International Police Sting Operation Disrupts The Dark Web

A coalition of law enforcement agencies across the world announced the results of a coordinated operation known as DisrupTor which was a sting operation that targeted vendors and buyers of illicit goods on the Dark Web.
 
 The operation was the result of a collaborative effort between the law enforcement and judicial authorities of Austria, Cyprus, Germany, the Netherlands, Sweden, Australia, Canada, the United Kingdom and the United States and  some law enforcement officers are saying that the "golden age" of anonymous Internet crime is over.
 
A sting operation is a deceptive operation designed to catch a person committing a crime.  Sting operations are common in many countries, such as the United States, but they are not permitted in some countries. This operation follows the takedown in May of last year of Wall Street Market, the world’s then second largest illegal online market in the Dark Web. 
 
This was led by the German Federal Criminal Police with the support of the Dutch National Police Europol, Eurojust and various US government agencies and the arrests have provided investigators with quantitative data and materials to identify suspects behind Dark Web accounts used for illegal activity. “Law enforcement is most effective when working together, and today’s announcement sends a strong message to criminals selling or buying illicit goods on the dark web: the hidden internet is no longer hidden, and your anonymous activity is not anonymous....Law enforcement is committed to tracking down criminals, no matter where they operate, be it on the streets or behind a computer screen,” Europol said.
 
As a result, 179 vendors who engaged in tens of thousands of sales of illicit good were arrested across Europe and the United States.  Over $6.5 million were seized in both cash and virtual currencies, alongside some 500 kilograms of drugs, including fentanyl, oxycodone, hydrocodone, methamphetamine, heroin, cocaine, ecstasy, MDMA, and medicine containing addictive substances; and 64 firearms. The arrests were carried out in the United States (121), Germany (42), the Netherlands (8), United Kingdom (4), Austria (3), and Sweden (1). A number of investigations are still ongoing to identify the individuals behind Dark Web accounts. 
 
Operation DisrupTor was composed of a series of separate but complementary joint operations coordinated by Europol and Eurojust, aimed at making a global impact on the sale of illicit goods on the dark web.
 
Operations such as these highlight the capability of law enforcement to counter encryption and anonymity of Dark Web market places. Police no longer only takes down such illegal marketplaces, they also chase down the criminals buying and selling illegal goods through such sites. 
 
If your were thinking of buying illegal goods anonymously on the Dark Web you should consider the dangers you are exposed to: 
  • Putting your life in danger: dangerous illegal drugs such as fentanyl or counterfeit substances could kill you. 
  • Becoming a victim of cyber scammers who are only after your money.
  • Exposing your device to damaging malware.
Law enforcement can also trace back illicit transactions to both the buyer and seller. An individual who purchased illicit goods from hidden sites is at risk of prosecution in a number of countries.  
 
US Drug Enforcement Administration (USDEA) Acting Administrator Timothy Shea said, "Operation DisrupTor demonstrates the ability of DEA and our partners to outpace these digital criminals in this ever-changing domain, by implementing innovative ways to identify traffickers attempting to operate anonymously and disrupt these criminal enterprises." 
 
Europol:      Security Magazine:        CISO Magazine:        Deutsche Welle:   
 
You Might Also Read: 
 
Europol Warning: 15 Ways To Become A Cybercrime Victim:
 
« British Spies Find Big Software Problems With Huawei
Sentiment About Cyber Security Professionals Improves »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

ResponSight

ResponSight

ResponSight is a data science company focusing specifically on the challenge of measuring risk and identifying changes in enterprise/corporate networks using behavioural analytics.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Findcourses.co.uk

Findcourses.co.uk

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.