Discussion
Loading...

#Tag

  • About
  • Code of conduct
  • Privacy
  • About Bonfire
GhostOnTheHalfShell boosted
⚯ Michel de Cryptadamus ⚯
@cryptadamist@universeodon.com  ·  activity timestamp 3 days ago

apparently the child of a contractor hired by the U.S. government to manage crypto seized from criminals managed to steal $40-100 million dollars from the government and no one even noticed.

until, that is, the lure of flexing on the internet proved too much for him (full name John Daghita AKA “Lick”) and he posted a screenshot showing off his money that revealed his crypto address, which #ZachXBT was able to link to the stolen funds.

just incredible stuff.

thread: https://x.com/zachxbt/status/2015430549846777964

#JohnDaghita #crime #theft #crypto #cryptocurrency #USmarshals #FBI #DOJ

X (formerly Twitter)
View
In case you are curious how John Daghita (Lick) was able to steal $40M+ from US government seizure addresses. 

John’s dad owns CMDSS, which currently has an active IT government contract in Virginia. 

CMMDS was awarded a contract to assist the USMS in managing/disposing of seized/forfeited crypto assets. 

It still remains unclear at this point how John obtained access from his dad.
In case you are curious how John Daghita (Lick) was able to steal $40M+ from US government seizure addresses. John’s dad owns CMDSS, which currently has an active IT government contract in Virginia. CMMDS was awarded a contract to assist the USMS in managing/disposing of seized/forfeited crypto assets. It still remains unclear at this point how John obtained access from his dad.
In case you are curious how John Daghita (Lick) was able to steal $40M+ from US government seizure addresses. John’s dad owns CMDSS, which currently has an active IT government contract in Virginia. CMMDS was awarded a contract to assist the USMS in managing/disposing of seized/forfeited crypto assets. It still remains unclear at this point how John obtained access from his dad.
  • Copy link
  • Flag this post
  • Block
⚯ Michel de Cryptadamus ⚯
@cryptadamist@universeodon.com  ·  activity timestamp 3 days ago

apparently the child of a contractor hired by the U.S. government to manage crypto seized from criminals managed to steal $40-100 million dollars from the government and no one even noticed.

until, that is, the lure of flexing on the internet proved too much for him (full name John Daghita AKA “Lick”) and he posted a screenshot showing off his money that revealed his crypto address, which #ZachXBT was able to link to the stolen funds.

just incredible stuff.

thread: https://x.com/zachxbt/status/2015430549846777964

#JohnDaghita #crime #theft #crypto #cryptocurrency #USmarshals #FBI #DOJ

X (formerly Twitter)
View
In case you are curious how John Daghita (Lick) was able to steal $40M+ from US government seizure addresses. 

John’s dad owns CMDSS, which currently has an active IT government contract in Virginia. 

CMMDS was awarded a contract to assist the USMS in managing/disposing of seized/forfeited crypto assets. 

It still remains unclear at this point how John obtained access from his dad.
In case you are curious how John Daghita (Lick) was able to steal $40M+ from US government seizure addresses. John’s dad owns CMDSS, which currently has an active IT government contract in Virginia. CMMDS was awarded a contract to assist the USMS in managing/disposing of seized/forfeited crypto assets. It still remains unclear at this point how John obtained access from his dad.
In case you are curious how John Daghita (Lick) was able to steal $40M+ from US government seizure addresses. John’s dad owns CMDSS, which currently has an active IT government contract in Virginia. CMMDS was awarded a contract to assist the USMS in managing/disposing of seized/forfeited crypto assets. It still remains unclear at this point how John obtained access from his dad.
  • Copy link
  • Flag this post
  • Block
Log in

Bonfire Dinteg Labs

This is a bonfire demo instance for testing purposes. This is not a production site. There are no backups for now. Data, including profiles may be wiped without notice. No service or other guarantees expressed or implied.

Bonfire Dinteg Labs: About · Code of conduct · Privacy ·
Bonfire social · 1.0.0 no JS en
Automatic federation enabled
  • Explore
  • About
  • Code of Conduct
Home
Login