Skip to main content
Skip to content
Case File
efta-efta00173481DOJ Data Set 9Other

I, Aaron E. Spivack, having been duly sworn by Supervisory

Date
Unknown
Source
DOJ Data Set 9
Reference
EFTA 00173481
Pages
88
Persons
4
Integrity
No Hash Available

Summary

I, Aaron E. Spivack, having been duly sworn by Supervisory Special Agent (SSA) Dannie W. Price, Jr., hereby make the following statement to SSA Price and SSA Matthew A. Zavala on 01/26/2024 and SSA Price and SSA Claudia Dubravetz on 08/08/2024, whom I know to be SSAs of the Federal Bureau of Investigation (FBI), assigned to the Inspection Division (INSD) at the time of my statement. My attorney, Richard J. Roberson, Jr., was present during my statement on both occasions, via telephone . This statement took place over a two-day period. The statement initiated on 01/26/2024, and again on 08/08/2024, after additional allegations were added: I entered on duty (EOD) on 02/21/2006, as an Intelligence Analyst (IA). I EOD on 10/08/2008, as a Special Agent (SA) and I am currently assigned to the New York Field Office (HYPO) that capacity. I understand that this is an internal investigation regarding an allegation that Special Agent Aaron E. Spivack improperly stored digital evi

Tags

eftadataset-9vol00009
Ask AI about this document

Search 264K+ documents with AI-powered analysis

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
I, Aaron E. Spivack, having been duly sworn by Supervisory Special Agent (SSA) Dannie W. Price, Jr., hereby make the following statement to SSA Price and SSA Matthew A. Zavala on 01/26/2024 and SSA Price and SSA Claudia Dubravetz on 08/08/2024, whom I know to be SSAs of the Federal Bureau of Investigation (FBI), assigned to the Inspection Division (INSD) at the time of my statement. My attorney, Richard J. Roberson, Jr., was present during my statement on both occasions, via telephone . This statement took place over a two-day period. The statement initiated on 01/26/2024, and again on 08/08/2024, after additional allegations were added: I entered on duty (EOD) on 02/21/2006, as an Intelligence Analyst (IA). I EOD on 10/08/2008, as a Special Agent (SA) and I am currently assigned to the New York Field Office (HYPO) that capacity. I understand that this is an internal investigation regarding an allegation that Special Agent Aaron E. Spivack improperly stored digital evidence at his residence in violation of 1.6- Investigative Deficiency- Improper Handling of Property in the Care, Custody, or Control of the Government. On 10/30/2023 the following expanded allegations were added: Special Agent Aaron E. Spivack improperly and stored digital evidence and failed to policy, resulting in a cyber intrusion in in handled, documented, secure CSAM within violation of 1.6- Investigative Deficiency- Improper Handling of Property in the Care, Custody, or Control of the Government and 5.17- security Violation- Failure to Secure sensitive Equipment/ Materials. On EFTA00173481 02/07/2024 the following expanded allegations were added: Special Agent Aaron E. Spivack exceeded the limits of his authority by contracting an outside company to develop computer software on behalf of the FBI in violation of 2.8 Misuse of Position and 5.23 Violation of Miscellaneous Rules/Regulations. I have been further advised of my rights and responsibilities in connection with this inquiry as set forth on a "Warning and Assurance to Employee Required to Provide Information" form FD-645 which I have read and signed. I understand from my review of the FD-645 that should : refuse to answer or fail to reply fully and truthfully during this interview, I can expect to be dismissed from the rolls of the FBI. this here E (EM) EFTA00173482 e issues I occur. I ement ere st of but th ral 0 n I am currently assigned to CT-25, a Domestic Terrorism squad, but assigned to an Enterprise Investigation that is a hybrid of Domestic Terrorism and Child Exploitation violations. I was assigned to squad CY-3 in May 2010 and officially named on the squad in July 2010. This was when the FBI's child exploitation program was referred to as "Innocent Images" and fell under the Cyber Division, while Squad C-20 was the Human Trafficking (HT) squad at the time. I believe it was 2015 when Violent Crimes Against Children (VCAC) and HT programs were combined under the FBI's Criminal Division, which led to the merger of the violations in the NYFO under squad C-20. The Squad is split and has the HT side and the VCAC side, and I was a VCAC Agent. Agents primarily work their assigned violations, but we come together as a squad for operations. I have been with the FBI for over 18 years, having spend the last 16 years as an Agent. I have been one of the FBI's leading Agents in Child Exploitation investigations and to this day, I believe that I am one of, if not the only, Court- EFTA00173483 certified expert witness for the entire FBI for child exploitation. I have personally accounted for aniseem4mately over 60 arrests, 150 search warrants, and have been responsible for rescuing several hundreds of children. cud to INSD and ardect Head•uarters ( ssistant Director in Char •e (AD) (DD) ce EFTA00173484 Assistant United States Attorney's Officc-c (U(AUSA's)I des•it- AUSAs. Last month Eoordinator I believe Digital Extraction Technician (DExT) training was opened to VCAC Agents in 2012. Scott Ledford was my instructor for DExT. As of 2023, I knew Ledford was a Unit Chief (DC) and led the Cyber Action Team (CAT). I believe at least three or four of us initially received DExT training in approximately EFTA00173485 2012, but I think all of us working Innocent Images/VCAC on the squad were eventually trained. However, once the child exploitation program moved from the Cyber Division to the Criminal Division, that changed. The funding we received through the Criminal Division was significantly less than what we received through Cyber Division , so the DExT program was no longer able to put on as many classes and certify as many people as it had before. By the time of the intrusion that forms the basis of this internal inquiry, only about half of the "child exploitation" Agents on my Squad were DExT certified. This is whilc vc wcrc still with CY 3. We got certified because the Computer Analysis Response Team (CART) was long overburdened and not familiar with the nuances of the child exploitation violation, such as the types of programs used by offenders, the vernaculars, etc. It was also known, and something I witnessed personally, that due to the reliance on CART and how long it would take for them to prepare a case for review, "hands-on" offenders were not being arrested in a timely manner. This resulted in the continuation of child victimization at the hands of the offenders the FBI was actively investigating. This was around the same time Agents working other violations began to also see an increase in the collection and reliance upon digital evidence in their cases. As DExTs, we were encouraged, and in some cases I believe required, to assist EFTA00173486 CART with their backlog by conducting DExT extractions for other squads. The other reason was to eliminate the lag time in searching evidence and identifying contact offenders (offenders who physically exploited or physically assaulted children) sooner. VCAC investigations are different than most other FBI investigations since, in VCAC investigations, a search warrant is generally executed in the early stages of an investigation, and the evidence needed to arrest and charge an offender is usually derived from the materials seized during the execution of a search warrant. Whereas other squads, generally speaking, execute search warrants at the culmination of their investigations. Mike Osborn was a UC of the Crimes Against Children Human Trafficking Unit (CACHTU) at FBI HQ Headquarters (HQ) and eventually an Assistant Special Agent in Charge (ASAC) at NYFO. He was a huge proponent of DExT. Being DExT trained allowed us to conduct our own data extractions faster, but more importantly, it allowed for a faster and more efficient way of identifying "contact", or "hands-on", offenders and, thus, rescue child victims of sexual abuse before they could be further victimized. After becoming DExT certified, we received DExT equipment that allowed us to image, process, and better review the digital files. The DExT training allowed us to better use FBI analytical programs to review digital evidence. Being DExT certified allowed us to assist CART by offering an alternative for other EFTA00173487 squads to use for data extractions. At the time, CART was not located in NYFO Headquarters City (HQC). CART was located in Moonachie, New Jersey. It could take an hour to get to the CART lab from the NYFO. CART evidence reviews needed to take place there and it could take all day. CART eventually moved to NYFO, HQC. The volume of data extractions we took on lessened the burden on CART. At least in New York, CART only had one or two examiners who could handle data extractions immediately, and almost certainly none who could respond after hours or on weekends. Since we dealt with child victims, it was, and is, imperative that the digital evidence be processed immediately. In nearly every child exploitation investigation the digital evidence is quite literally the evidence to prove the crime and without a prompt review, there is no probable cause to effect an arrest, putting the lives of child victims in continued danger. it is that very risk, the risk of continued abuse, that has prompted the FBI to enact new policies requiring expeditious investigation into allegations of child exploitation. This includes the expeditious review of evidence. Prior to the DExT training, onsite forensics, was not really a practice. We had to take digital evidence back to the office to view it and we relied more on the post-search interview. After a search, we had to go back and arrest an offender once we found the evidence. This made for a EFTA00173488 significantly more dangerous arrest because the offenders knew we were coming. There was also the potential for offender suicide. We had three offender suicides that I can recall. NYFO SAS Linh Phung, Thomas "Tommy" Thompson, Mitch Thompson, and I were DExT trained. SA Cindy Wolff (aka Cindy Dye) was also DExT trained. Cindy was the last to be trained while our squad fell under Cyber Division. At the time, I was the most junior Agent on the squad. Before being DExT trained, all of our digital evidence was submitted to CART for data extractions, imaging, and processing. We did have access to the Case Agent Investigative Review (CAIR) system, a forensic tool for data review, but the program was slow, not capable of handling large evidence reviews, did not work all that well, and did not do what we in the child exploitation program needed it to do. As a result, rather than using CAIR, Agents on the squad opted to travel to Moonachie, , where CART was located, to conduct their reviews on site versus over the CAIR network. The ineffectiveness of CAIR was no secret and was EFTA00173489 widely known, and one of the reasons for the creation of the autonomous DExT labs. After collecting digital evidence, I would enter the digital evidence into the Evidence Control Unit (ECU) and get a 1B evidence number assigned. I would then enter a CART request with a description of what forensic examinations I needed to be performed and information on the device that needed to be extracted. Then I would submit it to CART. It could take a day or two to get the evidence to CART and the amount of time it would take CART to process the evidence varied. It could take weeks or months. Once it was extracted, CART would process it in the Forensic Tool Kit (FTK). We could review the data on CAIR or go to Moonachie to review it. Everyone on the squad, for the most part, chose to go to Moonachie. CART Digital Forensic Examiners Stephen Flatley and Carlos Koo eventually set up a spot in NYFO, HQC to do data extractions. Even after receiving DExT training, we used CART for things like very large media dumps/extractions and encrypted files. We also used them to help us with understanding what some of the digital evidence was. I believe CART may have provided us digital copies of the data extraction and I think it may have been on DVDs. They would have been accessible on Operational Wide Area Network (OPWAN) aS well . I do not recall what we did with the copies on DVD. CART may have checked them into evidence and provided a working copy. The DExT trained Agents would do data dumps on everything we could like hard EFTA00173490 drives, loose media, and thumb drives. In 2015, generally if it was a device we could image, we would follow this process. We would use write blockers to assure we did not accidentally manipulate the original data. We would create an image of our evidence; sometimes we would use another hard drive. We imaged and processed the data. We had some hard dr4yetdrivesl but I am not sure where they came from. I believe HQ sent us a box of hard drives. I also believe CART may have given us some as well. We used a forensic duplicator called a TD3, and later a TX- 1 as well as FTK Imager, to image a device onto a hard drive and make the derivative evidence. We would then make a working copy image off of the derivative evidence. We would then work off of the working copy. I placed am pretty sure the in the NYFO ECU if derivative evidence was cataloged and that was the policy, but if that was not the policy we would not have done that. The DExT Program provided us with Redundant Array of Independent Disks (RAIDS). These RAIDs were to be used to house our working copy evidence images. I initially advised the interviewing SSAs, once we ran out of hard drives for derivative evidence, we were instructed to use the RAIDs and that these instructions came from either a r my supervisor. This is true, as it was the SSA and the case Agent for our squad's whose responsibility it was to request and receive funding and equipment. Any requests EFTA00173491 that we needed were routed through them, and the case Agent was also one of our DExT Agents who also faced the same issues of not having the hard drives to create derivative evidence. However, I also recall these instructions were provided by HQ, either our Program Manager (PM), the DExT PM, or both. This may have occurred in 2012 when I went through the DExT program and continued over the years. As there has been a revolving door of PMs, I do not recall the names of the people I spoke with at the can provide as many names of PMs who I can recall had been there over the years. Typically, the person running a Group I or Group II Undercover Operation (UCO) investigation and the squad SSA would be the people who communicated with HQ for resources. As an example, I recall in 2015, I sent an email to SA Tommy Thompson, who was the case agent of our squad's Group II, asking for some large capacity hard drives with our remaining Group II funds. This was one of many requests I made, which were generally verbal, for equipment/resources. At the time we were still merged with Cyber. When we moved to the Criminal Division, our funds were nearly wiped out. Sometime thereafter, tinh Phung left NYFO and became a DExT PM at FBI HQ. Shl would often complain about a lack of funding. When we first became DExT trained, it was much easier to comply with the policy since the size of the data was significantly smaller than it is today. For example, telephone dumps then often fit on a DVD, or worst case a Blu-ray DVD. Today, DVDs are nearly obsolete as the size of data collections EFTA00173492 has become enormous, requiring large capacity hard drives which are more expensive and harder to get. To be 100% compliant with the existing policy in—o—etiveri pliieach year, it would likely require C-20 alone to purchase over a hundred hard drives, and this is just one squad in one office. To ensure that everyone in the FBI is compliant 4e—it elven ycareach year, the FBI would likely have to purchase thousands of hard drives, then do this year after year. But the FBI does not do this and the policy it created to cover search warrants decades ago has not changed, despite the fact the environment the policy applies to has. This is one of the several fundamental flaws that I have and continue to voice. If creating derivative igvidence is a requirement, then why does the FBI not automatically rovide the hard drives? How can the FBI enforce a policy without providing the filed with the ability to comply? If, in nearly every search warrant executed FBI-wide electronic media is seized, resulting in the need for derivative evidence hard drives, why is it then incumbent upon each individual squad, in each office, under each program and division, to figure out a way to obtain the funding to purchase them? If the FBI knows hard drives cannot easily be purchased in bulk, and that there are security requirements on where the drives must be manufactured, why does the FBI not just purchase them for us rather than place that nearly impossible burden on us? EFTA00173493 In approximately 2017 I took over as case Agent for our squad's Group -II. As the case Agent I was able to use Group- II funds to make purchases, which were obligated to us .through CACHTU. -I was running out of hard drive space for derivative evidence and of storage space in general. The PMs told us buying hard drives in bulk was a problem. The stores had a capacity limit, but I was advised to try anyway but was not successful. I would purchase the drives on Amazon, like I was instructed to do by HQ, until my covert account was shut down by Amazon since the purchasing of large quantities of hard drives was flagged as suspicious. We were also purchasing hard drives from New Egg, like we were instructed to do by HQ, specifically SSA Heath Graves who was the DExT PM, because they could sell bulk (10 or more) hard drives, but I was later told by someone in the Procurement Unit we could not use New Egg. This left us with very few options for buying hard drives and despite voicing these issues, no one at HQ offered a solution. In speaking with other Agents across the FBI, I learned this was a common problem. I went to CART who gave us what hard drives they could spare. In 2017 I began to gain a voice among many FBI Child Exploitation circles. I took over our squad's Group II UCO, and almost immediately converted it into a Group I. This conversion, EFTA00173494 which allows for the use of sensitive techniques, was done due to my desire to enhance our undercover capabilities and increase our effectiveness by using some of the most robust undercover techniques available at the time. While every undercover operation must be approved every six months in front of the Criminal Undercover Operations Review Committee (CUORC), because ours was now a Group I, it also had to be presented up through CACHTU and approved by the AD. Assistant Director (AD). During the CUORC, I brought up the funding issues. In the funding section we discussed what we spent and what we anticipated to spend. During my time as the case Agent for my squad's Group I, my squad's statistical accomplishments increased exponentially. The number of undercover sessions conducted by my squad increased by 198% in the four years after I took over the NYFO child exploitation program compared to the four years prior. This meant an increase of approximately 2000 undercover sessions in the same four-year span. More significantly, however, was how I tasked undercovers and provided direction to ensure the program worked to identify the most vulnerable of the exploited children; and set out to rescue them. The results cannot be overstated in that the lives of hundreds of children were saved. While I am personally responsible for saving the lives of hundreds, many hundreds, if not thousands more were saved because of how I managed and directed the child exploitation program. EFTA00173495 In 2018 I did a five-week temporary duty assignment (TDY) at CACHTU. My former SSA, Sean Watson, was the UC there. My job was to call every VCAC Group I and Group II UC0 Case Agent and ask questions about the issues they were having and to provide recommendations on how to better the program, how CACHTU could better assist the field, things that needed improvement, etc. I learned a lot about the issues affecting the entire child exploitation program and, while there were some differences in the issues facing some offices over others, there were a number of common issues that impacted every office. These issues largely dealt with lack of guidance, direction, training, equipment, DExT support, funding, and personnel. I drafted a summary of the calls I made and created a section for complaints from the field in reference to provided my assessment to CACHTU leadership. One of the many takeaways was that nearly every office haUe different complying with policy and guidance. a—and EMIS This summary was also provided to the interviewing Agents and I can make it available to whomever needs it. This same assessment, as well as additional details were also provided to Bryan Vorndran, who was the Deputy Assistant Director (DAD) who covered child exploitation, as well as to my immediate supervisor and to the supervisors/PMs at CACHTU. This EFTA00173496 came as DAD Vorndran separately requested a working group of Subject Matter Experts (SMEs) to address the needs of the VCAC program. I explained to him how we had equipment provided my assessment both orally and in several documents. Also in 2018, CACHTU PMs SSAs Michael Deizlak and Matthew Chicantek were presenting to EdeeettEive—Managemen#II on the issues facing child exploitation investigations. SSA Deizlak and SSA Chicantek requested information from me that they wanted to present. I emailed SSA Deizlak and SSA Chicantek, along with UC Sean Watson of CACHTU, the write-up I sent after my TDY as well as a separate, even more detailed summary of the issues. In this three-page summary I talked about the need to appropriate money for equipment, as well as details regarding issues affecting the program, including the DExT, guidance, support, and more. hers nd I m it very Clear to HO that we did not have hard drives Every now and then they would send us COMP and eitertJELAuwtIenthey would send funds, but nothing was consistent. I also informed my SSA of the need for hard drives. I was aware he knew we needed them and there were no funds. Other Agents were dealing with the Same issues. It has been, and continues to be, the p ti 0fl g /CACAents to create derivative copies of original evidence if derivative hard drives are available. However, given the long toryofpotreogiving either the hard drives or the funds to purnhAse them, war leftwith Agra:ts have aa t_t_g_ n no alternative store their derivative evidence on local storage. I would sometimes create EFTA00173497 derivative copy of the evidence on the RAID tower, as well as a working copy. If the evidence was a large collection of different computer it was not practical_to store twn Copies (a working copy and derivative cois or the R11.M)mar an. I would only create one. However, I very_plitaft a efl riPriVAtiVP evidence rOpiOC onto either internal nr Pvternal hard drives that were maintained in our lab either as having been resicedi gp pseth agg l r wro or uired. Since as discussed we did not have a surplus of hard drives nor did we often have the funds to purchase them I used ones I was able to get or hard drives that had been repurpOSed. However, it often was the case where I maintained the derivative evidence of several investigations on a single hard drive. This was due to the , and the fart that I did not want to waste the extra space that was free if a particular case only took up a portion of the hard drive. As reeourree were hard to come by I maximized the resources I did have. These derivative evidence hard drives were separate and apart from the evidence copies maintained on our RAIDS or servers. I was not able to do this for every investigation, due to the limitations discussed, but when feasible it was done. This was my way of going out of my way to create dDerivative eEvidence as often as I could, despite not having the resources. I have located some of these hard drives that are still maintained in the r-20 lab, and phntng A hs of them have been provided o h in rvi wing S$AS. EFTA00173498 When I was unable to create true derivative evidence to be checked into ECU or the derivative evidence described above, I ropidered the working_cOpy of the evidence on my RAID or lerver as the derivative copy. Regardless. III the evidence copies had "hash-verification" logs to ensure the coot' was a bit-for-bi used were designed to prevent changes to the vi n so there was never a possibility that the evidence copies could be Petered I have various correspondence with HQ advising there was a lack of funding. This not only affected us getting hard drives, but also various other things. Phung provided us with more RAID towers for instructed us to use the storage to meet our needs. I do not recall her exact words, but I understood her directions to mean I could use the RAID towers for the creation of derivative and working copy evidence. I also learned funds were available, but not designated for the purchase of the hard drives. Money was either not there or was allocated to something else. I spoke with Heath Graves who was the DExT PM and then Jim Harrison who iS the current DExT PM. In June 2023, I proposed an idea to SSA Seamus Clarke and ASAC Spencer Horn re ardin how to address the issue of handling derivativeevidenre cinre the long -etanding prnrecs of tieing external media to store derivative evidence was no longer Commented (DWI]: I movcd this up DW 2024.10.19 13:34:00 Commented (IDW2J: I movcd this up DW 2024.10.19 13:36:00 EFTA00173499 practical. SSA. Clarke and ASAC Horn liked my idea and encouraged me to reach out to the ECU to find a way to pitch the idea. T reached 011t to Supervisory administrative Specialist (SAS) Arlene McKenna, who the NYFO ECU. SAS McKenna also liked my idea and stated any changes in the evidence guidelines or polity would have to come From the Field Kvidenre Eliggrem (FEP) of the FBI's Laboratory Division (LD). SAS McKenna provided the name of the FEP's Supervisory Management and Erogram_AnalystAIMPAL Adeline Josephi_and_Suggested I rear)) out to her. On 06 07 2023 I spoke with MAPA Joseph via FBINET Skype mall. I discussed with MAPA Joseph the issue with the current process, which was feasible years ago when the size of electronic evidence was significantly 'mailer In_those days, derivative evidence was stored blue-ray DVD or thumb drive. However, in recent years the size Of electronic evidence sei,uros has increased dramatically& requiring hard drives to be able to accommodate the data, ;sp_ sidthlat l„ 0 xlair ahil I personally have never had an issue Obtaining DVDS, I could not Say the same about hard drives. I PKPleined that while the technical environment the ECU policy/guidance is based cn ala changed, the FBI'S guldrgice/p_ocyndn li r n i h not. This has created the very issue which is part this inability t.4 amide by the guidance/policy T stated that it has become increasing ly difficult for the field to be in compliance with EFTA00173500 the existing guidance/policy since the field no longer has the resources to be compliant. I offered to help figure out another process fox maintaining derivative evidence, as I believed it was a waste of money and resources to purchase expensive hard drives for derivative evidence which will jnet he checked into evidence until the conclusion of an investigation, just to then be destroyed. I spoke with MAPA Joseph about creating reusable virtual derivative storage that was Brand-alone. I suggested the virtual evidence locker could be a server, which could be controlled by the evidence units and that 1g numbers could still be used and assigned to the folders of the derivative evidence aosed the use of an electronic chain of custody procoe.e to docnment the Arreq.e of the electronically stored derivative evidence. I further suggested that since the derivative evidence copies were maintained electronically, there would be no need to waste fnnde on hard drivee that would jnet end up being destroyed anywav4 and that at the conclusion of an investigation when the evidence iS to be "destroyed", the media would be deleted, thereby freeing up space for new derivative evidence. MAPA Joseph liked th suggestion and stated lis t2oA.4 would discuss it with her team, s•-cifically her UC whose name I cannot recall. My SSA and ASAC, SSA Clarke and ASAC Horn, were both aware of my idea and conversations and encouraged me to follow-up with MAPA Joseph, which I did via email nn 06/27/2021 This email, which has since been provided to the interviewing SSAs, stated in part: EFTA00173501 "Hey Adeline, A couple eeks_ago we had a disrussion,about authorizing our lab to store DE on our servers, rather than the repeated, costly, an4 wasteful process purchasing tons hard drives to store TIF The Center, which would he seeflre, CSmainacceSSIcagasandatili—seggirea15fOrthe electronically_stored DE, would take the place of the physieal hard drives whir")) would lave money_time, and eliminate the need to waste tons and tons of hard drives. I _was wondering h and if there is anything we can do to get something like this goingl Thanks so much! Aaron" MAPA Joseph responded on 06/30/2023 with the following_ "Good Morning Aaron, Moo All ie well Apolog for tl y i delayedresponse. Jea lw in in- person training this week for evidence tech's. For your awareness, we are working on wrapping up several projects for this fi c ar. I am adding DE idea to our whiteboard to discuss thi amongst the team to include all key stakeholders that wo yow d involved. don't min, I'll send you a calendar invite So that it's on my calendar to cirri.. back with you to discuss what the team decided Kind regards, EFTA00173502 Since this emaill I have not heard back from MAPA Joseph or anyone in her chain of command regarding this issue- I have provided a recent example to the interviewing Agents. In this example, which took place II November 2023, after the intrusion and inquiry, C-20 requested funds for derivative evidence hard drives and were denied. After requesting $2,155.62 for derivative evidence hard drives, CACHTU responded to "Please utilize cart for a resource for this. We are under a CR and are very restrictive on what we can approve". C-20 then went to CART, as directed, who in turn stated they did not have any hard drives to spare and recommended C-20 request funds from CACHTU. This example further illustrates that even despite the intrusion and the negative attention we received regarding derivative evidence hard drives, the squad was again put in the position of being unable to comply with policy because the FBI would not provide the requisite hard drives or funding needed to be compliant. Sometime later C-20 would eventually receive some hard ere then advised by the NYFO Information System Security Officer (ISSO) their hard drives were out of policy and that they could not use them since the hard drives were not manufactured in the United States. This, again, put the squad in an impossible situation with no alternatives being offered. It EFTA00173503 was also quite ridiculous as it is likely that none of our computer equipment is manufactured in the United States. almost immediately converted it into a Croup I. This conversion, to my desire to enhance our undercover capabilities and increase our effectiveness by using some of the m st robust undercover operati n must be approved every nix moatha in fr nt of the Criminal Undercover Operations Review Committee (CUORC), because ^ACWTU and approved by the Assistant Director (AD). During the During my time as the cacc Agent for my squad's Cr up I, my cqual number of undercover sections conducted by my squad increased by 198% in the f ur years after I took vcr the WYFO chill compa.ed to the Co.- seas Thls meant an increase of approximately 2000 undcrc vcr sc-si no in the same f ur year span. M rc significantly, h 'fever, was h w I worked t identify the m ct vulnerable of the cx1 .tsii that the 11.t.s of 4 Leda of child-ee 4e-e eased. While I am personally responsible for saving the lives of EFTA00173504 I bccaucc of how I mana cd and directed thc child exploitation Agite- gre*ee rege'rdeltrit3/4 - be- seleireee- he-4aet9e-e4-4tafteR4411 lie 1-.01 ele-J -4--ttedet, CC.\ Cla-k- a..J .ICAC lik-J 1-1-e -d en "lebe"reetal - etit- be- Ste- €13 /4 - £4 6-ire riteh - t41e- Mee'r ICAC) A-1- - m llL CY70 CCU. CAC ti-X--au lik.A ft, LhS titti.debittee-er-Debberwent441-hemme-ba-ceme-bram-bite-Fielni-Demialemee to•leffi-4•Fis'P.-0.&-sle—r-a•i-s—eberetese seee-4-fr&i-6.k6—meicea4te 1 •-• Peeerem- Avelts4- 14441,11M- r ikeiel'ime- geeePhra terYeek•eel- I--reseet k-- r - rmemr, 11. -11. I d' 3-J -1th Will J---rh ' --tb tb- .eh reeeeee7 . 04Seit". 04" 4rnett4leb4'e'lea. 61 1319^-00iteri- Ste-041Pe- e'fi earaebistas-embiaiwboasia-M4rwiamosblet-assaaaw—lor-Okess-eartss e„18---- -ea ste-ed ea DVD- and f scie---s k-s 1-e--e-aLd d-d-at-eally, -in 1.43 b- Si.. Le d-ta. EFTA00173505 I tlai-J4 -Lac I pc„ce..ell) Le.t had a- Jht----.1 DV a, III' ‘ eette.r4 th'44a--i-f e t‚ir li —t4te-42 e494444er t.. ab.d- be -t-ted th-t .1 Le- h----- • C It • C C • 1 e. .1 I the e-latl-e I-.J-n--/p-I.e, el-e- tkt f.-Id h-- 1h- le b._ cemplleht. 4 ee elettiapee••••-esaieiefeeer-wiei-ele-•44-1-jeee-kee-Sieekeel-ieete-e•idenee le -Le. ee..1d L. a -hl-h L- be-eseekerwheeeitee# te th- feld--e e£ th deeieetiere—ewieleneee th- -se of e.. ele-t-ealt ei.-1- -f s 1-...S4 a> ••••• y I (-rat- nhety-et-4 th-t J1L-t thz * L- n-_d te -e-t_ lanai- en hee.d ,h-t ,ea,d 'ant .p h-Lon eLaf...f.A e.t.a -t t6.. e-ttlea.a- sf — EFTA00173506 A-14 L- d-lel-J, th-i-b, fieela./ -p fai . ih- -J -t-e ,,,, •Ninti-t -11. ?1, Jed AC:.47 1...-th nee-- my Id-- -ed me.J 'm 4.el-lem-tte-iereit-tertaire-deeeember-iditere-1-diek-e4e-emmeld-en-46424+242-3m Tela h-a h-„ia th- Ad-l-e-, e -r leL te ete._ DC o eemetriee-seeeete- keer eteed- s't444-eset?u4"Pe'e-4e- fee- ehe -1 L- J linri -etc thc -c-d te -aete le -es a-d U.rs af heid 4.14-a - , 2 , ;$ ,) .- es- de te 9-1. 11L- thl- e-1-y? zilleserlee-eee-emielele Ameeid: HIZA Jesa,iph -e OC/30/2023 -ith th- felle-1-, arzottertie44meerieety-Pereemer W- ei- eetri-eti-ey In EFTA00173507 t- d' a tLin amenvo1 th- le :..el-d- all 4terstatekel"ele're- Stet- weal aii".94" 41 I4' eeLt""4"freir te-eMeele-rneed-mriee-pett-to-deepettee-whae-eive-heatn-deeededv Eind Jaya mitea LEL, f.em RAN. Ja:A.ph a. 444441 901441.• 2018 : did a fi.e tcmposeet—doey—aaeOgnme.t. ITDY) at CACHTU. My former SSA, Scan Watson, was the UC there. My joie tettetell4+ —everrVeAe—e'rentr÷—ewtei—Erretr±+—Uee—ene—helent— Arnti er-INere recommendations on how to better the program, how CACHTU could ednict (die field, things that d,ed,d Inp.evement, etc. : learned a lot about the issues affecting the entire child cxpl itati n program and, while there were some differences in of common issues that impacted every office. These issues largely dealt with lack f guidance, direction, training, equipment., DC P dayea.t, I J-adled e summary of the calls I made and created a section for complaints :rem th, field in refe.e,e, to et, CACHTU lcadcrohip. This summary wan aloe provided to the EFTA00173508 itterviewitragertest-enel-4--eeterritaite-it--aveiaat-le-ltithemever nccds it. e4w4e-perweidad-tre-Drywn-Veehdrehr-whe-wee-the-Depehy-Awleisteet Director (DAD) wh c vcrcd child cupl itati n, as well as t my i-ntmeel-i-atesuperviser-arrel-fre-t+te-strperv+ser-s4-Pi4s-at-C-A ris came an DAD Vorndran oeparately rcqucoted a working group of -ubjcct Matter Experts (SMEs) to address the nccds of the VCAC provided my assessment both rally and in several d cumcnts. Alm, I- 2018, CACHTU PH- CSAa Mlehe-1 D-Irlek e.d Matthew rhicantck were presenting to Executive Management on the issued 4.-atiltg-t+ael--erri-eitte-ieri-rr .vest-i-eset-i-ert-SSA-Bei-r-1-erk-entel-3534 Clekeettsek r-gae-Led -e that th-f present. I entailed SEA Dcizlak and SEA Chi antek, al ng with Ur Geo.. W,.taea of CACHTU, the writ- .p I 9,Lt after my TDY an well as a separate, even more detailed summary of the issues. In this three page summary I talked about the need to appropriate money program, including the DExT, guidance, supp rt, and m re. Ge4eee C.ei, -e- and th-.1 Lh-, -e-ld eL..J L-t ...Ahiaq .40 jerreerrneel-for-reSA-e4-tite-Freed-ier-itted-elereee"—I-"rere-essere-ite-4mew wit.hrtt-ite, hew-Pews . refl..- 4.- EFTA00173509 p-attl-t ef VCAC 7.g-..te te e-eat- de,....-t...--eepeee-ed Hawevers-erevem-thm---le _ merheemarred-teet-seeme-v-erreatieter-the-head 4-+Petrl'''S- e'ente€41melg- eceate- s- ekkei~i'v'e- eeere 4- t4 te -e RAID t-e..., ae -ell as a -4.1.14 . :C "Pee- q‚e~et"ieerlehe - see're- bwe- etries - ki- weekkPrerectri- efltS t- T.)y) ar. tke AA:D le-e- and : -8-1J emly e-e-te . •- J •.1 :ILL- --It...el e- --I--mal La-d d-1.es th-t -e-- -a--te-./eJ I. egie-4•14"7- e'itiTe riar erstal 14‘ gmbrniPeersins• Sel" .i'PeST i'neerneeeeeee d f" 4 " .fe eed ' efl ha .e Ile f-md le p...J..1e- tk , I --Lå :t ette- -ae tIe e-e- -Le-- I th- it- ef- ebiet34-e- nered- elei've•-;24Tie lb 44SI II.kii.et" ‚ Paet"be —. 1'eate —Ste —egebt's~ t-e- :f a pa.LIe-la. t --k ..p a -C II.- 1.--J i • i br. - -1>e e -e --t-9 T J FkAtee-er-earmare ems-net-elmla-t-e-ée-tha-e-See-evemy -etlep.tlen, d-e Le Ih- :tal' Ltt -h-. EFTA00173510 rwrflmn Pe --A • 9 "% >9...•rni ital. to* th -t a ht.I1 - th- C 20 1 b, --J ph-t-g.a r L, I k “q CCha. Scu er the dc.le:Ale- -N.d--e- d-J—ells-ei sissy-, I abseb-reerfrembre ttm•emenee-Mte-eeprwee-e-hrb-fer-irrt paa.:..k. orlimeredm 201' : t_ e- it: Child .1-eet 1--ediet-1„ -e-.e.ted .t 2-te a 0.e -p I. ?Lie e--. dr alle-e is.. th- -e- ef e--eiti.e te-h-lq-es e ..as d-d- d-e eff-eti.--e-e b) sal-, e-m_ ef th- m-et .eL-et -d---e.-r the ti--. WL1I- e.e., -ade.ea.e- 'L- • 44- e-COMI SIIII CUORC, 1 b.e-qht ..p th- las-e-. I- th- f-Rdi-q e-ctie. iretilipeterreeehmeratt-tre-eperet-ermr-whert-we rrear-re-eperm4 etteigirm esee-Alenb-fier-my-eper ntr-1-7-my-epertetei -Létlistisl EFTA00173511 the Ce-.. aft-- I Leek NY: child mentor ~n we -Led 1.. C.- --et ,-1----L1- ..f th11.1--.., -es-lts r) A A.) 1 W411- I am Ce- the li--- et -c.e ou„(-1 b. • s 1 u T ft 1 /1 • 1 1 When interviewed by INSD, I was asked when the standard practice for C-20 members changed to not adding derivative copies to the ECU. According to INSD, I stated I did not know, but the change did happen. INSD then asserted that I now believe the practice of creating derivative evidence copies onto separate hard drives to be checked into evidence was dependent upon we were provided funds to purchase the drives or the drives themselves. This is not entirely correct and lacks context. The "change" that occurred as somewhat two-fold and started when the FBI moved VCAC from the Cyber Division to the Criminal Division and the funding we received was dramatically reduced. The other contributing factor was, as discussed earlier, the increase in the size of the electronic media seized during search warrants and the subsequent need for significantly larger EFTA00173512 and more expensive media to house the "Derivative 'Evidence. This affected many things, including our ability to purchase hard drives. Sol the "change" that led to our inability to regularly comply with the derivative evidence practice was out of our control. Despite that, I personally voiced this concern numerous times over the years, but it was not an issue many were willing to care about. Early on, when VCAC fell under the Cyber Division, we had regular access to these drives, but when the program was moved into the Criminal Division that changed. Despite repeated requests, as well as having alerted everyone within the chain of command, we were told to figure it out. We had been advised that if derivative hard drives were not available, to store the derivative evidence on our local storage, which is what we did. It may have been in 2016 or 2017 and possibly happened because we did not have hard drives. I believe we were initially getting some hard drives from DExT after completing the certification course. DExT slowly went to no longer providing hard drives to new DExT certified Agents at all. I do not know what they are teaching about digital evidence storage in DExT or how to get drives, but I know from other Agents who have attended the DExT training more recently that guidance has still been to seek funding from CACHTU, who again has been stating they do Until approximately designated ISSO. This is not have the funds. February 2023, the NYFO did not have a a required position, and I think it being left unfilled exacerbated many of the problems that are discussed herein. EFTA00173513 retired Special Agent in Charge (SAC) Nicholas Bouchears who created a timeline and report of his years-long request for an ISSO, which was a requirement that the FBI left unfilled in the NYFO until January or February 2023. The situation was in essence entrapment. We were by policy to create derivative evidence, but we were not the ability to comply. Despite repeated acknowledgements from FBI HQ about the conundrum, solutions were never provided. We were told to adapt and to figure things out, and we did. The result is that we got punished for it, which is quite insane. We should not be held accountable for a problem we could not fix and were not responsible for fixing, When derivative hard drives were not available, we did as we had been instructed by imaging t he original evidence onto the RAID Storage or Network Attached Storage (NAS), and as previously discussed, I even went above and beyond given our limitations by creating derivative evidence copies of multiple cases onto larger internal hard drives so I could ensure I was doing everything within my power to comply with the times I would create a second copy. If I made a second copy, I would use one as the main copy and the other was the working copy. If I did one copy, that one would be used as the working copy. At times I would make multiple working copies EFTA00173514 According to INSD, I advised I had not been making derivative copies of digital evidence and that I now believe I personally made derivative copies and did whenever I was afforded with the requisite hard drives. This is incorrect. From the beginning I have never wavered and have always been adamant that I had been making derivative evidence copies whenever preet4eelpossible. As I have also stated, this was an FBI-wide issue that affected many 'gents, including many in supervisory positions. The issue • not that derivative evidence copies were not always created, the issue is why the field was not always provided with the ability to create derivative evidence copies. The issue regarding derivative evidence that I and other' faced was well known to our supervisors and specifically to our substantive desk at HQ. The question for us in the field was what do we do? Do we stop investigating our cases because wail' hi have a sufficient process for creating and storing derivative evidence? Of course not. Just because I, and others, did not always receive the drives did not mean our VCAC lalglagps till had to adapt and overcome and felt that while II may not have been able to create derivative copies for III the evidence, the reasons for that were well documented and out of III control. Had we, or I, decided not to work cases due to the lack of derivative evidence hard drives or funding for them, we would have been punished for that as well. Aside from neglecting work being itself an offense, there are other policies governing the child EFTA00173515 exploitation program that explicitly require child exploitation Agents to expeditiously conduct their investigations. It is like being stuck between a rock and a hard place, and I, and others, were told by FBI leadership over the years to make do, as long as the cases were being properly investigated, and that is what we did. At no point in time have I ever IMI=Iistored digital evidence at my residence. After the intrusion when the FBI's INSD conducted their interviews, I had been asked about "evidence" and reviewing materials from home. I acknowledged that I, like everyone else, had done some work from home. However, the " evidence" being referred to has always been "working copies" and items that are absolutely covered under policy. At no time had I taken original or derivative evidence home. I believed that I had cleared up any misunderstanding or ainantics over the word "evidence", because tom—that word used without a descriptor is just a generic term for evidence. The word has types, not cmcluaivc to "original" r "derivative" evidence. like a classification to distinguish what the evidence is such as "original", "derivative", and "working copy". Then, there are caveats to the category of evidence such as "digital", "general", "drug", "valuablefinaLciii", etc. For example, when I review subpoena returns, 4B-4e—oppirte—prespeo4B4/I am reviewing " evidence", but that does not mean the evidence is "original" or "derivative", and unless those subpoena returns are in paper form, they are categorized as "digital evidence". Nevertheless, I am authorized to review those from home. that I am reviewing. EFTA00173516 The same applies to Or—chat messages derived_from a devicer or having been included in a lead or Guardian When discussing this with the Inspectors, I was clear that anything I reviewed outside appropriate facilities was working copies. At no point had I ever discussed with anyone that I have taken original and/or derivative evidence home or in any way in violation of policy. Any assertion to the contrary is categorically false. I have recently found a folder that I created on my FBINET computer called "to Take home for baby leave". This folder contained items I planned to take home to work on while still under the work-from-home guidance we received during the pandemic, which is also during the time my wife gave birth to our twin boys. The items in this folder are generally indicative of other files I had reviewed from home, none of which are original evidence, derivative evidence, or CSAM. Other examples that have also been provided to INSD include an email from CACHTU SSA Jordan Hadfield which was sent to all VCAC OCEs. The email was sent during the pandemic when OCEs were working from home and is requesting to know if OCEs were aware of a website contained in the email. SSA Hadfield instructed the OCEs to not use their "HOME COMPUTER" to access the link because it contained CSAM, however SSA Hadfield knew OCEs had their own FBI-issued misattributed laptops and phones that they could access the link on from home. Another example is from my supervisor at the time, SSA Sean Watson, who stated in an email dated 03/25/2020: EFTA00173517 "I will be assigning Guardian lead(s) which can be worked from home or an alternate location. Reminder for 305 leads, do NOT use personal networks to vet out 305 leads. Use covert equipment with an aircard or covert cell phones." Throughout most of its existence the C-20 lab was Internet connected. However, and for clarification, the C-20 lab existed long before the DExT program and the misattributed Internet was connected to our misattributed computers. At the time, work was primarily conducted on computer-based Internet platforms whereas today, the majority of OCE work is on mobile-based platforms. Back then, we used misattributed FBI-issues desktop computers to conduct OCE sessions from the lab and adjusted eutour work hours accordingly. As offenders began using mobile- based applications, OCEs were required to do the same. With the use of mobile applications offenders were now online and chatting throughout the day, versus just when they were on their home computers. Thus, the expectation of OCEs changed to emulate that of the offenders. I do not know exactly when we received FBI-issuede misattributed cellular telephones, but when we did, we also received the authority to take them with us wherever we went if we were engaging with CSAM offenders. In fact, OCEs have long been encouraged to communicate with offenders at random hours of the days and on weekends, to send offenders benign photographs while on vacation, at events, etc.; all to better EFTA00173518 legitimize the OCEs and help to dispel any fear offenders masi have that the OCEs are law enforcement., When we became DExT certified, our computers were not connected to the Internet except when we needed to update software' or some other Internet required task. As the years went on, the need for our DExT computers to be connected to the Internet grew. As discussed, HQ was aware of this and at times even promoted programs that required this. Additionally, two agents from C-20 and our SSA had all gone down to CACHTU to become SSAs and the UC respectively, and they were aware of this practice and need both from having worked on C-20 as well as from their positions at CACHTU. Lastly, as previously discussed, at the time of the intrusion our squad had been participating in a CACHTU pilot program, which included several other VCAC squads from across the FBI and required the computers to be connected to the Internet. Regardless, our lab has always been "stand-alone", meaning none of our computers to any FBI systems. Additionally, our lab was "misattr buted" and able to be used in covert capacities and to access websites that could contain Child Sexual Abuse Material (CSAM). Initially, in approximately 2012, the C-20 lab was not connected to the Internet, but at the time we had little reason outside of software updates to be connected to the Internet. Several years later that changed as the advancement in our software and capabilities grew, requiring our computers to be Internet-connected. The only guidance or direction we received EFTA00173519 at the time was that our Internet-connected DExT computers not be connected to a FBI network and as far as I have always been aware that is the only policy on the matter as well. Even FBI HQ implemented investigative steps that required DExT labs to be Internet-connected, such as the method that was used to transmit CSAM to the National Center for Missing and Exploited Children (NCMEC), whereas previously it had been to do so via a storage media. Later, the FBI created the "SIFTS" program which was an online portal for CSAM transmission. As an example, the FBI'i SIFTS has been provided to INSD which includes IIMMIFAnes must be connected to the Internet In approximately 2022, CACHTU advised the field that the licensing method for one of our most used programs, "Axiom", was moving from dongle-based to cloud-based. CACHTU wanted to pilot the cloud-based method and elicited the assistance of five or six VCAC squads from across the FBI to do so, one of which was our squad. —This pilot program, which began prior to our intrusion and continued well after, required the DExT computers to be connected to the Internet. It allowed us to check out a license when we needed to, but t,—II do so, we needed to stay on the Internet . There was some level of security provided by the switch box and some on the NAS itself. The computers, NAS and RAID tower storage that contained CSAM were then all connected to the Internet. We received guidance from CACHTU, specifically from the DExT PMs, to disable Commented (CT3): Chat about this lore C20 Tedaeam 202410.08 12:46:00 EFTA00173520 the antivirus to use the Axiom since the antivirus would flag the program. I believe this came from Tommy, Heath, and CART, and others . Squad C-20 did not know how to set up the Internet and the switch box. We reached out to Computer Scientists (CSs) and CART and received some help, and I have numerous emails that I can provide to support this if requested. I do not know anything about networking and how to set up networks, . The CSs also did not know. I believe someone from the Operational Technology Division (OTD) told me to Google it were AN, the Would 6MIIIIr weeillecoulat use OPWAN Since did not have an OPWAillrection, plus the size on have been too m OPWAN to handle Networking is not a DExT function and is not in my skill set, so I did not even know what questions to ask. "T "RS®' stated naringSMINWWWWWWWWWWWWWWininriny squad,li Systems Administrator. Despite the INSD having labeled us this in their post-intrusion report, we are not. We have never received any training or instrulliton on systems administration, and labeling urs.miaatimealedge we did not possess. The off-the-shelf security that was in place was what we were using. I and the squad asked everyone we could think of for help - CART, the CSs, OTD, the office of the Chief Information Officer (ooio), Management Information Systems (MIS), etc. however, all were of no help. EFTA00173521 CS Jim Walsh and ITS Steven Flatley helped us set up some of the equipment. Christian Idsola from CART also helped, as did another CART employee whose name I cannot recall. I ME asked FO CART s•uad, foci, M in_moony Broderick, 191.,., 1., the These communications, along with many others, occurred in writing via email and them can pr vide them to investigatorSI. In our desperation to find someone with a networking/system administrator background to help us, we put out a Confidential Human Source (CHS) canvass for assistance with our network through our CHS Coordinator. We also reached out to OTD, Counterterrorism Division (CTD), and Cyber Division (CyD) for help, but none were able to. An Agent on a CT squad suggested that they had a Counterterrorism (CT) CHS who could come over and look at the network, however the CHS advised networking was not his/her specialty. The CHS was a former contractor for the FBI and had a Top Secret (TS) clearance and was not able to assist. Commented (in]: Plate do in. Provide them to INSD. Jim Roberson 2024.10.22 12:54:00 EFTA00173522 Our request was simple - to network the few standalone computers in our lab. However, no responsible entity within the FBI would assist, so we had to reach out to friends and colleagues to help on their own. While their help was valuable, none of our volunteered help came from anyone who was a network or systems administrator, and the FBI's network or system administrators would not assist. The various networking and system administrative units in the FBI handle FBI networks, and the few that handle covert/misattributed networks do not handle CSAM networks. Despite the irrelevance of the latter from a technical perspective, CSAM is offz—putting and no one wanted to assist and CACHTU did not know what to do. In fact, CACHTU was aware that networking VCAC computers was an issue affecting so many other FBI Offices that PMs Stacie Kane, BrIndln Roth and James Harrison encouraged us to find the solution so that it could be emulated across the other VCAC DExT labs. fact, our mid the improvements we had been making on behalf of the VCAC program, contributed to several end-of-year "gold" ratings by CACHTUJ As an example, in September 2022, SSA Brendan Roth, who was the PM for the Northeast region for CACHTU, requested IIII I the VCAC squad who needed to enhance their . FBI Albany was trying to figure out how to receive funds for their upgrades, and SSA Roth knew that I in the NYFO had been this process and asked that I assist. After SSA Roth and I spoke over the phone, he sent an email to EFTA00173523 myself and SA Brian Seymore from the Albany stating in part the following: "Aaron Per our convo about Group I UCO funds for CSAM review stations - CC'ing Brian from Albany. Maybe you guys can talk and answer questions he had about the process and questions you were asked about it from legal/procurement. SSA Brendan Roth Criminal Investigative Division I Violent Crime Section Crimes Against Children and Human Trafficking Unit (CACHTU)" Ii e with a administrat r background to help uc, we put out a Confidential fitmen-raarretrese-4er-assietenee--wi-t4t-etrr-netwark th-e-qh-e ehad e-t t., OTD, untcrtcrr rirm Divisi n (CTD), and Cybcr Divici n (CyD) f r c me over and look at the nctw rk and he/she advised networking vac Rot his/her specialty. The CBE was a f rmcr c ntract r for the rni a“d il“el a T.4) See—t (TS) ela.a.et. Thls whwa the lab wa:: on the 9th floor prior to it getting fl ded. In 2017, ounIIMB flooded after the temperatureillerthe lab got so hot they triggered the sprinkler system. This devastated our lab and ruined thousands of DExT equiPmarrbaudigiar this flan Ott flee leb "wwel—I, some of the equipment was replaced by CACHTU and CART was able to salvage some of the equipment. We moved the C-20 lab to the 10th EFTA00173524 floor in December 2020. I received approval on 12/22/2020 to purchase switches, NASs, cables and hard drives. This equipment was purchased with $34,000 in CACHTU funding, which also supplied the Long Island Resident Agency (RA) with similar equipment._ for the lost upgrades. CACHTU PM Leslie Adamczyk was a former NYFO Agent and member of C-20 and knew about these issues. SSA Adamczyk similarly had her DExT computer connected to the Internet and similarly did not always create derivative evidence. During the COVID pandemic there were three of us from my squad who came to the office on a regular basis; myself, SA Matt Deragon, and SA Brian Gander. The guidance, however, was to work from home. The C-20 SSA at the time was Sean Watson. SSA Watson provided guidance to work from home, in addition to the guidance pushed by the FBI Director, our AD, and others in FBI management. This guidance included conducting limited forensics from home, and CACHTU pushed out to the field temporary AXIOM licenses for reviews from the sole purpose home. This meant of conducting limited forensic that literally the FBI was encouraging Agents to conduct forensic reviews, of evidence, from home. e of this NewevesTriCe fEi bulk of my faTiEire-reviews meant reviewing CSAM. Due to this reason,- I came into the officeliamignm dally fn 00 CSAM reviewS‘ This is a fact and can be corroborated by SAs Deragon and Gander, as well as by checking the building access EFTA00173525 logs which will show I used my access badge to enter the building and the frequency I accessed the building. Other work was done from home. I looked at subpoena returns and reviewed working copy material that did not include CSAM. Anything I took home was covered under was covered under the guidance being disseminated. I have a Bureau-issued laptop computer that I utilized for these purposes. It is categorically false that I violated policy by taking home CSAM, original, or derivative evidence. FB SSA about r f exa les to !gab and requeitted.., At the time, I was working on three cases primarily: Robert Hadden, Darnel Feagins, and Jacob Daskal. Only one of these cases, Feagins, was a CSAM investigation. The Feagins investigation was the reason for my having to come to the office during the pandemic, which eventually changed when, after indicting him, Feagins fled, turning the investigation into a fugitive matter. The Daskal and Hadden investigations were contact offense, or "hands-on" offense, cases that did not involve CSAM. To conduct the investigation for Hadden I was doing web- based interviews from home and writing FD-302s and subpoena returns which were all non-CSAM-related. For the Daskal case I completed a 68-page DExT review FD-302. I took metadata-related information. Some of it was exported from Daskal's computer, but EFTA00173526 none of it was CSAM; rather it was data to prove he and the victim of the investigation were together in various locations and certain dates and times. For the Darnel Feagins case I was splitting the work. I did not do CSAM-related work from home. I did not take any storage devices home that were original or derivative evidence. Any copies or data I took home would have been working copies. It would have been impossible for me to take derivative copies home in general. I was coming IIII the office every day to do my CSAM reviews. I do not believe I was doing any OCE work at the time since we were instructed not to. We were trying NOT to create a need for Agents to have to run out on warrants or to conduct Knock and Talks (KTs) due to COVID unless it was an emergency - and other OCEs would do OCE work from everywhere, including home, but all of that was covered under our Group I authority. According to INSD, during my original interview I advised that Agents believed they were authorized to conduct OCE work outside FBI space and that we now have uthority to conduct OCE work outside FBI space. This is a slight of my statement as to this day it is our belief that we always had authorization to conduct OCE work outside FBI space. The reference to now having an EC was in response to additional questioning by INSD and did not change the fact we had appropriate authorization prior to the EC. For one, how we functioned as OCEs, to include when and where we conducted OCE sessions, had been directed to us through FBI EFTA00173527 trainings, FBI HQ, and our supervisors. Second, the authority was written in our bi-annual renewals, which are reviewed and approved by the entire chain of command and include the and Regarding anything I took home to work on, I have always been certain what I knew I was authorized to take home and what I was not. As , I would take home removable storage devices like a hard drive or thumb drive that contained working-copy data and/or other material that would allow me to work from home. Some of my devices, including my FBI-issued OCE telephone and my FBI-issued and encrypted laptop, may have had CSAM on them, but as an OCE who was authorized to conduct OCE sessions from outside FBI space, which included my home and elsewhere, taking these devices home was covered by policy as these devices were used in authorized and capacities. The OCE and UCE polices allow for these things since communicating as an OCE with VCAC offenders can require around-the-clock communication. here is absolutely zero truth to any notion that i violated any of these policies. I was quite literally doing my job, which as a VCAC OCE, meant taking my OCE laptop and telephone with me outside FBI space to communicate with CSAM offenders. The communications with these offenders and any CSAM I collected as a result, were maimed in accordance oll olicy and that is lust a fact. As for any evidence review I did from home, all was done in accordance with policy and guidance. Despite a semantical EFTA00173528 difference of opinion with INSD, I know that any evidence I did take home was authorized under policy - it was not original or derivative and was only working copies. Even as a matter of logistics I would not have been able to take home original or derivative evidence as I did not have the technical equipment at home to review them on my laptop. I would have required write blockers and/or other equipment to access original or derivative evidence so despite the notion being outrageous anyway, it would have been a nearly logistically L.r.,ssiblimpossibilitye. Anything I took home to review was a sub-set of working-copy data all authorized to review from home. All original and derivative evidence were either checked into the NYFO ECU or on the C-20 lab server. The lab server had to be connected to the Internet II send CSAM to NCMEC. As mentioned previously, the official way to send CSAM to NCMEC is to use the SIFTS online portal. They will accept hard drives. but it is not what they want, and NCMEC has been moving to eliminate the use of hard drives altogether. There are conflicting policies, and I brought this up while assisting in revising the policy. I am one of, if not the only, Court-certified expert witness for the entire FBI for child exploitation. During COVID, the concept of remote working was becoming a thing. The idea came up during COVID to be able to do remote work since that is what the FBI was beginning to promote. The idea was continued by hearing from other members of law enforcement, including some within the FBI, that they were EFTA00173529 of remote computing to access their forensic labs while away, such as on TDY or at a conference. The intention was not to work from home, per se, but rather to increase the efficiency of the forensic review process` . The steps of imaging and processing evidence before it is ready for review can sometimes take days. During this time there is little for the DExT Agent to do while the computer is doing its processing work. What little there is for the DExT Agent to do is often what separates one stage of this process from the next. Sc4 if a stage is completed on a Saturday, it will not move to the next stage until the DExT Agent does the very few things needed to proceed, which may not happen until the following Monday. This may then kick the process off to the next stage, but now the Agent may have to wait several hours or longer for the next step. In order to be more efficient and to allow this process to begin on a Friday, for example, and be ready for review on a Monday, I believed the idea of remote computing was a reasonable solution. Remote computing would have allowed for a the DExT Agent to remote in over a weekend to initiate the next stage of a process so that the process took advantage of the weekend to conduct the lengthy steps so that by Monday it was ready for review. The downloading process could take a while, but the steps between the process were three or four clicks. If I knew a hard drive EFTA00173530 was going to take a day or so to process, and the next process would also take a day or so, to go into the office just to click a button. Especially in a densely populated area like New York City during COVID. The idea was to be able to remote in to the server and tell the computer to move on to the next step of the process. The idea of using remote computing was reinforced a few years ago when I attended training provided by the International Association of Computer Investigative Specialists (IACIS) during which we went through basic computer forensics. I heard about law enforcement use of Microsoft Remote Desktop Protocol (RDP) there. I believe RDP was being used in the Bureau' but I am not sure for what purpose or on what devices. I spoke with several others in the FBI about RDP, including the DExT PM at the time, SSA Heath Graves, who mentioned he had either been using it or toyed around with the idea. SSA Graves mentioned to me that setting it up and using it was fairly easy, and that all I needed to do was follow Microsoft's directions as they were pretty easy to follow. SSA Graves knew what my intentions were and thought it was a great idea to be able to remote in to cut the lag time of our processing. I thought the C-20 system was secure. I attempted to access the C-20 computer lab through RDP. I believed the lab's security prevented me from remoting in. I had no idea that in so doing I had opened the lab's RDP port and that it had worked. I could access the port from in the lab, but once outside the lab, I was unable to gain access to the network. I thought the security was EFTA00173531 doing what it was supposed to. I was later advised that the RDP configuration was mostly correct and that I was a step or two away from having set it up successfully and securely. I was not trying to be lazy or silly, I wanted to be more efficient in the download process. Sometimes I would start a process on a Friday only to come in on Monday and see it crashed and needed to be restarted. RDP access would have allowed me to see the crash and restart the process remotely. I believe enabling remote access to the C-20 computer lab was a good initiative, but it was not executed properly. It was all about improving our abilities to protect children. I had asked for help, b I. did not get it, but I did get encouragement, I was going off the guidance I received from the DExT PM and CACHTU supervisor, SSA Heath Graves, who advised me to follow the instructions off the Microsoft website. While I cannot recall verbatim what he said, I am positive it was in the realm of the Microsoft instructions regarding RDP to be "very good" and "easy to follow" or something to that affect. My heart and mind were in the right place, but I lacked the knowledge for networking and was not a system administrator. Yet I was tasked with setting up a network I did not know how to set up, and despite repeated requests for help, I was denied. I should not be held accountable for the FBI's systemic failure, especially when the FBI encouraged me and approved me to enhance our lab. I thought my attempt to remote into the C-20 lab did not work because the security settings were effective. I asked for help, even help with RDP, from nearly every unit in the FBI that had EFTA00173532 anything to do with networking, DExT, etc., including CACHTU and the DExT PMs. All I got in response was encouragement in what I was doing, but no form of technical assistance. IIIRFBI cannot FBI did attempted to set the RDP up in either the Fall/winter of 2022 or early 2023. The intrusion happened on Super Bowl Sunday of 2023, and I discovered it the very next day, on Monday. I provided the interviewing SSAs with an outline I drafted on 02/13/2024 of the intrusion situation which I read out loud. I signed the copy of the outline and provided it to the interviewing SSAs to add to my statement. The following is from my outline. This portion of my statement is written as it appears in the physical outline: Seamus, below is a timeline of what transpired today, noting that we had no idea this was a potential hack until late this afternoon. Given the potential that someone accessed our lab to do this, and that the issue may have been with the way we setup our network, below is also a little insight to the many attempts we've made to get the FBI to assist in both physical security to the lab and to help with networking: Today's events (approx times) -7:30am - I arrived at the office and noticed my Talino computer had restarted. EFTA00173533 -7:40am - I logged in to my Talino and a txt file popped up that said in part my network has been compromised and provided an email address to contact. This file was in the "startup" folder so when logging in it opened automatically. I ran my computer's anti-virus software, which was up to date and active, and it identified one potential threat which I attempted to remove. While this is not common, it is also not unusual given the data we recover from 305 subject devices. -I attempted to remove the potential threat, but my administrative privileges had been removed, and despite many attempts to gain access, I could not -8:30am - I reached out to Christian Idsola at CART for help, but he was going to be tied up for a couple of hours -9:00am, I reached out to Talino for help and they walked me through some steps, but nothing worked. They then advised me of a process to take to run antivirus software against my Talinos Operating System hard drive, which took some time but identified the likely source of the threat, which was attributed to a forensic program we use called Axiom. The threat was determined to possibly be a "booby-trap" left by a subject (who is a hacker) that was tripped when the Axiom forensic program ran across it. After this discussion it was believed that was the reason for the issues and we then began working on a solution, which seemed likely to fix my issue. EFTA00173534 -Around this time I also noticed our main server was down, but I didn't think too much of it since we just added a new switch and tried to configure some ports to run at different settings to increase our bandwidth. I assumed at the time the lack of access was a result of incorrectly applying the settings to the "LAG" and "BOND" configurations of the switch. I was able to see that according to the switch, the server seemed to be connected just fine, so I spent some time troubleshooting it. -Around 11:00am or so I was finally on instant message chat with the makers of the server, synology, who had us conduct some tests and they ultimately concluded that a possible issue was a defective hard drive in the server. This was a problem sine the server is "raided" and finding the defective hard drive was a time-consuming and difficult task, but several of us began our attempts. -3:00pm - Is when Christian Idsola and Lewis LNU from CART came over to help. After a bunch of triage and testing we could not figure out why we could not connect to the server, since by all accounts it was working. -we then noticed that our other servers (NAS1 and NAS2) were also not working properly, although we were able to access their control windows, unlike with the Synology server. After some EFTA00173535 digging around we noticed the folders that contain our data was missing. Initially we thought this was due to a firmware issue since Christian and I had dealt with that in the past and resembled the same issue. -Around 3:30pm or so we located the log files and began combing through, which is when we noticed strange IP activity that took place yesterday from two IP addresses. The activity included combing through certain files pertaining to the Epstein investigation. I reached out to one of the case agents to see if they were in the office yesterday, thinking that maybe they inadvertently changed a setting on the NAS or if they noticed anything strange about them. -Around 4/4:30pm we dove into the IPs and checked all of our computers to see which had the IPs in question. One computer, our discovery computer, matched one of them and is located in a room next to the lab, The other IP is one we don't recognize, but is the same address as the IPson our network, leading us to believe it was a computer that accessed our network somehow. We were not able to identify the computer, but it had to have accessed our network either by being plugged into the network, or possibly by telnetting in virtually. -5:00pm - we realized we were hacked and discussed what we needed to do to ensure its contained. EFTA00173536 -5:15pm, we immediately saved our logs and shut everything down. We disconnected the Internet and ensured anything containing a log file was preserved. -5:30pm - I began calling my SSA, Bob Whelp in Security, Jessica Cardenas at CART, Amit Patel in Cyber. Physical Security -Dec, 2021 - Moved into the 10th floor lab -Dec, 2021 - made numerous requests for an electronic keypad lock on the door only to be told by the locksmith there is no funding for a lock. These requests have been made numerous times from Dec, 2021 until a couple months ago, when the response was to make numerous copies of the key we have to the lab Networking/Network Security -Since approx 2017 we have elicited help from CART and Cyber in networking our lab, all to no avail. Some CART and Cyber folks have come over on their good graces, but they were not network savvy and just tried to do what they could. Some months ago (I can look up the exact date) we again requested help from CART, but were told their networking person was too busy to help. This meant no one with networking experience or ability was willing to help, so we had to figure it out on our own. - End of the Outline - EFTA00173537 Once I realized there had been an intrusion, I called SSA Clarke, and Bob Welp with Security. I also called CART and Cyber. This all occurred the same day I found out about the intrusion. The switch box was for the internal network. We had a server rack and a server. We had a switch box l and we just added a second switch box. We also had a misattributed Internet that was connected to the OCE computers. The switch boxes were never connected together. The Internet entered through a router that was connected to the DExT computer and connected to the switch box. I believed all were secure. I believed, since we had a revolving door of CSs and CART members, and since CACHTU was aware and having other offices emulate the C-20 computer lab, I thought we were good. edr we—were—i-n—t-hemiddle—ed piloting Axiom. Ith Light falt f different things t all w ' ,g—edge tre& think utsidc the b x. We have a large act f hash files that we etnt t N-MEC. A hash is a rand m ctring of text used t verify the-4rteejr'i+Y—oi f4 ltrHtshes—frre—elst-4ilte--t —f4-rt9errri-rrtl—i-n that they arc unique and can be eatal ged. Regarding CSAM, all files arc "hashed", and th cc hash valucc arc distributed th. e.14,O these hashes, C-AM can be detected since if a files hash wetheeti—even—i'llswilig—ter—dtde—id-i—We—wemded—be—newkre—whet—we—hetel with the Rhcl. 500 tcralaytcs of ata gone Commented (DWSJ: I think we should delete this. II doesn't really make seine and is a bit redundant...what do you think? D W 2024.10.2007:1100 Commented (JR6R5p Agreed. Take it out. We can articulate that to INSD if they ask, and am always put it had in if necessary. Jim Roberson 2024.10.22 13:38:CIO EFTA00173538 ft,-4-loos-eble-be-oeeeveo-abeet-440-opeobybee-e4-obet data, h bravos, I was told to C ogle h w to rec vcr the data. No one—e-l-se--t-treel—terhalp—srs The OCIO Section Chief (SC), Matt Smith, was pissed because he found an email I had sent prior to the intrusion requesting assistance that no one had responded to. I spoke with SC Smith who believed this was part of systemic failures. We asked for help, and our requests fell on deaf ears. We were always referred to someone else. I understand I opened the C-20 lab's RDP ports, Bit the FBI knew FBI had told me to follow the instructions on Microsoft website on how to open the gotta I was trying to make things better, and moreover CACHTU and other HQ and management entities knew what I was doing and supported me. The policies are not easy to find, are simply not available on the FBI's site, and often . In fact, I have examples I can share of attempts to access policy just to find it isn't there. FBI HQ Criminal Investigative Division (CID) DAD Jose Perez has since acknowledged the policy for the lab was vague or non- existent, which is something he advised II Ccc trt-r'ite of in an email that I provided to the interviewing Agents. Additionally, a few weeks after the intrusion, DAD Perez, with others from FBI HQ, were visiting the NYFO on un-related matters, however there was a meeting to discuss the status of the intrusion which I was present for. Prior to the meeting, DAD Perez, whom I have known for years, approached me and informed me that he knew I was not responsible for the intrusion. DAD EFTA00173539 Perez further advised me that our lab was one of many across the FBI that had similar configurations. DAD Perez assured me that he knew the FBI had systemic failures, that we in the NYFO were not alone, that I should not worry, and that FBI HQ would help get our lab back up and running. DAD Perez also acknowledged me for my work and stated he knew I was the kind of hard-working Agent that the FBI needs. I was not part of the conversations to conduct a Security Incident Reporting System (SIRS) report. , that if I did not have the initiative, we would not have had our successes, Which r Ei7i tesultedgE nanarom dr eteiammi IMUed and their offenders being brought to_dambdidl continued to receive praise for my work, and CACHTU has continued to ask me to review policy before it is sent out to the field. I took over the Group I UCO and doubled its statistical accomplishments. I have rescued more exploited children than anyone in the NYFO and in most of the Bureau. All I wanted to do was to better the Bureau. I did not know how to do everything right, but I always did the right thing and everything I did was with good intentions. I love this job. I was not reckless. There was no self-interest involved. I was always trying to do the right thing. I also want to point out that I was twice awarded the Medal of Excellence for my work, among other accolades. Prior to the intrusion the squad was seen as the gold standard for child exploitation programs. Our end-of-year EFTA00173540 ratings were consistently "gold", and we were often touted as being amongst the highest performing squads in the Bureau. Our squad was responsible for hundreds of child victims being rescued and dozens of offenders being brought to justice. These impacts are directly correlated to our DExT lab and the work we did to enhance it. intrusion, Quesada overturned After the intrusion we were directed to completely stand our lab down. We were directed to submit III our electronic evidence to CART for imaging and processing. A few months into this process, I and others on my squad compiled statistics comparing our effectiveness before and after the intrusion. II ,-videdi By comparison, after the intrusion our squad suffered a 95.52% reduction in productivity. During this time frame, my squad had 281 electronic evidence items that needed to be imaged and processed, and all but 12 of these devices had been taken to CART. Prior to the intrusion Agents on the squad could begin imaging evidence they seized the same day and were generally done imaging all their evidence within a few days. However, the average completion time for CART to image devices was approximately 30.5 days. This is a staggering number and is a prime example of why the DExT program EFTA00173541 is so important and how much of an impact the DExT lab had on my squad's ability to swiftly and effectively conduct child exploitation investigations. Additionally, this summary highlighted one very unfortunate instance in which, because of the lag time at CART and the amount of time it took CART to image and process devices, an offender who was a citizen of another country managed to pee' the United States before the CART review could be completed. It is almost certain this would not have happened if the DExT review could have taken place in the squad's lab. However, it did happen, and again illustrates the significance of the lab and why the enhancements I made over the years, and the numerous pleas I made for help, were so important. This summary has been turned over to the interviewing Agents, and I can make it available again if requested. Completely separate and apart from the intrusion, but occurring simultaneously, ApostleX is both the name of a software company and their product. I had no previous relationship with the company prior to a representative from ApostleX visiting the FBI, NYF0 to provide a presentation on their software. They were touring the United states, and approaching law enforcement and agencies promoting their product. They are a startup company. Apostlex reached out to several entities within the IIIII not just the NYF0. One of the Apostlex employees is a retired agent from NYFO named Chris Braga. I knew Braga from NYFO as a polygrapher. In October 2021 Braga reached out to me and several other individuals in the EFTA00173542 NYFO about ApostleX. I initially did not care much about the product. They were pitching a preservation tool that was geared towards CUSS. It initially did not sound relevant to what we in C-20 were working. Braga worked it out with others in the NYFO and set up a few information sessions for different NYFO Divisions. Our Gang squad, C-30 had an information session. On 10/20/2021, the C-30 SSA sent out an email to my SSA who sent the invite for the presentation to our squad. Another Agent from my squad and I decided to attend. I attended what I believed was a Bureau-sanctioned information session. I want to be very clear that I had no previous relationship whatsoever with ApostleX. They approached the FBI, and I initially declined to even attend an information session. It wasn't until my supervisor sent an email to our squad advising of the information session that I decided to attend. All of this is very provable from the many smalls and correspondences that I have provided as well as others I can provide. I showed up late to the NYFO ApostleX information session and left early. The portion I did sit in on talked about how ApostleX helped with CUSS' use of 3rd party apps. The lack of technology available to preserve encrypted apps, or self- communications, was a widely known issue. Self-destruct apps cannot be recovered, which makes them very popular with VCAC offenders. There were nol good methods to capture the information. We voiced concerns about this for years, WM notably during the CACHTU •olic but there was no fix. There is a VCAC email in which EFTA00173543 CACHTU supervisors are participants, and there have been hundreds of emails over the years of Agents voicing concern*2 asking questions, identifying issues etc.; which imolai' concerns about this very issue . We did not have the ability to go after VCAC offenders who used self-destruct apps like Wicker. There were, and remain, no ways for us to preserve those types of communications. When conducting chat operations, depending on the application being used, the OCEs are unable to preserve the chats with the offenders. Some applications allow for as short as a one second self-destruct period, meaning that after one second of viewing the chat, it is deleted and gone forever. There is no forensic program in existence within the FBI to preserve that chat. Furthermore, these self-destruct apps are designed in such a way that if an OCE attempts to screen record or use a screen shot to preserve a chat they either alert the person on the other end or do not allow the screenshot to be taken. The Bureau's answer to this problem was not really an answer. Some responses to this problem were to use another device to photograph the chats, which is problematic for a variety of reasons, while other responses were for our issue to be passed around. I similismd that a solution would be to use my "Bbu-phone" to take photographs of these chats. I asked what to do with the CSAM that I would inevitably be taking photographs of, and the INSD interviewer had no answer. Once ApostleX came along and I heard what their product did for CHSs, I asked if it would work for encrypted chats and self- EFTA00173544 destruct chats. They said it would. I left the meeting and met with ApostleX after the presentation was over. When we met. we discussed if their technology would do what I described. They advised they would check and get back with me. They got back to us in early November 2021 and advised they believed they had the ability to incorporate what I was asking for. I led the effort with ApostleX, but my squad was involved. I spoke with SSA Seamus Clark and ASAC John Penza (retired). We saw the benefit of it for VCAC purposes. My bosses wanted me to explore it. It was early on and we needed to do everything right. I believe there were a ton of Agents, throughout the Bureau, simultaneously engaged in similar conversations with the ApostleX company, discussing how to purchase the tool. The ApostleX company has been to multiple FBI offices and ...ay Laye had conversations with Safe Streetst_tVber Division squads, etc: ents who were I believe the ApostleX company pitched OTD and other ADs. At one point I even had an Executive Assistant Director (EAD) reach out to me personally about ApostleX. On 11/08/2021, ApostleX requested I sign a nondisclosure agreement. I reached out to NYFO III Tara Semos and we may have also spoken with an Associate Division Counsel (ADC). The decision was that we would not sign anything. We did not have the position or authority. I told this to ApostleX, but I also told them that we were not going to steal their intellectual property. EFTA00173545 People liked the ApostleX program. The consensus was that it was not a fully developed program, but that it could be developed. I know there are currently programs that are used in the FBI that were made through Agent input, -TO _acme tl.at created c"t1..c1„ L, Ave.A.1 th-nes-lec) or created e some pro.rams d via Axiom is a CART-approved tool that the Bureau uses. I was asked to work with Axiom on how it was useful for us and what changes could be made to make it better for the case Agent. With respect to ApostleX, my understanding was that we were talking to a company that was brought in to us to fix a problem Agents throughout the Bureau were routinely encountering when dealing with a CHS or an OCE, namely the undetected real time preservation of their text chats. We communicated with CACHTU who liked Apostick, but said they would not commit funding. In November 2021 ApostleX was still conceptual. It was in the right direction but needed to be refined. They knew from a big picture standpoint what the problems were. From a technical standpoint the product was a home run. Just as was the case with the lack of funding for hard drives we discussed previously, nothing I or my squad did with respect to ApostleX was done in a vacuum. We briefed all the way up to the ASAC (Penza) level. He did not want us to go to the EFTA00173546 contract III E2peera-1-Agent—in-Gitarle (SAGY-or the In_ in Charge (ADIC) with a problem. He wanted us to also have a solution before we briefed the ADIC. He wanted the product to be more developed. He did not want an on-paper solution. At no point did anyone on my squad or I sign a contract with ApostleX, or with anyone else for that matter._ We follia the of the CDC, OGC, FFD, and otherin nag retire r.. - Mark Gerber,rm I All several calls with and who was very suppurative of ApostglIIMBd my involvement with it. We spent months We were going through the Privacy Threshold Analysis (PTA) steps to get the Bureau to sign a contractLMINIMI IMPAIMENIIIIIIIierprocesses we were dir also never orally or verbally agreed to a . It was our goal to have the FBI take on pursuing a contract, not us. At this point ApostleX was a concept and not a product. My chain of command had no issue with me working with ApostleX to develop the concept into a product. We were briefing our chain of command regularly and we even brought in our Intel supervisors. We wanted to make the product useful, not only to us, but to other people throughout the Bureau as well. We brought in CHS Coordinators, people from Intel, and people from the VC program. We did not want to think singularly about our violation. It is required by FBI policy that we preserve OCE sessions, but even to this does not exist to do that. I saw EFTA00173547 it, and still see it, almost as an entrapment for OCEs, in that we are required by FBI policy to preserve chats, yet the FBI has not provided us with a means to do so. i realized lust how bad IIIIMINEMWErrEBErFBI Hommorrewormild was when someone in al Cnccutivc Manlqcfl2n*. told me he thought OCE chats were automatically preserved. This blew me away as this 4t-could not have been -further from reality and shows how bad the disconnect is from what FBI HQ perCIANSMAIIMbiEteality in al fielch We saw ApostleX as an opportunity to address this and other concerns, follow policy, and follow the law. Current methods include all or nothing solutions, which result in "over- collection" and create potential First Amendment issues, in that they may record the communications of people who are not involved in child exploitation crimes or violating the law. ApostleX addressed this. The support we got from the onset of that vision was incredible. FBI HQ knew what we were doing because I discussed with them the problems we were having with apps like Wicker. Apostlex was already successful with apps like were working on Signal and a few others. Apostlex engineers figured out how to make their program work with Signal while we were working with them. They were going in the right direction, we just needed to guide them towards a total solution to our actual needs. They were already working on trying to fix the problem OCEs were having in 2021. We just needed to work on how to preserve apps that created secret and self-destructing chats. EFTA00173548 The Apostlex company was never given access to FBI information. They did not come into FBI space. 'lc would FaccTime t+.-em e never gave them anything that belonged to the FBI. The ApostleX program was installed on a completely standalone computer that was connected to a misattributed Internet line. It was never attached to any FBI networks, storage containers, or covert networks, very specifically including the compromised covert c-20 computer lab network that was previously discussed. The computer with the Apostlex program was in FBI space. It was an old computer that was going to be thrown away. It was a covert computer. I cannot recall if we had a CS wipe the drive of the computer or if it was provided to us with no drives and we installed wiped drives. Either way, we had to install operating systems. The CS was Jim Walsh. The computers were given to us to use at our discretion I do not remember if I told him what the computers were going to be used for. I am not sure if we got the computers before or after we heard the Apostlex sales pitch. One event did not trigger the other, and it did not matter as the computers were for covert--use anyway. ApostleX ran on a main computer. In our case it was the one we set up. The Apostlex database resideds on the computer and the computer's sole function was to run the Apostlex server. ApostleX allowed undercover phones to connect to it. Apostlex is a server that sits on a computer and runs in the background. There is a web-based computer interface. It only workeds from this one particular computer which sits behind a Virtual Private EFTA00173549 Network (VPN). If I am an OCE using the Telegram app I would connect my Telegram account to Apostlex. There is an authentication process. We had the company add an icon that let the OCE know ApostleX was working in the background preserving the chats. The ApostleX company added a small icon that showed ApostleX was active. ApostleX's integration was chat application specific, so we were only preserving what needed to be preserved. It started with Telegram. Around the time we were told to shut down, it worked with Signal. We were getting close with What's App. Any Telegram account we wanted to preserve would be added to the ApostleX account. We had the ability to select what was relevant and what was not. With appropriate authorization, we could do an account takeover of a Subject's account. With ApostleX there is an ability to avoid overcollection. ApostleX was initially grabbing everything, and we would need to check what to preserve. We wanted to make a parameter for how long to keep information that was not checked, which would then be purged. The accounts would be taken over through consent or with a warrant. We were testing the capability of Apostlex to preserve self-destructing chats. Initially, in the testing environment, the disappearing chats were preserved on both the sender and the receiver's telephones, which obviously would not work for us. We worked with the company to address that. The ApostleX company did not have the ability to access the data we collected from chat applications. The only data ApostleX EFTA00173550 had access to was the telemetry. I believe OCIO looked at that and III happy with it. SC Matt Smith from OCIO was also involved and sent Requests for Information (RBIs) to our local ISSO, Jim Eckel, who reviewed Apostlex, the code, and had at least one call with them that I was a part of. I believe he also had additional communications with them that I was not a part of. In the end, I know that OCIO's questions were sufficiently answered. We never went live with the Apostlex program and only operated it in a testing environment. We did not use active cases. We used dummy phones and OCEs chatting on the Telegram application. We added a bunch of older OCE Telegram accounts to test it out. accounts we used were real covert accounts. Some of the accounts were historical. When we synced Apostlex to chat application accounts, the entire history of the chat application account would be pulled. The information was exclusively stored on the local hard drive of the computer ,.....1..4—that ran Apostlex. One of the Telegram accounts I used for testing was about 12 years old. The test accounts I used were not involved in any chat groups that were pertinent. I am not sure about the other folks who were testing Apostlex. I do not believe anyone cared about the accounts we used. I believe the historical data attached to the accounts had already been adjudicated but it is possible some of the information may not have been. I cannot say there was no evidentiary data put on the standalone Apostlex computer, which is routine. Many undercover Agents use multiple devices to access their accounts, including both computer and cellular devices. Since the account originates EFTA00173551 on their FBI-issued undercover phones, any ancillary devices have no impact. I do not bclicvoam positive having information on the ApostleX computer was ater—no different than having it on any other computer. I did use a historic case to demonstrate how we could export from Apostlex for discovery purposes. The case was not fully adjudicated at that point. I am certain the accounts we were using had no impact on any ongoing investigation. There was likely CSAM from the historical accounts that was extracted and uploaded onto the Apostlex computer when the historic accounts were synced with the ApostleX program. The Apostlex company or anyone else could not see it, however,_ It took a while to set the standalone ApostleX computer up. We may have hooked the computer up in December 2021 or January 2022. We tested it intermittently for a couple of months. It would be a long process to reconfigure things. We would give feedback to the Apostlex engineers who monitored the telemetry data and could see the issues with the Apostlex program from their end as we tested it. Sometimes the fixes took a few hours or a day or two. Once they had a fix, Apostlex engineers would send me a document with instructions on how to fix the issues. Any message that was sent from the company was done through Bureau email. The instructions would be written in the email itself or provided verbally. Though it is possible I may have used my personal telephone to communicate with Apostlex engineers using the video teleconferencing application, zoom, I EFTA00173552 do not recall for sure. I do believe I may have used my FBI laptop and possibly my OCE telephone for the Zoom calls with ApostleX engineers, however. Sometimes the ApostleX engineer could see me during our Zoom calls and sometimes not, however we also sanitized the FBI space. We would input the instructions sent by the Apostlex company into the computer with the ApostleX program on it. There were a couple of times I ha

Related Documents (6)

DOJ Data Set 9OtherUnknown

j782epsC kjc

j782epsC kjc UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK x 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 UNITED STATES OF AMERICA, v. JEFFREY EPSTEIN, Defendant. Before: x New York, N.Y. 19 Cr. 490(RMB) Conference July 8, 2019 1:20 p.m. HON. HENRY B. PITMAN, APPEARANCES GEOFFREY S. BERMAN United States Attorney for the Southern District of New York BY: Assistant United States Attorneys STEPTOE & JOHNSON, LLP Attorneys for Defendant BY: REID H. WEINGARTEN MARTIN G. WEINBERG Attorney for Defendant MARC FERNICH Attorney for Defendant Also Present: Special Agent Detective FBI , NYPD Magistrate Judge SOUTHERN DISTRICT REPORTERS, P.C. EFTA00079704 j782epsC kjc 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 (Case called) THE DEPUTY CLERK: Counsel, please state your name for the record. MR. : Good afternoon, your Honor. For the government, , and With us are Special

24p
DOJ Data Set 9OtherUnknown

IN RE:

IN RE: INVESTIGATION OF JEFFREY EPSTEIN NON-PROSECUTION AGREEMENT IT APPEARING that Jeffrey Epstein (hereinafter "Epstein") is reported to have committed offenses against the United States from in or around 2001 through in or around October 2005, including: (1) knowingly and willfully conspiring with others known and unknown to commit an offense against the United States, that is, to use a facility or means of interstate or foreign commerce to knowingly persuade, induce, or entice minor females to engage in prostitution, in violation of Title 18, United States Code, Section 2422(b); all in violation of Title 18, United States Code, Section 371; (2) knowingly and willfully conspiring with others known and unknown to travel in interstate commerce for the purpose of engaging in illicit sexual conduct, as defined in 18 U.S.C. § 2423(f), with minor females, in violation of Title 18, United States Code, Section 2423(b); all in violation of Title 18, United States Code, Section 2

2p
DOJ Data Set 9OtherUnknown

IN RE:

IN RE: INVESTIGATION OF JEFFREY EPSTEIN Non-Prosecution Agreement IT APPEARING that the City of Palm Beach Police Department and the State Attorney's Office for the 15th Judicial Circuit in and for Palm Beach County (hereinafter, the "State Attorney's Office") have conducted an investigation into the conduct of Jeffrey Epstein (hereinafter "Epstein"); IT APPEARING that the State Attorney's Office has charged Epstein with one count of solicitation of prostitution, in violation of Florida Statutes Section 796.07; IT APPEARING that the interest of the United States pursuant to the Petite policy will be served by the following procedure expressed in this Agreement; IT APPEARING that the United States Attorney's Office and the Federal Bureau of Investigation have conducted their own investigation of Epstein's background and offenses including; knowingly and willfully conspiring with others known and unknown to commit an offense against the United States, in violation of Titl

6p
DOJ Data Set 9OtherUnknown

From: "Buckley, Lawrence D. Jr. (DO) (FBI)"

From: "Buckley, Lawrence D. Jr. (DO) (FBI)" To: "Smith, James H. (INSD) (FBI)" <O>. Subject: FW: [EXTERNAL EMAIL] - FBI Public Affairs News Briefing Wednesday, August 05, 2020 Date: Wed, 05 Aug 2020 13:50:09 +0000 Importance: Normal From: Bulletin Intelligence <[email protected]> Sent: Wednesday, August 5, 2020 6:27 AM To: [email protected] Subject: [EXTERNAL EMAIL] - FBI Public Affairs News Briefing Wednesday, August 05, 2020 Mobile version and searchable archives available at fbl.bulletInIntelligence.aun. FBI News Briefing TO: THE DIRECTOR AND SENIOR STAFF DATE: WEDNESDAY, AUGUST 5, 2020 6:30 AM EDT TODAY'S TABLE OF CONTENTS LEADING THE NEWS • FBI Has Opened 300 Domestic Terror Investigations Since Floyd's Death. PROTESTS • Suspect In Salt Lake City Protest Arson Case Remains Jailed. • Tennessee Woman Is_S_econd To Face Protest Arson Charge% • Trump Touts His Efforts To Stop Portland Protests. • pence Sys Administration Will Increase Law Enfor

44p
DOJ Data Set 9OtherUnknown

Farmer, Jaffe, Weissing,

Farmer, Jaffe, Weissing, Edwards, Fistos £t Lehrman, P.L. 'Ovid Pam ftoisl pet WWW.PATITTOJUSTKE.COM 425 North Andrews Avenue • Suite 2 Fort Lauderdale, Florida 33301 4 00 "ti e 6.‘ tk i r atire CalkAllfle alvdtr aIINNEV rar ,NYTTENNINIP PITNEY 'OWES 02 !F $003 , 50 0 000i3V, wit JAN 2i 2,2!3 .a4P En M ZIP t20-12E 3330 Dexter Lee A. Marie Villafatia 500 S. Australian Ave., Suite 400 West Palm Beach, FL 33401 EFTA00191396 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA Case No. 08-80736-Civ-Marra/Johnson JANE DOE #1 and JANE DOE #2, Petitioners, 1. UNITED STATES, Respondent. SEALED DOCUMENT EFTA00191397 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA Case No. 08-80736-Civ-Marra/Johnson JANE DOE #1 and JANE DOE #2, Petitioners, UNITED STATES, Respondent. SEALED DOCUMENT MOTION TO SEAL Petitioners Jane Doc No. 1 and Jane Doe No. 2, joined by movants Jane Doe No. 3 and Jane Doe No. 4, move to file the attached pleading and supporti

71p
DOJ Data Set 9OtherUnknown

UNITED STATES DISTRICT COURT

UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK x UNITED STATES OF AMERICA S 120 Cr. 330 (AJN) GHISLAINE MAXWELL, Defendant. x THE GOVERNMENT'S OMNIBUS MEMORANDUM IN OPPOSITION TO THE DEFENDANT'S PRE-TRIAL MOTIONS AUDREY STRAUSS United States Attorney Southern District of New York Attorney for the United States of America Assistant United States Attorneys - Of Counsel - EFTA00039421 TABLE OF CONTENTS PRELIMINARY STATEMENT 1 BACKGROUND 2 ARGUMENT 3 I. Jeffrey Epstein's Non-Prosecution Agreement Is Irrelevant to This Case 3 A. The NPA Does Not Bind the Southern District of New York 4 1. The Text of the Agreement Does Not Contain a Promise to Bind Other Districts 5 2. The Defendant Has Offered No Evidence That the NPA Binds Other Districts 9 B. The NPA Does Not Immunize Maxwell from Prosecution 15 1. The NPA Is Limited to Particular Crimes Between 2001 and 2007 15 2. The NPA Does Not Confer Enforceable Rights on Maxwell 17 C. The Defendant

239p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.