Beyond the Surface: Exploring the Next Level of Terrorism on the Dark Web
Abstract
Keywords
Full Text:
PDFReferences
Abas, Zulkifli T., Fence M. Wantu, and Lisnawaty W. Badu. “The Police’s Part in Preventing Online Prostitution Utilizing MiChat Application in Gorontalo City.” Distruption Law Review 1, no. 1 (2023): 43.
Ali, Atif, and Muhammad Shareh Qazi. “Darknet: The Study of Emerging Challenges of Cyber Terrorism and Organized Crimes.” Pakistan Journal of Terrorism Research 4, no. 2 (2022): 96–113.
Balhara, Amit, Sunil Ubba, Yugal Sharma, and Pronika Chawla. “Exploring and Analyzing Dark Web.” In SSRN Electronic Journal, 1–5. SSRN, 2021. https://www.ssrn.com/abstract=3879619.
Bermudez, Dario, Jeremiah Onaolapo, Gianluca Stringhini, and Mirco Musolesi. “Under and over the Surface: A Comparison of the Use of Leaked Account Credentials in the Dark and Surface Web.” Crime Science 7, no. 17 (2018): 1–11. https://doi.org/10.1186/s40163-018-0092-6.
Beshiri, Arbër, and Arsim Susuri. “Dark Web and Its Impact in Online Anonymity and Privacy: A Critical Analysis and Review.” Journal of Computer and Communications 7 (2019): 30–43. https://doi.org/10.4236/jcc.2019.73004.
Broadhurst, Roderic, Hannah Woodford Smith, Maxim Donald, and Bianca Sabol. “Cyber Terrorism: Research Review.” Australian National University, Cybercrime Observatory, 2017.
Cascavilla, Giuseppe, Damian Tamburri, and Willem-Jan Heuvel. “Cybercrime Threat Intelligence: A Systematic Multi-Vocal Literature Review.” Computers & Security, 2021, 1–26. https://doi.org/10.1016/j.cose.2021.102258.
Counter Extremism Project. “Terrorists on Telegram.” Accessed February 13, 2025. https://www.counterextremism.com/terrorists-on-telegram.
Dion-Schwarz, Cynthia, David Manheim, and Patrick Johnston. “Terrorist Use of Cryptocurrencies: Technical and Organizational Barriers and Future Threats.” Santa Monica, Calif: RAND Corporation, 2019. https://doi.org/10.7249/RR3026.
Dodd, Vikram. “British Airways Worker Rajib Karim Convicted of Terrorist Plot.” The Guardian. Accessed February 14, 2025. https://www.theguardian.com/uk/2011/feb/28/british-airways-bomb-guilty-karim.
Finklea, Kristin. “The Dark Web: An Overview.” Congressional Research Service, 2024. https://crsreports.congress.gov.
Firmansyah Isa, Muh. “Causes and Efforts to Counter a Crime.” Estudiante Law Journal 4, no. 2 (October 15, 2022): 788–800. https://doi.org/10.33756/eslaj.v4i2.18273.
GeeksforGeeks. “Triple DES (3DES).” Accessed February 14, 2025. https://www.geeksforgeeks.org/triple-des-3des/.
Graham, Robert. “How Terrorists Use Encryption.” CTC Sentinel 9, no. 6 (2016): 20–25.
Gupta, Abhineet, Sean B Maynard, and Atif Ahmad. “The Dark Web Phenomenon: A Review and Research Agenda.” Perth: Association for Information Systems Electronic Library, 2019. https://aisel.aisnet.org/acis2019/1.
Ismail, Dian Ekawaty, Yusna Arsyad, Ahmad Ahmad, Novendri M. Nggilu, and Yassine Chami. “Collocation of Restorative Justice with Human Rights in Indonesia.” Legality : Jurnal Ilmiah Hukum 32, no. 2 (September 20, 2024): 394–417. https://doi.org/10.22219/ljih.v32i2.35374.
Ivanov, Eduard. “Combating Cyberterrorism under International Law.” Baltic Yearbook of International Law 14 (2014): 55–69.
Kadir, Nadiah Khaeriah, Judhariksawan Judhariksawan, and Maskun Maskun. “Terrorism and Cyberspace: A Phenomenon of Cyber-Terrorism as Transnational Crimes.” Fiat Justisia: Jurnal Ilmu Hukum 13, no. 4 (2019): 333–44. https://doi.org/10.25041/fiatjustisia.v13no4.1735.
Kamps, Josh, and Bennett Kleinberg. “To the Moon: Defining and Detecting Cryptocurrency Pump-and-Dumps.” Crime Science 7, no. 18 (2018): 1–18. https://doi.org/10.1186/s40163-018-0093-5.
Kaur, Shubhdeep, and Sukhchandan Randhawa. “Dark Web: A Web of Crimes.” Wireless Personal Communications 112, no. 1 (2020): 1–28. https://doi.org/10.1007/s11277-020-07143-2.
Krumova, Snezhana. “From Surface to the Dark Web in the Realm of Terrorism.” Law and Internet Foundation. Accessed February 13, 2025. https://www.netlaw.bg/en/a/from-surface-to-the-dark-web-in-the-realm-of-terrorism.
Malik, Nikita. “Terror in the Dark: How Terrorists Use Encryption, the Darknet, and Cryptocurrencies.” London: The Henry Jackson Society, 2018.
Mandela, Ngaira, Tumaini Mbinda, and Felix Etyang. “Combating Dark Web Terrorism: Strategies for Disruption and Prevention.” International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 856–63. https://doi.org/10.22214/ijraset.2023.55259.
Merriam-Webster. “Anonymity.” Accessed February 14, 2025. https://www.merriam-webster.com/thesaurus/anonymity.
Michael, Barak. “The Telegram Chat Software as an Arena of Activity to Encourage the ‘Lone Wolf’ Phenomenon.” International Institute for Counter-Terrorism (IST), 2016. https://ict.org.il/the-telegram-chat-software-as-an-arena-of-activity-to-encourage-the-lone-wolf-phenomenon/.
Nazah, Saiba, Shamsul Huda, Jemal Abawajy, and Mohammad Mehedi Hassan. “Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach.” IEEE Access 8 (2020): 171796–819. https://doi.org/10.1109/ACCESS.2020.3024198.
Nggilu, Novendri, Mohamad Rivaldi Moha, Muhammad Ridho Sinaga, and Adelia Rachmaniar. “Judicial Review of Constitutional Amendments: Comparison Between India, Germany, Colombia, and the Relevancy with Indonesia.” Lex Scientia Law Review 8, no. 1 (September 22, 2024). https://doi.org/10.15294/lslr.v8i1.1901.
Nithya, B, and P Sripriya. “A Review of Cryptographic Algorithms in Network Security.” International Journal of Engineering and Technology 8, no. 1 (2016): 324–31.
Ranjan, Dipesh. “Mitigating Dark Web Risks: The Role Of AI And Machine Learning.” Forbes. Accessed February 13, 2025. https://www.forbes.com/councils/forbestechcouncil/2023/05/18/mitigating-dark-web-risks-the-role-of-ai-and-machine-learning/.
Rauf, Sofyan. “The Ideal Model for Returning Criminal Case Files Based on the Integrated Criminal Justice System Approach.” Philosophia Law Review 4, no. 1 (2024): 21–42.
Rawat, Romil, Olukayode Oki, Rajesh Chakrawarti, Temitope Adekunle, José Gonzáles, and Sunday Ajagbe. “Autonomous Artificial Intelligence Systems for Fraud Detection and Forensics in Dark Web Environments.” Informatica 47 (2023): 51–62. https://doi.org/10.31449/inf.v46i9.4538.
Saleem, Javeriah, Rafiqul Islam, and Muhammad Ashad Kabir. “The Anonymity of the Dark Web: A Survey.” IEEE Access 10 (2022): 33628–60. https://doi.org/10.1109/ACCESS.2022.3161547.
Sharma, Kanika, and Tanvi Bhalla. “Future Towards Danger: The Terror of Cyber Attacks.” IITM Journal of Management and IT 6, no. 1 (2015): 90–94.
Sönmez, Eda, and Keziban Seçkin Codal. “Terrorism in Cyberspace : A Critical Review of Dark Web Studies under the Terrorism Landscape.” Sakarya University Journal of Computer and Information Sciences 5, no. 1 (2022): 1–21. https://doi.org/10.35377/saucis.05.01.950746.
Spalevic, Zaklina, and Milos Ilic. “The Use of Dark Web for the Purpose of Illegal Activity Spreading.” Ekonomika 63, no. 1 (2017): 73–82. https://doi.org/10.5937/ekonomika1701073S.
Sufi Amalia, Cici Riski, Arista Ulfa Anggraini, Dominikus Rato, and Fendi Setyawan. “Non-Penal Policy in Tackling Cyber-Bullying Through Integrated Cyber-Prevention.” JURNAL LEGALITAS 17, no. 1 (April 29, 2024): 38–48. https://doi.org/10.33756/jelta.v17i1.24900.
TechTarget. “Advanced Encryption Standard (AES).” Accessed February 13, 2025. https://www.techtarget.com/searchsecurity/definition/Advanced-Encryption-Standard.
TRAC. “Massive Migration to Telegram, the New Jihadist Destination.” Accessed February 13, 2025. https://trackingterrorism.org/chatter/trac-insight-massive-jihadi-migration-twitter-telegram/.
Trozze, Arianna, Josh Kamps, Eray Arda Akartuna, Florian J. Hetzel, Bennett Kleinberg, Toby Davies, and Shane D. Johnson. “Cryptocurrencies and Future Financial Crime.” Crime Science 11, no. 1 (2022): 1–35. https://doi.org/10.1186/s40163-021-00163-8.
Vilić, M. Vida. “Dark Web, Cyber Terrorism and Cyber Warfare: Dark Side of the Cyberspace.” Balkan Social Science Review 10 (2017): 7–25.
Weimann, Gabriel. “Going Darker? The Challenge of Dark Net Terrorism.” Washington, DC: Wilson Center, 2018.
———. “Terrorist Migration to the Dark Web.” Perspectives on Terrorism 10, no. 3 (2016): 40–44.
DOI: https://doi.org/10.33756/jlr.v7i1.26150
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Nur Fadhilah Mappaselleng, Nadiah Khaeriah Kadir, Abd. Kadir Ahmad, Zul Khaidir Kadir, Normiati

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Powered by Public Knowledge Project OJS.
Jambura Law Rev. has been indexed by:
![]() | ![]() | ![]() | ![]() |
![]() | |||
Jambura Law Rev. has been available at:
![]() | ![]() | ![]() | ![]() |