Former LA sheriff’s deputy jailed for helping crypto ‘Godfather’ run violent extortion ring
A former Los Angeles County Sheriff’s Department deputy has been sent to federal prison after admitting he used his badge, access and authority to help a cryptocurrency entrepreneur terrorize victims and force them to hand over digital assets and cash.
Michael Coberg, once trusted to uphold the law, received a 63‑month prison sentence for his role in an extortion operation orchestrated by crypto founder Adam Iza. In addition to the prison term, Coberg was ordered to pay $127,000 in restitution to one of the victims.
Prosecutors said Coberg turned himself into a paid enforcer for Iza, the founder of the crypto trading platform Zort, who marketed himself as “The Godfather” in digital asset circles. While Iza was already jailed on other charges at the time of Coberg’s sentencing, evidence presented to the court showed that, at the height of the scheme, Coberg was being paid at least $20,000 per month in cash by Iza in exchange for his services.
Staged arrest leads to forced crypto transfer
The most striking incident detailed by prosecutors dates back to October 2021. Coberg, acting under color of authority, joined a team that picked up a man identified in court documents only by the initials “L.A.” The pretext, according to investigators, was a supposed financial dispute connected to Iza.
Rather than taking the man to a police station or jail, Coberg delivered L.A. to Iza’s residence. There, the crypto founder recorded the encounter on video and pressured the victim to transfer $127,000 to his account. Throughout the ordeal, Coberg stood guard, leveraging his uniform, firearm and law-enforcement status to give the encounter an air of official legitimacy and to intimidate the victim into complying.
The victim, believing he was effectively under arrest or in custody, followed Iza’s instructions and moved the funds while camera phones rolled and Coberg watched. Prosecutors said this blending of real law-enforcement presence with criminal extortion tactics was central to the scheme’s effectiveness.
Trip to firing range escalates into armed intimidation
The abuse did not end there. According to court filings, Coberg later took L.A. to a firing range. What should have been a controlled environment for weapons training became another stage for intimidation: prosecutors allege that Iza held the victim at gunpoint during the outing, again demanding the transfer of funds.
The setting was particularly chilling. At a firing range, surrounded by live ammunition and firearms, the message was clear: refusal to cooperate carried an implied threat of lethal violence. Coberg’s presence at the range, combined with his prior involvement in the staged arrest, reinforced the sense that the victim had no safe way out.
Second victim targeted in bogus drug arrest plot
Authorities say Coberg’s misconduct extended to another individual, identified only as “R.C.” In this case, Coberg allegedly conspired to engineer a sham drug‑related arrest designed to pressure the victim into compliance.
Prosecutors argued that the plan involved staging circumstances that would make it look as though R.C. had been caught up in narcotics activity, exposing him to the risk of criminal charges and incarceration. The threat of a fabricated case was used as leverage in an attempt to coerce R.C. into surrendering assets.
This scheme, investigators say, was not carried out by Coberg alone. The targeting of R.C. was coordinated with another former Los Angeles County Sheriff’s deputy, Christopher Cadman, who has also pleaded guilty in connection with the wider case. Their coordinated effort underscored how a small group of insiders can weaponize institutional power for criminal gain.
Guilty pleas and ongoing sentencing
Coberg pleaded guilty in September to two federal offenses: conspiracy to commit extortion and conspiracy against rights, a charge often used when law enforcement officers abuse their official positions to violate constitutional protections.
Iza, the self‑styled crypto “Godfather” at the center of the scheme, has already entered guilty pleas to extorting multiple victims. At the time of Coberg’s sentencing, Iza was still awaiting his own punishment, which is expected to reflect not only the financial harm but also the violence and threats employed to secure the transfers.
Cadman, the second former deputy implicated, has likewise admitted guilt, demonstrating that the conspiracy extended beyond a single rogue officer.
“Wrench attacks”: when physical force bypasses digital security
The case highlights a growing trend in crypto‑related crime: attackers increasingly sidestep technical protections, such as hardware wallets and multifactor authentication, by going after the weakest link in the chain – the user.
These incidents are often described as “wrench attacks,” shorthand for scenarios where someone is threatened with a weapon or other physical coercion until they unlock their wallet and sign over assets. No matter how sophisticated the cryptography or how hardened the digital infrastructure, a person under duress can be forced to disable all those safeguards in seconds.
This pattern is particularly troubling for law enforcement because traditional cyber defenses offer little protection against real‑world violence. It also complicates investigations: transactions may look voluntary on the blockchain, even when they were made under threat.
Why corrupt officers are so valuable to crypto extortionists
The Coberg case also illustrates why corrupt insiders in uniform are so attractive to criminal organizers in the digital asset space. A badge can provide:
– Apparent legal authority to detain or question a target
– Access to police databases and information about victims
– Knowledge of investigative techniques that help criminals avoid detection
– The psychological impact of “official” pressure, making victims less likely to resist or report
When law enforcement credentials are misused in combination with crypto transactions, the result is a powerful mix: victims can be made to feel both legally trapped and physically unsafe, while crooks enjoy the speed and relative anonymity of digital transfers.
Warning signs for investors and crypto users
For individuals active in the cryptocurrency market, the case serves as a reminder that personal safety is part of digital security. Some practical considerations include:
– Limiting who knows about large crypto holdings or recent windfalls
– Using multisignature wallets or time‑locked transactions that cannot be quickly authorized by one person under duress
– Separating devices and accounts so that a single phone or laptop does not control all assets
– Documenting any suspicious attempts at “off‑the‑books” mediation in financial disputes, especially if someone invokes law enforcement connections
Experts emphasize that no investment or trading strategy is complete without a plan for physical security, particularly as crypto wealth becomes more common and visible.
Institutional response and trust in policing
Cases like Coberg’s inevitably raise broader questions about public trust in law enforcement. When officers cross the line from protector to predator, it damages confidence in the system and makes victims less likely to seek help.
In response, agencies are under pressure to:
– Strengthen internal affairs units and whistleblower protections
– Improve monitoring of officers’ finances and outside business relationships
– Provide better training on conflicts of interest and crypto‑related crime
– Cooperate closely with federal authorities on extortion and digital asset investigations
The successful prosecution of Coberg and his co‑conspirators may reassure some observers that oversight is working, but it also highlights how much damage can be done before such schemes are uncovered.
Crypto crime is evolving – and so must defenses
The Coberg-Iza case sits at the intersection of emerging technology and old‑fashioned organized crime. Cryptocurrency did not create extortion, but it has changed how quickly and irreversibly funds can be moved once victims are coerced.
For regulators, law enforcement and the industry, the challenge is twofold: adapting investigative tools to trace digital transfers while also recognizing that the most dangerous attacks may look more like kidnapping or armed robbery than a computer hack.
As crypto adoption spreads, legal systems will increasingly face cases where official power, physical intimidation and digital assets collide. The outcome of high‑profile prosecutions like this one will help define the boundaries of acceptable behavior in the digital finance era – and determine how safe ordinary users feel holding wealth that exists primarily as code.

