Page:James Gordon Meek Affidavit.pdf/7

 Kik chat with USERNAME 1 in which he described a fantasy of abducting, drugging, and raping USERNAME 1 when she was a 12-year-old girl. Pawny4 also sent USERNAME 1 images of women breastfeeding. At least some of this conversation occurred within two hours of when MEEK used the phone to communicate with his family member.

20. Law enforcement also located approximately 100 additional images depicting children engaged in sexually explicit conduct on the iPhone 8. Most or all of these images were thumbnails and/or stored in cache memory.

C.Other Evidence of Distribution of Child Pornography

21. Law enforcement also seized a 2TB Silicon Power external hard drive from MEEK’s kitchen table during the execution of the search warrant. A review of the external hard drive indicated that it primarily contained back-ups of images and videos from other devices. Several folders were labeled “i6”, and there were folders titled “i5c lacie only”, “i4a”, “i4d”, “i5a”, “i6 lacie only”, and “i8pix080718a”. The folder labeled “i8pix080718a” contained a subfolder called “Bone Machine”, which was the device name for MEEK’s iPhone 8. Based on my training and experience, the structure and names of these folders indicate they were organized by iPhone model. There were also several zip files that were labeled with “iCloud Photos” followed by a number and “.zip”, for example “iCloud Photos 26.zip”. Based on my training and experience, the folders and zip files indicate these folders are backups for pictures and videos from an iCloud account.

22. The external hard drive contained an image titled “IMG_6817.PNG” that depicted a screenshot of the messaging application Telegram on an Apple device. The image was stored at the location pipehitter\0-iphone pix backup072220\iCloud Photos 6, which, as discussed, appears to indicate that the image was saved down to the hard drive from an iCloud backup. At the top of