FCC

Organization
Mentions
38
Relationships
0
Events
1
Documents
19
Also known as:
FCC (Federal Communications Commission) FCC Butner FCC Forrest City FCC Coleman (Medium) FCC Allenwood

Relationship Network

Loading... nodes
Interactive Network: Click nodes or edges to highlight connections and view details with action buttons. Drag nodes to reposition. Node size indicates connection count. Line color shows relationship strength: red (8-10), orange (6-7), yellow (4-5), gray (weak). Use legend and help buttons in the graph for more guidance.

Event Timeline

Interactive Timeline: Hover over events to see details. Events are arranged chronologically and alternate between top and bottom for better visibility.
No relationships found for this entity.
Date Event Type Description Location Actions
2017-05-01 N/A FCC website denial-of-service attacks N/A View

EFTA00036875.pdf

This document contains an email exchange between an Associate Warden at MCC New York and an employee in the Education Department at FCC Forrest City. The Associate Warden discusses ignoring "fake and non-factual information" circulating about them, expressing a willingness to protect their boss and maintain staff morale, while the correspondent offers prayers and support based on their past professional relationship at Yazoo.

Email thread
2025-12-25

EFTA00036439.pdf

This document is an email chain dated August 11, 2019, between two Federal Bureau of Prisons Lieutenants—one at MCC New York and one at FCC Coleman. The Lieutenant at MCC New York confirms they were 'on shift that morning' (referring to Epstein's death the previous day) and describes the scene as a 'media shit show.' They also mention going to the hospital to manage media interference while 'his body was there.'

Email correspondence
2025-12-25

EFTA00036437.pdf

An email chain between two Bureau of Prisons Lieutenants, one at MCC New York and one at FCC Coleman, discussing the immediate aftermath of Jeffrey Epstein's death in August 2019. The MCC Lieutenant confirms they were on shift the morning of the incident, describing it as a 'media shit show,' and details being sent to the hospital to protect staff from media harassment while Epstein's body was present.

Email chain / government correspondence
2025-12-25

EFTA00036164.pdf

This document is an email thread between electronics technicians at various Federal Bureau of Prisons facilities (Otisville, Houston, Sandstone) and external support (SigNet Technologies) dated August 8-9, 2019. The correspondence details widespread technical failures with the 'NICEVision' and 'AMS' video surveillance systems following a software update, specifically citing 'Database Errors' and display glitches. These system failures occurred just days before Jeffrey Epstein's death in federal custody on August 10, 2019.

Email thread / technical support log
2025-12-25

EFTA00036105.pdf

This document is an email dated August 18, 2019 (8 days after Jeffrey Epstein's death) from a Correctional Systems Officer at FCC Butner. The subject is 'WELLNESS CHECK'. The email logs multiple failed attempts on August 17 and 18 to contact 'Officer Thomas' and 'Officer Noel' via telephone. Given the context and timing, these likely refer to Tova Noel and Michael Thomas, the guards on duty during Epstein's suicide.

Email / internal memo
2025-12-25

EFTA00029606.pdf

This document is a 'White Collar Law360' email newsletter dated July 14, 2021, summarizing various legal news stories, court rulings, and job moves. It mentions Jeffrey Epstein in a brief 'People' section note about Cooley LLP hiring a former New York federal prosecutor who previously led prosecutions against Epstein and Michael Cohen. The newsletter also covers the conviction of Paul Manafort's banker, Stephen Calk, and allegations against the Serious Fraud Office (SFO).

Email newsletter (law360)
2025-12-25

EFTA00003117.pdf

This document is a photograph of the specification label on the back of an HP Slimline Desktop PC (Model 260-a010). It displays the Serial Number CNV716004Y and Product Number V8P51AA#ABA. The image is marked with the evidence identifier EFTA00003117, suggesting it is a photo of computer hardware seized or processed as evidence in the investigation.

Photograph of evidence (computer hardware label)
2025-12-25

EFTA00003116.pdf

This document is a photograph of the specification label on the back of an HP Slimline Desktop PC (Model 260-a010), likely seized as evidence. It details the Serial Number (CNV7160050), Product Number (V8P51AA#ABA), and various regulatory compliance codes (CMIIT ID 2016DJ1509 indicates a 2016 certification). The label bears the evidence file stamp EFTA00003116.

Evidence photograph (hardware label)
2025-12-25

EFTA00003115.pdf

This document is an evidence photograph (marked EFTA00003115) showing the product label of an HP Slimline Desktop PC (Model 260-a010, Serial No. CNV7160050). The label details technical specifications, regulatory compliance marks for various countries, and indicates the device was manufactured in China, likely around 2016 based on the regulatory IDs.

Evidence photograph - computer hardware label
2025-12-25

EFTA00003033.pdf

This document is a photograph of an evidence item, specifically the regulatory label on the back of a Dell computer (Reg Model D19M, likely a desktop tower). The label indicates the device was assembled in Mexico and contains a wireless module (QCNFA335) approved in 2013. The image bears the evidence tag 'EFTA00003033' in the bottom right corner, suggesting it was cataloged as part of a legal discovery or investigation process, likely related to the seizure of electronic equipment.

Photograph of physical evidence (computer hardware label)
2025-12-25

EFTA00003032.pdf

Photograph of the rear specification label of a Dell electronic device (Regulatory Model D19M), likely a desktop computer or All-in-One unit. The label displays technical specifications, regulatory compliance codes (FCC, IC), and indicates the device was assembled in Mexico. The image is marked with the evidence identification number EFTA00003032.

Evidence photograph (hardware label)
2025-12-25

EFTA00003030.pdf

This document is a photograph of the rear panel of an Apple iMac computer (Model A1311), likely seized as physical evidence. It displays the device's regulatory markings, power specifications, and unique identifiers, specifically Serial Number W804736DDAS and EMC No. 2389. The image includes an evidence tracking number 'EFTA00003030' in the bottom right corner.

Photograph of physical evidence (computer hardware)
2025-12-25

EFTA00002905.pdf

A close-up photograph of the back panel of an Apple iMac computer, serving as physical evidence (marked EFTA00002905). The image captures the regulatory markings, model number (A1419), EMC number (2806), and the specific serial number (C02NM1M0FY14) identifying the device.

Photograph of physical evidence (computer hardware)
2025-12-25

EFTA00002640.pdf

This document is a photograph of a piece of physical evidence, specifically a Ubiquiti UniFi Cloud Key (Model UC-CK), which is a hardware controller for network devices. The device label includes regulatory information (FCC compliance), the manufacturer's address in New York, and technical specifications like the MAC ID area. The image is marked with the Bates stamp 'EFTA00002640' in the bottom right corner, associating it with the Epstein investigation files.

Photograph of physical evidence (it hardware)
2025-12-25

EFTA00002534.pdf

This is a photograph of physical evidence, specifically the rear panel of a Ubiquiti Networks 'UniFi Server' (Model M/N: UAS). The device features various ports including IPMI LAN, USB, and VGA. The image includes an evidence tracking number 'EFTA00002534' in the bottom right corner. This type of server is often used for running network applications or managing surveillance camera systems (UniFi Video/Protect).

Photograph of physical evidence (computer hardware)
2025-12-25

EFTA00002463.pdf

This document is a photograph of physical evidence, specifically the underside of a laptop computer. It shows the device's ventilation grille, rubber foot, and faint regulatory markings including FCC and UL logos. The image is marked with the identifier EFTA00002463 in the bottom right corner.

Photograph of physical evidence
2025-12-25

DOJ-OGR-00031640.jpg

This document is a BellSouth Telecommunications bill dated April 5, 2005, detailing current charges for a monthly local service period from April 5 to May 4. The itemized charges include a residential line, a Federal Universal Service Charge, an Emergency 911 charge billed on behalf of Palm Beach County, and an FCC authorized charge for network access.

Utility bill
2025-11-20

HOUSE_OVERSIGHT_025658.jpg

This document is a 'SmartBrief' news digest dated approximately May 11, 2017. It highlights current events including President Trump's firing of FBI Director James Comey, FCC website attacks, and a currency exchange experiment by FiveThirtyEight. It bears a 'HOUSE_OVERSIGHT' Bates stamp, suggesting it was part of a document production for a congressional investigation.

Newsletter / email digest (smartbrief)
2025-11-19

HOUSE_OVERSIGHT_025646.jpg

This document is a printed copy of a 'SmartBrief' digital newsletter dated May 11, 2017. It summarizes current political events, primarily focusing on President Trump firing FBI Director James Comey, alongside a story about currency exchange fees and a quote from HHS Secretary Tom Price. The document bears a 'HOUSE_OVERSIGHT' bates stamp, indicating it was part of a document production for a congressional investigation, though the content itself is a general news digest.

News digest / email newsletter
2025-11-19
Total Received
$0.00
0 transactions
Total Paid
$0.00
0 transactions
Net Flow
$0.00
0 total transactions
No financial transactions found for this entity. Entity linking may need to be improved.
As Sender
0
As Recipient
0
Total
0
No communications found for this entity. Entity linking may need to be improved.

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein entity