Monday, June 29, 2015
Updated: Canadian Intelligence Corruption
UPDATED: CANADIAN INTELLIGENCE CORRUPTION
CANADIAN INTELLIGENCE USED ROSS ULBRICHT AS AN ATM MACHINE
After the failed assassination on my family and I around the end of March 2013 in WHITE ROCK we noticed the good CANADIAN INTELLIGENCE agents survailence of us intensified and the bad CANADIAN INTELLIGENCE agents survailence of us decreased considerably. The bad agents would confront us in descrete locations and try to start confrontation with us and they were targeting our children more and the good agents would confront us in public locations and they were more friendly towards us, another confusing contrast which shows there were different groups of agents acting independantly from one another. Follow the money.
ROSS ULBRICHTS SILK ROAD LOGS
XXX = REDACTED
Published by Andy Greenberg
A log of daily activities taken from the laptop of Ross Ulbricht at the time of his arrest in October, 2013
someone posing as me managed to con 38 vendors out of 2 btc each with a fake message about a new silk road posted about cartel formation and not mitigating vendor round table leaks. worked on database error handling in CI
main server was ddosed and taken offline by host met with person in tor irc who gave me info on having custom hs guards buying up servers to turn into hidden service guards
deployed 2 guards on forum adjusted check_deposit cron to look further back to catch txns that died with an error
bought a couple of more servers from new hosts organized local files stripped out srsec db naming functions introduced at least two bugs doing this
been slowly raising the cost of hedging orgainzed local files and notes
server was ddosed, meaning someone knew the real IP. I assumed they obtained it by becoming a guard node. So, I migrated to a new server and set up private guard nodes. There was significant downtime and someone has mentioned that they discovered the IP via a leak from lighttpd.
private guard nodes are working ok. still buying more servers so I can set up a more modular and redundant server cluster. redid login page.
set up servers
being blackmailed with user info. talking with large distributor (hell’s angels).
commissioned hit on blackmailer with angels
got word that blackmailer was excuted created file upload script started to fix problem with bond refunds over 3 months old
got death threat from someone (DeathFromAbove) XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX. messaged googleyed about it. goog says he doesn’t know. user is prolly friend of XXXXXXXXXXXX who he confided his plan to. applied fix to bond refund problem stopped rounding account balance display
spam scams have been gaining tracktion. limited namespace and locked current accounts. lots of delayed withdrawals. transactions taking a long time to be accepted into blockchain. Wallet was funded with single large transaction, so each subsequent transaction is requiring change to be verified. lesson: wallets must be funded in small chunks.got pidgin chat working with inigo and mg
withdrawals all caught up made a sign error when fixing the bond refund bug, so several vendors had very negative accounts. switched to direct connect for bitcoin instead of over ssh port forward received visual confirmation of blackmailers execution
a distributor of googleyed is publishing buyer info mapped out the ordering process on the wiki. gave angels access to chat server
made sure backup crons are working gave angels go ahead to find tony76 cleaned up unused libraries on server added to forbidden username list to cover I l scam
moved storage wallet to local machine refactored mm page
sent payment to angels for hit on tony76 and his 3 associates began setting up hecho as standby very high load (300/16), took site offline and refactored main and category pages to be more efficient
problem with load was that APC was set to only cache up to 32M of data. Changed to 5G and load is down to around 5/16. ssbd considering joining my staff transferring standby data to hecho standby server
some vendors using the hedge in a falling market to profit off of me by buying from themselves. turned of access log pruning so I can investigate later. market crashed today. being blackmailed again. someone says they have my ID, but hasn’t proven it.
set up tor relays asked scout to go through all images on site looking for quickbuy scam remnants cimon told me of a possible ddos attack through tor and how to mitigate against it.guy blackmailing saying he has my id is bogus
removed last remnance of quickbuy scam implemented new error controller rewrote user page
inigo is in the hospital, so I covered his shift today. Zeroed everything and made changes to the site in about 5 hours
did support. inigo returned.started rewritting orders-> buyer_cancel, been getting error reports about it.
rewrote settings view
modified PIN reset system
added blockchain.info as xrate source and modified update_xrate to use both and check for discrepancies and log.modified PIN reset system
migrated to different host because current host would not connect to guards. Bandwidth limited and site very slow after migration.
04/21 – 04/30/2013
market and forums under sever DoS attack. Gave 10k btc ransom but attack continued. Gave smed server access. Switched to nginx on web/db server, added nginx reverse proxy running tor hs. reconfiged everything and eventually was able to absorb attack.
Symm starts working support today. Scout takes over forum support.
Attack continues. No word from attacker. Site is open, but occasionally tor crashes and has to be restarted.
helping smed fight off attacker. site is mostly down. I’m sick.Leaked IP of webserver to public and had to redeploy/shred promoted gramgreen to mod, now named libertas
attacker agreed to stop if I give him the first $100k of revenue and $50k per week thereafter. He stopped, but there appears to be another DoS attack still persisting.
Attack is fully stopped. regrouping and prioritizing next actions.
working with smed to put up more defenses against attack
paid $100k to attacker
reconfigured nginx to not time out. almost all errors have disappeared.
started buying servers for intro/guard nodes
still buying servers
helping catch up support smed demo’ed multi address scheme for the forum
paid the attacker $50k
tried moving forum to multi .onion config, but leaked ip twice. Had to change servers, forum was down for a couple of days.
finished rewritting silkroad.php controller
rewrote orders page paid attacker $50k weekly ransom $2M was stolen from my mtgox account by DEA added smed to payroll rewrote cart page
$50k xferred to cimon
someone claiming to be LE trying to infiltrate forum mods
loaning $500k to r&w to start vending on SR.
put cimon in charge of LE counter intel
rewrote reso center
06/05/2013 – 09/11/2013
Haven’t been logging. XXXXXXXXXXXXXXXXXXXXXXXXXXX did an interview with andy greenberg from forbes where i said i wasn’t the original DPR, went over well with community. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX r&w flaked out and disappeared with my 1/2 mil. smed has been working hard to develop a monitoring system for the SR infrastructure, but hasn’t produced much in actual results. similarly cimon has been working on the mining and gambling projects, but no results forthcoming. created Anonymous Bitcoin Exchange (ABE) and have been trying to recruit tellers. the vendor “gold” is my best lead at the moment. nod is an H dealer on SR who says he has world class it skills and I am giving him a chance to show his stuff with ABE. did a “ratings and review” overhaul. It hasn’t gone over too well with the community, but I am still working on it with them and I think it will get there eventually. tor has been clogged up by a botnet causing accessibility issues.
Got a tip from oldamsterdam that supertrips has been busted. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
09/11 – 09/18/2013
could not confirm ST bust. XXXXXXXXXXXXXXXXXXXX Got covered in poison oak trying to get a piece of trash out of a tree in a park nearby and have been moping. went on a first date with amelia from okc.
red pinged me and asked for meeting tomorrow.
09/19 – 09/25/2013
red got in a jam and needed $500k to get out. ultimately he convinced me to give it to him, but I got his ID first and had cimon send harry, his new soldier of fortune, to vancouver to get $800k in cash to cover it. red has been mainly out of communication, but i haven’t lost hope. Atlantis shut down. I was messaged by one of their team who said they shut down because of an FBI doc leaked to them detailing vulnerabilities in Tor.
XXXXXXXXXXXXXXXXXXXXXXX. spoke with inigo for a while about the book club and swapping roles with libertas. Had revelation about the need to eat well, get good sleep, and meditate so I can stay positive and productive.