Home » Featured » Silk Road Vendor “Hammertime” Busted
Click Here To Hide Tor

Silk Road Vendor “Hammertime” Busted

After a year long operation, as it was published here:

ALOHA, Ore. — Washington County Sheriff’s Office tactical officers raided three locations and arrested several [4] people in connection with a major drug investigation Tuesday. Detectives said the suspects stole people’s identities, created fake profiles and used a website called “Silk Road” to sell methamphetamine around the world in an online drug trafficking ring they operated from Aloha. A federal indictment said the suspects transported more than $500,000 in meth. According to investigators, the drugs were shipped through FedEx and the U.S. Postal Service. …”This is a very complex investigation that has taken us a year to investigate because we are dealing with Internet crimes and when the Internet is involved, people are using computer names,” said Sgt. Bob Ray with the Washington County Sheriff’s Office. “It’s very difficult, it’s a long process.” …Washington County detectives said they expect to make more arrests as the investigation continues. They are currently searching for suspect Donald Bechan, 39, who is shown in photo at left.

Later on, the user Gwern posted on the reddit the following information:

The group is identified as the seller “hammertime” in the federal indictment; the indictment (3:13-cr-00596b-J0) is not yet available through PACER (likely tomorrow), but the news video segment featured a screenshot of the first page identifying hammertime.

Image of Hammertime Vendor page from StExo Silk road pages backup: hammertime busted Screenshot from the not-yet published indictment identifying the nickname of the vendor: hammertime2 The suspects arrested Tuesday were Richard Webster, 45; Robbie Shelton, 44; Tina Heagle, 46, and Lesa Jump, 63. Edit: This was also posted later on in the same reddit thread:

Indictment against four alleged Silk Road meth dealers

Leave a Reply

Your email address will not be published. Required fields are marked *


Captcha: *