Deep Dot Web https://www.deepdotweb.com Surfacing The News From The DeepWeb Tue, 19 Sep 2017 23:46:10 -0300 en-US hourly 1 https://wordpress.org/?v=4.8.2 Installing VMware Player in Linux (Tutorial) https://www.deepdotweb.com/2017/09/19/installing-vmware-player-linux-tutorial/ https://www.deepdotweb.com/2017/09/19/installing-vmware-player-linux-tutorial/#respond Tue, 19 Sep 2017 23:46:10 +0000 https://www.deepdotweb.com/?p=22638 In this article, I will be showing you how to install the latest version of Vmware Player on a Linux Distro. For the tutorial I will be using Ubuntu, in particular Ubuntu Mate. I choose Vmware Player over Oracles Virtual Box, due to a number of reasons including simplicity and performance. Navigate to the official ...

The post Installing VMware Player in Linux (Tutorial) appeared first on Deep Dot Web.

]]>
In this article, I will be showing you how to install the latest version of Vmware Player on a Linux Distro. For the tutorial I will be using Ubuntu, in particular Ubuntu Mate. I choose Vmware Player over Oracles Virtual Box, due to a number of reasons including simplicity and performance.

Navigate to the official Vmware website which currently is here.

It should look like this:

From here, go to downloads and click “Workstation Player”. I have marked the option in red for demonstration in this article.

Once on the product download page, click “VMware Workstation 12.5.7 Player for Linux 64-bit.”.

12.5.7 is the current version at the time of this article and is the version that we will be installing.

After clicking download you should see a confirmation window that looks like this:

The file size should be 128 MB, and will present itself as a .bundle file.

When the download is complete, open up a terminal by pressing: Ctrl+Alt+T

Once the terminal is open, enter the following command to install the required build package and kernel headers:

sudo apt-get install build-essential linux-headers-$(uname -r)

It should be noted that you should do your research before installing anything via the command line.

To find out more about the command mentioned, check out the following forum posts.

Once the download is finished, it should appear in your Downloads folder, or whatever folder you have designated for Downloads.

We now need to make the Vmware file executable. Go to the Vmware file, right click it and select “Properties”.

Out of the 5 tabs, select “Permissions”, and check the box that says, “Allow executing file as program”.

Open up another terminal by pressing: Ctrl+Alt+T, and run the following command which will run the Vmware Player Install window:

gksudo bash ~/Downloads/VMware-Player-*.bundle

You should now see a screen like this:

Once you have accepted the license agreements, Vmware will begin to install. Once the installation is complete you will see a screen like this:

Vmware Player can be found under Application> System Tools>VMware Player in Ubuntu.

Conclusion:

Now that you have the latest version of Vmware installed, you can proceed to install your first Virtual Machine. While that is out of the scope of this article, it is pretty straight forward and there are plenty of tutorials on setting up Virtual Machines.

Virtual Machines act as Virtual Computers, and can provide a secure sandboxed environment to work in. Anything from the latest version of Windows to your favourite Linux Distro can be run using Vmware. When setup properly, a Virtual Machine can be a safer option when using TOR, instead of running TOR directly from your Desktop.

The post Installing VMware Player in Linux (Tutorial) appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/19/installing-vmware-player-linux-tutorial/feed/ 0
Man sentenced over 300 years for Darkweb child porn case https://www.deepdotweb.com/2017/09/19/man-sentenced-over-300-years-for-darkweb/ https://www.deepdotweb.com/2017/09/19/man-sentenced-over-300-years-for-darkweb/#respond Tue, 19 Sep 2017 17:38:28 +0000 https://www.deepdotweb.com/?p=22629 A resident of Virginia has been sentenced to 300 years in prison for engaging in child pornographic acts. Before his arrest, he had been finding victims for his pornographic acts from the darknet under the screen name, Va Dad4yung. Henrick Styles pleaded guilty to 37 charges but could be in jail for 25 years after ...

The post Man sentenced over 300 years for Darkweb child porn case appeared first on Deep Dot Web.

]]>
A resident of Virginia has been sentenced to 300 years in prison for engaging in child pornographic acts. Before his arrest, he had been finding victims for his pornographic acts from the darknet under the screen name, Va Dad4yung.

Henrick Styles pleaded guilty to 37 charges but could be in jail for 25 years after forcing a plea deal. This will only be activated if he shows good behavior during his prison sentence.

The internet crime against children Taskforce led to his arrest in 2015. The agency is a national network of 61 coordinated Taskforces which represent over 4,500 federal, state, and local law enforcement and prosecutorial agencies. Their proactive and reactive measures against persons who make use of the internet to be involved in child abuse have led to the arrest of thousands of people.

In 2015 when Style was discovered by the Taskforce, 1,140 child predators from 41 states were arrested in a two-month nationwide raid.

Henrick Style was a child predator who took his operation to a different level on the Darknet. However, his employment status and criminal record portrayed him as a clean citizen.

“This is a man who has never been in trouble whatsoever, had a strong employment history and been off everyone’s radar and from what appears would be an outstanding citizen and then he comes in with 37 charges for possession of child pornography,” according to the deputy Commonwealth attorney, Morgan Campbell. Henrick Style is from Denmark but resided in a Dinwiddie County home. The prosecutor said a search was conducted on his various devices, and suspicious downloads were retrieved from them. Most of the retrieved downloads were about boys who stay overseas. He was a member of a chat room called Gaydads4son where the conversation with underage boys was hatched.

The evidence used against him shows that he was being investigated even before his arrest. If not, then investigators displayed a great sense of efficiency to gather all evidence against him within the limited time frame. During his hearing in court, a transcript was used along with visual evidence of pictures and videos.

“I argued to Judge Martin to look at the pictures and faces of the young boys. This is not a victimless crime. It’s huge and I think it sends such a powerful message that it’s not going be tolerated,” added Campbell.

The FBI recently conducted an investigation into the darknet child porn which led to the arrest of one. This gave the investigators an idea to take on the child predators on the Darknet.

CHILD ABUSE CRIMES ON THE RISE IN US, PARTLY BLAMED ON DARKNET

The Darknet has a strong anonymity for its users, and a lot of dangerous goods and services are traded there under its refuge. Child abuse crime has been arguably the hottest crime committed on the Darknet, which also tends to generate traffic to most of the websites.

According to a study conducted by the University of Portsmouth in 2014, 80% of darknet traffic was generated by a visit to websites that offer child abuse materials.

The researcher, Dr. Gareth Owen described the Darknet as a place used by pedophiles to abuse the right of children.

“Before we did this study, it was certainly my view that the darknet is a good thing, but it’s hampering the rights of children and creating a place where pedophiles can act with impunity,” said Dr. Owen.

According to the National Statistics on Child Abuse, nearly 700 children are being abused annually. In 2015, about 683,000 children were victims of abuse.

Majority of these abuses start from the Darknet, as the study outcome of Dr. Owen confirmed.

The Taskforce and all stakeholders have firmly said that they will arrest and prosecute all child predators across the country irrespective of where they start their dealings. The arrested suspects are meant to send a signal that the Taskforce is working.
“By arresting and prosecuting child predators across the country, our Taskforces are sending a clear message that we are working together better than ever before to bring these perpetrators to justice. The ICAC TaskForce dedicated efforts and professionalism to help fulfill the ultimate goal of keeping children safe,” said Lt. Andrea Grossman of the Los Angeles Police Department. He is also the Commander of the Los Angeles Regional ICAC TaskForce and chair of the ICAC Public Awareness and Outreach Committee.

A father and son were recently arrested for uploading a child abuse video on the Darknet. This obviously reveals the burning desire of the agencies to prosecute Darknet child abusers.

The post Man sentenced over 300 years for Darkweb child porn case appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/19/man-sentenced-over-300-years-for-darkweb/feed/ 0
The Art Of Google Hacking https://www.deepdotweb.com/2017/09/19/art-google-hacking/ https://www.deepdotweb.com/2017/09/19/art-google-hacking/#respond Tue, 19 Sep 2017 11:38:21 +0000 https://www.deepdotweb.com/?p=22628 When it comes to Google, everyone feels confident in knowing what we’re talking about. Google is that nice site that allows us to search whatever we want on the web. More technically, it’s a search engine, something that knows our preferences, our tastes and even (sometimes) our secrets. Google is easy, isn’t it? It appears ...

The post The Art Of Google Hacking appeared first on Deep Dot Web.

]]>
When it comes to Google, everyone feels confident in knowing what we’re talking about. Google is that nice site that allows us to search whatever we want on the web. More technically, it’s a search engine, something that knows our preferences, our tastes and even (sometimes) our secrets. Google is easy, isn’t it? It appears as a blank page with the search bar and the famous logo,

and everything it can do for us is searching for our favourite films in streaming and so on.

This is just the tip of the iceberg.

Many of you maybe ignore that Google is more powerful than this. In the same way a computer will do what you want when you know the right commands and a server will respond in a friendly manner when you know how to talk to it, Google will offer to you its immense capabilities if you only know what’s the language it speaks. In this article I will briefly explain the basics of this art called Google Hacking, but you should know that the Google Hacking guru Johnny Long wrote a revolutionary book of more than 500 pages. If you’re curious, you can find the download link here.

Basic Rules of Google Searching

Before starting with the powerful advanced operators, let’s take a look to some basic rules that will save your time.

  • Google is not case sensitive. When you search for streaming, Streaming or STREAMING, the result will be the same. This is not valid in the case of the OR boolean operator. If you want to use “or”, google will count it as a simple word, if you want to use the boolean operator, you’ll have to use “OR”.
  • Google’s * is not a wildcard. Especially for the Unix users, asterisk usually represents a wildcard used to represent a set of all the names of a same type (all the names that start with “a”, all the name that finish with “th” and so on). For Google, * represents nothing more than a single word in a query.
  • Google ignores common words. When you submit a query, Google ignores the most common words like “where” and “how”, so a search for “where 1=1” will return the same result of “1=1”. If you want to force Google to consider common words you have to submit them in quotes, so that Google will search the entire string in the quotes. Another way to force Google to consider the common word, is to put a + sign immediately before that word (without spaces).
  • 32 words limit. You can only submit a maximum of 32 words in a query but you can extend your query using the asterisk. When you search for “the cat is on the table”, Google counts six words, but if you search “the * is on * table”, Google will only count four words.

Boolean Operators

Before starting with advanced operators, you should really take some time to understand boolean operators. The boolean operators help you refining your query. AND, OR and NOT are boolean operators. AND is redundant for google. Searching “food for cats” and “food AND for AND cats”, is the same for Google. The NOT operator is used to exclude undesired results from your query. Using NOT is equivalent to using the minus sign preceding the word you want to exclude. Let’s say you’re searching for a new guitar to buy, but you hate Fender. If you search for “guitars”, Google will return Gibson, Fender, B.C. Rich, Martin guitars and so on. But if you search for “guitars -fender” Google will only return the results you’re interested in. Finally, the OR operator helps you to submit a more precise query. If you want to search for HTML pages with the words Gibson or Fender inside, you will submit a query like the following:

intext:gibson | fender

and the result will be the desired one.

Advanced Operators

The advanced operator gives to you real power over your search. Advanced operators can be used together in combination to make your search more versatile, but there are operators that don’t fit well with others. The list of advanced operators is very long:

For brevity, we will cover only the most used.

  • Intitle. The title of a web page is technically the title specified in the html tag called “title”. You can also consider the title of the page, the words represented at the top of your browser when you visit a certain page. To search for all the pages with a certain word in their title, just search.

intitle:hacker

  • Allintitle. If you search for intitle:hacker exploits, Google will search all the pages that have hacker in their title, plus a simple query for all the pages that have something dealing with exploits. If you want to include the word exploits in the intitle query, you must use Allintitle. Allintitle, tells Google that all the words that follow the operator are to be searched in the title of the web page.

allintitle:hackers exploits.

  • Allintext. As the name itself says, this operator tells Google to only search the desired term in the text of a web page and not in its title or its URL.
  • Allinurl. You could be tempted to think that allinurl is the same for the URL as the allintitle for the title but there are few important differences. An URL is made of a protocol, a domain name, a directory path and (sometimes) a file with its extension. You must keep in mind that:

– Google can not search the protocol (like http).

– Google will have problems to search special characters often present in an URL

– To search for parts of the URL, more specific operators like filetype and site are preferable.

As you could see from the list above, there are a lot of operators and every of them has its characteristics. Take your time to analyze all the aspects of every operator and try to perform different searches to grow in your Google’s comprehension. There’s a reason why the title says “Google Hacking”. In the hacking phase of information gathering, only using Google with this kind of refined search, can really bring to you tons of juicy results. So maybe it is the case to start right now to improve your Google skills !

The post The Art Of Google Hacking appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/19/art-google-hacking/feed/ 0
19.9.17 Dark Web and Cybercrime Roundup https://www.deepdotweb.com/2017/09/19/19-9-17-dark-web-cybercrime-roundup/ https://www.deepdotweb.com/2017/09/19/19-9-17-dark-web-cybercrime-roundup/#comments Tue, 19 Sep 2017 05:21:14 +0000 https://www.deepdotweb.com/?p=22621 Bitcoin Vanished During Dream Marketplace Crash According to an announcement on the darknet market’s forums and the Dream subreddit, one of the market’s hard drives crashed, corrupting a Bitcoin wallet file. The corrupted hard drive and wallet.dat impacted not only Dream’s online/offline status, but also user Bitcoin wallets and transaction history. At some point during ...

The post 19.9.17 Dark Web and Cybercrime Roundup appeared first on Deep Dot Web.

]]>
Bitcoin Vanished During Dream Marketplace Crash

According to an announcement on the darknet market’s forums and the Dream subreddit, one of the market’s hard drives crashed, corrupting a Bitcoin wallet file. The corrupted hard drive and wallet.dat impacted not only Dream’s online/offline status, but also user Bitcoin wallets and transaction history. At some point during the ordeal, Dream staff posted an “under maintenance” page and then resurrected the market shortly afterwards.

The announcement posted by Dream marketplace administration:

Hi all, there is a corrupted wallet file which we have not yet been able to recover.
Part of the users wont be able to access their funds until the wallet is recovered. Not all users are affected. The backup solution has been improved for the case of future file corruptions .
Escrow orders are completed normally. We apologize for the problem this caused.”

When users logged in—both vendors and buyers alike—some were met with an allegedly normal balance and transaction history. Some reported having zero funds in their Dream wallet. Some users logged in to their accounts and saw negative balances connected to escrow purchases. Problematically, the transaction history reflected nothing of the sort. Vendors lost Bitcoin as well. And given the status and reputation of some vendors, their claims carried more weight than unknown buyers.

The Dream staff, however, did not remain silent or duck into the shadows. One moderator responded to comments on Reddit. And Reddit was filled with users complaining about missing Bitcoin. Oddly enough, some users reportedly logged into Dream and noticed that their account balance was higher than before the disruption. “[I] Finally logged back in after the recent “uncertainty” to find 8.222 bitcoins in my wallet,” one user wrote. “I previously had a very small amount before the downtime.” However, the user was unable to spend or withdraw any Bitcoin.

China Instates ID Requirement for Internet Comments Following VPN Ban

In a move not entirely surprising to supporters of China’s internet governance, the Cyberspace Administration of China introduced new internet identity regulations. The rules, coming in the form of an amendment to current internet censorship and data retention laws, requires identity verifications from anyone leaving a comment on the internet.

As of October 1, internet users in China will not be allowed to post or comment anything that contrasts the “principles of the constitution of China.” In general, comments in opposition of the Chinese government’s decisions and stances are not permitted. This includes comments about China’s freedoms—or lack thereof. It additionally prohibits hate speech fixed through internet comments. DeepDotWeb

Sweden May Introduce VPN Surveillance and More Data Retention Requirements

China may not be alone in new forms of internet censorship and surveillance. The Swedish government, according to the Swedish internet service provider Bahnhof, apparently looked into the prospect of VPN surveillance. The interest appears to be ongoing. Furthermore, the Swedish government will seemingly be introducing more invasive data retention laws for internet service providers.

In Sweden, ISPs are legally required to store subscriber metadata for six months. Under the new data retention laws—if the proposals see the light of day—the six month stretch will be bumped up to a ten month period of storing subscriber information. “According to unofficial estimates, a normal operator will need to store 300 Terabytes more data than they do today,” a post on the ISP’s site outlined. “Sweden now acts as China when the state requires the network to be tailor-made for monitoring, instead of the internet functioning as well as possible,” Jon Karlung the Bahnhof CEO added. DeepDotWeb

JPMorgan CEO Called Bitcoin “Fraud” and John McAfee Challenged His Claim

“It’s just not a real thing, eventually it will be closed,” Jamie Dimon said at a conference in September 12. “I’m not saying ‘go short bitcoin and sell $100,000 of bitcoin before it goes down,” he added. “This is not advice of what to do. My daughter bought bitcoin, it went up and now she thinks she’s a genius.” The CEO said that he would undoubtedly fire a JPMorgan trader who traded Bitcoin. He explained why: “It’s against our rules and they are stupid.”

John McAfee made his stance clear on the future of Bitcoin earthier this year. He boldly responded to a tweet that asked if he thought one Bitcoin could be worth $500,000 within three years. His answer was effectively a stout yes, only in the form of an headline-making bet.

In response to the JPMorgan CEO claim that had caused unrest by itself, McAfee explained that Bitcoin was “certainly not a fraud.” McAfee’s MGT Capital Investments made a made expansion into Bitcoin mining in May 2017. “You called bitcoin a fraud,” McAfee told CNBC in reference to Dimon. “I’m a bitcoin miner. We create bitcoins. It costs over $1,000 per coin to create a bitcoin. What does it cost to create a U.S. dollar? Which one is the fraud? Because it costs whatever the paper costs, but it costs me and other miners over $1,000 per coin. It’s called proof of work.” CNBC, Twitter

Macedonian Citizen Admits Ownership of Carding Marketplace “Codeshop”

According to court documents, 30-year-old Djevair Ametovski operated a carding and fraud market called “Codeshop” between 2011 and 2014. In 2014, Slovenian law enforcement captured a fraudster with inside information on the owner of Codeshop. And he came to an agreement with the authorities wherein he identified the Codeshop owner in return for a likely shortened sentence. Codeshop had become the center of a Secret Service investigation for the sheer quantity of stolen cards sold through the site.

Towards the end of 2014, after the informant provided compelling evidence, Slovenian law enforcement picked up Ametovski. He was extradited to the US on access device fraud and aggravated identity theft charges. And the 30-year-old finally received a courtroom appearance; he pleaded guilty to both access device fraud and aggravated identity theft in connection with the sale of 1.3 million credit card numbers. DeepDotWeb

The post 19.9.17 Dark Web and Cybercrime Roundup appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/19/19-9-17-dark-web-cybercrime-roundup/feed/ 2
Man Charged for Ordering Cocaine and Speed in 2015 https://www.deepdotweb.com/2017/09/18/man-charged-for-ordering-cocaine-and-speed-in-2015/ https://www.deepdotweb.com/2017/09/18/man-charged-for-ordering-cocaine-and-speed-in-2015/#respond Mon, 18 Sep 2017 23:26:08 +0000 https://www.deepdotweb.com/?p=22604 On Wednesday, the District Court of Hannover reported a set of charges in a case against an alleged drug dealer from Hannover. According to the court, the accused 29-year-old “drug dealer” had ordered cocaine and amphetamine from a darknet marketplace. In total, the alleged dealer had ordered more than three and a half kilograms of ...

The post Man Charged for Ordering Cocaine and Speed in 2015 appeared first on Deep Dot Web.

]]>
On Wednesday, the District Court of Hannover reported a set of charges in a case against an alleged drug dealer from Hannover. According to the court, the accused 29-year-old “drug dealer” had ordered cocaine and amphetamine from a darknet marketplace. In total, the alleged dealer had ordered more than three and a half kilograms of the substances.

He paid a total of 6,000 euros for the drugs. In the words of one local reporter, [6,000] is not a particularly exciting sum when it comes to drugs.” The reporter’s following statement dropped a hint or two regarding the frequency of darknet drug cases in the capital city of Lower Saxony. The reporter explained that the exciting part of the case was not the small quantity of euros associated with the case or even the 3.5 kilograms of drugs; instead, it was “how the alleged drug trader had paid for the goods – namely with Bitcoins.”

145153.jpg

Hannover, however, is not new to Bitcoin. Nor is the city unaware of the darknet. Most recently, perhaps, was a story that made mainstream media: a father and son with orange Donald Trump ecstasy pills. Their car had Austrian tags, but German police stopped them as they travelled from the Netherlands to Hannover. While they clearly lived outside of Hannover, there was no failure to mention Hannover by the media. (And how those pills were connected to stories about the darknet was somewhat misleading by a reporter). The pills only “came from” the darknet because a darknet vendor sells them.

The Landeskriminalamt (State Criminal Police Office, LKA) in Hannover made their knowledge of the darknet clear during 2016. Germany had a significant problem controlling counterfeit euros. Hannover was particularly overwhelmed; according to Nevin Ayyildiz, a spokesperson for the LKA, counterfeit 20-notes and 50-notes made up more than 60 percent of Hannover’s cash flow. These counterfeits, almost exclusively, were attributed to the Napoli Group who had branched out through sales on darknet marketplaces.

Bitcoin is one of the least striking elements of a darknet market bust. At least in some parts of the world. The 29-year-old from Hannover is facing charges for unusually outdated crimes, however. According to the prosecutor, the alleged drug dealer had ordered speed and cocaine (and other “synthetics”) in 2015. He only recently heard the charges in court.

Furthermore, while law enforcement may have intercepted a package of cocaine and/or speed, they only “suspected” that he had wanted to distribute the drugs. The quantity of the drugs he had ordered—3.5 kilograms combined—likely pushed him over the distribution limit. His hearing has been scheduled for September 13.

The post Man Charged for Ordering Cocaine and Speed in 2015 appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/18/man-charged-for-ordering-cocaine-and-speed-in-2015/feed/ 0
Newport Man Admits Selling Adulterated Fentanyl on the Darknet https://www.deepdotweb.com/2017/09/18/newport-man-admits-selling-adulterated-fentanyl-darknet/ https://www.deepdotweb.com/2017/09/18/newport-man-admits-selling-adulterated-fentanyl-darknet/#comments Mon, 18 Sep 2017 17:26:05 +0000 https://www.deepdotweb.com/?p=22603 On August 29, a 25-year-old Newport man pleaded guilty to the distribution of fentanyl and two related charges. Kyle Enos, the now-guilty defendant, appeared in Cardiff Crown Court to enter his guilty plea in a case the National Crime Agency considered much bigger than Enos himself. The case, according to the NCA, has an “international ...

The post Newport Man Admits Selling Adulterated Fentanyl on the Darknet appeared first on Deep Dot Web.

]]>
On August 29, a 25-year-old Newport man pleaded guilty to the distribution of fentanyl and two related charges. Kyle Enos, the now-guilty defendant, appeared in Cardiff Crown Court to enter his guilty plea in a case the National Crime Agency considered much bigger than Enos himself. The case, according to the NCA, has an “international aspect.”

During Enos’s Cardiff Crown Court appearance, the NCA explained that the 25-year-old suspect had used multiple “identities” to buy “significant amounts of fentanyl.” In May, Gwent police arrested the man for distribution of Class A drugs, some of which the NCA believed had contributed to a spike in the overdose rate in the region. One month before his arrest, police in Leeds arrested three men in association with fentanyl and carfentanil distribution. They were charged with conspiracy to supply class A drugs.

Ian Cruxton, deputy director of the NCA, said that “the threat of synthetic opioids is not new. However, since December 2016, we have seen a number of drug-related deaths linked to fentanyl and carfentanil.” He added, “the NCA has been working with partners, both in the UK and overseas, to take action against those drug dealers who are playing Russian roulette with the lives of their customers by mixing synthetic opioids with heroin and other class A drugs.”

bpanews_65b24181-ac3b-4f06-b15c-efb50db16efb_1

And the NCA accused Enos of being one of “one of those drug dealers.” He admitted that he had ordered, routinely, fentanyl from the darknet. He said that it came from a supplier in China. According to Prosecutor Susan Ferrier, “[fentanyl] is not a widely known drug of class A. It is significantly more potent than heroin. “It was being dealt over the dark web both in the UK and overseas – he was shipping it in.” And to the scale of the investigation: “Every police force in the country is in involved in this inquiry.”

A spokeswoman for the NCA told Cardiff Crown Court that Enos had used anonymous internet identities to buy and sell the drug. During the search of his home in May, police found “items consistent with the preparation and packaging of drugs.” She added that several packages contained “a white powder” that they believed was fentanyl. During the police interrogation, Enos told officers that he purchased fentanyl from China and mixed it with an adulterant. He then listed the drug on darknet markets and shipped it to customers across the world.

Screenshot from 2017-09-04 10-00-25.png

As of the court date appearance on August 29, the NCA and partner police forces had identified 92 customers in the United Kingdom and 76 customers located internationally. These police forces are investigating fentanyl-connected overdoses in an attempt to connect Enos to any deaths.

Judge Jeremy Jenkins asked the NCA spokeswoman if, within a few weeks, Enos would be facing more charges due to overdoses. She responded, “I cannot say. We need to assess whether this indictment is sufficient.” As late as December last year, the fentanyl overdoses in the UK reached warning levels. Her statement reflected this. Ferrier added, “It is known that a number of deaths have been reported linked to the use of fentanyl, so this is not something that the prosecution could turn around within a number of weeks.”

Enos will stay in police custody until his December 18 hearing.

The post Newport Man Admits Selling Adulterated Fentanyl on the Darknet appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/18/newport-man-admits-selling-adulterated-fentanyl-darknet/feed/ 2
Online Vendors Responsible for “Much” of Sweden’s Fake ID Fraud https://www.deepdotweb.com/2017/09/18/online-vendors-responsible-much-swedens-fake-id-fraud/ https://www.deepdotweb.com/2017/09/18/online-vendors-responsible-much-swedens-fake-id-fraud/#respond Mon, 18 Sep 2017 11:26:03 +0000 https://www.deepdotweb.com/?p=22602 The Swedish government has planned measures to end the influx of fake IDs circulating the country. According to the police, this fake identity industry “can finance terror as well as other criminal activities.” One of the reasons Fake IDs are so easy to create is that there are too many forms of identification and too ...

The post Online Vendors Responsible for “Much” of Sweden’s Fake ID Fraud appeared first on Deep Dot Web.

]]>
The Swedish government has planned measures to end the influx of fake IDs circulating the country. According to the police, this fake identity industry “can finance terror as well as other criminal activities.” One of the reasons Fake IDs are so easy to create is that there are too many forms of identification and too many institutions capable of issuing the IDs. Fake IDs are hardly recognizable, even by experts. And because of this, a government official explained, fake ID creators find the Swedish ID market to be a lucrative industry and have little difficulty flooding the market with fake IDs.

Jan Olsson of the National Fraud Center explained that one “can buy fake ID cards for the amount of 2,000, and up to 5,000 Swedish kronor.” Just recently, she wrote, the Swedish police, while investigating illegal weapons, discovered a counterfeit passport workshop. She added, though, that “much” of the counterfeit ID distribution occurs on the internet. In an example given by a Swedish publication, a journalist outlined the simplicity of the process in which one can obtain a fake identity. Similar to the recent investigation by the Guardian journalist, Paul Farrell, who demonstrated that the Australian government had a serious issue with the Medicare system by buying his own Medicare number from a darknet vendor.

mini-pass.jpg

The journalist in Sweden reported that once on the darknet, it only took him a single hour to find a vendor of a fake ID. (I attempted to find the report online to understand why finding a vendor took an hour but the report was prepared for television.) Reportedly, the vendor sold drugs, weapons, “and even murders.” The publication explained that through this “multitude of sites that guarantee the anonymity of both the seller and the buyer,” people “suspected” that the Paris attackers armed themselves.

According to the reporter, the “anonymous seller” on the darknet pitched him an idea. The vendor offered to sell the reporter a Swedish passport and license for 770 dollars. The reporter only needed to provide the vendor with the money, his information, and a photograph. For an additional 100 dollars, the vendor offered to fraudulently stamp the passport. And one-week shipping times were included in the original price.

According to the report:

It is not known how often Swedish passports are bought by Darknet. Both merchants and sellers of counterfeit documents use bitcoin and email-encoded transactions, which makes capturing such cases extremely difficult. Even if the police wanted to [shut down] the Darknet or find out where the money from the transaction is, can not. Sites are hosted on servers in countries with which Sweden does not cooperate in this area.”

Upcoming laws to change the way official identification documents are racing the increasing levels of fraud and identity theft. The first changes, increased regulations, will not be in place until 2019.

The post Online Vendors Responsible for “Much” of Sweden’s Fake ID Fraud appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/18/online-vendors-responsible-much-swedens-fake-id-fraud/feed/ 0
Vendors in Germany Dealt with Carfentanil and a Biological Weapon https://www.deepdotweb.com/2017/09/18/vendors-germany-dealt-carfentanil-biological-weapon/ https://www.deepdotweb.com/2017/09/18/vendors-germany-dealt-carfentanil-biological-weapon/#respond Mon, 18 Sep 2017 05:26:00 +0000 https://www.deepdotweb.com/?p=22601 At an unspecified date in “mid 2017,” the Federal Criminal Police Office (BKA) identified a so-called “group of darknet dealers” and needed the assistance of a special unit of the Köln (Cologne) public prosecutor’s office. They called upon the Central Contact Point for Cybercrime in North Rhine-Westphalia (ZAC NRW). The suspected darknet dealers gave investigators ...

The post Vendors in Germany Dealt with Carfentanil and a Biological Weapon appeared first on Deep Dot Web.

]]>
At an unspecified date in “mid 2017,” the Federal Criminal Police Office (BKA) identified a so-called “group of darknet dealers” and needed the assistance of a special unit of the Köln (Cologne) public prosecutor’s office. They called upon the Central Contact Point for Cybercrime in North Rhine-Westphalia (ZAC NRW). The suspected darknet dealers gave investigators a case with what law enforcement believed to be an increased risk. The vendors not only sold drugs, but also dealt with a biological weapon and a highly toxic chemical used in drug synthesis and as a weapon throughout history.

zac-rust5.jpg

The ZAC investigates pivotal cybercrime cases in Germany. As the name implies, the ZAC serves as a point of contact for law enforcement both within and outside of North Rhine-Westphalia. And as seen in this investigation, the BKA also cooperates with state public prosecutors and law enforcement through the ZAC. The ZAC—as of early 2017—consisted of seven highly skilled public prosecutors. Their skill makes them specialists in many darknet investigations and cases.

Once investigators had identified the group members—two brothers from Hamm and one man from Mölln—had gathered enough evidence to make an arrest, and had located the suspect’s houses, they moved in. They raided homes in both cities, arrested all three suspects, and seized evidence. Among that evidence was shipping containers, scales, “several liters of an unknown liquid,” and one kilogram of white powder.

The trio dealt fentanyl and carfentanil on several darknet markets and underground forums. The shipping material, drugs, and liters of liquids were discovered at the house of one of the Hamm brothers. One was 33-years-old and the other was 44-years-old. Authorities did not reveal which one owned the house with the evidence. The third suspect was a 26-year-old from Mölln. One of the three also sold toxins, authorities suspected. Again, the suspect was not revealed.

5982562_1_85637694.jpg

However, the alleged toxin seller sold botulinum toxin (BTX) and possessed potassium cyanide (KCN). Botulinum toxin is currently manufactured for various medical uses under the brand name “Botox,” among others. BTX is considered safe for use in humans in medical settings, but has been acknowledged as a bioterrorism weapon. Although militaries had stockpiled BTX at one point, the toxin does not seem to have been involved in any mass-murders or in a warfare setting aside from an isolated incident in Japan with no casualties due to BTX. The U.S. and Russia both gave up on weaponizing BTX as doing so proved far less effective and economical than weaponizing anthrax or smallpox. The fear, however, is the relative ease required to produce aerosol sprays.

While the seller could have intended the BTX for medical use, he is under suspicion for selling a biological weapon. At the bare minimum, he violated special trade laws required for selling BTX. Potassium cyanide needs no introduction but the group more than likely used the chemical in carfentanil production as described in the Reiff and Sollman patent. And regardless of intent with this one, at a minimum, he violated regulations under the Chemical Prohibitions Act.

Screenshot from 2017-09-04 14-25-09.png

One local news station wrote:

“The prosecutor’s office in Cologne is investigating the two hammers for violation of the Narcotics, War Weapons Control and the Chemicals Act. The long-drawn-out deployment began around 10 o’clock. Special forces of the GSG9 unit were also on site. The Analytical Taskforce of the Dortmund Fire Brigade was also involved to analyze chemical substances immediately.”

At the worst, the set chemicals were sold with an ulterior motive.

The post Vendors in Germany Dealt with Carfentanil and a Biological Weapon appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/18/vendors-germany-dealt-carfentanil-biological-weapon/feed/ 0
DEA Arrests Two in “RCPowders” Research Chemical Raid https://www.deepdotweb.com/2017/09/17/dea-arrests-two-rcpowders-research-chemical-raid/ https://www.deepdotweb.com/2017/09/17/dea-arrests-two-rcpowders-research-chemical-raid/#respond Sun, 17 Sep 2017 23:34:57 +0000 https://www.deepdotweb.com/?p=22585 On August 29, DEA agents raided a drug lab in an apartment in Queens, New York City, New York. Wearing hazmat suits, agents from the DEA’s Newark Field Division arrested the apartment owner and the suspected drug dealer, 34-year-old Brian Parker. Meanwhile, at a separate location, officers arrested his suspected accomplice, 29-year-old Victoria Koleski. The ...

The post DEA Arrests Two in “RCPowders” Research Chemical Raid appeared first on Deep Dot Web.

]]>
On August 29, DEA agents raided a drug lab in an apartment in Queens, New York City, New York. Wearing hazmat suits, agents from the DEA’s Newark Field Division arrested the apartment owner and the suspected drug dealer, 34-year-old Brian Parker. Meanwhile, at a separate location, officers arrested his suspected accomplice, 29-year-old Victoria Koleski. The duo, according to Acting US Attorney William Fitzpatrick, sold controlled substances and controlled substance analogs online.

Screenshot from 2017-09-03 16-44-59.png

Parker operated and owned two clearnet research chemical storefronts: RCPowders (RCP) and UnbeatableChems (UCB). Both sites were popular topics of discussion on the research chemical subreddit that prefers not to be named. And in a scene where research chemical vendors are dropping like flies, RCP stood out as one of the few U.S. vendors that some community members still used.

Screenshot from 2017-09-03 15-49-18.png

Days before the arrest, a Reddit user asked what had changed in the time period that he had been in jail. A lot had changed in the clearnet RC scene. EtiKing (aka Jeremysdemo aka badmamajama2 aka Jeremy P. Achey) got busted. Research Group Nederland too. Aino Research dissapeared. Many vendors simply vanished. But Parker would not be one of them. “A lot of vendors sell illegal chemicals on the side or darknet,” he wrote. “This is their downfall. Another is not paying to have a legal team. Looks at the few vendors left that are not new. What do we have in common. We pay lawyers to watch our back.”

Screenshot from 2017-09-03 17-05-26.png

The RCP investigation began after one of Parker’s customers overdosed on RCP products. In May 2016, a 37-year-old in Wisconsin overdosed on a combination of etizolam and U-44770. Officers at the scene found packages addressed to the deceased and vials of the opioid, which, ignoring analog laws, was a legal drug at the time. However, not for human consumption, of course, which Parker explicitly stated on both RCP and UCB websites.

Screenshot from 2017-09-03 17-06-36.png

RCP:

“All items are for research only! No human/animal consumption whatsoever.

Q. Are these products for human or animal use?

A. NO this is a research site, for vitro, vivo and plant use. Talk about human or animal use will get your banned!!!

——————————–

Q. What are these chemicals used for?

A. All items are for research only! No human/animal consumption whatsoever. Research Chemicals are used only to see chemical reactions, solubility test and reagent test.”

And UBC:

“The chemicals/materials/peptides for sale here are intended for laboratory and research use only, unless otherwise explicitly stated. They are not intended for human ingestion, use, or for use in products that may be ingested.”

Screenshot from 2017-09-03 16-00-38.png

Victoria Koleski, Parker’s partner, was accused of being one of Parker’s “shippers.” The Criminal Complaint alleges that Koleski, along with other co-conspirators, received packages of drugs from China, repackaged them, and either shipped them to Parker or delivered them to Parker through other means. Between June 30, 2017 through July 5, 2017, the press release explained, “Koleski shipped approximately 218 parcels from a post office located in Farmingdale, many of which contained controlled substance analogues that Parker sold online.”

2355847_1280x720.jpg

Both Parker and Koleski were charged with conspiracy to distribute controlled substance analogs and “distributing and possessing with intent to distribute the controlled substance analogues U-47700, A-PHP, and 3-MEO-PCP.” The defendants appeared before U.S. Magistrate Judge Joseph A. Dickson in Newark federal court the day of their arrest.

The post DEA Arrests Two in “RCPowders” Research Chemical Raid appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/17/dea-arrests-two-rcpowders-research-chemical-raid/feed/ 0
German Authorities Arrested A Dark Web Vendor Group https://www.deepdotweb.com/2017/09/17/german-authorities-arrested-dark-web-vendor-group/ https://www.deepdotweb.com/2017/09/17/german-authorities-arrested-dark-web-vendor-group/#respond Sun, 17 Sep 2017 17:34:55 +0000 https://www.deepdotweb.com/?p=22584 German law enforcement identified and arrested three persons who allegedly sold narcotics on the dark web. According to the investigators, one of them acted with biological weapons and chemical substances. Recently, after a thorough and complex investigation, Cologne authorities identified and arrested three individuals who were suspected of selling drugs on the dark web. The ...

The post German Authorities Arrested A Dark Web Vendor Group appeared first on Deep Dot Web.

]]>
German law enforcement identified and arrested three persons who allegedly sold narcotics on the dark web. According to the investigators, one of them acted with biological weapons and chemical substances.

Recently, after a thorough and complex investigation, Cologne authorities identified and arrested three individuals who were suspected of selling drugs on the dark web. The Federal Criminal Police Office (BKA) discovered a dark web group of criminals dealing with narcotics, chemicals and even biological agents.

In the middle of the year, the investigators asked the employees of the special unit of the Cologne public prosecutor’s office – the “ZAC NRW” for help. The special operations unit managed to identify three suspects in the case. The identified persons included two brothers, 33, 44, of Hamm, North-Rhine Westphalia, Germany and a man, 26, of Mölln, Schleswig-Holstein, Germany.

On the morning of August 29, the investigators had collected enough evidence to request a search warrant in the case. Law enforcement authorities stormed the apartments of the three suspects in Hamm and Mölln. During the raid, investigators searched the apartments and arrested the alleged criminals. In the homes of the suspects, law enforcement authorities discovered chemicals and collected further evidence against the defendants.

All of the suspects are accused of selling narcotics, including carfentanil hydrochloride and fentanyl hydrochloride, in large quantities and in a variety of cases to dark web users via “multiple underground economy platforms.” One of the defendants is also suspected of acting with biological weapons (botulinum toxin) and with toxic chemical substances (potassium cyanide).

In the apartments of the two brothers in Hamm, investigators discovered several liters of unknown liquids and more than one kilogram of powdered substance, stored in a wide range of containers. Furthermore, law enforcement authorities seized precision scales, foil welding equipment, various shipping containers and packaging material in large quantities.

Carfentanil is the analog of the synthetic opioid fentanyl which is the drug that has caused drug epidemics in the United States and Canada. Typically it is used to tranquilize large animals, such as elephants. Furthermore, the drug is really dangerous: it was reported that carfentanil is about 10,000 times more potent than morphine. According to the U.S. Drug Enforcement Administration (DEA), carfentanil is about 50 times deadlier than fentanyl, and about 3,000 to 5,000 times more fatal than heroin. Some reports stated that two milligrams could be enough for a person to overdose on the drug. Since the substance can be absorbed by breathing or the skin, law enforcement authorities had to take certain security measures when they secured the narcotics.

In addition to the forces of the customs offices of Essen and Hamburg, the main customs offices, special forces from the federal police and the state police, local fire brigades were also involved, since law enforcement authorities needed their help to secure the toxic substances.

Since the Essen customs and the ZAC NRW are still investigating the case, law enforcement authorities did not release more information on the suspects.

Botulinum toxin (BTX) is a neurotoxic protein produced by the bacterium Clostridium botulinum and its related species. This substance can be used for the production of nerve pains. It inhibits the excitation transmission of the nerve cells and affects the vegetative nervous system. This can lead to muscle weakness, to the standstill of cardiac-pulmonary function and death. Import and trade are subject to special provisions in many countries including Germany.

Potassium cyanide is mostly used in gold mining, organic synthesis, and electroplating. It is a highly toxic substance, as the lethal dose is between 200 and 300 milligrams. Potassium cyanide was responsible for deaths and suicides of numerous persons, especially in the World War II era. The vendors selling potassium cyanide have a number of specific obligations under the Chemicals Prohibition Order (Chem-VerbotsV). The sale of the substance requires a trade license from the German authorities.

If the suspects are found guilty, they could face serious time in prison. Furthermore, since one of them dealt with highly dangerous chemical substances, he could be imprisoned for a very long time.

The post German Authorities Arrested A Dark Web Vendor Group appeared first on Deep Dot Web.

]]>
https://www.deepdotweb.com/2017/09/17/german-authorities-arrested-dark-web-vendor-group/feed/ 0