EFTA00010440.pdf

313 KB
View Original

Extraction Summary

3
People
3
Organizations
3
Locations
3
Events
1
Relationships
5
Quotes

Document Information

Type: Email chain / legal correspondence
File Size: 313 KB
Summary

This document consists of an email chain from February to April 2020 between the US Attorney's Office (SDNY) and forensic technical support regarding the processing of digital evidence seized from Jeffrey Epstein's properties. The correspondence highlights significant technical difficulties, including the inability to link emails to attachments (specifically mentioning 'flight records' as an example of a missing link), mismatched control numbers, and network infrastructure changes requiring the deletion of 400TB of data. The emails inventory seized items, noting 9 hard drives from a 2007 search found in the NY apartment, over 40 devices and 60 CDs from the NY mansion, and over 25 devices/servers from the Virgin Islands.

People (3)

Name Role Context
Redacted Sender/Recipient Assistant U.S. Attorney
Working for the Southern District of New York (USANYS), managing the review of seized digital evidence.
Redacted Sender/Recipient Technical/Forensic Support
Responsible for processing the hard drives, managing the network, and providing load files to the US Attorneys.
Jeffrey Epstein Subject of Investigation
Deceased. Discussion centers on search warrants executed on his properties and devices.

Organizations (3)

Name Type Context
USANYS
U.S. Attorney's Office for the Southern District of New York.
Relativity
E-discovery software platform used to review the seized documents.
FBI
Implied as the agency that performed the seizures and initial screenings for Child Pornography (CP).

Timeline (3 events)

2007-07
Historical search warrant execution on one of Epstein's properties.
Unknown (referenced in 2020 email)
Law Enforcement
2020-02
Network replacement and deletion of 400 TB of old data by the technical support team.
Forensic Lab/Office
Tech Support
2020-02-15
Receipt of hard drive containing potential new Epstein search warrant materials.
NY

Locations (3)

Location Context
Location of search warrant execution where devices and 'loose media' were seized.
Location of search warrant execution where servers and Macs were seized.
The case team traveled here during the week of Feb 24, 2020.

Relationships (1)

USANYS Professional/Legal Tech Support
USANYS is relying on Tech Support to process and load digital evidence for the Epstein case.

Key Quotes (5)

"So if an email says, 'see the attached flight records,' for example, we have no way of linking that up with the records themselves."
Source
EFTA00010440.pdf
Quote #1
"There were 9 IDE hard drives found in the Manhattan apartment, they turned out to be 3 copies of 3 drives (9 drives in total) from a July 2007 search on one of his properties."
Source
EFTA00010440.pdf
Quote #2
"They are tearing out our old network and giving us a new one, they mandated we delete old stuff (about 400 TB worth)."
Source
EFTA00010440.pdf
Quote #3
"I think FBI was going to do an initial screen to make sure no CP [Child Pornography], and since I think the answer was no, we’ll need to get those to be able to review them as well."
Source
EFTA00010440.pdf
Quote #4
"Based on the attached search warrant returns, it looks like from the New York mansion (the PDF) there are approximately 40 devices that would have storage... and that’s not even counting at least 60+ CDs."
Source
EFTA00010440.pdf
Quote #5

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document