Criminals are stupid.
A US Federal Bureau of Investigation veteran has spoken out on the international police ops that led to the takedown of dark web drug souks AlphaBay and Hansa, giving an insider's look at the process. Joseph Campbell served for 25 years in the FBI, where he led criminal investigations into child exploitation and the trade in …
Criminals who get caught, and don't have the social status to escape punishment, are stupid.
Correct. The scoffing sounds you hear come from the White House - if you *really* want to commit crime and get away with it you need to be either in the warface business, or launder money via real estate. Oh, and make sure your kids actually study instead of just buying them their degree..
You know, that sounds like you are calling US football players rapists.
Following your link, and leaving out the repitions and unproven claims I found less than 100 cases this year. But let's round it up to 100, to be on the safe side.
Now there are over a million teens and young adults who play football in the USA
Which makes the number of rapists around one in 10,000. This is actually well below the percentage of rapes per male population of the UK. You might as well say British men are rapists.
Now, back to the issue of stupidity ...
I said 'American College Football Players" which you changed to "teens and young adults who play football" in your reply.
College football certainly had and maybe still has a problem. Rather than compare numbers with society at large why not compare numbers with other student organisations? College Marching Bandsmen, for example? I don't recall reading about them committing rapes.
You're support is exactly why College Football has such a problem: the number of rapes committed should be zero not "less than <insert other demographic>".
Look at the abundance of drugs today, and give me your honest opinion:
( ) The police won the war.
( ) The drugs won the war.
Fool me once, shame on you; fool me twice, shame on me. Fool me my whole lifetime, ...?
Let's face it, if those new fentanyl opiates are powerful enough that you can send a years' supply in an envelope, then you might just as well give up the police work. Upside: those powerful synthetic opiates may put the Afghan (Columbian, ...) drug lords out of business. That might end some wars.
Once someone decides to split all divisions of crininal trade into the smallest possible entry points, it's going to be hard to stop. Clearly I know very little about three sites, but it seems that once they stop being the Amazon of illegal goods and start being the Bittorrent of them, they will be up much longer. Problem is unionizing a band of THIEVES. However, that's not impossible.
Never worked out why instead of criminalizing the supply and use of drugs, governments didn't muscle in on the action and take a % of the profits as taxes. Would save probably billions worldwide annually just in enforcement and punishment costs that could be put to better use and that is without mention of the thousands of lives lost to settle disputes in the supply chain
I always presumed that the problem with Drug "Merchants" is that there are probably quite a few who are actually public figures or establishments who constantly line the pockets of the law makers...
Considered the sheer quantity of drugs, measuring in thousands of tons per month, that are distributed in the world, it is very difficult to believe that only the Underworld are involved.
Then there is the problem of money laundering the sheer amounts of cash that must be involved. How can this possibly only be "under the cover".... We are literally talking Billions of Euros/Dollars that are capable of becoming untraced.....
It's like illegal arms, there are almost always governments or government figures lurking on the sidelines.
The War on Drugs has been an unmitigated disaster - by every conceivable metric it has failed.
All except one it seems.
Against all research, against the best advice experts can give, against the simple use of eyes and brains, governments keep up their "war on drugs" idiocy, no matter how much obvious harm it does.
There must be something in it for them. Insanity doesn't cover this level of fail. So whatever it is, there is something these politicians (or their "controllers") want from all this, and they seem to be getting it, otherwise the "war" would've ended years ago. And successfully, as they would've given up the wasteful methods and moved on to stuff that works.
When it's legal, the prices would drop. When it's illegal, those in the business make more money off of the higher prices. Look at how prohibition of alcohol went over in the USA.
I ask myself, "Why would my government desire to keep recreational drugs illegal?" Considering the obvious fact that the production of said drugs is unregulated, the product can be abnormally dangerous. If the government wanted us to be safer, and also take money away from the criminal empires living off the drug trade, they would certainly legalize it, regulate it, and profit from it. The fact that they're not doing that, leads me to believe they are involved in the criminal empire making lucrative profits. There is no desire for our covert government to be chopping off it's own hands.
You also have the pharmaceutical player in the game. Here in the USA, I believe a drug patent has a significant amount of time given before other companies are allowed to compete as generics. There is no question that prescribed medicines are used recreationally. In the town I live in (population 23,000) we have had several physicians busted for over-prescribing medication (usually opioids) who received either a kickback from the pharmaceutical company or the 'patient' who was profiting from selling the pills on the street.
The "War on Drugs" is a competition eliminating venture, not a public safety venture.
If the government wanted us to be safer, and also take money away from the criminal empires living off the drug trade, they would certainly legalize it, regulate it, and profit from it.
Oh for a thousand upvotes! Have to settle for one from me and a virtual ---->
I could never understand why when we were in Helmand, Afghanistan we tried to persuade the Afghans not to grow poppies (going so far as destroying crops) when the poppies were the best money earning crop that the Afghan farmers could grow.
Meanwhile back in blighty because of the shortage of Opiods in the NHS we were, at great expense, licencing some UK farmers to grow poppies....
"Would save probably billions worldwide annually just in enforcement and punishment costs that could be put to better use "
On behalf of the people raking it in by either running the criminal organisations, or the for profit penal institutions that manage to paid coming, going and while they are fucking you, those billions are going just where we want them, thanks.
It's almost like having a criminalized underclass is structurally useful in oppressing your population. Piss us off, and for the cost of 100 grand and a hundred grams of something pure you can be framed up as a drug king pin and spend your good years inside. Or get shot during the arrest.
Turns out some nice white folks who aren't at all interested in drug crime are still pretty keen on anything that can be used to control the negroid race. From the AG downwards....
I fully support a move towards decriminalisation for personal use. We need to offer support to drug addicts and not punishment.
Not going to happen for a while yet, for a simple reason: its criminal status keeps the price up so the whole supply chain keeps making a massive profit. Many American family fortunes were built on the Prohibition which made alcohol really expensive - this is really no different as the people raking it in have absolutely no interest in the deleterious effect this has (they're not paying tax anyway, so elevated health and social costs don't matter much to them).
Tribal Sovereignty - the unique legal rights of native Americans - is restricted to specific areas of law such as hunting & fishing, water and gaming. It doesn't mean they can ignore all Federal laws and do what the fuck they feel like.
" AlphaBay's administrator, Alexandre Cazes, used his personal email on password reset emails, compounding the error by using the same email on LinkedIn"
idiot. However: anyone want to put money on none of the "but we need warrantless surveillance" politicians doing similar things?
Step 1. Don't use your everyday box for running your dark web store.
Step 2. Remember the 7 proxies meme. Or Tails inside a bunch of virtual machines?
Step 3. Uh, profit?
The problem with Alexandre Cazes (and Ross Ulbricht before him) is that he thought he was a lot smarter than he actually was.
Ulbricht like doing his admin tasks in public libraries. The FBI figured out what libraries he frequented, and snatched his laptop while two agents diverted his attention with a fake fight. And hiring bikers to carry out six murders? WTF? He must have seen to many episodes of Sons of Anarchy...
Cazes was in Thailand with a bunch of houses and Lamborghinis. An ostentatious Westerner is guaranteed to attract attention from the local plod unless bribes are paid. No wonder he hung himself rather than face time in a Thai prison.
The Feds have warned organizations about a lesser-known extortion gang Karakurt, which demands ransoms as high as $13 million and, some cybersecurity folks say, may be linked to the notorious Conti crew.
In a joint advisory [PDF] this week, the FBI, CISA and US Treasury Department outlined technical details about how Karakurt operates, along with actions to take, indicators of compromise, and sample ransom notes. Here's a snippet:
Russian crooks are selling network credentials and virtual private network access for a "multitude" of US universities and colleges on criminal marketplaces, according to the FBI.
According to a warning issued on Thursday, these stolen credentials sell for thousands of dollars on both dark web and public internet forums, and could lead to subsequent cyberattacks against individual employees or the schools themselves.
"The exposure of usernames and passwords can lead to brute force credential stuffing computer network attacks, whereby attackers attempt logins across various internet sites or exploit them for subsequent cyber attacks as criminal actors take advantage of users recycling the same credentials across multiple accounts, internet sites, and services," the Feds' alert [PDF] said.
A 33-year-old Illinois man has been sentenced to two years in prison for running websites that paying customers used to launch more than 200,000 distributed denial-of-services (DDoS) attacks.
A US California Central District jury found the Prairie State's Matthew Gatrel guilty of one count each of conspiracy to commit wire fraud, unauthorized impairment of a protected computer and conspiracy to commit unauthorized impairment of a protected computer. He was initially charged in 2018 after the Feds shut down 15 websites offering DDoS for hire.
Gatrel, was convicted of owning and operating two websites – DownThem.org and AmpNode.com – that sold DDoS attacks. The FBI said that DownThem sold subscriptions that allowed the more than 2,000 customers to run the attacks while AmpNode provided customers with the server hosting. AmpNode spoofed servers that could be pre-configured with DDoS attack scripts and attack amplifiers to launch simultaneous attacks on victims.
RSA Conference An ambitious project spearheaded by the World Economic Forum (WEF) is working to develop a map of the cybercrime ecosystem using open source information.
The Atlas initiative, whose contributors include Fortinet and Microsoft and other private-sector firms, involves mapping the relationships between criminal groups and their infrastructure with the end goal of helping both industry and the public sector — law enforcement and government agencies — disrupt these nefarious ecosystems.
This kind of visibility into the connections between the gang members can help security researchers identify vulnerabilities in the criminals' supply chain to develop better mitigation strategies and security controls for their customers.
Australian Federal Police (AFP) commissioner Reece Kershaw has accused un-named nations of helping organized criminals to use technology to commit and launder the proceeds of crime, and called for international collaboration to developer technologies that counter the threats that behaviour creates.
Kershaw’s remarks were made at a meeting of the Five Eyes Law Enforcement Group (FELEG), the forum in which members of the Five Eyes intelligence sharing pact – Australia, New Zealand, Canada, the UK and the USA – discuss policing and related matters. Kershaw is the current chair of FELEG.
“Criminals have weaponized technology and have become ruthlessly efficient at finding victims,” Kerhsaw told the group, before adding : “State actors and citizens from some nations are using our countries at the expense of our sovereignty and economies.”
An Interpol-led operation code-named Killer Bee has led to the arrest and conviction of a Nigerian man who was said to have used a remote access trojan (RAT) to reroute financial transactions and steal corporate credentials. Two suspected accomplices were also nabbed.
The trio, aged between 31 and 38, were detained as part of a sting operation involving law enforcement agencies across 11 countries: Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, Nigeria, Philippines, Singapore, Thailand, and Vietnam.
The suspects were arrested in the Lagos suburb of Ajegunle and in Benin City, Nigeria. At the time of their arrests, all three men were in possession of fake documents, including fraudulent invoices and forged official letters, it is claimed.
RSA Conference Living off the land is so 2021. These days, cybercriminals are living off the cloud, according to Katie Nickels, director of intelligence for Red Canary and a SANS Certified Instructor.
"It's not enough to pay attention to the operating systems, the endpoints, said Nickels, speaking on a SANS Institute panel about the most dangerous new attack techniques at RSA Conference. "Adversaries, a lot of their intrusions, are using cloud services of different types."
And yes, living off the land (or the cloud), in which intruders use legitimate software and cloud services to deploy malware or spy on corporations and other nefarious activities, isn't a new type of attack, Nickels admitted. "But what's new here is the levels to which using cloud services [for cyberattacks] has risen."
State-sponsored Chinese attackers are actively exploiting old vulnerabilities to "establish a broad network of compromised infrastructure" then using it to attack telcos and network services providers.
So say the United States National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI), which took the unusual step of issuing a joint advisory that warns allied governments, critical infrastructure operators, and private industry organizations to hurry up and fix their IT estates.
The advisory states that network devices are the target of this campaign and lists 16 flaws – some dating back to 2017 and none more recent than April 2021 – that the three agencies rate as the most frequently exploited.
Microsoft has obtained a court order to seize 41 domains used by what the Windows giant said was an Iranian cybercrime group that ran a spear-phishing operation targeting organizations in the US, Middle East, and India.
The Microsoft Digital Crimes Unit said the gang, dubbed Bohrium, took a particular interest in those working in technology, transportation, government, and education sectors: its members would pretend to be job recruiters to lure marks into running malware on their PCs.
"Bohrium actors create fake social media profiles, often posing as recruiters," said Amy Hogan-Burney, GM of Microsoft's Digital Crimes Unit. "Once personal information was obtained from the victims, Bohrium sent malicious emails with links that ultimately infected their target's computers with malware."
FluBot, the super-spreader Android malware that infected tens of thousands of phones globally, has been reportedly squashed by an international law enforcement operation.
In May, Dutch police disrupted the mobile malware's infrastructure, disconnecting thousands of victims' devices from the FluBot network and preventing more than 6.5 million spam text messages propagating the bot from reaching potential victims, according to Finland's National Bureau of Investigation on Wednesday.
The takedown followed a Europol-led investigation that involved law enforcement agencies from Australia, Belgium, Finland, Hungary, Ireland, Spain, Sweden, Switzerland, the Netherlands and the US.
Biting the hand that feeds IT © 1998–2022