{"id":22969,"date":"2017-07-14T09:17:18","date_gmt":"2017-07-14T09:17:18","guid":{"rendered":"https:\/\/kedisa.gr\/dark-web-and-isis\/"},"modified":"2026-01-21T22:29:42","modified_gmt":"2026-01-21T22:29:42","slug":"dark-web-and-isis","status":"publish","type":"post","link":"https:\/\/kedisa.gr\/en\/dark-web-and-isis\/","title":{"rendered":"Dark Web and ISIS"},"content":{"rendered":"<p><strong>By Natalia Griva, Associate Contributor KEDISA<\/strong><\/p>\n<p>The \u201cDark web\u201d is a hidden network of websites and the user needs special \u201ctools\u201d to access it. More specifically it is a thriving market for a variety of illegal activities and illegal actors. The largest of these is the community of hacking, in which the user can buy everything, from services to \u201chow to hack\u201d instructions. Products and services are on sale, such as drugs, weapons and crime activities, from robbers to \u201cassassin to hire\u201d. Having understood the nature of the products and services of the Dark Web, the main concern of buyers and sellers is the \u201csecurity of transactions\u201d.<\/p>\n<p>In the main stage, the security in the \u201cDark Web\u201d is governed by trust and the relationship building that the user creates gradually. For example, the access of a user in a hacking website can be achieved only by invitation of another user, who is already a member of the community. Then the user as a new member must start to establish reliability by trading a small amount of products and services, at a low price. Depending on his behavior, the new user goes up on the ranking. The more transactions are being performed, the more his credibility score rises. The system\u2019s structure is like eBay but for terrorists and criminals. Buyers evaluate sellers and vice versa, depending on their credibility.<\/p>\n<p>The transactions are being conducted through Bitcoins. The location of the users is extremely difficult and unlikely to be found. Users can remain anonymous if the login programs are being properly handled, which means that they can share very important information and make illegal business deals without \u00a0the fear of law enforcement.<\/p>\n<p><em>To make more comprehensible the Internet\u2019s structure:<\/em><\/p>\n<p><em>The Internet exists in different layers. One, in which most of us are more familiar with, is the \u201cSurface Web\u201d, comprising content which search engines such as Google, is able to detect. In short, any part of the Internet which can be found by a simple search on Google, just like this website.<\/em><\/p>\n<p><em>Then there\u2019s the \u00abDeep Web\u00bb, which should not be confused with the Dark Web, which is although part of the Deep Web. The websites located in the Deep Web, are not accessible through search engines. Maybe we all have used the Deep Web without knowing the terminology. For example, a document with a colleague. There is thus nothing inherently illegal about Deep Web. Usually, however, the term is confused with the Dark web and the criminal activities that are developed there.<\/em><\/p>\n<p><em>The Dark Web is not a place, but rather a process that aims at high web anonymity. Refers to websites covering the IP addresses of the servers, making it impossible to find the identity or location of users. That is, effectively invisible.<\/em><\/p>\n<p>For those reasons, supporters and members of the terrorist group Islamic State (ISIS) use the Dark Web not only propagandize through video, pictures and declarations but also for communication with each other or with new jihadists on every side of the planet through a mobile application which is accessible for download only through the Dark Web.<\/p>\n<p>In addition, through Dark Web the terrorist group is able to finance its \u201cpartners\u201d \u2013 the other terrorist groups which have affiliated with the Islamic group in the Middle East and in Africa -carrying Bitcoins worldwide. In the same way the group can receive funding from its supporters.<\/p>\n<p>Intelligence agencies and experts in security are aware of alleged members of terrorist organizations, including ISIS, exploring different ways of transferring money to militants operating in Western countries. A continuous flow of small amounts could be transferred instantaneously across multiple accounts used by members of the group worldwide.<\/p>\n<p>On the Internet there is a PDF file written by a user under pseudonym which makes explicit references to black markets as the \u201cSilk Road\u201d \u2013 which has been recently closed \u2013 and other online black markets, explaining how it is possible to buy some weapons for the Mujahedeen.<\/p>\n<p>The Dark Web is undoubtedly extremely useful tool for the illegal activities, but also has black spots. The content of the Dark Web is only accessible via a special software \u201cTor\u201d, a user\u2019s IP address encryption and packet traffic channels online through volunteer servers worldwide (onion routing). The \u201cTor\u201d was launched as a product of the army, designed by the Office of Naval Research to offer sailors reliable means of communication.<\/p>\n<p>Today, if there were a sudden increase in the use of \u201cTor\u201d in a specific area or specific groups of people automatically becomes an indicator of increased activity of secret communication. Although, this has different effects depending on the time and place. For example, in June 2014, the Iraqi government banned the use of social networks Twitter and Facebook in the country, so the Tor usage was highly increased.<\/p>\n<p>Many of the jihadists use \u201cTor\u201d to enter the online black market and generally in forums in which they can have access to material and information by keeping their anonymity. So, there are terrorist websites of ISIS, which are not yet known, since there is no structure in the archived Dark Web. That, though, does not mean that there is no investigation. Last year a survey of the NSA showed that any user who attempts to download the Tor is automatically identified.<\/p>\n<p>The fighters of the Islamic State are well trained to the new technology and representatives of the US government have recently warned about the Electronic War which is in progress against the Western world.<\/p>\n<p>The Defense Advanced Research Projects Agency (DARPA) has made a significant effort to implement the Memex software, which can lift the anonymity of Tor users and identify them. Recently, the Agency presented the Memex which is designed to improve the surveys through archiving websites on the Deep Web. This software was originally designed for monitoring trafficking (human trafficking) in the Deep Web, but it is believed that the same process can be applied to any illegal activity and identify the number of sites and their content.<\/p>\n<p>It will not be easy to displace the terrorist group \u201cIslamic State\u201d from the Deep Web, nor will mean the end of its existence, but it will be a very important step in the war against terrorism. It will also, reduce the amount of the new recruits and will significantly affect the funding of the group worldwide.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Natalia Griva, Associate Contributor KEDISA The \u201cDark web\u201d is a hidden network of websites&hellip;<\/p>\n","protected":false},"author":107,"featured_media":23476,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[1105,1107,1114],"tags":[],"class_list":["post-22969","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analyses","category-intelligence-and-security","category-terrorism-organized-crime-security"],"_links":{"self":[{"href":"https:\/\/kedisa.gr\/en\/wp-json\/wp\/v2\/posts\/22969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kedisa.gr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kedisa.gr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kedisa.gr\/en\/wp-json\/wp\/v2\/users\/107"}],"replies":[{"embeddable":true,"href":"https:\/\/kedisa.gr\/en\/wp-json\/wp\/v2\/comments?post=22969"}],"version-history":[{"count":1,"href":"https:\/\/kedisa.gr\/en\/wp-json\/wp\/v2\/posts\/22969\/revisions"}],"predecessor-version":[{"id":22970,"href":"https:\/\/kedisa.gr\/en\/wp-json\/wp\/v2\/posts\/22969\/revisions\/22970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kedisa.gr\/en\/wp-json\/wp\/v2\/media\/23476"}],"wp:attachment":[{"href":"https:\/\/kedisa.gr\/en\/wp-json\/wp\/v2\/media?parent=22969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kedisa.gr\/en\/wp-json\/wp\/v2\/categories?post=22969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kedisa.gr\/en\/wp-json\/wp\/v2\/tags?post=22969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}