The Blake Benthall Complaint, full text

After the arrest of Blake Benthall for allegedly operating Silk Road 2.o a PDF began circulating which purports to be a copy of the complaint against Benthall. Qntra presents the text of the alleged complaint liberated from its PDF turd:

Approved: o
TIMOTHY T. HOWARD
Assistant United States Attorney

Before: HONORABLE GABRIEL W. GORENSTEIN

 
  
 

as  

 

UNITED STATES OF AMERICA SEALED COMPLAINT
Violations of

21 U.S.C. § 846;

l8 U.S.C. §§ lO28, lO30 &

_V_._

BLAKE BENTHALL,

a/k/a “Defcon,” 1956
Defendant. E COUNTY OF OFFENSE:
: NEW YORK

. . . _ _ _ _ _ _ . _ _ , . . . . _ . . . . . . . . . . . . . . _ . . _ _ . . . . . . . . V 7 . . — V . . . . . . . . . . . . , V 7.!

SOUTHERN DISTRICT OF NEW YORK, SS.:

Vincent D. D’Agostino, being duly sworn, deposes and says
that he is a Special Agent with the Federal Bureau of
Investigation (“FBI”) and charges as follows:

COUNT ONE
(Narcotics Trafficking Conspiracy)

1. From in or about November 20l3, up to and including in
or about October 2014, in the Southern District of New York and
elsewhere, BLAKE BENTHALL, a/k/a “Defcon,” the defendant, and
others known and unknown, intentionally and knowingly did
combine, conspire, confederate, and agree together and with each
other to Violate the narcotics laws of the United States.

2. It was a part and an object of the conspiracy that
BLAKE BENTHALL, a/k/a “Defcon,” the defendant, and others known
and unknown, would and did distribute and possess with the
intent to distribute controlled substances, and aid and abet
such activity, in violation of Title 21, United States Code,
Section 84l(a)(l).

3. It was further a part and an object of the conspiracy
that BLAKE BENTHALL, a/k/a “Defcon,” and others known and
unknown, would and did deliver, distribute, and dispense
controlled substances by means of the Internet, in a manner not

authorized by laws and aid and abet such activity, in violation
of Title 21, United States Code, Section 841(h).

4. The controlled substances that BLAKE BENTHALL, a/k/a
“Defcon,” the defendant, conspired to distribute and possess
with the intent to distribute, and to deliver, distribute, and
dispense by means of the Internet, in a manner not authorized by
law, and to aid and abet such activity, included, among others,
1 kilogram and more of mixtures and substances containing a
detectable amount of heroin, 5 kilograms and more of mixtures
and substances containing a detectable amount of cocaine, and 10
grams and more of mixtures and substances containing a
detectable amount of lysergic acid diethylamide (LSD), in
violation of Title 21, United States Code, Sections 812,
841(a)(1), and 841(b)(1)(A).

Overt Acts

5. In furtherance of the conspiracy and to effect the
illegal objects thereof, the following overt acts, among others,
were committed in the Southern District of New York and
elsewhere:

a. From in or about December 2013, up to and
including in or about October 2014, BLAKE BENTHALL, a/k/a
“Defcon,” the defendant, owned and operated an underground
website, known as “Silk Road 2 O," that provided a platform for
drug dealers around the world to sell a wide variety of
controlled substances via the Internet.

b. On or about July 30, 2014, BENTHALL transferred
the Silk Road 2.0 website to a different server, in order to
conceal its location and to hide it from law enforcement.

(Title 21, United States Code, Section 846.)

COUNT TWO
(Conspiracy to Commit and Aid and Abet Computer Hacking)

6. From in or about November 2013, up to and including in
or about October 2014, in the Southern District of New York and
elsewhere, BLAKE BENTHALL, a/k/a “Defcon,” the defendant, and
others known and unknown, intentionally and knowingly did
combine, conspire, confederate, and agree together and with each
other to commit computer hacking offenses, and to aid and abet
the same, in violation of Title 18, United States Code, Sections
1030(a)(2) and 2.

7. It was a part and an object of the conspiracy that
BLAKE BENTHALL, a/k/a “Defcon,” the defendant, and others known
and unknown, would and did intentionally access computers
without authorization, and thereby would and did obtain
information from protected computers, for purposes of commercial
advantage and private financial gain, and in furtherance of
criminal and tortious acts in violation of the Constitution and
the laws of the United States, and would and did aid and abet
such unauthorized access, in violation of Title 18, United
States Code, Sections 1030(a)(2) and 2.

Overt Act

8. In furtherance of the conspiracy and to effect the
illegal object thereof, the following overt act, among others,
was committed in the Southern District of New York and
elsewhere:

a. From in or about December 2013, up to and
including in or about October 2014, BLAKE BENTHALL, a/k/a
“Defcon,” the defendant, owned and operated an underground
website, known as “Silk Road 2.0,” that provided a platform for
the sale of illicit goods and services, including malicious
software designed for computer hacking, such as password
stealers, keyloggers, remote access tools, and computer-hacking
services.

(Title 18, United States Code, Section 1030(b) )

COUNT THREE
(Conspiracy to Transfer Fraudulent Identification Documents)

9. From in or about November 2013, up to and including in
or about October 2014, in the Southern District of New York and
elsewhere, BLAKE BENTHALL, a/k/a “Defcon,” the defendant, and
others known and unknown, knowingly and willfully did combine,
conspire, confederate, and agree together and with each other to
transfer fraudulent identification documents, and to aid and
abet the same, in violation of Title 18, United States Code,
Sections 1028(a)(2).

10. It was a part and an object of the conspiracy that
BLAKE BENTHALL, a/k/a “Defcon,” the defendant, and others known
and unknown, would and did knowingly transfer, in and affecting
interstate and foreign commerce, and in the mail, false
identification documents and authentication features, knowing

that such documents and features were produced without lawful
authority, including driver's licenses, personal identification
cards, and documents that appeared to be issued by and under the
authority of the United States, and would and did aid and abet
such transfers, in violation of Title 18, United States Code,
Sections l028(a)(2) and 2.

Overt Act

11. In furtherance of the conspiracy and to effect the
illegal object thereof, the following overt act, among others,
was committed in the Southern District of New York and
elsewhere:

a. From in or about December 2013, up to and

including in or about October 2014, BLAKE BENTHALL, a/k/a
“Defcon,” the defendant, owned and operated an underground
website, known as “Silk Road 2.0," that provided a platform for
the sale of illicit goods and services, including fraudulent
identification documents, such as fake driver's licenses and
passports.

(Title 18, United States Code, Section 1028(f).)

COUNT FOUR
(Money Laundering Conspiracy)

12. From in or about November 2013, up to and including in
or about October 2014, in the Southern District of New York and
elsewhere, BLAKE BENTHALL, a/k/a “Defcon,” the defendant, and
others known and unknown, intentionally and knowingly did
combine, conspire, confederate, and agree together and with each
other to commit money laundering, in violation of Title 18,
United States Code, Sections 19S6(a)(1)(A)(i) and
1956(a) (1) (B) (i).

13. It was a part and an object of the conspiracy that
BLAKE BENTHALL, a/k/a “Defcon,” the defendant, and others known
and unknown, in offenses involving and affecting interstate and
foreign commerce, knowing that the property involved in certain
financial transactions represented proceeds of some form of
unlawful activity, would and did conduct and attempt to conduct
such financial transactions, which in fact involved the proceeds
of specified unlawful activity, to wit, narcotics trafficking,
identification document fraud, and computer hacking, in
violation of Title 21, United States Code, Section 841, and
Title 18, United States Code, Sections 1028 and 1030,

respectively, with the intent to promote the carrying on of such
specified unlawful activity, in violation of Title 18, United
States Code, Section 1956(a)(1)(A)(i).

14. It was further a part and an object of the conspiracy
that BLAKE BENTHALL, a/k/a “Defcon,” the defendant, and others
known and unknown, in offenses involving and affecting
interstate and foreign commerce, knowing that the property
involved in certain financial transactions represented proceeds
of some form of unlawful activity, would and did conduct and
attempt to conduct such financial transactions, which in fact
involved the proceeds of specified unlawful activity, to wit,
narcotics trafficking, identification document fraud, and
computer hacking, in violation of Title 21, United States Code,
Section 841, and Title 18, United States Code, Sections 1028 and
1030, respectively, knowing that the transactions were designed
in whole and in part to conceal and disguise the nature, the
location, the source, the ownership, and the control of the
proceeds of specified unlawful activity, in violation of Title
18, United States Code, Section 1956(a)(l)(B)(i).

Overt Acts

15. In furtherance of the conspiracy and to effect the
illegal objects thereof, the following overt acts, among others,
were committed in the Southern District of New York and
elsewhere:

a. From in or about December 2013, up to and
including in or about October 2014, BLAKE BENTHALL, a/k/a
“Defcon,” the defendant, owned and operated an underground
website, known as “Silk Road 2.0," that provided a platform for
the sale of controlled substances, malicious software, and
fraudulent identification documents, among other illicit goods
and services, and laundered the proceeds from such sales,
through the use of a payment system based on Bitcoins, an
anonymous form of digital currency.

b. From in or about December 2013, up to and
including in or about October 2014, BENTHALL operated a Bitcoin
“tumbler” as part of the Silk Road 2.0 payment system to further
ensure that illegal transactions conducted on the site could not
be traced to individual users.

(Title 18, United States Code, Section 1956(h).)

**-k

The bases for my knowledge and for the foregoing charges
are, in part, as follows:

16. I have been a Special Agent with the FBI for
approximately ten years. I am currently assigned to a
cybercrime squad within the FBI’s New York Field Office. I have
been personally involved in this investigation, which was
conducted jointly by the FBI and Homeland Security
Investigations (“HSI”) with assistance from the Drug Enforcement
Administration's New York Organized Crime Drug Enforcement
Strike Force. This affidavit is based upon my investigation, my
conversations with other law enforcement agents, and my
examination of reports, records, and other evidence. Because
this affidavit is being submitted for the limited purpose of
establishing probable cause, it does not include all the facts
that I have learned during the course of my investigation.

Where the contents of documents and the actions, statements, and
conversations of others are reported herein, they are reported
in substance and in part, except where otherwise indicated.

17. As part of the investigation an HSI agent acting in an
undercover capacity (the “HSI—UC”) successfully infiltrated the
support staff involved in running the Silk Road 2.0 website and
was provided access to private areas of the website available
only to BLAKE BENTHALL, a/k/a “Defcon,” the defendant, and his
administrative staff. In that role, the HSI—UC regularly
interacted directly with BLAKE BENTHALL, a/k/a “Defcon,” the
defendant. Except where otherwise indicated, all references in
this Complaint to communications involving “Defcon" and other
co—conspirators were obtained by the HSI—UC through his
undercover access to Silk Road 2.0. I have reviewed screenshots
taken by the HSI—UC that document all the referenced
communications.

OVERVIEW

18. Since in or about December 2013, BLAKE BENTHALL, a/k/a
“Defcon,” the defendant, has secretly owned and operated an
underground website known as “Silk Road 2.0” — one of the most
extensive, sophisticated, and widely-used criminal marketplaces
on the Internet today. Since its launch in November 2013, Silk
Road 2.0 has been used by thousands of drug dealers and other
unlawful vendors to distribute hundreds of kilograms of illegal
drugs and other illicit goods and services to over a hundred
thousand buyers throughout the world, as well as to launder tens
of millions of dollars generated by these unlawful transactions.

As of October 2014, Silk Road 2.0 was generating sales of at
least approximately $8 million in United States currency per
month.

19. Silk Road 2.0 was created in the wake of the
Government's seizure in October 2013 of the website known as
“Silk Road” (hereinafter “Silk Road 1.0”) and the arrest of its
alleged owner and operator, Ross William Ulbricht, a/k/a “Dread
Pirate Roberts.” Silk Road 1.0 had been designed to enable
users anywhere in the world to buy and sell illegal drugs and
other illegal goods and services anonymously and beyond the
reach of law enforcement. Before its seizure in October 2013,
Silk Road 1.0 was used extensively to facilitate such
transactions.

20. On or about November 6, 2013, several weeks after the
Government shut down Silk Road 1.0 and arrested Ulbricht, Silk
Road 2.0 was launched. Silk Road 2.0 was specifically designed
to fill the void left by the Government's seizure of Silk Road
1.0 and was virtually identical to Silk Road 1.0 in its
appearance and function. In particular, like its predecessor,
Silk Road 2.0 operated exclusively on the “Tor” network,1 and
required all transactions to be paid for in Bitcoins,2 in order
to preserve its users’ anonymity and evade detection by law
enforcement.

21. Silk Road 2.0 initially was owned and operated by
another individual (hereinafter referred to as “DPR2”) who
adopted the online pseudonym “Dread Pirate Roberts,” which
allegedly had been used previously by Ross Ulbricht. Then, on

1 The Tor network (“Tor”) is a special network of computers on

the Internet, distributed around the world, that is designed to
conceal the true IP addresses of the computers accessing the
network, and, thereby, the locations and identities of the
network's users. Tor likewise enables websites to operate on
the network in a way that conceals the true IP addresses of the
computer servers hosting the websites. Such “hidden services”
operating on Tor have complex web addresses, generated by a
computer algorithm, ending in “.onion."

2 Bitcoins are an anonymous, decentralized form of electronic
currency, existing entirely on the Internet and not in any
physical form. Bitcoins are not illegal in and of themselves
and have known legitimate uses. However, Bitcoins are also
known to be used by cybercriminals for money~laundering
purposes, given the ease with which they can be used to move
money anonymously.

or about December 20, 2013, BLAKE BENTHALL, a/k/a “Defcon,” the
defendant, who had been acting as second-in—command to DPR2,
assumed control of Silk Road 2.0 and has owned and operated the
site continuously since that time. BENTHALL has controlled and
overseen all aspects of Silk Road 2.0, including, among other
things: the computer infrastructure and programming code
underlying the website; the terms of service and commission
rates imposed on vendors and customers of the website; the small
staff of online administrators and forum moderators who have
assisted with the day—to—day operation of the website; and the
massive profits generated from the operation of the business.

BACKGROUND OF THE SILK ROAD 2.0 WEBSITE

Launch of Silk Road 2.0

22. On or about November 6, 2013, approximately five weeks
after Ulbricht was arrested and Silk Road 1.0 was shut down by
the Government, a successor website calling itself “Silk Road
2.0" emerged on the Tor network. The website clearly marketed
itself as the successor to Silk Road 1.0. For example:

a. I have reviewed screenshots reflecting that, as
of approximately November 6, 2013, the Silk Road 2.0 marketplace
was accessible from a Tor address which included an explicit
reference to Silk Road (“http://silkroad6ownowfk.onion").

b. I have reviewed screenshots of the original login
page for Silk Road 2.0, as it appeared on or about November 6,
2013. The login page contained as its background an altered
image of the seizure banner that the Government had placed on
the Silk Road 1.0 website. Whereas the original seizure banner
read “THIS HIDDEN SITE HAS BEEN SEIZED," the altered image of
the seizure notice on the Silk Road 2.0 login page read: “THIS
HIDDEN SITE HAS RISEN AGAIN.” A screenshot of the Silk Road 2.0
login page as it existed at the site's inception is attached
hereto as Exhibit A.

c. Upon logging into the site, a user received a
welcome message from the new administrator who, like the owner
and operator of Silk Road 1.0, used the online pseudonym “Dread
Pirate Roberts."3 The welcome message announced that:

3 “Dread Pirate Roberts” is a reference to a fictional character

in the 1987 motion picture The Princess Bride. Based on my
familiarity with the film, I know that the film portrays the
legend of the “Dread Pirate Roberts” character as bearing a name
not belonging a single individual, but belonging to a series of

8

It is with great joy that I announce the next
chapter of our journey. Silk Road has risen from
the ashes, and is now ready and waiting for you
all to return home.

Design of the Site

23. Throughout the investigation, I, and other law
enforcement agents, including the HSI—UC, have visited Silk Road
2.0 using undercover user accounts. From reviewing the content
of the website, I know that the site is designed in the same
manner as Silk Road 1.0 and serves the same basic illegal
function, providing an anonymous online platform for the large—
scale distribution of controlled substances, computer hacking
tools and services, fraudulent identification documents, and
other contraband. For example:

a. The appearance of the site is almost identical to
that of Silk Road 1.0, including the same distinctive green
logo, consisting of a nomad on a camel.

b. Silk Road 2.0 offers its users an almost

identical user experience to that offered on Silk Road 1.0.4
Specifically, Silk Road 2.0 is accessed through Tor browser
software at its “.onion" address, where users log onto the site
using a username and password.5 The website contains a user-
friendly interface with links to various categories of items for
sale on the site, which include, most prominently, “Drugs,”
within which are sub—categories of various types of narcotics.
Clicking on any of the links to items for sale on the site
brings up a webpage containing the details of the listing,
including a description of the item, the price, the username of

individuals, each of whom passes his name and reputation to a
chosen successor.

4 The design and functionality of the Silk Road 1.0 website are
set forth in detail in paragraphs 18(c) through 18(p) of the
complaint filed in the United States District Court for the
Southern District of New York in United States v. Ross Ulbricht,
13 Mag. 2328.

5 New users have the option of setting up a new account, and can

select their own unique username and password. Users are not
required to input any identification information, and the user
is not subject to any verification.

9

the vendor selling the item, and prior customers’ “feedback” on
the vendor's “product.” To buy an item listed, the user can
simply click the link labeled “add to cart.” The user is then
prompted to supply a shipping address and to confirm the
placement of the order. Once the order is placed, it is
processed through Silk Road 2.0’s Bitcoin—based payment system,
described further below.

c. Silk Road 2.0 contains a number of additional
communication services for its users that were also available on
Silk Road 1.0. These include: (1) a private message system,
which allows users to send messages to one another through the
site, similar to emails; (2) a customer support page, where
users can obtain help with using the website from
administrators; and (3) online forums, overseen by forum
moderators, where users can post and comment on topics relating
to the website.

d. Like its predecessor, Silk Road 2.0 also includes
its own Bitcoin—based payment system designed to facilitate
payments from users to vendors while concealing the identities
of the parties involved in the unlawful transactions. In order
to make purchases on the site, a user must first obtain Bitcoins
(typically from a Bitcoin exchanger) and transfer them to the
user's Silk Road 2.0 account. The user can then make purchases
from vendors, who receive credit for the user's payments in
their Silk Road 2.0 accounts. Vendors and users can withdraw
Bitcoins from their Bitcoin balances at any time, by providing
Silk Road 2.0 with an independent Bitcoin address,6 outside the
control of Silk Road 2.0, where the Bitcoins should be sent. At
no point in the process is the user or vendor required to
provide any identifying information to Silk Road 2.0 to move
funds through the site.

e. Like Silk Road 1.0, Silk Road 2.0 uses a so-
called “tumbler” (also referred to as a “mixer”) to process
Bitcoin transactions. Based on my training and experience, I
know that such “tumblers” are designed to frustrate the tracking
of individual Bitcoin transactions, by passing the Bitcoins
through numerous dummy transactions on the Blockchain — a public
ledger where all Bitcoin transactions are recorded. The
“tumbler” thereby obscures any link between the Bitcoin
addresses involved in Silk Road 2.0 transactions ~ making it
fruitless to use the Blockchain to follow the money trail

5 A Bitcoin “address” is the term for an account on the Bitcoin
network, where Bitcoins may be stored.

10

involved in the transaction, even if the buyer's and vendor's
Bitcoin addresses are both known. Based on my training and
experience, such “tumblers” are commonly used to assist with the
laundering of criminal proceeds.

f. Finally, as with Silk Road 1.0, Silk Road 2.0
charges a commission for every transaction conducted by its
users. At times, there has been a flat rate on all
transactions. At other times, the rate has varied depending on
the size of the sale, but generally has ranged from four to
eight percent. »

Illegal Goods and Services Sold on the Site

24. On or about October 29, 2014, I accessed Silk Road 2.0
from an undercover user account, from a computer located in the
Southern District of New York. I observed that the Silk Road
2.0 marketplace was dominated by offerings for illegal
narcotics, with 14,024 different listings offering the sale of
“Drugs,” including, among others, 1,654 listings for
“Psychedelics,” 1,921 listings for “Ecstasy,” 1,816 listings for
“Cannabis,” and 360 listings for “Opioids.” A screenshot of the
Silk Road 2.0 homepage as it appeared during this observation,
depicting product listings by category, is attached hereto as
Exhibit B.

25. On or about September 14, 2014, the HSI—UC captured
screenshots of a portion of the thousands of illegal products
and services that were available for sale on Silk Road 2.0 at
the time. Those products included, among other things:

a. Heroin: A listing for 100 grams of “Afghan
Heroin Brown Powder” for approximately 9.70 Bitcoins, the
equivalent of approximately $4,555 in United States currency,
based on the prevailing exchange rate that day.7

b. Cocaine: A listing for 5 grams of “Highest
Purity Cocaine — Direct From Colombia” available for shipment
from the United States to any location in the world. The

7 In addition, on or about October 17, 2014, I accessed Silk Road

2.0 from an undercover account and captured a screenshot of a
listing offering 1 gram of heroin (“lg #3 Afghan Heroin High
Quality Uncut Pure From the Brick") for 0.123 Bitcoins, the
equivalent of approximately $47 in United States currency, based
on the prevailing exchange rate that day. A screenshot of that
listing is attached hereto as Exhibit C.

11

listing advertised the sale of the narcotics for 1.04 Bitcoins,
the equivalent of approximately $488 in United States currency,
based on the prevailing exchange rate that day.

c. Fake Danish Passport: A listing for a fraudulent
Danish passport, with “all the security features and original
pages” of a “real Danish Passport," priced at 5.14 Bitcoins, the
equivalent of approximately $2,414 in United States currency,
based on the prevailing exchange rate that day.

d. Fake New Jersey Driver's License: A listing for
a fraudulent New Jersey driver's license, including holograms,
for 0.21 Bitcoins, the equivalent of $98 in United States
currency, based on the prevailing exchange rate that day.

e. Website Hacking Services: A listing offering a
service “to HACK the website you want,” noting that after the
service is purchased, the seller would “invest 4-7 days into
hacking the account.” The fee for the service was advertised as
1.32 Bitcoins, the equivalent of approximately $624 in United
States currency, based on the prevailing exchange rate that day,
and noted that “[h]alf the money will be paid before beginning
and half after and if I get the password.”

f. Email Hacking: A listing offering to sell a
method for hacking Gmail email accounts, for 0.09 Bitcoins, the
equivalent of approximately $42 in United States currency, based
on the prevailing exchange rate that day.

26. As part of the investigation, law enforcement agents
with the DEA have made multiple undercover purchases of illegal
narcotics from Silk Road 2.0. For example, based on reports
prepared by a DEA agent, I have learned that, in or about
September and October 2014, the DEA purchased the following
controlled substances on Silk Road 2.0: (1) 0.5 grams of heroin;
(2) two grams of cocaine; (3) 120 micrograms of lysergic acid
diethylamide (commonly referred to as “LSD”); and (4) ten 30-
milligram pills of oxycodone. Each of these substances was sent
to and received by the DEA at an undercover address located in
Manhattan, and each field—tested positive for the presence of
the controlled substance that had been ordered from Silk Road
2.0.

12

THE ROLE OF “DEFCON” ON SILK ROAD 2.0

Assumption of Control in December 2013

27. As set forth in detail below, based on my discussions
with the HSI-UC, as well as my review of public posts on Silk
Road 2.0 and private communications to which the HSI—UC had
access, Silk Road 2.0 was initially launched in November 2013 by
DPR2, but Defcon soon took over the operation of the site
approximately six weeks later in December 2013, and has remained
in control ever since.

28. Between on or about October 7, 2013 and on or about
November 6, 2013, DPR2 took various steps to launch the Silk
Road 2.0 underground market:

a. On or about October 7, 2013, the HSI—UC was
invited to join a newly created discussion forum on the Tor
network, concerning the potential creation of a replacement for
the Silk Road 1.0 website. The next day, on or about October 8,
2013, the persons operating the forum gave the HSI—UC moderator
privileges, enabling the HSI—UC to access areas of the forum
available only to forum staff. The forum would later become the
discussion forum associated with the Silk Road 2.0 website (the
“SR2 Forum”).

b. On or about October 7, 2013, DPR2 posted a
message to the SR2 Forum directed to prior vendors from Silk
Road 1.0, inviting them to participate as vendors on the planned
Silk Road 2.0 website: “To all former Silk Road vendors, we will
be providing you free vendor accounts on the new marketplace, I
do not believe you should have to pay again for the privilege of
selling if you are already established and I further recognise
the losses many of you unfortunately made during the seizure of
the original site.”8

c. On or about October 8, 2013, DPR2 posted a
message to the SR2 Forum stating, in sum and substance, that he
was not the same “Dread Pirate Roberts” who ran Silk Road 1.0
and that he had “taken steps the previous Dread Pirate Roberts
wouldn't have even thought of” to protect the servers that would
run the new website.

8 The online communications quoted in this affidavit are included

in substantially verbatim form; punctuation and grammatical
errors have not been corrected.

13

29. As noted above, the Silk Road 2.0 marketplace was
launched on or about November 6, 2013. Within approximately a
week of the launch, the HSI—UC observed an individual using the
moniker “Defcon" emerge as an administrator on the SR2 Forum.

On or about November 13, 2013, Defcon posted a message to the
SR2 Forum stating: “Just wanted to check in with you all and say
hi to the community. I won't be around on public forums often.

DPR has asked I don't discuss my role at all with you but
that is probably in the better interests of us all.” Later that
day, DPR2 responded by posting a message stating: “Welcome to
the team, Defcon, it is always good to see fresh (metaphorical)
faces.”

30. On or about December 20, 2013, the United States
Attorney's Office for the Southern District of New York
announced the arrests of three alleged administrators of Silk
Road 1.0 ~ Andrew Michael Jones, a/k/a “Inigo,” Gary Davis,
a/k/a “Libertas,” and Peter Phillip Nash, a/k/a
“Samesamebutdifferent,” a/k/a “Batman73," a/k/a “Symmetry,”
a/k/a “Anonymousasshit”. Following this announcement, and the
ensuing discussion of the arrests in the media and on the SR2
Forum, DPR2 abandoned his role as operator of Silk Road 2.0, and
Defcon took his place. Specifically:

a. On or about December 20, 2013, Defcon posted a
message to the SR2 Forum stating: “Three of our dear friends
were arrested in connection to their SR1.0 activities. They did
not have access to anything which would compromise the
marketplace. We are watching everything very closely
regardless.”

b. On or about December 22, 2013, Defcon posted a
message to the SR2 Forum concerning DPR2's reaction to the news
of the arrests: “The Captain is alive and well and is in touch
with key staff members. I cannot reveal much, but here are the
key facts: DPR places operational security above all else,
including posting updates to this forum. Given his role he has
every right to play it very safe.”

C. Later that day, Defcon posted another message on
to the S2 Forum concerning DPR2’s absence from the site, in
which he also noted that he was second—in—command to DPR2: “It
has been over 24 hours since we last heard from our Captain. He
is most certainly in grave danger. . . . As his second in
command, I have very clear instructions as to what to do in this
worst case scenario. . . I cannot elaborate on the specifics,

l4

but the marketplace is safe in my hands until the Captain
returns or his successor appears ”

d. On or about December 28, 2013, Defcon posted a
message to the SR2 Forum, announcing that he had taken over
control of the Silk Road 2.0 marketplace and would reopen it
later that day. Among other things, Defcon wrote: “Merely three
months have pass since our marketplace’s first incantation was
captured by our oppressors. This was a brutal blow, but we are
very proud that such a devastating compromise only resulted in
one month of downtime. . . . I intend to prove to you that
leading this movement forward is my top priority in life, and
that I will pour any time and energy necessary into ensuring its
success. . . While other admins may run away when calamities
strike — I'm ready to fight right here alongside youx”

Management of the Silk Road 2.0 Infrastructure

31. Since assuming control of Silk Road 2.0 as of late
December 2013, Defcon has controlled virtually every aspect of
Silk Road's operation. First, Defcon has been responsible for
the Silk Road 2.0 infrastructure, including managing its servers
and making improvements to the site to better protect users’
anonymity, among other purposes. For example:

a. Defcon has been responsible for maintaining and
upgrading the Bitcoin—based payment system on Silk Road 2.0. For
example, on or about April 7, 2014, Defcon publicly announced
the unveiling of “upgraded Bitcoin infrastructure” on Silk Road
2.0, which included “[e]xponentially faster deposit and
withdrawal times," and “[i]ncreased server anonymity.”
Similarly, on or about May 8, 2014, Defcon announced further
efforts “to expand our Bitcoin infrastructure’s ability to
process more cash deposits per minute while preserving server
anonymity and security." On both of these occasions, the HSI—UC
observed corresponding Changes to the website's Bitcoin—based
payment system following these announcements.

b. Defcon was also responsible for changing the
servers hosting Silk Road 2.0 on or about July 30, 2014, after
the Tor Project (which helps administer the Tor network)
publicly announced a vulnerability in Tor that threatened to
compromise the anonymity of Tor websites like Silk Road 2.0.
That day, Defcon responded to a message in the SR2 Forum
exclusively available to administrators and moderators,
including the HSI—UC, entitled “Re: torproject say move
servers." That message indicated that Defcon was arranging to

15

change the server hosting the Silk Road 2.0 website in light of
the reported Tor vulnerability: “We are confident our unordinary
servers are relatively safer than most hosting approaches, but
will be moving servers again today. This is very expensive and
irritating, but a necessary must. Expect a public announcement
and downtime at some point over the next 24 hours. We are
provisioning the replacements and not connecting to possibly
compromised devices.” Following this announcement, the HSI—UC
observed the Silk Road 2.0 website temporarily go offline as
Defcon had advised.

Control of Profits Generated by Silk Road 2.0

32. Defcon has also maintained control of the commission
rates for the sale of illegal narcotics and other contraband on
Silk Road 2.0. For example:

a. On or about January 14, 2014, Defcon posted a
message to the SR2 Forum in which he confirmed that he was
personally in control of the commission rates charged on the
site, which at that time ranged from four to eight percent,
based on the size of the transaction. In that message, Defcon
stated that he had “the right to set the commission structure at
whatever I want” and that “the current rates are fair given the
extreme amount of risk on staff's shoulders.” Further, Defcon
stated that he believed the commission rate was justified, given
the risks of arrest that he and his staff were assuming,
stating: “I have no doubt that we have the highest traffic and

.therefore the highest LE [i.e., law enforcement] crosshairs on

our foreheads . . . [p]urchases are going up, vendors are going
up — and alongside this, the amount of personal risk staff is
taking is exponentially going up. The bigger we become, the
more resources agencies are willing to spend on hunting us.”

b. On or about February 19, 2014, Defcon made an
announcement on the SR2 Forum that he was setting the commission
rate at five percent for all sales on Silk Road 2.0.

33. Defcon's control over the proceeds generated from Silk
Road is further evidenced by other communications of Defcon
observed by the HSI—UC, in which Defcon demonstrated intimate
knowledge of those proceeds. Those communications indicate
that, by in or about October 2014, Silk Road 2.0 was generating
at least approximately $8 million in monthly sales and at least
$400,000 in monthly commissions. Specifically:

16

a. On or about September 10, 2014 and September 11,
2014, Defcon sent a series of messages to his support staff,
reporting, in sum and substance, that a computer hacker had
stolen all of the Bitcoins from the Silk Road 2.0 marketplace
server. Defcon's messages indicated that the stolen funds had
been held on the Silk Road 2.0 server to cover user balances
available for withdrawal.

b. On or about September 10, 2014, Defcon provided
his support staff with the Bitcoin address where he believed the
hacker had transferred the stolen funds to (“Bitcoin Address-
1”). I have checked publicly available information on the
Blockchain regarding Bitcoin Address—1, which indicates that, on
or about September 10, 2014, hundreds of transfers were made to
that address, for a total of approximately 2,987.8 Bitcoins, the
equivalent of approximately $1,412,000 in United States currency
based on the prevailing exchange rate that day.

, c. In the immediate wake of the purported Bitcoin
theft, the Silk Road 2.0 marketplace was temporarily closed.

d. On or about September 11, 2014, Defcon had an
online conversation with the HSI—UC, in which he discussed, in
sum and substance, his intention to reopen the Silk Road 2.0
marketplace, and his plan to recoup the deficit of Bitcoins that
had been stolen from Silk Road 2.0. Specifically, Defcon
confirmed that the site needed to recoup approximately 2,900
Bitcoins to cover the loss, and stated that he intended to
donate approximately 1,000 of his own Bitcoins to return
liquidity to Silk Road 2.0 (“I'm planning to throw my 1000 BTC
to kickstart the thing."). Defcon further acknowledged that the
site had approximately 150,000 monthly active users (“We have
150,000 monthly active users. That's why we have to save this
thing."). The HSI—UC asked how long it would take to recover
from the theft, and Defcon replied that it would take
approximately three months’ worth of commission payments, if
sales on Silk Road 2.0 continued at a steady rate (“Three months
if sales continue at current pace and we don't bottom out”).
Thus, Defcon appears to have expected Silk Road 2.0 to generate
approximately $6 million in monthly sales over the next three
months, which would have resulted in commissions over that
three—month period totaling approximately $900,000 — equal to
approximately 1,900 Bitcoins at the then—prevailing exchange
rate.’

9 This estimate is based on the conservative assumption that

Defcon was only referring to overcoming a deficit of 1,900

17

e. Approximately one month later, on or about
October 10, 2014, Defcon posted a message to a part of the SR2
Forum exclusively available to the Silk Road 2.0 support staff,
in which he indicated that the site had recouped 1,000 Bitcoins
since the September 10, 2014 hack. Accordingly, it appears that
the website had exceeded Defcon's expectations and generated
over $400,000 in commissions and, correspondingly, over $8
million in sales, over the past month, based on the prevailing
Bitcoin exchange rate from September 10 to October 10, 2014.

Management of Administrative Staff

34. According to the HSI—UC, since Defcon assumed control
over Silk Road 2.0 in December 2013, he has been responsible for
managing the support staff responsible for the day-to~day
operations of the site. Defcon has determined the duties for
which each staff member has been responsible and has controlled
the level of access granted to each staff member to the
administrative areas of the site. Staff members have treated
Defcon as their boss and have looked to him for instruction and
guidance in carrying out their roles, answering user inquiries,
and resolving disputes between buyers and vendors.

35. Defcon has also been responsible for paying
compensation — including salaries and bonuses ~ to the support
staff. The HSI—UC, for example, has received regular payments
from Defcon since on or about January 23, 201 — approximately 16
payments in total, amounting to approximately 83.39 Bitcoins
(the equivalent of approximately $32,189 in United States
currency based on current exchange rates). In addition, Defcon
has regularly made posts to the section of the SR2 Forum
reserved for the support staff, providing reports on the status
of their salary payments.

Recruitment of Vendors

36. Defcon also coordinated attempts to recruit large—
scale narcotics vendors to Silk Road 2.0. For example:

Bitcoins (subtracting the 1,000 Bitcoins he said he would
donate). Given the commission rate of five percent charged on
Silk Road 2.0 at the time, it would have required approximately
$6 million in monthly sales over a three—month period to
generate sufficient commissions to recover this amount.

18

a. On or about March 16, 2014, Defcon posted a
message in a section of the SR2 Forum reserved for the support
staff, in which he called on his staff to analyze other black-
market websites, and to identify “bulk vendors and high—volume
vendors,” who could be recruited to Silk Road 2.0. Later in the
message, Defcon included draft analyses of two other black-
market websites, including descriptions of the volume of
narcotics distributed on those sites.

b. On or about March 17, 2014, Defcon posted another
message in the same section of the SR2 Forum, asking the staff
to brainstorm as to how to “grow our vendor userbase,” noting
that the priority was to recruit “high volume bulk vendors."

One moderator (“Moderator—1") responded to Defcon's post,
indicating that they needed to focus on certain types of
narcotics vendors (“We certainly do need more vendors who can
run a smooth operation and offer products that are in high
demand at a competitive price (Heroin, Prescription Pills,
Cocaine, Bulk Cannibis)”). Another moderator (“Moderator-2”)
added that they should focus on the types of drug vendors
mentioned by Moderator—1 who sold narcotics on Silk Road 1.0 but
had not continued to participate as vendors on Silk Road 2.0
(noting that they should “attempt[] to take the ones who never

came to SR2 in the first place after SR1 fell . . . [e]specially
those who vend high demand products like the ones [Moderator—1]
mentioned”). Defcon responded by requesting that Moderator—2

compile a list of such vendors.

Protecting Silk Road 2.0 from Law Enforcement

37. Defcon's communications also reflect that Defcon has
been keenly aware of the illegal nature of the commerce being
hosted on Silk Road 2.0, and that he has repeatedly taken steps
to protect Silk Road 2.0, as well as its vendors and users, from
law enforcement. For example:

a. On or about January 2, 2014, Defcon posted a
message on the part of the SR2 Forum accessible exclusively to
vendors, warning vendors located in Minnesota to exercise
caution, including by destroying evidence and temporarily
stopping their activities, based on intelligence he had received
that the FBI was preparing for a “large darknet—related
operation in Minnesota" (“Two of our informants have warned us
that a large number of FBI agents have been sent to Minnesota
for a large darknet—related operation. One of these informants
was correct very recently, but we did not receive the
information in time. . . . If you are operating in this region,

19

staff urges you to destroy information and go dark, or at bare
minimum strengthen your operational security. Assume your home
will be raided. Operate in a different location . . . .”).

b. On or about January 5, 2014, Defcon posted a
message in the same section of the SR2 Forum in which he bragged
about Silk Road 2.0 being the largest black market website on
the Internet (“We are the most major market on the darknet site
at this point"). Further, Defcon urged buyers to encrypt their
addresses in all purchases, to protect them from law enforcement
(“We are in a position to teach an incredibly valuable life
skill for this buyer community: always encrypt. . . . We are
doing this more for buyers’ sake than vendors’ sake. PGP
encryption teaches users to never enter their address on ANY
darknet site, which greatly decreases LE's ability to set up
honeypots.").

c. On or about January 10, 2014, Defcon posted
another message in the same section of the SR2 Forum, in which
he announced his “priority list” in administering Silk Road 2.0.
Defcon listed his top priority as the need to conceal Silk Road
2.0 servers and protect them from seizure by law enforcement
(“Prevent servers from being seized by LE . . . [Tlhis has been
consuming most of my time and I cannot elaborate on it,
nothing's in danger, but scaling a site this large requires a
lot of odd approaches to server stealth.”).

d. On or about May 8, 2014, Defcon sent a private
message to Silk Road 2.0 staff, including the HSI—UC, in which
he described updates that he recently made to the Silk Road 2.0
infrastructure, including updates to the servers that would
protect sensitive information from being recovered in the event
they were seized by law enforcement (“A significant
infrastructure change occurred over the last week with minimal
downtime. Cannot elaborate, but it increases our community's
anonymity and security in the event of seizure. Dev team's
design requirements are that the servers should be able to be
seized and reveal nothing.”).

IDENTIFICATION OF “DEFCON”
AS BLAKE BENTHALL, THE DEFENDANT

38. As described in detail below, the investigation has
established that the true identity of “Defcon” is BLAKE
BENTHALL, a/k/a “Defcon,” the defendant. Evidence recovered
during the course of the investigation shows that BENTHALL
personally administered the server used to host the Silk Road

20

2.0 website and further evidence corroborates that he is the
same individual as the Silk Road 2.0 administrator known as
“Defcon.”

39. First, the investigation successfully located a server
used to host the Silk Road 2.0 website, which, based on the
contents of the server, appears to have been controlled by
Defcon at the time. Specifically:

a. In or about May 2014, the FBI identified a server
located in a foreign country that was believed to be hosting the
Silk Road 2.0 website at the time (the “Silk Road 2.0 Server”).
On or about May 30, 2014, law enforcement personnel from that
country imaged the Silk Road 2.0 Server and conducted a forensic
analysis of it. Based on posts made to the SR2 Forum,
complaining of service outages at the time the imaging was
conducted, I know that once the Silk Road 2.0 server was taken
offline for imaging, the Silk Road 2.0 website went offline as
well, thus confirming that the server was used to host the Silk
Road 2.0 website.

b. A copy of the image of the Silk Road 2.0 server
made by the foreign authorities was subsequently provided to the
FBI. The data that was obtained further confirmed that the Silk
Road 2.0 Server was hosting services related to Silk Road 2.0,
including, among other things, the following:

i. The server included configuration files for
the SR2 Forum, along with the private key required to operate
the SR2 Forum as a Tor hidden service on the Internet.”

‘ii. The configuration of the server indicated
that the only user account on the server was named “dpr,”
consistent with the “Dread Pirate Roberts" pseudonym used by
DPR2 when Silk Road 2.0 was initially launched.

c. Further, the Silk Road 2.0 Server contained chat
logs, reflecting conversations between DPR2 and Defcon regarding
the administration of Silk Road 2.0. These chats included
discussions between individuals using the online pseudonyms
“myself” and “captain.” As noted above in paragraphs 30(c)

:0 A server operating a Tor hidden service requires a “private
key" (a cryptographic key) be resident on the server. The
private key corresponds to a public key users of the servers
need to communicate with the Tor hidden service.

21

through 30(e), Defcon repeatedly referred to DPR2 as “captain”
in posts to the SR2 Forum. Based on the context provided by the
chats, including their timing, as well my familiarity with this
investigation, I believe that the user reflected as “myself” in
the chats was “Defcon,” and that he was communicating with DPR2
in the chats. For example:

i. During a chat logged on January 28, 2014,
“captain” and “myself” discussed the arrest of “btcking” — an
apparent reference to Robert M. Faiella, a/k/a “BTCKing,” whose
arrest had been announced the previous day by the United States
Attorney's Office for the Southern District of New York, based
on Faiella's alleged operation of an underground Bitcoin
exchange service on Silk Road 1.0. During the conversation,
“myself” indicated that he had deactivated the account that
“btcking” had on Silk Road 2.0 (“disabled his account, changed
passwords, refunded unshipped orders, removed listings”). Based
on my training and experience, and my familiarity with the
investigation, this conduct is consistent with Defcon's role as
chief administrator of the site at the time, as it appears to
have been intended to prevent law enforcement from taking
control of the “btcking” account and using it to investigate the
Silk Road 2.0 website or its users who were clients of
“btcking.”

ii. During the same January 28, 2014 chat,
“captain” stated, “With every bust my retirement hastens,”
consistent with DPR2 seeking to complete his full withdrawal
from Silk Road 2.0 because he was afraid of being arrested. The
chat also included discussions about a “pension plan” for
“captain,” in which “myself” proposed “50/50” split in earnings
for the time period “up until you left.” At the end of the
conversation, “captain” refers to providing “myself” with access
to his private keys and accounts, and discusses the “handover.”
This conversation is consistent with Defcon (“myself”)
discussing remuneration to DPR2 (“captain”) for his prior work
as chief administrator of Silk Road 2.0 until late December
2013, when he departed, and DPR2 (“captain”) completing the full
handover of control to Defcon (“myself”).

iii. Further, the server contained another chat,
dated December 13, 2013, during the time that Defcon worked as
second in command to DPR2. During that chat, “myself” posted a
draft message to users regarding alternate .onion addresses
where the Silk Road 2.0 marketplace could be accessed while the
site was experiencing heavy traffic, and requested that
“captain” sign the messages and add his PGP encryption key.

22

“Captain” responded by adding “Dread Pirate Roberts” to the
messages drafted by Defcon, and adding an encryption signature.
Accordingly, the timing and contents of this chat further
confirm that “captain” was being used by DPR2 and “myself” was
being used by Defcon during this chat.

g. Accordingly, I believe that Defcon was the party
labeled as “myself” in chat logs recovered from the Silk Road
2.0 Server. Further, I know, based on my training and
experience, that the default setting of many chat programs is to
refer to the user of the program logging the chats as “myself.”
Accordingly, I submit that there is probable cause to believe
that Defcon stored these chat logs on the Silk Road 2.0 Server,
and that he therefore had administrative access to and control
over the Silk Road 2.0 Server.

40. Based on a review of records provided by the service
provider for the Silk Road 2.0 Server (the “Provider”), I have
discovered that the server was controlled and maintained during
the relevant time by an individual using the email account
“blake@benthall.net” (“Benthall Email Account~1”).
Specifically:

a. Subscriber records for the Silk Road 2.0 Server
indicate that the customer leasing the server from the Provider
supplied two email addresses as part of the customer's contact
information, including Benthall Email Account-1.

b. Further, records obtained from the Provider
indicate that it regularly sent service alerts regarding the
server to Benthall Email Account—1, including on or about:
November 16, 2013; January 13, 2014; February 21, 2014; February
22, 2014; February 24, 2014; February 25, 2014; March 3, 2014;
May 30, 2014; and June 10, 2014.

C. Specifically, on or about May 30, 2014, the day
that foreign law enforcement authorities were imaging the Silk
Road 2.0 Server, the service provider sent a total of
approximately 24 notifications to Benthall Email Account—1,
which noted that the Silk Road 2.0 Server was offline.
Following these notices, the Provider received a customer
support message through its online support system, which,
according to records maintained by the Provider, was submitted
from a certain IP address ending with “.116” (“IP Address—1”).
That customer support inquiry stated, in part: “Our server
srv2 close.co has not been responding for several hours. Do NOT
reboot the machine, there is a critical process we need to

23

watch.” Based on my training and experience, I know that
rebooting a computer deletes any information stored in the
computer's short—term ("RAM") memory, which, depending on the
configuration of the server, can include files needed to operate
the website. Accordingly, I believe that in this message, the
customer, after receiving notification from the Provider that
the server was offline, was asking the Provider to refrain from
rebooting the server in order to avoid the need for time-
consuming intervention by the administrator to restart the
service.

d. IP logs obtained from Google, Inc. (“Google”),
the service provider for Benthall Email Account—1, indicate
that, on or about May 30, 2014, the user of Benthall Email
Account—1 logged into that account from IP Address—1
approximately 146 times. As noted above, IP Address—1 was used
on the same date to send support requests to the Provider
concerning the Silk Road 2.0 Server, further demonstrating that
the user of Benthall Email Account~1 controlled and administered
the Silk Road 2.0 Server.

e. Further, on or about June 10, 2014, records
obtained from the Provider indicate that, during the course of
the day, the Provider received multiple customer support
messages through its online support system from someone using a
certain IP address ending with “.6” (“IP Address—2”). The
customer support messages indicated that the customer could not
access the server and that the server would not finish booting.
The customer further stated that the server contained “highly
confidential client data covered by ITAR [international arms-
trafficking] government restrictions,” and the problem with the
server was “extremely urgent” because the server was maintained
for a “government client.” As noted above, the data recovered
from the Silk Road 2.0 Server indicates that the server was used
to host the Silk Road 2.0 website; there is no indication that
it was used to host any content relating to any “government
client.” Accordingly, I believe that these messages indicate
that the customer reporting the service outage was aware of the
illegal contents of the Silk Road 2.0 server, and that he
falsely represented to the Provider that the server contained
sensitive government data in order to prompt a quick response
and to ensure that the Provider did not examine the (supposedly
government—sensitive) contents of the server.

f. Subscriber information for IP Address—2 indicates
that, on or about June 10, 2014, IP Address—2 belonged to a
certain hotel in South Lake Tahoe, California (“Hotel—1”). I

24

have discovered that BLAKE BENTHALL, a/k/a “Defcon,” the
defendant, was a guest of Hotel—1 on that date, based on a
review of the contents of Benthall Email Account—1, obtained
through a court-authorized search warrant of the account.

"Accordingly, I believe that BENTHALL sent the July 10, 2014

support requests to the Provider regarding the Silk Road 2.0
Server from IP Address—2.

g. Based on information obtained from the Provider,
account invoices for the Silk Road 2.0 Server were accessed on
or about April 22, 2014 from an IP address belonging to a
certain hotel in Las Vegas, Nevada (“Hotel—2”). Based on
records provided by Hotel-2, BENTHALL was a guest at Hotel-2 on
or about April 22, 2014, and Hotel-2 had Benthall Email Account-
1 as the listed Contact e—mail address for BENTHALL.

41. According to subscriber information provided by Google
for Benthall Email Account—1, the account is registered to
“Blake Benthall.” I have reviewed the contents of Benthall
Email Account-1, which include numerous emails in which the user
identifies himself as “Blake Benthall.” Notably, the account
also contains an email linking the user of the account to Silk
Road 2.0: specifically, the account contains an email dated
November 20, 2013, which the user of the email account appears
to have sent to himself, containing links to private messages
viewable only by members of the SR2 Forum.

42. I have also reviewed publicly available Internet
social networking profiles associated with Benthall E—Mai1
ACcount—l, which corroborate that BALKE BENTHALL, a/k/a
“Defcon,” the defendant, is the user of Benthall Email Account-
1, and which further associate BENTHALL with Silk Road 2.0,
including the following:

a. I have reviewed the publicly available profile of
“Blake Benthall” on GitHub, a social networking website focused
on software development, which lists Benthall Email Account—1 as
the contact email address, and also includes a photograph of
BENTHALL as the user. The profile also includes links to
websites and discussions regarding Bitcoin.

b. I have also reviewed a publicly available profile
of “Blake Benthall” on Twitter, another social networking
website, which includes a photograph of BENTHALL as the user of
the account, depicting the same individual associated with the
GitHub account, discussed above. I have reviewed a post on that
Twitter profile, dated on or about November 6, 2013, the date

25

when Silk Road 2.0 was publicly launched, stating: “All this
talk about the #SilkRoad being back up makes me want to watch
#ThePrincessBride.”

43. I have also reviewed records from various sources
reflecting that BLAKE BENTHALL, a/k/a “Defcon,” the defendant,
has had a steady stream of income in the form of Bitcoins since
November 2013, when the Silk Road 2.0 website was launched.
Specifically:

a. I have reviewed records provided by a U.S.—based
Bitcoin exchanger (“Exchanger—1”), for an account registered
under the name “Blake Benthall” and linked to Benthall Email
Account—1 (“Bitcoin Account—1”). According to transaction
records for Bitcoin Account—1, BENTHALL engaged in his first
Bitcoin transaction with Exchanger—1 on or about November 7,
2013, the day after Silk Road 2.0 was publicly launched. The
transactional records reflect that, since that date, BENTHALL
has received a total of approximately 575.58 Bitcoins into the
account through on or about October 28, 2014, and that BENTHALL
has exchanged approximately 543.63 of those Bitcoins for United
States currency, totaling $273,626.60.

b. I have reviewed emails from Benthall Email
Account—1 reflecting numerous postings made by BENTHALL on a
certain website that offers a service enabling users to post
offers to buy or sell Bitcoins from other users of the site.
The emails indicate that, from in or about November 2013,
through in or about July 2014, BENTHALL sought to sell
approximately $45,000 worth of Bitcoins over the site, and
consummated sales totaling $25,000.

c. I have reviewed emails from Benthall Email

Account-1 reflecting that BENTHALL purchased a luxury vehicle
with Bitcoins in late January 2014 — approximately one month
after Defcon assumed control of Silk Road 2.0. Specifically,
email correspondence indicates that, in or about late January
2014, BENTHALL made a down payment of approximately $70,000 in
Bitcoins towards the purchase of a Tesla Model S, worth
approximately $127,000 in United States currency.

44. Further, the investigation has revealed that BLAKE
BENTHALL, a/k/a “Defcon,” the defendant, has used a combination
of versions of software, matching the software used by Defcon to
access the customer support interface of Silk Road 2.0.
Specifically:

26

a. During the investigation, the HSI—UC has had
access to the customer support interface for Silk Road 2.0,
where administrators may log on to respond to requests for
support from members and vendors on the website. Through the
HSI—UC's access to the support interface, the HSI—UC has been
able to observe the operating system and the web browser used by
any administrator when accessing the support interface. On or
about April 6, 2014, the HSI~UC observed that Defcon was logged
into the support interface, and observed Defcon, to be using the
Google Chrome web browser, version 35.0.1910.3 and a computer
running the Apple OS X operating system, version 10.9.0, at the
time.“‘ Defcon is the only administrator whom the HSI—UC has
observed log into the support interface with that browser and
operating system combination.

b. Records provided by Exchanger—1 regarding Bitcoin
Account-1 indicate that on the same date, BENTHALL logged into
Bitcoin Account—1, using the identical combination of software:
Google Chrome web browser version 35.0 1910.3 and the Apple OS X
operating system, version 10.9.0.

c. According to publicly available information, on

or about April 6, 2014, Google Chrome version 35.0.1910.3 was a
beta version of the browser,” and Apple OS X version 10.9.0 was
outdated.” Thus, based on my training and experience, this
particular combination of software versions would not have been
common among Internet users at the time.”

11 The information available to the HSI—UC indicates that Defcon

was not using Tor to access the customer support interface at
the time, which would have caused Defcon's browser and operating
system to appear differently.

12 A “beta” version is a version of software that is released
before the official version, to allow for a limited group of
users, or sometimes the public at large, to test the product and
provide feedback regarding bugs and other issues with the
software.

13 According to publicly available information, Apple OS X 10.9.0
had been outdated since December 16, 2013, having been replaced
by two updated versions as of April 6, 2014.

14 In addition to being able to observe Defcon's browser and
operating system versions on the Silk Road 2.0 customer support
interface, the HSI—UC was also able to observe Defcon's time
zone via the Silk Road 2.0 interface, which regularly appeared

27

45. Physical surveillance of BLAKE BENTHALL, a/k/a
“Defcon,” the defendant, conducted in conjunction with online
surveillance of Defcon on Silk Road 2.0 by the HSI—UC, further
demonstrates that they are one and the same. Specifically, on
September 10 and September 11, 2014, while BENTHALL was visiting
relatives at their residence in Houston, Texas (“Residence—1”),
FBI agents conducted physical surveillance of BENTHALL, while
the HSI—UC simultaneously conducted online surveillance of
Defcon on Silk Road 2.0. As set forth below, a comparison of
the online surveillance with the physical surveillance reflects
that BENTHALL was operating Defcon's account on Silk Road 2.0 at
the time:

a. On or about September 10, 2014, at approximately
7:55 p.m. CDT, Defcon posted a public message to the SR2 Forum.

b. Approximately five minutes later, at
approximately 8:00 p.m. CDT, Defcon's account on the SR2 Forum
went inactive.

c. Shortly thereafter, at approximately 8:07 p.m.
CDT, FBI agents observed BENTHALL depart Residence-1.

d. FBI agents maintained surveillance of BENTHALL
and Residence—1, and observed that he did not return to
Residence—1 until early the next morning, at approximately 3:36
a.m. CDT.

e. Based on observations made from the HSI—UC
undercover administrative account, Defcon's account on the SR2
Forum remained inactive during the entire time that BENTHALL was
gone from Residence—1.

f. Approximately three minutes after BENTHALL
returned to Residence—1, at 3:39 a.m. CDT, Defcon's account on
the SR2 Forum went active, and, at approximately 3:40 a.m. CDT,
Defcon posted a message addressed to his staff.

46. A similar comparison of physical surveillance of BLAKE
BENTHALL, a/k/a “Defcon,” the defendant, with online
surveillance of Defcon on Silk Road 2.0 on September 12, 2014,

as Pacific Daylight Time. This matches BENTHALL's time zone, as
he is known to maintain his permanent residence in San
Francisco, California.

28

further demonstrates that BENTHALL was in fact Defcon.
Specifically:

a. On or about September 12, 2014, at approximately
8:06 p.m. CDT, FBI agents observed BENTHALL depart Residence-1.

b. According to Defcon's SR2 Forum profile, viewed
through the HSI—UC’s account at 8:36 p.m. CDT, Defcon was
offline by that time, and his time of last activity was reported
to be approximately 7:56 p.m. CDT, approximately ten minutes
before BENTHALL was observed departing Residence—l.

c. At approximately 9:09 p.m. CDT, FBI agents
observed BENTHALL return to Residence—l. Shortly after BENTHALL
arrived, Defcon was observed to be back online on the SR2 Forum.

d. At approximately 9:17 p.m. CDT, FBI agents
observed BENTHALL depart Residence—l. Defcon’s status on the SR
Forum thereafter remained as “active in past 30 minutes,” until
approximately 9:47 p.m. CDT, when Defcon's status was changed to
“offline.” According to the HSI—UC, this indicates that Defcon
had stopped his online activity on the SR2 Forum approximately
30 minutes earlier ~ when BENTALL was observed leaving
Residence~1 — as a user's status automatically changes to
“offline” after 30 minutes of inactivity.

e. Accordingly, based on the foregoing, I believe
that on or about September 12, 2014, BENTHALL accessed Silk Road
2.0 as Defcon from Residence—1 up until 7:56 p.m. CDT, and left
Residence-1 approximately ten minutes later. He returned
approximately an hour later, at approximately 9:09 p.m. CDT, and
within ten minutes, quickly logged onto the SR2 Forum as Defcon.
At approximately 9:17 p.m. CDT, BENTHALL left Residence—1,
coinciding with Defcon ceasing activity on the SR2 Forum around
the same time.

47. Finally, pen register data for an IP address
associated with Residence—1 (“the Residence—1 IP Address”)
compared with surveillance of BLAKE BENTHALL, a/k/a “Defcon,”
the defendant, provides further confirmation that BENTHALL
operated as Defcon on Silk Road 2.0. Specifically:

a. On or about September 12, 2014, pursuant to a

judicial order issued the previous day, the FBI started
collecting pen register data for the Residence-1 IP Address.

29

b. From on or about September 12, 2014 through on or
about September 14, 2014, FBI agents observed BENTHALL
repeatedly enter and exit Residence~1, and spend overnight hours
at Residence—l. On or about September 14, 2014, at
approximately 3:27 p.m. CDT, FBI agents observed BENTHALL depart
Residence—1 with a suitcase. On or about September 15, 2014, at
approximately 12:07 a.m. CDT, FBI agents observed BENTHALL
arrive at his residence in San Francisco, California.

c. I have reviewed and analyzed pen register data
for the Residence-1 IP Address, which reveals the transmission
of a significant volume of Tor—related traffic to and from the
Residence~1 IP Address from on or about the morning of September
12, 2014 through the approximate time on or about September 14,
2014 that BENTHALL departed Residence—1 to return to San
Francisco. Since then, I have not observed any Tor—related
traffic transmitted to or from the Residence—1 IP Address.

d. Based on my training and experience, and my
familiarity with this investigation, I believe that the
correlation of Tor~related traffic to BENTHALL’s presence at
Residence—1 further confirms BENTHALL's involvement in owning
and operating Silk Road 2.0 as “Defcon.”

WHEREFORE, I respectfully request that an arrest warrant be
issued for BLAKE BENTHALL, a/k/a “Defcon,” the defendant, and
that he be arrested and imprisoned or bailed, as the case may

7’7‘4 />/-

Vincent D. D'Agostino

Special Agent

Federal Bureau of Investigation
Sworn to before me this
29”‘day of October 2014

.1 A 9‘ F N “I n y .
  i L<§fil'.Q.:'\L»’‘ \ W/‘\

H GABRIEL W. GORENSTEIN
UNITED STATES MAGISTRATE JUDGE
SOUTHERN DISTRICT OF NEW YORK

30




Update: The Justice Department's PDF http://www.justice.gov/usao/nys/pressreleases/November14/BlakeBenthallArrestPR/Benthall,%20Blake%20Complaint.pdf

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>