Did Munich Gunman Get His Weapon On The Dark Web?

According to several German news outlets, the bought the 9mm Glock 17 used to kill nine innocents in Munich was a reactivated theatrical prop.

The gunman purchased the weapon on the Dark Web, according to the president of the Bavarian Office of Criminal Investigation (LKA), Robert Heimberger. This means that someone has converted the weapon from non-functioning to being a killing machine. Who and where? It is still a mystery, the German authorities are still investigating the case, the unique certainty is that the Glock carries a certification mark from Slovakia.

“[it is ]a parallel world to the network from Facebook, Amazon, and other news pages, which most users are familiar with.” are the words used by Heimberger to explain the dark web.

The president of the LKA highlighted that the dark web is a hidden place on the web where it is easy to find criminals offering weapons, drugs, and child pornography.

The investigators have found 57 shell casings belonging to the Munich gunman‘s 9mm Glock 17.  A police officer fired at David in a parking deck but the shot missed. The police excluded the presence of other shooters in the Munich attack.

David was obsessed by mass shooting spree, he was inspired by cases like Anders Breivik ‘massacre and by the Winnenden school shooting attack in 2009. David had been in psychological treatment for “social phobia” and depression last year.

But it is really so easy to find weapons on the dark web?

In May 2016, producers from the German broadcaster ARD conducted an interesting experiment to demonstrate if it is really so simple to buy goods on the dark web. They tried to buy an AK-47 rifle, paying d paid $800 in bitcoin.

The German journalists conducted an investigation for a show titled “Fear of terror, how vulnerable is Germany” with the intent to understand how criminals could access weapons offered for sale in the black markets.

The German channel ARD documented the threat posed by terrorism trying to explain how terrorists could exploit the technology for its activities.

“There is this experiment at the beginning of the broadcast. Beckmann Ordered via middleman a Kalashnikov in the darknet. At the end comes out: $ 800 paid – and get nothing.” reported the German site Focus.

“Because, as a customs expert, it is not so easy to procure weapons. In this case the attempt to buy a weapon failed and it is not clear if the package had been intercepted by law enforcement or it, the seller, was a scammer.

Such problems are not rare in the black marketplaces, as reported by MotherBoard.

“One impetus for that is the heavy presence of scammers, who create fake accounts to dupe gullible gun hunters out of their money.” wrote Cox.

“I’m just kinda addicted to the scamming part. It’s too easy,” one scammer told Motherboard in an email chat. The scammer used to operate under the handle “Bartsmit” on AlphaBay, a popular market that sells stolen data, weapons, and drugs, among other goods. Today the scammer is still ripping people off, but under a different identity.”

Due to these difficulties, several black markets have stopped stocking weapons altogether.

Security Affairs

 

« Candidate Trump Supports Russian ‘cyber warfare’ Against US
Defensive Measures: Estonia Will Store Citizens’ Data In The UK »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

International Association of Security Awareness Professionals (IASAP)

International Association of Security Awareness Professionals (IASAP)

IASAP provides a members-only virtual sharing platform where security awareness professionals engage in a lively, year-round exchange of information and ideas.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

Guidepost Solutions

Guidepost Solutions

Guidepost Solutions are a diverse, global team of investigators, experienced security and technology consultants, and compliance and monitoring experts.

Mosyle

Mosyle

Businesses and educational institutions rely on Mosyle to manage and secure their Apple devices and networks.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

Accompio

Accompio

Accompio offer comprehensive support in the digitalisation of your business processes.