OPINION & ORDER
On February 4, 2014, a Grand Jury sitting in the Southern District of New York returned Indictment 14 Cr. 68, charging Ross Ulbricht (“the defendant” or “Ul-bricht”) on four counts for participation in a narcotics trafficking conspiracy (Count One), a continuing criminal enterprise (“CCE”) (Count Two), a computer hacking conspiracy (Count Three), and a money laundering conspiracy (Count Four). (Indictment, ECF No. 12.) Pending before •the Court is the defendant’s motion to dismiss all counts. (ECF No. 19.) For the reasons set forth below, the Court DENIES the motion in its entirety.
The Government alleges that Ulbricht engaged in narcotics trafficking, computer hacking, and money laundering conspiracies by designing, launching, and administering a website called Silk Road (“Silk
A conspiracy claim is premised on an agreement between two or more people to achieve an unlawful end. The Government alleges that by designing, launching, and administering Silk Road, Ulbricht conspired with narcotics traffickers and hackers to buy and sell illegal narcotics and malicious computer software and to launder the proceeds using Bitcoin. There is no allegation that Ulbricht conspired with anyone prior to his launch of Silk Road. Rather, the allegations revolve around the numerous transactions that occurred on the site following its launch.
The Government alleges that Silk Road was designed to operate like eBay: a seller would electronically post a good or service for sale; a buyer would electronically purchase the item; the seller would then ship or otherwise provide to the -buyer the purchased item; the buyer would provide feedback; and the site operator (ie., Ul-bricht) would receive a portion of the seller’s revenue as a commission. Ulbricht, as the alleged site designer, made the site available only to those using Tor, software and a network that allows for anonymous, untraceable Internet browsing; he allowed payment only via Bitcoin, an anonymous and untraceable form of payment.
Following the launch of Silk Road, the site was available to sellers and buyers for transactions. Thousands of transactions allegedly occurred over the course of nearly three years — sellers posted goods when available; buyers purchased goods when desired. As website administrator, Ul-bricht may have had some direct contact with some users of the site, and none with most. This online marketplace thus allowed the alleged designer and operator (Ulbricht) to be anywhere in the world with an Internet connection (he was apprehended in California), the sellers and buyers to be anywhere, the activities to occur independently from one another on different days and at different times,' and the transactions to occur anonymously.
A number of legal questions arise from conspiracy claims premised on this framework. In sum, they address whether the conduct alleged here can serve as the basis of a criminal conspiracy — and, if so, when, how, and with whom.
Question One: Can there be a legally cognizable “agreement” between Ulbricht and one or more coconspirators to engage in narcotics trafficking, computer hacking, and money laundering by virtue of his and their conduct in relation to Silk Road? If so, what is the difference between what Ulbricht is alleged to have done and the conduct of designers and administrators of legitimate online marketplaces through which illegal transactions may nevertheless occur?
Question Two: As a matter of law, who are Ulbricht’s alleged coconspirators and potential coconspirators? That is, whose “minds” can have “met” with Ulbricht’s in a conspiratorial agreement? What sort of conspiratorial structure frames the allegations: one large, single conspiracy or multiple smaller ones?
Question Three: As a matter of law, when could any particular agreement have occurred between Ulbricht and his alleged coconspirators? Need each coconspirator’s mind have met simultaneously with Ulbricht’s? With the minds of the other coconspirators? That is, if Ulbricht launched Silk Road on Day 1, can he be said, as a matter of law, to have entered into an agreement with the user who joins on Day 300? Did Ulbricht, simply by de
Question Four: As a matter of law, is it legally necessary, or factually possible, to pinpoint how the agreement between Ul-bricht and his coconspirators was made? In this regard, does the law recognize a conspiratorial agreement effected by an end user interacting with computer software, or do two human minds need to be simultaneously involved at the moment of agreement?
Question Five: If Ulbricht was merely the facilitator of simple buy-sell transactions, does the “buyer-seller” rule apply, which in certain circumstances would preclude a finding of a criminal conspiracy?
:¡: :j{ í|í
' The defendant also raises the following additional arguments with respect to Counts One, Two, and Three: the rule of lenity, the doctrine of constitutional avoidance, the void-for-vagueness doctrine, constitutionally defective over-breadth, and a civil immunity statute for online service providers. The Court refers to these collectively as the “Kitchen Sink” arguments. While this is a case of first impression as to the charged conduct, the fact that the alleged conduct constitutes cognizable crimes requires no legal contortion and is not surprising. These arguments do not preclude criminal charges.
With regard to Count Two, the defendant alleges that, as a matter of law, his conduct cannot constitute participation in a CCE (under the so-called “kingpin” statute). The defendant argues that the Indictment fails to allege that he had the requisite managerial authority in the conspiracy and that the Indictment fails to allege a sufficient “continuing series” of predicate violations. The Court disagrees and finds that the allegations in the Indictment are sufficient.
With regard to Count Three, the defendant contends that the allegations in the Indictment are insufficient to support the type of conduct covered by a computer hacking conspiracy. The defendant con-, fuses the requirement for establishing the violation of the underlying offense with the requirements for establishing a conspiracy to commit the underlying offense; he finds ambiguity where there is none. The Government alleges a legally cognizable claim in Count Three.
Finally, with respect to Count Four, the defendant alleges that he cannot have engaged in money laundering because all transactions occurred through the use of Bitcoin and thus there was therefore no legally cognizable “financial transaction.” The Court disagrees. Bitcoins carry value — that is their purpose and function— and act as a medium of exchange. Bit-coins may be exchanged for legal tender, be it U.S. dollars, Euros, or some other currency. Accordingly, this argument fails.
I. THE INDICTMENT
Rule 7(c)(1) of the Federal Rules of Criminal Procedure provides that an indictment “must be a plain, concise, and definite written statement of the essential facts constituting the offense charged.” Fed.R.Crim.P. 7(c). It need not contain any other matter not necessary to such statement. Id. (“A count may allege that the means by which the defendant committed the offense are unknown or that the defendant committed it by one or more specified means.”).
An indictment must inform the defendant of the crime with which he has been charged. United States v. Doe,
Neyertheless, “[a] criminal defendant is entitled to an indictment that states the essential elements of the charge against him.” United States v. Pirro,
“An indictment must be read to include facts which are necessarily implied by the specific allegations made.” United States v. Stavroulakis,
As with all motions to dismiss an indictment, the Court accepts as true the allegations set forth in the charging instrument for purposes of determining the sufficiency of the charges. See United States v. Sampson,
The Indictment here alleges that Ul-bricht designed, created, operated, and owned Silk Road, “the most sophisticated and extensive criminal marketplace on the Internet.” (Ind. ¶¶ 1-3.) Silk Road operated using Tor, software and a network that enables users to access the Internet anonymously — it keeps users’ unique identifying Internet Protocol (“IP”) addresses obscured, preventing surveillance or tracking. All purchases occurred on Silk Road using Bitcoin, an anonymous online currency.
Silk Road allegedly functioned as designed — tens of thousands of buyers and sellers are alleged to have entered into transactions using the site, violating numerous criminal laws. Over time, thousands of kilograms of heroin and cocaine were allegedly bought and sold, as if the purchases were occurring on eBay or any other similar website.
Count One charges that, from in or about January 2011 up to and including October 2013, the defendant engaged in a narcotics trafficking conspiracy. To wit, “the defendant ... designed [Silk Road] to enable users across the world to buy and sell illegal drugs and other illicit goods and services anonymously and outside the reach of law enforcement.” (Ind. ¶ 1.) The defendant allegedly “controlled all aspects of Silk Road, with the assistance of various'
Count Two depends on the conduct in Count One. Count Two alleges that U1-bricht’s conduct amounted, over time, to his position as a “kingpin” in a continuing criminal enterprise (again, “CCE”). (Ind. ¶ 12.) Ulbricht is alleged to have engaged in a “continuing series of violations” in concert “with at least five other persons with respect to whom Ulbricht occupied a position of organizer, a supervisory position, and a position of management, and from which ... Ulbricht obtained substantial income and resources.”. (Id.)
Count Three charges that Ulbricht also designed Silk Road as “a platform for the purchase and sale of malicious software designed for computer hacking, such as password stealers, keyloggers, and remote access tools.” (Ind. ¶ 14.) “While in operation, the Silk Road website regularly offered hundreds of listings for such products.” (Id.) The object of this conspiracy was to “intentionally access computers without authorization, and thereby [to] obtain information from protected computers, for purposes of commercial advantage and financial gain.” (Ind. ¶ 16.)
Count Four alleges that Ulbricht “designed Silk Road to include a Bitcoin-based payment system that served to facilitate the illegal commerce conducted on the site, including by concealing the identities and locations of the users transmitting and receiving funds through the site.” (Ind. ¶ 18.) “[K]nowing that the property involved in certain financial transactions represented proceeds of some form of unlawful activity,” Ulbricht and others would and did conduct financial transactions with the proceeds of specified unlawful activity, “knowing that the transactions were designed ... to conceal and disguise the nature, the location, the source, the ownership and the control of the proceeds.” (Ind. ¶ 21.)
II. THE LAW OF CONSPIRACY
A. Elements of a Conspiracy
“The essence of the crime of conspiracy ... is the agreement to commit one or more unlawful acts.” United States v. Praddy,
1. Agreement
A meeting of the minds is required in order for there to be an agreement. Krulewitch v. United States,
“It is not necessary to prove that the defendant expressly agreed with other conspirators on a course of action; it is enough, rather, to show that the parties had a tacit understanding to carry out the prohibited conduct.” Anderson, 747 F.3d at 61 (internal quotation marks, alteration, and citation omitted). However, “a defendant’s mere presence at the scene of a crime, his general knowledge of criminal activity, or his simple association with others engaged in a crime are not, in themselves, sufficient to prove the defendant’s criminal liability for conspiracy.” Id. (citations omitted).
2. Object of the Conspiracy
To be convicted of a conspiracy, a defendant must know what “ ‘kind of criminal conduct was in fact contemplated.’ ” Rosenblatt,
The crime of conspiracy requires that a defendant both know the object of the crime and that he knowingly and intentionally join the conspiracy. United States v. Torres,
The quantum of proof necessary at trial to sustain a finding of. knowledge varies. “A defendant’s knowing and willing participation in a conspiracy may be inferred from, for example, [his] presence at critical stages of the conspiracy that could not be explained by happenstance, ... a lack of surprise when discussing the conspiracy with others, ... [or] evidence that the defendant participated in conversations directly related to the substance of the conspiracy; possessed items important to the conspiracy; or received or expected to receive a share of the profits from the conspiracy.” United States v. Aleskerova,
B. Types of Conspiracies
Conspiracies come in myriad shapes and sizes: from a small conspiracy involving two people to achieve a limited end to a large one involving numerous participants and with an expansive scope. Similarly, a defendant may participate in a single conspiracy or multiple conspiracies. Most questions as to size and number are left to trial. Here, the Court addresses these issues only insofar as they inform whether and how the Government might ultimately prove the conspiracies alleged in the Indictment.
“Whether the government has proven the existence of the conspiracy charged in the indictment and each defendant’s membership in it, or, instead, has proven several independent conspiracies is a question of fact for a properly instructed jury.” United States v. Johansen,
1. Overview of Single Conspiracies
“[A]cts that could be charged as separate counts of an indictment may instead be charged in a single count if those acts could be characterized as part of a single continuing scheme.” United States v. Aracri,
A “ ‘single conspiracy is not transformed into multiple conspiracies merely by virtue of the fact that it may involve two or more spheres or phases of operation, so long as there is sufficient proof of mutual dependence and assistance.’ ” Geibel,
The Second Circuit has outlined three “hypothetical avenues” for establishing a single conspiracy:
1. The scope of the agreement was broad enough to include activities by or for persons other than the small group of core conspirators;
2. The coconspirators reasonably foresaw, “as a necessary or natural consequence of the unlawful agreement,” the participation of others; or
‘3. “Actual awareness” of the participation of others.
Geibel,
2. Types of Single Conspiracies
Courts often conceptualize single conspiracies using either a “chain” or a “hub- and-spoke” metaphor. United States v. Borelli,
a) Chain conspiracies
A chain conspiracy'refers to a situation in which there are numerous conspiring individuals, each of whom has a role in a “chain” that serves the conspiracy’s object. For example, in a narcotics conspiracy, a chain may be comprised of producers, exporters, wholesalers, middlemen, and dealers. The success of each “link” in the chain depends on the success of the others, even though each individual conspirator, may play a role that is separated by great distance and time from the other individuals involved. Id.; United States v. Mallah,
b) Hub-and-spoke conspiracies
In a hub-and-spoke (or “wheel”) conspiracy, one person typically acts as a central point while others act as “spokes” by virtue of their agreement with the central actor. See Kotteakos v. United States,
To prove a single conspiracy in such a situation, the Government must show that there was a “rim” around the spokes, such that the “spokes” became co-conspirators with each other. To do so, the Government must prove that “each defendant ... participated in the conspiracy with the common goal or purpose of the other defendants.” United States v. Taggert, No. 09 Cr. 984(BSJ),
In the absence of such a “rim,” the spokes are acting independently with the hub; while there may in fact be multiple separate conspiracies, there cannot be a single conspiracy. See Zabare,
C. The Buyer-Seller Exception
Of course, not all narcotics transactions occur within a conspiracy. A conspiracy to distribute narcotics does not arise between a buyer and seller simply because they engage in a narcotics transaction. That is, the mere purchase and sale of drugs does not, without more, amount to a conspiracy to distribute narcotics. See, e.g., United States v. Parker,
When wholesale quantities are involved, however, the participants may be presumed to know that they are involved in a venture, the scope of which is larger than the particular role of any individual. Murray,
D. The Role of Middlemen
In some cases involving narcotics trafficking, defendants are alleged to have acted as middlemen. Middlemen may be found to have conspired with a buyer, a seller, or both. United States v. Bey,
III. DISCUSSION OF CONSPIRATORIAL AGREEMENT
The Indictment alleges that Ulbricht designed Silk Road specifically to enable users to anonymously sell and purchase narcotics and malicious software and to launder the resulting proceeds. On this motion to dismiss, the Court’s task is a narrow one — it is not concerned with whether the Government will have sufficient evidence to meet its burden of proof as to each element of the charged conspiracies at trial. Instead, the Court is concerned solely with whether the nature of the alleged conduct, if proven, legally constitutes the crimes charged, and whether the defendant has had sufficient notice of the illegality of such conduct. See D’Amelio,
The defendant argues that Counts One and Three in the Indictment are legally insufficient for failure to allege a cognizable conspiratorial agreement. (Def.’s Reply at 2-3.) He does not make the same argument with regard to Count Four, but certain aspects of the issue apply to that Count as well.
The Court has set forth five questions that concern the potential existence of a conspiratorial agreement in this case. Each question is now taken up in turn.
Question One: Can there be a legally cognizable “agreement” between Ul-bricht and one or more coconspirators to engage in narcotics trafficking, computer hacking, and money laundering by virtue of his and their conduct in relation to Silk Road? If 'so, what is the difference between what Ulbricht is alleged to have done and the conduct of designers and administrators of legitimate online marketplaces through which illegal transactions may nevertheless occur?
The “gist” of a conspiracy charge is that the minds of two or more people met — that they agreed in some manner to achieve an unlawful end. For the reasons explained
According to the Indictment, Ulbricht purposefully and intentionally designed, created, and operated Silk Road to facilitate unlawful transactions. Silk Road was nothing more than code unless and until third parties agreed to use it. When third parties engaged in unlawful narcotics transactions on the site, however, Ul-bricht’s design and operation gave rise to potential conspiratorial conduct. The subsequent sale and purchase of unlawful narcotics and software on Silk Road may, as a matter of law, constitute circumstantial evidence of an agreement to engage in such unlawful conduct. See United States v. Svoboda,
Ulbricht argues that his conduct was merely as a facilitator — -just like eBay, Amazon, or similar websites.
Moreover, in this case, the charges in the Indictment go further than Ulbricht acknowledges. The Indictment alleges that Ulbricht engaged in conduct that makes Silk Road different from other websites that provide a platform for individual buyers and sellers to connect and engage in transactions: Silk Road was specifically and intentionally designed for the purpose of facilitating unlawful transactions. The Indictment does not allege that Ulbricht is criminally liable simply because he is alleged to have launched a website that was — unknown to and unplanned by him— used for illicit transactions. If that were ultimately the case, he would lack the mens rea for criminal liability. Rather, Ulbricht is alleged to have knowingly and intentionally constructed and operated an expansive black market for selling and purchasing narcotics and malicious software and for laundering money. This separates Ulbricht’s alleged conduct from the mass of others whose websites may — without their planning or expectation- — -be used for unlawful purposes.
It is certainly true that the principles set forth in this Opinion would apply to other
Question Two: As a matter of law, who are Ulbricht’s alleged coconspirators and potential coconspirators? That is, whose “minds” can have “met” with Ul-bricht’s in a conspiratorial agreement? What sort of conspiratorial structure frames the allegations: one large single conspiracy or multiple small conspiracies?
The Indictment charges a single conspiracy in each of Counts One, Three, and Four. Ulbricht’s alleged coconspirators are “several thousand drug dealers and other unlawful vendors.” (Ind. ¶ 2.) If these individuals possessed the requisite intent, there is no legal reason they could not be members of the conspiracies charged in the Indictment.
A more complicated question is whether any or all of Ulbricht’s coconspirators also conspired with each other, so as to create a potentially vast single conspiracy. In this regard, the Government may argue that the conspiracy was a “chain” conspiracy or that it was a “hub-and-spoke” conspiracy (in which case it would be necessary for the Government to prove the existence of a “rim”). Each approach has its own complexities regarding the (largely anonymous) inter-conspirator relationships on the Internet. While this is not an issue the Government need address at this stage, see D’Amelio,
Of course, ultimately, the form of the conspiracy is not as important as a determination that at least one other person joined in the alleged conspiratorial agreement with Ulbricht. With respect to the narcotics conspiracy charge, to prove that the drug types and quantities alleged in the Indictment were the objects of a conspiracy Ulbricht knowingly and intentionally joined, the Government will have to prove either a single such conspiratorial agreement or an aggregation of conspiracies.
Question Three: As a matter of law, when could any particular agreement have occurred between Ulbricht and his alleged coconspirators? Need each co-conspirator’s mind have met simultaneously with Ulbricht’s? With the minds of other coconspirators? That is, if Ulbricht launched Silk Road on Day 1, can he be said, as a matter of law, to have entered into an agreement with the user who joins on Day 300? Did Ul-bricht, simply by designing and launching Silk Road, make an enduring showing of intent?
The issue here is one of temporal proximity. For the sake of illustration, assume that Ulbricht launched Silk Road on Day 1. A narcotics trafficker posted illegal drugs on the site on Day 2 and another posted on Day 300. Does the Day 2 trafficker enter into a conspiratorial agreement with Ul-bricht on Day 2 and the Day 300 trafficker on Day 300? More importantly, can Ul-
One way of thinking about this issue is to look to the basic contract principles of offer and acceptance. On Day 1, according to the Indictment, Ulbricht “offers” to work with others to traffic illegal narcotics, engage in computer hacking, and launder money. He makes this offer by creating and launching a website specifically designed and intended for such unlawful purposes. Ulbricht’s continued. operation of the site evinces an enduring intent to be bound with those who “accept” his offer and utilize the site for its intended purpose. It is as though the defendant allegedly posted a sign on a (worldwide) bulletin board that said: “I have created an anonymous, untraceable way to traffic narcotics, unlawfully access computers, and launder money. You can use the platform as much as you would like, provided you pay me a percentage of your profits and adhere to my other terms of service.” Each time someone “signs up” and agrees to Ulbricht’s standing offer, it is possible that, as a matter of law, he or she may become a coconspirator.
To put this another way, the fact that Ulbricht’s active participation may occur at a different point in time from the agreement by his coeonspirator(s) does not render the cohspiracy charges legally defective. Courts have long recognized that members of a conspiracy may be well removed from one another in time. See, e.g., Borelli,
Question Four: As a matter of law, is it legally necessary, or factually possible, to pinpoint how the agreement between Ulbricht and his coconspirators was made? In this regard, does the law recognize a conspiratorial agreement effected by an end user interacting with computer software, or do two human minds need to be simultaneously involved at the moment of agreement?
Another issue raised by this case is whether a conspiratorial agreement may be effected' through what are primarily automated, pre-programmed processes. This is not a situation in which Ulbricht is alleged to have himself approved or had a hand in each individual transaction that occurred on Silk Road during the nearly three-year period covered by the Indictment. Instead, he wrote (or had others write) certain code that automated the transaction. Yet, as a legal matter, this automation does not preclude the formation of a conspiratorial agreement. Indeed, whether an agreement occurs elec-
It is well-established that the act of agreeing, or having a meeting of the minds, may be proven through circumstantial evidence. United States v. Rodriguez,
Question Five: If Ulbricht was merely the facilitator of simple buy-sell transactions, does the “buyer-seller” rule apply, which in certain circumstances would preclude a finding of a criminal conspiracy?
Ulbricht is not alleged to have been a buyer or seller of narcotics or malicious software. Following the design and launch of Silk Road, his role is alleged to have been that of an intermediary. While it will be for the Government to prove the defendant’s specific role vis-á-vis his alleged coconspirators at trial, one issue that may arise is whether the participation of an intermediary could itself (all other factors remaining the same) eliminate the applicability of the “buyer-seller” rule to a given narcotics transaction involving a small quantities bought and sold on the site. In other words, can mere buyers and sellers of small quantities of narcotics— who might not otherwise legally be cocon-spirators if the transactions occurred in the brick-and-mortar world — become conspirators due to the interposition of a website or website administrator? Plainly, the level of involvement in any transaction by the website would be relevant. And there are certainly instances in which the participation of three participants renders what might otherwise be a simple purchase or sale into a conspiracy. See, e.g., Medina,
IV. OTHER LEGAL ISSUES RAISED WITH REGARD TO COUNT ONE
The defendant 'argues that while Count One charges him with conspiracy to
According to the defendant, the statutory violation that occurs when one “knows” his premises have been or are being used for unlawful activities is either civil forfeiture pursuant to 21 U.S.C. § 881(a)(7) or the “crack house” statute passed by Congress in 1986, 21 U.S.C. § 856. (Id. at 11.) The statute outlaws the knowing operation, management, or leasing of premises where crack cocaine and other illicit drugs are manufactured, distributed, or used. 21 U.S.C. § 856(a). The defendant argues that because Silk Road is, at most, a type of “premise” for the distribution of narcotics, he should have been charged under either §§ 881 or 856, not with a narcotics conspiracy under §§ 841 or 846. (Def.’s Mem. at 12.) Alternatively, the defendant argues that his conduct should be analogized to that of a “steerer” in a drug transaction, not a co-conspirator.
The defendant’s arguments stem from an incorrect set of assumptions: first, that conduct may constitute only one type of statutory violation or must seek civil forfeiture relief to the exclusion of criminal liability. While the defendant may be chargeable with a violation of the “crack house” statute, he may well be chargeable with other crimes as well. How a defendant is charged is within the discretion of the prosecution. United States v. Batchelder,
Nor is the Government limited to charging a violation of the “crack house” statute simply because facilities (whether electron
’ In this case, the Government has alleged that more is in play .than the conduct which is encompassed by the “crack house” statute, or in the context of a non-conspiratorial “steerer.” The Government has alleged that the defendant set up a platform for illicit drug transactions designed with the specific needs of his buyers and sellers in mind. Thus, Ulbricht’s alleged conduct is not analogous to an individual who merely steers buyers to sellers; rather, he has provided the marketing mechanism, the procedures for the sale, and facilities for the actual exchange. He is alleged to know that his facilities would be used for illicit purposes and, in fact, that he designed and operated them for that purpose. In this regard, he is alleged to have “intentionally and knowingly” “combine[d], conspirefd], confederate[d], and agree[d]” with others to violate United States criminal law. (Ind. ¶ 5.) Ul-bricht’s alleged conduct is more akin to a builder who designs a house complete with secret entrances and exits and specially designed traps to stash drugs and money; this is not an ordinary dwelling, but a drug dealer’s “dream house.”
The defendant argues that Count One must be dismissed because he is not alleged to have, distributed or possessed any controlled substance. No such allegation is required. The law of conspiracy recognizes that members of a conspiracy may serve different roles. See United States v. Santos,
Finally, Ulbricht expresses surprise that the Government states in its opposition brief that by operating Silk Road, Ulbricht “entered into a joint venture with thou-' sands of drug dealers around the world to distribute drugs online.” (Gov’t Opp’n at 9.) This characterization of the defendant’s alleged conduct is substantively no different than the allegation in the Indictment that several thousand drug dealers and hundreds of thousands of buyers used the site. (Ind. ¶ 2.) However, the fact that such an allegation falls within a reasonable reading of the Indictment is a separate
Count One adequately alleges both the elements of a narcotics conspiracy as well as the conduct alleged underlying the charges; the defendant is suffíciéntly on notice of the charges against him so as to preclude later issues of double jeopardy.
Y. OTHER LEGAL ISSUES RAISED WITH REGARD TO COUNT TWO
Count Two alleges that the defendant’s conduct amounted to participation in a CCE in violation of 21 U.S.C. § 848(a). As an initial matter, a “continuing criminal enterprise” requires a determination that a provision of the Controlled Substances Act has been violated. Ulbricht’s liability under this provision is therefore premised on a' conviction on Count One, the narcotics conspiracy. Next, the trier of fact will need to determine if the violation of the Controlled Substances Act (that is, the narcotics conspiracy) was one of a series of such violations. 21 U.S.C. § 848(c). The law has defined “a series” as constituting at least three violations. See United States v. Flaharty,
Finally, Ulbricht must have undertaken this series of violations in concert with five or more persons with respect to whom he occupied a position of organizer, supervisor, or manager, and he must have obtained substantial income or resources from such conduct. 21 U.S.C. § 848(c).
Ulbricht argues (1) that the Indictment fails to allege sufficiently that he occupied the requisite position vis-a-vis five persons, and that, in this regard, the Government has failed to allege (and could not allege) that he acted in concert with the buyers and sellers on the site; and (2) that the Indictment fails to'enumerate a predicate series of violations. (Def.’s Mem. at 13.) Ulbricht is correct that Count Two does not explicitly identify the five individuals whom he is alleged to have organized, managed, or supervised. He similarly is correct that the Government has not specified the dates, times, or transaction details of the “series” of violations. Nonetheless, the allegations of the Indictment are sufficient. Paragraphs 11 and 12 recite the necessary statutory language to charge a continuing criminal enterprise; and the allegations set forth in Paragraphs 1 through 4 (which are incorporated by reference into Count Two) set forth necessary factual detail.
The law is clear that the Indictment should be read to incorporate those facts that while not explicitly stated, are implicit in the existing allegations. United States v. Silverman,
From these facts, the Government argues that by owning, operating, and controlling all aspects of the operation of the site (Ind. ¶¶ 2-3), Ulbricht occupied the necessary position as organizer, manager, or supervisor of the “vendors selling drugs on the site.” (Gov’t Opp’n at 15.) Ul-
The “continuing criminal enterprise” statute is broadly worded — and broadly intends to encompass those who are leaders of a criminal enterprise which engages in a series of violations of the narcotics laws. See United States v. Scarpa,
Here, Ulbricht also argues that he cannot have had the requisite role with respect to individuals who merely assisted him with administering the site. (Def.’s Mem. at 15.) This, however, is a; question of fact, not law. Whether those who assisted Ulbricht had the requisite mental state to be acting “in concert” with him is a factual inquiry. If those who assisted Ulbricht had the requisite state of mind, there is no legal reason why they could not constitute the necessary group of “five or more.”
Ulbricht argues that he cannot separately have had the requisite position vis-a-vis the buyers and sellers, as they are referred to as having “used” the site, and not, for instance, as employees. (Ind. ¶ 2).
Ulbricht also argues that Count Two fails to allege the specific series of continuing violations. The Indictment does allege thousands of separate transactions. (Ind. ¶ 2.) The type of specificity the defendant urges is not required. Flaharty,
VI. OTHER LEGAL ISSUES RAISED WITH REGARD TO COUNT THREE
The defendant argues that the allegations in the Indictment are insufficient to support the type of conduct covered by a computer hacking conspiracy in 18 U.S.C. § 1030 (the “Computer Fraud and Abuse Act”). (Def.’s Mem. at 21.) According to the defendant, the allegations are “only that the Silk Road website ‘provided a platform for the [exchange] of malicious software.’ ” (Id. (quoting a portion of the Indictment at ¶¶ 15-16).)
The Indictment in fact alleges more. It alleges that “Silk Road ... provided a platform for the purchase and sale of malicious software designed for computer hacking, such as password stealers, key-loggers, and remote access tools. While in operation, the Silk Road website regularly offered hundreds of listings for such products.” (Ind. ¶ 14.) It also alleges that the defendant conspired with others to “intentionally access computers without authorization, and thereby would and did obtain information from protected computers, for commercial advantage and private financial gain.” (Ind. ¶ 16.)
The defendant correctly states that to establish a violation of 18 U.S.C. § 1030(a)(2)(C) requires “proof that the defendant intentionally accessed information from a protected computer.” United States v. Willis,
It is, of course, axiomatic — as set forth at length above — that to charge a conspiracy the Government must allege that two or more people agreed to achieve an unlawful end. See Stavroulakis,
The defendant argues that the Government’s charge must fail as it relies upon a concept of “transferred intent” — that is,
As an initial matter, the law of conspiracy does not require that both participants intend to access a computer — but they must both intend that one of them will. Questions as to how the Government will prove its case as to the buyer’s intent are reserved for trial.
Ulbricht also'argues that the statutory term “access without authorization” is undefined. (Def.’s Mem. at 39-41) (discussing § 1030(a)(2)(C).) Describing the 1996 amendments to the statute and the addition of the term “any” to unauthorized access of computers over the Internet, the defendant argues that the “ubiquitous use of computers, smartphones, tablets, or any other Internet-enabled device in today’s world” places special emphasis on the meaning of the word “authorization” and may criminalize a broad amount of routine Internet' activity. (Id. at 41.) The Government counters this argument only in a footnote. (Gov’t Opp’n at 31 n. 10.)
The defendant’s argument is'misplaced, or at least premature. The term “authorization” has a plain and ordinary meaning and requires no special construction. That the statute may implicate a broad swath of conduct is an issue for Congress. Whether this issue has any special significance can only be determined at trial. That is, whether Ulbricht’s and his coconspirators’ alleged conduct falls into the suggested grey area must await the Government’s proof.
VII. THE “KITCHEN SINK” ARGUMENTS
Ulbricht also alleges that since his alleged conduct in Counts One, Two, and Three has never before been found to constitute the crimes charged, a variety of legal principles preclude criminal liability. Those principles include the rule of lenity,' the doctrine of constitutional avoidance, void-for-vagueness, and overbreadth. In addition, the defendant argues that the presence of a civil immunity statute for online providers indicates congressional “support for a free-wheeling [IJnternet, including one in which providers or users of interactive computer services can operate without fear of civil liability for the content posted by others.” (Def.’s Mem. at 28.) These arguments do not preclude the criminal charges here.
As an initial matter, as set forth above, the conduct charged fits within existing law. It is certainly true that case law to date has not been applied to the type of conduct that forms the basis for the Government’s charges
The defendant’s Kitchen Sink arguments are also premised on a view of his alleged conduct as being sufficiently common&emdash;i.e., that he is doing nothing more than that done by other designers and operators of online marketplaces&emdash;that he could not have known or been on notice of its illegality.
The Court disagrees. Again, on a motion to dismiss an indictment, the Court accepts as true the Government’s allegations; whether and how those allegations can be proven is not a question for this stage in the proceedings.
A. The Rule of Lenity and the Doctrine of Constitutional Avoidance
The defendant’s arguments with respect to the rule of lenity and the doctrine of constitutional avoidance are based on the incorrect premise that the statutes under which he has been charged in Counts One, Two, and Three are ambiguous when applied to his alleged conduct.
The rule of lenity provides that when a criminal statute is susceptible to two different interpretations-one more and one less favorable to the defendant-“leniency” requires that the court read it in the manner more favorable. See Rewis v. United States,
The rule of lenity is a principle of statutory construction: it comes into play only if and when there is ambiguity. United States v. Litchfield,
In Skilling v. United States,
Here, with regard to Counts One and Two, the defendant does not allege that a word or phrase in a statute requires construction or is susceptible to more than
Sections 841 and 846 are intended to cover conduct in which two or more people conspire to distribute or possess with the intent to distribute narcotics. If the Government can prove at trial that Ulbricht has the requisite intent, then these statutory provisions clearly prohibit his conduct. These statutory provisions do not, for instance, require that only one type of communication method be used between cocon-spirators (for instance, cellular telephone versus the Internet); they do not prescribe what the various roles of coconspira-tors must be or are limited to; and they have been applied in the past to individuals alleged to be middlemen in drug transactions. See generally Pitre,
The doctrine of constitutional avoidance provides that when a “statute is susceptible of two constructions, by one of which grave and doubtful constitutional questions arise and by the other of which such questions are avoided, [a court’s] duty is to accept the latter.” United States ex rel. Attorney General v. Del. & Hudson Co.,
This doctrine is inapplicable for the same reason as the rule of lenity: there is no ambiguity; the Court is not struggling with dueling interpretations as to whether the alleged conduct, if proven, would be covered. Thus, there are no grave constitutional issues on either side of this question.
B. Void-for-Vagueness and Constitutional Overbreadth
The defendant also argues that the statutes, as applied to his conduct in particular, are, void on the basis that they are either unconstitutionally vague or overbroad. (Def.’s Mem. at 32-38.) The Court disagrees.
The void-for-vagueness doctrine is inapplicable. It addresses concerns regarding (1) fair notice and (2) arbitrary • and discriminatory prosecutions. Skilling,
The Government argues that this prosecution is not particularly novel. “[B]oth the narcotics conspiracy statute and continuing criminal enterprise statute have specifically been applied in a previous prosecution of defendants involved in operating online marketplaces for illegal drugs.” (Gov’t Opp’n at 30.) “[T]he computer hacking statute has previously been
As the Supreme Court has recognized, however, “due process requirements are not designed to convert into a constitutional dilemma the practical difficulties in drawing criminal statutes both general enough to take into account a variety of human conduct and sufficiently specific to provide fair warning that certain kinds of conduct are prohibited.” United States v. Lanier,
Ulbricht álso argues that his alleged conduct also constitutes protected free speech and that the imposition of criminal liability would be overbroad as applied. (Def.’s Mem. at 35-38.) This argument stems from an incorrect premise as to the nature of the criminal charges here.
The defendant does not explain how such conduct could amount to protected speech; even if this Court were to agree that such conduct has a speech element, the law is clear that speech which is part of a crime is not somehow immunized. See United States v. Rahman,
The thrust of the defendant’s over-breadth argument appears to be similar to his vagueness, constitutional avoidance, and rule of lenity claims. All are premised in part on the incorrect view that the challenged conduct occurs on a regular basis by many people, that therefore enforcing these criminal statutes as to Ul-bricht amounts to arbitrary enforcement and that the umbrella or tent of the statutes would be stretched beyond reason in order to encompass the alleged conduct.
For all of the reasons set forth above, this is incorrect.
C. Civil Immunity for Online Service Providers
The defendant argues that the existence of a civil statute for certain types of immunity for online service providers expresses a congressional intent to immunize conduct akin to that in which Ulbricht is alleged to have engaged. This Court disagrees. Even a quick reading of the statute makes it clear that it is not intended to apply to the type of intentional and criminal acts alleged to have occurred here. See 47 U.S.C. § 230. It is inapplicable.
VIII. COUNT FOUR
Count Four charges the defendant with participation in a money laundering
It was a part and an object of the conspiracy that ... the defendant, and others known and unknown, ... knowing that the property involved in certain financial transactions represented proceeds of some form of unlawful activity, would and did conduct and attempt to conduct such financial transactions, which in fact involved the proceeds of specified unlawful activity, to wit, narcotics trafficking and computer hacking ... with the intent to promote the carrying on of such unspecified unlawful activity ....
(Ind. ¶ 20.) The defendant argues that the factual allegation that Bitcoins constituted the exclusive “payment system that served to facilitate [] illegal commerce” on Silk Road cannot constitute the requisite “financial transaction.” (Def.’s Mem. at 3, 45.) The Court disagrees.
As an initial matter, an allegation that Bitcoins are used as a payment system is insufficient in and of itself to state a claim for money laundering. The fact that Bit-coins allow for anonymous transactions does not ipso facto mean that those transactions relate to unlawful activities. The anonymity by itself is not a crime. Rather, Bitcoins are alleged here to be the medium of exchange — just as dollars or Euros could be — in financial transactions relating to the unlawful activities of narcotics trafficking and computer hacking. It is the system of payment designed specifically to shield the proceeds from third party discovery of their unlawful origin that forms the unlawful basis of the money laundering charge.
The money laundering statute defines a “financial transaction” as involving, inter alia, “the movement of funds by wire or other means, or [] involving one or more monetary instruments, [ ] or involving the transfer of title to any real property, vehicle, vessel, or aircraft.” 18 U.S.C. § 1956(c)(4). The term “monetary instrument” is defined.as the coin or currency of a country, personal checks, bank checks, and money orders, or investment securities or negotiable instruments. 18 U.S.C. § 1956(c)(5).
The defendant argues that because Bit-coins are not monetary instruments, transactions involving Bitcoins cannot form the basis for a money laundering conspiracy. He notes that the IRS has announced that it treats virtual currency as property and not as currency. (Def.’s Mem. at 46-47 (citing I.R.S. Notice 2014-21, http://www. irs.gov/pub/irs-drop/n-14-21.pdf, and U.S. Dep’t of Treasury, Fin. Crimes Enforcement Network (“FinCEN”), “Guidance, Application of FinCEN’s Regulations to Persons Administering, Exchanging, or Using Virtual Currencies,” March 18, 2013, http://www.fincen.gov/statutes_regs/ guidanee/html/FIÑ-2013-G001.html).)
The defendant argues that virtual currencies have some but not all of the attributes of currencies of national governments and that virtual currencies do not have legal tender status. (See id. at 45^16.) In fact, neither the IRS nor FinCEN purport to amend the money laundering statute (nor could they). In any event, neither the IRS nor FinCEN has addressed the question of whether a “financial transaction” can occur with Bitcoins. This Court refers back to the money laundering statute itself and case law interpreting the statute.
Put simply, “funds” can be used to pay for things in the colloquial sense. Bitcoins can be either used directly to pay for certain things or can act as a medium of exchange and be converted into a currency which can pay for things. See Bitcoin, https://bitcoin.org/en (last visited July 3, 2014); 8 Things You Can Buy With Bit-coins Right Now, CNN Money, http:// money.cnn.com/gallery/technology/2013/ll/ 25/buy-with-bitcoin/ (last visited July 3, 2014). Indeed, the only value for Bitcoin lies in its ability to pay for things — it is digital and has no earthly form; it cannot be put on a shelf and looked at or collected in a nice display case. Its form is digital— bits and bytes that together constitute something of value. And they may be bought and sold using legal tender. See How to Use Bitcoin, https://bitcoin.org/en/ getting-started (last visited July 3, 2014). Sellers using Silk Road are not alleged to have given their narcotics and malicious software away for free — they are alleged to have sold them.
The money laundering statute is broad enough to encompass use of Bitcoins in financial transactions. Any other reading would — in light of Bitcoins’ sole raison d’etre — be nonsensical. Congress intended to prevent criminals from finding ways to wash the proceeds of criminal activity by transferring proceeds to other similar or different items that store significant value. With respect to this case, the Government has alleged that Bitcoins have a value which may be expressed in dollars. (Ind. ¶ 3 (alleging that Ulbricht “reaped commissions worth tens of millions of dollars, generated from the illicit sales conducted through the site”).)
There is no doubt that if a narcotics transaction was paid for in cash, which was later exchanged for gold, and then converted back to cash, that would constitute a money laundering transaction. See, e.g., United States v. Day,
One can money launder using Bitcoin. The defendant’s motion as to Count Four is therefore denied.
IX. CONCLUSION
For the reasons set forth above, the defendant’s motion to dismiss is DENIED in its entirety. The clerk of the Court is directed to terminate the motion at ECF No. 19.
SO ORDERED.
Notes
. This Opinion & Order addresses various issues both as background informing its decision herein and to preview for the parties a number of issues that are relevant to the trial of this matter.
. There is no overt act requirement to establish a violation of a drug conspiracy prosecuted under 21 U.S.C. § 846. See United States v. Shabani,
. In Rosenblatt, the Second Circuit overturned a conspiracy conviction on the basis that while two individuals agreed to commit offenses against the United States, they did not agree to commit the same offenses and therefore were not conspirators.
.A defendant may also be found culpable under the conscious avoidance doctrine. Under such circumstances, a crime’s “knowledge element is established if the factfinder is persuaded that the defendant consciously avoided learning [a given] fact while aware of a high probability of its existence, unless the factfinder is persuaded that the defendant actually believed the contrary.” United States v.
. The extreme ends of such a conspiracy — for instance, numerous narcotics dealers who
. While the defendant refers to Amazon and eBay as similar, there are certain important factual differences between them. For instance, Amazon has warehouses which may fulfill certain orders. . Silk Road is not alleged to have ever possessed products for fulfillment.
. There are additional complexities when other factors such as differences in types of drugs, temporal proximity, and the roles of coconspirators are taken into account. These too are questions for trial,
. As suggested in connection with Question One, another question is whether the Day 2 and the Day 300 trafficker could ever enter into a conspiracy with each other.
. Acceptance of the terms of service, the payment of commissions, placing Bitcoins in escrow, and other intervening steps involved in the transactions that allegedly occurred on Silk Road could, in this regard, perhaps constitute evidence that Silk Road users entered into an unlawful conspiracy with Ulbricht (and others). It will be for the Government to prove which conduct in fact occurred, and how, at trial. See, e.g., United States v. Lorenzo,
. The defendant argues that imposing criminal liability for Ulbricht’s alleged conduct would constitute "an unprecedented and extraordinarily expansive theory of vicarious liability.” (Def.’s Mem. at 1.) This is incorrect. The Government alleges direct — not indirect — participation in the crimes charged. The law of conspiracy (see supra) has long recognized the many varied roles participants may play.
. Conduct demonstrating that an individual merely helps a willing buyer find a willing seller, and is therefore acting as a mere "steerer,” is, without more, insufficient to establish a conspiratorial agreement. See United States v. Tyler,
. Ulbricht also argues that he cannot have engaged in a CCE merely by aiding and abetting drug dealers. This is not, however, the Government's allegation. The Government contends that Ulbricht was the leader of a vast criminal enterprise.
. The defendant’s arguments that potentially lawful uses of malicious software also fail. There are numerous examples of lawful products put to unlawful use, resulting in criminal liability. See, e.g., United States v. Zambrano,
. The Government argues that a conspiracy and CCE have previously been charged in the context of online marketplaces. (Gov’t'Mem. at 30.) Those cases have entirely different facts from those alleged here.
. As discussed supra, the defendant does argue ambiguity with regard to aspects of § 1030; as the Court has stated, whether that alleged ambiguity (or really, breadth) plays any role here is a question for trial.
. Recently, the U.S. Government auctioned off nearly 30,000 Bitcoins as part of a civil forfeiture proceeding related to Silk Road. See Sydney Ember, After Bitcoin Auction, Winning Bidders Remain Elusive, N.Y. Times De-albook (June 30, 2014 6:59 P.M.), http:// dealbook.n34imes.com/2014/06/30/after-bitcom-auction-winning-bidders-remain-elusive/?_php=true_type=blogs&_r=0.
