Will The FBI Takedown Of Silk Road Force Cyber Criminals To Become More Sophisticated?

Will The FBI Takedown Of Silk Road Force Cyber Criminals To Become More Sophisticated?

Will The FBI Takedown Of Silk Road Force Cyber Criminals To Become More Sophisticated?

criminal-cyber-program

We all have our concerns when it comes to Cloud computing security and privacy. From our children being exposed to indecent images and videos, or the negative effects of social media, to identity theft and pornography. It’s a technology we use on a daily basis, but in many ways we lack understanding and a sense of real control.

We hear stories each year about sites that get taken down and the people that create or use them being arrested, but these announcements seem to few and far between. They are not a solution to the overall problem, and how long will it be before the next story or controversial site?

The most recent story concerns the shut down of a black market site called ‘Silk Road’ and the subsequent arrest of its creator Ross Ulbricht. Silk Road was the culmination of all the worst aspects of criminality both on and off the Internet. This site facilitated the anonymous trade of drugs, guns, porn, hit men, forged documents and computer hackers.

Silk Road was able to exist and function through the use of ‘darknet’ and ‘Tor’. Darknet uses peer-to-peer networks in order to remain anonymous, and Tor (aka The Onion Router) uses separate servers in order to disguise users online presence and location.

The paper trail that would normally accumulate during sales of over $1.2 billion to a million customers was hidden by the use of a virtual currency system called ‘bitcoin’. Bitcoin covered the financial tracks that are often left by credit card use online.

When you see the tactics used by Ulbricht, aka ‘Dread Pirate Roberts’, you wonder how he was ever caught.

The FBI found the six servers hidden in various locations around the world. These servers provided the data that exposed transactions, enabled the site to be shutdown, as well as the arrest of Ulbricht. But what does this arrest and website seizure really mean in the long run? Will this deter future criminals?

In the same way that the Internet and cloud technology is enabling smaller businesses to compete on the global market, so too has it helped criminals widen theirs.

This article, as well as many other you may find on the Internet lists the ways in which Ulbricht was able to run Silk Road, but also how he was found. If one criminal makes a mistake and is made an example of, others around will learn from them and adapt. It may become harder for the authorities across the world to catch cyber criminals.

There will always be concerns in regards to the Internet. It is a platform that can be exploited by criminals, in the same way that criminals uses trucks for people trafficking and airplanes for drug smuggling. There will always be some level of threat if criminals exist.

The question that needs to be answered is whether it should be the authorities should be allowed to use unlawful measures, such as hacking, in order to apprehend those who are doing so for financial gain?

By Gregory Clark

Gregory Clark is freelance writer and tester of compliance management software from Metacompliance.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…