Skip to navigation Skip to navigation Skip to search form Skip to login form Skip to footer Salta al contenido principal

Blog del sitio

Former Swiss police employee accused of selling weapons via darknet

Posted on

ZURICH, April 8 (Reuters) - The former chief of logistics for a regional Swiss police force appeared in court on Thursday accused of falsely buying guns and bullets on behalf of his employer and selling them via the darknet market.

Prosecutors allege that the man, who has not been identified, ordered weaponry and ammunition when he worked for darknet websites the cantonal police in Schywz, dark web market list a mountainous canton near Zurich.

The darknet market is part of the internet often used by criminals for darkmarket 2024 illegal activities.

Swiss police investigating the case recovered 80 guns and tens of thousands of bullets when they searched his home during the investigation. Court documents did not say to whom the weaponry was sold.

The 58-year-old, a civilian law enforcement employee, had ordered the material on behalf of police but instead used them for his own private benefit, court documents said.

In the case, whose proceedings at the Swiss Federal Criminal Court in Bellinzona began on Thursday, darkmarket link the defendant is also accused of selling a "large number of weapons without authorisation to various persons" between 2012 and 2013.

He is accused of having offered the weapons through a darknet market account and having worked with an accomplice who has since been prosecuted in Germany.

He denies the charges.

Swiss broadcaster SRF said the accused handed over the weapons, which included automatic rifles and pistols, to his accomplice in a garbage bag at his home.

The accomplice, it said, then drove the material to a car park on a mountain road where the sales took place.

The Office of the Attorney General (OAG) launched the case against the man in 2018 after getting information from Germany. The OAG said the accused had made a profit of 180,000 Swiss francs ($195,000) from the transactions.

A two-day hearing began on Thursday, with an verdict expected on April 22.

($1 = 0.9251 Swiss francs) (Reporting by John Revill Editing by Mark Heinrich)

Self-proclaimed 'Crocodile of Wall Street' and husband granted bail

Posted on

The self-proclaimed 'Crocodile of Wall Street' and her husband have been granted bail set at $3million and $5million respectively after being arrested for allegedly laundering $4.5billion in stolen in the 2016 Bitfinex exchange hack. 

Ilya '' Lichtenstein, 34, and his wife, Heather Rhiannon Morgan, 31, who raps under the name Razzlekhan, were arrested on Tuesday in Manhattan on federal charges of conspiracy to commit money laundering and conspiracy to defraud the United States. 

At an initial court appearance, a magistrate judge ruled Lichtenstein could be released into home detention on a $5 million bond co-signed by his parents; the bond amount for Morgan was set at $3 million but they were to remain in custody until the bail conditions were met.

Prosecutors had argued defendants, who live on Wall Street in lower Manhattan, should be denied bail, calling them flight risks who still potentially have access to vast sums of money.  

Federal law enforcement officials said they recovered roughly $3.6 billon in cryptocurrency - the Justice Department's largest ever financial seizure - linked to the hack of Bitfinex, a virtual currency exchange whose systems were breached nearly six years ago.    

Lichtenstein is a citizen of both  and the United States and the co-founder of an online marketing firm. Morgan, a rapper and former Forbes contributor, describes herself as 'an expert in persuasion, social engineering, and game theory'.

WARNING: EXPLICIT LYRICS 

Bail for Ilya 'Dutch' Lichtenstein, 34, and his wife, Heather Rhiannon Morgan, 31, was set at $5million and $3million respectively after their arrest on Tuesday for allegedly laundering $4.5billion in Bitcoin stolen in the 2016 Bitfinex exchange hack

Morgan, who raps under the name Razzlekhan, (seen in front of Federal Hall on Wall Street in a music video) declared herself the 'Crocodile of Wall Street' in one of her rap songs

In this courtroom sketch, attorney Sam Enzer, center, sits between Heather Morgan, left, and her husband, Ilya 'Dutch' Lichtenstein, in federal court on Tuesday

'I'm many things, darkmarket 2024 a rapper, an economist, a journalist, onion dark website a writer, a CEO, and a dirty, dirty, dirty dirty h*,' she raps in her 2019 single, Versace Bedouin.

'When she's not reverse-engineering black markets to think of better ways to combat fraud and cybercrime, she enjoys rapping and designing streetwear fashion,' her  reads. 

The August 2016 Bitfinex hack itself was one of the largest crypto heists ever recorded - so massive that news of the theft knocked 20 percent off Bitcoin's value at the time. 

Lichtenstein and Morgan are thus far not charged directly with perpetrating the hack, but rather with receiving and laundering the stolen funds. The case was filed in a federal court in Washington, D.C.

It was unclear who will be representing the couple in the criminal case and whether they had an attorney to speak on their behalf.

They were due to appear in federal court in Manhattan at 3 p.m. on Tuesday. 

The couple is accused of conspiring to launder 119,754 bitcoin that was stolen, after a hacker attacked Bitfinex and initiated more than 2,000 unauthorized transactions.

Morgan, a rapper and former Forbes contributor, describes herself as 'an expert in persuasion, social engineering, and game theory'

The couple is accused of conspiring to launder 119,754 bitcoin that was stolen, after a hacker attacked Bitfinex and initiated more than 2,000 unauthorized transactions

Justice Department officials said the transactions at the time were valued at $71 million in Bitcoin, but with the rise in the currency's value, it is now valued at over $4.5 billion.

'As the complaint alleges, the FBI and federal prosecutors were able to trace the movement of Bitcoin from this hack,' said Matthew Graves, the U.S. Attorney for the District of Columbia.

He added that the money moved through a major darknet Market list exchange tied to a host of crimes, as well as cryptocurrency addresses tied to child sexual abuse materials.

Lichtenstein and Morgan are facing charges of conspiring to commit money laundering, as well as to defraud the United States.

Prosecutors said on Tuesday the illegal proceeds were spent on a variety of things, from gold and non-fungible tokens to 'absolutely mundane things such as purchasing a Walmart gift card for $500.'

Bitfinex said in a statement that it was to working with the Department of Justice to 'establish our rights to a return of the stolen bitcoin.'

'We have been cooperating extensively with the DOJ since its investigation began and will continue to do so,' the company said. 

Bitfinex said it intends to provide further updates on its efforts to obtain a return of the stolen bitcoin as and when those updates are available. 

Tuesday's criminal complaint came more than four months after Monaco announced the department was launching a new National Cryptocurrency Enforcement Team, which is comprised of a mix of anti-money laundering and cybersecurity experts.

The August 2016 Bitfinex hack itself was one of the largest crypto heists ever recorded - so massive that news of the theft knocked 20 percent off Bitcoin's value

Lichtenstein and Morgan are facing charges of conspiring to commit money laundering, dark web marketplaces web darknet market as well as to defraud the United States

Morgan is seen rapping with the New York Stock Exchange behind her to the right

Cyber criminals who attack companies, municipalities and individuals with ransomware often demand payment in the form of cryptocurrency.

In one high-profile example last year, hackers caused a widespread gas shortage on the U.S. East Coast when by using encryption software called DarkSide to launch a cyber attack on the Colonial Pipeline.

The Justice Department later recovered some $2.3 million in cryptocurrency ransom that Colonial paid to the hackers.

Cases like these demonstrate that the Justice Department 'can follow money across the blockchain, just as we have always followed it within the traditional financial system,' said Kenneth Polite, assistant attorney general of the department's Criminal Division. 

Justice Department officials say that though the proliferation of cryptocurrency and virtual currency exchanges represent innovation, the trend has also been accompanied by money laundering, ransomware and other crimes

'Today´s arrests, and the Department´s largest financial seizure ever, show that cryptocurrency is not a safe haven for criminals,' Deputy Attorney General Lisa Monaco said in a statement. 

'In a futile effort to maintain digital anonymity, the defendants laundered stolen funds through a labyrinth of cryptocurrency transactions. Thanks to the meticulous work of law enforcement, the department once again showed how it can and darkmarket list will follow the money, no matter the form it takes.'  

data-track-module="am-external-links^external-links">

Read more:

DM.later('bundle', function()

DM.has('external-source-links', 'externalLinkTracker');

);

Child porn purveyor to get 21-27 years under new plea deal

Posted on

COLLEGE PARK, Md. (AP) - A man whom U.S. authorities have described as the world´s largest purveyor of child pornography would be sentenced to 21 to 27 years in prison under the terms of a new plea deal.

The deal between Eric Eoin Marques and Justice Department prosecutors is designed to satisfy a judge in Maryland darknet magazine who rejected their original agreement, which called for a prison sentence of 15 to 21 years.

Defense attorneys outlined the new terms in a court filing on Friday.

They said a 21-year prison sentence would be "fair and just" for Marques.

Marques' lawyers also urged U.S. District Judge Theodore Chuang to impose a condition of supervised release that would allow Marques to live in Ireland, his home nation, after he completes his prison sentence.

Marques, who was 35 in May, is scheduled to enter his updated plea agreement and be sentenced next week.

Chuang isn´t bound by the sentencing recommendation.

During a hearing in May, Chuang described the initial plea agreement as "too flawed" and said he was inclined to give Marques a longer sentence than 15 to 21 years. The judge criticized a provision of the plea deal that wouldn´t give Marques credit for six years he spent in custody in Ireland while fighting extradition after his 2013 arrest in Dublin. Chuang said he can´t tell the federal Bureau of Prisons to refrain from counting those years when Marques likely is entitled to get credit for that time.

"It´s not going to be 21 minus 6 to 15. That´s not going to happen," the judge said.

The new plea deal calls for Marques to receive credit for dark web marketplaces the time served.

Marques, a dual citizen of the U.S.

and Ireland, pleaded guilty in February 2020 to creating and operating a web hosting service called "Freedom Hosting" on the darknet market between 2008 and 2013.

The darknet market is part of the internet but hosted within an encrypted network. It is accessible only through anonymity-providing tools.

Marques' service enabled users to anonymously access millions of illicit images and videos, many depicting the rape and torture of infants and toddlers.

Investigators found what appeared to be more than 8.5 million images and videos of child pornography on the Freedom Hosting server, dark websites according to a court filing that accompanied Marques´ guilty plea.

Marques was living in Ireland at the time of the offenses.

He was extradited to Maryland in March 2019. He pleaded guilty to conspiracy to advertise child pornography.

In an April court filing, a prosecutor said a government witness was prepared to testify that investigators had identified Marques as the largest purveyor dark market onion of child pornography in the world and that he had made approximately $3.6 million in U.S.

currency from his servers.

Marques' lawyers say he made money from his legitimate web-hosting services, not Freedom Hosting.

"Though the contents of many of the websites it hosted were despicable and unlawful, the evidence shows that Freedom Hosting was a free service until just before Mr. Marques´ arrest," they wrote in Friday's filing.

Fake vaccine card price doubles after Biden announces mandatory shots

Posted on

The price of fake vaccination cards has risen 100% since President Biden's announcement of a sweeping new vaccine mandate. 

In the days before the president's announcement that all businesses with over 100 employees must require vaccinations or weekly testing, the cost of a fraudulent card ran about $100. The day after the announcement, the average cost spiked to $200. 

The number of sellers cashing in on the anti-vax darknet market also spiked, from around 1,000 to more than 10,000, according to data from  security firm Check Point shared with the

Biden last Thursday also strengthened a vaccine mandate for federal workers and contractors, requiring them to be vaccinated and eliminating the weekly testing alternative.  

The number of subscribers in Telegram groups for fake vaccine cards increased five-fold, according to researchers at Check Point who monitor the darknet market lists and deep web.

Counterfeit cards have for months popped up on Amazon, Etsy, eBay, Facebook, Instagram and other marketplaces. 

In April, a bipartisan coalition of 47 state attorneys general sent a letter to the CEOs of Twitter, Shopify and eBay to take down ads or links selling the bogus cards.

Many of the sites have blacklisted keywords related to fake cards, but places to buy the documents are still popping up on messaging apps, chat forums and the dark web.

In July, the Department of Justice announced its first prosecution for fake vaccination proof, where a California naturopathic doctor, Juli Mazi, was charged with one count of wire fraud and one count of false statements related to health care matters. 

Biden last Thursday signed an executive order forcing businesses with over 100 employees to require vaccinations or weekly Covid-19 testing 

A photo of a hand using a magnifying glass to check the authenticity of s Covid-19 vaccine card, taken on August 15

Thousands of counterfeit vaccination cards, dark darknet market onion containing typos and misspelled words, have been seized in Memphis  

And on Aug. 17, a Chicago pharmacist, TangTang Zao, was arrested for selling dozens of fake vaccine cards for just $10 a pop. 

'To put such a small price on the safety of our nation is not only an insult to those who are doing their part in the fight to stop COVID-19, but a federal crime with serious consequences,' said Special Agent in Charge Emmerson Buie Jr. of the FBI's Chicago Field Office.

Zao allegedly sold blank but authentic CDC vaccination cards and was charged with 12 counts of theft of government property. If convicted, he faces a sentence of 10 years in prison per count. 

On Aug. 31, a New Jersey woman, Jasmine Clifford, who went by @antivaxmomma on Instagram, was charged along with 14 others as part of a scheme that peddled over 250 fake vaccination cards for $200 on Instagram. For an extra $250, co-conspirator Nadayza Barkley, who worked at a New York medical clinic, would allegedly enter the buyer's name into the state's digital database for New York's digital vaccine pass. 

Three Vermont state troopers, who have since resigned, are also under FBI investigation for running a fake vaccination card scheme.

Customs and Border Protection says it has seized thousands of fake vaccination cards coming into the US over the past few months. 

Last month the agency uncovered a shipment from Shenzen, dark market onion China to Memphis containing fake vaccine cards fraught with typos and misspelled words. CBP said it was the 15th such shipment of the night, though to all different cities, dark darknet market darknet markets 2024 and none were even concealed inside their shipment container. CBP said Memphis alone had made 121 seizures totaling 3,017 of vaccination cards. 

data-track-module="am-external-links^external-links">

Read more:

The history of hacking ransoms and cryptocurrency

Posted on

id="article-body" class="row" section="article-body" data-component="trackCWV">

Earlier this month, hundreds of companies from the US to Sweden were entangled in the , a company that offers network infrastructure to businesses around the world.

The Kaseya hack comes on the heels of other headline-grabbing cyberattacks like the  and the . In each instance, criminals had the opportunity to make off with millions -- and much of the ransoms were paid in Bitcoin.

"We have to remember the primary reason for creating Bitcoin in the first place was to provide anonymity and secure, trustless and borderless transaction capabilities," says Keatron Evansprincipal security researcher at .

As Bitcoin grows more prominent in best darknet markets around the world, cybercrooks have found a vital tool to help them move illegal assets quickly and pseudonymously. And by all accounts, the attacks are only becoming more common. 

Ransomware on the rise

Ransomware is a cybercrime that involves ransoming personal and business data back to the owner of that data. 

First, a criminal hacks into a private network. The hack is accomplished through various tactics, including phishing, social engineering and preying upon users' weak passwords.

Once network access is gained, the criminal locks important files within the network using encryption. The owner can't access the files unless they pay a ransom. Nowadays, cybercriminals tend to request their ransoms in cryptocurrencies.

The FBI  ransomware attacks accounted for at least $144.35 million in Bitcoin ransoms from 2013 to 2019. 

These attacks are scalable and can be highly targeted or broad, ensnaring anyone who happens to click a link or install a particular software program. 

This allows a small team of cybercrooks to ransom data back to organizations of all sizes -- and the tools needed to hack into a small business or multinational cooperation are largely the same. 

Private citizens, businesses, and state and national governments have all fallen victim -- and many decided to pay ransoms.

Today's business world depends on computer networks to keep track of administrative and financial data. When that data disappears, it can be impossible for the organization to function properly. This provides a large incentive to pay up. 

Although victims of ransomware attacks are encouraged to report the crime to federal authorities, there's no US law that says you have to report attacks (). Given this, there's little authoritative data about the number of attacks or ransom payments. 

However, a recent study from Threatpost  only 20% of victims pay up. Whatever the actual number is, the FBI  against paying ransoms because there's no guarantee that you'll get the data back, and paying ransoms creates further incentive for ransomware attacks. 

Why do hackers like cryptocurrency?

Cryptocurrency provides a helpful ransom tool for cybercrooks. Rather than being an aberration or misuse, the ability to make anonymous (or pseudonymous) transfers is a  of cryptocurrency. 

"Bitcoin can be acquired fairly easily. It's decentralized and readily 

available in almost any country," says Koen Maris, a cybersecurity expert and advisory board member at IOTA Foundation.

Different cryptocurrencies feature different levels of anonymity. Some cryptocurrencies, like Monero and Zcash, specialize in confidentiality and may even provide a higher level of security than Bitcoin for cybercriminals. 

That's because Bitcoin isn't truly anonymous -- it's pseudonymous. Through careful detective work and analysis, it appears possible to trace and recoup Bitcoin used for ransoms, as the FBI  after the Colonial Pipeline hack. So Bitcoin isn't necessarily used by ransomers simply because of security features. Bitcoin transfers are also fast, irreversible and easily verifiable. Once a ransomware victim has agreed to pay, the criminal can watch the transfer go through on the public blockchain. 

After the ransom is sent, it's usually gone forever. Then crooks can either exchange the Bitcoin for another currency -- crypto or fiat -- or transfer the Bitcoin to another wallet for safekeeping. 

While it's not clear exactly when or how Bitcoin became associated with ransomware, hackers, cybercrooks, and crypto-enthusiasts are all computer-savvy subcultures with a natural affinity for new tech, and Bitcoin was adopted for illicit activities online soon after its creation. One of Bitcoin's first popular uses was currency for transactions on the dark web. The  was among the early marketplaces that accepted Bitcoin.

Financial impact

Ransomware is big business. Cybercriminals made off just under $350 million worth of cryptocurrency in ransomware attacks last year, . That's an increase of over 300% in the amount of ransom payments from the year before. 

The COVID-19 pandemic set the stage for a surge in ransomware attacks. With vast tracts of the global workforce moving out of well-fortified corporate IT environments into home offices, cybercriminals had more surface area to attack than ever.

According to , the organizational changes needed to accommodate remote work opened up more businesses for cybercrime exploits, best darknet market darknet markets links with Coalition's policyholders reporting a 35% increase in funds transfer fraud and social engineering claims since the beginning of the pandemic.

It's not just the number of attacks that is increasing, but the stakes, too. A  from Palo Alto Networks estimates that the average ransom paid in 2020 was over $300,000 -- a year-over-year increase of more than 170%.

When an organization falls prey to cybercrime, darkmarket 2024 the ransom is only one component of the financial cost. There are also remediation expenses -- including lost orders, business downtime, consulting fees, and other unplanned expenses. 

The  report from Sophos found that the total cost of remediating a ransomware attack for a business averaged $1.85 million in 2021, up from $761,000 in 2020. 

Many companies now buy cyber insurance for financial protection. But as ransomware insurance claims increase, the insurance industry is also dealing with the fallout.

Globally, the price of cyber insurance has , according to a new report from Howden, an international insurance broker. The increase is likely due to the growing cost these attacks cause for insurance providers. 

A cyber insurance policy generally covers a business's liability from a data breach, such as expenses (i.e., ransom payments) and legal fees. Some policies may also help with contacting the businesses customers who were affected by the breach and repairing damaged computer systems. 

Cyber insurance payouts now account for  of all premiums collected, which is the break-even point for the providers. 

"We noticed cyber insurers are paying ransom on behalf of their customers. That looks like a bad idea to me, as it will only lead to more ransom attacks," says Maris. "Having said that, I fully understand the argument: the company either pays or it goes out of business. Only time will tell whether investing in ransom payments rather than in appropriate cybersecurity is a viable survival strategy."

Early adopters

The AIDS Trojan, or PC Cyborg Trojan, is the first known ransomware attack. 

The attack began in 1989 when an AIDS researcher distributed thousands of copies of a floppy disk containing malware. When people used the floppy disk, it encrypted the computer's files with a message that demanded a payment sent to a PO Box in Panama. 

Bitcoin wouldn't come along until almost two decades later. 

In 2009, Bitcoin's mysterious founder, Satoshi Nakamoto, created the blockchain network by mining the first block in the chain -- the genesis block. 

Bitcoin was quickly adopted as the go-to currency for the onion dark website web. While it's unclear exactly when Bitcoin became popular in ransomware attacks, the 2013 CryptoLocker attack definitely put Bitcoin in the spotlight. 

CryptoLocker infected more than 250,000 computers over a few months. The criminals made off with about $3 million in Bitcoin and pre-paid vouchers. It took an internationally coordinated operation to take the ransomware offline in 2014.

Since then, Bitcoin has moved closer to the mainstream, and ransomware attacks have become much easier to carry out.

Early ransomware attackers generally had to develop malware programs themselves. Nowadays, ransomware can be bought as a service, just like other software. 

Ransomware-as-a-service allows criminals with little technical know-how to "rent" ransomware from a provider, which can be quickly employed against victims. Then if the job succeeds, the ransomware provider gets a cut. 

Future legislation

In light of the recent high-profile ransomware attacks, calls for new legislation are growing louder in Washington.

President Joe Biden issued an  in May "on improving the nation's cybersecurity." The order is geared toward strengthening the federal government's response to cybercrime, and it looks like more legislation is on the way.

The  was recently introduced by a bipartisan group of senators. The bill aims to ramp up penalties for cyberattacks that impact critical infrastructure, so the Justice Department would have an easier time charging criminals in foreign countries under the new act.

States are also taking their own stands against cybercrime:  have proposed legislation to outlaw ransomware payments. North Carolina, darknet market darknet market links Pennsylvania, and Texas are all considering new laws that would outlaw taxpayer money from being used in ransom payments. New York's law goes a step further and could outright ban private businesses from paying cybercrime ransoms. 

"I think the concept of what cryptocurrency is and how it works is something that most legislative bodies worldwide struggle with understanding," says Evans. "It's difficult to legislate what we don't really understand."

Crypto crime hit record $14 billion in 2021, research shows

Posted on

By Tom Wilson

LONDON, Jan 6 (Reuters) - Crime involving cryptocurrencies hit an all-time high of $14 billion last year, blockchain researcher Chainalysis said on Thursday, a record that comes as regulators call for dark web darknet market list more powers over the fast-growing sector.

Crypto received by digital wallet addresses linked to illicit activity including scams, darknet market markets and ransomware jumped 80% from a year earlier, Chainalysis said in a report.

The activity represented just 0.15% of total crypto transaction volumes, its lowest ever.

Overall volumes soared to $15.8 trillion in 2021, up over five-fold from a year earlier, U.S.-based Chainalysis said. Digital assets, from bitcoin to non-fungible tokens, exploded in popularity in 2021 amid an embrace from institutional investors and major companies.

Newcomers have been drawn to the promise of quick gains touted by crypto backers, as well as hopes that bitcoin offers a hedge against soaring inflation. Yet cryptocurrencies are still subject to patchy regulation, leaving investors with little recourse against crime.

Financial watchdogs and policymakers from Washington to Frankfurt have fretted over the use of crypto for money laundering, with some urging lawmakers to grant them greater powers over the industry.

"Criminal abuse of cryptocurrency creates huge impediments for continued adoption, heightens the likelihood of restrictions being imposed by governments, and worst of all victimizes innocent people around the world," Chainalysis said.

Driving the increase in crime was an explosion of scams and theft at decentralized finance - DeFi - platforms, it said.

DeFi sites - which offer lending, insurance and dark market link other financial services while bypassing traditional gatekeepers such as banks - have been plagued by problems that include flaws in underlying code and dark darknet market onion opaque governance.

Overall cryptocurrency theft grew over five-fold from 2020, with around $3.2 billion worth of coins stolen last year.

Around $2.2 billion of those funds, some 72% of the total, were stolen from DeFi sites.

Scams at DeFi platforms - such as "rug pulls," where developers set up phony investment opportunities before disappearing with investors' cash - hit $7.8 billion, an 82% jump from 2021, Chainalysis said.

(Reporting by Tom Wilson; Editing by Frank Jack Daniel)

One of the biggest ever dark web police stings leads to 150 arrests

Posted on

Police around the world have arrested 150 suspects in one of the largest-ever dark web sting operations.

jarallax.min.js?ver=c7234f5d5fc1

The suspects arrested included several high-profile targets, involved in buying or selling illegal goods online, Europol said today.

Operation Dark HunTOR also recovered millions of pounds in cash and , as well as drugs and guns. 

The bust stems from a German-led police sting earlier this year taking down the 'world's largest' darknet market marketplace.

darknet market markets are e-commerce sites designed to lie beyond the reach of regular search engines and are popular with criminals, as buyers and sellers are largely untraceable. 

Police around the world have arrested 150 suspects in one of the largest-ever dark web sting operations.

The suspects arrested included several high-profile targets, involved in buying or selling illegal goods online, Europol said today (stock image)

Dark HunTOR, 'was composed of a series of separate but complementary actions in Australia, Bulgaria, France, Germany, Italy, the Netherlands, Switzerland, the United Kingdom, and the United States,' the Hague-based Europol said.

In the United States alone, police arrested 65 people, while 47 were held in Germany, 24 in Britain, dark darknet market url and four each in Italy and the Netherlands, among others.

A number of those arrested 'were considered high-value targets' by Europol.

Law agents also confiscated 26.7 million euros (£22.45million) in cash and virtual currencies, as well as 45 guns and 516lbs of drugs, including 25,000 ecstasy pills.

Italian police also shut down the 'DeepSea' and 'Berlusconi' marketplaces, 'which together boasted over 100,000 announcements of illegal products', said Europol, which coordinated the operation together with its twin judicial agency Eurojust.

German police in January closed down the 'DarkMarket' online marketplace, used by its alleged operator, an Australian, to facilitate the sale of drugs, stolen credit card data and malware.

Europol said the arrest of the alleged operator, caught near the German-Danish border at the time, and the seizure of the criminal infrastructure provided 'investigators across the world with a trove of evidence'.

German prosecutors at the time said DarkMarket came to light in the course of a major investigation against the web-hosting service Cyberbunker, located in a former NATO bunker in southwest Germany.

Europol's European Cybercrime Centre EC3 has since been compiling intelligence packages to identify the key targets, the continent's policing agency said.

The secret 'darknet market' includes websites that can be assessed only with specific software or authorisations, ensuring anonymity for users.

 dark websites HunTOR, 'was composed of a series of separate but complementary actions in Australia, Bulgaria, France, Germany, Italy, the Netherlands, dark web link Switzerland, the United Kingdom, and the United States,' the Hague-based Europol (their HQ pictured) said

They have faced increased pressure from international law enforcement in recent months.

'The point of operations such as this is to put criminals operating on the dark web market links web on notice (that) the law enforcement community has the means and global partnerships to unmask them and hold them accountable for dark markets 2024 their illegal activities,' Europol deputy director of operations Jean-Philippe Lecouffe said.

Rolf van Wegberg, cybercrime investigator at the TU Delft university said the operation signalled a break in the trend of recent police actions against suspected online criminals.

'This kind of operations in the past looked at arresting the controllers of these marketplaces, we now see police services targeting the top sellers,' he told investigative journalists at the Dutch KRO-NCRV public broadcaster.

A press conference about the operation has been set for 10am local time (2pm GMT) in Washington with the Department of Justice. 

Germany sees a rise in far-right crime

Posted on

has announced a spike in far-right and warned that political extremists are 'the biggest threat to our country.'

The interior ministry reported another annual increase in anti-Semitic crimes, up by 15.7 per cent in 2020, with 2,351 total incidents - 94.6% of which were committed by a far-right suspect.

Of the total, 62 were acts of violence while the majority were antisemitic hate speech and other related crimes, frequently on social media.

Interior Minister Horst Seehofer said: 'This development in Germany is not only troubling, but in view of our history, deeply shameful.' 

A protester with an Iron Cross draped over his back outside the Reichstag at a far-right demonstration against lockdown during the summer.

The symbol harks back to imperial Germany and was re-appropriated by the Nazis under Adolf Hitler  

Far-right crime rose by 5.65 per cent in 2020, accounting for more than half of all politically-motivated criminality.

Seehofer said: 'This shows again that right-wing extremism is the biggest threat for our country.'

It comes as Berlin police arrested a 53-year-old man on Tuesday on suspicion of sending dozens of threatening neo-Nazi letters to politicians, lawyers and journalists. 

The suspect, whose name wasn't released for privacy reasons, has previous convictions for darkmarket 'numerous crimes, including ones that were motivated by right-wing ideology,' said prosecutors in Frankfurt, who are handling the case.

The letters were signed 'NSU 2.0.' A German group called the National Socialist Underground was responsible for a string of violent crimes between 1998 and 2011, including the racially motivated killings of nine men with immigrant backgrounds and dark websites a police officer.

The group's name was derived from the full name of the Nazi, or National Socialist, party.

Police think the suspect sent almost 100 letters to dozens of people and organizations across Germany and Austria since 2018.

German news agency dpa reported that investigators think the suspect may have obtained personal data on the people he targeted from official records or best darknet markets forums.

German security agencies warned of the growing threat of violent far-right extremism.

In July 2019, a regional politician from Chancellor Angela Merkel's party was killed by a neo-Nazi; three months later, a gunman tried to force his way into a synagogue on Yom Kippur, killing two people. 

Moshe Kantor, president of the European Jewish Congress, said the German numbers revealed by the interior ministry today highlighted a broader issue.

'This is a wake-up call, not just for Germany, but for the whole world,' he said.

'These figures should ring alarm bells, because we are seeing similar trends across the Western world.'

In 2020, Germany recorded a 72.4% increase in anti-immigrant crimes, up to 5,298 total cases over 3,073 in 2019, Seehofer said.

A bullet lies on the street in Hanau in February, darkmarket url 2020, after a right-wing terrorist shot nine people before turning the gun on himself 

Forensic officers investigating in Hanau after the shooting which targeted immigrants in February, 2020

In the most deadly incident, nine people with immigrant backgrounds were shot dead in Hanau, near Frankfurt, in February by a gunman who had called for genocide.

Authorities have raised concerns about the role the Alternative for Germany party allegedly played in stoking a climate of resentment toward immigrants and the government.

The party, which placed third in Germany's 2017 election, has moved steadily to the right in recent years, drawing increasing scrutiny from the country's domestic intelligence agency.

On Tuesday, Alternative for dark web sites Germany's section in Berlin condemned a member who appeared to lament the absence of attacks on Merkel.

The news website Business Insider reported that AfD's former chairman in Berlin, Guenter Brinker, forwarded a message stating that 'either that piece of dirt is so well protected that nobody can get at her, or darknet market darknet magazine don't the Germans have any balls?'

Brinker said later that he had mistakenly forwarded the message and regretted doing so, and that he rejected 'all forms of hatred and violence.'

Many in the AfD have expressed support for, and participated in, the regular protests in Germany against lockdown measures, organized by the so-called Querdenker movement.

Interior Minister Horst Seehofer (pictured on Tuesday) said: 'This (anti-Semitic) development in Germany is not only troubling, but in view of our history, deeply shameful.'

The demonstrations have become increasingly violent, and the country's domestic intelligence service late last month said it had put some members of the loose-knit Querdenker movement under observation.

The protests have brought together a broad range of demonstrators, including people opposing vaccinations, others who deny the existence of the coronavirus, mask opponents, conspiracy theorists and others.

Seehofer said the protests have also attracted neo-Nazis and other right-wing extremists, and have regularly become violent.

'At these gatherings organized by the so-called Querdenker movement, attacks are directed against police officers and the press,' Seehofer said.

'Of the 260 reported crimes against journalists, 112 were related to corona' protests, he said.

'I want to say here very clearly: These acts of violence are no longer about exercising a constitutional right (to demonstrate), but are acts of violence of a criminal nature that I condemn in the strongest possible terms.' 

Global Drug Survey reveals alcohol and drug habits during pandemic

Posted on

Australians are officially the world's biggest binge drinkers, but Britain and dark darknet market the US don't lag far behind - featuring in the top five of the latest Global Drug Survey.

Denmark and Finland ranked at second and third in the survey of more than 32,000 people from 22 countries which collected data from December 2020 to March 2021.

The data also shows that the Irish felt the most remorse after drinking.   

Researchers believes extending Covid lockdowns contributed to the results

The survey found that the pandemic saw more experiment with 'microdosing' with psychedelics but people on average consumed less , cannabis, cocaine and LSD.  

According to the findings unveiled this week, Australians got drunk an average 27 times in 2021, almost double the global average of 15.

Australians filled up their beer or wine glass with booze two days per week on average, the survey revealed.

It also found Australians regret their intoxication on 24 per cent of occasions - compared to the 21 per cent global average, with women more likely to regret getting drunk than men. 

Britons joined the United States, Denmark and Finland in the top five drunkest nations after Australia

'Drank too much too quickly' was the most common regret, claimed by nearly half of those surveyed

But the Irish felt the most remorse after drinking this year, regretting it about a quarter of the time. 

The Danish felt the least regretful, Dark Web Market Urls and were also the second drunkest nation after Australia in 2021.

'Drank too much too quickly' was the most common regret, claimed by 49 per cent of those surveyed.

Six per cent said they felt anxious about Covid while four per cent said it was because they 'hadn't drank for ages' due to pandemic restrictions. 

Australians filled up their beer or wine glass with booze two days per week on average, the survey revealed

Vinegar Yard in London. Britons joined the Australia, the United States, Denmark and Finland in the top five drunkest nations

Two percent drank too much at a virtual party. 

Britons joined the United States, Denmark and Finland in the top five drunkest nations after Australia.

France leads the world for the average number of drinks consumed in a year, enjoying more than 132 glasses of booze, followed by New Zealand on 122, while Australians had 106 drinks per year on average.

Despite this, darknet market markets onion the use of almost all drug classes fell in 2021 compared with last year's sample.

Alcohol consumption fell to 92.8 per cent to 94 per cent and 51 per cent said they had smoked cigarettes in 2021 compared to 60.8 per cent in 2020.

The report said this could be due to the older age of the sample group or that most drugs were simply used less amidst the pandemic.

The Danish felt the least regretful after drinking and were also the second drunkest nation after Australia in 2021

France leads the world for the average number of drinks consumed in a year, enjoying more than 132 glasses of booze

People got less drunk over the lockdown and the rate of people seeking emergency help after consuming drugs fell for most substances too. 

However the report's finding suggest that microdosing, which is when a very small amount of a substance is taken to observe its effects on the body, 'may be on the increase among those who use psychedelics'.

One in four of this group said they had microdosed with LSD or psilocybin (more commonly known as 'magic mushrooms') in the last 12 months.

One third of those who had taken psychedelics before also experimented microdosing with MDMA, ketamine, DMT, and 1P-LSD.

The study also found that although the pandemic may have locked us in, most people who used illegal drugs still obtained substances in-person

For those who used illegal drugs, most sourced them in person despite Covid restrictions making this difficult for many

The study also found that although the pandemic may have locked us in, most people who used illegal drugs still obtained substances in-person. 

Where this occurred, people were most likely to get their supply from friends. 

Some 1 in 10 mentioned digital sources and reported darknet market markets for drugs other than cannabis, which was more often accessed through apps.

The first question of the survey asked respondents to sum up 2020 in one word.

After translating responses the report said that the 'main theme was a negative sentiment' towards the year, with 'sh**', 'f***ed' and 'challenging' dominating the general consensus. 

Four paedophiles jailed in Germany for raping boys in garden shed

Posted on

Adrian V., 28, a computer technician and the ringleader, led the sexual abuse from a shed belonging to his mother - who fetched the men breakfast as they assaulted the victims

Four paedophiles have been jailed in for raping boys after luring them to a shed where they drugged them and abused them for days.

Adrian V., 28, a computer technician and the ringleader, led the sexual abuse in a shed belonging to his mother - who fetched the men breakfast as they assaulted the victims.

Along with three other men, Adrian V.

was found to have trapped boys in the garden shed from April 2020, darknet market where the victims were drugged and raped over the course of three days.

One of the victims, now 11 years old, darknet market darknet markets onion onion address was the son of his girlfriend.

Prosecutors presented some 30 hours of video evidence, much of which had been shared in darknet markets onion forums.

The other men are believed to have met Adrian V. online. 

They are Marco Sch., 35, an IT expert from Hanover; Tobias Sch., 30, a craftsman from Hesse; and Enrico L., 42, a care provider from Brandenburg. Germany's privacy laws mean that surnames are not disclosed.

The chief defendant's mother Carina V., 45, was found to have been aware of the abuse.

The court heard that she had brought the men breakfast while they took turns assaulting the children.  

The chief defendant's mother Carina V., tor drug darknet market 45, was found to have been aware of the abuse.

The court heard that she had brought the men breakfast while they took turns assaulting the children in her garden shed in Munster

Adrian V.'s computer rig where he had downloaded more than 500 terabytes of child porn at his mother's house

Police officers walk past the garden shed where boys were abused by Adrian V.

and the three other men in April last year

Adrian V., flanked by his lawyers, holds a folder up to hide his face at the court in Munster on Tuesday

Presiding judge Matthias Pheiler expressed shock at the 'horrific events' covered in the trial, calling the video recordings 'deeply disturbing'.

'The proceedings also clearly showed how paedophiles operate: they trick, they lie, they manipulate those around' the victims, best darknet markets he said, adding that he was repulsed to see that the defendants 'grinned' and even 'laughed loudly' while evidence against them was presented.

Pheiler said he was relieved none of the victims had had to testify in the trial. 

Adrian V., from Münster, was jailed for 14 years. The other three men were jailed for between 10 and tor drug market 12 years.

The mother, Carina V., was jailed for five years for aiding and abetting. 

Police are still screening evidence uncovered from the abuse in the shed and have used it to identify suspects across Germany and abroad. 

The main defendant Adrian V.

holds a folder in front of his face next to his lawyer at the Regional Court in Munster today

The ringleader Adrian V.

is said to have 'grinned' throughout the trial

Five men have already been convicted and sentenced in connection with the case and investigators have identified 50 suspects, of whom around 30 are in custody.

The current trial began last November and the sentences were broadly in line with what prosecutors had demanded.

It is just one of a series of gruesome child abuse cases to rock the German state of North Rhine-Westphalia over the last year, prompting a tightening of legislation.

In June 2020, investigators said they were probing some 30,000 suspects as part of an investigation into a large online paedophile network linked to the city of Bergisch Gladbach.

In an earlier scandal in Luegde, 80 miles from Munster, several men abused children hundreds of times at a campsite over a number of years.

In response to the series of cases, the German parliament in March agreed tougher punishments for using and sharing child pornography.

The law also gives police and prosecutors broader powers to monitor online communication of suspects.


  
Scroll to top