Zum Player springenZum Hauptinhalt springenZur Fußzeile springen
Cybercrime im Ex-NATO Bunker • 400 Darknet-Server lahmgelegt

Cybercrime im Ex-NATO Bunker" nimmt uns mit in eine verborgene Welt, die irgendwo in den Tiefen Deutschlands existiert. Ehemalige Hochsicherheitstrakte, in denen die Weltgeschichte hätte entschieden werden können, dienen heute als undurchdringliche Festung für Cyberkriminelle. Ein Netzwerkbetreiber hat diese unterirdischen Anlagen für eine Millionensumme an Betrüger, Hacker und sogar Terroristen vermietet.

Die Dokumentation zeigt, wie diese Täter ungestört von den Behörden operieren, weil sie sich unter dem Deckmantel der Legalität verstecken. Sie nutzen juristische Grauzonen und die Komplexität internationaler Gesetze aus, um Milliarden zu erbeuten. Wir bekommen Einblicke in die Ermittlungen der Kriminalpolizei und erfahren von IT-Spezialisten, wie schwierig es ist, diese kriminellen Machenschaften aufzudecken.
Spannende Einblicke in die Ermittlungsarbeit, der Kampf gegen das Böse im digitalen Zeitalter und die Enthüllung eines perfiden Plans machen diese Dokumentation zu einem Must-See für alle, die sich für Kriminalfälle und die Schattenseiten der Technologie interessieren.


#Hashtags
#Cybercrime, #Hacker, #Doku, #Krimi, #NATO, #Bunker, #Digitalisierung, #Internetkriminalität, #Verbrechen, #Polizei, #Ermittlung, #Spannend, #Technologie, #Sicherheit, #IT, #Thriller, #Betrug, #Netzwerk, #Unterwelt, #Ex-NATO
#Keywords
Cybercrime, Hacker, NATO, Bunker, Digitalisierung, Internetkriminalität, Verbrechen, Polizei, Ermittlung, Betrug, Technologie, Sicherheit, Kriminalität, Dokumentation, Geheimnis, Unterwelt, Schattenseiten, kriminelle Machenschaften, IT, Darknet

Dokus über digitales künstliche Intelligenz Social Media, die besten Comedy-Serien

Facebook: http://www.facebook.com/tarifguard

http://www.kiez-deal.de

Kategorie

🤖
Technik
Transkript
00:00German investigators have struck a blow against an internationally operating gang of cyber criminals.
00:13A large illegal data center in an old NATO bunker on the Moselle.
00:21It's about drugs, weapons and child pornography.
00:25Tram-Trabach on the Moselle. This idyllic town becomes the scene of one of Germany's largest cybercrimes to date.
00:43We're now moving on to the Cyberbunker, an illegal data center that enabled cybercrime all over the world.
00:51Philipp Haderdauer was involved in the extraordinary investigation.
00:56The IT analyst works for the Cybercrime Department at the Rhineland-Palatinate State Office of Criminal Investigation.
01:01At the time of the arrest, I had been with the police for six months. My probationary period had just ended.
01:07And suddenly I was involved in such a huge case. Of course, it was hard to imagine after hearing the first details.
01:16So a group of people who got themselves a bunker, barricaded themselves there, and from there provided servers for cyber criminals.
01:24Deep underground there are hundreds of servers hosting illegal websites.
01:34Philipp Haderdauer analyzed the data on the servers and spent a lot of time there.
01:39If you take a driveway up the hill on the left, you will find the entrance to the bunker.
01:45Of course, you only see the tip of the iceberg. That's a total of five floors, which then move underground.
01:51The former NATO bunker was formerly used by the German Armed Forces (Bundeswehr) to collect weather data. In 2012, the site was put up for sale.
02:00One of the interested parties is Hermann X, then 54 years old. The Dutchman describes himself online as a computer expert with great visions.
02:10I have more ideas than I can probably realize in this lifetime. I am a creator, not a consumer.
02:16He sees himself as a visionary, perhaps even a bit of an internet activist. He's definitely a person who seems to attract people.
02:27The bunker enthusiast has already operated an underground data center in the Netherlands together with hacker friends.
02:34I live in a nuclear-proof bunker, the Cyberbunker. I don't expect World War III to break out anytime soon, but it's always nice to have some privacy.
02:46This data center burned down in 2002. An excess laboratory was subsequently discovered there, but no evidence of it was found.
02:56In Traben-Trabach, Hermann X is attempting a fresh start. Eight days before the bunker is to be sold, the Rhineland-Palatinate State Criminal Police Office warns the responsible federal authority.
03:05The future owner could commit computer crimes from there.
03:10But that wasn't actually clear enough for the authority that then sold it.
03:14In addition, *** probably made the much better offer because there were other interested buyers.
03:19In 2013, Hermann X bought the 13-hectare site, including a bunker and administrative buildings, for 450,000 euros and moved in with his dubious team.
03:31What the authorities don't know at this point is that the Cyberbunker's customers are criminals who operate illegal websites.
03:39This included Wall Street Market, at the time the second largest marketplace on the darknet.
03:44Where thousands of dealers offer drugs, malware, and stolen data for sale.
03:50He was one of the operators of the illegal platform: Martin Frost. He earned several million through cybercrime. He had no qualms back then.
03:59The bad thing about this scene is, cybercrime doesn't feel like a crime.
04:04It's much more abstract to sit in front of a computer and somehow commit cybercrime than to go to the park and knock someone over.
04:12At the time of our recording, Frost is still at large and awaiting his appeal.
04:18He was a customer of the Cyberbunker for four years.
04:21Legal hosts who then block the websites also report this, of course.
04:24And that doesn’t happen with hosts like Cyberbunker.
04:28This is completely ignored.
04:30And they called the whole thing the No-Matter-What Service.
04:34So no matter what, the servers stay online.
04:37On its website, the Cyberbunker advertises a special service.
04:42The data center is bulletproof, meaning it is safe from access by law enforcement agencies.
04:47Everything except child pornography and terrorism is hosted.
04:51Martin Frost pays around 5,000 euros per month for rent for almost 30 servers.
04:56The contact was actually very professional, as you would expect from a legitimate host, or even from a legitimate company.
05:05That means you write, for example, if you have problems, then you have a customer service representative who will then, for example, replace a hard drive if there are any problems.
05:13At that point, Frost had no idea that his servers were located in Germany.
05:18In 2015, the Rhineland-Palatinate State Criminal Police Office launched covert investigations against the operator of the Cyberbunker.
05:30The area is monitored with helicopters and drones.
05:33But little information can be obtained from outside.
05:36Of course, there was no insight at all.
05:47And then, of course, the next step was to think about telecommunications surveillance measures, i.e. monitoring telephone lines in the classic way.
05:53The main aim was to prove that this infrastructure was deliberately made available for criminal purposes.
06:00And these classic police measures were simply very difficult.
06:03Because, of course, there's probably little talk about it on the phone.
06:08In the monitored telephone calls, the suspects use code words.
06:13Hi, I found the oranges. Tell me more.
06:16He got 700 crates of oranges and they are in the right place.
06:20Now he needs another 350 for a full charge.
06:24One name keeps coming up in the conversations.
06:27There was this Mr. Green, who probably also gave a lot of instructions.
06:31In the course of the proceedings it turns out that it is George Mitchell.
06:36And George Mitchell is an OK name in Ireland.
06:40So it's known for drug jewelry, and also a lot of violence in connection with that.
06:46Hermann X appears to be involved in criminal activities.
06:50But he doesn't hide in a bunker, but can often be seen in the city.
06:54He goes to the hairdresser, visits bars and cafes.
06:57Mayor Patrice Langer also repeatedly notices the dubious bunker owner.
07:02When he parked at my office, his X6-BMB was there.
07:09Then we knew for sure that it also had the license plate B-O-B-O.
07:12Then it was said that Bobo was back.
07:13And then he walked away with his, how should I say, trench coat, which flowed parallel to his mane.
07:20And then he ran through the city with his Atlatus and was a bit of an odd couple at that moment.
07:25There are many rumors about Hermann X. Langer, who is worried that cannabis could be grown in the bunker.
07:31He wants clarity and contacts the bunker owner.
07:35I then called the good gentleman and I must say he was very willing.
07:39He said, yes, no problem, feel free to come over.
07:42An hour later, X opens the bunker door for the mayor and leads him through the floors.
07:47He may enter any room.
07:48It was all very open.
07:54We also talked about his business model, how he wanted to do data backup and similar things, and app programming in security anyway.
08:00Yes, but the aftertaste was that what was running on his computer, of course you couldn't see that, you didn't know that.
08:07Although the mayor does not find a hemp plantation, he still has the uneasy feeling that criminals may have settled in his city.
08:13Investigators from the Rhineland-Palatinate State Criminal Police Office also want to know more about what is on the servers.
08:23Observation, telecommunications surveillance, of course, you can't get to the systems you're actually interested in, the servers in the data center.
08:32And that's why they decided to start network node monitoring.
08:36The State Criminal Police Office (LKA) is making great efforts to monitor all data traffic entering and leaving the bunker.
08:42Much of the data is encrypted, but investigators uncover numerous criminal offenses.
08:48There were marketplaces for selling hacking tools, drugs, and a lot of phishing sites.
08:55But there were also simple attacks that were then carried out on the Internet, on potential companies, for example,
09:03where you could see exactly, these attacks were launched from IP addresses or servers hosted in the bunker.
09:08What the investigators don't know is who in the bunker has what role, who gives whom instructions.
09:15In order to clarify the internal structures, the LKA is taking a risky step.
09:19She actually put up a volunteer program on her website saying they were looking for someone.
09:24And that, of course, was the opportunity to infiltrate an undercover investigator.
09:28Harry, the investigator's code name, takes an unpaid job as a gardener.
09:35He quickly gains the trust of the Bunker Gang and gains insight into their abstruse world.
09:39They were probably inspired by other micronations, of which there are plenty, and then founded their own republic there with various claims,
09:52that it was their NATO land that was deserted and so they can claim it now, whatever they want.
09:57And then, of course, they gave themselves different roles, meaning they were assigned to different ministries.
10:00The problem? As a gardener, Harry has little access to the bunker itself. But the State Criminal Police Office has another ace up its sleeve.
10:10Since a cleaning lady is needed, Harry suggests his supposed girlfriend Julia.
10:16The cleaning lady was not subjected to any major controls and of course had access to all rooms and was able to move around freely.
10:23The undercover investigator takes photos of all the rooms, the server cabinets, data storage devices, and password lists.
10:30Harry and Julia work undercover in the cyberbunker for about a year.
10:36The State Criminal Police Office and the Public Prosecutor’s Office have been investigating the case together for over five years.
10:40Dr. Jörg Angerer heads the State Central Cybercrime Unit of the Koblenz Public Prosecutor’s Office.
10:47For him, the big question was: how can access be achieved?
10:51It was clear to us long in advance that a facility like the bunker could not be stormed.
10:56You can't just get in. It's designed so you can't get in.
11:00So it was clear to us that we had to use a list to ensure that the perpetrators were not in the bunker when we accessed it.
11:07If only because otherwise there is a risk that the servers will be shut down, and if they are encrypted, we will no longer be able to access the content.
11:13Undercover investigator Harry uses a trick to lure the criminal gang out of the bunker and into the city center.
11:19That's why Harry came up with a little legend and said that his father-in-law had died and that he had received a good inheritance.
11:29And since the group would appreciate it so much, she would like to invite them to dinner together.
11:33In September 2019, the dinner that brought about the decisive turning point in the Cyberbunker case took place at this inn in Traben-Trabach.
11:41Here at the end there was a long table, then there were several smaller tables where the police officers sat, and at the table the group itself sat.
11:52Yes, Harry then addressed a greeting to the group, saying again that he was happy that they were all able to come together.
11:58And a little later he was arrested by the suspected police officers.
12:01While Hermann X and seven other suspects are arrested in the restaurant, the raid on the bunker takes place at the same time.
12:14The bunker was empty and it wasn't designed to be left out and locked.
12:19There is usually always someone inside when it is used for military purposes.
12:22Therefore, it was not a big problem to get into the facility.
12:25What you see in the picture are the emergency vehicles that evening.
12:29As soon as the group left the bunker, we secured the facility so that no one could come back.
12:38650 police officers are involved in the operation.
12:53We actually waited across the street, all in our cars.
12:57It was all dark, you have to imagine.
12:59It was hard to notice how big this area actually is.
13:02And then at the end of this driveway we went up there until we stood in front of this metal door and wondered what was hidden behind it.
13:09For the first time, Harder Dauer and his colleagues enter the five-story bunker.
13:14Hermann X and his accomplices worked and partly also lived on 5,000 square meters.
13:20On the first level, for example, there was a kitchen, a lounge area, and fitness rooms that people had set up there.
13:30So the growing-up rooms were of course Mr. K***'s, his office alone with the eight screens, of which I don't think every single one was necessary.
13:37Even with a bar like that, in which he had various smartphones with apps running, he already had a lot of the feel of a Jim Bond stockbroker.
13:45His bedroom also stands out, of course, completely painted in black.
13:48On the third basement level, investigators find the server rooms. They reveal the full extent of the illegal data center.
14:00In total, just over 400 servers were installed in the bunker's server room.
14:06We have secured a total of two petabytes of data in the Cyberbunker, which is about two million gigabytes of data.
14:14That was an enormous amount, and we were surprised by the size; we hadn't expected so much.
14:18The investigators find crucial evidence on the servers.
14:22At least 240,000 crimes are said to have been committed via the sites hosted in the Cyberbunker.
14:31There were sites through which fraud was committed, there were many sites through which drug deals were committed.
14:38And there was also child pornography, even though the bunker operators had expressly ruled this out.
14:45The proceedings will take place at the Trier Regional Court from October 2020.
14:50In court, the main defendant, Hermann X, denied having known about the criminal content of the websites.
14:56It was still this, we knew nothing, and also a little bit of this, okay, he wants to make some kind of example of me in the city.
15:08I actually see myself more as an activist for internet freedom, and now I'm being unjustly summoned to a show trial.
15:14The main defendant, Hermann X, and seven accomplices receive prison sentences.
15:19But they are less than the prosecutor had hoped.
15:23The main defendant was sentenced to five years and nine months in prison for membership in the criminal organization.
15:30The Regional Court did not accept the accusation we also raised of aiding and abetting the main crimes of his clients, in particular drug trafficking, but acquitted him.
15:39The court stated that although the defendants generally knew that their servers were being used for criminal purposes,
15:46However, it could not be clearly proven that they intentionally assisted in specific crimes such as drug trafficking.
15:53For Martin Frost, one of the Cyberbunker's customers, things turn out differently.
15:58He is sentenced to seven years and nine months in prison for gang-related drug trafficking.
16:03He is currently serving his sentence.
16:05For public prosecutor Dr. Jörg Angerer, the entire proceedings are a major blow against cybercrime.
16:11We had extremely high personnel costs, we had high material costs.
16:16The network customer and monitoring alone cost a six-figure sum to even be able to do.
16:21So it was an extraordinary process that required a great deal of effort.
16:24And so, of course, the result was that there was a conviction; it was clearly a success for us.
16:30Hermann X and his accomplices are now free again.
16:35On their website they make it clear that the Cyberbunker project is not yet finished for them.
16:40That was also what was said by those involved or accused as convicted, we'll do it again right away.
16:50We haven't done anything wrong. Just keep your point of view.
16:55We can only hope that they never again come together in such a way that there are no longer any donors, no sources of money to finance it.
17:01Who the future owner of the bunker will be is still open.
17:04The site is currently up for sale again.
17:06The site is currently up for sale again.

Empfohlen