Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Contract for Assistance Regarding Syed Farooks Iphone — Part 1
Page 21
21 / 111
A et ah ARIA A AAP ER Se ENR ANE MAES SLA Hs rt mr eR A Cie NENA aR te 8 At RFRA bl BRA Te Ae ear Te yA stata Ab ct SS nN On Den in ml rm dees AA eral a aa gab mf Sg ft etree aNd a tient A Ast abraNete nan 44 ate rm es mt
pete 1 atte AaD Aen panel ga pa a
SECREL/ORECON/ANOFORN——
The FBI, which has lead agency investigative authority for counterterrorism matters in the U.S.,
took charge of the investigation. One challenge the FBI encountered, as it conducted the
investigation, was the inability to access data on the Apple tPhone 5c that San Bernardino
County issued Farook in connection with his employment. The data is potentially critical to the
FBI’s vestigation, as it could reveal, among other things, terrorist ties and individual contacts
maintained by Farook. Exploiting this information could help the FBI determine whether the
attack in San Bernardino was an isolated incident or whether it was part of a broader plan
supported by a terrorist network.
(U) The FBI’s inability to access Farook’s data was due to the encryption features deployed by
Apple’s operating system. In an effort to compel Apple’s assistance in extracting the data it
sought, the FBI obtained, in February 2016, an order mandating such assistance from Sheri Pym,
Magistrate Judge for the Central District of California. Apple contested that order and legal
proceedings ensued. During the course of those proceedings, the FBI continued to search for a
way to access Farook’s data without Apple’s assistance.
‘§) pr -1
b3 -1
b4 -1
b7E -2
4, The statutory authority permitting other than full and open competition.
(U) The statutory authority permitting other than full and open competition is 41 U.S.C. 3304
(a)(6) as implemented by FAR Subpart 6.302-6 entitled, “National Security.”
5. Demonstrate the unique qualifications of the proposed contractor or the nature of
the action requiring the use of the authority.
‘|
bl -1
b3 -1
ba -1
bIE -2
b1 -1
Requisition Number| Version 1.0 Page 2 of 5
ii _ b3 -1
SPOKELORCONNOFORN AP-20 pte -2
Reveal the original PDF page, then click a word to highlight the OCR text.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic