“End Of The Silk Road: FBI Says It’s Busted The Web’s Biggest Anonymous Drug Black Market”

October 3, 2013
Ross William Ulbricht
“Ross William Ulbricht, alleged to be the “Dread Pirate Roberts” behind Silk Road’s drug black market.”

Forbes on October 2, 2013 released the following:

By: Andy Greenberg, Forbes Staff

“After two and a half years running the booming anonymous narcotics bazaar known as the Silk Road, the drug kingpin who called himself the Dread Pirate Roberts has allegedly been unmasked.

On Wednesday, the FBI announced that they arrested 29-year-old Ross William Ulbricht, the Silk Road’s accused administrator, in the Glen Park branch of the San Francisco Public Library at 3:15 Pacific time on Tuesday. Ulbricht has been charged with engaging in a money laundering and narcotics trafficking conspiracy as well as computer hacking. The Department of Justice has seized the website of the Silk Road’s as well as somewhere between $3.5 to 4 million in bitcoins, the cryptographic currency used to buy drugs on the Silk Road.

Earlier this summer, the Silk Road’s administrator calling himself by the Dread Pirate Roberts pseudonym gave his first extended interview to Forbes over the same Tor anonymity network that has hosted the Silk Road and its users since the site’s creation in early 2011.

Forbes estimated at the time that the Silk Road was earning between $30 and $45 million in annual revenue. In fact, the number may have been far larger: The criminal complaint against Ulbricht states that the Silk Road turned over $1.2 billion in revenue since its creation, and generated $80 million commissions for its operator or operators.

“This is supposed to be some invisible black market bazaar. We made it visible,” says an FBI spokesperson, who asked not to be named. “When you interviewed [Ulbricht], he said he would never be arrested. But no one is beyond the reach of the FBI. We will find you.”

The FBI hasn’t yet revealed how it managed to track down Ulbricht in spite of his seemingly careful use of encryption and anonymity tools to protect his identity and those of his customers and vendors who visited Silk Road as often as 60,000 times per day. The FBI spokesperson declined to offer details about the investigation, but told me that “basically he made a simple mistake and we were able to identify him.”

One clue mentioned in the criminal complaint against Ulbricht was a package seized from the mail by U.S. Customs and Border Patrol as it crossed the Canadian border, containing nine seemingly counterfeit identification documents, each of which used a different name but featured Ulbricht’s photograph. The address on the package was on 15th street in San Francisco, where police found Ulbricht and matched his face to the one on the fake IDs.

The complaint also mentions security mistakes, including an IP address for a VPN server used by Ulbricht listed in the code on the Silk Road, mentions of time in the Dread Pirate Roberts’ posts on the site that identified his time zone, and postings on the Bitcoin Talk forum under the handle “altoid,” which was tied to Ulbricht’s Gmail address.

In his conversation with me, which took place on July 4th, the Silk Road administrator calling himself the Dread Pirate Roberts espoused Libertarian ideals and claimed that the use of Bitcoin in combination with Tor had stymied law enforcement and “won the State’s War on Drugs.”

He also said he intended to bring his marketplace into mainstream awareness, and had recently launched the first non-Tor website for the Silk Road known as SilkRoadlink, which remains online. “Up until now I’ve done my best to keep Silk Road as low profile as possible … letting people discover [it] through word of mouth,” Roberts says. “At the same time, Silk Road has been around two and a half years. We’ve withstood a lot, and it’s not like our enemies are unaware any longer.”

One remaining mystery in Ulbricht’s criminal complaint is whether he was in fact the only–or the original–Dread Pirate Roberts. In his July interview with me, Roberts said that he had in fact inherited the Dread Pirate title from the site’s creator, who may have also used the same pseudonym.

As of around noon Wednesday, the Silk Road’s forum for users also remained online, and the site’s loyal users were grieving over the Silk Road takedown and mourning the arrest of Ulbricht, whose apparent persona as the Dread Pirate Roberts was a widely respected figure in the online drug community.

“jesus christ this is TERRIBLE!!” wrote one user named danceandsing. Others suggested that users migrate to other, smaller but similar anonymous black markets such as Black Market Reloaded–another popular alternative to the Silk Road known as Atlantis went offline last week, with its administrators saying only that they shut down the business for “security reasons.”

Another user blamed the Dread Pirate Roberts’ carelessness, including his decision to raise his profile by giving an interview to Forbes. “Sorry, but when he gave the fucking Forbes interview I imagined this would be coming,” wrote a user calling himself Dontek. “Should have kept all this shit on the down low rather than publicly bragging about it.”

Ulbricht’s LinkedIn profile describes his background as a graduate researcher in materials science at Pennsylvania State University, as well as an undergrad degree in physics from the University of Texas at Dallas.

According to Ulbricht’s grandmother, Martha Ulbricht, who was reached by phone, the younger Ulbricht received a full scholarship to UT Dallas. “Ross has always been an upstanding person as far as we know and a rather outstanding person,” she said.

Ulbricht’s half-brother Travis Ulbricht, also reached by phone in Sacramento, described him as an “exceptionally bright, smart kid” who had no criminal history to his knowledge.

Asked what he did for a living before moving to San Francisco, Ulbricht’s grandmother said, “Something on the computer…a little technical for me. He was good with computers.””

Federal Criminal Case 1: New York Federal Criminal Complaint
Northern District of California, Case No.: 3:13-mj-71218-JCS-1 (Proceedings on Out-of-District Criminal Charges Pursuant to Rules 5(c)(2) and (3)) and lists the following case on the docket sheet: Southern District of New York, Case No.: 13-mj-2328

21 U.S.C. 846 – Drug Conspiracy
18 U.S.C. 1030(a)(2) – Computer Hacking Conspiracy
18 U.S.C. 1956(a)(1)(A)(i) and (B)(i) – Money Laundering Conspiracy

Ross William Ulbricht New York Criminal Complaint

Federal Criminal Case 2: Maryland Federal Indictment
District of Maryland, Case No.: 1:13-cr-00222-CCB-1

21 U.S.C. 846 – Conspiracy to Distribute a Controlled Substance
18 U.S.C. 1512(a)(1)(C) – Attempted Witness Murder; 18 U.S.C. 2 – Aiding and Abetting
18 U.S.C. 1958(a) – Use of Interstate Commerce Facilities in Commission of a Murder-for-hire; 18 U.S.C. 2 – Aiding and Abetting

Ross William Ulbricht Maryland Superseding Indictment

————————————————————–

Douglas McNabb – McNabb Associates, P.C.’s
Federal Criminal Defense Attorneys Videos:

Federal Crimes – Be Careful

Federal Crimes – Be Proactive

Federal Crimes – Federal Indictment

Federal Crimes – Detention Hearing

Federal Mail Fraud Crimes

————————————————————–

To find additional federal criminal news, please read Federal Criminal Defense Daily.

Douglas McNabb and other members of the U.S. law firm practice and write and/or report extensively on matters involving Federal Criminal Defense, INTERPOL Red Notice Removal, International Extradition Defense, OFAC SDN Sanctions Removal, International Criminal Court Defense, and US Seizure of Non-Resident, Foreign-Owned Assets. Because we have experience dealing with INTERPOL, our firm understands the inter-relationship that INTERPOL’s “Red Notice” brings to this equation.

The author of this blog is Douglas C. McNabb. Please feel free to contact him directly at mcnabb@mcnabbassociates.com or at one of the offices listed above.


Khalid Shaikh, CEO of YouSendIt, Pleads Guilty to Launching a Cyber Attack Against His Former Company

June 25, 2011

U.S Attorney’s Office Northern District of California on June 24, 2011 released the following press release:

“SAN JOSE – United States Attorney Melinda Haag announced that Khalid Shaikh pleaded guilty yesterday to transmission of a code to cause damage to a protected computer, in violation of 18 U.S.C. §§ 1030(a)(5)(A) & (c)(4)(A). This guilty plea is the result of an investigation by the Federal Bureau of Investigation.

In pleading guilty, Mr. Shaikh admitted that YouSendIt, Inc. (“YouSendIt”) was a company based in Campbell, California and engaged in the business of digital content delivery through the Internet. YouSendIt enabled users to send, receive, and track large files of digital data. YouSendIt’s web servers were located in San Jose, California. These servers are also used to facilitate interstate and foreign commerce and communication.

Shaikh was one of the founders of YouSendIt in 2004 and served as the Company’s Chief Executive Officer until August 2005. Thereafter, Shaikh served as the Company’s Chief Technology Officer until he departed from YouSendIt in November 2006.

Beginning in or about December 2008 and continuing through June 2009, Mr. Shaikh sent an ApacheBench computer code to YouSendIt’s servers. ApacheBench is a benchmarking program used for measuring the performance of computers known as web servers. ApacheBench was designed to determine the number of requests per second a server is capable of serving. By intentionally transmitting the ApacheBench program to YouSendIt’s servers, Mr. Shaikh was able to overwhelm the servers’ capabilities and render it unable to handle legitimate network traffic.

A Federal Grand Jury in San Jose, California returned an indictment against Mr. Shaikh on October 28, 2009. He was charged with four counts of transmission of a code to cause damage to a protected computer, in violation of 18 U.S.C. §§ 1030(a)(5)(A) & (c)(4)(A). Under the plea agreement, Mr. Shaikh pled guilty to count one of the indictment.

Mr. Shaikh has been released on $100,000 bail. The sentencing for Mr. Shaikh is scheduled for September 29, 2011. The maximum statutory penalty for each count of transmission of a code to cause damage to a protected computer in violation 18 U.S.C. §§ 1030(a)(5)(A) & (c)(4)(A) is 5 years imprisonment, 3 years of supervised release and a fine of $250,000, plus restitution if appropriate. However, any sentence following conviction would be imposed by the court after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553.

Hanley Chew is the Assistant U.S. Attorney who is prosecuting the case with the assistance of Lauri Gomez.

Further Information:

Case #: CR 09-1049 JF”

To find additional federal criminal news, please read The Federal Crimes Watch Daily.

Douglas McNabb and other members of the U.S. law firm practice and write extensively on matters involving Federal Criminal Defense, INTERPOL Red Notice Removal, International Extradition and OFAC SDN List Removal.

The author of this blog is Douglas McNabb. Please feel free to contact him directly at mcnabb@mcnabbassociates.com or at one of the offices listed above.

Bookmark and Share