Backdoor Plots: The Darknet as a Field for Terrorism | INSS
go to header go to content go to footer go to search
INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
INSS
Tel Aviv University logo - beyond an external website, opens on a new page
  • Contact
  • עברית
  • Support Us
  • Research
    • Topics
      • Israel and the Global Powers
        • Israel-United States Relations
        • Glazer Israel-China Policy Center
        • Russia
        • Europe
      • Iran and the Shi'ite Axis
        • Iran
        • Lebanon and Hezbollah
        • Syria
        • Yemen and the Houthi Movement
        • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
        • Israeli-Palestinian Relations
        • Hamas and the Gaza Strip
        • Peace Agreements and Normalization in the Middle East
        • Saudi Arabia and the Gulf States
        • Turkey
        • Egypt
        • Jordan
      • Israel’s National Security Policy
        • Military and Strategic Affairs
        • Societal Resilience and the Israeli Society
        • Jewish-Arab Relations in Israel
        • Climate, Infrastructure and Energy
        • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
        • Data Analytics Center
        • Law and National Security
        • Advanced Technologies and National Security
        • Cognitive Warfare
        • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
      • Contemporary Antisemitism in the United States
      • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications
    • -
      • All Publications
      • INSS Insight
      • Policy Papers
      • Special Publication
      • Strategic Assessment
      • Technology Platform
      • Memoranda
      • Posts
      • Books
      • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Real-Time Tracker
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Newsletter
  • Media
    • Communications
      • Articles
      • Quotes
      • Radio and TV
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
New
Search in site
  • Research
    • Topics
    • Israel and the Global Powers
    • Israel-United States Relations
    • Glazer Israel-China Policy Center
    • Russia
    • Europe
    • Iran and the Shi'ite Axis
    • Iran
    • Lebanon and Hezbollah
    • Syria
    • Yemen and the Houthi Movement
    • Iraq and the Iraqi Shiite Militias
    • Conflict to Agreements
    • Israeli-Palestinian Relations
    • Hamas and the Gaza Strip
    • Peace Agreements and Normalization in the Middle East
    • Saudi Arabia and the Gulf States
    • Turkey
    • Egypt
    • Jordan
    • Israel’s National Security Policy
    • Military and Strategic Affairs
    • Societal Resilience and the Israeli Society
    • Jewish-Arab Relations in Israel
    • Climate, Infrastructure and Energy
    • Terrorism and Low Intensity Conflict
    • Cross-Arena Research
    • Data Analytics Center
    • Law and National Security
    • Advanced Technologies and National Security
    • Cognitive Warfare
    • Economics and National Security
    • Projects
    • Preventing the Slide into a One-State Reality
    • Contemporary Antisemitism in the United States
    • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications
    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Posts
    • Books
    • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Real-Time Tracker
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
  • Media
    • Communications
      • Articles
      • Quotes
      • Radio and TV
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Contact
  • עברית
  • Support Us
bool(false)

Publications

Home Publications INSS Insight Backdoor Plots: The Darknet as a Field for Terrorism

Backdoor Plots: The Darknet as a Field for Terrorism

INSS Insight No. 464, September 10, 2013

עברית
Yotam Rosner
Sean London
Aviad Mendelboim

The global battle against terror has done serious damage to al-Qaeda’s physical infrastructures, and thus to limit its exposure, al-Qaeda has stepped up its activity in cyberspace. Activists have learned to exploit internet technologies by using known networks to distribute material for recruitment, training, and coordination of terrorist operations. The internet has a visible side and a hidden side. The visible side includes sites that can be found through an ordinary search, while the hidden side, called the darknet, includes sites or networks that cannot be accessed by regular means. These sites serve as a platform for internet users for whom anonymity is essential, since darknet sites not only provide protection from unauthorized users but also usually include encryption to prevent monitoring.


On Friday, August 2, 2013, the US State Department published a travel warning, and in an unprecedented step, closed over twenty embassies. As expected, following the American warning other Western countries such as Great Britain, France, and Germany ordered the closure of various embassies. Several days after, the alert was reported as a response to the monitoring of a conference call among a team of terrorist leaders, including al-Qaeda’s Ayman al-Zawahiri and the heads of its affiliate organizations. It was gradually reported by anonymous intelligence sources that the information was found in the possession of an al-Qaeda courier who had recordings of the call. Minutes of the call were transmitted via the internet, and there was also a seven-hour recording of the entire call. By tracking the courier, the United States succeeded in discovering the call, which apparently took place in a part of the internet sometimes called deepnet, blacknet, or darknet.

The global battle against terror has done serious damage to al-Qaeda’s physical infrastructures, and thus to limit its exposure, al-Qaeda has stepped up its activity in cyberspace. Activists have learned to exploit internet technologies by using known networks to distribute material for recruitment, training, and coordination of terrorist operations. In the late 1990s, there were several dozen websites connected to terrorist organizations; in 2005, more than 4,000 such sites were documented.

The internet has a visible side and a hidden side. The visible side includes sites that can be found through an ordinary search, while the hidden side, called the darknet, includes sites or networks that cannot be accessed by regular means. These sites serve as a platform for internet users for whom anonymity is essential, since darknet sites not only provide protection from unauthorized users but also usually include encryption to prevent monitoring.

The obscure regions of the darknet have allowed al-Qaeda to adapt itself to the restrictions imposed by the international system and operate as a virtual terror network. A study published in 2011 reported that the darknet has more than 50,000 sites and 300 forums for terrorist organizations. Moreover, for about a decade, open sources have reported that while global jihadi activists exploit darknet for the purposes noted above, the network is mainly a platform for direct communication among leaders and organization activists. Therefore, that the darknet was used for a conversation among senior al-Qaeda officials is not surprising, and in fact, al-Zawahiri, CEO of al-Qaeda Terrorism Inc., exploits the technology at his disposal in order to communicate regularly with his senior “managers”.

Many of those on darknet use TOR (The Onion Router), a free download that enables the user to remain anonymous. As noted on its homepage, TOR prevents monitoring of websites that users visit, makes it impossible for websites to learn the user’s physical location, and enables users to circumvent internet censorship. Furthermore, TOR prevents identification of website managers who do not wish to be identified.

Last June, Ofir David of cyber defense company CyberHat reported a security breach in Mozilla Firefox versions 17 and 22 that resulted in the exposure of users’ identity; Mozilla subsequently confirmed that there had in fact been a breach. In August it became apparent that many other sites in the darknet had been hacked or completely blocked. Several days later, Eric Eoin Marques, who had been exposed as “the largest facilitator of child porn on the planet,” was arrested. Apparently, this was a sting operation by the FBI intended to prevent the distribution of child pornography online. According to David, “Whoever is running this exploit can match any TOR user to his true internet address, and therefore track down the TOR user.” This breach clearly caused significant harm to TOR’s effectiveness as a provider of anonymity.

The proximity of Marques’s arrest to that of the arrest of the al-Qaeda courier and the centrality of the darknet in both cases raises the possibility that the two were connected. According to this hypothesis, US authorities exploited the breach of TOR in order to monitor al-Qaeda officials and the child pornographers, and their exposure by David forced them to act against their targets prematurely because they feared the targets would change their methods of communication following exposure of the breach. This hypothesis also provides a possible explanation for the aggressive UAV attacks initiated by the United States in Yemen around the time of the courier’s arrest, which led to the deaths of thirty-four al-Qaeda activists. Nevertheless, researchers who claimed that there was a connection between the State Department’s warning and the extensive breach of TOR have in many cases backed down from their claims, because the information that led to the exposure of the pornography network did not match the source of the information that could have led to the monitoring of the conference call, even though there are still those who claim that there is a low probability of accidental contiguity between the two

Reports on the operation increased public awareness of the existence of the darknet and led to a public discussion on the right to privacy vs. homeland security. Among proponents of online privacy, the darknet looks romantic, a safe arena for underground political discussion. In a world that mourns the death of privacy at the hands of the NSA and the like, the darknet allowed opposition figures, journalists, and separatists to publish information while evading censorship and monitoring. It thus made it possible to diffuse facts and ideas that are not compatible with the interests of authoritarian regimes. However, the recent events have made the public aware that the darknet is not only a platform for political discussions, but also an infrastructure for proliferation of weapons and terrorism, along with drugs and child pornography. Furthermore, given the increasing use of the darknet by jihadis and their ilk, it can now be described as a clear and present danger to the security of citizens around the world. Thus, there is a pressing need to create tools that will prevent terrorist organizations (and criminal elements) from harnessing the darknet for their needs.

In recent years, impressive methods have been developed in the West for monitoring content on the visible web, but there is almost no similar arsenal for the darknet. In order to ensure that the necessary tools are developed for monitoring the internet, it is essential to bring up the evidence indicating that the darknet has been turned into a major infrastructure for global terror. Israeli researchers are at the forefront of study of the internet, and therefore, Israel would do well to harness a significant portion of its talents to confront the challenge of darknet. Beyond the enormous contribution to national and global security, such an initiative could open new horizons for Israeli ventures.

The opinions expressed in INSS publications are the authors’ alone.
Publication Series INSS Insight
TopicsAdvanced Technologies and National SecurityTerrorism and Low Intensity Conflict
עברית

Events

All events
The 18th Annual International Conference
25 February, 2025
08:15 - 16:00
Photo: Ronen Topelberg

Related Publications

All publications
Rafael
Boost-Phase Interception (BPI) of Ballistic Missiles
Intercepting missiles and rockets at the earliest stage of their launch is an offensive action with a distinctly defensive character. Its goal is to prevent direct or collateral damage in the attacked state while inflicting maximum harm on the aggressor. For Israel, this interception method has a compounded advantage due to its small size, the threats posed by Iran and its proxies in both the near and far “ring of fire,” and the high potential for damage from strikes on civilian and military infrastructure. This article reviews the challenges and technological developments in missile and rocket interception, relevant geopolitical aspects, and lessons for the State of Israel.
09/03/25
Shutterstock
The Temptation of Chinese AI: Israel Must Not Be Blinded by DeepSeek
How strong and effective is the Chinese artificial intelligence model—and what conclusions should be drawn in Israel?
18/02/25
Shutterstock
The Unmanned Maritime Threat: Implementing Lessons From the Aerial Theater
Unmanned maritime systems, alongside with suicide drones: The unmanned systems, which are being discovered more intensely in the context of the fighting in the north, may also be used against Israeli vessels. Is Israel prepared for the challenge?
03/07/24

Stay up to date

Registration was successful! Thanks.
  • Research

    • Topics
      • Israel and the Global Powers
      • Israel-United States Relations
      • Glazer Israel-China Policy Center
      • Russia
      • Europe
      • Iran and the Shi'ite Axis
      • Iran
      • Lebanon and Hezbollah
      • Syria
      • Yemen and the Houthi Movement
      • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
      • Israeli-Palestinian Relations
      • Hamas and the Gaza Strip
      • Peace Agreements and Normalization in the Middle East
      • Saudi Arabia and the Gulf States
      • Turkey
      • Egypt
      • Jordan
      • Israel’s National Security Policy
      • Military and Strategic Affairs
      • Societal Resilience and the Israeli Society
      • Jewish-Arab Relations in Israel
      • Climate, Infrastructure and Energy
      • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
      • Data Analytics Center
      • Law and National Security
      • Advanced Technologies and National Security
      • Cognitive Warfare
      • Economics and National Secutiry
    • Projects
      • Preventing the Slide into a One-State Reality
      • Contemporary Antisemitism in the United States
      • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications

    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Database
    • Posts
    • Books
    • Archive
  • About

    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Support
  • Media

    • Communications
    • Articles
    • Quotes
    • Radio and TV
    • Video Gallery
    • Press Release
    • Podcast
  • Home

  • Events

  • Database

  • Team

  • Contact

  • Newsletter

  • עברית

INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
40 Haim Levanon St. Tel Aviv, 6997556 Israel | Tel: 03-640-0400 | Fax: 03-744-7590 | Email: info@inss.org.il
Developed by Daat A Realcommerce company.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.