Professional Documents
Culture Documents
v
Case No. tfUf- fl;
DAVIDD. BLASCZAK
Defendan*
CRIMINAL COMPLAINT
I NI o o t Sta
Security. Criminal Investigations Unit. the complainant in this sass, state that ttre following is true to the best of
my knowledge and belief:
On or about and in between Sqtember 1. 2015 through the PRESENT, in the Westem District of New York, the
defendant DAVID D. BLAsczAK violated t8 U.S.C. 0$ 22524a)Q\(N & 2252A(a)(.5)(B\, offenses described as
follows:
the defendant lnowingly received cbild pomography that has been mailed or, using any means or facility of interstate
or foreign commerce, been shipped or transported in or affecting interstate or fore1gn, commerce by any means,
including by computer in vioiation of Title 18, United States Code, Section 2252A(a[2)(A); and posession of cbild
pomography, in violation of Title 18, United States Code, Section 2252A(a)(5)(B).
Conplaiflarx s sigiatur
and tile
Sworn to before me a:rd signed in my presence.
STATEOFNEWYORK )
COUNTYOFMONROE ) SS:
CITYOFROCIIESTER )
Agent, I am a federal law eoforcement officer within the meaning ofRule 41(a) of the Federal
Rules of criminal Procedure, that is, an officer of the united states who is empowered by law
to conduct investigations of, and to make arrests for, federal criminal otrenses.
distn"bution and possession of child pomography, in violation of ritle 18, united States code,
section 2251(a), section 2252A(a)(2)(A) and ritle 18, united srates cotte, section
22524(a)(fl@)- I have received specializetl training in the area of chiltl pomography antl
child erploitation investigations, and I have had the opportunity to obserye and review
numerous images and videos of child pomography, as defined in Title 19, united states code,
Section 2256.
3. This affidavit is submitted for the limited purpose of establishing probable cause
to believe that DAVID D. BLAsczAK, did tnowingly receive and distribute cbild
pomogaphy that had been transported in and atrecting inte$tate or foreign commerce by
computer, in violation of Title 18, United States Code, Section 2252A(a)Q)(|t), and did
knowingly possess and access with intent to view child pornography that had been transported
in ald affecting interstate e1 f6lgign commerce by computer, in violation of Title 18, Unit€d
4. The facs set forth in this affidavit are bised upon my personal observations,
m] taining and experience, and information obtained from various law enforcement
personnel and witnesses. Because this affidaYit is submitted for the limited purpose of
sstaflishing probable cause to support a crimfual complaing it does not include each and
protected, fee-based "Website M"l after a consensual interview with a suspect in a child
exploitation investigation ("S1"). The interview resulted in HSI agenr assuming Sl's online
i<leutity on Website M, which is a closed site that can oily be accessed by members who were
provftled login information by Website M.2 HSI Phoenix SAs determineal that Website M
I The adual name of Website M is known to law enforcement' However, the investigation
into the users of Website M remains ongoing, and the disclozure of the name of W.ebsite M would
potetrtially alert their member to the fact that law enforcement officers are investigatiry Website M.
Fublic disclosure of that fact is likely to provoke memberc to nodry ottrer members of the
investigation, flee, andlor destroy evidence. Accordingly, to preserve the mnfidentiality and
integrity of the ongoing investigation, the actual names and other identifuing detafu of Website M
are not disclosed in this affidavit.
2
SI provided SAs rvi1tr ftg URL link to Website M and S 1 's loein information to Website M
but 51 has not provided sufficient information to law enforcement to mderstand how 51 originally
obtained the URL or.login information for Website M.
2
6. Results from the preliminary investigation indicatetl that Website M was beiag
hosted on a server physically located in India, and the website claimed to offer 600,000 images
antl 400 hours ofvitleo,'all ofwhich could be tlownlo aded for a fee as compressed, enaypted
files (.RAR files). Website M typically chargetl $89.99 USD for each .RAR file. Once
tlownloaded, the user could "un-compress" ttre .RAR file to reveal multiple imaBe atd/ or
video flles. It appeared to HSI Phoenix SA Nicole Rye that most of the .RAR files contain
between 500 and 2,000 image ard/ or ideo files. Law enforcement agents who visited
Website M estimated that many of the images and videos advertised on the website depict
pre-pubescent male and female minors engaged in sexual activity with aduls aadlor posed
images/videos contained in the .RAR file prior to purchasing the .RAR file. Ovtr the course
of their investigation, which has involved previewing and tlownloading multiple .RAR files,
l,aw enforcement has found that the "samfle" images/vitleo screenshots SAs previewed
always corresponded to the un-compressed image aud video files contained in the
8. After selecting an encrypted .RAR file, the member pays for ir password by
entering in credit card information. Website M tlen causes an email to be sent to the member
with the encryption password for the .RAR file. The member must etrter that password to
9. I have been informed by SA Rye thag as a result ofthe interview with Sl, law
10. For example, itAprt1201.4, SAs (posing as 51) successfully downloadetl .RAR
files from Website M. SAs reviewed the un+ompressed image files and, based upon an
analysis ofhash values, law enforcement determined that the purchased files included video
and image files from what law enforcement refer to as the "Jenny" series . The United States-
based National Center for Missirg and Elryloited Chiltlren has identified and verified that the
images from the "Jenny" series images depict a pre-pubescent -inor child who appears to be
less than ten years of age. Purchased files included the following video and image files of
"Jenny",
a) " 180-2.AYI 9Yo Jenny licked by tlog. lfmin./q{ft 5ssad. " The screenshot for
this video depicts a nude, blinalfolded, pre-pubescent female who appears to be
less than tetr years of age lying on her back while a dog licts her genitals; and
b) Over twenty pictures from the "Jenny" series including an image of the same
pre-pubescenq nude, female performing fellatio on a dog.
purchased a .RAR file from Website M titled "SIBERIAN MOUSE #36." The un-
compressed fiIes contained in the .RAR file depicted what appeared to be minors engaged in
sexually explicit acts. When the SA purchased the SIBERIAN MOUSE #36" file, the SA
received a confrmation email from an email address from a U.S. payment processor,
4
this affidavit due to the ongoing investigation of Website M and the PAYMENT
PROCESSOR.
12. According to SA Rye, IISI Phoenix SAs itritiated an investigation into the thk
was identified as a paymmt processor a.rrd online business management tool used by Website
M.
13. On July 31, 2017 , a Federal Magistrate for the District of Arizona siped a
search warrant for the electronic documetrts in the possession of the PAYMENT
PROCESSOR related to their business transactions with and on behalf of Website M.
spreadsheets in compliance with the search wa:rant. One of the spreadsheets listed dl the
transactions that had been processed by the PAYMENT PROCESSOR ou behalf of Website
and identified inrlividuals who made multiple purchases fromWebsite M. The PAYMENT
ten purchases ftom Website M betwem Sqtember 2015 arLd Aprl2017. According to the
PAYMENT PROCESSOR records, the email address to which it sent the auto-generated
blasczakd@email.com.
5
16. In response to a summons, PayPal Holdings, Inc. provided the following
generated the following fist of BLASCZAK's purchases made via the PAYMENT
PROCESSOR from Website M along with identi&ing information linked to each purchase:
Filst Iast
Date Title Name Name Email Phone Region Postal
2/77 /2017 P}IP SCRIPT 347 David Blasczak blasczakd@mail.com 3154813450 NY 14513
PROCESSOR, an IISI Phoenix SA, in an rmdercover capacity, viewed "samples" fiom each
file titled in BLASCZAK's purchase records ftom Website M. The previews were recorded
6
.l
,i
using sqeen capture softwale available to law enforcement. I have reviewed pfeviews from
some of the files referenced in the table above, which BLASCZAK downloaded. Based on
my review they contain ciildpomography as defined by Title 18, United States Code, Section
22s6(8).
20. Specifically, on April 11,20L7, BLASCZAK pwclased a .RAR file with the
billing code "PHP SCRIPT 412. " SAs located a .RAR file on Website M titled "HM YIDEO
ARCIIM 412." When SAs dicked on rhis .RAR file on Website M, the website provided
the foltowing prompt at the bottom of the webpage "BIIY NOW PASSWORD FOR HM
VIDEO ARCHM" #412;, Nbet SAs clicked on this prompt, the webpage displayed an
option to buy "PHP SCRIPT 472" with an "Tmmediate License Code sent by Email. I
reviewed the screen capture of the "samples" viewed from PHP SCRIPT 412 fite. Two of the
a) The 6rst image depicts a pre-pubescent, Caucasian minor female who appears to be
less than ten years ofage sitting on a couch and wearitrg what appears to be a bathrobe.
The child's right hand is touching her genitals and the focus of the picture is on her
genitals and chest.
b) The second image depice a pre-pubesceot female Caucasian cbild who appears to be
less than 8 years of age. There is an adult male penis inserted into her mouth.
21. In addition, on April 10,2017 BLASCZAK purctrased a .RAR file with the
billingcode"AJAXSCRIPT2T." SAslocateda.RARfileonWebsiteMtitled"NUPHoTo
ARCHIVE 27, Pre-Tea.Hardcore #8. 2020 images." When SAs clicked on this .fu{R file
The image files are not associated with individual file names because they were previewed
3
as "samples." If law en-firrcement had downloaded the .RAR file, the un-compressed files would
contain individual file names. Law enforcement elected not to dowoloatl all of the .RAR files
purchased by BLASCZAK because law enforcement was concerned ttrat such a large volume of
pur&ases would be suspicious to Website M and may cause Website M to terminate S I's
meobership.
7
on Website M the webpage displayed an option to buy "AJAX SCRIPT 27" wifr an
"Immediate License Code sent by Email. " I rwiewed the screen capture of the "3amples"
viewed from AJAX SCRIPT 27 file. Two of the image files below:
a) The first image depicts a pre-pubescent, Caucasian minol who appears to be less than
ten years of age sitting thigh to thigh with an adult male. The genital area ofthe child
. is touching the adult male. The minor child is holding the adult male's penis in the
child's hand.
b) The second image depicts a Caucasian female who appears to be less than ten years of
age sitting on her lnees on top of a blanket. The lowerbody of an adult male is visible
and he appears to be standing ovff the female chiltl. The adult male's penis is inserted
into the child's mouth.
rlisguise the contents of the file for anyone with access 1s ttrs Silting recorils, zuch as. the
payment processor. As indicated in the &art above, all purchases appear to be "script." The
names of the "script" are the s4me as legitimate "script" thaf computr programmers utilize
such as JAVA. $Iebsite M registeretl their business with the PAYMENT PROCESSOR as
"The ScripB."
PROCESSOR and noted that BLASCZAK',s purchases listed his billing address as 113 Jason
a
Due to the close up nature of the photo it is trot possible to tell if the minor is male or
female
8
'l'6,2018 by Hon.
24. Based on the above, a seatch warrant was sigp.ed on Jar;uary
Jonatban Feldman, United States Magistrate Judge, authorizing a search of 113 Jason Dr.,
25. On January 18, 2018, Agents fromHSI, accompanied by memben ofthe New
York State Police, executed the above-described search warrant at 113 Jason Drive, the home
ofBLASCZAK. Upon executing the warranq Agents locatedseveral digital devices including
a laptop, a digital camera, multiple SD cartls, multiple thumb drives, and 2 sandisk memory
sticls. One of the tlevices is an "Tnfinitive" & ggabyte USB thumb drive, serial number
BN1606255178, found in a brief case near the ftont entranceway of the residence. An HSI
Computer Forensic Agent (CFA), previewed the contents of the thumb drive on scene and
minors. At the timc of rhis writirlg, the CFA.already discovered approximately 10 gigabytes
of files on the subject thumb drive containing suspected child pomography. I have describetl
a. Image file located in "folder 0I," jpg. fr7e "2," creatcd9 / 6 / lT,wbich dqias
a prqrubescent female wifl her legs spread, inserting her fingers into ha vagina;
c. Vitleo file located in "folder 362 id," ai fiTe "362-7 ," created 2/12/L7,
which depics an adult male performing oral sex on a prepubescent female. The female
appears to be approximately 3 years of age and the males mouth can be seen in contact
qrith ths child'5 yagina.
9
26. .Lgeats estimate &at they bave dready discovered in excess of 1,000 images
and multiple videos of child pomography on the subject thumb drive. The thumb drive and
other digital devices are currently being tralsported to HSI Buffalo for a frrll forensic review.
27 . BLASCZAK was present during the execution of the search warra:rt aad was
interviewed by HSI sAs Justin Bumham and Nicole Rye. The interyiew took place in SA
Burnham's vehicle outside .of the resifunce. During that interview, BLASCZAK initially
denied having any images or videos of child pomography. He then admitted tO being the sole
owner and user of the email account and credit card associated with receipt of clild
BLASCZAK aclnowledgetl that he owned a tlumb drive that cotrtaitretl images and videos
of chiltl pornography. He then directed Agents to the brief case and thumb drive described
above. BLASCZAK admitted tlat he pwchased chiltl pomography over the intemet, and
ttrat the website that he purchased child pomography from required that he create ar account
approximaely $100 per file that he purchased. It should be notetl that since Website M sold
compressed files, it is estimated that each "fi[e" BLASCZAK purchasetl for $100 would have
contained thousands of images andlor videos. BLASCZAK estimated that the children
d€picted in the child pomography that he purchased were between 5 and 10 years of age.
BLASCZAK specifically used the word "prryubescent," when asked the ages of the children
depicted in the videos and images he possessed. BLASCZAK told Agents that he possessed
more than 50 vitleos and huntlreds of images on the aforementioned thumb drive. When
asked what his favorite type of child pomography was, BLASCZAK stated "oral. "
10
28. As the conversation continued BLASCZAK adcnowledged tbat he works as a
physician and treats children at his office located at 4 West Genesee Steet, Clyde, NY , 14433 -
BLASCZAK denied ever abusing any of his child patients, but admitted to Agents that he
previously photographetl the genials of cbildren at his office. When asked, BLASCZAK
claimed that he was conducting his own intlepentlent research about child sex abuse and paid
told Agents that he toltl the parents tlat he was conducting medical research. BI-ASCZAK
admitte<l that he was not sanctioned by a hospital, university, medical organization or any
other professional metlical board to photograph cbildren's genitals. He daimed that he took
the images for "teactring purposes" but admitted that he kept the photograpts for himself for
his "own gratification." BLASCZAJ( saitt that the photograpts were taken years ago, but
that he maintained some photographs of children's genials in a 'teaching" file in his ofEce at
his office at 4 W'est Genesee Street, Clyde, NY, 14433. BLASCZAK providetl a written
consent to the seizure of these items. Based on his consent, the items have beeo seized and
engaging in sexually abusive behaviol againsl fuis (deceased) daughter's minor friends duu'ing
sleepovers. BLASCZAK stated that he touched his daughter's minor friends while they were
sleeping and photographed them. BLASCZAK admitted to being sexually aroused by his
daughter's frienrts. BLASCZAK also admittetl that he has mastwbated to the photographs
11
,"
30. Based on the foregoing, I respecffirlly submit that there is probable cause to
believe that DAVID D. BLASCZAK has violated Title 18, United States Code, Section
2252A(a)(2)(A), knowingly receiving child pornography that had been transported in and
atrecting interstate or foreign. commerce by computer; and Title 18, Udted States Code,
SeclJtot 2252A(a)(5XB), lnowingly possessing and accessing with intent to view child
pomography that had been transported in interstate or foreign
NI
Agent
Homeland Security Investigations
W. FELDMAN
States Magisftate Judge
12