Menu
Federal investigator to plead guilty to Silk Road robbery

Federal investigator to plead guilty to Silk Road robbery

Two federal investigators extorted more than $1 million from the Silk Road undergound marketplace during their investigations

Joshua Dratel, the attorney representing convicted Silk Road mastermind Ross Ulbricht, speaks outside a federal courthouse in Manhattan following sentencing on May 29, 2015.

Joshua Dratel, the attorney representing convicted Silk Road mastermind Ross Ulbricht, speaks outside a federal courthouse in Manhattan following sentencing on May 29, 2015.

The U.S. Department of Justice's conviction of Silk Road mastermind Ross Ulbricht may have been compromised by two corrupt investigators.

U.S. Drug Enforcement Administration agent Carl Force will plead guilty to extorting more than US$450,000 from the Silk Road online underground marketplace during his investigation of the site.

Force, who was a U.S. Drug Enforcement Administration agent, is the second federal officer who has been charged with taking money from the marketplace.

Last week, ex-Secret Service agent Shaun Bridges, who worked with Force on the same task force, reached a plea bargain with prosecutors, for funneling money from Silk Road during the course of the investigation.

Force will plead guilty to extortion, money laundering and obstruction of justice, according to court papers filed Monday with the U.S. District Court for the Northern District of California.

Last month, Silk Road creator Ross Ulbricht was sentenced to life in prison for his involvement with Silk Road, which federal authorities estimated generated over 1.2 billion in drug sales between 2011 and 2013.

Ulbricht's lawyer, Joshua Dratel, did not return immediate requests for comment though has stated at press conferences that the federal agents' misconduct could possibly play a role in Ulbricht's appeal, given how their actions may have damaged the integrity of the government's case against Ulbricht.

Both Force and Bridges were part of an undercover multi-agency task force investigating Silk Road prior to the operation's bust in October 2013.

During the course of his Silk Road investigation, Force had the DEA freeze an online, $297,000 account of one of the site's users, the DOJ says in court documents. He transferred the money into his personal account, rather than to the DEA, according to the DOJ.

Force also defrauded Ulbricht at least twice in 2013, using a number of pseudonyms on Silk Road, the DOJ says.

As "French Maid," Force talked Ulbricht into paying $98,000 for inside information about federal investigations into Silk Road. Then, as a drug dealer named "Nob," he convinced Ulbricht again to pay $50,000 to reveal investigation information, the DOJ said.

In both cases, Ulbricht's funds were transferred into Force's personal account, according to court documents. All the transactions were conducted in the bitcoin digital currency, which was the sole method of payment for Silk Road.

Bridges, who was charged with money laundering and obstruction of justice, took more than $800,000 worth of bitcoins from Silk Road, using a highjacked administrator account, the DOJ said.

Joab Jackson covers enterprise software and general technology breaking news for The IDG News Service. Follow Joab on Twitter at @Joab_Jackson. Joab's e-mail address is Joab_Jackson@idg.com


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Criminaljustice departmentlegal

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments