DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former federal agents in Silk Road investigation charged with bitcoin money laundering and wire fraud

Posted on March 30, 2015 by Dissent

Two former federal agents have been charged with wire fraud, money laundering and related offenses for stealing digital currency during their investigation of the Silk Road, an underground black market that allowed users to conduct illegal transactions over the Internet.  The charges are contained in a federal criminal complaint issued on March 25, 2015, in the Northern District of California and unsealed today.

Carl M. Force, 46, of Baltimore, was a Special Agent with the Drug Enforcement Administration (DEA), and Shaun W. Bridges, 32, of Laurel, Maryland, was a Special Agent with the U.S. Secret Service (USSS).  Both were assigned to the Baltimore Silk Road Task Force, which investigated illegal activity in the Silk Road marketplace.  Force served as an undercover agent and was tasked with establishing communications with a target of the investigation, Ross Ulbricht, aka “Dread Pirate Roberts.”  Force is charged with wire fraud, theft of government property, money laundering and conflict of interest.  Bridges is charged with wire fraud and money laundering.

According to the complaint, Force was a DEA agent assigned to investigate the Silk Road marketplace.  During the investigation, Force engaged in certain authorized undercover  operations by, among other things, communicating online with “Dread Pirate Roberts” (Ulbricht), the target of his investigation.  The complaint alleges, however, that Force then, without authority, developed additional online personas and engaged in a broad range of illegal activities calculated to bring him personal financial gain.    In doing so, the complaint alleges, Force used fake online personas, and engaged in complex Bitcoin transactions to steal from the government and the target of the investigation.  Specifically, Force allegedly solicited and received digital currency as part of the investigation, but failed to report his receipt of the funds, and instead transferred the currency to his personal account.  In one such transaction, Force allegedly sold information about the government’s investigation to the target of the investigation.  The complaint also alleges that Force invested in and worked for a digital currency exchange company while still working for the DEA, and that he directed the company to freeze a customer’s account with no legal basis to do so, then transferred the customer’s funds to his personal account.  Further, Force allegedly sent an unauthorized Justice Department subpoena to a online payment service directing that it unfreeze his personal account.

Bridges allegedly diverted to his personal account over $800,000 in digital currency that he gained control of during the Silk Road investigation.  The complaint alleges that Bridges placed the assets into an account at Mt. Gox, the now-defunct digital currency exchange in Japan.  He then allegedly wired funds into one of his personal investment accounts in the United States mere days before he sought a $2.1 million seizure warrant for Mt. Gox’s accounts.

Bridges self-surrendered today and will appear before Magistrate Judge Maria-Elena James of the Northern District of California at 9:30 a.m. PST this morning.  Force was arrested on Friday, March 27, 2015, in Baltimore and will appear before Magistrate Judge Timothy J. Sullivan of the District of Maryland at 2:30 p.m. EST today.

The charges contained in the complaint are merely accusations, and the defendants are presumed innocent unless and until proven guilty.

The case is being prosecuted by Assistant U.S. Attorneys Kathryn Haun and William Frentzen of the Northern District of California and Trial Attorney Richard B. Evans of the Criminal Division’s Public Integrity Section.  The case was investigated by the FBI’s San Francisco Division, the IRS-CI’s San Francisco Division, the Department of Justice Office of the Inspector General and the Department of Homeland Security Office of the Inspector General in Washington D.C.  The Treasury Department’s Financial Crimes Enforcement Network also provided assistance with the investigation of this case.

Further Information: Case #: 3-15-70370-MEJ

SOURCE: Department of Justice

Category: Government SectorInsiderU.S.

Post navigation

← Florida Department of State exposes non-confidential voter information (updated)
GA: Identity thieves strike United Way →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • ICE takes steps to deport the Australian hacker known as “DR32”
  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.