Uploaded by lee roos

Hezbollah & Internet: Cyber Warfare & Propaganda

advertisement
International Journal of Intelligence and
CounterIntelligence
ISSN: (Print) (Online) Journal homepage: www.tandfonline.com/journals/ujic20
Hezbollah and the Internet in the Twenty-First Century
János Besenyő, Attila Gulyas & Darko Trifunovic
To cite this article: János Besenyő, Attila Gulyas & Darko Trifunovic (2023) Hezbollah
and the Internet in the Twenty-First Century, International Journal of Intelligence and
CounterIntelligence, 36:3, 669-685, DOI: 10.1080/08850607.2022.2111999
To link to this article: https://doi.org/10.1080/08850607.2022.2111999
Published online: 19 Sep 2022.
Submit your article to this journal
Article views: 1660
View related articles
View Crossmark data
Citing articles: 2 View citing articles
Full Terms & Conditions of access and use can be found at
https://www.tandfonline.com/action/journalInformation?journalCode=ujic20
International Journal of Intelligence and CounterIntelligence, 36: 669–685, 2023
# 2022 Taylor & Francis Group, LLC
ISSN: 0885-0607 print/1521-0561 online
DOI: 10.1080/08850607.2022.2111999
JÁNOS BESENYŐ , ATTILA GULYAS
DARKO TRIFUNOVIC
AND
Hezbollah and the Internet in the
Twenty-First Century
Abstract: Hezbollah is a significant power in Lebanon that operates as a
Shiite political party and militant group. With Iranian support, Hezbollah
has created a so-called resistance society from the Shiites neglected by the
government that is based on three pillars: military infrastructure, a largescale network of civilian institutions with the aim of improvement of the
well-being of the Shiite population, and a media empire that has an essential
role in disseminating the political messages and ideology of Hezbollah and
Iran in Lebanon, the Middle East, and other parts of the world, using the
full spectrum of media and new technologies, including Internet presence, to
shape public opinion, gain supporters and sympathizers, fundraise, and wage
information warfare against Israel and the Western World. This article sheds
Janos Besenyő is an Associate Professor at Obuda
University in Hungary and Head of the
Africa Research Center. He received a Ph.D. in military science from Miklos Zrınyi National
Defense University in Hungary. He established the Scientific Research Center of the
Hungarian Defence Forces General Staff and served in several peacekeeping operations in
Africa and Afghanistan from 1997 to 2018. His most recent publication is Darfur
Peacekeepers: The African Union Peacekeeping Mission in Darfur (AMIS) from the
Perspective of a Hungarian Military Advisor. The author can be contacted at janos.besenyo@
uni-obuda.hu.
Attila Gulyas graduated from the Kossuth Lajos Military College. He retired from the service as
Head of the department and is a researcher at the Obuda
University Doctoral School on Safety
and Security Sciences. The author can be contacted at gulyas.attila@phd.uni-obuda.hu.
Darko Trifunovic is a founding member and Director of the Institute for National and
International Security. He is an Associate Professor at Fudan University in Croatia. He served
as First Secretary of the Foreign Service of Bosnia and Herzegovina at the United Nations. He
is currently the representative for Serbia and Montenegro in the International Strategic Studies
Association. The author can be contacted at darko@intelligence-security.rs.
AND COUNTERINTELLIGENCE
VOLUME 36, NUMBER 3
669
670
} ATTILA GULYAS, AND DARKO TRIFUNOVIC
JANOS
BESENYO,
light on Hezbollah’s Internet activity and demonstrates Hezbollah’s
cyberespionage campaign through two examples, describing its “Fake News”
media camps and the possible connection between Hezbollah and money
counterfeiting and selling on the Dark Web.
Hezbollah is a special organization that is considered a terrorist organization
by some countries while others acknowledge it as a political party, because it
has a political wing and a military wing. Although the judgment of the
organization in the international community is not uniform, it is deeply
embedded in Lebanese political life; therefore, in contrast with other terrorist
organizations, it has every legal conduit to spread its ideology, raise funds,
recruit sympathizers, and so on. The aim of this research, after a short
introduction to Hezbollah, beyond giving an overall picture of the
organization’s Internet activity, is to demonstrate its information technology
capabilities, and to find any evidence or traces related to Hezbollah’s
Dark Web use.
HEZBOLLAH
Hezbollah (Party of God; also spelled Hezbullah, Hizballah, or Hizbullah) is
a political party and militant organization that was founded under the aegis of
Iran in 1982 during the fifteen-year civil war in Lebanon and the Israeli
invasion.1 Hezbollah is a “Janus-faced” organization because it was a kind of
militia initially, but today, as a political party, it preserves its militant wing. It
plays a vital role in the life of Lebanon.
The connection between Iran and Hezbollah has a long history. Iran has
been supporting the organization since the beginning, because it needed an
organization that collects all of the Shiites in Lebanon to make the influence
over the Shiite population more effective. In addition, it needed a proxy in
the ongoing low-intensity war against Israel, which is the main enemy in the
area. That is why many consider Hezbollah an extension of the Iranian
Revolutionary Guard Corps. The organization does not recognize the
existence or legitimacy of Israel which is its main enemy (along with the
United States). Israel is also regarded as a scapegoat for Lebanon’s numerous
problems. The organization also fights against Western influence in the
Middle East.
Hezbollah is considered a terrorist organization by eighteen countries
without distinguishing between its military and political wings, while other
countries and the European Union (EU) separate the political and the
military wing and recognize its political wing as a legitimate political party.
INTERNATIONAL JOURNAL OF INTELLIGENCE
HEZBOLLAH AND THE INTERNET IN THE TWENTY-FIRST CENTURY
671
In this context, it is thought provoking because Sayyed Hasan Nasrallah is
the head of both wings.
Hezbollah is responsible for approximately 30 terrorist attacks, including
bombings, assassinations, hijacking, and kidnapping between 1983 and 2012.
The number of casualties is about 500 while the number of injured is near
1,000 people.2 The targets of the Hezbollah attacks were typically Israeli or
Jewish interests worldwide, ranging from Europe to South America.
In addition, Hezbollah is closely connected with the Sunni–Islamic
fundamentalist Palestinian Hamas organization and the Palestinian Islamic
Jihad. Despite the religious differences, there are numerous similarities
between Hezbollah and Hamas. Both have a political and a military wing,
they share the same goals and tactics/, and the judgment of the two
organizations is not uniform within the international community. That said,
Hezbollah is a role model for Hamas.3
Hezbollah proclaimed its new ideology manifesto in 2009, in which it
vowed to oust Western powers from Lebanon, demanded the destruction of
Israel, and showed its commitment to Iran’s supreme leader. The
organization expressed its desire to build an Iranian-inspired Islam regime
while keeping the Lebanese people’s freedom and self-determination.
Hezbollah refers to itself as the “Organization of the Oppressed on Earth”
and the “Revolutionary Justice Organization.” The main goal of the party is
the “liberation” of Jerusalem and the land of Israel by the Arab World,
which is governed by an Islamic government established by Hezbollah.4
Hezbollah has built a so-called resistance society in Southern Lebanon,
Beirut’s southern suburb, and the Bekaa Valley. Today Hezbollah struggles
to liberate the Shebaa Farms area occupied by Israel in the Six-Day War
(1967) from Syria.
The organization participates in the civil war in Syria alongside Iran and
Syria, supporting Bashar al-Assad’s regime, gaining very valuable experiences
that improve its military capabilities.
That said, Hezbollah is deeply embedded in Lebanese society because it
created a state within a state. It has a health care system, media services,
agricultural centers, an educational system, low-cost schools, and a financial
system. Hezbollah oversees the Al-Shahid Association of the Martyr’s
Institute, which pays stipends to the family members of martyrs.
The first leader of the organization’s political wing (between 1989 and 1991)
was Subhi al-Tufayli, who was dismissed when he was against the decision to
participate in the Lebanese parliamentary elections. His successor was Abbas
al-Musawi, whom Israel assassinated in 1992. Following the murder of Abbas
al-Musawi, the current leader Hassan Nasrallah got into power. As secretarygeneral, he oversees the seven-member Shura, which has five sub councils: the
political assembly, the jihad assembly, the parliamentary assembly, the
AND COUNTERINTELLIGENCE
VOLUME 36, NUMBER 3
672
} ATTILA GULYAS, AND DARKO TRIFUNOVIC
JANOS
BESENYO,
Figure 1. Extraction of the organizational chart of Hezbollah.
executive assembly, and the judicial assembly. It is hard evidence for the tight
Iranian connection that there are two permanent Iranian representatives on
the Shura council. Figure 1 shows the extraction of the organizational chart of
Hezbollah. (The whole organizational chart can be seen at https://hezbollah.
org/organizational-chart.)
As reported by the U.S. Department of State in 2019, Hezbollah had tens
of thousands of supporters and members worldwide5 who made a
considerable amount of donations, but with international financial sanctions,
this source dried up. The U.S. sanctions against Iran have adverse effects on
Hezbollah as well. Due to the sanctions, Iranian support of Hezbollah
significantly decreased in the last few years, although they are still tied to
each other with thousands of threads. Lebanon together with Hezbollah are
facing complicated challenges today, including the political crises that come
from the political instability and the deeply rooted corruption in the society
that are fundamental problems in Lebanon. In addition, the U.S. and EU
sanctions of the Lebanese economy and the explosion at the Port of Beirut,
then the COVID-19 pandemic, not to mention the Syrian civil war with the
Syrian refugees, are burning questions today.
This situation may spur one to underestimate Hezbollah’s capabilities,
but it is far from the truth. Hezbollah is a progressive, well-prepared
organization with every capability needed to wage traditional lowintensity conflicts and wage modern information warfare in the twentyfirst century.
INTERNATIONAL JOURNAL OF INTELLIGENCE
HEZBOLLAH AND THE INTERNET IN THE TWENTY-FIRST CENTURY
673
HEZBOLLAH ON THE INTERNET
The leadership of Hezbollah is fully aware of the importance of the Internet
and its inherent possibilities in the permanent conflict with Israel and the
United States. They established the traditional media outlets’ Internet-based
counterparts and the ways to continue their propaganda and recruitment
activity on social media sites despite banning its official profiles.
The Internet division of Hezbollah set the following goals for itself:
spread propaganda through the Internet and highlight the ideology of
the party,
wage psychological war against Israel by using the inventions of the
new medium,
support the Palestinian resistance movements against Israel,
strengthen its leadership among the Lebanese Shiite society and popularity in
the Arab world, and
present Israeli aggression and highlight the fight of the “resistance society.”
Social Media Presence
… since the moral elements are among the most important in war. They
constitute the spirit that permeates war as a whole, and at an early stage
they establish a close affinity with the will that moves and leads the
whole mass of force, practically merging with it, since the will is itself a
moral quantity.
—Carl von Clausewitz6
Security experts and defense analysts wrote numerous articles and books on
scenarios of the subsequent cyberwars. They envisioned crashing networks
and disrupted critical infrastructures; they thought hackers would fight
against hackers. But they missed one scenario when the attacker has no
cyberwar capability, but it has personal computers, smartphones, and
Internet access. ISIS had no cyber capability, so it could not hack networks;
instead, it hacked the information itself on the networks when it occupied
Mosul. As a result of the successful social media campaign, the organization
recruited more than 30,000 new members from more than a hundred
countries to join the “Caliphates.” This successful campaign highlighted the
importance of social media in information warfare.7
Hezbollah also recognized the importance of the new possibilities inherent in
the new domain. Social media proved an excellent medium for spreading
Hezbollah propaganda, although, in the beginning it was restricted to mostly
the Internet-savvy young generation, but some years later, as the new
technology integrated into everyday life, they reached the senior generation as
well. Hezbollah created a significant number of social media accounts on
Facebook, Instagram, Twitter, and YouTube to spread their propaganda. A
AND COUNTERINTELLIGENCE
VOLUME 36, NUMBER 3
674
} ATTILA GULYAS, AND DARKO TRIFUNOVIC
JANOS
BESENYO,
good example of this is when Hezbollah ran an “equip a mujahid”
crowdsourcing campaign on Facebook and Twitter, spurring the online
supporters to fulfill their religious obligations by buying weapons,
ammunition, and other military equipment for the Syrian war.8 The contents
of the social media profiles were in harmony with well-known Hezbollah
propaganda.9 These profiles regularly violated the rules of the websites, which
is why a so-called whack-a-mole game was played between the moderators and
the account managers. The latter kept on changing their profiles with the same
content. Interestingly, the most obviously terrorist accounts were not banned
until June 2018, when, under lawmaker pressure, Google and Facebook
suspended Hezbollah and Hamas accounts. U.S. lawmakers criticized Twitter
because it distinguished the military and political arms of the organization and
did not take any action effectively, allowing the organizations and their
affiliates to use the platform. Members of the U.S. House of Representatives
sent a letter to Twitter, Google, and Facebook in September 2019, requesting
information on the number of Hamas and Hezbollah accounts and a timeline
of suspending these accounts. At the same time, they called Twitter to update
its policy to comply with U.S. laws. Following the letter, Twitter also
suspended the Hamas- and Hezbollah-related accounts.10
The reader may wonder why the tech giants did not ban the obviously
terrorist accounts on social media. The advertiser on social media brings in
money—that is the reason why they hesitated banning the extremist sites.
Hezbollah, Hamas, and other affiliated organizations advertised on these
platforms, as other organizations do today. A good example is when
Facebook—between July 2018 and July 2020—made over $23 million in
advertising revenue from inauthentic networks that violated the platform’s
policies (coordinated inauthentic behavior).11
Despite the suspended official profiles, thousands of sympathizer posts on
social media spread Hezbollah’s propaganda. Figure 2 is a screenshot of a
Hezbollah sympathizer’s tweet. The situation is similar on other social media
sites where the “Hizbullah “or “Hezbollah” search expressions in English or
Arabic yield thousands of results related to the terrorist organization.
Hezbollah “Media Camps”
Falsehood flies and the Truth comes limping after it.12
According to an article published by Telegraph News Agency in August 2020,
since 2012 Hezbollah has been running “Media Camps,”13 where it trains socalled media fighters to manipulate photographs digitally, manage a significant
amount of fake social media profiles, avoid Facebook’s censorship, and spread
fake news and disinformation. The students come for the 10-day training from
Bahrain, Iraq, Saudi Arabia, and Syria. The course is an excellent opportunity
INTERNATIONAL JOURNAL OF INTELLIGENCE
HEZBOLLAH AND THE INTERNET IN THE TWENTY-FIRST CENTURY
675
Figure 2. Tweet from a Hezbollah sympathizer.
for Iran and Hezbollah to spread their ideology and sow the seeds of
uncertainty in the region, especially in Iraq. The article is based on interviews
with more than twenty former students, politicians, and media experts who
asked for anonymity for obvious reasons. The Telegraph investigation revealed
that thousands of activists were trained to give their knowledge away after
going home. This camp is a multimillion-dollar business for Hezbollah. As
reported by the article, Iran also has been running a similar camp, but it is far
less popular than Hezbollah’s course. The reason for the high efficiency of this
course and the “electronic army” in the Middle East is the greater dependency
on social media compared with Western countries.
With the lack of a reliable journalistic system, the people can only access
information on social media that is very cheap, popular, and easy to access.
The “electronic army” effectively exploits this situation. The “digital
warlords” launch social media campaigns with fake profiles spreading false
information on the target, and their other fake profiles share this until the
origin of the false information fades. The misinformation is widely spread
and builds in the public consciousness.
The Kata’ib Hezbollah group—designated as an Iraqi Shiite terrorist
group by Japan and the United States—spends a large amount of USD on
Facebook to boost its profiles. According to anonymous sources, 400
AND COUNTERINTELLIGENCE
VOLUME 36, NUMBER 3
676
} ATTILA GULYAS, AND DARKO TRIFUNOVIC
JANOS
BESENYO,
individuals have been working for the group’s “electronic army.” Some of the
fighters were trained in Hezbollah fake news camp, while the rest are trained
by the alumni of this course. The camp induced a so-called arms race among
the politicians in the area because having the most skilled electronic warriors
gives a prestige for the “owners.”14
The restrictions on Hezbollah in social media do not mean that the
organization waives the use of this kind of media. On the contrary, instead of
a direct presence, they have a presence on social media via their proxies and
sympathizers. The center of Hezbollah philosophy is the “resistance society,”
and the aim of the organization is to build a society that supports its military,
political, and social goals. The new situation demanded new solutions. With
the media camps, Hezbollah did not exhaust all of its possibilities to stay on
social media, because it changed its techniques and, instead of posting violent
content, which is usually getting censored out, it persuaded its supporters to
post peaceful messages about Hezbollah festivals, rallies, and the general
secretary’s speeches. Due to this change, thousands of Hezbollah-related
posts are on different social media platforms. According to an article on the
Bellingcat website in 2019, an ostensibly independent Lebanese activist group
augmented Hezbollah messaging and its fundraising system on social media.
The Attansakiyeh group defined itself as an independent organization and
had Twitter, Facebook, Instagram, Telegram, and YouTube accounts that
regularly posted indirect Hezbollah-supportive messages. Their messages
suggested the importance of Hezbollah in Lebanese society, but, to evade
social media censorship, they tried not to mention Hezbollah explicitly. (At
the time of writing this article, the group’s accounts are not available on the
aforementioned social media sites.15)
Virtual Entrepreneurs and Recruitment on Social Media
Hezbollah tends to learn from other, even Sunni, terrorist organizations about
new tools, techniques, and procedures (TTPs). Experts call one of the ISISintroduced techniques virtual entrepreneur or virtual planner. The point of this
new method is that the operative gets in contact with the candidate interested
in their ideology and wins their sympathy. As they are getting deeper into the
topic from the suggestions of the operative, they transit to a hidden form of
communication like Telegram or Wickr Me. The operative trains the candidate
for different kinds of tasks, such as surveillance, assassination, or fundraising,
just to name a few.16 Hezbollah realized that this method is cheap and highly
rewarding, and even if the terrorist attack is thwarted or the authorities reveal
the terrorist cell, Hezbollah can hide behind plausible deniability.17 The
Hezbollah virtual entrepreneurs use fake names like “Bilal” (full moon, water,
victorious, winner) and focus on Palestinians and Israeli Arabs to carry out
terrorist activities in Israel. For example, Muhammad Zaghloul (recruited
INTERNATIONAL JOURNAL OF INTELLIGENCE
HEZBOLLAH AND THE INTERNET IN THE TWENTY-FIRST CENTURY
677
Palestinian) got sixteen encrypted emails from a Hezbollah operative over the
course of several weeks requesting information on Israeli Defense Forces bases
and instructions on how to carry out suicide bombings.18 Based on opensource reporting, from January 2017, Hezbollah significantly reduced its online
recruitment activity. The reasons are unknown. According to some
assumptions, Hezbollah failed to gain a foothold in the West Bank, so it is
focusing on the Syrian side of the Golan Heights. The social media giants’
steps against the organization, together with Israel’s counterterrorism
endeavors, also might play a role in the failure of Hezbollah.19
Cyberwar, Cyberwarfare, Cyberespionage
Among the experts, there is no uniform definition of cyberwarfare, although
the widely accepted definition is the use of cyberattacks against states,
causing significant harm, disruption of vital computer systems, and loss
of life.20
The perpetrators of these kinds of attacks range from nation-state actors
to terrorist groups, cybercriminals, and hacker groups furthering the goals of
some nation.
In the course of the attacks, the actors can use the following kinds
of weapons:
different kinds of harmful software solutions, including viruses, malware
applications, Trojans;
Distributed Denial of Service attacks blocking legitimate users from accessing
devices or network services;
data theft from governmental, business, or educational institutions;
cyberespionage that compromises the target country’s national security;
ransomware solutions, data hostage, and blackmailing; and
spreading fake news and disinformation campaigns that cause chaos and loss
of confidence in financial or governmental organizations.
A cyberattack, on one hand, is a part of the cyberwar, so the cyberwar
consists of a series of cyberattacks, while on the other hand the cyberattacks
are regarded as a “campaign between wars” or “wars between wars.”21
Military experts consider cyberwar an asymmetric type of warfare because
one of the involved parties uses unconventional tactics to equalize its lower
military capabilities. In contrast with conventional warfare, information wars
do not need extensive and expensive military machinery. Instead, they
take a computer and Internet access, coupled with experts in computer
programming systems.
AND COUNTERINTELLIGENCE
VOLUME 36, NUMBER 3
678
} ATTILA GULYAS, AND DARKO TRIFUNOVIC
JANOS
BESENYO,
Hezbollah and Cyberespionage
According to uncorroborated information, Hezbollah has built a center for
cyberwarfare in the outskirts of Beirut in the Dahya neighborhood led by one
of the relatives of the secretary-general. The center is dedicated to the fight
against Israel. The hackers and other professionals, or at least a part of them,
are trained by Iranians. Although this information is not corroborated, some
events seem to prove the existence of the Hezbollah cyber unit.
Israeli security experts at the Check Point security firm revealed a
widespread cyberespionage campaign in 2015 whose origin reached back to
2012, targeting servers of military suppliers, telecommunication companies,
media outlets, and universities. The action affected a dozen countries,
including Israel, Japan, Saudi Arabia, Turkey, the United Kingdom, and the
United States, to name a few. The experts identified a unique software
package called “Explosive” used in the campaign. The analysis carried out by
the security experts found the “fingerprints” of the notorious Iranian
ITSecTeam hacker group in the malware’s source code tailored for
cyberespionage.22 Beyond this, the local setting of the operating system was
“Arabic-Lebanon” on the computer where the source code was compiled.
The software analysis provided further evidence for the Lebanese connection
because the malware’s control servers were physically located in Beirut. The
investigation also uncovered the identity of a Lebanese person who was in
connection with the servers. Check Point named the campaign “Volatile
Cedar” while the perpetrator got the Lebanese Cedar name, referring to the
cedar in the Lebanese national emblem. Evaluating the shreds of evidence, it
can be presumed with high probability that Hezbollah was behind the
campaign.23 Daniel Cohen, coordinator of the Cyber Warfare Program at the
Institute for National Security Studies, a prominent Israeli think tank,
has written:
We see the attacks are getting more sophisticated, the tools are more
sophisticated, and they [Hezbollah] are getting into the databases of
the system and are trying to gain intelligence—a password, details
of people.24
This was the first time Hezbollah was tied to a major cyberattack.
The Clear Sky Israeli cybersecurity company detected suspicious activities
on the network of some Israeli companies in early 2020. Comprehensive
forensic research on the compromised systems revealed special hack tools
familiar to the experts in connection with the “Volatile Cedar” campaign. The
attackers targeted Oracle and Atlassian web servers by exploiting known
vulnerabilities that were not patched. The experts studied the groups’ TTPs
and they identified those open-source tools that were used by the attackers to
find the vulnerable servers on which they installed their malware software
INTERNATIONAL JOURNAL OF INTELLIGENCE
HEZBOLLAH AND THE INTERNET IN THE TWENTY-FIRST CENTURY
679
packages. The software modules had numerous functionalities, like recording
keyboard strokes, uploading and downloading files, receiving commands
from the control servers, and database manipulation. Further analysis of the
software components used in the campaign revealed unique markers typical
for malware solutions of the Lebanese Cedar group. The encryption methods
within the programs, the style of the programming, and some code snippets
proved the Lebanese Cedar origin. Beyond this, the experts also found code
snippets from the malware solutions of the Iranian ITSecTeam and the
Persian Hacker group. However, there is no information on whether the
Iranian hackers gave Lebanese Cedar direct help or not.
Having the “fingerprints” of the group and knowing the TTPs, Clear Sky
made a widespread discovery on the Internet to find compromised publicfaced web servers. As a result of their research, they found more than 250
victims worldwide. Each of them was infected by Lebanese Cedar’s malware.
The most affected countries were mainly from the Middle East (Egypt, Israel,
Jordan, Saudi Arabia), but Argentina, Brazil, France, Germany, the
Palestinian Authority, the United Kingdom, and the United States were also
involved. Most identified victims are companies from the telecommunications
industry, Internet service providers, hosting providers, and government
agencies. According to the security experts, the campaign started in 2015, and
due to the prudent and wise use of the malware, it stayed hidden from
security experts for five years. Although Clear Sky security experts do not
claim unequivocally that the Lebanese group belongs to Hezbollah, the
targets of the first and second campaigns and Iranian cooperation all show
with high probability that Lebanese Cedar is connected to the Hezbollah
Cyber Unit. Regardless, after these two professional campaigns, Lebanese
Cedar changed gear from a “plain” hacker group to an advanced persistent
threat organization, because it has all the character of a stealthy threat actor.
The security experts cannot estimate the quantity and quality of the
information obtained by Lebanese Cedar during the five-year operation.25
The two unveiled cyberespionage campaigns show that the organization’s
cyber capabilities have significantly improved in the last decade. The
campaigns, each going on for years, were bearing the hallmark of a wellprepared, disciplined, well-orchestrated group or groups. The amount and
the quality of the stolen information and the damage caused by Hezbollah
are inestimable. Likewise, the destination of the stolen data is also unknown.
In the mirror of the events, we can be sure that Hezbollah does not give up
the cyberespionage and for sure that it keeps on improving its cyber
capabilities, and it prepares for the next campaign—if it is not ongoing now.
AND COUNTERINTELLIGENCE
VOLUME 36, NUMBER 3
680
} ATTILA GULYAS, AND DARKO TRIFUNOVIC
JANOS
BESENYO,
HEZBOLLAH AND THE DARK WEB
What do terrorists do on the Dark Web? According to Serbakov,26 they use
it to spread their propaganda, and for fundraising, recruiting, training, and
coordination. Gabriel Weimann’s answer in his article with the title
“Migration to the Dark Web” is “more of the same but more secretly.”27
It is only partially true because, in contrast with ISIS or al-Qaeda,
Hezbollah has a big advantage due to its hybrid position; namely, it has legal
media conduits for reaching its audience.
Searching for Hezbollah on the Dark Web
Searching for the “footprints” of Hezbollah on the Dark Web is
cumbersome and time-consuming for a researcher because the traditional
search engines do not work in this domain. The popular Dark Web
systems—such as The Onion Router, Invisible Internet Project, or
Freenet—have their own search engines, but their abilities are limited and
far less efficient than their traditional equivalents on the Surface Web.
While the traditional engines like Google or Bing keep crawling on the
Internet searching for new sites and indexing them, the search engines on
the Dark Web work differently. There is no automated indexing so the
site owners can propagate their sites via public link collections, or the
databases of the search engines. But if a site owner does not promote
their site, others will not be aware of it.
The “Hezbollah” expression and its different spellings in different
languages did not yield any relevant results, neither on the search engines of
the aforementioned systems nor the searching in the link collections.
The second way to find virtual traces of the organization is based on the
assumption that Hezbollah is deeply involved in illicit activities, as proven in
Rachel Ehrenfeld’s book Funding Evil.28 Ehrenfeld presents in detail the
following financial sources of Hezbollah:
Support from Iran
Support from charitable organizations
Donations from individuals
Proceeds from legitimate businesses
Illegal arms trading
Cigarette smuggling
Currency and other counterfeit goods
Fraud
Robbery
Operating illegal telephone exchanges
Drug trafficking
INTERNATIONAL JOURNAL OF INTELLIGENCE
HEZBOLLAH AND THE INTERNET IN THE TWENTY-FIRST CENTURY
681
Figure 3. Hezbollah’s counterfeit dollar on the Apollon cryptomarket.
The reader may notice that a significant part of the sources comes from
illicit activity. In his book Terrorism Inc., Colin P. Clarke corroborates
Ehrenfeld’s findings that a considerable amount of Hezbollah’s income
comes from illegal activity, including currency and pharmaceutical
counterfeiting.29
Using this information as a springboard for a search of the dozens of
crypto markets, which are a main arena for illicit activities on the Dark Web,
yielded a remarkable result. As Figure 3 shows, Hezbollah made counterfeit
$100 USD denomination notes to be sold on the Apollon Market
cryptomarket.
Following the link to the description of the offer, the vendor, under the
pseudonym “therealbitsofall (100%),” says, “Please search Hezbollah fro [sic]
pricing and features. These are the best USD notes on the market. I’ve
partnered w Hez to provide a US-US sample so you can see them fast before
placing a larger order w him. This is for 1 sample note.” A further search on
the site yielded the vendor under the pseudonym “Hezbollah.” It seems that
he is a genuine counterfeit dollar vendor and “therealbitsofall (100%)” is only
a partner. “Hezbollah” sells bulk counterfeit “Hezbollah” USD dollars from
the 2006 and 2009 series, as seen in Figure 4.
“Hezbollah” gives some additional instructions for the buyers for aging the
money and how to use it safely. According to the buyers’ comments, both
vendors are reliable, and the counterfeit money is also high quality and
accepted by automated teller machines and shops. It has every security
AND COUNTERINTELLIGENCE
VOLUME 36, NUMBER 3
682
} ATTILA GULYAS, AND DARKO TRIFUNOVIC
JANOS
BESENYO,
Figure 4. Hundred dollar bills on the Apollon cryptomarket selling by Hezbollah.
feature, just like real money. The “Hezbollah” attribute of the counterfeit
dollar is a trademark of the quality.
The fact that the vendor’s pseudonym and the counterfeit dollar’s name is
“Hezbollah” is not hard evidence, of course, but it is hard to deny that it is a
strange coincidence. Taking into account the quality of the “Hezbollah
money,” in the counterfeit money business the “Hezbollah” name is a kind
of hallmark.30
It is not likely that a Hezbollah operative is behind the nickname because,
according to Matthew Levitt, Hezbollah has built a worldwide network of
supporters, sympathizers, and formal operatives to provide financial,
operational, and logistical support.31
In some cases, these primarily informal groups are the sources of false
documents, weapons, counterfeit money, and financial funds. It is hard to
follow them back to Hezbollah, because the Hezbollah operatives, who are
involved in the crime, are in the background and run well-trained and
committed henchmen. They are described by an experienced Hezbollah-case
Federal Bureau of Investigation investigator as “useful idiots” who want to
be engaged in a glorious cause.32 While they are the basis of the plausible
deniability of the organization, at the same time the anonymity provided by
the Dark Web covers them so the circle is closed.
INTERNATIONAL JOURNAL OF INTELLIGENCE
HEZBOLLAH AND THE INTERNET IN THE TWENTY-FIRST CENTURY
683
CONCLUSION
Hezbollah, from the beginning, has waged war against its eternal enemy
Israel and Western influence—especially the U.S. presence in the region. The
history of the organization is patterned with kinetic wars and low-level
conflicts with Israel, but in the last few decades the war is waged in a new
domain. From the moment of its birth, Hezbollah has kept honing its
information warfare capabilities using every available means and domain.
The most significant evidence for their proficiency is the successful and
popular “Fake News Training Camp” that has been successfully working for
more than a decade, spreading their ideology and unrest in the Middle East.
It is hard to deny that the idea and its realization are the quintessence of the
technology available for everyone in the twenty-first century. The long-run
cyberespionage campaigns and involvement in the Dark Web in its raising of
finances prove that Hezbollah has grown to the challenges of the twentyfirst century.
The revelation of the connection between Hezbollah and the Dark Web is
a new achievement that requires further investigation in order to discover
more details, contacts, and procedures and techniques.
The organization’s history shows that it quickly adapted to new situations
and realized the importance of the inherent possibilities of new technologies so
in the future its presence cannot be overlooked in the cybersecurity landscape.
ORCID
Janos Besenyő
http://orcid.org/0000-0001-7198-9328
Attila Gulyas
http://orcid.org/0000-0001-5645-144X
http://orcid.org/0000-0003-3591-9554
Darko Trifunovic
REFERENCES
1
Dominique Avon and Anaїs-Trissa Khatchadourian, Hezbollah: A History of
the “Party of God” (Cambridge, MA: Harvard University Press, 2012),
pp. 23–24.
2
The Henry Jackson Society, Timeline of Terror: A Concise History of Hezbollah
Atrocities (London: Henry Jackson Society, 2012).
3
Carl Anthony Wege, “Hezbollah and Hamas,” TRAC Terrorism Research &
Analysis
Consortium,
https://www.researchgate.net/publication/265014056_
Hezbollah_and_Hamas (accessed 14 February 2021).
4
“Hezbollah: History and Overview,” Jewish Virtual Library, https://www.
jewishvirtuallibrary.org/history-and-overview-of-hezbollah (accessed 7 March 2021).
5
U.S. Department of State, Bureau of Counterterrorism, “Country Reports on
Terrorism 2019,” https://www.state.gov/reports/country-reports-on-terrorism2019/ (accessed 8 March 2021).
6
Carl von Clausewitz, On War (Oxford: Oxford University Press, 2007), p. 141.
AND COUNTERINTELLIGENCE
VOLUME 36, NUMBER 3
684
} ATTILA GULYAS, AND DARKO TRIFUNOVIC
JANOS
BESENYO,
7
Peter Warren Singer and Emerson T. Brooking, Like War: The Weaponization
of Social Media (Boston and New York: Mariner Books, 2018), p. 9.
8
Ibid.
9
Hezbollah’s Media Empire. The Meir Amit Intelligence and Terrorism
Information Center (2019), https://www.terrorism-info.org.il/en/hezbollahsmedia-empire/ (accessed 12 March 2021).
10
Sarah E. Needleman and Bowdeya Tweh, “Twitter Suspends Accounts Linked
to Hamas, Hezbollah,” Wall Street Journal (2021), https://www.wsj.com/
articles/twitter-suspends-accounts-linked-to-hamas-hezbollah-11572888026
(accessed 10 February 2021); Toi Staff, “Hezbollah Says Some of Its Facebook
and Twitter Pages Shuttered,” The Times of Israel, https://www.timesofisrael.
com/facebook-twitter-pages-of-hezbollah-shuttered (accessed 9 January 2021).
11
Chloe Colliver, Jennie King, and Eisha Maharasingam-Shah, “Hoodwinked:
Coordinated Inauthentic Behaviour on Facebook,” Institute for Strategic
Dialogue, https://www.isdglobal.org/wp-content/uploads/2020/10/Hoodwinked-2.
pdf (accessed 15 February 2021), p. 3.
12
Jonathan Swift, quoted in The Examiner, No. 14 (1710), p. 2, https://books.
google.hu/books?id=KigTAAAAQAAJ&q=%22Truth+comes%22&redir_esc=
y#v=onepage&q=swift&f=false (accessed 5 March 2021).
13
Wil Crisp and Suadad al-Salhy, “Exclusive: Inside Hizbollah’s Fake News
Training Camps Sowing Instability across the Middle East,” The Telegraph,
https://www.telegraph.co.uk/news/2020/08/02/exclusive-inside-hezbollahs-fakenews-training-camps-sowing/ (accessed 2 February 2021).
14
Wil Crisp and Suadad al-Salhy, “Fake News Production in the Middle East,”
Journalismfund.eu, https://www.journalismfund.eu/fake-news-production-MiddleEast, (accessed 15 January 2021).
15
Hector Martinez, “Hashtaggers for Hezbollah? How Social Media Fundraising
Can Skirt the Rules,” Bellingcat, https://www.bellingcat.com/news/2019/08/27/
hashtaggers-for-hezbollah-how-social-media-fundraising-can-skirt-the-rules/
(accessed 12 March 2021).
16
Michael Shkolnik and Alexander Corbeil, “Hezbollah’s ‘Virtual Entrepreneurs’:
How Hezbollah is Using the Internet to Incite Violence in Israel,”
CTCSENTINEL, Vol. 11, No 6 (2018), https://ctc.usma.edu/hezbollahs-virtualentrepreneurs-hezbollah-using-internet-incite-violence-israel/
(accessed
19
February 2021); Seamus Hughes and Alexander Meleagrou-Hitchens, “The
Reach of ISIS’s Virtual Entrepreneurs into the United States,” Lawfare,
https://www.lawfareblog.com/reach-isiss-virtual-entrepreneurs-united-states
(accessed 28 March 2021).
17
Shkolnik and Corbeil, “Hezbollah’s ‘Virtual Entrepreneurs.’”
18
Ibid.
19
Ibid.
20
Katie Terrell, Hanna Kevin Ferguson, and Linda Rosencranc, “Cyberwarfare”
[definition]. TechTarget, https://www.techtarget.com/searchsecurity/definition/
cyberwarfare, (accessed 10 March 2021).
INTERNATIONAL JOURNAL OF INTELLIGENCE
HEZBOLLAH AND THE INTERNET IN THE TWENTY-FIRST CENTURY
21
685
“The Cyber-War In the Middle East: Israel, Iran and Others,” Invisible Dog
Investigative
Journalism,
http://www.invisible-dog.com/cyber_war_eng.html
(accessed 5 February 2021),
22
The ITSecTeam is an Iranian hacker group believed to have been working on
behalf of Iran’s Islamic Revolutionary Guard Corps. Council on Foreign
Relations, “Cyber Operations,” https://www.cfr.org/cyber-operations/itsecteam
23
Jeff Moskowitz, “Cyberattack Tied to Hezbollah Ups the Ante for Israel’s
Digital Defences, Christian Science Monitor, https://www.csmonitor.com/World/
Passcode/2015/0601/Cyberattack-tied-to-Hezbollah-ups-the-ante-for-Israel-sdigital-defenses (accessed 9 March 2021).
24
Quoted in Jeff Moskowitz, “Hezbollah Just Upped the Cyber Ante against
Israel”, INSIDER, https://www.businessinsider.com/hezbollah-just-upped-thecyber-ante-against-israel-2015-6 (accessed 9 March 2021).
25
ClearSky Research Team, “Lebanese Cedar,” APT Global Lebanese Espionage
Campaign Leveraging Web Servers, Clearsky, https://www.clearskysec.com/
cedar/ (accessed 25 March 2021).
26
M
arton Serbakov, “A terroristak internet hasznalata [Internet Use of
Terrorists],” B€untetőjogi Szemle Szemle, No. 2 (2018), https://ujbtk.hu/drserbakov-marton-tibor-a-terroristak-internethasznalata%c2%b9/ (accessed 22
February 2021), pp. 85–93.
27
Gabriel Weimann, “Terrorist Migration to the Dark Web,” Perspective on
Terrorism, Vol. 10, No. 3, http://www.terrorismanalysts.com/pt/index.php/pot/
article/view/513/html (accessed 12 February 2021), pp. 40–44.
28
Rachel Ehrenfeld, Funding Evil: How Terrorism Is Financed—And How to Stop
It (Chicago: Bonus Books, 2003), p. 109.
29
Colin P. Clarke, Terrorism, Inc.: The Financing of Terrorism, Insurgency, and
Irregular Warfare (Denver: Praeger, 2015), p. 92.
30
American Jewish Committee, Setting the Record Straight on Hezbollah: Full
Report, https://www.ajc.org/news/setting-the-record-straight-on-hezbollah-fullreport, (accessed 24 March 2021).
31
Matthew Levitt, Hezbollah’s Criminal Networks: Useful Idiots, Henchmen, and
Organized Criminal Facilitators. The Washington Institute for Near East Policy,
https://www.washingtoninstitute.org/policy-analysis/hezbollahs-criminal-networksuseful-idiots-henchmen-and-organized-criminal (accessed 17 January 2022).
32
Ibid.
AND COUNTERINTELLIGENCE
VOLUME 36, NUMBER 3
Download