
Loading summary
A
3 million pages of evidence. Thousands of unsealed flight logs. Millions of data points, names, themes and timelines connected. You are listening to the Epstein Files, the world's first AI native investigation into the case that traditional journalism simply could not handle.
B
Welcome to the Epstein Files.
C
Last time we traced the Dubin family's post conviction, ties to Epstein, a 2010 social invitation, subpoenaed financial records and victim testimony naming their household.
B
Today, we are looking at official White House visitor logs showing Epstein entered the Clinton White house at least 17 times between 1993 and 2000, while his abuse operation was already running. As part of our ongoing investigation.
C
As always, every document and source we reference is available at epsteinfiles fm.
B
So let us start with a document. The White House visitor logs released under the Epstein Files Transparency Act. Official government records listing Eppetine's entry dates, the offices he accessed, and the staff who signed him in.
C
Right. And to really understand the gravity of these documents, you need to grasp the actual mechanism behind them. I mean, these are not just guest books sitting on a podium at a museum.
B
No, not at all.
C
These are waves, records of. WAVES stands for the Workers and Visitors Entry System. This is the definitive official security database maintained exclusively by the United States Secret Service.
B
Which is a crucial distinction.
C
Exactly. Because when apologists or, you know, public relations teams try to wave away a political connection as just a passing anecdote or some baseless rumor, the WAVE system provides the undeniable mathematical ground truth. You cannot fake a WAVES entry.
B
Right. You cannot accidentally end up in this database. Picture yourself trying to get into the White House. You can't simply walk up to the northwest gate on Pennsylvania Avenue, smile at the armed guards and ask to look around.
C
Yeah, the protocol is rigid. To even get into the WAVE system in the first place, a specific designated host who already works inside the White House complex has to initiate the process.
B
An internal staffer.
C
Correct. That internal staffer must submit the visitor's full legal name, their date of birth and their Social Security number directly to the Secret Service well in advance of the actual visit.
B
So they are doing serious vetting before you even approach the gate.
C
The Secret Service runs a background check through multiple federal databases. They are checking for active warrants, criminal history, any security threats. Only after that background check clears is the authorization granted. Jeffrey Epstein passed through that specific rigorous security hurdle at least 17 separate times during the Clinton administration.
B
Think about the sheer amount of time we are talking about here. This was not a single weekend where he tagged along with a prominent donor. He was walking through those security Gates consistently year after year, from 1993 all the way to 2000.
C
It's a sustained period of high level entry.
B
The timeline begins in 1993, which is the very first year of the Clinton administration. He wastes no time. He begins appearing in the Secret Service visitor logs right out of the gate.
C
But to view this strictly through the lens of one political party is to miss the entire architecture of his operation. The documents released under the Epstein Files Transparency act, specifically the handwritten notes from prosecutors, reveal that his strategy for political access was aggressively, deliberately bipartisan.
B
Because during this exact Same Window, from 1993 to 1996, the records show Donald Trump flew on Epstein's private jet eight separate times.
C
That parallel tracking is absolutely essential for you to grasp the scope of what this man was doing. On one side of the Ledger, you have eight flights on a private Boeing 727 jet with a prominent real estate developer, a major media figure, and a future Republican president.
B
And private aviation is an incredibly intimate setting, highly intimate.
C
You bypass commercial security. You are in a small enclosed space, and you are building a specific type of rapport.
B
Then, on the other side of the
C
ledger, occurring in the exact same years, you have recurring, documented security clearances into a Democratic White House. He was systematically blanketing the highest echelons of American society. He was building bridges to power regardless of the political party in charge.
B
Returning to The White House waves logs, the spacing of these 17 visits reveals a deep level of integration. They were not clustered into a single anomalous week or a frantic month of lobbying. They were spread methodically across two full presidential terms.
C
And that level of sustained access requires more than just one friend on the inside.
B
It requires multiple points of contact. Every single one of those 17 entries required a gatekeeper. That means an internal White House staffer picked up a secure phone or filled out an official clearance form to authorize the Secret Service to open those heavy iron gates.
C
It requires someone willing to attach their own professional name and their own security clearance to his visit. The staffer serves as the sponsor. If the visitor does something wrong, the sponsor answers for it. So 17 times someone inside the executive branch decided his presence was necessary and vouched for him.
B
I'm looking at the document here, and it specifically says the visitee, the stated purpose of the appointment and the entry time as recorded by the Secret Service checkpoint.
C
Look at the text there.
B
When you read down the column. For the stated purpose, the logs use incredibly benign administrative language. They use routine scheduling and terms, words that suggest standard bureaucratic meetings.
C
The official story doesn't match the data. You have to stop and ask yourself a very basic, fundamental question. Why does a private financier require 17 separate security clearances into the executive complex of the United States government?
B
He had no official role.
C
None. Jeffrey Epstein held no government contract. He had no publicly stated policy portfolio. He was not a registered lobbyist advocating for an industry. He. There is absolutely no public record of him advising the Clinton administration on economic policy, foreign affairs, or domestic legislation. He had no official reason to be there.
B
So what was the actual purpose of the appointment? The language in the WAVES log is vague. And that vagueness serves a specific protective function. It obscures the true nature of the relationship between the visitor and the visitee.
C
Who benefits from a system where a man with zero official government business can secure 17 visits of under the guise of vague administrative terminology? Both sides do exactly. The staffer benefits because they do not have to explain why they are bringing a controversial money manager into the building. And Epstein benefits because he gets the prestige of the visit. Without the public scrutiny of a documented policy meeting, it is a mutually beneficial blind spot.
B
To understand how anomalous this is, you have to look past the raw data of the dates and times. You have to look at the physical geography of where the Secret Service actually permitted him to go. I'm looking at the document here, and it specifically says the location code and the office designation associated with the clearance.
C
The geography of the White House complex is incredibly revealing. It is divided into very strict, distinct security zones.
B
Right. If you picture the layout, you have the East Wing. The East Wing handles social events, ceremonial duties, public tours, and large receptions. When people talk about wealthy donors attending a White House Christmas party. Yeah, they're talking about the East Wing. Then on the other side, you have the West Wing and the Old Executive Office Building. Often called the oeob. This zone handles hard policy, national security, and high level staff appointments.
C
The physical geography of power in Washington is highly restricted. When a visitor is cleared into the WAVE system, the Secret Service does not hand them a badge and tell them to roam freely around the grounds.
B
No, they are cleared for a specific building, a specific corridor, and often a specific room number.
C
If a visitor is attending a state dinner or a massive social reception, the logs reflect an East Wing routing. Hundreds of people cycle through those events. You can hide in a crowd, but
B
the WAVES logs released under the Epstein files Transparency act show a completely different pattern. The location codes route Epstein through the West Wing lobby and directly into the Old Executive Office Building. He is bypassing the social spaces and entering the Working corridors of the executive
C
branch walk through the physical path he would take based on these location codes. He arrives at the Secret Service checkpoint. He passes through the magnetometer. He presents his government issued identification.
B
The agents verify his WAVES clearance and he receives a visitor badge.
C
From there, protocol mandates a physical escort. An intern or a staff member meets him at the gate and escorts him directly to the designated office.
B
And look at the nature of these offices. The OEOB and the West Wing house the National Security Council, the Office of the Vice President, Senior Domestic Policy Advisors. These are working environments.
C
Over the years, Clinton administration officials and their defenders have historically characterized Epstein as a peripheral social acquaintance. They frame him as a wealthy donor who occasionally popped up at large crowded public functions where the President took hundreds of photos.
B
That contradicts the evidence. The physical location codes in the Secret Service logs tell a completely different story. If a person is merely a casual acquaintance or a peripheral campaign donor, their access remains limited to the East Wing social spaces. You go to the lawn party, you shake hands, you leave the visitor logs clear in into small closed door West Wing and OEOB offices.
C
These spaces are designed for private localized meetings. You do not hold a large social reception in a cramped staffer's office in the old Executive Office building. It simply does not happen. The geography dictates the intimacy of the meeting.
B
So what specific information is being obscured by officials framing these 17 visits as routine social calls?
C
The geographic reality of his clearances points directly to staff level engagement. He was sitting down in offices where actual government work was being conducted.
B
The 17 visits are a staggering data point on their own. But to grasp the true gravity of these documents, you have to overlay this White House access with the documented timeline of Epstein's abuse operation.
C
This is where the investigation demands absolute clarity. The FBI and Palm beach police records establish a definitive, undeniable timeline. The systematic exploitation of young women, the trafficking, the coercion.
B
This was not some later development in his life.
C
No, it was not a sudden pivot in the 2000s. The law enforcement records prove his abuse operation was fully active, highly organized and rapidly expanding concurrently with his political access building in the 1990s.
B
The parallel timeline is the core of this investigation. You are looking at two massive infrastructures being construct at the exact same time by the exact same man.
C
Timeline one is the political credentialing. This includes the 17 White House visits from 1993 to 2000. The private jet flights with Donald Trump, the high profile social events.
B
Timeline 2 is the blueprint of exploitation during those exact same years. The documents Released under the Epstein files Transparency act. Detail his other major projects.
C
Look at the structural moves he was making. While it was clearing White House security, He was establishing MC2 Model Management with Jean Luc Brunel.
B
A modeling agency provides the perfect logistical cover for moving young women across international borders, securing visas and providing a veneer of professional legitimacy.
C
Exactly. And at the exact same time he is visiting the Old Executive Office Building, he is acquiring and outfitting his primary properties. He buys the massive mansion in Palm Beach. He secures the enormous townhouse in Manhattan. These physical locations became the hubs of his trafficking network.
B
You also have to factor in the network effect. During this specific window in the 1990s, he was utilizing Ghislaine Maxwell as his primary social facilitator.
C
She was introducing him to the strata of society that he could not penetrate on his own.
B
The FFTA documents reveal a sprawling, highly intentional web of cultivation. He did not just target politicians. He targeted the people who fund and influence politicians.
C
The communications we have access to now show exactly how this worked. We see Howard Lutnick, the current Commerce Secretary under Donald Trump, sending a direct invitation to Epstein for an intimate Clinton fundraiser.
B
We see emails from Elon Musk discussing the logistics for visiting Epstein's private island.
C
The strategy was immersion. He wanted to integrate himself so deeply into the fabric of power across business, politics, and science that his presence in any room became unquestioned.
B
The documentation points to a systematic approach to credentialing himself. By appearing at White House functions, flying on private jets with future presidents, and socializing with cabinet secretaries and tech billionaires, he manufactured an aura of total legitimacy.
C
Think about the psychology of it. When a lower level person or a potential victim sees a man moving seamlessly through these circles, the assumption is that he has been vetted.
B
The assumption is that he is safe.
C
The political access was the ultimate cover story.
B
This brings up a crucial debate regarding the gatekeepers who authorized his entry. One argument often presented by political insiders is that Epstein simply followed the recognizable, established pattern of major political donors leveraging their vast wealth for social access.
C
Right. Wealthy individuals frequently bundle campaign donations, and in exchange, they receive White House invitations. It is a cynical reality of the American political system, but it is a common one.
B
But his access was highly anomalous. Even within the cynical world of donor politics, Epstein stands out. He completely lacked the transparent institutional affiliations that typically explain that level of repeat entry.
C
He did not run a major political action committee. He was not the head of a recognized national labor union. He was not the CEO of a massive public corporation. Negotiating trade policy.
B
He was essentially a ghost in the traditional political machine.
C
The anomaly demands intense scrutiny. If he did not fit the traditional profile of a mega donor seeking policy favors, why did they keep letting him in? What is the standard of professional responsibility for the White House gatekeepers authorizing this repeat access?
B
Think about the moral and legal calculus here. While executive staffers cleared him through the Secret Service checkpoint 17 times, he was actively constructing an international trafficking ring.
C
What background checks were actually conducted by the administration? The Secret Service checks for outstanding warrants. But what about the political vetting process?
B
Did any vetting office flag his associations, his financial anomalies, or his behavior during those seven years? Or did the sheer amount of money he represented blind the gatekeepers to the risk?
C
The visitor logs give us the dates, they give us the times, and they give us the specific location codes. But raw data only tells part of the story. We have to rigorously analyze the blind spots. We have to look at what the logs do not show.
B
The first blind spot is technological. The 1990s digital logging within the wave system was fundamentally incomplete. The Clinton administration did not utilize the standardized, highly rigorous digital archival systems that were implemented in later decades.
C
Records from that era are notoriously fragmented. Therefore, when we say there are 17 documented entries, you have to understand that 17 represents the absolute floor of his access. It is the minimum verified number. It does not represent the ceiling.
B
The second, and far more concerning blind spot involves the active pattern of suppression surrounding these records. Reporting from NPR and Ms. NAW has exposed a deliberate, ongoing effort by the Department of Justice to withhold crucial documents from the public database.
C
This is where the bureaucratic cover up begins. The Epstein Files Transparency act was designed to mandate the release of all records related to this network. Yet federal agencies, specifically the DOJ and the FBI, are actively suppressing materials.
B
They are citing ongoing investigation exemptions to keep certain files locked away from the public and from journalists.
C
The NPR investigation provides granular detail on what is being hidden. They have identified missing pages of FBI interviews and handwritten agent notes. Specifically, there are 53 pages of FBI interview transcripts that have been scrubbed entirely or withheld from public view.
B
When federal agencies compile an investigative file, they use a system called bait stamping. It is a way of permanently numbering every single page of evidence sequentially. Page 001, page 002, and so on.
C
It ensures that in a court of law or during a public release, nothing gets lost.
B
The NPR review of the unique serial numbers on the released Epstein files shows that the BATEST suddenly jump out of sequence. They skip 53 digits.
C
The pages did not just get misplaced in a filing cabinet. The sequential numbering proves they were surgically removed from the file before the public release.
B
And what Was on those 53 missing pages? According to the investigative reports, these withheld documents contain explosive allegations regarding Donald Trump. A woman told the FBI in 2019 that she was sexually abused by Trump around 1983, when she was 13 or 14 years old.
C
She alleged that Jeffrey Epstein introduced her to Trump in New Jersey.
B
Look at what they're leaving out. The FBI conducted at least four separate formal interviews with this specific accuser. They sat down with her four times to take her statement.
C
Yet out of those four interviews, only one heavily redacted memo was published in the public database. All of the handwritten notes from the
B
investigating agents, the real time impressions, the specific details jotted down during the interviews, was completely omitted.
C
They vanished.
B
Furthermore, documents detailing a separate accuser have also been manipulated. This second accuser alleged that Epstein took her to Trump's Mar a Lago club when she was a minor.
C
The DOJ has repeatedly removed and re uploaded the files concerning this accuser, often altering the levels of redaction each time.
B
This kind of file manipulation triggers massive alarms. House Oversight Democrats have confirmed that the DOJ appears to have deliberately withheld these specific FBI interviews involving the allegations against Donald Trump.
C
The committee has actually launched a parallel investigation into the DoJ's handling of these exact files. They are demanding to know why direct evidence collected by federal agents regarding a former president is being suppressed under a law specifically designed for transparency.
B
The suppression spans the entire political spectrum. The bipartisan nature of the access is matched only by the bipartisan nature of the COVID up.
C
Exactly on one side of the aisle you have the Department of justice surgically withholding 53 pages of FBI interviews detailing severe allegations against a Republican President.
B
On the other side of the aisle, you have a complete absolute void of any internal White House documentation explaining Epstein's 17 visits to the Democratic Clinton White House.
C
How does a private figure visit the executive mansion 17 times over a span of seven years and and leave absolutely no paper trail behind other than the Secret Service sign in sheet at the security gate?
B
It completely defines standard bureaucratic procedure. The White House, regardless of who is president, runs on paper. Memoranda are drafted to prepare for every meeting. Briefing books are meticulously prepared by junior staff for every visitor of note.
C
Emails are sent to coordinate the arrival for a private individual to secure 17 separate waves clearances into the West Wing and the OEOB without generating a seven Single surviving piece of internal correspondence is highly irregular.
B
We must ask the logical questions about this missing paper trail. Was the documentation destroyed under standard retention schedules? Bureaucracies do clear out old files.
C
Was it deliberately withheld from Freedom of Information act requests and the FTA release, much like the FBI interview pages? Or was it intentionally never written down in the first place?
B
If it was never written down, that implies a level of operational security that is chilling.
C
If staffers knew not to put his name in a briefing memo, that implies an off the books arrangement. It bypasses all standard administrative oversight. It means the access was granted, but the purpose of the access was intentionally kept off the official record.
B
We are looking at a timeline from 1993 to 2000 that requires us to synthesize all of this evidence. On timeline one, we have the official government access records. We have 17 documented visits to the Clinton White House.
C
We see him escalating his political credentialing, attending East Wing events and accessing closed door West Wing offices. We see him flying on Donald Trump's private jet.
B
And on timeline two, occurring in the exact same years, month for month, we have the active, systematic construction of an international sex trafficking infrastructure. He is funding MC2 model management with Jean Luc Brunel.
C
He is buying the mansions. He is utilizing Ghislaine Maxwell to expand his network.
B
The central thesis of our investigation emerges vividly when you lay these two timelines side by side. The records released under the Epstein Files Transparency act strongly suggest that this White House access and this aggressive political networking was not a coincidence.
C
It was not just a wealthy man looking for a photo opportunity. It was a deliberate, calculated investment in political insulation.
B
By embedding himself in the credentialing infrastructure of power spanning multiple administrations, traversing party lines and infiltrating the highest levels of business and government, he built an impenetrable shield.
C
When he walked into a room, his associations spoke for him. That shield of high level connections is the exact same credentialing that eventually intimidated local prosecutors.
B
It is the infrastructure that led to the extraordinary, unprecedented plea deals and legal protections he enjoyed for decades, allowing him to largely evade federal prosecution in Florida.
C
Years later, the verified proofs we have laid out are clear. We have the specific dates of entry. We have the specific office location codes from the Secret Service. We have the overlapping guest lists and the private jet flight logs.
B
But the lingering voids remain massive and deeply troubling.
C
Who specifically advocated for his continued access inside the Clinton White House? Why does no surviving internal document question his presence in the Old Executive Office Building?
B
And what exactly is contained in those 53 pages of FBI interviews regarding Donald Trump that the Department of Justice absolutely refuses to release to the public?
C
The parallel timelines show a man who mastered the mechanics of elite access manipulating the highest offices in the country while simultaneously orchestrating profound, devastating exploitation.
B
Remember, this is an ongoing investigation and everything we cited is sourced at Epsteinfiles FM.
C
Next time on the Epstein Files, File 124 Epstein served 13 months in a county jail. He left for 16 hours a day.
A
You have just heard an analysis of the official record. Every claim, name and date mentioned in this episode is backed by primary source documents. You can view the original files for yourself at epsteinfiles fm. If you value this data first approach to journalism, please leave a few five star review wherever you're listening right now. It helps keep this investigation visible. We'll see you in the next file.
Podcast: The Epstein Files
Host: Island Investigation
Date: March 17, 2026
This episode systematically examines previously unreleased White House visitor logs showing Jeffrey Epstein’s documented access—17 visits—to the Clinton White House (1993–2000), while his abuse operation was actively running. Using AI-driven analysis of 3 million+ pages of evidence, the hosts present a meticulous breakdown of how Epstein navigated elite circles, the significance of the “WAVES” security logs, unexplained gaps in documentation, and the ongoing suppression of related FBI files.
Timestamps: 01:02–05:53
What Are WAVES Logs?
Epstein’s 17 Visits:
Anomalies and Vague Purposes:
Timestamps: 03:18–11:36
Political Access Was Bipartisan:
Physical Geography of His Visits:
Overlap With Abuse Operations:
Timestamps: 11:53–16:49
Epstein’s Strategy:
Why Was He Let In Repeatedly?
Blind Spots in the Public Record:
Timestamps: 16:49–21:03
Allegations Against Trump Hidden:
No Internal Records for Epstein’s White House Visits:
Implications of a Deliberate Blind Spot:
Timestamps: 21:04–22:43
The episode delivers a dense, fact-driven account of Epstein’s sustained, privileged access to the White House, juxtaposed with the continual expansion of his criminal network. It underscores how official records—while damning—still leave critical gaps, often a result of incomplete technology or deliberate suppression across administrations. The hosts raise open questions about the identities and motivations of internal gatekeepers, the nature of intentionally missing documentation, and the suppressed FBI files relating to both political parties.
“When he walked into a room, his associations spoke for him. That shield of high level connections is the exact same credentialing that eventually intimidated local prosecutors.” — C (21:37)
File 124: Epstein’s minimal jail time—served in county jail with extensive freedoms—will be dissected in the next episode.
All episode sources and referenced documents available at epsteinfiles.fm.