Stella McCartney

Organization
Mentions
97
Relationships
1
Events
5
Documents
48
Also known as:
CART

Relationship Network

Loading... nodes
Interactive Network: Click nodes or edges to highlight connections and view details with action buttons. Drag nodes to reposition. Node size indicates connection count. Line color shows relationship strength: red (8-10), orange (6-7), yellow (4-5), gray (weak). Use legend and help buttons in the graph for more guidance.

Event Timeline

Interactive Timeline: Hover over events to see details. Events are arranged chronologically and alternate between top and bottom for better visibility.
1 total relationships
Connected Entity Relationship Type
Strength (mentions)
Documents Actions
person Flatley
Coordinator
5
1
View
Date Event Type Description Location Actions
2025-08-11 N/A Mass deployment of ERT and Case Squad via FBI Q400 St. Thomas View
2020-01-01 N/A Processing of seized digital evidence including 'taint review' and upload to Relativity platform. SDNY / Remote View
2019-11-01 N/A Search of Epstein's New York residence yielding electronic evidence. New York residence View
2019-08-26 N/A CART received one Gold/Black Apple iPhone (evidence item 1B44) for extraction. New York, New York View
2019-08-15 N/A Evidence Processing Little St. James (Source of... View

EFTA00038614.pdf

This document is a heavily redacted email transmitting an attachment titled 'Copy_of_Spreadsheet_of_Epstein_Electronic_Devices_in_SWs.xlsx'. The body of the email states that the attachment correlates '1B' evidence numbers with 'CART' (Computer Analysis Response Team) numbers, likely referring to forensic analysis of electronic devices seized during search warrants.

Email
2025-12-25

EFTA00038465.pdf

This document is a CART (Computer Analysis Response Team) evidence inventory log listing electronic items seized in the Jeffrey Epstein investigation (Case 50D-NY-30227571). The list details over 100 items, primarily consisting of hard drives (Seagate), desktop and laptop computers (Apple, Dell, HP), USB drives, iPads, iPhones, and recording devices. Notable specific items include a laptop labeled 'JE BIG LAPTOP', a desktop labeled 'Kitchen Mac', and various network infrastructure equipment.

Cart evidence log / inventory list
2025-12-25

EFTA00038296.pdf

This document is an internal FBI email chain dated August 9, 2019, discussing the status of electronic evidence seized in the Jeffrey Epstein investigation. The FBI NY CART Coordinator provides a detailed inventory of devices, noting that several iPads and an iPhone were sent for unlocking, some drives were encrypted, and that no content had been reviewed yet pending a 'taint review.' The email also mentions an 'impending search.'

Email chain / internal fbi correspondence
2025-12-25

EFTA00037914.pdf

An internal email dated June 23, 2020, likely between law enforcement or legal personnel (FBI/DOJ). The sender attaches a document ('JE_EVIDENCE_CART.docx') and discusses difficulties reconciling 'CART numbers' (Computer Analysis Response Team) with '1B numbers' (physical evidence designations) regarding evidence collected from 'the island' (Little St. James).

Email
2025-12-25

EFTA00037913.pdf

An internal FBI email thread from June 2020 discussing the cataloging of digital evidence related to Jeffrey Epstein ('JE'). The correspondence involves the Computer Analysis Response Team (CART) trying to reconcile 'CART numbers' with '1B numbers' (evidence forms), with specific mention of missing numbers for evidence retrieved from 'the island' (likely Little St. James) and technical details regarding items containing multiple hard drives.

Email correspondence / fbi internal communication
2025-12-25

EFTA00037551.pdf

This document is a digital evidence status report dated August 3, 2020, likely from the FBI or a forensic contractor. It details the processing status of numerous electronic devices seized from Jeffrey Epstein's properties in New York, Florida, and the 'Island' (Little St. James), including computers, hard drives, and phones. Notable items include a hard drive labeled 'Woody Allen Archive,' a laptop explicitly linked to 'JE' (Jeffrey Epstein), and a surveillance server (UNIFI) requiring RAID reconstruction.

Email / evidence status report
2025-12-25

EFTA00037401.pdf

This document is an FBI email chain from August 2019 coordinating the logistics for a massive search warrant execution on Jeffrey Epstein's private island, Little St. James, in the Virgin Islands. It details the travel plans for approximately 40 FBI personnel, including the use of an FBI Q400 aircraft, coordination with the Coast Guard and CBP, and the timeline for the raid scheduled for Monday, August 12. The emails also mention that one British co-conspirator (implied to be Ghislaine Maxwell) remains unserved and 'out of pocket'.

Fbi email chain
2025-12-25

EFTA00037385.pdf

This document is an internal FBI email chain from August 9, 2019, detailing the status of electronic evidence seized in the Jeffrey Epstein investigation. The FBI NY CART (Computer Analysis Response Team) Coordinator provides a rough inventory of devices, noting that 3 iPads and 1 iPhone were sent for unlocking, 1 iMac was locked, and an external hard drive was encrypted. The coordinator explicitly states that no content has been reviewed yet pending a 'taint review' and mentions an 'impending search'.

Email chain / fbi internal correspondence
2025-12-25

EFTA00037262.pdf

This document is an internal FBI email thread from August 15, 2019, discussing updates following the death of Jeffrey Epstein. An SSA from the Crimes Against Children/Human Trafficking squad (C-20) informs a colleague of a strategy meeting scheduled at SDNY for August 16, 2019. The email also confirms that evidence seized from Little St. James is being processed, with digital evidence being routed to CART for forensic analysis.

Internal fbi email thread
2025-12-25

EFTA00037224.pdf

This document contains a series of internal FBI emails from August 2019 regarding the Jeffrey Epstein investigation following his death. The emails discuss logistical updates, such as serving subpoenas at a Bronx hotel and analyzing a cell phone via CART, as well as high-level strategy for reporting to DOJ and FBI Headquarters. Specifically, the correspondence outlines how to manage media rumors concerning Ghislaine Maxwell and prepare for upcoming court hearings with victims.

Fbi internal email chain
2025-12-25

EFTA00035751.pdf

An FBI FD-1036 Import Form dated December 11, 2019, documenting the upload of a Digital Evidence Laboratory (DEL) Process Report. The report relates to CART technical assistance request #223558 under Case ID 90A-NY-3151227, classified as a death investigation where Jeffrey Epstein is listed as the victim.

Fbi import form (fd-1036) - digital evidence laboratory report
2025-12-25

EFTA00035749.pdf

An FBI FD-1036 Import Form dated November 21, 2019, documenting a CART (Computer Analysis Response Team) Process Report for submission ID 218509. The document is associated with Case ID 90A-NY-3151227, which is labeled as a death investigation listing Jeffrey Epstein as the victim.

Fbi import form (fd-1036)
2025-12-25

EFTA00035728.pdf

This is an FBI FD-1036 Import Form dated September 10, 2019, related to the death investigation of Jeffrey Epstein. The document records the upload of a Digital Evidence Laboratory (DEL) report concerning the cloning and imaging of evidence items 1B1 through 1B18.

Fbi import form (fd-1036)
2025-12-25

EFTA00033567.pdf

This FBI FD-302 report documents the receipt and initial examination of a Gold/Black Apple iPhone (Model A1920, Evidence Item 1B44) by the Computer Analysis Response Team (CART) in New York on August 26, 2019. The examining agent performed a device extraction based on a signed consent form and submitted a request to the Electronic Device Analysis Unit (EDAU) for a Full File System extraction.

Fbi fd-302 report
2025-12-25

EFTA00032205.pdf

This document is an email chain from August 2020 between the SDNY, FBI, and NYPD regarding the discovery process for the Ghislaine Maxwell case. The correspondence details requests for specific evidence, including 'trash pulls', message pad scans, FBI Sentinel files, CART reports, and search warrant returns from New York, the Virgin Islands, and New Hampshire. The FBI notes they are actively working to segregate and log nude/semi-nude images from the seized digital evidence before production.

Email chain / legal discovery correspondence
2025-12-25

EFTA00032141.pdf

This document is a chain of emails between the FBI (NY Field Office/CART) and the US Attorney's Office (SDNY) regarding the chaotic processing of digital evidence seized from Jeffrey Epstein. The US Attorney's office complains that over 1.3 million documents were provided in a disorganized manner, with emails unlinked from attachments (specifically citing flight records as an example of unlinked data), making review impossible. The FBI cites technical issues, including a network replacement where they were mandated to delete 400TB of old data, and clarifies that some evidence originated from a July 2007 search.

Email chain/correspondence
2025-12-25

EFTA00031947.pdf

This document is an email chain from October 9, 2020, between officials at the US Attorney's Office for the Southern District of New York (SDNY). The emails discuss the FBI's review of images from 'Epstein devices' and a 'CART issue' (likely Computer Analysis Response Team). The team coordinates a conference call to discuss an update received regarding the progress of this evidence review.

Email chain
2025-12-25

EFTA00031217.pdf

This document is a chain of emails from July and August 2020 between legal teams (likely prosecution and defense) regarding the status of evidence in the Ghislaine Maxwell case. It details the transfer of digital forensic materials, including thumb drives containing specific device extractions identified by 'NYC' numbers. Significant technical issues are discussed, including 71,000 'zero byte' (empty) files and two servers with physically failed drives requiring specialist recovery at HQ.

Email chain / legal correspondence
2025-12-25

EFTA00030896.pdf

This document is an email chain from July and August 2020 between legal or investigative teams regarding the status of digital evidence related to the Jeffrey Epstein and Ghislaine Maxwell cases. The correspondence details the transfer of specific hard drives and thumb drives (identified by NYC numbers), addresses missing files (specifically NYC027913), and discusses technical issues including 71,000 zero-byte files and physically broken server drives requiring specialist recovery. The emails coordinate the delivery of these materials to a contractor (PAE) for upload to the Relativity e-discovery platform.

Email chain / legal evidence correspondence
2025-12-25

EFTA00028646.pdf

This document is a chain of emails between Ghislaine Maxwell's defense team (Cohen & Gresser; Haddon, Morgan & Foreman) and the US Attorney's Office (SDNY) regarding discovery production disputes in Spring 2021. Key issues include technical difficulties Maxwell faced in reviewing digital evidence at the MDC prison (specifically reading disks vs. hard drives), missing attachments for over 109,000 emails, and metadata discrepancies for 'carved' or deleted files recovered from Jeffrey Epstein's devices. The correspondence details the logistical back-and-forth regarding file formats, USAfx transfers, and the potential need for judicial intervention (Judge Nathan) to force the MDC to accept specific hard drives.

Email correspondence / legal discovery dispute
2025-12-25

EFTA00028571.pdf

This document is a chain of email correspondence between Ghislaine Maxwell's defense team (Everdell, Menninger) and the US Attorney's Office (SDNY) regarding discovery disputes in Spring 2021. Key issues include the defense's inability to view certain files on prison computers, missing email attachments (over 109,000), and technical disputes over metadata for 'carved' or deleted files recovered from Jeffrey Epstein's electronic devices. The prosecution explains that metadata for deleted files was not recovered and that certain images (nude and non-nude) were seized from CDs in Epstein's residences rather than extracted by CART from devices.

Legal correspondence (email chain)
2025-12-25

EFTA00027444.pdf

This document is a chain of emails between the US Attorney's Office (SDNY) and the FBI regarding the digital forensics processing of evidence seized from Jeffrey Epstein's properties in New York and the Virgin Islands. The correspondence highlights significant technical and logistical friction; the USANYS required data in a processed format compatible with the 'Relativity' review platform for legal discovery, while the FBI provided raw forensic dumps (phone extractions, hard drive clones) which were difficult to review. The text mentions terabytes of data, including 50+ devices, servers, and older evidence from a 2007 search, but contains no actual flight logs or passenger manifests (flight records are only mentioned hypothetically as an example of file-linking errors).

Email correspondence / legal discovery chain
2025-12-25

EFTA00025341.pdf

An email chain from September 30, 2019, between the FBI and an Assistant U.S. Attorney regarding evidence seized from Jeffrey Epstein's New York house. The AUSA expresses concern that the 'taint team' received 'way fewer documents than we would have expected' and requests an accounting of approximately 38 computers/storage devices and 55 CDs sent to the FBI's CART (Computer Analysis Response Team). An FBI Senior Forensic Examiner responds by requesting a phone call to discuss the matter.

Email chain
2025-12-25

EFTA00024566.pdf

This document contains a chain of emails between the FBI's NY Computer Analysis Response Team (CART) and the US Attorney's Office (SDNY) regarding the processing of digital evidence seized from Jeffrey Epstein's properties in New York and the Virgin Islands. The correspondence, spanning February to July 2020, details technical challenges including incompatible file formats, encryption (specifically APFS on Mac devices), and delays caused by FBI network upgrades and COVID-19 staffing reductions. The prosecutors express frustration with the pace and format of data production, eventually proposing to hire an outside vendor (BRG) to complete the work.

Email correspondence chain
2025-12-25

EFTA00023977.pdf

This document is an FBI Collected Item Log dated August 14, 2019, detailing the seizure of digital evidence related to the death investigation of Jeffrey Epstein. The evidence consists of a 500GB Seagate hard drive from the MCC-NY "Nice Vision DVR2" surveillance system, collected on August 10, 2019, the day of Epstein's death. The log identifies Epstein as a victim in a death investigation and notes the evidence is item 4 of 18 collected from the system.

Fbi collected item log (fd-1087)
2025-12-25
Total Received
$0.00
0 transactions
Total Paid
$0.00
0 transactions
Net Flow
$0.00
0 total transactions
No financial transactions found for this entity. Entity linking may need to be improved.
As Sender
0
As Recipient
0
Total
0
No communications found for this entity. Entity linking may need to be improved.

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein entity