Silk Road Journal Found On Ulbricht's Laptop: "Everyone Knows Too Much" 180
sarahnaomi writes On Wednesday, prosecutors in the Silk Road trial began to lay out the wealth of evidence found on the laptop taken from accused kingpin Ross Ulbricht in a San Francisco library in October 2013. The evidence presented by prosecutor Timothy Howard was the most comprehensive and damning thus far, including more than a thousand pages of chats between the site's pseudonymous operator Dread Pirate Roberts and Silk Road administrators. Also entered into evidence was a journal that dates back to at least 2010 describing the creation and operation of the site. FBI computer scientist Thomas Kiernan, the second witness in the trial, testified about the day Ulbricht was arrested and the evidence gathered from his laptop.
What an idiot (Score:5, Insightful)
So not only could he not secure his black site, he couldn't even secure the files on his own laptop.
It makes you wonder how he ever got it running in the first place.
Re: (Score:1)
It makes you wonder how he ever got it running in the first place.
Perhaps that, in itself, is compelling evidence that he didn't.
Re:What an idiot (Score:4, Insightful)
On the other hand, a psychopath is marked by superhuman hubris, i.e. the assumption that everyone is stupid except them. This is often their downfall when it comes to criminal trial, because they are genuinely shocked that other people are smart enough to have figured them out.
Re: (Score:3)
Re: (Score:1)
why would you assume he is a psychopath?
He allegedly hired hit men to kill competitors and ex-employees.
So he is at least as psychopathic as other CEOs, and maybe even as bad as a Wall Street banker.
Re: (Score:2)
Re: (Score:2)
I think you're really talking about a narcissism.
Re: (Score:2)
Well that's half of facebook fucked.
Re: (Score:1)
Including all those who inadvertently exceed the speed limit.
Re:What an idiot (Score:4, Insightful)
Not necessiarly (Score:2)
He may well have been as smart as he thought (I'm not saying that is the case for sure, mind) but turns out others were smart enough, and more knowledgeable in the ways that mattered.
Hans Reiser is a good example. Man is unquestionably very smart. However, he had the geek hubris that I call SMFU, Smartest Motherfucker in the Universe syndrome. He figured he was so much smarter than everyone else, he could easily get away with his crime. Turns out that the police have some smart people too, and those people
Re: (Score:1)
> that Linux guy who murdered his wife and thought nobody could catch him.
Well, from his perspective she was merely Lost & Found. ;-)
Re:What an idiot (Score:4, Funny)
Perhaps that, in itself, is compelling evidence that he didn't.
"Your honour, the defence submits that the fact that an entire room of people saw the accused stab the victim and state he was glad he did it, proves conclusively that he didn't. There is so much compelling evidence against our client that it is actually evidence of his innocence. And with that the defence rests."
Doesn't exactly work.
Re: (Score:2)
Ah, the old "I wouldn't be that stupid, would I? So someone must be framing me" defense.
Re: (Score:2)
Achievement unlocked: Batman gambit.
Re: (Score:2)
But you still haven't addressed the question of how it makes sense that Chewbacca, a Wookiee from Kashyyyk, lives on Endor. That's grounds for acquittal right there.
Re: (Score:2)
If that worked, then it would work for every "criminal mastermind" ever prosecuted.
"You say I hatched this ingenious plan! But if I were that clever, you never would have caught me!"
Re: (Score:2)
It seems he told his GF, who later broke up with him and told her friends... one of whom posted on his Facebook page: "I’m sure the authorities w
Re: (Score:2, Informative)
You eventually need to decrypt your own files so you can use them, so the trick is to catch the person when they're actually sitting at their machine using it so that they don't have time to slam the lid on the laptop. If they can do that they can plug in an external drive and copy everything, unencrypted. They got him when he was at the SF public library, agents probably swooped in and manhandled him before he could react.
Re: (Score:3)
Re: (Score:3)
People DO all that, they are just not caught... We're hearing about this guy because he didn't and was caught.
Or do you think the FBI catches everyone?
Re:What an idiot (Score:5, Interesting)
There's actually some neat forensic gear out [cru-inc.com] there designed for this kind of situation. It's basically a battery with a fast UPS style switchover mechanism and various bits for tapping into the power line connected to a computer. Basically they wire this thing in, pull the plug, and the battery keeps the machine running and unlocked while they cart it away/image it/etc. They've also got devices called "jigglers" that simulate mouse movement to keep the screen from locking.
Obviously this turns into a cat and mouse thought experiment with a variety of rube goldberg type countermeasures and counter-countermeasures, but against the average guy this kinda thing probably works quite well.
Re:What an idiot (Score:5, Interesting)
A skilled hacker / engineer could create a system for under $40 that would circumvent this.
Use two microcontrollers (a raspberry pi would be overkill - I'd use a $10 STM32 Nucleo board), one hidden somewhere in your house that has a small coil around a power line which introduces a signal into the power wires, and another in the case of the PC that monitors the signal generated by the first microcontroller. As soon as the device inside the PC detected loss of the signal it could then shut the PC down. Or trip a relay connected to a servo that allows acid to flow into the HDD. It could also have light sensors (covering the largest spectrum possible) to detect the case opening, which would also trigger the destruct mechanism. It would be powered by 4 AA batteries when external power is removed. I would also add a trivial voltage divider circuit to an ADC line on the microcontroller to monitor battery power, and if it got down close to 5V it would destroy the device.
There are dozens of things you could do along those lines. Place a magnet in whatever the PC is setting on and then have a magnetometer sensor in the buttom of the case connected to the microcontroller. If the PC is moved then it destroys the media. Etc, etc.
Re: (Score:2)
Re: (Score:2)
Re:What an idiot (Score:4, Interesting)
https://www.youtube.com/watch?... [youtube.com]
there are rfid rings/bracelets that do this already
Or just rig up a Cryptonomicon-style doorframe.. (Score:2)
Re: (Score:2)
That would be injecting noise on to the power lines, which means either it screws with the rest of the grid, or it's small enough that other devices could swamp it with noise. There's been some interesting work done on hiding signals below the noise floor using frequency hopping, but that's excessively complex.
Re:What an idiot (Score:5, Informative)
No.
Evidence is an attribute that that exists only after criteria are met. I can destroy my hard drive today and be charged with a crime tomorrow. When the authorities realize what I have done, there's nothing they can do. The hard drive only becomes evidence after probable cause has been established and a warrant has been issued and I am made aware that my hard drive is evidence.
There are exceptions, but not as relates to this matter.
You are an asshat and what pisses me off is that you know damn well that you are making a false statement.
So fuck you very much.
Re: (Score:3)
Knowing that there's an investigation is the key part; Viz. ...or influence the investigation or proper administration... If you pre-emtively design a self-destruct system, you've no knowledge of an investigation.
Re: (Score:3)
Those support my position.
Re:What an idiot (Score:5, Interesting)
Apparently he was arrested (in public) at a library, and the techs who got the laptop knew what they were doing...
It was logged in, and they spend several hours copying data without letting it sleep or lock.
Full disk encryption is great, but assumes that you won't have unlocked it for the attacker.
Re:What an idiot (Score:5, Interesting)
Yeah they had two agents get into a fight right behind him and when he jumped up to see what was going on (just like anyone would do) another agent snatched the laptop and started the task of getting evidence off it and mirroring the drive's contents.
The FBI is often really fucking good at what they do.
Re: (Score:2)
Yeah they had two agents get into a fight right behind him and when he jumped up to see what was going on (just like anyone would do) another agent snatched the laptop and started the task of getting evidence off it and mirroring the drive's contents.
The FBI is often really fucking good at what they do.
Raise your hand if you immediately started thinking about how you would mitigate this. Voice commands? Bluetooth remote in your watch?
Re: (Score:3)
How about a dead-man's switch, like the ones worn when you drive a WaveRunner or SnowMobile? It might be a physical lanyard, or a more modern approach could be Bluetooth based. When the BT dongle/wristband/whatever that you are wearing gets more than the range of Bluetooth away from the laptop, it auto-locks.
Re:What an idiot (Score:5, Interesting)
Re:What an idiot (Score:5, Informative)
And finally, once the FBI is there, knocking down your door (metaphorically speaking), you're pretty much fucked. The investigation that led them to you is probably more than enough to indict you and probably get the conviction, and refusing to turn over your keys once they already have you pinned down will be viewed as contempt of court and you'll sit in prison for a long damned time without a trial. This is why, from what I can tell, the defense is mainly focused on the procedure/evidence that led the FBI to him (poisoning the well) since if they can't give a good accounting for how they connected him to the SR, then all that evidence is for nothing if they used illegal techniques to get it.
Right and wrong (Score:2)
Right in that yes, they already have a lot of evidence, and are just working to seal the deal. They like to have everything in a row and an overwhelming amount of evidence before going to trial.
Wrong about the contempt thing. If you look it up in the US you find out that the courts have decided the 5th amendment applies to passwords. So you can keep your mouth shut and they can't compel you to hand over a password. If it is locked with something physical like a key fob or fingerprint, that you have to hand
Re: (Score:2)
Passwords and the Fifth Amendment aren't that simple. The courts have held that it's legal to require a password to reveal something known to be there. The main case was a guy whose laptop showed child pornography as he went through Customs. The Customs agent testified to it, and the courts ruled that he had to hand over the password. In this case, they'd have to know there were specific illegal records on the laptop to use that as a precedent.
One definite case is that, if the authorities know there'
Re: (Score:1)
Another good strategy would be to just stop doing it. Taking a big risk when you don't have money is much different from taking it when you do. He had enough to be comfortable for the rest for his life. Why risk that? You've already won whatever game you think you're playing.
Re: (Score:2)
Geeks in particular tend to forget this (Score:5, Insightful)
The FBI may not be all up to date on the latest technologies and they aren't great at dealing with things purely in the digital world. However they are one of, if not the best investigative organizations in the world. They have a lot of experience investigating crimes of all kinds, often committed by experienced criminal organizations that are quite clever.
So there's a good chance if they are interested in getting you, they will. They are quite literally professionals at it, and they institutionally learn from their experience. You very well may know a lot more about computers than they do, but they almost certainly know way more about criminal investigations than you do.
Re: (Score:1)
Re:What an idiot (Score:5, Informative)
Prior to that, the FBI took control of a forum mod's account. They asked "dread" in chat to look into something on the site that required him to log in as an admin. When they grabbed his laptop, a window with him logged into the site admin account was open. That's pretty damning evidence even without the journal.
Re: (Score:2)
Lay off the meth, homey.
Re: (Score:2)
Absolutely. My point is that all of Ulbricht's lawyer's claims and theories are completely destroyed by the evidence the FBI collected.
Re:What an idiot (Score:5, Insightful)
Full disk encryption is great, but assumes that you won't have unlocked it for the attacker.
That's why you also encrypt sensitive files separately. You only unlock the file when you're actually using it and then lock it back up when done.
Just use dd to create some space to use, create a filesystem on the file and then apply your preferred means of encryption. Encrypted USB sticks are another good solution.
Re: (Score:2)
That's why you also encrypt sensitive files separately.
This.
Re: (Score:2)
Who is kidding who. When a whole bunch of skilled people are specifically focused on getting evidence of criminal actions you have committed they will get you, if they do not make any mistakes and there is nothing you can do to prevent it. The idea is not to make so many mistakes that a whole bunch of skilled people become specifically focused upon you because by then it is way too late already. Of course once you get neck deep in criminal activity and when greed becomes you sole guiding motivation. The eg
Re: (Score:1)
Re: (Score:2)
I specifically mentioned no organisation as this is a global issue and that globally, yes, investigatory agencies do have very skilled people working for them and I thought I was pretty clear on that. Note, those same agencies just by the application of statistics also get very low skilled people working for them. Some agencies are even stupid enough to use lie detectors, which ensure those most skilled at lying ie psychopaths still get hired and they are far more interested in pursuing their own ego and t
Re: (Score:2)
Basic OpSec would insist that you keep the incriminating stuff locked in a separate container that you only open when needed and with a low inactivity timeout to demount it when you forget.
Re: (Score:2)
Not much use if the create a distraction and grab the laptop before you can do anything...
Re: (Score:1)
What I would do is have a process running that monitors input from the microphone on the laptop. If goons come and grab me before I can close it, I shout a specific phrase which would cause the laptop to shut down.
Re:What an idiot (Score:5, Funny)
Feds: "Grab him!"
Ross: "Beetlejuice!"
Librarian: "Shhhhhh!"
Feds "Cover his mouth quick!"
Ross: Beetlejuice!"
Feds drag Ross away with his mouth covered...
Fed1: "What was that about?"
Fed2: "It was some sort of codeword"
Fed1: "What do you mean?"
Fed2: "When he yelled Beetlejuice it activated a..."
Both: "Oh shit..."
Re: (Score:2)
Re: (Score:3)
Sort of like windows-L?
Too bad he wasn't running windows. Linux is so insecure.
Re: (Score:2)
Why in the name of royal fuckery would anyone operate such a machine in a public library?
Thank you for saying what I was thinking...
Re: (Score:1)
Perceived anonymous Internet access
Re: (Score:2)
So not only could he not secure his black site, he couldn't even secure the files on his own laptop.
It makes you wonder how he ever got it running in the first place.
Well, that's a big part of his defense: "How could someone so stupid be the kingpin and mastermind the government is making him out to be?" I'm starting to believe it myself.
Re: (Score:2)
He admits to creating the site originally, but claims he sold it or gave it away before any drugs were sold. So he can't be *that* dumb.
Re: (Score:2)
Re: (Score:2)
I mean, I encrypt my journal, in which I write about what movies I saw recently and the progress of people I tutor in math. And this guy doesn't encrypt the record of his illegal activities? What the hell man?!
Mental note: (Score:4, Insightful)
Mental note: When establishing a questionably legal site for definitely illegal transactions to be made through, don't keep any logs about it, nor your conversations regarding it.
Re:Mental note: (Score:5, Interesting)
Mental note: When establishing a questionably legal site for definitely illegal transactions to be made through, don't keep any logs about it, nor your conversations regarding it.
Observation: if you have a big enough ego to think you can create such a questionable site and get away with it, you have probably can't stop yourself from feeling invincible in whatever you do and dismiss any possibility that your logs will get compromised *ever*. Conversely, if have enough doubt about the eventual security of your logs in the event you might eventually get caught, you probably don't have the balls to go through with it in the first place...
Re: (Score:3)
Also "if you have a big enough ego to think you can create such a questionable site and get away with it" you're probably wrong.
Re: (Score:3)
Re: (Score:2)
Mental note: When establishing a questionably legal site for definitely illegal transactions to be made through, don't keep any logs about it, nor your conversations regarding it.
The first rule of Questionably Legal Site is . . . [fill in the blanks]
Re: (Score:2)
Re: (Score:2)
i know if i were trying someone, and wanted them to appear as a criminal mastermind, a self penned manifesto/journal would be an incredibly convenient piece of evidence. Perfectly convenient, it could turn a technically challenging case into a total slam dunk.
Fortune favors the feds in such situations it seems.
Re: (Score:3)
Problem is, without the logs, no one would believe you!.
And by that, I mean when you eventually come around to wanting to brag about your achievements - without evidence that you actually did it, no one would believe you, and everyone thinks you're just trying to satisfy some ego thing.
Yes, that's how a lot of people get caught -
Re: (Score:2)
I'm the wrong one to implicate. Your diversion will be a bit too transparent. You may as well hang a neon sign in your front window saying "IT'S ME!"
At best, someone will show up to my door with doughnuts, and we'll have a good laugh over it.
Re: (Score:2)
That's farther down the list. "Don't implicate yourself, even to your friends" :)
Re: (Score:2)
Missing the point. (Score:4, Interesting)
While a lot of people are jumping on the "..it wasn't encrypted.." "..FBI grabbed it while he was logged in.."
You are missing the point.
Step 1) NEVER carry incriminating evidence with you. Encrypted or not.
2) use a VPN/SSH Tunnel/etc (and/or both) to connect to the server where your data is. (make sure that server is located in a non-extraditing country, and filtered from you by a few shell companies)
3) keep an absurdly low 'idle-timeout' on your ssh sessions
4) use a dead-mans switch on that servers encrypted data
(i.e. run command "I_am_not_in_jail_yet.sh" every 15minutes.) {be more vague then this*}
5) ALWAYS assume that your local system is compromised. (boot/run from a read-only media)
6) don't brag about it! If more then 1 person knows; then your secret is not safe.
Re: (Score:3)
Like in C, the winning sequence starts with a 0:
Step 0) Don't do any criminal activity.
That's it, there are no more steps (not even profit!). So much can be avoided by following step 0 first.
Re: (Score:2)
How many crimes do you commit before breakfast?
You might be surprised.
Re:Missing the point. (Score:5, Funny)
None.
That's rule number 1 of crimes - never ever commit a crime before breakfast. Without the clear head that comes from getting a healthy start to the day, you'll get caught for sure.
Re: (Score:2)
Ok my morning routine:
1. Wake up.
2. Murder my neighbour.
3. Have a shower.
4. Have breakfast.
See, nothing illegal there.
Re: (Score:2)
Technically correct, but do you not consider some laws unworthy of respect? Outside the area of drug and gun laws for example (AFAIK) anal and oral sex were criminal in many parts of the US as recently as twelve years ago.
Re: (Score:2)
You are missing the point.
No. You are. You can't have perfect security.
With the exception of point 5 and 6, which are simply just good advice (but #5 wouldn't have helped him here; and #6 makes it difficult to provide a criminal service -- after all someone else needs to know about it.)
All your suggestions have caveats and vulnerabilities. I'm picking on 1 and 4 in particular below, but there are issues with 2, 3, 5 too.
Step 1) NEVER carry incriminating evidence with you. Encrypted or not.
Good advice, but h
Oh Boy! (Score:2)
I hope they never examine all the stuff I've saved on my PC and posted on line.
-- Signed,
Walter Mitty.
Note to self (Score:1)
Hackers have one major flaw ... (Score:2)
"Three can keep a secret, if two of them are dead."
~ Benjamin Franklin
/. has super helpful community (Score:2)
Every time /. has news on someone, who has committed [cyber]crime, the comments read like from ask.slashdot.org article "I would like to set up a criminal enterprise online. Any helpful tips?"
As per all "ask /." articles, most comments are borderline manslplaining (meaning, author has no experience in the field, has idea what he is talking about, but somehow it makes sense in his head and he is happy to share it). As in all diverse communities, some try to suggest that this is a bad idea and shouldn't be at
Re: (Score:2)
Fixed that for me.
Re: (Score:2)
Re: (Score:2)
Yes, indeed I did.
Re: (Score:3)
Re: (Score:3, Funny)
Yea, but know all the folks actually majoring in Crime, just copy their answers off the Criminology major in the front of the room who is just taking class as an elective. The Crime students never do the reading...
Re: (Score:2)
Yea, but know all the folks actually majoring in Crime, just copy their answers off the Criminology major in the front of the room who is just taking class as an elective. The Crime students never do the reading...
Which is why they're the ones who get caught! ;)
Re:Journal? (Score:5, Funny)
Isn't it the first thing they teach you in Criminal 101: Don't keep a journal!
It just shows what happens when you take drugs: you end up losing interest in your education and dropping out, just before you get to the part of your Criminal 101 class that you really needed. Here's the transcript:
Dear Diary,
Criminal 101 class was really, really, boring today. I don't know how much longer I can take it. We learned about a bunch of junk about how not to leave fingerprints and how to wipe a hard drive. Duh - everybody knows that. When are we gonna learn something really useful?... I think I'll just drop out.
your friend,
Ross
Re: (Score:3)
Dear Diary,
Today I learned that I'm not so bricht after all and changed my name accordingly.
your friend,
Ross Ul
Having a journal was the smartest thing he did (Score:3)
Isn't it the first thing they teach you in Criminal 101: Don't keep a journal!
Possibly, but in Criminal 504 (Profiting in the Long Term) they teach you KEEP a journal so you can write a fully revealing book later.
He may go to jail for a bit, but he can profit afterward - just hope he had the journal backed up somewhere they could not reach it.
Re: (Score:2)
Why would he have to provide evidence to verify the book? Don't lots of people write books that are only nominally non-fiction?
Not evidence - outline (Score:2)
The point of having the journal would not be for evidence the resulting book was real, it would be simply to have vast amount of source material to create a book from more quickly, so you could have a book ready sooner after trial.
He could presumably re-create most of the information from memory, but memory is fickle and it would take a lot more time to get it out.
Re: (Score:1)
Public records can be pretty expensive to access and copy.
Re: (Score:1)
It was obvious he did not understand the encryption.
On the seller side of the site there was a place to put your pgp public key. That way customers could grab it and encrypt there communication to you. I never understood why he did not configure the site to auto encrypt all messages to you with your public key. That way all the seller/buyer communications, stored on the system, would have been secured. I even submitted it to SR and got no response.
That was when I decided to move on and stop selling
Re: (Score:3)
It was encrypted. And seized while he was logged in and active.
Initial analysis was done before the laptop was allowed to shut down.
The feds may be cavalier about laws, but it's a mistake to think they are stupid.
Re: (Score:1)