DOJ Says Bitcoin Developers Won’t Be Targeted for Neutral Code, Patel Shifts FBI to Crypto Scams
Bitcoin Developers Are Not Federal Targets, Blanche and Patel Say at Las Vegas Conference
U.S. officials gave open-source Bitcoin and crypto developers a rare bit of clarity in Las Vegas: writing code is not the crime, unless you knowingly help criminals use it that way.
- DOJ softens stance: no more “regulation by prosecution” for neutral code
- FBI changes focus: scam networks and fraud farms over coders
- Not a blanket shield: money laundering and sanctions violations still count
- Tornado Cash still looms: Roman Storm’s retrial remains the big legal test
At the Bitcoin 2026 Conference in Las Vegas on April 27, Acting Attorney General Todd Blanche and FBI Director Kash Patel delivered what amounts to the clearest federal reassurance yet for Bitcoin developers and open-source crypto builders who have spent years watching U.S. enforcement creep toward software itself.
Blanche said developers who write software without knowingly helping third parties commit crimes should not be investigated or charged. That is a meaningful shift from the old “regulation by prosecution” model, where the government often seemed to prefer making examples of builders instead of writing clear rules. Blanche said the DOJ’s change in approach had “fundamentally changed the game.”
He also made sure nobody heard “developer protection” as “get-out-of-jail-free card.” Criminal behavior still matters, and the DOJ is not pretending otherwise.
“If you are developing software, if you are a coder, if you are part of that process and you are not the third-party user and you are not helping and knowing the third party is using what you develop to commit crimes, you are not going to be investigated and not going to be charged.”
“The mere fact that you happen to be a coder doesn’t excuse you from criminal liability.”
That distinction is the whole ballgame. Open-source publishing and neutral software development are not the same thing as laundering money, helping sanctioned entities move funds, or knowingly facilitating fraud. Simple enough, right? Apparently not for half the policy class that has spent years acting like code itself was contraband.
What Patel Said About Bitcoin and Crypto Crime
Patel’s remarks pushed the conversation in a different direction: away from developers and toward the actual criminals making the ecosystem look bad. He said Bitcoin “isn’t going anywhere” and described it as economic infrastructure. That is a notable admission from the head of the FBI, because it treats Bitcoin as a lasting financial rail rather than a passing speculative fad.
He also said the bureau is putting more attention on crypto fraud networks, especially the pig-butchering scam machine that has become one of the ugliest abuses in the industry.
Pig-butchering scams are long-con fraud schemes where criminals build trust with victims over time, often through romance, friendship, or fake investment advice, before slowly steering them into fraudulent crypto platforms. The result is usually the same: victims get drained, wallets get emptied, and somebody halfway around the world gets richer by being a complete parasite.
Patel said he plans to travel to Cambodia, Myanmar, and Thailand to support enforcement efforts tied to these operations. That is where law enforcement should be aiming its boot: at organized scam compounds, laundering networks, and the people using crypto rails to rip off ordinary users.
Why Developers Have Been Nervous
The concern around Bitcoin developers, Ethereum developers, and other open-source crypto engineers did not come out of nowhere. For years, the fear has been that prosecutors could blur the line between writing software and endorsing every possible use of that software. That kind of logic creates a chilling effect fast.
If a developer can be dragged into a federal case because someone else misused a neutral tool, then open-source development becomes a legal minefield. Privacy tools, self-custody software, and other permissionless systems become harder to build, harder to maintain, and easier for institutions to pressure into mediocrity. That is bad for Bitcoin, bad for privacy, and bad for the basic idea that people should be able to publish code without being treated like they personally masterminded every downstream misuse.
Blanche’s comments fit into that broader fight. He tied them to a DOJ policy shift he put in motion in April 2025, when he was serving as Deputy Attorney General.
That memo rejected “regulation by prosecution,” disbanded the National Cryptocurrency Enforcement Team, and told prosecutors to pull back from targeting developers of neutral tools later used by others. In plain English: stop pretending every open-source coder is a shadow financier just because some bad actor used their software.
The policy shift matters because Bitcoin and crypto do not just need price action and adoption hype. They need legal certainty. Without it, developers start self-censoring, projects slow down, and the entire permissionless model gets sandblasted by uncertainty.
Why Tornado Cash Still Matters
The biggest unresolved test is still Tornado Cash and its co-founder Roman Storm.
Tornado Cash is a crypto mixing protocol, which means it was designed to help obscure transaction trails for privacy purposes. That makes it a lightning rod in the debate over whether privacy-preserving software is legitimate infrastructure or a criminal tool. The answer, inconveniently for some policymakers, is that it can be both depending on who is using it and why.
Blanche’s DOJ memo was cited when charges against Storm were narrowed. Storm was convicted in August 2025 of operating an unlicensed money transmitter — meaning he was accused of running a business that moved money for others without the required federal license. The jury deadlocked on two much more serious charges: money laundering and sanctions violations.
Those unresolved counts are serious business. Money laundering means helping disguise criminal proceeds. Sanctions violations mean helping restricted people or entities move money in violation of U.S. rules. The two charges carry up to 40 years in federal prison, which is not exactly a slap on the wrist and a sternly worded email.
The U.S. Attorney’s Office for the Southern District of New York has already filed for an October retrial on the unresolved charges. So while Blanche’s comments suggest a softer federal stance, they do not magically erase the Storm case. The courtroom still gets the final say, and that is where the real test will happen.
The Unresolved Legal Line
Peter Van Valkenburgh of Coin Center welcomed the shift but said the big question remains: where exactly is the line between publishing open-source code and having “actionable knowledge” of wrongdoing?
That is the phrase prosecutors love, because it sounds tidy while staying maddeningly vague in practice. The government may say it will not target coders for neutral tools, but the enforcement question is whether “knowing” a tool might be used for crime becomes enough to create liability. That is where things get messy, and where many developers quite reasonably start asking whether they are one bad headline away from a federal case.
Coinbase Chief Legal Officer Paul Grewal, who moderated the discussion, captured the broader principle pretty cleanly:
“crime is criminal; code alone shouldn’t be”
That should not be a controversial idea, and yet here we are. Code is a tool. Tools can be used for lawful privacy, financial freedom, and censorship resistance. They can also be abused by scammers, sanctions dodgers, and the usual collection of opportunists who see open infrastructure and think “free money.” Both things can be true at once, which is exactly why blanket anti-developer fearmongering is lazy and dishonest.
What This Means for Bitcoin and Open-Source Crypto
The best-case reading is simple: the federal government is finally backing away from the idea that writing neutral code makes you a target by default. That would be a big win for Bitcoin developers, open-source crypto software, and anyone building self-custody tools, privacy-preserving systems, or decentralized infrastructure.
The more cautious reading is that officials are improving their messaging while keeping plenty of room for aggressive enforcement when they want it. That is not paranoia; that is just how legal systems work when the rules are fuzzy and prosecutors have broad discretion. If you want fewer chilling effects, you need more than a conference appearance and a friendlier tone. You need durable legal boundaries.
Patel’s focus on pig-butchering scams is the right kind of enforcement emphasis. Chase the fraud farms. Chase the laundering pipelines. Chase the organized crime networks using crypto as plumbing for theft. Do not waste time trying to criminalize the existence of open-source developers because the software they wrote was later used by somebody else to do something rotten.
That balance is the hard part, and it is exactly where U.S. crypto policy has been a mess for years. Bitcoin needs room to breathe, and so do the developers building the software that makes decentralized systems usable in the first place. If the government is serious about protecting innovation, it should stop treating neutral code like a conspiracy theory with a GitHub account.
Key Questions and Answers
Are Bitcoin developers being targeted just for writing code?
No, at least not according to Todd Blanche’s comments. He said developers should not be investigated or charged if they are not knowingly helping crimes happen.
Does this mean crypto developers are immune from prosecution?
No. Blanche made clear that criminal conduct still applies. If someone knowingly helps with money laundering, sanctions evasion, or other crimes, they can still be charged.
What is the DOJ’s new stance on crypto enforcement?
Blanche described it as a move away from “regulation by prosecution” and toward a narrower focus on actual wrongdoing rather than neutral software development.
What is the FBI focusing on instead?
Kash Patel said the FBI is prioritizing crypto fraud networks, especially pig-butchering scam operations in Southeast Asia.
Why does Roman Storm’s case matter?
It is one of the most important tests of developer liability in crypto. The retrial could show whether the government’s softer language changes how courts handle open-source privacy tools.
What does “unlicensed money transmitter” mean?
It refers to a person or business accused of moving money for others without the required federal license.
Are sanctions violations still a serious issue?
Yes. Helping restricted individuals or entities move money despite U.S. restrictions remains a major federal crime.
Is this a real policy change or just nicer rhetoric?
It looks like a genuine shift in tone and priorities, but the real proof will come from how the DOJ handles ongoing cases and future prosecutions.
The federal message from Las Vegas is unusually clear for once: Bitcoin developers are not supposed to be the fall guys for every bad actor who abuses open-source software. That is a welcome change. Now the government has to prove it means what it says, rather than just saying the right thing while keeping the old traps in place.