Silk Road 3.1 announces new leadership after scam

Silk Road 3.1 announces new leadership after the old admin tried to turn the market into scam – According to PGP signed message posted on Silk Road 3.1 website, new leadership has taken the website after a coup.

Silk Road 3.1
PGP signed message posted on Silk Road 3.1 Market

Here is the full version of PGP signed message posted on the website:

WE HAVE SHUT DOWN THE SCAM MARKET THAT THE OLD ADMIN TRIED TO TURN THE MARKET INTO!

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Greetings Comrades,

A more detailed post will be made soon explaining the situation that has been going on for the last couple of months. For now, here are the important actions that have been taken:

– -Market roll-back
The markets interface has been rolled back to a much earlier version.
The interface that we will be using now (wallet-less) is where buyers will place a order and each order will be given a specific escrow address,
This is being done due to the funds issue caused by the old admins.
What this means exactly:
Any funds that any one (buyers and vendors) had on the intergrated wallets or on any orders that was in escrow from before, these funds will not be able to be obtained at this time. However, after some time and the market has recovered well enough, we then plan to restore the old interface and as well as previous orders and balances that was on these wallets (we have saved and secured a copy of all the orders and as well as the balances any user held on their account)

By doing this, it will allow for buyers to be able and place orders as normal, and for vendors to be able and get their funds for these orders with no issue. As well, it will create the possibility for us to be able and refund users in the future once we are able to. We hope most agree they rather do this, than to not have either of these at all.

With this being said, we do deeply apologize for the mess that the market turned into.
However, we are determined to get the market back on the right track, and we hope every one else will be too.
-----BEGIN PGP SIGNATURE-----
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
jzb8luPlQYrIS7aXdC2gDcr8WGliEYiO4Xk6B4vRFD2iM7ZVbOs=
=KI57
-----END PGP SIGNATURE-----

Silk Road 3.1 has a very terrible reputation over the past years. At this moment we advise everyone to stay away from this site until further notice.

Dark Web Crystal Meth ring busted in Liverpool

Dark Web Crystal Meth operation busted in Liverpool – A major dark web drug operation was created behind the doors of an ordinary Liverpool home.

Police raided the house on Cairns Street in Toxteth after £120,000 worth of crystal meth was intercepted and followed to the area.

Dark Web Crystal Meth

More than half a million pounds worth of methamphetamine was found along with wholesale amounts of other Class A and Class B drugs at the home of banking IT expert Anthony Reid and his partner Zadia Salami.

Greedy Reid admitted earning up to £60,000 from his banking job, and investigations into his computer revealed incriminating data detailing thousands of pounds worth of drug orders dispatched to customers all over the country , including Scotland.

The 38-year-old was involved in numerous deals a day.

Andrew Ford, prosecuting, told Liverpool Crown Court : “He used the internet, specifically the dark web to trade drugs of Class A and Class B.

“These were paid for in the crypto currency, bitcoin and there were two email addresses which could be used to trade in the currency.

“His supply network allowed for an expansive and nationwide trade in these substances. He stood at the heart of the importations.”

Drug dealing paraphernalia including heat sealing and labelling machines, Jiffy bags and bulking substances including Epsom Salts and acetone, were also found at this major drugs distribution centre.

About three and a half kilos of crystal meth was found, mostly in a safe.

Reid’s partner, Salami, the full-time mother of two of his children, admitted knowing the code for the safe on the day of the raid on March 22, 2019.

As well as using Salami’s home for parcel delivery, Reid also used the homes of two previous girlfriends for such deliveries.

Liverpool Crown Court heard on Friday that the raid at the unassuming terraced house in Cairns Street followed the interception of about £120,000 worth of crystal meth by Border Force officers at a Parcelforce hub in Coventry.

The parcel was addressed to Anthony Steven in Warbreck Moor, which was the home of a former long-term girlfriend of Reid, the mother of his two sons, and she told how he often asked her to take delivery of parcels.

There had been various other interceptions of parcels intended for Reid, said Mr Ford, during the two year conspiracy and these included consignments of benzocaine and Crystal Meth.

Investigations showed drug deliveries had been made to the Cairn Street address on various occasions prior to the raid and signed for by the couple.

The drugs found at the raid included a kilo of ecstasy tablets, £7,500 worth of flowering cannabis heads, two and a half kilos of MDMA powder, cocaine and ketamine.

In Reid’s Audi outside the house, police found a parcel label was addressed to another of Reid’s former partner’s with whom he has a 13-year-old son.

The label was from a parcel successfully delivered to her city centre home and five other parcels containing benzocaine had been previously intercepted.

Both his other two girlfriends whose homes were used for deliveries were cleared by a jury of conspiring to supply drugs.

Reid admitted two offences of conspiring to smuggle Class A drugs and two offences of conspiring to supply Class A and Class B drugs.

Salami, 30, pleaded not guilty but was convicted after a trial of conspiring to supply Class A and Class B drugs.

Mr Ford said that Reid “was the orchestrator of the conspiracies and the jury were sure that she was involved… He directed the distribution of the consignments once in the jurisdiction.”

Jailing Reid for 12 years, Judge Brian Cummings, QC, said: “You are a man of intelligence and ability and you chose to devote those attributes to crime.”

“You used Salami’s home as centre of the operation, storing during there and using the premises for the preparation and distribution of drug deals of various weights and value to various customers.

“You used the dark web and crypto currency as an untraceable way of handing the financial side of the business.

Lloyd Morgan, defending, said that Reid, who has convictions for being concerned in suppling crack cocaine and heroin and producing cannabis, was ashamed and remorseful particularly because of the collateral damage brought to other people.

Defence barrister, Melanie Simpson, said that Salami had not become involved until after her former partner had died.

She was highly vulnerable after becoming pregnant with Reid’s baby and he moved in full time in March last year and she suffered domestic abuse at his hands.

She was and is suffering from severe depression and there was an element of coercion and exploitation.

She has no previous convictions and is the sole carer of her children.

Jailed Salami for three and a half years, Judge Cummings said that while he accepted she had been vulnerable she had to accept her responsibility.

He added: “I saw little evidence of this at your trial. You allowed a drug dealer to carry out drugs transactions at the home of you and your son.”

UK dark web drug dealer sentenced for selling ecstasy

UK Dark Web Ecstasy case –

A young man caught dealing ecstasy and ketamine in a Hull nightclub has been jailed. Reece Proctor, 20, was caught red-handed dealing Class A drugs in Atik nightclub in Hull on December 29 last year.

UK Dark Web Ecstasy
Reece Proctor, 20, ran a commercial drug supply business from his Beverley home

But what was discovered at his home was “a different kettle of fish” compared to what he had in his possession that night, Hull Crown Court heard.

Police went round to his home to conduct a further search of his property where they seized £6,000 worth of ecstasy and also found £7,500 worth of cash in his bedroom.

Proctor, of Swinemoor Lane, Beverley, appeared in court on Friday to be sentenced for five counts of drug offences and one count of possessing criminal property.

Judge Mark Bury told Proctor: “You pleaded guilty to a number of offences arising out of criminal behaviour on December 29 last year and for some period leading up to that.

“On December 29, you went in to Atik Nightclub with five pounds on you. You were seen dealing drugs. When you were searched you had £85 on you.

“You pleaded guilty to supplying both ecstasy and ketamine in the nightclub. You had a small amount of drugs on you when you were searched but when your home was searched it was a different kettle of fish.”

It was then that police found the large quantity of ecstasy that Proctor admitted to obtaining from the dark web. A large amount of cash was also found in his bedroom.

Judge Bury said: “When you were interviewed you admitted commercial supply. You admitted getting these drugs in quantities from the dark web and having them couriered to your home.

“You had been in the business of supplying Class A and Class B drugs for some time because there was nearly £7,500 of cash in your bedroom.”

Proctor, who committed the offences when he was 19-years-of-age, has no previous convictions on his record.

Defence barrister Dale Brook asked Judge Bury to show his client “mercy”, saying it would be “highly unlikely” Proctor would appear before the courts again.

He said: “It is a tragic case. It’s clear he has decided for his own benefit to become involved in the supply of drugs and there are going to be some pretty serious consequences for him.

“But I ask you to show mercy because he has in my submission learned his lesson. Perhaps, apart from his plea, the most important mitigating feature is his age and his lack of previous convictions.

“There is reason to believe that given his frankness with the police and his openness with probation given his obvious remorse.

“In this case this was an act of grave stupidity which is highly unlikely to be repeated.”

Judge Bury agreed that the case was a “tragedy” but jailed Proctor to a total of three years in prison to “send a clear message that this sort of offending cannot be tolerated”.

He said: “This is indeed a tragedy for you. I have read your pre-sentence report and a reference from your mother. You have had one or two knocks in your life already and that has affected your self-esteem it is clear.

“I have no doubt that you thought having the money available that you did through this illicit activity boosted your self-esteem.

“But it was boosted in an entirely illegal way and you were selling drugs in a nightclub, and other places no doubt, and had been for some time.

“You made full admissions to the police and you appear to have remorse and I accept you are unlikely to come to this court for offending such as this again.

“But, there is no alternative but to impose an immediate custodial sentence.

“You have to be punished and the message has to be spelled out that if you deal Class A drugs, particularly in places where young people are going to be in large numbers, there is only one place you will end up and that I’m afraid is custody.

“It is a tragedy for you and your family that you have got yourself involved in this and I am satisfied there will be no repetition. But I have a duty to send out a clear message that this sort of offending cannot be tolerated.”

Southland man jailed for child porn

NZ man jailed for child porn – A Southland man who had more than 120 child exploitation videos on his laptop has been sentenced to four and a half years in jail.

The 31 year old was convicted on 16 charges relating to possession and distribution of child exploitation and was sentenced by Judge John Brandts-Giesen in the Invercargill District Court on Friday.

Jailed child porn

The charges related to possessing and distributing objectionable videos and images containing children.

Judge Brandts-Giesen lifted the order for interim name suppression

However, defence lawyer Hugo Young indicated the man would appeal that decision and his name remained suppressed.

The man would be listed on the children sex offenders register.

Judge Brandts-Giesen said child pornography was an evil.

“Your downloading added to that evil,” the judge said.

Even if the mind of the watcher was already warped, watching only further entrenched that, he said.

“It can only be produced by abusing children,” he said.

The convicted man did not produce any of the material, but Judge Brandts-Giesen likened the dynamic to thieves and receivers.

He said if people stopped watching such material, the demand would dry up.

Young said the man would do it tough in prison.

“He’s been told he will be targeted,” Young said.

He said the man had suicidal thoughts and had been depressed for quite sometime.

Young said while in custody he had been moved to a protection unit and was receiving threats.

The man’s pornography operation was un-sophisticated, as some people went to quite some length to hide that type of material, Young said.

The laptop was not password protected and he did not operate on the dark web, Young said.

Crown prosecutor Sarah McKenzie said the man’s continued denial could be taken as a lack of remorse.

On the issue of name suppression, McKenzie said this was the exact type of offending which needed deterrence.

Young said continued denial is common in these types of matters.

The judge handed out a 10 per cent sentence discount for the man’s mental health and lack of relevant prior convictions.

A photo request by the media was denied.

$1.5 million in cryptocurrency seized by Australian Police

Cryptocurrency worth $1.5 million seized during raid by Australian Police – Acting on information from the Australian Border Force, Western Australian police have now charged two people with the attempted importation of MDMA. The charges came after 27.5 grams of MDMA tablets and 27.5 grams of MDMA powder were found in October, concealed in a children’s toy painting kit in a package sent to Perth from the UK.

Cryptocurrency
Officers located 27.5g of MDMA tablets and 27.5g of MDMA powder (Australian Border Force)

That led to a search of a property at Marangaroo, in Perth’s north, and the arrest of a 27-year-old man and a 25-year-old woman.As part of the search, officers from the Technology Crime Service found $1,524,102 of cryptocurrency on an electronic device.That asset has been frozen with the couple charged due to appear in Joondalup Magistrates Court on Wednesday.Detective Senior Sergeant Paul Matthews said the cryptocurrency seizure was believed to be the largest made by WA police.

Austrian police busted darknet Drug Trafficking Ring

Darknet Drug Trafficking ring who operated via darknet busted in Vienna – The Vienna police have stopped online drug traffickers, three people are in custody, two were at large. The main culprit is a 24-year-old Viennese, also in custody sit his 19-year-old ex-and the 22-year-old current partner. Via Darknet, they ordered drugs, deposited them under containers and provided their customers with the associated GPS data.

Darknet Drug Trafficking
Cocaine seized during the raid by Austrian Police

The perpetrators “showed a very conspiratorial behavior,” said Colonel Gerhard Winkler, head of the South Branch of the State Office of Criminal Investigation Vienna at a press conference on Wednesday. The investigators ensured addictive substances worth 350,000 euros. In various depots of the perpetrator group they found 16.5 kilograms of metamphetamine, 1.5 kilograms of MDMA and half a kilogram of cocaine with a purity of 95 percent, more than one kilogram of the anesthetic ketamine.

For one and a half years, the man and his girlfriends have ordered via Darknet drugs portioned in a forest near Mistelbach and hidden under glass or clothing containers in Vienna and so brought to their customers. The synthetic addictive substances were delivered to wrong addresses. The 24-year-old and his girlfriend were arrested in mid-September when they were picking up an amphetamine package weighing more than 14 kilograms at a post office in Vienna.

Winkler spoke of a “group of offenders of the generation 4.0”. They had carried out their criminal activities using “all electronic media”. The 24-year-old ordered drugs in the Darknet , paid with cryptocurrency and specified as delivery address empty apartments. Lists of such freestanding objects can also be found in the Darknet. The orders were then delivered to the accommodations, and sometimes the young man “went unceremoniously to the post office and picked up parcels”, reported Winkler.

Drug users initially got to know the Viennese “in an analogous way at various rave parties”. Subsequently, the “orders were carried out virtually and via messenger services”. The customers were given “GPS data, where the order is placed in public space, usually under glass or waste paper containers,” Winkler reported. The customers picked up their drugs there and deposited cash, which was subsequently collected by the dealers.

As an industrial park, the dealers defined outlying districts in the federal capital, their addictive substances they deposited primarily in Hietzing and Liesing . In a forest near Mistelbach , the drugs were stored, with a tablet press machine, they were portioned for the customers. The portable, around 100 kilograms heavy equipment was also ensured.

In March, the investigators first encountered the perpetrators. Customs ensured a “suspicious shipment from Holland “. In five packages, addictive substances were sent, mainly amphetamine and MDMA. Also, the 24-year-old came in the course of the investigation in Germany in a police check.

After a major drug order from the Netherlands , which he made personally, he was stopped on the way back in Mönchen-Gladbach by the German police. He was under the influence of drugs on the way, also hit drug detection dogs in the search of the car, was found in the vehicle but nothing more.

Extensive observations and investigations were the result. When the 24-year-old and his 19-year-old friend picked up a package of around 14 kilograms of amphetamine at the post office in September, they were arrested. The main perpetrator has already been convicted and has according to investigators on a “high criminal energy”.

His current girlfriend “support him again and again in all sorts of activities,” said the criminologists. The 22-year-old ex-girlfriend worked primarily as a subdealer. The trio is in custody, while the Viennese and his partner are silent, the 22-year-old confessed. Another man and a woman were reported for drug trafficking.

For dealers who order via Darknet, it has to do with perpetrators, “who have no criminal background, often in the early 20s and so slip into the worst drug crime,” said Robert Taferner , Head of the Unit Substance Trafficking via mail and Internet in the Federal Criminal Office . They “have an internet connection,” said the expert. “Anyone who can google can buy drugs online ,” said the investigator. “The end users not only lose their money, they also get home visits from us,” warned Taferner .

Since 2016, the authorities in Austria have secured more than 10,000 drug programs, around 340 kilograms of drugs , including 90,000 tablets. This was done by “random customs controls”. Online are mainly ordered synthetic drugs , cocaine, for example, have an “above-average quality”. Eighty-five percent of addiction is due to the Netherlands , the expert reported.

Organized crime “has long recognized that it can make the profit of their lives through online commerce,” said Taferner . While in the past criminal energy was needed to get drugs , now every 16-year-old could be delivered to the farthest corners of Austria . In any case, the police will continue to “ensure rigorously” and intensify their actions.

Operation FaceBOOKED – 3 Charged With Selling Guns Online

3 Charged with selling guns online in operation facebooked – Three people have been charged with using Facebook to sell illegal drugs and guns. 

Operation facebooked
Chicago Police displayed some of the weapons recovered in what they called “Operation FaceBOOKED.”

They were arrested Wednesday as part of Chicago police’s “Operation FaceBOOKED,” which targets the illegal sale of guns and drugs on the social medial platform, according to police. 

Seven weapons were seized during the operation, with a combined street value estimated at $4,100, police said in news conference Tuesday. An additional 23 types of narcotics with an estimated street value of $105,000 were also recovered during the operation, authorities said.

“Today’s announcement will help educate everyone on how some of these dangerous weapons are being sold, and how social media conglomerates like Facebook are encouraging this type of illegal activity by turning a blind eye in the name of member privacy,” interim police Supt. Charlie Beck said in the news conference. 

Jasper Pintor, 22, of Marquette Park, is charged with five felony counts of delivery of a firearm, four counts of selling narcotics, two counts of armed violence, two counts of manufacture and delivery of a controlled substance and a count of gunrunning, police said.

Thomas Lucas, 27, of Logan Square, is charged with two felony counts of manufacture and delivery of heroin, and two counts of possessing narcotics, police said. He was arrested on similar charges two years prior. 

Samantha Pierce, 27, of Portage Park, is charged with two felony counts of manufacture and delivery of cocaine, police said.

They are due for bail hearings on Tuesday.

“Facebook’s refusal to remove Lucas’ profile from the website after his initial run-in with police let him continue to sell drugs on Facebook,” First Deputy Superintendent Anthony Riccio said.

In a statement, Facebook said “Illicit drug and firearms sales have no place on our platform.”

“We remove content and accounts that violate our policy and catch over 97% of drug sale content and over 93% of the firearms sales content we remove before it is reported to us,” the statement read. 

Still, Beck argued the platform is “not doing enough to shut them down.”

“The people who are doing the illegal acts under their own identities, Facebook doesn’t shut them down,” Riccio said. “When they find out there is officers operating undercover with covert identities, Facebook will shut those officers down.”  

Facebook said police know its rules about using fake identities, but it continues to work with the department and the mayor’s office. 

“The bottom line is that offenders are emboldened by the privacy afforded by Facebook,” Riccio said. “This has created a thriving market where guns and drugs are priced high and sold fast.” 

Cocaine ring allegedly operated on PlayStation 4

Playstation Cocaine ring busted – A recent case in Missouri involving an alleged cocaine dealer has brought to light an often overlooked aspect of video game console ownership. Crimes orchestrated using chat services on a PlayStation 4, Xbox One, or even a Nintendo Switch are still crimes, and records of those criminal activities can be used against you.

Playstation Cocaine

The most recent case, uncovered by Vice Motherboard, focuses on one Curtis “Dola” Alexander. In a search warrant filled on Oct. 22, agents of the Federal Bureau of Investigations stated that Alexander was allegedly involved in a “multi-kilogram level” cocaine deal. As the narrative goes, an FBI source reportedly requested nine ounces of cocaine via the PS4 messaging client. Curtis, believing that in-game voice communication was more secure than text chat, asked that the transaction continue “during game.”

What’s interesting about this particular warrant, which was approved by a judge in the Western District of Missouri, is the type of information that FBI agents expect to be able to receive from Sony:

“The information that is automatically collected by Sony includes […] Networked connected software data, such as application utilization, game play, game or system video and audio, progress, utilization, performance, peripheral and device use, services requested an used, or content downloaded and viewed. “

It’s reasonable to assume that the FBI will use that information to determine which games Curtis was playing, and secure additional evidence of the in-game portion of the drug deal.

Two N.J. men caught in cellphone order-theft scam

Cellphone theft order Scam in Dover – Two men from New Jersey have been charged with felony level receiving stolen property after police seized seven Samsung Galaxy Note 10+ cell phones.

Cellphone Theft
Gilbert Martinez and Emanuely Ramirez – Dover Police photo

Gilbert Martinez, 20, of Elizabeth, N.J., and Emanuely Ramirez-Santana, 22, of Jersey City, N.J., were arrested on Friday. Police said the $1,099 cell phones were found in the dark gray Jeep they were in.

According to police, they responded to Grove Street at 2:45 p.m. after a resident reported receiving a package containing a cell phone he had not ordered.

Almost immediately after the package arrived, a man knocked on the resident’s door and attempted to retrieve the phone.

While officers were at Grove Street, police dispatch received a second call reporting the same activity on Gold Post Road. The suspects were seen leaving the area in a dark colored Jeep.

Martinez and Ramirez-Santana were stopped in the area of Mount Vernon Street and Hough Street. An officer seized the phones.

Martinez and Ramirez-Santana were released on personal recognizance bail and will be arraigned at Strafford County Superior Court on Dec. 12.

Police officials remind residents to report suspicious activity – including receiving packages that were not ordered and individuals loitering in neighborhoods – to them.

Global takedown of IM RAT malware

IM RAT Malware Global takedown – In a week of coordinated action, police forces in several countries have taken down the IM RAT malware. The action resulted in the takedown of the website selling the tool and the arrest of a number of buyers and users. Police forces also recovered a number of items including 436 laptops, phones and servers that are expected to yield further intelligence.

IM RAT Malware
IM RAT Seizure banner | AFP

The operation to takedown the IM RAT was led by the Australian Federal Police. The action also involved Europol, the Belgium Police, New Zealand Police, National Police Corps of the Netherlands, the United Kingdom’s National Crime Agency, the North West Regional Crime Unit and the Federal Bureau of Investigation.

Phil Larratt from the NCA’s National Cyber Crime Unit said: “Working with the NWROCU, AFP and a range of international and European partners we were able to support the takedown of a website that was distributing malware and facilitating hacking offences. The IM RAT was used by individuals and organised crime groups in the UK to commit a range of offences beyond just the Computer Misuse Act, including fraud, theft and voyeurism.

“Cyber criminals who bought this tool for as little as US$25 were able to commit serious criminality, remotely invading the privacy of unsuspecting victims and stealing sensitive data. As part of Team Cyber UK, the NCA works with a wide range of law enforcement, government and private sector partners to affectively disrupt and deter this type of criminal activity.”

85 warrants were issued by the various police forces involved. 21 of those were in the UK and they resulted in 9 arrests and the seizure of over 100 items. The operation brings to a close an investigation that has been ongoing since 2017. It was originally started by the FBI and Palo Alto Network’s Unit 42 team.

What is IM RAT Malware?

The Imminent Monitor Remote Action Trojan (IM RAT) is a piece of malware that allowed the complete takeover of a victims machine. Like a number of other similar pieces of software, it started life as an administration tool.

It was originally sold to allow remote administration and technical support of computers. This meant it allowed software to be turned on/off, installed, deleted, data to be recovered and users to be monitored.

Cybercriminals using the software used it to disable local security software. This meant they could install other tools, if necessary, on the remote computer. They were also able to use the camera and microphone to spy on their victim and steal their data.

The ability to monitor keystrokes also allowed them to capture users security credentials for banking, finance and even corporate sites. These are either used by the cybercriminals themselves or sold on the Dark Web.

At just US$25 per copy with and with little technical knowledge required to use it, it was increasing in popularity. The various press releases from police forces involved in the operation say that: “over 14,500 people across 124 countries are known to have purchased the tool.

What is not known is how many of those purchased the tool for legal purposes and how many used it to steal data. The police will now be looking to decrypt data on the devices seized to see if they can find.

IM RAT Hack Forums raid

It can be a fine line between tools used for legitimate purposes and for hacking. Most administrator tools can be used for nefarious uses which often goes undetected. What is of more interest here is what happens next. There are a lot of devices to go through to work out who had been buying IM RAT. More importantly, those devices are likely to yield intelligence on other tools and communities.

This is yet another RAT taken down by law enforcement around the world and it won’t be the last. Deleting these tools is getting harder. As the low level tools disappear, there is evidence that more complex and effective tools are filling the gap. Those tools are becoming increasingly cheaper and more readily available.

Cybercrime and nation state groups are increasingly making easy to use tools accessible to low level hackers. They great a lot of noise and act as a distraction for other operations. It also increases the workload on the defenders which reduces the risk of sophisticated attacks being detected.

For now, however, score another win for the good guys.