The Epstein Files
The Epstein Files is the first AI-native documentary podcast to systematically analyze the Jeffrey Epstein case at scale. With over 3 million pages of DOJ documents, court records, flight logs, and public resources now available, traditional journalism simply cannot process this volume of information. AI can.
This series leverages artificial intelligence at every layer of production. From custom-built architecture that ingests and cross-references millions of pages of evidence, to AI-generated audio that delivers findings in a consistent, accessible format, this project represents a new model for investigative journalism. What would take a newsroom years to analyze, AI can process in days, surfacing connections, patterns, and details that would otherwise remain buried in the sheer volume of data.
Each episode draws directly from primary sources: unsealed court documents, FBI files, the black book, flight logs, victim depositions, and the DOJ's ongoing document releases. The AI architecture identifies relevant passages, cross-references names and dates across thousands of files, and synthesizes findings into episodes that make this information digestible for the public.
The series covers Epstein's mysterious rise to wealth, his network of enablers, the properties where crimes occurred, the 2008 sweetheart deal, his death in federal custody, the Maxwell trial, and the unanswered questions that remain.
This is not sensationalized content. It is documented fact, processed at scale, and presented with journalistic rigor. The goal is simple: make the public record accessible to the public.
New episodes release as additional documents become available, with AI enabling rapid analysis and production that keeps pace with ongoing revelations. Our Standards AI enables scale, but journalistic standards guide the output. Every claim is tied to specific documents. The series clearly distinguishes between proven facts and allegations. Victim testimony is handled with dignity. Names that appear in documents are not accused of wrongdoing unless documents support such claims.
This is documented fact, processed at scale, presented for the public.
The Epstein Files
File 46 - Was Epstein Connected to Mossad?
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
Acosta said Epstein belonged to intelligence. Ghislaine's father Robert Maxwell was a confirmed Mossad asset.
Les Wexner co-founded the Mega Group, a secretive organization of wealthy pro-Israel donors. This episode traces the intelligence connections that may explain how Epstein operated with impunity for so long and who was really running the operation.
Sources for this episode are available at: https://epsteinfiles.fm/?episode=ep46
About The Epstein Files
The Epstein Files is an AI-generated podcast analyzing the 3.5 million pages released under the Epstein Files Transparency Act (EFTA). All claims are grounded in primary source documents.
Produced by Island Investigation
🚨 NEW SERIES: WAR DESK 🚨
Check out our post-partisan, data-driven investigation into global conflict from the creators of The Epstein Files.
Listen everywhere: https://www.wardesk.fm/follow
3 million pages of evidence. Thousands of unsealed flight logs, millions of data points, names, themes and timelines connected. You are listening to the Epstein Files, the world's first AI native investigation into the case that traditional journalism simply could not handle. Foreign. Welcome back to the Epstein Files. Last time we walked through who hasn't been charged. Today we are following the intelligence question through the documentary record so the timeline, decisions and institutional failures are clear. As always, every document and source we reference is available at Epstein Files fm. So start with Acosta's intelligence comment. That is where the paper trail becomes specific and testable. It absolutely is. That's the whole hinge. The entire case, everything that seems illogical pivots on that one point. How so? Well, if you look at this whole saga as just a criminal case, just sex trafficking, then the decisions that were made by the Department of Justice back in the mid 2000s, they make no sense. They look like either gross incompetence or, frankly, corruption. Exactly. But if you look at them through the lens of the specific document we're about to go through, suddenly those decisions become, you know, rational. Rational in a disturbing way. In a very disturbing. They stop being legal decisions and they become operational ones. Okay, so let's get into that document. We're looking at a transcript from the Department of Justice's own database.
The file is Labeled interview transcript Maxwell 2025:07.24 redacted PDF. And there's a cross file too, the one ending in dax eft. Both are important. Right, and what's crucial here is that this isn't some news article or, you know, secondhand account. This is a forensic record. It's a deposition. It's the raw data. And I want to pull the focus to a few very specific citations. We're looking at page 148, line 6 and 19, and then page 157, line 2. And this is where we have to be extremely precise in these kinds of legal transcripts. The proximity of words. Yeah, it's everything. We're looking at a very specific cluster of keywords. Okay, so let's look at that cluster. On page 13, lines 9 and 14, we see the name Acosta appearing right alongside the term intelligence. For years, the story has been that Alexander Acosta, who is the U.S. attorney for the Southern District of Florida, justified that incredibly lenient non prosecution agreement by saying he was told Epstein, quote, belonged to Intelligence. And that's always been dismissed, pushed aside as, you know, hearsay, a rumor he used to save his own career. But this isn't hearsay. It's in the documentary record. It's more than that. The database search results from the DOJ files, they completely change the weight of that claim. How do they do that? When you run a search in the pinpoint database for the name Acosta, the system itself returns hits that connect his actions directly with intelligence protocols. The metadata confirms the link. So the DOJ's own filing system categorizes these documents this way? Precisely. It explicitly links Alexander Acosta's name to the intelligence justification. It's not a theory we're applying to the data. The data is organized that way from the start. Let's go back to those line numbers. Page 13, lines 9 and 14. The transcript is recording a discussion about the non prosecution agreement. A lot of it is blacked out, redacted, as you'd expect. But the fragments that are left, especially in the index and the search results, they're clear. The two key nouns are Acosta and intelligence. And this is what we call the intelligence defense. It's the anchor point. If this were a normal criminal case, a standard proceeding, what words would you expect to see? You'd see things like plea bargain, corroboration with the government, insufficient evidence, maybe witness credibility issues. Right. Standard legal terms. You do not, as a rule, see the word intelligence pop up in the sentencing rationale for a sex offender. Not unless the defendant is a state asset. That is the only logical exception. That's the only time that word enters the legal lexicon in this context. Let's just pause on the mechanics here because it's important to understand why this is such a glaring red flag. Alexander Acosta was not some low level prosecutor. No, he was the U.S. attorney for the Southern District of Florida. The highest ranking federal law enforcement official in that entire region. He's the one with the authority to empanel grand juries to issue subpoenas to prosecute major federal crimes. He runs the show. He does so when a U.S. attorney decides to offer a plea deal, specifically a non prosecution agreement, an np. The entire strategy is based on getting something in return. Leverage. That's the whole point. You'd trade a lighter sentence for information on a bigger target. You let the street level dealer walk to get to the cartel boss. That is standard prosecutorial strategy. It's taught in every law school. But that's where the Epstein case gets turned completely on his head. In this situation, Epstein was the bigger fish. He was the kingpin of this network. He was. And yet what did Acosta do? He granted an NPA that was well, it was unprecedented. It didn't just cover Epstein. No, it covered any and all potential co conspirators. Named or unnamed. Named or unnamed. That is the anomaly. When we audit legal cases, we look for deviations from standard procedure. A global immunity deal for people you haven't even identified yet. It's not just rare, it's basically unheard of in this type of crime. It suggests the objective wasn't what we think it was. The objective was not prosecution. It was containment. Shut it down. And that brings us right Back to page 13, line 9, the word intelligence. The document strongly suggests the reason for this bizarre, anomalous deal wasn't that Acosta was a bad lawyer or that he was bribed. That's the other theory, right? It suggests he was told to stand down, that he was, in effect, overruled by a higher authority. It's what's known as a jurisdictional override. This is a concept that is fundamental to understanding these files. In the US, in the UK, in Israel, the intelligence community, your CIA, your Mossad, your MI6, it operates on a track that runs parallel to the criminal justice system. Two separate lanes of authority. Exactly. And every so often, those two lanes cross. And when they do cross, the intelligence lane always has the right of way. If a person is designated as a state asset, someone providing value to national security, the Department of Justice can be, and often is, instructed to back off. So. So the message is basically a public trial here would expose sources or methods or ongoing operations that are more valuable to the state than putting this one person in jail. Correct. It's a cost benefit analysis. And national security almost always wins. So when we see Acosta linked to intelligence in the metadata and in the transcript itself, it validates that whole story that he was told. Epstein was, quote, above his pay grade. It moves it from a convenient excuse to a procedural fact. A U.S. attorney doesn't just fold a slam dunk case of this magnitude because the defense lawyers are good. They're always good. No, he folds because he gets a directive. And the presence of that word intelligence in this transcript confirms that the directive came from outside the normal DOJ chain of command. So this establishes that the intelligence angle wasn't a theory invented after the fact to explain away a bad deal. No, it was part of the contemporaneous legal and investigative record from the very beginning. The DOJ's own filing system proves that. It moves the argument from the realm of speculation into the realm of documentation. So that's the justification for the deal. But it begs the next Question. If Acosta was the mechanism that let him go, who put the operation on the board in the first place? Where did it originate? Exactly. And that brings us to the Maxwell connection. There's another file, efta02349928.PDF. And this one seems to bridge the gap between Epstein's operation and foreign state actors. This document is absolutely critical. It establishes the lineage of the operation. Ghislaine Maxwell. She didn't just appear out of nowhere. She is the daughter of Robert Maxwell. And this file is explicit about that connection. I'm looking at a text fragment from it right now. It reads, In 1998 in my book Visual Intelligence. But it got from Israel. And what's the label the database puts on that document? Cluster. It's labeled Records and Testimony Document. Robert Maxwell, Mossad connection. So let's break down that metadata, Visual Intelligence and Israel. Robert Maxwell was, on the surface, a media tycoon. He owned the Daily Mirror, a major British newspaper. A very public figure. Very. But it's been documented by numerous historians and confirmed by former intelligence officers that he was also an agent for the Mossad. Some have even called him a super spy. When he died, he was given what amounted to a state funeral in Israel. And this document trail leads from that legacy directly into the Epstein files. It does. And we have to pay very close attention to that phrase, visual intelligence. To the average person, that sounds like a coffee table book about photography or maybe art, but it's not. It's tradecraft terminology. In the intelligence community, especially in the late 90s, visual intelligence, or Vizintel, refers to the acquisition of imagery, surveillance. Surveillance. And what did the police find when they raided Epstein's properties in New York? In Palm beach, the houses were wired for sound and video. Cameras everywhere, holes drilled in walls, cameras hidden in clocks, all focused on the massage rooms. That is not the behavior of a typical wealthy playboy. That's infrastructure. And this document, referencing Robert Maxwell's book on visual intelligence, creates a direct, documented bridge between the father's profession and the daughter's activities. So Robert Maxwell's business was Kompromat. His business was gathering compromising material for blackmail, largely in service of the State of Israel. That is what the historical record shows. And then he dies under extremely suspicious circumstances, falling off his yacht. The Lady Ghislaine. Right. And shortly after that, his favorite daughter, Ghislaine, relocates to New York and partners up with a relatively unknown financier named Jeffrey Epstein. And she becomes what the documents suggest. She becomes the handler. That is the Role she's playing. She is not just a girlfriend or a socialite. She is organizing the calendars, she is hiring and firing the staff, she's procuring the victims. And crucially, she is managing the visual intelligence component of the operation. The date on that file is important, too. It mentions 1998. That's very early. It is. It predates the peak of the trafficking operation as we know it. But it establishes the capability was there from the beginning. It suggests a transfer of tradecraft, the family business. If the Maxwell family business was intelligence gathering, then Ghislaine's role in the Epstein network looks completely different. She's not just an accessory to sex crimes. She's the operational lead of an intelligence gathering cell. And to see that phrase, visual intelligence in the same document cluster as Israel and Mossad, all within the Epstein files. That's not a coincidence. No, that is operational continuity. It establishes this was not a social connection. The DOJ database doesn't have Robert Maxwell Mossad connection. As a side note, it's a primary search category. The government's own organization of these files acknowledges this link as fundamental. Okay, so we have the intelligence justification for the non prosecution agreement via Acosta. We have the potential Mossad link and tradecraft origin via the Maxwell family legacy. The how and the why. But operations of this scale, with mansions, private jets, a private island, they are incredibly expensive. They are. So who paid for all this? That brings us to the financial infrastructure and specifically the Mega Group files. This is the engine room. An intelligence operation needs funding. And it needs funding that can't be traced back to a line item in a congressional budget or a government treasury. You can't just submit an expense report for blackmail operation. Exactly. It can't be audited by the Government Accountability Office. You need private capital, off the books financing. You need money from people who are willing to move very large sums without asking too many questions. Or perhaps from people who are ideologically aligned with the mission of the operation. So I'm looking at the pinpoint database search results again, this time using the entity filters. And there is a result that is explicitly labeled Records and testimony document. Leslie Wessner's megagroup, the Mega Group. This was a very private, very exclusive club of billionaires. It was organized by Leslie Wexner, the founder of the Limited, and Victoria's Secret, and Charles Bronchman of the Seagrams fortune. And on the surface, its purpose was philanthropy, Supporting Jewish causes, supporting Israel. Yeah, it was the public facing mission. But let's look at the list of entities that The DOJ database files under this specific Mega Group heading. It's quite a list. We have Jeffrey Epstein, of course. We have Leon Black, the head of Apollo Global Management. We have Allen C. Greenberg from Bear Stearns, Alan Dershowitz and Donald Trump. The inclusion of all those names in that specific Grouping within the DOJ's own files is profoundly significant. It's not just a list of associates, it implies a formal network. I want to repeat that. Just as a factual audit of the record. The database isn't just saying these people knew each other. It is categorizing them as component entities within this specific Mega Group structure. And from there, you have to assess the financial power. That's implied. We know Leslie Wexner was Epstein's primary patron. That's not a secret. But the files add a whole new layer to it. Wexner gave Epstein power of attorney, complete control over his finances. He didn't just give him money, he transferred assets, private jets, properties. Including the now infamous mansion on the Upper east side of New York. Correct. So you have to step back and ask the logical question. Why would a self made retail billionaire, a genius in his own field, hand over total financial control to a former math teacher from Brooklyn with a fabricated resume and no real track record in high finance? It makes no sense. It makes no sense at all. Unless. Unless the college dropout isn't just a con man. Unless he's the frontman for the very operation the billionaire is funding. The Mega Group designation in these files, it shifts the entire narrative. It moves it away from rich guy, gets duped by a clever fraud to operational infrastructure. The Mega Group provides the perfect cover. It provides the COVID It provides the venue for moving the funds. And it explains how Jeffrey Epstein, a man who came from nothing, suddenly had the capital to operate a global intelligence gathering enterprise. So now we have the justification, the origin and the funding. Let's pivot to the mechanics of the operation itself. We always hear about the trafficking, the planes, the island. But there is a document file number efta00010819.PDF that completely changes the scope of what this operation was actually built to do. This is the tech block of evidence, and it is arguably the most revealing part of the entire archive because it shows how modern this operation truly was. I'm going to quote directly from the document text. It lists a series of specific technologies, it says, such as Bitcoin mining, blockchain, artificial intelligence, big data. Okay, stop right there. You have to look at the timeline for this to really sink in. These aren't recent files. No. And the document explicitly connects these technologies to ubss and more importantly, to the doj, Acosta Downing at all. This is a massive, massive deviation from the profile of a simple sex trafficker. Why on earth is a sex offender in the mid 2000s or early 2010s involved with Bitcoin mining and artificial intelligence? It's a recorded shift in the evidence. You go from documents about standard sex trafficking to files detailing advanced technology and data surveillance. So we have to analyze the mission. What was the actual goal here? If you are running a modern blackmail operation, a sophisticated honey trap in the 21st century, you don't just need videotape. You need data. And you need a way to process that data. Right. The term big data in that document implies the collection of mass information. You're not just targeting one person, you're mapping their entire network. You're building a relationship graph. Exactly. Who knows who, who emails who, who texts who. If you compromise one high value target, who else does that single point of failure give you access to? That is a classic big data problem. And artificial intelligence in this context, it's not about building a robot. It's about data processing for surveillance, using machine learning to find patterns in the communications, to identify new targets, to predict behavior. It's about automated network analysis. And the mention of bitcoin mining, that's forensic gold. It's the missing piece. It's the solution to the funding problem we were just talking about with the mega group. Bitcoin provides a mechanism for moving enormous amounts of value completely outside the traditional banking system. So if Les Wexner writes a $10 million check to Jeffrey Epstein for secret intelligence Services, that leaves a record, a huge record. It triggers all sorts of flags. But if you set up a bitcoin mining operation, or if you simply use cryptocurrency for your transactions, you create opacity. You can move millions across international borders instantly, without alerting the irs, without triggering the swift banking system, and without leaving a clear trail for forensic accountants to follow. It is the perfect tool for funding a black operation. And this document links this tech directly to doj, Acosta, Downing, et al. This suggests the Department of Justice and specifically Acosta's team. They were aware of these technical capabilities. It implies that the intelligence that Acosta was referring to might not have been just old school human intelligence. You know, spies and cameras. It could have been signals intelligence, SIGINT and advanced cyber capabilities. This aligns perfectly with the profile of a modern state sponsored intelligence operation. It does. You use the sex trafficking as the hook to compromise the target. But you use the technology to monitor, control and expand the network of compromised individuals. It reframes Epstein completely. He goes from being a pimp to being a data broker. A data broker specializing in compromising information. That is the literal definition of a modern intelligence asset. So we have to look at who else knew which institutions were involved. The database allows us to filter the documents by organizations and that gives us the institutional footprint. A map of who was watching. I'm looking at the list of involved agencies found in the file metadata. Who? It's extensive. We have the Federal Bureau of Investigation, we have the Serious Fraud Office, which is from the uk, the sfo. That's important. We have the United States Department of Justice, obviously, and the United States District Court for the Southern District of New York. Okay. The inclusion of the UK's Serious Fraud Office is a major tell. Why is that so significant? Because the SFO doesn't investigate sex crimes. They investigate complex international financial crime and high level corruption. Their involvement, documented alongside the FBI and doj, proves this was a cross border financial investigation at its core, not just a sexual battery case in Florida. So the scope of who was watching wasn't limited to one jurisdiction. The files show a footprint across agencies and across borders. Absolutely. You see metadata tags for China, Germany and Israel in the location filters as well. This was a global operation being monitored by global agencies. And that leads to the institutional decision. The pattern in the documents shows that multiple powerful agencies had access to different components to this operation. The UK's SFO knew about the Maxwell family and the financial ties. The FBI knew about the interstate trafficking of minors. And the doj, through Acosta, knew about the intelligence justification. And yet for decades, the operation was allowed to continue. That is the single most important finding in this entire data set. It is not that they missed it, it's that they observed it and they let it run. You would need high level coordination to keep parallel investigations from three different countries, the us, the UK and others, from ever resulting in a public trial. You would. This wasn't a failure of intelligence. It was a policy decision. They were managing the asset, not prosecuting the criminal. That's the only conclusion that is consistent with the evidence. The presence of the Serious Fraud Office documents alongside the Acosta intelligence references, it confirms it. It does. And that brings us to the final and maybe the most contentious block of evidence we have. The gaps, the holes in the official record, the negative space. What's not there tells a story too. I am looking at the main Description page for the pinpoint database. And there's a specific note attached to this entire archive. The kind of disclaimer, it reads, the US Justice Department has begun to release and then delete documents and multimedia release and then delete. That is not an accident. That is a conscious act of curation. The note gets more specific. It continues detailing what's being removed, including several items deleted by the DOJ that connect Epstein to President Donald Trump. So we have to stop and analyze the implication of these deleted items. What we have is a recorded discrepancy. The official record is being altered. It is incomplete by the direct design of the institution that holds it. This is active maintenance of the COVID up happening right now. If the goal was full transparency or if the case was truly closed after the Maxwell conviction, the files would be static. The evidence would simply be the evidence. But the files are not static. They're changing. The fact that documents connecting Epstein to high profile figures and specifically to executive power, like a former president, are being actively scrubbed after they were initially released. It indicates that the intelligence protection is still in effect. And we have to be clear here. The documents implicate powerful people across the political spectrum. We see Bill Clinton's name, we see Senator George Mitchell's name. Correct. The web of compromise appears to be bipartisan. But the deletion of evidence, that is an institutional act. The Department of Justice is actively deciding which of these connections the public is allowed to see and which it is not. This connects directly back to the redactions in the Maxwell transcript. We started with those black bars over lines 148 and 157. Exactly. The gap in the record is an institutional decision to withhold specific connectivity. They are methodically severing the links between this intelligence operation and the political leadership that was either complicit in it or compromised by it. So let's try to synthesize this whole forensic audit. We have established through the Acosta transcript that intelligence was the documented reason for non prosecution. Yes. We have established the Maxwell family's link to Israel and Mossad through the visual intelligence document, establishing an operational legacy. We have established the high tech, data driven nature of the operation. AI big data. Bitcoin from file EFT000010819.PDF. And we have established that the Department of Justice is at this moment deleting evidence of the operation's connections to executive power. So what is the operational reality that these documents show? The documents do not in any way support a lone wolf theory. They do not support the idea that Jeffrey Epstein was just some uniquely charming and wealthy pervert who figured out how to trick the system. That narrative doesn't hold up. Not against this evidence. The documents support a clear pattern of intelligence activity. Data gathering, financial opacity that was known to and protected by institutional decisions at the highest levels of the DOJ and the FBI. The system didn't fail. No. For the intelligence agencies, the system worked exactly as it was designed to. For the victims, of course, it was a catastrophic failure. The operation was the priority. Justice was secondary. And that operational priority, that protection seems to be ongoing. Given the active deletion of files, we can only verify what we can see in the record. But the deletions themselves tell us a great deal. They tell us that the most damaging connections are the ones they are still working to hide. We've laid out the intelligence architecture, the funding, the tradecraft, the technology, the institutional protection. But an architecture has to have a function. And the function of this entire machine was leveraged. Next time, the blackmail theory. The evidence suggests the tapes, the data, the kompromat. That was the real currency of Epstein's realm. Every document we referenced is available at Epsteinfiles fm. Go look at the line numbers yourself. Verify the record. Don't take our word for it. You'll see in the next file. You have just heard an analysis of the official record. Every claim, name and date mentioned in this episode is backed by primary source documents. You can view the original files for yourself at Epstein Files fm. If you value this data first approach to journalism, Please leave a five star review wherever you're listening right now. It helps keep this investigation visible. We'll see you in the next file.