Appendix I
Appendix I
Appendix I
Exhibit Pages
Exhibit A- FBI Hare Affidavit Appx. 001-036
Exhibit B- Declaration of Matthew J. Desarno Appx. 037-057
Exhibit C- Order from United States v. Kareem.
2:15-CR-707 (B. Ariz.) ('Dkt. #469) .....Appx. 058-069
Exhibit D- Media Articles Appx. 070-105
CHAD READLER
Principal Deputy Assistant Attorney General
RUPERT M. MITSCI1
Assistant Director, Torts Branch
Civil Division
..i1.MacW*111iams
/s.1...P.h
PHILIP D. MACWILLIAMS
Trial Attorney
E-mail: phi Lmacwilliamsiusdo.go
U.S. Department of Justice
Civil Division. Torts Branch
1331 Pennsylvania Ave.. NW
Room #080N
Washington. DC 20004
Telephone: (202) 6164285
Facsimile: (202) 616-5200
CERTIFICATE OF SERVICE
I hereby certify that on January 11, 2018, 1 caused to be served upon the following
counsel a true and correct copy of the United States' Motion to Dismiss for Lack of Subject
Matter Jurisdiction or, In the Alternative, Failure to State a Claim, the Memorandum In Support,
and the Appendix via ECF filing:
Trenton Roberts
Roberts & Willie, PLLC
2000 S. Dairy Ashford, Suite 390
Houston, Texas 77077
Phone: (832) 328-7345
Email: trenton@robertsandwilije,com
Attorney for Plaintiff
Exhibit A
APP'X 001
Cas ~, j~*;
1 c9l6W)1 6 ae4of4rPa9elD 113
I, Shawn Scott Hare, being first duly sworn, hereby depose and state as follows:
1. 1 am a Special Agent with the Federal Bureau of Investigation (the "FBI"), having
officer of the United States within the meaning of Rule 41(a) of the Federal Rules of Criminal
Procedure. I am engaged in the enforcement of criminal laws and am within the category of
officers authorized by the Attorney General to request and execute arrest and search warrants.
overseas to commit violent jihad, as well as individuals involved in using the Internet and social
completed FBI administered counterterrorism classroom and online training, at the FBI
3. The facts in this affidavit come from my personal observations, my training and
49
experience, and information obtained from other agents and witnesses. This affidavit is intended
to show merely that there is sufficient probable cause to support the criminal complaint and does
not purport to set forth all of the knowledge of or investigation into this matter. Unless
specifically indicated otherwise, all conversations and statements described in this affidavit are
related in substance and in part only, in reliance on draft verbatim transcripts that have not yet
been finalized but I believe are accurate in their representation of the substance or the
conversations and statements. All dates are on or about the specified date
APP'X 002
Cas 1/ #gp1D 114
PIA
4. Based on my training and experience as a Special Agent with the FBI, as well as
the facts as set forth in this affidavit, there is probable cause to believe that between on or about
March 1,2015, and on or about May 31, 2015, Erick Jamal Hendricks conspired to provide
material support to a foreign terrorist organization, the Islamic State of Iraq and the Levant
(15117) in violation of Title 18, United States Code, Section 2339B(a)(1). Specifically,
U.S.C. § 2339(a), including personnel and services, to ISIL and has performed overt acts in the
Northern District of Ohio in furtherance of the conspiracy, including recruiting who were then
5. This Court is advised that there are items within the Probable Cause section of
this Affidavit that have been translated from Arabic into English In each instance, the
preliminary translations were completed by a qualified FBI Linguist for the purpose of
accurately representing the statements made by Hendricks. Moreover, for ease of review, the
translated material will be limited to that which is enclosed within brackets at the end of each
numbered paragraph. Where there are multiple instances of a particular term or phrase, Affiant
. PRORABLE ~COSE
to do so, shall be fined under this title or imprisoned... To violate this parati .ph, a person
must have knowledge that the organization is a designated terrorist organization (as defined in
2
APP'X 003
Cas 11 ageID 115
subsection (g)(6)), that the organization has engaged or engages in terrorist activity (as defined in
Section 212(a)(3)(B) of the Immigration and Nationality Act), or that the organization has
engaged or engages in terrorism (as defined in section 140(d)(2) of the Foreign Relations
7. On or about October 15, 2004, the United States Secretary of State designated al-
0
Qa"ida in Iraq ("AQV'), then known as Jam'at al Tawhid wa'aWihad, as a Foreign Terrorist
Organization ("FTU) under Section 219 of the Immigration and Nationality Act and as a
Specially Designated Global Terrorist under Section 1(b) of Executive Order 13224.
8. On or about May 15, 2014, the Secretary of State amended the designation of al-
Qa'ida in Iraq ('"AQ1") as an FF0 under Section 219 of the Immigration and Nationality Act and
as a Specially Designated Global Terrorist entity under Section 1(b) of Executive Order 13224 to
add the alias Islamic State of Iraq and the Levant ("ISIL") as its primary name. The Secretary
also added the following aliases to the ISIL listing: the Islamic State of Iraq and al-Sham
("ISIS"), the Islamic State of Iraq and Syria ("ISIS"), ad-l)awla al-Islamiyya Ii al-'Iraq wa-sh--
Sham, Daesh, Dawla al lslamiya, and Al-Fuiqan Establishment for Media Production. On
September 21, 2015, the Secretary added the following aliases to the ISIL listing Islamic State,
ISIL, and ISIS. Although the group has never called itself"Al-Qaeda in Iraq," this name ha
frequently been used to describe it through its history. To date, ISIL remains a designated FTO.
In an audio recording publicly released on or about June 29, 2014, ISIL announced a formal
APP'X 004
1/M4§/16P# agq lD 116
9. Beginning in 2014, using social media, ISIL has called for attacks against citizens
civilian and military of countries participating in the United States led coalition against ISIL.
For instance, on September 21, 2014, ISIL released a speech of Abu Muhammad Al-Adnani, a
senior leader and official spokesman of ISIL. In this speech, entitled, "Indeed Your Lord is Ever
Watchful," AlAdnani calls on Muslims who support ISIL from around the world to "defend the
Islamic State" and to "rise and defend your state from your place where you may be." More
recently, using social media, ISIL has been encouraging individuals to kill specific persons
1" was arrested in by the Federal Bureau of Investigation (hereafter referred to as the "FBI") in
the Northern District of Ohio on charges relating to attempting to provide material support to a
distribution.' The charges against CW.l related to CW-l's attempt to support ISIL by producing
propaganda videos to support ISIL efforts to recruit new members. CW1 was arrested while
completing the purchase of an AK-47 assault rifle and ammunition from an undercover law
enforcement officer. CW1 also pledged his allegiance to ISIL in social media, frequently made
comments indicating his support for ISIL in social media, and made statements expressing an
'CWl eventually pled guilty to Attempting to Provide Material Support to a Designated Terrorist Organization and
two counts of being a Felon in Possession of a Firearm.
APP'X 005
Case1Qvipp Oj iIç91/ 8 34RID 117
cti999f 49t
11. Agents learned through the investigation of CW1 that Hendricks had contacted
CW4 to recruit him in the spring of 2015. CW-1 is a resident of the Northern District of Ohio,
and was physically located in the Northern District of Ohio during the time that Hendricks
recruited CW1
12. Immediately after his arrest, FBI agents interviewed CW1.2 During that
interview, CW.1 was asked about other ISIL supporters with whom CW.1 had communicated
that expressed any interest in committing attacks. Specifically, CWl was asked about the May
FBI: Yeah, how about, uh, the stuff that happened in Garland? Anybody
talking about that?
CW1: Oh, yeah, Pm sorry, yes, ok. Garland, Texas. Fuck. I didn't know about
Garland before it happened but a brother had contacted me. The one
brother from [Social Media Application #41. 1 think I met him. I don't.
His name on [Social Media Application 114] was Abu Barb. I had only
talked to him twice.
When asked again for the individual's name, CWl repeated, "Abu Barb."
13. CW. 1 provided more details during this initial interview about his
communications with "Abu Barb," including that "Abu Barb" said he was in Dallas and that the
"Islamic State had brothers in Mexico," CW1 also explained, "He (Abu Barb] said you know,
we need people, you know, we need to meet, try, you know what I mean? Well, he said he need
brothers upon the same thought pattern, right?" CW1 also said that he had told "Abu Barb"
2CW.l has an extensive criminal history in addition to the federal convictions, including at Least four felony
convictions for drug trafficking or abuse and at Least three felony convictions for tile 1 weapons possession
APP'X 006
(T(,jeagF ID 118
where he was located: "I think I said, uh first, I think I said Indiana one time or Ohio one time or
some other stuff You know what I mean? Sometimes I say Cleveland but..." Regarding the
Garland attack again, CW4 explained, "He didn't say anything about Garland, Texas though he
said he was in Texas. He said we have people in Mexico." CWl said that "Mu Herb" told him
he would contact him again in two to th= months, and that they would have to meet face to
14. CWl further explained why "Abu Herb" had contacted him: "Uli, he said,!
believe that he said he found me from when I was on [Social Media Application #1]. When I
was on [Social Media Application #iJ and he private messaged me and he said, hey akhi
[brother] I been looking for you cuz I see. I would go on (Social Media Application #11 and say
crazy stult Americans fight jihad and Muslims and all this other stuff; right? And I was trying
15. After the arrest and initial interview of CWl, agents obtained a search warrant in
the Northern District of Ohio for the contents of CW1 's Social Media Application #1 account
The results showed that CW4 's Social Media Application #1 account had been contacted on or
an account name within Social Media Application #4 that would not attract the attention of law
provided "shamjeascn" with a newly created Social Media Application #4 account name that
referred to CWl 's former legal name and did not contain any Islamic references as CW-1 ha-ad
-d-
been instructed. User walked CWI through the process of signing into Social
6
APP'X 007
Case2• '~42~~-Vv F edr-01/1 PaceID 119
Media Application #4 and finding "@sharn reason's" account on Social Media Application #4.
The communication between CWl and "@sham reason" on Social Media Application ill then
stopped for a period of approximately two hours and eleven minutes, before resuming.
17. When the conversation between CWl and Vsham....reasore' resumed on Social
Media Application #1, it was apparent that they had been communicating in private on Social
Medial Application #4, as directed by "®sham reason." In the renewed conversation on Social
Media Application. #1, "@sham reason" wrote, "As I stated, I'm glad that we spoke privately for
the interview for my article... Journalists and bloggers are under scrutiny too.. Even though
we don't break any laws.,, Thank you again?' in respo c, CW4 provided "@5Mm reason"
With a greeting and then stated,"... no thank you for the opportunity."
18. During a later interview with law enforcement described in detail below, CWl
stated to FBI agents that CW4 and Hendricks used this exchange about an interview for an
article as a ruse in an attempt to avoid detection from law enforcement. According to CWl,
there was no interview for an article. CW..i identified this "change on Social Media
Application #1 as the exchange in which he met "Abu Barb," as he had described in his initial
interview. According to CW.1, "Abu Har&' was the same person who used the
19. After the initial interview of CWl, and the review of the material obtained by the
search warrant on CWl 's Social Media Application ifl account, CW4 was interviewed multiple
APP'X 008
Case ,A~-TcI
v.,R21 it 4 o,;719RagplD 120
times in the presence of his counsel.' During these interviews, CW4 provided further
20. According to CW-1, within Social Media Applications #3 and/or #4, Hendricks
identified himself as "Abu Harb," "Abu Harb Now," or a close variation thereof. Hendricks
claimed that he was located in Texas and was a "recruiter?' Based upon online content posted by
CW'1, online content posted by Hendricks, and the emergence of ISIL during this time period,
CWl believed that Hendricks was a recruiter for ISIL based in the United States.
21. Hendricks informed CWl that he "needed people" and that he wanted to meet
CW4 in. person. CW4 provided Hendricks with CW4's location, after which Hendricks stated
that he 2was able to travel and would meet with CW1 in a couple months. Hendricks also stated
that there were several "brothers" located in Texas and Mexico, that he was attempting to "get
brothers to meet face to face," and that he wanted "to get brothers to train together." Thereafter,
Hendricks inquired if CWl was willing to travel to Texas, to which CW4 responded that CW1
22. Hendricks asked if CW1 owned., or had access to, weapons and had any military
trainig. CW4 informed Hendricks that CW4 did not have any niilitary training, but did own a
pistol. In response, Hendricks responded that "everyone has to get together," "we need more than
you," and inquired if CW1 had any "brothers" located near him. Based on their
At the time of the interviews. CWl had not entered into a plea agreement with the government; however, these
interviews were conducted as part of the negotiations over the resolution of the charges against CWi. CW4
eventually entered into a plea agreement with the government that contained a cooperation agreement in which the
government agreed to move for a reduced sentence for CWl at sentencing.
APP'X 009
11
communications up until that point, CWl understood these statements by Hendricks to mean
that he was recruiting individuals to train together for the purpose of conducting a terrorist attack
23. CVJ.1 stated that Hendricks tested his religious knowledge and commitment to
jihad Hendricks also inquired about CW4's willingness to commit 'jihad," to die as a
"martyr," and CW4 's desire to enter '4jannah." (The term 'lannab" translates to "'paradise."'
Again, based upon the context of their conversations, CWl believed Hendricks asked these
questions to determine if CW-1 was suitable for recruitment to participate in a terrorist attack in
24. CW-1 stated that he was directed by Hendricks to provide information pertaining
Hendricks with the social media profile information for an individual CWI was communicating
with online. Unbeknownst to CWl, that individual was a confidential informant, hereafter
"CHS214" whom CW-1 believed to be an online ISIL sympathizer located in Maryland. CW4
noted that Hendricks instructed CWl not to provide Hendricks' contact information to CHS2
or anyone else,
25. CW-1 stated to the FBI that CW4 believed that Hendricks and the "brothers
located in Texas and Mexico" Hendricks told CW-I about may have been responsible for the
Garland, Texas attack on or about May 3, 2015. As a result, because CW4 had communicated
4CHS-2 is a paid confidential informant, having worked with the FBI for four (4) years. Al! information provided
by CHS 2 to date has been deemed to be truthful and accurate, with no known reliability issues CHS-2 has no
known criminal history. This notwithstandmg, the information contained within this Affidavit from the activities of
CHS-2 has been corroborated by the FBI.
9
APP'X 010
cascuW-.i 9k" ro (itt n 91—F 1
*4 6!I St13% ot
le
7 JD 122
with Hendricks about "jihad" and then provided Hendricks with information about CHS2 (as a
potential recruit), CWl decided to stay away from social media for a period following the attack
above, the records obtained pursuant to the search warrant on CW4 's Social Media
Application
#1 account showed the initial communications in which Hendricks made contact with CWl and
directed him to communicate using another social media application. These records then show a
gap in time in which it appears that CW-1 and Hendricks were communicating on the more
communications with Hendricks. On or about April 6, 2015, CW-1 contacted CHS2 within
Social Media Application #3 and stated that CWl had been communicating with an ISIL
member in Texas. CW.-1 told CHS..2, "Now Ls. Is here." CWl further explained, "In Texas I
believe." CW4 informed CHS2 that this individual directed CW4 to "put bros in contact with
him." CW-i also confirmed that this "brother" initially contacted him on Social Media
Application fl, asked CW-1 to travel, emphasized the importance of meeting in person, and
reminded CW4 that "the punishment for telling on a muslim is death." CW..I also said that after
learning that CW-1 sold marijuana, this individual advised that a "Mujahid doesn't do this."
CW1 told CHS2 that CWl was going to do what the individual told him to do
10
APP'X 011
Cas3bJ-tt. iØ91 IUP.fjO 1 fa9D 123
28. During this conversation CWl also explained that there should be no talking on
less secure social media applications such as Social Media Application #1. Prior to this
communication,. CWl and CHS2 exclusively used other social media applications to Include
Social Media Application #1. From this date forward after this communication, CWl and CHS
2 rarely used any social media applications other than Social Media Application #3. These
communications with CHS2 were consistent with CW4's descriptions of his co ricatlo
with Hendricks, specifically that Hendricks had requested the contact information for others who
could be recruited; that CW4 pro CHS2's contact information to Hendricks in response;
that Hendricks had asked CWl to travel and to meet him; that Hendricks had directed the use of
more secure social media applications to communicate; and that Hendricks had admonished CW
29. CW4 's social media communications also corroborate the statement that CW-1
was worried about law enforcement and decided to stay away from social media following the
Garland, Texas attack because of concerns about communicating with someone (Hendricks) who
CW4 thought was involved in that attack. On or about May 9, 2015, CW1 sent CHS2 a
ressage through Social Media Application #3. In his :e., CW4 stated, "I'll be offline for
a couple months ahk" (The term "ahk" is a shortened version of"ahki," which translates to
"brother.")
also corroborate CWl 'a description of his communications with Hendricks. As described
below, the questions asked and directions given by Hendricks when communicating with CW.4
were similar to those described in Hendricks' communications with UCE4. Further, during his
11
APP'X 012
Case L7-c : .0if I P11 6 D 124
communications with UC&i on or about April 25, 2015, Hendricks referred to an "Ohio
brother" he had been speaking to who had a "weed problem he was trying to kick?' Based on
CWl's location in Ohio and statement that Hendricks had admonished CW4 for selling
marijuana, your Aftiant believes that Hendricks was referring to CW4 in this communication.
31. After analyzing the above referenced information provided by CWi, FBI agents
confirmed that CW-i had been in communications with Hendricks during approximately the
same time period that Hendricks was in communication with an undercover FBI employee
(UCE-1) and several confidential human sources (CHS-1. CHS3, and CHS4), as described
below. The UCE1 and these CUSs had also been communicating with Hendricks regarding the
recruitment of members for a cell to support ISIL in the United States. During the majority of
the communications between UCE4 and Hendricks, UCE4 was physically located within the
Northern District of Ohio. During these communications, Hendricks frequently changed the user
names of the accounts he used to communicate as a security precaution. However, based on the
continuity of the conversations, the context of the communications in relationship to other known
communications of Hendricks, similarities in the usernames, and the use of a code developed
between Hendricks and UCE-1 to ident ch other, all of the communications below were
12
APP'X 013
D 125
32. On or about March 19, 2015, Hendricks and an identified individual, hereinafter
"Individual 1," met with CHS4' and another identified individual, hereinafter "Individual 2," in
Baltimore, Maryland During this meeting, Hendricks, known as "Mustafa" to CHS-1, directed
the attendees to remove their cell phone batteries. According to CHS1, Hendricks claimed to
have land in Arkansas where he planned to "get off the grid" and prepare for an eventual violent
confrontation with law enforcement. CHSI stated Hendricks and his wife directed CHS4 to
recruit like-minded individuals for the group. During this meeting, Hendricks also requested that
CHS4 introduce him (Hendricks) online to the user of a Social Media Application #1 profile,
known to the FBI to be a member of ISIL located overseas! Based upon these interactions,
CHSI believed Hendricks was recruiting CHSi and others to organize on behalf of ISIL.
33. On or about March 24, 2015, UCl-1 initiated contact with Hendricks' Social
Media Application #3 account "shamreason" after observing that Hendricks' Social Media
Application #1 account @shamjeason* was in contact with another identified ISIL supporter.
During their initial communication, as with CW.1, Hendricks tested UCE4's religious
knowledge and requested UCE1's Social Media Application #1 account, so he could evaluate
'CHS-1 is a paid confidential Informant, having worked for the FBI for one and a half years. All information
provided by CH$4 to date has been deemed to be tnithfuL and accurate, with no known reliability issues. CHSI
does have a criminal history resulting from fraud/forgery related offenses. CHS-1 has not received any sentencing
benefits from the FBI resulting from bis!iier criminal activity. The information contained within this Affidavit from
the activities of CHSl was corroborated by the FBI.
'The Social Media Application #1 account of this individual is known by the FBI to have been referenced by Elton
Simpson, one otdie attackers killed while conducting the Garland, Texas attack on May 3, 2015
'This is the same Social Media Application #1 account, used by Hendricks, that conlBctcd CW.4 on March 25,
2015.
13
APP'X 014
Cae371 6 11 9U&71DF,,aq~1D 126
UCEl's credibility. Hendricks explained that his questioning of UCEl and review of his/her
UCE4 satisfied his (Hendricks') security concerns, UCE4 would be permitted to move to the
"next level."
34. On or about April 8, 2015, UCE4 was contacted by Social Media Application
Social Media Application #3 account "shamreason" on or about March 24, 2015, UCE4
determined that "tovethehaqq" and "shamreason" were used by the same person—Hendricks.
Hendricks and UCEl conducted a brief conversation, during which UCE-1 disclosed that he/she
had been a Muslim for "almost 2 years." Hendricks then contacted UCE1 using Social Media
to Social Media Application #2 due to privacy concerns, stating "There is an app called [Social
Media Application #2] that if you get the chance to research it... But you must get (Social
Media Application #21... Give me your (Social Media Application #2 user name)." Despite
this direction, Hendricks continued their communication within Social Media Application #3,
emphasizing to UCE-i the need for securit)9 and the need for UCE-1 to recruit additional men
and women. Hendricks explained that he and others have "land," they are "building" for the
'Hendricks repeatedly discussed the importance of living "off the grit" Hendricks defined 'off the grid" meaning
"your location and who you are unknown? He further defined "on the grid as providing personal information such
as "your legal name, legal address, bills, etc," Hendricks cautioned UCEl that if'he/she provided his/her personal
information and/or used "remote" devices, then "there is a high possible you're being monitored." Hendricks closed
by staling, "True anonymity is being off the grid?
14
APP'X 015
Case,4 tq lo§- ONR~IDPaq%ID 127
sake of the group and that he wanted to put UCE.1 in contact with a "brother" for UC&1 to
35. Also on April 8, 2015, Hendricks provided UCE4 with ideas to detect the
someone will meet you at a place... Survalence the area or spot to see if it's tampered or
tracked;" "Rent a storage. Plant cameras inside pretend there is some kind of sensitive thing in
there... Survalence the camera to see if it's tampered or you caught someone in there.,. If so,
then you're being watched and your is blown etc;" and "pretend to meet people and see who else
."
shows... This is cheaper lot.., Counter survalence
36. During this conversation on April 8, 2015, Hendricks made several statements to
UCE-I that indicated he was in possession of firearms. Hendricks stated, "1 keep my chopper
ready by my door." He stated, "I steep with my ak, wake with it and rub it once I return to it."
"Chopper" and "AK" are terms commonly used to refer to an AK-47 style rifle. In response,
UCE4 stated that there were better weapons available, to which Hendricks acknowledged,
"Yeah I know. The bullets are easy to buy." Hendricks also indicated that he avoids air travel
because he cannot bring his weapons onboard: "I never fly... Never... Can't bring my babies
and I'm never without them... If you know what I mean." As such, your Affiant believes that
Hendricks may in fact be in possession of an AK-47 and/or other weapons, for which he may
15
APP'X 016
Casj71cy pt~q IF~V, CP ( Raae 12 oL.107 PaelD 128
wurii, i ageD;:ii
37. Lastly, during this same conversation (on April 8, 2015), Hendricks directed
UCE-1 to contact a "brother" using Social Media Application #2. Hendricks then provided
38. During approximately the same period that Hendricks was beginning to
communicate with CW4 and UCE.l, he engaged in similar communications with CHS3.10
Beginning on or about April 1, 2015, Hendricks, using Social Media Application #3 account
"wilayahtx," communicated with CHS-3 via Social Media Application #3. During their initial
communications, Hendricks disclosed that his Social Media Application #1 account was
"®sham reason," and stated that CHS.3 could refer to him as "Abu harb." Over the course of
several communications, Hendricks cautioned CHS3 on the use of Social Media Application 43
due to privacy concerns and the popularity of the application. Hendricks directed CHS3 to use
Anonymizing Software Application #1" when accessing the Internet and Social Media
10 CHS.3 is a paid confidential informant, having worked with the FBI for four and a half years. All information
provided by CHS3 to date has been deemed to be truthful and accurate,, with no known reliability ISSUeS. CHS3
has no known criminal history. This notwithstanding, the information contained within this Affidavit from the
activities of CHS3 was corroborated by the FBI.
16
APP'X 017
Cas 13Qt! Pg 90PJ 7 1)PaqJD 129
~-3 7f 1 N pe
39. Hendricks also informed CHS3 that he recently conducted a meeting with others.
Additionally, as with UCEl and CW-1, Hendricks asked CHS3 several questions designed to
test his/her religious knowledge. Hendricks referred to these questions with CHS3 as "standard
verification questions." The questions focused on whether or not Ci1S3 was a member of law
40. Hendricks and CHS3 then continued their communications within Social Media
Application #2. During these communications, Hendricks instructed CHS3 to ensure CHS3's
account name was not similar to the Social Media Application #3 account, devoid oany
"Islamic"'2 references, and also instncted CHS3 not to use any "islamic" terms without
"splitting them." Specifically, Hendricks stated, "Make anotheronc and don't user your [Social
Application #3] name or anything Islamic," "Unplugyourself from the grid. That makes your
moves predictable," and "Brother don't use isla micterms with splitting them." Hendricks also
directed CHS3 to read an online manual which he described as "the moo ja hid guide 2015."
41. On or about April 8, 2015, Hendricks contacted CHS3 using Social Media
'2 Hendricks" direction to CHS3 was identical to that given to CWl, when on or about March 25,2015, Hendricks
instructed CWl to "Make up a new username (nothing islamic)... ," prior to commencing communications within
Social Media Application #4.
I)
Your Afliant believes that Hendricks was referring to a publication that was disseminated online entitled, "How to
Survive in the West: A Mujahid Guide (2015)." This publication was a 71' :e, unofficial ISIL supportercreated,
manual that provided guidance for "Muslims who are living in a majority non-Muslim land" that aimed to "teach
you how to be a sccrct Agent who lives a double life, something Muslims will have to do to survive in the coming
years." Topics in the manual included 'Hiding the Extremist Identity," "Internet Privacy,"'Bomb Making and
"Transporting Weapons," as well as survival techniques and how to evade arrest.
17
APP'X 018
gtJD 130
directed CHS3 to contact UCE4's Social Media Application I2 account. Hendricks directed
CHS3 to evaluate UCE-i for potential recruitment, stating, "Stand by for his user name. I also
want you to vet him with the same rules you learned from me. I think he is trustworthy enough
to introduce him to you?' Hendricks then provided CHS3 with specific guidance when
No personal details
-Don't agree to meet unless through me
don't tell your state unless through me
.1 assume all the risk
run NO DETAILS ABOUT IDENTITY OR ORGANIZATION EXCEPT
THROUGH
ME. Ok my dear brother?
This is the same guidance Hendricks gave to UC&4 that same day regarding communicating
with the brother with whom Hendricks was putting him in contact,
42. On or about April 12, 2015, Hendricks told UCEl that he needed him to
communicate with others, "There IS: a few brothers that I t to bring to your attention." When
asked by UCE4 if he was thinking tong term, Hendricks responded, "Yes long term. This is
what has been advised. UCEl questioned Hendricks about his purpose. Hendricks explained:
each body has a brain in order to operate the limbs. In order for the body to be
functional we need a strong brain. We are constructing the brain. In this land my
dear brother a brain is needed then the limbs grow. But all the ummah is one
fa.
body so in a way it doesn't fit be ultimately the brain is the kit la 14 Every
business needs a headquarters and outposts.
UCEi then asked Hendricks if they (Hendn"cks and UCE4) were making their ownbrain or if
they were connected to the ultimate braIn. Hendricks responded, "Ulti m ate brain brother lol."
01
kh in f* was an abbreviation (ror Ktilafh or the Caliphate) d Hendricks used to ISIL.
18
APPX 019
Casj71cy q.IFho
_ ~ 4 . C~P
I ~
i[6 PlV*7
ID 131
Based on Hendricks' frequent use of spaces- between letters in words that he thought would draw
law enforcement attention, a practice he advised UC&I and others to adopt, your Afliarit
believes that "kh la fa," is a coded reference to "khilafa," the Arabic word for caliphate, and
further a reference to ISIL. Followers of ISIL believe that ISIL has established an Islamic
caliphate and commonly refer to ISIL as the "caliphate" or "khilafa." Thus, Hendricks'
43. UCEl later questioned Hendricks about individuals being evaluated online for
recruitment into the group that were promoting ISIL or wanting to travel overseas to fight on
Jail is not an option for us. It's nothing but humiliation and it pleases the
enemies. As for the last concern HiJrah is a great deed. If that's what your heart
desires then I ask Allah to make you intentions noble. I've spoke to senior
brothers and the Naseehah [advice) is to remain here. Study the battle of the
trench when the man came to the prophet and became muslim. He said with us
you are one man but go and shake them from within,
44. DurIng the communications with Hendricks on or about April 12, 20151,
Hendricks also provided UCE..l with a user name for a Social Media Application flu account and
warned UC&l that the user was "the feds," and that UCEl should not follow the account.
Hendricks also directed UC&l to "[j]ust monitor it to not allow brothers to get entr app ed."
Hendricks then directed UCE4 to another online account. After telling UCEl that he could not
45. On or about April 16,2015, while using Social Media Application #2 account
"hereafter," Hendricks instructed UCEl to download a document entitled, "GPS for the
Ghuraba in the U.S." This document was a 19pagc instruction manual focused on
19
APP'X 020
Cas7- D 132
protocols for those planning to conduct attacks in the United States. The document also provided
ways to support the mujahideen, to include topics such as "Fight with your hands," "Fight with
your wealth," "Fight with your tongue," "Using your cell phone," and "Using your computer."
The document included a section entitled "Final Advice," which advocated that "brothers and
sisters" should not allow themselves to be imprisoned. This section further encouraged Muslims
to "stop going to jaiL.. willingly," to die as a "Shaheed (martyr)," to "Boobie trap your homes,"
to "lay in wait for them," and to "never leave your home without your AK-47 or M16." Lastly,
this section encouraged Muslims who were "in deep," to "martyr" themselves during routine
traffic stops conducted by law enforcement. The document was signed "Abu Ibrahim Al
AmerikL" Hendricks directed UCEi to first download, and then disseminate the document to a
46. Also, on or about April 16, 2015, Hendricks told UCE-1 that they needed "$$."
However, Hendricks further explained that they have a "solid budget for now." On or about
April 18, 2015, Hendricks told UCE-1 he wished UCE.4 could "assist on a $ level."
47. On or about April 18, 2015, Hendricks, while using Social Media Application #2
account "hidrngmynghts," also provided CHS415 with a link to the document "OPS for the
' CHS4 is a paid confidential informant, having worked with the FBI for four years. All infonnation provided by
CHS.4 to date has been deemed to be truthful and accurate, with no known reliability issues. CH84 has no known
criminal history. This notwithstanding, the information contained within this Affidavit from the activities of CHS4
has been corroborated by the FBI.
20
APP'X 021
Cas7yQ 7 D9ID
1
133
Ohura ' in the U.S." The document provided to CHS4 was identical to the document provided
48. On or about April 19, 2015, UCE4 and Hendricks again discussed whether one
should make "bijrah," or stay in the United States. After UCE..1 made a comment about leaving
the United States and that "hjrah" was dead, Hendricks responded, "}lij rah is not what senior
people requested me." UCEl further added, "Does the head give orders?" Hendricks
responded, "No. The conditions for a will ya h have to be in place. Only advice," and "The only
provide advice to wol yes. And connect pp1 (people) to form gro ups."
49. On or about April 21, 2015, Hendricks and UCEl :ain communicated regarding
the recruitment of individuals online. Hendricks directed UCE4 to communicate with an online
to
div idual in Canada. While UCE4 communicated with the person in Canada,
account of an in
Hendricks provided questions to ask. Hendricks :explalned to UCE1, "it's hard to sift through
brothers;" "Allah chooses only the few;" and "Everyday I do this day in and day out." Hendricks
and UCE1 also developed a code to verify their identities for future conversations.
50. On or about April 23, 2015, Hendricks, while using Social Media Application #2
account "accepted," contacted CHS4 and wrote that "accepted" was the former user of Social
Media Application #2 account "nowhaq?' Specifically, Hendricks stated, "This is your brother..
51. On or about April 24, 2015, Hendricks, while using Social Media Application #2
account "accepted," asked CHS4 about his/her profession, if CR54 had a criminal record or
disabilities, and if CHS4 could travel. Specifically, Hendricks asked, "When can u travel akh,"
"Brother what u do for work," "U know about hacking etc," "Mv the fed s ever visit or call u akh.
21
APP'X 022
Cas7y 0 4 8 pg ti.q -1i F1D 134
Or hv u ever been locked up," "Do you 1w any disabilities," and "1-h' u been securing your
communication akh." Additionally, Hendricks stated that he had "a few brothers" that he wanted
52. On or about May 1, 2015, Hendricks, while using Social Media Application #2
account "accepted," exchanged messages with CHS4 and discussed the two meeting in person
on or about May 2, 2015. On or about May 2, 2015, Hendricks and CHS-4 met in-person in the
vicinity of Baltimore, Maryland. 6 At the meeting, Hendricks identified himself as the individual
with whom CHS-.4 was communicating via Social Media Application #2 account "accepted."
Also present during the meeting was Individual 1, who is the former spouse of Hendricks, having
Hendricks provided CHS-4 with instructions on counter-surveillance measures and claimed that
be knew of these methods because he was the head of security for a company near the U.S.
Capitol." Hendricks admitted to CHS4 that he and his wife wrote a document entitled "OPS for
the Ghuraba in the U.S." Hendricks stated that his goal was to create a sleeper cell to be trained
and housed at a secure compound. According to Hendricks, his sleeper coils would be used to
conduct attacks in the United States. Hendricks mentioned that future targets would include
military members whose tion had been released by ISIL and the woman who organized
the "Draw Prophet Mohammad contest" Hendricks told CHS4 that he was currently
"This meeting was corroborated through physical surveillance and use of an audio recording device. However,
portions of the audio recording are inaudible.
APP'X 023
Case7 4 eüV;1G-iFiledcD14 6 PagO 2. cM joPagelD 135
spiritual guide. Hendricks also claimed to know a member of ISIL overseas. Hendricks also
54. Hendricks next claimed to have 10 members signed up in his group:, to include a
combination of males and females. Hendricks expressed a desire to conduct night missions to
obtain weapons from military depots and recruiting stations. Hendricks stated that he wanted to
build a secure compound for training, of the group and estimated that he needed $30,000 USD for
the compound. Hendricks also indicated the next step in his plan was to have four to five males
make ajibad video in the next few months. Hendricks stated that the video would be 10- 15
minutes in length, would display the ISIL flag, and depict individuals carrying weapons and
wearing masks with their voices disguised. The purpose of the video would be for recruitment
55. During the meeting between CHS4 and Hendricks, FBI surveillance observed a
Honda Odyssey van with South. Carolina license plates. According to the South Carolina
Department of Motor Vehicles, the vehicle was registered to Individual 1, Hendricks' former
spouse. h. .ediately following the meeting, FBI agents showed CHS4 a photograph of
Hendricks. CHS4 positively identified Hendricks as the individual that he/she met with
moments earlier.
56. On the same date, Hendricks, while using Social Media Application #2 account
"accepted," admitted to UCE4 that he th "our mutual brother from PA and he is the real
deal." Hendricks also told UCEl that he was in Baltimore. Your Affiant believes that the
icks
above mentioned "brother from PA" is CHS4, based upon the timing of Hendr '
23
APP'X 024
Ca cYi i1t:19 1FlJj Pa9ID 136
- 1
communication to UCE4 and meeting with CHS4 (who previously informed Hendricks that
and Nadir Hainid Soofi (hereinafter referred to as "Soofi"), who were inspired by 151, arrived
together at the Curtis Cuiwell Center in Garland, Texas for the purpose of conducting a terrorist
attack. The center was hosting an event entitled "The First Annual Muhammad Art Exhibit and
Contest." Also present at the exhibit was the organizer of the event, who was scheduled to
58. Simpson and Soofi arrived together in a vehicle, equipped with body armor and
assault style weapons. Simpson and Soofi drove their vehicle up to the center, exited, and began
shooting towards the entrance. A nearby security guard suffered minor injuries before the
Garland police retunied fire and killed both Simpson. and Soofi,
59. In the moments prior to the attack, Simpson posted a Social Media Application #1
message which read, "#texasattack: 'May Allah accept us as mujahideen.'" In his message,
Simpson also stated that he and Soofi had pledged their allegiance to "Amirul Mu'mineen,"
60. in the days following the attack, members of ISIL claimed responsibility for the
attempted attack. During a radio address., one ISIL member referred to Simpson and Soofi as
"brothers," and provided the following warning: "We say to the defenders of the cross, the U.S.,
24
APP'X 025
ut:!J1j1t Ip. 1il ;~,i'jo.V oFID 137
that future attacks are going to be harsher and worse. The Islamic State soldiers will inflic
on you Mnth the grace of God. The future is just around the corner."
posted a link to the "Draw the Prophet Muhammad Contest." The user of "®tawaakui" was later
identified as Simpson. On this same date, Hendricks contacted Simpson via Social Media
Application #1 and requested Simpson's Social Media Application #3 account. During this
62. The FBI has confirmed that Simpson was in contact with Hendricks via Social
Media Application #3 prior to the events in Garland, Texas. After the attack, on or about May 4,
2015, a federal search and seizure warrant was executed at the Phoenix, Arizona residence of
Simpson and Soofi. During the search, a cell phone was collected and subsequently examined
pursuant to the search warrant. The telephone number for the phone was linked to Simpson. A
review of the photographic images found in the phone revealed digital pictures taken of
Simpson, and including Social Media Application #3 account "UmmahOne," believed by the
'1 LJCE.I stated that Hendricks has made claims in the past that he was located in Montana.
The account name "tJmmahOne is substannaBy similar to those previously known to be used by Hendricks
Moreover, a review of communications betwccn this account and Simpson again revealed substantial similarities
between content discussed, to include UmmabOne's" statement that he resided in Montana and Simpson a
provision of his Social Media Application #3 account "JubaSO2l."
25
PP'X 026
tLq RON;.q71DP--JaqPJD 138
63. Also on or about April 23, 2015, Hendricks, using Social Media Application #2
account "accepted," directed UCE1 to contact "a good brother" because he wanted them to be
introduced to each other. Hendricks added, "I vouch for this brother. He is good and clean.
Just validate who I am and what we have been connecting brothers etc." Hendricks gave further
instruction to UCE-1, stating, "Don't ask him about details though." Hendricks next provided
UCElwith Social Media Application #3 account "jubal9ll," for UCEl to contact this
"brother." While still communicating with Hendricks on Social Media Application #2, UCE4
lubal9I L" Hendricks told UCE-1 that 'Juba l9ll" was simultaneously contacting him
64. During this same communication with UCE.l, Hendricks indicated that he might
"be driving out west to meet a few brothers." UCE-1 asked when Hendricks would be traveling
throu:s 'Ut the southwest so that they could meet. Hendricks responded that he was "trying to
65. Later on that day, UCE-1 contacted Social Media Application #3 account
"juba1911" (which was owned and operated by Simpson). During the conversation, "jubaI9ll"
claimed to have recently met Hendricks online and to have communicated with him a "few time
on [Social Media Application #1) and now on [Social Media Application #31." "jubal9l I"
disclosed to UCEl that he had been a Muslim for "11 yrs," to which UCEl responded that
conducted a forensic examination of Simpson's cellular phone that was found on scene immediately after
land, Texas attack This examination revealed that he purchased Social Media Application #3 and
dud it onto his phone on or about March 22,, 2015.
26
APP'X 027
* Ca ;. 91Fi piM6 9 9D ID 139
he/she had been a Muslim for "2 years." UCE1 told 'jubal9ll," "We've got a good mutual
brother and its worth keeping in touch. 4 ." jubal911 "' asked UCE-1, "Who sent you to me
'1
akhi?," to which UCE4 responded, "A good brother. Talk to him on [Social Media Application
112]. We talk about organizing." UCEl added that Hendricks was "really good at putting
brothers?" "Juba l9ll" responded, "He didn't tell you why?... What did he say to you then?"
UCE4 then stated, "I'm sure he had a purpose. I don't know anything more than your name."
Thereafter, "jubai9l 1" stated, "SVeII u mentioned something earlier abt organizing."
66. The next day, on or about April 24, 2015, UCEl again contacted Social Media
Application #3 account "jubaI9l I ." During this communication, "jubai9i I" and liCE-i
discussed the need to be careful when communicating with others online. jubal9l 1" made
multiple references to the presence of spies online, later asking UCE-1, "DO u know the hukm of
"profess n or I timony of the oneness of Allah," and "hokum" means ruling or judgment.]
"jubal91l" also briefly discussed their shared experiences when communicating with Hendricks
which focused on the length of time they were each in contact with Hendricks and similarities
with Hendricks' assurances when facilitating their introduction (e.g., Hendricks stated to
"jubai911 " that UCE-I was "a good brother, pretty n...uch the same things he told u about me, he
67. 'jubaI9li" also shared limited details about his criminal history, stating "I've
been arrested b4 akh... That's all I will say... Arrested not for some worldly affair.. * HAd a
27
APP'X 028
Cas 7 c91 *APi7,1D'!49VD 140
spy on me for 4yrs. .?' UCE-i later asked 'juba9i I" how much time he spent in prison, to
which Simpson responded, "Not much, got bailed out.., I charge dropped, I stayed, 3yrs
probation." 'lubai9l 1" also made references to the upcoming "drawing" contest in Garland,
Texas, asking UCE1, "Did u see that link. I posted? About texas? Prob not." In response,
UCE4 stated that he/she did not have 'jubai9II's" Social Media Application #1 account.
Thereafter, 'jubai9i 1" posted a link to the "Draw Prophet Muhanim.-,,-' Contest" in Garland,
Texas. in an effort to continue their dialogue, UCE.1 made the statement, "Tear up Texas." In
response., "juba 1911" warned UCE.i, "Bro, u don't have to say that.. U know what happened
in Paris21... I think.,. Yes or no...?" UC.E4 replied, "Right," after which 'ju.' 1911" stated,
68. After discussing details that Hendricks told UCE4 about himself and that
Hendricks was "connected," 'jubaI91 1" cautioned UCE-i that if he/she owned a weapon, he/she
should keep it on his/her person at all times in case of a law enforcement sting operation.
Specifically, "jut.: 1911" stated, "if u have ur own. thing... ...keep it on u at all times...Bc u know
it's real and functional.. .Make sense?, Jl-f U read about sting ops. . .From the news.. .They never
69. Based on "juba 1911's" description of his personal and criminal history, along
21
Based icon the timing ofthis communication, your .Affiant believes that Simpson.was refërr'gto the terrorist
attack that occurnd in Paris, France on or aaboutJanuuy 7,2015, when Said and CheiifKouacbi conducted a
terrorist attack at the Charlie Hebdo newspaper headquarters.
28
APP'X 029
Cas PJ7'If)Pan 141
communications using a variation of "Juba" as the user name, your Affiant believes that
70. On or about May 1, 2015, Hendricks, while using Social Media Application #2
accoun.t "accepted," communicated with UC&1 regarding the upcoming drawing the Prophet
Mohammad contest in Garland, Texas. UCEi reminded Hendricks that "Juba," meanü g
Simpson, had told UCE4 about R. After further discussion about the event and "Juba,"
Hendricks stated in reference to "Juba," "The AZ [Arizona) brother?" UCE4 replied, "He told
me that he tweeted a article about the drawing contest and then u hit him up about it." Hendricks
responded, "The one who call me a spy?" At the time., Simpson was residing in Arizona
Hendricks claimed to have just learned about the drawing contest that evening. After UCE4
commented that UCE1 could have hiked up with "Juba," Hendricks replied, "You can link with
71. The next day, on or about May 2, 2015, Hendricks, while using Social Media
Application #2 account "accepted," again communicated with UCE4 .out the contest in
Qarland, Texas. Hendricks wrote, "1 wish someone could go to tx and harass them during the
night;" "a good solid protest;" and "Unique one man protest." Hendricks also told UCE1 why
he [Hendricks] could not go to Texas, "Too much driving for us. And I don't fly." At the time,
Hendricks was In Baltimore, having just met CHS4. UCE1 responded, "Ok.. Just me or any
other brothers?" Hendricks responded, "See what you and bro Juda can do;" and "At least be
heard." UCE1 asked if Hendricks was still in contact with "juba" [Simpson]. Hendricks told
APP'X 030
Cas tq F 9:
6 I, 1$aq~ID 142
UCE4, "He has another brother he knows," and stated that he was not in contact with him.
However, Hendricks then provided Social Media Application 111 account "tawwakil" to UCE-1
to use to contact "Juba" [Simpson). Subsequent investigation determined that Social Media
72. UCEl subsequently traveled to Garland, Texas and was present on or about May
3, 2015, at the event. UCEl notified Hendricks that he/she was in the vicinity of the "Draw the
Prophet Muhammad Contest" event in Garland, Texas. Hendricks stated, "If you see that'
[meaning the organizer of the event] make your 'voice' heard against her."23 Hendricks asked
UCE4 a series of questions related to the security posture, to include: "How is security?;" How
big is gathering?;" "How many ppl?;" "How many police/agents?;" "How big is building?;" "Is
it wood?;""Do u see feds there?;" "DO you see snipers?;" and "How many media?'
73. During this conversation, Hendricks also asked UCE4 several questions, which
your Afflant believes were aimed at detennining if UCE4 was armed with weapons. After
UCE4 provided Hendricks with a series of general observations, Hendricks asked, "What u got
with u?" UCE-1 responded, "Tools of the trade," and "not a small hand tool" Hendricks
responded, ""Lot," and "The ppl doing the drawing and hosting and observing are the ones
needed to protest against." UC&l next explained that there was not a lot of activity outside of
the center, to which Hendricks responded, "Yea they are there but you can voice your concerns
to the hosts after their detail is gone.. .They will be outside yapping their mouths and thanking
23 Your Afflant believes that Hendricks' use of quotations around the word 'voice' implied that be was directing
UC&I to commit an act of violence against the organizer of the event.
30
APP'X 031
I o
age
1 alD 143
the pigs." UCE.i responded, "OK let me let u go n see how close I can get." Lastly, just prior to
the attack, Hendricks stated to UCE-i, "You may see her get into a car to go to airport or catch a
flight etc," referring to the organizer of the event Shortly thereafter, Simpson and Soofi
committed the attack on the cartoon drawing contest venue described above.
74. On or about May 4, 2015, one day after the terrorist attack in Garland, Texas,
Hendricks, while using Social Media Application #3 account "itamehere," contacted CHS4 and
instructed him/her to clean up his/her Social Media Application #1 page and take all "pro sguff
off" Hendricks then told CHS4 to "Keep looking fir me on here akh I may need you to help
online soon." Hendricks also stated that he intended to obtain another cellular telephone. Lastly,
75. On or about May 5, 2015, Hendricks, while using Social Media Application #3
account "itsmehere," directed CHS4 to an identified Social Media Application #1 account that
document stated:
'The New Era' To our brothers and sisters fighting for the Sake of Allah, we make dua
for you and ask Allah to guide your bullets, terrify your enemies, and establish you in the
Land. As our noble brother in the Philippines said in his bayah, 'This is the Golden Era,
everyone who believes.., is running for Shaheed.' The attack by the Islamic State in
AmEricka is only the beginning of our efforts to establish a wiliyah in the heart of our
enemy. Our aim was the khanzeer [the organizer of the Garland, TX eventjand to show
her that we don't care what land she hides in or what sky shields her, we will send all our
Lions to achieve her slaughter. This will heal the hearts of our brothers and disperse the
ones behind her. To those who protect her this will be your only warning of housing this
woman and her circus show. Everyone who houses her events, gives her a platform to
spill her filth are legitimate targets. We have been watching closely who was present at
Ns event and the shooter of our brothers. We knew that the target was protected. Our
intention was to show how easy we give our lives for the Sake of Allah. We have 71
31
APP'X 032
Cas79yp 18-RRFYIBRt ne 144
a'rn
trained soldiers in 15 states ready at our word to attack any target we desire. Out of the
71 trained soldiers 23 have signed up for operations like Sunday. We are increasing in
number bithnillah. Of the 15 states, 5 we will name...Virginia. Maryland, Illinois.,
California, and Michigan. The disbelievers who shot our brothers think that you killed
someone untrained, nayI ey gave you their bodies in plain view because we were
watching. The next six months will be interesting. Look for us on Mondays and Fridays.
To our Amir Al Mu'mineen,24 make dua for us and continue your reign, May Allah
enable your face May Allah send His peace and blessings upon our Prophet Muhunamad
and all those who follow until the last Day. Abu Ibrahim Al Amenki
76. A variation of this document was also located online at the URL of
description of the background of the attackers that was not included in the other version: "The
disbelievers who shot our brothers from Arizona, a new Muslim of 2 years and another of Ii
years, you think that you killed someone untrained, nay, they gave you their bodies in plain view
because we were watching?' (emphasis added). The importance of this variation is the reference
to "a new Muslim of 2 years?' The reference to "another of 11 years" is consistent with
Simpson's history, as he informed UC&1 that he had been a Muslim for 11 years during their
communications. However, UCE4 had informed Hendricks that UCE1 had been a Muslim for
2 years. Soofi, Simpson's actual partner in the attack, was raised a Muslim. When combined
with Hendricks' statement to UCE4 described below that he initially thought UCE-1 was killed
in the attack, your Affiain believes the reference to "a new Muslim of 2 years" in this document
is a reference to UCEl (because Hendricks mistakenly believed UCE-1 assisted with the attack,
FA
Amir Al Mu'mineen translates to the "leader of the faithful," and as previously stated, was a known alias for ISIL
leader Abu Bnkr alBaghdadL
32
APP'X 033
Casita47-p,1tq9§%1!-M8-Pq
,W 6 §€j o4k,9a ID 145
77. On or about May 5, 2015, Hendricks while using Social Media Application #2
account "mesecreti7," communicated with UCE4. Prior to discussing details of the Garland,
Texas attack, Hendricks verified UCEi 'a identity through the use of a code they had previously
arranged. UCE4 and Hendricks then discussed the Garland, Texas attack. UCE-1 claimed to
have been the "eyes" of Hendricks, to have seen Simpson and Soofi be killed, and stated that
"Cops almost shot me." Hendricks then directed UCE4 to deactivate his/her Social Media
Application #1 account, and asked UC&l, "Have you seen the just paste?" Although never
admitting to being invohed, Hendricks stated he believed that UCEl had been killed at first,
"Up until last night I thought that u." He then learned that UCE4 was not killed in the attack,
stating, "Be after I added up the facts I knew it wasn't u." After UCE1 continued to- express
concern that he/she was nearly killed in the attack and sorrow for Simpson and Soofi, Hendricks
stated, "1 thought the same thing bro. And I know that Will always be a concern you Will have..
But listen bro, AL LA h showed you that in order to prepare you. Next time you will be twice as
better LA.. .Don't worry. This is a example Al la h granted you. Don't let this real time lesson be
in vain." Lastly, Hendricks stated to UCEI "Bro, Keep in touch with me. If you need a sa fe
78. On or about May 9, 2015, through on or about May 10, 2015, Hendricks, using
UCEl. These communications were brief, but focused on UCE4 'a presence in Garland, Texas
on or about May 3, 2015. Hendricks and UCEI required each other to provide "the code," to
which the response was "17." During these conversations, Hendricks expressed concern as to
whether UCEl displayed his/her Social Media Application #2 account online Hendricks also
33
APP'X 034
Casj71cy5c 0
Fl 9(P aglD 146
expressed concern about the possibility of UCEl having used his/her cellular phone on the date
of the attack (asking if it pinged off a "tower locally") and further directed UCE4 to consider
79. On or about May 31, 2015 through on or about May 13, 2015, Hendricks, using
Social Media Application #2 account "itsme17," communicated with UCE4. During this
communication, Hendricks and UCE4 discussed an unknown individual for recruitment into
Hendricks" terrorist cell. Hendricks specifically requested that UCE4 provide social media
application information for the individual. In response to UCEl asking, "Should we bring him
into the circle?," Hendricks replied "Indeed. He is a good brother?' Hendricks also stated that
"Hijia" will "take 50/100 acres. Legally purchased." [The term "hijra" refers to a "migration."
In this context, the term is likely referring to iikeminded Muslims residing on compounds within
the United States.] Hendricks then added, "ft will be hidden in plain sight.. .Faim, house,
garden, tunnels.. .5 in the beginning stages across the country.. .Satillite places near." Your
Affiant believes that Hendricks was referring to his continued interest in purchasing land for the
80. On or about May 13, 2015 through on or about May 14, 2015, Hendricks, using
Social Media Application #2 account "itsmeil," briefly communicated with UCE4. During this
communication, Hendricks asked UCE1 if be/she had contacted another individual and stated
34
APP'X 035
as 1(j Pg § of br)p,
a lD 147
"The Ot' vilkir is not 1r the wet Also durine this et)Tumication. endricks provided
his Social Media Application #2 account "donteatch 17," but received no response.
CONCLUSION
82. Based on the lretoing. your MlIant believes that there is probable cause to
.S-how that biween on or about March I, 2013. and on or about May 3 1. 20 15), Erick Jamal
I kodricks conspired with ('\\'i and others known and unknown, to provide material support.
inc1udin personnel and services, 10 ISI L a designated lore LU crrorh,L oreanization. in violation
of Title 18, United States Code. Section 233913(a)( I). and that liendricks and others committed
o ert, acts in Ilirtherance ot' the conspiracy in the Northern i)istrict of Ohio.
I
.01
KENNEI'H S. MCHARGI I
UNITED STATES MAUlS(R Apr E J Ul)GE
' There are 5 pillars" within Islam, lowever, those I,i, ubseribc to an extremist version of Islam, often rein to
the commission ufjilud as the "6th r Tar."
APP'X 036
Case 3:17-cv02692M Document 10 Filed 01/11/18 Page 39 of 107 PagelD 148
Exhibit B
]ew J
Declaration of Matth
Des arno
APP'X 037
Case 3:17cv02692M Document 10 Filed 01/11/18 Page 40 of 107 PagelD 149
BRUCE JOINER,
UN STATES OF AMERICA.
i)cfcndant. )
I3urcaLl of Investigation (FBI). I have held ,-a, wide array of positions in the FRI with
both the criminal and national security fields, to inc hiding Deputy Assistant Director
international icrrorisi investigations and operations: Section Chief (SC) of the Strategic
Operations Section in the 1i31's Counterterrorism Division. leading the Bureau's efforts
Assistant Special Agent in Charge (ASAC) of the F131 "s Chicago Field Office, ma
white collar, public corruption, civil rights pro !iQlCflt crime. transnational crime.
Agent (SSA), providing program management oversight and support for criminal gat
investigations across the United States. Prior to joining the FBI. I served as an infantry
Officer in he U.S. Army, assigned to Fort IIood. Texas, during which time I deployed to
APP'X 038
Case 3:17cv-02692-M Document 10 Filed 01/11118 Page 41 of 107 PagelD 150
2.. As Acting AD. I oversee the national security operations of CTD in carrying out its
3 As a result of on current and former roles within the 1131 1 am familiar nh tile poliuts
Ir
which guide the FBI in carrying out its criminal and national security I issions including
4. 1 am aware of the subject matter of this lawsuit and that the complaint contains
allegations regarding the conduct of an 1131 Undercover Employee (UCE) during the
terrorist attack was carried out by Elton Simpson and Nadir Soofi at a "Draw Mohammed
Art Exhibit & Contest" at the Curtis CuIwell Center in Garland. Texas. during which the
plaintiff. Bruce Joiner, was injured. The undercover activity and counterterrorism
investigation were subsequently revealed in part during the avert phase of investigation
and related federal criminal proceedings in United States irt Eric Jamal Hendricks. No
I 6cr-002óS (NJ). Oh.) and United Sf ales of America v. AMa! Malik Ada! Kareein. No.
With respect to the conduct of the FBI UCE,, the complaint alleges that the UCE Incited"
Simpson to commit the Garland attack through electronic communications with Simpson:
that he "reconnoiter[cd] on behalf of the terrorists and possibly directiedi them to Ian]
undermanned vehicle entrance where the attack took place;" and that he failed to make a
reasonable effort to prevent the attempted attack and shooting of plaintiff by Simpson and
Soofi. I understand that the complaint also alleges that the FBI's communications to
APP'X 039
Case 3:17-cv-02692-M Document 10 Filed 01/11/18 Page 42 of 107 PagelD 151
local law enforcement concerning potential threats to the event by violent extremists were
. Accordingly, this declaration addresses FBI policy relating to undercover activity during
inlormaton with other government agencies. The FBI policies which relate to such
conduct are the FBI National Security Undercover Operations Policy Guide
(NSUCOPG). the FBI Domestic investigations and Operations Guide (D100. and FBI
Policy Directive 001 2D. entitled "FBI Information Sharing With Other Government
Agencies."
7. FBI policies allow investigative personnel wide discretion to determine the operational
investigation, and sources of information, and other individuals; whether and when to
take overt law enforcement action. such as effecting an arrest; and the manner in which to
share information with other govert em agencies. In order for the FBI to efficiently
carry out its national security and criminal law enforcement missions, such decisions
must he left to the discretion of FBI Special Agents and their operational managemeri
relying upon their training. experience, and good judgment and depending on the
during the course of such lnLttatIons am1ihes the necessity for such discretion.
APP'X 040
Case 3:17-cv-02692-M Document 10 Filed 01111118 Page 43 of 107 PagelD 152
The purpose of the NSUCOPG is to standardize policy with respect to the approva
notification. and reporting requirements for all FBI national security undercover activities
and undercover operations. It functions as a standalone policy, and there is no other FBI
policy that specifically applies to the operational conduct of FBI undercover activity in
9. The NSUCOPG sets forth standard administrative protocols for all FBI national security
undercover activities and operations, such as the approval processes and authorities,
limits on the duration of the operation or activity, expenditures and funding, reporting.
periodic review, and the types of FBI forms upon which undercover proposals must be
10.The NSUCOPG does not contain any provision directing the particular operational
manner in which the undercover technique should be carried out, including how a UCE is
other individuals whom the UCE may encounter during the course of an investigation.
be able to fluidly adapt to the particular needs and circumstances of each case. Specific
requirements regarding the details of how to approach and work with subjects of
individual investigators and, over time, would diminish the effectiveness of the
FBI undercover national security operations are carried out. Therefore, decisions
APP'X 041
Case 3:17-cv-02692-M Document 10 Filed 01/11118 Page 44 of 107 PagelD 153
undercover national security investigation must be left to the discretion of the UCE and
his or her management. based upon their tnining, experience, and good judgment. and
11.Nor does the NSUCOPG contain any provisions concerning law enforcement activity,
such as effecting an arrest or detention, by a UCE. Such overt conduct by a UCE is not
investigations.
12.The NSUCOPG contains highly sensitive information, the disclosure of which would
jeopardize the FBI's use of the undercover technique in the national security field, and
the majority of the NSUCOPG is classified at the Secret level and may not be attached to
In formation Sharini
13. Plaintiffs complaint alleges that the FBI issued terrorism bulletins to local law
enforcement containing information regarding potential threats to the Garland event, and
14. FBI Policy Directive 0012D sets forth standard and uniform requirements for assessing
information sharing activities with other government agencies and states that the FBI will
share information with other agencies in a manner that is consistent with applicable laws,
other binding authority, and mission justification, with due regard for the security of
operations and the protection of sources and methods. and in a manner that protects the
APP'X 042
Case 3:17-cv-02692M Document 10 Filed 01/11/18 Page 45 of 107 PagelD 154
15. 1)100 section 14 addresses retention or sharing of information by the FBI. More
specifically, 1)100 Section 145 sets forth FBI policy with respect to the sharing of
16. Neither Policy Directive 00121) nor 1)100 Section 14.5 contains requirements regarding
shared. The details regarding the manner and content of such information sharing is left
to the discretion of investigative peronnU and then management depending in each cast
17. Much of the DIOG is classified at the Secret level. A true and correct copy of 1)100
declaration.
18. A true and correct copy of Policy Directive 00 120 is attached as Ehibit 2 to this
declaration.
I declare under penalty of perjury that the foregoing is true and correc
ew . . esarno
Acting Assistant Director
Counterterrorism Division
Federal Bureau of Investigation
Washington, .DC.
APP'X 043
Case 3:17cv02692M Document 10 Filed 01/11/18 Page 46 of 107 PagelD 155
EXHIBI T I
APP'X 044
Case 3:17-cv02692-M Document 10 Filed 01/11/18 Page 47 of 107 PagelD 156
DOMESTIC INVESTIGATIONS
AND OPERATIONS GUIDE
FEDERAL BUREAU OF INVESTIGATION
RELEASED OCTOBER 16,2013
UPDATED APRI L 3 v 2 0 15
This is a priileecd document that cannot be released in whole or in part to persons or aencks outside the Federal
Bureau nt Investigation. nor can it be republished in liok or in part in any written iwm not containing this
statement. including general use pamphlets. ithout the approval ofthe Director: olihe Federal Ilurc-van of
Investigation
CONTACT INFORMATION:
Questions or comments pertaining to the 1)106 can be directed to:
The Resource Planning Office (RPO), Internal Policy Office (IPO) at
HQ_D1V0OJNTERNAL30L1CYOFF10E
or the Office of the General Counsel (0CC)
PRIVILEGED INFORMATION..it
Any use of this document, including direct quotes or identifiable paraphrasing, will be
marked with the following statement:
This is a prit.!lleged 1ocwneni that eannoi he rekas'd in uhoie or in part to 1700SMIN or
agropides muitdL the Federal Bureau 0/ ln%t14'IftoIl ,ioi a:i uk IqubIIs/kd III tiluile
a! Ifl pai us ant tusn us fn,uuu not wnIunnuit F/n' cutenn UI UkIuidh!It gustsa/ us..
1)alnphIt ts wilhout I/se approval
a! oft/st Director of lb.. I cdtral Bureau of lot.. snt'a11ass
FOR OFFICIAL FRI INTERNAL USE ONLY—DO NOT DISSEMINATE
FOR OFFICIAL USE ONLY
l44
UNCLASSIFIED FOR OFFICIAL USE ONLY
APP'X 047
Case 3:17-cv-02692-M Document 10 Filed 01/11/18 Page 50 of 107 PageD 159
14-5
UNCLASSIFIED - FOR OFFICIAL USE ONLY
APP'X 048
Case 3:17cv-02692-M Document 10 Filed 01/11118 Page 51 of 107 PageD 160
(Uf/FOIJO) I he White [louse must 1- quest such information through the NSC staff or I ISC
staff including. but not limited to the NSC Legal and Intelligence Directorates and Office of
C om1num krroricm or through the President ' Intellia.ence Advisor
Advisory Board or the COUflLI
to the President. (AGG-Dom. Part VLD2.a)
(U//FOliO) lithe White I louse sends a request for such information to the FBI without first
sending the request through the entities described above. the request must he returned to the
White House for resubmission.
143.2.2 (U) APPROVAL BY THE ATTORNEY GENERAL
(U//FOliO) Examples of the type of information that is suitable for dissemination to the
White Ilouse on a routine basis includes. but is not limited to (AGG4om, Part VLD2.c):
Al t U/JFOUO} Information concerning international terrorism:
B tU 'FOliO) Information concerning activities of foiein tntclltgcncc services in the United
States:
C) (U/R)Uth Information indicative of imminent IiostiIiik involving any foreign power:
D (li//FOlio) Information concerning potential cyber threats to the United States or its allies:
L) (U/40-0 t (ii lnlornrrtion indicative otpolicy positions adopted by torugn otticrils
governments, or powers. or their reactions to United States foreign policy initiatives:
1) (U FOUO) Information relating to possible changes in leadership positions of lorcign
governments, parties, factions, or powers;
G) Of FOLiO) Intoi mation concuning foreign economic or foreign political nriltcrs that ought
have national security ramifications: and
H-) (U//FoliO) lnlbrmation set forth in regularly published national intelligence i'equircmenis.
14.5,2.4 (U) NOTiFICATION OF COMMUNICATIONS
(U//FOliO) Communications by the Ff31 to the White I louse that relate to a national security
muter and concern a litigation issue for a specific puiding incsugauon must be made knosn
to the 0111cc oldie Attorney General. the 0111cc of the Deputy. Attorney General. or the
0111cc of the Associate Attorney General. White House policy may limit or prescribe the
White liouse personnel who may request information concerning such issues from the FBI
(AGG-Dom Part V1.13.2.4
14-6
UNCLASSIFIED - FOR OFFICIAL USE O V
APP'X 049
Case 3:17-cv02692-M Document 10 Filed 01/11/18 Page 52 of 107 PagelD 161
(U//FOUO) FBI employees must work through supervisors and the FBI OCA to keep the
congressional intelligence committees Fully and currentiv informed of the FBI's intelligence
activities as required by the National Security Act of 1947. as amended. Advice on what
activities lLl within the supra of required congressional notification can be obtained from OC\
A Policy Directive is forthcominJ.
14-7
UNCLASSIFIED - FOR OFFICIAL USE ONLY
APPX 050