Feeds

Feds: Silk Road pirate king tried to SNUFF customer AND employee

Two contract hits? That's just DREADful

Remote control for virtualized desktops

Alleged online drug kingpin Ross William Ulbricht tried to have not one, but two people involved in the Silk Road killed, according to as US federal court indictment.

The Dread Pirate Roberts, as Ulbricht was known online, paid an undercover federal agent $80,000 to torture and kill a Silk Road employee, the indictment, filed in the United States District Court for the District of Maryland on Monday, alleges.

Ross William Ulbricht was arrested in the science fiction section of the Glen Park public library in San Francisco on Tuesday, and Silk Road, the Tor-based drug site he is alleged to have run, was shut on Wednesday.

In an earlier court complaint, it emerged that the Dread Pirate Roberts had paid Silk Road user "redandwhite" $150,000 in bitcoins to off a Canadian user of the site who was blackmailing him. Canadian police have found no evidence so far that a murder took place, however.

Now, along with being charged in New York with narcotics-trafficking conspiracy, computer-hacking conspiracy, and money-laundering conspiracy, Ulbricht is being charged in Maryland for conspiracy to distribute a controlled substance, use of interstate commerce facilities in commission of murder-for-hire, aiding and abetting, and attempted-witness murder.

In January, an undercover agent posing as a Silk Road user communicated with the Dread Pirate Roberts, complaining that the amounts of illegal drugs sold on the Silk Road were too low, and asking if they could arrange to find a buyer for a large shipment of cocaine, the indictment alleges.

Ulbricht obliged, the document states, and after some to-ing and fro-ing, the agent sent a kilogram of "a mixture of substance containing a detectable amount of cocaine" to a Silk Road employee for some $27,000 in bitcoins.

Shortly after that, the employee was arrested, and Ulbricht thought he had also stolen bitcoins from other users of the Silk Road. Ulbricht was apparently unnerved by the bust, and got in touch with the undercover agent on January 26th 2013 to ask if he could "beat up" the employee and compel him to give the bitcoins back, according to the indictment.

Just one day later, Ulbricht messaged the undercover agent and allegedly wrote: "can you change the order to execute rather than torture?" He explained that the employee had been in prison before. "Now that he's been arrested, I'm afraid he'll give up info," Ulbricht wrote.

The undercover agent demanded $40,000 upfront, which Ulbricht paid via Technocash Limited in Australia to a bank account in Capital One Bank in Washington DC. He then requested on February 5 for "proof of death" and asked the undercover agent to try and get a video of the torture and death, and failing that, pictures, the feds allege.

Days passed with some back-and-forth messages as Ulbricht seemed to become more anxious, then on February 16 the undercover agent sent him staged photographs of the employee being tortured.

The Dread Pirate Roberts wrote back, saying I'm "a little disturbed, but I'm ok," then added, "I'm sure I will call on you again at some point, though I hope I won't have to." On February 19, the undercover cop told the Ulbricht "[the Employee"] is dead[,] they killed him this weekend". On February 21 the agent sent the DPR staged photographs of the dead employee.

On seeing the photos, the indictment reports that Ulbricht stated: "I'm pissed I had to kill him ... but what's done is done[,]...I just wish more people had some integrity[.]". On March 1, he is alleged to have wired the other half of the hit money from Technocash Limited in Australia to a Capital One Bank in Washington, DC.

Ulbricht is currently being held without bail in San Francisco pending a hearing this Friday, October 4. ®

Remote control for virtualized desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.