Oct 20

Fresh Set Of Charges Laid Against Ross Ulbricht

>> Click here to find the Silkroad URL and know how to get to the Silk Road 2.0 <<

Ross UlbrichtA verdict has been determined on Ross Ulbricht’s case. He will be facing life in prison as a result of his alleged operations on the internet drug lair called Silk Road, which is where both sellers and buyers were able to send soft and hard drugs across the globe. His initial indictment happened back in February of this year with four criminal charges including, criminal and money hacking conspiracy, drug trafficking, each of which he profusely continues to deny. On Friday the 22nd of August, he faced three new charges as the Silkroad Kingpin, including identity fraud and narcotics trafficking.

The US Government laid in a 17-page amended document introducing one count each for every narcotics distribution and trafficking through the virtual facet and his fraudulent act of providing false identification documents. His attorney Joshua Dratel, however, told CoinDesk how the new charges did not in any way modify the nature of evidence. According to the new seconding indictment, the drug charges happen to be in connection with at least a kilogram of heroin, 10 grams of LSD, 500 grams of meth and 5 kilograms of cocaine sold through Silk Road.

Bitcoin-APSince his October 2013 arrest, the FBI has seized over $33.6 million worth of Bitcoins from Ulbricht. The FBI claimed this amount of Bitcoins to have been proceeds stemming from the Silk Road operation. Early this month, Ulbricht argued in a memo that he was originally plotting on a portal called Underground Brokers, where people could buy and sell almost about anything anonymously. He claimed that he did not purposely create Silk Road for drug trafficking.

The indicted also called out the intrusion of the US authorities in trampling every bit of his digital privacy rights. Furthermore, the initial report on his drug trafficking operations triggered an ongoing investigation to every depth of his ESI (electronically stored information). It gave the authorities enough discretion to follow through the investigation.

>> Click here to find the Silkroad URL and know how to get to the Silk Road 2.0 <<

Oct 20

Even If The FBI Did Hack The Silk Road Without A Warrant, US Prosecutors Seemingly Consider It’s Perfectly Legal

>> Click here to find the Silkroad URL and know how to get to the Silk Road 2.0 <<

The Department of Justice in October 2013 seized Silkroad in what could easily be history’s largest Internet drug bust and what the department itself termed as a victorious drug raid of massive proportions. Along with the bust came the arrest of the alleged owner, Ross William Ulbricht and seizure of about four million dollars’ worth of bitcoins. Part of this procedure however breached privacy laws as the FBI did not seek a warrant to hack into the overseas servers that hosted the TOR network Silkroad relied on for anonymity.

Screen-Shot-2013-10-02-at-6.44.27-PMThe pre-trial motion filed by Mr Ulbricht’s defense teamargues that the FBI hacked into Silk Road’s servers without obtaining appropriate warrants thereby violating Mr Ulbricht’s privacy. Silkroad had been on FBI’s radar since its inception in 2011. Undercover agents began buying drugs on the site then but marketplace is hosted on a Tor network and this obscures the users’ IP addresses and prevents both users and their transactions from being traced. The servers of the Tor network that provided Silkroad with anonymity and which were hacked by the FBI are located in Iceland.

article-2617122-1D7B3D7F00000578-926_634x476The case prosecutors however thinks the alleged mastermind of Silkroad cannot claim violation of privacy because he has not admitted owning the Icelandic server that hosted his alleged online black market. In failing to lay claims, the prosecution says that Mr Ulbricht has failed to prove that his fourth amendment and privacy rights were violated. The prosecution further adds that Mr Ulbricht’s acts of omission fail to prove that he indeed has privacy interests on the server in Iceland and any other items associated with Silkroad that were searched or seized. To establish privacy rights, the Silk Road’s mastermind needed to show he has personal privacy interests in the server or searched property and not just the affirmation that such searches led to Silk Road’s seizure and his arrest. Prosecution also stated that fourth amendment rights do not include searches conducted by foreign law outside the United States.

>> Click here to find the Silkroad URL and know how to get to the Silk Road 2.0 <<

Oct 17

The Effect The Original Silk Road Seizure Had On Other Black Markets

>> Click here to find the Silkroad URL and know how to get to the Silk Road 2.0 <<

According to the researchers studying online black markets, the number of listings for illegal products and services has actually gone up following the original Silk Road takedown (Silk road 2.0 is up and bigger than the original). At least one researcher believes this means the illegal trade will grow even more.


Almost all of these markets use Bitcoin. James Martin, author of a new book on the subject, suggests that Bitcoin was utterly critical to Silkroad’s development and the developments of cryptomarkets in general. Silkroad mastermind, Dread Pirate Roberts, acknowledged this, calling it one of the “pillars of Silk Road.”

Changes in the Market after the Bust


In the 6-month period following the original Silk Road closure, new “dark markets” appeared and illegal goods listings grew considerably, according to researchers from the Digital Citizens Alliance.

The non-profit group found the number of drug listings on the largest dark markets nearly doubled in that 6 month period to 32,029, versus six months earlier when the original Silk Road was taken offline. The group’s report looked at listings from 11 of the currently operational black market sites, six of which had been newly launched: Silk Road 2.0, Agora, Evolution, White Rabbit Anonymous Marketplace, Outlaw Market, The Pirate Market, and more.

On the other hand, a 2012 paper from Carnegie Mellon University computer engineering professor, Nicolas Christin, suggests that around 1.35 million BTC passed through Silk Road from 2011 until 2012, meaning the market’s transactions made up about 4.5% of all BTC transactions. It is still not clear, according to Christin, what the impact of the market’s closure had on the Bitcoin economy as a whole.

Nevertheless, it seems fairly clear that online black markets are popular among drug dealers for a simple reason: despite the risk of an FBI raid, they’re still safer than doing business the conventional way. For those who sell drugs, law enforcement is only part of the risk — a much bigger risk is someone trying to kill them and steal their stash of drugs.

For these dealers, online black markets help remove the “systemic violence” inherent to the narcotics business. Dark market vendors do not need assistance from the organized criminal gangs which usually take care of security and distribution in exchange for protection money. Consumers similarly don’t have to deal with potentially violent gang members either.

>> Click here to find the Silkroad URL and know how to get to the Silk Road 2.0 <<

Oct 15

Documents Filed In Silk Road Case Seem to Solidify The Parallel Construction Theory

>> Click here to find the Silk Road URL and know how to get to the Silk Road 2.0 <<

Lyn UlbrichtEver since the US government first claimed it found the Silkroad server using a “leaky CAPTCHA,” technical experts have raised doubts about whether this explanation is plausible. Attorneys for alleged Silroad mastermind Ross Ulbricht suggested that this was just a cover story, intended to hide the fact that the NSA found the Silkroad server rather than the FBI. They suggested the CAPTCHA story was an example of “parallel construction,” a law enforcement technique to conceal the true origin of evidence in criminal cases.

Technical documents recently filed by the FBI seem to solidify these theories. According to Brian Krebs (of Krebs on Security) and Robert Graham (of Errata Security) a close examination of these documents reveals that the FBI did something very different from what they originally claimed. Krebs quotes a researcher from Berkeley’s International Computer Science Institute pointing out a simple fact — where the FBI agents claim to have found the “leak” is not consistent with how the server was designed.

The Silkroad system was set up in a fairly complicated fashion. Silkroad had been set up with a split architecture, where traffic from the Tor network went to a front-end server. This server in turn made requests to a back-end server in Iceland. According to documents released by the government, the Icelandic Silkroad server (which is the one that was siezed) was designed so that it would refuse most types of requests from the larger iternet.


According to Weaver’s analysis, the Silkroad server would not have replied with a portion of a CAPTCHA image as the FBI agents in the Silk Road case claimed. It is much more likely that the FBI accessed the Silkroad server’s IP address directly and was given a generic PHP/MyAdmin page.

It is important to note that there was a misconfiguration in one or both of the Silkroad servers that did allow access to PHP files from all over the internet, so it is plausible the FBI received some data back when they put in the IP address.

According to Robert Graham’s analysis, the PHP/MyAdmin explanation fits. Log entries where FBI Agent Christopher Tarbell accessed the Silkroad server showed him accessing the PHP/MyAdmin pages and not the Silkroad login page. Therefore they are not consistent with the FBI’s original explanation. Also, inconsistent with the server’s configuration, they produced a “200 OK” response code instead of the “401 UNAUTHORIZED” error which Graham would have expected to see — this suggests the FBI knew the password or the server configuration had somehow changed.

Graham concludes that the NSA as a missing link in the Silk Road case makes sense. With the Silkroad back-end server located in Iceland, the fact that the system did not use encrypted communications between the two servers means the NSA could easily have captured the password — the NSA is legally allowed (under US law) to monitor traffic between foreign countries, including Iceland.

With respect to the Silkroad front-end server in Germany (which is also known to be monitored by the NSA), while it would have returned a “forbidden” error if accessed outside TOR, it would not have done this when accessing PHP files. Graham suggests there were technical methods the FBI could have used to find this server, such as scanning the whole Internet for SSL servers and looking for the word “Silkroad” in the returned web page.

Graham notes that the original declaration by FBI Agent Tarbell was “gibberish” and so vague that nearly any explanation could fit — vague enough that an NSA agent showing up at the FBI office and typing in the Silkroad server’s IP address could fit within the scenario.

>> Click here to find the Silk Road URL and know how to get to the Silk Road 2.0 <<

Oct 13

Mother Of Accused Silk Road Leader Remains Optimistic For Her Son’s Case

>> Click here to find the Silk Road URL and know how to get to the Silk Road 2.0 >>

Lyn Ulbricht, the mother of alleged Silk Road ringleader Ross William Ulbricht has a long and intense year. It is now one year since her son was arrested by federal agents at a San Francisco public library, imprisoned and paraded on newspapers and magazines as the alleged Silk Road mastermind.

One year later, Lyn is optimistic, sounds energetic at times and exhausted at others. She’s prone to long sighs but is from time to time open to laughter when talking about her life experiences, her son’s case and trial. The alleged Silk Road ringleader Ross Ulbricht’s trial is scheduled to start on 10th November at 500 Pearl Street, New York. It is then that the many months of legal back and forth, the motions and filings will come to an end. Her son will stand trial for crimes the United States government alleges that he committed while operating Silk Road, a now infamous black market website that earned millions from between 2011 and 2013, through Bitcoin – a digital currency that was at time largely unknown.

Lyn has said that the case has been an eye-opener to her and that she has been alarmed by the action taken by the government against Ross Ulbricht who she maintains has been accused unfairly of using the assumed name Dread Pirate Roberts to operate Silk Road.

While she says she hasn’t exactly been a fan of the government over the years, she’s been alarmed at the actions it has taken, Lyn talks passionately about her son’s case, the questions about how the FBI acquired the evidence that they allege shows that her son operated Silk Road and the latest FBI statements. She also talks passionately about the struggles of caring for her son who’s currently residing in the Federal Metropolitan Detention Center in Brooklyn, New York.

She hopes that her son’s case will not go to trial, that in spite of the bad breaks a miracle will occur and the case against her son will be dismissed at an evidentiary hearing.

Lyn views the case against her son as an example of the ever expanding power of the government and how one can easily be accused of a crime in the United States. She asserts that the Ross is proof of how the system works, of how a person who has not been convicted, doesn’t have any prior arrests and is non-violent can be imprisoned for a whole year without bail.

Lyn has taken an active interest in FreeRoss.org, visiting conferences and rallies, blogging updates in the case, tweeting photos of supporters, and castigating reporters on social media. FreeRoss.org indicates that to date the campaign has raised over $185,000 towards its $250,000 goal.

Lyn has said that she is quite grateful to the supporters of the FreeRoss.org campaign, particularly Ver who has donated $70,000. She said that she hopes to one day meet Ver, so that she could thank him personally.

Lyn maintains that her son needs a strong defense, especially given the magnitude of the case against him and the implications it will have in Internet law. She said that helping her son is now her main focus and that she has relocated with her husband Kirk, to the Northeast so that they could be closer to Ross.

>> Click here to find the Silk Road URL and know how to get to the Silk Road 2.0 >>

Oct 11

Bitcoin CEO Pleads Guilty To Allegations Related to Silk Road Drug Deals

>> Click here to find the Silkroad URL and know how to get to the Silk Road 2.0 <<

Charlie Shrem, the CEO of a Bitcoin exchange company and a leading supporter of the virtual currency, pleaded guilty at a hearing in New York federal court to one account of aiding and abetting the operation of a money-transmitting business that wasn’t registered with the United States Treasury Department. His co-defendant Robert Faiella of Cape Coral, Florida, separately pleaded guilty to operating an unlicensed money transfer business.

Shrem said in court that he knew most of the business on Silkroad involved the purchasing and selling of illicit drugs and that he also knew that what he was doing was wrong.

Charlie Shrem and Robert Faiella had initially been charged in January with scheming to sell and launder $1 million in Bitcoins. They pleaded guilty to the federal charges as part of a deal struck with the prosecutors from the office of Manhattan United States Attorney Preet Bharara.

United States authorities shut down Silkroad on 2nd October 2013. However a new version of Silk Road was later launched. Shrem and Faiella were both arrested in January. Prosecutors said that they both sold over $1 million in Bitcoins to users of the Silkroad. The Silkroad operated on TOR, also known as The Onion Router, an internet site that routed the users of Silkroad through several computers to conceal their identities and locations. Sellers and buyers and on Silkroad did business in Bitcoin, a virtual currency that gave them another layer of anonymity.

Shrem is well known in the bitcoin community. He resigned from his position as the vice chairman of the Bitcoin Foundation, soon after he was arrested. He was previously the CEO of BitInstant, a Bitcoin exchange company. He was also BitInstant’s compliance officer, responsible for making sure that the company followed the law. Faiella had operated Bitcoin exchange on Silkroad from December 2011 until the website was shut down.

According to court documents, Shrem had processed transactions for Robert Faiella through BitInstant, in spite of knowing that the Bitcoins would in the end find their way to Silk Road, where they would be used by customers buy and sell illicit drugs on the Silkroad. The prosecutors stated that Shrem had even given Faiella a discount on high volume trades of Bitcoins that he purchased for Silkroad buyers.

As part of their plea deals, Shrem and Faiella agreed to forfeit $950,000 to the government. By taking a plea deal, Shrem has avoided going to trial on more serious federal charges of violations of the Bank Secrecy Act and money laundering, which carry more prison time. Sentencing was set for 20th January and they both face up to 5 years in prison.

>> Click here to find the Silkroad URL and know how to get to the Silk Road 2.0 <<

Oct 10

Comcast Supposedly Monitoring Tor Users And Banning Them

Click here to find the Silkroad URL and know how to get to the Silkroad 2.0

comcastAccording to at least two Comcast users, agents of the company recently contacted them and told them to quit using Tor — or face a ban from Comcast’s service. The reason, according to these users, Tor provides access to illegal sites such as Silkroad. Shortly after these reports surfaced, however, Comcast issued a statement denying they had threatened anyone for using Tor or Silkroad and saying Tor users were welcome at the company.

In other words, though it’s not clear whether Comcast went after Tor or Silkroad users in the past, it’s unlikely they will try and go after Tor or Silkroad users in the future.

The controversy began when someone posted in the Reddit /r/darknetmarkets forum (where people discuss markets like Silkroad) claiming they’d received a call from a Comcast agent. The agent supposedly told this person Tor was an illegal service, using it was against the Comcast Terms of Service, and provided access to illegal markets like Silkroad.


The user asked to speak with the manager and was told the manager wasn’t available, so he called Comcast back the following day. An agent named Kelly roughly confirmed the policy, saying people who try to cover their tracks are usually doing things that aren’t legal — again, assuming that all Tor users are Silkroad users.

A second report of similar treatment by Comcast agents was submitted directly to the Deep Dot Web darkweb news site, which covers Silkroad and similar markets.

temp_comcastThe implication of this policy is that Comcast actively monitors its users’ online activity to check whether they are following the Terms of Service. The Tor Project has previously listed Comcast as a “bad ISP” which is not Tor-friendly, though not because of any specific anti-Tor or anti- Silkroad policies — Tor’s objection is that the Comcast Acceptable Use policy forbids running proxies or servers.

Comcast, on the other hand, states they do not monitor specific accounts unless they are presented with a court order. Even then, according to Comcast, they would attempt to notify the affected user so they could hire a lawyer and deal directly with the judge.

Deep Dot Web notes that Comcast’s behavior in the “Dread Pirate Roberts” Silkroad case is strongly at odds with this claim. Comcast also actively monitors the internet usage of its customers as part of Comcast’s Six Strikes program.

Silk_road_torThis program has nothing to do with Tor or Silkroad, but rather focuses on copyright infringement. If Comcast catches its customers pirating copyrighted material, they receive an email from Comcast telling them to stop doing this. After a total of six such infractions their account may be terminated.

Comcast’s Statement

Two days after the Deep Dot Web report hit the internet; Comcast released a statement from its VP of Internet Services, Jason Livingood, denying many of the claims made by Deep Dot Web. According to Livingood, the idea that the company has “declared war” on Tor or Silkroad” is “totally inaccurate.”

SilkRoad JailLivingood states that Comcast is not asking users to discontinue using the Tor browser software or any other browser. The company has no policy against itor any other specific software, and customers can visit any website or use any app they like with their Comcast service.

Furthermore, Livingood’s statement claims that Comcast does not monitor customer software or web usage. The “chat room” evidence from the Deep Dot Web story is, in his eyes, not accurate. Instead, Comcast only investigates or discloses information about customer accounts when presented with a valid court order.

What’s more, the Deep Dot Web claim that Comcast terminates customers under the Six Strikes program is (according to Livingood) false — he calls it a voluntary, educational, and non-punitive program. He does not, however, deny monitoring internet activity under this program.

Click here to find the Silkroad URL and know how to get to the Silkroad 2.0

Oct 10

What Happened With The DDoS Attack On Silk Road Last Month?

Click here to find the Silkroad URL and know how to get to the Silk Road 2.0

DDosSilk Road, the world’s biggest online market famous for illicit drugs and its use of Bitcoin and Tor to protect its user’s privacy, reported last month that it was undergoing a serious problem because of what is dubbed as distributeddenial-of-service (DDos) attack. During that time, users couldn’t access their accounts but the official Silk Road forums were accessible. Also, some users reported intermittent periods which they were able to access the site. While all this was happening, Silk Road is said to have received a message from unknown assailants demanding a ransom of approximately $5,000. This was from the Australian news media but till now, there is no evidence backing up this claim because Dread Pirate Robert’s (the Silkroad admin)public forum post doesn’t mention this anywhere.

Silk Road

This wasn’t the first time users weren’t able to access Silkroad site. In November 2012, because of technical difficulties and the huge traffic in the site that time, the site suffered major outage for almost a week. Dread Pirate Roberts admitted that this DDos attack cannot be matched with others which had happened before. Actually, this was happening after the April 26 and April 24 attack which made the site unavailable for 36 hours. The similarities of these two attacks and the one which happened last month provides some evidence that the perpetrators of these attacks are hi-tech and most probably, it is an organization of computer wizards.

Bit CoinThe admin during the time of the attack offered users a semi-private scheme that allows them to access Tor site. Silk Road 2.0 has been a vulnerable target where attackers are utilizing flaws in the system to create outages. In February, the site lost about 4,476 bitcoins due to a malleability attack on the site. The company then decided to compensate its customers after the attack. The source and the goal of the latest DDos attack still remain unclear. Some sources are even saying that the law enforcement might be responsible for the attack with the aim of ascertaining the location of Silk Road 2.0 servers. Some people say that the attack was launched by competitors; others say it was initiated by internet criminals. But one question still remains in the minds of Silk Road 2.0 users-will these frequent attacks ever stop?

Click here to find the Silkroad URL and know how to get to the Silk Road 2.0

Oct 03

How Much Did The FBI Lie To Catch Ross Ulbricht?

>> Click here to find the Silk Road URL and know how to get to the Silk Road 2.0 <<

the_silk_road_001The trial of Ross Ulbricht, the Silk Road creator promises to shed some light into how exactly the FBI managed to catch the man. The FBI may be a force unto itself, but it is still expected to adhere to the legal boundaries expected of them. The methods that it used to collect evidence for the trial of Ross will be called into question.

Based on what the FBI revealed when it filed court documents, the login page of the hidden site, is what sold out its creator. This reveal was accidental and done through a configuration mistake on Tor’s side. However, Ross Ulbricht’s lawyer Joshua Dratel, a famous criminal lawyer will attempt to prove otherwise. The defense will argue that the FBI caught Ross by lying, an allegation if proved, may cause problems for the Bureau.

How much did the FBI lie to Catch Ross Ulbricht?

So, did the FBI lie to catch the Silk Road creator? If the bureau lied, how far did it go with those lies?

Did the FBI really track down the site server legally?

the_silk_road_001Based on what the FBI states in its filings, its agents accidentally discovered that the Silk Road server was located in Iceland. Based on the information provided from the Bureau, two agents used the login page to enter “miscellaneous” data. When they did that, they noticed that the site’s CAPTCHA was loading from a non-Tor node. The misconfiguration therefore led them to determine that the server was located in Iceland.

That explanation, according to the hidden site’s watchers, is a bit murky. Based on what some privacy experts believe, the explanation given by the FBI does not make any sense. If what its agents say is true, it would mean that Tor has a huge security flaw that went unnoticed, which is highly unlikely. Other people would have spotted the flaw much sooner.

Because of the murky explanation offered by the FBI, many people speculate that the Bureau may have been more aggressive in trying to pin down Silk Road. In fact, many people believe that the FBI may have hacked its way into the site.

Based on the numerous possibilities that exist with regard to how the FBI actually, got access into one of the most secure and hidden sites online, Ross’ lawyers may be in a position to prove that the FBI may have lied. That is why the defense filed a motion arguing that the finding of Ross Ulbricht, the FBI’s way was akin to invading Ross’ privacy and making a search without a warrant. Proving such allegations however, will be another thing altogether.

Does the FBI have proof of its allegations?

Ross Ulbricht is also being accused of trying to solicit for murder for hire on Silk Road. This accusation arises from allegations that one of the site’s users was meant to exposes other users. Since now, the charges have not been made on this issue; one wonders if the allegations are true.

Some allegations against Ross are because the site he created used multiple proxies to cover the tracks of its administrators. The FBI will have its work cut out for them in trying to prove that the need for anonymity is similar to having criminal intent. How far will the Bureau go in trying to prove that? Well, nobody knows for now.

>> Click here to find the Silk Road URL and know how to get to the Silk Road 2.0 <<

Aug 22

Alleged Silkroad Vendors Were Arrested

>> Click here to find the Silk Road URL and know how to get to the Silk Road 2.0 <<

the_silk_road_001Started in 2011, the online marketplace Silkroad soon became the go-to place for all manner of illegal products. The users of Silkroad enjoyed the anonymity that they had even as they browsed. The Tor hidden services made it quite difficult for the Feds to pin down people in criminal charges. The original Silkroad was shut down temporarily before being opened up for business again as Silkroad 2.0.

Studies show that at least $30 million worth of business was being transacted on Silkroad by 2013. The business transactions are taking place courtesy of over 3800 vendors who are active site users. While the Feds have tried to hold these vendors, they are not having much luck on that front.

The Feds currently have the alleged mastermind of Silkroad Ross Ulbricht. Ross is expected to answer to charges of money laundering, conspiracy to traffic narcotics and computer hacking. He is also expected to answer to charges of conspiracy to planning a murder. For now, no one knows whether the prosecution will manage to get a conviction.

Silkroad_JacobThe FBI had previously arrested two previous Silkroad vendors Jacob Theodore George IV and Steven Lloyd Sadler. Jacob pleaded guilty to charges of selling bath salts and heroin while Sadler was arrested on heroin and cocaine charges. These two did cooperate with the government in the case against Ross. While their testimony may end up crucifying Ross, the burden of making that conviction rests mostly on the shoulders of the prosecution.

The fact of the matter is that three or four convictions compared to the over 3800 vendors on Silkroad is really a very small percentage. The volume of trade being done by these vendors is large. The FBI is not doing very well when it comes to arrests. The prosecution team on the other hand, is faring just as badly. As long as the Tor hidden services remain, the situation is not expected to improve. In fact, the success of the government in holding vendors accountable may go down because of Bitcoin and other digital currencies.

>> Click here to find the Silk Road URL and know how to get to the Silk Road 2.0 <<