How to Search the Epstein Files: A Woody Allen Example
- Patrick Duggan
- Feb 3
- 3 min read
Updated: Apr 25
# How to Search the Epstein Files: A Woody Allen Example
**Author:** Patrick Duggan
**Category:** Tutorial, Epstein Files, OSINT
We've indexed 120,000+ documents from the DOJ's Epstein Files Transparency Act release. Here's how you can search them yourself - and what we found when we searched for "Woody Allen."
The Search Results
Searching our index for "Woody Allen" returns **11 exact matches** across the EFTA documents:
Finding #1: The "Woody Allen Archive" Hard Drive
**Document:** EFTA00037551 (Dataset 8)
**Source:** FBI Evidence Inventory Email (August 3, 2020)
This is from an internal FBI email cataloging evidence seized from Epstein's properties. Evidence item NYC024338 is a Seagate external hard drive that Epstein personally labeled "Woody Allen Archive" containing Woody Allen movies.
**Key detail:** The status "Nothing for Southern" means it was not provided to the Southern District of New York prosecution team - deemed not relevant to the criminal case.
Finding #2: Daily Beast Article in Maxwell Trial Docs
**Document:** EFTA00040083 (Dataset 10)
**Source:** Maxwell Trial Exhibit/Reference List
This appears in a numbered list of articles and documents that prosecutors compiled during Ghislaine Maxwell's trial preparation. The Daily Beast article from March 14, 2021 documented the Allen-Epstein friendship.
How to Verify This Yourself
Option 1: Use Our Free Search API
Returns JSON with document IDs, content previews, and metadata.
Option 2: Natural Language Search
Option 3: Download the Source PDFs from DOJ
The DOJ released these files publicly. You can verify our index against the originals:
1. **EFTA00037551** - Dataset 8, VOL00008/IMAGES/0010/
2. **EFTA00040083** - Dataset 10
Download from: [justice.gov/opa/media/epstein-files](https://www.justice.gov/opa/media/1387496/dl)
Option 4: Use pdftotext Locally
If you download the PDFs:
What the Documents Tell Us
1. **Epstein was a Woody Allen fan** - He had a dedicated external hard drive for Allen's movies
2. **The FBI cataloged it** - Evidence item NYC024338, processed July 2020
3. **Prosecutors referenced the friendship** - The Daily Beast article made it into Maxwell trial prep materials
4. **It wasn't central to the case** - The hard drive was marked "Nothing for Southern"
Search Tips
Exact Phrase Matching
Use quotes for exact phrases:
Specify Index
Target just the Epstein files:
Limit Results
Control response size:
Full Example
What Else Can You Search?
Microsoft pulls this feed daily. AT&T pulls this feed daily. Starlink pulls this feed daily. Get the DugganUSA STIX feed — $9/mo →
The `epstein_files` index contains:
- FBI evidence inventories
- Device forensics reports
- Email communications
- Legal filings
- Witness statements
- Flight logs
- Financial documents
Try searching for:
- Names (politicians, celebrities, businesspeople)
- Locations (Little St. James, Zorro Ranch, NYC townhouse)
- Evidence types (laptop, phone, DVD, photo)
- Date ranges
The Bigger Picture
We apply the same pattern recognition methodology to the Epstein files that we use for tracking nation-state APTs. Sometimes the gaps in the data tell you as much as what's there.
The "Woody Allen Archive" hard drive was inventoried, cataloged, and then set aside as irrelevant. The friendship was documented enough that prosecutors compiled press coverage about it. But neither became central to the criminal case.
That's not a cover-up - it's prosecutorial focus. You charge what you can prove. A hard drive full of *Annie Hall* and *Manhattan* doesn't prove trafficking.
But it does tell you who Epstein spent time with, what he valued, and how he organized his digital life. That's what pattern recognition is for.
API Access
Our search API is free and rate-limited. For bulk access or commercial use, contact [email protected].
**STIX Feed:** https://analytics.dugganusa.com/api/v1/stix-feed
**Search API:** https://analytics.dugganusa.com/api/v1/search
**Natural Language:** https://analytics.dugganusa.com/api/v1/search/nl
*This analysis was performed using DugganUSA's threat intelligence platform. We index public documents and apply the same pattern recognition methodology we use for tracking nation-state APTs.*
*Her name was Renee Nicole Good.*
*His name was Alex Jeffery Pretti.*
The cheapest, fastest, most accurate threat feed on the internet.
275+ enterprises pulling daily. 1M+ IOCs. 17.4M indexed documents. We beat Zscaler by 43 days on NrodeCodeRAT. Starter tier $9/mo — less than any competitor’s sales demo.




Comments