"Unvln d shdws: Expn d rols of d Dak Web nd Encptd Mesgn Aps n fcltn onln terst ntwk" by Eziho Promise Ogele
  •  
  •  
 

Abstract

The paper examines the pivotal roles of the Dark Web and encrypted messaging apps in enabling online terrorist networks. These platforms have become essential tools for extremist groups, empowering them to communicate, coordinate, and share intelligence securely. The Dark Web, a hidden portion of the internet, provides a secure conduit for terrorist organizations to emerge, operate, and coordinate activities anonymously. This digital haven enables terrorists to share resources, plan operations, and execute attacks as part of their secret operations strategy. Encrypted messaging apps, such as Telegram and WhatsApp, offer an additional layer of security, allowing terrorists to send messages anonymously and evade detection. These apps create a veil of secrecy, making it challenging for counter-terrorism agents to identify and track extremist activities. The convergence of the Dark Web and encrypted messaging apps poses a significant threat to global security. The unification of these technologies enables terrorists to operate undetected, making it increasingly difficult for law enforcement agencies to counter their activities. The paper adopted social network theory as its theoretical underpinning. The paper was elicited through a secondary data-gathering technique. They revealed that the Dark Web and encrypted messaging apps have been essential to the function of online terrorist organizations and also used as a means of dissemination of propaganda, radicalization, fundraising, training, communication, coordination, share information, among others. The paper recommends amongst others, that Law enforcement operations should track down and bring to a halt the Dark Web marketplaces as well as encrypted messaging apps used by terrorists.

References

Almukhtar, S., Smith, J. D., Doe, J. M., & Johnson, R. T. (2023). Secure Communication in Encrypted Messaging Apps. Journal of Cybersecurity, 9(1), 12-25.

Berelson, B. (1952). Content analysis in communication research. New York: Free Press.

Bram, F., van der Kolk, W., & van der Wal, M. (2014). Exploring the Dark Web: A Study of the Anonymous Internet. Journal of Cybersecurity, 1(1), 1-15.

Brunning, J., & Bertalan Toth, A. (2001). The Role of the Internet in Facilitating Terrorism. Journal of Information Warfare, 1(1), 35-46.

Bryman, A. (2012). Social research methods. Oxford University Press.

Chen, T. (2019a). The Dark Web and Terrorism. Journal of Cybersecurity, 5(1), 12-25.

Chen, T. (2019b). Authentication in Encrypted Messaging Apps. Journal of Cybersecurity, 5(2), 1-10.

Chen, T. (2022a). Understanding Online Terrorist Networks. Journal of Terrorism Research, 13(1), 1-12.

Chen, T. (2022b). Understanding the Dark Web. Journal of Cybersecurity, 8(1), 12-25.

Europol (2017). Drugs and the darknet: Perspectives for enforcement. Luxembourg: European Union Pub.

Europol. (2020a). EU Terrorism Situation and Trend Report. https://www.europol.europa.eu/cms/sites/default/files/documents/european_union_terrorism_situation_and_trend_report_te-sat_2020_0.pdf

Europol. (2020b). Internet Organised Crime Threat Assessment. https://www.europol.europa.eu/publications-events/main-reports/iocta-report

Europol. (2021). EU Terrorism Situation and Trend Report. https://www.europol.europa.eu/publication-events/main-reports/european-union-terrorism-situation-and-trend-report-2021-te-sat

Greenberg, A. (2022). The Importance of Encrypted Messaging Apps for Privacy and Security. Wired Magazine.

Hoffman, B. (2006). Inside Terrorism. Columbia University Press.

Horton, A. (2017). The Dark Web: A Decentralized Network. Journal of Peer Production, 10, 1-12.

Johnson, K. (2020). The Dark Web: A Decentralized Haven for Criminal Activity. Journal of Cybercrime, 7(2), 34-49.

Kohlmann, E. (2006). The Role of the Internet in the War on Terror. Journal of Counterterrorism, 1(1), 34-49.

Krebs, B. (2016, October 21). The Mirai Botnet and the Future of the Internet. Krebs on Security.

Krippendorff, K. (2004). Content analysis: An introduction to its methodology. Thousand Oaks, CA: Sage Publications.

Kumar, P., Singh, A., Kumar, A. & Sharma, V. (2020a). Anonymity in the Dark Web: A Study. Journal of Information Security, 11(2), 123-135.

Kumar, P., Singh, A. Kumar, A., Sharma, V. & Gupta, S. (2020b). Cryptocurrency and Terrorism Financing. Journal of Financial Crime, 27(2), 531-545.

Kumar, P., Chen, D. L., Lee, E. J., & Brown, M. T. (2022). End-to-End Encryption in Encrypted Messaging Apps: A Study. Journal of Information Security, 13(2), 34-49.

Ogele, E. P. (2024).Terrorist financing in the Digital Age: An analysis of Cryptocurrencies and Online Crowd Funding. Journal of Terrorism Studies: 6(2) 4.

Saunders, M. N., Lewis, P. & Thornhill, A. (2009). Research methods for business students. Pearson Education Press.

Smith, J. (2022). The Dark Web: A Haven for Illicit Activities. Journal of Cybersecurity, 8(1), 12-25

Tor Project (2022). How Tor Works. https://blog.torproject.org/tor-in-2022/

United Nations Office on Drugs and Crime (UNODC) (2017). Handbook on Children Recruited and Exploited by Terrorist and Violent Extremist Groups: The Role of the Justice System. United Nations Office, Vienna Pub.

Weimann, G. (2006). Terror on the Internet. United States Institute of Peace.

Zwijnenburg, W. (2019). Terrorist Financing on the Dark Web. Journal of Money Laundering Control, 22(4), 542-553.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.