Terrorists
January 20, 2024

How Do Terrorists Operate On The Dark Web?

A combination of psychological, political, and economic elements has fueled a dread of cyberterrorism. Two of the main psychological concerns of modern society are combined in the term cyberterrorism. Fear of arbitrary, violent victimization goes hand in hand with skepticism and outright phobia of computer technology. An unknown threat is considered more dangerous than one that is. Cyberterrorism may not openly threaten violence, but it can nonetheless have a similar psychological effect on terrified societies. Furthermore, it is difficult to understand the genuine threat posed by cyberterrorism due to a lack of knowledge or, worse still, a surplus of fake information. The following shows cyberterrorism’s main elements:


Figure 1: Cyberterrorism's main elements


Nowadays, everyone has access to an immense amount of data in cyberspace. As many criminals do, terrorists have also taken advantage of the hidden part of the internet and its highly advanced technologies. Despite the long-held belief that terrorist strikes are organized through shadowy networks, the usage of Dark Web platforms by terrorists was only made clear in 2013. In particular, the National Security Agency (NSA) of the US intercepted digital conversations between Ayman Al-Zawahiri, the commander of Al-Qaeda, and Nasir Al-Wuhaysi, the leader of Al-Qaeda in the Arabian Peninsula, which has its base in Yemen, in August 2013. According to the Institute for National Security Studies, for roughly 10 years, at least some of the contact between Al-Qaeda network members took place on the Dark Web. The following screenshot shows the threats that Dark Web terrorism poses to national security and peace:

Figure 2: National security threats posed by Dark Web terrorism

Although the internet has brought many benefits to modern society, terrorists and terrorist organizations can also take advantage of this technology. Throughout the years, more citizens, especially young people, have much easier access to the propaganda of terrorist organizations and illicit acts, thanks to the internet and the Dark Web. Cyberterrorism is a contemporary form of terrorism that uses even more effective psychological warfare techniques to link terrorist operations with the virtual world. 


You never know who might become the next victim in the digital sphere. Various methods that terrorists are exploiting the Dark Web to further their cause have been discovered by numerous investigations. These encompass anything from psychological warfare and propaganda to incredibly useful purposes such as fundraising, recruiting, data mining, and action coordination. The following highlights the use cases of the Dark Web for terrorist purposes: 


1. Terrorists use the Dark Web to hide: Extremist content is being taken down from social media platforms at a higher pace as a result of social media corporations and security personnel monitoring the Surface Web. Growth in the use of the Dark Web by terrorist networks for communication, radicalization, dissemination of propaganda, and attack planning is correlated with this.


2. Terrorists use the Dark Web for recruitment: While first contact can be established on platforms that are part of the Surface Web, detailed instructions on how to access jihadist websites on the Dark Web are frequently provided on end-to-end (E2E) encryption apps such as Telegram and WhatsApp.


3. Terrorists use the Dark Web as a way for propaganda: The likelihood that terrorist materials will be lost increases when extreme and terrorist information is removed from the Surface Web. A lot of this content later reappears on the Dark Web.


4. Terrorists use virtual currencies to fundraise and evade detection: Cryptocurrencies offer the same level of financial anonymity for terrorists and criminals that encryption does for communication systems.


The media, the information technology community, and the cybersecurity industry are all focused on the threat posed by cyberterrorism. Journalists, politicians, and professionals from a range of fields have identified signs in which highly skilled cyberterrorists use sophisticated tools to break into computers that manage air traffic control systems or dams, causing calamity and putting millions of lives in danger. By using the Dark Web, terrorists can plot their assaults, recruit new terrorists, and finance their activities. Hacking into public or private systems to gain access to confidential data or even to steal money for use in terrorism is the more common conception of cyberterrorism. The following list shows some examples of cyberterrorism on the Dark Web:


• Introduction of malware to corporate and public data networks


• Hacking of sensitive infrastructures to disrupt communication and steal sensitive data


• Causing inconvenience and financial losses by taking over websites and making them inaccessible to their intended users


• Attacks on banking institutions to steal money and cause terror


In conclusion, the article underscores the complex dimensions of cyberterrorism, emphasizing its psychological, political, and economic ramifications. The infiltration of the Dark Web by terrorists introduces new challenges in monitoring and countering their activities. 


Real-world examples, like the interception of Al-Qaeda communications, highlight the evolving nature of these threats. As we navigate the digital landscape, the article prompts reflection on the need for robust cybersecurity measures to address the growing menace of cyberterrorism and its far-reaching consequences for modern societies.

Nearchos Nearchou

Nearchos Nearchou is a determined person and 1st Class BSc (Hons) Computer Science and MSc Cyber Security graduate. He is a big tech-lover and spent several years exploring new innovations in the IT field. Driven by his passion for learning, he is pursuing a career in the Cyber Security world. Passionate about learning new skills and information that can be used for further personal and career development. Finally, he is the author of the book “Combating Crime On The Dark Web”.

Share

Leave a comment

Please note, comments need to be approved before they are published.