Watch: How the Enemy Created Its Most Dangerous Penetration Tool Inside Sana’a — The Full Story of Spy Majdi Hussein
A series of three recorded confession videos of spy Majdi Mohammed Hussein unveils a complete, externally orchestrated intelligence operation: from recruitment under the guise of a security company, to meetings with intelligence officers in Cairo and Riyadh, and finally to on-ground preparation that turned him into a live-broadcast surveillance tool inside the capital, Sana’a.
The videos outline—step by step—the mechanism of the joint American-Israeli-Saudi operations room: recruitment → training → equipping → field deployment → equipment renewal → changes in concealment tactics to avoid exposure.
Episode One: Recruitment and Initial Penetration
The first video traces the recruitment path: intermediaries, civilian fronts, and external summons disguised as trainings and service-related missions. After these staged “assignments,” the agent returned to Yemen to begin carrying out on-ground tasks in service of the operations room.
Episode Two: Training and Technical Deployment
The second video dives into technical preparation:
map and coordinate interpretation
training on concealed cameras designed to look like car remotes and compact recording devices
systematic surveillance tasks targeting embassies, NGOs, and sensitive buildings
The climax of this phase was the deployment of a vehicle equipped with live-stream gear and monitoring networks, turning him into a mobile surveillance station directly connected to the operations room in Riyadh.
Episode Three: Post-Deployment Operations
The third video exposes the operational phase after activation:
an additional summons to Saudi Arabia after his fingerprint data was reset
handover of new devices (live-broadcast cameras, network-extraction blocks)
logistical details of smuggling the equipment into Yemen
a decision to replace the surveillance vehicle for fear of exposure
All of these elements reveal the level of professional management behind the operations room and its determination to protect its network even after activation.
A Fully Integrated Intelligence System
Taken together, the three videos do more than expose a name or an isolated act; they reveal a full-scale intelligence architecture:
civilian recruitment fronts
foreign-based training
advanced surveillance technologies
external command centers for data collection and analysis
precautionary procedures to prevent detection
The recorded confessions include technical evidence and direct admissions—material of high value for judicial investigation, security follow-up, and strengthening field surveillance.