| Document | Title | Filename | Status |
|---|---|---|---|
| RICO-00 | Overview & Methodology (this document) | RICO-00_Overview_Methodology.md |
Active (v1.2) |
This dossier consolidates the A1‑anchored evidentiary record across GOY, LSJ, MOL, SVE, and the Probable Prosecutions packet into a single RICO‑probe threshold narrative. The purpose is not to accuse individuals publicly, but to demonstrate that the documentary record establishes a pattern of racketeering‑style activity sufficient to justify a formal investigative probe.
The record now contains direct A1 evidence of recruitment of underage girls, paid incentives for recruitment, operational scheduling infrastructure, payment trails (including Western Union), and silencing/obstruction mechanisms. It also documents the institutional and financial infrastructure that enabled the enterprise: pipeline sourcing (MC2/Brunel/scouts), bank facilitation and compliance failure (Deutsche Bank / JPMorgan), and logistics/asset control (aviation provenance). The combination of pattern + continuity + enterprise structure meets the investigative threshold commonly used to open RICO‑style inquiries, even without alleging criminal liability beyond adjudicated findings.
This dossier is intentionally defamation‑safe and investigation‑oriented: it frames the record as probable cause for inquiry, not as a finding of guilt. It also identifies gaps and next‑step subpoenas needed to move from a threshold probe to prosecutorial action.
| Grade | Meaning | Standard | Example |
|---|---|---|---|
| A1 | DOJ investigative product — created or subpoenaed by prosecutors/law enforcement | Grand jury exhibits, wire transfer records, flight logs, law enforcement correspondence | Indictment excerpts; PBPD reports; FD‑302s; Western Union subpoena |
| A2 | Document in DOJ corpus — found in Epstein’s possession or seized during investigation | Personal emails, contact books, calendars, internal correspondence | Jmail emails; address book entries |
| B | Reputable secondary reporting / government record / leaked database | News reporting, congressional testimony, ICIJ databases | Public reporting; ICIJ offshore leaks |
| C | FBI intake / allegation — unverified by investigation | FBI tipline submissions, redacted witness statements | — |
| D | Inference / open‑source correlation | Graph analysis, timing patterns, analytical synthesis | CO_APPEARED_WITH patterns |
A1/A2 DECISION RULE:
- Ask: “Does this document exist because prosecutors/subpoenas created it?” → A1
- Ask: “Does this document exist because Epstein/associates saved it?” → A2
| Part | Title |
|---|---|
| Part 1 | METHODOLOGY — RICO‑PROBE THRESHOLD |
| Part 2 | CORE EVIDENCE SPINES (A1‑only) |
| Part 3 | CITATION STANDARD |
| Part 4 | KNOWN LIMITS |
| Part 5 | DEFAMATION‑SAFE STANDARD |
| Part 6 | VERSION HISTORY |