The Silk Road Case

Superior Essays
Short Write up on Silk Road

Silk Road was an online black market for selling and buying of illegal products. They used to trade drugs and transact through bitcoin currency. Bitcoin is a form of digital currency which uses encryption and the transactions are undetectable. There was involvement of large transactions of money and the unfair means of selling and buying of drugs and other banned substances were done. This platform provided a safe house for criminals to trade drugs.
Silk Road was an effective means for criminals to go undetected by the law enforcement and federal agencies. Within a short span of time, they were operating worldwide and they had spread its business operations. The local chemists and drugs operatives were cooperating
…show more content…
Interaction (00) All the users used the dark net for dealing drugs and making transactions
(01) Everything was available on the dark web and transacted through bitcoins Beginners made good money and as it was an illegal means of trade sooner or later, doomsday nearing with the implication of one small mistake. Use of technology to nab the criminals
1. Association (02) The approach was common and the business channel was common too on the Silk Road market The business transactions were only of one type and the chances of getting cheated or crossed were high. Risk was a factor to be considered. Inviting criminals to make mistakes
2. Subsistence (12) United workforce and a common platform to trade drugs One person gets caught and the entire market or team crashes. Highly risky. Continuous supervision and control
3. Territoriality (13) The territories and associations were clear No formal rules in the criminal world. Create opportunities to nab criminals
4. Temporality (34) Common ground for criminals to trade, no frequent changes Money is the main concern. Nothing else did matter as long as the dealings were done covertly. Active Monitoring and
…show more content…
Exploitation (18) The drug makers or chemists felt exploited by the top management trying to meet deadlines and maintain secrecy Pressure on the chemists and drug dealers to meet the supply and chain demands and maintain high levels of secrecy.
Principles and lessons for preventing Cyber crimes and Money laundering
The principles and lessons for preventing Cyber crimes and Money laundering are-
1. Identify and stop the source of funds for money laundering activities.
2. International cooperation among nations to curb cyber terrorism.
3. Empower the law enforcement agencies to prevent cyber crimes and money laundering.
4. Continuous monitoring and supervision of illegal activities and the use of dark web.
5. Swift action teams and experts in the cyber crime investigation teams would help resolve such cases.
6. Lessons learned from previous similar cases should be documented and used to ensure the right actions to be taken in the future.
7. Creating effective cyber security policies that would ensure the prevention of cyber crimes and money laundering activities.
The Policy suggestions the analysis suggests are-
1. Use of state of the art technology to ensure cyber

Related Documents

  • Superior Essays

    Crime Technology

    • 1448 Words
    • 6 Pages

    New technologies have given criminals new ways to commit crimes. One can now sit at a computer and break laws in countries on the other side of the world. The evolution of cybercrimes has taken the world by storm and put law enforcement agencies all over the world on their heels. Cyber extortion and trafficking are the main ways criminal organizations break the law. A person can purchase illegal drugs, weapons, or humans with the click of a button.…

    • 1448 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    The capturing and deterrence of criminal activity towards the public have helped keep the public and our country safe. The storage of information of internet usage from CSP’s helps track criminals and terrorist here in the US by allowing government agencies to retrace web page views of sites that enable criminals to learn how or enable to carry out criminal acts in the US. When criminals steal credit card or financial information agencies can track the whereabouts of these criminals and provides a starting point to conduct their investigation to pursue these criminals no matter where they are in the world. The usage of GPS has enabled exact locations of criminal activities or whereabouts of criminals to capture or convict criminals. The loss of privacy has provided many companies to help the public keep their PII safe such as Lifelock a company invented by a former FBI identity theft agent.…

    • 2226 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Criminals buy these weapons from the streets and black-market dealers; they use them to commit crimes. As such, it is clear that the legal aspect of firearms availability is quite influential in facilitating the availability of guns for criminal purposes (Lott 23). Even when law-abiding citizens do not intend to commit a crime, the buglers who steal the weapon have malicious intentions. As such, the legal system acts as a gateway for criminals to access firearms. Gun control laws that intend to limit the number of guns available in the public domain have a significant opportunity to reduce the number of these weapons available to…

    • 1454 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    The website contained detailed information about government departments, circulars, reports, and similar other important data. The hackers did not manage to destroy all the information on the website, only the home page was damaged, and the website was restored. 9) Skimming Skimming is a cybercrime where scammers steal your credit / debit card details by fitting a skimmer device to an ATM machine. The device reads and records the card details from the magnetic strip on the card, resulting in misuse and frauds. The information from the strip is ‘skimmed’ to create a fake or cloned card with the stolen details.…

    • 1304 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The computer forensic response team responsibility is to perform crime investigations by using evidence from digital data to find who was the responsible for that particular crime. To protect a corporate from any network attack, it is critical that an organization should have an Incident Response team, who can help monitoring and detecting the organization network security events. By using an IDS/IPS and network monitoring tools, the Incident Response team monitor and detect malicious attacks and escalate the attacks to higher management…

    • 1078 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    It is sad because someone will profit off of another loses. Identity theft is where the illegal use of someone else 's personal information especially in order to obtain money or credit (Johnson, 2014). When it comes to identity theft there are all types of ways to commit identity theft. This paper will be an overview over all aspects of identity theft. After reviewing…

    • 1648 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    People should themselves beware and should take steps to ensure that their personal information is not used in a way which might leak the same, and facilitate it for those cyber criminals to use up this personal information to get their way (profit from someone else’s works). MEASURES TO DEAL WITH CYBER CRIMES  Role of INTERPOL INTERPOL has committed itself to fight against Cyber Crimes. Most of these crimes are Trans-National in character, which is the reason why INTERPOL can deal with them more effectively and is capable of investigating crimes like these on a Corporate Level. INTERPOL has uniquely advanced itself to the fight against cybercrimes on a global level by its proactive research into these emerging crimes. INTERPOL’s main initiatives on Cyber Crimes focus on: • Digital Forensics • National Cyber Reviews • Research and…

    • 1817 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Doing so, may give criminal a warning to destroy any evidence associated with the crime. (Suspicious Activity Reporting—Overview). Money laundering is the process of legitimizing ill-gotten or illegal revenues by creating a paper trail that makes the currency appear as if it was the result of a legitimate business. Common money laundering schemes consist of opening cash businesses such as laundromats or restaurants. The owners of these illegitimate businesses then report their criminal profits as legitimate earnings of the business.…

    • 968 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Hackers uses this collecteddata to find a way which will help them executing an attack on the Operating System, Installed Software, Open Ports, IP Addresses or user accounts. Hacker uses this accumulated informationfor gaining access to the system which is the third phase of ethical hacking. They do tedious amount of work to break the passwords and often utilizes tools like legion. Only gaining access to the system isn 't everything, but to maintain their access in it, they develops a different system paththrough which he can intrude the system as an anonymous. Thisanonymous hacker does its best toremove all the evidences of the system thats being hack, defy the intrusion detection alarms and thus avoid any form of legal actions against him.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Dangers Of Cybercrime

    • 997 Words
    • 4 Pages

    This attack is much more improved and more lethal than the WannaCry attack that hit many computers globally in May. Both ransomware attacks used the same National Security Agency hacking tool, Eternal Blue. The hackers from foreign countries and the United States can easily get away with cyberattacks and online crimes due to the rare likelihood of the criminals getting caught. If someone decides to rob a…

    • 997 Words
    • 4 Pages
    Improved Essays