The encryption on dark web plays a vital role in protecting your constitutional freedom. However, encryption services, and the dark web, are frequently used for criminal purposes. Terrorists, criminals, and extremists move their activities on the dark web and it becomes a haven for them. In this post, we have focused on how terrorists use dark web, and encryption to plan to commit terrorist atrocities.
Terrorists Use Dark Web for Communication
Terrorist groups use encrypted messaging services like Telegram and the dark web to maintain their anonymity. The encryption allows radicalization recruitment, broadcasting propaganda, and executing terrorist attacks.
The Use of Encrypted Messaging
The IS: Islamic State hijacking unrelated Twitter (X) trending content and persuading on mainstream social media platforms like Facebook and YouTube. However, the IS fighters would regularly update social media followers for their experience. But authorities and social media companies made progress in identifying responding to and removing terrorist and extremist content on the surface and deep web. IS and its followers replied to the ban by moving towards encrypted messaging apps and the dark net for communication.
IS forced its followers to be more secretive and underground in their communications to make sure that their operatives are difficult to trace. That’s why terrorists use dark web and encrypted messaging platforms like Telegram for their radicalization, propaganda purposes, and recruitment of their cause.
Telegram Enables Encryption
Telegram is an end-to-end encrypted app that allows its users secure and anonymous data protection. It features the option for a self-destruct timer that permanently deletes all media and messages once they are seen. A Telegram user Etienne du Rouvray shared multiple audio messages to his followers about his failed attempt to travel to Syria to join IS. He indicated his attention to executing an attack at home in France.
Moreover, some terrorists plan to commit a Lee Rigby-style attack – the modus operandi involves running over an individual with a vehicle and then stabbing them specifically targeting members of the armed forces. These men use Telegram to communicate and were held with deadly weapons including an incomplete pipe bomb, a firearm, a samurai blade, and a meat chopper with the word kafir ornamented on it. They had also joined extremist social media groups online and engaged with violent materials to commit a deadly act of terror.
The Encryption World: The Dark Web
Just like Telegram, the dark web is an encrypted platform that people use for communication. The IS propaganda hub is found on the dark web as @krypt3ia. This user posts a complete address for a new website and commands on how to reach it and users can translate this site into English Turkish and Russian. On this site, there were claims of the attacks in Paris and a selection of propaganda videos and images.
Terrorists Use Dark Web for Direct Recruitment
According to the research, recruiters use the dark web to plan and launch terrorist attacks because detection by law enforcement is less likely. Initial contacts and instructions made on surface web platforms are given on end-to-end encryption apps like Telegram. The instructions include how to access jihadist sites on the dark web.
However, the discussions on how to make bombs, how to use vehicles as weapons, where to stab people for maximum effect plan lone actors terrorist attacks, and how to create a fake suicide, are often placed on dark net forums. For many terrorist groups, the dark web removes the requirement of physical meeting places to plan an attack and offers a virtual meeting ground for terrorist operations. Here communications may encourage recruits to single-handedly carry out attacks with minimal training or experience.
Terrorists Use Dark Web for Trading
The link between the dark web and terrorism is not always clear cut as non-terror-connected crime often supports and gives funds indirectly. Terrorists engage in myriad organized criminal activities like human trafficking, selling human organs, weapons, antiquities, drugs, kidnapping for ransom, and money laundering. All these activities place in regions like Syria and Iraq. Here we have shared which terrorist trading activities happen on the dark web.
Kidnap for Ransom
The main IS financing is derived from extortion and oil within its lands. However, these incomes have been enhanced by a kidnap-for-ransom business targeting foreign journalists and aid workers. Kidnap for ransom helps in the funding of IS operations. While the secretive nature of terrorist financing makes it difficult to ascertain how money obtained from kidnap for ransom is used.
Document Fraud
Terrorists use dark web worl to buy fake documents. Many dark web markets assist in human trafficking and illegal immigration via fraudulent documents and increase the risk of terrorist activities. According to research the sale of forged documents including passports, driving licenses utility bills, and bank statements aids in the movements of terrorists to the UK. Moreover, some evidence indicates that the terrorists use fake travel documents to travel within Europe.
Weapons
The direct link between dark web weapon markets and terrorism has been subjective. In an attack in Paris in 2015 four assault rifles used in the attack had been obtained on the dark web. In another case, a teenage Iranian attacker purchased the weapon on the dark web before shooting nine people in Germany.
How Terrorist Influencers Operate on the Darknet
Terrorists use the dark web to guide their followers in selective language styles and structures to make their message look trustworthy and valid. These influencers quote holy texts, like the Quran and Hadith frequently taking them out of context to defend violent activities as religious obligations. These messages use extremely formal Arabic and wisely structured opinions to request to those who respect religious specialists.
The formal Arabic tone and academic style help these terrorist influencers show their messages as solemn religious teachings. This makes their demands for violence seem correct in the eyes of followers. However, they act like teachers, making convincing instructions that guide readers toward extremist opinions rather than just advising them of up-to-date actions. Terrorist influencers make a sense of expertise, leading followers to trust that militant actions are in line with Islamic traditions. They basically blend religious context with extremist ideas.
Final Thoughts
Terrorists increasingly using the hidden part of the net – the dark web for encryption to avoid law enforcement for more evil communications. On the dark web, the activities are even harder to track. Islamist forums and chat rooms in English and French are still broadly available on the dark web. But a large portion of more extreme Islamic dissertations now takes place within the dark web. In this post, we have shared how terrorists use dark web for communication, recruitment, and trading in detail.