ISIS In The Dark Web Amidst Bitcoin And Crime

901579-34c4bb60-a330-11e3-8dfc-d9063670fb71.jpg

While members of the ISIS are continuing to explore the Deep Web for various activities, the US Intelligence agencies plan to track them.

The Dark Web is a privileged environment for cyber criminals and state-sponsored hackers due to the anonymity offered by its services. Unfortunately, another category of threat actors is exploiting the deep web, the terrorists, for this reason, the US intelligence plans to dive in the principal DarkNet and explore the main hidden services to raise money and make propaganda in search of new followers to recruit.

The Dark Web is difficult to monitor for intelligence agencies and it is not so easy to locate members of terrorist organizations like the ISIS that share propaganda content. In the principal black markets hosted on the deep web it is possible to purchase any kind of illegal product and service, but in the dark part of the web it is possible to find propaganda videos and images. Hidden services in the Deep Web also offer the possibility to download the mobile apps used by the jihadists to communicate securely and to transfer Bitcoins to terrorist cells in every place of the world.

At a recent Foreign Affairs Forum on Cryptocurrency Policy, government officials and Bitcoin entrepreneurs discussed the future of the cryptocurrency. Law enforcement fear possible abuses of the popular crypto currency, Jennifer Shasky Calvery, head of the US Treasury Department’s Financial Crimes Enforcement Network (FinCEN), which is charged with fighting money laundering and terrorist finance, explained that the virtual currency scheme could facilitate bad actors, including terrorists.

“What keeps me up at night when I am thinking about digital currency…the real threats out there, these days we’re thinking a lot about ISIL,” Calvery declared. “How they’re moving their money, and how potential US-based individuals are becoming foreign fighters: Are they moving their money, can we identify them from the movement of their money? What does it mean if they start moving their money through bitcoin? We’ve started to see some public articles suggesting that has occurred.”

Intelligence agencies and security experts are aware that alleged members of terrorist groups, including the ISIS, are exploring different opportunities to transfer money to militants operating in Western countries. A continuous flow of a small amount of money could be instantaneously transferred to numerous accounts used by ISIS members worldwide. Micro payments could exploit several channels, including systems like PayPal or virtual currencies like the Bitcoin.
Online it is possible to find a PDF document written by a user with the pseudonymous pseudonym of Amreeki Witness titled: Bitcoin wa Sadaqat al­Jihad which translates to: “Bitcoin and the Charity of Violent Physical Struggle”. Bitcoin and the Charity of Violent Physical Struggle”. The pseudonym Amreeki authored the PDF under is Taqi’ul­Deen al­Munthir. That name translates to Righteous in Faith the-Warner.

The post makes explicit reference to dark markets like Silk Road and other Dark Net Markets explaining how it is possible to buy weapons for the Mujahideen. Of course the document explains the Bitcoin and its decentralized system and how it is possible to transfer money securely by using the Dark Wallet application to “send millions of dollars’ worth of Bitcoin instantly from the United States, United Kingdom, South Africa, Ghana, Malaysia, Sri Lanka, or wherever else right to the pockets of the Mujahideen”.

The KRDO News Channel 13 reported the testimony of a user that had seen websites that allowed visitors to donate to terrorist organizations.
“You’re talking about disrupting cartels, you’re talking about disrupting drug dealers,” explained the witness. “If you’re not prepared for it, is a very corrupting place.”

Intelligence experts cannot ignore the potentiality of hidden services and their appeal on ISIS groups and other terrorist organizations as explained by the professor Edin Mujkic University at the Colorado Springs University 
“Even if, hypothetically, ISIS is destroyed next year, that doesn’t guarantee that some other group isn’t going to show up and use the same tactics because now they learned from them,” said Mujkic.

Militants of the ISIS have a deep knowledge of new technologies, recently representatives of the US Government warned about the Electronic War against western counties.

The Defense Advanced Research Projects Agency (DARPA) is spending a significant effort to realize a technology that is able to de-anonymize Tor users and track their location. Recently the Agency presented MEMEX, a new set of search tools designed to improve researches into the “Deep Web”.
“We need a technology to discover where that content is and make it available for analysis,” said Chris White of the DARPA. “MEMEX allows you to characterize how many websites there are and what kind of content is on them, ” White said. “It was actually first developed to track down human trafficking on the web — it’s an idea that works for an illicit activity users try to keep hidden.”

Security Affairs

 

 

« US DoD Signals Silicon Valley's Importance in CyberWar
Iran Suffering a Techno Gap in Cyber Defense »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Uniken

Uniken

Uniken REL-ID is a safe, simple, and scalable security platform that tightly integrates your identity, authentication, and channel security.

Verint Systems

Verint Systems

Verint is a leader in Actionable Intelligence with a focus on customer engagement optimisation, security intelligence, fraud, risk and compliance.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

The Security Awareness Company (SAC)

The Security Awareness Company (SAC)

The Security Awareness Company provides cyber security awareness training programs for companies of all sizes.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Ballistic Ventures

Ballistic Ventures

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

Stratascale

Stratascale

Stratascale is a consultant, systems integrator, and technology advisor with expertise in Automation, Cloud Ascension, Cybersecurity, Data Intelligence, and Digital Experience solutions.

Cyber Explorers

Cyber Explorers

Cyber Explorers is a fun, free and interactive learning platform for future digital superstars. An exciting addition to UK curriculum delivery or after school activities.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.