United States v. Ulbricht

Decision Date31 May 2017
Docket NumberAugust Term, 2016,Docket No. 15-1815
Citation858 F.3d 71
Parties UNITED STATES of America, Appellee, v. Ross William ULBRICHT, a/k/a Dread Pirate Roberts, a/k/a Silk Road, a/k/a Sealed Defendant 1, a/k/a DPR, Defendant-Appellant.
CourtU.S. Court of Appeals — Second Circuit

858 F.3d 71

UNITED STATES of America, Appellee,
v.
Ross William ULBRICHT, a/k/a Dread Pirate Roberts, a/k/a Silk Road, a/k/a Sealed Defendant 1, a/k/a DPR, Defendant-Appellant.

Docket No. 15-1815
August Term, 2016

United States Court of Appeals, Second Circuit.

Argued: October 6, 2016
Decided: May 31, 2017


858 F.3d 82

Joshua L. Dratel , Joshua L. Dratel, P.C., New York, NY, for defendant-appellant Ross William Ulbricht.

Eun Young Choi , Assistant United States Attorney (Michael D. Neff, Timothy T. Howard, Adam S. Hickey, Assistant United States Attorneys, on the brief), for Preet Bharara, United States Attorney for the Southern District of New York, New York, NY.

Tamar Todd, Jolene Forman, Drug Policy Alliance, Oakland, CA, for amici curiae Drug Policy Alliance, Law Enforcement Against Prohibition, JustLeadershipUSA, and Nancy Gertner.

Joel B. Rudin, Law Offices of Joel B. Rudin, P.C., New York, NY; Steven R. Morrison, University of North Dakota School of Law, Grand Forks, ND, for amicus curiae National Association of Criminal Defense Lawyers.

Before: Newman, Lynch, and Droney, Circuit Judges.

Gerard E. Lynch, Circuit Judge:

Defendant Ross William Ulbricht appeals from a judgment of conviction and sentence to life imprisonment entered in the United States District Court for the Southern District of New York (Katherine B. Forrest, J. ). A jury convicted Ulbricht of drug trafficking and other crimes associated with his creation and operation of Silk Road, an online marketplace whose users primarily purchased and sold illegal goods and services. He challenges several aspects of his conviction and sentence, arguing that (1) the district court erred in denying his motion to suppress evidence assertedly obtained in violation of the Fourth Amendment; (2) the district court committed numerous errors that deprived him of his right to a fair trial, and incorrectly denied his motion for a new trial; and (3) his life sentence is both procedurally and substantively unreasonable. Because we identify no reversible error, we AFFIRM Ulbricht's conviction and sentence in all respects.

BACKGROUND

In February 2015, a jury convicted Ross William Ulbricht on seven counts arising from his creation and operation of Silk Road under the username Dread Pirate Roberts ("DPR").1 Silk Road was a massive, anonymous criminal marketplace that operated using the Tor Network, which renders Internet traffic through the Tor browser extremely difficult to trace.2 Silk Road users principally bought and sold drugs, false identification documents, and computer hacking software. Transactions on Silk Road exclusively used Bitcoins, an

858 F.3d 83

anonymous but traceable digital currency.3 The site also contained a private message system, which allowed users to send messages to each other (similar to communicating via email), a public forum to discuss topics related to Silk Road, and a "wiki," which is like an encyclopedia that users could access to receive advice about using the site. Silk Road customers and vendors could also access a support section of the website to seek help from the marketplace's administrators when an issue arose.

According to the government, between 2011 and 2013, thousands of vendors used Silk Road to sell approximately $183 million worth of illegal drugs, as well as other goods and services. Ulbricht, acting as DPR, earned millions of dollars in profits from the commissions collected by Silk Road on purchases. In October 2013, the government arrested Ulbricht, seized the Silk Road servers, and shut down the site.

I. Silk Road Investigation

After Ulbricht created Silk Road in 2011, the site attracted the interest of at least two separate divisions of the Department of Justice:4 the United States Attorney's Offices for the District of Maryland and for the Southern District of New York. Throughout the investigations, law enforcement agents knew that the person using Dread Pirate Roberts as his or her Silk Road username had created and managed the site, but they did not know DPR's actual identity. In 2012 and 2013, agents from both offices investigated several individuals who the government suspected were operating Silk Road as DPR. Those individuals included Ulbricht, Anand Athavale, and Mark Karpeles. Ultimately, the New York office identified Ulbricht as DPR, but the Maryland office had investigated and later abandoned the theory that either Athavale or Karpeles might have been Dread Pirate Roberts.

Two aspects of the pre-arrest investigation into Ulbricht are particularly relevant to this appeal: (1) the pen/trap orders that the government obtained to monitor Internet Protocol ("IP") address traffic to and from various devices associated with Ulbricht; and (2) the corrupt behavior of two Baltimore agents who worked on the Silk Road investigation.

A. The Pen/Trap Orders

In September 2013, after Ulbricht became a primary suspect in the DPR investigation, the government obtained five "pen/trap" orders. See 18 U.S.C. §§ 3121 -27 ("Pen/Trap Act"). The orders authorized law enforcement agents to collect IP address data for Internet traffic to and from Ulbricht's home wireless router and other devices that regularly connected to Ulbricht's home router. According to the government's applications for the pen register and trap and trace device, "[e]very device on the Internet is identified by a

858 F.3d 84

unique number" called an IP address. S.A. 73.5 "This number is used to route information between devices, for example, between two computers." Id. at 73-74. In other words, an "IP address is analogous to a telephone number" because "it indicates the online identity of the communicating device without revealing the communication's content." Id. at 74. Ulbricht does not dispute that description of how IP addresses function.

The pen/trap orders thus did not permit the government to access the content of Ulbricht's communications, nor did the government "seek to obtain[ ] the contents of any communications." Id. at 75. According to Ulbricht, the government's use of his home Internet routing data violated the Fourth Amendment because it helped the government match Ulbricht's online activity with DPR's use of Silk Road. Ulbricht argues that he has a constitutional privacy interest in IP address traffic to and from his home and that the government obtained the pen/trap orders without a warrant, which would have required probable cause.

B. Corrupt Agents Force and Bridges

One of the many other tactics that the government used to expose DPR's identity was to find low-level Silk Road administrators who helped DPR maintain the site, obtain their cooperation, take over their Silk Road usernames, and chat with DPR under those identities. The true owners of the administrator accounts would assist in the investigation by helping the government chat with DPR and access various aspects of the site. Government agents would also create their own new usernames and pose as drug dealers or buyers to purchase or sell narcotics and occasionally contact DPR directly. One of the government's principal trial witnesses, Special Agent Jared Der-Yeghiayan, used the former technique to chat with DPR under the name Cirrus. Cirrus had been a member of the Silk Road support staff before the government took over his account, and Der-Yeghiayan frequently used Silk Road's messaging system to communicate with DPR and other administrators as Cirrus. Cirrus also gave the government access to the staff chat, a separate program allowing DPR to communicate only with his employees.

Two undercover agents involved in the Silk Road investigation are of particular import to this appeal: Secret Service Special Agent Shaun Bridges and Drug Enforcement Administration ("DEA") Special Agent Carl Force, both of whom were assigned to the Baltimore investigation. Both Force and Bridges used their undercover access to exploit the site for their own benefit in various ways, and they eventually pleaded guilty to criminal charges in connection with their work on the Silk Road investigation.6

For example, Force and Bridges took over an administrator account belonging to Curtis Green, who worked for Silk Road under the name Flush. According to the criminal complaint against Force and Bridges, in January 2013, Bridges used the Flush username to change other users' passwords, empty their Bitcoin wallets,7

858 F.3d 85

and keep $350,000 in Bitcoins in offshore bank accounts, all while attempting to hide his activity through a series of transactions.8 Specifically, the complaint against Force and Bridges alleges that Bridges "act[ed] as an administrator to reset pins and passwords on various Silk Road vendors' accounts," then exchanged the Bitcoins for U.S. dollars using the Mt. Gox exchanger.9 Supp. App'x 180. Shortly after he committed the January 2013 thefts, Bridges asked Force to chat with DPR as Nob, Force's authorized undercover username, to get advice about how to liquidate Bitcoins. He also sought Force's help in convincing Curtis Green (formerly Flush) to help him transfer...

To continue reading

Request your trial
204 cases
  • United States v. Manafort
    • United States
    • U.S. District Court — Eastern District of Virginia
    • July 10, 2018
    ...the Fourth Amendment's requirements to encompass two related but distinct concepts: particularity and breadth. United States v. Ulbricht , 858 F.3d 71, 102 (2d Cir. 2017) ; United States v. Hill , 459 F.3d 966, 973 (9th Cir. 2006). With respect to particularity, the Fourth Circuit has made ......
  • Commonwealth v. Henley
    • United States
    • United States State Supreme Judicial Court of Massachusetts Supreme Court
    • August 5, 2021
    ...phone evidence might be located, or in what format, but specifically identified the type of evidence sought. See United States v. Ulbricht, 858 F.3d 71, 102 (2d Cir. 2017), cert. denied, ––– U.S. ––––, 138 S. Ct. 2708, 201 L.Ed.2d 1099 (2018) ("A warrant may be broad, in that it authorizes ......
  • United States v. Ray
    • United States
    • U.S. District Court — Southern District of New York
    • May 26, 2021
    ...the places to be searched"; and (3) "specify the items to be seized by their relation to the designated crimes." United States v. Ulbricht , 858 F.3d 71, 99 (2d Cir. 2017) (quoting United States v. Galpin , 720 F.3d 436, 445 (2d Cir. 2013) ). The key is that the search warrant must enable t......
  • United States v. Harmon
    • United States
    • U.S. District Court — District of Columbia
    • July 24, 2020
    ...see Def.’s Mem. at 1–2. Indeed, defendant's own cited authorities repeatedly describe bitcoin as a "currency," United States v. Ulbricht , 858 F.3d 71, 83 n.3 (2d Cir. 2017), "a virtual, sovereign-free currency," Brown , 857 F.3d at 337, and "an alternative currency," Costanzo , 956 F.3d at......
  • Request a trial to view additional results
7 books & journal articles
  • SOCIAL NORMS IN FOURTH AMENDMENT LAW.
    • United States
    • Michigan Law Review Vol. 120 No. 2, November 2021
    • November 1, 2021
    ...500, 510 (9th Cir. 2008) (list of websites a suspect had visited); Ulbricht v. United States, 138 S. Ct. 2708 (2018), denying cert, to 858 F.3d 71,97 (2d Cir. 2017) (85.) Alba, 555 U.S. 908 (list of emails sent to and from a suspect). (86.) Riley v. United States, 138 S. Ct. 2705 (2018), de......
  • The Broken Fourth Amendment Oath.
    • United States
    • Stanford Law Review Vol. 74 No. 3, March 2022
    • March 1, 2022
    ...warrants to search digital devices, which have garnered attention from both courts and scholars. See, e.g., United States v. Ulbricht, 858 F.3d 71, 101 (2d Cir. 2017); Laurent Sacharoff, The Fourth Amendment Inventory as a Check on Digital Searches, 105 IOWA L. Rev. 1643, 1651-60 (20.) See ......
  • Evidence
    • United States
    • James Publishing Practical Law Books Trial Objections
    • May 5, 2022
    ...§144, supra ). This can help the judge rule on the issue of admissibility on the subject. CASES FEDERAL CASES United States v. Ulbricht , 858 F.3d 71, 121 n. 59 (2d Cir. 2017) (abrogated on other grounds). When confronted with hearsay within hearsay, or double hearsay, courts must determine......
  • Computer Crimes
    • United States
    • American Criminal Law Review No. 60-3, July 2023
    • July 1, 2023
    ...(S.D.N.Y. 2014) (denying defendant’s motion to dismiss due to his alleged creation and maintenance of an online drug marketplace), aff’d , 858 F.3d 71 (2d Cir. 2017); Press Release, U.S. Dep’t of Just., Dark Web Traff‌icker Convicted of Drug Importation Conspiracy (Feb. 13, 2019), https://w......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT