Did Munich Gunman Get His Weapon On The Dark Web?

According to several German news outlets, the bought the 9mm Glock 17 used to kill nine innocents in Munich was a reactivated theatrical prop.

The gunman purchased the weapon on the Dark Web, according to the president of the Bavarian Office of Criminal Investigation (LKA), Robert Heimberger. This means that someone has converted the weapon from non-functioning to being a killing machine. Who and where? It is still a mystery, the German authorities are still investigating the case, the unique certainty is that the Glock carries a certification mark from Slovakia.

“[it is ]a parallel world to the network from Facebook, Amazon, and other news pages, which most users are familiar with.” are the words used by Heimberger to explain the dark web.

The president of the LKA highlighted that the dark web is a hidden place on the web where it is easy to find criminals offering weapons, drugs, and child pornography.

The investigators have found 57 shell casings belonging to the Munich gunman‘s 9mm Glock 17.  A police officer fired at David in a parking deck but the shot missed. The police excluded the presence of other shooters in the Munich attack.

David was obsessed by mass shooting spree, he was inspired by cases like Anders Breivik ‘massacre and by the Winnenden school shooting attack in 2009. David had been in psychological treatment for “social phobia” and depression last year.

But it is really so easy to find weapons on the dark web?

In May 2016, producers from the German broadcaster ARD conducted an interesting experiment to demonstrate if it is really so simple to buy goods on the dark web. They tried to buy an AK-47 rifle, paying d paid $800 in bitcoin.

The German journalists conducted an investigation for a show titled “Fear of terror, how vulnerable is Germany” with the intent to understand how criminals could access weapons offered for sale in the black markets.

The German channel ARD documented the threat posed by terrorism trying to explain how terrorists could exploit the technology for its activities.

“There is this experiment at the beginning of the broadcast. Beckmann Ordered via middleman a Kalashnikov in the darknet. At the end comes out: $ 800 paid – and get nothing.” reported the German site Focus.

“Because, as a customs expert, it is not so easy to procure weapons. In this case the attempt to buy a weapon failed and it is not clear if the package had been intercepted by law enforcement or it, the seller, was a scammer.

Such problems are not rare in the black marketplaces, as reported by MotherBoard.

“One impetus for that is the heavy presence of scammers, who create fake accounts to dupe gullible gun hunters out of their money.” wrote Cox.

“I’m just kinda addicted to the scamming part. It’s too easy,” one scammer told Motherboard in an email chat. The scammer used to operate under the handle “Bartsmit” on AlphaBay, a popular market that sells stolen data, weapons, and drugs, among other goods. Today the scammer is still ripping people off, but under a different identity.”

Due to these difficulties, several black markets have stopped stocking weapons altogether.

Security Affairs

 

« Candidate Trump Supports Russian ‘cyber warfare’ Against US
Defensive Measures: Estonia Will Store Citizens’ Data In The UK »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

Cyber Wales

Cyber Wales

Cyber Wales provides a focus and forum for everyone in the industry, helping businesses come together and collaborate both within Wales and internationally.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

PKF Infuse

PKF Infuse

PKF Infuse provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.

Tek Yantra

Tek Yantra

Empower your business with our adept IT specialists, delivering rapid, scalable, and resilient cloud-based solutions designed to spur innovation and elevate productivity.