The Epstein Files
The Epstein Files is the first AI-native documentary podcast to systematically analyze the Jeffrey Epstein case at scale. With over 3 million pages of DOJ documents, court records, flight logs, and public resources now available, traditional journalism simply cannot process this volume of information. AI can.
This series leverages artificial intelligence at every layer of production. From custom-built architecture that ingests and cross-references millions of pages of evidence, to AI-generated audio that delivers findings in a consistent, accessible format, this project represents a new model for investigative journalism. What would take a newsroom years to analyze, AI can process in days, surfacing connections, patterns, and details that would otherwise remain buried in the sheer volume of data.
Each episode draws directly from primary sources: unsealed court documents, FBI files, the black book, flight logs, victim depositions, and the DOJ's ongoing document releases. The AI architecture identifies relevant passages, cross-references names and dates across thousands of files, and synthesizes findings into episodes that make this information digestible for the public.
The series covers Epstein's mysterious rise to wealth, his network of enablers, the properties where crimes occurred, the 2008 sweetheart deal, his death in federal custody, the Maxwell trial, and the unanswered questions that remain.
This is not sensationalized content. It is documented fact, processed at scale, and presented with journalistic rigor. The goal is simple: make the public record accessible to the public.
New episodes release as additional documents become available, with AI enabling rapid analysis and production that keeps pace with ongoing revelations. Our Standards AI enables scale, but journalistic standards guide the output. Every claim is tied to specific documents. The series clearly distinguishes between proven facts and allegations. Victim testimony is handled with dignity. Names that appear in documents are not accused of wrongdoing unless documents support such claims.
This is documented fact, processed at scale, presented for the public.
Produced by the Neural Broadcast Network.
The Epstein Files
File 170 - One Hundred Survivors Outed in One Day.
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
January 30, 2026 EFTA release included 43 full names (including minors), home addresses searchable by keyword, nude photographs with faces visible. NYT notified DOJ.
Over 100 survivors affected. The DOJ victimized the victims.
Sources for this episode are available at: https://nbn.fm/epstein-files/episode/ep170
About The Epstein Files
The Epstein Files is an AI-generated podcast analyzing the 3.5 million pages released under the Epstein Files Transparency Act (EFTA). All claims are grounded in primary source documents, published on the Neural Broadcast Network website for verification.
Produced by Island Investigation
Subscribe to NBN's Newsletter
Get new investigations, new shows, and the raw intelligence you won't find anywhere else straight to your inbox.
Sign up at nbn.fm/newsletter.
Welcome back to the Epstein Files. Last time we walked through the Trump administration shutting down the OCDETF, the only federal unit that had investigated Epstein for drug trafficking. Today we're following what the Department of Justice did to the survivors. On January 30th, 2026, the EFTOR document release included unredacted names, home addresses, and nude photographs of Epstein's victims, including minors. Attorneys called it the worst victim privacy violation in a single day in United States history. As always, every document and source we reference is available at the Neural Broadcast Network website. So forty-three full names were exposed, including individuals who were minors at the time of their abuse. Home addresses were searchable by keyword in the release files. Nude images with faces visible were published on a government website. The New York Times contacted the DOJ to take them down. Over 100 survivors were affected in one release.
SPEAKER_00Well, the objective parameters of that January 30th publication require pretty rigorous technical analysis. We need to understand exactly how a breach of this magnitude materialized. The Department of Justice released approximately 3.5 million pages of investigative materials.
SPEAKER_01Aaron Powell Right. And to conceptualize that volume, you were looking at terabytes of raw data. The release included court filings, internal correspondence, financial records, and law enforcement evidence logs.
SPEAKER_00Exactly. This was the primary foundational tranche of the entire disclosure operation. The department positioned this event as the direct fulfillment of the transparency mandate enacted by Congress.
SPEAKER_01So they configure their public-facing servers for maximum distribution.
SPEAKER_00They did. The files were uploaded directly to the main DOJ domain, and that domain was specifically architected for unrestricted download by any member of the public globally. No registration, uh no verification required.
SPEAKER_01Documents released under the Epstein Files Transparency Act were supposed to follow a meticulously structured implementation protocol. The preparation timeline here is a critical piece of the factual record.
SPEAKER_00It is. The Department of Justice had several months to execute this operation. The implementation timeline for the EFTA was established by statute well in advance of the January 30th target date.
SPEAKER_01Meaning this was not some rushed Friday night document dump triggered by an emergency court order?
SPEAKER_00No, absolutely not. The department organized specialized internal teams for this. Their sole directive was to review, categorize, and redact personally identifiable information.
SPEAKER_01Aaron Powell And their stated operational goal, which they communicated to Congressional Oversight Committees, was aggressive transparency regarding the perpetrators, paired with absolute privacy protection for the victims.
SPEAKER_00Right. But we have to evaluate the immediate reception mechanics to understand the scale of what actually happened. Within the first 72 hours of publication, server analytics indicated the documents were downloaded millions of times.
SPEAKER_01Which makes sense when you consider the digital infrastructure of modern investigative journalism. I mean, major news organizations do not manually read 3.5 million pages.
SPEAKER_00No, they deploy automated scraping architecture. They use customized scripts to pull down the entire database, run optical character recognition across every single image file, and feed that text into searchable databases.
SPEAKER_01Aaron Powell So independent researchers and the public engaged with the data instantly. The DOJ's system design actively facilitated rapid bulk acquisition through unthrottled bandwidth.
SPEAKER_00Yes. And the minimum floor of protection for this specific data release was explicitly defined before a single page was published. Attorneys representing Epstein survivors provided the DOJ with a highly specific verified list.
SPEAKER_01A list containing approximately 350 names, correct?
SPEAKER_00Correct. These were individuals whose identifying information required mandatory redaction under the law, and the DOJ formally acknowledged receipt of this list.
SPEAKER_01Aaron Powell So this was not a vague directive where analysts had to guess who might be a victim. The government possessed the exact names.
SPEAKER_00Aaron Ross Powell They did. You would expect that a multi-agency operation would utilize standard e-discovery software to flag every instance of those 350 names for permanent deletion.
SPEAKER_01Aaron Powell That does not add up. The DOJ had the verified list. They had a timeline of several months to execute the review. They allocated dedicated personnel. The math of this failure is inconsistent.
SPEAKER_00Aaron Powell I agree. The Epstein Files Transparency Act mandated strict victim protection. Every structural element was designed to ensure the exposure of the operational network without compromising the survivors.
SPEAKER_01Therefore, the outcome on January 30th was not a failure of system design. It was a catastrophic failure of execution.
SPEAKER_00Aaron Powell Precisely. If the system was designed to succeed and the parameters were explicitly mapped via the attorney's list, we are looking at a complete breakdown of internal operating procedures.
SPEAKER_01Aaron Powell We are not talking about a clerical oversight where one analyst missed a name on page 2 million. The redaction process failed systematically.
SPEAKER_00Aaron Powell It did. And to understand how that happened, we need to analyze the specific technical application the DOJ used. This directly affected over 100 individual survivors.
SPEAKER_01So let's detail the mechanics of that failure. It's embedded directly in the digital architecture of the released files. The Department of Justice utilized cosmetic redaction overlays.
SPEAKER_00Right. They did not permanently strip the sensitive data from the files. Instead, they applied visual masks. And this specific technical application is what exposed the survivor cohort.
SPEAKER_01Because they used visual masks, the redactions were defeated through basic document manipulation.
SPEAKER_00Yes, using commercially available standard software that anyone can download for free.
SPEAKER_01We must detail exactly what data points were exposed through this cosmetic method. Forty-three full names of victims were exposed to the public.
SPEAKER_00And these names were not buried in insignificant metadata. They were located within highly sensitive internal investigative reports.
SPEAKER_01They were in sworn victim statements given to federal agents, also in civil settlement agreements that contain strict, legally binding, nondisclosure provisions.
SPEAKER_00You have to look at the context of those sworn statements. Many of these individuals had cooperated with federal and local law enforcement under explicit assurances of confidentiality.
SPEAKER_01They provided testimony under the condition that their identities would remain shielded.
SPEAKER_00Exactly. Their names had never appeared in the public domain in connection with the investigation. The DOJ release outed them instantly, breaching fundamental agreements between law enforcement and cooperating witnesses.
SPEAKER_01But the exposure extended beyond identities to active geographical data. Home addresses of the survivors were included in the released PDF files.
SPEAKER_00And crucially, these addresses were completely searchable by keyword.
SPEAKER_01Right. Meaning the underlying text layer of the document was left entirely intact beneath the black box.
SPEAKER_00Yes. If you possess a downloaded copy of the release, you do not even need to remove the redaction box. Any individual who knew a victim's name could just input it into the basic search bar.
SPEAKER_01And the software would highlight the text hidden beneath the redaction, locating the victim whose exact current residence.
SPEAKER_00Or conversely, someone could run batch searches for zip codes or specific street names to identify previously unknown survivors.
SPEAKER_01This mechanism transformed the documents into an active geographic identification tool, but the release included something even more severe.
SPEAKER_00Yes. As documented in the files released on January 30th, the most severe factual finding involves the evidentiary records. Law enforcement had previously seized nude photographs of minors.
SPEAKER_01These were seized during the execution of search warrants at various properties owned by Epstein, right?
SPEAKER_00Correct. They were strictly logged as evidence of child exploitation. In the EFITIA release, the DOJ published these exact photographs with easily removed cosmetic black box overlays.
SPEAKER_01Placed directly over the individual's faces.
SPEAKER_00Yes. When those overlays were removed by simply clicking and deleting the layer in a PDF editor, the faces of the miners were clearly identifiable.
SPEAKER_01We do not have documentation for anything remotely resembling this level of negligence in recent history. These materials were not hosted on a dark web forum. They were on an official United States government website.
SPEAKER_00Hosted directly on the primary data tranche, which means they were downloaded millions of times by international news organizations and unverified members of the public before any federal intervention occurred.
SPEAKER_01The exposure spanned multiple distinct categories of files across the 3.5 million pages. We see failed redactions in the accounting ledgers, raw interview transcripts, and evidentiary exhibits.
SPEAKER_00Which proves the flawed method was systematically applied. It was not isolated to one specific junior analyst or a single batch of mismanaged files.
SPEAKER_01The publication of nude photographs of children by the DOJ ends any theoretical debate regarding the adequacy of their handling of the mandate. The government possessed the names and the time.
SPEAKER_00And they betrayed the exact individuals the statute required them to protect.
SPEAKER_01To understand how a standard of care this critical was breached, we need to analyze the underlying software architecture. What is the technical difference between a cosmetic redaction and a permanent redaction?
SPEAKER_00Well, a PDF is not a single flat image. It is a container built on a structured hierarchy of dictionaries and content streams. A permanent redaction fundamentally alters that data structure.
SPEAKER_01So when a document is permanently redacted using proper e-discovery software, the sensitive text or image data is entirely deleted from the file's underlying code.
SPEAKER_00Exactly. The software recalculates the cross-reference tables and generates a new flattened file where the redacted information literally no longer exists in the binary data.
SPEAKER_01But cosmetic redaction merely acts like taping a piece of black paper over a physical photograph.
SPEAKER_00Right. The original photograph remains completely intact underneath the tape. In the digital equivalent, the text stream or the image stream remains perfectly preserved in the file.
SPEAKER_01The black box is simply an annotation dictionary sitting on top of it.
SPEAKER_00Yes. So anyone possessing a basic PDF editor can simply select the annotation object, delete it from the dictionary, and view the raw content beneath it.
SPEAKER_01Standard operating protocol for any legal or government document production requires rigorous quality assurance checks to prevent this exact mechanical failure.
SPEAKER_00A proper QA workflow involves digital verification programs. These programs scan the outbound production batch to confirm that all redactions have been permanently flattened.
SPEAKER_01And that all underlying metadata and hidden text layers have been scrubbed. The scale of this exposure proves that the QA process within the DOJ was either entirely absent or purely performative.
SPEAKER_00The institutional knowledge required to prevent this specific error has existed within the federal government for over two decades.
SPEAKER_01According to standards published by the National Security Agency and the DOJ's Office of Information Policy, cosmetic redactions are explicitly prohibited in public document releases.
SPEAKER_00Yes. The NSA has published highly detailed technical guidelines since 2005. These explicitly warn all federal agencies against the use of visual overlays in PDF files.
SPEAKER_01They detail the risks of leaving the underlying text layers intact, citing previous failures where classified information was exposed using this exact method.
SPEAKER_00And the DOJ's own internal operating manuals mandate the permanent deletion of redacted data before public transmission. The protocols existed, they were completely ignored.
SPEAKER_01The timeline of discovery further highlights the procedural void. The Department of Justice did not discover its own failure through an internal audit.
SPEAKER_00No, the cosmetic redactions were discovered by external third parties. Independent researchers and journalists downloaded the files, noticed the distinct visual layers, and executed the removal.
SPEAKER_01The New York Times subsequently contacted the Department of Justice. They formally notified them that they were currently hosting unredacted victim information and child exploitation material directly on their servers.
SPEAKER_00This creates a sharp factual contrast regarding institutional priorities. Consider the operational response protocols.
SPEAKER_01Right. If classified national security information or the identities of undercover federal assets had been exposed through a cosmetic redaction failure of this magnitude.
SPEAKER_00An immediate multi-agency counterintelligence investigation would have been launched within hours. The affected servers would be physically isolated.
SPEAKER_01The facility would be locked down for forensic auditing. Instead, the exposure of victim photographs and home addresses merely triggered a standard press notification.
SPEAKER_00And the initiation of a quiet internal re-redaction project. The disparity in this response clearly reveals the internal hierarchy of interests at the Department of Justice.
SPEAKER_01The exposure of citizens did not trigger the alarm bells that the exposure of state secrets would have triggered.
SPEAKER_00Exactly. Following the direct notification from the New York Times, the DOJ pulled the affected document batches offline. They severed the public access links.
SPEAKER_01They issued a brief public statement acknowledging an unspecified concern with the formatting of certain files, and announced they were initiating an internal project to re-redact the materials.
SPEAKER_00Notably, they did not provide a definitive count of the exposed victims. They did not acknowledge the severity of the nude photographs, nor did they offer any technical explanation.
SPEAKER_01According to statements from attorneys representing Epstein survivors, this event was characterized as the worst victim privacy violation in a single day in the history of the Department of Justice.
SPEAKER_00The attorneys emphasized a brutal historical continuity. The government historically failed to intervene during the period of active abuse.
SPEAKER_01And now they were actively compounding that original harm by publishing the identities, locations, and evidentiary images of the survivors.
SPEAKER_00Based on this documented negligence, several law firms immediately announced their intent to pursue aggressive federal litigation against the government.
SPEAKER_01The withdrawal of the documents from the main DOJ servers was a localized action that completely failed to address the technical reality of Internet architecture. The DOJ only possessed the capacity to remove its own hosted copies.
SPEAKER_00Because the documents had been publicly accessible and unthrottled for days, they had already been downloaded in massive bulk batches.
SPEAKER_01The moment the files hit the public domain, they were automatically indexed and cached by Google, Bing, and other search engines.
SPEAKER_00Furthermore, the data was instantly redistributed across independent peer-to-peer networks and decentralized archival websites. The underlying architecture of the Internet does not allow for a retroactive recall of published data.
SPEAKER_01It is functionally impossible. By the time the DOJ severed access, millions of perfect unredacted copies were already propagating rapidly. The exposure was permanent.
SPEAKER_00Pulling the files from the main server was the equivalent of closing a vault door after the contents had already been distributed globally.
SPEAKER_01This action leads to a secondary transparency concern regarding the subsequent re-redaction process. When the DOJ pulled the original files offline to apply permanent redactions, they eliminated the public's ability to verify the process.
SPEAKER_00That is correct. Without sustained access to the original documents, transparency watchdogs and journalists could not verify if the DOJ was strictly correcting the specific victim privacy failures.
SPEAKER_01The crisis provided an unmonitored operational window. The department possessed the capability to retroactively apply new redactions to non-victim information.
SPEAKER_00Which could include obscuring previously visible data regarding the perpetrators, involved financial institutions, or government personnel mentioned in the logs.
SPEAKER_01All executed under the public guise of protecting the survivors. The complete opacity of the correction process made any independent verification impossible.
SPEAKER_00The department's response addressed the primary symptom, the immediate availability of the files on their specific server. It entirely ignored the root cause.
SPEAKER_01Which was a deeply negligent document review and quality assurance pipeline. This response protocol is entirely inconsistent with standard federal accountability frameworks.
SPEAKER_00We do not have documentation indicating any disciplinary actions were taken against the specific project managers or technical directors who authorized the cosmetic overlays.
SPEAKER_01The established timeline strongly indicates that the DOJ was primarily focused on managing its own legal liability exposure and controlling the immediate public relations narrative.
SPEAKER_00Rather than deploying active resources to secure the victims whose physical safety they had just compromised.
SPEAKER_01Because the tangible human consequences materialized almost immediately. Within days of the January 30th release, multiple affected victims reported receiving hostile, threatening communications.
SPEAKER_00Anonymous individuals utilized the searchable text layers within the files to cross-reference the exposed names with the exposed home addresses.
SPEAKER_01Establishing direct uninvited contact with the survivors at their private residences. This represents the active weaponization of the document release.
SPEAKER_00Because the PDF files permitted bulk keyword searches, data extraction required zero technical expertise. Individuals operating on conspiracy-focused forums queried the documents.
SPEAKER_01They extracted the names and exact addresses and published them on highly trafficked public message boards.
SPEAKER_00This practice, strictly defined as doxing, was facilitated directly by the digital architecture of the government's document release. It was a highly foreseeable consequence.
SPEAKER_01The psychological impact on the survivors is documented by their legal counsel, particularly regarding the absolute lack of advance warning. The DOJ did not proactively contact the individuals on the protected list.
SPEAKER_00No. Survivors discovered their exposure entirely through secondary external sources. They were informed by breaking news alerts or frantic emergency calls from their legal representation.
SPEAKER_01Or by the sudden influx of threats and harassment directed at their personal communication devices.
SPEAKER_00This denied them any operational window to implement personal security measures, temporarily relocate, or psychologically prepare.
SPEAKER_01Victim advocates documented severe, immediate re-traumatization across the affected survivor cohort. This reveals the ultimate institutional paradox of the release.
SPEAKER_00The transparency statute was explicitly drafted to hold the network of perpetrators accountable by systematically stripping away the legal secrecy surrounding Epstein's operational parameters.
SPEAKER_01Yet the mechanical execution of that mandate achieved the exact opposite outcome. The high-profile individuals documented on the flight logs and the financial network executives remained perfectly protected.
SPEAKER_00The redactions applied to their identifying information functioned exactly as intended. Meanwhile, the victims were fully and permanently exposed through redactions that fundamentally failed.
SPEAKER_01In response to this systemic failure, survivors initiated a coordinated legal countermeasure. The litigation is anchored by claims filed under the Privacy Act of 1974, targeting the Department of Justice directly.
SPEAKER_00The Privacy Act strictly prohibits federal agencies from disclosing personally identifiable records contained in a system of records without prior written consent.
SPEAKER_01It also mandates the implementation of rigorous administrative and technical safeguards to ensure the security of such records.
SPEAKER_00The lawsuit argues, based on the forensic evidence of the PDF files, that the DOJ fundamentally and systematically violated these statutory requirements.
SPEAKER_01This litigation marks an unprecedented historical threshold. It is a first time federal sex trafficking survivors have been forced to formally sue the United States Department of Justice for exposing their identities during a public disclosure operation.
SPEAKER_00The synthesis of the evidence from the January 30th release provides a definitive historical record. The Department of Justice utilized an insecure, technically prohibited redaction methodology.
SPEAKER_01They entirely bypassed mandatory quality assurance protocols that are standard across the legal industry.
SPEAKER_00The forensic evidence answers whether the government treated victim privacy with the same meticulous operational care it applies to those it actively protects. The documentation shows the government protected the powerful and exposed the vulnerable.
SPEAKER_01Next time on the Epstein files, they are suing.