We can't find the internet
Attempting to reconnect
Something went wrong!
Attempting to reconnect
The Diary Of A CEO · 82.8K views · 1.8K likes Short
Analysis Summary
Ask yourself: “What would I have to already believe for this argument to make sense?”
Worth Noting
Positive elements
- This video provides a helpful explanation of how metadata and third-party mentions can lead to names appearing in legal discovery files without direct involvement.
Be Aware
Cautionary elements
- The use of 'inside information' as a rhetorical shield allows the speaker to hint at conspiracies (intelligence operations) without the burden of proof.
Influence Dimensions
How are these scored?About this analysis
Knowing about these techniques makes them visible, not powerless. The ones that work best on you are the ones that match beliefs you already hold.
This analysis is a tool for your own thinking — what you do with it is up to you.
Related content covering similar topics.
JEFFREY EPSTEIN WAS A CONSTRUCT?
The Diary Of A CEO
JEFFREY EPSTEIN WAS A MADE UP PERSON?
The Diary Of A CEO
Dave Smith | Pam Bondi Strikes Again | Part Of The Problem 1361
Dave Smith
Transcript
I learned today, for example, that I'm in the Epstein files. >> Oh, really? >> And here's the way I'm in there. >> Three million documents and many of them are emails that people have sent at different times. Some of the most famous people in the world have sent emails to Epstein and now those are all out there in the public to see. >> Some of it I I don't talk about because I have a fair amount of inside information and I'm just watchful about not getting near the line. But >> what do you mean by inside information? I mean information that that I might have gotten from government agencies that are clients or that I might have gotten because clients were uh were implicated. Like I learned today, for example, this morning on the way over here that I'm in the Epstein files. >> Oh, really? >> And here's the way I'm in there is that someone sent Epstein an article that I wrote called Fooling Ourselves into War. They sent that to Epstein. So that's an example of being in the Epstein files and yet obviously never having met Epstein. But I won't be the first guest, Stephen, that you've had uh that says that um it was an intelligence operation. Why the US government is reluctant to be more uh transparent? Some of it is national security. Some of it is, let's imagine an ally of ours uh is involved in in that operation. So there's a reluctance and there's a question, could the public handle it? Could we handle it? Could the US public handle it? My take personally, absolutely
Video description
Gavin de Becker explains that the files contain millions of documents, including emails sent to Epstein by third parties. He says someone’s name can appear simply because an article or message was forwarded, not because of direct contact. He also notes ongoing theories about possible intelligence connections and suggests national security concerns may limit full public transparency. #podcast #epstein #secretservice #cia #jeffreyepstein