FBI Seeks Warrant for Samsung S9+
FBI Seeks Warrant for Samsung S9+
Alexandria Division
                         AFFIDAVIT IN SUPPORTOF
            AN APPLICATION FOR A SEARCH AND SEIZUREWARRANT
I Donny Kim, Special Agent of the Federal Bureau of Investigation (“FBI” ), being duly
meaning of Section 2510 (7) of Title 18, United States Code, and am empowered by law to
conductinvestigationsof and to make arrests for offenses enumerated in Section 2516 of Title
the Washington Field Office, and have been since 2007. Duringthis time, I have received
espionageinvestigations
                      . I currently am assigned to investigatecounterintelligenceand
espionage matters. From 1999 to 2007, I was a Special Agent with the U . S . Departmentof State,
myexperience and training, I am familiar with efforts used to unlawfully collect and disseminate
a black Samsung Galaxy S9+ wireless telephone assigned telephone number 610- 348- 4313 and
below , this application specificallyseeksauthority to open and search either a device storage
lockbox on the Reston, Virginia, premises of the Defense Intelligence Agency (“ DIA ” ), located
at 12300 Sunrise Valley Drive, Reston, Virginia 20191, or a black NissanRoguewith Virginia
license plate 4790 -PT and VIN 5N1AT2MV9HC842483 , registered to Henry Kyle FRESE , in
basis of this familiarity , and on the basis of other information that I have reviewed and
determined to be reliable, I believe thatthe facts in this affidavit show that there is probable
affidavit is intended to show merely that there is sufficient probable cause for the requested
cause to seize and search the black Samsung Galaxy S9+ wireless telephone assigned telephone
in Attachment B .
                      STATUTORY AUTHORITY AND DEFINITIONS
that FRESE committed violations of Title 18 United States Code, Section 793 (d ) and ( ), willful
or control over any document . . . information relating to the national defense which
information the possessorhas reason to believecould be used to the injury of the UnitedStates
or to the advantage of any foreign nation, willfully communicates, delivers, transmits or causes
person not entitled to receive it, or willfully retains the same and fails to deliver it on demand to
the officer or employee of the United States entitled to receive it shallbe fined or imprisoned
to , or control over any document information relating to the national defense which
information the possessorhas reason to believe could be used to the injury of the United States
or to the advantage of any foreign nation , willfully communicates , delivers , transmits or causes
person not entitled to receive it , or willfully retainsthe sameand fails to deliver it on demandto
the officer or employee of the United States entitled to receive it   shall be fined or imprisoned
9. Under Executive Order 13526 , information in any form may be classified if it: ( 1)
is owned by, produced by or for, or is under the controlof the United States Government; ( )
falls within one ormore of the categories set forth in the Executive Order Top Secret, Secret,
and Confidential]; and (3) is classified by an original classification authority who determines that
its unauthorized disclosure reasonably could be expected to result in damage to the national
security .
10. Where such unauthorized disclosure could reasonably result in damage to the
safeguarded. Where such unauthorized disclosure could reasonably resultin serious damage to
the national security, the information may be classified as “ Secret” andmustbe properly
safeguarded. Where such unauthorized disclosure could reasonably result in exceptionally grave
damageto thenational security , the information may be classified as “ Top Secret” and must be
properly safeguarded .
who possess a need to know . ” Amongother requirements, in order for a person to obtain a
security clearance allowing that person access to classified United States Government
information, that person is required to and must agreeto properly protectclassified information
by notdisclosing such information to persons not entitled to receive it, by not unlawfully
removing classified information from authorized storage facilities , and by not storing classified
information in unauthorized locations. If a person is noteligible to receive classified
information , classified informationmay notbe disclosed to that person. In order for a foreign
government to receive access to classified information , the originating United States agency
bemaintained in a manner that: (1) prevents access by unauthorized persons; and ( 2 ) ensures the
13. 32 C . F . R . Parts 2001 and 2003 regulate the handling of classified information.
Specifically, 32 C . F. R .   2001
                                 . 43, titled “ Storage,   regulates the physicalprotection of classified
information . This section prescribes that Secret and Top Secret information “ shall be stored in a
GSA - approvedsecurity container, a vault built to FederalStandard ( FHD STD ) 832, or an open
storage area constructed in accordance with 2001. 53 .” It also requires periodic inspection of
the container and the use of an Intrusion Detection System , among other things.
PROBABLE CAUSE
1 ) employed by a certain news outlet (“ News Outlet 1 ) , and to a second journalist (“ Journalist
2 employed by a second news outlet ( NewsOutlet 2” ) , from on or about April 2018 through
the present FRESE is a DIA employee assigned to a workspace in Reston , Virginia , in the
Eastern District of Virginia . Hehas been employed at DIA since in or about February 2018 as a
counterterrorism analyst. Prior to that, from in or about January 2017 until in or about February
workspace in the Eastern District of Virginia. Throughout this time, FRESE has held a Top
DIA workspace in Reston, Virginia , in the Eastern District of Virginia. Employees are not
allowed to bring their cellular telephones into the SCIF. Generally , employees either store their
cellular telephones inside DIA - provided lockboxesoutside of the SCIF spaces, or simply leave
their cellular telephones in their vehicle in the facility parkinglot. Based on ongoinglaw
enforcement surveillance of FRESE I know that FRESE generally commutes to work at the DIA
facility in his black Nissan Roguewith Virginia license plate 4790 -PT and VIN
5N1AT2MV9HC842483 . Also based on this surveillance , I believe that FRESE routinely stores
the DEVICE inside his vehicle in the DIA facility parking lot while he is at work , when he does
16 . U . S . government agencies have confirmed that between at least early May 2018
and mid - July 2018 News Outlet 1 published eight articles that contain classified national
defense information that relates to the capabilities of certain foreign countries weapons systems.
Journalist 1 is the author of allof these articles . These articles contained classified intelligence
from five intelligence reports (the “ compromised intelligence reports” ) dated on or about early
March 2018 through mid - June 2018. The eight articles published by News Outlet 1, and the
intelligence reportingfrom which they are derived , both contain information that is classified up
to the TS // SCIlevel, indicating that its unauthorized disclosure could reasonably be expected to
result in exceptionally grave damage to the national security. The compromised intelligence
show that only 26 individuals, one of whom is FRESE, accessed all five of the compromised
intelligence reports
18. In his most current background security form (the “ SF-86 ) in December 2017 , on
determine the genesis of contactbetween FRESE and the News Outlet Open source records
Journalist s Tweets and account updates . Journalist l Twitter account also follows FRESE s
Twitter account. Public records checks also show that FRESE and Journalist 1had the same
residential address from August 2017 through August 2018 . Based on reviews of FRESE s and
Journalist l s public social media pages, itappears that they were involved in a romantic
    Twitter user can “ follow other Twitter users, which means subscribing to those users                and site updates.
Each user profile page includes a list ofthe people who are following that user ( i.e., the user' s“ followers” list) and a
list of people whom that user follows (i .e., the user' s “ following    .
       20 .    On August 26 , 2019 the Honorable Leonie M . Brinkema, United States District
Judge for the Eastern Districtof Virginia, authorized an Order for the interceptionof wire and
electronic communicationsto and from theDEVICE pursuantto Section 2518 of Title 18,
United States Code (the “ Title IIImonitoring” ) . The Title IIImonitoring of the DEVICE showed
that FRESE accessed Twitter on the DEVICE. Twitter records also show periodic logins to
FRESE s Twitter account from an Internet Protocol ( IP ) address that resolves back to an IP
address range registered to AT & T Mobility LLC, the samecellular phone carrier as the
DEVICE
       21
        .      AT& T records associatedwith the DEVICE show 508 total calls and 37 text
messagesbetweenthe DEVICE and Journalist 1 from March 1, 2018 through October 7 , 2019.
AT & T records associated with the DEVICE show 22 calls and 150 textmessages between the
DEVICE and Journalist 2 from May 1 2018 through October 7, 2019. On August 4 , 2019 ,
subsequent to receiving a June preservation request from the FBI, AT & T provided returns for a
with a representative of AT & T who has confirmed that AT & T does not have in its possession
any textmessages to or from the DEVICE. I believethat seizing the phonewill likely allow the
FBIto see the historicaltext exchanges between FRESE and Journalist 1 and Journalist 2 that
media accounts, includingher Twitter account, in which she self identifies as a correspondent
covering national security for News Outlet 2. Public records checks also show Journalist 2 as
owned bythe same parent company and are part of the same group of publicly affiliated news
outlets . Journalist 1 and Journalist 2 report on the same topics and were assigned to cover the
same location from mid- 2018 into 2019. Journalist 2 is amore senior journalist , who has been
assignedto that location for over a decade. In early July 2019 Journalist 1 and Journalist2 co
authored an article related to topics similar to Journalist l s article containing classified NDI
                                                                                                . On
Journalist s personalTwitterpage, Journalist1 Tweeted a link to the early July 2019 article,
noting it was the first co -authored piece of the pair. On Journalist 2 s personal Twitterpage,
Journalist 2 Tweeted a link to the article and stated Journalist 1was a “ colleague” who helped
24 . Computer network logs from DIA show FRESE ran searches using terms related
to the sametopics discussed in the compromised intelligence reports. These topics fall outside
the scope of FRESE s duties for his position as a counterterrorism analyst with the DIA.
minutes later, Journalist 1 called the DEVICE for a call that lasted approximately six minutes.
The next day, FRESE used search terms related to the topics contained in the five compromised
intelligence reports, which contained information classified up to the TS/ / SCI level. The search
Approximately 29 minutes after conducting the search , FRESE accessed Intelligence Report 1,
oneofthe five compromised intelligencereports. Three days later, FRESE again accessed
Intelligence Report 1.
26 Search warrant returns from Twitter show that, seven days after FRESE accessed
FRESE stated that he was “ down to help Journalist 2 if ithelped Journalist 1 becausehe
wanted to see Journalist 1 “ progress .” During the same Twitter exchange, Journalist 1 also
indicated that certain officials within the United States government were calling into question
Journalist 1 placed a call to the DEVICE that lasted approximately eightminutes. At 1:31 a. m .
the following day, Journalist 1 placed a call to the DEVICE that lasted approximately 15
minutes.
28. Several days later, Journalist 2 sent the DEVICE a text message . Approximately
six hours later, Journalist 2 sent the DEVICE another textmessage. Within the next45
29. The morning of thenextday, FRESEagain used search termsrelated to the topics
contained in Intelligence Report 1, which contained information classified up to the TS/ /SCI
level. The search termswere not related to topics FRESE would search as part of FRESE s
responsibilities . At approximately 12: 15 p. m ., the DEVICE called Journalist 1. The call lasted
the DEVICE. That call lasted approximately oneminute. Approximately 30 minutes later,
                                                10
contained classified national defense information from Intelligence Report 1. Journalist 1 then
Tweeted a link to Article 1. The nextday FRESE re- Tweeted Journalist of Article
that FRESE passed Journalist 1 the classified NDIfrom Intelligence Report 1 that appeared in
Article 1.
30 . AT & T records show that, on at least eight separate occasions in mid 2018 , the
intelligence reports.
Intelligence Report 2 and Intelligence Report 3 . Both Intelligence Report 2 and Intelligence
Report 3 were published in mid -September 2019 andboth contained NDIclassified up to the
asking Journalist 2 to call him . Less than a minute later, Journalist 2 called FRESE , and they
spoke for approximately fiveminutes . According to AT& T geolocation data , FRESE was within
the Eastern Districtof Virginia when he sent the textmessage and spokewith Journalist2 from
the DEVICE
, well it' s nothing to do with , like what I cover, per usual but um , it s so it' s about, still like
[ topic of Intelligence Reports 2 and 3] . . And I don ' t know if anyone s really commented on
this but I saw a report, it' s a few days old at this point, um , that basically the [ foreign country]
are [ topic of IntelligenceReport2 and 3 .”      U . S . governmentagencieshaveconfirmed thatthe
content FRESE provided Journalist 2 in the September24 , 2019 call contains classified
information . I believe that FRESE used the DEVICE to provide classified NDIto Journalist 2.
33 . Journalist 2 asked FRESE for information that was “ probably outside your lane
as well, but if you ever hear anything about this whole like, topic concerning the U. S. and a
“ Yeah, of course.
TECHNICAL TERMS
log, ” which records the telephone number, date, and time of calls made to and
names and phone numbers in electronic “ address books; sending, receiving, and
                  photographs and moving video storing and playingback audio files; storing
     dates , appointments , and other information on personal calendars ; and accessing
drives . Most digital cameras also include a screen for viewing the stored images.
photographs or videos.
handheld digitalstorage device designed primarilyto store and play audio , video,
or photographic files. However , a portable media player can also store other
digital data . Some portable media players can use removable storagemedia.
miniature hard drives. This removable storage media can also store any digital
data. Depending on the model, a portable media player may have the ability to
store very large amounts of electronic data and may offer additionalfeatures such
                                        13
d . GPS : A GPS navigation device uses the Global Positioning System to display its
current location . It often contains records the locations where it has been . Some
GPS navigation devices can give a user driving orwalking directions to another
sequence of numbers. These signals are sent by radio, using specifications that
are publicly available. A GPS antenna on Earth can receive those signals. When
a GPS antenna receives signals from atleast four satellites, a computer connected
to that antenna can mathematically calculate the antenna s latitude, longitude, and
for storing data ( such as names, addresses, appointments or notes) and utilizing
devices and are used to access the Internet and send and receive e -mail.
and a keyboard and/ or touch screen for entering data . Removable storagemedia
include various types of flash memory cards or miniature hard drives . This
removable storagemedia can store any digital data . Most PDAs run computer
software , giving them many of the same capabilities as personal computers . For
     example, PDA users can work with word -processing documents, spreadsheets,
                                      14
                    and presentations. PDAsmay also include global positioning system (“GPS” )
properly from its source to its destination . Most Internet service providers control
addresses, while other computers have dynamic — that is, frequently changed — IP
addresses
devices that communicatewith each other. Due to the structure of the Internet,
borders, even when the devices communicating with each other are in the same
state .
manufacturer' s advertisements and producttechnical specifications, I know that the Device has
capabilities that allow it to serve as a wireless telephone, digital camera, portablemedia player,
GPS navigation device , and PDA. In mytraining and experience, examining data stored on
devices of this type can uncover, among otherthings, evidence that reveals or suggests who
                                                      15
                     ELECTRONIC STORAGE AND FORENSIC ANALYSIS
can store information for long periods of time. Similarly, things that have been viewed via the
Internet are typically stored for someperiod of time on the device. This information can
permission to locate not only electronically stored information that mightserve as direct
evidence of the crimes described on the warrant , but also forensic evidence that establishes how
the Devicewas used, the purpose of its use, who used it, and when. There is probable cause to
believe that this forensic electronic evidence mightbe on the Device because:
a. Data on the storage medium can provide evidence of a file that was once on the
file (such as a paragraph that has been deleted from a word processing file .
b. Forensic evidence on a device can also indicate who has used or controlled the
device. This “ user attribution” evidence is analogousto the search for indicia of
                                                     16
               d.   The process of identifying the exact electronically stored information on a storage
the warrant.
e. Further, in findingevidence of how a devicewas used, the purposeof its use, who
used it, and when , sometimes it is necessary to establish that a particular thing is
notpresenton a storagemedium .
device to human inspection in order to determine whether it is evidence described by the warrant.
MANNER OF EXECUTION
39. This warrant seeks authorization to open and search either a device storage
lockbox on the Reston, Virginia premises of the Defense Intelligence Agency (“ DIA ” ) , located at
12300 Sunrise Valley Drive, Reston, Virginia 20191, or a black Nissan Rogue with Virginia
                                                      17
license plate 4790 -PT and VIN 5N1AT2MV9HC842483, registered to Henry Kyle FRESE, in
                                             18
                                       CONCLUSION
authorizing the examination of the Device described in Attachment A to seek the itemsdescribed
in Attachment B .
Respectfully submitted ,
                                                Donny Kim
                                                Special Agent
                                                FederalBureau of Investigation
                                              19
                                      ATTACHMENT A
Property to Be Searched
telephone assigned telephone number 610 -348 -4313 and IMSI 310410189527000 , with listed
either
Intelligence Agency (“ DIA located at 12300 Sunrise Valley Drive, Reston, Virginia 20191; or
b A black Nissan Rogue with Virginia license plate 4790 -PT, with VIN
United States Code Section 793 and involve Henry Kyle FRESE since January 1,
2017, including:
a. Classified material
Any U . S . Governmentmaterial
enforcement authorities.
2. Evidence of user attribution showingwho used orowned the Device at the time the
As used above, the terms “ records” and “ information ” include allof the foregoing items
of evidence in whatever form and by whatevermeans theymay have been created or stored,
including any form   of computer or electronic storage (such as flash memory or other media that
This warrant authorizes a review of electronic storage media and electronically stored
information seized or copied pursuantto this warrant in order to locate evidence, fruits, and
instrumentalities described in this warrant. The review of this electronic data may be conducted
by any government personnel assisting in the investigation, who may include, in addition to law
enforcement officers and agents, attorneys for the government, attorney support staff, and
technical experts . Pursuant to this warrant , the FBImay deliver a complete copy of the seized or
copied electronic data to the custody and control of attorneys for the government and their