jeevacation@gmail.com: The Email Address in the Footer

Table of Contents

TLDR

The email address jeevacation@gmail.com appears in the footer boilerplate of emails in Data Set 11, identified in document EFTA02212883 — a Lesley Groff email chain dated May 30, 2017. The handle combines "je" (Jeffrey Epstein) with "vacation," and serves as a searchable anchor across the 863,000-document email corpus that can identify Epstein-authored or Epstein-received communications (PAPER TRAIL Project, 2026).


Finding the Anchor

When you are looking at 863,000 email documents spread across two data sets, the first problem is not analysis — it is orientation. Which emails are Epstein's? Which are his associates'? Which are third-party correspondence that happened to be captured in the same seizure? Without a reliable identifier, every email requires individual inspection.

The answer appeared in the footer of a mundane scheduling email. Document EFTA02212883, a two-page PDF in Data Set 11, contains an email chain between "jeffrey E." and Lesley Groff dated May 30, 2017. The email itself is unremarkable — a request for "cookies or small cakes. tea" for a noon appointment. But at the bottom of the page, in the boilerplate footer that email clients automatically append to outgoing messages, sits the address: jeevacation@gmail.com (PAPER TRAIL Project, 2026).

What the Address Tells Us

The handle "jeevacation" is a compound of "je" — the initials that appear throughout the Epstein corpus on entities (JEGE Inc., JEGE LLC), wire memos ("je retainer replenishment"), and FedEx accounts — and "vacation." This was not a business email. It was a personal Gmail address, the kind you set up for informal correspondence when your formal email handles are monitored, archived, or subject to corporate retention policies.

The Bates stamp (a unique sequential identifier assigned during litigation document processing) on the document is EFTA_R1_00938289-90, placing it within the DS11 Relativity load file sequence. This means the email was captured in the same seizure that produced 331,655 other email PDFs — and that the footer boilerplate likely appears on every outgoing email from this account (PAPER TRAIL Project, 2026).

That repetition is what makes it useful. If jeevacation@gmail.com appears in the footer of every email Epstein sent from this account, then a full-text search across the 863,000 email documents for that string will produce a subset of communications where Epstein was the sender. In a corpus this large, any reliable filtering criterion dramatically reduces the search space.

The Larger Email Corpus

The email address was discovered during the investigation that became OBS-7 — the resolution of Data Set 11's actual contents. Multiple media outlets had described DS11 as "financial ledgers, USVI flight manifests, property seizure records." Community indexing efforts described it as "approximately 180,000 images and 2,000 videos." Neither description was accurate (PAPER TRAIL Project, 2026).

DS11 contains 331,655 PDFs of seized email correspondence plus four .m4v video files. It uses Relativity load file format (a standardized format used in litigation document review, with structured metadata files and sequential Bates numbering) with DAT/OPT metadata, the same structure as Data Set 9. Together, DS9 (531,256 email PDFs) and DS11 form a combined email corpus of approximately 863,000 documents — the largest sub-corpus in the Epstein file release.

The misidentification of DS11 persisted for weeks after the January 30, 2026 release because the sheer volume of documents discouraged manual inspection. It was only when sample PDFs were opened and read that the email content became apparent. The jeevacation address was found during that same manual inspection.

A Personal Email on Government Records

The presence of a personal Gmail address in government-released documents carries specific implications. First, it confirms that Epstein used at least one consumer email service for personal correspondence — not a corporate server, not an encrypted platform, but a standard Google account subject to Google's data retention and law enforcement response policies.

Second, the address appearing in footer boilerplate means it was configured as the default reply-to or signature block on whatever email client Epstein used. Footer boilerplate is automatic — it appears on every outgoing message unless the sender manually removes it. This suggests jeevacation@gmail.com was Epstein's primary personal email during the 2017 period, not a one-time-use address.

Third, a Gmail address creates an external record that may still exist. Google retains account data according to its own policies and responds to valid legal process. Whether law enforcement has already obtained the full contents of the jeevacation@gmail.com account is unknown. Whether those contents are included in the unreleased 42% of the corpus is also unknown. What is known is that the address exists, it was active as recently as May 2017, and it is associated with communications that were deemed significant enough to seize.

The Anchor Function

In document exploitation (the systematic analysis of seized documents to extract intelligence), an "anchor" is a known identifier that allows you to navigate an unfamiliar corpus. A name, an account number, a phone number, an email address — anything that reliably appears in documents associated with your subject and allows you to pull a subset from the larger collection.

The jeevacation address functions as an anchor for the email corpus. It does not tell you what the emails contain. It tells you which emails are Epstein's. In a collection of 863,000 documents where the vast majority have not been individually reviewed, that filtering capability is the difference between directed analysis and random sampling.

Named entity recognition processing on DS9 and DS11 is now complete, with 2,383,898 entities extracted across the full corpus (PAPER TRAIL Project, 2026). The jeevacation address provides a complementary identification method: where entity extraction identifies entities mentioned in emails, the footer boilerplate identifies who sent them. Together, they make the email corpus navigable.


References

PAPER TRAIL Project. (2026). Observations (OBS-7: Data Set 11 content resolution) [Data set].

PAPER TRAIL Project. (2026). Entity extraction results [Script 04].

U.S. Department of Justice. (2026). Epstein files: Data Set 11. DOJ Epstein Library.