The Epstein Files
The Epstein Files

File 111 - Epstein Hired Private Investigators to Follow His Victims. Some Are Still Being Watched.

2h ago26:014,360 words
0:000:00

Jeffrey Epstein employed a network of private investigators to conduct surveillance on victims, journalists, and attorneys who threatened to expose him. Victims have described being followed, photogra...

Transcript

EN

Hey, it's the creator of the Epstein files.

Before we get into today's episode,

β€œI need to tell you about my brand new podcast, "War Desk".”

If you value how we fact-check the narrative and follow the raw data on this show, "War Desk" is built for you. It's a massive ongoing investigation into the rapidly escalating developments

happening in the Middle East right now. It is completely postpartisan and follows the facts. Instead of cable news talking points, we go straight to the source to explain the reality of global conflict.

Search for "War Desk" on Apple podcasts or Spotify right now, or check this episode's description for the links and hit follow. All right, let's get into the episode. (upbeat music)

Three million pages of evidence,

thousands of unsealed flight logs, millions of data points, names, themes, and timelines connected. You are listening to the Epstein files. The world's first AI native investigation

into the case that traditional journalism simply could not handle. - Welcome back to the Epstein files. Last time we looked at file 110, the construction workers who built Epstein's Island Temple

tried to talk. Nobody listened. Today we are analyzing file 111, Epstein hired private investigators to follow his victims.

Some are still being watched,

β€œas always, every document and source we reference”

is available at Epsteinfiles.fm. So let us start with the PI firms, black cube, cruel, others identified in court filings, because that document trail sets up the first anomaly

immediately.

- Right, here is the discrepancy.

The opening references, black cube and cruel. - Which are names frequently cited in public discussions about private intelligence. - They are, however, an audit of the primary source material for this analysis.

- Specifically, the Palm Beach Police Department incident report 105030368. - Exactly. That report, along with the latest Department of Justice Document releases,

shows absolutely zero documentation for black cube or cruel. - None. - We do not have documentation for that. - Right.

Instead the police record show an entirely different network. - A local one. - Licensed investigators and security operatives functioning right there on the ground in Florida. - So we are mapping out exactly

who is executing these operations based strictly on the documented facts. - We are tracing the actual deployment of these local operatives. - We begin with the telecom analysis.

- This was conducted by the Palm Beach Police early in the investigation. - Right. When police were looking into early reports of surveillance, detectives isolated a very specific phone number

in their logs. - 305, 710, 5165. - Correct, and the subscriber information for that number. - Which they pulled through official channels. - Yes, it confirmed the number was registered

to an individual named Paul A. Lavory. - Located in Highly of Florida. - Now for you listening, Highly of is in Miami-Dade County. - It is a significant distance from Palm Beach.

- Right. - Far from the insular high-wealth on-clave of Epstein's primary residence. - So the police run this subscriber data and they find a connection.

- A direct connection. - The police audit traced Lavory's address to the Office of Curley and Riley Private Investigators

β€œwhich is a crucial pivot in this document trail.”

- It is. The police did not stop at the name. They researched the firm's operational footprint. They mapped out documented connections to the legal defense apparatus.

- According to the investigative record, police researched Curley and Riley's web page. - They identified various high-profile cases the firm had assisted with. - And they located another website,

a Miami rotary meeting site. - That site confirmed Mr. Riley's attendance alongside attorney Roy Black. - This is highly significant. It establishes a documented network.

- We are not looking at Rosa individuals. - No, we are looking at licensed professional entities. - With established ties to prominent defense attorneys. - Which shifts the analysis. This is a coordinated defense strategy

executing physical surveillance. - And Curley and Riley were not the only ones. - No, the documents show another specific firm operating in the area. - Canter investigations.

- Looking at the police logs, records identify a man named Zachary Bechard. - B-E-C-H-A-R-D. - Right, he is a licensed private investigator in the state of Florida.

- Employed by Canter investigations out of Jupiter, Florida. - The level of detail, the police gathered on budget is extensive. - The incident reports detail actions that go far beyond standard observation.

- We will detail his specific actions on the road shortly.

- But first, the timeline of deployment.

- The speed of mobilization is fully documented. - According to the Palm Beach police files, detectives made initial contact with a former Epstein employee. - E-H-A-N-L-S-E.

- They left a business card at his residence. - Alessi subsequently contacted the police to return the inquiry. - A standard investigative step. - But the sequence of immense immediately following

that call reveals the operational speed

Of the defense network.

- Following Alessi's contact with the police,

his attorney steps in.

β€œ- Donald Merrill, he formally instructed the police”

not to speak with his client. - But it accelerates further. - On November 21st, 2005. - During a formal statement with Assistant State Attorney Wise. - Mr. Alessi confirmed he was contacted

by the Epstein organization. - Shortly after his initial contact with the police. - Specifically, the sworn statements indicate that on or about November 11, 2005. - Alessi was contacted by a private investigator.

- Working directly from the office of Roy Black. - So the police dropped a card at a witness's house. - Almost immediately, an attorney blocks the police. - And simultaneously, an investigator from the primary defense counsel's office,

contacts the witness. - To figure out what the police are asking. - The speed of that feedback loop is staggering.

- How did the defense apparatus know the police

had made contact so quickly? - The documents do not definitively identify the source of the leak in November 2005. - However, this sequence establishes a documented pattern. - It proves investigators were tracking police

witness contacts in real time. - They were actively intercepting police procedures as they happened. - And this real time interception moves directly into evidence removal.

- The files contain reporting from the telegraph. - Based on reviewed search warrants. - Detailing how private detectives were hired to physically remove equipment from Epstein's home. - The documents show this equipment was transport

β€œto secret storage units across the United States.”

- The logistical requirements of that operation are complex. - Moving sensitive hardware across state lines. - It requires coordinated transport. Secure leasing agreements. - A chain of custody managed by private operatives.

- Rather than law enforcement. - The physical state of the Palm Beach residents during the police search corroborates this. - The removal operation was highly targeted. - And executed prior to the search warrant.

- The police logs detail finding a completely blank computer in an office room. - A computer CPU with absolutely no discernible identifiers on it. - Position right next to an AV card. - With red, white, and yellow RCA checks.

- For anyone familiar with early 2000's tech, that hardware has one primary purpose. - To allow analog audio and video from external cameras to be captured. - And download directly onto a hard disk.

- But the physical evidence left behind indicates a hasty tear down. - The police report notes the ends of the RCA jacks were unattached. - Just lying loose.

β€œ- No external camera was located anywhere in the vicinity.”

- Furthermore, the desk held a flat panel LCD screen. - Alongside a second keyboard and a second mouse. - Which strongly indicates a two computer setup. - But no second computer was found in the room. - So the police walk in.

And they find cables from a monitor, keyboard, and mouse. - All clustered together in the exact spot where a second computer should be. - Completely scrubbed right before the authorities walked in. - It provides documented physical evidence

of pre-rate evidence sanitization. - The hardware necessary for capturing and storing surveillance footage was systematically dismantled. - And removed leaving behind disconnected cables and an orphaned blank CPU.

- But here is the critical institutional failure documented

in these files. - Despite the evidence of this removal. - And despite the telegraph reporting on the search warrants for these secret storage lockers. - U.S. authorities failed to execute search warrants

on those specific locations. - They allowed a massive documented evidentiary gap to remain completely unexamined. - When private investigators manage the physical relocation of potential evidence.

- And law enforcement declines to cross jurisdictional lines to secure it. - The evidentiary trail goes cold by design. - Now, this network of investigators was not just moving physical boxes in Florida.

- We have to expand our definition of an investigator to include digital operatives. - According to the 2010 emails released by the DOJ. - Epstein hired a dedicated IT team based in the Philippines. - Specifically to scrub his Wikipedia page.

- This represents a highly organized digital reputation laundering operation. - The released emails document a persistent, calculated edit war. - This offshore IT team systematically worked

to monitor and alter the public record. - Targeting the removal of specific words from his search results. - Namely pedophile and jail. - The DOJ releases include progress reports sent

back to the Epstein organization over a two-month period. - These reports indicated that these specific terms no longer appeared as top results. - It is a documented demonstration of public record manipulation.

- Utilizing an offshore team in the Philippines is a classic off-fuscation tactic. - It isolates the IP addresses from the principal entity. - Making the edits appear to originate from decentralized users. - Rather than a centralized coordinated campaign.

- It is corporate reputation management applied to a criminal record. - We have established the digital tracking and the physical removal of evidence. - But the operations on the ground in Florida were far more aggressive. - Looking at the Palm Beach police logs

regarding specific surveillance operations.

- We see a highly aggressive campaign of physical tracking.

- Directed at the families of the victims.

β€œ- We need to examine the documentation regarding the surveillance”

of the father of one of the primary victims. - The vehicle data recorded in the incident report provides the exact evidentiary details. - The victim's father reported to law enforcement that he was being aggressively followed.

- The document show the suspect vehicle was a green Chevy Monte Carlo. - Bearing Florida Tag, I-35 XGA. - And when the police ran that specific Florida Tag. - The records confirm it was registered directly to Zachary Bechard.

- The licensed private investigator employed by candor investigations. - Out of Jupiter, Florida.

- This establishes an undeniable, documented link.

- Between the physical surveillance and the specific firms identified in the police audit. - The tactics utilized on the public roads of Palm Beach County

β€œare explicitly detailed in the narrative.”

- And they go far beyond discrete observation. - The victim's father stated to the police that the green Chevy Monte Carlo was actively formed. - Running other vehicles off the road in an attempt not to lose sight of his vehicle.

- He reported this occurred repeatedly as he drove to and from work. - And as you ran daily errands throughout the county. - This is a documented report of vehicular endangerment. - Discrete surveillance is designed to be invisible to the subject.

- The tactics described here are the antithesis of discrete.

- This is overt tracking designed to be seen. - Designed to intimidate. - Executed with a reckless disregard for public safety. - A licensed private investigator is actively running a victim's family member off the road in ongoing traffic.

- The father reports the license plate to the police.

β€œ- The police confirm the plate belongs to the investigator.”

- Yet the police responds to this report is formally documented in the incident file. - And it is a point of significant analytical friction. - The responding officer explained to the father that because Epstein had recently retained new legal counsel.

- It was possible that these new private investigators were simply observing his daily activities as a matter of standard procedure. - That does not add up. - It does not.

- Standard legal observation does not typically involve running civilian vehicles off the road. - You cannot classify aggressive vehicular pursuit in public traffic as standard defense monitoring. - The legal and practical justification provided by the officer is severely strained. - The aggressive nature of the surveillance documented here exceeds all conventional boundaries.

It crosses the threshold from observation into active harassment. - And this aggressive posture extended directly to the victim's residences. - The files show investigators were positioned directly outside the victim's family home. - The father reported to the police that the investigator was not merely watching the house. - He was actively photographing the family members.

- And quoting the report directly, chasing visitors who come to the house. - The physical presence of an investigator outside a residence. - Coupled with photographing family members and intercepting visitors. - Is a calculated psychological tactic. - The objective is to create an environment of pervasive surveillance.

- It signals to the family that their privacy has been entirely compromised. - It is a siege tactic designed to isolate the witness. - And this isolation strategy escalated into direct contact with the victims themselves. - We must audit the timeline surrounding the spring break period of March 4 through March 12, 2006.

- According to the police logs, a victim was approached in Royal Palm Beach. - While she was home visiting during this break, she was personally contacted by a source who maintained direct contact with the Epstein organization. - The police report is specific regarding the identity of the emissary. - The person is identified as a 25-year-old white female.

- The use of a peer-aged individual to initiate contact is a documented tactic. - Use to lower the target's immediate defensive posture. - Allowing the emissary to deliver the message before law enforcement can be notified. - And the message delivered is recorded verbatim in the police files. - It is a documented threat paired with a simultaneous offer of financial compensation.

- The source assured the victims she would receive monetary compensation for her assistance in not cooperating with law enforcement. - The exact quote from the police report is, "Those who help him will be compensated and those who hurt him will be dealt with." - This statement represents the crystallization of the intimidation campaign.

- It is a binary proposition presented directly to a cooperating witness. - Except financial reward for silence, or face unspecified retribution for cooperation. - This is a blunt instrument of coercion documented in the official investigative record. - We must contrast this documented coercion with the formal defense correspondence generated during this exact same period.

- The DOJ releases include a letter from Attorney Alan Durshowitz. - Sent directly to Assistant State Attorney's Lana Bolalovic and Delia Weiss. - In this letter, Durshowitz was addressing specific allegations.

- Allegations that private investigators used by the defense were actively im...

- When interacting with witnesses.

β€œ- The defense deployed by Durshowitz in this written correspondence requires careful scrutiny.”

- Durshowitz' specific defense was that the private investigator used to interview victims possessed quite a distinct speech impediment. - The letter asserts that because of this impediment, the investigator did not claim to be. - Nor could he convincingly impersonate. - Law enforcement.

- The framing of this defense is highly irregular. - Relying on a physical characteristic to dismiss allegations of coercive behavior, ignores the substance of the victim's complaints. - This is inconsistent with the aggressive tactics the vehicular endangerment, and the explicit financial coercion reported by the victims.

- The defense framing of a misidentified investigator with a speech impediment

does not align with the documented threat.

- Those who help and will be compensated and those who hurt him will be dealt with. - You do not accidentally misinterpret a cash offer for silence as a speech impediment.

β€œ- The correspondence serves to compartmentalize and minimize the actions of the investigative network.”

- Presenting them as benign misunderstandings rather than a coordinated campaign of witness tampering. - Which brings us directly to the legal analysis of these actions. - Specifically examining the threshold between witness tampering and legal defense. - The statutory reality of these actions is established within the police report itself. - The detectives on the ground clearly recognize the legal framework for obstruction of justice.

- The report explicitly documents the detective informing the victim that tampering with a witness victim is an arrestable offense and very serious. Under Florida statute, witness tampering involves any attempt to influence delay or prevent testimony in an official proceeding. - The documented actions meet the criteria for investigation under these statutes.

- The officers recognize the severity of the offenses.

- However, the document show exactly why these intimidation charges were never pursued.

- It points to a massive structural failure. - The victim was reluctant to proceed with the witness tampering charges due to a severe

β€œdocumented breach of investigative confidentiality.”

- According to the sworn statements, the victim was concerned because specific, highly confidential things she had told the detective in private. - We're repeated back to her by the defense attorney, Bill. - This is a critical juncture in the forensic audit. - When a defense attorney is able to quote confidential police statements back to a cooperating witness.

- It indicates a documented leak of sensitive law enforcement reports directly to the defense apparatus. - This is a mechanical failure of the investigative process. - It completely compromised the security of the cooperating witnesses. - And demonstrated that the defense network had access to the

innermost workings of the police investigation. - This documented leak points to broader institutional complicity. - Which becomes undeniably evident when we trace the timeline of the grand jury proceedings. - The police, despite the leaks in the intimidation, were still attempting to move the case forward. - The investigative logs detail how detectives repeatedly attempted to schedule the grand jury

testimony. - For the victims, they had secured. - The timeline of these attempts is meticulously documented. - On April 13 and April 14th, 2006, police attempted contact on several occasions with assistant state attorneys, Weiss, and Bolalovic.

- The detectives left multiple voicemails, trying to lock in the dates. - The following Monday, April 17th between 9-1 AM and 1130 AM. - The lead detective again left multiple urgent messages for the assistant state attorneys. - They received absolutely no response regarding the time and date of the grand jury. - The avoidance documented in these logs is systemic.

- Law enforcement officers require coordination with the prosecuting attorneys to prepare victims for grand jury testimony. - The sustained lack of response indicates a deliberate cessation of communication by the state attorney's office. - At 1230 PM on that same day, April 17th, the detective realized phone calls were not going

to work. - He physically drove to the state attorney's office. - And located assistant state attorney Weiss and assistant state attorney Bolovic directly in their offices. - The confrontation is detailed in the files. - The documents show ASA Bolovic stated she was just about to return the call. - And then she revealed a massive piece of information.

- Ideal had been offered to the defense attorneys. - But she flatly refused to provide the detective with any details of the deal. - She instructed the lead investigator to just wait. - This interaction illustrates the total disconnect between the investigating detectives and the prosecuting authority.

- The prosecutors had entered into negotiations with the defense without informing the primary investigators. - Sidelining the police department from their own investigation. - And the cancellation followed rapidly. - The documents show that on that same day, April 17th, 2006, and approximately 4.30 PM.

- State attorney investigator Tim Valentine officially notified the police of the total cancelation

Of the grand jury.

who had already been served their subpoenas.

β€œ- To notify them that the process was canceled.”

- The procedural mechanics of this cancellation are crucial.

- The lead detective advised Valentine that since the grand jury session was called, based specifically on state attorney Barry Krishar's decision. - The state attorney's office should be the one's responsible for calling the victims. - This sequence represents a documented concealment of the investigative process. - It was an abrupt, calculated determination of the prosecutorial momentum.

- Designed specifically to shield the defense from the exposure of a grand jury inquiry. - The cancellation of the grand jury marks the point where the institutional apparatus officially capitulated to the defense strategy. - The physical surveillance, the intimidation tactics, the digital scrubbing, and the documented leaks. - culminated in the state attorney's office neutralizing their own prosecutorial mandate.

- This brings up a massive question regarding the timeline of these operations. - We know the breadth of this surveillance in 2005 and 2006. - We know about the digital operations in 2010.

β€œ- But did this highly funded surveillance apparatus continue after Epstein died in August 2019?”

- Based strictly on the files provided for this audit, we do not have documentation for that. - Maintaining strict adherence to the evidentiary record. - The chronological evidence of physical surveillance, such as candor investigations and Carolean Riley, is definitively documented within the 2005-2006 window.

- The digital reputation laundering operation, utilizing the IP team in the Philippines, is definitively documented in the 2010 communications. - All of this verified activity predates his death. - There are no documents in this specific trunch, proving that active surveillance operations continued post-August 2019.

- It is essential to draw a hard line between the verified historical operations

and unverified contemporary claims. - While the infrastructure for such operations clearly existed, - The documents under review do not substantiate post-death continuation,

β€œwhich leads us to another frequent public comparison, Harvey Weinstein.”

- Given the similarities in high-wealth defense tactics, we must examine the files for overlapping corporate eskianage operations. - Or shared private intelligence networks between the two cases. - Again, we do not have documentation for that. - The provided files contain absolutely zero references to Harvey Weinstein.

- There is no evidentiary link in this specific document set, connecting the two individuals through these investigative firms. - Our forensic audit must remain entirely focused on the documented facts of the Palm Beach Police Investigation. - We will now synthesize the entirety of the evidence we have audited today.

- The documents prove the existence of a highly organized, well-funded campaign of physical surveillance and intimidation. - Directed specifically at minors and their families. - The Palm Beach Police Logs definitively proved the deployment of specific, licensed Florida-based firms.

- Damely, candor investigations and Curly and Riley. - The record proves multiple instances of vehicular endangerment on public roads. - The aggressive physical surveillance of family homes. - And the delivery of explicit threats, offering financial compensation for silence and retribution for cooperation.

- Furthermore, the DOJ releases prove the execution of a sustained digital reputation laundering operation. - Utilizing offshore IT teams to manipulate public records. - But crucially, the documents prove systemic institutional complicity. - Evidence by the documented leak of highly confidential police statements directly back to defense attorneys.

- An act which successfully discouraged a victim from pursuing witness tampering charges. - It is further evidenced by the coordinated avoidance of lead police detectives by assistant state attorneys. - This bureaucratic stonewalling culminated in the abrupt cancellation of the grand jury by state attorney Barry Krischer on April 17, 2006. - Immediately following the formulation of concealed, undisclosed deal with the defense apparatus.

- Conversely, we must be absolutely clear about what remains unproven within these specific files. - The documents in this review do not prove the involvement of the international intelligence firms, black cube or crow. - They do not prove that post-death surveillance operations continued after August 2019. - And they do not establish any evidentiary link to Harvey Weinstein's legal defense tactics. - The scale of the surveillance apparatus,

as strictly documented in these files, was severe, highly localized, and deeply integrated into the Florida legal ecosystem. - The evidentiary trail confirms the deployment of candor investigations and operatives associated with the law office of Roy Black.

- To directly intercept monitor and ultimately neutralize police procedures.

- When you review a record like this, it forces a larger perspective. - We have tracked the exact mechanics of how a localized justice system was systematically dismantled. - By private capital, licensed operatives, and institutional compliance. - It leaves you wondering exactly how many other high-net-worth individuals employ these exact

Same extra legal intimidation tactics.

without ever generating a police report, without ever leaving a document trail,

β€œand without ever getting caught. - Next time, file 112, the grand jury transcripts,”

Florida prosecutors don't want you to read.

- You have just heard an analysis of the official record.

β€œEvery claim name and date mentioned in this episode is backed by primary source documents.”

You can view the original files for yourself at EpsteinFiles.fm.

If you value this data first approach to journalism,

β€œplease leave a five-star review wherever you're listening right now.”

It helps keep this investigation visible. We'll see you in the next file.

Compare and Explore