Ulbricht Seeks Pre-Trial Hearing to Challenge FBI Claims

The defence for alleged Silk Road mastermind Ross Ulbricht has filed a further court motion to dismiss evidence.

AccessTimeIconOct 2, 2014 at 4:10 p.m. UTC
Updated Mar 2, 2023 at 8:51 p.m. UTC

Presented By Icon

Election 2024 coverage presented by

Stand with crypto

UPDATE (3rd October 10:34 BST): According to a new document uncovered by TechCrunch, expert witness and open-source software lawyer Joshua J Horowitz has disputed the FBI's account of how it located a back-end server belonging to Ross Ulbricht.


  • Bitcoin Mining in the U.S. Will Become 'a Lot More Decentralized': Core Scientific CEO
    13:18
    Bitcoin Mining in the U.S. Will Become 'a Lot More Decentralized': Core Scientific CEO
  • Binance to Discontinue Its Nigerian Naira Services After Government Scrutiny
    05:10
    Binance to Discontinue Its Nigerian Naira Services After Government Scrutiny
  • The first video of the year 2024
    04:07
    The first video of the year 2024
  • The last regression video of the year 3.67.0
    40:07
    The last regression video of the year 3.67.0
  • The defence of alleged Silk Road mastermind Ross Ulbricht has filed a motion asking the court to dismiss evidence and strike parts of the indictment against him.

    Ulbricht's team argues that the government’s claim of how it gained access to some digital evidence raises questions and requires an evidentiary hearing, at which time it hopes to have the case dismissed. Additionally, the latest filing rejects an FBI explanation for its investigation as implausible, vague and lacking forensic evidence.

    The reply memorandum of law was filed on 1st October and raises many of the same questions as the original memorandum filed on 1st August. That document asserted that the same Fourth Amendment protections could be applied in order to dismiss a significant volume of evidence collected in the seizure of Silk Road web servers.

    Specifically, the defence argues that the 'fruit of the poisonous tree’ doctrine could be used to dismiss a chain of supposedly tainted evidence collected by investigators.

    The defence further claims that some electronically stored information (ESI) was collected without a warrant and therefore all evidence collected using said information was inadmissible under the doctrine.

    Government criticised

    The new filing criticises the government for its failure to address a number of issues raised in the August motion.

    In the document, Ulbricht’s defence counsel Joshua Dratel states:

    “Indeed, the government’s response is remarkable for what it fails to confront at all: an entire current class of Supreme Court opinions that have adapted and updated Fourth Amendment jurisprudence to accommodate the essential privacy imperatives of the digital age.”

    Dratel lists a number of precedents that were not cited or addressed by the court, commenting that the court assists the government in defending unconstitutional searches by “pretending that those cases do not exist, and that it is still 1979”.

    Dratel argues that opinions in Riley vs California and US vs Jones recognise that privacy interests in electronically stored information are covered by the Fourth Amendment.

    “The government’s inability even to discuss those cases, and their Fourth Amendment implications, simply demonstrates the bankruptcy of its arguments in opposition,” Dratel argues.

    Servers still an issue

    The defence also addressed the legality of FBI’s investigation. The crux of the ‘poisonous tree’ argument is the assertion that the FBI used illegal means to identify and locate Silk Road servers in Iceland. If the defence can prove that the FBI bent the rules and located the servers using such means, all the evidence collected from them would be rendered inadmissible.

    However, the FBI responded to the allegations with a 58-page filing submitted earlier this month. In the document FBI agent Christopher Tarbell offered an account of how the servers were located, dismissing allegations of illegal activities or NSA involvement.

    The new defence filing criticises the government for attempting to create a "straw man" by contending that it was not necessary to explain how the servers were located in order to establish probable cause. It goes on to argue that Tarbell failed to maintain “any record of his purported means of access” to the Silk Road servers.

    The filing states:

    “Indeed, by not preserving what he claims he did – and preservation would have been a simple, automated task  – he violated the most rudimentary protocols of any forensic investigation, much less one involving digital data and communications.”

    Dratel also takes issue with the timeline of the FBI’s requests to the Icelandic authorities, stating that the decision to re-image server contents in July 2013 in order to preserve evidence clearly points to a planned, orchestrated, and directed action implemented for the benefit of US law enforcement.

    Disclosure

    Please note that our privacy policy, terms of use, cookies, and do not sell my personal information have been updated.

    CoinDesk is an award-winning media outlet that covers the cryptocurrency industry. Its journalists abide by a strict set of editorial policies. CoinDesk has adopted a set of principles aimed at ensuring the integrity, editorial independence and freedom from bias of its publications. CoinDesk is part of the Bullish group, which owns and invests in digital asset businesses and digital assets. CoinDesk employees, including journalists, may receive Bullish group equity-based compensation. Bullish was incubated by technology investor Block.one.


    Learn more about Consensus 2024, CoinDesk's longest-running and most influential event that brings together all sides of crypto, blockchain and Web3. Head to consensus.coindesk.com to register and buy your pass now.