The Volokh Conspiracy
Mostly law professors | Sometimes contrarian | Often libertarian | Always independent
Attorney-Eyes-Only Disclosure of Heuristics Used by Government in Analyzing Blockchain Transactions
From Thursday's decision by Judge Randolph Moss (D.D.C.) in U.S. v. Sterlingov, which holds that defendant Roman Sterlingov should be barred from "personally reviewing" "the sensitive, supplemental heuristic information that was created by the government's expert (for the benefit of the defense) and provided to the defense in September 2023," which is to say that only his lawyers should have access to it:
Here, good cause exists for limiting access to the sensitive, supplemental heuristic material in the manner that the government proposes. As government counsel persuasively explained at the November 13, 2023 hearing, the material at issue is neither evidence against the defendant nor is it exculpatory evidence. Instead, the information is best understood as a supplemental expert disclosure. It was provided to the defense, at the Court's urging, to ensure that the defense was fully apprised of the heuristics used in Chainalysis's Reactor software, which the government's experts, Luke Scholl and Elizabeth Bisbee, used to cluster certain blockchain transactions at issue in the case. This supplemental expert disclosure did not exist at the time either of the government experts prepared their reports, and the government itself came into possession of the material from Chainalysis only as an intermediary, before passing it along to defense counsel.
The government also explained that the sensitive, supplemental heuristic information provides a more granular account of the behavioral heuristics that Reactor employs than the account previously disclosed to Sterlingov, defense counsel, and an array of defense experts in Bisbee's expert report and appendices. That additional detail includes "exactly how" specific behavioral heuristics are "implemented and weighed," and, significantly, it "includes information about the kickouts"—that is, "what behavior would cause Chainalysis not to cluster" a given address. Armed with this information, those bent on preventing the government (or its expert) from clustering addresses, and thereby identifying their owners and connecting them to potentially illicit transactions, could readily adjust their conduct to evade detection.
By way of analogy, consider criminal enterprises that engage in sophisticated bank robberies. Imagine that the government can identify those enterprises by tracking down shell companies that have engaged in certain behaviors—say, opening a new bank account within x hours of a robbery and making deposits into that account between one and y hours post-robbery and then never again. Imagine further that the government has studied the behavior of particular criminal enterprises and knows that for Enterprise A, "x" equals 48 hours and "y" equals 12 hours, but that for Enterprise B, "x" equals 24 hours and "y" equals 6 hours. Armed with details about their behavioral patterns, the government would be able to identify which criminal enterprise likely robbed a particular bank. And were that information ever to be made public, both Enterprise A and Enterprise B would be able to evade detection by changing their distinctive behaviors.
As the government explains it, the defense—including Sterlingov—has long had access to the general methodology that Chainalysis uses. To continue the analogy, they know that the government pays attention to the timing of account openings and deposit patterns. But what the sensitive, supplemental heuristic information discloses is the precise temporal windows—the x and y values—used for each of the services, and darknet marketplaces, at issue.
The testimony elicited during the multiple Daubert hearings in this case confirm that the sort of cat-and-mouse dynamic described above is far from hypothetical. To take just one example, services like Chainalysis (as well as defense expert, Ciphertrace) rely on the fact that when multiple addresses contribute bitcoin to fund a single transaction, the contributing addresses are likely owned by the same entity. {This phenomenon is often referred to as the "co-spend" or "common spend" heuristic, and its origins can be traced back to the white paper on bitcoin authored by its pseudonymous inventor [Satoshi Nakamoto].} That is because, in order to contribute bitcoin to a transaction, an individual must have the private key to the address that originally held the bitcoin in question. Private keys are like bank account passwords—for obvious reasons, account owners are unlikely to share them with strangers. "Coinjoin" services, however, permit individuals to contribute bitcoin to each other's transactions, without sharing their private key information with one another, thereby defeating (or at least frustrating) the assumption that when multiple addresses fund a single transaction, they are controlled by one entity. In response to the advent of coinjoin services, law enforcement clustering products like Chainalysis's Reactor and Ciphertrace's Inspector, in turn, have developed (or have attempted to develop) methods of detecting the presence of coinjoin services.
In this manner, each disclosure of how the government (or its experts) cluster or track bitcoin transactions ups the ante in the detection-evasion, cat-and-mouse game. Indeed, the government alleges that Bitcoin Fog, a bitcoin mixing service, was itself designed and employed to help bitcoin users avoid clustering and tracing of their on-chain activities. Against this backdrop, the Court finds that the government's concern regarding providing Sterlingov, the alleged administrator of Bitcoin Fog, with personal access to the granular behavioral heuristics used by Chainalysis is both valid and substantial.
At the November 13, 2023 hearing, the Court inquired whether the granular heuristics in the sensitive, supplemental information remain confidential and in use today, given the speed with which technology develops. In response, the government assured the Court that these heuristics "are still used for clustering … being actively built and tested by Chainalysis now" and that the government is relying on this clustering "in very significant criminal cases and significant national security cases where [the government has] a very important and compelling interest [in] not allow[ing] [the government's] adversaries to … contravene those measures." In short, the measures and details at issue are neither inactive nor obsolete.
The Court also inquired whether at least portions of the sensitive, supplemental information might be disclosed without posing a risk to ongoing criminal or national security investigations. In response, government counsel stated:
Your Honor, we did review in the Court's opinion and order the suggestion that we look at whether there [are] things that may be less sensitive. What we found [is] that really anything that was less sensitive was really in the prior report and if we went through to try and redact out what would be considered active and sensitive, we would essentially … be eliminating [from the attachments] the additional columns that were added to this report[,] so it would put [the] defense pretty much back at what the original attachments [to the Bisbee report] were.
And[,] then[,] with the report[ ] itself, we would—it would look like a series of black boxes without anything really in the way of substantive information that would be of any sort of use to the defendant.
Defense counsel, who have had access to the sensitive, supplemental material for several weeks now, did not disagree with this assessment or with the government's more general representation that disclosure of the information would permit those engaged in illicit bitcoin transactions to evade clustering or tracking.
Rather than take issue with the government's characterization of the sensitive, supplemental information or with the risk that disclosure might undermine ongoing law enforcement and national security activities, the defense argues that the government's request is impermissibly premised on the assumption that Sterlingov is guilty of the crimes with which he is charged (and that, as such, he cannot be trusted to comply with the supplemental protective order, and he has the means and the motive to use the supplemental heuristic information to evade clustering in the future). The defense is, of course, correct that every criminal defendant is presumed innocent unless and until the government carries its burden of proof beyond a reasonable doubt. But that does not mean that the Court is required to ignore the government's concerns regarding ongoing criminal and national security investigations.
This concept is not novel. Indeed, it is the very premise of the Classified Information Procedures Act ("CIPA") that, at times, it is appropriate to limit a criminal defendant's access to sensitive information that his or her counsel can review, notwithstanding the presumption of innocence. And, although CIPA deals with uniquely sensitive information, it does not stand alone; to the contrary, it is not unusual for courts to limit access to sensitive information to defense counsel alone, barring access by the defendant himself. Finally, the defense ignores the fact that a grand jury has made a finding of probable cause in this case, which, in other contexts, has been deemed sufficient to trigger significant, adverse consequences, such as an arrest or temporary loss of employment.
The Court, accordingly, finds (1) that the government has carried its burden of demonstrating good cause for limiting the disclosure of the sensitive, supplemental heuristic information to counsel and qualified experts who are needed to assist counsel and who are prepared to sign a reasonable protective order, and (2) that this good cause extends to the entire sensitive, supplemental production….
The Court must also consider whether Sterlingov's need for access to the sensitive, supplemental information is sufficient to trump the government's showing of good cause … or, more significantly, whether denying Sterlingov the requested access would violate his rights under the Fifth or Sixth Amendment to the Constitution. The facts of this case do not support his request ….
In its prior decision, the Court raised the question whether Sterlingov was seeking access to the sensitive, supplemental information so that he could actively assist in his own defense or was merely positing that he, like every other criminal defendant, is entitled to have access to any and all information pertaining to the case against him. At the November 13, 2023 hearing, which was held in part so that counsel could answer just this question, Sterlingov's counsel made clear that he was pressing only the latter contention. Counsel made no mention of any special expertise or knowledge that Sterlingov might bring to bear, and counsel has failed to take the Court up on its invitation to seek leave, if necessary, to make any such showing in an ex parte submission….
Nor can the Court discern any reason why, as a matter of constitutional law, Sterlingov needs access to the highly technical information at issue. As noted above, the information is not evidence that the government intends to offer against Sterlingov, nor did it even exist at the time Sterlingov was charged. Rather, the information simply provides more granular detail about the behavioral heuristics (referred to by Chainalysis as "Heuristic 2") used by Reactor to cluster and attribute addresses that, according to the government's experts, show that Bitcoin Fog was used to launder large amounts of cryptocurrency associated with certain darknet sites.
Notably, moreover, the parties seem to agree that the information at issue has no bearing on the core question of whether Sterlingov operated Bitcoin Fog. And, even with respect to the question of how many transactions (and thus how much money) traveled from addresses affiliated with darknet sites to Bitcoin Fog, and vice versa, the parties seem to agree that many (although not precisely how many) such transactions occurred. As the Court observed at the hearing—without disagreement from the defense—the defense's own expert, Jonelle Still of Ciphertrace, seemed to concede at her Daubert hearing that a substantial portion of Bitcoin Fog's activity involved darknet customers. The dispute is only about how big a portion that was.
To be sure, it is possible that the magnitude of Bitcoin Fog's transactions with darknet sites might have some bearing on whether the jury believes that the Bitcoin Fog administrator was aware that Bitcoin Fog was being used to launder illicit gains. But the Court has no reason to believe that the more detailed behavioral heuristics described in the sensitive, supplemental information will shed substantially more light on that question than the large quantity of less sensitive expert disclosures already have. Given ample opportunity to show otherwise, the defense simply reverts to ipse dixit, asserting: "To the extent the government is maintaining that it's not important to the defense, we just disagree with that" for "reasons [that] are obvious." The Court does not doubt that thorough preparation for trial will include review of this supplemental information, which may (or may not) include detail useful to counsel for cross-examination of the government's experts regarding the magnitude of Bitcoin Fog transactions traceable to the darknet. But, beyond that, the value of the information is far from obvious.
Finally, the Court notes that Sterlingov has long had access to reams of information relating to Chainalysis's efforts to connect hundreds of thousands of darknet bitcoin transactions to Bitcoin Fog. All that is at issue here is the most granular detail regarding the assumptions used in one category of heuristics (Heuristic 2) that Chainalysis employed to draw those connections. It is important that defense counsel (with the assistance of an expert, if necessary) have access to that more detailed information to ensure that no stone is left unturned in preparing Sterlingov's defense. But, as defense counsel conceded after having reviewed the sensitive, supplemental material, he is unsure whether or how he will make use of the information in cross-examining the government's expert, nor has he identified (at the hearing or in any ex parte filing) anything in the supplemental material that Sterlingov himself needs to review in order to assist counsel in preparing the defense.
The Court, accordingly, concludes that Sterlingov has failed to identify any reason why he personally needs to review the sensitive, supplemental information, which might overcome the government's showing of good cause.
Editor's Note: We invite comments and request that they be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of Reason.com or Reason Foundation. We reserve the right to delete any comment for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.
Please
to post comments
Like companies studying your mouse movements or keyboard stroke timings (to say nothing of phraseology) to discern you like a fingerprint, regardless of pseudo-anonymous name or web site.
Like revealing how they cracked the encryption on an uncrackable phone. Are there math holes they know about, faster computers than they admit to, sink the chip in liquid nitrogen and shave it down atom by atom to read it? In all but the most severe cases they'd prefer to give up the case rather than reveal expensive or complicated techniques that could be akin to miraculosly saving ships in The Immitation Game.
I don't know if I like this solution, though. The person is the font of rights, not the court or lawyers-on-behalf of someone.
One of the fundamentals of cryptography is to not depend on obscurity. If they are afraid to disclose their procedures, I'd lay odds it's because those procedures are as founded in science as phrenology, astrology, bite marks, and gender fluidentity.
Breathalyzer machines have had similar reliability problems, and manufacturers wanting the machine's results to be considered trustworthy with out proof that it is.
They're disclosing them to the court and defense team, including their experts, just not the defendant personally. That's only secrecy if you think the conspiracy is very, very deep.
I would assume they don't want him to know it because it might "leak" and orgs would start covering their tracks. This could be a valid concern, of course, but if the government does this, how secret could it still be?
Apparrently pretty darned secret. Otherwise why do it?
Convicted on evidence you aren’t permitted to see, therefore can not adequately defend against seems sketchy.
Particularly if the evidence is related to an obscure area of expertise know to the defendant.
It seems that this is not evidence that is being presented to the jury. If I understand correctly, it's more like the threshold of what is considered suspicious.
In a money laundering case, the government might present evidence that 2 payments of $9999 were made to your bank account. But they don't have to tell you that the bank gives them a report whenever you get two payments of $X or more. Knowing X doesn't help your defense, argues the government. It only helps you to not get caught the next time.
It is evidence against you, and for all anyone knows, may be unreliable. It's called impeaching a witness.
.
Then it’s a good thing the lawyers who will be cross-examining the witnesses have access to the information.
The 2 payments of $9999 is evidence against you. The government isn't hiding that.
The fact that 2 payments over $X get flagged is *not* evidence against you.
So, like, if the threshold was $5, that would look bad for the government? But the fact remains that your payments were $9999 and not $5.
And how is the lawyer going to understand it if he can't ask his client to explain it to him?
Conversely, there are lawyers with various money problems and there isn't one who can be bribed?
But according to the decision above, this is not an obscure area of expertise known to the defendant - or if it is, the defendant's lawyers did not so argue.
I agree that it's sketchy as a general principle but I'm not sure how knowing this particular information would change how the defendant participates in his own defense.
.
0-for-2. Did you bother to read the decision, or even the excerpt of it above? Neither of your claims is accurate; this isn't evidence, and the defense isn't claiming that it's related to an obscure area of expertise known to the defendant.
IANAL, so some the legal stuff is quite obtuse to me. The idea that a witness can use a hueristic (as described in the post title, which colored my understanding of my imperfect, inexpert understanding (though that is one of the reasons us non-lawyers come here, to learn, and to try to understand better) still seems odd. “I used a magic intuition (hueristic) that gave us a reason to believe …” Yeah, still not sure I am comfortable with that any more than ‘he looked nervous’ as a reasonable cause for extending a search.
But, like Jon Snow, I know nothing.
The Constitution begs to differ:
And before anyone says this is not a witness against him, then throw out the evidence as unnecessary and irrelevant.
It's not evidence! Did any of you bother to read? Nobody is seeking to introduce this.
I agree with Krayt with one addendum -- in addition to the person being the font of rights, isn't the government opening itself up to an appeal based on ineffectiveness of counsel?
My logic is simple -- if the client doesn't have access to everything that his counsel does, how does he know that counsel used said secret knowledge effectively? Throw in some paranoia, possibly opportunistic paranoia and you'll have a situation which the government can't disprove without *then* revealing the super secret information to the defendant.
And even if he doesn't get anywhere with the appeal, criminal law is also often a political process and lawyers aren't high on the trusted list so this could get ugly quickly.
And if ALL they have is how many hours people wait between transactions, how difficult is it to create a random number generator so as to randomize these wait times and totally screw up the government? Something like this doesn't occur to bureaucrats who (at senior levels) routinely vary the route and times they go to work so as to make it more difficult for those intending them harm?
The government doesn't have to disprove the ineffectiveness of counsel. Pretty sure the burden of proof is on the defendant to prove it.
You can randomize wait times, but will you? It means you have to wait to use the money, and you don't know exactly how long you have to wait to avoid scrutiny.
IANAA but isn't it a rebuttable presumption against the defendant?
In other words, if the defendant said "my lawyer didn't do X", doesn't (at some point of significance) the state have to then prove that failure to do X was irrelevant?
So delusional defendant claims that there was a smoking gun in the stuff his attorney (but not he) got to see. How does the government answer that without releasing the info?
Look at Mumia -- that murder was 42 years ago, *all* of the evidence is in the public record, and people are still saying he's innocent.
That's the real reason for public trials -- *because* the public could sit through really boring proceedings if they wanted to, they have faith in the legal system. Once things start becoming secret, the conspiracy nuts will have traction and that's not good.
No.
Explain that to Team Mumia....
Could a defendant defeat a ruling like this simply by waiving his right to counsel and dismissing his lawyers? Could he after viewing the information decide he wanted his lawyers back?
Even if he can’t, one could imagine a hypothetical case where the information is valuable enough to somebody to be worth someone deliberately taking one for the team and arranging a crime (and arranging to get arrested) in a situation where the information would be critical to the defense and the defense would have a right to have it.