Hey, it's the creator of the Epstein files.
Before we get into today's episode,
“I need to tell you about my brand new podcast, "War Desk".”
If you value how we fact-check the narrative and follow the raw data on this show, "War Desk" is built for you. It's a massive ongoing investigation into the rapidly escalating developments
happening in the Middle East right now. It is completely postpartisan and follows the facts. Instead of cable news talking points, we go straight to the source to explain the reality of global conflict.
Search for "War Desk" on Apple podcasts or Spotify right now, or check this episode's description for the links and hit follow. All right, let's get into the episode. (upbeat music)
Three million pages of evidence,
thousands of unsealed flight logs, millions of data points, names, themes, and timelines connected. You are listening to the Epstein files. The world's first AI native investigation
into the case that traditional journalism simply could not handle. Welcome back to the Epstein files.
“On March 5, 2026, the DOJ released FBI interview memos”
that had initially withheld from the EFTA release, memos related to allegations about Donald Trump. And PR broke the story that these files were removed. Now, we have those memos plus the J-mail email archive with dozens of emails between Epstein, Maxwell,
and their attorneys that reference Trump directly. Every document is at EpsteinFiles.fm. So the place to start is December 2015 when Epstein email in New York Times reporter and offer him photos of Donald with girls in bikinis
in his kitchen.
Right, the primary record initiating this specific timeline
is document EFTA 802478352. You look at the metadata and it confirms the transmission date is exactly December 9, 2015. And the designated recipient here is Land and Thomas Jr. You have to evaluate the recipient
to understand the strategy Epstein is deploying. Land and Thomas Jr. operated as a financial reporter for the New York Times. He focused on Wall Street. He focused on global finance.
Exactly. He was not a gossip columnist. He was not affiliated with the tabloid. And the text to the emails highly explicit. Epstein writes, and the quotation is exact.
Would you like photos of Donald and girls and bikinis in my kitchen? We assess this communication by placing it against the external timeline.
December 2015 represents the exact period
when the 2016 Republican primary campaign was escalating. The documents show Epstein actively attempting to insert compromising material into the public record through a major publication. You have a registered sex offender operating
under the restrictions of a 2008 non-prosecution agreement. Proactively reaching out to a newspaper record. He is initiating the conduct. Right, he's initiating. The specific offer of photographs
depicting a presidential candidate with women and bikinis inside Epstein's personal residence requires careful analysis. You specify the location as his kitchen. The specification of the kitchen is a calculated detail.
In the mechanics of source cultivation, a kitchen represents a private internal space. It establishes a high degree of access and proximity. Epstein is not offering photographs from a public charity gala, or a crowded formal event
where incidental contact occurs. He is signaling to the reporter that the candidate was present in the interior residential space of his home. And when you review the supplementary evidence
within the specific correspondence chain, the operational strategy becomes much clearer. Epstein includes references to a bet involving Marla Maples. He introduces mentions of Hawaiian tropic judges. Examining how these specific references function
“in the correspondence is essential for the forensic audit.”
These references do not operate as casual anecdotes. Epstein structures the specific data points as leveraged commodities. He is offering these details to a financial journalist to demonstrate that he possesses verified,
unpublished information regarding the historical operations, a high profile political figure. He is establishing his credibility as a source of restricted intelligence. That doesn't add up when you compare it
to Epstein's public legal posture during this exact period. Throughout 2014 and 2015, the documented legal strategy managed by his attorneys prioritized the complete avoidance of public scrutiny. They were actively managing civil litigation
and attempting to minimize his public profile. - Actively contacting a New York Times reporter to pedal compromising photographs of a prominent political figure invites immediate and intense media scrutiny.
The documentation indicates he prioritized the injection of these specific images into the 2016 election cycle over his own established legal containment strategy. - The action itself is permanently documented in the archive. Document EFTA0247-8352 proves Epstein possessed
or directly claimed to possess these photographs and actively sought a publication partner to distribute them. Epstein is utilizing his historical proximity to Donald Trump as institutional currency.
- To comprehend the foundation of that proximity
The mechanics of how it was managed internally
by Epstein and Gisland Maxwell,
“we shift our focus to the newly released 2006 J-mail archive.”
Specifically, the records obtained through the House Oversight Committee release from November 2025. - The baseline document for this association is a September 15th, 2006 email.
The EFTA document ID for your references, F770C22395, F2B9D3768013CT9, CO0. The communication originates from Gisland Maxwell. She is utilizing a minespring.com email address. She transmits a master guest list to Jeffrey Epstein
for his direct review. - When you audit the names on this list, it contains over 50 prominent figures representing the apex of finance, academia, international royalty, and real estate.
The names explicitly listed include Larry Summers, Leon Black, the Duke and Duchess of York. - Yeah, I'm Donald Trump. - And Donald Trump, the metadata on this exchange provides a highly specific operational timeline.
Maxwell's initial transmission request direction, she writes, Pills Review List and Adder Remove Peeps. - The audit trail shows that it's 03.20Z.
“Epstein replies from a Yahoo Mail account”
with direct, unambiguous instructions. The text is entirely in lowercase. He writes, "Remove Trump.Leeds, Ed, Earl Mac, David Gurgon, "more suckerman Jimmy Kane." He continues with further specific adjustments
to the roster. - The document show Epstein actively curating and restricting Trump's access to his primary social network as early as September 2006. The list Maxwell provided groups the individuals
who represented the absolute core of Epstein's social, political, and financial apparatus at that exact point in time. - Donald Trump is explicitly removed from this apparatus by Epstein's direct operational order.
Epstein is dictating the precise composition of his engagements. He is filtering out specific billionaires while simultaneously integrating others like Zuckerman and Kane.
This establishes a documented baseline of internal curation. Epstein is the entity enforcing the boundary. - Exactly three years after this email is logged,
“the parameters of the relationship shift significantly.”
The documentation moves from internal curation managed by Epstein to an external property ban enforced against him. - We transition to the July 2009 correspondence file. This file relates to the civil investigation managed by victims attorney Brad Edwards.
- Edwards engaged in investigator named Michelle Dargen pronounced to Gargen. To locate and interview individuals connected to the specific geographic locations where Epstein operated his network.
The documentation generated during this period
provides a critical secondary audit trail
regarding Epstein's physical access to Donald Trump's properties. On July 29, 2009, Michelle Dargen records a direct conversation with Donald Trump. Her investigative notes regarding the specific interaction are highly precise.
Dargen writes the following in her report. I spoke to Donald Trump today. He said Epstein is not a member and would not confirm her deny. He would not comment at all, which is very rare for him.
- You evaluate Dargen's specific observation at the end of that note. Doggen is functioning as an experience investigator. She specifically documents the anomaly of his silence. The phrase "would not confirm or deny"
is standard corporate legal terminology. - Right. - But she notes that utilizing this total silence is an operational deviation for this specific subject. - The subsequent documentation provides the context
for that silence. The following day, July 30, 2009, Brad Edwards provides written confirmation of the operational status of Epstein at the Mara Logo property.
Edwards transmits explicit confirmation to Dargen. He states that Epstein is banned from the club. The documentation records the specific reason for this ban. Edwards notes in the correspondence that a formal complaint was filed regarding Epstein
and Gyslain Maxwell taking a 15-year-old home with him from the Mara Logo property. - This is inconsistent when you evaluate the generalized public statements made by various parties regarding the nature
of the relationship over the years. The public narrative frequently suggests a continuous uninterrupted association that documented private actions prove a mutual mechanical separation.
The 2006 email proves Epstein restricted Trump from accessing his own curated events. The 2009 Dargen and Edwards correspondence proves Trump's corporate property formally banned Epstein due to a documented incident involving a minor.
- The relationship demonstrates a clear pattern of mechanical separation initiated independently by both sides at different intervals. - The enforcement of the July 2009 ban creates a highly specific jurisdictional and timeline issue
that becomes critical in subsequent civil litigation.
Because the victim's legal teams documented the ban in 2009. The physical location of Mara Logo itself became a fixed point in the timeline of the allegations. - The ban establishes that Epstein and Maxwell were physically present on the property prior to the complaint.
This fixed geographic and chronological point leads directly to the 2011 correspondence archive. - Right, where Epstein and Maxwell execute a strategy to weaponize Trump's corporate human resources records. - We examine the March 22 2011 email transmitted
From Gislane Maxwell to Jeffrey Epstein.
The specific document focuses on the allegations formally made by Virginia Dufre pronounced Dufre. Dufre stated in her legal claims
“that she was initially recruited into the network by Maxwell”
while she was working as a locker room attendant at the Mara Logo Club. - In this March 2011 email, Maxwell communicates a failure in their containment strategy. She writes, "I thought you said not to involve Donald.
"Now the diascast, you now have to get her employment record. "She had to be at least 16 to be in full-time employment." - The documents show a coordinated effort to weaponize Mara Logo employment records to dispute the timeline presented by Virginia Dufre.
The specific phrasing Maxwell uses, I thought you said not to involve Donald, indicates a prior strategic decision directed by Epstein. - The strategy was to avoid pulling Trump's corporate entity
and the associated media attention into their legal defense. Maxwell is explicitly stating that this containment protocol has failed. The phrase "now the die is cast,"
means they have exhausted other options. - They must now rely on the human resources documentation held by the club to prove Dufre was older than she claimed during her period of employment.
“- Epstein confirms the execution of this strategy”
in a follow-up email from July 2011. The text of his response is direct, he writes.
She was never 15 years old working for me.
Her story made it seem like she first worked for Trump at that age and was met by Gisling Maxwell. Total horseshit. - You evaluate the utility of the relationship at this juncture.
Epstein and Maxwell were not attempting to protect Trump from legal exposure. They were actively mining his corporate records to construct a viable alibi regarding the age of a primary victim.
- They required the Mara Logo employment files to establish a documented birth date and a verified hiring date to effectively counter Dufre's narrative in court. - The utility of the association
is entirely mechanical. When you evaluate the Florida Labor Statutes relevant to this period, the distinction between a 15-year-old employee and a 16-year-old employee carry significant legal weight regarding permitted hours
and occupational restrictions. - If Dufre claims she was 15 during the recruitment phase and the club's corporate records show she was 16 or 17,
Epstein's defense gains critical leverage
in disputing her overall credibility. If the timeline is disputed beyond but the specific employment records show, we don't have documentation for that. - The objective fact established by the March
and July 2011 emails is that Epstein and Maxwell viewed Trump's property records strictly as a defensive asset to be acquired and utilized for their own legal strategy. - This reliance on corporate records transitions us to the broader issue of institutional documentation
versus institutional concealment. The timeline brings us to the events of March 5, 2026. - On this date, the Department of Justice released a specific tranche of previously withheld FBI interview memos. These memos were initially absent
from the mandated Eftair release. NPR published a comprehensive investigative report detailing that files relating specifically to Donald Trump were actively removed from the initial public disclosure pipeline. - The mechanics of this institutional complicity
require a careful review. The Eftair files transparent the act mandates the comprehensive release of related documents. When you review the audit trail of the Eftair release, it reveals a specific internal filtering process
operating at the DOJ level. - The act of removal of interview memos regarding a specific political figure demonstrates a secondary layer of curation. - This curation was performed not by Epstein
or his attorneys, but by federal authorities managing the public record. The March 5 release restored a portion of these documents, providing new forensic data for our review. - Among the newly available records
restored to the public domain is an undated email from Jeffrey Epstein to Gisling Maxwell. The document is identified in the database as E-A-I-0233-2225. For tracking purposes, we refer to this
as the undated blackmail memo. - In this internal communication, Epstein transmits the following text to Maxwell. - Yeah. - Remember, he is the one who was blackmailed
by the Gurin PB from Donad Trump's party. - The text contains distinct typographical errors. Epstein types Gur instead of Gurl and Donad instead of Donald. These errors indicate a rapid, informal communication style transmitted without review.
“You must separate the fact of the email's existence”
from the allegation it contains. We have verified documentation that Epstein claimed a blackmail incident occurred at a Palm Beach party connected to Trump. - Epstein is asserting this specific event
to Maxwell as a shared historical memory. He utilizes the phrase, "Remember he is the one "implying Maxwell possesses prior knowledge "of the event or the individual involved." However, we do not have documentation verifying
the blackmail itself. The email proves Epstein discussed a blackmail event
involving a third party with his co-conspirator.
It does not provide the underlying evidence of the event, the mechanics of the extortion, or the verified identity of the person who was allegedly blackmailed. - Maintaining a strict forensic protocol
Is necessary when evaluating these specific federal releases.
We analyzed what was intentionally removed from the initial Eftere release, what was restored on March 5, and what remains permanently unknown in the heavily redacted sections.
- The FBI interview memos now available
“in the public domain indicate that federal agents”
actively questioned multiple witnesses regarding Trump's proximity to Epstein's operational network. - The DOJ's initial documented decision to withhold these specific memos indicates a failure in the standard release protocol.
The audit trail suggests the protocol prioritized the reduction of files associated with political figures over the statutory requirement for comprehensive disclosure. - We synthesize the available evidence by explicitly listing what the documents prove beyond speculation.
The metadata confirms Epstein was actively curating Trump's present within his network, as documented in the September 2006 guest list, where Epstein issued the direct order to remove him. - The investigative notes compiled
by Michelle Dorgan and Brad Edwards in 2009, document the Mara Logo ban, resulting from a specific complaint regarding the removal of a minor from the property.
“- The March and July 2011 emails prove Epstein and Maxwell”
strategize to acquire and utilize Trump's corporate employment records for their legal defense against Virginia jeffrey.
- Finally, the December 2015 communication proves Epstein
explicitly offered compromising photographs of Trump to land and Thomas Jr. at the New York Times during an active political campaign. We contrast this established documented record with what remains unverified allegation.
- We lack the underlying details, police reports or financial records associated with the Palm Beach Blackmail claim, mentioned in the undated EFTA02332225 document. We do not have the contents or verified descriptions
of the unreleased photos offered to the New York Times in 2015. - We also lack the full scope of the withheld FBI memos. As the March five release still contains extensive protections regarding the specific nature of the witness testimonies and the identities
of the individuals questioned by federal agents. - The forensic analysis requires evaluating the mechanics of the relationship and the subsequent institutional concealment impartially. The correspondent's archive demonstrates
a highly transactional mechanically managed association. - From 2006 to 2015, the documents show Epstein excluding Trump from his private engagements. Trump's corporate entity banning Epstein from its property. Epstein attempting to extract defense material
from Trump's human resources departments
and Epstein finally attempting to leverage
alleged compromising images of Trump to the press. - The DOJ's subsequent filtering of the FBI interview memos adds a distinct institutional layer to the handling of this historical relationship. - The documentation provides a framework of mutual utilization
and eventual documented hostility. The emails do not show a collaborative partnership. They show a continuous sequence of boundary enforcement, defensive legal maneuvering, and attempted exploitation. - The records establish the parameters
of their interactions with exact dates, precise timestamps, and stated strategic objectives. We rely entirely on the text of the J-mail archive and the DOJ Efti releases to construct this timeline. - Before we conclude the review
of this specific document launch,
“you have to consider the operational security implications”
of Epstein's 2015 media outreach. If Epstein was willing to digitally transmit an offer to provide the New York Times with photographs of a presidential candidate with women and bikinis in his kitchen,
you must evaluate what collateral he chose not to reference an unencrypted email. - The digital archives records the solicitation, the physical location of the hard drives that contain the actual images from that Palm Beach kitchen
remains unaccounted for in the federal inventory. - We'll be watching this closely. If more documents surface, we'll be back with an update. (upbeat music) - You have just heard an analysis of the official record.
Every claim, name, and date mentioned in this episode is backed by primary source documents. You can view the original files for yourself at EpsteinFiles.fm.
If you value this data first approach to journalism,
please leave a five-star review wherever you're listening right now. It helps keep this investigation visible. We'll see you in the next file. (upbeat music)


