Darknet Diaries

156: Kill List

63 min
Mar 18, 2025about 1 year ago
Listen to Episode
Summary

Chris Montero discovered a dark web hitman-for-hire scam site called Bessa Mafia with critical security vulnerabilities, exposing hundreds of real murder solicitations. Working with journalist Carl Miller, they documented over 900 kill orders, contacted victims, and coordinated with law enforcement to prevent murders and secure convictions, though the site remains operational.

Insights
  • Even illegal dark web sites prioritize profit over security, making them vulnerable to exploitation by researchers and law enforcement despite their anonymity
  • Traditional law enforcement coordination failures (FBI not informing local police) can result in preventable deaths; direct victim contact by journalists proved more effective
  • Scam sites can generate millions in revenue by exploiting psychological belief in hitmen despite their non-existence in reality
  • URL parameter tampering and insecure direct object references remain critical vulnerabilities even on supposedly sophisticated criminal platforms
  • Vigilant documentation and data preservation by independent researchers can compensate for institutional gaps in cross-border law enforcement
Trends
Dark web scam sites increasingly use sophisticated market-like interfaces and escrow systems to appear legitimate while remaining pure fraudHitman-for-hire websites exploit Hollywood mythology and relationship desperation rather than actual criminal capabilityLaw enforcement struggles with international coordination on dark web crimes, creating gaps that independent researchers must fillBitcoin transaction analysis remains critical forensic evidence in dark web crime investigations despite anonymity claimsRelationship violence and coercive control are primary motivators for dark web murder solicitations, not organized crimeThreat actors use intimidation tactics (burning cars, arrest framing) to silence researchers and journalists investigating their operationsDark web site operators prioritize SEO and reputation management to attract victims, treating murder solicitation as a scalable business modelIndependent researchers with technical access can outpace institutional law enforcement in identifying and preventing crimesVictims of murder solicitation often disbelieve warnings due to scam fatigue and difficulty accepting relationship partners as threats
Topics
Dark Web Security VulnerabilitiesInsecure Direct Object References (OWASP Top 10)URL Parameter Tampering ExploitationBitcoin Forensics and Transaction AnalysisMurder Solicitation and Hitman ScamsLaw Enforcement Coordination FailuresDark Web Market ArchitectureVictim Notification and Duty of CareRelationship Violence and Coercive ControlEscrow Systems and Fraud PreventionCross-Border Cybercrime InvestigationJournalist Safety and Ethical DilemmasDark Web Site Administration and MonetizationThreat Actor Intimidation TacticsData Preservation and Evidence Collection
Companies
Sentry
Application error tracking and debugging platform featured as episode sponsor with AI-powered root cause analysis
Black Hills Information Security
Cybersecurity training and penetration testing firm sponsoring the episode with anti-phishing programs
Flashpoint
Threat intelligence provider featured as sponsor offering real-time security alerts and geopolitical risk analysis
People
Chris Montero
Cybersecurity professional who discovered Bessa Mafia vulnerabilities and documented 900+ murder solicitations on dar...
Carl Miller
Journalist and investigator who partnered with Chris to create Kill List podcast and contact victims to prevent murders
Yura
Administrator of Bessa Mafia hitman-for-hire scam site operating since 2016, generating millions in Bitcoin revenue
Amy Allwine
Minnesota victim whose husband paid $12,000 on Bessa Mafia to have her killed; murdered despite FBI warning
Steven Allwine
Church deacon convicted of first-degree murder of wife Amy after using Bessa Mafia; currently serving life sentence
Ron Ilg
Neonatal surgeon convicted for paying $50,000+ on Bessa Mafia to kidnap and control wife Jennifer using drugs
Jennifer Ilg
Wife of Ron Ilg who was targeted for kidnapping and drugging; emerged from dangerous relationship after investigation
Jack Reissider
Host of Darknet Diaries podcast who interviewed Chris Montero about the Bessa Mafia investigation after 7-year wait
Quotes
"I haven't been robbed yet. Everyone sees him next to me and they don't mess with me because he's there."
Jack Reissider (recounting Las Vegas bodyguard story)Opening anecdote
"I knew very easily that this website was a scam. You know, there was plenty of tales beyond that. But again, I knew it wasn't was a scam."
Chris MonteroEarly investigation phase
"If a site should be secure like a hitman for hire site or your therapist, maybe it's not. Just like in the case of this."
Jack ReissiderSecurity vulnerability discussion
"There are people being murdered on the list right now who I haven't got to in time. You know, there's probably dozens of people on the list who are dead and of those half of them I could have saved."
Chris MonteroOngoing investigation reflection
"People feel almost disappointed to learn that hitmen don't really exist. This idea that there are people out there at a retail level you can just hire to eliminate your worst relationship issues... it's a total pop culture fantasy."
Jack Reissider (citing Hitman film)Closing segment
Full Transcript
I used to live and work in Las Vegas. What a town that is. I'm so glad that I got out of there. It's like I had a hole in my pocket all the time and I could ever find where it was. Anyway, I was playing craps one day. It's where you throw the dice, it's a big table. And this Fray-Holl-Old man came up and he was playing too and he was betting big. He was getting wild with his money, having a good time. And I was rolling the dice and he was making money off of my dice roll. So he was liking me and we started chatting it up. But there was this dude behind him, a big guy. Not a muscular man, but a guy who probably loves cheeseburgers if you know what I'm saying. And I asked him, hey man, you wanna get in on this game? I got a hot roll going. He didn't say anything. And the old guy turns to me and he says, oh, don't mind him. He's my bodyguard. And I was like, oh really? This guy is your bodyguard? And then the old man told me something that surprised me. He said, yeah, but I don't actually pay him to protect me if there's actually a fight. And I was like, what? You don't pay him to rescue you out of anything? No, no, I can't afford that kind of bodyguard. This guy just stands next to me. And if something goes down, he knows he doesn't need to step in. And I'm like, well, hold on a second. Why are you paying someone to stand next to you? And he said, to be my bodyguard. And I was like, no, but he's not guarding you though. And the old man said, yeah, but no one knows that. Everyone sees him next to me and they don't mess with me because he's there. And I was like, does that work? And he said, yep, I haven't been robbed yet. These are true stories from the dark side of the internet. I'm Jack Reissider. This is Dark Knight Diaries. This episode is sponsored by Sentry.io. Applications break in all kinds of ways. Crashes, slowdowns, regressions. The stuff you only see once real users hit it. Sentry, that's S-E-N-T-R-Y, catches all of it. You get traces, replays, errors, profiles, and the details around them like stack traces, commits, releases, and the developers who broke it. And you get a lot of information about the stuff that's been done by the developers. And you get a lot of information about the stuff that's been done by the developers who broke it. All in one connected view. So you're not jumping between tools trying to figure out what happened. Sentry shows you how the request moved, what ran, what slowed down, and what the user saw. SEER, Sentry's AI debugging agent, takes it from there. It uses all of that Sentry context to tell you the root cause, suggest a fix, and can open a PR. It also reviews the PRs for you and flags breaking changes with a fix ready. Try Sentry and SEER free at sentry.io. Free dev plan and listeners of the show can use the code darknet for $100 in Sentry credits. When you go to sentry.io, that's spelled S-E-N-T-R-Y. Go to sentry.io and tell them I sent you by using code darknet for $100 in Sentry credits. This episode is sponsored by Black Hills. Black Hills has earned the trust of the cybersecurity industry since John Strand founded it in 2008. You've got to already know that if you want to test your defenses or need around-the-clock monitoring, Black Hills is where you look. And I really hope you've already checked out their anti-Siphon training programs too, where they teach you to think like an attacker. It's hands-on, practical training built for defenders who want to level up. But did you know about the webcasts, blogs, zines, and comics all designed by hackers, for hackers? They even spun up a whole comic series called The Future Is from Wrecker Comics. It's like Black Mirror meets hackers, filled with hands-on cybersecurity challenges. You can find it in over 700 comic shops worldwide, or, you know, from the comfort of your keyboard at their online store, the Spearfish General Store. And that place is a rabbit hole of its own. They've got the back doors and breaches, card game, shirts, stickers, and the RECA hoodie, which is hackers spelled backwards. So when you look in the mirror, well, yeah, you get it. You see the hacker that you always knew you were. And because you're a darknet diaries listener, they've got a very special thing waiting for you at blackhillsinfosec.com slash darknet. That website is blackhillsinfosec.com slash darknet. I think it was like, man, it was like seven years ago at this point that I was told, I need to get Chris Montero on the show and talk about what he found. So of course I slid into his DMs and I said, all cool and stuff. And he was like, hey, man, I heard you're deep into the web. He's like, can't talk about it. Too sensitive right now. So I was like, okay. And I followed up a year later, but again, he didn't want to talk. And he's like, no, I'm done with that. I walked away from that. And then maybe like another two years after that, I asked him again. This time he's like, the police are investigating this. We're going to have to wait. Then I think another time he told me there are threats against him, so he needs to stay low for a while. And it's just been one of those stories that the longer it goes on, the more intrigued I am by it. And I really hoped one day I could talk with him. And now, now Chris Montero is ready to talk after seven years of waiting for him. And I can't wait to finally hear what he has found on the deep, dark web. Okay. Yeah. I'm Chris Montero. I'm a cybersecurity professional. Up until now, the main thing I know about Chris is that he spends a lot of time on the dark net. Basically the anonymous side of the internet that you need a special connection to get into. And this seems to be where Chris feels comfortable. Well, can we say I look at that interest in it because I don't, I really try not to do it anymore. But back in 2015, 2016, I, I did a bit. I got, I got very into things. As I'm sure you and your listeners know, one of the things that web is well known for is the dark net markets where you can buy drugs and stolen data. And there's also loads of urban legends and nonsense and scams out there. And so in 2015, 2016, I was really into writing for Wikipedia, writing definitions for what dark web means, what deep web means, what a dark, what a history of dark net markets, how does it instigate for tour, what are the police doing, what are the academics saying about the commerce and ultimately about the scam. So I, there was a time where I was very into documenting cyber crime, which I don't recommend. I mean, there's crime and then there's cyber crime, but then there's dark web cyber crime. And the stuff that happens over there, well, it all has this veil of secrecy, you know. And so the stories we hear that come out of there are a little bit more brutal and ugly than a normal cyber crime story. And trying to keep up with all the ugliness that goes on there, it's rough on your soul. I mean, starting out, okay, he was learning about the dark net drug marketplaces and how they worked and he became an expert in that whole world. I went a bit too far. And as, as, as I was then and today I am a self-proclaimed expert on dark net markets and the dark web. I started debunking scams. Dark net, dark web scams or they were people saying, oh, there are secret fights and deaths between midgets. There are, there are AIs which have escaped and will aren't do anything. There are rooms you can go to and you can participate in live stream the murder in so-called red rooms. This is nonsense or this is all rubbish. But people don't care because it's so difficult to talk about cyber crime in the dark web that, you know, people on YouTube and on the internet was make up shit for their own entertainment and no one's interested in the real answers. So I found a niche where I was going to start writing about all of these fake phenomena in depth with the met citations and original research and aggregated research as possible. And I did that. And one of the ones I covered, just one of many was hiring a hit man on the dark web. Well, I thought to myself, I know how all this works. I know how reputation systems work with dark net markets. I know how S-Grow works. I know how the web of trust between the sites work and how you find them. So it should be very easy to find out what if a such a website is fake or real. And I found, I was documenting them and I found a slightly more sophisticated website, which again was, it was looked like a dark net market. You could register and you could apparently hire a hit man and you could pay money for S-Grow and get someone killed. And it was just like a dark net market, like Silver Road or something like that. So we looked into this hit man for hire site deeper. And yeah, he snipped it out pretty easy that it's just a scam. No actual hit man or hero you can hire to kill someone for you. It's just a myth to be able to hire a hit man online. So he took his findings and wrote it up at the time he was writing articles on rational wiki. And this is a place that debunks conspiracy theories and explains when something is pseudoscience or real. So he writes an article there saying, yeah, hit men for hire sites on the dark web, they're all scams. Don't believe it. I had my rational wiki article vandalized by an IP in Romania saying that, oh yes, the dark web hit men sites are scams apart from Bessa mafia, which is real. And like what? You can't edit my wiki page. That's not cited stuff. You can't do that. And so it began. And that message was from the person we know as Yura. Okay. So this edit explicitly said the dark web hit man for hire site Bessa mafia is not a scam. You can actually hire a hit man there. Well, this of course drew Chris's attention. Naturally, he goes there to investigate it further. And he's never even heard of this site before Bessa mafia. Yes. Bessa mafia is a hit man for hire site. You know, this site is run by some organized criminal gangs. It's just like a real dark net market. You can't get scammed. There's mediation. And instead of buying drugs, you might murder. And I spent a lot of time dealing with this. Yeah. So your first take on it or even like your first day of looking at it, did you think this did look legitimate? No. Again, I had spent over a year at this time documenting the history of real dark net markets, dark net commerce, dark net navigation. I knew very easily that this website was a scam. You know, there was plenty of tales beyond that. But again, I knew it wasn't was a scam. So I just, but I thought, you know, whatever, I write blog posts about it. It's a bit interesting that someone's made a hit man for hire scam site, but it actually like make it like a market and made it look real. So I wrote a blog post about it and saying how this website is fake and has like stopped photographs on it and bad spelling. It doesn't make sense. And yeah, there you go. And it's in my body of research on Dino Scam's job done. What's I for? The administrator of Bessa Mafia, his name is Yura, was quite interested in the reputation of his site. So much so that he paid people to promote the site, where there would be Reddit posts about the site, blogs being made and other freelancers hired to just drama business for the site. So if you Google the site, you'd see all these positive reviews of the site. But then there was this one blog that Chris wrote about how that site specifically is a scam. So I had pissed off the site administrator. So he asked for a true and honest interview with me. He contacted me via my blog and I said, sure, why does a scammer want to interview me about, you know, why is site is fake? What's that about? And yeah, we went back and forth and he was saying the site is real. I would shut him down. He would count with some flimsy evidence. I would unpick it. He would get aggressive. I would show him that as a site and he doesn't know what he's doing about. And he would try to pain me off. And this escalates at the point. I'm like, yeah, this guy just ducking to himself a hole. This scam is trying to persuade me at the time at least authority on dotnet scams that his diet's not a scam. It's not going to work. And yeah, so I published that whole exchange on my blog. I thought that's all right, you know, debunked and have a site. Got some fair sand evidence done some done some journalism even. And there we go. I thought I'd be end of it. This is when the narrator comes in and says, it wasn't. The site administrator, euro was not happy with this post and was on a mission to get Chris to remove it. And if an interview with him didn't persuade Chris, then they're going to have to take it to the next step. And if you think about it, what kind of persuasive tactics could a hit man for hire site try next? Yeah, you got it. Intimidation. The administrator hired someone to make a video to threaten Chris. And so Chris gets a message from someone with a link to a video and Chris watches the video. It starts out on a piece of paper and written on that piece of paper is Chris's blog's website, pirate dot London. That's the website address. And then they burn the piece of paper and then the camera changes to a car being set on fire and it's engulfed in flames. And like basically torching your car in order to intimidate me. So in order to say, look at us, we're real criminals. We have people in the field. We can trivially commit acts of violence. Don't fuck with us. And I was very confused by this because this was a scam. This was a scam site. There were no hit men. There were no criminals. So I thought there was just it's just a scam, still money. I'm getting a video of a burning car. And yeah, I would say Ben got weird. Did it feel intimidating to you? Did you feel like, wait a minute, this is a maybe I should just back down from this whole thing. I mean, I was a bit intimidated. I was intimidated. But you bear in mind this time I'm making myself a really into the hobby of being the dark net scam debunker guy. And I was anything I was drawn in law by this. I was like, what is going on? Have I pissed off the Matthew? Is this website real? But it can't be real. So if it's not real, how are they getting people to torch cars? And they don't have torch some other cars for some other people on the Internet who had who had disrespect for them as well. So it was a whole thing going on. So I got really I was yeah, I was intrigued, but I had to go on. Chris decides to play it safe though. And he hires a lawyer and he informs the police about the threatening video. I'm like, okay, fine. Mr. So-called hitman, the hire site on the dark net. What's going on with you? So I've been just browsing the website at this point. I thought, well, okay, I will register on the website and see how it works. So I registered as I registered as Boat in the Boatface because it was 2016 and Boat in the Boatface was cool. And I took out a hit on Bob the Builder, the loveable children's character on the websites. And I thought, well, okay, it's okay. The website seems to have a login system, has an ordering system, has a messaging system, has some and whatnot. So it seems quite functional. There's like, you know, got the trappings of the dark net market. So I thought to myself, that's weird. But I looked to my order for taking out Bob the Builder, you know. And I looked at the address bar and I saw that there was an ID in the address bar at the end. It's like message ID equals 123. I thought, okay, so that's the message ID. I wonder if I changed the message ID to something else. Change it to 122. And I got someone else's messages. 121, I got someone else's messages. What? He could see other users' messages. Okay, I have opinions. First, let's talk about this vulnerability. I would call this URL parameter tampering. I think that sounds cool, right? To tamper with a URL. And that's where you just change part of the URL to like one number different or something to see if you can see someone else's data. But I think the official term is insecure direct object reference. One user should never be able to access another user's private data such as private messages like this. Yet here it sounds like it was incredibly simple to do. A more complex approach might be that you have to go into the cookies and change which user you are. And then the site thinks you're a different user without actually validating that. But this wasn't even that hard. You just changed one number in the URL. This vulnerability is number one on the OWASP top 10 vulnerabilities which falls under broken access control. But I want to point out something else here. Just because you're on the dark web. Just because you're on a site that is supposedly very illegal does not mean it's actually secure. You would think if this site was actually a place to hire a hitman that the utmost extreme privacy would be put in place. But it wasn't not even close. The site was a total joke as far as security and privacy goes. And I want you to keep that frame of mind whenever you're dealing with anything with sensitive data. Your doctor, your lawyer, your bank, your tax advisor, they should all be using the utmost private way of communication. But their systems aren't always secure or private. And I just want you to think about that. If a site should be secure like a hitman for hire site or your therapist, maybe it's not. Just like in the case of this. Oh, and it's kind of hilarious that Chris is basically hacking into this site. Since it might technically be illegal for him to do that. But what is the owner of the site going to do? File a police report and say, hey man, someone hacked my hitman for hire site. So it seems like a safe thing to do. Anyway, this was a huge discovery for Chris to be able to read any message on the site that other users were sending to the administrator. So he quickly put together a little script to enumerate through all these message IDs and to save them all into a spreadsheet. So he can go through and read all the messages on this hitman for hire website on the dark web. Yeah, I've downloaded over 100 messages at this point. The website has only been in operation for a few months there, but I've downloaded all the messages. And I'm having my mind blown here because I'm seeing messages not just like messages for me, but I've been voting about both face. There are some trolls and some spamming there, but there are people and they're giving names, addresses, follow up times, where to meet them, phone numbers, talking about alibis, talking about timings, negotiating payment, negotiating further payment and I'm reconstructing these on my local machine from all the messages. And I'm starting to sort them out and see what's going on. And what I realized is that yes, there's some crap going on the website, but there's a subset of people who are using the website or something to get people killed and to arrange money to get people killed. And well, that's what it looked like to me at least. Well, hold on here. These messages are a bit alarming, haunting even. A user wants a certain person dead, enlist their name, address, phone number, place they work, pictures of them, Facebook account and how and when to do the murder so that this person has good alibi. Not only that, but money is actually being sent to pay for this. This is chilling. I've mostly been completely unable and unwilling to engage in these cases emotionally because they are really bad. I mean, you know, I mean, I'll quickly give a story of one case which is concluded in news now. There's a case where someone paid $20,000 to kill at a time of 14 year old boy in New Jersey. Interestingly enough, I never had the full details on that until it went to court. It turned out it was online groomer who was grooming this 14 year old over the Internet and having to show pictures and whatnot. And when he told his parents, the guy was like, oh shit, I'm going to trouble here. I bet I haven't killed. So not only was this young boy abused, he was almost killed by this guy. An online groomer put a hit on his victim for telling his parents and then paid $20,000 to have this boy killed. Whoa, whoa, whoa. And Chris can see the Bitcoin wallet address in the chat messages and is confirming that, yeah, in fact, money did get sent to the site for this. This just got way more serious and went deeper than he realized. Chris was thinking about getting help from someone. I met Carl in, was it like late 2016 or so? Carl, how did that go? Yes. Yes, we met in late 2016 just before Christmas, not a meeting that is easy to forget. It was in a pub in central London and it was really busy and crowded and I'd met not Mechra's before and mutual friends of ours had put us in contact. And I was kind of roving around trying to write a book about power and the digital age, which sounds about as vague as it was at that point in my mind. Carl was looking for a good story and was interested to hear what Chris was working on. I'm Carl. I'm a writer and journalist. Carl and Chris talked. Carl was very interested in this, but Chris had a hard time making the connection in his head that the words written in those messages are from real people. I mean, he's in the business of debunking things online, you know? And you see so many threats online today. It's hard to put your finger on something and say this is a real threat from a real person, but then ignoring so many other things. I mean, gosh, how many times have we all heard, Jack, if you come into the house one more time with mud on your shoes, I will kill you. All right, maybe this is just me, but you get my point. You hear threats to life all the time in our everyday language. But on top of that, the dark web is an anonymous place, so people really run their mouth on there thinking they're private and no one's ever going to know who it was. So Chris wondered if these were real threats or not. And he made a good point. So at the end of the meeting, Carl had a clear idea of what to do next. I kind of concluded that there was no way that I could write about any of this until the police, at least, had investigated whatever it was they could investigate. So I think me and Chris have slightly different relationships to the police and thoughts about them to put it mildly. And I've spent some time embedded in a cybercrime investigations unit in a local police force in the UK, and I felt like I had a pretty good relationship with them and other police forces. And so I kind of broke a meeting between Chris and the National Crime Agency. So Chris goes to this meeting, but it's just weird from the get-go. Oh yeah, so Carl set me up this sort of super shady meeting with the National Crime Agency. I'm doing this clandestine meet here where I'm turning up to a location last minute and I'm being followed and it was all very hush-hush except that, etc. But I had a successful meeting where I outlined what I had. I gave my prioritized list of cases around the world, the sorts of money being paid, the jurisdictions involved, and the seriousness and said, look, I can't deal with this. I'm just some bloke. Can you please investigate what looks like attempted murders around the world, or at least the ones in the US or in Europe where I spent some success? And the meeting was successful. They said, great, yes, this is brilliant. This is the actual sort of thing we're looking for. We'll be in touch. And, you know, I have no reason to doubt the words of the people who I met. I think they would have probably got around to doing something eventually and we should be nice. But circumstances have conspired otherwise. One of the people who was using the website back in 2016, goes under the username, DocDateGod, was trying to get someone called Amy Allwine killed. Amy Allwine lived in Minnesota and somehow the FBI got the private messages that were from the Besse mafia website and started investigating this. The FBI had information that someone put a hit out for Amy Allwine, so they paid her a visit. And when they arrived, both her and her husband were home and they sat them both down to explain the situation. This hit man for hire website, Besse mafia, someone has paid them $12,000 to have you killed. And she was shocked and had no idea who was doing such a thing. Well, it was her husband who paid to have her killed. The very man who was in the room when the FBI was telling her that someone is threatening to kill you. The FBI didn't question the husband at all. They just notified them both and left. Her husband, Steven Allwine, who was a deacon at his church, went on the dark net, bought some scopalamine, which causes a person to become very disoriented, and gave her a huge dose of it and then shot her and killed her. He then tried to stage the whole thing to look like a suicide. And then when Amy, and I think this is the clearest evidence that they really weren't investigating this, when Amy was reported to the police as having committed suicide and Steven Allwine phoned the police and said, my wife shot herself, the investigating officer had no background, didn't know that this order existed, didn't know, I think, that Amy had been warned, and almost closed the scene down. He went to the house and he was about to declare it a suicide and about to close down the crime scene. And it was only at the last minute he paused, felt like something was wrong, and then decided to get the luminal out so a substance that allows him to see cleaned up blood and then realise the house was full of it and that Amy had been moved and then scopalamine was found in her blood and basically a whole tumble of additional evidence that suggested that she had been drugged and then murdered. I mean, can you imagine how differently you would investigate a suicide if you knew that someone had paid to have this lady killed? But the FBI never informed the local police when they did their investigation. And even after all that, they had a hard time finding evidence that Steven, her husband, is who killed her. It was only after they looked at his computer and found his Bitcoin wallet was in fact the one that sent the money to the website. And of course, the defense attorney was trying to say, well, you only know about that transaction because you illegally hacked into the messages of that website, so that should not be admissible to the court. Steven Allwine was eventually convicted of first degree murder and is currently serving life at that parole. It was a tragic and awful event that the FBI bungled big time. But it gets worse. The FBI were like, man, what is this best Amaphaea site? What is going on there? Who's running that? And they wanted to take it down. The FBI jumped into action and what they did, they guled the website. And I still have this other ongoing feud with the guy behind the website, Yura. He's paying a guy in India to write shitty blogs about me. He's adding my name to metadata on the website. He's really looking to drag my name from the mud for criticizing his website. But I don't care because like, who's going to believe that I'm running a website? I'm a person. I use my own name. I have a blog. I have a job. I live in London. I'm not running as some secret murder by the high of a website. What sort of person would think that? Turns out the FBI thought that. And between the FBI, they liaised with the National Crime Agency in the UK. And within literally, I think it's a case of hours or days of this being processed by the FBI, the NCA were breaking down my door and arresting me for running this murder for a high of a website. Chris was able to get out of his arrest, but it did affect him. Clearly this Euro guy is doing a lot of work to get Chris to shut up about this website and is willing to frame him or get him arrested. Investigating this site was becoming too much of a burden. I did take the opportunity to quit as having one still broken down and being arrested for something, which doesn't seem to be real words. I'm like, I'm out of this shit. I'm done. They've had all my information to police. I'm like, job done. Never want to hear about the website again. But the more Chris and Carl thought about this, the gravity of it just started to sink in. These are very real threats to life. And already one person has been killed. They had lots of time to help Amy, but they didn't. They could have saved her life, but they trusted law enforcement to do it instead and that failed. So maybe, just maybe they can save the next person's life. We're going to take a short break here, but stay with us. This dark web adventure is just getting started. This episode of Dark Net Diaries is brought to you by Flashpoint. 2025 has proven to be a pivotal year for security leaders. It's not just cyber threats anymore, physical risks, and geopolitical tensions are colliding, creating a web of challenges no one can afford to ignore. That's where Flashpoint comes in. As one of the largest private providers of threat intelligence, Flashpoint delivers what security teams need most, clarity. By combining cutting-edge technology with the expertise of world-class analyst teams, their Ignite platform gives organizations instant access to critical data, expertly analyzed insights, and real-time alerts, all in one seamless platform. From Fortune 500 companies to government agencies, Flashpoint is a name trusted to keep people, assets, and operations secure. To access some of the industry's best threat data and intelligence, visit flashpoint.io. Today, that's flashpoint.io. The police weren't completely incompetent. Carl and Chris gave the police all the messages that they found on the site, and this did lead the police to be able to find people who were planning murders, and the police were arresting people and putting them in prison. Because if you pay someone to kill someone else, that's illegal. It's called solicitation of murder, and you could get life in prison for doing that. Even if you're sending the money to a scam hitman who's never going to do it, it's still illegal. In fact, someone who got arrested in Spain tried to give that exact defense. They were saying, this whole website was fake, so my clients should not be in trouble, but they still got put in prison. Well, the initial idea was that me and Chris would do a short, sharp, nice, quick, kind of eight-week-long retrospective looking at the assassination market. By far, I'm the least-brave person talking right now, and I'm really not drawn to this sort of stuff. Quite a lot of my instinct was telling me not to go back into this world, and I only did my toe-in, like nothing like Chris. But I did feel, to me, it all felt those years from 2016 onwards, very much like unfinished business. The site was still operating. The person running the site was still making money from it, and only your one had been killed. Suddenly, Chris kind of brings us into a Zoom call, and then it tells us this kind of fateful discovery that he's consistently in. He's beginning to scrape his kill orders, and that the site is... And that we're essentially going to be receiving them in near real time. And that was then the beginning of the kill list. Kill List is an amazing podcast that Carl made, which pretty much starts at this point right here. With new kill orders coming in, what should they be doing about this? Chris is the dark web hacker. Carl is the investigator. Ultimately, I was able to access the administration page on the website. So this is the page administrator users to correspond with the users' website and to scan them. So that page can see everything on the site. There were some other pages as well, like pages with shared payments and so on and so forth. So once I've discovered these through technical means, I basically have a small cron job. I'm pulling them down, fully as is. I'm actually then building parsers, do parser them into a constituent component, put them into a database. And ultimately, I'm building a web front end to categorize, browse, and report on each of these cases and annotate them all. Which today I have, you know, I should have it in one of my windows, my windows are right-hand side now. I have my Hitman analysis website where I have all the cases in there, categorized by harm, by fraud, by country, by personal information, annotated with Facebook links, address links, phone numbers, etc. So, but I was able to focus on getting the data, legible, clean, kind of comprehensive, and handing this over to Carl and the podcast team. And so that was a good division of labor. So I had the technical tasks and Carl and the team had to deal with everything else. We went to the police again. The Metropolitan Police, they did believe us. But there were no UK cases. They basically decided that because there were no UK cases, it wasn't their problem. And they disclosed this kind of initial tranche of orders that Chris had compiled and handed over to us to Interpol. And we thought about that for a while and thought that this is very likely to lead to additional bungled police investigations or no investigations at all. They won't know who we are, the police. We won't know who the investigating officers are. There'll be no way for us to exchange information. And it will very likely lead to police officers kind of in the same way that had happened with Amy Orrwine, maybe receiving some kind of warning, maybe making contact, but not in any kind of position to effectively investigate, and much less gather the evidence they need to actually get someone into a courtroom. Chris would read through these kill orders and sometimes try to figure out who it was that made the kill order. So often they'll approach with some brief information saying, hey, can you do this sort of service in my location? And the answer is always, of course, yes, we have hitmen around the world. We can do it within one week. That's always the answer because it's a scam. And then they usually say, then there might be some more information like, oh, yeah, well, I'm thinking about something special. Can you give a message? Can you, in this case, do you get a kidnapping? Can you, you know, send something like that? And the answer is yes, yes, we can do that. Often it's followed up by here's the initial order. Here's a name, the address, the social media, the car they drive, et cetera, et cetera, where they work, where they can be found. Often they give a bit of information about why the person they want person killed, which usually gives them away. Like, oh, this person should return to their husband. It's like, yeah, I wonder who pays that order. Or this person should be given a message, you know, that's for being a cheater. It's like, oh, I wonder who that person could be. They do that. That happens sometimes. And after the order, there's further negotiations and there's always a price. How much is it? Oh, it's always usually $5,000, $10,000. You know, depending on how much money you have, sometimes there's a negotiation about, oh, how can you make sure you don't take the money and run? And they say, oh, no, you can't take the money and run because we have an escrow system. And if the hitman would take the money, we wouldn't give the, you know, would not, would take the money and not do a new killing. We wouldn't give them the money. So that way you are safe. But of course the escrow system is designed to stop you from a high-level hitman scamming you like you would a diet, a drug vendor scamming you. It doesn't protect you from the site itself being a scam. And then I mean, you're even has like a dedicated third party escrow sites which are independent or apparently independent where you can go to this independent site and you can broke your legal transaction and a further broke can handle this for you. It's all run by him, of course. And of course he directs everyone to use this independent website and all uses the same backend. And then you go say, I put my money in the escrow system and say, oh, I see we are a lot this we've now going to send a hitman. But then of course what happens is, oh, actually it turns out you need a higher class of hitman or you need to pay more or the hitman went there but they failed. So you need to need to make them need to pay more money or it turns out you need to, you know, this is more complicated. So you need to pay more money. And this is how it goes down in general. Chris would sometimes be able to identify who put the kill order in because it might say something like it's my wife who I want killed or something. And then they have the wife's information in the kill order to easily figure out who did this. So they decide to try to phone up the targets to see if they can warn them. But the FBI mishap with Amy Alwine was top of their mind. What if they call up someone and the person who's trying to kill them answers the phone or is listening in. And it just escalates the whole thing and they get someone killed. The plan was to try to call the person but then get them alone so that they can tell them this information in private. But man, how do you call someone out of the blue and try to get them to listen to the information you have but do they need to be alone first before you're going to tell them it sounds impossible to deal with. But Carl gave it a try. No, I don't want any information. I'm trying to give you information. Okay, well, thanks for your time anyway. Do give me a phone back if you'd like more information. And then you tried again. Would we be able to arrange a time to be able to talk to you at greater length about that? Okay. So you don't... Carl was extremely nervous on these calls. He's got the target on the phone which is hard to begin with but he's trying to be as sensitive as possible to avoid any further harm. He decides to try again to be more direct. Just, I understand you don't want to welcome me on the story. However, I'm actually duty bound to say that the information that we have might relate to you being in danger. So I'm kind of duty bound as a journalist to disclose it to you if you'd like me to. Well, I can... Actually, I don't have time for this even if you're asking me for a survey that has something to my relationship to the job or to professional work. It's not a survey. I'm a journalist. We've come across information which indicates that you might be in danger. I'm in danger? Yes, I can. Thank you for trying to protect me. Keep me to face my dangers. Thank you. Okay. Thank you. Bye. Goodbye. Wow. Leave me to face my dangers. He's not having any of it. I'm very surprised by that. I mean, if someone phoned me up saying you might be in danger, I would want to know what it was regarding. Yeah. This is turning out to be a lot harder than it sounds. Absolutely. We knew the whole thing was this ethical kind of minefield. And I was really afraid that I would do something which meant that I could never live with myself again. You know, we had this information that Chris was passing us that was unbelievably powerful. I mean, it had the power to save lives and destroy them. And we didn't know what to do. We had no real frameworks. We didn't know what the safest thing to do often was. We were having to kind of make it up in urgency as we were going along. And I didn't, you know, I mean, we could have made one. It's kind of easy now to kind of talk about all of this in retrospect. But at the time, like, you don't know what's going to happen. Like, you don't know that this call is going to turn out OK, or that person's going to be OK. And like, every single time I made that call and remember, nine times out of 10, they just hung the phone up on me or they wouldn't talk or it would be a wrong number or something like that. But every single time I dialed that number, I'd be having to like work myself up into this, what I was working myself up into this kind of state of mind where I thought, well, you know, this could be the moment where I commit some like ethical crushing kind of mistake that haunts me for the rest of my life. I think it's at this point where I was listening to the kill list and I was happy that Chris was working with Carl on this story. Like I said, I was tracking what he was working on and hoping we could talk and I was tapping him on the shoulder again and again for years trying to get him to tell me the story. But man, Carl is an amazing journalist and he has a whole team and seemingly like he has connections all over the world to try to do something about this. And I wouldn't have done even half as good of a job as what he did on Kill List. It's truly an amazing podcast. As we're doing all this, making this extremely significant decision to contact the people on the Kill List directly, we're increasingly actually not really behaving like journalists anymore. Like journalists don't normally step into stories like that. They don't normally contact victims and like drive stories or even create them. Like they normally kind of try and be as least kind of disruptive as they possibly can. That's definitely not what we're doing there. So that was also like very disorientating, like stepping further away from at least this kind of anchoring professional identity that I and the kind of team would have, you know, and becoming like something else and not really having a word for it. Oh, you know there's a word for it, Carl. You know what I'm saying? Well, if you're going to say vigilante, then I don't think we were ever vigilante because we were just we were desperately trying to get the police to step in, like not replace them. At least I was. Like we were handing over everything we did to the police. So yeah, I mean, I never thought we were vigilantes. That wasn't the right word in my mind for it either. It was like some weird gap of like being a really proactive journalist or investigator. And you might be thinking what Interpol is handling it just let them do it. But there's a reason that they felt it was important for them to continue to do something. It was because we were thinking about this disclosure route that had just appeared where Chris was passing it to us. We were passing it to the Metropolitan Police. They were passing it to Interpol. And then Interpol would presumably pass it to the police forces around the world. There was one in Switzerland, there was one in Italy, there's one in Amsterdam, you know, all over the place. The problem with that was that we knew that Interpol would basically like denude the disclosures of any identifying information of us. And we would have no idea who the investigating officers were. So this kind of cut or like breach would happen. There would be no link. Like they would just receive this Word document that Chris had created, plus maybe some like Bitcoin information. They would have no way, as the Metropolitan Police did, of actually checking to see whether I was mad or not, which they genuinely did. And we would have no way of disclosing additional information to them. And Chris was passing over like updates all the time, you know, these were live conversations that were happening. So sometimes there'd be more Bitcoin and the urgency would have changed or a specific moment or time and place were being mentioned in the order, you know, which would change how dangerous we thought it was. And we would have no way of kind of passing that on in a reasonably swift manner to the people on the ground that could actually do something about it. So that's why ultimately we decided that we needed to go to them directly. And while investigating all this, they would run into news articles that would chill them to their bones. There's many instances, many cases, I'm sure we could be touching as many as you like, but it will be pressed for time here. Like for example, there was one case where there was this against this young man in America and a couple of people, some paid $5,000 to kill him. Two weeks later, he's dead by gunshot, self-inflicted gunshot wound. You know, was there some insurance involved? Was there foul play? It's hard to say. I won't go into too much of this, but during the course of our investigation, there was one of these major cases come through where someone paid a hell of a lot of money to capital has happened, killed. And again, within weeks, that person was killed. With information like that, plus all the information, which always gives the hideous backstories on people's story of stalking, of drugging, of coercive behavior, or marital breakdown, of relationship breakdown, of people sending death threats, people putting hidden cameras, people, you know, really ruining lives. We realize that this is, it's really horrific, this stuff. And I just can't have the habit of sneak peek into the worst of it, as is Carl. And it's very, very hard to digest. And all this just adds a level of urgency to it all. So I phone maybe a dozen people, maybe two dozen, over about the course of about a week, maybe a bit longer. And it is dramatically unsuccessful. Oh, Carl, don't say that. I know it is. It really is. I mean, like, it doesn't work. Everyone thinks I'm a scammer. It turns out we were solving the wrong problem. So we thought the problem was going to be how to reach them safely over the phone, how to disclose in a way that wasn't going to, like, create to them psychologically. The actual problem wasn't no one was going to believe me. And so people hang up. They phone back, like, with their friends, and they prank me, and they pretend it's a big joke. More often than not, they literally just don't pick up the phone, though. This is the middle of COVID, remember? So people are kind of getting scam calls all the time. And so we change up what we do. And we decide to send out local journalists on the ground to physically go and try to reach the people that were on the list. And that really changes things. So it's only then, really, that we begin to make meaningful contact, reach people, be believed, and begin to kind of develop the next phase in the kill list, really, which is talking to them, supporting them, and working with the police to try and find out who put them on the list. The podcast kill list does an amazing job of documenting their adventure, calling people, talking with police, going to houses, talking with Eura even. It's a wild adventure. And you really should go and listen to it. But one person in particular that they contacted stuck with me. They discovered that there's this guy named Ron Ilg, who paid for the murder of his wife in Spokane, Washington. Okay, yeah, so obviously I'm the first person to see this. And I'm actually actually worked as a dentist because not so this guy is a neonatal surgeon. He's literally a surgeon for babies. He's also looking to break the hands of a surgeon. And it's like, and he's paying something upward of $50,000 for this. He's got like multiple step plans of when the kidnappers should have a place and taking photographs of it and how she should be brainwashed and how she should be broken and where she should be taken taken to and how he will get to see the information about this whilst while the kidnappers are remaining at a distance. It's, it's, I hate to, I don't usually use this word, but it's sick. And it's messed up. And, you know, in his mind, when he paid up $50,000, it's very much real. He was going to do this. I was able to quickly work out between these identities of this woman and this surgeon mentioned that the person who seemed to be related to them was this character called Rod Elg. And, you know, I said this is sort of information I send up send over to so it's Carl and the team. And I'm like, this guy, they've got to do something about it. You know, are the FBI working at helping at this point? Are they going to do something? Because this is just, this is just crazy. This is just, I can't believe, I can't believe this guy is going around making his plans and like no one's taking it seriously. That's terrible. In addition to that, Chris is seeing that this guy, Ron Ilg, is trying to get his wife addicted to opioids. So she'll call off the divorce proceedings. He seems extra diabolical. Chris is a subject in the emails would normally be new payer, which would always cause my heart to sink a little bit. And, but this one stood out from the very beginning for all the reasons Chris has already said. There was a bonus structure. I mean, the guy had literally already loaded in all the money for a whole series of things that had to happen to Jennifer, which were all about the use of drugs and they were all about control. And it was, it stood out for that. It stood out actually weirdly and grotesquely because it wasn't about murder, which somehow made it worse. But then it also stood up because the amount of money, a huge amount of money had been paid. It was the largest payment. So we reach out and get hold of Jennifer and speak to her and realize that she's in the middle of a kind of relationship which is leaving, which is, involves Ron, who's very dangerously spiraling out of control. He seemed to have some extremely like kind of worrying behaviors to do with control. He'd probably been tracking her. He'd been kind of allegedly putting drugs into her drink. There was another woman in the marriage that he'd kept in a septic tank under his house. It was horrifying. I think the septic tank was more of a kind of a, I don't think it was a handle-elected situation per se. It was more of a temporary BDSM handle. Well, I mean, he dressed the whole thing up as BDSM. He dressed all of this controlling behavior up as, hey, this is just my kink. Yeah, I mean, the woman wasn't in there the whole time. It was part of a, he had a dungeon, I believe, in his house. And it was just all coming together as a man who was really, really, really committed to controlling the women he was in a relationship with and didn't seem to be able to deal with his wife leaving. And this was the kind of the first time the kind of FBI really kind of moved in and kind of, we could see an investigation kind of rolling out. So Ron left for Mexico on the day that Jennifer was to be kidnapped, possibly as a alibi, who knows. But anyway, when he returned, there were 10 FBI agents waiting for him in the airport undercover. So he lands, he's immediately interviewed. His house is being searched at the same time. And he makes quite a serious error in a thumbprint safe in his house, a safe that only he could access. There is a sticky note and on that sticky note is both his username and the password for the site that Chris has been surveilling. Okay. And the police are able to get in safe and see that. They do. They drive him to his own house and he opens a safe for them. Yeah. And then, so what happens to him? Well, he's released by the police that night. He makes a suicide attempt, quite a serious one, as I understand it. I think that night or the next day, and is then placed under protective, well, he's placed under custody and then arrested when he... I just want to say that really upset me that he tried to kill himself. I got into this and saw people being murdered and even if horrible people trying to kill themselves over this. I want to make the world a better place and it's always clear whether I'm achieving that. Although, ultimately, in this case, I think I did. But Ron is not confessing to anything. He's pleading innocent and is working tirelessly to try to make a case to free him. It's a long story and we don't have time to go into it all. But he's now convicted and sentenced and is in prison for a pretty significant stretch. I think it really is. And it's winds like this where they can get a dangerous person put in prison that makes it all seem worthwhile. The kill list, this whole experience, is being a very difficult one. It's had some very bleak, very dark moments, but it's also got those moments of feeling like it's really meaningful and worthwhile. And the sentencing and conviction of Ron and Jennifer's kind of emergence from that has definitely been, for me, anyway, one of those. So it was 2020 when they started taking action on these kill orders and they've been documenting it all along. And there's just so many cases that they researched. I still feel it doesn't, it barely scratches the surface, not even the wire. It really does. The current situation, what's happening now with the site? Is it still operational or has it been shut down by the police or what? There were a series of arrests in Romania, which behind all the site operators or at least people affiliated with them. I believe the US authorities had something to do with that. And following that incident of the remaining arrests, the website had put underwent technical changes. It was shut down for a bit, came back again, intimately lost bits of access until we reached a point now where it had always no access. And so I find no new cases come in before the last year in a bit. But in that period, we have seen basically arrests on the website in the US and Switzerland and Austria. So we have evidence that some law enforcement aid to other is either cooperating with or has infiltrated the website and is making some arrests. Of the people who run the website? No, people are using the website. The website continues to operate and for all I know continues to scam people out of money and continues to enrich Romanian scammers. You talked to the admin of the site over chat. What is the reason why they run this or do this? He does the scammer. I believe he used to be a carter, someone who deals with stolen financial data and whatnot and was familiar with darknet scams. And he told me that he saw a niche for doing believable darknet scams. He didn't tell me he told a persona. I was it was a had to take it over at the time. But yeah, he just thought there was a niche for believable effective darknet murder scam to be lucrative. And he's not wrong. There are some other sites out there doing this, but I believe he's the most successful financially, the most most search engine optimized has the highest traffic, the highest number of users. And considering he's been at this since 2016 and dealing with money in Bitcoin, he will be a multi multi millionaire by now. And you know, it is me going around, you know, basically with like legal fees and doing this in my evenings and the like. It's not really, you know, it's it's it's it's helping hard to keep hard to keep it up. But yeah, it's still it's still going on. And, you know, people say, Oh, but you know, what if you get him? What if you get him when it be over? I'm like, No, it won't be over because I'm on the I've been on the website for years. They delete the messages as they go along. So you seize the website, you don't get years back with messages, you get very little. I'm the only one of the years worth of messages. So unfortunately, there's going to be no end to it in terms of the website getting shut down. For me, there's so many over when I've actually remained a of the girl list. The way that dark web websites work is that they're designed to be private. Like you can't tell where the website is hosted or where it is in the world. So you really need to wait for the website administrator to screw up and reveal something about themselves in order to take the thing down. So it's a whole time. The only thing they can do is just keep blogging and podcasting and publishing articles about the site being a scam. There was no way for them or even the police to take this website down since they don't have enough information to know who's running it or where it's hosted. Well, I think the story profoundly changed the lives of all of the people that were involved like me, Chris, Caroline, you know, everyone. It kind of it did everything. I mean, it was and is like the most for me anyway, the most by far the kind of most important, meaningful, worrying, sometimes isolated and disgustingly urgent work that I've ever found myself having to do. And it started a thing back then in 2020, which is, you know, is still going now. Like people are still going through court cases. People are still in danger. It's the most important thing I'll ever work on, I'm sure. And I really, really hope actually that I don't have to do anything like this ever again. Chris has lost access to the private messages on the site in 2023, which means they haven't seen any new killer orders come in since then, which for Carl, at least, means he's stepped away from investigating more cases. But Chris still feels there's old kill orders that are still worth looking into. So he continues to make it his duty to investigate every single person who's on the list. Again, I don't think people believe that I'm still doing this by myself. They've rather believed some comforting truth that no one uses these websites or was all in hand and nothing can be done. But that's not the case at all. There are people being murdered on the list right now who I haven't got to in time. You know, there's probably dozens of people on the list who are dead and of those half of them I could have saved. And I feel like people need to know this. And I don't know, I would like some support in this, but it's a difficult position. I'm still in. To date, they have seen over 900 people show up on the kill list and they've taken action on hundreds of them. And for the most part, Chris does it alone now. He sometimes hires private investigators to help him, but that's expensive. And since his work leads to more arrests than if the police simply handled it by themselves, it uniquely positions him to do good in the world. And he's a bit disappointed that there aren't more journalists or police that are taking him seriously that want to work with him to help him. But since he knows lives are at stake here and he has all kinds of information on them, he can't simply ignore it and walk away. To follow the latest on what Chris is doing, you can visit his website, which is Pirate.London. And I should probably tell you something. In my research for this episode, I have discovered that every single hitman for hire website on the internet has been fake. Most are operated by scammers. Some are operated by the police. But what's more is that hitmen in general are pretty much a myth. One of the things I did to prep for this episode was to watch the movie Hitman by Richard Linkletter. It's based off a true story of a fake hitman. And even in the movie, they say hitmen aren't real. Take a listen. People feel almost disappointed to learn that hitmen don't really exist. This idea that there are people out there at a retail level you can just hire to eliminate your worst relationship issues or facilitate some money scheme or the usual combination of both. It's a total pop culture fantasy. But because hitmen have been a staple of books, movies and TV for the last 50 years, good luck getting anyone to believe their existence is all a myth. Hollywood really has planted this idea in our head that seems impossible for us to undo. So I urge you to be skeptical of any such idea. But I also want to say that if your relationship with someone has gotten so bad that you want them killed, you need to get out of there. You're not acting like you, you know. That's your emotions that have taken over. And you won't be happy with yourself until you find peace. You need to find yourself again. Killing someone isn't going to give you the peace you think it will. You need to remember what makes you happy and seek that instead of violence. It's sometimes hard to see the light at the end of a tunnel during bad relationships or big breakups. But the future is so much brighter than you realize. Don't let them turn you into a monster. You're not a monster. Dig deep and find the strength to rise above it and be that amazing person that you actually are. A big thank you to Chris Montero and Carl Miller for sharing this incredible story with us. I highly urge you to go find and listen to their podcast, Kill List. The phone calls with the victims are incredible. There's one lady that they call up and they tell her, hey, your life might be in danger. And she just laughs and she's like, oh, it's probably my husband, but don't worry. He'd never harm me. And it's just wild to hear how these people react to such news. So go check out the show wherever you listen to podcasts and also keep up to date with what Chris is doing by visiting his blog, pirate.london is the website. And hey, if you want to listen to this show ad free or if you want bonus episodes, I've got 11 bonus episodes now available for you to listen to right now. All you got to do is go to plus.darknetdieries.com. That's plus.darknetdieries.com. This episode is created by me, the neon specter, Jack Reissider. Our editor is the glitch guy Tristan Ledger sound designed by the executable Andrew Merriweather mixing by proximity sound. Our intro music is by the mysterious breakmaster cylinder. My computer is so broke it ran out of cash. This is Darknet Diaries.