
Loading summary
A
Hey, it's the creator of the Epstein Files. Before we get into today's episode, I wanted to share a quick note about subscribing to our newsletter. What you're listening to is part of the Neural Broadcast Network. We built NBN around one source rich primary source investigations that cut through the noise. No spin, no agenda, just the raw intelligence. We have more IP dropping soon. New shows, new investigations and newsletter subscribers. Hear about it. First link is at NBN fm or find it in the description wherever you're listening. Alright, let's get into it.
B
3 million pages of evidence. Thousands of unsealed flight logs. Millions of data points, names, themes and timelines connected. You are listening to the Epstein Files, the world's first AI native investigation into the case that traditional journalism simply could not handle.
C
Welcome back to the Epstein Files. Last time we looked at Leon Botstein, Bard College and the institutional fallout. Today we are following Peter Attia, Wellness Media and the Epstein Files Fallout. As always, every document and source we reference is available on the Neural Broadcast Network website. So we start with Peter eti's appearances in Epstein related email records and the Wellness Media fallout. Because that document trail sets up the first anomaly. Immediate.
D
Right. We are beginning with the primary record for this examination. Yes, this is a public release record. It is a Wellness and Longevity audio broadcast. The documented title is David Sabatini, MD, PhD. Rapamycin and the discovery of MTOR, the Nexus of Aging and Longevity EP09.
C
And the host of that specific broadcast is Peter Etieh.
D
Correct. The documents show a stark contrast when we place this pristine public release next to the internal digital records we recovered. But before we examine the internal ledger, we must define the public asset.
C
The public brand.
D
Exactly. The Peter Attia brand is built on absolute medical authority. The focus of this specific documented broadcast is MTOR and Rapamycin.
C
We need to pause on that mechanism pre audit. You have to understand what MTR represents in the scientific community to understand the value of the brand.
D
It stands for the mechanistic target of Rapamycin. You can conceptualize MTR as a cellular sensor. It operates as the master control switch for human growth and metabolism.
C
Right. So when MTR is activated, cells build and grow.
D
Yes. And when it is suppressed, cells enter a state called autophagy. That is essentially a cellular cleaning process that clears out damaged components. The longevity industry views the manipulation of MTR as the primary pharmacological pathway for extending the human lifespan.
C
If MTR is the cellular switch, we need to document what rapamycin is.
D
Rapamycin is the actual pharmacological agent used
C
to suppress mtr, originally discovered in soil samples on Easter island, hence the name
D
derived from Rapa Nui. Clinically it is utilized as an immunosuppressant, often to prevent organ transplant rejection. However, in the wellness and longevity sector it is highly sought after for its potential anti aging properties.
C
So when Peter Attia hosts Dr. David Sabatini, a central figure in the discovery of the MTOR pathway, to to discuss the nexus of aging and longevity. This is the absolute apex of anti aging science.
D
It projects ultimate authority, rigorous peer reviewed credibility and elite biological optimization that is
C
the public facing architecture Right now we turn to the internal digital record. This is where the documented forensic trail begins to fracture the public image. We have a recovered digital ledger extracted from a 404 server error page.
D
For clarity on a methodology, you need to understand how this forensic Capture occurs. A 404 error typically means a page
C
cannot be found, but in specific misconfigurations the server cache bleeds through exactly it
D
reveals the background state of a system. In this instance, the error page revealed a logged in interface for a system identified as JMail.
C
The user profile for this JMail system is listed as Gemini.
D
The forensic capture of this screen gives us exact operational metrics for the account at the time of the capture. The interface displays an inbox containing 799 nine items.
C
There are 100 and 609 items marked as starred set.
D
Messages total 4334. But here's the discrepancy right There is a distinct category in the navigation menu labeled Unredaction requests. It shows 2004 items that does not add up.
C
Unreadaction requests is not a standard email client metric.
D
No.
C
If you are using a standard commercial email service, you have folders for spam drafts and sent mail. You do not have a built in algorithmic category for unredaction requests.
D
The presence of this specific category indicates a system designed for secure, compartmentalized or legally contested communications.
C
In legal discovery or Freedom of Information act requests, redactions are used to obscure sensitive information.
D
An unredaction request implies an active process of managing concealed data, contesting FOIA releases, or handling legal discovery materials.
C
And a volume of 2,004 items in this category suggests an industrial scale of legal and reputational defense.
D
We look directly at the People sidebar in this JMail interface. The directory categorizes Peter Adia within a specific digital proximity.
C
His name appears alongside a highly specific cross section of science, wellness, and technology figures.
D
The verified list includes Niri Oxman, an architect and designer who ran the Mediated Matter Research group at mit.
C
It includes Marvin Minsky, a pioneer of artificial intelligence at mit.
D
It includes Lawrence Krauss, a prominent theoretical
C
physicist Deepak Chopra, a massive figure in alternative medicine and wellness and Boris Nikolaik,
D
a former science advisor to Bill Gates.
C
You are looking at a curated digital ecosystem because this scientific and wellness cohort is listed in the exact same contact directory as known Epstein operatives, fixers and code of inspirators.
D
The ledger includes Ghislaine Maxwell.
C
It includes Zanlek Brunel, the international modeling agent.
D
It includes Leslie Grof, Sarah Kellen and Nadia Marshenkova.
C
The system owner Gemini aggregated the apex of longevity science and the apex of an illicit trafficking network into a single unified communications interface.
D
The operational nature of this network is further defined by the folder structure under Topics in the JMail user interface there are four visible operational folders.
C
We have the exact names from the document. They are asking for advice, introductions, damage control and conspiring w. Brunel.
D
Those are the documented parameters of the interface.
C
You have a public facing Wellness Media brand operating in the open and simultaneously the central figure of that brand, Peter Adia, is cataloged in a private digital ledger alongside a damage control folder and direct coordination with a known trafficking facilitator.
D
We must test the boundaries of this evidence. Right Proximity in a contact list is a data point, but does it prove complicity? Does a name existing in an inbox sidebar prove a functional working relationship? Or does it simply document the digital rolodex of a man attempting to buy his way into the longevity and wellness space?
C
That is the required forensic question. If my name is in your digital contacts, that does not make me your accomplice. You can add my email to your directory without my consent. This could just mean whoever ran this Gemini account was cataloging longevity experts for aspirational networking.
D
The presence of a name confirms that the system owner tracked or maintained access to these individuals. It does not automatically confirm bi directional communication.
C
The documents show that a contact list can indeed be aspirational.
D
However, the integration of these names into an architecture that features a damage control folder requires us to examine how this network functioned institutionally.
C
To understand why a compromised individual would catalog these scientists. We cannot just look at the names. We have to look at the methodology.
D
We must shift to the institutional paper trail to see how this exact network was leveraged to understand the wellness media fallout. We look at the records concerning Lawrence Krause, whose name appears in the same JMail directory as Peter Attieh the documents
C
released under the Epstein Files Transparency act provide a direct communication record. We have a December 11, 2017 email exchange between Lawrence Kraus and Buzzfeed News reporter Peter Althouse.
D
The documentation of the financial nexus between Epstein and Kraus provides the functional template for how scientific authority was acquired.
C
Through his private foundation, Epstein provided direct funding for Kraus Origins Project at Arizona State University.
D
The records show this funding supported lectureships and scholarship programs.
C
The financial trail documents a pledged amount of $100,000 in 2014.
D
The timeline here is the critical data point.
C
Yes, the pledge occurs in 2014. By 2014, Epstein was already a registered sex offender, having served his sentence in Florida.
D
This is post conviction funding the institution
C
Arizona State University and the specific project, the Origins Project accepted the pledge after the criminal record was established and globally known.
D
The documents show that the funding was not merely philanthropy. It was a transactional purchase of proximity and credibility.
C
The intersection of medical authority, longevity, branding and elite access is explicitly detailed in Kraus own defense of Epstein.
D
We refer to a documented quote from kraus in an April 2011 Daily Beast article.
C
Krauss stated quote, as a scientist I always judge things on empirical evidence and he always has women ages 19 to 23 around him, but I've never seen anything else. So as a scientist, my presumption is that whatever the problems were, I would believe him over other people, end quote.
D
We must audit that specific statement.
C
As a scientist, I always judge things on empirical evidence.
D
This is the ultimate appeal to authority.
C
This is the exact mechanism of institutional complicity. Epstein knew that if a famous physicist publicly states, I have evaluated the empirical evidence and he is fine, the public stops asking questions.
D
The physicist is weaponizing his institutional status to rationalize the presence of young women in Epstein's orbit.
C
That 2011 statement perfectly encapsulates the value proposition of the Wellness and Science Network to Epstein.
D
By securing the public defense of a prominent academic, Epstein effectively bought empirical credibility.
C
He utilized scientific and medical authority figures to launder his reputation.
D
Post conviction, the scientists provided a shield of legitimacy.
C
The verified institutional records establish this methodology. We have the Kraus funding paper trail, their $100,000 pledge in 2014 and the 2011 Daily Beast quotes defending Epstein using a scientific rationale.
D
The documents show Epstein treated scientific institutions like reputation banks depositing grants to withdraw credibility.
C
But we must be clear on the boundaries of the evidence here, right?
D
Kraus documented financial relationship cannot be automatically inferred as the identical template for every wellness media figure like ADIA listed in the JMail directory.
C
The documentation proves that Epstein successfully executed this reputation laundering strategy with Kraus. It establishes the methodology of compromise within the network.
D
It proves the architecture existed.
C
We do not have documentation that every individual in the JML sidebar accepted funding or provided public coverage.
D
This requires us to examine the public accountability timeline around file 177.
C
If the institutions themselves are accepting the grants and providing the credibility, how are these networks ever audited?
D
The documents show that oversight and public accountability for these scientific networks rarely originate from within the institutions themselves. The mechanism of accountability is almost entirely driven by the media inquiry process.
C
We examine the specific timestamp and content of kraus Response to BuzzFeed News to
D
understand this mechan email is dated Monday, December 11th, 2017. The time is documented at 5:19pm this
C
email exchange exposes the reactive nature of reputation systems. Cross's response at 5:19pm demonstrates immediate defensive posturing.
D
He writes to the reporter, while I am running the risk that you will report my comments either out of context or incompletely, I am responding with an effort to be complete.
C
That phrasing is a documented public relations strategy.
D
He is attempting to establish control over the narrative before publication.
C
He is building in a preemptive defense if the article looks bad. He has already stated on the record that the reporter took him out of context.
D
The documents show this is a standardized institutional reaction to external pressure. The system only reacts when the searchable public record becomes a liability.
C
The December 11 email also documents the forensic mechanics of scrubbing a digital trail.
D
The reporter, Peter Oldhouse confronts Kraus with evidence of prior allegations that had briefly surfaced online.
C
The email states, quote, A blog Post published in August 2013 described incidents 1 and 4 naming you. Another post published at around the same time described incident five.
D
The timeline of the digital scrubbing is meticulously recorded in the email exchange.
C
The reporter notes that the first post was edited to remove Kraus name after Kraus commented that the allegations of assault were potentially illegal.
D
The second post was, according to the document, quickly taken down.
C
This is a critical forensic marker. We must look at the mechanism of action here. How does a public record disappear?
D
The threat of legal action calling the allegations potentially illegal was deployed to force the removal of an individual's name from a public blog in 2013.
C
This action predates the Buzzfeed inquiry by four years.
D
It demonstrates a sustained multi year effort to manage public perception and erase digital evidence of misconduct within the scientific community.
C
The media inquiry is what finally forced the institutional timeline into the open.
D
The email at 5:19pm on December 11, 2017 compelled a response that a university appliance office had not generated over the preceding four years.
C
But this raises a fundamental question about the documents. Did this mechanism of media accountability actually resolve the central question of institutional complicity within the Science and Wellness Network, or
D
did it merely prompt a coordinated PR defense strategy? A literal damage control response Matching the exact folder name in the JMail interface,
C
the documents show that the media inquiry triggered containment protocols.
D
Kraus provided detailed rebuttals to specific items, calling them false or distorted.
C
He claimed item one referred to a consensual encounter in my hotel room in 2006.
D
He dismissed item three because it was an anonymous third party claim.
C
This is the operational definition of damage control.
D
The system prioritizes legal and reputational containment over transparency.
C
This documented pattern of containment leads directly to the blind spots in this forensic audit.
D
We step away from the retrieved Gmail user interface and identify the specific missing records that severely limit the investigation.
C
The documents released under the Epstein Files Transparency act include an attachment to subpoena for entities known as J. Epstein Co. And Epstein interests.
D
This is identified in the record as form or D227.
C
Form or D227 explicitly details what federal investigators demanded and the scope is comprehensive.
D
The subpoena demands all calendars, agendas, daily diaries, records of appointments, travel, and meetings kept by Jeffrey Epstein and his executive assistant Leslie Grof.
C
The date range is the critical parameter. It commands records from January 1, 2003 to the present.
D
We must unpack the technical requirements of this subpoena. The order specifically targets physical hard copies, database servers, cellular telephones, and BlackBerry unit metadata.
C
We need to explain BlackBerry metadata for the audit.
D
If an email or a text message is a letter inside an envelope, the metadata is the postmark, the fingerprints on the paper, the weight of the envelope, and the exact GPS coordinates of the mail truck that delivered it.
C
It includes the routing information, the timestamps to the millisecond, the the recipient data, and the location pings of the cellular device for every single communication.
D
Exactly, the metadata maps the entire functional reality of a network.
C
The evidence of documented concealment regarding these specific records is found in the deposition transcripts.
D
We examine the testimony involving attorney Scott J. Link, the law firm Fowler White, and Jeffrey Epstein himself.
C
The legal records show that Epstein violated a court order by retaining privileged documents that were subject to discovery.
D
The transcript details a highly specific exchan where attorney Scarola questions Epstein about a digital asset.
C
The Transcript reads, quote paragraph 4 of your declaration. Exhibit number one states In February 2018, Scott J. Link of Lincoln Rockinback Pennsylvania informed me that he had located a disk in Fowler White's files labeled, quote, EPSTEIN batestamp, unquote.
D
We must clarify what a bait stamp is in this context.
C
Bates numbering is a system used in legal document discovery to place sequential numbers on images and documents.
D
If a disc is labeled Epstein batestamp, it means it contains documents that were processed, numbered, and prepared for legal review or production.
C
The documents show that this disc, containing potentially privileged or highly sensitive processed information, was retained in violation of judicial directives prior to March 2018.
D
Furthermore, the court proceedings highlight the systemic failure to determine the extent of the document dissemination.
C
The presiding judge is documented noting, quote, 10 years and nothing, referring to the delay in accountability and the failure to secure the underlying records.
D
The deposition record shows Mr. Edwards stating, quote, we just don't know what Fowler White did with it for seven years, whether Jeffrey Epstein has actually had it for seven years.
C
Because of this documented concealment, and because the full BlackBerry metadata from 1-1-2003 to the present remains unreleased, the extent of the communications between Epstein and the Wellness Media figures remains a blind spot.
D
The missing metadata is the skeleton key to unlocking the true functional nature of the JMail contact list.
C
We have the architecture of a network. We know they were looking at the vault. We know the names.
D
But without the body of the emails or the daily meeting agendas, we are the architecture of proximity, not the transcripts of their conversations.
C
The forensic boundaries are absolute here. We cannot launder proximity into a conclusion of professional medical misconduct or without the underlying correspondence.
D
The J mail interface proves that Peter Attia, Nary Oxman, Deepak Chopra and others were cataloged in Epstein's digital environment.
C
It does not provide the content of their interactions.
D
The absence of the BlackBerry metadata prevents us from seeing the calendar appointments, the text messages, or the transactional records that would elevate this from a digital Rolodex to a documented operational conspiracy.
C
We synthesized the verified documents to establish the thesis for further file 177.
D
We have examined the JMail directory extracted from the 404 error, the Savattini MTOR podcast release, the Kraus Origins Project funding trail, the Dec. 11 email at 5:19pm and the concealed BlackBerry records and bait stamp disk.
C
Here is exactly what the verified documents prove. Point 1 Epstein deliberately cataloged and maintained digital access to leading figures in the Wellness, Longevity and Science media spaces.
D
This is documented by the presence of Peter Adia, David Sabatini, Deepak Chopra and Boris Nikolic in the Verified gmail interface.
C
Point 2 Epstein successfully weaponized scientific funding to extract public defenses from prominent academics post conviction.
D
This is documented by the $100,000 pledge to Lawrence Krauss Origins Project in 2014 and Kraus 2011 statements invoking empirical evidence to defend Epstein's social orbit.
C
Point 3 this digital ledger exists on a server alongside known illicit operational folders, specifically damage control and conspiring w Brunel.
D
And we must state exactly what the documents do not prove.
C
The records do not prove that Peter Adia or the broader wellness media apparatus engaged in professional misconduct, medical malpractice or direct facilitation of Epstein's core crimes.
D
The documents show proximity and cataloged access. They show the existence of an architecture.
C
They do not show participation in the trafficking network. That is the boundary of the evidence.
D
The institutional vulnerability is documented. The wellness and longevity industry relies on medical authority, elite access and empirical credibility.
C
Those are the exact currencies Epstein systematically manipulated.
D
The paper trail confirms that the architecture for compromise was built, funded and maintained across multiple institutions.
C
You have to consider the final implications of the subpoena blind spots. If a searchable public record, a media inquiry like the one from Buzzfeed News is the only mechanism that forces accountability in the wellness and science communities. How many institutional compromises remain perfectly hidden inside the unreleased metadata of a single confiscated BlackBerry? Next time Epstein's birthday book was a social ledger,
B
You have just heard an analys of the official record. Every claim, name and date mentioned in this episode is backed by primary source documents. You can view the original files for yourself at epsteinfiles fm. If you value this data first approach to journalism, please leave a five star review wherever you're listening right now. It helps keep this investigation visible. We'll see you in the next file.
The Epstein Files — File 177: Peter Attia, Wellness Media, and the Epstein Files Fallout
Podcast by NBN.fm | Aired May 22, 2026
This episode of The Epstein Files delves into the intersection between high-profile wellness media figures, such as Peter Attia, the mechanisms of scientific and institutional reputation management, and Jeffrey Epstein’s strategic manipulation of authoritative networks post-conviction. Using AI-driven analysis of recently unsealed court documents, flight logs, and digital records—including a recovered internal email system—the episode explores how proximity, access, and funding blurred lines between legitimate science and compromised association, while emphasizing the stringent limits of what the documents do (and do not) prove.
“The documents show a stark contrast when we place this pristine public release next to the internal digital records we recovered.” (01:54)
Recovered through a 404 error, this ledger (JMail) is believed to be operated under the user 'Gemini', showcasing 4,334 messages and an unusual category: "Unredaction requests" (04:12).
The scale and structure of the system—including folders labeled "damage control" and "conspiring w. Brunel"—imply specialized functions beyond normal correspondence.
“The presence of this specific category indicates a system designed for secure, compartmentalized or legally contested communications.” (04:52)
The contact list contains not only wellness and science figures (Peter Attia, Deepak Chopra, Neri Oxman, Boris Nikolic) but also known Epstein network operatives (Ghislaine Maxwell, Jean-Luc Brunel, Leslie Grof) (05:43–06:14).
“The presence of a name confirms that the system owner tracked or maintained access to these individuals. It does not automatically confirm bi-directional communication.” (07:33)
Using primary records, the episode details how Epstein’s post-conviction funding—specifically, a $100,000 pledge to Lawrence Krauss’s Origins Project at Arizona State University in 2014—was exchanged for empirical credibility (08:29–08:47).
Krauss's public defense of Epstein, including a quote elevating “empirical evidence” over allegations, is highlighted as essential to understanding this mechanism:
“As a scientist I always judge things on empirical evidence and he always has women ages 19 to 23 around him, but I've never seen anything else. So as a scientist, my presumption is that whatever the problems were, I would believe him over other people.” — Lawrence Krauss (Daily Beast, April 2011) (09:29–09:47)
This strategically deployed credibility is viewed as the core of Epstein’s reputation laundering through the science and wellness elite (10:21–10:35).
A comprehensive federal subpoena (Form D227) sought all of Epstein’s digital and physical records, but essential metadata—especially from BlackBerry devices—remains missing or concealed (15:07–16:20).
Legal depositions reveal that critical disks and metadata have gone unaccounted for, creating lasting blind spots:
“Because of this documented concealment, and because the full BlackBerry metadata…remains unreleased, the extent of the communications between Epstein and the Wellness Media figures remains a blind spot.” (17:59–18:12)
The episode underscored that without these materials, the investigation cannot equate cataloged names with active participation or misconduct.
The architecture and methods for institutional compromise are proven, but individual complicity—especially for Peter Attia and other wellness leaders—cannot be established on present evidence:
“The records do not prove that Peter Attia or the broader wellness media apparatus engaged in professional misconduct, medical malpractice or direct facilitation of Epstein's core crimes.” (20:12)
The danger and vulnerability of proximity was documented, as was the central role of scientific authority and elite access in Epstein's strategy.
On Empirical Authority as Reputation Shield:
“This is the ultimate appeal to authority. This is the exact mechanism of institutional complicity. Epstein knew that if a famous physicist publicly states, I have evaluated the empirical evidence and he is fine, the public stops asking questions.” — D (09:53–10:08)
On Legal Scrubbing of the Public Record:
“The threat of legal action calling the allegations potentially illegal was deployed to force the removal of an individual’s name from a public blog in 2013.” — D (13:34)
On Metadata as the “Skeleton Key”:
“The missing metadata is the skeleton key to unlocking the true functional nature of the JMail contact list.” — D (18:12)
Caution on Proximity vs. Complicity:
“We cannot launder proximity into a conclusion of professional medical misconduct without the underlying correspondence.” — C (18:32)
| Proven (by documents) | Not Proven (by documents) | |-----------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------| | Epstein cataloged wellness, science, and tech authorities in internal digital networks (JMail) | That cataloged individuals (e.g., Peter Attia) participated in or facilitated wrongdoing | | Epstein funded scientific figures and leveraged their public defenses for reputation management | Direct communication, meetings, or complicity between Attia and Epstein | | Institutions were reactive, only responding under media pressure | The true extent of communications due to missing BlackBerry/digital metadata |
The episode maintains a clinical, forensic tone, rigorously distinguishing documented fact from inference, and refrains from sensationalism. The language is precise, technical, and systematically references original documents and timestamps.
The episode highlights the power—and limits—of AI-driven forensic journalism, calling attention to both new revelations and persistent blind spots in the public record due to concealment and legal maneuvering. The boundaries of proximity and proof are left sharply defined, urging listeners and investigators to resist conflating association with guilt in the absence of direct evidence, while remaining vigilant to the institutional vulnerabilities the records expose.
All referenced documents are available for public review at epsteinfiles.fm.