> This is a common LEO practice called "parallel construction" that is used when they don't want to tell you how they actually acquired evidence.
Aside from “if it was parallel cobstruction, the documents obviously wouldn’t reflect it” (which is true but not evidence), what os the evidence of parallel cobstruction here?
> There are three ways they have the key:
There are a lot more than your three:
> 1. A non-FBI intelligence agency hacked a computer containing the private key.
> 2. A US intelligence agency physically beat it out of an American.
> 3. A non-US intelligence agency physically beat it out of a non-American.
1a. remove non- before FBI in 1.
2a/3a. Swap US and non-US in 2/3 (US intelligence agencies operate abroad and vice versa).
4. An agent of US intelligence infiltrated DarkSide and got access to the key without beating it out of anyone.
5. #4, but An agent of non-US intelligence did the same. The sponsoring nation provided the info to the US for foreign relations reasons.
6. A foreign intelligence service had contact with DarkSide and, for reasons, requested (likely with additional threat or inducement, express or implied) the information and that the funds be left there, and provided it to the FBI.