Feeds

Feds: Silk Road pirate king tried to SNUFF customer AND employee

Two contract hits? That's just DREADful

SANS - Survey on application security programs

Alleged online drug kingpin Ross William Ulbricht tried to have not one, but two people involved in the Silk Road killed, according to as US federal court indictment.

The Dread Pirate Roberts, as Ulbricht was known online, paid an undercover federal agent $80,000 to torture and kill a Silk Road employee, the indictment, filed in the United States District Court for the District of Maryland on Monday, alleges.

Ross William Ulbricht was arrested in the science fiction section of the Glen Park public library in San Francisco on Tuesday, and Silk Road, the Tor-based drug site he is alleged to have run, was shut on Wednesday.

In an earlier court complaint, it emerged that the Dread Pirate Roberts had paid Silk Road user "redandwhite" $150,000 in bitcoins to off a Canadian user of the site who was blackmailing him. Canadian police have found no evidence so far that a murder took place, however.

Now, along with being charged in New York with narcotics-trafficking conspiracy, computer-hacking conspiracy, and money-laundering conspiracy, Ulbricht is being charged in Maryland for conspiracy to distribute a controlled substance, use of interstate commerce facilities in commission of murder-for-hire, aiding and abetting, and attempted-witness murder.

In January, an undercover agent posing as a Silk Road user communicated with the Dread Pirate Roberts, complaining that the amounts of illegal drugs sold on the Silk Road were too low, and asking if they could arrange to find a buyer for a large shipment of cocaine, the indictment alleges.

Ulbricht obliged, the document states, and after some to-ing and fro-ing, the agent sent a kilogram of "a mixture of substance containing a detectable amount of cocaine" to a Silk Road employee for some $27,000 in bitcoins.

Shortly after that, the employee was arrested, and Ulbricht thought he had also stolen bitcoins from other users of the Silk Road. Ulbricht was apparently unnerved by the bust, and got in touch with the undercover agent on January 26th 2013 to ask if he could "beat up" the employee and compel him to give the bitcoins back, according to the indictment.

Just one day later, Ulbricht messaged the undercover agent and allegedly wrote: "can you change the order to execute rather than torture?" He explained that the employee had been in prison before. "Now that he's been arrested, I'm afraid he'll give up info," Ulbricht wrote.

The undercover agent demanded $40,000 upfront, which Ulbricht paid via Technocash Limited in Australia to a bank account in Capital One Bank in Washington DC. He then requested on February 5 for "proof of death" and asked the undercover agent to try and get a video of the torture and death, and failing that, pictures, the feds allege.

Days passed with some back-and-forth messages as Ulbricht seemed to become more anxious, then on February 16 the undercover agent sent him staged photographs of the employee being tortured.

The Dread Pirate Roberts wrote back, saying I'm "a little disturbed, but I'm ok," then added, "I'm sure I will call on you again at some point, though I hope I won't have to." On February 19, the undercover cop told the Ulbricht "[the Employee"] is dead[,] they killed him this weekend". On February 21 the agent sent the DPR staged photographs of the dead employee.

On seeing the photos, the indictment reports that Ulbricht stated: "I'm pissed I had to kill him ... but what's done is done[,]...I just wish more people had some integrity[.]". On March 1, he is alleged to have wired the other half of the hit money from Technocash Limited in Australia to a Capital One Bank in Washington, DC.

Ulbricht is currently being held without bail in San Francisco pending a hearing this Friday, October 4. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.