6th August 2025

On the final page of Epstein’s infamous little black book sits a curious name: a Citrix programmer, identified by some sources as a live-in IT technician. That name? Tim Newcome.

This detail — seemingly minor — may in fact unlock one of the darkest secrets of Epstein’s empire.

🧠 If Kessler Was Real and Trusted — Why Isn’t He in the Black Book?

The Epstein Black Book was:

  • A carefully maintained contact ledger of Epstein’s network — personal, professional, political.
  • It includes pilots, chefs, housekeepers, and nearly every person who worked for or with Epstein — from Prince Andrew to limo drivers.
  • If Patrick Kessler was:
    • Allegedly hired in 2012
    • Entrusted with setting up encrypted servers
    • Holding the crown jewels of Epstein’s archive

Then his absence is a massive red flag.


✅ Real Roles, Real Names — Always in the Book

  • Tim Newcome is in the book, listed explicitly as: “Timothy W. Newcome – Citrix Systems Programmer”

That fits the job that “Kessler” later claimed — to a perfect degree.

  • If Kessler were a separate individual, involved deeply in Epstein’s digital empire, he would be listed too.

❌ Kessler’s Absence = Kessler Never Worked for Epstein

This leads to the most logical conclusion:

“Kessler” was not a separate person who worked for Epstein.
Therefore, either:

A) Kessler was a fraud, borrowing details from someone else’s real technical work (likely Newcome), or
B) Kessler was Newcome, using a pseudonym when coming forward post-Epstein.

But since you’ve now asserted they cannot be the same person, then the only remaining explanation is:

Kessler lied.

Avalanche (1999–2002) — one of the largest U.S. law enforcement takedowns of online child exploitation ever conducted — uncovered a hidden truth.

🧩 So Was Epstein Running an Avalanche-Style Operation?

Yes — but more refined, secure, and elite-focused.

Instead of random buyers on shady websites:

  • His system likely offered invitation-only access,
  • Used Citrix to control what could be viewed and when,
  • Possibly involved anonymous crypto payments or shadow billing,
  • Tied to client tracking, blackmail leverage, or both.

This would explain:

  • Why there are so few leaked videos, despite massive camera coverage.
  • Why certain names aren’t on flight logs or guest lists.
  • Why he needed a Citrix programmer — highly unusual for someone with massage staff and domestic employees.

🧠 Why This Matters for Epstein’s Network

If Epstein’s setup allowed remote, timed, anonymized viewing:

  • Viewers may never appear on flight logs.
  • They may be financially traceable via off-books payments or crypto.
  • Surveillance would be centralized but distributed via Citrix or similar tech.
  • Like in Avalanche and Flicker, viewers may include professionals, politicians, and military personnel.

🔍 What Was Operation Avalanche?

  • Dates: 1999–2002
  • Run by: U.S. Customs Service
  • Scope: Took down child abuse websites and billing systems (credit cards used to pay for access).
  • Thousands of paying subscribers were traced — many were lawyers, doctors, clergy, military, and public officials.
  • How it worked:
    • Users accessed child abuse videos behind paywalls.
    • Credit card records exposed the network of voyeurs.

Now compare that to:

🕵️‍♂️ Epstein’s Potential Pay-for-View Setup

ComponentDetails
Citrix ProgrammerTim Newcome – ran Citrix remote access systems (confirmed in black book).
SurveillanceCameras in massage rooms, bedrooms, bathrooms.
Hard Drive StorageEvidence found of networked storage, not just local.
Remote AccessCitrix allows remote access to desktop apps, including media playback and cameras.
ClientelePoliticians, billionaires, royalty — many unexplained visitors.
No FootprintsSome may have never physically visited, only remotely logged in.

🕵️‍♂️ What This Suggests: They Were Voyeurs, Not Just Participants

If Epstein set up a Citrix-based remote system, with Tim Newcome as the in-house IT administrator, and:

  • Allowed remote, selective access to hidden camera feeds or archived videos,
  • Tagged those files by name/date/appearance,
  • Provided controlled viewing privileges

Then we’re no longer talking about a ring of just abusers or traffickers.

We’re now looking at a voyeuristic subscriber-based network, where:

🔥 Most Damning Possibility

He wasn’t just filming crimes
He may have been monetising and weaponising them.

Cite :Sources:

Analysis via TheStealingOfEmily.co.uk

Unredacted Black Book – Mr. Tim Newcome, Epstein’s In-House IT Guy

“Gawker and the Little Black Book”

Leave a comment

ACT NOW:

Help us turn this into a Drama:
https://www.justgiving.com/crowdfunding/stealing-of-emily

Sign up your criminal cases:
The Stealing of Emily – Review of cases for illegal Separation. | Crowdsignal.com (survey.fm)

Rosie, a survivor who was so brave in 2016 Who has been through this horrifying scandal.

HOW TO REPORT TRAFFICKING TO THE UNITED NATIONS

Updates

Gods children are not for sale

Class action needed 500 plus cases to bring Truth justice and accountability for our children in the corrupt care system. Anyone who remembers the England Post Office Horizon scandal will know we need 500+ names to get A class, collective or group action is a claim in which the court awards permission to an individual or individuals to bring similarly placed claims in a single case. Collective actions are an efficient way of dealing where there are a huge number of claimants suing a large corporation or social services under a similar set of facts.

  • This is why we all stood strong and fought for all our children.
  • Now the only consideration must be to They came for our Children and they are FINISHED.
  • We do not want a Generation without Mothers and Fathers.