Event Details

May 12, 2020

Description

FBI confirms they have bypassed encryption on multiple devices seized from Epstein.

Participants (1)

Name Type Mentions
FBI NY CART person 0 View Entity

Source Documents (1)

EFTA00022331.pdf

Email Chain • 760 KB
View

This document is a chain of emails between the FBI's Computer Analysis Response Team (CART) and the US Attorney's Office (SDNY) regarding the technical processing and transfer of digital evidence seized from Jeffrey Epstein's properties in New York and the Virgin Islands. The correspondence reveals significant technical challenges, including the handling of encrypted devices, the volume of data (terabytes), and compatibility issues between forensic tools and the 'Relativity' e-discovery platform used by prosecutors. It mentions specific evidence including servers, hard drives from a 2007 search, and the inability to link emails to attachments like 'flight records' in the provided data dumps.

Related Events

Events with shared participants

COVID-19 Staffing Reduction

2020-01-01 • FBI NY Office

View

Processing of seized digital evidence including computers, servers, and loose media from NY and USVI.

2020-01-01 • New York / USVI

View

FBI mentions tearing out old network and deleting 400TB of old stuff, limiting them to local work.

2020-02-24 • FBI NY Office

View

FBI NY CART team deletes ~400TB of old data due to network replacement/mandate.

2020-01-01 • FBI NY Office

View

Event Metadata

Type
Unknown
Location
FBI Lab
Significance Score
5/10
Participants
1
Source Documents
1
Extracted
2025-12-26 13:48

Additional Data

Source
EFTA00022331.pdf
Date String
2020-05-12

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein event