Will The FBI Takedown Of Silk Road Force Cyber Criminals To Become More Sophisticated?

Will The FBI Takedown Of Silk Road Force Cyber Criminals To Become More Sophisticated?

Will The FBI Takedown Of Silk Road Force Cyber Criminals To Become More Sophisticated?

criminal-cyber-program

We all have our concerns when it comes to Cloud computing security and privacy. From our children being exposed to indecent images and videos, or the negative effects of social media, to identity theft and pornography. It’s a technology we use on a daily basis, but in many ways we lack understanding and a sense of real control.

We hear stories each year about sites that get taken down and the people that create or use them being arrested, but these announcements seem to few and far between. They are not a solution to the overall problem, and how long will it be before the next story or controversial site?

The most recent story concerns the shut down of a black market site called ‘Silk Road’ and the subsequent arrest of its creator Ross Ulbricht. Silk Road was the culmination of all the worst aspects of criminality both on and off the Internet. This site facilitated the anonymous trade of drugs, guns, porn, hit men, forged documents and computer hackers.

Silk Road was able to exist and function through the use of ‘darknet’ and ‘Tor’. Darknet uses peer-to-peer networks in order to remain anonymous, and Tor (aka The Onion Router) uses separate servers in order to disguise users online presence and location.

The paper trail that would normally accumulate during sales of over $1.2 billion to a million customers was hidden by the use of a virtual currency system called ‘bitcoin’. Bitcoin covered the financial tracks that are often left by credit card use online.

When you see the tactics used by Ulbricht, aka ‘Dread Pirate Roberts’, you wonder how he was ever caught.

The FBI found the six servers hidden in various locations around the world. These servers provided the data that exposed transactions, enabled the site to be shutdown, as well as the arrest of Ulbricht. But what does this arrest and website seizure really mean in the long run? Will this deter future criminals?

In the same way that the Internet and cloud technology is enabling smaller businesses to compete on the global market, so too has it helped criminals widen theirs.

This article, as well as many other you may find on the Internet lists the ways in which Ulbricht was able to run Silk Road, but also how he was found. If one criminal makes a mistake and is made an example of, others around will learn from them and adapt. It may become harder for the authorities across the world to catch cyber criminals.

There will always be concerns in regards to the Internet. It is a platform that can be exploited by criminals, in the same way that criminals uses trucks for people trafficking and airplanes for drug smuggling. There will always be some level of threat if criminals exist.

The question that needs to be answered is whether it should be the authorities should be allowed to use unlawful measures, such as hacking, in order to apprehend those who are doing so for financial gain?

By Gregory Clark

Gregory Clark is freelance writer and tester of compliance management software from Metacompliance.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Conquering Disease with Artificial Intelligence and IBM Watson

Conquering Disease with Artificial Intelligence and IBM Watson

Artificial Intelligence and IBM Watson Artificial Intelligence, or AI, is growing increasingly pervasive in today’s modern world. Perhaps the most publicized and recognizable application of AI to date, IBM’s Jeopardy-winning computer, Watson, is now being used to help cure cancer. IBM announced the development of Watson for Genomics on Wednesday at the National Cancer Moonshot…

The Fundamentals of Predictive Analysis

The Fundamentals of Predictive Analysis

Predictive Analysis  Article sponsored by SAS Software and Big Data Forum Analytics is playing an increasingly important role in our lives thanks in large part to internet of things (IoT) developments and a greater appreciation of Big Data. With solutions that range across business productivity, health care, individual and national security, new insights are regularly…

Clouding Around With The Unicorns

Clouding Around With The Unicorns

The Social Unicorn Early investors and technology consumers alike love the poignantly named “Unicorn” companies, or private startups that reach the $1 billion valuation. The most recent unicorn spotting is social media game-changer Snapchat, which was recently valued at $16 billion. According to a recent infographic from Alexa discovered via Adweek, Snapchat also proves to…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Increasing Efficiency and Reducing Cost with Managed Printing Services

Increasing Efficiency and Reducing Cost with Managed Printing Services

Managed Printing Services This is a sponsored post written on behalf of HP MPS.  Today’s business leaders recognize the value of shared services, significantly providing a wide range of enterprises with the sophisticated tools they need to compete with big business, while additionally driving costs down. But an area often overlooked in our tech-savvy world…

The Internet of Things Lifts Off To The Cloud

The Internet of Things Lifts Off To The Cloud

The Staggering Size And Potential Of The Internet of Things Here’s a quick statistic that will blow your mind and give you a glimpse into the future. When you break that down, it translates to 127 new devices online every second. In only a decade from now, every single vehicle on earth will be connected…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…