Docs unsealed in Lavabit case
-
Upload
jonbonachon -
Category
News & Politics
-
view
918 -
download
0
description
Transcript of Docs unsealed in Lavabit case
EXHIBIT 1
the accountts) listed in Attachment A, or to any other person, unless and until otherwise
application of the United States. or the existence of this Order of the Court, to the subscribers of
IT IS FURTHER ORDERED that Lavabit LLC shall not disclose the existence of the
information described in Attachment A to this Order.
shall, within ten days of the date oftbis Order, disclose to the United States the records and other
IT rs THEREFORE ORDERED, pursuant to J 8 U.S.C. §2703(d), that Lavabit LLC
patterns of behavior, or notify confederates. See 18 U.S.C. § 2705(b)(2), (3), (5).
opportunity to flee or continue flight from prosecution, destroy or tamper with evidence, change
this Order will seriously jeopardize the ongoing investigation, including by giving targets an
The Court determines that there is reason to believe that notification of the existence of
relevant and material to an ongoing criminal investigation.
that there are reasonable grounds to believe that the records or other information sought are
The Court finds that the United States has offered specific and articulable facts showing
and other information described in Attachment A to this Order.
service provider andlor a remote computing service located in Dallas, TX, to disclose the records
requesting that the Court issue an Order requiring Lavabit LLC, an electronic communications
The United States has submitted an application pursuant to 18 U.S.C. § 2703(d),
ORDER
Filed Under Seal
MISC. NO. 1:13 EC ~S'-t
UNITED STATES DlSTRICT COURTFOR rrrs EASTERN DISTRICT OF VIRGIN IA
)))))
IN RE APPLICATION OF THEUNITED STATES OF AMERICA FORAN ORDER PURSUANT TO18 U.S.C. §2703(d)
2
A TF)' i~ r-ODV """·-·~1·r:·.. , '11..... _ v. •r I t::..... t...
j~ \~1'lo(:1Date
United States Magistrate Judge
otherwise ordered by the Court.
IT [S FURTHER ORDERED that the application and this Order are sealed until
for Lavabit LLC for the purpose of receiving legal advice.
authorized to do so by the Court, except that Lavabir LLC may disclose this Order to an attorney
2. Information about each communication sent or received by the Account,including the date and time of the communication, the method ofcommunication, and the source and destination of the communication(such as source and destination email addresses, IP addresses, andtelephone numbers).
1. Records of user activity for each connection made to or from the Account,including log files; messaging logs; the date, time, length, and method ofconnections; data transfer volume; user names; and .source and destinationInternet Protocol addresses;
B. An records and other information (not including the contents of communications)relating to the Account, including:
l . Names (including subscriber names, user names, and screen names);2. Addresses (including mailing addresses, residential addresses, business
addresses, and e-mail addresses);3. Local and long distance telephone connection records;4. Records of session times and durations, and the temporarily assigned
network addresses (such as Internet Protocol ("IP") addresses) associatedwith those sessions;
5. Length of service (including start date) and t-ypesof service utilized;6. Telephone or instrument numbers (including MAC addresses);7. Other subscriber numbers or identities (including the registration lnternet
Protocol ("IP") address); and8. Means and source of payment fOT such service (including any credit card
or bank account number) and billing records.
A. The following information about the customers or subscribers of the Account:
Lavabit LLC is required to disclose the following records and other information, if available, tothe United States for each account or identifier listed in Part I of this Attachment ("Account"),tor the time period from inception to the present:
II. Records and Other Information to Be Disclosed
to certain records and information associated with the following emailThe Orderaccount/s):
1. The Account(s)
ATTACHMENT A
SignatureDate
Rules of Evidence.
I further state that this certification is intended to satisfy Rule 902(11) of the Federal
c. such records were made by Lavabit LLC as a regular practice.
activity of Lavebit LLC; and
b. such records were kept in the ordinary course ofa regularly conducted business
knowledge of those matters;
occurrence of the matter set forth, by, or from information transmitted by, a person with
a. all records attached to this certificate were made at or near the time of the
consisting of (pages/Cfis/kilobytes). I further state that:
record in the custody of Lavabi t LLC, and that I am the custodian of the attached records
that each of the records attached hereto is the original record or a true duplicate of the original
title is . I am a custodian of records for Lavabit LLC. r sta1e
contained in this declaration is true and correct. I am employed by Lavabit LLC, and my' official
laws of the United States of America pursuant to 28 U.S.c. § ]746, that the information
I, , attest, under penalties of perjury under the
CERTIFICATE OF AUTHENTICITY OF IJO.MESTIC BUSINESS RECORDSPURSUANT TO FEDERAL RULE OF EVIDENCE 902(11)
· EXHIBIT 2
record user tog-in data (date, time, curation, and Internet Protocol address of all log-ins) on the
the initiation and receipt of such transmissions, to record the duration of the transmissions> and to
and used by Lavabit and the Federal Bureau of Investigation to capture all non-content dialing,
routing, addressing, and signaling information (as described and limited in the Application), sent
from or sent to the SUBJECT ELECTRON1:C MAIL ACCOUNT, to record the date and rime of
IT 1'SORDERED, pursuant xo 18 U.S.C. § 3123, that a pen/trap device may be installed
relevant to an ongoing criminal investigation of the specified offense;
18 U.S.C. §§ 641, 793(d)-{e), and 798(a)(3) .
IT APPEARlNG that the information likely to be-obtained by the pen/trap device is
Lavabit, LLC (hereinafter referred to as the "SUB-JEeT ELECTRONIC Mt\lL ACCOUNT').
The-Court finds that the applicant has certifiedthat the information likely to be obtained by such
installation and use is relevant to an ongoing criminal investigation into possible vioiationts) of
is registered to subscriberassociated With
as defined by Fed. R. Crim. P. 1(b)fl), requesting an Order under 181).S.C. § 3123, authorizing
the installation and use of a pen register and the use of a trap and trace device or process
("pen/trap device") on all electronic: communications being sent from or sent to the account
Assistant United States Attorney, an attorney fOT the Government§ 3122, by
This matter having come before the Court pursuant to an Application under 18 U.S.c.
ORDER
(Under Sea.!)
1:13 EC d.9'l
))))))
IN THE MATIER OF THE APPUCATI-ONOF THE UNITED STATES OF AMEFJCAFOR AN ORDER AUTHORIZING THEINSTALLATION AND USE OF A PENREGISTER/TRAP A:..'N'D TRACE DEVrCEON AN ELECTRONTC MAIL AC(:bVNT
Alexandria Division
TNTHE UN1TED STATES DISTRICT COURT FORTHE
EASTERN DISTRICT OF VIRGIN1A
2
SUBJ.ECT ELECTRONIC MAIL ACCOUNT, all for a period of sixty ~60) days from the date of
such Order or the date the monitoring equipment becomes operational, whichever occurs later;
rr is FURTHER ORDERED, pursuant to 18 U.S.C. § 3123(9)(2), that Lavabit shall
furnish agents from the Federal Bureau of Investigation, forthwith, an information, facilities, and
technical assistance necessary to accomplish the installation and use of the pen/trap device
unobtrusively and with minimum interference to the services that are accorded persons with
respect to whom the installation and use is to take place;
IT IS FURTHER ORDERED that the United States take reasonable steps to ensure thai
the monitoring equipment is not used to capture any "Subject:" portion of an electronic. mail
message, which could possibly contain content;
IT IS FURTHER ORDERED that Lavabit shall be compensated by the Federal Bureau of
Investigation for reasonable expenlles incurred in providing technical assistance;
IT IS FURTHER ORDERED that, in the event that the Implementiag investigative
agency seeks to install and use its OWl1 pen/trap device on a packet-switched data network of a
public provider, the United States shall ensure that a record is maintained which will identify: (a)
any officer(s) who installed the device and any cfficerts) who accessed the device to obtain
information from the-network; (b) the date and time the device Was installed, the date and time
the device was uninstalled, and the date, time, and duration of-each time the device is accessed to
obtain informetion; (c) the conflguration of the.device at the time' of its installation and any
subsequent modification thereof; and (d) any information which has been collected by the device.
To the extent that the pen/trap device can be set to automatically record this information
electronically, the record shall be maintained electronically throughout {he installation and use of
the pen/trap device. Pursuant to 18 U.S.C. § 3123(a)(3)(B), as amended, such recordts) shall be
provided ex parte and under seal to this Court within 30 days of the termination of this Order,
including any extensions thereof;
rr IS fURTHER ORDERED, pursuant to 18U:S.C. § 3123(d), that this Order and the
Application be sealed until etherwise ordered by the Court, and that copies of such Order may be
3
on. Theresa C. BuchananUnited States Magistrate Judge
Da,e:~
T~resa Carroll B~cha:nan .{j~ted States "N1aglStrateJudge
Is!SO ORDERED:
device, or the existence of the investigation to any person, except as necessary to effectuate this
Order, unless or until otherwise ordered by the Conn.
furnished to the Federal Bureau of Investigation, the United States Attorney's Office, and
Lavabit;
IT IS FURTHER ORDERED that Lava-bit shall not disclose the existence of the pen/trap
EXHIBIT 3
information because the user of the account had enabled Lavabii's encryption services, and thus
same afternoon. A representative of Lavabit stated that it could not provide the requested
3. The Federal Bureau of Investigation served a copy of the Order on Lavabit that
of the pen/trap device."
information, facilities, and technical assistance necessary to accomplish the installation and usc
Lavabit "shall famish agents from the Federal Bureau of Investigation, forthwith, all
device would be relevant to an ongoing criminal investigation. In addition, tho Court ordered
2. In its Order, the Court found that the information 10 be collected by the pen/trap
LLC.
. That e-mail account is controlled by Lavahit,electronic mail account
trace device C"pen/b'ap device") on all electronic communications being sent from or sent to the
to 18U.S.C. 9 3123 authorizing the installation and use of a pen register and the usc of a trap and
1. On June 28, 2013, at approximately 4 p.m., this Court entered an Order pursuant
Register/Trap and Trace Order. In support of the motion the United States declares as follows:
enter an Order directing Lavabit, LLC, to comply with the Court's June 28.2013 Pen
The United States, by and through its undersigned counsel, hereby requests the Court
MOTION FOR ENTRY OF ANORDER TO COMPEl ..
1:13 EC 297
))))))
iN THE MATTER OF THE APPLICATIONOF THE UNlTED STATES OF AMERlCAFORAN ORDERAUTHORlZlNG THEfNSTALLATLON AND USE OF A PENREGTSTERffRAP AND TRACE DEVICEON AN ELECTRONIC MAIL ACCOUNT
Alexandria Division
CLEi1l<.. us. O'STRICT COI.;RTAlEXAI..:CRIA. VIRGII-liA
IN THE UNITED STi\TES DISTRICT COURT POR THE ~
~ n ~: r:;'... '-UJjM 2 e 20\'> ~
EASTERl"\f DISTRICT OF VIRGINIA
Lavabit would not provide the requested information. The representative of Lavabit indicated
that Lavabit had the technical capability to decrypt the information but that Lavabit did not want
to "defeat [its J own system."
4. The representative of Lavabit did not comply with the Order, and indicated he
first wanted to seek legal advice.
5. The Pen Register and Trap and Trace Act gives this Court the authority to order a
provider to assist the government in the execution of a lawful pen register or trap and trace order,
including by providing information. Section 3122 of Title 18, United States Code, provides in
part: "An order issued under this scctioo-- ... shall direct, upon the request of the applicant, the
furnishing of information, facilities, and technical assistance necessary to accomplish the
installation of the pen register or trap and trace device under section 3124 of this title." Section
3124(a) provides, "Upon the request of an attorney for the Government or an officer of a law
enforcement agency authorized to install and use a pen register under this chapter, a provider of
wire or electronic communication service ... shall furnish such investigative or law enforcement
officer forthwith all information, facilities, and technical assistance necessary to accomplish the
installation of the pen register unobtrusively and with a minimum of interference ... if such
Assistant United States Attorney
By:
Respectfully submitted,NEIL 1:1. MACBRIDEUnited States Attorney
with the Court's June 28,2013 Order.
Wherefore, the United States requests an Order directing Lavabit to comply forthwith
3124(b) contains a similar provision governing trap and trace orders.
assistance is directed by a court order as provided insection 3123(b)(2) of this title." Section
EXHIBIT 4
the information but did not want to "defeat [its] 0.....'11 system;"
WHEREAS. Lavabit informed the FBI that it had the technological capability to obtain
the relevant information; and
account had enabled Lavabit's encryption services and thus the pen/trap device would not collect
WHEREAS, Lavabit informed the Federal Bureau of Investigation that the user of the
necessary to accomplish the installation and use of the pen/trap device;" and
Federal Bureau of Investigation, forthwith, all information, facilities, and technical assistance
WHEREAS, the Court's Order directed that Lavabit "shall furnish agents from the
be relevant to an ongoing criminal investigation; and
WHEREAS, this Court found that the information obtained by the pen/trap device would
controlled by Lavabit, LLC ("Lavabit")~ and
which is an e-mail accountsent to the electronic mail account
a trap and trace device ("pen/trap device") on all electronic communications being sent from or
pursuant to 18 U .S.C. § 3123 authorizing the installation and use of a pen register and the use of
WHEREAS, on June 28, 2013, at approximately 4:00 p.rn., this Court entered an Order
ORDER COMPELLING COMPLIANCE FORTHWITH
1:13 EC 297
))))))
IN THE MAITER OF THE APPLICATIONOF THE UNITED STATES OF AMERICAFOR AN ORDER AUTHORIZING THEINSTALLATION AND USE OF A PENREGISTERITRAP AND TRACE DEVICEON AN ELECTRONIC MAIL ACCOUNT
Alexandria Division
EASTERN DISTRICT OF VIRGINIACLERK. U.S 01:. n""
....__.._..;_;.;Al:.:.:;::.::.X:~N~" ••
IN THE UNITED STATES DISTRICT COURT FOR THE
~'-.' ,-Hon. Theresa C. Buchanan' ~..United States Magistrate JuC~e:.
~'.' -
Failure to comply with this Order shall subject Lavabit to any penalty within the power of
the Court, " ,._~~ ~ r: ~r; 6,t; ~ ~ c.T~~ ~~,-
-qr~.~
so ORDERED. ~ 11-21.3I I
shall provide such information, facilities, or technical assistance forthwith.
under the control of Lavabit are needed to provide the FBI with the unencrypted data, Lavabit
data pursuant to the Order. To the extent any information, facilities, or technical assistance are
Court's June 28. 2013 Order, and provide the Federal Bureau of Investigation with unencrypted
IT IS HEREBY ORDERED that Lavabit LLC is directed to comply forthwith with the
EXHIBIT 5
1. The United States is conducting a criminal investigation
United States represents:
directing Mr. Levison to appear before this Court on that date. In support of this motion, the
Court convene a hearing on this motion on July 16,20'13, at 10:00 a.m., and issue a summons
disobedience and resistence to these lawful orders. The United States further requests that the
result, why this Court should not hold Mr. Levi-son and Lavabit LLC in contempt for its
Lavabit LLC has failed to comply with the orders entered June 28, 20-13, in this matter and, as a
and operator of Lavabit LLC, an electronic communications service provider, to show cause why
Code, Section 4.01,hereby moves for the issuance of an order directing Ladar Levison, the owner
The United States, through the undersigned counsel, pursuant to Title 18, United States
MOTION OF THE lJNITED STATESFOR AN ORD.ER TO SHOW CAUSE
Alexandria Division
EASTERN DISTRlCT OF VIRGINIA
CtERl( us, OISffilCl COURT~ ~f.~~p.c~_~ ~) FILED UNHER SEA.L
)) No. 1:13EC297)))
IN THE MATTER OF THEAPPLICATION OF THE UNITEDSTATES OF AMERICA FOR AN ORDERAUTHORIZING THE USE OF A PENREGISTER/TRAP AND TRACE DEVICEON AN ELECTRONlC MAIL ACCOtJNT
IN THE UNITED STATES DISTRICT COURT FOR THE
- 2 -
4. On June, 28,2013, FBI special. agents met Me. Levison at his residence in Dallas,
Texas, and discussed the prior grand jury subpoena served on Lavabit LLC and the pen register
order entered that day. Mr. Levison did not have a copy of the order when he spoke with the
agents, but he received a copy from the FBI within a few minutes of their conversation. Mr.
Levison told the agents that he would not comply with the.pen register order and wanted to speak
to an attorney. It was unclear whether Mr. Levison would not comply with the order because it
was technically not feasible or difficult er because it was not consistent with his business practice
of providing secure, encrypted email service for his customers.
order.
order ~n June 11,2013. Mr. Levison responded by mail, which was not received by the
government until June 27, 2013. Mr. Levison provided very little of the information sought by
the June 10,2013 order.
3. On June 28,2013, the United States obtained a pen register/trap and trace order 011
'J account, a copy of which is attached together with the application for that
account. Mr. Levison received thatadditional records and information
June 10,2013, the United States obtained
an order pursuant to 18 U.S.C. § 2703(d) directing Lavabit LLC to provide, within ten days,
- 3 -
other per-sonsunless otherwise authorized to do so by court order: except that Lavabit LLC may
disclose the orders to an attorney for the purpose of obtaining legal advice regarding these orders.
The United States requests that these documents remain under seal, that the non-disclosure
to anyexistence of the govemernnt s applications and the orders to the subscri
5. On June.Zb, 2013, after this conversation with Mr. Levison, the United.States
obtained an Order Compelling Compliance Forthwith, which directed Lavabit to comply with the
pen register order. Copies of that motion and order are .attached.
6. Since June 28, 2013, the FBI has made numerous attempts, without success, to
speak and meet directly with Mr. Levison to discuss the' pen register order and his failure to
provide "all information, facilities, and technical assistance necessary to accomplish the
installation and use of the pen/trap de-vice" as required by that order. As of this date, Lavabit
LLC has not complied with the order.
7. The United States requests that the Court enter the attached proposed order
directing Mr. Levison to show cause why Lavabit LLC has failed to comply with the pen register
order and why> therefore, he should not be held in contempt. The United States requests that this
show cause hearing be scheduled. for July 16,2013, at lO:OOa.m., and that a summons be issued
directing Mr. Levison to appear before this -Court on that date.
8. The June 10, 2013 Section 2703(d} Order and the June 28, 2013 pen register order
remain under seal. In addition, these orders provide that Lavabit LLC shall not disclose the
-4-
Justin W. Williams U.S. Attorney's Building2100 Jamieson AvenueAlexandria, Virginia 22314Phone: 703-299-3700
.. •l
••
• -. • '_.T..
Neil H.MacBride
Respectfully submitted,
pleadings and/or proceedings regarding this motion also be sealed.
provisions of the orders remain in effect, and that this motion and order and any subsequent
PltOPOSEDORDER TfOSHOW CAUSE
order and the June 28, 2013 pen register order shall remain in full force and effect. Mr. Levison
4. The sealing and non-disclosure provisions of the June 10,2013 Section 2703(d)
certified copy of this Order to Show Cause.
together with a copy of the Motion of the United States for an Order to Show Cause and a
3. The Federal Bureau of Investigation shall serve the summons on Mr. Levison
with a certi tied copy of the summons for service on Mr. Levison and Lavabit LLC.
July 16,2013, at 10:00 a.m. The Clerk's Office shall provide the Federal Bureau of Investigation
2. The Clerk's Office shal! issue a summons for the appearance of Mr. Levison on
contempt for its disobedience and resistence to these lawful orders;
June 28, 2013, in this matter and why this Court should not hold Mr. Levison and Lavabit LLC in
at which time he shall show cause why Lavabit LLC has failed to comply with the orders entered
communications service provider, shall appear before this Court on July 16,2013, at 10:00 a.m.,
1. Ladar Levison, the owner and operator of Lavabit LLC, an electronic
good cause having been shown, IT IS HEREBY ORDERED:
Upon motion of the United States pursuant to Title 18, United States Code, Section 40 l ,
ORDER TO SHOW CAUSE
) UNDER SEAL)) No.l:J3EC297)))
IN THE MATfER OF THEAPPLICATION OF THE UNITEDSTATES OF AMERICA FOR AN ORDERAUTHORIZING THE USE OF A PENREOfSTERJTRAP AND TRACE DEVlCEON AN ELECTRON1C MAIL ACCOUNT
Alexandria Division
IN THE UNITED STATES DISTRICT COURT Fo.R THEEASTERN mSTRICT OF VTRG1N1A
- 2-
Claude M. HiltonUnited States District Judge
Entered in Alexandria, Virginia, this __ day of July, 2013
further order of this Court.
subsequent pleadings and proceedings regarding this matter shall be placed under seal until
5. This Order, the Motion of the United States for an Order to Show Cause) and any
attorney for the purpose of obtaining legal advice regarding these orders.
authorized to do so by court order, except that Lavabit LLC may disclose the orders to an
including this Order to Show Cause, to the subscriber or to any other persons unless otherwise
and Lavabit LLC shall not disclose the existence of these applications, motions, and court orders,
EXHIBIT 6
order and the June 28, 2013 pen register order shall remain in full force and effect. Mr.Levison
4. The sealing and non-disclosure provisions of the June 10,2013 Section 2703(d)
certified copy of this Order to Show Cause.
together with a copy of the Motion of the United States for an Order to Show Cause and a
3. The Federal Bureau of Investigation shall serve the summons on Mr. Levison
with a certified copy of the summons for service on Mr. Levison and Lavabit LLC.
July 16,2013, at 10:00 am. The Clerk's Office shall provide the Federal Bureau of Investigation
2. The Clerk's Office shall issue a summons for the appearance of Mr. Levison on
contempt for its disobedience and resistence to these lawful orders;
June 28, 2013, in thismatter and why this Court should not hold Mr. Levison and Lavabit LLC in
at which time he shall show cause why Lavabit LLC has failed to comply with the orders entered
communications service provider, shall appear before this Court on July 16, 2013, at 10:00 a.m.,
l . Ladar Levison, the owner and operator of Lavabit LLC, an. electronic
good cause having been shown, IT IS HEREBY ORDERED:
Upon motion of the United States pursuant to Title 18, United States Code, Section 401,
ORDER TO SHOW CAUSE
CLERK, U,S. OlST!{ICl courilAtEJ.ANORIP •. I:!HGINlt\--
) UNDER SEAL)) No.1 :13EC297)))
IN TIIE MA TIER OF THEAPPLICATION OF THE UNITEDSTATES OF ANfERlCA FORA.."N,ORDERAUTHORIZING THE USE OF A PEN'REGISTERfTRAP A.l\,TDTR.A.CE :::>EVICEON AN ELECTRONIC MAIL ACCOUNT
Jt,1l_ - 9 2013
•Alexandria Division
IN THE UNITED STATES DISTRICT COTJRTFOR THEEASTERN DISTRICT OF VIRGINIA
- 2 -
A TRUE COPYJ TESTE:CLERK. U.S. DISTRICT COllHT
..&<~ ~hc dt~'> I
Claude M. HiltonUnited States District Judge
further order of this Court.
Entered inAlexandria, Virginia, this cpft-day of July, 2013
subsequent pleadings and proceedings regarding this matter shall be placed under seal until
5. This Order, the Motion of the United States for an Order to Show Cause, and any
attorney for the purpose of obtaining legal advice regarding these orders.
authorized to do so by court order, except that Lavabit LLC may disclose the orders to an
including this Order to Show CaUSt~)to the subscriber or to any other persons unless otherwise
and Lavabit LLC shall not disclose the existence of these applications. motions) and court orders,
EXHIBIT 7
Printed name and title
OEPU'l)' CilliK
Date:
o Returned this summons unexecutedA TRUE COPY, TESTE:
CLERKsU.S..DiSTRiCT COl'ST
o Executed and returned chis summons
I declare under penalty of perjury that I have:
Printed name and titleDeputy Clerk
Date: 07/09/2013
See Attached Order
This offense is briefly described as follows:
800- Judge Hilmn I
7/16/13@10:00am iCourtroom No.:
Date and Time:
Place: 401 Courthouse SquareAlexandria, VA 22314
o Probation Violation Petition 0 Supervised Release Violation Petition 0 Violation Notice @ Order of Court
o Complainto Information 0 Superseding Informationo Superseding Indictmento Indictment
YOU ARE SUMMONED to appear before the United States district court at the rime, date, and place set forthbelow to answer to one or more offenses or violations based on the following document filed with the court:
SUMlVIONS l~ A CRIMINAL CASE
Case No. 1:13ec297Ladar Levison
United States of Americav. UNDER SEAL)
))))))De{endtlf'.l
UNITED STA..:rESDISTRICT COURTiorthe
Eastern District of Virginia
AO 83 (Rev. 061(9) Summons in a Criminal Case
EXHIBIT 8
---_ ..-_..-._ -.,
m.~or tb e L\nitcd $c?rc$ Actornc)'Justin W. Willlams Unired S'r.ol,esI\ltornty'~ Buildlltg1100 Jurnlesen Avenue,\tc)(al1drill, Virgini~ Z!314 (703) 299·3700
The name, adcress, email.Mdlcl-:phonc number of the United States euorney, or assisWll United Stati:Saacmey, whorcquesesthi, subpoena, nrc;
CLERK OFJill" II. 2()13Oat::;
If such information is electronically stored or unable to be physically transported to the grand jury, youmay provide :\ copy of the information to the Federal Bureau of Investigation. Provtsron of this iufc rrnatlonto the FBI docs no! excuse your personal appearance.
Any uther information necessary to accompnsn tile instattarton and use Ofthe pen/trap device ordered byJ\ldge Buchanan 011 June 28, 21113, unobtruslvely and with minimum interference to the services (hat arcaccorded persons with respect re whom the insrallation and use 'is to take place;
In addlrion to yuur pcr:sun>11appearance, you are dlrccred to bring to the grand jury the public line privateencryption keys used by hlVabl1..conl in any SSt. (Secure Soekl.:lLayer) or Tt.S (Tr:anspon Security Layer)sessions, including liTfl'S sessions with clients using the tsvabn.com web site and encrypted SMTPeummunlcaticns (or Internet eornm unicetions using other protocols) with mail servers;
You must also bring with you tho following documents, clcctronicaJly stored information, or objects(blnr.l< if not applicible)·.
9:30AMJuly 1<>,2Uljate and Time:Place: UNITED STATES DtSTRlCT COURT401 Courthouse SquareAlexandria. VirginIa Z:zJ14
YOU A.RE COMMANDED to appear and testify before the United States district court at the time. date. andplace shown below to tesify before the court's grand jury. When you arrive, you must remain at the COUI1 until rhejudge or a court officer allows you to leave.
Dallas, TX 7520'1
TO:
1)·1/13(,))2527; 1.\·2451
United States District Courtfor the
Eastern District of VirginiaSUBPOE!~A TO TESTIFY BEFORE THE GR;\.!"ffiJURY
AO 110 (ltev. OIID9) Subpoena 10Tesdl'y Bel'b:c I ~o Jury
Additional infcrmation regarding attempted services, etc:
-:::--.._F.J:.A6~.r:-",~M\L"-'-"'·k:;w;::;.S::_..,>__ • •• _.SeNer's address
Date: Jt.Vl<., I { .'L-tJ, >I
! declare under the penalty of perjury mat this information is true.
n Other (specity):
o I returned the subpoena unexecuted because ; or
o I served the subpoena on (name ofinidivldual)_~--:---:--=-= __ ---,,__ ~-.--,- __ •who isdesignated by law to accept service of process on behalf of (name of E>;gsnization)_______________________ o,n (date) , or
o I left the subpoena at the Individual's residence or usual place of abode with (name).,.-,---.., , e person of suitable age and discretion Who resides there, on(date) , and mailed a copy to the individual's last known address; or
17l...1 personally served the sU,bpoena on the indlv.idual at'(place). Ov)tus. ( J ~ on \-~'--'_-J-l:.l.Ao"_!.L...t,-.:::.!:..J.......c...__ '
This subpoena for (name of indivIdual or organization) ~ IV o£~ ~1·Yv--.was received by me on (date) JIM!.:, tl t h>! 3.
PROOF OF SERVICE
AO 110 {R<;v. O!1Q9} Subpoen2. \0 Testify Befort a Gra:>oJury (Pi!8c 2)
EXHIBIT 9
The Honorable Claude M. Hilton, U.S. District JudgePrinted name and rille
...~u~~.~
Judge 's signatureDate and time i"Ued~
City and state: Alexandria, Virginia . _
o 1find that immediate notification may have an adverse result listed in 18 U.S.C. § 2705 (except for delayof trial), and authorize the officer executing this warrant to delay notice to the person who, or whose property, will besearched or seized (check the appropriate box) Of or days (nor 10 exceed 30).
Ountil, the facts justifying, the later specific date of
(name)
Unless delayed notice is authorized below, you must give a copy of the warrant and a receipr for the propertytaken to the person from whom, or from whose prem ises, the property was taken, or leave the copy and receipt at theplace where the property was taken.
The officer executing this warrant, or an officer present during the execution of the warrant, must prepare aninventory as requiredby law and promptly return this warrant and inventory to United States Magistrate Judge
The Honorable Claude M. Hilton
(not to exceed 14days)!Yf at any time in the day or night as 1 find reasonable cause has been
establ ished.o in the daytime 6:00 a.m. to 10 p.m.
I find that the affidavit(s), Of any recorded testimony, establish probable cause to search and seize the person orproperty.
YOU ARE COMMANDED to execute this warrant on or before
The person or property to be searched, described above, is believed to conceal (Identify (he person or descnbe the
property to be selz:ed):See Attachment B
An application by a federal law enforcement officer 01' an attorney for the government requests the searchof the following person or property located in the: Northern District of Texas(identify the person or describe the properly (0 be searched and give tis locatton):See Attachment A
To: Any authorized law enforcement officer
SEARCH AND SEIZURE WARRANT
Case No.1:13SW522
))))))CONTROLLED BY LAVABIT, LLC
in the Matter of the Search of(Briefly describe the property to be searchedor identify the person by name and address)
DWITH
for theEastern District of Virginia
UNITED STATES DISTRICT COURTUNDEnSEAL
AO QJ (Rev, 12/09) Search and Seizure WIIJTaTII
This warrant applies to information associated with that is
stored at premises controlled by Lavabit, LLC, a company that accepts service of legal process at
Dallas, Texas, 75204,
Property to Be Searched
ATT ACHMENT A
the Lavabit account
b.
including encryption keys and S-SLkeys;
All information necessary to decrypt data. stored in or otherwise associated with
Particular Things to be Seized
L Information to be disclosed by Lavabit, LLC (the "Provider")
To the extent that the information described in Attachment A is within the possession,
custody, or control of the Provider, including any ernails, records, files, logs, or information that
has been deleted but is still available to the Provider, the Provider-is required to dis.close the
following information to the government for each account or identifier listed in Attachment A:
a. All information necessary to decrypt communications sent to or from the Lavabit
AIT ACHMENT B
2
Attachment A, information pertaining to the following matters:
a. All information necessary to decrypt communications sent to or from the Lavabit
e-mail account including encryption keys and S.SL keys;
b. All information necessary to decrypt data stored in or otherwise associated with
the Lavabit
for each account or identifier listed onviolations;
thoseand instrumentalities of violations of 18 U.S.C. §§
U. Information to be seized by the government
All information described above in Section r that constitutes fruits, contraband, evidence
SignatureDate
Rules of Evidence.
I further state that this certification is intended to satisfy Rule 902( 11) of the Federal
C. such records were made by Lavabit, LLC as a regular practice,
activity of Lavabit, LLC; and
b. such records were kept inthe ordinary course of a regularly conducted business
knowledge of those matters;
occurrence of the matter set forth, by, or from information transmitted by, a person with
a, all records attached to this certificate were made at or near the time of the
records consisting of (pages/Cfrs/kilobytes). I further state that:
the original record in the custody of Lavabit, LLC, and that I am the custodian of the attached
LLC. I state that each of the records attached hereto is the original record or a true duplicate of
official title is ' I am a custodian of records for Lavabit,
contained in this declaration is true and correct. I am employed by Lavabit, LLC, and my
laws of the United States of America pursuant to 28 U.S.C. § 1746, that the information
I, , attest, under penalties of perjury under the
CERTIFICATE OF AUTHENTICITY OF DOMESTICBUSINE$;S RECbRDS,PLJ-"RstrANT'TO FEDERAL.RULE
OF EVlnENcE 9.02(11)
EXHIBIT 10
Date ~ LP , 2QJ.5.'~dria, VIrginia
&~4?~- -sZf~ <
The Honorable Claude M. HiltonUnited States District Judge
R. of Crim. Proc.
serve a copy of the warrant on the occupant of the premises as required by Rule 41 of the Fed,
sealed until further Order by the Court. It is further ordered that law enforcement officers may
search warrant, the affidavit in support of the search warrant, Motion to Seal, and this Order be
ORDERED, ADJUDGED, and DECREED that, theapplicationfer search warrant, the
material; it is hereby
legitimate government interest outweighs at this time any interest in the disclosure of the
the government's legitimate interest in concluding the investigation; and having found that this
available alternatives that are less drastic than sealing, and finding none would suffice to protect
to be sealed would jeopardize an ongoing criminalinvestigation; having considered the
presented by the government to Justify sealing; having found that revealing the material sought
The COURT, having considered the government's submissions including the facts
warrant, the'MOTIonto Seal, and proposed Order in this matter; and
application for a search warrant, the search warrant, tb.e affidavit ill support of the search
the United States District Court for the Eastern District of Virginia, having moved to seal the
The UNTTED STATES, pursuant to Local Rule 49(B) of the Local Criminal Rules fOT
ORDER TO SEAL
IN THE MATIER OF THE SEA..R,CH OF
Alexandria Division
UNITED STATES DISTRICT COURTEASTERN DISTRlCT OF VIRGINIAUNDERSE·Al
))))))
THA. T IS STORED AT PREMISESCONTROLLED BY LAVABlT, LLC
EXHIBIT 11
&r:u~.'~, ~The Honorable Claude M. HiltonUnited States District Judge
@.!?t & mrsate )
otherwise ordered by the Court.
IT IS FURTHER ORDERED that the application and this Order are sealed until
purpose of receiving legal advice.
except that Lavabit may disclose the attached search warrant to an attorney for Lavabit for the
subscriber or to any other person, unless ana until otherwise authorized to do so by the Court,
discl.ose the existence of the attached search warrant, or this Order of the Court, to the listed
patterns of behavior, or notify confederates. See 18 U.S.C. § 2705(b)(2), (3), (5).
IT IS THEREFORE ORDERED under 18U.S.C. § 2705(b) that Lavabit shall not
opportunity to flee or continue flight from prosecution, destroy or tamper with evidence, change
the attached warrant will seriously jeopardize the investigation, including by giving targets an
The Court determines that there is reason to believe that notification of the existence of
attached search warrant until further order of the Court.
subscribers or customers of the account(s) listed in the search warrant) of the existence of the
service provider and/or a remote computing service, not to notify any person (including the
requesting that the Court issue an Order commanding Lavabit, an electronic communications
The United States has submitted an application pursuant to 18 U.S.C. § 2705(b),
ORDER
IN RE: APPLICATION OF:THE l,JNITED Case No. 1:13SW522STATES OF AMERICA FOR AN ORDER Filed UnderSeaIPURSUAl\TTTO 18 u.S.C. § 2705(b)
IN THE UNITED STATES DISTRlCTCOURTFOR THE EASTERN DISTRlCT OF VIRGl.NIf\..
U ND·E'R SEAL
EXHIBIT 12
could be installed With minimal impact to the Lavabit LLC system, and the agents told Mr.
2. During the conference call, the FBI explained to Mr. Levison that the pen register
"keys" for encrypted information.
the government. The parties also discussed whether Mr. Levison would be able to provide
system, what data .would be captured by the device, what data would be viewed and preserved by
concerns focused primarily OD how the pen register device would be installed on the Lavabit LLC
installation and operation of a pen register on the targeted email account. Mr. Levison's
conference call was convened to discuss Mr. Levison's questions and concerns about the
prosecutors and FBI agents from the Washington, D.C. field office participated by telephone. The
Texas, at the FBI field office, at the time, and his counsel from San Francisco, California, and
meeting/conference call with Mr. Levison and his then counsel. Mr. Levi~on was in Dallas,
1. Fol1owing the issuance of the Court's Order to Show Cause, the government had a
information in support of its show cause motion filed July 9, 2013:
The United States, through the undersigned counsel, submits the following additional
SUPPLEMENT TO THE MOTION OF THE UNITED STATESFOR AN ORDER TO SHO'" CAUSE
emil. us. [fiST~!Cl COURTAIr~~l!nl<lr I' ~r:I':'~'
'----) FJLED UNDER SEAL)) NO.l:13EC297)))
IN THE MATTER OF THEAPPLICATION OF THE UNITEDSTATES OF AMERJCA FOR AN ORDERAUTHORIZING THE USE OF A PENREGISTER/TRAP AND TR.ACE DEVICEON AN ELECTRONIC MAIL ACCOUNT
Alexandria Division
EASTERN DISTRICT OF VIRGINiA
IN THE UNITED STATES DISTRICT COURT FOR
- 2 -
on the conference call with Mr. Levison, the FBI is reasonably confident that with the encryption
keys, which Mr. Levison can access, it would be able view in an un-encrypted format any
encrypted information required to be produced through the use of the pen register.
4. Mr. Levison and his attorney did not commit to the installation and use of the pen
register at the conclusion of tbe July 10 conference call. On July 11,2'013, counsel who
participated in the conference call informed the government that she no longer represented Mr.
Levison or Lavaoit LLC. In addition, Mr. Levison indicated that he would not come to court
unless the government paid for his travel.
5. On July] 1, 2013, FBI agents served Mr. Levison with a grand jury subpoena
directing him to appear before the grand jury in this district on July 16,2013. As a grand jury
witness, the government was responsible for making Mr. Levison's travel arrangements.
6. On July 11,2013, the undersigned counsel sent Mr. Levison an email indicating
that he has been served with a show cause order from this Court requiring his appearance on July
16,2013, and a subpoena requiring his appearance on the same date before a federal grand jury.
The email further advised Mr. Levison that he should contact the United States Attorney's Office
as soon as possible to make his travel arrangements.
BasedLavabit LLC provides encryption service to paid users3.
Levison that they would meet with him when they were ready to install the device and go over
with him any of the technical details regarding the installation and use of the pen register. As for
the data collected by the device, the agents assured Mr. Levison that the only data that the agents
would review is that which is stated in the order and nothing more (i.e., user log-in information
and the date, time, and duration of the transmissions for the target account).
- 3 -
indicated
National Airport departing that same evening. H~ also had ahotel reservation. Mr. Levison
travel arrangements. He was told that he was booked on a 'flight from Dallas, Texas, to Reagan
9. On July 15,2013, Mr. Levison spoke with the person responsible for making his
office on Sunday afternoon.
contact the person responsible for making his travel arrangements at the United States Attorney's
expense to be added to the $3500 previously claimed. Mr. Levison indicated that he would try to
encryption service) would be $2000. It was unclear in his email if this $2000 was an additional
conference call). Moreover, be indicated that the cost of reissuing the "SSL certificate" (for
does not require real-time access (although this fact was discussed at length during the July 10
reasonable. Mr. Levison responded by email stating that the pen register order, in his opinion,,
a service provider for "reasonable expenses," and the amount he quoted did not appear to be
Furthermore, prosecutors informed him that the statute authorizes the government to compensate
traffic on a real-time basis and providing the FBI with data after 60 days was not sufficient.
prosecu~ors informed Mr. Levison that the pen register is a devise used to monitor ongoing email
8. On July 13,2013, the government responded to Mr. Levison's proposal. The
wanted the data «more frequently" than after 60 days.
him $2000 for «developmental time and equipment" plus an additional $1500 if the government
register order). For this service, Mr. Levison indicated that the government would have to pay
the pen register and provide that data to the government after 60 days (the period of the pen
government prosecutors an email indicating that he would be able to collect the data required by
7. On July 13,2013, Mr. Levison, who was no longerrepresented by counsel. sent
-4-
10. The proceeding before the Court today is to determine whether Lavabit LLC and
Mr. Levison should be held in civil contempt. Civil contempt, as compared to criminal contempt
under rule 42 of the Federal Rules of Criminal Procedure, is intended to coerce compliance with
a court order. There are four elements to civil contempt: (1) the existence of valid order of which
Lavabit LLC and Mr. Levison had actual or constructive knowledge; (2) the order was in the
government's "favor'>; (3) Lavabit LLC and Mr. Levison violated the terms of the order and had
knowledge, or constructive knowledge, of such Violation; and (4) the government suffered harm
as a result. In re Grand Jury Subpoena (T-112), 597 F.3d 189, 2D2 (4th Cir. 20]2).
11. Here, each of these elements has been met. Lavabit LLC, through direct
communication between the government and Mr. Levison, its owner and operator, has had actual
knowledge of the pen register order and the subsequent June 28 order of the magistrate judge
compelling compliance with that order. This Court's show cause order, which was personally
served on Mr. Levison, provided further notice of the violation of those orders by Lavabit LLC.
The government clearly has suffered harm in that it has lost 20 days of information as a result of
non-compliance.
12. Lavabit LLC may comply with the pen register order by simply allowing the FBI
to install the pen register devise and provide the FBI with the encryption keys, If Lavabit LLC
informs the Court it will comply with the order, the government will not seek sanctions. ff,
however, Mr. Levison informs the Court that Lavabit LLC will not comply, the government
requests that the Court impose a fine of$1000 per day, commencing July 17,2013, until Lavabit
LLC fully complies with the pen register order.
13. To the extent that Lavabit LLC takes the position that the pen register does nor
- 5 -
United States ceJustin W. Williams U.S. Attorney's Building2100 Jamieson AvenueAlexandria, Virginia 22314Phone: 703-299-3700
Neil H. MacBride
Respectfully submitted,
The United States will hand deliver a copy of this pleading to Mr. Levison at today's hearing.
14. The Court has sealed this proceeding. This pleading has also been filed under seal.
2703 J thus rendering this argument moot.
the seizure ofthat information pursuant to a warrant under Title 18, United States Code, Section
authorize the production of the encryption keys, the government has asked the Court to authorize
EXHIBIT 13
Tracy L. Westfall OCR-USDC/EDVA
Tracy L. Westfall, RPR, CMRS, CCRCourt Reporter:
Ladar Levison, RespondentFor the Respondent:
James Trump, Esq.Andrew Peterson, Esq.Brandon Van Grack, Esq.Michael Ben'Ary, Esq.
UNITED STATES DISTRICT JUDGE
BEFORE THE HONORABLE CLAUDE M. HiLTON
TRANSCRIPT OF REARING
Alexandria, VirginiaJuly 16, 201310:41 a_roo
UNDER SEAL
TN THE ~ffiTTEROF THEAPPLICATION OF THE UNITEDSTATES OF AMERICA FOR ANORDER AUTHORIZING THEINSTALLATION AND USE OF APEN REGISTER/TR~P AND TRACEDEVICE ON AN ELECTRONICMIUL ACCOUNT
1:13 Ee 297
)))))))))
UNITED STATES DISTRICT COURTEASTERN DIS'TRICT OF VIRGINIA
ALEXANDRIA DIVISION
1
24
23
22
21
18
17
16
15
14
13
12
11
10
9
8
7
6
5
4
3
2
1
Proceedings reported by machine shorthand, transcript produced25 by computer-aided transcription.
20 For the United States:
19 APPEARANCES:
'l'racy L. Nastfall OCR-USDC/~DV!•.
13 paper this morning describing the communication \oJe'vehad \.Jit.h
14 Lavabit, LLC, through Mr. Levison. And I think, very simply, we
15 would like this Court to inquire of Mr. Levison whether he
16 intends to comply with the pen register order which would
17 require him to allow the FBI access to his server to install a
18 device which will extract data, filter that data, and provide
19 that data to the FBI, and to provide the FBI with the encryption
20 keys to the extent there is encrypted information, included
21 among within the body of information called for by the pen
22 register order.
23 As the Court is aware, and as we will provide with
24 Mr. Levison, we obtained a search warrant this morning from Your
25 Honor for the same encryption keys. Thus, to the extent t here 's
THE COURT: All right.
MR. LEVISON: Ladar Levison, the subject of the
summons.
THE COURT: All right. Mr. Trump.
MR. TRUNP: Your Honor, we submitted our supplemental
4 of the United States. With me is Andy Peterson, Brandon
5 Van Grack from the United States Department of JUstice,
6 Mr. Ben'Ary behind me, and Matt Braverman, special agent for the
7 FBI.
8
9
10
11
12
PRO C E E DIN G S
THE CLERK: In Re: Case No. 1:13 EC 297.
MR. TRUMP: Good morning, Judge. Jim Trump on behalf
2UNDER SEAL
1
2
3
Tr;'acy L. ~estfal1 OCR-USDC/8DVA
17 MR. LEVISON: Good morning, Your Honor. I'm not sure
18 what order I should make these in, but I would like to request a
19 couple of things by motion.
20 I'd like to move that all of the nonsensitive portions
21 of the documen1:s tha1:were provided, i.e., everY1:hing except the
22 account in question, be unsealed. I believe it's impor1:an1:for
23 the industry and the people to understand what the governmen1: is
24 reques1:ing by demanding tha1: I turn over 1:hese encryption keys
25 for the entire service.
5 agrees to comply with the order, we would not seek any
6 sanctions. We would ask that he be directed to forthwith make
7 his servers available so the FBI can install that device and to
8 extract the encryption keys.
9 If, however, he informs the Court he is not willing to
10 comply with the order, we would ask 1:heCourt to impose
11 sanctions. We suggested in our pleading a thousand dollars a
12 day to be paid to the United States government until he
13 complies. If he doesriI t comply with that sanction, then "'e
14 would be back in court seeking addi1:ional sanctions or charging
15 additional offenses.
That's where we stand, Your Honor. If Mr. Levison4
1 any question as to whet her Hr. Levison would be required 1:0
2 provide these keys, it's now subject both to the pen register
3 order and the search warrant, the seizure warrant.
THE COURT: All right. Mr. Levison.16
3UNDER SEAL
Tracy L. Westfall OCR-OSDC/eDVA
15 the issuance of a pen register?
16 MR. TRUMP: They have litigated privacy-related issues
17 in the context of process under 2703. I'm not sure -- nOL a pen
18 register, but with respect to 2703.
19 But we discussed this issue with Mr. Levison and his
20 counsel by conference call. We indicated that the only data
21 that the government seeks is that which is required by the pen
22 register order. That it's just the basic header to e-mail
23 traffic, sender, recipient, time, duration, that sort of thing.
24 If Mr. Levison wants to Object to providing the keys,
25 he can certainly object to doing that and then we can proceed
2 Mr. Trump? Deal with the motions before I __
3 MR. TRUMP: What Mr. Levison is trying to do, Your
4 Honor, is invite industry to come in and litigate as a surrogate
5 for him the issue of whether the encryption keys are part and
6 parcel of the pen register order. And that's one of the reasons
7 we sought the search warrantr to make it clear, whether through
8 the search warrant or pen register order, he is required to
9 provide these keys.
10 We know he's been in contact with attorneys who also
11 represent industry groups and others who have litigated issues
12 like this in the ~rlikiLeakscontext and others. But we would
13 object to unsealing this matter because it's just Mr. --
THE COURT: All right. What do you say to that,
THE COURT: And they've done that in connection wich14
4UNDER SEAL
1
Tracy L. lilastfall OCR-USDCfEDVP.
13 separate proceedings.
14 MR. LEVISON: Sorry. I have always agreed to the
15 installation of the pen register device. I have only ever
16 objected to turning over tbe SSL keys because that would
17 compromise all of the secure communications in and out of my
18 network, including my own administrative traffic.
19 THE COURT: Well, didn't my order already include that?
20 NR. LEVISON: I do not believe so, sir.
21 THE COURT: Did my initial order -- I don't recall at
22 the moment. Did my initial order recall the encrypted devices
23 with the installation of a pen register?
24 MR. TRUMP: The pen register, as issued, just required
25 all assistance, technical assistance, facilities, and
1 from there, but I don't think he's entitled to try to make this
2 a public proceeding to invite others in to litigate those issues
3 on his behalf.
4 THE COURT: All right. Well, I believe that to be
5 correct. I mean, this is a criminal investigation. A pen
6 register has been ordered and is here at issue, and any motion
7 to unseal that will be denied.
8 You said you had another motion, I believe?
9 MR. LEVISON: Yeah. My issue is only with the SSL
10 keys. So if that is litigated separately and that portion of
11 the proceeding is unsealed, I'm comfortable with that.
THE COORT: I don't understand what you're saying,12
5UNDER SEAL
Tracy L. Westfall OCR-USDC/iWVA
8 ordered nothing but that the pen register be put in place.
9 MR. TRUMP: And all technical assistance, information,
10 and facilities necessary to implement the pen register. And
11 it's our position that without the encryption keys, the data
12 from the pen register will be meaningless. So to faciliLate the
13 actual monitoring required by the pen register, the FBI also
14 requires the encryption keys.
15 THE COURT: Well, that could be, but I don't know that
16 I ne€d -- I don't know that I need to reach that because I've
17 issued a search warrant for that.
18 MR. TRUMP: Correct, Your Honor. That the -- to avoid
19 litigating this issue, we asked the Court to enter the seizure
20 warrant.
21 THE COURT: Well, what I'm saying is if he agrees that
22 the pen register be established, and that the only thing he
23 doesn't want to do in connection with the pen register is to
24 give up t.heencryption device or code
25 MR. LEVISON: I've aLways maintained that.
1 information, to facilitate the pen register.
2 This morning the search warrant required
3 THE COURT: Yeah, but the search warrant's a different
4 matter now. That's not before me this morning. The only thing
5 that's before me this morning is the pen register.
6 MR. TRUMP: Correct.
THE COURT: So as I understand it, my initial order7
6UNDER SEAL
7
Tracy L. ~~estfall OCR-USDC/E;OVA
15 subpoena demanding those same keys, which I brought with me in
16 the event that we would have to address that subpoena.
17 THE COURT: I don't know, Mr. Trump. I don't think I
18 want to get involved in asking him. You can talk with him and
19 see whether he's going to produce them or not and let him tell
20 you. But I don't think I ought to go asking what he's going to
21 do and what he's not gOing to do because I cantt take any action
22 about it anyway.
23 If he does not comply with the subpoena, there are
24 remedies for that one way or another.
25 MR. TRUMP: Well, the original pen register order was
MR. LEVISON: Your Honor, I've also been issued a14
12 him, Your Honor. We can serve him with the warrant and ask him
13 if he's going to comply rather than --
MR. TR~1P: Well, it's the same issue. You could ask11
7 Mr. Levison whether he w Ll.L produce the encryption keys pursuant:
8 to the search wazrant;that Your Honor just signed.
9 THE COURT: But I can't deal w i.th that this morning,
10 can I?
THE COORT: All right. So that ends our -
MR. TRUMP: Well, then we have to inquire of
5
6
1 THE COURT: -- so we've got no issue here. You're
2 ready to do that?
3 MR. LEVISON: I've been ready to do that since Agent
4 Howard spoke to me the first time.
UNDER. SEAL
'l'racy L. We~tfall OC"K-OSDC/EDVA
13 don't know if I'm wording this correctly, but what was in that
14 order to compel was a statement that was incorrect.
15 Agent Howard seemed to believe that I had the ability
16 to encrypt the e-mail content stored on our servers, which is
17 not che case. I only have the keys that govern communications
18 into and out of the network, and those keys are used to secure
19 the traffic for all users, not just the user in question.
20 So the statement in that order compelling me to decrypt
21 stuff and Agent Howard stating that I have the ability to do
22 that is technically false or incorrect. There was never an
23 explicit demand that I turn over these keys.
24 THE COURT: I don't know what bearing that would have,
25 would it? I mean, I don't have a problem -- Judge Buchanan
1 followed by a compulsion order from Judge Buchanan. The
2 compulsion order required the encryption keys to be produced.
3 So, yes, part of the show cause order is to require
4 compliance both with the pen register order and the compulsion
5 order issued by Judge Buchanan.
6 And that order, which was attached to the show cause
7 order, states, "To the extent any information, facilities, or
8 technical assistance are under the control of Lavabit are needed
9 to provide the FBI \.;i th the encrypted data, Lavabit shall
10 provide such information, facilities, or technical assistance
11 forthwith."
MR. LEVISON: I would object to that statement. I12
8UNDER SEAL
'l'racy L. vlestfall OCR-USDC/EOVA
25 his assistance. He's the only who knows and has possession of
MR. TRUMP: Well, we can't get the information without24
14 THE COURT: But right now there's nothing for me to
15 address here unless he is not telling me correctly about the pen
16 register.
17 MR. TRUMP: Well, we can -- Your Honor, if we can talk
18 to Mr. Levison for five minutes, we can ask him whether he 'l-lill
19 honor the warrant that you just issued.
20 MR. LEVISON: Before we do that, can I --
21 THE COURT: Well, what can I do about it if he doesn'~,
22 if he tells you he's not going to? You've got the righ~ to go
23 out and search and get it.
11 comply with the subpoena, then that has -- I have to address
12 that.
THE COURT: If he doesn't comply -- if he doesn't10
1 issued an order in addition to mine, and I'm not sure I ough~ to
2 be enforcing Judge Buchanan's order.
3 My order, if he says that he will produce or allow the
4 installation of the pen register, and in addition I have issued
5 a search warrant for the codes that you want, which I did this
6 morning, that's been entered, it seems that this issue is over
7 as far as I'm concerned except I need to see that he allows the
8 pen register and complies with the subpoena.
9 MR. TRUMP: Correc~.
MR. TRUMP: Right.13
9UNDER SEAL
Tracy L. Wes~fall OCR-USDC/EDV~
8 Your Honor.
9 THE COURT: I knoh'you are. And I'd love for you-all
10 to get togethar and do that. I don't want to deal with it
11 either. But I don't think we can sit around and agree that
12 there's going to be a default and I will address it before it
13 occurs.
14 MR. TRUMP: Irm just trying to figure out whether
15 there's going to be a default. Weill take care of that, Judge.
16 THE COURT: You can. I think the way we've got to do
17 this -- and I'll listen to you. I'm cutting you off, I know,
18 but I'll listen to you in a minute.
19 The way we have to do this, the hearing that's before
20 me this morning on this issue of the pen register, that's been
21 resolved, or so he's told me. I don't know whether you want to
22 continue this one week and see if he complies w i th that, which I
23 guess would be prudent to do, or a few days for him to comply
24 with the pen register. Then we will wait and see what happens
25 w i.th the subpoena.
4 You're trying to get me ahead. You're trying to get me
5 to deal with a contempt before there's any contempt, and I have
6 a problem with that.
THE COURT: Wait just a second.3
1 it. We can't take it from him involuntarily.
2 MR. LEVISON: If I may, sir, my other
MR. TRUMP: I'm trying to avoid contempt altogether,7
10UNDER SEAL
Tracy L, ~~estfall OCR-USDC/EDV,ll,
16 all the government needs to do is contact me and set up an
17 appointment to install that pen register. So I don't know why
18 there has never been any confusion about my w i.Ll.Lnqne ss to
19 install it. I've only ever objected to the providing of those
20 keys which secure any sensitive infOrmation going back and
21 forth.
22 But my motion, and I'm not sure if it's relevant or not
23 because it deals more with the issue of the subpoena demanding
24 the keys and for what will be the forthcoming search warrant,
25 would be a continuance so that I can retain counsel to address
THE COURT: Okay. Now, did you want to say anything13
14 else?
11 warrant on him as soon as we conclude this hearing, and we'll
12 find out whether he will provide the keys or not.
~ffi. TRUMP: That's fine, Your Honor. We will serve the10
1 Because as far as my pen register order is concerned,
2 he says he 1s going to comply \-lith it. So that issue's over and
3 done with. The next issue will be whether or not he complies
4 with the subpoena. And I don't know and I don't want to
5 presQ~ef and I don't want him to represent to me what he intends
6 to do when he can very well go home and decide he's going to do
7 something different.
8 When that warrant is served, we'll know what he's going
9 to do. I think we've got -- I don't see another way to do it.
MR. LEVISON: Well, I mean, I've always maintained that15
11UNDER SEAL
12
Txacy L. We~tfall OCR-USDC/EDVA
25 government return to the Court records --
MR. LEVISON: Okay. I mean, it requests that the24
22 any other additional or extra monitoring you might want or Lhink
23 is appropriate \..111 be denied, if that's what; you're .request Lnq .
THE COURT: No. The law provides for those thingSr and21
13 don 't, know. They haven't served the warrant yet. I have no
14 idea. Don't know what1s going to happen with it. You'll just
15 have to figure that out, and it be wise to have a lawyer to do
16 it, I would think.
17 MR. LEVISON: I guess while I'm here in regards to the
18 pen register, would it be possible to request some sort of
19 external audit to ensure that your orders are followed to the
20 letter in terms of the information collected and preserved?
MR. LEVISON: Okay.
THE COURT: I don't know what's going to happen. I
11
12
1 that particular issue.
2 THE COURT: Well, I mean, there's nothing before me
3 with that. I Ive issued the subpoena. Whatever happens with
4 that, that's -- you're trying to get me to do what Mr. Trump
5 wanted to do and to arrange this beforehand.
6 MR. LEVISON: 1f'7ell,I don't know if I have to appear
7 before that grand jury right now and give the keys over or face
8 arrest. I'm not a lawyer so I don't understand the procedure.
9 THE COURT: I don't know either. You need to have --
10 it would be wise to have a lawyer.
ONDER SEAL
Tracy L. Wes~fall OCR-USDC/EDVA
T!·l_E COURT: Well, that is a practical matter --MR. TRUMP: That's a practical --THE COURT: -- but I don't think it is a moot issue. r
mean, you-all have got the right to go in and put on that pen
14
15
16
17
18 register. He says that he will do it. That's all that I've
19 ordered.
20 Now, the other business about ordering that, Judge
21 Buchanan made an order that he's going to have to supply what
22 you say is the encryption codes to make the information useful.
23 I don'~ know. I didn't enter that order. I have trouble making
24 that connection.
25 If you're going to -- I don't know whether you want to
13 without the encryption keys.
MR. TRUMP: We can, Your Honor. It's a moot issue12
11 date to see that he complies with the pen r:egister?
THE COURT: Should .."e continue this to some specific10
8 device. I just have some concern about ensuring that it's used
9 properly.
MR. LEVISON: I've a.Lways been willing to accept the7
6 regard. Your lawyer can fill you in if you want to know.
THE COURT: The law sets out what is done in that5
4 fine.
MR. LEVISON: They can handle that separately. That's3
2 law requires for the issuance of a pen register.
THE COURT: You need to talk to a Lawye r about what the
13UNDER SEAL
1
Tracy T,. I~estfall OCH-USDC/E.DVA
23 for determining whether or not that pen register has been
24 installed as you request.
25 We can make it 10 o'clock.
THE COURT: Let's continue it a week from Friday.
MR. TRUMP: A week from Friday.
THE COURT: What date's that? The
THE CLERK: 26th.
THE COURT: The 26th?
MR. LEVISON: Acceptable to me.
THE COURT: We'll continue it to the 26th, and that's
16
17
18
19
20
21
22
12 till a week from Friday?
13 MR. TRUMP: Or a week from today.
14 MR. LEVISON: I'm not available within hours of my
15 return, but I can meet with you on Thursday.
1 do something in front of Judge Buchanan or not.
2 MR. LEVISON: You see, Judge~ though that I've always
3 been willing. They just didn't feel the need to set up an
4 appointment.
5 THE COURT: What do you want me to do with this case?
6 You want me to continue it? You want me to say it's moot right
7 now and just end it?
8 MR. TRUMP: No. I think we can continue it. I don't
9 know Mr. Levison's schedule. It can be done within hours of his
10 return to Dallas.
THE COURT: Of course he can. You want to continue it11
14UNDER SEAL
Tracy L. West:fall OCR-USDC/EDVA
7 (Proceedingsconcluded at 11:02 a.m.)
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
4 All right. Thank you-all. We'll adjourn till t.omorrov...
5 morning at 9: 30.
6 * * *
THE COURT: All right. Thank you.3
2 time.
MR. LEVISON: I'll remember 10:00 instead of 10:30 this
15
1
Tracy L. Westfall OCR-t)SDC/EDVT,
Tracy
7
8
9
10
11
12
13
14
15
16
17
18'
19
20
21
22
23
24
25
1 CERTIFICATION
2
3 I certify, this 17th day of Septa~ber 2013, that the
4 foregoing is a correct transcript from the record of proceedings
5 in the above-entitled matter to the best of my ability.
6
16
EXHIBIT 14
Alexandria, VirginiaJuly Ie ' 2013
&~~l_~e~CLAUDE M. HILTONUNITED STATES DISTRICT JUDGE
further proceedings.
this matter is continued to Friday, July 26, 2013 at 10:00 a.m. for
ORDERED that Ladar Levinson's Motion To Unseal is DENIED and
For the reasons stated from the bench, it is hereby
Lavabi t I LLC in contempt I and Ladar Levinson's oral lvlotionTo Unseal.
of June 28, 2013 and why this Court should not hold Mr. Levinson and
as to why Lavabit, LLC has failed to comply with the Court's order
that Ladar Levinson, the owner and operator of Lavabit, LLC show cause
This matter comes before the Court on the Government's Motion
ORDER
Criminal No. 1:13EC297
IN THE MATTER OF THEAPPLICATION OF THE UNITEDSTATES AUTHORIZING THE USE OFA PEN REGISTER/TRP_P AND TR~CEDEVICE ON .~~ ELECTRONIC K~LACCOUNT
IN THE UNITED STATES DISTRICT COURT
FOR THE EASTERN DISTRICT OF VIRGINI Tr=:;-'-,,-~~-_Alexandria Division tL ~
EXHIBIT 15
1
layers r'SHU'), to protect its users' privacy. Lavabit maintains an encryption
customers. ,Lavabit uses various encryption methods, including secured socket
business model focuses on providingprivate and secure email accounts to its
Lavabit is an encrypted email service provider. As such, Lavabit's
BACKGROUND
United States Attorney (collectively"Government>').
served on them by the Federal Bureau of Investigation and the Officeof the
this Court to quash the grand jury subpoena and search and seizure warrant
Lavabit LLC n~avabit") arid Mr. Ladar Levinson ("Mr. Levinson"] move
MOTION TO QUASH SUBPOENA AND SEARCH WARRANT ANDMEMORANDUM OF LAW IN' SUPPORT OF MOTION
No. 13-1
No.1: 13SW522
Clft.R. U,S,esmcr COUflTAlEXMJrlfi~,\.VUlCan:,
No. 1;13EC297
FILED UNDER SEAL
In re Grand Jury
IN THE MATTER OF THE SEARCHAND SEIZURE OF INFORMATION
WTHTIS
STORED AND CONTROLLED ATPRETYrISES CONTROLLED BYLAVABIT LLC
IN THE MATTER OF THEAPPLICATION OF THE UNITEDSTATES AUTHORIZING THE USEOF A PEN REGISTER/TRAPAND TRACE DEVICE ON ANELECTRONIC MAIL ACCOUNT
AlexandriaDivision
EASTERN DISTRICT OF ViRGINIA
IN THE UNITED STATES DISTRICT COURT FOR THE
2
1The grand Jury subpoena not only commanded Mr. Levinson to appear before this Court onJuly 16, 2013, but also to bring Lavabit's encryption keys. Mr. Levinson's subpoena to appeal'before the grand jury was withdrawn, but the government continues to seek the encryptionkeys. Lavabit is only seeking to quash the Court's command that Mr. Levinson provide theencryption keys.
a. The Lavabit Subpoena and Warrant EssentiaUy Amounts to aGeneral Warrant.
unreasonable under the Fourth Amendment..
Email Account in question. As a result, the Lavabit Subpoena and Warrant are
not narrowly tailored to seek only data and communications relating to the
the rest of its customers' accounts, The Lavabit Subpoena and Warrant are
regarding the Email Account, Lavabit has a duty to maintain the security for
these users. While Lavabit is willing to cooperate with the Government
matter. However, production of the Master Keywin compromise the security of
accounts. None of these other users' email accounts are at issue in this
all of the communications and data stored in each of Lavabit's 400,000 email
Account"), butunlimited access to not
If the Government gains access to Lavabit's Master Key, it will have
ARGUMENT
Lavabit S'Ubpoena and \To!arrant").
communications and data stored in one specific email address
and SSL keys used by Iavabit.com in order to access and decrypt
subpoenal and a search and seizure warrant, to produce the encryption keys
from its server ("Master Key"). The Goverrirnerit has commanded Lavabit, by a
key, which may be used by authorized users decrypt data and communications
3
Though the Lavabit Subpoena and Wan-ant superficially appears to be
narrowly tailored, in reality, it operates as a general warrant by giving the
Government access to every Lavabit user's communications and data.
It is not what the Lavabit Subpoena and Warrant defines as the boundaries for
the search, but the method of providing access for the search which amounts to
a general warrant.
It is axiomatic that the Fourth Amendment prohibits general warrants.
Andresen v. Maryland, 427 U.S. 463, 480 (1976). Indeed "it is familiar history
that indiscriminate searches and seizures conducted under the authority of
'general warrants' were the immediate evils that motivated the framing and
adoption of the Fourth Amendment." Payton v. New York, 445 U.S. 573, 583
(1980) (footnote omitted). To avoid general warrants, the Fourth Amendment
requires that "the place to be searched" and "the persons or things to be seized"
be described with particularity. United States u. Moore, 775 F. Supp. 2d 882,
898 (E.D. Va. 2011) (quoting United Sta:tesv. Grubbs, 54·7U.S. 90, 97 (2006)),
The Fourth Amendment's particularity requirement is meant to "prevent[J
the seizure of one thing under a warrant describing another.') Andresen, 427
U.S. at 480. This is precisely the concern with the Lavabit Subpoena and
Warrant and) in this circumstance, the particularity requirement will not
protect Lavabit. By turning over the Master Key, the Govemment will have the
ability to search each and every "place," "person [and] thing' on Lavabit's
network.
4
The Lavabit Subpoena and Warrant allows the .Government-tc do a
"general, exploratory rummaging" through any Lavabit user account. See id.
(quoting Coolidge v. New Hampshire, 403 U.S. 443,467 (1971)) (describing the
issue with general warrants "is not that of intrusion per se, but of a general,
exploratory rummaging in a person's belongings"). Though the Lavabit
Subpoena and Warrant is facially limited to the Email'Address, the
Government would be able to seize communications, data and information from
any account once it is given the Master Key.
.There is nothing other than the «discretion of the officer executing the
warrant" to prevent an invasion of other Lavabit user's accounts and private
emails.Seeid.at 492 (quoting Stanford v. Texas, 379 u.S. 476,48-5 (1965))
(explaining that the purpose of the particularity requirement of the Fourth
Amendment is to ensure, with regards to what is taken that, «nothing is left to
the discretion of the officer executing the warrant.") (internal citation omitted).
Lavabit has no assurance that any searches conducted utilizing the Master Key
will be Iimited solely to the Email Account. See Groh v. Ramirez, 540 U.S. 551,
561-62 (2004) (citing Camara v. Municipal Court of City and County of San
Francisco, 387 U.S. 523,532 (1967)) (noting that a particular warrant is to
provide individuals with assurance "of the lawful authority of the executing
officer, his need to search, and the limits of his power to search) (emphasis
added}. Lavabit has a duty to its customers to protect their accounts from the
possibility Of unlawful intrusions by third parties, including government
entities.
5
should not suffer because of the alleged misdeeds of another Lavabit user.
wrongdoing or criminal activity in relation to this suit. Their privacy interests
Government's access to the Master Key and have not been accused of
Email Address. Other Lavabit 'users would be severely impacted by the
Probable cause here is based on the activities.of the individual linked to the
at 897 {quoting United states v. Hurwitz, 459 F.3d 463, 473 (4t.h Cir. 2006)).
broader than the probable cause on which it is based." Moore, 775 F. Supp. 2d
other users accounts. "The Fourth Amendment ...requires that a warrant be no
Additionally, the Government has no probable cause to gain access to the
"material" to the investigation. Id.
Key, to several hundred thousand user's information, all of who are not
However, the Government will be given unlimited access, through the Master
information "relevant and material to an ongoing.criminal investigation."
one individual. 18 U.S.C: § 2703(d) states that a court order may be issued for
access to 400,000 user's private accounts in order to gain information about
The Government, by commanding Lavabit's encryption keys, is acquiring
given access to data and communications that are wholly unrelated to the suit.
Because of the breadth ofWarrant and Subpoena) the Government will be
b. The LavabitSubpoenaand Warrant Seeks Information that IsN"()tl'ilaterial to the Investigation.
search individual users not subjection to this suit, without limit.
invalid as they operate as a general warrant, allowing the Government to
As the Lavabit Subpoena and Warrant are currently framed they are· .
6
could be destroyed if it is required to produce its Master Key.
Lavabit's business, which is foundedon the preservation of electronic privacy,
business-should the Court require that the Master Keybe turned over.
far, but, Lavabit will pay the ultimateprice-the loss of its customers' trust and
deal of time and money in attempting to cooperate with the Government thus
continue to cause injury to Lavabit. Not only has Lavabit expended a great
date and communications' related to the EmailAddress, has caused and will
circumstances are distinguishable. The Government, in pursuit of information
cognizable by the Fourth Amendment." Id. at 138. However,Lavabit's
Va. 2011). In that case, the Petitioners failed to allege "a personal injury
US.C. 2703(d) rTwitter') addresses similar issues. 830 F. Supp. 2d 114 (E.n.
The recent case of In re Application oftlte U.S. for an Order Pursuant to 18
undue burden on such provider.") (emphasis added).
voluminous innature or compliance with such order otherwise would cause an
modify [an] order, if the information or records requested are unusually
18 U.S.C. § 2703(d) (stating that "the service provider may [move to] quash or
Government access to its entire network, would,be unduly burdensome. See
Further compliance, by turning over the Master Key and granting the .
incurred legal fees and other costs in order to complywith the Court's orders.
As a non-party and unwilling participant to this suit, Lavabit has already
c: Compliance with Lavabit Subpoena and Warrant Would Causean Undue Burden.
7
Lavabit is also a fundamentally different entity than Twitter, the business
at issue in Twitter. The Twitter Terms of Service specifically allowed user
information to be disseminated. Id. at 139. Indeed, the very purpose of Twitter
is for users to publically post their musings and beliefs on the Interne.t. In
contrast, Lavabit is dedicated to keeping its user's information private and
secure. Additionally, the order in Twitter did not seek "content information"
from Twitter users, as is being sought here. Id. The Government's request for
Lavabit's Master Key gives it access to data and' communications from 400,000
email secure accounts, which is much more sensitive information that at issue
in the Twitter.
The Government is attempting. in complete disregard of the Fourth
Amendment, to penetrate a system tha.t was founded for the sole purpose of
. privacy. See Katz v. United States, 389 U.S. 347, 360 (1967) (stating that '(the
touchstone of Fourth Amendment analysis is whether a person has a
constitutionally protected reasonable expectation of privacy") (internal citations
omitted). For Lavabit to grant the Government unlimited access to every one of
its users accounts would be to disavow its duty to its users and the principals
upon which it was founded. Lavabit's service will be rendered devoid of
economic value if the Government is granted access to its secure network. The
Government does not have any proper basis to request that Lavabit blindly
produce its Master Key and subject all of its users to invasion of privacy.
'Moreover, the Master Key itself is an encryption developed and owned by
Lavabit. As such it is valuable proprietary information and Lavabit has a
8
LAVABIT·LLCBy Counsel
in producing the Master Key, pursuant to 18 U.S.C. § 2706.
Master Key, that they be reimbursed for its costs which were directly incurred
Lastly, Lavabit and Mr. Levinson request that, if they is required to produce the
encryption key and reissue a new encryption key at the Government's expense.
Levinson request that they be given an opportunity to revoke the. current
does not have to produce its Master Key. AlternativelyI Lavabit and Mr.
Further, Lavabit and Mr. Levinson request that this Court direct that Lavabit
this Court to quash the search and seizure warrant and grand jury SUbpoena.
For the foregoing reasons, Lavabit and Mr. Levinson respectfully move
CONCLUSION
Amendment.").
is far too sweeping in its terms to be...reasonable under the Fourth
Fourth Amendment" and that "a grand jury's subpoena ....will be disallowed if it
is.."without power-to invade a legitimate privacy interest protected by the
United States v. Calandra, 414 U.S. 338, 346 (1974)) (noting "The grand jury
violate the-Fourth Amendment. See Twitter, 830 F. Supp. 2d at 141 (citing
-expectation 'Of privacy for its Master Key, the Lavabit Subpoena and Warrant
reasonable expectation in protecting it. Because Lavabit has a reasonable
9
(703) 229-0335 Telephone(703) 537-0780- [email protected] for Lauabit LLC
10
United States Attorney's OfficeEastern District ofVirginia2100 Jamieson Avenue
VA22314
I certify that on thisZ9day of July, 2013, this Motion to QuashSubpoena and Search Warrant and Memorandum of Law in Support was handdelivered to the person at the addresses listed below:
Certificate of Service". 4 •..
EXHIBIT 16
1
before or after issuance of the Sealing Order; and (4) all documents filed in
Order; (3)all grand jury subpoenas and search and seizure warrants issued
all orders and documents filed in this matter after the issuance of the Sealing
the Court's issuance of the July 16,2013 Sealing Order ("Sealing Order"); (2)
request the unsealing of all orders and documents filedin this matter before
lift the non-disclosure order issued to Mr.Levinson. Specifically, Movants
the United States government's attempt to obtain certain encryption keys and
(collectively "Movants'') move this Court to unseal the court records concerning
Lavabit, LLC ((Lavabit")and Mr. Ladar Levinson (,(Mr. Levinson")
MOTION FOR UNSEALING OF SEALED COURT RECORDS AND REMOVALOF NON-DISCLOSURE ORDER AND MEMORANDUM OF LAW IN SUPPORT
OF MOTION
No. 13-1In re Grand Jury
IN THE MATTER OF THE SEARCHAND SEIZURE OF INFORMATIONASSOCIATED WITH No.1: 13SW522
TISCONTROLLED AT
PREMISESCONTROLLEDBYLAVABIT LLC
No. 1~13EC297
FILED UNDER SEALIN THE MATTER OF THEAPPLICATION OF THE UNITEDSTATES AUTHORIZING THE USEOF A PEN REGISTERjTRA.PAND TRACE DEVICE ON ANELECTRONIC MArL ACCOUNT
Alexandria Division '115 l'. dU:r
FOR TI-IE EASTERN DlSTRlCf OF VIRGINT...A lLIN THE UNITED STATES DISTRICT COURT
2
"LavabitOrder"]. The Lavabit Order is attached as Exhibit B. The Lavabit
Order precludes the Movants from notifying any person of the search and
seizure warrant, or the Court's Order in issuance thereof, except that Lavabit
was permitted to disclose the search warrant to an attorney for legal advice.
ARGUMENT
including SSL keys (thethe Lavabit e-mail
connection with such orders or requests for such orders (collectively, the
"sealed documents"). The Sealing Order is attached as Exhibit A. Movants
request that all of the sealed documents be unsealed and made public as
quickly as possible, with only those redactions necessary to secure information
that the Court deems, after review}to be properly withheld.
BACKGROUND
Lavabit was formed in 2004 as a secure and encrypted email service
provider. To ensure security, Lavabit employs multiple encryption schemes
using complex access keys. Today, itprovides email service to roughly 400,000
users worldwide. Lavabit's corporate philosophy is user anonymity and
privacy. Lavabit employs secure socket layers ("SSL")to ensure the privacy of
Lavabit's subscribers through encryption. Lavabit possesses a master
encryption key to facilitate the private communications of its users.
On .July 16, 2013, this Court entered an Order pursuant to 18 U.S.C.
2705(b), directing Movants to disclose all information necessary to decrypt
communications sent to or from and data stored or otherwise associated with
3
~.In criminal trials there is a common law presumption of access to judicial
records; .like the sealed documents in the present case. Despite the
government's legitimate interests, it cannot meet its burden and overcome this
presumption because it has not explored reasonable alternatives.
Furthermore) the government's notice preclusion order constitutes a content
based restriction on free speech by prohibiting public discussion of an .entire
topic based on its subject matter.
I. THE FIRST AMENDMENTANDNON-DISCLOSUREORDERS
The Stored Communications Act ("SCAn)authorizes notice preclusion to
any person of a § 2705{b) order's existence, but only if the Court has reason to
believe that notification will result in (1) endangering the life or physical safety
of an individual; (2) flight from prosecution; (3) destruction or tampering with
evidence; (4) intimidating of potential witnesses; or (5) otherwise seriously
jeo.pardizing an investigation or unduly delaying a trial. § 2705(b)(1)-(5).
'Despite this statutory authority, the § 2705(b) gag order infringes upon
freedom 01' speech under the First Amendment, and should be subjected to
constitutional case law.
The most searching form of review, "strict scrutiny" l is implicated when
there is.a content-based restriction on free speech. R.A. V. u. City of St. Paul)
Minn., 505 U.S. 377, 403 (1992). Such a restriction must be necessary to serve
a compelling state interest and narrowly drawn to achieve that end. Id. The
Lavabit Order's non-disclosure provision is a content-based restriction that is
not narrowly tailored to achieve a compelling state interest.
4
However, Mr.the integrity of its criminal investigation
a;' The Lavabit Order Regulates Mr. Levinson's Free Speech
The notice preclusion order at issue here limits.Mr. Levinson '8 speech in
that he 1Snot allowed to disclose the existence of the § 2705(b) order, or the
.underlying investigation to any other person including any other Lavabit
subscriber. This naked prohibition against disclosure can fairly be
characterized as a regulation of pure speech. Bartnicki v: vopper. 532 U.s.514, 526 (2001). A regulation that limits the time, placet or manner of speech
is permissible if it serves a significant governmental interest and provides
ample alternative channels for communication. See Cox v. Neui Hampshire,
312 U.S: 569,578 (1941) [explaining that requiring a permit for parades was
aimed at policingthe streets rather than restraining peaceful picketing).
However, a valid time, place, and manner restriction cannot be based on the
content or subject matter of the speech. ConsoloEdison Co. of New York V. Pub.
Servo Comm'ri of NeT;VYork, 447 U.S. 530, 536 (1980).
. The gag order in the present case is content-based because it precludes
speech on an entire topic) namely the search and seizure warrant and the
underlying criminal investigation. See id. at 537 ('The First Amendment's
hostility to content-based regulation extends ... to prohibition of public
discussion of an entire topic"). While the nondisclosure provision may be
viewpoint neutral on its face, it nevertheless functions as a content-based
restriction because it closes off an "entire topic" from public discourse.
It is true that the govemment has a compellinginterest in maintaining
..
5
.. Levinson has been unjustly restrained from contacting Lavabit subscribers who
could be subjected to government surveillance if Mr. Levinson were forced to
comply the Lavabit Order. Lavabit's value is embodied .in its complex
encryption keys, which provide its subscribers with privacy and security. Mr.
Levinson has been unwilling to turn over these valuable keys because they
grant access to his entire network. In order to protect Lavabit, which caters to
thousands of international clients, Mr. Levinson needs some ability to voice his
concerns, garner support for his cause, and take precautionary steps to ensure
that Lavabit remains a truly secure network.
b. The Lavabit Order Constitutes A Prior Restraint On Speech
Besides restricting content, the § 2705(b) non-disclosure order forces a
prior restraint on speech. It is well settled that an ordinance, which makes the
enjoyment of Constitutional guarantees contingent upon the uncontrolled will
of an official, is a prior restraint of those freedoms. Shuttlesworth u.
Birmingham, 394 U.S. 147, 150-151 (1969); Staub v. City a/Baxley, 355 U.S.
313, 322 (1958). By definition, a prior restraint is an immediate and
irreversible sanction because it "freezes" speech. Nebraska Press Ass'n v.
Stuart, 427 U.S. 539,559 (1976). In the present case, the Lavabit Order,
enjoins Mr. Levinson from discussing these proceedings with any other person.
The effect is an immediate freeze on speech.
The Supreme Court of the United States has interpreted the First
Amendment as providing greater protection from prior restraints. Alexander u.
United States, 509 U.S. 544 (1993). Prior restraints carry a heavy burden for
6
surrender its master encryption key, the government would have access not
only to this account) but also every Lavabit account. Without the ability to
disclose government access to users' encrypted data> public debate about the
scope and justification for this secret investigatory tool will be stifled.
Moreover, innocent Lavabit subscribers will not know that Lavabir's .security
devices have been compromised. Therefore the § 2705{b) non-disclosure order
should be lifted to provide Mr. Levinson the ability to ensure the value and
integrity of Lavabit for his other subscribers.
However, if Lavabit were forced tothe account
justification, with a presumption against constitutional validity. Capital Cities
Media, Inc. v. Toole, 463 U;8. 1303; 1305 (J.983); Carroll v. Princess Anne, 393
U.8. 175,181 (1s)68);'BantamBooks, Inc. v. Sulliuan; 372 U.S. 58,70 (1963).
Here, the government and the Court believe that notification of the search
warrant's existence will seriously jeopardize the investigation, by giving targets
an opportunity to flee or continue flight from prosecution, will destroy or
tamper with evidence, change patterns of behavior, or notify confederates. See
Lavabit Order. However, the government's interest in the integrity of its
investigation does not automatically supersede First Amendment rights. See
Landmark: Communications, Inc. v. Virginia, 435 U.S. 829, 841 (1978) (holding
the confidentiality ofjudicial review Insufficient to justify encroachment on the
freedom of speech).
In the present case, the government has a legitimate interest in tracking
7
documents. Twitter, 707 F.3d at 291.
itheld that the common law presumption of access attaches to such
Circuit has held there is no First Amendment right to access §2703(d) orders,
2703{d) and can properly be defined as a judicial record. Although the Fourth
(tI1witter'). The § 2705(b) order in the present case was issued pursuant to §
Pursuant to 18 U,S.c. Section2703(d), 707 F.3d 283, 290 (4th Cir. 2013)
judicial records because they are judicially created. In re U.S, foran: Order
held that § 2703(d) orders and subsequent orders issued by the court are
Fourth Circuit Court of Appeals has never formally defined "judicial record", it
Baltimore Sun Co. v. Goetz, 886 F.2d 60,63-64 (4th Cir. 1989). Although the
Amendment or the common law, the document must be a "judicial record."
For a right of access to a document to exist under either the First
a. The Common Law Right Of Access Attaches To The Lavabit Order
of access to preliminary hearing and transcript),
criminal trial); Press-Bnierprise Co. v. Superior Court, 478 U.S. I, 2 (1986) (right
U.S. 555, 580 (press and public have a First Amendment right of attend a
F.3d 567, 575 (4th Cir. 2004); SeeRichmond Newspapers, Inc. v. Virginia> 448
Amendment and the common taw. Va. Dep't of State Police u. Wa.sh. Post, 386
limit.on the public's right of access, which derives from two sources, the First
documents were filed under seal. The sealing ofjudicial records imposes a
Despite any statutory authority, the La:vabitOrder and an related
n. THE 'LAWSUP~ORTS THE RIGHT OF PUBLIC AC~ESS TO THESEALED DOCUMENTS
8
.The underlying investigation in Twitter, involved a § 2703(d) order, which
directed Twitter to provide personal information, account information, records,
financial data, direct messages to and from email addresses, and Internet
.Protocol addresses for eight of its subscribers. In re:§ 2703(d) Order, 787 F.
Supp ..2d 430, 435 (E.D. Va. 2011). Citing the importance of investigatory
secrecy ~d integrity, the court in that case denied the petitioners Motion to
Unseal, finding no First Amendment or common law right to access. [d. at 443.
Unlike Twitter, whose users publish comments on a public forum,
subscribers use Lavabit for its encrypted features, which ensure security and
privacy. In Twitter there was no threat that any user would be subject to
surveillance other than the eight users of interest to the government. However,
a primary concern in this case is that the Lavabit Order provides the
government with access to every Lavabit account.
Although the secrecy of SeA investigations is a compelling government
interest, the hundreds of thousands of Lavabit subscribers that would be
compromised by the Lavabit Order are not the subjects of any justified
government investigation. Therefore access to these private accounts should
not be treated as a simple corollary to an order requesting information on one
criminal subject. T.hepublic should have access to these orders because their
effect constitutes a seriously concerning expansion of grand jury subpoena
power.
To overcome the common law presumption of access>'a court must find
that there is a "significant countervailing interest" in support of sealing that
9
surveillance and directs that pen/trap orders be sealed (until otherwise
other documents. In contrast, the Pen/Trap Statute authorizes electronic
There are no provisions in the SCAthat mention the sealing of orders or
b. There Is NoStatutory Authority To Seal The.§ 2705(d)Documents
explored in order to ensure the integrity of this investigation.
concerns, there are reasonable alternatives to an absolute seal that must be
interest in openness. Wash.. Post, 386 F.3d at 575. Despite the government's
demonstrates that some significant interest heavily outweighs the public
cannot seal documents or records indefmitely unless the government
documents were unsealed. Once the presumption or access attaches, a court
alternatives were considered, that documents were redacted, or that any
F.3d at 294. However,in the present case, there is no evidence that
documents, he satisfied the procedural requirements for sealing. Twitter, 707
individually considered the documents, and redacted and unsealed certain
InTwitter the court explained that because the magistrate judge
access or releasing a redacted version of the documents. [d.
consider alternatives to sealing, which may include granting some public
judicial officer determines that full public access is not appropriate, she must
General Operations) Inc. v. Buchanan, 417 F.3d 424, 429 (4th Cir. 2005). If a
within the discretion of the judicial officer who issued the warrant. Media
the common law, the decision to seal or grant access to warrant papers is
'outweighs 'the public's interest in openness. Twitter, 707 F.3d at 293. Under
10
. I See Dan Roberts, NSA Snooping; Obama Under Pressure as Senator Denounces 'Act ofTreason), The Guardian, June 10,2013, http://www.guardian.co.uk/world/2013/jun/10/obama-pressured-explain-nsa-surveillance.
Movant's and the government that the documents in this matter not be
States cannot be trusted to regard privacy.! It is in the best interests of the
American service providers in favor of foreign businesses because the United
privacy. Amajor concern is that this could cause people worldwide to abandon
viewed as accomplishing another unfounded secret infringement on personal
and pushing its subpoena power to the limits, the government's actions may be
traditional freedoms. It is concerning that suppressing Mr. Levinson's speech
international debate about government surveillance, privacy rights and other
the ensuing mass surveillance scandal have sparked an intense national and
The leaking of classified government practices by.Edward Snowden and
c. P~ivacy Concerns Demand ACommon Law Public Right Of AccessTo The Sealed Documents
overcome the common law right to access.
statutory basis for sealing an application or order un-der the SCA that would
Corp. v. United States, 508 U.S. 200, 208 (1993). Therefore, there is no
in another, it is generally assumed that Congress acts intentionally. Keene
Congress includes particular language in one sectierr of a statute but omits it
has specifically provided for sealing provisions when :it desired. Where
failure to provide for sealing is not a congressional oversight. Rather, Congress
granted unde~ its provisions be sealed. 18 U.S.C. §2518(8)(b). The SCA~s
another surveillance statute, expressly directs that applications and orders
ordered by the court". 18 U.S.C. §§ 3121-27. Similarly, the Wiretap Act,
11
it 79292Br ' ey & Birm LLC10 87 MainStreet, Suite 201F fax; Virginia 22030(703)229-033'5Telephone(703)537-0780- Facsimilejbinnall@bblawonline,comCounsel fOT Lauabit LLC
LAVABIT LLCBy Counsel
be properly withheld.
redacted to secure only the information that the Court deems, after review, to
Levinson. Alternatively, Lavabit requests that all of the sealed documents be
obtain certain encryption keys and lift the non-disclosure order issued on Mr.
unseal the court records concerning the United States government's attempt to
For the foregoing reasons, Lavabit respectfully moves this Court to
CONCLUSION
to suppress public debate.
shrouded in secrecy and used to further unjustified surveillance 'activities and
12
Eastern District ofVirginia2100 Jamieson AvenueAlexandria, VA22314
Certificate of Service
I certify that on this may ofJuly, 2013, this Motion For Unsealing OfSealed Court Records And Removal Of Non-Disclosure Order AndMemorandum Of Law In Support was hand delivered to the person at theaddresses listed below:
EXHIBIT 17
acceptable solution, at present there does not appear to be a way to implement this
Lavabit's owner have failed. While the government continues to work toward a mutually
Lavabit has still not complied. Repeated efforts to seek that technical assistance from
compliance, a grand jury subpoena, and a search warrant tor that technical assistance,
device ("pen-trap device"). A full month after that order, and after an order 1.0 compel
technical assistance necessary to implement and use a pen register and trap and trace
This Court has ordered Lavabit, LLC to provide the government with the
INTRODUCTION
RESPONSE OF THE UNITED STATES IN OPPOSITIONTO LAVABIT>S MOTION TO QUASH SUBPOENA AND
MonON TO FOR UNSEALING OF SEALED COURT RECORDS
UNDER SEAL
NO. 13-1
NO. 1:13 SW 522
NO. 1:13 EC 297
TNRE GRAND JURY SUBPOENA
AT PREMISES CONTROLLED BYLAVABITLLC
IN TI-fE MATTER OF THE SEARCHAND SEIZURE OF INFORMA TION
TNTHE MATTER OF THEAPPLICA TION OF THE UNITEDSTATES AUTHORIZING THE USE OFA PEN REGISTERITRAP AND TRACEDEVICE ON AN ELECTRONIC MArLxccoinrr
•• 1\.. _ •• ~, "",'.'
ALEXANDRIA DMSION ' .l~ -,.,
_.. ""'.',I•~ :. L \
- ~ I
EASTERN DISTRICT OF VIRGfNIA. ~... . -,
TNTHE UNITED STATES DrSTRICT COURT
2
Pen registers and trap and trace devices
To investigate Internet communications, Congress has permitted law enforcement
to employ two surveillance techniques-the pen register and the trap and trace device
that permit law enforcement to learn information about an individual's communications.
See 18 U.S.C. §§ 3121-27 ("Pen-Trap Act"). These techniques, collectively known as a
"pen-trap," permit law enforcement to learn facts about e-mails and other
communications as they are sent-but not to obtain their content. See, e.g., United States
v. Forrester. 512 F,3d 500, 509-13 (9th Cir. 2008) (upholding government's use ofa pen
trap that "enabled the government to learn the to/from addresses of Alba's e-mail
TECHNICAL BACKGROUND
Court's order, as well as to comply with the subpoena and search warrant, without
requiring Lavabit to disclose an encryption key to the government. This Court's orders,
search warrant, and the grand jury subpoena all compel that result, and they are all
lawful. Accordingly, Lavabit's motion to quash the search warrant and subpoena should
be denied.
Lavabit and' its owner have also moved to unseal all records in this matter and lift
the order issued by the Court preventing them from disclosing a search warrant issued in
this case. Because public discussion of these records would alert the target and
jeopardize an active criminal investigation, thegovernment's compelling interest in
maintaining the secrecy and integrity of that investigation outweighs any public right of
access to, or interest in publicly discussing, those records, and this motion should also be
denied.
3
provider. Id. at 16; 18 U.S.C. §3127.
Secure Socket Layer (SSL) or Transport Layer Security (TIS) Encryption
Encrypting communications sent across the Internet is a way to ensure that only
the sender and receiver of a communication can read it. Among the most common
methods of encrypting Web and e-mail traffic is Secure Socket Layer (SSL), which is
also called Transport Layer Security (TLS) encryption. "The Secure Socket Layer
('SSL') is one method for providing some security for Internet communications. SSL
provides security by establishing a secure channel for communications between a web
browser and the web server; that is, SSL ensures that the messages passed between the
client web browser and the web server are encrypted." Disney Enterprises, Inc. v. Rea.
No. 1:12-CV-687, 2013 WL 1619686 >1:9(B.D. Va. Apr. 11, 2013); see also Stambler v.
RSA Sec .. Inc., 2003 WL 22749855 *2-3 (D. Del. 2003) (describing SSL's technical
operation).
As with most forms of encryption, SSL relies on the use of large numbers known
as "keys." Keys are parameters used to encrypt 0T decrypt data. Specifically, SSL
messages, the IF addresses of the websites that Alba visited and the total volume of
information sent to or from his account").
The Pen-Trap Act "unambiguously authorizers] the use of pen registers and trap
and trace devices on e-mail accounts." In Marler of Applicatien o/U.s. For an Order
Authorizing the installation & Use oj a Pen Register & a Trap & Trace Device on E-Mail
Account, 416 F. Supp. 2d 13, 14 (D.D.C. 2006) (Hogan, 1) (4<Hogan Order"). It
authorizes both the installation of a "device," meaning, a separate computer attached to
the provider's network, and also a "process," meaning, a software program run on the
4
The information at issue before the court is relevant to an ongoing criminal
violations of numerous federal statutes
FACTS
encrypt jon employs public-key cryptography, in which both the sender and receiver each
have two mathematically linked keys: a "public" key and a "private" key. "Public" keys
are published, but "private" keys are not. Sending an encrypted message to someone
requires knowing his or her public key; decrypting that message requires knowing his or
her private key.
When Internet traffic is encrypted with SSL, capturing non-content information
on e-mail communication from a pen-trap device is possible only after the traffic is
decrypted. Because Internet communications closely intermingle content with non
content, pen-trap devices by necessity scan network traffic but exclude from any report to
law enforcement officers all information relating to the subject line and body of the
communication. See 18 U.S.C. § 3127; Hogan Order, 416 F. Supp. 2d at 17-18. A pen
trap device, by definition, CBJ11l0texpose to law enforcement officers the content of any
communication. See id.
5
period of sixty days. Judge Buchanan further ordered Lavabit to furnish agents of the
Federal Bureau of Investigation ("FBI"). "forthwith. all information. facilities. and
technical assistance necessary to accomplish the installation and use of the pen-trap
for atransmissions, and to record user log-in data on
time of the initiation and receipt of such transmissions, to record the duration of the
and (ii) to record the date andinformation sent to or
United States obtained an order pursuant to 18U.S.C. § 2703(d) directing Lavabit to
provide, within ten days, additional records and information about
account. Lavabit's owner and operator, Mr. Ladar Levison, provided very little of the
information sought by the June 10,2013 order.
B. Pen-Trap Order
On June 28, 2013, the Honorable Theresa C. Buchanan entered an Order pursuant
to 18 U.S.C. § 3123 authorizing the installation and use of pen-trap device on all
electronic communications being sent from or sent to tbe electronic mail account
("Pen- Trap Order"). The Pen-Trap 'Order authorized the
government to capture all (i) «non-content" dialing, routing, addressing, and signaling
utilized and continues
A. Section 2703( d) Order
The criminal investigation has revealed that
to utilize an e-mail account,
6
C. Compliance Order
Mr. Levison did not comply with the Pen-Trap Order. Accordingly, in the
evening of June 28, 2013, the government obtained an Order Cornpell ing Compliance
Forthwith from U.S. Magistrate Judge Theresa C. Buchanan ("Compliance Order"). The
Compliance Order directed Lavabit to comply with the Pen-Trap Order and to "provide
the Federal Bureau of Investigation with unencrypted data pursuant to the Order."
Lavabit was further ordered to provide "any information ...facilities, or technical assistance
are under the control of Lavabit [that] are needed to provide the FBl with the unencrypted
data." Compliance Order at 2. The Compliance Order indicated that failing to comply
would subject Lavabit to any penalty in the power of the court, «including the possibility
of criminal contempt of Court." Jd.
device." Pen-Trap Order at 2. The government was also ordered to "take reasonable
steps to ensure that the monitoring equipment is not used to capture any" content-related
information, Id. Pursuant to 18 U.S.C. § 3123(d), Judge Buchanan ordered that the Pen
Trap Order and accompanying application be sealed. Id
Later on June 28, 2013, two FBI Special Agents served a copy of the Pen-Trap
Order on Mr. Levison. Mr. Levison informed the FBI Special Agents that ernails were
encrypted as they were transmitted to and from tbe Lavabit server as well as when they
were stored on the Lavabit server. In add ition, decryption keys would be necessary to
access any e-mails.Mr. Levison did not provide the keys to the Agents in that meeting.
In an email to Mr. Levison on July 6, 2013, a FBI Special Agent re-affirmed the nature of
the information requested in the pen-trap order, In a response on the same day, Levison
claimed "we don't record this data".
7
IThe grandjury subpoena was subsequently sea-led on July 16,2013,
E. Grand Jury Subpoena
On July 11,2013, the United States Attomey's Office issued a grand jury
subpoena for Mr. Levison to testify in front of the grand jury on July 16, 2013. The
subpoena instructed Mr. Levison to bring to the grand jury his encryption keys and any
other information necessary to accomplish the installation and use 'of the pen-trap devioe
pursuant to the Pen-Trap Order. I The FBI attempted to serve the subpoena on Mr.
Levison at his residence. After knocking on his door, the FBI Special Agents witnessed
Mr. Levison exit his apartment from a back door, get in his car, and drive away. Later in
the evening, the FBI successfully served Mr. Levison with the subpoena.
D. Order to Show Cause
Mr. Levison did not comply with the Compliance Order, On July 9,2013, this
Court ordered Mr. Levison to appear on July 16, 20B, to show cause why Lavabit has
failed to comply with the Pen-Trap Order and Compliance Order.
The following day, on July 10,2013, the United States Attorney's Office arranged
a conference call involving the United States Attorney's Office, the FBI, Mr. Levison and
Mr. Levison's, attorney at the time, Marcia Hofmann. During this call, the parties
discussed implementing the pen-trap device in light of the encryption in place on the
target e-mail account. The FBI explained, and Mr. Levison appeared to agree, that to
install the pen-trap device and to obtain the unencrypted data stream necessary for the
device's operation the FBl would require (i) access to Lavabit's server and (ii) encrypti-on
keys.
8
including encryption keys and -SSL keys" and (ii)
information necessary to decrypt communications sent to or from the Lavabit e-mail
On July 16,2013, this Court issued a search warrant to Lavabit for (i) "[ajll
F. Search Warrant & 2705(b) Non-Disclosure Order
constituted the "reasonable expenses" authorized by the statute.
transmission of results, and it was not clear that Mr. Levison's request fOTmoney
proposal was inadequate because, among other things, it did not provide fOTreal-time
lied to Mr. Levison's e-mail that same day, explaining that theAU
install the pen-trap device and obtain the requested information in an unencrypted form.
The e-mail again confirmed that Lavabit is capable of providing the means for the FBI to
$2,000 in compensation would be required to cover the cost of the developmenttime and equipment necessary to implement my solution. The data would then becollected manually and provided at the conclusion of the 60 day period requiredby the Order. I may be able to provide the collected data intermittently during thecollection period but only as my schedule allows. If the FBI would like to receivethe coIJected information more frequently I would require an additional $1,500 incompensation. The additional money would be.needed to cover the costsassociated with automating the log collection from different servers and uploadingit to an an FBI server via I'SCp" on a daily basis. The money would also cover thecost of adding the process to our automated monitoring system so that Iwouldnotified automatically if any problems appeared.
In light of the conference call on July lOth and after subsequently reviewing therequirements of the June 28th order 1 now believe it would be possible to capturethe required data ourselves and provide. it to the FBI. Specifically the informationwe'd collect is the login and subsequent logout date and time, the IP address usedto connect to the subject email account and the following non-content headers (ifpresent) from any future emails sent or received using the subject account. Theheaders I currently plan to collect are: To, Cc, From, Date, Reply-To, Sender,Received, Return-Path, Apparently-To and Alternate-Recipient. Note thatadditional header fields could be captured if provided in advance of myimplementation effort.
stating, in part:
On July 13,2013, Mr. Levison sent an e-mail to Assistant United States Attorney
9
Court denied Mr. Levison's motion. Mr. Levison subsequently indicated to the Court
that he would permit the fBI to place a pen-trap device on his server. The government
requested that the Court further order Mr. Levison to provide his SSL keys since placing
Thethe proceedings would jeopardize the ongoing criminal investigation
ordered Lavabit to not disclose the existence of the search warrant upon determining that
"there is reason to believe that notification of the existence of the ... warrant will
seriously jeopardize the investigation, including by giving target an opportunity to flee or
continue flight from prosecution, destroy or tamper with evidence, change patterns of
behavior, or notify confederates." July 16,2013 Order ("Non-Disclosure Order") at 1.
G. Rule 49 SealingOrder
The search warrant and accompanying materials were further sealed by the Court
on July 16,2013, pursuant to a Local Rule 49(B) (<<Rule49 Order"). In the Rule 49
Order. the Court found that "revealing the material sought to be sealed would jeopardize
an ongoing criminal investigation." The sealing order was further justified by the Court's
consideration of<4available alternatives that are less drastic than sealing, and finding none
would suffice to protect the government's legitimate interest in concluding the
investigation; and having found that this legitimate government interest outweighs at this
time any interest in the disclosure of the materia)." Rule 49 Order at l.
H. Show Cause Hearing
At the Show Cause Hearing on July 16,2013, Mr. Levison made an oral motion
to unseal the proceedings and related filings. The government objected since unsealing
" Pursuant to 18 U.S.C. § 2705(b), the CourtLavabit
"[ajll information necessary to decrypt data stored in or otherwise associated with the
10
a pen-trap device on Lavabit's server would only provide encrypted information that
would not yield the 'information required under the Pen-Trap Order. The government
noted that Lavabit was also required to provide the S·SLkeys pursuant 10 the search
warrant and grand jury subpoena. The Court determined that the government's request
for the SSL keys was premature given that Mr. Levison had offered to place the pen-trap
device on his server and the Court's order for a show cause hearing was only based on
the failure to comply with the Pen-Trap Order. Accordingly, the Court scheduled a
hearing for July 26, 2013, to determine whether Lavabit was in compliance with the Pen
Trap Order after a pen-trap. device was installed.
I. M-otionto Unseal and Lift Non-Disclosure Order
On July 25, 2013, Mr. Levison filed two motions-a Motion for Unsealing of
Sealed Court Records ("Motion to Unseal") and a Motion to Quash Subpoena and Search
Warrant ("Motion to Quash"). In the motions, Mr. Levison confirms that providing the
SSL keys to the government would provide the data required under the Pen-Trap Order in
an unencrypted form, Nevertheless, he refuses to provide the SSL keys. In order to
provide the government with sufficient time to respond, the hearing was rescheduled for
August 1,2013.
On a later date, and after discussions with Mr. Levison, the FBI installed a pen
trap device on Lavabit's Internet service provider, which would capture the same
information as if a pen-trap device was installed on Lavabit's server. Based on the
government's ongoing investigation, it 1S clear that due to Lavabit's encryption services
the pen-trap device is failing to capture data-related to all of the e-rnails sent to and from
the account as well as other information required under the Pen-Trap Order. During
11
authority, specifically required in the Pen-Trap Order [hat: "IT IS FURTHER
See 18 U.S.C. §§ 3123(b)(2); 3124(a); 3124(b). Judge Buchanan, acting under that
"information" that is "necessary" to accomplish the implementation or use of a pen-trap.
The Pen-Trap Act authorizes courts to order providers such as Lavabit to disclose
Electronic Communications Privacy Act ("ECPA").
4. The July 16,2013, search warrant, issued by this Court under the
3. The July 16,2013, grand jury subpoena; and
Trap Order;
2. The Compliance Order compelling compliance forthwith with the Pen-
Device Act (18 U.S.C. §§ 3121-27);
1. The Pen-Trap Order pursuant to the Pen Register and Trap and Trace
Lavabit to produce the SSL keys:
provide that same information. In total, four separate legal obligations currently compel
warrant merely re-state and clarify Lavabit's obligation under the Pen-Trap Act to
grand jury subpoena and the search warrant should be denied because the subpoena and
The motion of Lavabit and Mr. Levison (collectively "Lavabit") to quash both the
A. The search warrant and grand jury subpoena are valid because [heymerely re-state Lavabit's pre-existing legal duty, imposed by the Pen-TrapOrder, to produce information necessary to accomplish installation of/hepen-trap device.
ARGUlVIENT
I. THE SEARCH WARRANT AND THE GRAND JURY SUBPOENA ARELAWUL AND REQUIRE LAVABIT TO PRODUCE THE SSL KEYS
Lavabit's over one month of noncompliance with this Court's Pen-Trap Order ••
12
ORDERED, pursuant to 18 U.S.C. § 3123(b)(2). that Lavabit shall furnish agents from
the Federal Bureau of Investigation, forthwith, all information, facilities, and technical
assistance necessary to accomplish the installation and use of the pen/trap device
unobtrusively and with minimum interference." Pen-Trap Order at 2.
In this case, the SSL keys are "information ... necessary to accomplish the
installation and use of the [pen-trap]" because all other options for installing the pen..trap
have failed. In a typical case, a provider is capable of implementing a pen-trap by using
its O\¥J1 software or device, or by using a technical solution provided by the investigating
agency; when such a solution is possible, a provider need not disolose its key. Eg., In re
Application ofthe U'S. for an Order Authorizing the Use of a Pen Register and Trap On
[XXX] Internet Servo Account/User Name [xxxxxxx:[email protected]. 396 F. Supp. 2d 45, 49
(D. Mass ..2005) (suggesting language in a pen-trap order '<to impose upon the internet
service providers the necessity of making sure that they configure their software in such a
manner as to disclose only that which bas been authorized"). In this case, given
Lavabits use of SSL encryption and Lavabit's lack of a software solution to implement
the pen-trap on behalf the government, neither the government nor Mr. Levison have
been able to identify such a solution.
Because the search warrant and grand jury subpoena require nothing that the Pen
Trap Act does not already require, they are not unreasonably burdensome. Moreover, a
court's constitutional authority to require a telecommunications provider to assist the
government in implementing a pen-trap device is well-established. See United Stales V.
New York Tel. Co.. 434 U.S. 159, 168-69 (l977) (in a pre-Pen- Trap Act case, holding that
district court had the authority to order a pbone company to assist in the installation of a
13
seized by their relation to designated crimes and when the description of the items leaves
This "particularity requirement is fulfilled when the warrant identifies the items to be
[he place to be searched, and the persons or things to be seized." U.S. Const. Am. IV.
The Fourth Amendment requires that a search warrant "particularly describe]e]
2. The search warrant complies with the Fourth Amendmentand is not general.
permit [such] challenges.").
to quash court orders requires "the Court [to] infer that Congress deliberately declined to
Va. 2011) (holding that the lack of a specific provision in ECPA permitting users to move
U.S.for an Order Pursuant to 18 U.S.c. §2703(d), 830 F. Supp. 2d 114, 128-29 (E.D.
sanctions for nonconstitutional violations of this chapter."); cj In re Application of the
remedies and sanctions described in this chapter are the only judicial remedies and
means that there is no statutory authority for such motions. See 18U.S.C. § 2708 ("[t]he
§ 2703( d). The lack of a corresponding motion to quash or modify a search warrant
not create an equivalent procedure to move to quash search warrants. 18 U.S.C.
2712. ECPA allows providers such as Lavabit to move to quash court orders, but does
executed. The search warrant was issued under Title ITof ECPA, 18 U.S.C. §§ 2701-
Lavabit lacks authority to ask this Court to "quash" a search war:rant before it is
1. Lavabit lacks authority to move to suppress a searchwarrant,
B. Lavabit's motion to quash the search warrant must be denied becausethere is no statutory authority for such motions, and the search warrant islawful in. any event.
Amendment.").
pen-trap, and "no claim is made that it was in any way inconsistent with the Fourth
14
building to unlock the building's front door so that agents can search one apartment is not
contrary [0 law, could constitute a general search. Compelling the owner of an apartment
search warrant is "general" merely because it gives the government a tool that, if abused
(criminalizing the usc of pen-trap devices without a court order). It cannot be that a
(punishing as a felony the unauthorized interception of communications); § 3121
account is currently the subject of the Pen-Trap Order. See 18 U.S.C. § 2511(1)
authority to collect any data on any Lavabit user-except for the one Lavabit user whose
Wiretap Act and the Pen-Trap Act, will continue to limit sharply the government's
data. After Lavabit produces its keys [0 the government, Federal statutes, such as the
grant the government the legal authority to access any Lavabit user's communications or
communications and data." Mot. to Quash at 3. To the contrary, the warrant does not
"operates as a general warrant by giving the Government access to every Lavabit user's
Acknowledging this specificity, Lavabit nonetheless argues that the warrant
nothing else.
That specification leaves nothing to discretion; it calls for encryption and SSL keys and
b. All information necessary to decrypt data stored in orotherwise associated with the Lavabit account
SSL keys;
a. All information necessary to decrypt communicationssent to or from the Lavabit e-mail account
,U"' ....."'~Hl"..encryption keys and
therefore is not impermissibly general. It calls for only:
The July 16,2013, search warrant's specification easily meets this standard, and
592 F.3d 511,519 (4th Cir. 2010).
nothing to the discretion of the officer executing the warrant." United States v. Williams.
15
2 Lavabit clres 18 U.S.C. § 2703(d) as authority for its motion to quash, but rhat section by its terms onlypermits motions to quash court orders issued under that same section,
Trap Order, Lavabit has failed to assist the government to implement the pen-trap device.
position of having to produce those keys only because, more than a month after the Pen-
that Lavabit provided the SSL keys to the government. But Lavabit finds itself in the
Lavabit also argues that it will lose customers' trust and business if it they learn
content of that Lavabit customer's e-mail communications.
restricts the government's access by preventing the government from collecting the
Order on a single Lavabit customer's e-mail account. The Pen-Trap Order further
existing obligation to provide information necessary to implement this Court's Pen-Trap
As explained above, the subpoena does no such thing: It merely reaffirms Lavabit's
Government unlimited access to every one of its user's accounts." Mot. to Quash a17.
Lavabit argues the subpoena should be quashed because it "grantjs] the
harassing")?
(4th Cir. 2007) (recognizing courts may quash subpoenas that are "abusive or
P. 17(c)(1) & (2)~see In re Grand Jury, John Doe No. G.J2005-2, 478 F.3d 581,585
modify the subpoena if compliance would be unreasonable or oppressive." Fed. R. Crim,
documents, data, or other objects the subpoena designates," but the court "may quash OJ
A grand jury subpoena "may order the witness to produce any books, papers,
C. Lavabit 's motion to quash the subpoena must be denied becausecompliance would not be unreasonable or oppressive
the warrant.
that undisciplined agents 'Ni.11 illegally kick down the doors to apartments not described in
a "general search" of the entire apartment building-even if the building owner imagines
16
Moreover, the restrictions are narrowly tailored to restrict
government's compelling interest in maintaining the secrecy and integrity of its active
cannot) any compelling reason sufficient to overcome what even Lavabit concedes is the
Disclosure Order ("Mot. to Unseal") at 1-2. Lavabit, however, has.not identified (and
Order"). Motion for Unsealing of Sealed Court Records and Removal of Non-
disclose the existence of the search warrant the Court signed that day ("Non-Disclosure
Order to Seal, and to lift the Court's Order dated July 16,2013, directing Lavabit not to
Lavabit has asked the Court to unseal all of the records sealed by this Court's
U. THE NON-DISCLOSURE ORDER IS CONSISTEl'IT'f \VITH THE FIRSTAMENDMENT BECAUSE IT ISNARROWLY TAILORED TO SERVEWHAT ALL PARTIES AGREE IS A COMPELLING GOVERNMENTINTEREST
providing" assistance in implementing a pen-trap device. 18 U.S.C. § 3124.(c).
Moreover, Lavabit is entitled to compensation "for such reasonable expenses incurred in
e.g., GoDadd·y LLC, SSL Certificates, hups://W\~"w.gQdaddy.comlssl/ssl-certificates.aspx.
change its SSL keys. Venders sell new SSL certificates for approximately $100. See,
Finally, once court-ordered surveillance is complete, Lavabit will be free to
added).
unless legally compelled to do so." See hltp://lavabit.com!privacy policy.html (emphasis
customers that "Lavabit will not release any information related to an individual user
neither "unreasonable" nor "oppressive." In any event, Lavabit's privacy policy tells its
traps, see 18 U.S.C. § 3124(a), (b), and requiring providers to comply with that statute is
providers are statutorily required to assist the government in the implementation of pen-
customers ousted that Lavabit would refuse fa comply with lawful court orders. All
Any resulting loss of customer "trust" is not an "unreasonable" burden ifLavabit's
17
ensuring that the target of lawful surveillance is not aware that he is being monitored.
business"). Likewise, here, the United States clearly has a compelling interest in
national security information from unauthorized persons. in the course of executive
("This Court has recognized the Government's 'compelling interest' in withholding
quotation marks omitted); see also Dep 't of the Navy v. Egan, 484 U.S. 518,527 (1988)
than the security of the Nation." Haig v. Agee, 453 U.S. 280, 30.7 (198'1) (internal
Indeed, it is "obvious and unarguable that no government interest is more compelling
governmental role of securing the safety of the person and property of the citizen ., ..").
have indicated, the investigation of crime by the grand jury implements a fundamental
("requirements ... that a State's interest must be 'compelling' ... are also met here. As we
enforcement investigation"); Branzburg v. Hayes, 408 U.S. 665,700 (1972)
a compelling governmental interest exists in protecting the integrity of an ongoing law
(4th Cir. 2004) (<<Wenote initially our complete agreement with the general principle that
criminal investigations. Virginia Dep't of Siaie Police v. Wash. Post, 3-86F.Jd 567, 579
The Government has a compelling interest in protecting the integrity of on-going
government interest, and therefore easily satisfies strict scrutiny,
because the Non-Disclosure Order is narrowly tailored to advance a compelling
reviewing the Non-Disclosure Order. There is no need to decide this issue, however,
The United States does not concede that strict scrutiny must be applied in
A. The Non-Disclosure Order survives even strict scrutiny review byimposing necessary but limited secrecy obligations on Lavabit
motion must be denied.
investigation. Because there is no reason to jeopardize the criminal investigation, this
Lavabit from discussing only a limited set of information disclosed to them as part of this
18
compelling government interest"). In spite of this recognition, Lavabit states it intends to
disclose the search warrant and order should the Court grant the Motion to Unseal. ld. at
5 (HMr. Levinson needs some ability to voice his coneerns [and] garner support for his
cause"); id. at 6. Disclosure of electronic surveillance process before the electronic
surveillance has finished, would be unprecedented and defeat the very purpose of the
surveillance. Such disclosure would ensure along with the public,
would learn of the monitoring of.e-mail account and take action to frustrate the
legitimate monitoring of that account.
The Non-Disclosure Order is narrowly tailored to.serve the government's
compelling interest of protecting the integrity of its investigation. The scope of
information that Lavabit may not disclose could hardly be more narrowly drawn: "the
. Mot. to Unsealmaintaining the integrity of its criminal investigation
at 4; id. at 6 Cthe government has a legitimate interest intracking"
account); id. at 8 ("the secrecy of [Stored Communications Act] investigations is a
United States v. Aguilar,S 15 U.S. 593, 606 (1995) (holding that a statute prohibiting
disclosure of a wiretap was permissible under the First Amendment, in part because
"[w]e think the Government's interest is quite sufficient to justify the construction of the
statute as written, without any artificial narrowing because of First Amendment
concerns"). As the Non-Disclosure Order makes clear, publicizing "the existence of the
[search] warrant will seriously jeopardize the investigation, including by giving targets an
opportunity to f1ee or continue flight from prosecution, destroy or tamper with evidence,
change patterns of behavior, or notify confederates."
Lavabit acknowledges that "the government has a compelling interest in
19
including inserts in monthly bills that discussed any controversial issue of public policy,
constitutionality of a state commission's order prohibiting a regulated utility from
as articulated in Consolidated Edison, Mot. to Unseal at 4. At issue in that case was the
The limitation imposed here does not close off from discussion an "entire topic,"
E, The Order neither forecloses discussion of an Itentire topic" norconstitutes emunconstitutional prior restraint on speech
will last only so long as necessary to protect the government's ongoing investigation.
Further, the Non-Disclosure Order is temporary. The nondisclosure obligation
situations," 467 U.s. at 32_
the same specter of government censorship that such control might suggest in other
Court found that «control over [disclosure of] the discovered information does not raise
information person already knew, does not violate First Amendment). In Rhinehart, the
prohibition on disclosing information learned through grand jury process, as opposed to
see also Hoffman-Pugh v. Keenan, 338 F.3d 1136, 1140 (10th Cir. 2003) (finding
may have obtained as a result of his participation in the proceedings of the grand jury");
was in possession before he testified before the grand jury" with "information which he
632 (1990) (distinguishing between a witness' "right to divulge information of which he
that requires exacting Pirst Amendment scrutiny"); Butterworth v, Smith, 494 U.S. 624,
information learned through judicial proceeding "is not the kind of class-icprior restraint
Times Co. v. Rhinehart, 467 U.S. 20, 33 (1984) (order prohibiting disclosure of
restrictions on the disclosure of information obtained 'by independent means, Seattle
confidential proceedings stand on a different and firmer constitutional footing from
Restrictions on a party's disclosure of information obtained through participation in
existence of the attached search warrant" and the Non-Disclosure Order itself.
20
such as nuclear power. Consolidated Edison Co. of New York 17. Pub. Servo Cornm In of
New York, 447 U.S. 530,532 (1980). The Non-Disclosure Order, by contrast, precludes
a single individual. Mr. Levison, from discussing a narrow set of information he did not
know before this proceeding commenced, in order to protect the integrity of an ongoing
criminal investigation. c.rDoe V. Mukasey, 549 F Jd 861, 876 (2d CiT. 2009) C'althougb
the nondisclosure requirement is triggered by the content of a category of information,
that category, consisting of the fact of receipt of [a National Security Letter] and some
related details, is far more limited than the broad categories of information that have been
at issue with respect to typical content-based restrictions."). Mr. Levison may still
discuss everything he could discuss before the Non-Disclosure Order was issued.
Lavabit's argument that the Non-Disclosure Order, and by extension all § 2705(b)
orders, are unconstitutional prior restraints is likewise unavailing. Mot. To Unseal at 5-6.
As argued above, the Non-Disclosure Order is narrowly tailored to serve compelling
government interests, and satisfies strict scrutiny. See supra, Part ILA. Regardless, the
Non-Disclosure Order does not fit within the two general categories of prior restraint that
can run afoul of the First Amendment: licensing regimes in which an individual's right to
speak is conditioned upon prior approval from the government, see City of Lakewood v.
Plain Dealer Publishing Co., 486 U.S. 750, 757 (1988), and injunctions restraining
certain speech and related activities, such as publishing defamatory or scandalous
articles, showing obscene movies, and distributing leaflets, see Alexander v. United
States, 509 U.S. 544,550 (1993). A prior restraint denies a person the ability to express
viewpoints or ideas they could have possessed without any government involvement.
Section 2705(b) orders, by contrast, restrict a recipient's ability to disclose limited
21
here.
Stare Police v. Wash. Post, 386 F.3d 567,576 (4th CiT.2004). This standard is met easily
be made lightly and that it will be subject to meaningful appellate review." Va. Dep 't of
"Adherence to this procedure serves to ensure that the decision to seal materials will not
consider procedural alternatives to sealing judicial records. Twitter, 707 F.3d at 294.
2013) (,'Twitter"). In addition to considering substantive interests! a judge must also
us. for em Order Pursuant to 18 US. C. Section 27()3(d), 707 F.3d 283, 290 (4th CiT.
"public's right of access is outweighed by competing interests," In re Application of the
Sun Co. v. Goetz, 886 F.2d 60, 65 (4th Cir. 1989). and rebuttable upon a showing that the
7-10. The presumption of public access to judicial records; however, is "qualified," Bait.
Court's decision to seal the search warrant and supporting documents. Mot. to Unseal at
Lavabit asserts that the common law right of access necessitates reversing this
A. Any common law right of access is outweighed by the need to protect theintegrity of the investigation.
III. NO VALID BASIS EXISTS TO UNSEAL DOCUMENT~ THAT, IF MADEPUBLIC I>RE-~IATURELY,WOULD JEOPARDIZE AN ON-GOINGCRIMINAL INVESTIGATION
warranting the most rigorous First Amendment scrutiny").
letter statute "is not a typical prior restraint or a typical content-based restriction
549 F.3d at 877 ( "[tjhe non-d-isclosure requirement" imposed by the national security
concerns as other injunctions on speech. Cf Rhinehart; 467 U.S, at 32, Doe v, Mukasey,
information acquired only by virtue of an official investigation does not raise the same
legitimate, judi cially sanctioned form of rneni toring. Such a narrow limitation on
information that the recipient only learned from the government's need to effectuate a
22
"[Tjhe common law does not afford as much substantive protection to the
interests of the press and the public as does the First Amendment." Twitter, 707 F.3d at
290 (internal quotation marks omitted). With respect-to the substantive equities at stake,
the ~nited States' interest in maintaining tbe secrecy of a criminal investigation to
prevent the target of the surveillance from being alerted and altering behavior to thwart
the surveillance clearly outweighs any public interest in learning about specific acts of
surveillance. Id. at 294 (rejecting common law right of access because, inter alia, the
sealed documents "set forth sensitive non-public facts, including the identity of targets
and witnesses in an ongoing criminal investigation"). "Because secrecy is necessary for
the proper functioning of the criminal investigation" prior to indictment, "openness will
frustrate the government' S oper-ations." Jd. at 292. Lavabit concedes that ensuring "the
secrecy of [Stored Communications Act] investigation's," like this, "is a compelling
government iruerest" Mot. to Unseal at 8 (emphasis added). Lavabit does not, however)
identify any compelling interests to the contrary. Far from presenting "a seriously
concerning expansion of grand jury subpoena power," as Lavabit's contents, id., ajudge
issued the Pen- Trap Order, which did not authorize monitoring of any Lavabit e-mail
account other than
In addition, the Court satisfied the procedural prong. It "considered the available
alternatives that are less drasticthan sealing, and [found] none would suffice to protect
the government's legitimate interest in concluding the investigation." Rule 49 Order.
The Fourth Circuit's decision in Twitter is instructive, That case arose from the
Wikileaks investigation of Army Pfc. Bradley Manning. Specifically, the government
obtained an order pursuant to 18 U.S.C. § 2103(d) directing Twitter to disclose electronic
23
B. Courts have inherent authority to seal ECPA proce-ss
Lavabit asserts that this Court must unseal the Non-Disclosure Order because 18
U.S.C. § 2705(b) does not explicitly reference the sealing of non-disclosure orders issued
pursuant to that section. Mot. to Unseal at 9~1O. As an initial matter, the Court has
inherent authority to seal documents before it. In re Knight Pub. Co., 743 F.2d 231,235
(4th Cir. 1984) ("[t]he trial court has supervisory power over its own records and may, in
its discretion, seal documents if the public's right of access is outweighed by competing
communications and account and usage information pertaining to' three subscribers.
When apprised of this, the subscribers asserted that a common law right of access
required unsealing records related to' the § 2703(d) order. The Fourth Circuit rejected this
claim, finding that the public's interest in the Wikileaks investigation and the
government's electronic surveillance of internet activities did not outweigh "the
Government's interests in maintaining the secrecy of its investigation, preventing
potential suspects from being tipped off, or altering beha-vior to thwart the Government's
ongoing investigation." 707 F.3d at 293. "The mere fact that a case is high profile in
nature," the Fourth Circuit observed. "does not necessarily justify public access." Id. at
294. Though Twitter involved a § 2703(d) order, rather than a § 2705'(b) order, the Court
indicated this is a distinction without a difference. ld. at 294 (acknowledging that the
concerns about unsealing records "accord" with § 2705(b)). Given the similarities
between Twitter and the instant case-most notably the compelling.need to protect
otherwise confidential information from public disclosure and the national attention to
the matter-there is no compelling rationale currently before the Court necessitating
finding that a common law right of access exists here.
24
interests"); see also Media General Operations, Inc. v. Buchanan, 417 F3d. 424,430 (4th
Cir. 2005); United States v. u.s. DiM. Court, 407 U.S. 297, 3.21 (1972) ("a warrant
application involves no public or adversary proceedings: it is an ex parte request before a
magistrate or judge."). In addition, the Court here exercised its authority to seal pursuant
to Local Rule 49(B), the validity of which Lavabit does not contest.
Even if the Court did not have this authority, Lavabit's reading of § 2705(b) must
be rejected, because it would gutthe essential function of non-disclosure orders and
thereby disregard Congress' clear intent in passing § 2705. The Section allows courts to
delay notification pursuant to § 2705(a) or issue a non-disclosure order pursuant to
§ 2705(b) upon finding that disclosure would risk enumerated harms, namely danger to a
person's life or safety, flight from prosecution, destruction of evidence, intimidation of
witnesses, or seriously jeopardizing an investigation. 18 U.S ..C. §§ 2705(a)(2)CA)-(E),
(b)(l )~(5). It would make no sense for Congress to purposefully authorize courts to limit
disclosure of sensitive information while simultaneously intending. to allow the ~ame
information to be publicly accessible in an unsealed court. document,
Finally. the implications Lavabit attempts to draw from the mandatory seating
requirements of 18 U.S.C. §§ 2S\8(8)(b) and.3123(a)(3)(B)·are mistaken. While Lavabit
characterizes those statutes as granting courts the authority to seal Wiretap Act and pen
trap orders, courts already had that authority. Those statutes have another effect: they
removed discretion from courts by requiring that courts sea) Wiretap Act orders and pen
trap orders. See 18 U.S.C. § 2S18(8)(b) ("Applications made and orders granted under
this chapter shall be sealed by the judge") (emphasis added); id: § 3123(a)(3)(B) CThe
record maintained under subparagraph {A) shalt be provided ex parte and under seal to
25
add-itional delay, evasion, or resistance by Mr. Levison and Lavabit,
and Lavabit comply with legitimate monitoring be implemented forthwith and without
currently before the Court is ensuring th:at the Court's orders requiring. that Mr. Levison
secrecy of its ongoing criminal investigation. Indeed, the most compelling interest
Lavabit references outweigh the government's 'compelling intere-st in preserving the
this Court to adopt such a novel argument, nor do the putative policy considerations
law right of access. Mot. to Unseal at 10-11. Lavabit, however, offers no legal basis for
Lavabit 's brief ends with an argument that privacy interests require a common
C. Supposed privacy concerns do not compel a common law right of accessto the sealed documents.
orders may be sealed.
other situations does not mean that Congress believed that onlyWiretap Act and pen-trap
the court") (emphasis added). Congress' decision to leave that discretion in place in
26
703-299-3700
Assistant United States AttorneyUnited States Attorney's Office2100 Jamieson Ave.
A.Ull'.;l.W{.L, VA 22314
By:
NEIL H. MACBRIDE
Respectfully Submitted,
jury subpoena by imposing sanctions until Lavabit complies.
Court should enforce the Pen-Trap Order, Compliance Order, search warrant, and grand
For the foregoing reasons, Lavabit's motions should be denied. Furthermore, the
CONCLUSION
27
703-299-3700
Assistant United States AttorneyUnited States Attorney's Office2100 Jamieson Ave.AI . VA 22314
Jesse R. BinnalJBronley & Binnall, PLLC10387 Main Street. Suite 201Fairfax, VA 22030
document to Lavabit's Counsel of Record:
r hereby certify that on July 31,2013, r e-rnailed a copy of the foregoing
CERTIFICATE OF SERVICE
EXHIBIT 18
Tracy L. West'fall OC.R~USDC/8DVA
Court Reporter: Tracy L. Westfall, RPR, CMR3, CCR25 Proceedings reported by machine shorthand, transcript produced
by computer-aided transcription.
Jesse R. Binnall, Esq.For the Respondent:
James Trump, Esq.Michael Ben'Ary, Esq.Josh Goldfoot, Esq.
For the United States:
APPEARANCES:
UNITED STATES DISTRICT JUDGE
BEFORE THE HONORP..BLECLAUDE .M. HILTON
TRANSCRIPT OF HEARING
24
23
22
21
20
19
18
17
16
Alexandria, VirginiaAugust 1, 201310:00 a.m.
UNDER SEAL
NO. 13-1
NO. 1:13 SW 522
NO. 1:13 BC 297)})))))))))))))))))))))
IN RE GRAND JURY SUBPOENA
PREMISES CONTROLLED BYLAV}\8IT, LLC
IN THE ~ffiTTEROF THE SEARCHAND SEIZURE OF INFORMATION
IN THE MATTER OF THEAPPLICATION OF THE UNITEDSTATES AUTHORIZING THE USEOF A PEN REGISTER/TRAP ANDTRACE DEVICE ON ANELECTRONIC MAIL ACCOUNT
15
14
13
12
11
10
9
8
7
6
5
4
1
UNITED STATES DISTRICT COURTEASTERN DISTRICT OF VIRGINIA
ALEXANDRIA DIVISrON3
2
1
Tracy L. Westfall OCR-USDC/EDVA
MR. BINNALL: May it please the Court. We're before10
3 and Grand Jury No. 13-1-
4 MR. TRUMP: Good morning. Jim Trump on behalf of the
5 United States.
6 THE COURT: Good morning.
7 MR. BINNALL: Good morning, Your Honor. Jesse Binnall
8 on behalf of Lavabit and Mr. Levison.
9 THE COURT: All right.
PRO C E E DIN G S
THE CLERK: In re: Case Nos. 1:13 EC 297, 1:13 SVl 522,
11 the Court today on two separate motions, a motion to quash the
12 requirement of Lavabit to produce its encryption keys and the
13 motion to unseal and lift the nondisclosure requirements of
14 Mr. Levison.
15 Your Honor, the motion to quash in this arises because
16 the privacy of users is at -- of Lavabit's users are at stake.
17 We're not simply speaking of the target of this investigation.
18 We're talking about over 400,000 individuals and entities that
19 are users of Lavabit who use this service because they believe
20 their communications are secure.
21 By handing over the keys, the encryption keys in this
22 case, they necessarily become less secure. In this case it is
23 true that the face of the warrant its.elfdoes limit the
24 documents or -- and communications to be viewed and the specific
25 metadata to be viewed to the target of the Gase,
2UNDER SEAL
1
2
Tracy L. Westfall OCR-USDC/EDVA
10 one for the logins and the messages that are transmitted. You
11 have another code that encrypts the content of the messages,
12 right?
13 MR. BINNALL: Your Honor, I believe that that is true.
14 From my understanding of the Hay that this works is
15 that there is one SSL key. That SSL key is what is issue in
16 this case, and that SSL key specifically protects the
17 communication, the over -- the breadth of the communication
18 itself from the user's actual computer to the server to make
19 sure that the user is communicating with exactly who the user
20 intends to be communicating with, the server.
21 And that's one of the things that SSL does. It ensures
22 that you're talking to the right person via e-mail and there's
23 not a so-called man in the middle who's there to take that
24 message away.
THE COORT: You have two different encryption codes,9
1 However, there is a lack of any sort of check or
2 balance in order to ensure that the -- that the encrypted data
3 of other Lavabit users remain secure. The encryption in this
4 case doesn 1 t protect only content. It protects login data and
5 the other -- some of the other metadata involved in this case.
6 We believe that this is not the least restrictive means
7 in order to provide the government the data that they are
8 looking for. Specifically--
THE COUR'l': Does that key also contain the code of the25
3UNDER SEAL
Tracy L. Westfall OCR-OSDC/EDVr..
25 is the way that I understand why it's done that way.
MR. BINNALL: I understand the Court's point, and this24
8 telephone, you've got telephone numbers and --
9 MR. BINNALL: Correct .
10 THE COURT: those can be traced very easily withou~
11 any look at the content of the message that's there. rou-all
12 could have set up something the same way.
13 MR. BINNALL: We could have, Your Honor. Actually, if
14 you're to --
15 THE COURT: So if anybody's -- you're blaming the
16 government for something that's overbroad, but it seems to me
17 that your client is the one that set up the system that's
18 designed not to protect that information, because you know that
19 there needs to be access to calls that go back and forth to one
20 person or another. And to say you can't do that just because
21 you've set up a system that everybody has to -- has to be
22 unencrypted, if there's such a word, that doesn't seem to me ~o
23 be a very persuasive argument.
1 message and interpret the message as we.Ll?
2 MR. BINNALL: My understanding is that it does, Your
3 Honor, but because that's not my technical expertise, I'm not
4 going to represent to the Court anything on that one way or
5 another. But my understanding is there is one general key here
6 that is at issue.
THE COURT: t-vell,why would you set up such? I mean, a7
4UNDER SEAL
Tracy L. Westfall OCR-USDC/EDVA
1 There's different security aspects involved for people
2 who want to protect their privacy, and there certainly is the
3 actual content of the message thernselves. That's certainly what;
4 I would concede is the highest security interest.
5 But there's also the security interest to make sure
6 that they're corrununicatingwith who you want to be communicating
7 with. That is equally of a concern for privacy issues because
8 that is, at the end of the day, one of the things that secures
9 the content of the message.
10 In this case it is true that most Internet service
11 providers do log, is what they call it, a lot of the metadata
12 that the government wants in this case without that necessarily
13 being encrypted, things such as who something is going to, who
14 it's going from, the time it's being sent, the IP address from
15 which it is being sent.
16 La'vabitcode is not something that you buy off the
17 shelf. It is code that was custom made. It was custom made in
18 order to secure privacy to the largest extent possible and to be
19 the most secure way possible for multiple people to corrununicate,
20 and so it has chosen specifically not to log that information.
21 Now, that is actually information that my client has
22 offered to start logging with the particular user in this case.
23 It is, however, something that is quite burdensome on him. It
24 is something that would be custom code that would take between
25 20 to 40 hours for him to be able to produce. We believe ~hat
5UNDER SEAL
Tracy L. Westfall OCR-USDC/EDVl·\.
22 going to have to deny your motion to quash. It's just not
23 overbroad. The government's asking for a very narrow, specific
24 bit of information, and it's information that they're entitled
25 to.
1 is a bet t.eri alternati ve than turning over the encryption key
2 wh i.chcan b~ used to get the data for all Lavabit users.
3 I hope that addre'saes the Court I s concern kind of with
4 regard to the metadata and why it is not more -- why Lavabit
5 hasn't created an encryption system that may honestly be more
6 within the mainstream, but this is a provider that specifically
7 was started in order to have to protect privacy interests more
8 than the average Internet service provider.
9 THE COURT: I can understand why the system was set up,
10 but I think the government is -- government's clearly en~itled
11 to the information that they' re seeking, and just because
12 you-all have set up a system that makes that difficult, that
13 doesn I t in any way lessen the government's right to receive that
14 information just as they would. from any telephone company or any
15 other e-mail source that could provide it easily. Whether
16 it's -- in other words, the difficulty or the ease in obtaining
17 the information doesn't have anything to do with whether or not
18 the government's lawfully entitled to the information.
19 MR. BINNALL: It is -- and we don't disagree that the
20 government is entitled to the information. We actually
THE COURT: Well, how are we going to get it? I'm21
6UNDER SEAL
Tracy L. Westfall OCR-USDC/EDVA
25 these than I have.
MR. BINN~.LL: Not that I've found, Your Honor.
THE COURT: I don't think so. I've never known of one.
MR. BIN~ALL: And Your Honor's certainly seen more of
22
23
24
17 possible here is that the government essentially pay the
18 reasonable expenses, meaning in this case my client's extensive
19 labor costs to be capped at a reasonable amount.
20 THE COURT: Has the government ever done that in one of
21 these pen register cases?
1 Now, hOH are we going to work out that they get it?
2 MR. BINNALL: Your Honor, what I would still say is the
3 best method fOE them to get it is, first of all, there be some
4 way for there to be some sort of accountability other than just
5 relying on the government to say we're not going to go outside
6 the scope of the warrant.
7 This is nothing that is, of course, personal against
8 the government and the, you know, very professional law
9 enforcement officers involved in this case. But quite simply,
10 the way the Constitution is set up, it's set up in a way to
11 ensure ~hat there's some sort of checks and balances and
12 accountability.
THE COURT: What checks and balances need to be set up?
MR. BINN~~L: Well--
T'HECOURT: Suggest something to me.
MR. BINN~~L: I think that the least restrictive means
13
14
15
16
7ONDER SEAL
Tracy L. Wescfall OCR-USDC/EDVA
MR. BINNALL: That is absolutely correct.25
24 that. This is a criminal investigation.
THE COURT: I don't knoH that the Fourth Amend'11entsays23
17 would the government trust you?
18 MR. BINNALL: Your Honor, because that's what the basis
19 of Fourth Amendment law says is more acceptable, is that the
20 government is the entity that you really need the checks and
21 balances on.
22 Now, my --
1 THE COURT: So would it be reasonable to start now with
2 your client?
3 MR. BINNALL: I think everyone would agree that this is
4 an unusual case. And that this case, in order to protect the
5 privacy of 400,OOO-plus other users, some sort of relatively
6 small manner in which to create a log system for this one user
7 to give the government the metadata that they're looking for is
8 the least restrictive mean here, and we can do that in a way
9 that doesn't compromise the security keys.
10 This is actually a way that my client
11 THE COURT: You warrt to do it in a way that the
12 government has to trust you
13 MR. BINNALL: Yes, Your Honor.
THE COORT: -- to come up with the right data.
MR. BINNALL: That's correct, Your Honor.
THE COURT: And you won ' t trust the government. So why
14
15
16
8UNDER S~_L
Tracy L. Westfall OCR-U5DC/EDVA
1 THE COORT: A criminal investigation, and I don It know
2 that the Fou.rth Amendment says that the person being
3 investigated here is entitled to more leeway and more rights
4 than the govermnent is. I don It know.
5 MR. BINNALL: There certainly is a balance of power
6 there. I, of course, am not here to represent the interest of
7 11m here sp€cifically looking over my client who
8 has sensitive data --
9 THE COORT: I understand. 11m trying to think of
10 working out something. 11m not sure youlre suggesting anything
11 to me other than either you do it and the government has to
12 trust you to give them whatever you want to give them or you
13 have to trust the government that they're not going to go into
14 your other ~iles.
15 Is there some other route?
16 MR. BINNALL: I would suggest that the government
17 I'm sorry -- that the Court can craft an order to say that we
18 can -- that we should work in concert with each other in order
19 to come up with this coding system that gives the goverD~ent all
20 of the metadata that we can give them through this logging
21 procedure that we can install in the code, and then using that
22 as a least restrictive means to see if that can get the
23 government the information that they I re looking for on the
24 specific account.
25 THE COURT: How long does it take to install that?
9UNDEE. SEAL
'rracy L. Westfall OCR-IJSDC/EDVA
20 just on on€ issue of the nondisclosure provision of this. And I
21 understand the Court's position on this, but there is other
22 privileged cormnunications if the Court would be so generous as
23 to allow me very briefly to address that issue?
24 There's other rirst Amendment considerations at issue
25 with not necessarily just the sealing of t.his, but what
MR. BINNALL: If I could have the Court's attention19
14 the government will see the logged metadata involved.
15 THE COURT: All right. I think I understand your
16 position. I don't think you need to argue this motion to
17 unseal. This is a grand jury matter and part of an ongoing
18 criminal investigation, and any motion to unseal will be denied.
10 government's brief that talks about the money that he was
11 looking for is that reasonable expense for him basically to do
12 nothing for that period of time but write code to install in
MR. BINNALL: That's correct. And the portion of the9
7 THE COURT: You don't have a code right at the moment.
a You would have to write something?
THE COURT: To install it~
fvlR.BINNALL: Well, to write the code.
5
6
1 MR. BINNALL: I mean, 20, 40 hours. So I would suggest
2 that would probably be a week to a week and a half ( Your Honor,
3 although I would be willing to talk to my client to see if we
4 can get that expedited.
and put it in a way thatorder to take the data from13
10UNDER SEAL
Tracy L. We$tfall OCR-USDC/EDVA
11 the order that prohibits Mr. Levison from disclosing any
12 information.
13 Now, toledon It warrtto disclose -- we have no intention
14 of disclosing the target, but we would like to be able to, for
15 instance, talk to members of the legislature and their staffs
16 about rewriting this in a way that's
17 THE COURT: No. This is an ongoing criminal
18 investigation, and there's no leeway to disclose any information
19 about it.
20 MR. BINNALL: And so at that point it will remain \virh
21 only Mr. Levison and his lawyers, and weill keep it at that.
22 THE COURT: Let me hear from Mr. Trump.
23 Is there some I-Iayviecan work this out or aometh.Lnq
24 that I can do with an order that will help this or what?
25 MR. TROMP: I donlt believe so, Your Honor, because
1 Mr. Levison can disclose and to whom he may disclose it.
2 The First Amendment, of course, doesnlt just cover
3 speech and assembly, but the right to petition for a redress of
4 grievances. We're talking about a statute here, and, honestly,
5 a statute that is very much in the public eye and involving
6 issues that are currently pending before Congress.
7 I think the way that the order currently is wriLten,
8 besides being --
9 THE COURT: Youlre talking about the sealing order?
MR. BINNALL: I'm talking about the sealing order and10
11UNDER SEAL
Tracy L, Westfall OCR-OS'DC/EDVA
MR. TRUMP: There's a search warrant for it, the motion25
24 subpoena for that.
1 you've already articulated the reason why is that anything done
2 by Mr. Levison in terms of writing code or whatever, we have to
3 trust Mr. Levison that we have gotten the information that we
4 were entitIed to get since June 28th. He'5 had every
5 opportunity to propose solutions to come up with ways to address
6 his concerns and he simply hasn't.
7 We can assure the Court that the way that this would
8 operate, while the metadata stream would be captured by a
9 device, the device does not dovmload, does not store, no one
10 looks at it. It filters everything, and at the back end of the
11 filter, 'lie get what we're required to get under the order.
12 So there's no agents looking through the 400,000 other
13 bits of information, customers, whatever. No one looks at that,
14 no one stores it, no one has access to it. All we're going to
15 look at and all we're going to keep is what is called for under
16 the pen register order, and that's all we're asking this Court
17 to do.
18 THE COURT: All right. Well, I think that's
19 reasonable. So what is this before me for this morning o~her
20 than this motion to quash and unseal which I've ruled on?
21 MR. TRUMP: The only thing is to order the production
22 of the encryption keys, which just --
THE COURT: Hasn't that already been done? There's a23
12ONDER SEAL
Tracy L. Westfall OCR-OSDC/EDVA
THE COURT: Well, I will order that. If you will25
21 Mr. Levison that the encryption keys were purchased
22 co~mercially. They're not somehow custom crafted by
23 Mr. Levison. He buys them from a vendor and then they're
24 installed.
7 authorized the seizure of that information. And we would ask
8 the Court to enforce that by directing Mr. Levison to turn over
9 the encryption keys.
10 If counsel represents that that will occur, we can not
11 waste any more of the Court's time. If he represents that
12 Mr. Levison w.i.Ll,not turn over the encryption keys, then we have
13 to discuss what remedial action this Court can take to require
14 compliance with that order.
15 THE COURT: Well, I will order the production of
16 those -- of those keys.
17 Is that simply Mr. Levison or is that the corporation
18 as well?
MR. TRUMP: We issued both, Your Honor, but Your Honor6
1 to quash.
2 THE COURT: Search warrant.
3 MR. TROMP: Excuse me?
4 THE COURT: I said subpoena, but I meant search
5 warrant.
MR. TRUMP: That's one and the same, Your Honor.
Just so the record is clear. We understand from
19
20
13UNDER SEAL
Tracy L. Westfall OCR-USDC/BOVA
25 adjourn until -- or stand in recess till 3 o'clock. Well,
24
17 reasonable. Doesn't have to do it in the next few minutes, but
18 I would think something like this, it's not anything he has co
19 amass or get together. It's just a matter of sending something.
20 So I think 24 hours would be reasonable.
THE COURT: Yeah, I don't think 24 -- 24 hours would be16
1 present an order to me, I'll enter it later on.
2 MR. TRUMP: Thank you.
3 MR. BINNALL: Thank you, Your Honor.
4 As far as time frame goes, my client did ask me if the
5 Court did order this if the Court could give him approximately
6 five days in order to actually physically get the encryption
7 keys here. And so it will be -- or just some sort of reasonable
8 time frame to get the encryption keys here and in the
9 government's hands. He did ask me to ask exactly the manner
10 that those are to be turned over.
11 MR. TRUMP: Your Honor, we understand that this can be
12 done almost instantaneously, as soon as Mr. Levison makes
13 contact with an agent in Dallas, and we would ask that he be
14 given 24 hours or less to comply. This has been going on for a
15 month.
Yes. Thank you, Your Honor.
All right. And you'll present me an order?
We will, Your Honor. Thank you.
All right. Thank you-all, and we'll
MR. BINNALL:
THE COURT:
MR. TRUMP:
THE COURT:
21
22
23
14UNDER SEAL
Tracy L. Westfall O(;R-USOC/EDV.l\
Tracy Westfal
/s/15
16
17
18
19
20
21
22
23
24
25
10
11 I certify, this 19th day of August 2013, that the
12 foregoing is a correct transcript from the record of proceedings
13 in the above-entitled matter to the best of my ability.
14
CERTIFICATION
2 * 'k *
3 (Proceedings concluded at 10:25 a.m.)
4
5
6
7
8
9
1 recess till 9 o'clock tomorrow morning.
15UNDER SEAL
EXHIBIT 19
facilities, and technical assistance necessary to accomplish the installation and use of the pen/trap
Levison shall provide the government with. the encryption keys and any other "information,
It is further ORDERED that, by 5 p.m. CDTon'August 2,2013, Lavahit LLe and.Ladar
ORDERED that the motion to quash and motion to unseal are DENIED;
bench, and as set forth in the government's response to the motions, it is hereby
remove a non-disclosure order relating to these proceedings. For the reasons stated from the
installation and use of a pen register and trap and trace device, and. (2) unseal court records and
compelling Lavabit LLC to provide the government with encryption keys to facilitate the
its owner and operator, to (1) quash the grand jury subpoena and search and seizure warrant
This matter comes before the Court on the motions of Lavabit Ll.C and Ladar Levinson,
ORDER DENYING MOTIONS
IN THE UNTIED STATES DISTRICT COURT FOR THEEASTERN DISTRICT OF VIRGlNTA
-2-
Alexandria, VirginiaAugust _,_ , 2013
CLAUDE M. HILTONUNITED STATES DISTRICT JUDGE
Court.
It is further ORDERED that this Order shall remain under seal until further order of this
device" as required by the July 16,2013 seizure warrant and the June 28,2013 pen register order.
EXHIBIT 20
printout of what he represented to be the encryption keys needed to operate the pen register. This
2. At approximately 1:30 p.m. eDT on August 2,2013, Mr. Levison gave the FBl a
2013. See Order Denying Motions entered AugUSl2, 2013.
order entered June 28,2013. Lavabit was ordered to provide those keys by 5 p.m. on August 2,
government with the encryption keys necessary for the operation of a pen register/trap and trace
1. At the hearing on August 1,2013, this Court directed Lavabit to provide the
order entered August 1,2013. In support of this motion, the United States represents:
LLC and Ladar Levison, its OWner and operator, for Lavabit's failure to comply with this Court's
Code, Section 401 , hereby moves for the issuance of an order imposing sanctions on Lavabit
The United States, through the undersigned counsel, pursuant to Title 18, United States
f ~ fL ~
~~LS J:.. ·'·r.~·...,1" .. ,1
ClERK. U.S. OISIRICT COURTAlEXAM)RiA. VIRGINIA
MOTION FOR SANCTIONS
IN THE MATIER OF THE ) UNDER SEALAPPLICA nON OF THEUNITED )STATES OF Al\1ERICA FOR AN ORDER ) No.1 :13EC297AUTHORIZING THE USE OF A PEN )REGISTERJTRAP AND TRACE DEVICE )ON AN ELECTRONIC MAlL ACCOUNT )
)IN THE MATTER OF THE SEARCH AND )SEIZURE OF ll\TfORMA TLON )ASSOCIATED WITH ) No. I:13SW522
TIS )STORED AT PREMISES CONTROLLED )BY LAVABIT LLC )
)In re Grand Jury ) }-lo. 13-1
Alexandria Division
EASTERN DISTRlCT OF VIRGINIA
IN THE UNITED STATES DISTRlCT COURT FOR THE
-2-
4. On August 4, 201), the undersigned AUSA sent an e-mail to counsel for Lavabit
LLC and Mr. Levison stating that we expect to receive an electronic version of the encryption
keys by 10·:00a.rn. CDT on Monday, August 5, 2013. The e-mail indicated that we expect the
keys to be produced in PEM format, an industry standard file format for digitally representing
SSL keys. See Attachment B. The e-mail further stated that the preferred medium for receipt of
these keys would be a CD hand-delivered to the Dallas office of the FBI (with which Mr.
Levison is familiar). The undersigned AUSA informed counsel for Lavabit LLC and Mr.
Levison that the government would seek an order imposing sanctions if we did not receive the
encryption keys in electronic format by Monday morning.
2013.
printout, in what appears to be 4-point type, consists of 11 pages of largely illegible characters.
See Attachment A. (The attachment was created by scanning the document provided by Mr.
Levison; the original document was described by the Dallas FBI agents as slightly clearer than
the scanned copy but nevertheless illegible.) Moreover, each of the five encryption keys contains
512 individual characters - or a total of2560 characters. To make use of these keys, the FBI
would have to manually input all 2560 characters, and one incorrect keystroke in this laborious
process would render the FBI collection system incapable of collecting decrypted data.
3. At approximately 3:30 p.m. EDT (2:30 p.m. CDT), the undersigned AUSA
contacted counsel for Lavabit LLC and Mr. Levison and informed him that the hard copy format
for receipt of the encryption keys was unworkable and that the goverrunent would need the keys
produced in electronic format. Counsel responded by email at 6:50 p.m. EDT stating that Mr.
Levison "thinks" he can have an electronic version of the keys produced by Monday, August 5,
...- .) -
proposed order.
encryption keys can be given to the FBI in an electronic format. Attachment C to this motion is a
Levison on August 2,2013. Attachment B is a more detailed explanation of how these
7. As noted, Attachment A to this motion is a copy of the printout provided by Mr.
this Court's orders.
and continuing each day in the same amount until Lavabit LLC and Mr. Levison comply with
and Mr. Levison in the amount of $5000 per day beginning at n0011(EDT) on August 5, 2013,
6. The government therefore moves the Court to impose sanctions on Lavabit LLC
received an answer from counsel.
be accomplished sooner, to let him know by 11:00 a.m. this morning. The government has not
PEM format. The undersigned AUSA told counsel that if there was some reason why it cannot
acceptable given that it should take Mr. Levison 5 to to minutes to put the keys onto a CD in
format by 5 p.m. on August 5, 2013. The undersigned AVSA told counsel that was not
this morning, and he stated that Mr. Levison might be able to produce the keys in electronic
undersigned AUSA spoke with counsel for Lavabit and Mr. Levison at approximately 10:00 a.m.
5. The government did not receive the electronic keys as requested. The
- 4 -
United States Attorney ceJustin W. Williams U.S. Attorney's Building2100 Jamieson AvenueAlexandria, Virginia 22314Phone: 703-299-3700
Neil H. MacBrideU·
Respectfully submitted,
Lavabit LLC on August 5, 2013.
8. A copy of this motion, filed under seal, was delivered by email to counsel for
Attachment A
',:
!\;~' ,\i't';.::J';.~.•.:::,.t· ." :1;:. :~.ll.;t. ·:·l;)" ·'tll ..::! .~.(.:nr >I :: .
.~~!':.:';',:~:~;'~'~~,\~::-:::.:~::;:::,:.~~~~;;;~.~:~~;\.~~~;··~'):;1:;'~.~:;~!!.;:!!.~~i\11 :~J
::;~~1Jt?~~~;:~f~i[~~~§;gs.[~r~gt~1~£r~~~:'~•"!. ...(~¥t,~.(·!r1~!f·;·':·.:}~.lW.',\1:0-*\\' ..,....~:?V,.\':':I.o\~;I'if:',·w.:'&::~';-;1';:).V·#._/,o,l:·tr.·
~!~::;~~~:~}r~f:~iA::::~i::~~:~z.~lk}~~~~~S~'~[iE::!.:t~., .~Jo~\"".;1 I':} ..~;~.;:;....i:i'i...."'~:~·o:'-Yr.~·'·II.;;f·t.~:'.~Il' ..', !~;';"r-.':: oI.~.*~.:,.'!".'''~'~.
:~~:;;:~~:,;::;~~~~~:·.~:;}J.~~~f~~~~~~;'~~~i~~;~~;~f!~~:~~:~~~!;:~:;;.~:\Y.' .~ ~.i-:·~·:'.~,'!:l':ti:;';;,·'il\1':::'''D:,q~''t;t-~\W.~f.' .?,.:.c/.' )~\:.2~ ..'f·: ,r::;t:i·:rr,··:X7:
';~~l::·~~i:.:i~;;:{;A:~:f.1]'~ljf~t$:~1~j,~tf~~f.ij~Eii~P~,~0.}~c;;~~';':I';~;~~:;'~:'~~:l;~~:~~~,~:~t;~~i;~~~;~~~;:~:';i;":~i:·:~.1~~~~~.~~;;·~~.';I.~!~:~;':I:~~'~"~~:~7/!'~~~~)~.,'/~:~~~~:~;~~~:;~~;.,:;;;.~.~;~~~:~::Y;.:-:;~;~~:~~:'
,'•• ' .' ,,::'1"Jt:-'\!i1!"~~'(. il.~L~I ' •.1';,'.\;(I';::. )1:,;.. :.: .... ': r ••
...~:.~ ....r;. \ .:/'):-I ·..~.::'.V;(:I'~I:n,::,.! :)t., ' l-:_t.$JllY.'.J~f.,:·t~.'.;\1-'¢;f,1~t'''::'
.:':' .:. ; ~ .;; ;..~·..i.;..::.:oj:~':h·,.).·".. lo" '\:;;'-;':'·.\~.~('::..:1f1il~.f. ,'t
:';'. : .. :.. ,: .,.:···~.:y~l.l'i..ir;:; .1::;"I: ...;,,;,,/:,;r.; .,' !j'-: t· I"-q..,...~ :-::.H .,i~~:~~'~~i~"'.~;~.~:.~~~:~;~:~;~~:~~.~,i~:2t!;~~':;~'~~~~~~'~·~~;Ji~~~~~(~:.f;;::~":. ~i .~.....~·v·'t :,·~,.,,,,t··.. :::.:'J)t.,; :~ .•:J\.(;:~,1.:~)c;:~~'i!::r.,··::.~:..',,·:.::"l.'!·J,~J.U;~·i:•~:;-!~"t l~\'" ~~t-. .. \:\ ~.:II:-I.'..·~J~;;j'w:"'.,:.i"·i:.F::'~:'\";'-:':?:l ..,Wf.:~~~!tt-"~_:,\.lra:~:·.~
'. ; ··.olii+..~_J:·...i!':' ':'1I~:1J, t'_~>'':''li'Ii\' ',.;_!;.::t .1 :~:" • .'('j:; ;; ....V:.'~F;f1.::·.i!:;''):.:'I.:' ;..;.'.~:i'.:-;i\~:o,;~.,j\"r.J.'1~·ft..~o;:: :! J" I.l-'~~~\"vt- ; ':;.:"''\,'t.:'I: ;:'J/.:'i:. \'.. t,~
..... 'l ""I ...il rio ~.: .~J;'~'I ','~,:f,t~:;;) .·J··,'l-;'.• , :,J"'l",~.'\·!·"~~,;~i::-.L·.\-_';:t'lJo\" ..!.~ !' .~!..'.', '!'of ••a 1, t .I/,.:d·:'J·:l,~r;"'·.:1":··;::1 ':r.:~'1.1:':: V\,"<f:l1!1'- J ,;:r... ;.);.fl.;:~.") \~ i;:.· :,.""~":':'.":'/i"t'_r~~\",;u.~rItl'!~;:t!{·~,·."DJ'Vt{1.~\\1::.'I'\~"I:h'·-:..•• ~......,""l~-:'';:':(',I I i>: "c~I'.'" 1:.1:'(,~:ri1 \j_.(.:~-:"·_.r..-:-:'t..:~~~,~··~,,-".~'t..'!t...".I:'''I·:·l. ,... 'I II"~"n:-: !~:':'~:\'\V,.~..q" j <1t(;itt.'~j~Jr.""flll~.t): J.t:# I}'..,~l'n:i/·••.'I-1oJ!:·\;·!;...~;-.~....;! '. I(~·~...\'l~v;!\l'(·t.....~1:/ .hi )'':{~;:,;.t":~;.J)I rll~1'.:' ....,J7\_1! : rr#-..·.·::~l~)..:.··..";:t'':!.' ,~.l' • -..~,;,~)·•.:-:~..t\,'rll,'*.t'.ih ~.:::;;:!~~~,:·.;I::-""\':;II\:).r.:;'Ir:J.l'''1:./:101':;10.; I:.' /,;"~\: ~{\\!.·~·":ll,f:,:,.~.!11t"~I:..'l ;:lIi):::t\l....•·;o··1f."i.:'.citi1..o~t.!.lc·"~·l;\I~!).r:r/:'/l·.: .~; ••.. ::·..;~,~',I-..i1: :.:!(c.-i:'ol'l;7' ::'?I1..\';n ~:·:3~~.:'f..'v-'\J";.~"'..,;.'1l1J·A-CJ'::?·'f).~~·l·.f!r:
~.~~~.~~~.~:~:~~;:~~~:;i~:~:~;~:.~{.~~:~~~~~~~,;;f:~~;~~~~~..~~~~:~.;~~!~:::i::' . '."..:ntflr.)'~;'V:t.iI('~:{(I ~,,~·~..(xt/bJt::~*",o((o.».r.1~e;'~f;,:lf)Ir!o:'..!';j~J-:'101-~'i, ..! I (..:(~~\t·\;,:"'·ll':..:l~~..~.:=h-o:vVi-i~.~\![(.~;".j(\·{'t)1;Il··~.!.:rf.~I;(N·/;·'Ci:,.' .~I",~;;.' ·,'t;'. l~;jo":r~,,:.';:~1~.t·II l;1':'·I~'·l!t·:I;~r::t~1!....tt·,\:: I::......~dI1~:It'~''I'.~:\~.....\::(\;1 • ~ j;'\t:;~'~1.>'::I.~.~r1:....~)' !:r.rN~Ql!i::::::..~it 'f'\~it';,·r/l'n.M·Vr_;:'f-t~·~·'\.~~}of~'~~ n','~~'l·~r;~:.\\1;~.~,~:';f~";~~'.,\;:.,,::,,:·~..~,~·~il:~I.~t~lI.y.·'·il ~ ,·.:"!t :;P:;1'1:,\~r~r:~):,"1•••
.p ~A\'.i..t'f ..:.!' .1: :\:~~\'~ ,.":':'~"'" ,: ~li:~'t-..r.,,·:.·"-{·:.!..~<\.'),,'::-/,.r:t;,'\' ..;'.:'f(l.4;'(.;,,~:...'~.:.'i' ;. l~ _!i:~y'2~::r..: :.1.~:-1,,;,.f·I'~~.I..'I.·:.''1t.ir:·.v....:ll!.....~ii~{.j:~.'.f:);':M~:t~, l.... :::·.!;I:.'1·,t;t i, :of..tt· ... ':"'::~:;' ·'~~.t,t!i,..~:."~•::-~~~~'C(:'J}.J..':~I·.:~';':.'t;;'•...nt, :'~'~.!:~1!'!:: ~.~ : ;...: ..; ..~.: ·:'·./l(~;.:,.~~;~.~~·;·i~~~~;~~~:~;t~;:~~:~;:.;:~:~;\~;(J~.~;:~~:~~~~~'\ -- !..:·"·'·i~;...4 ~{·:~l.i....':"I:t .::.}:.· ..:.:~~~\·•.(lr'''·:,..lli..·;.~~<·~!·:!''....,.:~ .:;. I ~.::.;..:.:":':'~:..'(..,.r:I.:.·...: t ,t~.:.;.f' :;'l::'~\.::'t·~-l1.\".'~':\.~:1-J;e~\':~~:::···_:• ~, :;... '~:".'t:· !!~~Il) Jt."':~~:.r.J t\:.t "'..A::··Jl-;;.!~C,·:Uf.:.i.:.~:," :::r..,~!:. t' -, .'': ~ .-. ". . ..:.... :',':t.f::O: ': ...... 11 (:'. ".: .' • :':.~. 'y, •••~,~.::l.'~/·l':.. 'i -:';'\-'·r·.
.... /,'.1 \".\' ;"'':'" .,:'..f ..;f--,!:;,j:.....'rt:· .:.:1~!(i:::~::,J. ':.~;':o! I'oI\jt~i-'':.J·\·_I:....' HJ t_; J,.;;.Iv~...,:.-;:rt';:{~I'~_~·t:·H~(\..,.i.~J'1,::-J;~);").I~;.!1Y,i1i·'1·.i~·t'.d'):ml;rt:'S~'Y:\:i'·t.· .•..."~.'.-;·!.~~.(\·\~....I..:;,(.Jj,~."!".::.:::t;?"V:.::'-C:':·A.':~.1·:f:l!C),~·"t..A,;,1'\': •• :.::-,:.~',j'.~..·I·:-:.J( :(lq:,r..".1 ~fj:~~~:~::::1I~',t':i.~;:.jI;(:.f.:~.:"';W.t):f.7~:;:·:"·I:(~':~r.1I
.;~'~'.~~~;,~~:~:~~.~~~~·:~~;~~~'·~;t:?~~·::::;~~;~·;~~;;\~~~::~i;·:~·~;::;;~:~'fr~~~~;~;~t;~w.! .' ~::~!~.~;':;:~,~::~:1::~:~;1~~~~~.::~~~·~·:~.~~~:~~~f:~~~~;$;~;~;,~;~:·.~~~·.~.~!;<cy.,'~' '0::: i. ,:J.~.~~:,';-.:, ;!l' ',;1:" , ....!.~II·P!;.' •;-j I\!;\'i.t,:-;t:·· ..-;.:'-":"~(q:;.~~1.':':,":...'; "f~,·~i;,·/:~_ofl\·'.J·)";:,·::;)... I r\".!·!~~I:;.i·!0 ~~.~:.1r~.t-~!-~'f,.;.,~(,'.:"'::'.'-:;:~i.·l~!..! ~~;I';I,i'j··t, ·r\l·I'::':~·:~;.,..:·..'!:'.-t-;,.}.O;:;':,!. ;\~::r:.l\"';o;, .\~,\tO:.;'Ii' '~.~"'('H':.. ::·r...··,'f.,\ 1:~S.:;' :', ,' ..' ....;'."\1 ,I ~!o.~!;r:;~)R.~~,!;ll~..!:"'!l,·'r.Ht;:'t:-,t" ~~:··i'JJ,r..:,o\:&, ,-:l>·tj:i1·r:.Nf. ::r!l~ ::i,;... 1·:i.J:t'l .t.'i'.' rol;J;tJ: 10,,11
~;_ -. '.' ..... : J :..!!"li- :.·;:~.i\1i1''''-:~~:;,',,-.1.':'r;-r.'i ~I : t. ~'."-:~\'!'''':'_''''I'" ".....;.,.'* it-• 1 '!''':''':.'."! ';/'':.~VI'.,,;,.""!'. :, ool;;·~~j :.!":,t ·.+:','{:1. J..~...:..P~\'S· ,):"" ;./. J. ,
\ :O::'''.~.·.....·.:!tt:':..;.;hfr~I(, :')\00""" .'r ....W.Y:....:••::.\!•.,., ,i:. y ,.\.'1l':~~~'I"J".(;'\1; r··•; ..: ;~'., i;t::--t,I'd··;(!). y:: •• 1:·J1:J .;...·{..:d~:;lta!.! ...~~:f'oo}o(y1.i: '/rtr"'~.d·~.
~,..{ •• :: •• 1 ,...···;..f..;...~?·} i;'~:'::"o:..'),;a!~:Yt,r..;:.\;'\J~\.(l',~. :;'/':.::. ~.l:.<j.;-',..to.' ('r,I"~' "" j.,,~.~, 'I :;j';~~•• j..i:r.~r.'i.!t.-:'),.i.\..'(:~1·I=.,JI(I!.\f·,:.;.'N;.....,:,1~,~d·.:I'1',."(.:':0: .:.:. ":' " :t~.\':'.I,~~":"'..,:,••:; "~~'~';1';'!._; .,~~i.~"..~'.~}'l:-?." ;,:--1.: :..t-:,,&1 :;~~.\ •
:.::~; ~~ ;.. ~:1:~~~.~:~:\:•.:~;;,:~:'/)'~~~.~~:·;:~~~::~.:.~~r~:~:;:..:::~~.u:.i:>::t;;~.~Jl~...'.1"~I~';'," .:':~ ~:"":·}t. ::\,·i'.?"i;·1~r: ·,:.\!~·...·~'Ij ·l·.~.-':.)\:·.·.J./'.·!.·,/":.~
'. p' I •• t·a;.· "i'~rM:: • ~.. ',\ ,~t·/..~.:,.'.;..1.\ .,;....{.':;t·_. .: .t':: !:-:'~'.?:.r;.,: .A·I;or..' .'t-:~,..', ;·f!..~" < "".j.';.,';.'.:.!!".':./ ~··."~;:-:O:"'~:'I:I': ...... ~.. ~ , ~ .; '. '.' :;;.~
:' t'-v:'· ...~I:.1;,..: ...7..._';:1,••••• ~•• h~"~~J,.J.:r:/ '.~.;":'....-1. J.~I ·,1:.:-.~""'n ,:"'1:......." I.;'r:f':r ,.\'. ·l'tt ..:.} 10.;'!o!., ..... : ~.r.:.!~\:.~\.~.~..'....!~:.o;:~,r.;'.-'i.~ .-:.r:: .;'~"·I•.~!.......~.....! ·;·;,,';"\o"!:~!"'~"·I:·,j.·Hh~,'·\:II-.t11.'::":f',~:·~::::...~\:.,\'.::?)!;:....rt11~~J:'...• ~...: t..;:t.::' .,t".-:_!.~:~.•o'!.'I'~:':"!rhl:::: ~~-!11 :,..·.I';:.t6.f:"11:~'A'V.~~~·-\.'I.~::"."i'"i'.~~:.r ..;;' ~,.:.,,~~".:"!'.:~:.:;t!:·~·t•.~~.~!\''t~...t ,#,f !.").i.'r.llP 'h!I\" I ~•.":.~\.,....';:"'tVW~\!'l
... '.i 'J"".\' ::: t.--,_~~f{\~"/'Io\~"D:":A.:'>.·i:';I,:... \-r-.l..'t' :,~.".t:!.\...~r...,'~ '-\,...', .. ·;'!"i:!;I,r.·'· .\, '.~' :-::.; ..!;-r~.~r "';"t,,~r, ;,·,i\.;;~S.rI.~..1:.:'-i·''(·~1'·,_.:'1,1;".:,i;,:t:/)~... :" .::-:,~•...'''';::.~.:.I :'1' I"'h''': ! . '.~I,·.)-'''''; :I' :;...' ',: :/1:.1 ••.. ".::!;:.•~.'.:.
, .: ...:·..,;.\;l.:\; ...~l.t~·. \ .•li~··tH>~\·r:~..:.:J~v.~i".·;'..,··I,:;'h:......~.• '. ~"~••j. ....'~l,~ L11: ••• 1':'::'.""~ j \:,..if··. i~I!!J') (..~>·Io!r. ~~::.,nl.' .. ,,' ......!'.;;/.~,'\:.j_i::-:;n.' (;,,,';r;t"\j~(!or~:.i..j\'.!\;:." /::..' :::~ : i:..1.::' :'i. \\ :"'t." '. :\:,~~·,;,::ty,'f I,.:\[;v' -4 -:.~ .u;;~'II~""'",f:,;(';.;.l.;.l.:', (,1 .:..·t.~'" M;·,;-:S".-,_··;r·dl' ,~I\·.I.~".,';. '.~ \'?h ·lf~:::~•.J·.··!rtt;-<'.Nl7'H.r-:,~·!'·r;.\~t,::\l·.• ·r, . ~,'c~(:...?,:'.' ~:: •• :.";O '<'\":\':",,;1 !ll. ~'..I'I••\ 1:·~'::':.';',x;,'"::..:.: ~t.-Jrt{.:.i.:; .. "0: ::.:.:~ H '••.~·L. :.>ff· .".t"'(:~" :: :"...':,VI,I:EA.\·. ,.:\ .r:..~,.;"t·';;::--.~I~..... , ;-:.,.t:).h..ijti':~\"'I·I!.....,:,.:.; : . /' t\!·A·~.i:'' ; .1·.i)I'C': :':1~'.;""001~~'i~':r..:}l:.~!i·~~t-J'~~:.:;I;' ~~.'.:'C ~.:-~F.
::~~.~:~;~':\'~.~J~'~~'~;:,::..,..:::~~~;:.(~~:~.:;.~\~~;~:\~..;~":::~::~:~~'I:.:i.':".:J:~~'.' ,I ..... ..;/:·: ...',~'.;. .~l' .~·~':r~':0 ...:Io,if'lJ·,·:~,<"V::;-; ·I'l!~:!·~~,.,tT!: ,~";I:-;l-; ,-: •, If ,>,.~... :'(r\',j,:.·~"fll;.-;.:.,·~I~,);:h~1,'·;.:...!W, ~~I:).),;f·;~:•.~·/':,...·,-:,··,· ••~ . f".~\':.~::~,,:!~~:.:~~~.~:.:;.~~~~:~:i;.~:}:;·:·:~:~:~!.~;:~t~l;;~:.:~-~.~.~~..;~..'~~J.~~~I
';. .' :':!.! 'f:' ~,";'1 :.\'.\~, ..', 't t:~::..:o.~j~'4,.<1).!.,'t.j-\:\ 1:'.l--:' '. f~);:;.1·;.~-o\~\,~,'.... ·.0 I J ~ .... ,:~'r·i"'N",) I'tl"~":'.t.,.;t'~r;.t.?I.'~",' '.1 J-I\~ lV:.W:·~"i'~.(..;·.v .io..\.'#,1Nj'.'o:~.~.''~1';t..~/ •. " I':.~,\',~rt·..t "4;,,":/.");J,':l:..l.,:.t-:~ t~>.:(~.:V·"'.I::';\·::::(1:J"'. :":.;~~n~,··..:I.~.~,'~t.f-.nl.~_,:r.,:)\".:l·r.·c:.,;·"·I;..~,,~·-:~\\l"~~'\;,n·~l;~:"l
• ':,;: ",:;i. ,: .:. ': ~ 1"~:'''I':''t.:~~·.~"X;Yi·:'':'::!i:-o/\'·r: ~T';",::'ti·..1.:·L'1nJ}/..t):.\:hn': .1,,' I' :', .i,,:;.~;·:'y;•~. ~;~'.:,r~~'>:;,·4.:--·l-:"':'~·'J I'~""\>\-"'l1j:·,'II~~1'~"\ 11/,\\'1:lr~,~'~:If,',,'. ~:·~..·tr',~:.::.':~f4.\'1.;·\r.,W: ~;''':/I~:W:.l\'i:'':;I;:D'~''':''':' • /\Wi :::,:-..~:;.:.;,:-,~'.".t·,;;...,...:: ~~.:.~~'"'ItV\l'\'.:}>I:.~;~'i'(·:·~hf.:4')i" .~~.1·~t~:.~:'.i'.~.;:: :e!':1.',.':1; '{ '.:1."., ':';;',;:i'! i1'~,. toRI;: ~~,!{X;)~.!:~.r.uf~l/~·;~~(::':It",·f!!~..#~~!::::10.'
: .." ::.\\ ,,'.::.o' 1·!l:;,..!.....•...!;!'!}.,.-1~~;;:.:t·..·1o":1o~/.. _....!:~1"I,NI·I.!,..·...:~·/~~J;.;v. ...--;:.);':: .;,~:.:~.i;: .'!i ·:.X\~·::.:q/ .:,...1I'~ M·i·,'j·",_~~.:, '-.(!';.(h·~ f\.~.:':.~'~!.~'.{".t-:,'.1.. "': ~.\q~:J.; ..).~i·:''''I)II·=:l''ll{_t;',,~•.: ~.."';:'P'~•(•.;.4.....t.·:f.~··'.~.:-<:'.. ; ~~~:l'~,~:\\.~'J.:;.1, <I> ":·.:"d·~;:'00 ,:::~rJ.J·,;",.,
' 1 :.:,r~i- /:i'·<. l:'.'t),,·I· ...,'.
.~. ·_1: .I~!',:;.;or !., ".f :·~I.!"~':::·'·::·"·:·"l:·t;.:t..".r.t.'-.,t·i'" '.! .~...". \:,.j ';.. -::'~o(. :l!';il'.'~)~·'·"·~~,...t,··-:lHI~'·'~/',\'I'(-' 1,....;, ...... , ":::"
. "':~:!".\I::.::. ~.". 1;.,:·t~••l ....iJ-:~::-~·••. ,.\~\\.~.".,,:
~~~:"~:~'>:·~:~~~'~~~'~:;;;:~~j~.,;:~~·:·,~~·1~~{I~·/i;.~1~1~')~:"~:';~J.:. ~:::: ~~: .. ~ .' .'!"M':.:' 1~~.";,.;,,~ ....I{)'''i··il'to·;'l\t:-H~!.?Jl S·X~·...t:t'.:r;,·:vo \I~:.~:.~,:!::~;'''::-'~''}Jt '~ ••lI~l ...">·." ··I:'!'\~·".'!·.~'\ ~,1'~:~":I::.::·,'.ltj·.li':: ',;::\!~)l.:-:'i 1:1'.:·.",~:\;,':J:}"o;• .... ":,: "~"h~':':!'t:~i'~'..,··.·';i'1'(,,;·..i~j.!t"\;;J ij';o:{~'t,'';:·~I:!':~:'':.'':)\'·I (" .; )~,: •'::-:
..: ' ::I~!:i~.-:'\ :'I:" ',;'I.~:~;'!'.~'.;# i/..-:,,~;';-.:·1.'.V"·:.... !-V:-:t~.~;,~.:,\~ ...r.. t;;';.",.. _. t:' ·r;·. .' :!.~",:); -::,:... ~!';,~!li,l.; ...~:.:." }':lfJ .1' .:':!.!\(. ~~ ,'.:;~.'~ :~'. ,.:,,v ., .....~ -'t',.!·.'·,'.1 ' ..~,:'hv :'i~''''·,.\.\'.lo:.•~..::; ...,:/...\.'!:\,~....'...:.... \::-:~.t:·:"I ..I':·t..'1"'.; '~~~t.:.·.,:~.;I·"Jut ,"'J'" ~: .... ,,;. ~:.', '. "i:'-U,"j .,..,y..4... ;':'h1jV ..,,.;,,,\,....·l~~i ,.;-."t••M•
~ . ,,::·;·:.~;hi;,..,;··:;!:.'fu~:"":·:~\·Ff!J·.·~.:;[~~.~.!".::.;~..:; .. '·'P·' .\~·I\.:' .'~'.:.!! "\ '''\1' f,:",,,·,·•. ::1.:··, ;\·.,':~·;:··~r,"L'.:,\11.:::~·ft1:;1,, .:'! '.': ~.~\ .:.j.r.v ...Ii,,,, .·.r",\V.·r'''·i:!:,.f,'f.M-:'' .:..~~.!._t.:;•..~~::r~\·.\',: •. : \ i'~"':~,::"-'~II'·I'o"·I.·.'.~·:,::\"1t} ";
• ·.:.. '; ..q"h :;:-
..: "./ .
" .':! ..,:.",,:'.-:. .........~•.:, (1-h·i\." t.;"It'i~1~ n I:\'~;,·;", I ;.A·vl 1/\ .:. ;:\' \t·/:.i,
".'!:'•. t· :,,~:'I1': 1.:·:·,t.;·I·-;'~'."_H·"n--1l(:·1'~;·r.~;;'&1\;;·:~\::~:\·.'i.l~·\-l... 1•••. :.::. :'\~t,J1~··..c,.rfo.'\.'i:sl~:'\.\i\':"}.(;." II\~.I:·;)::.~:,·.i:';~),'j ''iJ
. - ~.:..:'S:·:.{'.iJ.J,I: \r;l:[,i;~(f~i-1tjrtV·M''',;~~·.;t~...,:,.i ;..~;...:J. : " '}.~:."i~"\H~i-r:4-~,
:'~:~·::::';;~}::~~:';;!::J~~i~~:~~~:~~;~~:;i~~~¥~:~~:~£;i;:".·~;~~::··.;;~?;'··,;.. '~:):".~,,!.:~t;!~~~;j·;~1~~'~~,.{!~;;..~~;4;tt.;,~~'~~:~;~;;~!~~!:.~.~~;~::~;~~,~)~;~~~(~~\'.,'::;~~~~~~:'::h~~··~:~·/~:~:~:~~:.\~~,~:~j;'::::i~~~~~~;.~·;\~.~~~~:~~;..,~;,}~:~!~,~. : ..~'." ';". ::'::.: .~~.,.'~:·:-,-t·,..•.• !~.;~,.,-:.~',,\;1-e"11li},;' 'C·;I.f·,.:~i;"-": ~"l.~"
::~~~~;~~~:;i~f~:~i~~}~:·~~~~:[~{~;~~?~')~~~~(1~~it~t~~i~:~:fii:f::~~.~i::...~:~~.:~.~~T;'~~;f:~~~~~~',:~.'~:~~;;::~~~.\:·:.~:::::;;t~;~:;~~;.~;~·~~:~.::~.:.::..':. .~~,:'';~:!\:..'~.':;~~~,~~::,~;~~~r?·::~.:~::';~·~::~·.~~f~:·;~~~~~.:l~;~;':;.~:..:~1.f:: . :: ·:.:'.:··:1..···,/, ..': ~" 1'.' ..'c : ,'1,,...\ ~,,~!..,.'o'~..1.'f.';. ......" ,IIt·· I::r, ",~ \'/ :~~",.." •.:.-.....,I(? •. 1'4''':•• -; t'., :}.'....I.\~·:':.:.:d~!~~".,,:.
", ,'.'" ' ••• !'.•••;~:~.: ..... ~I·.~~·\~.:;1;·:· ..··'·:-.·,,···.\·;,~.(.....:: .":t •. ', .'. '" ·,··~·.::.'I..'·"~\:·,.,...... ,':'.~I:·.·~I:~"
... • ;", ..... '. f. ~ '.,; • I ••t.··:~ .~ ::'.;;:..rll:~._,n··:".:-:(,!, ·;"•..,.'\-:I:.t~:, ..~: : :.:"i .•.\l::~;·:".· ; :.:
, ,.
",-4,' i,'..:i"J; ·h~i(,j,J',lf..r.r" I~1~1If~'\r.li'\.,..::·;_j·:';f){~1'ft'A·,t:/l',"l~~it:;\"·:.,M·f\~JIrrr ;!.,~~.'"t~t.J,:';;,\·t;,~I·l.{,~.: :: f\ ;"; '':i;;'~l·"!!.1 (~~:w/'.r,rt<:I·;"''',~~r,~fll'~'N,,")t.l.'.J :\Vi'.~;~'~:\:·~ --"! ~~
• '1 , ... ,,,H I ::t;"1,111.~'·.'v·J"': I,t :~ '': If ~';;.:, 'W: r.:r,"': '., ..'. ,.:./~ ~, ; 1,,~ ..(o ".:::;:~01~.""~';.,:,..::..:.....,...-::,,,'';':.;;..·.'J....~:....~N(V:t'.:..~,·.,:.::-~·:~;:,.:.t·~-";·':...:~'J, Ij\)t."; l-~.t-(~~~:~ .':\\'!:\:JI,.,\'!I'!\!.·fI~~rh..,.}xciW..; I~:>~.•:j ",;;'i :;;1., ",,~. :W\ll.l~~"~'~"~\'M\<U;"'~ l,li(fl.t~.~:.~t .'~'.~~"':\:);J!~..-:,,,,:''.;:AtJ ,'''\ .~~AA(')~$R1l:r:i.1r!...Atl~!:)lAC::'::C-""'c!"l'·r),"".;'}: ."~h..:;i rf.:'t.!·:·'ufl.~~Ji"Vt"..., ~1lU:IIIJVo\»U"U:l1.Lt-rF.V"','h.:~(·; t!"r"."'1 ...\" ~l!i:*;- !t-Y't..1t"""#f\I;:!'iU~: ..l,:;.t.iVI'''~'''~4~J "i-J~' .......;,•·'\1 ~o.t_~r.r1'!d_e.j}';l·91th'«(_', .11·l)(~I!-l!t:.~"'r\)j(;.( :,t •.. ..:t I~tJil11(;; ,"".',ItJ.!I ~·4.;~'l'~ ;t~.~'."~ltl..'h~Jf~.; "~·4A.'fJ.J·,~::n~~;;;~~;,:~~.~, .,')f; .:Ai ,,"'~I'<:.....j,,"~ .'Kr{\~'I4~i"'ttM'(.IM;t.:r.,1 f",;,;<.r""-.!I•.l.¥~"'i',,:,.'.:f.l{""i:{:/·i::..'J"T/-ff'';-'_~jlfirc~W~£fi(j,1!>~,''''h-,{\'ilJ.~/I'tw.:::1. ",Ii~~~ltlk\W,f If>!.rr,."",r.,Q.I.~~A!'.';.V.;l,.,'f.'M:GJ' ...M'i~3).;;'11;A118'!;!'~I:1(:1 .'i': '::I,:t~,Y.1F :\'~:~:.f.i'.r.a.:2IoM1l.~,;.'ll'~linM~;;;tll,'l"~'r:;><.~I\~:"1?~':'Ii;,':t.f:,~';4!L~V,\,(~WBk.l)~.J,~~,L,'XJ()uW/PY?iOi;(M/.},:.!Ml~,,=::~:',:\'. IVr"r:.t,<.r;.'t~1:I;~~,I~wt.~~1"jAl:WJ.:,p,2?'~ft./<;()I-:;j''!?i'r:v.~'1trI'r.lr'~),(,t. ::..r.i~)~:.l~.P'·(\'L\I'.~~.YNln'~,n"tY'lvrJ.H'~"~l"~,~f~!~rlt()'"..t"..S~:.f.('!(~~~.J!"t.of~.'~~:;\~...:1~:l,jn~i~.::;)';r.:,AO:lil~.~,w,~Ih'fif.,-t:::LMt·O!h.~;" j:W:jf'~':j-,:¥Jt t:""w:~):~t4,1.A; ~;'>:·,\lrf.'('~:"f;"\\.-,A<':'>,,I)IflI'·i\1.~lli,.,-::I(U~ I,:W. f:l;t\'iCQVr:r.W"J~XU,'V '1.\\1'//,' \\~;~~~::.,<~ 1(f'j.,-;';:(wt:'.I.~M,("l>o1o"'~r,!tJlV~l~S.'IIt,·,.;;:Hg.:. ~1'f.1.~"\1)...~:" !)?1't'~~."'1\lln.~:1'N.'.:~-1'!'14) t '11:.1.i"./~"'):t~!.;;. lI1··!,"''''':f~::;<;1)t'''21::~''I.IltOr.""'H3"1~1:;YIC:ntJ,,,,nt;7i·1')Ji'i~::;f<:':"{'~'~.IC: 'l'i ·,~·rt\f~~~~~'ii~~l"'~;J<lb;~\:.'Hlr~'tn·.,'De'>'kJ_.A, ;".Uwfo,ir.{,. ;",·;.:'·'Ut>.;.M'f:ff:!).I.;:r;..:<'6':I :t:V• .l'('::II1IJj-.!.'J!;;e1Mt:i.{':iili>~'!I::I~.:'l ~'WI- .d.t'c."',t1;·rt1.WI· ,1:.'I',.'N/i".;; ....."lIm:..·;;i,...f.~.:J..1A'r)})-1'l:,tlllo1l•.\. l'(::.v!.'9\:·tl'; H-IJc""'o\'I~o\>'f ,~v....,..".",~.:>~~)I\rN"'),:"~ i-<l.'\i"'{;\i:j)-n~~:Y~)A;:Cf):)I. ?tlbr ....,'::1;y,...'1cr..:r~'l'I·.s:irlItd.?H,:ritv.:: ::;lQl:'.~~';!I',~~>t.i:.'iCJIo't.t-.,,;'JIonc·JXi.."'0'~~(.W.I.C';fd~ll'h,fo1~·r. I:,M~vk..~ .~~.,;,,,:,{IOJ·.'I~Or,'Jft)7:t~~'>?'.)t:fII',l"+t+toj)lO,~""":~f'1'; ....,~...:i: !~~t~Io/l,"":,1.?;*!-:-'':.;'''l:k:;Y~-;i',;)(Jt-&ti.~!J.intf)o\..~~~a:J;·.';.-tl•.i:_r{;":·"u:a •:l\'~!.~ ~A.,,,t:~.r."lt;'-O::!';«if~:.?7iWFl*.:I""ltt("""4))",::(i3,,,r.~}.'J.·.i l'i:'~q:"~~1'!If':~~\j(,1l,,o;cl~'\''i'\',,-\l}~.\~ ..·~I,~""X~>!;I(.::S:t.\~~'-lL·NJ:~-!) t;i:;'\;r)',,?,r*f~;..~:,~,~/';:';Ylt~",t-1l11l"'lr{Jlt't.ll:;:~:-.'''''li,~,;)d~~I'~'';'1 I~t. }il~~ !,'IIM~I)f:~' 11l~/,31!(!li1:MJ1iltt~~"t~~~r,:.lj:~IVJ.~>~.I·(lrl})'1::':;~"~~)1tvf:::q c~'~~9i?l'J\,W,:~~"'~l'/ur.:t<,,_Il".li:",r~·I""''}~''.lW)jf'JPI?!).[',;1f1v,·.t ",.hr,..M ~"'nt~'R;~It:.\~:.
'. .:~-r;'~:T...",.,',-.::,: :.1;1" ·):[Q~I<;I(JQ...tX)Y.~"'~fi1I."""'''' (l.<eJI'N:7I<:!~;t'":~,.' ~<;:·;~~1,;f~{3l;y;{<tn2!.nl"WOIi"·Jl"'!'1M1J...·!I<Ell'-4'~I"f"l~.:sii::.~ ":\...ilv&')..t~~~~::h,i~(}xe.'l·I'J~~t;'''mIr.~''!!::r:.. '':cl'U9.l.J';',j !;.'\ir"-I\:;~:::::;;"\"";\' ~ll "')1 W·~~,(\l,~.,z'o'';/if).~~~i),'",t. 'U i~~:;.,.;'>I~:rF.VI!'~:'I:i;M~tlWHcO,(L'Jr.\"AJ!;il.(;£:f,Olf:O:,~~lll'.:.01 r,i:(i,..'f~'t..~~1)..~.~~ ''''''l.~lk";'J,lI:'I: ~EH.;.:w.#;I£.7,.1.1!~·")I(r~r.t~~~.~~I n\'~':T.J"""J:Q:..:t:""., ".. :f.I,AIII,:110~'(''''''l,'ik:~;;'<;;.:~,.".~·;';\'~•'....: ....'''I.J1'::r~'fa\~\.,;i-l;J; ".'(J:; ..l:tslf::t;.-'j'".·,p; ,:.)IIl:t~Ir.aw.m:X'rt,...;,1.;/.'4,1'·c."! ·nrJ,·ot,':,~;''l:<"t':',11,\~~<'~.\VI<:"'ll...t~(f..'i;'f<"t'f:n."$,II :.....,:"V;>:,•,~~"::;;1..:i(!.Htf.jJ~Y.frf~N.rl"':)~:\olt."'~,ot:Y~Ai'!;:,;:~~f;eHfhp')£'J,!}.:.J,,:::"."'. f ill :~~'~=-Gcf(":~1.~lm;.G'~"M''''X:-':-:'~;''1::}U~·II)\'.l~_t).:<iqrt.11':ti.' .' ..:~:p~-:,,-:.~{·.'i;(J:.r.Jn;tii'··~1.1,(.k'ITtlr!tltl~ ;:.t'T·.t.:l:.tNr,\':;JM~j{f.'l;-t..~'.~••I"r. t.~'(k~ ..,,~;x!\"'a;,~·..cjy(.{{'\"N.'.'\;,n.'?1'It,h.:\fI'\.i rW"9C'~~r",:Zic~" ....Jiif:,:,:•.) .:i· r: <:'·f:' :i''Vltl'·~~'(l~:M'.1 :r.:(jo1:;rt~.AllI':'r.>d'.4l'}>'!-(."i',.:.u)::~,"";:ll1)'t~~ :,.jo .:,~ ~::,: ..:':j:',Ji'I:.\~.J.lc.I\\aL't:!t:"/~u\:(i;./~'Fi.Wf.l~Ji~:J&:I.,,\'~;'ifj~.!}~,!i \t::".....~..~~!t:~t:f;,:::i-·~;\-'I.U,t.}It':»;i.U;~::tJoo~~It~1b';'(1t'!"~I(;J(J",O"'':'l·.'\1.t;;:''Y·(.'}4~J:.::. :~M't;.{.rr.fj,~,.Ji':f',:.M~",D-'::.",I~I(.'(),JQ~~l)kJ"U;(:-;'''''J'(.~J'lrj,~t,;,.'~~:~ 1;~:•.,p.,(',~)"",,,~,;!-,wJP,/oI;.I"':."IOtWI6I,\'fi:'4:lo0Ii :;MN,)u,·;'!)!! ~.t.~:"1~'.~tt.J;~j.:'!::{t).:.t:Wb"·"~Jf/'l~~"l)'~':;4».'A:,:"n£.\.'"'Cv.~ihJ~:/Il"·':~IJ.~-r.·~'.•"..-Q..:o..tf&·.a-:.fi)'~1.l"~\"h"l&J'''.c.f.<:'(.i!Y(t;n..~~,")o"~·Jr~i'''''",.~:;,:,i s..·:'.J:\:~'i-,«:)';'\i'~I J),ru.<IY'~ )fII''(>l('~.'ojf;1"i¥1:r$~HiI:Y'7rCl.C4..JI ;(.!;. '*-1:.1"'':'f~C'\O:M''''·.~ri''!/-::cJof~t:r.'),rD:',J'-4'';'HS/~:~~.t!ii4"":~~ &;,i"'l,;·:::.n~ttf;;!:;").•·....,;II:~::;·.:;,,~;"»f';--:"'lf!.:,·~.t.x:.~'"o!:t·7;-:r,IfN:
:+.:. w,f~;:J.:;.;.:.L";·;.J.:-f+Ui{:.tJ\;:~#('/l,' ..';\·;.,,'H.ll1(..r.;.j{-!::....:;/~S1;..Itt~;,~.' '\,(.f'*l~·M}\'I!."""~'~IYlI,,:iI1l':~ ...flb:.-..,.; 1,18::~;.,1;:,~!1.:·IV",. H,t!IJt,.:rn·.\!(,"-" }.A:r •• ·,/4~;"·...,. ,££j',~.,),.).vc:~·,(.f'~n.1-'Vl!r;r;..;'1..:~f'.V.~J:llj·rl":.J.;·J\':.i.' r ':.::".'.:,,:\t;t:iJ~··:'l7.,1\I{~:~:·/11.'\)..t~,u:.~..I\Jr'J1v~)Vru!'t~ nrr.<:f.!",'!1: f'>/ •.'....j~.. F,,;i~·.·;'1!' '~'{.l'::{"< .r;:l·I't.~("'~l·!r")lf~~;t})~Nj ::(r:;,:O'.f1tt i.,JiVr.."J;.~'f''fl'j 1\1:;'Ai:~ ".!!-..,.l ':'/~~..·!iI '11r.l:-I·X',t ...y~t.~r.(II,·II'Ji·(tJ.."'!III·rM!:}·.rl'·~.~:r.1..),:'iU '·'!.·l":J.~.:t~f.:J~(l·:·..,;,bt ~.(l,.toU;:,.~JI.~·~.:!:·~..;.-:a1iJlf:l';t-~M:t.·"f~l'·..l:~'.~.:..~•••"1 ..#"'.....M1):~·t-.A";;....... :r~~rl ...l!lo(..h:!,~lt.,Oi.\,.(;C.~l::)'..·1:'1~;f(~·,r·"#\('1s ~...'~:.: I\L".j.,>i :~: ..f~ ::~:. ·.\v.~·.MH~1/ec,u..:.J:::'1'tt.:t\:!~lJl~.I~r.:1I1'''~r.'''' ,,')lI':... ' ,',)j <'.~·.I)owt:,: ,1'1.I:'~llIJ),')~'f.''I\l.I';'If. ...T~.M~,~"'.,.,;...•• r..I.~:/" ,v"-:~-:~:l~:L,::~«(~rl~..,...:!'!,-n.(('d'l.'I""'~~-;,;:-~~~'O.:!:,,:~.;.ys;"~~fl'. ;~: !}J'.tf~~:·!i~:.Mt'.{;f....~:'·'~'.:..~~t'i.l(.I.l·I·Lln.'tn:..'l-~,O,).:t'''~-/~':.:flh.,.,·.:1.: ':,\;!' ;:-V"t1~i:CttGi.\li~.2t~11~~Ui.'r:<M):~:~av:r.S.,~~1ilt~tJ,1,. \":'lr~,$~:~"'.tt:~t.~·;:t'~~)I.: .. i;~6-:f\\Y·Y.i.':41J/~.-ti·,1t.:!'~lr.,t..,It" ...H~,~.!;·:t:"'...:..'.O,..i\I:~4;r"'-.(':.:*.""J)':~IJ~~..l':.Lr~'~J~;':~TfJ.·/~..;., c.~..-:.~t.'·~l ...~-u!:J1:..W ,,,;tAt :<<,;.:.... It\~IH1.'4'·,':ll!,,Jti'l'C',n'h.~ ;u.'.j\t".H;1hlI;~"''i'N'h!.·ItIi:J'~4.~~d/~~J.lUJ':''~..o:u!1<!1!1~\~~\~":.~(l,:t:r:"~.l~:I;'·'llL":;-t~,.'N~Nrr:.'l1...: :!{l' :ffifl,\I,;
• -;: ;h-'V:"?\-:""')·l~;,t.";'1 i~."\~~f2.'ilv,ff:l_~.l,':.1. ~.a-:~'U~lt,', :,~'';>'r I:i" .\\,'"~.l;r.)!>1I.:{:H'.thil't1Jh,:~'.:.m'b'.-~~.;;(f·!S'lf·ci·.c:;/
". ",~""IIOI~:,:,:J.ik~:!\.1[t~~oJrtl.t :~IIIc'1I H1"~;".. ":. I:r:'\I,:'\f1~Vt,lF "rr
';,'.:':1 ~HtJ ,;"~ljI
'.' k~ /~ 1,;....:....·\),."R./,J:rI"r-tt·(i\rJ..1i.p''')£I:'wt1V'~ l-HIl",U~f.I''''''';:A.'fi,.t~''''',A· I.... ;.t\'::\~'fIi.'i'1·,"''':ttvl.tt,'IIit·UP.:lth-r',;..wd.l,iYlMJ..H:'r.Iti!:~l(,d ...JlrNI\M ......~....tNtl:
~ .·,;..,:-.r·l:·~~:a,A:';\:<lh't·"t,.1W-#*~3.:j\~;!1·.'.'HJ: ~!:.Mr.ix'(I)M;·N~:i::v~r..1 \··:"'.'I·;"~ ';l·::iI",,·'.1;(;'~·,~\l<.t.:,,~~·.J!jM;'~'I!Qrr:~:i.~_(.\(~I17tNW.~;jyJI~!\\ ·Ij:.:'~h,'Von .i:",,:w/~(:,;n,cf!.;>t'J-~t(\htJ fVl~\J'ft.jM II'; If 1 J ,'''::i:' ,:.CI~'-"· ';', ~:t~C~,"';'~"-f;!d:;'~,lJlI.l~,d..),it\.1:l1r·.•'~ :"'}N': ~i'.\'~~·.t·~"!l t..~V\'l,!.
" .: 'r1·\:~M-/'I!f\II1):I~.~.-lt'A·.{');ill)",)14.-,,1. ,'W'.·:.'t~.j!\"~~."i:~!tj'J'.h\~.,,;.'::';' .:'~~.$ .~\1t')n~:\l,~':,,!'fi t....·;II'? 'N/t·/A.'('It_ ...~.,';..t.'J i~ ~ ii~
..' "~·I:;~·~.~,......,~~f':'~'!o'~~~:'\.4:'(\i:,,..I:.,1 p;tr.\\~"»~V.l::.;,t.lt - r-";'O::::> ~(~'-:"'{j~,,).;lt(,t"'-O\t.t;J)II'~i'l'''F.''~~''r:::·.,. tlu·...\"'.ii....
.' • ~., :t.,. '},Ja~1.~n;.f··:!':a'~;.....~~~u.r.~.·~:;:.;....J).1~·(;t.:..y~,;~ ...,·,t:.-\,·,:,-l,ni\%:t':/.:fJ,"; .~ H'}(!N·'~f:,if.~r.,:1~Yr'J!';;Ff:..t .~\ :".", ~.~ • ,'.t"'·~;J11't,t;("i""J!1.t~.f).·'t'.'P.,.t.r:..I'\'~')~l:·~1: ;;..)'11';h·;tct",~:
'.~ :,t._..\''''!J.\.~ )/:~fI:~~.;"'.=i ~~;:.:••:.'t:¢')l'i~:r.,.~·.·~it ~-('~'f;:.st \:l.v~.i'.'..~:.\r '~'~.~,!""';'''Q''t,.,;ol:·:~!~I""'t \\~1():'t'i;d_\~);' II 'J":'I tlt'J,":1 ",'1i(!t\'):;'It, :.~,~:l't:..y.~~.:~\}~).'''.'(.";-~'i~.i-:},.:... _"a·~.:(.t..(ir~'1(,t'..J t)'l:;'t.:t-~·l·(':.nI·'1'. . t..c~.4;'~. '1./ .':I'......:;..t··f:.!~.(;:!$ ::~~~~:;.~);:-::~,f·r;;..)C:'Af,t+tM ~.~";l~!'1\·
'.\ ~.,·'t;","r\~til 1.In.u;,.:;;.;":!,,·n~C:-'.I'd.\\'."'\I"',j:l!lJ:!:~"Jtrll·J!,ti/.( ...~.'·/,HI.J{~';": "':A :'\\t1"Ji.4l1t·,!'t,.·rl':,W,;:!!ir-:~L-.i:~).i .•~!t::\/".~>~Jllrt\W..f,.,,\it~W~·l f(r:-:,\t.
". 1'1.'1'1 ',1/:01' i" , ••:....c.~~.. n.~·lI:d\li:\'~':'/~'ji"'\'·''II (l.rJ \r':\\~'tI!l';;'.'l,'. ;. .';~!,' ../.... ,,':Jot,ji' ,\I ••••; (. '. I I' ...., ....:..'.
• \,': £,;,wYV04(SJ Jlr"'S.Y.~,~f~'~·~l.!rv.:r!~4;,; ..."~'V.~~"..;,{I',,)~ •.:" .oN\"".1.1'" \'l"~,.1/:~ 'rrt~ !rJ·r'il~.X:i-(lAt"1ff('p'Jn5f l&,l.!\):f~~jKI:"~VO~o.~\~W..." rI$' .... i··",;).~~r.k'):ro.::"'~..,.~,:~.·r.:~l<I.vI-r~..,;.;~'lo<l:~~}.:rf.
~.~':t :.....,_..t ""t'f." ..~:rc..~I!\:Itr'...\(fo.'.hi:! ...UtJ;ti.l,jtt""q.I('tI.~,,,,':Jr.;J!'f.17.~·\." .; l't'_: ':., ;; ~t:"I'huri~C'''!.~:'''·tfJ!":.\\~~t·~~~f.:tr.~'1...tll'''J~flt.':. :1" ,K·..'l',r'J.'J'~: "'tj.",;~1't:'''.i''.. '# ·~1:." ..........\:l~;:t'_J!_,\d ~·.;'"\:v.'B..,..(t:?'J.JiF-. {"" r:'~1JJ4-.:..urr.NJ;,tV:.t.~. nN~-;'t"{-'1..l1':!~·""~·t~~·~~f;V~tu)!UdC#/Nf.4~~~:~tl~l ..$.tt'"::....~'l~ ~/.,': ..., ;;'II't:"''''t.'1~\ _~I.iJ\'i:I!'~t.. ~U'f 1:~)""'Vl·...I\Oo"'I' ./1';\':1;: '.'!'."{I\\~~~~().:i'~J ••n.~~!!J.lttn~"~~'(L~a\Iy.'~s:i,,:.'\'v1(r.~.,.\:'~i :j'l,:
,: .:'.JI't<'=I'j, It 11/.f1(',.;;lt.p.M'U.'II,c.W;,~:~,71(1\~rAI"'lM,w-)\·,·.'1"'l.:;:;:.i, \; ~~1;:'~:".pJ..I..:..r..~\'Ij,:,"'J:'..:)t\~l-S';;~!(;:Wb''liC·l....~,t4~,y,~''':·~)i· I ";;;;";""''''':I/'.IlI';'J.'ln-M;·,~.r,,i.1\Et''!.YI't?Il:.,;l;P,JH;.tl.:,~:'l.OI!-.iIlc;171lv·,,
'.:~::,t.J_',I:l:W'~~~"::41:'~::~,;t,!·M'I):r-:,.,~:1~1~~~'~:-s.'~lX1'"I~~."r,N,".', ,I, .',,, r~)/nl.fr!'J),.'''''''''r~,,,,~,S:'II>:\\I!Wt.1,11~.1,; _..Ws,J,~1",'f~••~.. (I;-.,.~. t,
• ':.:!.~~~:f'::r'tr\)/'~lt~~'{:,:-~?-.~;!'l\.VU, i'lll:."!'..... ,.:.lh,ql' ~·~;;./:'f(\/I'·~t~.<\rl:~t .. \'. ',\'t." .;'·l'ti'rr"';'· ..Y~·.<f·fli.:R...At~J\/.'1~.':~.4;)It~W)1',Z:,t\l\~~1 j\r.'~...e~;(·~~• '\ '.,:, \o.~':,'J '~~;:~J l :.':.-"":~:-/::-:/\'~:~1.;:;;io 1\',I(~;U~,~.l ',(\.,V'::' r..-n.!'dJt;, \ d'( ':t."AA\~~I\\jI:W~.t(~;~tt<1:::t,.,t/,.,.:),;I\t.Wn.,:r d~,~;rU::f.1~JW.Jl;""~!:;""'.··h·
~:!!):!~·3....~rt~itrl!~.;~\'IRtI-l~.;tWI,~''IU'·m.~.O",~~·II~If-.:'\1'" :,!'\-!\,"Jfrift1,);, I \'.(}~h4 Itw ....lo,:ft!ut't~I;'\."f~,.,(!l.((l'1:...\~fS:J r~
.~. ..y:-.\'\'1 ':~·J)]t.).."J:f~t't..q"'~AT.ff.t!oJJ:~l1:'·;,·(l'\.J~.'.,:: ..;,':",*"1;,·01;:'; n::...._;I"?I.' •. ·~;.!l'< ',f·"v'.f'Y'l-{{u"'" ·'~1:.:I:1l"'r.""~Jt.'{}"';-;i'-71-1
" . :::-;"~',ih~~1'1:':"~:\I~M7t~;-;~~Y·dW.J':'l~"''j.''IlJ'-""'f ..;;."~><\, ..... ,''' ••= ,;1o::.·- >:':>~""'>~'6'lt>,f.f''''ij~-J,;.l,i.~to''''·'E)~U· '\ t \:).~:1~~~ r ~.t.1G.'\W;~·!~q~.::O""',".<V,1'_·~-?:.."!!'(!o&t1'r,.Allu:~\l' .·~tlv·• ~ "~,, l"f1';.:.~~~. :;-.....;--.-{rJf.~..:~.:J".i·I.:' ....NVJ.~)lr.,.ofIc:,;,..~!:lt.,1::F ..!'Y~.A.:...." 'J••,'i••':·i1J\"\I~~:w'<:':?II,..,jf lI:tH1t':«,' •....::t,.' ,~."''1I,'!M·...~ ,--i'· 'lit :l(':l !Ittt1':.,:,Pt~~c,,;;t..lJ.~~~i~,I~ u:1A1('itP"':.\tt:;~:r~~,i •&1· :,.(......~, ,·~·Y.t)l':;jJI~,:':;'\'l;!.r(lIW,:O'l(,IJ'~1(Y!f.f1) "\:''''~NJ1'.'I'r:''
:\: :''''J\\.~:j,) ~v~:i.)':t:r:"l1v':Y;"'J:1.~:;r.;~~·.~~N~~I\M):YllU.'~tl\~'.,.trJ':\l.~~.,'J'\!~.)o,,'1-""t.;,".~;l"~j':,~(<l-'I·ill.!fi""1:'''''''I.t:?i'I\~.I''''')Ii''<',f.lr''',·,I.:"!~fi.t: I~IJ:t\H~., .'. ''';"!..':.:O;~:
:..... ~~ .•• ,7.~';r~1'~1F--'''''0:.;·.~~ \.\!:;.·\'t.(.\!'\:'·!~.':J~J.rl),,~·L...."jl-M~·.t.II.I.4!1.t-4 r.::..-I.!;J.JJ i~,),i'I(j."U~:r:~0')'.&i-iJJ~,/"",!, i:·J"-f, 1m, ~.It;.J4;":/ ••"'" ,\".,:v,"""l\~nr'~i()LX~"'M('<lt")eII:l'~IVo'f\:.F!lj~l.,~t!-l-,1·b~••\ 'r.\'I.,;~"';l1i',M.~"",,\'9~:;£l ..~yJ iIW.~-j-c:.~I":fl1~))UltI::t<,~ .. 'W.: '·.~.:;!)';OO·:r'i!:...el' ...."!>'.d,fM:i*,,:t,'()-)7,J1,)o;.'(l!t~(:V\t'~i:":M"-:
I·...·M/:·.··1:)~~f,';:T,J::.M"J;""dl.\l'l',j.f~'u.(\1~lO·.m"~,;B_.:.' ·1'!;".. ~tI!t)I;l.~:?r:".:. •.H')1li\!t.E').I.\')'l'A:.",~",:KtJJ;~.:C:'1.itE!l'<'(l..: ,;,'.:1':' ;}."·\o(l ::i;l"'''''''':' ~;'Wjw<r'.J,.,..to<):oJi·~B.~'.'f'qiftv.!.:. 'ii:,,;
,:. '.)1.~./J~ rfl ,.,'Q.r.rflh ...X"<a:j,(.. ,,.J ....,y_~·V;,~~ .....~'J't·,'tt..,\;'(:::'; '1:,!".1r.i~.• •• ;".; 1,~Wf~·'~;t)i .. H)....-<::i.-::lnJ,,<M:e>:../lII))¥!',, ••~ ri/b"'\;,·.)J'_r'~.:, '!'::~ob'<?I_';12t1~"'''''II,~:~''<WIl.t~r!~,~t~·/O'J''t·~"(U1I~'I1:·:,'. .' .~::I~,.a!)(r.·'II: ,\)T'~f'~Jcl1;c::;lII ,":;IitI!..,.),;; 1'!-,\v:rJffdl"'foJ..«~'~j'~:it',c~,.y\l..t';..."'lJl:;:'-:I(··\I:' t:};O'(\(1:"':~~h)., H,/aA')(~p.'V.tf( ..Jt}~'1f*~'.';. :",1 'i.~.:,~'l.;:v::"'!,~J>tls' ~~".:r~«:tI(Y:OJl~d.*,.ll.\"i(l.JI'oVlI';:rH!J(l.r~w.{\t~.':. 'H I,!!r~1::; , "U\1i (J\\\'t!.IlI;iA itF.t.a~(~:'''''';('ll\N9..''1;e.t~M..\:;iI\ it .,:H,MI!... \"·~J.1I "1(.'/ ,,;v:rf~~'.': ..nf"f;vr.J3';·~7>'.r.~'J'!:''..!I~Jt~:I,';I"(i','( A'/:~~'~:rV"'''Viqt.fVV'lf~'.\·'''.1, ·"tf:.;, .l.~;:,·) /.'ltV:t.:·t\t!J't.;·, '(fJ(JIo"'11H'..i,.oJ\.t;t\-\\..(r::--·'IT<'I~~\' $1Whfli.,.NI:-f';-."'I~. ~~"t""~N·~N\·7.I,\'T',>.i::i);jf I'lJi:,-i;oI~!(.:.I:'.',•.,,''N[, ,')!i~\1\t.1.~
• ',' W· ..,;,·••j,,(:'!1"'oJ)';{_tiR~"'f'-:~t:!'J.l·::tlVl\'l)''''''-}C'',.'}jIl7'''I'J,~v(,'Y'frJlnO;t",'1'~\'Sr:" ;,~ 1./,:,".,jll~;lIu:tI:·;'''''I~!:t.''A ....w;fr-t'l;.·AJ 1,l;;:";;'.!t(tJ \~,.t"('IN.~"';;'"(',i1':'.t":l:..:t""r ..'••i'l~v...i)ll!~ ltV.: ..fJ.NO..1>A(~ tl;(.,,)··uv.;;.,.y.:'r-r~(j}:!:\~.
'.:' :J,II(":;'I.:·:~{M)""""~'Ul''.!·.,.S.':Cn.w:!.1'l~T)r, i1Jo"1't;".(o"~,}I~;';,~ij;;,.,1. h·t •• ~;'_Y'~I':.iFr'to;'V~\u:!~~c~~~~t~r~,':'2~;'.~~~ ":"'-':"I~· ~ !\··":_,.·:......r:'!:)·:ttN,,\-Un:tt:!\"_?m£.;.:...+.I',.,:@.LN"":fl.w"'$.~ Hi;v.tf.>< ('!• •••'~~J,,);;;' r,c< :,,!.~.~I.t\-~:I~•• ·~.lt':!..c::I\"b\t ., .:~,_;'( tf.
".11 •
.. I~ .~.:...-:.'.,._:l"c;·;~~ft l.~:;;,:I: : :li.r·'1J~t~ \ 1.'. ,',.\"'I/''';".....(;.,,!rlYl;:,I'~1·1:.'l ~rt!,.'.~'. I ~rtli·.R1q.~::-Io.;.V·I-~7:~,1Ih~e-,;~;..,\!2f~~~:-t<~':f·(/it:j\~~.f~;!.·11:t.1...71o·"--:~:!rI~.rll[-}ilwl,;::ct I'''''';~"J!,,;',,,,l tJ('1l:.~'"{\:11~YC·..WI'i;.::r.'hl ;,;:f,\/f:;;i' ..::.LIl':IAI,.\'JI,t'(..:,-;..·L·~.l~~.',~~\:,:i'i'!.:..:~:n i~"~I"'r.i.'~".!>i(i;."..~~VI.f,~·J.t.1i'tVr..'\.J~t~·i'fp~':.A.1!(i·;;w.~.:·~.I:·)'I\~ Jl:~.,\': :::!"~;:'"'·il.V"- i'rtf C~'f::\~r,f~'~'/~rlj)~::-:Ji fi~I;'~{y"t~~'?t':'l,!r,,;fi:~..·1; :,1:'·,";~.. ;.i>~.i!,,·,l~;:I''''1Q<.''.I.Y.14r}l~;I;;Xi3::'·:f~17':bitr~''Hl'''IO/~'.iI.~. !,'t.~."t\ ....,!·t_.,.).(t,:_~~·Ll."..!lI:,lt::! !'j:~1~lj '.f1~.~(P.fY~~J'3.~.:!.~·,"'}!t.~,.;:'1 l$\\Ii.~!.t.)Z':,'l< £\'4';, J"~~i'...f~·';'J'tibt4J,,*Sfjjj:r~~~1·&'i-~I:"'!t)il~~~Jt'J,~V;~!lff'tX,'r.jf>:1.1. i:'! ":':!':·:'\:I('~·:)+1w·.l~t )t1! 6:\ri' ,y/t ~",M~·r,,;.:)I"~1r{\,,".'~f;,';';:i>.:;~j~.,£~~r 1:~}'I!r~~)-,",~:.~;;v;~i~":";;~1·~l~M?~..:.::'1rlr:t_'·'~~'~"i{!j-H",)X'f~·~i:i5/~:"-
~.~~ •.;....,::;.1:.1' (.1';'..t.~.~', :--':.t~:",'''~"-::~.!"..1...::·;1~,,;~t.-";..~r :'~'''l~:tF'r.Ii.i\'¢;:+':tUY'C~·;~.J11\r11!:,,'~k"")'::J.:.:'; se ..1" :;'J:.·:/,..\':o~iN:\J':·$JI.;,·~;)'i:: ;:!.~,~,;l;)i:"lCtf,,,,:"'::~'::I.p~1·:~\r.(C:·r..;,;. .' ~';:: ;':'f·~'~"I~;:'li~;'jl·~j ~",··l''::I.d~.·l.:{...'1~,t"::l'\:b!·,::':·"rs,,1.; .......~.,...or:'J l~..::.. '" :'~: ;?".l!....:~\:!::..Tl..·:)/.'j:I. ";'J'::;-J<:(qf.}o,; t.:!:-l~:hlli·.<tlh;'.I..d,~"J,t;1I::';;.\1'."") ••:h, ~ ':l:;"~( , <.~~:~iJl.·11.~'t-I~tl·':)·..J::i·,':/-~···(~v~~~,.t...:~:I,.'/~$IJ ;~"l ...\iJ-.:...:F',. '; I' !!"·ltV:/rtt1'\~·,J"':.\·/.1.::!'....·to~.. j:";.':~~O.l\'(\··JI:If.';(;,I!ft 'oi:J:I',\J~.~.~.::'·1 ";'!:'~)A'tt ..·r~I"'~:l'~tlc-:;,II'Yi.~:t;:OWI1:!·H.l'~-.;::l)~··~\~)'O..u~:,'hzr::·.t:r~'!!o('"-:f.~; .....;:,:\:c.!.Ut~·IJ-;t·,r'(fbj r:~i:,.,tki~f~I'hi'>.~1f'~.~.'t"·M~.r.~\:~!;,,:':. ;', ~ : "'1"'. :.~;...;..;j\.., \'li'}:~';.1)''tf .J t ...~;,,'tI.:r.·!'1H•.,.:,'/\'tt·,jt~JI\(~, ..;:ti','.::,.'~:~~c·"~·~..·(t~~(.;:"'~'::'t~/ ..J.;, !~\'I.t,fI~·qd1:::··fi:·~;:·tJ''~II*,.d\·l"/tt~'tl',J:} :{4"'!'~.111:.i.:~;.a:.~.•fX.~c.jI·:·.~r+.~oi"~i':i~"a:'t ·..~i~·rl.;.-.:'U-<r\.,;"::':;J,,,.,~~~"(Ii....~.:;:.;:'':.':"..~~~::~"'~;,r~.~.~~.:,~/?.~:;~~':/~::::~.~~::!l:~I~':~:~~,~~~~:~':':.~~;:;~:~~.~.~;v
'.{ •.. ::":..;':.~ ~':_,.:~:..·~.,•.•'.·~i;,'.:'t'!... :: :·~'·.·t - '.,",'"';i" •• \,:'" ~;.:••. ~ ·fi.V/.,~.•\(!:'.J::;.~i~L..~:.(ti·)·.~·,·•.•,., :-:'J~'L;;.: ':'I,~'-lr~k•.~: :,';'..,);':.,
.... ;. .". ,,";~',,:'..:~~;·fS:,:;"N·:.;~tci!i!.~.!::~.,:'( :.""\,:~:.1~1~itvN~e-;'I-)1"";~\i:;r~j:i~r~i01•• , t:!J', "t' ~.... .~.~-:·';·I·'(~.~':..;~~./'1'.'::V:f!/~~r:=r(;:r";~i"o:,;r-·.~~~t·"":~'j1-.:1J::~~':~"i~·:·,!I,;..~'~l::I:i~~~;;.~:'I~· ·;!"~~.:;~;~;i',~~~:~~~~,~~~~~~~:;~~'~·~~:~:;~it:~,:iI·... '.'Ilo:,; IIO:~lJ'.",~J.:.'t~!if Il:' ,-;..;t':'I'iJ'~;'l'·;s-:r.~!{l"i:.·,i't.lrt:r ..,.~~~,.\...,(~:.;,· j\',~::;.:! ...::'....t~;p: ..( tJ;'7 li).l !t."J';i~(l;.:1(~{::l~!"t:tilt.-;:~tu.i~;..y../~\;'_:;j~~:::,;'..:G.' : \·.'{t:'.~ok,~~·,~'i..!l.;"~\"",t,,,;, ..~t1.)'\"'''I..~j.;;,~.<~J.~;::~l!l.,m~_.f~.'..~~·V: '(: .:1: .:r4\y.":!., iW'! :--;~~::llQl\"1'\:Id~.:4!}Y.:!:<:~'l!(l\..(?t~~::r('::I.'1I~t,.,·f'://I.: t ·c:-:r",t·).. (~W;;~:~~~·~J·1;~·1,t,;.r.iU.~J~..w,,;..~:)~:.t t.Jf,Wd!l~lir·~·.b'I~··f;;l'I:': r;;_, .;,;' ttft((e:I.z..t;·.r~f\it:. ~;; ,·/~.:.?-J·\·NI'r)N;jlf.t;t1()IV:J{i';<At)\;{'UI''friJ~~Olj ttl~.' . ~ r # •• :.~:" ~~r.II't!lf\~.\~":;',\'t • :~:'.t . ·'·H-:~/:.:,;.fvt." ~; li'1' , :~;: : ;\~l.~'1:.. l;~)I.",', ~:,1':'.(1.~~~~~P.'~~:::;"":;'\1;·,""'a'~~'11-.ff.l~1.itt'/L.i';J..('a;ft!\~!"""#~!U" ."ii..~'N:(~:Vl t:if\1;.·;'l!l:l.j·"<\·!.I-\f.1~f .~•.'~,,~'t\.,~\:Ji.Y'>(iJ'~";:·!Jl,t';'.'11:;:.:: :-.* .!'!: ~~'.:.:..: .~,.~'l\1~:rii;"'ko,,~;..::! i:F.,J""~i\\f~lftJn..a..."·~Yr,!\I{J:).r \\}~,:!·rw•..:~,H7\";'(;f)I'•• ', ~'-;':':l.!;·J,lHo·~·~·~~";-I~ll.11l 'tJUd 4);f·~~,GJ/!J"~;,,.~J.:·j!I..,,"!;:(';~\::..nrJ;~ :?f.:· fT'\';~~'l;:Z""},lof.'.:p·t{'i-f;.~~Z1~t irJ·~.-,(;t~.~;rr\!.\!·~1,t\!~£::J~-<"tJ;:";..t'.N~:,.,,: I ~;tI~~ i:O'.£.ih,,.::H :1..i:;:I\'It!-f ~:~flto'..t.Alt;\~.~If.:tvt:':·MN.)·rtr.rf:.::'~Y1':rJ..,·no/(J..')\1~"'')l.......!:;~,h~~~,¥~:}~'V;~'/~';iC',"\~(J;·PJa"l~·il;1w..........:;;1-..i·v(!1.~?'h'.filj·h1\!\'{o."'"\\h,~~. ~..I~t'i1~·\tibl\<...t'::.<.(11J~'''';;;~~1.;~r;'fl'j/1.fo!'1.~~t~~~;;-;'~fil r~I'"f t:'..:rA:';i.~I.~-t ;.~'f..£~;:~~~·,t.,.g':\l(l ~1,.ii·~ru-L~\I,:·'t;.~~":l"'I't'lJr~·:-15"·~r-.~',:;~1f~~~"'(J(iljaI;'.!~.~t':' L ·.!\)~~~·~~k)~.;-:It.,~~.l.:\i'.:h~~.·.<:i'li.V':I·/~·t:l,1;;~~;,.i~T-.1~~":~j~' :...."f/;(}.:C .1;fl'~~::O·~/<)..·,oI'iI-·'in!:i.l~'~~·'.':t-::~·1\'i;~7::.\·~,\1.J ~~.O\1"lVC';',i~~I,,~ .. ·(?.f\':~~~!.'!~.,":'f~l~;,~~('t:;.r~}!h(I}c...'i\rt""·:~;'tf.~.~M";h..rMtr:..~~! It.'''H:f.))V;:~4'.:-:' '_M~';:: j ·:r~U·t~~;"1j(.~:'~:·.\.:~'1~~.~~t·~:}.,t.:~I',iLIW~!:rr..~i·"j{SJt!?t'';'-:\~".-:l :;'Jjh~\:')A:::!tf_.'1,' ¥~ :::'1\'.1 ~i~~~';:;:I;"r.-W~;;:'~r~~~·,if-j!lt·r~'t~~$\1Y4~~.~·r't~~;;;.·.i.;:.:.~.'f.JIt;\~\·ll~l~~~\-',.f.~("·:L'•.:(~:~~J:t,t;{~~I~.tf~:re\n• .tr.~j ;\'1·~A.w',*.·4t-'~: j:'J j.~r,,·<,w.~\;trr...~.A:':~4-\7.'-:>:;,·"~!i~k.i\~~~.~~\)~·;:~:·~~\A?nJJ.t,t'Nfl;:"'.' II ~v.:~',;!.r.:;).~~.~,"~1;).,;?lYl'~!;J':!'1:.1l.f..-1I1i')~C'~~\J;ilV\\\.~~)oT.d}';':ilK",,)'!i~'(~:.t:: ~ ,\;1.,:~;:~'>J(~I.~i-tr"\J0.fN;vl~·:r~J.xMz;:~"*;y":r~I'':'-;·')JI;.?~::~.:·'Vfit~I.I~)~~~:$f~:r.'~...1. '1~,-:.;t:'~~.~/~~t·~:.1.~·f-t'(!':;.",AJ...~.«(.jf:..;f.f~)C-::t~ ('i.·~,t·l),~n.:,.x.1? ::~.J.:!~.I,.;y..¥"'c..:.'t.,. ; ....'!'oI!}.o'·fl'l"V1-.::ifj·;~.'v-.:J:~ !~'.~~:f;li'~vw.'IC-:-"'\·~~·;\':'7·~':1';!,-V~I:11_;\.~n(1,.1;' t}..:-~.t, ~ ·:,·;1'~::.r:.';.:1···!':;';'~~4~:../'i;:'f1;·!·1.1..·.....::.:VtF.:~..~f~.tN •.:Jt·~~·tr~1~~;:··:.:)6.WdhH.j _~ )'I. ~~:." : .•~ • ,!\, .. J;r.~:~I\{U~,'PJ't-tf.. .• i.1j:f,1...''; :H\)'~11'.r.:',. .:.\~i:;:"'" :.;:rv~••,~. ., 'io~'d;, ",!.\' ;:~'.i'\tl'~ ,,111 'f J !{",. ,t·.. :'i :\~.~'.•I'e..r""."n ..: ::':;;'~'''' I: ... :
l:'~~1~~;~~~,~:,;':.:~~;~~I~t.~:~;~~~;~:~',~r~~t;:;,~;;;;~~~~~~~;.~~~:~~~r;~~iY~, ••~,,:....~., ,;; :;.;!;·t;#:;y~;~~~JI·.:.:,.~·I~~~,!t:\/,\!'ia~"f't~!&·r::~.:"!,·~::;\....:.i~·~:~,.,n~t~.!,' ......,::......~~~'::·1~;J,:~:.n::...'i~'~j~;.:.(!':;t ,::-} ..'F~i-~;·('!:!r;.~,':\rj~.".V!~'( .!I.n;;~ ')((j1i.:.< :'.' I .: 1;.:;:'.,1:)1 :,~:r,2;i.::)t;;21f\t''~:-;':ll<lllJ()..o:F:(r; ~3(i!X'::':l·JJ!!i~t...:.:1-!';r.(!ii ;j.~t'It!~~:'40 ·:·:;v,.'f.~A!t.,!tt:Ji:I:l,'J .":l·~·:;"·\-;.:,:-::tI'!;:··/::~j:IVI....\y.~'-(~ r;t;(:f)~(f(JIiI., :r... :.: 1'/-';'·~i~J:>"t...J!'
Vi';·i\·";'- !.;>"'('II"I"Jc.·",\·A.-,·,f;::·'R\~.li':,:..·lv£rF(;..':t'.1 j ; I·!'~.\,'It'¬ ::,·J\·l.V·/I)....~..~ !~:.:J !\~·CJ:,'.;i·:.:.~~~:-!:vI:.j.:·;,~,l:v.:.Nt;n!;d,~,:'.4':~~~~~.1.£ ' ~..,,;'i,.~.1t.'.~~.~~:\"..;·~~~l !~:;,."r.:.J(~'.I.::~'!\:.;)\"'in?:-.,,*(·:Vi::"I,\'%'r%~J.''u!I ~·.rJ•.~.n::~;;·.v:.~4!Svtw:~~:,,; ~:'. 1:]:"';'11'iw).'\i,M"·t\\·;o,·:. ·:t.s.,'T. t\·~{·l;:I~......c.'i"'j':""ls":J·w. ....\~.t:..k~~.4(~"::f;t)i~<r,0; I' •. /~~}:·1Ii:,:j:'!rr!\I:::.t:,~IU 1~.!I.£"":':;~}.<1J'~~::_: '1. iE.~(8J.:J~IUG·;"~'~ ..JYF.t..r;.~~l:. '•• '1 ; •• :::} J;':··;lf;·'jI.i.:i-~"J:-:"I[~•.A-J.~.··n::v"~rlii,,:'\!j.:.·'\.;;;.w":·:J)'(~O?\j'';;1r.~:·'i-i?:':;'~(t:1:': ': :...::~~f!t'::~~\">'i~·!:,:";h~~V\",'~!~'\;:3v:J~1~;~~.:i::rtl'l.':ii.(l~'~)/·1:1i".:.~ !.' '!:<.' t;.j\\t{:r o:~t~:,t.:!I:.t-::\\~').:('!\~\''''\!:-rjll-f<t~II'~j":~1.'.4"}~lM) ;; ....·-:I\i~:. 1~ ..:."-;~\)·~).})i.r:A;;,)~'1~!JL"";'·f;:I::'''1';-{~'!I'7i)Jf..I.J\''''''~;;'"W!,,;r-,,:,·~n:. ,to ;":.C·"V~::l~')u"{):;:i;(,.,.•.!:~~:::,.f~.u~!..r:lt:.!l.ml()...Ji!ll\J.tJ::~i>.~\iJr')J!:,(l,'1i:,,:. if:/\·\~:,'.';;"":'flt;';;··f:.f·'I··",:t~"1.):it ..IVt.. t.,: ;~II;:,i)tt~~~:itVk,~~''v'~ ,::",::tc.":':"l.I:.,l)~j~:.!~·'1?,',·~-t:'~~'-'h{t:.:..t:t'l::;',";!;\4G,\ J.j.": '\ .."1.!.~d~'J,,11..!"1.oQ7;'),,'''':'''i.''1,:J~:,l"tt ;.,_·,;~,\·d.:/I..,~:~r:t!J't:ft~:::r.i.-!r..Jt.;'\1;'{tit"",a~:W(1r~-:t1'k!·(c'.tC;~)IW.K:i-I":'-:;:~M:~.~'1}I,t':'}I~"1:~.';l:f.:,h·~W~~..~?,,·)~,z;.t~":.~'if\~I;.tI'C\k;:t'rL~-:'·'I;,·;il.;~:""~:r.:A!:\'l-lI;: I:'i.'1 t.r;....:.:,\ if )~;'j:N~*\~·;'r•.~',",·...r ;..;.fj,V :<.;i.-:'~U!l~;.·.~'!.'~~!-,r;-t.J./".1J.),\,:;,'j,,<,~,",~:~',.":' ""]l:~l-.,,;:.:~~\~ ;·~I'~:, :.!....·;,Iij':'V:;~:v't!:r:;~.~·~.:;.,·~111....~:.!.~~\.,:/)~.,1<l.~1H.~J..
',;:'
• • :. ':::'~ :,",\r. '~';' -: -:.', ~ ·.';·)}:~f.tiiJ\·:·.rl ~1'~
:,t:,~'.:........,...:','.:':.'\1.' '1"~"" I'~ ~ l '.."....:1,I ~.'1·,l,...·.o!',.iiJ': i-:' ".+:; ("'~"'J:·.1·..,t.; ,:; (,\_......I ~!'<~I:: 0.'\rt 1.::\1'··.!·I."':·C(.~\:~~":1!\)I·:'·"';~P'/citu ~l"1'oJt~:·::'..: ;1\'
:".~.'.'~~.';~~~I·;;:~:;~~,:;~~:;~~:~~:~.~::t.iX;~J~;·;;/~~I.~~~·l;~~~~f!;~~.:f;;'n• ';.~':" ·...,.::••r.~.~~If\I.~'~·{·~~,:-.c<f:., .."t:\,~}"~J.:l(f"I,(~:n.·".:.N.~(fl~!,1i••-V :;;;:
~:: '.! I." ••t~l:i:"·"f:;~th-J·1,<t·t~!".)"-:"'·l'i('f!ll~f·";.\!V.'~';::'~·v:,)';t~/.n·:,..":.....,\..•;,:1, '~~~. ':;~;"~~~~~;:£I~~t·::,~,~.~;~~V~:~~~·~~~;t~~~'·lt;'~~~.~~l.:t:r~~.~:~~t.:. J , ••:_;~.",... !.;.~'·~~:!.iiJ.':"r~:d~(rr;l.~\'lVil:"n~.J:-ltf~~).'Wtt!?ll.!·jlf.!.\.L.I;"~.':t~, '. '.'.!"·I.:.·~:t:.I!;.,...)~}tH';~Y"~t·~Iu.\':'t,:·:;'''t~I~\\!'("f.IIJJ/4:~i:;).t.tr";';~::.j,~"~·:{r:i~n
,.~,,'}';--;'i;:'~~i~;~/, I k(l:'..~11 j.J\'01~~~(k.~I •.g,1.:r :~1fl.1i1J>'t·~~:.~....~:( f'.:'·~~"...h.:' \" :t:~:i:r.,'.l::..!\~"I(\f"if~Rl'(o:tj.'I,J\~ Il~ :\1\' 1\"..17:".:.(':oj...·1fti~·.il.""i'n~;'.iil"'1f;: ~ ";;:~J:I.,f;itr..~,1.I~~;\'~'l'JZt;~.~,tt'....·~...t.,f~~lll~:o.·(;·;~,.;>(o.~...; ~:lj.;'
:~::.:~~~~~~~~.~:~r/;:~}:i:;~t;~~~,~:~~~~~~~~~·~~!~~:~~'~~::~:;.~~!~;~.:
.. ~, ,:/.:,-. :--.·.""~·;".tr'..·f... I ,·,,:'·~!.i...~·.....~··.~~:'.~~...'· .....I~:1 I:'• .'", I.. ,.~_ • ....~... :. • •••',". ". • •• 1 .,', •
• '. ,;' t·:·::n~t;~~~~~~·.(.l::'u.~It')/t·yd.:tf\~r- ..t:\I!'I\·t.~dN;~lJ.M.~·'.i:Jt.:,<'":;:.~O;,:~.• ". \:.~...~ ....:'.'I.:,,'J;·...·::>::::O"....!f(yY.~~<I·)t1..;:,.:.li~.i.~::,i'.~.1bt:.'\·~i:r.:P.;>?,(~.·,)<;~io,j~'. :" J ~!-:"i,f;~"';)'·':t;1~:"::~)\v'iii3-: ~.:;.:'::!?.(':';~{f,";'I:N, ':,:.~;.·...~!..;t.;-,~)T:.:·. :~'. '.,\'.; ;.·.::~:!:.~.,:.I!\:I:' '! ;«:.~:i;•.-;.'rx\'('-t !Ml:.-::·:1';~..r:kv~:r·r,1.'·l,.:::.-:: 01.
• :: .. : ~" ... :~. t:'..::.:;\"h··if".·i,:!.. ,'fi.~.·~~,\\.,1.;'~flr.v.;,:,~t\,\;w.p~~~:·ti·:\'\:.Ji{::l~·-: j~>';Vd~':I:.:6):tl.l·.UI1('iI:.:.i·~/j;·i:\~~'o:Ii,i(N:.ld:U ",'J.(i'..:r:t';MriJ\J,j.:
~,~..~;:~':':~~·:~:~·~~~':·:I:~;;~·~~\~~~~r~~;~~~~~~~;·;;!;~~F~~:i~~~0/'~~~.~:-:~.',' • :lJ\; "'t'l~> \1-..t~/::/:.":-:fNl t..i ..",". !(;V;.1:N4J ,.:,.:j1:}'Ir'~)o:~rr.r1......,;\·1\1 h'i<~, : .:~ ":'fo'~{'J~~;'~:i.f.~i:·,,~~:!.t't)~;tr4t~'t\{;~iI::r.:y)",::~ 11..n(.:~::::rj':):"J'oj~,:. :,!',/\ •. ~',"~:\:'\ ·!~~,i:"{){·c.tL~.:Jtl):~l;.';,:,.jr.r~;f,,':-t.1~N.1{;.:/c: ....\:!l.H I!.i,;r··t. ":':.: •':::' ~ ~~~'..~!::(,:,','-1\"/$.-:" t.l-'\I··Ij:I~~1i:t)\i,~f\':~;',If'....·ho::~<'~I~'\l.t!.':·~.f;:
.:::~~~;:~'~:~~~~~1~~;~:r:'~'I~~'~;~/~'~~~~~~~~~:'~\~~~~:~e;~~:'t~~;~:;~:1~'~~:,... " '. : ~';i~:'H!~,;\1'A~'S ~ ~;'\;~~~:>'I'.~~11t.'1~"'i!.r~:,'\!'i.;·'JX'-:'(:'1:<:'.~I;..;~'II:HIIII'
...~:i{:b~1;~~~~~~~;~:~~~;~t~';~~l;t~.~;~:~~~;'!~i1~~:~~r~r;£;.,;..~·"'···l':;t::-~~1 ~ '/J"\.~1'~"'"t'NY~1I'!'\).;"/~i'Ii·!.*,'I-·:t"'·~1~.~~:tj,·.~·t'l·,IIr!\;¥(.~..
'1: ''''c' ~ '\'-"·'I:o;fMt.l,(:.~~\<)f~I·t''''''~~''~t:··.' :;'\'''1''i-':l..:,:"·tI«,,');;.·n,;-&...~:..l\',.. ..:.~..... '~-;rll\'~;i"'M) .1::fJ~)r,.~.;.:r:to,;,N'..1.:t;f1~~;·7\,,;(Cl~c~FtJ£':h.~·,:~~..,C.
"1.1 ':n.. ,.·~~r;..':'~:J.. ,'{~'t,~'.!~f~~'~Il~:'-~·~l;I\¥I~kt)':17;\·1-..7;~·.,t,ll'~)i·~~rC.~\.; ';r :.::~,.:):;".t\··.~v~~:,,:u!',!I~~~\:;"Ii'·S'2i~l':!..;:.'..f\~·!1-{.~~;"r\~jW~~'._ i,::':Ul'~f,t{.\1;\\'.\.\\'''':I1~~r\ '..ti\1.J) H:~~\ti\1':~~hi.:;::IJ}·~·I'·:·;'')I!iV:~~ii;tlJ.~J;'.~. 1, '~as:':l~:;'::~:i.!'::!.!\.~~i1;:f./..c'n-f.';:"",,,!'~!*'Sril&...~1r'r'~~Nl1,..j"~(Uil"'~"!..... :~·V;'!~\~1""'.',~,t~rJ;ru:-.~~\.1U:~fF1'I,,,~..·,l'"Q,.(\I)J."ll~:JtJ: ! ••IIl\·t~J'~Vt-l'~i(
'.;!";\tl: .• :,.""..! (.'Fl~!l:,:'.) ,efJ):'(l, ~"':/~.l-.~'t ~t,:,'h~~.::,;-:~;,ll'01. ':J_;:t. ,)::i':li : ..\S.~PJ ').f'S~,,\, '.;:l).;' \:':"~!~;":l1fO"'7.~J,..'/,;.J'.f.H(I.q-t...~Vv~·.;(~·J,~·.::.~u\!llAi;i;::-.,,~(.t:I.~~ (;-::"..:~»,i: ;..~. \.,.,,:.... ,-::·t-l'jt.\,;,.··':i~i!~·..",<-.tJ\!,:·,t.,.I(::.h::-:i-:.'1o";"':11.f".li'1·"~lh:yt·",h)·~)",~t~/~
;~:1.~:\.~':~:!~~.I'~~:·~~~~'~;:~~~'~lr~~~r~~~:~;\~~r~~~~~;~.~~~~;~~~~:~f.~~;1;;:~IW· ,':, '.:" l ~·.~·r.~v'~ ~. ~',I;'l"lt:;J'[' b·! .!J:¥;.·;~'::1:'''.':!:II';';J'''~·~),"'X'..~rz,iiii\'j
:.. " •. ~:: ..:';1.- :'i·....f.;~·1j\-:~:r,:"t:l.1-. I~Y.:-:';...1!;v~. ";'.:::01';';'!It.\'· Il~~;••1f..:I·.' ......" ,<!'~;'.~I"~~::\f -.1.:'~:.r~:'"~.'J,\ ..:(,j.:::tt....=J :"1,.\t••~~..1'::!l":V·1
• .1,-:.··••:;:~·~.J~i:.~~~..:~~::~.:~:;~,~.~~.{;:;:~.~~.:.:::~\\:.~.':'.:~·"},;',:·~r~:~~-I!)o .1'Il;";;:,roo) '.d'~~i'~l·~1";:,\~j1::...~)11n..\:il.l(~; J..W jotl ~.v""';\~'\\o',,"I:t:
:.~:~':~~~t~:~I~~~.~:~I;;~~:~~~~:;;~':~:;~~/~.~~j~'-~·~·~~~~~:~~;~'~I~;:~t:t~~~.:tt
~·~~:':t~~:~::~;~!~~.:~~.;',~/;:~~~~;:~~~~~~.i;.~·:r~~;'·~,~~~f~.~~~;~~~$~~t.
· r , t:". ,::\\,:.):1 ....~lMv:I"h);!&.;.'1~·J\,."fta·~':t~.f.:(....~~!.''Io;ll,·.[I ':~ l: Il1r ..·,.I ·f•.);.·: •"I': ~~~'.~!;'tIS .:),.\1~i ',J,N,{ (.: ,l t(\ui"!tf( i':',f,1h"X:~~I.?J~·••, .t, t .~'t/i:':'~!•., ··.i··.'.';'~.'I ,(•.1'.; ~.; ..~ !:{.',:),t...~JiJb4~'lJ::.~.f;,\j'::1,,· d.:;:(::~~ii::'~XAo(,,~
... l ..:~~~:~:tt~.~t·.i~,.::',:+t.·';1.:·"iPI ,':N..;fjJVlw'".../'" d,.~It<.:.j I,'.f';. ·LI~:r!(/'1t
'.':, :';1,: .. :,Jt\;'.·l(J:,~·;'(}!·.,:M)/l~r.P~JI·r~::-;'''\\'.\l-t:;.. ,[\t\:t';;.ffVfft\:.l':;,"t:':J).':'--:';\. "J: ·~.~.;·:~!:t';.'.:~lr.::\\")rt';,)/.l.:l'~-:l.~;..'{\t. i I)'~.~:'\{:":f:..t.lr·~::··r.~~;':',..i·fr!1,,,.,,
1'.;\:\.;.1\ •• :11:i~)~ ..'y, t¢') V:~'JI.'-":i::.ifV:-{loiJl!t.J(':\:~t':':';~';' NK:.., I..~.,:;"';~,~': ""~·,,,·;·M...:·.4),,'oIjt'J~ ~"1.~n..,,::!~j!.:JJ',.q;r~:fJ IfL~""i:"':'·:~l~1!ji..r;f,;': ,.:...,:,\"l' ..··hi'h'. ·":·V.~j~1~f.f:1'~~~.::~..·I!f..l;~!"(n~!otJ.ll·i·~.!".""',':·.::I-~:r.u'lo....H !:.\",:j -,r•.'~":.,.P:\;~:~::.~~-::~a",1)..'."ior',-"t/;:.'~,: ..'I1$,a.' "'..i";! 'I.,~:;;.-:\!\:~\l :'!!"':",1:;o;/:f.,· .\i:~'~.i·l:; joJ.~ .\1:;1 ::.U1!tJl..:1f ::;:' ..l~~~-"f·lit\~,.;\'.ti;:.:r •.~·:1\:x.;r.:r~·.•". ~:.\ .~b1\··,j~';;),:!~"'1.\;~:·~~~.1,~;··'t'·~.1(~.:(;'~:',k~':o~....~1I,-:~~'i,,'.,'·f.f.\.lc$~If~'. :·~Ir:·~flil:1~··\JO a:\t ",,~':.'~~~ ·.\:;~;.,t~1'1wt~1I~..'i.'1~-;:,N'}.:.·,~~i!·"1i:'·..;.·:~\,)1
\ . .::.~'::~:~~~\:::;~~;~.'t~~f;:~:'~'~':::~.~:~\~~;~~~~;~~~~~;.\~;~~~~';~'~.~:~~t./~I..... . :l\: ·'Jo:,I:\:t ....:.:\h)\;';-1.aM··•• ':li:..:;.;"~..,!·).,a~'j\Io.,..".t?~i:t,.··.·:!.'.J·,.~J.1/r..J"~·'/i!.·
' - '."!:'.... ·It.!:~.~:.(.·.~/l1!'J;f."t~::,..,;~'It·{;.1.:!.·\~.;:~1:i<!1t:'~'i;!:,1\" :/:t~.j":/'.Ct."f..... ',\.' : ~.ll l,~\~F·t'.I,,'f"r•• ; .tQtft~: l~i,.:·i!~)Mi..:c...';'~:'JI ::1~n\'~':..:I
.' • / ': _t, '~i:'",~k "~$~'.. ·,:'io.~"'/.t"dtot~~Ii:~';'\....) >.,ft!i.J".&v't:. :.: ....."'::'I.;';~\y. •
.. ." :~~.~I;~';~\~.~':~~I.-':j: /)!','·~·l:(f~r,}'tt
.:.~' . t.r·. .:':;j:;.;/',i:·...~..
:.....:.; .
~~"lR.flI.Hltt'.:'~t:'.' \~" 1':'.~:'••\t •...:!7.\-;li ...~..:.t\¥.~.Jl.t\l·rlt.l~;L''J·!:;.:.',:'-;{N.~:u.!:;,,~·:-~:,\i"l\:r:.It:~.
;' ::,'\ ~4! ·'0:1-;,..!~~;~t:·llfI?.I.r..:17~·t-f.\'~'.::...~~1j:.t\~l.~·,"J..f'fl,t:fi·.~r~J:I\.~b
":~~::~~;:;',;,:'~~'~','::\~':~;';f~::~:~j\~:~;'~~:~:~~~~'~:!~~~~~~.~J~~;~~'~~'• ",.~V .'.v.':~I'.:';.~',,~:~;,~.1""·II·.t!·!''''~:'tr'~:r.' t'_:" :!dj.~..~.'I',III/~·~-:~l·.O(·l1.::'.'::)·'~~~:';:'\• 'l(J,::. :)~,:.I·I·:~\'n·if~·.II\··~.\1, :,.:f.J.} ;.; ~111'Nr- "';,,·~~.H.;'~~·fM ....\ni~l!\:).~J::,~nc·;·'':.i-~'(JIl''~'':':i:;:'.r.'.ii:';i~'".~.. :1,.:.'..'~!t~:'.~MJ-:I'~i'~w~)~:l!:I.?:;~·.~.~',~,.~e.~~:\:~I
'. ~'.: ;~.:"J}'.\':,.,,-l·7jj);";:.'"\(;.·:ri 1l~.:."it.·jr..~JU(.1_"1!.;·'l~f.1:,:.t,;-iN;·ft ~:\ i~', • - i'::'~.\·:V:·~ :'\.) .:\1.,:.,.', \..• ...~:.:.i"':::. :·:-:.\·.'O?,\V\"i-:.l""'!,,,;,/, :"J'.:'\ ·,·+\h'···1\'.1",~l : ," '';':;' h~rA..,\v:~~t'l\::t~.:/!I.!'-,(."'l/f-':~·~,~Ir-t.:~;V!.~;d'tr.r\.1n ':f~J\t'l'i1>;'!lJf ~"... :.
~~:.:.'."':\~:·r\::~;:'·~·:·'_;:~~~~!(;~.:;;;:t~~.~~:~~~~1·.::fL~~.~'f\~.~:~~~~~~e.~~':~:::l~~• :'... ': •• t' ;. t ..,\ .~·:·.f·1!·.·.. ," '.""'4::'t;.,~•.. ~~,;"t··..
t .!i" ~.:1--::~.#J<1';':·.u;-·~-~.:..'~;..:.~"~.:,.l.I.~t:;.· ttf ..lo~.n..E~~'Nh1...4i:.:,~p.;.c::~'ii...·'J" ;.: \ j"'o( 1',1..: ::)';!::r jA'to.~".•,,,;:ti" •.(:.!·~ij···~.~:8#'X<-,i:1,:ll;£~,.\'jr:>\lIJ:?;.;1:ll.,' ••~••:.,: ~;~' .. ~"f.,l',r )'fM~r:1:t.":~(";-··:;;;·.h.\.tr,~~wltj':fr\;i) ;:I:o\':IV'i"\~~:;;·Vts~.~'J
•• "-;':-,,:~!f.~'\b .••• It < ~ ,Vl';\~';:;~.)1t·l.:'::t·~::~~:..:'~~:~.,\:r..i!_{.~ll·"1)'~",.,;.;V:~~1\.:;tj)j(~.:l-..! '.:. .~ '·.:-•.J:f,.·t:\'::-:.!'hr:;~J.~i~j;".::' l':~~I~1.~r:(;:t.If,'!S'tNN',;,'(':lia~~~t.:1"11
..;-;: ',::.~.,I::.'J(" .~..~~'t..,i ...··J\n~?1;!'ill:'_<'J:'i:~,'~'"p'<"";(J:1'f:>,'X:r,:.'i~·~U·Ix·nO'tJ~1.~.I(.!~.
~'~.:",~~~i:~~~\':'.!:{.~1;~1}::~t:~·~:~~:\~~:_~~;~~;.:~:~.t~r\\J:~~;j~'~~~r;~~:~;~~~~l:;~:'~'1":···t"V~"'J~~-f..!-:-~;.:~·\~"t,.-:"':!~.r.i~~·";\;~;:·y.:~~"'~i!·tl1.:r4't:(....;~r(::;.I).i1\')<J '~I
~~:'.;;'::,~;';~·)~~~:I~:~.~~:~:~:;-:'~:;~~~:'J~~~~ff.~,'!~:~;;~~~:~J!~:~i~~~"·~;!.i.~II, ••••-.; •.,;:~}:n.n~.~i~t!~td.'~1I1f1-('\d 'r',:Wl~'!.$l•.':.~..":;:():"t"\': ..M':"?V:,~.~iI!. I '.t:.:~~o:-:t~'(k"k·,AJJ:~1.11·:1....>'" :'~J.1j1C~!/.l,,".r~(.:.·.j.l": ''.'l.'!' t.!;Xf.J·'U. ~j\~r'if
:,' : _,,:Io.:j't'.lr...l\WP:.;,.1'~';:~~·M~,J::.11.'1......f{.,!';y", 1\'-'-
~~~~:~}~;~ti~'~'T''',' :,~:'?' ,',\\ .•\..h~~:'~~~;I}",()"w:e:~;;!I"'·'fltjo;:.t'-'·\III.i,H\o1·.;':;I.i.~·U:I4:'.i.·.~j:,:. _" ··~';':Y;'i~:;:~\;'·:I:"""""jt~i;·,:1·M.(a:;C,:J,\jt~·.~""4 ,V"";;.,{lrl\,''';'.';:: t'·,..!,~:I1,~• I , ~ -t.":,~:~J!.!",~~~\".t:lI!:i,)iv'\N:lr~.:~~AhM!·i~:I.f:~r~.a.Y'(lh"?:i':~\'~;~~,''''..;.. ;".:::...t:: 'iJ 1",·1';!v(.\.~~-.10:.1!+"("~'-\).'(~~~l~slrt(1,(....K,' ·1~M):k ...rA"~)'~ +6.1"\-:;' ''':.'J~Y..i'~.1r:,:1;: ':(r\i(,."[s.ilJtl~J"SH~::--.j~..o:e n;"'ill:~.;J::'f"~··.l¥v;;;~:~J',,;:"r!i:.!!\1;~11
~\;:,:.!\!''" .t! \.tc."n'\f·;,t :·,o;~.!'ch\l, lr.:·li :'::\~}1""H'{1j';)"(:'1 (i~~·I·lhMJ~~I.lj"':':. \ ,.,;.' 11. . ".C(1l.Io,v ":.::'JJc':j!lft.hi~'.~:/\:S.tM')\· i. r ':r:l:.J:ilX1C"; t:·...• oJ :'\t ~.·....r.\}/,.M7:f'll~:',..f~)I9,i.~!..~)j" ',!~,,\'y"1:-i~cdIt:vrN(~'J 1 '.r"(~f~;~
.. . -.~...~'~;:..·..'1~1.~·!\.li.tll'.?:v:l'~·4n·\.;t;l~'~~:~.t"n(·t~t,'t\\'ti.,7·if!.4.tmi ',"J'/(M..... ",\~:_'; .•"'~'~':'Y~·:·~(J.(a-:l.3f~l~f;;..4;,·~.;.•U.t:';f.rJ:;;'i:'.l:\j,J)." ';,'__J~r.~(.:ij·!'/1, V'l
'." )' ,'~_. ;;t!Vl ~'_::_~~'.~~V<r.t~t.-.,l'il\1:-:.t\,lY;:i~"Ir~~Jl.~:I',g\:1)I.;.~~;'::g'tl:~:'....
..:,' ~.~;~;;~~.(<;:~r~}t~~~·.r;~;:~::~'fj~·~·~·~~~!~~·~~~~~~:;f~J~;~~~~~~~:l;~:~/~.:..~• .' ••'•• )\\1:; b··-1~.:·:Ji<;..,;..·t-.h\"~.; fi''' a11,.\:-"4,' :IIi-'(}\<\1 I II'!,\ r'I;"I':~·)r.fl.1~·7i:• I ••' ~:~';IiI.,'·~l·';l'¥k!""'t."r/-,· ..:i-.Y,1!llf3l.,lt!,*iI.::':·;:').il...l'ttf...;J!;t.~r:.,..,.-··l't-.:HI~:! ":: \\-'.11': \';';j.t'",,:.i\--:-:!":Iol~'\ /k:lY:':~~'1\16{"~1
I~:iLiai~~:";r tl(rt: !;~)f$·t1.!t
':.':::·~!:"·::'i:,~;~~~~p!~?E~)~~t-~~~~!j:~~~:~t~~~~~t.;~:::~1~:;1.... ~ ::~~:.::\~..,.~:",(~.:.,:-......:o-~.:'......(:.., "'·.:I._:;: ...•..:~.~~~~.,•.... ,:.:::,..:.::,
.. :~.~tJi~·:l:"../I!-r 'l.)"{:?'':. '.l. ·":;:~;'.:;"1:~lr::~:IJ(I"';':-:;;:1~~j(,"~" .;;':'. - ..1.:"; . /-:i:.! ''';~!.::.~n2-":':'J..\;Y·I'!~M:/l1t~lI\VBt":.{11'1 (i':;'''',n.'r~?'-,~.\1'1-1i': ·\<.:r,.:'~i-.~:t:r:;.:~\,...:",~Sf~i rz· :'.'\"'!.t· .I,:.,_·t:·,:~~."('~N"H::'of :·ii·.·.~\;t:,-"w'~:~it:~j·:~-;:·,1."'(.;'~:('>..17..<';f.:!)"';I~;.:::!t.• • • •'.I~,~;,•.~l''''(l~·.;i':t'.n"f"..tN·:_-;'i"::~.""~l·t~-;.f~~..;.w.",.:'.~~l:,...·.·,,\n.!··.~...~,l:,:-::'J/~:;~:;~::,~~.:~t.~~,~:L~~~~~'~~l~~~·i·~:~~~'.?~;:~~~~~~~~:;;~::~~_;.:::~...~:~.~.'I:... 1':-'\·'i.·r· i:;.r~,.:{'O;:;':'"l~li:t.h :FM(."";;'N~!:?JI'I~~J::t!/~'l.-::~J·j.~I.~:~"".IC\II:':~.~•• ; ..::J/....!',.~1·,'..:'f;1• ':,::••~.'::.:t.',J!l\:~fJ/"'.:~,''::~1:i 'H~·,'::;,.~,"I':1~:".~'I-l;~" :~: YI;':,';'\;\\ :",";)~···;t~F~•• :-10".,: ;;firi: ~:I?~.;"il~·:':'•:':11'1:;/,·;~;~~.J,;-,':::·41: t_._.-: r ~.1 J ::;)1\\ ;IN·...·\'·j ·...I-::~:~~...-,~;:(..d:."",¢.n.'·':.Hl'f FI~~":"·"!."'·"..).:l J":~'::~;::JI.. "'t. ~.\~(;; ':"i1." j}~;·.II·:i~t:·.:,~''l",'·riIJ.:tI"VT'J:'1~:::tttV/11..4b...l:ti:i"vh..~~(l '!,\\":,''''t~~~i";... ,.\~1:":1'i:. ·;';;:;;:7\'t':t;'J,';'~"~·tt~H'Mt.\!f.:~,:';·.\l.I)·,)i.·"''\,lr::'M!·:t.·~):A:..1)/"4.::if·'ot·.i ,... ~~.~'''.!-;.,t)!'-';'·'~::;\(,":'\,,'!>:: (·.rHOc:,': 'II. ;''.'1': v'''J/IV"Ty,~"\!¥v.!~ ....n~ir~M10!
'.~r' ~.'':.:\:..,.',;.:-~::"'\?-'f'~ , .jll" ..')!_t',f,~.lif.f.t:'·I"":Mi::~n~)!~.r.t~·i~n, .:~:..c:·~~.1:;-:.:..r,/,n,r. \ :~:~i~1!)j\CI~~<ti"l·r....~*-'ft:-:'II,.)vr\(;f';:·~\~.'ilOJ,:•.r{!R',,+(~'·/".M'-) :'-.~~{I~..\r'1F1r~~:";' :"";.,',:','1.': ....f'. '.!:'::h.p,,',!1 "':\'}.~/)t..;t't\·»--:':A',·~i\!··'·r••:;·1:,.,: 1-},(.1oI'., I
... :';\" :.'.<\.\J;~,r·"'·.Jil'i~ '~lA',!t .If\t1...~I'.!:·V''.(.;·!·1(::\r, ;~:I-=J\t::-J~ 1__\): ~;...~ ':;''''i I ~_•• ,' ~,:, ,:1V'll:'I.-C::""h.r{;",I:.~:':':-':IG.!.r:.~·L,,:....v.fI .'J"'~.tf<vJ'\"".1lA!1:.l$.:.: ::~tl; : ·.:"il:w,; ~i"11/~:·',{iV~}I';",,:~.i',j\)i:-'iY.:'~'rr-"i!'Ii"A." I [.:r)·5-(;.n-;':\,~~:;'..{:i,,'l:;·i '\,"i,; 'j.' .:...·.;.:';...':rl('ll:~ti::.:~(.., :~i,~1~fJ\/.>-::J,j:t.!t()nIi'J.·('.'...·'I\l'J·.!lt;..t~(~I\t :'1 t.; J 1 • ';V': :~r\'!" :r...., •• :j~~10":;!':'I":tr.!.\·',~s:.·n;;'l.«!'~:·):...i"'t.:jl.~I;.;t'E:.)l~ I.rlf ;". :i' !,::.~~'1 .:~~.;.",\.~""r.:'b~'·"'iil"'<l"'.-!.i ·:;..t:'~"'~'?:"'I....r.aI:: ':'·.~\!"l~(.'
l '.~: ';:,J> fHIJ ,:;.i:.I';;' :~:q·.1~):!'li;,{."::'i?j~·.·\;j:'~.;)''';:J1'.iI"l~~'r.!V.f:i.:r;::::h.~f1.;;.n·~·:!:'Ji:II""'t::!tJ1.1~1•:1.' r::.~:':-:-:':~J:':~:~~':dl:t·::--'>f!!Jr:V01)f,;~..~,~4'f::AHt: ('1J..{:/I:Y ,)':tj\;:l:*_!'1'.: '-f'J~t:...: _.;~:v1~~i:,t ~~tt~J!1.~:..,!O(H)'iJt·i·,''!7. r.)t...~'lt<:)J:Z~th·:.r...~·'-,V;;t";).!~'I'·~:?"\l~~:e:V.!."1\!.\-t<*.;\~!.w-~nv:·~.lf .:-:ldPH'<~·~~:~!~"l.'INt\l \,$ f.J~i'M<':;~.~j:<I;}I. I"ll;j!!'iI:,.·::t.~).£·\fif't''''lt:.r·h~).~'''\l~';hW:I:)J)ft:':"SII~f":)l':'(\\r;l'"'i~'l~,n~'Hr'
:~~I,:::~iLt;:;;.~~·.,7~·;;:'/~~~~'~'~iJ,~~:~~:~~It1~~~~~~~;~J~.:~~~%~~~t/,',~l:~~~:i~!}.~i.J.- ;'-; ..,•.>.. :•.:.(:.,,:....'::'i':- f·,,:'"':,.t::'IIDylt';c..:·..:"'{'J\r.j.;;~~,.d:;~;.:'2.~'''~l::~.NH.l··'i.,AI;.;1', ...'.r~'t·..:'·.'::;,:: t ;:~:~ ;:1:W'·~(''::)a'/,;,,:···ld,;·O,·WrV:'b.;,:..::::.:/;-;\~'i.(1 '.J"'·V/t '';}(J'.':U J_'\'. ~I"('I.'(')IN ;'1:~J':·y;.ll.-:f' ~l:-;:ill tS:~i,.l-,~..y'~llIr:r1:.l\/ii 't/r.Jcr~.'V~t,f".. ~w ' .'!'...o#.! .\:1 :::~~;s.:~';l~:la~.\i>~;':·1-":lf:1~~l'~~\~.'~,·('\.lV-1t~!.:}.'flrl': "';.,'.'.' . r: "::'.'(~..',..;....\:-;\1.1••',,~ I:-M--:\'J:~:It,t'~1*-'.,.J ,:jt :"_.;,~t)c.M."rost,,:'.~',,'f~·;'1.:. !~t.:'j!.:·.t\:r-.:II«~;..~'l••{'~'i:::r.ol!){:·.j; .' ..:~,'1:'".'.iiI't...t:;..~·x:;.i""f...rFt;~·.,>..:!'~~t·~;'::.,~~~~~:~.~~:.~~i;:~~,~;~~;~;~~;~:~1~:;;/~~~~:~.7!i:;~;.:;:i~:;~;~!~:-~l~f~~~~.;. 'I~ \.;;~ ,.f.~,1 t:\r)Hr~,~~ oj~,!tI~.'·~.':l".t:,,·,~~·~*,\..'(.:-r:,j••:;...t;\'\·::\.....l~'1.;'.:~,d.r" •
: '_~I:':"~ if.:." t·" r:l !rf I):r.~~<irt'i:-:=1t:;p,iO "·....0::.::.<:J~~·Z'~I'{::~,;Y·'t~':'t~ ..~ ::.':-:'~!.(f-:·N;~~·;:!~I.,·..\:-r1'-f~~!~Jt;t.J..),I,;.'/~·1V~4~t~t!::o~'tf:N·_;.JE(r;)on.;~i!I,~'i
:.~:~~:::;~·::·;'~:~.;;;:~~~~A:~~~~1~i~;~~~;;~~~1~~i~~~r~L;;':~~:;~~~;~~;ilr~.~~,~:-:: ~: j~ ..:;~ ••;'<i)(it; .;-;'i,\i· l.t w·:"J.I.:-'i~:~·":\:~:i.·I:,,..j~..~~D.SV.'I;,.....:t:i-. :'(·!tr.:t/lni$a~.\I-.):'-:'•.: ~"!'''~''''(:lfJ'!.:!'.f'/{:'\'1·'1ltW.t·?:~\".".7-·::~'rl~X: ....rr.1~;:ff.~.l.:,~·tff'~:/,,~:-';:jl))~-t,~.t,~· ;"1,•.•,'. I/\~~~-:,~tl./{"";~:(!~rl~:)..t·'j~j'~:JJ )~:·(}'"::'1~~~~:i:IIt.',-:<1~;f.(t,~I~.:":"'1;'.at •.-1:••" !.:.:,,? ~: -.• ~~~.:, . J ....,:: !.: ",~."·"h\·.~.:''''~~:'~;;~i'1~'t'::.:U·:~1 1 (-; .'., 'E'l.':'" ;.\ '''·:::;';;·'':·/t~·ir·.t.:; 'i:: ;.• :.,::;:.,-r·:,.:_.>.'!' • ':~.:.•• '. l., .
~'~i~·\~1~;~~~~J'~~;~~~~~ll~:'::::;;~'I~~'t.~~~\X"'w.f~~.f~AA~r.,.~,
~::,.~~i~~~~~/~~'i~~;;:;H: ....:~~ \:1"'.-;., .. ) ';1;.; ~':;i \\(.\11.1<\~:t"r;1JI.... ,trE; r·~·.qh·.;..~t.t:·ttMj;·d:'::..'r!~.l".~".(1.. ..."~»)[aIJ'~"J';"~,Ih:IV(":I~··!Y'\.{:'':,,{":i k I. ',:' 11..~;'lll:r-~!.~'J~:l~·)"I(.i..!1'.',
,.'''- I" ;'~"':;':. i.l.:'~"'..~~l":(;f.r,!tl~\ttn".,,~m~ :!-!{-:kY ':)a'~~'.i..• ;:-\'/~)5 .·!i; " ~(::!,J":~:'\!~li:-~~}"*,,h),:!.~.~.'\.~:--~'."'!\,;:'" l,:,,' ;It:••;;..:ro,t'h~1~~."l>·.f.!·.I1-0;.,.:.
\',.;..a ·~;~:~~::l·.\1W~~:.r.~tf~:ri'~!·.c.,tlfr. ~ -Ii 'l~t:;";·'J)I~~·:I";:ht~·y"~:~r..:·~Hr:I.'4I··:. "~'" ~.:.·t..!;MTl-i~~,,;:.·,t'.\.,$t'J\ln-·V!:}·.:It!.::' ~ ~\ ..·f,~'rllfr'}l-:' ..\J·1t1<J:'lhri\:O'!.,':.,.i·:". , j..·~~U).~:·dTl.l!v:~::1·J.f.t;:~):~, w ;,~;,,1:o.tM':/.:;~1: a l»)). .~,~~r-:.>1:•.' ','J: ii':"~~~~:I~r,o\_"1:J!iil'i::,&.. ~A;,'ll::'1;1~'tV~j,:}_.·:~;LI{;t:-:,.:~;,~riYI~:·Vv·;:·.;.~~:::~"'I.... :.... ';....~:L~1:11:.:I'(~~..;;·,!:~·d l;tl.:';.~(.;.\J.t:\~!i•.I-it:l\~1..' \:t:V*J/nt,;.~;rr...',rt;ty.;"1~"1:1~'''!'~:~.~~;IS.\'~'Y't'~, ~.:·t!:~(t~:,\o!t.lr·/".lfl'Qv')'~:;itrt"!&~.{)''~'!'''':~::)I.:-:~.tV1 (.~1rh) ;...~r~i~·~j'iH~:~::-~:f.V:'·::(;~lnI ,·li..~l\~·r.;~,\·;;,,\1,7:~~X:"~::~ll~~lN!'):..•. '\1:-\:/(H.C.;-:IJ\~~:~);l~I;:.!'(f;'!!rinht; ,·~el~:l.'f<.~';r:tt!lJ1,.W\·,Yd·7~i"(.,fQ.~r.:£....... ~ .. i:>.• ~ ';,t.'j-::·.',~1:t\.~•.,.:~f.,_"i'::':\"tt ),'oI'{.J'},:';:'fJ, :(;':d.}.l.:.!~ r...JP.l;'J'J ;A,,~:'i~i~~,l;"f;.'1', .'!:;-;'·.~;":tt .. ,; I ':"_;!, '~ti:..,"'"~';'L.'~..it'\: ~~':(;::::""iVT:..;,.:I.:"'l~rt JlCti,:tt:f·.f ..+..,.i "~1..'d'U:':-·~~,)!~1~";l ;!'~.:.,·I'tfNI."~)'~?rMltJt1;;.-s.t.)'\t:.'!'i~"f-1'if.!:.-:-Jt'11~:)I'''''~i:'" ~I;,'.'":~(;::'~;;':;.'~':~../q: I./:t~'\ "'':\'}'\\'"(,1-r.i~J' ~'~r:.\..:.;!::..~,""~:'!.-. :~!:~N'l~'1~..1j:~.~~:~:~~:~!;~~~·:~~~'·f:i~~~i~~~~~;'~~~~;·f~~..~:~~·~":~~:;~:/~\~;~:~~;;,.-~~;·ri.) ·.(.....:i·..!1~,:;.f~.~.~IMs'f';.~"':h'I..,..t/;f(~~'''rfN~lo,Iffi·:t;';atu;(.r'd/..;.hbff(t:;J.;.l·"y,I • :\!":tJ~~~~-;xf·.~-It:'t"':'1r~~1;1I01.l;l,i,:1i1·:H..~::·~·;·:i·II(..:r.cI!.i\~tf:(jN~:"~.·\:j.l.;:rl,.k:• • . :" '::,"I'tlfl' !:'~'~\j'l(r/, lit~·4'o·t:"1 r~!1i\!£,lI"..r:,,':;:;r 'l~-I$.i'-.iA!Illt~"\f~}·~.,-,,\.,.\.....:-1..
• : C'...1'1'·. ;.1-\' :·~ri.tN\)/-::h-,·WC"1'·l...~'t·.-'j.,';..)o'~'.'N"':'r.';t-;;1·13:".'::"':'i·,\~-~r~,.:" . rr.:.i.'.'::I:v:,':':~~.":!·Y..;(.l1:~+.tE;"1'·.~\I: (..'\J.<t':~f):;.'4#')';j...'::'i'.I~J? ;yl\t~·~i(.·.'n.'.~!1I': 1\:':.c.'. ' l.n........,\";'J' f"'(.~~!,,~~),,~~\.,..·17.,r,·.l~ ::-.'\.......~: .....2\ .t\J~1.'\.~:·S·,,\;(·il";"~~'II.t..:.~. .:., 1 !::-, .,1·"f~r';:''''·'':.t.!.:,·...., ..'';''t~Pl'l-.1(;1 :~!'ff1":jol'"~,,(1'''~:,,''1I ':''-M·~''I.·f·;~·l/r'1;yI·'..''''f't''··P.'·t.' I '.:;-"~:.~-f::~;:~~rf,)''':I.i\f.,'.:~~~-:C-·.~111:~ll~·,n.~/'ir~"·'r(1J1~\1tY:'';!I·~~tA~J.·i"".'~ .JP:': (.\....ji~;"\f"t!1i~'(w~fl.i~:;.~,lj1'l'\1(.1:) h;)~fo'I:r,./i't·'1~;:'I2,1~~V~~I:;:.x:t)ltt;lf..."'J,'P;.:.r ~ ':'l'\\!:,t..?o\ ..;).-:".~ ( :;._ll::~~:''''::·4~t\1:"Il'V.~wit ~ I.~-r·!~·l "·t,::-r..!lP..b~t:!kPj\i:\~1,\:1··V:;~:fJt·'·f';~~.{ f·;:-:.~~.a:":'\I'o!l~;l)b\'I;¥Y'!I)tl·l;·~':'~.·(..,IAJ~:'rC2L~~1'1:,..'{:,~~·(Qt("';)'?'';t:·, ::t"~:_':(\f~:t.-:"~'~~;'~/";J ~ .. ;-.1,\ lI:i"o~>'"fl,.\w.'"t:\.,,:, ..r. :.l;'( .....~,~J..'.-:("('[11\'''7.b-;.iii' t.:'·{~·:A.··:i~!·fflf'!'~':I:h\~f;:':'•.!': •• ll·i': 1'.-:~:·.:::·",:~...,~::t(\·I';:\.~,·...:·\t'; ~... : ,:'"
;' ~.,.. \ • /~ J':::;? r ;.,':..~ri-;.;-i·':!/~~-:.i...~..a· ';':l"'.'::..}'.:.:.1:'__~~~>;;.(..~'j::'-:.:!\.:.: . ~)~'r.I;~}:>~·!"(-t),l,::::·6:-:-~·~iJ'?(?i1r_~l~'::;""'·.~~'YIN/J~~~e.J;lt)!~...,,(.cy~~n.!~r..t~.";.~\.'!':i)"i'!-1~(; _;}:J.;~T!).~.,I,;'J"'-}:~',ap,f:"~"~~J"'::~:/:~if.F.:"':.fdkf.:·)!/~!:··
!;~~,r:~~;~;:.(~~~~:;,(;·:~~:~~~~~~~~~~~j~i:~~~T~~;;~~;~~:~~;;·~.:~~~::~·t~·:('1,'. ~.•;~(J... .i)~~/~Jf('!;.\!.,~';:,H;: l :·•.~:i'lNi'!-~I',j,.tl!;:~'\,,~ti;:<:'i..;t:)""l/{:I ~.:.:';:_? : •.'JA:.;':1:~~~:l~;:N'-:I.:::~;\1"'~::.If!~z.,!;';J,r-:•• f:l..,.i1··)~:,'.;!'>t......x.V';·'\¥.!\!J(::!:.!~~l'.;J~•.:i I,'~ ..: I ...:t.)! l...:r:' : ;',:;h:" :·r\..~:'I":~ ::~··T"'~·(-!~~,f~1j("'I)S..:M:'::'·.:;~·.::t;..';'.:.:.Joo.. ,~.P(,:~: ;;,-:.1 ,'I. 1+'.I:'.~'e.:~:~,tIf·,:·· ·~.1·1:·)fl,!/...t:.:·~:~1tCV$h.~"··iv(",,'W·r.~ if'-l·!! \-:' :...j .•~:::; : "'It:' f~'(~I'r.:'fi-I.J ::-!,1~\iI·~jl·:',i'~~'H.~~I,:,>,,[,-)·~..': :;~.~::,,;..,:~-t::..... 1j~'W1i'-t~,~r.J:\'Y)'i:;.,'~,1.. ~ ~'i~\-l i I r._~'I\'.t!':i2~;-·r::.\·_·' M':J!MIVf\..:·01::~..·HI·h'\''1'" ~ t.'f'
,';,;·~i~3::':~~~EX;~:~~~~~~~W;'1j~:E.~~:\ffi;,;;~a;[~E~~~~:~~\... : ',:1 ·5.'''i:\V~~.J'.~i'~:~;~::N"'r..,:;f!:'iX;":J,,::·hJtfi\f,,·i-ott"~~-tifilO.tJ~"/r.~~··~~:,,:~..!¥.r.4j,''OJ' h:'~:\/t~~t:~-t;·1:1.l'iMll,~~~),jY.~:t..~.<')1t.r,":.1rf'))·'iA~ii-~'J.;';""/\I..)-.'j/~'.:,'.''4'".l~'';
.' ;-i...t':\,!:! :.0\1, :_J?:tf:'J·.-~·:'--Ui·'.l¥tf::f.. ')J l·t¥;"·I."(,1~)t.~~+:.1~4':~,~.t:-, :,\~':•:t~:.l:v..lr;_(':ft.i,,~.',4J~1.:':~.fjJU :!..~,:lJ:::1\t; ·t'rt.\..,:·~·.t-:'\~,,~.:..,:,.,p.;: \ :t·~:.u.'\~:/;: ,d. i..',h"'~".1!r: .~.,!.'1<":~:-~;a. ..'t·",:'\.'.:'i\\ ~'J:\11,
I," : .. ,.q::: $1V-:,:~~:,'i.r.~~:jl'birJJ,.""'I,)..,n~MJt~~;("I.:-,~~;4i;1i-;1h;~1.;::-.'": "~·~·::.f:'!':'~~J,'I....~~~,~,'r~n~h·(!.·.<t~f:l1r (~Vll'tJ:_'!(..~.",>:r;>:t~..\!~:h\'
I 'f
. \.",
. ..:.:?I:;~~:'jrt.;,i:··.'i·!r}f..:.':..:~.).;:..,'I'd::.\tJ~~i';\Si,~1~i 'P..~1~;,.q1olo!~;.,,"i~(.-:-r'tl.~·..\t\~I.':~I ~oJ~\1:":'1\Iiit.,':, ~ :V/:o;'r,'fr.~.~:.'~..riv·/ln·;VI'$::\:.~A.'li;'I;hi4-~tIVI~,',:: ;\!n:~f.·;r~ii':1" ~~-v'\I':'\} .\,.!.; ;;:: l.~nl.t~':· ":r,-,~·)t,..!?~~1',":-tt~·n.~.\'f.'\.rr('t'if:: tl (..;:~"H'f~(..!;:.~:I\·>I-}.~r.N~~*:il''(,·:;'In:." r:.v~.';:'qt. :',kJ.:;~M\;W'y·t\).a..f".Jd~:t"'e'·:_;:;::~".ii.~_,;t_{:n~_....: ..::....,1y,•.Hi;:'=.1(\~N.~;Ji2t(t-lViflijA':tr~:\tf~~·H·;·:v~\·....-;:·,!Lt !J; .r,.\i.~r::~l!'\y
.•• :,(.'{..'j ·(J:t.,~t; ....r~t/t;M·(:'\.Ir'ld.,..'.I(l.·.,·::·,M)J{";_ ~~·;.r.>-:.·~}i\l.",/·;.'."~'.~: '::- '\·::':Il\'o\,"'1""A~:..t-;'r,~k:~:!(..:.::'d.....ti'·R.lI,( f~f;M!l'l,.c:(b:.~';~":,,.\.i.'It I';"":1 ...tt.!'tf.~..;..:t./.d ;:'Ul A,~tl!'.T-fn:';ll:tJ.I~t~J!!":;:':"l~?':jc\"i'noV\:.);!'~(j:·:"l::tf:ft~:.:-- ::..'.\·t.; ';\\~.['~!::.-I!.J!'l:' \,1.:i,i1Itt~(.j~.N:.:'":JJljrol.(':~.;:'W.1!r.tk :I...:~ '~j'.."_'l'{i;1
:.,"'\ !In I:..:';:J.~'F,:r;-!~~'''If'W'-:,·.:iv·,,Nt''<~''':.'I)~.I.:.''I:~~:CI.~'',~,b;• ::.'; '.:0 t: ;,t·O:; ~f ,J-.!:i'i:- .:\' ':.1r-..:··~rrl.:.J·.~~~:~·:;n;·'d;l~l·r:AjINII'i"III.,1:Jj\:. ~.' ).:t,.,,: ~~i.t.".f\/I~/l:;J~~)l1";/J,t".;..':·.t:'..,j~';'~;':V~<:'l ~"':!~~':,,:'!"'i:_:t:),.,,-,·..... -.~". ;..\:.~r*"\{!J'1iy~::"-M!'lj,J17~''''·,i~Mjilr~.,.:S ;:~ft\,·;"r:~'ll"":\";';'-=\ '1:"',""
..., r~\', 'S.''':o;'1,::~:);.:''!w:~r-:·r~~~~::vY;if'\''\~~Y;S-r.W,d':t;fr;tM·';-\,,\::W..l':,i·!!~jI·:~:r;;:~:~:';:!~;:~~.f:'klr~!\J,:·::f~.~'t:::,?-l.c;.,J~"!,~~~~.J'AtY..r.-~~(J;ly:~(~~7f::r:;.~~~~'10'to' : ~:r.\'l·."..1. O.(t:".V\~".. 'i).1'.,~•.,..\,~") ...(lI,to;.;("•• )';ll fRr'.frt:l'~ ..ht'(~"""~tr.-:,I;tr,."",
~11 •~{r.::.'ji: ..,.rt::i:":.·,'iUlnW~'~·~,t~I:C"·~I..!.oi).3:..~rii:/'('~~a.}~'4y..1~)j'!o' •• :\· ...:'S..a·\·1~~:';'r.:!;:N'l;,1b!tJ';;...I"~:)·:~)!.:\.I!O.~~,.,~"i·?;;l.·I\:r...~l«JI.ty.ft:.;)-~'. •... ~ .·,..~::ft.'!JJ~lr>,,/1~!J..tr:~·:,'·.W:!·li~iI:~..,;.¥; h' ...f'lV,.) ",;(1::;'I;N~\'!;~'Irv:M'·j.!·.•
~./i·.:.·'/l~\.\;-;,;,'r~·,t:.:r~11.":l...1 U·.r..AIv.',.t.:::.t ~~;.(tyt\;t.lr;:".=c:~1~;,_ 1,~'~A~lJ- ': t.I~~.r.'-l:'t~!,rtrr1.r\l!Ic:,&';\o\,:~!"I,)Il\\r:JtF.:(.·r;f1t..v,(1'"i~;',1:.I~'r.:,t.J~·f5'.l'...\ III~
•'\.....:, ~.f}'..\~·,i :!I:~~·I;·t·::;·-·i(!1o"'l·J;fFt....-1. ,Po';.,. )1\·::.tl!.·:~!1\/11W!:~):~Jl~',"-,. .• r''';''~l''~:·,·:.-::!;i ~I,''-~r04~'"~:':::.'.;"'.\)l!~iv:"';ff~'~i"·~r.·'".'t;'''~t''':',l:'j(:...'J d-'\
... :':J ';'.' '::,"'14 ::j .,\.:::1 ·,\.::~I,\._'{,,,: !,J.:~'" ~::~j,.·:..~·t::.j':"I.lf:1IJ:\;IS!·• .' .... " ..-',. ,,,,: :." .: . : '.:t., .'J. };':!!.:..~;'''·'I'·:ll:.".~,.;: ~~.,1~
·,;:-;"::':·..l ..:; ..,..Il :.I"..,,.~........ i ~"'\'~'",." ;':;.~.', ".;'::.'" ~t'. :,,'"I~'.:-=;'\~:X:.~t?/!\~,,~~,,.,
;:<\{:·r.n;;iFs:,,,;, •·:,.r.co;~-;.~,o:ms ':AH :-\t:..''t!S:',
\.' '.'(.:., '~',;:\'.t';":';.'-v.•·:·f!P'G:,/,/·.:f~n....,,'rN{nd(~ ;,·f)I":.('..'Vyri- .':;: ..;:,Jh'iPI~N;j1.· ....'."":.I.·():;:F".:.Y·;l·J~~;~i~iT' lyt';J,..f.\,,:f..,(.\·. ·.y.t~~r....;_·i;~::~~~"~.\:t.:t,·.:.)·..·~bWr·l!',..' rt '.~Li:"t.:j··f.~:1!:I'~(·I;\~-=1~L\/.q...I.;~rIJ·"';:.~~'~·Wj:v.h.'"'.~t;..}..J.I#"I::;I.~)'I.~.Ii ·..~i..J,IJ::.(,~,; ..t~;.:.:'::'t~~"!.:f,J'•.;.:'-••""...~':Jo:~ '.""'>.1,,\'1: ,(__~\'f.t' ...'\.': ..;;,.·:.t~1l!...'".::.~'~':':,;~:.::::~~.:~;:.~~~~.;~~~~i~~\~~11~~:;~~~~ll)\~~~;v:;~::~;:;;;;.;:~:~~~~:'1:'~'!,·:;~'t..~··~4:1r!.l..;\it¥·~~M~i:l,,:;v.:J'i..,.'v.\J"'·":~k'i! ...i.'fv.:'.!:::r:o..:.',t),l~tA!.:;:r;"'151,
,'T' <i::::,}if.\",,,,::·::';.S/_t,; r~r:i1jim~::(c;~:\'t!;;r{l!"lti:~);r.~\''i'::lT;\..,~.'tt.(i:i: 1·.1.:.·rn~.r~!f,~;,W:~~~·::(.~.,,!r..~,'w(...rr;l:':.~':;:"'o>-.'(f;).. 'l\""~~:,!~p~ '!;"V/<}l:!'~,,1'.... : ":.:: ..il(;::;~·"_Jl~i:C\·'\'\\I.J·~':,J,::r,~f: r
.\! ..·t"t~:;,·:·.J'ii\d~:::
I':~,,~,o,-";"L,- ·tol:;i:4\'F.H\~~~'~;~-:'~:~.d':;~\::";l~:\r.1d';~~1$.·.i....\;-.~'i;l'oJtl('l r:,;~~' '(;I'" \
!;.(~:."./:.1.:. ::.f\.it.'t~~,-:.,:t'~t"'fJ~~.toii~t fi:"fi:~;:'lx....t)~j::~'rl~.':I,,;;~1:h;N::rt.~""~-: :. '~\:'.~~"·!jV~:~.<i.~"';:~~: ~~j~~t~~~).~11~~~{~:f~1~f·J~)I{'t,.::;.~:'"~.i,~L'P.1-. t:.••••;',~~.¥.-'!"I\ ....~..-I":J": ,itO{I'fl.lAf'.II~·.),;I~>~~?.r!-":';.~''-;: Il:~ !t4:o\ rS'::'(!"::r No): ~ f i:1 ~;): 1~:·/,i'1~vl·.i!tJ 'J •....:, './,'( \'."'1.... .;'I:q. t...':!~~.y:r,'\'.::~·N.-tf~"'h~Uifi''')II~'''~..'i-l! :~1.!~'.~)C!\j\t:,; ·r;·~ 1t1f~],:"hb'':,{ :~\II~,~·:/J\,:r:'tV!f/'!"J.\'!\.\:.l~'iJ'~7l'!$4\~'::t.:,:.:nfl.:!:';,.i=::~~••;: r;';:I.:rv i :t")' .}..,1t{,1 ;-"Ji-l~~!'~'" It;'~:'':'Jl tJ'Cf; .~ili:{c:s:fl\1/-:1t,h'j\tr.l.:V..c,¥.J;:I'''(~ )"J~ ..(.·l~;":""...r...~ r;_:-.:J :i':~)!Jof,!.Jt-J:t ..~.•.•t't;- -, ~;.,\·t·:\.1L;·~~\: 1"L~'~ .!Z :I.::{,' v".,'-,,!! 'l'l.:~;:"t~'y!·,\'<G:.;1W;fi..l,,~~,~'··n;¥11,.~tW"·fP:,",4'I'h,,:.lI!)'.H,1 ,:,..0:1:" ..-:,7:1',; \ ·jf\!l·l.:~'-I:!"';-~'~:f..'j'd'i·l·Y;·''':'fo:";;.'',,')' :.,f~·l·lij/'.:'~{.1::.:,..t:.-..1:1tx,:c<*.:7··~. ~';.: ~.\~:;:'.·,!,"e-::~~:':'.<'J'·-~ta,,!":!·...:1.\'~1.,i r:.{:,·"'t.1'·nil/: :t1 ...v..: I :,N<,,..·::,J.:-.r..'ty:.'~;~~:~;~(.~:;'~:~:;:~·,~";,~~;'~~i;r~t~:~~~~~f'X~0~~~~~['::~1~;:~::t;~'~1~;;k~\~,"rr 'to'!)" -t 1\.1)..U 1:.1\\'1 j:l,·I1J '>!~,f;;._~,¢;(;.'l, :~.. :!'.oi...ljWJ~.1\I~;'.'!';y':;;-'.:. -,; ~~~.:.~~~ io'.!:~;·'I-: ~O;:"•.ldl.·!\JP,H./1.! 'I)Wi,':;)..~~:I; ;"\,.~O!'~~.n~:J)~l hi! !l'h~J.l;'):II)'f,~1 joI
~~; ~·';:!r'V.:· ··'P'1..,;;"J'~l(:~) 1J..ri~·{:X";\I~r.':I~.!It~'(t 1;.:"4~Col!...t~·,l'~V~.••li'·~ t..t;1.;;.-~:: ~1··I·:,··i,.·!(:"', :'r~,-:j....,h :if" l>j",}o'\l(~"r...:r\'; ......:f.~::~:,~ :~r:.~\~~tVAr[t(rl' •".:-',. i~~.::lt:I i ,.~)i:::.Jl':-j. :·.01.1 ,', ;:.:~:i.i.;:';",:F/o(lt f':,_.\~-:;"..~ '-'i)f:A.f\~::'~":t..·"!{£·/.;·;.f,lj~-·Hil.l.._.l1V:~~II~,.l~. :·:-':\1.,v\.~.JJr~',J~:;~"...:t·:J..JIIF':i ·::Jo:t!.'l-;l:·,r:,'~·~~·ilY'::~'Llf~:t+~~{'~·"rf!:101 ..~/\·
"~:' ....J A';··. ,ojl: 1:'::,1':'~~ '. r;.1.·~·"·.110;111:1~:.;:I,~·.~\r·\I"M.~/l'\V) 1""~\oC .... \ .: .... .,.:1:,.,..~.;~ ;':'...~:...•;:...~~~:\ '..'~:'~,:'~:'. ~.:~\~.:::~:'!':~;!':.~~\o~:~~.i1\·~~~~~:,',:~'.'~.', ..:~~;:~.~.,!.:t.~~~:.',~ '.f~~ j :\~)~;.';'t.:!vOM;}Mt...L'...~!'!~;·,M~\t~.(;i-.~:~~\'::.:~\~:.::ttib.J...-l:..~
~;:.~:-;':~,;~~~~;~~.:;~;t'~:~~~:;,;~~~~'.~~~~J::'~;~~':~~~~~~:~~;~:r7·~~~:.;;:.~~.~'.{~....; : ;~ :.lv1 ::::~:·J).~t'\,i,:-:-~·.;).~l'·...:-•.r..:\..·it!t~·~·:..t':f..il;.~~:,..';.t~;·~..~..IC'~:;Is.t~'.I'£i~.1,,· "oli',••• : :-:>i~:~:J,..:~"1::,,; r:h/t f,·....\.;',·1,N;~..i~...~\lv1J~.!wt\,:;/:t...:.J:!' •.: t-:;:.~!·;....''':. . ;,~i_HW,;(".II'.1Ji";f: I'!'d >:.~.~r."jlt.r'In.~r:Yii~fI'.':1l\j·:~..:·tI)1I\\.'Ij':r;,:'\,. ". • !-"<.•1:,~·.v:.)'·;,~~MJ""'i·lif~'{!r:J '; ~.t>...\~·./(o.~>JIi:t,;.;':;.;,f·tM·~~';:,A:'fij'':f,):;!f.i;·/-;:i~~:. ,', • )\f....;.:!;l •.-iH'\,>'1.V:;.l~fl'l.ro;o~J·f :...~~i=t.:i.....,.J~ IM..~• .:~: :,,~ ~"<'.\f;"":~:... J\_.:::~;·I:~·:.·~j~t:· rt ..", if"~'J~/la.~Jt.r..',..\,I'l~.:':~L:(.':~~~·~"lf;.i(·:r:...~:;~.-..~~q·.ll#,tJ\~X:I{·.Tr.j~'1('r.: ~.\::.1,::.) ~~.t)''t·jr!~t'''i«'t1;!-,.tj).~;Str..: :\·_':=:·'.\·I i·~r-N"',,/r(!.":o.:"'.iX ~f~T\I'J r,~"Z;-a:'?f(i;!!.:.aI::"j:-.'r"'; .·:'.:·:Ih~":l;-;f?t{lo!\"/':H::J·..(''''~·~.¥.~.'_':"'.:I""";:' '\.1 ,,\. :••~ ~·t4:.(.~{~iQ{J;f·~'tf'{Vi.cj:;.l.••••~:.~ :'\l'!' ::~:t'.O-"':-f.. ;,·~:t·\o;,·::;::'K~\'Ij'::!.t.·~,~..;:.,'),>t.t;\'(~:G:0'.;)j'i{1..t;)~,"i.t::.yt,(.:-;.!.'~:.: t:.i-"\,,,: ~~1"'jf'i'~l"'1,f.(:;Hlth/:::!'tt.~ja·~y' :).t{··;~1:·~vj~!"S~1t~.i'·N~,:::.·~..'l\4,1~J;>";'. • \.:~ ;la!';rJ·::t;:··~·N:-er..~ •.-fif~.t.".!f.i"~t~ri-.~~I.:l.U", r.,J.:';?rrt.)7It.:,t,1~·.tN'!1:.;.'~ J./~·f·.I'·Y~lt:~~<:;:I:(t..j'rrl',-:·...~,:·?I.:r:fr.::\d\~lla~·tJ+:!4:):~~tl:r:f+~,'1~:.'~~.,II\1~ff-:':'f·ll"~(:~!';o.·:;:.:V'.:·.-..;:~r.J':l:.:'~·t't(llf..~' :"').f 8!i'li(X::f:...;ty,!..~.t.';..<:i: ....~'-:'~:""r.<,,,I.ri.:'I,J::t~'i\;\i«,1ln'~rZ;)OO:sl: N-'! ~:;"f'V"\:.,'f!\ 1,,/1;''-"nl'l~~''':I~~(;,' .. ,:··~~....r:,~~tr,l...':t.....~ ..:,; t 'rr~~:-'<1o-\~,\1W~I~t\1~(q'ioirtl:':;'!lf~~"'I!':h\..I:;lo.': ••"~": :.: :;11,:=1~~t:~ ...·;~~.v'G!·"':';'~ljr.tJ..l.(:I~·".'IW'o"'A!-4,·l.n:fA l;-.?n:-V1'of':'..sPt·(r\;:;'jl"!":.
~:;~:~~~~~;~·~~:t~~;:::~~:,:~~:1~~;,~~~~~~;~;~~\~.;~~~r:~~~~:·1;,::t~~,~C.~~~-I.:· '. ,'1,\'~i~~!ll;:IH.t..~"'Jf.h'r~N'1.. :. \,.~;_)'!-.:.: !':,ll..•• L.gf)ti,~\~TIfJ;'·,iif..·.~·.!·.jQr~:t:;~~~:..x.r)kf"ft\ipf:r..::St..u.~"I'::-U1Il5~J~'tY."l~t-.'14J.,.,1">:-'!UJ;:~.~:"""'"h.t~"'''' :~'~;)'Nr..-<H r.ti'~~~.t~j?i'\\~l~~.,;;It.lI<!;;';SNf# Ji./d'tI.'A Ii :f.C,J,v·j';,'."1.~:" ,~.~. \.~'r ~!~c~"'~~Ml.'J.'i:(,~l,lY;h:r;,-r0.1fr:)-A i1,1.1!>.':;TJCit:rAa-r,o,.~l£IMi \'"'~,,:. \);1;;)';{~$\'t'},i~J:m.I:'i·\'I(...oV)/\'!(;'~~~~(tN.f;':;~l:M·Xli·\'t;;·l\'1.i{',V.~.•lj~\~.,(12'1'::1·to' ': : ,,(k"t'la~~<~<'I:Hk:2:}"VfJ;-!>tf}!J?t-""1"4;l,-i::1~..,Ir:.f.lP;ffi a.:rt)Il~->:J\ji' f'...t;f~·s:{.~ ~.~ t1.·':::4 ~i'i.:.J;.~J"';"!'1J;,1';...\~~~-~l~~.1 t::!)a \..\i;~l(;:wll~1·/,1!J.~':J../,J.'6)k:·wiW,..5t:=.;:: :;:.'(,K.':u\";d,}i;~y;)'~t;,.\li1l'~/.':'l:.\ ..Vtf...-;.·~yt:·..,!-~~?~~I-'~,,·.~~·~"id.....lE~~i't:2:;ni.','. ~ :.'(~.or·.11·r·;'("n.l:;:~.\\(~:k~"",,~>1(:1)\'1):[f;"r,tH;Ii:. ",·Jt~..{::.~~X:\~li( ,iK.;,-n\(,":".ie' "II,,"; !vfl~.ft;;;::A:)'li.«I:!;AV·~;~;-''f.:;(·'J.:I)'I..~I.~':;~J~'" 8Vlr",ffVl,": ''';': I ~ 1~·..J,l!J~",.~,;:r'\(.)I't'!~I~'~"~·.7:':if';'-,:VI.t{~.111··1~'t J·;.tti'.tl\ t~t\/.,U;,VI·:;'h<.\{).,t';~t.' :: ,''''1'11;,.;. ·.Y.'lt.l.{II!('::'4-"ot;~'~1{T·}.,.ii;/t''.1tl:''/_~:'fl.!1'!tl·j.r''f:~·~:rv:..~ j~':;..~!l't7:{\~\~.~.; .~ ;f~..~~t·~·ml'!'i:;~,. ~.~.,:,'.::",~...:1;(,"~'l'.. :v:jt·~J 1 S'J•• • 1\ l.i.,~/J' ':,., ~":~:::•.......,.. '.':.•,.,~ .• ; .... '.• ' .~.'ie.:... : :.'\'.': ... I"~.;.\"'!:··.".~" /;.i~/j', r ,:< .."..: j:" .)~.:-'5:...~·::-:r:·,':·.l:·('~:··';.h·~~'J:·:."....:".: ·d .. ..;...'v,.·/,·,\::.·l',:.·,·~·t~..«II;:'. ;U"'!):';.lt;!::)~:·~:.....·,v::..:'(r· III ':$!·t ')JI.r.":1)1~'iiJ·j~{...1~;~\rC:~'iF:'~y,\·,'lfI~~1\.,
~;!i~~;~~f·;~~r:~:r.1li~~~~~~~~~;~i~!~~~~r1.~:~~?~\~E:tf;'\\:~!~~f;( ~~.h.t'';.:li~(.i!~..~....\·....::..['tvl1l~ii~·:.t\N.ufVJ.t1W;\I!N':~o(ft~r'/HibtN...f,".:~.'itJ'1~~'. ....;t \olJ1M'«-' Io"lJ:::·,':fi::.:;:':ji~/a:· ~fC:(·:~':'t&:\'f."':.;aS:·:~~\':rrM·.'t';J)'¢i';l\·~;-.:•.1 'tINv' ~:~.~";~i':Iri:~·{;iJ..:,w. ~~N.iJ,:.:"jt'!.J·'."'{.i';::·:f!.\·a!H5t~fjy~t)/Oi.~.j),'?;:.rl,.r~1j:..I~. 1\~·~:rlV:.;;;_i;,i·¥~~.-:t~··~'~}!;i-~"2C)'(1!..~,!J..:,~'M~'\":"~¥r:~";·:(\U}:~.J,~'I; f~~!Ni.·:t:.,\(~i.1V~~;.tY~I\:1.~;'iH-:.:.tf.")~: fl :t~"9J:r:-:!-;.~::....·s..~rIf~,'1.1 f!~-;w. !'(\"~),::~:,:::;f'~~:~~.::t.~!'(;~IN.~!·<~I~·jfbil~·;,,~:.)..:?..{\.'V.fj1..;;_~'!1X7:<: !~ : ,£\,\.q::t~~~.I):f"!·n/lf,{)~v~:r.;~:/'i-l!~';'~:f:Sk':.t.'!1l1:·4.l'~tr~·u.~I;"':; .,;I:f'~-::~:,i·5r::;;JI':-,.·'.:\·~:~t!'1,.1.\~t~r:';'\'I.·l'::I'~:'·..~,\:ri,~~';Nt- 1~\t:)1);'~"\T$'\":V::i,': :: ~.::~;.. ;.;:~:1~i~~~~i~t.:t.~~; ~...(.,.. ·I.:j:~:'I'\'/t'~t.>.~,q_;.\J·(.IY.;~n'Io·rt:.NY.f.'! .~vi1;.:.{:/':(....'1M'~\{::·,:..l.~.. , :-:t:~·\' .....\i '\:.~·~~ij.:~.t\fi~!~\.I("~1}i.\-F:<.~\t:;'1~A·tjl:t)olJl)\·:,(:)~.~t.t"J::.t.~:~:: •• J' .:_;,\.t~I"f,~'i'·~I··.~l/~1it\~..::::·~~T"J-vr:·;Y,!,r.~;(Jo.:~'f..£3H~l::o$J:.:)""I".";':1;: ·\,¥··-',I.:"t";t=~~.'1l",,'::~l":<~.In''''~''to.":).,;<:~<=!J;:..rt)j;.::> ..;'Mr·I.~S:\i'-Il ...:...::17·,' !"rJ~;·':.lr:~).1;'..\."','C~1I:1n...?)~,:~*·t':'Ji.1~;Vf2flil'rl!;..1r.I·':i·;\"rhv: ..:f:*.·r.r~rtli"')J." •~~~~.... ~~i..: 1:r.,,,:~'1){,';iI,S:Yi~;l'j 1I~.l;1\::~'~'lr,(\o"i!,-~-J:"':~~V:l'::.~U}?n7:.t;1)tr:l...,;../': 1·.:1~;~t ....:l,d ·,~:;1'I:.~~..\t.~~J';".it$\'A~)·(2.'·~f)J\:;H~f~:;~h::~tt~~~'",,:\;C!~;':';~!"::'f" :·'f:;..I\·\..4;.....~· .(h.'{t·:~)r!l} ..~\t.;I\I.~";:~)~f,.;~~l,,;t ..._·:;~tI'rlt>~·',N)i~;1'4..II;.,
.<,.,.,:",~~"I;·:~i·::.!,J.,f.1• " ,. ; ........ ..r I';., ,.J ••;. ,~,,:'{\/. \'r;...·:~.M,~..,.".-\'fIh 1:'~·I."~~:..:.,::"(~.• ::.!...':"
~,.,"::-:~J'~~;~~~~;;'~~~·::.'l:~!~::~:~:':~~·~~~~~:~:;;'~~;'~:'~~",~:,,·~~~:,t.~~~.~·• ..:.!, ."..~ ;£'i./.';t:..: ",1'11.:')\:-:- , :..£...·'.?~')t.I..,.:''''·:·:':·:·1·' .....~r::.J'1·(~.i',o'"r':tl:-I"L ,'.:' ..'::;
• I :::':-::~'::~~)..1':.'j~~':'"=t).'(."),!t :~.t"l':::i/\II:;~ii;~;.)".:' f'f/.1j·:'r..~t :.:;-:"j' : "\~
.:;:.;1<;:;:,~~~·~~~~:,::~:~~~~~~:R;;~~,~Tt.;:·~;~~:~·:~;~·~\~·.;.~~!~,~:t.~:f::~t\~·;~:~.~f:~~~•.' ; t ':";~'l ~~~:r;a.:,~~"'i~I'~'I~·~·I!ll·~JJ~I{,(II.ct.."t'-.;;(l.);tf::..t~.~:':."A'I.t•.t:.·1:t;.\·:
:0 ....:. J••'toj_~··): /: i.:"):,..l:I!J~...h:J.i. ?i...'o'(.,.:'..·J;\.':f,1 ,•., ih~;;,l.~'\),.;hr-c>~._'~·"
.,'."-;' .. :.j.~.-·I.~';:p..::..'f,·rJ...P'':if;~.~}tfl!i":~r.':>\:\t:';~it~ll,\I. t~I:' {'.~.,...~>:\;..\ .:~!~:;J:' ~\l.~;r.::'JIt ~,:~1I·t.1~';I?ll'·;t) t'b",'\\:;~·.:I~~.'\.h'.t~t.
". :11 :.·t;·..~ ..:.jll ~.!.~,:..·Io'V.Y :J~1:~.r;!:-'::I'v\I:Ii';f'~~-1A~"i'l~:f,.~.il"'.'~b1.,.:·t-r:<. '.t:~~h::.'v-,".iJIt ~~I\(;".(;"/.:'.1 Hlr"t."~#·:·\!/~'(.Mv·11:. ~·t·.~J(i.l:r:':t~J,,:
\ . \ I,:: ' ~~~~) ~; ;~::,~".~.::.~.;::'~ ~ ~!'~II~~~~~~.;;::::;'~f~~~}~~:~~~:;L::~~::~;.:,\~:•• , \'i::;1 J ·\-l'~JI·.1AI'f:t;\r,'t.Mr~:.!;~L~l'tM')i·':(;:':~)·v'.HI ~~'~:\1:'j...'f/f.t~.N';\.Ict'iV'\-0" :\:.~#.:\;"''!'.!.:!d";;,I~/..:ri ~M"_!M!c 11"0:3 'io.l':~··t~t[::1{J-'.l:lh.r\11tt(::t..~'l::nr...~\l•'.:' !,{.:,,:'r,:: {":'~:.;i,;;::~kr(;:~fO~:C·,h.""'V.'h~]\o·~"'~Ii9.i'1:,,;;:.:t'l).·~l!"'A_lf()·!,!.,'J 1,7"~'of.... .\;!~ ,\:. ~.p~"r.:~:,!:':;....,,):~Ji..,:.·if.\'fIr'·(:t'~~..n."~"!f~; :··.\:'.t.".\\:":"r.\."'.C~n .,.~"'~;"r • J"...."":;.':f!,: I,).;~"'I:di...:)M,e,hy: 'l·\:t\.f:Y/\,M;?J.:)o..2i'-'(.~"'~·(,'I.;I\~''il,',';G":j"';:
·~.:~,~~:~:·,:·~·:~~:~;:.;i:~·~I~~~:i~~!';~~~~~~~~~'~;~~~~·~i!~'~c.;~~~~~:;.~~:~~~~~~~~·:'~...!';\:'~i~~~~;~~ti.i~f~~.::~~~::.~:~·~~~I;~:::~;:t~~~~~~~~~~:~!~.;~~;~.j~;'~t
", }.\ •• '0' '.:~''\.:'.' 1,,:,..I.\;'·J ~".''::'\ ·\fJ!r4:D.n>.~~r.l_f~=:·1 ~ld\~,::!.::~.¥~~'(~iV';t·j• "" ~'~d....jl~::1ct\~t~;:;:"..!:.:-, ;-/';";'7111)1 , )"o.::3r;'It,;:· .
;~.r':·:.:t~..:..\I~·.!',I':,~'..: l~;.;.;:"..,Ii
· '\' \: .'~:.I~:~..,r'l~v.;\·d·~/l·.r;:t':!"\'r.I·I"'Ii:: :-~·;'::'\;A:;~~)'·~.'l.:\;\i~/(.I(.:ll!;:~U:(..·C', ..:·t·......1·'·~r<.'ll';::"f\~·:.",i ·'..r1' :''\:OFI)f\·l.'VJ,ll· .::'.t.::,:i"d t:'1... 1,:..a;1:1~
~~.. 1\,!1 ~••",:~,::tV:O.~r I-~"\!';::~~~I i';\I·Jo.ll~:tlttl;;"·t·f.n~t!.·,1'f.'~\J(f..:I~.. ,\:-:::.t.:f'! l·...-+(... ,\I, s 1, ,',',:~\'I+~",.~I.L~h ·'~;~:\.iCIt;'1~~·...i:'t~"il·;:r.i4.•
..:~., ! • I \'i 11'. ...."•., ..: ..\\t) 1:.:' j' ., •• : :l1"~ I'IJiTIrt.~·J.t':.·'!'oI!.:I.'..~\,.ll~~:.!..~-:: .:'l :1•,. ".... !'::: , ~. _ :··:.lot -•••• )0 .. :" " •• \.: : •• ~ : :" '.
• '" .!..;\' : ;·••tll. ~.·.· l':':':'-:'/i~" '".. : ..• ' .''. YI.:<"l' ql:'_r"~!~,,;·.""J):"',4:·(.~1lr;,(~'f)1\,:·.;\i!,.\.'l.~A~Y"·,A'Ov·I;').w.;i..n:&O",-..••~. ; ; "':..1:' ~ ... ol\"i d~f.~.t:~/~\\'~··f;::!..i~;~\-r.(··O;.~·&f\'ik~i;t·l·\;I;i·:.;Jl.vr.1J:; ..;'.\1::,:. j.L!";'t " .1,;:.: ~'h:u.,'i f4·~11'\.A·1I,.1~~.t~1~r·.J.t/~\ 1',1o'1<::!,; ...~N"'.!oJ":1;'
.' :..::,.";.:-....:-.'~,\":~·o}#~":1 .1··Jlt.~'!_l~.::;Jr~-",'":~.~jl::~11'-. ~,~, :.~,tf·IH,.'IJ~~:r":'. :': ':~·,,:.rll\•.~:\~'I.or.1, ,'::~~Jt J' I .1.~~,p,}.;J'.!:1.1':"l.';',I\\'(r,(. n~:::J\-'1 i71'5• : :,-!';:) ':~.:..ti:\n.~I"~:~':);;!:':'"~~·Mj1i.1~~""!(.:t2~f~xt:t~t:{~i:::liL.!)r.l:'··
.4 ~ ~.J.:::ttM~';'~:~;~':~~~~;~::~.~\·~t~~~\~~~~~1~~~.~,;~:~~,~~'~f:~:~S;~~'. '.: d;#~Li. ~.:-,I·'.;..../};';·\~"'';:J:'ri(,.:=. :i.'r~::rl·l,':
.:-:.:..r.t 11..;·....1·:;(':II-"_·,"$·t.:~"t)l·"t i~,·1!':~":fl"';~1;·;:•.V: :"'.~~.\"·I'- ,(:~,.:. "', t ·';J\1')·';1"J'?:!f~~i":",~~'·l.o:·::'_'I) t'~'I,..'I;,l!f':l:t'I..\~:.\'ft1~~"".
o • II .: -.' ••:~ .... I crl!.-:.··r:·''lft.:.'::r~t:'''-:J·('~''./~/,,,_1..i:,'! ,,,·'4.•": 1'".1
~ .'. _....::,"v~.;.H.(,:-t"~,t.~-1j)o~IIi.:m..t.;:;I:"\r:14.:' ....\"t\\'.:~b:M,~f,I.~''':' " ~~,~"lJ.f.(~(''1.'\vf·I.4 ,t<:.....lI;lr,J!t.)J!\'ttI.CII:I.JV,.IJ.:·~\.ot:.::wl\, • fl.~...J t
,I ; .:;i\ Iltlil'~·!I/"pl.! Ill,I)X.,~:t;17""i~~!·MI(·,:1~V,t"foM ',. ~ 1'(1..1"::-:,,,tAi \.~.', '! 1.:(':' f,J,I I"',,,oj ~:':'~yiJ!.~\111CD.v.f~1r::1\J~{.~Y.!.·(~I~.:r'UT~Vi.'-.t.~:;rv..~.'" \"."U~:,ft·.:,"f'llfs:\\'f~h:'J~·hf'.l~.~\~;..,~Iit.'f~.\'J.\}'!1\'\t'1",·:h\.1:··\"/Jj·,=!V,nl~\o' .. r. :I':P :'IM'!M."·l~,}<t,.,\"''f.:l :;.)~ li.f~·I!.\~,:(/,\}~'~';""il;.W:!',;';;,,~.
.~"_: I·':.~·'~~·l...\U1 J.:.:i/.;:.. ~...\b\,':~·/ll.:~J;·."\i;·~"'J:Jl~i11&:Ii,I·.~":;'j.:1 :"'Iu.J 'I
• I .' -7 ""; :~1 ..".~}~.,.t(~A~~1.·J:"l)tr.~.\~,.!1-..c.':r·".J.' 4 ,,y.';...f.:~.'H·.,.~.,.c'r'., ...!.",It j~r,r:.~..t·.-(r.t.l,·..41):.,\~··T...w·\·h1) I:.~'l," ~:'r..I)oj~:"'io;,....f-.'t ..._I,
• ;: _·'W-'::'n.f :~,oI.\'-,fl;....rtJsl.,..~,y. '.eft!'!> .~Jir...t 1,\;';t.\'".," ..I0,!'.~·,.:.·~:f~~:--,; i•• '...'Nd~r;j;~Il.~~....\I';e::r:;~'~:},~t::..~ ·r\..~")-1..'~fV'...i!'t:'inf: \~.~~. • ,:.' :'1".;-1~ £J::;':";:t ~,~.I"l :;';'I~\:'·.I'._"':~fki·~""··"P...1!I~I:
h.. " ' ..,'" ..,I' '!-':'l~'.:..4;:".',d~ :-..\,H .,&~·e)"~,#JIll4t·;l''''!t·J'I~;lr: ......;o;. ;:. •••~...~t'<.~~./:J'(t :'.':~.-.:.:;et; h:·!...·~...,I(. :(·,I.....Il,~).. ,;ri .·.~I.t~ ,!.
;)01' .1.::" ~ • r·J'. ~::-..I ~:.:.,..:;.,i1:ti.~.t:~r.-t..:.';,11:L ..'!~:X·4·.c~1:~.,.f:':"'-,J, ' I"'t:-.Vt'o','.t.,.:,:.;qlt..:.o;:",\~~..\~o .~t~:~:'/I
o,"! o'~\':i'''o'J~I" ,":"UHc ....\~
e c ';o'~":".~~':';$':,~':'1 ;,.,~ "l6t'1!t f-:h.:I\t.~.f'~t~ ..i:..4:;~I,,,~4·U.;' ::. '!~,~.t,· 'I'o''f','':':!'" A('v'\e..:. ';:)\.\.;::.1 'r:'~q ....:r~\·~j:V,tl":t' ..,1'~ ·.l:·,"It.:~~".':" ~ .:jI';'~·.\.1:~~t:\::'~'4~:1o'.1,·l:~at.1I,,;.·,.';~1rt'~'!",'Y"\'J··'·, ','.' :;.:-.','.:':-".,:•.', ';'\,~l' '".1,-',,.(.:,:: '.~; .
:".1 ':J,?:~"" :,1 \lVAJi"I~J.-.t..:'l:S~~\·i-a;;A."';''.!~~J!;,.X_'~'I':.;.,l·':'ljI·/o~\ 1!'r. ':,!) ~~: ~,,~(#~" "A'l}J~\; " \'''~i~.:-.)\?'''l'·:Vcl~',\I.H',:';, ~f\·.l)i·~"'\,~_,:,;.,;(,f1l:!I,4;tu'N·:£%:}:
• 1 .... ,# •• ' ',': :..):,,"1::: ~;1l::!(,-(.t!: ··.~.L:"~"~F",t~,.1:.,.:trJ.~~)',Fi~~f"'.' ': \;......,·;;::',i~!!'l~·\'~1·:'~1,'(V'::;;")t.~~...u..~,t.tW"l'tlf~'·~.I~ ,LP:1:;.'!'
.. ,'\ ~'-,fl. :i.::'\ti .j; I~~~t'?"~i...·.;;;)'\..'#;,;, U:,v.~:·:i\"l"''''''''~II~/~:!fo(')..t\n:-: •••••• "',': .t.tI\~'J'.!:~;,,"..";.)J b·..:;:A\~'"Q"f) tj oJ':_' \c"·io.r.l"c..?I.i\I!f:.·
.~ ..",,r .'r \·:~?·.c~..\'\;lf4:..";c..~.·:'$;),~:~~~~·~."~.~'J'!I~:~::;;:;"'-J' ~ :;. J! :...~tt~L.; 'hi~''i"t.1•• 1:: .•~~)..,I:.".t"':""'oI'.·i'.l\h..II""#"':".!K~:.....':.! .".! ·.r· ..._#>.(ti-l4"••• l{l~~~4..~·1i..;t·l~J..AU.~·~\,\....:~', t.c1'~Io;'.:.....JW't1' • , .. ',~. , .....,.: ;,,~....~"'!:.'.:~......$ '.~I!I.'"I ..."'to1''''\\'trt, ..t ";';l~:\;;~:"!'••'.~I :...: •. ·11:J:t.~~'1N:.,"'!;,·W;",.~U.'.t!,1~~.\. '., lK ...""':t.~1I."'J;:"<t:.: ..~·!,'f
'. f~ .,...:;....})."'(~J!..::.: '~!)........\':-...~)~'(. ", ,:mn::.,
PEM format is an industry-standard file format for digitally representing SSL keys. PEMfiles can easily be created using the OpenSSL tool described above. The preferred medium forreceiving these keys would be on a CD.
A 2048-bit key is composed of 512 characters. The standard practice of exchangingprivate SSL keys between entities is to use some electronic medium (e.g., CD or secure internetexchange). SSL keys are rarely, ifever, exchanged verbally or through print medium due to theirlong length and possibility of human error. Mr. Levison bas previously stated that Lavabitacrual1y uses five separate public/private key pairs, one for each type of mail protocol used byLavabit.
Depending on how exactly the private key was first generated by the user, it itself may beencrypted and protected by a passv.....ord supplied by the user. This. additional level of security isuseful if, for example, a backup copy of the private key is stored on a CD. Ifthat CD was lost orstolen, the private key would nOIbe compromised because a password would be required toaccess it. However, the user that generated the private key would have supplied it at generationtime and would thus have knowledge of it. The OpenSSL tool described above is capable ofdecrypting encrypted private keys and converting the keys to a non-encrypted format with asimple, well-documented command. The FBI's collection system and most web servers requiresthe key to be stored in a non-encrypted format.
To obtain a SSL certificate from GoDaddy, a user needs to first generate a 2048-bilprivate key on hisfher computer. Depending on the operating 'system and web server used, thereare multiple ways to generate a private key. One of the more popular methods is to use a freelyavailable command-line tool called OpenSSL. This generation also creates a certificate signingrequest file. The user sends this file to the SSL generation authority (e.g. GoDaddy) andGoDaddy then sends back the SSL certificate. The private key 1S not sent to GoDaddy andshould be retained by the user. This private key is stored on the user's web server to permitdecryption of internet traffic, as described above. The FBI's collection system that will beinstalled to implement the PRJTT also requires the private key to be stored to decrypt Lavabitemail and internet traffic. This decrypted traffic will then be filtered for the target email addressspecified in the PRITT order.
Lavabit uses 2048-bit Secure Socket Layer (SSL) certificates purchased from GoDaddy toencrypt communication between users and its server. SSL encryption employs public-keycryptography, in which both the sender and receiver each have two mathematically linked keys: a"public" key and a "private" key. "Public" keys are published, but "private" keys are not. In thiscircumstance, a Lavabit customer uses Lavabit's published public key to initiate an encryptedemail session with Lavabit over the internet. Lavabit's servers then decrypt this traffic using theirprivate key. The only way to decrypt this traffic is through the usage of this private key. A SStcertificate is another name for a published public key.
ATTACHMENT B
EXHIBIT 21
register and trap and trace device are not provided to the FBI inPEM or equivalent electronic
It is further ORDERED that, if the encryption keys necessary to implement the pen
imposed on Lavabit LLC and Mr. Levison;
format by noon (CDT) on August 5,2013, a fine of five thousand dollars ($5,000.00) shall be
register and trap and trace device are not provided to the FBI in PEM or equivalent electronic
It is further ORDERED that, if the encryption keys necessary to implement the pen
ORDERED that the motion for sanctions is granted;
government's motion, and pursuant to Title 18, United States Code, Section 401; it is hereby
failure to complywith this Court's order entered August 2, 2013. For the reasons stated in the
This matter comes before the Court on the motion of the government for sanctions for
ORDER
) UNDER SEAL)) No.1: BEC297))))))) No.1: 13SW522))))) No. 13-1In re Grand Jury
TISSTORED AT PREMISES CONTROLLEDBY LAVABITLLC
IN THE MATTER OF THE SEARCH ANDSEIZURE OF INFORMATIONASSOCLA.TED WITH
IN THE MAITER OF THEAPPLICA TION OF THE UNITEDSTATES OF A.'t\.1ERlCAFOR AN ORDERAUTIlORIZlNG THE USE OF A PENREGISTER/fRAP AND TRACE DEVICEON AN ELECTRONIC MAIL ACCOUNT
IN THE UNITED STATES DISTRICT COURT FOR THEEASTERN DISTRlCT OF VIRGINIA ~s-nn-nfL--;::fE:-----
Alexandria DivisionAUG ~ ),,"t} _,; .J
-2-
Alexandria, VirginiaAugust!) )2013
&~c,.. ~q -::zf:~CLAUDE M. HiLTONUNITED STATES DISTRlCT .J1.JDGE
remain under seal until further order of this Court.
It is further ORDERED that the government's motion for sanctions and this Order shall
compliance; and
dollars ($5,000.00) shall be imposed on Lavabit LLC and Mr. Levison for each day of non-
format by noon (CDT) each day thereafter beginning August 6,2013, a fine of five thousand
EXHIBIT 22
1
LAVABIT LLCLADAR LEVISONBy Counsel
J1 sc R. Birrnall, VSB# 79292~'.vonley& Binnall, PLLC1'6387 Main Street, Suite 201Fairfax, Virginia 22030(703) 229-0335 - Telephone(703) 537-0780 - [email protected] for Lavabit LLC
on August 1,2013 and August 5,2013.
Court of Appeals for the Fourth Circuit from the Orders of this Court entered
("Mr. Levison") in the above named case, hereby appeal to the United States
Notice is hereby given that Lavabit LLC e'Lavabit") and Mr. Ladar Levison
NOTICE OF APPEAL
IN TH]~ MA'1''TEROF THE SEARCHAND SEIZURE OF INFORMATIONASSOCIATED WITH No. 1:13SW522
TISSTORED AND ATPREMISES CONTROLLED BYLAVABITLLC
rN THE MATTER OF THE FILED UNDER SEALAPPLICATION OF THE UNITEDSTATES AUTHORIZING THE USEOF A PEN REGISTER/TRAP No.1: 13EC297AND TRACE DEVICE ON ANELECTRONIC MAIL ACCOUNT
IN THE UNITED STATES DISTRICT COURT FOR THEEASTERN DISTRICT OF VIRGINIA
Alexandria Division
2
States Attorney's OfficeEastern District ofVirginia2100 .Jamieson Avenue
I certify that on this 15th day ofAugust, 2013, this Notice of Appeal wasemailed and mailed to the person at the addresses listed below:
.Certificate of Service
1
Jef e R. B~ I, VSB#79292Bf riley & Bmnall, PLLC10387 Main Street, Suite 201Fairfax, Virginia 22030(703) 229-0335 - Telephone(703) 537-0780 - [email protected] for Lauabii LLC
LAVABIT LLCLADAR LEVISONBy Counsel
on August 1,2013 and August 5,2013.
Court of Appeals for the Fourth Circuit from the Orders of this Court entered
("Mr. Levison") in the above named case, hereby appeal to the United States
Notice is hereby given that Lavabit LLC ("Lavabit»)and Mr. Ladar Levison
NOTICE OF APPEAL
FILED UNDER SEAL
No. 13-1In re Grand Jury
IN THE UNITED STATES DISTRICT COURT FOR THEEASTERN DISTRICT OF VIRGINIA
Alexandria Division
2
• • •• .t. ~
Eastern District of Virginia2100 Jamieson Avenue
I certify that on this 15th day of August, 2013, this Notice of Appeal wasemailed and mailed to the person at the addresses listed below:
Certificate of Service
EXHIBIT 23
J
LAVABIT LLCLADAR LEVISONBy Counsel
J . e R. Binnallonley & Binfiall, PLLC
;{ 0387 Main Street, Suite 201Fairfax, Virginia 22030(703) 229-0335 - Telephone(703) 537-0780 - [email protected] for Lauabit LLC
on August 1, 2013 and,August 5,2013.
Court of Appeals for the Fourth Circuit from the Orders of this Court entered
("Mr. Levison") in the above named case, hereby appeal to the United States
Notice is hereby given that Lavabit LLC ("Lavabit") and Mr. Ladar Levison
NOTICE OF APPEAL
No. 1:13SW522
FILED UNDER SEAL
:T ISSTORED CONTROLLED ATPREMISES CONTROLLED BYLAVABITLLC
IN THE MATTER OF THE SEARCHAND SEIZURE OF' INFORMATION
IN THE fVlATTER OF THEAPPLICATION OF THE UNITEDSTATES AUTHORIZING THE USEOF A PEN REGISTER/TRAPAND TRACE DEVICE ON ANELECTRONIC MAIL ACCOUNT
IN THE UNITED STATES DISTRICT COURT FOR THEEASTERN DISTRICT OF VIRGINIA
Alexandria Division
2
United States Attorney's OfficeEastern District of Virginia2100 Jamieson AvenueAlexandria VA
I certify that on VTIs 16th day of August, 2013., this Notice of Appeal wasemailed and mailed to the person at the addresses listed below:
Certificate of Service