BTCC / BTCC Square / Cryptonews /
DOJ Fumbles Key Telegram Evidence in Tornado Cash Case—Dev Storm Calls Out Blunder

DOJ Fumbles Key Telegram Evidence in Tornado Cash Case—Dev Storm Calls Out Blunder

Author:
Cryptonews
Published:
2025-07-14 08:58:10
15
2

Privacy protocol drama turns procedural as Tornado Cash developer Alexey Pertsev (aka 'Storm') slams DOJ's mishandling of Telegram evidence. The feds' crypto-crime case might be leaking like a defective smart contract.


Encryption ≠ Evidence Destruction

Pertsev's legal team claims prosecutors butchered critical Telegram communications—the digital equivalent of losing the murder weapon. Without chain-of-custody integrity, the case resembles a rug pull waiting to happen.


Regulators vs. Code Warriors

This latest blunder fuels the crypto community's favorite narrative: bureaucrats can't tell a hash from a hashtag. Meanwhile, Wall Street still thinks Tornado Cash is a new ETF.

Tornado Cash Developer Storm Claims DOJ Bungled Critical Telegram Evidence

Source: Court Listener

Defense attorneys revealed the message was actually written by Andrew Thurman, a former CoinDesk senior tech reporter, then forwarded to a Tornado Cash chat by Pertsev.

The revelation emerged just days before Storm’s trial on charges of conspiracy to commit money laundering and sanctions violations related to Tornado Cash, which allegedly facilitated over $1 billion in illicit transactions.

Government’s Evidence Chain Under Tight Scrutiny

The controversy stems from Dutch authorities’ extraction of what prosecutors claim is Pertsev’s phone following his arrest in the Netherlands, where he was sentenced to 64 months in prison for money laundering through Tornado Cash.

⚖DOJ pursues federal charges against Roman Storm, cofounder of Tornado Cash, after dropping unlicensed money transmission charge.#TornadoCash #RomanStorm https://t.co/ZGXe7IGREZ

— Cryptonews.com (@cryptonews) May 16, 2025

Storm’s defense argues that the government’s extraction contains multiple fatal flaws, including missing author information for forwarded Telegram messages and incomplete file retrieval by FBI Agent Dickerman from Dutch authorities.

The defense contends that prosecutors cannot authenticate the extraction’s completeness because they were limited in what files they could obtain from Dutch law enforcement.

This authentication challenge becomes more significant given that the government admitted in court filings that its original September 2023 production of extracted text messages to the defense did not include “forwarded” tags on forwarded messages.

Prosecutors provided a corrected version in December 2024, which they plan to use at trial, but defense attorneys argue this timeline raises serious questions about the government’s handling of evidence.

The misattribution carried real consequences in court proceedings when Assistant U.S. Attorney Ben Arad referenced the message during a July 8 pretrial hearing, telling the judge it demonstrated the co-founders’ awareness of wrongdoing.

According to the hearing transcript, Arad told the court: “For example, when the Ronin hack happened, one of the co-conspirators asked, sum and substance, I’d like to ask you some questions about how you go about laundering $600 million worth of stolen crypto.”

The defense characterized this as providing “false information” to both the court and potentially the grand jury that issued the indictment.

Defense attorneys wrote in their filing: “Given that the government mistakenly attributed the reporter’s Telegram message to Pertsev at the Pretrial Conference, it appears that the government itself was unaware of this issue until the defense raised it.”

Enforcement Challenges Echo Across Crypto Cases

The evidence dispute highlights a pattern of prosecutorial challenges emerging across high-profile cryptocurrency cases, particularly when international evidence gathering intersects with complex digital communications.

Just last month, the DOJ faced similar authentication issues in the case of Russian crypto CEO Iurii Gugnin, who was charged with orchestrating a $530 million fraud scheme through his Miami-based platform Evita.

🇷🇺A Russian crypto firm CEO used his crypto company, Evita, to funnel $530 million of overseas payments via US banks and crypto platforms.#Evita #CryptoFraud #IuriiGugninhttps://t.co/hk5kgucF95

— Cryptonews.com (@cryptonews) June 10, 2025

That case also involved cross-border evidence collection and questions about the authenticity of digital communications used to establish criminal intent.

Storm’s defense has consistently argued that the case threatens to criminalize open-source software development, with the ethereum Foundation pledging $500,000 toward his legal defense and matching up to $750,000 in community contributions.

As part of the DOJ’s crypto fraud crackdown, the recently seized $225 million in USDT was linked to a global “pig butchering” scam that defrauded over 400 victims through a network of international exchanges and wallets.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users