What Is Selling On the Dark Net?

Spying on the digital underground requires discrete and technically capable police and Germany's Federal Criminal Police Office (BKA) has presented a new study on cybercrime, although they do not intend to shut the darknet down.

Coming as it did after the announcement that a teenager who killed 9 people in July before turning his gun on himself had purchased the weapon on the darknet, media interest was huge when the German Federal Police Office (BKA) presented its 2015 cybercrime report recently.

The illegal trading platform is a semi hidden part of the Internet where those in the known can use special search engines to move in total anonymity - well, almost total.

"The Internet is not a space that is beyond criminal prosecution," BKA boss Holger Munch said several times on Wednesday 13th Sept. in a briefing about the report's findings. It was in part a hopeful invocation.

About 140 BKA investigators are currently tasked with tracking cybercrime, and Münch told DW that the darknet was their main focus. At the moment, the BKA is conducting 85 criminal investigations into the sale of arms and explosives on the darknet, Münch said.

He estimated that the number of weapons sold on the darknet still pales in comparison with commerce on the analog black market, but perhaps not for long. "Very dangerous weapons are being sold there," Münch said, adding that cybercrime is "still a growing phenomenon."

"Here and there it has even become an industry," Münch said.

'A growing phenomenon'

Though impressive, the BKA's statistics do not reflect the complexity of cybercrime. For 2015, the agency documented 45,000 cases of cybercrime that can be directly linked to Germany, for a total value of 40 million euros. Global cybercrime stastics are much higher. And then there are the victims who don't report offenses - and those who do not know that a cybercrime has occurred.

Münch cited a 2015 study by the German Institute for Economic Research (DIW). Using to a broad-based survey, DIW experts estimated that the financial damage from the four largest areas of internet crime - phishing, identity theft, fraudulent goods and services, and malware - totaled 3.4 billion euros.

The BKA boss said detectives were confronting the threat with a "combination of investigative approaches from the analog and digital worlds," with information technology experts and police detectives working side-by-side at the BKA. Undercover investigators are operating in the virtual world, and in the real world they are attempting to coerce people active in the scene to work as informants.

Münch said the BKA had had a number of investigative successes, including closing down five illegal darknet trading platforms in Germany last year. Internationally, Münch said, the BKA was involved in closing down 30 further darknet marketplaces and had gathered evidence for cases against their operators, dealers and customers.

According to The Economist, the darknet's vendors overwhelmingly deal in drugs, which are generally sold at much higher prices than on the street, although they are also of higher quality. Goods are paid for anonymously using the cryptocurrency bitcoin and are then shipped to purchasers - sometimes even via regular post.

Also traded are counterfeit money, credit card data, knockoff branded goods and, as the attack in Munich made clear, weapons.

Other Cybercrimes

The BKA report detailed a growing number of cases of blackmail using special malware known as ransomware. Such software can be purchased by criminals, even those who have few technical skills, on forums in the digital underground. Once installed on unwitting users' computers, commonly via infected files, ransomware automatically encrypts all of the data on the device, forcing victims to pay bitcoin ransoms to restore access to their information.

As the digital world slowly becomes a center of commerce through Industry 4.0, the Internet of Things, criminals are increasingly finding new opportunities for digital attacks. Münch said gaming consoles and even refrigerators had been targeted by denial-of-service attacks, which can make devices unusable until, once again, a digital ransom is paid.

Despite the potential for abuses, the darknet fulfills an important function for people who live under oppressive regimes: It enables the exchange of information and freedom of expression. In those places, law enforcement polices ideas in the way that the German authorities chase cybercriminals.

"We have to be flexible and react as quickly as the perpetrators," Holger Münch said. "We have to work together nationally and internationally. And we have to be on top of our game technically and tactically."

Deutsche Welle

You Might Also Read: 

German Police Catch Suspect in Global Cyber Crime Operation:

International Police Start Crackdown On The Darknet:

Interpol is Training Police to Fight DarkNet Crime:

 

« A Global Issue: Cybercrime In Singapore
Banks Join Forces to Fight CyberCrime »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Opus

Opus

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.

Center for Information Security Awareness (CFISA)

Center for Information Security Awareness (CFISA)

CFISA was formed by a group of academics, security and fraud experts to explore ways to increase security awareness among audiences, including consumers, employees, businesses and law enforcement.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.

Koop

Koop

Koop’s trust management platform helps navigate the complexities of regulatory compliance, security reviews, and liability insurance in a single place.