| Connected Entity | Relationship Type |
Strength
(mentions)
|
Documents | Actions |
|---|---|---|---|---|
|
person
CAROLYN
|
Origin |
1
|
1 | |
|
person
Maria
|
Resident |
1
|
1 |
A photograph of an evidence bag containing a Hitachi 1TB hard drive. The label identifies this item (1B23) as a 'PC Derivative Copy' or forensic clone of another hard drive (item 1B2, a Hitachi 500GB drive) related to case 90A-NY-3151227. The cloning process took place on August 12, 2019, using a Tableau TX-1 forensic imager.
This image shows a brown evidence folder resting on a speckled surface. The folder is labeled with handwritten black marker text '90A-NY-3151227 1B23', which corresponds to an FBI case file format (likely the New York field office). A white document is partially visible inside the folder. The image is stamped with the identifier 'EFTA00008433'.
A photograph of physical evidence consisting of a Seagate 1000GB Desktop Hard Drive inside an anti-static bag. The drive bears an official label from the 'New York CART Lab' (FBI Computer Analysis Response Team) with the identifier 'N: 6327:08' and references a 'DVR 2 DISK ARRAY'. A handwritten label identifies this specific drive as 'Clone #9', suggesting it is a forensic copy of data from a digital video recorder system. The document bears the Bates number EFTA00008432.
This image shows the cover of a brown evidence folder or file wrapper. It features handwritten case identification codes: '90A-NY-315/227' and '1B29'. The '90A' prefix typically corresponds to FBI classification codes for specific types of crimes (often related to child exploitation in this context), 'NY' denotes the New York Field Office, and '1B29' likely refers to a specific evidence exhibit or sub-file number. The document footer contains the Bates stamp 'EFTA00008431'.
This is a photograph of a physical piece of evidence: a 1000GB Seagate Barracuda hard drive sealed in a pink anti-static evidence bag. The drive is marked with a handwritten label 'Clone # 11' and a printed label 'DVR 2 DISK ARRAY', suggesting it contains cloned data from a digital video recorder (surveillance system). It bears a 'New York CART Lab' asset tag with the ID 'NYC027740'.
This is a photograph of physical evidence, specifically a Seagate hard drive (labeled as a 4TB 2 Disk Array) contained within a sealed anti-static bag. The drive bears a forensic label from the 'New York CART Lab' (Computer Analysis Response Team) and is handwritten with the identifier 'Clone #4'. The evidence is placed on top of a brown Smead file folder and has the Bates stamp EFTA00008428.
The image shows a brown accordion-style evidence folder or file jacket lying on a speckled floor. The folder is labeled in black handwritten marker with the case identifier '90A-NY-3151227 1B25', likely corresponding to an FBI case file from the New York field office. An evidentiary tracking number 'EFTA00008427' is visible in the bottom right corner.
This document is an image of a brown expandable evidence folder or file jacket. It bears the handwritten case file identifier '90A-NY-3151227 1B39'. The code '90A' typically corresponds to the FBI classification for child pornography/exploitation matters, and 'NY' indicates the New York field office. The suffix '1B39' likely designates a specific item of evidence (1B file) within that case.
A photograph of a piece of physical evidence: a Seagate Barracuda 1000GB hard drive encased in plastic packaging. The green label identifies it as evidence item 1B36 in case 90A-NY-3151227. It is described as a 'PC Derivative Copy' (forensic clone) created on 08/12/2019, containing the clone of another hard drive (item 1B18, a 500GB Seagate). The evidence tape is signed with initials 'TC' and dated 8/16/19.
The image shows the cover of a brown evidence file folder. Handwritten in black marker is the case file number '90A-NY-3151227' and the evidence item identifier '1B36'. The document bears the Bates stamp 'EFTA00008422' in the bottom right corner.
This document is a photograph of physical evidence, specifically a sealed Seagate 1TB hard drive (Item 1B35). The label indicates it is a forensic clone created on August 12, 2019, containing a copy of another hard drive (Item 1B17, a 500GB Seagate Constellation). The evidence was processed in connection with case 90A-NY-3151227.
This image shows the cover of a brown expandable evidence folder. It contains handwritten identification codes '90A-NY-3151227' (likely an FBI case file number associated with the New York field office) and '1B35' (likely an evidence item number). The document control number EFTA00008420 is visible in the bottom right corner.
This document is a photograph of a physical evidence bag containing a hard drive, labeled as Item 1B32. The label indicates that on August 12, 2019, a forensic clone ('derivative copy') was made from a 500GB Seagate hard drive (Item 1B12) onto a 1000GB Seagate hard drive (Item 1B32) using a Tableau TX-1 imager. The evidence is associated with case number 90A-NY-3151227.
This image shows the exterior of a brown evidence folder or file jacket. It is handwritten with the case identifier '90A-NY-3151227 1B32'. The '90A' prefix typically denotes an FBI classification for child exploitation matters, and 'NY' indicates the New York field office. '1B32' likely refers to a specific evidence item number (1B file) within that case.
The image displays the cover of a brown file folder or evidence envelope. It features handwritten case file identifiers '90A-NY-3151 227 IB40', which follows the format of FBI case classifications (likely indicating a New York field office file, with '1B40' suggesting an evidence or exhibit sub-file). The document bears the Bates stamp 'EFTA00008414' in the bottom right corner.
This document is a photograph of physical evidence stored in a plastic bag. It contains a small electronic device, appearing to be a portable radio branded 'Diamond' with white headphones/earbuds. Included is a handwritten note with the case identifier '90 A - NY - 315122 1B41', which corresponds to FBI file numbering conventions.
This document is a photograph of a piece of physical evidence: a hard drive sealed in an anti-static evidence bag attached to a file folder. The label indicates it is Item 1B34, a 1000 GB Seagate Barracuda hard drive created on August 12, 2019, as a forensic 'PC Derivative Copy' (clone) of another hard drive (Item 1B16, a 500GB Seagate Constellation) connected to FBI case 90A-NY-3151227.
The image displays the cover of a brown evidence folder or file jacket. It features handwritten case identification codes '90A-NY-3151227 1B34', consistent with FBI case file nomenclature (New York Field Office, 1B evidence designation). The document bears an archival stamp 'EFTA00008411' in the bottom right corner.
This document collection from September 19-20, 2005, includes correspondence regarding real estate in Cambridge, MA, and NYC, as well as a significant fax from JPMorgan Chase advising Epstein that a 'deal is not going to work' and to move his money. It also contains various handwritten notes on Epstein and Maxwell stationery referencing flight logistics ('Jet A', 'Lauderdale'), a 'Clinton Guest List', 'gun holsters', and scheduling for 'Sandy Berger'. The documents establish Epstein's presence in Palm Beach at the time while managing affairs in Boston and New York.
This document contains a response from T-Mobile USA to an FBI subpoena dated March 23, 2007, providing subscriber information and call detail records for Jeffrey E. Epstein. The records cover a period from February 2005 to February 2006 and show extensive usage including calls to/from New York, Florida, Ohio, the U.S. Virgin Islands (Charlotte Amalie), and the British Virgin Islands, as well as international communications to Lithuania and Poland. A second subpoena response for a different, redacted account in Brooklyn, NY indicates 'No CALLS' were found for that number.
This document contains 119 pages of fully redacted material labeled 'Grand Jury-NY'. No text, images, or data are visible on any page other than the Bates stamp numbers ranging from EFTA00005586 to EFTA00005704. Consequently, no information regarding people, flights, or events can be extracted.
This document contains a binder cover with various labels indicating topics and events, followed by a cover sheet stating that CSAM content is not scanned, and then two pages of scanned images, likely thumbnails from trips to NY, LA, and London, with some images redacted.
A handwritten thank-you letter from an unnamed woman (name redacted) to Jeffrey (Epstein), thanking him for a necklace, travel to the Virgin Islands, West Palm Beach, Las Vegas, and New Mexico, and for flying her sister to New York. The sender mentions staying in Jeffrey's Manhattan apartment to draw and find quiet, performing with a circus in LA over New Years, and thanks him for helping her friend Alexandra. The letter highlights Jeffrey's financial support and influence on the sender's life direction.
A handwritten thank-you letter to Jeffrey Epstein from an individual whose name is redacted (starts with 'S'). The author thanks Epstein for a necklace, for allowing her to stay in his Manhattan apartment to focus on drawing, for helping her friend Alexandra, and for facilitating travel for her and her sister to locations including the Virgin Islands, West Palm Beach, Las Vegas, and New Mexico. The letter reflects on family difficulties over Christmas and expresses gratitude for Epstein's influence on the author's life.
A handwritten thank-you letter to Jeffrey Epstein from an unidentified young woman (signature redacted). She expresses gratitude for a year of 'adventures' including trips to Little St. James (Virgin Islands), Las Vegas, and New Mexico, and for being allowed to stay in his Manhattan apartment to draw and have space. She also thanks him for flying her sister to New York and for helping her friend Aleksandra.
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein entity