Terrorism in Cyberspace : A Critical Review of Dark Web Studies under the Terrorism Landscape

Crime, terrorism, and other illegal activities are increasingly taking place in cyberspace. Crime in the dark web is one of the most serious challenges confronting governments around the world. Dark web makes it difficult to detect criminals and track activities, as it provides anonymity due to special tools such as TOR. Therefore, it has evolved into a platform that includes many illegal activities such as pornography, weapon trafficking, drug trafficking, fake documents, and more specially terrorism as in the context of this paper. Dark web studies are critical for designing successful counter-terrorism strategies. The aim of this research is to conduct a critical analysis of the literature and to demonstrate research efforts in dark web studies related to terrorism. According to result of study, the scientific studies related to terrorism activities have been minimally conducted and the scientific methods used in detecting and combating them in dark web should be varied. Advanced artificial intelligence, image processing and classification by using machine learning, natural language processing methods, hash value analysis, and sock puppet techniques can be used to detect and predict terrorist incidents on the dark web.

___

[1] S. D. Keene, “Terrorism and the internet : a double-edged sword,” J. Money Laund. Control, vol. 14, no. 4, pp. 359–370, Oct. 2011, doi: 10.1108/13685201111173839.

[2] J. R. C. Nurse and M. Bada, “The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations,” Jan. 2019, doi: 10.1093/oxfordhb/9780198812746.013.36.

[3] D. Bieda and L. Halawi, “Cyberspace: A Venue for Terrorism,” 2015. Accessed: May 28, 2021. [Online]. Available: https://commons.erau.edu/publication/304.

[4] G. Weimann, “Cyberterrorism How Real Is the Threat?,” 2004. Accessed: May 28, 2021. [Online]. Available: www.usip.org.

[5] G. Weimann, “Going Darker ? The Challenge of Dark Net Terrorism,” 2015.

[6] M. Chertoff and T. Simon, “The Impact of the Dark Web on Internet Governance and Cyber Security,” Glob. Comm. Internet Govrnance, no. 6, pp. 6–8, 2015, [Online]. Available: https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf.

[7] Statista, “Internet users in the world,” 2021. https://www.statista.com/statistics/617136/digitalpopulation-worldwide/ (accessed Dec. 22, 2020).

[8] M. de Kunder, “The size of the World Wide Web (The Internet),” 2020. https://www.worldwidewebsize.com/ (accessed Dec. 21, 2020).

[9] G. Weimann, “Terrorist Migration to the Dark Web,” Perspect. Terror., vol. 10, no. 3, pp. 40–44, 2016.

[10] M. . Bergman, “The deep Web: Surfacing hidden value,” J. Electron., vol. 7, no. 1, 2001.

[11] K. Finklea, “Dark Web,” Taylor and Francis Inc., Mar. 2017. doi: 10.1080/1057610X.2015.1119546.

[12] E. Jardine, “The Dark Web Dilemma: Tor, Anonymity and Online Policing,” 2015. Accessed: Jan. 21, 2021. [Online]. Available: https://ssrn.com/abstract=2667711.

[13] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The Second-Generation Onion Router,” 2004.

[14] B. Berton, “The dark side of the web : ISIL ’ s one-stop shop ?,” no. June, pp. 1–2, 2015, doi: 10.2815/454889.

[15] N. Tavabi, N. Bartley, A. Abeliuk, S. Soni, E. Ferrara, and K. Lerman, “Characterizing activity on the deep and dark web,” Web Conf. 2019 - Companion World Wide Web Conf. WWW 2019, pp. 206–213, 2019, doi: 10.1145/3308560.3316502.

[16] D. Moore and T. Rid, “Cryptopolitik and the darknet,” Survival (Lond)., vol. 58, no. 1, pp. 7–38, Jan. 2016, doi: 10.1080/00396338.2016.1142085.

[17] N. Malik, “Terror in the Dark,” London, 2018. [Online]. Available: http://henryjacksonsociety.org/wp-content/uploads/2018/04/Terror-in-the-Dark.pdf.

[18] S. Alayda, N. A. Almowaysher, F. Alserhani, and M. Humayun, “Terrorism on Dark Web,” vol. 12, no. 10, pp. 3000–3005, 2021.

[19] Statista, “Global economic costs of terrorism 2019,” 2021. https://www.statista.com/statistics/489649/global-economic-costs-of-terrorism/ (accessed May 09, 2021).

[20] U. N. H. C. for H. Rights, “Negative effects of terrorism on the enjoyment of all human rights and fundamental freedoms,” Ge, vol. 23159, no. December 2016, 2016, [Online]. Available: https://documents-ddsny.un.org/doc/UNDOC/GEN/G16/444/16/PDF/G1644416.pdf?OpenElement.

[21] Statista, “Number of fatalities due to terrorist attacks worldwide between 2006 and 2019,” 2021. https://www.statista.com/statistics/202871/number-of-fatalities-by-terrorist-attacks-worldwide/ (accessed May 09, 2021).

[22] H. Bardwell and M. Iqbal, “The Economic Impact of Terrorism from 2000 to 2018,” Peace Econ. Peace Sci. Public Policy, 2020, doi: 10.1515/peps-2020-0031.

[23] N. ÇELİK and M. KARAÇUKA, “Terör Saldırılarının Yerli ve Yabancı Turistlerin Destinasyon Tercihleri Üzerindeki Etkileri: Türkiye İBBS-II Bölgeleri’ne Yönelik Mekansal Bir Analiz,” Akdeniz Üniversitesi İktisadi ve İdari Bilim. Fakültesi Derg., pp. 204–222, May 2019, doi: 10.25294/auiibfd.559403.

[24] Y. Özkaya and T. Şimşek, “THE RELATIONSHIP BETWEEN TERRORISM AND FINANCIAL STRUCTURE TERÖR VE FİNANSAL YAPI ARASINDAKİ İLİŞKİ ÖZ,” 2017.

[25] BBC, “Iraq’s Yazidi community buries 104 victims of IS massacre,” Feb. 07, 2014. https://www.bbc.com/news/world-middle-east-55968068 (accessed May 28, 2021).

[26] RAND, “Terrorist Organizations,” 2021. https://www.rand.org/topics/terrorist-organizations.html (accessed May 09, 2021).

[27] IEP, “GLOBAL TERRORISM INDEX 2020,” 2020.

[28] E. C. Viano, “Cybercrime: Definition, Typology, and Criminalization Defining Cybercrime,” 2017, doi: 10.1007/978-3-319-44501-4_1.

[29] A. Chandra and M. J. Snowe, “A taxonomy of cybercrime: Theory and design,” Int. J. Account. Inf. Syst., vol. 38, Sep. 2020, doi: 10.1016/J.ACCINF.2020.100467.

[30] S. Gordon and R. Ford, “On the definition and classification of cybercrime,” J. Comput. Virol., vol. 2, no. 1, pp. 13–20, Aug. 2006, doi: 10.1007/S11416-006-0015-Z.

[31] C. Wu and J. Wang, “Analysis of Cyberterrorism and Online Social Media,” vol. 351, no. Mmetss, pp. 925–927, 2019.

[32] G. Weimann, “Terror in Cyberspace,” 2009. https://www.researchgate.net/publication/45380139_Terror_in_Cyberspace (accessed May 28, 2021).

[33] G. Weimann, “Going Dark: Terrorism on the Dark Web,” Stud. Confl. Terror., vol. 39, no. 3, pp. 195–206, 2016, doi: 10.1080/1057610X.2015.1119546.

[34] CTIT, “Countering the Use of the Internet for Terrorist Purposes— Legal and Technical Aspects,” 2011. Accessed: May 09, 2021. [Online]. Available: www.un.org/terrorism/internet.

[35] J. Qin, Y. Zhou, E. Reid, G. Lai, and H. Chen, “Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity,” Int. J. Hum. Comput. Stud., vol. 65, no. 1, pp. 71–84, Jan. 2007, doi: 10.1016/j.ijhcs.2006.08.012.

[36] K. Hausken, “The dynamics of terrorist organizations,” Oper. Res. Perspect., vol. 6, Jan. 2019, doi: 10.1016/j.orp.2019.100120.

[37] D. Harman, “U.S.-based ISIS cell fundraising on the dark web, new evidence suggests - Haaretz Com - Haaretz.com,” Apr. 10, 2015. https://www.haaretz.com/.premium-isis-uses-bitcoin-forfundraising-1.5366305 (accessed Jan. 24, 2021).

[38] The Institute for National Security Studies (INSS), “Backdoor Plots: The Darknet as a Field for Terrorism,” 2013. https://www.inss.org.il/index.aspx?id=4538&articleid=5574 (accessed Jan. 24, 2021).

[39] Ş. Pektaş and J. Leman, “Militant Jihadism Today and Tomorrow,” 2019.

[40] MEMRI, “The ‘Dark Web’ And Jihad: A Preliminary Review Of Jihadis’ Perspective On The Underside Of The World Wide Web ,” May 21, 2014. https://www.memri.org/jttm/dark-web-andjihad-preliminary-review-jihadis-perspective-underside-world-wide-web (accessed Jan. 28, 2021).

[41] A. Stenersen, Al-Qaida’s Quest for Weapons of Mass Destruction: The History behind the Hype. VDM Verlag Dr. Müller, 2008.

[42] G. D. Koblentz, “Emerging Technologies and the Future of CBRN Terrorism,” Wash. Q., vol. 43, no. 2, pp. 177–196, Apr. 2020, doi: 10.1080/0163660X.2020.1770969.

[43] BBC, “Munich shooting: Manhunt after deadly attack at shopping centre - BBC News,” 2016. https://www.bbc.com/news/world-europe-36870874 (accessed Jan. 22, 2021).

[44] R. Bender and C. Alessi, “Munich Shooter Likely Bought Reactivated Pistol on Dark Net - WSJ,” Jul. 24, 2016. https://www.wsj.com/articles/munich-shooter-bought-recommissioned-pistol-ondark-net-1469366686 (accessed Jan. 22, 2021).

[45] V. Vilic, “DARK WEB, CYBER TERRORISM AND CYBER WARFARE: DARK SIDE OF THE CYBERSPACE,” 2007. https://www.researchgate.net/publication/324720749_DARK_WEB_CYBER_TERRORISM_AN D_CYBER_WARFARE_DARK_SIDE_OF_THE_CYBERSPACE (accessed May 10, 2021).

[46] Clarivate, “Web of Science,” 2021. https://clarivate.com/webofsciencegroup/solutions/web-ofscience/ (accessed Sep. 22, 2021).

[47] J. Qin, Y. Zhou, G. Lai, E. Reid, M. Sageman, and H. Chen, “The dark web portal project: Collecting and analyzing the presence of terrorist groups on the web,” in Lecture Notes in Computer Science, 2005, vol. 3495, pp. 623–624, doi: 10.1007/11427995_78.

[48] J. Qin, Y. Zhou, E. Reid, G. Lai, and H. Chen, “Unraveling International Terrorist Groups’ exploitation of the Web: Technical sophistication, media richness, and web interactivity,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006, vol. 3917 LNCS, pp. 4–15, doi: 10.1007/11734628_2.

[49] J. Xu, H. Chen, Y. Zhou, and J. Qin, “On the topology of the dark web of terrorist groups,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006, vol. 3975 LNCS, pp. 367–376, doi: 10.1007/11760146_32.

[50] J. R. Scanlon and M. S. Gerber, “Forecasting Violent Extremist Cyber Recruitment,” IEEE Trans. Inf. Forensics Secur., vol. 10, no. 11, pp. 2461–2470, Nov. 2015, doi: 10.1109/TIFS.2015.2464775.

[51] T. Sabbah, A. Selamat, M. H. Selamat, R. Ibrahim, and H. Fujita, “Hybridized term-weighting method for Dark Web classification,” Neurocomputing, vol. 173, pp. 1908–1926, 2016, doi: 10.1016/j.neucom.2015.09.063.

[52] S. Celik, “Tertiary-level internet users’ opinions and perceptions of cyberhate,” Inf. Technol. People, vol. 31, no. 3, pp. 845–868, May 2018, doi: 10.1108/ITP-05-2017-0147.

[53] J. Dalins, C. Wilson, and M. Carman, “Criminal motivation on the dark web: A categorisation model for law enforcement,” Digit. Investig., vol. 24, pp. 62–71, Mar. 2018, doi: 10.1016/j.diin.2017.12.003.

[54] J. K. Saini and D. Bansal, “A Comparative Study and Automated Detection of Illegal Weapon Procurement over Dark Web,” Cybern. Syst., vol. 50, no. 5, pp. 405–416, Jul. 2019, doi: 10.1080/01969722.2018.1553591.

[55] Y. Yang, A. R. Pah, and B. Uzzi, “Quantifying the future lethality of terror organizations,” Proc. Natl. Acad. Sci. U. S. A., vol. 116, no. 43, pp. 21463–21468, Oct. 2019, doi: 10.1073/pnas.1901975116.

[56] A. Alharbi et al., “A Link Analysis Algorithm for Identification of Key Hidden Services,” Comput. Mater. Contin., vol. 68, no. 1, pp. 877–886, Mar. 2021, doi: 10.32604/cmc.2021.016887.

[57] R. H. Kallet, “How to Write the Methods Section of a Research Paper,” Respir. Care 49, pp. 1229– 1232, 2004.

[58] M. Edwards, A. Rashid, and P. Rayson, “A systematic survey of online data mining technology intended for law enforcement,” ACM Comput. Surv., vol. 48, no. 1, Sep. 2015, doi: 10.1145/2811403.

[59] G. Kalpakis et al., “OSINT and the dark web,” in Advanced Sciences and Technologies for Security Applications, Springer, 2016, pp. 111–132.

[60] D. Jaclin, “Poached lives, traded forms: Engaging with animal trafficking around the globe,” Soc. Sci. Inf., vol. 55, no. 3, pp. 400–425, Sep. 2016, doi: 10.1177/0539018416648233.

[61] A. AL-Imam et al., “Captagon: use and trade in the Middle East,” Hum. Psychopharmacol., vol. 32, no. 3, May 2017, doi: 10.1002/hup.2548.

[62] K. Paul, “Ancient Artifacts vs. Digital Artifacts: New Tools for Unmasking the Sale of Illicit Antiquities on the Dark Web,” Arts, vol. 7, no. 2, p. 12, Mar. 2018, doi: 10.3390/arts7020012.

[63] A. R. Thomas and R. M. Schwartz, “At-risk populations to unintentional and intentional fentanyl and fentanyl+ exposure,” J. Transp. Secur., vol. 12, no. 3–4, pp. 73–82, Dec. 2019, doi: 10.1007/s12198-019-00202-1.

[64] H. Chen, W. C. Chung, J. Qin, E. Reid, M. Sageman, and G. Weimann, “Uncovering the DarkWeb: A Case Study of Jihad on the Web,” J. Am. Soc. Inf. Sci. Technol., vol. 59, no. 8, pp. 1347–1359, 2008, doi: 10.1002/asi.

[65] H. Chen, “From Terrorism Informatics to Dark Web Research,” 2011, pp. 317–341.

[66] A. Baravalle, M. S. Lopez, and S. W. Lee, “Mining the Dark Web: Drugs and Fake Ids,” IEEE Int. Conf. Data Min. Work. ICDMW, vol. 0, pp. 350–356, 2016, doi: 10.1109/ICDMW.2016.0056.

[67] CIGI-IPSOS, “2019 CIGI-Ipsos Global Survey on Internet Security and Trust,” 2019. https://www.cigionline.org/internet-survey-2019 (accessed Mar. 20, 2021).

[68] A. Silke, “Research on Terrorism,” 2008, pp. 27–50.

[69] Y. Yang, A. R. Pah, and B. Uzzi, “Quantifying the future lethality of terror organizations,” vol. 116, no. 43, pp. 21463–21468, 2019, doi: 10.1073/pnas.1901975116.

[70] A. Belasco, “The Cost of Iraq, Afghanistan, and Other Global War on Terror Operations Since 9/11,” 2014. Accessed: Jun. 02, 2021. [Online]. Available: www.crs.gov.

[71] F. . Stokman, “Social Network Analysis,” Int. Encycl. Soc. Behav. Sci., 2001, Accessed: Apr. 27, 2021. [Online]. Available: https://www.sciencedirect.com/topics/social-sciences/social-networkanalysis.

[72] S. Nazah, S. Huda, J. Abawajy, and M. M. Hassan, “Evolution of dark web threat analysis and detection: A systematic approach,” IEEE Access, vol. 8, pp. 171796–171819, 2020, doi: 10.1109/ACCESS.2020.3024198.

[73] N. Memon and H. L. Larsen, “Investigative Data Mining Toolkit: A Software Prototype for Visualizing, Analyzing and Destabilizing Terrorist Networks,” Vis. Netw. Inf., pp. 1–24, 2006.

[74] A. Luo, “What is content analysis and how can you use it in your research?,” 2019. https://www.scribbr.com/methodology/content-analysis/ (accessed Jun. 03, 2021).

[75] A. S. Beshiri and A. Susuri, “Dark Web and Its Impact in Online Anonymity and Privacy: A Critical Analysis and Review,” J. Comput. Commun., vol. 07, no. 03, pp. 30–43, 2019, doi: 10.4236/jcc.2019.73004.

[76] R. Zheng, Y. Qin, Z. Huang, and H. Chen, “Authorship analysis in cybercrime investigation,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 2665, pp. 59–73, 2003, doi: 10.1007/3-540-44853-5_5.

[77] M. Jordan, D. M. Blei, A. Y. Ng, and J. B. Edu, “Latent Dirichlet Allocation Sampling and Bayesian inference View project EM and optimization algorithms in statistical models View project Latent Dirichlet Allocation Michael I. Jordan,” 2003. Accessed: Aug. 04, 2020. [Online]. Available: https://www.researchgate.net/publication/221620547.

[78] Y. Zhou, J. Qin, E. Reid, G. Lai, and H. Chen, “Studying the presence of terrorism on the web,” 2005, p. 402, doi: 10.1145/1065385.1065505.

[79] H. Chen, “Dark Web Forum Portal,” Springer, New York, NY, 2012, pp. 257–270.

[80] A. Panchenko, A. Mitseva, M. Henze, F. Lanze, K. Wehrle, and T. Engel, “Analysis of Fingerprinting Techniques for Tor Hidden Services,” 2017, doi: 10.1145/3139550.3139564.

[81] A. A. AlQahtani and E. S. M. El-Alfy, “Anonymous connections based on onion routing: A review and a visualization tool,” Procedia Comput. Sci., vol. 52, no. 1, pp. 121–128, 2015, doi: 10.1016/j.procs.2015.05.040.

[82] H. Prunckun, “Scientific Methods of Inquiry for Intelligence Analysis,” Rowman & Littlefield, Sep. 05, 2014. https://www.amazon.com.tr/Scientific-Methods-Inquiry-IntelligenceAnalysis/dp/1442224320 (accessed Jun. 03, 2021).