Gordon Carrera
๐ค SpeakerAppearances Over Time
Podcast Appearances
And I think in some cases, the people inside there don't always know how they're going to operate.
So I think all of that, I think, does help explain why it is quite challenging to know not just when a kind of revolutionary moment is coming,
but also how the authorities exactly are going to react and what they're going to do about it and whether they're going to be able to crush it.
But also, if you think about the subject you know well, Bashar al-Assad, he has this challenge in 2011.
A lot of people would say the pillars have weakened for him, but it takes, what, 13?
How many years was it before he actually was overthrown?
So the ability to kind of understand that just because those pillars are weakened, that it's going to mean the end soon, I think that is also really difficult.
Yeah, and I think that might be a great place to leave it for the moment, because in episode two, we're going to come back to this subject and look a bit deeper, I think, into how intelligence agencies have, you know, managed to, or sometimes not managed to, predict
the the course of some of these uprisings or revolutions and then apply that to what it can tell us about iran today and how likely the regime is to survive and a reminder if you want to get that episode before anyone else then do join the declassified club at the rest is classified.com you'll also get an access to that interview on the situation in iran which is going to come out for club members on friday but otherwise do join us for the next episode and we'll see you next time we'll see you next time
For exclusive interviews, bonus episodes, ad-free listening, early access to series, first look at live show tickets, a weekly newsletter, and discounted books, join the Declassified Club at therestisclassified.com.
HP understands that approximately four in 10 UK businesses have reported cyber breaches in the past 12 months alone.
That's why HP business laptops, desktops, and workstations bought directly on HP Store are secure straight out of the box with their endpoint security.
You don't need an alias or a secret hideout to stay safe.
Just WolfPro security working tirelessly to protect your hard work.
It's security that's built in, not bolted on.
Well, last time we left off with a discussion
I mean, really, who Epstein was, this theory, which has different flavors to it, of how he may have been connected to or working for an intelligence service.
And we, in particular, went deep on what I think is the most, maybe most common, but certainly the most salacious version of that theory.
which is that he was working probably for the Mossad, Israel's foreign intelligence service, to run essentially a blackmail ring out of some of his properties, gathering compromise on influential politicians and business leaders.
And so we went into that theory.