The Anchormen Show with Matt Gaetz - August 03, 2022


Episode 65 LIVE: Spy Games – Firebrand with Matt Gaetz


Episode Stats

Length

16 minutes

Words per Minute

150.2406

Word Count

2,529

Sentence Count

178

Misogynist Sentences

1

Hate Speech Sentences

3


Summary

In this special episode of Firebrand, we focus on three types of spies: Chinese, Chinese spies, independent brokers, and the "free agent" spied on the United States by the Deep State. We also discuss a new update to the Pegasus spy software used by the Israeli company NSO.


Transcript

00:00:01.000 The embattled Congressman Matt Gaetz.
00:00:03.000 Matt Gaetz was one of the very few members in the entire Congress
00:00:06.000 who bothered to stand up against permanent Washington on behalf of his constituents.
00:00:10.000 Matt Gaetz right now, he's a problem for the Democratic Party.
00:00:13.000 He could cause a lot of hiccups in passing applause.
00:00:16.000 So we're going to keep running those stories to keep hurting him.
00:00:20.000 If you stand for the flag and kneel in prayer,
00:00:23.000 if you want to build America up and not burn her to the ground,
00:00:27.000 then welcome, my fellow patriots.
00:00:29.000 You are in the right place.
00:00:31.000 This is the movement for you.
00:00:33.000 You ever watch this guy on television?
00:00:35.000 It's like a machine, Matt Gaetz.
00:00:38.000 I'm a canceled man in some corners of the internet.
00:00:41.000 Many days I'm a marked man in Congress, a wanted man by the deep state.
00:00:46.000 They aren't really coming for me.
00:00:48.000 They're coming for you.
00:00:50.000 I'm just in the way.
00:00:52.000 Thank you for joining us for this special edition of Firebrand,
00:00:59.000 where we focus on the issue of espionage, spying.
00:01:05.000 Now there are plenty of hybridizations and permutations of this model,
00:01:10.000 but here's how you should think about three different categories of spies.
00:01:15.000 The first are those who work for a foreign government exclusively for the benefit of that foreign government.
00:01:22.000 Frequently this model is used by the Chinese, where the spies are captive.
00:01:27.000 They don't spy for other countries.
00:01:29.000 They don't sell information to other countries.
00:01:31.000 They have it for the benefit of their government.
00:01:34.000 They're well paid, well resourced.
00:01:36.000 They have trade craft, and they are there to subvert the interests of Americans
00:01:41.000 in favor of the dominance of some foreign entity.
00:01:45.000 Very dangerous.
00:01:46.000 It's what we saw with Fang Fang.
00:01:49.000 The second major category are those who work for foreign governments
00:01:55.000 for the sake of marketing their particular espionage elsewhere.
00:02:00.000 This is something done frequently by the Cubans.
00:02:02.000 The Cubans spy on the United States a great deal,
00:02:05.000 but not always just for the benefit of Cuba.
00:02:07.000 Frankly, it's a small island Caribbean nation that doesn't have the influence
00:02:11.000 even in Latin America that they once did.
00:02:14.000 So they use their trade craft, they spy on America,
00:02:17.000 and then they sell that information to our adversaries,
00:02:22.000 to state actors, non-state actors, terrorists, cartels, whoever is willing to pay.
00:02:29.000 Now, these types of spies aren't just worried about information regarding the country that employs them.
00:02:34.000 They have a far wider breadth than the model that I previously described more frequently used by China.
00:02:40.000 So they're looking for everything, and they are there to transmit that information
00:02:44.000 in a way that frequently has the maximum amount of pain for our country and our interests.
00:02:50.000 The third, the independent broker, the free agent.
00:02:55.000 This is probably the most dangerous type of espionage, but these are the folks who collect intelligence and information
00:03:01.000 and simply work for no one.
00:03:04.000 They are contractable, sometimes they get contracted for a specific project,
00:03:09.000 sometimes for a specific piece of information,
00:03:11.000 sometimes they go and acquire the information on their own
00:03:15.000 and then try to use that in concert with other interests in order to build a narrative,
00:03:20.000 build cases, bring people down.
00:03:23.000 This is the model we saw from Christopher Steele in the Russia hoax.
00:03:27.000 Now, in all of these circumstances, you see a common thread, tradecraft.
00:03:33.000 They have to have the ability to get information so that they can build up those who are paying them
00:03:40.000 and so they can take us down.
00:03:42.000 So I'm always very interested in the different tools that allow spies to be able to engage in their profession.
00:03:50.000 I want to make sure that we're protected against the worst kind.
00:03:54.000 And in that light, I have an important update regarding the Pegasus software
00:04:00.000 frequently used by all three types of spies that I've just described.
00:04:05.000 Recently, I had the opportunity to question the Assistant Attorney General for National Security
00:04:11.000 in the House Judiciary Committee.
00:04:13.000 He did not want to play ball.
00:04:15.000 He did not want to answer questions, particularly regarding tools of espionage.
00:04:21.000 I pushed hard on a few serious issues, and one of those was Pegasus.
00:04:26.000 Now, if you've been keeping up with this podcast, the name Pegasus may ring a bell.
00:04:31.000 To give you a quick recap, Pegasus is a Trojan horse spyware program
00:04:36.000 created by the Israeli cyber arms company, NSO Group.
00:04:41.000 Pegasus works by exploiting flaws in a device's code through what is called zero-day exploits.
00:04:48.000 These exploits are flaws in the target device's code that are unknown by its producer,
00:04:54.000 like Apple or Samsung.
00:04:57.000 Pegasus takes advantage of these exploits through zero-click technology,
00:05:03.000 meaning the operators of Pegasus can get into your device without you even knowing,
00:05:10.000 without you even making a mistake on your end, like clicking a bad link.
00:05:14.000 Remember, we used to be told that good digital hygiene
00:05:17.000 meant that you didn't fall for spear phishing
00:05:20.000 or anything to get you to click on something if it's not coming from a known source.
00:05:24.000 But with Pegasus, after infiltrating your advice, the software is capable of reading texts,
00:05:33.000 tracking calls, collecting passwords, location tracking.
00:05:37.000 They can even turn on the target device's microphone and video camera,
00:05:43.000 harvesting information from all apps, including peer-to-peer apps like WhatsApp and Signal.
00:05:50.000 Once they're in, they have total control of your phone and a lot of control over you.
00:05:57.000 Certainly, they'll see all the data and information that you are reviewing or passing or analyzing.
00:06:03.000 So everyone from Israeli and Arab intelligence agencies to Mexican cartels
00:06:09.000 and even our own FBI and CIA have been using Pegasus.
00:06:15.000 You can bet it isn't being sold and used that responsibly.
00:06:19.000 But that's old news.
00:06:21.000 Today, we have new developments that you need to know about.
00:06:25.000 In a rare show of good judgment, and due to the NSO Group's just like obviously shady practices,
00:06:34.000 they have been blacklisted by the United States government for acting contrary to the national security
00:06:40.000 and foreign policy interests of the United States.
00:06:42.000 Imagine that.
00:06:43.000 No American company is allowed to do business with NSO Group.
00:06:47.000 And for that reason, they are struggling in some financial ways.
00:06:51.000 By the way, just about every major tech company and much of the federal bureaucracy acts contrary to the national interests of our country.
00:06:58.000 So the fact that NSO Group that makes Pegasus is being singled out, well, that ought to tell you something.
00:07:05.000 They are up to no good.
00:07:07.000 That technology is bad and dangerous and frequently falls into the wrong hands.
00:07:11.000 Frankly, I would suggest that it falling into the U.S. government's hands is a bad thing.
00:07:16.000 But it gets better.
00:07:18.000 The New York Times has very recently reported that an American defense contractor called L3 Harris has been caught trying to purchase Pegasus.
00:07:28.000 Now, how would that happen when the makers of Pegasus, the NSO Group, have been blacklisted?
00:07:33.000 And so L3 Harris spilled the beans.
00:07:38.000 They have said, according to the New York Times reporting, that they were being encouraged and supported by American intelligence officials to go buy this product that had been blacklisted and was illegal.
00:07:50.000 Allegedly, these officials told L3 Harris that they would support a deal if certain conditions were met.
00:07:57.000 And among these conditions was a demand that NSO Group's stash of zero-day exploits be made available and sold to Five Eyes intelligence members.
00:08:07.000 If you haven't heard of Five Eyes, that's the intelligence sharing agreement between the United States, Canada, Great Britain, Australia, and New Zealand.
00:08:15.000 Now, the implications of this are huge.
00:08:18.000 Here's my questioning of the DOJ's National Security Division official.
00:08:24.000 And just watch the faces on his handlers behind him as I ask these questions.
00:08:30.000 Take a look.
00:08:32.000 Did anyone at the National Security Division encourage L3 to purchase Pegasus?
00:08:39.000 So I'm not aware of, you know, anything about that matter.
00:08:45.000 So I don't know.
00:08:47.000 Oh, you are because people who work with you have come and briefed us on it.
00:08:51.000 And I'm citing, of course, here the New York Times article.
00:08:54.000 Defense firm said U.S. spies backed its bid for Pegasus software maker, spyware.
00:08:59.000 So Pegasus is the most exquisite spying software in the world.
00:09:03.000 It's zero click.
00:09:04.000 It can get it in people's phones.
00:09:05.000 It's been used to target politicians, journalists, dissidents in some places.
00:09:10.000 And here you have L3 saying that they were encouraged to go buy it from the National Security Apparatus.
00:09:17.000 It's very important under oath for you to tell me whether any of those people were at the National Security Division.
00:09:23.000 So, you know, I'm sure you can appreciate it.
00:09:25.000 I don't have any information about the public reporting.
00:09:29.000 I'm aware of public reporting relating to that, but I don't have any other information.
00:09:34.000 No.
00:09:35.000 So what you're saying, is that a yes or is that a no?
00:09:37.000 Because we're going to find out eventually.
00:09:40.000 I'm not going to comment any further.
00:09:42.000 Wait a second.
00:09:43.000 Wait a second.
00:09:44.000 Whether or not our own government used a private company as a cutout to go buy spying software that deprives people's rights.
00:09:51.000 And what you're saying is I'm not going to get a yes out of you and I'm not going to get a no out of you because you're just not going to tell.
00:09:57.000 You don't think the American people deserve to know that?
00:09:59.000 I'm not aware of the facts that you're asserting.
00:10:02.000 You know what Pegasus is.
00:10:03.000 I'm not aware of the facts that you're asserting.
00:10:04.000 You know what Pegasus is.
00:10:05.000 Yes.
00:10:06.000 I definitely have heard of Pegasus.
00:10:07.000 Okay.
00:10:08.000 So you should be able to tell me whether or not anyone who works at the National Security Division was out there trying to goose some private company.
00:10:13.000 to buy it for you guys to use.
00:10:14.000 Yeah.
00:10:15.000 Did you or did you not?
00:10:16.000 So I'm not aware of any facts that relate to your question.
00:10:21.000 I think you are.
00:10:22.000 One of the tools also used by the intelligence community is FISA, the Foreign Intelligence Surveillance Act.
00:10:33.000 And some authorities there allow our spies, our government officials to gather data, to listen in on calls,
00:10:42.000 intercept signal intelligence if they're looking into someone who's a foreigner on foreign soil.
00:10:49.000 But the Americans that get caught up in that, they're seeing their civil liberties, their constitutional rights deprived.
00:10:55.000 Now there have been a number of reviews regarding how the FBI and the Department of Justice are using FISA.
00:11:01.000 And it turns out, they're breaking a lot of their own rules.
00:11:04.000 The most recent inspector general report showed that every file that was looked at had problems with it.
00:11:10.000 In some cases, the backup materials that are required under the Woods procedures were entirely missing.
00:11:16.000 And in four cases, the errors were so egregious that it was easy to see how the judge evaluating whether or not to grant the surveillance request could have made a different decision.
00:11:29.000 It's a terrible cover up.
00:11:31.000 My colleague, Congressman Louie Gohmert asked questions about this to a senior National Security Division official at the Department of Justice.
00:11:38.000 Take a listen.
00:11:40.000 It's a fair question to know, in general, not specific cases, is the FISA court, has it been used to get orders to investigate January 6th?
00:11:55.000 So, again, I'm not familiar with the order that you referred to a moment ago.
00:12:00.000 Well, it was leaked.
00:12:01.000 I think it was WikiLeaks.
00:12:03.000 And that's what was so shocking to so many of us.
00:12:06.000 And, look, the abuses occurred during the Bush administration, the Obama administration.
00:12:13.000 There were some in the Trump administration.
00:12:16.000 And I feel sure it's still going on.
00:12:19.000 We need to know the extent of that.
00:12:21.000 Well, let me ask you about a case.
00:12:25.000 In Kilgore, Texas, a lady there working for a private oil company got a text from her nephew.
00:12:34.000 He had been looking through the FBI pictures and said,
00:12:37.000 Do you recognize anybody in this picture?
00:12:40.000 And it looked similar to her.
00:12:42.000 And she did a LOL, you know, gee, that looks like me.
00:12:46.000 Don't turn me in.
00:12:47.000 And a couple of days later, two FBI agents show up at her place of business demanding to know where she was on January 6th.
00:12:56.000 She was in Kilgore, Texas.
00:12:57.000 And then they threatened her boss that he could go to prison for covering for her.
00:13:02.000 Is there any order from any court that allows the DOJ or the NSA to monitor text messages of American citizens?
00:13:17.000 You know, obviously there are court orders, whether they come from federal courts, not the FISA court, or the federal FISA court, that authorize, pursuant to law, search warrants and surveillance.
00:13:32.000 Yes, but search warrants under the Fourth Amendment have to describe with particularity the things to be searched or seized.
00:13:41.000 And that's not happening.
00:13:44.000 That has not been happening.
00:13:46.000 And so when you have no probable cause to go after somebody in Kilgore, Texas, then, you know, we'd heard about, oh, gee, there's software to look for specific words that allow you to go after anybody that hasn't committed crimes.
00:14:04.000 We really need to know how widespread that is.
00:14:07.000 Can you give us an answer?
00:14:09.000 Is that being used?
00:14:10.000 It's just really important to point out, sir, that the way the law works is that the federal judge, a federal FISA court judge, will only approve an order based on probable cause that an individual is an agent of a foreign power.
00:14:25.000 Mr. Olsen, we have proof that's a lie.
00:14:28.000 The gentleman's time has expired.
00:14:29.000 It has not been followed.
00:14:30.000 Mr. Raskin is recognized for five minutes.
00:14:33.000 It is deeply troubling to me to see these exquisite powers and authorities and technologies that normally we would intend to keep America safe to be directed at our adversaries being slyly acquired against American law by some of the people that a lot of Americans are concerned about most.
00:14:56.000 People in our own government using politics to weaponize the national security apparatus against our fellow Americans.
00:15:04.000 I will get answers on this Pegasus issue.
00:15:07.000 And if they won't provide them to us, well, we're going to subpoena records.
00:15:11.000 We're going to get the documents.
00:15:13.000 When Republicans have control of the Congress, we must fervently defend people's civil liberties, civil liberties that both parties have been far too willing to violate in times of crisis.
00:15:26.000 So we'll stay on the case.
00:15:28.000 We'll keep you posted.
00:15:29.000 Until then, make sure you are subscribed to our podcast.
00:15:33.000 Make sure you've got your notifications turned on.
00:15:35.000 If you are listening on Apple iTunes, do me a favor.
00:15:38.000 Give me that five-star rating.
00:15:39.000 It will absolutely help us get our content to more people.
00:15:43.000 And always know that you can leave us comments in the comments section on your listening platform, on Rumble, on YouTube, on Getter, on Twitter.
00:15:51.000 We take a look at those and it helps inform what topics we choose to cover and what secrets of the swamp we expose for your benefit.
00:15:59.000 Thanks for being with us.
00:16:00.000 Roll the credits.
00:16:01.000 Roll the credits.
00:16:02.000 highlights a bit.
00:16:03.000 We'll see you next time.
00:16:04.000 ...
00:16:08.000 ...
00:16:12.000 ...
00:16:16.000 ...
00:16:20.000 Transcription by CastingWords