JohnHereto help full thread, he names Sean Bridges, SSA time to dig

Jul 16th 2020, 9 tweets, 2 min read

Isn’t it odd 🤔

In the Sharyl Attkisson case

Attkisson et al v. Rosenstein et al (1:20-cv-00068), Maryland District Court

Attkisson et al v. Rosenstein et al (1:20-cv-00068), Maryland District Court, Filed: 01/10/2020 – PacerMonitor Mobile Federal and Bankruptcy Court PACER Dockets


The court refuses to put Sean Bridges on the public docket. Not even his attorney is allowed to be listed. None of their responses allowed after being assigned to this judge🤔🤔

Is that because he was the major computer expert running the illegal Hammer operation in Baltimore 🤔🤔

Is it because he made copies Hillary Clinton, and MANY Others, emails?

Is it because he has copies of the Hillary laptop?

Is it because as a secret service agent with Total Access to the White House and Air Force One, Sean made copies of extremely compromising videos of the obamas, especially Michelle’s, “little Barack”?🤔

Is it because he copied secret Service surveillance tapes showing Obama’s and their $50,000 “pizza parties” at the White House where certain guests did not, “later hang themselves in jail”.🤔

Is the Deep State DOJ under the direction of Hillary, Obama, Rod, keeping a lid on it as long as possible especially until after the election 🤔

If only someone knew where copies of all this were 🐷

Sean also tried to hack the thumb drive obtained from Seth Rich, and helped crowdstrike cover everything up 🤔🤔

Sean was the No.1 Secret Service forensic expert He was the one the Obama administration called in to wipe all the memory in the White House when candidate Trump started to surge ahead of Hillary.

Real shame about all those copies

It was Sean who was originally tasked with finding the leaker that everyone wanted to “make an example of”🤔

Quite the list🤔, especially knowing what we know now and after Rod’s recent “testimony” and the Exculpatory evidence released regarding General Flynn 🤔🤔🤔

Screen Shot 2020-07-23 at 2.22.20 PM.png


Ex-Secret Service agent sentenced again for stealing from the government

By Andrew Blake

Times – Wednesday, November 8, 2017

A disgraced former Secret Service agent already serving time for stealing hundreds of thousands of dollars worth of digital currency from the federal government has been sentenced to spend an additional two years in prison for a separate heist.

Shaun Bridges, 35, was sentenced Tuesday in connection with stealing from a digital wallet belonging to the government currently valued at about $11.3 million.

Bridges had been a member of the federal task force that investigated Silk Road, an online marketplace responsible for facilitating hundreds of millions of dollars worth of illegal drug deals prior to being dismantled by U.S. authorities in late 2013. He later admitted stealing approximately 20,000 Bitcoin from its users during the government’s probe and was sentenced in December 2015 to 71 months in federal prison after pleading guilty to related counts of money laundering and obstruction of justice.

Bridges was a day away from starting his prison sentence when he was arrested again in January 2016 and charged in a separate heist involving about 1,600 Bitcoin stolen from a digital wallet belonging to the U.S. government. He subsequently pleaded guilty to another count of money laundering in August, paving the way for Tuesday’s sentencing hearing in San Francisco federal court.

“According to admissions made in connection with his guilty plea, Bridges admitted to using a private key to access a digital wallet belonging to the U.S. government, and subsequently transferring the bitcoin to other digital wallets at other bitcoin exchanges to which only he had access,” the Justice Department said in a statement.

U.S. District Judge Richard Seeborg called the former federal agent’s conduct a “betrayal of trust” and “among the worst of crimes,” Ars Technica first reported from court.

“Particularly troubling is the fact that Mr. Bridges did engage in further efforts to conceal a need to steal after he had entered the plea agreement,” the judge said.

Bridges had faced up to 10 years in prison over the second heist, and defense attorneys had argued for only one to be served after his current sentence, Ars reported.

A prosecutor for the federal government decline to comment for the Ars report, and a defense lawyer declined to comment, according to Reuters.

Bridges agreed to surrender the stolen Bitcoin as part of his plea agreement, said the Justice Department. Valued at about $359,005 at the time of his arrest in early 2016, the 1,500 Bitcoin turned over as part of Bridges‘ latest plea were worth roughly $11.3 million as of Tuesday’s sentencing.

Silk Road acted as an online marketplace where users could buy and sell contraband with digital currency including Bitcoin before being seized in October 2013, at which point it had already generated over $214 million in illicit sales, according to federal prosectors. Ross Ulbricht, the man convicted of running the site, was subsequently convicted of related charges and is currently serving life imprisonment without parole.


Carl Force and Shaun Bridges, Silk Road

Former DEA agent Carl Force and Secret Service agent Shaun Bridges


One of the government agents tasked with taking down Silk Road will plead guilty to stealing $820,000

Ross Ulbricht, the convicted mastermind behind Silk Road, the world’s largest online narcotics emporium, won’t be the only person nabbed because of his or her involvement with the site.

Former US Secret Service agent Shaun Bridges will plead guilty to charges connected to the case, including money-laundering and obstruction charges.

Bridges had been part of the Baltimore Silk Road task force — known as SA Force — a group charged with tracking down Ulbricht, who went by the handle “DreadPirateRoberts.”

On the team with Bridges was DEA agent Carl Mark Force IV, who is also facing criminal charges. Force is charged with extorting Ulbricht, as well as wire fraud, theft of government property, money laundering, and conflict of interest.

Over the course of the investigation, Bridges diverted to a personal account more than $800,000 in bitcoins acquired during the investigation.

Bridges is expected to formally plead guilty later this year to the money laundering and obstruction charges. It is unknown what type of sentencing he will receive.

“Mr. Bridges accepts complete responsibility,” his lawyer Steve Levin told the AP on Thursday. “He’s regretted his action from the start.”

Bridges resigned from his post at the Secret Service on March 18th, after learning he was a subject of the investigation.

He later surrendered to authorities in San Francisco in March and was released on bail several days later.


FBI Reveals How It Traced Silk Road Servers

The secret of how the FBI pinpointed the servers allegedly used by the notorious Silk Road black market website has apparently been revealed.

Ross William Ulbricht, the alleged owner of Silk Road, is charged in the US with drug trafficking, computer hacking and money laundering.

But his defence team raised a number of privacy concerns, claiming the National Security Agency (NSA) helped the FBI to track down the servers.

The FBI has now filed a rebuttal, saying it was far simpler to crack the site’s complex security systems – it simply found the IP address from the Silk Road login page.

As “miscellaneous” strings of characters were entered into the login page’s entry fields, the FBI noticed an IP address not associated with the anonymous Tor network, which was allegedly used to conceal most of the Silk Road’s operations.

When the IP address was entered into a browser, the Silk Road’s Captcha prompt appeared, the FBI said.

The IP address helped trace the server to an Icelandic data centre, and Ulbricht was tracked down last year as a result, and the website shut down.

The rebuttal, filed to a New York court on Friday, read: “Ulbricht conjures up a bogeyman – the NSA – which Ulbricht suspects, without any proof whatsoever, was responsible for locating the Silk Road server, in a manner that he simply assumes somehow violated the Fourth Amendment.

“The facts are not at all what Ulbricht imagines them to be… the Silk Road server was located not by the NSA but by the Federal Bureau of Investigation, using perfectly lawful means.”

A judge will rule later on whether evidence was collected illegally.

The Silk Road online hub was notorious for transactions involving illegal drugs and criminal activities, and was shut down last October.

Ulbricht denies all of the charges against him.


Department of Justice

Office of Public Affairs


Monday, March 30, 2015

Former Federal Agents Charged With Bitcoin Money Laundering and Wire Fraud

Agents Were Part of Baltimore’s Silk Road Task Force

Two former federal agents have been charged with wire fraud, money laundering and related offenses for stealing digital currency during their investigation of the Silk Road, an underground black market that allowed users to conduct illegal transactions over the Internet. The charges are contained in a federal criminal complaint issued on March 25, 2015, in the Northern District of California and unsealed today.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Melinda Haag of the Northern District of California, Special Agent in Charge David J. Johnson of the FBI’s San Francisco Division, Special Agent in Charge José M. Martinez of the Internal Revenue Service-Criminal Investigation’s (IRS-CI) San Francisco Division, Special Agent in Charge Michael P. Tompkins of the Justice Department’s Office of the Inspector General Washington Field Office and Special Agent in Charge Lori Hazenstab of the Department of Homeland Security’s Office of the Inspector General in Washington D.C. made the announcement.

Carl M. Force, 46, of Baltimore, was a Special Agent with the Drug Enforcement Administration (DEA), and Shaun W. Bridges, 32, of Laurel, Maryland, was a Special Agent with the U.S. Secret Service (USSS). Both were assigned to the Baltimore Silk Road Task Force, which investigated illegal activity in the Silk Road marketplace. Force served as an undercover agent and was tasked with establishing communications with a target of the investigation, Ross Ulbricht, aka “Dread Pirate Roberts.” Force is charged with wire fraud, theft of government property, money laundering and conflict of interest. Bridges is charged with wire fraud and money laundering.

According to the complaint, Force was a DEA agent assigned to investigate the Silk Road marketplace. During the investigation, Force engaged in certain authorized undercover operations by, among other things, communicating online with “Dread Pirate Roberts” (Ulbricht), the target of his investigation. The complaint alleges, however, that Force then, without authority, developed additional online personas and engaged in a broad range of illegal activities calculated to bring him personal financial gain. In doing so, the complaint alleges, Force used fake online personas, and engaged in complex Bitcoin transactions to steal from the government and the targets of the investigation. Specifically, Force allegedly solicited and received digital currency as part of the investigation, but failed to report his receipt of the funds, and instead transferred the currency to his personal account. In one such transaction, Force allegedly sold information about the government’s investigation to the target of the investigation. The complaint also alleges that Force invested in and worked for a digital currency exchange company while still working for the DEA, and that he directed the company to freeze a customer’s account with no legal basis to do so, then transferred the customer’s funds to his personal account. Further, Force allegedly sent an unauthorized Justice Department subpoena to an online payment service directing that it unfreeze his personal account.

Bridges allegedly diverted to his personal account over $800,000 in digital currency that he gained control of during the Silk Road investigation. The complaint alleges that Bridges placed the assets into an account at Mt. Gox, the now-defunct digital currency exchange in Japan. He then allegedly wired funds into one of his personal investment accounts in the United States mere days before he sought a $2.1 million seizure warrant for Mt. Gox’s accounts.