Latest news with #Tor


Time of India
3 days ago
- Time of India
Nagpur Police Launch Aggressive Crackdown On Dark Web And Social Media Drug Trade
1 2 3 Nagpur: The dark web, accessible only through anonymising tools like Tor, has emerged as a significant challenge for Nagpur's law enforcement. They are tackling the high-profile narcotics trade, which increasingly uses hi-tech tools for networking, supply, and communication to avoid police dragnets. "The latest trend is to create online groups and reach out to potential buyers. From time to time, alerts are sent, meeting and party venues disclosed, and vehicle details with symbols on them are revealed to connect with each other," said an insider. As part of International Anti-Narcotics Week, observed globally along with the United Nations' International Day Against Drug Abuse and Illicit Trafficking on June 26, Nagpur police have intensified efforts to combat the escalating drug trade facilitated through the dark web and social media platforms. Under the leadership of commissioner Ravinder Singal, the city is deploying advanced cyber patrolling and surveillance techniques to dismantle sophisticated drug networks exploiting digital anonymity. Singal emphasised the difficulty of tracking transactions on darknet marketplaces. "The dark web's anonymity, combined with cryptocurrency payments, creates a perfect storm for drug traffickers," Singal said. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Giao dịch vàng CFDs với mức chênh lệch giá thấp nhất IC Markets Đăng ký Undo The top cop highlighted the success of Operation Thunder, a citywide initiative launched under his command, which recently led to the seizure of drugs worth Rs6.39 crore. DCP Lohit Matani, spearheading the cybercrime division, said, "The dark web is conducive to cybercrime due to its inherent anonymity and encryption." "Marketplaces like the now-defunct Silk Road facilitated the sale of illegal drugs, allowing users to buy and sell narcotics anonymously," said Matani, adding that traffickers use coded language and emojis like snowflakes for cocaine or maple leaves for cannabis to advertise and connect with buyers. Matani's team has been conducting rigorous cyber patrolling, collaborating with IT experts to decode encrypted communications on apps like Wickr. Matani referenced a 2024 operation where Nagpur police uncovered a syndicate using social media to distribute tramadol and opium-based ayurvedic preparations, concealed as herbal supplements, to international markets. This year's International Anti-Narcotics Week theme, 'People First: Stop Stigma, Strengthen Prevention', aligns with Nagpur police's multi-faceted approach. The district-level anti-narcotics surveillance committee, formed in 2022, has been instrumental in coordinating efforts across agencies, including the postal department, to intercept suspicious couriers. Advanced analytics and cryptocurrency tracing have led to key arrests. "We're blending traditional policing with cutting-edge technology to stay ahead of tech-savvy traffickers," Matani stated. Operation Thunder has been a cornerstone of Nagpur's anti-drug strategy. Singal revealed that the operation leverages real-time data from the National Narcotics Helpline 'MANAS' and employs satellite imagery and drones to monitor trafficking routes. A recent bust under this initiative uncovered a dark web syndicate smuggling drugs to Europe and the US, with 306 grams of narcotics and two illegal firearms seized. "This nexus between drugs and other crimes is a priority for us," Singal noted. Despite these successes, challenges remain. The dark web's anonymity and social media's vast reach strain traditional policing methods. Critics stated that focusing on digital platforms should be given equal attention to Nagpur's traditional trafficking routes, facilitated by its strategic rail and road connectivity. Singal, however, remains optimistic, citing Haryana's success in curbing drug abuse as a model. "Community engagement and technological upskilling are key," he asserted. As part of Anti-Narcotics Week, Nagpur police are organising awareness campaigns, including essay writing, poster making, and reel competitions for students and youth clubs.


New York Post
15-06-2025
- New York Post
Michigan man sentenced for massive child pornography collection purchased some files while stationed at Guantanamo Bay
Apparently five warnings wasn't enough. 4 A Michigan man was sentenced to five years in prison for his gargatuan collection of child pornography. Getty Images A Michigan miscreant was jailed for collecting more than 40,000 images and videos of child pornography, including files he admitted were purchased while he was stationed at the Naval Station Guantanamo Bay. David Mark Bartels, 38, was sentenced to to five years in prison and ordered to pay $63,000 in restitution on Friday. Advertisement He originally pleaded guilty to one count of possession of child pornography by a person employed by the armed forces outside of the US in January, according to court documents, which did not provide details about his exact role at the naval base. 4 David Mark Bartels said he purchased some of the recovered files of child pornography while stationed at the Naval Station Guantanamo Bay. issaronow – A five-terabyte hard drive Bartels owned held approximately 41,026 images and videos of child sexual abuse materials relating to 285 known victims, federal prosecutors said. The content was all stashed in a file titled '\NSFW\Nope\Dont open\You were Warned\Deeper\.' Advertisement Officials asserted that Bartels used the Tor browser, which masks online traffic, to scan the dark web and access the illicit content. 4 The Tor browser blocks online traffic and creates virtually guaranteed anonymity. sharafmaksumov – The case was investigated as part of the Project Safe Childhood initiative launched in May 2006 by the Department of Justice to combat the abuse and sexual exploitation of children. Advertisement Feds have prosecuted a slew of other creepers as part of the project over the years. 4 Bartels was prosecuted as part of the Department of Justice's Project Safe Childhood. boonchuay1970 – In January, one Missouri man faced up to three decades in prison after he was caught trying to record a 15-year-old girl while she took a bath in her home. In May 2023, a former Pennsylvania state trooper pleaded guilty after he was caught possessing a mountain of child pornography, specifically containing images of prepubescent minors
Yahoo
13-06-2025
- Politics
- Yahoo
Opinion - Coders are saving the Second Amendment: DIY guns and digital resistance
America has always defended itself and its freedoms with a gun in hand. But as technology evolves, code is starting to take its place. A new generation of Second Amendment supporters no longer visits shooting ranges or joins the NRA — instead, it circulates blueprints for 3D-printed weapons. Its members' mission is to protect their homes and their right to bear arms, no matter how the government feels about it. While Americans argue about bans, laws, and protests, an entire ecosystem of do-it-yourself gun culture has grown right under their noses. It's nothing like the old movies, where weapons were built from pipes and nails. Ghost guns — firearms without serial numbers or registration — are often made with parts printed on 3D printers and bought online. U.S. law allows individuals to make firearms for personal use, as long as they don't sell them. According to the ATF, this is legal in many cases. This culture has gone far beyond garages. Blueprints and guides are now spread through Tor, Telegram, and GitHub – anonymously and in ways that are nearly impossible to erase. The first famous design, 'The Liberator,' was posted back in 2013. To this day, anonymous communities keep sharing new versions. These self-styled digital patriots view the right to bear arms as a core freedom. Critics argue they undermine control, because weapons without serial numbers can't be traced. Laws can limit sales, but not ideas. While politicians try to close down stores, millions are downloading code. The Second Amendment has been digitized — it now lives in browsers. When the Supreme Court recently allowed new regulations on so-called 'ghost guns,' as detailed in this ruling, it only proved the paradox: Governments can chase physical parts, but the digital heartbeat of the Second Amendment grows stronger. For every law targeting the sale of hardware, a thousand computer files escape into the wild — untraceable, unstoppable, multiplying in the encrypted corners of the internet, where freedom now lives. Maybe we have reached the point where weapons are no longer just objects. They cannot be eradicated through any amount of banning, seizing, or burning so long as they can be downloaded. Yes, it's scary, but freedom isn't about comfort. It is about risk, discomfort, and chaos — and living with that to keep the right to defend yourself. I don't support putting guns in the hands of criminals. I also don't believe the answer is total control, or that such a thing is even possible. Today, the state is trying to catch up with the internet. But the internet will never stop. As Wired explains, this movement is spreading faster than any law can catch up. And maybe the real question isn't whether to ban weapons — it's how to live in a world where a weapon is now knowledge. This is Prometheus's curse for the digital age: We have stolen the fire of creation, and now we must live with its light, its heat and its burns. The more the government tries to play god by banning and seizing, the deeper into the cave the forge of innovation moves, hammering out new blueprints where Zeus's lightning cannot reach. Maybe this is the new era of the Second Amendment — and its files can't be taken away from Americans. Artem Kolisnichenko writes on crime, immigration, and border policy across the American South and Southwest. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.


The Hill
13-06-2025
- Politics
- The Hill
Coders are saving the Second Amendment: DIY guns and digital resistance
America has always defended itself and its freedoms with a gun in hand. But as technology evolves, code is starting to take its place. A new generation of Second Amendment supporters no longer visits shooting ranges or joins the NRA — instead, it circulates blueprints for 3D-printed weapons. Its members' mission is to protect their homes and their right to bear arms, no matter how the government feels about it. While Americans argue about bans, laws, and protests, an entire ecosystem of do-it-yourself gun culture has grown right under their noses. It's nothing like the old movies, where weapons were built from pipes and nails. Ghost guns — firearms without serial numbers or registration — are often made with parts printed on 3D printers and bought online. U.S. law allows individuals to make firearms for personal use, as long as they don't sell them. According to the ATF, this is legal in many cases. This culture has gone far beyond garages. Blueprints and guides are now spread through Tor, Telegram, and GitHub – anonymously and in ways that are nearly impossible to erase. The first famous design, 'The Liberator,' was posted back in 2013. To this day, anonymous communities keep sharing new versions. These self-styled digital patriots view the right to bear arms as a core freedom. Critics argue they undermine control, because weapons without serial numbers can't be traced. Laws can limit sales, but not ideas. While politicians try to close down stores, millions are downloading code. The Second Amendment has been digitized — it now lives in browsers. When the Supreme Court recently allowed new regulations on so-called 'ghost guns,' as detailed in this ruling, it only proved the paradox: Governments can chase physical parts, but the digital heartbeat of the Second Amendment grows stronger. For every law targeting the sale of hardware, a thousand computer files escape into the wild — untraceable, unstoppable, multiplying in the encrypted corners of the internet, where freedom now lives. Maybe we have reached the point where weapons are no longer just objects. They cannot be eradicated through any amount of banning, seizing, or burning so long as they can be downloaded. Yes, it's scary, but freedom isn't about comfort. It is about risk, discomfort, and chaos — and living with that to keep the right to defend yourself. I don't support putting guns in the hands of criminals. I also don't believe the answer is total control, or that such a thing is even possible. Today, the state is trying to catch up with the internet. But the internet will never stop. As Wired explains, this movement is spreading faster than any law can catch up. And maybe the real question isn't whether to ban weapons — it's how to live in a world where a weapon is now knowledge. This is Prometheus's curse for the digital age: We have stolen the fire of creation, and now we must live with its light, its heat and its burns. The more the government tries to play god by banning and seizing, the deeper into the cave the forge of innovation moves, hammering out new blueprints where Zeus's lightning cannot reach. Maybe this is the new era of the Second Amendment — and its files can't be taken away from Americans. Artem Kolisnichenko writes on crime, immigration, and border policy across the American South and Southwest.


Time Business News
05-06-2025
- Business
- Time Business News
Carding Forums Explained
In today's digital age, cybercrime has evolved into a sophisticated industry, with hidden online communities facilitating illicit activity across the globe. Among the most notorious elements of this ecosystem are carding forums—underground platforms where cybercriminals exchange stolen credit card information, hacking tools, and fraudulent services. While often concealed from the public eye, understanding what carding forums are and how they operate is crucial for cybersecurity professionals, financial institutions, and everyday internet users. Carding forums are online discussion platforms—typically hosted on the dark web or secured networks—where users trade, sell, and share information related to credit card fraud, commonly known as carding . The term 'carding' refers to the unauthorised use of credit or debit card data for fraudulent transactions, identity theft, or the purchase of goods and services. These forums are structured similarly to traditional online communities, often featuring: Discussion threads on topics like carding methods, cash-out strategies, and bank drops. Marketplaces for stolen credit card data, CVVs, fullz (full personal identity information), and login credentials. Tutorials and guides aimed at teaching users how to commit fraud. Review systems for sellers and service providers, similar to e-commerce sites. Access to carding forums is usually restricted, requiring invitations, registration fees, or proof of prior illicit activity to join. Carding forums operate like black markets. Members use aliases to hide their real identities and communicate using encrypted messages or private servers. Transactions within these forums typically involve cryptocurrencies such as Bitcoin or Monero to maintain anonymity. Some common services and products offered on carding forums include: Stolen Credit Card Information : Often sold in batches with details like card number, expiration date, CVV, and billing address. : Often sold in batches with details like card number, expiration date, CVV, and billing address. Fake IDs and Passports : Useful for identity theft or opening fraudulent accounts. : Useful for identity theft or opening fraudulent accounts. Bank Drops and Mule Accounts : Used to receive and launder stolen funds. : Used to receive and launder stolen funds. Carding Tools : Including BIN checkers, VPNs, SOCKS proxies, and credit card generators. : Including BIN checkers, VPNs, SOCKS proxies, and credit card generators. Tutorials and Support: Step-by-step guides for beginners, along with forums for troubleshooting carding attempts. The sophistication of these communities can range from amateur-level scams to advanced criminal networks with connections to organised crime. Many carding forums exist on the dark web, a portion of the internet that is not indexed by standard search engines and can only be accessed through tools like Tor (The Onion Router). The anonymity provided by the dark web makes it an attractive hub for illegal activities, including carding, drug sales, weapons trafficking, and more. However, not all carding forums are exclusive to the dark web. Some exist on the open internet (also called the clearnet) but use secure login systems and other obfuscation techniques to avoid detection. These are often short-lived as law enforcement agencies actively work to shut them down. Participating in carding forums is illegal in nearly every jurisdiction. Activities such as purchasing stolen data, using it for unauthorized transactions, or even accessing these forums can result in severe criminal charges, including: Fraud Identity Theft Money Laundering Conspiracy to Commit a Crime Governments around the world have intensified efforts to dismantle carding networks. Law enforcement agencies like the FBI, Europol, and INTERPOL regularly conduct international operations that lead to forum shutdowns and the arrest of key figures in cybercrime rings. For example, infamous forums like CarderPlanet, DarkMarket, and Joker's Stash were eventually taken down after years of investigations and coordinated global efforts. While the existence of carding forums may seem distant to the average internet user, the effects of their operations are widespread. Millions of people fall victim to credit card fraud every year, often as a result of data sold on these platforms. Here are some tips to protect yourself: Monitor your accounts regularly for unauthorised transactions. for unauthorised transactions. Use strong, unique passwords for financial services and enable two-factor authentication. for financial services and enable two-factor authentication. Avoid suspicious websites or apps that request payment information. that request payment information. Use credit instead of debit cards when possible for better fraud protection. when possible for better fraud protection. Report any suspicious activity to your bank or card issuer immediately. Businesses should invest in cybersecurity measures like intrusion detection systems, encryption, and employee training to minimise the risk of data breaches. Carding forums represent a dangerous and growing threat within the cybercrime landscape. While these hidden communities thrive on anonymity and technical knowledge, law enforcement and cybersecurity experts are constantly working to expose and dismantle their networks. Awareness and proactive protection are the best defences against credit card fraud. By understanding how carding forums operate, individuals and organisations can better safeguard themselves in an increasingly connected and vulnerable digital world. TIME BUSINESS NEWS