CODE WORDS & EUPHEMISMS DATABASE
100+ coded terms identified across the Ozark Oracle investigation network. Jump to a category:
WHY CODE WORDS MATTER
METHOD
Traffickers, predators, and their networks do not communicate in plain language. They use code words, euphemisms, and front operations to disguise the buying, selling, and exploitation of human beings -- particularly children. These terms come from court documents, FBI intelligence bulletins, investigation dossiers, flight records, leaked communications, survivor testimony, and darknet monitoring. This database documents 100+ coded terms identified across the Ozark Oracle investigation network, drawn from 800+ investigation dossiers covering 26,000+ connected individuals. Understanding this language is the first step toward recognizing and stopping it.
TermDescriptionSource
Court DocumentsEpstein v. United States, Maxwell v. Giuffre, Nygard criminal proceedings, Penn State grand jury reportFederal and state court records
FBI BulletinsSymbols and Logos Used by Pedophiles to Identify Sexual Preferences, Internet Crimes Against Children task force reportsFBI Intelligence Products
Leaked CommunicationsPodesta emails (WikiLeaks), Epstein contact book (leaked 2015), flight manifests released under court orderCourt-ordered releases, whistleblowers
Investigation Dossiers800+ dossiers in the Ozark Oracle database covering trafficking networks, financial laundering, and political protectionOzark Oracle Investigation Network
Survivor TestimonyDepositions from Virginia Giuffre, Courtney Wild, and 100+ identified Epstein victims; Larry Nassar victims (500+); Boys Town survivorsCourt depositions, victim interviews
Financial RecordsLeon Black's $158M in payments to Epstein (2012-2017), Wexner's $46M+ transfers, shell company filingsSEC filings, bank investigations, tax records
RECRUITMENT FRONTS
PERSON
How victims are found and lured -- the cover stories that disguise trafficking operations
The Ozark Oracle Supply Chain Investigation documents five primary procurement channels: orphanages and child welfare systems, international adoption and disaster exploitation, modeling and entertainment, sports organizations, and secret society networks. Jean-Luc Brunel operated MC2 Modeling Agency as a direct pipeline for Epstein. Nancy Schaefer, a Georgia State Senator who investigated CPS as a trafficking pipeline, was found dead in 2010. Laura Silsby was caught trafficking 33 children out of Haiti after the 2010 earthquake -- Bill Clinton intervened in her case. She now works at AlertSense, which operates the Amber Alert system.
TermSuspected MeaningSource
Model / Modeling AgencyVictim recruitment front -- young women and girls recruited under false promise of careers. MC2 Modeling Agency operated by Jean-Luc Brunel was a documented Epstein pipelineCourt documents, MC2 records, Brunel indictment (France)
Massage / MasseuseCover terminology for sexual exploitation of minors. All abuse in the Epstein case was framed as 'massage' appointments, scheduled by assistantsEpstein case depositions, victim testimony, assistant records
Talent Scout / RecruiterPerson who identifies and lures victims. Ghislaine Maxwell's documented role: recruiting young women and girls for Epstein's networkMaxwell trial testimony, victim depositions
Nanny / Au PairYoung women recruited under false pretenses of childcare employment, then exploitedTrafficking pattern analysis, law enforcement reports
Scholarship ProgramPayments to victim families to maintain access and silence. Epstein Foundation records show payments framed as educational supportEpstein Foundation records, financial investigation
Internship / MentoringAccess to minors disguised as professional developmentPattern analysis across multiple cases
Charity Work / VolunteeringAccess to vulnerable populations through ostensible humanitarian missions. Haiti pattern: Silsby caught with 33 childrenSilsby arrest records, court documents (Haiti)
Orphanage / Group HomeDirect supply chain for trafficking victims. Florida School for Boys: 96 bodies found. Boys Town scandal. Nationwide pattern documentedOzark Oracle Supply Chain Investigation, forensic records
FOOD CODE WORDS
FOOD
Food references used as code for trafficking victims and activities in communications
These terms were identified through FBI intelligence bulletins, analysis of leaked email communications, darknet forum monitoring, and encrypted chat intercepts. The food terminology system allows predators to discuss victims in plain sight -- a conversation about 'ordering pizza' or 'playing dominoes on cheese vs pasta' appears innocent to outsiders while carrying specific meaning within the network. Context analysis is key: when food references make no logical sense in a conversation, they are likely coded.
TermSuspected MeaningSource
PizzaGirl / young female victimPodesta emails, FBI bulletin, darknet forums
Cheese Pizza (CP)Child pornography -- direct acronym match for 'CP'FBI Symbols & Logos bulletin, law enforcement
Hot DogBoy / young male victimPodesta emails, forum analysis
PastaYoung boy (variant code)Email context analysis, forum cross-reference
Walnut / Walnut SaucePerson of color (context dependent) / adrenochrome referencePodesta emails, dark web forums
Ice CreamMale prostitute / young male victimTrafficking forum analysis, law enforcement
SauceOrgy / group exploitation eventForum analysis, encrypted chat logs
ChickenYoung person / minor. 'Chicken hawk' = predator who targets young peopleHistorical slang, NAMBLA documents, law enforcement
CheeseYoung girlForum code, email analysis
MilkYoung female / breast milk referenceDark web marketplace analysis
BreadMoney / payment for exploitation servicesForum slang, encrypted communications
CandyDrugs used for sedation of victimsTrafficking survivor testimony
OysterVirgin / first-time victimDark web auction analysis
LollipopYoung personPredator forums, encrypted chat
SucculentDesired / attractive victimEmail context analysis
FINANCIAL FRONTS & LAUNDERING
FINANCIAL
How trafficking payments are disguised as legitimate business transactions
The Ozark Oracle Money Laundering Patterns Analysis dossier documents eight primary laundering methods used by trafficking networks: shell companies (Delaware/Nevada/Wyoming LLCs), real estate (all-cash purchases, rapid flipping), art market (subjective valuations, freeport storage), cryptocurrency (mixers, privacy coins, NFT wash trading), casinos, trade-based laundering, structuring, and integration through legitimate business. Foundations are documented as laundering vehicles through inflated in-kind donations, self-dealing through intermediaries, and foundation-to-foundation cascading. Leon Black paid $158 million to Epstein between 2012 and 2017, claiming it was for 'tax advice.' Les Wexner transferred $46 million or more to Epstein and granted him Power of Attorney.
TermSuspected MeaningSource
Consulting FeesPayments for providing victims or access. Phantom consulting: payments over $100K with vague descriptions are flagged in financial forensicsMoney Laundering Patterns dossier, Epstein financial records
Tax AdviceCover story for massive payments. Leon Black paid Epstein $158M (2012-2017) claiming 'tax advice' with no documented deliverablesLeon Black deposition, Apollo Global investigation
Philanthropy / FoundationReputation washing and money laundering vehicle. Gratitude America Ltd., Clinton Foundation, Wexner Foundation all identified as pattern matchesOzark Oracle foundation analysis, tax records
DonationsPayments laundered through charitable organizations to disguise trafficking revenue or buy political protectionGratitude America records, Clinton Foundation patterns
Art DealsMoney laundering through art market -- subjective valuations enable any amount. Freeport storage in Geneva, Luxembourg, Delaware, SingaporeMoney Laundering Patterns dossier
Real Estate InvestmentProperty purchased to hold or hide victims. All-cash purchases and rapid flipping are red flagsShell company analysis, FinCEN reports
Research GrantPayments to academics for access, silence, or legitimacy. Epstein funded Harvard, MIT, and other institutionsEpstein-Harvard-MIT connection analysis
Legal RetainerPayments to attorneys for cover-up services, NDA enforcement, and victim silencingFinancial disclosure, NDA pattern analysis
Shell CompanyDelaware/Nevada/Wyoming LLCs used to hide ownership and launder payments. Multiple layers of corporate abstractionFinCEN Suspicious Activity Reports, Money Laundering dossier
Modeling ContractPayment structure designed to look like entertainment industry while funding trafficking operationMC2 agency records, Jean-Luc Brunel financial records
DOCUMENTED LOCATIONS
LOCATION
Specific properties and locations identified in court documents and investigation dossiers
These locations are drawn from court exhibits, property records, FAA flight registrations, and investigative surveillance. The Epstein Flight Logs dossier documents specific passengers on aircraft N908JE (Boeing 727, 'Lolita Express'). The Private Aircraft Tracking Analysis documents FAA tracking methods and registered aircraft. Property records for Little St. James Island, Zorro Ranch, and the 9 East 71st Street townhouse are public. These are not allegations -- they are documented locations from legal proceedings.
TermSuspected MeaningSource
Little St. James IslandEpstein's private island, U.S. Virgin Islands. Site of the 'temple' (blue/white striped structure documented in aerial photography)Property records, court documents, construction permits
Lolita Express (N908JE)Epstein's Boeing 727. Flight logs released under court order document passengers including heads of state, billionaires, and celebritiesFAA records, court-ordered flight log release
Zorro RanchEpstein's 7,500-acre New Mexico property. Alleged site of planned 'breeding program' per New York Times investigationProperty records, NYT investigation, state AG inquiry
9 East 71st StreetEpstein's 40-room Manhattan townhouse. Gifted by Les Wexner. Contained hidden cameras per witness testimonyProperty records, Maxwell trial testimony
The TempleBlue and white striped structure on Little St. James Island. Purpose disputed; construction records and aerial photography documentedAerial photography, construction records, court exhibits
Presidio (San Francisco)U.S. Army base where Lt. Col. Michael Aquino (Temple of Set founder) was investigated for child abuse in military daycare (1987)Army CID investigation records, media reports
Florida School for Boys (Dozier)Reform school where 96 bodies of children were found through forensic excavation. Operated 1900-2011University of South Florida forensic report, state records
Comet Ping PongWashington DC restaurant connected to Podesta associates. Subject of investigation regarding coded communicationsInvestigation reports, connection analysis
The Farm / The RanchGeneric terms for rural holding locations used in trafficking operations. Remote properties reduce witness exposureLaw enforcement pattern analysis, survivor testimony
PERSON & ROLE CODE WORDS
PERSON
Terms used by traffickers to describe people within their operations
These terms come from FBI trafficking terminology guides, court depositions, survivor testimony, and law enforcement intercept analysis. The Ozark Oracle investigation documents how victims are dehumanized through language -- from 'fresh' (newly recruited) to 'seasoned' (broken through repeated abuse). Ozark Oracle investigation data confirms: 'Recruited as young as possible. Fresh victims more valuable. Virginity specifically prized. Payment schedules for massage services documented.' Understanding these role designations helps identify trafficking operations in progress.
TermSuspected MeaningSource
FreshNewly recruited victim. More 'valuable' within the network. Ozark Oracle data confirms: 'Fresh victims more valuable'Ozark Oracle investigation data, law enforcement intercepts
SeasonedVictim broken through repeated abuse who no longer resists. Considered 'trained' by traffickersFBI trafficking reports, survivor testimony
Bottom / Bottom GirlMost experienced victim given elevated status to manage and control other victims on behalf of the traffickerFBI trafficking terminology guide, court documents
StableGroup of victims controlled by a single traffickerFBI terminology, court documents
Daddy / Sugar DaddyOlder male patron / buyer of exploitation servicesCourt testimony, forum analysis
BoyfriendPimp or handler who controls victims through false romantic relationshipFBI trafficking terminology
Wifey / Wife-in-LawVictim given elevated status to control others. Creates internal hierarchy within the 'stable'Law enforcement, survivor testimony
John / TrickBuyer of sexual services / exploitationLaw enforcement standard terminology
Track / StrollArea where victims are displayed and exploitation occursLaw enforcement terminology
The HelpVictims performing services, dehumanized as 'staff.' Found in email euphemisms about household operationsEmail analysis, household staff records
Special GuestHigh-value buyer receiving premium access to victimsEvent coordination records, communication analysis
DIGITAL & ONLINE CODE WORDS
DIGITAL
Terms used in online trafficking communications and darknet markets
The digital landscape creates new avenues for trafficking communication. These terms are documented by FBI Internet Crimes Against Children (ICAC) task forces, darknet marketplace monitoring, and law enforcement cyber investigations. Online escort advertisements use coded language to offer exploitation services while maintaining plausible deniability. Age-related euphemisms disguise the involvement of minors. The Ozark Oracle DDOSecrets Unified Intelligence Report documents 337.8 GB of archived materials from darknet takedowns.
TermSuspected MeaningSource
CPChild pornography / child sexual abuse material (CSAM) -- direct abbreviationFBI Internet Crimes Against Children
PTHCPre-teen hardcore -- age-specific content designationLaw enforcement dark web monitoring
JB / JailbaitUnderage person presented as appearing olderOnline forum analysis, law enforcement
Links / MegalinksURLs to CSAM repositories, often shared via encrypted channelsDark web takedown operations
RosesDollars in escort/trafficking ads (100 roses = $100)Online ad analysis, law enforcement pattern recognition
Donations AcceptedPaid sexual services available -- framed as 'donations' for legal coverOnline ad analysis, prosecution records
GFEGirlfriend Experience -- commercial sexual exploitation servicesOnline advertising, court documents
New in TownRecently trafficked to this area -- victim moved to new locationOnline ad pattern analysis, FBI
Young at HeartUnderage victim presented as adultOnline ad euphemism analysis
Barely LegalMinor presented as having recently turned 18. Age fraud indicatorOnline exploitation pattern analysis
Incall / OutcallLocation-based terms for where exploitation occurs. Incall = trafficker's location; outcall = buyer's locationOnline ad terminology, law enforcement
TRANSPORT & LOGISTICS
TRANSPORT
Terms used for moving victims between locations and organizing exploitation events
The Epstein Flight Logs dossier documents how private aviation was used to move victims between properties. Scheduling assistants organized 'appointments' and 'travel arrangements' that were actually logistics for exploitation. The investigation reveals a professional operation: guest lists, catering, party planning, special requests -- all ordinary event-planning language repurposed to organize the delivery and exploitation of human beings. The Private Aircraft Tracking Analysis documents how FAA N-Number registrations and flight plans can be used to trace these movements.
TermSuspected MeaningSource
Party PlanningOrganizing delivery of victims to an event. Found in email chains coordinating exploitation events at specific propertiesEmail analysis, event coordination records
Guest ListBuyers and attendees who will receive access to victims. Epstein's contact book functioned as a master guest listEpstein contact book (leaked), event coordination
CateringProviding victims for an event. The 'catering' is human beingsEmail euphemisms, party records
Travel ArrangementsLogistics of moving victims between properties. Epstein's assistants scheduled flights, cars, and accommodations for victimsEpstein assistant records, flight logs
Delivery / PickupPhysical transport of victim to or from a buyer. Communication intercepts show these terms used in coordination messagesLaw enforcement surveillance, communication logs
HousekeepingManaging victims at a location between events. Maintaining the appearance of normal household operationsHousehold staff testimony, court depositions
Special RequestSpecific victim type, age, or act requested by a buyer. Indicates customized exploitationCommunication intercepts, court documents
VIP ServicePremium exploitation for elite clients. Higher payment, younger victims, or more extreme abuseFinancial records, communication analysis
BabysittingControlling and watching victims between scheduled exploitation eventsEmail analysis, survivor testimony
Appointment / ScheduleTime-slotted exploitation sessions. Epstein's assistants maintained calendars of 'massage appointments' for minorsAssistant testimony, calendar records
CORPORATE & INSTITUTIONAL FRONTS
FINANCIAL
Legitimate-appearing organizations used to disguise trafficking infrastructure
The Ozark Oracle investigation documents how corporate structures, government agencies, and institutions provide cover for trafficking networks. The Money Laundering Patterns dossier identifies foundation-to-foundation cascading, circular giving, and hub-and-spoke donation patterns. The 'Who Is Running It Now' dossier traces a documented pipeline from Epstein through Peter Thiel ($40M Valar Ventures), to Founders Fund, to Carbyne ($15M Series B 2018, co-founded with Ehud Barak), to JD Vance Senate campaign ($15M), to DOGE and Palantir government contracts. The Israel Convergence Node maps where intelligence, technology, banking, and blackmail networks meet.
TermSuspected MeaningSource
Foundation / TrustTax-exempt entity used for reputation laundering and money movement. Wexner Foundation, Epstein Foundation, Gratitude America Ltd. all documentedMoney Laundering Patterns dossier, IRS filings
Modeling AgencyRecruitment and trafficking front. MC2 Modeling Agency (Jean-Luc Brunel) documented as Epstein pipeline. Brunel found dead in French prison, 2022Court documents, French prosecution, supply chain dossier
Think Tank / Research InstituteInstitutional legitimacy cover. Epstein used academic connections at Harvard, MIT to build credibility and accessEpstein-academic investigation, university reviews
Private Intelligence FirmSurveillance and control infrastructure. Black Cube, Kroll, private investigators used to monitor and intimidate victims and journalistsRonan Farrow investigation, court filings
Technology CompanySurveillance infrastructure disguised as innovation. Carbyne (emergency call tech) co-founded with Ehud Barak, funded by Epstein-connected investorsWho Is Running It Now dossier, Carbyne filings
Consulting FirmPayment laundering vehicle. Kissinger Associates used government contacts for profit. Ehud Barak described as doing 'consulting' after Carbyne roleKissinger dossier, Barak financial disclosures
Property Management LLCShell company controlling properties used for exploitation. Multiple layers of corporate abstraction hide true ownershipProperty records, FinCEN analysis
Venture Capital FundInvestment vehicle connecting financial, political, and intelligence networks. Thiel's Founders Fund, Epstein's financial advisory relationshipsSEC filings, Who Is Running It Now dossier
DETECTION METHODS
METHOD
How investigators identify coded language and trafficking operations
Identifying code words requires multiple analytical methods applied simultaneously. The Ozark Oracle investigation network uses context analysis (food references that make no sense in conversation), pattern clustering (multiple code words in the same communication chain), geographic cross-referencing (coded terms matched to known trafficking locations), financial forensics (unusual payments corresponding with coded communications), and network mapping (connection analysis across 26,000+ nodes with 16,000+ documented relationships). The detection rules in the Money Laundering Patterns dossier are automated: consulting payments over $100K with vague descriptions automatically receive a risk score increase of 25 points.
TermSuspected MeaningSource
Context AnalysisWhen food or object references make zero logical sense in a conversation, they are likely coded. 'Playing dominoes on cheese vs pasta' is not about foodFBI analytical methodology
Pattern ClusteringMultiple code words appearing in the same communication chain. One food reference may be innocent; five in a non-food context is a patternEmail chain analysis, NSA methodology
Geographic Cross-ReferenceCoded references matched to known trafficking locations. 'The island' + 'travel arrangements' + 'massage' = Little St. James patternLaw enforcement geographic mapping
Financial ForensicsUnusual payments that correspond temporally with coded communications. $158M in 'consulting fees' with no deliverables is a red flagFinCEN Suspicious Activity Reports, bank investigations
Network AnalysisMapping connections between people, organizations, and locations. The Ozark Oracle maps 26,000+ nodes with 16,000+ connections across 30 relationship typesOzark Oracle Investigation Network
Survivor ConfirmationVictims confirming the specific meanings of terms their traffickers used. This is the most authoritative source for code word definitionsCourt depositions, victim interviews
Digital Footprint AnalysisTracking online ad patterns, encrypted chat terminology, and darknet marketplace language evolution as terms change when exposedFBI ICAC, dark web monitoring
IF YOU SEE SOMETHING
PERSON
Recognizing these patterns in real communications can save lives. Report immediately.
If you encounter these code words being used in suspicious contexts -- in emails, social media, advertisements, or conversations -- report it. You do not need to be certain. Trained investigators will evaluate. Every report matters. Nancy Schaefer, a Georgia State Senator who investigated child trafficking through CPS, was murdered for what she knew. Survivors who come forward face enormous risk. Your anonymous report could be the piece that connects a pattern investigators have been building for years.
TermSuspected MeaningSource
National Human Trafficking Hotline1-888-373-7888 (call or text 'HELP' to 233733)24/7, confidential, multi-language support
FBI Tipstips.fbi.gov -- Report suspected trafficking, exploitation, and corruptionFederal Bureau of Investigation
CyberTiplineCyberTipline.org -- Report online child sexual exploitationNational Center for Missing & Exploited Children
FBI Internet Crime (IC3)ic3.gov -- Report online crimes including exploitationFBI Internet Crime Complaint Center
DHS Blue Campaigndhs.gov/blue-campaign -- Recognize and report trafficking indicatorsDepartment of Homeland Security
Local FBI Field Officefbi.gov/contact-us/field-offices -- Report to your nearest FBI office directlyFederal Bureau of Investigation
Ozark Oracle Tip LineSubmit tips directly to this investigation network at ozark-oracle.com or via the Investigation Outreach pageOzark Oracle Investigation Network
REPORTING SAVES LIVES
If you recognize these patterns in real communications, REPORT IMMEDIATELY.
CyberTipline | 1-888-373-7888 | FBI Tips