The Epstein Files

File 162 - Todd Blanche: Trump's Lawyer Now Decides Which Epstein Files You See

Island Investigation Episode 162

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 22:10

Todd Blanche represented Trump in Manhattan criminal trial. Appointed Deputy AG.

March 18 2026 blocked DEA compliance with Wyden's Senate request. Told public to \.

Sources for this episode are available at: https://nbn.fm/epstein-files/episode/ep162

About The Epstein Files

The Epstein Files is an AI-generated podcast analyzing the 3.5 million pages released under the Epstein Files Transparency Act (EFTA). All claims are grounded in primary source documents, published on the Neural Broadcast Network website for verification.

Produced by Island Investigation

Subscribe to NBN's Newsletter

Get new investigations, new shows, and the raw intelligence you won't find anywhere else straight to your inbox.

Sign up at nbn.fm/newsletter.

SPEAKER_01

Imagine walking into like a city property office, handing over the deed to a$70 million New York mansion and just uh signing your own name as both the seller and the buyer.

SPEAKER_00

Aaron Powell Right. Which sounds completely absurd.

SPEAKER_01

Yeah. Most of us assume that if we try to stunt like that, alarms would immediately go off. Someone behind the counter would flag it for fraud. But in 2012, Jeffrey Epstein did exactly that with the infamous 9E 71st Street mansion, and the paperwork just it went right through.

SPEAKER_00

Aaron Powell It's honestly a stunning display of how the architecture of extreme wealth actually functions. Yeah. I mean, you expect this system of rigid checks and balances, right?

SPEAKER_01

Right, exactly.

SPEAKER_00

But what you actually find is a system built largely on administrative routine. It's just waiting to be exploited by someone who knows how to paper over the cracks.

SPEAKER_01

Aaron Powell And papering over the cracks is exactly what we are looking at today. Welcome to this deep dive. Today we are inviting you to join us as we basically step inside the engine room of a massive investigation.

SPEAKER_00

Aaron Powell Yeah, and we have a sprawling, completely fragmented data dump from the Internet Archive sitting right in front of us.

SPEAKER_01

We are talking about raw Department of Justice files, underacted petty cash logs, internal FBI email chains, and you know, highly technical court memos. Our mission isn't just to rehash the crimes you've already seen in the headlines.

SPEAKER_00

Aaron Powell No, our mission is to look at the mechanics. How does an illicit enterprise of this magnitude actually hide itself?

SPEAKER_01

Aaron Powell Right. And what does the bureaucratic friction look like when federal investigators try to dismantle it?

SPEAKER_00

Aaron Powell But uh before we dive into the mechanics, we really need to establish the nature of the materials we are analyzing. This archive is filled with raw, unfiltered intelligence.

SPEAKER_01

Aaron Powell Which means we need to set a ground rule for you, listening right now. Raw intelligence is essentially an unfiltered dumped ground for human paranoia, verified facts, and well, everything in between.

SPEAKER_00

It really is.

SPEAKER_01

We are going to be discussing some highly explosive politically charged allegations involving very prominent public figures. Our role today is not to act as a judge or a jury. We are not validating these claims or taking sides.

SPEAKER_00

Exactly. We are simply examining the anatomy of the information, how these reports are captured, processed, and fought over in the justice system.

SPEAKER_01

And if you want to understand how a sprawling criminal enterprise operates, you have to start with the physical footprint.

SPEAKER_00

A legal shell game.

SPEAKER_01

Right. Which brings us right back to that New York mansion transfer I mentioned at the top. I was looking through the 2019 internal email chains. This is EFTA dataset 9, page 238, between FBI agents and the assistant United States attorneys.

SPEAKER_00

Oh, those emails are fascinating. You could read the sheer confusion in their messages.

SPEAKER_01

Yeah, they are actively trying to untangle a knot that was tied decades earlier. According to the timeline in those emails, Leslie Wexner reportedly bought the home in 1989 through a company called 9 East 71st Street Corporation.

SPEAKER_00

But Jeffrey Epstein was sitting as the president of that corporation.

SPEAKER_01

Exactly. Fast forward to 2011 and 2012, and we see a transfer in the New York property database to a completely new entity called Maple Inc., and this one is based in St. Thomas in the Virgin Islands. And there, right on the signature line, Epstein signs as the grantor, the person giving the property, and the grantee, the person receiving it. Okay, let's unpack this. How does a notary or a city clerk even accept a document like that without raising massive red flags?

SPEAKER_00

Aaron Powell Well, because the clerk's office isn't an investigative body. Their job is just to ensure the formatting is correct, you know, the fees are paid, and the signatures are notarized.

SPEAKER_01

Wow. So they just stamp it.

SPEAKER_00

Yeah. They aren't auditing the corporate structure behind the signatures. And that is the exact vulnerability being exploited here. Trevor Burrus, Jr.

SPEAKER_01

So it's like playing Monopoly and selling park place to yourself just to change the name on the property card, knowing the banker isn't even paying attention.

SPEAKER_00

Aaron Powell That's actually a great way to put it.

SPEAKER_01

Aaron Powell But what is the actual strategic advantage here? Is this just standard billionaire tax evasion, or is there a deeper defensive mechanism at play?

SPEAKER_00

Aaron Ross Powell Oh, it is absolutely a deliberate defensive mechanism. It's known as jurisdictional shielding.

SPEAKER_01

Aaron Powell Jurisdictional Shielding. Aaron Powell Yeah.

SPEAKER_00

When you transfer the title of a physical building in Manhattan to a corporate entity domiciled in the U.S. Virgin Islands, you are moving the legal ownership into a completely different regulatory environment.

SPEAKER_01

Trevor Burrus Because the Virgin Islands have different rules.

SPEAKER_00

Aaron Powell Exactly. They offer incredibly strict corporate veil laws. So if a plaintiff or a prosecutor in New York wants to know who actually owns Maple Inc., they can't just look it up online. They have to pierce the corporate veil, which requires court orders, navigating territorial laws, and you know, fighting layers of high-priced attorneys.

SPEAKER_01

Aaron Powell So he essentially took the physical epicenter of his operations and dropped a legal black box right on top of it.

SPEAKER_00

Precisely.

SPEAKER_01

But the archive shows that while the mansion was hidden under this like macro level shell game, the micro level reality was incredibly exposed.

SPEAKER_00

Oh, absolutely. The petty cash.

SPEAKER_01

Yes. There is a file in the data dump, EFTA, 0124-5248. It's a petty cash log. And the metadata clearly notes that the DOJ had removed this specific file from public access because it contained unredacted names.

SPEAKER_00

See, the petty cash log is the Achilles heel of any illicit enterprise.

SPEAKER_01

Why is that?

SPEAKER_00

Well, you can hire the best lawyers in the world to hide the ownership of the building, but the building still needs to function daily. Someone has to pay for the private car services, the food deliveries, the off-the-books maintenance.

SPEAKER_01

The granular financial flow.

SPEAKER_00

Exactly. A petty cash log with unredacted names completely destroys the corporate veil because it proves exactly who is in the building, who is being compensated, and who is authorizing those payments on a random Tuesday afternoon.

SPEAKER_01

It totally bypasses the Virgin Islands Shell Company and just shows you the raw human network.

SPEAKER_00

Right, which naturally pushes the investigation from the physical world into the digital world. If you want to know what those people were doing, you need the communications.

SPEAKER_01

And this is where the reality of modern criminal forensics completely shatters what we see on TV.

SPEAKER_00

Oh, yeah.

SPEAKER_01

So Because if you're used to Hollywood thrillers, you probably expect a dramatic raid where an agent kicks down a door, plugs a thumb drive into a mainframe, a progress bar hits 100%, and the case is solved.

SPEAKER_00

But the reality is pure agonizing bureaucracy.

SPEAKER_01

It really is. The archive contains email threads. This is dataset 9, page 100 from late 2020. This is well after the public arrests and the media frenzy.

SPEAKER_00

Right. The subject line is just a mundane Epstein evidence status.

SPEAKER_01

Aaron Powell Yes. And instead of dramatic hacking, you have federal investigators trading color-coded spreadsheets, manually tracking individual physical hard drives. They are literally listing out serial numbers like NYC024328, NYC024367.

SPEAKER_00

Yeah. And noting the massive backlog of drives still being processed.

SPEAKER_01

But why? I mean, in an era where everything is backed up to the cloud, why were investigators drowning in physical hardware?

SPEAKER_00

Aaron Powell Well, because highly sophisticated Lysic enterprises understand modern digital tradecraft. If you store your operations on a major cloud provider, you are incredibly vulnerable.

SPEAKER_01

Aaron Powell Because the FBI can just subpoena the tech company.

SPEAKER_00

Exactly. And the company quietly hands over a perfectly organized zip file of your entire life. You wouldn't even know it happened until the raid. So to counter that, you keep your most sensitive data localized, you air gap it.

SPEAKER_01

Trevor Burrus, Jr. Meaning the computer's never connected to the internet. Right. It's like keeping your money in a floor safe instead of a bank vault. The authorities actually have to come to your house and break it open.

SPEAKER_00

Exactly. And breaking it open digitally is an absolute nightmare. When the FBI seizes a physical hard drive, they can't just plug it into a laptop and start clicking around.

SPEAKER_01

Because that would alter the data.

SPEAKER_00

Yes. Opening a file alters its metadata, which completely ruins its integrity as legal evidence. First, they have to use special hardware called write blockers to create a flawless, forensic clone of the drive. And then they have to attack the encryption.

SPEAKER_01

And even if they break the encryption, they aren't finding a folder conveniently labeled, you know, extortion material.

SPEAKER_00

No. They are finding terabytes of completely mundane clutter, old software update files, automated system logs, thousands of duplicate photos.

SPEAKER_01

So finding the actionable intelligence requires sifting through all of that noise manually, device by device.

SPEAKER_00

That is exactly why a massive backlog still existed years into the investigation.

SPEAKER_01

But uncovering all this physical and digital evidence is completely useless if you can't bring it into a courtroom.

SPEAKER_00

Right.

SPEAKER_01

And that is exactly what Gislain Maxwell's defense team tried to prevent. The archive contains a massive legal filing from the Southern District of New York, the SDNY.

SPEAKER_00

The omnibus memorandum.

SPEAKER_01

Yes. EFTA 00039421. It's an omnibus memorandum opposing Maxwell's pretrial motions. And the entire battle revolves around a ghost from Epstein's past. Trevor Burrus, Jr.

SPEAKER_00

His highly controversial 2007 non-prosecution agreement, the MPA.

SPEAKER_01

Right, the one signed down in Florida. So what does this all mean?

SPEAKER_00

Aaron Ross Powell Well the Florida NPA was a localized agreement that allowed him to avoid federal prosecution in that specific district at that specific time.

SPEAKER_01

Okay.

SPEAKER_00

But fast forward to New York years later, and Maxwell's defense team attempts to use that very same piece of paper to build an impenetrable firewall around her.

SPEAKER_01

I really need you to explain the mechanics of this because on its face, it sounds completely absurd. It does. It's like trying to use your neighbor's expired immunity idol on Survivor to save yourself in a completely different season. How can a defense team even theoretically justify stretching one person's localized plea deal to cover a different person in a different state?

SPEAKER_00

So they relied on a very specific legal doctrine regarding sovereign authority. The defense argued that the federal government is a unitary executive.

SPEAKER_01

Meaning what?

SPEAKER_00

Meaning it is one single entity. Therefore, if a federal prosecutor in Florida makes a promise on behalf of the United States government, that promise legally binds every other federal prosecutor in the United States.

SPEAKER_01

Including those in New York.

SPEAKER_00

Exactly. And because the original MPA contained language protecting unnamed potential co-conspirators, the defense argued Maxwell was covered by that Florida umbrella.

SPEAKER_01

That is a breathtakingly bold strategy.

SPEAKER_00

It really is.

SPEAKER_01

But the prosecutors in the Southern District of New York completely dismantled it in this memo. They basically told the judge, uh, no, that is not how this works.

SPEAKER_00

Yeah, they attacked it on three separate fronts. First, they pointed out that the actual text of the Florida NPA did not contain any explicit promise to bind other districts.

SPEAKER_01

Okay.

SPEAKER_00

Without that explicit language, the SDNY maintained its independent authority to prosecute. Second, they noted the original agreement was strictly limited in scope to crimes committed between 2001 and 2007.

SPEAKER_01

So it was never designed to be a blanket lifetime immunity card.

SPEAKER_00

No, not at all. And the third point they made feels like the fatal blow. They argued about legal standing.

SPEAKER_01

Right, the concept of enforceable rights.

SPEAKER_00

Yes. The SDNY argued that even if the NPA casually mentioned co-conspirators, Maxwell herself was not a signatory party to the contract. She didn't sign it. She did not negotiate the terms, she had not signed the paper, and therefore she had absolutely no legal standing to walk into a New York courtroom and demand the enforcement of a Florida contract.

SPEAKER_01

Wow. So the firewall fell, the legal shield dissolved.

SPEAKER_00

It did.

SPEAKER_01

But while these high-level, incredibly sophisticated legal battles were happening in recent years, the archive reminds us that the FBI had been sitting on raw, chaotic, unfiltered reports for decades.

SPEAKER_00

Yeah, and this brings us to what is arguably the most jarring document in this entire data dump.

SPEAKER_01

It really is. It is an unclassified FBI intake form, EF00000605, dated January 10th, 2000.

SPEAKER_00

It's a prime example of the raw intelligence we discussed earlier.

SPEAKER_01

Exactly. And I want to pause here and explicitly remind you, the listener, of our neutrality rule. This is raw, unfiltered, unverified intake. Right. The report logs an interview with a man who worked as a limousine driver. He states that he drove Donald Trump for two years in the mid-1990s. And the narrative he provides the FBI is intensely specific and deeply disturbing.

SPEAKER_00

It is. It's crazy. It logs someone saying he raped me, references to police being called, and then abruptly pivots to a woman found dead into staged suicide out in Kiefer, Oklahoma.

SPEAKER_01

Right. The file states the local coroner ruled it a suicide, but then someone else claims she was murdered because she got entangled with a Mexican drug cartel.

SPEAKER_00

Yeah, and thrown right into the middle of this bizarre cartel suicide story are mentions of Gislaine, and someone identified only as John Doe Nobort 2.

SPEAKER_01

I have to ask, how on earth does an FBI intake officer filter a report like this? I mean, it combines a highly specific first-hand account from a driver with seemingly wild, sprawling claims about cartels and stage suicides.

SPEAKER_00

Well, the short answer is they don't filter it, they capture it.

SPEAKER_01

They just write it all down.

SPEAKER_00

Exactly. When you are operating at the intake level of intelligence gathering, your job is not to act as a judge of truth. Your job is to act as a vacuum. You document everything exactly as the informant states it, no matter how sprawling or contradictory it seems.

SPEAKER_01

Because if you filter out the crazy parts, you might be throwing away the actual lead.

SPEAKER_00

Exactly. Sometimes informants conflate three entirely separate real events into one paranoid narrative. In intelligence work, it's called signal-to-noise ratio.

SPEAKER_01

Okay, so how do they use it?

SPEAKER_00

The investigator logs every single data point, every name, location, and date, even the ones about Oklahoma cartels. They then plug those data points into a centralized database to see if John Doe number two or Kiefer, Oklahoma, intersects with a completely independent active investigation somewhere else in the country.

SPEAKER_01

Wow. But reading that kind of raw intelligence file perfectly illustrates the psychological environment surrounding this case.

SPEAKER_00

It really does.

SPEAKER_01

The sprawling, paranoid claims in that year 2000 report perfectly mirror the bizarre theories we found in other removed documents within the archive. And this is where the deep dive takes a turn into global geopolitics.

SPEAKER_00

We're looking at a document from the archive titled Gislaine and Jeff The Sexual Blackmail Enterprise. It's dataset 9, page 232.

SPEAKER_01

And this file completely abandons the realm of property deeds and local FBI intakes. It dives straight into claims of an elaborate British intelligence network supposedly linked directly to the Crown, operating to inflict decades of economic genocide across Africa.

SPEAKER_00

It is a massive, dizzying leap in scale.

SPEAKER_01

Here's where it gets really interesting. What fascinates me is the mechanism of how the author tries to prove this global conspiracy. They anchor it to a tiny, almost insignificant piece of physical evidence.

SPEAKER_00

Right, the address book.

SPEAKER_01

Yes. We know investigators recovered an address book from Epstein's Florida home. According to this document, there is an entry in that address book for the phrase jour et nuit, French, for day and night.

SPEAKER_00

And the author of the document takes that single translated phrase, combines it with the fact that Jeffrey Epstein shares a last name with the famous sculptor Jacob Epstein, and connects them.

SPEAKER_01

And Jacob Epstein created a massive public sculpture titled Day and Night, which sits on the official headquarters of the London Underground. Yep. It reads exactly like a plot point from a Dan Brown thriller. A cryptic French phrase in a blackmailer's little black book is actually a secret cipher pointing to a public monument in London, which blows the lid off a global spy ring.

SPEAKER_00

It really does sound like fiction.

SPEAKER_01

We also saw a separate file in this data set, EFT 000041963, labeled Psych Reconst. It showed investigators were gathering psychological reconstruction data on him post-mortem.

SPEAKER_00

Right. They were actively trying to reverse engineer his mind to make sense of the web he built.

SPEAKER_01

So are documents like the Joure en Nui theory actual evidence of a sophisticated international intelligence network? Or is this just proof of the intense paranoid conspiracy theories that naturally gravitate toward high-profile blackmail cases?

SPEAKER_00

Honestly, if we look at the mechanics of human psychology, it is almost certainly the latter. And it's driven by a very powerful and understandable mechanism, the vacuum of verified truth.

SPEAKER_01

What do you mean by that?

SPEAKER_00

Well, when the public looks at a case involving extreme wealth, global political power, and deliberate corporate secrecy, like those shell companies in the Virgin Islands we talked about, they intuitively know they are being lied to by the institutions meant to protect them.

SPEAKER_01

Right. And when institutions fail to provide a clean, verifiable narrative, the human brain just steps in to fill the void.

SPEAKER_00

Yes. The brain is an incredibly powerful pattern recognition machine. When starved of facts, it will find patterns in the noise.

SPEAKER_01

So a shared last name between a financier and a sculptor, combined with a translated phrase in a black book, suddenly becomes a lifeline.

SPEAKER_00

Exactly. It becomes a way for someone to desperately make sense of a trauma and a systemic failure that the justice system hasn't fully explained.

SPEAKER_01

Which really synthesizes everything we've looked at in this archive today. You can see why the pursuit of the truth here is such a grueling labyrinth. It absolutely is. We started with the physical friction, a$70 million mansion deed being quietly shuffled between a New York corporation and a Virgin Islands legal black box, while the granular reality leaked out through unredacted petty cash logs.

SPEAKER_00

Then we hit the digital friction. Investigators trading color-coded spreadsheets to track a massive backlog of localized encrypted hard drives.

SPEAKER_01

Proving that modern investigations aren't solved by a quick hack, but by an agonizing slog through terabytes of mundane data.

SPEAKER_00

Right. Which then ran headfirst into the legal friction. A defense team utilizing the concept of a unitary executive to stretch an expired Florida non-prosecution agreement across state lines.

SPEAKER_01

Trying to build an impenetrable shield in a New York courtroom.

SPEAKER_00

Yeah. And beneath all of that structural maneuvering, you have the raw, chaotic human friction.

SPEAKER_01

An FBI intake form where a deeply concerning, specific workplace account from a limo driver collides with frantic, disconnected stories of cartels and staged suicides.

SPEAKER_00

All of which eventually spirals into the cryptographic paranoia of connecting a French address book entry to a London underground sculpture.

SPEAKER_01

It illustrates how messy it is to navigate raw data dumps instead of the polished legal summaries we usually see on the evening news.

SPEAKER_00

It is a stark reminder that the machinery of justice doesn't operate in a sterile environment. It operates in the mud.

SPEAKER_01

It really does. And that brings us to a final thought I want to leave you with today. We've seen how a single cryptic entry like Joe Enui can spark entire geopolitical theories about British intelligence when people are desperately looking for answers. It makes you wonder if so much energy is spent trying to decode the margins, how many explosive, verified secrets are currently sitting there? Perfectly preserved but entirely unnoticed, buried deep in those mundane petty cash logs, or hidden in row sixty two of a spreadsheet tracking an encrypted hard drive, just waiting for someone to finally connect the dots.