Skip to main content
Skip to content
Case File
efta-01612898DOJ Data Set 10Other

EFTA01612898

Date
Unknown
Source
DOJ Data Set 10
Reference
efta-01612898
Pages
5
Persons
0
Integrity

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
Decentralizing Privacy: Using Blockchain to Protect Personal Data Guy Zyskind MIT Media Lab Cambridge, Massachusetts Email: [email protected] Oz Nathan Tel-Aviv University Tel-Aviv, Israel Email: [email protected] Abstract—The recent Increase in reported incidents of surveil- lance and security breaches compromising users' privacy call into question the current model, in which third-panies collect and con- trol massive amounts of personal data. Bitcoin has demonstrated in the financial space that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger. In this paper. we describe a decentralized personal data management system that ensures users own and control their data. We implement a protocol that turns a blockchain into an automated access-control manager that does not require trust in a third party. Unlike Bitcoin, transactions in our system are not strictly financial — they are used to carry instructions, such as storing, querying and sharing data. Finally, we discuss possible future extensions to blockchains that could harness them into a well-rounded solution for trusted computing problems in society. Keywords—blockchain; privacy; bitcoin; personal data I. INTRODUCTION The amount of data in our world is rapidly increasing. According to a recent report [22], it is estimated that 20% of the world's data has been collected in the past couple of years. Facebook, the largest online social-network, collected 300 petabytes of personal data since its inception [I] — a hundred times the amount the Library of Congress has collected in over 200 years [131. In the Big Data era, data is constantly being collected and analyzed, leading to innovation and economic growth. Companies and organizations use the data they col- lect to personalize services, optimize the corporate decision- making process, predict future trends and more. Today, data is a valuable asset in our economy [211. While we all reap the benefits of a data-driven society, there is a growing public concern about user privacy. Centralized organizations — both public and private, amass large quantities of personal and sensitive information. Individuals have little or no control over the data that is stored about them and how it is used. In recent years, public media has repeatedly covered controversial incidents related to privacy. Among the better known examples is the story about government surveillance [21, and Facebook's large-scale scientific experiment that was apparently conducted without explicitly informing participants [101. Related Work. There have been various attempts to ad- dress these privacy issues, both from a legislative perspective ([4], [201), as well as from a technological standpoint. Open- PDS, a recently developed framework, presents a model for The first two authors contributed equally to this work. Alex 'Sandy' Pentland MIT Media Lab Cambridge, Massachusetts Email: [email protected] autonomous deployment of a PDS which includes a mecha- nism for returning computations on the data, thus returning answers instead of the raw data itself [61. Across the industry, leading companies chose to implement their own proprietary authentication software based on the OAuth protocol [191, in which they serve as centralized trusted authorities. From a security perspective, researchers developed various techniques targeting privacy concerns focused on personal data. Data anonymization methods attempt to protect person- ally identifiable information. k-anonymity, a common property of anonymized datasets requires that sensitive information of each record is indistinguishable from at least k —1 other records [241. Related extensions to k-anonymity include I-diversity, which ensures the sensitive data is represented by a diverse enough set of possible values [151; and t-closeness, which looks at the distribution of sensitive data [14]. Recent research has demonstrated how anonymized datasets employing these techniques can be de-anonymized [18], [5], given even a small amount of data points or high dimensionality data. Other privacy-preserving methods include differential privacy, a tech- nique that perturbs data or adds noise to the computational process prior to sharing the data [7], and encryption schemes that allow running computations and queries over encrypted data. Specifically, fully homomorphic encryption (FHE) [9] schemes allow any computation to run over encrypted data, but are currently too inefficient to be widely used in practice. In recent years, a new class of accountable systems emerged. The first such system was Bitcoin, which allows users to transfer currency (bitcoins) securely without a cen- tralized regulator, using a publicly verifiable open ledger (or blockchain). Since then, other projects (collectively referred to as Bitcoin 2.0 [81) demonstrated how these blockchains can serve other functions requiring trusted computing and auditability. Our Contribution. I) We combine blockchain and off- blockchain storage to construct a personal data management platform focused on privacy. 2) We illustrate through our platform and a discussion of future improvements to the technology, how blockchains could become a vital resource in trusted-computing. Organization. Section II discusses the privacy problem we solve in this paper, section III provides an overview of the platform, whereas section IV describes in detail the techni- cal implementation; section V discusses future extensions to blockchains, and concluding remarks are found in section VI. EFTA01612898 II. THE PRIVACY PROBLEM Throughout this paper, we address the privacy concerns users face when using third-party services. We focus specifi- cally on mobile platforms, where services deploy applications for users to install. These applications constantly collect high- resolution personal data of which the user has no specific knowledge or control. In our analysis, we assume that the services are honest-but-curious (i.e., they follow the protocol). Note that the same system could be used for other data- privacy concerns, such as patients sharing their medical data for scientific research, while having the means to monitor how it is used and the ability to instantly opt-out. In light of this, our system protects against the following common privacy issues: Data Ownership. Our framework focuses on ensuring that users own and control their personal data. As such, the system recognizes the users as the owners of the data and the services as guests with delegated permissions. Data Transparency and Auditability. Each user has complete transparency over what data is being collected about her and how they are accessed. Fine-grained Access Control. One major concern with mobile applications is that users are required to grant a set of permissions upon sign-up. These permissions are granted indefinitely and the only way to alter the agreement is by opting-out. Instead, in our framework, at any given time the user may alter the set of permissions and revoke access to previously collected data. One application of this mechanism would be to improve the existing permissions dialog in mobile applications. While the user-interface is likely to remain the same, the access-control policies would be securely stored on a blockchain, where only the user is allowed to change them. Ill. PROPOSED SOLUTION We begin with an overview of our system. As illustrated in Figure I, the three entities comprising our system are mobile phone users, interested in downloading and using applications; services, the providers of such applications who require processing personal data for operational and business- related reasons (e.g., targeted ads, personalized service); and nodes, entities entrusted with maintaining the blockchain and a distributed private key-value data store in return for incentives. Note that while users in the system normally remain (pseudo) anonymous, we could store service profiles on the blockchain and verify their identity. The system itself is designed as follows. The blockchain accepts two new types of transactions: Taccen, used for access control management; and T elma, for data storage and retrieval. These network operations could be easily integrated into a mobile software development kit (SDK) that services can use in their development process. To illustrate, consider the following example: a user installs an application that uses our platform for preserving her privacy. As the user signs up for the first time, a new shared (user, service) identity is generated and sent, along with the asso- ciated permissions, to the blockchain in a Taccess transaction. Data collected on the phone (e.g., sensor data such as location) is encrypted using a shared encryption key and sent to the blockchain in a Zhua transaction, which subsequently routes it to an off-blockchain key-value store, while retaining only a pointer to the data on the public ledger (the pointer is the SHA-256 hash of the data). Both the service and the user can now query the data using a Tdatc, transaction with the pointer (key) associated to it. The blockchain then verifies that the digital signature belongs to either the user or the service. For the service, its permissions to access the data are checked as well. Finally, the user can change the permissions granted to a service at any time by issuing a Tacc,„ transaction with a new set of permissions, in- cluding revoking access to previously stored data. Developing a web-based (or mobile) dashboard that allows an overview of one's data and the ability to change permissions is fairly trivial and is similar to developing centralized-wallets, such as Coinbase for Bitcoinl. The off-blockchain key-value store is an implementation of Kademilia 116I, a distributed hashtable (or DHT), with added persistence using LevelDB2 and an interface to the blockchain. The DHT is maintained by a network of nodes (possibly disjoint from the blockchain network), who fulfill approved read/write transactions. Data are sufficiently randomized across the nodes and replicated to ensure high availability. It is instructive to note that alternative off-blockchain solutions could be considered for storage. For example, a centralized cloud might be used to store the data. While this requires some amount of trust in a third-party, it has some advantages in terms of scalability and ease of deployment. DHT Fig. I. Overview of the decentralized platform. IV. THE NETWORK PROTOCOL We now describe in detail the underlying protocol used in the system. We utilize standard cryptographic building blocks in our platform: a symmetric encryption scheme defined by the 3-tuple Venc) — the generator, encryption and decryption algorithms respectively; a digital signature scheme (DSS) described by the 3-tuple (g„„9,$,,,,v„,) - the generator, signature and verification algorithms respectively, 'Coinbase bitcoin wallet. http://www.combase.com 2LcvelDB. http://githulxcom/gongleileveldb EFTA01612899 implemented using ECDSA with secp256k1 curve [121; and a cryptographic hash function 71, instantiated by a SHA-256 [111 implementation. A. Building Blocks We now briefly introduce relevant building blocks that are used throughout the rest of this paper. We assume familiarity with Bitcoin [171 and blockchains. I) Identities: Blockchains utilize a pseudo-identity mech- anism. Essentially a public-key, every user can generate as many such pseudo-identities as she desires in order to increase privacy. We now introduce compound identities, an extension of this model used in our system. A compound identity is a shared identity for two or more parties, where some parties (at least one) own the identity (owners), and the rest have restricted access to it (guests). Protocol I illustrates the implementation for a single owner (the user) and a single guest (the service). As illustrated, the identity is comprised of signing key-pairs for the owner and guest, as well as a symmetric key used to encrypt (and decrypt) the data, so that the data is protected from all other players in the system. Formally, a compound identity is externally (as seen by the network) observed by the 2-tuple: Compound2): 61k) = (pka;;, (I) Similarly, the entire identity (including the private keys) is the following 5-tuple: Compound„,, = (pk;;;;, sk;;;,pkasi;, s eig k sk:`,11) (2) Protocol 1 Generating a compound identity procedure COMPOUNDIDENTITY0t, 2: u and s form a secure channel 3: u executes: 4: {pk,";;,skauip 4— guy() 5: 6: 7: 8: 9: 10: uif g ske , e„ c() it shares sku,t,pkay s: with s s executes: (piesi;,sklu) 1- gsigo s shares plcsi; with s II Both it and s have skeuifc,pk."(9,pk1; II: return pk:g,pka4,84;isc 12: end procedure 2) Blockchain Memory: We let L be the blockchain mem- ory space, represented as the hastable L : {0,1}256 _+ {O, I}N, where N >> 256 and can store sufficiently- large documents. We assume this memory to be tamper- proof under the same adversarial model used in Bitcoin and other blockchains. To intuitively explain why such a trusted data-store can be implemented on any blockchain (including Bitcoin), consider the following simplified, albeit inefficient, implementation: A blockchain is a sequence of timestamped transactions, where each transaction includes a variable num- ber of output addresses (each address is a 160-bit number). L could then be implemented as follows — the first two outputs in a transaction encode the 256-bit memory address pointer, as well as some auxiliary meta-data. The rest of the outputs construct the serialized document. When looking up L[kl, only the most recent transaction is returned, which allows update and delete operations in addition to inserts. 3) Policy: A set of permissions a user u grants service s, denoted by POLICY„. For example, if u installs a mobile application requiring access to the user's location and contacts, then POLICY,,,, = {location, contads} . It is instructive to note that any type of data could be stored safely this way, assuming the service will not subvert the protocol and label the data incorrectly. Safeguards to partially prevent this could be introduced to the mobile SDK, but in any case, the user could easily detect a service that cheats, as all changes are visible to her. 4) Auxiliary Functions: Parse(x) de-seralizes the mes- sage sent to a transaction, which contains the arguments; CheckPolicy(phki.,xp), illustrated in Protocol 2, verifies that the originator has the appropriate permissions. Protocol 2 Permissions check against the blockchain I: procedure CHEcicPoLicr(pkskig,xp) 2: s (— 0 3: ., policy = skig) 4: if L[a otici,] 0 0 then pea" 9" PO LICY„, Parse(L[apaicy]) 6: if pkskip = SI; or 7: (pkakig = phs,;; and xp E POLICY.,,,) then 8: ‹— I 9: end if 10: end if II: return s 12: end procedure B. Blockchain Protocols Here we provide a detailed description of the core protocols executed on the blockchain. Protocol 3 is executed by nodes in the network when a Tacces, transaction is received, and similarly, Protocol 4 is executed for 'Maga transactions. As mentioned earlier in the paper, Zsc„„ transactions allow users to change the set of permissions granted to a service, by sending a POLICY.,,, set. Sending the empty set revokes all access-rights previously granted. Sending a Tata., transaction with a new compound identity for the first time is interpreted as a user signing up to a service. Similarly, Tdata transactions govern read/write operations. With the help of CheckPolicy, only the user (always) or the service (if allowed) can access the data. Note that in lines 9 and 16 of Protocol 4 we used shorthand notation for accessing the DHT like a normal hashtable. In practice, these instructions result in an off-blockchain network message (either read or write) that is sent to the DHT. C. Privacy and Security Analysis We rely on the blockchain being tamper-free, an assump- tion that requires a sufficiently large network of untrusted peers. In addition, we assume that the user manages her keys in a secure manner, for example using a secure-centralized wallet service. We now show how our system protects against adversaries compromising nodes in the system. Currently, we EFTA01612900 Protocol 3 Access Control Protocol L: procedure HANDLEAccEssTX(pk.kig, m) 2: s 4— 0 3: pk:g, pk:;:, POLICY,, = Parse(m) 4: if pkikis, = pk:i; then 5: L[7-i(pkts,)] = m 6: s4-1 7: end if 8: return 9: end procedure Protocol 4 Storing or Loading Data I: procedure HANDLEDATATX(pkskig,m) 2: C, Xp,rw = Parse(m) 3: if Check Policy(phskig, xp) = True then 4: plz. , pia, POLICY., Parse(LIN(ple 5: Or, = it(Pk:;; II xp) 6: if rw = 0 then r, rw=0 for write. 1 for read 7: ilc=NW 8: L[azj 4— L[a.p] LI h. 9: (DHT) ds[hc) 4— C 10: return h. II: else if c E L[a.p] then 12: (DHT) return dd[hc] 13: end if 14: end if IS: return 0 16: end procedure 4- are less concerned about malicious services that change the protocol or record previously read data, as they are likely to be reputable, but we provide a possible solution for such behavior in section V-A. Given this model, only the user has control over her data. The decentralized nature of the blockchain combined with digitally-signed transactions ensure that an adversary cannot pose as the user, or corrupt the network, as that would imply the adversary forged a digital-signature, or gained control over the majority of the network's resources. Similarly, an adversary cannot learn anything from the public ledger, as only hashed pointers are stored in it. An adversary controlling one or more DHT nodes cannot learn anything about the raw data, as it is encrypted with keys that none of the nodes posses. Note that while data integrity is not ensured in each node, since a single node can tamper with its local copy or act in a byzantine way, we can still in practice minimize the risk with sufficient distribution and replication of the data. Finally, generating a new compound identity for each user- service pair guarantees that only a small fraction of the data is compromised in the event of an adversary obtaining both the signing and encryption keys. If the adversary obtains only one of the keys, then the data is still safe. Note that in practice we could further split the identities to limit the exposure of a single compromised compound identity. For example, we can generate new keys for every hundred records stored. V. DISCUSSION OF FUTURE EXTENSIONS In this section, we slightly digress to present possible future extensions to blockchains. These could play a significant role in shaping more mature distributed trusted computing platforms, compared to current state-of-the-art systems. More specifically. they would greatly increase the usefulness of the platform presented earlier. A. From Storage to Processing One of the major contributions of this paper is demonstrat- ing how to overcome the public nature of the blockchain. So far, our analysis focused on storing pointers to encrypted data. While this approach is suitable for storage and random queries, it is not very efficient for processing data. More importantly, once a service queries a piece of raw data, it could store it for future analysis. A better approach might be to never let a service observe the raw data, but instead, to allow it to run computations directly on the network and obtain the final results. If we split data into shares (e.g., using Shamir's Secret Sharing 123)), rather than encrypting them, we could then use secure Multi- party Computation (MPC) to securely evaluate any function In Figure 2, we illustrate how MPC might work with blockchains and specifically in our framework. Consider a simple example in which a city holds an election and wishes to allow online secret voting. It develops a mobile application for voting which makes use of our system, now augmented with the proposed MPC capabilities. After the online elections take place, the city subsequently submits their back-end code to aggregate the results. The network selects a subset of nodes at random and an interpreter transforms the code into a secure MPC protocol. Finally, the results are stored on the public ledger, where they are safe against tampering. As a result, no one learns what the individual votes were, but everyone can see the results of the elections. procedure EVarE((s)ui •••, ( * )Vn) nra L a. i V, if s < 0 then L[Cleiection] Ul else if s > 0 then L[aci ] 4— u2 end if end procedure NET Computes: if s < 0 then L[adection] else ifs > 0 then L[actection] <— U2 end if MPC Computes: Hp. broadcast: islp, —> AI PC 8 4— reconstruct(N) broadcast: s —> NET Fig. 2. Example of a flow of secure computation in a blockchain network. The top left block (EVote procedure) is the unsecure code, where the arguments marked in (•) are private and stored as shares on the DHT. The network selects a subset of nodes at random to compute a secure version of EVote and broadcasts the results back to the entire netwott, that stores it on the ledger. EFTA01612901 B. Trust and Decision-Making in Blockchains Bitcoin, or blockchains in general. assumes all nodes are equally untrusted and that their proportion in the collective decision-making process is solely based on their computational resources (known as the Proof-of-work algorithm) [I7]. In other words — for every node it, trusty, oc resources(n) (probabilistically) decides the node's weight in votes. This leads to adverse effects, most notably vulnerability to sybil attacks, excessive energy consumption and high-latency. Intuitively, Proof-of-Work reasons that nodes which pour significant resources into the system are less likely to cheat. Using similar reasoning we could define a new dynamic measure of trust that is based on node behavior, such that good actors that follow the protocol are rewarded. Specifically, we could set the trust of each node as the expected value of it behaving well in the future. Equivalently, since we are dealing with a binary random variable, the expected value is simply the probability p. A simple way to approximate this probability is by counting the number of good and bad actions a node takes, then using the sigmoid function to squash it into a probability. In practice, every block i we should re-evaluate the trust score of every node as - trust;') n 1 + e-a(#good-#bad)' 1 (3) where a is simply the step size. With this measure, the network could give more weight to trusted nodes and compute blocks more efficiently. Since it takes time to earn trust in the system, it should be resistant to sybil attacks. This mechanism could potentially attract other types of attacks, such as nodes increasing their reputation just to act maliciously at a later time. This might be mitigated by randomly selecting several nodes, weighted by their trust, to vote on each block, then taking the equally-weighted majority vote. This should prevent single actors from having too much influence, regardless of their trust-level. VI. CONCLUSION Personal data, and sensitive data in general, should not be trusted in the hands of third-parties, where they are suscep- tible to attacks and misuse. Instead, users should own and control their data without compromising security or limiting companies' and authorities' ability to provide personalized services. Our platform enables this by combining a blockchain, re-purposed as an access-control moderator, with an off- blockchain storage solution. Users are not required to trust any third-party and are always aware of the data that is being collected about them and how it is used. In addition, the blockchain recognizes the users as the owners of their personal data. Companies, in turn, can focus on utilizing data without being overly concerned about properly securing and compartmentalizing them. Furthermore, with a decentralized platform, making legal and regulatory decisions about collecting, storing and sharing sensitive data should be simpler. Moreover, laws and regula- tions could be programmed into the blockchain itself, so that they are enforced automatically. In other situations, the ledger can act as legal evidence for accessing (or storing) data, since it is (computationally) tamper-proof. Finally, we discussed several possible future extensions for blockchains that could harness them into a well-rounded solution for trusted computing problems in society. 111 121 131 [4] 151 161 171 181 191 1101 11I] 1121 [13] 1141 II 5] 1161 117] 1181 1191 1201 1211 1221 1231 1241 REFERENCES Scaling the faccbook data warehouse to 300 pb. 2014. James Ball. Nsa's prism surveillance program: how it warts and what it can do. The Guardian. 2013. Michael Ben-Or. Shah Goldwasser. and Avi Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the nvenfieth annual ACM swaposium on Theory of computing. pages 1-10. ACM. 1988. EUROPEAN COMMISSION. Commission proposes a comprehensive refomt of data protection rules to increase users' control of their data and to cut costs for businesses. 2012. Yves-Alexandre de Montjoye. Cesar A Hidalgo. Michel Verleysen. and Vincent D Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific reports. 3. 2013. Yves-Alexandre de Montjoye. Erez Shmueli. Samuel S Wang. and Alex Sandy Pentland. openpds: Protecting the privacy of metackna through safeanswers. PloS one. 9(7):e98790. 2014. Cynthia Duork. Differential privacy. In Automata, languages and programming. pages 1-12. Springer. 2006. Jon Evans. Bitcoin 2.0: Sidechains and ethereum and zerocash. oh my!. 2014. Craig Gentry. Fully homomorphic encryption using ideal lattices. In STOC. volume 9. pages 169-178. 2009. Vindu Croel. Facebook tinkers with users' emotions in news feed experiment. stirring outcry. The New York Times. 2014. Federal Information and Processing Standards. FIPS PUB 180-4 Secure Hash Standard ( SHS 1. (March). 2012. Don Johnson. Alfred Menezes. and Scott Vanstonc. The elliptic curve digital signature algorithm (ocdsa). International Journal of Information Security. 1(1):36-63. 2001. Michael Lest How much information is there in the world? Ninghui Li. Tiancheng Li. and Suresh Venkatasubranuinian. t-closeness: Privacy beyond k-anonymity and 1-diversity. In ICDE. volume 7. pages 106-115. 2007. Ashwin Machanavajjhala. Daniel Kifer. Johannes Gehrke. and Muthu- ramakrishnan Venkitasubramaniam. 1-diversity: Privacy beyond k- anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD). 1(1):3. 2007. Petar Maymounkov and David Mazieres. Kademlia: A peer-to-peer information system based on the xor metric. In Peer-to-Peer Systems. pages 53-65. Springer. 2002. Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Consulted. 1(20121:28. 2008. Arvind Narayanan and Vitaly Shmatikov. How to break anonymity of the nctflix prize dataset. arXiv preprint es/0610105. 2006. Juan Perez. Facebook. google launch data portability programs to all. 2008. Rt.com. Obama announces legislation protecting personal data student digital privacy. 2015. K Schwab. A Marcus. JO Oyola. W Hoffman. and M Luzi. Personal data: The emergence of a new asset class. In An Initiative of the Ilbrld Economic Forum. 2011. ScienceDaily. Big data, for better or worse: 90% of world's data generated over last two years. 2013. Adi Shamir. How to share a secret. Communications of the ACM. 22(11):612-613. 1979. Latanya Sweeney. k-anonymity: A model for protecting privacy. international Journal of Uncertainty. Fuzziness and Knowledge-Based Systems. I0(05):557-570. 2002. EFTA01612902

Technical Artifacts (8)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Domainrt.com
URLhttp://githulxcom/gongleileveldb
URLhttp://www.combase.com
Wire RefREFERENCES
Wire Reftransfer currency

Related Documents (6)

DOJ Data Set 10CorrespondenceUnknown

EFTA Document EFTA01612898

0p
Dept. of JusticeOtherUnknown

EFTA Document EFTA01277005

*UBS IRS Financial Services tic. Private Wealth Management 299 Park Avenue 26th Floor New York NY 10171.0002 ANP70036969670219 • 0 Account name: MAX FOUNDATION Friendly account name: MAX FOUNDATION Account number. Your linens:WI Advisor- SCOTT STACKMANitYLE CASK EL Questions about your statement? call y0ur fir-Jan:re' AdvJiOr Of ti e Resourcetine at account VIsItour webs's.: www.ubitOnYlinanCiakerviCeS Items for your attention Help protect ycJitelf lion, liaw and review bank,

56p
DOJ Data Set 9OtherUnknown

Memorandum

Memorandum Subject Re: Operation Leap Year Date May 1, 2007 (Revised 9/13/07) (2nd Revision 2/19/08)' To From R. Alexander Acosta, United States Attorney First Assistant United States Attorney Chief, Criminal Division MAUSA, Northern Region , Chief, Northern Region I. Introduction This memorandum seeks approval for the attached indictment char in Jeffrey Epstein, Min a/k/a' JEGE Inc., and Hyperion Air, Inc. The proposed indictment contains 60 counts and seeks the forfeiture of Epstein's Palm Beach home and two airplanes? The FBI has information regarding Epstein's whereabouts on May 16th and May 19th and they would like to arrest him on one of those dates. Epstein is considered an extremely high flight risk' and, from information we have received, a continued danger 'The second revision amends the Jane Doe numbering system to correspond with the most recent indictment. It also removes the references to the overt acts and substantive allegations related to each

53p
DOJ Data Set 9OtherUnknown

DS9 Document EFTA00298259

34p
Court UnsealedTestimonyUnknown

court transcript: A-5918

The document is a court transcript where MS. DAVIS argues that Mr. Parse's attorney made strategic choices that benefited him, and that MR. SHECHTMAN has not met the Strickland standard for ineffective assistance of counsel. The court had previously ruled on a motion for a new trial related to Catherine Conrad, a juror who was known to the defendant's law firm, Brune & Richard.

1p
DOJ Data Set 10OtherUnknown

EFTA01294870

10p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.