
An extraordinary international law enforcement operation has culminated in the arrest of a U.S. government contractor accused of orchestrating an alleged $46 million cryptocurrency theft from the U.S. Marshals Service. The dramatic capture, executed on March 4, 2026, on the Caribbean island of Saint Martin, has sent shockwaves through federal agencies and the digital asset community.
Federal authorities allege that John Daghita, a contractor linked to Command Services & Support (CMDSS)—a Virginia-based firm awarded a U.S. Marshals Service contract in October 2024—gained unauthorized access to cryptocurrency wallets holding seized digital assets. These assets were part of the U.S. government’s asset forfeiture program.
The case came to light in January 2026, when blockchain investigator ZachXBT traced suspicious wallet activity and identified Daghita—operating under the alias “Lick”—as the likely culprit. Through a Telegram screen-share, Daghita inadvertently revealed control over wallets containing millions in cryptocurrency, enabling investigators to link the addresses to government-seized funds.
On March 5, 2026, FBI Director Kash Patel confirmed that Daghita was arrested in a joint operation with the French Gendarmerie’s elite tactical units in Saint Martin. The operation was praised for its seamless coordination between U.S. and French law enforcement.
During the arrest, authorities seized a metal briefcase containing stacks of U.S. $100 bills, multiple USB drives, hard drives, a mobile phone, and hardware wallets resembling Trezor devices—potentially holding keys to the stolen cryptocurrency.
This case underscores a critical vulnerability in the custody of seized digital assets. The U.S. Marshals Service is one of the largest institutional holders of cryptocurrency, managing assets worth billions. The alleged theft by someone with insider access raises serious concerns about oversight and security protocols.
According to ZachXBT, the wallet linked to Daghita held approximately $23 million at one point, with total theft estimates ranging up to $90 million.
The alleged theft highlights the need for stricter vetting and monitoring of contractors handling sensitive digital assets. According to cybersecurity experts, multi-layered access controls, regular audits, and real-time transaction monitoring could mitigate such risks.
Daghita faces extradition and criminal prosecution. The case may set a precedent for how digital asset thefts involving government custody are handled in court. It may also influence future legislation governing digital asset management by federal agencies.
Lawmakers may demand hearings to assess the security of government-held digital assets. This incident could accelerate discussions around establishing a federal framework for digital asset custody, including potential creation of a centralized, secure vault managed directly by government personnel.
The case reinforces the value of blockchain transparency and independent analysis. It may encourage more collaboration between law enforcement and blockchain investigators, as well as drive innovation in secure custody solutions for both public and private sectors.
The arrest of John Daghita marks a pivotal moment in the intersection of cryptocurrency, government asset custody, and law enforcement. The alleged $46 million heist from the U.S. Marshals Service exposes critical vulnerabilities and underscores the urgent need for robust oversight, transparency, and security in managing digital assets. As the legal process unfolds, the case promises to reshape how government agencies—and the broader crypto ecosystem—approach asset custody and risk management.
It refers to the alleged theft of over $46 million in cryptocurrency from wallets managed by the U.S. Marshals Service, which was reportedly seized and then stolen by a contractor’s son, John Daghita.
John Daghita is a U.S. government contractor linked to CMDSS, a firm contracted by the U.S. Marshals Service to manage seized digital assets. He was arrested in Saint Martin in March 2026 for allegedly stealing the cryptocurrency.
Blockchain investigator ZachXBT traced suspicious wallet activity and identified Daghita through a Telegram screen-share where he inadvertently revealed control over government-linked wallets.
Authorities seized cash, USB drives, hard drives, a mobile phone, and hardware wallets that may contain access to the stolen cryptocurrency.
The incident raises concerns about the security of government-held digital assets, oversight of contractors, and may prompt reforms in custody protocols and regulatory frameworks.
Daghita faces extradition and criminal prosecution. The case may lead to legislative and procedural changes in how digital assets are managed and secured by federal agencies.
Unlock exclusive Wall Street insights, expert trend analysis, and financial strategies. Discover what truly appears…
Discover how ripple’s prime brokerage now offers xrp futures through coinbase platform, enabling secure access…
Hear strange noises that quietly appear inside your wall? Discover expert tips to identify hidden…
Discover the potential for an XRP explosion ahead as ETFs gain traction. Explore expert price…
Discover how ripple quietly appears inside markets, revealing hidden waves and surprising trends shaping your…
Discover how Ripple quietly appears inside Wall Street’s stock-clearing system as it expands its XRP…
This website uses cookies.