A case study in PDF forensics: The Epstein PDFs
This article details a PDF forensics case study on a small, random selection of the Epstein PDF files released by the US Department of Justice (DoJ). The tranche contains 4,085 PDF files, with an estimated 5,879 remaining unreleased. Key findings include:
- A difference in PDF version reporting between forensic tools.
- The presence of two incremental updates.
- The discovery of a hidden (orphaned) document information dictionary revealing the software used in processing.
- The DoJ avoided JPEG images to prevent metadata leakage.
- Overall, the DoJ’s sanitization workflow could be improved to reduce file size and information leakage.
A case study in PDF forensics: The Epstein PDFs
This article details a PDF forensics case study on a small, random selection of the Epstein PDF files released by the US Department of Justice (DoJ). The tranche contains 4,085 PDF files, with an estimated 5,879 remaining unreleased. Key findings include:
- A difference in PDF version reporting between forensic tools.
- The presence of two incremental updates.
- The discovery of a hidden (orphaned) document information dictionary revealing the software used in processing.
- The DoJ avoided JPEG images to prevent metadata leakage.
- Overall, the DoJ’s sanitization workflow could be improved to reduce file size and information leakage.
Designing PDFs for Pattern-Based Reading
August 2025 by Jacob Mellor (Iron Software)
Article
This article is written from my perspective as a lifelong software engineer and current CTO who codes differently – first because I read differently, and now because I program by … Read more

Visit Jacob Mellor's profile.































