Did Munich Gunman Get His Weapon On The Dark Web?

According to several German news outlets, the bought the 9mm Glock 17 used to kill nine innocents in Munich was a reactivated theatrical prop.

The gunman purchased the weapon on the Dark Web, according to the president of the Bavarian Office of Criminal Investigation (LKA), Robert Heimberger. This means that someone has converted the weapon from non-functioning to being a killing machine. Who and where? It is still a mystery, the German authorities are still investigating the case, the unique certainty is that the Glock carries a certification mark from Slovakia.

“[it is ]a parallel world to the network from Facebook, Amazon, and other news pages, which most users are familiar with.” are the words used by Heimberger to explain the dark web.

The president of the LKA highlighted that the dark web is a hidden place on the web where it is easy to find criminals offering weapons, drugs, and child pornography.

The investigators have found 57 shell casings belonging to the Munich gunman‘s 9mm Glock 17.  A police officer fired at David in a parking deck but the shot missed. The police excluded the presence of other shooters in the Munich attack.

David was obsessed by mass shooting spree, he was inspired by cases like Anders Breivik ‘massacre and by the Winnenden school shooting attack in 2009. David had been in psychological treatment for “social phobia” and depression last year.

But it is really so easy to find weapons on the dark web?

In May 2016, producers from the German broadcaster ARD conducted an interesting experiment to demonstrate if it is really so simple to buy goods on the dark web. They tried to buy an AK-47 rifle, paying d paid $800 in bitcoin.

The German journalists conducted an investigation for a show titled “Fear of terror, how vulnerable is Germany” with the intent to understand how criminals could access weapons offered for sale in the black markets.

The German channel ARD documented the threat posed by terrorism trying to explain how terrorists could exploit the technology for its activities.

“There is this experiment at the beginning of the broadcast. Beckmann Ordered via middleman a Kalashnikov in the darknet. At the end comes out: $ 800 paid – and get nothing.” reported the German site Focus.

“Because, as a customs expert, it is not so easy to procure weapons. In this case the attempt to buy a weapon failed and it is not clear if the package had been intercepted by law enforcement or it, the seller, was a scammer.

Such problems are not rare in the black marketplaces, as reported by MotherBoard.

“One impetus for that is the heavy presence of scammers, who create fake accounts to dupe gullible gun hunters out of their money.” wrote Cox.

“I’m just kinda addicted to the scamming part. It’s too easy,” one scammer told Motherboard in an email chat. The scammer used to operate under the handle “Bartsmit” on AlphaBay, a popular market that sells stolen data, weapons, and drugs, among other goods. Today the scammer is still ripping people off, but under a different identity.”

Due to these difficulties, several black markets have stopped stocking weapons altogether.

Security Affairs

 

« Candidate Trump Supports Russian ‘cyber warfare’ Against US
Defensive Measures: Estonia Will Store Citizens’ Data In The UK »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Brinqa

Brinqa

Brinqa is a leading provider of unified risk management and security analytics.to manage IT governance and technology risk.

Pindrop Security

Pindrop Security

Pindrop solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

Lynx

Lynx

Lynx provides high added value services in the area of information systems security and ICT infrastructure building.

Corvus Insurance

Corvus Insurance

Corvus' mission is to create a safer, more productive world through technology-enabled commercial insurance.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

RhodeCode

RhodeCode

RhodeCode is an open source repository management platform. It provides unified security and team collaboration across Git, Subversion, and Mercurial.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.