WHY CODE WORDS MATTER
METHOD
Traffickers, predators, and their networks do not communicate in plain language. They use code words, euphemisms, and front operations to disguise the buying, selling, and exploitation of human beings -- particularly children. These terms come from court documents, FBI intelligence bulletins, investigation dossiers, flight records, leaked communications, survivor testimony, and darknet monitoring. This database documents 100+ coded terms identified across the Ozark Oracle investigation network, drawn from 800+ investigation dossiers covering 26,000+ connected individuals. Understanding this language is the first step toward recognizing and stopping it.
| Term | Description | Source |
| Court Documents | Epstein v. United States, Maxwell v. Giuffre, Nygard criminal proceedings, Penn State grand jury report | Federal and state court records |
| FBI Bulletins | Symbols and Logos Used by Pedophiles to Identify Sexual Preferences, Internet Crimes Against Children task force reports | FBI Intelligence Products |
| Leaked Communications | Podesta emails (WikiLeaks), Epstein contact book (leaked 2015), flight manifests released under court order | Court-ordered releases, whistleblowers |
| Investigation Dossiers | 800+ dossiers in the Ozark Oracle database covering trafficking networks, financial laundering, and political protection | Ozark Oracle Investigation Network |
| Survivor Testimony | Depositions from Virginia Giuffre, Courtney Wild, and 100+ identified Epstein victims; Larry Nassar victims (500+); Boys Town survivors | Court depositions, victim interviews |
| Financial Records | Leon Black's $158M in payments to Epstein (2012-2017), Wexner's $46M+ transfers, shell company filings | SEC filings, bank investigations, tax records |
RECRUITMENT FRONTS
PERSON
How victims are found and lured -- the cover stories that disguise trafficking operations
The Ozark Oracle Supply Chain Investigation documents five primary procurement channels: orphanages and child welfare systems, international adoption and disaster exploitation, modeling and entertainment, sports organizations, and secret society networks. Jean-Luc Brunel operated MC2 Modeling Agency as a direct pipeline for Epstein. Nancy Schaefer, a Georgia State Senator who investigated CPS as a trafficking pipeline, was found dead in 2010. Laura Silsby was caught trafficking 33 children out of Haiti after the 2010 earthquake -- Bill Clinton intervened in her case. She now works at AlertSense, which operates the Amber Alert system.
| Term | Suspected Meaning | Source |
| Model / Modeling Agency | Victim recruitment front -- young women and girls recruited under false promise of careers. MC2 Modeling Agency operated by Jean-Luc Brunel was a documented Epstein pipeline | Court documents, MC2 records, Brunel indictment (France) |
| Massage / Masseuse | Cover terminology for sexual exploitation of minors. All abuse in the Epstein case was framed as 'massage' appointments, scheduled by assistants | Epstein case depositions, victim testimony, assistant records |
| Talent Scout / Recruiter | Person who identifies and lures victims. Ghislaine Maxwell's documented role: recruiting young women and girls for Epstein's network | Maxwell trial testimony, victim depositions |
| Nanny / Au Pair | Young women recruited under false pretenses of childcare employment, then exploited | Trafficking pattern analysis, law enforcement reports |
| Scholarship Program | Payments to victim families to maintain access and silence. Epstein Foundation records show payments framed as educational support | Epstein Foundation records, financial investigation |
| Internship / Mentoring | Access to minors disguised as professional development | Pattern analysis across multiple cases |
| Charity Work / Volunteering | Access to vulnerable populations through ostensible humanitarian missions. Haiti pattern: Silsby caught with 33 children | Silsby arrest records, court documents (Haiti) |
| Orphanage / Group Home | Direct supply chain for trafficking victims. Florida School for Boys: 96 bodies found. Boys Town scandal. Nationwide pattern documented | Ozark Oracle Supply Chain Investigation, forensic records |
FOOD CODE WORDS
FOOD
Food references used as code for trafficking victims and activities in communications
These terms were identified through FBI intelligence bulletins, analysis of leaked email communications, darknet forum monitoring, and encrypted chat intercepts. The food terminology system allows predators to discuss victims in plain sight -- a conversation about 'ordering pizza' or 'playing dominoes on cheese vs pasta' appears innocent to outsiders while carrying specific meaning within the network. Context analysis is key: when food references make no logical sense in a conversation, they are likely coded.
| Term | Suspected Meaning | Source |
| Pizza | Girl / young female victim | Podesta emails, FBI bulletin, darknet forums |
| Cheese Pizza (CP) | Child pornography -- direct acronym match for 'CP' | FBI Symbols & Logos bulletin, law enforcement |
| Hot Dog | Boy / young male victim | Podesta emails, forum analysis |
| Pasta | Young boy (variant code) | Email context analysis, forum cross-reference |
| Walnut / Walnut Sauce | Person of color (context dependent) / adrenochrome reference | Podesta emails, dark web forums |
| Ice Cream | Male prostitute / young male victim | Trafficking forum analysis, law enforcement |
| Sauce | Orgy / group exploitation event | Forum analysis, encrypted chat logs |
| Chicken | Young person / minor. 'Chicken hawk' = predator who targets young people | Historical slang, NAMBLA documents, law enforcement |
| Cheese | Young girl | Forum code, email analysis |
| Milk | Young female / breast milk reference | Dark web marketplace analysis |
| Bread | Money / payment for exploitation services | Forum slang, encrypted communications |
| Candy | Drugs used for sedation of victims | Trafficking survivor testimony |
| Oyster | Virgin / first-time victim | Dark web auction analysis |
| Lollipop | Young person | Predator forums, encrypted chat |
| Succulent | Desired / attractive victim | Email context analysis |
FINANCIAL FRONTS & LAUNDERING
FINANCIAL
How trafficking payments are disguised as legitimate business transactions
The Ozark Oracle Money Laundering Patterns Analysis dossier documents eight primary laundering methods used by trafficking networks: shell companies (Delaware/Nevada/Wyoming LLCs), real estate (all-cash purchases, rapid flipping), art market (subjective valuations, freeport storage), cryptocurrency (mixers, privacy coins, NFT wash trading), casinos, trade-based laundering, structuring, and integration through legitimate business. Foundations are documented as laundering vehicles through inflated in-kind donations, self-dealing through intermediaries, and foundation-to-foundation cascading. Leon Black paid $158 million to Epstein between 2012 and 2017, claiming it was for 'tax advice.' Les Wexner transferred $46 million or more to Epstein and granted him Power of Attorney.
| Term | Suspected Meaning | Source |
| Consulting Fees | Payments for providing victims or access. Phantom consulting: payments over $100K with vague descriptions are flagged in financial forensics | Money Laundering Patterns dossier, Epstein financial records |
| Tax Advice | Cover story for massive payments. Leon Black paid Epstein $158M (2012-2017) claiming 'tax advice' with no documented deliverables | Leon Black deposition, Apollo Global investigation |
| Philanthropy / Foundation | Reputation washing and money laundering vehicle. Gratitude America Ltd., Clinton Foundation, Wexner Foundation all identified as pattern matches | Ozark Oracle foundation analysis, tax records |
| Donations | Payments laundered through charitable organizations to disguise trafficking revenue or buy political protection | Gratitude America records, Clinton Foundation patterns |
| Art Deals | Money laundering through art market -- subjective valuations enable any amount. Freeport storage in Geneva, Luxembourg, Delaware, Singapore | Money Laundering Patterns dossier |
| Real Estate Investment | Property purchased to hold or hide victims. All-cash purchases and rapid flipping are red flags | Shell company analysis, FinCEN reports |
| Research Grant | Payments to academics for access, silence, or legitimacy. Epstein funded Harvard, MIT, and other institutions | Epstein-Harvard-MIT connection analysis |
| Legal Retainer | Payments to attorneys for cover-up services, NDA enforcement, and victim silencing | Financial disclosure, NDA pattern analysis |
| Shell Company | Delaware/Nevada/Wyoming LLCs used to hide ownership and launder payments. Multiple layers of corporate abstraction | FinCEN Suspicious Activity Reports, Money Laundering dossier |
| Modeling Contract | Payment structure designed to look like entertainment industry while funding trafficking operation | MC2 agency records, Jean-Luc Brunel financial records |
DOCUMENTED LOCATIONS
LOCATION
Specific properties and locations identified in court documents and investigation dossiers
These locations are drawn from court exhibits, property records, FAA flight registrations, and investigative surveillance. The Epstein Flight Logs dossier documents specific passengers on aircraft N908JE (Boeing 727, 'Lolita Express'). The Private Aircraft Tracking Analysis documents FAA tracking methods and registered aircraft. Property records for Little St. James Island, Zorro Ranch, and the 9 East 71st Street townhouse are public. These are not allegations -- they are documented locations from legal proceedings.
| Term | Suspected Meaning | Source |
| Little St. James Island | Epstein's private island, U.S. Virgin Islands. Site of the 'temple' (blue/white striped structure documented in aerial photography) | Property records, court documents, construction permits |
| Lolita Express (N908JE) | Epstein's Boeing 727. Flight logs released under court order document passengers including heads of state, billionaires, and celebrities | FAA records, court-ordered flight log release |
| Zorro Ranch | Epstein's 7,500-acre New Mexico property. Alleged site of planned 'breeding program' per New York Times investigation | Property records, NYT investigation, state AG inquiry |
| 9 East 71st Street | Epstein's 40-room Manhattan townhouse. Gifted by Les Wexner. Contained hidden cameras per witness testimony | Property records, Maxwell trial testimony |
| The Temple | Blue and white striped structure on Little St. James Island. Purpose disputed; construction records and aerial photography documented | Aerial photography, construction records, court exhibits |
| Presidio (San Francisco) | U.S. Army base where Lt. Col. Michael Aquino (Temple of Set founder) was investigated for child abuse in military daycare (1987) | Army CID investigation records, media reports |
| Florida School for Boys (Dozier) | Reform school where 96 bodies of children were found through forensic excavation. Operated 1900-2011 | University of South Florida forensic report, state records |
| Comet Ping Pong | Washington DC restaurant connected to Podesta associates. Subject of investigation regarding coded communications | Investigation reports, connection analysis |
| The Farm / The Ranch | Generic terms for rural holding locations used in trafficking operations. Remote properties reduce witness exposure | Law enforcement pattern analysis, survivor testimony |
PERSON & ROLE CODE WORDS
PERSON
Terms used by traffickers to describe people within their operations
These terms come from FBI trafficking terminology guides, court depositions, survivor testimony, and law enforcement intercept analysis. The Ozark Oracle investigation documents how victims are dehumanized through language -- from 'fresh' (newly recruited) to 'seasoned' (broken through repeated abuse). Ozark Oracle investigation data confirms: 'Recruited as young as possible. Fresh victims more valuable. Virginity specifically prized. Payment schedules for massage services documented.' Understanding these role designations helps identify trafficking operations in progress.
| Term | Suspected Meaning | Source |
| Fresh | Newly recruited victim. More 'valuable' within the network. Ozark Oracle data confirms: 'Fresh victims more valuable' | Ozark Oracle investigation data, law enforcement intercepts |
| Seasoned | Victim broken through repeated abuse who no longer resists. Considered 'trained' by traffickers | FBI trafficking reports, survivor testimony |
| Bottom / Bottom Girl | Most experienced victim given elevated status to manage and control other victims on behalf of the trafficker | FBI trafficking terminology guide, court documents |
| Stable | Group of victims controlled by a single trafficker | FBI terminology, court documents |
| Daddy / Sugar Daddy | Older male patron / buyer of exploitation services | Court testimony, forum analysis |
| Boyfriend | Pimp or handler who controls victims through false romantic relationship | FBI trafficking terminology |
| Wifey / Wife-in-Law | Victim given elevated status to control others. Creates internal hierarchy within the 'stable' | Law enforcement, survivor testimony |
| John / Trick | Buyer of sexual services / exploitation | Law enforcement standard terminology |
| Track / Stroll | Area where victims are displayed and exploitation occurs | Law enforcement terminology |
| The Help | Victims performing services, dehumanized as 'staff.' Found in email euphemisms about household operations | Email analysis, household staff records |
| Special Guest | High-value buyer receiving premium access to victims | Event coordination records, communication analysis |
DIGITAL & ONLINE CODE WORDS
DIGITAL
Terms used in online trafficking communications and darknet markets
The digital landscape creates new avenues for trafficking communication. These terms are documented by FBI Internet Crimes Against Children (ICAC) task forces, darknet marketplace monitoring, and law enforcement cyber investigations. Online escort advertisements use coded language to offer exploitation services while maintaining plausible deniability. Age-related euphemisms disguise the involvement of minors. The Ozark Oracle DDOSecrets Unified Intelligence Report documents 337.8 GB of archived materials from darknet takedowns.
| Term | Suspected Meaning | Source |
| CP | Child pornography / child sexual abuse material (CSAM) -- direct abbreviation | FBI Internet Crimes Against Children |
| PTHC | Pre-teen hardcore -- age-specific content designation | Law enforcement dark web monitoring |
| JB / Jailbait | Underage person presented as appearing older | Online forum analysis, law enforcement |
| Links / Megalinks | URLs to CSAM repositories, often shared via encrypted channels | Dark web takedown operations |
| Roses | Dollars in escort/trafficking ads (100 roses = $100) | Online ad analysis, law enforcement pattern recognition |
| Donations Accepted | Paid sexual services available -- framed as 'donations' for legal cover | Online ad analysis, prosecution records |
| GFE | Girlfriend Experience -- commercial sexual exploitation services | Online advertising, court documents |
| New in Town | Recently trafficked to this area -- victim moved to new location | Online ad pattern analysis, FBI |
| Young at Heart | Underage victim presented as adult | Online ad euphemism analysis |
| Barely Legal | Minor presented as having recently turned 18. Age fraud indicator | Online exploitation pattern analysis |
| Incall / Outcall | Location-based terms for where exploitation occurs. Incall = trafficker's location; outcall = buyer's location | Online ad terminology, law enforcement |
TRANSPORT & LOGISTICS
TRANSPORT
Terms used for moving victims between locations and organizing exploitation events
The Epstein Flight Logs dossier documents how private aviation was used to move victims between properties. Scheduling assistants organized 'appointments' and 'travel arrangements' that were actually logistics for exploitation. The investigation reveals a professional operation: guest lists, catering, party planning, special requests -- all ordinary event-planning language repurposed to organize the delivery and exploitation of human beings. The Private Aircraft Tracking Analysis documents how FAA N-Number registrations and flight plans can be used to trace these movements.
| Term | Suspected Meaning | Source |
| Party Planning | Organizing delivery of victims to an event. Found in email chains coordinating exploitation events at specific properties | Email analysis, event coordination records |
| Guest List | Buyers and attendees who will receive access to victims. Epstein's contact book functioned as a master guest list | Epstein contact book (leaked), event coordination |
| Catering | Providing victims for an event. The 'catering' is human beings | Email euphemisms, party records |
| Travel Arrangements | Logistics of moving victims between properties. Epstein's assistants scheduled flights, cars, and accommodations for victims | Epstein assistant records, flight logs |
| Delivery / Pickup | Physical transport of victim to or from a buyer. Communication intercepts show these terms used in coordination messages | Law enforcement surveillance, communication logs |
| Housekeeping | Managing victims at a location between events. Maintaining the appearance of normal household operations | Household staff testimony, court depositions |
| Special Request | Specific victim type, age, or act requested by a buyer. Indicates customized exploitation | Communication intercepts, court documents |
| VIP Service | Premium exploitation for elite clients. Higher payment, younger victims, or more extreme abuse | Financial records, communication analysis |
| Babysitting | Controlling and watching victims between scheduled exploitation events | Email analysis, survivor testimony |
| Appointment / Schedule | Time-slotted exploitation sessions. Epstein's assistants maintained calendars of 'massage appointments' for minors | Assistant testimony, calendar records |
CORPORATE & INSTITUTIONAL FRONTS
FINANCIAL
Legitimate-appearing organizations used to disguise trafficking infrastructure
The Ozark Oracle investigation documents how corporate structures, government agencies, and institutions provide cover for trafficking networks. The Money Laundering Patterns dossier identifies foundation-to-foundation cascading, circular giving, and hub-and-spoke donation patterns. The 'Who Is Running It Now' dossier traces a documented pipeline from Epstein through Peter Thiel ($40M Valar Ventures), to Founders Fund, to Carbyne ($15M Series B 2018, co-founded with Ehud Barak), to JD Vance Senate campaign ($15M), to DOGE and Palantir government contracts. The Israel Convergence Node maps where intelligence, technology, banking, and blackmail networks meet.
| Term | Suspected Meaning | Source |
| Foundation / Trust | Tax-exempt entity used for reputation laundering and money movement. Wexner Foundation, Epstein Foundation, Gratitude America Ltd. all documented | Money Laundering Patterns dossier, IRS filings |
| Modeling Agency | Recruitment and trafficking front. MC2 Modeling Agency (Jean-Luc Brunel) documented as Epstein pipeline. Brunel found dead in French prison, 2022 | Court documents, French prosecution, supply chain dossier |
| Think Tank / Research Institute | Institutional legitimacy cover. Epstein used academic connections at Harvard, MIT to build credibility and access | Epstein-academic investigation, university reviews |
| Private Intelligence Firm | Surveillance and control infrastructure. Black Cube, Kroll, private investigators used to monitor and intimidate victims and journalists | Ronan Farrow investigation, court filings |
| Technology Company | Surveillance infrastructure disguised as innovation. Carbyne (emergency call tech) co-founded with Ehud Barak, funded by Epstein-connected investors | Who Is Running It Now dossier, Carbyne filings |
| Consulting Firm | Payment laundering vehicle. Kissinger Associates used government contacts for profit. Ehud Barak described as doing 'consulting' after Carbyne role | Kissinger dossier, Barak financial disclosures |
| Property Management LLC | Shell company controlling properties used for exploitation. Multiple layers of corporate abstraction hide true ownership | Property records, FinCEN analysis |
| Venture Capital Fund | Investment vehicle connecting financial, political, and intelligence networks. Thiel's Founders Fund, Epstein's financial advisory relationships | SEC filings, Who Is Running It Now dossier |
DETECTION METHODS
METHOD
How investigators identify coded language and trafficking operations
Identifying code words requires multiple analytical methods applied simultaneously. The Ozark Oracle investigation network uses context analysis (food references that make no sense in conversation), pattern clustering (multiple code words in the same communication chain), geographic cross-referencing (coded terms matched to known trafficking locations), financial forensics (unusual payments corresponding with coded communications), and network mapping (connection analysis across 26,000+ nodes with 16,000+ documented relationships). The detection rules in the Money Laundering Patterns dossier are automated: consulting payments over $100K with vague descriptions automatically receive a risk score increase of 25 points.
| Term | Suspected Meaning | Source |
| Context Analysis | When food or object references make zero logical sense in a conversation, they are likely coded. 'Playing dominoes on cheese vs pasta' is not about food | FBI analytical methodology |
| Pattern Clustering | Multiple code words appearing in the same communication chain. One food reference may be innocent; five in a non-food context is a pattern | Email chain analysis, NSA methodology |
| Geographic Cross-Reference | Coded references matched to known trafficking locations. 'The island' + 'travel arrangements' + 'massage' = Little St. James pattern | Law enforcement geographic mapping |
| Financial Forensics | Unusual payments that correspond temporally with coded communications. $158M in 'consulting fees' with no deliverables is a red flag | FinCEN Suspicious Activity Reports, bank investigations |
| Network Analysis | Mapping connections between people, organizations, and locations. The Ozark Oracle maps 26,000+ nodes with 16,000+ connections across 30 relationship types | Ozark Oracle Investigation Network |
| Survivor Confirmation | Victims confirming the specific meanings of terms their traffickers used. This is the most authoritative source for code word definitions | Court depositions, victim interviews |
| Digital Footprint Analysis | Tracking online ad patterns, encrypted chat terminology, and darknet marketplace language evolution as terms change when exposed | FBI ICAC, dark web monitoring |
IF YOU SEE SOMETHING
PERSON
Recognizing these patterns in real communications can save lives. Report immediately.
If you encounter these code words being used in suspicious contexts -- in emails, social media, advertisements, or conversations -- report it. You do not need to be certain. Trained investigators will evaluate. Every report matters. Nancy Schaefer, a Georgia State Senator who investigated child trafficking through CPS, was murdered for what she knew. Survivors who come forward face enormous risk. Your anonymous report could be the piece that connects a pattern investigators have been building for years.
| Term | Suspected Meaning | Source |
| National Human Trafficking Hotline | 1-888-373-7888 (call or text 'HELP' to 233733) | 24/7, confidential, multi-language support |
| FBI Tips | tips.fbi.gov -- Report suspected trafficking, exploitation, and corruption | Federal Bureau of Investigation |
| CyberTipline | CyberTipline.org -- Report online child sexual exploitation | National Center for Missing & Exploited Children |
| FBI Internet Crime (IC3) | ic3.gov -- Report online crimes including exploitation | FBI Internet Crime Complaint Center |
| DHS Blue Campaign | dhs.gov/blue-campaign -- Recognize and report trafficking indicators | Department of Homeland Security |
| Local FBI Field Office | fbi.gov/contact-us/field-offices -- Report to your nearest FBI office directly | Federal Bureau of Investigation |
| Ozark Oracle Tip Line | Submit tips directly to this investigation network at ozark-oracle.com or via the Investigation Outreach page | Ozark Oracle Investigation Network |