FBI RecordsPARTIALLY REDACTED42 pages

FBI Electronic Device Forensics Report

FBI forensic analysis of computers, hard drives, phones, and digital media seized from Epstein's Manhattan and Palm Beach residences.

Date

2019

Source

FBI Regional Computer Forensics Laboratory

Court

Southern District of New York

FBI ELECTRONIC DEVICE FORENSICS REPORT FBI Regional Computer Forensics Laboratory — 2019

Following the July 2019 search warrants executed at Jeffrey Epstein's properties, the FBI's Regional Computer Forensics Laboratory (RCFL) processed and analyzed an extensive collection of electronic devices and digital storage media seized from the Manhattan townhouse at 9 East 71st Street and the Palm Beach estate at 358 El Brillo Way.

DEVICES SEIZED — MANHATTAN RESIDENCE: From the Manhattan townhouse, FBI agents seized multiple desktop computers, laptop computers, external hard drives, USB storage devices, smartphones, tablets, and the CDs recovered from the locked safe. The total volume of digital storage exceeded several terabytes. Agents also seized components of the residence's surveillance camera system, which included multiple recording devices connected to cameras placed throughout the property. The surveillance system was noted to be unusually extensive for a private residence.

DEVICES SEIZED — PALM BEACH RESIDENCE: Evidence previously collected from the Palm Beach property during earlier investigations, along with materials seized in 2019, included additional computer equipment, camera systems, and portable storage devices. The Palm Beach residence was known to have had a sophisticated surveillance apparatus, with hidden cameras documented by former household staff in interviews during the original 2006 investigation.

FORENSIC METHODOLOGY: The RCFL employed standard forensic imaging procedures, creating bit-for-bit copies of all digital media before conducting analysis. Analysts used specialized forensic software to recover deleted files, examine metadata, and reconstruct browsing histories, email records, and file access patterns. The analysis included recovering files from damaged or corrupted media and extracting data from encrypted volumes where legally authorized.

FINDINGS — PHOTOGRAPHIC MATERIAL: The forensic examination recovered thousands of photographs from the seized devices and media. Prosecutors disclosed that "hundreds — and perhaps thousands — of sexually suggestive photographs of fully or partially nude females" were found. Some of these images were recovered from devices that had been wiped or had files deleted, indicating attempts to destroy evidence. The photographs included metadata such as timestamps and, in some cases, device identifiers that could link images to specific cameras in specific locations.

FINDINGS — COMMUNICATIONS: Analysis of email accounts, messaging applications, and phone records revealed extensive communications between Epstein and associates including schedulers, pilots, household staff, and individuals involved in arranging visits by young women. These communications corroborated victim testimony about the recruitment and scheduling system described in court filings.

FINDINGS — FINANCIAL RECORDS: Digital financial records recovered from the devices documented patterns of payments to individuals and entities consistent with the financial network prosecutors outlined. These included wire transfers, cash withdrawal records, and records of payments to young women through intermediaries.

SURVEILLANCE SYSTEM ANALYSIS: The surveillance camera systems at both residences were of particular investigative interest. Former employees had testified that Epstein recorded visitors and activities throughout his properties. The FBI's analysis of the surveillance infrastructure sought to determine the extent of recording, the storage of footage, and whether recordings had been destroyed or remained on undiscovered media. The existence of these surveillance systems raised questions about whether Epstein used recorded material for purposes of blackmail or leverage, though the FBI has not publicly confirmed or denied recovering intact surveillance footage from the seized equipment.

CHAIN OF CUSTODY CONCERNS: Court filings by victims' attorneys raised concerns about the chain of custody for electronic evidence during the period between Epstein's death on August 10, 2019, and the processing of certain devices. These concerns centered on whether all seized materials were fully accounted for and whether any evidence may have been compromised during the transition from active prosecution to estate proceedings.

Tags

Digital ForensicsElectronic DevicesComputersHard DrivesSurveillanceRCFLEvidence Analysis

Related Documents

FBI Safe Contents — 9 East 71st Street

Detailed FBI inventory of the locked safe discovered during the July 2019 raid on Epstein's Manhattan townhouse, cataloging CDs, diamonds, cash, and a fraudulent passport.

July 2019

People Referenced

Related Sections

Privacy|Terms