WHAT HAPPENED

A sentencing date of April 24, 2026 is approaching in a federal cryptocurrency prosecution — the significance of which is difficult to overstate — that has resulted in thirteen charged defendants, nine guilty pleas, and arrests spanning the United States and Dubai. Evan Tangeman, 22, of Newport Beach, California, is scheduled to be sentenced next week after pleading guilty to racketeering conspiracy for his role in the Social Engineering Enterprise — a criminal organization that stole more than 4,100 Bitcoin from a single victim in Washington, D.C. on August 18, 2024. At the time of the theft the Bitcoin was worth $263 million. It is now valued at more than $368 million. Three additional defendants — Nicholas Dellecave, Mustafa Ibrahim, and Danish Zulfiqar — were charged in a second superseding indictment unsealed in December 2025. Ibrahim and Zulfiqar were arrested in Dubai.

WHY IT MATTERS

The decision to charge a cryptocurrency theft ring under RICO has significant implications for anyone who touches the edges of this kind of enterprise — not just the organizers.

RICO was designed for structured criminal organizations with defined hierarchies and repeated criminal conduct. Under RICO, peripheral participants — people who provided services, converted currency, or assisted in laundering — face the same charges as the people who planned and executed the thefts. In this case that meant a 22-year-old California man who helped rent houses and convert cryptocurrency to cash now faces the same racketeering charges as the alleged ringleaders. Kunal Mehta, who ran crypto-to-cash conversion services and created shell companies to process stolen funds, pleaded guilty to RICO conspiracy and admitted to laundering at least $25 million.

The enterprise itself grew out of online gaming platforms and evolved into a structured operation with specialized roles — database hackers who identified high-value crypto holders, social engineering callers who impersonated tech support to trick victims into surrendering access credentials, money launderers, and physical burglars who traveled to victims’ homes to steal hardware wallets. In one incident in New Mexico a member physically broke into a victim’s home while ringleader Malone Lam remotely monitored the victim’s location through their iCloud account. Proceeds funded luxury rentals at $40,000 to $80,000 per month, exotic cars titled in shell company names, and bulk cash shipped through the U.S. mail inside squishmallow stuffed animals. Even after his arrest, Lam allegedly continued directing the enterprise from pretrial detention.

What this case illustrates for the defense side is how quickly federal prosecutors can expand the circle of criminal liability in a crypto case. Providing services — even seemingly routine ones like currency conversion or property rental — to individuals later charged in a RICO conspiracy can draw you into the indictment. The statute does not require that you knew the full scope of the enterprise. It requires only that you participated in it.

WHO SHOULD PAY ATTENTION

Any individual holding significant cryptocurrency assets needs to understand how this enterprise operated. The victims were not compromised through technical blockchain vulnerabilities. They were socially engineered — tricked through impersonation of tech support, fake security alerts, and psychological manipulation into surrendering their own credentials. Your holdings are only as secure as your ability to recognize and resist a convincing phone call or email.

Crypto investors using hardware wallets should be aware that this enterprise went further — physically surveilling and burglarizing homes to steal devices. The threat is not purely digital.

Anyone who has provided services — currency conversion, property management, vehicle purchasing, or cash handling — to individuals later investigated for crypto theft should understand their potential exposure under RICO before speaking with investigators.

DEFENSE NOTE

Separate from the victim exposure described above, if you have received any communication from federal investigators in connection with a cryptocurrency theft, laundering operation, or social engineering scheme — whether as a potential target, a witness, or someone who provided services to individuals later charged — consult with a federal criminal defense attorney before responding. The application of RICO in this case means peripheral participants face the same charges as organizers. Zerillo Law Firm handles federal crypto matters — contact us at zerillolaw.com.

Source: U.S. Department of Justice / IRS Criminal Investigation

About the Author

Michael J. Conley is a former federal prosecutor with nearly 25 years in federal law enforcement. He served as an Assistant U.S. Attorney in the District of Maine and as Chief of the Criminal Division for the U.S. Attorney’s Office in the U.S. Virgin Islands. He secured one of the first federal convictions in the country for operating an unlicensed Bitcoin money service business — a landmark prosecution that helped establish Bitcoin as money under federal law at a time when that legal question remained largely unsettled. He is Of Counsel at Zerillo Law Firm, where he focuses on federal cryptocurrency criminal defense. Contact the firm at zerillolaw.com

Keep reading