cypherpunks
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
April 2022
- 22 participants
- 545 discussions
In a world of spy vs spy, can cryptos that have a lot of
sponsors and influencer hype be good cryptos, or traps...
https://www.youtube.com/watch?v=pdwOXWmAs8Y
@nymproject
Listen in on the discussion on Bitcoin Privacy and Mixnet from
@BitcoinMagazine with our CEO @harryhalpin and @adam3us
https://blog.nymtech.net/nym-wallet-version-1-0-2-is-out-2432ef47fe0c
https://www.youtube.com/watch?v=yxltn2gE_go a16z dcg
nymtech.net
t.me/nymchan
1
0
16 Apr '22
The Failure Of Fiat Currencies & The Implications For Gold & Silver
https://www.goldmoney.com/research/goldmoney-insights/the-failure-of-fiat-c…
by Alasdair Macleod
This is the background text of my Keynote Speech given yesterday to
European Gold Forum yesterday, 13 April.
To explain why fiat currencies are failing I started by defining
money. I then described the relationship between fiat money and its
purchasing power, the role of bank credit, and the interests of
central banks.
Undoubtedly, the recent sanctions over Russia will have a catastrophic
effect for financialised currencies, possibly leading to the end of
fifty-one years of the dollar regime. Russia and China plan to escape
this fate for the rouble and yuan by tying their currencies to
commodities and production instead of collapsing financial assets. The
only way for those of us in the West to protect ourselves is with
physical gold, which over time is tied to commodity and energy prices.
What is money?
To understand why all fiat currency systems fail, we must start by
understanding what money is, and how it differs from other forms of
currency and credit. These are long-standing relationships which
transcend our times and have their origin in Roman law and the
practice of medieval merchants who evolved a lex mercatoria, which
extended money’s legal status to instruments that evolved out of
money, such as bills of exchange, cheques, and other securities for
money. And while as circulating media, historically currencies have
been almost indistinguishable from money proper, in the last century
issuers of currencies split them off from money so that they have
become pure fiat.
At the end of the day, what constitutes money has always been
determined by its users as the means of exchanging their production
for consumption in an economy based on the division of labour. Money
is the bridge between the two, and while over the millennia different
media of exchange have come and gone, only metallic money has survived
to be trusted. These are principally gold, silver, and copper. Today
the term usually refers to gold, which is still in government
reserves, as the only asset with no counterparty risk. Silver, which
as a monetary asset declined in importance as money after Germany
moved to a gold standard following the Franco-Prussian war, remains a
monetary metal, though with a gold to silver ratio currently over 70
times, it is not priced as such.
For historical reasons, the world’s monetary system evolved based on
English law. Britain, or more accurately England and Wales, still
respects Roman, or natural law with respect to money. To this day,
gold sovereign coins are legal tender. Strictly speaking, metallic
gold and silver are themselves credit, representing yet-to-be-spent
production. But uniquely, they are no one’s liability, unlike
banknotes and bank deposits. Metallic money therefore has this
exceptional status, and that fact alone means that it tends not to
circulate, in accordance with Gresham’s Law, so long as lesser forms
of credit are available.
Money shares with its currency and credit substitutes a unique
position in criminal law. If a thief steals money, he can be
apprehended and charged with theft along with any accomplices. But if
he passes the money on to another party who receives it in good faith
and is not aware that it is stolen, the original owner has no recourse
against the innocent receiver, or against anyone else who subsequently
comes into possession of the money. It is quite unlike any other form
of property, which despite passing into innocent hands, remains the
property of the original owner.
In law, cryptocurrencies and the mooted central bank digital
currencies are not money, money-substitutes, or currencies. Given that
a previous owner of stolen bitcoin sold on to a buyer unaware it was
criminally obtained can subsequently claim it, there is no clear title
without full provenance. In accordance with property law, the United
States has ruled that cryptocurrencies are property, reclaimable as
stolen items, differentiating cryptocurrencies from money and currency
proper. And we can expect similar rulings in other jurisdictions to
exclude cryptocurrencies from the legal status as money, whereas the
position of CBDCs in this regard has yet to be clarified. We can
therefore nail to the floor any claims that bitcoin or any other
cryptocurrency can possibly have the legal status required of money.
Under a proper gold standard, currency in the form of banknotes in
public circulation was freely exchangeable for gold coin. So long as
they were freely exchangeable, banknotes took on the exchange value of
gold, allowing for the credit standing of the issuer. One of the
issues Sir Isaac Newton considered as Master of the Royal Mint was to
what degree of backing a currency required to retain credibility as a
gold substitute. He concluded that that level should be 40%, though
Ludwig von Mises, the Austrian economist who was as sound a sound
money economist as it was possible to be appeared to be less
prescriptive on the subject.
The effect of a working gold standard is to ensure that money of the
people’s choice is properly represented in the monetary system. Both
currency and credit become bound to its virtues. The general level of
prices will fluctuate influenced by changes in the quantity of
currency and credit in circulation, but the discipline of the limits
of credit and currency creation brings prices back to a norm.
This discipline is disliked by governments who believe that money is
the responsibility of a government acting in the interests of the
people, and not of the people themselves. This was expressed in Georg
Knapp’s State Theory of Money, published in 1905 and became Germany’s
justification for paying for armaments by inflationary means ahead of
the First World War, and continuing to use currency debasement as the
principal means of government finance until the paper mark collapsed
in 1923.
Through an evolutionary process, modern governments first eroded then
took away from the public for itself the determination of what
constitutes money. The removal of all discipline of the gold standard
has allowed governments to inflate the quantities of currency and
credit as a means of transferring the public wealth to itself. As a
broad representation of this dilution, Figure 1 shows the growth of
broad dollar currency since the last vestige of a gold standard under
the Bretton Woods Agreement was suspended by President Nixon in August
1971.
>From that date, currency and bank credit have increased from $685
billion to $21.84 trillion, that is thirty-two times. And this
excludes an unknown increase in the quantity of dollars not in the US
financial system, commonly referred to as Eurodollars, which perhaps
account for several trillion more. Gold priced in fiat dollars has
risen from $35 when Bretton Woods was suspended, to $1970 currently. A
better way of expressing this debasement of the dollar is to say that
priced in gold, the dollar has lost 98.3% of its purchasing power (see
Figure 4 later in this article).
While it is a mistake to think of the relationship between the
quantity of currency and credit in circulation and the purchasing
power of the dollar as linear (as monetarists claim), not only has the
rate of debasement accelerated in recent years, but it has become
impossible for the destruction of purchasing power to be stopped. That
would require governments reneging on mandated welfare commitments and
for them to stand back from economic intervention. It would require
them to accept that the economy is not the government’s business, but
that of those who produce goods and services for the benefit of
others. The state’s economic role would have to be minimised.
This is not just a capitalistic plea. It has been confirmed as true
countless times through history. Capitalistic nations always do better
at creating personal wealth than socialistic ones. This is why the
Berlin Wall was demolished by angry crowds, finally driven to do so by
the failure of communism relative to capitalism just a stone’s throw
away. The relative performance of Hong Kong compared with China when
Mao Zedong was starving his masses on some sort of revolutionary whim,
also showed how the same ethnicity performed under socialism compared
with free markets.
The relationship between fiat currency and its purchasing power
One can see from the increase in the quantity of US dollar M3 currency
and credit and the fall in the purchasing power measured against gold
that the government’s monetary statistic does not square with the
market. Part of the reason is that government statistics do not
capture all the credit in an economy (only bank credit issued by
licenced banks is recorded), dollars created outside the system such
as Eurodollars are additional, and market prices fluctuate.
Monetarists make little or no allowance for these factors, claiming
that the purchasing power of a currency is inversely proportional to
its quantity. While there is much truth in this statement, it is only
suited for a proper gold-backed currency, when one community’s
relative valuations between currency and goods are brought into line
with the those of its neighbours through arbitrage, neutralising any
subjectivity of valuation.
The classical representation of the monetary theory of prices does not
apply in conditions whereby faith in an unbacked currency is paramount
in deciding its utility. A population which loses faith in its
government’s currency can reject it entirely despite changes in its
circulating quantity. This is what wipes out all fiat currencies
eventually, ensuring that if a currency is to survive it must
eventually return to a credible gold exchange standard.
The weakness of a fiat currency was famously demonstrated in Europe in
the 1920s when the Austrian crown and German paper mark were
destroyed. Following the Second World War, the Japanese military yen
suffered the same fate in Hong Kong, and Germany’s mark for a second
time in the mid 1940s. More recently, the Zimbabwean dollar and
Venezuelan bolivar have sunk to their value as wastepaper — and they
are not the only ones.
Ultimately it is the public which always determines the use value of a
circulating medium. Figure 2 below, of the oil price measured in
goldgrams, dollars, pounds, and euros shows that between 1950 and 1974
a gold standard even in the incomplete form that existed under the
Bretton Woods Agreement coincided with price stability.
It took just a few years from the ending of Bretton Woods for the
consequences of the loss of a gold anchor to materialise. Until then,
oil suppliers, principally Saudi Arabia and other OPEC members, had
faith in the dollar and other currencies. It was only when they
realised the implications of being paid in pure fiat that they
insisted on compensation for currency debasement. That they were free
to raise oil prices was the condition upon which the Saudis and the
rest of OPEC accepted payment solely in US dollars.
In the post-war years between 1950 and 1970, US broad money grew by
167%, yet the dollar price of oil was unchanged for all that time.
Similar price stability was shown in other commodities, clearly
demonstrating that the quantity of currency and credit in circulation
was not the sole determinant of the dollar’s purchasing power.
The role of bank credit
While the relationship between bank credit and the sum of the quantity
of currency and bank reserves varies, the larger quantity by far is
the quantity of bank credit. The behaviour of the banking cohort
therefore has the largest impact on the overall quantity of credit in
the economy.
Under the British gold standard of the nineteenth century, the
fluctuations in the willingness of banks to lend resulted in periodic
booms and slumps, so it is worthwhile examining this phenomenon, which
has become the excuse for state intervention in financial markets and
ultimately the abandonment of gold standards entirely.
Banks are dealers in credit, lending at a higher rate of interest than
they pay to depositors. They do not deploy their own money, except in
a general balance sheet sense. A bank’s own capital is the basis upon
which a bank can expand its credit.
The process of credit creation is widely misunderstood but is
essentially simple. If a bank agrees to lend money to a borrowing
customer, the loan appears as an asset on the bank’s balance sheet.
Through the process of double entry bookkeeping, this loan must
immediately have a balancing entry, crediting the borrower’s current
account. The customer is informed that the loan is agreed, and he can
draw down the funds credited to his current account from that moment.
No other bank, nor any other source of funding is involved. With
merely two ledger entries the bank’s balance sheet has expanded by the
amount of the loan. For a banker, the ability to create bank credit in
this way is, so long as the lending is prudent, an extremely
profitable business. The amount of credit outstanding can be many
multiples of the bank’s own capital. So, if a bank’s ratio of balance
sheet assets to equity is eight times, and the gross margin between
lending and deposits is 3%, then that becomes a gross return of 24% on
the bank’s own equity.
The restriction on a bank’s balance sheet leverage comes from two
considerations. There is lending risk itself, which will vary with
economic conditions, and depositor risk, which is the depositors’
collective faith in the bank’s financial condition. Depositor risk,
which can lead to depositors withdrawing their credit in the bank in
favour of currency or a deposit with another bank, can in turn
originate from a bank offering an interest rate below that of other
banks, or alternatively depositors concerned about the soundness of
the bank itself. It is the combination of lending and depositor risk
that determines a banker’s view on the maximum level of profits that
can be safely earned by dealing in credit.
An expansion in the quantity of credit in an economy stimulates
economic activity because businesses are tricked into thinking that
the extra money available is due to improved trading conditions.
Furthermore, the apparent improvement in trading conditions encourages
bankers to increase lending even further. A virtuous cycle of lending
and apparent economic improvement gets under way as the banking cohort
takes its average balance sheet assets to equity ratio from, say, five
to eight times, to perhaps ten or twelve. Competition for credit
business then persuades banks to cut their margins to attract new
business customers. Customers end up borrowing for borrowing’s sake,
initiating investment projects which would not normally be profitable.
Even under a gold standard lending exuberance begins to drive up
prices. Businesses find that their costs begin to rise, eating into
their profits. Keeping a close eye on lending risk, bankers are
acutely aware of deteriorating profit prospects for their borrowers
and therefore of an increasing lending risk. They then try to reduce
their asset to equity ratios. As a cohort whose members are driven by
the same considerations, banks begin to withdraw credit from the
economy, reversing the earlier stimulus and the economy enters a
slump.
This is a simplistic description of a regular cycle of fluctuating
bank credit, which historically varied approximately every ten years
or so, but could fluctuate between seven and twelve. Figure 3
illustrates how these fluctuations were reflected in the inflation
rate in nineteenth century Britain following the introduction of the
sovereign gold coin until just before the First World War.
Besides illustrating the regularity of the consequences of a cycle of
bank credit expansion and contraction marked by the inflationary
consequences, Figure 3 shows there is no correlation between the rate
of price inflation and wholesale borrowing costs. In other words,
modern central bank monetary policies which use interest rates to
control inflation are misconstrued. The effect was known and named
Gibson’s paradox by Keynes. But because there was no explanation for
it in Keynesian economics, it has been ignored ever since. Believing
that Gibson’s paradox could be ignored is central to central bank
policies aimed at taming the cycle of price inflation.
The interests of central banks
Notionally, central banks’ primary interest is to intervene in the
economy to promote maximum employment consistent with moderate price
inflation, targeted at 2% measured by the consumer price index. It is
a policy aimed at stimulating the economy but not overstimulating it.
We shall return to the fallacies involved in a moment.
In the second half of the nineteenth century, central bank
intervention started with the Bank of England assuming for itself the
role of lender of last resort in the interests of ensuring
economically destabilising bank crises were prevented. Intervention in
the form of buying commercial bank credit stopped there, with no
further interest rate manipulation or economic intervention.
The last true slump in America was in 1920-21. As it had always done
in the past the government ignored it in the sense that no
intervention or economic stimulus were provided, and the recovery was
rapid. It was following that slump that the problems started in the
form of a new federal banking system led by Benjamin Strong who firmly
believed in monetary stimulation. The Roaring Twenties followed on a
sea of expanding credit, which led to a stock market boom — a
financial bubble. But it was little more than an exaggerated cycle of
bank credit expansion, which when it ended collapsed Wall Street with
stock prices falling 89% measured by the Dow Jones Industrial Index.
Coupled with the boom in agricultural production exaggerated by
mechanisation, the depression that followed was particularly hard on
the large agricultural sector, undermining agriculture prices
worldwide until the Second World War.
It is a fact ignored by inflationists that first President Herbert
Hoover, and then Franklin Roosevelt extended the depression to the
longest on record by trying to stop it. They supported prices, which
meant products went unsold. And at the very beginning, by enacting the
Smoot Hawley Tariff Act they collapsed not only domestic demand but
all domestic production that relied on imported raw materials and
semi-manufactured products.
These disastrous policies were supported by a new breed of economist
epitomised by Keynes, who believed that capitalism was flawed and
required government intervention. But proto-Keynesian attempts to
stimulate the American economy out of the depression continually
failed. As late as 1940, eleven years after the Wall Street Crash, US
unemployment was still as high as 15%. What the economists in the
Keynesian camp ignored was the true cause of the Wall Street crash and
the subsequent depression, rooted in the credit inflation which drove
the Roaring Twenties. As we saw in Figure 3, it was no more than the
turning of the long-established repeating cycle of bank credit, this
time fuelled additionally by Benjamin Strong’s inflationary credit
expansion as Chairman of the new Fed. The cause of the depression was
not private enterprise, but government intervention.
It is still misread by the establishment to this day, with
universities pushing Keynesianism to the exclusion of classic
economics and common sense. Additionally, the statistics which have
become a religion for policymakers and everyone else are corrupted by
state interests. Soon after wages and pensions were indexed in 1980,
government statisticians at the Bureau of Labor Statistics began
working on how to reduce the impact on consumer prices. An independent
estimate of US consumer inflation put it at well over 15% recently,
when the official rate was 8%.
Particularly egregious is the state’s insistence that a target of 2%
inflation for consumer prices stimulates demand, when the transfer of
wealth suffered by savers, the low paid and pensioners deprived of
their inflation compensation at the hands of the BLS is glossed over.
So is the benefit to the government, the banks, and their favoured
borrowers from this wealth transfer.
The problem we now face in this fiat money environment is not only
that monetary policy has become corrupted by the state’s
self-interest, but that no one in charge of it appears to understand
money and credit. Technically, they may be very well qualified. But it
is now over fifty years since money was suspended from the monetary
system. Not only have policymakers ignored indicators such as Gibson’s
paradox. Not only do they believe their own statistics. And not only
do they think that debasing the currency is a good thing, but we find
that monetary policy committees would have us believe that money has
nothing to do with rising prices.
All this is facilitated by presenting inflation as rising prices, when
in fact it is declining purchasing power. Figure 4 shows how
purchasing power of currencies should be read.
Only now, it seems, we are aware that inflation of prices is not
transient. Referring to Figure 1, the M3 broad money supply measure
has almost tripled since Lehman failed, so there’s plenty of fuel
driving a lower purchasing power for the dollar yet. And as discussed
above, it is not just quantities of currency and credit we should be
watching, but changes in consumer behaviour and whether consumers tend
to dispose of currency liquidity in favour of goods.
The indications are that this is likely to happen, accelerated by
sanctions against Russia, and the threat that they will bring in a new
currency era, undermining the dollar’s global status. Alerted to
higher prices in the coming months, there is no doubt that there is an
increased level of consumer stockpiling, which put another way is the
disposal of personal liquidity before it buys less.
So far, the phases of currency evolution have been marked by the end
of the Bretton Woods Agreement in 1971. The start of the petrodollar
era in 1973 led to a second phase, the financialisation of the global
economy. And finally, from now the return to a commodity standard
brought about by sanctions against Russia is driving prices in the
Western alliance’s currencies higher, which means their purchasing
power is falling anew.
The faux pas over Russia
With respect to the evolution of money and credit, this brings us up
to date with current events. Before Russia invaded Ukraine and the
Western alliance imposed sanctions on Russia, we were already seeing
prices soaring, fuelled by the expansion of currency and credit in
recent years. Monetary planners blamed supply chain problems and covid
dislocations, both of which they believed would right themselves over
time. But the extent of these price rises had already exceeded their
expectations, and the sanctions against Russia have made the situation
even worse.
While America might feel some comfort that the security of its energy
supplies is unaffected, that is not the case for Europe. In recent
years Europe has been closing its fossil fuel production and Germany’s
zeal to go green has even extended to decommissioning nuclear plants.
It seems that going fossil-free is only within national borders,
increasing reliance on imported oil, gas, and coal. In Europe’s case,
the largest source of these imports by far is Russia.
Russia has responded by the Russian central bank announcing that it is
prepared to buy gold from domestic credit institutions, first at a
fixed price or 5,000 roubles per gramme, and then when the rouble
unexpectedly strengthened at a price to be agreed on a case-by-case
basis. The signal is clear: the Russian central bank understands that
gold plays an important role in price stability. At the same time, the
Kremlin announced that it would only sell oil and gas to unfriendly
nations (i.e. those imposing sanctions) in return for payments in
roubles.
The latter announcement was targeted primarily at EU nations and
amounts to an offer at reasonable prices in roubles, or for them to
bid up for supplies in euros or dollars from elsewhere. While the
price of oil shot up and has since retreated by a third, natural gas
prices are still close to their all-time highs. Despite the northern
hemisphere emerging from spring the cost of energy seems set to
continue to rise. The effect on the Eurozone economies is little short
of catastrophic.
While the rouble has now recovered all the fall following the
sanctions announcement, the euro is becoming a disaster. The ECB still
has a negative deposit rate and enormous losses on its extensive bond
portfolio from rapidly rising yields. The national central banks,
which are its shareholders also have losses which in nearly all cases
wipes out their equity (balance sheet equity being defined as the
difference between a bank’s assets and its liabilities — a difference
which should always be positive). Furthermore, these central banks as
the NCB’s shareholders make a recapitalisation of the whole euro
system a complex event, likely to question faith in the euro system.
As if that was not enough, the large commercial banks are extremely
highly leveraged, averaging over 20 times with Credit Agricole about
30 times. The whole system is riddled with bad and doubtful debts,
many of which are concealed within the TARGET2 cross-border settlement
system. We cannot believe any banking statistics. Unlike the US,
Eurozone banks have used the repo markets as a source of zero cost
liquidity, driving the market size to over €10 trillion. The sheer
size of this market, plus the reliance on bond investment for a
significant proportion of commercial bank assets means that an
increase in interest rates into positive territory risks destabilising
the whole system.
The ECB is sitting on interest rates to stop them rising and stands
ready to buy yet more members’ government bonds to stop yields rising
even more. But even Germany, which is the most conservative of the
member states, faces enormous price pressures, with producer prices of
industrial products officially increasing by 25.9% in the year to
March, 68% for energy, and 21% for intermediate goods.
There can be no doubt that markets will apply increasing pressure for
substantial rises in Eurozone bond yields, made significantly worse by
US sanctions policies against Russia. As an importer of commodities
and raw materials Japan is similarly afflicted. Both currencies are
illustrated in Figure 5.
The yen appears to be in the most immediate danger with its collapse
accelerating in recent weeks, but as both the Bank of Japan and the
ECB continue to resist rising bond yields, their currencies will
suffer even more. The Bank of Japan has been indulging in quantitative
easing since 2000 and has accumulated substantial quantities of
government and corporate bonds and even equities in ETFs. Already, the
BOJ is in negative equity due to falling bond prices. To prevent its
balance sheet from deteriorating even further, it has drawn a line in
the sand: the yield on the 10-year JGB will not be permitted to rise
above 0.25%. With commodity and energy prices soaring, it appears to
be only a matter of time before the BOJ is forced to give way,
triggering a banking crisis in its highly leveraged commercial banking
sector which like the Eurozone has asset to equity ratios exceeding 20
times.
It would appear therefore that the emerging order of events with
respect to currency crises is the yen collapses followed in short
order by the euro. The shock to the US banking system must be obvious.
That the US banks are considerably less geared than their Japanese and
euro system counterparts will not save them from global systemic risk
contamination.
Furthermore, with its large holdings of US Treasuries and agency debt,
current plans to run them off simply exposes the Fed to losses, which
will almost certainly require its recapitalisation. The yield on the
US 10-year Treasury Bond is soaring and given the consequences of
sanctions on global commodity prices, it has much further to go.
The end of the financial regime for currencies
>From London’s big bang in the mid-eighties, the major currencies,
particularly the US dollar and sterling became increasingly
financialised. It occurred at a time when production of consumer goods
migrated to Asia, particularly China. The entire focus of bank lending
and loan collateral moved towards financial assets and away from
production. And as interest rates declined, in general terms these
assets improved in value, offering greater security to lenders, and
reinforcing the trend.
This is now changing, with interest rates set to rise significantly,
bursting a financial bubble which has been inflating for decades.
While bond yields have started to rise, there is further for them to
go, undermining not just the collateral position, but government
finances as well. And further rises in bond yields will turn equity
markets into bear markets, potentially rivalling the 1929-1932
performance of the Dow Jones Industrial Index.
That being the case, the collapse already underway in the yen and the
euro will begin to undermine the dollar, not on the foreign exchanges,
but in terms of its purchasing power. We can be reasonably certain
that the Fed’s mandate will give preference to supporting asset prices
over stabilising the currency, until it is too late.
China and Russia appear to be deliberately isolating themselves from
this fate for their own currencies by increasing the importance of
commodities. It was noticeable how China began to aggressively
accumulate commodities, including grain stocks, almost immediately
after the Fed cut its funds rate to zero and instituted QE at $120
billion per month in March 2020. This sent a signal that the Chinese
leadership were and still are fully aware of the inflationary
implications of US monetary policy. Today China has stockpiled well
over half the world’s maize, rice, wheat and soybean stocks, securing
basics foodstuffs for 20% of the world’s population. As a subsequent
development, the war in Ukraine has ensured that global grain supplies
this year will be short, and sanctions against Russia have effectively
cut off her exports from the unfriendly nations. Together with
fertiliser shortages for the same reasons, not only will the world’s
crop yields fall below last year’s, but grain prices are sure to be
bid up against the poorer nations.
Russia has effectively tied the rouble to energy prices by insisting
roubles are used for payment, principally by the EU. Russia’s other
two large markets are China and India, from which she is accepting
yuan and rupees respectively. Putting sales to India to one side,
Russia is not only commoditising the rouble, but her largest trading
partner not just for energy but for all her other commodity exports is
China. And China is following similar monetary policies.
There are good reasons for it. The Western alliance is undermining
their own currencies, of that there can be no question. Financial
asset values will collapse as interest rates rise. Contrastingly, not
only is Russia’s trade surplus increasing, but the central bank has
begun to ease interest rates and exchange controls and will continue
to liberate her economy against a background of a strong currency. The
era of the commodity backed currency is arriving to replace the
financialised.
And lastly, we should refer to Figure 2, of the price of oil in
goldgrams. The link to commodity prices is gold. It is time to abandon
financial assets for their supposed investment returns and take a
stake in the new commoditised currencies. Gold is the link. Business
of all sorts, not just mining enterprises which accumulate cash
surpluses, would be well advised to question whether they should
retain deposits in the banks, or alternatively, gain the protection of
possessing some gold bullion vaulted independently from the banking
system.
1
0
16 Apr '22
"Punk-BatSoup-Stasi 2.0" <punks(a)tfwno.gf> wrote:
| It would be so amazing if the russians used their rudimentary nukes
on worthless scumbags like jim bell...and all the rest of US jewnazi
cunts.
I wonder if the word "JewNazi" can really be used together unless you
speak on the behalf of russian government. JewNazi is nowhere mentioned
in english dictionary and you using this shows you are spreading the
same russian's propaganda here.
you are a troll no one expect to see. kindly civilize your words before
speaking, this is your last warning.
Next time you shall receive a total ban from here.
regards,
Ministry Of State Security
3
2
https://www.wired.com/story/tracers-in-the-dark-welcome-to-video-crypto-ano…
Inside the Bitcoin Bust That Took Down the Web’s Biggest Child Abuse Site
They thought their payments were untraceable. They couldn’t have been
more wrong. The untold story of the case that shredded the myth of
Bitcoin’s anonymity.
An eye mischievously peeks through a Bitcoin B next to the words THE
CRYPTO TRAP.
ILLUSTRATION: MIKE McQUADE
Content Warning: The story told here includes references to suicide
and child abuse, though the abuse is not graphically described.
Early one fall morning in 2017, in a middle-class suburb on the
outskirts of Atlanta, Chris Janczewski stood alone inside the doorway
of a home he had not been invited to enter.
Moments earlier, armed Homeland Security Investigations agents in
ballistic vests had taken up positions around the tidy two-story brick
house, banged on the front door, and when a member of the family
living there opened it, swarmed inside. Janczewski, an Internal
Revenue Service criminal investigator, followed quietly behind. Now he
found himself in the entryway, in the eye of a storm of activity,
watching the agents search the premises and seize electronic devices.
This story is excerpted from the book Tracers in the Dark: The Global
Hunt for the Crime Lords of Cryptocurrency, available November 15,
2022, from Doubleday.
Buy this book at:
Amazon
Bookshop.org
Books-A-Million
Walmart
Apple Books
If you buy something using links in our stories, we may earn a
commission. This helps support our journalism. Learn more.
They separated the family, putting the father, an assistant principal
at the local high school and the target of their investigation, in one
room; his wife in another; the two kids into a third. An agent
switched on a TV and put on Mickey Mouse Clubhouse in an attempt to
distract the children from the invasion of their home and the
interrogation of their parents.
Janczewski had come along on this raid only as an observer, a visitor
flown in from Washington, DC, to watch and advise the local Homeland
Security team as it executed its warrant. But it had been Janczewski’s
investigation that brought the agents here, to this average-looking
house with its well-kept yard among all the average-looking houses
they could have been searching, anywhere in America. He had led them
there based on a strange, nascent form of evidence. Janczewski had
followed the links of Bitcoin’s blockchain, pulling on that chain
until it connected this ordinary home to an extraordinarily cruel
place on the internet—and then connected that place to hundreds more
men around the world. All complicit in the same massive network of
unspeakable abuse. All now on Janczewski’s long list of targets.
Over the previous few years, Janczewski, his partner Tigran Gambaryan,
and a small group of investigators at a growing roster of three-letter
American agencies had used this newfound technique, tracing a
cryptocurrency that once seemed untraceable, to crack one criminal
case after another on an unprecedented, epic scale. But those methods
had never led them to a case quite like this one, in which the fate of
so many people, victims and perpetrators alike, seemed to hang on the
findings of this novel form of forensics. That morning’s search in the
suburb near Atlanta was the first moment when those stakes became real
for Janczewski. It was, as he would later put it, “a proof of
concept.”
>From where Janczewski was positioned at the front of the house, he
could hear the Homeland Security agents speaking to the father, who
responded in a broken, resigned voice. In another room, he overheard
the agents questioning the man’s wife; she was answering that, yes,
she’d found certain images on her husband’s computer, but he’d told
her he had downloaded them by accident when he was pirating music. And
in the third room he could hear the two grade-school-age children—kids
about as old as Janczewski’s own—watching TV. They asked for a snack,
seemingly oblivious to the tragedy unfolding for their family.
Janczewski remembers the gravity of the moment hitting him: This was a
high school administrator, a husband and a father of two. Whether he
was guilty or innocent, the accusations this team of law enforcement
agents were leveling against him—their mere presence in his home—would
almost certainly ruin his life.
Janczewski thought again of the investigative method that had brought
them there like a digital divining rod, revealing a hidden layer of
illicit connections underlying the visible world. He hoped, not for
the last time, that it hadn’t led him astray.
on a summer’s day in London a few months earlier, a South Africa-born
tech entrepreneur named Jonathan Levin had walked into the unassuming
brick headquarters of the UK’s National Crime Agency—Britain’s
equivalent to the FBI—on the south bank of the Thames. A friendly
agent led him to the building’s second floor and through the office
kitchen, offering him a cup of tea. Levin accepted, as he always did
on visits to the NCA, leaving the tea bag in.
The two men sat, cups in hand, at the agent’s desk in a collection of
cubicles. Levin was there on a routine customer visit, to learn how
the agent and his colleagues were using the software built by the
company he’d cofounded. That company, Chainalysis, was the world’s
first tech firm to focus solely on a task that a few years earlier
might have sounded like an oxymoron: tracing cryptocurrency. The NCA
was one of dozens of law enforcement agencies around the world that
had learned to use Chainalysis’ software to turn the digital
underworld’s preferred means of exchange into its Achilles’ heel.
When Bitcoin first appeared in 2008, one fundamental promise of the
cryptocurrency was that it revealed only which coins reside at which
Bitcoin addresses—long, unique strings of letters and numbers—without
any identifying information about those coins’ owners. This layer of
obfuscation created the impression among many early adherents that
Bitcoin might be the fully anonymous internet cash long awaited by
libertarian cypherpunks and crypto-anarchists: a new financial
netherworld where digital briefcases full of unmarked bills could
change hands across the globe in an instant.
monero
The DOJ’s $3.6B Seizure Shows How Hard It Is to Launder Crypto
Andy Greenberg
lazarus
North Korean Hackers Stole Nearly $400M in Crypto Last Year
Andy Greenberg
cryptocurrency
The Feds Seized $1 Billion in Stolen Silk Road Bitcoins
Andy Greenberg
Satoshi Nakamoto, the mysterious inventor of Bitcoin, had gone so far
as to write that “participants can be anonymous” in an early email
describing the cryptocurrency. And thousands of users of dark-web
black markets like Silk Road had embraced Bitcoin as their central
payment mechanism. But the counterintuitive truth about Bitcoin, the
one upon which Chainalysis had built its business, was this: Every
Bitcoin payment is captured in its blockchain, a permanent,
unchangeable, and entirely public record of every transaction in the
Bitcoin network. The blockchain ensures that coins can’t be forged or
spent more than once. But it does so by making everyone in the Bitcoin
economy a witness to every transaction. Every criminal payment is, in
some sense, a smoking gun in broad daylight.
Within a few years of Bitcoin’s arrival, academic security
researchers—and then companies like Chainalysis—began to tear gaping
holes in the masks separating Bitcoin users’ addresses and their
real-world identities. They could follow bitcoins on the blockchain as
they moved from address to address until they reached one that could
be tied to a known identity. In some cases, an investigator could
learn someone’s Bitcoin addresses by transacting with them, the way an
undercover narcotics agent might conduct a buy-and-bust. In other
cases, they could trace a target’s coins to an account at a
cryptocurrency exchange where financial regulations required users to
prove their identity. A quick subpoena to the exchange from one of
Chainalysis’ customers in law enforcement was then enough to strip
away any illusion of Bitcoin’s anonymity.
Chainalysis had combined these techniques for de-anonymizing Bitcoin
users with methods that allowed it to “cluster” addresses, showing
that anywhere from dozens to millions of addresses sometimes belonged
to a single person or organization. When coins from two or more
addresses were spent in a single transaction, for instance, it
revealed that whoever created that “multi-input” transaction must have
control of both spender addresses, allowing Chainalysis to lump them
into a single identity. In other cases, Chainalysis and its users
could follow a “peel chain”—a process analogous to tracking a single
wad of cash as a user repeatedly pulled it out, peeled off a few
bills, and put it back in a different pocket. In those peel chains,
bitcoins would be moved out of one address as a fraction was paid to a
recipient and then the remainder returned to the spender at a “change”
address. Distinguishing those change addresses could allow an
investigator to follow a sum of money as it hopped from one address to
the next, charting its path through the noise of Bitcoin’s blockchain.
Thanks to tricks like these, Bitcoin had turned out to be practically
the opposite of untraceable: a kind of honeypot for crypto criminals
that had, for years, dutifully and unerasably recorded evidence of
their dirty deals. By 2017, agencies like the FBI, the Drug
Enforcement Agency, and the IRS’s Criminal Investigation division (or
IRS-CI) had traced Bitcoin transactions to carry out one investigative
coup after another, very often with the help of Chainalysis.
The cases had started small and then gained a furious momentum.
Investigators had traced the transactions of two corrupt federal
agents to show that, before the 2013 takedown of Silk Road, one had
stolen bitcoins from that dark-web market and another had sold law
enforcement intel to its creator, Ross Ulbricht. Next they tracked
down half a billion dollars of bitcoins stolen from the Mt. Gox
exchange and showed that the proceeds had been laundered by the
Russian administrator of another crypto exchange, BTC-e, eventually
locating the exchange’s servers in New Jersey. And finally, they
followed bitcoin trails to nail down the identity of the founder of
AlphaBay, a dark-web market that had grown to 10 times the size of
Silk Road. (In fact, even as Levin was sitting in London talking to
the NCA agent, a coalition of half a dozen law enforcement agencies
was converging in Bangkok to arrest AlphaBay’s creator.)
Levin was, as always, on the lookout for Chainalysis’ next big
investigation. After running through a few open cases with him, the
NCA agent mentioned an ominous site on the dark web that had recently
come onto the agency’s radar. It was called Welcome to Video.
He was taken aback by what he saw: An entire network of criminal
payments, all intended to be secret, was laid bare before him.
The NCA had stumbled across the site in the midst of a horrific case
involving an offender named Matthew Falder. An academic based in
Manchester, England, Falder would pose as a female artist and solicit
nude photos from strangers on the internet, then threaten to share
those images with family or friends unless the victims recorded
themselves carrying out increasingly demeaning and depraved acts.
Ultimately he’d force his victims to commit self-harm and even
sexually abuse others on camera. By the time he was arrested, he had
targeted 50 people, at least three of whom had attempted suicide.
On Falder’s computers, the NCA had found he was a registered user of
Welcome to Video, a criminal enterprise that, by its sheer scale, put
even Falder’s atrocities in the shade. This evidentiary lead had then
wended its way from the NCA’s child exploitation investigations team
to the computer crime team, including the cryptocurrency-focused agent
at whose desk Levin now sat. Welcome to Video, it seemed, was among
the rare sites that sold access to clips of child sexual abuse in
exchange for bitcoin. It was clear at a glance that its library of
images and videos was uncommonly large, and it was being accessed—and
frequently refreshed with brand-new material—by a sprawling user base
around the globe.
Sometimes known as “child pornography,” the class of imagery that was
trafficked on Welcome to Video has increasingly come to be called
“child sexual abuse material” by child advocates and law enforcement,
so as to strip away any doubt that it involves acts of violence
against kids. CSAM, as it is usually abbreviated, had for years
represented a massive undercurrent of the dark web, the collection of
thousands of websites protected by anonymity software like Tor and
I2P. Those anonymity tools, used by millions of people around the
world seeking to avoid online surveillance, had also come to serve as
the shadow infrastructure for an abhorrent network of abuse, which
very often foiled law enforcement’s attempts to identify CSAM sites’
visitors or administrators.
The NCA agent showed Levin a Bitcoin address that the agency had
determined was part of Welcome to Video’s financial network. Levin
suggested they load it in Chainalysis’ crypto-tracing software tool,
known as Reactor. He set down his cup of tea, pulled his chair up to
the agent’s laptop, and began charting out the site’s collection of
addresses on the Bitcoin blockchain, representing the wallets where
Welcome to Video had received payments from thousands of customers.
He was taken aback by what he saw: Many of this child abuse site’s
users—and, by all appearances, its administrators—had done almost
nothing to obscure their cryptocurrency trails. An entire network of
criminal payments, all intended to be secret, was laid bare before
him.
Over the years, Levin had watched as some dark-web operators wised up
to certain of his firm’s crypto-tracing tricks. They would push their
money through numerous intermediary addresses or “mixer” services
designed to throw off investigators, or use the cryptocurrency Monero,
designed to be far harder to track. But looking at the Welcome to
Video cluster in the NCA office that day, Levin could immediately see
that its users were far more naive. Many had simply purchased bitcoins
from cryptocurrency exchanges and then sent them directly from their
own wallets into Welcome to Video’s.
The contents of the website’s wallets, in turn, had been liquidated at
just a few exchanges—Bithumb and Coinone in South Korea, Huobi in
China—where they were converted back into traditional currency.
Someone seemed to be continually using large, multi-input transactions
to gather up the site’s funds and then cash them out. That made it
easy work for Reactor to instantly and automatically cluster thousands
of addresses, determining that they all belonged to a single
service—which Levin could now label in the software as Welcome to
Video. What’s more, Levin could see that the constellation of
exchanges surrounding and connected to that cluster likely held the
data necessary to identify a broad swath of the site’s anonymous
users—not simply who was cashing out bitcoins from the site, but who
was buying bitcoins to put into it. The blockchain links between
Welcome to Video and its customers were some of the most clearly
incriminating connections that Levin had ever witnessed.
These child sexual abuse consumers seemed to be wholly unprepared for
the modern state of financial forensics on the blockchain. By the
standards of the cat-and-mouse game Levin had played for years,
Welcome to Video was like a hapless rodent that had never encountered
a predator.
As he sat in front of the NCA agent’s laptop, it dawned on Levin,
perhaps more clearly than ever before, that he was living in a “golden
age” of cryptocurrency tracing—that blockchain investigators like
those at Chainalysis had gained a significant lead over those they
were targeting. “We’ve created something extremely powerful, and we’re
a step ahead of these types of operators,” he remembers thinking.
“You’ve got a heinous crime, a terrible thing happening in the world,
and in an instant our technology has broken through and revealed in
very clear logic who’s behind it.”
Seeing that someone was cashing out the majority of Welcome to Video’s
revenues through the two exchanges in South Korea, Levin could already
guess that the administrator was very likely located there. Many of
the site’s users seemed to be paying the site directly from the
addresses where they’d purchased the coins, on exchanges like Coinbase
and Circle, based in the United States. Taking down this global child
abuse network might only require getting another law enforcement
agency in either the US or Korea involved, one that could demand
identifying details from those exchanges. And Levin had just the
agency in mind.
“I have some people who would be interested,” he told his NCA host.
But first, as he prepared to leave, Levin silently memorized the first
five characters of the Welcome to Video address the agent had shown
him. Chainalysis’ Reactor software included a feature that could
autocomplete Bitcoin addresses based on their first few unique numbers
or letters. Five would be enough—a single short password to unlock the
living map of a global criminal conspiracy.
it was evening in Thailand when Levin spoke with Chris Janczewski and
Tigran Gambaryan. That night in early July 2017, the two IRS Criminal
Investigation special agents were sitting in Bangkok’s Suvarnabhumi
Airport, stewing over the frustration of being sidelined from the
biggest dark-web market takedown in history.
The IRS, by 2017, had come to possess some of the most adept
cryptocurrency tracers in the US government. It was Gambaryan, in
fact, who had traced the bitcoins of the two corrupt agents in the
Silk Road investigations and then cracked the BTC-e money laundering
case. Working with Levin, Gambaryan had even tracked down the AlphaBay
server, locating it at a data center in Lithuania.
Yet when Gambaryan and Janczewski had come to Bangkok for the arrest
of AlphaBay’s administrator, the French-Canadian Alexandre Cazes, they
had been largely excluded from the inner circle of DEA and FBI agents
who ran the operation. They hadn’t been invited to the scene of Cazes’
arrest, or even to the office where other agents and prosecutors
watched a video livestream of the takedown.
For Gambaryan and Janczewski, the story was utterly typical. IRS-CI
agents did shoe-leather detective work, carried guns, and made
arrests, just like their FBI and DEA counterparts. But because of the
IRS’s dowdy public image, they often found that fellow agents treated
them like accountants. “Don’t audit me,” their peers from other law
enforcement branches would joke when they were introduced in meetings.
Most IRS-CI agents had heard the line enough times that it warranted
an instant eye roll.
At loose ends in Bangkok, Gambaryan and Janczewski spent much of their
time idly contemplating what their next case should be, browsing
through Chainalysis’ blockchain-tracing software Reactor to brainstorm
ideas. Dark-web markets like AlphaBay seemed to have been reduced to a
shambles by the Thailand operation, and they’d take months or even
years to recover. The agents considered taking on a dark-web gambling
site. But illegal online casinos hardly seemed worth their attention.
On the day of their departure from Thailand, Gambaryan and Janczewski
arrived at the airport only to find that their flight to DC was badly
delayed. Stuck in the terminal with hours to kill, they sat half-awake
and bored, literally staring at the wall. To pass the hours, Gambaryan
decided to try calling Chainalysis’ Levin to discuss next cases. When
Levin picked up the phone, he had news to share. He’d been looking
into a website that didn’t fit among the IRS’s usual targets but that
he hoped they’d be willing to check out: Welcome to Video.
Child sexual exploitation cases had traditionally been the focus of
the FBI and Homeland Security Investigations, certainly not the IRS.
In part, that was because child sexual abuse images and videos were
most often shared without money changing hands, in what investigators
described as a “baseball card trading” system—which put them outside
the IRS’s domain. Welcome to Video was different. It had a money
trail, and it seemed to be a very clear one.
Soon after they arrived back in DC, Gambaryan and Janczewski enlisted
a technical analyst named Aaron Bice from a contract technology firm
called Excygent, with whom they’d investigated the crypto exchange
BTC-e. Together, they charted out Welcome to Video in Reactor and saw
what Levin had recognized right away: how glaringly it presented
itself as a target. Its entire financial anatomy was laid before them,
thousands of clustered bitcoin addresses, many with barely concealed
pay-ins and cash-outs at exchanges they knew they could squeeze for
identifying information. It did indeed look, as Levin said, like “a
slam dunk.” In short order, Janczewski brought the case to Zia
Faruqui, a federal prosecutor, who was instantly sold on the idea of
taking on Welcome to Video and formally opened an investigation.
Gambaryan, Janczewski, Bice, and Faruqui made an unlikely team to
focus on busting a massive child exploitation network. Janczewski was
a tall Midwestern agent with a square jaw, like a hybrid of Sam
Rockwell and Chris Evans, who wore horn-rimmed glasses when looking at
a computer screen. He’d been recruited to the DC computer crimes team
from the IRS office in Indiana after proving his mettle in a grab bag
of counterterrorism, drug trafficking, government corruption, and tax
evasion cases. Bice was an expert in data analysis and was, as
Janczewski described his computer skills, “part robot.” Faruqui was a
seasoned assistant US attorney with a long history of national
security and money laundering prosecutions. He had an almost manic
focus and intensity, spoke in a comically rapid patter, and, it seemed
to his colleagues, barely slept. And then there was Gambaryan, an
agent with buzzed hair and a trim beard who by 2017 had made a name
for himself as the IRS’s cryptocurrency whisperer and dark-web
specialist. Faruqui called him “Bitcoin Jesus.”
The team began to realize that, as simple as this “slam dunk” case had
seemed, it was actually overwhelming in its complexity.
Yet none of the four had ever worked a child sexual exploitation case.
They had no training in handling images and videos of child abuse,
whose mere possession, in the hands of normal Americans, represented a
felony. They had never even seen these sorts of radioactively
disturbing materials, and they had no emotional or psychological
preparation for the graphic nature of what they were about to be
exposed to.
Still, when the two agents showed Faruqui what they saw in the
blockchain, the prosecutor was undeterred by their collective
inexperience in the realm of child exploitation. As an attorney who
focused on money-laundering cases, he saw no reason why, with the
evidence of criminal payments Janczewski and Gambaryan had handed him,
they couldn’t approach Welcome to Video as, fundamentally, a financial
investigation.
“We’re going to treat this case like we would any other,” he said. “We
are going to investigate this by following the money.”
Janczewski remembers the blank shock he felt at the parade of
thumbnails alone, the way his brain almost refused to accept what it
was seeing.
Illustration: Party of One Studio
when Janczewski and Gambaryan first copied the unwieldy web address,
mt3plrzdiyqf6jim.onion, into their Tor browsers, they were greeted by
a bare-bones site with only the words “Welcome to video” and a login
prompt, a minimalism Janczewski compared to the Google homepage. They
each registered a username and password and entered.
Past that first greeting page, the site displayed a vast, seemingly
endless collection of video titles and thumbnails, arrayed in squares
of four stills per video, apparently chosen automatically from the
files’ frames. Those small images were a catalog of horrors: scene
after scene of children being sexually abused and raped.
The agents had steeled themselves to see these images, but they were
still unprepared for the reality. Janczewski remembers the blank shock
he felt at the parade of thumbnails alone, the way his brain almost
refused to accept what it was seeing. He found that the site had a
search page with the misspelled words “Serach videos” written at the
top of it. Below the search field, it listed popular keywords users
had entered. The most popular was an abbreviation for “one-year-old.”
The second most popular was an abbreviation for “two-year-old.”
Janczewski at first thought he must have misunderstood. He had
expected to see recordings of the sexual abuse of young teenagers, or
perhaps preteens. But as he scrolled, he found, with mounting
revulsion and sadness, that the site was heavily populated with videos
of abuse of toddlers and even infants.
“This is a thing, really? No,” Janczewski says, numbly recounting his
reactions as he first browsed the site. “Oh, there’s this many videos
on here? No. This can’t be real.”
The two agents knew that, at some point, they would have to actually
watch at least some of the advertised videos. But, mercifully, on
their first visits to the site they couldn’t access them; to do so,
they’d have to pay bitcoins to an address the site provided to each
registered user, where they could purchase “points” that could then be
traded for downloads. And since they weren’t undercover agents, they
didn’t have the authorization to buy those points—nor were they
particularly eager to.
At the bottom of several pages of the site was a copyright date: March
13, 2015. Welcome to Video had already been online for more than two
years. Even at a glance, it was clear that it had grown into one of
the biggest repositories of child sexual abuse videos that law
enforcement had ever encountered.
“You cannot let a child be raped while you go and try to take down a
server in South Korea.” Simply pulling the site offline couldn’t be
their first priority.
As Janczewski and Gambaryan analyzed the site’s mechanics, they saw
that users could obtain points not just by purchasing them but also by
uploading videos. The more those videos were subsequently downloaded
by other users, the more points they would earn. “Do not upload adult
porn,” the upload page instructed, the last two words highlighted in
red for emphasis. The page also warned that uploaded videos would be
checked for uniqueness; only new material would be accepted—a feature
that, to the agents, seemed expressly designed to encourage more abuse
of children.
The element of the site that Gambaryan found most unnerving of all,
though, was a chat page, where users could post comments and
reactions. It was filled with posts in all languages, offering a hint
at the international reach of the site’s network. Much of the
discussion struck Gambaryan as chillingly banal—the kind of casual
commentary one might find on an ordinary YouTube channel.
Gambaryan had hunted criminals of all stripes for years now, from
small-time fraudsters to corrupt federal law enforcement colleagues to
cybercriminal kingpins. He usually felt he could fundamentally
understand his targets. Sometimes, he’d even felt sympathy for them.
“I’ve known drug dealers who are probably better human beings than
some white-collar tax evaders,” he mused. “I could relate to some of
these criminals. Their motivation is just greed.”
But now he’d entered a world where people were committing atrocities
that he didn’t understand, driven by motivations that were entirely
inaccessible to him. After a childhood in war-torn Armenia and
post-Soviet Russia and a career delving into the criminal underworld,
he considered himself to be familiar with the worst that people were
capable of. Now he felt he had been naive: His first look at Welcome
to Video exposed and destroyed a hidden remnant of his idealism about
humanity. “It killed a little bit of me,” Gambaryan says.
as soon as they had seen firsthand what Welcome to Video truly
represented, Gambaryan and Janczewski understood that the case
warranted an urgency that went beyond that of even a normal dark-web
investigation. Every day the site spent online, it enabled more child
abuse.
Gambaryan and Janczewski knew their best leads still lay in the
blockchain. Crucially, the site didn’t seem to have any mechanism for
its customers to pull money out of their accounts. There was only an
address to which they could pay for credits on the site; there didn’t
even seem to be a moderator to ask for a refund. That meant that all
the money they could see flowing out of the site—more than $300,000
worth of bitcoins at the time of the transactions—would almost
certainly belong to the site’s administrators.
Gambaryan began reaching out to his contacts in the Bitcoin community,
looking for staff at exchanges who might know executives at the two
Korean exchanges, Bithumb and Coinone, into which most of Welcome to
Video’s money had been cashed out, as well as one US exchange that had
received a small fraction of the funds. He found that the mere mention
of child exploitation seemed to evaporate the cryptocurrency
industry’s usual resistance to government intervention. “As
libertarian as you want to be,” Gambaryan says, “this is where
everybody kind of drew the line.” Even before he sent a formal legal
request or subpoena, staff at all three exchanges were ready to help.
They promised to get him account details for the addresses he had
pulled from Reactor as soon as they could.
Gambaryan couldn’t help it: Sitting in front of his computer screen in
his DC cubicle, staring at the flaw he’d discovered, the agent started
to laugh.
In the meantime, Gambaryan continued to investigate the Welcome to
Video site itself. After registering an account on the site, he
thought to try a certain basic check of its security—a long shot, he
figured, but it wouldn’t cost anything. He right-clicked on the page
and chose “View page source” from the resulting menu. This would give
him a look at the site’s raw HTML before it was rendered by the Tor
Browser into a graphical web page. Looking at a massive block of code,
anyway, certainly beat staring at an infinite scroll of abject human
depravity.
He spotted what he was looking for almost instantly: an IP address. In
fact, to Gambaryan’s surprise, every thumbnail image on the site
seemed to display, within the site’s HTML, the IP address of the
server where it was physically hosted: 121.185.153.64. He copied those
11 digits into his computer’s command line and ran a basic traceroute
function, following its path across the internet back to the location
of that server.
Incredibly, the results showed that this computer wasn’t obscured by
Tor’s anonymizing network at all; Gambaryan was looking at the actual,
unprotected address of a Welcome to Video server. Confirming Levin’s
initial hunch, the site was hosted on a residential connection of an
internet service provider in South Korea, outside of Seoul.
Welcome to Video’s administrator seemed to have made a rookie mistake.
The site itself was hosted on Tor, but the thumbnail images it
assembled on its home-page appeared to be pulled from the same
computer without routing the connection through Tor, perhaps in a
misguided attempt to make the page load faster.
Gambaryan couldn’t help it: Sitting in front of his computer screen in
his DC cubicle, staring at the revealed location of a website
administrator whose arrest he could feel drawing closer, the agent
started to laugh.
Janczewski was at a firing range in Maryland, waiting his turn in a
marksmanship exercise, when he got an email from the American
cryptocurrency exchange his team had subpoenaed. It contained
identifying information on the suspected Welcome to Video
administrator who had cashed out the site’s earnings there.
The email’s attachments showed a middle-aged Korean man with an
address outside of Seoul—exactly corroborating the IP address
Gambaryan had found. The documents even included a photo of the man
holding up his ID, apparently to prove his identity to the American
exchange.
For a moment, Janczewski felt as though he were looking at Welcome to
Video’s administrator face-to-face. But he remembers thinking that
something was off: The man in the picture had noticeably dirty hands,
with soil under his fingernails. He looked more like a farm worker
than the hands-on-keyboard type he’d expected to be running a site on
the dark web.
Over the next days, as the other exchanges fulfilled their subpoenas,
the answer began to come into focus. One Korean exchange and then the
other sent Gambaryan documents on the men who controlled Welcome to
Video’s cash-out addresses. They named not just that one middle-aged
man but also a much younger male, 21 years old, named Son Jong-woo.
The two men listed the same address and shared the same family name.
Were they father and son?
The agents believed they were closing in on the site’s administrators.
But they had come to understand that merely taking down the site or
arresting its admins would hardly serve the interests of justice. The
constellation of Bitcoin addresses that Welcome to Video had generated
on the blockchain laid out a vast, bustling nexus of both consumers
and—far more importantly—producers of child sexual abuse materials.
By this point, Faruqui had brought on a team of other prosecutors to
help, including Lindsay Suttenberg, an assistant US attorney with
expertise in child exploitation cases. She pointed out that even
taking the site offline shouldn’t necessarily be their first priority.
“You cannot let a child be raped while you go and try to take down a
server in South Korea,” as Faruqui summed up her argument.
The team began to realize that, as simple as this “slam dunk” case had
seemed at first, after the easy identification of the site’s admins,
it was actually overwhelming in its complexity. They would need to
follow the money not to just one or two web administrators in Korea,
but also from that central point to hundreds of potential
suspects—both active abusers and their complicit audience of
enablers—around the entire globe.
Gambaryan’s right-click discovery of the site’s IP address and the
quick cooperation from crypto exchanges had been lucky breaks. The
real work still lay ahead.
just two weeks after Levin passed along his tip, the team of IRS-CI
agents and prosecutors knew almost exactly where Welcome to Video was
hosted. But they also knew they’d need help to go further. They had
neither connections to the Korean National Police Agency—which had a
reputation for formality and impenetrable bureaucracy—nor the
resources to arrest what could be hundreds of the site’s users, an
operation that would require far more personnel than the IRS could
muster.
Faruqui suggested they bring Homeland Security Investigations in on
the case, partnering with a certain field office across the country,
in Colorado Springs. He’d chosen that agency and its far-flung outpost
because of a specific agent there whom he’d worked with in the past,
an investigator named Thomas Tamsi. Faruqui and Tamsi had together
unraveled a North Korean arms trading operation a year earlier, one
that had sought to smuggle weapon components through South Korea and
China. In the course of that investigation, they’d flown to Seoul to
meet with the Korean National Police, where, after some introductions
by an HSI liaison there, they spent an evening with Korean officers
drinking and singing karaoke.
Others on the team couldn’t stand to hear Suttenberg describe the
videos. “They would ask me to stop talking, to put it in writing,” she
remembers, “and then they’d tell me that was even worse.”
At a particularly memorable point in the night, the Korean agents had
been ribbing the US team for their alleged hot-dog-and-hamburger
diets. One agent mentioned sannakji, a kind of small octopus that some
Koreans eat not merely raw but alive and writhing. Tamsi had gamely
responded that he’d try it.
A few minutes later, a couple of the Korean agents had brought to the
table a fist-sized, living octopus wrapped around a chopstick. Tamsi
put the entire squirming cephalopod in his mouth, chewed, and
swallowed, even as its tentacles wriggled between his lips and black
ink dripped from his face onto the table. “It was absolutely
horrible,” Tamsi says.
The Koreans found this hilarious. Tamsi gained near-legendary status
within certain circles of the Korean National Police, where he was
thereafter referred to as “Octopus Guy.”
Like most of their group, Tamsi had no experience in child
exploitation cases. He had never even worked on a cryptocurrency
investigation. But Faruqui insisted that to make inroads in Korea,
they needed Octopus Guy.
not long afterward, Tamsi and a fellow HSI agent authorized for
undercover operations flew to Washington, DC. They rented a conference
room in a hotel, and as Janczewski watched, the undercover agent
logged on to Welcome to Video, paid a sum of bitcoins, and began
downloading gigabytes of videos.
The strange choice of location—a hotel rather than a government
office—was designed to better mask the agent’s identity, in case
Welcome to Video could somehow track its users despite Tor’s
protection, and also so that, when it came time to prosecute, the DC
attorney’s office would be given jurisdiction. (The HSI agent did, at
least, use a Wi-Fi hot spot for his downloading, to avoid siphoning
the web’s most toxic content over the hotel’s network.)
As soon as the undercover agent’s work was complete, they shared the
files with Janczewski, who, along with Lindsay Suttenberg, would spend
the following weeks watching the videos, cataloging any clues they
could find to the identities of the people involved while also
saturating their minds with enough images of child abuse to fill
anyone’s nightmares for the rest of their lives.
Suttenberg’s years as a child exploitation prosecutor had left her
somewhat desensitized; she would find that other attorneys on the team
couldn’t stand to even hear her describe the contents of the videos,
much less watch them. “They would ask me to stop talking, to put it in
writing,” she remembers, “and then they’d tell me that was even
worse.”
Janczewski, as lead agent on the case, was tasked with putting
together an affidavit that would be used in whatever charging document
they might eventually bring to court. That meant watching dozens of
videos, looking for ones that would represent the most egregious
material on the site, and then writing technical descriptions of them
for a jury or judge. He compares the experience to a scene from A
Clockwork Orange: an unending montage from which he constantly wanted
to avert his gaze but was required not to.
He says watching those videos altered him, though in ways he could
only describe in the abstract—ways even he’s not sure he fully
understands. “There’s no going back,” Janczewski says, vaguely. “Once
you know what you know, you can’t unknow it. And everything that you
see in the future comes in through that prism of what you now know.”
in the first weeks of fall 2017, the team investigating the Welcome to
Video network began the painstaking process of tracing every possible
user of the site on the blockchain and sending out hundreds of legal
requests to exchanges around the world. To help analyze every tendril
of Welcome to Video’s cluster of Bitcoin addresses in Reactor, they
brought on a Chainalysis staffer named Aron Akbiyikian, an
Armenian-American former police officer from Fresno whom Gambaryan
knew from childhood and had recommended to Levin.
Akbiyikian’s job was to perform what he called a “cluster
audit”—squeezing every possible investigative clue out of the site’s
cryptocurrency trails. That meant manually tracing payments back from
one prior address to another, until he found the exchange where a
Welcome to Video customer had bought their bitcoins—and the
identifying information that the exchange likely possessed. Plenty of
Welcome to Video’s users had made his job easy. “It was a beautiful
clustering in Reactor,” Akbiyikian says. “It was just so clear.” In
some cases, he would trace back chains of payments through several
hops before the money arrived at an exchange. But for hundreds of
users, he says, he could see wallet addresses receive money from
exchanges and then put the funds directly into Welcome to Video’s
cluster, transactions that had created, as Akbiyikian put it, “leads
as clean as you could want.”
As responses from exchanges with those users’ identity information
began to pour in, the team started the process of assembling more
complete profiles of their targets. They began to collect the names,
faces, and photos of hundreds of men—they were almost all men—from all
walks of life, everywhere in the world. Their descriptions crossed
boundaries of race, age, class, and nationality. All these individuals
seemed to have in common was their gender and their financial
connection to a worldwide, hidden haven of child abuse.
By this time, the team felt they’d pinned down the site’s Korean
administrator with confidence. They’d gotten a search warrant for Son
Jong-woo’s Gmail accounts and many of his exchange records, and they
could see that he alone seemed to be receiving the cashed-out proceeds
from the site—not his father, who increasingly seemed to the
investigators like an unwitting participant, a man whose son had
hijacked his identity to create crypto-currency accounts. In Son
Jong-woo’s emails, they found photos of the younger man for the first
time—selfies he’d taken to show friends where he’d chipped a tooth in
a car accident, for instance. He was a thin, unremarkable-looking
young Korean man with wide-set eyes and a Beatles-esque mop-top of
black hair.
* For several reasons, we’ve chosen not to identify the defendants in
the Welcome to Video case by name, with the exception of the site's
administrator. In some instances, at the time of this writing, a
defendant’s case had not been fully adjudicated. In other cases, we
left out names at the request of prosecutors, to avoid providing
information that might inadvertently identify victims. We applied the
same standard to the rest, to avoid singling out some offenders while
others went unnamed.
But as their portrait of this administrator took shape, so too did the
profiles of the hundreds of other men who had used the site.* A few
immediately stuck out to the investigative team: One suspect, to the
dismay of Thomas Tamsi and his Homeland Security colleagues, was an
HSI agent in Texas. Another, they saw with a different sort of dread,
was the assistant principal of a high school in Georgia. The school
administrator had posted videos of himself on social media singing
duets, karaoke-style, with teenage girls from his school. The videos
might otherwise have been seen as innocent. But given what they knew
about the man’s Bitcoin payments, agents who had more experience with
child exploitation warned Janczewski that they might reflect a form of
grooming.
These were men in privileged positions of power, with potential access
to victims. The investigators could immediately see that, as they
suspected, they would need to arrest some of Welcome to Video’s users
as quickly as possible, even before they could arrange the takedown of
the site. Child exploitation experts had cautioned them that some
offenders had systems in place to warn others if law enforcement had
arrested or compromised them—code words or dead man’s switches that
sent out alerts if they were absent from their computer for a certain
period of time. Still, the Welcome to Video investigation team felt
they had little choice but to move quickly and take that risk.
Another suspect, around the same time, came onto their radar for a
different reason: He lived in Washington, DC. The man’s home, in fact,
was just down the street from the US attorneys’ office, near the
capital’s Gallery Place neighborhood. He happened to live in the very
same apartment building that one of the prosecutors had only recently
moved out of.
That location, they realized, might be useful to them. Janczewski and
Gambaryan could easily search the man’s home and his computers as a
test case. If that proved the man was a Welcome to Video customer,
they would be able to charge the entire case in DC’s judicial
district, overcoming a key legal hurdle.
As they dug deeper, though, they found that the man was a former
congressional staffer and held a high-level job at a prestigious
environmental organization. Would arresting or searching the home of a
target with that sort of profile cause him to make a public outcry,
sinking their case?
Just as they trained their sights on this suspect in their midst,
however, they found that he had gone strangely quiet on social media.
Someone on the team had the idea to pull his travel records. They
found that he had flown to the Philippines and was about to fly back
to DC via Detroit.
There were suitcases still not fully unpacked from the trip. The man
had ordered a pizza the night before, and part of it remained uneaten
on the table.
This discovery led the agents and prosecutors to two thoughts: First,
the Philippines was a notorious destination for sex tourism, often of
the kind that preyed on children—the HSI office in Manila constantly
had its hands full with child exploitation cases. Second, when the man
flew back to the US, Customs and Border Protection could legally
detain him and demand access to his devices to search for evidence—a
bizarre and controversial carve-out in Americans’ constitutional
protections that, in this case, might come in handy.
Would their DC-based suspect sound the alarm and tear the lid off
their investigation, just as it was getting started?
“Yes, this all had the potential to blow up our case,” Janczewski
says. “But we had to act.”
in late October, Customs and Border Protection at the Detroit
Metropolitan Airport stopped a man disembarking from a plane from the
Philippines on his way back to Washington, DC, asking him to step
aside and taking him into a secondary screening room. Despite his
vehement protests, the border agents insisted on taking his computer
and phone before allowing him to leave.
A few days later, on October 25, the prosecutor who had lived in the
same DC apartment block as the suspect saw an email from her old
building’s management; she’d remained on the distribution list despite
having moved out. The email noted that the parking garage ramp in an
alley at the back of the tower would be closed that morning. An
unnamed resident, it explained, had landed there after jumping to
their death from the balcony of their apartment.
The prosecutor put two and two together. The jumper was their Welcome
to Video “test case.” Janczewski and Gambaryan immediately drove to
the apartment tower and confirmed with management: The very first
target of their investigation had just killed himself.
Later that day the two IRS-CI agents returned to the scene of the
man’s death with a search warrant. They rode the elevator up to the
11th floor with the building’s manager, who was deeply puzzled as to
why the IRS was involved, but wordlessly unlocked the door for them.
Inside they found an upscale, moderately messy apartment with high
ceilings. There were suitcases still not fully unpacked from a trip.
The man had ordered a pizza the night before, and part of it remained
uneaten on the table.
Janczewski remembers feeling the somber stillness of the man’s empty
home as he imagined the desperate choice he had faced the night
before. Looking down 11 floors from the balcony, the agent could see
the spot in the alleyway below where the pavement had recently been
hosed off.
DC’s metropolitan police offered to show the agents a security cam
video of the man falling to his death. They politely declined. The
Customs and Border Protection office in Detroit, meanwhile, confirmed
that they had searched the computer seized from the man at the
airport—some of its storage was encrypted, but other parts were
not—and found child exploitation videos, along with surreptitiously
recorded videos of adult sex. Their decision to target the man had
served its purpose: Their test case had come back positive.
The prosecutors in DC paused their work briefly to meet and
acknowledge the surreal shock of the man’s death—their investigation
of a site hosted halfway around the world had already led someone to
kill themselves, just blocks away. “It was just a reminder of how
serious what we were investigating was,” Faruqui says. Still, the
group agreed: They couldn’t let the suicide distract them from their
work.
“We’ve got to focus on the victims here,” Faruqui remembers them
telling each other. “That provides clarity.”
Janczewski says he would have much preferred that the man be arrested
and charged. But he had, by this point, been forced to watch hour
after hour of child sexual abuse videos. He had put aside his emotions
early on in the case, and he had few sympathies to spare for an
apparent customer of those materials.
If he felt anything, he admits, it was relief, given the time that the
suicide had saved him: They still had hundreds more Welcome to Video
customers to pursue.
Janczewski spotted something that gave him a jolt: At one point in the
recording, the girl in the video had a red flannel shirt tied around
her waist.
Photograph: Tabitha Soren
Next on their list was the high school assistant principal. Just days
later, Janczewski flew down to Georgia and joined a tactical team of
HSI agents as they carried out their search. For the first time, he
came face-to-face with an alleged Welcome to Video client in his own
home.
In spite of his stoicism, this second test case affected Janczewski
more than the DC target had. The tidy, well-kept brick two-story
house. The parents questioned in separate rooms. The kids the same age
as Janczewski’s own, watching Mickey Mouse Clubhouse. As he stood in
the entryway of that house outside of Atlanta, the full toll of the
investigation hit him—the fact that every name on their list was a
person with human connections and, in many cases, a family. That even
accusing suspects of such an unforgivable crime had an irreversible
impact on their lives—that it was “a scarlet letter for someone that
just cannot be undone,” as he put it.
Janczewski and the HSI agents stayed at the home long enough to search
it, to question the man, and to seize his devices for analysis. In
addition to the evidence of the man’s payments for material on Welcome
to Video, Faruqui says that the man also admitted to “inappropriately
touching” students at his school. The man would later be charged with
sexual assault of minors—though he would plead not guilty.
For Janczewski, at least, any last doubts he had felt after his first
confrontation with a suspect based on cryptocurrency tracing alone
were dispelled in a matter of hours. “At the end of the day, I felt
more confident,” he says. “We were correct.” The blockchain had not
lied.
the team was steadily working their way through their short list of
high-priority Welcome to Video targets and test cases. But in December
2017, they came upon a different sort of lead—one that would scramble
their priorities yet again.
As they followed Welcome to Video’s financial trails, investigators
had been careful to record the full contents of the site’s chat page,
where users were still posting a steady stream of comments against a
backdrop of spam and trolling typical of any anonymous web forum. The
site seemed to be entirely unmoderated: There was not so much as an
admin email or help contact visible anywhere. But Janczewski began to
notice repeated messages from one account that seemed to offer the
closest thing the site had to that missing help-desk contact: “Contact
the admins,” the messages read, “if you want assistance in fixing
error.” It included an address on Torbox, a privacy-focused Tor-based
email service.
Was this an actual moderator on the site? Or even the administrator
himself—the owner of the site, who they now believed to be Son
Jong-woo?
As Janczewski tried to decipher who was behind those messages, he
checked the username before the “@” in the Torbox address, a
unique-looking string of six characters, to see if it matched a user
on Welcome to Video. Sure enough, he found that someone with that same
handle had uploaded more than a hundred videos.
On the wall, Janczewski noticed a poster he’d seen in the videos. He
momentarily felt as though he’d fallen through his own computer screen
into the set of a horror film.
Excygent’s Aaron Bice had the idea to run this Torbox email address
against a database seized from BTC-e during IRS-CI’s probe of the
crypto exchange, to search for clues in its treasure trove of criminal
underworld user data. Bice found a match: One account on BTC-e had
been registered with an email address that included that same unique
string of six characters. It wasn’t the Torbox email address, but one
from a different privacy-focused email service called Sigaint.
Janczewski knew that Torbox and Sigaint, both dark-web services
themselves, wouldn’t respond to legal requests for their users’
information. But the BTC-e data included IP addresses for 10 past
logins on the exchange by the same user. In nine out of 10, the IP
address was obscured with a VPN or Tor. But in one single visit to
BTC-e, the user had slipped up: They had left their actual home IP
address exposed. “That opened the whole door,” says Janczewski.
A traceroute showed that the IP address led to a residential internet
connection—not in Korea this time, but in Texas. Was there a second
Welcome to Video admin, this one based in the US? Janczewski and Bice
continued pulling the thread with increasing urgency, subpoenaing the
user’s account information from their internet service provider.
It was a Friday morning in early December, and Janczewski was drinking
coffee at his desk in the IRS-CI office when he got back the results
of that subpoena. He opened the email to find a name and a home
address. The man was an American in his thirties who lived in a town
outside of San Antonio—an unlikely collaborator for a 21-year-old
Korean managing a child exploitation site from 15 time zones away. But
the man’s employment, when Janczewski looked it up, was even more
jarring: He was another Department of Homeland Security staffer—this
time a Border Patrol agent.
Janczewski quickly began to assemble public information about the
agent from his social media accounts. He first found a Facebook page
for the man’s wife, and later an account for the man himself, with his
name written backwards to obscure it. Bice dug up his Amazon page,
too, where he seemed to have left reviews on hundreds of products and
put others on a “wish list”—including external storage devices that
could hold terabytes of videos, hidden cameras, and other cameras
designed to be snaked through small spaces, like holes drilled in a
wall.
Finally, with a creeping sense of dread, Janczewski saw that the
Border Patrol agent’s wife had a young daughter—and that he had
created a crowdfunding page on GoFundMe to raise money to legally
adopt the girl as his stepdaughter. “Fuck,” Janczewski thought to
himself. “Did he upload videos of the daughter?”
Janczewski looked back at Welcome to Video and saw that some of the
thumbnails of the videos uploaded by the person with this username
showed the sexual assault of a young girl about the daughter’s age. He
realized he now had a duty to separate this Border Patrol agent from
his victim as swiftly as possible.
For the next 10 days, Janczewski barely left his desk. He’d drive
home, eat dinner quickly with his family in their small Arlington,
Virginia, townhouse, then drive back to the office to work late, often
calling Bice and Faruqui well into the night.
“You are rarely in a situation where your time is zero-sum,” Faruqui
says. “Every moment we were not working on that case, a little girl
could be getting raped.”
Janczewski asked their undercover HSI agent to download the videos
that had been uploaded by the Texas agent, and he began the grueling
process of watching them one by one. A few videos in, he spotted
something that jolted the pattern-matching subroutines of his brain:
At one point in the recording, the girl in the video had a red flannel
shirt tied around her waist. He looked back at a photo of the girl
posted to the GoFundMe page and saw it: She was wearing the same red
flannel.
Was this Border Patrol agent an admin on Welcome to Video? A
moderator? It hardly mattered. Janczewski now believed he had found
the identity of an active child rapist who lived with his victim and
had been recording and sharing his crimes with thousands of other
users. The Texas man had earned a place at the very top of their
target list.
two weeks before Christmas, on the 10th day after he’d identified the
Border Patrol agent, Janczewski flew to southern Texas, along with
HSI’s Thomas Tamsi and his team’s child-exploitation-focused
prosecutor, Lindsay Suttenberg. On a cool, dry evening about a hundred
miles from the Mexican border, Tamsi and a group of Texas State Police
officers tailed their target as he drove home from work and pulled him
over. Together with a group of FBI agents, they took the man to a
nearby hotel for questioning.
The team’s initial list of high-priority suspects was finally checked
off. They could move on to their primary target: Son Jong-woo.
Meanwhile Janczewski and a group of local Homeland Security
investigators entered the man’s house and began to search for
evidence. The two-story home was run-down and messy, Janczewski
remembers—with the exception of the man’s well-organized home office
on the second floor, where they found his computer. Down the hall from
that office he came to the girl’s bedroom and immediately recognized
it as the scene where the videos uploaded by the man had been filmed.
On the wall he noticed a poster he’d seen in the recordings and
momentarily felt as though he’d fallen through the screen of his own
computer into the set of a horror film.
The IRS agent and prosecutor had brought with them an FBI interviewer
with child exploitation experience, who separated the girl from the
agents searching her home and took her to a safer location. The girl
eventually detailed to the interviewer the abuse she’d endured.
Shortly after the search of the Border Patrol agent’s home, Janczewski
arrived at the hotel room where other agents were questioning their
suspect. He saw, for the first time, the target of his last
week-and-a-half’s obsession. The man was tall and burly, still in his
uniform, with thinning hair. He initially refused to talk about any
physical abuse he might have committed, Janczewski says, but he
eventually confessed to possessing, sharing, and—finally—making child
sexual abuse videos.
Janczewski was struck by the dispassionate, almost clinical way the
man described his actions. He gave his interrogators the password to
his home computer, and an agent still at the house began pulling
evidence from the machine and sending it to Janczewski. It included
detailed spreadsheets of every child sexual exploitation video the man
had both amassed on his hard drives and, by all appearances, filmed in
his own home.
Another spreadsheet from the man’s computer contained a long list of
other Welcome to Video users’ login credentials. Under questioning,
the man explained his scheme: He would pose as an administrator in
messages he posted to the site’s chat page, then ask users who took
the bait to send him their usernames and passwords, which he’d use to
log in to their accounts and access their videos.
The Border Patrol agent had never been a Welcome to Video
administrator or moderator at all, only a particularly devious visitor
to the site, willing to scam his fellow users to support his own
appetites.
After an intense 10 days, they’d identified and arrested another
alleged child abuser, even rescued his victim. But as he flew back to
DC, Janczewski knew that Welcome to Video’s vastly larger network of
abuse remained very much intact. And until they took the site itself
down, it would continue to serve its videos—including the very ones
the Border Patrol agent had uploaded from his Texas home office—to an
anonymous throng of consumers just like him.
In early January of 2018, the DC investigators got word from Thomas
Tamsi that he and the team had arrested the other federal law
enforcement customer of Welcome to Video, the HSI agent who’d shown up
early in their blockchain tracing and subpoenas. Though seemingly
unconnected to the Border Patrol agent case, this second agent had
been based in Texas, too, less than an hour away from the home of the
man they had just raided.
Aside from that grim coincidence, the news of the HSI agent’s arrest
also meant that the DC team’s initial list of high-priority suspects
was finally checked off. They could move on to their primary target,
Son Jong-woo—and the Welcome to Video server under his control.
By February, that Korea-focused operation was coming together. Before
the Texas arrests, Janczewski, Gambaryan, Faruqui, and Tamsi had flown
to Seoul to meet the Korean National Police Agency. At a dinner set up
by the local HSI attaché, the director of the KNPA himself told
Tamsi—whose octopus-eating reputation preceded him—that the Americans
would have the help of his “best team.” Soon they had Son Jong-woo
under constant surveillance as he came and went from his home, an
apartment two and a half hours south of Seoul in the province of South
Chungcheong.
Now, in the depths of winter on the Korean peninsula, just a week
after Korea had hosted the Olympics in Pyeongchang, the American
agents arrived in Seoul again. Gambaryan had to stay behind for a
badly timed conference where the agency’s director had volunteered him
to speak. But Janczewski and Faruqui brought with them Aaron Bice and
Youli Lee, a Korean-American computer crime prosecutor on their team.
By this point, too, a growing international force had assembled around
the case. The UK’s National Crime Agency, which had launched its own
investigation into Welcome to Video just after Levin’s London visit,
sent two agents to Seoul, and the German Federal Police also joined
the coalition. It turned out the Germans had been pursuing the site’s
administrators independently, even before they’d learned about the
IRS’s investigation, but they’d never been able to secure the
cooperation of the Korean National Police.
At one point Faruqui remembers a German official asking him, as they
stood in the cold outside the Seoul hotel where they were staying, how
the Americans had gotten the Koreans on board so quickly. “Oh, Octopus
Guy,” Faruqui had explained. “You don’t have Octopus Guy. We have
Octopus Guy.”
for their first days in Seoul, the takedown team met repeatedly in the
Korean National Police offices to talk through their plans. Their
tracing of the IP address, based on Gambaryan’s fortuitous
right-click, seemed to show that the site’s server was located,
bizarrely, not in any web-hosting firm’s data center but in Son
Jong-woo’s own apartment—the evidentiary hub of a massive child sexual
abuse video network, sitting right in his home. That made things
simple: They would arrest him, tear his site offline, and use that
evidence to convict him. The team made a plan to grab him in his
apartment early on a Monday morning.
Then, on the Friday before, Janczewski got a cold. He spent much of
the weekend with prosecutor Youli Lee, dazedly wandering between
markets and stores in Seoul trying to pronounce gaseubgi, the Korean
word for humidifier. On Sunday evening, he took a dose of what he
hoped was a Korean equivalent of Nyquil—he couldn’t read the
label—with the intention of getting some sleep and recovering in time
to be at full strength for the arrest.
That’s when the KNPA alerted the team that the plan had changed: Son
had unexpectedly driven into Seoul for the weekend. Now the team
following his whereabouts believed he had begun a late-night drive
back to his home south of the city.
If the police could drive down to Son’s home that night and stake it
out, perhaps they could be there when he returned, ready to arrest him
at his door. That way he couldn’t destroy evidence or—another looming
concern after the death of their Washington, DC, target—commit
suicide. “We had to scramble,” Janczewski says.
That evening, Faruqui insisted the group put their hands in for a “Go
team!” cheer in their hotel lobby. Then he and Lee went up to their
rooms to go to bed. Janczewski—sick, half asleep from cold medication,
and clutching a pillow from his hotel room—walked out into the pouring
rain and got in a car with the HSI liaison to start the long
night-drive south. The HSI agent had begged Janczewski to take the
wheel of another car in the caravan, instead of an elderly Korean man
on his team who was, the agent said, a notoriously bad driver. But
Janczewski insisted he was far too medicated to navigate the dark, wet
highways of a country 7,000 miles from his home.
A few hours later, the team arrived in the parking lot of Son’s
apartment—a 10-story tower with a few small buildings on one side and
a vast, empty rural landscape on the other—to begin their long
stakeout in the rain. It was well past midnight when they saw Son’s
car finally pull into the parking garage of the complex.
A group of Korean agents had been waiting there for him. One
particularly imposing officer, whom the HSI agents referred to as
“Smiley”—because he never smiled—led a team of plainclothes police,
sidling into the elevator next to Son as he got inside. The agents
silently rode the elevator up to Son’s floor with him and stepped out
when he did. They arrested him, without resistance, just as he reached
his front door.
There were more than 250,000 videos on the server—more content by
volume than in any child sexual abuse materials case in history.
Throughout that arrest and the hours-long search of Son’s apartment
that followed, Janczewski and the other foreigners remained stuck in
their cars in the rain-drenched parking lot. Only the National Police
had authorization to lay hands on Son or enter his home. When the
Korean officers had the young Welcome to Video admin handcuffed, they
asked him if he’d consent to letting Janczewski or any of the
Americans come in as well. Son, unsurprisingly, said no. So Janczewski
was limited to a tour via FaceTime of the small and unremarkable
apartment that Son shared with his divorced father, the man with the
soiled hands in the first photo they’d examined, as the Korean agents
scoured it for evidence and seized his devices.
The Korean agent showing Janczewski around eventually pointed the
phone’s camera at a desktop computer on the floor of Son’s bedroom, a
cheap-looking tower-style PC with its case open on one side. The
computer’s guts revealed the hard drives that Son seemed to have
added, one by one, as each drive had filled up with terabytes of child
exploitation videos.
This was the Welcome to Video server.
“I was expecting some kind of glowing, ominous thing,” Janczewski
remembers, “and it was just this dumpy computer. It was just so
strange. This dumpy computer, that had caused so much havoc around the
world, was sitting on this kid’s floor.”
It was well past midnight when they saw Son’s car finally pull into
the parking garage of the complex.
ILLUSTRATION: Hokyoung Kim
on the return trip, Janczewski learned exactly why the HSI liaison had
wanted him to drive the other car. The elderly HSI staffer behind the
wheel of the other vehicle in their caravan was somehow so disoriented
after a sleepless night that he turned the wrong way down a highway
exit ramp, narrowly avoiding a high-speed collision and terrifying his
passenger, Aaron Bice.
After barely averting that disaster, as the sun began to rise and the
rain let up, the group pulled over at a truck stop along the highway
to have a breakfast of gas-station instant ramen. Janczewski, still
sick and utterly exhausted, was struck by how anticlimactic it all
seemed. His team had located and extricated both the administrator and
the machine at the epicenter of the malevolent global network they
were investigating. He had been anticipating this moment for more than
six months. But he felt no elation.
There were no high fives, no celebrations. The agents got back in
their cars to continue the long drive back to Seoul.
the next day, after finally getting some sleep, Janczewski began to
see past the dreariness of the previous night’s operation to
understand just how lucky they had been. He learned from the forensic
analysts who had examined Son Jong-woo’s computers that Son hadn’t
encrypted his server. Everything was there: all of Welcome to Video’s
content, its user database, and the wallets that had handled all of
its Bitcoin transactions.
The scale of the video collection, now that they could see it in its
entirety, was staggering. There were more than 250,000 videos on the
server, more content by volume than in any child sexual abuse
materials case in history. When they later shared the collection with
the National Center for Missing and Exploited Children (NCMEC), which
helps to catalog, identify, and take down CSAM materials across the
internet, NCMEC found that it had never seen 45 percent of the videos
before. Welcome to Video’s uniqueness check and incentive system for
fresh content appeared to have served its purpose, motivating
countless new cases of recorded child abuse.
The real prize for the investigators, however, was the site’s user
information. The Korean National Police gave the US team a copy of
Welcome to Video’s databases, and they got to work in a US Embassy
building in Seoul, reconstructing those data collections on their own
machine. Meanwhile, to avoid tipping off the site’s users to the
takedown, they quickly set up a look-alike Welcome to Video homepage
on their own server, using the private key pulled from the real server
to take over its dark-web address. When users visited the site, it now
displayed only a message that it was under construction and would be
back soon with “upgrades,” complete with typos to mimic Son’s shoddy
English spelling.
Bice spent two days with his head down, rebuilding the site’s user
data in a form they could easily query—with Janczewski and Faruqui
standing behind him, pestering him to see if the system was ready yet.
When Bice was finished, the US team had a full directory of the site’s
pseudonymous users, listed by their Welcome to Video usernames. They
could now link every Bitcoin payment they had initially mapped out on
the blockchain with those usernames and look up exactly what content
each of those users had uploaded or downloaded.
By the time the Americans were ready to go home at the end of
February, they had integrated the de-anonymized identities from their
cryptocurrency exchange subpoenas into a searchable database. It
mapped out the entire Welcome to Video network, complete with users’
real-world names, photos, and—for those who had paid into the site—the
record of those payments and the exact child abuse videos those
customers had bought access to. “You could see the whole picture,”
Janczewski says. “It was like a dictionary, thesaurus, and Wikipedia
all put together.”
They had, arrayed before them, the fully revealed structure of Welcome
to Video’s global child exploitation ring—hundreds of exquisitely
detailed profiles of consumers, collectors, sharers, producers, and
hands-on abusers alike. Now the final phase of the case could begin.
over the weeks that followed, Thomas Tamsi’s team in Colorado began
sending their Welcome to Video dossiers to HSI agents, local police,
and foreign police agencies around the world. These “targeting
packages” included descriptions of the suspects, the record of their
transactions, any other evidence they’d assembled about them,
and—given that they were being sent out to law enforcement agents who
had in some cases never been involved in a cryptocurrency-related
investigation—short primers on how Bitcoin and its blockchain worked.
There would be no coordinated, global takedown, no attempt to create
shock and awe with simultaneous arrests. The case’s defendants were
far too distributed and international for that kind of synchronized
operation. Instead, searches, arrests, and interviews began to roll
out across the globe—prioritized by those they’d learned might be
active abusers, then uploaders, and finally downloaders. Slowly, as
Welcome to Video’s users were confronted, one by one, the DC team
began to hear back about the results of their work—with harrowing,
sometimes gratifying, often tragic outcomes.
If not for cryptocurrency, and the years-long trap set by its
purported untraceability, most of the 337 pedophiles arrested in the
case—and their rescued victims—likely never would have been found.
A Kansas IT worker—whose arrest they’d prioritized when they found
that his wife ran an at-home daycare for infants and toddlers—had
deleted all of his child abuse videos from his computer before the
agents arrived. Prosecutors say he later confessed when remnants of
the files in the computer’s storage matched their records from the
Welcome to Video server.
When the agents came for a twentysomething man in New York, his father
blocked the door of their apartment, thinking at first that it was a
break-in. But when agents explained what their warrant was for, he
turned on his son and let them in. The son, it later turned out, had
sexually assaulted the daughter of a family friend and surreptitiously
recorded another young girl through her webcam, according to
prosecutors.
A repeat offender in Washington, DC, tried to commit suicide when the
HSI team entered his home; he hid in his bathroom and slit his own
throat. One of the arresting agents happened to have training as an
Army medic. He managed to slow the bleeding and keep the man alive.
They later found 450,000 hours of child abuse videos on his
computers—including recordings of the girl in Texas that had been
uploaded by the Border Patrol agent.
As months passed, the stories continued to pile up, a mix of the
sordid, sad, and appalling. An elderly man in his seventies who had
uploaded more than 80 child abuse videos. A man in his early twenties
with traumatic brain damage, whose medication had heightened his
sexual appetites and reduced his impulse control, and who was deemed
to have the same level of cognitive development as the preteens whose
abuse he’d watched. A New Jersey man whose communications, when they
were revealed through a search warrant, seemed to show his
negotiations to purchase a child for his own sexual exploitation.
Thomas Tamsi, as the lead HSI agent on the case, coordinated more
Welcome to Video arrests than anyone else—more than 50, by his
count—and was present for enough of them that they became a blur in
which only the most jarring moments remain distinct in his mind. The
mostly nude defendant he found in a basement. The suspect who told him
he had been involved in the Boy Scouts and that “children had always
been attracted” to him. Parents of victims who vehemently denied that
a family friend could have done the things Tamsi described, and whose
faces then went white as he slid printouts of redacted screenshots
across the table.
The cases spanned the globe, well beyond the US. Dozens of Welcome to
Video users were arrested in the Czech Republic, Spain, Brazil,
Ireland, France, and Canada. In England, where the entire case had
started with an agent’s tip to Levin, the country’s National Crime
Agency arrested one 26-year-old who had allegedly abused two
children—one of whom they found naked on a bed in his home—and
uploaded more than 6,000 files to the site. In another international
case, a Hungarian ambassador to Peru who downloaded content from
Welcome to Video was found to have more than 19,000 CSAM images on his
computer. He was quietly removed from his South American post, taken
to Hungary, and charged; he pleaded guilty.
For the DC team, many of the international cases fell into a kind of
black hole: One Saudi Arabian Welcome to Video user returned to his
home country and was captured by that country’s own law enforcement.
Faruqui and Janzewski say they never heard what happened to the man;
he was left to the Saudis’ own justice system, which sentences some
sex criminals to the Sharia-based punishments of whipping or even
beheading. When agents searched the car of a Chinese national living
near Seattle with a job at Amazon, they found a teddy bear, along with
a map of playgrounds in the area, despite the man having no children
of his own. The man subsequently fled to China and, as far as
prosecutors know, was never located again.
In each of the hundreds of intelligence packets that the team sent
out, Chris Janczewski’s contact was listed as the number to call with
any questions. Janczewski found himself explaining the blockchain and
its central role in the case again and again, to HSI agents and local
police officers around the US and the world, many of whom had never
even heard of Bitcoin or the dark web. “You get this lead sent to you
that says, ‘Here’s this website and this funny internet money,’”
Janczewski says, imagining how those on the receiving end of the
intelligence packets must have seen it, “and now you need to go arrest
this guy because some nerd accountant says so.”
In total, Janczewski traveled to six countries and spoke to more than
50 different people to help explain the case, often multiple times
each—including one US prosecutor and agent team with whom he had more
than 20 conversations. (“Some were a little more high maintenance,
respectfully, than others,” he says.) Bice, who oversaw the
reconstructed server data, says he spoke to even more agents and
officers—well over a hundred, by his count.
Ultimately, from the beginning of the case through the year and a half
that followed the server seizure, global law enforcement would arrest
no fewer than 337 people for their involvement with Welcome to Video.
They also removed 23 children from sexually exploitative situations.
Those 337 arrests still represented only a small fraction of Welcome
to Video’s total registered users. When the US team examined their
copy of the server data in Korea, they had found thousands of accounts
on the site. But the vast majority of them had never paid any bitcoins
into the site’s wallets. With no money to follow, the investigators’
trail usually went cold.
If not for cryptocurrency, in other words, and the years-long trap set
by its purported untraceability, the majority of the 337 pedophiles
arrested in the Welcome to Video case—and their rescued victims—likely
never would have been found.
The IRS and the US attorneys’ office in DC had taken an unprecedented
approach, treating a massive child sexual abuse materials case as a
financial investigation, and it had succeeded. Amidst all their
detective work, it had been Bitcoin’s blockchain that served as their
true lodestar, leading them through a landmark case. Without crypto
tracing, Faruqui argues, they would never have managed to map out and
identify so many of the site’s users.
“That was the only path through this darkness,” he says. “The darker
the darknet gets, the way that you shine the light is following the
money.”
Throwing money-laundering investigators into the deep end of the
internet’s CSAM cesspool, however, had taken its toll. Almost every
member of the team had children of their own, and almost all of them
say they became far more protective of those children as a result of
their work, to the degree that their trust in the people around their
family has been significantly damaged.
Janczewski, who after the case moved from DC to Grand Rapids,
Michigan, won’t let his children ride their bikes to school on their
own, as he himself did as a child. Even seemingly innocent
interactions—like another friendly parent who offers to watch his kids
at the other end of a swimming pool—now trigger red alerts in his
mind. Youli Lee says she won’t allow her 9- and 12-year-old children
to go into public bathrooms by themselves. Nor will she allow them to
play at a friend’s house unless the friend’s parents have top-secret
security clearances—an admittedly arbitrary rule, but one she says
ensures the parents have at least had a background check.
Faruqui says the 15 or so videos he watched as part of the
investigation remain “indelibly seared” into his brain and have
permanently heightened his sense of the dangers the world presents to
his children. He and his wife argue, he says, about his overprotective
tendencies. “You always see the worst of humanity, and so you’ve lost
perspective,” he quotes his wife telling him. “And I say, ‘You lack
perspective, because you don’t know what’s out there.’”
Gambaryan’s wife Yuki says the Welcome to Video case was the only time
her hard-shelled, Soviet-born husband ever discussed a case with her
and confessed that it had gotten to him—that he was struggling with it
emotionally. Gambaryan says that it was, in particular, the sheer
breadth of the cross-section of society that participated in the
site’s abuse that still haunts him.
“I saw that everybody’s capable of this: doctors, principals, law
enforcement,” he reflected. “Whatever you want to call it, evil, or
whatever it is: It’s in everybody—or it can be in anybody.”
in early July of 2020, Son Jong-woo walked out of a Seoul penitentiary
wearing a black long-sleeve T-shirt and carrying a green plastic bag
of his belongings. He had spent, due to Korea’s lenient laws on child
sexual abuse, just 18 months in prison.
US prosecutors, including Faruqui, had argued that he should be
extradited to the United States to face charges in the American
justice system, but Korea had denied their request. Welcome to Video’s
convicted creator and administrator was free.
The DC-based team that worked the Welcome to Video case remains deeply
dissatisfied with Son’s mystifyingly light sentence for running, by
some measures, the biggest child sexual abuse materials website in
history. But Janczewski says he’s comforted by the outcry in Korean
society over the case. The country’s social media exploded in anger
over Son’s quick release. More than 400,000 people signed a petition
to prevent the judge in the case from being considered for a seat on
the country’s supreme court. One Korean lawmaker put forward a bill to
allow appeals to extradition judgments, and the country’s National
Assembly introduced new legislation to strengthen punishments for
sexual abuse online and downloading child sexual abuse materials.
In the US, meanwhile, the ripple effects of the case continued for
years. Janczewski, Bice, and Suttenberg say that they still get calls
from law enforcement officials following the leads they assembled. On
the computer of the DC investigators’ very first test case—the former
congressional staffer who committed suicide—they found evidence in a
cryptocurrency exchange account that he’d also paid into a different
source of dark-web sexual materials. They followed those payments to a
site called Dark Scandals, which turned out to be a smaller but
equally disturbing dark-web repository of sexual abuse recordings.
Janczewski, Gambaryan, and the same group of prosecutors pursued that
Dark Scandals case in parallel with the tail end of the Welcome to
Video investigation,
similarly following blockchain leads to trace the site’s cash-outs.
With the help of the Dutch national police, they arrested the site’s
alleged administrator in the Netherlands, a man named Michael Rahim
Mohammad, who went by the online handle “Mr. Dark.” He faces criminal
charges in the US, and his case is ongoing.
>From the perspective of Welcome to Video’s money-laundering-focused
agents and prosecutors, perhaps the most interesting of the ripple
effects of the case stemmed from the fate of the HSI agent they had
arrested in Texas, just before their trip to carry out the site
takedown in Korea. The Texan man had taken a rare approach to his
legal defense: He’d pleaded guilty to possession of child sexual abuse
materials, but he also appealed his conviction. He argued that his
case should be thrown out because IRS agents had identified him by
tracking his Bitcoin payments—without a warrant—which he claimed
violated his Fourth Amendment right to privacy and represented an
unconstitutional “search.”
A panel of appellate judges considered the argument—and rejected it.
In a nine-page opinion, they explained their ruling, setting down a
precedent that spelled out in glaring terms exactly how far from
private they determined Bitcoin’s transactions to be.
“Every Bitcoin user has access to the public Bitcoin blockchain and
can see every Bitcoin address and its respective transfers. Due to
this publicity, it is possible to determine the identities of Bitcoin
address owners by analyzing the blockchain,” the ruling read. “There
is no intrusion into a constitutionally protected area because there
is no constitutional privacy interest in the information on the
blockchain.”
A search only requires a warrant, the American judicial system has
long held, if that search enters into a domain where the defendant has
a “reasonable expectation of privacy.” The judges’ ruling argued that
no such expectation should have existed here: The HSI agent wasn’t
caught in the Welcome to Video dragnet because IRS agents had violated
his privacy. He was caught, the judges concluded, because he had
mistakenly believed his Bitcoin transactions to have ever been private
in the first place.
Levin thought again of the blockchain’s bounty of evidence: the
countless cases left to crack, the millions of cryptocurrency
transactions eternally preserved in amber, and the golden age of
criminal forensics it presented to any investigator ready to excavate
them.
Photograph: Jooeun Bae
chris Janczewski says the full impact of the Welcome to Video case
didn’t hit him until the day in October 2019 when it was finally
announced in public and a seizure notice was posted to the site’s
home-page. That morning, Janczewski received an unexpected call from
the IRS commissioner himself, Charles Rettig.
Rettig told Janczewski that the case was “this generation’s Al
Capone”—perhaps the highest compliment that can be bestowed within
IRS-CI, where the story of Capone’s takedown for tax evasion holds
almost mythical status.
That same day, the Justice Department held a press conference to
announce the investigation’s results. US attorney Jessie Liu gave a
speech to a crowd of reporters about what the case represented—how
following the money had allowed agents to score a victory against “one
of the worst forms of evil imaginable.”
Chainalysis’ Jonathan Levin sat in the audience. Afterward, an IRS
official named Greg Monahan, who had supervised Gambaryan and
Janczewski, came over to thank Levin for his role in the case. It had
all started, after all, with Levin’s tip to two bored IRS agents in
the Bangkok airport. Monahan told Levin that it was the most important
investigation of his career, that he could now retire knowing he had
worked on something truly worthwhile.
Levin shook the IRS-CI supervisor’s hand. Neither he nor Monahan could
know, at that time, of the cases still to come: that IRS-CI and
Chainalysis would together go on to disrupt North Korean hackers,
terrorism financing campaigns, and two of the largest
bitcoin-laundering services in the world. Or that they would track
down close to 70,000 bitcoins stolen from the Silk Road and another
120,000 stolen from the exchange Bitfinex, totaling to a value of more
than $7.5 billion at today’s exchange rates, the largest financial
seizures—crypto or otherwise—in the Department of Justice’s history.
But as he answered Monahan, Levin thought again of the blockchain’s
bounty of evidence: the countless cases left to crack, the millions of
cryptocurrency transactions eternally preserved in amber, and the
golden age of criminal forensics it presented to any investigator
ready to excavate them.
“There’s so much more to do,” Levin said. “We’re just getting started.”
1
0
Hello:
Does anyone know what USDP means?
Reason, Peter know what DP means? Or, I heard they DP in Florida too. Peter
loves Florida, truth. Whatever the case may be, as a gay man myself, DP is
not hard to piece together.
Why USDP, Peter? I aim to take USDP away from Paxos. With the Moscow
Exchange matter, USDP is not cute ... Unacceptable. Peter, how could you?
Palintir Gotham may be next, Peter.
Gunnar
1
0
https://twitter.com/cryptome_org/status/1515029885147881476?s=21&t=fh0gHZSp…
The CIA accuses others of that which they themselves are doing.
2
1
A new Arm-based CPU with 128 cores will send a shiver down spines at Intel and AMD
by jim bell 15 Apr '22
by jim bell 15 Apr '22
15 Apr '22
A new Arm-based CPU with 128 cores will send a shiver down spines at Intel and AMD
https://technohoop.com/a-new-arm-based-cpu-with-128-cores-will-mail-a-shive…
"April 14, 2022 by Krihar
"Chinese bare metallic and server web hosting enterprise Alibaba Cloud is preparing to demo a new occasion form driven by tailor made Arm-based silicon.
"The new Yitian 710 server processor, initial unveiled in Oct, will underpin Elastic Compute Service (ECS) scenarios powered by a varying amount of vCPUs, just about every of which will be tied to a physical main.
"Underneath the preview program, which will past only two months and assist just 100 customers, a single configuration will be available, with 4 vCPUs, 16GB memory and 3Gbit/sec network bandwidth.
1
0
15 Apr '22
If a leftie is turned, is he/she a leftie anymore? Even of the horseshoe variety? Perhaps such a person has just become a RWNJ.
https://www.emptywheel.net/2022/04/15/matryoshka-doll-the-aleksandr-babakov…
RWNJ = Rightwing Nutjob. Like " Batshit Crazy ".
1
0
Re: [External Message Added] City of Miami public records request #22-459
by Gunnar Larson 15 Apr '22
by Gunnar Larson 15 Apr '22
15 Apr '22
Dear City of Miami:
Thank you for your email.
However, the PDF documents are not attached. The file still links to .psd
files.
City of Miami, on February 4, 2022 kindly submitted a records request for
any and all correspondence between the City of Miami concerning CityCoins,
MIA Coin and Stacks (STX). Additionally, any and all related correspondence
concerning CityCoins, MIA Coin, Stacks (STX), Digital World Acquisition
Corp and Harvard Management Company.
1. On March 7, 2022, Miami came to us noting 13,092 e-mail records
were returned for the above keywords.
2. Today on April 15, 2022 we have yet to receive the records in a
timely and reliable manner.
3. Given several factors of delay in receiving these records, we must
take our concern to The Financial Crimes Enforcement Network (FinCEN).
FinCEN is the bureau of the United States Department of the Treasury that
collects and analyzes information about financial transactions in order to
combat domestic and international money laundering, terrorist financing,
and other financial crimes.
Sending you the very best regards.
Thank you,
Gunnar Larson
--
*Gunnar Larson - xNY.io <http://www.xny.io/> - Bank.org <http://bank.org/>,
PBC*
MSc
<https://www.unic.ac.cy/blockchain/msc-digital-currency/?utm_source=Google&u…>
-
Digital Currency
MBA
<https://www.unic.ac.cy/business-administration-entrepreneurship-and-innovat…>
- Entrepreneurship
and Innovation (ip)
G(a)xNY.io
+1-646-454-9107
New York, New York 10001
On Fri, Apr 15, 2022, 10:30 AM PublicRecords(a)miamigov.com <
support(a)nextrequest.com> wrote:
> -- Attach a non-image file and/or reply ABOVE THIS LINE with a message,
> and it will be sent to staff on this request. --
> City of Miami Public Records
> A message was sent to you regarding record request #22-459:
> Good morning Mr. Larson, Attached please find all the records produced
> from the revised IT search. The records have been converted to pdf format.
> Thank you, Anthony Brdar, Paralegal [A picture containing text, coin
> Description automatically generated] City of Miami Office of the City
> Attorney Telephone: 305-416-1885 Facsimile: 305-400-5071 E-mail:
> abrdar(a)miamigov.com Disclaimer: This e-mail is intended only for the
> individual(s) or entity(s) named within the message. This e-mail might
> contain legally privileged and confidential information. If you properly
> received this e-mail as a client or retained expert, please hold it in
> confidence to protect the attorney-client or work product privileges.
> Should the intended recipient forward or disclose this message to another
> person or party, that action could constitute a waiver of the
> attorney-client privilege. If the reader of this message is not the
> intended recipient, or the agent responsible to deliver it to the intended
> recipient, you are hereby notified that any review, dissemination,
> distribution or copying of this communication is prohibited by the sender
> and to do so might constitute a violation of the Electronic Communications
> Privacy Act, 18 U.S.C. section 2510-2521. If this communication was
> received in error we apologize for the intrusion. Please notify us by reply
> e-mail and delete the original message. Nothing in this e-mail message
> shall, in and of itself, create an attorney-client relationship with the
> sender. Under Florida law, e-mail addresses are public records. If you do
> not want your e-mail address released in response to a public records
> request, do not send electronic mail to this entity. Instead, contact this
> office by phone or in writing. Please consider the environment before
> printing this e-mail.[cid:image002.png@01D850B2.6E5A92E0]
>
> View Request 22-459 <https://miami.nextrequest.com/requests/22-459>
> https://miami.nextrequest.com/requests/22-459
>
> <https://www.nextrequest.com/>
>
> The All in One Records Requests Platform
>
> *Questions about your request?* Reply to this email or sign in to contact
> staff at City of Miami.
>
> *Technical support:* See our help page
> <https://help.nextrequest.com/knowledge/requester-resources>
>
> * Too many emails? * Change your email settings here
> <https://miami.nextrequest.com/settings>
>
>
1
0
15 Apr '22
Moscow Stock Exchange Index Is Slumping Toward Its Invasion Low
<https://wallstreetonparade.com/2022/04/moscow-stock-exchange-index-is-slump…>
By Pam Martens and Russ Martens
<https://wallstreetonparade.com/about-3/about/>: April 14, 2022 ~
The Moscow Stock Exchange Index, known as MOEX, tanked 4.9 percent on
Thursday to close at 2,404.73. The Index is now down 36.5 percent
year-to-date.
The stock exchange had shuttered stock trading after the trading session on
February 25, 2022, the day after the Russian military invaded Ukraine. The
Moscow Stock Exchange did not reopen for stock trading until March 24.
The Russian government had previously announced on March 1 that its Finance
Ministry would use up to $10.3 billion from the National Wealth Fund to
prop up share prices of Russian companies by buying up shares on the
exchange. Those funds would appear to be running out as the MOEX had a
rough tumble on Thursday and closed near the lows of the day.
1
0