Julian Dorey Podcast - 🫢 [VIDEO] - One FATAL Mistake Destroyed The Dark Web Overlords | Andy Greenberg • #127

Episode Date: November 26, 2022

Buy “Tracers In The Dark” (Andy’s New Book): https://amzn.to/3AMaNWQ (***TIMESTAMPS & Book Links in description below) ~ Andy Greenberg is an award-winning journalist, author, and hacking exper...t. Currently, Andy is a senior writer for WIRED, covering security, privacy, and information freedom. Throughout his career at Wired (and Forbes before that), Greenberg has been the go-to reporter on major international news stories including: Julian Assange & Wikileaks, Ross Ulbricht & Silk Road, Government-Sponsored hacking in Russia, China, & North Korea –– and the underworld of cryptocurrency. ***TIMESTAMPS*** 0:00 - Cypherpunks; Early Silk Road; Bitcoin Dark Web Integration 14:48 - Ross Ulbricht: The Dread Pirate Roberts (DPR) 20:48 - The alleged hits Ross is suspected of ordering 31:17 - The Curtis Green Hit; The sketchy Baltimore DEA taskforce 37:00 - Andy attended Ross’ trial in NYC; BTC is traceable 50:56 - How the feds caught Ross 1:00:26 - The Feds catch rogue agent via Bitcoin trace; How BTC traceability was invented 1:18:19 - The Mt Gox debacle; Chainalysis 1:35:11 - Govs want crypto dead; Ways to prevent traceability 1:48:38 - John Boseak & early carders; Russia / Ukraine have brilliant hackers 1:56:46 - AlphaBay Founder: Alexandre Cazes (aka Alpha02) 2:05:15 - First breakthrough in AlphaBay case; AlphaBay size at it speak 2:17:16 - Cazes high life in Bangkok, Thailand 2:27:12 - The task force sting on Cazes in Bangkok 2:36:08 - Cazes’ mysterious death in jail 2:43:15 - Hansa & the rest of the AlphaBay takedown post-Cazes 2:50:35 - The Child Crimes Dark Web Gov Cases; Crypto traceability good? 2:55:46 - Where does digital currency go from here? Intro Credits: “Triple Frontier” (2019) “The A-Team” (2010) “Convict” (2014) “Nobody” (2021) “Dark Web: Cicada 3301” (2021) ~ Get $150 Off The Eight Sleep Pod Pro Mattress / Mattress Cover (USING CODE: “TRENDIFIER”): https://eight-sleep.ioym.net/trendifier Julian's Instagram: https://www.instagram.com/julianddorey ~ Music via Artlist.io Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 He turns around, goes into the master bedroom, and finds that Kaza's laptop is there and still open and alive, logged into AlphaBay. Kaza's arrested. He's taken to Thai jail, essentially. He agrees to extradition, and then a week after his arrest, he's found dead in his jail cell. Alleged suicide. Right, yeah. So... I honestly can't... can't relate to that yet. Yeah, well, enjoy not relating to that while you can, is what I would say. I will.
Starting point is 00:00:49 I will. I'm not in a hurry yet. But listen, we got a lot to talk about. You have been busy working away on your latest book that is coming out on November 15th. So it will – we're recording right before then. This will have come out when the episode's on. So link is in the description check it out it's called tracers in the dark fantastic book thank you but we had gotten to touch on it last time just like mentioned you were working on it but you wanted to save some of the conversation for
Starting point is 00:01:15 when it was coming out and i got to tell you i think that was a really good idea because i was under the impression a lot of it was going to come back to just the Silk Road, but you went so far beyond that. Definitely. I mean, the Silk Road was the beginning of the story, but truly, it is a decade long story that starts with the Silk Road and ends, you know, in a place that is, you know, with about dark web sites that are 10 times the size of the Silk Road, among other things. Yeah. Yeah. And for people out there who just aren't familiar Can you briefly just explain what the Silk Road was and then we'll we'll get into it for sure. But yeah for sure. I mean the The Silk Road and tell me if we should break down this down even further. The Silk Road was a dark web drug website
Starting point is 00:02:07 Where a dark web drug markets where you could essentially log on with this anonymity software called Tor, the Tor browser. Silk Road itself ran as a website that used Tor to make it impossible for anybody to figure out where it was hosted and who ran it. And it was essentially like this dark web eBay for all sorts of contraband, but mainly drugs it was essentially like a an online bizarre uh like a market for every drug imaginable uh that grew into by 2013 a massive um operation where like hundreds of millions of dollars in drugs were were being transacted all the time yeah and when you think about it it was part a huge part of the story was the fact that they you had to use bitcoin to do the actual transactions and this was the earliest days of cryptocurrency period but bitcoin as well because 2011 bitcoin came out in 2009 so it was much cheaper and far less known and this
Starting point is 00:03:03 website in a lot of ways people say legitimized it Totally, I mean should I talk about like how I like started absolutely. Let's get to the start of it. Yeah, I First well, I guess around this this time you're referencing like 2010 2011 I was working on a book that we talked about last time That was really like partially at least about the cypherpunk movement this this social movement very interesting group of mostly dudes i should say um who i was going to say guys and but it is mostly men who believed that they could use encryption uh and this started i'm really talking about like a group that began in the 1990s they believed that
Starting point is 00:03:43 they could use encryption technologies like secrecy tools like the ability to encrypt information so that even the government couldn't crack it to take power away from like federal governments and corporations and give it to individuals so mostly like radical libertarian types exactly yeah and definitely this group like gave rise to what we now use as like vpns, which I just talked about, and also Wikileaks. And the whole idea of granting anonymity but actually guaranteeing it for journalistic sources and leakers using these tools that Julian Assange came up with. He was a cypherpunk, too. That came out of the cypherpunk movement and so as i was like kind of getting like really obsessed with this group for a different book that i was writing um i i came upon what seemed to be this new cypherpunk invention it was described to me that way um
Starting point is 00:04:35 uh bitcoin the this guy gavin andreessen who was one of the first bitcoin developers programmers uh gave this kind of ted style talk that i watched on youtube at the time um where he describes bitcoin as basically like cypherpunk money like a a kind of digital cash for the internet uh that among other things like could be sent anonymously to anyone in the world um that it's you know appeared to be this kind of cypherpunk, holy grail thing that they've been this movement I've been trying to achieve for a long time without success, which is like, essentially anonymous crypto money. I mean, the word cryptocurrency was like not in common use then actually. So when I wrote the first piece, I actually interviewed Gavin Andreessen, I tracked
Starting point is 00:05:24 him down, I wrote this piece for Forbes magazine about Bitcoin, which I when I wrote the first piece I actually interviewed Gavin Andreessen and I tracked him down I wrote this piece for Forbes magazine about Bitcoin Which I think was like the first print magazine piece about Bitcoin like 2011 ish in April of 2011. Okay, and I Actually headlined that piece cryptocurrency like thinking I'd come up with this clever like nobody was using that phrase back then and I'll and Gavin had described bitcoin to me as untraceable and i believed it was and and even satoshi nakamoto this mysterious creator of bitcoin nobody of course still knows who he or she or they are yeah um could be multiple people
Starting point is 00:05:59 had described had themselves or himself or whatever uh described bitcoin in this email introducing it to a cryptography mailing list and saying like among its features that participants can be anonymous so it really did seem like even the creator of bitcoin thought this was going to be like a kind of anonymous cash like you could for for the digital world like you could put uh you know unmarked bills in a briefcase and like, send it across the world to anybody without revealing your identity at all, you know, without any identifying information associated with it whatsoever. And that seemed to me to be like, I mean, I unfortunately was not interested in investing in Bitcoin at the time. In April of 2011, a Bitcoin was worth a dollar. And I thought like, oh, you know,
Starting point is 00:06:49 as I write this magazine piece, maybe I should just buy like $40 worth of Bitcoins, like 40 Bitcoins. And unfortunately, like I tried this on the... Wendy's most important deal of the day has a fresh lineup.
Starting point is 00:07:03 Pick any two breakfast items for $5. New four-piece French toast sticks, bacon or sausage wrap, English muffin sandwiches, value iced coffee, and more. Limited time only at participating Wendy's Taxes Extra. It won't take long to tell you Nutrile's ingredients. Vodka, soda, natural flavors. So, what should we talk about? No sugar added?
Starting point is 00:07:43 Neutral. Refreshingly simple. The only existing cryptocurrency exchange at the time, Mtx which was very buggy we'll talk about that for sure and uh and it didn't work i couldn't get the transaction to go through and i gave up which was like a uh i don't like to think too much about how much that uh mistake cost me but i you know but yikes what i'm trying to yeah it was a multi-million dollar uh little i got sick reading that for you yeah i was like oh yeah but then you know i i wasn't interested in like this notion of bitcoin as a lot of people see it today as like kind of digital gold like a way to store your money as an investment i was interested and i think a lot of people were back then in in the
Starting point is 00:08:25 notion that bitcoin was kind of like this almost subversive sort of digital cash that like could be spent without a trace uh just like cash can be in in a drug deal or whatever and sure enough like as you were saying i mean just months, the Silk Road kind of appeared online. I think it actually may have launched in 2010, but nobody really was aware of it until 2011. And I, you know, I like came upon this, this like dark web markets that seemed to be offering like all sorts of illegal drugs for sale in bitcoin and it kind of confirmed this idea to me that like yeah bitcoin truly is a um crypto cash for the internet and it it evades any attempt at regulation or tracing or law enforcement uh that's certainly like how the creator of the dark of this silk road saw it this another mysterious, at the time,
Starting point is 00:09:26 figure who called himself the Dread Pirate Roberts. To be fair, I should say that when I first saw the Silk Road online, I was like, this can't be real. This must be a scam. There's heroin listed for sale here.
Starting point is 00:09:41 This is either I don't know, like just some sort of uh pipe dream like this is not going to really work or uh it's it's truly a scam like somebody's trying to steal people's bitcoins and what you know there have been a million schemes like that still are yeah yeah and it was only like a few months later after that, that Adrian Chen at Gawker wrote his, wrote the real, like first real piece about the Silk Road. And he had found people who had done, who had bought like asset off the Silk Road and it worked perfectly well. And, and kind of, I couldn't believe that I'd missed, like, you know, being so obsessed with the
Starting point is 00:10:25 cypherpunks, I'd like missed an even bigger story than Bitcoin, it seemed at the time, like an actual black market on the dark web, transacting in cryptocurrency and selling every drug imaginable. And it was real. I mean, that was, yeah, another regret. But you tested it out, though. Well, sure. yeah another regret but you tested it out though well sure I mean certainly like at that point at that point I
Starting point is 00:10:48 I was like fully like well I was in fact trying to figure out like how can I get the next big story about the Silk Road as it grew into like a massive phenomenon and as you know that when the Gawker piece came out
Starting point is 00:11:04 that Adrian wrote Chuck Schumer and I forget massive phenomenon and as you know that when the gawker piece came out that adrian wrote um chuck schumer and i forget joe mansion i think like held a press conference even to say like this is uh you know we condemn this uh horrible website that you know is represents like a new chapter in the war on drugs and is powered by untraceable cryptocurrency. It was a massive controversy immediately, and they called on the DEA to shut this site down. Yeah, and that was like – that was towards the beginning. But what – obviously Bitcoin was worth a lot less, but in the first year there, they were already doing tens of millions of dollars of revenue on that, no? Absolutely. I mean, the thing about like the exchange rate of Bitcoin goes up, goes down, but the actual sort of economy of buying and selling things in Bitcoins, like the drugs didn't change in value. So like anybody who was buying heroin on the Silk Road
Starting point is 00:12:08 or acid or whatever in 2011, that turned out to be very expensive acid for them. Because if you spent like whatever, when Bitcoin was worth a dollar and you were buying whatever 50 bucks worth of weed or something, that turned out to be like millions of dollars in future money but you know nobody could have known that at the time and um and it really was working and absolutely not immediately but very soon like that silk road was doing hundreds of
Starting point is 00:12:37 thousands of dollars worth of transactions a day now how would it work because you have you have a dark web market so it's not like you have a government backstop regulator here this is all obviously completely under the table they have to access it on tor as you said and use bitcoin to transact but if i went on there as you did and and it might be helpful to talk about like your experience when you did buy some stuff on behalf of forbes and everything but certainly like only on behalf of forbes only on behalf of just as an experiment did not use any of the drugs let's be clear about that but still when you would make the purchase my understanding is that the money wouldn't go straight away to the seller they'd put it in like an escrow thing so that the the transaction would have to be confirmed on your
Starting point is 00:13:20 end like you had to receive it and then tell the site like oh i got it now they can give the money over yeah i mean the the silk road was really a brilliant invention i mean people like look back on it and see flaws in it but it was but um the dread pirate roberts who ran this thing really did come up with some serious innovations just there were there were almost like um like financial innovation even more than like technological. So yeah, there was an escrow where when you buy drugs, your money is put into escrow and then it's only released once you receive the drugs in the mail. Something that nobody really would have, I would have never thought that that was possible
Starting point is 00:13:58 to ship drugs in the mail in these quantities and that it would not all be caught, but it worked. And the dealers, the vendors, who were third parties, like the drug pirate Roberts is sitting in the middle as this administrator of the market. He's the market maker. But then the buyers and sellers are acting independently. And these dealers started to really come up
Starting point is 00:14:21 with clever ways to hide the drugs in shipping it. And there was an entire user forum where people discussed like the best ways to like uh you know um obfuscate the drugs that you were sending in the mail yeah there were a lot of good ways to do that i remember college that was some wild shit people would do yeah and and um you know like i mean the clever things like um you're sending like psychedelic mushrooms in the mail and you put it inside of a
Starting point is 00:14:48 fake beef stroganoff package that looks like the dried mushrooms on the side of the whatever I mean there were just an endless number of these things but then also just like triple sealing and mylar and whatever but that all worked incredibly well but then yeah so then once you receive the drugs in the mail you confirm that you've incredibly well but but then yeah so then uh once you receive the
Starting point is 00:15:05 drugs in the mail you confirm that you've got it that only then is the money in the escrow released to the seller so they can't scam you then there's like ratings and reviews which in the which in the drug world is actually like really important you can you know the the quality of these drugs can be assessed in a way that was never possible with you know just like buying random drugs from some dude in the bathroom of a club or something you know um it was a real it was a real innovation um and not like you know i would never claim that it uh it's it was absolutely a criminal operation but it but it was also um it's really important to to get this across that like the dread pirate roberts was a political figure yes he saw the silk road as a
Starting point is 00:15:52 a political experiment first at least like that was his first conception of it i do believe that like he he was this radical libertarian he wanted with the silk Road to, to just show that it was going to be possible in this new era of this kind of cyberpunk utopia that he foresaw, to just like buy and sell things without any participation from the government, no taxation, no restrictions, anybody can buy and sell anything and put into their bodies, whatever they choose to, you know, so he really, I think, wanted to take the violence out of the drug trade, among other things. Yeah, he was very, he thought the war on drugs was a total disaster, and that this was the one stop shop to fix it. And I think when you look through the catalogs now of all his online correspondence behind the names it's it's pretty clear that
Starting point is 00:16:46 to me and we're talking we're talking about dpr who ended up being ross ulbrich we'll talk about how that went down and everything but ross was a guy who i think from behind the keyboard started to feel the power of the movement itself and let that affect his actions because he wasn't a guy this was not a guy out there buying lamborghinis or anything like that he lived a very simple life he wasn't he wasn't this like just doing it for his own fame type guy but the movement the political ideology of radical libertarianism in this case really overtook him and drove an incredible innovation but also led him to slip up and get caught. I would say – I mean I feel bad saying this because just to set the context here, Ross Ulbricht is like serving life in prison now.
Starting point is 00:17:39 No parole. Without parole, two life sentences I think. And I – he is in a a vulnerable position he can't truly like speak for himself but i do think it's so i feel bad like saying um critical things about him but just you have to tell this story properly i think that he was eventually we'll get to this i guess kind of corrupted in his ideals and i think eventually he was not just doing stuff out of um libertarian and idealistic motivation he was he had become uh sort of enamored of the power and the millions of dollars flowing like through
Starting point is 00:18:19 you know around his invention and did some you know nasty things to try to protect that but but it definitely there's no question that it started from a a place of of idealism and he uh had rules for the silk road that you could only buy and sell things that he considered to be victimless crimes you know there was no child pornography child what we now call like child sexual abuse materials there were there was no murder for hire although that's a story that the media has told endlessly. The Silk Road did not have assassination services for sale. There were, at some points, weapons for sale. The Dread Pirate Roberts believed, I think, that guns
Starting point is 00:19:00 can be used for self-defense, but there were limits in that he disallowed any weapon that could be used for self-defense and but there were limits in that he he like disallowed any weapon that could be used on like large groups of people for instance like he didn't i think once obviously to become like a a hub for terrorism um and eventually he shut down even the gun sales because it wasn't really working very well i think it's a lot harder to send a gun through the mail yeah i could imagine i feel like that one they can find through metal metal detectors pretty easy right but but there were you know this this notion of like victimless crime um was real on the silk road there were hacking tools that were sold eventually um but the rules were
Starting point is 00:19:37 that those are not supposed to be sold and it i the eventually the government pointed to those um as examples of like you know exceptions to this victimless crime rule. And I don't really know how that happened. I think that in part, the site just grew so big that – or I don't know. I mean, even that is like selling hacking tools was a very small part of this Rhodes business. And for a very long time, like even the drug sales, it's important to point out most of it was not like heroin. Right. It was not cocaine even.
Starting point is 00:20:15 It was like mushrooms, acid. A lot of ecstasy. Yeah. Ecstasy was like a major product on there, in part because the quality of it could be guaranteed, which has always like, you know, i think been a challenge with mdma so um there was like a when when you looked at the silk road in 2011 2012 it really did seem like a super interesting and ethically complicated place you know like um not just a not a drug cartel or a criminal operation you know in a simple way like that definitely violating all international law for sure but and people bought
Starting point is 00:20:55 heroin and died from yes silk road it there's no doubt that it it expanded the drug trade probably in ways that like um there were stories of people who had gone clean. But then. And then moved someplace where like drugs were not very accessible. But then when they saw the Silk Road. They couldn't resist the temptation. Yeah. And you know.
Starting point is 00:21:14 Like. Drugs are morally complicated. Yes. But. But. But I just always want to like. Tell the story of the Silk Road in this way that doesn't just make it sound like Ross Ulbricht, like the Dread Pirate Roberts was Scarface or something. Yeah, so my stance on this – and you and I have talked about this before a little bit off air, and I've talked about it on some other podcasts back in the day.
Starting point is 00:21:41 Earlier on when we were doing these, i think there were two podcasts in particular where it got covered a bunch but you know when people were talking about like the pardon with ross because his sentence was insane what he was given his sentence crime did not fit the sentence at all but when people are talking about pardon i've always backed off that and said listen i don't think the guy's necessarily a bad guy and i think there's a lot of amazing innovation he had but you can't violate every international law on drugs and some other things and not be punished for that but i i've always therefore looked at like commutation as as a route with with his sentence which we'll see what happens there but you know i don't think that – I think the world can get really complicated, and you can see people innovate ahead of where governments are and perhaps then – not perhaps.
Starting point is 00:22:32 In this case, 100% inject their political ideology into it in a way that's radical. Let's call it what it is. But I also think that the way that they painted him out to be was far beyond the scope of what he was for one thing i feel pretty confident based on the evidence that he was in over his head pretty quickly and that it's very very to me i i fully believe but i think from an evidence perspective it is is very easy to make the case at least i'll say that there were multiple dread pirate roberts multiple people using that account and so there's no doubt that some of the correspondence that happened on that account from behind the keyboard online was questionable to say the least and morally awful in in some cases as it got to with
Starting point is 00:23:21 calling hits on people and things like that but i I think things do change when you're doing things online. It doesn't make anything right. But to me, just looking at it from a humanity perspective, I mean we see people on Twitter, right? People on Twitter will say things that you can meet these people in person and then they're like kind of nice or like they're not like that or they never say it like that and it's just this thing where you feel real confident behind a keyboard being able to say do this or i think this or i think that and there's definitely a part of me that thinks a lot of that happened with with ross and even some of the other guys who were operating behind that keyboard there to where if some of the other guys were were putting hits on people or whatever and some some people have accused Ross of that.
Starting point is 00:24:07 He's denied that a lot, and the government did not bring those charges at trial. But if that were the case, I don't view it as the same capability of someone who's sitting here in a room and says, go hit that guy. You know what I mean? There's more of an emotional disconnection, and that's also their fault for setting up a system to where that that is possible to happen yeah well well let's see like i uh i don't know where to begin with this like there's yeah like i said i think ross was very idealistic but he was just like um and you know to your point that he was ahead of his time, I think he, it's,
Starting point is 00:24:47 you know, so many kinds of drugs have been legalized or are about to be legalized that were for sale on the Silk Road. But it's also worth pointing out that Ross wasn't for drug legalization. He didn't want to be, you know,
Starting point is 00:24:59 he didn't want drugs to be legalized and taxed. Or the Dread Pirate Roberts didn't anyway. I should say, like, can I just, if I could just tell the story yeah please please i i got really found yourself into the middle of it right i mean i i got really obsessed with the dread pirate roberts even beyond the silk road his creation i wanted to like um do a piece on this person the dread pirate roberts who was this political figure saw himself as like leading a revolution in the way he was talking to his community on the silk road which had its own user
Starting point is 00:25:31 forums he had a dread pirate roberts book club where he was like you know recommending like anarcho-capitalist like yeah philosophy stuff i mean so i i did like bug him for about eight months until he agreed to an interview and that's where he laid out a lot of this political ideology which I was this that was in I talked to him on July 4th of 2013 yeah for like I don't know a long time it was all like done over the Silk Roads tour protected messaging system he like all text he made me like a um like a temporary drug dealer on the site essentially just to be able to have an account to like um message
Starting point is 00:26:12 with him how long did it take you to convince him to do that because you're doing it all via text obviously it's not like you're seeing who he is but how long did that take it took eight months like i um i started asking in 2012 i think and then uh he you know he didn't i think want that kind of um visibility or um heat and then i think what was your pitch to him i'm curious because you find your way to get like in you can see it in your books too with some of the people you get access to but then look at your career of some of some of the publicity between ross and before that julian assange before anyone who knew knew who julian assange was like you find your way into these situations and people give you the trust to be like yeah yeah come in andy well i do think that part of it is that
Starting point is 00:26:55 ross's ego was are the dread pirate roberts whatever his ego was growing over time as the silk road became bigger and bigger and And as law enforcement continued to chase them totally in vain. Like, I think that Ross's hubris, as it became like one and two and then two and a half years, ultimately, that he was evading law enforcement successfully. He thought that he was untouchable.
Starting point is 00:27:20 And what he was doing was so remarkable that I think he started to want attention. But I did, this is not actually even in the book, but I did do a thing with him eventually where I was like, okay, my editors say now that we're going to do this piece one way or another. If it's not going to be about you, I'm going to do it about your competitor.
Starting point is 00:27:36 Because at that point, there were these sort of copycat dark web markets and they were part of the story too. I wasn't like lying to him but i think at that point he was like well i can't abide by um one of these other dark web uh administrators getting the credit instead of me so that's when he actually agreed to do it and i i don't know that feels a little maybe that's manipulative but it was true also that like at some point the this other side atlantis was uh had popped up was like um gaining
Starting point is 00:28:07 some of his market share a little bit at least and the administrators of that site had like their own chief marketing officer stuff so they were like ready to talk anytime and uh if he didn't you know if he wasn't going to talk somebody else was going to so how long did you talk with him on there well i talked with him like i said for months off the record and then right but then he spends like uh you know five hours going back and forth but that's like in part because tor is really slow and uh and also because i think in retrospect that he probably was talking to me while conferring with other people who helped him run the site uh and including possibly i you know i think we differ in our opinions of like to what degree there were
Starting point is 00:28:53 multiple dread pirate roberts but there was definitely this kind of second in command guy yeah what was his name he was by variety jones yes that's it right i think his real name turned out to be roger clark i believe i've never i haven't covered his case so closely but he was like he was in thailand or something yeah yeah um thailand comes up again later but but he um he i think was not only kind of advising ross but also like pushing him to become more of like a hardcore criminal. I've seen ultimately the chats between them, the IMs. I don't think that they knew each other's real identities, by the way. Like so many people on the dark web, they work together only through text,
Starting point is 00:29:41 through tour, never actually met in person. Didn't Ross know the identity? I could be remembering this wrong from Nick Bilton's book, I feel like Ross there was a thing where he made anyone who was gonna join on send them his copy their driver's license or you know it's a really interesting question like he definitely did that from for the most of the people who worked for him but now that I think about it I don't I don't think he did that for Roger Clark might be true for a variety Jones I can't remember it was this incredible thing that like he made the people who worked for him send them uh his identifying information and he kept it on his encrypted laptop you know thinking um this was
Starting point is 00:30:14 like he had he had full disc encryption on his laptop so he thought if i just closed the lid law enforcement will never be able to access this that's the problem and like that uh but just the fact that it took so long to catch variety jones um the second command guy whereas the other people on the site were quite easily identified because their ids were on his laptop but we'll get to like how that laptop was accessed but like um i think that probably he was variety jones was just more careful. And he also had like a sort of power over Ross. I mean, you could see in their conversations when they eventually came out in illegal documents that like he was really influencing Ross in a kind of insidious way. And I've read the conversation where Ross thinks that he's got an employee who has stolen hundreds of thousands of dollars worth of bitcoins from him and he doesn't know what to do
Starting point is 00:31:11 and uh Variety Jones is like little his you know second in command guy um Lothario kind of figure is like I think this guy needs to needs to get killed that was curtis green right that's right and the employee and ross you can see him like hesitating not wanting to do this i mean the whole notion of the silk road is that it's going to be a a non-violent that actually reduces violence in the drug trade but he like you can see him be talked into it by a variety Jones and I believe I know I think you and I like maybe disagree about this I do believe that that that Ross himself who I believe was at the very least most of the time he was the Dread Pirate Roberts that he was persuaded to try to have people killed
Starting point is 00:32:02 now I'm not gonna put the picture of Curtis Green in the corner because I don't want to get the video demonetized. But people can Google that Silk Road, Curtis Green, fake murder. There's a picture that is – it will look like a dead body, but he was very much alive. It was – there were federal agents who staged the image itself. I forget what – they used like soup packets or something exactly they use like uh Campbell's soup like yes make it look like he had sort of vomited like during this torture session exactly I mean it's all really um Grizzly stuff but all fake like all the DEA this is like a bizarre story that you know this I I don't tell this story in incredible detail in the book. This book is
Starting point is 00:32:46 just telling the Silk Road story as a preamble to what was to come. But like it is an amazing story of like they essentially identified Curtis Green, set him up to be this victim
Starting point is 00:33:02 of a fake murder. The task force did. And this is, by the way, like the task force did and this is by the way like one task force in baltimore that was going after the dread pirate roberts are you talking about just to be clear are you talking about just the dea part of it right now with baltimore it was just baltimore it was actually like multiple agencies because i was going to say it was homeland security dea secret service they were all involved i'm sure about FBI or IRS in that in in that in Baltimore right okay that's what I'm asking there was another team simultaneously tracking DPR chasing Ulbricht you know eventually identifying him based out of New York that was Chris Tarbell
Starting point is 00:33:39 that's Chris yeah that's the FBI uh IRS yeah IRS criminal investigations and uh they had their own homeland security guy uh so it's a very complicated but there were actually two competing teams go out going after him was that the i'm gonna up his name but van dergaman or something was he the new york one and then there was other other homeland security people working with baltimore well that's true yeah i mean jared duryegan is the guy's name and he was he was based out of chicago just to complicate things further but he was working with the new york team right and they were let's like just to simplify it like they were the the more by the book uh successful and i would say like kind of like not to be too insulting to like
Starting point is 00:34:23 all the people involved in baltimore but the more top tier like yeah southern district of new york where that case was prosecuted out of where it was led is always like the one that's doing the big internet cases i want to bookmark that though because i do want to come back to how they access frosty that's interesting but well the server certainly yeah yeah i don't want to get you off curtis green though there's so much here there's this baltimore team that was doing much i don't know weirder stuff including faking this murder um and but i don't think like so there was never a real murder um that ross like actually paid for or um but i do you know i do actually believe that he thought that he had had someone murdered I It's it's it's a perfectly reasonable opinion to have and I and we've taught you and I have talked about this before like I said
Starting point is 00:35:15 off-air and so I respect that because also as People have already heard you were at the middle of this thing while it was going down You were then a main feature in the documentary deep web in 2015 which discussed a lot of this case right when it was finishing up trial. But with Curtis Green, a couple things that I would throw out there just as like maybe, but I don't know. First of all, I have always wondered, and I don't even know how technologically possible this is, but you never know with government organizations and what they have access to. I have always wondered if there was any correspondence or data edited, who today is – he made a deal to do that whole thing. I don't even think did time or if he did a very short time, but he's a regular citizen doing his thing now. He goes around with Ross Ulbrich's mother Lynn and does podcasts and openly discusses how – He fully agrees with you.
Starting point is 00:36:22 He says there were multiple Dread Pirates. I don't know what to make of that i can't say yeah maybe you know we have to like the the chat logs like some of them were from this the silk road server some of them were for ross l brick's laptop um you know could those have been altered i don't know i say that yeah it's i and it seems unlikely but possible i guess um the but the thing is and this is like what my book is about is that at ross albrecht's trial they not only showed that they could trace the bitcoins from the Silk Road server to Ross Albrecht's laptop but they showed money coming out of Ross Albrecht's laptop it that was exactly the amounts and the timing for the hits that he was commissioning and this is not the not the Curtis Green murder for hire yeah there were like five or something.
Starting point is 00:37:32 Another collection of them that followed, sort of like going after a scammer who had scammed money from the Silk Road and his associates. And in that case, you can see it on the blockchain. And this is what my book is about. This is not like – this is an interesting case because it's almost like like uh i i after ross ulbricht was busted and we haven't even talked about how that happened yeah we'll get to that in a minute i attended every minute of his trial in new york and um i was as shocked as anybody when their one day of this trial they they use bitcoin tracing as part of the evidence against him i mean um it had started started to become clear at that point that bitcoin was not the untraceable digital cash anonymous like um untraceable money that i that i thought it was that perhaps even people uh like the cypher
Starting point is 00:38:20 punks and even satoshi nakamoto thought it was but this was the first time it ever was used in a courtroom and uh they could they could show on the blockchain and i have looked at this myself i mean the blockchain the amazing thing about it is that it's a public record of every bitcoin transaction if you know whose addresses are whose you can look that up yourself and i i did this and i you know matching it with the uh what the prosecution has listed as ross ulbrich's bitcoin address is taken from his laptop you can see yourself the transactions where he's he was paying what he thought was a hitman so he actually thought it was like a hell's angels um gang member who was gonna do these murders for him how long was his trial thought it was like a hell's angels um gang member who was gonna do these murders for him how long was his trial approximately it was very short i mean um well i don't know i haven't covered that many trials like gavel to gavel as they say but it was i think uh three
Starting point is 00:39:17 weeks maybe okay so it wasn't like crazy long but no one thing that has always sat wrong with me, because again, you would think too, the basis of your book right here, which is that they can trace Bitcoin. We're going to talk a lot about that with these other cases as charges against Ross and catching him – and maybe we should talk about finally how that happened in a second. But they – in the media, they tried them by media. It was going to be a federal courtroom, so no cameras in there. They knew that. They said, oh, we're going to charge them with six hits and all this stuff and running this whole site and whatever. And then they get to the trial. And before the trial, they drop all the hits charges. They did not charge him with that. Yet they still discussed it in the courtroom.
Starting point is 00:40:13 And they quote unquote provided the smoking gun evidence that he exchanged the proper Bitcoin to have ordered these hits. So why did they not charge him with the hits? That's what makes me go there's a rat there well I don't really I don't know why they didn't charge him I I can say that they did charge him with murder for hire in another case in Maryland because of that Baltimore group that was doing that separately they actually had a murder charge against him which they that case was then
Starting point is 00:40:45 dropped once he was given a life sentence so um the question is like why did this the southern district of new york in the case that actually went to trial not include murder for hire and i what i've actually been told years later is there was like a jurisdictional issue but you know i don't know why never heard of that for Southern District in New York they could have I'm sure made made a case somehow to include the yeah it's crazy I think that they would have to have shown that like the purported victims or the purported perpetrator was in the Southern District of New York and they did have to do stuff like buy drugs undercover for in the southern district of new york to make that a new york case um that you know there are like always
Starting point is 00:41:28 these these jurisdictional things that you know are like kind of legal sausage making for prosecutors yes um but you know is that why i don't know it's it's strange and i think truly a problem that the jury in that room and i and every everybody else you know hears the whole story of of ross's you know attempted murders for hire and that's not actually the those are not the charges against him um and then he is sentenced in part based on that are you even but this is where i'm really not a lawyer are you allowed to do that if you don't charge someone with something are you allowed to rep to present evidence that might be a really dumb question but i would say the other thing i'm sorry they get like really legalistic
Starting point is 00:42:13 the other thing is that there was a charge against ross called continuing criminal enterprise and that's people call that the kingpin statute and the what that like technically means is like uh that you have like at least five people working for you in your criminal enterprise. And he certainly did. Yes, absolutely. I think his defense probably could have gone after that and said, prove that. Prove that there were five people working for him because I'm not sure that they could have proved that. But who knows?
Starting point is 00:42:44 By the way i always thought this was you know he needed to get eight ten years in prison and the other guys the other guys in the case all got like three to six i mean i always thought to be clear that like yeah you have to go to prison for this this isn't like oh get probation or help it it's like yeah there's certainly retribution that's needed it's just the matter of he eventually was sentenced to double life without parole in supermax that's absolutely but this charge you know i i've just i've talked on and off the record to the silk road prosecutors in the years since and you talked to preet no he these are like the people like preet is like the boss doesn't try it he's the boss exactly makes the shots um the thing is that the this. Preet doesn't try it. He's the boss. Exactly. Makes the shots. The thing is that this continuing criminal enterprise, this Kingpin statute, as it's known colloquially, does sort of like – the prosecutors say that the violence that he was accused of sort of can be included in that in the sentencing under this Kingpin statute.
Starting point is 00:43:46 I don't really – I'm not a a lawyer i don't know how that works i did i was there when he was convicted i was there at his sentencing and i listened to this to judge the judge in that case um lay out her argument for his sentence before she said what it was going to be. And it was extremely rational. It seemed like so well-constructed and like, I mean, she seems like a really intelligent, obviously, person and I was very impressed. And I was like, okay, these are really good points. Is Judge Forrest, is that Forrester?
Starting point is 00:44:22 I hesitate to say her name because it's almost like, you know, I don't want to like call for retribution against her she's not a judge anymore um it's no it's not retreat she just did her sure her name is catherine forest right um but then and she made this argument that i thought was was very smart um that like uh yes you say you took violence out of the drug trade but actually you took it only out of one part of the drug trade. The wholesalers essentially, who were the suppliers of drugs, you know, the people in Afghanistan or Mexico or whatever, who then provide drugs to the people who sold on the
Starting point is 00:44:59 Silk Road, that is physical and was the violence there exists as always those are probably the most violence that most the most violence happens at the source yes absolutely and then you actually she's saying this to ross you actually expanded the trade as a whole therefore you expanded that violence even as you perhaps took it out of the retail part of the drug trade you expanded it in the rest of the this supply chain so you know that's like i thought i was like wow that's that's actually quite interesting she made a lot of points like that that i thought were quite smart and she said also like you know you are making this argument um that you're different from an average drug kingpin out of
Starting point is 00:45:40 a place of privilege like you are no different from whatever uh guy in the bronx or whatever who is like handling the same flow of illegal narcotics and that's a fair point and uh you know i'm not going to you the fact that you are you have a master's degree that you were a eagle scout that you're this nice kid from texas like i'm not going to be swayed by that and i thought that that was all quite like interesting and um seemed almost wise and then she says like the conclusion of her argument which is like and therefore i sentence you to two life sentences in maximum security prison with no parole. And the whole room just like... There was like a deathly silence.
Starting point is 00:46:30 People just... I felt like I'd watched somebody be killed, like on the spot. It was so shocking. I just could not believe that that was the result that she was building towards. And... How did he react? I couldn't see his face.
Starting point is 00:46:45 Um, I could kind of, like, hear, like, gasps in the room, you know? Um, he was in front of me, facing the judge. And, uh... And I... I think that is not a reasonable sentence. I think it was a... in its own way, a miscarriage of justice. And, um... I don't know. i'm not sure that i believe that that um people deserve life sentence life sentences maybe even ever but um yeah but uh i don't know like certainly not in this case and probably not many other drug cases um even ones where people like purportedly whatever um even tried to have someone killed like it's uh
Starting point is 00:47:28 life is life yeah it's a long time and as the years have passed since then it's like i the it now feels like i now you know see i i knew immediately like this was wrong i did not you know i i hope that like you can see that i have like a very nuanced view of Ross. Yes, yes, you do. I think you have a very fair view. I think he had ideals. Those ideals were corrupted to some degree. I believe he tried to kill people. I don't believe he deserves to be like in a cage for the rest of his life, like decades and decades to come. He's been in there a decade now right exactly and like the more time that passes like the longer that it becomes clear that that's a how long life is uh and the wronger it feels to
Starting point is 00:48:13 me um but you know I I also when I say this I feel like it's worth saying a lot of people in prison for life are there unjustly and agreed just the fact that like i followed this case that ross is super interesting doesn't like make him doesn't even deserve he doesn't deserve special treatment but he but it is it is nonetheless like one example of a pretty unjust sentence sometimes in these types of arguments it kind of turns into everything else where you get the two loudest crowds one being lock them up forever and throw away the key and the other being yeah we really shouldn't punish people we're over incarcerated and everything and it's like i recognize the punishment and
Starting point is 00:48:56 retribution part of it the nuance of that and i recognize the nuance of we're way over incarcerated and you know we have some archaic sentences and stuff. And I kind of try to live right here with things as I do on a lot of things. And it's like, as I said on this case in particularly, yeah, he had to get punished for this. It's just I don't think it's a stretch or ridiculous for people to say that like other cases, as you point out, that we're not talking about right now, maybe people from less privilege as as well those sentences that sometimes are handed out that could be archaic like this are wrong and it's it's very hard to break down a case period when you're looking at every you know who was all affected drug trade affects thousands of people millions of people sometimes depending on how big you are in this case i'd say it's probably millions and it's like you know how do you put how do you put it a time
Starting point is 00:49:51 on that how do you put also like the value of it being shut down already on that how do you put a deterrent on that too and one of the things in your book is that the deterrent didn't work too well not at all and that's another thing that that i that I heard Judge Forrest say in that room was like, basically, like, I am punishing the hell out of you to make you an example of Ross Ulbricht to prevent, as she put it, like somebody from walking in your misguided footsteps or picking up your flag or something like that. And so he was essentially being punished not only for himself himself but for the crimes of like anybody who would follow him and that did not work at all like in fact um i wrote a story at one point about this study of the dark web drug trade and of course the dark web drug trade did not end with the Silk Road. But the dark web drug trade on the dates that Ross Ulbrich's sentence was handed down actually increased significantly, in part just because of the people were so shocked. And the news around this life sentence was enough to actually bring just more attention to something that people still didn't know that much about at the time. This was, I think, 2015 that he was sentenced and so and you know more just put a spotlight on the the people i
Starting point is 00:51:12 think just learned from that news oh you can buy drugs on the dark web and that that trade actually just continued to explode and um the silk road is being taken down just as happens in the drug war created a power vacuum that was just immediately filled first by the Silk Road to which was a kind of copycat site that was itself taken down in part because as you said it was created by people who had worked on the first Silk Road and were therefore identified quite easily yeah yeah and that was because of how they caught ross and everything and that's a very interesting story i'd love i'd love for you to recount because you spoke with him as you said july 4th 2013 i believe he was caught like three months later three four
Starting point is 00:51:56 months later right just three months yeah i think it was the end of october i think yeah something like that he was caught in san francisco yeah Francisco. Yeah, and he was working on his laptop, the laptop, in a public library. He had tried to work in a coffee shop and couldn't find an outlet for his laptop, and he like, sitting there in the science fiction section of the library working like looking out the window in a public place, you know, which I think he might have done in part so that if even if somebody could defeat his, the protections of tour, and find his IP address, it might look still like he you know, it would be less identifiable that because he was on some other network I don't know it ultimately was not a wise move because um he what happened just to like
Starting point is 00:52:52 describe it play by play I guess like he hears this these people having a fight behind him uh it's like some this man sort of like raises his fist to hit a woman behind him. He turns around and at that moment, another undercover agent across the table from him, a woman, grabs his laptop while it's still open. Yanks it out of his reach. He realizes that he's actually surrounded by undercover agents. He lunges for the laptop, but it's too late. Another agent has got him in a bear hug.
Starting point is 00:53:24 And his laptop is open, logged into the Silk late. Like some another agent has got him in a bear hug. And his laptop is open logged into the Silk Road. He's got like, you know, if he had just he had, as I think I said, his encryption on his laptop, so that if he had just managed to shut the lid, then it would have been encrypted. You know, with encryption, modern encryption is strong enough that like, the FBI or whoever potentially might not have been able to crack that within human lifetimes using the strongest computers they've got. All he had to do was shut it. But yeah, so if he had just managed to shut the lid, he might have prevented them from getting so much of the evidence that they used against them. He might have actually walked, I think.
Starting point is 00:54:02 Yeah. But he didn't. And they got the laptop with everything. I mean, he had on this laptop, a journal of, you know, creating this little road, a logbook of like daily activities, all of his chats with all of the people working for him and Variety Jones and everything. So and like a spreadsheet of his net worth, all of his assets and things. as you said like he um at the same time he never spent most of the money that he was amassing like millions and millions
Starting point is 00:54:33 of dollars and bitcoin uh he just sat on it and lived this almost ascetic life in um in san francisco like renting a room and like a house with other people and um you know he he when i interviewed him even you know he like uh he said to me like he spends almost none of his money stays under the radar and that was absolutely true he and i think that's because he was not like as i said he's not scarface he was a guy with principles doing this for some reason, some motivation other than money. Yeah. Yeah. And he – when they caught him, obviously they raided his place and everything.
Starting point is 00:55:14 And so they found the flash drives that had the Bitcoin on it. And I can't remember now. A lot of it was on his laptop also. It was on his laptop too. Okay. So do they have that still today or did they auction that off? I think that all of the Silk Road coins were eventually auctioned. Yeah.
Starting point is 00:55:29 In the years that followed. Yeah. We didn't really talk about like how he was found though. I mean, we should. Yeah, yeah. Let's do that. So even though the Silk Road was online for two and a half years, his Bitcoins were not traced to identify him like it still seems as late as as you know 2013 2014 that Bitcoin could not be traced to like find someone when even in the in his trial when they followed
Starting point is 00:55:54 the money from his server to his laptop that seemed like cheating because you have you've already identified the computers at both ends and they they had identified his server by the way through what i think was a vulnerability and likely a vulnerability in the tor anonymity software that's what i wanted to ask you about i forget the details now and i actually should have looked at that earlier i didn't remember that before we we went on camera but there was even obviously it wasn't you that wrote it but there were were a couple other articles. I believe one of them was in Wired when this all came out that did describe why every hacker known to man, like a lot of the big names I should say, went on record saying there is no possible way that Chris Tarbell and the cyber team at the FBI could have accessed this legally. They got this illegally.
Starting point is 00:56:41 It was in Iceland or something. I don't know, probably kind of inside baseball for the hacker world, but there was in Iceland or something. I mean, Ross was not like an expert hacker or cybersecurity expert. You know, he did the best he could for somebody who was making it all up as he went along. But it did seem likely to me and many like other people examining the case that there was an actual vulnerability in the Tor anonymity network itself that was somehow exploited to identify this server and and that it wasn't just like ross had made a screw up you know and um that would be important because it would suggest that the fbi had some vulnerability in tor at least way back in 2013 then when that went to when that when his case like was going to trial and pre-trial hearings um the defense basically said like uh um well if we think that you uh use some secret vulnerability in tor to do this that
Starting point is 00:57:57 you didn't it wasn't just a mistake like and if so then is that a Fourth Amendment violation? You basically hacked this server, Ross's Silk Road server, without a warrant. Yep. And you need to tell us how you did this. And the prosecution, very tellingly, I think, did not say, like, we didn't hack it. Here's how we did it. They instead said, listen, even if we did hack it, here's why it's not a Fourth Amendment violation. And the reasons were like quite legalistic. Like one was that Ross Ulbricht had never claimed it was his server. So how could it be a Fourth Amendment violation of his privacy
Starting point is 00:58:35 if he won't say it's his server, which is like this terrible catch-22, you know? And then the other one was that it's located in a foreign country it was it was in iceland so you you know the the fbi the nsa even whatever can like hack a foreign server if it doesn't have an american involved without a warrant and didn't they say like the vulnerability was something with a captcha right the the story initially was was that ross ulbricht had set up the captcha on the silk road right it's like you know the scrambled letters are like used to log into the silk road that that leaked the ip address but then when that was questioned the prosecution essentially said well listen we're not going to tell you how we did it but we don't need to the thing is like even if we did hack it like it's
Starting point is 00:59:18 not a fourth amendment violation so let's just move on and And that's what happened. In fact, the defense kind of seemed like they were trapped by this. They couldn't say like, okay, well, this is Russell Brick's server and he has a privacy right to it because they didn't want to admit that it was his server. Yeah, I need to, like I said, I need to go look at that again. I should have been more ready for that but it just it just didn't look like i think the way you just described it like catch 22 is the best way to describe how it got through because it the way that they went to defend it made no sense and then they fell back on the well then admit it's yours exactly so and um you know anyway so i think that that's how i think that there's definitely like on it whatever i have my own theories about how the fbi found the silk road server and then they
Starting point is 01:00:12 had his laptop they actually identified ross ross they got the name ross ulbricht for the first time from a very like silly kind of mistake he made that was alfred right the irs guy yeah there was an irs agent um gary alford who was just essentially googling um and he he had seen this post of someone like seeming to promote the silk road on a drug forum under the name altoid i think this is if i can remember correctly that's right and then altoid had also been a username that was posting to a coding forum saying can anybody help me with web development on some other project that Ross Ulbricht was doing and he had listed his email address in that second post Ross Ulbricht gmail.com tried to delete it but it was like captured in somebody's response to the message so that was the first time that law enforcement came upon his name
Starting point is 01:01:06 and ultimately uh that plus the server was how they got him and they got to him in san francisco so they bagged him and everything but you were starting this explaining about the the genesis of your book which is the bitcoin traceability right i think if i remember correctly this also this had to do with carl force and seanges, the DEA and Secret Service agents who were dirty in this case. This is really where the story of my book begins. Like the Silk Road case is something that I covered many. You know, I tell all this in the book, but just almost like in passing to try to get to this. So there's one IRS agents, IRS criminal investigator, Tigran Gambarian.
Starting point is 01:01:44 So you've always been picky about your produce. there's one IRS agent, IRS criminal investigator, Tigran Gambarian. So you've always been picky about your produce. But now you find yourself checking every label to make sure it's Canadian. So be it. At Sobeys, we always pick guaranteed fresh Canadian produce first. Restrictions apply. See in-store or online for details. He was based inland at the time and um his superiors were i think a bit annoyed that like um they had been left out of the silk road case but then tigrin got a tip from a cryptocurrency exchange where you buy and sell you know bitcoins whatever for traditional money that like what that this uh mysterious guy Karl Mark Force
Starting point is 01:02:28 was cashing out hundreds of thousands of dollars worth of bitcoins from on some unknown origin through this exchange couldn't tell the exchange where they came from it seemed kind of fishy Dekrin immediately figured out Karl Mark Force is one of those Baltimore agents investigating the Silk Road. He was a DEA agent. He was undercover with Ross. He had been undercover on the Silk Road, yes. And Tigran, the IRS agent in Oakland, starts digging in. And he's like, I need to – I think that Karl Mark Force was taking taking was on the take essentially from the silk road
Starting point is 01:03:07 like uh that he's that he carl mark force also believing that bitcoin was untraceable was like doing the kind of typical corrupt cop thing of like just grabbing whatever money was available uh and also even there was evidence that he that he he had started to encrypt his conversations, his undercover conversations with the Dread Pirate Roberts so that even law enforcement couldn't read them. Karl Mark Force was secretly communicating. So you know, this looks really suspicious, but Tigran is like, I just need to prove that he's getting paid, that Karl Mark Force's dirty Bitcoins are coming from the Silk Road.
Starting point is 01:03:43 How am I going to do that? Everybody tells him Bitcoin is untraceable road how am i going to do that everybody tells him bitcoin is untraceable that's not going to help you and tigran working for the irs being a forensic accountant and the irs criminal investigations unit is is a division is kind of a strange animal it's like these forensic accountants who also like have guns and yeah people don't know about this but yeah yeah very real and so he's but he also is like a you know he has like he's somewhat of a computer nerdy guy as well and he had looked at bitcoin and thought like you know this blockchain thing that powers bitcoin it does seem like it it's has every transaction listed there like i must be able to figure out which addresses.
Starting point is 01:04:25 The blockchain only includes Bitcoin addresses, no identifying information. But he's like, I can see money moving from address to address. If I can just crack this, then maybe I can follow the money and prove where Karl Marx Forrest's Bitcoins came from. So he essentially did this, just with no training. He just sort of invented techniques on the fly, like it was actually like working in his living room with his like baby daughter in his lap after hours. And he traced Karl Mark forces money this DEA agents
Starting point is 01:04:59 and proves that he had been paid by the Dread Pirate Roberts hundreds of 1000s of dollars worth of Bitcoin, and that he was essentially acting as like dread pirate roberts hundreds of thousands of dollars worth of bitcoin and that he was essentially acting as like a double agent inside the dea selling material selling investigative material like information to the dread pirate roberts as a mole and uh yeah he that was the first time that i mean this case what about gonniger though and chain analysis well yeah so even then after carl mark force had been identified as the first time anybody was ever identified through cryptocurrency tracing as having done something criminal even after this dea agent force was identified there was still another sum of like hundreds of thousands of dollars of bitcoin that
Starting point is 01:05:44 was missing, that everybody could see it come out of the Silk Road, but nobody could see where it had gone. And Tigran, everybody else, like on the case, his prosecutors and everybody thought like the Karl Mark force must have taken that too. Tigran was the only one who thought like, this looks different. It's like the way that the money is moving here looks like somebody else. He traced that money too and found that it was a second corrupt agents this time a Secret Service agent also in Baltimore that there were two dirty agents one acting as a mole one just stealing money from the Silk Road he was yeah so he was Secret Service but he was working directly with Force like they were both
Starting point is 01:06:22 there amazing screen thing right amazingly they were not even aware of each other they it was just like seemingly a coincidence that they you know or maybe who knows i don't want to like cast dispersions on the culture of law enforcement in baltimore but like but they made the wire already but they they both like seemed to believe that they could get away with this because of this myth that bitcoin was like untraceable money that you could you could just grab as much of it as you wanted and nobody could could follow the money and prove what you had done and they were both wrong and they both spent time in prison um and that's got like six seven years i think right they're both out now i guess so i
Starting point is 01:07:00 think like a bit less than that but close to that that. Yeah. But as you said, in that second case, Tigran had met this guy, Michael Groninger, this Danish guy. On the Sean Bridges case, you're saying? Yes. And Michael Groninger was like a sort of old school Bitcoiner who had worked at a cryptocurrency cryptocurrency exchange like very technically brilliant guy who saw the potential to actually who not only saw that like bitcoin was traceable uh but built a company in a very specific tool called reactor to do that he was the founder of a company called chain analysis right which today still is like the leading cryptocurrency tracing firm but his Right, right. that he figured out again there's something to do with when you do a bitcoin transaction on the blockchain there's a sending wallet a receiving wallet and i don't think it's called a wop but
Starting point is 01:08:11 a change address is that it yeah so to be clear like michael groninger not to complicate things too much but he was not the one who came up with all these techniques there was a a woman right sarah micklejohn at university of California, San Diego, who was an academic researcher. And she was the first one with her co-authors of this paper that was published even before the Silk Road was taken down, that showed that there was this kind of bag of tricks that could be used. I mean, the blockchain looked like, if it wasn't anonymous, it was at least pseudonymous. Like you could see money moving from address to address, but if you couldn't anonymous, it was at least pseudonymous. Like you can, you could see money moving from address to address. But if you couldn't figure out who owned which address,
Starting point is 01:08:49 then you can't follow the money can't prove anybody is involved. But she started to think of tricks that allowed you to connect somebody's identity to their blockchain at to their Bitcoin addresses. And you were just describing one, I mean mean the an even simpler one is like uh called like basically it's called multi-input transactions this sounds technical but it's pretty simple to spend money from to spend the bitcoins at a certain address you have to control the key for that address if you spend uh all the bitcoins at multiple addresses at the same time then you must control the keys for all those addresses if you do that in one transaction. So you look at that transaction and you say, oh, I can see that every one of these addresses
Starting point is 01:09:30 must have been controlled by the same person or organization. So you're already starting, instead of looking at a bunch of distinct addresses, you're looking at groups of addresses, clusters is what she calls them, that all must belong to one person or service or something and then another one is change addresses like you there was this there is i think this property of many bitcoin wallets that when you spend all the money at an address you can't just spend a fraction of it you have to like smash open the whole piggy bank send all the money to the recipient and then get change back for whichever portion of it you didn't intend to spend that change goes to a new address if you can identify that new address as the change address
Starting point is 01:10:17 often because it looks very new and the other address that the money went to is not new it's like somebody who's received money there before, then that change address, you can tell, oh, that change address belongs to the sender because that's where they got back their change. So then you can follow the money from the original sender to their change to where they send it again. And this is called a peel chain because it's like, this is Sarah Micklejohn's term for it,
Starting point is 01:10:44 a peel chain because it's like this is sarah micklejohn's term for it right appeal chain because it's like you've got this water like a roll of bills and you're like you take one bill out of the roll hand it to somebody then you put it back in a different pocket but it still belongs to you you put the rest of the bills back in a different pocket then you pull it out again you spend one more you like peel off a bill then you put that wad of bills back into another pocket but that's what a bills always belongs to the same person now if you can follow that wad of bills until it hits a cryptocurrency exchange or even go back in time to see like where it originated like where somebody spent dollars to buy that wad of digital whatever bitcoins then you can if your law enforcement agency send a subpoena to the exchange and force them to hand over identifying information a lot of times is there a
Starting point is 01:11:33 way sometimes when i start thinking about this especially when we visualize the actual process like that i'll in my head temporarily i'll mix up like exchange with like what isn't considered an exchange and everything. But maybe a good broad question here is that while this takes a lot of work and is hard to do, the bottom line is that this can be done and governments, for example, can trace Bitcoin transactions. But is there a way that you can do – let's just stay with Bitcoin, Bitcoin transactions and not be traced? That's a really good question. You know, I read Sarah Mikkelson's paper and I was like, oh, I see. Like sometimes it's possible. I read it in 2013 when the Silk Road was still online, when everybody still believed that it was possible to spend Bitcoins in an untraceable way.
Starting point is 01:12:21 But you were still surprised at trial in 2015 when they said they did it well see like that's the thing like i read that paper and i was like i see like it's if you screw up and like leave these traces then you can be they can follow the money but anybody who's smart like um you know would find ways to avoid that and uh so it seemed like it was still possible if you stayed a step ahead to avoid that that kind of tracing and for you know because like it seemed like it was still possible if you stayed a step ahead to avoid that kind of tracing. And for, you know, because like... It's like they never traced Satoshi that we know of. Well, I think that is actually because Satoshi never spent any of his Bitcoins or cashed them out or had to interact with an exchange or did much of anything.
Starting point is 01:13:01 I mean, that's... But it is true he's like the one he or she or whatever is the one individual who has defied like every attempt to identify them uh yeah so it sounds like and i could be putting words in your mouth so correct me if i'm wrong it sounds like the answer's no like they'll be it may take a long time with some because they're sporadic transactions or limited history or whatever, but they could eventually use the two chains that are occurred – I don't know if they're chains, but the two addresses, I'm sorry, that occur within a transaction. As long as one has ever happened, they can figure out the geographic location where that came from perhaps well the thing is like if there there is a cat and mouse game here for and for I thought that like yeah the look at this paper like the cats have some cool tricks here but if you're a smart mouse you can stay
Starting point is 01:13:58 ahead it turns out I mean as cat and mouse games do this just like kept evolving. And the thing about the blockchain, this permanent record of every Bitcoin transaction is that if the cats like come up with a new trick, it's not just that like they can use that from then that point on to it to like trace new transactions, they can go back in time, look at the blockchain stretching back years which cannot be changed or erased it's copied out to thousands and thousands of computers and identify illegal whatever transactions you were trying to hide years ago and and so no i i i no longer have much of much confidence of any kind that you can do a bitcoin transaction with enough secrecy that it will stand withstand that test of like of time that like at no point in the future will these rather brilliant investigators like you know people like sarah micklejohn and then you know chain analysis this company that was created by Michael Groninger, I mentioned earlier, to kind of like weaponize her tools to build them into software and like has now been able to recruit all of the smartest forensic people to build trying to cook up scenarios in my head, probably doing a horrible job. But if I have – like if I have a USB drive that is my Bitcoin, which I do, right?
Starting point is 01:15:36 It's a drive. It doesn't exist on the internet. I have to plug it in and whatever, but I got that one day. Let's say I – let's say that some dude somewhere bought it and left it somewhere, and he didn't know who I was, and I came to pick it up for a predetermined sum of money or whatever. And then I go and I use that drive that was made by some manufacturer obviously, so that part's traceable. And I go somewhere else in the world and i start using it like could they they could find that how did you get those bitcoins in the first place that's a good question that's what i'm starting to think about what did you buy them from an exchange yeah so you're saying okay there's the question that's usually the the
Starting point is 01:16:23 cash in or cash out point is where people get caught right so it has to be through the exchange because they can subpoena the exchanges information to get the address any fill in the blanks that they need that's definitely like the most common way but by far I guess that it's it's also possible to I mean, the other trick that Sarah Mikkelson did was that she started doing essentially undercover transactions with services in the Bitcoin economy. So she moved her own Bitcoins into and out of the Silk Road repeatedly. Remember, this is when the Silk Road was still online. And then she would be able to see, oh, my money money went into that address and that must be a Silk Road address and because she'd
Starting point is 01:17:09 created she had those clustering techniques she could then see that's not just one Silk Road address that's part of a cluster of millions of Silk Road addresses so she then could identify millions of addresses and then see people's bitcoins going into them and and identify oh that's a that's a drug deal that's a drug deal that's a drug deal pretty much then the question is like who are those people doing those deals right and yeah you're right like most of the time you identify them through an exchange and in other cases like people back then especially would like post their Bitcoin addresses publicly like um soliciting donations or whatever uh but if you don't have that I guess I'm saying yeah it if I
Starting point is 01:17:53 mean the thing is like there's not that many like I guess if you mine the bitcoins that's potentially one way to do it without identify identification not that many people mine their own Bitcoins and then use them in a drug deal. Most people buy them from an exchange. And when you buy them from an exchange, almost always you have to give some identifying information. So if they mine them, not necessarily, but mining also takes not only significant energy and power and skill to do, but it happens slowly.
Starting point is 01:18:24 You can't just mine 100 bitcoin like that yeah i don't i mean uh i don't think there are very many people who i mean this is it's it's not something that i've like thought about that much or i hear about much but i suppose if you were uh if you wanted to be incredibly careful, you could mine Bitcoins yourself. I'm not even sure how this works anymore, because back in the early days of Bitcoin, you could just mine Bitcoins on your own computer. Today, most people contribute their computer's processing power to a mining pool, where you're helping, you're sharing your processing power and
Starting point is 01:19:06 then you get back like a fraction of the rewards and so that might mean that there is something traceable in the way that you receive that money from the mining pool so I don't know that I'm not sure that that's even that is a solution I haven't really examined enough but it's so rare I mean the people who are buying drugs on the silk road and we didn't get into this but i i ex as an experiment for forbes bought marijuana from three different dark web drug sites including the silk road and uh of course i i did not mine my own bitcoins i bought them from coinbase which was like an exchange and uh then as an experiment, once I read Sarah Micklejohn's paper, I gave her all my Coinbase addresses
Starting point is 01:19:50 in a kind of simulation of like, if she had subpoenas, Coinbase, this is what she would get. And I told her like, see what you can, can you trace my drug deals? And she immediately was able to identify this one, this amount of money
Starting point is 01:20:02 went to the Silk Road. This one went to this drug market. This one went this one see that you know what though now that i put that visual on it because everyone knows coinbase or is aware of what most people are aware of what coinbase is that doesn't seem that hard that actually that's very believable and and this was still in 2013 so even then i i believe that there was some privacy still possible with Bitcoins. But, you know, and then even the trial, as I said, you know, I was kind of surprised that they – I was surprised that they'd use this because I'd never seen it before. But it kind of still made sense and it still seemed like kind of an easy tracing case. What platform had they used within like the Silk Road community to buy and sell Bitcoin?
Starting point is 01:20:44 Mt. Gox? I think a lot of people did because that was all that existed in 2011. That was the only one in 2011? I think so, yeah. For a long time, there was just Mt. Gox. Then, you know, it's interesting you bring that up because after the Silk Road case
Starting point is 01:21:01 and the case against these two corrupt agents, which was truly like the first proof of concept Bitcoin tracing criminal case. The next big case that Chainalysis and Tigre and this IRS agent took on together was the theft of half a billion dollars worth of Bitcoins from Mt. Gox, which by 2014 had been like completely pillaged by unknown hackers actually nobody even knew where the money had gone but but you know had been bankrupted by what was either insider theft or hacker external theft of this massive sum of bitcoins and analysis took on this case like to figure out where that money had gone And the Frenchman who was in charge of that place was Mark Karpeles, is that right?
Starting point is 01:21:49 Mark Karpeles was the CEO and the creator of Mt. Gox. I'm sorry, he was not the creator. He acquired it. Mt. Gox was where, as you said, it was like the main exchange. It was where people went to buy and trade Bitcoin on the markets. And again, I keep on in my head, I'm trying to think of something else with that that I'll ask you about later. It was like the main exchange. It was where people went to buy and trade Bitcoin on the markets. And again, I keep on – in my head, I'm trying to think of something else with that that I'll ask you about later, but I'm going to say it wrong if I do right now, so we'll stay on this. hack in the history of cryptocurrency the platform was hacked and i don't know six hundred thousand eight hundred thousand some ridiculous number of bitcoins were stolen and the accusation was quickly oh carpolis might have been behind this and bezeled it out himself but very quickly the guys who you spoke with in your story which was was the IRS agent along with Groninger over at Chainalysis, they were brought into the case, at least Groninger was at first, and concluded that Karpolis was just incompetent and had left vulnerabilities and that, no, this was out there and they needed to go find it.
Starting point is 01:22:59 Exactly. I mean, Groninger, this Danish guy who – Keep saying Groninger. Sorry, Groninger. I mean, it's not even – I'm sure I'm saying it wrong, too. It's a Danish name. But he had now seen the potential in some of Sarah Micklejohn's tricks. And then Chainalysis very quickly started like venture funding and stuff and and uh was able to recruit like super smart people who uh were not publishing their their findings about how to trace cryptocurrencies but were like keeping these tricks secret in some cases i mean you and i can talk
Starting point is 01:23:35 about like how you trace bitcoins and what i know about how to do but there are definitely like now secret sauce techniques that chain analysis will not share with anybody about how to do it, but there are definitely like now secret sauce techniques that Chainalysis will not share with anybody about how they do it. So he actually, just as Chainalysis was getting started, took on this case pro bono. He actually, I think, saw it as like a way to help figure out who took this money so that we can solve this case, show that it's possible to hold people accountable for stealing, like, massive troves of Bitcoin. And also show that, like, that this is the criminal sums and, like, this is the criminal money and this is the clean money. And the whole Bitcoin economy is not, like, awash criminal money, because banks don't want to touch that, you know, they don't want to be accused of money laundering. So he took on this case. And at the same time, it happens as you as you were getting, I think that T. Grincon-Barian
Starting point is 01:24:34 was taking on a different case, which was this other coincidence almost. BTCE was by 2015 or 2014 this other competing exchange that had become a kind into it from all sorts of like from the dark web from ransomware which was a new phenomenon where people were extorting hackers were extorting people are you saying like the government could see this when they look using their tracing techniques exactly tigran can bury in chain analysis too could see this and yet nobody knew who ran btce it was this very mysterious weird exchange that was like existing out there but nobody even knew where it was based who had created it it was this very mysterious weird exchange that was like existing out there but nobody even knew where it was based who had created it it was the strange black hole and the whole bitcoin economy and it was actually getting very big it was um i think rivaling mount gox in size when
Starting point is 01:25:34 mount gox went offline was you know was so they had an incentive uh well it's more than that even so um this is where like the cases kind of strangely converge. Tigran and Michael Groninger were working separately, and they'd worked together on the Sean Bridges case. But then Michael Groninger, in his kind of pro bono capacity, helping out the Mt. Gox bankruptcy trustees in Japan. Right, that's where it's based. He traced those stolen funds from mount gox on
Starting point is 01:26:05 the blockchain and showed that a big chunk of them was going were going into btce and at the same time uh tigrin essentially was working on the btce case and together they kind of once they saw that they their cases were once again kind of there was a kind of combination, a confluence of events here. They figured out that somebody named WME was that was their kind of pseudonym was feeding all of these hundreds of millions of dollars worth of bitcoins into BTCE. And that WME was an administrator of btce how did they figure out he was an admin I'm trying to remember like the whole um investigative like process here um I think essentially tigrin being a law enforcement agents had figured out where the btce server was located and of all places, it ended up being in Virginia,
Starting point is 01:27:08 just miles away from where he was then working in DC, and actually set up essentially a wiretap on that server. I mean, I think maybe it was more just like an image. They had located and copied the contents of it. Quick question on that, though, because I remember this in your book, and I remember going, that's kind of weird. But you said that he said, Tigran, he immediately ruled out that this was a honeypot CIA experiment or something. How do you immediately rule that out when you find the server four miles from Langley?
Starting point is 01:27:44 Well, I don't know. I mean, I don't know i mean that um i don't know maybe we can't rule it out maybe the cia was involved in running this shady exchange who knows um it's it it it's kind of like uh regardless btce was whether it was a cia um operation i don't know what like the end goal would have been just knowing where the story goes from there um but or whoever it was located right there in Virginia I think the tigrin ruled it out just probably because he comes from law enforcement and doesn't you know it's maybe not as skeptical of like intelligence as you or I might be but yeah by essentially finding the server, which was not that well hidden.
Starting point is 01:28:28 This was an exchange. It was on the open web. So you just had to have law enforcement capabilities to do that and getting an image of it to get all the contents of it, which they did stealthily so to not tip off the administrators. He could see all the accounts of the administrators, one of whom was WME, and all their communications. And then, working with Groninger, who was following the money, and also had the
Starting point is 01:28:55 Mt. Gox, the... This is a bit complicated because some of the money that was stolen from Mt. Gox was actually cashed out through Mt. Gox too oh yeah wasn't it like they found
Starting point is 01:29:11 part of the reason he ruled out Carpalus was because then they found like 200,000 bitcoin or something like that they were able to get it back yeah this is another part of the story that Carpalus after this whole bankruptcy was like oh i found like another it was a 200 i think 200 000 something like that um bitcoins but also um groninger could see when the bitcoins that
Starting point is 01:29:38 were stolen were being cashed out like what times of day um and just as a kind of loose um i mean this is not like a definitive clue but like he could see what times of day. And just as a kind of loose, I mean, this is not like a definitive clue, but like he could see what times of day this was happening. And it seemed to be happening in essentially like, you know, Russia, Middle East time zones, not where Karpelis was based in Japan or in fact, like any other, you know, anywhere in the US. And he immediately started to suspect that once you see that time zone, that in fact, this money was stolen by somebody in Russia.
Starting point is 01:30:13 Because that is, you know, that's always where we think of like these hackers being located. And unfortunately, that puts them beyond like the reach of a lot of law enforcement. But he and Tigran gumbarian then essentially combined their data and together showed that wme was both an administrator of btce and the person feeding the mount gox millions into btce that the same person had been involved as the kind of money launderer for the Mount Gox hackers that was working as one of them, as had created BTCE. Then in fact, likely BTCE,
Starting point is 01:30:54 this whole exchange was created just as a way to launder the Mount Gox heist, essentially. And then through other like kind of um like investigative techniques they they found like some slip-ups where wme had at one point like revealed his real name uh tigran also did the like a lot of like kind of more traditional internet detective work or law enforcement work where he um tracked his IPs around the world and eventually like found a hotel where WME had checked in and this is Alexander Vinnick turned out to be Alexander Vinnick this Russian guy so now this is essentially like the
Starting point is 01:31:37 the solution to the Mt. Gox mystery as far as anybody's ever cracked it that Alexander Vinnick was what not only like the kind of money man uh he's not been convicted of this essentially for the Mount Gox hackers the one who was sort of like his it was his job to like take the money right and clean it somehow but also he had perhaps not alone but had created btce a whole exchange that became itself a kind of extremely criminal bitcoin exchange cryptocurrency exchange just for the purposes of funneling this money into it like it's just an incredible incredible kind of ambition to create it's almost like creating your your own bank or your own wall street trading floor just to kind of like you know funnel in your money that you're you as like
Starting point is 01:32:25 a mafia don are um end up with on this as a problem like you have this liquidity problem so you create a whole financial institution to launder it that's what alexander vinnick is accused of doing he's he's been convicted of money laundering he's now you know he served time in in france of all places now he's been extradited to the us so uh you know i don't want to like he hasn't faced charges here i don't want to he's innocent until proven guilty of this stuff i guess but you're so fair he also i you know i interviewed him through his lawyer in prison and oh really he claims his innocence and he says he was set up but whatever you gonna testify for him a trial i don't testify anybody whenever possible
Starting point is 01:33:06 it's funny like that that's come up in another case in the book and like i i politely declined to get involved fair enough so they they bottom line is they end up finding this whole other exchange and we're i'm getting it mixed up but he he comes back with the what's it called i want video or something like that this is yeah i mean that's a case that like is comes back later and comes up later in the book um where it was essentially um you know maybe we'll get to this, but it was a massive dark web market for child sexual abuse videos. And he was allowing that market to exist. criminally tainted money laundering crypto exchange was helping you know was being used by some users of this essentially what we used to call child porn dark web site and that is part of that will come up later in that case okay but in the meantime i mean what was more important and this
Starting point is 01:34:16 has not really been told like very publicly before i don't think chain analysis never even really revealed their role in this case but michael grroninger and Tigran Kambarian solved the mystery of where that Mt. Gox money went and essentially helped to also to vindicate Mark Karpeles, who had been accused of stealing all this money. And instead, they showed that it seemed to be like at least a Russian-connected group of hackers that had taken it now that you know i don't think anybody's got back their mount gox bitcoins but it um because it's still like an it's kind of tied up in this endless legal limbo but that was the the kind of first case where i mean the silk road corrupt agents was the proof of concept mount gox was the case where it became clear just how powerful these tracing techniques would be that you can often crack like what seemed like, you know, cold cases. And I would say that's kind of the beginning of this new era of the golden age of the golden era of cryptocurrency tracing where people like Tigran and Michael Groninger at Chainalysis would just be involved in. Their clients are the government effectively right i mean their chain analysis sells its techniques to exchanges where they kind of are like trying themselves to not be used for money laundering they have like their own laws they have to follow and stuff but then also yes like
Starting point is 01:35:39 chain analysis has all these government contracts and they work with every law enforcement agency practically and they've become a secret weapon for cracking like so many kinds of cybercrime and just illicit activity if it involves a blockchain it can't be traced it's the exact opposite of what you know i and even perhaps satoshi and so many other people thought in 2011, like, cryptocurrency is extremely traceable, or at least Bitcoin is and many others. And that has been used as a incredibly powerful lever to just like crack open so many, what, you know, seemed like uncrackable cybercriminal cases. See, if that's true, and it clearly is, by the way, it's kind of inarguable that if people take at least certain actions, and there's a lot of little as much of a tinfoil hat and start thinking about, all right, who are the powers that be in the world, be it governments or individuals associated with governments, etc., who don't want to see things like Bitcoin or crypto in general succeed.
Starting point is 01:36:55 You got to think they're out there as fronts buying into these things. I mean that whole Doquan Luna thing, that was one of the most obvious government psyops I've ever seen in my life. I mean, they- Remind me who that is. That's the dude, and I'm really uneducated talking about the full ins and outs of this, but that's the guy who ran Luna and the whole platform that crashed. I'm trying to bring it back to me. Maybe this was like six months ago, something like that, where essentially he was creating a stable coin that was benchmarked to Bitcoin. So what happened was when the house of cards came down, it also pulled the price of Bitcoin down, which as we know, Bitcoin is the one cryptocurrency out of all of them that doesn't have like a centralized company or something around it. We don't know Satoshi. It's this totally – government can't just go in and like invade Bitcoin.
Starting point is 01:37:48 So they have to find other ways in. And so when you see what this kid was trying to do, it just seems fairly obvious that like clearly this was a way to attack the currency. But what I'm getting at with the traceability is that if you had – let's just go with governments as an example. If you had China and the US and Russia, that would probably – Russia – I feel like Vladimir Putin was probably earlier some of this stuff. But if you had governments like that out there buying Bitcoin, hypothetically people like Ambarian and stuff would know that now because they'd be able to trace it but there has to be a way that that they're deep enough and far enough away without any identifying markers as far as who's doing the buying on their behalf that we haven't figured out who the quote-unquote five percent whale of bitcoin is or something like that i do believe that i mean satoshi is is like whatever um yeah exhibit number one yeah like it's possible to mine a ton of bitcoin and sit on it never do anything with it and perhaps you cannot be traced or um you know it might be
Starting point is 01:38:55 possible with like just enough restraints or enough just like doing as little as possible with your coins uh to use themously. But this is what I have essentially thought over the years. Well, okay, so you can be traced if you do this. But if you do this, then you'll be okay. Oh, well, actually, no, it turns out they figured out a way to trace that. Oh, if you put it, if you put your money through a mixing service, that like, you know, mixes up your coins with other people's and then sends back to you like untraceable coins that should work oh actually no it looks like they can defeat that um in fact they busted many of these mixers themselves um oh well what if you like uh maybe like flashing forward to almost the more like the present day almost what if you use
Starting point is 01:39:42 monero a coin that is designed to be untraceable from the start and builds in its sort of mixing capabilities into the protocol of the coin itself so that every monero transaction is mixed up with other people's transactions and has all these privacy untraceable you know properties and features um at least that must be untraceable. Actually, well, it looks like, I mean, the evidence, this is, Monero people don't like it when I talk about this. But there are cases where it appears very likely that Monero was traced. And I've seen a leaked Jane Alice's presentation documented, like it was the, the, this is like flashing forward, almost like the end of the story of the book, but where the Italian police received a presentation from Chainalysis, the leaked presentation is in Italian, where they say that they can trace
Starting point is 01:40:37 Monero with some probability, if not certainty. And that's often good enough, because as a prosecutor, you can then just start sending out subpoenas to every possibility that people don't realize that like you don't have to um you know it's not like creating some some different possibilities or confusion is not a reasonable cause is enough exactly so um the story you know i i just, it's it, I do still actually believe that it's possible to use cryptocurrency. untraceably. I don't think it's possible with Bitcoin. I don't think it's possible with most cryptocurrencies. The only one that I truly am like confident saying today is untraceable is
Starting point is 01:41:19 Zcash, which maybe you I don't know if you've heard of it. It's like it fully encrypts its blockchain, uses like very clever new fangled kinds of encryption to do this, uses something called a zero knowledge proof so that you can essentially confirm that a transaction is real and happens on the blockchain, but without revealing any information about it. But sorry, this is like beyond um like sort of technical capacity too but but zcash does appear to be untraceable but then again like i i remind myself sometimes i thought the same thing about
Starting point is 01:41:54 bitcoin back in 2011 so um every time that i've thought like oh this seems like we actually uh this seems like if that wasn't untraceable, at least this must be the cats, like, catch up in this cat and mouse game. But if, maybe I'm thinking this wrong, but I'm just trying to play hypothetical here. If somebody on behalf of, let's say, the U.S. government, let's make it simple. Somebody goes on, gets a brand new wallet,
Starting point is 01:42:31 makes a huge purchase, maybe over time in a bunch of tranches, to the same wallet, takes it off chain. So they take it off the server, right? So in this case, they would never use Coinbase, but let's just say it was Coinbase. Take it off Coinbase, and they put it somewhere. Well, now it's on a flash drive. No one can see where it's going. And then it switches hands a bunch, gets to the right people, gets to Jerome Powell at the Federal – I'm just making it very easy – gets to Jerome Powell at the Federal Reserve. He then has it. You can't really – like you'd have to do a whole case behind the scenes to find out that he's the one who actually bought it. But hypothetically it could be done, but they could set it up in a way that makes it like impossible to get there governments i'm saying well the thing is like you might not like a
Starting point is 01:43:12 when you sure you can like take your bitcoins out of an exchange put them at an address that you host yourself where the keys for that are on your usb drive hide that in a popcorn can under the floorboards of your bedroom closet this is actually that's literally what i'm talking about yeah that happened this was a case described earlier this week but by the way but it doesn't matter because the the fact is like if if uh those coins like if they can then subpoena the coinbase the exchange where you got those coins they get your identity they like figure out oh like the coins move to this address we don't know where the keys for that address are but we know the name of the guy who holds them so we're going to go raid his house and we'll look under all of his floorboards and find your you know they it's still there yeah yeah so so i mean what actually i'm referring to is like earlier this week a guy who hacked the silk road in 2012 and stole 50 000 bitcoins from the Silk Road because of a vulnerability in it then sat on those
Starting point is 01:44:28 coins for a decade uh was identified he was I mean he was identified last year but the Department of Justice just announced this he was identified I think because he had interacted with an exchange probably cashing out like a very small amount of those coins but that was enough for them to get his identity and literally find these bitcoins on our hard drive under the floorboards of his bedroom closet and this is brand new it happened on they announced they revealed this for the first time on Monday so when they seized those 50 000 bitcoins from him in November of last year, they were worth $3.36 billion because he had sat on them for so long. But the, but, you know, it's also just a testament to the fact that like the blockchain had, had recorded his transactions
Starting point is 01:45:19 years ago, and that was enough for him to be caught you know you it's just uh okay i i have the sorry i was making a face there but i have the article up here so this is the one you're talking about this is last yeah yeah that's like last week that's the case yeah how is it i was confused about how did we get to because i see the number here too how did we get to – because I see the number here too. How did we get to 3.36 billion when it was only – oh, that's not a point. That's a comma. Never mind. I was reading it, and it looked like it said 50.676 Bitcoin, but it says 50,600. Okay. Yeah. All right. Now it makes sense. 50,000 bitcoins was 3.36 billion dollars, which at the time, at that time would have been actually the biggest seizure, not only of cryptocurrency, but of any currency of any kind that the
Starting point is 01:46:12 Department of Justice had ever made. But then actually just a few months later, they did an even bigger one. But I don't know if you want to get into that. There was like this, this is, you know, this is like comes right at the end of the story of my book so it's not a story i really tell like this this biggest case of all time is just one that that uh unfolded just as i was finishing the book so it's only mentioned like in the epilogue but there was this case of this new york couple maybe you've seen like the rap videos of one of the this the woman in this couple um she goes by razzlecon and she and her husband uh who was like a Russian American guy were
Starting point is 01:46:52 accused of laundering 4.5 billion dollars worth of bitcoins that were stolen from a yet another exchange bitfinex uh and is that the guy is that where the general counsel frost was from? Let's see who worked with he was the guy who caught for Carl force on The on the the de-aging on the Silk Road case He was going back and forth wound because he was the general counsel and he was like this guy sketchy and he went to the Government it turned out it was one of their own and then they know that's about that Well, he was working in a different exchange uh bit stamp bit stamp okay um yeah he's the one going
Starting point is 01:47:29 back to the that story he gave he was the one who gave t-grand the tip that he saw these dirty bitcoins coming in right that led to like the takedown of these corrupt agents um but this was a different case like 2016 i think is when maybe 2017 was when finx was hacked I think 120 000 bitcoins were taken in that case and um at the time of that they those were seized in early this this year uh 3.6 billion dollars at least was recovered of the 4.5 billion dollars worth stolen I did see this case it's coming back to me it's uh yeah it's mostly gotten a lot of attention not just because of that it's it set this record but also because uh the woman of this in this couple um had made these like egregiously cringy rap videos i mean like truly yeah they're not great they're not great i i remember this now so they had they had like 95
Starting point is 01:48:24 000 bitcoin or something like that i don't know that i can't remember the math but it would have been 3.6 billion dollars worth that was taken in that case but why didn't and by the way that was irs criminal investigations who did that case chain analysis won't say that they were involved but they were almost certainly involved and it's the same people who are the subjects of my book who carry that out i mean they just truly have broken their own records one after another. But the original one you were talking about that they just announced where the guy had it under his floorboards and everything. Why are they just announcing that now if they did it exactly a year ago?
Starting point is 01:48:58 Because I think he just took a plea agreement. Oh, okay. He just took a guilty plea. So that's how we found out. Yeah. Interesting. a plea agreement oh he just took a guilty plea yeah interesting i mean the poor guy like hacked the silk road in 2012 and sat on the money for 10 years and now faces like time in prison and had to forfeit all of that money it's a tough day but you know what you couldn't take like 10 million
Starting point is 01:49:18 of it just like like you had 10 years just like take 10 million out of there do something you know maybe just like run off to some non-extradition country no go to russia do something i think he yeah he was in he was in georgia and that's where georgia the country no the state unfortunately for him where he uh yeah where and that's where his popcorn can full of 50,000 bitcoins was found as well. Tough day. And it's actually reminding me, would you say that I had on John Boziak, who's – he was one of the biggest credit card scammers from America during the heyday of carding. And I was reminded of it when I was reading your book because vinik who was wme one of the creators of btce that we were just talking about he was a russian guy and it said that he got his whole
Starting point is 01:50:10 start in carding like that's what he was i think maybe you're thinking of that actually is a good segue into like the next major case of the book but but you're thinking of alexander khaas oh i am you're right you're right okay so yeah we are going to talk about alpha bay actually no i'm sorry you're you're you are correct so i didn't mean to just like inject the segway but the but vinik also had a carding background maybe i read it on both i can't remember they both they both did but then like the um the next like sort of major case of the book is i think of him more as like a carter who became a became the next dark web kingpin right so just right before we get to that though because this was a quick aside just bringing it up i talked with john a bit about the history of carding obviously and how all that blew up because credit
Starting point is 01:50:57 cards obviously became a huge thing in the 90s and then as the late 90s ended and got into the 2000s and things were extremely computerized, this entire industry just took off. The heyday was during the 2000s for sure, which is when he was in it. But a lot of the how in china for example they excel at math more than us because their numeric system is much much better like it's easier for a younger kid to learn the full system as opposed to us where we got to change the language at each hundred and thousand whatever but he was saying it's like a similar thing with the Russians and Ukrainians with coding where there's certain things in their language that are easier than to translate to being able to code something as opposed to when we learn it I've never heard
Starting point is 01:51:54 that before I don't know that could be I might have made that up I feel like that I mean I would just say like culturally these ex-soviet countries have like are they're very uh they have like a history of of of amazing education in math computer science and science and then um a lot of poverty and that's like that is a mix that creates like incredible criminal hackers you know okay plus plus just the corruption of governments there historically is like meant that you can hack people like in the west where the money is and you know perhaps pay off the right local guy when they won't extradite you or anything yeah there's no extradition treaties right especially in russia more much more so than Ukraine today I mean that this is no longer true since the kind of like bifurcation of like Russian and Ukrainian geopolitical paths like but uh Russia is absolutely that story like but it's interesting to note and
Starting point is 01:52:58 you know maybe we can get into this at some point too that like credit card theft is certainly still happening but like russian cyber criminals now since the advent of cryptocurrency really have very much switched over to ransomware as the even more profitable kind of hacking where you lock up you know as a whole network of like inside of a company or a government agency or a hospital or a school or like whatever and it demands a cryptocurrency ransom right and that's actually like a much faster way to get paid for your hacking uh it's a much more disruptive and like you know truly dangerous and um terrible for society form of hacking even then credit card fraud I would say but you don't have to like figure out what to do with all
Starting point is 01:53:50 these credit cards figure out how to use them for fraud you just get paid by the victim right away you know what we now know is a traceable transaction yeah so that I feel like I'm skipping ahead in this story it's okay but but uh i do try to in the book you know examine like if cryptocurrency is so traceable why is it that ransomware remains this is sort of the like near the end of the book like why does it remain this scourge on society i mean i'm sure you're like aware of some of the, I mean, everybody has seen like the ways that it's just been like this plague where like one company after another coughs up like millions and millions of dollars in extortion payments just to try to keep doing business. I mean, the biggest example was Colonial Pipeline. like the most disruptive where this company that controls a pipeline that distributes gasoline to like the whole eastern seaboard was hit by ransomware and uh they had to shut down
Starting point is 01:54:52 the pipeline essentially and that caused like this fuel crunch and huge disruption across the east coast and uh turns out that like they actually even had paid the ransom they paid these hackers five million dollars that is one case actually where the fbi was able which analysis is help by the way to follow the money figure out where it was and recover millions of dollars of it not the whole amount they haven't really said how that was possible the the problem is that even if you can follow the money if it goes Beyond U.S borders or if the hackers themselves are in Russia you're still stuck like you that just means that you can watch yourself getting robbed see where
Starting point is 01:55:38 the the getaway car went to but it's totally beyond your reach you know like the tracing alone is not always enough even with alexander vinik the russian guy like convicted of being of his involvement in the mount gox theft he only got caught because he went on vacation with his family to greece and that's where he was arrested and extradited from right so like if you if they're smart enough to like stay in a non-extradition country and not go on vacation and like the wrong you if they're smart enough to like stay in a non-extradition country and not go on vacation and like the wrong place then they're untouchable and like tracing is not enough that's why i think they don't care about being caught essentially that's interesting though but like what about like the north korean government hackers like
Starting point is 01:56:19 another example i think of like they're you know they're not likely based most of the time in North Korea, they're based in China, usually, is what I'm told. But, but again, there's no extradition treaty with China, then China is supportive enough of North Korea that they're not going to, you know, hand over North Korean hackers, even though it is very often possible, I think, to trace these massorea doesn't use ransomware attacks most of the time they just steal massive amounts of cryptocurrency billions of dollars worth of it uh per you know on a yearly basis these days and they're using that to fund you know horrific things and they're working regime including like you know their nuclear weapons
Starting point is 01:57:03 development and that can be traced and chain analysis has can follow that money but you can't do anything about it right they don't care they're just it's purely transactional they're looking to get in get their money and then they don't care if you catch them they already have the money right and you can't you can't extradite them you can't lay hands on them so you can follow the money but that just again tells you exactly how badly you're being robbed and like how much all of these cryptocurrency companies are accidentally funding the development of nuclear weapons in North Korea you know it's it doesn't solve the problem so you know that's just to say that like tracing is not a silver bullet like it's
Starting point is 01:57:41 it seems extremely powerful for actually identifying the culprit but sometimes the culprit can't be caught still it's a geographical problem at the end of the day absolutely a geopolitical problem yeah interesting so we left off though with the actual outline of some of the things in the book because there was there's a ton in the book that we're just not going to get to today and people are going to have to buy it again check out the ton in the book that we're just not going to get to today, and people are going to have to buy it. Again, check out the link in the description, Tracers in the Dark. But the Vinik story kind of got left off because, again, he wasn't in those extraditable countries and whatever. And so they knew who he was, but they couldn't really do anything about it. They had uncovered essentially who was behind the mount gox hack but in the meantime after silk road goes
Starting point is 01:58:26 offline in 2013 you had mentioned there was like silk road 2 and some of the people who had been involved in silk road launched at least that platform and maybe another one in the year afterward but they were quickly caught because all the data on who they were was on ross was on ross's laptop and also actually because there was another vulnerability in tor that one was like confirmed and in 2014 that was used in like another kind of like just round up of uh a bunch of dark websites not a lot in a lot of cases the government found a vulnerability essentially you're saying it was actually like this group of researchers at carnegie mellon who then gave it to the government uh pretty well confirmed yeah and in that case
Starting point is 01:59:08 like it the um a lot of those dark web drug markets taken down with that vulnerability it was just a server that was found and it wasn't the actual administrator somebody was like arrested and jailed in many of those cases as far as i know but with the silk road too they were in part because their identifying information was on ross ulbrich's laptop okay so they because they knew who they were they were able to get them but the other ones they were able to at least get in there through a vulnerability and shut down right however there was one that rose up that went beyond the scope of Silk Road. Silk Road, as we laid out, did mostly drugs. It had some guns on there as well, some hacking tools a little bit, and that was pretty much it for the most part.
Starting point is 01:59:54 So as we were just talking about, Russell Briggs' life sentence was meant to deter the next dark web drug lord, but that did not work and silk road 2 popped up then another site called like evolution took over and then evolution actually ran ran off with everybody's money just to show yes their lack of sort of you know dread pirate roberts principles if you want to describe them that way and then that site was replaced by another one which went offline and then the real subject of like our office of really like the centerpiece case in some ways of the book uh this market comes online called alpha
Starting point is 02:00:32 bay that would eventually grow to be 10 times the size of the silk road transacting like millions of dollars of drugs a day but the interesting thing that you know I uh we were getting at is that like Alpha Bay what sort of got its start uh as a Carter dark web site like it was it was founded by this guy Alpha O2 nobody knew who that was but his username but Alpha O2 uh was a known sort of notorious credit card fraudster who had even published like a guide to credit card fraud but then alpha o2 is kind of like big idea was to combine the dark web sphere of credit card fraud and and drugs into one massive market which was which would become alpha bay and what year is this approximately so alpha bay launched i guess in let's see was it 2015. i'll check it was 20 sounds right for a long time it
Starting point is 02:01:32 was not like particularly distinguished it was only in late 2016 or around like actually the middle of 2016 that alpha bay became the biggest dark web drug market when like other sites were going offline. Yeah, it says it, this is straight off Wikipedia. It says it reportedly launched in September 2014, pre-launched in November 2014 and officially launched December 22nd, 2014. So roughly the end of 2014.
Starting point is 02:01:56 Right, but then, so it launched, but was not distinguished for years. And then only after these other sites went offline did it kind of begin to grow, not only into the biggest dark web market at the time but the biggest dark web market ever i think it was around mid-2016 that it surpassed even the peak size of the silk road and was still growing and at this point like law enforcement is looking at this site i mean they they've taken down the silk road and taken all these other sites but this one seemed somehow to like not have made those mistakes like it didn't have the vulnerabilities like um the uh and and essentially Alpha O2 began to seem like this kind of potentially untouchable figure like I've heard
Starting point is 02:02:38 this from prosecutors and investigators like there was this real fear that maybe this time they've encountered somebody who they cannot reach. And it has a lot to do with what we were just talking about. Alpha-02 gave this impression of being Russian. There were no real rules on Alpha Bay, except, like, no child porn, no child sexual abuse materials. Actually, no murder for hire allowed either.
Starting point is 02:03:02 But otherwise, anything goes. There was no victimless crime here like you could sell People stolen data like, you know, that was a huge part of the business But you could not sell the stolen data of Russians or people from the former Soviet Union That was a rule on the site and it seems like that was a kind of don't shit where you sleep Yes Well, like this must be based in russia and alpha o2 would even sign off his messages with a russian sign off like be saved brothers but written in cyrillic
Starting point is 02:03:30 russian so there was this fear that oh this guy is what if he is in russia and the site is hosted in russia and will never be able to reach past that kind of as you said like geopolitical boundary does russia ever well not now obviously given everything that's going on but prior to invading ukraine do those conversations at least happen though like is it possible that if if someone's caught on either end us or russia that we have examples of where people did get sent from one to the other? I think like there was a period, I think, when there was cooperation. And then my friend Patrick Howell O'Neill wrote a great piece, I think, for MIT Tech Review about a case where maybe the first case where it kind of all fell apart and like
Starting point is 02:04:22 the American, probably I think the FBI. Sorry, this is not my story. But I identified these like notorious Russian cyber criminals and we're trying to get the Russians to cooperate in extraditing them. Oh my god. What's this called? Operation – this is like 2011, 2012, 2013, something like that. I can't remember the dates. This was the thing where John got caught for the final time because there was a joint – and we were laughing because this would never happen today.
Starting point is 02:04:55 But there was a joint operation, FSB, FBI, somebody else, and they were taking down specifically like the international carding industry i'm not sure if this is if it's the same case it could be it could be but the the uh in this story at least this is one where it seemed like the fsb was cooperating and then they essentially let the cyber criminals like get get away from right under their noses and the americans had like gone as far as traveling to Russia to get these guys. And in some ways, put the nail in the coffin of any notion of cooperation with Russian law enforcement.
Starting point is 02:05:34 But that's a historical story that I didn't tell. And everybody should check out Patrick Howell O'Neill's story. Patrick Howell O'Neill. Where did you say he wrote that again? I think it was MIT Tech Review. O'Neill, MIT Tech Review, Russia, U.S. carding. Let's see if we can pull it up. I'm not sure it was carding.
Starting point is 02:05:52 It may have been like a different kind of hacking. Yeah, I can't find it right now. So we'll have to look that up later. I can send you a link. You can put in the notes or whatever you'd like. Yeah, please. That'd be great. But yeah, there was this notion that Alpha O2, guy must be russian and therefore we'll never get him and uh you know
Starting point is 02:06:08 people like talked about him as like this one prosecutor described him his his like the impression of alpha o2 at the time as like the michael jordan of the dark web like what if this guy is just so smart and so careful that we just will never catch up with him. And it was around that time that they got their first real tip that was kind of the beginning of that AlphaBay case. And how did that happen? What was the tip? Yeah, so it was very much like what happened to Ross Ulbricht in a way. In the very first days that AlphaBay was online, it turned out, 2014 as you just looked up,
Starting point is 02:06:47 years earlier, before anybody really cared about Alphabay, because it was just one of many of these dark web sites, if you signed up for the user forum on Alphabay, you would get a welcome email. And that welcome email's metadata included this email address that it should not have included, which was pimpalax91 and hotmail.com. And some tipster, some some like dark web sleuth had signed up in those first days before this
Starting point is 02:07:14 thing was fixed, and it was fixed very quickly. And just kept that email for years as Alpha Bay grew into the biggest dark web market ever. then just before thanksgiving of 2016 tipped off the the dea um sent this tip to like of all places like a dea agent in fresno voluntarily yeah i mean i i i don't know who the tipster is. I've never – that's been very carefully kept from me. I think that, of course, law enforcement agencies don't want to reveal the identities of anonymous tipsters. But yeah, I don't know what that person's motivation was. But that was the first kind of crack.
Starting point is 02:08:04 And that was the guy Robert Miller He sent that to in Fresno right? I mean the rubber Miller is also a pseudonym for a DEA agent Who didn't want me to use okay? Yeah, I'll call him Robert Miller and He had done some sort of like pretty rudimentary dark web cases where he busted some dealers essentially Fresno the Fresno office of the dea and and the prosecutor there had like a dark web task force and they had done some pretty clever but small-scale things like uh using mistakes that dealers had made to identify them and like then tracking them down and but they weren't they never expected that they would be the ones to go after the kingpin of alpha bay um and but as they like like kind of scoured the web
Starting point is 02:08:54 with this email address that they now had pimpalex91 at hotmail.com they began to find this you know the this trail that alexander cause had left left. He had used this email address, for instance, on like a Canadian social media site. And they could see that he had been this like hip hop sort of wannabe as a teenager. He was from French Canada, from Quebec. And then they followed it further. They found his LinkedIn page where they could see that he'd kind of cleaned up, become a web developer, had his own web development company, a front company.
Starting point is 02:09:32 Eventually that would be revealed. And then they found his fiance's social media and saw that he actually now lived in Bangkok, had a Lamborghini Aventador, seemed to own a villa in phuket he owned several places right i think eventually they tracked all of this and they found that he owns like property in antigua barbuda and like granada and cyprus i mean he was not like ross olbrich no he was he was enjoying like his dark web like profits in a way that ross alricht never did. But even then, like they did not, they weren't, I mean, yes, like a web developer, like owning a Lamborghini is not like expected, you know, that's, that seems suspicious. And they had this email address. But even so, like they wondered, like, could they were they being set up like, they had to ask themselves, the agents and prosecutors in Fresno, what if this tipster has even set us up?
Starting point is 02:10:29 What if cause is being framed to take the fall for Alpha O2? Yeah, because it's kind of, that was the thing about this. It was almost strikingly easy to get there. Exactly. And often when something is that easy like it does seem like it must be a setup I think that they felt that too and so that's that is when cryptocurrency becomes part of the story again and it actually was happening like in a totally different thread in a different place like the Fresno office had no idea how to trace cryptocurrency in that way but at the same
Starting point is 02:11:07 time as they were chasing this like too good to be true kind of lead uh it happened that these two fbi analysts in washington dc who asked me to call them just ali and a, not no last names, were also trying to find the kingpin of Alphabay and using cryptocurrency tracing. And Chainalysis too, of course, like by this point, every Chainalysis customer is like asking them, can you help us to at least like chart out what part of the blockchain is being used what belongs to alpha bay like uh which of these millions and hundreds of millions of addresses at this point are alpha bay addresses and um analysis was like devoting years of work to this they this was not easy like alpha bay had learned from the silk road like the in many ways that the silk road would like take everybody's transactions like mine and that
Starting point is 02:12:06 experiment that i did and pull them together into like a few addresses so that made it easy using like the same multi-input transaction trick that sarah micklejohn came up with you could see that all those addresses must belong to the silk road butabay never did that. And in fact, Alphabay advertised to its users that it very cleverly tumbled and mixed their coins. And actually, the real trick was that it kept them all in these distributed addresses, never pooling them into one big account. And that made it very difficult to say that any particular address was an Alphabay address. So they were hypothetically, at first glance, you here finding a way around that those tracing methods right i mean the cat and mouse game had advanced for sure and chain analysis
Starting point is 02:12:52 had to spend like years trying to figure out like what the fingerprints of alpha bay were on the blockchain and never told me actually even what most of those were but they gave me like a an example which was that alpha bay uh essentially like had a fee structure when you send bitcoins you can like pay a fee and the bigger the fee the faster your transaction is confirmed by the whole bitcoin network and alpha bay it turned out had this particular fee structure where like the bigger the payment you were making whatever drug deal you were doing um the bigger the fee was and this was a particular like sliding scale that chain analysis figured out would serve as a kind of fingerprint that they could use to i think probably one of many to to start to like build out the picture of which addresses belonged to AlphaBay and by like late
Starting point is 02:13:47 2016 they had like 2.5 million addresses that they had determined belongs to AlphaBay and when you say belong to AlphaBay well exactly they belong to like buyers or sellers or administrators on AlphaBay and how big was the ecosystem at that point because i know i think it was like within a year alpha bay's daily revenues were higher than silk roads was ever at its peak or something but like how many users did they have roughly you know i don't they buy the numbers that i have in my head are like that by is more like daily transactions. The Silk Road at its peak, I forget exactly how much, was doing like hundreds of thousands, like mid, you know, like three or four hundred thousand, I think, a day in transactions.
Starting point is 02:14:39 By mid 2016, Alphabet surpassed that. And then by mid 2017, they were doing millions of dollars a day. And I do know that by mid-2017 also, flashing, you know, this is like skipping ahead a bit, they had 10 times as many users as the Silk Road had, like registered users. So according to the FBI's numbers anyway. So yeah, this was like a um you know
Starting point is 02:15:17 it it is just like another level of and in fact the arguably the dark web drug trade the dark web black market has never even equaled that sense um kind of depending on like exactly whose measurements and how you measure it um Alpha Bay was truly like a a singularity um but right so I mean if you're picking up where I left off like please Alpha um chain analysis had had figured out the Alpha Bay cluster more or less but then you still have to trace you have to figure out who alpha o2 is within that cluster and then trace out his money to a real person's name and that is what aaron and ali these two fbi analysts figured out how to do and they use so if i remember what you said at first there they figured it out but but they used chain analysis to confirm it all for them or get them all the way. Chain analysis allows you to follow the money, but to figure out whose money to look at, they had to come up with their own clever tricks.
Starting point is 02:16:16 And it was really, I think it was ali's idea um and that was that what if we like look at all of these sums that we know are associated with alpha bay and you remember that i mentioned like one of the earlier markets had pulled off an exit scam where the administrators like run off with everybody's money yes um they realized that whenever an exit scam happens that spooks the whole dark web like everybody pulls out their money from whatever market they're on, because they realize and they're like constantly telling each other everybody in the forums is like, never store more money on the market than you're about
Starting point is 02:16:55 to spend because it can just be taken by the administrator. And the only person who would not be spooked by these exit scams would be an administrator himself like the boss doesn't have to worry about an exit scam he is the one who pulls off the exits right right so what if they thought like what if we look at you know across this all of these addresses and find like a cluster within the cluster of like a large amount of money that sat unmoved even as exit scams occurred and we just start looking at those and soon they they did find a cluster that seemed like really suspiciously large had sat unmoved for you know during exit scams and then they started to trace that the tendrils
Starting point is 02:17:40 of that money to see where it might hit an exchange and they actually got as far as like tracing it to an exchange before they got they heard the tip that Alexander cause was the suspect for alpha o2 hmm and it was after these they had sent out the subpoena they heard Alexander causes name and through their grapevine through their own grapevine through law enforcement and only after that did they get back the results of this subpoena which revealed that it was alexander cause that they cashed out that money that their technique had worked and that they essentially confirmed alpha o2 is this guy alexander cause this like lamborghini driving uh french canadian eccentric dude in in in Bangkok yeah so he's in a foreign
Starting point is 02:18:27 nation would did Bangkok have extradition stuff with very much so it turns out yeah like I think Alexander cause like probably I don't know why he went to Bangkok really maybe just because it's nice there but like he it was the opposite of it turns out like the non-extradition Treaty Russian Haven that they thought he was in Bangkok it turns out is like uh very friendly with the DEA and they have they have a lot of people on the ground there yes very much so and like in the DEA office in Bangkok, I would learn when I visited even was is like the the center for all East Asian operations for the DEA, which has more, I think more foreign agents than any other US law enforcement agency. The DEA has like a huge presence abroad, but it's but in particular in Bangkok. What about do other agencies share a similar presence in bangkok as the dea i'm not sure but like the the what i learned just by you know um this like little capsule history when i talked to the agents there and visited for the you know when i was reporting all this out is that that golden
Starting point is 02:19:40 triangle of i think it's like what is it uh thailand and myanmar and maybe china southern china had become this source of heroin that was that actually we we all like i think have heard of vietnam vets who became addicted to heroin yes many cases that like white china heroin was coming from the golden triangle vietnam vietnam veterans would get addicted during wartime in the 60s and 70s and and so before the dea it was even created this um i forget what the precursor like the earlier agency that would become the dea was called they focused on bangkok because that was where a lot of this heroin that was addicting getting Americans addicted was coming from so that was like one of their first
Starting point is 02:20:28 priorities as an agency I just you know kind of learned this like from just as I like dug a little bit into the history there but yeah and they were smuggling it out too that was the other problem that's how Frank Lucas filled all the streets in New York with with heroin he was bringing it in i believe it was in like caskets that's right that's right from vietnam yeah i've forgotten that story but definitely like this white china like this this golden triangle region was a huge source i think of like more than half of all opiates at the time i think it was then surpassed you know by like afghanistan and whatever nonetheless, like, cause was in the wrong place. Like this was the opposite of a non extradition country. But it was still like, he was a very like
Starting point is 02:21:12 smart guy. And the story I tell in the book, like, it's, it's, it's one of the like, more detailed cases, because he took really smart security measures he was he knew better than to I mean you could tell that Alpha Bay was better at like obfuscating his cryptocurrency despite the fact that that was still used to confirm his identity but then also he had learned from like the from Ross Ulbricht you don't work on your laptop in a public place and he had full disc encryption on his laptop but never even opened it outside of his home so that was like a huge challenge in trying to take him down that would be that eventually like led to this incredibly elaborate sting operation where they knew that
Starting point is 02:21:58 they had to not only grab his laptop but grab it in an open state in his home in his home yeah wow so how did so when was it aaron and who was the other side aaron yes ali and aaron at the fbi so when they traced it back to him and then they confirmed that on another investigation out of fresno dude with the dea due to a tip-off they also had traced it back to him. Obviously, now they know they have their boogeyman, quote-unquote, who's Alpha-02. This is what? Like, end of 2016-ish? Something like that? Yeah, exactly. Okay. So, how long
Starting point is 02:22:34 until they had to do the sting and, like, what was the planning? Like, what was the full story there? Like, how did that go down? Well, I should say that even in the midst of this, there was this other case that Fresno and DC, those two branches like did kind of join forces. But then, at the same time, in this case is so like epic, and it's kind of global scope,
Starting point is 02:22:55 but the Dutch agents were tracking the second biggest dark web market ever used cryptocurrency tracing to find the servers of that market which was called hansa and hatched this idea i mean the dutch are like in truly like very aggressive in their law enforcement's uh operations like this they came up with a plan to not just take down the second biggest dark web market but to take it over to run it themselves undercover and when they found out that the americans were going after the biggest dark web market alpha bay they essentially proposed that they joined forces and create this one-two punch this incredibly like uh ambitious thing where they would take down together take down Alpha Bay the biggest dark web market and then secretly control the second biggest market so that all of the refugees from Alpha Bay would flow into hansa oh they get like a net on the back
Starting point is 02:23:58 end while it was under their control and they would be able to surveil and identify all of AlphaBase users on Hansa, the second biggest market that they were secretly controlling. So this plan took a little while to coordinate and hatch. But then there's still, as I was saying, the challenge was how do they get cause, like how cause the AlphaO2 and catch him red-handed in the same way that ross ulbricht was and one of the the tactics that really allowed them to do this was that they figured out that cause had a third alter ego as a kind on this kind of pickup artist alpha male forum where he was known as romeo he was like a fan of raw dogging and that was unfortunate
Starting point is 02:24:55 excuse me for like explaining all this but no you can say it's a rated r show you can say what you want that's funny and he was like pro like just absolutely live blogging his sex life on this on this like alpha male pretty gross forum how'd they figure out that was him you know it's interesting um i don't actually know how they initially i mean this romeo character this other pseudonym was like sort of bragging about his like living large in bangkok having a lot of cryptocurrency having a web development firm which was the front company so there you go all these like things kind of pointed to him but then as always it's about following the money in this case he um it turns out that cause was paying for a uh premium account
Starting point is 02:25:43 on rush v and they so they subpoenaed his paypal account found that he was paying for a uh premium account on rush v and they so they subpoenaed his paypal account found that he was paying for this account and that romeo alpha o2 alexander cause they're all one person and that actually aside from just like you know the fascination of like law enforcement agents at the dea and fbi like pouring over over the details of this guy's sex life. And also, he brags, as Romeo, about his laptop encryption and how he, like, you know, has done this as, like,
Starting point is 02:26:12 his perfect OPSEC operational security. But then also, as Romeo, you could see when he was online because Roosh V, this forum, has, like, an icon next to every username. And it's, you know, if it's's green that means they're active at that moment so the DEA actually was like a DEA agent in Bangkok figured this out she was became Jen Sanchez exactly Jen Sanchez who was like the the kind of most like I don't know most deeply involves uh age in Bangkok, perhaps. Her
Starting point is 02:26:46 boss will Guzman was like part of the case as well. But she was the one who figured out if that you can see when he's online. And that means you can see when his laptop is open. It turns out so that was a huge I mean, this like, you know, I think that cause probably the Dread Pirate Roberts had like this public persona. He loved to to spout all this political philosophy and stuff and sort of soak up the adulation of the silk road community but cause was not like that with alpha bay he was very much like all business with his drug market
Starting point is 02:27:22 so i think he needed an outlet to sort of like show off and and that was unfortunately for him like this essentially like a sex forum where he just bragged about all the all of the thai women that he was picking up at his lamborghini and sleeping with like on uh in these extramarital affairs always comes back to the pride man some way or another comes back to pride and hubris is like the downfall of all of these guys and alpha o2 was so careful but romeo was like not you know his other alter ego was where he he truly kind of uh got caught in a sense because that allowed them to trace his movements. They could see that he would basically follow him physically, see that he would pick up somebody in his Lamborghini
Starting point is 02:28:13 and take them to his second home or to a love motel. And then they would see him live blogging the sex that he'd had the next day. So that allowed them to hatch this plan that uh involves like half a dozen undercover agents many most of whom were thai the thai police and the thais like equivalent of the dea was hugely involved in this too um so on july 5th of 2017 they assembled this whole kind of undercover operation with somebody pretending to be a gardener somebody pretending to be like an electrician working on a telephone pole and then an american dea agents the one uh will guzman who i just mentioned was pretending to be
Starting point is 02:28:59 like shopping for real estate with his thai wife at the house next door all of this and then this this other couple two women undercover thai female agents who were uh pretending to be like just having taken a wrong turn down to the cul-de-sac where kaza's house was i mean all this is happening at the same time it's kind kind of ridiculous. They drive this Toyota Camry down to cul de sac, and then pretend that they're lost and are trying to turn around and then crash the their Camry into causes front gate, which is all ruse designed to get his attention to pull him out of his house, and hopefully
Starting point is 02:29:42 get him to leave his laptop open. And they do this, of course, when they can see that green icon on the roof fee is active like they know he's long he's that he's there um but at the same time by the way I didn't even tell this like branch of the investigation but they had to identify the Alpha base server which they did this is actually tigering Chainalysis who did this. Back at the IRS. Yes, exactly. Who came up with this still secret technique to identify the Alphabet server, which they are now trying to access an image. Maybe we can come back to the technique
Starting point is 02:30:21 they used. But however they did it, they found that it was in Lithuania, they have agents in Lithuania at the same time, who can see that causes logged in to the server, and then accidentally pull it off, they actually accidentally crashed the server as they're like examining it. And this is prior, obviously, this happens just minutes before the whole sting that they're planning did that wait wait were these guys it was was tigran and chain analysis aware that this thing was going down definitely i mean um because i know they were at a separate organization initially like they um when they found the server when they used the secret technique chain analysis had no idea that the bust was planned for just days uh away okay so by this time uh by july 5th it's all coordinated chain
Starting point is 02:31:13 analysis is no longer involved but they helped to find the ip address of the server so uh so they unintentionally crashed this obviously exactly and and they and they are now thinking oh my god like cause he's gonna know something's up he's just gonna shut his laptop lid and that'll be enough for us to be screwed essentially that hold on real quick though that way that they found in there that secret way that they're not sharing is this another potential government warrantless problem it's a good question um yeah i mean i i spent a lot of the the reporting like of this book trying to figure out that secret technique and i i do explain what i'm pretty sure it was at the end of the book um whether it was illegal like i haven't really so first of all
Starting point is 02:32:02 causes a canadian does that you you know, Kaz is Canadian. He's in Bangkok. The server is in Lithuania. Could they catch him with this? Even if he were American, would he not face that same catch-22 as Ross Ulbricht? Like, he's got to claim it's his server to have any privacy rights to it. I mean, it's a weird, like Paradox that you can catch these people in but also the fact that cause is a Canadian living in Bangkok I'm not sure he has like that the the US
Starting point is 02:32:33 law enforcement has to get a warrant for his server I don't know how that works because then if they try him out of the US though isn't he I don't know um that's a law question legal question it ultimately wouldn't matter for wouldn't matter we'll get to that but um but yeah people can read that in your book that part the the rest yeah that's that's fine i just wanted to know if there was something possibly there it's both like uh it's both like a good i don't know kind of reveal but also um maybe we shouldn't spoil it but it's also like a bit of a technical story so but like i did i think i did figure out what they did and that's the kind of like surprise reveal at the end of the book i actually just in the very last phase of the reporting i think i like did i mentioned a leak from j analysis earlier and that is how i figured
Starting point is 02:33:22 that secret technique out as well but but, they crashed this server right before this is going, minutes before this is supposed to go down. So then everybody, this whole team, and there's like six undercover agents on Kaz's block surrounding his house in different ways. Like the DEA agent and his fake wife are in the house. They're like, they've got eyes on his house as they pretend to shop. Like the DEA agent is like trying to distract the real estate agent while his partner is upstairs, like, you know, doing surveillance on Kaza's home. And then they have a feed of like a real-time video feed
Starting point is 02:33:58 from the DEA agent's car from the Toyota Camry. So there's a whole war room of agents and prosecutors, Americans, who are a few miles away in Bangkok watching all of this unfold. And they're like,
Starting point is 02:34:15 oh shit, the server is down. You need to take him now. And that's when these two agents in the Camry crash it into the Kaza's gate. And that's kind of like the beginning of Camry crash it into Kaza's gate. And that's kind of like the beginning of this very quick succession of events where, first, it didn't work. I mean, Kaza, they could see that he opens the window of his bedroom slightly.
Starting point is 02:34:36 And they're like, oh, we got his attention. Maybe he stepped away from his computer. But it's his wife, who is, by the the way eight months pregnant who comes down and they have to like do this whole pantomime of like the the undercover agent who would crash the car was like oh I'm so sorry can we can we pay for the damage can you please get your husband to come down so I can figure this out with him and and uh and cause does come down in like his gym shorts and shirtless and shoeless and uh they go into the house well at that point the the fake driver for the real estate shopping couple comes out and he kind of like uh i mean it's an elaborate story but like um basically uh he kind of pretends to be helping cause with the gates but then somebody gives a signal and
Starting point is 02:35:29 the guy who was the electrician i believe starts like puts on a police vest and starts like sprinting towards cause to arrest him and at the same moment another agent who was hiding in the back seat of the real estate shopping couple's car comes out um cause as when he sees the the agent running towards him in a police uniform realizes what's going on like tries to spin around he knows he has to get back in the house to his laptop but at that point like two and then three of the agents are like wrestling with him the one who was hidden in the back seat he goes by the nickname M and he kind of breaks free allows the other cops to like wrestle with cause and M just knows that his job is to Sprint into the house through the gate that's been like you know opened yeah up the stairs he's actually like studied the layout of the home i mean this is
Starting point is 02:36:26 all you know very carefully planned and um takes steps two by two he thinks that the computer is going to be in the guest bedroom and he busts into the room it turns out that cause had like guests from canada who were sleeping in there and he wakes them up and he's like oh sorry and he turns around goes into the into the master bedroom and finds that cause his laptop is there and still open and alive logged into alpha bay the whole case is cracked but that's that's causes arrested uh they've got his laptop he like russell bricht even had like a net worth you know spreadsheet on the computer this is like the a different kind of it's like the hubris of full disc encryption you think you can store this yeah do whatever you want yeah
Starting point is 02:37:10 because you're never gonna get it but he got caught the same way pretty much it was just like that much harder because it was in his home you know um but they did get him he's taken to Thai jail essentially he agrees to extradition and then a week after his arrest he's found dead in his jail cell alleged suicide right yeah so of course U.S law enforcement Thai law enforcement say that he committed suicide he he hung himself um his a lot of guys hanging themselves in prison these days his mother his defense attorney of course say that he was killed um what no there's a question what are they what are they getting at are they getting at like okay he was alpha 02 but there's someone behind this whole operation or something. There's governments behind it.
Starting point is 02:38:07 There's boogeymen, whatever. Nobody – I don't think anybody who would claim that Kaz was murdered knows who murdered him or has even like a strong theory but yeah the idea is that what if like maybe thai cops were on the take to protect him once he got caught they killed him to keep him quiet maybe he did have a local partner maybe he was tied up with the mafia i mean i did hear from one of his friends that he was like cashing out bitcoins at one point through the russian mafia in bangkok i don't know i don't know what that means but like um he he you know had like kind of liquidity problem like he had more cryptocurrency than he could deal with obviously that's what got him caught eventually that he was cashing out through exchanges too so um and you know they ultimately trace like
Starting point is 02:39:02 more than a dozen of his exchange accounts and his name and his wife's. But, yeah, maybe he had, like, a local laundering partner, too. Or something like that. And that person had him killed to keep him quiet. Who knows? I also don't know if he was—I'm not claiming—I couldn't figure it out i went as far as like spending hours and hours with all of the thai officials the detectives and the agents and the um you know the people in this agency who like masterminded the operation to get him i even talked to the jailers on duty and i uh and yet
Starting point is 02:39:38 i still don't know the answer to this question they have security footage they do but it's missing about half an hour oh yeah this is the thing and of course his defense attorney says the same thing like you're kidding me like this you've got and i've watched and showed his defense attorney a video of the last minutes of his life where um that the ties shared with me i mean i didn't even know that there was going to be video in his cell but they brought me down to to the jail like when i was interviewing the agents in this dea equivalent office in bangkok the jail is on the first floor they brought me down to the first floor i met the jailers they were like yep he was right here. And I can see the video, the cameras. And so I asked them to share
Starting point is 02:40:28 the video, and they did. Along with, they shared a coroner's report as well. And yet, the video shows him, you know, kind of sitting in his cell. Then you see him go off screen. By way his cell the way that this
Starting point is 02:40:47 happened was that he has his cell has a small internal wall with a bathroom behind it it's like a three-foot high partial wall with a little swinging door and he goes behind that door and I can't you can actually see him just barely sort of messing with the towel somehow which was what was used or what suffocated him and then that clip ends and the next clip is you see Thai police and then Jen Sanchez so we mentioned it was like the the one sight looking at his body yeah running in like in a panic seemingly like looking over this
Starting point is 02:41:25 internal wall in his dead body which has been choked you know choked out by um a towel fashioned into a noose and you know i i truly you're you know i appreciate that you're a skeptic i'm an agnostic on this i don't i did my best to like figure this out and i do not know what happens and i you know his defense attorney also was like well taking a step back even like his like jen sanchez the dea agent who found his dead body it was like i know exactly how he did it he turned this he like tied his towel into a noose uh sort of like got the end of it wedged into the hinge of this three foot high internal door and then you know lean forward to cut off his his air supply um the defense attorney is like that's impossible nobody can can suffocate that way he's not even his body is not even suspended
Starting point is 02:42:21 he's only this is a noose that's three feet off the ground then i i actually like did a lot of really gross uh grizzly research into house you know these kind of uh auto um in many cases like the research is based on like accidental deaths from autoerotic asphyxiation and it very often happens with bodies that are not fully suspended i don't want to get into like too much about how to kill yourself but it's like um it's just seemed dangerous to talk about that but yeah but it but suffice to say that i was convinced by like talking to a lot of doctors even about this that that are reading the literature and like um that it is possible to to kill yourself this way the fact that he was going in there and it appears based on the tape that he was playing with the
Starting point is 02:43:12 towel and we have that on video makes this sound a little less suspicious and like he legitimately did but i mean who do i gotta fuck to make sure that when someone kills themselves in prison that doesn't happen to be the 15 minutes where the camera's not working. I know. And it's so... It's like, Thailand is not a country where police are held accountable. So I can kind of imagine,
Starting point is 02:43:36 and this is what I was told, essentially, that the video shows Ka's messing with the towel, going to the back of his cell where he's hidden. And then the next action is people running in to find his body. And between those two moments,
Starting point is 02:43:54 there's about half an hour where nothing happens. And the Thais say that they just deleted that because it shows nothing. So, I mean, I think Americans hopefully would know better than to delete the evidence that, like... Apparently not. Well, yeah, exactly. But that's a different story. It's a different story. A very different story. So, I don't know. I don't know what to believe. But I do, I don't want to, like, attribute to malice what might have been, like, ridiculous incompetence.
Starting point is 02:44:21 Yeah, yeah. It could be open-ended. Sure. And that's where I where i you know i left it myself um but that ended the case because they had alpha too like what happened because he did he did have other people on the site similarly to silk road who at least like reported to him right they have alpha two they took down alpha bay um and at this point they had as i said like taken over the second biggest dark web market ever. So they sent everyone there, the Danish one. And just as they planned, like, it worked, like, beautifully for law enforcement anyway, that thousands and thousands of refugees from Alpha Bay flooded into Hansa, the second biggest dark web market, not knowing what had happened.
Starting point is 02:45:02 It was all kept secret i mean it was a full i think like days before even it was clear that um alpha bay had been uh taken down by law enforcement people thought it might be an exit scam people thought it might just be downtime you know that happens with websites on the dark web in particular and so they all flooded into hansa and registered there and hansa had been turned into this just like absolute surveillance death trap for its users because it was completely top to bottom now controlled by dutch police who were pretending who had taken the roles of the administrators and they proceeded to just like, do every evil trick they could think of. They had all of these users under their control. It was like, such a rare situation. And they
Starting point is 02:45:55 really did do everything they could think of to, you know, you're not supposed to be identifiable when you visit a dark website, even for the dark web administrators themselves. But if you turn that dark website into a trap, and like, change its code, yeah, they can they hold the keys, they can do what they want, then you can start to set these traps for people. And that's what they did. I mean, they, they did things like you when you make a dark web drug deal you were supposed to encrypt your address but by this point dark websites had features that would automatically in theory encrypt your address for you but hansel had been like recoded so that it would record your address before it encrypted of course and so they got everybody they got it they had them all right uh and they they even like did a thing where they tricked all the dealers on the site into downloading this file
Starting point is 02:46:48 Where there was like an icon? The Hansa icon Was loaded by pulling the image from a server under Dutch control So they that would like essentially reveal the IP address of everybody who opened that file like a kind of you know beacon trojan horse wait does that get their ip address even if they're using tor well that's the thing like they would be using tor to visit hansa but then they'd load this they load this file on their computer and that pulls in the image not over tor and therefore it reveals them so they got like you know dozens and dozens of the biggest dealers on Hansa who were coming from AlphaBay exactly this way.
Starting point is 02:47:30 They also did a thing where they tricked everybody into uploading new images to the site of their drugs that they were selling, and there was supposed to be an automatic way of stripping out the metadata that includes the location sometimes of a photo and instead they of course recorded that metadata so they like all of these different tricks were used to identify the dealers and over the next i mean it's not did they extradite all these guys to the u.s all the dealers yeah it's not really clear exactly like what the like how uh that all of that data which was collected essentially by Europol
Starting point is 02:48:07 um the Dutch police collected this data then handed it over to Europol and it gets like fed into like U.S systems as well and then it's just like a a you know this is such a global operation there were then like three different major busts of dark web drug dealers over the subsequent years with like all these different code names like i forget what they were all called like saboteur they all have like tor in in their you know clever um names and hundreds and hundreds of dealers were arrested in these so it's not they i think that they almost probably purposely obfuscated which ones were identified through the hansa operation versus other techniques but
Starting point is 02:48:46 suffice to say that like there were there was you know an enormous uh number of takedowns that followed around the world i mean a lot of these people were not extradited they were prosecuted in their own countries too um just a massive success for multiple governments though it was i mean it was also just like the biggest psyop ever performed against the dark web because that we know of but yeah sure yeah I mean um against in particular the the drug part of the dark web markets um because it was like you cannot even trust the people in charge of these dark web markets like even the the like dread pirate roberts of whatever hansa himself might be working might be a dutch police officer and uh that
Starting point is 02:49:34 instilled a lot of fear it took like a very long time for the dark web markets to recover from all of that chaos and paranoia see we know about like you know that for example the dirty dea cop from and the dirty secret service cop force and bridges from the silk road case like there's some that obviously become a part of the story but i'm always curious with all these sites how many people were unknowingly doing it on behalf of an organization like i will tell you one place my head goes with like Alpha O2 is that he was an agent for somebody doing something. Like it's very – it's possible at least. Certainly. I mean I talked to the prosecutors and all the agents who led that case, and I don't know. I spent enough time with them that I don't believe they're lying
Starting point is 02:50:25 when they say that they actually intended to extradite Kaz to the U.S. and flip him if they could. They were going to actually, they wanted to turn Alpha Bay, or, you know, at least probably take, they had already taken down Alpha Bay, but to turn Alpha O2 into an incredible informant and use that to, you know, do other kind of like stings and traps. But he was dead. And they really saw that as a huge disappointment.
Starting point is 02:50:52 I mean, I don't know if Kaz was killed or who would have killed him, but I don't believe actually that the U.S. DEA and prosecutors and FBI and IRS, like tigre and gabarian any of them would have wanted him dead they wanted him on team usa as they say that actually makes sense so it could have been with someone else but you're absolutely right that like they they wanted him to be the kind of asset that you're talking about but unfortunately for everyone uh he died yeah and so as you say like you know was there something extra that was not legal about like the way that they got to his server maybe that might have come up at trial but he never had a trial he was dead that's just the and and it's one of those it's like we're never gonna know now because like you can't talk to a dead guy but that was a crazy takedown they had
Starting point is 02:51:49 and everything and and one of the things from your book we're not really going to get deep into today because we're coming up on the end here but another one that was a huge standout in there was the whole case against like the i forget what the new term is for now but the term child sexual abuse materials yeah so what we know is child porn when they talk about it in in the media but they were able to use very short long story short here they were able to use cryptocurrency tracing techniques to be able to get these guys including you you open your book with a with an example of of a teacher in atlanta georgia who was vice principal who was caught using this method essentially looking he had collections of child porn absolutely i mean yeah i mean he actually was later charged that rats too yeah that vice principal was charged with actual abuse of kids in his school and this
Starting point is 02:52:42 case which again this is tigran gambarian at the irs who on his way home from bangkok like calls up chain analysis to see like do they have any new leads analysis tips them off to this site called welcome to video which would turn out to be not only the biggest child sexual abuse video market on the dark web but also one that that actually uses cryptocurrency which is pretty which is unusual actually usually these sites kind of trade people trade videos essentially and that allowed them irs and chain analysis to trace out the entire network and i know we're coming up to the end so i'll just summarize that they they arrested 337 uploaders, downloaders, abusers of children around the world and rescued 23 kids.
Starting point is 02:53:30 I don't know the details of those. They wouldn't tell me, of course, for the sake of the victims, most of those stories. I tell one story in the book. But that's like a – there's no – that is in some ways like the incredible proof of the power of this technique that they were able to, with cryptocurrency tracing alone in almost every case, identify all of these pretty abhorrent individuals. Well, that's great that they were able to do that with that. That's just – I don't – Well, it's true. That's one of those I that with that that's just I I don't well it's it's true that's one of those I just can't fathom I don't know it's it is there's of course I wasn't I didn't want to and could not legally look at the materials but on this site and it was taken down but I talked to all of you I mean IRS agents are not equipped either to like look at this stuff but they had to t green and kambarian and his partner in that case
Starting point is 02:54:25 uh Christian Chesky they were thrown into the deep end like these are financial investigators who have never looked at this stuff before and has no idea what they were getting into and were traumatized I mean like I can't even imagine I can't even imagine it's definitely like a part of even as I have covered this stuff for this world of hackers and the dark web for 15 years or whatever and i have never i've always kind of like averted my gaze from that world and uh because it's just so dark it's like a part the darker part of the dark web than i have ever wanted to even tell the story of and just had to here but it's also has a happy ending and it's like an incredible kind of climax to this series of cases yeah yeah and
Starting point is 02:55:10 it's I'm glad you told that story too because it's you know it luckily most of us can't fathom that world but it's not two people in it that's the really scary thing there are there are a lot of people around the world who are in that kind of shit and the internet has provided an unfortunate safe haven for them to be able to engage in this in a way that the world has never seen and so you know any way that that can be caught in in this way if it's done through cryptocurrency sounds great to me i mean it's it's it's a it it It absolutely is. It's like totally unambiguously a righteous takedown, that one. But then I do kind of like try in the book too
Starting point is 02:55:52 to even after all of that to ask the question, is this actually a good thing for the world? That it turned out that what was supposed to be almost like an escape valve from financial surveillance turned out to be the opposite like uh financial surveillance is just so pervasive it's so hard to use money privately and bitcoin was meant to offer that and instead it's served as a trap for everybody whether they are like child abusers or whether they're like dissidents or activists or people yeah trying to might not be the worst exactly people who actually might need privacy um you know there's just always two sides to this it's like hard to see that other side once you've seen
Starting point is 02:56:37 the the incredibly like truly evil ways that this technology was people were trying to use it but then there are like legitimate reasons to try to keep your money private and it's it's it's not an entirely good feeling to come to the conclusion that Bitcoin is not that it's the opposite of it well maybe the the only appropriate last question is for you just having done not only all the work on this book but having lived among this world and reported in it for now over a decade. Where do you see – obviously like we're talking when there's an enormous bear market and we just had the whole FTX blow up and all that. It's a whole separate conversation. But where do you see cryptocurrency going do you think there's something else that'll come up to replace it or do you think that the
Starting point is 02:57:29 ecosystem we've seen get built will eventually become a monetary system well i think that like i don't know there there are maybe like three different branches of of like where things are going there's the kind of civilized like cryptocurrency has mostly become very civilized like it's become very legitimate and this notion that it's like a tool for crime all money is i mean it's a smaller and smaller percentage of all cryptocurrencies used for crime but actually a larger and larger absolute amount of cryptocurrency is involved in crime. It's still growing in that sense. But that's the kind of second fork that I'm talking about,
Starting point is 02:58:11 which is that largely that is happening thanks to like Russian cyber criminals, untouchable people in Russia or North Korea who can be traced but can't be stopped, you know? And then there is this third very interesting thing that's happening, I think worth mentioning, which is something like Zcash. The dream of the cypherpunks, where we started this whole conversation, is still alive of what if we can still create a technology for truly untraceable payments.
Starting point is 02:58:46 And Zcash may be that. And then we've opened a whole new can of worms, which is a digital cash for the internet whose promises of privacy and untraceability hold up. And then where are we? Then what about those abhorrent markets for child abuse? What about the drug trade? It's going to be gonna be you know it'll be good for privacy it'll be it'll be i don't know very dangerous in other ways and that world has
Starting point is 02:59:13 never existed and you know it's a we're just like on the edge of a very uh unknowable future well there are good and bad people in the world and there always will be and it's some of it's really heavy to think about because if you could wave a wand just make everyone good obviously if you're a good person you would but there there are questions certainly to ask as far as like what what is the biggest net good you know is the is the biggest net good not necessarily on the side of the government being able to trace where every single thing goes especially with a digital footprint in a new world could be that's on the other side of that and the other side of that holds bad because
Starting point is 02:59:55 then when you give privacy bad people do bad things i i i don't know that's why i'm not paid to give those answers and everything but it's – your book comes at a really good time because as we move into this totally interconnected globally internet world that we have now officially gone into but it gets more and more iterated over time, you know, these are questions that we got to ask. And these are these are things that people got to become aware of. Because when when things like money and your footprint, your digital footprint became become the center of your ability to be a citizen in the world, that's where shit can get real scary. So I like the I like the pathway you're on here. But again, you've kind of been on this since the beginning, almost like you were at the earliest stages of this, and you're growing with it, and your stories are growing with it. And so as I've always said, I recommend your books heavily. You have – what is it, three now?
Starting point is 03:00:53 Yeah, this is the third one. This is the third one, and this one is called Tracers in the Dark. Once again, you can hit that link in the description to get it off Amazon. Highly recommend. I'm like two-thirds of the way through it. I think it's phenomenal so far. But your last one we talked about in our last podcast number 99 that's sandworm talked a bunch about that what was the name of the first one
Starting point is 03:01:10 about Julian Assange and the cypherpunks again yeah it was called this machine kill secrets which is like a reference to WikiLeaks right which is sort of like another thing that came out of the cypherpunks but then yeah in the midst of that book I came across cryptocurrency and I've wanted to write a book about it ever since i just didn't ever expect it would be this story but it did and we talked about that one a bunch as well on the last podcast so again i'd really recommend that but listen thank you so much for coming back down here do this did a great job this this story is awesome again i highly recommend it and i'm looking forward to seeing where the where the reporting takes you next well it's always a great conversation i really appreciate it julian
Starting point is 03:01:48 of course all right everybody else you know what it is give me give it a thought get back to me peace

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.