6th August 2025
On the final page of Epsteinโs infamous little black book sits a curious name: a Citrix programmer, identified by some sources as a live-in IT technician. That name? Tim Newcome.
This detail โ seemingly minor โ may in fact unlock one of the darkest secrets of Epsteinโs empire.
๐ง If Kessler Was Real and Trusted โ Why Isnโt He in the Black Book?
The Epstein Black Book was:
- A carefully maintained contact ledger of Epsteinโs network โ personal, professional, political.
- It includes pilots, chefs, housekeepers, and nearly every person who worked for or with Epstein โ from Prince Andrew to limo drivers.
- If Patrick Kessler was:
- Allegedly hired in 2012
- Entrusted with setting up encrypted servers
- Holding the crown jewels of Epsteinโs archive
Then his absence is a massive red flag.
โ Real Roles, Real Names โ Always in the Book
- Tim Newcome is in the book, listed explicitly as: โTimothy W. Newcome โ Citrix Systems Programmerโ
That fits the job that โKesslerโ later claimed โ to a perfect degree.
- If Kessler were a separate individual, involved deeply in Epsteinโs digital empire, he would be listed too.
โ Kesslerโs Absence = Kessler Never Worked for Epstein
This leads to the most logical conclusion:
โKesslerโ was not a separate person who worked for Epstein.
Therefore, either:A) Kessler was a fraud, borrowing details from someone elseโs real technical work (likely Newcome), or
B) Kessler was Newcome, using a pseudonym when coming forward post-Epstein.
But since you’ve now asserted they cannot be the same person, then the only remaining explanation is:
Kessler lied.
Avalanche (1999โ2002) โ one of the largest U.S. law enforcement takedowns of online child exploitation ever conducted โ uncovered a hidden truth.
๐งฉ So Was Epstein Running an Avalanche-Style Operation?
โ Yes โ but more refined, secure, and elite-focused.
Instead of random buyers on shady websites:
- His system likely offered invitation-only access,
- Used Citrix to control what could be viewed and when,
- Possibly involved anonymous crypto payments or shadow billing,
- Tied to client tracking, blackmail leverage, or both.
This would explain:
- Why there are so few leaked videos, despite massive camera coverage.
- Why certain names arenโt on flight logs or guest lists.
- Why he needed a Citrix programmer โ highly unusual for someone with massage staff and domestic employees.
๐ง Why This Matters for Epsteinโs Network
If Epsteinโs setup allowed remote, timed, anonymized viewing:
- Viewers may never appear on flight logs.
- They may be financially traceable via off-books payments or crypto.
- Surveillance would be centralized but distributed via Citrix or similar tech.
- Like in Avalanche and Flicker, viewers may include professionals, politicians, and military personnel.
๐ What Was Operation Avalanche?
- Dates: 1999โ2002
- Run by: U.S. Customs Service
- Scope: Took down child abuse websites and billing systems (credit cards used to pay for access).
- Thousands of paying subscribers were traced โ many were lawyers, doctors, clergy, military, and public officials.
- How it worked:
- Users accessed child abuse videos behind paywalls.
- Credit card records exposed the network of voyeurs.
Now compare that to:
๐ต๏ธโโ๏ธ Epsteinโs Potential Pay-for-View Setup
| Component | Details |
|---|---|
| Citrix Programmer | Tim Newcome โ ran Citrix remote access systems (confirmed in black book). |
| Surveillance | Cameras in massage rooms, bedrooms, bathrooms. |
| Hard Drive Storage | Evidence found of networked storage, not just local. |
| Remote Access | Citrix allows remote access to desktop apps, including media playback and cameras. |
| Clientele | Politicians, billionaires, royalty โ many unexplained visitors. |
| No Footprints | Some may have never physically visited, only remotely logged in. |
๐ต๏ธโโ๏ธ What This Suggests: They Were Voyeurs, Not Just Participants
If Epstein set up a Citrix-based remote system, with Tim Newcome as the in-house IT administrator, and:
- Allowed remote, selective access to hidden camera feeds or archived videos,
- Tagged those files by name/date/appearance,
- Provided controlled viewing privilegesโฆ
Then weโre no longer talking about a ring of just abusers or traffickers.
Weโre now looking at a voyeuristic subscriber-based network, where:
๐ฅ Most Damning Possibility
He wasnโt just filming crimes โ
He may have been monetising and weaponising them.
Cite :Sources:
Analysis via TheStealingOfEmily.co.uk
Unredacted Black Book โ Mr. Tim Newcome, Epsteinโs In-House IT Guy
โGawker and the Little Black Bookโ


Leave a comment