1 Feb, 2023 14:03
Is the FBI secretly running dark web terrorist recruitment?
US law enforcement is known for entrapment tactics, and the secrecy around a recent terrorism case is suspicious
By Felix Livshitz =1 of 2==
A high-level conspiracy of silence surrounding a US terrorism prosecution raises serious questions over whether theFBI possesses technological means to bypass dark web user anonymity, or alternatively manages extremist group recruitment sites in secret, in order to entrap unsuspecting visitors.
US citizen Muhammed Momtaz Al-Azhari was charged in May 2020 with attempting to provide material support to ISIS. He came to the attention of the FBI due to a series of visits he made to a dark web site, which hosts “unofficial propaganda and photographs related to ISIS” in May 2019.
The Bureau pinpointed specific pages of the site Al-Azhari perused including sections on making donations, ISIS media assets, photos and videos, and stories of military operations allegedly conducted by ISIS fighters in Iraq, Syria, and Nigeria. These actions were linked to him directly by uncovering his IP address, and therefore his identity and location.
Al-Azhari accessed the site via the TOR browser, which theoretically provides anonymity to users, and makes it difficult if not impossible for a site’s owner or external prying eyes to track visitor IPs. A recent court filing by Al-Azhari’s lawyers reveals that’s precisely what the FBI did though and exactly how they achieved this is being withheld by government decree.
“[Using TOR] onion-like layers of additional IP addresses prevent the true IP address of the user from being visible like it would typically be on a clear-web site,” the filing states. “However, as the government’s complaint affidavit indicates, the government was able to bypass TOR’s protections to identify the IP address of the visitor to the ISIS website. In discovery, the government has declined to provide any information related to its TOR operation.”
Al-Azhari’s legal team attempted to compel the US government to disclose the method by which the FBI unearthed his IP address, but authorities without explanation requested the prosecuting Court treat their formal request as a “highly sensitive document.” This is a file containing “sensitive or confidential information that may be of interest to the intelligence service of a hostile foreign government and whose use or disclosure by a hostile foreign government would likely cause significant harm.”
While the filing records that “few documents” filed in US courts ever qualify as “highly sensitive,” the government’s request was granted, again without any explanation. However, the filing hints at a possible explanation chanced upon by Al-Azhari’s lawyers.
In researching how to legally compel the government to release details of their client’s identification, they discovered “at least two federal cases” in which authorities blocked disclosure of similar information on the grounds “network investigative techniques” - a euphemism for hacking- were used by investigators.
The filing suggests these techniques might have been one of the ways in which the FBI “may have bypassed TOR’s protections in the operation,” and determined Al-Azhari’s IP address. The FBI’s use of “network investigative techniques” is well-known and openly admitted. Yet, the “highly sensitive document” designation is, the lawyers acknowledge, only employed “when necessary to protect highly classified or highly confidential information.”
The filing suggests this means the FBI is attempting to classify publicly-available information as “top secret”, but another interpretation is theFBI could be actively running the website Al-Azharivisited for the purposes of entrapment. How the FBI uses “network investigative techniques” was revealed in a 2016 affidavit, related to an extraordinary Bureau operation that ensnared the users of Playpen, then one of the largest child porn sites on the dark web.
https://www.rt.com/news/570371-fbi-dark-web-terrorist/