+ All Categories
Home > Documents > ECF 58 Redacted

ECF 58 Redacted

Date post: 07-Aug-2018
Category:
Upload: himself2462
View: 216 times
Download: 0 times
Share this document with a friend

of 86

Transcript
  • 8/20/2019 ECF 58 Redacted

    1/86

     

    "

    !"#$%& ($)$%( ($*#+$ +,!*$

    -,* $.% ($*#+$ ,- /)*01)"&

    #$%&& '()*%$+(,-

    .+/(,&(00-

    123

    45,&6, 7 8(++(/)2 99.- %& /+3-

    :%0%,;/,&23

    <

    <

    <<

    <

    <<

    <

    <

    <<

    =/2% >63 ?@"ABC1BDDEFGBHI4

    /,$#," $, (/#(( 20 &%-%"&)"$(

    .!"$," 3 4#11#)/( 1156 7,." 4,,&(6

    *#+.)*& 40)$$6 )"& *,2%*$ 8!)+9%"2,((

    :%0%,;/,&2 45,&6, 7 8(++(/)2 99.- I6J, 866;2- K(CJ/$; 8L/&&- /,; K6*%$&

    M5/CN%,*622 OC6++%C&(1%+L P&J% 478 :%0%,;/,&2Q

  • 8/20/2019 ECF 58 Redacted

    2/86

     

    F

    :/&%;@ ]%T&%)*%$ ^- FD"A K%2T%C&05++L 25*)(&&%;-

    _2_ I6J,3 I3 #5CN+%L- I$3

    I6J, I3 #5CN+%L- I$3 O#/$ >63 D[F^`<#/$$%&& I3 W,;%$26, O#/$ >63 "G`DD<

    8a99aWb] 7 =c>>c99d 99.EFA YU%+0&J ]&$%%&- >3838/2J(,R&6,- := FDDDA

    Y%+%TJ6,%@ OFDF< ^G^BADA"

    Z/C2()(+%@ OFDF< ^G^BADA?eBb/(+@ V*5CN+%LfUC3C6)

    !"#$%&' )"* +&)&$,-$.% /#$."$ 0 12''2-3%

     4456 7"8$ 1"",%6 92:8-*, 1;-..6 -$, 9"&$

  • 8/20/2019 ECF 58 Redacted

    3/86

     

    !"#$%& ($)$%( ($*#+$ +,!*$

    -,* $.% ($*#+$ ,- /)*01)"&

    "#$%% &'()$#*'+,

    -*.'+%'//,

    012

    34+%5+ 6 7'**'.(1 88-, $% .*2,

    9$/$+:.+%12

    ;;;;;;;;;;;

    ?@ABC0BDDEFGBHI3

    /%/,*)"&!/ ,- 1)2 #" (!33,*$ ,- /,$#," $, (/#((

    40 &%-%"&)"$( .!"$," 5 2#11#)/( 1136 7,." 2,,&(6

    *#+.)*& 20)$$6 )"& *,4%*$ 8!)+9%"4,((

    9.%$:? J$K%$()$# L, FD@A I5M+ I2 "4CN*$O, I#2 P".# =52 DQFLR;".##$%% I2 S+:$#15+ P".# =52 @GRDD;7T88TSUJ 6 

  • 8/20/2019 ECF 58 Redacted

    4/86

     

    '

    $)41% ,- +,"$%"$(

    T2  T+%#5:4C%'5+ 22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222@ 

    TT2  [.C%4.* ".CNZ#54+: 2222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222F 

    S2  XM$ -.#%'$1 222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222F 

    "2  XM$ S+5+O(541  

    L;  U5+$O 8.4+:$#'+Z 2222222222222222222222222222222222222222222222222222222222222@R 

     )2  -.%%$#+ 22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222FD 

    G2 

  • 8/20/2019 ECF 58 Redacted

    5/86

     

    ''

    F2  X5#%'541 T+%$#/$#$+C$ Y'%M "41'+$11 a$*.%'5+1 222222222222222222222222222222222222222222FE 

    G2  T+%$+%'5+.* T+/*'C%'5+ 5/ \(5%'5+.* 9'1%#$11 2222222222222222222222222222222222222222222222FR 

    L2  U.#O*.+:

  • 8/20/2019 ECF 58 Redacted

    6/86

     

    '''

    $)41% ,- )!$.,*#$#%(

    -%&%*)1 +)(%(

     ? @":A; 12.8"#. - B-3& CD E2*F2$2-,QAA [2G: GLF PL%M G _2J2 @LG P@R>E; 2222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222E

     ?$,&*%"$ CD K"#$,D )"* ?,C-$:&3&$.6 L,#:D 0 L3GA. ") ?3D J$,2-$%,@AA [2G: ADD PL%M 0 P&; @&*CD6 J$:D CD Q""F'&6 J$:D, =52 @?@LBC0BDDQGQ, BBB [2 J4KK2 G: BBBB, FD@A 78 LDFRFEP\292 e.2 I.+2 FE, FD@A;22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222@L

     O-*"$ K2$D !"*GD CD B-.-$M"$,LE@ [2 J4KK2 F: AGA P92 U:2 FDDQ; 22222222222222222222222222222222222222222222222222222222222222222222222222222222222F>, FR

     O&'' ?.'D !"*GD CD RS"3R P92 U:2 FDDA; 22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222@A

     O";'& CD T$2.&, @.-.&%,

    AAQ _2J2 RG> PFDDR; 22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222@L

     O*"">% CD !2.; ") 12$%."$I@-'&3,>A [2G: @E> PL%M

  • 8/20/2019 ECF 58 Redacted

    7/86

     

    '0

    !-*%"$ CD Q2-$. K"",6 J$:D,@>E [2 J4KK2 F: LQF P92 U:2 FDDF; 22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222FR

    !8#" CD O&..&* O#%D O#*&-# ") @D 52&,3"$.6 J$:D,EQG [2 J4KK2 F: EAR P7292=2>> P92 U:2 =502 GD, FDDQ; 222222222222222222222222222222222222222222222F>

    !"@.-* 9&-'.; J$)"D6 J$:D CD K2&', ,Q@F [2 J4KK2 F: QQD P92 U:2 FDDR; 22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222@F

     +A?,,-*2" CD Q&''&* ,FQL [2 J4KK2 F: GQE P\292 e.2 FDDG; 22222222222222222222222222222222222222222222222222222222222222222222222222222222@F, @L

     +-C2, CD T$2.&, @.-.&%,

    >FD [2F: @DG> PR%M 2$ 0 1&LQ [2 J4KK2 F: GEE P92 U:2 FD@F; 22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222FE

    QL J$CD 5*2C-.& 5'-:&3&$. 5-*.$&*% JJ CD 5-*>&* ,FLE [2G: ALG PL%M DE [2 J4KK2 F: GR@ P92 U:2 FD@@; 22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222FA

    Q*-$. CD @8-G2*" 0 O#*%"$6 445 ,>E@ [2 J4KK2 F: LQF P92 U:2 FD@F; 22222222222222222222222222222222222222222222222222222222222222222222222222222@G, @A, F@

     /D7D J$:D CD BSD O&'' R&'D !"D,LRF _2J2 FFR P@R>R; 22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222@L

    !"#$ &'()*+,*--./0*123 45+67$89 )&*( :;?-@?() A"B$ ) 5C @-

  • 8/20/2019 ECF 58 Redacted

    8/86

     

    0

     /-''& +&CD6 J$:D CD ?$$& ?*#$,&' !"#$.;,@F@ [2 SKKfb ADL PL%M D>, FD@G 78 GR>R@DL P92 U:2 S4Z2 @, FD@G; 222222222222222222222222222222222222222222222222@D

     P23>Q [2F: Q>@ PL%M

  • 8/20/2019 ECF 58 Redacted

    9/86

     

    0'

     9",*2F#&M CD T$2.& /&*& 4":-' XY, =52 9&< @GB@ALL, FD@L 78 @LQLGEG P92 U:2 SK#2 @L, FD@L; 222222222222222222222222222222222222222222222@D

     9".&''- CD 1"", ,AF> _2J2 ALR PFDDD; 2222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222E, @D

     9#.'&,F& CD ?*2M"$- O,D ") 9&F&$.%,>AR [2F: EGF PR%M

  • 8/20/2019 ECF 58 Redacted

    10/86

     

    0''

    T$2.&, @.-.&% CD P# ,LLL _2J2 @@@ P@RER; 2222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222>

    T$2.&, @.-.&% CD B-UU-* ,GDD [2G: LQQ PL%M  ,E>@ [2G: LG> P>%M  ,AG> _2J2 GLG PFDDG; 22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222FG

    E#;;#*# CD 7-,8-C,

     =52 G?@D"GEFA P\292 e.2 SK#2 @R, FD@@; 22222222222222222222222222222222222222222222@E

    1-''-:& CD R*"%. , =52 9&< @GBGLEG, FD@L 78 LG>>G>R P92 U:2 J$K%2 L, FD@L; 2222222222222222222222222222222222222222222222@D

    1-'.&*% CD H:H-8&$,ERA [2 J4KK2 F: GAD P92 U:2 FD@@; 22222222222222222222222222222222222222222222222222222222222222222222222222222222222222222@D

    1*2F8. CD W'2C&* ,RR [2G: @@GG, @RRQ 78 AG@FRR PL%M

  • 8/20/2019 ECF 58 Redacted

    11/86

     

    0'''

    ,$.%* )!$.,*#$#%(

    @> _2J2 _2J2 _2J2 _2J2 _2J2 _2J2 _2J2 _2J2

    @> _2J2 _2J2

    @> _2J2 _2J2 _2J2 _2J2 _2J2 _2J2

    U:2

  • 8/20/2019 ECF 58 Redacted

    12/86

     

    @

    #:  #;?@A;

    -*.'+%'// "#$%% &'()$#*'+ '1 +5 1%#.+Z$# %5 %M'1

  • 8/20/2019 ECF 58 Redacted

    13/86

     

    F

    ##:  -CA@;?

    XM$ /5**5Y'+Z /.C%4.* :$1C#'K%'5+ '1 ).1$: 15*$*O 5+ %M$ .**$Z.%'5+1 '+ %M$

  • 8/20/2019 ECF 58 Redacted

    14/86

     

    G

    $+%'%'$1 K'%CM$: %M$'# 1$#0'C$1 %5 367 Y'%M . :5C4($+% $+%'%*$: h

  • 8/20/2019 ECF 58 Redacted

    15/86

     

    L

     K4)*'C*OB.0.'*.)*$ '+/5#(.%'5+;r PF; \bM')'% X, YM'CM .% K.Z$ F '+C*4:$1 . CM.#% *'1%'+Z &'()$#*'+

    .1 C5++$C%$: %5 e$*0$%a$05*4%'5+ P. /.C% M$ .CN+5Y*$:Z$1 '+ M'1

  • 8/20/2019 ECF 58 Redacted

    16/86

     

    A

    4:  $GH );>;JK>@I +JLH=M);r 2,D, \b2 SS2 S+5+O(541 #$%.*'.%$: )O 41'+Z /*.Z#.+%*O '**$Z.* ($.+1 %5

    M.CN '+%5 3"H.#Of1 1$#0$#1 .+: 1%$.* (5#$ %M.+ ED,DDD C5((4+'C.%'5+1 .+: :5C4($+%1, .+:

    14)1$`4$+%*O #$*$.1$: %M$( %5 %M$ K4)*'C2 PK.Z$ F>;r %&& -'%" 2,D, \b2 ""2

    S(5+Z %M$ 1%5*$+ :5C4($+%1 Y$#$ %M$ X$.( XM$('1 K'%CM (.%$#'.*1 :'1C411$: .)50$,

    '+%$#+.* X$.( XM$('1 :'1C411'5+1 #$*.%'+Z %5 '%1 K#5K51.*1 %5 %M$ 367 9$/$+:.+%1, .+:

    C5+/':$+%'.* C5((4+'C.%'5+1 )$%Y$$+ %M$ 367 9$/$+:.+%1 .+: X$.( XM$('12 &'()$#*'+

     K#'(.#'*O ).1$1 M'1 .**$Z.%'5+1 5+ 1$*$C%'0$ .+: 54%B5/BC5+%$b% `45%.%'5+1 .+: 1+'KK$%1 /#5( %M$1$

    4+*.Y/4**O 5)%.'+$: :5C4($+%1, (.+O 5/ YM'CM .#$ .KK$+:$: %5 M'1

  • 8/20/2019 ECF 58 Redacted

    17/86

     

    Q

    $//$C%, X$.( XM$('1 C$.1$: %5 $b'1%2 JK$C'/'C.**O, -.*.+%'# h1$0$#l$:m .+O .+: .** C5+%.C%1 Y'%M

    3" H.#Oi .+: "$#'C5 h:'1.05Y$:i '%1 %'$1 %5 X$.( XM$('12

  • 8/20/2019 ECF 58 Redacted

    18/86

     

    E

     ).##$: 4+:$# %M$ .KK*'C.)*$ 1%.%4%$ 5/ *'('%.%'5+12  O*"">% CD !2.; ") 12$%."$I@-'&3, >A [2G: @E>,

    @>@ PL%M _2J2 _2J2 ALR, AAGpAL PFDDD;2 S K*.'+%'//

    '1 5+ +5%'C$ 5/ M'1 '+]4#O '/ M$ hK511$11$1 14//'C'$+% /.C%1 .)54% %M$ M.#( :5+$ %5 M'( %M.%

    #$.15+.)*$ '+`4'#O Y'** #$0$.* M'1 C.41$ 5/ .C%'5+2i  B-%23 CD 1-*,&$6 H,D /"#%& ") !"**D, QL

    [2G: RA@, RAA PL%M '&; 0 12''2-3% !"$%.*D6 J$:D, G@ S2G: F@F, FGQ PU:2FD@@;2 U.#O*.+: C54#%1 5+*O .KK*O %M$ h:'1C50$#O #4*$i .1 .+ $bC$K%'5+ %5 %M$ 1%.%4%$ 5/*'('%.%'5+1 YM$+ %M$ K*.'+%'// '1 h)*.($*$11*O 'Z+5#.+% 5/ %M$ /.C% %M.% . %5#% M.1 5CC4##$: .+:%M41, 54ZM% +5% )$ CM.#Z$: Y'%M 1*4()$#'+Z 5+ #'ZM%1 %M$O Y$#$ 4+.)*$ %5 .1C$#%.'+2i  J,D .% FGQp GE P'+%$#+.* `45%.%'5+ (.#N1 5('%%$:;2 T+ %M'1 C.1$, &'()$#*'+ '1 +5% 'Z+5#.+%j)*.($*$11*O 5#5%M$#Y'1$j)$C.41$ M$ .**$Z$1 (.11'0$ K4)*'C'%O '+ %M$ ($:'. .)54% %M$ 3"H.#O :5C4($+%1, %M$ K51%'+Z 5+*'+$ '+ 1$.#CM.)*$ /5#( 5/ %M$ $+%'#$%O 5/ %M51$ :5C4($+%1, .+: JX

  • 8/20/2019 ECF 58 Redacted

    19/86

     

    >

    Y54*: M.0$ .CC#4$:2 35Y$0$#, %5 %M$ $b%$+% %M.% %M$ ;2 XM$ K4)*'C.%'5+ 5/ %M$ 3"H.#O :5C4($+%1,

    YM'CM /5#(1 %M$ ).1'1 /5# &'()$#*'+f1 .**$Z$: '+]4#O, .*15 K4% M'( 5+ '+`4'#O +5%'C$ 5+ [$)#4.#O

    E %M.% M$ M.: )$$+ '+]4#$:2 @&& ? @":A; 12.8"#. - B-3& CD E2*F2$2-, QAA [2G: GLF, GL> PL%M pG@;r 2,D,

    \b12 [[ .% Q P1%.%'+Z %M.% hT C.+ .*15 C5+/'#( %M.% 14CM .+ $//5#% l%5 /'*$ . ).# C5(K*.'+%m '1

    (50'+Z /5#Y.#:i .+: +5%'+Z /4#%M$# %M$ K5%$+%'.* /5# . hC'0'* C5(K*.'+%i;, 33 .% G PhU.+O 5/ %M$

    !"#$ &'()*+,*--./0*123 45+67$89 )&*( :;?-@?() A"B$ (. 5C @-

  • 8/20/2019 ECF 58 Redacted

    20/86

     

    R

    +.($: %.#Z$%1 .#$ .C%'0$*O C5+1':$#'+Z C5(($+C'+Z C'0'* K#5C$$:'+Z1 2 2 2 .1 Y$** .1 $%M'C.*

    Z#'$0.+C$1 Y'%M %M$ #$*$0.+% ".# .115C'.%'5+12i;2

     =5% 5+*O Y.1 &'()$#*'+ 5+ '+`4'#O +5%'C$ )O [$)#4.#O E, %M$

  • 8/20/2019 ECF 58 Redacted

    21/86

     

    @D

    a$Z.#:*$11 5/ YM'CM 5/ %M$1$ :.%$1 '1 1$*$C%$:, %M$ /.C% #$(.'+1 %M.% &'()$#*'+ Y.1

    '+:'1K4%.)*O 5+ +5%'C$ 5/ M'1 K4#K5#%$: '+]4#'$1 K#'5# %5 U.#CM @Q, FD@@2 &'()$#*'+ %M41 /'*$: M'1

    %, >A [2G: .% @>Fp>Gr B-%23, QL [2G: .% RAQr ?

    @":A; 12.8"#. - B-3&, QAA [2G: .% GL>r /-''& +&CD, @F@ [2 SKKfb .% ADEpD>r %&& -'%" 1*2F8. CD

    W'2C&* , RR [2G: @@GG, @RRQ 78 AG@FRR, .% wF PL%M 5C @-

  • 8/20/2019 ECF 58 Redacted

    22/86

     

    @@

    4:  $GH +>KNDCB;< -CBDI $> )?HO@C= +BQBD *#+,

    _+:$# a4*$ @FP);PQ;, . C*.'( /5# #$*'$/ (41% #'1$ h.)50$ %M$ 1K$C4*.%'0$ *$0$*2i  O&'' ?.'D

    !"*GD CD RS"3

  • 8/20/2019 ECF 58 Redacted

    23/86

     

    @F

    FD@A; P+5%'+Z 1$#'541+$11 5/ C'0'* aT

  • 8/20/2019 ECF 58 Redacted

    24/86

     

    @G

     %&& -'%" ?%8:*"). CD JNE@ [2 J4KK2 F: LQF, LEG P92 U:2 FD@F;

    P'+%$#+.* `45%.%'5+ (.#N1 5('%%$:;2

    "$O5+: &'()$#*'+f1 /.'*4#$ %5 1.%'1/O $0$+ %M$ 5#:'+.#O /.C%5#1 /5# aT

  • 8/20/2019 ECF 58 Redacted

    25/86

     

    @L

    $+%$#K#'1$, .+: *5+Z$0'%O 14//'C'$+% %5 K$#('% %M$1$ .115C'.%$1 %5 K4#14$ %M$ $+%$#K#'1$f1 K4#K51$2i

     O";'& CD T$2.&, @.-.&%, AAQ _2J2 RG>, RLQ PFDDR;2 XM$ R;;2 XM$

  • 8/20/2019 ECF 58 Redacted

    26/86

     

    @A

    (5+$O *.4+:$#'+Z, .+: 1%.%$ *.Y $b%5#%'5+2

  • 8/20/2019 ECF 58 Redacted

    27/86

     

    @Q

    7'%M #$Z.#: %5 %M$ 367 9$/$+:.+%1, %M$#$ '1 +5 .**$Z.%'5+ %M.% %M$ /'#( 5# '%1 .%%5#+$O1

    (.:$ P5# K*.++$: %5 (.N$; .+O /.*1$ 1%.%$($+%12

  • 8/20/2019 ECF 58 Redacted

    28/86

     

    @E

    '+%$+% )$C.41$ +5YM$#$ :5 %M$O ($+%'5+ .+ 5+Z5'+Z ]4:'C'.* K#5C$$:'+Z2 [5# %M.% #$.15+ .*5+$,

    %M$ 5)1%#4C%'5+ 5/ ]41%'C$ K#$:'C.%$ Y'** +5% 14//'C$ %5 14KK5#% . aT _2J2

  • 8/20/2019 ECF 58 Redacted

    29/86

     

    @>

    FD@@; P:'1('11'+Z dd @A@F .+: @A@G C*.'(1 )$C.41$ K*.'+%'//1 /.'*$: %5 K#50':$ h1K$C'/'C /.C%4.*

     ).1'1 /5# )$*'$0'+Z %M.% 9$/$+:.+%1 2 2 2 .C%$: '+ #$%.*'.%'5+i 5# h'+%$#/$#$: Y'%M 2 2 2 .:0$#%'1$#1,i

    5# %M.% h. /$Y C5(($+%1 2 2 2 #51$ %5 %M$ *$0$* 5/ '+%'(':.%'5+, %M#$.%1, 5# C5##4K% K$#14.1'5+i;r %&&

    -'%" T$2.&, @.-.&% CD 5&.*#> , E>@ [2G: LG>, LLA P>%M

  • 8/20/2019 ECF 58 Redacted

    30/86

     

    @R

     K#5M')'%1 .+ '+:'0':4.* /#5( 5)%.'+'+Z 5# .%%$(K%'+Z %5 5)%.'+ .+O%M'+Z 5/ 0.*4$ P'+C*4:'+Z

    (5+$O .+: K#5K$#%O; /#5( .+5%M$# '+:'0':4.*2i;2

    U5#$50$#, )5%M 5/ %M$ #$*$0.+% 1%.%$ .+: /$:$#.* $b%5#%'5+ *.Y1 .*15 #$`4'#$ . 1M5Y'+Z 5/

    '+%$+%2 @&& @> _2J2;HJ 1C@;?H=B;F

    XM$ /'+.* .**$Z$: K#$:'C.%$ .C% K#$1$+%$: '+ %M$ _2J2

  • 8/20/2019 ECF 58 Redacted

    31/86

     

    FD

    /4+:1 /'#1% )$C5($ %.'+%$: )O C#'($2i;r T$2.&, @.-.&% CD B-UU-* , GDD [2G: LQQ, L>@ PL%M >Q [2F: .% Q>Gp>L

    P'+%$#+.* `45%.%'5+ (.#N1 5('%%$:;2 XM$1$ .#$ C5((5+*O %$#($: %M$ h#$*.%$:+$11i .+:

    hC5+%'+4'%Oi K#5+Z1, #$1K$C%'0$*O, 5/ %M$ K.%%$#+ $*$($+%2

    ['#1%, %5 %M$ $b%$+% %M$

  • 8/20/2019 ECF 58 Redacted

    32/86

     

    F@

    h:$(5+1%#.%$ . %M#$.% 5/ C5+%'+4'%O2i TD@D ?2*'2$& 52'".%, Q@A [2G: .% G@> P'+%$#+.* `45%.%'5+

    (.#N1 5('%%$:;2 "4% YM$+ %M$ .**$Z$: h#.CN$%$$#'+Z .C%'0'%O M.1 . )4'*%B'+ $+:'+Z K5'+% 2 2 2 %M$

    C.1$ :5$1 +5% K#$1$+% %M$ +$C$11.#O %M#$.% 5/ *5+ZB%$#(, C5+%'+4$: C#'('+.* .C%'0'%O2i  J,D 

    P'+%$#+.* `45%.%'5+ (.#N1 5('%%$:;2 X.#Z$%'+Z . K.#%O %5 h.CM'$0$ . 1'+Z*$ Z5.*i '+M$#$+%*O

    hC#$.%$1 . /5#$1$$.)*$ )4'*%B'+ $+:'+Z K5'+%2i  J,D .% G@R P'+%$#+.* `45%.%'5+ (.#N1 5('%%$:;2 S1

    .**$Z$: M$#$, 5+C$ &'()$#*'+ Y.1 h:$1%#5Ol$:m,i

  • 8/20/2019 ECF 58 Redacted

    33/86

     

    FF

     )41'+$11 *5112i  B-.A' O'"FF&*%, FD@A 78 @FLFEQG, .% w@@ P'+%$#+.* ̀ 45%.%'5+ (.#N1 5('%%$:;2 T+

    %M'1 C.1$, &'()$#*'+ .**$Z$1 K$#15+.* '+]4#O, :.(.Z$ %5 M'1 #$K4%.%'5+, .+: %M$ *511 5/ 14KK51$:

    $C5+5('C 5KK5#%4+'%'$12 ;2 T+]4#'$1 %5 #$K4%.%'5+ 5# KMO1'C.* M.#(

    h#$*.%$ %5 K$#15+.* M.#(,i .+: %M41 .#$ +5% C5Z+'c.)*$ '+ . C'0'* aT

  • 8/20/2019 ECF 58 Redacted

    34/86

     

    FG

    PFDDQ; Ph7M$+ . C54#% $0.*4.%$1 . aT , AG> _2J2 GLG, GAG PFDDG;jY.1 .:5K%$: )O APF; C5+%.'+1 %Y5 K.#%1? %M$ /'#1% '1 :'#$C%$: .% h'+1%'%4%'5+1

    .+: K#5C$11$1 5/ %M$ /$:$#.* Z50$#+($+%i .+: %M$ 1$C5+: '1 :'#$C%$: .% .C%'0'%'$1 h414.**O 5/

     K#'(.#O 1%.%$ C5+C$#+,i 2,D, )4% &'()$#*'+ .KK$.#1 %5 K*$.: 5+*O . 0'5*.%'5+ 5/ K.#% 5+$,

  • 8/20/2019 ECF 58 Redacted

    35/86

     

    FL

    %M$ *.+Z4.Z$ 5/ d @R>APF; #$`4'#$1 %M.% %M$ 6 BD?D, L>G [2G: @@DQ, @@FL P@D%M AR, .%

    w@D P92 U:2 U.#2 @@, FD@L; P`45%'+Z ? @":A; 12.8"#. - B-3& CD E2*F2$2-, QAA [2G: GLF, GLQ

    PL%M

  • 8/20/2019 ECF 58 Redacted

    36/86

     

    FA

    S1 %5 %M$ 1$C5+: $*$($+%, %M$ APF;2i @:".. , @R>E 78 GQ@QR, .% wFr %&& -'%" Q';$$ CD J3G-:. @:2D 0 R&:8D6 J$:D, >DE [2

    J4KK2 F: GR@, LFF P92 U:2 FD@@; P/'+:'+Z hl*m$Z.* C*.'(1 K511$11'+Z . #$.15+.)*$ ).1'1 '+ *.Y

    .+: /.C% 1'(K*O :5 +5% C5+1%'%4%$ %M$ s/5#C$ 5# '+%'(':.%'5+f +$C$11.#O %5 1.%'1/O d @R>APF;i

    P'+%$#+.* `45%.%'5+ (.#N1 5('%%$:;;2 "$1':$1 %M$ C$.1$B.+:B:$1'1% *$%%$#, &'()$#*'+ .**$Z$1 %M.%

    X$.( XM$('1 :'1C411$: '+%$#+.**Oj)4% +$0$# '(K*$($+%$:jK*.+1 %5 :'1C#$:'% M'( '+ %M$

     K5*'%'C.* 1KM$#$2 "4% %M$#$ '1 +5 .**$Z.%'5+ %M.% %M$ 367 9$/$+:.+%1 %55N K.#% '+ %M$1$

    :'1C411'5+1 5# %M.% %M$ K*.+1 %5 :'1C#$:'% M'( Y$#$ $0$# C.##'$: 54%r '+ .+O $0$+%, K5*'%'C.* 1K$$CM

    C.++5% C5+1%'%4%$ h/5#C$, '+%'(':.%'5+ 5# %M#$.%1i /5# K4#K51$1 5/ d @R>APF;2 @:".. , @R>E 78

    5//$+1$2i;2 XM$ (51% %M$ BGADL, FDDR 78 FLRQ>LL, .% w> P92U:2 S4Z2 @@, FDDR; P#$]$C%'+Z d @R>APF; C*.'( YM$+ .**$Z$: C5+1K'#.CO %5 :$%$# 5CC4##$: O$.#1.K.#% /#5( C54#% K#5C$$:'+Z;r /"F-$ CD 12$,&* , EQF [2G: @DRQ, @@@L P@D%M

  • 8/20/2019 ECF 58 Redacted

    37/86

     

    FQ

    GQ@QR, .% wFr +#.."$ CD H"$.F"3&*; !"#$.;, =52 9&< FDD>BGADL, FDDR 78 FLRQ>LL, .% w> P92

    U:2 S4Z2 @@, FDDR;2

    XM'#:, &'()$#*'+ '1 #$`4'#$: %5 K*$.: %M.% %M$ .**$Z$: C5+1K'#.CO C.41$: M'( .+ '+]4#O )O

     K#$0$+%'+Z M'( /#5( K#$1$+%'+Z .+ $//$C%'0$ C.1$ '+ C54#%2 LF _2J2APG; PhlXmM$ K.#%O 15

    '+]4#$: 5# :$K#'0$: (.O M.0$ .+ .C%'5+ /5# %M$ #$C50$#O 5/ :.(.Z$1 5CC.1'5+$: )O 14CM '+]4#O 5#

    :$K#'0.%'5+2i;r 4&S2$ CD !"">&, F> [2 SKKfb @>Q, @RA PL%M FD

    [2F: @DG>, @DLD PR%M APF; C*.'( )$C.41$ /.C%1 /.'*$: %5 h14ZZ$1% %M$

    :$/$+:.+%1 .Z#$$: 1K$C'/'C.**O %5 :$%$# l:$/$+:.+%f1m .%%$+:.+C$ '+ C54#%i;2

    &:  $GH +>KNDCB;< -CBDI $> )?HO@C;2 =5+$ 5/ %M$1$ 1%.%$ *.Y C*.'(1 '1

     K*$.:$: .:$`4.%$*O2

    !"#$ &'()*+,*--./0*123 45+67$89 )&*( :;?-@?() A"B$ 0) 5C @-

  • 8/20/2019 ECF 58 Redacted

    38/86

     

    FE

    R:  #;QCIB>; >P 3=BQCAJ

    ['#1%, &'()$#*'+ .**$Z$1 %M.% %M$ 367 9$/$+:.+%1 C5+1K'#$: Y'%M 5%M$# 9$/$+:.+%1 %5

    '+0.:$ M'1 K#'0.CO )O '+%#4:'+Z '+%5 M'1 1$C*41'5+2 =@I #;

  • 8/20/2019 ECF 58 Redacted

    39/86

     

    F>

    %M.% M$ Y.1 /'#$:r 5+*O %M.% %M$ 367 9$/$+:.+%1 h.%%$(K%$: %5 '+%$#/$#$i Y'%M M'1 ]5)2  J,D 

    [4#%M$#, &'()$#*'+ 4%%$#*O /.'*1 %5 ':$+%'/O .+O .**$Z$: .C% )O %M$ 367 9$/$+:.+%1 %M.%

    '+%$#/$#$: Y'%M M'1 $(K*5O($+%, %5 .**$Z$ %M.% 14CM .+ .C% Y.1 '+%$+%'5+.* 5# Y'%M54% ]41%'/'C.%'5+,

    5# %M.% M$ 141%.'+$: .+O :.(.Z$12 3$ %M41 M.1 /.'*$: %5 1%.%$ . C*.'( /5# '+%$#/$#$+C$ Y'%M .+

    $b'1%'+Z C5+%#.C%2 @&& O-*"$ K2$D !"*GD CD B-.-$M"$, LE@ [2 J4KK2 F: AGA, ALDpL@ P92 U:2

    FDDQ;2

    &'()$#*'+ .*15 .**$Z$1 %5#%'541 '+%$#/$#$+C$ Y'%M +5+BC5+%#.C%4.* #$*.%'5+1 )$C.41$

     K4#K5#%$: :.(.Z$ %5 M'1 K$#15+.* #$K4%.%'5+ .**$Z$:*O C.41$: M.#( %5 82% &3G'";&*A% )41'+$11

    #$*.%'5+1M'K12 pAR;2 &'()$#*'+ M.1 +5 1%.+:'+Z %5 (.N$ 14CM .

    C*.'(2  @&& O-*"$, LE@ [2 J4KK2 F: .% AG>pGR Ph"5%M K.#%'$1 .Z#$$ %M.% l%M$ 5Y+$# 5/ . +5+B

     K#5/'%m :5$1 +5% M.0$ 1%.+:'+Z %5 .::#$11 C*.'(1 YM'CM )$*5+Z 15*$*O %5 l%M$ +5+BK#5/'%m2i;2

    \0$+ '/ &'()$#*'+ C54*: )#'+Z 14'%, M$ /.'*1 %5 1%.%$ . C*.'( /5# +5+BC5+%#.C%4.* %5#%'541

    '+%$#/$#$+C$, YM'CM #$`4'#$1? P@; '+%$+% PF; %5 C.41$ :.(.Z$ %5 K*.'+%'//f1 )41'+$11 PG; Y'%M

    (.*'C$ PL; %M.% C.41$1 h.C%4.* :.(.Z$ .+: *5112i !"'& CD ?$$& ?*#$,&' !"#$.; O,D ") L,#:D, =52

  • 8/20/2019 ECF 58 Redacted

    40/86

     

    FR

    [4#%M$#(5#$, &'()$#*'+ /.'*1 %5 .**$Z$ '+%$#/$#$+C$ Y'%M K#51K$C%'0$ $C5+5('C #$*.%'5+1

     )$C.41$ 14CM . C*.'( (41%j'+ .::'%'5+ %5 %M$ $*$($+%1 .)50$jh':$+%'/O . K511')*$ /4%4#$

    #$*.%'5+1M'K YM'CM '1 *'N$*O %5 5CC4#, .)1$+% %M$ '+%$#/$#$+C$, Y'%M 1K$C'/'C'%O,i O-*"$, LE@ [2

    J4KK2 F: .% ALQ P:'1('11'+Z .1 h0.Z4$ .+: 4+/5#($:i C*.'(1 %M.% ($#$*O hM'+% .% 15($ :.(.Z$

    %5 lK*.'+%'//f1m #$*.%'5+1M'K Y'%M 15($ 4+':$+%'/'$: l5#Z.+'c.%'5+1m .% 15($ /4%4#$ %'($ '+ 15($

    /4%4#$ )41'+$11 M$ ('ZM% M.0$i;2 &'()$#*'+ ':$+%'/'$1 +5 14CM #$*.%'5+1M'K2

    U:  #;P %K>;CD &BIpLR P92 U:2 @RRQ;;;2 3$ .**$Z$1 367

    C5+%.C%$: [5b =$Y1 %5 Y#'%$ .+ .#%'C*$ %M.% #$14*%$: '+ . hC55#:'+.%$: C.(K.'Z+ 5/ (5#$ %M.+ @DD

    %M#$.%1 5/ 0'5*$+C$i .Z.'+1% JX

  • 8/20/2019 ECF 58 Redacted

    41/86

     

    GD

    GL@, GL> +2@D P92 U:2 FDDG; P`45%'+Z /-**2% CD 7"$&%, G>D S2F: Q@@, Q@L PU:2 @REE;;2 S% (51%

    M$ .**$Z$1 hs($#$ '+14*%1, '+:'Z+'%'$1, %M#$.%1, .++5O.+C$1, K$%%O 5KK#$11'5+1, 5# 5%M$#

    %#'0'.*'%'$1fi %M.% .#$ '+14//'C'$+% %5 14KK5#% . C*.'( /5# '+%$+%'5+.* '+/*'C%'5+ 5/ $(5%'5+.* :'1%#$112

     J,D P`45%'+Z /-**2%, G>D S2F: .% Q@L;2

    W:  /C=JDC;? +>;INB=CAJ 1C_

    &'()$#*'+ .KK$.#1 %5 .**$Z$ 1$0$#.* 5/ %M$ .)50$ %5#%1 .1 C5+1K'#.C'$12 FL, >G> PU:2 FDDF;;2

    "4% $0$+ '/ %M$ P92 U:2 S4Z2 @F,

    FD@L; PC'%'+Z 4'";, CD Q&$D H"."*% !"*GD, R@Q S2F: FAE, F>L PU:2 FDDE;;2 &'()$#*'+ :5$1 +5%

    .**$Z$ $+54ZM /.C%4.* 14KK5#% %5 1M5Y $'%M$# .+ .Z#$$($+% )$%Y$$+ %M$ 367 9$/$+:.+%1 .+:

    .+O 5%M$# 9$/$+:.+%, 5# .C%4.* '+]4#O C.41$: )O .+O .Z#$$($+%2 3'1 C*.'(1 5/ C'0'* C5+1K'#.CO

    (41% C5+1$`4$+%*O /.'*2

    !"#$ &'()*+,*--./0*123 45+67$89 )&*( :;?-@?() A"B$ 0> 5C @-

  • 8/20/2019 ECF 58 Redacted

    42/86

     

    G@

    #`:  +>;AD@IB>;

    [5# %M$ #$.15+1 1$% /5#%M .)50$, %M$ 367 9$/$+:.+%1 #$`4$1% %M.% %M$

  • 8/20/2019 ECF 58 Redacted

    43/86

     

    "

    !"#$%& ($)$%( ($*#+$ +,!*$

    -,* $.% ($*#+$ ,- /)*01)"&

    #$%&& '()*%$+(,-

    .+/(,&(00-

    123

    45,&6, 7 8(++(/)2 99.- %& /+3-

    :%0%,;/,&23

    <

    <

    <<

    <

    <<

    <

    <

    <<

    =/2% >63 ?@"ABC1BDDEFGBHI4

    &%+1)*)$#," ,- 2)**%$$ 34 )"&%*(," #" (!55,*$ ,-

    /,$#," $, (/#(( 20 &%-%"&)"$( .!"$," 6 7#11#)/( 1158

    3,." 7,,&(8 *#+.)*& 70)$$8 )"& *,2%*$ 9!)+:%"2,((

    J- #/$$%&& I3 K,;%$26,- ;%C+/$% /2 06++6L2@

    "3  J /) /;)(&&%; &6 &M% #/$ 60 &M(2 =65$& /,; /) /, /226C(/&% /& &M% +/L 0($) 60

    8(++(/)2 7 =6,,6++N 99.- C65,2%+ 06$ :%0%,;/,&2 45,&6, 7 8(++(/)2 99.- I6M, 866;2-

    O(CM/$; 8N/&&- /,; O6*%$& P5/CQ%,*622 RC6++%C&(1%+N S&M% 478 :%0%,;/,&2T< (, &M% /*61%B

    C/U&(6,%; /C&(6,3 J 25*)(& &M(2 ;%C+/$/&(6, (, 25UU6$& 60 &M% V6&(6, &6 :(2)(22 *N &M% 478

    :%0%,;/,&23 WM(2 ;%C+/$/&(6, (2 )/;% */2%; 6, )N U%$26,/+ Q,6L+%;X%3

    F3  K&&/CM%; /2 YZM(*(& " (2 / &$5% /,; C6$$%C& C6UN 60 / ;6C5)%,& U5$U6$&(,X &6 *% /

    [%*$5/$N F?- FD"" +%&&%$ 2%,& 0$6) '%1(, \%%2%- /, /&&6$,%N $%U$%2%,&(,X ]&6UWM%=M/)*%$3C6)

    RS]W=T

  • 8/20/2019 ECF 58 Redacted

    44/86

     

    F

    G3  K&&/CM%; /2 YZM(*(& F (2 / &$5% /,; C6$$%C& C6UN 60 / ;6C5)%,& U5$U6$&(,X &6 *%

    &M% [%*$5/$N FG- FD"" */$ C6)U+/(,& 0(+%; *N '%1(, \%%2%- /, /&&6$,%N $%U$%2%,&(,X ]W=- L(&M

    &M% a00(C% 60 #/$ =65,2%+- #6/$; 60 .$60%22(6,/+ O%2U6,2(*(+(&N- :(2&$(C& 60 =6+5)*(/ =65$& 60

    KUU%/+2- /X/(,2& I6M, 83 866;2- O(CM/$; 93 8N/&&- /,; O6*%$& W3 P5/CQ%,*622- $%&$(%1%; 6,

    ]%U&%)*%$ c- FD"A- 0$6) &M% 06++6L(,X L%* /;;$%22@ M&&U@bbLLL31%+1%&$%16+5&(6,352b()/X%2

    b4d8d#/$dC6)U+/(,&3U;03 J& (2 )N 5,;%$2&/,;(,X &M/& &M(2 (2 &M% 2/)% */$ C6)U+/(,& &M/& (2

    $%0%$%,C%; (, &M% =6)U+/(,& 6, U/X% GG- U/$/X$/UM cA3

    c3  K&&/CM%; /2 YZM(*(& G (2 / &$5% /,; C6$$%C& C6UN 60 %ZC%$U&2 0$6) *6&M .+/(,&(00f2

    =6)U+/(,& (, &M(2 C/2% /,; YZM(*(& F3

    J ;%C+/$% 5,;%$ U%,/+&N 60 U%$_5$N &M/& &M% 06$%X6(,X (2 &$5% /,; C6$$%C& &6 &M% *%2& 60 )N

    Q,6L+%;X%- (,06$)/&(6,- /,; *%+(%03

    :/&%;@ ]%U&%)*%$ c- FD"A O%2U%C&05++N 25*)(&&%;-

    b2b #/$$%&& I3 K,;%$26,

    #/$$%&& I3 K,;%$26, R#/$ >63 "GgDD<

    8J99JKV]

    7 =

    a>>a99h99.EFA WL%+0&M ]&$%%&- >383

    8/2M(,X&6,- := FDDDAW%+%UM6,%@ RFDF< cGcBA"Dc

    [/C2()(+%@ RFDF< c?DB?FAG

    YBV/(+@ */,;%$26,iLC3C6)

    !"#$ &'()*+,*--./0*123 45+67$89 )&*/ :;?-@?() A"B$ / 5C /

  • 8/20/2019 ECF 58 Redacted

    45/86

     

    "#$%&%' (

    !"#$ &'()*+,*--./0*123 45+67$89 )&*0 :;?-@?() A"B$ ( 5C D

  • 8/20/2019 ECF 58 Redacted

    46/86

    StopTheChamber.comPO BOX 9576

    Washington, D.C. 20016

    [email protected]

    February 28, 2011 

    Walfrido Martinez

    Managing Partner

    !"#$%# ' ()**)+,- ../

    0122 3 4$566$7 8(

    (+-9)#:$%#7 ;< =222> 

    Re: Document Hold Request for Potential Litigation In The Matter Of Hunton &Williams/Themis/Chamber of Commerce Dirty Tricks Campaign

    Dear Mr. Martinez:

    This memorandum is to inform you about potential litigation in connection with the

    Hunton & Williams/Themis/Chamber of Commerce dirty tricks campaign recently

    exposed through the release of tens of thousands of emails on the Internet. Because ofyour company’s alleged involvement in circumstances that gave rise to this potential

    litigation, I remind you of your legal obligation to preserve all documents that relate in

    any way to this matter.

    You have a duty to preserve evidence relevant to this action, even without a court order.

    And because electronic data may be an irreplaceable source of discovery in this matter, itis your duty to preserve all potentially relevant electronic data. Furthermore, it is your

    duty to insure that a proper litigation notification is issued, and a litigation hold

    implemented. Consistent with that duty, we request that your data be preserved andmaintained – in native format, and in accordance with the following safeguards:

    I recommend that you take the following four steps to ensure that all data, including

    electronic data, is preserved:

    First, you should agree on one person to take the lead in preserving all information

    potentially relevant to this matter. This person should ensure that these steps are taken intheir entirety, and that steps are not accidentally skipped because you both assume that

    the other is taking care of it.

    Second, you should contact former employees or suspended employees to ensure that

    they understand the importance of preserving all potentially relevant evidence.

    Third, you should develop a strategy for preserving all electronic data in your possession.

    !"#$ &'()*+,*--./0*123 45+67$89 )&*0 :;?-@?() A"B$ / 5C D

  • 8/20/2019 ECF 58 Redacted

    47/86

    Fourth, if you automatically dispose of or recycle digital or paper files, digital back-up

    tapes, optical diskettes, or other storage media (possibly pursuant to a document retentionpolicy), you should suspend such programs related to documents in this matter.

    Fifth, if your document retention policy previously resulted in the destruction of

    electronically stored information that can still be reasonably recovered, please recoverthis information immediately.

    1. ELECTRONIC DATA TO BE PRESERVED:

    The following types of electronic data and/or the electronic data of your subsidiaries,divisions, agents, employees and relevant third-parties, vendors or contractors should be

    preserved in native format, in accordance with the steps set forth below:

    *All electronic mail and information about electronic mail (including message contents,header and logs of e-mail system usage) sent or received by any custodian relating to the

    subject matter of the litigation;

     All databases, including field and structural information as well as records, containing

    any information relating to the subject matter of the litigation;

     All logs of activity on any computer systems that have been used to process or store

    data containing information relating to the subject matter of the litigation;

    * All other electronic data containing information about, or relating to, the subject matter

    of the litigation, including but not limited to:

    All word processing files and file fragments;

    Electronic data created by applications which process financial, accounting and billing

    information;

    All electronic calendar and scheduling program files and file fragments;

    All electronic spreadsheet files and file fragments.

    2. ON-LINE DATA STORAGE

    With regard to online storage and/or direct access storage devices, including, but not

    limited to, any file server or data array (e.g. RAID, rootkit) physically or remotely

    attached to your client's computers through wired or wireless networking, we request thatyour client not modify or delete any existing electronic data files that meet the criteria set

    forth above, unless an exact mirror image has been made and will be preserved and kept

    accessible for purposes of this litigation.

    !"#$ &'()*+,*--./0*123 45+67$89 )&*0 :;?-@?() A"B$ 0 5C D

  • 8/20/2019 ECF 58 Redacted

    48/86

     

    3. OFF-LINE DATA STORAGE, BACKUPS AND ARCHIVES

    With regard to all electronic media used for offline storage, such as magnetic tapes and

    cartridges, CDs, DVDs, USB devices (e.g. ‘thumb drives’), hard drives and the like, usedwith any computer, file server or data array (e.g. RAID), whether physically or remotely

    attached to your client's computers through wired or wireless access that contain anyelectronic information relating to the subject matter of this litigation, we request that your

    client stop any activity that may result in the loss of such data. This request is intended to

    cover all removable electronic media used for data storage in any device, including thosecontaining backup and/or archive data sets.

    4. PRESERVATION OF REPLACED DATA STORAGE DEVICES

    We request that your client preserve any electronic data storage devices and/or media thatmay contain data relating to the subject matter of the potential litigation.

    5. FIXED DRIVES ON STAND-ALONE PERSONAL COMPUTERS AND

    NETWORK WORKSTATIONS 

    We request that your client not alter, delete or over-write relevant electronic data that

    existed on fixed drives attached to stand-alone microcomputers, network workstationsand/or data arrays (e.g. RAID) at the time of filing of this action, or perform other

    procedures such as data compression and disk defragmentation or optimization routines

    that may impact such data, unless an exact mirror image has been made of such activefiles and directory listings (including hidden and/or deleted files) for all directories

    containing such files and that it completely restore any altered, deleted or over-written

    electronic files and file fragments and arrange to preserve all such data during thependency of this litigation.

    6. APPLICATIONS AND UTILITIES

    We request that your client preserve copies of all applications and utilities that may be

    used to process electronic data discussed in this letter.

    7. LOG OF SYSTEM MODIFICATIONS

    We request that your client maintain an activity log of document modifications made toany electronic data processing system that may affect any system's capability to process

    any electronic data relating to the subject matter of the litigation.

    8. PERSONAL COMPUTERS AND ALL OTHER DEVICES USED BY

    EMPLOYEES, INDEPENDENT CONTRACTORS AND OTHERS UNDER THE

    !"#$ &'()*+,*--./0*123 45+67$89 )&*0 :;?-@?() A"B$ @ 5C D

  • 8/20/2019 ECF 58 Redacted

    49/86

    CONTROL OF YOUR CLIENT

    Please immediately take the following steps with regard to all fixed drives attached

    internally, externally, physically and/or remotely by wired or wireless access to any

    personal computers used by any custodian under your client's control:

    An exact mirror image must be made of all electronic data relating to the subject matter

    of the litigation;

     Full directory listings (including hidden and deleted files) for all directories and

    subdirectories must be written;

    Please immediately take the following steps with regard to all removable drives attachedinternally, externally, physically and/or remotely by wired or wireless access to any

    personal computers used by any custodian under your client's control:

     All removable electronic media, such as floppy diskettes, magnetic tapes and cartridges,

    CDs, DVDs, USB devices (e.g. ‘thumb drives’) and the like that existed before the

    delivery of this letter and that contain relevant data should collected, maintained intactand kept available during the pendency of this litigation.

    Please immediately take the following steps with regard to all other relevant devices used

    by any custodian under your client's control, whether it is internally, externally,physically and/or remotely attached by wired or wireless access to any system used by

    your client:

    All cellular phones, personal data assistants (e.g. Blackberry), voicemail messages, text

    messages (SMS or otherwise), instant messages and/or any other device that stores

    electronic information (e.g. RAM on printing devices or FAX machines) and the like that

    existed before the delivery of this letter and that contain relevant data should collected,maintained intact and kept available during the pendency of this litigation.

    9. EVIDENCE CREATED AFTER RECEIPT OF THIS LETTER

    Any relevant electronic data created after receipt of this letter should be preserved in a

    manner consistent with the directions in this letter.

    10. METADATA

    As it is relevant to all items cited hereinabove, your client is instructed to preserve all

    metadata and not to alter, delete and/or over-write any metadata.

    11. OTHER DATA

    !"#$ &'()*+,*--./0*123 45+67$89 )&*0 :;?-@?() A"B$ ) 5C D

  • 8/20/2019 ECF 58 Redacted

    50/86

    There may be other categories of documents relevant to this issue. If you are unsure

    about the relevance of a document, be cautious and preserve it. Please do not discard anydocuments including email, Word documents, Excel documents, slide shows,

    photographs, videos, surveillance logs, surveillance reports and other data in any form

    relating to these topics or any other aspect of this matter. This request applies to

    documents now in your possession, as well as those you create or receive subsequent tothis memorandum. Your obligation at this time is to identify and preserve relevant

    documents.

    12. ERR OF THE SIDE OF RETAINING DOCUMENTS

    We understand that these categories of information are broad; however, we do not

    know at this time which specific documents or categories of documents may be

    requested in the future. As a result, you must ensure that all documents of

    potential relevance are preserved. If you are not sure whether particular documents orrecords should be retained, please err on the side of caution; you must not destroy,

    discard, or delete those documents.

    Please feel free to contact me to discuss any aspect of this letter.

    !"#$ &'()*+,*--./0*123 45+67$89 )&*0 :;?-@?() A"B$ D 5C D

  • 8/20/2019 ECF 58 Redacted

    51/86

     

    "#$%&%' (

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ ( 5C ()

  • 8/20/2019 ECF 58 Redacted

    52/86

    StopTheChamber.comPO BOX 9576

    Washington, D.C. [email protected] 

    February 23, 2011

    Office of Bar Counsel

    Board on Professional ResponsibilityDistrict of Columbia Court of Appeals515 5th Street NWBuilding A, Suite 117Washington, DC 20001

    Re: John W. Woods, Richard L. Wyatt Jr., and Robert T. Quackenboss

    NOTICE OF COMPLAINT 

    I, Kevin Zeese Esquire, pursuant to Rule 8.3(b)—Reporting Professional Misconduct,on behalf of StopTheChamber.com and VelvetRevolution.us, NGOs dedicated tocorporate and government transparency and accountability, herein lodge a disciplinarycomplaint against John W. Woods, Richard L. Wyatt Jr., and Robert T. Quackenboss,1900 K Street, NW Washington, DC 20006. We ask the Board on Professional Responsibility, District of Columbia Court of Appeals to take immediate disciplinaryaction, including disbarment, against them for violations of the D.C. Rules ofProfessional Conduct .

    SUMMARY OF THE COMPLAINT

    John W. Woods, Richard L. Wyatt Jr., and Robert T. Quackenboss are members of theDistrict of Columbia Bar and employed by the firm, Hunton & Williams (“H&W”) in itsWashington, D.C office. These lawyers, on behalf of their client, the United StatesChamber of Commerce (“COC”), engaged, as the evidence below demonstrates, in anextended pattern of unethical behavior that included likely criminal conduct. Specifically,they solicited, conspired with and counseled three of its investigative private securityfirms to engage in domestic spying, fraud, forgery, extortion, cyber stalking, defamation,harassment, destruction of property, spear phishing, destruction of property, identitytheft, computer scraping, cyber attacks, interference with business, civil rights violations,harassment, and theft.

    In short, this unethical and criminal conduct involves “dishonesty, fraud, deceit, ormisrepresentation” which violates the Rules of Professional Conduct, and underminesthe rule of law, respect for the law and confidence in the law. Incredibly, as this conduct

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ / 5C ()

  • 8/20/2019 ECF 58 Redacted

    53/86

    occurred from November 2010 through February 2011, in dozens of calls, emails,proposals, meetings and conferences, none of the H&W lawyers ever expressed anyreservation or doubt about the unethical conduct proposed and committed by theirinvestigators. In fact, they actively solicited and approved everything that was proposedand presented. This, despite the fact that attorney John Woods had published an article in

    the February 2010 issue of Data Protection Law and Policy, titled “Social Networkingand the e-Discovery Process,” which stated that conduct such as that committed by theH&W investigators would “amount to misconduct under Rule 8.4 prohibiting‘dishonesty, fraud, deceit or misrepresentation.” Exhibit A, p. 2.http://www.velvetrevolution.us/images/H_WWoods_Social_Networking_Article.pdf  

    SPECIFIC VIOLATIONS

    D.C. Rules of Professional Conduct Rule 8.4—Misconduct, states in pertinent part:“It is professional misconduct for a lawyer to:

    (a) Violate or attempt to violate the Rules of Professional Conduct, knowingly assist or

    induce another to do so, or do so through the acts of another;(b) Commit a criminal act that reflects adversely on the lawyer’s honesty,trustworthiness, or fitness as a lawyer in other respects;

    (c) Engage in conduct involving dishonesty, fraud, deceit, or misrepresentation;(d) Engage in conduct that seriously interferes with the administration of justice; ….”

    D.C. Bar Rule 1.2(e) states: "A lawyer shall not counsel a client to engage, or assist aclient, in conduct that the lawyer knows is criminal or fraudulent." The scope of this ruleis explained further: "a lawyer may not knowingly assist a client in criminal or fraudulentconduct. There is a critical distinction between presenting an analysis of legal aspects ofquestionable conduct and recommending the means by which a crime or fraud might becommitted with impunity."

    Attorneys John W. Woods, Richard L. Wyatt Jr., and Robert T. Quackenboss violated theabove four provisions and counseled and assisted their client, the U.S. Chamber ofCommerce, and their three private security contractor investigators, HBGary Inc, PalantirTechnologies and Berico Technologies, to commit criminal and fraudulent conduct. It iswell established that attorneys are accountable for the conduct of their investigators.

    STATEMENT OF THE CASE

    StopTheChamber/Velvet Revolution

    StopTheChamber.com (“STC”) is a campaign of VelvetRevolution.us (“VR”), a 501c(4)public charity since 2004 dedicated to corporate and government accountability. STCwas launched in September 2009 in order to expose unethical activity, excesses and lackof transparency of the COC. STC urged companies and members to quit the COC toprotest its potentially illegal tactics and strong-armed opposition to environmental

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ 0 5C ()

  • 8/20/2019 ECF 58 Redacted

    54/86

    protection, financial reform, health care reform, worker safety and transparency. As aresult, dozens of large companies and local Chambers of Commerce have quit the COC.

    STC also sought out whistleblowers to provide inside information about the operations ofthe COC and its CEO Tom Donohue. STC received several tips, which it turned over to

    the FBI because the conduct disclosed involved allegations criminal activity inside theCOC, including a three-page letter from a professed Chamber employee.

    During the 2010 election campaign, STC exposed apparent violations of campaignfinance law by COC, including reports of its use of illegal foreign money in elections,excessive compensation by CEO Donohue, misuse of tax-exempt status, moneylaundering, and use of the COC for the enrichment of its members. STC also reported onCOC’s partnering with American Crossroads to coordinate the spending of millions insecret money to support Republican candidates. The CEO of American Crossroads isformer COC chief counsel, Steven Law. STC’s sister organization, American CrossroadsWatch, filed complaints against American Crossroads with the FEC, IRS and DOJ

    alleging violations of the Federal Election Campaign Act, and provided direct evidenceof such violations to the FBI.

    Chamber And Hunton & Williams Dirty Tricks Campaign Against STC/VR And

    Others

    Over the past 18 months, the COC and its lawyers at H&W have responded to STC, notby having a debate in the public domain, but by intimidation and dirty tricks. When STCissued a press release about the COC in December 2009, COC/H&W responded bycontacting FOX News, which wrote an article that resulted in STC being attacked with acoordinated campaign of more than 100 threats of violence, including death threats.

    Exhibit B. Once the FBI was advised of this threat campaign, the threats stopped. H&Walso hired investigators to dig into the activities of STC and its principals, and provideddisparaging and false information to reporters at FOX News, which FOX then publishedin various articles. On May 4, 2010, H&W lawyers a wrote letter to STC’s PublicRelations Agent Ilene Proctor repeating disparaging information about STC and one itsprincipals. Exhibit C. On or about July 15, 2010, H&W wrote a letter to PR Newswiredemanding that it remove a press release sent that week and disparaging STC. PRNewswire felt so threatened by the H&W letter that it scrubbed the press release from itsInternet site.

    In October 2010, H&W lawyers asked one of its investigator/contractors, PalantirTechnologies, to help respond to a crisis facing another client, Bank of America,regarding a massive data leak to Wikileaks. On October 25, 2010, a Palantir employee,Matthew Steckman, wrote to H&W attorney John Woods (“Woods”) that he would liketo bring in two other private security companies, HBGary Federal and BericoTechnologies to help with the project. “Together, our three companies represent all facets of a complete intelligence and analysis capability. Ideally, we would like to set upa time to meet next week to brief you and Richard [H&W attorney Wyatt]….” Exhibit D.The three companies formed a team called “Themis,” named after the Greek God of law

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ : 5C ()

  • 8/20/2019 ECF 58 Redacted

    55/86

    and order. Themis created a “Corporate Information Reconnaissance Cell” proposal forH&W to present how it could target, track, and neutralize people, organizations, andcompanies as directed by H&W. Exhibit E. “Team Themis is ideally suited to provide Hunton & Williams this critical capability….” (page 2) “Team Themis will provide full production and planning support throughout the entire targeting cycle in order to ensure

    that Hunton & Williams LLP has a clear, comprehensive understanding of theintelligence picture. We will work closely with the key leaders and decision-makers from Hunton & Williams to develop production requirements that meet their diverse needs.” (page 9) “We will work closely with the key leaders from Hunton & Williams todetermine key tasks and functions and ensure that we adjust our plan based on refinedcustomer needs.” Id.

    The techniques Themis described in the proposal were previously employed against theColombian revolutionary organization FARC to track its rebels, and against violators ofthe trade ban with Iran as part of contracts with U.S. Government agencies, such as theDepartment of Defense and the FBI.

    At a meeting in early November 2010, the H&W attorneys asked team Themis if it coulduse the same Themis techniques and technology against people and organizationsopposed to another of its big clients, the COC. See Exhibits JJ and KK. Woods said laterthat it was the Palantir “Iranian shipping” presentation that “sold the Chamber.” ExhibitZ. See that presentation at  http://www.youtube.com/watch?v=iqMNzcspEyM Themissaid that it could, and began preparing a massive $12 million plot to undermine STC,reporters Glenn Greenwald and Brad Friedman and others, including SEIU, Change toWin, Chamber Watch and Think Progress. Brad Friedman is also a principal of STC/VR.

    On November 9, 2010, Woods wrote an email to HBGary CEO Aaron Barr (“Barr”),

    saying “ If you really want to impress Richard, I would look at the following web-site andtell him something about the guys behind it: http://velvetrevolution.us/stop_chamber/ ”Exhibit F.

    Later that day, Barr sent Woods an email: “ John, here is what I have found today. Thereal good stuff will come once we identify all these organization fronts and then startenumerating common players, influences, distributors, etc. Velvet revolution is a networkof more than 120 progressive organizations….” Exhibit G. The email goes on to listpersonal information about the principals of VR and their family members, promising toexploit “ pressure points” of the named targets.

    In another email that day, Barr wrote to Woods: “ Also I am already starting to collectinformation, associations on: [fixtheuschamber, US Chamber Watch Facebook pages,Stop The Chamber Facebook pages, stopthechamber and velvetrevolution]….” ExhibitH.

    Barr responded with information about targets SEIU, Change To Win and ChamberWatch, concluding with: “ I will focus on VR [Velvet Revolution].” Exhibit I. In stillanother email that day, Barr told his partners: “… I got a call from John while he was in

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ ) 5C ()

  • 8/20/2019 ECF 58 Redacted

    56/86

    the meeting with Richard at about 4:30 or so. We talked through some of the data, allwent really well I think.” Exhibit J. In that email thread, Woods told Pat Ryan fromBerico that H&W had been gathering data about the Chamber opposition groups andwould provide it on a data disc. “Thanks for this, I am meeting on Tuesday with the teamat HW who has gathered the underlying data….” Id.

    On November 10, 2010, Woods wrote to Barr, “ I think we are good with Richard, let mework my end now. We may try to do a meeting with Richard on Friday – I will let youknow shortly….” Exhibit K.

    On November 11, 2010, Barr sent an email entitled “HW Meeting” with zip files of“scraped Facebook ” pages from five NGOs and one principal of STC/VR. Exhibit LL.The email also included a six-page WORD document titled “Chamber Opposition,”which listed information about NGOs, and personal information about principals andstaff of STC/VR, including their friends and family. Exhibit MM.

    On November 16, 2010, Barr wrote to his boss at HBGary, Greg Hoglund, about thecontract with H&W. “ I have been sucked up for the last, seems like almost 2 weeksworking the [H&W] law firm deal. The potential is huge for us. We are starting the pilotthis week, 50K effort. After the pilot, the end customer [COC] gets briefed. We weretalking to the senior partner of the law firm on Friday and he wants a firm fixed price bymonth for 6 months and the figure we have come to settle on is $2M per month for the 3team members. That will equal $500-$700K for HBG Federal, that’s (sic) per month.” Exhibit L.

    In another email that day, Woods responded to Pat Ryan at Berico: “Thank you. Pleasehave Danielle work with Steve Patterson on the various documents….” Exhibit M. In

    that email thread, Ryan said: “ Hi John, Just wanted to send you a quick update as we follow-up from Fri’s meeting. … The TA will include language to cover exclusivityrelated to any other corporate campaign projects. We are also putting together a briefamended proposal which will lay out tasks and deliverables for Phase I (initial analysisand products to support 23 Nov meeting with client) and Phase II (follow-on six monthsof enduring operations….” Id.

    On November 23, 2010, Themis emailed each other about a conference call to “discusshow the call with H&W should go?”  Exhibit N. In that email thread, Woods tells theteam, “Thank you for this. What I think would be very helpful is if we could set up a calllater today of tomorrow where I could have my colleague Bob Quackenboss talk throughwith some folks on your team what tasks members of the team would actually be performing….”  Id.

    On November 29, 2010, Sam Kremin from Berico wrote to Barr: “ … Also, when I givethese to Bob, I will emphasize that these are just examples to give to him an idea of whathe is pitching to the Chamber and not at all indicative of our capabilities….” Exhibit O.In that email thread Barr proposes a dirty tricks campaign against the Chamberopposition organizations. Regarding Change to Win/ChamberWatch, Barr outlines the

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ D 5C ()

  • 8/20/2019 ECF 58 Redacted

    57/86

    “need to discredit the organization” by (1) “tying it to the unions,” (2) “creating a falsedocument and see if they pick it up,” (3) creating “a fake insider persona and startcommunications with CtW. At the right point release the actual documents and paint thisas an (sic) CtW contrived operation. They can’t be trusted to stick to the truth, etc.,” (4)connecting CtW “to velvet revolution and their radical tactics,” (5) creating “two fake

    insider personas using one to discredit the other giving the second immediatelegitimacy.” Regarding VR, Barr says , (1) “Attack [one of the VR principals] and after aseries of attacks on his person start making ties to the back office folks … discreditingthem by association. Done in the right way this can cause them to distance themselvesand also funders from [the principal].” (2) “Attack their antics as self-serving andchildish.” (3) “[c]reate some [false] information and get them to run with it.” Id.

    On December 1, 2010, Sam Kremin from Berico wrote to Woods and Quackenboss:“John and Bob, Attached are the example reports that you request to give you a betteridea of what we will be producing….” Exhibit P. Attached to that email were fourdocuments: (1) H&W Information Operations Recommendation with a list of dirty tricks

    to be used against Chamber opposition organizations, Exhibit Q; (2) H&WOrganizational Assessment about Chamber Watch. Exhibit R; (3) Significant ActivityReport about a “Protest near US Chamber of Commerce Building on October 7, 2010”Exhibit S; and (4) H&W Team Themis Slides, which is a series of eight color slidesidentifying the targets of Themis in a military/intelligence style presentation withdifferent tiers and a “Priority Intelligence Requirement.” Exhibit T.

    On December 3, 2010, Palantir staffer Matthew Steckman wrote Woods: “Updated withStrengths/Weaknesses and a spotlight on [reporter/lawyer] Glenn Greenwald….” ExhibitU. In that email thread, Barr said: “ I think we need to highlight people like GlennGreenwald. Glenn was critical in the Amazon to OVH transition and helped wikileaks provide access to information during the transition. It is this level of support we need toattack. These are established proffessionals (sic) that have a liberal bent, but ultimatelymost of them if pushed will choose professional preservation over cause, such is thementality of most business professionals. Without the support of people like Glennwikileaks would fold.” And Steckman wrote: “ Here is the collated first cut to brief Johnwith at 9. I am going to send this to him at 8:15….”

    On December 10, 2010, Sam Kemin wrote Barr an email titled, “Ingesting FB Friendsdata,” about scraping Facebook friends and placing that data in spreadsheets. ExhibitNN.

    On January 14, 2011, Ted Vera from HBGary confirmed that H&W agreed to the Themisproposal “50K to start – for a 30-day pilot project.”  Exhibit V. In that email thread, Barrsaid; “ Lawfirm IO work is finally worked out….” Sam Kremin said: “ Exciting news.We’ve received the data from H&W and it is a 189kb xml document. Ryan … could youintegrate it into Palantir? Regarding the contract, Bob is really busy for the rest of thisweek, so we will meet to take care of that and receive his guidance and vision for the project sometime early next week. It would be great if we could get this data and theinstance ready as soon as possible so we can start putting together products that will

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ . 5C ()

  • 8/20/2019 ECF 58 Redacted

    58/86

    blow them away.” Kremin also said: “This afternoon an (sic) H&W courier is bringingover a CD with the data from H&W from phase 1. We are assuming that this means that phase 1 is a go….” Id. 

    On January 19, 2011, Barr and HBGary staffer Mark Trynor discussed the “scraping”

    Facebook pages and data, including that of a principal of VR/STC. Exhibit W.

    In another email that day, Barr, Trynor and Ted Vera discuss technical aspects ofscraping VR’s Facebook and social networking pages and specifically mention a VRprincipal’s pre-teen daughter and the school she attends. Exhibit X.

    On January 26, 2011, Woods emailed Barr about using Themis for a client workingthrough another law firm, Booz Allen. Exhibit Y.

    On February 3, 2011, Barr wrote to other Themis members that he had talked withQuackenboss “ref our H&W support to the Chamber ….” He said that H&W wanted

    Themis to create a Phase 1 demo “and then present jointly with H&W to theChamber ….” Specifically, Barr suggested creating a “5-10 min demo (along the lines ofthe Iranian shipping demo – which is what Bob Q said sold the Chamber in the first place….)… Bob apologized for the confusion/misunderstanding and said he thinks thereis a high likelihood of selling the Chamber on this, but asked that we be willing to sharethe risk with H&W up-front. …. Please let me know where you … stand on this so I canget back to Bob ASAP and coordinate the next steps. …” Exhibit Z.

    The Themis Dirty Tricks Campaign Is Exposed

    On February 4, 2011, Barr gave an interview to the Financial Times in which he stated

    that he had identified the leaders of the Anonymous network, a group of hackers thathave supported Wikileaks and other freedom causes around the world. Barr indicatedthat he used techniques similar to those developed by Themis to gather this information.Exhibit AA. Joseph Menn, “Cyber Activists Warned Of Arrest ,” Financial Times,February 4, 2011 http://www.ft.com/cms/s/0/87dc140e-3099-11e0-9de3-00144feabdc0.html#axzz1EkOO41O2 

    In response, within two days, Anonymous seized control of HBGary’s website, defacedits pages, extracted more than 70,000 company e-mails, deleted backup files, seizedBarr's Twitter account, and took down the founder's website rootkit.com. It then postedall those emails in a searchable form on the Internet. Exhibit BB. “Anonymous HackersAttack US Security Firm HBGary,” BBC Technology News, February 7, 2011http://www.bbc.co.uk/news/technology-12380987 

    The released emails created a frenzy of media coverage in major publications such as the New York Times, Washington Post, LA Times, Forbes, and NPR, in tech publications suchas Ars Technica, Wired, Tech News, The Tech Herald and The Hacker News, in legalpublications such as Law Tech News, Corporate Counsel, Legal Times and National Law Journal, and in independent media such as Think Progress, The Brad Blog, Salon and 

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ & 5C ()

  • 8/20/2019 ECF 58 Redacted

    59/86

    FireDogLake.  With each new revelation, reporters noted the breathtaking scope of thedirty tricks campaign, and the long list of crimes involved. Quotes from a few of thearticles are set forth below.

    •  “It proposed services to clients like a law firm working with Bank of America and

    the U.S. Chamber of Commerce that included cyber attacks and misinformationcampaigns, phishing emails and fake social networking profiles, pressuring journalists and intimidating the financial donors to clients’ enemies includingWikiLeaks, unions and non-profits that opposed the Chamber.” Andy Greenberg,“HBGary Execs Run For Cover As Hacking Scandal Escalates,” Forbes, February15, 2011. Exhibit CC. http://blogs.forbes.com/andygreenberg/2011/02/15/hbgary-execs-run-for-cover-as-hacking-scandal-escalates/  

    •  “One of the files in those emails was a PowerPoint presentation that described‘the WikiLeaks Threat,’ created by a group of three security firms that suggested Nixonesque tactics for sabotaging the site on behalf of Bank of America,

    including spreading misinformation, launching cyber attacks against the site, and pressuring journalists.” Andy Greenberg, “HBGary CEO Also SuggestedTracking, Intimidating WikiLeaks’ Donors,” Forbes Feb. 14 2011. Exhibit DD.http://blogs.forbes.com/andygreenberg/2011/02/14/hbgary-ceo-also-suggested-tracking-intimidating-wikileaks-donors/  

    •  “What is set forth in these proposals for Bank of America quite possiblyconstitutes serious crimes. Manufacturing and submitting fake documents withthe intent they be published likely constitutes forgery and fraud. Threatening thecareers of journalists and activists in order to force them to be silent is possiblyextortion and, depending on the specific means to be used, constitutes other

    crimes as well. Attacking WikiLeaks' computer infrastructure in an attempt tocompromise their sources undoubtedly violates numerous cyber laws.” GlennGreenwald, “The Leaked Campaign to Attack WikiLeaks and Its Supporters,” Salon, February 11, 2011. Exhibit EE.http://www.salon.com/news/opinion/glenn_greenwald/2011/02/11/campaigns 

    •  “For those new to the story, it involves email revelations that the U.S. Chamberof Commerce, the nation's largest corporate lobbying firm, was working with thelaw firm Hunton & Williams (H&W), to develop a scheme with three well-connected, government-contracted cyber-security/intelligence firms (HBGaryFederal, Berico Technologies and Palantir Technologies --- calling themselves

    ‘Team Themis’ collectively) to use nefarious and likely illegal schemes in hopes ofdiscrediting VR, myself and other progressive citizens, journalists andorganizations who had opposed the Chamber's extremist corporate agenda.” Brad Friedman, “U.S. Chamber Plot Update: Malware, Fake Personas,Government Contracts, Public Shame, Bar Complaints, Media Failures and OtherNews,” The Brad Blog, February 18, 2011 Exhibit FF.http://www.bradblog.com/?p=8363 

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ ? 5C ()

  • 8/20/2019 ECF 58 Redacted

    60/86

    •  “Last Thursday, ThinkProgress revealed that lawyers representing the U.S.Chamber of Commerce, one of the most powerful trade associations for largecorporations like ExxonMobil and CitiGroup, had solicited a proposal from a setof military contractors to develop a surreptitious campaign to attack theChamber’s political opponents, including ThinkProgress, the Change to Win

    labor coalition, SEIU, StopTheChamber.com, MoveOn.org, U.S. Chamber Watchand others. The lawyers from the Chamber’s longtime law firm Hunton andWilliams had been compiling their own data set on some of these targets. However, the lawyers sought the military contractors for assistance.

     As ThinkProgress has reported, the proposals — created by military contractorsPalantir, Berico Technologies, and HBGary Federal, collectively known as ‘TeamThemis’ — were discussed at length with the Chamber’s lawyers over the courseof several months starting in October of 2010. The core proposals called forsnooping on the families of progressive activists, creating phony identities to penetrate progressive organizations, creating bots to ‘scrape’ social media for

    information, and submitting fake documents to Chamber opponents as a false flagtrick to discredit progressive organizations.” Lee Fang, “ChamberLeaks: PlanSolicited By Chamber Lawyers Included Malware Hacking Of ActivistComputers,” Think Progress, February 17, 2011. Exhibit GG.http://thinkprogress.org/2011/02/17/chamberleaks-malware-hacking/  

    VIOLATIONS OF D.C. RULES OF PROFESSIONAL CONDUCT

    H&W lawyers, Richard Wyatt, John Woods and Robert Quackenboss, violated the D.C.Rules of Professional Conduct by counseling, assisting, advising, and conspiring withThemis to engage in unethical and criminal conduct on behalf of H&W client, theChamber of Commerce. The evidence also shows that these lawyers, on behalf of Bankof America, violated the rules regarding their planned attack on Wikileaks, Anonymousand Glenn Greenwald, using similar dirty tricks. Although this complaint covers all thesecriminal violations as they relate to all the victims of this unethical dirty tricks plot, itsmain focus is on the conduct of the three H&W lawyers as it relates to STC and VR.

    H&W lawyers knew of and participated in the following crimes and torts with Themis,and they never advised Themis to not to commit them. In fact, they did just the oppositeby soliciting the conduct and conspiring to engage in the conduct. Many of these crimesare considered “Cyber Crimes,” and are proscribed by a variety of federal statutes. TheDepartment of Justice has published a manual called “Prosecuting Computer Crimes,”listing a dozen statutes applicable to the likely crimes committed and planned by Themisand H&W. See http://www.justice.gov/criminal/cybercrime/ccmanual/ccmanual.pdf .The manual’s appendix listing a litany of computer crimes is attached as Exhibit II. Thecrimes and torts committed by H&W/Themis include:

    •  Creating forged documents

    •  Defamation

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ (- 5C ()

  • 8/20/2019 ECF 58 Redacted

    61/86

    •  Cyber stalking

    •  Spear phishing

    •  Violation of privacy

    •  Fraud

    •  Extortion

    • 

    Harassment•  Destruction of property

    •  Domestic spying

    •  Scraping of computer data

    •  Identity Theft

    •  Cyber attacks

    •  Interference with business

    •  Civil rights violations

    •  Conspiracy

    1. 

    Forgery and Fraud: Themis planned to create forged documents with the intentthat they be distributed and relied on by NGOs for the sole purpose of discreditingthe NGOs and reporters. See Exhibits O, P, Q, T. Forgery and fraud are seriouscrimes under both federal and state law, and the same crime that resulted in theprosecution of Donald Segretti of Watergate infamy for forging documents todiscredit Edmund Muskie.

    2.  Defamation: Themis planned to defame the reporters and principals of the NGOs,and quite possibly their families and staff in order to harm their reputation. SeeExhibits O, P, Q, T. This constitutes an intentional tort under state law and isactionable in state and federal court.

    3.  Cyber stalking and Harassment: Themis not only planned but in fact begancyber stalking the principals, family, friends and members of the reporters andNGOs in order to intimidate them. See Exhibits H, P-U, FF. Cyber stalking,including when done anonymously, is a federal crime under both 18 U.S.C. § 875and 47 U.S.C. § 223(h)(1)(C) and is a state crime in many jurisdictions. Otherpossible statutes violated are 47 U.S.C. § 223(a)(1)(C) (anonymously using acomputer to threaten or harass a person); 18 U.S.C. § 2261A (using a computer ininterstate commerce to engage in a course of conduct that places a person in fearof death or injury, including spouse and immediate family).

    4.  Violation of Privacy: Themis planned and did invade the privacy of reporters,and the principals of NGOs and their families and friends. See Exhibits W, X,MM. They scraped vast amounts of data from social networking sites -- inapparent violation of their Terms of Service -- identifying one principal’s pre-teendaughter and the school she attends, another principal’s “life partner” and sister,and then using that information to create reports on home addresses, dates ofbirth, and identifying staff of an NGO, including wives, sisters and children.Invasion of privacy is an intentional tort.

    5.  Spear phishing: Themis planned to spy on the computers belonging to NGOs andreporters through the implantation of illegal software programs that would open a

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ (( 5C ()

  • 8/20/2019 ECF 58 Redacted

    62/86

    back door access to those computers. See Exhibit CC, GG. This is an illegal formof hacking prohibited by the federal Computer Fraud and Abuse Act, 18 U.S.C. §1030.

    6.  Extortion: Themis planned to use extortionate tactics against reporter GlennGreenwald and presumably others by uncovering information about weaknesses

    and using that information to “pressure” him, and others, to modify their positionsor face ruin. See Exhibit O, U, GG. Extortion is a serious crime under bothfederal and state law. See e.g., 18 U.S.C. §§ 875–877, which prohibits using themail to transmit in interstate commerce certain threats with the intent to extort,including threats to accuse of a crime or to injure person, property, or reputation.See also, 18 U.S.C. § 1030(A)(7) (transmitting and communication with intent athreat to cause damage).

    7.  Destruction of Property and Cyber Attacks: Themis planned to use viruses andmalware to destroy the computers and data of NGOs and even engage in denial ofservice attacks against them. See Exhibits FF, GG. This violates 18 U.S.C. §1030(a)(5)(A) (transmission of a program, information, code, or command,

    resulting in damage) as well as many state statutes.8. 

    Theft, Identity Theft, and Internet Scraping: Themis planned and in factengaged in theft, identity theft, violation of the Digital Millennium Copyright Act,copyright infringement, and illegal scraping of NGO websites and socialnetworking sites. See Exhibits H, O, W, X, FF, GG. This violates 17 U.S.C. §(DMCA), 17 U.S.C. § 506 and 18 U.S.C. § 2319 (criminal copyrightinfringement), 18 U.S.C. § 1028 (identity theft) and 18 U.S.C. § (wire fraud).Moreover, Facebook and LinkedIn specifically prohibit the use of softwareprograms to harvest information from their sites.https://www.facebook.com/terms.php (“You will not collect users’ content orinformation, or otherwise access Facebook, using automated means such asharvesting bots, robots, spiders, or scrapers without our permission.”)http://www.linkedin.com/static?key=user_agreement (prohibits “manual orautomated software, devices, scripts robots, other means or processes to access,“scrape,” “crawl” or “spider” any web pages or other services contained in thesite” or to “[c]ollect, use or transfer any information, including but not limited to,personally identifiable information obtained from LinkedIn except as expresslypermitted in this Agreement or as the owner of such information may expresslypermit.”).

    9.  Spying and Interception of Electronic Communications: Themis planned touse invasive cyber attacks to spy on NGOs and their staff and intercept electroniccommunications, and stored communications by accessing their personal andwork computers. See Exhibits H, P-U, FF, CC, GG. This violates 18 U.S.C. §2511 (intercepting electronic communications), 18 U.S.C. § 2701 (accessingstored communications), and 18 U.S.C. § 1030(a)(2) (accessing a computer andobtaining information).

    10. Interference with Business: Themis planned to use deceptive means to ruinNGOs and undermine their funding. See Exhibit O, CC, DD, FF, GG.Interference with business and contracts is an intentional tort actionable in stateand federal court.

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ (/ 5C ()

  • 8/20/2019 ECF 58 Redacted

    63/86

    11. Civil Rights Violations: H&W targeted NGOs and reporters for engaging inactivities protected by the First Amendment, including the right to free speech,peaceful assembly, and petitioning the government for redress of grievances. SeeExhibits O, CC, DD. Three private security contractors that received federalfunding -Themis - were used by H&W to target the NGOs and reporters. Themis

    members used a portion of their federal funding to create the programs that wereemployed against NGOs and reporters. Themis used federal funding to create itsPhase I pilot program for the COC, Bank of America and H&W. Because of thisnexus to federal funds, Themis and H&W violated the civil rights of STC, VR andothers as proscribed by 18 U.S.C. § 241 (conspiracy against rights) and § 242(deprivation of rights under color of law).

    12. Conspiracy: The lawyers of H&W conspired with members of the Themis teamto violate all of the above statutes. Therefore, they are subject to prosecutionunder the general conspiracy statute, 18 U.S.C. § 371. 

    CONCLUSION

    Richard Wyatt, John Woods, and Robert Quackenboss conspired with Themis to commitcriminal acts, intentional torts and use “dishonesty, fraud, deceit, or misrepresentation”in their campaigns against STC/VR and others. In fact, the proposals they solicited andreceived discuss the use of “false documents,” “fake personas,” “false information,” andusing created “attacks” to “discredit” NGOs and reporters. Exhibits O and Q. Therefore,they are guilty of violating the D.C. Rules of Professional Misconduct. Incredibly, H&Wattorney John Woods, a self professed expert in computer crimes, himself wrote just lastyear in an article entitled, “Social Networking Sites And The e-Discovery Process,”

    http://www.velvetrevolution.us/images/H_WWoods_Social_Networking_Article.pdf  that one type of conduct he engaged in with Themis constitutes a violation ofDisciplinary Rule 8.4.

    “Noting that lawyers are accountable for the behavior of their investigators, theCommittee found that the ‘friending’ action proposed would amount tomisconduct under Rule 8.4 prohibiting ‘dishonesty, fraud, deceit ormisrepresentation’. Therefore, ‘friending’ the witness on a social networking sitewithout revealing that the purpose of the contact was to gain access to therestricted section of her profile constituted an act of ‘deception’ under the ethicalrules. After reviewing the conflicting views of other State Bars on covertinvestigation by the legal profession, the Committee decided to refuse toacknowledge an exception as found in New York and other states ethics opinionsand court decisions. Parties can also go too far when searching for ‘evidence’ onsocial networking sites. In the District of New Jersey case of Pietrylo v Hillstone Restaurant Group, a restaurant employee formed a by invitation-only discussiongroup called Spec-Tator on his MySpace page, intending it to be a space whereother restaurant employees could negatively comment about their jobs. Onemember of Spec-Tator later provided uninvited members of the restaurant

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ (0 5C ()

  • 8/20/2019 ECF 58 Redacted

    64/86

    management with her access information. The management viewed thediscussion group page and fired a number of employees as a result ofinformation posted on Spec-Tator. Two of the terminated employees filed alawsuit, claiming invasion of privacy.

     Although the jury found that the plaintiffs did not have a reasonable expectationof privacy in the online group, the defendants were found to be in violation of the federal and state versions of the Stored Communications Act – 18 USC §§2701-11and N.J.S.A2A:156A-27 - which make it an offense to access storedcommunications intentionally without authorization or in excess of authorization.The jury found that the employee who provided access to management had feltcoerced, and so the access was not authorized. The jury subsequently awarded the plaintiffs $17,000 in compensatory and punitive damages.” Exhibit A.

    But, as detailed above, Woods and his colleagues at H&W engaged in conduct much

    more serious than mere deceitful Facebook friending. They engaged in criminal activity.

    Reporter and attorney Glenn Greenwald excoriated H&W and attorney John Woods fortheir unethical conduct as detailed herein:

    “But the real party here which deserves much more scrutiny is Hunton& Williams -- one of the most well-connected legal and lobbying firms in DC --and its partner John Woods. Using teams of people scouring all the availableemails, FDL has done its typically thorough job of setting forth all the key factsand the key players -- including from Booz Allen -- and Woods is at the center ofall of it: the key cog acting on behalf of the Bank of America and theChamber. It's Woods who is soliciting these firms to submit these proposals, pursuant to work for the Chamber and the Bank; according to Palantir emails, H&W was recommended to the Bank by the Justice Department to coordinate theanti-WikiLeaks work.

    For a lawyer to be at the center of an odious and quite possibly illegal scheme totarget progressive activists and their families, threaten the careers of journalistsas a means of silencing them, and fabricate forged documents intended for publicconsumption -- and then steadfastly refuse to comment -- is just inexcusable.Perhaps some polite email and telephone encouragement from the public isneeded for Woods to account for what he and his firm have done. In exchange forthe privileges lawyers receive (including the exclusive right to furnish legaladvice, represent others, and act as officers of the court), members of the Barhave particular ethical obligations to the public. At the very least, the spirit -- ifnot the letter -- of those obligations is being seriously breached by a lawyer whoappears to be at the center of these kinds of pernicious, lawless plots and thenrefuses to account to the public for what he did." Glenn Greenwald, “More FactsEmerge About The Leaked Smear Campaigns,” Salon, February 15, 2011. ExhibitHH. 

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ (: 5C ()

  • 8/20/2019 ECF 58 Redacted

    65/86

    http://www.salon.com/news/opinion/glenn_greenwald/2011/02/15/palantir 

    We urge the D.C. Board of Professional Responsibility to move quickly to disciplineRichard Wyatt, John Woods and Robert Quackenboss for their unethical and criminalconduct in this matter. We strongly urge the Board to revoke the licenses of these

    attorneys.

    !"#$ &'()*+,*--./0*123 45+67$89 )&*: ; -?@-:@() A"B$ () 5C ()

  • 8/20/2019 ECF 58 Redacted

    66/86

     

    "#$%&%' (

    !"#$ &'()*+,*--./0*123 45+67$89 )&*) :;?-@?() A"B$ ( 5C (>

  • 8/20/2019 ECF 58 Redacted

    67/86

     

    "

    !"#$%&'(") "+ ,-. !'/'0 %)1 2%& !"#$0%'),(

    !'/'0 !"#$0%'), 2%& !"#$0%'),

    #$%&%'()'*+ ,--(+. ,/)**. )'( 01)23%'4-++ )5% 6%64%5+-& *7% $8+*582* -& 9-:1648) ;)5 )'( ?, 8' 8*+ ,)+78'@*-'. $A9 BCD9E -&&82%AF

    3!'/'0 !"#$0%'), %, 45

    #G-7' ,A ,--(+. H827)5( IA ,/)** G5A. )'( H-4%5* JA01)23%'4-++ )5% 6%64%5+ -& *7% $8+*582* -& 9-:1648) ;)5)'( %6=:-/%( 4/ *7% &856. >1'*-' ? ,8::8)6+ K#>?,FL 8'8*+ ,)+78'@*-'. $A9 BCD9E -&&82%AF

    32%& !"#$0%'), %, 65

    #J7%+% :)

  • 8/20/2019 ECF 58 Redacted

    68/86

     

    U

    #J78+. (%+=8*% *7% &)2* *7)* $%&%'()'* ,--(+ 7)( =14:8+7%()' )5*82:% 8' *7% W%451)5/ UV"V 8++1% -& 5/)/  6.&)(1)#&' 7/8 /'" 6&9#1*+ *8*:%( XC-28): T%*;d)5/ D'2. R):)'*85

    J%27'-:-@8%+ )'( ;%582- J%27'-:-@8%+ K2-::%2*8O%:/ 3'-

  • 8/20/2019 ECF 58 Redacted

    69/86

     

    e

    #C*-=J7%97)64%5A2-6 K#CJ9FL 8+ ) 2)6=)8@' -&f%:O%*H%O-:1*8-'A1+ K#fHFL. ) gV"2K\L =14:82 27)58*/ +8'2%UVVg (%(82)*%( *- 2-5=-5)*% )'( @-O%5'6%'*)22-1'*)48:8*/AF

    3!'/'0 !"#$0%'), %, 6>5 

    #C*-=J7%97)64%5A2-6 K#CJ9FL 8+ ) 2)6=)8@' -&f%:O%*H%O-:1*8-'A1+ K#fHFL. ) gV"2K\L =14:82 27)58*/ +8'2%UVV\ (%(82)*%( *- 2-5=-5)*% )'( @-O%5'6%'*)22-1'*)48:8*/AF

    32%& !"#$0%'), %, 85 

    #CJ9 5 

    #CJ9

  • 8/20/2019 ECF 58 Redacted

    70/86

     

    \

    $MG )::%@8'@ O8-:)*8-'+ -& *7% W%(%5): ]:%2*8-' 9)6=)8@'^2*. )'( =5-O8(%( (85%2* %O8(%'2% -& +127 O8-:)*8-'+ *- *7%W;DAF

    3!'/'0 !"#$0%'), %, 667685 

    ]:%2*8-' 9)6=)8@' ^2*. )'( =5-O8(%( (85%2* %O8(%'2% -&+127 O8-:)*8-'+ *- *7% W;DAF

    32%& !"#$0%'), %, ?5 

    #MO%5 *7% %'+18'@ +8N /%)5+. *7% 9M9 )'( 8*+ :)?, 7)O% 5%+=-'(%( *- CJ9. '-* 4/ 7)O8'@ ) (%4)*% 8'*7% =14:82 (-6)8'. 41* 4/ 8'*868()*8-'. C%@5%**8Y*/=% (85*/*5823+. )'( 25868'): 5)23%*%%58'@ )2*8O8*/AF

    3!'/'0 !"#$0%'), %, 6?5 

    #MO%5 *7% =)+* "[ 6-'*7+. *7% 9M9 )'( 8*+ :)?, 7)O% 5%+=-'(%( *- CJ9. '-* 4/ 7)O8'@ ) (%4)*% 8'*7% =14:82 (-6)8'. 41* 4/ 8'*868()*8-' )'( (85*/ *5823+AF

    32%& !"#$0%'), %, ?5 

    #D' $%2%64%5 UVVh. ?, ):+- 785%( 8'O%+*8@)*-5+ *- (8@ 8'*- *7% =%5+-'): :8O%+-& CJ9 )'( 8*+ =58'28=):+. 8'2:1(8'@ R:)8'*8&&. )'( =5-O8(%((%&)6)*-5/ 8'&-56)*8-' *- 5%=-5*%5+ )* WMj T%?, ?, :)

  • 8/20/2019 ECF 58 Redacted

    71/86

     

    g

    M2*-4%5 Ug. UV"V. Q1+* ) ?, *- =5%+%'* *- 9M9 +7-

  • 8/20/2019 ECF 58 Redacted

    72/86

     

    p

    q"U 68::8-' =:-* *- 1'(%568'% CJ9. R:)8'*8&&. 5%=-5*%5+d:%'' d5%%';d)5/9]M ^)5-' ;)55 K#;)55FLA +)/8'@ !:- *&0 .(/99* 8/') )&#23.($$ @#1%/."+ : 8&09" 9&&B /) )%(  -&99&8#'C 8(EQ$#)( /'")(99 %#2 $&2()%#'C /E&0) )%( C0*$ E(%#'" #);%))3;TT?(9?().(?&90)#&'I0$T $)&3U1%/2E(.T4 ]N7848* WAF

    3!'/'0 !"#$0%'), %, 6=5 

    #M' T-O%64%5 h. UV"V. ,--(+ (9?() .(?&90)#&' #$ / '()8&.B &- 2&.( )%/' XYZ 3.&C.($$#?(&.C/'#W/)#&'$ IIII4 ]N7848* dA J7% %6)8: @-%+ -' *- :8+*  =%5+-'): 8'&-56)*8-' )4-1* *7% =58'28=):+ -& fH )'( *7%85&)68:/ 6%64%5+. =5-68+8'@ *- %N=:-8* [3.($$0.( 3')$\ -&*7% ')6%( *)5@%*+AF

    32%& !"#$0%'), %, 45 

    #D' )'-*7%5 %6)8: *7)* ()/. ;)55 5 

    #D' )'-*7%5 %6)8: *7)* ()/. ;)55 5 

    #;)55 5%+=-'(%( @ L>(9?() @(?&90)#&'PI4 ]N7848* DA D' +*8::)'-*7%5 %6)8: *7)* ()/. ;)55 *-:( 78+ =)5*'%5+_ ! AAA : C&) /1/99 -.&2 V&%' 8%#9( %( 8/$ #' )%( 2(()#'C 8#)% @#1%/." /)/E&0) `;aZ &. $&I O( )/9B(" )%.&0C% $&2( &- )%( "/)/+ /998(') .(/99* 8(99 : )%#'BI4  ]N7848* GA D' *7)* %6)8: *75%)(.,--(+ *-:( R)* H/)' &5-6 ;%582- *7)* >?, 7)( 4%%'

    @)*7%58'@ ()*) )4-1* *7% 97)64%5 -==-+8*8-' @5-1=+ )'(

  • 8/20/2019 ECF 58 Redacted

    73/86

     

    r

    #M' T-O%64%5 "V. UV"V. ,--(+ ,k%%*8'@Z -@:1'(. )4-1* *7% 2-'*5)2* ?,A !: %/?( E((' $01B(" 03 -&. )%( 9/$)+ $((2$ 9#B( /92&$) Y 8((B$ 8&.B#'C)%( LMNOP 9/8 -#.2 "(/9I J%( 3&)(')#/9 #$ %0C( -&. 0$I O(/.( $)/.)#'C )%( 3#9&) )%#$ 8((B+ cZd (--&.)I ]-)(. )%( 3#9&)+)%( ('" 10$)&2(. LAeAP C()$ E.#(-("I O( 8(.( )/9B#'C )&

    )%( $('#&. 3/.)'(. &- )%( 9/8 -#.2 &' _.#"/* /'" %( 8/')$ / -#.2 -#K(" 3.#1( E* 2&')% -&. f 2&')%$ /'" )%( -#C0.( 8(%/?( 1&2( )& $())9( &' #$ gYh 3(. 2&')% -&. )%( a )(/22(2E(.$I J%/) 8#99 (R0/9 gcZZQgiZZd -&. Mjk _("(./9+)%/)4$

  • 8/20/2019 ECF 58 Redacted

    74/86

     

    [

    )&2&..&8 8%(.( : 1&09" %/?( 2* 1&99(/C0( j&En0/1B('E&$$ )/9B )%.&0C% 8#)% $&2( -&9B$ &' *&0. )(/28%/) )/$B$ 2(2E(.$ &- )%( )(/2 8&09" /1)0/99* E( 3(.-&.2#'C IIII4 D(AF

    3!'/'0 !"#$0%'), %, 885 

    1&09" %/?( 2* 1&99(/C0( j&E n0/1B('E&$$ )/9B )%.&0C%8#)% $&2( -&9B$ &' *&0. )(/2 8%/) )/$B$ 2(2E(.$ &- )%()(/2 8&09" /1)0/99* E( 3(.-&.2#'C bI4  D(AF

    32%& !"#$0%'), %, 95 

    #M' T-O%64%5 Uh. UV"V. C)6 l5%68' &5-6 ;%582- @ 3.#'1#3/9$P /'" /-)(. / $(.#($ &- /))/1B$ &' %#$ 3(.$&' $)/.)2/B#'C )#($ )& )%( E/1B &--#1( -&9B$ III "#$1.("#)#'C )%(2 E*

    /$$&1#/)#&'I 5&'( #' )%( .#C%) 8/* )%#$ 1/' 1/0$( )%(2 )&"#$)/'1( )%(2$(9?($ /'" /9$& -0'"(.$ -.&2 L)%( 3.#'1#3/9PI4KUL !]))/1B )%(#. /')#1$ /$ $(9-Q$(.?#'C /'" 1%#9"#$%I4

  • 8/20/2019 ECF 58 Redacted

    75/86

     

    h

    #M' $%2%64%5 e. UV"V. R):)'*85 +*)&&%5 k)**7%< C*%236)'M )./'$#)#&' /'" %(93("8#B#9(/B$ 3.&?#"( /11($$ )& #'-&.2/)#&' "0.#'C )%()./'$#)#&'I :) #$ )%#$ 9(?(9 &- $033&.) 8( '((" )& /))/1BIJ%($( /.( ($)/E9#$%(" 3.&--($$#&'/9$ ;d)5/ 2-'&856%(*7)* >?, )@5%%( *- *7% J7%68+ =5-=-+): !cZd )& $)/.) Q -&./ aZQ"/* 3#9&) 3.&H(1)I4 ]N7848* fA D' *7)* %6)8: *75%)(.;)55 +)8(s !7/8-#.2 :e 8&.B #$ -#'/99* 8&.B(" &0) IIII4 C)6l5%68' +)8(_ !GK1#)#'C '(8$I O(F?( .(1(#?(" )%( "/)/ -.&2 MNO /'" #) #$ / XpoBE K29  "&102(')I @*/' III 1&09" *&0#')(C./)( #) #')& 6/9/')#.m @(C/."#'C )%( 1&')./1)+ j&E

    Ln0/1B('E&$$P #$ .(/99* E0$* -&. )%( .($) &- )%#$ 8((B+ $& 8( 8#99 2(() )& )/B( 1/.( &- )%/) /'" .(1(#?( %#$ C0#"/'1(/'" ?#$#&' -&. )%( 3.&H(1) $&2()#2( (/.9* '(K) 8((BI :)8&09" E( C.(/) #- 8( 1&09" C() )%#$ "/)/ /'" )%( #'$)/'1(

    .(/"* /$ $&&' /$ 3&$$#E9( $& 8( 1/' $)/.) 30))#'C )&C()%(. 3.&"01)$ )%/) 8#99 E9&8 )%(2 /8/*I4 l5%68' ):+- +)8(_ !J%#$ /-)(.'&&' /' ?, )@5%%( *- *7% J7%68+ =5-=-+): !cZd )& $)/.) Q -&./ aZQ"/* 3#9&) 3.&H(1)I4 ]N7848* fA D' *7)* %6)8: *75%)(. ;)55+)8(s !7/8-#.2 :e 8&.B #$ -#'/99* 8&.B(" &0) IIII4 C)6l5%68' +)8(_ !GK1#)#'C '(8$I O(F?( .(1(#?(" )%( "/)/ -.&2 MNO /'" #) #$ / XpoBE K29  "&102(')I @*/' III 1&09" *&0#')(C./)( #) #')& 6/9/')#.m @(C/."#'C )%( 1&')./1)+ j&E #$

    .(/99* E0$* -&. )%( .($) &- )%#$ 8((B+ $& 8( 8#99 2(() )& )/B(1/.( &- )%/) /'" .(1(#?( %#$ C0#"/'1( /'" ?#$#&' -&. )%( 3.&H(1) $&2()#2( (/.9* '(K) 8((BI :) 8&09" E( C.(/) #- 8(1&09" C() )%#$ "/)/ /'" )%( #'$)/'1( .(/"* /$ $&&' /$

     3&$$#E9( $& 8( 1/' $)/.) 30))#'C )&C()%(. 3.&"01)$ )%/) 8#99E9&8 )%(2 /8/*I4 l5%68' ):+- +)8(_ !J%#$ /-)(.'&&' /' ;d)5/ +*)&&%5 k)53J5/'-5 (8+21++%( *7% !$1./3#'C4 -& W)2%4--3 =)@%+ )'(()*). 8'2:1(8'@ *7)* -& R:)8'*8&&A ]N7848* ,AF

    3!'/'0 !"#$0%'), %, 895 

    #M' G)'1)5/ "h. UV"". ;)55 )'( >;d)5/ +*)&&%5 k)53J5/'-5 (8+21++%( *7% !$1./3#'C4 W)2%4--3 =)@%+ )'( ()*).8'2:1(8'@ *7)* -& ) =58'28=): -& fH`CJ9A ]N7848* ,AF

    32%& !"#$0%'), %, B5 

    #D' )'-*7%5 %6)8: *7)* ()/. ;)55. J5/'-5 )'( J%( f%5)(8+21++%( *%27'82): )+=%2*+ -& +25)=8'@ fHZ+ W)2%4--3 )'(+-28): '%*

  • 8/20/2019 ECF 58 Redacted

    76/86

     

    "V

    R:)8'*8&&Z+ =5%Y*%%' ()1@7*%5 )'( *7% +27--: +7% )**%'(%(A]N7848* jAF

    3!'/'0 !"#$0%'), %, 8@5 

     =58'28=):Z+ =5%Y*%%' ()1@7*%5 )'( *7% +27--: +7% )**%'(+A]N7848* jAF

    32%& !"#$0%'), %, B5 

    #M' G)'1)5/ Up. UV"". ,--(+ %6)8:%( ;)55 )4-1* 1+8'@J7%68+ &-5 ) 2:8%'* % +)8( *7)* >?,)23%5+ ^**)23 PC C%2158*/ W856 >;d)5/.F jjAJ(1%'&9&C*  l(8$+ W%451)5/ r. UV""7**=_``

  • 8/20/2019 ECF 58 Redacted

    77/86

     

    ""

    #J7% 5%:%)+%( %6)8:+ 25%)*%( ) &5%'S/ -& 6%(8) 2-O%5)@% 8'6)Q-5 =14:82)*8-'+ +127 )+ *7% l(8 q&.B J#2($+O/$%#'C)&' 6&$)+ 7] J#2($+ _&.E($+ )'( l6@+ 8' *%27 =14:82)*8-'+ +127 )+ ].$ J(1%'#1/+ O#.("+ J(1% l(8$+ J%(J(1% M(./9" )'( J%(  M/1B(. l(8$+ 8' :%@): =14:82)*8-'++127 )+ 7/8 J(1% l(8$+ A&.3&./)( A&0'$(9+ 7(C/9  J#2($)'( l/)#&'/9 7/8 V&0.'/9+ )'( 8' 8'(%=%'(%'* 6%(8) +127)+ J%#'B 6.&C.($$+ J%( j./" j9&C+ S/9&' )'( _#.(5&C7/B(I ,8*7 %)27 '%< 5%O%:)*8-'. 5%=-5*%5+ '-*%(*7% 45%)*7*)38'@ +2-=% -& *7% 8::%@): (85*/ *5823+ 2)6=)8@'.)'( *7% :-'@ :8+* -& 2586%+ 8'O-:O%(A 01-*%+ &5-6 ) &%< -&*7% )5*82:%+ )5% +%* &-5*7 4%:-)238'@ C2)'():]+2):)*%+.F _&.E($+ W%451)5/ "g. UV""A ]N7848* 99A7**=_``4:-@+A&-54%+A2-6`)'(/@5%%'4%5@`UV""`VU`"g`74@)5/Y%N%2+Y51'&-5Y2-O%5Y)+Y7)238 '@Y+2)'():Y%+2):)*%+`F

    3!'/'0 !"#$0%'), %, 8=5 

    #!:) 3.&3&$(" $(.?#1($ )& 19#(')$ 9#B( / 9/8 -#.2 8&.B#'C8#)% j/'B &- ]2(.#1/ /'" )%( ^ISI A%/2E(. &- A&22(.1()%/) #'190"(" 1*E(. /))/1B$ /'" 2#$#'-&.2/)#&' 1/23/#C'$+

     3%#$%#'C (2/#9$ /'" -/B( $&1#/9 '()8&.B#'C 3.&-#9($+ 3.($$0.#'C H&0.'/9#$)$ /'" #')#2#"/)#'C )%( -#'/'1#/9 "&'&.$

    )& 19#(')$4 ('(2#($ #'190"#'C O#B#7(/B$+ 0'#&'$ /'" '&'Q 3.&-#)$ )%/) &33&$(" )%( A%/2E(.I4 ^'(/ d5%%'4%5@.#>;d)5/ ]N%2+ H1' W-5 9-O%5 ^+ >)238'@ C2)'():]+2):)*%+.F _&.E($+ W%451)5/ "g. UV""A ]N7848* 99A7**=_``4:-@+A&-54%+A2-6`)'(/@5%%'4%5@`UV""`VU`"g`74@)5/Y%N%2+Y51'&-5Y2-O%5Y)+Y7)238 '@Y+2)'():Y%+2):)*%+`F

    32%& !"#$0%'), %, A5 

    #!e'( &- )%( -#9($


Recommended