Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics //

Security Monitoring

Florida Sting Nabs Alleged Bitcoin Money Launderers

Florida undercover agents posed as fraudsters seeking to convert cash -- supposedly from stolen credit cards -- into the anonymous, cryptographic currency.

Two men were arrested February 6 in what Florida authorities said was the first state-level money-laundering case in the country that involves bitcoins.

In separate cases, police arrested Pascal Reid ("proy33") and Michel Abner Espinoza ("michelhack") on money-laundering charges after they allegedly offered to turn criminal proceeds into bitcoins for police officers and US Secret Service agents, working undercover, who posed as fraudsters seeking to convert cash obtained by using stolen credit card numbers.

"Criminals are always seeking new ways to make their activities profitable," said Florida's state attorney, Katherine Fernandez Rundle, in a statement. "Bitcoins are just a new tool in the cybercriminal's toolkit."

Bitcoins are a cryptographic currency that's seeing increased use by a number of legitimate businesses, both in the United States and abroad, something the Florida state attorney's charging documents against the two men emphasizes. But those same documents also highlight how the anonymity offered by bitcoins makes them "ideally suited for illegal purchases," because it's "virtually impossible to trace bitcoin transactions to the owner of the bitcoin address."

[Learn from the Target breach. See Target Breach Takeaway: Secure Your Remote Access.]

Accordingly, authorities appear to be targeting people who facilitate the buying and selling of bitcoins for anyone engaged in criminal activities.

In these two cases, authorities said they located both men via an online directory of bitcoin buyers and sellers called www.localbitcoins.com, through which Reid, using the handle proy33 and Esponoza, using the handle "michelhack," allegedly posted listings. In the listing posted by proy33, for example, the seller offered to meet "anytime" to exchange bitcoins, saying he preferred to meet in "public places such as Starbucks, an Internet cafe, a restaurant, a mall, or a bank," and posted a cellphone number where he could be reached.

According to court documents, on December 10, a Secret Service agent working undercover -- and named in the documents only as "Kramer" -- met proy33 at a Starbucks in Sunny Isles, Fla. The man converted $600 into bitcoins for Kramer, taking a commission of 20% above the bitcoins' market value. Authorities said that as part of a surveillance operation they followed proy33 to his home, then identified him as being Reid, who's Canadian.

(Source: zcopley)
(Source: zcopley)

According to court documents, Kramer again met Reid on January 5, this time asking to convert $1,000 into bitcoins. The undercover agent also claimed to be in the business of selling stolen credit card numbers, and offered to sell some to Reid, who allegedly declined. But Reid allegedly didn't balk at continuing to offer bitcoin exchange services, as well as to break deposits up into multiple transactions, to help evade banks' anti-money-laundering controls.

According to court documents, the two men met again on February 4, with Kramer telling Reid that he wanted to convert $30,000 that he claimed to have earned by using credit card numbers obtained via the Target breach into bitcoins.

At that point, "Reid pulled out his Chrome (brand) laptop computer in order to observe the current bitcoin exchange rates," according to the charging documents, after which Kramer showed him a "flash roll" of $30,000 -- composed of $100 bills -- which Reid inspected for authenticity, before selling Kramer $25,000 in bitcoins, minus about $5,000 for his 20% commission. Reid allegedly also expressed interest in purchasing fake US passports and Florida driver's licenses from Kramer. Reid was arrested two days later.

According to court documents, Espinoza's bust went down the same way, with a Miami detective posing as the buyer, except that the suspect didn't believe the proffered roll of $100 bills was real. Instead, he requested that the buyer return with $20 bills. But the detective allegedly talked Espinoza into agreeing that if a Bank of America ATM accepted $2,400 of the cash for deposit into an account to which Espinoza had access, then he would convert the $30,000 into bitcoins. Less than an hour after first meeting the detective, Espinoza was arrested.

Both Reid and Espinoza face two money-laundering charges, as well as one charge of running an unlicensed money service business.

The state angle aside, this isn't the first case to involve bitcoins and money laundering charges. Last month, for example, Robert M. Faiella (a.k.a. "BTCKing") was charged with offering Bitcoin exchange services to users of Silk Road, a notorious "dark net" site -- reachable only via the Tor anonymizing network -- that reportedly facilitated that sale of illegal narcotics. Faiella reportedly sold the bitcoins at a 9% markup.

As part of that case, Charlie Shrem, formerly the CEO and compliance officer of Bitcoin exchange company BitInstant -- which closed shop in October 2013 -- was charged with helping Faiella launder more than $1 million in profits by processing the trades via BitInstant. Prosecutors accused Shrem of allowing people to swap cash anonymously for bitcoins without verifying their identities, as is required by federal law for any transaction that involves $3,000 or more.

InformationWeek Conference is an exclusive two-day event taking place at Interop where you will join fellow technology leaders and CIOs for a schedule packed with learning, information sharing, professional networking, and celebration. Come learn from each other and honor the nation's leading digital businesses at our InformationWeek Elite 100 Awards Ceremony and Gala. You can find out more information and register here. In Las Vegas, March 31 to April 1, 2014.

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
andymuz
50%
50%
andymuz,
User Rank: Apprentice
4/6/2020 | 6:02:04 AM
Re: Impact
There is a great article on trading bitcoin and provacy here if anyone is interested or has any comments? https://www.comparemyvpn.com/should-i-use-a-vpn-when-trading-bitcoin/
AmmarNaeem
50%
50%
AmmarNaeem,
User Rank: Strategist
2/14/2014 | 7:52:26 AM
Re: just my .0002 btc
The hackers targeted Silk Road 2 and swiped their entire Bitcoin wallet clean. Using transaction malleability exploit, the hackers maneuvered the assault causing a damage of worth $2.7 million. Hackers first purchased orders from one another and then claimed for a refund. Using transaction malleability exploit, they bypassed transaction ID verification which enabled them to claim refunds in a loop. Read for more update here 
WalrusBaller
50%
50%
WalrusBaller,
User Rank: Apprentice
2/12/2014 | 9:57:40 PM
just my .0002 btc
I feel bitcoins' value mostly comes from the ability to send instant micro-payments to anyone in the world. With out any evil bankers getting their greedy, crooked, filthy hands in the middle of a personal transaction. With out bank fees or tiny ones like 0.0001%.  Also, the ability to generate as many payment wallets as you want, creates endless possibilities for innovation and freedom.

 
SmailB826
50%
50%
SmailB826,
User Rank: Apprentice
2/12/2014 | 9:35:19 AM
Whatever...
This was a sting operation and the Bitcoin part was incidental - these creeps could have wanted to get anything they could spend for their stolen loot.  The government CHOSE to offer Bitcoins - to claim that this is really a case against Bitcoin is childish and stupid.
Ariella
100%
0%
Ariella,
User Rank: Apprentice
2/11/2014 | 3:40:18 PM
Re: Impact
@Lorna you hit on exactly the problem it has in becoming a mainstream currency. I contacted some of the people who had made Bitcoin news for saying they offered to pay employees in the digital currency for an article.  Pyry Lehdonvirta, CEO of SC5, a Finnish software company admitted that he, like most of SC5's employees, "stopped taking salary as bitcoins around March" because of the currency's volatility. He says the intent behind the offer was "to help people spend bitcoins and get into the ecosystem," not to do have them feel like they're "plac[ing] bets in a casino." 
Lorna Garey
50%
50%
Lorna Garey,
User Rank: Ninja
2/11/2014 | 3:00:13 PM
Re: Impact
Right, but what about the fluctuations? If I sell $500 worth of services and am paid in Bitcoin this week, next week that payment could be worth only $250. Of course, it could also be worth $1,000, but I've never been big on gambling!
Ariella
50%
50%
Ariella,
User Rank: Apprentice
2/11/2014 | 2:57:16 PM
Re: Impact
@Lorna yes there was a core group of libertarians who were really taken by the idea of a government-free currency. But not everyone involved is extreme. Some really just see it as a practical solution for sending money over IP without the friction of bank fees and processing delays, particularly when two different types of currency are invovled. I can tell you that when I was paid by a UK-based company, it was a bit of a pain working out the bank transfer, and the amounts were always slightly off due to the convesion rate and the bank fee that was assessed on my end.
Lorna Garey
50%
50%
Lorna Garey,
User Rank: Ninja
2/11/2014 | 2:45:07 PM
Re: Impact
It's an interesting social phenomenon, that a traditionally distrustful group has that faith. Or, maybe it's not so surprising, in that when you distrust any sort of central authority you'd be attracted to a completely decentralized system.
Ariella
50%
50%
Ariella,
User Rank: Apprentice
2/11/2014 | 2:40:52 PM
Re: Impact
@Loran ah, if the person/people behind the name kept several thousand bitcoins for themselves, they could have made quite a killing when it came close to $1000. What surprises me is that so many in the bitcoin community have absolute trust in this entity when they cast doubt on other crypto-currencies, like Ripple, simply because there are coroporations behind them. At least those companies are upfront about who they are and their plans to retain some of the currency.
Lorna Garey
50%
50%
Lorna Garey,
User Rank: Ninja
2/11/2014 | 2:37:23 PM
Re: Impact
So in other words, it's a reverse pyramid scheme?
Page 1 / 2   >   >>
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
'Unkillable' Android Malware App Continues to Infect Devices Worldwide
Jai Vijayan, Contributing Writer,  4/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1633
PUBLISHED: 2020-04-09
Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, le...
CVE-2020-8834
PUBLISHED: 2020-04-09
KVM in the Linux kernel on Power8 processors has a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc__tm, leading to a stack corruption. Because of this, an attacker with the ability run code in kernel space of a guest VM can cause the host kernel to...
CVE-2020-11668
PUBLISHED: 2020-04-09
In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.
CVE-2020-8961
PUBLISHED: 2020-04-09
An issue was discovered in Avira Free-Antivirus before 15.0.2004.1825. The Self-Protection feature does not prohibit a write operation from an external process. Thus, code injection can be used to turn off this feature. After that, one can construct an event that will modify a file at a specific loc...
CVE-2020-7922
PUBLISHED: 2020-04-09
X.509 certificates generated by the MongoDB Enterprise Kubernetes Operator may allow an attacker with access to the Kubernetes cluster improper access to MongoDB instances. Customers who do not use X.509 authentication, and those who do not use the Operator to generate their X.509 certificates are u...