Julian Dorey Podcast #351
Guest: Mike Yagley (DARPA-Linked Data Hacker)
Title: “I Tracked Elite’s Phones to Epstein Island in 2016!”
Date: November 3, 2025
Host: Julian Dorey
Episode Overview
Theme:
Julian Dorey sits down with Mike Yagley—a data analyst and government contractor with ties to DARPA—to discuss his independent investigation into the Jeffrey Epstein case using commercially available mobile device data. Yagley explains how he tracked the presence of influential figures (including CEOs, publishers, and public personalities) at Epstein’s infamous island after 2015, years after Epstein’s initial conviction. The conversation evolves into a deep exploration of surveillance, digital privacy, open-source intelligence, government overreach, and the power of platforms like Palantir, as well as a candid look at how government and big tech manage (or miss) enormous troves of sensitive information.
Key Discussion Points & Insights
1. Mike Yagley’s Background & Government Data Work
- Yagley describes himself as having been in the thick of “location intelligence”—collecting and analyzing large commercial mobile device data sets, sometimes in support of contractors or agencies like DARPA (00:50, 101:32).
- He previously helped demonstrate to government leaders how easy it is to inadvertently expose operational security by tracking US special forces and other sensitive locations using public or commercial data (15:05).
- With experience in defense and retail analytics, Yagley frequently bridges commercial and government data work, emphasizing the gray ethics and legalities that come with this (119:02).
“Tech is interesting.” (00:57, Yagley)
2. Investigating Epstein’s Island: Methods & Findings
- Yagley specifically tracked mobile device dwellings at Epstein’s island beginning as early as 2015, showing that elite figures continued visiting long after Epstein’s legal troubles began (07:45, 09:54).
- The analytic process involved identifying “seed locations” (like Epstein’s island or Manhattan penthouse), then cross-referencing persistent device patterns with public information about home or work addresses, building “probabilistic social graphs” (03:45).
- Notable: These data points, while not definitive proof, yield high-probability identity matches (08:43, 09:54), highlighting the alarming ease of social graphing through commercial data.
“These are not facts—because I’m not looking at this device, [saying] this device identifier belongs to this name. I’m seeing where it sleeps… where it works…so I’m sharpening that hypothesis as to who this device belongs to.” (08:43, Yagley)
- Yagley discovered patterns indicating that even after becoming a public pariah, Epstein’s island received visits from major CEOs, publishers, entertainers, and even some religious figures (18:15).
“CEOs of studios, publishers of major newspapers, some entertainers, some religious folks…” (18:15, Yagley)
- He also mapped the presence of staff (bartenders, maids, groundskeepers) and their intertwined patterns with guests and victims (20:58, 22:06).
3. Reaction and Official (In)Action
- Yagley claims he made his findings available to contacts who could elevate them to authorities but “the call never came.” (13:00, 15:57, 73:07)
- Multiple administrations (Obama, Trump, Biden) have shown similar inertia or reluctance to prosecute, despite mountains of publicly available evidence and victim depositions (25:15).
“The reaction was, I will push this where I can, but I'm not going to die on this hill.” (73:55, Yagley)
4. Barriers to Prosecution: The Evidence Problem
- Yagley details that while location data is powerful, it’s considered “probabilistic” and likely inadmissible as the sole source of evidence—defense counsel can easily attack its provenance (37:22, 47:18).
- Theoretically, law enforcement could independently reproduce his findings with their own tools and warrants, yet seem disinterested or obstructed (50:10).
5. Surveillance, Privacy, and Government Overreach
a. Bulk Surveillance Normalization
- Extensive conversation around how surveillance capabilities, initially justified for national security, create mission creep and threaten the average citizen’s rights (54:38, 120:11).
- Yagley is sharply critical of legal and administrative loopholes (Patriot Act, Rule 1033) that normalize “open APIs” and the slow, iterative loss of privacy (103:33, 125:34, 129:27).
“Surveillance just doesn't pop up one day. It's iterative, it's slow, it capitalizes on... All of these systems are integrated. There are no firebreaks between your bank and potentially Google.” (129:29, Yagley)
b. Politicians and Hypocrisy
- Yagley references senators (like Lindsey Graham) who support surveillance until it’s turned on them—highlighting “rules for thee, not for me.” (54:38, 56:40)
c. Commercial Tech & Data Exploitation
- Yagley warns: The private sector, chasing “convenience,” often creates more powerful surveillance tools than the government. Devices exfiltrate data continuously—airplane mode or not—and big tech firms retain immense power and ability to respond to government subpoenas (140:11).
6. Intelligence, Influence & The Deep State
- Yagley and Dorey float hypotheses on Epstein’s connections to intelligence agencies (Mossad, CIA), suggesting a shadowy rationale for federal foot-dragging and multi-administration coverups (65:58, 66:45, 67:35).
- They discuss the “deep state” not as a single cabal, but as a metastasizing bureaucracy and mission creep in the security apparatus. In Yagley’s view, it’s a self-perpetuating cancer rather than a centrally coordinated conspiracy (164:41).
7. Case Studies in Data, Law, and Loopholes
- Discussion of recent surveillance controversies (Durham investigation, FISA courts, DNA collection via abandoned coffee cups—see 51:29) illuminate how public/private data, technicalities, and Fourth Amendment boundaries are increasingly blurred and selectively enforced.
8. Grindr, CCP, and National Security
- Yagley recounts how commercial data sets revealed a Chinese firm’s interest in acquiring Grindr, showing government employees’ personal data easily trackable through commercial apps—a major national security risk (74:27, 75:05).
9. Tools of Mass Data Integration: Palantir & AI
- Yagley explains why Palantir became indispensable: it aggregated disparate military and intelligence data sources into common dashboards, building a unified “operating picture” for decision-makers on complex operations (151:20).
- He distinguishes between data collection and analysis: Palantir is not usually the collector but the integrator/analytic layer (148:52, 149:59).
- He raises concerns about predictive policing, the risk of applying these tools against citizens, and the mainstreaming of “Minority Report”-style thinking (157:08).
Notable Quotes & Memorable Moments
-
On Elite Arrogance:
“This may be [what’s] counterfactual about people that are really smart—they think they're too smart and can get away with it.” (10:50, Mike Yagley)
-
On Institutional Inaction:
“All three [administrations]...have sort of exhibited the same outlook about it. I don't know what to read into that, other than there isn't anything for us to prosecute against. So we've moved on.” (24:05, Yagley)
-
On Data’s Power and Danger:
“A multi-decimal, latitudinal and longitudinal coordinate does not lie.” (61:00, Yagley)
-
On Probabilistic Evidence:
“It's clues and leads. They would have to go and take my tips and develop prosecutorial evidence...Because location data is again, it's a probabilistic assessment.” (37:22, Yagley)
-
On Over-classification:
“When we start over-classifying, then the bias is to do something that, you know, maybe you wouldn't normally do, but I can classify it and keep it from transparency.” (89:14, Yagley)
-
On the “Normalization of Deviance”:
“That slips into the normalization of deviance where, hey, there’s been no harm, so there shall be no harm—until there’s harm.” (125:34, Yagley)
-
On Surveillance’s Seductive Danger:
“Surveillance, it’s almost like nefarious. It, it speaks to you in ways that are seductive... But the third order effects...when things are frictionless. That’s when Orwellian society becomes like, no, it’s just the way it is.” (161:59, Yagley)
Important Segment Timestamps
-
Epstein Devices Investigation (Methodology & Ethics):
[02:39–08:43], [09:54–13:00], [18:15–24:05], [47:18–53:39] -
Probabilistic Identification & Social Graphs:
[03:45–08:43] -
Government Cover-up & Lack of Prosecution:
[25:15–34:28], [55:15–61:22] -
Surveillance, Fourth Amendment, and Data Loopholes:
[47:18–56:40], [119:02–129:27], [129:29–135:22] -
China, Grindr, and National Security Risk:
[74:27–79:12] -
AI, Palantir, and Data Fusion:
[148:52–157:08] -
DARPA, Total Information Awareness, and Tech Forecasting:
[101:32–112:07]
Flow & Tone
The episode balances technical explanations (on open source intelligence, legal evidentiary standards, and digital tracking) with energetic, skeptical banter. Dorey plays an informed, incredulous everyman, while Yagley’s tone is pragmatic, sometimes darkly humorous, and always rooted in a sense of mission—often emphasizing both the potential and peril of new surveillance technologies. Both show a strong distrust of official narratives and are transparently cynical about elite impunity.
Conclusion: Big Themes
- The technical means to expose criminal elite behavior—especially in the Epstein orbit—exist and are in use, but political will and evidentiary standards present huge barriers to justice.
- The U.S. is dangerously close to normalizing total surveillance of citizens, with government and commercial actors both complicit—too often under the banners of convenience, security, or progress.
- Innovations like Palantir and commercial AI are double-edged swords: while they can focus and simplify oversight, they also risk supercharging abuses if left unregulated and unchecked.
- Ordinary people need to become much more aware of, and insistent about, their privacy rights—lest subtle administrative changes end up controlling the most intimate parts of their lives.
“Follow the money. Follow the devices. The truth is out there—if you want to look.” (Paraphrased, Yagley’s analytic ethos throughout)
For listeners wanting to understand how the world’s most powerful people evade scrutiny—and how technology could both help and hinder justice for the rest of us—this is an unmissable, deeply revealing conversation.
