DarkMarket: Cyberthieves, Cybercops and You ePUB ↠

DarkMarket: Cyberthieves, Cybercops and You ePUB ↠ Cut up your credit cards, close down your PC, cancel on line banking, hide your money under the mattress After reading Misha Glenny s investigation of cybercrime you will find it hard to believe anything is safe If you haven t been affected yet, put it down to luck But don t doubt that it is coming to an ATM near you any time soon.DarkMarket is the story of a loose alliance of mainly young geeks, sufficiently bored, sufficiently savvy and sufficiently amoral, who find ways of helping themse Cut up your credit cards, close down your PC, cancel on line banking, hide your money under the mattress After reading Misha Glenny s investigation of cybercrime you will find it hard to believe anything is safe If you haven t been affected yet, put it down to luck But don t doubt that it is coming to an ATM near you any time soon.DarkMarket is the story of a loose alliance of mainly young geeks, sufficiently bored, sufficiently savvy and sufficiently amoral, who find ways of helping themselves electronically to money that doesn t belong to them Some become unimaginably wealthy at least until they are caught but others are doing it simply because it s there Catching them, as Glenny outlines at length, is complicated Often they are committing a crime in a country far from where they are situated, couriering the proceeds to yet another country Under whose jurisdiction might they be prosecuted, even supposing they can be caught If the detectives can extract evidence, in itself no easy task, where do they find a court capable of understanding what is put before them And who exactly are these cybercriminals They operate under pseudonyms, seldom, if ever, meeting in person Some are cops playing criminal in an attempt to infiltrate the network By the end of this particular tale it seems that DarkMarket has been brought down and some, if not all, of its most virulent participants are out of commission But has DarkMarket already resurfaced under another name Probably.This is a rivetting read with a chilling conclusion A strong, compelling work of modern literary journalism Leaves one fearful for our ignorance and vulnerability in this particular area of crime. Glenny s secret here as with his earlier McMafia is to take a fragmented subject which has many real world loose ends and forge something close to a novel type structure which makes the whole story accessible Certainly the issues here are serious although it is slightly oversold as most of the crime is credit card fraud although there is an astonishing amount of that Its difficult to see how our national law order systems ever get to grips with an international problem like this particular Glenny s secret here as with his earlier McMafia is to take a fragmented subject which has many real world loose ends and forge something close to a novel type structure which makes the whole story accessible Certainly the issues here are serious although it is slightly oversold as most of the crime is credit card fraud although there is an astonishing amount of that Its difficult to see how our national law order systems ever get to grips with an international problem like this particularly when different parts of one county s system did not know what the other part was doing Interesting and I will be checking those ATMs withcare from now on. I work in this field This is one of the most misleading inaccurate titles I ve read It doesn t give a good understanding of the field and skirts around some of the most important issues around See the definition of viruses, trojans and worms for just how wrong this book is It actually hurt to read at points.This is incredibly disappointing because Misha Glenny is a fantastic journalist who cut his teeth doing war journalism in the Balkans. One of those books that could have been an amazing read but wasn t The subject matter itself is definitely captivating but the writing style leaves a lot to be desired I get it that not every reader is a tech savvy nerd but it seemed occasionally that the author was under the impression that his audience consists solely of computer illiterate people and the text was dumbed down a lot Published in 2011, an action packed account of the events and characters involved in the rise, operation and decimation of several high profile online marketplaces that provided a venue for scammers, credit card fraudsters, hackers, and such cyber criminals, to build reputations, form connections, and exchange goods and services Key insights from the book Cultural, political, legal and societal differences between countries give rise, as with any criminal activity, to loopholes that lawbreaker Published in 2011, an action packed account of the events and characters involved in the rise, operation and decimation of several high profile online marketplaces that provided a venue for scammers, credit card fraudsters, hackers, and such cyber criminals, to build reputations, form connections, and exchange goods and services Key insights from the book Cultural, political, legal and societal differences between countries give rise, as with any criminal activity, to loopholes that lawbreakers exploit Certain countries adopt lax attitudes towards cyber crime, and have neither the interest nor the resources to devote towards combating it Some countries turn a blind eye to it as long as their national companies and infrastructure are not the ones being targeted In countries where corruption is common within political and law enforcement bodies, criminal activity is not only ignored but abetted Protected by powerful backers, some criminals might operate beyond the law Even if criminals are tracked down, if they are based in a country that lacks an extradition agreement with the country of their pursuers, then they have free reign, essentially, to continue their activities With luck and care, as long as circumstances remain favourable, wrong doers may conduct their business unmolested Examples of features that are country specific In an earlier era, although illegal activities were perpetrated throughout most of the world, French criminals were generally francophone, used the Minitel system rather than the Internet, and used American credit cards, not French ones The Minitel system wassecure, and had a smaller user base, making it a less attractive target Thus, cybercrime in France was initially restricted in its scope, to a relatively national level The FSB uses the SORM 2 system to acquire and store data from ISPs each time they are requested All Russian ISPs must comply with this regulation, and have to pay a fee to fund the cost of the system Encryption is illegal in Russia and possession of a file with a digital lock on it is a crime Russian cybercriminals are free to clone credit cards, hack bank accounts and distribute as much spam as they want, as long as their victims are located in western Europe and the US ISPs in the UK are required to store all data regarding computer traffic for between 6 months to 2 years, and the data is accessible by government agencies under national legislation Details such as the time and volume of traffic are monitored, although the content is not Collaboration between governmental intelligence agencies and international counterparts can be patchy The US SS and the FBI, for example, have sometimes failed to share information with each other, resulting in competition and redundancy They sometimes investigated each other s undercover agents without realising it Intelligence agencies in France, Germany, and the UK, would have to work with each or one of these organisations, instead of dealing with a single entity, resulting in extra overhead and consumption of resources Services that were popular amongst those engaged in criminal activities included hushmail, ICQ, IRC, and E Gold ICQ and IRC are dynamic unless exchanges are saved intentionally, no trace of the conversation is left Ironically, these services did not always confer as much anonymity as users believed Following the arrest of E Gold founder Douglas Jackson in 2006, for example, government agencies had full access to its records, unbeknownst to most users The Canadian webmail provider, hushmail, provided the police with log records after mounting pressure, in 2007 Safemail is an encrypted email system, owned and run b a company in Tel Aviv If an Israeli court subpoenaed certain information, then presumably it would be possible to obtain and crack the mail The underlying message is, that services are run by companies and people, and even if a system is allegedly failsafe and secure in theory, when implemented, theory is confronted by the messy squishy real world, which often offers affordances for one to pry open the cracks If, for example, law enforcement agencies infiltrate or are involved in the setting up or running of such services themselves, then hackability is practically built into the system.A common characteristic of the websites described in the book such as DarkMarket, CarderPlanet, Shadowcrew, and CardersMarket , was the provision of a platform that allowed otherwise solitary cyber criminals to form opportunistic packs Glenny describes the evolution of services developed on each site, and embellishes the narrative with colourful depictions of the individual personalities behind them For example, a highly valued service was the provision of an escrow system, similar to that offered by a bank or a marketplace such as eBay andsite administrators acted as a neutral third party, overseeing transactions between members, and thus replacing inefficient and unrealistic trust based direct interactions with an impersonal, reliable workaround Skills could be combined and traded those with a background in programming, hacking, or engineering could design and sell software and equipment, while those equipped with street smarts but lacking in that sort of technical know how could purchase or rent equipment and carry out thefts in the flesh Purveyors of stolen credit card details could sell their wares to buyers, who in turn performed the physical and risky act of withdrawing cash Sellers of skimming devices could dispatch their machines to those who lacked the ability and time to design, build, and engineer their own, but who were willing to install them on ATMs A strategy used by DarkMarket at one stage when it achieved a monopoly over the distribution of skimmers , was to sell the machines together with a PIN pad that was designed to be installed over the existing, legitimate one Encrypted PINs would be recorded on the fake pad, and the buyers of skimmers had to send the data back to the sellers for decryption The sellers would then organise and take a cut of the cash out through mules, thus creaming off illegal transactions Money mules are oft unsuspecting people who respond to advertisements offering money for little work, in which money is deposited into their bank account before being forwarded on, and the mules take a percentage as their cut.A theme common to this book and McMafia is that of the economic and social landscape in countries like Brazil, Russia, India and China, where access to relatively high levels of education are combined with rising material aspirations amidst massive wealth disparities, thus creating fertile conditions for the proliferation of cybercrime Digital interactions may be extremely challenging to track down But if they are linked to real world activities, such as packaging and mailing of skimming devices, then investigators can devise creative solutions when hunting their quarry For example, in 2008, inspections of confiscated ATM skimming machines in Turkey revealed that certain models were being made in large numbers, implying that they were made in a factory, possibly in Romania or Bulgaria The police identified the three largest shipping firms in the city of Istanbul, training the staff of courier companies to spot a skimmer usually registered as a vehicle or machine spare part , and gave them instructions on what to do if they saw one This eventually yielded the phone number and CCTV image of a suspect, and the arrest of several operators of an organised crime syndicate Striking parallels exist between the world of cyber crime and that of WWII code breaking and espionage Various players need to communicate information in secret and pit their coding skills against those of their adversaries Interactions between agents occur in physical reality, as well as electronically Thus the identities of your contacts are rarely assured spies might be posing as someone else, communications might be intercepted and read or altered, and all this second guessing and need for outwitting the opponent leads to an arms race with targets that are constantly shifting Events in the digital realm have significant consequences in reality, whether they result in the movement of sums of money or the clapping of criminals into prison the loss of soldiers or the end of a war.Minor gripes Glenny s riveting, slightly sensational style of writing makes this a highly readable page turner, on one hand, but also occasionally results in stylistic choices that detract from clarity For example, he has a tendency of introducing new characters with dramatic flourish, structuring sentences so that a vivid description precedes their identity, and phrases it in such a way that the reader, coming across a name for the first time, hesitates for a moment, wondering if this character had already been mentioned before One gets the distinct impression that Glenny has polished the technique of creating a snazzy sound bite by writing for magazines and newspapers by creating a little puzzle, he engages the reader and sets the mental cogs moving While that works fine for articles, which are relatively short, it carries less well into a book of over two hundred pages that is stuffed with dozens of characters, many of whom have screen names as well as complex and less than transparent real life identities In addition, when referring to individuals, he sometimes switches between first and last names If you re reading DarkMarket for the first time and are serious about keeping track of who s who, I d advise keeping a list of characters as they appear There was exactly one sentence in the book that I disagreed with and found absurd With further research, this could mean that it will be possible to identify hacker personality types among children who are still at school I can just imagine kids being administered with a hackers version of Myers Briggs, and told that they belong to the hacker or the leave untouched er category As with MBTI, all I can say is, a fat lot of good that would do In summary Enlightening, engaging, and extremely enjoyable Does not go deeply into technical detail, provides basic descriptions of technology to facilitate understanding Focused on the narrative and historical events, clearly the culmination of much research, interviewing, and sorting and organisation of facts and documents This review has been hidden because it contains spoilers To view it, click here Where is Lord Cyric This extraordinarily powerful book demonstrates how utterly we lack the shared supranational tools needed to fight cybercrime Essential reading Roberto Saviano, author of Gommorah The benefits of living in a digital, globalized society are enormous so too are the dangers The world has become a law enforcer s nightmare and every criminal s dream We bank online shop online date, learn, work and live online But have the institutions that keep us safe on the streets learned to protect us in the burgeoning digital world Have we become complacent about our personal security sharing our thoughts, beliefs and the details of our daily lives with anyone who might care to relieve us of them In this fascinating and compelling book, Misha Glenny, author of the international best seller McMafia, explores the three fundamental threats facing us in the twenty first century cybercrime, cyberwarfare and cyberindustrial espionage Governments and the private sector are losing billions of dollars each year fighting an ever morphing, often invisible and often supersmart new breed of criminal the hacker Glenny has traveled and trawled the world By exploring the rise and fall of the criminal website DarkMarket he has uncovered the most vivid, alarming and illuminating stories Whether JiLsi or Matrix, Iceman, Master Splynter or Lord Cyric whether Detective Sergeant Chris Dawson in Scunthorpe, England, or Agent Keith Mularski in Pittsburgh, Pennsylvania, Glenny has tracked down and interviewed all the players the criminals, the geeks, the police, the security experts and the victims and he places everyone and everything in a rich brew of politics, economics and history The result is simply unputdownable DarkMarket is authoritative and completely engrossing It s a must read for everyone who uses a computer the essential crime book for our times This was an easy read which was actually a disappointment as I was expecting something a bitserious and less like a novel It was a little dumbed down which I think is unnecessary with the younger audience who surely know what the internet is but need to understandabout the dangers of using your credit card There were a lot of characters and I occasionally got lost between remembering thier real name and thier virtual identity There were a few loose ends but I can live with that.I This was an easy read which was actually a disappointment as I was expecting something a bitserious and less like a novel It was a little dumbed down which I think is unnecessary with the younger audience who surely know what the internet is but need to understandabout the dangers of using your credit card There were a lot of characters and I occasionally got lost between remembering thier real name and thier virtual identity There were a few loose ends but I can live with that.I think the thing that bothered me most was the fact that everything was based on 200 hours interviews Where was the factual corroboration Maybe it was there or maybe it was just cross checking the stories Anyway, it left me a little suspicious of the veracity of the whole story, especially of the Turkish and Slavic skimmers I think that the book would have also benefited from evendetail and examples of how you can loose your credit card data to the bad guys Cringe worthy.While I had a few problems with this book, my primary one was undoubtedly the writing style, which seemed too colloquial, simplistic and almost condescending to any adult See, for example, how the footnote on page 34 ends an explanation on the differences between viruses, worms and trojans with But, basically, they all do bad things to your computer.

Leave a Reply

Your email address will not be published. Required fields are marked *