Possible LinkedIn Dubious Connections

31087885067?profile=RESIZE_400xA new search tool, named EpsteIn, is an open-source Python script developed by software engineer Christopher Finke that allows users to check if their LinkedIn connections are mentioned in the publicly released Jeffrey Epstein court documents.  These documents, comprising over 3.5 million pages, were recently released by the US Department of Justice.  The tool supports open-source intelligence (OSINT) activities to validate professional networks and identify potential associations.  It operates by extracting full names from a user's exported LinkedIn Connections.csv file and performing exact phrase searches against an index of the Epstein documents.

Matches are compiled into an interactive HTML report, typically named EpsteIn.html, which includes contact cards displaying names, positions, companies, mention counts, excerpt snippets, and links to the original PDFs on justice.gov.  The report sorts contacts by number of mentions in descending order and provides a summary of the total number of contacts searched and those with mentions.

To use EpsteIn, users require Python 3.6 or higher.  Installation involves cloning the GitHub repository, creating a virtual environment, and installing the dependencies listed in requirements.txt, including the requests library.  Users must export their LinkedIn connections via Settings > Data privacy > Get a copy of your data, which may take up to 24 hours.  The script is run with the command `python EpsteIn.py --connections /path/to/Connections.csv`, with an optional `--output` flag for specifying the HTML file path.  Some users recommend increasing the API request timeout in the code to avoid rate limits during processing.

EpsteIn runs entirely locally on the user's machine, with no data sent to external servers, thereby prioritizing privacy.  Exporting LinkedIn data reveals the user's full network, and the tool's reliance on exact name matching can lead to false positives, particularly with common names.  Manual review of context excerpts is essential to verify relevance.  Misuse of the tool could facilitate targeted harassment or doxxing, and experts advise caution in drawing inferences from mentions in public records, as appearances do not necessarily indicate direct involvement.

The US Department of Justice documents released on 30 January 2026 as part of the Epstein Files Transparency Act reveal claims from a 2017 FBI confidential informant that Jeffrey Epstein maintained a close relationship with a skilled hacker described as his "personal hacker."  The hacker reportedly specialized in developing and selling zero-day exploits for systems such as Apple's iOS, older BlackBerry OS, and Firefox.

The informant alleged sales to groups like Hezbollah and money laundering, although these claims remain unverified.  The documents are heavily redacted, and the purpose of any cyber support provided to Epstein is unclear.

 

This article is shared at no charge for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  We provide indicators-of-compromise information via a notification service (RedXray) or an analysis service (CTAC).  For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225 or feedback@redskyalliance.com    

Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://register.gotowebinar.com/register/5207428251321676122

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!