Beruflich Dokumente
Kultur Dokumente
X.Jmf,ted
for the
Westem District of New York
0a
312a8
the
proFtrty to
be
Case
R21C9rvK3WP.
No. 15-MJ-
1Zl3
I,
Attachment A.
he
?dentih,
rhe
seized)',
Attachment B, Schedule of Items to be Seized, all of which are fruits, evidence and instrumentalities
of a violation of Title 18, United States Code, Section 23398,
.gee
The basis for search under Fed. R. Crim. P. al(c) is (check one or more/.
evidence of a crime;
conffaband, fruits of crime, or other items illegally possessed;
property designed for use, intended for use, or used in committing a crime;
a person to be arrested or a person who is unlawfully restrained.
x
a
a
!
The search is related to a violation of: Title 18, United States Code, Section 23398 (affempt to provide matefial
support and resources to a designated foreign terrorist organization).
The application is based on these facts'. See attached affidavit.
continued on the attached sheet.
days (give exact endingdate if more than 30 days:
Delayed notice of
requisted under 18 U.S.C. $ 3103a, the basis of which is set forth on the attached sheet'
a
tr
is
-)
fncu'q
ti (tuit-
'
Judge\ signature
State of New
York
County of Monroe
City of Rochester
)
)
SS:
I, TIMOTHY J. KLAPEC, being duly sworn, depose and state the following:
1.
am a Special Agent with the Federal Bureau of lnvestigation (FBI), and have
I am currently
I work with
a team of federal,
state, and local law enforcement agents and officers on investigations relating to domestic and
methods, and techniques used by terrorist organizatrons and their members, and by individuals
seeking to
join or engage in acts on behalf of terrorist organizations. I have also conferred with other
FBI Special Agents who have expertise and experience in counterterrorism investigations and digital
evidence.
2.
Rules
- specifically a
EMANUEL L. LUTCHMAN
3.
The information contained in this affidavit is based on, among other thingS, ffiY
personal participation
provided by reliable
confidential human sources (CS-l and CS-2), online communications between the confidential
human sources and LUTCHMAN, consensual recordings of conversations between the confidential
human sources and LUTCHMAN,T discussions I have had with other members of the investigative
team, and my review of documentary evidence gathered during this investigation. At various points
in this
affidavit,
LUTCHMAN, and information from CS-l and CS-2. Additionally, it should be noted that any
direct quotations from the consensual recordings contained in this affidavit are based primarily on
my review of draft transcripts of the recordings and, therefore, ate preliminary. Because this
affidavit is submiued for the limited purpose of obtaining a search warrant, I have not included each
and every fact known to me concerning this investigation.
4.
Based on my training and experience, and the facts set forth in this affidavit, there is
EMANUEL L. LUTCHMAN
of
18
U'S.C.
$ 23398 (attempt to provide material support and resources to a designated foreign terrorist
organization). There is also probable cause to search the Samsung cellular telephone described in
Attachment
as described in
Attachment B.
tr. IDENTtrIICATION
5.
Telephone is currently in the possession of the FBI in Rochester, New York. The requested search
Unless otherwise indicated, all of the telephone andface-to-face conversations summarizedin this affidavit
were recorded and those recordings were made with the consent of CS-1 and CS-2.
walrant would authorize the forensic examination of the Subject Telephone for the purpose of
identifuing elecffonically stored dataparticularly described in Attachment B.
III.
PROBABLE CAUSE
6.
On October 15, 2004, the United States Secretary of State designated al-Qa'ida in
Iraq ("AQI"), then known as Jam'at al Tawhid wa'al-Jihad, as a Foreign Terrorist Organization
7.
FTO under Section 2L9 of the Immigration and Nationality Act and as a Specially Designated
Global Terrorist entity under section 1(b) of Executive Order 13224 to add the alias Islamic State of
Iraq and the Levant (ISIL) as its primary name. The Secretary also added the following aliases to
the ISIL listing: the Islamic State of lraq and al-Sham (ISIS), the Islamic State of Iraq and Syria
(ISIS), ad-Dawla a1-Islamiyya fi al:kaq wa-sh-Sham, Daesh, Dawla al Islamiya, and Al-Furqan
Establishment for Media Production. Although the group has never called itself "Al-Qaeda in Iraq
(AQI)," this name has frequently been used to describe it through its history. To date, ISIL remains
a designated FTO. In an audio recording publicly released on June 29, 2014,ISIL announced a
formal change of its name to Islamic State (IS). On or about September 21, 2014,ISIL spokesman
Abu Muhammad al-Adnani called for attacks against citizens-military or civilian--of the countries
participating in the United States-led coalition against ISIL.
Subject of the Investigation
8.
resides
dating back to approximately 2006 (which includes a New York state conviction for Robbery 2'
from 2006, for which he served approximately 5 years in prison), as well as previous state Mental
Hygiene affests. As detailed below, LUTCHMAN has attempted to provide material support and
resources, namely, himself as personnel and services,
received direction from an overseas
civilian(s) at a restaurant/bar located in the Rochester area on New Year's Eve on behalf of ISIL
and in furtherance of his plan to join ISIL overseas.
9.
one
(Facebook User ID
ID
100010675504214)
Google+ account had a profile picture of an individual with the black flag used by ISIL with a group
of what
appear
to be ISIL members wearing camouflage and carrying firearms, and the words
in
with the
words, "I am a Muslim and I Support Islamic State," and the black flag used by ISIL. As of October
LUTCHMAN
photograph of
"Khilafah," which is a reference to ISIL. Information and posts on these accounts include, among
I believe the rwo Facebook accounts ending in 6661 and 4274 are used by LUTCHMAN due to the names
associared wirh those accounts (Lamar is LUTCHMAN's middle name) and the fact that photographs
displayed on those accounts include images of LUTCHMAN. In addition, I believe that the Google+ account
belongs to LUTCHMAN because of the name and the fact that LUTCHMAN told CS-l that he had set up a
2
-4-
other things, expressions of support for ISIL, imagery relating to ISIL, and videos and digital
versions of documents relating to ISIL.
In
10.
"dawlatul," which are terms commonly used to refer to ISIL) and his desire to travel overseas to join
ISIL in Syria.
11.
In late December 2015, LUTCHMAN told CS-l that he had been in contact with an
forwarded to CS-1 screenshots of the text communications that he had with the Overseas Individual.
In
sum and substance, those screenshots contained the following information. On or about
December
was like in
LUTCHMAN
described being
asked what
it
CS-l has been cooperating with the FBI for over a year, and has been paid approximately $19,784 as of
approximately December 2015. The information provided by CS-1 has been corroborated by the JTTF
through independent investigation, information provided by other law enforcement agencies, consensual
recordings of conversations bettveen CS-l and LUTCHMAN, screen shots of electronic communications
between CS-} and LUTCHMAN, and consensual recording of conversations berween CS-2 and
LUTCHMAN. The information provided by CS-l has been found to be accurate and reliable.
3
,,Hljra,, is an Arabic word that means migration or joumey. In the context of this case, LUTCHMAN
using the word "hijra" to refer to his migration to join ISIL in Syria.
-5-
is
to
Individual what he should do if he cannot make hijra. The Overseas Individual stated that the
Syrian borders were currently closed, but should open in a few months, and asked
if LUTCHMAN
him. The Overseas Individual then stated that, if LUTCHMAN did not
and prove that he was one of them. LUTCHMAN asked how he could prove himself and he
confirmed that he was one of them. The Overseas Individual responded, among other things, that
LUTCHMAN would have to pray regalarly, the Overseas Individual would have to get to know
LUTCHMAN, and LUTCHMAN would have to prove to ISIL that he (LUTCHMAN) supports
ISL. LUTCHMAN
that [he] know[s] to do operation for the sake of Allaah." When the Overseas Individual asked what
was stopping
he
did not want to go back to prison. The Overseas Individual responded that LUTCHMAN can make
sure that he does not go back to prison, and told LUTCHMAN to calry around a weapon and
"something happens
with a "brother." The Overseas Individual advised LUTCHMAN to write something before the
operation and give
LUTCHMAN's bayah6 to ISIL. LUTCHMAN stated that he does not have the funds to obtain
weapons,
he
(LUTCHMAN) can, and kill "1000000s of kuffar." The Overseas Individual emphasized that
"Kuffar" is an Arabic word that means non-believer or infidel. It is a derogatory term used to refer to a
person who does not adhere to the tenets of Islam. In the context of this case, LUTCHMAN uses the word
"kuffar" to refer to Americans.
5
6 *Bayah" is an Arabic word that means an oath of allegiance to a leader. In the context of this case,
LUTCHMAN uses this word to refer to his oath of allegiance to ISIL and its leader, Abu Bakr al-Baghdadi'
most hated enemy (meaning the United States). The Overseas Individual told LUTCHMAN that
whatever he (LUTCHMAN) sends ISIL, they would keep it until the operation was completed and
LUTCHMAN
Overseas Individual
that he (the Overseas Individual) would love to come to the United States to commit an operation.
"brothers" that want to make hijra and plan for an operation. The Overseas Individual encouraged
if
operation does not succeed, he (the Overseas Individual) would help LUTCHMAN and his
"brothers" make
hijra. The Overseas Individual told LUTCHMAN to show them (ISL) how
LUTCHMAN told the Overseas Individual that he hates it in the United States, that he wants to
join the ranks of ISIL, and that he is ready to "give everything up" to be in Syria with ISIL. The
Overseas Individual told
12.
confidential source (CS-3). Attached to the message was an audio recording of LUTCHMAN
swearing bayah to ISIL and its leader, Abu Bakr al-Baghdadi.
13.
2015,
with the FBI in or about November 2013. As of December 2015, the FBI has paid
CS-2 a total of approximately $7,400 in exchange for his cooperation in an unrelated investigation. CS-2 has a
prior felony conviction for Attempted Criminal Sale of a Controlled Substance 3" from Monroe Counry Court
from 2003, for which he was sentenced to one (1) year in jail, and a prior misdemeanor conviction for
Criminal Possession of a Controlled Substance 7" from Rochester City Court from 2004. CS-2 continues to
cooperate with the FBI in anticipation of receiving additional monetary compensation. The information
provided by CS-2 has been corroborated by the JTTF through independent investigation, physical surveillance,
-t
to ISIL (referring to ISIL as "Dawla"). LUTCHMAN confirmed that he was in contact with the
Overseas Individual and recounted some
Specifically, LUTCHMAN stated that the Overseas Individual told him the borders (in Syria) are
closed, and that
possible
out." LUTCHMAN
stated that the Overseas Individual told him that, because the borders
Year's and afterward it could help the process of them making hijra to ISIL. LUTCHMAN stated
that he had been communicating with another individual
was CS-3
- who, unbeknownst
to LUTCHMAN,
about the operation. According to LUTCHMAN, CS-3 was supposed to have all of the
to
LUTCHMAN also stated that his "real intention is to do an act, to get to hijra." LUTCHMAN
discussed
with CS-2 doing assassinations and using a pressure cooker bomb. LUTCHMAN
said
that he wanted to execute the plan so they could be "in and out," noting that they should make it
"quiet and simple" so they can go about doing what they need to do to make hijra. He also said
that, after the operation, "they're going to be hunting for us," meaning that law enforcement
authorities would be seeking to capture them. CS-2 asked LUTCHMAN if they would use a knife
in the event they could not use a pressure cooker bomb or firearm(s). LUTCHMAN responded that
he has a "brother" who has a machete. LUTCHMAN said, "that's what my plan, that's on my
public records, information provided by other law enforcement agencies, consensual recordings of
conversations between CS-2 and LUTCHMAN, and consensual recordings of conversations between CS-1
and LUTCHMAN. The information provided by CS-2 has been found to be accurate and reliable.
informed LUTCHMAN that he (CS-3) would not be participating in the operation and
ceased
communications with LUTCHMAN. Later that day, LUTCHMAN exchanged text messages with CS-2 in
which he informed CS-2 that CS-3 would not be participating in the operation. LUTCHMAN also told CS-2,
"In a way I [LUTCHMAN] was thinking about stopping the operation cuz I was trusting [CS-3] and at the last
of our moment he decided to pull out." CS-2 responded that he would see LUTCHMAN later and told
LUTCHMAN not to let CS-3's backing out of the operation upset him. As detailed in this affrdavit,
LUTCHMAN continued to plan the operation after these communications with CS-2.
-8-
mind, that's all I been thinking about. 'Cause I'm getting amped up, to accept the fact that's what
gotta do, 'cause
want to make
hijra." LUTCHMAN
United States) and that he wants to live under the caliphate. LUTCHMAN also said that "the
connection with Dawla [meaning ISIL] is akeady established. It's just that, we just gotta show our
allegiance. I'm ready to lose my family."
CS-2.
During the meeting, LUTCHMAN indicated that he wanted to target a club/bar, suggesting that
they could sneak a bomb into the clab/bar and plant the bomb inside. LUTCHMAN proposed that
they kidnap a couple of people and kill them. LUTCHMAN stated that they would need to wear
masks during the operation so they would not get caught by law enforcement authorities, noting that
he had a "brother" who would sell the masks for $5.
a restaurant/bar
it
At
as a potential target of the attack. LUTCHMAN said that he does not have any funds.
that."
Ultimately,
LUTCHMAN stated that they would use knives during the attack, noting that he knew
someone
15.
CS-i.
During the conversation, LUTCHMAN discussed the fact that CS-3 pulled out of the
operation. Specifically, LUTCHMAN said that he was trying to get CS-3 to send money for the
operation. LUTCHMAN told CS-l that he was about to call his "friend" so they could go and pick
up the machete. CS-l stated that there were only two days until New Year's and LUTCHMAN
responded that they needed to get gloves, masks, and zip
had already selected atarget location. LUTCHMAN also said that they needed the zip ties, which
are plastic hand restraints, in case they kidnap somebody.
-9
16. In the evening on or about December 29, 20L5, LUTCHMAN met with CS-2.
During the meeting, LUTCHMAN and CS-2 went to a Walmart store on Hudson Avenue in
Rochester, New York, to purchase supplies for the operation. While there, they purchased 2 black
ski masks, zip-ties, 2 knives, a machete, duct tape, ammonia and latex gloves.e Due to the fact that
LUTCHMAN did not have any funds with him at the store,
items. Later, LUTCHMAN and CS-2 discussed the operation. LUTCHMAN stated, "It's going to
get real after
this. It's just you, me and the Lord. We gotta do this, we gotta do this precise."
LUTCHMAN stated that, "Tf we grab somebody, they can't live. They may identify the vehicle.
They can't
live."
the
restavrant/bar that he had previously identified and discussed in general terms how they would
select and abduct a
We got the knives, we got the gloves, we got the ammonia, so whatever the case may be."
LUTCHMAN and CS-2 also discussed making a video before the operation, in which they would
explain their rationale for the attack (to take the offensive against the kuffar) and swear bayah to the
leader of ISIL, Abu Bakr al-Baghdadi. LUTCHMAN stated that he planned to release the video
after they complete the operation.
17.
who was in a vehicle with CS-2 at the time. Prior to the arrest, LUTCHMAN made a video, which
was recorded on the Subject Telephone by CS-2. In the video,
and its leader, Abu Bakr al-Baghdadi., and claimed responsibility for the planned attack in Rochester.
The arrest team seized the Subject Telephone from LUTCHMAN's person incident to the arrest.
Regarding the items purchased at Walmart, LUTCHMAN independently picked out the zip ties without
input from CS-2. CS-2 asked LUTCHMAN questions on other items to purchase based the conversation CS-2
had with LUTCHMAN on the evening of December 28,2015, during which LUTCHMAN identified some of
the items he wished to obtain for the attack. LUTCHMAN answered affrrmatively to CS-2's questions.
e
-10-
18.
After LUTCHMAN's affest, the investigative team obtained a search warrant from
this Court, under Magistrate's Number L5-MJ-4211, atthorizing the search of LUTCHMAN's
residence at 120 Fernwood Park, Rochester, New York.ro The search warrant authorrzedthe seizure
of the items purchased at Walmart by LUTCHMAN and CS-2 (including the machete, ski masks,
zip ties, duct tape, ammonia and latex gloves), and any mobile telephones and smart
phones.
During the search of the residence, the investigative team seized, among other things, the items
purchased
19.
The Subject Telephone is currently in a secured evidence locker at the FBI offices in
Rochester, New
York.
a manner in which its contents are, to the extent material to this investigation, in substantially the
same condition as they were when the device first came into the possession of the
FBI on December
30, 2015.
Technical Terms
20.
r0
As detailed in the affidavit submitted in support of the search warrant for LUTCHMAN's residence,
physical surveillance of LUTCHMAN showed that he resided at 120 Fernwood Park. Specifically, on
December 28 and 29, 2075, CS-2 picked up and dropped off LUTCHMAN in the viciniry of 120 Fernwood
Park, before and after their meetings on those dates. After being dropped off by CS-2 late in the evening on
December 29, 2015, LUTCHMAN walked in the direction of 720 Fernwood Park carrying the items
LUTCHMAN and CS-2 had purchased at Walmart to use in the New Year's Eve attack. In addition, on
December 29, 2015, a JTTF surveillance team observed LUTCHMAN enter 120 Fernwood Park at
approximately 12:38 p.m., and later observed LUTCHMAN exit 120 Fernwood Park at 7:51 p.m. On
December 30, 2015, a member of the investigative team spoke with LUTCHMAN's significant other. She
described her relationship with LUTCHMAN as husband and wife, noting that they have a child in common.
She further stated that LUTCHMAN stays at 720 Fernwood Park periodically and that he was staying there
over the past week.
11
a.
Wireless telephone:
wireless telephone
(or mobile
telephone,
or
cellular
telephone) is a handheld wireless device used for voice and data communication through radio
enabling
wireless
telephone usually contains a "call log," which records the telephone number, date, and time of calls
made to and from the phone. In addition to enabling voice communications, wireless telephones
offer a broad range of capabilities. These capabilities include: storing names and phone numbers in
electronic "address books;" sending, receiving, and storing text messages and e-mail; taking,
sending, receiving, and storing still photographs and moving video; storing and playing back audio
files; storing dates, appointments, and other information on personal calendars; and accessing and
downloading information from the Internet. Wireless telephones may also include global
positioning system ("GPS") technology for determining the location of the device.
b.
Digital camera: A digital camera is a camera that records pictures as digital picture
camera
to store their recorded images. Images can usually be retrieved by connecting the
separate reader.
Removable storage media include various types of flash memory cards or miniature hard drives.
Most digital cameras also include a screen for viewing the stored images. This storage media can
contain any digital data, including data unrelated to photographs or videos.
c.
handheld digital storage device designed primarily to store and play audio, video, or photographic
files. However, a portable media player can also store other digital data. Some portable
media
players can use removable storage media. Removable storage media include various types of flash
memory cards or miniature hard drives. This removable storage media can also store any digital
-t2-
data. Depending on the model, a portable media player may have the ability to store very large
amounts of electronic data and may offer additional features such as a calendar, contact list, clock,
or games.
d.
System
to display its
current location.
usff driving or walking directions to another location. These devices can contain
contains an extremely accurate clock. Each satellite repeatedly transmits by radio a mathematical
representation of the current time, combined with a special sequence of numbers. These signals are
sent by radio, using specifications that are publicly available.
those signals. When a GPS antenna receives signals from at least four satellites, a computer
connected
and
e. PDA: A personal
storing data (such as names, addresses, appointments or notes) and utilizing computer programs.
Some PDAs also function as wireless communication devices and are used to access the Internet and
send and receive e-mail. PDAs usually include a memory card or other removable storage media for
storing data and a keyboard and/or touch screen for entering data. Removable storage media
include various types of flash memory cards or miniature hard drives, This removable storage media
can store any digttal data. Most PDAs run computer software, giving them many of the same
capabilities as personal computers. For example, PDA users can work with word-processing
documents, spreadsheets, and presentations. PDAs may also include global positioning system
f.
operated
communication devices and can be used to access the Internet through cellular networks, 802.11
"wi-fi" networks, or otherwise. Tablets typically contain programs called apps, which, like
programs on a personal computer, perform different functions and save data associated with those
functions. Apps can, for example, permit accessing the Web, sending and receiving e-mail, and
participating in Internet social nefworks.
g. IP Address: An Internet
numeric address used by computers on the Internet. An IP address is a series of four numbers, each
in the range 0-255, separated by periods (e.g., t21.56.97.178). Every computer attached to the
Internet computer must be assigned an IP address so that Internet traffic sent from and directed to
that computer may be directed properly from its source to its destination. Most Internet service
providers conffol a rurrge of IP addresses. Some computers have static-that is, long-term-IP
addresses, while other computers have
h.
addresses.
Internet: The Internet is a global network of computers and other electronic devices
that communicate with each other. Due to the strucfure of the Internet, connections between
devices
on the Internet often cross state and international borders, even when the
devices
21.
it to
PDA. In my training
of this type can uncover, among other things, evidence that reveals or suggests who possessed or
used the device.
t4-
22.
time. Similarly, things that have been viewed via the Internet
are typically stored for some period of time on the device. This information can sometimes be
recovered with forensics tools.
23.
seeks
permission to locate not only electronically stored information that might serve as direct evidence of
the crimes described on the warrant, but also forensic evidence that establishes how the Subject
Telephone was used, the purpose of its use, who used it, and when it was used. There is probable
cause to believe that this forensic elecffonic evidence might be on the Subject Telephone because:
a.
Data on the storage medium can provide evidence of a file that was once on the
b.
Forensic evidence on a device can also indicate who has used or controlled the
device. This "user attribution" evidence is analogous to the search for "indicia of occupancy" while
executing a search walTant at a residence.
c. A person with appropriate familiarity with how an electronic device works may, af\er
examining this forensic evidence in its proper context, be able to draw conclusions about how
electronic devices were used, the purpose of their use, who used them, and when they were used.
d.
evidence is not always data that can be merely reviewed by a review team and passed along to
investigators. Whether data stored on a computer is evidence may depend on other information
-15-
behaves.
Therefore, contextual information necessary to understand other evidence also falls within the scope
of the waffant.
e.
used
Further, in finding evidence of how a device was used, the purpose of its use, who
sometimes
to send communications
to others relating
to
providing, attempting to provide, and conspiring to provide, material support to terrorist and/or a
designated foreign terrorist orgatization, the individual's electronic device
will generally
serve
as
both an instrumentality for committing the crime, and also as a storage medium for evidence of the
as a means
of
committing the criminal offense. The electronic device is also likely to be a storage medium for
evidence of the crime. From my training and experience, I believe that an electronic device used to
commit a crime of this type may contain: data that is evidence of how the electronic device was
used; records of Internet discussions and chats relating to the crime; data that was sent or received
from the electronic device; notes as to how the criminal conduct was perpetrated; and other records
that indicate the nature of the offense.
24.
Nature of examination: Based on the foregoing, and consistent with Rule 41(eX2XB)
of the Federal Rules of Criminal Procedure, the warrant I am applying for would permit
the
examination of the Subject Telephone consistent with the terms of the warrant. The examination
may require authorities to employ techniques, including but not limited to computer-assisted scans
of the entire medium, that might expose many parts of the device to human inspection in order to
determine whether it is evidence described by the warrant.
-16-
25.
devices akeady in the possession of law enforcement authorities, the execution of this warrant does
not involve the physical intrusion onto a premises. Consequently, I submit there is reasonable cause
for the Court to authorize execution of the warrant at arry time in the day or night.
rV. CONCLUSION
26.
LUTCHMAN
of
and resources to a designated foreign terrorist organization), and that evidence of that criminal
I therefore respectfully
request
that the Court issue a search warrant for the Subject Telephone, authorizing a search for the items
described in Attachment B.
this
ll
ATTACHMENT A
Description of Property to be Searched
ATTACHMENT B
Schedule of Items to be Seized
1.
A11 records
18
U.S.C. $ 23398 (attempt to provide material support and resources to a designated foreign terrorist
or ganrz ation), including
a.
support
(including, but not limited to personnel and services) to terrorists or designated foreign terrorist
organtzations (including but not limited to the Islamic State of Iraq and the Levant
Islamic State of Ir:aq and al-Sham a/k/a the Islamic State of Iraq and Syria
Islamiyya
fi
a/k/a
a/k/a the
ad-Dawla al-
Establishment for Media Production (hereinafter "ISIL")), including but not limited to e-mails, text
messages,
and any messages sent or received through the Internet and/or mobile telephone
applications;
b.
Overseas Individual,
communications between
Criminal Complaint LSMJ-4212), including but not limited to e-mails, text messages, and any
messages sent or received through the Intemet
c.
d.
overseas to
e.
a designated foreign
weapons and other supplies used to commit acts of violence and/or terrorism (including masks,
hand restraints or zip ties, duct tape, ammonia and latex gloves);
f.
other images relating to violent jihad, terrorist attacks, terrorist leaders, designated foreign terrorist
organizations organrzation (including but not limited
activities;
g.
Personal telephone and address books and lists, photographs, videos, letters, cables,
telegrams, personal notes and other items reflecting names, addresses, telephone numbers,
communications and illegal activities of associates engaged in providing, attempting, ar.d conspiring
to provide material support to terrorists or designated foreign terrorist organizations;
h.
Names, addresses, telephone numbers, and social media account numbers for
with, a designated foreign terrorist organrzation (including but not limited to ISIL), and/or
any
j.
recordings
or
photographs
of EMANUEL L.
LUTCHMAN relating to his support for and allegiance to ISIL and its leader, Abu Bakr
al-
Baghdadi, including but not limited to the video recording made by LUTCHMAN immediately
prior to his arrest on December 30, 2015, and the recording that LUTCHMAN sent to CS-3 on or
about December
2.
27
,2015.
Records of Internet activity, including firewall logs, caches, browser history and
cookies, bookmarked or favorite web pages, search terms that the user entered into any Internet
search engine, and records of user-typed web addresses, relating
terrorist leaders, designated foreign terrorist organizations organization (including but not limited to
As used above, the terms "records" and "information" include all of the foregoing items of
evidence in whatever form and by whatever means they may have been created or stored, including
any photographic form.