FBI Files

Court Cases

Analysis of FBI archives and unreleased documents

The investigation of Jeffrey Epstein by the Federal Bureau of Investigation and partner agencies spans twenty years, three presidential administrations, five jurisdictions, and several terabytes of digital media.

The master case number used below — 50D-NY-3027571 — mirrors the numbering convention visible on redacted SENTINEL print‑outs, though the true number remains sealed.

The Bureau opened the first file in October 2005 after the Palm Beach Police Department forwarded probable‑cause affidavits. Activity slowed after the 2008 non‑prosecution agreement, then re‑started in late 2018 under the Southern District of New York (SDNY).

Raids in July-September 2019 generated the largest evidence haul — since 2020, most work has involved data triage, witness follow‑ups, and grand‑jury presentations that continue into 2025.

  Evidence Location

The master case file carries case number 50D-NY-3027571. Physical 1A evidence is stored at the FBI New York Evidence Control Center in Queens — digital clones reside on Bureau evidence drives mirrored to the DOJ's Litigation Server. Grand‑jury returns are in the SDNY discovery vault.

Total page count, based on FOIA litigation affidavits, exceeds 3,900 pages of FD‑302s and 2.1 TB of digital media.

  FBI Evidence Inventory 50D-NY-3027571

The following table summarizes the official FBI evidence log for case 50D-NY-3027571, as released in the DOJ Inspector General's report (Appendix B). This inventory includes digital media, physical items, documents, valuables, and other materials seized during the Epstein investigation.

CountEvidence classRepresentative contentsSensitive content flags
85Digital media & devices2 × LTO-6 Arcserve backup sets, 68+ optical discs, 45 assorted CDs, multiple USB/SD drives (32 GB, 16 GB, 4 GB), 2 × black external HDDs, Seagate Barracuda & Path/100 drives, 6-bay RAID with 146 GB disks, Unifi NVR & Cloud Key, Olympus/Digital voice recorders, Apple iPod ShuffleContains nude / semi-nude images, "girl pics nude book 4" CD, matchmaker shred recon images
29Computers & network hardware10 Apple desktops (A1311/12 etc.), 5 Mac laptops (incl. "JE BIG LAPTOP", "Kitchen Mac"), 4 iPads, HP & Lenovo towers, Dell Precision, MSI PC, Cube 9000 SiteServer, HP server (4 × 500 GB), Panasonic KX-TDE100 PBXNotable for potential full-disk data and passwords list
24Documents, photos & printed matter10 yearbooks, blueprints (residence & island), logbooks (vessel, LSJ/GSJ boat, day planner), employee lists, remodeling files, financial docs, handwritten notes, shredded paper, red ropes with framed/unframed photos & photo albums (incl. Polaroids, Epstein with minors)Numerous nude or sexual images; highly confidential tag
6Physical objects4 massage tables (peach, green, beige, brown), pair of black women's cowboy boots, stuffed dog, female torso busts (white × 2, blue, brown)Sex-related items may corroborate victim testimony
2Sex paraphernaliaVibrator, dildo, 3 butt plugs, cuffs, leash, condoms, nurse cap, stethoscope, copper handcuffs & whipExplicit sexual nature
2ValuablesHeat-sealed envelopes with $21,515 USC total; Austrian passport bearing Epstein photoPotential flight-risk evidence
6Electronic surveillance (1D ELSUR)Blu-ray & disc sets from court-authorized intercept 917-520-3106 (docs # 21340, 29845156, 694397, 690612-R1, 744655), FLIR aerial video (Bradford NH 07-02-2020), recorded interview 08-13-2019Lawful intercepts—wiretap material
25Miscellaneous generalCameras (Red Nikon, Sony), yearbooks, framed photos, large framed portrait, sculpture photos, blue box with CDs, photographic negatives, single un-framed photo, paper with system passwordsMay require separate forensic handling

Note: The full evidence log includes over 140 items, including additional digital devices, valuables, documents, and physical evidence. For brevity, only a representative sample is shown above. For the complete official list, see the DOJ OIG report, Appendix B.

  Investigative Timeline 2005‑2025

Year‑RangeEvent or PhaseHighlightsPrincipal Record Clusters Likely Generated
2005–2006Palm Beach search warrants and victim interviewsFirst FD‑302 set, FD‑71 case‑opening EC, 1A evidence envelopes for PolaroidsWitness FD‑302s, 1A physical, FD‑597 receipts
2007–2008Federal plea discussions, NPA signedEC traffic between Miami, Main Justice and SDNY, grand‑jury minutes withheld under Rule 6(e)ECs, prosecution memos, Rule 6(e) transcripts
2009–2017Low‑tempo lead checkingFD‑1057 airtels summarizing tips, sporadic FD‑1023 CHS reportsFD‑1023s, airtels
2018–2019Re‑activation, arrest, major searchesManhattan townhouse and Little St. James warrants, Teterboro device seizures, French MLAT request1A‑C digital, FD‑340 worksheets, Rule 41 packets, ERT after‑action reports
2020–2023Digital triage & financial tracingCART image‑hash trees, FinCEN SAR work‑ups, ongoing victim interviews, Title III intercepts on co‑conspiratorsDigital‑lab reports, financial analysis spreadsheets, additional FD‑302s
2024–2025FOIA litigation, congressional inquiries, grand‑jury extensionOIG jail‑death report, DOJ "no client list" memo, SDNY discovery reviewsOIG exhibits, litigation hold notices, unsealing reviews

  Principal Evidence Collection Events

Site (Jurisdiction)Entry DateItems Publicly ReportedCurrent Custody & Status
9 E. 71st St., Manhattan (SDNY)July 6–7, 2019Rotary‑sawed safe containing $70,000 cash, 48 diamonds, three passports, dozens of labelled CDs/HDDs121A physical and 1A‑C digital holdings stored at NY Evidence Control Center, FD‑597 signed by estate manager
Little St. James, U.S. Virgin IslandsAugust 12–14, 2019"Large‑scale evidence collection" of drives, binders, massage linens, volume never detailed in docket34Evidence flown to San Juan then mirrored to Quantico CART, scene logs sealed
Palm Beach mansion (S.D. Fla.)Local PD search October 2005, no 2019 federal raid5Legacy Polaroids and phone lists from 2005 still logged, no new FD‑597 in 2019Material kept under earlier 1A numbers, chain‑of‑custody gap since 2008 transfer to FBI
Zorro Ranch, New MexicoNo federal entry as of August 21, 20196No FBI property receipts exist, evidence status unknownOnly third‑party statements and aerial photos in file
Avenue Foch apartment, ParisSeptember 23–24, 2019French police seized devices from 800 m² flat, massage room documented7Mutual‑legal‑assistance packet, copy drives provided to FBI Legat Paris

  FBI Record Architecture Mapped to Epstein Matter

ClusterStandard Form CodesConfirmed or Expected Epstein ContentPublic Release Status
Case‑opening & adminFD‑71, EC, FD‑1057Predication memos 2005 & 2018, scope expansions naming Maxwell and other subjectsUnreleased
Witness interviewsFD‑302>3,900 pages covering victims, pilots, staff8Parts 01‑08 of Vault, names redacted
Confidential tipsFD‑1023Source reporting on recruiters and flight crews9Withheld
Physical evidence1A envelopes, FD‑597Safe contents, diamonds, passports, linensWithheld, receipt form quoted in media1
Digital evidence1A‑C barcodes, FD‑340 worksheets"Tens of thousands" of files incl. CCTV and images1011Not released
Chain‑of‑custodyFD‑192, NIST‑aligned digital tags12Transfer logs Queens → Quantico → SDNY vaultWithheld
Search‑warrant packetsAffidavits, inventories, returns9 E. 71st St. & Little St. James affidavits, island warrant referenced in SDNY docketSealed
Digital forensicsCART reports, image‑hash listsCellebrite and GrayKey extractions from iPhones, hash‑set cross‑matches to NCMECWithheld
Financial analysisExcel work‑ups, SAR memosDeutsche Bank flagged wires, Southern Trust ledgers13Not released
LaboratoryFD‑54, fingerprint/DNA resultsQAR lab case 19‑NY‑1327 comparing sheets to victim kitWithheld
Grand‑juryTranscripts, subpoenasMaxwell pre‑indictment testimony, 2023–25 witness subpoenas14Protected under Rule 6(e)
Oversight & custodialOIG exhibitsMCC camera outage logs, telephone reports15Public (OIG PDF)

  Volume, Storage and Access

By mid‑2025 the case file holds roughly 2,000 paper serials from 2005‑09 (scanned to SENTINEL), 3,900 additional FD‑302 pages, and about 2.1 TB of digital media.

Physical evidence sits in the NY Evidence Control Center — clone drives reside on DOJ's litigation servers. The Bureau withholds most material under FOIA Exemption 7(A), citing open investigations of uncharged associates.

Parallel FOIA suits in D.D.C. and the SDNY docket for United States v. Maxwell continue to drive staged releases.

  Outstanding Gaps and Risks

No FBI team has ever entered Zorro Ranch, leaving any artifacts there outside Bureau chain‑of‑custody and limiting prosecutorial options tied to New Mexico travel.

Palm Beach items seized in 2005 changed hands before modern barcode tracking standards, raising authenticity challenges for trial exhibits.

The digital backlog — tens of thousands of files — poses a timeliness risk, hash‑matching and victim‑age verification are still in progress six years after seizure.

  Disclosure Posture

The Justice Department stated in January 2025 that no "client list" has been located14, yet acknowledged that review of seized media remains active.

Congress has scheduled further oversight hearings for late‑2025. Absent an indictment of additional co‑conspirators, the next likely public release will be the court‑ordered unsealing of older FD‑302s once privacy redactions are complete.

  Expanded Digital & Email Evidence

The Bureau's data haul stretches far beyond hard-drives and photographs. Provider subpoenas, onsite extractions and later civil discovery together produced an email archive running into seven figures, alongside a paper and digital trail that maps every flight, visitor, wire transfer and CCTV frame from 2005-2025.

What follows updates the briefing with a focused look at (1) where the emails came from, (2) what other primary documents turned up and (3) how each set slots into the FBI file architecture.

    Email corpus recovered (2019-2025)

Acquisition pathApprox. volume & formatRepresentative public exampleEvidentiary useFBI forms & tags
§ 2703(d) / MLAT provider returns40 computers, 26 detachable drives and six recording devices yielded "300 GB + of data," much of it mail-store archives 1617Little St James server image & Gmail take-out bundled in 2025 DOJ index 17Time-line grooming, recruitment chains, attachment hashes to victim imagery1A-C barcodes, FD-340 worksheets
Local mail-stores imaged from seized Apple Mac Pro towers and iPhonesDevice imaging described in FBI evidence list ("40 computers…70 CDs/HDDs") 16Cellebrite/GrayKey extraction logs referenced in DOJ memo 18Drafts, deleted mail, key-chain passwordsFD-340 + lab image-hash lists
Internal bank compliance email archives1,200+ messages between Epstein and Jes Staley alone, JPMorgan warned employees via e-mail of "high-risk" status in 2011 1920Photos of young women e-mailed to Staley titled after Disney princesses 19Shows knowledge & facilitation for potential 18 U.S.C. § 2 charges1A-C "Financial-Mail-Archive", FD-302 financial inserts
Corporate archives under DFS consent ordersDeutsche Bank AML mail chains from 2013-18 summarized in NYDFS findingsDue-diligence e-mails approving Epstein despite red flagsWill-fit counts for money-laundering predicateFD-302 attachment, SAR analytical file
Deleted or missing setsSEC order cites JPMorgan's loss of 47 million 2018 e-mails sought by subpoenas 21Gap noted in parallel civil suitsSpoliation risk logged in EC "Evidence-Gaps" serial

  Additional first-order documents and artefacts

Document / artefactSource locationPublic confirmationInvestigative value
Island & Manhattan blueprints, Little St James boat and visitor log-booksBoxes seized Aug 2019, catalogued in DOJ index 16Reconstructs building sight-lines and guest movements
Wire-tap discs on Ghislaine Maxwell phoneThree court-authorized intercept discs listed in evidence index 16Correlates voice calls with e-mail/chat traffic patterns
Employee contact lists, handwritten service notebooks, cash-log ledgers ("Ghis")Same index items and ABC breakdown 16Shows scheduling, payments, real-time grooming entries
Financial KYC files, SAR correspondenceDeutsche Bank consent order narrativeGrounds for money-laundering counts, asset-forfeiture tracing
Customs & Border Protection passenger manifests and cargo billsFOIA reading-room publication of Epstein records 22Verifies cross-border victim travel, freight deliveries
CCTV master files (Synology RAID) and MCC prison footage30 TB video bank in 2019 seizure list 16, DOJ-released 11-hour prison video later found edited 18Victim-age confirmation, chain-of-custody contested after metadata "cuts"
254-name masseuse spreadsheet & redacted "black book"2025 Newsweek release of phase-one files 23Cross-match to payment memos, e-mails, photos
Bank executive e-mails showing intimate exchangesFCA ban cites "sometimes intimate e-mails" 24Shows conscious disregard and concealment
Blueprint of flight legs & tail-numbersListed in DOJ evidence index, echoed in Guardian explainer 17Ties manifests to surveillance video and victim statements
Postal and freight bills (FedEx lingerie, photo gear)Described in 2025 ABC evidence breakdown 16Confirms procurement consistent with grooming narrative

  Processing & integrity safeguards

All e-mail and digital artefacts enter the file under 1A-C numbers; each archive (provider return, device image, or compliance export) is hashed in an FD-340 and mirrored at Quantico's CART lab. Chain-of-custody across labs and offices is tracked on FD-192 forms, the template referenced in the FBI Forensic Services handbook.18

Provider-supplied metadata (Message-ID, login IPs) is ingested into SENTINEL for cross-indexing with travel, financial and CCTV time-stamps. The Bureau's digital-evidence retention policy flags spoliation events — such as JPMorgan's 47 million deleted e-mails — for supervisory follow-up, as already recorded in the civil SEC order.21

The email layer supplies the connective tissue — linking photographs on seized drives to payments on bank ledgers, badge swipes in visitor logs and names in log-books — while the expanded paper and video cache corroborates each thread.

Together they create a multidimensional timeline that prosecutors can authenticate under Fed. R. Evid. 902(13) with the FD-340 hash sheets already in the case file.


  References

  Footnotes

  1. FBI used saw to open Epstein safe, Business Insider 2

  2. Epstein latest house arrest request, The Guardian

  3. FBI raids Epstein's Caribbean island, The Guardian

  4. Epstein's Florida plea deal details, Miami Herald

  5. Prosecutors yet to search Palm Beach mansion, WPBF

  6. Epstein's New Mexico ranch not raided, CBS News

  7. French police search Epstein Paris apartment, The Guardian

  8. Jeffrey Epstein Part 01, FBI Vault

  9. FBI records management policy, GovInfo

  10. Missing Epstein tapes, Newsweek

  11. Justice Dept. review of Epstein case, AP News

  12. Chain of custody in digital forensics, Champlain College

  13. Epstein files may release 2025, Business Insider

  14. No Epstein client list found, CBS News 2

  15. OIG report on Epstein investigation, DOJ OIG

  16. Unreleased Epstein files logbooks, ABC News 2 3 4 5 6 7

  17. What are Epstein documents Trump, The Guardian 2 3

  18. How Wired analyzed Epstein video, WIRED 2 3

  19. Epstein emailed pictures to JPMorgan banker, Business Insider 2

  20. Epstein JPMorgan client warnings, Washington Post

  21. JPMorgan fined for deleting millions emails, KCRA 2

  22. Epstein records FOIA reading room, CBP.gov

  23. Epstein files massage underage girls, Newsweek

  24. FCA ban cites intimate emails, Financial Times

Published on July 26, 2025

13 min read