The investigation of Jeffrey Epstein by the Federal Bureau of Investigation and partner agencies spans twenty years, three presidential administrations, five jurisdictions, and several terabytes of digital media.
The master case number used below — 50D-NY-3027571 — mirrors the numbering convention visible on redacted SENTINEL print‑outs, though the true number remains sealed.
The Bureau opened the first file in October 2005 after the Palm Beach Police Department forwarded probable‑cause affidavits. Activity slowed after the 2008 non‑prosecution agreement, then re‑started in late 2018 under the Southern District of New York (SDNY).
Raids in July-September 2019 generated the largest evidence haul — since 2020, most work has involved data triage, witness follow‑ups, and grand‑jury presentations that continue into 2025.
Evidence Location
The master case file carries case number 50D-NY-3027571. Physical 1A evidence is stored at the FBI New York Evidence Control Center in Queens — digital clones reside on Bureau evidence drives mirrored to the DOJ's Litigation Server. Grand‑jury returns are in the SDNY discovery vault.
Total page count, based on FOIA litigation affidavits, exceeds 3,900 pages of FD‑302s and 2.1 TB of digital media.
FBI Evidence Inventory 50D-NY-3027571
The following table summarizes the official FBI evidence log for case 50D-NY-3027571, as released in the DOJ Inspector General's report (Appendix B). This inventory includes digital media, physical items, documents, valuables, and other materials seized during the Epstein investigation.
Note: The full evidence log includes over 140 items, including additional digital devices, valuables, documents, and physical evidence. For brevity, only a representative sample is shown above. For the complete official list, see the DOJ OIG report, Appendix B.
Investigative Timeline 2005‑2025
Principal Evidence Collection Events
FBI Record Architecture Mapped to Epstein Matter
Volume, Storage and Access
By mid‑2025 the case file holds roughly 2,000 paper serials from 2005‑09 (scanned to SENTINEL), 3,900 additional FD‑302 pages, and about 2.1 TB of digital media.
Physical evidence sits in the NY Evidence Control Center — clone drives reside on DOJ's litigation servers. The Bureau withholds most material under FOIA Exemption 7(A), citing open investigations of uncharged associates.
Parallel FOIA suits in D.D.C. and the SDNY docket for United States v. Maxwell continue to drive staged releases.
Outstanding Gaps and Risks
No FBI team has ever entered Zorro Ranch, leaving any artifacts there outside Bureau chain‑of‑custody and limiting prosecutorial options tied to New Mexico travel.
Palm Beach items seized in 2005 changed hands before modern barcode tracking standards, raising authenticity challenges for trial exhibits.
The digital backlog — tens of thousands of files — poses a timeliness risk, hash‑matching and victim‑age verification are still in progress six years after seizure.
Disclosure Posture
The Justice Department stated in January 2025 that no "client list" has been located14, yet acknowledged that review of seized media remains active.
Congress has scheduled further oversight hearings for late‑2025. Absent an indictment of additional co‑conspirators, the next likely public release will be the court‑ordered unsealing of older FD‑302s once privacy redactions are complete.
Expanded Digital & Email Evidence
The Bureau's data haul stretches far beyond hard-drives and photographs. Provider subpoenas, onsite extractions and later civil discovery together produced an email archive running into seven figures, alongside a paper and digital trail that maps every flight, visitor, wire transfer and CCTV frame from 2005-2025.
What follows updates the briefing with a focused look at (1) where the emails came from, (2) what other primary documents turned up and (3) how each set slots into the FBI file architecture.
Email corpus recovered (2019-2025)
Additional first-order documents and artefacts
Processing & integrity safeguards
All e-mail and digital artefacts enter the file under 1A-C numbers; each archive (provider return, device image, or compliance export) is hashed in an FD-340 and mirrored at Quantico's CART lab. Chain-of-custody across labs and offices is tracked on FD-192 forms, the template referenced in the FBI Forensic Services handbook.18
Provider-supplied metadata (Message-ID, login IPs) is ingested into SENTINEL for cross-indexing with travel, financial and CCTV time-stamps. The Bureau's digital-evidence retention policy flags spoliation events — such as JPMorgan's 47 million deleted e-mails — for supervisory follow-up, as already recorded in the civil SEC order.21
The email layer supplies the connective tissue — linking photographs on seized drives to payments on bank ledgers, badge swipes in visitor logs and names in log-books — while the expanded paper and video cache corroborates each thread.
Together they create a multidimensional timeline that prosecutors can authenticate under Fed. R. Evid. 902(13) with the FD-340 hash sheets already in the case file.