Three men face federal charges today for an interstate robbery campaign that combined delivery-worker disguises with violent home invasions to steal millions in cryptocurrency. The federal prosecution in the Northern District of California marks a significant escalation in law enforcement’s response to “wrench attacks,” where criminals use physical torture or restraint to bypass digital wallet encryption.
- FBI, DOJ, crypto kidnapping, Elijah Armstrong, Nino Chindavanh, Jayden Rucker, Northern District of California, Hobbs Act, Bitcoin robbery, San Francisco crime, blockchain forensics, wrench attack, self-custody risk, cryptocurrency theft
The U.S. Attorney’s Office unsealed the indictment on May 7, 2026, naming Elijah Armstrong, Nino Chindavanh, and Jayden Rucker as the primary suspects. The defendants allegedly traveled from Tennessee to California specifically to target high-net-worth digital asset holders in San Francisco, San Jose, Sunnyvale, and Los Angeles. Prosecutors charged the men with conspiracy to commit Hobbs Act robbery, conspiracy to commit kidnapping, and related attempted counts.
The federal investigation detailed a predatory modus operandi that relied on social engineering to breach home security. The suspects posed as delivery drivers to trick victims into opening their doors. Once inside, the group used firearms, duct tape, and zip ties to restrain and assault residents. In one documented San Francisco heist, the attackers forced a victim at gunpoint to sign into a cryptocurrency account. A co-conspirator then moved approximately $6.5 million in digital assets to wallets controlled by the robbery ring.
FBI agents tracked the group through a combination of blockchain forensics and traditional surveillance. Chindavanh was apprehended in Sunnyvale on December 22, 2025, while Armstrong and Rucker were arrested in Los Angeles on December 31, 2025. The defendants remained in federal custody leading up to their most recent court appearances. Armstrong and Rucker appeared in a San Francisco federal courtroom today, May 12, 2026, for the appointment of legal counsel. Chindavanh’s next status hearing was scheduled for June 26, 2026.
The Department of Justice characterized the spree as an organized interstate operation. “The defendants targeted victims based on their perceived wealth in the cryptocurrency market,” prosecutors stated in court filings. The FBI emphasized that the suspects crossed state lines with the express intent of committing violent felonies, highlighting a trend where digital wealth attracts traditional violent crime tactics.
Genuine News Deserves Honest Attention.
High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.
👉 Submit Your PRThe prosecution relied on evidence from multiple California law enforcement agencies that collaborated to link the separate home invasions. Investigators noted that the group committed or attempted multiple robberies between late 2024 and early 2025. The $6.5 million transfer stood out as one of the largest physical crypto robberies in California history. The case underscored the vulnerability of “self-custody” investors who maintain high-value wallets on personal devices without institutional-grade physical security.
Blockchain analysis played a critical role in the recovery efforts, as agents mapped the movement of the stolen tokens through various mixers and offshore exchanges. Law enforcement officials warned that as digital assets gain value, the risk of hybrid attacks, combining digital targeting with physical violence, continues to grow.
Chain Street’s Take
The transition from digital phishing to physical kidnapping marks a brutal regression in criminal tactics. The Tennessee trio’s alleged spree proves that the pseudo-anonymity of the blockchain offers no protection once a victim’s physical location is compromised. As crypto wealth becomes more visible through public ledgers and social media, holders in major tech hubs must prioritize physical opsec as much as private key encryption. The $6.5 million San Francisco heist confirms that for high-value targets, the primary security vulnerability is no longer the software, but the front door.
Activate Intelligence Layer
Institutional-grade structural analysis for this article.





