Beyond the Surface: Exploring the Next Level of Terrorism on the Dark Web

Nur Fadhilah Mappaselleng, Nadiah Khaeriah Kadir, Abd. Kadir Ahmad, Zul Khaidir Kadir, Normiati Normiati

Abstract


The lack of effective security mechanisms on the Surface Web facilitates the occurrence of cybercrime. The high accessibility of the Surface Web also allows law enforcement agencies to more easily track and identify perpetrators. However, this motivates criminals to migrate to the Dark Web, the deepest layer of the internet that offers a higher level of security.  This research aims to analyze the communication patterns utilized by terrorists on the dark web, propaganda, recruitment, and the use of cryptocurrency in transactions and fundraising by terrorists.  The research method used is normative legal research with a conceptual and case approaches and qualitative analysis. This research analyses that terrorists have transitioned to using the Dark Net in a similar manner to how they have utilized the Surface Web over the past several decades, but there are now additional opportunities for tech-savvy operatives. Three main features, anonymity, encrypted messaging, and the use of cryptocurrency, work together to provide an environment that is almost perfect for terrorists on the Dark Web. This combination allows terrorists to conduct their operations more effectively and covertly, making the Dark Web a highly valuable tool for achieving their goals without significant risk of exposure and disruption by security authorities.

Keywords


Anonymity; Cryptocurrency; Encryption; Dark Web; Terrorism

Full Text:

PDF

References


Abas, Zulkifli T., Fence M. Wantu, and Lisnawaty W. Badu. “The Police’s Part in Preventing Online Prostitution Utilizing MiChat Application in Gorontalo City.” Distruption Law Review 1, no. 1 (2023): 43.

Ali, Atif, and Muhammad Shareh Qazi. “Darknet: The Study of Emerging Challenges of Cyber Terrorism and Organized Crimes.” Pakistan Journal of Terrorism Research 4, no. 2 (2022): 96–113.

Balhara, Amit, Sunil Ubba, Yugal Sharma, and Pronika Chawla. “Exploring and Analyzing Dark Web.” In SSRN Electronic Journal, 1–5. SSRN, 2021. https://www.ssrn.com/abstract=3879619.

Bermudez, Dario, Jeremiah Onaolapo, Gianluca Stringhini, and Mirco Musolesi. “Under and over the Surface: A Comparison of the Use of Leaked Account Credentials in the Dark and Surface Web.” Crime Science 7, no. 17 (2018): 1–11. https://doi.org/10.1186/s40163-018-0092-6.

Beshiri, Arbër, and Arsim Susuri. “Dark Web and Its Impact in Online Anonymity and Privacy: A Critical Analysis and Review.” Journal of Computer and Communications 7 (2019): 30–43. https://doi.org/10.4236/jcc.2019.73004.

Broadhurst, Roderic, Hannah Woodford Smith, Maxim Donald, and Bianca Sabol. “Cyber Terrorism: Research Review.” Australian National University, Cybercrime Observatory, 2017.

Cascavilla, Giuseppe, Damian Tamburri, and Willem-Jan Heuvel. “Cybercrime Threat Intelligence: A Systematic Multi-Vocal Literature Review.” Computers & Security, 2021, 1–26. https://doi.org/10.1016/j.cose.2021.102258.

Counter Extremism Project. “Terrorists on Telegram.” Accessed February 13, 2025. https://www.counterextremism.com/terrorists-on-telegram.

Dion-Schwarz, Cynthia, David Manheim, and Patrick Johnston. “Terrorist Use of Cryptocurrencies: Technical and Organizational Barriers and Future Threats.” Santa Monica, Calif: RAND Corporation, 2019. https://doi.org/10.7249/RR3026.

Dodd, Vikram. “British Airways Worker Rajib Karim Convicted of Terrorist Plot.” The Guardian. Accessed February 14, 2025. https://www.theguardian.com/uk/2011/feb/28/british-airways-bomb-guilty-karim.

Finklea, Kristin. “The Dark Web: An Overview.” Congressional Research Service, 2024. https://crsreports.congress.gov.

Firmansyah Isa, Muh. “Causes and Efforts to Counter a Crime.” Estudiante Law Journal 4, no. 2 (October 15, 2022): 788–800. https://doi.org/10.33756/eslaj.v4i2.18273.

GeeksforGeeks. “Triple DES (3DES).” Accessed February 14, 2025. https://www.geeksforgeeks.org/triple-des-3des/.

Graham, Robert. “How Terrorists Use Encryption.” CTC Sentinel 9, no. 6 (2016): 20–25.

Gupta, Abhineet, Sean B Maynard, and Atif Ahmad. “The Dark Web Phenomenon: A Review and Research Agenda.” Perth: Association for Information Systems Electronic Library, 2019. https://aisel.aisnet.org/acis2019/1.

Ismail, Dian Ekawaty, Yusna Arsyad, Ahmad Ahmad, Novendri M. Nggilu, and Yassine Chami. “Collocation of Restorative Justice with Human Rights in Indonesia.” Legality : Jurnal Ilmiah Hukum 32, no. 2 (September 20, 2024): 394–417. https://doi.org/10.22219/ljih.v32i2.35374.

Ivanov, Eduard. “Combating Cyberterrorism under International Law.” Baltic Yearbook of International Law 14 (2014): 55–69.

Kadir, Nadiah Khaeriah, Judhariksawan Judhariksawan, and Maskun Maskun. “Terrorism and Cyberspace: A Phenomenon of Cyber-Terrorism as Transnational Crimes.” Fiat Justisia: Jurnal Ilmu Hukum 13, no. 4 (2019): 333–44. https://doi.org/10.25041/fiatjustisia.v13no4.1735.

Kamps, Josh, and Bennett Kleinberg. “To the Moon: Defining and Detecting Cryptocurrency Pump-and-Dumps.” Crime Science 7, no. 18 (2018): 1–18. https://doi.org/10.1186/s40163-018-0093-5.

Kaur, Shubhdeep, and Sukhchandan Randhawa. “Dark Web: A Web of Crimes.” Wireless Personal Communications 112, no. 1 (2020): 1–28. https://doi.org/10.1007/s11277-020-07143-2.

Krumova, Snezhana. “From Surface to the Dark Web in the Realm of Terrorism.” Law and Internet Foundation. Accessed February 13, 2025. https://www.netlaw.bg/en/a/from-surface-to-the-dark-web-in-the-realm-of-terrorism.

Malik, Nikita. “Terror in the Dark: How Terrorists Use Encryption, the Darknet, and Cryptocurrencies.” London: The Henry Jackson Society, 2018.

Mandela, Ngaira, Tumaini Mbinda, and Felix Etyang. “Combating Dark Web Terrorism: Strategies for Disruption and Prevention.” International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 856–63. https://doi.org/10.22214/ijraset.2023.55259.

Merriam-Webster. “Anonymity.” Accessed February 14, 2025. https://www.merriam-webster.com/thesaurus/anonymity.

Michael, Barak. “The Telegram Chat Software as an Arena of Activity to Encourage the ‘Lone Wolf’ Phenomenon.” International Institute for Counter-Terrorism (IST), 2016. https://ict.org.il/the-telegram-chat-software-as-an-arena-of-activity-to-encourage-the-lone-wolf-phenomenon/.

Nazah, Saiba, Shamsul Huda, Jemal Abawajy, and Mohammad Mehedi Hassan. “Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach.” IEEE Access 8 (2020): 171796–819. https://doi.org/10.1109/ACCESS.2020.3024198.

Nggilu, Novendri, Mohamad Rivaldi Moha, Muhammad Ridho Sinaga, and Adelia Rachmaniar. “Judicial Review of Constitutional Amendments: Comparison Between India, Germany, Colombia, and the Relevancy with Indonesia.” Lex Scientia Law Review 8, no. 1 (September 22, 2024). https://doi.org/10.15294/lslr.v8i1.1901.

Nithya, B, and P Sripriya. “A Review of Cryptographic Algorithms in Network Security.” International Journal of Engineering and Technology 8, no. 1 (2016): 324–31.

Ranjan, Dipesh. “Mitigating Dark Web Risks: The Role Of AI And Machine Learning.” Forbes. Accessed February 13, 2025. https://www.forbes.com/councils/forbestechcouncil/2023/05/18/mitigating-dark-web-risks-the-role-of-ai-and-machine-learning/.

Rauf, Sofyan. “The Ideal Model for Returning Criminal Case Files Based on the Integrated Criminal Justice System Approach.” Philosophia Law Review 4, no. 1 (2024): 21–42.

Rawat, Romil, Olukayode Oki, Rajesh Chakrawarti, Temitope Adekunle, José Gonzáles, and Sunday Ajagbe. “Autonomous Artificial Intelligence Systems for Fraud Detection and Forensics in Dark Web Environments.” Informatica 47 (2023): 51–62. https://doi.org/10.31449/inf.v46i9.4538.

Saleem, Javeriah, Rafiqul Islam, and Muhammad Ashad Kabir. “The Anonymity of the Dark Web: A Survey.” IEEE Access 10 (2022): 33628–60. https://doi.org/10.1109/ACCESS.2022.3161547.

Sharma, Kanika, and Tanvi Bhalla. “Future Towards Danger: The Terror of Cyber Attacks.” IITM Journal of Management and IT 6, no. 1 (2015): 90–94.

Sönmez, Eda, and Keziban Seçkin Codal. “Terrorism in Cyberspace : A Critical Review of Dark Web Studies under the Terrorism Landscape.” Sakarya University Journal of Computer and Information Sciences 5, no. 1 (2022): 1–21. https://doi.org/10.35377/saucis.05.01.950746.

Spalevic, Zaklina, and Milos Ilic. “The Use of Dark Web for the Purpose of Illegal Activity Spreading.” Ekonomika 63, no. 1 (2017): 73–82. https://doi.org/10.5937/ekonomika1701073S.

Sufi Amalia, Cici Riski, Arista Ulfa Anggraini, Dominikus Rato, and Fendi Setyawan. “Non-Penal Policy in Tackling Cyber-Bullying Through Integrated Cyber-Prevention.” JURNAL LEGALITAS 17, no. 1 (April 29, 2024): 38–48. https://doi.org/10.33756/jelta.v17i1.24900.

TechTarget. “Advanced Encryption Standard (AES).” Accessed February 13, 2025. https://www.techtarget.com/searchsecurity/definition/Advanced-Encryption-Standard.

TRAC. “Massive Migration to Telegram, the New Jihadist Destination.” Accessed February 13, 2025. https://trackingterrorism.org/chatter/trac-insight-massive-jihadi-migration-twitter-telegram/.

Trozze, Arianna, Josh Kamps, Eray Arda Akartuna, Florian J. Hetzel, Bennett Kleinberg, Toby Davies, and Shane D. Johnson. “Cryptocurrencies and Future Financial Crime.” Crime Science 11, no. 1 (2022): 1–35. https://doi.org/10.1186/s40163-021-00163-8.

Vilić, M. Vida. “Dark Web, Cyber Terrorism and Cyber Warfare: Dark Side of the Cyberspace.” Balkan Social Science Review 10 (2017): 7–25.

Weimann, Gabriel. “Going Darker? The Challenge of Dark Net Terrorism.” Washington, DC: Wilson Center, 2018.

———. “Terrorist Migration to the Dark Web.” Perspectives on Terrorism 10, no. 3 (2016): 40–44.




DOI: https://doi.org/10.33756/jlr.v7i1.26150

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Nur Fadhilah Mappaselleng, Nadiah Khaeriah Kadir, Abd. Kadir Ahmad, Zul Khaidir Kadir, Normiati

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


Editorial Office of Jambura Law Review:
2nd Floor Pancasila building, Faculty of Law, Universitas Negeri Gorontalo
Jenderal Sudirman Street No.6, Gorontalo City, Gorontalo Province, 96128, Indonesia
Tel. +62-812-1356-9044;  +62-822-9329-6045  (SMS/WA)
E-mail: jamburalawreview@gmail.com

This work is licensed under a  Creative Commons Attribution-ShareAlike 4.0 International License. Powered by  Public Knowledge Project OJS.

 

Jambura Law Rev. has been indexed by:

SCOPUS SCOPUS DimensionBase Index
Microsoft Academic   
    
    

 

Jambura Law Rev. has been available at:

Leipzig Julich Harvard Stanford