Will The FBI Takedown Of Silk Road Force Cyber Criminals To Become More Sophisticated?

Will The FBI Takedown Of Silk Road Force Cyber Criminals To Become More Sophisticated?

criminal-cyber-program

We all have our concerns when it comes to Cloud computing security and privacy. From our children being exposed to indecent images and videos, or the negative effects of social media, to identity theft and pornography. It’s a technology we use on a daily basis, but in many ways we lack understanding and a sense of real control.

We hear stories each year about sites that get taken down and the people that create or use them being arrested, but these announcements seem to few and far between. They are not a solution to the overall problem, and how long will it be before the next story or controversial site?

The most recent story concerns the shut down of a black market site called ‘Silk Road’ and the subsequent arrest of its creator Ross Ulbricht. Silk Road was the culmination of all the worst aspects of criminality both on and off the Internet. This site facilitated the anonymous trade of drugs, guns, porn, hit men, forged documents and computer hackers.

Silk Road was able to exist and function through the use of ‘darknet’ and ‘Tor’. Darknet uses peer-to-peer networks in order to remain anonymous, and Tor (aka The Onion Router) uses separate servers in order to disguise users online presence and location.

The paper trail that would normally accumulate during sales of over $1.2 billion to a million customers was hidden by the use of a virtual currency system called ‘bitcoin’. Bitcoin covered the financial tracks that are often left by credit card use online.

When you see the tactics used by Ulbricht, aka ‘Dread Pirate Roberts’, you wonder how he was ever caught.

The FBI found the six servers hidden in various locations around the world. These servers provided the data that exposed transactions, enabled the site to be shutdown, as well as the arrest of Ulbricht. But what does this arrest and website seizure really mean in the long run? Will this deter future criminals?

In the same way that the Internet and cloud technology is enabling smaller businesses to compete on the global market, so too has it helped criminals widen theirs.

This article, as well as many other you may find on the Internet lists the ways in which Ulbricht was able to run Silk Road, but also how he was found. If one criminal makes a mistake and is made an example of, others around will learn from them and adapt. It may become harder for the authorities across the world to catch cyber criminals.

There will always be concerns in regards to the Internet. It is a platform that can be exploited by criminals, in the same way that criminals uses trucks for people trafficking and airplanes for drug smuggling. There will always be some level of threat if criminals exist.

The question that needs to be answered is whether it should be the authorities should be allowed to use unlawful measures, such as hacking, in order to apprehend those who are doing so for financial gain?

By Gregory Clark

Gregory Clark is freelance writer and tester of compliance management software from Metacompliance.

Tunio Zafer

The Evolution of Data File Sharing

Data File Sharing Whether due to a lack of time, need or simply because email started at such an advanced stage, digital data-transfer systems have ...
Martin Mendelsohn

New Executive Roles in the Post-Corona Era

Executive Roles in the Post-Corona Era As the global economy shows early signs of reviving from past months of rigormortis, forward-looking companies will be busy ...
Mark Rochester

Why Remote Migrations are Essential for Business Continuity

Remote Business Continuity We are approaching a banner year for the cloud. The COVID-19 pandemic has highlighted the importance of cloud technology to enable resilience ...
Kaylamatthews

What You Need to Know – IoT and Real-Time Operating Systems

Real-Time Operating Systems A real-time operating system, or real-time OS, appears to execute tasks while using a single processing core simultaneously.  However, what's really happening ...
New York

From Y2K To NYC Parking Meters: Have We Learned Anything About Complacency In Cybersecurity?

Cybersecurity Complacency This past January – in what seems like a different world now – a story briefly hit the headlines and was seen as ...
Chandani Patel Volansys

Pillars of AWS Well-Architected Framework

Well-Architected Framework Cloud computing is proliferating each passing year denoting that there are plenty of opportunities. Creating a cloud solution calls for a strong architecture ...