Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
unclear what, if anything, was on that machine. In one scenario the server could tell the FBI the who,<br />
what, when, and where about the people who ran the site. But if the server was encrypted, which it<br />
likely was, or even deleted by the time they reached it, the clue could amount to absolutely nothing.<br />
It had taken several weeks, a quick trip overseas, some legal wrangling, and a few beers with<br />
some Icelandic cops to get Iceland to hand over all of the information on the server. And then in mid-<br />
June a copy had arrived by mail at the U.S. Attorney’s Office on a gray thumb drive (likely swimming<br />
alongside some drugs that had been purchased on the Silk Road).<br />
Tarbell, now holding that drive in his hand, swept past the security guards at the FBI building. He<br />
clicked his key card and charged toward the twenty-third floor, looking for Thom Kiernan, the<br />
computer scientist he worked with in the cybercrime group.<br />
“I got it,” Tarbell said gleefully when he found Thom in lab 1A.<br />
The computer station in the lab was a long bench with monitors, keyboards, and hard drives in<br />
every direction. The two men pulled up chairs in front of one of the machines as Tarbell handed Thom<br />
the drive, watching with rapt anticipation as he placed it in the computer. Thom’s fingers started<br />
rapidly dancing on the keyboard, opening the folders and delving into its content. The two men were<br />
anxiously excited at the possibility of what it might hold. And then Thom’s expression crumpled. He<br />
turned to Tarbell despondently and said the last two words on earth that either of them wanted to hear:<br />
“It’s encrypted.”<br />
On the screen in front of them was an endless string of random characters, numbers, and letters<br />
that looked like complete gobbledygook. Thousands of lines of unintelligible garbage.<br />
Tarbell was deflated as he picked up the phone and called Serrin Turner at the U.S. Attorney’s<br />
Office, the man who had just handed him the drive, leaving a voice mail that said to “call me back as<br />
soon as possible; there’s a big problem.”<br />
“Fuck!” Tarbell blurted out as he slammed the phone down. “It’s game over.”<br />
After a few pointless attempts at unlocking the folders (which was akin to trying to break into<br />
Fort Knox with a paperclip) Tarbell reluctantly wandered back to his desk, dejected. In the afternoon<br />
Serrin called him back.<br />
“What are we going to do now?” Serrin asked.<br />
“I honestly have no idea,” Tarbell replied. “I’m not sure there is anything we can do.” As far as<br />
they were concerned, it really was game over. He hung up, crushed.<br />
A couple of days went by, and Tarbell called Serrin again to discuss something else. At the end<br />
of the call, Serrin asked if they had made any headway on the Silk Road server.<br />
“Nothing,” Tarbell said.<br />
“And the pass code didn’t work?”<br />
“What pass code?”<br />
“The Iceland guys sent a pass code along with the thumb drive,” Serrin explained.<br />
“You never gave me the pass code!” Tarbell responded, shocked that this was the first he was<br />
hearing about this, as the excitement from days earlier returned.<br />
“I’m pretty sure I did? Here, let me get it,” Serrin said, rustling some papers on his desk. “It’s<br />
‘try to crack this NSA’ with no spaces.” It was a jab at the NSA from the Icelandic authorities after<br />
Edward Snowden had leaked a slew of top secret information to the press a few months earlier. When<br />
Thom typed the password into the files on the gray thumb drive, they opened like magic, and there, in<br />
front of Tarbell’s eyes, was the entire Silk Road server, unencrypted and as plain as day.