Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region

Cyberspace is an attractive medium for computer-savvy generation of terrorists due to its anonymity, psychological impact and also it's potential to inflict massive damage. There have been numerous studies by researchers in Europe, the Middle East and North America in analyzing the illicit activities and terrorism in cyberspace. However, there are limited studies on similar cases in the Southeast Asian region. This paper presents an exploratory research on illicit activities and terrorism in cyberspace, focusing in the Southeast Asian region. We examined the Web 2.0 media by using an automated collection and analysis tool. Our findings indicate that the Web 2.0 media hosted in the Southeast Asian region supports illicit activities and terrorism in cyberspace such as the spreading of propaganda, recruitment, as well as planning and coordination. Although our findings are still at the preliminary stage, there is a great possibility that the virtual world evolves and plays a critical role in promoting illicit activities and terrorism in cyberspace. Future studies in this area can be conducted, which may lead to the development of better strategy and policy framework to counter cyber terrorism.

[1]  Maura Conway,et al.  Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet , 2002, First Monday.

[2]  Matthew Warren Terrorism and the Internet , 2007 .

[3]  Rong Zheng,et al.  Crime Data Mining: An Overview and Case Studies , 2003, DG.O.

[4]  Carl J. Ungerer,et al.  Countering internet radicalisation in Southeast Asia , 2009 .

[5]  Li Fan,et al.  Developing a Dark Web collection and infrastructure for computational and social sciences , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.

[6]  Kouichi Sakurai,et al.  Combating cyber terrorism: countering cyber terrorist advantages of surprise and anonymity , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..

[7]  Hsinchun Chen,et al.  Content Analysis of Jihadi Extremist Groups' Videos , 2006, ISI.

[8]  Rabiah Ahmad,et al.  Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework , 2010, 2010 Sixth International Conference on Information Assurance and Security.

[9]  Barbara J Mantel Terrorism and the Internet: Should Web Sites That Promote Terrorism Be Shut Down? , 2011 .

[10]  Hsinchun Chen,et al.  Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.

[11]  Maura Conway,et al.  Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study , 2008, EuroISI.

[12]  Hsinchun Chen,et al.  A focused crawler for Dark Web forums , 2010 .

[13]  Wenji Mao,et al.  Automatic construction of domain theory for attack planning , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.

[14]  Chunju Tseng,et al.  SpidersRUs: automated development of vertical search engines in different domains and languages , 2005, Proceedings of the 5th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL '05).