SG⭐️⭐️⭐️ Profile picture
Not even tweets = endorsements Seeking to out the truth Non-primary voter, issue-oriented. I report everyone who dms me porn & spam.

Feb 13, 30 tweets

Why would members of Congress search their own names in the Epstein's files if they weren't concerned about what would be found? If they did not know him and never met him, there would be no need.
1)

When members of the U.S. Congress go into a SCIF (often pronounced “skiff”) and search a computer, they are interacting with one of the most tightly controlled information systems in the U.S. government.
2)

Here’s what that really means — and what gets collected.
A SCIF is a Sensitive Compartmented Information Facility. It’s a sealed room designed so that no signals can enter or leave without authorization. Inside are networks used by agencies like:
3)

National Security Agency, Central Intelligence Agency and the Defense Intelligence Agency. These computers are not on the normal internet. They’re on classified government networks.
4)

What happens when a Congress member searches
Every action is logged.
Not just what they search — but who, when, and how.

The system records:
Identity
Their name
Clearance level
Badge ID
Which terminal they used
5)

Time:
Login and logout
Every query timestamp
How long they viewed each file

Search activity:
Keywords typed
Files opened
Documents viewed
Videos or images accessed

Data access (if allowed to copy, print or download)
Whether they:
Read it
Downloaded it
Printed it
Copied it
6)

System activity:
Mouse movement
Window focus
USB attempts
Screenshot attempts
Printer use

All of this goes into audit logs.

This logging is extreme because classified data is dangerous.
7)

A single file might contain:
Spy identities
Surveillance targets
Hacking methods
War plans

So agencies track usage to prevent:
Leaks
Blackmail
Espionage
Insider theeats
8)

The key thing most people don’t realize
is that Congress members do not have free, untracked access to classified data. They are among the most heavily monitored computer users on Earth while inside a SCIF. Every click is recorded.
9)

The Epstein-related documents, especially the investigative and legal files, were generally treated with highly controlled access, though the level of classification varied depending on the source and content. Here’s the breakdown of how it works:
10)

How sensitive files like Epstein’s are handled
1. Court filings and unsealed documents

Many documents from the Southern District of New York and related civil cases are public, so they were accessible online or in court dockets.
11)

These include deposition transcripts, affidavits, and some investigative reports.

Public documents aren’t stored in SCIFs; they’re handled like normal legal files.
12)

2. Classified investigative or intelligence files

Some materials — like tips from foreign governments, FBI surveillance, or sensitive victim information — were treated like any high-risk law enforcement or intelligence file:
13)

Stored in secure networks or SCIF-like environments

Access logged per user, often at the level of:
FBI agents
Prosecutors
Sometimes Congressional investigators
All access would be audited, and copying or exporting files was strictly controlled.
14)

3. Congressional access

When members of Congress reviewed Epstein-related information (e.g., for hearings or reports):

If the documents were sensitive (classified, witness info, etc.), they would likely be viewed in a SCIF or secure room.
15)

Every action — opening a file, printing, searching — would be logged.

They could not take documents home; only note summaries allowed.

4. Public vs. private split

Public filings: accessible to journalists, lawyers, and the public online.
16)

Sensitive files: access restricted, treated almost exactly like the SCIF workflow I described earlier.

Leaked files (e.g., via journalists or online dumps) bypassed these protections, which is why we’ve seen detailed internal documents publicly.
17)

Now, Congress members know how SCIF work. So, on what grounds do they really have to complain? They knew what they were doing was being tracked and who has access to that information, too.
18)

Members of Congress were given access to unredacted Epstein files starting Feb. 9, on DOJ-controlled computers in a reading room in D.C., with no personal devices allowed.
19)

Multiple outlets have confirmed that Pam Bondi appeared at a House Judiciary Committee hearing with a binder or sheet labeled something like “Jayapal Pramila Search History,” listing entries from the Epstein database that matched Jayapal’s queries.
20)

Photographers from Reuters and others captured images clearly showing Bondi holding a document with that title and a list of search entries.

See. Epstein files: AG Pam Bondi seemed to have Rep. Jayapal’s DOJ database search history at hearing

21)cnbc.com/2026/02/11/eps…

Rep. Pramila Jayapal publicly blasted this as inappropriate “monitoring” of members’ searches and said she would push to stop it.
22)

See. Jayapal demands DOJ end tracking of lawmakers' Epstein files review
A photo captured by Reuters shows the attorney general holding a sheet of paper titled "Jayapal Pramila Search History," which lists at least eight searches.

23)seattletimes.com/seattle-news/p…

Other lawmakers on both sides of the aisle have complained that DOJ logging or tracking their searches of the Epstein database looks like spying or an abuse of power, and some have formally demanded DOJ stop tracking which documents they view.
24)

See. House
Lawmakers express bipartisan outrage as DOJ accused of ‘spying’ on members’ Epstein searches
DOJ officials, in turn, have said logging access is standard practice to protect victims’ identities and
25)

sensitive information in a restricted system, not to intimidate members of Congress.

26)thehill.com/homenews/house…

So, Bondi appears to have had at least one member’s DOJ search log in front of her, and members are angry that their queries inside a sensitive DOJ database are being logged and used politically.
27)

But they knew they were being surveilled because that is how SCIFS work. This is not new to them. So, I will let you draw your own conclusions why they are angry. What inferences are legitimate to consider? Jeffrey Epstein was a Democrat and threw a lot of parties. Who went?
28)

@threadreaderapp unroll

@threadreaderapp @unrollnow

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling