Silent Warfare: The Rising Threat of Cyberterrorism in the Dark Web

Written by: Nearchos Nearchou

|

|

Time to read 5 min

Terrorism, in its broadest sense, is an action or threat against persons or properties to negatively influence governments or intimidate the public. In most cases, the term terrorism involves the use of fear and violence in the pursuit of ideological, religious, and political aims. Some of the most well-known terrorist organizations are the Islamic State of Iraq and Syria (ISIS), the Taliban, and Al-Qaida

 

In the past few decades, terrorism has gone dark and digital. The term cyberterrorism was first mentioned by Dr. Barry Collin, and it describes a planned attack performed by terrorists on computer systems. Cyberterrorism can be found all over the internet, especially on the Dark Web. There has been a great deal of concern over the possible threat posed by cyberterrorism. The threat of cyber terrorists breaking into public and private computer networks and destroying the military, financial, and service sectors of countries has been widely highlighted by security professionals, academics, lawmakers, and others. This article will cover the following cyberterrorism topics:


  • What is terrorism? 

     

  • Why do terrorists use the Dark Web? 

     

  • How do terrorists operate on the Dark Web? 

     

  • Countering Dark Web Terrorism


What is terrorism? 


On the worldwide networks that exist, new security threats and weaknesses are exposed as technology is increasingly ingrained in society. One of the greatest potential security dangers around the globe is cyberterrorism. It has surpassed the development of nuclear weapons and contemporary international crises in importance. Digital weapons represent a threat to entire economic or social institutions because of how prevalent the internet is and how much responsibility is put on it. There are various types of cyber terrorists. We can categorize them into four primary groups, as shown in the figure below. 

 

The first group is comprised of active terrorists who are actively planning attacks or making changes to certain websites. They launch a cyberattack using a computer network as a tool, and then they utilize the attack as a weapon. Terrorist sympathizers fall into the second category; while lacking full information, they take part in terrorist activities because they hold the same views as the terrorist organization that is behind these crimes. The third category includes involved states or nations that participate in terrorist acts in order to develop specific cyberwarfare capabilities. The last type is joyriders, which include individuals who utilize terrorism and cyberattacks to get famous:

Figure 1 – Cyberterrorist categories


In nations with intermediate political freedom, terrorism is more common. On the other hand, in most democratic nations, terrorism is the least common. A terrorist’s ability to take over, control, or alter the monitoring functions of governmental systems could threaten regional peace and sometimes international security. According to the Global Terrorism Index (GTI), religious extremism has become the main driver of terrorist attacks worldwide. Terrorist attacks take place usually by using explosives. In this way, terrorists achieve maximum fear and publicity. The majority of the time, terrorist organizations meticulously plan their assaults in advance. They may also recruit victims, place undercover agents, and generate funds from sympathizers or through organized crime. The following figure shows the countries that had the highest number of deaths by terrorism in 2021:

 

Figure 2: Countries with the highest number of deaths by terrorism in 2021


It is exceedingly unlikely that an extremist terrorist will harm anyone outside of a conflict zone. For instance, since 9/11, six Americans died each year at the hands of such terrorists in the US, which is significantly fewer than the number of individuals who drown in bathtubs. However, some contend that because anti-terrorism tactics are so successful, the frequency of terrorist destruction is limited. They further argue that, unlike bathtubs, terrorism offers no benefit and exacts costs far beyond those in the event itself by harmfully sowing fear and anxiety and by requiring policymakers to adopt countermeasures that are expensive and excessive


Why do terrorists use the Dark Web?


The idea of cyberterrorism has its origins in the early 1990s when studies on the possible hazards posed by the highly networked, high-tech-dependent United States were first published in response to the debate surrounding the burgeoning information society and the rapid development in internet use. We are at risk, the National Academy of Sciences declared in a 1990 report on computer security and the world is becoming more and more reliant on computers, and a terrorist of the future could be able to cause more destruction with a keyboard than with a bomb. For modern terrorists, cyberterrorism conducted through the Dark Web is an attractive option for several reasons: 


  • It is cheaper than traditional terrorist tactics: Terrorists only need a computer and an internet connection. Instead of purchasing weapons such as guns and bombs, terrorists can construct and distribute computer viruses using phone lines, cables, Bluetooth technologies, or wireless connections.
  • It is more anonymous than traditional terrorist methods: Terrorists, as with many internet users, go by screen names or access websites as anonymous guest users, making it very challenging for security organizations and law enforcement to identify the terrorists’ true identities. Additionally, there are no actual obstacles in cyberspace, such as checkpoints, borders, or customs officers that must be avoided. 
  • The variety and number of targets are enormous: The computers and computer networks of organizations, people, public utilities, commercial airlines, and other entities could be among the many targets of a cyberterrorist. The sheer volume and complexity of prospective targets ensure that terrorists will be able to identify weak points and openings. According to numerous studies, key infrastructures such as electric power grids and emergency services are susceptible to cyberterrorist attacks because of how complicated the infrastructures and computer systems that run them are, making it practically hard to find and fix all flaws.
  • Cyberterrorism can be conducted remotely: A quality that terrorists find especially alluring. Compared to traditional forms of terrorism, cyberterrorism needs less physical training, psychological commitment, risk of death, and traveling, making it simpler for terrorist groups to enlist and keep supporters.
  • Larger victim base: Cyberterrorism has the ability to directly harm more people than more conventional terrorist tactics, which would lead to more media attention—which is ultimately what terrorists seek.
Nearchos Nearchou

Nearchos Nearchou is a determined person and 1st Class BSc (Hons) Computer Science and MSc Cyber Security graduate. He is a big tech-lover and spent several years exploring new innovations in the IT field. Driven by his passion for learning, he is pursuing a career in the Cyber Security world. Passionate about learning new skills and information that can be used for further personal and career development. Finally, he is the author of the book “Combating Crime On The Dark Web”.

Leave a comment