The Epstein Files
Episode: JUST IN: Who Is Palm Beach Pete?
Host: Island Investigation
Date: March 25, 2026
Episode Overview
This episode delves into the viral "Palm Beach Pete" incident—where an ordinary man, mistaken for Jeffrey Epstein, inadvertently exposes the ongoing opacity around Epstein’s Palm Beach social world. Leveraging primary sources from recently unsealed documents, flight logs, and FBI files, the hosts use this event as an entry point to examine the "invisible scaffolding" of high society that shielded Epstein's operations for decades. The episode interrogates missing records, social camouflage, systemic blind spots, and the elite’s collective failure—or refusal—to police itself.
Major Themes & Discussion Points
1. The Viral “Palm Beach Pete” Incident
(00:31 – 04:44)
- In March 2026, a viral video shows a Palm Beach man mobbed by bystanders shouting “Epstein is alive.”
- The man is identified as Peter Simel, a retired managing director of Colliers International.
- Simel, attempting to clear his name, publicly admits to attending parties where Epstein was present—though he claims never to have spoken with him.
- Key Insight: “His denial contained an admission that opens a much bigger story.” (B, 00:48)
- Memorable Quote:
“Peter Simel is not accused of any crimes. He is a peripheral figure... yet by his own admission, he was standing in those exact rooms.”
—B, 04:19
2. Background Players: The “Social Camouflage”
(04:44 – 07:35)
- Discussion on how peripheral, “respectable” attendees provided cover, allowing trafficking to hide in plain sight.
- The presence of people like Simel shows the operation’s need for normalization—parties required a crowd, not just key perpetrators.
- Key Insight: “A social circuit requires a baseline of attendees to make it function as a normal high society ecosystem.” (C, 05:08)
3. Absence from Digital Footprints
(05:38 – 07:35)
- Simel’s name doesn’t appear anywhere in digitized official records (IFTHA corpus), despite his own account.
- Raises questions: Is this a data collection failure, or were some attendees’ names deliberately omitted to protect privacy?
- “Even the plus ones are vetted... If a man admits to being in the room and the federal evidence database has zero record of him...the database is incomplete.”
—C, 06:41
4. Shifting to Witness Accounts: The Physical Reality
(07:35 – 13:22)
- The limits of digital records necessitate reliance on human memory and witness testimony.
- Cites an FBI intake report (Oct 2020, referencing events from Christmas 2000) in which a witness describes entering a Palm Beach party through the back entrance and being recruited under the cover of “model scouting.”
- Lisa Villeneuve is named as an intermediary; Bobby Cox introduces himself as a “model scout,” but is outed as a “pimp.”
- Notable Dialogue:
“Model Scout, that is not a random choice of profession...The modeling industry was the primary camouflage for the trafficking operation.”
—C, 09:59
5. Compartmentalization of Events & Social Camouflage
(12:16 – 13:22)
- Two classes of guests:
- “Front door” guests (the Simels): Provided social legitimacy
- “Back entrance” guests (the recruits/handlers): Funneled out of public view
- “Two completely different parties happening under the exact same roof.” (B, 12:21)
6. Glaring Holes in the Official Record
(13:45 – 15:33)
- Witness notes Lisa Villeneuve later changes her name to “Ghislaine”—suggesting psychological/social alignment with Ghislaine Maxwell.
- The FBI intake report is abruptly cut off—mid-sentence—just before potentially revealing who was in the main house in 2000.
- “The actual roster of people inside that house around Christmas 2000 is in that missing paragraph.” (C, 15:06)
7. The Network’s Enduring Social Access Post-Conviction
(15:50 – 18:44)
- Despite Epstein’s 2008 conviction and sex offender registration, documents show he remained tightly woven into the charity/elite social circuit.
- Eva Dubin (wife of billionaire Glenn Dubin) continues social and email correspondence, inviting Epstein to galas—even years after his conviction.
- Key Quote:
“The social infrastructure was entirely maintained. He was still connected to the grid.”
—B, 18:44
8. Transactional Nature vs. Blackmail
(18:53 – 20:50)
- Debate: Did associates maintain ties out of fear (blackmail) or willful self-interest?
- “It is a process of social money laundering... It is a different mechanism than being blackmailed. It is almost more insidious because it is so banal.” (C, 20:24)
- “The elite immune system didn’t fail because it was hacked. It failed because it was bought.” (B, 20:45)
9. Logistics, Gatekeepers, and Missing Evidence
(21:06 – 27:31)
- Focus shifts to the logistical machinery: planners, publicists (e.g., Peggy Siegel), elite event planners (David Maughan), executive assistants.
- Critical missing evidence: advanced seating charts and guest lists—attachments in emails gone or redacted.
- “We have the cover email saying, here is the seating chart, but the chart itself is gone.” (B, 24:30)
- Epstein wasn’t merely a guest—he was part of the planning, dictating proximity to key figures.
- Key Quote:
“He was not a ghost haunting these galas. He was a co architect of the social space.”
—C, 26:59
10. Systemic Obfuscation and Unanswered Questions
(27:43 – 30:44)
- The most vital information (attendees, background players) remains missing from federal releases.
- Recap of key missing pieces: Bobby Cox’s identity, Villeneuve’s network, truncated FBI report, unredacted seating charts.
- “That is the central thesis of our investigation. ...The vast majority of people who occupied those rooms...have never been named.” (C, 28:34)
Notable Quotes & Moments
-
On the architecture of social camouflage:
“You need regular wealthy people clinking champagne glasses to make the house look like just another stop on the Palm Beach charity circuit.”
—B, 05:28 -
On compartmentalization:
“You have the Peter Simels of the world coming through the front door...providing the respectable camouflage. And you have the Bobby Coxes coming through the service gate. Two completely different parties happening under the exact same roof.”
—B, 12:21 -
On documentary gaps:
“The blank registry doesn’t mean no one attended. It proves someone walked away with the names.”
—B, 07:02 -
On missing evidence and government responsibility:
“Either way, the public is walled off from knowing who was in the room. The perimeter remains unmapped.”
—C, 15:34 -
On the elite’s immune system:
“If a convicted operator of an international trafficking ring was able to maintain this level of sophisticated logistics, heavy social access...for a decade after becoming a registered sex offender...then the social immune system of the elite class is completely broken.”
—C, 31:07
Important Timestamps
- 00:31–04:44: Introduction to Palm Beach Pete and Peter Simel’s crucial admission
- 05:08–07:35: The need for social camouflage—legitimizing the operation via background guests
- 09:19–13:22: Dissection of witness testimony about recruitment, model scouts, and physical party logistics
- 13:49–15:33: The truncated FBI witness report
- 15:51–18:44: Social world after 2008—Epstein’s continuing access
- 18:50–20:50: Complicity: Transactional greed vs. blackmail
- 21:06–27:31: Guest lists, seating charts, publicists, and missing attachments
- 27:43–30:44: Missing evidence and systemic problems
- 31:07–End: The episode’s central question—how the architecture of silence still stands
Conclusions & Final Insights
-
Key Verified Facts:
- FBI witness confirms open recruitment at Epstein’s Palm Beach parties (2000).
- Eva Dubin and other elites maintained ties post-conviction, with clear documentation.
- Email correspondence confirms advanced logistical involvement by Epstein even into 2018.
-
Key Open Questions:
- The real reach and identity of unseen background players (e.g., Bobby Cox, Lisa Villeneuve).
- The nature and intentionality behind missing guest lists and seating charts.
- How deliberate the obfuscation of social records truly was, and who benefitted.
-
Central Thesis:
The Epstein network thrived not just due to powerful individuals, but also because a vast, unremarked social infrastructure provided both camouflage and protection. Much of this infrastructure remains unmapped in the public record due to missing or redacted evidence. -
Final Thought:
“If a man with his established public criminal record could command that kind of access and protection, what other high society infrastructures are operating right in front of us under the exact same code of silence?” (B, 31:15)
All sources and documents referenced are available at epsteinfiles.fm.
