Ex-UK National Crime Agency officer jailed for stealing bitcoin from dark web drug dealer, World News
The NCA was investigating the Silk Road 2.0 site — which allowed users to buy drugs and other illicit goods after the original Silk Road was shut down by the FBI in 2013 — and arrested Liverpool-based Thomas White in 2014.
Intelligence officer Paul Chowles took the details of White's "retirement wallet" and stole 50 bitcoin before sending it to a cryptocurrency "mixing" service called Bitcoin Fog to obscure the source, prosecutors said.
Chowles, 42, appeared in Liverpool Crown Court having pleaded guilty to one count of theft, one count of transferring criminal property, and one count of concealing criminal property.
Prosecutor Craig Hassall said the bitcoin Chowles stole was worth just under 60,000 pounds (S$100,000) at the time of the theft in May 2017 and is now worth over 4 million pounds, though Chowles had realised nearly 145,000 pounds.
Chowles was dismissed by the NCA this month for gross misconduct after his guilty pleas, having been arrested in 2022.
The NCA initially thought White, who was jailed in 2019 for over five years, had managed to access his bitcoin wallet and remove the 50 missing bitcoin, Hassall said.
The remaining 47 bitcoin in White's wallet were sold by the NCA for roughly 500,000 pounds, and the funds paid towards a 1.5 million-pound confiscation order made against White.
But police and the NCA began to investigate after White said he was not responsible for moving the 50 bitcoin, and usernames and passwords linked to White's cryptocurrency accounts were found in Chowles' notebooks when he was arrested.
Judge David Aubrey said bitcoin worth nearly 470,000 pounds was seized from Chowles, telling him: "Had you not been arrested, you would have continued to reap the rewards of your wrongdoing."
[[nid:718198]]

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


International Business Times
10 hours ago
- International Business Times
Trump's Meme Mocking Obama Backfires as JD Vance Steals Spotlight Again
In a fresh jab at former President Barack Obama, Donald Trump stirred the internet with a meme, only to have Senator JD Vance unexpectedly steal the spotlight. Trump reposted an edited image originally shared by his son, Donald Trump Jr., spoofing the notorious 1994 O.J. Simpson police chase. In the meme, Obama is shown riding in the iconic white Ford Bronco, cast as a fugitive. Trump appears behind the wheel of a pursuing police cruiser. Yet the image's viral appeal didn't come from the main figures—it was JD Vance who drew the internet's attention. Trailing behind in a second squad car is Vance, humorously portrayed with long hair and a youthful, clean-shaven face, resembling his college-era appearance. This version of "long-haired JD Vance" has been a recurring meme ever since his emergence on the national stage, and it once again dominated social media discussions. The meme followed another provocative post by Trump—an AI-generated video that depicted Obama being arrested in the Oval Office by FBI agents while Trump watched smugly. Shared on Truth Social, the video quickly gained traction and stirred controversy. These meme-based attacks come as former Democratic presidential candidate Tulsi Gabbard has leveled serious allegations against the Obama administration. Gabbard claims she has "overwhelming" evidence that top officials under Obama fabricated the Trump-Russia collusion story following the 2016 election. She states over 100 documents implicate Obama in directing the effort, and she intends to present them to the Department of Justice and FBI. Though Trump's intent was likely to fuel political criticism of Obama, the internet seems more captivated by JD Vance's retro look, turning a targeted meme into yet another viral distraction.

Straits Times
a day ago
- Straits Times
Iran executes two members of banned group for targeting infrastructure
DUBAI - Iran executed two members of the outlawed Mujahideen-e-Khalq opposition group for targeting civilian infrastructure with homemade projectiles, the judiciary news outlet Mizan reported on Sunday. Mehdi Hassani and Behrouz Ehsani-Eslamloo, "operational elements" of the MEK, were sentenced to death in a verdict upheld by the Supreme Court, Mizan said. "The terrorists, in coordination with MEK leaders, had set up a team house in Tehran, where they built launchers and hand-held mortars in line with the group's goals, fired projectiles heedlessly at citizens, homes, service and administrative facilities, educational and charity centres, and also carried out propaganda and information-gathering activities in support of the MEK," the report said. The defendants were indicted with "moharebeh", an Islamic term meaning waging war against God, destroying public property and "membership in a terrorist organisation with the aim of disrupting national security." The report did not say whether the defendants' actions took place during last month's Israel-Iran war, during which Tehran accused opposition groups like MEK of providing support to Israel from within Iran. The MEK, known in English as People's Mujahideen Organisation of Iran, were a powerful leftist-Islamist group that staged bombing campaigns against the shah's government and U.S. targets in the 1970s but ultimately fell out with the other factions of the 1979 Islamic Revolution. Since then, the MEK has opposed the Islamic Republic and its leadership in exile has been Paris-based. The group was listed as a terrorist organisation by the U.S. and the European Union until 2012. REUTERS


CNA
2 days ago
- CNA
Allianz Life says majority of customers' data stolen in hack
U.S. insurance giant Allianz Life said on Saturday that hackers stole the personal information of the majority of its customers, financial professionals, and select Allianz Life employees. The insurance giant's filing with Maine's attorney general did not immediately provide the number of customers affected. As per the filing, the data breach, which the company described as a hack, occurred on July 16 and was discovered on July 17. The data breach was first reported by TechCrunch. "On July 16, 2025, a malicious threat actor gained access to a third-party, cloud-based CRM system used by Allianz Life Insurance Company of North America (Allianz Life). The threat actor was able to obtain personally identifiable data related to the majority of Allianz Life's customers, financial professionals, and select Allianz Life employees, using a social engineering technique," a spokesperson for Allianz Life told Reuters in an emailed statement. The insurance giant said it notified the FBI and based on its ongoing investigation that there is no evidence the Allianz Life network or other company systems were accessed, including their policy administration system.