Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Fake UK passports for sale just fill in your info on the dark web

Courier reporters Graeme Ogston and Stefan Morkis found a thriving black market on the dark web, including sites offering fake UK passports and firearms for sale.
Courier reporters Graeme Ogston and Stefan Morkis found a thriving black market on the dark web, including sites offering fake UK passports and firearms for sale.

Custom-made fake UK passports designed to fool border security are on sale for £2,000 on the ‘dark web’, a Courier investigation has discovered.

The Home Office has launched a probe after we highlighted the site which also claims to enter the buyer’s details into the official UK Passport database.

Within minutes of logging on to the dark web, The Courier found thriving black market sites touting firearms, controlled drugs and hacked credit card details.

The sites exist beyond conventional internet searches and are only accessible by installing specialised computer software.

But we soon arrived at a nameless site offering an “original UK passport with your info/pictures” which boasted it was “ideal for people who want to work in the EU/UK”.

The site claimed: “Your info will get entered into the official passport database. So, it’s possible to travel with our passports.”

It said the method for achieving this was a “trade secret” adding: “You can even enter the UK/EU with our passports, we can just add a stamp for the country you are in.”

Purchases can only be made using the anonymous currency Bitcoin.

The Home Office insisted that individuals are only added to the HM Passport Office database when a passport is issued by them and that safeguards are in place to prevent fraud.

A Home Office spokesman said: “Fraudulent passports are an issue we take extremely seriously.

“The British passport is one of the most secure and trusted documents in the world, and we continue to combat evolving threats to its integrity from criminals by keeping our anti-fraud measures under constant review.

“We work closely with partner agencies to share intelligence and every passport is checked on arrival in the UK against a number of watch lists.

“Anyone involved in the supply of forged or counterfeit documents faces prosecution.”

The refugee crisis in Syria has led to a booming trade in fake Syrian passports across the Arab world. Border agency Frontec said they are sought after because anyone holding one can claim asylum in the European Union.Tangled web can hide sinister behaviourIts name is synonymous with drug trafficking, child pornography and other illegal activities.

But the dark web was not created as part of any grand criminal scheme it was the US Navy which instigated its creation.

US Naval Research was commissioned to come up with a way of using the internet to communicate with intelligence assets overseas without being monitored.

This led to the idea of using “onion routers” which sends information through thousands of different relays between their origin and destination, making it impossible to determine where messages are coming from or going to.

The web pages themselves are not hidden they can be viewed by anyone with a special internet browser but it makes tracing users all but impossible.

The most popular of these browsers, called Tor, was initially developed by US Naval Research, and the US Department of State remains one of its principal funders today.

Dundee-based IT expert Chris Kelly said: “The dark web has two means the first is very much the illicit side of the internet where people want to operate anonymously.

“Typically criminals, black market, gangs can operate without their data necessarily being compromised by security services or the Government.

“It’s not fool-proof by any means but it’s as close as there is currently.

“It has a legitimate use for whistleblowers, organisations who want to share very sensitive data like Wikileaks, to bypass the internet firewall of China. To aid people to access the internet in its entirety and avoid censorship.

“With Tor, your traffic goes to Tor and then a series of relays. So when someone like the FBI tries to figure out who you are, it just shows a number of random bits that may or may not be that individual. It’s not enough to decrypt the end point, you’ve got to decrypt each relay individually.”

Accessing the dark web is so complicated that nobody can accidentally wander down its by-roads.

Mr Kelly said: “It’s a fairly explicit action on the part of the user.

“A chunk of people will download it purely to prevent Google tracking them for advertising purposes.”