1 00:00:01,160 --> 00:00:06,090 >> HIS's role in combatting the marketplaces 2 00:00:27,970 --> 00:00:32,270 on the Darknet 3 00:00:32,270 --> 00:00:34,470 is a pretty straight-forward role. 4 00:00:34,470 --> 00:00:37,390 We combat transnational criminal smuggling. 5 00:00:37,390 --> 00:00:41,380 And these are now occurring quite frequently on the Darknet, 6 00:00:41,380 --> 00:00:44,570 and HIS supports that effort in the cyber environment 7 00:00:44,570 --> 00:00:46,470 through a Cyber Crime Center, or C3. 8 00:00:47,080 --> 00:00:48,930 Silk Road and Black Market 9 00:00:48,930 --> 00:00:51,210 Reloaded are two great cyber investigations 10 00:00:51,210 --> 00:00:54,110 that were primarily led by Homeland Security Investigations, 11 00:00:54,110 --> 00:00:56,010 or HIS. Investigation 12 00:00:56,010 --> 00:00:58,420 started as contraband smuggling, 13 00:00:58,420 --> 00:01:01,240 and they were discovered as smuggling occurred 14 00:01:01,240 --> 00:01:02,740 through via mail 15 00:01:02,740 --> 00:01:05,650 or through the traditional system. 16 00:01:05,650 --> 00:01:10,050 However, as investigators dug into the investigations, 17 00:01:10,050 --> 00:01:12,560 they discovered that a lot of the activity was occurring 18 00:01:12,560 --> 00:01:14,900 on the dark market marketplaces, 19 00:01:14,900 --> 00:01:16,790 and then the cyber investigations took off. 20 00:01:20,850 --> 00:01:22,790 >> Operation Dime Store started 21 00:01:22,790 --> 00:01:26,350 because we wanted to find the source. 22 00:01:26,350 --> 00:01:28,900 And once we found out that the source of the drugs 23 00:01:28,900 --> 00:01:31,420 were coming from a website known as Silk Road, 24 00:01:32,150 --> 00:01:35,370 we decided that we would try to figure out ways 25 00:01:35,370 --> 00:01:37,010 to shut down the website, 26 00:01:37,010 --> 00:01:39,960 also intercept the packages, identify the vendors, 27 00:01:39,960 --> 00:01:41,200 identify the recipients, 28 00:01:42,340 --> 00:01:47,980 employ different types of analysis of fingerprints on packaging 29 00:01:47,980 --> 00:01:50,710 to looking at different trends 30 00:01:50,710 --> 00:01:52,080 and looking at the website itself, 31 00:01:52,080 --> 00:01:54,480 to try to see if there was other things and clues 32 00:01:54,480 --> 00:01:57,380 that could lead us to where the website was hosted. 33 00:01:57,380 --> 00:01:59,310 And we also employed 34 00:01:59,310 --> 00:02:02,370 some undercover purchases from the website, 35 00:02:02,370 --> 00:02:05,270 as well as employed different undercover techniques 36 00:02:05,270 --> 00:02:06,530 to try to infiltrate the website. 37 00:02:07,600 --> 00:02:09,510 >> Criminals should know that the Darkweb 38 00:02:09,510 --> 00:02:10,870 is not completely anonymous, 39 00:02:10,870 --> 00:02:13,230 and any illicit activity that occurs on the Darkweb 40 00:02:13,230 --> 00:02:15,850 will be aggressively enforced and pursued. 41 00:02:16,820 --> 00:02:18,460 Homeland Security Investigations, 42 00:02:18,460 --> 00:02:21,580 HIS, partners with our foreign 43 00:02:21,580 --> 00:02:23,670 and domestic law enforcement partners 44 00:02:23,670 --> 00:02:25,980 in attacking Darknet marketplaces 45 00:02:25,980 --> 00:02:27,610 that are illicit in nature. 46 00:02:28,720 --> 00:02:31,530 What people really need to know and pay attention to is, 47 00:02:31,530 --> 00:02:33,820 you don't really know what's on a Darkweb. 48 00:02:34,720 --> 00:02:36,750 It lends itself to unscrupulous behavior. 49 00:02:38,440 --> 00:02:41,640 That can be in the form of illicit contraband 50 00:02:41,640 --> 00:02:43,430 in all of its forms and functions, 51 00:02:43,430 --> 00:02:45,340 most likely illicit drugs, 52 00:02:45,860 --> 00:02:49,510 illicit counterfeit pharmaceuticals, gun-smuggling, 53 00:02:50,010 --> 00:02:52,450 even the theft of personal identification 54 00:02:52,450 --> 00:02:54,110 or hit men for hire. 55 00:02:54,910 --> 00:02:56,630 They all exist on the Darkweb.