I have thought this before too but really I highly highly doubt it. There are two things that I take into consideration. First, SR is pretty near the pinnacle of security when it comes to cyber crime. Tor hidden service, Bitcoin with mixing sort of built in and highly suggested, GPG highly suggested, probably a somewhat hardened server, many people using hardened linux distros, etc. Most cyber crime groups are not using anywhere near the security we are, they are picking up wires with fake ID's, using web proxies or VPNs, trusting safe-mail to keep their communications encrypted, using non-hidden servers and everyone on windows etc. And those are the people who are actually better than average when it comes down to it. The only people I see using better security than is suggested and partially enforced on SR, are super l33t hackers with botnets bigger than Tor is who are also well versed with crypto, programming and computer security concepts, and intelligence agencies (and usually there is significant overlap between them and the super l33t hackers). Even if you think of mail traffick groups who are not on the internet our security pwns them, most of them are not using vac seals at all (instead using strong cover scents) and they generally package shit in such a way that it fits the profile used to look for drug mail. So compared to everyone else our security and protocols are really pretty high end. Why would the feds encourage that? Not to mention SR can't break GPG or trace Tor or mixed bitcoins etc anymore than anyone else can.... which brings me to my next point. The technology we are using really isn't enough to prevent someone who really knows what they are doing to fuck us, especially if they have some money to throw at it. Tor hidden services can be traced fairly easily, even Tor clients can be traced pretty damn fast by an attacker who has 50 entry guards (what was it, 11% chance of not being deanonymized after one year, if the attacker can watch the end point and they own 50 entry guards?) I mean there are a lot of methods for seriously hurting the anonymity provided by Tor. Even if people are using open/cracked WiFi + Tor (which I highly doubt many do) there are a lot of potential ways to narrow in on a person using open WiFi that they would need to be protecting themselves from. GPG is great encryption, but it doesn't prevent you from being hacked and having your plaintexts/private keys stolen. And even though many people here are using above average computer security (linux distros, security oriented linux distros, isolation techniques, etc) a lot are still not. And nobody here is using cutting edge computer security techniques I doubt more than 1% of people here have ever written a mandatory access control profile and probably nobody or very close to nobody here is using physical hardware isolation for Tor/firefox or air gaps for encryption. Plus even if you don't look at the computer security component, an open market is pretty easy to nym flood with human-intelligence-bots for address harvesting. So in the end I doubt SR is run by LE, but I also doubt it could withstand them if they had the slightest clue what the fuck they were doing. If they have some Tor zero day and have managed to pwn 150k+ people it would be a pretty epic operation, and really it is not out of the realm of possibility.