{"id":369,"date":"2015-11-19T20:39:04","date_gmt":"2015-11-20T01:39:04","guid":{"rendered":"https:\/\/fbreitinger.de\/?p=369"},"modified":"2016-02-10T06:35:33","modified_gmt":"2016-02-10T11:35:33","slug":"on-news8-about-how-isis-is-using-the-dark-web-to-stay-undetected","status":"publish","type":"post","link":"https:\/\/fbreitinger.de\/?p=369","title":{"rendered":"Experts reveal how ISIS is using the dark web to stay undetected"},"content":{"rendered":"<p style=\"text-align: left;\">The\u00a0original story can be found\u00a0<a href=\"http:\/\/wtnh.com\/2015\/11\/19\/experts-reveal-how-isis-is-using-the-dark-web-to-stay-undetected\/\" target=\"_blank\">here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" src=\"http:\/\/up.anv.bz\/latest\/anvload.html?key=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\" width=\"640\" height=\"360\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>NEW HAVEN, Conn. (<a href=\"http:\/\/wtnh.com\/2015\/11\/19\/experts-reveal-how-isis-is-using-the-dark-web-to-stay-undetected\/\" target=\"_blank\">WTNH<\/a>) \u2014 Terrorists are finding new ways to use social media to stay under the radar while they are planning major attacks, according to forensic security experts.<\/p>\n<p>Investigators believe ISIS uses the dark web to hide their messages from national intelligence by using encrypted messaging. They communicate over everything from apps to gaming platforms. Experts the way they\u2019re going about it makes it a challenge.<\/p>\n<p>\u201cThere are so many ways to communicate it is hard to analyze all of them,\u201d said Frank Breitinger, Cyber Security &amp; Forensic Security expert with the University of New Haven.<\/p>\n<p>Breitinger said it is difficult to track terrorists who don\u2019t leave a trail.<\/p>\n<p>\u201cThey might send one or two e-mails and then switch the channel, then send one or two e-mails and then go to What\u2019s App, send to or three messages, then go back to Facebook,\u201d said Breitinger.<\/p>\n<p>There is also the perfect encryption used to hide the location using a foreign IP address VPN or Virtual Private Network makes it look like you\u2019re in another country.<\/p>\n<p>\u201cI could create a secret tunnel to Germany and then browse the internet from there. From an outside perspective it would look like I\u2019m in Germany and browsing the internet from there,\u201d said Breitinger.<\/p>\n<p>Breitinger said in order to track the terrorists authorities need to get ahead of the technology they are using.<\/p>\n<p>\u201cThey have information, they have the knowledge so even if we try to create applications that have security mechanisms for the FBI or the NSA to read this communication they might simply come us with their own applications,\u201d said Breitinger.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The\u00a0original story can be found\u00a0here. &nbsp; NEW HAVEN, Conn. (WTNH) \u2014 Terrorists are finding new ways to use social media to stay under the radar while they are planning major attacks, according to forensic security experts. Investigators believe ISIS uses the dark web to hide their messages from national intelligence by using encrypted messaging. They [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-369","post","type-post","status-publish","format-standard","hentry","category-tv-interview"],"_links":{"self":[{"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/posts\/369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fbreitinger.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=369"}],"version-history":[{"count":5,"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/posts\/369\/revisions"}],"predecessor-version":[{"id":522,"href":"https:\/\/fbreitinger.de\/index.php?rest_route=\/wp\/v2\/posts\/369\/revisions\/522"}],"wp:attachment":[{"href":"https:\/\/fbreitinger.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fbreitinger.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fbreitinger.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}