Utilization of Cyberspace by Terrorist Groups and the Applicability of the Malaysian Law on Terrorism
Journal of Asian and African Social Science and Humanities (ISSN 2413-2748), Jun 14, 2016
It is an obvious and undeniable fact, that the cyberspace is become a powerful method which is in... more It is an obvious and undeniable fact, that the cyberspace is become a powerful method which is increasingly and quickly utilized by terrorist organizations to achieve their gruesome and nefarious goals by hitting innocent individuals. This paper has conducted a critical and comprehensive study on the literature review aiming to answer several inquiries about utilization of cyberspace by terrorist groups and the applicability of Malaysian law on terrorism. The meaning, characteristics and goals of cyber terrorism will be highlighted. Furthermore, this paper will clarify how terrorist groups invade the cyberspace with highlighting on “ISIS” as an example. In addition, this paper will indicate how the Malaysian Law addresses the terrorism. This paper has proved that the terrorist groups become more sophisticated and complex by adopting the cyberspace. Moreover, this paper discloses how terrorist groups exploit the cyberspace. Even if, Malaysian law adopts many measures and precautions to counter terrorism, but, it still needs more efforts to deal with terrorism, by regulating the “Bitcoins”, introducing a clear definition about the meaning of "lethal device” to encompass harm programs and viruses, and distinguishing between clicking "like" or sharing the terrorist items with use explicit words to glorify the terrorism and without use any explicit glorification words. The lawgiver must take into consideration the possession of terrorist items or publications for academic and innocent purposes. Finally, under SOSMA, the power to intercept the communications must be subjected on the judicial oversight and the power of arrest must be based on objective test.
Uploads
Papers by Sonny Zulhuda