Podcasts > The Diary Of A CEO with Steven Bartlett > Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!

Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!

By Steven Bartlett

In this episode of The Diary Of A CEO, security expert Gavin de Becker discusses high-profile cases involving surveillance and intelligence operations. De Becker explains his work in the Jeff Bezos-National Enquirer situation, revealing how the Saudi government used advanced technology to hack Bezos' phone following the Washington Post's coverage of journalist Jamal Khashoggi's murder.

De Becker also shares insights about Jeffrey Epstein's connections to intelligence services and the implications of his 2008 plea deal. The conversation covers the vulnerabilities in modern digital communications, including how technologies like Pegasus 3 can control phones without user knowledge, and examines how the rise of AI-generated content may affect how people value authentic human experiences.

Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!

This is a preview of the Shortform summary of the Mar 1, 2026 episode of the The Diary Of A CEO with Steven Bartlett

Sign up for Shortform to access the whole episode summary along with additional materials like counterarguments and context.

Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!

1-Page Summary

Gavin De Becker's Experiences With Influential People

Gavin de Becker, a renowned security expert, provides comprehensive protection services for high-profile individuals, including protection against assassination attempts, crimes, and reputational threats. While maintaining strict client confidentiality, de Becker's work with certain public figures like Jeff Bezos has become known through external sources.

The Bezos-Enquirer Situation

In a notable case involving Jeff Bezos, de Becker revealed that the Saudi government used advanced surveillance technology called Pegasus 3 to hack Bezos' phone. This incident was connected to the Washington Post's criticism of Prince Mohammed bin Salman following journalist Jamal Khashoggi's murder. De Becker refused to comply with the National Enquirer's unusual demand to deny any political or Saudi involvement in their pursuit of Bezos, leading to Bezos eventually exposing the attempted blackmail.

Surveillance, Transparency, and Intelligence Operations

De Becker discusses the complex case of Jeffrey Epstein, suggesting that senior U.S. government officials know more than they're revealing. He points to Epstein's unusual 2008 plea deal and connections to Ghislaine Maxwell's father, an Israeli intelligence asset, to support his theory that Epstein's operations were likely a blackmail scheme benefiting at least one government's intelligence services.

Privacy, Security, and Truth Challenges

De Becker warns about the vulnerability of digital communications, explaining that technologies like Pegasus 3 can control phones without user knowledge. Regarding artificial intelligence's growing presence online, de Becker suggests that while AI-generated content may make it harder to distinguish what's real, this challenge might lead people to better appreciate authentic human experiences like physical touch, nature, and genuine connections.

1-Page Summary

Additional Materials

Actionables

  • Enhance your digital privacy by using encrypted communication apps for sensitive conversations. Given the vulnerability of digital communications to surveillance technologies, opt for apps like Signal or Telegram that offer end-to-end encryption to protect your messages from being intercepted. This way, you can communicate with peace of mind, knowing that your private conversations are much harder for third parties to access.
  • Foster genuine connections by organizing a 'digital detox' day with friends or family. In light of the challenge of distinguishing AI-generated content and the appreciation for authentic human experiences, set aside a day where you and your loved ones agree to put away electronic devices. Spend the day engaging in activities that promote physical presence, like hiking, playing board games, or sharing stories face-to-face, to strengthen your relationships and enjoy the nuances of human interaction.
  • Educate yourself on the signs of phishing and social engineering attacks to protect your online identity. With the increasing sophistication of hacking tools like Pegasus 3, it's crucial to be vigilant about the security of your personal information. Learn how to recognize suspicious emails, messages, and phone calls that may be attempts to gain access to your devices or personal data. Share this knowledge with your network to create a community that's more resistant to these types of security threats.

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!

Gavin De Becker's Experiences With Influential People

Gavin de Becker, an expert in security and personal protection, has shared some insights into his work with influential individuals, particularly his role in managing threats and his involvement in the high-profile case with Jeff Bezos and the National Enquirer.

Gavin's Role in High-Profile Anti-Assassination and Threat Management

Gavin's Company Protects Clients From Assassination, Crimes, Reputational Threats, Anxiety, and Fear

De Becker's company specializes in a range of protection strategies that include anti-assassination, crime prevention, protection of reputation, and alleviation of threats causing anxiety and fear. They provide comprehensive security solutions that encompass threat assessment, management, physical protective coverage, armored vehicles, and making security modifications to clients' homes.

Gavin Works With Celebrities, Officials, Leaders, and Royalty, but Never Discloses Their Identities

De Becker adheres to strict confidentiality and never discloses the identities of his clients. This discretion extends to the point where he will not even acknowledge if someone is not a client, as it could inadvertently reveal information about those he serves. However, notable figures like Jeff Bezos, Elizabeth Taylor, Cher, Madonna, and Barbra Streisand have been linked to de Becker through various means, outside of any direct disclosure from him or his firm.

Gavin's Role in the Bezos-Enquirer Situation

Bezos' Phone Hacked by Saudi Government Using Advanced Surveillance Technology

In the case where Jeff Bezos granted permission to speak, de Becker revealed that the Saudi government, specifically Prince Mohammed bin Salman (MBS), used advanced surveillance technology, Pegasus 3, to hack Bezos' phone. His team's goal was to uncover how the hacking incident occurred and manage the fallout. This revelation aligns with assertions from United Nations investigations and other public disclosures.

Gavin Refused to Deny Political Motives or Outside Influence In National Enquirer Blackmail Attempt

De Becker further ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Gavin De Becker's Experiences With Influential People

Additional Materials

Clarifications

  • Gavin de Becker is a renowned security specialist known for his expertise in threat assessment and personal protection. He founded the company Gavin de Becker & Associates, which advises high-profile clients on safety and risk management. De Becker authored the influential book "The Gift of Fear," which emphasizes intuition in recognizing danger. His work has shaped modern approaches to security for celebrities, politicians, and corporate leaders.
  • Anti-assassination measures involve identifying and neutralizing threats before they can harm the client. This includes detailed risk assessments, surveillance detection, and securing environments to prevent attacks. Protective teams may use tactics like route planning, secure transportation, and close personal protection. Technology such as electronic countermeasures and secure communication devices are also employed.
  • The National Enquirer is a tabloid known for sensational stories and celebrity gossip. It has a history of using controversial tactics, including paying for exclusive stories and sometimes engaging in blackmail or coercion. Its influence stems from wide circulation and the ability to impact public perception of high-profile individuals. In blackmail attempts, it may threaten to publish damaging information unless demands are met.
  • Pegasus 3 is a sophisticated spyware developed by the NSO Group, designed to infiltrate smartphones without user knowledge. It can access messages, calls, emails, camera, microphone, and location data remotely. The software exploits security vulnerabilities to install itself silently, often through malicious links or zero-click attacks. Pegasus is primarily used by governments for surveillance on targets of interest.
  • Jeff Bezos owns The Washington Post, which has published critical reports on Saudi Arabia's government. These reports intensified after the 2018 murder of journalist Jamal Khashoggi, a Post contributor, allegedly ordered by Saudi officials. The Saudi government viewed Bezos and the newspaper as adversaries due to this coverage. This strained relationship likely motivated Saudi attempts to access Bezos' communications.
  • Jamal Khashoggi was a Saudi journalist critical of the Saudi government. He was murdered inside the Saudi consulate in Istanbul in 2018. His death sparked international outrage and strained Saudi Arabia's relations with many countries. The incident highlighted concerns about human rights abuses and government repression.
  • Prince Mohammed bin Salman (MBS) is the Crown Prince and de facto ruler of Saudi Arabia. He holds significant power over the country's political, economic, and military decisions. MBS is known for his Vision 2030 plan to diversify Saudi Arabia's economy away from oil dependence. He has been internationally criticized for human rights abuses and the killing of journalist Jamal Khashoggi.
  • The Saudi S ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!

Gavin's Theories on Surveillance, Transparency, and Intelligence Operations

Gavin de Becker delves into his theories surrounding U.S. government secrecy and the intelligence ties of Jeffrey Epstein, suggesting that senior government officials are very much aware of the undisclosed activities and are deliberately evasive about transparency.

Gavin's View on Us Government Surveillance and Secrecy

De Becker questions the U.S. government’s reluctance to transparently discuss Jeffrey Epstein’s case, suspected to cover up national security implications. He asserts that high-level officials are privy to all aspects of Epstein's situation but choose to focus on how much information they can keep from the public, rather than how to inform them.

Gavin Asserts Senior Officials Know the Truth About Epstein's Intelligence Ties and Government's Transparency Reluctance

Specifically, he suggests that Epstein’s operations were likely a form of blackmail benefiting at least one government and infers that officials are aware of his intelligence connections. De Becker compares the potential revelation to how people might react to undisputed UFO existence, contemplating whether the public would accept the truth about an ally’s intelligence operations on U.S. soil.

Gavin Suspects Epstein's Activities Were a Blackmail Operation Benefiting Israel

Building on that, de Becker brings up Ghislaine Maxwell's father as an Israeli intelligence asset, noting the notable attendees of his funeral. He points out a "lot of good connective tissue" implying intelligence ties. De Becker reiterates his belief that senior U.S. officials know everything about Epstein that has been discussed.

Gavin's Perspective on the Government's Epstein Case Plea Deal

De Becker scrutinizes Epstein’s 2008 plea deal and suggests that Epstein was not truly a billionaire, but rather his wealth was part of a "construct."

Gavin Claims Prosecutor Was Told Epstein "Belonged To Intelligence" When Given Lenient Plea Deal

Citing an unusual flow of money from Les Wexner to Epstein, de Becker implies ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Gavin's Theories on Surveillance, Transparency, and Intelligence Operations

Additional Materials

Counterarguments

  • The extent of government officials' knowledge about Epstein's activities is not publicly confirmed, and de Becker's assertions may be speculative without concrete evidence.
  • The reluctance to discuss Epstein's case transparently could be due to ongoing investigations or legal considerations rather than an intentional cover-up.
  • The idea that Epstein's operations functioned as a blackmail scheme is a theory that requires more evidence for substantiation.
  • Comparing the public's potential reaction to Epstein's intelligence ties with reactions to UFO existence may not be a fair analogy, as they involve different domains of secrecy and public interest.
  • The connections between Ghislaine Maxwell's father and intelligence operations do not necessarily implicate Epstein or Maxwell in intelligence activities without direct evidence.
  • The claim that Epstein's wealth was a constructed facade is a serious accusation that would need substantial evidence to be considered credible.
  • The unusual financial flows from Les Wexner to Epstein could have explanations unrelated to intelligence operations.
  • The exem ...

Actionables

  • You can enhance your critical thinking by analyzing news stories for potential underlying agendas. When you read an article or watch a news report, take a moment to consider who might benefit from the information being presented and why certain details might be emphasized or omitted. This practice can help you develop a more nuanced understanding of how information is curated and presented to the public.
  • Develop a habit of researching the background of high-profile legal cases to better understand the complexities involved. For instance, when you hear about a case like Epstein's, go beyond the headlines and look into the legal documents, the history of the involved parties, and the broader social and political context. This can give you a deeper insight into how legal decisions may be influenced by factors not immediately apparent.
  • Encourage informed discus ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
Top CIA Security Advisor: Jeffrey Epstein Epstein Was A Made Up Person & They Can See Your Messages!

Privacy, Security, and Truth Challenges in the Digital Age

In a discussion with Gavin de Becker, he warns of the vulnerabilities inherent in digital communications, alongside the potential for artificial intelligence to reshape our perceptions of reality.

Gavin's Warning About Vulnerability and Lack of Reliable Confidentiality in Digital Communications

Gavin de Becker points out the significant risks that come with digital communications, suggesting there is no foolproof way to maintain confidentiality due to the advanced nature of surveillance technologies.

Advanced Surveillance: Pegasus Controls Phones Unknowingly

De Becker indicates that technologies like the Pegasus 3 surveillance system enable remote access to mobile devices without user action, often referred to as a no-click exploit. The Saudi Arabian government reportedly obtained Pegasus 3, which can activate a phone's camera and microphone from afar, even if the phone is turned off. De Becker illustrates the depth of advancement in surveillance with a reference to a mechanical dragonfly seen at the CIA museum, created in 1967 with capabilities that mirror today's AI technology.

Gavin Argues No Foolproof Digital Communication Privacy Exists Due to Constant New Exploits

De Becker believes people should be more cautious with digital communication, as privacy is constantly being compromised with new exploits. He states that no true protection exists if a government targets an individual and posits that any security updates or solutions are only temporary safeguards against the continual development of new surveillance techniques.

Gavin's Take On AI Content and "Dead Internet" Theory

De Becker shares his perspective on the proliferation of AI-generated content and its implications for our perception of truth and authenticity in the digital age.

AI Content's Rise and Human Likeness May Positively Prompt Reality Re-evaluation, Gavin Believes

Bartlett discusses the "dead internet theory," which suggests an impending era where AI will create much of the online content, potentially engendering a reality where it becomes increasingly difficult to discern authentic from ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Privacy, Security, and Truth Challenges in the Digital Age

Additional Materials

Clarifications

  • Gavin de Becker is a security expert known for advising high-profile individuals and organizations on personal safety and threat assessment. He authored the bestselling book "The Gift of Fear," which emphasizes trusting intuition to prevent violence. His expertise in security and threat management lends credibility to his warnings about digital vulnerabilities. His opinions matter because he has decades of experience analyzing and mitigating risks in personal and digital security.
  • Pegasus 3 is a sophisticated spyware developed by the NSO Group that infiltrates smartphones to extract data and monitor activity. It exploits software vulnerabilities to install itself without user interaction, often through no-click exploits. Once installed, it can access messages, calls, emails, and activate cameras and microphones covertly. Its use is typically targeted at high-profile individuals for surveillance purposes.
  • A "no-click exploit" is a hacking method that allows attackers to access a device without the user needing to click on a link or take any action. It exploits vulnerabilities in software to silently install spyware or malware. This makes detection and prevention much harder because there are no obvious signs of intrusion. Such exploits are highly valuable for covert surveillance by governments or hackers.
  • The 1967 mechanical dragonfly was an early example of micro-robotics designed for covert surveillance, demonstrating how long intelligence agencies have pursued miniature spying devices. Its inclusion highlights the continuity and evolution of surveillance technology from simple mechanical devices to today's AI-driven tools. This historical artifact shows that the concept of discreet, remote monitoring has been a goal for decades, now enhanced by AI capabilities. It underscores that modern AI surveillance is part of a long-standing trajectory of increasingly sophisticated spying methods.
  • The "dead internet theory" claims that most online content is generated by AI or bots rather than humans. It suggests genuine human activity online has drastically declined, making the internet feel artificial or "dead." This theory raises concerns about misinformation, manipulation, and loss of authentic human interaction. It challenges users to critically assess the origin and trustworthiness of digital content.
  • AI-generated content is created by algorithms that analyze vast amounts of data to produce text, images, or videos mimicking human style. Unlike humans, AI lacks personal experiences, emotions, and consciousness, so its output is based solely on patterns learne ...

Counterarguments

  • While digital communications have vulnerabilities, advancements in encryption and privacy-focused technologies offer robust protections that can mitigate many surveillance threats.
  • Not all governments have access to or use tools like Pegasus 3, and there are legal and ethical constraints that prevent the use of such technologies in many democratic societies.
  • The comparison between a 1967 mechanical dragonfly and modern AI may be misleading, as the capabilities and complexities of modern AI surveillance are significantly more advanced and nuanced.
  • The assertion that no true digital communication privacy exists may be overly pessimistic, as there are instances where privacy measures have successfully protected users from surveillance.
  • The "dead internet theory" is speculative and not universally accepted; the internet continues to be a vibrant space with a significant amount of human-generated content.
  • AI-generated content can be labeled and regulated to ensure transparency and maintain the ability to distinguish between human and AI-generated materials.
  • Skepticism toward digital content does not necessarily ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free

Create Summaries for anything on the web

Download the Shortform Chrome extension for your browser

Shortform Extension CTA