While the FBI is currently immersed in their publicized dispute with Apple, their issue with privacy and their accessibility to encrypted systems has taken another path. Recently, the FBI had security researchers reveal their findings of the TOR (The Onion Router) to follow the trace of its users digital steps, according to BBC reports. Two of the researchers hone from Carnegie Mellon University and after their compliance to the court order issued, the FBI has identified the IP address of Brian Farrell. Farrell’s detainment was in 2015 for being suspected of running the Silk Road 2.0 darknet site which the FBI believes to sell illegal drugs and other illegal substances. Farrell denies the claims of the FBI and is now awaiting trial. Until learning that the NSA has the capability to crack TOR by viewing exit node traffic, it was believed that the network had digitally non traceable internet access. However, the FBI is not new to visiting the darknet. Last week, a federal judge made demands for the FBI to provide their source code that allows hacking into TOR software and this case has made a startling discovery: A site having images and videos of child sexual exploitation being run from FBI servers in Virginia. More than likely, the FBI would have not revealed this information without the court ordered issued to reveal how they gained access to TOR data. What is becoming obvious is that this news for the FBI is coming at a time of difficulty and may cause additional friction with their dispute with Apple to gain access to users’ data.