CASE FILE: INSANE

THE FBI DIDN'T CATCH HIM.
HIS EGO DID.

The complete, unhinged, fully documented story of John "Lick" Daghita, the 21-year-old who vibe-coded a fake exchange, robbed the U.S. government, posed with a Lambo outside FBI headquarters, and got exposed in a Telegram flexing contest he didn't even need to join.

$0 Stolen from US Gov
$0 Total Linked Thefts
$0 Flaunted on Video
Read The Full Story (It Gets Worse)
TARGET // DAGHITA, JOHN
John Daghita Portrait

01. Who Is He?

SUBJECT:John Daghita
ALIAS:Lick, John, @fraud, @evade, @devil, @drug
AGE:~21
STATUS:Under Investigation
LOCATION:Northern Virginia
OCCUPATION:Nepotism beneficiary turned cyber criminal
SPECIALTY:Vibe coding, self-incrimination, rug pulling
THREAT LEVEL:To himself? Maximum.

Professional Background: His Dad's Company

Most people at 21 are figuring out how to do laundry. John Daghita was building a fake cryptocurrency exchange using an AI chatbot to siphon $40 million from government seizure wallets managed by his father's company. Different lanes.

His father, Dean Daghita, runs Command Services & Support, Inc. (CMDSS), which won a $4 million contract to guard the very crypto his son was allegedly stealing.

"I vibe coded the whole thing on Cursor... Their crypto reserve is like 36 bill... They got burned. They're dumb."
— Alleged leaked audio of Daghita

02. Vibe Coded His Way to 40 Federal Charges

How To Rob The Government (Allegedly) (Do Not Actually Do This)

  • Step 1: Have your dad win a $4 million government contract to manage seized crypto.
  • Step 2: Get hired at his company through "word of mouth" (a term that here means nepotism).
  • Step 3: Open Cursor, an AI code editor, and "vibe code" an entire fake exchange.
  • Step 4: Make it look like the government is selling seized crypto per the contract. Route the actual funds to your personal wallet.
  • Step 5: Walk away with $40 million+.
  • Step 6: (CRITICAL) Do NOT do any of the following things. (He did all of them.)
Posted photos on private jets with stolen money
Wore $300,000 in watches in public
Posed with a Lamborghini outside FBI headquarters
Got into a Telegram argument about who is richer
Screen-shared his crypto wallets to 11 people
Consolidated $23 million into one traceable wallet on camera
Sent stolen crypto directly to the investigator tracking him
Launched a meme coin named after himself
Rug-pulled the meme coin

03. The $23 Million Dollar Argument Nobody Asked For

Daghita flexing on video
Daghita (right) proving he stole money to a stranger on the internet.
ROUND 1: THE INSULT

Dritan Kapplani Jr. calls Lick poor. In the crypto underworld, this is an act of war.

ROUND 2: THE REBUTTAL

Lick opens his Exodus wallet. $2.3 million on a Tron address. Dritan is unimpressed. Posts a photo of Lick's face. The chat erupts.

ROUND 3: ESCALATION

Lick plugs in hardware wallets. Transfers $6.7 million in ETH. Dritan says "Wait, he might be tough."

ROUND 4: THE FATAL ERROR

Lick keeps going. Consolidates $23 million. One wallet. One screen share. Eleven witnesses. Recorded.

FINAL SCORE

Dritan 1, Lick 0 (and facing federal investigation).

04. What To Do After Getting Exposed

According to John Daghita, the correct response to being caught stealing $40 million is to buy a $900,000 Telegram username.

The Crash Out Checklist

  • Delete evidence (too late, blockchain is forever)
  • Taunt the investigator by sending them stolen ETH (which they forwarded to the government)
  • Buy the Telegram handle @fraud for $900,000 (because subtlety is overrated)
  • Impersonate the DOJ using the handle @seizure (felony speedrun)
  • Launch a meme coin ($LICK) and rug pull it immediately
  • Get scammed for $100,000 by someone pretending to be Clavicular

Self-Destruction Level

CRIMINALLY INSANE (95%)

05. FY2024-2026 Performance Report: Lick Enterprises

(Unaudited, Obviously)

Line Item Amount ROI Assessment
Total Stolen from U.S. Government $40,000,000+ Impressive, until you get caught
Total On-Chain Linked Theft $90,000,000+ More money than most will see in a lifetime
Largest Single Heist (Bitfinex funds) $24,900,000 Stolen from money that was already stolen
Spent on Telegram Handle @devil $780,000 For a username
Spent on Telegram Handle @fraud $900,000 The irony writes itself
Lost to Fake Clavicular Scam $100,000 The scammer got scammed
$LICK Meme Coin Peak $915,000 Briefly
$LICK Meme Coin 24hr Later ~$25,000 There it is
Wumpus Corp Peak Market Cap $3,000,000 Round two of the same trick
Dad's CMDSS Contract Value $4,000,000 That the son apparently destroyed

*These figures are unaudited because auditing would require John Daghita to stop committing new financial crimes for long enough to count the previous ones.

06. He Stole Money That Was Already Stolen

The Inception Heist

In 2016, Ilya Lichtenstein hacked Bitfinex and stole 119,756 Bitcoin. In 2022, the U.S. government seized ~94,000 BTC from Lichtenstein. In 2024, the government hired CMDSS to manage the seized crypto. In 2024, the CMDSS CEO's son allegedly stole $24.9 million of those same funds. In 2026, a random person on Telegram called him poor, and the whole thing collapsed.

"Somewhere in federal prison, Ilya Lichtenstein is reading about this and wondering how his stolen Bitcoin got stolen again by a kid who vibe-coded a fake exchange."

07. Will He Get Arrested? The Internet Is Taking Bets.

Polymarket Odds

The prediction market question: "John Daghita arrested by March 31?"

The prediction market accumulated over $27,000 in volume. Daghita's response was to buy shares in the 'No' direction, pushing his implied arrest probability below 1%.

Bold strategy for someone whose wallet addresses are public record.

1%
IMPLIED PROBABILITY
View Live Odds