Silk Road Judge Won't Examine FBI's Warrantless Server Hacking; Dismisses Suppression Motion On 'Privacy Interest' Technicality
from the there-are-two-ways-you-can-read-the-phrase-'criminal-investigation' dept
Judge Katherine Forrest has shot down Ross Ulbricht's defense team's motion to suppress evidence it claims was acquired illegally by the FBI. The FBI asserted in its response to the motion that Ulbricht had expressed no privacy interest in the alleged Silk Road servers located in Iceland. The FBI further claimed that it needed no legal permission (i.e., a warrant) to hack foreign servers during criminal investigations.Those hoping to hear an argument on the legal merits of the FBI's claims will just have to keep hoping. As was noted earlier, the DOJ's response put Ulbricht in an unenviable position: either claim the disputed servers as your own or kiss any hopes of suppressing evidence under Fourth Amendment claims goodbye. From Judge Forrest's ruling [pdf link]:
Defendant has, however, brought what he must certainly understand is a fatally deficient motion to suppress. He has failed to take the one step he needed to take to allow the Court to consider his substantive claims regarding the investigation: he has failed to submit anything establishing that he has a personal privacy interest in the Icelandic server or any of the other items imaged and/or searched and/or seized. Without this, he is in no different position than any third party would be vis-a-vis those items, and vis-a-vis the investigation that led U.S. law enforcement officers to Iceland in the first place.To make this claim and secure the attendant privacy protections (or at least attempt to), Ulbricht would have needed to demonstrate to the court his interest in the Icelandic servers. Doing so would possibly result in him incriminating himself, which would rub up against the Fifth Amendment. Unfortunately, in all the paperwork filed disputing the FBI's evidence and its questionable origins, the possible Fifth Amendment concerns were never raised. Judge Forrest points out one possible remedy, albeit one that seems to have passed its expiration date.
[D]efendant could have established such a personal privacy interest by submitting a sworn statement that could not be offered against him at trial as evidence of his guilt (though it could be used to impeach him should he take the witness stand). Yet he has chosen not to do so.Further down in the ruling, Judge Forrest notes that the court will not be spending any more time trying to discern whether the FBI's hacking of the alleged Silk Road servers falls within the bounds of legality. Again, this decision traces directly back to Ulbricht's privacy interests in the servers themselves.
In short, despite defendant's assertions and the potential issues he and his counsel raise regarding the investigation that led to the Icelandic server, he has not provided the Court with the minimal legal basis necessary to pursue these assertions. Thus, the declaration submitted by Joshua J. Horowitz, Esq. (ECF No. 70) along with all the arguments regarding the investigation and the warrants based on it are not properly before this Court.
Here, the Court does not know whether Ulbricht made a tactical choice because he is-as they say-between a rock and a hard place, or because he truly has no personal privacy interest in the servers at issue. It is clear, however, that this Court may not proceed with a Fourth Amendment analysis in the absence of the requisite interest. If a third party leased a server on which the Government unlawfully intruded in the investigation that led to the Icelandic server, under Katz, Rakas, Payner, and a host of other case law, that is no basis for an assertion by Ulbricht that his Fourth Amendment rights were violated. Thus, whatever methods used-lawful or unlawful-are beyond this Court's purview.So, whatever the methods were -- whether it was parallel construction used to cover up NSA involvement or the FBI declaring itself above the law when operating outside the US -- the government is free to use them again and again until faced with a better legal challenge.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: 4th amendment, doj, privacy, ross ulbricht, silk road, standing
Companies: silk road
Reader Comments
Subscribe: RSS
View by: Time | Thread
[ link to this | view in thread ]
[ link to this | view in thread ]
Why are people just accepting this blatant criminality from their government exactly?
[ link to this | view in thread ]
One can only make a claim that one's own rights were violated. I can not make a claim for YOUR rights on you're behalf. The exception occasionally being "Automatic Standing" where the crime charged is a crime of possession.
He could have claimed to be the owner, and therefore his rights were the one's being violated.
However, an interesting tact may be that if the Jury finds that the servers WERE his, if that is an element of the crime, he may then have a valid suit against the government, and he could still deny being the owner.
[ link to this | view in thread ]
[ link to this | view in thread ]
go watch the propoganda on usa 60 minutes
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Precedent
Feel free to cite these facts this in your replies to our gov't, if ever an agency of your gov't is caught hacking private servers in the U.S. Better yet, if you plan to hack servers in the U.S., just publish this precedent as your pre-existing get-out-of-jail-free card, so that we don't waste our tax-dollars with official complaints.
Ain't karma grand?!
[ link to this | view in thread ]
Re:
I own a home. The police break into my home, without a warrant and search my computer. On my computer they find evidence of a crime against you.
Since it is my home, only I can assert a violation of my rights. If I choose not to assert those rights, then why should YOU be able to tell the police that they were not allowed to do a warrantless search of MY home. Your argument would be a much of a violation against MY rights to determine who I allow entry into my home, even if my consent is after the fact, and by silence.
The fact that you allowed evidence against you to be stored in my home opened you up to the possibility that the police could get to it through my home, rather than yours.
Basically, once he chose to store the evidence against him in a server owned by someone else, he gave up the exclusive ownership and control of it, which is required to assert a 4th amendment right.
[ link to this | view in thread ]
Interest
She seems to be saying that's not necessary, I sort of thought that this was especially true for evidence that comes from possibly illegal sources(and here I am in law and order level understanding), but for instance the testimony of a burglar that says they saw a body in your living room.
[ link to this | view in thread ]
Re: Re:
It's more like, you ship a package containing evidence of a crime from your home state, the cops somehow catch wind of it, wait til the truck with that package is in another state, break into the truck and take the package without a warrant or order to do so. Then, turn around and assert to the court that the package is evidence you committed a crime, but you can't suppress the evidence because it wasn't in your possession when they took it and they took it legally because it was in another state where that kind of thing is allowed.
But, as said up-thread, that argument side-steps a fundamental flaw in the government's and court's reasoning. The fact that the government is using information from the Icelandic servers as evidence creates a privacy interest in the evidence.
The whole jurisdiction thing is a red herring. The accusation asserts a crime committed on American soil by an American. American rules for trying the gentleman must, of necessity, apply for the trial.
[ link to this | view in thread ]
Re: Re: Re:
That was the difficulty they created for him: Either claim the servers as his and try to suppress the evidence or deny they are his and loosing standing to claim 4th Amendment violation. He tried to have his cake and eat it too and lost.
[ link to this | view in thread ]
Re: Re: Re:
I guess I am confused because not only does she seem to be saying that this is not true but that the whole idea that evidence must be credited and explained in someway is also not correct unless you claim it somehow, as in the State can use this gun as evidence against you without backing up why they believe it's your gun or providing evidence of that and you cannot contest that unless you claim that it IS your gun.
I no law speaking man but this just seems like it throws that idea of establishing the credibility of evidence out the window.
[ link to this | view in thread ]
Re: Re: Re: Re:
So my friend can rightfully claim a 4th Amendment violation for his arrest, but I can't make the same claim for myself because I wasn't the one illegally searched, even though evidence from that illegal search is being used aginst me?
And if my now-ex-friend decides to cooperate with police, plea bargains, and testifies against me at my trial, I can't complain that the search of his house was illegal because only he can make that claim (but he's not, as part of his plea-deal).
Is that the way the system works? If so, then it gives the police a shockingly effective loophole for making illegal warrantless searches without technically violating the 4th-Amendment.
[ link to this | view in thread ]
Conflicts between judicial interpretation and obvious moral interpretation
The statements from the judge in this case take a very different interpretation, but also seem surprisingly balanced for what they try to claim. I interpret that to mean that the judge may not agree with the ruling, but existing law and precedent obligate the judge to rule in this way. If so, while I disagree with the judge's conclusion, I can respect that the solution lies not in challenging the judge's conclusion, but in challenging the underlying law that led to it.
[ link to this | view in thread ]
Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: Re: Re: the Catch-22
[ link to this | view in thread ]
Makes No Sense
This flies in the face of common sense and the purpose of the 4th amendment.
[ link to this | view in thread ]
Not Exactly
Heck, why don't the FBI just collude with the SEC, the FCC, OSHA, FDIC, and a host of other regulatory agencies to put the screws to any company that fails to make their records an open book to law enforcement?
you don't have to give personal and private data or physical evidence to a third part for them to have (possibly) incriminating evidence on you.
[ link to this | view in thread ]
Re: Makes No Sense
[ link to this | view in thread ]
Ulbricht's lawyer is an idiot...
The theory being that such a declaration would constrain Ulbricht's legal strategy.. If Ulbricht did provide such a declaration, only if he testified that the server wasn't his would the prosecution be able to say "uh, you said this server was yours".
But, idiot laywer forgot that the bell has already been rung: Ulbricht submitted a similar declaration (under effectively the same terms), in the civil forfeiture over the 180k odd bitcoins siezed from his laptop. If Ulbricht is so foolish as to get on the stand, the prosecution will go "So, how did you get those millions of dollars worth of Bitcoins on your computer"?
If Ulbrich replies with anything other than "Uh, you got me", the prosecution then has a rebuttal expert show how those Bitcoins were derived from Silk Road, by tracing all the 100s of law enfocement and other test purchases and showing how the premium flowed into DPR's booty-chest.
Overall, it feels like Ulbricht's lawyer has a bad hand, but is grandstanding to the tech press and crowd who wants to see Ulbricht as some sort of hero, with talk of general warrants and suchlike. But the only realistic hope Ulbricht had was to suppress the evidence collected from the Silk Road server: as long as the server stands (and it now does), the good ship Revenge is well and truly sunk.
If Ulbricht's lawyer is wise, he'll get his client to plead out with something that will see Ulbricht released in 10 years, because the feds are throwing the book at him with mandatory minimums, and haven't even started yet with the murder-for-hire charges.
[ link to this | view in thread ]
Yet when the Chinese government does the same thing to American servers. The DOJ issues indictments against them.
American exceptionalism and double standards, indeed.
[ link to this | view in thread ]
Re: Not Exactly
why not indeed...
i'm certain The They (tm) *have* been doing this and more when we look at how many korporations have been talked into merely handing over 'stuff' whenever the alphabet soup spooks ask...
sure, i bet more than a few are conditioned to respond to those requests without batting an eyelash; but we know the ones who have not, HAVE BEEN subject to various 'threats' by the gummint goons...
an IRS audit here, an OSHA fine there, and before you know it, your bidness is in deep doo doo...
so, stand on law (?) and principle and have a good possibility of your bidness being ruined or crippled; or turn over some stupid data for some poor schmuck you don't know ?
you know which one they will choose 99% of the time...
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]