Feeds

'I WAS AN ADMIN FOR SILK ROAD': Alleged hit-man target tells all

Drugs, murder, and support tickets at Bitcoin's black market

High performance access to file storage

The former Silk Road employee whom the website's founder allegedly tried to have killed has testified in a Baltimore, Maryland court, casting fresh light on the murky inner workings of the now-defunct online drugs market.

Curtis Clark Green, 47, appeared in the federal court to plead guilty to charges of drug trafficking, stemming from his involvement with Silk Road. Following the hearing, journalist Joshua Davis was able to obtain both a statement from Green and an affidavit that was entered into evidence, both of which he has published via his online magazine, Epic.

The documents lend new insight into the day-to-day operations at Silk Road – but if anything, the most shocking thing about Green's account is how mundane the whole enterprise sounds.

According to Green, he was an employee of Silk Road for a scant three months or so, between November 2012 and January 2013, during which time he drew a salary as a site administrator.

In that role, Green's responsibilities included such tasks as answering questions from Silk Road buyers and sellers, resetting passwords, resolving complaints, and other such duties as you might expect of your typical message board admin. He also wrote a weekly report documenting issues he had observed, including potential fraud and law enforcement activity on Silk Road.

Green, a Utah native, claims he reported directly to Ross Ulbricht, the San Francisco man accused of being Silk Road's mastermind, although he claims he never knew Ulbricht's true identity. To Green, Ulbricht was "Dread Pirate Roberts," and Green identified himself as "Flush" and "chronicpain."

Despite this veil of secrecy, however – and despite his pleading guilty to drugs charges – Green maintains that his initial interest in Silk Road had nothing to do with criminality, and that he got the job simply because he spent a lot of time on Silk Road forums.

Curtis Clark Green, former Silk Road admin

Curtis Green says he never planned to do anything illegal (Credit: Curtis Green/Joshua Davis)

"I got involved in SR because I was interested in Bitcoin and SR was the biggest market place for Bitcoin. I also had an interest in harm reduction related to drug use," Green told Davis. "I never used illegal drugs and I never intended to be directly involved in illegal drug deals."

But things all went south for Green when he – for unstated reasons – agreed to act as middleman between a large-volume cocaine distributor and a known drug dealer on Silk Road. Green took delivery from the distributor of around 1kg of coke to his Utah home, intending to punt it on to the dealer. Unbeknownst to him, however, the would-be distributor was in fact an undercover agent.

Green soon found himself surrounded by agents of the Drug Enforcement Administration, Homeland Security Investigations, US Postal Inspectors, and the Secret Service. What's more, after his arrest he learned a side of the Dread Pirate Roberts he never knew previously.

Ross Ulbricht

Ross Ulbricht, alleged criminal mastermind
(Credit: Ross Ulbricht/Google+)

According to the indictment against Ulbricht, the alleged Silk Road founder paid one of the site's users $40,000 to have Green tortured and murdered to ensure his silence.

"I just can't believe he was so stupid," Ulbricht reportedly told the contract killer. Unfortunately for Ulbricht, that so-called killer was also an undercover agent.

"The agents took photos as they faked my murder," Green said in his statement. According to Ulbricht's indictment, they then sent the photos to Ulbricht, claiming that Green "died of asphyxiation/heart rupture" during the torture. At that point, Ulbricht allegedly paid the agent another $40,000 to complete the deal.

Ulbricht is awaiting trial in prison in New York City, where he was transferred from San Francisco earlier this week. On Wednesday, his lawyer told Forbes that he is not the Dread Pirate Roberts, and that none of the evidence against him can establish that he did anything that prosecutors claim he did.

Meanwhile, what sort of deal Green may have struck with prosecutors in exchange for a guilty plea is not clear. In his affidavit, he said that while at Silk Road he "could also view administrative Bitcoin accounts controlled by Ulbricht" – which, if true, might provide a source of potentially damning evidence.

In his statement to Davis, however, Green added only, "On the advice of my attorney, I cannot give any further details, as I still face serious federal charges." ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.