For Journalists: 44,886 Epstein Files, Fully Searchable in Seconds
- Patrick Duggan
- Feb 1
- 3 min read
# For Journalists: 44,886 Epstein Files, Fully Searchable in Seconds
**Published:** February 1, 2026
**Author:** DugganUSA Threat Intelligence
TL;DR
We indexed every document from the DOJ's Epstein files release. You can search all 44,886 documents instantly via our free public API. No paywall. No login. Just data.
**Search URL:** [analytics.dugganusa.com/epstein/](https://analytics.dugganusa.com/epstein/)
**API Endpoint:** https://analytics.dugganusa.com/api/v1/search?q=YOUR_QUERY&indexes=epstein_files
What We Built
When the DOJ released 3+ million pages of Epstein files on January 30, 2026, most people saw an overwhelming PDF dump. We saw a search problem.
Within 48 hours, we:
- Downloaded all 12 datasets from justice.gov
- Extracted text from every PDF using OCR where needed
- Indexed 44,886 documents into a full-text search engine (Meilisearch)
- Built interactive visualizations of the network
- Made it all free and public
How to Search
Web Interface
Go to [analytics.dugganusa.com/epstein/](https://analytics.dugganusa.com/epstein/) and use the search box. Results include:
- EFTA document IDs (official DOJ identifiers)
- Document type and metadata
- Content preview with your search terms highlighted
- Direct link to search DOJ's official repository
API Access (for developers and researchers)
**Basic search:**
curl "https://analytics.dugganusa.com/api/v1/search?q=Bannon&indexes=epstein_files"
**Search with specific terms:**
curl "https://analytics.dugganusa.com/api/v1/search?q=prosecution+memo&indexes=epstein_files"
**Check index statistics:**
curl "https://analytics.dugganusa.com/api/v1/search/stats"
The API returns JSON with the query, total hits, and an array of matching documents including efta_id, doc_type, content, and content_preview.
Key Documents We've Found
Here are some starting points for investigation:
Internal DOJ Memos (Dataset 12)
**EFTA02731082** - Co-conspirators investigation memo (Dec 19, 2019) - "analyzes the extent to which certain of Epstein's associates and employees may or may not be criminally liable"
**EFTA02731039** - Original prosecution memo seeking Epstein charges (June 11, 2019)
**EFTA02730996** - Dechert LLP investigation into Leon Black - $158M+ documented payments
Political Connections
**EFTA00027289** - SDNY internal email: "a number of text messages between Steve Bannon and Jeffrey Epstein on Bannon's iPhone 7"
**EFTA00030998** - "Image of Trump and Ghislaine Maxwell on Bannon's phone" found during forensic review
**EFTA00019103** - Legal complaint: 14-year-old introduced to Trump at Mar-a-Lago, "This is a good one, right?"
**EFTA00028715** - Trump flew 8+ times on Epstein's jet (1993-1996), one flight with just Trump and Epstein
**EFTA00030187** - "Calendar girl" party at Mar-a-Lago with 28 women
**EFTA00020515** - FBI tip alleging Howard Lutnick (now Commerce Secretary) financial connection to Epstein
Financial Flows (Deutsche Bank Wire Exhibits)
**DB-SDNY-0004924** - $4.45M+ to Valar Ventures (Peter Thiel)
**DB-SDNY-0008151** - $10M to Honeycomb Ventures (Steve Cohen)
**DB-SDNY-0005122** - $10M wire from Rothschild Geneva
**DB-SDNY-0003972** - $250K+ to Joichi Ito
**DB-SDNY-0007748** - $500K via Coatue Management (Philippe Laffont)
Search Tips
**For names:** Use quotes for exact matches - add %22 around the name in the URL
**For document IDs:** Search directly by EFTA number
**For financial documents:** Try these search terms: wire transfer, Deutsche Bank, DB-SDNY (wire exhibit prefix), prosecution memo, NPA immunity, co-conspirator
**For victim-related:** Be careful with these searches - victim statement, minor, massage (euphemism in many documents)
Visualization Tools
Beyond search, we built interactive network visualizations:
**3D Network Cloud** - Spin and explore connections: [analytics.dugganusa.com/epstein/](https://analytics.dugganusa.com/epstein/)
**Financial Flows (Sankey)** - Follow the money: [analytics.dugganusa.com/epstein/epstein-financial-sankey.html](https://analytics.dugganusa.com/epstein/epstein-financial-sankey.html)
**Network Clusters** - Organized by function: [analytics.dugganusa.com/epstein/epstein-clusters.html](https://analytics.dugganusa.com/epstein/epstein-clusters.html)
**Timeline** - Chronological events: [analytics.dugganusa.com/epstein/epstein-timeline.html](https://analytics.dugganusa.com/epstein/epstein-timeline.html)
What We DON'T Have
To be clear about limitations:
- We indexed PDFs only (not video or image content)
- OCR quality varies - some documents have extraction errors
- We cannot verify authenticity - these are DOJ-released documents
- Redactions remain redacted - we can't see what's blacked out
Attribution
If you use this in your reporting:
- The underlying documents are DOJ public releases
- Our indexing and visualization tools are free to reference
- Citation: "Epstein files indexed by DugganUSA.com"
Why We Built This
The DOJ released 3 million pages hoping the volume would bury the stories. Pattern recognition at scale changes that equation.
We're a threat intelligence platform. We index hostile infrastructure for a living. Indexing documents is what we do.
The search is free. The data is public. Go find the stories.
*This index was built using the DugganUSA Threat Intelligence Platform. All EFTA document IDs are publicly verifiable through the DOJ's official release at [justice.gov/epstein](https://www.justice.gov/epstein).*
*Her name was Renee Nicole Good.*
*His name was Alex Jeffery Pretti.*




Comments