are still at the preliminary stage, there is a great possibility that the virtual world evolves and plays a critical role in promoting illicit activities and terrorism in cyberspace. Future studies in this area can be conducted, which may lead to the development of better strategy and policy framework to counter cyber terrorism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bergin, A., Osman, S., Ungerer, C., Mohamed Yasin, N.A.: Countering Internet Radicalisation in Southeast Asia. An RSIS–ASPI Joint Report by S. Rajaratnam School of International Studies and Australian Strategic Policy Institute (2009)

    Google Scholar 

  2. Mantel, B.: Terrorism and the Internet. Should Web Sites That Promote Terrorism Be Shut Down? From CQ Researchers, 129–153 (2009)

    Google Scholar 

  3. Archaya, A.: Cutting Off the Lifeblood of Terrorism - Despite Some Success in Curbing the Financing of Terrorist Groups, Countries in South East Asia Can Do More. Today We Set You Thinking (2011) (in press)

    Google Scholar 

  4. Conway, M.: Reality Bytes: Cyberterrorism and Terrorist ‘Use’ of the Internet. FIRST MONDAY, Journal on the Internet (2002)

    Google Scholar 

  5. Chen, H., Chung, W., Qin, Y., Chau, M., Xu, J.J., Wang, G., Zheng, R., Atabakhsh, H.: Crime Data Mining: An Overview and Case Studies. In: Proceedings of the National Conference for Digital Government Research (DG.O Conference), Boston, Massachusetts, USA, pp. 45–48 (2003)

    Google Scholar 

  6. Kanon, S.: Israeli Study Shows US a Digital Haven for Terrorists. Israel21c Innovation New Service (2008) (in press)

    Google Scholar 

  7. David, M.W., Sakurai, K.: Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity. In: Proceedings of the 17th International Conference on Advanced Information Networking and Applications (2003)

    Google Scholar 

  8. Kerr, K.: Putting Cyberterrorism into Context. Published by the Australian Computer Emergency Response Team (2003) (in press)

    Google Scholar 

  9. Yunos, Z., Suid, S.H., Ahmad, R., Ismail, Z.: Safeguarding Malaysia’s Critical National Information Infrastructure (CNII) Against Cyber Terrorism: Towards Development of a Policy Framework. In: 2010 IEEE Sixth International Conference on Information Assurance & Security, pp. 21–27 (2010)

    Google Scholar 

  10. Farrel, L.: Terrorism and the Internet. In: Speaker during Terrorism and the Internet Workshop 2007, Jakarta Centre for Law Enforcement Cooperation (JCLEC), Semarang, Indonesia (2007)

    Google Scholar 

  11. Chen, H., Thoms, S., Fu, T.J.: Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Groups. Forthcoming IEEE International Conference on Intelligence and Security Informatics (2008)

    Google Scholar 

  12. Conway, M., McInerney, L.: Jihadi Video & Auto-Radicalisation: Evidence from an Exploratory YouTube Study. School of Law & Government, Dublin City University Glasnevin, Dublin 9, Ireland

    Google Scholar 

  13. Salem, A., Reid, E., Chen, H.: Content Analysis of Jihadi Extremist Groups’ Videos. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 615–620. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Zhang, Y., Zeng, S., Huang, C.N., Fan, L., Yu, X., Dang, Y., Larson, C., Denning, D., Roberts, N., Chen, H.: Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences. In: IEEE International Conference on Intelligence and Security Informatics, pp. 59–64 (2010)

    Google Scholar 

  15. Li, X., Mao, W., Zeng, D., Wang, F.: Automatic Construction of Domain Theory for Attack Planning. In: IEEE International Conference on Intelligence and Security Informatics, pp. 65–70 (2010)

    Google Scholar 

  16. Fu, T., Abbasi, A., Chen, H.: A Focused Crawler for Dark Web Forums. Journal of the American Society for Information Science and Technology

    Google Scholar 

  17. Chau, M., Qin, J., Zhou, Y., Tseng, C., Chen, H.: SpidersRUs: Automated Development of Vertical Search Engines in Different Domains and Languages. In: Proceedings of the ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL 2005), Denver, Colorado, USA, pp. 110–111 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yunos, Z., Ahmad, R., Mat Ali, S., Shamsuddin, S. (2012). Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region. In: Chau, M., Wang, G.A., Yue, W.T., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2012. Lecture Notes in Computer Science, vol 7299. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30428-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30428-6_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30427-9

  • Online ISBN: 978-3-642-30428-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics