Deep Dot Web https://www.deepdotweb.com Surfacing The News From The DeepWeb Fri, 22 Sep 2017 05:55:25 -0300 en-US hourly 1 https://wordpress.org/?v=4.8.2 Belgian Man Arrested for Accessing 64,000 CP Images on the Darknet https://www.deepdotweb.com/2017/09/22/belgian-man-arrested-accessing-64000-cp-images-darknet/ https://www.deepdotweb.com/2017/09/22/belgian-man-arrested-accessing-64000-cp-images-darknet/#respond Fri, 22 Sep 2017 05:55:25 +0000 https://www.deepdotweb.com/?p=22682 In Brussels-Halle-Vilvoorde, a judicial arrondissement in Brussels, Belgium, a 24-year-old man from Zaventem caught a 36-month sentence for an ”impressive” collection of child pornography. In Brussels, according to court officials, the issue is a “nuclear epidemic” and the 24-year-old had demonstrated that perfectly. Yet, in spite of the high chance of recidivism the defendant is ...

The post Belgian Man Arrested for Accessing 64,000 CP Images on the Darknet appeared first on Deep Dot Web.

]]>
In Brussels-Halle-Vilvoorde, a judicial arrondissement in Brussels, Belgium, a 24-year-old man from Zaventem caught a 36-month sentence for an ”impressive” collection of child pornography. In Brussels, according to court officials, the issue is a “nuclear epidemic” and the 24-year-old had demonstrated that perfectly. Yet, in spite of the high chance of recidivism the defendant is still fighting for a diversion.

In September 2014, the FBI assisted Belgian authorities of the rampant spreading of child abuse “pornography” by actors using the darknet. They shared the media across the Tor network, according to Brussels prosecutors. The investigation into the man began then and persisted for a single year.

Following the FBI’s warning, Belgian authorities raided the suspect’s home. The raid ended and detectives had not found a single piece of incriminating evidence. The investigation continued for one year before authorities in Brussels made another move. In 2015, law enforcement raided the suspect once again and struck figurative gold. During the second search, authorities found a USB drive that contained a quantity of pictures and videos that the government considered a part of the nuclear epidemic.

ximg_580e8ee74afa3.jpg.pagespeed.gp+jp+jw+pj+ws+js+rj+rp+rw+ri+cp+md.ic.gZwnrrHDHN.jpg

After a forensic analysis, the authorities recovered 64,000 pictures and 700 videos. “From that collection [of pictures and videos], along with his statements, he appears to be very focused on looking for a certain age category: girls aged 12 and 13, though with a lower limit of 7 to 8 years,” the Court continued. “In addition, he seems to have no shame or guilt, and he thinks he should not be punished.”

Indeed, he fought for a diverted sentence. And the Court pushed for a sentence of 36-months imprisonment. A court psychiatrist evaluated the 24-year-old and determined that he—the suspect—would likely continue to violate. The defense recognized the crime’s severity.

“My client has been slowly shifted from here since the 16th and has become addicted,” the defense council said. “Since he has been released unconditionally, he has begun to follow [up with] therapy and he is still following. In addition, my client has finished his studies in the meantime and has a fixed job. ”

The Court will be have a verdict on October 4.

The post Belgian Man Arrested for Accessing 64,000 CP Images on the Darknet appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/22/belgian-man-arrested-accessing-64000-cp-images-darknet/feed/ 0
German Man Caught in International CP Bust https://www.deepdotweb.com/2017/09/21/german-man-caught-international-cp-bust/ https://www.deepdotweb.com/2017/09/21/german-man-caught-international-cp-bust/#comments Thu, 21 Sep 2017 23:43:47 +0000 https://www.deepdotweb.com/?p=22672 In Erfurt, a German city in the state of Thuringia, a 34-year-old confessed to sexual abuse charges that stemmed from his actions on a darknet chatroom. The 34-year-old Gotha man was one of 50 caught in a international child abuse network sting operation. At the District Court of Erfurt, the judge—one who had dealt with ...

The post German Man Caught in International CP Bust appeared first on Deep Dot Web.

]]>
In Erfurt, a German city in the state of Thuringia, a 34-year-old confessed to sexual abuse charges that stemmed from his actions on a darknet chatroom. The 34-year-old Gotha man was one of 50 caught in a international child abuse network sting operation. At the District Court of Erfurt, the judge—one who had dealt with similar cases—spoke of his shock while reading and hearing the 34-year-old’s case.

The men, including the defendant who confessed his crimes at the District Court of Erfurt, had contributed directly to the abuse of a child through the darknet. On a hidden service chat room, the 50—or more—men had paid the family (father and mother) to abuse their two year old daughter and either stream the footage of upload it at a later time. While the price that each participant had had the parents of the 2-year-old has not yet been discussed, the 34-year-old paid 5,000 euros to participate in the violent abuse of the innocent victim.

Judge Holger Pröbstel, the presiding judge, said that the case had sickened him despite his long history of dealing with child abuse cases. The prosecution found it relevant to read aloud the chat transcripts in front of the Court. The transcripts, beyond a shadow of a doubt, proved that the 34-year-old both paid and issued commands that directly controlled the rape and abuse the child had endured.

According to the defendant, he had stumbled across the hidden service by accident and in boredom. He quickly learned that the girl he would be virtually controlling—through a proxy who would carry out the actual abuse— was only two years old. He admitted to the Court that this was when he realized that his sexual preferences were “a problem” and that the preferences probably required therapy.

The legal council, speaking for the defendant, explained that the man had realized what he had done. He had learned the full weight of his crimes. While the defendant was in police custody awaiting a hearing, he “became more and more aware of the abominable act he had supported and committed,” the lawyer stated. The lawyer explained that his client knew punishment was in order, but asked if, instead of prison time, the client receive probation. And to this request, Judge Pröbstel responded with a “maybe,” of sorts.

Pending an independent psychiatric evaluation, the defendant could receive a pre-trial diversion. The prison sentence would be mitigated upon completion of a probation period and compliance with any other stipulations the judge requested.

The father and mother of the young girl received a sentence of 10 years and nine months and a sentence of 10 years, respectively.

The post German Man Caught in International CP Bust appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/21/german-man-caught-international-cp-bust/feed/ 1
18 Month Sentence for Austrian Man Caught Ordering Drugs from Rehab https://www.deepdotweb.com/2017/09/21/18-month-sentence-austrian-man-caught-ordering-drugs-rehab/ https://www.deepdotweb.com/2017/09/21/18-month-sentence-austrian-man-caught-ordering-drugs-rehab/#respond Thu, 21 Sep 2017 17:43:44 +0000 https://www.deepdotweb.com/?p=22671 In Purkersdorf, a municipality in the Austrian state of Lower Austria, a 25-year-old appeared in court for drug charges. He had ordered heroin that customs officers in Vienna had intercepted. Then amphetamine. And then once more with “speed.” Before a judge at the regional court of St. Pölten, the defendant asked for a chance to ...

The post 18 Month Sentence for Austrian Man Caught Ordering Drugs from Rehab appeared first on Deep Dot Web.

]]>
In Purkersdorf, a municipality in the Austrian state of Lower Austria, a 25-year-old appeared in court for drug charges. He had ordered heroin that customs officers in Vienna had intercepted. Then amphetamine. And then once more with “speed.” Before a judge at the regional court of St. Pölten, the defendant asked for a chance to do right.

Only, to the court’s dismay, the 25-year-old had appeared in that courtroom less than one year prior. He suffered from a drug addiction, according to the judge’s final verdict. Instead of prison time, the defendant received a sentence that sent him to an inpatient therapy center. “I know that I have had enough chances. But I still ask for one more. Because if I do not manage my life now, everything is over, ” he pleaded before the judge.

austria_police_creditblu-news_org_flickr.jpeg

From the therapy or rehab center, the 25-year-old ordered 50 grams of heroin. After some amount of time passed without any sign of the package, he ordered another package: 50 grams of amphetamine (the court did distinguish between amphetamine and speed). That package, too, never arrived. So, he ordered again. This time he ordered 50 grams of speed in one form or another. As anyone but the defendant might have expected, the package of speed also failed to arrive.

Why the court waited so long to press charges is unclear. But the packages, including the first heroin parcel, were picked up by customs at the Vienna airport. All three packages were stopped by customs agents at the Vienna airport. Yet, in spite of this, the rehab patient continued to order drugs from his computer. Somehow, he may have been able to get some packages through customs, although the details were not easily locatable.

The prosecutor was not fond of the 25-year-old’s actions. “You were in withdrawal and ordered drugs,” he said. And furthermore, “there is a suspicion that you wanted to distribute the addictive drugs to customers who are right next door to your room.” The defendant did not confirm or deny the suspicions. However, he unexpectedly volunteered more information than they had asked of him.

“I have been using ketamine because I have heard [the court] cannot prove that on drug tests.”

After the judge had heard enough, he asked if there was any use in allowing the 25-year-old continue treatment. “A psychiatrist will decide whether the defendant is willingly treatable,” the judge said as he handed down a new 18-month sentence.

The post 18 Month Sentence for Austrian Man Caught Ordering Drugs from Rehab appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/21/18-month-sentence-austrian-man-caught-ordering-drugs-rehab/feed/ 0
Pennsylvania Man Sentenced to 87 Months for Pill Distribution https://www.deepdotweb.com/2017/09/21/pennsylvania-man-sentenced-87-months-pill-distribution/ https://www.deepdotweb.com/2017/09/21/pennsylvania-man-sentenced-87-months-pill-distribution/#respond Thu, 21 Sep 2017 12:43:41 +0000 https://www.deepdotweb.com/?p=22670 On August 31, U.S. District Court Judge Malachy E. Mannion sentenced 36-year-old Franklin Tejeda to 87 months in prison for his part in an international pill trafficking organization. Tejeda, according to United States Attorney Bruce D. Brandler, imported hundreds of thousands of Schedule ll and Schedule IV pills between 2014 and 2016. The press release ...

The post Pennsylvania Man Sentenced to 87 Months for Pill Distribution appeared first on Deep Dot Web.

]]>
On August 31, U.S. District Court Judge Malachy E. Mannion sentenced 36-year-old Franklin Tejeda to 87 months in prison for his part in an international pill trafficking organization. Tejeda, according to United States Attorney Bruce D. Brandler, imported hundreds of thousands of Schedule ll and Schedule IV pills between 2014 and 2016.

The press release from the United States Attorney’s Office for the Middle District of Pennsylvania revealed that Tejeda had pleaded guilty to the charges in October 2016. The Drug Enforcement Administration and United States Postal Inspection Service investigated the case as part of Pennsylvania’s “Heroin Initiative.” While the Hazleton man received no charges directly related to heroin use or distribution, the United States Attorney’s Office did charge him with importing more than six types of prescription drugs.

pills.gif

However, this case was a part of the Heroin Initiative, a multi-agency initiative to stop heroin and fentanyl abuse through several means, including drug treatment and more invasive law enforcement measures. The Heroin Initiative is not a Pennsylvania exclusive venture, nor is it brand new. Some states had implemented their own form of the action plan in 2014. Here is the only part in Pennsylvania’s that speaks of more than just heroin and Pennsylvania:

“In order to target rapid overdose responses—especially to deadly “batches” of fentanyl-adulterated heroin—information and intelligence must be routinely reported, consolidated, and analyzed. Led by the FBI and DEA, and with help from state and local partners, our district established an intelligence clearinghouse, or fusion center, to receive reports of heroin overdoses and seizures from first responders. Submissions to the fusion center have already resulted in investigation leads and enabled us to link distributors, telephone numbers, and stamped bags for enhanced, coordinated investigation.”

According to criminal information filed with the USAO, Tejeda imported oxycodone pills, hydrocodone pills, Percocet® pills, Tramadol® pills, Diazepam pills, and Xanax® pills, among others. He pleaded guilty to the importation of these drugs, as well as their distribution. He ordered the pills from co-conspirators in India and the Dominican Republic. He orchestrated the delivery of the drugs to recipients in Hazleton.

Between November 2014 and March 2016, Tejeda distributed hundreds of thousands of pills to customers in no particular region. In March 2016, Hazleton Police and the DEA raided Tejeda’s residence. They arrested Tejeda and seized more than 100,000 Schedule II and IV pills. In October, Tejeda pleaded guilty to his role in the international pill distribution conspiracy.

In addition to the 87 months Tejeda must spend in prison, Judge Mannion sentenced Tejeda three years of government supervision upon release.

The post Pennsylvania Man Sentenced to 87 Months for Pill Distribution appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/21/pennsylvania-man-sentenced-87-months-pill-distribution/feed/ 0
Russian Authorities Busted RAMP, the Oldest Darknet Market https://www.deepdotweb.com/2017/09/21/russian-authorities-busted-ramp-oldest-darknet-market/ https://www.deepdotweb.com/2017/09/21/russian-authorities-busted-ramp-oldest-darknet-market/#respond Thu, 21 Sep 2017 05:53:59 +0000 https://www.deepdotweb.com/?p=22664 Russian police, in July 2017, shut down the largest remaining darknet market: RAMP aka Russian Anonymous Marketplace. The news surfaced through an official document provided to TASS, a Russian news agency. In July, RAMP went offline for an abnormal and unexpected period of time, naturally distilling fear amongst users. Alphabay and Hansa went down the ...

The post Russian Authorities Busted RAMP, the Oldest Darknet Market appeared first on Deep Dot Web.

]]>
Russian police, in July 2017, shut down the largest remaining darknet market: RAMP aka Russian Anonymous Marketplace. The news surfaced through an official document provided to TASS, a Russian news agency. In July, RAMP went offline for an abnormal and unexpected period of time, naturally distilling fear amongst users. Alphabay and Hansa went down the same month.The market admin, Darkside, launched the market in September 2012 and, save for chronic DDoS attacks, RAMP almost effortlessly became the largest marketplace to date.Capture3.PNG

Then, as if it had dropped from standard DDoS attacks, Russian law enforcement ended the market’s reign. TASS received this news—and official documentation—thanks to a question directed towards Deputy Interior Minister Mikhail Vanichkin by State Duma member Anton Gorelkin. The State Duma member asked the Deputy Interior Minister about steps taken to combat internet drug trafficking. The Deputy Interior Minister responded, in part, as follows:

ramp.png

As a result of the activities carried out in July 2017, the largest Russian-language trading platform RAMP (Russian anonymous marketplace), the largest in the Russian language segment, was terminated. [The MVD has permanently implemented] a set of measures aimed at identifying and suppressing the activities of members of criminal groups engaged in the distribution of synthetic drugs, potent substances, precursors and cocaine in a non-contact way using the Internet.”

“The main efforts are aimed at suppression of drug supply channels and elimination of organized groups and criminal communities engaged in their sale,” he added. When asked by TASS for a response to the above answer (and the undisclosed portions), Gorelkin called the removal of RAMP “excellent news.” He mentioned that many RAMP users and admins had believed that law enforcement ignored RAMP, allowing it to stay online for so much longer than other markets. ”The RAMP administrators themselves in interviews with journalists boasted that,” the State Duma member added.

ramp1.png

In one interview with Meduza, Nikkon, a guarantor on one of Russia’s largest darknet forums known as “Runion” provided a similar opinion regarding Russian darknet markets and forums. As did Korabas, one of the forum’s mainstays: “the security services are far away from Tor.” He added that Russian law enforcement “still don’t consider [hidden services] a threat.” The Amberoad hacker, Sleepwalker, agreed with respect to the darknet sites that were primarily forums. Unlike RAMP’s forum layout but obvious market intentions. “[Russian police] are, of course, interested in large stores like Ramp,” Sleepwalker said. “But a conflict with them is inevitable as more and more people begin to spill onto Tor. Exciting times are upon us.”

And even Wired had something to add—in 2014: “It isn’t exactly clear how RAMP has managed to avoid the same fate as Silk Road and its successors. The explanation may be as straightforward as the fact it targets users in Russia, where law enforcement often turns a blind eye to online crime.”

Although the Russian market was generally ignored by Western media, for many obvious reasons (language barriers, for one), the fact remains that law enforcement agencies took down three darknet drug markets during a single month. Three of the most popular ones, at that. Russia’s operation against the oldest marketplace in existence seemingly took far less time to produce results than the FBI’s Alphabay operation.

The post Russian Authorities Busted RAMP, the Oldest Darknet Market appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/21/russian-authorities-busted-ramp-oldest-darknet-market/feed/ 0
Hacker transfers $500,000 from an American bank to a company in Dubai https://www.deepdotweb.com/2017/09/20/hacker-transfers-500000-american-bank-company-dubai/ https://www.deepdotweb.com/2017/09/20/hacker-transfers-500000-american-bank-company-dubai/#respond Wed, 20 Sep 2017 23:54:00 +0000 https://www.deepdotweb.com/?p=22651 An unknown computer hacker has managed to transfer $500,000 (Dh1.8 million) from a bank account in Seattle to a financial services company in Dubai with the intent of investing the money in stock markets. Court documents revealed that the unknown hacker in the unauthorized transfer gained access to a bank account of an American man ...

The post Hacker transfers $500,000 from an American bank to a company in Dubai appeared first on Deep Dot Web.

]]>
An unknown computer hacker has managed to transfer $500,000 (Dh1.8 million) from a bank account in Seattle to a financial services company in Dubai with the intent of investing the money in stock markets.

Court documents revealed that the unknown hacker in the unauthorized transfer gained access to a bank account of an American man in March 2013 and then transferred the amount ($500,000) to the company’s bank account in three installments. Afterwards, an unknown man then went to the bank and claimed he was the American national who owned the account, withdrew some of the profits the money had yield.

Upon discovering the dubious scheme, the American national who owned the account made contact with the financial company in Dubai asking to reclaim the money of which the company refused to do. He made it known to them that he wasn’t the one who approved or sanctioned the transfers, neither did he sign any agreements, nor was he the person who withdrew the cash.

The financial company in Dubai’s decision not to return the money even after acknowledging the receipt which indicated that they received the money, led to the American National’s legal consultant, Hassan Elhais, from Al Rowaad Advocates, to file a civil case against the financial company in attempt to force them to return the money.

Mr. Elhais was able to provide evidence to the civil court in Dubai showing clearly that, his client together with the financial services company in Dubai had no hand in the criminal act. He then proved that his client’s account had experienced a cyber-breach which led to that problem.

That critical revelation in the case compelled the court to assign an auditor on making further investigation into the case which included the source of the money and the various ways of which it was transferred to the financial services company in Dubai.

It was later revealed after the investigation that, the American national indeed was the genuine owner of the bank account and also did not authorize the transfer of $250,000 out of the total $500,000 that was moved.

Further information from the report showed that the other half of the amount, thus another $250,000 was transferred to the company in two installments. An unknown third party involved also used a power of attorney which was allegedly given to him by the American national to withdraw money.

An additional report also stated that, a Cyber crime had occurred and that, the victim is demanding to make a criminal case linked to charges of forgery and impersonation.

When asked if the hacker acted alone or that there were possible hackers involved, Mr. Elhais told the court he could neither confirm nor deny but that more investigations would need to be conducted.

The Dubai based financial services company also presented documents to the court which showed that they made an agreement with the American national including a transfer letter and a withdrawal application for Dh90,000, all bearing his name and signature.

His legal consultant Mr. Elhais once again argued that the documents including the passport and the identification card were everything but the original documents of his client. He proceeded to present original copies of his client’s documents with included his original passport, which clearly was different than that of which the financial company had brought.

All of the submitted documents were then verified and afterward, the Dubai civil court ordered the Dubai based financial services company to repay a sum of $25,000, which was transferred without the authorization of the American national according to court reports.

In addition, the company was also ordered to pay a further 9 percent interest rate on the amount from the date of his legal claim in September 2016.

Nevertheless, the court came to a decision that, the rest of the money was not going to be returned because of lack of evidence to prove that he authorized the transfer of it.

As many laws suggests that, you can fight these cases on the grounds that it is illegal for a person to willfully keep and spend cash in their account that they know was not meant for them. The American national who wasn’t content with the ruling opted to appeal the case but unfortunately, the ruling was sustained.

No criminal case has been filed as of now by the American while the identity of the unknown hacker remains unknown.

The post Hacker transfers $500,000 from an American bank to a company in Dubai appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/20/hacker-transfers-500000-american-bank-company-dubai/feed/ 0
μProxy – A Hardware Relay Solution for Protecting Geolocation Anonymity of Internet Users https://www.deepdotweb.com/2017/09/20/%ce%bcproxy-hardware-relay-solution-protecting-geolocation-anonymity-internet-users/ https://www.deepdotweb.com/2017/09/20/%ce%bcproxy-hardware-relay-solution-protecting-geolocation-anonymity-internet-users/#comments Wed, 20 Sep 2017 17:53:57 +0000 https://www.deepdotweb.com/?p=22650 Anonymity and privacy of internet users have attracted considerable attention during the past few years. A pivotal privacy issue is that a user’s geographical location can be pinpointed, if his/her IP address has been detected, giving the attacker a relatively precise real-time location. In most cases, this information is adequate for an attacker, to close ...

The post μProxy – A Hardware Relay Solution for Protecting Geolocation Anonymity of Internet Users appeared first on Deep Dot Web.

]]>
Anonymity and privacy of internet users have attracted considerable attention during the past few years. A pivotal privacy issue is that a user’s geographical location can be pinpointed, if his/her IP address has been detected, giving the attacker a relatively precise real-time location. In most cases, this information is adequate for an attacker, to close in and eventually determine the location of the user via implementation of traditional tracking methods.

Presently available anonymity solutions, including The Onion Routing Project (TOR), proxy servers and Virtual Private Networks (VPNs) aim at mitigating this problem via routing network traffic through a single, or multiple third party relay nodes. This prevents an attacker from determining the real origin or destination of a data packet. This approach is effective in isolating a user from the websites he/she is visiting, yet it does little, when it comes to guarding the user’s geographical location, as the attacker can still detect VPN, or Tor traffic emerging from the user’s network connection. Consequently, a system is needed to sever the association between a user’s IP address and his/her geographical location.

A recently published paper introduced μProxy, an inexpensive solution that can solve this problem and break the association between a user’s IP address and his/her corresponding geographical location. μProxy promotes location anonymity of internet users via an arbitrary set interconnected Wifi nodes that relay users’ traffic. The relay extends between the user and the destination network, to which he/she chooses to connect, e.g. a public Wifi network. Network traffic will seem to emerge from the last device along the path of relay nodes. If an attacker attempts to trace back the IP address of the user, he will only be able to determine the IP address of the relay endpoint. Further tracking will require detecting the location of an arbitrary number of relay nodes (these are potentially covert relay nodes), which would yield an exponentially enlarging search radius. Such a search radius is well beyond the capabilities of most adversaries.

System Design of μProxy:

μProxy represents a series of Wifi nodes forming a “Wifi relay” with a “daisy chain” topology, as illustrated in the below figure. The relay has a pair of endpoints; a local endpoint to which the user connects, and a remote endpoint that connects to the internet, e.g. via a public Wifi network. Between the two endpoints, a group of relay nodes route the network traffic. In most cases, there will be N relay nodes, rather than the single relay node illustrated in the below figure. Hidden Wifi hotspots are broadcast via individual nodes, along the Wifi relay, realized with ESP modules. These modules are implanted physically along the path that connects between the locations of the two endpoints of the relay. A tunnel is created to seamlessly forward all network traffic between the two endpoints. Each one of these modules will connect to the node of the module ahead of it along the chain of relay nodes, while accepting an incoming connection from the node of the previous module. ESP’s ability to function both as a Wifi client, and as an access point simultaneously marks the basic infrastructure of μProxy .

The protocol is setup to control a relay network which is comprised of an arbitrary number of Wifi devices, provide interfaces for external endpoints, support necessary cryptography and efficiently transmit data along the relay nodes. The protocol has to be executed within the restrictive embedded system environment of the ESP modules. Consequently, usage of runtime resources, as well as the size of the compiled computer code had to be minimized. The protocol is extremely light weighted; this is necessary so as not to monopolize the 80 MHz processor core of the ESP, which would prevent the Wifi router from functioning normally.

Long relay can be established inexpensively, given the low cost nature of ESP modules. A measured delay per relay node of around 20 ms is adequately low to promote practicality of usage of μProxy when geolocation anonymity is concerned.

The post μProxy – A Hardware Relay Solution for Protecting Geolocation Anonymity of Internet Users appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/20/%ce%bcproxy-hardware-relay-solution-protecting-geolocation-anonymity-internet-users/feed/ 1
DHS Says Darknet Criminals Are Switching From Bitcoin to Monero https://www.deepdotweb.com/2017/09/20/dhs-says-darknet-criminals-switching-bitcoin-monero/ https://www.deepdotweb.com/2017/09/20/dhs-says-darknet-criminals-switching-bitcoin-monero/#comments Wed, 20 Sep 2017 11:53:54 +0000 https://www.deepdotweb.com/?p=22649 The United States federal government continues to view the privacy-centric cryptocurrency Monero (XMR) as a potential tool for cybercriminals. An agent with the United States Department of Homeland Security (DHS) told CNBC recently that cybercriminals are “looking more closely at other currencies like Monero and Ethereum.” Earlier this year an FBI agent with the bureau’s ...

The post DHS Says Darknet Criminals Are Switching From Bitcoin to Monero appeared first on Deep Dot Web.

]]>
The United States federal government continues to view the privacy-centric cryptocurrency Monero (XMR) as a potential tool for cybercriminals. An agent with the United States Department of Homeland Security (DHS) told CNBC recently that cybercriminals are “looking more closely at other currencies like Monero and Ethereum.” Earlier this year an FBI agent with the bureau’s Cyber Division told reporters at a conference that the FBI fears criminals will begin to increasingly turn to cryptocurrencies that protect financial privacy, such as Monero. Since the introduction of the world’s first cryptocurrency in 2009 newer, more private cryptocurrencies have been developed. What is perhaps the most privacy-enhancing cryptocurrency currently is Monero. Other privacy-centric cryptocurrencies such as ZCash and DASH do not seem to provide as much privacy for every single transaction as Monero does.

When Bitcoin first debuted in 2009, many mistakenly believed that the first cryptocurrency was as private as cash. This misconception arose from a misunderstanding of the underlying technology, the blockchain, which publicly records the bitcoin addresses of the sender and receiver, as well as the amount and the date and time of transactions. The realization that Bitcoin was not nearly as anonymous as was popularly believed led to the creation of mixing services, also known as tumblers. These services help to anonymize a user’s bitcoins, but researchers have discovered ways which can make even mixing services incomplete solutions to make Bitcoin transactions private.

In 2011 the Silk Road launched, becoming the first darknet market to accept cryptocurrency, when it made Bitcoin the official currency of the marketplace. Since the death of Silk Road, newer darknet markets began to embrace Monero. Earlier this summer the darknet market Wall Street Market began accepting Monero deposits and allowing it to be used for purchasing products from vendors on the market. Last year, the now defunct darknet markets AlphaBay and Oasis Market both began to accept Monero. According to the criminal complaint filed in the United States District Court for the Eastern District of California, nearly 12,000 Monero coins were seized by law enforcement agencies from AlphaBay’s servers. Earlier this year the now defunct darknet market The Open Road also implemented Monero.

“What the criminals are starting to see, and some of the trends we’re picking up as well, is that bitcoin also works equally just as much against you as it does for you,” the Department of Homeland Security agent said to CNBC. While the agent suggested criminals were moving to Ethereum, that cryptocurrency has similar privacy issues as Bitcoin. While Ethereum may have privacy issues, that hasn’t slowed down cybercrime revenues in Ethereum, which have soared into the equivalent of hundreds of millions of US Dollars. One of Monero’s competitors which does aim to increase financial privacy is ZCash, however, most ZCash transactions are not in fact private transactions. Law enforcement seized nearly 3,700 ZCash coins from the late Alexandre Cazes, the alleged mastermind behind AlphaBay, according to the criminal complaint filed in US federal court. At the time AlphaBay went down, the marketplace was beginning to enable ZCash transactions.

While it is not possible to know the true number of cryptocurrency transactions being conducted by criminals, Blockchain Intelligence Group, a blockchain analysis company, claims that illicit Bitcoin transactions have decreased from half of all transactions to less than 20% of all transactions. The co-founder of Chainalysis, another blockchain analysis company, claims that law enforcement has diminished trust in darknet markets. Similar claims were made when the Silk Road was taken down by law enforcement, but in fact there was a boom in the number and usage of darknet markets after Silk Road was taken offline.

The DHS agent that spoke with CNBC also talked about the take down of the Bitcoin exchange BTC-e. In that case, the United States government is alleging that BTC-e was involved in laundering billions of US Dollars worth of cryptocurrencies. The DHS agent boasted about the improved efforts of law enforcement to track criminal transactions through the blockchain and hold exchanges accountable. The agent commented on the reputability of Bitcoin saying, “I think it’s a lot more legitimate than people give it credit for.”

The post DHS Says Darknet Criminals Are Switching From Bitcoin to Monero appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/20/dhs-says-darknet-criminals-switching-bitcoin-monero/feed/ 8
Cuba’s Digital Black Markets https://www.deepdotweb.com/2017/09/20/cubas-digital-black-markets/ https://www.deepdotweb.com/2017/09/20/cubas-digital-black-markets/#comments Wed, 20 Sep 2017 05:53:50 +0000 https://www.deepdotweb.com/?p=22648 Cuba is an island nation where less than 5% of the people living there have internet access. The country is one of the last Marxist-Leninist states in the world. The Cuban government does not allow complete unfettered access to the open internet, and like in many other countries around the world, such as China, many ...

The post Cuba’s Digital Black Markets appeared first on Deep Dot Web.

]]>
Cuba is an island nation where less than 5% of the people living there have internet access. The country is one of the last Marxist-Leninist states in the world. The Cuban government does not allow complete unfettered access to the open internet, and like in many other countries around the world, such as China, many sites are blocked or censored by the state. The Cuban government also criminalizes many economic activities, which forces many Cubans to turn to the black market to conduct business. In 2007, two expatriates from Cuba living in Spain helped start Cuba’s biggest digital black market, Revolico. Revolico translates to “disarray” or “a mess”. The two men who founded the site are Hiram Centelles Rodriguez and Carlos Javier Peña Diaz. While many products and services on Revolico aren’t legal, the sale of drugs is prohibited on the site.

Revolico was blocked just months after launching from US servers in 2007. Cubans have gotten around the state’s blocking of the site by using proxy servers, DNS tricks, and mirrors of the site. The site is also distributed in a unique offline manner, through the “El Paquete Semanal”, which translates to The Weekly Packet (or package). These paquetes are loaded onto USB sticks and external hard drives and spread throughout the country. The drives contain about a terabyte of data. The paquete contains files which are illegally brought to the country from the United States and contain classified advertisements, pirated Hollywood movies and TV shows, mobile phone apps, news sites, and the Spanish language version of Wikipedia. A new updated paquete is available every Tuesday. The paquete also contains the digital black markets Revolico and another known as “Popular”. Popular is similar to Revolico, except it allows users to place advertisements through SMS text messages.

Many Cuban shops sell the paquetes and even openly advertise them for sale. In the decade since it has launched, El Paquete Semanal has become a primary source of news and entertainment for millions of Cubans. The sneakernet distribution model of El Paquete Semanal has helped the majority of Cubans who lack regular internet access obtain data that the state prohibits. The Revolico market is similar to Craigslist and has been called the “eBay of Cuba”. The market lists hundreds of thousands of products and services. Users can purchase electronics, vehicles, food, jewelry, find housing, mechanics, and more. People interested in an advertisement are able to call or text the seller. It was only in 2013 that Cubans were able to begin selling automobiles without state permission, and now many cars and other vehicles are available on Revolico. The state first banned the sale of automobiles in 1959. Advertisements claiming to install internet service in people’s homes are also found on the market.

Etecsa, a state owned and operated telecommunications company, has set up over a hundred WiFi hotspots throughout Cuba, but many Cubans are still unable to access the internet. The cost of accessing WiFi is prohibitively expensive for most Cubans. Those Cubans who can connect to the internet usually have to rely on proxies or mirrors of Revolico to access the market. Last year Revolico was temporarily unlocked for people accessing the internet through Etecsa’s Nauta internet accounts at “browsing rooms” and WiFi hotspots in Cuba. The market’s website was also available at internet connections in many Cuban hotels. During this brief period, users connecting to the internet through Cuba’s Infomed institutions were still being blocked. Infomed is run by the state’s Ministry of Public Health.

Thanks to digital black markets like Revolico and Popular, the Cuban people are now able to exercise more economic freedom and gain greater access to modern technology and entertainment. Revolico co-founder Carlos Javier Peña Diaz told Motherboard that the state views the Revolico market as a threat, although the site’s owners do not intend for it to be seen that way. “We don’t have any political intentions and we don’t want to represent a danger for the government, but that’s how they see us,” Diaz said. “We don’t understand why Revolico is still blocked,” he added. “It’s my dream for it to just be available to the people. To just be on the internet.” However, the site is in fact a threat to the state’s stranglehold on Cuban economic activity. The Cuban government has launched their own classifieds website and newspaper, called Ofertas, which translates to Offers, however, the state’s classifieds site is much less popular than Revolico.

The post Cuba’s Digital Black Markets appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/20/cubas-digital-black-markets/feed/ 4
Installing VMware Player in Linux (Tutorial) https://www.deepdotweb.com/2017/09/19/installing-vmware-player-linux-tutorial/ https://www.deepdotweb.com/2017/09/19/installing-vmware-player-linux-tutorial/#comments Tue, 19 Sep 2017 23:46:10 +0000 https://www.deepdotweb.com/?p=22638 In this article, I will be showing you how to install the latest version of Vmware Player on a Linux Distro. For the tutorial I will be using Ubuntu, in particular Ubuntu Mate. I choose Vmware Player over Oracles Virtual Box, due to a number of reasons including simplicity and performance. Navigate to the official ...

The post Installing VMware Player in Linux (Tutorial) appeared first on Deep Dot Web.

]]>
In this article, I will be showing you how to install the latest version of Vmware Player on a Linux Distro. For the tutorial I will be using Ubuntu, in particular Ubuntu Mate. I choose Vmware Player over Oracles Virtual Box, due to a number of reasons including simplicity and performance.

Navigate to the official Vmware website which currently is here.

It should look like this:

From here, go to downloads and click “Workstation Player”. I have marked the option in red for demonstration in this article.

Once on the product download page, click “VMware Workstation 12.5.7 Player for Linux 64-bit.”.

12.5.7 is the current version at the time of this article and is the version that we will be installing.

After clicking download you should see a confirmation window that looks like this:

The file size should be 128 MB, and will present itself as a .bundle file.

When the download is complete, open up a terminal by pressing: Ctrl+Alt+T

Once the terminal is open, enter the following command to install the required build package and kernel headers:

sudo apt-get install build-essential linux-headers-$(uname -r)

It should be noted that you should do your research before installing anything via the command line.

To find out more about the command mentioned, check out the following forum posts.

Once the download is finished, it should appear in your Downloads folder, or whatever folder you have designated for Downloads.

We now need to make the Vmware file executable. Go to the Vmware file, right click it and select “Properties”.

Out of the 5 tabs, select “Permissions”, and check the box that says, “Allow executing file as program”.

Open up another terminal by pressing: Ctrl+Alt+T, and run the following command which will run the Vmware Player Install window:

gksudo bash ~/Downloads/VMware-Player-*.bundle

You should now see a screen like this:

Once you have accepted the license agreements, Vmware will begin to install. Once the installation is complete you will see a screen like this:

Vmware Player can be found under Application> System Tools>VMware Player in Ubuntu.

Conclusion:

Now that you have the latest version of Vmware installed, you can proceed to install your first Virtual Machine. While that is out of the scope of this article, it is pretty straight forward and there are plenty of tutorials on setting up Virtual Machines.

Virtual Machines act as Virtual Computers, and can provide a secure sandboxed environment to work in. Anything from the latest version of Windows to your favourite Linux Distro can be run using Vmware. When setup properly, a Virtual Machine can be a safer option when using TOR, instead of running TOR directly from your Desktop.

The post Installing VMware Player in Linux (Tutorial) appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/19/installing-vmware-player-linux-tutorial/feed/ 3