O F F I C I A L U S E O N L Y DEPARTMENT OF HOMELAND SECURITY ICE REPORT OF INVESTIGATION CONTINUATION PAGE 2 CASE NUMBER **REDACTED (b)(2)High, (k)(2)** REPORT NUMBER: 020 DETAILS OF INVESTIGATION: On February 22, 2006, SA **REDACTED (b)(6), (b)(7)c, (k)(2)** received from the FBI a copy of the transcript for the interview of **REDACTED (b)(6), (b)(7)c, (k)(2)** (ELITE TORRENT (ET) username (**REDACTED (b)(6), (b)(7)c, (k)(2)**) , that took place on July 29, 2005. **REDACTED (b)(6), (b)(7)c, (k)(2)**, Born **REDACTED (b)(6), (b)(7)c, (k)(2)**, social security number **REDACTED (b)(6), (b)(7)c, (k)(2)**, whose residence at the time of the interview was. **REDACTED (b)(6), (b)(7)c, (k)(2)** was interviewed at the United States Attorneys (USAO) in Philadelphia, Pennsylvania with his attorney **REDACTED (b)(6), (b)(7)c, (k)(2)**, Assistant Federal Public Defender, (814) 455-**REDACTED (b)(6), (b)(7)c, (k)(2)**. Also present for the interview was the Department of Justice AUSA Andrea Sharrin, with the Computer Crime and Intellectual Property Section (CCIPS) . Participating via phone was Special Agent (SA) **REDACTED (b)(6), (b)(7)c, (k)(2)** and Special Agent (SA) **REDACTED (b)(6), (b)(7)c, (k)(2)**, from the Erie resident Agency office of the Federal Bureau of Investigation (FBI). After being advised of the nature of the proffer interview and reviewing the signed proffer letter, **REDACTED (b)(6), (b)(7)c, (k)(2)** was advised of the identities of the interviewing agents by AUSA Sharrin, **REDACTED (b)(6), (b)(7)c, (k)(2)** provided the following information: **REDACTED (b)(6), (b)(7)c, (k)(2)** described that he utilized the program FlashFXP to obtain pirated content from other ELITE TORRENT (ET) members, specifically **REDACTED (b)(6), (b)(7)c, (k)(2)** and **REDACTED (b)(6), (b)(7)c, (k)(2)**. **REDACTED (b)(6), (b)(7)c, (k)(2)** believed **REDACTED (b)(6), (b)(7)c, (k)(2)** to live in **REDACTED (b)(6), (b)(7)c, (k)(2)** and work at **REDACTED (b)(6), (b)(7)c, (k)(2)** **REDACTED (b)(6), (b)(7)c, (k)(2)** believed **REDACTED (b)(6), (b)(7)c, (k)(2)** to reside in **REDACTED (b)(6), (b)(7)c, (k)(2)** and went by the nic **REDACTED (b)(6), (b)(7)c, (k)(2)** until he released Star Wars Episode III to torrents sites, then changed his name to **REDACTED (b)(6), (b)(7)c, (k)(2)**. **REDACTED (b)(6), (b)(7)c, (k)(2)** believed **REDACTED (b)(6), (b)(7)c, (k)(2)** worked for **REDACTED (b)(6), (b)(7)c, (k)(2)** and had visited Fused Network's website. **REDACTED (b)(6), (b)(7)c, (k)(2)** utilized MIRC to chat online with other ET members and was certain that the program logged every channel and instant message conversation. **REDACTED (b)(6), (b)(7)c, (k)(2)** started downloading pirated material from IRC users and continued until he heard about downloading torrents. He found the ET website, registered for access and began corresponding with a member named **REDACTED (b)(6), (b)(7)c, (k)(2)**. **REDACTED (b)(6), (b)(7)c, (k)(2)** liked **REDACTED (b)(6), (b)(7)c, (k)(2)** and promoted him to moderator after one month and then promoted him to administrator one month after that. **REDACTED (b)(6), (b)(7)c, (k)(2)** remembered that **REDACTED (b)(6), (b)(7)c, (k)(2)** liked him because he was in the chat rooms all of the time. **REDACTED (b)(6), (b)(7)c, (k)(2)** worked the third shift (overnight shift) and had time to talk in the chat rooms, check the comments in the forms and review the quality of the content. **REDACTED (b)(6), (b)(7)c, (k)(2)** spent most of his time checking the comments members made in the forums. O F F I C I A L U S E O N L Y THIS DOCUMENT IS LOANED TO YOU FR OFFICIAL USE ONLY AND REMAINS THE PROPERTY OF THE DEPARTMENT OF HOMELAND SECURITY, ICE. AND FURTHER REQUEST FOR DISCLOSURE OF THIS DOCUMENT OR INFORMATION CONTAINED HEREIN SHOULD BE REFERRED TO ICE HEADQUARTERS TOGETHER WITH A COPY OF THE DOCUMENT. ICE.000017.2011FOIA904