How the Alleged Twitter Hackers Got Caught

graham-clark-2.jpg


ON JULY 15, a Discord user with the handle Kirk#5270 made an enticing proposition. “I work for Twitter,” they said, according to court documents released Friday. “I can claim any name, let me know if you’re trying to work.” It was the beginning of what would, a few hours later, turn into the biggest known Twitter hack of all time. A little over two weeks later, three individuals have been charged in connection with the heists of accounts belonging to Bill Gates, Elon Musk, Barack Obama, Apple, and more—along with nearly $120,000 in bitcoin.

Friday afternoon, after an investigation that included the FBI, IRS, and Secret Service, the Department of Justice charged UK resident Mason Sheppard and Nima Fazeli, of Orlando, Florida in connection with the Twitter hack. A 17-year-old, Graham Ivan Clark, was charged separately with 30 felonies in Hillsborough County, Florida, including 17 counts of communications fraud. Together, the criminal complaints filed in the cases offer a detailed portrait of the day everything went haywire—and how poorly the alleged attackers covered their tracks. All three are currently in custody.

Despite his claims on the morning of July 15, Kirk#5270 was not a Twitter employee. He did, however, have access to Twitter’s internal administrative tools, which he showed off by sharing screenshots of accounts like “@bumblebee,” “@sc,” “@vague,” and “@R9.” (Short handles are a popular target among certain hacking communities.) Another Discord user who went by “ever so anxious#0001” soon began lining up buyers; Kirk#5270 shared the address of a Bitcoin wallet where proceeds could be directed. Offers included $5,000 for “@xx,” which would later be compromised.

That same morning, someone going by “Chaewon” on the forum OGUsers started advertising access to any Twitter account. In a post titled "Pulling email for any Twitter/Taking Requests,” Chaewon listed prices as $250 to change the email address associated with any account, and up to $3,000 for account access. The post directs users to “ever so anxious#0001” on Discord; over the course of seven hours, starting at around 7:16 am ET, the “ever so anxious#0001” account discussed the takeover of at least 50 user names with Kirk#5270, according to court documents. In that same Discord chat, “ever so anxious#0001” said his OGUsers handle was Chaewon, suggesting the two were the same individual.

Kirk#5270 allegedly received similar help from a Discord user going by Rolex#0373, although that person was skeptical at first. “Just sounds too good to be true,” he wrote, according to chat transcripts investigators obtained via warrant. Later, to help back up his claim, Kirk#5270 appears to have changed the email address tied to the Twitter account @foreign to an email address belonging to Rolex#0373. Like Chaewon, Rolex#0373 then agreed to help broker deals on OGUsers—where his user name was Rolex—with prices starting at $2,500 for especially sought-after account names. In exchange, Rolex got to keep @foreign for himself.

By around 2 pm ET on July 15, at least 10 Twitter accounts had been stolen, according to the criminal complaints, but the hackers still seemed focused on short or desirable handles like @drug and @xx and @vampire, rather than celebrities and tech moguls. And the takeovers were an end unto themselves, rather than in service of a cryptocurrency scam. The deals brokered by Chaewon netted Kirk#5270 around $33,000 in bitcoin, according to the criminal complaint; Chaewon took in another $7,000 for his role as intermediary.

The FBI believes that Rolex is Fazeli, and it charged him with one count of aiding and abetting the intentional access of a protected computer. They believe Sheppard is Chaewon, who is charged with conspiracy to commit wire fraud, conspiracy to commit money laundering, and the intentional access of a protected computer.

The criminal complaints against Sheppard and Fazeli leave off here. Neither complaint identifies the individual behind Kirk#5270 or explicitly links that account to a named individual. But court documents in Clark's case allege that it was the 17-year-old who had gained access to Twitter’s systems, and who went on to take over the high-profile accounts in service of a bitcoin scam. The Justice Department has referred the case to the Hillsborough State Attorney's Office, which is prosecuting Clark, according to the office's website, "because Florida law allows minors to be charged as adults in financial fraud cases such as this when appropriate."

“He gained access to Twitter accounts and to the internal controls of Twitter through compromising a Twitter employee,” Hillsborough state attorney Andrew Warren said in a videoconference Friday. “He sold access to those accounts. He then used the identities of prominent people to solicit money in the form of bitcoin, promising in return that he would send back twice as much bitcoin.”

Court documents show approximately 415 payments to the bitcoin wallet associated with the scam, totaling the equivalent of around $177,000.

As Twitter confirmed last week, 130 accounts were targeted in all. Attackers successfully tweeted from 45 of the accounts, accessed the direct messages of 36, and downloaded the Twitter data of seven. On Thursday evening, Twitter disclosed that attackers got in through social engineering, specifically through a phone spear-phishing attack, that targeted company employees. Court documents don’t provide much more detail than that and only allege that Clark’s actions date back to around May 3.

It’s also not entirely clear how investigators identified Clark, but the trail that led the FBI to Sheppard and Fazeli has much bigger bread crumbs. On April 2, the administrator of OGUsers announced that the forum had been hacked; a few days later, court documents say, a rival hacking gang put out a download link to a database of user information.

It turned out to be quite a trove, full of not just usernames and public postings but private messages between users, IP addresses, and email addresses. The FBI says it acquired a copy of the database on April 9.

The work appears to have been quick from there. In Chaewon’s private messages on OGUsers, investigators say they found an exchange in February where Chaewon was instructed to pay for a videogame by sending bitcoin to a particular address. Activity on that wallet the next day was traced to a cluster of bitcoin addresses that, months later, would be used by “ever so anxious#0001” in his interactions with Kirk#5270. Investigators also used the database to connect Chaewon's account to another OGUsers handle, Mas. Both accounts signed onto the forums from the same IP address on the same day, according to the database leak; agents also found that multiple times between February 11 and 15 of this year, Chaewon posted ““IT IS MAS I AM MAS NOT BRY I AM MAS MAS MAS!@,” which combined suggest that Chaewon and Mas are owned by the same individual.

The Mas account was associated with the email account [email protected], investigators say, which was linked to a Coinbase account tied to Mason Sheppard. The bitcoin addresses associated with Chaewon had also processed numerous exchanges on the cryptocurrency exchange Binance, whose records also tied those accounts with Sheppard. Finally, court documents say that an unnamed juvenile who had allegedly assisted in the scheme told investigators that they knew Chaewon by the name Mason.

Investigators rely on bitcoin and IP addresses to link the Rolex#0373 to Fazeli, as well, particularly one October 30, 2018, exchange that was referenced on the OGUsers forums. The Coinbase account involved in that transaction allegedly belonged to “Nim F,” under the email address “[email protected],” the same used to register the Rolex account on OGUsers. The Coinbase account had allegedly been verified with a Florida driver’s license in the name of Nima Fazeli, complete with the driver’s license number. Over time, court documents say, Fazeli would use his real driver’s license to register three separate Coinbase accounts, the third of which was frequently visited from the same IP address as the Rolex#0373 Discord account and Rolex account on OGUsers.

Sauce: https://www.wired.com/story/how-alleged-twitter-hackers-got-caught-bitcoin/
 
Last edited:
Also this dude had over $3 million in bitcoin:


Apparently last year he was busted for something. They didn't charge him and gave back 300 of 400 bitcoin they took.

Now they seized the same bitcoin yet again.
 
@.wil MUH OPSEC

" It’s also not entirely clear how investigators identified Clark ..."


Didn't take long for the gubbermint did it?
You're actually retarded.

It took the FBI no time at all because they made no attempt to conceal their identities.

They used coinbase accounts registered under their real names with their real government driver's license. They made no attempt to secure their communications. They made no attempt to even conceal their IPs.

It's unclear because Clark is a minor and court proceedings are sealed. Having helped put "multiple people in federal prison" I'd expect you to know this. However, he's likely going to be charged as an adult, so you'll just have to wait to see how low hanging of a fruit he made himself.
 
You're actually retarded.

It took the FBI no time at all because they made no attempt to conceal their identities.

They used coinbase accounts registered under their real names with their real government driver's license. They made no attempt to secure their communications. They made no attempt to even conceal their IPs.

It's unclear because Clark is a minor and court proceedings are sealed. Having helped put "multiple people in federal prison" I'd expect you to know this. However, he's likely going to be charged as an adult, so you'll just have to wait to see how low hanging of a fruit he made himself.
No.
It literally says, "It's not entire clear how investigators identified Clark." The blather you sperged is evidence AFTER they identified Clark. One of the key elements of solving crime is identifying the criminal. They put the pieces together and see if yes, the target was involved, or no the target was not involved. Because in criminal investigations the crime is known, and is often impossible to hide, however, if the criminal can separate him/herself from the crime then the legal process grinds to a halt. How is it you not understand this. Do you not google Mr. Wannabe Tech-fag?

Court cases are NOT automatically sealed due to minor status, and certainly not in a multi-felony case. Plus, his legal minor status has been suspended, "because Florida law allows minors to be charged as adults in financial fraud cases such as this when appropriate." Allow me to explain, even though he is a minor he being charged as an adult because he/she shows willful intent throughout many stages of the crime or is close enough to the legal age. If he was enjoying the full protections of being a "minor," WOULD NOT have his 1. picture published in connection to this crime 2. or his name. 3. or any personal information. Which this article was able to publish the first two without any hinderance. (Just because you press a button on a MRI doesn't mean you're smart or that you can read apparently. Honestly what was your certification test? A question asking how you turn on a MRI and gave you a choice between a green button and slice of rhubarb pie?)

How they registered their bitcoin accounts is irrelevant. Fake names can be used. You still need a real bank account number to deposit the converted e-money. The real bank account number is the real evidence. To get that information you would have to have ACCESS TO THAT ACCOUNT. Because no criminal would ever want imply someone else committed the crime, right? However, in this case they are just retarded. (Somehow, I'm pretty sure Mason and co didn't give up their passwords because the cops said please. I'm sure the bitwallet service they were using, didn't give up that information because someone was possibly using their service in connection to a crime.)
 
No.
It literally says, "It's not entire clear how investigators identified Clark." The blather you sperged is evidence AFTER they identified Clark. One of the key elements of solving crime is identifying the criminal. They put the pieces together and see if yes, the target was involved, or no the target was not involved. Because in criminal investigations the crime is known, and is often impossible to hide, however, if the criminal can separate him/herself from the crime then the legal process grinds to a halt. How is it you not understand this. Do you not google Mr. Wannabe Tech-fag?

You're actually dense. He was identified because he was retarded.

Court cases are NOT automatically sealed due to minor status, and certainly not in a multi-felony case. Plus, his legal minor status has been suspended, "because Florida law allows minors to be charged as adults in financial fraud cases such as this when appropriate." Allow me to explain, even though he is a minor he being charged as an adult because he/she shows willful intent throughout many stages of the crime or is close enough to the legal age. If he was enjoying the full protections of being a "minor," WOULD NOT have his 1. picture published in connection to this crime 2. or his name. 3. or any personal information.

https://www.justice.gov/usao-ndca/pr/three-individuals-charged-alleged-roles-twitter-hack

The third defendant is a juvenile. With exceptions that do not apply to this case, juvenile proceedings in federal court are sealed to protect the identity of the juvenile. Pursuant to the Federal Juvenile Delinquency Act, the Justice Department has referred the individual to the State Attorney for the 13th Judicial District in Tampa, Florida.

It's not clear because this was a federal investigation and Clark's case was handed to the Florida State Attorney. There's only been an announcement of charges and a bail hearing. More details will eventually be released which will say how he was identified.

(Just because you press a button on a MRI doesn't mean you're smart or that you can read apparently. Honestly what was your certification test? A question asking how you turn on a MRI and gave you a choice between a green button and slice of rhubarb pie?)

How they registered their bitcoin accounts is irrelevant. Fake names can be used. You still need a real bank account number to deposit the converted e-money. The real bank account number is the real evidence. To get that information you would have to have ACCESS TO THAT ACCOUNT. Because no criminal would ever want imply someone else committed the crime, right? However, in this case they are just retarded. (Somehow, I'm pretty sure Mason and co didn't give up their passwords because the cops said please. I'm sure the bitwallet service they were using, didn't give up that information because someone was possibly using their service in connection to a crime.)

You don't understand how investigations work.

I'm not an MRI tech.
 
You're actually dense. He was identified because he was retarded.
You mean you've never made a burner email account oh heavens. They didn't charge the dimwit based on his bitcoin account being "I'm the twitter haxxr my name is Mason Sheppard and I live in England and the following is my home address and I'm usually home between the hours of...." You literal imbecile.

This part in red was taken verbatim from the article.
"because Florida law allows minors to be charged as adults in financial fraud cases such as this when appropriate."
And in the article you cited
With exceptions that do not apply to this case, juvenile proceedings in federal court are sealed to protect the identity of the juvenile.

Pursuant to the Federal Juvenile Delinquency Act, the Justice Department has referred the individual to the State Attorney for the 13th Judicial District in Tampa, Florida.
***

Florida’s Direct File Laws

In Florida, a prosecutor may direct file the cases of all 16 and 17-years-olds, and those of 14 and 15-year-olds charged with a number of offenses committed against persons or property, and a handful of misdemeanors. When determining whether or not to direct file a juvenile’s case, a prosecutor will take a number of factors into consideration, including: past offenses, the severity of the offense, and the minor’s age. Furthermore, while the decision may vary depending on the circumstances, Florida Statutes outline some instances in which a minor must be charged as an adult. Those include:

  • The minor was at least 16 years old at the time of the crime, was charged with a violent crime, and had been already arbitrated delinquent for a previous crime;
  • The child was at least 16 years old at the time of the crime, and was charged with a “forcible felony”;
  • The minor committed a crime in which a stolen vehicle was involved, and in the act of the crime, committed seriously bodily harm or death to another individual; and
  • The minor was at least 16 years old at the time of the offense, and was charged with murder, aggravated assault, aggravated battery, sexual battery, robbery, burglary, arson, kidnapping, etc.
If a minor is charged as an adult, and if he or she is found guilty, they will be treated exactly as an adult who committed the same crime would be treated. This means that any special rights granted to minors will be waived entirely, including the right to a private trial, the right to a sealed record, and the right to rehabilitation instead of punishment.


It's not clear because this was a federal investigation and Clark's case was handed to the Florida State Attorney. There's only been an announcement of charges and a bail hearing. More details will eventually be released which will say how he was identified.
My mistake I thought Mason was the juvenile.

They are not going to go through detailed steps on you fucking retard. They are not going to hold a haxxor class in court.

“Today’s announcement proves that cybercriminals can no longer hide behind perceived global anonymity,” said Thomas Edwards, Special Agent in Charge, U.S. Secret Service, San Francisco Field Office.

I'm not an MRI tech.
No sir, you are indeed a faggot.
 
This all circles back to you being unable to understand what opsec means and wanting to argue semantics.

They are not going to go through detailed steps on you fucking retard. They are not going to hold a haxxor class in court.

They do if they want a jury trial, especially if it consists of tech-illiterate boomers like you.
 
View attachment 2195

ON JULY 15, a Discord user with the handle Kirk#5270 made an enticing proposition. “I work for Twitter,” they said, according to court documents released Friday. “I can claim any name, let me know if you’re trying to work.” It was the beginning of what would, a few hours later, turn into the biggest known Twitter hack of all time. A little over two weeks later, three individuals have been charged in connection with the heists of accounts belonging to Bill Gates, Elon Musk, Barack Obama, Apple, and more—along with nearly $120,000 in bitcoin.

Friday afternoon, after an investigation that included the FBI, IRS, and Secret Service, the Department of Justice charged UK resident Mason Sheppard and Nima Fazeli, of Orlando, Florida in connection with the Twitter hack. A 17-year-old, Graham Ivan Clark, was charged separately with 30 felonies in Hillsborough County, Florida, including 17 counts of communications fraud. Together, the criminal complaints filed in the cases offer a detailed portrait of the day everything went haywire—and how poorly the alleged attackers covered their tracks. All three are currently in custody.

Despite his claims on the morning of July 15, Kirk#5270 was not a Twitter employee. He did, however, have access to Twitter’s internal administrative tools, which he showed off by sharing screenshots of accounts like “@bumblebee,” “@sc,” “@vague,” and “@R9.” (Short handles are a popular target among certain hacking communities.) Another Discord user who went by “ever so anxious#0001” soon began lining up buyers; Kirk#5270 shared the address of a Bitcoin wallet where proceeds could be directed. Offers included $5,000 for “@xx,” which would later be compromised.

That same morning, someone going by “Chaewon” on the forum OGUsers started advertising access to any Twitter account. In a post titled "Pulling email for any Twitter/Taking Requests,” Chaewon listed prices as $250 to change the email address associated with any account, and up to $3,000 for account access. The post directs users to “ever so anxious#0001” on Discord; over the course of seven hours, starting at around 7:16 am ET, the “ever so anxious#0001” account discussed the takeover of at least 50 user names with Kirk#5270, according to court documents. In that same Discord chat, “ever so anxious#0001” said his OGUsers handle was Chaewon, suggesting the two were the same individual.

Kirk#5270 allegedly received similar help from a Discord user going by Rolex#0373, although that person was skeptical at first. “Just sounds too good to be true,” he wrote, according to chat transcripts investigators obtained via warrant. Later, to help back up his claim, Kirk#5270 appears to have changed the email address tied to the Twitter account @foreign to an email address belonging to Rolex#0373. Like Chaewon, Rolex#0373 then agreed to help broker deals on OGUsers—where his user name was Rolex—with prices starting at $2,500 for especially sought-after account names. In exchange, Rolex got to keep @foreign for himself.

Exclusive Offer.Don't miss the future. Get 1 year for $5.Subscribe Now
By around 2 pm ET on July 15, at least 10 Twitter accounts had been stolen, according to the criminal complaints, but the hackers still seemed focused on short or desirable handles like @drug and @xx and @vampire, rather than celebrities and tech moguls. And the takeovers were an end unto themselves, rather than in service of a cryptocurrency scam. The deals brokered by Chaewon netted Kirk#5270 around $33,000 in bitcoin, according to the criminal complaint; Chaewon took in another $7,000 for his role as intermediary.

The FBI believes that Rolex is Fazeli, and it charged him with one count of aiding and abetting the intentional access of a protected computer. They believe Sheppard is Chaewon, who is charged with conspiracy to commit wire fraud, conspiracy to commit money laundering, and the intentional access of a protected computer.

The criminal complaints against Sheppard and Fazeli leave off here. Neither complaint identifies the individual behind Kirk#5270 or explicitly links that account to a named individual. But court documents in Clark's case allege that it was the 17-year-old who had gained access to Twitter’s systems, and who went on to take over the high-profile accounts in service of a bitcoin scam. The Justice Department has referred the case to the Hillsborough State Attorney's Office, which is prosecuting Clark, according to the office's website, "because Florida law allows minors to be charged as adults in financial fraud cases such as this when appropriate."

“He gained access to Twitter accounts and to the internal controls of Twitter through compromising a Twitter employee,” Hillsborough state attorney Andrew Warren said in a videoconference Friday. “He sold access to those accounts. He then used the identities of prominent people to solicit money in the form of bitcoin, promising in return that he would send back twice as much bitcoin.”

Court documents show approximately 415 payments to the bitcoin wallet associated with the scam, totaling the equivalent of around $177,000.

As Twitter confirmed last week, 130 accounts were targeted in all. Attackers successfully tweeted from 45 of the accounts, accessed the direct messages of 36, and downloaded the Twitter data of seven. On Thursday evening, Twitter disclosed that attackers got in through social engineering, specifically through a phone spear-phishing attack, that targeted company employees. Court documents don’t provide much more detail than that and only allege that Clark’s actions date back to around May 3.

It’s also not entirely clear how investigators identified Clark, but the trail that led the FBI to Sheppard and Fazeli has much bigger bread crumbs. On April 2, the administrator of OGUsers announced that the forum had been hacked; a few days later, court documents say, a rival hacking gang put out a download link to a database of user information.

It turned out to be quite a trove, full of not just usernames and public postings but private messages between users, IP addresses, and email addresses. The FBI says it acquired a copy of the database on April 9.

The work appears to have been quick from there. In Chaewon’s private messages on OGUsers, investigators say they found an exchange in February where Chaewon was instructed to pay for a videogame by sending bitcoin to a particular address. Activity on that wallet the next day was traced to a cluster of bitcoin addresses that, months later, would be used by “ever so anxious#0001” in his interactions with Kirk#5270. Investigators also used the database to connect Chaewon's account to another OGUsers handle, Mas. Both accounts signed onto the forums from the same IP address on the same day, according to the database leak; agents also found that multiple times between February 11 and 15 of this year, Chaewon posted ““IT IS MAS I AM MAS NOT BRY I AM MAS MAS MAS!@,” which combined suggest that Chaewon and Mas are owned by the same individual.

The Mas account was associated with the email account [email protected], investigators say, which was linked to a Coinbase account tied to Mason Sheppard. The bitcoin addresses associated with Chaewon had also processed numerous exchanges on the cryptocurrency exchange Binance, whose records also tied those accounts with Sheppard. Finally, court documents say that an unnamed juvenile who had allegedly assisted in the scheme told investigators that they knew Chaewon by the name Mason.

Investigators rely on bitcoin and IP addresses to link the Rolex#0373 to Fazeli, as well, particularly one October 30, 2018, exchange that was referenced on the OGUsers forums. The Coinbase account involved in that transaction allegedly belonged to “Nim F,” under the email address “[email protected],” the same used to register the Rolex account on OGUsers. The Coinbase account had allegedly been verified with a Florida driver’s license in the name of Nima Fazeli, complete with the driver’s license number. Over time, court documents say, Fazeli would use his real driver’s license to register three separate Coinbase accounts, the third of which was frequently visited from the same IP address as the Rolex#0373 Discord account and Rolex account on OGUsers.

Sauce: https://www.wired.com/story/how-alleged-twitter-hackers-got-caught-bitcoin/
Is paying 3,000$ to post as Obama on twitter really worth it? I guess if I was rich id pay that just to spam "niggers" and "i hate niggers" like 50 times from his account.

Lol homey got hit with 30 charges, once the secret service gets involved your pretty much fucked.
 
No.
It literally says, "It's not entire clear how investigators identified Clark." The blather you sperged is evidence AFTER they identified Clark. One of the key elements of solving crime is identifying the criminal. They put the pieces together and see if yes, the target was involved, or no the target was not involved. Because in criminal investigations the crime is known, and is often impossible to hide, however, if the criminal can separate him/herself from the crime then the legal process grinds to a halt. How is it you not understand this. Do you not google Mr. Wannabe Tech-fag?

Court cases are NOT automatically sealed due to minor status, and certainly not in a multi-felony case. Plus, his legal minor status has been suspended, "because Florida law allows minors to be charged as adults in financial fraud cases such as this when appropriate." Allow me to explain, even though he is a minor he being charged as an adult because he/she shows willful intent throughout many stages of the crime or is close enough to the legal age. If he was enjoying the full protections of being a "minor," WOULD NOT have his 1. picture published in connection to this crime 2. or his name. 3. or any personal information. Which this article was able to publish the first two without any hinderance. (Just because you press a button on a MRI doesn't mean you're smart or that you can read apparently. Honestly what was your certification test? A question asking how you turn on a MRI and gave you a choice between a green button and slice of rhubarb pie?)

How they registered their bitcoin accounts is irrelevant. Fake names can be used. You still need a real bank account number to deposit the converted e-money. The real bank account number is the real evidence. To get that information you would have to have ACCESS TO THAT ACCOUNT. Because no criminal would ever want imply someone else committed the crime, right? However, in this case they are just retarded. (Somehow, I'm pretty sure Mason and co didn't give up their passwords because the cops said please. I'm sure the bitwallet service they were using, didn't give up that information because someone was possibly using their service in connection to a crime.)
Why do you guys get worked up by some gay internet argument. Y ou dont have to go around insulting wils career qualifactions just because he disagrees with you about a twitter hack.
 
Why do you guys get worked up by some gay internet argument. Y ou dont have to go around insulting wils career qualifactions just because he disagrees with you about a twitter hack.
It's fun to watch Groyper get bent out of shape over two sentences and watch him reply with paragraphs lol.
 
You're actually retarded.

It took the FBI no time at all because they made no attempt to conceal their identities.

They used coinbase accounts registered under their real names with their real government driver's license. They made no attempt to secure their communications. They made no attempt to even conceal their IPs.

It's unclear because Clark is a minor and court proceedings are sealed. Having helped put "multiple people in federal prison" I'd expect you to know this. However, he's likely going to be charged as an adult, so you'll just have to wait to see how low hanging of a fruit he made himself.

@GroyperSupreme the Article says it is not clear about Clark (because the records are indeed sealed as wil said). But they have the records of his co-conspirators which is what they laid out. It is safe to say that Clark got nabbed much the same way.
 
My MO is to use the childish excuse of not being able to understand someone to deflect. When I am losing on all points, I desperately seek support based on hatred of my opponent. It does nothing to strengthen my argument but now my opponent has to contend with a mob. Safety in numbers nigga.
You are a fucking child.
As Umk said the details of the juvenile and the adults in this case are probably very close.

1. Fed records are only sealed as of now because the State of Florida is taking over the juvenile case . Florida is trying him as an adult. Once convicted, all info on the convict will be available to the press. It's safe to say he will be convicted. In three months you'll know who the 17 year old is. Where the case is going is cited in the OP article AND the supporting articles you posted in response. You should try reading what you desperately post in support of your autistic arguments.

2. Bitcoin was created to be two things mainly: 1. complete independence from any national currency manipulation and 2. allow true anonymous purchases/exchanges.

Bitcoin transfers, especially ones where anonymity is important, a random IP address is the place you send the funds, that address is connected to a wallet who is owned by the person. That is the exact opposite of every other financial transaction: you know the PERSON/IDENTITY first and then account. With BitC. you only know the IP address connected to the person receiving the funds. You understand now? Even if it was a static spoofed IP, and the FBI knew of it they STILL wouldn't know who the account holder is WITHOUT being aware of HOW the IP addy is connected to the BitCoin wallet. Do you see now? I'm pretty sure the prosecution is going to gloss over that detail to save the jury from being bored to death.

3. The DA is not going to lay out exactly how they obtained the information. Just like they do with other cases. The technicals are often over the heads of the jury and will bore the shit out of them. Do you think anyone on the jury knows what a certain type of DNA test really entails and are ready to suffer though the detailed explanation of every step taken in that process? Do they do that now?

Not only will the defense most likely NOT force a detailed explanation in this case, because they might lose the jury, they won't do that because it often works FOR the prosecution. The more detailed in the prosecution gets, the more it seems to the jury that the investigation/prosecution had/has their stuff together. The only time this works for the defense is when the defense tries a Hail Mary, and interjects race and successfully makes the case about the race of the accused. Then the detail becomes a "proof of systemic racism in the system." See OJ.
 
Why do you guys get worked up by some gay internet argument. Y ou dont have to go around insulting wils career qualifactions just because he disagrees with you about a twitter hack.
Why not? He seems to enjoy throwing out ad hominiems as well and he started it. The basis is--he heavily relies on his career as proof that he's intelligent.
That's an "appeal to authority" argument and has no real weight when examined.
 
he heavily relies on his career as proof that he's intelligent
Wut

You don't seem to understand that the anonymity of bitcoin is defeated when the transactions can be tracked to a coinbase wallet where the hackers used their personal emails and photos of their ID to set up.

You're actually mentally ill.
 
Wut

You don't seem to understand that the anonymity of bitcoin is defeated when the transactions can be tracked to a coinbase wallet where the hackers used their personal emails and photos of their ID to set up.

You're actually mentally ill.
LOL.
You reposted what I said all along.
How they registered their bitcoin accounts is irrelevant. Fake names can be used. You still need a real bank account number to deposit the converted e-money. The real bank account number is the real evidence. To get that information you would have to have ACCESS TO THAT ACCOUNT.
Bitcoin transfers, especially ones where anonymity is important, a random IP address is the place you send the funds, that address is connected to a wallet who is owned by the person. That is the exact opposite of every other financial transaction: you know the PERSON/IDENTITY first and then account. With BitC. you only know the IP address connected to the person receiving the funds. You understand now? Even if it was a static spoofed IP, and the FBI knew of it they STILL wouldn't know who the account holder is WITHOUT being aware of HOW the IP addy is connected to the BitCoin wallet.

Sorry for mistaking you for an MRI tech. You're clearly a janitor.
 
Back
Top Bottom