(1) the residence of ANA BELEN MONTES, such premises known and described as a cooperative apartment located at 3039 Macomb Street, N.W., apartment 20, Washington, D.C. 20008, and further described in Attachment A to this affidavit;
(2) a red 2000 Toyota Echo, bearing vehicle identification number
JTDT1231Y0007841 and District of Columbia license plate number 993 190, which is registered to ANA BELEN MONTES and anticipated to be within the District of Columbia;
(3) room C6-146A, 200 MacDill Boulevard, Washington, D.C. 20340, which is the office/work space assigned to ANA BELEN MONTES at the Defense Intelligence Analysis Center located on Bolling Air Force Base;
(4) safe deposit box #526 leased by ANA BELEN MONTES at Riggs Bank, N.A., Friendship Branch, 4249 Wisconsin Avenue, N.W., Washington, D.C.
3. Information in this affidavit is based on my personal knowledge and on information provided to me by other counter-intelligence investigators and law enforcement officers during the course of this investigation. Searches and various forms of surveillance have been conducted pursuant to the Foreign Intelligence Surveillance Act of 1978, as amended (FISA) and orders of the Foreign Intelligence Surveillance Court (FISC).
I. Background
4. ANA BELEN MONTES is a United States citizen born on February 28,
1957, on a U.S.
military installation in Nurnberg, Germany. She graduated from the
University of Virginia in 1979 and obtained a masters degree from the
Johns Hopkins University School of Advanced International Studies in
1988. She is single and lives alone at 3039 Macomb Street, N.W.,
apartment 20, Washington, D.C. 20008, which residence is further
described in Attachment A. She has registered in her name a red 2000
Toyota Echo, bearing vehicle identification number JTDT1231Y0007841 and
District of Columbia license plate number 993 190, which is regularly
parked in the vicinity of her residence, and which she regularly uses to
commute to her place of employment.
5. MONTES is currently employed by the Defense Intelligence Agency (DIA)
as a senior
intelligence analyst. Her current office is at 200 MacDill Boulevard,
located on Bolling Air Force Base, Washington, D.C. 20340. Her assigned
office space is C6-146A. She has been employed by DIA as an analyst
since September 1985. Since 1992, she has specialized in Cuba matters.
She is currently the senior analyst responsible for matters pertaining
to Cuba. During the course of her employment, MONTES has had direct and
authorized access to classified information relating to the national
defense.
6. Records obtained from Riggs Bank reveal that MONTES has continually
leased safe
deposit box number 526 at Riggs Bank, N.A., Friendship Branch, 4249
Wisconsin Avenue, N.W., Washington, D.C. since September 2, 1993.
7. Classified information is defined by Executive Order No. 12,958, 60
Fed. Reg.19,825
(1995), as follows: information in any form that (1) is owned by,
produced by or for, or under the control of the United States
government; (2) falls within one or more of the categories set forth in
section 1.5 of the order (including intelligence sources and methods,
cryptology, military plans, and vulnerabilities or capabilities of
systems, installations, projects, or plans relating to the national
security), and (3) is classified by an original classification authority
who determines that its unauthorized disclosure reasonably could be
expected to result in damage to the national security. Under the
executive order, the designation "Confidential" shall be applied to
information, the unauthorized disclosure of which reasonably could be
expected to cause damage to the national security. The designation
"Secret" shall be applied to information, the unauthorized disclosure of
which reasonably could be expected to cause serious damage to the
national security. The designation "Top Secret" shall be applied to
information, the unauthorized disclosure of which reasonably could be
expected to cause exceptionally grave damage to the national security.
8. In addition, Executive Order No. 12,958 provides that the secretaries
of State, Defense and
Energy are authorized to create "special access programs" upon certain
specific findings including that the vulnerability of, or threat to,
specific classified information is exceptional. Under such a program,
the safeguarding and access requirements to information covered by the
program exceed those normally required for information at the same
classification level.
9. Under 32 C.F.R. § 159a.9, Sensitive Compartmented Information (SCI)
refers to
information and material that requires special controls for restricted
handling.
10. During her employment at DIA, MONTES has continuously held a
security clearance and
has had regular, authorized access to classified information. I know
that a person who receives such clearances is required to be briefed on
the procedures for properly handling classified information and the
penalties for failing to do so, and that such a person must sign
certifications of understanding and agreement in connection with those
briefings. I have reviewed a "Classified Information Nondisclosure
Agreement" (Standard Form 189) that MONTES signed on September 30, 1985.
In that document MONTES acknowledged that she was aware that
unauthorized disclosure of classified information could cause
irreparable injury to the United States or could be used to advantage by
a foreign nation, that she would never divulge such information to an
unauthorized person, and that she understood that she was obligated to
comply with laws and regulations that prohibit the unauthorized
disclosure of classified information, and that she further understood
such a disclosure could constitute a violation of United States criminal
law including 18 U.S.C. § 794. I have also reviewed a "Security
Briefing/Debriefing Acknowledgment" form signed by MONTES on May 15,
1997, briefing her into a Special Access Program (SAP). On this date,
specifically in connection with this SAP, MONTES signed a Sensitive
Compartmented Information Nondisclosure Agreement, in which she
acknowledged that the unauthorized disclosure of SCI may violate federal
criminal law, including 18 U.S.C. § 794, and that such disclosure could
cause irreparable injury to the United States or be used to the
advantage of a foreign nation.
II. MONTES's Toshiba Laptop Computer and Shortwave Radio
A. Communication From the Cuban Intelligence Service (CuIS) to MONTES
via
Shortwave Radio
11. Based on my knowledge and familiarity with the methodology of the
Cuban intelligence
service, I am aware that the CuIS often communicates with clandestine
CuIS agents operating
outside Cuba by broadcasting encrypted messages at certain high
frequencies. Under this method, the CuIS broadcasts on a particular
frequency a series of numbers. The clandestine agent, monitoring the
message on a shortwave radio, keys in the numbers onto a computer and
then uses a diskette containing a decryption program to convert the
seemingly random series of numbers into Spanish-language text. This was
the methodology employed by some of the defendants convicted last June
in the Southern District of Florida of espionage on behalf of Cuba and
acting as unregistered agents of Cuba, in the case of United States of
America v. Gerardo Hernandez, et al., Cr. No. 98-721-CR-Lenard(s)(s).
Although it is very difficult to decrypt a message without access to the
relevant decryption program, once decrypted on the agent's computer the
decrypted message resides on the computer's hard drive unless the agent
takes careful steps to cleanse the hard drive of the message. Simply
"deleting" the file is not sufficient.
12. Based on the evidence described below, I have concluded that MONTES
was a
clandestine CuIS agent who communicated with her handling CuIS officer
in the manner described above.
13. A receipt obtained from a CompUSA store located in Alexandria,
Virginia indicated that
on October 5, 1996, one "Ana B. Montes" purchased a refurbished Toshiba
laptop computer, model 405CS, serial number 10568512.
14. During a court-authorized surreptitious entry into MONTES's
residence, conducted by
the FBI on May 25, 2001, FBI agents observed in her residence a Toshiba
laptop computer with the serial number set out above. During the search,
the agents electronically copied the laptop's hard drive. During
subsequent analysis of the copied hard drive, the FBI recovered
substantial text that had been deleted from the laptop's hard drive.
15. The recovered text from the laptop's hard drive included significant
portions of a Spanish language message, which when printed out with
standard font comes to approximately 11 pages of text. The recovered
portion of the message does not expressly indicate when it was composed.
However, it instructs the message recipient to travel to "the Friendship
Heights station" on "Saturday, November 23rd." My review of a calendar
indicates that November 23 fell on a Saturday in 1996; the next time
thereafter November 23 falls on a Saturday is in 2002. Accordingly, this
message was composed sometime before November 23, 1996, and entered onto
MONTES's laptop sometime after October 5, 1996, the date she purchased
it. Based on its content, I have concluded that it is a message from a
CuIS officer to MONTES.
16. Portions of the recovered message included the following: "You
should go to the WIPE
program and destroy that file according to the steps which we discussed
during the contact. This is a basic step to take every time you receive
a radio message or some disk."
17. During this same search, the agents also observed a Sony shortwave
radio stored in a
previously opened box on the floor of the bedroom. The agents turned on
the radio to confirm that it was operable. Also found was an earpiece
that could be utilized with this shortwave radio, allowing the radio to
be listened to more privately. Similar earpieces were found in the
residences of the defendants in the Hernandez case, as described above
in paragraph 11.
18. The recovered portion of the message begins with the following passage:
Nevertheless, I learned that you entered the code communicating that
you were having problems with radio reception. The code alone
covers a lot, meaning that we do not know specifically what types of
difficulty you are having. Given that it's only been a few days since
we began the use of new systems, let's not rule out that the problem
might be related to them. In that case, I'm going to repeat the
necessary steps to take in order to retrieve a message.
"Here the program deciphers the message and it retrieves the text onto the screen, asking you if the text is okay or not." Near the conclusion of the message, there is the statement "In this shipment you will receive the following disks: . . . 2) Disk "R1" to decipher our mailings and radio."
19. Further analysis of MONTES's copied Toshiba hard drive identified
text consisting of
a series of 150 5-number groups. The text begins, "30107 24624," and
continues until 150 such groups are listed. The FBI has determined that
the precise same numbers, in the precise same order, were broadcast on
February 6, 1999, at AM frequency 7887 kHz, by a woman speaking Spanish,
who introduced the broadcast with the words "Attencion! Attencion!" The
frequency used in that February 1999 broadcast is within the frequency
range of the shortwave radio observed in MONTES's residence on May 25,
2001.
B. Communication Between the CuIS and MONTES via Computer Diskette
20. Based on my knowledge of the methodology employed by the CuIS, I am
aware that a
clandestine CuIS agent often communicates with his or her handling CuIS
officer by typing a
message onto a computer, and then encrypting and saving it to a
diskette. The agent thereafter physically delivers the diskette, either
directly or indirectly, to the officer. In addition, as an alternative
to sending an encrypted shortwave radio broadcast, a CuIS officer often
will similarly place an encrypted message onto a diskette and again
simply physically deliver the diskette, clandestinely, to the agent.
Upon receipt of the encrypted message, either by the CuIS officer or the
agent, the recipient employs a decryption program contained on a
separate diskette to decrypt the message. The exchange of diskettes
containing encrypted messages, and the use of decryption programs
contained on separate diskettes, was one of the clandestine
communication techniques utilized by the defendants in the Hernandez
case described above in paragraph 11. Although it is difficult to
decrypt a message without the decryption program, the very process of
encrypting or decrypting a message on a computer causes a decrypted copy
of the message to be placed on the computer's hard drive. Unless
affirmative steps are taken to cleanse the hard drive, beyond simply
"deleting" the message, the message can be retrieved from the hard
drive.
21. Based on the evidence described below, I have concluded that MONTES
was a CuIS
agent who communicated with her CuIS handling officer by passing and
receiving computer
diskettes containing encrypted messages.
22. The message described above that was contained on the hard drive of
MONTES's laptop
computer contained the following passage:
Continue writing along the same lines you have so far, but cipher the
information every time you do, so that you do not leave prepared
information that is not ciphered in the house. This is the most
sensitive and compromising information that you hold. We realize
that this entails the difficulty of not being able to revise or consult
what was written previously before each shipment, but we think it is
worth taking this provisional measure. It is not a problem for us if
some intelligence element comes repeated or with another defect
which obviously cannot help, we understand this perfectly.-- Give
"E" only the ciphered disks. Do not give, for the time being, printed
or photographed material. Keep the materials which you can justify
keeping until we agree that you can deliver them.-- Keep up the
measure of formatting the disks we send you with couriers or letters
as soon as possible, leaving conventional notes as reminders only of
those things to reply to or report.
The message goes on to refer to a "shipment" that contains "Disk 'S1' -
to cipher the information you send," and, as indicated in the previous
section, to "Disk 'R1' to decipher our mailings and radio." Earlier in
the message, there is a reference to "information you receive either via
radio or disk."
23. During the court-authorized search of the residence on May 25, 2001,
two boxes
containing a total of 16 diskettes were observed. During a subsequent
such search on August 8, 2001, a box containing 41 diskettes, later
determined to be blank, were observed. Finally, records obtained from a
Radio Shack store located near MONTES's residence indicate that MONTES
purchased 160 floppy diskettes during the period May 1, 1993, to
November 2, 1997.
III. Communication from MONTES to the CuIS by Pager
24. Based on my knowledge of the methodology employed by the CuIS, I am
aware that a
clandestine CuIS agent often communicates with his or her handling CuIS
officer by making calls to a pager number from a pay telephone booth and
entering a pre-assigned code to convey a particular message. This
methodology was utilized by the defendants in the Hernandez case
described above in paragraph 11.
25. Based on the evidence described below, I believe that MONTES has
been communicating
with her handling CuIS officer in this fashion.
26. In the same message copied from MONTES's hard drive that has been
described earlier
in this affidavit, there is a passage that states:
C) Beepers that you have. The only beepers in use at present are the
following: 1) (917) [first seven-digit telephone number omitted from
this application], use it with identification code 635. 2) (917) [second
seven-digit telephone number omitted from this application]. Use it
with identification code 937. 3) (917) [third seven-digit telephone
number omitted from this application] Use it only with identification
code 2900 . . . because this beeper is public, in other words it is
known to belong to the Cuban Mission at the UN and we assume
there is some control over it. You may use this beeper only in the
event you cannot communicate with those mentioned in 1) and 2),
which are secure.
Based on my experience and knowledge, I have concluded that the
reference to "control over it" in the above passage refers to the CuIS
officer's suspicion that the FBI is aware that this beeper number is
associated with the Cuban government and is monitoring it in some
fashion.
27. In addition, as described previously, the message on the laptop's
hard drive includes a
portion stating that the message recipient "entered the code
communicating that you were having problems with radio reception." Based
on the evidence described above, I have concluded this portion of the
message indicates that MONTES at some point shortly prior to receiving
the message sent a page to her CuIS officer handler consisting of a
pre-assigned series of numbers to indicate she was having communication
problems.
28. Based on evidence obtained during the FBI's physical surveillance of
MONTES
conducted between May and September 2001, I have concluded that MONTES
continues to send coded pages to the CuIS. This evidence is described
below in paragraphs 38 to 45.
III. MONTES's Transmission of Classified Information to the CuIS
29. The same message described above, as well as other messages
recovered from the laptop's hard drive, contained the following
information indicating that MONTES had been tasked to provide and did
provide classified information to the CuIS.
30. In one portion of the message discussed above, the CuIS officer
states:
What *** said during the meeting . . . was very interesting. Surely
you remember well his plans and expectations when he was coming
here. If I remember right, on that occasion, we told you how
tremendously useful the information you gave us from the meetings
with him resulted, and how we were waiting here for him with open
arms.
31. I have replaced in this application with "***" a word that begins
with a capital letter,
which was not translated, and is in fact the true last name of a U.S.
intelligence officer who was present in an undercover capacity, in Cuba,
during a period that began prior to October 1996. The above quoted
portion of the message indicates that MONTES disclosed the U.S.
officer's intelligence agency affiliation and anticipated presence in
Cuba to the CuIS, which information is classified "Secret." As a result,
the Cuban government was able to direct its counter-intelligence
resources against the U.S. officer ("we were waiting here for him with
open arms").
32. The very next section in the message states:
We think the opportunity you will have to participate in the ACOM
exercise in December is very good. Practically, everything that takes
place there will be of intelligence value. Let's see if it deals with
contingency plans and specific targets in Cuba, which are to
prioritized interests for us.
33. I have concluded that the "ACOM exercise in December" is a reference
to a December
1996 war games exercise conducted by the U.S. Atlantic Command, a U.S.
Department of Defense unified command, in Norfolk, Virginia. Details
about the exercise's "contingency plans and specific targets" is
classified "Secret" and relates to the national defense of the United
States.
34. DIA has advised that MONTES attended the above exercise in Norfolk,
as part of her
official DIA duties.
35. In a separate message partially recovered from the hard drive of
MONTES's Toshiba
laptop, the message reveals details about a particular Special Access
Program (SAP) related to the national defense of the United States, and
states: "In addition, just today the agency made me enter into a
program, 'special access top secret. [First name, last name omitted from
this application] and I are the only ones in my office who know about
the program." The details related about this SAP in this message are
classified "Top Secret" / SCI.
36. DIA has confirmed that MONTES and a colleague with the same name as
that related in
the portion of the message described above were briefed into this SAP,
together, on May 15, 1997. Accordingly, I have concluded that the above
message from MONTES to a CuIS officer.
37. In yet another message recovered from the laptop, there is a
statement revealing that "we
have noticed" the location, number and type of certain Cuban military
weapons in Cuba. This
information is precisely the type of information that is within MONTES's
area of expertise, and is, in fact, an accurate statement of the U.S.
intelligence community's knowledge on this particular issue. The
information is classified "Secret." Accordingly, I have concluded that
this message also is a message from MONTES to a CuIS officer.
FBI Physical Surveillance of MONTES and Telephone Records for May to
September 2001
38. FBI physical surveillance of MONTES has shown a recent pattern of
pay telephone calls
by her to a pager number, a communication method that, as described
above in paragraph 24, is consistent with known CuIS communications
plans and operations. In each paragraph below that refers to MONTES
driving, she was utilizing the Toyota described above in paragraph 2.
39. The FBI maintained periodic physical surveillance of MONTES during
the period May
to September 2001. On May 20, 2001, MONTES left her residence and drove
to the Hecht's on Wisconsin Avenue, in Chevy Chase, Maryland. She
entered the store at 1:07 p.m. and exited by the rear entrance at 1:27
p.m. She then sat down on a stone wall outside the rear entrance and
waited for approximately two minutes. At 1:30 p.m., the FBI observed her
walk to a pay phone approximately 20 feet from where she was sitting.
She placed a one minute call to a pager number using a pre-paid calling
card. At 1:45 p.m. she drove out of the Hecht's lot and headed north on
Wisconsin Avenue toward Bethesda, Maryland. At 1:52 p.m. she parked her
car in a lot and went into Modell's Sporting Goods store. She quickly
exited the store carrying a bag and crossed Wisconsin Avenue to an Exxon
station. She was observed looking over her right and left shoulders as
she crossed the Exxon lot. At 2:00 p.m. she placed a one minute call
from a pay phone at the Exxon station to the same pager number using the
same pre-paid calling card. By 2:08 p.m., MONTES had walked back to her
vehicle and was driving back to her residence where she arrived at 2:30
p.m.
40. On June 3, 2001, MONTES engaged in similar communications activity.
She left her
residence at approximately 2:30 p.m. and drove to a bank parking lot at
the corner of Harrison Street, N.W. and Wisconsin Avenue, N.W. She
exited her car at approximately 2:37 pm and entered a Borders Book Store
on Wisconsin Avenue. She left the store approximately 40 minutes later.
She then crossed Wisconsin Avenue to the vicinity of three public pay
phones near the southern exit of the Friendship Heights Metro Station.
At 3:28 p.m. she placed a one-minute call using the same prepaid calling
card to the same pager number she had called on May 20, 2001. After a
few minutes, she walked back to her car and drove to a grocery store.
41. Pursuant to court authorization, on August 16, 2001, the FBI
searched MONTES's
pocketbook. In a separate compartment of MONTES's wallet, the FBI found
the pre-paid calling card used to place the calls on May 20, 2001 and
June 3, 2001. In the same small compartment, the FBI located a slip of
paper on which was written the pager number she had called. Written
above this pager number was a set of digits that I believe comprise one
or more codes for MONTES to use after calling the pager number, i.e.,
after contacting the pager, she keys in a code to be sent to the pager
which communicates a particular pre-established message.
42. On August 26, 2001, at approximately 10:00 a.m., the FBI observed
MONTES making
a brief pay telephone call to the same pager number from a gas
station/convenience store located at the intersection of Connecticut and
Nebraska Avenues, N.W., in Washington, D.C.
43. On September 14, 2001, MONTES left work and drove directly to her
residence. She
then walked to Connecticut Avenue, N.W., in Washington, D.C., still
wearing her business clothes, and made a stop at a dry cleaning shop.
She then entered the National Zoo through the Connecticut Avenue
entrance. She proceeded to the "Prairie Land" overlook where she stayed
for only 30 seconds. She then walked further into the zoo compound and
basically re-traced her route out of the zoo. At approximately 6:30 p.m.
MONTES removed a small piece of paper or card from her wallet and walked
to a public phone booth located just outside the pedestrian entrance to
the zoo. MONTES then made what telephone records confirmed to be two
calls to the same pager number she had called in May, June and August,
as described above. The records reflect that the first call was
unsuccessful, i.e., the call lasted zero seconds. According to the
records, she made a second call one minute later that lasted 33 seconds.
Shortly after making these calls, MONTES looked at her watch and then
proceeded to walk back to her residence.
43. On September 15, 2001, telephone records pertaining to the pre-paid
calling card number
on the card observed in her pocketbook on August 16, 2001, show that
MONTES made a call to the same pager number at 11:12 a.m. that lasted
one minute.
44. On September 16, 2001, MONTES left her residence in the early
afternoon and took the
Metro (Red Line) to the Van Ness - UDC station in Washington, D.C. She
made a brief telephone call from a payphone in the Metro station at
approximately 1:50 p.m., again to the same pager number.
45. MONTES is known to possess a cell phone. A cell phone was observed
during a court authorized search of her tote bag on August 16, 2001. In
addition, during surveillance on September 16, 2001, MONTES was observed
speaking on a cell phone. Furthermore, telephone records obtained in May
2001 confirm that she has subscribed to cell telephone service
continually from October 26, 1996 to May 14, 2001. MONTES's use of
public pay phones notwithstanding her access to a cell phone supports my
conclusion that the pay phone calls described in this section were in
furtherance of MONTES's espionage.
Probable Cause to Seize Documents, Materials and Computer Media
46. My experience has shown that individuals involved in espionage very
often maintain
copies of correspondence, draft documents and even classified government
documents which are themselves of evidentiary value, along with evidence
of criminal and other associations. This evidence includes directories,
lists, news articles, photographs, travel and similar material. The
items and materials utilized by persons engaged in espionage is further
described in Attachment B.
47. MONTES is known to have both a laptop and a desktop computer in her
residence. In
addition, she utilizes a desktop computer in her office in the DIAC.
These computers may be
attached to peripherals such as printers when the search warrants are
executed. Searching these computer systems may require a range of data
analysis techniques. In some cases, it is possible for the agents to
conduct carefully targeted searches that can locate evidence without
requiring a time consuming manual search through unrelated materials
that may be commingled with criminal evidence. Similarly, agents may be
able to locate the materials covered in the warrant by looking for
particular directory or file names. In other cases, however, such
techniques may not yield the evidence described in the warrant.
Criminals can mislabel or hide files and directories; encode
communications to avoid using key words; attempt to delete files to
evade detection; or take other steps designed to frustrate law
enforcement searches for information. These steps all are anticipated to
be applicable in this case. These steps may require agents to conduct
more extensive searches, which can more easily be accomplished with
equipment that cannot be brought to the search sites, such as scanning
areas of the disk not allocated to listed files, or opening every file
and scanning its
contents briefly to determine whether it falls within the scope of the
warrant. In light of these
difficulties, your affiant requests permission to use whatever data
analysis techniques appear
necessary to locate and retrieve the evidence in the computers,
diskettes, and peripherals that are located within the places and items
to be searched, and to remove these items from the places to be searched
so that the items may be searched more thoroughly.
Conclusion
48. Based on the evidence described above, I believe probable cause
exists that from on or
about October 5, 1996, to the date of this affidavit, in the District of
Columbia and elsewhere, ANA BELEN MONTES, conspired, confederated and
agreed with persons known and unknown to violate 18 U.S.C. § 794(a),
that is, to communicate, deliver and transmit to the government of Cuba
and its representatives, officers and agents, information relating to
the national defense of the United States, with the intent and reason to
believe that the information was to be used to the injury of the United
States and to the advantage of Cuba, and that MONTES committed acts to
effect the object of this conspiracy in the District of Columbia and
elsewhere, all in violation of 18 U.S.C. § 794(c).
49. I further believe that probable cause exists that the items and
locations described in
Attachment A contain evidence, fruits, and instrumentalities relating to
the above violation, which evidence fruits and instrumentalities are
further described in Attachment B.
STEPHEN A. McCOY, Special Agent Federal Bureau of Investigation
SWORN TO AND SUBSCRIBED BEFORE ME THIS DAY OF SEPTEMBER, 2001.
UNITED STATES MAGISTRATE JUDGE
ATTACHMENT A
The residence of ANA BELEN MONTES is located at 3039 Macomb Street,
N.W.,
apartment 20, Washington, D.C. 20008. 3039 Macomb Street, N.W., is
titled "The Cleveland
Apartments," and is a three story, red brick building. Apartment 20 is
on the second floor and is the first door on the left.
ATTACHMENT B
1. Espionage paraphernalia, including devices designed to conceal and
transmit national
defense and classified intelligence information and material, and
implements used by espionage agents to communicate with their handlers
and with a foreign government, to wit: white tape, mailing tape, colored
chalk (all used for signaling purposes), coded pads, secret writing
paper, microdots, any letters, notes or other written communications
(including contact instructions) between defendant ANA BELEN MONTES and
any agents of the CuIS or other intelligence service of Cuba; any
computers, (including laptops), computer disks, cameras, film, codes,
telephone numbers, maps, photographs and other materials relating to
communication procedures, correspondence;
2. Records, notes, calendars, journals, maps, instructions, and
classified documents and other papers and documents relating to the
transmittal of national defense and classified intelligence information
(including the identities of foreign espionage agents and intelligence
officers and other foreign assets or sources providing information to
the United States Intelligence Community, such as the FBI and CIA;
records of previous illicit espionage transactions, national defense
transactions, national defense and classified intelligence information,
including copies of documents copied or
downloaded by ANA BELEN MONTES from the DIA);
3. Passports, visas, calendars, date books, address books, credit card,
hotel receipts and
airline records, reflecting travel in furtherance of espionage
activities;
4. Identity documents, including but not limited to passports, licenses,
visas (including those
in fictitious or alias identities), U.S. and foreign currency,
instructions, maps, photographs, U.S. and foreign bank account access
numbers and instructions and other papers and materials relating to
emergency contact procedures and escape routes;
5. Safety deposit box records, including signature cards, bills, and
payment records, safety
deposit box keys, whether in the name of the defendant or a family
member; any records pertaining to any commercial storage sites where the
defendant may be storing other classified intelligence and
counter-intelligence documents or other records of her espionage
activities;
6. Federal, state and local tax returns, work sheets, W-2 forms, 1099
forms, and any related
schedules;
7. Telephone bills and records, including calling cards and pager records;
8. Photographs, including photographs of co-conspirators;
correspondence (including
envelopes) to and from ANA BELEN MONTES and handlers, contacts and
intelligence agents of Cuba;
9. Computer hardware, software, and storage media, known to be used by
the defendant or
to which she had access, including, but not limited to: any personal
computer, laptop computer, modem, and server, which have been and are
being used to commit the offenses of espionage and conspiracy to commit
espionage; records, information and files contained within such computer
hardware containing evidence and fruits of defendant's espionage
activity between October 5, 1996, and the present, including classified
documents, in whatever form and by whatever means they have been created
or stored, including but not limited to any electrical, electronic, or
magnetic form of storage device; floppy diskettes, hard disks, zip
disks, CD-ROMs, optical discs, backup tapes, printer buffers, smart
cards, memory calculators, pagers, personal digital assistants such as
Palm III devices, removable hard drives, memory cards, zip drives, and
any photographic forms of such records
including microfilm, digital prints, slides, negatives, microfiche,
photocopies, and videotapes,
computer terminals and printers used by the defendant in said espionage
activity.
(1) the residence of ANA BELEN MONTES, such premises known and described as a cooperative apartment located at 3039 Macomb Street, N.W., apartment 20, Washington, D.C. 20008, and further described in Attachment A to this affidavit;
(2) a red 2000 Toyota Echo, bearing vehicle identification number
JTDT1231Y0007841 and District of Columbia license plate number 993 190, which is registered to ANA BELEN MONTES and anticipated to be within the District of Columbia;
(3) room C6-146A, 200 MacDill Boulevard, Washington, D.C. 20340, which is the office/work space assigned to ANA BELEN MONTES at the Defense Intelligence Analysis Center located on Bolling Air Force Base;
(4) safe deposit box #526 leased by ANA BELEN MONTES at Riggs Bank, N.A., Friendship Branch, 4249 Wisconsin Avenue, N.W., Washington, D.C.
3. Information in this affidavit is based on my personal knowledge and on information provided to me by other counter-intelligence investigators and law enforcement officers during the course of this investigation. Searches and various forms of surveillance have been conducted pursuant to the Foreign Intelligence Surveillance Act of 1978, as amended (FISA) and orders of the Foreign Intelligence Surveillance Court (FISC).
I. Background
4. ANA BELEN MONTES is a United States citizen born on February 28,
1957, on a U.S.
military installation in Nurnberg, Germany. She graduated from the
University of Virginia in 1979 and obtained a masters degree from the
Johns Hopkins University School of Advanced International Studies in
1988. She is single and lives alone at 3039 Macomb Street, N.W.,
apartment 20, Washington, D.C. 20008, which residence is further
described in Attachment A. She has registered in her name a red 2000
Toyota Echo, bearing vehicle identification number JTDT1231Y0007841 and
District of Columbia license plate number 993 190, which is regularly
parked in the vicinity of her residence, and which she regularly uses to
commute to her place of employment.
5. MONTES is currently employed by the Defense Intelligence Agency (DIA)
as a senior
intelligence analyst. Her current office is at 200 MacDill Boulevard,
located on Bolling Air Force Base, Washington, D.C. 20340. Her assigned
office space is C6-146A. She has been employed by DIA as an analyst
since September 1985. Since 1992, she has specialized in Cuba matters.
She is currently the senior analyst responsible for matters pertaining
to Cuba. During the course of her employment, MONTES has had direct and
authorized access to classified information relating to the national
defense.
6. Records obtained from Riggs Bank reveal that MONTES has continually
leased safe
deposit box number 526 at Riggs Bank, N.A., Friendship Branch, 4249
Wisconsin Avenue, N.W., Washington, D.C. since September 2, 1993.
7. Classified information is defined by Executive Order No. 12,958, 60
Fed. Reg.19,825
(1995), as follows: information in any form that (1) is owned by,
produced by or for, or under the control of the United States
government; (2) falls within one or more of the categories set forth in
section 1.5 of the order (including intelligence sources and methods,
cryptology, military plans, and vulnerabilities or capabilities of
systems, installations, projects, or plans relating to the national
security), and (3) is classified by an original classification authority
who determines that its unauthorized disclosure reasonably could be
expected to result in damage to the national security. Under the
executive order, the designation "Confidential" shall be applied to
information, the unauthorized disclosure of which reasonably could be
expected to cause damage to the national security. The designation
"Secret" shall be applied to information, the unauthorized disclosure of
which reasonably could be expected to cause serious damage to the
national security. The designation "Top Secret" shall be applied to
information, the unauthorized disclosure of which reasonably could be
expected to cause exceptionally grave damage to the national security.
8. In addition, Executive Order No. 12,958 provides that the secretaries
of State, Defense and
Energy are authorized to create "special access programs" upon certain
specific findings including that the vulnerability of, or threat to,
specific classified information is exceptional. Under such a program,
the safeguarding and access requirements to information covered by the
program exceed those normally required for information at the same
classification level.
9. Under 32 C.F.R. § 159a.9, Sensitive Compartmented Information (SCI)
refers to
information and material that requires special controls for restricted
handling.
10. During her employment at DIA, MONTES has continuously held a
security clearance and
has had regular, authorized access to classified information. I know
that a person who receives such clearances is required to be briefed on
the procedures for properly handling classified information and the
penalties for failing to do so, and that such a person must sign
certifications of understanding and agreement in connection with those
briefings. I have reviewed a "Classified Information Nondisclosure
Agreement" (Standard Form 189) that MONTES signed on September 30, 1985.
In that document MONTES acknowledged that she was aware that
unauthorized disclosure of classified information could cause
irreparable injury to the United States or could be used to advantage by
a foreign nation, that she would never divulge such information to an
unauthorized person, and that she understood that she was obligated to
comply with laws and regulations that prohibit the unauthorized
disclosure of classified information, and that she further understood
such a disclosure could constitute a violation of United States criminal
law including 18 U.S.C. § 794. I have also reviewed a "Security
Briefing/Debriefing Acknowledgment" form signed by MONTES on May 15,
1997, briefing her into a Special Access Program (SAP). On this date,
specifically in connection with this SAP, MONTES signed a Sensitive
Compartmented Information Nondisclosure Agreement, in which she
acknowledged that the unauthorized disclosure of SCI may violate federal
criminal law, including 18 U.S.C. § 794, and that such disclosure could
cause irreparable injury to the United States or be used to the
advantage of a foreign nation.
II. MONTES's Toshiba Laptop Computer and Shortwave Radio
A. Communication From the Cuban Intelligence Service (CuIS) to MONTES
via
Shortwave Radio
11. Based on my knowledge and familiarity with the methodology of the
Cuban intelligence
service, I am aware that the CuIS often communicates with clandestine
CuIS agents operating
outside Cuba by broadcasting encrypted messages at certain high
frequencies. Under this method, the CuIS broadcasts on a particular
frequency a series of numbers. The clandestine agent, monitoring the
message on a shortwave radio, keys in the numbers onto a computer and
then uses a diskette containing a decryption program to convert the
seemingly random series of numbers into Spanish-language text. This was
the methodology employed by some of the defendants convicted last June
in the Southern District of Florida of espionage on behalf of Cuba and
acting as unregistered agents of Cuba, in the case of United States of
America v. Gerardo Hernandez, et al., Cr. No. 98-721-CR-Lenard(s)(s).
Although it is very difficult to decrypt a message without access to the
relevant decryption program, once decrypted on the agent's computer the
decrypted message resides on the computer's hard drive unless the agent
takes careful steps to cleanse the hard drive of the message. Simply
"deleting" the file is not sufficient.
12. Based on the evidence described below, I have concluded that MONTES
was a
clandestine CuIS agent who communicated with her handling CuIS officer
in the manner described above.
13. A receipt obtained from a CompUSA store located in Alexandria,
Virginia indicated that
on October 5, 1996, one "Ana B. Montes" purchased a refurbished Toshiba
laptop computer, model 405CS, serial number 10568512.
14. During a court-authorized surreptitious entry into MONTES's
residence, conducted by
the FBI on May 25, 2001, FBI agents observed in her residence a Toshiba
laptop computer with the serial number set out above. During the search,
the agents electronically copied the laptop's hard drive. During
subsequent analysis of the copied hard drive, the FBI recovered
substantial text that had been deleted from the laptop's hard drive.
15. The recovered text from the laptop's hard drive included significant
portions of a Spanish language message, which when printed out with
standard font comes to approximately 11 pages of text. The recovered
portion of the message does not expressly indicate when it was composed.
However, it instructs the message recipient to travel to "the Friendship
Heights station" on "Saturday, November 23rd." My review of a calendar
indicates that November 23 fell on a Saturday in 1996; the next time
thereafter November 23 falls on a Saturday is in 2002. Accordingly, this
message was composed sometime before November 23, 1996, and entered onto
MONTES's laptop sometime after October 5, 1996, the date she purchased
it. Based on its content, I have concluded that it is a message from a
CuIS officer to MONTES.
16. Portions of the recovered message included the following: "You
should go to the WIPE
program and destroy that file according to the steps which we discussed
during the contact. This is a basic step to take every time you receive
a radio message or some disk."
17. During this same search, the agents also observed a Sony shortwave
radio stored in a
previously opened box on the floor of the bedroom. The agents turned on
the radio to confirm that it was operable. Also found was an earpiece
that could be utilized with this shortwave radio, allowing the radio to
be listened to more privately. Similar earpieces were found in the
residences of the defendants in the Hernandez case, as described above
in paragraph 11.
18. The recovered portion of the message begins with the following passage:
Nevertheless, I learned that you entered the code communicating that
you were having problems with radio reception. The code alone
covers a lot, meaning that we do not know specifically what types of
difficulty you are having. Given that it's only been a few days since
we began the use of new systems, let's not rule out that the problem
might be related to them. In that case, I'm going to repeat the
necessary steps to take in order to retrieve a message.
"Here the program deciphers the message and it retrieves the text onto the screen, asking you if the text is okay or not." Near the conclusion of the message, there is the statement "In this shipment you will receive the following disks: . . . 2) Disk "R1" to decipher our mailings and radio."
19. Further analysis of MONTES's copied Toshiba hard drive identified
text consisting of
a series of 150 5-number groups. The text begins, "30107 24624," and
continues until 150 such groups are listed. The FBI has determined that
the precise same numbers, in the precise same order, were broadcast on
February 6, 1999, at AM frequency 7887 kHz, by a woman speaking Spanish,
who introduced the broadcast with the words "Attencion! Attencion!" The
frequency used in that February 1999 broadcast is within the frequency
range of the shortwave radio observed in MONTES's residence on May 25,
2001.
B. Communication Between the CuIS and MONTES via Computer Diskette
20. Based on my knowledge of the methodology employed by the CuIS, I am
aware that a
clandestine CuIS agent often communicates with his or her handling CuIS
officer by typing a
message onto a computer, and then encrypting and saving it to a
diskette. The agent thereafter physically delivers the diskette, either
directly or indirectly, to the officer. In addition, as an alternative
to sending an encrypted shortwave radio broadcast, a CuIS officer often
will similarly place an encrypted message onto a diskette and again
simply physically deliver the diskette, clandestinely, to the agent.
Upon receipt of the encrypted message, either by the CuIS officer or the
agent, the recipient employs a decryption program contained on a
separate diskette to decrypt the message. The exchange of diskettes
containing encrypted messages, and the use of decryption programs
contained on separate diskettes, was one of the clandestine
communication techniques utilized by the defendants in the Hernandez
case described above in paragraph 11. Although it is difficult to
decrypt a message without the decryption program, the very process of
encrypting or decrypting a message on a computer causes a decrypted copy
of the message to be placed on the computer's hard drive. Unless
affirmative steps are taken to cleanse the hard drive, beyond simply
"deleting" the message, the message can be retrieved from the hard
drive.
21. Based on the evidence described below, I have concluded that MONTES
was a CuIS
agent who communicated with her CuIS handling officer by passing and
receiving computer
diskettes containing encrypted messages.
22. The message described above that was contained on the hard drive of
MONTES's laptop
computer contained the following passage:
Continue writing along the same lines you have so far, but cipher the
information every time you do, so that you do not leave prepared
information that is not ciphered in the house. This is the most
sensitive and compromising information that you hold. We realize
that this entails the difficulty of not being able to revise or consult
what was written previously before each shipment, but we think it is
worth taking this provisional measure. It is not a problem for us if
some intelligence element comes repeated or with another defect
which obviously cannot help, we understand this perfectly.-- Give
"E" only the ciphered disks. Do not give, for the time being, printed
or photographed material. Keep the materials which you can justify
keeping until we agree that you can deliver them.-- Keep up the
measure of formatting the disks we send you with couriers or letters
as soon as possible, leaving conventional notes as reminders only of
those things to reply to or report.
The message goes on to refer to a "shipment" that contains "Disk 'S1' -
to cipher the information you send," and, as indicated in the previous
section, to "Disk 'R1' to decipher our mailings and radio." Earlier in
the message, there is a reference to "information you receive either via
radio or disk."
23. During the court-authorized search of the residence on May 25, 2001,
two boxes
containing a total of 16 diskettes were observed. During a subsequent
such search on August 8, 2001, a box containing 41 diskettes, later
determined to be blank, were observed. Finally, records obtained from a
Radio Shack store located near MONTES's residence indicate that MONTES
purchased 160 floppy diskettes during the period May 1, 1993, to
November 2, 1997.
III. Communication from MONTES to the CuIS by Pager
24. Based on my knowledge of the methodology employed by the CuIS, I am
aware that a
clandestine CuIS agent often communicates with his or her handling CuIS
officer by making calls to a pager number from a pay telephone booth and
entering a pre-assigned code to convey a particular message. This
methodology was utilized by the defendants in the Hernandez case
described above in paragraph 11.
25. Based on the evidence described below, I believe that MONTES has
been communicating
with her handling CuIS officer in this fashion.
26. In the same message copied from MONTES's hard drive that has been
described earlier
in this affidavit, there is a passage that states:
C) Beepers that you have. The only beepers in use at present are the
following: 1) (917) [first seven-digit telephone number omitted from
this application], use it with identification code 635. 2) (917) [second
seven-digit telephone number omitted from this application]. Use it
with identification code 937. 3) (917) [third seven-digit telephone
number omitted from this application] Use it only with identification
code 2900 . . . because this beeper is public, in other words it is
known to belong to the Cuban Mission at the UN and we assume
there is some control over it. You may use this beeper only in the
event you cannot communicate with those mentioned in 1) and 2),
which are secure.
Based on my experience and knowledge, I have concluded that the
reference to "control over it" in the above passage refers to the CuIS
officer's suspicion that the FBI is aware that this beeper number is
associated with the Cuban government and is monitoring it in some
fashion.
27. In addition, as described previously, the message on the laptop's
hard drive includes a
portion stating that the message recipient "entered the code
communicating that you were having problems with radio reception." Based
on the evidence described above, I have concluded this portion of the
message indicates that MONTES at some point shortly prior to receiving
the message sent a page to her CuIS officer handler consisting of a
pre-assigned series of numbers to indicate she was having communication
problems.
28. Based on evidence obtained during the FBI's physical surveillance of
MONTES
conducted between May and September 2001, I have concluded that MONTES
continues to send coded pages to the CuIS. This evidence is described
below in paragraphs 38 to 45.
III. MONTES's Transmission of Classified Information to the CuIS
29. The same message described above, as well as other messages
recovered from the laptop's hard drive, contained the following
information indicating that MONTES had been tasked to provide and did
provide classified information to the CuIS.
30. In one portion of the message discussed above, the CuIS officer
states:
What *** said during the meeting . . . was very interesting. Surely
you remember well his plans and expectations when he was coming
here. If I remember right, on that occasion, we told you how
tremendously useful the information you gave us from the meetings
with him resulted, and how we were waiting here for him with open
arms.
31. I have replaced in this application with "***" a word that begins
with a capital letter,
which was not translated, and is in fact the true last name of a U.S.
intelligence officer who was present in an undercover capacity, in Cuba,
during a period that began prior to October 1996. The above quoted
portion of the message indicates that MONTES disclosed the U.S.
officer's intelligence agency affiliation and anticipated presence in
Cuba to the CuIS, which information is classified "Secret." As a result,
the Cuban government was able to direct its counter-intelligence
resources against the U.S. officer ("we were waiting here for him with
open arms").
32. The very next section in the message states:
We think the opportunity you will have to participate in the ACOM
exercise in December is very good. Practically, everything that takes
place there will be of intelligence value. Let's see if it deals with
contingency plans and specific targets in Cuba, which are to
prioritized interests for us.
33. I have concluded that the "ACOM exercise in December" is a reference
to a December
1996 war games exercise conducted by the U.S. Atlantic Command, a U.S.
Department of Defense unified command, in Norfolk, Virginia. Details
about the exercise's "contingency plans and specific targets" is
classified "Secret" and relates to the national defense of the United
States.
34. DIA has advised that MONTES attended the above exercise in Norfolk,
as part of her
official DIA duties.
35. In a separate message partially recovered from the hard drive of
MONTES's Toshiba
laptop, the message reveals details about a particular Special Access
Program (SAP) related to the national defense of the United States, and
states: "In addition, just today the agency made me enter into a
program, 'special access top secret. [First name, last name omitted from
this application] and I are the only ones in my office who know about
the program." The details related about this SAP in this message are
classified "Top Secret" / SCI.
36. DIA has confirmed that MONTES and a colleague with the same name as
that related in
the portion of the message described above were briefed into this SAP,
together, on May 15, 1997. Accordingly, I have concluded that the above
message from MONTES to a CuIS officer.
37. In yet another message recovered from the laptop, there is a
statement revealing that "we
have noticed" the location, number and type of certain Cuban military
weapons in Cuba. This
information is precisely the type of information that is within MONTES's
area of expertise, and is, in fact, an accurate statement of the U.S.
intelligence community's knowledge on this particular issue. The
information is classified "Secret." Accordingly, I have concluded that
this message also is a message from MONTES to a CuIS officer.
FBI Physical Surveillance of MONTES and Telephone Records for May to
September 2001
38. FBI physical surveillance of MONTES has shown a recent pattern of
pay telephone calls
by her to a pager number, a communication method that, as described
above in paragraph 24, is consistent with known CuIS communications
plans and operations. In each paragraph below that refers to MONTES
driving, she was utilizing the Toyota described above in paragraph 2.
39. The FBI maintained periodic physical surveillance of MONTES during
the period May
to September 2001. On May 20, 2001, MONTES left her residence and drove
to the Hecht's on Wisconsin Avenue, in Chevy Chase, Maryland. She
entered the store at 1:07 p.m. and exited by the rear entrance at 1:27
p.m. She then sat down on a stone wall outside the rear entrance and
waited for approximately two minutes. At 1:30 p.m., the FBI observed her
walk to a pay phone approximately 20 feet from where she was sitting.
She placed a one minute call to a pager number using a pre-paid calling
card. At 1:45 p.m. she drove out of the Hecht's lot and headed north on
Wisconsin Avenue toward Bethesda, Maryland. At 1:52 p.m. she parked her
car in a lot and went into Modell's Sporting Goods store. She quickly
exited the store carrying a bag and crossed Wisconsin Avenue to an Exxon
station. She was observed looking over her right and left shoulders as
she crossed the Exxon lot. At 2:00 p.m. she placed a one minute call
from a pay phone at the Exxon station to the same pager number using the
same pre-paid calling card. By 2:08 p.m., MONTES had walked back to her
vehicle and was driving back to her residence where she arrived at 2:30
p.m.
40. On June 3, 2001, MONTES engaged in similar communications activity.
She left her
residence at approximately 2:30 p.m. and drove to a bank parking lot at
the corner of Harrison Street, N.W. and Wisconsin Avenue, N.W. She
exited her car at approximately 2:37 pm and entered a Borders Book Store
on Wisconsin Avenue. She left the store approximately 40 minutes later.
She then crossed Wisconsin Avenue to the vicinity of three public pay
phones near the southern exit of the Friendship Heights Metro Station.
At 3:28 p.m. she placed a one-minute call using the same prepaid calling
card to the same pager number she had called on May 20, 2001. After a
few minutes, she walked back to her car and drove to a grocery store.
41. Pursuant to court authorization, on August 16, 2001, the FBI
searched MONTES's
pocketbook. In a separate compartment of MONTES's wallet, the FBI found
the pre-paid calling card used to place the calls on May 20, 2001 and
June 3, 2001. In the same small compartment, the FBI located a slip of
paper on which was written the pager number she had called. Written
above this pager number was a set of digits that I believe comprise one
or more codes for MONTES to use after calling the pager number, i.e.,
after contacting the pager, she keys in a code to be sent to the pager
which communicates a particular pre-established message.
42. On August 26, 2001, at approximately 10:00 a.m., the FBI observed
MONTES making
a brief pay telephone call to the same pager number from a gas
station/convenience store located at the intersection of Connecticut and
Nebraska Avenues, N.W., in Washington, D.C.
43. On September 14, 2001, MONTES left work and drove directly to her
residence. She
then walked to Connecticut Avenue, N.W., in Washington, D.C., still
wearing her business clothes, and made a stop at a dry cleaning shop.
She then entered the National Zoo through the Connecticut Avenue
entrance. She proceeded to the "Prairie Land" overlook where she stayed
for only 30 seconds. She then walked further into the zoo compound and
basically re-traced her route out of the zoo. At approximately 6:30 p.m.
MONTES removed a small piece of paper or card from her wallet and walked
to a public phone booth located just outside the pedestrian entrance to
the zoo. MONTES then made what telephone records confirmed to be two
calls to the same pager number she had called in May, June and August,
as described above. The records reflect that the first call was
unsuccessful, i.e., the call lasted zero seconds. According to the
records, she made a second call one minute later that lasted 33 seconds.
Shortly after making these calls, MONTES looked at her watch and then
proceeded to walk back to her residence.
43. On September 15, 2001, telephone records pertaining to the pre-paid
calling card number
on the card observed in her pocketbook on August 16, 2001, show that
MONTES made a call to the same pager number at 11:12 a.m. that lasted
one minute.
44. On September 16, 2001, MONTES left her residence in the early
afternoon and took the
Metro (Red Line) to the Van Ness - UDC station in Washington, D.C. She
made a brief telephone call from a payphone in the Metro station at
approximately 1:50 p.m., again to the same pager number.
45. MONTES is known to possess a cell phone. A cell phone was observed
during a court authorized search of her tote bag on August 16, 2001. In
addition, during surveillance on September 16, 2001, MONTES was observed
speaking on a cell phone. Furthermore, telephone records obtained in May
2001 confirm that she has subscribed to cell telephone service
continually from October 26, 1996 to May 14, 2001. MONTES's use of
public pay phones notwithstanding her access to a cell phone supports my
conclusion that the pay phone calls described in this section were in
furtherance of MONTES's espionage.
Probable Cause to Seize Documents, Materials and Computer Media
46. My experience has shown that individuals involved in espionage very
often maintain
copies of correspondence, draft documents and even classified government
documents which are themselves of evidentiary value, along with evidence
of criminal and other associations. This evidence includes directories,
lists, news articles, photographs, travel and similar material. The
items and materials utilized by persons engaged in espionage is further
described in Attachment B.
47. MONTES is known to have both a laptop and a desktop computer in her
residence. In
addition, she utilizes a desktop computer in her office in the DIAC.
These computers may be
attached to peripherals such as printers when the search warrants are
executed. Searching these computer systems may require a range of data
analysis techniques. In some cases, it is possible for the agents to
conduct carefully targeted searches that can locate evidence without
requiring a time consuming manual search through unrelated materials
that may be commingled with criminal evidence. Similarly, agents may be
able to locate the materials covered in the warrant by looking for
particular directory or file names. In other cases, however, such
techniques may not yield the evidence described in the warrant.
Criminals can mislabel or hide files and directories; encode
communications to avoid using key words; attempt to delete files to
evade detection; or take other steps designed to frustrate law
enforcement searches for information. These steps all are anticipated to
be applicable in this case. These steps may require agents to conduct
more extensive searches, which can more easily be accomplished with
equipment that cannot be brought to the search sites, such as scanning
areas of the disk not allocated to listed files, or opening every file
and scanning its
contents briefly to determine whether it falls within the scope of the
warrant. In light of these
difficulties, your affiant requests permission to use whatever data
analysis techniques appear
necessary to locate and retrieve the evidence in the computers,
diskettes, and peripherals that are located within the places and items
to be searched, and to remove these items from the places to be searched
so that the items may be searched more thoroughly.
Conclusion
48. Based on the evidence described above, I believe probable cause
exists that from on or
about October 5, 1996, to the date of this affidavit, in the District of
Columbia and elsewhere, ANA BELEN MONTES, conspired, confederated and
agreed with persons known and unknown to violate 18 U.S.C. § 794(a),
that is, to communicate, deliver and transmit to the government of Cuba
and its representatives, officers and agents, information relating to
the national defense of the United States, with the intent and reason to
believe that the information was to be used to the injury of the United
States and to the advantage of Cuba, and that MONTES committed acts to
effect the object of this conspiracy in the District of Columbia and
elsewhere, all in violation of 18 U.S.C. § 794(c).
49. I further believe that probable cause exists that the items and
locations described in
Attachment A contain evidence, fruits, and instrumentalities relating to
the above violation, which evidence fruits and instrumentalities are
further described in Attachment B.
STEPHEN A. McCOY, Special Agent Federal Bureau of Investigation
SWORN TO AND SUBSCRIBED BEFORE ME THIS DAY OF SEPTEMBER, 2001.
UNITED STATES MAGISTRATE JUDGE
ATTACHMENT A
The residence of ANA BELEN MONTES is located at 3039 Macomb Street,
N.W.,
apartment 20, Washington, D.C. 20008. 3039 Macomb Street, N.W., is
titled "The Cleveland
Apartments," and is a three story, red brick building. Apartment 20 is
on the second floor and is the first door on the left.
ATTACHMENT B
1. Espionage paraphernalia, including devices designed to conceal and
transmit national
defense and classified intelligence information and material, and
implements used by espionage agents to communicate with their handlers
and with a foreign government, to wit: white tape, mailing tape, colored
chalk (all used for signaling purposes), coded pads, secret writing
paper, microdots, any letters, notes or other written communications
(including contact instructions) between defendant ANA BELEN MONTES and
any agents of the CuIS or other intelligence service of Cuba; any
computers, (including laptops), computer disks, cameras, film, codes,
telephone numbers, maps, photographs and other materials relating to
communication procedures, correspondence;
2. Records, notes, calendars, journals, maps, instructions, and
classified documents and other papers and documents relating to the
transmittal of national defense and classified intelligence information
(including the identities of foreign espionage agents and intelligence
officers and other foreign assets or sources providing information to
the United States Intelligence Community, such as the FBI and CIA;
records of previous illicit espionage transactions, national defense
transactions, national defense and classified intelligence information,
including copies of documents copied or
downloaded by ANA BELEN MONTES from the DIA);
3. Passports, visas, calendars, date books, address books, credit card,
hotel receipts and
airline records, reflecting travel in furtherance of espionage
activities;
4. Identity documents, including but not limited to passports, licenses,
visas (including those
in fictitious or alias identities), U.S. and foreign currency,
instructions, maps, photographs, U.S. and foreign bank account access
numbers and instructions and other papers and materials relating to
emergency contact procedures and escape routes;
5. Safety deposit box records, including signature cards, bills, and
payment records, safety
deposit box keys, whether in the name of the defendant or a family
member; any records pertaining to any commercial storage sites where the
defendant may be storing other classified intelligence and
counter-intelligence documents or other records of her espionage
activities;
6. Federal, state and local tax returns, work sheets, W-2 forms, 1099
forms, and any related
schedules;
7. Telephone bills and records, including calling cards and pager records;
8. Photographs, including photographs of co-conspirators;
correspondence (including
envelopes) to and from ANA BELEN MONTES and handlers, contacts and
intelligence agents of Cuba;
9. Computer hardware, software, and storage media, known to be used by
the defendant or
to which she had access, including, but not limited to: any personal
computer, laptop computer, modem, and server, which have been and are
being used to commit the offenses of espionage and conspiracy to commit
espionage; records, information and files contained within such computer
hardware containing evidence and fruits of defendant's espionage
activity between October 5, 1996, and the present, including classified
documents, in whatever form and by whatever means they have been created
or stored, including but not limited to any electrical, electronic, or
magnetic form of storage device; floppy diskettes, hard disks, zip
disks, CD-ROMs, optical discs, backup tapes, printer buffers, smart
cards, memory calculators, pagers, personal digital assistants such as
Palm III devices, removable hard drives, memory cards, zip drives, and
any photographic forms of such records
including microfilm, digital prints, slides, negatives, microfiche,
photocopies, and videotapes,
computer terminals and printers used by the defendant in said espionage
activity.
AFFIDAVIT IN SUPPORT OF CRIMINAL
COMPLAINT,
ARREST WARRANT, AND SEARCH WARRANTS
I, Stephen A. McCoy, being duly sworn, hereby state the following under
penalty of perjury:
1. I am a Special Agent of the Federal Bureau of Investigation (FBI) and
have been so
employed for approximately 20 years. I am currently assigned to the
Washington Field Office to a squad responsible for counter-intelligence
relating to Cuba. I have worked in the counterintelligence field for
approximately 15 years and have worked specifically on counter-intelligence
matters involving Cuba for the last 12 years. As a result of my experience
in counter-intelligence investigations and foreign counter-intelligence
training, I am familiar with the strategy, tactics, methods, tradecraft and
techniques of the Cuban foreign intelligence service and its agents.
2. This affidavit is submitted in support of an application for a complaint
and arrest warrant
charging ANA BELEN MONTES with conspiracy to commit espionage, in violation
of 18 U.S.C.§ 794(c), and for applications for four (4) search warrants to
search the following items and locations:
(1) the residence of ANA BELEN MONTES, such premises known and described as a cooperative apartment located at 3039 Macomb Street, N.W., apartment 20, Washington, D.C. 20008, and further described in Attachment A to this affidavit;
(2) a red 2000 Toyota Echo, bearing vehicle identification number
JTDT1231Y0007841 and District of Columbia license plate number 993 190, which is registered to ANA BELEN MONTES and anticipated to be within the District of Columbia;
(3) room C6-146A, 200 MacDill Boulevard, Washington, D.C. 20340, which is the office/work space assigned to ANA BELEN MONTES at the Defense Intelligence Analysis Center located on Bolling Air Force Base;
(4) safe deposit box #526 leased by ANA BELEN MONTES at Riggs Bank, N.A., Friendship Branch, 4249 Wisconsin Avenue, N.W., Washington, D.C.
3. Information in this affidavit is based on my personal knowledge and on information provided to me by other counter-intelligence investigators and law enforcement officers during the course of this investigation. Searches and various forms of surveillance have been conducted pursuant to the Foreign Intelligence Surveillance Act of 1978, as amended (FISA) and orders of the Foreign Intelligence Surveillance Court (FISC).
I. Background
4. ANA BELEN MONTES is a United States citizen born on February 28, 1957, on
a U.S.
military installation in Nurnberg, Germany. She graduated from the
University of Virginia in 1979 and obtained a masters degree from the Johns
Hopkins University School of Advanced International Studies in 1988. She is
single and lives alone at 3039 Macomb Street, N.W., apartment 20,
Washington, D.C. 20008, which residence is further described in Attachment
A. She has registered in her name a red 2000 Toyota Echo, bearing vehicle
identification number JTDT1231Y0007841 and District of Columbia license
plate number 993 190, which is regularly parked in the vicinity of her
residence, and which she regularly uses to commute to her place of
employment.
5. MONTES is currently employed by the Defense Intelligence Agency (DIA) as
a senior
intelligence analyst. Her current office is at 200 MacDill Boulevard,
located on Bolling Air Force Base, Washington, D.C. 20340. Her assigned
office space is C6-146A. She has been employed by DIA as an analyst since
September 1985. Since 1992, she has specialized in Cuba matters. She is
currently the senior analyst responsible for matters pertaining to Cuba.
During the course of her employment, MONTES has had direct and authorized
access to classified information relating to the national defense.
6. Records obtained from Riggs Bank reveal that MONTES has continually
leased safe
deposit box number 526 at Riggs Bank, N.A., Friendship Branch, 4249
Wisconsin Avenue, N.W., Washington, D.C. since September 2, 1993.
7. Classified information is defined by Executive Order No. 12,958, 60 Fed.
Reg.19,825
(1995), as follows: information in any form that (1) is owned by, produced
by or for, or under the control of the United States government; (2) falls
within one or more of the categories set forth in section 1.5 of the order
(including intelligence sources and methods, cryptology, military plans, and
vulnerabilities or capabilities of systems, installations, projects, or
plans relating to the national security), and (3) is classified by an
original classification authority who determines that its unauthorized
disclosure reasonably could be expected to result in damage to the national
security. Under the executive order, the designation "Confidential" shall be
applied to information, the unauthorized disclosure of which reasonably
could be expected to cause damage to the national security. The designation
"Secret" shall be applied to information, the unauthorized disclosure of
which reasonably could be expected to cause serious damage to the national
security. The designation "Top Secret" shall be applied to information, the
unauthorized disclosure of which reasonably could be expected to cause
exceptionally grave damage to the national security.
8. In addition, Executive Order No. 12,958 provides that the secretaries of
State, Defense and
Energy are authorized to create "special access programs" upon certain
specific findings including that the vulnerability of, or threat to,
specific classified information is exceptional. Under such a program, the
safeguarding and access requirements to information covered by the program
exceed those normally required for information at the same classification
level.
9. Under 32 C.F.R. § 159a.9, Sensitive Compartmented Information (SCI)
refers to
information and material that requires special controls for restricted
handling.
10. During her employment at DIA, MONTES has continuously held a security
clearance and
has had regular, authorized access to classified information. I know that a
person who receives such clearances is required to be briefed on the
procedures for properly handling classified information and the penalties
for failing to do so, and that such a person must sign certifications of
understanding and agreement in connection with those briefings. I have
reviewed a "Classified Information Nondisclosure Agreement" (Standard Form
189) that MONTES signed on September 30, 1985. In that document MONTES
acknowledged that she was aware that unauthorized disclosure of classified
information could cause irreparable injury to the United States or could be
used to advantage by a foreign nation, that she would never divulge such
information to an unauthorized person, and that she understood that she was
obligated to comply with laws and regulations that prohibit the unauthorized
disclosure of classified information, and that she further understood such a
disclosure could constitute a violation of United States criminal law
including 18 U.S.C. § 794. I have also reviewed a "Security
Briefing/Debriefing Acknowledgment" form signed by MONTES on May 15,
1997, briefing her into a Special Access Program (SAP). On this date,
specifically in connection with this SAP, MONTES signed a Sensitive
Compartmented Information Nondisclosure Agreement, in which she acknowledged
that the unauthorized disclosure of SCI may violate federal criminal law,
including 18 U.S.C. § 794, and that such disclosure could cause irreparable
injury to the United States or be used to the advantage of a foreign nation.
II. MONTES's Toshiba Laptop Computer and Shortwave Radio
A. Communication From the Cuban Intelligence Service (CuIS) to MONTES via
Shortwave Radio
11. Based on my knowledge and familiarity with the methodology of the Cuban
intelligence
service, I am aware that the CuIS often communicates with clandestine CuIS
agents operating
outside Cuba by broadcasting encrypted messages at certain high frequencies.
Under this method, the CuIS broadcasts on a particular frequency a series of
numbers. The clandestine agent, monitoring the message on a shortwave radio,
keys in the numbers onto a computer and then uses a diskette containing a
decryption program to convert the seemingly random series of numbers into
Spanish-language text. This was the methodology employed by some of the
defendants convicted last June in the Southern District of Florida of
espionage on behalf of Cuba and acting as unregistered agents of Cuba, in
the case of United States of America v. Gerardo Hernandez, et al., Cr. No.
98-721-CR-Lenard(s)(s). Although it is very difficult to decrypt a message
without access to the relevant decryption program, once decrypted on the
agent's computer the decrypted message resides on the computer's hard drive
unless the agent takes careful steps to cleanse the hard drive of the
message. Simply "deleting" the file is not sufficient.
12. Based on the evidence described below, I have concluded that MONTES was
a
clandestine CuIS agent who communicated with her handling CuIS officer in
the manner described above.
13. A receipt obtained from a CompUSA store located in Alexandria, Virginia
indicated that
on October 5, 1996, one "Ana B. Montes" purchased a refurbished Toshiba
laptop computer, model 405CS, serial number 10568512.
14. During a court-authorized surreptitious entry into MONTES's residence,
conducted by
the FBI on May 25, 2001, FBI agents observed in her residence a Toshiba
laptop computer with the serial number set out above. During the search, the
agents electronically copied the laptop's hard drive. During subsequent
analysis of the copied hard drive, the FBI recovered substantial text that
had been deleted from the laptop's hard drive.
15. The recovered text from the laptop's hard drive included significant
portions of a Spanish language message, which when printed out with standard
font comes to approximately 11 pages of text. The recovered portion of the
message does not expressly indicate when it was composed. However, it
instructs the message recipient to travel to "the Friendship Heights
station" on "Saturday, November 23rd." My review of a calendar indicates
that November 23 fell on a Saturday in 1996; the next time thereafter
November 23 falls on a Saturday is in 2002. Accordingly, this message was
composed sometime before November 23, 1996, and entered onto MONTES's laptop
sometime after October 5, 1996, the date she purchased it. Based on its
content, I have concluded that it is a message from a CuIS officer to
MONTES.
16. Portions of the recovered message included the following: "You should go
to the WIPE
program and destroy that file according to the steps which we discussed
during the contact. This is a basic step to take every time you receive a
radio message or some disk."
17. During this same search, the agents also observed a Sony shortwave radio
stored in a
previously opened box on the floor of the bedroom. The agents turned on the
radio to confirm that it was operable. Also found was an earpiece that could
be utilized with this shortwave radio, allowing the radio to be listened to
more privately. Similar earpieces were found in the residences of the
defendants in the Hernandez case, as described above in paragraph 11.
18. The recovered portion of the message begins with the following passage:
Nevertheless, I learned that you entered the code communicating that
you were having problems with radio reception. The code alone
covers a lot, meaning that we do not know specifically what types of
difficulty you are having. Given that it's only been a few days since
we began the use of new systems, let's not rule out that the problem
might be related to them. In that case, I'm going to repeat the
necessary steps to take in order to retrieve a message.
"Here the program deciphers the message and it retrieves the text onto the screen, asking you if the text is okay or not." Near the conclusion of the message, there is the statement "In this shipment you will receive the following disks: . . . 2) Disk "R1" to decipher our mailings and radio."
19. Further analysis of MONTES's copied Toshiba hard drive identified text
consisting of
a series of 150 5-number groups. The text begins, "30107 24624," and
continues until 150 such groups are listed. The FBI has determined that the
precise same numbers, in the precise same order, were broadcast on February
6, 1999, at AM frequency 7887 kHz, by a woman speaking Spanish, who
introduced the broadcast with the words "Attencion! Attencion!" The
frequency used in that February 1999 broadcast is within the frequency range
of the shortwave radio observed in MONTES's residence on May 25, 2001.
B. Communication Between the CuIS and MONTES via Computer Diskette
20. Based on my knowledge of the methodology employed by the CuIS, I am
aware that a
clandestine CuIS agent often communicates with his or her handling CuIS
officer by typing a
message onto a computer, and then encrypting and saving it to a diskette.
The agent thereafter physically delivers the diskette, either directly or
indirectly, to the officer. In addition, as an alternative to sending an
encrypted shortwave radio broadcast, a CuIS officer often will similarly
place an encrypted message onto a diskette and again simply physically
deliver the diskette, clandestinely, to the agent. Upon receipt of the
encrypted message, either by the CuIS officer or the agent, the recipient
employs a decryption program contained on a separate diskette to decrypt the
message. The exchange of diskettes containing encrypted messages, and the
use of decryption programs contained on separate diskettes, was one of the
clandestine communication techniques utilized by the defendants in the
Hernandez case described above in paragraph 11. Although it is difficult to
decrypt a message without the decryption program, the very process of
encrypting or decrypting a message on a computer causes a decrypted copy of
the message to be placed on the computer's hard drive. Unless affirmative
steps are taken to cleanse the hard drive, beyond simply "deleting" the
message, the message can be retrieved from the hard drive.
21. Based on the evidence described below, I have concluded that MONTES was
a CuIS
agent who communicated with her CuIS handling officer by passing and
receiving computer
diskettes containing encrypted messages.
22. The message described above that was contained on the hard drive of
MONTES's laptop
computer contained the following passage:
Continue writing along the same lines you have so far, but cipher the
information every time you do, so that you do not leave prepared
information that is not ciphered in the house. This is the most
sensitive and compromising information that you hold. We realize
that this entails the difficulty of not being able to revise or consult
what was written previously before each shipment, but we think it is
worth taking this provisional measure. It is not a problem for us if
some intelligence element comes repeated or with another defect
which obviously cannot help, we understand this perfectly.-- Give
"E" only the ciphered disks. Do not give, for the time being, printed
or photographed material. Keep the materials which you can justify
keeping until we agree that you can deliver them.-- Keep up the
measure of formatting the disks we send you with couriers or letters
as soon as possible, leaving conventional notes as reminders only of
those things to reply to or report.
The message goes on to refer to a "shipment" that contains "Disk 'S1' - to
cipher the information you send," and, as indicated in the previous section,
to "Disk 'R1' to decipher our mailings and radio." Earlier in the message,
there is a reference to "information you receive either via radio or disk."
23. During the court-authorized search of the residence on May 25, 2001, two
boxes
containing a total of 16 diskettes were observed. During a subsequent such
search on August 8, 2001, a box containing 41 diskettes, later determined to
be blank, were observed. Finally, records obtained from a Radio Shack store
located near MONTES's residence indicate that MONTES purchased 160 floppy
diskettes during the period May 1, 1993, to November 2, 1997.
III. Communication from MONTES to the CuIS by Pager
24. Based on my knowledge of the methodology employed by the CuIS, I am
aware that a
clandestine CuIS agent often communicates with his or her handling CuIS
officer by making calls to a pager number from a pay telephone booth and
entering a pre-assigned code to convey a particular message. This
methodology was utilized by the defendants in the Hernandez case described
above in paragraph 11.
25. Based on the evidence described below, I believe that MONTES has been
communicating
with her handling CuIS officer in this fashion.
26. In the same message copied from MONTES's hard drive that has been
described earlier
in this affidavit, there is a passage that states:
C) Beepers that you have. The only beepers in use at present are the
following: 1) (917) [first seven-digit telephone number omitted from
this application], use it with identification code 635. 2) (917) [second
seven-digit telephone number omitted from this application]. Use it
with identification code 937. 3) (917) [third seven-digit telephone
number omitted from this application] Use it only with identification
code 2900 . . . because this beeper is public, in other words it is
known to belong to the Cuban Mission at the UN and we assume
there is some control over it. You may use this beeper only in the
event you cannot communicate with those mentioned in 1) and 2),
which are secure.
Based on my experience and knowledge, I have concluded that the reference to
"control over it" in the above passage refers to the CuIS officer's
suspicion that the FBI is aware that this beeper number is associated with
the Cuban government and is monitoring it in some fashion.
27. In addition, as described previously, the message on the laptop's hard
drive includes a
portion stating that the message recipient "entered the code communicating
that you were having problems with radio reception." Based on the evidence
described above, I have concluded this portion of the message indicates that
MONTES at some point shortly prior to receiving the message sent a page to
her CuIS officer handler consisting of a pre-assigned series of numbers to
indicate she was having communication problems.
28. Based on evidence obtained during the FBI's physical surveillance of
MONTES
conducted between May and September 2001, I have concluded that MONTES
continues to send coded pages to the CuIS. This evidence is described below
in paragraphs 38 to 45.
III. MONTES's Transmission of Classified Information to the CuIS
29. The same message described above, as well as other messages recovered
from the laptop's hard drive, contained the following information indicating
that MONTES had been tasked to provide and did provide classified
information to the CuIS.
30. In one portion of the message discussed above, the CuIS officer states:
What *** said during the meeting . . . was very interesting. Surely
you remember well his plans and expectations when he was coming
here. If I remember right, on that occasion, we told you how
tremendously useful the information you gave us from the meetings
with him resulted, and how we were waiting here for him with open
arms.
31. I have replaced in this application with "***" a word that begins with a
capital letter,
which was not translated, and is in fact the true last name of a U.S.
intelligence officer who was present in an undercover capacity, in Cuba,
during a period that began prior to October 1996. The above quoted portion
of the message indicates that MONTES disclosed the U.S. officer's
intelligence agency affiliation and anticipated presence in Cuba to the CuIS,
which information is classified "Secret." As a result, the Cuban government
was able to direct its counter-intelligence resources against the U.S.
officer ("we were waiting here for him with open arms").
32. The very next section in the message states:
We think the opportunity you will have to participate in the ACOM
exercise in December is very good. Practically, everything that takes
place there will be of intelligence value. Let's see if it deals with
contingency plans and specific targets in Cuba, which are to
prioritized interests for us.
33. I have concluded that the "ACOM exercise in December" is a reference to
a December
1996 war games exercise conducted by the U.S. Atlantic Command, a U.S.
Department of Defense unified command, in Norfolk, Virginia. Details about
the exercise's "contingency plans and specific targets" is classified
"Secret" and relates to the national defense of the United States.
34. DIA has advised that MONTES attended the above exercise in Norfolk, as
part of her
official DIA duties.
35. In a separate message partially recovered from the hard drive of
MONTES's Toshiba
laptop, the message reveals details about a particular Special Access
Program (SAP) related to the national defense of the United States, and
states: "In addition, just today the agency made me enter into a program,
'special access top secret. [First name, last name omitted from this
application] and I are the only ones in my office who know about the
program." The details related about this SAP in this message are classified
"Top Secret" / SCI.
36. DIA has confirmed that MONTES and a colleague with the same name as that
related in
the portion of the message described above were briefed into this SAP,
together, on May 15, 1997. Accordingly, I have concluded that the above
message from MONTES to a CuIS officer.
37. In yet another message recovered from the laptop, there is a statement
revealing that "we
have noticed" the location, number and type of certain Cuban military
weapons in Cuba. This
information is precisely the type of information that is within MONTES's
area of expertise, and is, in fact, an accurate statement of the U.S.
intelligence community's knowledge on this particular issue. The information
is classified "Secret." Accordingly, I have concluded that this message also
is a message from MONTES to a CuIS officer.
FBI Physical Surveillance of MONTES and Telephone Records for May to
September 2001
38. FBI physical surveillance of MONTES has shown a recent pattern of pay
telephone calls
by her to a pager number, a communication method that, as described above in
paragraph 24, is consistent with known CuIS communications plans and
operations. In each paragraph below that refers to MONTES driving, she was
utilizing the Toyota described above in paragraph 2.
39. The FBI maintained periodic physical surveillance of MONTES during the
period May
to September 2001. On May 20, 2001, MONTES left her residence and drove to
the Hecht's on Wisconsin Avenue, in Chevy Chase, Maryland. She entered the
store at 1:07 p.m. and exited by the rear entrance at 1:27 p.m. She then sat
down on a stone wall outside the rear entrance and waited for approximately
two minutes. At 1:30 p.m., the FBI observed her walk to a pay phone
approximately 20 feet from where she was sitting. She placed a one minute
call to a pager number using a pre-paid calling card. At 1:45 p.m. she drove
out of the Hecht's lot and headed north on Wisconsin Avenue toward Bethesda,
Maryland. At 1:52 p.m. she parked her car in a lot and went into Modell's
Sporting Goods store. She quickly exited the store carrying a bag and
crossed Wisconsin Avenue to an Exxon station. She was observed looking over
her right and left shoulders as she crossed the Exxon lot. At 2:00 p.m. she
placed a one minute call from a pay phone at the Exxon station to the same
pager number using the same pre-paid calling card. By 2:08 p.m., MONTES had
walked back to her vehicle and was driving back to her residence where she
arrived at 2:30 p.m.
40. On June 3, 2001, MONTES engaged in similar communications activity. She
left her
residence at approximately 2:30 p.m. and drove to a bank parking lot at the
corner of Harrison Street, N.W. and Wisconsin Avenue, N.W. She exited her
car at approximately 2:37 pm and entered a Borders Book Store on Wisconsin
Avenue. She left the store approximately 40 minutes later. She then crossed
Wisconsin Avenue to the vicinity of three public pay phones near the
southern exit of the Friendship Heights Metro Station. At 3:28 p.m. she
placed a one-minute call using the same prepaid calling card to the same
pager number she had called on May 20, 2001. After a few minutes, she walked
back to her car and drove to a grocery store.
41. Pursuant to court authorization, on August 16, 2001, the FBI searched
MONTES's
pocketbook. In a separate compartment of MONTES's wallet, the FBI found the
pre-paid calling card used to place the calls on May 20, 2001 and June 3,
2001. In the same small compartment, the FBI located a slip of paper on
which was written the pager number she had called. Written above this pager
number was a set of digits that I believe comprise one or more codes for
MONTES to use after calling the pager number, i.e., after contacting the
pager, she keys in a code to be sent to the pager which communicates a
particular pre-established message.
42. On August 26, 2001, at approximately 10:00 a.m., the FBI observed MONTES
making
a brief pay telephone call to the same pager number from a gas
station/convenience store located at the intersection of Connecticut and
Nebraska Avenues, N.W., in Washington, D.C.
43. On September 14, 2001, MONTES left work and drove directly to her
residence. She
then walked to Connecticut Avenue, N.W., in Washington, D.C., still wearing
her business clothes, and made a stop at a dry cleaning shop. She then
entered the National Zoo through the Connecticut Avenue entrance. She
proceeded to the "Prairie Land" overlook where she stayed for only 30
seconds. She then walked further into the zoo compound and basically
re-traced her route out of the zoo. At approximately 6:30 p.m. MONTES
removed a small piece of paper or card from her wallet and walked to a
public phone booth located just outside the pedestrian entrance to the zoo.
MONTES then made what telephone records confirmed to be two calls to the
same pager number she had called in May, June and August, as described
above. The records reflect that the first call was unsuccessful, i.e., the
call lasted zero seconds. According to the records, she made a second call
one minute later that lasted 33 seconds. Shortly after making these calls,
MONTES looked at her watch and then proceeded to walk back to her residence.
43. On September 15, 2001, telephone records pertaining to the pre-paid
calling card number
on the card observed in her pocketbook on August 16, 2001, show that MONTES
made a call to the same pager number at 11:12 a.m. that lasted one minute.
44. On September 16, 2001, MONTES left her residence in the early afternoon
and took the
Metro (Red Line) to the Van Ness - UDC station in Washington, D.C. She made
a brief telephone call from a payphone in the Metro station at approximately
1:50 p.m., again to the same pager number.
45. MONTES is known to possess a cell phone. A cell phone was observed
during a court authorized search of her tote bag on August 16, 2001. In
addition, during surveillance on September 16, 2001, MONTES was observed
speaking on a cell phone. Furthermore, telephone records obtained in May
2001 confirm that she has subscribed to cell telephone service continually
from October 26, 1996 to May 14, 2001. MONTES's use of public pay phones
notwithstanding her access to a cell phone supports my conclusion that the
pay phone calls described in this section were in furtherance of MONTES's
espionage.
Probable Cause to Seize Documents, Materials and Computer Media
46. My experience has shown that individuals involved in espionage very
often maintain
copies of correspondence, draft documents and even classified government
documents which are themselves of evidentiary value, along with evidence of
criminal and other associations. This evidence includes directories, lists,
news articles, photographs, travel and similar material. The items and
materials utilized by persons engaged in espionage is further described in
Attachment B.
47. MONTES is known to have both a laptop and a desktop computer in her
residence. In
addition, she utilizes a desktop computer in her office in the DIAC. These
computers may be
attached to peripherals such as printers when the search warrants are
executed. Searching these computer systems may require a range of data
analysis techniques. In some cases, it is possible for the agents to conduct
carefully targeted searches that can locate evidence without requiring a
time consuming manual search through unrelated materials that may be
commingled with criminal evidence. Similarly, agents may be able to locate
the materials covered in the warrant by looking for particular directory or
file names. In other cases, however, such techniques may not yield the
evidence described in the warrant. Criminals can mislabel or hide files and
directories; encode communications to avoid using key words; attempt to
delete files to evade detection; or take other steps designed to frustrate
law enforcement searches for information. These steps all are anticipated to
be applicable in this case. These steps may require agents to conduct more
extensive searches, which can more easily be accomplished with equipment
that cannot be brought to the search sites, such as scanning areas of the
disk not allocated to listed files, or opening every file and scanning its
contents briefly to determine whether it falls within the scope of the
warrant. In light of these
difficulties, your affiant requests permission to use whatever data analysis
techniques appear
necessary to locate and retrieve the evidence in the computers, diskettes,
and peripherals that are located within the places and items to be searched,
and to remove these items from the places to be searched so that the items
may be searched more thoroughly.
Conclusion
48. Based on the evidence described above, I believe probable cause exists
that from on or
about October 5, 1996, to the date of this affidavit, in the District of
Columbia and elsewhere, ANA BELEN MONTES, conspired, confederated and agreed
with persons known and unknown to violate 18 U.S.C. § 794(a), that is, to
communicate, deliver and transmit to the government of Cuba and its
representatives, officers and agents, information relating to the national
defense of the United States, with the intent and reason to believe that the
information was to be used to the injury of the United States and to the
advantage of Cuba, and that MONTES committed acts to effect the object of
this conspiracy in the District of Columbia and elsewhere, all in violation
of 18 U.S.C. § 794(c).
49. I further believe that probable cause exists that the items and
locations described in
Attachment A contain evidence, fruits, and instrumentalities relating to the
above violation, which evidence fruits and instrumentalities are further
described in Attachment B.
STEPHEN A. McCOY, Special Agent Federal Bureau of Investigation
SWORN TO AND SUBSCRIBED BEFORE ME THIS DAY OF SEPTEMBER, 2001.
UNITED STATES MAGISTRATE JUDGE
ATTACHMENT A
The residence of ANA BELEN MONTES is located at 3039 Macomb Street, N.W.,
apartment 20, Washington, D.C. 20008. 3039 Macomb Street, N.W., is titled
"The Cleveland
Apartments," and is a three story, red brick building. Apartment 20 is on
the second floor and is the first door on the left.
ATTACHMENT B
1. Espionage paraphernalia, including devices designed to conceal and
transmit national
defense and classified intelligence information and material, and implements
used by espionage agents to communicate with their handlers and with a
foreign government, to wit: white tape, mailing tape, colored chalk (all
used for signaling purposes), coded pads, secret writing paper, microdots,
any letters, notes or other written communications (including contact
instructions) between defendant ANA BELEN MONTES and any agents of the CuIS
or other intelligence service of Cuba; any computers, (including laptops),
computer disks, cameras, film, codes, telephone numbers, maps, photographs
and other materials relating to communication procedures, correspondence;
2. Records, notes, calendars, journals, maps, instructions, and
classified documents and other papers and documents relating to the
transmittal of national defense and classified intelligence information
(including the identities of foreign espionage agents and intelligence
officers and other foreign assets or sources providing information to the
United States Intelligence Community, such as the FBI and CIA; records of
previous illicit espionage transactions, national defense transactions,
national defense and classified intelligence information, including copies
of documents copied or
downloaded by ANA BELEN MONTES from the DIA);
3. Passports, visas, calendars, date books, address books, credit card,
hotel receipts and
airline records, reflecting travel in furtherance of espionage activities;
4. Identity documents, including but not limited to passports, licenses,
visas (including those
in fictitious or alias identities), U.S. and foreign currency, instructions,
maps, photographs, U.S. and foreign bank account access numbers and
instructions and other papers and materials relating to emergency contact
procedures and escape routes;
5. Safety deposit box records, including signature cards, bills, and payment
records, safety
deposit box keys, whether in the name of the defendant or a family member;
any records pertaining to any commercial storage sites where the defendant
may be storing other classified intelligence and counter-intelligence
documents or other records of her espionage activities;
6. Federal, state and local tax returns, work sheets, W-2 forms, 1099 forms,
and any related
schedules;
7. Telephone bills and records, including calling cards and pager records;
8. Photographs, including photographs of co-conspirators; correspondence
(including
envelopes) to and from ANA BELEN MONTES and handlers, contacts and
intelligence agents of Cuba;
9. Computer hardware, software, and storage media, known to be used by the
defendant or
to which she had access, including, but not limited to: any personal
computer, laptop computer, modem, and server, which have been and are being
used to commit the offenses of espionage and conspiracy to commit espionage;
records, information and files contained within such computer hardware
containing evidence and fruits of defendant's espionage activity between
October 5, 1996, and the present, including classified documents, in
whatever form and by whatever means they have been created or stored,
including but not limited to any electrical, electronic, or magnetic form of
storage device; floppy diskettes, hard disks, zip disks, CD-ROMs, optical
discs, backup tapes, printer buffers, smart cards, memory calculators,
pagers, personal digital assistants such as Palm III devices, removable hard
drives, memory cards, zip drives, and any photographic forms of such records
including microfilm, digital prints, slides, negatives, microfiche,
photocopies, and videotapes,
computer terminals and printers used by the defendant in said espionage
activity.