Showing posts with label Silk Road. Show all posts
Showing posts with label Silk Road. Show all posts

Oct 25, 2013

FBI seizes over $27 million in bitcoins, likely from Silk Road suspect

When we left off earlier this month, the FBI had acknowledged that it seized over 26,000 bitcoins as part of its case against the Silk Road, the infamous Bitcoin- and Tor-fueled illicit marketplace.
But on Friday, an anonymous source at the FBI told Forbes that the agency has now also seized 144,000 bitcoins, worth over $27 million at current exchange rates.
The magazine reports:
The FBI official wouldn’t say how the agency had determined that the Bitcoin “wallet”–a collection of Bitcoins at a single address in the Bitcoin network–belonged to [suspect Ross Ulbricht], but that it was sure they were his. “This is his wallet,” said the FBI official. “We seized this from DPR,” the official added, referring to the pseudonym “the Dread Pirate Roberts,” which prosecutors say Ulbricht allegedly used while running the Silk Road.
When Ars called the FBI to confirm Forbes' report, Kelly J. Langmesser, a spokesperson for the FBI in New York, declined to comment.
Forbes also linked to a particular Bitcoin address, which received a massive influx of bitcoins within the last 24 hours. And just like the last time the Internet identified one of the accounts believed to be controlled by the feds, there have been new small donations to that account, ostensibly so that the donors can send comments to the owner of the account. For now, those comments appear only to be advertisements rather than insults, along the lines of "Get cheap USB hubs and networking equipment to your door in 2 days. Bitcoin only of course" and "www.zeroblock.com: Real-time Bitcoin market data and aggregated news feed."
So what will government authorities do with all these seized bitcoins once the case is wrapped up? They'll mostly likely just liquidate (read: sell) them, as with any other seized asset in a criminal case.

Oct 8, 2013

How the feds busted a top Silk Road seller

UK authorities also announce arrest of Silk Road sellers in Devon, Manchester. 
by Cyrus Farivar



900 suspected tablets of Alprazolam, aka Xanax, were sent to a suspected Silk Road seller in November 2012.

Authorities in the state of Washington arrested two people last week in connection with drug sales on the Silk Road, a clear indication of a crackdown on dealers using the notorious site. News of their arrest first broke late Monday evening.
According to a 16-page criminal complaint (PDF) dated October 2, 2013, the two suspects, Steven Lloyd Sadler and Jenna M. White, have been charged with conspiracy to distribute heroin, cocaine, and methamphetamine. Authorities believe that Sadler and White, arrested on October 2 and 3 respectively, are behind the “NOD” account on Silk Road, which was one of the “top sellers” on the site. (That account also had a thread under the Silk Road subreddit.)

From Pakistan to Seattle

The criminal complaint describes how authorities intercepted various packages from the United States Postal Service “mail stream,” using a combination of drug-sniffing dogs and parcel searches in September 2012. A postal inspector found one package that “contained similar handwriting, was of the same size, and bore the same type of postage stamp, compared to the first package that the inspector had opened without a warrant.”
Law enforcement agents did not find drugs in that second package, but they did find $3,200 in cash and a return address pointing authorities to an address at a UPS store, where one “Edward Harlow” had opened an account, as had one “Aaron Thompson.” UPS also revealed to authorities that “Thompson” had opened another box in Tukwila, Washington, another Seattle suburb.
By November 2012, the USPS intercepted another package sent from Pakistan addressed to Thompson's Tukwila UPS box. When it was searched by customs authorities, agents found “900 suspected tablets of Alprazolam.” Alprazolam is the generic name of Xanax, an anti-anxiety drug.
The following month, a postal employee at the Riverton Heights Post Office, in SeaTac, Washington, just south of Seattle, noticed that a “blond female” was purchasing stamps and dropping off packages with handwriting similar to the ones found on the previously inspected packages. That same employee noted that the blonde woman drove an Audi and wrote down its license plate number. From there, it appears that it was all downhill for the suspects.
Law enforcement ran the plate for the Audi, which turned up the name of Steven Sadler and a Bellevue, Washington address for his condominium, with other records searches confirming it was his residence. Based on "surveillance by law enforcement on multiple occasions," White appeared to also reside at the Bellevue condo.

DVD case as drug mule

With a photo of Sadler from the driver’s license database in hand, authorities checked with employees at the UPS store who confirmed that “Aaron Thompson” was indeed Steven Sadler. They also identified a blonde female “picking up and dropping off packages, and that she described herself as Thompson’s girlfriend.”
By February 2013, the UPS store had received a package for Aaron Thompson again. With a search warrant, authorities opened the package and found a “Sports Illustrated DVD,” which also contained “nine grams of a substance that field tested positive for methamphetamine.” In March 2013, authorities intercepted another package bound for Alaska, again with the same handwriting. In striking a deal with the recipient on reduced state felony charges, the Alaska man said that he had purchased the drugs from “NOD” on the Silk Road.
By May 2013, postal inspectors received warrants to put tracking devices on the Audi and another car associated with the suspects, a BMW. Not surprisingly, the suspects’ vehicles were seen consistently traveling to various post offices in the greater Seattle region. Authorities also conducted a controlled purchase via a confidential informant’s account in June 2013 from the NOD account.
Sadler was arrested on October 2, and White turned herself in the following day.
The suspects' next court hearings are set in for October 15 and 17, respectively.

Across the pond

On Tuesday, British authorities announced that they had also arrested four men “hours after the FBI arrested the suspected creator of the Silk Road” last week. In partnership with US authorities, the National Crime Agency (NCA) arrested three men from Manchester and one from Devon who they believed were “significant users” of the Silk Road.
NCA Director General Keith Bristow said in a statement that his agency would remain vigilant in arresting and prosecuting more people involved in the notorious site, promising more arrests down the road. "These arrests send a clear message to criminals,” he said. “The hidden Internet isn't hidden and your anonymous activity isn't anonymous. We know where you are, what you are doing, and we will catch you.”
https://dl-web.dropbox.com/get/img/Courtesy_arstechnica.PNG?w=AABDquFIucL3zTvawmlJe5QkJ8DpikPVXVIZ34Y15xnoQA

Oct 4, 2013

Internet lobs insults at FBI’s Silk Road Bitcoin wallet

"I THOUGHT OF SNIFFING FARTS WHILST SENDING THESE BITCOINS TO YOU." 
by Cyrus Farivar


Bitcoin enthusiasts appear to have located the wallet number of the federally controlled account that now contains over $3.5 million worth of the digital currency. That money is believed to have come from the seized accounts of the Silk Road website.
All Bitcoin transactions are public, but unless an account holder comes forward to say that they own a particular wallet, it is almost impossible to know with complete certainty who actually controls it.
A court document from earlier this week states that the United States claims the right to seize the Silk Road's assets. As the Protective Order states:
The United States is further authorized to seize any and all Bitcoins contained in wallet files residing on silk road servers, including those servers enumerated in the caption of this complaint, pending the outcome of this civil proceeding, by transferring the full account balance in each silk road wallet to a public Bitcoin address controlled by the United States.
Some of the users of Blockchain.info, a website that provides a graphical user interface for managing Bitcoin’s entire public ledger, have already dubbed this wallet “Silkroad Seized Coins,” adding a name to a field in the upper left of its webpage that ordinarily says “Bitcoin Address.”
As of this writing, the account holds 27,365.87749559 BTC.
Kelly Langmesser, an FBI spokesperson, told Ars on Thursday that the agency had seized "more than 26,000, estimated between $3.8 to $4 million," as part of the Silk Road case. She also noted that this was the first-ever seizure of bitcoins by the FBI.
Several people have even donated additional tiny amounts of money to the account, seemingly as a way to convey a message to federal authorities in the “public field” of the transaction.
Public Note: I THOUGHT OF SNIFFING FARTS WHILST SENDING THESE BITCOINS TO YOU
Public Note: hey computer geek, who control this address. "Ross Ulbricht" is not the bad guy, you are a bad guy. Please open your eyes, dont be brainwashed, and think your self!!!
However, Langmesser wrote to Ars on Friday saying that she was “not able to confirm” that this particular account that had drew so much attention on Blockchain.info was a federally controlled Bitcoin wallet.
"We are not confirming one account over another," she added.
Roger Ver, a spokesperson for Blockchain.info, told Ars that there was “strong correlation but no proof of causality.”
“The reported amount the FBI stole from [Silk Road] matches the approximate time and amount held in that address," he added.
The first transaction to that account was 47 different wallets transferring a total of 1,000 bitcoins on October 2, 2013 at 10:12:18 Greenwich Mean Time, or 6:12:18 Eastern Time, approximately 15 hours after the Silk Road suspect, Ross Ulbricht, was arrested in San Francisco. More transactions after that follow.
“I don't think there's any way to 100 percent know. But what else could it be?” Jerry Brito, a Bitcoin watcher and senior research fellow at the Mercatus Center at George Mason University, told Ars. “What's funny to me is that this shows how public and un-anonymous the Bitcoin network is. Even the federal government couldn't keep its transactions secret.”
https://dl-web.dropbox.com/get/img/Courtesy_arstechnica.PNG?w=AABDquFIucL3zTvawmlJe5QkJ8DpikPVXVIZ34Y15xnoQA

Silk Road kingpin, shackled in court, pleads for time

"There's a murder-for-hire charge," said the judge, who still granted a delay. 
by Joe Mullin

SAN FRANCISCO—Ross Ulbricht, the 29-year-old alleged to have run the Silk Road online drug marketplace, wants a little more time.
Ulbricht appeared in a federal courtroom this morning, wearing a red jumpsuit reading "XXL—Alameda County Jail" and what appeared to be a green T-shirt underneath. His case was called first, and he shuffled with small steps into court; he was shackled at the feet but his hands were free. He looked every part the San Francisco hipster you might see in any one of a hundred local coffee shops, clean-shaven and with mildly shaggy hair.
On Wednesday, federal authorities filed a 32-page complaint against Ulbricht, accusing him of narcotics trafficking and money laundering, as well as soliciting the murder of another Silk Road user. Authorities said that Ulbricht was the mastermind behind the infamous Silk Road marketplace, which was also shut down on Wednesday, and its Tor-enabled domain name was seized.
Today's procedure was a detention hearing, and Ulbricht was called first. His lawyer, federal public defender Brandon LeBlanc, asked the magistrate judge overseeing the case for more time. "We want to put together the best possible bail proposal for the court," said LeBlanc. He added that his office will be seeking some additional discovery from the prosecution.
"There's no entitlement to pre-detention-hearing discovery," countered the prosecutor arguing at the hearing, Randall Luskey. "The government is not obligated to get discovery from SDNY (Southern District of New York)."
"I don't know what you're going to accomplish in the next several days," Magistrate Judge Joseph Spero told LeBlanc.
There is a "risk of flight danger," noted the prosecutor.
"What does the indictment in Maryland do here?" asked Spero. "There's a murder-for-hire charge."
The prosecution made it clear they're eager to transfer the defendant to New York. Spero, skeptical of what LeBlanc could put together in a few days, surprisingly granted the extension.
Ulbricht is scheduled to appear again at 9am on Wednesday October 9.
Outside court, a gaggle of about a dozen reporters waited for the lawyers in the case. LeBlanc came out first and said little.
"There are a lot of charges here," he said. "We deny all charges. That's the end of the discussion."
Luskey said nothing at all, referring all inquiries to the US Attorney's office.
Mike Gogulski, a man based in Slovakia has already started a "Free Ross" campaign, and claims to be in touch with Ulbricht's family. (Gogulski's own website details his anarchist/libertarian leanings, which could indicate a political kinship with a site like the Silk Road, which sold all kinds of illegal drugs.)
In a Friday blog post, Gogulski writes that Ulbricht's parents "say that there is no chance he ever ordered a murder-for-hire and that they have legally-admissible evidence to prove it."
Courtesy: arstechnica

Oct 3, 2013

Bitcoin Talk forum hacked hours after making cameo in Silk Road takedown

Database of private messages and password data may be in the wild, admins warn. 

Just hours after it played a supporting role in the takedown of the Silk Road drug empire, the Bitcointalk.org website suffered a hack that exposed users' personal messages, e-mails, and password data.
"To be safe, it is recommended that all Bitcoin Forum users consider any password used on the Bitcoin Forum in 2013 to be insecure," an e-mail sent to registered users stated. "If you used this password on a different site, change it. When the Bitcoin Forum returns, change your password."
User passwords were cryptographically protected using 7,500 rounds of the SHA256crypt hash function, Bitcoin Talk administrator Theymos said in a forum on reddit. That's a significant measure that could add decades or even centuries to the task of cracking passcodes that are at least nine characters and randomly generated. Still, the hack could be damaging to the privacy of users who stored sensitive communications on the site. Bitcoin Talk administrators are in the process of figuring out how the compromise happened and don't plan to restore service until after the security hole is plugged.

bitcointalk.org defaced

People who visited the site after it was hacked were greeted by cartoon images of missiles that appeared over Tchaikovsky's classical music opus 1812 Overture. A pop-up caption at one point read: "Hello friend, Bitcoin has been seized by the FBI for being illegal. Thanks, bye."
Bitcoin Talk was one of the sites on which alleged Silk Road kingpin Ross William Ulbricht used his real identity to post messages. Federal prosecutors cited the post, which solicited an "IT pro in the Bitcoin community" to work on a venture-backed startup, as evidence that Ulbricht was the same person who went by the handle "Dread Pirate Roberts" and ran the $1.2 billion Silk Road bazaar.
Courtesy: arstechnica

Oct 2, 2013

Feds: Silk Road boss paid $80,000 for snitch’s torture and murder

"I'm pissed I had to kill him...but what's done is done," he allegedly laments. 

The kingpin of the Silk Road drug empire paid $80,000 to commission the torture and murder of an employee suspected of cheating customers in a deal gone bad, federal prosecutors alleged.
Ross William Ulbricht ordered the hit against an employee who took delivery of a kilogram of cocaine valued at $27,000, according to a superseding indictment filed in federal court in Maryland. Shortly after receipt, the employee came under suspicion of stealing from other Silk Road members after he was arrested by law enforcement authorities, prosecutors said. Communicating with an undercover law enforcement agent posing as a drug smuggler, Dread Pirate Roberts—the online moniker prosecutors say Ulbricht used as leader of Silk Road—first asked that the suspected employee be beaten and forced to return the stolen Bitcoins. Soon, the indictment alleged, the kingpin changed his mind.
"Can you change the order to execute rather than torture?" Ulbricht allegedly asked in January. The employee—who prosecutors said had access to private messages sent by all Silk Road users including its boss—"was on the inside for a while, and now that he's been arrested, I'm afraid he'll give up info." Dread Pirate Roberts, who agreed to pay $40,000 in advance and another $40,000 when the hit was completed, added he had "never killed before, but it is the right move in this case," the indictment added.
[puamelia]
On February 4, Dread Pirate Roberts allegedly transferred $40,000 into a bank account controlled by the undercover agent. On March 1, Dread Pirate Roberts had the remainder deposited into the account after he received a staged photo that purported to depict the body of the employee who had died of asphyxiation and heart rupture after being tortured.
"I'm pissed I had to kill him ... but what's done is done," Dread Pirate Roberts allegedly wrote after receiving the image. "I just can't believe he was so stupid. I just wish more people had some integrity."

“This kind of behavior is unforgivable to me”

The indictment isn't the first court document to level chilling murder-for-hire allegations against Ulbricht. A separate 39-page criminal complaint claims that two months later Ulbricht ordered a $150,000 hit on a Silk Road user known as FriendlyChemist. The murder was ordered after FriendlyChemist hacked into the computer of a large Silk Road drug dealer and provided Ulbricht with a sample of usernames, addresses, and order information to prove it. FriendlyChemist threatened to publish the data unless he was paid $500,000.
"This kind of behavior is unforgivable to me," Ulbricht told a Silk Road user named redandwhite, according to the complaint. "Especially here on Silk Road, anonymity is sacrosanct." Referring to the hit, he went on to say "it doesn't have to be clean."
There is no evidence the hit was ever carried out. Authorities in White Rock, British Columbia, where Dread Pirate Roberts said FriendlyChemist lived with a wife and three children, have no record of a homicide occurring on March 31, the date redandwhite told Dread Pirate Roberts the man was executed. Ulbricht is scheduled to make his first court appearance Friday. He has not entered a plea or commented on the allegations.
Courtesy: arstechnica

FBI: Silk Road mastermind couldn’t even keep himself anonymous online

Memo to online crooks: Forget Tor exploits, sloppy opsec will get you every time. 

What will get you in the end is sloppy opsec. Short for operations security, it encompasses a sprawling list of disciplines, including keeping PCs free of malware, encrypting e-mail and other communications, and placing an impenetrable firewall between public and personal identities.
The latest high-profile criminal defendant to get a first-hand lesson in the perils of poor opsec is Ross William Ulbricht. The 29-year-old Texan was arrested on Tuesday on allegations he was the kingpin behind Silk Road, an online drug bazaar prosecutors said arranged more than $1 billion in sales of heroin and other illicit substances to hundreds of thousands of buyers. A 39-page complaint alleges that he was known as "Dread Pirate Roberts" in Silk Road forums. A FBI agent went on to say Ulbricht controlled every aspect of the site, including crucial server infrastructure and programming code that used the Tor anonymity service and Bitcoin digital currency to conceal the identities of operators, sellers, and buyers.
Despite the elaborate technical underpinnings, however, the complaint portrays Ulbricht as a drug lord who made rookie mistakes. In an October 11, 2011 posting to a Bitcoin Talk forum, for instance, a user called "altoid" advertised he was looking for an "IT pro in the Bitcoin community" to work in a venture-backed startup. The post directed applications to send responses to "rossulbricht at gmail dot com." It came about nine months after two previous posts—also made by a user "altoid," to shroomery.org and Bitcoin Talk—were among the first to advertise a hidden Tor service that operated as a kind of "anonymous amazon.com." Both of the earlier posts referenced silkroad420.wordpress.com.
If altoid's solicitation for a Bitcoin-conversant IT Pro wasn't enough to make Ulbricht a person of interest in the FBI's ongoing probe, other digital bread crumbs were sure to arouse agents' suspicions. The Google+ profile tied to the rossubicht@gmail.com address included a list of favorite videos originating from mises.org, a website of the "Mises Institute." The site billed itself as the "world center of the Austrian School of economics" and contained a user profile for one Ross Ulbricht. Several Dread Pirate Roberts postings on Silk Road cited the "Austrian Economic theory" and the works of Mises Institute economists Ludwig von Mises and Murray Rothbard in providing the guiding principles for the illicit drug market.
The clues didn't stop there. In early March 2012 someone created an account on StackOverflow with the username Ross Ulbricht and the rossubicht@gmail.com address, the criminal complaint alleged. On March 16 at 8:39 in the morning, the account was used to post a message titled "How can I connect to a Tor hidden service using curl in php?" Less than one minute later, the account was updated to change the user name from Ross Ulbricht to "frosty." Several weeks later, the account was again updated, this time to replace the Ulbricht gmail address with frosty@frosty.com. In July 2013, a forensic analysis of the hard drives used to run one of the Silk Road servers revealed a PHP script based on curl that contained code that was identical to that included in the Stack Overflow discussion, the complaint alleged.

A cautionary tale

The sloppiness portrayed in the court documents is by no means unique to the Silk Road case. Indeed, Hector "Sabu" Monsegur, one of the leaders behind a spree of crimes carried out by Anonymous offshoot Lulzsec, reportedly accidentally joined an Anonymous IRC server from his own IP address rather than connecting through Tor. If that single error wasn't enough for authorities to identify him, Monsegur's fate was sealed when the prvt.org Internet domain frequently referenced by Sabu was briefly tied to Monsegur's real-world persona.
A gang accused in 2010 of perpetrating a $4 million fraudulent tax return racket was also undone when one of its member allegedly failed to hide his home IP address in communications with an informant.
Wednesday's complaint comes a two months after FBI agents exploited a vulnerability in the Firefox browser to unmask Tor users suspected of participating in a child pornography site. There's no evidence Silk Road was brought down through similar tactics, although at this early stage they can't be ruled out conclusively. What is more in evidence is that, like Monsegur and countless other criminal defendants before him, Ulbricht's lack of opsec was key in drawing the attention of investigators.
The complaint reads as a cautionary tale about the asymmetrical challenge in staying truly anonymous on the Internet, even when government agents or other snoops don't exploit obscure vulnerabilities or wield the massive surveillance apparatus of the National Security Agency. End users have to get it right every single time they go online without slipping up, even once. The FBI and even grassroots investigators with the time to look, only need to stay vigilant and wait to get lucky.
Courtesy: arstechnica

Feds Nab Alleged Leader of “Silk Road” Online Drug Market

Federal agents in San Francisco arrested the alleged ringleader Tuesday of a secretive Internet drug market known as the “Silk Road,” seizing $3.6 million in digital currency, according to a criminal complaint unsealed Wednesday.
The case offers fresh evidence that the U.S. government can sometimes track down cyber criminals even if they use advanced encryption techniques and other methods meant to keep Internet traffic anonymous.
Courtesy: allthingsd


Powered by Blogger.

 

© 2013 Technology Update News!. All rights resevered. Designed by BDpython

Back To Top