TY - JOUR
T1 - Indonesia’s Handling of Terrorists’ Cyber Activities
T2 - How Repressive Measures Still Fall Short
AU - Wibisono, Ali Abdullah
AU - Kumendong, Rachel
AU - Maulana, Iwa
N1 - Publisher Copyright:
© 2024 The Author(s).
PY - 2024
Y1 - 2024
N2 - The article examines discrepancies between the Indonesian government’s response to terrorist cyber activities and the actual activities of terrorists online. By analysing data from 55 convicted terrorists, the study reveals that while government efforts focus on censoring extremist content on social media and websites, terrorists have shifted to using messaging platforms for tactical coordination. This shift indicates that current censorship and platform removal strategies are ineffective in preventing terrorists from exploiting cyberspace. The article highlights that repressive measures, such as criminal prosecution and strict regulation, may undermine the roles of users, platform managers and tech companies in content moderation. Additionally, these measures could drive terrorists to smaller, less monitored platforms, ultimately failing to curb their online activities and compromising freedom of expression. The findings suggest that a more nuanced approach is needed to address terrorist use of cyberspace effectively.
AB - The article examines discrepancies between the Indonesian government’s response to terrorist cyber activities and the actual activities of terrorists online. By analysing data from 55 convicted terrorists, the study reveals that while government efforts focus on censoring extremist content on social media and websites, terrorists have shifted to using messaging platforms for tactical coordination. This shift indicates that current censorship and platform removal strategies are ineffective in preventing terrorists from exploiting cyberspace. The article highlights that repressive measures, such as criminal prosecution and strict regulation, may undermine the roles of users, platform managers and tech companies in content moderation. Additionally, these measures could drive terrorists to smaller, less monitored platforms, ultimately failing to curb their online activities and compromising freedom of expression. The findings suggest that a more nuanced approach is needed to address terrorist use of cyberspace effectively.
KW - cyber-security
KW - information technology
KW - internet use
KW - national security
KW - policy analysis
KW - Terrorism
UR - http://www.scopus.com/inward/record.url?scp=85211330259&partnerID=8YFLogxK
U2 - 10.1177/23477970241298764
DO - 10.1177/23477970241298764
M3 - Article
AN - SCOPUS:85211330259
SN - 2347-7970
VL - 12
SP - 134
EP - 160
JO - Journal of Asian Security and International Affairs
JF - Journal of Asian Security and International Affairs
IS - 1
ER -