DEA agent pleads guilty to accepting Silk Road funds

Carl Mark Force IV could face up to 60 years in prison

A second federal agent has pleaded guilty to corruption charges related to the Silk Road, an online marketplace for drugs and fake IDs.

A second federal agent has pleaded guilty to corruption charges related to the Silk Road, an online marketplace for drugs and fake IDs.

A Drug Enforcement Administration agent intimately involved in the Silk Road investigation admitted on Wednesday he secretly accepted bitcoins from the underground website's operator and illegally took other funds.

Carl Mark Force IV, who was a DEA agent for 15 years, pleaded guilty to money laundering, obstruction of justice and extortion under color of official right, according to the plea agreement, filed in U.S. District Court for the Northern District of California.

Force could face up to 20 years in prison on each of the counts.

Force, who was based in Baltimore, was part of a multi-agency task force investigating the Silk Road, an underground marketplace for goods such as drugs and fake ID documents. It was shut down in October 2013.

Its operator, Ross Ulbricht, was sentenced to two concurrent life sentences and 40 years of additional terms. Ulbricht plans to appeal based in part on the actions of Force and a Secret Service investigator, Shaun Bridges.

Force was accused of having the DEA freeze the account of a Silk Road user and transferring the $297,000 into his own personal account rather than to the agency.

He also took two payments of bitcoins directly from Ulbricht, totaling about $148,000, in 2013. Using two online nicknames -- French Maid and Nob -- he convinced Ulbricht he had inside information about federal investigations into the Silk Road.

Bridges, who was charged with money laundering and obstruction of justice, took more than $800,000 worth of bitcoins from Silk Road using a hijacked administrator account, the DOJ said. He also reached a plea agreement with prosecutors.

The involvement of two corrupt federal agents in the Silk Road investigation has given Ulbricht's attorney, Joshua Dratel, fuel for an appeal. He has claimed the investigation was flawed and that the government concealed evidence necessary for his client's defense.

Although Dratel knew of the investigation of Force during the trial, he was not allowed to introduce facts about it into evidence. The involvement of Bridges was revealed in March, weeks after Ulbricht was convicted on Feb. 4.

Send news tips and comments to Follow me on Twitter: @jeremy_kirk

Join the CSO newsletter!

Error: Please check your email address.

Tags U.S. Department of JusticeCriminalsecuritylegalcybercrime

More about BaltimoreDOJTwitter

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jeremy Kirk

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place