![]() ![]() The details of what is in the video change depending on who is doing the telling. It is discussed furtively in chat rooms and forums, on chans and in IRC.Ī few claim to have seen the video themselves, but most have only second-hand information from a ‘friend of a friend’. A screenshot acts as a preview, promising that the most sought-after video of the dark web may be just a click away.ĭaisy’s Destruction has become a dark web urban legend. ![]() On the screen, the cursor points to a link: Daisy’s Destruction Pt 1. The quiver in the senior constable’s finger is almost imperceptible as it hovers above the mouse. A few hours before deadline, thousands of people from around the world are in the dark web chat room, waiting for the show.Īt 00:01 UTC on 29 August 2015, the site updates: Let the Games Begin Vigilantes have captured ISIS terrorists, whom they promise to slowly torture to death, one by one.Īs the timer counts down, word is spreading across forums and chans, not only on the dark web, but on clear web (regular web) sites like reddit and Twitter. ![]() For another, these are no innocent victims to be tortured, sexually assaulted, mutilated and murdered. ![]() Thousands of people were watching as the broadcast of this Red Room drew closer.įor one, it is free. Red rooms are a staple of the dark web, a natural progression from tales of the snuff movie that have been part of popular culture for decades. In return they get to direct the action, choosing what happens next to the victim. The director is the voyeur willing to pay the most. A certain amount to watch passively more if you want to interact in the chat room with other viewers as the torture is being carried out. Rates vary from site to site, but payment is always a prerequisite. Those who want to watch pay the website owner in Bitcoins. ‘Red rooms’ promise pay-per-view torture, culminating in murder, of an unfortunate captive. “We will with official media pictures and ISIS propaganda material prove to you that we have 7 very real ISIS jihadists in our capture. The words that greet those who dare to enter the URL tell viewers what they can expect on 29 August: Free, BRUTAL, live! A countdown clock ticks towards the deadline. onion, signifying that only somebody who has downloaded the Tor software can get access. Propped against his feet, a piece of paper bears a handwritten message:Ī web address (URL) is also scrawled on the sign, but instead of. Beside him are two dog bowls, one filled with water, the other empty. Now the hitman-for-hire knows that we know.Ī hooded figure sits, defeated, in a concrete cell. In the few short months the site has been operational, the website has taken in hundreds of thousands of dollars. We have traced the Bitcoin that has been sent from around the world accompanying orders for the murder, beating or rape of spouses, business partners or scorned lovers. We have been watching every interaction between the most successful dark web murder-for-hire site in history and its customers. Monteiro and I have let ourselves into the back door of the Besa Mafia website, thanks to the assistance of a friendly hacker. As the day wears on and Yura’s offers are met with silence or a refusal, the emails take on an increasingly hysterical and menacing tone. Earlier emails had been all business, offering bribes if only I would stop reporting on the site’s nefarious activities. He calls himself Yura, so that is almost certainly not his name. On the other side of the world, I click on to the 15th email in as many hours from the administrator of the Besa Mafia website. And Pirate.London is Monteiro’s personal website. 10 April 2016.’īesa Mafia is a site on the dark web offering murder-for-hire services. A white sedan is engulfed in flames and the arsonist stands in front of it, his gloved hand holding a sign up to an unseen light so that the words are clearly displayed to the viewer as the car burns in the background: ‘Besa Mafia dedication to Pirate London. The video is substandard both in terms of plot and production values, but the content is chilling. When the two-minute show finishes, the cybersecurity expert restarts it, looking for signs that it has been faked. CHRIS Monteiro stares at his computer screen, heart in his mouth. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |