The Epstein Files
The Epstein Files is the first AI-native documentary podcast to systematically analyze the Jeffrey Epstein case at scale. With over 3 million pages of DOJ documents, court records, flight logs, and public resources now available, traditional journalism simply cannot process this volume of information. AI can.
This series leverages artificial intelligence at every layer of production. From custom-built architecture that ingests and cross-references millions of pages of evidence, to AI-generated audio that delivers findings in a consistent, accessible format, this project represents a new model for investigative journalism. What would take a newsroom years to analyze, AI can process in days, surfacing connections, patterns, and details that would otherwise remain buried in the sheer volume of data.
Each episode draws directly from primary sources: unsealed court documents, FBI files, the black book, flight logs, victim depositions, and the DOJ's ongoing document releases. The AI architecture identifies relevant passages, cross-references names and dates across thousands of files, and synthesizes findings into episodes that make this information digestible for the public.
The series covers Epstein's mysterious rise to wealth, his network of enablers, the properties where crimes occurred, the 2008 sweetheart deal, his death in federal custody, the Maxwell trial, and the unanswered questions that remain.
This is not sensationalized content. It is documented fact, processed at scale, and presented with journalistic rigor. The goal is simple: make the public record accessible to the public.
New episodes release as additional documents become available, with AI enabling rapid analysis and production that keeps pace with ongoing revelations. Our Standards AI enables scale, but journalistic standards guide the output. Every claim is tied to specific documents. The series clearly distinguishes between proven facts and allegations. Victim testimony is handled with dignity. Names that appear in documents are not accused of wrongdoing unless documents support such claims.
This is documented fact, processed at scale, presented for the public.
Produced by the Neural Broadcast Network.
The Epstein Files
File 162 - Todd Blanche: Trump's Lawyer Now Decides Which Epstein Files You See
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
Todd Blanche represented Trump in Manhattan criminal trial. Appointed Deputy AG.
March 18 2026 blocked DEA compliance with Wyden's Senate request. Told public to \.
Sources for this episode are available at: https://nbn.fm/epstein-files/episode/ep162
About The Epstein Files
The Epstein Files is an AI-generated podcast analyzing the 3.5 million pages released under the Epstein Files Transparency Act (EFTA). All claims are grounded in primary source documents, published on the Neural Broadcast Network website for verification.
Produced by Island Investigation
Subscribe to NBN's Newsletter
Get new investigations, new shows, and the raw intelligence you won't find anywhere else straight to your inbox.
Sign up at nbn.fm/newsletter.
Imagine walking into like a city property office, handing over the deed to a$70 million New York mansion and just uh signing your own name as both the seller and the buyer.
SPEAKER_00Aaron Powell Right. Which sounds completely absurd.
SPEAKER_01Yeah. Most of us assume that if we try to stunt like that, alarms would immediately go off. Someone behind the counter would flag it for fraud. But in 2012, Jeffrey Epstein did exactly that with the infamous 9E 71st Street mansion, and the paperwork just it went right through.
SPEAKER_00Aaron Powell It's honestly a stunning display of how the architecture of extreme wealth actually functions. Yeah. I mean, you expect this system of rigid checks and balances, right?
SPEAKER_01Right, exactly.
SPEAKER_00But what you actually find is a system built largely on administrative routine. It's just waiting to be exploited by someone who knows how to paper over the cracks.
SPEAKER_01Aaron Powell And papering over the cracks is exactly what we are looking at today. Welcome to this deep dive. Today we are inviting you to join us as we basically step inside the engine room of a massive investigation.
SPEAKER_00Aaron Powell Yeah, and we have a sprawling, completely fragmented data dump from the Internet Archive sitting right in front of us.
SPEAKER_01We are talking about raw Department of Justice files, underacted petty cash logs, internal FBI email chains, and you know, highly technical court memos. Our mission isn't just to rehash the crimes you've already seen in the headlines.
SPEAKER_00Aaron Powell No, our mission is to look at the mechanics. How does an illicit enterprise of this magnitude actually hide itself?
SPEAKER_01Aaron Powell Right. And what does the bureaucratic friction look like when federal investigators try to dismantle it?
SPEAKER_00Aaron Powell But uh before we dive into the mechanics, we really need to establish the nature of the materials we are analyzing. This archive is filled with raw, unfiltered intelligence.
SPEAKER_01Aaron Powell Which means we need to set a ground rule for you, listening right now. Raw intelligence is essentially an unfiltered dumped ground for human paranoia, verified facts, and well, everything in between.
SPEAKER_00It really is.
SPEAKER_01We are going to be discussing some highly explosive politically charged allegations involving very prominent public figures. Our role today is not to act as a judge or a jury. We are not validating these claims or taking sides.
SPEAKER_00Exactly. We are simply examining the anatomy of the information, how these reports are captured, processed, and fought over in the justice system.
SPEAKER_01And if you want to understand how a sprawling criminal enterprise operates, you have to start with the physical footprint.
SPEAKER_00A legal shell game.
SPEAKER_01Right. Which brings us right back to that New York mansion transfer I mentioned at the top. I was looking through the 2019 internal email chains. This is EFTA dataset 9, page 238, between FBI agents and the assistant United States attorneys.
SPEAKER_00Oh, those emails are fascinating. You could read the sheer confusion in their messages.
SPEAKER_01Yeah, they are actively trying to untangle a knot that was tied decades earlier. According to the timeline in those emails, Leslie Wexner reportedly bought the home in 1989 through a company called 9 East 71st Street Corporation.
SPEAKER_00But Jeffrey Epstein was sitting as the president of that corporation.
SPEAKER_01Exactly. Fast forward to 2011 and 2012, and we see a transfer in the New York property database to a completely new entity called Maple Inc., and this one is based in St. Thomas in the Virgin Islands. And there, right on the signature line, Epstein signs as the grantor, the person giving the property, and the grantee, the person receiving it. Okay, let's unpack this. How does a notary or a city clerk even accept a document like that without raising massive red flags?
SPEAKER_00Aaron Powell Well, because the clerk's office isn't an investigative body. Their job is just to ensure the formatting is correct, you know, the fees are paid, and the signatures are notarized.
SPEAKER_01Wow. So they just stamp it.
SPEAKER_00Yeah. They aren't auditing the corporate structure behind the signatures. And that is the exact vulnerability being exploited here. Trevor Burrus, Jr.
SPEAKER_01So it's like playing Monopoly and selling park place to yourself just to change the name on the property card, knowing the banker isn't even paying attention.
SPEAKER_00Aaron Powell That's actually a great way to put it.
SPEAKER_01Aaron Powell But what is the actual strategic advantage here? Is this just standard billionaire tax evasion, or is there a deeper defensive mechanism at play?
SPEAKER_00Aaron Ross Powell Oh, it is absolutely a deliberate defensive mechanism. It's known as jurisdictional shielding.
SPEAKER_01Aaron Powell Jurisdictional Shielding. Aaron Powell Yeah.
SPEAKER_00When you transfer the title of a physical building in Manhattan to a corporate entity domiciled in the U.S. Virgin Islands, you are moving the legal ownership into a completely different regulatory environment.
SPEAKER_01Trevor Burrus Because the Virgin Islands have different rules.
SPEAKER_00Aaron Powell Exactly. They offer incredibly strict corporate veil laws. So if a plaintiff or a prosecutor in New York wants to know who actually owns Maple Inc., they can't just look it up online. They have to pierce the corporate veil, which requires court orders, navigating territorial laws, and you know, fighting layers of high-priced attorneys.
SPEAKER_01Aaron Powell So he essentially took the physical epicenter of his operations and dropped a legal black box right on top of it.
SPEAKER_00Precisely.
SPEAKER_01But the archive shows that while the mansion was hidden under this like macro level shell game, the micro level reality was incredibly exposed.
SPEAKER_00Oh, absolutely. The petty cash.
SPEAKER_01Yes. There is a file in the data dump, EFTA, 0124-5248. It's a petty cash log. And the metadata clearly notes that the DOJ had removed this specific file from public access because it contained unredacted names.
SPEAKER_00See, the petty cash log is the Achilles heel of any illicit enterprise.
SPEAKER_01Why is that?
SPEAKER_00Well, you can hire the best lawyers in the world to hide the ownership of the building, but the building still needs to function daily. Someone has to pay for the private car services, the food deliveries, the off-the-books maintenance.
SPEAKER_01The granular financial flow.
SPEAKER_00Exactly. A petty cash log with unredacted names completely destroys the corporate veil because it proves exactly who is in the building, who is being compensated, and who is authorizing those payments on a random Tuesday afternoon.
SPEAKER_01It totally bypasses the Virgin Islands Shell Company and just shows you the raw human network.
SPEAKER_00Right, which naturally pushes the investigation from the physical world into the digital world. If you want to know what those people were doing, you need the communications.
SPEAKER_01And this is where the reality of modern criminal forensics completely shatters what we see on TV.
SPEAKER_00Oh, yeah.
SPEAKER_01So Because if you're used to Hollywood thrillers, you probably expect a dramatic raid where an agent kicks down a door, plugs a thumb drive into a mainframe, a progress bar hits 100%, and the case is solved.
SPEAKER_00But the reality is pure agonizing bureaucracy.
SPEAKER_01It really is. The archive contains email threads. This is dataset 9, page 100 from late 2020. This is well after the public arrests and the media frenzy.
SPEAKER_00Right. The subject line is just a mundane Epstein evidence status.
SPEAKER_01Aaron Powell Yes. And instead of dramatic hacking, you have federal investigators trading color-coded spreadsheets, manually tracking individual physical hard drives. They are literally listing out serial numbers like NYC024328, NYC024367.
SPEAKER_00Yeah. And noting the massive backlog of drives still being processed.
SPEAKER_01But why? I mean, in an era where everything is backed up to the cloud, why were investigators drowning in physical hardware?
SPEAKER_00Aaron Powell Well, because highly sophisticated Lysic enterprises understand modern digital tradecraft. If you store your operations on a major cloud provider, you are incredibly vulnerable.
SPEAKER_01Aaron Powell Because the FBI can just subpoena the tech company.
SPEAKER_00Exactly. And the company quietly hands over a perfectly organized zip file of your entire life. You wouldn't even know it happened until the raid. So to counter that, you keep your most sensitive data localized, you air gap it.
SPEAKER_01Trevor Burrus, Jr. Meaning the computer's never connected to the internet. Right. It's like keeping your money in a floor safe instead of a bank vault. The authorities actually have to come to your house and break it open.
SPEAKER_00Exactly. And breaking it open digitally is an absolute nightmare. When the FBI seizes a physical hard drive, they can't just plug it into a laptop and start clicking around.
SPEAKER_01Because that would alter the data.
SPEAKER_00Yes. Opening a file alters its metadata, which completely ruins its integrity as legal evidence. First, they have to use special hardware called write blockers to create a flawless, forensic clone of the drive. And then they have to attack the encryption.
SPEAKER_01And even if they break the encryption, they aren't finding a folder conveniently labeled, you know, extortion material.
SPEAKER_00No. They are finding terabytes of completely mundane clutter, old software update files, automated system logs, thousands of duplicate photos.
SPEAKER_01So finding the actionable intelligence requires sifting through all of that noise manually, device by device.
SPEAKER_00That is exactly why a massive backlog still existed years into the investigation.
SPEAKER_01But uncovering all this physical and digital evidence is completely useless if you can't bring it into a courtroom.
SPEAKER_00Right.
SPEAKER_01And that is exactly what Gislain Maxwell's defense team tried to prevent. The archive contains a massive legal filing from the Southern District of New York, the SDNY.
SPEAKER_00The omnibus memorandum.
SPEAKER_01Yes. EFTA 00039421. It's an omnibus memorandum opposing Maxwell's pretrial motions. And the entire battle revolves around a ghost from Epstein's past. Trevor Burrus, Jr.
SPEAKER_00His highly controversial 2007 non-prosecution agreement, the MPA.
SPEAKER_01Right, the one signed down in Florida. So what does this all mean?
SPEAKER_00Aaron Ross Powell Well the Florida NPA was a localized agreement that allowed him to avoid federal prosecution in that specific district at that specific time.
SPEAKER_01Okay.
SPEAKER_00But fast forward to New York years later, and Maxwell's defense team attempts to use that very same piece of paper to build an impenetrable firewall around her.
SPEAKER_01I really need you to explain the mechanics of this because on its face, it sounds completely absurd. It does. It's like trying to use your neighbor's expired immunity idol on Survivor to save yourself in a completely different season. How can a defense team even theoretically justify stretching one person's localized plea deal to cover a different person in a different state?
SPEAKER_00So they relied on a very specific legal doctrine regarding sovereign authority. The defense argued that the federal government is a unitary executive.
SPEAKER_01Meaning what?
SPEAKER_00Meaning it is one single entity. Therefore, if a federal prosecutor in Florida makes a promise on behalf of the United States government, that promise legally binds every other federal prosecutor in the United States.
SPEAKER_01Including those in New York.
SPEAKER_00Exactly. And because the original MPA contained language protecting unnamed potential co-conspirators, the defense argued Maxwell was covered by that Florida umbrella.
SPEAKER_01That is a breathtakingly bold strategy.
SPEAKER_00It really is.
SPEAKER_01But the prosecutors in the Southern District of New York completely dismantled it in this memo. They basically told the judge, uh, no, that is not how this works.
SPEAKER_00Yeah, they attacked it on three separate fronts. First, they pointed out that the actual text of the Florida NPA did not contain any explicit promise to bind other districts.
SPEAKER_01Okay.
SPEAKER_00Without that explicit language, the SDNY maintained its independent authority to prosecute. Second, they noted the original agreement was strictly limited in scope to crimes committed between 2001 and 2007.
SPEAKER_01So it was never designed to be a blanket lifetime immunity card.
SPEAKER_00No, not at all. And the third point they made feels like the fatal blow. They argued about legal standing.
SPEAKER_01Right, the concept of enforceable rights.
SPEAKER_00Yes. The SDNY argued that even if the NPA casually mentioned co-conspirators, Maxwell herself was not a signatory party to the contract. She didn't sign it. She did not negotiate the terms, she had not signed the paper, and therefore she had absolutely no legal standing to walk into a New York courtroom and demand the enforcement of a Florida contract.
SPEAKER_01Wow. So the firewall fell, the legal shield dissolved.
SPEAKER_00It did.
SPEAKER_01But while these high-level, incredibly sophisticated legal battles were happening in recent years, the archive reminds us that the FBI had been sitting on raw, chaotic, unfiltered reports for decades.
SPEAKER_00Yeah, and this brings us to what is arguably the most jarring document in this entire data dump.
SPEAKER_01It really is. It is an unclassified FBI intake form, EF00000605, dated January 10th, 2000.
SPEAKER_00It's a prime example of the raw intelligence we discussed earlier.
SPEAKER_01Exactly. And I want to pause here and explicitly remind you, the listener, of our neutrality rule. This is raw, unfiltered, unverified intake. Right. The report logs an interview with a man who worked as a limousine driver. He states that he drove Donald Trump for two years in the mid-1990s. And the narrative he provides the FBI is intensely specific and deeply disturbing.
SPEAKER_00It is. It's crazy. It logs someone saying he raped me, references to police being called, and then abruptly pivots to a woman found dead into staged suicide out in Kiefer, Oklahoma.
SPEAKER_01Right. The file states the local coroner ruled it a suicide, but then someone else claims she was murdered because she got entangled with a Mexican drug cartel.
SPEAKER_00Yeah, and thrown right into the middle of this bizarre cartel suicide story are mentions of Gislaine, and someone identified only as John Doe Nobort 2.
SPEAKER_01I have to ask, how on earth does an FBI intake officer filter a report like this? I mean, it combines a highly specific first-hand account from a driver with seemingly wild, sprawling claims about cartels and stage suicides.
SPEAKER_00Well, the short answer is they don't filter it, they capture it.
SPEAKER_01They just write it all down.
SPEAKER_00Exactly. When you are operating at the intake level of intelligence gathering, your job is not to act as a judge of truth. Your job is to act as a vacuum. You document everything exactly as the informant states it, no matter how sprawling or contradictory it seems.
SPEAKER_01Because if you filter out the crazy parts, you might be throwing away the actual lead.
SPEAKER_00Exactly. Sometimes informants conflate three entirely separate real events into one paranoid narrative. In intelligence work, it's called signal-to-noise ratio.
SPEAKER_01Okay, so how do they use it?
SPEAKER_00The investigator logs every single data point, every name, location, and date, even the ones about Oklahoma cartels. They then plug those data points into a centralized database to see if John Doe number two or Kiefer, Oklahoma, intersects with a completely independent active investigation somewhere else in the country.
SPEAKER_01Wow. But reading that kind of raw intelligence file perfectly illustrates the psychological environment surrounding this case.
SPEAKER_00It really does.
SPEAKER_01The sprawling, paranoid claims in that year 2000 report perfectly mirror the bizarre theories we found in other removed documents within the archive. And this is where the deep dive takes a turn into global geopolitics.
SPEAKER_00We're looking at a document from the archive titled Gislaine and Jeff The Sexual Blackmail Enterprise. It's dataset 9, page 232.
SPEAKER_01And this file completely abandons the realm of property deeds and local FBI intakes. It dives straight into claims of an elaborate British intelligence network supposedly linked directly to the Crown, operating to inflict decades of economic genocide across Africa.
SPEAKER_00It is a massive, dizzying leap in scale.
SPEAKER_01Here's where it gets really interesting. What fascinates me is the mechanism of how the author tries to prove this global conspiracy. They anchor it to a tiny, almost insignificant piece of physical evidence.
SPEAKER_00Right, the address book.
SPEAKER_01Yes. We know investigators recovered an address book from Epstein's Florida home. According to this document, there is an entry in that address book for the phrase jour et nuit, French, for day and night.
SPEAKER_00And the author of the document takes that single translated phrase, combines it with the fact that Jeffrey Epstein shares a last name with the famous sculptor Jacob Epstein, and connects them.
SPEAKER_01And Jacob Epstein created a massive public sculpture titled Day and Night, which sits on the official headquarters of the London Underground. Yep. It reads exactly like a plot point from a Dan Brown thriller. A cryptic French phrase in a blackmailer's little black book is actually a secret cipher pointing to a public monument in London, which blows the lid off a global spy ring.
SPEAKER_00It really does sound like fiction.
SPEAKER_01We also saw a separate file in this data set, EFT 000041963, labeled Psych Reconst. It showed investigators were gathering psychological reconstruction data on him post-mortem.
SPEAKER_00Right. They were actively trying to reverse engineer his mind to make sense of the web he built.
SPEAKER_01So are documents like the Joure en Nui theory actual evidence of a sophisticated international intelligence network? Or is this just proof of the intense paranoid conspiracy theories that naturally gravitate toward high-profile blackmail cases?
SPEAKER_00Honestly, if we look at the mechanics of human psychology, it is almost certainly the latter. And it's driven by a very powerful and understandable mechanism, the vacuum of verified truth.
SPEAKER_01What do you mean by that?
SPEAKER_00Well, when the public looks at a case involving extreme wealth, global political power, and deliberate corporate secrecy, like those shell companies in the Virgin Islands we talked about, they intuitively know they are being lied to by the institutions meant to protect them.
SPEAKER_01Right. And when institutions fail to provide a clean, verifiable narrative, the human brain just steps in to fill the void.
SPEAKER_00Yes. The brain is an incredibly powerful pattern recognition machine. When starved of facts, it will find patterns in the noise.
SPEAKER_01So a shared last name between a financier and a sculptor, combined with a translated phrase in a black book, suddenly becomes a lifeline.
SPEAKER_00Exactly. It becomes a way for someone to desperately make sense of a trauma and a systemic failure that the justice system hasn't fully explained.
SPEAKER_01Which really synthesizes everything we've looked at in this archive today. You can see why the pursuit of the truth here is such a grueling labyrinth. It absolutely is. We started with the physical friction, a$70 million mansion deed being quietly shuffled between a New York corporation and a Virgin Islands legal black box, while the granular reality leaked out through unredacted petty cash logs.
SPEAKER_00Then we hit the digital friction. Investigators trading color-coded spreadsheets to track a massive backlog of localized encrypted hard drives.
SPEAKER_01Proving that modern investigations aren't solved by a quick hack, but by an agonizing slog through terabytes of mundane data.
SPEAKER_00Right. Which then ran headfirst into the legal friction. A defense team utilizing the concept of a unitary executive to stretch an expired Florida non-prosecution agreement across state lines.
SPEAKER_01Trying to build an impenetrable shield in a New York courtroom.
SPEAKER_00Yeah. And beneath all of that structural maneuvering, you have the raw, chaotic human friction.
SPEAKER_01An FBI intake form where a deeply concerning, specific workplace account from a limo driver collides with frantic, disconnected stories of cartels and staged suicides.
SPEAKER_00All of which eventually spirals into the cryptographic paranoia of connecting a French address book entry to a London underground sculpture.
SPEAKER_01It illustrates how messy it is to navigate raw data dumps instead of the polished legal summaries we usually see on the evening news.
SPEAKER_00It is a stark reminder that the machinery of justice doesn't operate in a sterile environment. It operates in the mud.
SPEAKER_01It really does. And that brings us to a final thought I want to leave you with today. We've seen how a single cryptic entry like Joe Enui can spark entire geopolitical theories about British intelligence when people are desperately looking for answers. It makes you wonder if so much energy is spent trying to decode the margins, how many explosive, verified secrets are currently sitting there? Perfectly preserved but entirely unnoticed, buried deep in those mundane petty cash logs, or hidden in row sixty two of a spreadsheet tracking an encrypted hard drive, just waiting for someone to finally connect the dots.