| Date | Event Type | Description | Location | Actions |
|---|---|---|---|---|
| N/A | N/A | Forensic Cloning | New York | View |
An FBI FD-302 report dating from August 2019 detailing the forensic examination of an Apple iPhone XS (Model A1920) related to investigation 90A-NY-3151227. A Forensic Examiner in New York performed a file system extraction using GrayKey software; notably, the device had no unlock PIN associated with it. The evidence was processed under MDUS request #10754 and returned to the assigned CART examiner.
Photograph of a computer server seized by the FBI from Little Saint James Island on August 12, 2019, two days after Jeffrey Epstein's death. The evidence label (Item #3B) indicates it was taken from 'B4 Room E in server rack position 28' and is a 6-bay unit with 146GB drives. The device bears a New York CART Lab sticker and was collected by Carrie Crot and witnessed by Special Agent Jacqueline Smith.
This image shows a piece of physical evidence (Item #38) seized on August 2, 2019, from the 'AV Room E' on Little Saint James Island. The item is a server (labeled with S/N MXQ8214SR) noted to contain '16 4TB drives', indicating a potential storage capacity of 64 terabytes, likely used for media or surveillance storage. The evidence was collected by FBI Special Agents and processed through the New York CART (Computer Analysis Response Team) Lab.
This image shows a piece of physical evidence, specifically a Ubiquiti UniFi Application Server (identified by FCC ID SWX-UASPRO), seized by the FBI. The handwritten note indicates it is 'Item 33' taken on August 12, 2019, from 'Little Saint James, U.S. Virgin Islands, Bld Room E' (Building Room E) where it was installed in 'server rack position 19'. The device bears FBI case number 31E-NY-3027571.
A photograph of physical evidence consisting of a Seagate 1000GB Desktop Hard Drive inside an anti-static bag. The drive bears an official label from the 'New York CART Lab' (FBI Computer Analysis Response Team) with the identifier 'N: 6327:08' and references a 'DVR 2 DISK ARRAY'. A handwritten label identifies this specific drive as 'Clone #9', suggesting it is a forensic copy of data from a digital video recorder system. The document bears the Bates number EFTA00008432.
This is a photograph of a physical piece of evidence: a 1000GB Seagate Barracuda hard drive sealed in a pink anti-static evidence bag. The drive is marked with a handwritten label 'Clone # 11' and a printed label 'DVR 2 DISK ARRAY', suggesting it contains cloned data from a digital video recorder (surveillance system). It bears a 'New York CART Lab' asset tag with the ID 'NYC027740'.
This is a photograph of physical evidence, specifically a Seagate hard drive (labeled as a 4TB 2 Disk Array) contained within a sealed anti-static bag. The drive bears a forensic label from the 'New York CART Lab' (Computer Analysis Response Team) and is handwritten with the identifier 'Clone #4'. The evidence is placed on top of a brown Smead file folder and has the Bates stamp EFTA00008428.
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein entity