Social Media as a National Security Threat: Roles, Limits, and Opportunities for the Malaysian Armed Forces (MAF)

Amarmuazam Usmani Othman, Marina Abdul Majid, Ahmad Rizal Mohd Yusof

Abstract


The advent of social media has transformed communication and information dissemination, posing significant risks to national security. This study examines the social media threat to Malaysia’s cyber security and the role of the Malaysian Armed Forces (MAF) in maintaining national security. Disinformation involves the intentional spread of false information while misinformation refers to the unintentional dissemination of incorrect information. In Malaysia, such campaigns have been particularly influential during political events like the 2018 General Election. Social media platforms are also used by extremist groups to radicalise and recruit individuals. The MAF play a crucial role in mitigating these threats through advanced cyber defence capabilities, collaboration with government agencies, and public awareness initiatives. However, several research gaps remain, including the need for MAF to contribute to national cyber security. This study employs a qualitative method, using interviews with representatives from Malaysian ministries, agencies, and experts to analyse current cybersecurity threats and the role of the MAF in safeguarding national security. The findings underscore the importance of a proactive and collaborative approach, leveraging advanced technologies, enhancing inter-agency cooperation, and promoting public awareness to effectively mitigate social media threats. By implementing these strategies, the MAF can play a pivotal role in protecting Malaysia's national security in the digital age.

 

 


Full Text:

PDF

References


Allcott, H., & Gentzkow, M. (2017). Social media and fake news in the 2016 election. Journal of Economic Perspectives, 31(2), 211-236. https://doi.org/10.1257/jep.31.2.211

Arpinar, I., Kursuncu, U., & Achilov, D. (2016). Social Media Analytics to Identify and Counter Islamist Extremism: Systematic Detection, Evaluation, and Challenging of Extremist Narratives Online. 2016 International Conference on Collaboration Technologies and Systems (CTS), 611-612. https://doi.org/10.1109/CTS.2016.0113

Awan, I. (2017). Cyber-extremism: Isis and the power of social media. Society, 54(2), 138–149. https://doi.org/10.1007/s12115-017-0114-0

Baldwin, D. A. (1997). The concept of security. Review of International Studies, 23(1), 5–26. https://doi.org/10.1017/S0260210597000053

Bernama. (2021, June 28). Cyber security complements efforts to accelerate economic growth – PM Muhyiddin. Bernama. https://www.bernama.com/en/news.php?id=1976434

Bernama. (2022, October 10). Three PMs in one parliamentary term, Malaysia makes its own history. Bernama. https://www.bernama.com/en/news.php?id=2127958

Bhandari, D., & Gyawali, N. (2020). COVID-19 and Public health infrastructure in Nepal. Health Policy and Planning, 35(6), 686-693. https://doi.org.10.3126/unityj.v6i1.75629

Budhathoki, I. (2025). Multi-dimensional strategy for combating non-traditional security threats in Nepal. Unity Journal, 6(1), 202–215. https://doi.org/10.3126/unityj.v6i1.75629

Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers.

Coker, C. (2009). War in an age of risk. Polity Press.

Communications and Multimedia Act 1998 (Malaysia).

Computer Crimes Act 1997 (Malaysia).

Conway, M. (2017). Determining the role of the internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict & Terrorism, 40(1), 77-98. https://doi.org/10.1080/1057610X.2016.1157408

Conway, M., Scrivens, R., & Macnair, L. (2019). Right-wing extremists' persistent online presence: History and contemporary trends. International Centre for Counter-Terrorism. http://www.jstor.org/stable/resrep19623

Cudjoe, D. (2025). Cybersecurity technology as a tool for small-state securitization: A comparative case study of Estonia and Iceland (Master’s thesis). University of Iceland. https://skemman.is/bitstream/1946/49951/1/Final%20Thesis%20-%20Daniel%20Cudjoe.pdf

Daud, M. (2020). Fake News in the Malaysian 14th General Election: Shall the Net Be Free Forever? IIUM Law Journal, 28(S1), 587-615. https://doi.org/10.31436/IIUMLJ.V28I(S1).587

Elzinga, A. (2025). Securitization of cyber threats: A Foucauldian discourse analysis of cyber news articles in “The Australian” between 2023 and 2024 [Master’s thesis, Leiden University]. https://hdl.handle.net/1887/4210790

Fallis, D. (2015). What is disinformation? Library Trends, 63(3), 401–426. https://doi.org/10.1353/lib.2015.0014

Federal Constitution (Malaysia). (1957, rev. 2010). https://www.agc.gov.my

Floyd, R. (2011). Can securitization theory be used in normative analysis? Towards a just securitization theory. Security Dialogue, 42(4–5), 427–439. https://doi.org/10.1177/0967010611418712

Gatra, S. (2024). ASEAN's Cyber Initiatives: A Select List. Centre for Strategic and International Studies (CSIS). https://www.csis.org/blogs/strategic-technologies-blog/aseans-cyber-initiatives-select-list

Harib, A., Sarijan, S., & Hussin, N. (2017). Information Security Challenges: A Malaysian Context. International Journal of Academic Research in Business and Social Sciences, 7(9), 397-403. https://doi.org/10.6007/IJARBSS/V7-I9/3335

Hassan, A., & Ismail, B. (2016, July 1). Puchong bar blast linked to ISIS. New Straits Times Online. https://www.nst.com.my/news/crime-courts/puchong-bar-blast-linked-isis

Hoffman, B. (2017). Inside terrorism (3rd ed.). Columbia University Press.

Ibrahim, A., Mahmud, N., Isnin, N., Hazelbella Dillah, D., & Nurfauziah Fauz Dillah, D. (2019). Cyber warfare impact to national security - Malaysia experiences. KnE Social Sciences, 3(22), 206–224. https://doi.org/10.18502/kss.v3i22.5052

Ismail, N., Jawhar, J., Yusof, D., Ismail, A., & Akhtar, R. (2022). Understanding Malaysian youth's social media practices and their attitude towards violent extremism. Intellectual Discourse, 30(1), 187-213. https://doi.org/10.31436/id.v30i1.1855

Jaafar, M., Akhmetova, E., & Aminudin, R. (2020). The factors contributing to the rise of religious extremism in Malaysia. Jurnal Islam dan Masyarakat Kontemporari, 21(2), 16-27. https://doi.org/10.37231/JIMK.2020.21.2.482

Jackson, N. J. (2024). The securitisation of foreign disinformation. Security and Defence Quarterly, 46(2), 118–138. https://doi.org/10.35467/sdq/190799

Jalal, B., Suparman, M., Basiron, M., & Jamsari, E. (2022). OP BENTENG: Media planning by the National Task Force of Malaysia in creating people awareness in eradicating crime. International Journal of Advanced Research, 10(10), 809-816. https://doi.org/10.21474/ijar01/15571

Johns, A. (2020). 'This will be the WhatsApp election': Crypto-publics and digital citizenship in Malaysia's GE14 election. First Monday, 25(12). https://doi.org/10.5210/fm.v25i12.10381

Kenny, C. (2021, October 5). ASEAN-S'pore centre for training national cyber-security teams opens new campus. The Straits Times. https://www.straitstimes.com/tech/tech-news/asean-spore-centre-for-training-national-cyber-security-teams-opens-new-campus

Klausen, J. (2015). Tweeting the Jihad: Social media networks of Western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1–22. https://doi.org/10.1080/1057610X.2014.974948

Lazer, D. M. J., Baum, M. A., Benkler, Y., Berinsky, A. J., Greenhill, K. M., Menczer, F., Metzger, M. J., Nyhan, B., Pennycook, G., Rothschild, D., Schudson, M., Sloman, S. A., Sunstein, C. R., Thorson, E. A., Watts, D. J., & Zittrain, J. L. (2018). The science of fake news. Science, 359(6380), 1094-1096. https://doi.org/10.1126/science.aao2998

Lim, M. (2017). Freedom to hate: Social media, algorithmic enclaves, and the rise of tribal nationalism in Indonesia. Critical Asian Studies, 49(3), 411-427. https://doi.org/10.1080/14672715.2017.1341188

Malaysia Cyber Security Strategy 2020-2024. (2019). Government of Malaysia.

Malterud, K., Siersma, V. D., & Guassora, A. D. (2016). Sample size in qualitative interview studies: Guided by information power. Qualitative Health Research, 26(13), 1753-1760. https://doi.org/10.1177/1049732316665344

Mikhael, D., & Norman, J. (2018). Refugee youth, unemployment and extremism: Countering the myth. Forced Migration Review, 57, 57–58. https://www.fmreview.org/syria2018/mikhael-norman

Mutimer, D. (1997). Reimagining security: The metaphors of proliferation. In K. Krause & M. C. Williams (Eds.), Critical security studies: Concepts and cases (pp. 187–213). UCL Press.

Nor, M., & Gale, P. (2021). Growing fear of Islamisation: Representation of online media in Malaysia. Journal of Muslim Minority Affairs, 41(1), 17-33. https://doi.org/10.1080/13602004.2021.1903161

Othman, Z. (2018). Jaringan komunikasi dan media: Satu analisis dari perspektif keselamatan insan. Jurnal Komunikasi: Malaysian Journal of Communication, 34(3). https://doi.org/10.17576/JKMJC

Penal Code (Malaysia). https://www.agc.gov.my

Rahim, S. S. I., Mohd Huda, M. I., Sa'ad, S., & Moorthy, R. (2024). Cyber security crisis/threat: Analysis of Malaysia National Security Council (NSC) involvement through the perceptions of government, private and people based on the 3P Model. e-Bangi: Journal of Social Sciences and Humanities, 21(2), 191-201. http://ejournal.ukm.my/ebangi

Sabtu, S., & Mohamad, K. (2020). Critical information infrastructure protection framework development: Preliminary findings from the Malaysian public sector. 2020 8th International Conference on Information Technology and Multimedia (ICIMU), 1-6. https://doi.org/10.1109/ICIMU49871.2020.9263397

Seman, R., Laidey, N., & Ali, R. (2019). Netizens' political engagement in Malaysia: Impact of Anti Fake News Act 2018. Jurnal Pengajian Media Malaysia, 21(1), 103-116. https://doi.org/10.22452/jpmm.vol21no1.6

Tan, J. J. (2024). Social media political information use and political participation of the next generation. e-Bangi: Journal of Social Sciences and Humanities, 21(1), 198-211. https://doi.org/10.17576/ebangi.2024.2101.17

Tapsell, R. (2018). The smartphone as the 'weapon of the weak': Assessing the role of communication technologies in Malaysia's regime change. Journal of Current Southeast Asian Affairs, 37(3), 9-29. https://doi.org/10.1177/186810341803700302

Tay, K. L. (2023). ASEAN cyber-security cooperation: Towards a regional emergency-response framework. The International Institute for Strategic Studies.

Vosoughi, S., Roy, D., & Aral, S. (2018). The spread of true and false news online. Science, 359(6380), 1146–1151. https://doi.org/10.1126/science.aap9559

Wæver, O. (2004). Discursive approaches. In A. Wiener & T. Diez (Eds.), European integration theory (pp. 197–215). Oxford University Press.

Wardle, C., & Derakhshan, H. (2017). Information disorder: Toward an interdisciplinary framework for research and policy making (Report No. DGI(2017)09). Council of Europe.

Wibowo, S. E., Hartono, A., Kiswanto, H., Primawanti, H., Louerens, J. T. A., & Torang, J. (2024). Securitization of cyber threats to the Indonesian government: A study of cyber defense strategy. Global Political Studies Journal, 8(2), 97–108. https://doi.org/10.34010/gpsjournal.v8i2.13817

Williams, M. C. (2003). Words, images, enemies: Securitization and international politics. International Studies Quarterly, 47(4), 511–531. https://doi.org/10.1111/j.0020-8833.2003.00277




DOI: http://dx.doi.org/10.17576/ebangi.2026.2301.08

Refbacks

  • There are currently no refbacks.


-


 

_________________________________________________

eISSN 1823-884x

Faculty of Social Sciences & Humanities
Universiti Kebangsaan Malaysia
43600 UKM Bangi, Selangor Darul Ehsan
MALAYSIA

© Copyright UKM Press, Universiti Kebangsaan Malaysia