After Paris, ISIS Moves Propaganda Machine to Darknet

Less than a day after the horrific attacks in Paris, Daesh took the Al-Hayat propaganda machine to the Darknet and published a new video celebrating the Paris attacks.

Al-Hayat is one of the most known sources of ISIS propaganda, providing media agencies around the world with original video content from Islamic State (ISIS, ISIL, Daesh) members.

The Al-Hayat group consists of numerous sites across the Internet, of which the Ansar Khilafah blog and the Shamikh forum are the biggest.

In a series of blog posts and messages sent to its users right after the ISIS Paris attacks, Al-Hayat has informed members that the agency's Shamikh forums will be moving their operations entirely to the Dark Net.

The new website is a collection of propaganda by Al-Hayat Media Center, the media division of Daesh. It hosts the usual anti-Western iconography, as well as songs (Nasheeds) and poems for mujahids in various locations.

The website also contains translations from the recent statement issued by Daesh claiming credit for the Paris attacks in English, Turkish, and Russian.
 
In a post on the Shamikh forum (a known jihadi bulletin board), someone posted the new address and instructions for reaching it.

The post explained that the new Al-Hayat hub was needed, because other websites were removed almost as soon as they are registered. The hope is that by existing on the Darknet, Daesh can thwart most efforts to shut them down.

Over the years, there have been several claims made that Daesh had propaganda and recruitment hubs on the Darknet, but no one has ever published proof of those claims or explored how the propaganda machine operates in public.

"The site mirrors many of the other standard bulletin boards that the jihadi’s have had over the years replete with videos and sections in all languages. Given that this site has popped up today in the Darknet just post the attacks in Paris, one has to assume that an all out media blitz is spinning up by Al-Hayat to capitalize on the situation," Terban wrote.

In the hours after the public started to realize the scope of the attacks on Paris, intelligence officials, lawmakers, and pundits focused on Daesh's use of Telegram as a means of communication with supporters and active members.
In a story by the New York Times, later removed without explanation [archive], the situation in Paris was used to reignite the encryption debate.
The story focused on comments from European officials who were "briefed on the investigation" that said the Paris attackers had used encrypted communications, adding that authorities have a hard time monitoring such channels.

"Intelligence officials have been pressing for more leeway to counter the growing use of encryption," the story added.

But newspaper of record isn't the only agency attempting to turn the terror attacks in Paris into a tool to remove privacy.

The Snooper's Charter is draft legislation that if passed would require ISPs and telecom companies to maintain records of each user's Internet browsing activity, including social media, email, VoIP, gaming, and mobile phone messaging services, while storing this data for up to 12 months.

"In the coming weeks the government’s surveillance bill will be passing through the Commons. If we truly believe in standing in solidarity with Paris, we must let it pass. We must demand it passes," the Telegraph article states.

In September, the Washington Post published a story detailing comments made by the intelligence community's top lawyer, Robert S. Litt, who wrote in an email to colleagues that, while "the legislative environment is very hostile" towards efforts to weaken encryption, "it could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement."

During a Face the Nation broadcast, Mike Morell, former deputy director of the Central Intelligence Agency, opened the door for more fighting about encryption by stating that a public debate was needed.

As the newly launched Daesh propaganda portal proves, terrorists and criminals will always find away around laws and law enforcement efforts such as bulk collection.

Bulk record collection and weakened encryption will do nothing to stop terrorism. Using the attacks in Paris as an excuse to do both of those things is insulting to the good men and women who died this weekend.

Softpedia:     CSO

 

« Thailand’s Military to Set Up New Cyberwar Unit
Anonymous Acts on Cyber War Threat »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

CTERA Networks

CTERA Networks

CTERA provides cloud storage solutions that enable service providers and enterprises to launch managed storage, backup, file sharing and mobile collaboration services using a single platform.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.

CoGuard

CoGuard

CoGuard is a patented solution that uses AI driven automation to provide fast, cost effective white-box penetration testing, infrastructure audits and infrastructure design services.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.