logo
Suspects in Manhattan crypto kidnapping, torture case plead not guilty

Suspects in Manhattan crypto kidnapping, torture case plead not guilty

Fast Company3 days ago

BY
Two crypto investors pleaded not guilty on Wednesday to charges they kidnapped and tortured an Italian man for his Bitcoin in an upscale Manhattan townhouse.
William Duplessie and John Woeltz were ordered held in custody until their next court date on July 15 during their arraignment in Manhattan criminal court.
Their lawyers had sought their release on $1 million bail and home confinement with their parents.
They argued the victim wasn't in distress during his time in New York, saying they had obtained video and photo evidence showing the accuser smiling and laughing during the time of his purported captivity.
Among the evidence the lawyers said they have obtained are photos of the accuser moving freely in and out of the house, even taking a trip to an eyeglass store with one of the defendants.
'This narrative is entirely false,' said Sam Talkin, Duplessie's lawyer. 'The story that he is selling doesn't make sense.'
Prosecutor Sania Khan argued that someone supporting the defendants was selectively leaking videos to present a counternarrative of the events
'Victims of abuse are not always going to act the way that we expect them to,' she added.
Duplessie and Woeltz, who appeared in handcuffs and prison uniforms, didn't speak in court other than to formally enter their pleas.
They face charges of kidnapping, assault, unlawful imprisonment and criminal possession of a weapon.
Prosecutors say on May 6, the two men lured the victim, who they knew personally, to a posh townhouse in Manhattan's Soho neighborhood by threatening to kill his family.
The man, a 28-year-old Italian national who has not been named by officials, said he was held captive for 17 days.
He said the two investors tormented him with electrical wires, forced him to smoke from a crack pipe and at one point dangled him from a staircase five stories high.
The man said he eventually agreed to hand over his computer password, then managed to flee as his captors went to retrieve the device.
Woeltz, 37, has described himself in interviews as a blockchain investor who spent time in Silicon Valley before returning to Kentucky's burgeoning crypto-mining industry.
Duplessie, 32, is listed as a founder or investor at various blockchain-based companies.
New York City police are also investigating two detectives who worked security at the townhouse where the man says he was tortured.
The officers have been placed on modified leave pending the outcome of the inquiry, although their lawyer has said there's no indication either officer witnessed any of the alleged criminal activity.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Two men shot, killed while sitting inside SUV in Austin neighborhood, police say
Two men shot, killed while sitting inside SUV in Austin neighborhood, police say

CBS News

time29 minutes ago

  • CBS News

Two men shot, killed while sitting inside SUV in Austin neighborhood, police say

2 men shot to death while sitting in SUV in Austin neighborhood 2 men shot to death while sitting in SUV in Austin neighborhood 2 men shot to death while sitting in SUV in Austin neighborhood Two men were shot to death while sitting inside an SUV Friday night on the city's West Side. It happened around 11:41 p.m. in the 100 block of North Laramie Avenue in the Austin neighborhood. Chicago police said a 38-year-old man and another, between 30-50 years of age, were sitting inside the vehicle when they were approached by someone who pulled out a gun and fired shots in their direction, hitting them both in the head. Both men were taken to Stroger Hospital, where they were pronounced dead. Their identities were not released. As of Saturday, no arrests were made. Area 4 detectives are investigating.

These are the key witnesses who testified against Sean ‘Diddy' Combs so far
These are the key witnesses who testified against Sean ‘Diddy' Combs so far

CNN

time41 minutes ago

  • CNN

These are the key witnesses who testified against Sean ‘Diddy' Combs so far

While the prosecution has called nearly 30 witnesses, the case against Sean 'Diddy' Combs has primarily relied on a handful of people who have accused the hip-hop mogul of sex trafficking, prostitution, kidnapping, arson, forced labor and more. Combs, 55, has pleaded not guilty to one count of racketeering conspiracy, two counts of sex trafficking and two counts of transportation to engage in prostitution. With the racketeering conspiracy charge, the prosecution alleges Combs and his businesses made up a criminal enterprise that committed a number of crimes, including sex trafficking, kidnapping, forced labor and arson. To convict Combs of racketeering, the prosecutors have to prove he committed at least two acts of racketeering activity. Here's a closer look at the key witnesses in his federal trial so far, what they said on the stand, how their allegations against Combs are tied to the charges and the defense's counterpoints. Who she is: Cassie Ventura, a pop singer signed to Combs' Bad Boy record label, dated Combs on and off from 2007 to 2018. What she said: Ventura testified over four days that Combs used physical violence, threats and blackmail to coerce her into participating in drug-fueled sexual encounters with male escorts known as 'Freak Offs.' These took place at hotels across the United States and even abroad, she testified. 'It got to a point where I just didn't feel like I had much of a choice, didn't really know what 'no' could be or what 'no' could turn into,' she testified. In one notable incident, Combs assaulted and kicked Ventura at the InterContinental Hotel in Los Angeles in March 2016, which was captured on surveillance footage. Ventura testified the assault occurred after she left a 'Freak Off' before it was 'over.' The jury was shown video of the assault multiple times. Ventura also accused Combs of raping her in 2018. Why it matters: Her allegations are key to Count 1, racketeering conspiracy; Count 2, sex trafficking; and Count 3, transportation to engage in prostitution; of Combs' superseding indictment. Defense position: In its opening statement, the defense acknowledged Combs used violence against romantic partners and had a 'different' sex life. But they argued these acts were committed due to his jealousy and drug and alcohol use – not to coerce Ventura into participating in 'Freak Offs.' They said Ventura consented to these sexual encounters. On cross-examination, the defense challenged Ventura's rape allegation and highlighted the $20 million financial settlement she received from Combs as well as $10 million she expected to receive from the InterContinental Hotel. They also questioned Ventura about the role of jealousy and drugs in their relationship. Who she is: A woman testifying under the pseudonym 'Jane' – identified as 'Victim-2' in Combs' indictment – who had an intimate relationship with Combs from 2021 to 2024. What she said: Jane testified that Combs pressured and manipulated her into having sex with other men in drug-fueled encounters that she referred to as 'hotel nights.' She said she grew frustrated over time with these 'hotel nights' but felt 'obligated' to continue participating because he threatened to cut her off financially and because she wanted to spend time with him. 'That was the only option I was given and I wanted to see my lover,' she testified. She said these encounters took place across the country and in Turks and Caicos, and the men were flown in to participate. She also testified that Combs gave her drugs during the 'hotel nights' and that he called his aides to bring more drugs when he ran out. Last year, while fighting about another woman, Jane pushed Combs' head into a marble counter and threw candles at him, she testified. Combs then kicked several doors down to get to her, put her in a chokehold and assaulted her, she testified. Jane said Combs then insisted she participate in a 'hotel night' with another man despite her saying 'I don't want to.' Why it matters: Her allegations are key to Count 1, racketeering conspiracy; Count 4, sex trafficking; and Count 5, transportation to engage in prostitution; of Combs' superseding indictment. Defense position: Like with Ventura, the defense in its opening statement said Jane was a 'willing participant' in these sexual encounters, which they described as 'like a consensual threesome.' 'The evidence is going to show you that she is a capable, strong woman who willingly engaged in their sex life so they could spend time together,' defense attorney Teny Geragos said in its opening statement about Jane. 'That is simply not sex trafficking.' To that point, Jane testified there were aspects of their 'hotel nights' she enjoyed, mainly when she got to spend time alone with Combs beforehand and afterward. She also testified Combs is still paying her $10,000-per-month rent and still pays for her attorney. She testified Combs wired her about $150,000 from Combs over the course of their relationship. Who she is: A woman testifying under the pseudonym 'Mia' who worked for Combs, including as his personal assistant, from 2009 until 2017. What she said: Over three days on the stand, Mia testified that Combs physically and sexually assaulted her several times during her employment and used his business empire to silence her. Mia detailed several instances in which she said Combs physically assaulted her, threw objects at her or yelled at her. She described a 'chaotic' and 'toxic' work environment in which she was forced to work long hours on little sleep and wasn't allowed to leave Combs' homes without his permission. She said she 'froze' and didn't react during the alleged sexual assaults and did not say 'no' because she was afraid Combs would fire her, ruin her future or physically hurt her. 'I couldn't tell him 'no,' like, about a sandwich, I couldn't tell him 'no' about anything. There's no way I could tell him 'no,'' Mia said. Why it matters: Her allegations are key to the forced labor element of the racketeering conspiracy charge. Defense position: On cross-examination, the defense highlighted loving and supportive texts Mia sent Combs in the years after her employment ended. Further, defense attorney Brian Steel asked Mia if she retained an attorney to 'join the #MeToo money grab against Mr. Combs.' The judge sustained an objection to the question. Mia also said on cross-examination she didn't have any contemporaneous writings or conversations documenting the alleged assaults. Who he is: Scott Mescudi, the Grammy-winning musical artist known as Kid Cudi, briefly dated Ventura in late 2011. What he said: Mescudi testified his house was broken into and his Porsche was set on fire with a Molotov cocktail after Combs learned that Mescudi and Ventura were dating. The Porsche was damaged beyond repair, he said. Mescudi said he suspected Combs was responsible. At an in-person meeting, Combs denied knowledge of the incidents, but Mescudi said he thought he was lying. Years later, Combs apologized to Mescudi for 'all that bullsh*t,' Mescudi said. Why it matters: Mescudi's allegations are key to the arson element of the racketeering conspiracy charge. Defense position: No one was arrested in either the break-in or the arson at the time. Mescudi also testified Ventura had 'played' him by saying she was not with Combs anymore. Who she is: Capricorn Clark worked for Combs and his companies off and on from 2004 to 2018. What she said: Clark testified that Combs kidnapped her in December 2011. She said he showed up to her home carrying a gun and demanded she come with him to 'go kill' Mescudi. Clark said they then drove to Mescudi's house, and Combs and a security guard entered the home. Clark said she stayed in the car and called Ventura and Mescudi to tell them what was happening. Afterward, Clark said Combs threatened her with violence if she spoke about the incident. In addition, Clark testified that she worked grueling hours under Combs, purchased drugs for him, prepared his hotel rooms and witnessed him assault Ventura. Clark also said he physically assaulted her on one occasion when she expressed her displeasure with her job. Why it matters: Her allegations are key to the kidnapping element of the racketeering conspiracy charge. Defense position: Despite the alleged kidnapping, Clark continued working with Combs for years afterward. On cross-examination, she said that she met with Combs' attorneys just last year and discussed the possibility of working for him again. Who he is: Eddy Garcia worked as a security officer at the InterContinental Hotel in March 2016. What he said: Garcia testified that Combs gave him $100,000 in cash in exchange for the surveillance video showing Ventura's assault at the hotel. Garcia said he signed paperwork, including a non-disclosure agreement and a declaration noting it was the only existing copy of the video, on Combs' company letterhead. Garcia said he split the cash payment with two other colleagues. Garcia, who testified under an immunity order, said he was initially not honest about the payment when he spoke to law enforcement in June 2024. Why it matters: His allegations are key to the bribery and obstruction of justice elements of the racketeering conspiracy charge. Defense position: On cross-examination, defense attorney Brian Steel highlighted a section of the non-disclosure agreement that included provisions for when Garcia could discuss the information with law enforcement. The document also said he had to notify Combs' company if he did. CNN's Lauren del Valle and Nicki Brown contributed to this report.

Heading to a Protest This Weekend? Lock Down Your Phone First
Heading to a Protest This Weekend? Lock Down Your Phone First

Yahoo

time42 minutes ago

  • Yahoo

Heading to a Protest This Weekend? Lock Down Your Phone First

PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing. This week, people are protesting all across America. Before you head out to join them, take a few minutes to assess your digital safety. Your phone is a treasure trove of information about you. Even if you have nothing to hide, you don't want to accidentally give law enforcement officials any information you didn't intend to share. Follow these tips to lock down your phone before a protest or other peaceful assembly. When we tell people that their best defense at a protest is just to turn off their phones, they always seem disappointed. But it's true. The best way to keep from being surveilled is never to be on the grid in the first place. Unfortunately, this isn't practical advice. For one thing, mobile phones are useful for staying safe and coordinating with your friends and fellow protestors. For another, protestors document events and amplify their message by sharing photos, videos, and live streams in the moment. While shutting your phone off will certainly make you harder to track, it could also leave you without important tools to protect yourself. Your phone is powerful because it combines cellular, GPS, and Wi-Fi information. That great power is also a weakness: they're highly trackable. For example, federal and local law enforcement use Stingrays and other IMSI catchers to track and identify protestors. These devices can trick your phone into connecting with them instead of a cell tower, then intercept information (such as SMS messages) without you necessarily realizing it. They can also extract information from your phone and track your movements. Even without fancy devices, though, law enforcement may be able to obtain information on your movements and activities from your wireless provider. Even Apple and Google may be willing to give up information about you. The companies have cooperated with law enforcement by handing over customer data in the past, though both companies typically challenge or reject information requests that are legally objectionable. Keep in mind that you probably won't know that you're being monitored or tracked until much later, if at all. Intercepting and processing individual messages from hundreds of thousands of people is doable, but not easy. Law enforcement or government agencies want to know who is at an event, who they are with, and what information can be extracted to monitor them later. Many smart devices track your location through multiple means. This is useful for getting directions and finding things nearby, but it can also allow law enforcement to extract your movements after the fact. For example, pictures you take with a smartphone frequently include their physical locations, and Google Maps maintains records of your movements in its Your Timeline section. Shut off Wi-Fi. Disable location services until you absolutely need them. Ditto Bluetooth. If you don't need to use your data connection, switch it off, too. However, this may hamper your ability to use encrypted communications. Again, if you can, leave your phone at home. If not, at least shut it down. You can also be tracked without your phone, even in a large crowd. Facial-recognition technology coupled with AI-powered detection can pick out and track individuals in groups. Airborne surveillance using anything from conventional aircraft to small radio-controlled quadcopters to military-style drones can monitor the movements of individuals and track them over time. The Electronic Frontier Foundation (EFF) maintains an excellent primer on identifying those surveillance systems, which can include police bodycams, automated-license-plate-reader cameras, and more. Over the years, social media has played a large role in organizing protests and amplifying demonstrators' messages. However, the information posted to these platforms can also be used as open-source intelligence for anyone trying to track who attends demonstrations. Sharing photos and videos from protests can amplify the message, but this information could also be used to implicate you or others. The EFF recommends taking steps to remove metadata from images. Remember that even if you are comfortable being identified in images, others may not be. Consider framing your camera to show as little of people's faces as possible or blurring faces when you share photos or videos. And it never hurts to ask before sharing someone's face online. If you're concerned about being identified for any reason, consider covering identifiable tattoos and wearing inconspicuous clothing. Obscuring your own face can be useful as well. If you bring a phone to a protest, know that it could be confiscated by law enforcement or stolen by someone in the crowd. Either way, once it's is out of your hands, it could be unlocked, and its contents dumped for future analysis. Most modern devices unlock with biometrics (such as facial recognition or thumbprint scanning). Biometric systems may put you at a disadvantage, though, when you're dealing with law enforcement. In its guide for protestors, the EFF writes: "Under current US law—which is still in flux—using a memorized passcode generally provides a stronger legal footing to push back against a court order of compelled device unlocking/decryption." It's better to disable biometrics and enable password or PIN logins before a protest. You may also want to do this when traveling, too. Modern Apple and Android devices support modes that temporarily disable biometrics. However, once you unlock your phone, it reverts to using biometrics. If you don't have the time to fully disable biometrics beforehand, on Android, hold the power button and select lockdown. On an iOS phone, hold the power and volume up buttons for a few seconds until you see the power off, medical ID, and Emergency SOS screen. Tap cancel, and the phone will require your passcode to unlock instead of biometric authentication. Disable biometric logins and enable a passcode. Enable encryption. Most Android and Apple devices will do this automatically when you enable a passcode or biometrics, but double-check in the Settings menu. Remove unnecessary apps and reinstall them later. Even when not in use, some apps can send and receive data. This can slow down an already spotty connection and could be used to monitor your activity. Log out of any apps you won't need. By default, you usually need to log in to an app only once to use it, which can be a problem when you're not in control of your phone. If you back up your phone (and you should), make sure that your backups are secure with a complex, unique password and multi-factor authentication. This may require making changes to your Apple or Google accounts. To help you get started, see our guides to backing up iPhones and Android devices. Enable the remote-control features built into Android and iOS so you can wipe or disable a lost or confiscated phone remotely. Use secure messaging, and set text messages to delete automatically. (More on this below.) Whether you're protesting or just chatting with your family, use encrypted communications whenever possible. These systems ensure that if your messages are intercepted, they will be unreadable except to the intended recipients. Our top recommendation for secure messaging is Signal. We recommend it because the app and its protocol are open-source, so it has been carefully examined for potential flaws and endorsed by security experts. The app looks and works just like your existing messaging client. You can also use it to make encrypted VoIP and video calls. One particularly useful feature of Signal is that your messages can be set to expire. This way, there's little trace of your previous conversations in the app. Other secure messaging apps have similar features. WhatsApp is particularly notable, as it has wider adoption than Signal but uses the same technology to secure messages. Both WhatsApp and Signal have powerful tools for group chats that also make them useful for organizing protests. In most cases, the iPhone uses end-to-end encryption when sending messages between you and other iPhone users. So whenever you see the blue bubble around text, you can rest assured that if the message is intercepted, it cannot be read. Keep in mind that iPhones don't always send encrypted messages. With poor connectivity, iPhones sometimes fail over to unsecured SMS messages, and messages sent to Android users are not encrypted. It's also possible, no matter what secure messaging platform you use, that screenshots of your messages could be shared with people you did not intend. As always, consider that someone might see your messages, even when they're sent securely. If you have the means to do so, consider purchasing a completely different phone for the protest and leaving your personal devices at home. Several affordable Android phones are available, and many wireless carriers can provide a prepaid service for your device. There are also low-cost plans from smaller carriers. If you haven't used a so-called "dumbphone" in a while, take this opportunity to try one out. When I wanted to experience life with a flip phone again, I purchased a Nokia 2780 to bring on camping trips. I haven't had trouble using it for calls and texting. If you opt to go this route, remember to secure the new one as you would your regular phone. If it's not going to be used for other activities, you can lock it down even more. Here are some ideas: Don't install non-essential apps. Don't connect the new phone to any of your cloud services, like your Google account. If you must log into an app to use it, see if you can enable a secondary PIN on the app itself. Signal offers the ability to require a PIN to unlock the app. Store only information in your Contacts app for people who are absolutely essential. Consider not using real names in your address book. There are a lot of methods you can use to lock down your phone, but the best advice we can give is to leave any devices with location-gathering capabilities (including your smartwatch) at home. You should also take a few minutes today to lock down your online presence. Read our guide to completely disappearing online, and lock down your family's home network using our cybersecurity checklist.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store