Professional Documents
Culture Documents
THE Court 0F FOR: County, Florida
THE Court 0F FOR: County, Florida
:rszaz
"lf‘ ii
SHd
BEFORE ME, a Judge of the Circuit Court, Sixth Judicial Circuit, in afid Eb} P&lla?
'
County, Florida, personally appeared your Affiant Nicholas Paden, Detective with thé Pinellas
'
County Sherifi’s Office, who by me was duly‘ sworn, deposed and stated that Affiant has
probable cause to believe that sectibn 827.071 and 847.0135(2), Florida Statutes, related to
Possession'of Child Pomog'aphy and Promoting the Sexual Performance by a Child certain
felony laws have been, and are being violated, in or abbut a certain premises, and the curtilage
thereof, and that evidence of, or evidence relevant to, proving the violation of those felony laws,
in the form of compute? equipment and/or data, or printed or written do.cument and/or other
related items described herein, is being. kept in or about said certain premises and the cartilage
I
Description of Premises:
'
.
The three story, single family home has a legal description of
>).”
(LYING IN SEC
'
4,199 square feet of living space and 7,494 square feet of goss space, was built in 1992 with
***ELECTRONICALLY FILED 08/06/2019 02:48:07 PM: KEN BURKE CLERK OF THE CIRCUIT COURT, PINELLAS COUNTY***
The exteriof of the residence is white beige, with bronze and dark brown trim. The roof
consists of brown tetra cotta. The home is flanked by two garages on either side of the main
residence. Eight marble steps lead fiom the driveway up t6 the double fi'ont wooden doors with
‘
fiosted glass inlays. The numbers are displayed on individual tiles affixed in a wooden
'
Your Affiant has probable cause to believe the premises and/or the cartilage thereof, are
being used for the purpose of storing and/or distributing images, inovies, and/or visual depictions
827.071 and 847.0135(2), Florida Statutes, related to Possession of Child Pornography and
Promoting the Sexual Performoance by a Child, and that the premises contains evidence of, or
evidence related to proving, that said crime has been, or is being, committed.
Your Affiant, Detective Nicholas Paden, is a sworn law enforcement officer in the state
of Florida. He obtained a B.A. in History fi'om the University of Florida in 2006 and an M.A. in
National Security and International Intelligence ‘fiom the University of Kentucky in 201 1. Your
affiant completed the 790-hour St Petersburg College Law Enforcement Academy at the Allstate
Center in St Petersburg in July 2014 and that same month passed the State Exam for Law
Enforcement Officers.
Your affiant served as a patrol deputy with the Pinellas County Sherifi'sOffice fiom July
2014 until June 2017. In June 2017, yo'ur affiant was transferred to the Sexual Predator and
Offender Tracking (SPOT) Unit at the Pinellas County Sheriffs Office. As a SPOT Detective, he
has completed training courses in Interviews & Interrogations, Surveillance Operations, and
Florida Department of Law Enforcement's (FDLE) Sexual Offender Database online training, to
include Database training and Sexual Offender. Reg'stration training. Your Affiant attended the
2017 and 2018 Flon'da ICAC/CART/Offender Registration & Enforcement Symposium and
attended labs involving Dark Web Investigations, Open Source Investigations, Virtual Machines,
In February 2019, your affiant was transferred to the Pincllas County Sheriff’s Office
Crimes Against Children Unit. Your Affiant is a taskforce member of the Central Florida
Internet Crimes against Childien (ICAC) Task Force. ICAC is a national organization which
provides specialized high-technology training and resources to law enforcement agencies that
Your Affiant has specialized training which pertains to physical and sexual child abuse
investigations, Your Affiant has also investigated or assisted in the investigations of crimes
against children such as: Sexual Battery, Obscene material, Lewd or Lascivious Battery and
Molestation, and Child Abuse. Your Affiant has previously assisted with search warrants based
upon investigations involving Computer Crimes, including warrants for computers, cellphones,
other dig'tal storage devices/media, and the data contained therein. Your Affiant has conducted
numerous interviews with child victims and offenders during child physical and sexual abuse
investigations.
How Computers Work and Storg Data, Encryption, Introduction to Previewing, Basic Cyber
Investigations: Dark Web & Open Source Intelligence, Cyberstalking, Digital Forensic Analysis:
Previewing, and Basic Digital Forensic Analysis: Acquisition.
Based on all the above described training and experience, your Affiant has developed
probable cause to believe, and does believe, that the crimes described herein arc being
videos on an iMac Pro desktop computer (MODEL A1481, Serial Number: F5KTQOGPF694)
' '
,
SAMUEL BOUTROS, whom she is in the process Samuel
.on
was arrested by the Pinellas County Sheriffs Office 07/21/2019 for -
battery on
advised your affiant that the double doors to th'e office are typically
locked, but ,she has had access to the room in the past for facilitafing the cleaning and decorating
‘
of the room. On this date, pressed one of the locked -office doors open with one
hand. The door swung. easily inward, as the locking mechanism in the past had been broken by
SAMUEL during a previous incident approximately two months ago when he had locked himself
out and broke the door to gain entry. Once inside the room, began séarching the room
'
moved the computer’s mouse, Which qug the screen and provided her logged-in access to the
~
Video files were located on the hard drive of the iMac. Of the 81v videos visible to
'
footage captured in her room either completely naked or in various stages ofundress. is
seen getting dressed and dancing around her room. These files were stored in the same computer
all of the children’s bedrooms. 'The camcrés are in plain view and are equipped with speakers
'
The surveillance system does not have a dedicated storage unit, meaning the capdued video is
only available for approximately 2 hours before it is erased and written over. According to
. the only way that captured video could be saved to disk would be if the user
intentionally sought it out and saved it to disk. The only surveillance videos on the computer
were of naked in her room. SAMUEL participated in an intentional act intruding upon the
' '
tights 9f by saving nude videos of SAMUEL made nudity the focus ofhis attention,
creating a reason to believe he was acting with a lewd and lascivious intent.
.
showed law enforcement another video on the desk top that orig'nated fiom the
office. In the video, SAMUEL can be seen wearing a white T-shirt and nothing else. He
is touchingand manipulating his exposed penis. In the background, can b; seen poking her
head into the room and immediately retreating. SAMUEL continues to manipulate his penis and
-
folldws out of the room and out of sight. He appears to be smiling and speahng to her and
Interviews with the four (4) minor children . yielded no disclosures of sexual
or physical abuse. did, howéver, disclose that approximately two months ago, there was, an
incident while was opt of town. Samuel was naked in the shower and
invited to look at him. When she refused, he insisted again and told her that she was mahng
him “sad.” When quesu'oned about the video wheré was seen poking her head ifitb the
office while SAMUEL was nude fi'om the waist down and touching herself, stated that she
did riot see him in th'e' r'oom, nor did she See his nudity. She did nOt recall the incident beyond
'
Your Affiant knows, fiom training and experience, that digital evidence is not limited to
computers. Your Affiant has been involved in numerous cams where persons with an interest in
child exploitatiofi materials can access the Internet, display images of child pornography, and
communicate with other indifiduals with the same interests using dig'tal oommunicafions
devices, to include cellular teiephones, e-mail devices, tablet computers, and persofial- dig'tal .
assistants. These devices enable Internet and digtal cellular network access, and are fi'equently
found to contain chat communications in the form of short message service (SMS) meséagw.
Your Affiant knows, fi'om training and experience, that searches and seizures of evidence
from computers and other Internet access devices require agents to seize most, or all, electronic
items (hardware, sofiware, passwords and instructions) to_ be processed later by a qualified
digital evidence expert in a controlled environment. Digital storage media may include, but is
not limited to, floppy disks, hard drives, tapes, DVD disks, CD-ROM disks or other magletic,
optical, or mechanical storage, which can be accessed by computers and/qr other electronic
devices, to store and/or retrieve data and/or images of child pornography, which can store the
equivalent of thousands of pages of information. Users may store information and/or images in
random order with deceptive file names, which requires searching authorities to examine all the
stored data to determine whether it is included in the warrant. This sorting process renders it
Your» Affiant knows, fiom training and experience, that searching digital evidence
systems for criminal evidence requires experience in the computer and cellular telephone field
and a properly controlled environment in order to protect the integ‘ity of the evidence and
recover any "hidden,” compressed, password-protected, and/or encrypted files. Since digital
evidence
.is
extremely vulnerable to tampen'ng or destruction (both fiom external sources and/or
fi'om destructive code imbedded in the system as a "booby trap"), a controlled environment is
Your Affiant knows, fi'om training and experience, that Computers and/or other digital
communications devices contain volatile memory that contains information only while the
device is in a powered on and/or running state. Your Affiant knows that powering off the device
may result in the loss of the volatile information. Your Affiant knows that adding an external
evidence storage device will cause minor changes to the state of the computer, but will allow for
the best effort in fully capturing the state of the running evidence. Your Affiant knows that this
capture of information requires technical expertise to ensure the resulting data can be examined
by all subsequent investigators. Your-Affiant knows that this captured information may include
current and/or recent use of the computer, use of encryption, use of other communications
devices, routes of Internet and other digtal communications traffic and passwords, encryption
Your Affiant knows, fiom training and experience, that in order to fully reu-ieve data
fiom a computer or other digital communications system, the analyst needs all magnetic storage
media, as well as the storage devices. In addition, the anélyst needs all the system sofiware
(operating systems or interfaces, and hardware access software or drivers) and any applications
sofiware which may have been used to create the data (whether stored on hard drives or on
Your Affiant knows, fiom training and experience, that persons trading in, receiving,
distributing, and/or possessing images involving the exploitation of children, and/or those
interested in the actual exploitation of children, ofien communicate with others through
correspondence and/or other documents (whether digital or written), which could tend to identify
the origin of the images, as well as provide evidence of a person’s interest in child pomography
Your Affiant knows, fiom training and experience, that files related to the exploitation of
children found on computers and other digital communications devices are usually obtained fiom
the Internet, or fiom cellular data networks using application sofiware which ofien leaves files,
logs, or file remnants which would tend to show the method of location or creation of the
images, search terms used, exchange, transfer, distribution, possession or orig'n of the files.
Your Affiant knows, fiom training and experience, that digital sofiware and/or hardware
exists that allows persons to share digital access over wired and/or wireless networks, allowing
multiple persons to appear on the Internet fi'om the same E address. The most common type of
equipment that allows for this type of access is a router. Examination of these items can reveal
information about the authorized and/or unauthorized use of Internet connection at the residence.
In the case of unauthorized access of a wireless network, the router is the instrumentality of the
crime. The router can be interro gated, and data may be retrieved that can lead to the discovery of
the computer responsible for the unauthorized access, and subsequent criminal activity.
Your Affiant knows, fiom training and experience, that computers and/or other digital
devices used to access the Internet usually contain files, logs, or file remnants which would tend
to show ownership and/or use of the device, as well as ownership and/or use of Internet service
accounts used for the Internet and/or cellular data network access.
Your Affiant knqws fiom training and experience, that digtal crime scenes usually
include items or digital information that would tend to establish ownership and/or use of digital
devices, and Internet access equipment and ownership or use of any Internet service, or digital
cellular service accounts to participate in the exchange, receipt, possession, collection and/or
Your Affiant knows, fiom training and experience, that persons with an interest in the
exploitation of children fi'equently have trophies fi'om victims, items for the grooming of
children, as well as collections of clothing and/or toys related to the exploitation of children.
Your Affiant knows, fi'om training and experience, that search warrants of residences
involved in computer and/or dig‘tally related criminal activity usually produce items that tend to
establish ownership and/or use of dig'tal devices and ownership and/or use of any Internet
service accounts accessed to obtain child pornography to include credit card bills, telephone
Your Affiant knows, fi'om training and experience, that search warrants of residences
usually reveal items that tend to show dominion and/or control of the property searched, to
10‘
include utility bills, telephone bills, correspondence, rental agreements, and/or other
identification documents.
Based upon your Affiant’s knowledge, experience, and training in child exploitation and
child pornography investigations, there are certain characteristics common to many individuals
involved in the receipt and/or collection of child pornography. Collectors of child pomogaphy
ofien possess and maintain “hard copies“ of child pornogaphic material including, but not
limited to, pictures, films, video tapes, magazines, negatives, photographs, correspondence,
mailing lists, books, tape recordings, etc., in the privacy and security of their hoxfie and/or some
magazines, correspondence, books, tape recordings, mailing lists, child erotica, and/or video
tapes for many years. With the advent of technology, collectors of digital child pornogaphy
oflqn maintain their digital and/or electronic collections in a fprmat that is safe, secure and
private, such as a computer and/or back-up storage discs, or other forms of data storage devices.
These collections are rarely, if ever, destroyed, and are kept close by, usually at the collector's
residence, to enable the collector to view the collection, which to them is highly valued.
Child pornography collectors may also correspond with, and/or meet others to share
information and/or materials. They rarely destroy correspondence fiom other child pornography
11
material, and may maintain lists of names, addresses, and/or telephone numbers of individuals
with whom they have been in contact with, and who share the same interests in child
pornography.
Collectors of child pohografihy prefer not to be without their child pornography for any
prolonged time period. This behavior has been documented by law enforcement officers'
Based on your Affiant’s review of the available evidence, namely SAMUEL BOUTROS
.
using his office computer to store surveillance videos capturing naked, coupled with the
saved office video of SAMUEL manipulating his exposed penis in the vicinity of ,
as
well as statement referencing SAMUEL’s behavior in the shower, your Affiant has reason
t0 believe that there may be evidence of possible lewd or lascivious acts involving or that
the computer user is collecting child pomog‘aphy and is saving the cbllection like a “Child
Pomogaphy Collector.”
The above information has led your Affiant to believe that probable cause exists to search _
for the items listed below. There is evidence of exploitation of children by means of the
possession and/or receipt and/or distribution of child pornogaphy, in violation of Flon'da Statute
12
Your Affiant hereby requests the Court’s permission to seize the following items, and to
conduct on and off-site search and analysis, and/or to request the assistance with the search and
analysis from an off-site computer forensic analyst, of the following items (hereinafier the
“Property”), which are evidence of, or evidence relevant to proving, the felony crimes stated
herein:
l. Computer hardware, to include any and all computer equipment used to collect,
analyze, create, display, convert, store, conceal, and/or transmit electronic, magletic,
optical, and/or similar computer impulses and/or data. Hardware includes, but is not
limited to, any data-processing devices, such as central processing units, cellular devices,
”
personal computers, to include "laptop" or "notebook" or “tablet” or “pocke computers;
internaland peripheral storage devices, such as fixed disks, external hard disks, floppy
disk drives and diskettes, tape. drives and tapes, optical storage devices, and other
electronic media devices.
2. Computer input and output devices to include, but not limited to, keyboards, mice,
scanners, printers, monitors, network communication devices, modems, and external or
connected devices used for accessing computer storage media.
3. Computer storage media and the digital content, to include, but not limited to, floppy
disks, hard drives,VHS tapes, tapes, USB flash drives, MP3/iPod players, SD cards,
DVD disks, CD—ROM disks or other magnetic, optical, or mechanical storage which can
be accessed by computers to store and/or retrieve data and/or images of child
pornography.
6. Manuals and/or other documents, whether digital or written, which describe operation
of items and/or software seized.
7. Items containing and/or displaying passwords, access codes, usemames and/or other
identifiers necessary to examine and/or operate items, sofiware and/or information seized.
13
9. Correspondence or other documents, whether digital or written, exhibiting an interest
in the sexual exploitation of children.
10. Items that would tend to establish ownership and/or use of computers and ownership
and/or use of any Internet service accounts accessed to obtain child pornography to
include credit card bills, telephone bills, correspondence and/or other identification
documents.
11. Items that would tend to show dominion and/or control of the property searched, to
include utility bills, telephone bills, correspondence, rental agreements and/or other
identification documents.
12. Data maintained on the computer, and/or computer related storage devices such as
floppy diskettes, tape backups, computer printouts, and “zip” drive diskettes; in
panicular, data in the fonn of images and/or videos and any accompanying text
associated with those images, and/or log files recording the transmission of images as
'
they relate to violations of Florida law, cited herein, related to po'ssession and/or
distribution of child pomog‘aphy. Users may store information and/or images in random
order with deceptive file names, which requires searching authon'ties to examine all the
stored data to determine whether included in the wan'ant. This sorting process makes
it is
13. Files and/or data on the computer that show the _suspect’s ownership, possession
and/or control at time of the offense.
14. Any and all sofiware that may be utilized to create, receive, distribute, store, and/or
modify the evidence sought, and all sofiware that may be used to communicate and/or
store online communications.
15. Encrypted, deleted and/or unallocated files on electronic media that contain any of the
information listed in previous paragaphs.
16. Notations, files and/or documentation containing passwords and/or codes necessary to
unlock computer files and/or to access the computer or storage media.
Your Affiant is aware that the recovery of data by a computer forensic analyst takes
significant time. Similar to the way in which the recovery of narcotics must be forensically
evaluated in a lab, digtal evidence must also undergo an analysis process. For this reason, the
“return” inVCntory will contain a list of only the tangible items recovered fi'om the Premises.
14
Unless otherwise ordered by the Court, the return will not include evidence later examined by a
forensic analyst.
WHEREFORE, your Affiant prays that a Search Warrant be issued according to the laws
commanding all and singular the Sheriff and/or Deputy Sheriffs of Pinellas Comfy, Special Agents
of the Florida Department of Law Enforcement, and Special Agents of the United States
Department of Homeland Security, United States Secret Service Electronic Crimes Taskforce, or
any of their duly constituted officers and either in the daytime or the nighttime, and on any day of
the week including Sunday, with the proper and necessary assistance, including forensic computer
analyst experts to search the herein described premises and curtilage thereof, and any persons
thereon, reasonably suspected of being involved in the illegal activity which is the subject of this
warrant, and seize as evidence the above—described items in order that the evidence may be procured
to be used in the prosecution of such person or persons found to be involved in the illegal activity as
alleged.
M4 WJL
Detective Nicholas Paden,
#S‘m?
AFFIANT
15