Silk Road’s “The Armory” Terminated

Bitcoin mentioned around Reddit: The U.S. Army Reserve armory in Worcester, Massachusetts was broken into Saturday night and more than a dozen guns were stolen /r/news

Bitcoin mentioned around Reddit: The U.S. Army Reserve armory in Worcester, Massachusetts was broken into Saturday night and more than a dozen guns were stolen /news submitted by BitcoinAllBot to BitcoinAll [link] [comments]

Links for PMC's new and old.

With the .12 patch looming, and new players joining all the time, I thought I would create a post containing all the best and most relevant links to websites to aide new and old players alike. Below you will find a comprehensive list of the most useful pages I have found so far. Hope this is helpful, if you think it is, feel free to save the thread and share it to any new threads that pop up with titles like ‘New player, how do I find this key/exit’ or ‘New player, what mods can I use for this gun’, etc. If it gets enough upvotes and people think it is a good resource, I will keep it updated. Enjoy :D

WEAPON MODDING

This is a really handy resource as far as an ''outdated'' page for creating weapon builds from EFTDB. Select weapon at top, then select a mod for each slot. At the bottom of the page it will show you where you can buy the mods you selected and a rough price [actual price depends on various factors], along with the trader level required.
https://www.eftdb.one/weaponmodding/220001/AK-74N/
Note-1: If you mouse-hover the mods it will show its effect on weapon stats.
Note-2: It seems EFTDB is a bit outdated as some weapons and/or mods are missing, and trader levels may be different to current build. I still find it a really handy resource though, due to the ability to create weapon builds. Would love to see it updated.
---
This site has been mentioned as an alternative to EFTDB for making weapon builds, created by TarkovArmory. This one seems to be up to date, but is lacking pictures. They also seem to have a pretty good ammo chart on their website. Worth checking out.
https://tarkovarmory.com/weapons
---
As EFTDB is slightly out of date, you certainly can find all the up to date information on weapon attachments from the Gamepedia pages [below]. Select a weapon to see which mods will fit on it, or search the mod's name to be taken to its specific page. Or check the weapon mods page for tables of the mods and their +/- on attributes.
https://escapefromtarkov.gamepedia.com/Weapons
https://escapefromtarkov.gamepedia.com/Weapon_mods
---
Below is a spreadsheet that shows the Optimum Weapon Builds for each weapon, created by Virion. So if you are a min/maxer, and don't want to go through the agony of experimenting with every mod for every weapon, this is a handy resource. The ones in BOLD are the current 'best' of their calibre/category.
https://docs.google.com/spreadsheets/d/1yHyVEVB5oN0qL_pR1qTNP1_ICmzJ3SCFJQNb6XDM_DQ/edit#gid=0
Note: As mentioned on the spreadsheet itself, some of the images are outdated.

RIG SLOTS

Another handy page from EFTDB is this one which shows each Tactical Rig, the rough price, if it can be traded for and from whom and what Loyalty Level required; along with the layout of the slots available in handy images.
https://www.eftdb.one/rigs
Note: As mentioned above, EFTDB is slightly outdated, for example, there are a few rigs missing from this page. At the bottom of this article is a link to an infographic created by Veritas, which has a section showing all current rigs.

MAPS

This is a good place to find all the best maps, compiled by GameMaps.co.uk but created by various people. I suggest where possible, when learning any raid, it can be helpful to have a map open on a second monitor if you have one, until you learn your way around. With enough experience you will learn the maps and points of interest better than the back of your hand, so the more you play the less you will need it. There is a selection of high quality maps for each raid, I am sure everyone will prefer one or another, I prefer the 3D maps where available. Some maps show spawns for keys and quest items/locations.
http://www.gamemaps.co.uk/game/tarkov

QUESTS

Next is the best place to find all the quests, and quest-guides. The folks who contribute to the Tarkov Gamepedia page are legit legends. Select the trader to see a table of their quests and rewards. Click on any individual quest and you will be greeted by a detailed guide of how to complete the quest, along with handy pictures and maps where necessary.
https://escapefromtarkov.gamepedia.com/Quests
---
To go along with this, a handy guide to items you should be hoarding to finish quests. So you can be collecting things from your first raid you might use to complete a quest 2 weeks later. This image is updated when the quests are. There used to be a text-based list, which I found really handy, because I copy/pasted into a .txt file and updated it when I found new items from the list, this sadly I can no longer find.
https://escapefromtarkov.gamepedia.com/Quests#/media/File:QuestItemRequirements.png

TRADERS

If you want to know what the traders sell at loyalty level 4, but you are only LL1, these pages will give you an overview of what each trader has at each level. You can also see a table of their quests too if you expand that option, but I find the previous link provided above is handier for that purpose to be honest.
The Rapist - https://escapefromtarkov.gamepedia.com/Therapist
Skier - https://escapefromtarkov.gamepedia.com/Skier
Peacekeeper - https://escapefromtarkov.gamepedia.com/Peacekeeper
Mechanic - https://escapefromtarkov.gamepedia.com/Mechanic
Ragman - https://escapefromtarkov.gamepedia.com/Ragman
Note-1: Fence Trader only sells things that PMC’s have traded to him, can be a handy place to find rare items sometimes [less so since the flea market was launched], but items generally are cheaper to buy directly from the traders if you have the required loyalty levels.
Note-2: The Flea Market is a player driven system where you can buy and sell items. Some items will be up for Roubles/Euros/Dollars and some will be up for trade for other items people might require.
Note-3: A few items, such as melee weapons can only be sold to Fence, or put on the Flea Market. Other items can only be sold to certain traders, for instance Therapist will not buy weapons, but is the only trader that will take meds from you [other than fence].
Note-4: Several items can be sold to several traders, but you will get a different price depending on which trader you sell it to. For instance, Therapist will give you the highest price for rare items like Roosters/Clocks/Rollers/Bitcoins/Gold Chains/Cat Figurines/Lion Statues.
Note-5: Even though certain items have a high price to trade in, it might be worth holding onto them to trade in for other items. For example, you can trade in 1 roller and 5 gold chains to Therapist for a Money Case, which you can then sell back to her for more money than if you just sold her the individual items, or can be put on the Flea Market if you prefer.
---
Below is a site showing a table of Barter Trades created by Sheiddy. It provides information regarding which items can be given to each trader in return for other items. It also displays where the original items can often be found, and the rough price of the items you can receive if you were to pay for them.
http://tarkov.sheiddy.com/

KEYS

Next is the best key guide I have found, compiled by the United We Stand gaming community, specifically The Velvet Gentleman. As far as I am aware, this is the only key guide worth looking at. It informs you of which keys are available on each map, what is behind the door, and where you can find said key if it has a static spawn [most of which have pictures of the spawn]. There is even some colour coding going on so you can quickly pick out the most valuable keys/rooms.
https://forums.uwsgaming.com/topic/3871-map-keys-and-you/
Note-1: Be aware that not all keys have a static spawn, and some will have to be found on scavs. Also keep in mind that just because a key has a static spawn, doesnt mean you won't/can't find it on a Scav. You can literally spawn as a Scav with any of these keys, barring KIBA#2 I believe.
Note-2: Worth considering, KIBA key #2 is gained by completing a quest for Mechanic; and KIBA key #1 has a static spawn, but I personally found one on a scav this wipe [11.7], and it can also be traded from Therapist to the tune of 50x condensed milk.

AMMO

Ammo Chart from Hazmattr, this one is broken down into calibre, so easy to follow imo. It seems to be fully up to date. It also shows the trader you can buy said ammo from, and the level you need to be with said trader, there is also a gamepedia link to any quests required to unlock each ammo. I find this easier to navigate than the official ammo guide sheet due to the layout.
https://docs.google.com/spreadsheets/d/1-q1Yiof1FfGBlIoudl799BFyx_fMYEGt-TP2Itci4z0/edit#gid=0
---
Of course, you can always check the official ammo chart provided by Battle State Games [below].
https://docs.google.com/spreadsheets/d/1l_8zSZg-viVTZ2bavMEIIKhix6mFTXuVHWcNKZgBrjQ/htmlview?sle=true
Note: BSG has a habit of changing the values of ammunition and not releasing an up to date chart until weeks and/or months later. They will undoubtedly be changing things with .12, and will be adding new ammo types; hopefully they release the new chart with the wipe.
---
Also worth mentioning in context of ammo is this chart by NoFoodAfterMidnight, which shows your chance for each ammo to penetrate each armour class, along with fragmentation chance. This is the best way to work out which ammo you should be running with each gun when going against highly geared players.
https://docs.google.com/spreadsheets/d/1jjWcIue0_PCsbLQAiL5VrIulPK8SzM5jjiCMx9zUuvE
Note-1: As mentioned above briefly, some ammunition types are only available after finishing certain trader quests. So don’t expect to be buying the best ammo as soon as you join the game. That being said, you will be able to find all the ammo’s on the flea market, but at the beginning of a wipe period, these will be placed on there by PMC’s with higher levels at inflated prices as and when they are unlocked.
Note-2: Depending on your target, ammo with high flesh damage or high armour penetration is going to be relevant. If you shoot high flesh damage ammo at high end armour, you might as well be shooting a water pistol at a battleship.
Note-3: Legs are never armoured, so feel free to use high flesh damage ammo on even the tankiest players, as long as you can get enough rounds into their legs before they merc you. This playstyle is not always the best idea, as sometimes peoples legs are obscured, and it will take a few rounds, giving the enemy time to turn and spray you down.
Note-4: Firing shotguns at reasonable-to-good armour is like shooting a Nerf gun at the Empire State Building. Firing shotguns at legs is like shooting a flame thrower at an ant!

Honourable Mentions

Perhaps an under-appreciated site, which I have rarely seen mentioned on reddit, is this one by J James. He has a Key guide [with images], Mod Compatibility guide [select or search mod to see what it fits], Weapon Mod Compatibility guide [select weapon to see what will fit on it]. There is also another breakdown of which items the traders possess by level similar to the ones from gamepedia I linked above. This seems to be a solo project by J James and a labour of love, props to him.
http://www.jjames.info/game_page.php?gameName=Escape%20From%20Tarkov
---
Below is a massive infographic created by Veritas providing visual reference guides for things like Ballistics, health items, Firearm attributes [outdated], armour stats, rig slots, bag sizes, and labs keycard locations [some of them, not all]
https://cdn.discordapp.com/attachments/570624452220420115/573619468513706093/info96.jpg
---
This next one, EFT Field Guide, has various resources. A keyguide where you select the key and it will show you a map with spawn point indicated; a sort-able ammo chart; a sort-able list of items showing their values, and more importantly their value-per-slot; a checklist feature where individuals can create a list of items they need/want to collect; and a list of popular youtubers/streamers.
https://eftfg.com/
---
This last one is a new player guide that may be useful to some. Created by Tax (Jonathan Ballard), this guide covers many of the basics a new player might require. Just FYI though, this was created over a year ago and as such some features are missing. I only quickly skimmed through it, but the top half seems pretty sound, and does give some pretty solid advice for newbie Tarkovians. It is displayed in a way that reminds me of the handbooks that used to come with video games when I was a kid, nostalgia.
https://drive.google.com/file/d/0BxcqjnBUL1r7emg3VWJYUlp3dGM/view

I cannot give enough credit to the guys and gals that have made these sites. These people as far as I know have done this for the love of the game, and I think they deserve a pat on the back for their work. Kudos to the creators, whomever they may be. Most of the sites mentioned seem to be regularly updated with new content when BSG releases it, so they will be crucial to keeping people informed when .12 drops. Any that are outdated have been noted as such.
Hope this helps some new players out, and maybe even some experienced Tarkovians. If you think of anything that would fit well on this list, comment below and I will update the main article. See you in the field my Cheekis.
Contributors: Credit to u/Danger597 for link to Virion's Optimum Weapon Builds. Credit to u/Dracborne/ for link to Sheiddy's Barter Guide. Credit to u/ZombieToof/ for link to TarkovArmory weapon build site. Credit to u/betajosh711 for link to EFT Field Guide. Credit to u/mmm3k3/ for link to Tax's Player Guide.
Final Note: I didn't include youtube guides as there are many youtubers out there that create good video based guides. If this article does well though, I may create a separate article showcasing some of the best.
submitted by brokendreamz101 to EscapefromTarkov [link] [comments]

I'm an Undercover FBI Agent on the Deep Web

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

I'm an Undercover FBI Agent on the Deep Web.

Part one
My name is Special Agent “Barry Allen” . (Not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
Part 2
The day has come and I just received the call I've long avoided. It is time. The competition for top tier hackers are meeting at this building in which i believed to have been abandoned. We are in the surveillance van. Heading towards our destination. Our equipment is all packed up. Wearing a wire on my chest. (Hopefully they don't pat me down upon entry) Jeff is driving recklessly, as he has a bad habit of being late. Testing the audio in the back of the van. Generally this is done days before an operation. However, we are rather short on time. (Not pointing any fingers)
Leaving the city limits, we now enter a heavily wooded area. There is only one way in. The road is turning into rubble. Small rocks are shooting from our tires .Lights are fading behind us as we venture further into the forest. Jeff now using high beams. We notice it's grown quiet. Other than hearing the tires on the gravel road. There seems to be less and less wildlife in the area. I got this feeling like we are being watched.
Checking my cell phone, we have lost all signal. (Is this a trap)? i thought . Our other equipment seems to work just fine. I can begin to see dim lights in the distance. We must be nearing the competition. “You ready for this?” (Jeff asks while blowing smoke out the window) I start to swat the backdraft of the smoke billowing back into my window. “Yeah, I'm ready, you should really consider cutting back on the smokes.” I utter. Just then, a pack of Marlboros are hurled in my direction. “We're here , Barry. Make sure you have everything.” (Jeff commands) “I'm all set.” I reply.
Jeff stops the Van on the gravel. Exiting the vehicle, i grab my backpack while adjusting my clothes. (I found some glasses with regular lens in them, so as to ‘look the part’) Walking towards the building i speak quietly into my chest microphone. “Test, test chest mic, how do you read me” i ask. (Jeffs growly voice comes into my earpiece) “Loud and clear, good luck” he responds.
One odd thing i notice right away as my feet kick up against the rocks on the ground is that there is only one vehicle other than ours. A large bus. Slightly confused, i look in every direction while also investigating the bus. Seems as though it's empty. (Later i would learn everyone else met up at a different location and they all took the bus to get here).
Reaching the suspicious looking building, i reach for the door handle. As the door opens with little force, loud music hits me as well as bright flashing lights. What the hell? Walking around i find what i was looking for in a back room. “You're late , take your seat.” a well dressed man says (Seeing one empty seat left) Grabbing my laptop from the bag. Booting it up and joining the their local area network. Connection established. A strange software automatically downloads on my laptop.
The man who greeted me walks over to examine my screen. “We will wait until this participant is ready” (he tells everyone else) Minutes pass and the program has finished installing. What's on my screen is a D O D login showing the user name and password empty fields. “Ok everyone, your first task will be to crack the code and gain entry into this system. You have ten minutes to access the servers and find the login information. The first 10 people who accomplish this task will advance to the next round, good luck, your time starts now!” he explained.
A voice come over my earpiece once more .“Ok Barry, i'm linked up with your laptop, i can see everything you see. I will now control everything remotely. How do you read”? Jeff says quietly. “I hear you, I'll let you take over from here.” I reply. My colleague begins typing away like mad. It's been said he can type up to 153 words per minute. Looking at my screen, the computer is changing rapidly, each window appearing with different streams of code. (Almost like what you seen in the movie The Matrix) Which i suppose is a foreign language to most people. It can seem overwhelming at times. Normally. I would be doing this.
Jeff is far better and faster than i. It's not worth the risk. This task is far too important. There is much at stake here. As he continues going in through the firewall. More boxes open and close all over the screen. I appear as if im typing away. As there is a man walking around watching each potential hacker perform their duties. Not sure if it's the leader of this anonymous group. He is in a dark suit and all i can see is the flashes of light from each monitor.
Maybe it's just my paranoia but i feel like he keeps shooting me these awfully suspicious looks. Have to stay focused. Come on Barry. You need this. Concentrate! Keep your head in the game. I can't lose myself in the moment. Oh wait a minute, i just now remembered. I'm not even in control of my machine. Jeff, i sure as hell hope you know what you're doing…
“Barry, you DO know i just heard everything you said, right? Now shut the hell up and let me work. We only have 4 minutes left!!” Jeff urges. “Well then hurry up you lung cancer having prick, I'm dying in here. Must be 90 degrees” i whisper. Just then (Access granted) appears on my screen. The login information has been hacked. Instantly i jump up as if I've just won in BINGO. “I'm in!!!” I yell loudly to the man. He nods and another man comes over to confirm the legitimacy of my claim.
After confirmation is given a few moments later. Myself and several others are ushered to another room not first seen when you enter the building. First we are taken down a flight of unkempt stairs creaking and groaning with every step. Feeling as it could give out at any moment. Our group reaches the bottom of the stairs and are now on a platform. A mechanical whirring is heard as we now are being lowered even further underground. “Where the hell are we going”? One man asks in fear. “Silence fool”!! (Says the man in a nice dark suit) Finally the platform stops as i would approximate we are at least 80 feet underground.
A long dark hallway is before us. Lit dimly by low hanging lights. Which never seem to end as far as we can see. Walking for several minutes i no longer hear my associate in my ear piece. So i remove it quickly before anyone notices. There is a musty smell that has disturbed me immediately coming down here. It grows stronger the closer we get to the direction we are headed. Im last in line only in front of what i assess is a hired goon.
Stopping for a moment im pushed forward on my upper back near my shoulders. (I swear if i wasn't trying to save the world right now, I'd just take out my service pistol and blow this cocksucker away. No one would miss him) We reach a large old wooden door with absolutely no handle or markings of any kind. The leader pushes up against the wall near the door and it opens slowly. Everyone pours in single file line. There is a large wooden table with chairs almost like a conference room. “Take your seats please” the leader addresses. “You're all probably wondering what the hell we are doing down here, well you're here for a job. Also i didn't want any interference of any kind. Just in case the government is watching us. There's no way they could possibly hear what's being said this far underground.” He explains.
“Congratulations to each of you that has moved on to the next round. You 10 have been chosen to advance to the next stage in the competition. This following task will include various stages of difficulty. You will be chosen at random by a computer so it's completely fair. Each of you are to hack into some the world's largest banks and bring down their servers. Please come back to this location. Your names have been taken down and we shall contact you if anything changes. I expect to see all of you back with us .Same time next week. 6 days from now. That is all for now, thank you.”
The leader finishes and leaves the room first. Each man muttering and chatting loudly. I can hear only bits and pieces as everyone is talking loudly. Minutes pass and we are escorted out of the building. Everyone begins walking towards the bus. I veer towards my van and am stopped by the same man who pushed me earlier. “Just where the hell do you think you're going”? He asks. “Oh i didn't get the meet up spot, i had to drive here.” I respond while swatting away his hand from my shoulder. The man reaches in his pocket pulling out a card. “Be at this location and be on time or we will find someone else” the man urges. I snatch the card and stuff it into my wallet.
Reaching the van, i hop in and drive away. “What the hell happened in there”? Jeff demands. I begin informing him of everything that took place and explained the situation. He nods and tells me good work. Wait a minute, this doesn't look right. Jeff looks at me puzzled. Something is off. I don't remember any of this. Now there's a fork in the road. Is this the way we came? I thought i remembered it being only a one way in and one way out. “You went off the gravel road, move over,let me drive.” Jeff says. Hey sorry man, I'm a hacker. Not a tracker. Just get us the hell out of here. I'm more lost than Atlantis.
About an hour passes and Jeff somehow gets us out of the woods and back to the main road. We head back towards my house. But suddenly he makes a detour. “Screw this man. After all that i need a damn drink. You down”? Jeff asks. “Well in the words of my father, If you have time to think, you have time to drink” i utter proudly. (Then again dad was a major alcoholic, so perhaps that's bad advice) “Well alright then” jeff says as he floors the gas pedal.
Roughly 20 minutes later we arrive at his favourite bar where he immediately opens up a tab. I'm worried as I've heard he drinks like a fish. Not to mention we are both armed in a bar. (Yes that's illegal but screw you i am F B I. Remember folks, laws are made to be broken, otherwise, I'd be out of a job)
Crap i think i have lost my colleague. I begin walking around the establishment and am stunned to see this gorgeous blonde woman cross my path. We strike up a conversation and i soon forget about Jeff. (Meh oh well he is a grown man, i am sure he will be fine) She asks what i do for work and of course i lie. Never know when you need to run a background check on someone. Besides telling the whole world you're an undercover FBI agent isn't exactly the best idea. Or so the Bureau instructed us.
We continue chatting for a while and eventually part ways as it began to get late into the night we exchange numbers and she leaves gracefully. I walk outside to see the van still parked in the same spot. A bit puzzled i go over to inspect the van thinking maybe he just passed out in the front seat. I arrive at the driver's side door and open it to find all of our equipment gone and jeff is nowhere to be found. Freaking out i run back into the bar searching all over even behind the bar next to the register.
The bathrooms are empty and it's closing time. I have no idea where he went.. Did he leave with some one or was he was abducted possibly, either way i am completely dead if my supervisor finds out about this. I have to find him and the equipment. And who the hell was that girl, could she have something to do with this? I need answers. Oh no. I just realized, my laptop is also missing. If that information gets in the wrong hands. It could have catastrophic consequences…...
submitted by BeardedVeteran to mrcreeps [link] [comments]

I'm an UnderCover FBI Agent on The Deep Web. (Part one)

My name is Special Agent “Barry Allen” . It's actually my code name. Given to me by my colleagues. You may recognize this name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
submitted by BeardedVeteran to nosleep [link] [comments]

I'm an Undercover FBI agent on the Deep Web (Part One)

My name is Special Agent “Barry Allen” .(not my real name of course) It's actually my code name. Given to me by my colleagues. You may recognize the name from the comic book character “The Flash”. I was given this name due to my quickness to obtain IP addresses , bypass firewalls and hack into certain deep web sites and shut them down. That is my area of expertise.
However, I've also been assigned to a Joint Task Force before which tracked and arrested drug runners, firearms dealers and human trafficking rings. Believe it or not. The federal government is everywhere. Social media, Reddit, YouTube. You name it. We have our guys on it. We monitor everything. That being said, the FBI only has jurisdiction to operate within the borders of the United States.
In this new digital age we find ourselves living, Cybercrime is much more of a direct threat. Now more than ever…
Yes in the past we feared as a nation, biological and chemical warfare. As an example, right after 9/11 the United States had an Anthrax attack. In the FBI, it was known as “Amerithrax” Letters were mailed containing anthrax spores to several news media offices and to Democratic Senators Tom Daschle and Patrick Leahy, killing 5 people and infecting 17 others. Once the victim opened the letters they would immediately be exposed to the spores. Inhaling them is the most deadly form of the attacks. And it quickly destroys your immune and respiratory system's.Back then there were no known cures and it was difficult to treat as the symptoms often times confused doctors. The death rate once exposed was nearly 95% .No one was ever officially arrested or tried as the primary suspect for this horrific crime. If you ask me though, the scariest part of this investigation is where it led us….To a lab on an Army base. Essentially the US Army was weaponizing Anthrax using independent scientists specializing in microbiological warfare.
Of course though, if you wanted to bring down Western Civilization today , all you'd have to do is manipulate or destroy our satellites and we would be back in the dark ages. Computers, banks , grocery stores and cell phones, power plants, even the water filtration system runs with electronics and the ability to communicate with satellites.
Essentially, our world now depends on this. It's scary to think about. Especially when 14 year olds are hacking into the largest banks in the world from their mother's basement. Somehow they are able to bypass the best security systems we know of. (I personally believe they are using password skimmers) We joke in my department that in order to work for us, you simply only need to be smarter than a teenager.
My background is in IT while in the military. While serving i also obtained several certifications and degrees in my field..
I worked alongside someone i never thought i would. Turns out the federal government often times hires former hackers to “consult” for them. In fact they have an army of internet soldiers at their disposal. I was actually trained by a convicted felon. It's been said he is one of the best hackers in the world. Eventually i was put in contact with men in the FBI. Essentially went through a series of rigorous “tests” to determine my operating field of work. After seeing our skills, they then placed myself and the felon on the Cyber Anti-Terrorism unit (or CAT as we call it) .
Our first assignment was to locate a man on the Deep Web known only as “Captain Death” He runs this anonymous site in which the viewers would donate bitcoin to watch unspeakable acts of torture, mutilation and murder. Often times called “Red Rooms”. After searching for a while, clicking on every single link given to us, we found the exact link which directed us to the host site.We visited the website. For a moment the page was completely black. So we waited a few moments. Suddenly a bright red colored text appears across the top of the screen. “Welcome! To the house of pain, tonight's events will commence in 2 minutes. Enjoy” Looking over at my colleague, Jeff begins penetrating the sites security systems attempting to find the IP address of the hosts location. Viewing the site still with my eyes locked onto the screen. Using my laptop separate from Jeffs. The monitor goes black, Then a video attempts to load. Buffering now for several minutes. “Any luck Jeff”? I ask. “I'm searching for a weakness in the security firewall. Give me a minute” he responds. Frustrated i say, “We may not have a minute” Using access control, Jeff was able to find and manipulate the users login information bringing down the video before the it began. Believe it or not. One of the weakest points to a website can often times be it's login feature. Jeff found a vulnerability in the source codes software and exploited it. Still haven't found the guy. As that process is much more difficult. For now, we can rest a little bit easier knowing his account is compromised.
The best hack is when you can invade a security system and not ever be noticed. This was not one of those instances. “Who are you” appears on Jeff's computer screen. He responds quickly “The Dark Knight” in bold green text as he looks over the offenders account. Attempting to track down banking information. Recent transactions. Even bitcoin exchange.
Searching over the vast amount of data pouring into the site. Seems they have gone through great lengths to keep themselves hidden from the public. The Identity of the perp is still unknown. Patting Jeff on the shoulder i thank him for saving my eyes from witnessing god only knows what. I suppose for now it's a small victory. “Let's take a break Jeff” I urge. Shutting down our laptops we exit the dark cold room we sat in with monitors, computers, servers and many other electronic components all around us. One thing to remember, heat is the enemy of electronics. and for some strange reason, we enjoy freezing our asses off while hacking.
Walking outside Jeff lights up a cigarette and takes a drag. Putting on his sunglasses “Want one?” He asks “No thanks, they really break my concentration, I don't seem to function well with that in my system” i reply… he scoffs and quietly whispers (amateur) while choking and coughing. I smile and look up “Yeah well at least I can breathe” I say laughing. (A smile forming on ny face) We begin walking to a nearby restaurant. My phone lights up and rings loudly. It's my supervisor. “Go for Barry” I speak confidently. My boss is breathing heavily into the phone and says sternly “What's the News on Captain Death”? I begin to inform him on our progress and our struggles. “Keep me posted Barry, good work.” He says. (Not telling him Jeff did most of the work, i feel bad for taking credit for this one)
Reaching the doors of the bar and grill, I notice a man sitting in the corner of the restaurant with his family. Jumping back quickly while peering around the corner. Jeff gives me a strange look as I inform him that man is a fugitive from an earlier investigation. I call in for back up and sit back in our unmarked unit waiting for the Cavalry to arrive as he is armed and extremely dangerous. 15 minutes pass as back up swarms the parking lot. We exit the vehicle and surround the building. Rushing in 12 men strong, guns drawn we make the arrest. Fortunately, he did not resist. No civilians were harmed on the takedown.This man has been on the run for months moving from state to state. I had previously set up a sting operation to illegally buy stolen guns from the man which had been arranged through the deep web. However , this particular sting was an in-person arms deal. He appeared very spooked and got away from us before the transaction was made. After searching his panel van today we found an entire armory of weapons. A few days pass and we now have a search warrant issued by the judge for his last known address. Confiscating all of his computers, hard drives and weapons. My partner and I found a hidden room below the living room floor boards with $1.4 million dollars in it. It also had passports and other documents. He was ready to flee the country for sure. Why he was out in public is beyond me. Though often times, men like him feel they are untouchable and above the law.
It's several weeks later and work has been slow. (Not sure if that is good or bad) Until today that is, I began chatting on forums and meeting interesting characters in chat rooms. On the clear net and deep web. Today I met a dark shadowy figure online. He claims to have worked with a group of hackers who specializes in debit and credit card theft online. (Playing the part ask in a private chat) “How much does this pay?” Moments pass with no answer. I sit and wait for a response. A message appears with a link and a phone number. “Contact him for a trial run, if you do well. He'll set you up with further work” he writes. (Thinking for a moment, finally an adversary worth hunting) Typing quickly I say “Who is he, do you know him personally”? He responds rapidly and the text box closes after he writes “Rule number one, no names!” Fortunately I was able to copy the link and phone number before my computer screen went completely blank.
Reaching for the burner phone i recently acquired i begin dialing the number provided. It rings several times. No answer. So i check out the link i copied. Right before i click on it. My phone lights up and rings beside me forcing me to jump out of my seat. Startled i look at the cell phone. Mildly confused as it reads 'unknown number’. Quickly i answer the phone. A man on the other end speaks. “How did you find this number”? he asks. I inform him i was searching online for a while. Im new and im looking for work. “I was told you're the man to call if i wanted some action, i need the money” i implore. “Competition is next week, meet at this address, winner gets a spot on my team, if you think you're up for the test, be on time” he demands. I thank him and abruptly hang up.
Jeff comes over to my place. He has some info on low level guys in the fraudulent/stolen debit card scheme. Using an unmarked and totally not suspicious surveillance van. We follow a few men on their day to day operations. For the most part, this portion of our job is the worst. Very daunting and boring. Sitting and waiting isn't exactly glamourous as the movies depict it to be.
From what we can tell so far these men are using credit card skimmers. Victims of credit card skimming are completely blindsided by the theft. They notice fraudulent charges on their accounts or money withdrawn from their accounts, but their credit and debit cards never left their possession. How did the theft happen?
You may be wondering, what exactly is this? Credit card skimming is a type of credit card theft where crooks use a small device to steal credit card information in an otherwise legitimate credit or debit card transaction. When a credit or debit card is swiped through a skimmer, the device captures and stores all the details stored in the card's magnetic stripe. The stripe contains the credit card number and expiration date and the credit card holder's full name. Thieves use the stolen data to make fraudulent charges either online or with a counterfeit credit card.
These men have been using these small devices all over the local area and surrounding states as well. Targeting the nicer areas of town. Attaching the devices to the ATMs. Sitting a short distance away in their cars watching each victim approaching. Laughing all the way to the bank...so to speak. After several days of stake-outs. Out team makes the arrests. Finding blank cards, machines and large sums of cash on hand. After hours of interrogations we learn a much bigger scheme is in the works. The men inform us that they were merely a distraction for a much larger crime. My supervisor gives us clearance to make a deal with them. Lessening their charges if they are willing to cooperate. Speaking with the men for 3 more hours we learn what's really going on. The next few days are extremely tense as our offices try to warn all the banks and even get the media involved.
Calling every bank, big and small we alert them of the situation that cybercriminals are poised to carry out an “ATM cash-out,” an operation that gives thieves access to untold sums of money by bypassing security measures on an ATM. If successful, the operation has the potential to be a heist unlike any we’ve ever seen.
The FBI has obtained unspecified reporting indicating cyber criminals are planning to conduct a global Automated Teller Machine (ATM) cash-out scheme in the coming days, likely associated with an unknown card issuer breach and commonly referred to as an ‘unlimited operation‘.
These unlimited operations compromise financial institutions or payment processors by installing malware that allows hackers to exploit network access, allowing admin-level access. Once inside, they can disable fraud protection, raise maximum ATM withdrawal amounts (and transaction limits) and withdraw large sums of money. Millions, potentially.
All they’ll need to carry out the attack are debit and credit card numbers found on the dark web, and dummy cards, also known as “blanks,” to attach the numbers to.
The cyber criminals typically create fraudulent copies of legitimate cards by sending stolen card data to co-conspirators who imprint the data on reusable magnetic strip cards, such as gift cards purchased at retail stores. At a pre-determined time, the co-conspirators withdraw account funds from ATMs using these cards.
It's nearly a week later and im preparing for my tests. I have my laptop ready in its case. Im extremely nervous.The information given to me is that i am to meet at this very strange building on the outskirts of town. I have no idea what to expect. I must come in first place to become a member of the team and ultimately take down the leader of this cybercrime domestic terrorist.
If things go according to his plan.He could potentially put the entire country on its knees and our banking systems would completely collapse.Chaos and madness will spread like wildfires. Millions of people unable to access their money will riot and destroy stores. Stealing food and everything they can get their hands on. The police will be overrun and unable to do anything about it. The military would most certainly be called in an attempt to regain order. Mass hysteria ensues. To the extremes we have never seen before. I must stop him. Before its too late….
submitted by BeardedVeteran to DrCreepensVault [link] [comments]

[WTS] SBA3 pistol brace, Magpul Carbine MOE handguards, MOE grip, and Enhanced Trigger guard - FDE

These are going to be from a Palmetto State Armory pistol kit that I recently put together. As of right now the furniture is still on the gun so I am including a picture of that. $5 for shipping via USPS for a single item. Will ship for free if you buy everything. I'll take Bitcoin, PayPal (Friends and Family only), and Google Wallet. Thanks for looking.
Picture: https://i.imgur.com/NVuwLHT.jpg
submitted by 40wPhasedPlasmaRifle to GunAccessoriesForSale [link] [comments]

[FOR SALE] Firearms, Optics, Gun Parts, and Accessories.

Handgun Section
Smith and Wesson Model 27 (no dash) 4-Screw. Price: $1500 USD,
More photos here.
Smith and Wesson U.S. Government Model 1917 WWI production, 5-digit SN. Price: $1750 USD,
More photos here.
Rifle Section
Harrington and Richardson M12 Military .22 Training Rifle. This is a CMP rifle, I'm pretty sure I have the certificate if you want it. Price: $SPF
More photos here.
Remington 700 Short Action Receiver Assembly. New, never assembled. Includes a complete bolt assembly, trigger assembly, magazine, and bottom metal. Price: $SPF
More photos here.
Remington 1903a3 Sporter, .30-06, includes a Leupold VxII 1.25-4x25mm scope. The pictures don't do it justice, it's a beautiful rifle in person, and light weight. Price: $450 USD,
More photos here.
Remington Model 30-S Express .30-06 This is a pretty cool rifle for the Remington History buffs. Based on the U.S. Model 1917 "American Enfield" (aka Eddystone) The Scope is clear and bright, but it's missing the reticle (I can't see it, anyway.) Price: $950 USD,
More photos here.
Shotgun Section
Remington Model 11 (Humpback Browning Auto 5) New bushing and spring. Very comfortable clays gun. Price: $500 USD,
More photos here.
Simson Suhl German (GDR) Side by Side 20 gauge. I'll let the photos do the talking. Price: $1200 USD,
More photos here.
Optics
Trijicon ACOG Reflex NSN-1240-01-435-1916 Price: $300 USD,
More photos here.
Gun Parts
M14 (M1A) USGI Buttplate kits 5 of the steel shoulder rests have been reparkerized, the rest are of original finish. All the buttplates (Aluminum pieces) need refinishing. There are enough small parts to complete at least 8 assemblies, (just missing a few ball bearings.) I'd rather sell the whole lot all at once. Price: $200 USD,
More photos here.
M1 Garand OpRod SA-9 (Springfield Armory U.S. Arsenal) Curved Side, Uncut. Price: $150 USD,
More photos here.
M1 Garand OpRod HRA (Harrington and Richardson) Price: $120 USD,
More photos here.
Springfield Armory 1903 Bolt Assembly Price: $120 USD,
More photos here.
1903 Parts All parts in photo are included Price: $75 USD,
More photos here.
Ruger New Vaquero Rose Wood grips, no screw. Price: $30 USD,
More photos here.
McMillan GAP Camo A3-5 Full Adjustable stock Cut for a Surgeon 581, but will work for any standard length Remington 700 or compatible. Bottom metal relief is cut for a Surgeon or Badger Ord. Flush cup sling swivel mounts installed. Price: $750 USD,
More photos here.
McMillan Forest Camo A3 stock Cut for a short action Remington 700 with standard bottom metal. Price: $500 USD,
More photos here.
M1 Garand Grenade Launcher Sights Still wrapped in the original paper, includes instructions and carry bag. Price: $15 USD,
M1917 Parts Sight ladder, stacking swivel, rear swivel, front sight block, stock ferrule and buttplate. Price: $25 USD,
M14 (M1A) USGI Buttplate assembly. Needs refinishing Price: $30 USD,
AK-47 Slings Unknown origin, 3 available Price for each: $5 USD,
FAL Flask Cleaning Kit New, never used. Price: $20 USD,
AR-15 Stand-Alone Rear Sight Assembly I Mill-cut a carry handle to make this, needs finishing. Price: $20 USD,
AK-47/SKS Front Sight Adjustment Tool Price: $5 USD,
FAL Bayonet Price: $15 USD,
More photos here.
Tools
SIG P Series Pistol Sight Adjustment Tool Price: $75 USD,
More photos here.
Springfield Armory Inc XD Series Pistol Sight Adjustment Tool Price: $75 USD,
More photos here.
Brownell's Bolt Forge Kit. I'm including a set of aluminum heat-sinks, handy for welding. Price: $50 USD,
More photos here.
Miscellaneous Accessories
Custom, handmade Cowboy holster for a Ruger Single Six. - No manufacturer markings, I got it from an coworker about 10 years ago. He said he had it made for his wife by guy in Oregon. I lost track of the coworker, and I don't remember the name of the guy who made it. It's made for a smaller person: I have a 36" waist and the belt buckles at the second to last notch for me. Price: $50 USD,
More photos here.
Terms of Sale
Shipping to USA only! Firearms must ship to a Federally licensed dealer (or collector if applicable.) Buyer to pay shipping and insurance fees. Buyer to pay escrow fees.
Payment options in order of my preference: Bitcoin (will provide signed invoice, buyer to pay escrow fees) Chase Money Order USPS Money Order PayPal G&S (plus 3.5%, no F&F)
All sales are final.
SOLD
Mauser P08 Luger Black Widow, made in Obendorf (BYF code) in 1941. Included with the pistol is an original Luger holster, the take-down assist tool, and three magazines (none with numbers matching the gun.)
LRB M14 Muzzle device/Faux flash suppressor with Bayonet lug
Harris 1A2 Ultra Light Bipod,
Springfield Armory Inc SOCOM 16 Muzzle Break/Gas Cylinder Lock/Front Sight Includes Trijicon XS Tritium Sight.
FAL Pistol Grip Cleaning Kit, New, never used.
Ontario KC SPECOPS SP1-95
Smith & Wesson K Frame grips, no screw.
Smith & Wesson K Frame grips, include screw.
1911 Wrap-around rubber grip
1911 Target Right Handed grip set
Chinese M14 (M1A) parts All parts in the photo are included.
Smith & Wesson K Frame round butt grips, includes screw.
Mossberg .308 10-Round Magazine DPMS AR308 Pattern
1911 Beavertail Grip Safety Will not fit unmodified Colts, for a bobbed rear frame spur.
FAL Dust Covers One has been reparkerized, the other looks to have the original painted finish.
BitcoinTalk Link to Contact
submitted by MarketBot to HellsCrypto [link] [comments]

350 bitcoins, encrypted wallet.dat deleted - lost forever?

I know I am insanely stupid. There is no need to be upset and yell that at me through the screen. I am happy to not be a gun owner because tonight I would have killed myself. I am posting this because countless others have posted similar stories whereby they learned important lessons the hard way due to lack of technical knowledge. In my case, the reason for this lack of knowledge was likely, ironically, the same reason I bought some bitcoins: drugs. I won't get into that. What I will post is where I went wrong, and where I'm at now.
Here's the full story: I had a securely encrypted wallet.dat with about 400 bitcoins on it that were purchased back at $10 or so. I pulled said wallet out of cold storage recently to cash money out of this wallet a few times to get some gift cards from gyft.com. I missed something ABSOLUTELY CRITICAL in my understanding of encrypted wallets.
When you send money, your wallet.dat file changes. You ABSOLUTELY MUST make new backups before deleting this file. Please don't do what I did and simply disregard this file after making changes on the blockchain...and then, on the same PC (sigh) proceed to reinstall StarCraft II when it fails to run due to Virtu MVP being retarded, ruining any shot at recovery (NONO #2: NEVER run bitcoin on your primary machine FOR ANY REASON).
I was a fool. Now I'm staring at TestDisk and File Manager in Parted Magic (linux boot disc) in total, absolute disbelief. Unless my data is stored within ".sst" files (never worked with these before and I can't figure out what they are with google, though it looks like fucking chrome shit because I leave it open all the time), which it may be, I don't know what to do. Maybe I'll try GetDataBack NTFS next. Maybe I can actually read filenames proper more effectively there? Does anyone have experience with this?
I have turned off the main PC and booted it up into parted magic so there is no data being written to the drive anymore. If there is ANY shot at this wallet.dat being recovered I am not screwing myself over any more now.
If anyone helps me out with this, I will compensate you generously. I am scared and lost. I never deserved bitcoin to begin with. If I can't get them back...well...enjoy the value appreciation, I guess, everyone. =( Such shame I have never felt; such guilt I may never feel again.
I have tried my old wallet.dat files repeatedly before coming to the realization that encrypted wallets change with each and every transaction...and the one backup I thought I made (moved, not copied) says it is corrupt.
It's easy to pretend what this feels like, but it's much worse in person. Educate yourselves and split up your wallets - now. Don't let this happen to you. If anyone is a kind soul and willing to help, feel free to PM me.
EDIT: I just recovered everything with an old wallet.dat. Tonight I went full tard. Luckily, this was a throwaway. I will never forget this...all of you came together to help, to suggest, to fucking CARE.
I WILL NOW TAKE TOMORROW OFF (sick day since I still feel sick as hell) TO FIX MY OTHER ISSUES WITH THE WALLET (aka putting all my eggs in one basket, keeping on a machine that is not specifically fucking made only for bitcoin, not using electrum/armory, not having my primary storage machine OFFLINE, etc.) All of you - ALL of you - are less selfish and less stupid than me. You should all feel amazing.
submitted by commanderkilly to Bitcoin [link] [comments]

[Table] IAmA: I am Wired contributor Joshuah Bearman, and I just published Part 2 of a 20,000-word story on the Rise and Fall of Silk Road. (I also wrote the story that became Argo, which was exciting.) I'm sure people have questions about Silk Road. AMA!

Verified? (This bot cannot verify AMAs just yet)
Date: 2015-05-14
Link to submission (Has self-text)
Questions Answers
Did you consider the trial fair? I did not follow it closely, but since all the evidence was digital, I read his mother Lyn stating something like "this evidence could have been planted on his computer". This seems a bit far fetched, but still: could it be true that Ross was set up? Good question. Yes, I think the trial was fair. My personal opinion is that Ross' lawyer mounted a peripatetic and somewhat ineffective defense. Not sure what a better defense would have been, but there were some clear missteps.
And again, the evidence was overwhelming. Court beat reporters and law enforcement professionals alike who got anywhere near that case or the trial all said that they had never seen such clear evidence of a criminal conspiracy.
The only way Ross is innocent is if the FBI planted it all. Which would have taken some doing. There was 1TB of information on his drive. Thousands of files. Hundreds directly about the Silk Road. Many of which were entered into evidence. The FBI would have had to fabricate them all -- including a diary full of intimate detail about Ross' personal life that they couldn't really have known -- for that argument to hold any water.
And, incidentally -- even if that were true, the defense said that would only explain the period he supposedly handed off Silk Road to someone else. They admitted he created it, and was running it at the end. Both of which also constituted the crimes he was charged with. So the multiple DPR theory and/or conspiratorial notion of the FBI planting evidence wouldn't even clear Ross of the charges.
You don't think that the fbi crossed any legal lines to retrieve the adress of Silk Road's servers, as it was rumored at some point ? You article states that no, but did you ever entertained the possibility ? Good question. And I don't think legal lines were crossed. For it to be illegal, the FBI would have had to break the functionality of the site -- the statutory definition -- and there's no evidence that occurred. Although yes, I entertained the possibility. As I described in another response, I see why there is so much speculation. It's a key point. And it relates to the much bigger and very important issue of electronic privacy. But the theorists about the hack don't suggest how the server was hacked. They just say that the server could not have been accidentally discovered. Everyone seems adamant about this, despite the fact that Ross himself wrote that he leaked the IP at times. And users posted publicly about that as well. Ross wasn't a programmer. The Occam's razor explanation is the one provided by the government, not the theorists of the hack: Ross made a mistake.
A more silly question, do you like the illustrations that Wired choose to illustrate your article ? And, yes, I do like the style. They're not quite the images I pictured while writing -- a little harder-edged than what materialized in my mind -- but then again I'm not the artist.
Occam's Razor says that the squirrely FBI description points to them hiding something. Maybe it was hacking. Maybe it was the NSA who found the server, and they are just using "parallel construction" to pretend they found it.
What motivated you to investigate and write a piece on the Silk Road? Was it just a case of supplying the demand? Was it pure curiosity at how such an enterprise rose to prominence? Did you have any political reasons for involvement? Well, I will admit I wasn't so hot on this story at first. Started working on it with Josh Davis, and it's more in his realm. But then, he started working on other things, I got these reporting breakthroughs, and then got sucked in to the piece, realizing along the way, that it had the makings of a non-fiction novella, which is how I tried to write it.
The story kept getting more interesting. The zeitgeist of it, and the cops and robbers element were a solid foundation -- but the emotional story was what drew me in.
The transformation of the characters and the ideas. From youthful vigor into cynical narcissism. From "do no harm" to "change the order to execute." Even though it played out in a technological realm, it felt like a deeply human story.
That was a very interesting read, thanks! What do you think of the role Variety Jones/cimon played in managing Silk Road and why do you think LE seem to be unable to arrest him? That's a good question. My story included Variety Jones in its longer version, when it was a 30,000 word (!) manuscript. But, it got complicated, for narrative purposes, to explain that relationship as space got tight. I mean, the story is already the longest Wired has ever published, and he just didn't have that much more room.
That said, Variety Jones/cimon clearly played an important role. He wasn't another user of the DPR handle, but he helped Ross conceptualize his role as leader. And he guided Ross toward the moral Rubicon of hiring a hit man. Variety Jones was the Silk Road's Rasputin, whispering into the Czar's ear.
Also like Rasputin, hard to take down! Not sure why he hasn't been caught. Although I suspect that he will eventually.
Did you ever follow up on Plural of Mongoose and Gypsy Nirvana? Sure thing. And no -- who are they?!!
Link to antilop.cc. PoM was believed to be using the VJ nym on SR and used to work for Gypsy Nirvana. Ah -- that's such a great resource. Used it a lot. So dense. Part of my job was to make the narrative comprehensible, which meant cutting out some detail...
Can you explain the basis of your narrative of how Tarbell found the server? I realize that this is a controversial point. (Although even if the server was "hacked," it does not actually exculpate Ross.) And I understand why people are attracted to the theory of the hack. But no one has provided any substantiated account of what this hack would have been. There were no tools to "hack" Tor. It's all speculation, and theorizing. And yet, Ross wrote in his diary that he leaked the IP. Many people noted on Reddit that the Silk Road leaked the IP at times. Ross was not a professional programmer, as we know. The simplest explanation is that he made mistakes -- as he did many other areas of operational security -- and the feds got lucky and exploited them.
Did you ever consider the multiple-DPR narrative (as told by the defense) plausible? The Deep Web documentary by Alex Winter seems to follow that argument. So I am just wondering what makes you so sure that there was only ONE dpr who was, in fact, Ross Ulbricht? That's a GOOD QUESTION. I did consider that it was plausible, but that was before I saw the evidence. It is just overwhelming. Ross admitted to starting Silk Road. He was arrested while logged into the admin panel as /mastermind. He claims that in the meantime the site was run by someone else. But his own diary, chat logs, and various other records (like a spreadsheet showing Silk Road assets) found on his computer, show that he was running it the whole time.
Moreover, it was demonstrated at the trial that during the time Ross claimed that someone else ran Silk Road, he was receiving all of the bitcoin commissions from the Silk Road escrow account. So that makes it fairly impossible for anyone else to have been DPR.
off, this was one of the best pieces of journalism I've read in a long time. I couldn't wait for part 2! I read it this morning. What are your thoughts about Hollywood turning this into a blockbuster? THANKS! I appreciate it. Man, it was a beast to report and write. But rewarding to get a huge story like this into Wired, in two parts even.
As for a film adaptation, this story has been optioned. And efforts are underway. I was struck while writing this story how it hit the zeitgeist of our time, with drugs and entrepreneurialism and youthful idealism, and also underlined some deep, resonant themes about how we live now, mediated through the digital world, and fragmented identity -- all within the quick-moving narrative of a true crime case. I think that could make for a great movie. As I said somewhere in the story, sort of a true crime version of The Social Network.
Hello, thanks for the AMA. What do you think of the current U.S. drug laws? I think the War on Drugs is a failure. An expensive one. And broadly favor decriminalization. Although I haven't given real thought to whether that should extend to opiates, etc.
Also, the drug laws have led to massive incarceration, and helped destroy an urban generation. So, in that sense, I sympathize with that part of the Silk Road (and Ross') early philosophy. The problem, of course, was when that idealism turned into ideology. And it became a criminal enterprise rather than just a political idea.
1) I know a lot of media hype was placed upon Silk Road being an "Amazon for all things illegal". Have there been any confirmed cases of it selling anything other than drugs (such as counterfeit products, weaponry, or even being used to hire a hitman)? 1) Yes, the hype was a radical over-simplification. Silk Road was mostly drugs. And some odd ordinary items, like you'd find on eBay. The rules prohibited anything that would harm someone else, like identity theft stuff. (Although sometimes that stuff wound up on there anyhow.) There was no child porn. There were no guns, although DPR created the short-lived Armory, for that express purpose.
2) If DPR had more of a technical background (or at least been more careful to take care of all the security threats), do you think Silk Road would still be active today? 2) Yes. I think so. Had he known how big it would become, had tight op-sec from the beginning, and been a professional programmer, rather than learning along the way, Silk Road might very well still be operating, its servers undetected.
How has your personal life been affected by the publishing of these stories about Silk Road? What types of praise or criticism have you seen since publishing? Any legal action? I'm very interested in what happens to reporters lives and careers after exposing stuff like this. No personal effect, other than people seem to like the story! I did have to be very careful, obviously, with law enforcement info. You can veer close to subpoenas with reporting like this. I had never done that kind of reporting before. I also had to keep the confidence of sources from inside Silk Road. That was just as important to protect.
And for the most part, there's been little criticism of the story. I hope that's because it was so exhaustively reported! And fact-checked, and edited, and reviewed by lawyers, etc.
Last updated: 2015-05-18 17:50 UTC
This post was generated by a robot! Send all complaints to epsy.
submitted by tabledresser to tabled [link] [comments]

[Table] IAmA: Hey, Alex Winter of Bill & Ted here. Directing a new movie called "Deep Web: The Untold Story of Bitcoin and Silk Road." Ask me anything!

Verified? (This bot cannot verify AMAs just yet)
Date: 2013-11-25
Link to submission (Has self-text)
Questions Answers
As someone who creates content, do you think there's a solution for middle class content creators? It seems that they're the most hurt by piracy, yet free-culture proponents almost exclusively focus on large corporations. Kickstarter, Indie Go-Go, and their brethren aren't picking up that slack- tales of success seem to be the outliers, and many of the poster-children (Radiohead, Amanda Palmer, etc.) rely on past success and marketing dollars. So, will this pick up, and will there be a middle class of creators? Or are we now living in a world of (sometimes skilled, but still) amateurs? This is a smart question and demands a much longer answer than i can give here. but the short of it in my opinion is that it's a misunderstanding to assume it's harder for 'middle class artists' in this climate. it's always been very very hard. there have always been obstacles and gatekeepers. the digital landscape has opened many many doors and closed some doors. it's in many ways easier, but you still need that magic combo of talent, tenacity and luck.
Man I'm sorry but I've gotta ask...what happened to you man? Why did Keanu make it out and why did you disappear into obscurity? Haha. not an offensive question at all. I quit acting professionally in 94, after Freaked to focus on writing and directing. I'd been acting professionally since I was 10 years old and I wanted out of the public eye. It's really only been in the last couple of years that i've intentionally been slipping back in front of the camera. But I think it's important for child actors to spend time away from constant exposure. I tell a lot of kids this in that field.
Be honest…has Keanu admitted his immortality to you? I could tell you but then I'd have to kill you. And then he would drink your blood and live for another millenia...
Did you buy any Bitcoins before they blew up in value recently? Haha, I did not. The Winklevoss twins got them all :)
Since George Carlin has died, will there be some new character coming in to replace Rufus in helping the Wyld Stallyns? We've spent a lot of time and thought on making this work. all i can say right now :)
On a scale of 1 to 10, how likely is it that B&T 3 will be financed and actually get made? I'd say 10 but it's Hollywood... so 9.9?
Did you ever use the SR before it went down? I honestly did not. I am a dull family man and most of what i need to purchase online can be found in the toddler section of Amazon :)
Your stepmom is cute. Remember when she was a senior and you were a freshman? Do You get BnT references constantly and do they annoy you? No, thankfully I like the movies a lot. I have some friends who acted in movies that they can't shake that they hated. that is an existential nightmare from which one can never awaken!
Thanks for doing this AMA, and for being part of one of my all-time favorite films. You've been quoted as saying "[Bill and Ted] was a happy accident. No one thought it would ever see the light of day." Could you expand on that? Both BnT movies were made independently. The first one was really low budget and kind of under the radar when we made it. then it sat on a shelf for a year after being made, when the producing company went belly up. So we kind of gave up on it. Then it was bought up and released and was a big hit :)
What was it like working with Mr. T? Is his public persona accurate as to who he really is? It is! Exactly! He's a really great person, into community outreach and helping people. A wonderful guy.
When will we have a new Bill and Ted to watch any plot details You can share? What got You so interested in Bitcoin? Also, Thank You for being so Excellent! Party On! I first got interested in Bitcoin in '09, when it magically appeared out of the ether. Much like Napster appeared out of nowhere 10 years prior. I recognized that Bitcoin felt like the next big thing to come out of peer-to-peer.
What can I do to get into the Bitcoin World. I don't know much about it. Start at blockchain.info. that will lead the way.
Do you think the Tor network is forever tainted due to the Silk Road takedown, or does it still remain a viable method of obtaining true anonymity on the Internet? Absolutely not. SR accounts for a tiny fraction of TOR use and is not going to impact Bitcoin much either in the long run. As Wozniak so perfectly put it, you don't shut down the whole highway when one car is speeding.
What was the funnest thing about making The Lost Boys? Having dirt kicked into my eyes by the two Coreys in my death scene. Actually it wasn't funny at the time; i had full eye contacts in and my cornea got scratched. had to go the hospital. Loved those guys tho...
Any cool memorabilia you kept from Bill and Ted? I had my evil robot head from BnT 2, but it eventually rotted. I used it as a doorstep. My kids loved it :)
What motivated you to be one of the first films to educate those about the online blackmarket? why exactly do you need the funding from the kickstarter? Because, like the Napster story, there is a lot of noise but not a lot of context. I think we need some context and our film will be one form of providing that. We are using Kickstarter for some of the funding in order to begin to build our community for the film. We want people's input, the changes occurring through the Web are part of a global movement.
Are you actually going to provide any information we don't already know from all that's been written about this? Is this just a movie version of a bunch of news articles? Our doc is an expansive examination of a movement that began decades ago and is now hitting a peak of global impact. we are interviewing the core players in this story. It's not the kind of thing news articles do in any capacity. join our kickstarter, be part of the process and of the movie's community :)
How did you do research for the script? How did you get a script just a few weeks after SR was busted? It's a documentary :)
Alex, as someone who studied Napster so much for Downloaded, what would Bill & Ted have thought of it: Most Excellent or Non-Triumphant? They would have said 'huh???'
Is a melvin a synonym for wedgie, or a completely different maneuver executed from the front? You answered your own question :))
Is there any fond memory that stands out from making The Lost Boys? Honestly the most fun i ever had 'working'. Joel Schumacher knows how to create an amazing environment to work in. It's one of my fondest memories of my crazy youth! :)
On the kickstarter page, under the "Silk Road" header, the phrase "trading mostly in drugs and weapons" is used. Don't you feel that claiming that weapon sales were a large part of the silk road's operations is misleading? especially since weapon sales were specifically banned from the site shortly after its creation? Certainly the part about mostly trading in drugs is spot on, but also weapons? Come on, that's just untrue. Sorry if that seems misleading. As the Armory only lasted a year. But SR was built for that purpose wherever it ultimately landed.
I don't know if you remember me, but I went to school with your son in LA, me and my brother stayed at your house a few times. Kinda funny how I never got to thank you for being so excellent in Bill and Ted back then, so I figured I'd do it now! Hey Dante! Hope you guys are well!
I suppose I should ask a question, so what drew you to the idea of the deep web? What made you want to make this movie? The Deep Web lies at the heart of the digital revolution, that has impacted every corner of our lives. There are huge changes that have occurred in the last decade, and many more around the corner. Examining the Deep Web in detail allows us to closely examine this revolution and its implications.
Do you think that the high prices that bitcoins are experiencing right now is actually a bad sign, since it indicates instability? Where do you think the value of Bitcoins will ultimately fall once the bubble bursts? No one knows where it will settle. It's not unlike gold in this regard. But once it's been around a bit longer and more people are taking it, the value will increase within that framework but not in such a wild manner. this form of currency is here to stay, of that there is no question.
How did people find silk road online? That always boggled my mind, because I assume it wasn't as easy as googling it haha Did you have to like, "know" someone in the business to gain membership? It's not hard to find these sites, it's just dangerous. don't go hunting for scorpions unless you are prepared to get stung.
So Deep Web... Do you have a script already? Are you dealing with the actual events, or fictionalizing them? If the former, are you worried about having to pay folks for rights? If you have a script, how does it toe the line between being too simplified to please the target demo/actually tell the story and too esoteric for the mass market? It's a feature documentary. please join our kickstarter :)
I don't think the story is too esoteric at all, just as the details of the Napster story weren't. These are universal stories about global communities.
How much about the deep web did you investigate? I have done some looking into it recently and there is some pretty disgusting stuff out there. To be honest I kind of wish I never heard about it. Silk road is only the tip of the iceberg and to me doesnt seem like that big of a deal compared to some of the other stuff out there like the hitmen websites and human dolls for sale etc. What is your take on the rest of it outside of silk road? There is a lot of dark and horrible stuff in the Dark Web. The Deep Web is a much broader world, and in my view needs to be understood as separate from the much smaller Dark Web, and in need of protection.
When did you get into directing? I realize I could easily find this out on IMDB but it's just cooler to ask the source! Hah, thanks for asking! I actually went to NYU film school to study directing before I acted in all the movies. It's always been one of my passions. I started directing professionally in about 86. Shooting music videos and commercials and then our show on MTV, The Idiot Box.
So I'm guessing MTV/Viacom or somesuch own the DVD rights to The Idiot Box? There was a fair amount of comedy from that era of MTV that I'd love to be able to watch again… MTV owns it... why no DVD... yet...
What was it like working with a big star like Larry "bud" Melman? He was awesome of course. RIP.
Wait, does Satoshi = Stations??? Ahhh you cracked the code!!!
Excellent job on Downloaded! I enjoyed remembering a time in the not so distant past when 'regular people' could not envision a world in which their music lived on a computer. Today, regular people cannot envision a world in which their money lives on a computer. I was also surprised to learn about your early connection with the world of MP3s. Could you elaborate on what you think we can learn about Bitcoin based on your experiences with Napster and the MP3 scene in the late 90's? The world is responding to Bitcoin and a new awareness of the Deep Web much like they responded to Napster, with fear and demonizing. Our film aims to put these things in some context.
What made you want to do this documentary? I've been following the story myself and it's certainly one worth following but how did you yourself first get interested in the topic? I have been interested in global web-based communities and emerging technologies since the mid 80's. There is a revolution occurring in global culture at the moment, that will change everything. and it's only just beginning. what's not interesting about that?? :)
I don't have a question but Excellent Adventure made me who I am today. Thank you. Fuck it, uh. Do you agree that Cinnamon Toast Crunch is hands down the best cereal? My kids do. it's evil.
off, I want to thank you for posting my Rasta Eyeball with a machine gun tattoo on your blog. It made getting it completely worth it. I just want to know which of the characters from Freaked is your favourite? Stuey Gluck!!
And your tat is amazing!
Hello there, thanks for doing this! I just wanted to ask if by making a movie that sheds light on the dark web/bitcoins etc. It will shed more light on an area of the web that generally dislikes the attention. In other words could it create a misaprehension of the mission and possible positive effects the darkweb community tries to provide? I think the current media spin has that effect; in that it tends to paint the entire deep web and bitcoins and cryptography with a negative brush. this is both inaccurate and destructive. Our movie does not paint dark things in a positive light, it gives context to the entire arena.
Will the Silk Road be back? Also, can you say hi to my smokin hot babe Sherry? It is back.
Hey Alex, A quick glance at your wikipedia page has made me realise you directed Knock Me Down by RHCP! Did you have much contact with the band? How was it working with them? Thanks for the AMA; Looking forward to B&T3! I love the chili's and have known them for decades. they are still great, but in the mid 80's when I had the fortune of doing some work with them, it is hard to quantify how amazing they were. the best live act on the road, by far!!
So when are you planning to bless the world with Bill & Ted 3? Soon as we get it up and running!
If you could star in any movie from any time, what movie would it be and what role would you have and why? Buster Keaton in anything probably. No one in the movies ever had a better time.
So what is the "untold" story of Bitcoin/Silk road? Isn't most of it public knowledge by now? Or we'll we have to wait and see the movie? You don't have to wait if you join our Kickstarter and become part of the making of the movie! It is hardly public knowledge as no one has framed this story up yet in one film, and the story itself is unfolding every day. :)
What was the most surprising thing you found out about the Silk Road? That's in the movie :)
Hey Alex, What will Deep Web be like? Sort of a CNN special or does it have a bigger ambition, i.e. are you making it on a scale for wide distribution in movie theaters? If the latter, what documentaries would you compare it to in terms of style and storytelling? Our doc has a broader ambition than reportage. We are making a film about a technological revolution that has been brewing for decades.
Hm, don't know you but this does sound interesting. When can we expect this movie to come out? Anything interesting about these topics you learned? Every day I learn something new and fascinating. We hope to finish within the next year. Join our kickstarter and be part of our community :)
What ''good'' is there in the deep web? I only hear stories about horrific things like drugs, black market stuff, assassins, etc. Also, were you fortunate enough to had invested in bitcoin in it's early stages? The Deep Web is being demonized somewhat in the press, which is a misunderstanding of what it is. DW represents all content on the web that is not indexed. this doesn't mean people are doing bad things. it means they are unseen. the Dark Web is a term that has come to characterize people who use the web for illicit means. the dark web represents a fraction of the Deep Web.
On your Kickstarter campaign, you say, "Bitcoin has the potential to create a level of global disruption that will make Napster look like child's play." Can you expand on that? BitCoin is a peer to peer crypto-currency. Like any peer to peer technology it is decentralized and operated by a wide user base spread across the net. As such it is here to stay, and being an unregulated currency that exists outside the control of banks and governments, it is poised to have a massive impact on the world. That's what I mean :)
Why are you focusing on the darker side of the deep web instead of the good side? Its virtues clearly outweigh the illegal stuff. As someone who appreciates the privacy benefits of Bitcoin, TOR and the Deep Web, I am concerned about the public's disproportionate focus on its negative and illegal uses. Do you plan to address this bias at all? Question 1: I am absolutely not only focusing on the dark side of the Deep Web. In fact one of my key points is that the Deep Web is misrepresented, and inaccurately represented. It is mostly just a reference to all the content on the web that is not indexed. Most of which is not dark and a lot of which is frankly boring private data :)
Are you accepting Bitcoin for the financing of this film? If not, why not? Again, thanks for doing this, but I am concerned that your focus on the negative side of TOR will continue to twist the public's perception in the wrong direction. 2: We will absolutely be accepting BTC for the movie. But Kickstarter does not accept BTC so we are doing that separately. Stay tuned!
3: Yes the bias is a big problem and we will debunk the myths, just as I did with Downloaded. People like to hold onto their preconceptions tho, so I have no illusions about turning the world around :) A lot of people loved my Napster movie, but there were many in the mainstream press who were outraged that I didn't spend more time castigating the Napster architects for being thieves who created piracy software, when clearly that is not the truth, just the well-spun myth. but myths die hard.
How concerned are you with getting all the details right? You plan to talk about things happening in the more obscure and less legal parts of the Internet. The people who use those parts of the Internet are often pretty knowledgeable about the fine technical details, and are annoyed when people get them wrong. Even the term "Deep Web" has a whiff of "Information Superhighway" or "Series of Tubes" about it. Aside from just wanting to get the details right for the sake of having an informative and accurate documentary, are you concerned at all with upsetting the wrong kinds of people by doing this? After all, the guy behind Silk Road is rumoured to have tried(?) to have people killed. Our film isn't a Silk Road movie but an exploration of the history and evolution of the Deep Web, as told by its architects. That is the story that I believe matters most :)
Are you covering other crypto currencies? Also, I didn't think porn hid on the internet. I am yes. This movie is largely about the crypto-revolution.
What are your thoughts on the rather dubious "hired a hitman" charges against DPR (Ross Ulbricht)? Do you think law enforcement used parallel construction to identify the SR server or otherwise make the case against SDPR? Looking forward to this documentary, and I'm a huge fan of Bill and Ted! It's a really fascinating case that is unfolding and changing constantly. No one knows the full story at the moment outside of the Feds, and I'm sure they're chasing some crazy leads trying to iron it all out!
Hey Alex I was just wondering if you used Silk Road for movie research and what the movie is gonna be about? The site used to pride themselves on anonymity so is it a lot of speculation about what goes on behind the curtain or were you able to actually talk to and interview the people behind the scenes of the website? I didn't use SR for research but am in contact with many people close to the world and story.
Can I donate to the Deep Web movie via Bitcoin? I loved the Napster doc, and am super excited for this one, since judging by your prior work I think it will be very high quality. There was no bitcoin address listed on the kickstarter page! Yes Kickstarter does not allow BitCoin pledges. We will have a BitCoin option soon!
Bitcoin is seen as a "dirty" term by the media as it usually relates to illicit activities, what could make it a more clean and friendly method of payment to Joe Smith who runs a small florist in a mid size town in Washington? Time. people need to get used to crypto-currency. it's here to stay and perfectly legitimate unto itself.
I've always been a fan of Bill and Ted, however this question does not related to your career. You actually grew up next to my Dad (His name is Nick) in St. Louis/Clayton. He said your family loved television, and that he always joked your television might blow up one day. As ridiculous as that sounds apparently it actually happened to you guys one day. So did this actually happen? Is my father a liar? How much television does it take before it explodes? Wow that is some ancient history! Yes when I was five my brother and I got into a fight and someone hit the tv with their body, hard (such is the way of fraternal skirmishes, my bro and I have actually always been super close). We didn't know we had blown some of the electricals inside the TV and the next time it was turned on it exploded into flames (for real!) and burned the whole house down (totally true story!!)
What are your thoughts on other cryptocurrencies like Litecoin? I think it is early days for crypto-currency and eventually one will rule the roost. Whichever proves to be the most stable, trustworthy and provides the best ease of use.
I just hope that it's objective and that it doesn't needlessly throw BitCoin into dis-appeal. I mean, there have been other digital currencies which had been used for drugs, hitmen, child porn, whatever else. Sigh. Just don't slander it, k? <3 I totally agree with you, that's the movie :)
Are you worried about how Deep Web will portray bitcoin? Us bitcoin folks are already rather irritated about how much people make the point that bitcoin is used for illegal things, without pointing out that cash is used for the same thing. Oh we are making very very clear all the legitimate uses for Bitcoin.
Alex, do you think that Satoshi Nakamoto has any sort of link or relationship to Ross Ulbricht? Yes some people have been saying that. There are other people believed to have created Bitcoin that we are talking to.
What are your personal thoughts on the deep web and how it operates? Do you think the bit coin business model is the future of personal commerce? I do yes.
Don't you think it is a little early to start writing a story before the truth is completely released? I've been following the take down since day one and there are still so many things that haven't been answered. Absolutely. Our movie is about the Deep Web, it's not a Silk Road movie.
What do you think about Silk Road 2.0 being open? Inevitable.
Have you been able to get any key actors in Bitcoin, Silk Road etc to go on the record unanonymously? BTW...San Dimas HS football rules! Yes we have :)
I live in San Dimas. Do you know what you've done to me any time I meet people from out of town? Sorry. truly. We didn't shoot there, we shot it in Phoenix, so I never thought about San Dimas one way or the other. Until many years later I made the mistake of taking my kids to the water park there without thinking about it. Very very very VERY big mistake for "Bill" to waltz into a water park in San Dimas...
What do you think George Carlin would have said about Bitcoin and Silk Road? Link to www.youtube.com
Can you please make sure that bitcoin ends up not getting the image of "crack dollars"? I'd like if people didn't associate bitcoins with just silk road. Agree!!
Bill& Ted 3: elaborate please! We have the script and our producing team on board, in finance mode now... :)
What is socrates like in real life. A windbag.
New Idiot Box sketches on YouTube please. Burrowing Bishop, If I Had My Way, etc.etc. I think everything we shot has made its way up there :)
I have yet to ever have a question answered in an AMA, not a question but a simple acknowledgment of my existence would be fantastic. Love BnT BTW. You exist!!!
We demand a sequel to Freaked. That is all. Me too! One day... many many eons from now... it will happen...
Can you give me 3 words that will best describe the movie to me. Join our Kickstarter! :)
Last updated: 2013-11-29 19:11 UTC
This post was generated by a robot! Send all complaints to epsy.
submitted by tabledresser to tabled [link] [comments]

armory offline instructions Receiving Bitcoin - Armory Guide The Truth About Used Mining Cards... - YouTube Personalisierte Patronenbox aus Holz by German Armory so funktioniert es Guns N' Bitcoin - YouTube

The Armory began as an offshoot of The Silk Road, notable as the Internet's foremost open drug bazaar, where anything from heroin and meth to Vicodin and pot can be picked out and purchased like a ... Thank You for Shopping at The Armory - Your Premier Dealer for Guns and Ammo for Sale! We offer great deals and expert service. The Armory is a federally licensed firearms dealer, stocking brands of long guns, handguns and ammunition. Available for in-store special order, we can try to get what you need - a Taurus revolver, Browning shotgun, Glock pistol, Remington rifle, or any caliber of ... Frontier Tactical CEO Nate Love told Guns.com Tuesday a few people have used Bitcoin and Litecoin to buy smaller items from his online store since launching the currencies in December. Last August, The Armory shut down because it didn't generate enough business, according to the site's administrator. But several other online gun dealers are still operating. One such site, Black Market Reloaded, listed 291 weapons for sale on Friday, from fireworks to guns to explosives. A semi-automatic pistol with a silencer was on sale for the bitcoin value of about $2,500, even though ... armory shotgun free download - Armory Shotgun Pro: Firearms Simulator Mini Armory Vol 1, Shotgun Free, Bitcoin Armory, and many more programs

[index] [23324] [44556] [41966] [47603] [31770] [32727] [47003] [12051] [33869] [26938]

armory offline instructions

Bitcoin Armory Setup - Duration: 14:37. Bitcoin Nick Rambos 4,925 views. 14:37. Bitcoin 101 - Intro to Paper Wallets & Cold Storage - Bitcoin Security & Fun with Sloppy Wallets - Duration: 26:57. ... L96A1 Sniper rifle [rubber band gun] ... Bitcoin Armory Setup - Duration: 14:37. Bitcoin Nick Rambos Recommended for you. 14:37. DIY How to Paint like a Pro Series A to Z - Duration: 40:24. Home ... Bitcoin Armory Troubleshooting Offline Node - Duration: 10:57. Bitcoin Nick Rambos 1,002 views. 10:57. Bitcoin vs. Gold: The Future of Money ... Guns & Gear airs on Pursuit Channel from June to December, and Sportsman Channel from January to June. Check your local listings for additional channel information. Watch show segments, learn more ... Destiny 2 Black Armory: Journey to the Forge Destiny 2 Review Subscribe - http://www.youtube.com/subscription_center?add_user=benwca Twitch - http://ww...

#