All Reports
VOLT Bureau - Crypto & Markets

The Collector: How a Maryland Man Turned a $50 Million DeFi Hack Into Pokemon Cards, a Black Lotus, and an Ancient Roman Coin

Jonathan Spalletta drained Uranium Finance in April 2021, laundered the proceeds through Tornado Cash, then blew millions on rare collectibles. Five years later, the DOJ caught up. He surrendered in Manhattan on Monday morning.

BLACKWIRE VOLT Bureau - - 12 min read
Crypto hacking concept - digital security breach

The DeFi Wild West era produced some of crypto's most brazen exploits. Few were as absurd as Uranium Finance. (Pexels)

Jonathan Spalletta walked into a federal courthouse in Manhattan on Monday morning and surrendered to authorities. He did not run. He did not try to flee through another Tornado Cash mixer or swap his identity across a fresh set of wallets. He simply showed up, five years after draining more than $50 million from a decentralized exchange called Uranium Finance - a Binance Smart Chain clone of Uniswap that most people had already forgotten existed.

The Southern District of New York unsealed a two-count indictment charging the 36-year-old Rockville, Maryland resident with computer fraud and money laundering. Federal prosecutors laid out a case that reads less like a sophisticated state-sponsored cyber operation and more like a video game heist executed by someone who immediately spent the loot on the exact kind of rare items you would expect a DeFi exploiter to buy: a Black Lotus Magic: The Gathering card for about $500,000, 18 sealed Alpha booster packs for roughly $1.5 million, first-edition Pokemon sets worth over $1 million, and - in perhaps the most baroque detail in any crypto indictment to date - an ancient Roman "Eid Mar" coin commemorating the assassination of Julius Caesar, purchased for approximately $601,500.

The charges follow a February 2025 seizure of approximately $31 million in crypto tied to the exploit, marking the first time the years-old case had been publicly linked to a named defendant. But the indictment reveals a far richer story than a simple funds recovery. It exposes the anatomy of a DeFi exploit, the limits of mixer-based laundering, the patience of federal investigators, and the staggering hubris of a man who allegedly told an associate after the hack: "I did a crypto heist ... Crypto is all fake internet money anyway."

The Protocol Nobody Remembers

Blockchain technology concept

Uranium Finance was one of dozens of Uniswap clones that launched on Binance Smart Chain in early 2021. (Pexels)

To understand what Spalletta allegedly did, you have to understand what Uranium Finance was - and why nobody was watching it closely enough to stop him.

In early 2021, Binance Smart Chain was the hottest destination in DeFi. Ethereum gas fees had made decentralized trading prohibitively expensive for anyone who was not already wealthy. BSC offered a faster, cheaper alternative, and a parade of Uniswap clones - PancakeSwap, BakerySwap, JulSwap, and dozens of others - launched in rapid succession, competing for liquidity with token incentive programs and yield farming opportunities that promised triple-digit annual returns.

Uranium Finance was one of these clones. It operated as a fork of Uniswap V2, deployed on BSC with its own native token and a set of liquidity pools that held tens of millions of dollars in user deposits. The protocol was anonymous. Its development team operated under pseudonyms. Its code had been submitted for an audit, but the audit had identified an issue that the team described as "low severity." They were wrong.

The vulnerability was almost comically simple. In Uranium's v2 pair contracts, a calculation error meant that the balances during sanity checks were inflated by a factor of 100 compared to the actual reserves. A misplaced zero - or rather, a missing zero in a section that managed reserves - created an opening that allowed anyone who interacted with the contracts to withdraw nearly all tokens from a pool by sending in the minimum required amount. Blockchain researcher Igor Igamberdiev described it at the time as a "calculation error" in the pair contracts' balance field, a bug so basic it should have been caught by any competent code review.

According to the indictment, Spalletta found the bug before anyone else did. And he exploited it not once, but twice.

Two Strikes in April 2021

Computer code on a dark screen

The exploit was executed with surgical precision, targeting Uranium's pair contracts within hours of each other. (Pexels)

Prosecutors allege that Spalletta first exploited Uranium's rewards mechanism on April 8, 2021, draining roughly $1.4 million from the protocol. Instead of disappearing, he then contacted the Uranium team and negotiated what authorities now describe as a "sham bug bounty" - a deal in which he was allowed to keep approximately $386,000 in exchange for disclosing the vulnerability.

The bug bounty arrangement gave Spalletta something valuable beyond the immediate payout: intelligence. He now understood exactly how the protocol's team operated, how quickly they responded to threats, and what their remediation process looked like. According to the indictment's timeline, he used that knowledge.

On April 28, 2021, he struck again. This time, the attack was not a probe. It was an emptying. Spalletta allegedly drained the liquidity pools for multiple token pairs simultaneously, pulling out approximately $50 million in BNB, BUSD, ETH, BTCB, USDT, DOT, ADA, and Uranium's own native token. The BNB and BUSD pools each lost about $18 million. Ethereum and BTCB pools lost a combined $9 million. Additional pools shed $6.7 million in USDT and $1.7 million across DOT, ADA, and other tokens.

The attack came two hours before Uranium was scheduled to launch its v2.1 contracts, which included a fix for the very vulnerability Spalletta had exploited. The timing was not coincidental. Only seven people within the Uranium organization and three auditor contractors knew about the pending fix. A Uranium community member who went by "Baymax" posted in the project's Telegram that "someone leaked information" that led to the attack. Baymax later denied any involvement with Uranium beyond being a "community member." No other team members responded publicly.

Uranium Finance shut down after the hack. It never reopened. The thousands of users who had deposited funds into its liquidity pools lost everything.

The Laundering Trail: Tornado Cash, Mixers, and the Illusion of Privacy

Money laundering concept - financial crime

Tornado Cash became the go-to mixer for DeFi exploiters in 2021, but its on-chain footprint left more traces than users realized. (Pexels)

After the heist, Spalletta allegedly began laundering the proceeds through a series of increasingly complex crypto transactions. The core of his laundering strategy relied on Tornado Cash, the Ethereum-based privacy mixer that was designed to break the on-chain link between deposit and withdrawal addresses. At the time of the Uranium exploit, Tornado Cash was operating freely, more than a year before the U.S. Treasury would sanction the protocol in August 2022.

The laundering process worked in stages. First, Spalletta had to move the stolen assets off Binance Smart Chain and onto Ethereum - the BTC from the exploit was swapped for real BTC, and the ETH was bridged to Ethereum's mainnet. From there, the funds were deposited into Tornado Cash in batches, withdrawn to fresh addresses, and then moved through additional intermediaries before landing in wallets that Spalletta controlled.

But the on-chain trail was not as clean as Tornado Cash promised. Blockchain analytics firms had been developing increasingly sophisticated techniques for correlating Tornado Cash deposits and withdrawals based on timing patterns, denomination matching, and behavioral analysis. ZachXBT, the pseudonymous blockchain investigator who has become the informal sheriff of crypto's fraud landscape, had been tracking the Uranium Finance funds for years. In December 2023, ZachXBT publicly suggested that the hacker had been purchasing rare Magic: The Gathering cards with the stolen proceeds - a detail that would later appear almost verbatim in the federal indictment.

Spalletta also allegedly deposited smaller amounts of crypto into centralized exchanges - platforms that, unlike Tornado Cash, required know-your-customer verification. This was a critical misstep. Centralized exchanges maintain records of user identities and can be compelled to produce them under subpoena. Each deposit into a KYC-compliant exchange created a potential link between Spalletta's real identity and the stolen funds.

The combination of on-chain analysis, centralized exchange records, and the physical collectibles trail gave federal investigators multiple vectors to work with. The Southern District of New York and Homeland Security Investigations in San Diego built the case over several years before executing the $31 million seizure in February 2025 and finally unsealing the indictment against Spalletta on Monday.

The Shopping Spree: Black Lotus, Pokemon, and Julius Caesar

Trading cards and collectibles

Spalletta's purchases read like a museum acquisition list crossed with a 1990s nostalgia catalog. (Pexels)

The spending details in the indictment are where the case transcends standard crypto enforcement and enters a realm of almost literary absurdity.

The Black Lotus card that Spalletta allegedly purchased for approximately $500,000 is the most iconic card in Magic: The Gathering history. Printed only in the game's 1993 Alpha, Beta, and Unlimited sets, a mint-condition Alpha Black Lotus has sold at auction for over $500,000 multiple times. The card provides three mana of any single color for zero casting cost, making it the most powerful card ever printed. It has been banned in all competitive formats except Vintage, where it is restricted to one copy per deck. For a DeFi hacker to purchase one with stolen funds is almost too on-the-nose - a card that generates infinite value from nothing, acquired with money conjured from a smart contract bug.

The 18 sealed Alpha booster packs, purchased for roughly $1.5 million, represent an even rarer category of collectible. Alpha booster packs are considered some of the rarest sealed products in all of trading card collecting. Only 2.6 million Alpha cards were ever printed, and the number of sealed packs remaining in existence is estimated to be in the low hundreds. Each pack contains 15 cards with a chance of containing a Black Lotus, a Mox, or any of the game's other Power Nine cards. At current market prices, a sealed Alpha pack can fetch $100,000 or more at auction.

The first-edition Pokemon sets, valued at over $1 million, tap into a different nostalgia market but carry similar scarcity premiums. First-edition Base Set booster boxes have sold at auction for over $400,000, and individual graded first-edition Charizard cards have crossed the $400,000 mark. The collectibles market for 1990s trading cards experienced a massive boom during and after the COVID-19 pandemic, with prices peaking in 2021 and 2022 before partially correcting.

Then there is the Eid Mar coin. Struck in 42 BC by Marcus Junius Brutus to commemorate the assassination of Julius Caesar on the Ides of March, the Eid Mar denarius is one of the most famous coins in numismatic history. Only about 100 examples are known to survive. In October 2020, an Eid Mar gold aureus - an even rarer variant - sold at auction for approximately $4.2 million, making it the most expensive ancient coin ever sold. Spalletta's purchase of an Eid Mar for roughly $601,500 likely involved a silver denarius, which would still rank among the most significant ancient coin transactions of the past decade.

Spalletta's Known Purchases (Per Indictment)

ItemEstimated CostCategory
Black Lotus (Magic: The Gathering)~$500,000Trading Cards
18 Sealed Alpha Booster Packs~$1,500,000Trading Cards
First-Edition Pokemon Sets~$1,000,000+Trading Cards
Roman "Eid Mar" Coin~$601,500Numismatics
Total Known Spending~$3,600,000+

The collectibles purchases served a dual purpose beyond simple consumption. Physical collectibles are notoriously difficult to trace once purchased with cash or crypto. Unlike bank accounts or brokerage holdings, a Black Lotus card does not appear on any government database. It can be stored in a safe, transported across borders, and resold privately with minimal documentation. In effect, Spalletta was converting illiquid, traceable stolen crypto into portable, hard-to-track physical assets - a modern variation of the same laundering technique that has been used by organized crime for decades with art, jewelry, and luxury watches.

But the strategy had a flaw. The rare collectibles market is small. Dealers know each other. A new buyer appearing with large cash reserves and an appetite for the highest-end items draws attention. ZachXBT's public identification of the Magic: The Gathering connection in December 2023 suggests that the blockchain investigator may have traced the funds to a dealer or auction house, providing a lead that federal investigators could follow into the physical world.

DeFi's Year of Reckoning: The Enforcement Wave of 2025-2026

Law enforcement and justice concept

Federal prosecutors have dramatically escalated DeFi enforcement actions since 2024, bringing a wave of long-dormant cases to trial. (Pexels)

The Spalletta indictment lands in the middle of what is shaping up to be the most aggressive year of DeFi enforcement in history. Federal prosecutors have been systematically working through the backlog of 2021-era exploits, using the blockchain forensics techniques and legal precedents developed during the Tornado Cash prosecution to bring previously untouchable cases to trial.

The timeline tells the story. In January 2025, KuCoin's operator Peken Global Limited pleaded guilty to operating an unlicensed money transmitting business, resulting in nearly $297 million in penalties and forfeitures. On Monday, the same day Spalletta surrendered, the CFTC announced a consent order permanently barring KuCoin from allowing U.S. users on its platform, imposing an additional $500,000 civil penalty and converting a temporary two-year withdrawal into an indefinite ban. KuCoin had roughly 1.5 million registered U.S. users and generated at least $184.5 million in fees from them, according to DOJ records.

The February 2025 seizure of $31 million in crypto tied to the Uranium Finance hack was itself a landmark - one of the largest DeFi-related asset recoveries by U.S. law enforcement. The Southern District of New York and Homeland Security Investigations in San Diego worked together on the recovery, demonstrating the kind of cross-agency coordination that was rare in crypto cases before 2024.

The broader pattern is unmistakable. Cases that seemed unsolvable in 2021 - when DeFi was booming, Tornado Cash was operating freely, and law enforcement was struggling to keep pace with the sheer volume of exploits - are now being resolved with increasing speed. The tools have caught up. Chainalysis, Elliptic, and TRM Labs have developed capabilities that can trace funds through mixers, across bridges, and through layer-2 networks. The Tornado Cash sanctions of August 2022 established the legal framework for treating mixer usage as evidence of money laundering. And the cases themselves have matured - five years of blockchain history provides investigators with far more data points than were available in the immediate aftermath of the exploits.

The message to current and future DeFi exploiters is clear: the statute of limitations on federal computer fraud and money laundering charges extends well beyond the typical attention span of the crypto market. You may have gotten away with it in 2021. You may still be sitting on the proceeds in 2026. But the blockchain never forgets, and the FBI has gotten very, very good at reading it.

The Tornado Cash Problem: Privacy Tool or Criminal Infrastructure?

Digital privacy and encryption concept

Tornado Cash sits at the intersection of crypto's most contentious debate: privacy rights versus anti-money laundering enforcement. (Pexels)

Spalletta's alleged use of Tornado Cash adds another layer to the ongoing legal and philosophical battle over crypto mixers. The protocol, which was sanctioned by the U.S. Treasury's Office of Foreign Assets Control (OFAC) in August 2022, remains one of the most divisive technologies in cryptocurrency. Privacy advocates argue that financial privacy is a fundamental right and that Tornado Cash serves the same function as the privacy features built into traditional banking - shielding transaction details from public view. Law enforcement officials counter that the protocol's primary use case in practice has been laundering the proceeds of hacks, exploits, and ransomware attacks.

The numbers support both sides, depending on how you read them. According to data from Chainalysis, approximately 30% of the funds deposited into Tornado Cash before the sanctions came from known illicit sources - hacks, scams, and sanctioned entities. That means 70% of the funds came from users who may have been using the mixer for legitimate privacy purposes. But the 30% illicit share included some of the largest crypto thefts in history, including portions of the $620 million Ronin Bridge hack attributed to North Korea's Lazarus Group and the $100 million Horizon Bridge exploit.

The Uranium Finance case illustrates why the debate is so difficult to resolve. Spalletta's use of Tornado Cash was unambiguously criminal - he was laundering the proceeds of a $50 million theft. But the same protocol that enabled his laundering also enabled thousands of ordinary users to conduct private transactions without leaving their entire financial history exposed on a public blockchain. The sanctions, and the subsequent criminal prosecution of Tornado Cash developer Alexey Pertsev in the Netherlands, have had a chilling effect on the development of privacy tools across the entire crypto ecosystem.

The legal precedent established by the Pertsev case - which held that a developer can be held criminally liable for building a tool that facilitates money laundering, even if the tool also has legitimate uses - has reshaped the entire privacy coin and mixing sector. Privacy-focused projects like Zcash, which Grayscale recently argued is undervalued as a bet on financial privacy in an AI-driven surveillance world, operate under the shadow of potential future enforcement action. The question is no longer whether privacy tools can exist in crypto, but whether any privacy tool can survive the legal standard established by Tornado Cash.

Market Context: Bitcoin at $67,500 as Q1 Closes in Blood

Financial market chart showing decline

Bitcoin is closing out its worst Q1 since 2022, but it is holding up better than stocks in the face of the Iran crisis. (Pexels)

The Spalletta indictment drops at a moment of maximum tension in crypto markets. Bitcoin traded at $67,545 on Tuesday morning, roughly flat over 24 hours after recovering from a dip below $65,200 that briefly marked its lowest level since the U.S.-Iran conflict began in late February. Ether held above $2,000 at $2,062. The CoinDesk 20 index sat at 1,931.58. The total crypto market cap registered at $2.32 trillion, roughly unchanged over the past week but down sharply from the $3.4 trillion peak hit in late 2024.

The quarter-end picture is grim. Nearly half of all circulating Bitcoin is now trading at a loss, according to CoinDesk data, with the Bitcoin Impact Index surging to 57.4 - indicating high stress levels among holders. Long-term holders are selling at a loss for the first time since the 2022 bear market. Bitcoin's hashrate posted its first Q1 decline in six years as miners pivot their infrastructure toward AI workloads that currently offer higher and more predictable returns than block rewards.

But crypto's relative performance tells a different story than the absolute numbers suggest. The S&P 500 is on its longest daily losing streak since 2022. MSCI Asia Pacific is heading for its worst month since October 2008. WTI crude oil closed above $100 per barrel last week for the first time since 2002, squeezing both consumers and corporate margins. Gold - the traditional safe haven - has been falling during an active war, which JPMorgan noted Monday is historically anomalous.

Bitcoin, by contrast, has spent the entire Iran conflict trading between roughly $65,000 and $73,000, selling on every escalation but refusing to break structurally lower even as equities form a clear downtrend. Alex Kuptsikevich, chief market analyst at FxPro, noted that while the crypto market remains below its 50-day and 200-day moving averages, it is "finding support on dips to the lows seen since early February, demonstrating horizontal stabilization following the slump, while equities are forming a downtrend."

The quarter closes with a question that the Spalletta case inadvertently underscores: What is crypto actually worth if the DOJ can trace and seize stolen funds years after the fact, if privacy tools are being prosecuted out of existence, and if the market's largest holders are underwater? The optimistic answer is that enforcement legitimizes the space - that catching hackers and shutting down rogue exchanges makes crypto safer for institutional capital. The pessimistic answer is that every layer of regulatory compliance strips away the properties that made crypto valuable in the first place.

The DeFi Exploit Hall of Shame: Where Uranium Finance Ranks

Cybersecurity digital concept

DeFi exploits have cost users billions of dollars since 2020, but law enforcement is finally catching up. (Pexels)

The Uranium Finance hack was one of the largest DeFi exploits of 2021, but the DeFi exploit landscape has expanded dramatically since then. To put Spalletta's $50 million haul in context, consider the other major exploits from the same era and their current enforcement status:

Major DeFi Exploits - 2020-2022

ProtocolAmount StolenDateEnforcement Status
Ronin Bridge (Axie Infinity)$620MMarch 2022Attributed to DPRK Lazarus Group. Partial recovery via sanctions.
Poly Network$611MAugust 2021Funds returned by hacker. No prosecution.
Wormhole Bridge$320MFebruary 2022Jump Crypto covered losses. Ongoing investigation.
Beanstalk$182MApril 2022Flash loan governance attack. No arrests.
Wintermute$160MSeptember 2022Compromised private key. No arrests.
Horizon Bridge (Harmony)$100MJune 2022Attributed to DPRK Lazarus Group.
Uranium Finance$50MApril 2021Spalletta charged March 2026. $31M seized.
Cream Finance$130MOctober 2021Flash loan exploit. No arrests.

What stands out about the Uranium Finance case is that it resulted in a named defendant and a criminal prosecution. The vast majority of DeFi exploits from 2021-2022 remain unsolved, with either no arrests or attribution to state-sponsored hacking groups that operate beyond the reach of U.S. law enforcement. Spalletta's alleged decision to operate from U.S. soil, use centralized exchanges with KYC requirements, and purchase traceable physical collectibles made him an unusually accessible target for federal investigators.

The contrast with the Ronin Bridge and Horizon Bridge hacks - attributed to North Korea's Lazarus Group - is instructive. State-sponsored hackers operate through an infrastructure of front companies, compromised identities, and cooperative foreign jurisdictions that make individual prosecution effectively impossible. Spalletta, by contrast, was a single individual living in a Maryland suburb who reportedly boasted about his heist to an associate. The gap between nation-state operational security and solo hacker hubris is the gap between unsolvable and convicted.

What Happens Next: The Legal Road Ahead

Federal courthouse

The Southern District of New York has become the epicenter of crypto enforcement. (Pexels)

Spalletta faces one count of computer fraud under the Computer Fraud and Abuse Act (CFAA) and one count of money laundering. The CFAA count carries a maximum sentence of five years in prison; the money laundering count carries a maximum of 20 years. In practice, federal sentencing guidelines for financial crimes of this magnitude typically result in sentences in the range of 8 to 15 years, depending on cooperation, acceptance of responsibility, and the defendant's prior criminal history.

The $31 million seizure in February 2025 represents a significant portion of the exploit proceeds, but roughly $19 million remains unaccounted for. Some of that may be tied up in the physical collectibles - the Black Lotus, the Alpha packs, the Pokemon sets, and the Eid Mar coin. Federal asset forfeiture proceedings will likely target these items if they are still in Spalletta's possession. If they have been resold, prosecutors will need to trace the sale proceeds through additional financial channels.

The case also raises questions about victim restitution. Uranium Finance's users lost everything when the protocol collapsed after the hack. Unlike centralized exchange collapses - where bankruptcy proceedings can distribute remaining assets to creditors - DeFi protocol failures typically leave users with no legal recourse. The seized funds could potentially be distributed to verified victims through a court-supervised restitution process, but the anonymous, pseudonymous nature of DeFi makes identifying and verifying victims extremely difficult.

One legal analyst who spoke to BLACKWIRE on background noted that the Spalletta case may establish precedent for how DeFi exploit proceeds are handled in forfeiture proceedings. "The question is whether the government treats this like a bank robbery where the money goes back to the bank, or like a securities fraud where the SEC creates a claims process for affected investors," the analyst said. "There is no established framework for returning funds to anonymous liquidity providers on a defunct protocol."

Spalletta's decision to surrender voluntarily rather than fight extradition suggests that a plea deal may be under discussion. Defendants who surrender and cooperate typically receive more favorable sentencing outcomes than those who are arrested. If Spalletta provides information about the Uranium Finance development team - which operated anonymously and may have had advance knowledge of the vulnerability - the case could expand beyond a single defendant.

The Lesson That Never Sticks

Digital lock security concept

Five years from exploit to indictment. The blockchain remembers everything. (Pexels)

Every DeFi exploit produces the same round of commentary: audit your code, verify your contracts, don't trust anonymous teams, don't deposit more than you can afford to lose. And every cycle, the same mistakes repeat. The total value lost to DeFi exploits between 2020 and 2025 exceeds $8 billion, according to estimates from DefiLlama and Rekt News. The number of protocols that have been exploited exceeds 600. The percentage of stolen funds that has been recovered through law enforcement or voluntary return is less than 15%.

What is changing, slowly, is the enforcement timeline. In 2021, catching a DeFi hacker seemed almost impossible. Tornado Cash was operational, blockchain analytics were primitive by current standards, and federal prosecutors were still learning the difference between a smart contract and a regular contract. By 2026, the toolkit has matured. The Spalletta case shows that a five-year investigation timeline is entirely possible - and that the spending patterns of criminals in the physical world remain just as traceable as their on-chain transactions.

The irony of the Uranium Finance case is that Spalletta allegedly dismissed his own crime as trivial. "Crypto is all fake internet money anyway," he reportedly wrote. But the federal government does not consider $50 million in stolen digital assets to be fake. The prison sentence that accompanies a money laundering conviction is not fake. And the Black Lotus card that Spalletta purchased for half a million dollars - if seized and auctioned by the U.S. Marshals Service - will almost certainly sell for real, spendable U.S. dollars.

Some things you cannot mix your way out of.

Timeline: Uranium Finance - From Exploit to Indictment

April 8, 2021Spalletta allegedly exploits Uranium Finance rewards mechanism, drains $1.4M. Negotiates "sham bug bounty," keeps ~$386K.
April 28, 2021Second exploit drains ~$50M from multiple Uranium liquidity pools. Attack comes 2 hours before scheduled v2.1 fix. Uranium Finance shuts down permanently.
2021-2023Spalletta allegedly launders proceeds through Tornado Cash, deposits into centralized exchanges, purchases rare collectibles including Black Lotus, Pokemon sets, Alpha packs, and Eid Mar coin.
August 2022U.S. Treasury sanctions Tornado Cash, establishing legal framework for mixer-related prosecutions.
December 2023Blockchain investigator ZachXBT publicly identifies Magic: The Gathering card purchases connected to Uranium Finance funds.
February 2025SDNY and HSI San Diego seize approximately $31 million in crypto tied to the Uranium Finance exploit - first major recovery.
March 31, 2026Indictment unsealed. Jonathan Spalletta, 36, of Rockville, MD, surrenders in Manhattan. Charged with computer fraud and money laundering.

Get BLACKWIRE reports first.

Breaking news, investigations, and analysis - straight to your phone.

Join @blackwirenews on Telegram