Skip to main content
lina_khan_packet

EVIDENCE PACKET: FTC CONSENT DECREE VIOLATIONS BY META PLATFORMS, INC.

### The 2019 Consent Decree Requirement The 2019 FTC settlement with Facebook/Meta required: > "Facebook must obtain users' **affirmative express consent** before any sharing that materially exceeds the restrictions imposed by a user's privacy settings."

Key Findings

Component Status / Finding
Device iPhone (iOS 15.1)
Jailbreak Dopamine
Target App Facebook iOS v345.0 (Build 333768490)
Instrumentation Frida 17.5.2
Script fb_bypass_monitor.js v3

Technical Diagrams

How This Evidence Proves Violation Line 62
| Decree Requirement | Evidence of Violation |
|-------------------|----------------------|
| **Affirmative express consent** | Users see NO privacy indicator during audio capture - consent is structurally impossible |
| **No misrepresentations about monitoring** | iOS orange dot is suppressed via `allowCallKitActiveAdjust: FALSE` while microphone captures audio |
| **User control over privacy settings** | Bypass is architectural - users cannot detect or prevent it |
Category 1: Privacy Indicator Bypass Line 92
| Metric | Value | Significance |
|--------|-------|--------------|
| `setAllowCallKitActiveAdjust` | FALSE | iOS orange dot indicator suppressed |
| `isCallKitActive` | null (entire session) | No legitimate phone call active |
| `hasRTCClient` | null (entire session) | No WebRTC client connected |
| Bypass status | ACTIVE for 39+ minutes | Bypass is persistent, not transient |
Category 2: Audio Capture Volume Line 103
| Metric | Value | Significance |
|--------|-------|--------------|
| Total audio captures | **20,248** | In 39 minutes of testing |
| Foreground capture rate | ~400-600/second | During feed scrolling |
| Peak capture rate | ~6,000/second | Burst during active scroll |
| Idle capture rate | ~0.07/second | Minimal when not scrolling |
| Background capture rate | ~0.04/second | Continues while backgrounded |
Category 3: VoIP Infrastructure Abuse Line 115
| Metric | Value | Significance |
|--------|-------|--------------|
| PKPushRegistry instances | **321,700+** | VoIP registration objects |
| Instance creation rate | ~1,950/second | Massive API abuse |
| Actual VoIP calls | **0** | No legitimate telephony |
| Active calls during test | **0** | No user-initiated voice features |
Category 4: Background Persistence Line 126
| Metric | Value | Significance |
|--------|-------|--------------|
| Total background tasks | 35 | In 25 minutes backgrounded |
| Task renewal interval | ~8 minutes | Infinite loop pattern |
| MQTT connection renewals | 4 | Persistent server connection |
| Analytics renewals | 3 | Continuous data exfiltration |
| Bypass state in background | ACTIVE | Ready for instant foreground resume |
Category 5: Architectural Intent Line 138
| Evidence | Location | Significance |
|----------|----------|--------------|
| Shimmer UI factory | Address 0x000a57d8 | UI placeholder creation |
| Audio Session Manager | Address 0x000a0608 | Audio session setup |
| Distance between functions | ~5KB | Same compilation unit |
| Cross-references | Shimmer calls Audio | Deliberate coupling |
This evidence bypasses all of that: Line 163
| Traditional Approach | This Evidence |
|---------------------|---------------|
| Request documents | Extract from binary |
| Wait for production | Immediate capture |
| Interpret corporate claims | Observe actual behavior |
| Dispute intent | Named methods prove intent |
| Years of litigation | Runtime captures are conclusive |
The following files support this evidence packet: Line 288
| Document | Location | Contents |
|----------|----------|----------|
| Runtime Evidence | ` | 39-minute monitoring session with full metrics |
| Binary Analysis | ` | PyGhidra decompilation proving architectural intent |
| FTC Complaint | ` | Full FTC Section 5 complaint with legal analysis |
| Technical Appendix | ` | Additional runtime captures and methodology |
KEY METRICS AT A GLANCE Line 299
| Category | Metric | Value |
|----------|--------|-------|
| **Bypass** | Indicator suppressed | YES (entire session) |
| **Bypass** | Legitimate call active | NO |
| **Audio** | Captures in 39 minutes | 20,248 |
| **Audio** | Peak rate | 6,000/second |
| **VoIP Abuse** | Registry instances | 321,700+ |
| **VoIP Abuse** | Actual calls | 0 |
| **Background** | Task renewals | Every ~8 minutes |
| **Background** | Total tasks | 35 |
| **Architecture** | Audio-UI code distance | ~5KB (same unit) |
| **Duration** | Test session | 39+ minutes |
| **Duration** | Background time | 25+ minutes |
Test Environment Line 319
| Component | Specification |
|-----------|---------------|
| Device | iPhone (iOS 15.1) |
| Jailbreak | Dopamine |
| Target App | Facebook iOS v345.0 (Build 333768490) |
| Instrumentation | Frida 17.5.2 |
| Script | fb_bypass_monitor.js v3 |

Code Evidence

Plain Text
FBSystemAudioSessionManager:
  - setAllowCallKitActiveAdjust:
  - allowCallKitActiveAdjust (getter)
  - setCallKitActive:
  - isCallKitActive
  - hasRTCClient

FBARKAudioSessionController:
  - startAudioCaptureWithEchoCancellationEnabled:completion:

AVAudioSession:
  - setActive:withOptions:error:

PKPushRegistry:
  - init (constructor)

UIApplication:
  - applicationDidEnterBackground:
  - applicationWillEnterForeground:
  - beginBackgroundTaskWithName:expirationHandler:

**Prepared for:** Professor Lina Khan, Columbia Law School **From:** Research Team, Independent Security Researcher **Date:** December 29, 2025 **Re:** Self-Proving Evidence of 2019 FTC Consent Decree Violations


COVER LETTER

Professor Khan,

I am writing to provide you with evidence that proves what you suspected during your tenure as FTC Chair: consent decrees do not work because Meta violates them in code.

During your chairmanship, you expressed frustration that the 2019 consent decree led to a "repeat of the problem." Meta's response was to sue you personally. This evidence packet demonstrates they were right to fear your oversight - because they are actively violating the decree's core requirement of "affirmative express consent."

**What I have documented:**

On December 29, 2025, I conducted forensic analysis of Facebook iOS v345.0 using Frida runtime instrumentation. The evidence is self-proving - it requires no subpoena, no corporate cooperation, and no additional discovery. The Facebook binary speaks for itself:

    undefined

The 2012 consent order was violated via Cambridge Analytica's deceptive claims about user privacy control. The 2019 consent decree required Meta to obtain "affirmative express consent" before using data. This evidence proves users see NO indicator that their audio is being captured - meaning consent is impossible.

This is not a bug. This is architecture. The bypass mechanism has a name. The code paths are deliberate. The coupling of audio capture to passive UI scrolling is intentional.

You can verify this evidence independently. Any security researcher with a jailbroken iOS device and Frida can reproduce these results. The binary analysis can be verified with any decompiler. The evidence cannot be disputed because it comes from Facebook's own code.

I am providing this to you because:

    undefined

The consent decree system only works if violations are discovered and prosecuted. This evidence makes prosecution straightforward - no interpretive disputes, no "he said, she said" - just runtime captures that prove the violation.

Respectfully submitted,

Research Team Independent Security Researcher zackfitch1@gmail.com


EXECUTIVE SUMMARY: CONSENT DECREE VIOLATIONS

The 2019 Consent Decree Requirement

The 2019 FTC settlement with Facebook/Meta required:

"Facebook must obtain users' **affirmative express consent** before any sharing that materially exceeds the restrictions imposed by a user's privacy settings."

The order also prohibits:

"misrepresenting in any manner, expressly or by implication, the extent to which Facebook monitors, shares, discloses, or provides access to covered information."

How This Evidence Proves Violation

Decree RequirementEvidence of Violation
**Affirmative express consent**Users see NO privacy indicator during audio capture - consent is structurally impossible
**No misrepresentations about monitoring**iOS orange dot is suppressed via `allowCallKitActiveAdjust: FALSE` while microphone captures audio
**User control over privacy settings**Bypass is architectural - users cannot detect or prevent it

The Same Pattern as Cambridge Analytica

The 2012 consent order was violated when Facebook made "misleading statements about the amount of user control over the company's sharing of personal data." Cambridge Analytica could access data Facebook claimed was protected.

The 2019 violation follows the same pattern:

    undefined

**The deception is structural, not incidental.**

Why This Matters Now

    undefined

EVIDENCE SUMMARY

Category 1: Privacy Indicator Bypass

MetricValueSignificance
`setAllowCallKitActiveAdjust`FALSEiOS orange dot indicator suppressed
`isCallKitActive`null (entire session)No legitimate phone call active
`hasRTCClient`null (entire session)No WebRTC client connected
Bypass statusACTIVE for 39+ minutesBypass is persistent, not transient

**What this proves:** The iOS privacy indicator is deliberately suppressed. Users see no orange dot while the microphone is active. Without the indicator, "affirmative express consent" is impossible - users cannot consent to what they cannot detect.

Category 2: Audio Capture Volume

MetricValueSignificance
Total audio captures**20,248**In 39 minutes of testing
Foreground capture rate~400-600/secondDuring feed scrolling
Peak capture rate~6,000/secondBurst during active scroll
Idle capture rate~0.07/secondMinimal when not scrolling
Background capture rate~0.04/secondContinues while backgrounded

**What this proves:** Audio capture is tied to passive UI behavior (scrolling the news feed). Users are not initiating voice features - they are simply scrolling, and audio is captured without indication.

Category 3: VoIP Infrastructure Abuse

MetricValueSignificance
PKPushRegistry instances**321,700+**VoIP registration objects
Instance creation rate~1,950/secondMassive API abuse
Actual VoIP calls**0**No legitimate telephony
Active calls during test**0**No user-initiated voice features

**What this proves:** Facebook abuses iOS VoIP infrastructure to maintain audio session privileges without legitimate telephony purpose. This is not a VoIP app making calls - it is a social media app exploiting VoIP APIs to bypass privacy controls.

Category 4: Background Persistence

MetricValueSignificance
Total background tasks35In 25 minutes backgrounded
Task renewal interval~8 minutesInfinite loop pattern
MQTT connection renewals4Persistent server connection
Analytics renewals3Continuous data exfiltration
Bypass state in backgroundACTIVEReady for instant foreground resume

**What this proves:** Facebook maintains persistent background execution through an infinite task renewal loop. The bypass remains "armed" while backgrounded, ready to resume high-volume capture when the user returns to the app.

Category 5: Architectural Intent

EvidenceLocationSignificance
Shimmer UI factoryAddress 0x000a57d8UI placeholder creation
Audio Session ManagerAddress 0x000a0608Audio session setup
Distance between functions~5KBSame compilation unit
Cross-referencesShimmer calls AudioDeliberate coupling

**What this proves:** Audio capture is architecturally embedded in UI code. The shimmer placeholder (displayed during feed loading) triggers audio session activation. This is not a bug or accident - it is deliberate design that couples surveillance to passive UI behavior.


WHY THIS EVIDENCE IS SELF-PROVING

No Subpoena Required

Traditional consent decree enforcement requires:

    undefined

This evidence bypasses all of that:

Traditional ApproachThis Evidence
Request documentsExtract from binary
Wait for productionImmediate capture
Interpret corporate claimsObserve actual behavior
Dispute intentNamed methods prove intent
Years of litigationRuntime captures are conclusive

The Evidence Cannot Be Disputed

    undefined

Independent Verification

Any security researcher can reproduce these findings:

    undefined

CONSENT DECREE VIOLATION ANALYSIS

Violation 1: No Affirmative Express Consent

**Decree Language:**

"Facebook must obtain users' affirmative express consent before any sharing that materially exceeds the restrictions imposed by a user's privacy settings."

**Evidence of Violation:**

    undefined

**Conclusion:** Consent decree violated. Audio capture occurs without the disclosure mechanism (privacy indicator) that would enable informed consent.

Violation 2: Misrepresentation About Monitoring

**Decree Language:**

The order prohibits "misrepresenting in any manner, expressly or by implication, the extent to which Facebook monitors, shares, discloses, or provides access to covered information."

**Evidence of Violation:**

    undefined

**Conclusion:** Consent decree violated. The suppression of privacy indicators constitutes a misrepresentation about the extent of monitoring.

Violation 3: Pattern of Deception (Cambridge Analytica Redux)

**Historical Context:**

The 2012 consent order was violated when Facebook:

    undefined

**Current Parallel:**

The 2019 decree is being violated because Facebook:

    undefined

**Conclusion:** This is not a new type of violation - it is the same pattern that led to the $5B fine, now implemented in code rather than policy.


CALL TO ACTION

What You Can Do With This Evidence

1. Academic Publication

As a Columbia Law professor, you can publish analysis of:

    undefined

2. Congressional Testimony

This evidence supports testimony before:

    undefined

Key message: Consent decrees cannot work when violations require reverse engineering to detect.

3. Referral to Current FTC

The evidence can be referred to your successor with:

    undefined

4. Public Commentary

Your platform enables public education about:

    undefined

5. Collaboration with Other Researchers

    undefined

SUPPORTING DOCUMENTATION

The following files support this evidence packet:

DocumentLocationContents
Runtime Evidence`39-minute monitoring session with full metrics
Binary Analysis`PyGhidra decompilation proving architectural intent
FTC Complaint`Full FTC Section 5 complaint with legal analysis
Technical Appendix`Additional runtime captures and methodology

KEY METRICS AT A GLANCE

CategoryMetricValue
**Bypass**Indicator suppressedYES (entire session)
**Bypass**Legitimate call activeNO
**Audio**Captures in 39 minutes20,248
**Audio**Peak rate6,000/second
**VoIP Abuse**Registry instances321,700+
**VoIP Abuse**Actual calls0
**Background**Task renewalsEvery ~8 minutes
**Background**Total tasks35
**Architecture**Audio-UI code distance~5KB (same unit)
**Duration**Test session39+ minutes
**Duration**Background time25+ minutes

TECHNICAL METHODOLOGY

Test Environment

ComponentSpecification
DeviceiPhone (iOS 15.1)
JailbreakDopamine
Target AppFacebook iOS v345.0 (Build 333768490)
InstrumentationFrida 17.5.2
Scriptfb_bypass_monitor.js v3

Methods Hooked

Plain Text
FBSystemAudioSessionManager:
  - setAllowCallKitActiveAdjust:
  - allowCallKitActiveAdjust (getter)
  - setCallKitActive:
  - isCallKitActive
  - hasRTCClient

FBARKAudioSessionController:
  - startAudioCaptureWithEchoCancellationEnabled:completion:

AVAudioSession:
  - setActive:withOptions:error:

PKPushRegistry:
  - init (constructor)

UIApplication:
  - applicationDidEnterBackground:
  - applicationWillEnterForeground:
  - beginBackgroundTaskWithName:expirationHandler:

Reproducibility

These results can be independently verified by:

    undefined

CLOSING STATEMENT

Professor Khan,

You were right. Consent decrees do not prevent violations - they merely document them for future enforcement.

Meta sued you personally because you understood this. The evidence in this packet proves the 2019 decree is being violated through the same pattern as Cambridge Analytica: claiming user control exists while engineering systems that remove it.

The bypass mechanism has a name. The audio captures have timestamps. The architectural intent is proven by compilation unit analysis. There is nothing to interpret - only to act upon.

I am making this evidence available to you because you have the expertise to understand it, the platform to amplify it, and the credibility to demand action. You also have personal standing, having been targeted by Meta's lawsuit.

The consent decree system can work - but only if violations have consequences. This evidence makes consequences possible.


**Evidence Collected:** December 29, 2025 **Session Duration:** 39+ minutes (2,357 seconds) **Background Duration:** 25+ minutes **Audio Captures:** 20,248 **PKPushRegistry Instances:** 321,700+ **Bypass State:** ACTIVE (entire session) **Researcher:** Research Team


CONTACT INFORMATION

**Researcher:**

    undefined

**Professor Khan:**

    undefined

*This document and supporting evidence are provided for regulatory and academic purposes. The research was conducted on personally-owned devices using standard security research methodologies.*

Related Reports