Bitcoin Forum
May 24, 2024, 12:07:52 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: NOD, one of "top 1%" of SR sellers arrested  (Read 3718 times)
LiteCoinGuy
Legendary
*
Offline Offline

Activity: 1148
Merit: 1010


In Satoshi I Trust


View Profile WWW
October 08, 2013, 05:01:00 PM
 #21

Four “significant users” of Silk Road arrested in UK

Four men in the UK have been arrested over their alleged roles in the online marketplace Silk Road.

http://www.coindesk.com/four-men-arrested-uk-roles-silk-road/

repentance
Hero Member
*****
Offline Offline

Activity: 868
Merit: 1000


View Profile
October 09, 2013, 12:56:17 AM
 #22

Reports of Swedish arrests, too.

Sorry about the translation.

Quote
Helsingborg. helsingborgers Two, 29 and 34 years old, has been arrested on suspicion of comprehensive ecommerce with cannabis. According to Helsingborgs Dagblad, they have sold their goods through the U.S. website Silk Road.

Drug trafficking is suspected to have been ongoing throughout 2013. Stefan Gradler, prosecutors at the International Public Prosecution Office in Malmo, confirming the newspaper that the case of multiple transfers of narcotics.

Silk Road was specialized in the trading of illegal goods and could only be reached by anonymiseringsnätverket Gate. The site was shut down last week while the founder was arrested.

http://unvis.it/www.aftonbladet.se/senastenytt/ttnyheter/inrikes/article17617871.ab

Interesting that this arrest is for cannabis rather than the harder drugs which have featured on other arrests.

All I can say is that this is Bitcoin. I don't believe it until I see six confirmations.
tvbcof
Legendary
*
Offline Offline

Activity: 4592
Merit: 1276


View Profile
October 09, 2013, 01:38:32 AM
 #23


It wasn't the TOR or "The System" that was weak link, it was DPR's carelessness and stupidity.

~BCX~

That's hard to know.  If weakness or timing analysis of TOR were used in the take-down (and what appears to have been basically a honey-pot for some time) then one could expect that that detail would be guarded.  These are still the days of 'intelligence laundering' you know.

It was reported somewhere that a VM of 'the system' was imaged, but it was not reported whether it was a running memory dump or what.  One way or another, that this happened at all in any form is certainly indicative of a 'weak link in the system' as I see it.


sig spam anywhere and self-moderated threads on the pol&soc board are for losers.
franky1
Legendary
*
Offline Offline

Activity: 4228
Merit: 4500



View Profile
October 09, 2013, 02:17:23 AM
 #24


It wasn't the TOR or "The System" that was weak link, it was DPR's carelessness and stupidity.

~BCX~

That's hard to know.  If weakness or timing analysis of TOR were used in the take-down (and what appears to have been basically a honey-pot for some time) then one could expect that that detail would be guarded.  These are still the days of 'intelligence laundering' you know.

It was reported somewhere that a VM of 'the system' was imaged, but it was not reported whether it was a running memory dump or what.  One way or another, that this happened at all in any form is certainly indicative of a 'weak link in the system' as I see it.



its not hard to know, read the warrent request.
 time of events..

early on (maybe spring 2013) investigators found by searching the history of bitcointalk the username altoid advertising SR, he had RossU's email in the profile. also on a website for coding support a person asking for code to secure a onion site that sounded like SR also had the same Gmail.

investigators got the IP addresses from google and traced it to san fransisco, which is where i presume they blacklisted him with airports, mail couriers etc..

they then, using IP addresses and RossU's computer domain (login) 'frosty' to get into SR. and then clone the server data.

at same point the courier (mail company) came across a package addressed to RossU which as part of standard security, opened and found fake ID's.. homeland security then went and asked him about the ID's, to which he replied along the lines of 'anyone that knows me could have made these ID's to implicate me as a silkroad user'

then later july-september investigators went through all of the server data, starting with members numbers and transaction data and later on began reading private messages. thats when they came across the hitman messages. and decided it was time to bring him in for questioning..

there.. that saves u a few pages of reading..(check dates, it all flows perfectly in this manner)

I DO NOT TRADE OR ACT AS ESCROW ON THIS FORUM EVER.
Please do your own research & respect what is written here as both opinion & information gleaned from experience. many people replying with insults but no on-topic content substance, automatically are 'facepalmed' and yawned at
tvbcof
Legendary
*
Offline Offline

Activity: 4592
Merit: 1276


View Profile
October 09, 2013, 02:41:06 AM
 #25


It wasn't the TOR or "The System" that was weak link, it was DPR's carelessness and stupidity.


That's hard to know.  ...

its not hard to know, read the warrent request.
 time of events..
...

You seem unfamiliar with the concept of 'parallel construction'.  The whole point of doing one is to provide a convincing chain of evidence which leaves out the assistance of certain helper systems which are desired to remain secret.

Obviously I do not know if parallel construction was a factor in the (ongoing) SR take-down, but I am quite confident that if any exploitation of TOR or data from xkeyscore or anything else NSA related were employed it would not be evident in the material released for public consumption.

If parallel construction were employed in this case, it certainly worked like a charm on the Frankster.


sig spam anywhere and self-moderated threads on the pol&soc board are for losers.
Buffer Overflow
Legendary
*
Offline Offline

Activity: 1652
Merit: 1015



View Profile
October 09, 2013, 04:28:15 AM
Last edit: October 09, 2013, 06:41:02 AM by Buffer Overflow
 #26

I would take Tor's anonymity with a large pinch of salt. I certainly would not trust it with my life. (ie, running an illegal drug marketplace hidden service.)



repentance
Hero Member
*****
Offline Offline

Activity: 868
Merit: 1000


View Profile
October 09, 2013, 05:37:55 AM
Last edit: October 09, 2013, 07:47:21 PM by repentance
 #27



its not hard to know, read the warrent request.
 time of events..

early on (maybe spring 2013) investigators found by searching the history of bitcointalk the username altoid advertising SR, he had RossU's email in the profile. also on a website for coding support a person asking for code to secure a onion site that sounded like SR also had the same Gmail.

investigators got the IP addresses from google and traced it to san fransisco, which is where i presume they blacklisted him with airports, mail couriers etc..

they then, using IP addresses and RossU's computer domain (login) 'frosty' to get into SR. and then clone the server data.

at same point the courier (mail company) came across a package addressed to RossU which as part of standard security, opened and found fake ID's.. homeland security then went and asked him about the ID's, to which he replied along the lines of 'anyone that knows me could have made these ID's to implicate me as a silkroad user'

then later july-september investigators went through all of the server data, starting with members numbers and transaction data and later on began reading private messages. thats when they came across the hitman messages. and decided it was time to bring him in for questioning..

there.. that saves u a few pages of reading..(check dates, it all flows perfectly in this manner)

There is a timeline of events available, but it's taken from the court documents which are public.

One thing we don't know at the moment is what was in the - as yet unsealed - original documents filed in Maryland (the first documents relating to the case were filed in May).  

Likewise, the criminal complaint from Maryland specifically states that the information supplied is purely to establish probable cause - they certainly have more information than is supplied in that complaint.  

Enough mistakes were made that DPR could have been caught through the human errors he made and the technological measures outlined in the complaint and the indictment.  It is highly likely that some operational information will not be made public until the trial, if at all, but some of it can be inferred.  

For example, in order for DPR to be convinced that the former employee had been killed that employee had to co-operate with law enforcement in staging the photos sent to DPR and in remaining out of sight afterwards (he essentially had to abandon his old life).  I'd co-operate with them too if confronted with evidence that my former employer was trying to have me killed, but his co-operation isn't explicitly mentioned as a source of any of the information provided to the grand jury.

And yeah, it's really, really stupid to assume that Tor and PGP are magical invisibility cloaks.  They might be great for hiding your penchant for porn or messages to your mistress from your wife, but if maintaining secrecy is absolutely critical then assuming that they're impenetrable is kind of stupid.  Just as we can solve cold cases because advances in processing physical evidence mean we can make decades old physical evidence speak to use, we need to assume that technological evidence collected now can be made to disgorge its secrets sooner rather than later.


All I can say is that this is Bitcoin. I don't believe it until I see six confirmations.
Buffer Overflow
Legendary
*
Offline Offline

Activity: 1652
Merit: 1015



View Profile
October 09, 2013, 06:52:03 AM
 #28

And yeah, it's really, really stupid to assume that Tor and PGP are magical invisibility cloaks.  They might be great for hiding your penchant for porn or messages to your mistress from your wife, but if maintaining secrecy is absolutely critical then assuming that they're impenetrable is kind of stupid.

+1

From what I've heard this new sheep marketplace replacing SR was up and running within 24 hours.

LOL  Cheesy

24 hours? I can guarantee there's 'holes' all over place with that one. You can be sure the authorities have been all over that one already.

Can't wait for the sob stories when everyones coins go missing.  AGAIN.  Cheesy

repentance
Hero Member
*****
Offline Offline

Activity: 868
Merit: 1000


View Profile
October 09, 2013, 07:34:50 AM
Last edit: October 09, 2013, 07:50:27 AM by repentance
 #29

And yeah, it's really, really stupid to assume that Tor and PGP are magical invisibility cloaks.  They might be great for hiding your penchant for porn or messages to your mistress from your wife, but if maintaining secrecy is absolutely critical then assuming that they're impenetrable is kind of stupid.

+1

From what I've heard this new sheep marketplace replacing SR was up and running within 24 hours.

LOL  Cheesy

24 hours? I can guarantee there's 'holes' all over place with that one. You can be sure the authorities have been all over that one already.

Can't wait for the sob stories when everyones coins go missing.  AGAIN.  Cheesy

I know BMR existed before Silk Road went down and I think sheep may have as well.  Nonetheless, SR down should have prompted a massive security review by any similar sites.

The "official" SR 2 is due to launch and that strikes me as ridiculous.  It's not enough to simply say "we won't make the same human mistakes".  You really need to do a full technical evaluation as well and nobody will convince me that you can adequately review SR's vulnerabilities and address them in a week or two.

People are already "outing" the new DPR.  It's really not smart as the person they're pointing to claims to be a major money launderer.  So much for flying under the radar.

All I can say is that this is Bitcoin. I don't believe it until I see six confirmations.
crazy_rabbit
Legendary
*
Offline Offline

Activity: 1204
Merit: 1001


RUM AND CARROTS: A PIRATE LIFE FOR ME


View Profile
October 09, 2013, 08:09:45 AM
 #30

And yeah, it's really, really stupid to assume that Tor and PGP are magical invisibility cloaks.  They might be great for hiding your penchant for porn or messages to your mistress from your wife, but if maintaining secrecy is absolutely critical then assuming that they're impenetrable is kind of stupid.

+1

From what I've heard this new sheep marketplace replacing SR was up and running within 24 hours.

LOL  Cheesy

24 hours? I can guarantee there's 'holes' all over place with that one. You can be sure the authorities have been all over that one already.

Can't wait for the sob stories when everyones coins go missing.  AGAIN.  Cheesy

I know BMR existed before Silk Road went down and I think sheep may have as well.  Nonetheless, SR down should have prompted a massive security review by any similar sites.

The "official" SR 2 is due to launch and that strikes me as ridiculous.  It's not enough to simply say "we won't make the same human mistakes".  You really need to do a full technical evaluation as well and nobody will convince me that you can adequately review SR's vulnerabilities and address them in a week or two.

People are already "outing" the new DPR.  It's really not smart as the person they're pointing to claims to be a major money launderer.  So much for flying under the radar.

I think the real damage the FBI arrest has caused is that users should think twice before trusting someone who CLAIMS to have done all the right things to keep you safe. As far as anyone knows, (Except for sheeps market place which they already outed the guy who runs it) these Silk Road Reloaded things could just be law enforcement honeypots from other agencies looking to score easy media medals for taking a bite out of crime.

If you don't control it, you're trusting someone you've never met, and don't know. Good luck with that. Especially now that the Silk Road arrests have started: http://www.coindesk.com/four-men-arrested-uk-roles-silk-road/

more or less retired.
repentance
Hero Member
*****
Offline Offline

Activity: 868
Merit: 1000


View Profile
October 09, 2013, 11:24:35 AM
Last edit: October 09, 2013, 10:01:59 PM by repentance
 #31

I think the real damage the FBI arrest has caused is that users should think twice before trusting someone who CLAIMS to have done all the right things to keep you safe. As far as anyone knows, (Except for sheeps market place which they already outed the guy who runs it) these Silk Road Reloaded things could just be law enforcement honeypots from other agencies looking to score easy media medals for taking a bite out of crime.

You'd think so, wouldn't you?  But people have been queuing up to be part of "the new Silk Road" since the site first went down.  It's not unlike how people ignore common sense and queue up to be part of the next "big thing" here, even when it has the hallmarks of previous scams.

I don't know whether to be amused or saddened by the number of posts I've seen on the various onion forums from people saying that they have no real life contacts for obtaining drugs.  Hell, I even saw on thread posted by a vendor asking how to go about selling drugs in real life because he "didn't know anyone".  In it's own way, it's quite tragic.

Desperation is what's driving many users to demand an immediate replacement for Silk road and opportunism is what's driving others to provide it (and let's be honest, the thought of getting commissions off the sales of other vendors has to be appealing to the group of vendors which seems to be behind one of the replacements).

Detailed information on how they caught NOD is contained in the criminal complaint against him.


http://ia801000.us.archive.org/32/items/gov.uscourts.wawd.196181/gov.uscourts.wawd.196181.1.0.pdf

All I can say is that this is Bitcoin. I don't believe it until I see six confirmations.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!