{"id":1689,"date":"2019-02-05T12:00:07","date_gmt":"2019-02-05T17:00:07","guid":{"rendered":"https:\/\/carleton.ca\/align\/?p=1689"},"modified":"2025-07-25T11:44:35","modified_gmt":"2025-07-25T15:44:35","slug":"illuminate-exploring-the-dark-web-where-terrorists-hide","status":"publish","type":"post","link":"https:\/\/carleton.ca\/align\/2019\/illuminate-exploring-the-dark-web-where-terrorists-hide\/","title":{"rendered":"[I-lluminate] Exploring the Dark Web: Where Terrorists Hide?"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        [I-lluminate] Exploring the Dark Web: Where Terrorists Hide?\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<p><em><strong>by Ghadah Alrasheed &amp; <a href=\"https:\/\/carleton.ca\/align\/people\/brandon-rigato-2\/\">Brandon Rigato<\/a><\/strong><\/em><\/p>\n\n\n\n<p>One area that has not received adequate attention in the vast academic literature surrounding extremist movements and their use of the Internet is the Dark Web, whose websites are vaguely assumed to work as hubs for terrorists, drug-traffickers, and gangs. The structure, mechanisms, and impact of dark networks on terrorism is largely unknown for a variety of reasons, the main of which is the difficulty of collecting and accessing primary sources of&nbsp;data&nbsp;on the Dark Web.<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/cms.qz.com\/wp-content\/uploads\/2015\/02\/people-with-computers.jpg?quality=75&amp;strip=all&amp;w=410&amp;h=231\" alt=\"Image result for isis and dark web\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Credit: Quartz<\/p>\n\n\n\n<p>The Dark Web is generally understood as a place for those seeking&nbsp;anonymity and invisibility when the surface web is too risky to use. This&nbsp;anonymity comes from the difficulty of finding who is behind the sites since, unlike other research browsers such as Google, <a href=\"https:\/\/www.techadvisor.co.uk\/how-to\/internet\/dark-web-3593569\/\">the Dark Web<\/a> sites are not indexed by&nbsp;search&nbsp;engines&nbsp;(Weimann, 2016a). One way to access them is through TOR (The Onion Router), a software originally developed by<a href=\"https:\/\/www.nrl.navy.mil\/\"> the U.S. Naval Research Laboratory<\/a> \u201cas a tool for anonymously communicating online\u201d (Weimann, 2018, p. 3). The<a href=\"https:\/\/www.torproject.org\/\"> TOR Browser<\/a> was later offered to the public as a free service to promote anonymous access to the internet, especially where online censorship or surveillance is high (Malik, 2018).&nbsp;<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<p>The Dark Web has sporadically made mainstream headlines. In 2015, it was linked to the <a href=\"https:\/\/www.wired.com\/2015\/08\/happened-hackers-posted-stolen-ashley-madison-data\/\">hacking of the Ashley Madison<\/a> database&nbsp;when the personal data of around 37 million clients were stolen and dumped in the Dark Web, including their e-mails, names, home addresses, and credit card information (Zetter, 2015). The technology has also been associated with the infamous WikiLeaks, Bitcoin, and illegal goods ranging from drugs to weapons sold on the infamous <a href=\"https:\/\/www.researchgate.net\/publication\/280025737_Powerfreedom_on_the_dark_web_A_digital_ethnography_of_the_Dark_Web_Social_Network\">Silk Road<\/a> (Gehl, 2016; Malik, 2018; Weinmann, 2018). Due&nbsp;to the history of organized crime linked with the Dark Web, Western security agencies have become greatly concerned with the potentiality of the Dark Web to be used by terrorist groups such as ISIS to propagate their narratives while remaining completely hidden from intelligence agencies, thus making it increasingly difficult to detect and arrest terrorism perpetrators or inciters of hate.&nbsp;<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<p>While being connected to a number of scandalous events, the Dark Web has received support and praise from organizations and companies such as Google, Human Rights Watch and the Electronic Frontier Foundation for the <a href=\"https:\/\/www.researchgate.net\/publication\/280025737_Powerfreedom_on_the_dark_web_A_digital_ethnography_of_the_Dark_Web_Social_Network\">anonymity<\/a> it provides&nbsp;(Gehl, 2016). Whatever the capacity or the efficacy of the Dark Web in supporting illegal activities or being essential to political struggles, the Dark Web seems to have become infused with power and is symbolically seen as a source of primary effects.&nbsp;<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Similar to previous technological developments, the novel anonymity and encryption features of the Dark Web have fuelled fears especially in relation to ideological and political violence. In a <a href=\"https:\/\/www.cnn.com\/2015\/05\/12\/politics\/pentagon-isis-dark-web-google-internet\/index.html\">CNN article<\/a>, titled as&nbsp;<i>Pentagon hunts for ISIS on the Dark Web,&nbsp;<\/i>Starr and&nbsp;Crawford&nbsp; (2015, May) state, \u201cThe U.S. believes ISIS and other potential terrorists are now using the most covert part of the online world to recruit fighters, share intelligence and potentially plan real world attacks.\u201d<i>.&nbsp;&nbsp;<\/i>A report&nbsp;prepared by the Defence and Security Accelerator,&nbsp;part of the UK Government\u2019s&nbsp;<a href=\"https:\/\/www.gov.uk\/government\/organisations\/defence-science-and-technology-laboratory\">Defence Science and Technology Laboratory<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.gov.uk\/government\/organisations\/ministry-of-defence\">Ministry of Defence<\/a>&nbsp;(2018), warns of the threatening possibility of the Dark Net and encrypted technology to aid terrorists or criminals and jeopardize national security. The report, however, remains vague about how and when terrorists used the Dark Web to recruit or operate.<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<p>This article is a critical assessment of (scarce) academic research on the terrorist use of the Dark Web and \u201chow\u201d and \u201cif\u201d the Dark Web is used by terrorists as a dissemination or operation tool.&nbsp;It is important to note that there is&nbsp;a small number of resources that tackle the topic. Beside the lack of academic publications on the Dark Web, these resources are often inter-cited, feeding off each other. This gap in academic research on the Dark Web has shrouded the Dark Web in a cloak of mystery and discursively determined it as a place that can only accommodate dark activities. It has also allowed some confusion between the Dark Web and other end-to-end encrypted technology such as the <a href=\"https:\/\/telegram.org\/\">Telegram<\/a><i>&nbsp;<\/i>and <a href=\"https:\/\/www.whatsapp.com\/\">WhatsApp<\/a>. Reviewing the literature on the Dark Web, the main definer of what the Dark Web is or how we can measure its impact is government and security think tanks. On the other hand, the Dark Web has not received much attention from independent academic disciplines and researchers.&nbsp;<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Another form of disconnect between researchers studying the dark web is the literal and figurative use of the \u201cdark web\u201d in the field of terrorism. While there is the literal \u201cdark web\u201d that can only be accessed by downloading the TOR browser (Weimann, 2016), researchers such as&nbsp;HscinChun&nbsp;Chen (2012) and&nbsp;Abdullah bin Khaled&nbsp;al-Saud (2017) use the term \u201cDark Web\u201d in a <a href=\"https:\/\/www.springer.com\/gp\/book\/9781461415565\">figurative sense<\/a>, denoting online behaviours associated with the darker side of humanity such as organized crime and terrorism. What these academics are exploring is the \u201cdark\u201d activities in the regular web rather than the technical space of the Dark Web&nbsp;itself.<span data-ccp-props=\"{&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<p>One study on the encrypted Dark Web was conducted by Nakita Malik in 2018, confirming that terrorists use the Dark Web to recruit, radicalize, gain material benefits and hide their communications and propaganda. The main evidence in the article for ISIS\u2019s use of the Dark Web as a <a href=\"http:\/\/henryjacksonsociety.org\/wp-content\/uploads\/2018\/04\/Terror-in-the-Dark.pdf\">propaganda hub<\/a> was a single website found by the researcher Scot&nbsp;Terban&nbsp;via a message on the&nbsp;<i>Shamikh<\/i><i>&nbsp;<\/i>forum (one of ISIS\u2019s websites on the regular web). Although this&nbsp;is clear evidence, it is not balanced by a systematic study of the Dark Web\u2019s content or a comparative study of such content in the open and Dark webs. The lack of evidence leads one to question the necessity or the practicality of Malik\u2019s proposal to found a governmental \u201cregulatory body\u201d to oversee the Dark Web (Malik, 2018).&nbsp;<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<p>In Malik\u2019s piece (2018), there is evidence of encrypted services such as the Telegram being used to send TOR links amongst ISIS members, as witnessed following the <a href=\"https:\/\/www.cnn.com\/2015\/12\/08\/europe\/2015-paris-terror-attacks-fast-facts\/index.html\">2015 Paris attacks<\/a>. However, there is no strong evidence of wide-spread adoption of TOR for mainstream distribution of ISIS propaganda, which is different technology than <a href=\"http:\/\/www.academia.edu\/9622433\/TERROR_IN_THE_DEEP_AND_DARK_WEB\">end-to-end encrypted services<\/a>.&nbsp;This difference between the two technologies is well described by&nbsp;Dilipraj&nbsp;(2014):<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n<div class=\"not-prose cu-quote cu-component-spacing\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The conventional encryption&nbsp;softwares&nbsp;were able to encrypt the data payload but failed in hiding the header, whereas Tor is different from previous encryption&nbsp;softwares&nbsp;in a way that it cannot only encrypt the data payload but can also hide the header which is used for routing, thus, erasing the cyber footprint of any communication and creating more privacy, security and anonymity for its users (p.130)&nbsp;<span data-ccp-props=\"{&quot;335559685&quot;:720,&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n<\/blockquote>\n<\/div>\n\n\n<p>In 2018, Gabriel Weinman published an article, according to which ISIS has turned to the Dark Web following the Paris attacks in 2015 when there was a massive takedown of ISIS accounts. This move, as Weinmann indicates, resulted in the creation of more than 700 Telegram channels. Similar to Malik\u2019s piece, there is an interchangeable use of the Dark Web and other encrypted technologies such as the Telegram. Therefore, it is not clear evidence of ISIS\u2019s increasing use of the Dark Web for recruitment and propaganda dissemination.&nbsp;&nbsp;<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<p>The findings of these studies are usually founded on empirically scarce ones. The only study that is based on rigorous <a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00396338.2016.1142085\">analysis of the Dark Web\u2019s content<\/a> is Moore and&nbsp;Rid\u2019s&nbsp;paper, which reveals a \u201cnear-absence of Islamic extremism on TOR hidden services\u201d (Moore and Rid, 2016, p. 21).&nbsp;In their scan of hidden-services websites within the Tor network, Moore and Rid collected data through a website crawler and found 2,723 websites that met the criteria of containing illegal content. Among these, the researchers have found only a fewer than a handful of active Islamic extremist sites. While groups such as ISIS tend to use the internet for propaganda and internal communication, both uses have not stabilized on the Dark Web.&nbsp; Moore and Rid explain that the reason that the Dark Web is not commonly used by ISIS mass-spreading of violence is because of the Dark&nbsp;Web\u2019s limited reach and its unsustainability as a way of communication.&nbsp;<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<p>The conclusion of Moore and&nbsp;Rid&#8217;s&nbsp;study contradicts the work of many who suggest that the Dark Web is a safe haven for terrorists and an effective tool for their communications. While it is true that there is apparent and clear evidence of terrorists (like other criminals) utilizing the Dark Web for transfer of funds using the Bitcoin (Weinmann, 2018 &amp; Malik, 2018), there is less consistent substation of&nbsp;the&nbsp;argument that the Dark Web is an ideological or discursive hotbed for terrorists and groups such as ISIS.&nbsp;&nbsp;<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Robert Gehl refers this unreasonable fear of the Dark Web to moral panics associated with the internet over the past 35 years. We, similarly, argue that tech-deterministic understandings of new technologies&nbsp;in previous eras&nbsp;have constituted \u201ca historical prior\u201d that determines discourses and extends technological utopian\/dystopian discourses&nbsp;to newer technologies. Discourses on the internet, therefore, tend to cluster around \u201cliberating\u201d or \u201cthreatening\u201d rhetoric.&nbsp;It is not surprising&nbsp;to&nbsp;find&nbsp;such&nbsp;rhetoric recurring with the development of the Dark Web.&nbsp;<span data-ccp-props=\"{&quot;335559739&quot;:240,&quot;335559740&quot;:480}\">&nbsp;<\/span><\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><b>Works Cited:<\/b><\/p>\n\n\n\n<p>Abdullah bin Khaled al\u2013Saud. (2017). The tranquility campaign: A beacon of light in the dark world wide web.&nbsp;<i>Perspectives on Terrorism, 11<\/i>(2), 58-64.<span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559740&quot;:300,&quot;335559991&quot;:720}\">&nbsp;<a href=\"http:\/\/www.terrorismanalysts.com\/pt\/index.php\/pot\/article\/view\/596\">http:\/\/www.terrorismanalysts.com\/pt\/index.php\/pot\/article\/view\/596<\/a><\/span><\/p>\n\n\n\n<p>Chen, H. (2012).&nbsp;<i>Dark web: Exploring and data mining the dark side of the web<\/i><i>.<\/i>&nbsp;New York, NY. <a href=\"https:\/\/www.springer.com\/gp\/book\/9781461415565\">https:\/\/www.springer.com\/gp\/book\/9781461415565<\/a><\/p>\n\n\n\n<p>Defense and Security Accelerator (2018). Future technology trends in security. Retrieved from&nbsp;<a href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/728113\/Future_trends_research_V6.pdf\">https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/728113\/Future_trends_research_V6.pdf<\/a><\/p>\n\n\n\n<p>Dilipraj, E. (2014). Terror in the Deep and Dark Web.<i>&nbsp;Air Power Journal<\/i>&nbsp;9 (3), 121-140.&nbsp;<a href=\"http:\/\/www.academia.edu\/9622433\/TERROR_IN_THE_DEEP_AND_DARK_WEB\">http:\/\/www.academia.edu\/9622433\/TERROR_IN_THE_DEEP_AND_DARK_WEB<\/a><\/p>\n\n\n\n<p>Gehl, R. W. (2016). Power\/freedom on the dark web: A digital ethnography of the dark web social network.<i>&nbsp;New Media &amp; Society, 18<\/i>(7), 1219-1235.&nbsp;<span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:720}\">&nbsp;Retrieved from&nbsp;<a href=\"https:\/\/www.researchgate.net\/publication\/280025737_Powerfreedom_on_the_dark_web_A_digital_ethnography_of_the_Dark_Web_Social_Network\">https:\/\/www.researchgate.net\/publication\/280025737_Powerfreedom_on_the_dark_web_A_digital_ethnography_of_the_Dark_Web_Social_Network<\/a><\/span><\/p>\n\n\n\n<p>Jardine, E., &amp; Centre for International Governance Innovation (2015).&nbsp;<i>The dark web dilemma: Tor, anonymity and online policing<\/i>. Waterloo, Ontario: Centre for International Governance Innovation.<span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559740&quot;:300,&quot;335559991&quot;:720}\">&nbsp;Retrieved from&nbsp;<a href=\"https:\/\/www.cigionline.org\/sites\/default\/files\/no.21.pdf\">https:\/\/www.cigionline.org\/sites\/default\/files\/no.21.pdf<\/a><\/span><\/p>\n\n\n\n<p>Malik, N. (2018). Terror in the&nbsp;dark: How&nbsp;terrorists&nbsp;use&nbsp;encryption,&nbsp;the Darknet, And cryptocurrencies. The Henry Jackson Society. Retrieved from&nbsp;<a href=\"http:\/\/henryjacksonsociety.org\/wp-content\/uploads\/2018\/04\/Terror-in-the-Dark.pdf\">http:\/\/henryjacksonsociety.org\/wp-content\/uploads\/2018\/04\/Terror-in-the-Dark.pdf<\/a>&nbsp;<span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559740&quot;:300,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>Moore, D. &amp; Rid, T. (2016).&nbsp;Cryptopolitik and the Darknet.&nbsp;<em>Survival: Global Politics and Strategy, 58<\/em>(1). Retrieved from<a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00396338.2016.1142085\">&nbsp;https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00396338.2016.1142085<\/a><\/p>\n\n\n\n<p>Starr, B. &amp; Crawford, J. (2015, May). Pentagon hunts for Isis on the secret internet.&nbsp;<i>CNN<\/i>.&nbsp;Retrieved from&nbsp;<a href=\"https:\/\/www.cnn.com\/2015\/05\/12\/politics\/pentagon-isis-dark-web-google-internet\/index.html\">https:\/\/www.cnn.com\/2015\/05\/12\/politics\/pentagon-isis-dark-web-google-internet\/index.html<span data-ccp-props=\"{&quot;335559685&quot;:720,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/a><\/p>\n\n\n\n<p>Weimann, G. (2018).&nbsp;<i>Going darker? the challenge of dark net&nbsp;<\/i><i>terrorism.&nbsp;<\/i>Woodrow&nbsp;Wilson International Center for Scholars. Retrieved from&nbsp;<a href=\"https:\/\/www.wilsoncenter.org\/publication\/going-darker-the-challenge-dark-net-terrorism\">https:\/\/www.wilsoncenter.org\/publication\/going-darker-the-challenge-dark-net-terrorism<\/a><\/p>\n\n\n\n<p>Weimann, G. (2016a). Going dark: Terrorism on the dark web.<i>&nbsp;Studies in Conflict &amp; Terrorism, 39<\/i>(3).&nbsp;<a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/1057610X.2015.1119546\">https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/1057610X.2015.1119546<\/a><\/p>\n\n\n\n<p>Weimann, G. (2016b). Terrorist migration to the dark web.<i>&nbsp;Perspectives on Terrorism, 10<\/i>(3), 40-44.<span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559740&quot;:300,&quot;335559991&quot;:720}\">&nbsp;Retrieved from<a href=\"https:\/\/www.jstor.org\/stable\/pdf\/26297596.pdf?refreqid=excelsior%3Accf3e5132308f0aec803995af380c67e\">&nbsp;https:\/\/www.jstor.org\/stable\/pdf\/26297596.pdf?refreqid=excelsior%3Accf3e5132308f0aec803995af380c67e<\/a><\/span><\/p>\n\n\n\n<p>Zetter, K. (2015). Hackers finally post stolen Ashley Madison Data.&nbsp;<i>Wired<\/i>. Retrieved from&nbsp;<a href=\"https:\/\/www.wired.com\/2015\/08\/happened-hackers-posted-stolen-ashley-madison-data\/\">https:\/\/www.wired.com\/2015\/08\/happened-hackers-posted-stolen-ashley-madison-data\/<span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559740&quot;:300,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/a><\/p>\n\n\n\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559739&quot;:240,&quot;335559740&quot;:300,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/ALiGN_Illuminate_Alrasheed_Rigato.pdf\"><img loading=\"lazy\" decoding=\"async\" width=\"266\" height=\"290\" src=\"https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/Screenshot-2019-09-20-03.57.48.png\" alt=\"\" class=\"wp-image-2147\" srcset=\"https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/Screenshot-2019-09-20-03.57.48.png 266w, https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/Screenshot-2019-09-20-03.57.48-160x174.png 160w, https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/Screenshot-2019-09-20-03.57.48-240x262.png 240w, https:\/\/carleton.ca\/align\/wp-content\/uploads\/sites\/121\/Screenshot-2019-09-20-03.57.48-200x218.png 200w\" sizes=\"auto, (max-width: 266px) 100vw, 266px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559739&quot;:240,&quot;335559740&quot;:300,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559739&quot;:240,&quot;335559740&quot;:300,&quot;335559991&quot;:720}\">&nbsp;<\/span><\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:240,&quot;335559740&quot;:300}\">&nbsp;<\/span><\/p>\n\n\n\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:240,&quot;335559740&quot;:300}\">&nbsp;<\/span><\/p>\n\n\n\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:240,&quot;335559740&quot;:300}\">&nbsp;<\/span><\/p>\n\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Ghadah Alrasheed &amp; Brandon Rigato One area that has not received adequate attention in the vast academic literature surrounding extremist movements and their use of the Internet is the Dark Web, whose websites are vaguely assumed to work as hubs for terrorists, drug-traffickers, and gangs. The structure, mechanisms, and impact of dark networks on [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[275,277],"tags":[285,284,286,287,106,211,152],"class_list":["post-1689","post","type-post","status-publish","format-standard","hentry","category-illuminate","category-issue-i-exploring-the-dark-web","tag-dark-web","tag-darknet","tag-deep-web","tag-google","tag-surveillance","tag-technology","tag-terrorism"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/posts\/1689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/comments?post=1689"}],"version-history":[{"count":4,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/posts\/1689\/revisions"}],"predecessor-version":[{"id":3370,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/posts\/1689\/revisions\/3370"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/media?parent=1689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/categories?post=1689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/align\/wp-json\/wp\/v2\/tags?post=1689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}