Terrorism in Cyberspace: A Case Study of Terrorist Organizations Operating in Pakistan

Authors

Keywords:

Cyber Terrorism, Cyberterrorism Pakistan, Cyber Security, Online use of internet, Online Radicalization, Online Fundraising, Propaganda

Abstract

The presence of extremist and radical groups on internet is an old phenomenon as they have been manifesting their appearance in cyber space since their very own inception. However, their dependency in cyberspace operations has enormously expanded since last two decades. The cyber terrorism threat has evolved into a multi-faceted and complex riddle where various ideological dogmas are turning the world into a cyber-war. By 2000, all terrorist groups virtually had set up their online presence. This study aims to map cyber space activities conducted by terrorist organizations operating in Pakistan. How terrorist organizations are making their presence online and how do these outfits use social media for assistance and execution of terrorist attacks. The study tries to delineate case study of four terrorist organizations; Islamic State (IS), Jamat Ud Dawa (JuD), Lashker-e-Tayyaba (LeT), and Balochistan Liberation Army (BLA).  The study will explore how do these organizations use cyber space for fundraising, online recruitment, psychological warfare, propaganda, and information-sharing. It will discuss existing laws in Pakistan related to cyber terrorism, challenges and a way forward.

References

Bibliography

(n.d.). Retrieved from http://www.realinstitutoelcano.org/wps/portal/rielcano_en/contenido?WCM_GLOBAL_CONTEXT=/elcano/elcano_in/zonas_in/cybersecurity/ari47-2020-soesanto-cyber-terrorism-why-it-exists-why-it-doesnt-and-why-it-will.

(n.d.). Retrieved 12 25, 2020, from https://www.satp.org/satporgtp/ajaisahni/09fablime04.htm

(n.d.). Retrieved from http://www.fia.gov.pk/en/NR3C.php

Ahmed, J. (2017, Apri 17). Pakistani student accused of blasphemy beaten to death on campus. Retrieved 11 20, 2020, from Reuters: https://www.reuters.com/article/us-pakistan-blasphemy-idUSKBN17F1ZL

Anne Aly, S. M. (2016). Violent Extremism Online: New Perspectives on Terrorism and the Internet. Routledge.

Bajoria, J. (2010). Lashkar-e-Taiba (Army of the Pure) (aka Lashkar e-Tayyiba, Lashkar e-Toiba; Lashkar-i-Taiba). Council For Foreign Relations.

Bashir, J. H. (2017, september 17). Banned outfits in Pakistan operate openly on Facebook. Islamabad, islamabad, pakistan.

Basit, A. (2017). IS Penetration in Afghanistan-Pakistan: Assessment, Impact and Implications. Perspectives on Terrorism, 19-39. Retrieved from Samira Shackle, “When I researched Isis recruits in Pakistan, I found that joining up is an unexpectedly middle class affair,” The Independent, July 5, 2016, http://www.independent.co.uk/voices/when-i-researched-isis-recruits-in-pakistan-i-found-that-join.

Christopher C. Harmon, R. G. (2018). The Terrorist Argument: Modern Advocy and Propoganda. Brookings Institutions .

Crimes, N. R. (n.d.). National Response Centre for Cyber Crimes. Retrieved 12 25, 2020, from federal investigation agency: http://www.fia.gov.pk/en/NR3C.php

(n.d.). Critical Infrastraucture Protection. Washington D.C: Critical Foundations. Retrieved from https://fas.org/sgp/library/pccip.pdf

Cyber-Radicalization. (2018). Cyber-radicalization: Combating terrorism in the Digital Era. European Foundation for South Asian Studies (EFSAS).

Denning, D. E. (2000, 5 23). Cyberterrorism Testimony before the Special Oversight Panel on Terrorism Committee on. Retrieved 12 3, 2020, from North Atlanti Treaty Organiization: https://www.nato.int/structur/library/bibref/cyberterrorism.pdf

Desk, n. (2018, may 8). NACTA establishes Cyber Security Wing to curb emerging terrorism threats.

E. Dilipraj, S. C. (2018). JuD's Social Outreach: Understanding Digital Terrorism. E. Dilipraj.

EFSAS. (2020). Social Media Strategies and Online Narratives of Terrorist Organizations; Case studies of Al-Qaeda, ISIS, Taliban and Lashkar-e-Taiba. European Foundation for South Asian Studies (EFSAS), Amsterdam.

Erin Marie Saltman, C. W. (2014). Islamic state: The changing face of modern jihadism. London: Quilliam Foundation, 1-71.

Functions of Code-Switching in Tweets: An Annotation Scheme and Some initial Experiments. (n.d.). Retrieved 12 25, 2020, from https://www.aclweb.org/anthology/L16-1260.pdf

Gairatovich, S. B. (2018). To Analyze Behavior of Young Consumers toward the use of Digital Technology in Tajikstan. Retrieved from Univeristy of Porto, Portugal: https://repositorio-aberto.up.pt/bitstream/10216/111050/2/256702.pdf

Ingram, H. J. (2014 ). Three Traits of the Islamic State’s Information Warfare. The RUSI Journal, 4-11.

Intelligence, S. (2014). Social Media and Illicit Finance: A Look at the Conflict in Syria. The Camstoll Group.

Isis is using a radio show to recruit in Afghanistan. (2015, Dec 15). Retrieved from Newsweek: Isis is using a radio show to recruit in Afghanistan,” Newsweek, December 21, 2015; URL: http://www.newsweek.com/isis-afghanistan-radio-islamic-state- united-states-408009

Khabrain. (2015, December 29). ‘Some travel agents are recruiting youth to fight in the Middle East,. Retrieved from Daily Khabrain.

KHAN, R. (2016, AUG 11). Cyber Crime Bill Passed by NA: 13 Reasons Pakistanis Should be Worried’,. Retrieved 12 25, 2020, from THE DAWN NEWS: Raza Khan, ‘Cyber Crime Bill Passed by NA: 13 Reasons Pakistanis Should be Worried’, Dawn, 11 August 2016.

Khushi, Y. (2017). ISIS in Pakistan: A Critical Analysis of Factors and Implications of ISIS. Arts and Social Sciences Journal, 2-13.

Khushi, Y. (2018). ISIS in Pakistan: A Critical Analysis of Factors and Implications of ISIS Recruitments and Concept of Jihad-Bil-Nikah. Academic Journal of Social Sciences.

Laskar, R. H. (2015, jan 15). ‘IS Announces Expansion into of Pak, Parts of India’. Retrieved 11 25, 2020, from Hindustan Times : https://www.hindustantimes.com/india-news/pak-isi-helps-lashkar-jaish-expand-footprint-in-afghanistan-under-backup-plan/story-m7ZjGSXqvqt0MKEPBnGaLO.html

M. Neelamalar, M. V. (2019). A Critical Analysis of the Jihadi Discourse through Online Magazines with Special Reference to ‘Wyeth’ Magazine. India Quarterly, A journal of International Affairs.

Mead, J. (2014). Indiegogo Playbook . Retrieved 12 22, 2020, from Indiegogo Playbook (2014), Creating your campaign, Indiegogo: Indiegogo Playbook (2014), Creating your campaign, Indiegogo, https://go.indiegogo.com/playbook/life-cycle-phase/creating-campaign,

Media.", ". a. (2013, Apr 27). "Terror and Social Media. Retrieved 15 2, 2020, from youtube: "Terror and Social Media." YouTube video, 5:50, posted by "CNN" April 27, 2013. http://www.youtube.com/watch?v=3DILJOvrA-A

MORLINO, L. (2015). IS (ISLAMIC STATE) AND THE WEST:THE ROLE OF SOCIAL MEDIA. Retrieved 12 25, 2020, from LUISS: https://tesi.luiss.it/15151/1/070502.pdf

National Counter Terrorism Authority. (n.d.). Retrieved 11 25, 2020, from National Action Plan: https://nacta.gov.pk/nap-2014/

Negi, M. (2017, April 05). Exclusive: Security agencies planning to counter Lashkar-e-Taiba's social media propaganda. Retrieved from India Today: https://www.indiatoday.in/india/story/security-agencies-lashkar-e-taiba-social-media-propaganda-twitter-969715-2017-04-05

Negi, M. S. (2017, APRIL 5). Exclusive: Security agencies planning to counter Lashkar-e-Taiba's social media propaganda. Retrieved 12 05, 2020, from INDIA TODAY: https://www.indiatoday.in/india/story/security-agencies-lashkar-e-taiba-social-media-propaganda-twitter-969715-2017-04-05

News, D. (2016, march 3). IS recruiting trained professionals from Pakistan.

NEWS, D. (2017, JANUARY 10). BLA’s social media head surrenders. ISLAMABAD.

Pakistan: National Assembly Passes New Cybercrime Law. (2016, SEPTEMBER 21). Retrieved 11 15, 2020, from https://www.loc.gov/law/foreign-news/article/pakistan-national-assembly-passes-new-cybercrime-law/

Press, A. (2013, April 16). Al Qaeda magazine on pressure cookers: 'Make a bomb in the kitchen of your mom. Retrieved from Washnigton Times: https://www.washingtontimes.com/news/2013/apr/16/al-qaeda-magazine-pressure-cookers-make-bomb-kitch/

Prevention of Electronic Crimes Act. (2016). Retrieved 11 20, 2020, from THE PUNJAB CMMINSSION ON THE STATUS OF WOMEN: https://pcsw.punjab.gov.pk/Prevention%20of%20Electronic%20Crimes%20Act%2C%202016#:~:text=In%202016%2C%20the%20National%20Assembly,in%20relation%20to%20electronic%20crimes.

Robin L. Thompson, H.-P. (2012). Radicalization and the Use of Social Media. Strategic Studies, 167-190.

Rohan Gunaratna, K. I. (2012). Pakistan: Terrorism Ground Zero Kindle Edition. Reaktion Books .

Shahzad, M. (2014, APR 24). FBR HOLDS TAXPAYERES FACILITATION WORKSHOP IN LAHORE . Retrieved 02 5, 2020, from FBR: https://www.fbr.gov.pk/pr/fbr-holds-taxpayers-facilitation-workshop-in/867/2014

Sharma, M. (2016, MARCH 21). Lashkar-e-Cyber of Hafiz Saeed. Retrieved 11 2, 2020, from IDSA: https://idsa.in/idsacomments/lashkar-e-cyber-of-hafiz-saeed_msharma_310316

SmeshApp. (2016, MARCH 15). Retrieved 12 2020, 2020, from GOOGLE PLAY STORE: The SmeshApp was removed from Google Play Store on March 15, 2016.

SOESTANSO. (n.d.). RINCO. Retrieved 2020, from SOESTANSO, S. (2020, April 17). Cyber Terrorism. Why it exists, why it doesn’t, and why it will. http://www.realinstitutoelcano.org/wps/portal/rielcano_en/contenido?WCM_GLOBAL_CONTEXT=/elcano/elcano_in/zonas_in/cybersecur

Soestanso, S. (2020, April 4). Cyber Terrorism. Why it exists, why it doesn’t, and why it will. Retrieved dec 2020, from Institute Elcano: http://www.realinstitutoelcano.org/wps/portal/rielcano_en/contenido?WCM_GLOBAL_CONTEXT=/elcano/elcano_in/zonas_in/cybersecurity/ari47-2020-soesanto-cyber-terrorism-why-it-exists-why-it-doesnt-and-why-it-will

Speckhard, A. S. (2017, jun 7). TELEGRAM: THE MIGHTY APPLICATION THAT ISIS LOVES – PART I. Retrieved 12 20, 2020, from VOX-Pol Network of Excellence (NoE): https://www.voxpol.eu/telegram-mighty-application-isis-loves/

Twitter Suspend Multiple Baloch Accounts. (2018). Retrieved 12 25, 2020, from thebalochistanpost: https://thebalochistanpost.net/2018/08/twitter-suspends-multiple-baloch-accounts/

U. R. ALO, N. H. (n.d.). Voice over Internet Protocol (VOIP): Overview,Direction And Challenges. Journal of Information Engineering and Applications, 2013.

VS Subrahmanian, A. M. (2012). Computational analysis of terrorist groups: Lashkar-e-Taiba. Springer Science & Business Media.

Weimann, G. (2012). New Terrorism and New Media. Wilson Center.

WRITER, S. (2019, MAY 12). Pakistan: 5 killed in Gwadar hotel attack claimed by Baloch Liberation Army. ISLAMABAD, FEDERAL CAPITAL, PAKISTAN.

Downloads

Published

2020-12-30

How to Cite

Iqbal, Z. (2020). Terrorism in Cyberspace: A Case Study of Terrorist Organizations Operating in Pakistan. Cyberpolitik Journal, 5(10), 240-259. Retrieved from http://cyberpolitikjournal.org/index.php/main/article/view/112

Issue

Section

Research Articles