Otago Daily Times

Terrorists’ use of dark net prompts warning

Authoritie­s must deny extremists the use of safe havens in cyberspace as terrorists ‘‘plot in shadows of the dark net’’, a report warns. Mark Townsend , of The Observer, reports.

-

TERRORISTS and extremists are creating growing numbers of safe havens on the ‘‘dark net’’ to plot future attacks, raise funds and recruit new followers, new research reveals.

Terrorist organisati­ons and individual­s are evading security services and intelligen­ce agencies by ‘‘hiding in the shadows’’ of the dark net, using encrypted messaging services to communicat­e and anonymous cryptocurr­encies such as Bitcoin to generate funds.

Researcher­s for the Henry Jackson Society, a foreign policy thinktank, say groups have also been able to create a reservoir of extremist propaganda, saving it from deletion by the security services or tech companies.

Following the five terror attacks on British soil in 2017, the UK Government has dedicated more time and funds to tackling online extremism, yet the report argues more attention should be paid to the dark net because extremists are still able to operate unchalleng­ed on the anarchic platform.

Researcher­s said the current encrypted communicat­ion app of choice is Telegram, which Islamic State has encouraged members to use, with messages including explanatio­ns on how to access new dark net sites linked to the group. In November 2017, an al Qaedalinke­d organisati­on called alSadaqah used a public channel on Telegram to campaign for Bitcoin funding.

The report’s author, Nikita Malik, said: ‘‘We have denied Islamic State territory in the real world, but it has a whole new safe haven in cyberspace which we need first to understand and then to close down.

‘‘The authoritie­s must move urgently to increase their knowledge of terrorists’ activities in cyberspace and their use of technologi­es such as Bitcoin. Regulation in this area has to move carefully if we are to balance liberties with guarding against threats to our security — but the time has come to deny extremists the space they need online to plan fresh atrocities.’’

Malik identified numerous sites on the dark net that explain how to make TATP — triacetone triperoxid­e — which can be made from household chemicals and was used in the jihadist attacks in Paris in November 2015, Brussels in March 2016, Manchester in

May 2017 and Parsons Green, London, in September 2017.

One study last year found that of 811 armsrelate­d listings on 24 dark net cryptomark­ets, 208 were ebooks with instructio­ns for the manufactur­e of explosives or firearms at home.

A preliminar­y search on the dark net on January 18 by Malik found 1101 results for instructio­nal material related to ‘‘security’’, including guides on drugs, fraud, hacking and firearms. The Anarchist Cookbook, which contains bombmaking instructio­ns, was available for sale for 0.0003 Bitcoin ($NZ3.20).

Other focal points for discussion on dark net forums included ‘‘how to make bombs, plan loneactor terrorist attacks ... how to use vehicles as weapons, where to stab people for maximum effect, and how to create a fake suicide vest or mask their activity, with the aim of convincing potential recruits to undertake their own attacks’’.

Lord Trimble, a member of the British Parliament’s joint committee on the national security strategy and former first minister of Northern Ireland, said: ‘‘While the first decade of the century was defined by the battle against jihadist ‘safe havens’ . . . this report draws attention to the possible rise of ‘virtual safe havens’: encrypted communicat­ion channels, hidden portions of the internet, cryptocurr­ency accounts that are not registered with any banks and more.’’

The report’s recommenda­tions include a new internet regulatory body with the role of scrutinisi­ng tech companies’ efforts to remove extremist content, along with extra resources for the Joint Terrorism Analysis Centre to accrue dark net intelligen­ce. It also advocates social media firms should ensure extremist material is not lost when it is deleted, but is archived to help develop a better understand­ing of extremists’ online behaviour. — Guardian News and Media

The authoritie­s must move urgently to

increase their knowledge of terrorists’ activities in cyberspace

 ?? PHOTO: GETTY IMAGES ?? How to hide . . . A computer monitor shows the Tor Project website landing page. Tor is one of the anonymity networks that allows users to access encrypted websites on the Deep Web.
PHOTO: GETTY IMAGES How to hide . . . A computer monitor shows the Tor Project website landing page. Tor is one of the anonymity networks that allows users to access encrypted websites on the Deep Web.

Newspapers in English

Newspapers from New Zealand