Prosecutors Trace $13.4M in Bitcoins From the Silk Road to Ulbricht’s Laptop

Prosecutors Trace $13.4M in Bitcoins From the Silk Road to Ulbricht’s Laptop

If anyone still believes that bitcoin is magically anonymous internet money, the U.S. government just offered what may be the clearest demonstration yet that it’s not. A courtroom powerpoint presentation traced hundreds of thousands of bitcoins from the Silk Road anonymous marketplace for drugs directly to the personal computer of Ross Ulbricht, the 30-year-old accused of running that contraband bazaar.

The post Prosecutors Trace $13.4M in Bitcoins From the Silk Road to Ulbricht’s Laptop appeared first on WIRED.



A Heroin Dealer Tells the Silk Road Jury What It Was Like to Sell Drugs Online

A Heroin Dealer Tells the Silk Road Jury What It Was Like to Sell Drugs Online

For its two and a half years online, thousands of drug dealers sold every kind of narcotic imaginable on the anonymous online marketplace known as the Silk Road. But put one of the site’s heroin dealers in a courtroom and ask him questions under oath, and the scale and consequences of that drug empire suddenly […]

The post A Heroin Dealer Tells the Silk Road Jury What It Was Like to Sell Drugs Online appeared first on WIRED.



Gag Order Prevented Google from Disclosing WikiLeaks Probe for 3 Years

A month ago, Google said it does not publicly address individual cases when it comes to government requests for customer data “to help protect all our users.”

But on Wednesday, Google changed course after being ripped for failing to notify WikiLeaks that three years ago, Google handed over data to federal authorities about three staffers of the secret-spilling site as part of the government’s espionage probe of the site and its founder, Julian Assange. The reason for the three-year delay, Google said, was because it had been under a gag order that it was fighting.

“From January 2011 to the present, Google has continued to fight to lift the gag orders on any legal process it has received on WikiLeaks,” Al Gidari, a Google lawyer told The Washington Post. He said the media giant’s policy is to always challenge indefinite gag orders. The gags on these were partly lifted, he said.

Read 8 remaining paragraphs | Comments

CoinTerra, Yet Another Troubled Bitcoin Miner Startup, Goes Bust

The venture-backed Bitcoin startup CoinTerra has filed for bankruptcy, making it the second major miner manufacturer to do so in recent months.

The Chapter 7 filing, which begins the process of liquidating company assets, was submitted on Saturday and comes just weeks after a Utah-based data center sued CoinTerra over a contract dispute.

In June 2014, CoinTerra was sued by a California man for failing to deliver his miner on time. According to court filings, CoinTerra has $10 million to $50 million in combined estimated assets and liabilities and around 400 creditors spread out worldwide from Canada to Russia to Hong Kong.

Read 4 remaining paragraphs | Comments

Canada Joins World Powers in Spying on Smartphone and Download Data

Canada Joins World Powers in Spying on Smartphone and Download Data

In North America, the Canadians have long had to play country mouse to the flashier city mouse of the U.S. It’s the latter that gets all the attention, while the former sits quietly in a corner. But recent stories have shown just how big a player the Canadians are becoming—at least in the surveillance realm.

The post Canada Joins World Powers in Spying on Smartphone and Download Data appeared first on WIRED.



Silk Road Trial: Prosecutors Compare Ulbricht’s E-Mail with DPR’s Online Life

NEW YORK—IRS Special Agent Gary Alford showed a jury personal e-mails from Ross Ulbricht’s Gmail account that prosecutors say line up with chats and other records from the Silk Road drug-trafficking site.

In 2013, Alford searched through the Gmail account belonging to Ulbricht, the 30-year-old Texan who stands accused of being the mastermind behind the Silk Road drug-trafficking website. Alford’s testimony today compared information found on Ulbricht’s computer, including Silk Road expense sheets and chats with administrators, with Ulbricht’s personal Gmail account. Alford also looked through Ulbricht’s Facebook posts.

Prosecutors weren’t able to show any direct mentions of Silk Road on Ulbricht’s Gmail or on Facebook. Instead, they associated e-mails from Ulbricht’s personal life and receipts for travel and electronics with the data found on his laptop, which was open to a Silk Road management page when he was arrested in San Francisco.

Read 13 remaining paragraphs | Comments

Drone Maker to Add No-Fly Firmware to Prevent Future White House Buzzing

In the wake of a National Geospatial-Intelligence Agency employee’s late-night drunken mischief with a DJi Phantom 2 consumer quadrocopter drone over White House airspace, President Barack Obama called for new laws to govern the use of unmanned aerial vehicles. Meanwhile, the company that manufactured the drone used in the ill-fated flight has announced that it will issue a mandatory upgrade to the firmware for its Phantom 2 line of products to make sure that customers comply with the FAA’s no-fly zone around DC.

In a press release issued this morning, DJI announced that the firmware update “will help users comply with the FAA’s Notice to Airmen (NOTAM) 0/8326, which restricts unmanned flight around the Washington, DC metropolitan area.The updated firmware (V3.10) will be released in the coming days and adds a No-Fly Zone centered on downtown Washington, DC and extends for a 25 kilometer (15.5 mile) radius in all directions. Phantom pilots in this area will not be able to take off from or fly into this airspace.”

DJI’s Phantom 2 drones already have firmware settings that prevent them from being flown near airports and other places where officials have set restrictions on flight. According to the company’s statement, DJI is also continuing to update the no-fly zone list for future firmware releases to prevent flights in other sensitive areas—and to prevent drones from being flown across national borders.

Read 4 remaining paragraphs | Comments

No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn

No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn

The debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates child pornography. At the State of the Net conference in Washington on Tuesday, US assistant attorney general Leslie Caldwell discussed what […]

The post No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn appeared first on WIRED.



The FBI, Sony and the Attribution Problem, Part 1- Why?

The recent attack on Sony has publicly paraded one of the predominant problems in incident response. While the immediate issue in incident response is of course the remediation of compromised systems and bringing these systems and IT services back online, it is entirely human to look for somewhere to cast blame. Let’s begin by fleshing out the “why” of attribution before engaging with the “how”.

Why Attribution?

For an affected entity, and for the security professionals working within it, attribution of the attacker(s) is only an ancillary concern. Certainly steps taken (or not taken) during the direct remediation of the breach are important and even essential to the later attribution effort, but priority of work must be on restoration of service. After service is restored, and the breach points corrected, the attribution process begins. Here are some reasons to perform attribution:

1. Attacker Centered Defense– If the attacker can be identified or at least have their tactics, techniques and procedures characterized, it may be possible to take steps to make their next intrusion more difficult and time consuming.

2. Legal/Governmental Retribution– Bringing criminal charges or taking other action against the attacker may deter future attackers, or may have deterrence against the current attackers if they are in a jurisdiction where criminal charges cannot be brought, but are vulnerable to intergovernmental or other pressures.

3. “Hacking Back”– This is an operation pregnant with a host of legal and ethical concerns. It may appear advantageous in the midst of an attack to attack back, but the technical reasons for doing so need to be looked at carefully. There are two scenarios where hacking back could reduce the impact of an ongoing hacking attack. One of these is a DDOS attack, where hacking back into the command and control systems of the attributed botnet may be a viable method to stem the attack. In the second scenario, stolen data belonging to the attacked entity has been definitively located (through attribution efforts) on a server, and then the entity performs a hacking operation to delete that data before it can be copied or moved. Both of these operations are patently illegal in the U.S.  due to the Computer Fraud and Abuse Act. Both also carry a low probability of success or advantage for the attacked entity. If a DDOS operation is disrupted, other botnets can be easily employed by the attacker at short notice, or they may regain control of the compromised botnet. The command and control servers may also be innocent bystanders who are unknowingly playing host to malware. Taking down the servers of a hospital or local government  or foreign military could have extremely serious human and geopolitical downsides.  In the second scenario, the attacked entity would have to be extremely proactive to get the toothpaste back into the tube. In fact, it is so difficult it may as well be regarded as functionally impossible, and there is little chance of getting all the data before it is further disseminated.

Looking at the limited reasons for attribution  and given especially the weakness of the third reason, it may be entirely reasonable for an attacked entity to decide not to pursue attribution. In the end, even having your attacker arrested will not undo the damage caused in the attack. The process of attribution is also not cost free. Additionally, any major actions taken on the basis of the attribution performed may only result in more reputation damage for the entity as the original breach and security failure is further publicized.

Why Attribute the Sony Hack? 

Obviously an attack as devastating as Sony’s–which will probably involve hundreds of millions of dollars in damage to Sony Pictures Entertainment, in addition to a substantial erosion of their reputation and personal damage to many of their prominent employees–should be answered. To decide to not attribute the attackers would make their actions seem tacitly permitted, and probably contribute to further devastating attacks against other entities. This Public Order justification is the purview of the FBI, who has taken a lead role in the investigation of the attack. Sony, of course, probably wishes nothing more than for this incident to go away and may be leaning more towards active disinterest in attribution. It isn’t as if any future lawsuit will recover their lost capital, and their threats of legal action against those who published the more tabloid-friendly portions of their internal emails are at serious risk of the Streisand Effect.

Of course, SPE is not the only actor involved. There are cyber security companies and the U.S. Government at work here as well. Attribution is in the interests of cyber security companies for reputation and prestige reasons, as a proof of their aptitude and ability. On the government side attribution can be a marker of aptitude as well, however, retribution is also a significant influence. In the global and domestic political arenas strong attribution can aid in the pursuit of other interests. Attribution has been used by the U.S. Government previously to pressure the Chinese Government in regards to their cyber espionage campaigns, and charges have been filed in the U.S. against a number of their operators.  So it comes to this. The primary reasons for attribution are political, as support for past and future actions and as an instrument of geopolitical pressure. The actions supported by attribution may include legislative efforts, international sanctions, and even electronic and physical attacks.

In Part Two of this work, having established the interests of the actors involved in attribution, we will look at the “How” of the SPE hack attribution as far as it is known publicly.