Language Selection

English French German Italian Portuguese Spanish

Web makes it easy to grow, sell pot

Filed under
Web

The world of marijuana trafficking once existed mostly in shady places where the right dealers hung out, or in exotic locales such as Amsterdam. But technology, which has revolutionized almost every other aspect of our world, has changed that.

Now, a simple search on an Internet search engine reveals a universe of online pot, including hundreds of Web sites offering to sell marijuana and paraphernalia such as bongs and marijuana seeds as well as free, detailed directions for growing marijuana.

The number of marijuana growers the Internet has instructed or how much marijuana changes hands online each year is unknown. But experts agree that the Internet has become the world's biggest head shop and that stemming that digital tide will be difficult for governments.

Drug users "can obtain whatever they want," on the Internet, "with more ease than in the conventional illicit street market," said the International Narcotics Control Board, an arm of the United Nations, in an April news release. The board said serious steps must be taken if governments hope to control the Web-based drug trade.

Allen St. Pierre, the director of the pro-legalization group National Organization for the Reform of Marijuana Laws, said there were at least 200 to 400 varieties of marijuana seeds available online, specially bred for every type of growing condition in North America.

Marijuana seeds' lack of odor and small size make them hard to detect in the mail, St. Pierre said.

Interstate marijuana trafficking carries a penalty of up to five years in jail and a possible $250,000 fine for first offenders, according to the Drug Enforcement Administration.

Easier for teens to acquire

Never before has so much drug culture been so readily available, especially to the estimated 21 million American teens using the Internet.

Marijuana use among 12th-graders has fallen 4 percentage points within the past year from its recent peak in 1997, but 34.3% of 12th-graders said in 2004 that they'd used the drug within the last year, according to Monitoring the Future, an annual survey of drug use. The survey is funded by a research grant from the National Institute on Drug Abuse, part of the National Institutes of Health.

Marijuana Web sites are particularly dangerous because parents don't realize their danger, said Tom Riley, a spokesman for the White House's Office of National Drug Control Policy. "Even parents who do realize that marijuana is a serious problem still think ... their teens are going to be exposed to marijuana from a shady character in the street -- not on the computer, possibly sitting a few feet away from them," he said. "It's a serious problem that this is on the Internet."

The DEA's hot line, 1-877-RxAbuse, part of the government's efforts to shut down illegal online pharmacies selling prescription drugs, also can be used to report marijuana Web sites, DEA spokesman Rusty Payne said.

BY ELY PORTILLO
KNIGHT RIDDER NEWSPAPERS

More in Tux Machines

Security: WPA2, RSA/TPM, and Microsoft Breach

  • Google and Apple yet to fix Wi-Fi hole in a billion devices

    The WPA2 security protocol has been a mandatory requirement for all devices using the Wi-Fi protocol since 2006, which translates into billions of laptops, mobiles and routers. The weakness identified by Mathy Vanhoef, a digital security researcher at the Catholic University of Leuven (KUL) in Belgium, lies in the way devices running WPA2 encrypt information.

  • The Flawed System Behind the Krack Wi-Fi Meltdown

    No software is perfect. Bugs are inevitable now and then. But experts say that software standards that impact millions of devices are too often developed behind closed doors, making it difficult for the broader security community to assess potential flaws and vulnerabilities early on. They can lack full documentation even months or years after their release.

  • Factorization Flaw in TPM Chips Makes Attacks on RSA Private Keys Feasible

    Security experts say the bug has been present since 2012 and found specifically in the Infineon’s Trusted Platform Module used on a large number of business-class HP, Lenovo and Fijitsu computers, Google Chromebooks as well as routers and IoT devices.

  • ROCA: RSA encryption key flaw puts 'millions' of devices at risk

    This results in cyber criminals computing the private part of an RSA key and affects chips manufactured from 2012 onwards, which are now commonplace in the industry.

  • Infineon RSA Key Generation Issue

    Yubico estimates that approximately 2% of YubiKey customers utilize the functionality affected by this issue. We have addressed this issue in all shipments of YubiKey 4, YubiKey 4 Nano, and YubiKey 4C, since June 6, 2017.

  • Microsoft remains tight-lipped about 2013 internal database hack [sic]

    A secretive internal database used by Microsoft to track bugs in its software was compromised by hackers [sic] in 2013.

  • Exclusive: Microsoft responded quietly after detecting secret database hack in 2013

    Microsoft Corp’s secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking [sic] group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.

Red Hat reduces IoT tradeoffs and Asia Coverage

  • Industry Spotlight: Red Hat reduces IoT tradeoffs
    Organizations rolling out the IoT usually aren’t prepared for the additional complexity. With the IoT, data volumes grow exponentially, infrastructure management gets more complicated and the security vulnerabilities increase disproportionately. Nevertheless, IT departments are expected to handle all these changes competently without proportional increases in budget or other resources.
  • Analyse Asia 211: Red Hat in Asia & Open Innovation Institute with Dirk-Peter van Leeuwen
    Dirk-Peter van Leeuwen, senior vice president & general manager at Redhat, Asia Pacific, joined us to discuss the company’s footprint across Asia and the recent launch of their new Open Innovation Institute in Singapore. We discuss how Asian companies are in different phases of digital transformation from culture to innovation and adjusting against digital disruption.

Samsung and Tizen: Bixby 2.0, Tizen 3.0, GNU/Linux on DeX

Ubuntu 17.10: What’s New? [Video]

It’s Artful Aardvark arrival day today (no, really!) and to mark the occasion we’ve made our first video in 3 years! Prime your eyeballs and pop in some earbuds as we (try to) bring you up to speed on what’s new in Ubuntu 17.10. At a smidgen over 3 minutes long we think our video is perfect for watching on your commute; when you’re bleary eyed in bed; or when you get the tl;dr feels thinking about our fuller, longer, and far wordier Ubuntu 17.10 review (due out shortly). Read more