Ebook Info
- Published: 2012
- Number of pages: 304 pages
- Format: PDF
- File Size: 1.90 MB
- Authors: Misha Glenny
Description
In this fascinating and compelling book—a must-read for anyone who owns a computer—Misha Glenny exposes our governments’ multi-billion-dollar war against an ever-morphing, super smart new breed of criminal: the hacker. The benefits of living in a digital, globalized society are enormous; so too are the dangers. We bank online, shop online, date, learn, work, and live online, but have the institutions that keep us safe on the streets learned to protect us from the deadly “new mafia” of cybercriminals? To answer this question, Glenny offers a vivid examination of the rise of the criminal hacking website DarkMarket and its ultimate fall. Along the way, he presents alarming and illuminating stories about both the shadowy individuals behind its scenes and the organizations tasked with bringing them to justice.
User’s Reviews
Editorial Reviews: Review “[An] engaging tale of cops and robbers in cyberspace.” —San Francisco Chronicle “An eminently readable, witty narrative that sustains suspense until the very last pages.” —The Wall Street Journal “Misha Glenny tells us that cyber crime is right here and has been for years—hiding in plain sight. . . . Required reading.” —The New Yorker “A truly remarkable story. . . . Magnificent.” —Financial Times“This extraordinarily powerful book demonstrates how utterly we lack the shared supranational tools needed to fight cybercrime.” —Roberto Saviano, author of Gomorrah About the Author Misha Glenny is a former BBC Central Europe correspondent. Glenny covered the fall of Communism and the wars in the former Yugoslavia. He is the author of McMafia; The Rebirth of History; The Fall of Yugoslavia (which won the Overseas Press Club Award in 1993 for Best Book on Foreign Affairs); and The Balkans: Nationalism, War and the Great Powers, 1804-1999. He has been regularly consulted by U.S. and European governments on major policy issues. Misha Glenny lives in London. Excerpt. © Reprinted by permission. All rights reserved. 1AN INSPECTOR CALLSYorkshire, England, March 2008The Reverend Andrew Arun John was in a minor state of shock one morning in early March 2008. Hard to blame him. Not only had he just survived the long journey from Delhi in cattle class, but it was two weeks before the opening of Heathrow’s new Terminal 5, and the world’s busiest international airport was exploring new standards in passenger misery. His fl ight had left India around three o’clock in the morning and, after negotiating passport control and the baggage mayhem, he still had to face a four-hour drive north to Yorkshire. Switching on his mobile phone, Reverend John saw he had an inordinate number of missed calls from his wife. And before he’d had time to call back to ask her what the fuss was about, she was ringing again. She told him that the police had telephoned several times and were desperate to get in touch with him. Taken aback and confused, the Reverend replied sharply to his wife, saying that she was talking nonsense – though he regretted his tone almost immediately.His wife, happily, chose to ignore his grumpiness. Clearly and calmly, she explained that the police had wanted to alert him to the fact that somebody had broken into his bank account, that this was a matter of urgency and that he should ring the number she had for the offi cer in charge as soon as possible.His wife’s call unsettled the Reverend still further and his weary brain went into overdrive. ‘Who has broken into my account?’ he wondered. ‘What account? My Barclays here?’ he speculated. ‘My Standard Bank account in South Africa? Or my ICICI one in India?Or maybe all three?’ Even more puzzling: what did she actually mean? ‘How have they broken into my account?’Coming so soon after his exhausting flight, the whole affair made the Reverend anxious and edgy. ‘I’ll deal with this later when I get to Bradford and after I’ve rested,’ he muttered to himself.Bradford is 200 miles north of Heathrow Airport. Sixty miles due east of the city lies Scunthorpe, where Detective Sergeant Chris Dawson’s small team was nervously awaiting the Reverend John’s phone call. The officer began to feel he was sinking in the quicksand of a case that he suspected was very big, and which presented him with one seemingly insuperable problem – he couldn’t get his head round it. The evidence gathered so far included hundreds of thousands of computer files, some of which were large enough to hold the complete works of Shakespeare 350 times over. Inside these documents lay a planetary library of numbers and messages in a language that was effectively indecipherable to all but a tiny elite around the world who are trained in the arcane terminology of cybercrime. DS Dawson may have known nothing about that novel and particularly rarefied branch of criminal investigation, but he was a first-class homicide officer with many years of service behind him. He could detect among the endless lists and number strings an agglomeration of sensitive data, which should not be in the possession of a single individual.Yet as police offi cers in many parts of the world were discovering in the first decade of the twenty-first century, it was one thing to stumble across an information trove like this. It was quite another attempting to link it to a specific crime.If DS Dawson were to persuade a magistrate in the sleepy town of Scunthorpe on the Humber estuary to place his suspect on remand, then he needed to show crystal-clear evidence of a specific crime. Furthermore, there was always a fair chance that he would be presenting said evidence to a doddery old circuit judge who might have diffi culty using a TV remote, let alone accessing email. Convincing wasn’t sufficient – the case had to be watertight and simple enough for anyone to understand.Time was dribbling away. The suspect could only be held for three days and two of those had already passed. Among the files, figures, weblogs, chatlogs and who-knows-what-else, Dawson had only one tiny scrap of evidence.He stared at the fi fty words on a sheet of A4. These included an account number, 75377983; the date the account was opened, 24/02/2006, along with the account balance, £4,022.81. But there was also a name on it: Mr A A John; an email address: STPAULS@LEGEND. CO.UK; a physical address: 63 St Paul’s Road, Manningham, Bradford; a corporate sign-on ID and, crucially, a corporate sign-on password: 252931.If he could just confi rm the account holder’s identity, and if that man were to state that he had never knowingly divulged his password, then Dawson would probably be able to persuade the judge to send the accused for trial and refuse bail. And that might just buy enough time for the Detective Sergeant to comprehend exactly what he was dealing with.When Dawson had tried to contact Mr A.A. John he had learned that he was a minister of the Church of England who was taking a group of underprivileged children on holiday around India. He was also told that he would not be contactable until his return from Delhi. The Reverend was scheduled to arrive a few hours before the suspect had to be released. If he failed to come through, then the quicksand of this case would swallow up the ocean of data upon which Dawson had stumbled. Along with the data, the suspect would doubtless fade back into the anonymity of his virtual alter ego. It was Dawson’s misfortune that the Reverend John was suffi ciently unsettled by the telephone conversation with his wife that he resolved to deal with the matter only once he had arrived in his parish, Manningham. Indeed, he had turned off his mobile phone and concentrated instead on his long drive from the airport.So why was he so upset?Short and compact, the Reverend John was by temperament a jovial man. Born on the edge of the Thar Desert in Rajasthan, his slightly hexagonal face was usually all sunshine, radiating from behind his professorial glasses. He was born into the minority-faith community of India’s Christians and joined the priesthood to work for the Anglican Church of India in Delhi for fi fteen years.But in 1996 he was approached by the Church of the Province of South Africa to take charge of a parish in the Indian township of Lenasia, three miles south of Soweto, during the transition from apartheid to multi-party rule.It was a challenging move for anybody, as these were testing times for his new home. The joy that greeted the end of the racist regime was tempered by the knowledge of how deep the resentments ran that had accumulated over the previous 200 years. Outsiders like the Reverend John required sophisticated political and social skills to understand the meaning of those tensions and how he might help to reduce them.His successful work in South Africa was noticed further up the Anglican Church’s hierarchy and, after eight years, the Bishop of Bradford in the English county of West Yorkshire urged him to consider an equally challenging post in Manningham, a residential district on the edge of Bradford city centre. The Reverend John was reluctant – England had always struck him as a rather gloomy place, with its miserable weather and urban sprawl.Equally, he knew that Manningham was no bed of roses. Many Britons regarded Bradford, and Manningham in particular, as a symbol of their country’s failing attempts to integrate its many ethnic and confessional groups. More malignant types saw in Manningham an opportunity to ratchet up the mistrust between those communities.In July 2001 this district exploded into brief but violent riots that reflected a deepening division between the city’s large Asian constituency and its white population. Even earlier, Manningham had experienced the phenomenon of white fl ight and, by the time the Reverend John arrived, three years after the riots, 75 percent of the population were Muslims whose origins lay largely in the rural districts of northeastern Pakistan. ‘The remaining twenty-five per cent are Christians, although only about fi ve per cent of those are church-going. The white community here looks and feels like the minority it is,’ said the Reverend John. Although its climate, architecture and culture bore no resemblance to the townships of Jo’burg, in other ways Manningham felt uncannily like South Africa.This was a hardship posting. When the clouds gathered or the snow fell, there was little that appealed in streets lined by sombre neo-Gothic buildings. Yet a little more than a century ago Manningham had been a most desirable area in which to live. This was during the period, now forgotten to the outside world, when Bradford was hailed as ‘the wool capital of the world’, acting as a mighty engine of Britain’s Industrial Revolution.By the beginning of the twenty-first century, however, Manningham had been in a state of decay for many years. Employment and prosperity, once flourishing, had moved away long before. Drug abuse, domestic violence, property crime and prostitution had taken their place. The Reverend John cared for more people in his drop-in centre, all trying to escape the traps of poverty and criminality, than attended his church on Sundays.With the ever-present threat that latent violence could break through the surface, the Reverend John’s work was on the front line of Britain’s class, cultural and social wars. Not easily scared, he maintained a readiness to chuckle in most circumstances. Given the challenges of his daily work, he wondered why the news of his compromised bank account unsettled him to such a degree. Above all, he wanted to talk to his sons, who understood about computer things. And then he decided that he needed to talk to the police quickly, to find out exactly what was going on. ‘Above all,’ he resolved, ‘I want this thing to be sorted out and put to bed as soon as possible.’The Reverend’s nervous reaction is not uncommon. The psychological response on learning that one has become a victim of cybercrime is similar to that experienced on being burgled. Even though the act is confined to cyberspace, a world of accumulated tiny electronic impulses, it still feels like a physical violation. For if one’s bank account has been hacked into, what else might the thieves have discovered in the privacy of your computer?Have they, perhaps, stolen your passport details, which some criminal or intelligence agent is now using as a fake travel document? Could they even, as you read this, be examining your emails, with confidential information about a colleague or employee? Might they have stumbled across some dangerously fl irtatious emails or other indiscretion that you wrote or received? Is there any part of your life they could not explore, with access to your computer?Now quite determined, the Reverend John called the police offi cer in the neighbouring county of Lincolnshire as soon as he arrived at the pleasant little cottage next to the imposing spire of his church in Manningham.That this case should fall into the lap of Chris Dawson, a Scunthorpe-based policeman in early middle age, was especially unusual. Most cases of cybercrime in Britain are picked up by specialist units allied to three forces – the Metropolitan Police, the City of London Police and the Serious Organised Crime Agency (SOCA), also based in the capital. Untrained offi cers would mostly miss such cases because of their esoteric nature. But Dawson was unusual: he was an instinctive copper with a sharp eye. He also possessed a quiet charm, but was frank in a typical northern English fashion that contributed to his methodical and precise approach to policing. This attention to detail would serve him well in the coming months.If Manningham was associated with ethnic tension and precipitous economic decline, nearby Scunthorpe (population 75,000), lying south of the Humber estuary, was more often regarded either as an English nowheresville or as the butt of jokes provoked both by its name and the perennially poor performances of its soccer team. (In fairness, one should add that at least it did not inherit its original Scandinavian name, Skumtorp, and until its relegation in May 2011 Scunthorpe United FC had been punching above its weight in the second tier of English football.) As far as one can establish, the town has never been cited in connection with large-scale organised criminal activity.A mere four days before the Reverend John’s return from his charitable work in India, DS Dawson had been working happily at Scunthorpe’s central police station. He was watching the Command and Control log, a computer screen that relays information and crime reports phoned in by the public. The standard fare would include drunken fracas, the occasional domestic, and a kitten getting stuck up a tree. But on that Wednesday afternoon at 1.30 p.m. a message ran across the log that aroused the Detective Sergeant’s curiosity. It was very much out of the ordinary. He turned to his colleague and in his lilting Lincolnshire brogue said gently, ‘Come on then. We’d best go take a look. Seems like there’s something rather fishy going on at Grimley Smith.’ Read more
Reviews from Amazon users which were colected at the time this book was published on the website:
⭐Over the years, the internet has transformed from a luxury to necessity. It is fast becoming a fundamental human right. In Finland, it already is. With internet proliferation comes a group of people who are exploiting it for making money. For instance, you have either heard about or received emails regarding the promise of treasure out of nowhere commonly referred to as the Nigerian scam. There are a whole lot of other scams. Misha Glenny uses his background in investigative journalism to trace the rise and fall of DarkMarket, one of the sites favored by hackers. In order to uncover the complex world of secrecy and anonymity, he travels from Brazil to Turkey via Scandinavian and East European countries.Although the book chronicles the rise and fall of the website named DarkMarket, it is not a straight narrative. It does lack a chronological narrative. The book jumps back and forth between different characters and time periods. As a result, the book confuses anyone who is not reading this at a stretch. The book also will disappoint you if you are looking for conclusions. The authorities catch a major player behind the website as documented in the book. But after capture of this criminal, no one is sure if they have got the right person. The major success of the book turns out to be the shocker it delivers to a person who has adopted technology with both hands without realizing its darker side. These days, we conduct a lot of our day to day activities using the internet. Our online identities are vulnerable. An experienced hacker can effortlessly extract this information from our computers. The extracted information is sold cheaply to fraudsters who then uses it for various schemes. Any legal procedures against these people take enormous efforts, and sometimes fruitless, because these crimes extend international boundaries. With law enforcers spread across the world, it is difficult to keep it a secret and also to get everybody to cooperate. Since there is a lot of money involved here, the organizations behind these websites are becoming like the modern mafia.Technology makes our lives easy. At the same time, technology also has an evil side. We have been ignorant of the negative aspects. Misha Glenny wakes up from the slumber. Forget the lack of structure in the book. This book is still a must-read for you to understand the darker side of the internet. I am sure you will be afraid to use even the nearest ATM machine after reading this book.
⭐Just reading the preface had me hooked on reading this interesting book. It’s intriging as a spy novel and would make a great movie except that it may be hard to follow with all that goes on in it. I feel like all hackers should be punished whether they actually steel money/identities/information or not. My daughter was hacked by a guy she met on a social network and he became like a stalker – nothing was stolen because she has no money but the trauma of someone sneaking around in your PC without permission is just disgusting – she called the police but they didn’t believe her. Anyway I wanted to read up on what makes a hacker and this book helped somewhat. In one part it describes what motivates a hacker: “Science has shown that people who take risks experience a rush of the so-called happiness hormone. That hormone multiplied by whatever quantity of rustling dollar bills, plays the fundamental, decisive part in motivating someone to keep working in this not entirely honest industry.” Oh boy…”not entirely honest” – can you believe it? Hackers do it just for the rush, just like a drug addict! Great read for all geeks!
⭐This book is disappointing in the sense that it is a follow up to the original Dark Market and appears to be a reprint of that book, with merely a new prologue to link the new publication to the old one. Ninety percent of the paperback seems to be a repeat of the splendid investigative record of the first book meaning that there is bacically nothing new apart from the linking prologue.Many readers will feel angry that they have spent money to read a book they had already read. Still the suthor is doing a good job in alerting unsuspecting millions to the inherent dangers of the hackers and carders who use the internet to pickpocket the innocent people of the new electronic age. Yet the feeling persists that this paperback is a money making endeavour that really has no eminent place on the bookstalls. Misha Glenny is at his best in the original Dark Market, a cracking and educative read.
⭐I read this book because it was recommended reading in an article that I saw from Robert Herjavec and I have recently become interested in cyber crimes and cyber security. The book was fairly interesting and well written with some good and thought provoking information. I found several times that it was a little confusing to follow because of the way it was organized.
⭐While the book itself can sometimes be difficult to follow, I would recommend it. Very entertaining and full of interesting insights about cyber crime.
⭐Read it on my summer holidays last year. Easy to read and very eye opening. I preferred McMafia but its still a good book. Amazing what goes. Cant wait for the next one.
⭐I found the book riveting. Not only does it reveal the under world of cyber crime, but does it in dramatic fashion. The only fault is the lack of graphics or a dramatis personae that would help the reader keep the characters straight and illustrate their roles and relationships to one another and their respective crime sites.
⭐This book is really cool the stories make you understand the cyber world
⭐Dark Market’ was a website that cyber criminals could access to sell and purchase credit/debit card details, pin numbers and skimmers (machines that were used to obtain information from credit and debit cards) as well as various other ‘tools’ for advancing their nefarious intentions within cyberspace.Glenny’s book investigates this and more. It skilfully describes the history of ‘Dark Market’, what were it’s origins, who were it’s creators, who maintained it and how it was eventually discovered, investigated and removed. It’s a fascinating story and Glenny unravels and thoroughly picks apart most aspects behind this story including the main players who frequented and ran the ‘Dark Market’ website. Characters such as Cha0, JiLsi, Matrix001, Iceman (who was a rival who tried to bring down ‘Dark Market’), Script, Dron and a variety of others. Glenny manages to provide depth to these characters, adding a human dimension to a story that is wrapped in technology.This is where this book excels as it takes what can be a very dry subject (cybercrime) and makes it into a very readable story. It is in essence about how crime has evolved over the internet. The sums that this type of crime (card fraud) can and has brought some of these characters is vast, easily eclipsing even the most lucrative of past armed robberies and without the need to touch a knife or firearm or even leave the front of a computer screen. But for some, it was the thrill and kudos that they gained from being able to unlock what were supposed to be impenetrable institutions that inspired them to continue down the path of cybercrime.And it is truly global, as Glenny investigates these characters in the UK, US, Canada, Turkey, Germany, Ukraine, Russia and other parts of the world.This book is recommended for anyone interested in cybercrime, technology, cyberspace and true crime. It should be essential reading for those involved in the virtual retail and banking sector but there is scope for anyone who uses a computer to read and learn about this sort of criminal enterprise despite the fact that the book is 10 years old and things have probably moved on in cyberspace.The lessons though are still relevant in cyberspace. Be cautious and alert, don’t believe everything you see and read and maintain your security when online. Just because there isn’t a shady character wearing a hooded top standing behind you, it doesn’t mean you can’t be robbed!!
⭐Misha Glenny is a skilled writer. This book reads more like a novel of a number of stories about the same subject, rather than a dry technical book about cybernet/cybercrime. That’s Glenny’s style. Overall, a very good read and very educational for those that want to know what is likely to exist ‘out there’. I think the book was completed around 2012 so, in a sense, it is ‘old’. However, the characters and organisations written about are likely to be replicated as time goes by.I thoroughly agree that while criminals should be punished, there should also be very serious attempts to harness their expertise. “Geeks” live in a very different world to the vast majority of us ‘normal’ folk and it is difficult for the likes of me to understand what drives them.Thank you Mr. Glenny for a very interesting, and sort of scary, read.
⭐Although I enjoyed this book, I felt the writing was a bit journalistic in nature. There seemed to be some repetition and the take home message is to cover the keypad as you tap in your PIN. I imagine criminals have now largely moved on to other ways of stealing our money by now but the book is a good cautionary tale as to the fast changing nature of cybercrime.
⭐If you want to know what a dangerous world exists out there in cyber, then this is a good way of finding out. Another wonderful way forward for the human race, hijacked by evil minded people who choose to spoil for the majority. A well researched book that should be read by everybody who enters cyber world. Be prepared to see what dangers lurk out there and how easy it is for those who seek to destroy/disrupt a fantastic tool for use by anyone who can access the internet.
⭐Interesting read for a total novice into the topic of cyber-security though really the main topic covered in this book is credit card fraud and related security (failures) by financial institutions and e-commerce alike. It focuses on DarkMarket and its predecessor. I was considering a 3-star rating, but give it 4 stars for novelty factor (as mentioned, I have not read anything on this topic before).
Keywords
Free Download DarkMarket: How Hackers Became the New Mafia in PDF format
DarkMarket: How Hackers Became the New Mafia PDF Free Download
Download DarkMarket: How Hackers Became the New Mafia 2012 PDF Free
DarkMarket: How Hackers Became the New Mafia 2012 PDF Free Download
Download DarkMarket: How Hackers Became the New Mafia PDF
Free Download Ebook DarkMarket: How Hackers Became the New Mafia