Elawyers Elawyers
Ohio| Change

U.S. v. PINA, 3:14-cr-023. (2015)

Court: District Court, S.D. Ohio Number: infdco20150619a48 Visitors: 8
Filed: Jun. 15, 2015
Latest Update: Jun. 15, 2015
Summary: THOMAS M. ROSE , District Judge . Entry and Order Denying Motion to Suppress Evidence, Doc. 34 and Granting Motion in Limine for a Ruling as to the Authentication of Domestic Records of Regularly Conducted Activity. Doc. 51. This matter comes before the Court pursuant to Defendant's Motion to Suppress Evidence, Doc. 34, and the Government's Motion in Limine for a Ruling as to the Authentication of Domestic Records of Regularly Conducted Activity. Doc. 51. Because the Government's search
More

Entry and Order Denying Motion to Suppress Evidence, Doc. 34 and Granting Motion in Limine for a Ruling as to the Authentication of Domestic Records of Regularly Conducted Activity. Doc. 51.

This matter comes before the Court pursuant to Defendant's Motion to Suppress Evidence, Doc. 34, and the Government's Motion in Limine for a Ruling as to the Authentication of Domestic Records of Regularly Conducted Activity. Doc. 51. Because the Government's search warrant application was supported by probable cause and was executed in good faith, Defendant's motion will be denied. Because a written declaration attesting to the authenticity of a business record has been ruled non-testimonial in nature, excluding it from the reach of Crawford v. Washington, 584 U.S. 36 (2004), the Government's motion will be granted.

Defendant Demian Pina was indicted on February 25, 2014, on five counts of distribution of child pornography and two counts of possession of child pornography. These charges stemmed from the execution of two search warrants on separate occasions at Pina's residence.

In late 2010, investigators from the Cuyahoga County Internet Crimes Against Children Task Force conducted an online Internet investigation to identify individuals possessing and sharing child pornography. On November 30, 2010, while working in an undercover capacity, an investigator identified a computer with an IP address of 64.56.112.147 sharing approximately 447 files, at least 7% of which contained file names or hash values known to relate to child pornography. Between approximately 8:30 a.m. and 8:33 a.m. on November 30, 2010, the investigator utilized a law enforcement tool that allowed single-source downloads to select and download eight image files and four video files from the shared files of the suspect computer. One file is named in part "Steve 01." This file is alleged to contain a video of oral sexual activity involving two pre-pubescent white male children.

The investigator requested and received records pursuant to an administrative subpoena relating to the identified IP address, which identified the subscriber as Demian Pina giving his address in Dayton, Ohio, during the date and times that the investigator downloaded files containing child pornography from this IP address. This information was turned over to the Federal Bureau of Investigation, Dayton Field Office.

On February 10, 2011, United States Magistrate Judge Sharon L. Ovington, authorized a search warrant for Pina's residence for evidence of receipt and possession of child pornography. FBI agents and officers of the Dayton Police Department executed the search warrant on February 11, 2011. In the warrant application, the agents and officers had identified that Demian Pina resided at the residence along with his mother. Pursuant to the warrant, agents seized computer equipment.

During the execution of the search warrant, Pina consented to be interviewed. Pina stated that all of the computers in the residence belonged to him. He also said he received training in computers while in the Army. Pina declined to answer questions related to searching for and viewing child pornography.

The Dayton Police Department submitted all seized electronic media to the Miami Valley Regional Computer Forensic Laboratory for analysis. An examiner trained in identifying child pornography reviewed the media. The examination confirmed the presence of child pornography on the computers belonging to Pina, as well as a file sharing program that had been utilized by the undercover officers during their investigation.

The second search Pina contests occurred in late 2012. In November 2012, investigators from the Cuyahoga County Internet Crimes Against Children Task Force were again conducting online Internet investigations to identify individuals possessing and sharing child pornography. On November 29, 2012, an undercover investigator identified that a computer with an IP address of 108.253.71.47 was sharing approximately 170 files, 18% of which contained file names or hash values consistent with child pornography. Between approximately 6:12 p.m. and 6:19 p.m. on November 29, 2012, the investigator downloaded five image files from the shared files of the computer with an IP address 108.253.71.47. One of the files is named in part "boys in action." This file is alleged to contain image of a pre-pubescent white male child, nude from the waist down, being raped.

The investigator determined that the IP address was serviced by AT&T Internet Services. Records received pursuant to an administrative subpoena identified that this IP address resolved to Pina's address during the date and times when the investigator downloaded files containing child pornography. The subscriber name associated with the account was identified as Pina's mother. The records indicated that the account had been active since July 25, 2012.

Later, in March and April 2013, a detective with the Troy, Ohio Police Department conducted an online Internet investigation to identify individuals possessing and sharing child pornography. On March 15, 2013, while working undercover, a detective identified that a computer with an IP address of 108.253.71.47 was sharing approximately 35 files, approximately four of which contained file names or hash values known to contain child pornography. Between approximately 3:46 p.m. and 3:51 p.m. on March 15, 2013, the detective downloaded four image files from the shared files of the computer with an IP address 108.253.71.47. One of the files was another file named in part "Boys in Action [2]," allegedly containing images of three pre-pubescent boys engaged in sexual activity. On March 17 and 19, 2013, the same detective downloaded two more images of pre-pubescent white males engaged in sexual activity.

Similar to the above investigations, the detective determined the IP address of 108.253.71.47 was serviced by AT&T Internet Services. The detective also received records pursuant to an administrative subpoena, which determined that this IP address was subscribed to Pina's mother at the same address as before, since July 25, 2012. All of the information referencing the 2012 and 2013 downloads by undercover investigators was turned over to the FBI, Dayton Field Office.

On June 3, 2013, United States Magistrate Judge Michael J. Newman authorized the second search warrant for Pina's residence. Agents with the FBI and officers of the Dayton Police Department executed this search warrant on June 4, 2013. Agents and officers identified that Pina and his mother still resided at the residence. They seized computers, external hard drives, and other computer equipment.

Pina's mother stated that her son repaired computers as a source of income, and that some of the computers in the residence belonged to others. Because of Pina's refusal to comply with safety commands, he was placed in handcuffs shortly after agents entered his residence. He was instructed he was free to leave the residence or remain. He chose to remain, but refused to stay in a single location. Because of this, the officers placed him in handcuffs. The officers read Pina his rights and Pina acknowledged he understood them.

Electronic media seized pursuant to the search warrant were submitted to the Miami Valley Regional Computer Forensic Laboratory and an examiner trained in identifying child pornography reviewed the media. The examination confirmed the presence of child pornography on computer items connected to Pina.

Pina contends, "An individual's reasonable expectations of privacy should not be subject to arbitrary invasions solely at the unfettered discretion of officers in the field" Doc. 34 at 1, PAGEID 93, (citing Brown v. Texas, 443 U.S. 47, 51 (1979)). As stated more fully in the Brown decision:

A central concern in balancing these competing considerations in a variety of settings has been to assure that an individual's reasonable expectation of privacy is not subject to arbitrary invasions solely at the unfettered discretion of officers in the field. See Delaware v. Prouse, 440 U.S. 648, 654-655, 99 S.Ct. 1391, 1396-1397, 59 L.Ed.2d 660 (1979); United States v. Brignoni-Ponce, 422 U.S., at 882, 95, at 2580. To this end, the Fourth Amendment requires that a seizure must be based on specific, objective facts indicating that society's legitimate interests require the seizure of the particular individual, or that the seizure must be carried out pursuant to a plan embodying explicit, neutral limitations on the conduct of individual officers. Delaware v. Prouse, 440 U.S at 663, 99 S. Ct., at 1401. See United States v. Martinez-Fuerte, 428 U.S. 543, 558-562, 96 S.Ct. 3074, 3083-3085, 49 L.Ed.2d 1116 (1976).

Brown v. Texas, 443 U.S. at 51.

Pina asserts that the warrants lacked sufficient probable cause to be valid and further asserts that, as a result, all evidence seized including statements Pina made must be suppressed as "fruit of the poisonous tree" pursuant to Wong Sun v. United States, 371 U.S. 471, 488, 83 S.Ct. 407, 417, 9 L. Ed. 2nd 441, 455 (1963).

Pina's reasonable expectation of privacy was not subject to an arbitrary invasion solely at the unfettered discretion of officers in the field. The investigating officers arrived at his residence in the execution of search warrants that issued with the support of probable cause.

Probable cause exists "when there is a `fair probability' ... that contraband or evidence of a crime will be found in a particular place." United States v. Helton, 314 F.3d 812, 819 (6th Cir. 2003). It is only necessary that an issuing officer find "reasonable grounds for belief that evidence will be found in order to justify the issuance of a search warrant." United States v. Bennett, 905 F.2d 931, 934 (6th Cir. 1990). The "test for probable cause is simply whether `there is a fair probability that contraband or evidence of a crime will be found in a particular place.'" United States v. Padro, 52 F.3d 120, 123 (6th Cir. 1995).

With regard to the 2011 search, the affidavit set forth particular details related to the investigation which established probable cause. The affidavit provided information related to computers and the significance of Internet Protocol (IP) addresses. (See Doc. 48-1, pp. 3-8, PAGEID 196-201). Also, the affidavit set forth "behavioral characteristics" common to those who have a sexual interest in children, particularly how it relates to online activity. (Id. pp. 15-21, PAGEID 211-17). Additionally, the affidavit specifically set forth facts related to how Pina's address had been identified, that a person at Pina's address was suspected of making child pornography available over the internet, and why the agent believed evidence of a crime would be discovered at Pina's residence.

The 2011 affidavit detailed how an undercover agent downloaded child pornography from a particular IP address. That IP address resolved to Pina's residence at the specific date of the downloads. The agent then took further steps to confirm the residence was associated with Pina, by conducting a LexisNexis search of Pina and confirming his driver's license information.

The 2013 affidavit also established probable cause to search Pina's residence. (See Doc. 48-2, PAGEID 231-53). Again, the agent making the application provided general information on computers, common characteristics of collectors of child pornography, and how computers and the internet are used in child pornography. The affidavit described peer-to-peer file sharing programs and how they are used to trade and receive child pornography. The 2013 affidavit then detailed two investigations conducted by different law enforcement agencies, in addition to giving the background of the 2011 search.

In November 2012 an investigator with Cuyahoga County connected to a computer that resolved to Pina's address and downloaded child pornography files. In March and April of 2013 a detective with the Troy Police Department also connected to a computer that resolved to Pina's address and downloaded child pornography files. Both law enforcement officers identified the particular IP addresses used in the downloads and took appropriate steps to confirm subscriber information. That information indicated the IP addresses resolved to Pina's residence. The agent further confirmed the identity of persons residing at the address, which were Pina and his mother. Given this testimony, there was a "fair probability" that the evidence of a crime would be located at Pina's residence in 2011 and in 2013.

In issuing a search warrant or in reviewing the decision to issue one, a judge must apply a "totality of the circumstances" test to issues of probable cause. Illinois v. Gates, 462 U.S. 213, 238 (1983). The totality of the circumstances test requires a "practical common-sense decision whether, given all the circumstances set forth in the affidavit before him, including the `veracity' and `basis of knowledge' of persons supplying hearsay information," that probable cause exists. Id.

In both affidavits, the agents set forth all of the factors which established probable cause to believe evidence of a crime would be found at the identified location. The affidavit identified statutes violated by Pina, or someone residing at his residence. Here, the proper test is whether sufficient information was set forth to conclude that evidence of a crime would be found at the residence searched. There was.

Because the warrants were supported by probable cause there is no basis to suppress statements Pina made as "fruit of the poisonous tree." Wong Sun v. United States, 371 U.S. 471 (1963).

In the event that a reviewing court were to find that the search warrants should not have issued, the Government seeks protection in the "good faith" exception enunciated in United States v. Leon, 468 U.S. 897 (1984). According to Leon, "When evidence is obtained in violation of the Fourth Amendment, the judicially developed exclusionary rule usually precludes its use in a criminal proceeding against the victim of the illegal search and seizure." Illinois v. Krull, 480 U.S. 340, 347 (1987). However, courts should not suppress "evidence obtained in objectively reasonable reliance on a subsequently invalidated search warrant." United States v. Leon, 468 U.S. at 922.

The Sixth Circuit has identified four specific situations in which an officer's reliance on a subsequently invalidated warrant cannot be considered objectively reasonable: (1) when the warrant is issued on the basis of an affidavit that the affiant either knows to contain false information or recklessly disregards the existence of false information in it; (2) when the issuing magistrate abandons his neutral and detached role and serves as a rubber stamp for police activities; (3) when the affidavit is so lacking in indicia of probable cause that a belief in its existence is objectively unreasonable; and (4) when the warrant is so facially deficient that it cannot be reasonably presumed to be valid. United States v. Laughton, 409 F.3d 744, 748 (6th Cir. 2005). The first of the two situations are not at issue in this case.

If the affidavit before the Court failed to establish probable cause, the relevant inquiry would be whether the agents had a reasonable basis to believe that the information submitted supported the issuance of the search warrant. United States v. Carpenter, 360 F.3d 591, 595 (6th Cir. 2004). In the matter before the Court, the agents acted in good faith in executing both search warrants.

First, an objective law enforcement officer, after reviewing the affidavits, would have concluded there was a fair probability that evidence of criminal conduct would be found at Pina's residence in 2011 and 2013. The affidavits established that someone at the residence used a computer to facilitate crimes by making child pornography available on a file sharing program. An objective law enforcement officer reviewing the affidavits would have concluded the affidavits were sufficient to establish probable cause in light of the totality of the information contained within the affidavits.

Consistent with Leon, evidence "will not be excluded ... unless the illegality is at least the `but for' cause of the discovery of the evidence," unless that is "`the challenged evidence is in some sense the product of illegal governmental activity.'" United States v. Clariot, ___ F.3d. ___, 2011 WL 3715235 at p. 3 (6th Cir. 2011); quoting Segura v. United States, 468 U.S. 796, 815 (1984). Here, the exclusionary rule works in favor of the government. Both agents' conduct was not in question. They did not engage in any illegal or impermissible behavior. The purpose of the exclusionary rule is to punish, through the prohibition of evidence, conduct which clearly demonstrates an officer or agent acted in bad faith. In the instant case, this did not occur in the execution of either warrant. Therefore, the evidence in this matter will not be suppressed.

Finally, the Court considers the Government's Motion for a Ruling as to the Authentication of Domestic Records of Regularly Conducted Activity. Doc. 51. At trial, the Government intends to offer in evidence business records provided by internet service providers DONet and AT&T Internet Services. Each of the Internet Service Providers provided to investigators records correlating subscriber information to the internet protocol addresses identified during the investigations. The first set of records was provided by DONet and relates to subscriber information associated with IP address 64.56.112.147 used on November 30, 2010. The second set of business records was provided by AT&T Internet Services and relates to subscriber information associated with IP address 108.253.71.47 used on November 29, 2012. The third, and final, set of records was provided by AT&T Internet Services and relates to IP address 108.253.71.47 used on March 15 and 17, 2013.

The Government informs the Court that the custodians of records for AT&T Internet Services are located in Georgia and Connecticut. According to the Government, Federal Rule of Evidence 902(11) permits authentication of such records by a written declaration of its custodian or other qualified person. Rule 902(11) states:

Extrinsic evidence of authenticity as a condition precedent to admissibility is not required with respect to the following: (11) Certified Domestic Records of Regularly Conducted Activity.— The original or a duplicate of a domestic record of regularly conducted activity that would be admissible under Rule 803(6) if accompanied by a written declaration of its custodian or other qualified person, in a manner complying with any . . . rule prescribed by the Supreme Court pursuant to statutory authority . . .

Fed. R. Evid. 902(11).

Pina contests that the Sixth Amendment of the United States Constitution as construed in Crawford v. Washington, 541 U.S. 36 (2004), entitles him to confront those witnesses that would present evidence against him. A written declaration attesting to the authenticity of a business record, however, is not testimonial in nature. The Supreme Court specifically observed that business records "by their nature are not testimonial." Crawford v. Washington, 584 U.S. 36, 56 (2004). So long as the government provides sufficient written notice of its intent to use business records and the records are accompanied by a written declaration, they are admissible, subject to other Rules of Evidence. See United States v. Jordan, 544 F.3d 656, 669-70 (6th Cir. 2008).

The United States provided Pina with written declarations of authenticity and provided copies of the documents it intends to use at trial. Accordingly, the United States asks for a ruling by this Court in advance of trial allowing authentication of the above described business records by declarations complying with Federal Rule of Evidence 902(11) and 28 U.S.C. §1746, copies of which have been made available or provided to the defense and are attached to this motion.

DONE and ORDERED.

GOVERNMENT EXHIBIT A

CERTIFICATE OF AUTHENTICITY OF DOMESTIC BUSINESS RECORDS PURSUANT TO FEDERAL RULE OF EVIDENCE 902(11)

I, DAVID MEZERA, attest, under penalties of perjury under the laws of the United States of America pursuant to 28 U.S.C. § 1746, that the information contained in this declaration is true and correct. I am employed by Donet Inc., and my official title is PRESIDENT. I am a custodian of records for Donet Inc. I state that each of the records attached hereto is the original record or a true duplicate of the original record in the custody of Donet Inc., and that I am the custodian of the attached records consisting of 10 pages/CDs/kilobytes). I further state that:

a. all records attached to this certificate were made at or near the time of the occurrence of the matter set forth, by, or from information transmitted by, a person with knowledge of those matters;

b. such records were kept in the ordinary course of a regularly conducted business activity of Donet Inc.; and

c. such records were made by Donet Inc. as a regular practice.

I further state that this certification is intended to satisfy Rule 902(11) of the Federal Rules of Evidence.

13 May 2015 Date Signature Donet Response to Subpoena From: David Mezera >david@donet.com< To: "p4rm2@cuyahogacounty.us>" >p4rm2@cuyahogacounty.us< CC: "fgoldberg@cuyahogacounty.us" >fgoldberg@cuyahogacounty.us<, David Mezera >david@donet.com< Date: Thursday - December 2, 2010 10:11 AM

Gentlemen,

In the attached ZIP file you will find my response to your recent request for information for our customer using IP address 64.56.112.147 on November 30, 2010 @ 0830 EST.

If you have any questions please feel free to email or call me.

Best regards, david mezera president david@donet.com donet 33 west first st., suite 230, dayton, oh 45402 v. 937-610-3510 f. 937-226-6961 www.donet.com elevate your IT.

that is privileged, confidential, or otherwise protected from use and disclosure. If you are not the intended recipient, you are hereby notified that any review, disclosure, copying, or dissemination of this transmission, or the taking of any action in reliance on its content, or other use is strictly prohibited. If you have received this transmission in error, please notify the sender that this message was received in error and then delete this message and all attachments. Thank you.

>>> David Mezera 12/02/10 12:35 PM <<< Mr. Frattare,

I'm attaching the four files contained within the ZIP rather than reattempting the ZIP.

david mezera president daviddonet.com donet 33 west first st., suite 230, dayton, oh 45402 v. 937-610-3510 f. 937-226-6961 www.donet.com elevate your IT. Re: Donet Response to Subpoena From: David Mezera >david@donet.com< To: David Frattare >dfrattare@cuyahogacounty.us< Date: Thursday - December 2, 2010 1:41 PM Mr. Frattare,

You are correct in your reading regarding yesterday's deactivation. Actually, what my finance department did was put the account on hold because of non-payment: the last three invoices for service to Mr. Pina have gone unpaid, and it was time (per our standard procedures) to put accounts past due on hold.

As it turns out, Mr. Pina's connection is still up and active. If he reboots his equipment, however, he will be unable to connect. My technical staff was preparing to boot his connection, but I instructed them to leave it up. Do you need us to take his account off hold as well, so that you can monitor his activity in the event he reboots his gear?

— david mezera president david@donet.com donet 33 west first st., suite 230, dayton, oh 45402 v. 937-610-3510 f. 937-226-6961 www.donet.com elevate your IT.

On Dec 2, 2010, at 1:33 PM, David Frattare wrote:

Thank you. Am I reading the customer information correctly that his account was deactivated yesterday? Any particular reason? Thanks. David K. Frattare Lead Investigator/Supervisor Cuyahoga County Prosecutor's Office Ohio Internet Crimes Against Children Task Force 1200 Ontario Street, 9th Floor Cleveland, OH 44113 Office: (440) 886-5284 Fax: (440) 886-5287

This electronic transmission is intended for the addressee(s) named above. It contains information

Re: Donet Response to Subpoena From: David Mezera >david@donet.com< To: David Frattare >dfrattare@cuyahogacounty.us< Date: Thursday - December 2, 2010 12:35 PM Mr. Frattare, I'm attaching the four files contained within the ZIP rather than reattempting the ZIP. — david mezera president david@donet.com donet 33 west first st., suite 230, dayton, oh 45402 v. 937-610-3510 f. 937-226-6961 www.donet.com elevate your IT.

Customer Information

Company: DONet Printed by David Mezera on 12/2/2010 9:54:39AM Customer ID 5191 Customer Name Demian Pina Contact Username wolfsaben Password gxvQ6r Email Address wolfsaben@donet.com; demian.pina@OHSPRI.ANG.AF.MIL Address 929 Huffman Ave. City Dayton State OH Zip Code 45403 Home Phone 9372582331 FAX Reference Salesperson Statement Method PAPER Signup Date 3/24/2005 Next Statement Date 1/14/2011 Account Status DEACTIVATED Guarantor Deactivated Date 12/1/2010 Web Signup NO Billing Plan(s): Home ADSL Rocket 6.0M × 608k ¶ 1 Month(s) Additional Email Addresses: Active Username Password demian@donet.com H demian wolf929 wolfsaben@donet.com H wolfsaben gxvQ6r

2 records found. Time Stamp 2010-11-30 04:31:30 Usemame wolfsaben@donetcom Status Type Stop — Session ID 004F6E15 IP Address 64.56.112.147 Called From Unavailable Number Called Connect info NAS IP 64.56,96,252:1384 Service Type Virtual Terminate Cause Port-Error Session Time 67370 Bytes Transferred Bytes in: 622,629,189, Bytes out: 2,147,483,647 _____________________________________________________________________ Time Stamp 2010-11-30 04:31:54 Usemame wolfsaben@donet.com Status Type Start — Session ID 004F781D IP Address 64.56.112.147 Called From Unavailable Number Called Connect Info NAS IP 64.56.96.252:1749 Service Type Virtual Design and Content Copyright 2001, DONet, Inc. www.donet.com Phone: 937-256-7288

Customer Audit

Starting 11/1/2007 and ending 12/2/2010

Customer ID:5191

Company: DONet Printed by David Mezera on 12/2/2010 9:58:47AM Cust ID Staff Number/Name Data Description Date/Time IP 5,191 27 - Jennifer Hicks 5,191 Customer.Active changed. 3/10/2008 11:43:14AM 192.168.1.107 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Customer.Last On Hold changed. 3/10/2008 11:43:14AM 192.168.1.107 Old value: New value: 3/10/2008 11:43:13 AM 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #5432 changed. 3/10/2008 11:43:25AM 192.168.1.107 Old value: Y New value: N 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #14674 changed. 3/10/2008 11:43:26AM 192,168.1.107 Old value: Y New value: N 5,191 27 - Jennifer Hicks 5,191 Dsl.Active for Service ID #339 changed. 3/10/2008 11:43:27AM 192.168.1.107 Old value: Y New value: N 5,191 27 - Jennifer Hicks 5,191 Customer.Active changed, 3/11/2008 9:43;57AM 192,168,1,107 Old value: I-1 New value: Y 5,191 27 - Jennifer Hicks 5,191 Dsl.Active for Service ID #339 changed. 3/11/2008 9:43;58AM 192.168.1.107 Old value: H New value: N 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #14674 changed. 3/11/2008 9:43;59AM 192.168.1.107 Old value: H New value: N 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #5432 changed. 3/11/2008 9:44:00AM 192,168,1.107 Old value: H New value: N 5,191 28 - Jill Csillag 5,191 Dsl.Max Speed of the DSL link for Service ID #339 3/18/2008 9:55:56AM 192.168,1.177 Old value: New value: 6M 5,191 27 - Jennifer Hicks 5,191 Customer.Active changed. 3/26/2008 9:09:36AM 192.168.1,107 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Customer.Last On Hold changed. 3/26/2008 9:09:36AM 192.168.1.107 Old value: 3/10/2008 11:43:13 AM New value: 3/26/2008 9:09:38 AM 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #5432 changed. 3/26/2008 9;09:41AM 192.168,1.107 Old value: Y New value: N 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #14674 changed. 3/26/2008 9:09;45AM 192.168.1.107 Old value: Y New value: N 5,191 27 - Jennifer Hicks 5,191 Dsl.Active for Service ID #339 changed. 3/26/2008 9:09:46AM 192.168.1.107 Old value: Y New value: N 5,191 27 - Jennifer Hicks 5,191 Customer.Active changed. 3/27/2008 4:51:57PM 192.168.1.107 Old value: H New value: Y 5,191 27 - Jennifer Hicks 5,191 Dsl.Active for Service ID #339 changed. 3/27/2008 4:51:58PM 192.168.1.107 Old value: H New value: N 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #14674 changed. 3/27/2008 4:52;00PM 192,168.1.107 Old value: H New value: N 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #5432 changed. 3/27/2008 4:52:00PM 192.168.1.107 Old value: H New value: N 5,191 27 - Jennifer Hicks 5,191 Customer.Customer Type changed. 7/16/2008 4:36:52PM 192.168.1.107 Old value: residential New value: Business 5,191 27 - Jennifer Hicks 5,191 Customer.Customer Type changed, 7/16/2008 4:37:42PM 192.168.1.107 Old value: Business New value: Residential 5,191 51 - Sheryl L. Koehler 5,191 Rate Component `Home ADSL Rocket 6,0M × 608k 8/25/2008 4;05:37PM 192.168.1.187 Old value: 39.95 New value: 39.95 5,191 27 - Jennifer Hicks 5,191 Customer.Email changed. 10/20/2009 11:12:43AM 192.168.1.107 Old value: wolfsaben@donet.com New value; wolfsaben@donet.com; demlan.pina@OHSPRI.ANG.AF.MIL 5,191 27 - Jennifer Hicks 5,191 Customer.Active changed. 10/28/2009 2:32:31PM 192.168.1.107 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Customer.Last On Hold changed. 10/28/2009 2:32:31PM 192,168.1.107 Old value: 3/26/2008 9:09:38 AM New value: 10/28/2009 2:32:31 PM 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #5432 changed. 10/28/2009 2:32:36PM 192.168.1.107 Old value: Y 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #14674 changed. 10/28/2009 2:33;28PM 192.168.1.107 Old value: Y New value: 11 5,191 27 - Jennifer Hicks 5,191 Dsl.Active for Service ID #339 changed. 10/28/2009 2:33:29PM 192.168,1.107 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Customer.Active changed. 10/28/2009 3;45:40PM 192.168.1.107 Old value; H New value: Y 5,191 27 - Jennifer Hicks 5,191 Dsl.Active for Service ID #339 changed. 10/28/2009 3:45;4 IPM 192.168.1.107 Old value: H New value: Y 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #14674 changed, 10/28/2009 3:45:42PM 192.168.1.107 Old value: H New value; Y 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #5432 changed. 10/28/2009 3:45:43PM 192.168.1.107 Old value: H New value: Y 5,191 27 - Jennifer Hicks 5,191 Customer.Active changed. 6/29/2010 12:54:51PM 192.168.1.183 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Customer.Last On Hold changed. 6/29/2010 12:54:5I PM 192,168.1.183 Old value: 10/28/2009 2:32:31 PM New value: 6/29/201012:54:52 PM 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #5432 changed. 6/29/2010 12:54:56PM 192.168.1.183 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #14674 changed. 6/29/2010 12:54:56PM 192.168.1,183 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Dsl.Active for Service ID #339 changed. 6/29/2010 12:54:56PM 192.168.1.183 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Customer.Active changed. 7/7/2010 2:55:10PM 192.168.1.179 Old value: H New value: Y 5,191 27 - Jennifer Hicks 5,191 Dsl.Active for Service ID #339 changed. 7/7/2010 2:55:13PM 192.168.1.179 Old value: H New value: Y 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #14674 changed. 7/7/2010 2:55:13PM 192.168.1.179 Old value: H New value: Y 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #5432 changed. 7/7/2010 2:55:13PM 192.168,1.179 Old value: H New value: Y 5,191 27 - Jennifer Hicks 5,191 Customer.Active changed. 9/1/2010 9:56:14AM 192.168.1.152 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Customer.Last On Hold changed. 9/1/2010 9:56:14AM 192.168.1.152 Old value: 6/29/201012:54:52 PM New value: 9/1/20109:56:13 AM 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #5432 changed. 9/1/2010 9:56:18AM 192.168.1.152 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #14674 changed. 9/1/2010 9:56:18AM 192.168.1.152 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Dsl.Active for Service ID #339 changed. 9/1/2010 9:56:18AM 192.168.1.152 Old value: Y New value: 5,191 27 - Jennifer Hicks 5,191 Dsl.Active for Service ID #339 changed. 9/7/2010 3:22:07PM 192.168.1.157 Old value: H New value: Y 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #14674 changed. 9/7/2010 3:22:07PM 192.168.1.157 Old value: H New value: Y 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #5432 changed. 9/7/2010 3;22:07PM 192.168.1.157 Old value: H Now value: Y 5,191 27 - Jennifer Hicks 5,191 Customer.Active Changed 9/7/2010 3;22:07PM 192.168.1.157 Old value: H New value: Y 5,191 27 - Jennifer Hicks 5,191 Customer.Active changed. 12/1/2010 12:40:48PM 192.168.1.150 Old value: Y Now value: H 5,191 27 - Jennifer Hicks 5,191 Customer.Last On Hold changed. 12/1/2010 12:40:48PM 192.168.1.150 Old value: 9/1/2010 9:56:13 AM New value: 12/1/2010 12:40:48 PM 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #5432 changed. 12/1/2010 12:40:52PM 192.168.1.150 Old value: Y New value: H 5,191 27 - Jennifer Hicks 5,191 Email_data.Active for Service ID #14674 changed. 12/1/2010 12:40:52PM 192.168.1.150 Old value: Y Now value: H 5,191 27 - Jennifer Hicks 5,191 DslActive for Service ID #339 changed. 12/1/2010 12:40;52PM 192.168.1.150 Old value: Y New value: H

GOVERNMENT EXHIBIT B

510-2015

Customer Account Details

AT&T Internet Services U-Verse LightSpeed internet access accounts do not have traditional log on/log off IP assignment records and have a unique IP provisioned to the account.

>Current Account Information

BAN: 120220890 Circuit Id: A6/ACXP/099092//OB CMS Policy: CMS ACL=6, CMS QOS IPDSLAM=5, TZ=EST, CMS 6RD=1 DHCP Relay: 108.253.70.3 DSLAM: DYTN0H25O00020223251 HSIA Registered: yes IP: 108.253.71.47 MAC Addr: 40:b7:f3:d7:d4:81 Memberld: testrunfast@att.net

>Historical IP Provisionin

TXID DATE RC Message Key/Vals ban: 120220890 [H] sbcgnfttxdhcprelayaddress: 108.253.70.3 [H] ip: 108.253.71.47 [H] DHCP.mod.pnode11a.1207 07/30/2012 16:44:33 100 Ok ip_assigned: 108,253.71.47 [H] 30144433.788836 rg: 001E46-71158814200960 [H] siteid: 051380817 [H] circuit: A6/ACXP/099092//OB [H] port: DYTNOH25000020223251-1-1-4-46 [H]

> Email Information

testrunfast@attnet (P) Name: Joan Pina Status: Enabled

Business Records Certification

I, Andrew Houtz, the undersigned, hereby declare:

1. I am a United States citizen and over eighteen years of age.

2. I am employed by AT&T as Internet Legal Compliance Manager. My job responsibilities include retrieving AT&T Internet Services records responsive to legal process for such records.

3. AT&T was served with legal process for business records described there in. A copy of the legal process is attached.

4. The following are responsive:

a) Attached hereto is a true copy of the available records described in the legal process. b) Attached hereto is a true copy of the results of our search, assembly, and production.

5. I affirm these records:

a) were made at or near the time of the occurrence of the matters set forth by, or from information transmitted by, a person with knowledge of those matters; b) were kept in the course of the regularly conducted activity; and c) were made by the regularly conducted activity as a regular practice.

This declaration was made in the State of Georgia and I affirm, under penalty of perjury, that the foregoing is true and correct.

Executed on 12/12/2012

Andrew Houtz Manager, Internet Legal Compliance AT&T Internet Services 575 Morosgo Drive NE, Suite 5042 Atlanta, GA 30324 404-499-5217

AT&T Legal Compliance

Due to regulatory constraints AT&T Internet Services, AT&T Telephone, and AT&T Wireless Legal Compliance are separate entities. Please direct your legal requests as shown below. Law Enforcement Agencies and other government officials should fax their requests. All civil requests must be served on the Registered Agent (CT Corporation) in your state. Improperly directed legal requests can not be processed and will create significant delays.

AT&T Internet Services Records

AT&T Internet Services 1010 North Saint Mary's Street Room 315-A2 San Antonio, Texas 78215 Phone: 210-351-3216 Fax: 707-435-6409

All AT&T Internet Services requests must include at least one or more of the following:

• Email address, email alias, or username

• Full name of subscriber (common names accompanied by other identifying information)

• DSL number, telephone number, or billing number

• IP address with a specific date, time, & time zone (as shown in example below). If date, time, & time zone are not provided within legal request, AT&T will be unable to process and it will be rejected. Submission of a new (or legally amended) order will be required.

Example Only:

68.18.245.13 on July 16, 2006 at 18:35:22 EDT (GMT-0400)

AT&T Telephone Records

AT&T AT&T Subpoena Center 208 S. Akard Street, 10th Floor Dallas, TX 75202 Phone: 800-291-4952 Fax: 248-395-4398

AT&T Wireless Records (formerly Cinqular Wireless)

AT&T AT&T Subpoena Center 208 S. Akard Street, 10th Floor M Dallas, TX 75202 Phone: 800-291-4952 Fax: 877-971-6093

AT&T Law Enforcement Emergency Hotline

800-807-4205 (Law Enforcement Agencies with serious imminent threat situations only)

GOVERNMENT EXHIBT C

Customer Account Details

AT&T Internet Services U-Verse LightSpeed internet access accounts do not have traditional log on/log off IP assignment records and have a unique IP provisioned to the account.

>Current Account Information

BAN: 120220890 Circuit Id: A6/ACXP/099092//OB CMS Policy: CMS ACL=6, CMS QOS IPDSLAM=5, TZ=EST, CMS 6RD=1 DHCP Relay: 108.253.70.3 DSLAM: DYTNOH25O00020223251 HSIA Registered: yes IP: 108.253.71.47 MAC Addr: 40:b7:f3:d7:d4:81 MemberId: testrunfast@att.net

>Historical IP Provisioning

>Email Information

testrunfast@attnet (P) Name: Joan Pina Status: Enabled

Business Records Certification

I, Carol Deakin, the undersigned, hereby declare:

1. I am a United States citizen and over eighteen years of age. 2. I am employed by AT&T as Internet Legal Compliance Manager. My job responsibilities include retrieving AT&T Internet Services records responsive to legal process for such records. 3. AT&T was served with legal process for business records described there in. A copy of the legal process is attached. 4. The following are responsive: a) Attached hereto is a true copy of the available records described in the legal process. b) Attached hereto is a true copy of the results of our search, assembly, and production. 5. I affirm these records: a) were made at or near the time of the occurrence of the matters set forth by, or from information transmitted by, a person with knowledge of those matters; b) were kept in the course of the regularly conducted activity; and c) were made by the regularly conducted activity as a regular practice.

This declaration was made in the State of Connecticut and I affirm, under penalty of perjury, that the foregoing is true and correct.

Executed on 4/12/2013

Carol Deakin Manager, Internet Legal Compliance AT&T Internet Services 348 Grand Street Waterbury, CT 06702 203-575-6380

AT&T Lool Compliance

Due to regulatory constraints AT&T Internet Services, AT&T Telephone, and AT&T Wireless Legal Compliance are separate entities. Please direct your legal requests as shown below. Law Enforcement Agencies and other government officials should fax their requests. All civil requests must be served on the Registered Agent (CT Corporation) in your state. Improperly directed legal requests can not be processed and will create significant delays.

AT&T Internet Services Records

AT&T Internet Services 1010 North Saint Mary's Street Room 315-A2 San Antonio, Texas 78215 Phone: 210-351-3216 Fax: 707-435-6409

All AT&T Internet Services requests must include at least one or more of the following:

• Email address, email alias, or username

• Full name of subscriber (common names accompanied by other identifying information)

• DSL number, telephone number, or billing number

• IP address with a specific date, time, & time zone (as shown in example below). If date, time, & time zone are not provided within legal request, AT&T will be unable to process and it will be rejected. Submission of a new (or legally amended) order will be required.

Example Only:

6848.245.13 on July 16, 2006 at 18:35:22 EDT (GMT-0400)

AT&T Telephone Records

AT&T AT&T Subpoena Center 308 S. Akard Street, 14th Floor - L Dallas, TX 75202 Phone: 800-291-4952 Fax: 248-395-4398

AT&T Wireless Records (formerly Cinqular Wireless)

AT&T AT&T Subpoena Center 308 S. Akard Street, 14th Floor - M Dallas, TX 75202 Phone: 800-291-4952 Fax: 877-971-6093

AT&T Law Enforcement Emergency Hotline

800-807-4205 (Law Enforcement Agencies with legitimate imminent threat situations only)

Source:  Leagle

Can't find what you're looking for?

Post a free question on our public forum.
Ask a Question
Search for lawyers by practice areas.
Find a Lawyer