| Connected Entity | Relationship Type |
Strength
(mentions)
|
Documents | Actions |
|---|---|---|---|---|
|
person
CIA
|
Intelligence sharing |
5
|
1 | |
|
person
Trent Martin
|
Law enforcement subject |
5
|
1 | |
|
person
Flatley
|
Employment |
5
|
1 | |
|
person
NSA
|
Cooperative data sharing |
5
|
1 | |
|
organization
The government
|
Operational |
5
|
1 | |
|
person
Redacted Source
|
Informant service provider |
5
|
1 | |
|
person
Unnamed Witness
|
Person of interest interviewee |
5
|
1 | |
|
person
Loftus
|
Professional |
5
|
1 | |
|
person
Scott
|
Unknown |
5
|
1 | |
|
person
victims
|
Official |
5
|
1 | |
|
person
Robert Maheu
|
Informant operative |
5
|
1 | |
|
person
U.S.
|
Business associate |
5
|
1 | |
|
person
Wild
|
Investigative law enforcement victim witness |
5
|
1 | |
|
person
paul krassner
|
Surveillance target |
5
|
1 | |
|
person
The victims
|
Professional |
5
|
1 | |
|
person
NSA
|
Jurisdictional investigative |
5
|
1 | |
|
person
James A. Baker
|
Employment |
5
|
1 | |
|
person
A. Farmer
|
Professional |
5
|
1 | |
|
person
Jane, Kate, Carolyn, and Annie
|
Investigator witness |
5
|
1 | |
|
organization
[REDACTED]
|
Professional collaboration |
5
|
1 | |
|
organization
NSA
|
Inter agency communication |
5
|
1 | |
|
person
STEPHEN FLATLEY
|
Employment |
5
|
1 | |
|
person
the defendant
|
Adversarial |
5
|
1 | |
|
person
Pro-PRC organizations
|
Surveillance adversarial |
5
|
1 | |
|
person
Jeffrey Epstein
|
Requester agency |
5
|
1 |
| Date | Event Type | Description | Location | Actions |
|---|---|---|---|---|
| N/A | N/A | OPR working with FBI Palm Beach Office, including case agents and Victim Witness Specialist, to o... | Palm Beach | View |
| N/A | N/A | FBI search of Automated Case Support system and documentation of victim notification system. | N/A | View |
| N/A | N/A | FBI Meeting | Unknown | View |
| N/A | N/A | Notification received by OPR from FBI and USAO regarding federal investigation and Epstein's plea. | N/A | View |
| N/A | N/A | FBI investigation into Epstein's international sex trafficking organization was quashed. | N/A | View |
| N/A | N/A | Federal investigation began, contemporaneous with news reports of Epstein's arrest. | N/A | View |
| N/A | N/A | Victims provided OPR with information regarding their contacts with the FBI and USAO. | N/A | View |
| N/A | N/A | Rothstein's firm was raided. | N/A | View |
| N/A | N/A | FBI produced a criminal complaint related to Alfredo Rodriguez. | N/A | View |
| N/A | N/A | Potential arrest of Ghislaine Maxwell ('green lighting ab arrest'). | Unknown | View |
| N/A | N/A | Launch of counterintelligence investigation into Trump campaign | USA | View |
| N/A | N/A | Defense counsel review of nude images | FBI | View |
| N/A | N/A | FBI interview of a victim pursuant to a federal investigation regarding the sexual exploitation o... | Unknown | View |
| N/A | Investigation | Epstein investigation | N/A | View |
| N/A | N/A | Transfer of evidence | New York Office (NYO) | View |
| N/A | N/A | Criminal Investigation / Agency Interviews | MCC New York | View |
| N/A | N/A | Search of Epstein's island | Little St. James | View |
| N/A | N/A | Seizure of images from Jeffrey Epstein's residences pursuant to search warrants. | New York and Virgin Islands | View |
| N/A | N/A | Planned Arrest upon return to US | Unspecified Airport | View |
| N/A | N/A | Closure of federal investigations by FBI and U.S. Attorney | Federal jurisdiction | View |
| N/A | N/A | FBI Raid / Evidence Collection | Epstein Residence | View |
| N/A | N/A | Identification of new victims | Unknown | View |
| N/A | N/A | Government interviews with accusers | Unknown | View |
| N/A | N/A | Opening of the case/Investigation | New York | View |
| N/A | N/A | Referral of case to FBI | Palm Beach | View |
This document is a photograph of a physical piece of evidence: a Western Digital hard drive sealed in an anti-static bag. An FBI evidence label attached to the drive identifies it as 'Specimen HQQ026639' related to case 'UCFN: 90A-NY-3151227' (the code 90A typically relates to child exploitation matters). The label describes the contents as a 'Master Copy' containing archives of 'DVR 2 Controller images,' 'repaired drive images,' and 'Video Exports,' suggesting this drive contains recovered surveillance footage relevant to the investigation. The Lab number HQQ190816001 indicates the evidence was processed on August 16, 2019.
The image displays a brown accordion-style evidence folder (redweld) resting on a speckled floor. The folder is manually labeled with the handwritten case file identifier '90A-NY-3151227 1B54'. A digital Bates stamp 'EFTA00008471' is visible in the bottom right corner. This appears to be a container for physical evidence related to the investigation.
This document is a photograph of a 10TB Seagate IronWolf hard drive packaged in an evidence bag. The drive bears a label identifying its contents as a 'Master Copy: Archive of DVR 1 Images', suggesting it contains surveillance footage relevant to the investigation. The label includes FBI-style case identifiers: Lab # HQQ190816001 (indicating a date of August 16, 2019, shortly after Jeffrey Epstein's death) and UCFN 90A-NY-3151227 (indicating an Obscene Matter case out of the New York office). The drive itself was manufactured in November 2018.
This document is a photograph of a physical evidence folder (likely an accordion file) sitting on a speckled surface. The folder is labeled with handwritten black marker text reading '90A-ny-3151227 1B55'. The code '90A' typically corresponds to the FBI classification for Child Prostitution, 'NY' indicates the New York Field Office, and '1B' generally designates a file containing physical or bulky exhibits/evidence. The folder bears the discovery stamp EFTA00008469.
This document is an image of a brown evidence file folder. The handwritten text on the cover reads '90A - NY - 315 1227 7B49', which follows the format of an FBI case file classification (likely New York field office, classification 90A relating to child exploitation). The document bears the digital stamp 'EFTA00008465'.
This document is a photograph of a Western Digital WD2500 (250GB) hard drive sealed in FBI evidence packaging. The drive bears an FBI New York CART Lab label with the identifier NYC025654 and references Case ID 90A-NY-3151227. A handwritten note on the label indicates it is a 'Master Copy' processed on July 26, 2019, shortly after Jeffrey Epstein's arrest.
This document is an image of a reddish-brown evidence folder or file cover. It features handwritten text identifying it as part of a case, likely an FBI file given the format '90 E - NY - 3151227'. The suffix '1B52' likely designates a specific volume or evidence container (1B). The document bears the Bates stamp EFTA00008457.
This document is an image of the exterior of a reddish-brown physical evidence folder. It features handwritten case identifiers '90A-NY-3252227' and '1B47' written vertically along the spine/edge. The code '90A' typically corresponds to FBI classifications for child pornography/exploitation matters, and 'NY' denotes the New York field office.
This image shows the cover of a brown evidence folder or file. It contains handwritten case identifiers '90A - NY - 3151 227' and '1 B 48', which follow the format of FBI case file numbering (specifically the New York field office). The image corresponds to Bates number EFTA00008453.
This document is a photograph of a brown evidence folder or envelope. It bears the handwritten FBI case file number '90A-NY-3151227' followed by the evidence item designation '1B43'. The '90A' classification typically refers to FBI matters involving crimes against children. The bottom right corner contains the Bates stamp EFTA00008451.
This document is a photograph of a sealed evidence bag containing a Seagate Barracuda 1000GB hard drive (Evidence ID 1B30). The yellow label indicates this drive is a forensic 'Derivative Copy' or clone of another hard drive (Evidence ID 1B10, a Seagate Barracuda 500GB), created on August 12, 2019, by an individual with initials PC in connection with case 90A-NY-3151227.
This image depicts the exterior of a closed brown expandable evidence folder resting on a speckled floor. The folder is labeled with handwritten black marker text reading '90A-NY-3151227 1B27', which corresponds to an FBI case file numbering system (likely New York Field Office). The bottom right corner contains the digital discovery stamp 'EFTA00008445'. No document contents are visible.
This is a photograph of an evidence bag containing a Seagate Barracuda 1000GB hard drive (Item 1B24). The label indicates it is a forensic 'Derivative Copy' (clone) of another hard drive (Item 1B3, a 500GB Seagate) created on August 12, 2019, in connection with case 90A-NY-3151227.
This document is a photograph of an evidence box labeled 'RX18' containing item 1B42. The green label identifies the contents as an FBI-owned Hitachi 2TB Hard Drive created on August 21, 2019. The drive is a 'Master Copy' containing verified forensic E01 images of other evidence items (1B12, 1B16, 1B17, and 1B18), associated with case number 90A-NY-3151227.
This document is a photograph of a brown evidence envelope or file folder. It features a handwritten case file number '90A-NY-315 1227 IB42', which follows the standard FBI file classification format (Classification 90A, New York Field Office). The item is labeled with the Bates stamp EFTA00008441.
This document is a photograph of physical evidence, specifically a sealed anti-static bag containing a Seagate hard drive labeled as item 1B22. The label details a forensic operation performed on August 12, 2019, where a clone copy was made from a source hard drive (Item 1B1, 500GB) onto this destination drive (1000GB) using a Tableau TX-1 forensic imager. The case identifier 90A-NY-3151227 suggests an FBI investigation based in New York.
This document is an image of a closed reddish-brown evidence folder. Handwritten vertically on the right side is the case file identifier '90A-NY-3151227 1B22'. The bottom right corner contains the digital reference label 'EFTA00008439'.
This document is a photograph of an evidence bag containing a hard drive. The label identifies the contents as item 1B33, a Western Digital 1TB hard drive containing a forensic clone of item 1B15, a Seagate Barracuda 500GB hard drive. The evidence was processed on August 12, 2019, in connection with case 90A-NY-3151227.
A photograph showing the exterior of a brown expandable evidence folder resting on a speckled floor. The folder is hand-labeled with the case identifier '90A-NY-3151227' and the evidence designation '1B33', which typically denotes bulky evidence in FBI filing systems. The document bears a Bates stamp 'EFTA00008437' in the bottom right corner.
The image displays the exterior of a brown expanding evidence folder. Handwritten on the front is the case/evidence code '90A-NY-3151227 1B26', consistent with FBI evidence labeling conventions (NY indicating the New York field office). A Bates stamp or tracking number 'EFTA00008435' is visible in the bottom right corner.
A photograph of an evidence bag containing a Hitachi 1TB hard drive. The label identifies this item (1B23) as a 'PC Derivative Copy' or forensic clone of another hard drive (item 1B2, a Hitachi 500GB drive) related to case 90A-NY-3151227. The cloning process took place on August 12, 2019, using a Tableau TX-1 forensic imager.
This image shows a brown evidence folder resting on a speckled surface. The folder is labeled with handwritten black marker text '90A-NY-3151227 1B23', which corresponds to an FBI case file format (likely the New York field office). A white document is partially visible inside the folder. The image is stamped with the identifier 'EFTA00008433'.
The image shows a brown accordion-style evidence folder or file jacket lying on a speckled floor. The folder is labeled in black handwritten marker with the case identifier '90A-NY-3151227 1B25', likely corresponding to an FBI case file from the New York field office. An evidentiary tracking number 'EFTA00008427' is visible in the bottom right corner.
This document is a photograph of FBI evidence envelopes containing materials collected from the Metropolitan Correctional Center (MCC) on August 10, 2019, the date of Jeffrey Epstein's death. The evidence, labeled as 'Item 5' and 'Misc. Items from L. Tier, Cell #220', was sent to the FBI's Questioned Documents Unit, suggesting the contents include written materials requiring forensic analysis.
This document is a photograph of FBI evidence packaging containing materials collected on July 30, 2019, from the Metropolitan Correctional Center (MCC) in New York, where Jeffrey Epstein was incarcerated. The package is labeled with FBI Laboratory number 2020-01577 and contains items 4 through 5, originating from the FBI NY Evidence Control Unit.
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein entity