UTILIZATION OF CYBERSPACE BY TERRORIST GROUPS AND THE APPLICABILITY OF THE MALAYSIAN LAW ON TERRORISM

 

Mohamad Fateh Labanieh,*1  Dr. Sonny Zulhuda2

 

1 Ahmad Ibrahim Kulliyyah (Faculty) of Laws (AIKOL), International Islamic University Malaysia (IIUM), P.O. Box 10, 50728 Kuala Lumpur, Malaysia. Email:  fateh.labanie@gamil.com

2 Asst. Professor, Ahmad Ibrahim Kulliyyah of Laws, International Islamic University Malaysia, P.O. Box 10, 50728 Kuala Lumpur, Malaysia. Email: sonny@iium.edu.my

 

 

 

 

 

 

ABSTRACT

Keywords:

Cyber terrorism; ISIS; Islamic State; Iraq; Syria; Terrorist groups; SOSMA;

 

It is an obvious and undeniable fact, that the cyberspace is become a powerful method which is increasingly and quickly utilized by terrorist organizations to achieve their gruesome and nefarious goals by hitting innocent individuals. This paper has conducted a critical and comprehensive study on the literature review aiming to answer several inquiries about utilization of cyberspace by terrorist groups and the applicability of the Malaysian law on terrorism. The meaning, characteristics and goals of cyber terrorism will be highlighted. Furthermore, this paper will clarify how terrorist groups invade the cyberspace with highlighting on “ISIS” as an example. In addition, this paper will indicate how the Malaysian Law addresses the terrorism. This paper has proved that the terrorist groups become more sophisticated and complex by adopting the cyberspace. Moreover, this paper discloses how terrorist groups exploit the cyberspace. Even if, Malaysian law adopts many measures and precautions to counter terrorism, but, it still needs more efforts to deal with terrorism, by regulating the “Bitcoins”, introducing a clear definition about the meaning of "lethal device” to encompass harm programs and viruses, and distinguishing between clicking “like” or sharing the terrorist items with use explicit words to glorify the terrorism and without use any explicit glorification words. The lawgiver must take into consideration the possession of terrorist items or publications for academic and innocent purposes. Finally, under SOSMA, the power to intercept the communications must be subjected on the judicial oversight and the power of arrest must be based on objective test.

 

 

 Publisher All rights reserved.

 

 

INTRODUCTION

 

The emergence of any modern technology brings negative and positive problems. Cyberspace is not different in that regard. It is undeniable reality that the use of cyberspace is now part and parcel of our lives, we cannot dare to imagine life without cyberspace. However, with all its positive contributions in our lives, cyberspace becomes one of the major sources assists to destruct the societies and civilization. This is due to the fact that cyberspace now is considered an easy and effective instrument which has been utilized by the terrorist groups for carrying out their activities.

 

Use the cyberspace by terrorist groups is an essential transition point from traditional terrorism depends on materialistic means to the modern terrorism relies more on sophisticated and invisible technologies (Furnell, S. M., 1999). In 1980, the cyber terrorism is still theoretical without any perceptible examples. In 1990, the concern of cyber terrorisms increases extensively, and the media concentrates directly on these dangerous issue, the first emergence of cyber terrorisms was in 1998, on Sri Lankan when a group called "Ethnic Tamil Tigers" used cyberspace to attack government websites in order to disrupt and destroy them (Shandra, 2012). In 2007, hackers from Russia launched a cyber-attack to destroy the Estonian government’s websites (Furnell, S. M., 1999).

 

However, in the present time, the cyber terrorism has continued to be more precise and sophisticated because the extremist groups exploit the significant features which are presented by the cyberspace, enable terrorist groups to communicate easily with each other, via cyberspace without any limitations and the leaders and members of these organizations can disseminate their ideologies and radical views to the large numbers of audiences. In addition, cyberspace further assists the terrorist organizations in terms of coordination and planning. Therefore, cyberspace offers not only considerable benefits and advantages to the terrorist organizations but also it creates plenty of challenges and obstacles in front of states for fighting terrorism. (EwËnÉs Ñarab, 2010).  As a result, in this research, we will explain the meaning of cyber terrorisms. In addition, the characteristics and goals of cyber terrorism will be highlighted. Furthermore, the paper will discuss how the terrorist groups invade the cyberspace with giving real examples from the Islamic state (ISIS). Finally, this paper will indicate how the Malaysian law addresses the terrorism.

 

The meaning of cyber terrorisms

 

Cyber-terrorism is defined by the Center for Strategic and International Studies (CSIS) defined cyber-terrorism as “the use of computer network tools to shut down critical national infrastructures (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” (Lewis, J. A, 2002). Another definition of Cyber-terrorism “is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyber-terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss would be examples. Serious attacks against critical
infrastructures could be acts of cyber-terrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not.”
  (Kennedy,P , C., Clubb, G., & Mabon, S, 2015).

 

The characteristic of cyber terrorism

 

1-Cyber terrorism is considered as a new kind of modern war (SafÊr, × 2013). It happens in a quiet environment without use any physical weapons because the attackers carry out their missions behind the screen of computers without disclosure their identity. In addition, it is done without use any kind of force because cyber terrorism relies on a computers with necessary programs.

 

2- Cyber terrorism is very cheap compared with traditional terrorism which imposes on the members to purchase lethal explosives and expensive materials (Goodman, J, C. Kirk, Megan H. Kirk, 2007). In contrast, cyber terrorism is launched by use cheap materials (computer).

3- Cyber terrorism is very easy, it does not require the same degree of efforts which require for achieving the purposes of the traditional terrorism (N. Veerasamy, 2009), because cyber terrorism can be established by individuals who are expert in utilizing the internet and the computer systems.

 

4- Cyber terrorism is a trans-border terrorist crime towards the countries because the attackers can target any state from their places without having to incur the trouble to travel to the location of target. So, it is done either from the same place where the target is located or from different places.

5- The difficulty in proving the cyber terrorism (ÑaÏeah, ’aesar, 2014), because it does not leave any physical evidence, as will the evidence can be easily removed.

 

The goals of cyber terrorism

 

1- To spread the fear and terror among the individuals in different countries by attack the main computer systems which control the vital infrastructures in order to obstruct their works such as electricity transmission networks and nuclear power factories (BawaÉdy, 2006).

 

2- Exposing the integrity and security of society on the risk by disturbing public order (ÑaÏeah, ’aesar,  2014). For example, destroying the vital infrastructures such as oil refineries or bank computer systems.

 

Why the terrorist groups use the cyberspace

 

Propaganda

According to “Ayman al-Zawahiri” who is present head of al-Qaeda, says that “al-Qaeda is in a battle, and more than half of this battle is taking place in the battlefield of the media. And that we are in a media battle in a race for the hearts and minds of our people” ( Barakat, I, 2014). The primary goal for use the cyberspace by terrorist groups is to disseminate the propaganda globally. In general, the propaganda takes plenty of forms such as audios or videos.

 

These forms assist the terrorist organizations to provide not only to their ideological orders but also, to promote their activities in a wide scale (Awan, I, 2014). Also video games which are developed by the terrorist organizations are played an integral part in disseminating a terrorist propaganda, in 2014, “ISIS” had launched an android application called “Dawn of Glad Tidings” The main function of this application is to provide users with breaking news about ISIS activities, its suicide operations and its victories in the battlefield (Siboni, G., Cohen, D,. and Koren, T, 2015). However, luckily, “Google play store” removes this application from its store (FoxNews, 2014).

Furthermore, ISIS seeks to revive its dogma represented in the idea of electronic jihad which aims to spread negative propaganda. So, ISIS creates not only media organizations such as the Dabiq foundation (CBC News, 2015), but also radio station such as “Al Bayan" (Hayward, J, 2015). As a result, the authors think that the terrorist organizations not only strive to control the cyberspace as much as possible but also create an illusion among people and attract them to participate with them.

 

Recruitment

Cyberspace has been utilized by terrorist organizations as a systematic method for controlling the weak minds and recruiting new fighters. Various online platforms have been employed progressively by the terrorist groups in order to achieve this purpose such as chat room or social media (Eshpar, Y., Baram, G., Averbuch, A., Siboni, G., Cohen, D., Rotbart, A., Crosston. 2013).

 

Therefore, the propaganda has been designed by the terrorist organizations with concentrating on the social and economic situation of victims in order to exploit these sentiments as a weapon for recruiting such as sentiments of humiliation, injustice and exclusion (Minei, E., & Matusitz, J., 2012). So, in this point, the authors think that the terrorist propaganda attempts as much as possible to target the marginalized groups by preparing a detailed investigation about the victim in order to know clearly the right way to dominate him and plant a poison inside his mind.

Such one example is, “al-Furqan Institute” and “al-Hayat” have been created by ISIS for recruiting huge numbers of individuals  by releasing speeches and video clips which had translated for more than one langause (Crethiplethi, 2014). In addition, the online video games can be used significantly as a method of recruitment (Weimann, G, 2014). With respect to what we have discussed earlier, the authors believe that ISIS for example adopts systematic and sophisticated tactics for controlling minds and recruiting the international fighters, compared with traditional terrorist organizations because ISIS employs more than one language in its media for recruiting.

 

Incitement and Psychological Warfare

Generally, propaganda is not prohibited in all countries around the world but employment the propaganda by terrorist groups for incitement to commit violence is considered as an unlawful act. Internet has been used widely and significantly by the terrorist groups for the purposes of incitement. Such one example is in 2016, the propaganda machine does not stop at all for incitement the individuals around the world to carry out suicide operations and terrorist operations in other countries. Because the “Wa’ad media institution” which supports ISIS, had released new video called “Fight them, Allah will punish them by your hands” this video encourages the terrorist fighters to launch suicide attacks in London, Berlin and Rome (Dearden. L, 2016).

Moreover, cyberspace plays a fundamental role in use the psychological warfare by spreading horrific videos and images among the individuals around the world (Weimann, G, 2004).

 

For instance, on Mosul in June 10, 2014, ISIS depends on social media to spread fear on a large scope by targeting the hearts of individuals. Therefore, ISIS has issued a horrific video depicts the operation of decapitations, this video is part of the systematic media campaigns to ingrain dread and horrified feelings in the hearts of Iraqi citizens in order to show them what "ISIS" will do if the Iraqi citizens show any kind of resistances (QÉÍtaÉnyÊ, M., QÉÍtaÉnyÊ, M, 2014). In addition, ISIS adopts modern method by use twitter platformm this method called “hashtag” seeks to put pressure on a particular government to succumb to its demands. For instance, when ISIS kidnaps an American journalist in Syria, ISIS uses the hachtag of “StevensHeadInObamasHands” in order to pressurize on President Obama to stop the military operations in Syria (Trowbridge, A, 2014).

 

Financing

According to the terrorist organizations “Money is considered as not only terrorism’s lifeline but also money is the engine of the armed struggle” (Conway, M, 2006). Traditionally, the most significant problem which faces the terrorist organizations is represented in the issue of financial transactions and support. But, in this decade, the ways which are used by terrorist organizations to handle these kind of problems, have been totally changed. 

 

Therefore, the terrorist groups adopt a lot of advanced methods in order to collect money for support their extremist activities (Brantly, A, 2014). Such as, utilizing the online stores offer motivational jihadist materials such as songs, videos, E-books, and various items (Conway, M, 2006). Or by use the dark web “is a collection of thousands of websites that use anonymity tools which help the terrorist organizations in hide their IP address and protect users from surveillance and censorship (Greenberg, A, 2014). Such one example is, ISIS has collected money by accessing to the “DarkWeb” and exercising the illicit trades such as oil, antiquities, and human trafficking (Bertrand, N, 2015).

 

Just for highlighting, there is an assuming that ISIS may support its activities by use an advance way which called “Bitcoin” “is virtual currency, uses through the internet, it is not backed by any country's central bank or government” (Rouse, M, 2013). Because, in 2015, there is secret document had released from a person who supported ISIS, the title of this document was called “Bitcoin and the Jihad handout”, the document was written by “TÉqÊy al-DÊyn al-Mundhir”, this document encouraged the members of ISIS to use the Bitcoin for finance their activities and for the purpose of money laundering  in a safe way without any tracking by the governments, also this document explained how the jihadists can use the Bitcoin in an authoritative way (Al Bar qËw qÊy, M, 2015).

 

As a result, the authors believe that if the terrorist organizations like “ISIS” will use the Bitcoins in the future that will be a very strong “weapon” because this method will give them capabilities to support their missions outside the financial government records. So, it is suggested that the Malaysian governments should intervene quickly in order to regulate the “Bitcoins” and take a security measures.

 

Furthermore, one of the modern method which is adopted dramatically, is called the “Hawala network” as “an alternative or parallel remittance system” (Patrick M. Jost, Harjit Singh Sandhu, 2003), this system not only is existed and operated outside the governmental control but also, it is based on communication systems such as phone, fax, or email among either the members of Hawala dealers or the members of Hawaladars (Drifter, 2004). For example, al Qaeda utilized the Hawala system prior its attack against the United States in 11 September 2000 by transferring huge amount of money to different accounts (Faith, D, 2011).

The authors in this point argue that “Hawala network” has been adopted by the terrorist organizations significantly due to its important features such as the difficulty of tracking or monitoring by the competent authorities as well this system is very cheap and trusted. So, it is suggested that the competent authorities must take preventive measures to monitor and control this method.

 

In addition, regardless of the modern methods, the terrorist organizations have a bad history in exploiting charities as a method of fundraising (Baron, B. F., 2004). They employ charities which appear like legitimate organizations with legitimate purposes such as collecting funds for humanitarian purposes “the Syrian case” but in reality, these charities will strive to achieve illicit purposes. Such one example is, Shafi al-Ajmi who is arrested by a Kuwaiti government, because he collected funds for ISIS under the name of charitable acts (Janine Di, Leah, and Damien, 2014).In this case, the authors believe that the individuals must be more aware and attentive because terrorist organizations attempt to take advantage from the obligations of Muslims towards Allah in terms of giving donations.

 

Planning, intelligence, coordinating and training

Cyberspace is employed by terrorist organizations for planning to launch terrorist operations and intelligence purposes. Commonly, it is used to identify and obtain significant information about the best ways for attacking the targets (Edelman, J, 2014). For instance, a man had been arrested by the Australian authorities because he utilized Web sites related to the Australian government in order to collect information (maps and data) about the potential targets (Theohary, C, A, 2011). Or by use the applications such as “Google map” which provides sufficient and detailed data about the location of potential targets (Harding, T, 2007). In addition, through social media such as Twitter, Facebook and LinkedIn, the terrorist organizations can gather a personal and unique information about the person who will be targeted by them in the future (Ñarab, Y, 2010).

 

As well as, cyberspace plays an essential role in coordinating between the terrorist members, for instance, in 2015 after Paris attack, that killed 129 people and wounded more than 100, there is a supposition that the members of ISIS had used a device called “play station 4” and through the online game called “call of duty” they planned and coordinated to their suicide attak without writing or uttering any single word because ISISs members communicate with each others by shooting the bullets at the wall for writing their massages (Halkon, R, 2015). 

 

Generally, terrorist groups and particulary ISIS are adopted videos games as a method for training and preparing the new jihadists to the battlefield, such one example is a game called “Jihad Simulator” offers information about the mechanism of building bomb and how the jihadists can drive truck in easy way (Gabi, S., Daniel, Cohen. & Rotbart, A, 2015). Moreover, in the cyberspace there are a lot of jihadist websites which provide videos, audios and E-magazine with more than one language teach the Jihadists how they can launch suicide attacks cause a large number of casualties and how they can encrypt their communications (Andrew, J, A., 2002).

 

From this perspective, the authors believe that the path of terrorism has become very easy, because the important features which are offered by the cyberspace, facilitate the terrorist operations. So, the authors argue that the international governments in general and the Malaysian government particularly must take bold steps in order to monitor and stop use the cyberspace by the terrorist groups for achieving terrorist activities.

 

Cyberattack

Previously, the terrorist organisations do not have enough cappabilities and resources to launch cyberattack but in recent years, the threat of terrorist organizations has increased dramatically. this threat starts to be real after issuing a report assumes that “ISIS” had moved to the next stage of terrorism by adopting the cyberspace which will give ISIS the ablilities to launch cyber-attack on the vital infrastructures such as air ports, train staions and other vital companies (QÉÍtaÉnyÊ, M., QÉÍtaÉnyÊ, M, 2014). As well as, according to ISIS, cyber-attack brings significant results are embodied by damaging the vital infrastructures of the states, modifying or removing the important data and preventing the authorized users to access to their personal information (WazaÉrt Al ’wqaÉf Al SwËrehÊ, 2014).

Even if, there are a lot of examples about cyber-attacks are done by ISIS, but these attacks still classified as weak attacks because the lack of experiences. Such one example is, ISIS creates a group called “Cyber Caliphate”, it considered as a right hand for ISIS in the cyberspace, this group attacks the Malaysia Airlines website and disseminates ridiculous phrases such as “ISIS will prevail ”, “404-Plane not found” ( Hill, G., 2015). In 2015, YouTube and Twitter accounts of the the Central Command of the US Army are hacked by the ISIS "cyber-jihadists" which stealing confidential information such as email addresses and phone numbers of the employees at the American military (Lamothe, D., 2015).

The authors consider that according to the worldwide opinion, ISIS is similar than a black plague in terms of a degree of hazard and lethality. So, it is suggested that the governments around the world must cooperate with each other in order to protect their infrastructures because the terrorist organizations in the future will not only fight without firing any bullet but also will strive to attack vital targets rather than weak targets by recruiting and hiring the specialist individuals in computer systems. In addition, because cyber-attack achieves the goals of the terrorist groups with less cost.

 

HOW MALAYSIAN LAW ADDRESSES

THE TERRORISM

 

Protecting public safety is considered as an initial priority in the Malaysia’s transformation agenda for becoming a superior nation. Therefore, the Malaysian government has being made formidable endeavors which are embodied not only to protect the public safety but also to prevent any danger or harm on its public (Simon, W, 2014). So, anything which can be made by the competent authority in order to stop the hazards on the public can be considered as a useful action for guaranteeing the protection of the public safety.

 

As a result, in order to achieve this purpose, Malaysian government starts with the “ISA” (The Internal Security Act 1960) contains a lot of imperfections compared with its advantages, in 2012, “ISA” was abolished by applying “SOSMA” the “Special Offences (Special Measures) Act

The main significance in “SOSMA”, is that the minister has no more authority to detain the persons because this power has been moved to the court in order to ensure that this power will be applied in a fair way without arbitrary practices from the side of the executive authorities (Dhanapal, S., Sabaruddin, J. S., 2015).

 

Regardless of “SOSMA”, the Malaysian government has issued a crucial and new amendment of the Malaysian Penal Code 574 which deals with the increased threats against the nation security (public safety), comprises two chapters, the first chapter VI (offences against the State) starts from sections 121 to 130A, the second chapter VIA (Offences relating to terrorism) starts from sections 130B to 130T.

 

So, this part will focus on the procedural part of detention under (SOSMA). As well as, the substantive part of penal code 574 will be discussed critically by selecting the related articles which are applied by the Malaysian authority for fighting the terrorism and prevent exploiting the cyberspace by the terrorist groups.

 

The procedural part (SOSMA)

 

SOSMA has been divided into eight parts.  But as we mentioned previously the authors will select the related articles in order to give an overview about the arresting mechanism under this law. Initially part I, section (2) stipulates that SOSMA shall be applied to any security offences which are mentioned in VI (offences against the State) and VIA (Offences relating to terrorism) of the Penal Code 574.  According to (S/4) a police officer has a right to detain or arrest a suspect if a police officer has a reason to believe that this person is involved in any security offences. However, for the purpose of investigation, the period of arresting is only for 24 hours (S4/4) but this period can be extended until 28 days by the police officer or above the rank of superintendent (Section 4/5).

 

According to the authors, the state must have a wide and strong powers in order to face the "Black danger" represented in terrorism and protect not only its security but also its integrity. However, the authors criticize that the power to arrest is based on subjective test rather than objective test because the arrest under SOSMA needs only the reason from the side of the police officer to think that the person is implicated in any kinds of security offences without any physical evidence. So, it is suggested that the detention must be based on objective test in order to ensure that this law will not be applied as a tool of oppression and infringement the rights of citizens.

 

In addition, the police officer has an opportunity to decide whether the detention is necessary or not, but if the police officer decides that the detention is not necessary, the suspect will be released after attaching the electronic monitoring device on him. (S4/6) In contrast, if the police officer or above the rank of superintendent has decided to remain the suspect in detention for up to 28 days, this detention must be reconsidered every five years unless a resolution is passed by both Houses of Parliament in order to extend the period of operation of the provision. (S4/11). (S5/1/A) and ( S5/1/B) stipulate that When an individual is detained by police man, the police man must immediately inform his relatives "the next-of-kin" about the issue of detention, as well the suspect still has a right to consult not only a legal practitioner but also he has a right to select legal practitioner. The authors argue in this point that this article aims to protect the public safety rather than suppression the people because the suspect still has a power to exercise his rights. Furthermore, the police officer must inform the suspect as soon as possible about the reasons of arrest (S 4/2).

 

The police officer has ability to intercept the communications of the suspect for the purpose of investigation, if the police officer thinks that these communications will contain any kind of information which relate to the commission of a security offence (Article II/S6). The Public Prosecutor has authority to require from the communications service provider to retain a particular communication, intercept a communication, and require from the police officer to enter the premises and install a device on the premises for assisting him to gather important information only if the Public Prosecutor has thought that these communications will include any kind of information relating to the commission of a security offence (S6/2).

 

In this point, the authors believe that the power to intercept the communication must be subjected on the judicial oversight because the public prosecutor who believes that the interception is likely to include information relating to a security offence, can use his authority arbitrarily for interception without obtaining any permission from a judicial officer. So, the authors think that the competent authorities must seek to achieve equilibrium between respecting the privacy and protecting the public interest. So it is suggested that the interception of communication must be under the judicial oversight.

 

Moreover, the authors want to highlight on a hotly debated issue “tensions between safety and privacy" between Apple VS FBI (Calmaur, K, 2016). In accordance with the facts, FBI requires the helping of Apple Company in order to access and decrypt the suspect’s phone “Syed Rizwan Farook” who is a one of the shooters in the San Bernardino attacks (Ahmed, S, 2015). It is noted by the authors that this matter may be regarded as the worst dilemma in 21 century. However, the authors strive to build their opinions according to the "public interest" because they believe that there is an urgent necessity for making an equilibrium between the discordant rights protecting the "public interest" and protecting the privacy. The authors consider that this goal may be achieved by giving priority to the public interest over private interest with applying some precautionary measures to make sure that the privacy rights will not be violated repeatedly. As well as, in order to support this opinion, there is a survey which has done by the “Pew Research Centre”, the result of survey indicates that “51%” of respondents support the efforts which require from Apple to give its assisting to the FBI in order to unlock the iPhone. However, "38%" of participants reject this idea and the rest abstained (Leswing, K, 2016).

The court has a right to determine the period of attaching the electronic monitoring device. As well as, this period must not exceed the remainder of the twenty-eight day period from the date of detention (Part III: S7/1). Also, the security offences shall be subjected to the High Court (Part V).

Part VII, (S24) under SOSMA the court can accept the documents which are confiscated not only in the course of an investigation but also during the raid (S20). As well as, (S24, S25) accept the information which is gathered during the interception of communications or any documents produced by the computer. The authors noted that this article is comprehensive because it covers not only the concrete evidence but also the intangible evidence for example the E-document. Finally, according to the authors that “SOSMA” concentrates on both the deterrence and sanctions, and it still needs a few improvement in order to avoid the tyrannical and arbitrary use.

 

The substantive part (Penal code 574 chapter VIA- Offences relating to terrorism)

 

In Malaysia, there is no specific law regulates the cyber terrorism. However, according to Chapter VIA Section 130B (3) (H) of Penal code:

 

 “An act or threat of action falls within this subsection if it— (h) is designed or intended to disrupt or seriously interfere with, any computer systems or the provision of any services directly related to communications infrastructure, banking or financial services, utilities, transportation or other essential infrastructure”

 

So, in chapter VIA Section 130B (3), the Malaysian law determines the acts or threats which amount to be as terrorist acts. However, particularly from the spirit of the article 130B (3) (H) we can see that the Malaysian law is very precise by taking into consideration the acts of cyber-terrorism. Therefore, from what we discussed above, we can conclude that the Malaysian penal code 574 has addressed the act of cyber terrorism.

According to Section 130D:

 

Providing devices to terrorist groups. Whoever knowingly provides or offers to provide any explosive or other lethal device to (a) a terrorist group;(b) a member of a terrorist group; or (c) any other person for use by, or for the benefit of, or terrorist group or a member of a terrorist group, shall be punished with imprisonment for life or imprisonment for a term not exceeding thirty years, and shall also be liable to fine”

 

The Malaysian legislator is inclusive and transparent in terms of considering the acts of supplying explosives or lethal devices to any terrorist member or group or for the benefit terrorist member or group as terrorist acts which amount to be punishable by the law. On the contrary, the authors think that the legislator is not clear because he only covers the explosives and lethal devices without giving any explanation about an important issue related to supply harm programs or viruses or malware in order to launch cyber-terrorism harms or disrupts the vital infrastructure and kills the innocent humans. So, the authors wonder whether the Malware or viruses are covered under this article?, and the authors insist on the necessity that the legislator must  give clear definition about the "lethal device" in order to encompass harm programs, viruses and malwares. According to section 130E,

 

 Recruiting persons to be members of terrorist groups or to participate in terrorist acts. Whoever knowingly recruits, or agrees to recruit, another person to be a member of a terrorist group or to participate in the commission of a terrorist act shall be punished with imprisonment for a term which may extend to thirty years, and shall also be liable to fine”.

 

This article penalizes the act seeks to recruit the individual who becomes a member of terrorist organization or participates in any terrorist act if some conditions are fulfilled, the person is knowingly recruited or he accepts the recruiting. In addition, the authors wonder whether this article can be applied to any kind of recruiting methods such as use the social media networks (Facebook or twitter) or cyberspace. So it is suggested that the Malaysian legislator must take into consideration the importance of this issue. As well as, the Malaysian legislator is right in terms of imposing large punishment to these kind of acts. Because this punishment will play an important role in deterring individuals to commit like these acts.

 

In case of Public prosecutor V Atik hussin bin abu bakar, the court held that the one of suspects is charged under section 130E and 130K of the Penal Code for recruiting persons to participate of terrorist groups and for hiding persons who are committing terrorist acts. In addition, the five other accused are charged under section 130KA while the rest of them are charged under section 130K read with section 511 of the Penal Code. (Sario, R, 2013)  In section 130F:

 

“Providing training and instruction to terrorist groups and persons committing terrrorist acts.Whoever knowingly provides training or instruction, or agrees to provide training or instruction (a) in the making or use of any explosives or other lethal device; (b) in carrying out a terrorist act; or (c) in the practice of military exercises or movements, to a member of a terrorist group or a person engaging in, or preparing to engage in, the commission of a terrorist act shall be punished with imprisonment for a term which may extend to thirty years, and shall also be liable to fine.”

 

And section 130FA says,

 

“Receiving training and instruction from terrorist groups and persons committing terrorist acts. Whoever receives training or instruction, or agrees or arranges to receive training or instruction (a) in the making or use of any explosive or other lethal device; (b) in carrying out a terrorist act; or (c) in the practice of military exercises or movements, from a member of a terrorist group or a person engaging in, or preparing to engage in, the commission of a terrorist act shall be punished with imprisonment for a term which may extend to thirty years, and shall also be liable to fine”

 

In both articles (130F, 130FA), the Malaysian legislator only takes into consideration the issue of providing physical training or giving tangible instructions. However, the authors wonder whether the issue of providing or receiving the training and instructions which are done through the cyberspace, are covered by these articles. Therefore, it is suggested that these articles must be inclusive and clear by covering the matters of providing or receiving the training and instruction by use the cyberspace. Also, the lawgiver should provide a precise definition of the term of "lethal device" in order to include harm program, malware and various. As well as, there is no doubt that the Malaysian legislator is very strict in terms of giving a long punishment which helps in reducing these kind of activities. According to the section 130G provides,

 

“Inciting, promoting or soliciting property for the commission of terrorist acts. Whoever knowingly-- (a) incites or promotes the commission of a terrorist act; (b) incites or promotes membership in a terrorist group; or (c) solicits property for the benefit of a terrorist group or for the commission of a terrorist act, shall be punished with imprisonment for a term which may extend to thirty years, and shall also be liable to fine”

 

 The lawmaker is very accurate because he seeks to penalize the acts which motivate and incite for commission of terrorist acts. However, the writer think that the Malaysian law is still very shy form highlighting on a significant and hot issue plays a pivotal role in reducing the phenomenon of terrorism. Because this article condones the emotional side which produces a lot of negative effects. According to the authors, the emotional side is considered as the first step in the dark road toward terrorism. So, the authors wonder about the controversial question whether the person who is only clicking "like" button or sharing the terrorist videos or photos in the social media or in cyberspace without showing any kind of glorification to the terrorism or terrorist acts, is his acts will be classified under the acts of inciting, promoting or soliciting for the commission of terrorist acts or not?

 

Therefore, it is noted that these acts shall not be considered as inciting, promoting or soliciting and glorification of terrorist acts because the Malaysian law must distinguish between the case of  direct and explicit support through the explicit words which are used by the person during clicking "like" button or sharing these terrorist videos or photos and the case of clicking "like" button or sharing these terrorist videos or photos without showing any kind of the emotional supports which are embodied through the explicit words of glorification the terrorism.

 

In case of PP v. Yazid Sufaat, Halimah Hussein and Muhammad Hilim Hasim [2014] 2 CLJ 670,  the court held that the Yazid will be charged for promoting an act of terrorism and that act was considered as being intended as a threat to the members of the public in Syria under the Penal Code section 130G (a). And Muhammad Hilmi and Halimah Hussin will be charged for incitement with Yazid. According to section 130J says that,

 

“Soliciting or giving support to terrorist groups or for the commission of terrorist acts. (1) Whoever knowingly and in any manner solicits support for, or gives support to (a) any terrorist group; or (b) the commission of a terrorist act, shall be punished with imprisonment for life or imprisonment for a term not exceeding thirty years, or with fine, and shall also be liable to forfeiture of any property used or intended to be used in connection with the commission of the offence. (2) For the purpose of subsection (1), "support" includes (a) an offer to provide, or the provision of, forged or falsified travel documents to a member of a terrorist group; (b) an offer to provide, or the provision of, a skill or an expertise for the benefit of, at the direction of or in association with a terrorist group; (c) entering or remaining in any country for the benefit of, or at the direction of or in association with a terrorist group (d) becoming a member of a professing membership of a terrorist group; (e) arranging, managing or assisting in arranging or managing a meeting to further the activities of a terrorist group; (f) using or possessing property for the purpose of committing or facilitating the commission of a terrorist act;(g) accumulating, stockpiling or otherwise keeping firearms, explosives, ammunition, poisons or weapons to further the activities of a terrorist group; (h) arranging, managing or assisting in arranging or managing the transportation of persons to further the activities of a terrorist group; (i) travelling to, entering or remaining in any foreign country to further the activities of a terrorist group or to commit a terrorist act;(j) encouraging or inducing any person to leave Malaysia to further the activities of a terrorist group or to commit a terrorist act; or (k) using social media or any other means to (i) advocate for or to promote a terrorist group, support for a terrorist group or the commission of a terrorist act; or (ii) further or facilitate the activities of a terrorist group”.

 

The authors argue that the Malaysian legislator sees from the wide angle in terms of soliciting or giving support to terrorist groups or for the commission of terrorist because, regardless of the importance of this article in terms of counter-terrorism, the authors want to highlight particularly on the paragraph (K), this article plays a pivotal and an essential role in deterring either the terrorist members or their sympathizers from use the cyberspace in order to promote for terrorist activities. Furthermore, in this article the Malaysian lawmaker is very inclusive because it covers directly the social media and indirectly the "other means" such as charity foundation and cyberspace. Therefore, it is noted that the lawgiver has used flexible and thorough term instead of restricted and specific terminology in order to ensure covering every means which assist the terrorist organizations for achieving their terrorist purposes.

 

Four international individuals and one Malaysian citizen are detained because of joining the terrorist group and planning of recruitment the jihadists and sending them to fight beside the ISIS in Syria. As well as, one of the suspects is pledged loyalty via Facebook to the leader of ISIS in Syria (Abu Bakar al-Baghdadi). Therefore, the competent authorities convict them under the Chapter VIA on Act 574 Penal Code and the investigation procedures subject to SOSMA act. (borneo , 2015)

In section 130JB says that,

 

“Possession, etc. of items associated with terrorist groups or terrorist acts. (1) Whoever, (a) has possession, custody or control of; or (b) provides, displays, distributes or sells, any item associated with any terrorist group or the commission of a terrorist act shall be punished with imprisonment for a term not exceeding seven years, or with fine, and shall also be liable to forfeiture of any such item. (2) In this section “item” includes publications, visual recordings, flags, banners, emblems, insignia and any other thing displaying symbols associated with a terrorist group, terrorist act or ideology of a terrorist group; “publications” includes all written, pictorial or printed matter, and everything of a nature similar to written or printed matter, whether or not containing any visible representation, or by its form, shape or in any other manner capable of suggesting words or ideas, or an audio recording and every copy, translation and reproduction or substantial translation or reproduction in part or in whole thereof”.

 

This article has shown the desire of the Malaysian legislator to prevent the phenomenon of extremism because in this article he is totally comprehensive in terms of giving an accurate and full definitions for the word “items” and “publications” which include not only the physical publications but also the electronic publications that can be obtained via the Internet by downloading these items such one example is (terrorist logo, video, audio and E-document). However, in terms of possession, the authors wonder whether the lawgiver takes into consideration the intention of the possessor who holds terrorist items. Because there are many situations in which the possessor holds these terrorist items for innocent or academic purposes. It is suggested that this section must be more flexible instead of strict especially for those who hold these items by mistake or for academic purposes.   

 

In case of Mohd zidi Said, the court held that the suspect is guilty because he has a photo of Islamic State's flag of "ISIS” in his phone. So, he is charged under Section 130JB (1/a) (Bernama, 2015).

 

In case of Ahmad Kamil Ghazali, the court held that according to Section 130 JB (1)(A) of the Penal Code, he is guilty because he has possessed terrorist E-documents which have been downloaded from the internet (Gunaratnam, S., 2016). In section 130O,

 

Providing services for terrorist purposes.(1) Whoever, directly or indirectly, provides or makes available financial services or facilities (a) intending that the services or facilities be used, or knowing or having reasonable grounds to believe that the services or facilities will be used, in whole or in part, for the purpose of committing or facilitating the commission of a terrorist act, or for the purpose of benefiting any person who is committing or facilitating the commission of a terrorist act; or (b) knowing or having reasonable grounds to believe that, in whole or in part, the services or facilities will be used by or will benefit any terrorist, terrorist entity or terrorist group, shall be punished (aa) if the act results in death, with death; and(bb) in any other case, with imprisonment for a term of not less than seven years but not exceeding thirty years, and shall also be liable to fine.”

 

The Malaysian lawgiver has mentioned explicitly in this article about the direct and indirect providing services which are based on reasonable grounds of suspicion that these services will be used to carry out a terrorist act, would amount to be a punishable offense, such as providing financial support. The authors agree, that the Malaysian lawmaker is seen from a wide angle without any limitations in terms of “providing financial services or facilities" because he also encompasses the providing aid or services from the side of lawyer or accountants acting as nominees or agents for their clients.

 

 

CONCLUSION, FINDINGS AND

 RECOMMENDATIONS

 

There is no doubt that terrorism has become a major obstacle in front of both the developed and developing countries in terms of ensuring the safety of their citizens. As well as, we can see clearly that the terrorism has entered more advanced and complex stages in contrast Malaysian law still need more efforts in order to fight this serious threat because the precautionary and preventive measures which had been adopted did not achieve the appropriate level of requirements for fighting the terrorism.

This paper finds that the terrorist groups have become an annoying obsession for all states around the world in which they have become an easy target for these groups which can exercise their terrorist activities from anywhere in the world through the internet. In addition, this paper highlights that cyberspace provides not only a lot of features but also the extremist organizations seek deliberately to create websites or pages on the internet as a part of their media campaigns in order to disseminate their harm ideologies and principles.

 

As well as, this paper finds that the terrorist organizations like “ISIS” utilize the audio-visual technologies widely and cyberspace has been used dramatically by the terrorist groups for many purposes such as intelligence, planning, coordinating, recruitment, inciting, and psychological warfare.

 

This paper discloses that “ISIS” maybe in the future will not only fight without firing any bullet but also will strive to attack vital targets due to it has enough money and capability to recruit the experts. Also, this paper shows that “ISIS” adopts systematic and sophisticated tactics for controlling minds and recruiting the international fighters compared with traditional methods by employing more than one language in spreading its propaganda.

 

This paper mentions that the cyberspace has been adopted as a tool by the terrorist groups to fund their activities and collect donation such as use “Dark web”. As well as the “charity foundations have been used in a bad way by the terrorist groups. This paper discovers that “Hawla Network” has been harnessed spectacularly by the terrorist groups due to its significant features such as the difficulty of tracking, monitoring and cheapness.  Also, this paper shows specifically that ISIS adopts the same traditional methods which are followed by the other terrorist organizations for finance operations with highlighting on a strong and dangerous presumption shows that ISIS will use the “Bitcoin” in the future.

As well as, this paper discloses that even if the SOSMA and Penal Code 574 in somehow are totally perfect and comprehensive but from the other angle, they still need more efforts and amendments in order to keep up with the wheel of evolution for dealing with terrorism. This paper indicates not only that the new amendment of penal code 574 has addressed the cyber terrorism but also the power of arrest under SOSMA is based on subjective test as well the interception of communication is done without judicial oversight . Also, this paper highlights that the Malaysian law is still silent in terms of regulating the issue of “Bitcoin”. Also, Section 130F and 130FA take into consideration only the issue of providing physical training or giving tangible instructions rather than providing training and instructions via cyberspace. Section 130E does not mention anything whether the issue of recruiting via cyberspace will be covered or not.

 

Section 130JB is totally comprehensive in terms of giving an accurate and full definition for the word “items” and “publications” which include the physical publications and electronic publications on the contrary, the lawgiver does not mention anything about the intention of the possessor whether he holds these items or publications for innocent or academic purposes. This paper shows that in section130J (2/K) the lawgiver has utilized elastic and inclusive terminologies such as the “other means” rather than restricted terminologies in order to cover the activities of terrorist groups in both the real and virtual life.

 

Finally, some recommendations will be introduced by the authors, fighting against the terrorism is considered as a new war requires international cooperation among the countries around the world. The private and public sectors in Malaysia must cooperate widely for fighting this dangerous threat. The Malaysian government must adopt the same “weapons” to counter the modern terrorist groups like "ISIS" by hiring the individuals in this war through imposing an obligation on the individuals to give reports for any terrorist page or website which exists in the cyberspace, offers or promotes any support to the terrorist groups. The Malaysian authorities must take bold steps to monitor and restrict the terrorist activities in the cyberspace.

 

The Malaysian authority must attempt as much as possible to increase its preventive measures to repel any potential cyber-attack affects negatively on the vital infrastructures. As well as the competent authorities in Malaysia must increase the number of the awareness campaigns in order to educate the citizens how they can protect themselves from falling into the trap of terrorism through activating the role of the mosque and the family which play an essential part not only in warning to the seriousness of terrorism but also in striving to strengthen the religious faith. The individuals must be more aware when they give donations to the charity foundations because the terrorist organizations attempt to exploit the obligations of Muslims toward Allah. Under “SOSMA” the power to intercept the communications must be subjected to the judicial oversight to avoid the arbitrary use.

 

Moreover, under SOSMA, the power of arrest must be based on an objective test rather than subjective. The Malaysian legislator in the penal code 574 must give clear definition about the "lethal device" in order to encompass the harm programs, viruses, and Malware. Malaysian law must take preventive measures for regulating the “Bitcoins” and monitoring the “Hawala Network”. Also, section 130E must encompass the issue of recruiting by use cyberspace and section 130F and 130FA must be more precise in terms of covering the matters of providing or receiving the training and instruction via cyberspace.

 

 In section 130JB the lawgiver must avoid the generalizing and strictness by taking into consideration the difference between the possession of terrorist items or publications for innocent or academic purposes and for bad purposes. Finally, in section 130J(K), the lawgiver must distinguish between the case of clicking "like" or sharing the terrorist items with use explicit words to glorify the terrorism and the case of clicking "like" or sharing terrorist items without use explicit words to glorify the terrorism.

 

 

 

REFERENCES

Awan, I. (2014). Debating the Term Cyber-terrorism: issues and problems. Internet Journal of Criminology. ISSN 2045 6743. Pp. 1-14.

 

Ahmed, S. (2015). Who were Syed Rizwan Farook and Tashfeen Malik?. CNN. <http://edition.cnn.com/2015/12/03/us/syed-farook-tashfeen-malik-mass-shooting-profile>. Accessed on: 25/3/2016

 

Al Bar qËw qÊy, M. (2015). bÊytkËwen wa al dyÊnal al dhÉhabËy hal yandÉmj daÉÑsh fÊy al mËjtamÑ al dËwaly?. Masr alarabia. <http://www.masralarabia.com Accessed on: 27/2/2016

 

Brantly, A. (2014). Financing terror bit by bit. Compating terrorism center.    <https://www.ctc.usma.edu/posts/financing-terror-bit-by-bit>. Accessed on: 14/3/2016

 

Bernama. (2015). Soldier gets 7 months' jail for IS image on mobile phone. malaysia kini. <https://www.malaysiakini.com/news/316470>. Accessed on: 4-3- 2016.

 

Bertrand, N. (2015). ISIS is taking full advantage of the darkest corners of the internet. Business insider. <http://www.businessinsider.my/isis-is-using-the-dark-web-2015-7/? r=US&IR=T#Xg01BPcbqoY4EWqA.97>. Accessed on: 27/2/2016

 

Borneo. (2015). Five individuals nabbed for terrorism activities. The Borneo Post. <http://www.theborneopost.com/2015/12/06/five-individuals-nabbed-for-terrorism-activities/#ixzz429HY8dlS>. Accessed on: 24/3/2016

 

Baron, B. F. (2004). Deterring donors: Anti-terrorist financing rules and American philanthropy. International Journal of Not-for-Profit Law. Vol. 6. No.2. Pp.1-32.

 

Barakat,I. (2014). IS: Islamic social media state of mind. Alaraby. <https://www.alaraby.co.uk/english/politics/2014/11/15/is-islamic-social-media-state-of-mind>. Accessed on: 12/3/2016.

 

BawaÉdy, ×. (2006). ÑrhaÉb al alaÑntarnt al khaÏar al qaÉdÊm. daÉr maÎyr. ÏabÑa al ÑËwlaÉ.

 

CBC News. (2015). ISIS has a magazine - what we can learn from Dabiq: Top Stories. CBC News.  <http://www.cbc.ca/news/canada/hamilton/news/isis-has-a-magazine-what-we-can-learn-from-dabiq-top-stories-1.3336005>. Accessed on: 24/2/2016

 

Calmaur, K. (2016). Apple vs. the. FBI. The Atlantic. <http://www.theatlantic.com/national/archive/2016/02/apple-fbi-san-bernardino/463128>. Accessed on: 21/3/2016

 

Crethiplethi. (2014). ISIS’s Propaganda Machine. Crethiplethi. < http://www.crethiplethi.com/isis-s-propaganda-machine/islamic-countries/syria-islamic-countries/2015/>. Accessed on: 14/3/2016

 

Conway, M. (2006). Terrorism and the Internet: new media—new threat?. Parliamentary Affairs. Vol. 59. No. 2. Pp. 283-298.       

 

Drifter. (2004). Modern Hawala. How to vanish. <http://www.howtovanish.com/2009/09/modern-hawala>. Accessed on: 15/2/2016

 

Dearden. L. (2016). Isis supporters threaten UK with terror attacks in new propaganda video. independent. <http://www.independent.co.uk/news/uk/home-news/isis-supporters-threaten-london-with-terror-attacks-in-new-propaganda-video-a6969006.html>. Accessed on:4-6-2016

 

Dhanapal, S., Sabaruddin, J. S. (2015). Rule of law an initial analysis of security offences (Special Measures) Act (SOSMA) 2012. IIUM Law Journal. Vol.23. No. 1. Pp. 1-29

 

Eshpar, Y., Baram, G., Averbuch, A., Siboni, G., Cohen, D., Rotbart, A., Crosston. (2013). the Threat of Terrorist Organizations in Cyberspace. Military and Strategic Affairs.  Vol. 5. No. 3, 2013, pp. 127-144

Edelman, J. (2014). How Social Media is Being Used for Terrorism. Site pro news. <http://www.sitepronews.com/2014/09/22/social-media-used-terrorism>. Accessed on: 12/2/2016.

 

Faith, D. C. (2011). The hawala system. Global Security Studies. Vol. 2. No. 1. Pp. 24-33

 

Fox News. (2014). Google Play store reportedly removes ISIS app. Fox News.  <http://www.foxnews.com/tech/2014/06/19/google-play-store-removes-isis-app.html>. Accessed on: 23/2/2016.

 

Furnell, S. M., & Warren, M. J. (1999). Computer hacking and cyber terrorism: The real threats in the new millennium?. Computers & Security. Vol. 18. No. 1. Pp. 28-34

 

Goodman, S. E., Kirk, J. C., & Kirk, M. H. (2007). Cyberspace as a medium for terrorists. Technological Forecasting and Social Change. Vol. 74. No. 2. Pp. 193-210.

 

Gunaratnam, S. (2016). Court reminds Malaysians to desist IS during ex-govt servant's sentencing. New straits.<http://www.nst.com.my/news/2016/03/135132/court-reminds-malaysians-desist-during-ex-govt-servants-sentencing>. Accessed on: 4-3-2016

 

Greenberg, A. (2014). Hacher lexicon what is the dark web?. Wired.  <http://www.wired.com/2014/11/hacker-lexicon-whats-dark-web>. Accessed on: 12/3/2016

 

Hill, G. (2015). Cyber Caliphate Attacks Malaysia Airlines Website. Security today. <https://securitytoday.com/articles/2015/01/26/cyber-caliphate-attacks-malaysia-airlines-website.aspx?admgarea=ht.airport>. Accessed on: 27/2/2016

 

Hayward, J. (2015). Mystery Gunmen Attack ISIS Radio Station in Mosul. breitbart. <http://www.breitbart.com/national-security/2015/08/31/mystery-gunmen-attack-isis-radio-station-in-mosul/>. Accessed on: 19/3/2016

 

Harding, T. (2007). Terrorist use Google map to hit UK troops. Telegraph. <http://www.telegraph.co.uk/news/worldnews/1539401/Terrorists-use-Google-maps-to-hit-UK-troops.html>. Accessed on: 19/3/2016

 

Halkon, R. (2015). Paris attacks: ISIS terrorists may have used PlayStation 4s to plot atrocities. Mirror.  <http://www.mirror.co.uk/news/world-news/paris-attacks-isis-terrorists-used-6836462>. Accessed on: 22/3/2016

 

Jost, P. M., & Sandhu, H. S. (2003). The hawala alternative remittance system and its role in money laundering. Interpol. the Financial Crimes Enforcement Network in cooperation with INTERPOL/FOPAC

 

Kennedy - Pipe, C., Clubb, G., & Mabon, S.  (2015). Terrorism and political violence. London: Sage.

Lamothe, D. (2015). U.S. military social media accounts apparently hacked by Islamic State sympathizers. Washington post. <https://www.washingtonpost.com/news/checkpoint/wp/2015/01/12/centcom-twitter-account-apparently-hacked-by-islamic-state-sympathizers>. Accessed on: 28/2/2016

 

Leswing, K. (2016). Over half of Americans think Apple should unlock the San Bernardino shooter’s iPhone. Business Insider. <http://www.businessinsider.my/over-half-of-americans-think-apple-should-unlock-san-bernardino-iphone-2016-2/#CPLIpf791Ex4w4id.99>. Accessed on: 19/3/2016

 

Lewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies. pp. 1-12

 

Minei, E., & Matusitz, J. (2012). Cyberspace as a new arena for terroristic propaganda: an updated examination. Poiesis and Praxis. Vol. 9. No.1. Pp.163-176.

 

QÉÍtaÉnyÊ, M., QÉÍtaÉnyÊ, M. (2014). Al qËwaÊ al khÉfyÊÉ lÊ daÉÑsh fÊy al’aÑlÉm al jadÊed. jaÉmÊÑt al malÊk sËÑwd.

 

Rouse, M. (2013). Definition of Bitcoin. Tech target. <http://whatis.techtarget.com/definition/Bitcoin>. Accessed on: 15/3/2016

 

SafÊr, ×. (2013). Al ’rhaÉb wa alÑËnf fÊy mËyzaÉn al sharÊÑh al ’slamÊyÉh wa al qaÉnwËn al ÑËwlaÉ. Dar al daËwha. qaÏar.

 

Sario, U, S. (2013). Lahad Datu: Eight charged in Tawau High Court over Sabah incursion. The Star. <http://www.thestar.com.my/news/nation/2013/03/21/lahad-datu-eight-charged-in-tawau-high-court-over-sabah-incursion-updated>. Accessed on: 24/3/2016

 

Siboni, G., Cohen, D., & Koren, T. (2015). The Islamic State’s Strategy in Cyberspace. Military and Strategic Affairs. Vol. 7. No. 1, 2015, pp. 3-29

 

Shandra. (2012). History of cyber terrorism. Blog. <http://cyberterrorismlaw.blogspot.my/2012/03/history.html>. Accessed on: 18/3/2016

 

Simon, W. (2014). The operation of the security offences (special measure) acts 2014 and comparison with old internal security act 1948. herading a new democratic era or old win in a new bottle?. International Journal of Technical Research and Applications. www.ijtra.com Special Issue. e-ISSN: 2320-8163. Pp 78-83.

 

Trowbridge, A. (2014). "ISIS swiping hashtags as part of propaganda efforts". Computer business review. <http://www.cbsnews.com/news/isis-hijacks-unrelated-hashtags-in-attempt-to-spread-message>. Accessed on: 25/2/2016

 

Theohary, C. A. (2011). Terrorist use of the internet: Information operations in cyberspace. Washington.  DIANE Publishing. March 8, 2011.

Veerasamy, N. (2009). Towards a Conceptual Framework for Cyber-terrorism. 4th International Conference on Information Warfare and Security. Cape Town, South Africa. 26-27 March 2009. pp 10.

 

Weimann, G. (2004). www. terror. net: How modern terrorism uses the Internet. United States Institute of Peace . Vol. 31. No. 11. Pp. 1-11.

 

Weimann, G. (2014). New Terrorism and New Media. Wilson Center Common Labs.Vol. 2. Pp. 1-17.

 

WazaÉrt Al ’wqaÉf Al SwËrehÊ. (2014). Al ÑrhaÉb al ’alkÊtrËwny al thawËabit wa al motaghÊyraÉt. baÑath baÉrtÊ. < http://www.baathparty.sy/arabic/index.php?node=552&cat=1296&>. Accessed on: 3/1/2016

 

’aesar ÑaÏeÊh. (2014).  Al Gra’m FÊe Úil Al MotÉgheÊrÉt Wa AlmotahawÊlÉt Al ÉqleÊmÉa Wa Al dwËÉleÊa,