ISIS is thriving on the internet ‘dark web'
FBI Director James Comey made waves this week when he suggested that commercial encryption on mobile devices may prevent law enforcement from intercepting communications between Islamic State (aka ISIS, ISIL, Daesh) militants.
“The tools we are asked to use are increasingly ineffective,” Comey told a U.S. Senate Judiciary Committee hearing on Wednesday. “ISIL says go kill, go kill…we are stopping these things so far…but it is incredibly difficult.”
The FBI wants tech companies using end-t0-end encryption, such as WhatsApp, to give the agency backdoor access to its communications before the encryption leads us all “to a very, very dark place,” Comey argued.
But even if Comey got his way — which doesn’t seem likely given the companies’ protests — ISIS would still have an anonymous forum for procuring fighters, weapons, and cash: the Dark Web.
“ISIL’s activities on the Surface Web are now being monitored closely, and the decision by a number of governments to take down or filter extremist content has forced the jihadists to look for new online safe havens,” Beatrice Berton writes in a new report on ISIS’ use of the dark net.
“The Dark Web is a perfect alternative as it is inaccessible to most but navigable for the initiated few – and it is completely anonymous,” she adds.
Accessed via the anonymous Tor browser, the deep web — anything not searchable by Google — “is kind of like an iceberg,” Aamir Lakhani, senior security strategist at Fortinet, told Business Insider last month. “Only about 30% of it is actually visible, and some say it is around 1,000 times larger than web we use every day.”
Indeed, “since the Dark [Web] is far less indexed and far harder to come across than regular Websites are, there is the possibility that there are Websites used by ISIS of which we do not know yet,” Ido Wulkan, the senior analyst at dark web tech company S2T, told Defense One.
Messages sent and received on Tor are anonymized via a process known as onion rooting. “Just as an onion has multiple layers, onion rooting on Tor protects people’s identities by wrapping layers around their communications” that are impenetrable — and thereby untraceable — by either party, Lakhani explained.
Tor browser email services such as Torbox and Sigaint are popular among the jihadis because they hide both their identities and their locations, Berton notes. Encrypyted jihadi forums and chat rooms also allow militants and sympathizers to communicate without fear of detection from law enforcement.
As a result, “the dark web has become ISIS’ number one recruiting platform,” Lakhani said.
The browser’s benefits for ISIS don’t stop at anonymous messaging: Supporters of the group from around the world can also use one of Tor’s many ilicit exchanges to transfer Bitcoins — a digital currency — directly into the militants’ accounts.
One ISIS supporter went so far as to create a guide explaining how anyone could help fund the jihadis using Dark Wallet, a dark web app that promises to anonymize your Bitcoin transactions. Numerous dark web websites soliciting bitcoin donations for terror groups have reportedly been found.
The national security community has developed various tools to track the IP addresses and activities of those logged onto Tor — including the NSA’s XKeyscore, the FBI’s Metasploit Decloaking Engine, and the Defense Advanced Projects Research Agency’s Memex project.
If the uproar over FBI director Comey’s comments are any indication, however, web monitoring programs will continue to face significant resistance from internet freedom advocates.
Meanwhile, ISIS is taking full advantage of the shadowiest parts of the web.
More from Business Insider:
- Al Qaeda is winning the war in Yemen
- The world’s most notorious drug lord is a master of tunnels
- It’s been 20 years since the Srebrenica massacre, one of the most horrific atrocities since World War II
- This stunning combat art reveals what aerial warfare was like during World War II
- Iran’s nuclear program may have cost the country $500 billion or more
SpaceX launching a third top-secret satellite
SpaceX is launching a secretive mission this month. The mission, shrouded in secrecy, has some considering it may be for the CIA or the NSA.
This is how the Air Force will use prop planes on high-tech battlefields
The Air Force is looking toward a light-attack aircraft program, known as OA-X, to produce a plane that meets its needs and gets the job done.
A retired SEAL commander on how to stop thinking and 'get after it' every day
This former Navy commander has some excellent advice on how to jump start your day, and "get some" in order to make it as productive as possible.
Marines return to battle in 'old stomping grounds'
The Marines recall their "old stomping grounds" as they return to Fallujah and the surround areas of Al Anbar Province to battle a new enemy.
How Chinese drones are set to swarm the global market
China has stepped up it's drone game, and even though United States technology can still compete, China's drones are kind of really in demand.
That time two countries' Special Forces squared off in combat
In an area the size of the Falkland Islands, British and Argentine special operators were bound to run into each other at some point – a lot.
5 times pilots got in trouble for having fun in the sky
When pilots decide to do some fancy flying in their high-performance fighters, it can land them in trouble once they're back on the ground.
This is why Nazis dubbed these paratroopers 'devils in baggy pants'
"American paratroopers – devils in baggy pants – are less than 100 meters from my outpost line. I can’t sleep at night," wrote one German commander.
9 ISIS weapon fails that you have to see to believe
Many bad guys just want record themselves laying rounds down range for social media purposes — and we're glad they did. Laugh away, America!