Kiesel
Kiesel
Kiesel
1.
am a Task Force Officer with the United States Marshals specifically designated to
the United States Marshals Violent Offender Task Force in the District of Maine, and
have been since December 2015. I have been a member of the Biddeford, Maine Police
Department since July 2014, and I have worked in law enforcement since September
Program. In addition, I have passed the Maine Law Enforcement Full Time Exam
and have received my lateral transfer waiver from the Maine Justice Academy Board
human trafficking investigations, computer and cell phone analysis for police
1
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 2 of 27 PageID #: 7
investigations, search warrant writing, drug interdiction and federal asset forfeiture,
surveillance and counter surveillance methods, and the enforcement of federal laws
under Titles 18 and 21 of the United States Code. The facts in this affidavit come
the Federal Rules of Criminal Procedure for warrants to search (1) the premises
currently in the custody of HSI. The SUBJECT PREMISES and the SUBJECT
3. For each warrant, this application seeks authority to search for and
seize evidence, fruits, and instrumentalities of violations of: Title 18, United States
pornography offenses).
federal, state, and local law enforcement; written reports; information gathered from
2
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 3 of 27 PageID #: 8
and experience.
PROBABLE CAUSE
which originated from a foreign law enforcement agency, indicating that between at
a 12 year old girl. These communications were sexual in nature. The foreign law
enforcement agency suspected that Jesse Kiesel, DOB 01/14/1973, 295 Hill St
Biddeford, Maine 04005, was the user of the Immilling Fastpaw account.
chat platform called Chat Ave administered in Shanghai China. On Chat Ave, Kiesel
States.
3
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 4 of 27 PageID #: 9
Immilling Fastpaw account was created on June 8, 2018, 10:31:23 UTC. Those
records further indicate that the email address associated with the account is
phone number associated with the account was listed as 717-793-1384. The display
No. 690168850062, which show that the name associated with the account is listed
as Immilling Fastpaw. The email address associated with that account is listed as
approximately five pages of time stamped login/logouts. The most frequently used IP
address 108.183.170.123. For the date range provided in the records, this IP address
was used frequently between July 19, 2020 thru March 25, 2021.
Kiesel is a current employee at the Biddeford Middle School, 25 Tiger Way Biddeford,
Maine 04005. An open source search of Jesse Kiesel produced a LinkedIn account
with the name Jesse Kiesel and the job title Ed Tech II - Biddeford Middle School.
4
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 5 of 27 PageID #: 10
solicitation and enticement of children and had communicated directly with Kiesel. I
between April 16 and April 21, 2021. During the communication, which actually
occurred between Kiesel and an undercover officer posing as a 13-year-old girl, Kiesel
11. On May 4, 2021, I met with Detective Sgt. Aaron Wojtkowski at the
part-time Task Force Officer (TFO) with the Federal Bureau of Investigations Child
Exploitation and Human Trafficking Task Force. During that meeting, I reviewed
that meeting and my review, I learned the following, among other things:
Avenue to Google Hangouts. The conversation between the target user and the UC
5
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 6 of 27 PageID #: 11
years old, and asked if he cared. The target user responded the he liked the age of
the UC Account. The target user indicated that the user of the UC Account was
old. During the course of the communications, the target user began asking questions
pertaining to the sexual history of the user of the UC Account, and asked whether
that turned off the conversation history, which would result in the deletion of certain
messages. The target user suggested he did so in order to hide these messages from
his wife.
the UC Account that he indicated were pictures of himself,1 and requested images of
e. On about April 23, 2021, the target user sent instructions on how
the UC Account persona should masturbate, informed the UC Account that he was
1 I have compared the pictures sent by the target user to the UC Account to the
photograph on file with Maine BMV for Jesse Kiesel, and I have concluded that that
these photographs depict the same individual.
6
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 7 of 27 PageID #: 12
touching himself, and offered to show the UC Account persona what he was doing.
He then sent one digital image and one video (18 seconds long) depicting his erect
contacted the Biddeford Police Department because he learned from the return the
295 Hill Street, Biddeford, Maine, 04005, including public records maintained by the
City of Biddeford assessor.2 I have also reviewed records maintained by the Maine
Bureau of Motor Vehicles showing that Jesse Kiesel, date of birth January 14, 1973,
PREMISES. BMV records further reflect that Kiesel owns a 2012 grey Honda Civic
PREMISES.3
7
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 8 of 27 PageID #: 13
13. On about May 4, 2021, officers from the Biddeford Police Department
by connecting the camera or smartphone to the computer, using a cable or via wireless
smartphone. These memory cards are often large enough to store thousands of high-
another computer through the use of telephone, cable, or wireless connection. Mobile
devices such as smartphones and tablet computers may also connect to other
millions of computers around the world. Child pornography can therefore be easily,
8
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 9 of 27 PageID #: 14
d.
computer itself an ideal repository for child pornography. Electronic storage media
of various types-to include computer hard drives, external hard drives, CDs, DVDs,
into a port on the computer, can store thousands of images or videos at very high
computer, and then copy it (or any other files on the computer) to any one of those
media storage devices. Some media storage devices can easily be concealed and
anonymous fashion.
pornography. Some online services allow a user to set up an account with a remote
computing service that may provide email services and/or electronic storage of
computer files in any variety of formats. A user can set up an online storage account
9
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 10 of 27 PageID #: 15
access to the Internet. Even in cases where online storage is used, however, evidence
consist of software downloaded onto mobile devices that enable users to perform a
receive, store, distribute, and advertise child pornography, to interact directly with
other like-minded offenders or with potential minor victims, and to access cloud-
way of computer can be saved or stored on the computer used for these purposes.
Storing this information can be intentional (i.e., by saving an email as a file on the
(e.g., temporary files or ISP client software, among others). In addition to electronic
10
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 11 of 27 PageID #: 16
investigations, and the training and experience of other law enforcement officers with
whom I have had discussions, I know there are certain characteristics common to
individuals who access child sexual abuse and child exploitation material via the
and satisfaction from contact with children, or from fantasies they may have viewing
videotapes, books, slides and/or drawings or other visual media. Individuals who
materials for their own sexual arousal and gratification. Further, they may use these
materials to lower the inhibitions of children they are attempting to seduce, to arouse
pornographic material in the privacy and security of their home or some other secure
typically retain those materials and child erotica for many years.
11
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 12 of 27 PageID #: 17
images are often maintained for several years and are kept close by, usually at the
in cloud-based online storage, to enable the individual to view the child pornography
images, which are valued highly. Some of these individuals also have been found to
download, view, and then delete child pornography on their computers or digital
through the use of forensic tools. Indeed, the very nature of electronic storage means
that evidence of the crime is often still discoverable for extended periods of time even
share information and materials, rarely destroy correspondence from other child
sexually explicit material, and often maintain contact information (e.g. online
12
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 13 of 27 PageID #: 18
messaging accounts, email addresses, etc.) of individuals with whom they have been
for any prolonged period. This behavior has been documented by law enforcement
phone) to access the Internet and child pornography, it is more likely than not that
16. Based on all of the information set forth herein, I believe that Kiesel
pornography as well as individuals who access child sexual abuse and child
exploitation material via the Internet. I further believe that Kiesel, who displayed
persistent and focused sexual interest in children, will continue to seek out pedophilic
stimuli for sexual arousal either by seeking opportunities for sexual engagement with
exploitation material.
records that might be found on the SUBJECT PREMISES, in whatever form they are
hard drive or other storage media. Thus, we seek authority to search and seize
13
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 14 of 27 PageID #: 19
PREMISES, there is probable cause to believe those records referenced above will be
stored on that computer or storage medium, for at least the following reasons:
remnants of such files can be recovered months or even years after they have been
downloaded onto a storage medium, deleted, or viewed via the Internet. Electronic
files downloaded to a storage medium can be stored for years at little or no cost. Even
when files have been deleted, they can be recovered months or years later using
data contained in the file does not actually disappear; rather, that data remains on
computer has been used, what it has been used for, and who has used it. To give a
14
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 15 of 27 PageID #: 20
few examples, this forensic evidence can take the form of operating system
do not erase or delete this evidence, because special software is typically required for
d. Similarly, files that have been viewed via the Internet are sometimes
permission to locate not only computer files that might serve as direct evidence of the
crimes described on the warrant, but also for forensic electronic evidence that
establishes how computers were used, the purpose of their use, who used them, and
when. There is probable cause to believe that this forensic electronic evidence will be
was once on the storage medium but has since been deleted or edited, or of a deleted
portion of a file (such as a paragraph that has been deleted from a word processing
file). Virtual memory paging systems can leave traces of information on the storage
medium that show what tasks and processes were recently active. Web browsers,
email programs, and chat programs store configuration information on the storage
medium that can reveal information such as online nicknames and passwords.
15
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 16 of 27 PageID #: 21
peripherals, the attachment of USB flash storage devices or other external storage
media, and the times the computer was in use. Computer file systems can record
information about the dates files were created and the sequence in which they were
establish and prove each element or alternatively, to exclude the innocent from
history, and anti-virus, spyware, and malware detection programs) can indicate who
detection programs may indicate whether the computer was remotely accessed, thus
media activity can indicate how and when the computer or storage media was
accessed or used. For example, computers typically contain information that logs
computer user account session times and durations, computer activity associated
with user accounts, electronic storage media that connected with the computer, and
16
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 17 of 27 PageID #: 22
the IP addresses through which the computer accessed networks and the Internet.
computer or electronic storage media access, use, and events relating to the crime
electronic storage media may provide crucial evidence relating to the physical
location of other evidence and the suspect. For example, images stored on a computer
may both show a particular location and have geolocation information incorporated
into its file data. Such file data typically also contains information indicating when
the file or image was created. The existence of such image files, along with external
device connection logs, may also indicate the presence of additional electronic storage
media (e.g., a digital camera or cellular phone with an incorporated camera). The
exculpate the computer user. Last, information stored within a computer may
offense under investigation. For example, information within the computer may
17
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 18 of 27 PageID #: 23
can, after examining this forensic evidence in its proper context, draw conclusions
about how computers were used, the purpose of their use, who used them, and when.
logs, or other forms of forensic evidence on a storage medium that are necessary to
advance the records to be sought, computer evidence is not always data that can be
merely reviewed by a review team and passed along to investigators. Whether data
purpose of its use, who used it, and when, sometimes it is necessary to establish that
a particular thing is not present on a storage medium. For example, the presence or
instrumentality for committing the crime, and also as a storage medium for evidence
18
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 19 of 27 PageID #: 24
means of committing the criminal offense. The computer is also likely to be a storage
medium for evidence of crime. From my training and experience, I believe that a
computer used to commit a crime of this type may contain: data that is evidence of
how the computer was used; data that was sent or received; notes as to how the
criminal conduct was achieved; records of Internet discussions about the crime; and
by agents and others involved in the forensic examination of computers, I know that
computer data can be stored on a variety of systems and storage devices, including
external and internal hard drives, flash drives, thumb drives, micro SD cards, macro
SD cards, DVDs, gaming systems, SIM cards, cellular phones capable of storage,
floppy disks, compact disks, magnetic tapes, memory cards, memory chips, and online
or offsite storage servers maintained by corporations, including but not limited to,
possible to search computer equipment and storage devices for data for a number of
requires specific expertise and specialized equipment. There are so many types of
computer hardware and software in use today that it is impossible to bring all of the
search. In addition, it may also be necessary to consult with computer personnel who
19
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 20 of 27 PageID #: 25
have specific expertise in the type of computer, software, or operating system that is
being searched;
procedures which are designed to maintain the integrity of the evidence and to
alter data if certain procedures are not scrupulously followed. Since computer data
conducting a complete and accurate analysis of the equipment and storage devices
devices will typically be so large that it will be highly impractical to search for data
equipment and storage devices through a number of methods, including the use of
innocuous or misleading filenames and extensions. For example, files with the
users can also attempt to conceal data by using encryption, which means that a
20
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 21 of 27 PageID #: 26
into readable form. In addition, computer users can conceal data within another
example, by using steganography a computer user can conceal text in an image file
which cannot be viewed when the image file is opened. Therefore, a substantial
amount of time is necessary to extract and sort through data that is concealed or
instrumentalities of a crime.
I know that routers, modems, and network equipment used to connect computers to
the Internet often provide valuable evidence of, and are instrumentalities of, a crime.
This is equally true of wireless routers, which create localized networks that allow
secured (in that they require an individual to enter an alphanumeric key or password
before gaining access to the network) or unsecured (in that an individual may access
the wireless network without a key or password), wireless routers for both secured
and unsecured wireless networks may yield significant evidence of, or serve as
21
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 22 of 27 PageID #: 27
device(s) the perpetrator used to access the network. Moreover, I know that
individuals who have set up either a secured or unsecured wireless network in their
residence are often among the primary users of that wireless network.
22. Based on the foregoing, and consistent with Rule 41(e)(2)(B), I seek a
warrant authorizing the search of the SUBJECT PREMISES that would also permit
contain some or all of the evidence described in the warrant, and would authorize a
later review of the media or information consistent with the warrant. The later
review may require techniques, including but not limited to computer-assisted scans
of the entire medium, that might expose many parts of a hard drive to human
23. Google is a United States company that offers to the public through its
Google Accounts a variety of online services, including email, cloud storage, digital
browser or mobile applications. Google also offers to anyone, whether or not they have
a Google Account, a free web browser called Google Chrome, a free search engine
called Google Search, a free video streaming site called YouTube, a free mapping
service called Google Maps, and a free traffic tracking service called Waze. Many of
these free services offer additional functionality if the user signs into their Google
Account.
22
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 23 of 27 PageID #: 28
address at the domain gmail.com. That email address will be the log-in username for
services offered to the general public, described in further detail below. In addition,
Google keeps certain records indicating ownership and usage of the Google Account
26. When individuals register with Google for a Google Account, Google asks
name, telephone number, birthday, and gender. If a user is paying for services, the
user must also provide a physical address and means and source of payment.
27. Google integrates its various services to make it easier for Google
Accounts to access the full Google suite of services. For example, users accessing their
Google Account through their browser can toggle between Google Services via a
toolbar displayed on the top of most Google service pages, including Gmail and Drive.
Google Hangout, Meet, and Chat conversations pop up within the same browser
window as Gmail. Attachments in Gmail are displayed with a button that allows the
user to save the attachment directly to Google Drive. If someone shares a document
with a Google Account user in Google Docs, the contact information for that individual
23
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 24 of 27 PageID #: 29
their Google Account on the Chrome browser, their subsequent Chrome browser and
Google Search activity is associated with that Google Account, depending on user
settings.
28. When individuals register with Google for a Google Account, Google asks
name, telephone number, birthday, and gender. If a user is paying for services, the
user must also provide a physical address and means and source of payment.
information about the creation and use of each account on its system. Google captures
the date on which the account was created, the length of service, log-in times and
durations, the types of services utilized by the Google Account, the status of the
account (including whether the account is inactive or closed), the methods used to
a mobile application), details about the devices used to access the account, and other
log files that reflect usage of the account. In addition, Google keeps records of the
terms of service, as well as the IP addresses associated with particular logins to the
account. Because every device that connects to the Internet must use an IP address,
IP address information can help to identify which computers or other devices were
24
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 25 of 27 PageID #: 30
30. Google maintains the communications, files, and associated records for
each service used by a Google Account on servers under its control. Even after a user
account and from where, and evidence related to criminal activity of the kind
described above, may be found in the files and records described above. This evidence
under investigation, thus enabling the United States to establish and prove each
element or, alternatively, to exclude the innocent from further suspicion. For
example, in the instant case, Kiesel is believed to have used the chat function in
Google Hangouts to communicate with the UC Account and to send images and
communications, and other data retained by Google can indicate who has used or
example, subscriber information, email and messaging logs, documents, and photos
and videos (and the data associated with the foregoing, such as geo-location, date and
time) may be evidence of who used or controlled the account at a relevant time. As
an example, because every device has unique hardware and software identifiers, and
25
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 26 of 27 PageID #: 31
because every device that connects to the Internet must use an IP address, IP address
and device identifier information can help to identify which computers or other
devices were used to access the account. Such information also allows investigators
to understand the geographic and chronological context of access, use, and events
33. Account activity may also provide relevant insight into the account
enforcement).
of the crimes under investigation including information that can be used to identify
26
Case 2:21-mj-00118-JHR Document 1-1 Filed 05/06/21 Page 27 of 27 PageID #: 32
Case 2:21-mj-00118-JHR Document 1-2 Filed 05/06/21 Page 1 of 2 PageID #: 33
ATTACHMENT A1
Property to be Searched
The property to be searched is 295 Hill Street, Biddeford, Maine, 04005 (the
two car garage. The residence appears to have white colored vinyl siding with blue
28
Case 2:21-mj-00118-JHR Document 1-2 Filed 05/06/21 Page 2 of 2 PageID #: 34
29
Case 2:21-mj-00118-JHR Document 1-3 Filed 05/06/21 Page 1 of 5 PageID #: 35
ATTACHMENT B1
Items to be Seized
criminal offense, contraband, the fruits of crime, or property designed or intended for
use or which is or has been used as the means of committing criminal offenses, namely
this warrant, and any computer or storage medium that contains or in which
are stored records or information that is otherwise called for by this warrant
such as logs, registry entries, configuration files, saved user names and
correspondence;
30
Case 2:21-mj-00118-JHR Document 1-3 Filed 05/06/21 Page 2 of 5 PageID #: 36
d. evidence indicating how and when the computer was accessed or used to
COMPUTER;
l.
31
Case 2:21-mj-00118-JHR Document 1-3 Filed 05/06/21 Page 3 of 5 PageID #: 37
entered into any Internet search engine, and records of user-typed web
addresses;
with minors;
in this attachment.
Internet.
statutes, including:
32
Case 2:21-mj-00118-JHR Document 1-3 Filed 05/06/21 Page 4 of 5 PageID #: 38
including sales receipts, bills for Internet access, and handwritten notes;
with minors;
creation or storage, including any form of computer or electronic storage (such as hard
disks or other media that can store data); any handmade form (such as writing); any
mechanical form (such as printing or typing); and any photographic form (such as
photocopies).
33
Case 2:21-mj-00118-JHR Document 1-3 Filed 05/06/21 Page 5 of 5 PageID #: 39
data can be recorded, including external and internal hard drives, flash drives, thumb
drives, micro SD cards, macro SD cards, DVDs, gaming systems, SIM cards, cellular
phones capable of storage, floppy disks, compact discs, magnetic tapes, memory cards,
to locate evidence, fruits, and instrumentalities described in this warrant. The review
the investigation, who may include, in addition to law enforcement officers and
agents, attorneys for the government, attorney support staff, and technical experts.
Pursuant to this warrant, the HSI may deliver a complete copy of the seized or copied
electronic data to the custody and control of attorneys for the government and their
34
Case 2:21-mj-00118-JHR Document 1-4 Filed 05/06/21 Page 1 of 1 PageID #: 40
ATTACHMENT A2
Property to be Searched
have been provided by the Newberry Police Department to HSI on computer storage
35
Case 2:21-mj-00118-JHR Document 1-5 Filed 05/06/21 Page 1 of 2 PageID #: 41
ATTACHMENT B2
Items to be Seized
criminal offense, contraband, the fruits of crime, or property designed or intended for
use or which is or has been used as the means of committing criminal offenses, namely
the time the things described in this warrant were created, edited, or
correspondence;
use, and events relating to the crimes under investigation and to the
36
Case 2:21-mj-00118-JHR Document 1-5 Filed 05/06/21 Page 2 of 2 PageID #: 42
with minors;
in this attachment.
37