Search This Blog

Showing posts with label SILK ROAD. Show all posts
Showing posts with label SILK ROAD. Show all posts

Sunday, October 25, 2015

FORMER DEA AGENT SENT TO PRISON FOR 78 MONTHS DUE TO ILLEGAL ACTIONS DURING SILK ROAD INVESTIGATION

FROM:  U.S. JUSTICE DEPARTMENT 
Monday, October 19, 2015
Former DEA Agent Sentenced for Extortion, Money Laundering and Obstruction Related to Silk Road Investigation

A former Drug Enforcement Agency (DEA) agent was sentenced today to 78 months in prison for extortion, money laundering and obstruction of justice, which crimes he committed while working as an undercover agent investigating Silk Road, an online marketplace used to facilitate the sale and purchase of illegal drugs and other contraband.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, Acting U.S. Attorney Brian Stretch of the Northern District of California, Chief Richard Weber of the IRS-Criminal Investigation (IRS-CI), Special Agent in Charge David J. Johnson of  FBI’s San Francisco Division, Special Agent in Charge Michael P. Tompkins of the Department of Justice Office of the Inspector General’s Washington, D.C., Field Office and Special Agent in Charge James E. Ward of the Department of Homeland Security Office of the Inspector General’s Atlanta Field Office made the announcement.

Carl M. Force, 46, of Baltimore, pleaded guilty on July 1, 2015, before U.S. District Court Judge Richard Seeborg of the Northern District of California.  In addition to imposing the prison term, the court ordered Force to pay $340,000 in restitution and serve three years of supervised release following his sentence.

Force was a special agent with the DEA for 15 years.  From 2012 through 2013, he was assigned to the Baltimore Silk Road Task Force, a multi-agency group investigating illegal activity on the Silk Road.  Force served as an undercover agent and was tasked with, among other things, establishing communications with a target of the investigation, Ross Ulbricht, aka “Dread Pirate Roberts.”

In connection with his guilty plea, Force admitted that, while working in an undercover capacity using his DEA-sanctioned persona, “Nob,” in the summer of 2013, Force offered to sell Ulbricht fake drivers’ licenses and “inside” law enforcement information about the Silk Road investigation.  Force admitted that he attempted to conceal his communications with Ulbricht about the payments by directing Ulbricht to use encrypted messaging.  Force admitted that he understood the payments from Ulbricht, which were made in bitcoin, were government property, as they constituted evidence of a crime, and that he falsified official reports and stole the funds, which he deposited into his own personal account.  Force admitted that, as Nob, he received bitcoin payments from Ulbricht worth more than approximately $100,000.

In addition, Force admitted that he devised and participated in a scheme to fraudulently obtain additional funds from Ulbricht through another online persona, “French Maid,” of which his task force colleagues were not aware.  Force admitted that, as French Maid, he solicited and received bitcoin payments from Ulbricht worth approximately $100,000 in exchange for information concerning the government’s investigation into the Silk Road.

Force also admitted that he obstructed justice both by soliciting and accepting bitcoin from Ulbricht and by lying to federal prosecutors and agents who were investigating potential misconduct by Force and others.

In connection with his guilty plea, Force also admitted that, although he did not receive permission from the DEA to do so, he served as the chief compliance officer for CoinMKT, a digital currency exchange company.  In this role, in February 2014, Force was alerted by CoinMKT to what the company initially believed to be suspicious activity in a particular account.  Force admitted that, thereafter, in his capacity as a DEA agent, but without authority or a legal basis to do so, he directed CoinMKT to freeze $337,000 in cash and digital currency from the account.  Force further admitted that he subsequently transferred approximately $300,000 of the digital currency into a personal account that he controlled.

The case is being investigated by the FBI’s San Francisco Division, the IRS-CI’s San Francisco Division, the Department of Justice Office of the Inspector General and the Department of Homeland Security Office of the Inspector General in Washington, D.C.  The case is being prosecuted by Assistant U.S. Attorneys Kathryn Haun and William Frentzen of the Northern District of California and Trial Attorney Richard B. Evans of the Criminal Division’s Public Integrity Section.

Wednesday, September 2, 2015

EX-SILK ROAD TASK FORCE AGENT PLEADS GUILTY IN DIGITAL CURRENCY THEFT CASE

FROM:  U.S. JUSTICE DEPARTMENT 
Monday, August 31, 2015
Former Silk Road Task Force Agent Pleads Guilty to Money Laundering and Obstruction
Ex-Secret Service Agent Used Status to Pocket $820,000 Worth of Bitcoin

A former U.S. Secret Service special agent pleaded guilty today to money laundering and obstruction of justice in connection with his theft of digital currency during the federal investigation of Silk Road, an online marketplace used to facilitate the purchase and sale of illegal drugs and other contraband.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Melinda Haag of the Northern District of California, Chief Richard Weber of the IRS-Criminal Investigation (IRS-CI), Special Agent in Charge David J. Johnson of the FBI’s San Francisco Division, Special Agent in Charge Michael P. Tompkins of the Justice Department’s Office of the Inspector General’s Washington, D.C. Field Office, and Special Agent in Charge Lori Hazenstab of the Department of Homeland Security’s Office of the Inspector General in Washington D.C. made the announcement.

Shaun W. Bridges, 32, of Laurel, Maryland, had been a special agent with the U.S. Secret Service for approximately six years in the Baltimore Field Office and was assigned to the Electronic Crimes Task Force.  He pleaded guilty before the U.S. District Judge Richard Seeborg of the Northern District of California and a sentencing hearing is scheduled for Dec. 7, 2015.

“There is a bright line between enforcing the law and breaking it,” said Assistant Attorney General Caldwell.  “Law enforcement officers who cross that line not only harm their immediate victims but also betray the public trust.  This case shows we will act quickly to hold wrongdoers accountable, no matter who they are.”

“Mr. Bridges has now admitted that he brazenly stole $820,000 worth of digital currency while working as a U.S. Secret Service special agent, a move that completely violated the public’s trust,” said U.S. Attorney Haag.  “We depend on those in federal law enforcement having the highest integrity and unshakeable honor, and Mr. Bridges has demonstrated that he utterly lacks those qualities.  We appreciate the hard work of our federal partners that went into bringing Mr. Bridges to justice.”

“Through a series of complex transactions, the defendant stole bitcoins worth hundreds of thousands of dollars,” said Chief Weber.  “This case is an excellent example of the financial expertise of our special agents. Through the analysis of both the block chain and data from the Silk Road servers, we were able to trace the flow of funds, which eventually led to the defendant.”

Between 2012 and 2014, Bridges was assigned to the Baltimore Silk Road Task Force, a multi-agency group investigating illegal activity on Silk Road.  Bridges’ responsibilities included, among other things, conducting forensic computer investigations in an effort to locate, identify and prosecute targets, including Ross Ulbricht, aka Dread Pirate Roberts, who ran Silk Road.

According to his plea agreement, Bridges admitted that in January 2013 he used an administrator account on the Silk Road website that belonged to another individual to fraudulently obtain access to that website, reset passwords of various accounts and to move bitcoin from those accounts into a bitcoin “wallet” that Bridges controlled.  Bridges admitted that he moved and stole approximately 20,000 bitcoin, which at that time was worth approximately $350,000.

Bridges admitted that he moved the stolen bitcoin into an account at Mt. Gox, an online digital currency exchange based in Japan.  According to his admissions, he liquidated the bitcoin into $820,000 of U.S. currency between March and May 2013, and had the funds transferred to personal investment accounts in the United States.

Bridges’ plea agreement also established that he obstructed the Baltimore federal grand jury’s investigations of Silk Road and Ulbricht in a number of ways, including by impeding the ability of the investigation to fully utilize a cooperator’s access to Silk Road.  In addition, Bridges admitted that he made multiple false and misleading statements to investigators in connection with the San Francisco federal grand jury’s investigation into his own illegal acts, and that he encouraged another government employee to lie to investigators.

Bridges is one of two federal agents to plead guilty in connection with illegal activity during the investigation of Silk Road.  Carl M. Force, 46, of Baltimore, was a special agent with the Drug Enforcement Administration and was also assigned to the Baltimore Silk Road Task Force.  On July 1, 2015, Force pleaded guilty to a three-count information charging him with money laundering related to his theft of over $700,000 in digital currency while acting as an undercover agent on the Task Force.  Force is scheduled to be sentenced by Judge Seeborg on Oct. 19, 2015.

The case was investigated by the FBI’s San Francisco Division, the IRS-CI’s San Francisco Division, the Justice Department’s Office of the Inspector General and the Department of Homeland Security’s Office of the Inspector General in Washington, D.C.  The case is being prosecuted by Assistant U.S. Attorneys Kathryn Haun and William Frentzen of the Northern District of California and Trial Attorney Richard B. Evans of the Criminal Division’s Public Integrity Section, with assistance from Assistant U.S. Attorney Arvon Perteet.

Sunday, July 26, 2015

SILK ROAD COUPON COUNTERFEITER PLEADS GUILTY

FROM:  U.S. JUSTICE DEPARTMENT 
Wednesday, July 22, 2015
Leader of Coupon Counterfeiting Ring on Silk Road Websites Pleads Guilty

A leader of a coupon counterfeiting ring pleaded guilty today to participating in a conspiracy to sell counterfeit coupons using the “Silk Road” online marketplace, announced Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division and U.S. Attorney Kenneth A. Polite of the Eastern District of Louisiana.

Beau Wattigney, 30, New Orleans, pleaded guilty before U.S. District Judge Ivan L.R. Lemelle of the Eastern District of Louisiana to conspiracy to commit wire fraud and conspiracy to commit trademark counterfeiting.  Sentencing has been scheduled for Oct. 28, 2015.

In connection with his plea, Wattigney admitted that, between May 2012 and November 2014, he used the online monikers “PurpleLotus” and “GoldenLotus” to sell counterfeit coupons for various goods and services on Silk Road 1.0, which was a hidden website through which users around the world bought and sold illegal drugs, goods and services.  Wattigney further admitted that he engaged in the same conduct on Silk Road 2.0, a successor to Silk Road 1.0, using the monikers “PurpleLotus” and “CouponKing.”

The coupons allowed purchasers to obtain significant discounts on a variety of goods and services offered by the victim companies, including Hopster, Veri-fi, SmartSource, RedPlum and Visa.  For example, Wattigney sold a counterfeit coupon that allowed users to purchase $50.00 Visa Gift Cards for $0.01 each.

Wattigney admitted that he created and manufactured the fraudulent coupons with the assistance of several co-conspirators, and that they designed the coupons to look like original print-at-home manufacturers’ coupons by using the companies’ trademarks.  He also admitted that the scheme affected more than 50 U.S.-based businesses, and caused or attempted to cause more than one million dollars in intended losses.

The investigation is being conducted by the FBI Philadelphia Division, with assistance from the FBI New Orleans Field Office.  The case is being prosecuted by Senior Counsel Marie-Flore Johnson, Gavin Corn and Robert Wallace of the Criminal Division’s Computer Crime and Intellectual Property Section, and Assistant U.S. Attorney Jordan Ginsberg of the Eastern District of Louisiana.
a href="http://gan.doubleclick.net/gan_click?lid=41000613802101859&pubid=21000000000397724">Furniture Event - Save up to 50% at officemax.com