Breaking: Silk Road Shut Down. "Dread Pirate Roberts" in Custody

How am I going to communicate with extra-dimensional aliens without my DMT?
 
The complaint estimates that Silk Road has processed transactions worth over a total of 9.5 million Bitcoins, which adds up to roughly $1.2 billion in sales.

False. Most of the 9.5 million that moved around were at 2011-2012 rates, not todays rates.
 
A pirate of near-mythical reputation, The Dread Pirate Roberts is feared across the seven seas for his ruthlessness and swordfighting prowess, and is well known for taking no prisoners.

It is revealed during the course of the story that Roberts is not one man, but a series of individuals who periodically pass the name and reputation to a chosen successor. Everyone except the successor and the former Roberts is then released at a convenient port, and a new crew is hired. The former Roberts stays aboard as first mate, referring to his successor as "Captain Roberts", and thereby establishing the new Roberts' persona. After the crew is convinced, the former Roberts leaves the ship and retires on his earnings.

http://en.wikipedia.org/wiki/Dread_Pirate_Roberts
 
Animation?
"You keep using dah whord. I doo no think ih means wha you think ih means."

If you haven't seen The Princess Bride - the live action movie directed by Rob Reiner and starring Robin Wright, Cary Elwes, Mandy Patinkin, Andre the Giant, and a host of others... then you need to get it and watch it. It contains the single most badass swordfight ever committed to film.

And is one of the most quoted films of all time.
 
$3.9 million in BTC seized. I wish there was a way for it to just be deleted to keep it out of the Fed's hands.
 
BREAKING: More Silk Road Arrests

AP reports:

Authorities in Britain, Sweden, and the United States have arrested eight more people following last week's closure of Silk Road, a notorious black market website which helped dealers to sell drugs under the cloak of anonymity, officials and media said Tuesday.

In the U.K., the country's newly-established National Crime Agency warned that more arrests were on the way[...]

Britain's National Crime Agency said it had seized millions of pounds (dollars) worth of bitcoins, the electronic currency used on the site, and the agency's director general, Keith Bristow, said in a statement that other online drug dealers should expect a knock on their door.

"These latest arrests are just the start; there are many more to come," he said.

UPDATE 1

Via AP:

U.S. authorities have charged two people in Bellevue, Washington, a city just east of Seattle, after identifying one of them as a top seller on Silk Road. He was arrested on Oct. 2, while his alleged accomplice turned herself in the next day.

In Sweden, two men from the coastal city of Helsingborg were arrested on suspicion of distributing cannabis over Silk Road, the local Helsingborgs Dagblad reported Tuesday. The newspaper did not say when the pair had been detained.

UPDATE 2

Via the BBC:

Four men have been arrested in the UK over their role in illegal online marketplace Silk Road.

Three men in their early 20s were arrested in Manchester while a fourth man, in his 50s, was detained in Devon.

The men were initially arrested on suspicion of drug offences. More arrests are expected in the coming weeks.

Such sites would be a "key priority" for the UK's National Crime Agency (NCA), its director general said.

The Silk Road, one of the world's largest websites selling illegal drugs, has now been closed down.

Ross Ulbricht, the alleged operator of the site was arrested in San Francisco by the FBI at the beginning of October.

Last week 40-year-old Steven Lloyd Sadler was arrested in Seattle. He is alleged to be one of the most prolific sellers on the Silk Road.

http://www.economicpolicyjournal.com/2013/10/breaking-more-silk-road-arrests.html
 
"Any Large Sellers on Silk Road Should Be Very Nervous"

Far from being an anonymous online operation, it appears that the FBI has been monitoring, for an extended period of time, operations on Silk Road. Unless a user of Silk Road was using extraordinary precautions, most Silk Road users have likely been identified by the FBI.

Were you a user of the exchange and will the FBI come knocking on your door? It just depends how far down the food chain the FBI wants to go. Note: Those who taunted the FBI by sending messages to the FBI Bitcoin wallet, should consider themselves at the top of the list, if they also used Silk Road for any illegal activities. As I have stated many times since the arrest of Adam Kokesh, it is not a very bright idea to taunt the government directly. As Noam Chomsky put it, "I don't want to speak truth to power, I want to speak truth to the people."

USA Today reports:
Officials say the black market website brokered more than $1 billion in sales before the FBI collared Ulbricht at a public library on Oct. 1. In its complaint, the bureau said it had managed to copy the contents of the site's server — something one expert said would likely provide international authorities with detailed information about the site's dealers.

"Any large sellers on Silk Road should be very nervous," said Nicholas Weaver, a researcher with the International Computer Science Institute in Berkeley and the University of California, San Diego.​

http://www.economicpolicyjournal.com/2013/10/any-large-sellers-on-silk-road-should.html
 
Very bad news. If I were a seller of anything on SR, I'd be in hiding right now, regardless of legality.
 
I actually had a small amount of bitcoin in a wallet on silk road, but i never sold or bought anything illegal. I wonder if I should ask the FBI for my money back that they stole from me.

I read an article that DRP has about $80 million in bitcoin and the feds can't get figure out how to get access to it. DRP will probably never get it back, but hopefully the feds don't get it either.
 
Most likely DPR used proper security for his wallets, meaning they were encrypted and stored offline, hidden.

If the Feds don't have the private keys of his addresses they can do nothing with the money, end of story.
 
Silk Road: suspicions grow that server was hacked ahead of arrests
How do you find a site that's hosted on the Tor system? In theory, you can't - which is why there are questions over how the FBI could image it and take it down last week
Follow Charles Arthur by emailBETA
Share 80


1
inShare
14
Email
Charles Arthur
Charles Arthur
theguardian.com, Tuesday 8 October 2013 09.49 EDT
Jump to comments (48)
Silk Road seizure
Silk Road website now shows seizure notice from the FBI, IRS and DEA. But how did they manage to find it? Photograph: /PR
There's a new theory about how the FBI And CIA tracked down the physical location of the Silk Road servers, and it has nothing to do with the man accused of being the site's operator, Ross Ulbricht, or queries he might have made on StackExchange.

Instead, the rumour in hacker circles is that the CIA - with or without the help of the National Security Agency - accessed the server via Tor, and somehow ran an exploit on it which meant that they could locate it over the "normal" internet.

Having done that, they then got in touch with the company hosting the server itself (which may be in Iceland, as we'll explain) and then managed to take an image of the server. They may also have planted tracking systems on the server which allowed them to trace those who logged in to Silk Road - which would certainly help to explain how the British police last week arrested four men on suspicion of supplying controlled substances through Silk Road.

That was the suggestion last week from Nicholas Weaver, when the news broke.

Weaver, who is based at the International Computer Science Institute, commented on a piece about the initial arrest that

the biggest weakness of the complaint (which is not something that really needs to be answered here, but will need to be answered in court) is how the Silk Road server was discovered.

I would suspect that, since it was imaged without being noticed that what happened is the FBI (with a warrant) hacked the site sufficient to discover the site's IP by generating a non-Tor phone-home, and then contacted the country of the hosting provider which then got the server imaged.

Yet since the server imaging didn't involve taking the server down or disrupting service sufficient to spook Mr DPR into taking his bitcoins and running, I suspect that this was some virtual-machine hosting provider.

Now, that's not how it was done according to the affidavit filed last week by FBI agent Christopher Tarbell. That points to Ulbricht's LinkedIn profile, his use of a real photograph in a package of fake IDs (which it is claimed led Homeland Security to Ulbricht's address), his queries on StackExchange under his own name (which he then changed) about connecting to Tor via PHP, his seeking out of courier firms, and paying someone to murder someone else.

It also describes how agents tracked back to early promotion for the Silk Road site and found messages posted on drug discussion forums and Wordpress blogs by a user called "altoid", which was found to be linked to a Gmail address, apparently registered to Ulbricht.

Ulbricht faces charges of money laundering, narcotis trafficking, computer hacking and soliciting a murder. A lawyer for Ulbricht last week said "We deny all charges".

But Tarbell's description doesn't contain the chain of evidence that one would expect for an arrest - and a breakthrough - of this magnitude. Putting together the fragments of evidence contained in the affidavits, one doesn't get a picture of someone who is self-evidently the "Dread Pirate Roberts" who operated Silk Road.

One other matter that isn't widely known: the initial affidavit doesn't have to describe how the FBI actually built its case. It only has to describe how it could have built its case, and persuade a judge to sign an arrest warrant.

That is why suspicion is growing that the Silk Road servers were actually quietly hacked, and were exploited to reveal details about their users.

Those suspicions won't have been eased by the comments of the director general of the UK's new National Crime Agency, Keith Bristow, who said of the arrest of the four Britons that "the hidden internet isn't hidden and your anonymous activity isn't anonymous. We know where you are, what you are doing and we will catch you."

Some internet sleuthing, meanwhile, suggests that the Silk Road server itself may have been hosted in Iceland: Runa Sandvik, who works on the Tor Project, notes that there's an Icelandic server at https://193.107.86.49/ which has a self-signed certificate, and redirects to silkroadvb5piz3r.onion - the Silk Road website.

But, Sandvik points out, the FBI affidavit says that the server was imaged (ie copied) as part of a Mutual Legal Assistance Treaty request - and Iceland doesn't appear to be a signatory to a MLAT with the US. "That leaves us with Latvia and Romania, Sandvik comments.

So we're left with uncertainty which might not be answered until the FBI brings its full charges to the courtroom. Did a US agency use an exploit - perhaps even a zero-day one (ie, not previously notified) to hack the Silk Road server, and so gain access to details about who was accessing the server - and then follow the trail back to its alleged owner and users? Or was the takedown of Silk Road the result of painstaking piece-by-piece detective work? This is a trial which will be watched with great interest.

http://www.theguardian.com/technology/2013/oct/08/silk-road-hack-suspicion-fbi-server
 
Here's the infamous gangster! lol

2247810e-7625-43d0-b66b-d5c535d6460b-460x276.jpeg


FBI having trouble taking his bitcoins
http://www.theguardian.com/technology/2013/oct/07/fbi-bitcoin-silk-road-ross-ulbricht
 
Last edited:
Me too. Drugs aren't actually the only thing they sold on the market.



Funny thing is, his moniker comes from "The Princess Bride."

"Inconceivable!"
"You keep using that word. I do not think it means what you think it means."
Sorry, I couldn't resist.
 
I have done every one of these things (some of them more than once).

Showing interest in the Mises Institute - check.
Quoting Ludwig von Mises - check.
Quoting Murray Rothbard - check.
Changing a username at a website - check.
Using a pseudonym as a username - check.
Using a non-existent email address - check.

Watch out, yo! I'm OG ...

You are one bad ass banana yo!
 
Back
Top