Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

it strikes me as extremely naive to take this at face value. see https://www.reuters.com/article/us-dea-sod-idUSBRE97409R2013...

much more likely -- sigint tooling was applied to identify ulbricht, bulk metadata was turned over for his comms history, and it was pored over for things they could connect with sr to get warrants. imo, at least.

but getting to claim you're such a sharp investigator that you can figure it out by noticing the word heyy makes for a much better story to tell an author.



It was more complicated than just heyy, but I won't spoil the book.

It's been awhile since I've read it, but my impression was that solving the case was mostly traditional casework, and a lot of it, by many different people/agents/agencies.

That Reuters article certainly gives pause. Thanks for the link.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: