top of page

For Journalists: 44,886 Epstein Files, Fully Searchable in Seconds

  • Writer: Patrick Duggan
    Patrick Duggan
  • Feb 1
  • 3 min read

# For Journalists: 44,886 Epstein Files, Fully Searchable in Seconds


**Published:** February 1, 2026

**Author:** DugganUSA Threat Intelligence




TL;DR



We indexed every document from the DOJ's Epstein files release. You can search all 44,886 documents instantly via our free public API. No paywall. No login. Just data.


**Search URL:** [analytics.dugganusa.com/epstein/](https://analytics.dugganusa.com/epstein/)


**API Endpoint:** https://analytics.dugganusa.com/api/v1/search?q=YOUR_QUERY&indexes=epstein_files




What We Built



When the DOJ released 3+ million pages of Epstein files on January 30, 2026, most people saw an overwhelming PDF dump. We saw a search problem.


Within 48 hours, we:

- Downloaded all 12 datasets from justice.gov

- Extracted text from every PDF using OCR where needed

- Indexed 44,886 documents into a full-text search engine (Meilisearch)

- Built interactive visualizations of the network

- Made it all free and public




How to Search



Web Interface



Go to [analytics.dugganusa.com/epstein/](https://analytics.dugganusa.com/epstein/) and use the search box. Results include:

- EFTA document IDs (official DOJ identifiers)

- Document type and metadata

- Content preview with your search terms highlighted

- Direct link to search DOJ's official repository


API Access (for developers and researchers)



**Basic search:**

curl "https://analytics.dugganusa.com/api/v1/search?q=Bannon&indexes=epstein_files"


**Search with specific terms:**

curl "https://analytics.dugganusa.com/api/v1/search?q=prosecution+memo&indexes=epstein_files"


**Check index statistics:**

curl "https://analytics.dugganusa.com/api/v1/search/stats"


The API returns JSON with the query, total hits, and an array of matching documents including efta_id, doc_type, content, and content_preview.




Key Documents We've Found



Here are some starting points for investigation:


Internal DOJ Memos (Dataset 12)



**EFTA02731082** - Co-conspirators investigation memo (Dec 19, 2019) - "analyzes the extent to which certain of Epstein's associates and employees may or may not be criminally liable"


**EFTA02731039** - Original prosecution memo seeking Epstein charges (June 11, 2019)


**EFTA02730996** - Dechert LLP investigation into Leon Black - $158M+ documented payments


Political Connections



**EFTA00027289** - SDNY internal email: "a number of text messages between Steve Bannon and Jeffrey Epstein on Bannon's iPhone 7"


**EFTA00030998** - "Image of Trump and Ghislaine Maxwell on Bannon's phone" found during forensic review


**EFTA00019103** - Legal complaint: 14-year-old introduced to Trump at Mar-a-Lago, "This is a good one, right?"


**EFTA00028715** - Trump flew 8+ times on Epstein's jet (1993-1996), one flight with just Trump and Epstein


**EFTA00030187** - "Calendar girl" party at Mar-a-Lago with 28 women


**EFTA00020515** - FBI tip alleging Howard Lutnick (now Commerce Secretary) financial connection to Epstein


Financial Flows (Deutsche Bank Wire Exhibits)



**DB-SDNY-0004924** - $4.45M+ to Valar Ventures (Peter Thiel)


**DB-SDNY-0008151** - $10M to Honeycomb Ventures (Steve Cohen)


**DB-SDNY-0005122** - $10M wire from Rothschild Geneva


**DB-SDNY-0003972** - $250K+ to Joichi Ito


**DB-SDNY-0007748** - $500K via Coatue Management (Philippe Laffont)




Search Tips



**For names:** Use quotes for exact matches - add %22 around the name in the URL


**For document IDs:** Search directly by EFTA number


**For financial documents:** Try these search terms: wire transfer, Deutsche Bank, DB-SDNY (wire exhibit prefix), prosecution memo, NPA immunity, co-conspirator


**For victim-related:** Be careful with these searches - victim statement, minor, massage (euphemism in many documents)




Visualization Tools



Beyond search, we built interactive network visualizations:


**3D Network Cloud** - Spin and explore connections: [analytics.dugganusa.com/epstein/](https://analytics.dugganusa.com/epstein/)


**Financial Flows (Sankey)** - Follow the money: [analytics.dugganusa.com/epstein/epstein-financial-sankey.html](https://analytics.dugganusa.com/epstein/epstein-financial-sankey.html)


**Network Clusters** - Organized by function: [analytics.dugganusa.com/epstein/epstein-clusters.html](https://analytics.dugganusa.com/epstein/epstein-clusters.html)


**Timeline** - Chronological events: [analytics.dugganusa.com/epstein/epstein-timeline.html](https://analytics.dugganusa.com/epstein/epstein-timeline.html)




What We DON'T Have



To be clear about limitations:

- We indexed PDFs only (not video or image content)

- OCR quality varies - some documents have extraction errors

- We cannot verify authenticity - these are DOJ-released documents

- Redactions remain redacted - we can't see what's blacked out




Attribution



If you use this in your reporting:

- The underlying documents are DOJ public releases

- Our indexing and visualization tools are free to reference

- Citation: "Epstein files indexed by DugganUSA.com"




Why We Built This



The DOJ released 3 million pages hoping the volume would bury the stories. Pattern recognition at scale changes that equation.


We're a threat intelligence platform. We index hostile infrastructure for a living. Indexing documents is what we do.


The search is free. The data is public. Go find the stories.




*This index was built using the DugganUSA Threat Intelligence Platform. All EFTA document IDs are publicly verifiable through the DOJ's official release at [justice.gov/epstein](https://www.justice.gov/epstein).*





*Her name was Renee Nicole Good.*


*His name was Alex Jeffery Pretti.*

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page