After Paris, ISIS Moves Propaganda Machine to Darknet

Less than a day after the horrific attacks in Paris, Daesh took the Al-Hayat propaganda machine to the Darknet and published a new video celebrating the Paris attacks.

Al-Hayat is one of the most known sources of ISIS propaganda, providing media agencies around the world with original video content from Islamic State (ISIS, ISIL, Daesh) members.

The Al-Hayat group consists of numerous sites across the Internet, of which the Ansar Khilafah blog and the Shamikh forum are the biggest.

In a series of blog posts and messages sent to its users right after the ISIS Paris attacks, Al-Hayat has informed members that the agency's Shamikh forums will be moving their operations entirely to the Dark Net.

The new website is a collection of propaganda by Al-Hayat Media Center, the media division of Daesh. It hosts the usual anti-Western iconography, as well as songs (Nasheeds) and poems for mujahids in various locations.

The website also contains translations from the recent statement issued by Daesh claiming credit for the Paris attacks in English, Turkish, and Russian.
 
In a post on the Shamikh forum (a known jihadi bulletin board), someone posted the new address and instructions for reaching it.

The post explained that the new Al-Hayat hub was needed, because other websites were removed almost as soon as they are registered. The hope is that by existing on the Darknet, Daesh can thwart most efforts to shut them down.

Over the years, there have been several claims made that Daesh had propaganda and recruitment hubs on the Darknet, but no one has ever published proof of those claims or explored how the propaganda machine operates in public.

"The site mirrors many of the other standard bulletin boards that the jihadi’s have had over the years replete with videos and sections in all languages. Given that this site has popped up today in the Darknet just post the attacks in Paris, one has to assume that an all out media blitz is spinning up by Al-Hayat to capitalize on the situation," Terban wrote.

In the hours after the public started to realize the scope of the attacks on Paris, intelligence officials, lawmakers, and pundits focused on Daesh's use of Telegram as a means of communication with supporters and active members.
In a story by the New York Times, later removed without explanation [archive], the situation in Paris was used to reignite the encryption debate.
The story focused on comments from European officials who were "briefed on the investigation" that said the Paris attackers had used encrypted communications, adding that authorities have a hard time monitoring such channels.

"Intelligence officials have been pressing for more leeway to counter the growing use of encryption," the story added.

But newspaper of record isn't the only agency attempting to turn the terror attacks in Paris into a tool to remove privacy.

The Snooper's Charter is draft legislation that if passed would require ISPs and telecom companies to maintain records of each user's Internet browsing activity, including social media, email, VoIP, gaming, and mobile phone messaging services, while storing this data for up to 12 months.

"In the coming weeks the government’s surveillance bill will be passing through the Commons. If we truly believe in standing in solidarity with Paris, we must let it pass. We must demand it passes," the Telegraph article states.

In September, the Washington Post published a story detailing comments made by the intelligence community's top lawyer, Robert S. Litt, who wrote in an email to colleagues that, while "the legislative environment is very hostile" towards efforts to weaken encryption, "it could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement."

During a Face the Nation broadcast, Mike Morell, former deputy director of the Central Intelligence Agency, opened the door for more fighting about encryption by stating that a public debate was needed.

As the newly launched Daesh propaganda portal proves, terrorists and criminals will always find away around laws and law enforcement efforts such as bulk collection.

Bulk record collection and weakened encryption will do nothing to stop terrorism. Using the attacks in Paris as an excuse to do both of those things is insulting to the good men and women who died this weekend.

Softpedia:     CSO

 

« Thailand’s Military to Set Up New Cyberwar Unit
Anonymous Acts on Cyber War Threat »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

Digital Security

Digital Security

Digital Security is an Ecuadorian company specialized in providing comprehensive information security solutions.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

SixThirty CYBER

SixThirty CYBER

SixThirty is a venture fund that invests in early-stage enterprise technology companies from around the world building FinTech, InsurTech, and Cybersecurity solutions.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.

VENZA

VENZA

VENZA is a data protection company that can help organisations mitigate their vulnerabilities and ensure compliance, keeping guests and their data safe from breaches.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.

SiyanoAV

SiyanoAV

SiyanoAV's range of antivirus products delivers strong protection against various cyber threats, including malware, ransomware, phishing schemes, and beyond.