Canadian Police Uncover Dark Net Gun Market

Most police forces around the world have not really tackled the crime of the Dark Net, but the Canadian Police are hoping to continue investigations with guns on the Darknet.

Criminals are using the darker corners of the Internet, hard-to-track digital currency and creative shipping techniques to sell illicit guns to Canadians, the RCMP, (Royal Canadian Mounted Police), warns.

The message comes as thousands of young people across North America demand an end to gun violence, and the Trudeau government moves to tighten laws on the licensing, sale and tracing of firearms.

The emergence of the darknet, the hidden depths of the Internet accessible only through tailored software, is posing new challenges for authorities trying to tackle gun trafficking, said Rob O’Reilly, interim director of firearms regulatory services at the RCMP.

While police have shut down rogue online markets like Silk Road in recent years, others quickly pop up in the deepest realms of cyberspace, O’Reilly recently told a national symposium on gangs and guns.

He pointed to the Berlusconi online market, which at last count had 234 listings for weapons including AR-15 rifles, AK-47s, various handguns and countless rounds of ammunition.

The firearms are sold alongside opioids, heroin, cocaine, malware, stolen data, fraud tools, ransomware, pilfered credit cards and even depleted uranium, radioactive Polonium-210 and deadly poisons like ricin.

O’Reilly displayed a photo of an AR-15 magazine and ammunition shipped from a vendor in Montana to an Ontario buyer who had no firearms licence.

The seller made a number of gun-related sales via the darknet before being arrested, each time wrapping the products in plastic and then in Mylar bags before finally disguising them in food packaging.

“Darknet vendors resort to very ingenious means to ship firearms and related components,” O’Reilly said. “In the darknet community, this is known as stealth shipping, and the intent is to disguise or hide the actual contents from law enforcement and border services.”

Pistols have been sent in gaming consoles, computer hard drives, hairdryers and blocks of chocolate, he said. “We’ve even seen rifles shipped behind flat-screen televisions.”

The digital revolution has spawned tools that allow buyers to visit sites like Berlusconi anonymously and make purchases without leaving telltale signs.

The Onion Router network, known as Tor, is often used by government agencies, activists, journalists and whistleblowers who may want to shield their online activities, O’Reilly noted. However, it can also be employed by people with less noble intentions, such as illicit firearms buyers.

Similarly, crypto-currencies like Bitcoin, the most accepted form of currency on the darknet markets, are used to obscure the transaction details from authorities.

“Such currencies present a real challenge for law enforcement because it doesn’t physically reside somewhere, making it hard to trace without special, very expensive software and highly trained personnel to do the work,” O’Reilly said.

Firearms and related materials are more readily available than ever before due to access to global markets through the Internet, he added. Different international laws mean some firearms components and accessories can be illegal in one country but completely legal in another.

“This challenge has existed for some time in regards to our neighbours to the south, however it is compounded in a borderless online market that is truly international,” O’Reilly said. “Once imported to Canada, these components can be easily finished and assembled through online tutorials, the results of which are often completely untraceable firearms, sometimes known as ghost guns.”

At the same time, gun sales are occurring through more visible online vendors as well as internet forums.

Police training needs must be “continually updated” to reflect the rapidly evolving online environment, O’Reilly said. “Conducting online investigations, whether on the darknet or on the surface web, requires a very specific skill set.”

Globe and Mail:

You Might Also Read:

Cybercrime in Canada:

Dark Web Fraud Undetectable By Police:

« What Does GDPR Mean For the Retail Industry?
Russian Bots Promote Fake News »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

TheGreenBow

TheGreenBow

TheGreenBow is a trusted VPN software company. We help organizations and individuals become cyber-responsible. For this, we design and develop reliable and easy-to-use solutions.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

Applied Insight

Applied Insight

Applied Insight work closely with government agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest cloud, data and cyber capabilities.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.