SIMULATED DETECTIVE REPORT - EDUCATIONAL USE ONLY City of Monterey, CA Police Department Detective Investigation Status Report Date 09 December 2009 Time 11:30 AM Affiant Detective Joe Friday Case Number MT-2009-12-015 Report Number 001 Summary Possible cat exploitation possession investigation. Cause for Action Received a call from: Aaron Greene 123 Cloudy Hill Drive Monterey, CA 93940 Aaron Greene had purchased a used computer from a seller on Craig's List, a web site. When Aaron Greene started this computer, she found that the previous owner had not erased the hard disk computer drive. She claims to have found kitty exploitation movies and pictures on the computer. Action Taken Officers were sent to Aaron Greene's house to take possession of the computer, which Greene voluntarily released. Greene also gave the name of the seller: Terry Johnson Email: No other information was available. Outcome Computer has been recovered, logged as evidence (MT-2009-12-015-EV001) and sent to forensics lab.SIMULATED DETECTIVE REPORT EDUCATIONAL USE ONLY City of Monterey, CA Police Department Detective Investigation Status Report Date 10 December 2889 Time 09:30 AM Afant Detective [0e Friday Case Number MT2009-12-015 Report Number 002 Summary Kitty exploitation found on computer, investigation proceeding. Cause for Action Forensic tech identied several known kitty exploitation videos and images on the recovered computer [MT-2009-12-015-EV001], and a possible owner. Based on the data recovered from the computer, we believe that the original owner of the computer was a local company, called M57 Patents. The user of the computer was named ]o [no last name available). Action Taken Further investigation is necessary to determine if Io was the owner of the les, and to determine if any further incriminating evidence is available. From business records, we have determined that the owner of the company is Pat McGoo. We are considering contacting McGoo, rather than pursuing a warrant Outcome Discussion with Chief of Detectives about contacting McGoo and pursuing a voluntary search. SIMULATED DETECTIVE REPORT - EDUCATIONAL USE ONLY City of Monterey, CA Police Department Detective Investigation Status Report Date 10 December 2009 Time 4:30 PM Affiant Detective Joe Friday Case Number MT-2009-12-015 Report Number 003 Summary Contact with Pat McGoo; authorized voluntary search. Cause for Action After evidence of kitty exploitation was found on the computer referenced in prior reports, CoD determined that the best course of action would be to meet with McGoo and pursue a voluntary search of as much information as possible. The decision was made to pursue a warrant only if required. Action Taken Detectives Friday and Gannon met with McGoo at M57 Patents. We were able to speak to him privately. McGoo indicated that the computer was probably stolen, having been told it was non-functional. McGoo confirmed that Jo was an employee. McGoo was cooperative, but wanted to speak with a lawyer before authorizing search. Outcome McGoo has contacted a lawyer, and seems to intend to authorize a search. McGoo has promised not to tell employees, and will contact us with a decision tomorrow morning.SIMULATED DETECTIVE REPORT EDUCATIONAL USE ONLY City of Monterey, CA Police Department Detective Investigation Status Report Date 10 December 2009 Time 5:00 PM Affiant Detective [oe Friday Case Number MT-2009-12-015 Report Number 004 Summary Warrant granted for USB thumb drive owned by lo. Cause for Action Forensic technologists were able to determine from the computer that a USB thumb drive possibly owned by Io was used to connect to the computer, and possibly used to transfer Rim exploitation material. Action Taken With the assumption that the USB thumb drive is owned by lo, we have requested and been granted a warrant to seize the USB drive. The warrant was based upon data found on the computer MT-2009-12-015-EV001. The warrant has been logged as MT-2009-12-015-W001. Outcome If we are granted permission to search computers at M57 Patents, we will execute the warrant and seize the thumb drive [if it is in Jo's possession] at that time. If not, we will make a decision about when to execute the warrant. MT2009-12-015-W001 SIMULATED WARRANT State of California - County of Monterey Search Warrant and Afdavit g Afdavit ) Detective Joe Friday, swears under oath and declares under the penalty of perjury that the facts expressed in this Search Warrant, Afdavit, and the attached and incorporated statement of probable cause to believe and does believe that the property described below is seizable pursuant to Penal Code Section 1524, as indicated below, and is now located at the locations below. Wherefore, afant requests that this Search Warrant be issued. Night Search Requested: [I Yes El No Justication on page(s):_ Afant's Signature: Reviewed By: (After Being Sworn) (Deputy Attorney General) (Search Warrant) THE PEOPLE OF THE STATE OF CALIFORNIA TO ANY SHERIFF, POLICEMAN OR PEACE OFFICER IN THE COUNTY OF MONTEREY: proof by afdavit having been made before me by that probable cause to believe that the property described herein and that it is lawfully seizable pursuant to Penal Code Section 1524, as indicate below: D was stolen or embezzled El was used as the means of committing a felony I] is possessed by a person with the intent to use it as a means of committing a public offense or is possessed by another to whom he or she may have delivered it for the purpose of concealing it or preventing its discovery El tends to show that a felony has been committed or that a particular person has committed a felony |:| tends to show that exploitation of a cat has occurred or is occurring YOU ARE THEREFORE COMMANDED TO SEARCH THE PREMISES OF: LOCATION Company: m57 Patents 123 Old Fisherman's Drive Monterey, CA 93940 SEARCH WARRANT PAGE 1 MT2009-12-015-W001 SIMULATED WARRANT FOR THE FOLLLOWING PROPERTY: 1. The subscriber information, usemames and account information for any and all computers assigned to Jo Smith from November 13, 2009 to December 12, 2009. 2. A RAM image for any and all computers assigned to Jo Smith from November 13, 2009 to December 12, 2009. 3. A hard disk drive image for all computers assigned to J 0 Smith from November 13, 2009 to December 12, 2009. 4. All USB thumb drives in J o Smith's possession, regardless of ownership. FURTHER ORDERS It is further ordered that the records obtained pursuant to this warrant (with the exclusion of prohibited/illegal material) may be shared with M57 Patents and the civil division of the Ofce of the Attorney General for purposes of any civil action related to the unauthorized use of corporate equipment, intellectual property, or work product. The court orders that any items seized during the lawful service of this search warrant be disposed in accordance with the law, by the Monterey County Prosecutor, upon adjudication of the case. The ofcers serving the warrant are not authorized to return seized items to any known victim(s), as the items may contain illegal/prohibited material. Further application for such returns shall be issued by this court on evidence that the items contain no illegal/prohibited material, or that any such material has been destroyed, and also that the item itself serves no further material purpose in the investigation of illegal criminal or civil activity. If necessary, searching ofcers are authorized to employ the use of outside experts, acting under the direct control of the investigating ofcers, to access and preserve any computer data. AND TO SEIZE IT IF FOUND and bring forthwith before me, or this court, at he courthouse of this court. The Search Warrant and incorporated Afdavit was sworn as true and subscribed before me the day of , 2009, at A.M/P.M. Wherefore, I find probable cause for the issuance of this Search Warrant and do issue it. Night search approved: YES I:| NOEI (Signature of Magistrate) (Magistrate's initials) Executed By: Date: Time: SEARCH WARRANT PAGE 2 MT-2009-12-015-W001 SIMULATED WARRANT Afdavit in Support of Search Warrant County of MONTEREY 1, Joe Friday, your afant, have been a full time peace ofcer for over eleven years. I am currently employed as a Detective in the City of Monterey Police Department. I have written and served several search warrants for digital evidence and am familiar with the type of data routinely stored by Internet Service Providers, Electronic Communications Service Providers, nancial institutions and other businesses that maintain electronic records. On 09 December 2009, Aaron Greene contacted the City of Monterey Police Department by telephone regarding a computer he had purchased online. Greene (hereafter referred to as \"the purchaser\") found the computer on Craigslist, and subsequently purchased it from Terry Johnson via a PayPal transaction. Terry Johnson delivered the computer to the purchaser's home. The purchaser discovered that the computer's hard drive had not been erased prior to the sale. After starting the computer, the purchaser found illegal pornographic images and videos stored on the hard drive, and contacted the City of Monterey Police Department. The purchaser agreed to surrender the computer to the City of Monterey Police Department. Two Police Ofcers were dispatched to the purchaser's home, at [ADDRESS REDACTED], where the hardware was acquired and transported to a forensics laboratory. Your afant knows from training and experience that operating systems commonly used on business computer workstations log a variety of information and secondary data related to the dates and times at which particular les are copied, moved, and accessed. Additional information regarding the use of secondary storage devices (removable media or USB \"thumb drives\") is also logged. Email, digital images, and external contacts associated with accounts on this computer will help identify the user associated with the illegal materials found on this machine. Additionally, the court should be aware that the CEO of \"m57.biz\" (Teny Johnson's employer) has voluntarily agreed to release all electronic assets from the company in support of this investigation, including forensic copies of hard disks associated with all computers used by employees, live memory (RAM) images from machines running in the ofce, and copies of any other removable media located on-premises. I believe based on the aforementioned circumstances that the following felony crimes have been committed: 31 1.3(a) [Exploitation of a non-consenting entity]. I pray a search warrant be issued for the following location: SEARCH WARRANT PAGE 3