Top CIA Security Advisor: Jeffrey Epstein Was A Made-Up Person & They Can See Your Messages!

Gavin de Becker, security expert to world leaders and celebrities, reveals insider knowledge on the Epstein case, stating all senior US government officials know the truth: Epstein operated as an Israeli intelligence asset running a blackmail operation. De Becker emphasizes a crucial security truth:

March 2, 2026 1h 44m
Diary of a CEO

Key Takeaway

Gavin de Becker, security expert to world leaders and celebrities, reveals insider knowledge on the Epstein case, stating all senior US government officials know the truth: Epstein operated as an Israeli intelligence asset running a blackmail operation. De Becker emphasizes a crucial security truth: there is no reliable protection for phone privacy—governments can access everything. His advice: assume no privacy exists and behave accordingly in all digital communications.

Episode Overview

Gavin de Becker, one of the world's leading security experts who has protected celebrities, world leaders, and billionaires, discusses the Epstein case and digital security vulnerabilities. He explains his work in protective coverage and anti-assassination strategies, detailing how he helped Jeff Bezos uncover Saudi hacking using Pegasus 3 spyware. De Becker presents evidence that Jeffrey Epstein operated as an Israeli intelligence asset running a sexual blackmail operation, with cameras and audio recording high-profile visitors. He warns that no phone communication is truly private and shares insights on how power centers operate through deception and leverage.

Key Insights

Absolute Phone Vulnerability

There is no reliable protection for the confidentiality of your phone communications. Even when Apple releases security updates, thousands of people immediately work on new exploits. Governments with access to tools like Pegasus 3 can remotely access your phone without any click, turning on cameras and microphones even when the device is off.

Epstein as Intelligence Construct

Jeffrey Epstein was a created construct—not actually a billionaire, but funded with $500 million from Les Wexner with unusual power of attorney. Evidence suggests he operated as an Israeli intelligence asset, with his apartment and island equipped with hidden cameras and audio to record high-profile visitors in compromising situations.

Sophisticated Blackmail Strategy

Effective blackmail doesn't involve threats. Instead, the blackmailer positions themselves as a rescuer—informing the target that someone else has compromising material and offering to 'handle it.' This creates permanent leverage without appearing as the antagonist, making the victim feel grateful and indebted.

Government Information Control

When de Becker worked in government, meetings focused not on 'how shall we tell the public' but 'what shall we tell the public.' All power centers in human history lie. The best we can achieve in our skepticism is knowing we are not being told the truth—examples include asbestos, opioids, and various cover-ups that took years to emerge.

Behavioral Privacy Solution

Since technical privacy doesn't exist, one client copies his executive assistant on every text and email. Knowing someone else sees everything controls behavior—he won't forward inappropriate jokes or write anything he wouldn't want seen publicly. This awareness-based approach is more effective than technical solutions.

Notable Quotes

"There is absolutely no protection viable for the confidentiality of your phone if a government wants you."

— Gavin de Becker

"We're all not as careful as we could be in terms of what we say, what we text. And the best we can all do is be watchful what we say and have no pretense of privacy or confidentiality because it simply does not exist. Period."

— Gavin de Becker

"All power centers in human history lie. When I was working in government, meetings were not how shall we tell the public, but what shall we tell the public."

— Gavin de Becker

"I would say all senior people in the US government and many people in general know everything that you and I have discussed here today."

— Gavin de Becker

"Jeffrey Epstein was not a billionaire. He was a created construct. Money, wealth, private jet, private island, fun, not married, young girls—he was a construct."

— Gavin de Becker

Action Items

  • 1
    Assume Zero Digital Privacy

    Operate under the assumption that all your phone calls, texts, and emails can be accessed by governments or sophisticated actors. Don't send anything you wouldn't want publicly revealed. Adjust your communication behavior accordingly rather than relying on technical security solutions.

  • 2
    Implement Transparency Accountability

    Copy a trusted person (assistant, partner, colleague) on your communications. Knowing someone else sees your messages naturally controls behavior and prevents you from sending inappropriate content. This behavioral solution is more reliable than technical privacy tools.

  • 3
    Question Official Narratives

    When researching controversial topics, ask AI tools to 'make the best case for' alternative explanations rather than accepting the first (official) answer. Recognize that initial responses typically reflect establishment narratives, and probe deeper for pattern-based evidence.

  • 4
    Protect Yourself from Leverage

    Be extremely cautious about situations that could create compromising material—unusual invitations from wealthy strangers, scenarios involving privacy with unknown individuals, or circumstances that seem too good to be true. Recognize that blackmail operations often position perpetrators as helpers or rescuers.

  1. Podcasts
  2. Browse
  3. Top CIA Security Advisor: Jeffrey Epstein Was A Made-Up Person & They Can See Your Messages!