Deciphering NCMEC Cybertips
June 16, 2025
Deciphering NCMEC Cybertips
June 16, 2025

Analysis of the Jeffrey Epstein Jail Video

Garrett Discovery was called upon by multiple news outlets to examine the purported RAW surveillance video from the Metropolitan Correctional Center (MCC) in New York, where Jeffrey Epstein, accused of sex trafficking, was detained. This analysis, initially was conducted for Inside Edition within a four-hour timeframe.

Jeffrey Epstein was held at MCC for 35 days from July 6, 2019, until his death on August 10, 2019, under suspicious circumstances. The Department of Justice (DOJ) reported that two cameras outside Epstein’s cell malfunctioned, and a third camera’s footage was unusable, with the footage sent to the FBI’s crime lab in Quantico, Virginia, for analysis. The DOJ Office of Inspector General (OIG), led by Michael Horowitz, in a public statement concluded that technical errors, not sabotage, caused the lack of recorded footage. However, public skepticism persists due to the high-profile nature of the case. The DOJ released what it claims is the raw footage, accessible at: https://www.justice.gov/video-files/video1.mp4.

Forensic Analysis Findings

  1. File Metadata Examination

File metadata, distinct from operating system metadata (e.g., modified, accessed, or created dates), is embedded within the file and persists during transfers, such as uploads to a web server. Our analysis revealed:

The video file originated from a temporary directory within the user profile “MJCOLE~1” on a Windows computer, as indicated by the file path. This contrasts with file paths typical of Apple systems.

The metadata indicates the video file was derived from a .PRProj file, an Adobe Premiere Project file. Adobe Premiere is a professional video editing and mastering software, not used in surveillance systems, raising concerns about the file’s authenticity as “raw” footage.

  1. Creation and Modification Timestamps

The metadata shows the video file, video1.mp4, was created from the Adobe Premiere project on May 23, 2025, at 16:48:57 UTC-4 (4:48 PM EDT, accounting for Eastern Daylight Time). A subsequent save occurred 3 hours and 38 minutes later, on May 23, 2025, at 20:16 EDT, suggesting either a modification or an unnecessary save. Each save recorded Adobe as the encoder, further indicating post-production editing.

  1. Visual Inspection Anomalies

A visual inspection of the video revealed:

  • Video player controls briefly appeared in the top right corner of the screen (e.g., at 23:31:30), triggered by mouse movement. This is inconsistent with direct exports from jail DVR systems, which do not display such controls.
  • The video appears to be a screen recording of the surveillance system’s playback rather than a direct export. Screen recording results in lower resolution and introduces potential artifacts.
  • The footage comprises two separate videos, as evidenced by:
    • A one-minute gap at 23:58, where the timecode jumps. This could result from system buffering (e.g., writing a backup file at the hour’s start), deliberate editing, or internal system errors.
    • Changes in aspect ratio and screen alignment post-gap, indicating different screen capture areas. The black space on the left and right of the on-screen text varies, confirming that two videos were concatenated, with the capture device selecting inconsistent screen regions.

Having directly inspected 25 jail DVR systems, including in Carlock v. Williamson—where unfettered access exposed repositioned cameras, deleted files, and spoliation leading to attorneys’ temporary license suspensions for assisting the jail in spoliation of evidence. 

I think the DOJ has a lot of explaining and the public should not be satisfied until they do.