Illicit markets in the country are instead dominated by loose criminal networks, operating both nationally and transnationally, many of which are formed along ethnic or familial lines. Although competition and subsequent violence among competing networks is less present than in other countries in the region, there has been an increase in murder and other forms of violence perpetrated by criminal networks in recent years. Two metal detectors, shovels, and several excavated objects were found with the suspects. Cyber threat intelligence (CTI) helps organizations predict, understand, and defend against cyber threats, enabling proactive protection and reducing the impact of attacks. In this system, cryptocurrency is held by a trusted third party until the buyer receives the product or service as described. Dark markets, as well as various other services within darknets, are hosted as ‘hidden services’.
With over 20 years of experience in cybersecurity and marketing, Ben has held leadership roles at companies like Check Point, Cognyte, Cylus, and Ionix. Although some of these markets prohibit certain extreme content such as violence or exploitation, most operate with very few rules beyond ensuring the security and anonymity of their users. Cooperation between competent authorities is governed by national laws and memorandums of understanding. Communication and coordination mechanisms among these authorities, both at the policy and operational levels, are supported by the National Strategy for Enhancing Financial Investigation Capabilities, adopted by the government in September 2021. And yet, when the regime seemed primed to survive yet another crisis, it suddenly fell apart.

Financial Intelligence
Each chapter offers an exploration of a different site where finance and politics collided and intertwined. The narrative chronicles how Macedonia’s authoritarian regime rode a wave of financial expansion to deepen its reach into Macedonian society, only to discover that, like other speculative bubbles, its domination was always on the verge of collapse. The degree non-state actors are allowed to engage in OC responses and their roles in supporting State efforts/ as watchdogs to governments. Refers to a state’s judiciary’s power to effectively and independently enforce judgments on organized crime-related cases.
- In 2014, the Serbian daily Blic reported that more than 10 valuable religious objects had been stolen from churches in North Macedonia over the previous decade.
- However, engaging in illegal activities on the darknet is against the law and can result in serious criminal charges.
- While law enforcement regularly shuts down illegal marketplaces, the underlying infrastructure remains functional.
- When one goes down, two more emerge with new ideas, better technology, and greater difficulty to track.
- According to the authorities, some of the financial intelligence units of the various countries do not forward quality information or are late with responses.
Criminal Complaint Against Former Director Of A Branch Of NP “National Forests” In Macedonia
- North Macedonia has implemented several programmes to strengthen its capabilities against IFFs.
- The Criminal Code allows for the confiscation of property derived from crime, proceeds of crime and instrumentalities used in criminal activities.
- Nevertheless, the police continue with attempts to prosecute traffickers and recover artifacts.
- The role of civil society in the fight against IFFs is important becaue it contributes to increasing awareness, conducting studies and uncovering cases.
- We’re back with another video in our Webz Insider video series on everything web data.
The country’s tools for freezing, handling and confiscating criminal assets are not adequate and the anti-money laundering legislation is not aligned with the EU acquis. It has built a reputation for being a reliable source of stolen credit card data and PII. Renowned for its extensive inventory of financial data and sophisticated operating methods, Brian’s Club is a key player in the underground economy of financial cybercrime.
Mickoski, Ali Rashed Luta: As A Government, We Are Business-oriented

Investigative journalism, supported by organisations such as these shine the spotlight on financial malpractice, promoting transparency, accountability and public understanding of corruption and IFFs. Collaborative initiatives and an interdisciplinary approach strengthen the media’s role in building trust and bringing about positive social change. This innovative and interdisciplinary approach involves reporters’ cooperation with academics, technology experts, marketing experts, bloggers and civil society activists.

Anonymity Through Tor
For those who had engineered the neo-baroque façades of Skopje 2014, however, Macedonia’s construction and financial expansion had been highly lucrative. The beat of sledgehammers covered networks of racketeering, forced acquisition, political violence, arrests, indiscriminate wiretapping, and intimidation. With each euro that went into Skopje’s urban spaces, Gruevski’s regime acquired a physical presence—appearing to be strong, real, and inevitable. The country has made excellent progress on improving the media environment, and though physical attacks on journalists have decreased, there is still a tendency of online abuse towards the media.
These anonymous marketplaces—operating mainly on the Tor network—are now a primary threat vector for businesses and cybersecurity professionals. The AML/CFT law was amended in October 2024 in order to further align it with EU legislation and recommendations from the mutual evaluation report, improving the prescribed standards among other things needed to join the Single European Payments Area. Most financial institutions carry out adequate ongoing monitoring based on the risk profile of their customers and generally use analysis and cross-checking of different data sources.
Discover More About Threat Intelligence

It is considered a go-to site for malware purchasing, providing keyloggers, trojans, and other Malware as a Service products. Established in 2022, WizardShop is one of the biggest data stores on the dark web, focusing mainly on carding and financial data. A Canadian market established in 2021, WTN offers over 9,000 products, including narcotics, fake goods, and digital services. Ethically, they must minimize harm, responsibly handle any stolen or sensitive data (often notifying victims or law enforcement), avoid entrapment, and maintain research integrity.

Smuggling Of Antiquities Threatens North Macedonia’s Cultural Heritage
The platform’s popularity continues to grow, attracting both new and returning customers. Its focus on financial fraud and high-value transactions has attracted a dedicated user base, contributing to its growing reputation and market value. Valued at approximately $15 million, Abacus Market is one of the most lucrative platforms in the dark web ecosystem. In 2024, the platform grew significantly in popularity, partly because of its strategic acquisition of users from a number of recently shut-down marketplaces, such as AlphaBay and Incognito Market, which had recently closed their doors.
These institutions are reported to have sufficient technical and human resource capacity. A major challenge, however, is the monitoring of IFFs conducted through online platforms such as PayPal, Payoneer and blockchain transactions, as well as cash circulating within the informal economy and the hawala system. In response, cybersecurity professionals, law enforcement agencies, and policymakers around the world are working to combat this growing menace.
These digital currencies provide a degree of anonymity, as transactions are recorded on a public ledger but do not directly link users to their real-world identities. To purchase illicit goods or services, users deposit cryptocurrency into an escrow system or directly to the seller, and the cryptocurrency is held until the buyer confirms the satisfaction of the transaction. Despite a relatively low risk of money laundering, improvements need to be made with the supervision of the non-banking financial sector and in providing the necessary resources to ensure successful implementation of legislation. Money laundering in North Macedonia is often linked to financial crimes such as tax evasion and smuggling and a small portion is connected to narcotics trafficking.
Poland Neutralizes Drone Over Presidential Palace And Government Buildings
Between then and 2014, the police carried out several major operations to expose artifact smugglers. The operations ‘Phalanga’ and ‘Apollo’ brought down a network of organized crime schemes that, in addition to illegally procuring archaeological and historical objects, were offering icons for sale that had been stolen from churches. Investigations also showed that the suspects had used highly sophisticated equipment to locate metal objects buried in graves.
Today, darknets are populated by a vast array of users, ranging from privacy-conscious individuals to cybercriminals, hacktivists, and nation-state actors. These hidden networks provide a platform for illegal activities that include the sale of stolen data, hacking tools, weapons, counterfeit currency, and narcotics. Dark markets, often accessed through specialized marketplaces within darknets, are breeding grounds for underground economies, where users can engage in transactions while evading law enforcement and ethical oversight. These two things – public awareness and international cooperation – are essential for disrupting the illegal artifact trade in North Macedonia. A lack of awareness and neglect of cultural heritage accompanied by weak institutions enables criminals to exploit opportunities that are often overlooked or even facilitated by law enforcement and government ministers due to corruption or poor governance. These two things – public awareness and international cooperation – are essential for disrupting the illegal artefact trade in North Macedonia.
The result, in a country subject to a legacy of financial marginality, was a specific kind of illiquidity in which credit relationships expanded but the flow of money remained centralized and restricted. For a decade, illiquidity allowed the Macedonian government to monopolize the money supply and force businesses and individuals to embrace illiberal politics. Amplifying rather than resolving the financial exploitation felt in Macedonia, illiquidity disguised the regime’s structural dependencies—until the regime was no more.

