"That was enough for a judge to grant the FBI a warrant and permission to secretly install what’s known as a pen/trap device, which allowed for the monitoring of Hammond’s Internet activity at the end of February 2012. That, coupled with the physical surveillance, allowed the agency to see when he was home. What they found correlated with his Tor usage—which allowed him to hide his IP address—and when “yohoho” was online, " [1]http://kernelmag.dailydot.com/issue-sections/headline-story/9895/jer emy-hammond-fbi-surveillance-bust/#sthash.qrw4hBVT.dpuf "Bello Coffee appears to be the cafe from which police say Ulbricht logged into the virtual private network (VPN) that he allegedly used as an extra layer of protection to access Tor and Silk Road. The prosecution says they have records from Google showing Ulbricht logging into his Gmail account from the Internet cafe on a regular basis, including on days when the VPN was used from the same cafe." oh its too funny.... so what jeremy says about his case is that they just did lots of different types of investigations and that is what got him - he also states that he should have been mobile - nomadic ... maybe solutions should be nomadic as well [f18dQhb0S7ks8dDMPbW2n0x6l2B9gXrN7sKj6v5dfb6W5vwkZs7fZjrnW2BpKgF2zlZNzW 8v-hnY1k1H6H0?si=5459291358625792&pi=3d19d64c-e483-4e44-c30a-1cd01a 33ad2b] On Wed, Mar 2, 2016 at 3:01 PM, Georgi Guninski <[2]guninski@guninski.com> wrote: On Tue, Mar 01, 2016 at 01:52:24PM -0500, grarpamp wrote: > > Don't know about courts, here is a reference from thereg: > > [3]http://www.theregister.co.uk/2012/03/07/lulzsec_takedown_analysis / > > That's not a quote from an original source. Neither is what it references... > [4]http://blog.erratasec.com/2012/03/notes-on-sabu-arrest.html > ... which goes to Fox, which probably goes to... and to... and to... > ... including possibly to stretching / ignoring the law, parallel > construction... > or to some other legit defendant screwup... at least until the quote > is validated. > > Have the actual chain of custodied investigative materials as to exactly > how the SilkRoad server was found come out yet? (And other similarly fishy > cases where nodes on supposedly strong overlay networks were found...) > Or is that still wrapped in grand jury, work product, state secret, > in camera, sealed... If you find out, let us know. This is the most "official" version for me for now. -- Cari Machet NYC 646-436-7795 [5]carimachet@gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet <[6]https://twitter.com/carimachet> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. References 1. http://kernelmag.dailydot.com/issue-sections/headline-story/9895/jeremy-hammond-fbi-surveillance-bust/#sthash.qrw4hBVT.dpuf 2. mailto:guninski@guninski.com 3. http://www.theregister.co.uk/2012/03/07/lulzsec_takedown_analysis/ 4. http://blog.erratasec.com/2012/03/notes-on-sabu-arrest.html 5. mailto:carimachet@gmail.com 6. https://twitter.com/carimachet