YemenEXtra
YemenExtra

Watch: How the Enemy Created Its Most Dangerous Penetration Tool Inside Sana’a — The Full Story of Spy Majdi Hussein

A series of three recorded confession videos of spy Majdi Mohammed Hussein unveils a complete, externally orchestrated intelligence operation: from recruitment under the guise of a security company, to meetings with intelligence officers in Cairo and Riyadh, and finally to on-ground preparation that turned him into a live-broadcast surveillance tool inside the capital, Sana’a.

The videos outline—step by step—the mechanism of the joint American-Israeli-Saudi operations room: recruitment → training → equipping → field deployment → equipment renewal → changes in concealment tactics to avoid exposure.

Episode One: Recruitment and Initial Penetration

The first video traces the recruitment path: intermediaries, civilian fronts, and external summons disguised as trainings and service-related missions. After these staged “assignments,” the agent returned to Yemen to begin carrying out on-ground tasks in service of the operations room.

Episode Two: Training and Technical Deployment

The second video dives into technical preparation:

map and coordinate interpretation

training on concealed cameras designed to look like car remotes and compact recording devices

systematic surveillance tasks targeting embassies, NGOs, and sensitive buildings

The climax of this phase was the deployment of a vehicle equipped with live-stream gear and monitoring networks, turning him into a mobile surveillance station directly connected to the operations room in Riyadh.

Episode Three: Post-Deployment Operations

The third video exposes the operational phase after activation:

an additional summons to Saudi Arabia after his fingerprint data was reset

handover of new devices (live-broadcast cameras, network-extraction blocks)

logistical details of smuggling the equipment into Yemen

a decision to replace the surveillance vehicle for fear of exposure

All of these elements reveal the level of professional management behind the operations room and its determination to protect its network even after activation.

A Fully Integrated Intelligence System

Taken together, the three videos do more than expose a name or an isolated act; they reveal a full-scale intelligence architecture:

civilian recruitment fronts

foreign-based training

advanced surveillance technologies

external command centers for data collection and analysis

precautionary procedures to prevent detection

The recorded confessions include technical evidence and direct admissions—material of high value for judicial investigation, security follow-up, and strengthening field surveillance.