SlideShare a Scribd company logo
1 of 15
SILK ROAD AND ONLINE
NARCOTIC DISTRIBUTION
FOR THE FULL FREE VIDEO
COURSE PLEASE VISIT
WWW.CONCISE-COURSES.COM/TRAINING/
Valid for Continuing Education!
concise
cybersecurity
WHAT WAS THE SILK ROAD?
The Silk Road was an online ‘black market’ and the first modern
‘Darknet Market’, best known as a platform for selling illegal
drugs.
As part of the dark web, it was operated as a TOR hidden
service, such that online users were able to browse it
anonymously and securely without potential traffic monitoring.
The website was launched in February 2011 and closed in
October 2013 by the FBI. At that time the FBI also arrested Ross
William Ulbricht under charges of being the site’s
pseudonymous founder ‘Dread Pirate Roberts’.
In summary, the Silk Road was the Internet’s (dark web’s) largest
drug-dealing website.
concise
cybersecurity
SILK ROAD EARNINGS AT ITS’ PEAK
In two years the website facilitated
around USD 1.2 billion in sales, the vast
majority of it illegal drugs, and the
founder (more on him later) took USD
79.8 million in commissions on those
sales (in Bit Coin ‘btc’ currency).
The site at its’ peak had 957,079 user
accounts: at least 30 per cent of those
users were in the US, and the next most
popular countries were Britain, Australia
and then Germany.
WHAT WAS THE PROCESS?
The process, or ‘business model’ for the Silk Road, was
reliant on a usable interface, electronic currencies and
anonymous networks to access a drug market located in
the ‘Deep Web’.
The ‘Deep Web’ has secure and confidential
communication lines by encryption of computer IP
addresses using TOR anonymizing software or web proxy
to the TOR network (http://TOR2web. org).
Most users use ‘PGP4Win Gpg4win’ a system which
enables the secure transmission of emails and files with
the help of encryption and digital signatures.
TOR EXPLAINED
TOR was at the center of the Silk
Road enterprise, so here’s a quick
overview of TOR:
▸ First the US Naval Research
Laboratory, then the EFF and now
the TOR Project (501c3 non-profit)
TOR EXPLAINED
“…..TOR is free software and
an open network that helps you
defend against a form of
network surveillance that
threatens personal freedom
and privacy, confidential
business activities and
relationships, and state security
known as traffic analysis…..”
TOR EXPLAINED
▸ Access normal Internet sites
anonymously, and TOR hidden
services.
▸ Locally run SOCKS proxy that
connects to the TOR network.
TOR KEY FUNCTIONS…
(Critical to Silk Road Vendors/ Users)
- Layered Encryption

- Bi-Directional Tunnels

- Has Directory Servers

- Mostly Focused on ‘Out Proxying’
TRANSACTIONS ON THE DARK WEB
Buyers and vendors use ‘Bitcoins’ (btc) to conduct all transactions,
which is a non-government controlled anonymous and
untraceable crypto-currency, used as peer-to-peer currency and
indexed to the US dollar to prevent excessive inflation or
deflation.
For users transacting on ‘Deep Web’ sites, ‘Electrum’ is an
anonymous TOR server used to access a virtual wallet containing
btc’s and ensures payment anonymity via online verifiable
transactions occurring without a central third party.
btc can be bought at many online exchanges such as the ‘Tokyo
Mt.Gox’ and ‘Bitstamp’ and is indexed to the USD
TRANSACTIONS ON THE DARK WEB
Buyers and vendors use ‘Bitcoins’ (btc) to conduct all transactions,
which is a non-government controlled anonymous and
untraceable crypto-currency, used as peer-to-peer currency and
indexed to the US dollar to prevent excessive inflation or
deflation.
For users transacting on ‘Deep Web’ sites, ‘Electrum’ is an
anonymous TOR server used to access a virtual wallet containing
btc’s and ensures payment anonymity via online verifiable
transactions occurring without a central third party.
btc can be bought at many online exchanges such as the ‘Tokyo
Mt.Gox’ and ‘Bitstamp’ and is indexed to the USD
concise
cybersecurity
VENDOR/ CLIENT TRANSACTION WITHIN THE
DEEP WEB & THE SILK ROAD
Vendor authenticity and member opportunity to
commence vending on the site are controlled through
the payment of a refundable bond (which was
approximately around USD 500), and by the
auctioning of new vendor accounts to the highest
bidders.
Commission fees range between 3 and 8.5 precent of the sales price.
Comprehensive measurement analysis and site monitoring for a
period of eight months during late 2011 and 2012 estimated total
vendor revenue from public listings, as slightly over USD 1.2 million
per month; with approximately USD 92,000 per month in
commissions for the ‘Silk Road’ operators
Transaction anonymity is optimized by use of ‘tumbler’ services of
dummy and single use intermediaries between buyer and vendor.
The ‘escrow’ system is used that releases payment to vendors on
customer receipt of orders.
VENDOR/ CLIENT TRANSACTION WITHIN THE
DEEP WEB & THE SILK ROAD
FOR THE FULL FREE VIDEO
COURSE PLEASE VISIT
WWW.CONCISE-COURSES.COM/TRAINING/
Valid for Continuing Education!

More Related Content

What's hot (20)

The dark web
The dark webThe dark web
The dark web
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Deep and dark web
Deep and dark webDeep and dark web
Deep and dark web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Dark wed
Dark wedDark wed
Dark wed
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Deep web
Deep webDeep web
Deep web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Darkweb
DarkwebDarkweb
Darkweb
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Darknet
DarknetDarknet
Darknet
 

Similar to Silk Road & Online Narcotic Distribution

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeOllieShoresna
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Dark Web Sites and the Silk Road Legacy.pdf
Dark Web Sites and the Silk Road Legacy.pdfDark Web Sites and the Silk Road Legacy.pdf
Dark Web Sites and the Silk Road Legacy.pdfkabirhasan11
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
BITCOIN LIGHTNING NETWORK: CAN IT PROVIDE PRIVACY FOR THE MASSES?
BITCOIN LIGHTNING NETWORK: CAN IT PROVIDE PRIVACY FOR THE MASSES?BITCOIN LIGHTNING NETWORK: CAN IT PROVIDE PRIVACY FOR THE MASSES?
BITCOIN LIGHTNING NETWORK: CAN IT PROVIDE PRIVACY FOR THE MASSES?Steven Rhyner
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
Evolution of Dark Net Ecosystem
Evolution of Dark Net EcosystemEvolution of Dark Net Ecosystem
Evolution of Dark Net EcosystemFilipp Paster
 

Similar to Silk Road & Online Narcotic Distribution (20)

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Dark Web
Dark WebDark Web
Dark Web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Dark Web Sites and the Silk Road Legacy.pdf
Dark Web Sites and the Silk Road Legacy.pdfDark Web Sites and the Silk Road Legacy.pdf
Dark Web Sites and the Silk Road Legacy.pdf
 
Dw communication
Dw communicationDw communication
Dw communication
 
Dark Web.pdf
Dark Web.pdfDark Web.pdf
Dark Web.pdf
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Christin-WWW13.pdf
Christin-WWW13.pdfChristin-WWW13.pdf
Christin-WWW13.pdf
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
BITCOIN LIGHTNING NETWORK: CAN IT PROVIDE PRIVACY FOR THE MASSES?
BITCOIN LIGHTNING NETWORK: CAN IT PROVIDE PRIVACY FOR THE MASSES?BITCOIN LIGHTNING NETWORK: CAN IT PROVIDE PRIVACY FOR THE MASSES?
BITCOIN LIGHTNING NETWORK: CAN IT PROVIDE PRIVACY FOR THE MASSES?
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Darknet
DarknetDarknet
Darknet
 
.Onion
.Onion.Onion
.Onion
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Evolution of Dark Net Ecosystem
Evolution of Dark Net EcosystemEvolution of Dark Net Ecosystem
Evolution of Dark Net Ecosystem
 

More from London School of Cyber Security

How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?London School of Cyber Security
 
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsChanging the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsLondon School of Cyber Security
 

More from London School of Cyber Security (20)

The Panama Papers Hack
The Panama Papers HackThe Panama Papers Hack
The Panama Papers Hack
 
ISIS and Cyber Terrorism
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber Terrorism
 
Ashely Madison Hack
Ashely Madison HackAshely Madison Hack
Ashely Madison Hack
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and TrainingHow To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
What Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSSWhat Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSS
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Crowdsourced Vulnerability Testing
Crowdsourced Vulnerability TestingCrowdsourced Vulnerability Testing
Crowdsourced Vulnerability Testing
 
Memory forensics and incident response
Memory forensics and incident responseMemory forensics and incident response
Memory forensics and incident response
 
Gauntlt Rugged By Example
Gauntlt Rugged By ExampleGauntlt Rugged By Example
Gauntlt Rugged By Example
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?
 
Sploitego
SploitegoSploitego
Sploitego
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Blind XSS
Blind XSSBlind XSS
Blind XSS
 
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsChanging the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
 
Sploitego
SploitegoSploitego
Sploitego
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

Silk Road & Online Narcotic Distribution

  • 1. SILK ROAD AND ONLINE NARCOTIC DISTRIBUTION
  • 2. FOR THE FULL FREE VIDEO COURSE PLEASE VISIT WWW.CONCISE-COURSES.COM/TRAINING/ Valid for Continuing Education!
  • 4. WHAT WAS THE SILK ROAD? The Silk Road was an online ‘black market’ and the first modern ‘Darknet Market’, best known as a platform for selling illegal drugs. As part of the dark web, it was operated as a TOR hidden service, such that online users were able to browse it anonymously and securely without potential traffic monitoring. The website was launched in February 2011 and closed in October 2013 by the FBI. At that time the FBI also arrested Ross William Ulbricht under charges of being the site’s pseudonymous founder ‘Dread Pirate Roberts’. In summary, the Silk Road was the Internet’s (dark web’s) largest drug-dealing website. concise cybersecurity
  • 5. SILK ROAD EARNINGS AT ITS’ PEAK In two years the website facilitated around USD 1.2 billion in sales, the vast majority of it illegal drugs, and the founder (more on him later) took USD 79.8 million in commissions on those sales (in Bit Coin ‘btc’ currency). The site at its’ peak had 957,079 user accounts: at least 30 per cent of those users were in the US, and the next most popular countries were Britain, Australia and then Germany.
  • 6. WHAT WAS THE PROCESS? The process, or ‘business model’ for the Silk Road, was reliant on a usable interface, electronic currencies and anonymous networks to access a drug market located in the ‘Deep Web’. The ‘Deep Web’ has secure and confidential communication lines by encryption of computer IP addresses using TOR anonymizing software or web proxy to the TOR network (http://TOR2web. org). Most users use ‘PGP4Win Gpg4win’ a system which enables the secure transmission of emails and files with the help of encryption and digital signatures.
  • 7. TOR EXPLAINED TOR was at the center of the Silk Road enterprise, so here’s a quick overview of TOR: ▸ First the US Naval Research Laboratory, then the EFF and now the TOR Project (501c3 non-profit)
  • 8. TOR EXPLAINED “…..TOR is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis…..”
  • 9. TOR EXPLAINED ▸ Access normal Internet sites anonymously, and TOR hidden services. ▸ Locally run SOCKS proxy that connects to the TOR network.
  • 10. TOR KEY FUNCTIONS… (Critical to Silk Road Vendors/ Users) - Layered Encryption
 - Bi-Directional Tunnels
 - Has Directory Servers
 - Mostly Focused on ‘Out Proxying’
  • 11. TRANSACTIONS ON THE DARK WEB Buyers and vendors use ‘Bitcoins’ (btc) to conduct all transactions, which is a non-government controlled anonymous and untraceable crypto-currency, used as peer-to-peer currency and indexed to the US dollar to prevent excessive inflation or deflation. For users transacting on ‘Deep Web’ sites, ‘Electrum’ is an anonymous TOR server used to access a virtual wallet containing btc’s and ensures payment anonymity via online verifiable transactions occurring without a central third party. btc can be bought at many online exchanges such as the ‘Tokyo Mt.Gox’ and ‘Bitstamp’ and is indexed to the USD
  • 12. TRANSACTIONS ON THE DARK WEB Buyers and vendors use ‘Bitcoins’ (btc) to conduct all transactions, which is a non-government controlled anonymous and untraceable crypto-currency, used as peer-to-peer currency and indexed to the US dollar to prevent excessive inflation or deflation. For users transacting on ‘Deep Web’ sites, ‘Electrum’ is an anonymous TOR server used to access a virtual wallet containing btc’s and ensures payment anonymity via online verifiable transactions occurring without a central third party. btc can be bought at many online exchanges such as the ‘Tokyo Mt.Gox’ and ‘Bitstamp’ and is indexed to the USD concise cybersecurity
  • 13. VENDOR/ CLIENT TRANSACTION WITHIN THE DEEP WEB & THE SILK ROAD Vendor authenticity and member opportunity to commence vending on the site are controlled through the payment of a refundable bond (which was approximately around USD 500), and by the auctioning of new vendor accounts to the highest bidders.
  • 14. Commission fees range between 3 and 8.5 precent of the sales price. Comprehensive measurement analysis and site monitoring for a period of eight months during late 2011 and 2012 estimated total vendor revenue from public listings, as slightly over USD 1.2 million per month; with approximately USD 92,000 per month in commissions for the ‘Silk Road’ operators Transaction anonymity is optimized by use of ‘tumbler’ services of dummy and single use intermediaries between buyer and vendor. The ‘escrow’ system is used that releases payment to vendors on customer receipt of orders. VENDOR/ CLIENT TRANSACTION WITHIN THE DEEP WEB & THE SILK ROAD
  • 15. FOR THE FULL FREE VIDEO COURSE PLEASE VISIT WWW.CONCISE-COURSES.COM/TRAINING/ Valid for Continuing Education!