- Twitch-famous bounty hunter kicks down target’s door in wildly popular live stream 5 Years Ago
- New GOP bill would audit major tech companies for bias 5 Years Ago
- Instagram artist accused of faking her paintings says they’re ‘100%’ real 5 Years Ago
- Trump refuses to apologize for Central Park Five death penalty ads Today 11:08 AM
- While Rubio smiles at Trump’s campaign rally, the internet drags him Today 11:04 AM
- Dr Disrespect is still banned from Twitch. When will he be back? Today 10:36 AM
- ‘Avengers: Endgame’ is returning to theaters with new material Today 10:18 AM
- House fails to pass amendment curbing government surveillance Today 10:12 AM
- What happened when Ed Krassenstein crashed the Chapo Trap House subreddit Today 9:21 AM
- Andrew Yang comes out as pro-Bird Scooters Today 8:59 AM
- Netflix claims Adam Sandler’s ‘Murder Mystery’ broke viewing records Today 8:09 AM
- How to watch ‘Yellowstone’ online for free Today 8:00 AM
- How online allies joined a trans artist’s street art war Today 7:30 AM
- These edited videos show the dark side of your favorite cartoons Today 7:00 AM
- Coca-Cola now exists in ‘Star Wars’ canon Today 6:44 AM
Ross Ulbricht’s lawyer says FBI’s hack of Silk Road was ‘criminal’
“The government posits two standards of behavior: one for private citizens, and the other for the government.”
Ross Ulbricht, charged for operating the Silk Road black market, doesn’t have to wait the full 33 days until the start of his courtroom trial for the prosecution and defense teams to start trading blows.
Ulbricht’s lawyers recently charged the Federal Bureau of Investigation (FBI) with illegally hacking into the Silk Road servers and sidestepping due process. Then, on Tuesday, the prosecution called the theory factually wrong—they claim that Ulbricht misconfigured Silk Road and it gave up its location to anyone who asked correctly—but then they added a twist: Even if they did hack Silk Road, they assert, it would be perfectly legal because the website was “blatantly criminal” and the server was foreign, so constitutional Fourth Amendment protections didn’t apply.
“The government’s position appears to be that it can engage in criminal conduct with impunity in its pursuit of investigative objectives, and not be held accountable therefor,” Joshua Dratel, Ulbricht’s lawyer, shot back in a brief filed Tuesday night.
Ulbricht’s lawyers have compared the government’s alleged hacking of Silk Road servers to the actions of Andrew “Weev” Auernheimer, who found a bug in iPads that identified over 100,000 AT&T subscribers—anyone could type in a URL and find them. In 2012, Weev was convicted under the Computer Fraud and Abuse Act (CFAA), and spent 15 months in prison before having his case overturned.
The government dismissed the similarities, saying Weev impersonated AT&T users to gain private data.
Dratel, who argues police did almost exactly the same thing without proper authority, doesn’t buy the prosecution’s argument:
“The government posits two standards of behavior: one for private citizens, who must adhere to a strict standard of conduct construed by the government, and the other for the government, which, with its elastic ability to effect electronic intrusion, can deliberately, cavalierly, and unrepentantly transgress those same standards. Yet neither law nor the Constitution permits rank government lawlessness without consequences.”
Dratel further criticized prosecutors, saying they essentially ignored the accusations of hacking that have come not just from Ulbricht’s defense lawyers but also a wide range of security experts from around the world. Dratel even took a shot at the prosecution’s apparent lack of tech-savvy: The government’s Monday filing confuses PHP, a programming language, and MySQL, a database management system.
Prosecutors, quickly waving off charges of hacking, asserted that Ulbricht had no expectation of privacy for several reasons: First, Ulbricht violated his Icelandic host’s terms of service, so they had no obligation to protect his data. Moreover, he’s never claimed the Silk Road servers belong to him, so federal officials argue that he can’t say a search violated his privacy.
Critics have responded that even if Ulbricht was merely a Silk Road user, he has expectations of privacy.
Dratel continues to argue that evidence seized as a result of illegal searches must be excluded from the trial.
“The exclusionary rule was designed to address that very dangerous, and legally and constitutionally insupportable, attitude,” he wrote. “For example, as the Supreme Court acknowledged in Herring v. United States … ‘the exclusionary rule serves to deter deliberate, reckless, or grossly negligent conduct, or in some circumstances recurring or systemic negligence.’”
The trial of Ross Ulbricht begins on Nov. 10.
Photo by Brian Turner/Flickr (CC BY 2.0)
Patrick Howell O'Neill is a notable cybersecurity reporter whose work has focused on the dark net, national security, and law enforcement. A former senior writer at the Daily Dot, O'Neill joined CyberScoop in October 2016. I am a cybersecurity journalist at CyberScoop. I cover the security industry, national security and law enforcement.