You are on page 1of 8
= ‘4093 (Rev 11/13) Search and Seizure Warrant UNITED STATES DISTRICT COURT for the District of Massachusets In the Matter of the Search of (Grief describe the property tobe searched ‘rider the person By name and address) 28 Albion Street, Apartment 1, Somerville, Massachusetts, as described in Attachment A Cuno. 14 -H3-9937- mag SEARCH AND SEIZURE WARRANT To: Any authorized law enforcement officer An application by a federal law enforcement officer or an attomey for the government requests the search of the following person or property located in the District of Massachusetts (ders the person or describe the property to be searched and give is Yocaion): 28 Albion Street, Apartment 1, Somerville, Massachusetts, as described in Attachment A (find that the affidavit(s), or any recorded testimony, establish probable cause to search and seize the person or property described above, and that such search will reveal (demi she person or describ the property tobe seized): Evidence, fruits, and instrumentalities of violations of 18 U.S.C. § 1030(a)(5)(A) (intentionally causing damage to a protected computer) and 18 U.S.C. § 371 (conspiracy), as described in Attachment B. YOU ARE COMMANDED to execute this warrant on or before October 13.2014 nor t exceed 14 dys) ‘A in the daytime 6:00 a.m. to 10:00 p.m. Jat any time in the day or night because good cause has been established. Unless delayed notice is authorized below, you must give a copy of the warrant and a receipt for the property taken to the person from whom, or from whose premises, the property was taken, or leave the copy and receipt at the place where the property was taken. The officer executing this warrant, or an officer present during the execution of the warrant, must prepare an inventory as required by law and promptly return this warrant and inventory to Hon. Marianne B. Bowler (United States Magistrate Judge) Pursuant to 18 U.S.C. § 3103a(b), | find that immediate notification may have an adverse.regult listed in 18 U.S.C, § 2705 (except for delay of trial), and authorize the officer executing this warrant to gon who, oF whose property, will be searched or seized (check the appropriate box) OF for ___ days (orto exceed 30) until, the facts justifying, the later sp Pere a “planer ga 2a City and state: Boston, MA 093 (Rew 11/3) Search and Seizare Warrant Page 2) Return [Case Now Date and time warrant executed: ‘Copy of warrant and Inventory left with: Tnventory made in the presence of Inventory of the property taken and name of any person(s) se ‘Certification | declare under penalty of perjury that this inventory is correct and was returned along with the designated judge, Executing ofcer's signature Prinied name and tile ATTACHMENT A ‘THE PREMISES TO BE SEARCHED The premises to be searched are located at 28 Albion Street, Apartment 1, Somerville, Massachusetts. This building is a brown/red, multi-family, three-story house, with a front entrance, two mailboxes labeled “I” and “2,” and driveway on the left side. Based on observations from outside the front door, it appears that Apartment 1 is located on the first floor and that its door is directly inside the exterior door to the house. See the photograph below. Photograph 1: Front of 28 Albion St, Somerville, MA ATTACHMENT B ITEMS TO BE SEIZED |. All records, in whatever form, and tangible objects that constitute evidence, fruits, or instrumentalities of violations of 18 U.S.C. § 1030(a)(5(A) (intentionally causing damage to a protected computer) and 18 U.S.C. § 371 (conspiracy), including those related to: A. The following people, entities, physical addresses, telephone numbers, bank accounts, websites, e-mail addresses, IP addresses: 1. IP address 209.6,193.140 2. [address 134.174.13.5 3. Boston Children’s hospital 4. Justina Pelletier 5. Logan River Academy 6. Greatschools.org 7. NSTAR 8. Wayside Youth and Family Support Network 9. Judge Rotenberg Educational Center 10. Sorenson's Ranch Il. Twitter accounts @AnonMercurial, @AnonMercurial2 or @PacketSignal B. The following topics: 1. DDOS and other computer network attacks 2. The group Anonymous 3. #OpJustina and #Opliberation Bs Tools and techniques related to hiding online identity, including TOR and Risup.net Troubled teen industry, Treatment centers and associated entities ‘The identity, location, and travel of any co-conspirators, as well as any co- conspirators’ acts taken in furtherance of the crimes listed above; For any computer hardware (including smartphones and tablets), computer software, or storage media called for by this warrant or that might contain things otherwise called for by this warrant (“the computer equipment”): r evidence of who used, owned, or controlled the computer equipment; evidence of malicious computer software that would allow others to control the computer equipment; evidence of the lack of such malicious software; and evidence of the presence or absence of security software designed to detect malicious software; evidence of the attachment of other computer hardware or storage media; evidence of counter-forensic programs and associated data that are designed to eliminate data; evidence of the times the computer equipment was used; passwords, encryption keys, and other access devices that may be necessary to access the computer equipment; records and tangible objects pertaining to accounts held with companies providing Internet access or remote storage of either E. data or storage media; and Records and tangible objects relating to the ownership, occupancy, or use of the premises to be searched (such as utility bills, phone bills, rent payments, mortgage payments, photographs, insurance documentation, receipts and check registers). Tl, All computer hardware (including smartphones and tablets), computer software, and storage media. Off-site searching of these items shall be limited to searching for the items described in paragraph I. DEFINITIONS For the purpose of this warrant: A “Computer equipment” means any computer hardware, computer software, computer-related documentation, storage media, and data. “Computer hardware" means any electronic device capable of data processing (such as a computer, personal digital assistant, cellular telephone, or wireless communication device); any peripheral inpuvoutput device (such as a keyboard, printer, scanner, monitor, and drive intended for removable storage media); any related communication device (such as a router, wireless card, modem, cable, and any connections), and any security device, (such as electronic data security hardware and physical locks and keys). "Computer software" means any program, program code, information or data stored in any form (such as an operating system, application, utility, communication and data security software; a log, history or backup file; an encryption code; a user name; or a password), whether stored deliberately, inadvertently, or automatically. “Computer-related documentation" means any material that explains or illustrates the configuration or use of any seized computer hardware, software, or related items, "Storage media” means any media capable of collecting, storing, retrieving, or transmitting data (such as a hard drive, CD, DVD, USB or thumb drive, or memory card). "Data" means all information stored on storage media of any form in any storage format and for any purpose. "A record!” is any communication, representation, information or data, A “record” may be comprised of letters, numbers, pictures, sounds or symbols. RETURN OF SEIZED COMPUTER EQUIPMENT If, after inspecting seized computer equipment, the government determines that the equipment does not contain contraband or the passwords, account information, or personally- identifying information of victims, and the original is no longer necessary to preserve as evidence, fruits or instrumentalities of a crime, the equipment will be returned within a reasonable time, if the party seeking retum will stipulate to a forensic copy’s authenticity (but, not necessarily relevancy or admissibility) for evidentiary purposes. If computer equipment cannot be returned, agents will make available to the computer system's owner, within a reasonable time period after the execution of the warrant, copies of files that do not contain or constitute contraband; passwords, account information, personally- ‘dentit¥ing information of victims; or the fruits or instrumentalities of erime.