Skip to main content
Skip to content
Case File
efta-efta00173569DOJ Data Set 9Other

I, Aaron E. Spivack, having been duly sworn by Supervisory

Date
Unknown
Source
DOJ Data Set 9
Reference
EFTA 00173569
Pages
64
Persons
3
Integrity
No Hash Available

Summary

I, Aaron E. Spivack, having been duly sworn by Supervisory Special Agent (SSA) Dannie W. Price, Jr., hereby make the following statement to SSA Price and SSA Matthew A. Zavala on 01/26/2024 and SSA Price and SSA Claudia Dubravetz on 08/08/2024, whom I know to be SSAs of the Federal Bureau of Investigation (FBI), assigned to the Inspection Division (INSD) at the time of my statement. My attorney, Richard J. Roberson, Jr., was present during my statement on both occasions, via telephone. This statement took place over a two-day period. The statement initiated on 01/26/2024, and again on 08/08/2024, after additional allegations were added: I entered on duty (EOD) on 02/21/2006, as an Intelligence Analyst (IA). I EOD on 10/08/2008, as a Special Agent (SA) and I am currently assigned to the New York Field Office (NYFO) in that capacity. I understand that this is an internal investigation regarding an allegation that Special Agent Aaron E Spivack improperly stored digital ev

Tags

eftadataset-9vol00009
Ask AI about this document

Search 264K+ documents with AI-powered analysis

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
I, Aaron E. Spivack, having been duly sworn by Supervisory Special Agent (SSA) Dannie W. Price, Jr., hereby make the following statement to SSA Price and SSA Matthew A. Zavala on 01/26/2024 and SSA Price and SSA Claudia Dubravetz on 08/08/2024, whom I know to be SSAs of the Federal Bureau of Investigation (FBI), assigned to the Inspection Division (INSD) at the time of my statement. My attorney, Richard J. Roberson, Jr., was present during my statement on both occasions, via telephone. This statement took place over a two-day period. The statement initiated on 01/26/2024, and again on 08/08/2024, after additional allegations were added: I entered on duty (EOD) on 02/21/2006, as an Intelligence Analyst (IA). I EOD on 10/08/2008, as a Special Agent (SA) and I am currently assigned to the New York Field Office (NYFO) in that capacity. I understand that this is an internal investigation regarding an allegation that Special Agent Aaron E Spivack improperly stored digital evidence at his residence in violation of 1.6- Investigative Deficiency- Improper Handling of Property in the Care, Custody, or Control of the Government. On 10/30/2023 the following expanded allegations were added: Special Agent Aaron E. Spivack improperly handled, documented, and stored digital evidence and failed to secure CSAM within policy, resulting in a cyber intrusion in violation of 1.6- EFTA00173569 Investigative Deficiency- Improper Handling of Property in the Care, Custody, or Control of the Government and 5.17- Security Violation- Failure to Secure sensitive Equipment/ Materials. On 02/07/2024 the following expanded allegations were added: Special Agent Aaron E. Spivack exceeded the limits of his authority by contracting an outside company to develop computer software on behalf of the FBI in violation of 2.8 Misuse of Position and 5.23 Violation of Miscellaneous Rules/Regulations. I have been further advised of my rights and responsibilities in connection with this inquiry as set forth on a "Warning and Assurance to Employee Required to Provide Information" form FD-645 which I have read and signed. I understand from my review of the FD-645 that should : refuse to answer or fail to reply fully and truthfully during this interview, I can expect to be dismissed from the rolls of the FBI. I am currently assigned to CT-25, which is a hybrid Domestic Terrorism and Child Exploitation squad. I was assigned to CY-3 in May 2010 and officially named on the squad in July 2010. This was when Innocent Images was combined with Cyber. C- 20 was the Human Trafficking (HT) squad at the time. I believe it was 2015 when Violent Crimes Against Children (VCAC) and HT were combined under C-20. The squad is split and has the HT side and the VCAC side . Agents primarily work EFTA00173570 their assigned violations, but we come together as a squad for operations. I believe Digital Extraction Technician (DExT) training was opened to VCAC Agents in 2012. Scott Le9ford was my instructor for DExT. and led the Cyber Action Team (CAT). I believe at least three or four of us initially received DExT training, but I think all of us eventually were trained. However, once the child exploitation program moved from the Cyber Division to the Criminal Division, that changed. The funding we received through the Criminal Division was significantly less than what we received through Cyber Division, so the DExT program was no longer able to put on as many classes and certify as many people as it had before. By the time of the intrusion that forms the basis of this internal inquiry, only about half of the "child exploitation" Agents on my squad were DExT certified. This is while we were still with CY-3. We got certified because the Computer Analysis Response Team (CART) was long overburdened, and not familiar with the nuances of the child exploitation violation, such as the types of programs used by offenders, the vernaculars, etc. I MIrong lighds -on" EFTA00173571 the hands of the offenders the FBI waea This was around the same time Agents working other violations began to see an increase in the collection and reliance of digital evidence. As DExTs, we were encouraged, and in some cases I believe required, to assist CART with their backlog by conducting DExT extractions for other squads. the time—the ',At, and el.." ..rq with thcir invcctigations. The other reason was to eliminate the lag time in searching evidence and identifying contact offenders (offenders who physically exploited or physically assaulted children) sooner. VCAC investigations are different than other FBI investigations since VCAC usually does a search warrant at the beginning of our investigations, where other squads do them last to complete their investigations. Mike Osborn was a Unit Chief (UC) of the Crimes Against Children Human Trafficking Unit (CACHTU) at FBI Headquarters (HQ) and eventually an Assistant Special Agent in Charge (ASAC) at NYFO. He was a huge proponent of DExT. Being DExT trained allowed us to conduct our own data extractions faster, but more importantly; it allowed for a faster and more efficient way of identifying contact, or "hands-on", offenders and, thus, rescue child victims of sexual abuse victimized. before they could be further EFTA00173572 After becoming DExT certified, we received DExT equipment that allowed us to image, process, and better review the digital files. The DExT training allowed us to better use FBI analytical programs to review digital evidence. Being DExT certified allowed us to assist CART by offering an alternative for other squads to use for data extractions. At the time, CART was not located in the NYFO Headquarters City (HOC). CART was located in Moonachie, New Jersey. It could take an hour to get to the CART lab. CART evidence reviews needed to take place there. It could take all day. CART eventually moved to NYFO, HOC. The volume of data extractions we took on lessened the burden on CART. At least in New York, CART only had one or two a few-examiners who could handle data extractions immediately, and almost certainly none who could respond after hours or on weekends. eeete-e4-tbeft-weerld-delery-tbeer Since we dealt with child victims, it was, and is, imperative that the digital evidence be processed immediately. In nearly every child exploitation investigation the digital evidence is quite literally the evidence to prove the crime and without a prompt review, there is no probable cause to effect an arrest, putting the lives of child victims in continued danger. u- Cel f-cli-g thut a pivean .,h—owed a child ...0u4dradt—be arrested becaldec we did not have the pr per technical capabilities. It is that very risk, the risk of continued abuse, EFTA00173573 that has prompted the FBI to enact new policies requiring expeditious investigation into allegations of child exploitation. This includes the expeditious review of evidence. Prior to the DExT training, on-sight forensics was not really a practice. We had to take digital evidence back to the office to view it and we relied more on the post search interview. After a search, we had to go back and arrest an offender once we found the evidence. This made for a significantly more dangerous arrest because the offenders knew we were coming. There was also the potential for offender suicide. We had three offender suicides that I can recall. There was also concern there could be a delay in reviewing evidence that, if seen sooner, would allow us to remove a child from harm's way. NYFO SAs Linh Phung, Tommy Thompson, Mitch Thompson, and I were DExT trained. SA Cindy Wolff (aka Cindy Dye) was also DExT trained. Cindy was the last to be trained At the time, I was the most junior Agent on the squad. Before being DExT trained, all of our digital evidence was submitted to CART for data extractions, imaging, and processing. We did have access to CAIR, a forensic tool for data review , but the program was slow, not capable of handling large evidence reviews, did not work all that well, and did not do what we in the child exploitation program needed it EFTA00173574 to do. was no secret and was widely known, and one of the reasons for the creation of the autonomous DExT labs. Additi sally having t rely on CART f r evidence pr cecsing, and Lie seta evidence review. After collecting digital evidence, I would enter the digital evidence into the Evidence Control Unit (ECU) and get a 1B evidence number assigned. I would then enter a CART request with a description of what forensic examinations I needed to be performed and information on the device that needed to be extracted. Then I would submit it to CART. It could take a day or two to get the evidence to CART and the amount of time it would take CART to process the evidence varied. It could take weeks or months. Once it was extracted, CART would process it in the Forensic Tool Kit (FTK). We could review the data on CAIR or go to Moonachie to review it. Everyone on the squad, for the most part, chose to go to Moonachie. CART Digital Forensic Examiners Stephen Flatley and Carlos Koo eventually set up a spot in NYFO, HQC to do data extractions. Even after receiving DExT training, we used CART for things like very large d unl ado media dumps/extractions and encrypted EFTA00173575 files. We also used them to help us with understanding what some of the digital evidence was. I believe CART may have provided us a digital copy of the data extraction and I think it may have been on DVD. It would have been accessible on operational Wide inacc+—Area Network (OpLAN - OPWAN) as well. I do not recall what we did with the copies on DVD. CART may have checked them into evidence and provided a working copy. The DExT trained Agents would do data dumps on everything we could like hard drives, loose media, and thumb drives. All telephones we seized initially still needed to go to CART for processing. In 2015, generally if it was a device we could image, we would follow this process. We would use write blockers to assure we did not accidentally manipulate the original data. We would create an image of our evidence, sometimes we would use another hard drive. We imaged and processed the data. We had some hard drives but I am not sure where they came from. I believe HQ sent us a box of hard drives. I also believe CART may have given us some as well. We used a forensic duplicator called 13leek—Ben a TD3, and later a TX-1 as well as Fit Imager, to image a the device onto a hard drive and make the derivative evidence. We would then make a working copy image off of the derivative evidence. We would work off the working copy. EFTA00173576 I am pretty sure the derivative evidence was cataloged and placed in the Evidence Control Room (ECR) if that was the policy, but if that was not the policy we that. would not have done The DExT Program provided us with Redundant Array of Independent Disks (RAIDS). These RAIDS were to be used to house our working copy evidence images. Once we ran out of hard drives for derivative evidence, we were instructed to use the RAIDS. I believe these instructions were provided by HQ, either our Program Manager (PM), the DExT PM, or both. I wao told by , squedmate—er—a—swpervistr—teirmtge—thrdatt—tep—a—Reawftelent—krralp f Independent Dicks (RAID) tower. Typically, the person running a Group I or Group II Undercover Operation COCO) and the squad SSA would be the people who communicated with HQ for resources. I recall in 2015, I sent an email to II IIILWee the case Group g, asking for some fl acity Ewe—tra hard drives with our remaining Group II funds. At the time we were still merged with Cyber. When we moved to the Criminal Division, our funds were wiped out. Linh Phung left NYFO and became a DExT PM. She would complain about a lack of funding. I was running out of hard drive space for derivative evidence and of storage space in general. The PMs told us buying hard drives in bulk was a problem. The stores had a capacity limit. I would purchase the EFTA00173577 drives on Amazon, like I was instructed to do by HQ, until my covert account was shut down by Amazon since the purchasing of large quantities of hard drives was flagged as suspicious. We were purchasing from New Egg, like I was instructed to do by HQ, specifically SSA Heath Graves who was the DExT PM, who could sell bulk (10 or more hard drives), but I was later told by someone in the procurement unit we could not use New Egg fer purchascc. I went to CART who gave us what hard drives they could spare. I have various correspondence with HQ advising there was a lack of funding. This not only affected us getting hard drives, but also various other things. Phung provided us with more RAID towers for storage, and instructed us to use the storage to meet our needs, which included the creation of derivative and working copy evidence. I also learned the purchase of the or was allocated to who was the DExT PM DExT PM. After the funds were available, but not designated for hard drives. Money III either was not there something else. I spoke with Heath Graves and then Jim Harrison who is the current Inspection that was related to the C-20 computer lab cyber intrusion, the squad received some hard drives, and then was denied funds for hard drives from CACHTU who told us to go to CART. CART then referred us back to CACHTU. I worked with someone from the Laboratory Division to help figure out another process. I believed it was a waste of money EFTA00173578 and resources to purchase expensive hard drives just to get destroyed. I spoke with a UC about derivative storage that was stand alone. The UC liked the suggestion. In 2018 I did a five-week TDY at CACHTU. My former SSA, Sean Watson, was the UC there. My job was to call every VCAC eq-"L —kid, Group I and Group II UCO Case Agent and ask questions about the issues they were having and to provide recommendations on how to better the program, how CACHTU could better assist the field, things that needed improvement, etc. I creating reusable virtual that .1-1" -f DE-T .,t..£f, 1,Lt that were not, and generally that there wac a lack of training, guidance, direction, and perc IIH.- within the program. I drafted a summary on the calls I made and created a section for complaints from the field in reference to DExT, and provided my assessment to CACHTU leadership. EFTA00173579 This same assessment, as well as additional details were also provided to Bryan Vorndran, who was the Deputy Assistant Director (DAD) who covered child exploitation, This came as DAD Vorndran separately requested a working group of Subject Matter Experts (SMEs) to address the needs of the VCAC program. I explained to him how we had equipment and training needs, and provided my assessment both orally and in several documents. In 2018 I sent an email e efwEJERTI. XDX4L.II.sent a EP appropriate money for equipment, I talked about the need to Others and I made it very clear to HQ that we did not have hard drives. Every now and then they would send us some and every now and then they would send funds, but nothing was consistent. I also informed my SSA of the need for hard drives. I was aware he knew we needed them and there were no funds. Other Agents were dealing with the same issues. It has been, and continues to be, the practice of VCAC Agents to create derivative copies of original evidence if derivative hard drives EFTA00173580 are available. However, given the long history of not receiving either the hard drives or the funds to purchase them, VCAC Agents have been left with no alternative but to store their derivative evidence on local storage. If we had hard driven t• attltrbti—aat4 vat+n—t-oP4e$7""e—Iteekl—Felteellt-ce'F'9-411—evi'cienee-rI4 we didn't, we wouldn't. In 2017 I began to gain a voice among many FBI Child Exploitation circles. I took over our squad's Group II ?COMM ry in front of the are every uHIIIIIIII six Lt ye would a Group I, it IIIII also III Assistant Director During the I brought up the funding issues. In the funding section we discussed what we spent and what we anticipated to spend. Thag.4.49.50.1 EFTA00173581 program compared to the four years prior. This meant an increase of approximately 2000 undercover sessions in the same four-year span. More significantly, however, was how I tasked undercovers and provided direction to ensure the program worked to identify the most vulnerable of the exploited children; and set out to rescue them. The results cannot be overstated in that the lives of hundreds of children were saved. While I am personally responsible for saving the lives of hundreds, many hundreds, if not thousands, more were saved because of how I managed and a the child exploitation program. The pracLace ut creat.:flg de.nvaLlve evidence copies: separate hard drives to be checked into evidence was dependent upon whether or not we were provided funds to purchase the drives or the drives themselves. Early on, when VCAC fell under the Cyber Division, we had regular access to these drives, but when the program was moved into the Criminal Division that changed. Despite repeated requests, as well as having alerted everyone within the chain of command, we were told to figure it out. We had been advised that if derivative hard drives were not available, to store the derivative evidence on our local storage, which is what we did f-- C 20 ehertrei—te—ftet—eddi-nrelet-i-yetiana c picc t evidence, but it happened. It may have been in 2016 or 2017 and possibly happened because we did not have hard drives. EFTA00173582 I believe we were initially getting some hard drives from DExT after completing the certification course. DExT Slowly went to no longer providing hard drives to new DExT certified agents at all. I do not know what they are teaching about digital evidence storage in DExT or how to get drives, but I know from other Agents who have attended the DExT training more recently that guidance has still been to seek funding from CACHTU, who again has been stating they do not have the funds. Until approximately February 2023, the NYFO did not have a designated Information System Security Officer ( SSO). This is a required position, and I think it being left unfilled exacerbated many of the problems that are discussed herein. As recently as December 2023, my squad has attempted to get funds for derivative hard drives. On a couple of occasions the funds were obligated, however in other requests the funds were not. In those requests CACHTU stated, via email, that there were no longer funds for the drives and that the squad should inquire with CART to obtain them. Subsequently, CART denied the request as they too needed their hard drives. Even after the intrusion and the negative attention we received regarding derivative evidence hard drives, the squad was again put in a position where they were unable to comply with policy because the FBI would not provide the requisite hard drives or funding needed to be compliant. When the squad had been able in some instances to EFTA00173583 use case funds to make a hard drive purchase, the newly- appointed ISSO found the drives to be in violation of policy since the hard drives themselves were not manufactured in the United States. This, again, put the squad in an impossible situation with no alternatives being offered. It was also quite ridiculous as it is likely that none of our computer equipment is manufactured in the United States. Whs., fle Nee funds t get hard drivec, it vac denied by cccurity bccaucc they rt.,t en.ed- tb.. UGA After the process changed, we would image the original evidence onto the RAID Storage or Network Attached Storage (NAS). At times I would create a second copy. If I made a second copy, I would use one as the Main copy and the other was the Working copy. If I did one copy, that one would be used as the Working copy. At times I would make multiple Working copies. EFTA00173584 I wee—personally made derivative copies whenever I was afforded with the requisite hard drives. However, just because I did not always receive the drives did not mean my VCAC investigations ceased. Of course, I as well as others, still had to adapt and overcome and felt that while I may not have been able to create derivative copies for all of the evidence, the reasons for that were well documented and out of my control. III iLto the lack of for fro. a rock dership stored dl at ducted And like ies" EFTA00173585 net mak1aq derivative c pies. -nd did n t have the rcc urccc to d c and I did not kn w what cloc t d . Throughout most of its existence e C-20 lab was Internet connected. One or two of the DExT machines were connected to the Internet, but we were "stand-alone" and not connected to any FBI systems. Additionally, our lab was "missattributed" and able to be used in covert capacities and to access websites that could contain Child Sexual Abuse Material (CSAM). I -ecelled L-1.4 inctructcd that the DExT w rk stati a was ctand al nc. Initially, in approximately 2012, the C-20 lab was not connected to the Internet, but at the time we had little reason outside of software updates to be connected to the Internet. Several years EFTA00173586 later that changed as the advancement in our software and capabilities grew, requiring our computers to be InternetH connected. The only guidance or direction time was that our Internet-connected DExT connected to a FBI network, and as far as we received at the computers not be I have always been aware that is the only policy on the matter as well. Even FBI HQ implemented investigative steps that required DExT labs to be Internethconnected, such as the method that was used to transmit CSAM to the National Center for Missing and Exploited Children,, whereas previously it had been to do so via a storage media. Later, the FBI created the "SIFTS" program which portal for CSAM transmission. I.. 2012 it. —ea. W.. receiving programs that needed interact access-. In approximately 2022, CACHTU advised the field that the licensing method for one of our most used programs, "Axiom", was moving from dongle-based to cloud-based. CACHTU wanted to pilot the cloud-based method and elicited the assistance of five or six VCAC squads from across the FBI to do so, one of which wee our squad. This pilot program, which began prior to our intrusion and continued well after, required the DExT computers to be connected to the Internet. The C 20 lab was pil ting a edeed beacd Arm., 11----iag. It allowed us to check out a license when we needed to. In order to do so, we needed to stay was an online EFTA00173587 on the Internet to use it. There was some level of security provided by the switch box and some on the NAS itself. The computers, NAS, and RAID tower storage that contained CSAM were then all connected to the internet. We received guidance from CACHTU, specifically from the DExT PMs, to disable the antivirus to use the Axiom since the antivirus would flag the program. I believe this came from Tommy, Heath, CART, and others. Squad C-20 did not know how to set up the Internet and the switch box. we reached out to computer scientists and CART and received some help. I do not know anything about networking and how to set up networks. The Computer Scientists also did not know. I believe someone from the Operational Technology Division (OTD) told me to Google it. Networking is not a DExT function and is not in my skill set, so I did not even know what questions to ask. The off-the-shelf security that was in place kas what we were using. I and the squad asked everyone we could think of for help - CART, the Computer Scientists, OTD, the Office of the Chief Information Officer (OCIO), Management Information Systems (MIS) , etc. - however, all were of no help. Computer Scientist Jim Walsh helped us set up some of the equipment. Christian Idsola from CART also helped, as did another CART employee whose name I cannot recall. Anthony Broderick who is the NYFO CART networking guy was asked for help. He told me to read the manuals and said he did not have Connented[DIVII: ShouldlmnsomeNnth almthmvthelmpedionalma-ofwhkhthechamcs amlikelydaivedfrom-mknomeasasymmu admMisumorAwanuopMmiliatoutulmnNOTA cannot be viewed fromthesame lens as someone who isasysadmin DW 2024-09-16 21:33:00 Commented f.IR2RI j: Yes! I'm glad you remembered that. Please add. Jim Roberson 2024-09-17 10:41:00 EFTA00173588 the bandwidth to support us. These communications, along with many others, occurred in writing via email and I can provide them to investigators Our request was simple - to network the few standalone computers in our lab. However, no responsible entity within the FBI would assist, so we had to reach out to friends and colleagues to help on their own. While their help was valuable, none of our volunteered help came from anyone who was a network or systems administrator, and the FBI's network or system administrators would not assist. The various networking and system administrative units in the FBI handle FBI networks, and the few that handle covert/misattributed networks do not handle CSAM networks. Despite the irrelevance of the latter from a technical perspective, CSAM is off putting and no one wanted to assist and CACHTU did not know what to do. In fact, CACHTU was aware that this was an issue affecting so many other FBI Offices that it encouraged us to find the solution so that it could be emulated across the other VCAC DExT labs. In our desperation to find someone with a networking/system administrator background to help us, we put out a Confidential Human Source (CHS)canvass for assistance with our network through our CHS Coordinator. I also reached out to OTD, and Counterterrorism Division (CTD) Cyber looked at our network and could not figure it out. We had a Counterterrorism (CT) CHS come EFTA00173589 over and look at the network and he/she advised networking was not his/her specialty. The CHS was a former contractor for the FBI and had a TS clearance. This occurred when the lab was on the 9th floor prior to it getting flooded. After the 9th floor lab flooded, some of the equipment was replaced by CACHTU and CART was able to salvage some of the equipment. We moved the C-20 lab to the 10th floor in December 2020. I received approval on 12/22/2020 to purchase switches, NASs, cables, and hard drives. This equipment was purchased with $34,000 in CACHTU funding, which also supplied the Long Island Resident Agency (RA) with similar equipment. CACHTU PM Leslie was a former NYFO Agent and knew about these issues. During the COVID pandemic there were three of us from my squad who came to the office on a regular basis; myself, SA Matt Deragon, and SA Brian Gander. The guidance, however, was to work from home. The C-20 SSA at the time was Sean Watson. SSA Watson provided guidance to work from home, in addition to the guidance pushed by the FBI Director, our II, and others in FBI management. This guidance included conducting limited forensics from home, and CACHTU pushed out to the field temporary AXIOM licenses for the sole purpose of conducting limited forensic reviews from home. AXIOM gave everyone limited access t work 4-aem—hame-r However, since the bulk of my forensic reviews meant EFTA00173590 reviewing CSAM, I came into the office almost I wac in tho ee—i-n—e4temoo daily to do CSAM reviews. This is a fact and can be corroborated by SAs Deragon and Gander, as well as by checking the building access logs which will show I used my access badge to enter the building and the frequency I accessed the building. Other work was done from home. I looked at emal subpoena returns and reviewed working copy material that did not include CSAM. Anything I took home was covered under policy, and was covered under the guidance being disseminated. I have a lureau-issued laptop computer purposes. that I utilized for these At the time, I was working on three cases primarily: Robert Hadden, Darnel Feagins, and Jacob Daskal. To conduct the investigation for Hadden I was doing web- based interviews from home and writing FD-302s and subpoena returns which were all non-CSAM related. For the Daskal case I EFTA00173591 completed a 69-page review. I took metadata-related information. Some of it was exported from Daskal's computer, but none of it was CSAM For the Darnel Feagins case I was splitting the work. I did not do CSAM-related work from home. I did not take any storage devices home that were original or derivative evidence. Any copies or data I took home would have been al4 working copies. If I did take data home-, it would have been a - 1 g owpy. It would have been impossible for me to take derivative copies home in general. I was coming in every day to do my CSAM reviews. I au.n1J 1 g int telegram with my micattributcd laptop. I was taking ml Online Covert Employee (OCE) devices home to conduct work and my GSA and ASAC &seat it. AveuLs b-lieved the, natl. - ' t d it. We n w have EC authority. Th cc Devices may have. c-flt...:“ed CLAM mk. I do not believe I was doing any OCE work at the time since we were instructed not to. We were trying NOT to create a need for 'gents to have to run out on warrants gisigi conduct Knock and Talks KT* due to unless an emergency - BUT, I and other OCEs would do OCE work from everywhere, including home, but all of that was covered under I EFTA00173592 As I was authorized to do, I would take home removable storage devices like a hard drive or thumb drive that contained working-copy data and/or other material that would allow me to work from home. Some of my devices, including my FBI-issued OCE phone and my FBI-issued and encrypted laptop, may have had CSAM on them. As an OCE, I was authorized to do this since communicating as an OCE with VCAC offenders requires around-the- clock communication. This is all also covered under our Group authority. As for any evidence review I did from home, all was done in accordance with policy and guidance. Any evidence I did take home was all authorized under policy - it was not original or derivative and was only working copies. As a matter of logistics, I would not have been able to take home original or derivative evidence as I do not have the technical equipment at home to review them on my laptop. Rather, in accordance with policy and guidance, I had copied select datasets from evidence sources onto a thumb drive or external hard drive as working copies, which I would review at home. The original device would have been checked into the ECU and a copy would have been on the C-20 lab server. The lab server had to be connected to the Internet in order to send CSAM to NCMEC. As mentioned previously, the official way to send CSAM 4mageo—toINCMEC is to use the SIFTS online portal. EFTA00173593 . They will accept hard drives but it is not what they want, and NCMEC has been moving to eliminate the use of hard drives altogether. There are conflicting policies, and I brought this up while assisting in revising the policy. I am one of, if not the only, Court-certified expert witness for the entire FBI for child exploitation. During COVID, the concept of remote working was becoming a thing. The idea came up during COVID to be able to do remote work since that is what the FBI was beginning to promote. The idea was continued by hearing from other members of law enforcement, including some within the FBI, that they were using versions of remote computing to access their forensic labs while away, such as wee on TDY or at a conference. The intention was not to work from home, per se, but rather to increase the efficiency of the forensic review process. The steps of imaging and processing evidence before it is ready for review can sometimes take days. During this time there is little for the DExT Agent to do while the computer is doing its processing work. What little there is for the DExT Agent to do is often what separates one stage of this process from the next. So if a stage is completed on a Saturday, it will not move to the next stage until the DExT Agent does the very few things needed to precede, which may not happen until the following Monday. This EFTA00173594 may then kick the process off to the next stage, but now the Agent may have to wait several hours or longer for the next step. In order to be more efficient and to allow this process to begin on a Friday, for example, and be ready for review on a Monday, the idea of remote computing was a reasonable solution. Remote computing would have allowed €ee a .the DExT Agent to remote in over a weekend to initiate the next stage of a process so that the process took advantage of the weekend to conduct the lengthy steps so that by Monday it was ready for review. The downloading process could take a while, but the steps between the process were three or four clicks. If I knew a hard drive was going to take a day or so, and the next process would also take a day or so, I did not want to go into the office just to click a button. Especially in a densely populated area like New York City during COVID. The idea was to be able to remote into the server and tell the computer to move to the next step of the process. Our use of remote computing was reinforced I cam: by this idea a few years ago when I attended training provided by the International Association of Computer Investigative Specialists (IACIS) Fre-i-esee during which we went through basic computer forensics. I heard about law enforcement use of Remote Desktop Protocol (RDP). I believe RDP was being used in the Bureau but I am not sure what for purposes or on what devices. I spoke with EFTA00173595 several others in the FBI about RDP, including the DExT PM at the time, SSA Heath Graves, who mentioned he had either been using it or toyed around with the idea. SSA Graves mentioned to me that setting it up and using it was fairly easy and that all I needed to do was follow Microsoft's directions as they were pretty easy to follow. SSA Graves knew what my intentions were and thought it was a great idea to be able to remote in to cut the lag time of our processing. I thought the C-20 system was secure. I attempted to access the C-20 computer lab through RDP. I believed the lab's security prevented me from remoting in. I had no idea that in so doing I had opened the lab's RDP port and that i--thel—ftert—lerrew it had worked. I could access the port from in the lab, but once outside the lab, I was unable to gain access to the network. thought the security was doing what it was supposed to. I was later advised that the RDP configuration was mostly correct and that I was a step or two away from having set it up successfully and securely. latcr found out I wao a otcp or two from making it ouper occurc but did not know what I wan doing. I was not trying to be lazy or silly, I wanted to be more efficient in the download process. Sometimes I would start a process on a Friday only to come in on Monday and see it crashed and needed to be restarted. The RDP would have allowed me to see the crash and EFTA00173596 restart the process remotely. I had the idea of tcicw rking im COVID. I believe enabling remote access to the C-20 computer lab was a good initiative, the leaked as in the 41 be "very gocaM IE ect. in the qh... place, 1 u44 :at.. My heart and mind were ilerwas nota 11 setting up not kOAMIIIIto Set repeated rea nuntable Mencoura my I thought attempt to remote into the C-20 lab did not work because the security settings were effective good. I asked for help, even help with RDP, from nearly every unit in the FBI that had anything to do with networking, DExT, etc., including CACHTU and the DExT PMs. All I got in response was encouragement in what I was doing, but no form of technical assistance. EFTA00173597 I attempted to set the RDP up in either the Fall/Winter of 2022 or early 2023 De -e-he- 2022 es Jantar), 2023. The intrusion happened on Super Bowl Sunday of 2023 and I discovered it the very next day; on Monday. I provided the interviewing SSAs with an outline I drafted on 02/13/2024 of the intrusion situation which I read out loud. I signed the copy of the outline and provided it to the interviewing SSAs to add to my statement. The following is from my outline. This portion of my statement is written as it appears in the physical outline: Seamus, below is a timeline of what transpired today, noting that we had no idea this was a potential hack until late this afternoon. Given the potential that someone accessed our lab to do this, and that the issue may have been with the way we setup our network, below is also a little insight to the many attempts we've made to get the FBI to assist in both physical security to the lab and to help with networking: Today's events (approx times) -7:30am - I arrived at the office and noticed my Talino computer had restarted. EFTA00173598 -7:40am - I logged in to my Talino and a txt file popped up that said in part my network has been compromised and provided an email address to contact. This file was in the "startup" folder so when logging in it opened automatically. I ran my computer's anti-virus software, which was up to date and active, and it identified one potential threat which I attempted to remove. While this is not common, it is also not unusual given the data we recover from 305 subject devices. -I attempted to remove the potential threat, but my administrative privileges had been removed, and despite many attempts to gain access, I could not -8:30am - I reached out to Christian Idsola at CART for help, but he was going to be tied up for a couple of hours -9:00am, I reached out to Talino for help and they walked me through some steps, but nothing worked. They then advised me of a process to take to run antivirus software against my Talinos Operating System hard drive, which took some time but identified the likely source of the threat, which was attributed to a forensic program we use called Axiom. The threat was determined to possibly be a "booby-trap" left by a subject (who is a hacker) that was tripped when the Axiom forensic program ran EFTA00173599 across it. After this discussion it was believed that was the reason for the issues and we then began working on a solution, which seemed likely to fix my issue. -Around this time I also noticed our main server was down, but I didn't think too much of it since we just added a new switch and tried to configure some ports to run at different settings to increase our bandwidth. I assumed at the time the lack of access was a result of incorrectly applying the settings to the "LAG" and "BOND" configurations of the switch. I was able to see that according to the switch, the server seemed to be connected just fine, so I spent some time troubleshooting it. -Around 11:00am or so I was finally on instant message chat with the makers of the server, Synology, who had us conduct some tests and they ultimately concluded that a possible issue was a defective hard drive in the server. This was a problem sine the server is "raided" and finding the defective hard drive was a time-consuming and difficult task, but several of us began our attempts. -3:00pm - Is when Christian Idsola and Lewis LNU from CART came over to help. After a bunch of triage and testing we could not EFTA00173600 figure out why we could not connect to the server, since by all accounts it was working. -We then noticed that our other servers (NAS1 and NAS2) were also not working properly, although we were able to access their control windows, unlike with the Synology server. After some digging around we noticed the folders that contain our data was missing. Initially we thought this was due to a firmware issue since Christian and I had dealt with that in the past and resembled the same issue. -Around 3:30pm or so we located the log files and began combing through, which is when we noticed strange IP activity that took place yesterday from two IP addresses. The activity included combing through certain files pertaining to the Epstein investigation. I reached out to one of the case agents to see if they were in the office yesterday, thinking that maybe they inadvertently changed a setting on the NAS or if they noticed anything strange about them. -Around 4/4:30pm we dove into the IPs and checked all of our computers to see which had the IPs in question. One computer, our discovery computer, matched one of them and is located in a room next to the lab, The other IP is one we don't recognize, but is the same address as the IPson our network, leading us to EFTA00173601 believe it was a computer that accessed our network somehow. We were not able to identify the computer, but it had to have accessed our network either by being plugged into the network, or possibly by telnetting in virtually. -5:00pm - we realized we were hacked and discussed what we needed to do to ensure its contained. -5:15pm, we immediately saved our logs and shut everything down. We disconnected the Internet and ensured anything containing a log file was preserved. -5:30pm - I began calling my SSA, Bob Whelp in Security, Jessica Cardenas at CART, Amit Patel in Cyber. Physical Security -nec, 2021 - Moved into the 10th floor lab -Dec, 2021 - made numerous requests for an electronic keypad lock on the door only to be told by the locksmith there is no funding for a lock. These requests have been made numerous times from Dec, 2021 until a couple months ago, when the response was to make numerous copies of the key we have to the lab Networking/Network Security EFTA00173602 -Since approx 2017 we have elicited help from CART and Cyber in networking our lab, all to no avail. Some CART and Cyber folks have come over on their good graces, but they were not network savvy and just tried to do what they could. Some months ago (I can look up the exact date) we again requested help from CART, but were told their networking person was too busy to help. This meant no one with networking experience or ability was willing to help, so we had to figure it out on our own. - End of the Outline - Once I realized it was an intrusion, I called SSA Seamus Clarke, and Bob welp with Security. I also called CART and Cyber. This all occurred the same day I found out about the intrusion. The switch box was for the internal network. We had a server rack and a server. We had a switch box and we just added a second switch box. We also had a misattributed Internet that was connected to the 0CE computers. The switch boxes were never connected together. The Internet entered through a router that was connected to the DExT computer and connected to the switch box. I believed all were secure. I believed, since we had a revolving door of Computer Scientists and CART members, and since CACHTU was aware and EFTA00173603 having other offices emulate the C-20 computer lab, I thought we were good. When the intrusion happened, we were in the middle of piloting Axiom. I tried to figure out Python and Cithub and I talked Le pewp1 en he.. to . I thought of a lot of different things to allow remote access. We were trying to be on the cutting edge and think outside the box. We have a large set of hash files that we sent to NCMEC. A hash is a random string of text used to verify the integrity of a file. Rikela at ir t- -1tW iriiiiiniquiliind can cataloged.--Regarding-CsAm,- all-fileiare-"hashed" values are distributed throughout law enforcement aridIPOUTE Sector entities. using these hashes, CSAM can be detsiMWdifi 1ifiles hash matches that of a CSAM hash, the filiaRIS 0.dentified as CSAm without even having to see it. q.ltel—een—be used t ensure that a d wnl ad file is legitimate. We wanted to share what we had with the RAs. 500 terabytes of data was gone as a result of the intrusion . I was able to recover about 400 terabytes of that data, however. I was told to Google how to recover the data. No one else tried to help us. The OCIO Section Chief (SC), Matt Smith, was pissed because he found an email I had sent prior to the intrusion requesting assistance that no one had responded to. I spoke with SC Smith who believed this was part of systemic failures. We asked for EFTA00173604 help, and our requests fell on deaf ears. We were always referred to someone else. I understand I opened the C-20 lab's RDP ports, but it was my fault for turning on the RDP sights. I Was trying to make things better, and moreover CACHTU and other HQ and management entities knew what I was doing and supported me. The policies are not easy to find. FBI HQ Criminal Investigative Division (CID) DAD Jose Perez has since acknowledged the policy for the lab was vague or non-existent, I was not part of the conversations to conduct a Security Incident Reporting System (SIRS) report. I believe that if I did not have the initiative, we would not have had our successes. I continued to receive praise for my work, and CACHTU has continued to ask me to review policy before it is sent out to the field. I took over the Group I UCO and doubled its statistical accomplishments. I have rescued more exploited children than anyone in the NYFO and in most of the Bureau. All I wanted to do was better the Bureau. howa bebee everything I did was with good intentions. I love this job._ I was not reckless. There was no self-interest involved. I was always trying to do the right thing. I also want to point out Commented (JR3): Excellent! Jim Roberson 2024-09-17 10:50:00 Commented 1CT4R31: I modified this a little. Want to chat with you about it later. 00 TechTeam 2024-09-18 11:13:00 EFTA00173605 that I was Pic# awarded the Medal of Excellence for my work, among other acce. Prior standard fo ratings wer often toute the Bureau. victims be ands I9 Af -[to CART_Lirna4 0 a-4 r hers on myal ppnwrimallIMMIIIMIllitirded to be imagOOM, processed, and all but 12 of these devices had been taken to CART. Prior to the intrusion Agents on the squad could begin imaging evidence they seized the same day and were generally done imaging all their evidence within a few days. However, the average completion time for CART to image devices was approximately 30.5 days. This is a staggering number and is a EFTA00173606 prime example of why the DExT program is so important and how much of an impact the DExT lab had on my squad's ability to swiftly and effectively conduct child exploitation investigations. Additionally, this summary highlighted an instance it hich, because of the lag time at CART and the amount of time it took to image and process devices, an offender who was a citizen of another country managed to flea the United States before the review could be completed. It is almost certain this would not have happened if the DExT review could have taken place in the squad's lab. However, it did happen, and again illustrates the significance of the lab and why the enhancements I made over the years, and the numerous pleas I made for help, were so important. This summary haj to rteall Agents, and I can mail lkue4. I briefly mentioned ApostleX earlier in my statement. It is both the name of a company and their product. I had no previous relationship with the company. ApostleX came to the FBI. They were touring the United states and approaching law enforcement and intelligence agencies promoting their product. They are a startup company. ApostleX reached out to several entities within the FBI; not just the NYFO. One of the ApostleX employees is a retired agent from NYFO named Chris Braga. I knew EFTA00173607 Braga from NYFO as a polygrapher. In October 2021 Braga reached out to me and several other individuals in the NYFO about ApostleX. I initially did not care much about the product. They were pitching a preservation tool that was geared towards CHSs. It initially did not sound relevant to what we in C-20 were working. Braga worked it out with others in the NYFO and set up a few information sessions for different NYFO Divisions. Our Gang squad, C-30 had an information session. On 10/20/2021, the C-30 SSA sent out an email to my SSA who sent the invite for the presentation to our squad. Another Agent from my squad and I decided to attend. I attended what I believed was a Bureau- sanctioned information session. I showed up late and left early. The portion I did sit in on talked about how ApostleX helped with their CHS's use of 3rd party apps. The lack of technology available to preserve encrypted apps, or self-destruct communications, was a widely known issue. Self-destruct apps cannot be recovered, which makes them very popular with VCAC offenders. There were not good methods to capture the information. We voiced concerns about this for years, but there was no fix. We did not have the ability to go after VCAC offenders who used self-destruct apps like Wicker. There were, and remain, no ways for us to preserve that. When conducting chat operations, depending on the application being used, the OCEs are unable to preserve the EFTA00173608 chats with the offenders. Some applications allow for as short as a one second self-destruct period, meaning that after one second of viewing the chat, it is deleted and gone forever. There is no forensic program in existence within the FBI to preserve that chat. Furthermore, designed in such a way that these self-destruct apps are efEee—t-he—WC--cra.w—t-he—aPP—e+—i-Fialeri-‘ s gene. If if an OCE attempts to yen—screen record or use a screen shot to preserve a chat they either alert the person on the other end or do not allow the screenshot to be taken. The Bureau's answer to this problem was not really an answer. Some responses to this problem were to use another device to photograph the chats, which is problematic for a variety of reasons, while other responses were for our issue to be passed around. Once ApostleX came along and I heard what their product did for CHSs, I asked if it would work for encrypted chats and self- destruct chats. They said it would. I left the meeting and met with ApostleX after the presentation was over. When we met we discussed if their technology would do what I described. They advised they would check and get back with me. They got back to us in early November 2021 and advised they believed they had the ability to incorporate what I was asking for. I lead the effort with ApostleX but my squad was involved. I spoke with SSA Seamus Clark and ASAC John Penza (retired). We saw the benefit of it EFTA00173609 for VCAC purposes. My bosses wanted me to explore it. It was early on, and we needed to do everything right. I believe there were a ton of Agents, throughout the Bureau, simultaneously engaged in similar conversations with the ApostleX company, discussing how to purchase the tool. The ApostleX company has been to multiple FBI offices and may have had conversations with Safe Streets. I believe the ApostleX company pitched OTD and other III. At one point I even had Executive Assistant Directors (EAD) reach out to me personally about ApostleX. On 11/08/2021, ApostleX requested I sign a nondisclosure agreement. I reached out to NYFO Chief Division Counsel (CDC) Tara Semos and we may have also spoken with an Assistant Division Counsel (ADC). The decision was that we would not sign anything. We did not have the position or authority. I told this to ApostleX, but I also told them that we were not going to steal their intellectual property. People liked the Bpostlex program. The consensus was that it was not a fully developed program, but it could be developed. I be44eve—kno1/4 there are currently wet-e—a number of programs that are used today in the FBI that were made through Agent input, and some that were created entirely by Agents themselves. Axiom is a CART-approved tool that the Bureau uses. I was asked to work with Axiom on how it was useful for us and what changes EFTA00173610 we could be made to make it better for the case Agent. With respect to ApostleX, my understanding was that we were talking to a company that was brought in to us to fix a problem Agents encounter when dealing with a throughout the Bureau routinely CHS or an OCE ; namely the undetected real time preservation of their text chats. We communicated with CACHTU who liked ApostleX, but said they would not commit funding. In November 2021 ApostleX was still conceptual. It was in the right direction but needed to be refined. They knew from a big picture standpoint what the problems were. From a technical standpoint the product was a home run. Nothing I or my squad did was done in a vacuum. We briefed all the way up to the ASAC (Penza) level. He did not want us to go to the Assistant Director in Charge (ADIC) with a problem. He wanted us to also have a solution before we briefed the ADIC. He wanted the product to be more developed. He did not want an on- paper solution. At no point did anyone on my squad or I sign a contract with ApostleX, or with anyone else for that matter . We were going through the (PgIA) steps to get the Bureau to sign a contract. We also never orally or verbally agreed to a contract. It was our goal to have the FBI take on pursuing a contract, not us. EFTA00173611 At this point ApostleX was a concept and not a product. My chain of command had no issue with me working with ApostleX to develop the concept into a product. We were briefing our chain of command regularly and we even brought in our Intel supervisors. We wanted to make the product useful, not only to us, but to other people throughout the Bureau as well. We brought in CHS Coordinators, people from Intel, and people from the VC program. We did not want to think singularly about our violation. It is required by FBI policy that we preserve OCE sessions, but even to this day the technology does not exist to do it. I saw it almost as an entrapment for OCEs, in that we are required by FBI policy to preserve chats, yet the FBI has not provided us with a means to do so. We saw ApostleX as an opportunity to address this and other concerns, follow policy, and follow the law. I believed certain methods to preserve were Current methods include all or nothing solutions, which result in "over-collection" and create potential First Amendment issues, in that they may record the communications of people who were not involved in child exploitation crimes or violating the law. ApostleX addressed this. The support we got from the onset of that vision was incredible. FBI HQ knew what we were doing because I discussed with them the problems we were having with apps like Wicker. ApostleX EFTA00173612 was already successful with apps like Telegram, and were working on Signal and a few others. The ApostleX ',release engineers figured out how to make their program work with Signal while we were working with them. They were going in the right direction, we just needed to guide them towards a total solution to our actual needs nudge them. They were already working on trying to fix the problem OCEs were having in 2021. We just needed to work on how to preserve apps that created secret and self-destructing chats. The ApostleX company was never given access to FBI information. They did not come into FBI space. We would FaceTime them. we never gave them anything that belonged to the FBI. The ApostleX program was installed on a completely standalone computer that was connected to a misattributed Internet line. It was not attached to any FBI networks, covert networks, or storage containers. The computer with the ApostleX program was in FBI space. It was an old computer that was going to be thrown away. It was a covert computer. I cannot recall if we had a Computer Scientist (CS) wipe the drive of the computer or if it was provided to us with no drives and we installed wiped drives. Either way, we had to install operating systems. The CS was Jim Walsh. The computers were given to us to use at our discretion. I do not remember if I told him what the computers were going to be used for. I am not sure if we got the EFTA00173613 computers before or after we heard the ApostleX sales pitch. One event did not trigger the other, ApostleX III *MA* on a main computer. In our case it was the one we set up. The ApostleX database resides on the computer and the computer's sole function was to run the Apostlex server. ApostleX allowed undercover phones to connect to it. Apostlex is a server that sits on a computer and runs in the background. There is a web-based computer interface. It only works from one particular computer which sits behind a Virtual Private Network (VPN). If I am an OCE using the Telegram app I would connect my Telegram account to ApostleX. There is an authentication process. We had the company add an icon that let the OCE know ApostleX was preserving the chats. The ApostleX company added a small icon that showed ApostleX was active. ApostleX's integration was chat application specific, so we were only preserving what needed to be preserved. It started with Telegram. Around the time we were told to shut down, it worked with signal. We were getting close with What's App. Any Telegram account we wanted to preserve would be added to the ApostleX account. We had the ability to select what was relevant and what was not. could do an account takeover of a Subject's account. With Apostlex there is an ability to not over collect. With appropriate authorization, wi EFTA00173614 ApostleX was initially grabbing everything, and we would need to check what to preserve. We wanted to make a parameter for how long to keep information that was not checked, which would then be purged. The accounts would be taken over through consent or with a warrant. We were testing the capability of Apostlex to preserve self-destructing chats. Initially, in the testing environment, the disappearing chats were preserved on both the sender and the receiver's telephones, which obviously would not work for us. that. We worked with the company to address The ApostleX company did not have the ability to access the data we collected from chat applications, but they could see the telemetry coding. I believe OCIO looked at that and were happy with it. SC Matt Smith from OLIO was also involved and sent Requests for Information REIs) to our local ISSO, Jim Eckel, who reviewed ApostleX, the code, and had at least one call with them that I was a part of. I believe he also had additional communications with them that I was not a part of. In the end, I know that OCIO's questions were sufficiently answered. dealing with that. We never went live with the ApostleX program and only operated it in a testing environment. We did not use active cases. We used dummy phones and OCEs chatting on the Telegram application. We added a bunch of older OCE Telegram accounts to EFTA00173615 test it out. All of the accounts we used were real covert accounts. Some of the accounts were historical attached t them that Lerc cxp scd to Apostle)'. When we synced ApostleX to chat application accounts, the entire history of the chat application account would be pulled. The information was exclusively stored on the local hard drive of the computer running ApostleX. One of the Telegram accounts I used for testing was about 12 years old. The test accounts I used were not involved in any chat groups that were pertinent. I am not sure about the other folks who were testing ApostleX. I do not believe anyone cared about the accounts we used. I believe the historical data attached to the accounts had already been adjudicated but it is possible some of the information may not have been. I cannot say there was no evidentiary data put on the standalone ApostleX computer. I do not believe having information on the ApostleX computer was any different than having it on any other computer, . I did use a historic case to demonstrate how we could export from ApostleX for discovery purposes. The case was not fully adjudicated at that point. I am certain dews# believe the accounts we were using had no impact on w uld have EFTA00173616 temptem‘sed any ongoing investigation. There was likely CSAM from the historical accounts that was extracted and uploaded onto the ApostleX computer when the historic accounts were synced with the ApostleX program. The ApostleX company or anyone else could not see it, however. It took a while to set the standalone ApostleX computer up. We may have hooked the computer up in December 2021 or January 2022. We tested it intermittently for a couple of months. It would be a days long process to reconfigure things. We would give feedback to the ApostleX engineers who monitored the telemetry data and could see the issues with the ApostleX program from their end as we tested it. Sometimes the fixes took a few hours or a day or two. Once they had a fix, ApostleX engineers would send me a tout document with instructions on how to fix the issues. Any message that was sent from the company was done through Bureau email. The instructions It would be a tewe—deawmerserwritten in the email itself or provided verbally. Though it is possible I may have used my personal telephone to communicate with ApostleX engineers using the video teleconferencing application, Zoom, I do not recall for sure. I do believe I may have used my FBI laptop and possibly my OCE telephone for the Zoom calls with ApostleX engineers, however. I used a mixture f pert nal and Bureau devices t receive tho instructions and communicate with the Ap sticX company. At times EFTA00173617 I used my per• nal telephone t c nduct teleph nc calls r vides ch"ts ItsIth the Apoetl-X en51—e..s while I ..as in FBI prod minatcly uccd Bureau equipment. Sometimes the ApostleX engineer could see me during our Zoom calls and sometimes not. We sanitized the FBI space if the engineer would be able to see me. We would input the instructions sent by the ApostleX company into the computer with the ApostleX program on it. Ede—fret-M kThic is sounding way off II Ay,,,,L1X wth. by lin need to elailf, e.aie I think this should be rcmcvcdH There were a couple of times I had "tech people", SA Robert Depresco, and—SA Martin Nachman, and others look at the ApostleX computer and to review the code. I also provided the code and entire system to the NYFO I550, Jim EckleJ and others from OCIO to review the code and system. Additionally, I advised OTD and FBI HQ that they could review it as well. It is possible I forwarded the codes for other people to look it. for updating the There was no formalized process set up standalone ApostleX computer. The updates consisted mostly of updating a configuration file and if I needed to change code it was due to the configuration file. I Commented IJR5I: I'm not sure how to incorporate this infommtion into the sentence. Aaron. Jim Roberson 2024-09-16 10:12:00 Commented TCT6R5II: I'm not sure either. l was in FBI space when speaking with them, but so what? C20 TechTeam 2024-09-17 06:37:00 Commented pR7R5I: OK. Just delete it, then? Jim Roberson 2024-09-17 10:54:00 Commented OK. Fix it and remove whatever is misleading or incorrect. Jim Roberson 2024-09-16 10:15:00 Commented (CT9R81: Can we just delete it? 00 TechTeam 2024-09-17 08:59:00 Commented jJRI0R8J: Yep. Delete it. If INSD makes an issue of it vec can talk it out with them. Jim Roberson 2024-09-17 10:55:00 EFTA00173618 made the deliberate decision not to let the ApostleX company remote access into the standalone ApostleX computer. During this process, I felt like the ApostleX company was a verified entity and I was working with someone the Bureau invited in. We ran the security process through OCIO and the NYFO ISSO, Jim Eckle, and Certified Information Systems Security Officer (CISSO) Robert Cavallo who were all satisfied with the setup. The NYFO did not have either the ISSO or the CISSO positions staffed until February 2023, however. Only Ny squad SSA, branch ASAC, ad NYr0 CDC, and CACHTU were all aware of ApostleX and of what we were doing with them from the very earliest stages. There were others in the office who knew as well. As we progressed with our testing and development of the program, others were involved to include the Office of General Counsel (OGC), the General Counsel himself, the Procurement Office, several ACsl, the NYFO ADIC, and various other leaders in FBI management. At a minimum, my squad SSA, branch ASAC and NYFO CDC all knew what we were doing. OTD was also involved but not at this stage. CACHTU was aware and the Child Exploitation Operational Unit (CEOU) was also aware. I had gone back and forth with them a bit. There was communication on 11/08/2021. I was passionate about this product as a force multiplier. I can assure you there was nothing done in a vacuum. EFTA00173619 Oben I started working with ApostleX on this product, my chain of command knew. My chain gave me the thumbs up to proceed and my guidance was to get to a point where it was functional before we briefed the ADIC. From the very beginning I had the approval of my SSA, ASAC and CDC. I reached out to CACHTU to see who I needed to work with to get it approved. They said if I could develop the tech, it would be fucking great. We also discussed funding, and CACHTU was not sure who would fund ApostleX. They said that perhaps they could fund the VCAC portion of it, but that for ae enterprise-wide use funding would have to come from OTD or elsewhere. Thereitiei—i-t—wes—rtert—geinerbe—be—fttrgekud—ernel—E did not honeys CACHTU w uld fund it until there was a w product. As I mentioned previously, i n April or May 2022, I went to an IACIS conference and the ApostleX program was working. Leslie Adamczck, who was a former squad mate and a VCAC PM, was also in attendance. I told her about the product. She said it needed to be briefed at the Program Coordinators (PCOR) conference. That was the perfect venue since it would be attended by VCAC PCORs from every Field Office I was added to the list of presenters. I had conversations with the PMs and UC who were in charge of the conference, and I was added to the agenda. I worked on a presentation and showed it to SSA Adamczck. She loved it. SSA Commented OK. Remove it. Jim Roberson 2024-09-16 11 :14:00 EFTA00173620 Adamczck was a PM for CACHTU at the time and was coordinating with the person who put the conference together. I submitted a summary of what ApostleX was and what I was presenting on. I submitted a draft of my presentation prior to the conference SSA Clarke was present during my presentation. The PCOR conference presentation went well. There were numerous L. h.nd fall e4 questions and I had people who called me to talk more about it later. I heard from an Agent in Las Vegas whose SSA, Matt Schaeffer, was on an 18-month TDY to CACHTU as an Assistant Section Chief (ASC). The-ASC Schaeffer did not like the ApostleX program. The feedback was all positive except what I heard second-hand from ASC Schaeffer. During my presentation I made it clear that ApostleX was technology that we were developing but that we did not have yet. If I made comments during the presentation about not following policy in my work with the Apostlex company, it was done as a joke. I was briefing a room full of supervisors as well as CACHTU about a program designed to help all of their Agents. In no way, shape, or form did I ever say, in any serious fashion, that I violated policy ene4or that I paid anything for ApostleX. There is a possibility that I may have made jokes about paying the Apostlex company a dollar for the program, but I did not pay them a dollar, nor any amount for that matter. At some point early on there may have been wee—a conversation with Apostlex about if we should pay the EFTA00173621 company a dollar. We were concerned that we were using a product for free. I took the question to legal or maybe even my bosses. The decision was made not to pay them. I remember this conversation occurring, but I do not recall the details since no monetary exchange ever took place. I began hearing rumors in March or April of 2023 about things I said during my ApostleX presentation at the VCAC PCOR conference context. being taken out of There was never a contract between the FBI and ApostleX, either orally or in writing, and if there had been it would have been through approved channels and not with me. During the PCOR conference, ApostleX was still soliciting the FBI about their product. Around that time, ASAC Penza retired and at some point, Spencer Horn became ASAC. The ApostleX program was not active; there was no contract, and my chain of command was aware of what I was doing. The guidance to get the concept to a place where it was a better solution before it was briefed higher up the chain of command continued after ASAC Penza retired and ASAC Horn came in. The SAC was eventually briefed. A few days after the VCAC PCOR conference I heard from Joanna Pasquarelli who iS a General Attorney (GA) for OGC. GA Pasquarelli attended the VCAC PCOR conference and saw my presentation. GA Pasquarelli informed me we needed to stop testing ApostleX immediately. She did not say we needed to stop EFTA00173622 working with the ApostleX company, but to shut down the computer with the Apostlex program. We did so immediately. She also informed me we needed a PIA. She also had concerns about the Fair Act and the procurement process in relation to how we worked with the company. We discussed the laws about companies bidding on the chance to work with the FBI on a product as opposed to a single source product. This process eventually included a lot of people from OGC. I spoke with CDC Semos about my conversation with GA Pasquarelli. I was sent a "pony" of the PIA which I filled +.e out and returned. GA Pasquarelli was very pleased with what I turned in. There were a lot of email communications and Microsoft Teams calls. We had to do some comparisons to see if there were other companies who offered products similar to ApostleX. I had spoken with OTD about the issues with OCEs were having capturing chats on encrypted applications and capturing disappearing chats in the past. We had tried, unsuccessfully, to get OTD involved prior to this process. After OGC was involved, they required us to check with OTD on what they had to address the issue, or if they could come up with a solution in house. We also asked if OTD would work with the ApostleX company to develop the ApostleX product. We learned there was a product called Eagle Claw available which I believe should be taken off the approved list of tools to use. There was only one guy at the EFTA00173623 time working on Eagle Claw, and he said what I described of ApostleX was a homerun. Eagle Claw had a lot of limitations. We spoke with a lot of people about existing programs and external products as part of the procurement process. Nothing could do what Apostlex could do. I continued to work through my chain of command, CACHTU, OGC, Safe Streets, OCIO, NYFO ISSO, Finance and Facilities Division (FFD), OTD, and various units within OTD. We were moving along up and through the holidays of 2022. There were a lot of revisions to the PTA. We worked through an emergency in which Boston Field Office had a hands-on offender and they needed to preserve their chat information. I worked with OGC GA Christopher Dearing on PIP. revisions. I was delayed getting back to him due to a trial. Once I got back to him, the cyber intrusion of the C-20 computer lab happened. EFTA00173624 The standalone computer containing the ApostleX program had been turned off in our testing environment since July 2022. We were not using it at all. I am not sure if it was even plugged in. I heard there was a rumor that some people believed Apostlex had to do with the C-20 lab computer intrusion. I received an email from CDC Semos that ApostleX was going to be shut down due to the belief it was involved in the intrusion. This was completely untrue, of course. ApostleX had nothing to do with the intrusion. I believe CDC Semos cleared this rumor up with OGC. My chain of command wanted ApostleX to continue to move forward because they saw value in it. 4-11OIIVion t2 SAC Robert IIIIIIID other. - Lives, We saw that NYFO Criminal Division and CACHTU were being a roadblock. We had a meeting with SAC Brodack prior to the C-20 lab intrusion to get the ADIC involved in the ApostleX project to push the needle forward. We wanted to be able to pilot the program. Some of the questions from DGC asked who was supporting EFTA00173625 the ApostleX project. The intrusion happened before a formal briefing could take place, however. There was a meeting about ApostleX with NYFO Counterterrorism (CT) Division SAC Robert Cassane in August 2023. CDC Semos, ASAC Horn, the ISS0, SSA of the Tech squad, Eddie Pennetta, SA Depresco, and SA Nachman. The meeting was about trying to use a Domestic Terrorism (DT) case as a pilot case for ApostleX. There were still conversations about ApostleX taking place until I was noticed of this INSD internal investigation. I was working with the International Terrorism Operations Section (ITOS) and some thigh-tech unit. They were asking for information to push up to EAD Larissa Napp, who reached out to me personally. I had my ASAC respond to her on my behalf. After the C-20 lab intrusion, CACHTU wanted nothing to do with ApostleX. NYFO wanted to see if they could do something with ApostleX on their own. They also got CT involved to see if they could push ApostleX through their networks. There were conference calls with the ApostleX company to field questions. Representatives from the ApostleX company may have also gone to Huntsville, Alabama and spoken with the AD of OTD. There was confusion on getting the Authority to Operate (ATO). It was a chicken or the egg situation. We did not know Commented 1JR12I: Can you identify this unit by name? Jim Roberson 2024-09-16 12:41:00 Commented 1CT13R12I: Ill try to find their name - there were a couple units that worked on the development of tech - some in CT some in Crim. maybe one in OTD C20 TechTeam 2024-09-17 09:15:00 EFTA00173626 which one we needed first, the ATO or the PTA. We were working on the ATO process as well. CACHTU funded the equipment for the c-20 lab. I believe Group I UCOs were exempt from needing an ATO. ASAC Horn was trying to see if we could get approval to use ApostleX under the Group I because he believed we would not need an ATO. I believe this was discussed with CDC Semos, because I was present when they argued about it. wk had a did n t agroc with ASAC ❑orn's onscoomcnt. When I was putting together the information for the C-20 lab, I did not know about an ATO requirement. I later found out we did not need an ATO for covert purchases. I think they may have tried to change that after-the-fact. There was a financial threshold for the lab purchases. This was approved by Jack Cordes in OGC. It outlined what was needed for the C-20 lab and how we were going to use the equipment. I believe everything that needed an F number received one. Noone ever told me of the requirement for an ATO for the C-20 lab. It came up after ASAC Horn and CDC Semos had their discussions. Some of the ApostleX company sits in Ireland and some in the United States (Us). They are registered in the US to receive government contracts. Our squad's end-of-year review for fiscal year 2022 mentioned ApostleX as one of the reasons to give us a gold EFTA00173627 rating. However, ApostleX was also lictcd _eferenced as the reason for a lower program rating for fiscal year 2023. CACHTU initially rated our squad "gold", the highest rating, but Deputy Director Paul Abbate later changed our rating to "red", the worst rating, and included the reference to ApostleX and its direct involvement in the intrusion as the reason, which is categorically false. My ASAC attempted to fight this false narrative but was told it could not be changed. I never understood undcrotand that just working with ApostleX in general could cause procurement issues, and even to this day as much as I have learned from all of this, I know that Try Hy:Cy-merit did not and would not cause r,--:urement issues. lasme_Iparne nu e_ same OGC was trying to figure out how to make it work. As mentioned previously, I think it is also important to note that NYFO did not have an ISSO or a CISSO when the C-20 lab was set up. IIII f iced Robert Welp. this position was only t the ISSO and CISSO :I have ed a document to NYFO SAC of not having Commented (JRI4I: Are you talking about the NYFO Chief Security Officer. or CSO. here? If so use higher titk. Jim Roberson 2024-09-17 11:03:00 Commented iCTI5R141: 1 don't know that he even had a proper tide. He was filling a vacancy C20 TechTeam 2024-09-18 15:04:00 EFTA00173628 these positions filled and the steps he took to fill them. If these positions had been filled there is little doubt that I would have received the assistance I needed to ensure our network was secure. However, these positions were not filled, and I was nevertheless encouraged to enhance our lab by all levels of management and received the necessary approvals along the way. I should not be punished for failures in hindsight that were out of my control. While I take responsibility for all of my actions, I am confident that nothing I did was without approval and everything was done in the interest of improvement. Under no circumstances whatsoever did exceed my authority by contracting an outside company. There was no contact. My 'chain of command, including our CDC and later gm-, to includ4 the General Counsel himself, knew I was speaking with Apostle* pm creating a solution to a problem. I engaged the PTA process ps instructed, working for months with many FBI lawyers, procurement officers, and management' all ensuring ourpursuiE of this_ needed program was done correctly. Any_notion that I violated any policy, rule, or regulation is categorically Lastly, it should be noted that, since the intrusion, my squadlmates and I have been referenced as having been "System Administrators", which we absolutely are not. The INSD report identifies me, and others on my squad, as having been System EFTA00173629 did not and do not possess. None of us on my squad do. In my defense I allikands , n snag supporting documentationil large IIIIIIIILL,these documents rasa and;mAi more if I am willing and eager to voluntarily take a polygraph examination concerning the truthfulness of the information contained in this signed, sworn statement. I have no other pertinent information regarding the aforementioned allegations. I have been advised that I should submit any additional information of which I may become aware, regarding this inquiry, to the Internal Affairs Section (IAS)/Inspection Division (INSD) or to the Office of Professional Responsibility (OPR). I have been given the opportunity to review this statement and make any changes prior to signing it. EFTA00173630 I was instructed on 01/26/2024 not to discuss this matter with anyone other than the person(s) conducting this interview, representatives from IAS/INSD, Security Division - Clearance Referral Evaluations Unit, OPR, the FBI Ombudsman, and/or an FBI Employee Assistance Program (EAP) Counselor. I have been told that should I decide to discuss this matter with anyone else, I must first obtain authorization from the interviewer(s). I have read this statement, consisting of this and 36 other pages and it is true and correct Aaron E. Spivack sworn to and subscribed before me on the Xnd day of September, 2024, in New York, NY. Dennis W. Price, Jr. Witness: Commented (CT161: 1 provided far more than 36 pages - if he is referring to my attachments then this number is far off C20 TechTeam 2024-09-17 11:00:00 Commented (JR17R16(: I think this is only referring to the number of pages of the actual statement itself. Not the attachments. You can fix it. The statement is a lot longer now than it was originally due to all of our edits. Jim Roberson 2024-09-17 11:11:00 EFTA00173631 witness EFTA00173632

Related Documents (6)

DOJ Data Set 9OtherUnknown

UNCLASSIFIED/MOM

UNCLASSIFIED/MOM 01/26/2024 New York, NY , having been duly sworn by Supervisory Special Agent (SSA) following statement to 01/26/2024, and and and and ., hereby make the on on 08/08/2024, on 10/07/2024, whom I know to be SSAs of the Federal Bureau of Investigation (FBI), assigned to the Inspection Division (INSD) at the time of my statement. My attorney, Richard J. Roberson, Jr., was present during my statement all occasions, via telephone. This statement took place over a three-day period. The statement initiated on 01/26/2024, and again on 08/08/2024, after additional allegations were added: I entered on duty (EOD) on 02/21/2006, as an Intelligence Analyst (IA). I EOD on 10/08/2008, as a Special Agent (SA) and I am currently assigned to the New York Field Office (NYFO) in that capacity. I understand that this is an internal investigation regarding an allegation that Special Agent improperly stored digital evidence at his residence in violation of 1.6- In

106p
DOJ Data Set 9OtherUnknown

I, Aaron E. Spivack, having been duly sworn by Supervisory

I, Aaron E. Spivack, having been duly sworn by Supervisory Special Agent (SSA) Dannie W. Price, Jr., hereby make the following statement to SSA Price and SSA Matthew A. Zavala on 01/26/2024 and SSA Price and SSA Claudia Dubravetz on 08/08/2024, whom I know to be SSAs of the Federal Bureau of Investigation (FBI), assigned to the Inspection Division (INSD) at the time of my statement. My attorney, Richard J. Roberson, Jr., was present during my statement on both occasions, via telephone . This statement took place over a two-day period. The statement initiated on 01/26/2024, and again on 08/08/2024, after additional allegations were added: I entered on duty (EOD) on 02/21/2006, as an Intelligence Analyst (IA). I EOD on 10/08/2008, as a Special Agent (SA) and I am currently assigned to the New York Field Office (HYPO) that capacity. I understand that this is an internal investigation regarding an allegation that Special Agent Aaron E. Spivack improperly stored digital evi

88p
DOJ Data Set 9OtherUnknown

FRENCH REPUBLIC

FRENCH REPUBLIC MINISTRY OF JUSTICE APPEAL COURT OF PARIS PUBLIC PROSECUTOR'S OFFICE OF PARIS COURT OF JUSTICE Paris, July 8, 2020 DIVISION Section P4 - Public Prosecution Service for Minors. The Public Prosecutor To Prosecutor-General at the Appeal Court of Paris. SUBJECT: Request for international legal assistance in criminal matter addressed to the United States authorities concerning the investigation related to Jean-Luc BRUNEI., and others, in connection with the "EPSTEIN case". N/REF : prosecution number : 19 235 449 V/REF : APPLICANT AUTHORITY The Public Prosecutor at the Paris Court of Justice. AUTHORITY ADDRESSED TO The competent authorities of the United States of America. Having regard to the accord between the European Union and the United States of America dated June 25, 2003 which entered into force on February 1, 2010 ; Having regard to the Article 14 of the Treaty on Mutual Legal Assistance between France and the United States dated December 10,

7p
DOJ Data Set 9OtherUnknown

Attachment A

Attachment A CERTIFICATION FOR CONTINUED PRESENCE BY REQUESTING LAW ENFORCEMENT AGENCY TO: Unit Chief Parole and Law Enforcement Programs Unit Homeland Security Investigations U.S. Immigration and Customs Enforcement FROM: FBI, New York Field Office RE: Request for Continued Presence for: SAC , of the FBI New York Field Office concur in this request and certify, in accordance with the Department of Homeland Security (DHS)'s procedures for Continued Presence, that: 1. The justification and information concerning the request for Continued Presence are accurate and complete. 2. Documentation is attached certifying that the alien is a victim of a severe form of trafficking and may be a potential witness to that trafficking. 3. Name checks have been completed in the principle law enforcement databases on the person named in the request (National Crime Information Center and any other databases available) and, as appropriate, information from foreign law enforcement age

22p
House OversightOtherNov 11, 2025

Bill Siegel email chain discussing 'The Control Factor' and anti‑Islamic conspiracy narrative

The passage is an internal email and interview transcript promoting a conspiratorial worldview about 'Islamic Enemy' and 'Civilization Jihad.' It mentions Jeffrey Epstein as a sender but provides no c Email originates from Jeffrey Epstein's address, but only contains a casual invitation and a link to Bill Siegel outlines a theory called the 'Control Factor' that frames Islam as a coordinated threa

20p
DOJ Data Set 9OtherUnknown

IN RE:

IN RE: INVESTIGATION OF JEFFREY EPSTEIN Non-Prosecution Agreement IT APPEARING that the City of Palm Beach Police Department and the State Attorney's Office for the 15th Judicial Circuit in and for Palm Beach County (hereinafter, the "State Attorney's Office") have conducted an investigation into the conduct of Jeffrey Epstein (hereinafter "Epstein"); IT APPEARING that the State Attorney's Office has charged Epstein with one count of solicitation of prostitution, in violation of Florida Statutes Section 796.07; IT APPEARING that the interest of the United States pursuant to the Petite policy will be served by the following procedure expressed in this Agreement; IT APPEARING that the United States Attorney's Office and the Federal Bureau of Investigation have conducted their own investigation of Epstein's background and offenses including; knowingly and willfully conspiring with others known and unknown to commit an offense against the United States, in violation of Titl

6p

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.