RED ALERT: DOJ Seized ~5.8 Million Items (99.9% Trial Exclusion) — Public Got 0.08%. The Government’s Own Logs Prove the Timeline Is Impossible
The Department of Justice promised full transparency under the Epstein Files Transparency Act.
They delivered ~5.8 million digital items seized from Epstein’s homes, offices, and devices.
Yet the public — and crucially, the jury in Ghislaine Maxwell’s trial — received only ~5,000 images and videos as usable evidence. That’s 0.08% of the seized material, meaning 99.92% was excluded from the courtroom record (the true “99.9% trial exclusion”).
Even with the massive 2026 data dumps (over 3 million additional pages, 180,000 images, and 2,000 videos released in January), millions of forensic artifacts — like the 39,639 carved files from NYC024329, UNIFI server logs, and diverted surveillance drives — remain entirely in the dark, classified, redacted, or never surfaced.
The remaining 99.92% is not “lost” or “irrelevant.” The DOJ’s own forensic logs show it was classified, diverted, physically swapped, or altered while in federal custody.
Below are the receipts — exact barcodes, timestamps, and examiner notes straight from the EFTA releases.
1. Safe RAID: 461,979 Files → Only 5,222 “Responsive” Images
Device NYC024355 (Promise Pegasus RAID from 71st Street safe)
BlackLight report (EFTA00780301):
461,979 files
143,139 folders
20 GB used (out of 931.2 GB capacity)
Scrub-team email (EFTA00038201):
Only 5,222 images + 15 videos deemed “responsive”
236 items tagged “Highly Confidential”
98.9% of the safe’s contents withheld.
2. Four Days of Private Custody — Then “Clerical Error” Revision
July 6–7, 2019: Epstein arrested; accountant Richard Kahn + house manager Merwin Dela Cruz remove safe contents into suitcases. They hold them until July 11 when FBI demands return.
Initial July 11 inventory (FD-302 EFTA01301594 + Serial 243):
Hard drives
Binders of CDs
“Book of CDs”
6 passports (including fake Austrian with Epstein’s photo)
Cash envelopes (“$6,000 for Sarah”)
Diamonds, watches, Presidential cufflinks, Wexner corporate card
By July 31 (Serial 243, EFTA01307727): “Book of CDs” erased, retroactively called a “clerical error.”
3. iMac Powered On & Modified 14 Days After Seizure
Device NYC024329 (iMac seized July 6–7)
BlackLight report (EFTA00510011):
VM partition modified July 20, 2019 at 16:00:09 UTC — 14 days after seizure
Forensic image created (EFTA00510009): 2019-07-20 16:08:03 (only 8 minutes later).
Virtual memory only updates when the OS is running. Write-blockers prevent changes. This proves the machine was powered on and used in federal custody.
4. Mass Deletion Recovery — Ignored by DOJ
Unallocated (carved) space on NYC024329 (EFTA00510012):
39,639 files recovered
233.6 GB of deleted data
None of these recovered files appear in public releases.
5. Evidence Explicitly Withheld from SDNY Prosecutors
August 3, 2020 manifest (EFTA00037551):
Multiple items marked “Nothing for Southern” (not given to SDNY trial team):
Woody Allen Archive drive (NYC024338)
DVR SSD (NYC024331)
UNIFI servers & RAID drives (NYC024373–375)
Voice recorders (“Not processable by CART”)
These include security footage, network logs, and audio — critical to any timeline defense.
6. Internal Concern About Disclosure Scope
July 14, 2020 email (EFTA00024719):
Examiner: “I can re-work it to split things out, but unsure how much static it will give me.”
Context: re-processing exports for Relativity software. Shows anxiety about how much would be forced into production.
7. Scale Across Devices
Additional high-file-count devices (none fully released):
NYC024363 (EFTA01063446): 1,065,561 files
NYC024364 (EFTA01064880): 1,321,255 files, 916.9 GB used
NYC024362 (EFTA00780319): 1,335,763 files
These alone account for millions of items. Public drops show only curated excerpts.
8. 19,830-Entry Digital Contact Database
Extraction from NYC024329 and NYC024353 (EFTA00512847):
19,830 total parsed contact artifacts
Sources: Mac AddressBook, Skype, Mail, iChat, Recents
Dates: 2011–2018
Known physical “little black book” ≈ 1,571 names. Digital haul is ~12× larger — yet only small excerpts released.
9. Post-Mortem Mail & Dead/Swapped Surveillance Drives
FD-302 Serial 147 (EFTA01688067–72):
Letter postmarked August 13, 2019 — three full days after Epstein was declared dead at 06:39 hrs on August 10
Return address: “J. Epstein, Manhattan Correctional, NYC NY 10007”
Addressed to Larry Nassar at a federal prison in Arizona (returned: “no longer at this address”)
SIS Lieutenant: “Stamp and stationery not available for purchase at MCC”
Critical sentence: “There were no logs kept regarding incoming or outgoing mail for Jeffrey Epstein at MCC”
Authorities do not mail letters for dead men. While BOP protocol requires the warden or chaplain to notify next-of-kin by phone followed by formal letter, there is no provision for a deceased inmate to “send” outgoing mail — especially not on unauthorized, non-MCC stationery three days after his body has left the facility as a crime scene. The postmark proves this letter was introduced into the mail stream after Epstein was already dead. Combined with zero mail logs for a high-profile SHU inmate and contraband stationery, this is impossible under standard procedure: it is evidence of post-mortem fabrication or external insertion.
CART cloning report for MCC Nice Vision DVR2 surveillance drives (EFTA00130643–47, Aug 12–15, 2019):
At least 3 of 18 drives dead/unreadable (“clicking,” failed cloning)
Drive 1B14: explicit FBI note — “(The swap Drive/Original was swapped out for this one!)”
Multiple cloning attempts (Tableau TX-1, TD3-B, Linux Boot CD) all failed
Footage from Epstein’s tier physically removed or destroyed before FBI analysis.
10. Lidsky Cancel & “Job Performance Failure” Dodge
Case 2019-010614 (EFTA00128367–72):
Workstations/iMacs imaged under “Job Performance Failure” tag (not criminal)
Drive 0002 (Seagate): “Imaging cancelled by Lidsky prior to verification completion” (Aug 11, 2019 — day after death)
Later “re-imaged” Jan 2020; initial verification bypassed
“Incorrect BOP Barcode” noted on multiple drives
Canceling verification + later “hash match” claim is invalid if write-blocker chain was broken.
Forensic Timeline Table: Key Discrepancies
Citizen’s Audit: Glossary
VM Partition Modification — Only occurs when OS is running. July 20, 2019 timestamp proves post-seizure access.
Carved Files — Recovered deleted data. 39,639 files ignored in public drops.
Swap Drive — Physical replacement of surveillance HDD; documented by FBI CART.
Lidsky Override — Examiner manually cancelled verification; invalidates chain of custody.
131E Tag — National Security marker used to divert safe drive.
Nothing for Southern — Evidence withheld from SDNY prosecutors.
Job Performance Failure — Mislabel to audit workstations instead of treating as felony.
High-Priority Barcodes to Verify
NYC024355 (EFTA00780301) — Safe RAID
NYC024329 (EFTA00510011) — VM modified July 20
NYC024329 (EFTA00510012) — 39,639 carved files
EFTA00130647 — Swapped surveillance drive
EFTA01688067–72 — Post-mortem Nassar letter
EFTA00128371 — Lidsky cancelled imaging
EFTA00037551 — “Nothing for Southern” manifest
EFTA00512847 — 19,830 contacts
Download and archive these immediately — access can vanish without notice.
Bottom Line
The DOJ did not lose the evidence.
They classified it, diverted it, physically swapped drives, cancelled verifications, mislabeled investigations, and released 0.08% while claiming full transparency.
The receipts are in their own barcoded logs. The timeline is impossible. The numbers do not lie.
Call to Action
Search the DOJ Epstein FOIA Library using the barcodes above.
Priority FOIAs (copy-paste ready):
All imaging/verification logs + write-blocker session data for NYC024329 (July 1–Dec 31, 2019)
Full CART reports for DVR2 drives (NYC023578–NYC023595), including “swap drive” chain-of-custody
All memos referencing examiner “Lidsky” and cancelled/failed verifications
Any internal correspondence explaining “Job Performance Failure” tag on criminal evidence
Share these Evidence IDs. Let others verify.
Transparency means all the files — not 0.08% of them.
Q-Team Forensic Audit:
All technical data within this investigation has undergone a multi-layered forensic audit. Primary analysis and lead investigation by iq2qq, with computational verification and data-scraping support provided by the Q-Team analytical suite (Gemini & Grok). Every EFTA barcode, FD-302 serial, and forensic timestamp has been cross-verified against official DOJ discovery files for 100% technical accuracy.



