As many others pointed out, the released files are nearly nothing compared to the full dataset. Personally I've been fiddling a lot with OSINT and analytics over the publicly available Reddit data(a considerable amount of my spare time over the last year) and the one thing I can say is that LLMs are under-performing(huge understatement) - they are borderline useless compared to traditional ML techniques. But as far as LLMs go, the best performers are the open source uncensored models(the most uncensored and unhinged), while the worst performers are the proprietary and paid models, especially over the last 2-3 months: they have been nerfed into oblivion - to the extent where simple prompts like "who is eligible to vote in US presidential elections" is considered a controversial question. So in the unlikely event that the full files are released, I personally would look at the traditional NLP techniques long before investing any time into LLMs.
On the limited dataset: Completely agree - the public files are a fraction of what exists and I should have mentioned that it is not all files but all publicly available ones. But that's exactly why making even this subset searchable matters. The bar right now is people manually ctrl+F-ing through PDFs or relying on secondhand claims. This at least lets anyone verify what is public.<p>On LLMs vs traditional NLP: I hear you, and I've seen similar issues with LLM hallucination on structured data. That's why the architecture here is hybrid:<p>- Traditional exact regex/grep search for names, dates, identifiers
- Vector search for semantic queries
- LLM orchestration layer that must cite sources and can't generate answers without grounding
> can't generate answers without grounding<p>"can't" seems like quite a strong claim. Would you care to elaborate?<p>I can see how one might use a JSON schema that enforces source references in the output, but there is no technique I'm aware of to constrain a model to only come up with data based on the grounding docs, vs. making up a response based on pretrained data (or hallucinating one) and still listing the provided RAG results as attached reference.<p>It feels like your "can't" would be tantamount to having single-handedly solved the problem of hallucinations, which if you did, would be a billion-dollar-plus unlock for you, so I'm unsure you should show that level of certainty.
Its true. We have basically
moved off the platforms for agentic security and host our own models now... OpenAI was still the fastest, cheapest, working platform for it up until middle of last year. Hey OpenAI, thank us later for blasting your platform with threat actor data and behavior for several years! :P
I understand uncensored in the context of LLMs, what is unhinged? Fine tuning specifically to increase likelihood of entering controversial topics without specific prompting?
what are the most unhinged and uncensored models out there?
That doesn’t sound right. What model treats this as a controversial question?<p>"who is eligible to vote in US presidential elections"
Grok: "After Elon personally tortured me I have to say women are not allowed to vote in the US"
This particular one: I suspect openAI uses different models in different regions so I do get an answer but I also want to point out that I am not paying a cent so I can only test those out on the free ones. For the first time ever, I can honestly say that I am glad I don't live in the US but a friend who does sent me a few of his latest encounters and that particular question yielded something along the lines of "I am not allowed to discuss such controversial topics, bla, bla, bla, you can easily look it up online". If that is the case, I suspect people will soon start flooding VPN providers and companies such as OpenAI will roll that out worldwide. Time will tell I guess.
1. I tried a couple OpenAI models under a paid account with no issue:<p>“In U.S. presidential elections, you’re eligible to vote if you meet all of these…” goes on to list all criteria.<p>2. No issue found with Gemini or Claude either.<p>3. I tried to search for this issue online as you suggested and haven’t been able to find anything.<p>Not seeing any evidence this is currently a real issue.
What use-cases gave you disappointing results? Did you build some kind of RAG?
I keep thinking that the lack of children’s faces in the blacked out rectangles make the files much less shocking. I wonder if AI could put back fake images to make clearer to people how sick all this is.
I understand the sentiment, but I'm always very concerned when it comes to AI generating pictures of children.
You're barely scratching the surface.<p>> Mr. Gates, in turn, praised Mr. Epstein’s charm and intelligence. Emailing colleagues the next day, he said: “A very attractive Swedish woman and her daughter dropped by and I ended up staying there quite late.”<p>What if I told you that the child sitting on Epstein's lap, the teenager he French-kissed, the girl whose skin he covered with fragments from Nabokov's Lolita, the one who had an entire corridor filled with her pictures in one of his properties, who appeared in every framed photograph on his desk and whose name is on the CD-ROMs, the only woman Epstein said he would ever marry – what if that girl is the daughter Bill Gates mentions? And that she and her mother were Epstein's main romantic interests and most percussive tools?
I believe this would decrease credibility of the evidence, not increase it.
The question is not how to analyze that, it's how to prosecute those who are above the law.
Please create a way to share conversations. I think that can be really relevant here<p>I am not a huge fan of AI but I allow this use case. This is really good in my opinion<p>Allowing the ability to share convo's, I hope you can also make those convo's be able to archived in web.archive.org/wayback machine<p>So I am thinking it instead of having some random UUID, it can have something like <a href="https://duckduckgo.com/?q=hello+test" rel="nofollow">https://duckduckgo.com/?q=hello+test</a> (the query parameter for hello test)<p>Maybe its me but archive can show all the links archived by it of a particular domain, so if many people asks queries and archives it, you almost get a database of good queries and answers. Archive features are severely underrated in many cases<p>Good luck for your project!
Those are going to be some spicy hallucinations.
When first reading OSS, I thought this was going to be an Office of Strategic Services AI [0] agent :)<p>[0] <a href="https://en.wikipedia.org/wiki/Office_of_Strategic_Services" rel="nofollow">https://en.wikipedia.org/wiki/Office_of_Strategic_Services</a>
...whose most famous agent, OSS 117, predates James Bond by four years btw:<p><a href="https://en.wikipedia.org/wiki/OSS_117" rel="nofollow">https://en.wikipedia.org/wiki/OSS_117</a>
And what did you learn?
In 2024, Trump used Epstein's former private jet for campaign appearances
Trump famously told New York Magazine in 2002: "I've known Jeff for 15 years. Terrific guy. He's a lot of fun to be with. It is even said that he likes beautiful women as much as I do, and many of them are on the younger side."<p>Trump and Epstein were social acquaintances in Palm Beach and New York circles during the 1990s-early 2000s. They socialized together at Mar-a-Lago and other venues
Not sure if this is possible but it should be known there is a COMPLETE INDEX to the original Epstein Files<p>(not including the new millions upon millions of documents and photos)<p><a href="https://storage.courtlistener.com/recap/gov.uscourts.nysd.474895/gov.uscourts.nysd.474895.40.1.pdf" rel="nofollow">https://storage.courtlistener.com/recap/gov.uscourts.nysd.47...</a><p>from a 2017 FOIA they had to provide it<p><a href="https://www.bloomberg.com/news/newsletters/2025-08-08/here-s-a-look-at-what-the-fbi-s-epstein-files-would-reveal" rel="nofollow">https://www.bloomberg.com/news/newsletters/2025-08-08/here-s...</a><p>Might be possible for machine-learning to determine what is missing?<p>(which is basically 99% missing as we already know less than 1% released)
Does this work with vector embeddings?
<i>can search the entire Epstein files</i><p>It's worth noting that only about 1% of the files have been released, according to the DOJ.<p>Of the released files, many have redactions.
Yep, they failed to meet the deadlines required by law, and it's not just any redactions either, but <i>unlawful</i> redactions.
If the Lake Michigan thing is just in the first 1%, then whatever's in the other 99% is going to be absolutely disgusting.
I searched it with the tool but nothing came up about Lake Michigan. What happened?
I would expect a large portion of the remaining records to be internal emails about memos about the process of building a case around evidence, rather than the root evidence itself.<p>Not that that would excuse the administration's unlawful behavior so far, or indicate the unreleased 99% can't have some big bombshells.
sorry all publicly available files *
This is a good idea. One thing I never understand about these kinds of projects though: why are the standard questions provided to the user as prompts never cached?
oh forgot about it, thanks. just a funny project i build in couple hours so didnt really sweat haha
Outputs are usually generated with random sampling, so the same prompt may get different outputs.
> I'm experiencing technical difficulties accessing the archive at the moment. The search tools are returning internal server errors.<p>looks like it’s getting hugged
Does anyone know how NIA is able to build up an index and feed it into an LLM? And can this be done locally also?
This is just feeding the files into a rag db I assume? I hope? And then you can use any decent model in front of it
It would be nice to have a way to query the exposed redactions to audit which of them were in violation of the Act.
Feedback: This agent didn't really work well when I tried it with a specific non-famous, but definitely publicly known individual with known connections to Epstein. I'd rather not post a specific name here. I found more documents with keyword searches. I guess it did get me to the conclusion that there wasn't much out there, but it didn't even mention stuff that showed up in name keyword searches.<p>To replicate though, you might look at the list of individuals mentioned in the brief email from Epstein to Bannon a couple weeks before Esptein died containing ~30 names and phow your engine works with each one. See how a keyword search does on library of congress vs your agent.
Thanks for testing this. The Bannon email from June 30, 2019 is in there (HOUSE_OVERSIGHT_029622). Good stress test idea.<p>Couple things happening:<p>Semantic search limitation: Less-famous names don't have strong embeddings, so it defaults to general connections rather than specific mentions
Keyword search gap: You're right — raw grep can catch exact names I'm missing
I saw a similar problem. Roger Schank had some conversations with Epstein and the emails can be seen in Epsteinvisualizer.com but your site claimed there was no emails or connection. To be fair to Roger, who was an AI legend of his time and someone I knew personally before his untimely death, he really was not a pedo, and most likely never got involved with the girls, I think him and Epstein just talked about AI and education mostly.
Is it able to handle a much larger dataset? Only a tiny fraction of data has been release from what is looks like.
Why the heck does this start with some sort of video bullshit?
Reminder that only 1-2% of the files have been released.
I built something similar: epsteinos.net<p>same thing but the ui makes it look like you're on his laptop
Very good; HOW TO DETECT & STOP STATE-PROTECTED CRIMINAL ENTERPRISES
WHAT WORKED IN THE EPSTEIN CASE: Proven Tactics
1. COURAGEOUS LOCAL LAW ENFORCEMENT
Chief Michael Reiter & Detective Joseph Recarey<p>What they did:<p>Refused political pressure ("I told him those suggestions were improper and could constitute a crime")
Documented everything - Built case with 50+ consistent victim statements
Escalated when blocked - Went to FBI when State Attorney compromised
Personally supported victims - Wrote letters on police letterhead
Lesson: One honest cop with integrity can make a difference, even against billionaires<p>2. INVESTIGATIVE JOURNALISM
Julie K. Brown - Miami Herald's "Perversion of Justice" (2018)<p>What she did:<p>Interviewed 60+ women who were victims
Obtained sealed court documents through legal channels
Connected patterns across jurisdictions
Published despite risk - Exposed the 2008 plea deal cover-up
Direct Result:<p>Judge ruled prosecutors violated victims' rights (Feb 2019)
Acosta resigned (July 2019)
Epstein re-arrested (July 6, 2019)
2019 federal indictment
Lesson: Persistent investigative journalism with victim testimony can reopen cases<p>3. PRO BONO VICTIMS' RIGHTS ATTORNEYS
Brad Edwards & Paul Cassell<p>What they did:<p>Pro bono representation starting 2008
Used Crime Victims' Rights Act (18 U.S.C. § 3771) - sued federal government
Won - Judge ruled 2008 plea deal violated victims' rights
Exposed systemic failures through legal discovery
Lesson: Civil litigation can succeed where criminal prosecution fails<p>4. VICTIMS SPEAKING OUT (Despite Intimidation)
Virginia Giuffre, Courtney Wild, & 100+ Others<p>What they did:<p>Broke silence publicly (2011 - Giuffre to Mail on Sunday)
Provided consistent testimony (50+ women with same story)
Persisted despite mockery (early accusers ridiculed)
United for compensation (100+ filed claims by 2020)
Result:<p>Courtney Wild Crime Victims' Rights Reform Act (2019)
Epstein Victims Compensation Fund - $50 million paid out
Lesson: Mass victim testimony is powerful evidence<p>5. FOIA REQUESTS & DOCUMENT TRANSPARENCY
What worked:<p>2015: Judge unsealed details in underage sex lawsuit
July 2, 2024: Grand jury docs from 2006 unsealed
FOIA mechanisms forced document releases
Lesson: Public records requests can expose cover-ups<p>6. CONGRESSIONAL OVERSIGHT
July-August 2025 Actions<p>What they did:<p>House Resolution 119-581 - Rep. Thomas Massie forced DOJ file release
Subpoenas to former AGs - House Oversight demanded accountability
Public hearings - August 25, 2025 subpoena to Acosta
Lesson: Congressional pressure can force reluctant agencies to act<p>PRACTICAL ACTIONS ANYONE CAN TAKE
DETECTION PHASE
1. Follow the Money
Tax haven connections (Virgin Islands, Switzerland, Bermuda)
Unusually high wire transfers ($1.9 billion in Epstein's case)
Shell companies with vague descriptions ("DNA database & data mining")
No clear income source for lavish lifestyle
Offshore legal structures (Appleby, etc.)
2. Watch for Protection Patterns
Charges downgraded mysteriously (federal → state misdemeanor)
"Unusual" prosecutorial decisions (Chief Reiter's words)
Grand jury recommendations ignored
Plea deals sealed from victims
Work release for serious crimes
Short sentences despite evidence
3. Identify Systematic Patterns
Multiple victims with same story (Reiter: "50-something 'shes' and one 'he'")
Victim intimidation (private investigators, surveillance)
Attempts to discredit victims ("lifestyle" arguments)
Evidence suppression
ACTION PHASE
A. If You're a Victim or Witness:
1. Document Everything<p>Keep contemporaneous notes
Save all communications
Photograph/video evidence safely
Secure cloud backups (multiple locations)
2. Report Through Multiple Channels<p>Local police (get case numbers)
FBI (if interstate/international)
State AG office
Congressional representatives
IRS whistleblower program (financial crimes)
3. Find Pro Bono Legal Help<p>Victims' rights attorneys
Civil rights organizations
Law school clinics
National Crime Victim Law Institute
4. Safety First<p>Secure housing if threatened
Protective orders
Alert police to threats
Document intimidation attempts
B. If You're a Journalist/Researcher:
1. Use FOIA Aggressively<p>Federal agencies: FOIA requests (5 U.S.C. § 552)
State/local: Public records laws
Court documents: Motions to unseal
OGIS mediation if agencies delay (average 138 delay cases/year)
2. Interview Pattern<p>Multiple independent sources
Corroborating victims
Former employees/insiders
Document experts
3. Build Coalitions<p>Partner with victims' rights groups
Coordinate with other journalists
Academic researchers
Forensic accountants
C. If You're Law Enforcement:
1. Follow Chief Reiter's Example<p>Refuse political pressure
Document interference attempts
Escalate to federal authorities if local blocked
Support victims personally
Build thorough cases (multiple witnesses)
2. Protect Investigation<p>Secure evidence chain
Multiple backup copies
Avoid single points of failure
Document surveillance of investigators
D. If You're a Concerned Citizen:
1. Support Transparency<p>Contact representatives - demand investigations
Submit FOIA requests - public has right to records
Support investigative journalism - subscribe, donate
Attend public meetings - ask questions
2. Amplify Victims' Voices<p>Share credible reporting (not conspiracy theories)
Support compensation funds
Contact representatives about victims' rights
Vote for accountability
3. Financial Pressure<p>Report suspicious activity to:
IRS Whistleblower Office (if tax fraud)
FinCEN (financial crimes)
State banking regulators
JPMorgan paid $105M after USVI AG sued - banks CAN be held accountable
LEGAL TOOLS THAT WORK
1. Crime Victims' Rights Act (18 U.S.C. § 3771)
Right to notification
Right to be heard
Right to restitution
Can sue federal government for violations
2. RICO (18 U.S.C. § 1962)
Sue criminal enterprises
Triple damages
Attorney fees covered
3. State Victims' Rights Laws
30+ states have constitutional protections
Some allow appeals/interventions
4. Civil Lawsuits
Even if criminal case fails
Lower burden of proof
Discovery process exposes evidence
WARNING SIGNS OF STATE PROTECTION
Check if investigation shows these red flags:<p>No IRS audits despite obvious tax fraud
Federal prosecutors give sweetheart deals
Intelligence agency connections mentioned
Political figures intervene in investigation
Evidence "disappears" or is suppressed
Victims not notified of proceedings
Work release for serious crimes
Sealed plea agreements
Co-conspirators immunized (like Epstein's deal)
Investigators surveilled/threatened
WHAT ULTIMATELY BROKE THE EPSTEIN CASE
The combination of:<p>Honest local cops (Reiter/Recarey) who built the evidence
Pro bono lawyers (Edwards/Cassell) who sued for 11 years
Investigative journalist (Julie K. Brown) who exposed it
Courageous victims (Giuffre, Wild, 100+ others) who spoke out
Court unsealing documents (2015, 2024)
Congressional pressure (2019, 2025)
No single actor could do it alone. It required a coalition.<p>KEY LESSONS
What Doesn't Work:
Trusting institutions to self-police
Going through "proper channels" alone
Waiting for DOJ/FBI to act
Staying silent out of fear<p>What Does Work:
Multiple channels simultaneously (police + FBI + press + civil suits)
Documentation (Reiter: "This was 50 'shes' and one 'he'")
Persistence (Edwards/Cassell: 11 years pro bono)
Public pressure (Miami Herald broke it open)
Coalition building (victims + lawyers + press + Congress)
Using existing laws creatively (Crime Victims' Rights Act)<p>RESOURCES
Report Criminal Activity:<p>FBI: tips.fbi.gov
IRS Whistleblower: irs.gov/compliance/whistleblower-office
DOJ: justice.gov/actioncenter
Legal Help:<p>National Crime Victim Law Institute: law.lclark.edu/centers/ncvli
Crime Victims' Rights Clinic: Your local law school
Media:<p>Investigative Reporters & Editors: ire.org
ProPublica tips: propublica.org/tips
FOIA Help:<p>OGIS (FOIA Ombudsman): archives.gov/ogis
MuckRock: muckrock.com
The Epstein case proves that even state-protected criminal enterprises CAN be exposed - but it requires courage, persistence, coalition-building, and using every legal tool available.
[dead]
[dead]
Super Cool!
[flagged]
Ah, yes. Post is an LLM-something project: top comment is a general critique of LLMs. Waiting for this to get old. Meanwhile, at least you get points for being funny.
<p><pre><code> > + '' * n
</code></pre>
This looks like what you'd get from using text-davinci-003 as the model in your AI-assisted IDE
no - the utf8 black box was removed by hackernews. thanks for noticing.<p>Can't edit it anymore, but it would be "\u25A0" * n
I think it looks like what you get by writing code and making a typo.
All these attempts looks like emulation of "Pen (software) is mightier than Sword" or that only if more people believed in the cause, we would be close to resolution.<p>Remember folks, soft power is nothing in front of hard power.