**Prepared for:** Professor Lina Khan, Columbia Law School **From:** Research Team, Independent Security Researcher **Date:** December 29, 2025 **Re:** Self-Proving Evidence of 2019 FTC Consent Decree Violations
COVER LETTER
Professor Khan,
I am writing to provide you with evidence that proves what you suspected during your tenure as FTC Chair: consent decrees do not work because Meta violates them in code.
During your chairmanship, you expressed frustration that the 2019 consent decree led to a "repeat of the problem." Meta's response was to sue you personally. This evidence packet demonstrates they were right to fear your oversight - because they are actively violating the decree's core requirement of "affirmative express consent."
**What I have documented:**
On December 29, 2025, I conducted forensic analysis of Facebook iOS v345.0 using Frida runtime instrumentation. The evidence is self-proving - it requires no subpoena, no corporate cooperation, and no additional discovery. The Facebook binary speaks for itself:
- undefined
The 2012 consent order was violated via Cambridge Analytica's deceptive claims about user privacy control. The 2019 consent decree required Meta to obtain "affirmative express consent" before using data. This evidence proves users see NO indicator that their audio is being captured - meaning consent is impossible.
This is not a bug. This is architecture. The bypass mechanism has a name. The code paths are deliberate. The coupling of audio capture to passive UI scrolling is intentional.
You can verify this evidence independently. Any security researcher with a jailbroken iOS device and Frida can reproduce these results. The binary analysis can be verified with any decompiler. The evidence cannot be disputed because it comes from Facebook's own code.
I am providing this to you because:
- undefined
The consent decree system only works if violations are discovered and prosecuted. This evidence makes prosecution straightforward - no interpretive disputes, no "he said, she said" - just runtime captures that prove the violation.
Respectfully submitted,
Research Team Independent Security Researcher zackfitch1@gmail.com
EXECUTIVE SUMMARY: CONSENT DECREE VIOLATIONS
The 2019 Consent Decree Requirement
The 2019 FTC settlement with Facebook/Meta required:
"Facebook must obtain users' **affirmative express consent** before any sharing that materially exceeds the restrictions imposed by a user's privacy settings."
The order also prohibits:
"misrepresenting in any manner, expressly or by implication, the extent to which Facebook monitors, shares, discloses, or provides access to covered information."
How This Evidence Proves Violation
| Decree Requirement | Evidence of Violation |
|---|---|
| **Affirmative express consent** | Users see NO privacy indicator during audio capture - consent is structurally impossible |
| **No misrepresentations about monitoring** | iOS orange dot is suppressed via `allowCallKitActiveAdjust: FALSE` while microphone captures audio |
| **User control over privacy settings** | Bypass is architectural - users cannot detect or prevent it |
The Same Pattern as Cambridge Analytica
The 2012 consent order was violated when Facebook made "misleading statements about the amount of user control over the company's sharing of personal data." Cambridge Analytica could access data Facebook claimed was protected.
The 2019 violation follows the same pattern:
- undefined
**The deception is structural, not incidental.**
Why This Matters Now
- undefined
EVIDENCE SUMMARY
Category 1: Privacy Indicator Bypass
| Metric | Value | Significance |
|---|---|---|
| `setAllowCallKitActiveAdjust` | FALSE | iOS orange dot indicator suppressed |
| `isCallKitActive` | null (entire session) | No legitimate phone call active |
| `hasRTCClient` | null (entire session) | No WebRTC client connected |
| Bypass status | ACTIVE for 39+ minutes | Bypass is persistent, not transient |
**What this proves:** The iOS privacy indicator is deliberately suppressed. Users see no orange dot while the microphone is active. Without the indicator, "affirmative express consent" is impossible - users cannot consent to what they cannot detect.
Category 2: Audio Capture Volume
| Metric | Value | Significance |
|---|---|---|
| Total audio captures | **20,248** | In 39 minutes of testing |
| Foreground capture rate | ~400-600/second | During feed scrolling |
| Peak capture rate | ~6,000/second | Burst during active scroll |
| Idle capture rate | ~0.07/second | Minimal when not scrolling |
| Background capture rate | ~0.04/second | Continues while backgrounded |
**What this proves:** Audio capture is tied to passive UI behavior (scrolling the news feed). Users are not initiating voice features - they are simply scrolling, and audio is captured without indication.
Category 3: VoIP Infrastructure Abuse
| Metric | Value | Significance |
|---|---|---|
| PKPushRegistry instances | **321,700+** | VoIP registration objects |
| Instance creation rate | ~1,950/second | Massive API abuse |
| Actual VoIP calls | **0** | No legitimate telephony |
| Active calls during test | **0** | No user-initiated voice features |
**What this proves:** Facebook abuses iOS VoIP infrastructure to maintain audio session privileges without legitimate telephony purpose. This is not a VoIP app making calls - it is a social media app exploiting VoIP APIs to bypass privacy controls.
Category 4: Background Persistence
| Metric | Value | Significance |
|---|---|---|
| Total background tasks | 35 | In 25 minutes backgrounded |
| Task renewal interval | ~8 minutes | Infinite loop pattern |
| MQTT connection renewals | 4 | Persistent server connection |
| Analytics renewals | 3 | Continuous data exfiltration |
| Bypass state in background | ACTIVE | Ready for instant foreground resume |
**What this proves:** Facebook maintains persistent background execution through an infinite task renewal loop. The bypass remains "armed" while backgrounded, ready to resume high-volume capture when the user returns to the app.
Category 5: Architectural Intent
| Evidence | Location | Significance |
|---|---|---|
| Shimmer UI factory | Address 0x000a57d8 | UI placeholder creation |
| Audio Session Manager | Address 0x000a0608 | Audio session setup |
| Distance between functions | ~5KB | Same compilation unit |
| Cross-references | Shimmer calls Audio | Deliberate coupling |
**What this proves:** Audio capture is architecturally embedded in UI code. The shimmer placeholder (displayed during feed loading) triggers audio session activation. This is not a bug or accident - it is deliberate design that couples surveillance to passive UI behavior.
WHY THIS EVIDENCE IS SELF-PROVING
No Subpoena Required
Traditional consent decree enforcement requires:
- undefined
This evidence bypasses all of that:
| Traditional Approach | This Evidence |
|---|---|
| Request documents | Extract from binary |
| Wait for production | Immediate capture |
| Interpret corporate claims | Observe actual behavior |
| Dispute intent | Named methods prove intent |
| Years of litigation | Runtime captures are conclusive |
The Evidence Cannot Be Disputed
- undefined
Independent Verification
Any security researcher can reproduce these findings:
- undefined
CONSENT DECREE VIOLATION ANALYSIS
Violation 1: No Affirmative Express Consent
**Decree Language:**
"Facebook must obtain users' affirmative express consent before any sharing that materially exceeds the restrictions imposed by a user's privacy settings."
**Evidence of Violation:**
- undefined
**Conclusion:** Consent decree violated. Audio capture occurs without the disclosure mechanism (privacy indicator) that would enable informed consent.
Violation 2: Misrepresentation About Monitoring
**Decree Language:**
The order prohibits "misrepresenting in any manner, expressly or by implication, the extent to which Facebook monitors, shares, discloses, or provides access to covered information."
**Evidence of Violation:**
- undefined
**Conclusion:** Consent decree violated. The suppression of privacy indicators constitutes a misrepresentation about the extent of monitoring.
Violation 3: Pattern of Deception (Cambridge Analytica Redux)
**Historical Context:**
The 2012 consent order was violated when Facebook:
- undefined
**Current Parallel:**
The 2019 decree is being violated because Facebook:
- undefined
**Conclusion:** This is not a new type of violation - it is the same pattern that led to the $5B fine, now implemented in code rather than policy.
CALL TO ACTION
What You Can Do With This Evidence
1. Academic Publication
As a Columbia Law professor, you can publish analysis of:
- undefined
2. Congressional Testimony
This evidence supports testimony before:
- undefined
Key message: Consent decrees cannot work when violations require reverse engineering to detect.
3. Referral to Current FTC
The evidence can be referred to your successor with:
- undefined
4. Public Commentary
Your platform enables public education about:
- undefined
5. Collaboration with Other Researchers
- undefined
SUPPORTING DOCUMENTATION
The following files support this evidence packet:
| Document | Location | Contents |
|---|---|---|
| Runtime Evidence | ` | 39-minute monitoring session with full metrics |
| Binary Analysis | ` | PyGhidra decompilation proving architectural intent |
| FTC Complaint | ` | Full FTC Section 5 complaint with legal analysis |
| Technical Appendix | ` | Additional runtime captures and methodology |
KEY METRICS AT A GLANCE
| Category | Metric | Value |
|---|---|---|
| **Bypass** | Indicator suppressed | YES (entire session) |
| **Bypass** | Legitimate call active | NO |
| **Audio** | Captures in 39 minutes | 20,248 |
| **Audio** | Peak rate | 6,000/second |
| **VoIP Abuse** | Registry instances | 321,700+ |
| **VoIP Abuse** | Actual calls | 0 |
| **Background** | Task renewals | Every ~8 minutes |
| **Background** | Total tasks | 35 |
| **Architecture** | Audio-UI code distance | ~5KB (same unit) |
| **Duration** | Test session | 39+ minutes |
| **Duration** | Background time | 25+ minutes |
TECHNICAL METHODOLOGY
Test Environment
| Component | Specification |
|---|---|
| Device | iPhone (iOS 15.1) |
| Jailbreak | Dopamine |
| Target App | Facebook iOS v345.0 (Build 333768490) |
| Instrumentation | Frida 17.5.2 |
| Script | fb_bypass_monitor.js v3 |
Methods Hooked
FBSystemAudioSessionManager:
- setAllowCallKitActiveAdjust:
- allowCallKitActiveAdjust (getter)
- setCallKitActive:
- isCallKitActive
- hasRTCClient
FBARKAudioSessionController:
- startAudioCaptureWithEchoCancellationEnabled:completion:
AVAudioSession:
- setActive:withOptions:error:
PKPushRegistry:
- init (constructor)
UIApplication:
- applicationDidEnterBackground:
- applicationWillEnterForeground:
- beginBackgroundTaskWithName:expirationHandler:
Reproducibility
These results can be independently verified by:
- undefined
CLOSING STATEMENT
Professor Khan,
You were right. Consent decrees do not prevent violations - they merely document them for future enforcement.
Meta sued you personally because you understood this. The evidence in this packet proves the 2019 decree is being violated through the same pattern as Cambridge Analytica: claiming user control exists while engineering systems that remove it.
The bypass mechanism has a name. The audio captures have timestamps. The architectural intent is proven by compilation unit analysis. There is nothing to interpret - only to act upon.
I am making this evidence available to you because you have the expertise to understand it, the platform to amplify it, and the credibility to demand action. You also have personal standing, having been targeted by Meta's lawsuit.
The consent decree system can work - but only if violations have consequences. This evidence makes consequences possible.
**Evidence Collected:** December 29, 2025 **Session Duration:** 39+ minutes (2,357 seconds) **Background Duration:** 25+ minutes **Audio Captures:** 20,248 **PKPushRegistry Instances:** 321,700+ **Bypass State:** ACTIVE (entire session) **Researcher:** Research Team
CONTACT INFORMATION
**Researcher:**
- undefined
**Professor Khan:**
- undefined
*This document and supporting evidence are provided for regulatory and academic purposes. The research was conducted on personally-owned devices using standard security research methodologies.*