Monday, June 29, 2015

Updated: Canadian Intelligence Corruption




















UPDATED: CANADIAN INTELLIGENCE CORRUPTION

CANADIAN INTELLIGENCE USED ROSS ULBRICHT AS AN ATM MACHINE

After the failed assassination on my family and I around the end of March 2013 in WHITE ROCK we noticed the good CANADIAN INTELLIGENCE agents survailence of us intensified and the bad CANADIAN INTELLIGENCE agents survailence of us decreased considerably. The bad agents would confront us in descrete locations and try to start confrontation with us and they were targeting our children more and the good agents would confront us in public locations and they were more friendly towards us, another confusing contrast which shows there were different groups of agents acting independantly from one another. Follow the money.

ROSS ULBRICHTS SILK ROAD LOGS

XXX = REDACTED

Published by Andy Greenberg
A log of daily activities taken from the laptop of Ross Ulbricht at the time of his arrest in October, 2013



03/20/2013
someone posing as me managed to con 38 vendors out of 2 btc each with a fake message about a new silk road posted about cartel formation and not mitigating vendor round table leaks. worked on database error handling in CI

03/21/2013
main server was ddosed and taken offline by host met with person in tor irc who gave me info on having custom hs guards buying up servers to turn into hidden service guards

03/22/2013
deployed 2 guards on forum adjusted check_deposit cron to look further back to catch txns that died with an error

03/23/2013
bought a couple of more servers from new hosts organized local files stripped out srsec db naming functions introduced at least two bugs doing this

03/24/2013
been slowly raising the cost of hedging orgainzed local files and notes

03/25/2013
server was ddosed, meaning someone knew the real IP. I assumed they obtained it by becoming a guard node. So, I migrated to a new server and set up private guard nodes. There was significant downtime and someone has mentioned that they discovered the IP via a leak from lighttpd.

03/26/2013
private guard nodes are working ok. still buying more servers so I can set up a more modular and redundant server cluster. redid login page.

03/27/2013
set up servers

03/28/2013
being blackmailed with user info. talking with large distributor (hell’s angels).

03/29/2013
commissioned hit on blackmailer with angels

04/01/2013
got word that blackmailer was excuted created file upload script started to fix problem with bond refunds over 3 months old

04/02/2013
got death threat from someone (DeathFromAbove) XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX. messaged googleyed about it. goog says he doesn’t know. user is prolly friend of XXXXXXXXXXXX who he confided his plan to. applied fix to bond refund problem stopped rounding account balance display

04/03/2013
spam scams have been gaining tracktion. limited namespace and locked current accounts. lots of delayed withdrawals. transactions taking a long time to be accepted into blockchain. Wallet was funded with single large transaction, so each subsequent transaction is requiring change to be verified. lesson: wallets must be funded in small chunks.got pidgin chat working with inigo and mg

04/04/2013
withdrawals all caught up made a sign error when fixing the bond refund bug, so several vendors had very negative accounts. switched to direct connect for bitcoin instead of over ssh port forward received visual confirmation of blackmailers execution

04/05/2013
a distributor of googleyed is publishing buyer info mapped out the ordering process on the wiki. gave angels access to chat server

04/06/2013
made sure backup crons are working gave angels go ahead to find tony76 cleaned up unused libraries on server added to forbidden username list to cover I l scam

04/07/2013
moved storage wallet to local machine refactored mm page

04/08/2013
sent payment to angels for hit on tony76 and his 3 associates began setting up hecho as standby very high load (300/16), took site offline and refactored main and category pages to be more efficient

04/09/2013
problem with load was that APC was set to only cache up to 32M of data. Changed to 5G and load is down to around 5/16. ssbd considering joining my staff transferring standby data to hecho standby server

04/10/2013
some vendors using the hedge in a falling market to profit off of me by buying from themselves. turned of access log pruning so I can investigate later. market crashed today. being blackmailed again. someone says they have my ID, but hasn’t proven it.

04/11/2013
set up tor relays asked scout to go through all images on site looking for quickbuy scam remnants cimon told me of a possible ddos attack through tor and how to mitigate against it.guy blackmailing saying he has my id is bogus

04/12/2013
removed last remnance of quickbuy scam implemented new error controller rewrote user page

04/13/2013
inigo is in the hospital, so I covered his shift today. Zeroed everything and made changes to the site in about 5 hours

04/14/2013
did support. inigo returned.started rewritting orders-> buyer_cancel, been getting error reports about it.

04/15/2013
day off

04/16/2013
rewrote buyer_cancel

04/17/2013
rewrote settings view

04/18/2013
modified PIN reset system

04/19/2013
added blockchain.info as xrate source and modified update_xrate to use both and check for discrepancies and log.modified PIN reset system

04/20/2013
migrated to different host because current host would not connect to guards. Bandwidth limited and site very slow after migration.

04/21 – 04/30/2013
market and forums under sever DoS attack. Gave 10k btc ransom but attack continued. Gave smed server access. Switched to nginx on web/db server, added nginx reverse proxy running tor hs. reconfiged everything and eventually was able to absorb attack.

05/01/2013
Symm starts working support today. Scout takes over forum support.

05/02/2013
Attack continues. No word from attacker. Site is open, but occasionally tor crashes and has to be restarted.

05/03/2013
helping smed fight off attacker. site is mostly down. I’m sick.Leaked IP of webserver to public and had to redeploy/shred promoted gramgreen to mod, now named libertas

05/04/2013
attacker agreed to stop if I give him the first $100k of revenue and $50k per week thereafter. He stopped, but there appears to be another DoS attack still persisting.

05/05/2013
Attack is fully stopped. regrouping and prioritizing next actions.

05/06/2013
working with smed to put up more defenses against attack

05/07/2013
paid $100k to attacker

05/08/2013
reconfigured nginx to not time out. almost all errors have disappeared.

05/10/2013
started buying servers for intro/guard nodes

05/11/2012
still buying servers

05/13/2013
helping catch up support smed demo’ed multi address scheme for the forum

05/15/2013
more servers

05/22/2013
paid the attacker $50k

05/26/2013
tried moving forum to multi .onion config, but leaked ip twice. Had to change servers, forum was down for a couple of days.

05/28/2013
finished rewritting silkroad.php controller

05/29/2013
rewrote orders page paid attacker $50k weekly ransom $2M was stolen from my mtgox account by DEA added smed to payroll rewrote cart page

05/30/2013
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

05/31/2013
$50k xferred to cimon

06/01/2013
someone claiming to be LE trying to infiltrate forum mods

06/02/2013
loaning $500k to r&w to start vending on SR.

06/03/2013
put cimon in charge of LE counter intel

06/04/2013
rewrote reso center

06/05/2013 – 09/11/2013
Haven’t been logging. XXXXXXXXXXXXXXXXXXXXXXXXXXX did an interview with andy greenberg from forbes where i said i wasn’t the original DPR, went over well with community. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX r&w flaked out and disappeared with my 1/2 mil. smed has been working hard to develop a monitoring system for the SR infrastructure, but hasn’t produced much in actual results. similarly cimon has been working on the mining and gambling projects, but no results forthcoming. created Anonymous Bitcoin Exchange (ABE) and have been trying to recruit tellers. the vendor “gold” is my best lead at the moment. nod is an H dealer on SR who says he has world class it skills and I am giving him a chance to show his stuff with ABE. did a “ratings and review” overhaul. It hasn’t gone over too well with the community, but I am still working on it with them and I think it will get there eventually. tor has been clogged up by a botnet causing accessibility issues.

09/12/2013
Got a tip from oldamsterdam that supertrips has been busted. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

09/13/2013
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

09/11 – 09/18/2013
could not confirm ST bust. XXXXXXXXXXXXXXXXXXXX Got covered in poison oak trying to get a piece of trash out of a tree in a park nearby and have been moping. went on a first date with amelia from okc.

09/19/2013
red pinged me and asked for meeting tomorrow.

09/19 – 09/25/2013
red got in a jam and needed $500k to get out. ultimately he convinced me to give it to him, but I got his ID first and had cimon send harry, his new soldier of fortune, to vancouver to get $800k in cash to cover it. red has been mainly out of communication, but i haven’t lost hope. Atlantis shut down. I was messaged by one of their team who said they shut down because of an FBI doc leaked to them detailing vulnerabilities in Tor.

09/30/2013
XXXXXXXXXXXXXXXXXXXXXXX. spoke with inigo for a while about the book club and swapping roles with libertas. Had revelation about the need to eat well, get good sleep, and meditate so I can stay positive and productive.

http://www.wired.com/2015/01/heres-secret-silk-road-journal-laptop-ross-ulbricht

PREVIOUS ARTICLE:  CANADIAN GOVERNMENT CORRUPTION - ASSASSINATION AND EXTORTION

No comments:

Post a Comment