| Date | Event Type | Description | Location | Actions |
|---|---|---|---|---|
| 2017-05-01 | N/A | FCC website denial-of-service attacks | N/A | View |
This document contains an email exchange between an Associate Warden at MCC New York and an employee in the Education Department at FCC Forrest City. The Associate Warden discusses ignoring "fake and non-factual information" circulating about them, expressing a willingness to protect their boss and maintain staff morale, while the correspondent offers prayers and support based on their past professional relationship at Yazoo.
This document is an email chain dated August 11, 2019, between two Federal Bureau of Prisons Lieutenants—one at MCC New York and one at FCC Coleman. The Lieutenant at MCC New York confirms they were 'on shift that morning' (referring to Epstein's death the previous day) and describes the scene as a 'media shit show.' They also mention going to the hospital to manage media interference while 'his body was there.'
An email chain between two Bureau of Prisons Lieutenants, one at MCC New York and one at FCC Coleman, discussing the immediate aftermath of Jeffrey Epstein's death in August 2019. The MCC Lieutenant confirms they were on shift the morning of the incident, describing it as a 'media shit show,' and details being sent to the hospital to protect staff from media harassment while Epstein's body was present.
This document is an email thread between electronics technicians at various Federal Bureau of Prisons facilities (Otisville, Houston, Sandstone) and external support (SigNet Technologies) dated August 8-9, 2019. The correspondence details widespread technical failures with the 'NICEVision' and 'AMS' video surveillance systems following a software update, specifically citing 'Database Errors' and display glitches. These system failures occurred just days before Jeffrey Epstein's death in federal custody on August 10, 2019.
This document is an email dated August 18, 2019 (8 days after Jeffrey Epstein's death) from a Correctional Systems Officer at FCC Butner. The subject is 'WELLNESS CHECK'. The email logs multiple failed attempts on August 17 and 18 to contact 'Officer Thomas' and 'Officer Noel' via telephone. Given the context and timing, these likely refer to Tova Noel and Michael Thomas, the guards on duty during Epstein's suicide.
This document is a 'White Collar Law360' email newsletter dated July 14, 2021, summarizing various legal news stories, court rulings, and job moves. It mentions Jeffrey Epstein in a brief 'People' section note about Cooley LLP hiring a former New York federal prosecutor who previously led prosecutions against Epstein and Michael Cohen. The newsletter also covers the conviction of Paul Manafort's banker, Stephen Calk, and allegations against the Serious Fraud Office (SFO).
This document is a photograph of the specification label on the back of an HP Slimline Desktop PC (Model 260-a010). It displays the Serial Number CNV716004Y and Product Number V8P51AA#ABA. The image is marked with the evidence identifier EFTA00003117, suggesting it is a photo of computer hardware seized or processed as evidence in the investigation.
This document is a photograph of the specification label on the back of an HP Slimline Desktop PC (Model 260-a010), likely seized as evidence. It details the Serial Number (CNV7160050), Product Number (V8P51AA#ABA), and various regulatory compliance codes (CMIIT ID 2016DJ1509 indicates a 2016 certification). The label bears the evidence file stamp EFTA00003116.
This document is an evidence photograph (marked EFTA00003115) showing the product label of an HP Slimline Desktop PC (Model 260-a010, Serial No. CNV7160050). The label details technical specifications, regulatory compliance marks for various countries, and indicates the device was manufactured in China, likely around 2016 based on the regulatory IDs.
This document is a photograph of an evidence item, specifically the regulatory label on the back of a Dell computer (Reg Model D19M, likely a desktop tower). The label indicates the device was assembled in Mexico and contains a wireless module (QCNFA335) approved in 2013. The image bears the evidence tag 'EFTA00003033' in the bottom right corner, suggesting it was cataloged as part of a legal discovery or investigation process, likely related to the seizure of electronic equipment.
Photograph of the rear specification label of a Dell electronic device (Regulatory Model D19M), likely a desktop computer or All-in-One unit. The label displays technical specifications, regulatory compliance codes (FCC, IC), and indicates the device was assembled in Mexico. The image is marked with the evidence identification number EFTA00003032.
This document is a photograph of the rear panel of an Apple iMac computer (Model A1311), likely seized as physical evidence. It displays the device's regulatory markings, power specifications, and unique identifiers, specifically Serial Number W804736DDAS and EMC No. 2389. The image includes an evidence tracking number 'EFTA00003030' in the bottom right corner.
A close-up photograph of the back panel of an Apple iMac computer, serving as physical evidence (marked EFTA00002905). The image captures the regulatory markings, model number (A1419), EMC number (2806), and the specific serial number (C02NM1M0FY14) identifying the device.
This document is a photograph of a piece of physical evidence, specifically a Ubiquiti UniFi Cloud Key (Model UC-CK), which is a hardware controller for network devices. The device label includes regulatory information (FCC compliance), the manufacturer's address in New York, and technical specifications like the MAC ID area. The image is marked with the Bates stamp 'EFTA00002640' in the bottom right corner, associating it with the Epstein investigation files.
This is a photograph of physical evidence, specifically the rear panel of a Ubiquiti Networks 'UniFi Server' (Model M/N: UAS). The device features various ports including IPMI LAN, USB, and VGA. The image includes an evidence tracking number 'EFTA00002534' in the bottom right corner. This type of server is often used for running network applications or managing surveillance camera systems (UniFi Video/Protect).
This document is a photograph of physical evidence, specifically the underside of a laptop computer. It shows the device's ventilation grille, rubber foot, and faint regulatory markings including FCC and UL logos. The image is marked with the identifier EFTA00002463 in the bottom right corner.
This document is a BellSouth Telecommunications bill dated April 5, 2005, detailing current charges for a monthly local service period from April 5 to May 4. The itemized charges include a residential line, a Federal Universal Service Charge, an Emergency 911 charge billed on behalf of Palm Beach County, and an FCC authorized charge for network access.
This document is a 'SmartBrief' news digest dated approximately May 11, 2017. It highlights current events including President Trump's firing of FBI Director James Comey, FCC website attacks, and a currency exchange experiment by FiveThirtyEight. It bears a 'HOUSE_OVERSIGHT' Bates stamp, suggesting it was part of a document production for a congressional investigation.
This document is a printed copy of a 'SmartBrief' digital newsletter dated May 11, 2017. It summarizes current political events, primarily focusing on President Trump firing FBI Director James Comey, alongside a story about currency exchange fees and a quote from HHS Secretary Tom Price. The document bears a 'HOUSE_OVERSIGHT' bates stamp, indicating it was part of a document production for a congressional investigation, though the content itself is a general news digest.
Discussion 0
No comments yet
Be the first to share your thoughts on this epstein entity