Tor (anonymity network) Browser and Darkweb / Darknet / Deepweb, and the ISIS Islamic State (ISIL / IS) Daesh and Al Qaeda

Tor (anonymity network) Browser and Darkweb / Darknet / Deepweb, and the ISIS Islamic State (ISIL / IS) Daesh and Al Qaeda

Tor
Tor-logo-2011-flat.svg
Developer(s) The Tor Project, Inc
Initial release 20 September 2002[1]
Stable release 0.2.9.10[2] (1 March 2017; 14 days ago) [±]
0.2.8.13[3] (3 March 2017; 12 days ago) [±]
0.2.7.7[3] (3 March 2017; 12 days ago) [±]
0.2.6.11[3] (3 March 2017; 12 days ago) [±]
0.2.5.13[3] (3 March 2017; 12 days ago) [±]0.2.4.28[3] (3 March 2017; 12 days ago) [±]
Preview release 0.3.0.4-release-candidate[4] (1 March 2017; 14 days ago) [±]
Repository gitweb.torproject.org/tor.git
Development status Active
Written in C,[5] Python
Operating system
Size 2–4 MB
Type Onion routing, Anonymity
License Original BSD
Website torproject.org

Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name “The Onion Router”.[6][7] Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays[8] to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”.[9] Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

 

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the next node destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.

china islam mapIslam PhilippinesMap_of_Russia_-_Sakhalin_Oblast_edited_(2008-03).svgjapssisunni vs shia europetoilet920x920DOKANGdokaystock-vector-vector-map-of-state-bavaria-with-coat-of-arms-and-location-on-germany-map-199782245global shia allianceglobal sunni alliance1usaalaska49canadafalklandswar20170516_secessiondepositphotos_51019497-stock-illustration-map-of-brittany-francestock-vector-canary-islands-simple-administrative-map-with-flag-388000981sicily_flag_trinacria_sticker-rd71bc6273caf45b5ad131b6899d34078_v9waf_8byvr_540normandie-basse-stateChatwinVcornwall_cornish_mapsindexkarte-1-770Map-of-Basque-Country-with-Basque-flagchannelnewzz377f97808b1ced537d88e5a796dd03ed0b4a8920a2bea84b9b0f3d9cfe1e01ac_41266065_taiwan_aborigines_416amlat2709qudsSeparatismo_e_independentismo_en_Méxicomain-qimg-48395eb73bf631ad122119b0aba8d8a2DQiQ0MKX4AAAx2XcolombiamappanamericanhwytribalphilippinestraditionalrangeindexcarinphilmapMindoro-Map-loolooSAPMi_01fa3b8d41e43081c986b5afdcbc2be60_f1460tumblr_nb51ia7OPl1tvk5dro1_1280fghByzantine_Constantinople-enfinalmaptehuantepecpanama-canal3cf2da7875d661c65039fe958ddc1a4f--central-america-north-americatierradfsamipeople111dfgdfgokinawa-map2000px-Map_of_Ainu_in_Hokkaido.svg4b73e86cb6dc8daec66442fa62ed73d9--kuril-islands-geographycanadagfaaa12aeasterIndigenousSiberiakwazulu_map_1maxresdefaultfsIndigenousSiberiafg0f59f5d339f5c788645a2f1c3e588239cropped-chico2.jpg

LocationSapmi
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
untitled
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
uae-70499
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
south-america-islam
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
BIA_2
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe

sdfsdfsa

screen-shot-2015-11-27-at-9-15-35-am
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe

ph10northern_triangle_729-300x169

map_of_central_america1
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
inuit
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
indigenas_ingles
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
img_1769-2
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe

img_1767-2

img_1733-2
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
ggg
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
gdd
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe

fss

fghf
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
dfga
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
colombia-farc-new-564x529
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe

abo_demo2013_fig3_1370438318860_eng

arab-world-political-map-also-called-nation-consists-twenty-two-arabic-speaking-countries-league-all-nations-75844656
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe
060515i
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe

307868be00000578-3412030-image-a-74_145347378486923423432a454a

554
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe

245a

3a
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe

7a1a

_49044278_europe_roma_popn.gif
ISIS Islamic State (ISIL/IS) Daesh and Al Qaeda in the Indigenous Peoples of Latin America, North America and Europe

An adversary might try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user’s computer.[10] The NSA had a technique that targets a vulnerability – which they codenamed “EgotisticalGiraffe” – in an outdated Firefox browser version at one time bundled with the Tor package,[11] and in general, targets Tor users for close monitoring under its XKeyscore program.[12] Attacks against Tor are an active area of academic research,[13][14] and are welcomed by the Tor Project itself.[15]

*******

Fighting ISIS On The Deep Web

https://darkwebnews.com/news/fighting-isis-on-the-deep-web/

As such it has become a haven for organised crime, and worse still, a prime recruiting ground for one of the world’s most notorious terrorist groups.

Male terrorist wearing maskOver the past number of years, ISIS has grown rapidly in numbers, and their name is on the lips of everyone who has not been living under a rock.
Videos they have made of cold blooded executions have horrified millions around the world, and they have proved so elusive that an entire coalition of nations have had very limited success in tracking them down.

The case of ISIS is quite strange when looked at first; they are fighting wars on multiple fronts, in five countries across two continents.

There are over 5000km between its operations in Syria and Nigeria, and many wonder how it is possible for them to contact each other without revealing themselves.

The answer is the Deep Web.

ISIS first used, and to an extent still uses, Social Media to reach out to potential jihadists, however now they focus a great deal of attention on the Deep Web, where they recruit and search for donations anonymously.

They also can transfer large sums of money in the form of bitcoin between their many divisions, once again completely anonymously.

Officials such as Professor Edin Mujkic of Colorado Springs University have said that the presence of ISIS on the Deep Web must be removed, stating:

Officials such as Professor Edin Mujkic of Colorado Springs University have said that the presence of ISIS on the Deep Web must be removed, stating:

“Even if, hypothetically, ISIS is destroyed next year, that doesn’t guarantee that some other group isn’t going to show up and use the same tactics because now they learned from them,”

ISIS typed with font made of bulletsSo how can their grip be curtailed? DARPA, the Defense Advanced Research Projects Agency, believe the answer can be found in MEMEX, software that allows for better cataloguing of Deep Web sites.

The software was originally developed for monitoring human trafficking on the Deep Web, but Chris White of DARPA believes that the same principles can be applied to almost any illicit Deep Web activity.

“We need a technology to discover where that content is and make it available for analysis,” he said, “MEMEX allows you to characterize how many websites there are and what kind of content is on them.”

While preventing ISIS from having such a free rein over the Deep Web will not be an easy task, nor will it be the end of the terrorist organisation, it is a very aggressive first step, and it sends a powerful message.

Moreover it should help to prevent future terrorist groups from using the same methods for money transfer and recruitment.

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s