Docstoc

Ryan Loskarn Search Warrant Unsealed

Document Sample
Ryan Loskarn Search Warrant Unsealed Powered By Docstoc
					                      Case 1:13-mj-00919-JMF
AO 106 (Rev. 04/10) Application for a Search Warrant            Document 1 Filed 12/10/13 Page 1 of 1


                                     UNITED STATES DISTRICT COURT
                                                                     for the
                                                            District of Columbia
                                                      __________ District of __________                             SEALED
             In the Matter of the Search of                             )
         (Briefly describe the property to be searched                  )
          or identify the person by name and address)                   )         Case No.
     1804 Burke Street SE, Washington, DC 20003                         )
                                                                        )
                                                                        )

                                           APPLICATION FOR A SEARCH WARRANT
        I, a federal law enforcement officer or an attorney for the government, request a search warrant and state under
penalty of perjury that I have reason to believe that on the following person or property (identify the person or describe the
property to be searched and give its location):
 See Attachment A.


located in the                                    District of               Columbia           , there is now concealed (identify the
person or describe the property to be seized):
 See Attachment B.


          The basis for the search under Fed. R. Crim. P. 41(c) is (check one or more):
               ✔ evidence of a crime;
               ✔ contraband, fruits of crime, or other items illegally possessed;
                 ✔ property designed for use, intended for use, or used in committing a crime;
                    a person to be arrested or a person who is unlawfully restrained.
          The search is related to a violation of:
            Code Section                                                          Offense Description
        18 U.S.C. section 2252                     receipt, possession, distribution, or transport of child pornography
        18 U.S.C. section 2252A

          The application is based on these facts:
        See attached Affidavit of Inspector Brian Bone


          ✔ Continued on the attached sheet.
              Delayed notice of       days (give exact ending date if more than 30 days:                               ) is requested
              under 18 U.S.C. § 3103a, the basis of which is set forth on the attached sheet.

                                                                                 Sworn to before me telephonically s/Brian Bone
                                                                                              Applicant’s signature

                                                                                 Inspector Brian, U.S. Postal Inspection Service
                                                                                              Printed name and title

Sworn to before me and signed in my presence.

Date:            12/10/2013                                                                    s/John M. Facciola
                                                                                                Judge’s signature

City and state: Washington, District of Columbia                                 Honorable John M. Facciola, Magistrate Judge
                                                                                              Printed name and title
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 1 of 43



                            AFFIDAVIT IN SUPPORT OF
                     AN APPLICATION FOR A SEARCH WARRANT

       I, Brian Bone, a Postal Inspector with the United States Postal Inspection Service, being

duly sworn, depose and state as follows:

                                           INTRODUCTION

       1.      I am an Inspector with the United States Postal Inspection Service (“USPIS”). I

have been so employed since approximately February 2007. I am assigned to the U.S.

Department of Justice Child Exploitation and Obscenity Section in Washington, D.C. During

my tenure with the USPIS, I have directed and/or participated in numerous investigations

involving crimes against children facilitated by means of computers and/or the Internet. Prior to

becoming a Postal Inspector, I worked as a sworn law enforcement officer within the State of

Illinois for over eight years and was employed during that time by the Office of the State’s

Attorney, Lake County, Illinois, and the Office of the Sheriff, Lake County, Illinois. In this

position, I was assigned to the Cyber Crimes Division and the Child Exploitation Unit, which

investigated child exploitation related offenses and various computer related crimes. I have

received extensive training in computer forensics and digital investigations from the Treasury

Computer Forensic Training Program, National White Collar Crime Center, and the International

Association of Computer Investigative Specialists (“IACIS”), including specialized training on

digital data recovery, and the investigation and analysis of e-mail communications and Internet

activities, such as instant messaging programs, peer to peer file trading, newsgroups, and forums.

I have also received training on the use of specialized forensic software programs, including I-

Look, Encase by Guidance Software, and Forensic Tool Kit by Access Data. I investigate

criminal violations relating to child exploitation and child pornography, including violations
            Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 2 of 43



pertaining to the illegal production, distribution, receipt and possession of child pornography, in

violation of 18 U.S.C. §§ 2251, 2252 and 2252A.

        2.       As a Postal Inspector, I am authorized to investigate violations of the laws of the

United States and to execute warrants issued under the authority of the United States.

        3.       I am investigating the activities of Jesse Ryan Loskarn and the Internet account

registered to Jesse Ryan Loskarn at 1804 Burke Street SE, Washington, District of Columbia

(hereinafter “Target Residence”). As will be shown below, there is probable cause to believe

that someone using the Internet account registered to Jesse Ryan Loskarn at the Target Residence

has received, possessed, distributed, or transported child pornography, or attempted to do so, in

violation of 18 U.S.C. §§ 2252 and 2252A. I submit this application and affidavit in support of a

warrant authorizing a search of the Target Residence, as further described in Attachments A and

B. Located within the premises to be searched, I seek to seize evidence, fruits, and

instrumentalities of the forgoing criminal violations, which relate to the knowing transportation,

shipment, receipt, possession, distribution, and reproduction of child pornography. I request

authority to search the entire premises, including the residential dwelling and any computer and

computer media located therein where the items specified in Attachment B may be found, and to

seize all items listed in Attachment B as instrumentalities, fruits, and evidence of criminal

activity.

        4.       This Affidavit is based in part on information that I learned from discussions with

other law enforcement officers and on my own investigation of this matter. Since this affidavit is

being submitted for the limited purpose of securing a search warrant, I have not included each

and every fact known to me concerning this investigation. I have set forth only the facts that I

believe are necessary to establish probable cause to believe that evidence, fruits, and




                                                   2
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 3 of 43



instrumentalities of violations of 18 U.S.C. §§ 2252 and 2252A, are currently located at 1804

Burke Street SE, Washington, District of Columbia.

                                      STATUTORY AUTHORITY

       5.      This investigation concerns alleged violations of 18 U.S.C. §§ 2252 and 2252A,

relating to material involving the sexual exploitation of minors.

       6.      18 U.S.C. §§ 2252 and 2252A prohibit a person from knowingly possessing or

accessing sexually explicit images (child pornography) with the intent to view them as well as

transporting, receiving, or distributing in interstate or foreign commerce, or by using any facility

or means of interstate or foreign commerce, any visual depiction of minors engaging in sexually

explicit conduct (child pornography), or attempting to do so.

                                             DEFINITIONS

       7.      The following definitions apply to this Affidavit and Attachment B:

               a. “Child Pornography” includes the definition in 18 U.S.C. § 2256(8) (any visual

       depiction of sexually explicit conduct where (a) the production of the visual depiction

       involved the use of a minor engaged in sexually explicit conduct, (b) the visual depiction

       is a digital image, computer image, or computer-generated image that is, or is

       indistinguishable from, that of a minor engaged in sexually explicit conduct, or (c) the

       visual depiction has been created, adapted, or modified to appear that an identifiable

       minor is engaged in sexually explicit conduct).

               b. “Visual depictions” include undeveloped film and videotape, and data stored

       on computer disk or by electronic means, which is capable of conversion into a visual

       image. See 18 U.S.C. § 2256(5).

               c. “Child Erotica” means materials or items that are sexually arousing to persons




                                                 3
 Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 4 of 43



having a sexual interest in minors but that are not, in and of themselves, obscene or that

do not necessarily depict minors in sexually explicit poses or positions.

       d. “Minor” means any person under the age of eighteen years. See 18 U.S.C. §

2256(1).

       e. “Sexually explicit conduct” means actual or simulated (a) sexual intercourse,

including genital-genital, oral-genital, or oral-anal, whether between persons of the same

or opposite sex; (b) bestiality; (c) masturbation; (d) sadistic or masochistic abuse; or (e)

lascivious exhibition of the genitals or pubic area of any person. See 18 U.S.C. §

2256(2).

       f. “Computer” refers to “an electronic, magnetic, optical, electrochemical, or

other high speed data processing device performing logical or storage functions, and

includes any data storage facility or communications facility directly related to or

operating in conjunction with such device.” See 18 U.S.C. § 1030(e)(1).

       g. “Computer hardware” consists of all equipment that can receive, capture,

collect, analyze, create, display, convert, store, conceal, or transmit electronic, magnetic,

or similar computer impulses or data. Computer hardware includes any data-processing

devices (including, but not limited to, central processing units, internal and peripheral

storage devices such as fixed disks, external hard drives, floppy disk drives and diskettes,

and other memory storage devices); peripheral input/output devices (including, but not

limited to, keyboards, printers, video display monitors, and related communications

devices such as cables and connections); as well as any devices, mechanisms, or parts

that can be used to restrict access to computer hardware (including, but not limited to,

physical keys and locks).




                                          4
 Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 5 of 43



        h. “Computer passwords and data security devices” consist of information or

items designed to restrict access to or hide computer software, documentation, or data.

Data security devices may consist of hardware, software, or other programming code. A

password (a string of alpha-numeric characters) usually operates what might be termed a

digital key to “unlock” particular data security devices. Data security hardware may

include encryption devices, chips, and circuit boards. Data security software of digital

code may include programming code that creates “test” keys or “hot” keys, which

perform certain pre-set security functions when touched. Data security software or code

may also encrypt, compress, hide, or “booby-trap” protected data to make it inaccessible

or unusable, as well as reverse the progress to restore it.

        i. “Computer-related documentation” consists of written, recorded, printed, or

electronically stored material that explains or illustrates how to configure or use computer

hardware, computer software, or other related items.

        j. “Computer software” is digital information that can be interpreted by a

computer and any of its related components to direct the way it works. Computer

software is stored in electronic, magnetic, or other digital form. It commonly includes

programs to run operating systems, applications, and utilities.

        k. “Internet Protocol address” or “IP address” refers to a unique number used by

a computer to access the Internet. IP addresses can be dynamic, meaning that the Internet

Service Provider (ISP) assigns a different unique number to a computer every time it

accesses the Internet. IP addresses might also be static, if an ISP assigns a user’s

computer a particular IP address that is used each time the computer accesses the

Internet.




                                          5
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 6 of 43



              l. “Peer-to-peer file-sharing” (“P2P”) is a method of communication available to

       Internet users through the use of special software. Computers linked together through the

       Internet using this software form a network that allows for the sharing of digital files

       between users on the network. A user first obtains the P2P software, which can be

       downloaded from the Internet. In general, P2P software allows the user to set up files on

       a computer to be shared with others running compatible P2P software. A user obtains

       files by opening the P2P software on the user’s computer, and conducting searches for

       files that are currently being shared on another user’s computer.

              m. The terms “records,” “documents,” and “materials” include all information

       recorded in any form, visual or aural, and by any means, whether in handmade form

       (including, but not limited to, writings, drawings, painting), photographic form

       (including, but not limited to, microfilm, microfiche, prints, slides, negatives, videotapes,

       motion pictures, photocopies); mechanical form (including, but not limited to,

       phonograph records, printing, typing); or electrical, electronic or magnetic form

       (including, but not limited to, tape recordings, cassettes, compact discs, electronic or

       magnetic storage devices such as floppy diskettes, hard disks, CD-ROMs, digital video

       disks (“DVDs”), Personal Digital Assistants (“PDAs”), Multi Media Cards (“MMCs”),

       memory sticks, optical disks, printer buffers, smart cards, memory calculators, electronic

       dialers, Bernoulli drives, or electronic notebooks, as well as digital data files and

       printouts or readouts from any magnetic, electrical or electronic storage device).

               BACKGROUND ON COMPUTERS AND CHILD PORNOGRAPHY

       8.     Based on my knowledge, training, and experience in child exploitation and child

pornography investigations, and the experience and training of other law enforcement officers




                                                 6
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 7 of 43



with whom I have had discussions, computers, computer technology, and the Internet have

revolutionized the manner in which child pornography is produced and distributed.

       9.      Computers basically serve five functions in connection with child pornography:

production, communication, distribution, storage, and social networking.

       10.     With digital cameras and cellular telephones, images of child pornography can be

transferred directly onto a computer or sent directly to another individual via the Internet. A

modem allows any computer to connect to another computer through the use of telephone, cable,

or wireless connection. Through the Internet, electronic contact can be made to literally millions

of computers around the world.

       11.     The computer’s ability to store images in digital form makes the computer itself

an ideal repository for child pornography. The size of the electronic storage media (commonly

referred to as the hard drive) used in home computers has grown tremendously within the last

several years. These drives can store thousands of images at very high resolution.

       12.     The Internet affords individuals several different venues for meeting each other,

obtaining, viewing, and trading child pornography in a relatively secure and anonymous fashion.

       13.     Individuals also use online resources to retrieve and store child pornography,

including services offered by Internet Portals such as Yahoo! and Hotmail, among others. The

online services allow a user to set up an account with a remote computing service that provides

e-mail services as well as electronic storage of computer files in any variety of formats. A user

can set up an online storage account from any computer with access to the Internet. Evidence of

such online storage of child pornography is often found on the user’s computer. Even in cases

where online storage is used, however, evidence of child pornography can be found on the user’s

computer in most cases.




                                                 7
         Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 8 of 43



        14.     As with most digital technology, communications made from a computer are

often saved or stored on that computer. Storing this information can be intentional, for example,

by saving an e-mail as a file on the computer or saving the location of one’s favorite websites in

“bookmarked” files. Digital information can also be retained unintentionally. Traces of the path

of an electronic communication may be automatically stored in many places, such as temporary

files or ISP client software, among others. In addition to electronic communications, a computer

user’s Internet activities generally leave traces in a computer’s web cache and Internet history

files. A forensic examiner often can recover evidence that shows whether a computer contains

peer-to-peer software, when the computer was sharing files, and some of the files that were

uploaded or downloaded. Computer files or remnants of such files can be recovered months or

even years after they have been downloaded onto a hard drive, deleted, or viewed via the

Internet. Electronic files downloaded to a hard drive can be stored for years at little or no cost.

Even when such files have been deleted, they can be recovered months or years later using

readily available forensic tools. When a person “deletes” a file on a home computer, the data

contained in the file does not actually disappear; rather, that data remains on the hard drive until

it is overwritten by new data. Therefore, deleted files, or remnants of deleted files, may reside in

free space or slack space – that is, in space on the hard drive that is not allocated to an active file

or that is unused after a file has been allocated to a set block of storage space – for long periods

of time before they are overwritten. In addition, a computer’s operating system may also keep a

record of deleted data in a “swap” or “recovery” file. Similarly, files that have been viewed via

the Internet are automatically downloaded into a temporary Internet directory or “cache.” The

browser typically maintains a fixed amount of hard drive space devoted to these files, and the

files are only overwritten as they are replaced with more recently viewed Internet pages. Thus,




                                                   8
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 9 of 43



the ability to retrieve residue of an electronic file from a hard drive depends less on when the file

was downloaded or viewed than on a particular user’s operating system, storage capacity, and

computer habits.

                           DETAILS ABOUT P2P FILE-SHARING

       15.     P2P file-sharing allows individuals to meet each other through the Internet,

engage in social networking, and trade files.

       16.     One aspect of P2P file-sharing is that multiple files may be downloaded in

parallel, which permits downloading more than one file at a time.

       17.     A P2P file transfer is assisted by reference to an Internet Protocol (IP) address.

This address, expressed as four sets of numbers separated by decimal points, is unique to a

particular computer during an online session. The IP address identifies the location of the

computer with which the address is associated, making it possible for data to be transferred

between computers.

       18.     Third-party software is available to identify the IP address of the P2P computer

sending a file. Such software monitors and logs Internet and local network traffic.

            SPECIFICS OF SEARCH AND SEIZURE OF COMPUTER SYSTEMS

       19.     Based upon my knowledge, training and experience, and the experience of other

law enforcement personnel, I know that searches and seizures of evidence from computers

commonly require agents to seize most of the computer items (hardware, software and

instructions) to be processed later by a qualified computer expert in a laboratory or other

controlled environment. That is almost always true because of the following:

       a.      Computer storage devices (like hard drives, diskettes, tapes, laser disks, Bernoulli

       drives and others) store the equivalent of thousands of pages of information. Especially




                                                  9
Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 10 of 43



when the user wants to conceal criminal evidence, he or she may store it in random order

with deceptive file names. This requires searching authorities to examine all the stored

data to determine whether it is included in the warrant. This examination process can

take weeks or months, depending on the volume of the data stored, and it would be

impractical to attempt this kind of data search on-site.

b.     Searching computer systems for criminal evidence is a highly technical process

requiring expert skills in a properly controlled environment. The vast array of computer

hardware and software available today requires even computer experts to specialize in

some systems and applications. It is difficult to know before a search which expert

should analyze the system and its data. A search of a computer system is an exacting

scientific procedure, which is designed to protect the integrity of the evidence and to

recover hidden, erased, compressed, password-protected, and other encrypted files.

Because computer evidence is extremely vulnerable to tampering and destruction (both

from external sources and from code embedded in the system as a “booby-trap”), the

controlled environment of a laboratory is essential to its complete and accurate analysis.

c.     In order to fully retrieve data from a computer system, the analyst needs all

magnetic storage devices, as well as the central processing unit (“CPU”). In cases like

this one, where the evidence consists partly of graphic files, the monitor and printer are

also essential to show the nature and quality of the graphic images that the system can

produce. In addition, the analyst needs all assisting software (operating systems or

interfaces, and hardware drivers) and any applications software, which may have been

used to create the data (whether stored on hard drives or on external media), as well as all

related instructional manuals or other documentation and security devices. Moreover,




                                         10
       Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 11 of 43



       searching computerized information for evidence or instrumentalities of crime commonly

       requires the seizure of the entire computer’s input/output periphery devices (including

       related documentation, passwords and security devices) so that a qualified expert can

       accurately retrieve the system’s data in a controlled environment. Peripheral devices,

       which allow users to enter and retrieve data from stored devices, vary widely in their

       compatibility with other hardware and software. Many system storage devices require

       particular input/output devices in order to read the data on the system. It is important that

       the analyst be able to properly retrieve the evidence sought.

       d.     In addition to being evidence of a crime, there is probable cause to believe that the

       computer and its storage devices, the monitor, keyboard, printer, modem and other

       system components were used as a means of committing offenses involving the sexual

       exploitation of minors in violation of law, and should all be seized on that basis alone.

       Accordingly, permission is sought herein to seize and search computers and related

       devices consistent with the scope of the requested search.

                        FACTS SUPPORTING PROBABLE CAUSE

I.     INVESTIGATION OF COMMERICIAL COMPANY DISTRIBUTING CHILD
       PORNOGRAPHY

                                 INVESTIGATION OF COMPANY

       20.    In October of 2010, the United States Postal Inspection Service (“USPIS”) and

the Toronto Police Service (“TPS”) began an investigation into a movie production company that

operated a website offering DVDs and streaming videos (“films”) for sale. The majority of these

films feature young boys and were marketed as “naturist films from around the world.” TPS and

USPIS determined that this production company (“Toronto Company”) was located in Toronto,




                                                11
           Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 12 of 43



Canada and was the subject of more than 20 complaints to the National Center for Missing and

Exploited Children’s Cyber TipLine regarding the sale of child pornography.

           21.     In October 2010, I accessed the Toronto Company’s website

(www.azovfilms.com) and was able to review film previews, website movie summaries, and

customer ordering information. On six occasions between February and April, 2011, USPIS

Inspectors from Brentwood, Tennessee conducted controlled purchases of DVDs via the Toronto

Company's online ordering system. By way of example, one of the videos purchased from the

Toronto Company via an undercover purchase was titled “Cutting Room Floor – Vlaviu.”

Toronto Company's website described this film as follows:

                   we sweep up the cutting room floor to bring you two action-packed discs
                   of ooey-gooey slippery goodness with Vlaviu and his friends, Lore and
                   Luci! Like our original . . . this is all the footage that didn't make the cut
                   over the last 2-years from our Boy Fights series! This two disc set
                   features Vlaviu and his buddies going commando in a very unique way.
                   They're sweet enough, but that didn't stop them from breaking out the
                   sugary cupcakes and giving you a whole new perspective on nudist food
                   fighting! One thing is for sure . . . there's no laundry to do tonight! 1

           22.     The video depicts minor boys seen naked in an apartment living room setting

eating desserts and other food. There are several close-ups of the minors' genitals and pubic area

as they eat desserts and towards the end of the film several of the boys are seen sitting naked on

the desserts and placing the remnants in their anuses.

           23.     Law enforcement determined that the Toronto Company has a shipping facility

located in North Tonawanda, New York and that the undercover online orders were transferred

from the Toronto Company to this New York based shipping facility for fulfillment. These

undercover orders were then shipped from North Tonawanda, New York via USPS Priority Mail

to a post office box in Nolensville, Tennessee.


1
    The Toronto Company’s website is quoted verbatim.


                                                        12
       Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 13 of 43



       24.    TPS executed a search warrant on the Toronto Company’s business premises on

May 1, 2011 and seized hundreds of DVD movies, photo DVDs, computers, and business

records, including customer shipping labels and customer order histories. Many of the DVD

movies included the exhibition of the genitals of nude minors. Law enforcement determined that

these films were being shipped to customers worldwide, including hundreds of individuals

residing in the United States. Law enforcement also determined that for those orders placed

from the United States, the Toronto Company would fill those orders via USPS Priority Mail.

       25.    The Toronto Company, as well as its two operating principals were subsequently

charged and are being prosecuted in Canada for child exploitation offenses, including the

production and distribution of child pornography.

     IDENTIFICATION OF JESSE RYAN LOSKARN AS A CUSTOMER OF THE
             COMMERCIAL CHILD PORNOGRAPHY COMPANY

       26.    I conducted a review of certain records contained in the Toronto Company’s

customer database and located one customer Jesse Ryan Loskarn AKA J Loskarn, with an

address of 1804 Burke Street SE, Washington, District of Columbia 20003 and a telephone

number of 917-653-9652. USPIS employees and I extracted the customer invoices and purchase

summary from the database, which details the transactions. A summary review of the

transactions showed that the customer “Jesse Loskarn” had three (3) unique transactions between

November 4, 2010 and March 11, 2011 totaling $78.60 in United States currency. All

transactions showed a billing and shipping address of 1804 Burke Street SE, Washington,

District of Columbia 20003, a telephone number of 917-653-9652, and a confirmation email

address of “jryan1978@hotmail.com”.

       27.    The following is the extraction of portions of the customer invoices that depict the

customer information and the items ordered, as well as the date and IP Address. This



                                               13
       Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 14 of 43



information was obtained from the Customer Database. The information from the most recent

customer invoice has been summarized below to include the videos purchased which relate to the

purchase of a sexually explicit video containing naked minor boys:

       Order Number 106502
       Friday, March 11, 2011 07:05
       Billings Details:
       Name: J Loskarn
       Address: 1804 Burke Street SE
       Address Line 2:
       City: Washington
       State: District of Columbia
       Zip/Post Code: 20003
       Country: United States of America
       Phone: 917-653-9652

       Additional Details:
       Email: jryan1978@hotmail.com
       IP Address: 98.218.79.104
       Shipping Method: USPS First Class Mail (2 to 4 days) + Padded Mailer -
       Auth Code: Card Capture
       Order Status: Shipped 3/11/2011 14:48
       Product ID: DL70294
       Product Name: Andrey & Sasha 2 for 1 (2011) | DOWNLOAD
       Options:
       LINKS WILL BE VALID FOR: 7 days
       Would you like the DVD mailed also?: Yes! Send with case.
       Quantity: 1
       Price: $24.95

       Order Total: $24.95
       Shipping: $2.00
       Grand Total: $26.95

       28.    A review of records provided by the shipping facility in North Tonawanda, New

York included mailing labels placed on the shipments that were delivered by USPS. The

business records showed that a mailing label for “J Loskarn” with an address of 1804 Burke

Street SE, Washington, District of Columbia 20003 was produced for the order on March 11,




                                              14
       Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 15 of 43



2011. According to the shipping facility in North Tonawanda, New York, the label was put on

the order and the completed package was provided to USPS for delivery.

       29.    The information from the customer order number of 99334 on December 27, 2010

has been summarized below to include the videos purchased which relate to the purchase of a

sexually explicit video containing naked minor boys:

       Order Number 99334
       Monday, December 27, 2010 12:22
       Billing Details:
       Name: J Loskarn
       Address: 1804 Burke Street SE
       Address Line 2:
       City: Washington
       State: District of Columbia
       Zip/Post Code: 20003
       Country: United States of America
       Phone: 917-653-9652

       Additional Details:
       Email: jryan1978@hotmail.com
       IP Address: 68.49.126.87
       Shipping Method: USPS First Class Mail (2 to 4 days) + Padded Mailer -
       Auth Code: Card Capture
       Order Status: Shipped 12/27/2010 13:40
       Product ID: DL70263
       Product Name: After School Break (2004) | DOWNLOAD
       Options:
       LINKS WILL BE VALID FOR: 7 days
       Would you like the DVD mailed also?: Yes! Send with plastic shell.
       Quantity: 1
       Price: $21.95

       Order Total: $21.95
       Shipping: $1.00
       Grand Total: $22.95

       30.    A review of records provided by the shipping facility in North Tonawanda, New

York included mailing labels placed on the shipments that were delivered by USPS. The

business records showed that a mailing label for “J Loskarn” with an address of 1804 Burke




                                              15
       Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 16 of 43



Street SE, Washington, District of Columbia 20003 was produced for the order on December 29,

2010. According to the shipping facility in North Tonawanda, New York, the label was put on

the order and the completed package was provided to USPS for delivery.

       31.    The information from the customer order number of 93939 on November 4, 2010

has been summarized below to include the videos purchased which relate to the purchase of a

sexually explicit video containing naked minor boys:

       Order Number 93939
       Thursday, November 4, 2010 17:10
       Billing Details:
       Name: Jesse Ryan Loskarn
       Address: 1804 Burke Street SE
       Address Line 2:
       City: Washington
       State: District of Columbia
       Zip/Post Code: 20003
       Country: United States of America
       Phone: 917-653-9652

       Additional Details:
       Email: jryan1978@hotmail.com
       IP Address: 68.49.126.87
       Shipping Method: USPS First Class Mail (2 to 4 days) + Padded Mailer -
       Auth Code: Card Capture
       Order Status: Shipped 11/8/2010 17:37
       Product ID: DL70265
       Product Name: Headlock (2005) | DOWNLOAD
       Options:
       LINKS WILL BE VALID FOR: 7 days
       Would you like the DVD mailed also?: Yes! Send with plastic shell.
               Quantity: 1
       Price: $23.95

       Order Total: $23.95
       Shipping: $4.75
       Grand Total: $28.70

       32.    A review of records provided by the shipping facility in North Tonawanda, New

York included mailing labels placed on the shipments that were delivered by USPS. The




                                              16
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 17 of 43



business records showed that a mailing label for “Jesse Ryan Loskarn” with an address of 1804

Burke Street SE, Washington, District of Columbia 20003 was produced for the order on

November 9, 2010. According to the shipping facility in North Tonawanda, New York, the label

was put on the order and the completed package was provided to USPS for delivery.

       33.     The Website where Jesse Loskarn, and other customers would access to order

movies, although not online currently to the public, can be accessed by USPIS. I accessed the

offline Website and can view it just as any customer would have accessed it. I observed that

visitors of the website can search for movies and photo DVD’s. Often a picture of the disc and

description of the movie or photo DVD is provided. Some descriptions include the names of the

boys who are featured in the films. The price of the movie is also listed. Detailed descriptions

of movies can be expanded, some of which include a sample of images. Customers accessing

this website would be able to download and view a sample of photos where available for each

movie. Customers would be able to select movies for purchase, and then complete their order

online. These orders were reviewed by the Website Operator, who either fulfilled the orders or

cancelled them.

       34.     For example, on March 11, 2011, Jesse Loskarn purchased a download and disc

of the movie “Andrey & Sasha 2 for 1 (2011).” The following is the description of the film that

Jesse Loskarn could have seen on the website:

       “Azov Films' newest 2 for 1 features two favorite teenage naturists from the early days of
       Europa Sun! We combine Andrey and Friends with Sasha's Delight, and bring you
       Andrey and Sasha 2 for 1!”

       35.     The video is approximately one hour and eight minutes in length. The video

begins with four male juveniles walking down a street into a locker room. The video then

depicts the juveniles undressing then walking into a group shower. The four juveniles shower




                                                17
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 18 of 43



with their penises clearly exposed for the camera. The setting moves into a small indoor pool

where the male juveniles are naked and playing games in the water. Two of the boys are

depicted wrestling naked in the water. The next scene shows the same boys in a living room

setting, naked and talking in a non-English language. The next scene shows the male juveniles

again showering and subsequently playing water games in a different indoor pool. The boys are

then seen playing in the showers and subsequently changing. The video then moves to a new

setting with a title scene stating “Sasha’s Delight.” The part of the video shows four boys

walking in the woods. They subsequently undress next to a small, shallow pond and grab 4

water guns. The boys are then shown playing naked in ankle deep water with the water guns.

They leave the water and then sit next to the pond on the ground. The video then has the camera

pan to frame one of the boys shooting his inner thigh next to his penis with the water gun. As the

scenes change from the pond area to the woods, the camera pans across the naked boys showing

close-ups from their nipple lines to their upper thighs. The scene transfers back to the pond area

where the boys are seen digging holes with the camera panning across the boys’ groin areas,

again showing their penises.

       36.     On December 27, 2010, Jesse Loskarn purchased a download of the movie “After

School Break (2004).” The following is the description of the film that Jesse Loskarn could have

seen on the website:

       “May 9th is a very important holiday in the Ukraine. It celebrates victory at the end of
       The Great Patriotic War (WWII). School kids like it because on the day before, they get
       out early. Our four friends take advantage of this half-day vacation by having lunch at an
       outdoor cafe and then going to the banya for some relaxation. There’s no better way to
       spend a naturist afternoon.”

       37.     The video is approximately forty-nine minutes in length. The video begins with

four male juveniles walking down a street and passing through a playground, then sitting down at




                                                18
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 19 of 43



an outdoor restaurant for food and drinks. The video then depicts the juveniles walking into a

locker room where they undress and proceed to an indoor pool area. The four juveniles enter the

elevated pool area naked, with their penises clearly exposed to the camera. The juveniles all

jump into the pool and play catch with a ball, sometimes getting in and out of the pool. The boys

take a few breaks, sitting and standing on the side of the pool while drinking juice as the cameras

pan in and out. The boys leave the pool deck, with the camera showing close-ups from their

upper thighs to their heads. The next scene depicts the boys entering a group shower and

squirting each other with water. The boys then return to the locker room to dress, and are seen

leaving the building.

       38.     On November 4, 2010, Jesse Loskarn purchased a download of the movie

“Headlock (2005).” The following is the description of the film that Jesse Loskarn could have

seen on the website:

       It’s springtime in the Ukraine and a healthy young man’s thoughts naturally turn to
       wrestling. Yes, that's right. The ancient art of Greco-Roman grappling becomes youthful
       obsession and exciting entertainment in Baikal Films’ kid-sport’s spectacular Headlock.
       Beginning in the days of the old Soviet Union, there was an eternal quest to find and
       nurture the best athletes. And to that end, every local coach became a talent scout for the
       State selecting out the most promising youngsters. Some as young as seven were sent on
       to elite, state-run boarding schools. There, along with the usual academic requirements,
       these budding sports superstars would train daily in hopes of one day representing their
       country in world-class competitions. This amazing tradition continues today in the
       Ukraine and its success shines bright on the handsome, happy faces of the amazing and
       inspiring adolescent athletes you'll come to love in Headlock.

       39.     The video is approximately one hour and eight minutes in length. The video

begins with two boys waking up in a bedroom, then waking several other boys in adjacent

rooms, all wearing underwear. The boys make their beds, get dressed, and proceed down the

stairs and outside. Approximately fourteen boys are seen doing warm-up exercises and

stretching at an outdoor park, then wrestling with each other. The next scene shows a large




                                                19
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 20 of 43



school building with cameras panning classrooms, hallways, and the lunch room, all of which

contain students. The scene changes again and several boys are depicted entering a locker room

to change before proceeding to a gymnasium. Several pairs of boys are seen wrestling, with

frequent close-ups of their penises and anuses in singlets. The cameras also pan boys sitting

against the wall with their knees up, also showing close-ups of their penises in singlets. The

scene then changes to interviews with some of the boys speaking in a non-English language.

The video then moves to an indoor bathhouse where several boys undress in a locker room and

enter a sauna. The boys are seen sitting in the sauna naked or in tight speedos. They then move

to a group shower where they are seen washing themselves, with the camera sometimes zooming

in on their clearly exposed penises. The camera pans back to the sauna where a few boys are

seen sitting naked and massaging each other. The camera captures close-ups of other boys’

penises as they enter and leave the sauna room. The camera returns to the group shower as boys

continue to bathe with their penises exposed to the camera. The last scene is of boys gathered in

several bedrooms talking, with one pair of boys wrestling.

       40.     On or about May 7, 2012, the United States Department of Justice Criminal

Division, Child Exploitation and Obscenity Section issued an administrative subpoena to

Microsoft Online Services for email address jryan1978@hotmail.com. The subpoena sought

information from the customer database related to Jesse Ryan Loskarn’s transactions. On or

about May 13, 2012, Microsoft Online Services provided the following relevant information:

                      Login:                 jryan1978@hotmail.com
                      Registration IP:       143.231.109.118
                      Account Created:       November 15, 2000
                      First Name:            Ryan
                      Last Name:             J
                      Country:               US
                      Zip/Postal Code:       20007
                      Last Login:            98.218.79.104 on 5/11/2012 at 06:01 AM PDT



                                                20
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 21 of 43




        41.    On or about July 16, 2012, the United States Department of Justice Criminal

 Division, Child Exploitation and Obscenity Section issued an administrative subpoena to

 Comcast Cable Communications for IP address 98.218.79.104 on 5/11/2012 at 06:01 AM PDT,

 which was the information from the Microsoft Online Service return. On or about July 18, 2012,

 Comcast Cable Communications provided the following relevant information:

                       Subscriber Name:    Mr. Jesse Loskarn
                       Service Address:    1804 Burke St SE
                                           Washington, DC 20003
                       Type of Service:    High Speed Internet Services
                       Account Status:     Active
                       Start of Service:   12/05/2009
                       Telephone Number: 202-674-8894
                       Email User ID:      Jesse1501
                       Current IP Address: 98.218.79.104 as of 7/18/2012

II.     INVESTIGATION OF PEER TO PEER NETWORK

                     SUMMARY OF THE PEER TO PEER NETWORK

        42.    The Gnutella network is one of several P2P networks currently operating on the

 Internet. Based on your Affiant’s knowledge, training and experience and the experience of

 other law enforcement personnel, your Affiant knows the following about the operation of the

 Gnutella file-sharing network:

        a. The Gnutella network can simultaneously provide files to users while downloading
           files from other users.

        b. The Gnutella network can be accessed by computers running several different client
           programs. These programs share common protocols for network access and file
           sharing. The user interface, features, and configuration may vary between clients and
           versions of the same client.

        c. During the default installation of a Gnutella client, settings are established that
           configure the host computer to share files. Depending upon the Gnutella client used,
           a user may have the ability to reconfigure some of those settings during installation or
           after the installation has been completed.




                                                21
Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 22 of 43



d. Files on the Gnutella network are uniquely identified using the Secure Hash
   Algorithm (SHA) Version 1, or SHA 1, hash value. This treats files with identical
   content but different names as the same, and files with different contents but the same
   name as different files.

e. I have learned that it is the SHA, developed by the National Institute of Standards and
   Technology (NIST), along with the National Security Agency (NSA), for use with the
   Digital Signature Standard (DSS), that is specified within the Secure Hash Standard
   (SHS). The United States of America has adopted the SHA 1 hash algorithm
   described herein as a Federal Information Processing Standard. The SHA 1 is called
   secure because it is computationally infeasible for two files with different content to
   have the same SHA 1 hash value.

f. Digital files can be processed by the SHA 1 process resulting in a digital signature.
   By comparing these signatures it can be concluded that two files that share the same
   digital signature are identical with a precision that greatly exceeds 99.9999 percent
   certainty.

g. The Gnutella network uses the SHA 1 digital signature to uniquely identify individual
   files.

h. The Gnutella client allows the user to search for pictures, movies and other files by
   entering descriptive text as search terms. These terms are typically processed by
   peers based upon the information about the files that had been sent by individual
   users.

i. Entering search terms into a Gnutella client returns a list of files and descriptive
   information including, in some client software, the associated SHA 1hash values. By
   comparing these SHA 1 digital signatures with signatures of known files,
   investigators could determine which offered files contained child pornography.
   Investigators could then use publicly available software to request a list of Internet
   networked computers that are reported to have the same files for trade. This feature
   allows law enforcement to conduct undercover operations that involve images known
   to be real and identified child pornography involving identified children.

j. Using a publicly available Gnutella client, a user can select the SHA 1 hash value of a
   known file and attempt to receive it. Once a specific file is identified, the download
   process can be initiated. Once initiated, a user is presented with a list of users or IP
   addresses that have recently been identified as download candidates for that file. This
   allows for the detection and investigation of computers involved in possessing,
   receiving and/or distributing files of previously identified child pornography.

k. Internet computers identify each other by an Internet Protocol (IP) address. IP
   addresses can assist law enforcement in finding a particular computer on the Internet.
   IP addresses can typically lead the law enforcement officer to a particular Internet
   service company and that company can typically identify the account holder assigned
   that IP address.


                                        22
       Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 23 of 43




       l. The Globally Unique Identifier (GUID) is a series of letters and numbers assigned to
          a computer when a file-sharing client, such as Shareaza, is installed on a computer.
          The GUID will remain the same even if the user utilizes a different IP address. This
          allows law enforcement to track IP addresses across the Internet when a user receives
          different IP addresses from the ISP. While each generated GUID is not guaranteed to
          be unique, the total number of unique keys is so large that the probability of the same
          number being generated twice is very small.

       43.    The eDonkey2000 (hereinafter referred to as “ED2K”) network is another P2P

networks currently operating on the Internet. Based on your Affiant’s knowledge, training and

experience and the experience of other law enforcement personnel, your Affiant knows the

following about the operation of the ED2K file-sharing network:

       a. The ED2K network is a hybrid network using multiple servers combined with a
          decentralized network. The ED2K Network consists of the servers and clients linked
          on the ED2K protocols, as well as an overlaying network called the Kademlia (KAD)
          Network.

       b. A commonly used P2P client program used on the ED2K network is Shareaza.
          Shareaza is also a free Microsoft Windows P2P client, which supports multiple P2P
          file sharing networks, such as Gnutella, BitTorrent, and ED2K. Other computer
          operating system platforms, such as MacIntosh or Linux, also have P2P client
          software programs that access and share files on the ED2K network.

       c. The ED2K Network consists of hundreds of servers and millions of clients or hosts.
          Clients themselves maintain an internal list of active ED2K servers to allow each
          client to connect to the network. The client (host) initially makes a connection to an
          ED2K server.

       d. Once the ED2K client has made the connection to one of the ED2K servers, the
          server then acts as a hub, providing centralized searching and indexing between other
          clients also attached to this server. The Servers in this manner do not communicate
          search requests and data to other servers.

       e. When a client connects to an ED2K server, they provide a list of shared files to be
          retained by that server.

       f. Files on the ED2K network are uniquely identified using a MD4 root hash of a MD4
          hash list of pre-determined chunks of the file. This treats files with identical content
          but different names as the same, and files with different contents but the same name
          as different. The ED2K hash function is a MD4 root hash of a list of MD4 hashes
          from the chunks of the file, and gives a different result than a simple MD4 hash: The



                                               23
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 24 of 43



             file data is divided into full chunks of 9500 KiB (9728000 bytes or nearly 9.28 MB)
             plus a remainder chunk, and a separate 128-bit MD4 checksum is computed for each.
             If the file length is an exact multiple of 9500 KiB, the remainder zero size chunk is
             still used at the end of the hash list. The ED2K hash is computed by concatenating the
             MD4 checksums of all the pieces of the file in order, and hashing the resulting sum
             using MD4. Although, if the file is composed of a single non-full chunk, its MD4
             hash is used with no further modifications. This method of hashing allows the
             recipient to verify that a hash list corresponds to the original ED2K file hash, without
             the need to have the data blocks.

       g. When a client makes a search on ED2K, the search is sent directly to the connected
          server. The server queries their connected peers based on the shared file lists it
          contains and the response is sent back to the requesting peer.

       h. The client also broadcasts their search by another means, whereby it is a more general
          request to other servers. This type of secondary request can lead to servers reporting
          back information about hosts that had the file, although the date and time may be
          latent.

                            SUMMARY OF INVESTIGATIVE SOFTWARE

       44.      Publicly available software is generally used by law enforcement in P2P

investigations to capture information on a P2P network. The software program captures this

information by sending out keyword requests to all users connected to the P2P network at that

time. Any computer that responds to the keyword request has files containing the keywords.

The responding computer’s IP address, the hash value(s) and size(s) of the file(s) containing the

keywords, and other information are returned to the software. The software then compares the

returned hash value(s) to previously viewed child pornography files for which the hash value

information has already been identified by law enforcement. If there is a match, then the

software program captures the file name(s), hash value(s), and the date and time the file was

located on the P2P network, as well as the IP address that the file was associated with at that date

and time.

       45.      The software program used by law enforcement automatically attempts to

download files with a hash-value match to previously viewed child pornography files. However,



                                                  24
         Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 25 of 43



a situation could arise where, although the software program informs law enforcement that a user

at a particular IP address has previously offered child pornography files, law enforcement’s

subsequent attempt to locate and download those files remotely is unsuccessful. This could

occur if, for example, the user is not logged on to the P2P network, or has disabled file sharing,

or the user’s Internet configuration makes it difficult to communicate.

         46.   Law Enforcement agencies across the United States use eDonkey and Gnutella

client software to access the eDonkey and Gnutella Network and work undercover operations to

identify IP addresses that share child pornography. Specifically, the software allows agents to

display the digital signatures in the file listings returned in both the “browse” functions and the

“file query” functions on the eDonkey and Gnutella Network. This same process can be used by

anyone accessing the P2P network.

         47.   Law Enforcement agents across the country use software that facilitates the

automated comparison of digital signatures offered to those of digital signatures of known or

suspected to be child pornography. The software in use simply compares digital signatures

found by the software in the suspects shared folder with digital signatures in a list of known or

suspected child pornography held by the undercover operation. The operation described could

conceivably be done by looking at each digital signature value offered and comparing visually

known digital signatures values of child pornography. The undercover software merely speeds

up the comparison. It also helps facilitate the geographical lookup of IP addresses sharing those

files.

         48.   I conducted my P2P investigation using a database utilized by federal, state and

local law enforcement agencies in child exploitation investigations worldwide. The database

maintains a log of IP addresses that have been previously involved in the possession and




                                                 25
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 26 of 43



distribution of child pornography. I have used this database and its predecessor for several years,

and have previously investigated cases and been involved in arrests based upon the use of these

databases. I have previously verified that the information concerning your Affiant’s actions

while using the database had been logged into the database in a timely and accurate manner.

Files are automatically compared to a known set of hash values as contained in the database that

evidence child pornography from previous investigations by other law enforcement officers.

       49.      The data acquired from automated tools and undercover operations, including

hash value, IP address offering to participate in distribution of a file, name of the file, date and

time it was identified by the law enforcement software provided from the suspect computer, are

all compiled into a graphical, web based interface. I queried an IP address to investigate at

which time the information available from the servers historically about that IP address is

generated and sent by the law enforcement software for the investigating officer to review.

                          BACKGROUND OF THE P2P INVESTIGATION

       50.      This investigation concerns a computer identified on the Gnutella network by the

following assigned GUID: 133D8B48CC0E0248A1FFCE654E956F65 (hereinafter “Target

GUID”). On October 5, 2013 and October 6, 2013, the Target GUID was connected to the

Gnutella and ED2K network with the Internet Protocol (IP) address 68.55.253.161 (hereinafter

“Target IP”).

       51.      Using the software programs described above, I was able to obtain historical

Gnutella network information about the Target IP, including six (6) files with names that are

consistent with child pornography broadcasting as a download candidate on October 5th and

October 6th, 2013.




                                                  26
       Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 27 of 43



       52.    Using the software programs described above, I was able to obtain historical

ED2K network information about the Target IP, including five (5) files that were broadcasting as

a download candidate on October 5th and October 6th, 2013.

       53.    The Target GUID has been associated on the Gnutella and ED2K network with

only one public IP address: the Target IP. The Target IP was reporting using the same Target

GUID both on the ED2K network as well as the Gnutella network. I also observed that the

Target GUID was broadcasting on the eDonkey network as using software Shareaza v2.6 and

also that it was broadcasting on the Gnutella network as using the software programs RAZA. It

is my experience that RAZA is a short form for Shareaza. The Target IP was initially seen on

the Gnutella and ED2K network on October 5, 2013. The Target GUID was initially seen on the

Gnutella and ED2K network on October 5, 2013.

       54.    The following is a list of the six files names the Target IP with Target GUID was

broadcasting on the Gnutella network:

K99 - 10Yo Boy & Dad Fisting Sucking & Rape New.mpg
Hash: 676BH2NWQ2JCLTQBTNOBHB3CA52DUPCO
                                                              257 MB          22.62%
Babyhee 1.5Y Boy Tied In Bath Tub Gets Raped Hard
Sceaming - Excellent Baby Toddler Fuck.mp4
Hash: ECAWMPR5PCHLQD4XBE4EUM32X5SK2MGE
                                                              38 MB           55.32%
frifam toddler boy - 3yo - just fucked - cum is dripping
from ass_pcsn.avi
hash: KO37ZIVU4TIS2CXYY5YDAMZJOPPVR6P2
                                                              168 MB          78.07%
13yo BOY FUCKED by UNCLE and CUMMING in HD
RESOLUTION NEW 2011 pedo fuck pthc kdv bibcam brn
hmv rbv preteen virgin 13yo.avi
hash: P2D7STXK7HVYIB3DRGPCCXGUZIJFOR4B
                                                              115 MB          40.94%
(Pthc) 6Yo Girl Kidnaped And Raped In Woods([Pedo]
Fuckin Dad Takes His 8yo Daughter To The Woods And
Fuck).mpg
hash: WI66WGKRQDIGNTIXUS6AEYKQDM76ZD6V                        284 MB          84.02%



                                               27
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 28 of 43




 dads big dicks in little boys ass preteen sex pthc lbbt
 boylove k99_pcsn.avi
 hash: XUQWDV63KAZQ7AXDPKXVDJUPZGKSNL3G
                                                                  96 MB           64.95%

       55.     The list of files can be described that the first column of the file name, all of

which have file extensions to indicate they are movie/video files along with their respective hash

values. The second column is how large the entire file is. The third column indicates the

percentage of the file that the suspect is reporting having.

       56.     The following is a list of the five (5) files recorded by file hash that the Target IP

was broadcasting on the ED2K network:

       10/5/2013               79B9CD9523518797250853D93D6A3466                       Shareaza v2.6
       10/5/2013               FD2A124A72ACBA67EB4FF4F1AE207802                       Shareaza v2.6
       10/5 & 10/6/2013        6300B94312E44A276AD1D81959B76057                       Shareaza v2.6
       10/5/2013               80E5DAAA7D2199508A82B4BC847C1970                       Shareaza v2.6
       10/5/2013               6482A1E81009A660588626C7D56B4DB6                       Shareaza v2.6

       57.     The list of files can be described as the first column being the date of entry and

the second column being the file ED2K hash, and the last being the client software.

       58.     The Target IP address broadcasting the hash values of the suspect files on the

ED2K network did not have the file names retained by the server. I was however able to conduct

a historical search of the ED2K hash in a law enforcement database which yielded information

that the files had been previously observed having filenames associated with child pornography.

       THE IMAGES BEING OFFERED FOR DOWNLOAD BY THE TARGET IP

       59.     Subsequent to obtaining the information regarding the files which were offered to

be distributed over the Gnutella and ED2K network, I created a Magnet Download to obtain the

files broadcasted by the suspect. This process essentially uses the above listed software to

request searching for these particular files based on the file size and the hash value. This ensures




                                                 28
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 29 of 43



that files being shared on the Gnutella and ED2K network that are similar are not to be

downloaded, and that only an exact copy of the file the suspect broadcast is downloaded.

       60.     I obtained a partial file as a result of the Magnet Download Request. This file has

a hash value of 676BH2NWQ2JCLTQBTNOBHB3CA52DUPCO. The Target IP address was

broadcasting as a download candidate for a file with the exact same hash, between October 5 and

October 6, 2013, and it had the file name of “K99 - 10Yo Boy & Dad Fisting Sucking & Rape

New.mpg.” As of November 18, 2013, I had obtained a partial download of approximately 22%

of the same file which the suspect had been broadcasting as a download candidate on October 5th

and 6, 2013. The portion of the file I was able to observe showed that it is video a compilation

reported to be over 8 minutes. The opening scene depicts a prepubescent male in a

shower/bathtub. The focus of the video is on his genitals and the young boy masturbates

himself. The second scene viewable flashes to a prepubescent boy nude lying on a bed

masturbating and being anally penetrated with a vibrator by an adult male. The next scene

viewable is a prepubescent male masturbating an adult male. The fourth scene viewable is a

nude prepubescent male bend over spreading his buttocks with his hands, and the focus is on the

anal region of the child.

       61.      The second partial file I obtained as a result of the Magnet Download Request

has a hash value of WI66WGKRQDIGNTIXUS6AEYKQDM76ZD6V. The Target IP address

was broadcasting as a download candidate for a file with the exact same hash on October 5,

2013, and it had the file name of “(Pthc) 6Yo Girl Kidnaped And Raped In Woods([Pedo]

Fuckin Dad Takes His 8yo Daughter To The Woods And Fuck).mpg.” As of November 18,

2013, I had obtained a partial download of approximately 99% of the same file which the suspect

had been broadcasting as a download candidate for, on October 5, 2013. The portion of the file I




                                                29
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 30 of 43



was able to observe showed that the video is multi-scene and approximately 28 minutes in

length. The video begins with an adult male partially undressing a prepubescent girl

approximately 6-9 years of age, with the male subsequently masturbating the girl and anally and

vaginally penetrating her. The video then changes to an outdoor setting where the adult male is

masturbating a partially clothed young female approximately 6-9 years of age. It is noted that in

this scene another child is present in the area and other children can be heard in the background.

The male then removes the girl’s underwear and masturbates her. The male then appears to

interview the child who appears Asian and speaks in a non-English language. The sexual abuse

appears to take place near a children’s playground. The adult male then masturbates another

prepubescent girl. The video then changes to depict an adult male vaginally penetrating the

prepubescent girl with his penis. The adult male is also observed performing oral sex on the

prepubescent girl.

       62.     The third file I obtained as a result of the Magnet Download Request has a hash

value of 80E5DAAA7D2199508A82B4BC847C1970. The Target IP address was broadcasting

as a download candidate for a file with the exact same hash on October 5, 2013 The file is a

video which is multi-scene and approximately 35 minutes in length. The video begins a

prepubescent girl approximately 5-8 years of age lying in the woods with no underwear and

exposing her vagina. The video then depicts a male separating the girl’s vagina with his fingers

and then vaginally penetrating her with his penis. The male is then seen performing oral sex on

the young girl then again penetrating her vagina with his penis. The adult male is then seen

fondling the vagina of the same girl. The video then changes to another setting where it appears

that a minor female is masturbated with a vibrator.




                                                30
       Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 31 of 43



       63.     The fourth file I obtained as a result of the Magnet Download Request has a hash

value of 6300B94312E44A276AD1D81959B76057. It was noted the Target IP address was

broadcasting as a download candidate for a file with the exact same hash on October 5 and 6,

2013. The file is a video which is multi-scene and approximately 8 minutes and 28 seconds in

length. The video begins with two Asian boys, approximately 10 to 13 years old, lying on a bed

naked. The boys proceed to perform oral sex on each other in the bed. The next scene depicts

one of the boys anally penetrating the other boy with his penis. The boy then continues to have

anal sex with the second boy for the remainder of the video.

                      IDENTIFICATION OF TARGET RESIDENCE

       64.     I identified the ISP for the target residence was Comcast Cable Communications.

On October 1, 2013, based upon the previous investigation involving Loskarn, I requested a

Department of Justice Administrative Subpoena be issued for the address of 1804 Burke Street

SE, Washington, DC 20003 to determine the current internet status of the residence.

       65.     On October 7, 2013, I received information from Comcast Cable Communications

regarding the subscriber information for 1804 Burke Street SE, Washington, DC 20003.

According to Comcast, the current subscriber information was as follows:

                      Subscriber Name:       Jesse Loskarn
                      Service Address:       1804 Burke Street SE
                                             Washington, DC 20003
                      Account Status:        Active
                      Current IP Address:    68.55.253.161 as of 10/7/2013

       66.     On October 1, 2013, I requested a Department of Justice Administrative

Subpoena be issued for to Microsoft Online Services for email address jryan1978@hotmail.com.

On or about October 17, 2013, Microsoft Online Services provided the following relevant

information:




                                               31
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 32 of 43



                      Login:                   jryan1978@hotmail.com
                      Registration IP:         143.231.109.118
                      Account Created:         November 15, 2000
                      First Name:              Ryan
                      Last Name:               J
                      Country:                 US
                      Zip/Postal Code:         20007
                      Last Login:              156.33.195.125 on 10/10/2013 at 11:55 AM PDT
                      Same Day Login:          68.55.253.161 on 10/10/2013 at 4:32 AM PDT

       67.     On November 12, 2013, a representative of the United States Postal Service stated

that Jesse Loskarn is currently receiving mail at the Target residence. The USPS employee

stated no additional names receive mail at that address.

       68.     On November 12, 2013, I received information from the National Law

Enforcement Telecommunications System (NLETS) that Jesse Ryan Loskarn has a Washington,

D.C. driver’s license. The address listed for him is the Target Residence.

       69.     On or about November 12, 2013 a United States Department of Justice

administrative subpoena was issued to Comcast Cable Communications for the IP address lease

information for the address of 1804 Burke St SE, Washington, DC to include the dates of

October 5 and 6, 2013. On or about November 15, 2013, Comcast Cable Communications

provided the following relevant information:

                      Subscriber Name:  Mr. Jesse Loskarn
                      Service Address:  1804 Burke St SE
                                        Washington, DC 20003
                      Type of Service:  High Speed Internet Services
                      Account Status:   Active
                      Telephone Number: 202-674-8894
                      Email User ID:    Jesse1501
                      Current IP Lease: 68.55.253.161 granted on 9/25/2013 at 05:33 UTC
                                        and still issued to the subscriber address through
                                        date of subpoena (11/13/2013 19:19 UTC)

       70.     On November 18, 2013, a search of Accurint information database (a public

records database that provides names, dates of birth, addresses, associates, telephone numbers,



                                                 32
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 33 of 43



email addresses, etc.) was conducted for Jesse Ryan Loskarn. These public records indicated

that Loskarn’s current address is the Target residence.

       71.     On November 18, 2013, I received information from the Consolidated Lead

Evaluation and Reporting (CLEAR) database indicating that Jesse Ryan Loskarn resides at the

Target Residence.

       72.     On November 18, 2013, I received information from NLETS that one vehicle is

listed as registered to Jesse Ryan Loskarn: a 2007 Lexus four door with Washington, D.C.

license plate DG5653. The vehicle is registered to the Target residence.

       73.     On November 18, 2013 at approximately 11:45 PM, I conducted surveillance at

the Target Residence. I observed a four door red Lexus with Washington, D.C. license plate

DG5653 parked in the 200 block of 18th Street in Washington, DC. This vehicle is registered to

Jesse Ryan Loskarn at the target address. The location where this vehicle was parked was less

than a city block from the target residence.

       74.     Finally, my investigation has revealed that Loskarn is currently employed as the

Chief of Staff to a United States Senator. I am informed by the prosecutors overseeing this

investigation that, by virtue of his employment, Loskarn’s residence is likely to contain

computers, other electronic devices (including mobile telephones, Blackberries, and the like),

and electronic storage media issued to Loskarn in his official capacity by the United States

Senate (“Senate-Issued Devices”). The prosecutors have further informed me that those Senate-

Issued Devices are likely to contain materials protected by the Speech or Debate Clause of the

United States Constitution. Art. I, § 6, cl. 1. Accordingly, the agents executing the search will

undertake special procedures with respect to any such devices they discover in the execution of

the warrant. Those procedures are outlined in Attachment C.




                                                33
       Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 34 of 43



       CHARACTERISTICS COMMON TO INDIVIDUALS INVOLVED IN THE
       DISTRIBUTION, TRANSPORTATION, RECEIPT, OR POSSESSION AND
         ATTEMPTED DISTRIBUTION, TRANSPORTATION, RECEIPT, OR
                  POSSESSION OF CHILD PORNOGRAPHY

       75.     As set forth above, probable cause exists to believe that an individual at 1804

Burke Street SE, Washington, District of Columbia has offered to distribute, transport, receive,

or possess child pornography, or has attempted to commit these crimes.             Based upon my

knowledge, experience, and training in child pornography investigations, and the training and

experience of other law enforcement officers with whom I have had discussions, I know that

there are certain characteristics common to individuals involved in such crimes:

               a.     Those who distribute, transport, receive, or possess child pornography, or

       who attempt to commit these crimes may receive sexual gratification, stimulation, and

       satisfaction from contact with children; or from fantasies they may have viewing children

       engaged in sexual activity or in sexually suggestive poses, such as in person, in

       photographs, or other visual media; or from literature describing such activity.

               b.     Those who distribute, transport, receive, or possess child pornography, or

       who attempt to commit these crimes may collect sexually explicit or suggestive materials,

       in a variety of media, including photographs, magazines, motion pictures, videotapes,

       books, slides and/or drawings or other visual media. Such individuals oftentimes use

       these materials for their own sexual arousal and gratification. Further, they may use these

       materials to lower the inhibitions of children they are attempting to seduce, to arouse the

       selected child partner, or to demonstrate the desired sexual acts.

               c.     Those who distribute, transport, receive, or possess child pornography, or

       who attempt to commit these crimes often possess and maintain copies of child-

       pornography material, that is, their pictures, films, video tapes, magazines, negatives,



                                                34
       Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 35 of 43



       photographs, correspondence, mailing lists, books, tape recordings, etc., in the privacy

       and security of their home or some other secure location. These individuals typically

       retain pictures, films, photographs, negatives, magazines, correspondence, books, tape

       recordings, mailing lists, child erotica, and videotapes for many years.

              d.      Likewise, those who distribute, transport, receive, or possess child

       pornography, or who attempt to commit these crimes, often maintain their collections that

       are in a digital or electronic format in a safe, secure and private environment, such as a

       computer and surrounding area. These collections are often maintained for several years

       and are kept close by, usually at the individual’s residence, to enable the collector to view

       the collection, which is valued highly.

              e.      Those who distribute, transport, receive, or possess child pornography, or

       who attempt to commit these crimes also may correspond with and/or meet others to

       share information and materials; rarely destroy correspondence from other child

       pornography distributors/collectors; conceal such correspondence as they do their

       sexually explicit material; and often maintain lists of names, addresses, and telephone

       numbers of individuals with whom they have been in contact and who share the same

       interests in child pornography.

              f.      Those who distribute, transport, receive, or possess child pornography, or

       who attempt to commit these crimes prefer not to be without their child pornography for

       any prolonged time period. This behavior has been documented by law enforcement

       officers involved in the investigation of child pornography throughout the world.

       76.    That an individual residing at 1804 Burke Street SE, Washington, District of

Columbia, namely Jesse Ryan Loskarn, exhibits the common characteristics of someone




                                                 35
        Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 36 of 43



involved in the distribution, transportation, receipt, and possession of child pornography, or the

attempt to distribute, transport, receive, or possess child pornography, is evidenced by the facts

that are set forth in this affidavit, including that the purchase of material containing nude boys

being exploited and that the Target IP address has had suspect child pornography offered to

participate for sharing on the Gnutella and eD2K network on October 5 and October 6, 2013.

                                          CONCLUSION

       77.     Based on the aforementioned factual information, your affiant respectfully

submits that there is probable cause to believe that an individual who resides at the residence

described above is involved in possession, receipt, and distribution of child pornography, and

attempt of the same, in violation of 18 U.S.C. §§ 2252 and 2252A. Additionally, there is

probable cause to believe that evidence of those criminal offenses is located in the residence

described above, and that such evidence, listed in Attachment B to this affidavit, is contraband,

the fruits of crime, or things otherwise criminally possessed, or property which is or has been

used as the means of committing the foregoing offenses.

       78.     Your affiant, therefore, respectfully requests that the attached warrant be issued

authorizing the search and seizure of the items listed in Attachment B.




                                                    _Sworn to before me telephonically s/Brian
                                              Bone_____________________________
                                                    Brian Bone
                                                    Postal Inspector
                                                    US Postal Inspection Service

       Sworn and subscribed before me this _10__th day of December ____, 20_13__.




                                                 36
Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 37 of 43



_s/John M. Facciola________________________________
[JUDGE’S NAME]
UNITED STATES MAGISTRATE JUDGE




                                 37
       Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 38 of 43



                                     ATTACHMENT A

              DESCRIPTION OF THE PREMISES TO BE SEARCHED

        The residence located at 1804 Burke Street SE, Washington, District of Columbia is a
multistory red brick attached residence located on the north side of Burke Street. The residence
has a covered front porch, white wood trim around each window, and gray shingles. The
residence has a carport located in the rear of the residence which leads to an alleyway between
Burke Street and Bay Street. The front door is red in color and has a white mailbox mounted
alongside the door frame. The numbers “1804” is posted adjacent to the front door.




                                               38
     Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 39 of 43



                                       ATTACHMENT B

                     ITEMS TO BE SEARCHED AND SEIZED

DESCRIPTION OF ITEMS TO BE SEIZED AND SEARCHED

1.   Computer(s), computer hardware, computer software, computer related documentation,
     computer passwords and data security devices, videotapes, video recording devices,
     video recording players, and video display monitors that may be, or are used to: visually
     depict child pornography or child erotica; display or access information pertaining to a
     sexual interest in child pornography; display or access information pertaining to sexual
     activity with children; or distribute, possess, or receive child pornography, child erotica,
     or information pertaining to an interest in child pornography or child erotica.
2.   Any and all computer software, including programs to run operating systems,
     applications (such as word processing, graphics, or spreadsheet programs), utilities,
     compilers, interpreters, and communications programs, including, but not limited to, P2P
     software.
3.   Any and all notes, documents, records, or correspondence, in any format and medium
     (including, but not limited to, envelopes, letters, papers, e-mail messages, chat logs and
     electronic messages, and handwritten notes) pertaining to the possession, receipt, or
     distribution of child pornography as defined in 18 U.S.C. § 2256(8) or to the possession,
     receipt, or distribution of visual depictions of minors engaged in sexually explicit conduct
     as defined in 18 U.S.C. § 2256(2).
4.   In any format and medium, all originals, computer files, copies, and negatives of child
     pornography as defined in 18 U.S.C. § 2256(8), visual depictions of minors engaged in
     sexually explicit conduct as defined in 18 U.S.C. § 2256(2), or child erotica.
5.   Any and all diaries, address books, names, and lists of names and addresses of
     individuals who may have been contacted by the operator of [target's e-mail address] by
     use of the computer or by other means for the purpose of distributing or receiving child
     pornography as defined in 18 U.S.C. § 2256(8) or visual depictions of minors engaged in
     sexually explicit conduct as defined in 18 U.S.C. § 2256(2).
6.   Any and all notes, documents, records, or correspondence, in any format or medium
     (including, but not limited to, envelopes, letters, papers, e-mail messages, chat logs and
     electronic messages, and handwritten notes), identifying persons transmitting, through
     interstate or foreign commerce by any means, including, but not limited to, by the United
     States Mail or by computer, any child pornography as defined in 18 U.S.C. § 2256(8) or
     any visual depictions of minors engaged in sexually explicit conduct, as defined in 18
     U.S.C. § 2256(2).
7.   Any and all notes, documents, records, or correspondence, in any format or medium
     (including, but not limited to, envelopes, letters, papers, e-mail messages, chat logs and
     electronic messages, other digital data files and web cache information) concerning the
     receipt, transmission, or possession of child pornography as defined in 18 U.S.C. §
     2256(8) or visual depictions of minors engaged in sexually explicit conduct, as defined in
     18 U.S.C. § 2256(2).
8.   Any and all notes, documents, records, or correspondence, in any format or medium
     (including, but not limited to, envelopes, letters, papers, e-mail messages, chat logs and


                                             39
      Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 40 of 43



      electronic messages, and other digital data files) concerning communications between
      individuals about child pornography or the existence of sites on the Internet that contain
      child pornography or that cater to those with an interest in child pornography.
9.    Any and all notes, documents, records, or correspondence, in any format or medium
      (including, but not limited to, envelopes, letters, papers, e-mail messages, chat logs and
      electronic messages, and other digital data files) concerning membership in online
      groups, clubs, or services that provide or make accessible child pornography to members.
10.   Any and all records, documents, invoices and materials, in any format or medium
      (including, but not limited to, envelopes, letters, papers, e-mail messages, chat logs and
      electronic messages, and other digital data files) that concern any accounts with an
      Internet Service Provider.
11.   Any and all records, documents, invoices and materials, in any format or medium
      (including, but not limited to, envelopes, letters, papers, e-mail messages, chat logs and
      electronic messages, and other digital data files) that concern online storage or other
      remote computer storage, including, but not limited to, software used to access such
      online storage or remote computer storage, user logs or archived data that show
      connection to such online storage or remote computer storage, and user logins and
      passwords for such online storage or remote computer storage.
12.   Any and all cameras, film, videotapes or other photographic equipment (including
      cellular telephones with the capability to take, send, store, or receive photographs or
      videos).
13.   Any and all visual depictions of minors.
14.   Any and all address books, mailing lists, supplier lists, mailing address labels, and any
      and all documents and records, in any format or medium (including, but not limited to,
      envelopes, letters, papers, e-mail messages, chat logs and electronic messages, and other
      digital data files), pertaining to the preparation, purchase, and acquisition of names or
      lists of names to be used in connection with the purchase, sale, trade, or transmission,
      through interstate or foreign commerce by any means, including by the United States
      Mail or by computer, any child pornography as defined in 18 U.S.C. § 2256(8) or any
      visual depiction of minors engaged in sexually explicit conduct, as defined in 18 U.S.C.
      § 2256(2).
15.   Any and all documents, records, or correspondence, in any format or medium (including,
      but not limited to, envelopes, letters, papers, e-mail messages, chat logs and electronic
      messages, and other digital data files), pertaining to occupancy or ownership of the
      premises described above, including, but not limited to, rental or lease agreements,
      mortgage documents, rental or lease payments, utility and telephone bills, mail
      envelopes, or addressed correspondence.
16.   Any and all diaries, notebooks, notes, and any other records reflecting personal contact
      and any other activities with minors visually depicted while engaged in sexually explicit
      conduct, as defined in 18 U.S.C. § 2256(2).
17.   Credit card information, including, but not limited to, bills and payment records.
18.   Records evidencing occupancy or ownership of the premises described above, including,
      but not limited to, utility and telephone bills, mail envelopes, or addressed
      correspondence.




                                              40
      Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 41 of 43



19.   Records or other items which evidence ownership or use of computer equipment found in
      the above residence, including, but not limited to, sales receipts, bills for Internet access,
      and handwritten notes.




                                               41
         Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 42 of 43



                                                 ATTACHMENT C

                                     SPECIAL SEARCH PROCEDURES

1.       I have been informed by the Prosecutors overseeing the investigation in this matter that
they have decided to adopt special procedures in light of the likelihood that computers, other
electronic devices (including mobile telephones, Blackberries, and the like), and electronic
storage media issued to Loskarn by the United States Senate (“Senate-Issued Devices”) will be
found at the Target Residence.
2.       The special search procedures will be employed with respect to any Senate-Issued
Devices in order to ensure that an appropriate opportunity is afforded to the Member of Congress
for whom Loskarn works to either waive or assert the Speech or Debate Privilege, U.S. Const.,
art I, § 6, cl. 1 (“the Privilege”), prior to any review of the content of those the Devices by
employees of the Executive Branch. 1 These special search procedures are as follows:
         a.       The Department of Justice will contact the Office of Senate Legal Counsel to
         inform them of the Warrant, and enlist their assistance in contacting the Member.
         b.       The agents executing the search will make reasonable efforts to identify any
         Senate-Issued Devices at the Target Residence. Those efforts will include the following,
         among others: (1) asking Loskarn to identify any Senate-Issued Devices present at the
         Target Residence; (2) looking for any markings or identifiers on the devices themselves
         indicating that they are the property of the Senate or Loskarn’s personal property; (3)
         obtaining information from Senate Legal Counsel and/or the Member of Congress
         regarding which Senate-owned devices have been issued to Loskarn. The agents will not
         review the contents of the devices in making this determination.
         c.       Before conducting any review of the contents of any Senate-Issued devices, the
         Department of Justice will request that the Member waive the Speech or Debate Privilege
         and consent to the search of Senate-Issued Devices pursuant to the instant Warrant. If the
         Member agrees to waive the Speech or Debate Privilege, the agents will be authorized to
         search the Senate-Issued Devices for evidence, fruits, and instrumentalities of Child
         Pornography consistent with the other procedures set forth in this affidavit.
         d.       If the Member declines to waive the Speech or Debate Privilege with respect to
         any Senate-Issued Devices found at the Target Residence, the agents executing the
         Warrant will obtain images of the Senate-Issued Devices without reviewing their
         contents, and return the original Devices to the Member, through Senate Legal Counsel,
         for a privilege review.
         e.       The Member will have thirty (30) days to review the Senate-Issued Devices and
         provide the Department of Justice with (1) any non-privileged material on the Devices
         and (2) a log of the records contained on the Devices over which the Privilege is being
         asserted. The log shall identify the record by date, recipient, sender, and subject matter if
         such information is available. The Government shall then request that the District Court
         review the records over which the Member has asserted privilege in order for the Court to
         make a final determination whether they contain privileged information.

1
  While the warrant does not call for the seizure of any legislative materials, the D.C. Circuit has held that even
incidental review of Speech or Debate privileged material by agents during the execution of a search of a Member’s
office violates the Privilege unless the member is provided an opportunity to review and assert the Privilege. United
States v. Rayburn House Office Building, Room 2113, 497 F.3d 654, 662 (2007).


                                                         42
Case 1:13-mj-00919-JMF Document 1-1 Filed 12/10/13 Page 43 of 43



f.      The Member may, alternatively, complete the privilege review within 30 days by
working together with agents assigned to the investigation to review the contents of the
Senate-Issued Devices jointly.
g.      If the Member fails to complete the privilege review within 30 days, the
government will provide the contents of the Devices to the Court for review.
h.      Neither the Department of Justice nor the agents executing the Warrant -- nor any
other employee of the Executive Branch -- shall review the contents of the Senate-Issued
Devices until: (1) the Member consents to such a review, as set forth in Paragraph (c); (2)
the Member identifies non-privileged material on the Devices that can be reviewed, as set
forth in Paragraph (e); (3) the Member and law enforcement agents review the contents of
the Devices jointly, as set forth in Paragraph (f); or (4) pursuant to further order of the
Court.




                                        43

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:1706
posted:12/18/2013
language:English
pages:44
huffpostpol huffpostpol http://
About