Source Details
View detailed information about this source submission and its extracted claims.
New York Times journalists discuss their investigation into the recently released Jeffrey Epstein files, detailing their methods, challenges, and initial findings. They are using AI tools to navigate the vast amount of data and address key questions about Epstein's network and potential connections to powerful figures. The article also addresses the challenges of reporting on unverified claims.
AI Extracted Information
Automatically extracted metadata and content analysis.
- AI Headline
- Digging Into Millions of Pages of Epstein Files
- Simplified Title
- NY Times Journalists Analyze Epstein Files Release
- AI Excerpt
- New York Times journalists discuss their investigation into the recently released Jeffrey Epstein files, detailing their methods, challenges, and initial findings. They are using AI tools to navigate the vast amount of data and address key questions about Epstein's network and potential connections to powerful figures. The article also addresses the challenges of reporting on unverified claims.
- Subject Tags
-
Jeffrey Epstein Epstein Files New York Times Investigative Journalism AI Donald Trump Media Analysis
- Context Type
- Analysis
- AI Confidence Score
-
1.000
- Context Details
-
{ "tone": "informative", "perspective": "neutral", "audience": "general", "credibility_indicators": [ "expert_quotes", "data_cited", "journalist_interviews" ] }
Source Information
Complete details about this source submission.
- Overall Status
-
Completed
- Submitted By
- Donato V. Pompo
- Submission Date
- February 17, 2026 at 3:20 PM
- Metadata
-
{ "source_type": "extension", "content_hash": "e56ee00d99e54fc0603e5c563ef0c784c69b4f46e4a4c461d8b1546984444329", "submitted_via": "chrome_extension", "extension_version": "1.0.18", "original_url": "https:\/\/www.nytimes.com\/2026\/02\/12\/insider\/jeffrey-epstein-files-documents.html?campaign_id=9&emc=edit_nn_20260217&instance_id=171200&nl=the-morning®i_id=122976029&segment_id=215386&user_id=b25c5730c89e0c73f75709d8f1254337", "parsed_content": "The Epstein FilesLatest ReleaseConspiracy Theories FlourishFiles Include VideosLawmakers Question BondiPowerful Men in FilesReferences to TrumpAdvertisementSKIP ADVERTISEMENTSupported bySKIP ADVERTISEMENTTimes InsiderHow The Times Is Digging Into Millions of Pages of Epstein FilesTwo dozen journalists. A pile of pages that would reach the top of the Empire State Building. And an effort to find the next revelation in a sprawling case.Share full articleA photo of Jeffrey Epstein with other faces redacted by the Justice Department.Credit...U.S. Department of JusticeInterview by Patrick HealyWith Steve EderAndrew ChavezKirsten Danis and Dylan FreedmanFeb. 12, 2026It is one of the largest and most complex reporting projects in recent New York Times history: searching for facts, revelations and answers in the Jeffrey Epstein files.About two dozen journalists are working through the three million pages, 180,000 images and 2,000 videos contained in the trove of files released about two weeks ago \u2014 and so far they\u2019ve seen only 2 to 3 percent of the material. It would take years for a group that size to comb through it all and then verify information as true and publishable, given that so much of it is uncorroborated, in fragments or redacted.How do we do this work? What are we looking for? In what ways are artificial intelligence tools helpful? What judgment calls have we been making or debating?I recently held an online discussion about all of this with four of the Times journalists working on the Epstein documents: Kirsten Danis, our Investigations editor; Steve Eder, an investigative reporter; Dylan Freedman, the projects editor on our A.I. Initiatives team; and Andrew Chavez, an engineer on our Interactive News desk. The discussion has been edited for length and clarity.AdvertisementSKIP ADVERTISEMENTTake us back to that moment on Jan. 30 when the Justice Department released the three million pages and thousands of videos and images. What went through your minds?STEVE EDER: It felt different from the first \u201cEpstein Files\u201d deadline day in mid-December. Then, it felt like a storm was coming because we had no idea what to expect. This time, we were better prepared, with new ways to dig into the documents. I wanted to find out what was there. And it would be a lot.KIRSTEN DANIS: I was deeply curious, because we almost never get a chance to see the investigative materials underlying any case. Reporters always wish we had subpoena power. In this case, it was like we did.You suddenly had receipts.DANIS: Witness statements, emails, bank records. Would this material actually put to rest any of the enduring questions we\u2019ve had about Epstein?DYLAN FREEDMAN: I dropped all my meetings that day. The scale of this release was hard to visualize: About as tall as the Empire State Building, if you stacked the three million pages, not to mention the multimedia files. My first thought was: How can we create a tool that\u2019s immediately useful to find content in that mammoth trove of information?AdvertisementSKIP ADVERTISEMENTANDREW CHAVEZ: I work a lot with documents. This was a particularly challenging collection. It was unruly: Photos, legal records, text messages, emails. And it was way more than one person could make sense of.OK. So you knew that this big document release was coming, as Steve said. What did your preparations look like?DANIS: We had assembled a team of reporters, editors and others who could jump in when the time came. They were colleagues in Washington and on our Investigations, National, Metro and Business desks, and engineers and A.I. journalists. Obviously, you can\u2019t read three million pages. So we decided to start with search terms.EDER: Trump. Clinton. Gates. Duke of York. My colleagues and I came up with a list of those terms and others about prominent people, places and events that involved Epstein; we\u2019ve added more every day. Some searches were more topical, seeking details on Epstein\u2019s time in jail and death. The plan was to divide those terms and phrases among the reporters and then begin searching the files to see what we found that was new and potentially newsworthy.CHAVEZ: My desk, Interactive News, maintains a proprietary tool for document reporting, which we knew we\u2019d need for a collection this large. We already had the ability to search millions of pages, but downloading and making millions of pages searchable in a few hours was a new challenge. We had some ideas about how the Justice Department might release the files online, so we built what we could and ran weekly rehearsals against a set of test documents that we assembled.AdvertisementSKIP ADVERTISEMENTDid things go like it did in rehearsal, Andrew?CHAVEZ: There were curveballs. The way they showed up online required us to do a lot of improvising. We never imagined, for example, that they\u2019d release these in a way that you\u2019d have to click through more than 25,000 pages on justice.gov just to find them all. Or that there\u2019d be broken links to sift through, and files constantly disappearing and reappearing.DANIS: Andrew and his colleagues worked for about 10 hours to get most of the documents uploaded into our tool. We had to rely on the D.O.J.\u2019s clunky search function while that happened.EDER: But Dylan stepped in to make that all easier.FREEDMAN: I knew the tool Andrew had worked on would be the ultimate repository of information for reporters, but it would take hours to get all the content indexed. I started thinking about ways to get rougher cuts of information to reporters more quickly, for breaking news.With the help of A.I., I wrote a tool that leveraged the D.O.J.\u2019s own search functionality to allow reporters to quickly extract every page of search results and put them in a spreadsheet. From there, we populated tabs for search results from key figures linking back to the source material, and reporters crowdsourced verifying the information.EDER: Dylan\u2019s improv gave us a running start on what would turn into a very long day and night.Steve, Kirsten, you\u2019ve been working on our Epstein coverage on and off for six years. Once you had these documents, what questions and mysteries did you want to drive at?AdvertisementSKIP ADVERTISEMENTEDER: There have been big and basic questions about Epstein. How did he go about doing what he did? How did he get away with so much for so long? Who funded it? One of the big theories out there is that Epstein was collecting the secrets of powerful or wealthy contacts for blackmail or to gain other leverage. This has been hard to pin down over the years \u2014 it is an inherently tricky thing to prove or disprove.DANIS: Another important question was whether there was hard evidence of other criminality. While there are people that investigators described as possible co-conspirators in Epstein\u2019s child sex-trafficking operation, none of those names or information about them was new. We\u2019ve gone through only a tiny fraction of these files, and there\u2019s certainly a lot more to see. But on the question of whether there was a wide pedophilia ring: we\u2019re not seeing proof of that.What have the documents shed new light on so far?EDER: While they have not unearthed clear proof of blackmail, at least not from what we\u2019ve seen, they give us a fuller picture of how Epstein interacted with powerful people and how he seemed to see value in claiming to know things about them. It remains a priority to bring as much clarity to this question as we could.DANIS: We\u2019re getting an inside look at how he operated, always trading gifts and favors for access and power. You can see how he would try to entice elites into his orbit by inviting anyone he could think of to his home, to dinner parties and to his island \u2014 and who bit and who said no almost right away.Kirsten, one judgment call we had to make straightaway was how to describe unverified accusations against President Trump in the files. You ultimately pulled me and other colleagues in to discuss.AdvertisementSKIP ADVERTISEMENTDANIS: Almost anything about the president was going to be newsworthy. He had swung so hard against releasing this material that it naturally raised the question of whether he was shielding anything, especially about himself.\n \n Got a confidential news tip?\u00a0The New York Times would like to hear from readers who want to share messages and materials with our journalists.See how to send a secure message at nytimes.com\/tipsWe found a document that investigators had pulled together last summer summarizing more than a dozen tips they had received about Trump and Epstein, including sexual abuse. But the tips were unverified and had no dates or names, so we couldn\u2019t report them out ourselves, at least not right away. Anyone can call the F.B.I. and give a tip \u2014 there\u2019s no way to know just from the document what\u2019s true or not. We don\u2019t publish anonymous information that we can\u2019t verify ourselves.So we were debating how we could tell people that these accusations were in there and answer a burning question about this release, but not repeat claims we couldn\u2019t corroborate.I remember walking into an office in the newsroom and you were there with your laptop, staring hard at our wording about the accusations. We wanted to do two things. First, describe them in general terms, but not in a way that we were airing unverified, salacious details. And second, tell readers why we weren\u2019t doing that. We did that near the top of the article:It is unclear why the investigators assembled the summary, which includes accusations of sexual abuse by Mr. Epstein and Mr. Trump. The emails did not include any corroborating evidence and The New York Times is not describing the details of the unverified claims.EDER: This is one of the most challenging parts of reporting on these files. Even though these are now public records, it does not mean they are verified, true or accurate. We\u2019ve tried to strike a balance of reporting thoroughly, explaining the existence of these tips and claims, describing what we are seeing, while also not going too far into the realm of unverified or unverifiable accounts. This is something that can be frustrating to readers, who are digging into the files themselves, or seeing such claims posted elsewhere.DANIS: This would be a good moment to tell people that The Times has a confidential and secure tip line.AdvertisementSKIP ADVERTISEMENTFREEDMAN: Viral social media posts narrowed in on details without context. These documents contain duplicates, glitches and inconsistent redactions which can amplify confusion. A prominent example was an email describing a Brazilian woman as \u201c=9yo,\u201d when the \u201c=\u201d was an apparent error, since another version of the document read \u201c19yo.\u201d The tools we built helped us quickly verify these types of claims.EDER: There are a lot of typos, some probably from Epstein himself and others from software ingesting versions of documents from other software. The bottom line for us was to use caution and look for multiple versions of the same document, when possible.We reported that these files contained more than 38,000 references to President Trump. Given that number, some readers were surprised that there were not any major new revelations about Trump\u2019s relationship with Epstein. Can you talk more about the president\u2019s presence in these files? Do we see any evidence that the Justice Department removed damaging references to the president, as some have speculated?EDER: The first thing to know is that while there are a lot of references to President Trump, many of those are in documents that were released by Congress last fall. Epstein often exchanged emails where he or his contacts mentioned Trump; they would also send links to articles mentioning Trump. There are also a lot of news clippings mixed into the files.DANIS: So many news clippings. Epstein loved to send articles around.EDER: So the number might look bigger than it seems. But yes, there are references to Trump with redactions too. For example, a file of text messages between Epstein and Steve Bannon, a former adviser to Trump, includes a photo of Trump giving a speech \u2014 but his face was covered with a black redaction box. That use of redaction has raised a lot of questions about what has been withheld.AdvertisementSKIP ADVERTISEMENTPortions of the documents have been redacted by the Justice Department to protect the identities of victims of sexual assault. There are also cases of sloppy redaction, in which sensitive information \u2014 including nude photos \u2014 were released and later removed. How do you report on documents with redacted pieces, or go about verifying information?EDER: Yes, as my colleagues reported, the Justice Department published dozens of unredacted nude images as part of the document release. All of this has sowed distrust in the Justice Department\u2019s handling of these files. It\u2019s understandable that there are redactions to protect victims of sexual assault. But in other cases, improper redactions can be an impediment to getting at the truth. If something seems newsworthy, but is redacted, we\u2019ve used other available documents to fill in the blanks and called sources that we\u2019ve developed over years of reporting on Epstein.CHAVEZ: There\u2019s also been disinformation around redactions, where people are claiming to \u201cundo\u201d redactions using A.I. or other techniques. We built a tool that checked all three million pages for these so-called undo-able redactions and didn\u2019t find any. In many cases, what we\u2019re actually seeing in some online videos is an A.I. hallucination of what it assumes is under the redaction black box.FREEDMAN: And A.I. is not reliable at guessing what words could fit in a redaction box.ImageA pile of documents shows redactions made by the Department of Justice. Credit...Jon Elswick\/Associated PressWe\u2019ve heard from several readers who argued that The Times needs to cover more of the Epstein files than we already have. Several were adamant that the files prove that Trump is guilty of horrible crimes and that we should focus on that. Steve, do the files prove anything about Trump?AdvertisementSKIP ADVERTISEMENTEDER: The files certainly provide ample evidence that Trump and Epstein were close at one time. The files also show that Epstein presented himself as someone who really understood Trump even many years after they fell out in the early 2000s. There are also the tips that Kirsten mentioned earlier, which show how investigators received dozens of leads related to Trump.DANIS: Trump has a troubling history with women, including being found liable for sexual abuse, and so I understand the instinct on the part of some readers to assume that similar allegations should be treated as if they are likely true. But we work differently. We don\u2019t make assumptions; we need to verify, which often means painstaking work that can take time.Andrew and Dylan, to assist in the reporting, what A.I.-related tools and other methods did you help build? And what challenges did you grapple with?CHAVEZ: The first thing we always try to do is make things searchable. But here we also needed ways for reporters to get at the things that weren\u2019t easy targets for search. One way we did that was by leveraging something called \u201csemantic search,\u201d which lets reporters search for concepts and find matching text even if the exact language isn\u2019t in the document. We also built an A.I.-powered tagging and categorization tool to bucket the documents by type and add labels for things that we thought may be useful indicators of newsworthiness.FREEDMAN: It was hard to anticipate all of the challenges ahead of time. I\u2019m on a team called A.I. Initiatives made up of engineers, designers and editors. As reporters came to us with questions following the release, we were a sort of strike team, rapidly prototyping bespoke software applications to help them.AdvertisementSKIP ADVERTISEMENTA.I. enabled us to create specializing tooling to parse the Epstein files in just a couple of days that would normally take engineering teams weeks to build. This included tools to search photos visually, identify duplicate documents, sift through video and audio transcripts and compile research reports on new developments with key figures and topics.EDER: In November, Congress released a large set of Epstein documents. Then in December, the Justice Department put out the first rounds of the Epstein files. Those releases gave us a chance to stress test our existing tools and create a wish list of search gadgets and buttons.CHAVEZ: One advantage we have is that teams of software engineers like mine and Dylan\u2019s sit in the newsroom and have the ability to take these kinds of requests. So while reporters are searching the docs at 11 p.m. we are tweaking the search engine and fixing bugs as they find them, making live improvements. And we keep track of reporting lines and try to make sure that the tools we have can get us where we need to go.FREEDMAN: With A.I., information \u2014 text, images, video, audio \u2014 is like a liquid; it can be molded into different formats and searched in rich, expressive ways. A.I. will never replace the expert judgment of reporters, but it can make their lives easier and amplify their reporting ambitions.Dylan, to that end, what is A.I. good at and bad at in a big reporting project like this?FREEDMAN: A.I. is really good at extracting text from images and audio, captioning photos, assigning structure to text like emails. We can use A.I. to crack open really messy data sets, like this release of documents, that would have previously been impossible to effectively tackle at scale.AdvertisementSKIP ADVERTISEMENTA.I. is really bad at news judgment \u2014 what information to include, whether it\u2019s important. A.I. can be sloppy and make mistakes that are inexcusable in journalism. It\u2019s super industrious but not super intelligent. A.I. outputs can amplify biases in society. And in my experience, A.I. is not great at producing original ideas (but decent at synthesizing or distilling them).CHAVEZ: The way we use A.I. is quite different than how most people interface with Gemini and other tools. We are writing software that gives discrete tasks to A.I. that we feel comfortable the technology can handle reliably. For example, we may ask it to let us know if a page has an image or if a document is an email. The stuff we get back may help reporters get to the right material faster, but ultimately a reporter\u2019s eyes on actual documents are what is driving every story.How do you avoid something like confirmation bias with A.I.?CHAVEZ: Our reporters treat the signals we surface using A.I. as just another tip. They\u2019re out there talking to sources, reading the source materials and applying decades of experience covering this topic and reading documents like these. So our role \u2014 and this is true of any technology we use \u2014 becomes more about making sure that everyone understands how we\u2019ve used it and how that affects what they\u2019re seeing from our tools.FREEDMAN: Confirmation bias is still a very real risk though. A.I. models are so tuned to be helpful, they exhibit a trait called sycophancy in which they will ignore contrary evidence and seek to confirm your suspicions. We can mitigate this by telling people to search for opposing viewpoints. We can also build tools that employ A.I. in less directed ways, for example, to group materials, cluster together themes or surface questions.A final question: What did you discover in this batch of documents that fundamentally changed the way you think about this story?AdvertisementSKIP ADVERTISEMENTEDER: I\u2019ve been on this story for a long time, so there is little that surprises me at this point. But it is still jarring to see Epstein\u2019s communications about women and girls.DANIS: I agree, Steve. The way that some men talk about women in these documents, reducing them to commodities whose value depends on their hair color or breast size, isn\u2019t at all surprising. But it\u2019s ugly.EDER: The enormous scope of the story and the reach of Epstein\u2019s collection of contacts still catches me off guard. You would imagine that we\u2019d feel like we know the whole story by now, but not really. It is hard to believe that after all that has been said, there is still much to learn about Epstein and his network.FREEDMAN: As a relative newcomer to the Epstein beat, I was shocked by the way that Epstein groomed not just women and girls but also powerful men to acquire favor. His network was so much more extensive than I had imagined. It\u2019s the most detailed portrait I\u2019ve seen of an elite class of society operating outside of public scrutiny. Epstein\u2019s disturbing photographs and some of his coded language to describe girls left me with a gaping discomfort.CHAVEZ: I don\u2019t have the experience with this story that Steve and others do, since I was really just brought in to wrangle the documents. But I\u2019ve seen a lot of document dumps and the material in this one really has the ability to stop you in your tracks. There\u2019s an unfiltered nature, especially in some of the correspondence, that I just found unrecognizable.Steve Eder has been an investigative reporter for The Times for more than a decade.Dylan Freedman is the A.I. projects editor for The Times, investigating a range of topics. He has experience as both a reporter and a machine-learning engineer.A version of this article appears in print on Feb. 15, 2026, Section A, Page 2 of the New York edition with the headline: Digging Into Millions of Pages of Epstein Files. Order Reprints | Today\u2019s Paper | SubscribeSee more on: U.S. Justice Department, Steve Bannon, Jeffrey Epstein, Donald TrumpShare full articleRelated ContentAdvertisementSKIP ADVERTISEMENT", "ai_headline": "Digging Into Millions of Pages of Epstein Files", "ai_simplified_title": "NY Times Journalists Analyze Epstein Files Release", "ai_excerpt": "New York Times journalists discuss their investigation into the recently released Jeffrey Epstein files, detailing their methods, challenges, and initial findings. They are using AI tools to navigate the vast amount of data and address key questions about Epstein's network and potential connections to powerful figures. The article also addresses the challenges of reporting on unverified claims.", "ai_subject_tags": [ "Jeffrey Epstein", "Epstein Files", "New York Times", "Investigative Journalism", "AI", "Donald Trump", "Media Analysis" ], "ai_context_type": "Analysis", "ai_context_details": { "tone": "informative", "perspective": "neutral", "audience": "general", "credibility_indicators": [ "expert_quotes", "data_cited", "journalist_interviews" ] }, "ai_source_vector": [ -0.0033185987, -0.009612364, 0.0045312024, -0.083853245, -0.0023977137, -0.00090110773, 0.012895561, 0.0008642049, 5.523112e-5, 0.00027476923, -0.00511113, -0.010204853, 0.03896772, 0.007097681, 0.12076055, 0.00039879017, 0.016459042, 0.008966286, 0.011759324, -0.013910517, -0.024387594, -0.0073050954, -0.017559968, -0.013122221, 0.018533159, -0.021787, 0.0023279712, -0.0059171375, 0.04463726, 0.0030092471, -0.022672525, 0.026455116, -0.0056665954, -0.0028285428, 0.03834743, 0.015104922, -0.012689944, -0.025317792, -0.012312815, 0.010372719, -0.018667404, 0.009116095, -0.003693507, -0.0016557628, 0.036220424, -0.0049852873, 0.013976293, -0.022522997, 0.0066827247, 0.008554759, 0.0036976663, -0.014306695, -0.023899138, -0.1670119, -0.028451825, -0.009040834, 0.008008737, -0.0052799415, -0.00044515062, -0.011182237, -0.02208974, 0.014636672, -0.03750124, -0.046632856, -0.0096996715, -0.033606645, -0.0051775505, 0.0052419333, -0.002778381, -0.009987047, -0.010244412, -0.002657131, -0.038357332, -0.01147697, -0.013085334, -0.010061047, 0.015230051, -0.0014989229, 0.0012118393, -0.003376778, -0.02301475, -0.013534792, -0.008783044, -0.0322588, 0.0027493455, -0.022912111, -0.007707892, -0.002775703, 0.0043478957, -0.015062652, -0.008755962, 0.018695973, 0.043014478, -0.04845574, 0.0020038574, -0.011131159, 0.019668663, 0.021346832, 0.017189983, 0.011122051, -0.024704032, -0.028888121, -0.027091762, -0.014007853, 0.021333791, 0.012923116, 0.0008702019, 0.0044210004, 0.008406103, 0.024724845, 0.017303236, -0.01235674, -0.004502674, 0.015303753, 0.0008955699, -0.13587458, -0.015229919, -0.023598585, 0.0064311805, -0.03701918, -0.009596589, -0.012771007, 0.0125962375, -0.017209982, 0.02180087, -0.009741252, 0.030827992, 0.026078273, -0.012905797, 0.008700101, -0.023448689, 0.014646851, -0.00678606, -0.03522738, -0.0030260186, 0.020302368, -0.0036432561, 0.0041266684, 0.010492368, 0.0015628445, 0.009665309, 0.037291598, 0.038880784, 0.014306416, -0.00044980375, 5.0831943e-5, 0.013168546, 0.033555895, 0.0018722387, -0.028254861, -0.022726068, -0.02343563, 0.012884312, 0.007383845, 0.028105972, -0.016581245, -0.03338538, -0.018540068, -0.011728931, 0.0051946617, -0.009246989, 0.008313162, -0.014859057, 0.034696694, 0.013870055, 0.01989835, 0.00231041, 0.030019945, 0.008809493, -0.02798554, 0.001913582, 0.014114195, 0.0018559985, 0.009684494, -0.031235218, -0.0076416093, 0.0019506665, -0.021939036, 0.020316187, 0.00492791, -0.018274186, 0.012786416, -0.003194413, 0.0116755245, 0.008258018, -0.01738499, 0.008962339, -0.01312964, 0.025626257, -0.022950333, -0.019052567, -0.02901672, 0.032166317, 0.002492194, -0.0076714684, -0.015018127, -0.011948401, -0.011331595, -0.0050940556, 0.028949078, 0.0025658784, 0.009844034, -0.000181797, 0.0039407834, 0.012595608, 0.0039364803, -0.02505197, -0.01977396, 0.0049548727, 0.00020416618, 0.022030959, 0.025532424, -0.023033611, -0.00665578, 0.010262566, 0.018126454, -0.009284959, -0.0040477174, -0.014102475, -0.020915218, 0.022525297, 0.005329459, -0.0027534207, 0.0045996853, 0.0061381077, 0.010399225, 0.048886504, -0.007968074, 0.007667272, -0.01874668, 0.014747884, 0.019282721, -0.023942677, -0.02971825, 0.024980964, -0.032585017, 0.013023565, -0.019338079, 0.005408911, 0.0008883986, -0.014156811, 0.016149987, 0.009883886, -0.0008217162, 0.015670367, -0.0058669797, 0.0050856965, -0.00071323785, -0.006276726, -0.010897692, -0.016550515, -0.0055794767, -0.0023246028, -0.010767765, 0.019631397, 0.019370351, -0.004472643, -0.01768737, -0.004156234, 0.014538416, -0.012226546, -0.0059037, -0.03374922, 0.008966371, 0.011641749, 0.012519667, 0.012945033, -0.010555763, -0.014274171, -0.0045208945, 0.014767273, 0.031603213, 0.0017940213, -0.016014159, 0.0016421216, 0.0044627404, -0.07586665, 0.007813295, -0.0077246055, 0.005948504, 0.013137536, 0.024044957, 0.008252264, 0.010072049, -0.0049831034, 0.0121196015, 0.00014415196, -0.010187994, 0.0027493127, -0.011345207, 0.009139699, 0.013252135, 0.0037372613, -0.021998977, 0.028899467, -0.01843559, 0.025873996, -0.016883673, 0.00831406, -0.010253758, 0.011186893, 0.013620595, -0.0066177435, 0.035719547, 0.008110216, -0.01725113, 0.011971735, -0.0025018689, -0.012216257, 0.010438391, -0.020343265, -0.004158851, -0.0045854687, -0.0058264933, 0.03310961, -0.01956408, 0.009401275, 0.011172445, 0.0010710509, -0.0074337698, -0.025575968, 0.008627116, -0.0045616394, -0.003698316, -0.0020969317, -0.004690533, 0.014530199, 0.008519267, 0.012676581, 0.0053628297, -0.034562908, -0.00526361, 0.005654476, -0.007097214, 0.0057135858, 0.0008633438, 0.01490278, -0.022829624, 0.023373501, 0.003933518, -0.0142431855, -0.0050125797, -0.021604108, -0.033494543, -0.016803738, 0.014423857, -0.012378477, 0.00035575413, -0.030383496, -0.022140628, 0.0014344371, 0.003920767, 0.0092862435, -0.019933565, -0.02464606, 0.035668373, -0.0016324836, 0.00031500752, -0.0059805205, -0.008740583, 0.0052688713, 0.010708107, 0.0029820567, -0.016713858, -0.010705937, -0.030698603, -0.004897548, 0.016606048, -0.023504585, -0.008812157, -0.0146862455, 0.012820333, -0.0067385063, 0.024796275, 0.007231564, -0.0099156285, 0.0021211721, -0.02345092, -0.016898183, -0.0074052, -0.013907376, 0.021269083, -0.013614086, -0.013225677, -0.026374213, 0.01898243, -0.014322107, -0.0024470827, -0.0006703915, 0.02374468, -0.021502677, 0.036021795, -0.00062950444, 0.0019758614, 0.0073882476, 0.018107057, 0.0121661555, 0.019383868, 0.010407865, 0.010708362, -0.016910208, 0.009688538, 0.0063217147, 0.011292708, 0.02161215, 0.007466806, 0.022172606, 0.0029952265, -0.022430046, -0.025809752, 0.00793526, -0.028616158, 0.014295277, 0.020983297, 0.017204937, -0.024901899, -0.019945737, 0.005133403, 0.05732276, 0.010232167, 0.008901802, 0.040282592, 0.0074892845, -0.020326111, 0.013267913, 0.043946274, -0.013574166, -0.015134424, 0.04292407, 0.00045118466, -0.00271784, -0.03214125, -0.008353504, -0.0293209, -0.012721512, -0.03329724, 0.0008817557, -0.0002376105, -0.038736217, -0.008456964, 0.013111278, 0.011718602, 0.031352207, -0.003782912, 0.013073269, 0.011737562, -0.020416202, -0.014648454, -0.013082329, 0.011480557, 0.035921644, -0.012651586, 0.005820404, -0.006779536, 0.029058974, -0.015509855, -0.002555625, -0.008817913, -0.024512481, -0.033159386, 0.010888843, -0.007581237, 0.0016907826, 0.0057794205, -0.008219128, 0.006472985, -0.005024929, -0.01991682, -0.005436143, 0.00026913325, 0.013581224, -0.009057193, 0.006915069, 0.0074210605, 0.013555277, -0.008325527, -0.0061107418, -0.024425345, 0.031235984, -0.018114865, 0.00040237335, 0.008919037, 0.015514434, 0.0052368073, -0.008901031, -0.005439018, 9.26358e-5, 0.018621637, -0.0077446424, -0.016646504, 0.024137074, 0.021567233, -0.041126132, 0.0017576391, -0.048779353, -0.0057608495, 0.01905366, 0.005613843, -0.005470585, 0.00744791, -0.024496488, 0.0031664579, 0.024597209, 0.028597385, -0.024701158, -0.0140091935, 0.003234483, -0.004846104, 0.0042813206, 0.019149464, -0.005187218, 0.0064600743, 0.00493784, 0.04606403, -0.01048411, -0.00162668, 0.010738386, -0.009768656, -0.0050411103, 0.02144314, -0.04414972, 0.00041463057, -0.0032899238, 0.008109798, -0.012352928, 0.0065593026, 0.010353487, 0.0028423893, 0.013135916, -0.0039398097, -0.004121178, 0.024602087, -0.01091936, 0.013692338, 0.0019676068, 0.0013684292, 0.0112573905, 0.025386289, -0.02811299, 0.0130760465, 0.0046506133, 0.01387603, -0.020558497, -0.016774982, 0.014767139, -0.099855974, 0.01467255, 0.017026946, -0.016399808, -0.020507282, -0.009614551, -0.0023774588, -0.014569903, -0.0020934248, 0.015412634, 0.008774622, 0.013727211, 0.0074426103, 0.001943948, 0.011541385, -0.0042651105, -0.012985057, 0.00548386, 0.0013702521, -0.027732296, 0.010325875, 0.00023869751, 0.012076046, 0.0070118173, 0.009182527, 0.005591884, -0.0023824216, 0.01753708, 0.0100315735, 0.011372821, -0.028288422, -0.0023665857, -0.012707787, 0.04151806, 0.021091165, 0.0013005476, 0.0006152542, -0.005350775, 0.021467244, 0.017197203, 0.018492775, -0.0010542145, -0.030478936, -0.007867999, -0.0015914442, 0.007420122, -0.0020226259, 0.0061996854, -0.0041859522, 0.01868747, -0.010407424, -0.028669465, 0.005803564, 0.0016762869, 0.00064339343, -0.018566528, -0.0038081375, 0.03116722, -0.010475402, 0.033056322, 0.026550796, 0.029343057, 0.015247419, 0.026159734, -0.013302126, 0.020575399, 0.011689292, 0.038196757, 0.004659276, -0.018297032, -0.019132746, 0.006966523, 0.0033600696, 0.0019522039, -0.0057526175, -0.025748422, -0.00087878236, 0.0016191304, -0.0005617266, 0.0116280755, -0.024909217, 0.021960132, -0.063659765, -0.013096563, 0.016410282, -0.017424192, 0.017364075, -0.0059444658, -0.008421132, 0.009362668, 0.0064508803, -5.297588e-5, -0.016864093, 0.011471455, -0.012330163, -0.015667407, -0.0048188693, -0.00011900458, -0.019147854, -0.017233854, 0.014329557, -0.011438915, -0.0011468978, -0.01734728, 0.0140369, -0.00022622287, -0.010255201, 0.012184412, -0.022584585, 0.002654911, 0.013779549, -0.009273879, 0.003988753, -0.14252262, -0.0037131584, 0.0027967258, -0.0035633682, -0.007532369, 0.006626078, -0.01098183, -0.010760576, -0.012734781, -0.020339634, 0.028502258, -0.022603672, -0.027568208, 0.0031929144, 0.010787166, 0.14449365, -0.0015969938, 0.00092860125, 0.0029452096, -0.011972836, 0.002495519, -0.009936555, -0.013150207, -0.0041656224, -0.015778791, -0.0006222762, 0.010094095, -0.011781542, -0.017925115, 0.0006292568, 0.016780555, 0.033504676, -0.005599649, 0.012926506, 0.0040554185, -0.009279297, 0.016366646, -0.022002492, 0.027299367, -0.012479513, -0.00029877143, 0.010324437, 0.006207291, -0.011430846, -0.010021185, -0.0151424045, -0.008600082, 0.001837453, -0.0394833, 0.035380505, -0.006543641, -0.074971765, 0.02284192, 0.010719777, 0.004916757, 0.0024111718, -0.0060460083, 0.02232566, 0.024594573, 0.00032199337, 0.01783702, 0.009289996, 0.01822899, -0.0012353688, -0.014161423, -0.0013617675, 0.018629203, 0.008582051, 0.0006999654, -0.019433307, 0.0025201845, 0.018248301, 9.235e-5, 0.029981574, -0.007061224, -0.0011177178, -0.027410733, 0.012116251, 0.018070856, -0.0101609295, 0.011918554, 0.01309245, 0.020486537, 0.034522712, 0.00243093, -0.0023045084, -0.02490266, -0.0063610785, -0.008521225, 0.011291255, 0.01341986, 0.0100545185, -0.028128145, 0.020707218, -0.0016026598, 0.012488329, -0.0024165022, -0.013692218, -0.0031459166, 0.022997221, -0.0018785155, 0.0051798224, -0.01719246, -0.025237145, 0.015737029, 0.013304271, 0.023309935, 0.012734128, 0.042392116, 0.013867191 ], "ai_confidence_score": 0.9999999999999999, "ai_extraction_metadata": { "extracted_at": "2026-02-20T01:12:22.239284Z", "ai_model": "gemini-2.0-flash-lite", "extraction_method": "automated", "content_length": 21857, "url": "https:\/\/nytimes.com\/2026\/02\/12\/insider\/jeffrey-epstein-files-documents.html", "existing_metadata": { "author_name": null, "published_at": null, "domain_name": null, "site_name": null, "section": null, "publisher": null } } } - Database ID
- 14061
- UUID
- a11a4308-45bf-4db2-9f3f-83143fc18e14
- Submitted By User ID
- 7
- Created At
- February 17, 2026 at 3:20 PM
- Updated At
- February 20, 2026 at 1:12 AM
- AI Source Vector
-
Vector length: 768
View Vector Data
[ -0.0033185987, -0.009612364, 0.0045312024, -0.083853245, -0.0023977137, -0.00090110773, 0.012895561, 0.0008642049, 5.523112e-5, 0.00027476923 ]... (showing first 10 of 768 values) - AI Extraction Metadata
-
{ "extracted_at": "2026-02-20T01:12:22.239284Z", "ai_model": "gemini-2.0-flash-lite", "extraction_method": "automated", "content_length": 21857, "url": "https:\/\/nytimes.com\/2026\/02\/12\/insider\/jeffrey-epstein-files-documents.html", "existing_metadata": { "author_name": null, "published_at": null, "domain_name": null, "site_name": null, "section": null, "publisher": null } } - Original Content
-
<html lang="en" class="story nytapp-vi-article nytapp-vi-story story nytapp-vi-article " data-nyt-compute-assignment="fallback" xmlns:og="http://opengraphprotocol.org/schema/" data-rh="lang,class"><head> <meta charset="utf-8"> <title>How The Times Is Digging Into Millions of Pages of Epstein Files - The New York Times</title> <meta data-rh="true" name="robots" content="noarchive, max-image-preview:large"><meta data-rh="true" name="description" content="Two dozen journalists. A pile of pages that would reach the top of the Empire State Building. And an effort to find the next revelation in a sprawling case."><meta data-rh="true" property="twitter:url" content="https://www.nytimes.com/2026/02/12/insider/jeffrey-epstein-files-documents.html"><meta data-rh="true" property="twitter:title" content="How The Times Is Digging Into Millions of Pages of Epstein Files"><meta data-rh="true" property="twitter:description" content="Two dozen journalists. A pile of pages that wou... - Parsed Content
-
The Epstein FilesLatest ReleaseConspiracy Theories FlourishFiles Include VideosLawmakers Question BondiPowerful Men in FilesReferences to TrumpAdvertisementSKIP ADVERTISEMENTSupported bySKIP ADVERTISEMENTTimes InsiderHow The Times Is Digging Into Millions of Pages of Epstein FilesTwo dozen journalists. A pile of pages that would reach the top of the Empire State Building. And an effort to find the next revelation in a sprawling case.Share full articleA photo of Jeffrey Epstein with other faces redacted by the Justice Department.Credit...U.S. Department of JusticeInterview by Patrick HealyWith Steve EderAndrew ChavezKirsten Danis and Dylan FreedmanFeb. 12, 2026It is one of the largest and most complex reporting projects in recent New York Times history: searching for facts, revelations and answers in the Jeffrey Epstein files.About two dozen journalists are working through the three million pages, 180,000 images and 2,000 videos contained in the trove of files released about two weeks a...
Processing Status Details
Detailed status of each processing step.
- Pipeline Status
-
Completed Started: Feb 20, 2026 1:12 AM Completed: Feb 20, 2026 1:14 AM
- AI Extraction Status
-
Pending
Re-evaluate with Updated AI
Re-process this source with the latest AI models and improved claim extraction algorithms. This will update the AI analysis and extract new claims without re-scraping the content.
Claims from this Source (56)
All claims extracted from this source document.
-
π€ The author π News Article π a116383f-f816-4c06-876a-4afd8ba0b950Simplified: Epstein Files include videos
-
π€ The author π News Article π a11f1d10-f178-4c5e-b89b-c590c3db5553Simplified: About two dozen journalists have seen only 2 to 3 percent of the material in the three million pages 180000 images and 2000 videos
-
π€ The author π News Article π a11f1d11-cc64-4b77-8d18-b0a6a0dcc175Simplified: It would take years for a group to comb through all the information and verify it
-
π€ The author π News Article π a11f1d12-0d85-4107-9d13-ff9b57f6f84eSimplified: They decided to start with search terms
-
π€ The author π News Article π a1163841-7d65-4abc-9c40-60f0c2a756a6Simplified: It is unclear if or when Epstein sold the other half
-
π€ The author π News Article π·οΈ Investigation , Blackmail π a11f1d12-bac6-4dbf-9421-3bddd15f66e0Simplified: Epstein collected secrets for blackmail or leverage
-
π€ The author π News Article π·οΈ Investigation , Crime π a11f1d13-007e-4012-ba21-dacc012c9507Simplified: An important question was whether there was hard evidence of other criminality
-
Simplified: It was widely believed Epstein files would reveal Epstein trafficked underage girls
-
Simplified: Research has not shown mold is increasing
-
Simplified: Bringing clarity to this question remains a priority
-
π€ The author π News Article π·οΈ Investigation , Power π a11f1d13-f116-48be-8589-0c2cb01d5799Simplified: The author is getting an inside look at how Epstein operated trading gifts and favors for access and power
-
π€ The author π News Article π·οΈ Investigation , Social Behavior π a11f1d14-512f-43f4-9ab3-52ecfb157ba7Simplified: Epstein tried to entice elites by inviting them to his home dinner parties and his island
-
Simplified: Anything about the president was going to be newsworthy
-
π€ The author π News Article π·οΈ Investigation , Sexual Abuse π a11f1d14-e353-4afa-a1fb-6c7802537be4Simplified: Investigators pulled together a document summarizing more than a dozen tips about Trump and Epstein including sexual abuse
-
Simplified: The tips were unverified and had no dates or names so the author could not report them
-
π€ The author π News Article π a11f1d16-3a80-404a-8454-5c8d336a4aa2Simplified: The author wanted to do two things
-
Simplified: The author described the accusations in general terms but not airing unverified details
-
π€ The author π News Article π·οΈ Investigation , Journalism π a11f1d18-30ed-4911-8fe4-048ea5b94dabSimplified: The emails did not include corroborating evidence and The New York Times is not describing the details of the unverified claims
-
Simplified: The documents contain duplicates glitches and inconsistent redactions which can amplify confusion
-
Simplified: An email described a Brazilian woman as =9yo when the = was an apparent error since another version read 19yo
-
π€ The author π News Article π·οΈ Investigation , Verification π a11f1d1a-306a-4470-ba33-ffd5d04b2024Simplified: The tools built helped quickly verify these types of claims
-
Simplified: The author used caution and looked for multiple versions of the same document when possible
-
π€ The author π News Article π·οΈ Investigation , Trump π a11f1d1a-d412-46fc-9585-c92677d2f8aeSimplified: The author reported the files contained more than 38000 references to President Trump
-
π€ The author π News Article π·οΈ Investigation , Trump π a11f1d1b-0e2a-4dac-9ad0-aedbb9b8b497Simplified: Epstein often exchanged emails where he or his contacts mentioned Trump
-
Simplified: A lot of news clippings are mixed into the files
-
Simplified: A file of text messages between Epstein and Steve Bannon includes a photo of Trump giving a speech with his face covered with a black redaction box
-
The Justice Department published dozens of unredacted nude images as part of the document release.1.000Simplified: The Justice Department published dozens of unredacted nude images as part of the document release
-
Simplified: We have used other available documents to fill in the blanks and called sources that we have developed over years of reporting on Epstein
-
Simplified: People are claiming to βundoβ redactions using A.I. or other techniques
-
Simplified: In many cases what we are seeing in some online videos is an A.I. hallucination of what it assumes is under the redaction black box
-
Simplified: Investigators received dozens of leads related to Trump
-
Simplified: Trump has a troubling history with women including being found liable for sexual abuse
-
Simplified: We do not make assumptions we need to verify which often means painstaking work that can take time
-
Simplified: One way we did that was by leveraging something called semantic search which lets reporters search for concepts and find matching text even if the exa...
-
π€ The author π News Article π·οΈ Technology , Media π a11f1d1f-4559-4373-b270-fdd48099fd67Simplified: A.I. enabled us to create specializing tooling to parse the Epstein files in just a couple of days that would normally take engineering teams weeks to...
-
π€ The author π News Article π·οΈ Technology , Media π a11f1d1f-80f1-4c36-834c-a48fc08eebffSimplified: This included tools to search photos visually identify duplicate documents sift through video and audio transcripts and compile research reports on ne...
-
π€ The author π News Article π·οΈ Government , Legal π a1163b0f-fc42-4529-a7f4-1e0cae447b56Simplified: Justice Department released redacted documents showing email chains from Jeffrey Epstein
-
Simplified: Those releases gave us a chance to stress test our existing tools and create a wish list of search gadgets and buttons
-
Simplified: Teams of software engineers like mine and Dylanβs sit in the newsroom and have the ability to take these kinds of requests
-
Simplified: While reporters are searching the docs at 11 p.m. we are tweaking the search engine and fixing bugs as they find them making live improvements
-
Simplified: We keep track of reporting lines and try to make sure that the tools we have can get us where we need to go
-
π€ FREEDMAN π News Article π·οΈ Technology , Media π a11f1d21-0955-4ad9-9109-dd8ef5d6eb2aSimplified: A.I. is really good at extracting text from images and audio captioning photos assigning structure to text like emails
-
A.I. is really bad at news judgment β what information to include, whether itβs important.1.000π€ FREEDMAN π News Article π·οΈ Technology , Media π a11f1d21-b824-4d51-bd86-5691f3ea340fSimplified: A.I. is really bad at news judgment what information to include whether it is important
-
π€ Dr. Adam Rodman π News Article π·οΈ Technology , Health π a116451a-2789-4f2c-a884-4cf5717249c1Simplified: With A.I. researchers can document then reduce bias
-
π€ Ms. Greenleaf π News Article π·οΈ Technology , Career π a116817e-9a9e-4de5-8333-da4fc76158a5Simplified: A.I. is not doing her work
-
π€ The author π News Article π·οΈ Artificial Intelligence π a11f1d22-d3da-48fb-bbf3-1b3f4e58e7e8Simplified: A.I. is not great at producing original ideas but decent at synthesizing or distilling them
-
π€ CHAVEZ π News Article π·οΈ Journalism , Artificial Intelligence π a11f1d23-07eb-48cb-ac77-f471584d1babSimplified: Reporters treat signals using A.I. as another tip
-
π€ FREEDMAN π News Article π·οΈ Bias , Artificial Intelligence π a11f1d23-44ad-473f-a76f-0d260719da53Simplified: Confirmation bias is still a very real risk
-
Simplified: Sycophancy in chatbots is a trait manifested partly because their training involves human beings rating their responses
-
π€ FREEDMAN π News Article π·οΈ Artificial Intelligence , Bias π a11f1d23-b563-4ecd-987c-b2855f24d8d5Simplified: Mitigate this by telling people to search for opposing viewpoints
-
π€ FREEDMAN π News Article π·οΈ Artificial Intelligence , Tools π a11f1d23-f305-43c6-918c-db2cecf284a3Simplified: Build tools that employ A.I. in less directed ways to group materials cluster themes or surface questions
-
Simplified: Mr Epstein collected friends and associates in an astonishing array of places
-
π€ EDER π News Article π·οΈ Investigation , Epstein π a11f1d24-5812-4202-85e4-ad1884b82c30Simplified: It is hard to believe there is still much to learn about Epstein and his network
-
π€ FREEDMAN π News Article π·οΈ Investigation , Epstein π a11f1d24-a960-4c5c-a3e8-e73923591dd4Simplified: Epsteinβs photographs and coded language left with gaping discomfort
-
π€ CHAVEZ π News Article π·οΈ Investigation , Epstein π a11f1d24-e56b-4ccd-89e1-2eebe8f059feSimplified: There is an unfiltered nature especially in correspondence that was unrecognizable