• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2022
  • August
  • 2
  • Woman Heads to Prison for Hiring a “Hitman” on the Darkweb

Woman Heads to Prison for Hiring a “Hitman” on the Darkweb

August 2, 2022 Comments Off on Woman Heads to Prison for Hiring a “Hitman” on the Darkweb
Woman Heads to Prison for Hiring a “Hitman” on the Darkweb

A Pelahatchie, Mississippi, woman will spend ten years in prison for trying to hire a hitman on the darkweb to kill her ex-husband.

U.S. District Court Judge Carlton Reeves sentenced Jessica Leeann Sledge, 40, to 120 months in federal prison. After prison, Sledge will remain on supervision for three years and pay a $1,000 fine.

In February 2022, Sledge pleaded guilty to one count of using interstate commerce facilities in the commission of murder-for-hire. Court documents revealed that Sledge had downloaded the Tor Browser on her work computer to search for a murder-for-hire site. After finding one, she created an account with the name “Forward Only” and contacted the site administrator. She sent the “hitman” $10,000 to murder her ex-husband, Jerry.

Sledge had planned to marry her affair partner after having her husband killed

Later, a source provided a copy of the messages between Sledge and the “hitman” to Federal Bureau of Investigation (FBI) employees. After identifying Sledge as “Forward Only,” an undercover agent posing as a hitman contacted Sledge by phone. The agent asked to speak to the user “Forward Only,” and Sledge identified herself as the said user. Sledge directed the agent to contact her through WhatsApp, where she had an account with the same name.

From a previous Darknetlive article about the case:

“During a series of recorded conversations over the phone and through WhatsApp, Sledge confirmed that she had paid $10,000 in Bitcoin to have her husband killed. She sent the undercover officer pictures of the target, pictures of his car, and updates on her husband’s whereabouts.”

“On November 1, 2021, Sledge agreed to meet the purported hitman in person in a Home Depot parking lot. During the meeting, Sledge paid the undercover officer an additional $1,000 in cash to complete the job and said she might hire him for another job. The victim of the next hit would be “a female who couldn’t keep her mind on her own business,” according to Special Agent Schmidt.”

“Later that day, law enforcement officers arrested Sledge at her place of employment. They asked Sledge if she knew anyone who wanted to hurt her husband. After some back and forth, the officers told Sledge that her husband was dead and placed her under arrest.”

Assistant U.S. Attorney David Fulcher asked the court to sentence Sledge to ten years in prison. Sledge’s attorney, John Colette, asked the judge for leniency. Colette said his client had “zero chance of recidivism” and showed remorse for her actions. Fulcher countered these claims by showing the judge transcripts of messages between Sledge and the “hitman” where she talked about the need to have someone else murdered.

“The premeditation of this… the efforts she went to plan this over time,” Fulcher said. “But for the fact the FBI introduced an undercover agent, Ms. Sledge knew the murder was going to take place.”

U.S. District Court Judge Carlton Reeves said, “this is an egregious crime… Scheming to kill an individual is an extraordinary offense. Any sentence must reflect that this is indeed a serious offense.”

“We do know that there were multiple calls with an undercover agent… Numerous calls, followup conversations [on] where to locate her husband, where he would be at a particular time, the method that ought to be used to execute the plan. What we have here is a methodical plan to kill her husband. All of that is very troubling to the court and the law itself.”

After talking about the severity of the crime, Judge Reeves said that he would recommend Sledge be placed at the Federal Bureau of Prison’s women’s facility in Aliceville, Al. The facility is a low-security prison.


(via darknetlive.com at https://darknetlive.com/post/ms-woman-sentenced-for-hiring-a-hitman-on-darknet/)

Post navigation

ESP32 Marauder v0.9.12 releases: suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
ForceAdmin: Create infinite UAC prompts forcing a user to run as admin

Related Articles

US Treasury Sanctioned Tornado Cash

US Treasury Sanctioned Tornado Cash

- Dark Web News
August 9, 2022
BTC-e Owner Extradited to the United States

BTC-e Owner Extradited to the United States

- Dark Web News
August 8, 2022
Three Sentenced for Operating the “Reboot” Store on Hydra

Three Sentenced for Operating the “Reboot” Store on Hydra

- Dark Web News
August 5, 2022
hacker gadgets
hacker phone covers

Recent Posts

CVE-2022-2590: Linux kernel privilege escalation vulnerability

CVE-2022-2590: Linux kernel privilege escalation vulnerability

August 9, 2022
Beanshooter v3.0 releases: identify common vulnerabilities on JMX endpoints

Beanshooter v3.0 releases: identify common vulnerabilities on JMX endpoints

August 9, 2022
US Treasury Sanctioned Tornado Cash

US Treasury Sanctioned Tornado Cash

August 9, 2022
PersistenceSniper: hunt persistences implanted in Windows machines

PersistenceSniper: hunt persistences implanted in Windows machines

August 8, 2022
BTC-e Owner Extradited to the United States

BTC-e Owner Extradited to the United States

August 8, 2022
MrKaplan: tool for red teamers to stay hidden by clearing evidence of execution

MrKaplan: tool for red teamers to stay hidden by clearing evidence of execution

August 8, 2022

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW