Taiwan: Suspects in $100k Bitcoin Robbery Arrested

[Table] IAmA dark web expert, investigative journalist and true crime author. I’ve met dark web kingpins in far flung prisons and delved the murky depths of child predator forums. I’ve written six books and over a dozen Casefile podcast episodes. AMA (part 2/2)

Source | Guestbook
Previous thread
Questions Answers
Around here nobody talks about the argument that increased regulation of the internet would help stop child predators. Is that true, and if so where do you fall on the Net Neutrality vs law enforcement spectrum? No I don't think that's true at all. Child predators have been around much longer than the internet, and I would argue child abuse was more prevalent 50+ years ago when children were seen and not heard and it wasn't talked about. The dark web hasn't created more predators, it has just given them a new place to gather and hang out.
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused.
the below is a reply to the above
That's so interesting, thanks for the AMA! Can you remember any other thing that a child could do in order to protect himself from being abused? What other characteristics do the abusers hate in potential victims? That seems to be the main one. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What do folks talk about in the child predator forums? Do they like give each other advice on how to improve their craft? Yes, quite literally. The give each other tips on how not to get caught, how to edit out incriminating details in videos, how to drug children, techniques for convincing kids not to tell etc
the below is a reply to the above
Given your insight into how predators operate, do you have any advice for parents on protecting their kids? I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
Has the exponential increase in Bitcoin value affected darknet dealers in any profound way? I can imagine that some drug dealers were sitting on quite a large sum of Bitcoin when the value shot up. Crypto purists hate to admit it, but bitcoin would not be where it is today without Silk Road. It was sitting at less than a dollar when Silk Road began and the markets showed a robust use case for cryptocurrency and as the markets grew, so did the demand for bitcoin. It also provided real-life use data for those who were not interested in drugs but who weren't sure if it had practical application. When SR went down, Bitcoin was at about $650 and it continued to grow as adoption became more mainstream. There are many many stories of drug dealers (and at least one faux-hitman!) who gained most of their wealth not by selling the drugs, but by the growth in value of their bitcoin holdings
Since you have a lot of experience with them online. Do you think pedophiles(not child abusers) should be treated as criminals, or as people suffering from a mental illness? Contact offenders should be treated as criminals, because they are criminals. They have abused or hurt someone. Same with those who support the creation and dissemination of child abuse materials.
Pedophiles who do not act on their urges should be given as much help as humanly possible.
Are there any mysterious or suspicious pages or communities that you haven’t been able to access? Anything that seems especially weird? there are a lot of Russian communities that I can't access, mostly because I don't speak Russian. Some of the more technical hacking communities have entry barriers that I'm not technical enough to score an invite to
How much these bad people really exist out there? Hundreds? Thousands? More? It depends what you mean by bad. If you mean people who use the dark web to buy drugs (who I do not consider bad) then there are many many thousands. There are also thousands of people who deal in stolen information to make money.
Unfortunately there are also thousands of child predators and the dark web has provided a "safe space" for them to come together to share materials and "tips". I hope this is where most of the resources of law enforcement are concentrated
Ehy mine is a rare question: what do you know about art on dark web? I'm talking about the black market made of stolen important pieces from museums, art used as value to money laundry and other criminal affairs I'm an artist and what I know is people don't think too much about the dark side of art and probably they need to open their eyes about I really haven't come across much in the way of that. Some of the markets have an "art" section, but that is mostly blotter art
How accurate are the legends? Any legends in particular? For a lowdown copied from a post I made in another forum:
1Red Rooms  The one that is most persistent is the myth of the "Red Room" - live streaming of torture/rape that ends in the murder of the victim and which people can pay to watch, or even bid to type in commands for the torturer to carry out (highest bid wins!). The most famous was the “ISIS Red Room” pictured above, where people could provide instructions to torture captured terrorists - you can read what happened here.
People have this idea of Hostel with webcams exist all over the dark web, but you just need an invite to get into them. It's ridiculous. They don't exist. They certainly wouldn't exist on Tor. But people are desperate to believe and they always come back with "You can't prove they don't exist, people are crazy, therefore they must exist." Picture my eyes rolling here.
2.Hitman sites
I don't think many people are taken in by the hitmen sites anymore, though the press loves playing up the fact that there are sites offering up hitman services. But every single one of them has turned out to be a scam, especially Besa Mafia, the one that did the most marketing. Again, you can read about it at the same link as above.
3.Exotic animals  People are always asking where they can find markets for exotic animals. Obviously the illegal trade in exotic animals exists, and some communications and transactions may well take place over Tor, but there are no markets like the drug markets where you can go and look at a picture and then put a tiger or ocelot or something into your basket and buy it with bitcoin.
SO WHAT DOES HAPPEN ON THE DARK WEB?
1.People buy and sell drugs.
The drug markets are more busy than ever. You have probably heard of Silk Road, the most famous online drug market that got busted a few years ago and the owner sent to prison for two consecutive life terms? A lot of people thought that was the end of drugs being sold on the dark web. In fact, dark web sales of drugs have tripled since the shutdown of Silk Road.
The reason people buy drugs this way is that for many they offer a safer alternative for people who are going to do drugs anyway. There is no possibility of any violence. The vast majority of the time a buyer knows exactly what they are getting, because of the feedback and rating system. That's not the case in a nightclub, or even friends-of-friends, where you just blindly accept that the pill, powder or tab is what the seller says it is.
2.People buy and sell other illegal things
Mostly they buy and sell stolen credit cards and financial information, fake IDs (though lots of these are scams), personal information, “dumps” of hacked data and fraud-related items. For a long time, a seller was making a fortune selling fake discount coupons that really worked.
3.People access and create childporn  Unlike the other markets, the CP market is generally not for money, but rather they are groups who swap vile images and videos for free. The worst of the worst is called “hurtcore’. Thankfully, most of the people behind the worst sites have been arrested and put in jail.
4.People talk about stuff
There are plenty of sites, forums and chatrooms where people talk about all sorts of things - conspiracies, aliens, weird stuff. They take advantage of the anonymity.
5.People anonymously release information
Whistleblowers use the dark web to release information and make sure their identities won't be compromised. You will find Wikileaks, for example, on the dark web.
6.People surf the web anonymously
The number 1 thing people use the dark web for is just to surf the web completely anonymously. Not everybody wants to be tracked by advertisers.
I have a question: what are the odds of the casual Darkweb drug buyer - not buying mega loads all the time - the occasional purchase - what are the risks of being busted? Kinda figuring pretty low. But you’re the expert. What do you think? Obviously there is always a risk, but the risk is very low. It is rare for personal amounts to be seized. Even if a package is seized, there's usually no resources to follow it up. Many people report simply receiving a letter from Customs saying they have seized what they believe is contraband and the person has a choice of going to claim it or it will be destroyed. Even if LE does knock on the door there is plausible deniability: "I don't know who sent that stuff to me".
So yeah, rare, but it does happen. You might be the unlucky one
How do you find things on the dark web without search engines? There are a lot of entry sites, set up with links to the most popular places. You can generally get a link to one of them by browsing places like reddit. From there it is a matter of checking out different places, people will put links in forums etc.
I also use a Pastebin where people paste sites they have made/found, and a Fresh Onion site, which crawls all the newly-populated .onion addresses
Hi. there!! Thank you for answering questions. Mine is very simple. How do sellers get the drugs to people? Regular mail? That's always puzzled me bc I'd assume USPS, UPS, fedEx or any other mail carrier would catch at least some goods. If people are ordering drugs, particularly in powder form, for personal use, they can be flattened, sealed in MBB (moisture barrier baggies) and sent in a regular business envelope, indistinguishable from billions of other envelopes going through the postal system every day. The chances of a particular package being intercepted is very low.
Some people take the extra precaution of having the person taking delivery of the drugs different to the person/household that is ordering them.
How did you move from being a corporate lawyer to researching and writing about dark web? I was in London, working for one of the most conservative law firms in the world when the Global Financial Crisis hit. I liked the job but it struck me when people were losing their livelihoods that I was working for the bad guys. I'd always wanted to be a writer so when I came back to Australia I quit law and enrolled in a writing course planning to be a novelist, but I discovered I was better at journalism. I first wrote for newspapers here about Silk Road and it grew from there
I've always wanted to check out the dark web, what is a normal day for you look like on there? Can you give me any tips on how to safely surf the dark web? A normal day looks like me sitting at my desk writing things on my computer. When I'm researching a book or a case I venture away from my computer to trials and to interview people (at least I did pre-COVID)
There is nothing inherently unsafe in surfing the dark web. All the usual precautions you take surfing the clearweb apply. Don't visit any child exploitation sites - it will be pretty obvious that's what they are by the names/descriptions before you log in.
It is only when you want to do more than surfing - e.g. buying drugs etc - that you need to do a LOT of homework or you will absolutely get scammed
Is there anything good about the dark web? It depends what you are into. A lot of academic research has concluded that the darknet markets provide a safer way for people to buy and use drugs, due to the ratings of vendors, services that independently test and report back on batches of drugs, doctor on staff ready to answer questions, no violence in transactions etc.
News sites provide a dark web option so that whistleblowers can safety provide information and upload documents that get stripped of any identifying metadata before being available.
It bypasses firewalls and allows for secure communications under hostile regimes
the below is a reply to the above
How does this make you feel about the idea of the decriminalization of drugs? I've always been for full legalization of drugs, and studying the darknet markets just proved I was right.
I was invited to an experts roundtable in Portugal about drugs and cybercrime a few years ago and the Portugal model of decriminalisation has been a great success
the below is a reply to the above
Hey, you are still answering. Been reading this thread for 1-2 hours now. Thank you so much for all the good work and info! Always been intrigued by this topic, downloaded tor once to explore a bit but couldn’t and deleted it right away, to be on the safer side. Great insights. Thanks! I've been writing it for about 14 hours. Going a bit loopy
How was working on Casefile? What's the production process like? Which episodes did u do?? I have listened to... all of them.... I absolutely LOVE working for Casefile. I am a freelancer, so I source and write my own cases and then sell the scripts to Casefile. I've done at least a dozen, but some of my most popular are Amy Allwine, Mark & John, Ella Tundra, Leigh Leigh, Rebecca Schaeffer...
As for the production process, once I have sold the script to them, a staff member edits them and then they are passed on to Casey to narrate. After that, they go to Mike for sound editing, music etc. They are the best team ever
the below is a reply to the above
Oh, Leigh Leigh was so well written!! How do you choose which stories to write? Do you just pick true crime you're interested in? Thank you! I have a huge list of potential episodes. Any time I come across an interesting crime on reddit, or in the news or wherever I make a note of it. Then I just pick one when it comes time to write a new script.
Sometimes I've been personally involved (e.g. Amy Allwine), gone to trials etc. Those are always the best ones
Hi Eiley, your twitter just reminded me of this AMA :) What are your thoughts on bitcoin? And would you prefer to be paid in crypto or fiat? OOOOH, I know that name! Love & Light to you!
I like Bitcoin and I wish I had a whole lot of it and like many many people, I wish I had kept the first crypto I bought at something like $4 a coin :D I do not have a whole lot of it but I do have a little bit. I like the philosophy behind it and in theory it should change the world. However the reality is that the vast majority of it is concentrated in a very few hands which allows for market manipulation and stops it being useful as a post-fiat currency.
As long as I'm getting paid, I'm pretty happy!
the below is a reply to the question
I too remember your name Pluto! Such a decent human ❤ he is!! True OG right there <3
Is the dark web subject to more racism than its counterpart, the world wide web? There are some white power sites and that sort of thing and the chans are even more uncensored than the clearweb ones (4chan, 8chan) but to be honest they are the same cesspools in different spots. Drug forums don't seem to be very racist. I've seen worse on Twitter
Have you seen any consequential political or social organizing being carried out on the dark web? Not directly, but the dark web helped facilitate the Arab Spring uprising in 2010 by allowing activists to remain anonymous and to access blocked websites and social media. Wikileaks, obviously. Some white supremacy organizations seem to use it to coordinate attacks, but they are not places I'm keen to hang out in.
What’s the most expensive thing for sale you’ve seen on the dark web? What was surprisingly inexpensive? I can't remember specific listings, but there were sometimes sales of things like coke by the kilo, so that sort of thing I guess.
LSD could easily be found for $1/tab and one huge dealer gave it away for free if it was for personal use
the below has been split into separate questions
1. I’m going to ask a couple in hopes that one will catch your interest! I know you’re anonymous on the dark web, but even so, have you ever felt worried about your safety? I actually made the decision to be upfront and honest about who I am on the dark web, so I use the name OzFreelancer (which is easily traceable to my real name) on all the dark web sites where i went looking for interviews. The people there had the option of talking to me or not, so they had no reason to want to harm me.
2. I’ve found your comments about your relationship with Yura fascinating. Did y’all develop a friendship? Did you build any other relationships that stand out in your mind? Since you were straightforward about being on the dark web for stories, did people seem reluctant to communicate, or were they excited for the opportunity to divulge a secret? We do have a friendship of sorts, it is really quite weird. I do hope to met him one day. I met all of the senior staff of Silk Road other than the Dread Pirate Roberts himself and keep in touch with some. Some people wanted nothing to do with me of course, but many more were happy to talk to me. i think sometimes it was a relief to them to be able to talk to one person who they knew was who they said they were.
3. On violent forums, did users ever express remorse, guilt, shame, or anything indicative of some recognition that what they were viewing/seeking was awful? Do you see doxxing teams on the dark web working together to uncover info, or is the info already there through previous hacks/breaches, and someone just accesses and releases it? Sorry if any of those don’t make sense! I’m not familiar with the dark web lingo but am so intrigued by your work. Not really. I think if they were contributing to the forums, they were comfortable with who they were and what they were doing. Many of the "regular" pedophiles expressed revulsion about Lux and hurtcore sites though
these have probably been asked before but has there ever been a time where you where genuinely been scared for your life and whats the most messed up thing you've witnessed did you have any help? Yeah both things have been answered in this thread, so I'll cut'n'paste
The only time I've felt even slightly in danger despite all this nosing around in there was when I helped uncover a hitman scam. The owner of Besa Mafia, the most profitable murder-for-hire site in history, came after me when I started writing about him. He made loads of threats ("you don't know who I am, but I know who you are and where you live") but that wasnt scary, as I had access to the backdoor of his site thanks to a friendly hacker and knew he didn't really want to hurt anybody.
It took a bit of a darker turn when he told the people who had signed up to work as hitmen on his site - and who he made video themselves burning cars with signs on them to advertise how legit his site was, then never sent them the promised money for doing so - that I was the owner of the site who had ripped them off. That could have become ugly, but luckily even the thugs weren't dumb enough to believe him.
The only other time I've been a bit nervous was when Homeland Security wanted to have a "friendly" meeting with me on one of my trips to the US to attend a trial. They were friendly, but scary too.
The most frightening experience I've ever had is coming face to face with Lux, the owner of Pedoempire and Hurt2theCore, the most evil and reviled person on the entire dark web. He was responsible for procuring and hosting Daisy's Destruction, the most repulsive video ever made, created by Peter Scully, whose crimes were so bad, the Philippines are considering reinstating the death penalty especially for him.
It wasn't frightening because Lux was frightening - he was anything but. It was frightening because he looked so inoffensive and normal.
It was frightening because he was living proof that monsters walk among us and we never know.
[deleted] It is absolute crap for browsing the clearweb, and a lot of sites detect that it is odd traffic and you have to solve their CAPTCHAs before doing the most basic things
I’m sure you’ve seen some really bad stuff, do you regularly talk to a therapist to help? I've never seen a therapist (they don't really seem to be a thing in Australia they way they are in the US), but I have been known to unload on my partner and my dog
the below is a reply to the question
Yo, speaking as an Aussie, they absolutely are a thing, you can get them covered thru medicare, and I recommend it if you possibly can! Bro, therapy is awesome. I'm not against therapy as a thing, but I've honestly never been so traumatised that I feel I need it. Also I had a bad experience with a psychologist after I watched my partner die in an accident - they suggested I find God, and I noped out of there
the below is another reply to the answer
Therapist is an American term- we call them psychs. And the one who told you to find God was terrible and out of line. Yeah she didn't last long before I was over it. Also a doctor decided I needed Xanax, which was also a bad move, because what I really needed was to grieve and Xanax doesn't let you do that properly
Do you find any good things on the dark web? Happy stuff that gives people hope? Or just the trash? I like the psychonaut communities. They just want peace, love and mungbeans for everybody
Have you heard of "The Primarch System" rumor of the dark web? Sounds downright silly to me. But I'm curious if anyone who spends time on the deep web actually takes it seriously, or if as an idea it is connected to anything serious at all. Nah, up there with the Shadow Web and Mariana's Web. There's always people who want to find out where the "deeper" "more secret" "really dark" stuff is. To them I say what, hurtcore isn't dark enough for you?
Doesn't delving the murky depths of child predator forums categorize you with the child predators in the eyes of an investigating law enforcement agency? Do you have some sort of amnesty due to your journalism, or is that something you worry about having to explain away? Has your presence there ever caused some sort of a scare? No, I never went into any of the sites that had actual photos or videos (you can't un-see that shit), but did spend a lot of time in pedophile discussion forums. I also went to a hurtcore hearing and saw screenshots in the police files, as well as listening for two days to videos being described frame-by-frame and private communications between the site owner and the sadists.
Besides drugs and sex crimes, what else is going on in the dark web? Are there other interesting nooks and crannies? I often post screenshots of bizarre sites I find on my Twitter. However, the main uses for the dark web are drugs, digital/fraud goods and child exploitation
I have one, it might be rather boring though, but here goes. On these "child predator forums" are they actually forums devoted to stalking children and do they share social media profiles of children among themselves? That would be kik ids, snapchat and facebook ids, instagram, stuff like that, info that would allow online access and that may have been chosen for suitability? Creepy question I know, but anyway I would be interested to hear your answer. I came here from TrueCrime, you referred to these things in your post on that sub. I suspect I already know the answer yet would like to hear your take on it. Yes, they provide information and tips on how to approach children, how to ensure they won't tell, how to sedate them in some instances, where to find child exploitation material, how to remove metadata and any identifying characteristics in photos and videos before sharing and so on.
They don't tend to share socia media, as that is the sort of thing that can be traced easily. They do talk about how to approach kids on social media and on the worst forums how to blackmail children into stripping/meeting etc
the below is a reply to the above
So you're saying they have a more general approach rather than identifying individual children on the internet? Again a creepy question because what I suggest is that a child's social media could be used and circulated on the dark web as potential information to gain access by anonymity, even if it was just online access only. I actually wonder as I have recently read of the anonymity of apps like ''kik messenger'' and how the police are often unable to get any information from the communications as they remain encrypted and off the server and require little if any valid ID to make an account. No doubt photos from social media are uploaded as part of the materials they have. I haven't seen anything where they get together and try to track down a specific child, but I'm sure some predators do this. Most are more likely to abuse children in their orbit - family, kids of friends, or they work where they have access to children
I heard there are forums to download books but it was really dangerous, Is it true? I'm just a poor guy who wants to finish the young Jack sparrow series Whenever you download anything from a pirate site you run the risk of infection
What do you think of QAnon? Wackjob conspiracy
the below is a reply to the above
Who should the conspiracy theorists actually be worried about if they actually care about thwarting pedophilia? The vast, vast majority of child abuse takes place within the child's personal orbit - relatives, family friends, parents of their own friends, people involved in their activities (coaches, leaders, etc)
So, those people
the below is another reply to the answer
Also how to we get people to stop believing in QAnon? Outside my area of expertise, sorry
do you personally believe there was/is any truth to the "defense" (story) that DPR was a title handed down to different admins for the original silk road, or was it just a convenient defense? do you have any theories as to who satoshi nakamoto is? besides the original SR, are there any other darkweb markets that you think have a good enough story to turn into a book? eg sheep market? i've seen you talk a little about the child predator forums, and (as with h2tc) noted are mainly populated by males. i'm curious if you've ever encountered females on such forums/websites (eg. btfk) No. There was a time that I believed the person posting on the forums as DPR changed, but the ownership and administration of the market I believe never changed hands. Variety Jones is claiming a part ownership (which may or may not be true) but I believe that is so he can run a Fourth Amendment argument
So many theories have some credibility to them, but no one theory ticks all the boxes. Highly recommend the 3-part youtube deep dive by Barely Sociable
I'm not sure any one market has the story that Silk Road had, but I would like to write a definitive history that encompasses the most compelling features of all the markets. Backopy of BMR apparently got away clean. The admins of Atlantis got wind of a security issue and closed shop, trying to warn DPR. AlphaBay ended in Alexander Cazes death in a Bangkok prison cell. Then everyone flocked to Hansa, which by that time was being run by law enforcement. Evolution ended in the most brazen exit scam, followed by a bizarre cloak'n'dagger situation played out right here on reddit. The WSM/DDW follow-the-money case. And these are just some that come right off the top of my head. I just need a publisher to provide me an advance I can live off while I write it!
There were a very few people on the forums who identified as female (obvs anyone can be anyone on a dark web forum) and there have been one or two arrests of women in relation to dark web child pornography. Peter Scully's female assistant who carried out some of the torture was originally one of his victims, turned into a sadist.
What’s the one lingering unanswered question you have about SR? I am hanging out for Joel Ellingson to go to trial so that I can find out once and for all whether redandwhite, lucydrop and Tony76 are one and the same person.
There are several people who I got to "know" by their handles who I wonder about from time to time, but mostly I hope they are safe and well and i don't want to track them down or expose them
the below is a reply to the above
Eileen, I am fangirling PRE-TTY hard right now. Talking SR and Tony76 with you is how I imagine it feels to talk to a royal correspondent about Prince Andrew 😅 Ellingson being all three would be a very neat end to an otherwise insane story. Part of me wants to pin Oracle in with that trio too but that’s mostly a desperate attempt from me to add another layer to the madness. I miss the twists and turns that came with the rise and fall of SR. From your own experience - would you agree with the idea that more than one person staffed the DPR account? Thanks for the reply! Ha! You have no idea what it is like when I find someone who really knows about this stuff and can have informed conversations about it. I latch onto them and don't let go. The very BEST was meeting up with DPR's three deputies (SSBD in Australia, Inigo in US and Libertas in Ireland) so I could actually have conversations with people who knew more than I did! Variety Jones was cool too, but the conversation couldn't flow too freely thanks to him being incarcerated in Bangkok prison at the time.
I think others sometimes posted from the forum account, but Ulbricht kept a vice-like grip on his market account
the below is a reply to the above
I can imagine it’s so satisfying and exciting to get those tidbits of info that piece the jigsaw together. The bedlam that played out over the forum in the aftermath was a cloud of paranoia and adrenaline that kept me refreshing pages for days. Would love to hear accounts from SSBD, Inigo and Libertas from this time. One last question: what were your thoughts when the Chloe Ayling story first broke? I assumed it was a publicity stunt. I don't think that any more. I guess I can't blame her for milking her kidnapping for publicity in the aftermath, though I don't think she does herself any favors the way she goes about it sometimes
Sorry if this has been covered before but in your research, mainly related to child abuse, where are these children coming from? Children in their care/ family? Kidnapped? The vast majority of child abuse is carried out by someone within their social circle - family and acquaintances. However, the hurtcore stuff was often carried out in third world countries on orphans or where desperate families gave up their children to "benefactors" who they believed were going to provide food an education
What Casefile episodes have you written? I became obsessed with it and ripped through all the episodes and now nothing will fill that void. Thanks for your efforts! Casefile – the murder of Amy Allwine
Casefile – Blue Skies, Black Death
Casefile – Ella Tundra
Casefile – Dnepropetrovsk Maniacs
Casefile – Motown Murders
Casefile – Rebecca Schaeffer
Casefile – Sian Kingi
Casefile – John & Mark
Casefile – Shauna Howe
Casefile – Chloe Ayling
Casefile – Johnny Altinger
Casefile – Killer Petey
Casefile – The Santa Claus Bank Robbery
Casefile – Martha Puebla
Casefile – Leigh Leigh
Is there any way parents can keep their kids safe from this without being helicopter parents? I'll cut'n'paste a response i gave to someone else about this, because it was something that really stuck out to me:
The one thing I found really interesting when I was lurking the forums of the child predators was their frustration about how children are now taught from a very young age that certain touching and acts are wrong and that they shouldn't keep certain secrets. It came up over and over again that they could not abuse certain children because they knew those children had someone they would tell. It was pretty clear that education was a child's best defence against getting abused. Kids who speak up and who have close relationships with one or more people they are likely to confide in
What does it take in terms of degrees and experience to get into this business? Nothing official. I was a lawyer, but that had no bearing on what I do now (I did corporate law). I didn't have any official credentials when I began as a freelance journalist, though later I got a diploma of professional writing and editing. Anyone can be an author, provided they can write
If you could take a guess from your findings, what would be some speculative statistics on these abuse/torture sites? How many people (tens of thousands?) are involved? Do they generally come from the same places in the world or are they seemingly geographically random (based on victim ethnicity, or language spoken, perhaps)... what are some quantifying stats to wrap our heads around how prevalent this shit is? Most dark web users come from western countries, just because infrastructure supports it. The sites often have tens of thousands of registered users, but a lot of them would be people for whom curiosity got the better of them and who signed up then left. Active users more like in the thousands, hyper-active users the hundreds.
One of the things that makes life difficult for law enforcement is that most of these sites don't operate on a commercial basis - people aren't making money from them, so there is no cryptocurrency chain to follow. They operate on a sharing basis and to get access to the more private parts of the sites, a user has to upload "fresh" material and/or prove they are actively abusing a child. Hurt2theCore used to get users to have the children hold up signs or have the site name or a username written on their bodies with a marker. This stopped law enforcement from getting access to those parts (like the "producers lounge") of the sites unless they were able to take over an account of a user who already had access. Even then, the rules of the hurtcore sites would require constant new proof in order to maintain access.
Some sites allowed people to buy access, such as one called "Welcome to Video" and then were taken down by law enforcement carrying out blockchain analysis of the Bitcoin transaction that led to the owner when they cashed out to fiat without moneylaundering precautions
the below is a reply to the above
Do you think LE uses deep fakes to simulate a picture to gain access? Is that possible? It is definitely possible, but I don't know whether they are doing it as they are understandably secretive about their methods. I know it is deeply problematic, as even fake child porn is still illegal (even cartoon stuff, including some Hentai in some countries). But they have used questionable methods before, most notably running the dark web's largest site, Playpen, for over a year in order to identify contact offenders
the below is another reply to the original answer
Am I hearing you that many people are NOT doing this for financial gain? Just to do it and share it?? Child exploitation, yes, it is mostly a sharing community. Some people make some money out of it, but it is not like drugs where a lot of people are making a LOT of money
On the subject of abused kids... did you ever help the kids in any way? I never met any of the kids. I never saw any of the photos and videos. I don't know who any of the kids are.
Daisy has been taken into care and her identity changed. I hope she is doing okay
What exactly does the dark web look like? You hear about it often, but don’t know if it looks like Google Chrome, Safari, or just a page full of code. It looks like a normal browser and operates just like a normal browser. It's just that it can access sites that your normal browser can't.
e.g. http://thehub5himseelprs44xzgfrb4obgujkqwy5tzbsh5yttebqhaau23yd.onion/index.php is the URL of a dark web forum. If you plug it into your normal browser you will get an error. If you plug it into the Tor browser you will get the registration page for The Hub
How do you keep yourself from hating all humanity? I am happy to report that, even on the dark web, the good people outnumber the bad
Hi! First off I'd like to say that I find what you do quite fascinating and would love to do something like that in the future. My question is in regards to art and other forms of artistic expression on the dark web. Is it true that the dark web is a place where you can also find awesome things such as art and literature? Not really, because all that stuff is readily available on the clearweb. There are sites like the Imperial Library of Trantor, which is a pirate site for books, where you can read thousands of books for free, but that's really no different to The Pirate Bay. Some people share their LSD art, but again, nothing you won't find on the clearweb
submitted by 500scnds to tabled [link] [comments]

‘Baby Al Capone’ Ellis Pinsky pulled off a $23.8 million crypto heist

In January 2018, a team of some half-dozen computer hackers — scattered across Europe and the United States — scammed their way into Michael Terpin’s cryptocurrency account, fleeced it and laundered the funds: some $23.8 million, according to a bombshell lawsuit.
Allegedly at the center of the heist was Westchester teen Ellis Pinsky. According to papers filed May 7 in Manhattan federal court, Pinsky is “an evil mastermind.” The suit asks for $71.4 million.
The wildest part? Ellis was just 15 years old at the time of the theft.
To neighbors and classmates at Irvington HS, he was an ordinary 10th-grader who ran track, played soccer, loved cool sneakers and got good grades. Ellis’ bedroom in the $1.3 million home he shared with his family, including his NYU Langone-physician mother, had three computer monitors for playing his favorite games, Counter-Strike and Call of Duty.
But according to an insider, there was at least one unusual thing about Ellis. As related in the complaint, he once allegedly wrote to an acquaintance, “I could buy you and all your family. I have 100 million dollars.” The complaint also alleges that an accomplice saw, in December 2017, “records indicating that Ellis had $70 million.”
Ellis and friends partying with champagne at Up&Down nightclub on 14th street.
Pals outside the heist apparently viewed Ellis as a virtual-money wunderkind. “His best friend thought he was making money through trading Bitcoin and stock,” the ­insider said.
But the complaint alleges that Ellis was the apparent ringleader in the scheme against Terpin, who is a pioneer in the world of cryptocurrency: “In his early teens, [Ellis] began hacking computers with the mission of accessing his victims’ private accounts where they store their cryptocurrency holdings or private information.”
Ellis’ attorney, Noam Biale, told The Post: “Ellis was a child at the time of the alleged conduct . . . It is deeply unfortunate that Mr. Terpin has chosen to bring [a] lawsuit, full of smears and baseless allegations, for no imaginable purpose other than spite.”
Video games were allegedly the teen’s gateway to crime. “Ellis is a gamer. That was his primary interest,” the insider said, adding that private video-game chatrooms — where Ellis was allegedly a regular — on platforms such as Discord and Skype are often full of people bragging about hacks. “From there he got interested in stealing cool usernames.”
Using a technique known as SIM-swapping, hackers remotely transfer a victim’s digital identity from the SIM card that controls the victim’s phone to a blank SIM card in one of the hackers’ phones. Sometimes this is done to steal a victim’s social-media identity, as “OG handles” — such as @A or @evil — can be sold for big bucks.
Ellis also allegedly used SIM-swapping to steal cryptocurrency. Going from nicking names to pulling off multimillion-dollar heists is not that much of a leap, the insider insists: “Once you are in somebody’s phone, stealing valuable names, taking their Bitcoin seems obvious. Plus, stealing crypto is impersonal. For kids who spend their whole lives staring at screens and playing games, it feels natural.”
According to Terpin’s attorney Pierce O’Donnell, Ellis and his crowd were always on the lookout for vulnerable marks. As alleged in the complaint, one of the teen’s collaborators, Nick Truglia, specialized in that task. Four years older than Ellis and a onetime finance/economics major at Baruch College, Truglia’s “assignments included . . . obtaining [a victim’s] cellphone and passcode numbers, conning the mobile-phone carrier into giving him or another imposter a new SIM card and then handing the scam off to [Ellis] to execute the hack,” the complaint states. Last year, Truglia was arrested and charged with another hack. He is currently out on bail. In a civil case, a default judgment was issued against him for the Terpin robbery and he was slapped by a California court with a record-setting $75.8 million judgment.
Nick Truglia (left) was found guilty on civil charges of stealing cryptocurrency from Michael Terpin (right) — a scheme allegedly led by Ellis Pinsky.
The case against Ellis alleges that the teen oversaw the hijacking of Terpin’s BlackBerry — which led to his digital vault, called a “native wallet,” where the $23.8 million was stashed. Forty-eight hours later, said Terpin, the thieves had laundered his virtual cash.
“Your phone goes dead and theirs is alive,” he told The Post last year. “Then they own you.”
As the alleged ringleader, Ellis apparently had a knack for organizing and bullying. “He would tell everyone what to do [during heists],” said the insider. “He bragged about [the Terpin robbery] being his job. He’s a very smart guy and a control freak. If you pissed him off, he would start texting you from weird numbers and threaten you. He’d call your parents and say weird things.”
One such alleged victim was a chat-room pal who lived nearby. According to a 2018 report that the 16-year-old pal filed with Eastchester, NY, police, Ellis “made threats to me about having me or my mom killed” after he accidentally let strangers into their chatroom.
Things apparently escalated when the pal was allegedly enlisted by Ellis to help launder the Terpin money and lost some $700,000 after he sent funds to the wrong person. Crypto being what it is, the funds could not be retrieved.
After the money went missing, the pal told police, “[Ellis] asked me to start getting him some money through selling drugs, shoes or in any way possible. He requested $3,000 to $4,000 a week.” It is unclear what, if any, action was taken by authorities.
**I could buy you and all your family. I have 100 million dollars.
– Ellis Pinsky, allegedly threatening an acquaintance**
It seems that Ellis was spending his money — converted from cryptocurrency to cash — to live a high life. As per a JetSmarter ­order form provided to The Post by a source who asked not to be named, Pinsky maintained an account with the private-air service. Additionally, according to the insider, he drove an Audi R8, scored great Rangers hockey seats and dressed in splashy Louis Vuitton and ­Supreme streetwear.
How a kid explains such conspicuous consumption to his parents remains something of a mystery. Said the insider: “I think he told his parents that he made Bitcoin online through video games and got lucky.”
The complaint maintains, “Whether [Ellis’] parents were recklessly negligent or worse in failing to monitor and control their wayward son remains to be seen.”
Ellis’ fly style helped the teen fit in when carousing with fellow hacker Truglia. A photo viewed by The Post shows ­Ellis at the nightclub Up & Down, brandishing an open bottle of Dom Pérignon while flanked by slinky young women. Still, the insider said, “He showed little interest in being at the club. After posing for pictures with bottles, he’d go outside.”
Even while he was spending, the insider added, Ellis kept an eye on his money.
“He had a designer wallet packed with $100 bills but he never liked to pay for anything,” the insider said. “He was an extreme miser. He anticipated retiring from crime after the Terpin heist.”
Apparently, he didn’t anticipate getting busted by his alleged victim. After Truglia’s 2019 arrest, Ellis allegedly text­ed a mutual friend: “[Truglia] is a dumbass . . . and got caught.”
##How Ellis Pinsky allegedly spent his stolen loot: ##
Things appear to have unraveled for Ellis during an investigation of the missing crypto. As Terpin attorney O’Donnell listened to recordings between collaborators in the crime, the teen’s name came up as a key participant. O’Donnell told The Post that he contacted Ellis’ mother at her office, and a lawyer returned the attorney’s call. Although Ellis did not admit to anything, he allegedly took unusual action.
Soon after, according to the complaint, “Pinsky . . . sent cryptocurrency, cash and a watch to [Terpin] without any condition . . . There was no other reason to repatriate these items — worth nearly $2 million at the time — other than to make a partial repayment of what he had stolen from Terpin.”
According to O’Donnell, among the items was a “Patek Philippe Nautilus [watch], worth over $100,000.”
As the civil suit hangs — O’Donnell and Terpin anticipate a response from Ellis’ attorney within the next 60 days or so — no criminal charges have been filed against the teen.
“I want to know why [prosecutors] have not indicted this kid,” said O’Donnell. “He is caught dead to rights.”
A Department of Justice spokesman would only say that “Ellis Pinsky has not been charged by this office.”
Terpin admitted to The Post that he waited until Ellis’ 18th birthday earlier this year to file suit against the teen as an adult. That way, Terpin said, “It will be easier to sue him [than it would be if he was a minor] and we’re intending to get treble damages” — repayment of three times the sum stolen. “These are crypto gangsters. My nickname . . . for [Ellis] is Baby Al Capone.’”
Ellis, apparently, is still living at his mother’s Irvington home, as a Post photographer spotted him there last week.
“Look at Ellis’ life and there is no reason for him to do what he did,” the insider said. “He’s a standout kid with a dark side.”
Source: https://thedailyblockchain.news/2020/05/24/baby-al-capone-ellis-pinsky-pulled-off-a-23-8-million-crypto-heist/
submitted by iMakeWebsites4u to daily_blockchain_news [link] [comments]

How can it work like this?

So the facts of my case, details will not be the same for obvious reasons. I am here because my lawyer if fucking me.

Say I work in retail and during business hours, a large some of money got stolen from the safe that was left unattended. There are only 5 employees in the building at the time but not me. Let's say the amount is $15,000.00 in 20's. The police are called and everyone and the premises are searched, nothing is found and investigation continues. Manager that left the safe open is of course fired. I would also like to point out that is common knowledge that the manager leaves the safe open during business hours, against company policy and, I had made comments about it to other employees and the manager about keeping the safe closed.

Fast forward a month later, I had sold some bitcoin for cash, let's say $10,000 in 20's. I deposit the money into my account, another coworker is in the bank so I go to a private area to conduct business because I want to avoid rumors, and of course it's at or over $10,000.00 so they report it to FINCEN, bank employee says it was suspicious that I asked to go to a private area to conduct business.

What happens next? I get questioned, and accused before I can utter a word, I ask for a lawyer and they let me leave, they stated my asking for a lawyer makes me guilty and they will be pursing this further. The police tell my place of work what they discovered and I get fired. I do nothing, and a month later I get arrested and charged with possession of stolen property and money laundering.

Prosecution claims, that I had knowledge that the vault is left open and had made comments about it. Now here comes the most bizarre part of this case, they claim that being in possession of a large sum of money after the money got stolen is poof enough that I committed the robbery. They also claim they do not have to prove that I committed the robbery citing some bizarre legal precedents, that claim that it doesn't matter who committed the robbery it only matters that I am in possession of money that was stolen. They reason this because I cannot prove where I got the money, and that the because I deposited 20's and 20's were stolen that is a clear link. They also claim opportunity because I can't prove where I was on that day, I stayed at home.

This is really pissing me off, my lawyer isn't helping me, and I am going to have to sit in front of a jury where decide who is lieing rather than considering facts.

Does anyone have any legal precedents that I can I use to get this case thrown out?
submitted by throwaway11559911 to legaladvice [link] [comments]

DIGITAL GOLD TOKEN, THE STABLE COIN THAT OFFERS UTMOST TRUST

DIGITAL GOLD TOKEN, THE STABLE COIN THAT OFFERS UTMOST TRUST
Presentation

Throughout everyday life, everybody will experience an assortment of significant minute, extending from setting off for college, getting hitched and having a family, to retirement - that requires no little expense.
Without great money related arranging, it is hard to address every one of these issues on the off chance that you just depend on investment funds and month to month compensations.
Besides, in the event that you just rely upon things like; Finish of year rewards and a questionable compensation increment, or the aftereffects of bank premium whose worth will keep on being dissolved by swelling, or credits from manages an account with high financing costs. In this manner, it is significant for you to have a uninvolved wellspring of salary by beginning an investment.

https://preview.redd.it/emjd0raawvb41.jpg?width=311&format=pjpg&auto=webp&s=33a900e46590c37e452212afea0bb2daf282b5f0
  • INVESTMENT -
I don't think I have to expand any longer, since I'm certain everybody including you definitely thinks about investing. presently, everybody as of now has an attention to the significance of investment.
Notwithstanding, when somebody needs to beginning an investment, he generally feels an exceptional issue which incorporates: what is the best investment? , where and how to do it?

  • GOLD -
Whenever seen from its history, gold has become an image of riches and has additionally been utilized to save riches for a large number of years in mankind's history.
What's more, founded on close to home research through money related gatherings and comparable discussions that I took part in, gold has consistently been the response to questions identified with "the best investment".
Gold is constantly said to be a wise investment decision contrasted with different investments.

https://preview.redd.it/i19rvt7bwvb41.jpg?width=302&format=pjpg&auto=webp&s=698b1a401297bfa5617a89b7a66d0b65f26c12d4
Be that as it may, investing in physical gold isn't as straightforward as one would envision, there are various interesting points in regards to how and where to begin doing it.
This was driven by the gold obtaining framework for wasteful investment purposes, for example, check of individual personality and reports identified with the exchange procedure that can sit around idly, and furthermore a place to store that ensures the security of your gold with costly rental charges - from one perspective this will make it hard for people with little money to beginning investment.

DIGITAL GOLD - GOLD token - Your gold investment arrangement!
In the wake of understanding the gold buy and investment plot in physical structure that feels exhausting, it isn't extraordinary for somebody to demoralize to purchasing gold and start invest in gold.
In this manner, DIGITAL GOLD is here to defeat every current issue identified with gold buys and investments by building up a token - GOLD token.

https://preview.redd.it/8bpa5y5cwvb41.jpg?width=275&format=pjpg&auto=webp&s=dbd930244c92d4ef8b3eea0e8978ba8f308c661a
GOLD tokens - a progressively functional gold.
DIGITAL GOLD Ltd - an organization that utilizations Blockchain innovation in building up its undertakings, starting at 10-09-2019 has formally propelled the platform and GOLD token.
By utilizing Blockchain innovation which has been known as worth administration and a more brilliant and progressively effective stockpiling framework,
DIGITAL GOLD has made a platform that has different imaginative highlights that enable you to purchase and store physical gold inclusion in a split second yet stay mysterious through GOLD token, a token dependent on Ethereum ERC20.

GOLD token - StableCoin
DIGITAL GOLD ensures the estimation of GOLD tokens since GOLD token of 100% bolstered by physical gold put away in a sheltered vault, the cost of every GOLD token equivalents the cost of 1 gram of unadulterated gold and is legitimately connected to the spot cost of gold continuously.

GOLD token - Trust
GOLD is a token based on the Ethereum Blockchain known as a decentralized PC organize that can record exchange follows with the help of keen agreement includes that are proposed to encourage and confirm exchanges believably without an outsider and can't be changed yet stay straightforward.
This implies GOLD token are given utilizing an Ethereum keen agreement, the quantity of tokens available for use will approach the aggregate sum of physical gold put away in the vault.

What's more, to expand certainty that there are no breaks of security and defenselessness in GOLD shrewd agreements, DIGITAL GOLD Organization has requested a review from ChainSecurity - a notable organization in the Ethereum brilliant agreement review field.
The ChainSecurity review report expresses that the GOLD-savvy contract is totally protected and liberated from issues of truth.

https://preview.redd.it/tpqrp0adwvb41.jpg?width=275&format=pjpg&auto=webp&s=cda766eeb0147087ec8859dcc8c8be34d415dc79
GOLD token - Security
As depicted above, in the event that you need to invest in gold, you should consider a capacity to guarantee its security. Safe Store Box benefits that require extra expenses are not the correct arrangement, nor are they safe on the off chance that you purchase physical gold and store it under a sleeping pad in your home, on the grounds that the danger of burglary and robbery will prowl.
Rather, DIGITAL GOLD guarantees the security of your assets consistently! With GOLD token now you don't have to stress over your gold security!.
At the point when you purchase a specific number of GOLD token, a similar measure of physical gold will be put away safely in the organization's vault, which for this situation Digital Gold has shaped an association with BullionStar - a main vault store administration.

Different highlights and points of interest of GOLD tokens
GOLD token are ensure a security and solace to you, numerous different points of interest of GOLD token include:
  • Moment, boundless and unknown gold buys:
Whoever you are, regardless of where you will be, you can now effectively purchase gold in any sum through GOLD token without an outsider, without experiencing a long procedure, and without submitting records which contains your own personality.

https://preview.redd.it/oif2xuwewvb41.jpg?width=225&format=pjpg&auto=webp&s=914f43c25b8f6e5872878b6468eddd4663acc9aa
  • Exchanges without expenses:
DIGITAL GOLD - GOLD Token gives an extremely productive framework to purchasing gold, other than that,
DIGITAL GOLD - GOLD Token likewise guarantees that your assets don't work just as a store of significant worth, notwithstanding, also Gold Token can be utilized effectively regarding tokens as a day by day monetary everyday practice.
All exchange exercises with GOLD token are free! You can make the same number of installments as you like with no exchange expenses.

  • GOLD - Stablecoin as a support in the cryptographic money market:
The digital money market is known as an extremely unstable market, regularly a cryptographic money loses esteem when the market is in a negative condition.
In cases this way, the GOLD token gives capital security on account of its value strength in light of the fact that the cost of the GOLD token is equivalent to the cost of unadulterated gold.

Digital Gold Marketplace

Acquiring GOLD token is basic! You can undoubtedly purchase or sell GOLD token with Bitcoin and Ether, on the grounds that the DIGITAL GOLD platform is a completely utilitarian environment and has its own market that is furnished with fundamental devices to assist you with investigating the market.

Furthermore, you can likewise utilize client care for data identified with different highlights of the DIGITAL GOLD Platform.

https://preview.redd.it/9eunbvfgwvb41.jpg?width=275&format=pjpg&auto=webp&s=0bba2786a9cd79a11e546b50f9d6073132b6c7f3

  • Wide inclusion in different markets: For this situation, Digital Gold encourages the liquidity of GOLD token by promising the enrollment of GOLD token on different cryptographic money trades, this plans to empower every client to make buys and deals on most loved digital currency trades.
What's more, as a solid advance, at present GOLD token have been enrolled in Cryptex - a cryptographic money trade that additionally works with different money installment frameworks and electronic installments.
Along these lines, regardless of whether you don't hold digital currency like Bitcoin or Ether, you can purchase GOLD token with money and an electronic installment framework at Cryptex.
In the interim, DIGITAL GOLD is likewise in contact with another trades with an end goal to give GOLD token to a superior range to all markets.

End
DIGITAL GOLD - GOLD token furnish investment openings in gold with exceptionally fluid alternatives to every individual/gathering of investors.

https://preview.redd.it/ktfezxmhwvb41.jpg?width=600&format=pjpg&auto=webp&s=7b6626f6cf8763b10bd6477d0052c5dc7ad1cff1
Through the DIGITAL GOLD Platform, clients can profit by blockchain innovation that takes into account solid exchanges.
With GOLD token, all questions about gold investment have vanished.
GOLD token are a suitable arrangement as a wellspring of automated revenue from the energy about the estimation of gold. Presently you can without much of a stretch beginning a decent money related arrangement for your present moment or future needs.

Last Word: There is a colloquialism that says: "investing Is Dangerous, Yet Not have investment Is Considerably More Hazardous".
What's more, whenever there are GOLD token that offer investment openings without hazard, for what reason would you say you are as yet far fetched?
This article is just a basic portrayal that may likewise not speak to DIGITAL GOLD all in all. Along these lines, Learn and find the different highlights and advantages of DIGITAL GOLD -

Official Website: https://gold.Storage/
White paper: https://gold.Storage/wp.Pdf
Telegram: https://t.Me/digitalgoldcoin
Twitter: https://twitter.Com/golderc20
Medium: https://medium.Com/@digitalgoldcoin

Author: jaywizzy Link: https://bitcointalk.org/index.php?action=profile;u=2268796
submitted by jaywizzzy011 to CryptocurrencyReviews [link] [comments]

Ultimate Guide To Drug Dealing

DISCLAIMER: As someone in their late teenage years, many of these mistakes have been made, and most of them have been learned from experience. This guide has been created to help educate anyone involved with drugs on how to best protect themselves against law enforcement, and to do this for a very, long time. However, despite this probably being the quickest and easiest method to generate money, the risk far outweighs the reward. You can put your family, friendships and personal life in jeopardy, and you will have to rely on too many stupid people not to get caught. If you or your friends don't mind that, then read this before you do:
General statements
-Keep business and personal life separate. This will depend on the anonymity of your business life. For example, keep your family separate by fabricating an alternate persona for your business life.
-Don't get high off your own supply. Consuming your own product may reduce any profits you make. For example, you buy a bag of product but inject it all in one day, now you don't have enough money to buy more needles and expand your business.
-Frequently test your product. Failure to do so in an unregulated business may eventually result in overdose, arrest and death. For example, you decide to sell a new batch of product your supplier has cut without reagent testing, and you are later arrested because your customer died of a fatal substance interaction.
-Invest and sell in bulk. Only invest in large quantities of product that have the highest profit margins and rate of purchase, while reducing the customer base to bulk buyers. For example, products bought in bulk such as benzodiazepines, cannabis, opiates and amphetamines will generate the most income.
-Trust no one. Don't engage in activities that require trust such as fronting people anything like money, or product. For example, if a junkie can't afford his addiction, don't fuel his debt.
-Loose lips sink ships. Unnecessary disclosure of sensitive information can be used as evidence against you. For example, your customers think it is okay to short change you because you've boasted to them about how many gucci belts you own and how much money you earn.
-Don't shit where you eat. Everything relating to your business should be dumped off your property or destroyed. For example, you should never be vulnerable if you get raided.
-Better safe than sorry. Never get comfortable, always analyse and improve your security. For example, imagine you are the prosecutor looking for holes in your defence in court.
-The aim of the game is to have no name. Make it known to your associates that you will not do business with anyone who discloses your name or any sensitive information. Cut everyone off who does, as this presents a major security issue for you. For example, if you have any unknown contacts for your business, then that is an indication you need to cut off one of your associates.
-Ignorance is bliss. The less you pretend to know about anything related to your business, the better. For example, intent to possess or sell product is usually required for law enforcement to charge you with an offence.
Transactions
-Only do business with virtually untraceable currency, such as cash or bitcoin. This will prevent law enforcement from using money as evidence for any purchase or sale of illicit products. For example, any cash that is seized by law enforcement requires evidence to determine if it is illegal money.
-Never let anyone know your property. This is because your property will link back to your personal life and compromise your anonymity. For example, no one should know where you live, what car you drive or firearm you possess.
-Never handover product first, without the handover of money. Customer could receive product without releasing funds. For example, you give a crack-head a bag of product and he runs away with it.
-Don't do business with anyone you don't know. A verification system must be used to qualify people as associates such as customers, suppliers or employees, where a person requires at least one successful transaction to be able to make direct purchases or sales, and people without verification should not be able to contact you. For example, you can be relatively certain that a potential customer is legitimate if they have made a successful transaction.
-Use third parties and dead-drops for high risk transactions. These techniques make it difficult for law enforcement to create links because they separate you from any transaction. For example, your middleman was able to retrieve your product because law enforcement did not have the resources to constantly surveil the dead-drop.
-Never come under control by other people's property. Doing so reduces the chance of you being able to escape a robbery or arrest. This includes things such as cars and houses. For example, you give money to a person inside his car in exchange for product, then he hands you a bag of dog biscuits and drives away.
-Dictate the location/time of every transaction. This reduces the chances of being robbed or arrested. For example, choosing a time closer to a transaction, and a location further away from a station would give less time for law enforcement to act.
-Keep all transactions public and discrete. This reduces your chances of getting robbed. For example, think of creative ways to make a transaction in public more appropriate and efficient.
-Don't use your vehicles for business. Vehicles have number plates which can be traced back to you through registration. For example, you can get pulled over and charged by law enforcement should there have been reasonable suspicion to search it.
Communication
Don't use unencrypted or any particularly insecure methods of communication. This includes anything that can be used to identify you with your business, such as mobile phone numbers, email services and social media. For example, you were arrested because your phone was tapped by law enforcement while under investigation, or you were caught selling product online when Facebook granted law enforcement access to your account.
-Force any encryption onto electronic communication between yourself and anyone related to your business. This includes customers, suppliers and employees. For example, you can use encrypted anonymity tools for communication such as Tor and Wickr to conduct business.
-It is best only with verified associates to discuss sensitive information in person. Using electronic communication in this case is more vulnerable than communicating face-to-face, given that you can't be certain of who is on the other side. For example, it is important to treat personal communication as a layer of security if you have reason to believe your electronic methods of communication have been compromised.
-Never leave any electronic device to hibernate while you are accessing sensitive information related to your business. Other people can retrieve your sensitive information from devices such as computers, phones, hardrives or tablets while you are not present. For example, a house mate gains access to your sensitive information because you left your laptop to hibernate while you went to the toilet.
-Use a logless VPN to change your IP address (physical location) to hide from your ISP (internet service provider) from your electronic devices when in use. This is so that your communications and browsing history cannot be linked with any of your business online. For example, accessing the same website through both business and personal ISP accounts without a VPN may link your personal internet traffic history to your business activity elsewhere, making you a potential suspect for law enforcement.
Evidence
-Don't store your entire stash on your property. Even if the stealth was so impeccable that you could not find its location yourself, drug dogs in a search warrant will.
-Keep all things related to packaging hidden and separate from product when not in use. This is so that they cannot be identified by law enforcement and linked with the sale of product. For example, written documents, clip seal bags, scales, mail, cutting agents, heat sealing devices and drug paraphernalia.
-Ensure product during processing is disposable at all times. You should be able to dispose of product in the process of packaging before law enforcement can get to it. For example, you flushed the product down a toilet or sink before police could seize it during a raid.
-Move stash frequently. Repeated visits to your stash creates a pattern which can be traced if you are under investigation by law enforcement. For example, the police followed you to your stash from home, planted cameras near your stash and acquired evidence for the stash being in your possession.
-Don't let anyone else apart from yourself know where your stash is located. Doing so will most likely result in a robbery, and it can also result in your arrest if that person became a police informant. For example, your stash goes missing, your employee gets arrested or robbed, unable to return funds or product, and snitched on you after having informed him where your stash was located.
-Wear gloves, hairnets and long cloths when handling business. Biometric evidence such as fingerprints, hair follicles and skin can be used to gather evidence for possession of product. For example, your fingerprints on that bag of product is evidence of you possessing it.
Destroy (wipe) all digital evidence after use. You can wipe hardrives clean with programs such as DBAN, and wipe any digital documents and photo metadata with software like Tails, and learn how to factory reset your mobile devices. Ideally, all digital information must be temporary, amnesic and self-destructing.
-Destroy (burn) all physical evidence after use. Do not dispose of evidence inside your property's garbage bins, as it is routine for law enforcement to search them. For example, if you dispose of evidence such as clip seal plastic bags and documents in your bins, it could be used against you as evidence after law enforcement have collected it during a search warrant.
-Regularly wipe electronic devices that may contain information related to your business. This is so that law enforcement can't use that evidence against you if they have a search warrant to seize and analyze your digital belongings.
-Build a team that live in the same property. Living with other people that work for you increases business availability, and ambiguity for the prosecution after a search warrant. For example, any product found requires evidence such as fingerprints to discover who exactly is in possession of it.
-Remove all physical and digital evidence from property if you believe you are under law enforcement investigation. You must take every precaution necessary so that law enforcement cannot find a shred of evidence of your illegal activity if they execute a search warrant. For example, the prosecutor couldn't press charges on you because they found no evidence to support their case.
Game over
-Don't talk to police. Anything you say can and will be used as evidence against you. Suppose you said everything right, talking to law enforcement is still a no win situation. For example, you could have said everything right in the police interrogation, but the prosecution can still claim that you weren't cooperative since you had essentially denied everything.
-Know your rights. State nothing except for your name, date of birth, and right to silence and an attorney when being interrogated by law enforcement. You will most likely incriminate yourself if you fail to do so. For example, police stopped questioning you when you exercised your right to silence and an attorney.
-You know nothing. Do not admit to knowing or remembering anything. For example, if law enforcement ask you if you remember anything about a package they found in your property during a search warrant, your defence can be a complete lack of knowledge and intent for such a claim.
-Play dumb. You don't know or understand anything about the law, the morality in breaking it or the likely risk of engaging in activities that do. The less culpable (guilty), and the more naive you are about the law, the better chance you have of winning in court. For example, defences such as mental insanity and impairment are successful when the defendant demonstrates that he does not understand the morality of the charges.
-Don't appear guilty. Become void of all body language as not to raise suspicion of your guilt. For example, defensive postures, eyes that stray left and right and feet that point toward the door are all signs of guilt that law enforcement will detect. Leave all emotions out of the process, especially guilt. For example, you confessed in an investigation room because you broke down after being told how many years in jail you're apparently going to serve, and that all further charges would be dropped if you confessed. Don't be that guy.
You're in trouble
-Don't talk to federal agents. Say nothing of substance; anything you do say can be falsified, editoralized or misinterpreted. Believe it or not, at this level law enforcement are willing to lie in order to convict you. For example, a federal agent tells you that you won't hear from them again if you cooperate with police, then you get a call later from a prosecutor detailing your court date.
-You are guilty until proven innocent. The investigation process is no longer about guilt or innocence. For example, federal agents at this level care more about catching you out on a lie than determining your innocence.
-Don't deny anything or behave surreptitiously. Anything you say is now open to further investigation. For example, federal agents opened up an investigation on your associates because you avoided sharing information about them.
-Always divert federal agents to your lawyer. Whether they are dropping their business cards on your car window, turning up to your front door, or in an interview with you, always have a lawyer to engage them on your behalf. For example, a federal agent threatens you with a grand jury-subpoena if you do not talk, you tell them to address your lawyer about it.
-Record any encounters you have with federal agents. The only advantage you have over them is relying on their ability to lie or make errors, since they are not legally allowed to record you, other than in their peer reviewed notes.
Next up is the NSA, and a guide to hacking and being a fugitive. That is, if I'm not in prison by then.
submitted by HowToCriminal to Drugs [link] [comments]

How much would a database of early Bitcoin adopters be worth?

Imagine for one second that TZ was Bitcoin, and they year is 2009/10. Now imagine you held a complete database of every Bitcoin address linked with personally identifiable ID. How much is that database now worth to criminals? What would they do with it?
How much will the Tezos KYC database be worth in a few years? And what lengths would criminals go to to obtain it?
Do you want to be part of the database?
https://www.telegraph.co.uk/news/2018/01/28/britains-first-bitcoin-heist-trader-forced-gunpoint-transfe
Armed robbers broke into the family home of a city financier turned Bitcoin trader and forced him to transfer the digital currency at gunpoint, in what is believed to be the first heist of its kind in the UK
https://www.ccn.com/leningrad-bitcoin-blogger-who-boasted-of-his-wealth-gets-robbed-and-beaten/
He said that the robbers, most of whom wore New Year’s masks, hit him in the eye with a pistol before tying him up, according to NTV. The robbers then tied up a friend of his on the second floor and took a safe containing the equivalent of 24 million rubles and important documents, as well as a computer he used for trading bitcoin.
https://www.ccn.com/1-million-bitcoin-ransom-reportedly-paid-for-kidnapped-exmo-executive/
On December 26, 40-year-old IT specialist and bitcoin exchange executive Pavel Lerner was kidnapped in Kiev, Ukraine. He was reportedly forced into a Mercedes-Benz Vito by unknown assailants wearing dark clothes and balaclavas. Lerner, a leading analyst at cryptocurrency exchange EXMO, stopped answering the phone after leaving the company’s offices.
https://www.ccn.com/dubai-police-arrest-suspects-behind-1-9-million-bitcoin-heist/
Dubai police have apprehended a gang of ten individuals alleged to have stolen Dh7 million (approx. $1.9 million) from two victims in an armed theft involving the purchase of bitcoin.
https://www.11alive.com/article/news/crime/five-arrested-in-plot-to-break-into-forsyth-county-home-to-steal-bitcoin/85-551507487
CUMMING, Ga. -- The Forsyth County Sheriff's Office said five men had conspired to break into a Forsyth County home and steal nearly $1 million in Bitcoin. Their robbery investigation has been ongoing since January, 2018.
https://www.nytimes.com/2018/02/18/technology/virtual-currency-extortion.html
In the beach resort of Phuket, Thailand, last month, the assailants pushed their victim, a young Russian man, into his apartment and kept him there, blindfolded, until he logged onto his computer and transferred about $100,000 worth of Bitcoin to an online wallet they controlled.
http://bitcoinist.com/ottawa-police-hunting-for-armed-bitcoin-robbery-suspects/
Police in Ottawa, Canada, are on the manhunt for armed Bitcoin robbery suspects who staged an attempted daylight robbery of a Bitcoin financial business.
https://www.aljazeera.com/news/2018/02/bitcoin-robbery-taiwan-leads-arrests-180222085146715.html
Taiwan police have arrested four men over a bitcoin robbery worth five million Taiwanese dollars ($170,000) in what the police said is the first case of its kind on the island.
submitted by broadcaregiver to tezos [link] [comments]

Playing a masterful siege/heist

So, I am going to run a one-shot in a few weeks and I was thinking something along the lines of La Casa de Papel or The Inside Man: a story set almost entirely within the four walls of a bank, and in which the PCs are the bandits/hostage takers with the extremely sophisticated plan to keep one step ahead of the police and get away with the McGuffin.
Which brings me to the question: how could we run this? I'd like your help to brainstorm this.
I don't have a specific ruleset (or even setting) in mind, but I'll be borrowing a few ideas from Fate and Blades in the Dark.

There is no plan

The first thing to do is give up on writing the masterful plan ahead of time. No plan survives contact with the players, plus the writers of these stories always cheat, so why wouldn't the GM? The plan will be decided by the players as the story unfolds.
Similarly, the mistakes they have made while executing/preparing the plan will be decided based on their character sheets and on the plan itself. For this reason, every PC must have at least one useful Trouble that will be used by the Opposition to foil the plan. More on this later.

Starting

Rather than planning ahead, let's start in the action. The players know the initial/official objective of the heist, the general layout of the place and the number of guards, hostages, the size of things they could bring in, etc. At this stage, there is no plan for escaping, no help from anyone outside the bank, but all this can change.
Their guns are out. First roll to find out how things have gone so far. A few examples of things that can go wrong at startup:

Flashback-based setup

How did the PCs get to know each other? How long have they been working on the heist? Did they bring a change of clothes or cellphone jamming equipment? Do they have an accomplice outside or a mole in the police? A few things can be agreed upon simply, but for anything else, let's do Flashbacks.
Each PC starts with 3 Siege Points. One Siege Point can be used to trigger a Flashback, which is described by the player.
Example Flashbacks:
The PCs and the GM are responsible for determining whether a Flashback makes sense. So, if the Queen of England has never been mentioned during the first 3 days of the heist, it's too late for her to be in the crowd. On the other hand, it may still be time for her nephew to be among the hostages.
By definition, a Flashback is a success as far as the characters know. However, if something looks like it could fail, roll the skill. Anything other than a full success (however it's called in your ruleset) will be interpreted as a "yes, but" and will have consequences that will be triggered at some point during the siege. Of course, some instances of "yes, but" will be worse than others.
Examples:
For the sake of storytelling, the players will learn about what's wrong once this fact comes into play, but the characters may need to roll to find out about it – or might never learn about it at all.
Whenever the players use a Siege Point to trigger a Flashback, it goes to the Opposition, which can later use it to trigger a Breakthrough.

Progressing with the plan

Some elements of the plan can be settled through pure role-playing. Others are basically along the lines of "we need to dig a large tunnel to the closest canal", "we need to get sufficient heat on the police", "we need to print banknotes", "we need to convince the hostages to hide the money for us", "we need to dig in against the assault", ...
These are materialized as Clocks. A plan will typically have at least two Clocks:
The GM estimates how many Ticks are required to complete the Clock. It could be as few as 4, as many as 32. Whenever actions by the PCs go towards accomplishing the objective, fill one or two Ticks.
However, actions by the PCs or the Opposition may enlarge a Clock or destroy it entirely: it's harder to convince the hostages to help willingly if they have been tortured, harder to dig a tunnel if the tools are damaged or if the police is waiting on the other side, ...
If the Clock is destroyed or unachievable... well, I'm sure that the characters had thought about that. Time for a Flashback to find out what their real plan was all along.

The Opposition

The PCs are dug in the bank. Everybody else is the Opposition. In a modern bank theme, that would be:
Each of this group has (as a whole) one character sheet and the objective to foil the plan (in this setting, they also all need to keep the hostages alive, but other settings may be different).

When do they act?

Each of the Opposition groups has its own Clock that determines when they do something. Whenever the PCs fail a roll or get a "yes, but" outside of a Flashback, this causes one or two Ticks on some Clock – the GM decides which Clock, depending on what makes sense.
The Clocks are visible to the players and PCs. One of the main running goals of the PCs is to make sure that they are ready to discourage or fend off an assault by the SWAT team or an escape attempt by the hostages, at all times. It's up to them to formulate a plan to do both, either through roleplaying ("let's barricade the doors and tie down the hostages") or Flashbacks ("we brought antipersonnel mines, let's use them", "we have taken hostage the husband of the SWAT team leader").
Actions can vary. Typically, they are direct consequences to something that the PCs have been doing, including in a Flashback, as long as it makes sense. For instance, if the PCs have got a "yes, but" in a Flashback, this is something that the Opposition can use. Other ideas:
Actions can also be based on Breakthroughs.

Breakthroughs

As a whole, the Opposition starts with 3 Siege Points that they can use at any time to trigger Breakthroughs. Whenever the PCs use a Siege Point, it goes to the pool of Siege Points that the Opposition can use for Breakthroughs. A Breakthrough is basically the counterpart of a Flashback and adds a new fact to the story:
Breakthroughs can be based on:
Example of Trouble:
PCs and GM are in charge of making sure that Breakthroughs are not too overpowered. Players are aware of the Breakthrough, but the characters typically aren't.
Whenever the Opposition uses a Siege Point to trigger a Breakthrough, this Siege Point goes back to the Bandit's pool of Siege Points.

Everybody's tired, everybody makes mistakes

Neither the bandits nor the Opposition will manage to rest while the siege is under way. This means that regardless of your rulesets, there is no automatic recovering from damage (including psychological damage) on either side. In fact, even if it may remain mostly non-violent, the entire siege is one big "fight scene".
This also means that everybody is getting tired and tired people make mistakes or fail for no good reason. This is materialized by the Weakness Clocks. The PCs have one shared Weakness Clock and the Opposition has one shared Weakness Clock. Whenever one side somehow gains an advantage against the other side, they add one or two Ticks on the other side's Weakness Clock.
Fill the other side's Weakness Clock and, exactly once, you can start using one single Siege Point to make one of their dice rolls harder (details need to depend on the ruleset). For the moment, that's all, except a second Weakness Clock appears for the other side. Fill it and you can now do this twice. Fill it again and you can do it three times, etc.

Ok, that's it for now

Wow, that was a pretty long braindump. I'm interested in feedback and ideas. Would you play in such a mini-setting? What could go wrong?
submitted by ImYoric to rpg [link] [comments]

Shadow Brokers release NSA hacking tools, but were the tools used in a series of bank robberies involving the SWIFT transfer system?

Shadow Brokers Leak Reveals The NSA's Deep Access Into SWIFT Banking Network

In August of 2016, a group calling itself the Shadow Brokers emerged with a treasure trove of purported NSA hacking tools. The group released only a small portion of its take and eventually tried unsuccessfully to auction the good stuff. When no one offered to pay, Shadow Brokers decided to give it away for free.
In an enterprise setting, however, disabling the Windows Firewall and allowing remote desktop connections is quite common. That's where these exploits were designed to work, and the Shadow Brokers data appears to reveal that the NSA used these tools against at least one eyebrow-raising target: a SWIFT bureau in the Middle East.
Following The Money
As part of the Bush administration's War on Terrorism the Terrorist Finance Tracking program was set up. Under TFTP, the U.S. gained the ability to monitor transactions carried out via SWIFT. Why target SWIFT specifically? There are upwards of 11,000 banks in 200 countries that use it, and they exchange around 15 million messages a day. If you need to keep an eye on large amounts of money moving internationally, SWIFT is the key.
•••
A leaked PowerPoint slide appears to confirm that the NSA had successfully set up backdoor monitoring on 9 banks running SWIFT Alliance Access (SAA) servers. At least three others at another SWIFT Bureau were targeted, but they had not been compromised at the time of creation of the PowerPoint presentation in 2013.
A Rundown of the Biggest Cybersecurity Incidents of 2016

Most expensive attacks: Leoni and Bangladesh Bank

Large multinational companies are the prime targets of Business Email Compromise (BEC), which is a type of online scam that usually begins with an attacker compromising a legitimate email account and tricking the company’s financial officer to wire funds to their accounts. Typically the companies that fall victim to these scams deal with foreign suppliers and habitually use wire transfer payments. Victims of BEC scams have increased 270% since the start of 2015, and this year saw one of the largest amounts lost by an enterprise. Read more

Biggest attack vector in finance: SWIFT

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a global transaction messaging network used by banks and other financial entities such as foreign exchanges and investment firms. Unfortunately, this year saw attackers targeting SWIFT clients, compromising and manipulating organizations into sending fraudulent money transfer requests. It’s unclear how many of these attacks were actually successful, but in June, SWIFT sent its clients a letter warning them about the possible dangers. The organization also urged clients to update their software and tighten their cyber defenses.
Shadow Brokers Dump Alleged Windows Exploits and NSA Presentations on Targeting Banks
The post includes a link to a selection of files and folders. One sub-folder called "exploits" includes executable files with apparent codenames such as "Eternalsynergy," "Erraticgopher," and "Emeraldthread."
•••
"This is phenomenal data, it has all the hallmarks of slickly produced internal attack tools," Hacker Fantastic continued. "I am certain that analysis on this data will turn up another 0day [zero day]."
Security architect Kevin Beaumont told Motherboard in a Twitter direct message, "All of the Windows implants are new to VirusTotal [an online file scanning tool], which suggests they've not been seen before."
Targets of NSA hacking operations may also be able to determine whether they were compromised thanks to these new files. Cybersecurity company Symantec recently did something similar but with details of alleged CIA hacking tools released by Wikileaks.
Another section of the [dump]( (https://gist.github.com/misterch0c/08829bc65b208609d455a9f4aeaa2a6c) includes several alleged presentations marked "TOP SECRET" concerning "[JEEPFLEA_MARKET](
)." According to a previous analysis by Electrospaces.net, which searches through previously released government documents including the Snowden files for additional clues, Jeepflea is a hacking project from Tailored Access Operations (TAO), the NSA's elite hacking unit.
NSA's powerful Windows hacking tools leaked online
Shadow Brokers leak NSA documents that may reveal operation aimed at Middle Eastern banks
So here are the dots not being connected...
In 2016 Shadow Brokers placed a trove of NSA hacking tools up for sale last year. On 08.17.16 wired reported that that stolen NSA exploit tools were being held hostage for a Bit Coin pay out. When no one came up with the ransom the Shadow Brokers began selling the apps individually for prices that range from 1 to 1000 Bit Coins.
This is only half the story because prior to the release of the information in August 2016 maybe as far back as several years a series of attacks and robberies through the SWIFT system occurred.
Swift Hack Probe Expands to Up to a Dozen Banks Beyond Bangladesh
That Insane, $81M Bangladesh Bank Heist? Here’s What We Know 05.17.16 - 7:00 am
Once Again, Thieves Enter Swift Financial Network and Steal
New details about a second attack involving Swift — the messaging system used by thousands of banks and companies to move money around the world — are emerging as investigators are still trying to solve the $81 million heist from the central bank of Bangladesh in February. In that theft, the attackers were able to compel the Federal Reserve Bank of New York to move money to accounts in the Philippines.
The second attack involves a commercial bank, which Swift declined to identify. But in a letter Swift plans to share with its users on Friday, the messaging network warned that the two attacks bore numerous similarities and were very likely part of a “wider and highly adaptive campaign targeting banks.”
FOURTH bank hit by SWIFT hackers
Evidence is emerging that the SWIFT (Society for Worldwide Interbank Financial Telecom) attacks began as far back as October 2015 when the Philippines bank was first hit, two months prior to the discovery of the failed attack on Tien Phong Bank in Vietnam.
There are many more articles beyond these, but what it looks like is the Shadow Brokers or some associated individuals pulled off a series of bank heists prior to releasing the applications to the open market. That also open the question of what the NSA was doing with the applications? They could have have been tracking "suspects" but it seems they could have also been moving money for any reason they chose without records being left in the banking system. The possible exploits were only exposed after a series of bank robberies exposed the power of the tools the NSA had developed.
It seems once again crimes have exposed the government's illicit powers concealed by the intelligence community (IC). It is entirely possible that the tools were used legally and only to expose private records of terrorists and spies under FISA warrants, but who knows. The only thing that exposed these exploits was the theft. Kinda makes ya wonder, huh?
The evidence and the different styles of hacking listed in the articles about the bank heists suggests that an initial group stole some NSA hacking tools and pulled off the Bangladesh heist. They may or may not have done Ecuador or the Philippines but it seems that at some point the exploits were sold on the open market, but that does not exclude some clandestine deals with other groups that also have employed the exploits. Once the initial 81 million was stolen they distributed the exploits to other groups who may have also attacked the SWIFT system and other targets to make forensics on nation state level zero day attacks that much more difficult. Several groups attempting independent attacks increased the attack vectors making identification even more difficult. It also appears that the hackers may have targeted banks that had the Trojans installed initially. So why would they go for relatively small scores when they essentially owned the SWIFT system. Could the hackers be attacking networks already infected with the Trojan.
It really makes sense when you think about the banks they hit. The NSA installs the Trojans to "observe" suspected transactions. The hackers obtain the exploits, found the Trojans phoning home and used them to own the infected systems, modified the attack vectors to transfer money. Why not skip the phishing attack when there was already infected banks. Take the path of least resistance that leads back to someone the American government would never admit lead away from the hackers.
Of course that means anyone including the IC could have manipulated transactions, but hey that wouldn't have been a robbery would it. Really the tools could have been used to track transactions, but they could have facilitated the IC surreptitious movement of money to fund operations.
In all reality it was very clever, make a score, don't get greedy, prevent the creation of a M.O. to narrow investigations and identify the perpetrators. But identifying clever when they managed to steal exploits from the NSA and could use the exploits to attack the banking system. Just the fact that they can't be identified means they are pretty slick and the exploits are not for the novice user. There were some skills at work here.
What else was done with the exploits and who are they?
Shadow Brokers Group Releases More Stolen NSA Hacking Tools & Exploits Saturday, April 08, 2017
Besides dumping some NSA's hacking tools back in August 2016, the Shadow Brokers also released an encrypted cache of files containing more NSA's hacking tools and exploits in an auction, asking for 1 Million Bitcoins (around $568 Million). However, after failed auction, the group put up those hacking tools and exploits for direct sale on an underground website, categorizing them into a type — like "exploits," "Trojans," and "implant" — each of which ranged from 1 to 100 Bitcoins (from $780 to $78,000). Now, the Shadow Brokers has finally released password for the encrypted cache of NSA's files, allowing anyone to unlock and download the auction data dump.

CrDj”(;Va.*[email protected])#>deB7mN

THE SHADOW BROKERS MESS IS WHAT HAPPENS WHEN THE NSA HOARDS ZERO-DAYS AUTHOR: ANDY GREENBERG 08.17.16. - 8:34 PM
Everything you need to know about the NSA hack - but were afraid to Google
Shadow Brokers leak systems hacked by NSA – mostly mail and uni servers in India, China
New leak suggests NSA penetrated Mideast banking networks By RAPHAEL SATTER

Sunday April 16, 2017 click here for archives
☰ Latest News
CoincidenceTheorist
-23-
submitted by J_Dillinger to WikiLeaks [link] [comments]

8 Reasons Not to Record ID + Crypto Holdings in a Databse

Eight reasons not to put your personal details in the Tezos public KYC/AML database.
I know, many of you are thinking "But it's not public". The reality is that it has a high probability of being hacked, leaked, sold, or to become available to criminals on black markets. That will happen whether you like it or not. So you might as well treat it as being public.
https://www.telegraph.co.uk/news/2018/01/28/britains-first-bitcoin-heist-trader-forced-gunpoint-transfe
Armed robbers broke into the family home of a city financier turned Bitcoin trader and forced him to transfer the digital currency at gunpoint, in what is believed to be the first heist of its kind in the UK
https://www.ccn.com/leningrad-bitcoin-blogger-who-boasted-of-his-wealth-gets-robbed-and-beaten/
He said that the robbers, most of whom wore New Year’s masks, hit him in the eye with a pistol before tying him up, according to NTV. The robbers then tied up a friend of his on the second floor and took a safe containing the equivalent of 24 million rubles and important documents, as well as a computer he used for trading bitcoin.
https://www.ccn.com/1-million-bitcoin-ransom-reportedly-paid-for-kidnapped-exmo-executive/
On December 26, 40-year-old IT specialist and bitcoin exchange executive Pavel Lerner was kidnapped in Kiev, Ukraine. He was reportedly forced into a Mercedes-Benz Vito by unknown assailants wearing dark clothes and balaclavas. Lerner, a leading analyst at cryptocurrency exchange EXMO, stopped answering the phone after leaving the company’s offices.
https://www.ccn.com/dubai-police-arrest-suspects-behind-1-9-million-bitcoin-heist/
Dubai police have apprehended a gang of ten individuals alleged to have stolen Dh7 million (approx. $1.9 million) from two victims in an armed theft involving the purchase of bitcoin.
https://www.11alive.com/article/news/crime/five-arrested-in-plot-to-break-into-forsyth-county-home-to-steal-bitcoin/85-551507487
CUMMING, Ga. -- The Forsyth County Sheriff's Office said five men had conspired to break into a Forsyth County home and steal nearly $1 million in Bitcoin. Their robbery investigation has been ongoing since January, 2018.
https://www.nytimes.com/2018/02/18/technology/virtual-currency-extortion.html
In the beach resort of Phuket, Thailand, last month, the assailants pushed their victim, a young Russian man, into his apartment and kept him there, blindfolded, until he logged onto his computer and transferred about $100,000 worth of Bitcoin to an online wallet they controlled.
http://bitcoinist.com/ottawa-police-hunting-for-armed-bitcoin-robbery-suspects/
Police in Ottawa, Canada, are on the manhunt for armed Bitcoin robbery suspects who staged an attempted daylight robbery of a Bitcoin financial business.
https://www.aljazeera.com/news/2018/02/bitcoin-robbery-taiwan-leads-arrests-180222085146715.html
Taiwan police have arrested four men over a bitcoin robbery worth five million Taiwanese dollars ($170,000) in what the police said is the first case of its kind on the island.
submitted by broadcaregiver to tezos [link] [comments]

The Importance of Identity Management in Blockchain

By Semaj Rakao
Identity Management is a form of IT online security that is the ability of authenticating different individuals or groups (customers, colleagues, any group etc) digitally and controlling whether they have access to particular applications or systems.
The main goal of Identity Management is to ensure only authenticated users are granted access and permissions to the right resources at the right times and for the right reasons. It addresses the need to ensure appropriate access to resources across many digital environments.
As an example of failed Identity Management, hacks of Bitcoin in South Korea (Bithumb and CoinRail) and the hack of Japan’s Coincheck exchange both consisting and resulting in millions of dollars in stolen currency. It is imperative that for any cryptocurrency exchange to be successful, all transactions must be completely secure and authenticated on the blockchain.
There are many different ways to manage identities some better and more secure than others. With the South Korean Bithumb hack of over $31 million, days before the hack security teams were warned that a number of unauthorized access attempts increased. As such, an urgent server checkup was conducted and at the same time Bithumb also started moving users’ assets to a cold wallet to store cryptocurrencies in a more secure offline environment however this was too late…
In the case of South Korea’s Coinrail, Korea Internet & Security Agency, who carried out the investigation with police, said only four of the country’s largest exchanges are subject to the Information Security Management System certification (ISMS) requirement and Coinrail is not one of them. This is an example of where smaller exchanges such as these do not have enough security and the security they do have in place is not compliant with government regulations (amazingly many are not required!)
Japanese cryptocurrency exchange Zaif had been hacked, with losses of Bitcoin and two other digital currencies estimated at about $59.67 million. Also The Japanese cryptocurrency Coincheck was hacked over $530 million dollars! In both exchanges security was unregulated so there are no protocols in place to create an environment in which these exchanges overall security are updated.
While blockchain technology has been long noted for its security, under certain conditions it can be very vulnerable. Sometimes bad execution can be blamed, or unintentional software bugs. Other times it’s more of a gray area, the complicated result of interactions between the code, the economics of the blockchain, and human greed. In total, hackers have stolen nearly $2 billion worth of cryptocurrency since the beginning of 2017 and that’s just what has been revealed publicly.
Most of the recent headline-grabbing hacks weren’t attacks on the blockchain themselves, but on exchanges, the websites where people can buy, trade, and hold cryptocurrencies. And many of those robberies could be blamed on poor basic security practices.
In both South Korea and Japan’s crytptocurrency hacks, it was the managing of the security of servers as well as the security of identities on the server of the users that were hacked. These cases show how important security and Identity Management is to any exchange.
While most cryptocurrency exchanges have avoided government regulations and some pride themselves on anonymity there is one company that since it’s beginning has focused entirely on transparency.
Yezcoin is a new startup blockchain and cryptocurrency exchange that’s primary focus is user and transaction transparency.
Many have questioned as to why Yezcoin would want to require transparency in a cryptoexchange? Or more importantly why, for a startup ICO, would Yezcoin want to avoid taking illicit funds like most other cryptoexchanges?
One reason and one reason only says creator of Yezcoin Mongkol Thitithamasak,”Honesty!”.
Yezcoin has had mixed responses and feedback about their approach to transparency within this new industry but Yezcoin is still moving forward toward it’s ethical vision.
It is surprising at the low-level compliance requirements of the leading exchanges such as Binance, Huobi, and OKEx. For example, Binance has only recently requested potential customers provide a copy of their passport during their sign up process following a number of complaints about the exchanges lack of security which had made it a haven for criminals to divide their stolen coins into smaller undetectable portions by using multiple accounts. Huobi has added more stringent certification to its sign-up requirements but does not verify mobile phone details. At least, as opposed to Binance and Huobi, OKex requires a passport and utility bill but still shows a facetious attitude to KYC and are still not as focused on transparency.
Yezcoin is a Blockchain Exchange that focuses on providing solutions to allow Blockchain companies to comply with Know Your Customers (KYC) and Anti Money Laundering (AML) rules. These compliances among many different countries are the most trusted amongst banks and other financial institutions throughout the world.
Another goal of Yezcoin says Mongkol Thitithamasak “We are trying to help to create a positive image of Blockchain technology so that the Blockchain community can gain confidence, trust and support from Government and Venture Capitals to further mature Blockchain technology and its applications.”
The future of cryptoexchanges will require more government understanding and regulations. Identity Management security is the most important thing in any Centralized, Decentralized or Hybrid Exchange. It insures trust amongst individuals and groups to execute transactions.
The future of trust in these exchanges might be just as simple as Yezcoin creator Mongkol Thitithamasak says it is “We want to be a pioneer in KYC and AML compliance as well as complete transparency and honesty”. Unlike other exchanges Yezcoin goes to great lengths to insure identity authenticity and helps Combating Financing Terrorism (CFT) . Yezcoin has several products and services in development which Mongkol says “will help bring businesses and communities together securely. “
Yezcoin currently has an Airdrop program where you can get 250 YEZ for completing the KYC and AML registrations and posting on various social media platforms. For full details READ MORE.
Trust in Identity Management is going to be the emphasis of future cryptoexchanges. How these companies manage the bumpy road of security among its users while providing transparency and compliance as emerging standards of KYC and AML as the technology grows will be what separates the different exchanges and layers of trust in their uses.
submitted by JTGuitar7 to u/JTGuitar7 [link] [comments]

The BREAKING of the NEWS

NOTE: This post will grow over Time, as with most of my matherial.
BREAKING NEWS (ie. the NEWS is BREAKING):
Remember: When A=1, B=2, C=3 etc, that "Water" = "Dark Magic" = "The One"
...and also, that "Revelation" = 121 = "Metaphorical" = 121 = "Math-thematic"
North Korea NK 14.11
From the motherjones article:
I sort of figured something like this must be going on:
Time give us details:
“In view of the research finding that the North Korea nuclear test site at Mantapsan has collapsed, it is necessary to continue to monitor any leakage of radioactive materials that may have been caused by the collapse,”
What has collapsed?
...and:
but it appears to have been destined to be:
...
Different sorts of metaphors (for the same thing, I'd argue):
https://arstechnica.com/information-technology/2018/04/with-drupalgeddon2-still-under-attack-drupal-fixes-a-new-critical-flaw/
ie. "remote code bug" = 133 = "Good numbers"
Revealing an unpatchable method to unlock every single current X1 chip is not something Team ReSwitched takes lightly, Temkin said
Temkin (ie. The Kin of Time, Templars)
https://i.imgur.com/Zu0WHlm.jpg
Also: Sacred Cows Kin(e)
Say: "I'm keen" ??
“In view of the research finding that the North Korea nuclear test site at Mantapsan has collapsed, it is necessary to continue to monitor any leakage of radioactive materials that may have been caused by the collapse,”
A large part of North Korea’s underground nuclear test facility is unusable due to the collapse of a cavity inside the mountain after the latest test-detonation occurred
and:
Soon after the sixth and largest blast last September, satellite images suggested that one part of the site, a 7,200 foot granite peak called Mount Mantap had diminished in height
The Tapping of Man...
Consider the terminology: to be tapped (ie. to join the secret society):
"To be tapped" = 104 (ie. 10-4, message received)
"The Hidden Hand" = 247 reverse (ie. ritually reflected and manifested in Time)
https://arstechnica.com/gadgets/2018/04/mysterious-amazon-com-page-hints-at-forthcoming-fire-tv-cube/
What is Fire TV Cube?
The Matrix (111 / 321 ... https://www.reddit.com/GeometersOfHistory/comments/7pwcto/the_they_live_sunglasses/dsmxjw9/)
The Countown of the Matrix
Signs point to the rumored Amazon Fire TV Cube being a real device that may debut soon
  • "The Black Cube" = 93 = "Saturn"
  • "Propaganda" = 93 = "Harvest"
  • "Behold! Time!" = 93 = "Strong"
  • "Bend The Knee" = 93
...
https://www.thesun.ie/news/2490428/kim-jong-un-executes-six-people-for-trying-to-smuggle-out-north-koreas-phonebook/
https://www.reddit.com/worldnews/comments/8esaf3/kim_jongun_executes_six_people_for_trying_to/
North Korea's phonebook is considered a secret document.
  • "a secret document" = "the good numbers"
  • "a secret document" = "the government"
  • "a secret document" = "secret society"
...
http://www.france24.com/en/20180425-turkish-court-sentences-15-cumhuriyet-staff-terrorism-charges
Turkish court sentences 15 Cumhuriyet staff on terrorism charges
ie. BREAKING NEWS
...
The re-wiring of the esoteric algorithm:
https://www.reddit.com/worldnews/comments/8fq32c/elephantmammoth_hybrid_genetically_engineered/
Elephant-mammoth hybrid, genetically engineered without tusks and hardy enough to survive away from Africa or India,
  • "Elephant-Mammoth Hybrid" = 104 reduced
  • "The Tusk" = 104
"Elephant-Mammoth Hybrid" = 991 jewish (ie. the 166: the secret society, has been turned upside down)
...
https://www.da.org.za/2018/04/da-fedex-will-consider-way-forward-de-lille-monc/
DA FedEx will consider way forward after De Lille MONC
ie. after the Devil Man See (ie the Devil sees Moon Key)
...
ie. this is a distraction from
  • "A: The Numeric Proof", and from...
  • "B: The Numeric Proof", and from...
  • "C: The Numeric Proof"
    • (note, equivalent to the pyramid-scheme spell augmentations I've been doing with A, AA, and AAA)
... and a linked video, remembering that "Revelation" = 121 = "Metaphorical"
https://www.youtube.com/watch?v=xGkymaMtSPM
Hence:
  • "Conspiracy" = 123 = "Reptilians"
  • "Conspiracy" = 123 = "Serpentile"
  • "Conspiracy" = 123 = "Monsters"
  • "Conspiracy" = 123 = "Serpent God"
  • "Abraxas" = 123 reverse
...
  • "Conspiracy" = 123 = "Real Truth"
  • "Conspiracy" = 123 = "Lying Scum"
"The Proof of Conspiracy" = 247
Drums = Time.
Neo knows statistics: https://en.wikipedia.org/wiki/Drum_major_backbend
  • "A drum major backbend" = 156
The 156th prime number is 911
  • "The Conspiracy" = 156
Neo can do what he does because he is illuminated:
  • "The drum major backbend" =188 = "Bavarian Illuminati"
  • "The Enlightened" = 188 bacon
...
Neo: "No.": http://fromthemachine.org/1.bp.blogspot.com/-L7LrWkjd6KQ/WqyAjz4n_uI/AAAAAAAAkFk/9VOepIB8LhQVUuFjGDlr3_rtRxXSGK1nACEwYBhgL/s1600/26evby.jpg
  • "I know statistics" = 1601 jewish (ie. 1.61 - golden ratio)
  • "Stop Bullets" = 161 = "Green Matrix Code" = 161 = "Undercurrent" (ie. 1.61 - golden ratio)
  • "Statistics" = 139 = "English Alphabet"
  • "Statistics" = 139 = "Spells Speech"
  • "Statistics" = 139 = "Occult Alphabet"
  • "Statistics" = 139 = "Alphabet Gematria"
  • "Statistics" = 139 = "Pyramid Scheme"
"I know statistics" I know how to make things static I know how to stop time
"Symbolic" = 1,618 squares (ie. golden ratio, to 3 decimal places, in a seriously loaded word)
Many tribes of man have a name for their tribe, and this name often (in their own language) means: The True Man, or The Real Man, or The Real People:
"The Real People" = 419 jewish
In mathematics:
Youtube 419 scam: https://www.youtube.com/watch?v=9uMGUDOgukQ (not this channel, but Youtube's machinations)
If you've got Time on your hands, read the first comment at the link I posted above, again:
Now there are two studies, both by groups of respected seismologists. One finds that one of the "aftershocks" was in fact the collapse of the cavity created by the explosion. @JNBPage -- again, who wrote the only non-garbage story so far -- quotes the key bit. 3/8
  • "seismologist" = 1,322 trigonal (ie. Military Industrial Complex)
  • "seismologists" = 181 = "fire breathing dragon"
  • "AAA: seismologists" = 1776 trigonal (I've posted about this numbedate a few times very recently)
  • "AAA: seismologists" = 321 bacon
This spelling is an obfuscation, however:
  • "size-mologists" = 188 = "Bavarian Illuminati"
  • "size-mologists" = 188 = "Alphabet Conspiracy"
quotes the key bit
...and 'S' is special:
"aftershock" = 106 = "magic number" = 106 = "the number" = 106 = "prophecy"
See the upside down 419 scam:
...
A tip: if you see some bolded words in a comment or news article, add the word "bold" to the spell:
the vying kings sail heaving seas...
[email protected] primal expedition
  • "expedition" = 121 = "revelation" (which is pretty interesting in itself: "the great debate" = 121)
  • "bold expedition" = 154 / 73 / 1212 trigonal / 2270 squares (which is even more interesting)
...
As mentioned above: "Water" = "Dark Magic" = "The One" (ie. 67, which reduced to 13)
  • "Dark Magic" = 189 primes
  • "Words to live by" = 189 = "Enslave humanity"
...but we know the words now: Wafflehouse = Revelation:
Be aware: https://www.reddit.com/GeometersOfHistory/comments/7ljeiy/spellcasting_and_abjuration_a_disclaime
Thinker = TH inker The Inker 33 Inker
"The Black Cube" = 1,247 squares
https://en.wikipedia.org/wiki/Borg_%28Star_Trek%29
"TimeCube" = 616 trigonal
https://en.wikipedia.org/wiki/Number_of_the_beast#616
A different sort of metaphor:
ie. The Sand Borg Revealed.
"AAA: The Sand Borg Revealed" = ???
"C: The Sand Borg Revealed" = ???
See the Sand Borg Revealed (ie. the sand-witches)
  • "Sand Witch" = 153 bacon
  • "The Village" = 153 bacon
  • "The Illuminati" = 153
https://en.wikipedia.org/wiki/The_Days_of_Our_Lives
ie. The Dei's of Our Lives The Gods of Our Lives
from this link, already listed above:
https://www.motherjones.com/kevin-drum/2018/04/north-korea-isnt-closing-its-nuclear-test-site-it-collapsed/
Jeffrey Lewis thinks this whole thing is overblown:
No, North Korea’s nuclear test mountain did not collapse. (A note in place of the short thread I will write after I drop my children at school.)
— Jeffrey Lewis (@ArmsControlWonk) April 25, 2018
Nickel summary: one cavern collapsed, but there are others.
Nick-El Old Nic The God Satan
one cavern collapsed, but there are others.
...
You heard the man, fellow Abjurers, go root out the remaining tunnel rats... (warning: they're gross)
You heard the man, fellow Abjurers, go root out the remaining cyphers ... (he is implying more keys remain to be found)
...But that's if you want to believe a member of The School of the Circle:
A comment on the NK test site collapse: https://www.reddit.com/worldnews/comments/8evmqm/north_korea_isnt_closing_its_nuclear_test_site_it/dxytc0v/
If the mountain collapsed nuclear fallout would spread all over the Asian.
Grammatically awkward right? (ie. Orc-ward)
  • "nuclear fallout" = 161 (ie. golden ratio)
"The Asian(s)" does not mean what you think it does...
A comment: https://www.reddit.com/worldnews/comments/8evmqm/north_korea_isnt_closing_its_nuclear_test_site_it/dxykfii/
Two very plausible explanations for their site closure spring to mind, in addition to "it's ruined":
1) They're lying and the site is not closed. Lying and doing the exact opposite of what they promised to do is literally their MO
2) They proved their design works so there's no point wasting more fuel repeating the test
Both of those are equally as likely as that the site has been completely destroyed. And a whole lot more likely than "and all the scientists and production facilities that were right there in the tunnel where the bomb was about to go off were destroyed as well!"
  • "it's ruined" = 119 = "master plan"
Another face of the same story? (Keep in mind the Nigerian Scam stuff listed above: 419 = 911):
https://www.reddit.com/worldnews/comments/8f1qvu/nigeria_baby_factory_raided_in_lagos/
The Nigerian baby factory = The Matrix !!!
From the wired article, linked above:
https://www.wired.com/story/crypto-war-clear-encryption/
He waited for the questions, and for the next two hours, there were plenty of them. The word risk came up. The most dramatic comment came from computer science professor and cryptographer Eran Tromer. With the flair of Hercule Poirot revealing the murderer, he announced that he’d discovered a weakness. He spun a wild scenario involving a stolen phone, a second hacked phone, and a bank robbery. Ozzie conceded that Tromer found a flaw, but not one that couldn’t be fixed.
At the end of the meeting, Ozzie felt he’d gotten some good feedback. He might not have changed anyone’s position, but he also knew that unlocking minds can be harder than unlocking an encrypted iPhone...
chuckle
...Still, he’d taken another baby step in what is now a two-years-and-counting quest.
ie. Santa is always watching...
/GeometersOfHistory/wiki/ (index)
submitted by Orpherischt to GeometersOfHistory [link] [comments]

Deadly Obsession  FULL EPISODE  The FBI Files - YouTube 'Fake Bitcoin' - How this Woman Scammed the World, then ... Bitcoin YouTubers Are Robbing You Dry (EXPOSED) - YouTube Under Fire  FULL EPISODE  The FBI Files - YouTube [FULL MOVIE] ONE AGAINST THE HOUSE (2019) crime drama ...

“The police saw bloodstains at the scene … after further investigation, it was discovered to be a bitcoin virtual currency robbery.” A fourth man was also detained in connection with the incident. He is believed to be responsible for planning the entire robbery. Whilst this is the first case of Bitcoin robbery in Taiwan, it is by no means unique globally. Just last month, a similar ... Four men have been arrested in Taiwan in connection with a Bitcoin robbery. During the incident, the suspects were able to make off with Bitcoin worth over 5 million Taiwanese dollars – the equivalent of around US$170,000. Authorities have deemed it the first case of Bitcoin robbery in the nation. Suspects Posed as Potential Buyers […] Armed robbers broke into a house in Moulsford, Oxfordshire and used a gun to force a cyber-currency trader to transfer a fortune to them in the UK's first Bitcoin heist. Bitcoin trader brutally tortured with drill in cryptocurrency robbery Criminals disguised as police attacked the victim for an hour in front of his four-year-old daughter The Forsyth County Sheriff’s Deputies have arrested five individuals charged in connection with an alleged home-invasion conspiracy to steal nearly $1 million in Bitcoin. 5 Arrested in $1 Million Bitcoin Strong Arm Robbery Conspiracy

[index] [32812] [23630] [45] [18716] [39043] [6114] [22461] [8191] [43268] [16561]

Deadly Obsession FULL EPISODE The FBI Files - YouTube

The 1996 disappearance of Anne Marie Fahey and the investigation into Delaware millionaire Thomas J. Capano. Unravel the mystery alongside the FBI's greatest... Enjoy and stay connected with us: Subscribe to Jamuna Television on YouTube https://Youtube.com/jamunatvbd Like Jamuna Television on Facebook https://fb.com/... A look at the 1981 Brinks robbery and the resulting manhunt for Mutulu Shakur and the others involved in the heist. Unravel the mystery alongside the FBI's g... When Bruce reluctantly follows his pal Oswald to the horse races and gets a taste of success, he quickly gets bitten by the gambling bug. But later that nigh... Onecoin promised the world, but only proved to be a trail of destruction. --- About ColdFusion --- ColdFusion is an Australian based online media company ind...

#