| Connected Entity | Relationship Type |
Strength
(mentions)
|
Documents | Actions |
|---|---|---|---|---|
|
person
Edward Snowden
|
Employee |
11
Very Strong
|
7 | |
|
person
Edward Snowden
|
Employment |
11
Very Strong
|
23 | |
|
person
MIT/Harvard
|
Origin |
5
|
1 | |
|
person
Edward Snowden
|
Employment applicant |
5
|
1 | |
|
person
NSA
|
Contractor |
5
|
1 | |
|
person
Mitchell B. Modell
|
Chair sponsor |
5
|
1 | |
|
person
Edward Snowden
|
Former employment |
5
|
1 |
| Date | Event Type | Description | Location | Actions |
|---|---|---|---|---|
| 2025-10-01 | N/A | Waddell and Reed launched 3 of their own NextShares products. | Unknown | View |
| 2016-10-01 | N/A | Waddell and Reed launched 3 of their own NextShares. | Unknown | View |
| 2013-01-01 | N/A | Management of NSA's classified computers handed over to private companies (Booz Allen Hamilton, e... | NSA | View |
| 2012-03-15 | N/A | Snowden accepted the offer from Dell to work in Hawaii. | Hawaii | View |
| 2009-10-01 | N/A | Dell assigned Snowden a job with direct access to NSA computers. | NSA | View |
| 2009-04-01 | N/A | Snowden applied to a subsidiary of Dell computer company. | Japan (intended work location) | View |
| 2009-01-01 | N/A | Snowden left the CIA and was hired by Dell. | USA | View |
| 2008-01-01 | N/A | NSA outsourced the task of reorganizing backup systems at regional bases to Dell. | Regional bases | View |
This document is a CART (Computer Analysis Response Team) evidence inventory log listing electronic items seized in the Jeffrey Epstein investigation (Case 50D-NY-30227571). The list details over 100 items, primarily consisting of hard drives (Seagate), desktop and laptop computers (Apple, Dell, HP), USB drives, iPads, iPhones, and recording devices. Notable specific items include a laptop labeled 'JE BIG LAPTOP', a desktop labeled 'Kitchen Mac', and various network infrastructure equipment.
This document is an inventory list of electronic evidence seized in relation to the Jeffrey Epstein case, specifically labeled as 'New York Evidence' and 'Island Evidence'. It lists various hardware including Seagate hard drives (linked to the original Florida case), Apple Mac desktops, Windows PCs (Dell, HP, MSI), loose media (SD cards, USBs), and a Nikon camera. It also lists inventory numbers for cell phone extractions and notes comments from a redacted individual regarding further processing needs.
This document is a digital evidence status report dated August 3, 2020, likely from the FBI or a forensic contractor. It details the processing status of numerous electronic devices seized from Jeffrey Epstein's properties in New York, Florida, and the 'Island' (Little St. James), including computers, hard drives, and phones. Notable items include a hard drive labeled 'Woody Allen Archive,' a laptop explicitly linked to 'JE' (Jeffrey Epstein), and a surveillance server (UNIFI) requiring RAID reconstruction.
This document is an FBI Receipt for Property (FD-597) dated August 15, 2019, five days after Jeffrey Epstein's death. It details the seizure of surveillance hardware from the Metropolitan Correctional Center (MCC) in New York, specifically a NiceVision Pro DVR, a Disk Array, a Dell Poweredge server, and a Seagate hard drive containing a forensic image of the DVR system disk. The items were collected by an FBI Special Agent from a Lieutenant at the facility.
This document is a Law360 email newsletter from July 21, 2020, summarizing various legal news stories. Key topics include the resentencing of Sheldon Silver, a harassment suit at Fox News, and the shooting at the home of Judge Esther Salas, which notes her involvement in a case concerning Deutsche Bank's ties to Jeffrey Epstein. The newsletter also covers various corporate litigations, bankruptcy rulings, and general counsel appointments.
This document contains a series of email communications between the FBI's New York Computer Analysis Response Team (CART) and the US Attorney's Office (SDNY) regarding the processing of digital evidence seized from Jeffrey Epstein's properties in New York and the Virgin Islands. The correspondence, dating from February to July 2020, details significant technical challenges in processing terabytes of data from various devices (Macs, Windows, servers, loose media) for legal discovery. Key issues include the incompatibility of forensic data with the US Attorney's 'Relativity' review platform, delays caused by COVID-19 and FBI network upgrades, and the need to identify specific device serial numbers for search warrants.
This document is a photograph of a desk in an office setting, marked with evidence tag EFTA00003111. The desk contains a Dell monitor, HP computer, Panasonic landline phone, keyboard, mouse, cleaning supplies (paper towels, spray bottle, air freshener), and a black external drive case. There is a paper document resting on the keyboard, appearing to be a form or checklist, but the text is too blurry and small to read via OCR. The setting appears to be a chaotic or active workspace/storage area.
An FBI Photographic Log (FD-674) dated August 12, 2019, documenting a search of Little St. James, USVI by the NY ERT (Evidence Response Team). The log lists photos taken in 'Zone C' covering the Beach House (exterior, interior, desk, computers, emergency contact info), Utility Bunker, Pergola and Storage Area, Grotto, and Sundial.
This document is a photograph of an evidence item, specifically the regulatory label on the back of a Dell computer (Reg Model D19M, likely a desktop tower). The label indicates the device was assembled in Mexico and contains a wireless module (QCNFA335) approved in 2013. The image bears the evidence tag 'EFTA00003033' in the bottom right corner, suggesting it was cataloged as part of a legal discovery or investigation process, likely related to the seizure of electronic equipment.
Photograph of the rear specification label of a Dell electronic device (Regulatory Model D19M), likely a desktop computer or All-in-One unit. The label displays technical specifications, regulatory compliance codes (FCC, IC), and indicates the device was assembled in Mexico. The image is marked with the evidence identification number EFTA00003032.
Photograph of an identification label on a piece of electronic hardware (computer tower/device). The label lists a Service Tag (8GLM0Q2), an Express Service Code (18418016810), and a manufacturing date of July 14, 2018 (20180714). The image includes an evidence file reference number EFTA00003031.
This image displays two documents related to the federal investigation of Jeffrey Epstein dated July 11, 2019. The left document is a Search and Seizure Warrant issued by the SDNY citing violations of Sex Trafficking (18 U.S.C. 1591) and Conspiracy (18 U.S.C. 371). The right document is an FBI Receipt for Property (FD-597) listing items seized from Epstein's New York residence, including an Apple desktop, hard drives, loose photos, a passport, and various other electronics.
This image shows an open desk drawer containing a white binder titled 'BLACK FAMILY TRUSTEE MEETING' dated November 21, 2014. Also visible in the drawer is a CD case with a sticky note reading 'SPA 255' and a box of playing cards. A sticky note on the desk surface mentions 'Bill'. The document serves as evidence of a connection between the owner of the desk (presumably Epstein) and the Black family's financial trust management in late 2014.
Evidence photograph showing two black filing cabinets in a storage area. The drawers are labeled with yellow sticky notes corresponding to Jeffrey Epstein's known properties: 'ZORRO' (Zorro Ranch), 'NM' (New Mexico), 'LSJ' (Little St. James), and 'PB' (Palm Beach). Other labels include 'MISC' and 'EL TRULLO'. The image also shows a FedEx box, rolled blueprints, and other storage items.
This is an evidence photograph (EFTA00000040) depicting a black filing cabinet containing rolled blueprints and file folders. The cabinet drawers are labeled with sticky notes corresponding to major Epstein properties: '71st' (New York), 'ZORRO' (New Mexico), and 'EL BRILLO' (Palm Beach), indicating how physical records for these locations were organized and stored together.
This document is an FBI evidence recovery log detailing items seized in relation to the Jeffrey Epstein investigation. The inventory includes significant quantities of digital devices (hard drives, laptops, towers), surveillance footage, financial records including large amounts of cash in envelopes marked 'SK', and personal items such as massage tables, sex toys, and photos of naked females. Specific items of note include blueprints for Epstein's NYC residence, boat logs for LSJ (Little St. James), and an Austrian passport featuring Epstein's photograph.
This document is a page from a court transcript (filed August 24, 2022) featuring the direct testimony of a witness named Brune. The testimony concerns the due diligence performed during jury selection (voir dire), specifically admitting that the witness did not launch a full-scale private investigation into every juror and confirming that the investigative entity 'Nardello' did not search for juror Catherine M. Conrad of Bronxville. The witness also discusses the timing of when the government disclosed a letter sent by the juror.
This is a court transcript page filed on February 24, 2022, from the case United States v. Ghislaine Maxwell (Case 1:20-cr-00330). A witness named Edelstein is being questioned about whether their legal team had the resources to investigate Juror No. 1, Catherine Conrad, specifically regarding a prior personal injury lawsuit she failed to fully disclose during voir dire. Edelstein admits they had the resources to call investigators (Nardello) but did not do so initially because they didn't believe the Catherine Conrad in the Westlaw report was the same person as the juror.
This document is a transcript page from a court proceeding (likely related to United States v. Ghislaine Maxwell, given the case number) filed on February 24, 2022. The witness, identified as 'Brune' (likely defense attorney Susan Brune), is testifying about the defense team's jury research process, specifically regarding juror Catherine M. Conrad. Brune admits that the investigative firm Nardello did not search for Conrad and discusses the timing of when the team focused on the juror's middle initial relative to a letter disclosed by the government.
This document is a Palm Beach Police Department incident report narrative detailing the forensic seizure of computers from Jeffrey Epstein's residence and subsequent investigative steps. An officer describes seizing a Dell computer from 'Room B' and a Premio computer from 'Room F,' noting their active states. Detective Joseph Recarey reports on efforts to subpoena Epstein's former houseman, Alfredo Rodriguez, and analyzes phone records showing calls from Haley Robson to a victim on February 6, 2005, the date the victim alleges an incident occurred at Epstein's home.
This Palm Beach Police Department incident report details two main activities. The first, dated April 20, 2006, describes a detective's search of a residence and the seizure of two computers (a Dell and a Premio) for forensic analysis. The second part is a narrative from December 21, 2005, which recounts efforts to subpoena Epstein's former houseman, Alfredo Rodriguez, and an analysis of phone records showing multiple calls from Haley Robson to a victim on February 6, 2005, the same day an incident occurred at Epstein's house.
This document is a page of endnotes (page 310) from a book discussing Edward Snowden, listing sources and citations for Chapter 4 ("Thief") and Chapter 5 ("Crossing the Rubicon"). It references interviews, articles, and transcripts involving Snowden, government officials, and journalists.
This document is page 309 from a book containing endnotes for Chapter 3 ('Contractor'). Based on the footer ISBN (9780451494566) and filename 'Epst_', the book is 'How America Lost Its Secrets' by Edward Jay Epstein. The content details sources for information regarding Edward Snowden's employment (Dell, Booz Allen), his time in Japan and India, his relationship with Lindsay Mills, and interviews with intelligence officials. While the filename includes 'Epst' (referring to author Edward Jay Epstein) and 'HOUSE_OVERSIGHT', the content is strictly about Edward Snowden and intelligence leaks, not Jeffrey Epstein.
This document page discusses Edward Snowden's calculated move from Dell to Booz Allen Hamilton, arguing that the transition was motivated by a desire to access specific intelligence documents unavailable at Dell, such as the 2013 "black budget." The text suggests that Snowden's actions went beyond whistleblowing and provided significant value to foreign adversaries like Russia and China by exposing sensitive information and intelligence sources.
This excerpt from "How America Lost Its Secrets" analyzes Edward Snowden's decision to leave his job at Dell for a lower-paying position at Booz Allen Hamilton. The author argues that this move was unnecessary for whistleblowing purposes, as Snowden already had access to critical documents like FISA court orders and Presidential Policy Directive 20 while at Dell, and suggests the job switch actually increased his risk of detection.
| Date | Type | From | To | Amount | Description | Actions |
|---|---|---|---|---|---|---|
| 1988-01-01 | Received | Jeffrey Epstein | Dell | $1,600,000.00 | Investment in football helmet manufacturer. | View |
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein entity