ISIS In The Dark Web Amidst Bitcoin And Crime

901579-34c4bb60-a330-11e3-8dfc-d9063670fb71.jpg

While members of the ISIS are continuing to explore the Deep Web for various activities, the US Intelligence agencies plan to track them.

The Dark Web is a privileged environment for cyber criminals and state-sponsored hackers due to the anonymity offered by its services. Unfortunately, another category of threat actors is exploiting the deep web, the terrorists, for this reason, the US intelligence plans to dive in the principal DarkNet and explore the main hidden services to raise money and make propaganda in search of new followers to recruit.

The Dark Web is difficult to monitor for intelligence agencies and it is not so easy to locate members of terrorist organizations like the ISIS that share propaganda content. In the principal black markets hosted on the deep web it is possible to purchase any kind of illegal product and service, but in the dark part of the web it is possible to find propaganda videos and images. Hidden services in the Deep Web also offer the possibility to download the mobile apps used by the jihadists to communicate securely and to transfer Bitcoins to terrorist cells in every place of the world.

At a recent Foreign Affairs Forum on Cryptocurrency Policy, government officials and Bitcoin entrepreneurs discussed the future of the cryptocurrency. Law enforcement fear possible abuses of the popular crypto currency, Jennifer Shasky Calvery, head of the US Treasury Department’s Financial Crimes Enforcement Network (FinCEN), which is charged with fighting money laundering and terrorist finance, explained that the virtual currency scheme could facilitate bad actors, including terrorists.

“What keeps me up at night when I am thinking about digital currency…the real threats out there, these days we’re thinking a lot about ISIL,” Calvery declared. “How they’re moving their money, and how potential US-based individuals are becoming foreign fighters: Are they moving their money, can we identify them from the movement of their money? What does it mean if they start moving their money through bitcoin? We’ve started to see some public articles suggesting that has occurred.”

Intelligence agencies and security experts are aware that alleged members of terrorist groups, including the ISIS, are exploring different opportunities to transfer money to militants operating in Western countries. A continuous flow of a small amount of money could be instantaneously transferred to numerous accounts used by ISIS members worldwide. Micro payments could exploit several channels, including systems like PayPal or virtual currencies like the Bitcoin.
Online it is possible to find a PDF document written by a user with the pseudonymous pseudonym of Amreeki Witness titled: Bitcoin wa Sadaqat al­Jihad which translates to: “Bitcoin and the Charity of Violent Physical Struggle”. Bitcoin and the Charity of Violent Physical Struggle”. The pseudonym Amreeki authored the PDF under is Taqi’ul­Deen al­Munthir. That name translates to Righteous in Faith the-Warner.

The post makes explicit reference to dark markets like Silk Road and other Dark Net Markets explaining how it is possible to buy weapons for the Mujahideen. Of course the document explains the Bitcoin and its decentralized system and how it is possible to transfer money securely by using the Dark Wallet application to “send millions of dollars’ worth of Bitcoin instantly from the United States, United Kingdom, South Africa, Ghana, Malaysia, Sri Lanka, or wherever else right to the pockets of the Mujahideen”.

The KRDO News Channel 13 reported the testimony of a user that had seen websites that allowed visitors to donate to terrorist organizations.
“You’re talking about disrupting cartels, you’re talking about disrupting drug dealers,” explained the witness. “If you’re not prepared for it, is a very corrupting place.”

Intelligence experts cannot ignore the potentiality of hidden services and their appeal on ISIS groups and other terrorist organizations as explained by the professor Edin Mujkic University at the Colorado Springs University 
“Even if, hypothetically, ISIS is destroyed next year, that doesn’t guarantee that some other group isn’t going to show up and use the same tactics because now they learned from them,” said Mujkic.

Militants of the ISIS have a deep knowledge of new technologies, recently representatives of the US Government warned about the Electronic War against western counties.

The Defense Advanced Research Projects Agency (DARPA) is spending a significant effort to realize a technology that is able to de-anonymize Tor users and track their location. Recently the Agency presented MEMEX, a new set of search tools designed to improve researches into the “Deep Web”.
“We need a technology to discover where that content is and make it available for analysis,” said Chris White of the DARPA. “MEMEX allows you to characterize how many websites there are and what kind of content is on them, ” White said. “It was actually first developed to track down human trafficking on the web — it’s an idea that works for an illicit activity users try to keep hidden.”

Security Affairs

 

 

« US DoD Signals Silicon Valley's Importance in CyberWar
Iran Suffering a Techno Gap in Cyber Defense »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NICE Systems

NICE Systems

NICE Systems provide software solutions to ensure compliance, fight financial crime, and safeguard people and assets.

Global Payments

Global Payments

Global Payments is a leading worldwide provider of payment technology services. Our Fraud Management Solutions help you optimise conversion and reduce the cost of fraud to your business.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

ThreatQuotient

ThreatQuotient

ThreatQuotient delivers an open and extensible threat intelligence platform to provide defenders the context, customization and collaboration needed for increased security effectiveness.

Titanium Industrial Security

Titanium Industrial Security

Titanium Industrial Security specializes in advising and accompanying companies on cybersecurity in Connected Industry (Industry 4.0 / Smart Factory / IIoT).

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Airbus Bizlab

Airbus Bizlab

Airbus BizLab is a global accelerator, where startups and Airbus entrepreneurs speed up the transformation of innovative ideas into valuable businesses. Areas of focus include AI and Cybersecurity.

Hackinsure

Hackinsure

Front Row Insurance’s Hackinsure provides protection against online hazards including Cyber Liability, Theft & Fraud, Business Interruption, Extortion & Ransomware, Forensic Investigation.

Blackfoot Cybersecurity

Blackfoot Cybersecurity

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations.

Secureframe

Secureframe

Companies from startups to enterprises use Secureframe to automate SOC 2 and ISO 27001 compliance, complete audits, and continuously monitor their security.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.