Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region

  • Zahri Yunos
  • Rabiah Ahmad
  • Syahrir Mat Ali
  • Solahuddin Shamsuddin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7299)

Abstract

Cyberspace is an attractive medium for computer-savvy generation of terrorists due to its anonymity, psychological impact and also it’s potential to inflict massive damage. There have been numerous studies by researchers in Europe, the Middle East and North America in analyzing the illicit activities and terrorism in cyberspace. However, there are limited studies on similar cases in the Southeast Asian region. This paper presents an exploratory research on illicit activities and terrorism in cyberspace, focusing in the Southeast Asian region. We examined the Web 2.0 media by using an automated collection and analysis tool. Our findings indicate that the Web 2.0 media hosted in the Southeast Asian region supports illicit activities and terrorism in cyberspace such as the spreading of propaganda, recruitment, as well as planning and coordination. Although our findings are still at the preliminary stage, there is a great possibility that the virtual world evolves and plays a critical role in promoting illicit activities and terrorism in cyberspace. Future studies in this area can be conducted, which may lead to the development of better strategy and policy framework to counter cyber terrorism.

Keywords

blogs crawler cyberspace cyber terrorism illicit activities terrorism websites 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bergin, A., Osman, S., Ungerer, C., Mohamed Yasin, N.A.: Countering Internet Radicalisation in Southeast Asia. An RSIS–ASPI Joint Report by S. Rajaratnam School of International Studies and Australian Strategic Policy Institute (2009)Google Scholar
  2. 2.
    Mantel, B.: Terrorism and the Internet. Should Web Sites That Promote Terrorism Be Shut Down? From CQ Researchers, 129–153 (2009)Google Scholar
  3. 3.
    Archaya, A.: Cutting Off the Lifeblood of Terrorism - Despite Some Success in Curbing the Financing of Terrorist Groups, Countries in South East Asia Can Do More. Today We Set You Thinking (2011) (in press)Google Scholar
  4. 4.
    Conway, M.: Reality Bytes: Cyberterrorism and Terrorist ‘Use’ of the Internet. FIRST MONDAY, Journal on the Internet (2002)Google Scholar
  5. 5.
    Chen, H., Chung, W., Qin, Y., Chau, M., Xu, J.J., Wang, G., Zheng, R., Atabakhsh, H.: Crime Data Mining: An Overview and Case Studies. In: Proceedings of the National Conference for Digital Government Research (DG.O Conference), Boston, Massachusetts, USA, pp. 45–48 (2003)Google Scholar
  6. 6.
    Kanon, S.: Israeli Study Shows US a Digital Haven for Terrorists. Israel21c Innovation New Service (2008) (in press) Google Scholar
  7. 7.
    David, M.W., Sakurai, K.: Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity. In: Proceedings of the 17th International Conference on Advanced Information Networking and Applications (2003)Google Scholar
  8. 8.
    Kerr, K.: Putting Cyberterrorism into Context. Published by the Australian Computer Emergency Response Team (2003) (in press)Google Scholar
  9. 9.
    Yunos, Z., Suid, S.H., Ahmad, R., Ismail, Z.: Safeguarding Malaysia’s Critical National Information Infrastructure (CNII) Against Cyber Terrorism: Towards Development of a Policy Framework. In: 2010 IEEE Sixth International Conference on Information Assurance & Security, pp. 21–27 (2010)Google Scholar
  10. 10.
    Farrel, L.: Terrorism and the Internet. In: Speaker during Terrorism and the Internet Workshop 2007, Jakarta Centre for Law Enforcement Cooperation (JCLEC), Semarang, Indonesia (2007)Google Scholar
  11. 11.
    Chen, H., Thoms, S., Fu, T.J.: Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Groups. Forthcoming IEEE International Conference on Intelligence and Security Informatics (2008)Google Scholar
  12. 12.
    Conway, M., McInerney, L.: Jihadi Video & Auto-Radicalisation: Evidence from an Exploratory YouTube Study. School of Law & Government, Dublin City University Glasnevin, Dublin 9, IrelandGoogle Scholar
  13. 13.
    Salem, A., Reid, E., Chen, H.: Content Analysis of Jihadi Extremist Groups’ Videos. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 615–620. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  14. 14.
    Zhang, Y., Zeng, S., Huang, C.N., Fan, L., Yu, X., Dang, Y., Larson, C., Denning, D., Roberts, N., Chen, H.: Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences. In: IEEE International Conference on Intelligence and Security Informatics, pp. 59–64 (2010)Google Scholar
  15. 15.
    Li, X., Mao, W., Zeng, D., Wang, F.: Automatic Construction of Domain Theory for Attack Planning. In: IEEE International Conference on Intelligence and Security Informatics, pp. 65–70 (2010)Google Scholar
  16. 16.
    Fu, T., Abbasi, A., Chen, H.: A Focused Crawler for Dark Web Forums. Journal of the American Society for Information Science and TechnologyGoogle Scholar
  17. 17.
    Chau, M., Qin, J., Zhou, Y., Tseng, C., Chen, H.: SpidersRUs: Automated Development of Vertical Search Engines in Different Domains and Languages. In: Proceedings of the ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL 2005), Denver, Colorado, USA, pp. 110–111 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Zahri Yunos
    • 1
  • Rabiah Ahmad
    • 2
  • Syahrir Mat Ali
    • 1
  • Solahuddin Shamsuddin
    • 1
  1. 1.CyberSecurity MalaysiaSeri KembanganMalaysia
  2. 2.Department of Computer System and Communication, Faculty of Information Technology and CommunicationUniversiti Teknikal Malaysia Melaka (UTeM)Malaysia

Personalised recommendations