You are here

Justice News

Department of Justice
U.S. Attorney’s Office
Northern District of California

FOR IMMEDIATE RELEASE
Wednesday, July 1, 2015

Former Silk Road Task Force Agent Pleads Guilty To Extortion, Money Laundering, And Obstruction

Ex-DEA Agent Used Undercover Status to Pocket More than $700,000 in Bitcoin, Strike Movie Deal with Twentieth Century Fox

SAN FRANCISCO – Carl M. Force pleaded guilty today to extortion, money laundering, and obstruction of justice in connection with his position as an undercover agent with the Drug Enforcement Administration announced U.S. Attorney Melinda Haag, Assistant Attorney General Leslie R. Caldwell, Chief Richard Weber of the IRS-Criminal Investigation (IRS-CI), Special Agent in Charge David J. Johnson of  FBI’s San Francisco Division, Special Agent in Charge Michael P. Tompkins of the Department of Justice Office of the Inspector General’s Washington, D.C. Field Office and Special Agent in Charge Lori Hazenstab of the Department of Homeland Security’s Office of the Inspector General in Washington D.C.

Force, 46, of Baltimore, had been a Special Agent with the DEA for 15 years.  Between 2012 and 2014, he was assigned to the Baltimore Silk Road Task Force, a multi-agency group investigating illegal activity on the Silk Road.  Force was the lead undercover agent in communication with Ross Ulbricht, a/k/a “Dread Pirate Roberts,” who ran the Silk Road from the Northern District of California.

In the plea agreement entered today, Force admitted to being on Ulbricht’s payroll in a variety of ways while assigned to investigate Ulbricht and the Silk Road.  For example, Force used his official undercover persona, “Nob,” to get Ulbricht to send bitcoin payments in exchange for information, including “insider” law enforcement information; ironically, Force duped Ulbricht into making payments in part by claiming Nob had access to a corrupt government employee.  Then, rather than disclose Ulbricht’s payments or turn them over to the government, Force lied on official reports and stole the funds.  Force liquidated the digital currency into dollars and had the funds deposited into his own bank account in order to convert the funds to his own personal use.  Further, Force also created other unofficial and fictitious personas that he used to extort payment from Ulbricht.  For example, Force convinced Ulbricht he was “French Maid” named Carla Sophia who was willing to sell inside law enforcement information about the government’s investigation into the Silk Road in exchange for approximately $100,000 worth of bitcoin.  Ulbricht ultimately made the payment and Force, again, stole the funds.

Ulbricht and the government were not the only targets of Force’s scheme: Force also admitted in the plea agreement that he extorted “R.P.,” a California resident.  R.P. maintained a digital currency balance with CoinMKT, a California digital currency exchange.  Force directed CoinMKT to seize R.P.’s funds despite there being no legal basis to do so.  Force then pocketed those sums belonging to R.P., once again transferring them to his own personal digital currency exchange and subsequently converting them to dollars using his personal bank account.

Force also admitted to abusing his position by engaging in a wide array of outside activities without permission while he was a federal agent, all designed to enrich himself.  For example, in March 2014, while still employed as a DEA agent, Force entered into a movie contract with Twentieth Century Fox Film Studios related to a movie deal concerning the government’s investigation into the Silk Road.  The movie deal called for up to $240,000 in payments to Force.  Further, Force also moonlighted as a de facto compliance officer for CoinMKT, the same digital currency exchange involved with Force’s attempt to extort R.P.  Force offered to help CoinMKT investigate its customers by using his position as a federal agent and his access to government databases.  In addition, Force sent an unauthorized but official Justice Department subpoena to Venmo, a mobile payments company, directing them to unfreeze his own personal account. When Venmo did not comply, Force wrote to another agent suggesting a criminal seizure directed at Venmo’s accounts.

With the proceeds of his criminal activities, Force engaged in a series of complicated transactions, using the bitcoin block chain and several different accounts, all designed to conceal the true source and nature of the proceeds.  In today’s plea agreement, Force also admitted he obstructed justice by interfering both with the evidence in the Baltimore case against Ulbricht, and with the San Francisco case into his own illegal acts.  For example, Force admitted lying to federal prosecutors and investigators when he, among other things, denied ever using the moniker, “French Maid.”  In his agreement with the government, Force has agreed to ask the Judge to impose sentencing enhancements for this obstruction.

“Mr. Force has admitted using his position of authority to weave a complex veil of deception for personal profit,” said U.S. Attorney Haag.  “Mr. Force’s actions put at risk other important investigations and betrayed the trust placed in him by his law enforcement partners and the public.  We are grateful for the work done by our federal partners to assist in unraveling this crime.”

“While investigating the Silk Road, former DEA Agent Carl Force crossed the line from enforcing the law to breaking it,” said Assistant Attorney General Caldwell.  “Seduced by the perceived anonymity of virtual currency and the dark web, Force used invented online personas and encrypted messaging to fraudulently obtain bitcoin worth hundreds of thousands of dollars from the government and investigative targets alike.  This guilty plea should send a strong message: neither the supposed anonymity of the dark web nor the use of virtual currency nor the misuse of a law enforcement badge will serve as a shield from the reach of the law.”

“Through following the money in the Silk Road investigation it became clear that the defendant was engaged in wire fraud, money laundering, and other related offenses,” said Chief Weber.  “He used his position in the investigation to bring himself significant personal financial gain.  This investigation sends a clear message -- no person, especially those entrusted with the public’s trust such as federal law enforcement, is above the law and IRS-CI will use their financial investigative skills to track you down.”

On June 22, 2015, Force was charged in a three-count information with money laundering with predicates of wire fraud and theft of government property, in violation of 18 U.S.C. § 1956(a)(1)(A) and (B); obstruction of justice, in violation of 18 U.S.C. § 1512(c)(2); and extortion under color of official right, in violation of 18 U.S.C. § 1951.  Force’s sentencing is scheduled for October 19, 2015, at 2:00 p.m., before the Honorable Richard Seeborg, United States District Judge in San Francisco.  The Plea Agreement calls for several sentencing enhancements that the parties agree the Court should impose.  The maximum penalty for each count in the information is 20 years and $250,000, but any sentence following conviction would be imposed after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence.

Force is one of two federal agents to be charged with illegal activity in connection with the investigation into the Silk Road.  Shaun W. Bridges, 32, of Laurel, Maryland, was a Special Agent with the U.S. Secret Service who also was assigned to the Baltimore Silk Road Task Force.  Bridges was charged in a two-count information on June 16, 2015 with money laundering with a predicate of wire fraud, in violation of 18 U.S.C. § 1957, and obstruction of justice, in violation of 18 U.S.C. § 1512(c)(2), related to his diversion of over $800,000 in digital currency to which he gained control as part of the Silk Road investigation.  In his plea agreement scheduled to be entered before Judge Seeborg on August 31, 2015, Bridges has admitted to the conduct with which he was charged.           

The case is being prosecuted by Assistant U.S. Attorneys Kathryn Haun and William Frentzen of the Northern District of California and Trial Attorney Richard B. Evans of the Criminal Division’s Public Integrity Section, with the assistance of San Francisco Legal Assistant Daniel Charlier-Smith, Christine Tian and Lance Libatique.  Assistant U.S. Attorney Arvon Perteet assisted with Asset Forfeiture aspects of the case.  The case was investigated by the FBI’s San Francisco Division, the IRS-CI’s San Francisco Division, the Department of Justice Office of the Inspector General and the Department of Homeland Security Office of the Inspector General in Washington D.C.  The prosecution team is also thankful for the assistance of the following components for their support throughout the investigation of this case: IRS Criminal Investigation – New York Field Office, HSI’s Chicago/O’Hare Division, the U.S. Attorney’s Office for the Southern District of New York, the Department of Justice’s Computer Crime and Intellectual Property Section, the U.S. Embassy in Slovenia, and the FBI Legal Attaché Office in Tokyo, Japan.

Attachment(s): 
Updated September 1, 2015