The Federal Bureau of Investigation (FBI) released information on Friday detailing how it allegedly discovered Silk Road and linked Ross Ulbricht to the illicit website.
The 58-page filing, submitted to the US District Southern Court of New York, offers a lengthy rebuttal to recent assertions by Ulbricht. He claimed the methods used by federal officers during the investigation of Silk Road were unlawful and that, as such, the information recovered through this process should not be admissible in court.
Penned by FBI agent Christopher Tarbell, the document offered a four-point critique of the motion Ulbricht and his defense team first filed in August, though the overall tone was crafted as to suggest that the FBI is dismissive of any claims levelled against its work by Ulbricht.
Tarbell wrote:
â[Ulbrichtâs] various claims are bereft of any support in the law. [â¦] Instead, they amount to a pointless fishing expedition aimed at vindicating his misguided conjecture about the NSA being the shadowy hand behind the governmentâs investigation.â
The filing goes on to suggest how the government was able to identify servers used to operate the Silk Road website, along with the various steps that federal officials took to connect this information to âDread Pirate Robertsâ, the alias allegedly used by Ulbricht to operate the website. It also argues all Ulbrichtâs claims that illegal evidence was used in the case should be dismissed.
Notably, the filing has not been without its critics, who allege inconsistencies with the governmentâs official version of the events.
Central to the FBIâs rebuttal was that agents noticed that the serverâs Internet protocol (IP) address was âleakingâ information from the Silk Road website due to an âapparent misconfiguration of the user login interface by the site administratorâ.
Exploiting this error, the FBI says, it was able to reveal certain IP addresses that were not protected by the Tor network, and could thus trace the addresses to physical locations.
Contrary to Ulbrichtâs claims, the US government argues it:
The FBI further addressed the role of Icelandic law enforcement officials in the investigation, who Ulbricht and his legal team have alleged were used strategically to bypass the Fourth Amendment protections Ulbricht is afforded as a US citizen.
Offering a rebuttal of this stance, the filing argues that US authorities approached their peers in Iceland because the Silk Road server was located in this jurisdiction.
However, the FBI also indicated that any search by Icelandic law enforcement officials would not involve Fourth Amendment requirements, as this right does not apply outside the US.
âIt is well established that the Fourth Amendmentâs warrant requirement does not apply overseas â even to searches conducted directly by US law enforcement agents of property belonging to a US citizen,â the filing reads.
The FBI went on to reject the notion that it used a surveillance technique known as a pen register to track Ulbrichtâs location. Rather, the filing suggests such tools were used to monitor Ulbrichtâs Internet activity, and that these logs were compared to records of the Dread Pirate Robertsâ online activity to identify Ulbricht as the siteâs operator.
Still, the government moved broadly to reject the idea that Ulbricht had a right to privacy in this case at all given the need for law enforcement officials to take action against Silk Road.
The report stated:
âIn any event, whatever expectation of privacy Ulbricht did have in the SR server, it was plainly outweighed by the governmentâs legitimate need to search its contents. The government had ample evidence, easily enough to establish probable cause, that the SR server was hosting the Silk Road website.â
The filing added: âUnder the circumstances, searching the server was more than reasonable. It was a law enforcement imperative that would have been a gross dereliction of duty for the government not to pursue.â
Ross Ulbrichtâs defense was also handed another potential blow in the prosecutionâs insistence that the murder-for-hire allegations are relevant to the case.
The filing suggests the allegations provide valuable context for Ulbrichtâs state of mind at the time he was allegedly operating Silk Road, and as such, should be admissible in court.
Tarbell wrote:
âThe use of violence and threatened violence to protect oneâs drug empire are relevant to proving the intentional operation of a narcotics conspiracy, and such conduct may be alleged as overt acts in furtherance of such a charge.â
Notably, Ulbricht was not indicted on murder-for-hire charges in New York, though one such charge was filed in a Maryland court.
Despite the strong and persuasive language evoked by the FBI, critics of the filing and the plausibility of the governmentâs version of events have emerged.
For example, Australian blogger and hacker Nik Cubrilovic first detailed his criticism of the filing on 7th September, noting a series of issues with the reasoning listed in the report.
Cubrilovic alleged that while Tor configurations can leak information, the FBI cited an incorrect page in an attempt to bolster this claim. Further, he asserts the process detailed by the FBI is vague, adding that anybody with knowledge of Tor and hidden services would not be able to read or replicate the process FBI agents said they completed.
Speaking to Wired, privacy researcher Runa Sandvik suggested the details regarding how the FBI allegedly exploited a Silk Road CAPTCHA page to establish the location of the Silk Road server were problematic.
Sandvik indicated she believes the CAPTCHA was hosted on the same server as Silk Road, meaning it would have been only accessible through the Tor network. Such a finding by the FBI, Sandvik reasons, would represent a flaw with Tor and not Silk Roadâs site architecture.
Cubrilovic came to a similar conclusion in his blog post, speculating that operators of the site would have likely noticed such an error. He told Wired:
âThe way theyâre trying to make a jury or a judge believe it happened just doesnât make sense technically.â
The development marks the latest update in the ongoing prosecution of Ross Ulbricht. The trial is set to begin this November.
At press time, Ulbrichtâs attorney Joshua Dratel told CoinDesk that they were still evaluating the newest case filing, and that a formal response would be forthcoming.
FBI image and server image via Shutterstock