EFTA00033568.pdf

57.6 KB

Extraction Summary

3
People
3
Organizations
1
Locations
2
Events
1
Relationships
2
Quotes

Document Information

Type: Fbi fd-302 report (investigation report)
File Size: 57.6 KB
Summary

An FBI FD-302 report dating from August 2019 detailing the forensic examination of an Apple iPhone XS (Model A1920) related to investigation 90A-NY-3151227. A Forensic Examiner in New York performed a file system extraction using GrayKey software; notably, the device had no unlock PIN associated with it. The evidence was processed under MDUS request #10754 and returned to the assigned CART examiner.

People (3)

Name Role Context
REDACTED ITS/Forensic Examiner (FE)
Performed file system extraction on the iPhone XS.
Unspecified CART Examiner
Assigned examiner who received the submitted item and derivative evidence.
REDACTED FBI Agent/Author
Drafted the FD-302 document.

Organizations (3)

Name Type Context
Federal Bureau of Investigation
Investigating agency
New York CART
Computer Analysis Response Team unit performing the examination
Apple
Manufacturer of the device (iPhone XS)

Timeline (2 events)

2019-08-26
File system extraction of Apple iPhone XS (Model A1920) using GrayKey v1.11.10.
New York, New York
ITS/Forensic Examiner
2019-08-27
FD-302 Report Drafted and Entered
New York

Locations (1)

Location Context
Location of investigation/examination

Relationships (1)

ITS/Forensic Examiner Professional/Colleague Assigned CART Examiner
Evidence returned from FE to assigned CART Examiner.

Key Quotes (2)

"No Unlock PIN was associated with this device."
Source
EFTA00033568.pdf
Quote #1
"New York CART considers this portion of the examination complete."
Source
EFTA00033568.pdf
Quote #2

Full Extracted Text

Complete text extracted from the document (1,759 characters)

FD-302 (Rev. 5-8-10)
90A-NY-3151227 Serial 59
-1 of 2-
FEDERAL BUREAU OF INVESTIGATION
Date of entry 08/27/2019
CHILD VICTIM AND CHILD WITNESS IDENTITY INFORMATION
This document contains information regarding a child victim's or child witness's identity, which may only be disclosed to individuals who have a need-to-know such information by reason of their participation in the associated proceeding, or if disclosure is necessary to protect the welfare and well-being of the child.
On August 26, 2019, ITS/Forensic Examiner (FE) [REDACTED], in response to MDUS request #10754, a file system extraction was performed on the following device using GrayKey v1.11.10:
Device: Apple iPhone XS
Model: A1920
iOS: 12.4
IMEI: [REDACTED]
IB Number: 1B44
No Unlock PIN was associated with this device.
A SHA256 hash was generated on the extraction file and saved. All extraction files were copied to an external hard drive.
The file system extraction was performed under legal authority attached.
The submitted item and CART-generated derivative evidence returned to assigned CART Examiner. New York CART considers this portion of the examination complete.
Investigation on 08/26/2019 at New York, New York, United States (In Person)
File # 90A-NY-3151227, 268-HQ-C7772046-DEVICES_UNLOCKED, 321C-NY-A6382037-MOBILE
Date drafted 08/27/2019
by [REDACTED]
This document contains neither recommendations nor conclusions of the FBI. It is the property of the FBI and is loaned to your agency; it and its contents are not to be distributed outside your agency.
SDNY_MT_00000199
EFTA00033568
FD-302a (Rev. 5-8-10)
90A-NY-3151227 Serial 59
90A-NY-3151227
Continuation of FD-302 of (U) Device Extraction - MDUS 10754 , On 08/26/2019 , Page 2 of 2
SDNY_MT_00000200
EFTA00033569

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document