All language subtitles for The UnXplained s07e10 Secrets of the Spies
Afrikaans
Akan
Albanian
Amharic
Arabic
Armenian
Azerbaijani
Basque
Belarusian
Bemba
Bengali
Bihari
Bosnian
Breton
Bulgarian
Cambodian
Catalan
Cebuano
Cherokee
Chichewa
Chinese (Simplified)
Chinese (Traditional)
Corsican
Croatian
Czech
Danish
Dutch
English
Esperanto
Estonian
Ewe
Faroese
Filipino
Finnish
French
Frisian
Ga
Galician
Georgian
German
Greek
Guarani
Gujarati
Haitian Creole
Hausa
Hawaiian
Hebrew
Hindi
Hmong
Hungarian
Icelandic
Igbo
Indonesian
Interlingua
Irish
Italian
Japanese
Javanese
Kannada
Kazakh
Kinyarwanda
Kirundi
Kongo
Korean
Krio (Sierra Leone)
Kurdish
Kurdish (SoranĂ®)
Kyrgyz
Laothian
Latin
Latvian
Lingala
Lithuanian
Lozi
Luganda
Luo
Luxembourgish
Macedonian
Malagasy
Malay
Malayalam
Maltese
Maori
Marathi
Mauritian Creole
Moldavian
Mongolian
Myanmar (Burmese)
Montenegrin
Nepali
Nigerian Pidgin
Northern Sotho
Norwegian
Norwegian (Nynorsk)
Occitan
Oriya
Oromo
Pashto
Persian
Polish
Portuguese (Brazil)
Portuguese (Portugal)
Punjabi
Quechua
Romanian
Romansh
Runyakitara
Russian
Samoan
Scots Gaelic
Serbian
Serbo-Croatian
Sesotho
Setswana
Seychellois Creole
Shona
Sindhi
Sinhalese
Slovak
Slovenian
Somali
Spanish
Spanish (Latin American)
Sundanese
Swahili
Swedish
Tajik
Tamil
Tatar
Telugu
Thai
Tigrinya
Tonga
Tshiluba
Tumbuka
Turkish
Turkmen
Twi
Uighur
Ukrainian
Urdu
Uzbek
Vietnamese
Welsh
Wolof
Xhosa
Yiddish
Yoruba
Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:04,860 --> 00:00:08,540
Shadowy assassins who vanish into the
crowd.
2
00:00:09,300 --> 00:00:12,980
Double agents who sell their own
country's secrets.
3
00:00:13,760 --> 00:00:18,100
And coded messages hiding in plain
sight.
4
00:00:20,620 --> 00:00:27,000
Throughout history, spies have played a
unique role in shaping world events.
5
00:00:27,360 --> 00:00:32,659
And these secret agents work at the
behest of an organization, a government,
6
00:00:32,659 --> 00:00:34,080
perhaps even a single leader.
7
00:00:34,540 --> 00:00:39,940
Their covert orders could range from
simply collecting information or
8
00:00:39,940 --> 00:00:43,560
as deadly serious as assassinating an
enemy.
9
00:00:45,340 --> 00:00:51,220
Secrecy is critical to a spy's success.
So how do these masters of deception
10
00:00:51,220 --> 00:00:54,640
fulfill their assignments without
getting caught?
11
00:00:56,100 --> 00:00:59,080
Well, that is what we'll try and find
out.
12
00:01:13,550 --> 00:01:18,630
The CIA, MI6, and MSS.
13
00:01:19,190 --> 00:01:22,930
These are the foreign intelligence
services for some of the most powerful
14
00:01:22,930 --> 00:01:24,090
countries in the world.
15
00:01:25,030 --> 00:01:31,890
These agencies and hundreds of others
engage in clandestine operations to
16
00:01:31,890 --> 00:01:33,670
aid and protect their countries.
17
00:01:34,270 --> 00:01:38,950
For many, their mission is to gather the
most closely guarded secrets of their
18
00:01:38,950 --> 00:01:43,130
enemies. And their secret weapon are
often...
19
00:01:45,199 --> 00:01:51,020
Spies. Spies are utilized by states to
collect intelligence that is necessary
20
00:01:51,020 --> 00:01:52,020
advance policymaking.
21
00:01:52,680 --> 00:01:57,960
From figuring out whether an adversary
has nuclear weapons to figuring out
22
00:01:57,960 --> 00:02:01,080
whether a leader of a foreign state is
about to die.
23
00:02:01,420 --> 00:02:06,120
We have intelligence agencies that
specialize in visual intelligence. They
24
00:02:06,120 --> 00:02:07,120
satellite imagery.
25
00:02:07,560 --> 00:02:11,100
We have intelligence agencies that
specialize in the interception of
26
00:02:11,100 --> 00:02:12,100
communication.
27
00:02:12,650 --> 00:02:17,150
But there are spies that more commonly
comes to mind, which is the people at
28
00:02:17,150 --> 00:02:21,190
front line, the individuals who are
willing to put their lives at risk to
29
00:02:21,190 --> 00:02:22,190
information.
30
00:02:22,510 --> 00:02:28,270
At the end of the day, it's a life of
mystery and intrigue because the spy
31
00:02:28,270 --> 00:02:33,990
is kind of its own domain. It remains
this kind of puzzle or mystery that most
32
00:02:33,990 --> 00:02:39,830
people will not have exposure to beyond
those few moments we read about in the
33
00:02:39,830 --> 00:02:40,830
newspaper.
34
00:02:42,190 --> 00:02:47,630
Hollywood movies and books and TV have
made it seem like spies are some kind of
35
00:02:47,630 --> 00:02:53,210
superhero. That is nothing like real
espionage. The purpose of espionage is
36
00:02:53,210 --> 00:02:56,950
be so secret that nobody even knows
you're there.
37
00:02:57,330 --> 00:03:02,950
True professional espionage is in and
out without anyone ever even knowing it
38
00:03:02,950 --> 00:03:08,730
happened. That makes your average spy
much more like an average person.
39
00:03:09,640 --> 00:03:13,320
And what's required of a spy changes
from day to day.
40
00:03:13,780 --> 00:03:15,280
One day we're hunting terrorists.
41
00:03:15,940 --> 00:03:19,380
Sometime later, we're exchanging
information in secret.
42
00:03:20,420 --> 00:03:22,080
Someday we're fighting a war on drugs.
43
00:03:22,720 --> 00:03:24,380
Some days we're fighting a war on
misinformation.
44
00:03:25,420 --> 00:03:31,580
It's an incredible web of information
and impact that the average person is
45
00:03:31,580 --> 00:03:32,580
aware of.
46
00:03:33,360 --> 00:03:37,100
How can we ever hope to understand the
mysterious world of espionage?
47
00:03:37,840 --> 00:03:40,240
if it remains completely hidden from us?
48
00:03:41,080 --> 00:03:46,660
Well, every so often, information does
come to light that illustrates how a
49
00:03:46,660 --> 00:03:49,900
single spy can change the course of
history.
50
00:03:53,560 --> 00:03:56,840
Los Alamos, New Mexico, 1943.
51
00:03:58,020 --> 00:04:03,380
A massive scientific complex is
established in secret for the research
52
00:04:03,380 --> 00:04:05,460
development of a truly devastating
weapon.
53
00:04:06,240 --> 00:04:11,020
This laboratory becomes ground zero for
the most consequential, top -secret
54
00:04:11,020 --> 00:04:13,260
military program ever devised.
55
00:04:13,900 --> 00:04:17,019
It's called the Manhattan Project.
56
00:04:17,959 --> 00:04:24,020
The Manhattan Project was this top
-secret, federally funded, $2 billion
57
00:04:24,020 --> 00:04:31,000
to explore whether it was possible to
develop an atomic weapon in
58
00:04:31,000 --> 00:04:32,200
the midst of World War II.
59
00:04:32,990 --> 00:04:38,410
And they built this secret city in Los
Alamos, gathering together chemists and
60
00:04:38,410 --> 00:04:44,090
engineers and physicists and other
scientists into one spot so that these
61
00:04:44,090 --> 00:04:50,710
scientists can collaborate and fully
converse inside this secret city to
62
00:04:50,710 --> 00:04:51,710
this weapon.
63
00:04:52,150 --> 00:04:57,670
As history shows, these scientists would
prove successful in creating the atomic
64
00:04:57,670 --> 00:04:58,670
bomb.
65
00:04:58,970 --> 00:05:04,660
But little did they know at the time,
There was a spy among them, sharing the
66
00:05:04,660 --> 00:05:06,240
program's most intimate secrets.
67
00:05:08,060 --> 00:05:14,620
His codename was Rest, but his identity
has since been revealed to be a German
68
00:05:14,620 --> 00:05:17,740
physicist named Klaus Fuchs.
69
00:05:18,960 --> 00:05:24,840
Klaus came from Germany, and because of
his prior background as a physicist, he
70
00:05:24,840 --> 00:05:28,980
quickly got a job within the Manhattan
program in Los Alamos.
71
00:05:29,920 --> 00:05:35,200
And unknown to the people there, Fuchs
began to share information with the
72
00:05:35,200 --> 00:05:36,820
Soviets about the program.
73
00:05:37,480 --> 00:05:42,940
The U .S. counterintelligence program
that involved decrypting Soviet
74
00:05:42,940 --> 00:05:48,640
communications revealed the scope of the
information that Fuchs collected and
75
00:05:48,640 --> 00:05:49,940
shared with the Soviets.
76
00:05:50,200 --> 00:05:56,420
In his particular role as a lead
scientist within the program and access
77
00:05:56,420 --> 00:06:01,000
development of the bomb, He was able to
share pretty detailed technical
78
00:06:01,000 --> 00:06:06,520
information about the science that goes
into the generation and enrichment of
79
00:06:06,520 --> 00:06:12,740
plutonium, which served a huge deal in
advancing the Russians' capacities in
80
00:06:12,740 --> 00:06:13,740
those spaces.
81
00:06:14,160 --> 00:06:18,600
And he collected intelligence and shared
intelligence for about seven years
82
00:06:18,600 --> 00:06:19,920
until it was revealed.
83
00:06:21,380 --> 00:06:25,140
The greatest find in the history of
espionage...
84
00:06:25,690 --> 00:06:28,470
is the theft of the atomic secret.
85
00:06:29,230 --> 00:06:33,050
Klaus Fuchs pretty much shared the
recipe with the Soviet Union.
86
00:06:33,670 --> 00:06:39,910
The Soviet Union was able to get a
nuclear weapon roughly five years before
87
00:06:39,910 --> 00:06:41,010
could have done it on their own.
88
00:06:41,930 --> 00:06:44,670
The moment they had the nuke, they were
a world power.
89
00:06:45,490 --> 00:06:51,110
If one spy can alter the course of
atomic history, how else has espionage
90
00:06:51,110 --> 00:06:52,110
our world?
91
00:06:53,450 --> 00:06:59,510
Has secret intelligence informed nearly
every major event in human history?
92
00:07:01,090 --> 00:07:07,390
You have to assume that you only know
about 5 % of all espionage operations.
93
00:07:07,610 --> 00:07:12,110
Every negotiation, every diplomatic
agreement, every transition of power
94
00:07:12,110 --> 00:07:16,590
one president to another president. For
167 countries all over the world over
95
00:07:16,590 --> 00:07:20,390
the course of decades, intelligence had
a role to play in every one of those.
96
00:07:21,120 --> 00:07:25,360
So now when you start to ask yourself
about how the Soviet Union fell and you
97
00:07:25,360 --> 00:07:29,940
start to ask yourself about how the end
of Afghanistan happened and the winning
98
00:07:29,940 --> 00:07:34,940
of Gulf War II and the taking down of
Saddam Hussein, you start to see these
99
00:07:34,940 --> 00:07:40,000
major instances in history where
intelligence worked or failed.
100
00:07:41,140 --> 00:07:45,680
So when you try to consider the impact
that espionage has had over the long
101
00:07:45,680 --> 00:07:50,500
-term history of the world, You have to
remember that 95 % of what they've done,
102
00:07:50,540 --> 00:07:54,860
nobody knows about, except for need -to
-know secret circles.
103
00:07:55,900 --> 00:08:01,480
It's really pretty chilling if you think
about the effect that just a single spy
104
00:08:01,480 --> 00:08:04,420
or intelligence source can have on world
events.
105
00:08:04,840 --> 00:08:11,600
And the irony is that we often don't
know what that impact is until many
106
00:08:11,600 --> 00:08:15,160
or even decades later, or sometimes ever
at all.
107
00:08:16,270 --> 00:08:22,950
Even historians looking back on
historical events or geopolitical
108
00:08:22,950 --> 00:08:29,350
may never have access to the behind -the
-scenes intrigue and espionage
109
00:08:29,350 --> 00:08:34,030
that took place or the machinations of
various intelligence organizations.
110
00:08:34,409 --> 00:08:38,750
But for sure, spies really can change
the course of history.
111
00:08:44,330 --> 00:08:46,210
Washington, D .C., 2025.
112
00:08:46,810 --> 00:08:48,610
The International Spy Museum.
113
00:08:49,610 --> 00:08:55,310
This sleek, modern building houses over
7 ,000 unique artifacts from the history
114
00:08:55,310 --> 00:08:56,630
of espionage.
115
00:08:56,890 --> 00:09:02,770
Among them are ingenious devices created
to hide things, record secret
116
00:09:02,770 --> 00:09:08,550
conversations, and some are even meant
to kill.
117
00:09:09,710 --> 00:09:14,610
The International Spy Museum houses the
world's largest collection of
118
00:09:14,610 --> 00:09:17,370
intelligence and espionage -related
artefacts.
119
00:09:17,750 --> 00:09:24,210
We have all kinds of ingenious devices
to do all different types of stuff. So a
120
00:09:24,210 --> 00:09:28,690
lot of the gadgets that we see are there
to try to help to be a more effective
121
00:09:28,690 --> 00:09:33,130
agent, to recruit spies better, to steal
secrets better.
122
00:09:34,090 --> 00:09:37,530
And we've got a fantastic James Bond
collection.
123
00:09:38,920 --> 00:09:43,540
Some of the James Bond movies have
actually influenced the development of
124
00:09:43,540 --> 00:09:45,180
gadgets in the CIA.
125
00:09:46,300 --> 00:09:51,680
CIA directors come out of the movie
theatre and say, guys, do we have
126
00:09:51,680 --> 00:09:56,420
like this? And if we don't, can someone
get on it? So we know that there's a two
127
00:09:56,420 --> 00:10:00,880
-way interaction between the gadgets in
fiction and in reality.
128
00:10:02,990 --> 00:10:07,330
When you look at spy gadgets, a lot of
them are weapons of one thing or
129
00:10:07,490 --> 00:10:09,550
but you're always trying to come up with
new gadgets.
130
00:10:10,710 --> 00:10:16,190
So the KGB came up with a lipstick gun,
which was a little 4 .5 millimeter
131
00:10:16,190 --> 00:10:18,510
bullet that could be fired from a
lipstick tube.
132
00:10:18,990 --> 00:10:25,890
The CIA had an ice gun, which fired a
super cool needle of ice, preferably
133
00:10:25,890 --> 00:10:28,650
through your opponent's heart. That was
all around 1960.
134
00:10:29,950 --> 00:10:33,090
And then there are famous exploding
cigars, which they were going to blow
135
00:10:33,090 --> 00:10:34,150
Fidel Castro's head.
136
00:10:34,970 --> 00:10:41,010
But to the extent that secret weapons,
spy weapons programs exist, they're
137
00:10:41,010 --> 00:10:45,090
secret, which is why you don't know
about them, because you're not supposed
138
00:10:45,950 --> 00:10:50,390
Over the years, some spy gadgets have
either been declassified or leaked to
139
00:10:50,390 --> 00:10:51,390
public.
140
00:10:51,730 --> 00:10:56,310
However, what's less clear is whether
any of these fantastical and frankly
141
00:10:56,310 --> 00:10:57,330
bizarre devices
142
00:10:58,110 --> 00:11:00,210
were ever successfully put to use.
143
00:11:01,650 --> 00:11:06,130
But there is a curious instrument of
death that many believe was responsible
144
00:11:06,130 --> 00:11:12,010
one of the most infamous and unsolved
assassinations of the 20th century, the
145
00:11:12,010 --> 00:11:16,950
1978 murder of British journalist Georgi
Markov.
146
00:11:19,030 --> 00:11:22,830
Markov was a dissident in Bulgaria, and
he was loud.
147
00:11:24,230 --> 00:11:27,590
And he had to flee. He wound up in the
United Kingdom.
148
00:11:27,850 --> 00:11:33,830
And he got employed by the BBC and Radio
Free Europe,
149
00:11:33,890 --> 00:11:40,870
which we absolutely hated because it was
Western propaganda directed to the
150
00:11:40,870 --> 00:11:46,030
East. And he got louder and louder. And
the Bulgarians, I think it was the
151
00:11:46,030 --> 00:11:47,730
president, he wanted to get rid of this
guy.
152
00:11:48,880 --> 00:11:55,660
On September 7th, 1978, at around 1 .30
p .m., Markov is about to catch a bus
153
00:11:55,660 --> 00:12:01,680
on the Waterloo Bridge in London when
something very strange happens.
154
00:12:02,920 --> 00:12:09,360
Yogi Markov bumps into somebody at a bus
stop, and this individual is carrying
155
00:12:09,360 --> 00:12:15,680
an umbrella, and Yogi Markov feels some
pain in his leg.
156
00:12:16,480 --> 00:12:21,560
And the individual concerned mutters an
apology and climbs into a taxi.
157
00:12:22,080 --> 00:12:29,060
And Markov, from that moment onwards,
becomes ill. He goes to hospital later
158
00:12:29,060 --> 00:12:35,220
that night, and a few days later, he
succumbs to a very severe
159
00:12:35,220 --> 00:12:36,340
infection.
160
00:12:39,120 --> 00:12:44,340
Doctors who examined his body found red
swelling on the back of his thigh.
161
00:12:45,210 --> 00:12:52,150
And in a microscopic examination of the
flesh from the wound site, they
162
00:12:52,150 --> 00:12:57,710
discovered a tiny, tiny, less than two
millimeter size little ball,
163
00:12:58,070 --> 00:13:05,050
mostly made out of platinum, which had
holes drilled in it as a means
164
00:13:05,050 --> 00:13:06,850
to administer a poison.
165
00:13:07,330 --> 00:13:12,890
The poison, which has never been
officially identified, was most likely
166
00:13:13,400 --> 00:13:17,760
which is a highly toxic substance, which
is refined from castor beans.
167
00:13:19,060 --> 00:13:24,620
How was this deadly platinum ball
implanted into Georgie Markov?
168
00:13:25,180 --> 00:13:29,360
Answers were not easy to come by, but
then investigators remembered one
169
00:13:29,360 --> 00:13:34,040
seemingly minor detail that may provide
all the answers.
170
00:13:34,680 --> 00:13:36,080
Oh, that umbrella.
171
00:13:36,820 --> 00:13:38,380
What was that all about?
172
00:13:39,000 --> 00:13:43,120
And later we learned that one of the
things that both the KGB and the
173
00:13:43,120 --> 00:13:44,900
had come up with was an umbrella gun.
174
00:13:45,660 --> 00:13:47,600
They had a whole lab working on this.
175
00:13:48,060 --> 00:13:52,660
And there was a little tiny capsule that
was in the tip of the umbrella which
176
00:13:52,660 --> 00:13:53,660
had a needle on it.
177
00:13:53,900 --> 00:13:56,820
And you just poked somebody and then
walked away.
178
00:13:58,580 --> 00:14:03,220
How do you kill somebody in plain
daylight, in public, without anybody
179
00:14:03,220 --> 00:14:06,340
about it? And the answer is that you
find a way to create some sort of device
180
00:14:06,340 --> 00:14:07,340
like an umbrella.
181
00:14:08,120 --> 00:14:12,440
that blends in every day but can still
deliver a lethal dose when you need it
182
00:14:12,440 --> 00:14:13,399
to.
183
00:14:13,400 --> 00:14:18,380
This is exactly what makes spy agencies
and spy tech something of interest and
184
00:14:18,380 --> 00:14:22,340
renown, because there's a great deal of
effort, a great deal of investment
185
00:14:22,340 --> 00:14:24,700
that's put into making a clandestine
weapon.
186
00:14:25,780 --> 00:14:31,180
The umbrella suspected of killing
Georgie Marka was never recovered, so
187
00:14:31,180 --> 00:14:35,900
investigators had no way to definitively
confirm such a device was responsible
188
00:14:35,900 --> 00:14:36,900
for his murder.
189
00:14:38,000 --> 00:14:43,100
But as far as the identity of the
mysterious assassin who bumped into
190
00:14:43,300 --> 00:14:46,580
well, that's another mystery.
191
00:14:47,880 --> 00:14:52,920
When it comes to assassinating people,
we know that the KGB did quite a bit of
192
00:14:52,920 --> 00:14:55,600
that, and we know that the Russian
intelligence does it now, too.
193
00:14:56,160 --> 00:15:03,020
There's an arsenal of weapons, and
Markov was a very loud dissident, so he
194
00:15:03,020 --> 00:15:06,520
an enemy of the revolution, and he had
to be killed.
195
00:15:07,070 --> 00:15:13,130
But the man who was seen to stick that
umbrella into Markov's leg, I think he
196
00:15:13,130 --> 00:15:14,130
got away with this.
197
00:15:15,670 --> 00:15:19,850
What history says about the
assassination of Georgi Markov is a
198
00:15:19,850 --> 00:15:25,410
to who was Jack the Ripper, who killed
JFK, what's the final definitive story.
199
00:15:25,910 --> 00:15:28,650
Hopefully we'll know one day. Maybe we
never will.
200
00:15:30,010 --> 00:15:33,930
Today a replica of the notorious
umbrella hangs in the International Spa
201
00:15:33,930 --> 00:15:35,010
Museum's collection.
202
00:15:35,920 --> 00:15:39,820
And while it can never be proven that a
similar device was used to poison
203
00:15:39,820 --> 00:15:42,900
Georgie Markov, one thing is certain.
204
00:15:43,760 --> 00:15:47,840
The deadly tools of spycraft could be
made to look like anything.
205
00:15:48,520 --> 00:15:52,660
And you wouldn't know it until it's too
late.
206
00:15:54,500 --> 00:16:00,080
In terms of what could be future spy
weapons, secret spy gadgets they could
207
00:16:00,080 --> 00:16:03,340
up with, well, one of them is tiny, tiny
drones.
208
00:16:04,360 --> 00:16:09,420
They can fly inside you, perhaps,
administer poisons, carry tiny cameras.
209
00:16:09,900 --> 00:16:13,040
The use of frequency weapons might be
something else.
210
00:16:13,680 --> 00:16:18,880
Essentially some sort of energy beam
which is being directed at people,
211
00:16:19,040 --> 00:16:21,840
affecting the brain in some way.
212
00:16:22,680 --> 00:16:26,640
which would create feelings of
disorientation. And if it managed to
213
00:16:26,640 --> 00:16:32,620
discombobulate the right targets, it
could interfere with their ability to
214
00:16:32,620 --> 00:16:33,820
perform their duties.
215
00:16:34,940 --> 00:16:39,060
So energy weapons could be useful in the
world of spies.
216
00:16:39,540 --> 00:16:43,920
But yes, there's a secret war. You'll
always try to be one step ahead of your
217
00:16:43,920 --> 00:16:47,380
opponent by coming up with something
that they hadn't thought of yet.
218
00:16:47,940 --> 00:16:51,020
And it can be someone passing you by
with an umbrella.
219
00:16:53,260 --> 00:16:57,300
Was the assassination of Georgi Markov
the work of Soviet intelligence?
220
00:16:57,920 --> 00:17:02,840
Like the top secret nature of espionage
itself, there's a lot we may never know.
221
00:17:03,980 --> 00:17:10,780
But there is one spy mystery that has
intelligence officers worried even now.
222
00:17:10,920 --> 00:17:17,160
It involves a foreign asset who
infiltrated the American government
223
00:17:17,160 --> 00:17:19,660
stealing national secrets.
224
00:17:24,010 --> 00:17:26,310
Washington, D .C., 1947.
225
00:17:28,010 --> 00:17:33,210
President Harry Truman establishes the
Central Intelligence Agency.
226
00:17:33,930 --> 00:17:40,130
In the wake of World War II and with the
rise of atomic weaponry, a new covert
227
00:17:40,130 --> 00:17:45,050
war is about to begin between the United
States and the Soviet Union.
228
00:17:45,970 --> 00:17:51,710
This unprecedented era of espionage from
1947 to 1991
229
00:17:53,880 --> 00:17:54,880
as the Cold War.
230
00:17:56,320 --> 00:18:01,740
At the start of the Cold War, as we know
it in the 1950s, the U .S. realized
231
00:18:01,740 --> 00:18:04,820
that it needed to advance its internal
security measures.
232
00:18:05,200 --> 00:18:11,940
This is why Truman would ultimately
generate a presidential executive order
233
00:18:11,940 --> 00:18:17,540
confidential materials, which still to
this day is the way by which we set
234
00:18:17,540 --> 00:18:22,040
different degrees of confidentiality
around secret documents here in the
235
00:18:22,040 --> 00:18:23,040
States.
236
00:18:23,580 --> 00:18:29,960
During the Cold War, both the CIA and
the Soviet Union's KGB employed spies to
237
00:18:29,960 --> 00:18:32,220
steal each other's national secrets.
238
00:18:32,720 --> 00:18:37,440
And while any civilian could be
recruited to spy on their home country
239
00:18:37,440 --> 00:18:42,840
other side, even more valuable were
those already working in the
240
00:18:42,840 --> 00:18:48,180
community. These turncoats are known as
double agents.
241
00:18:48,780 --> 00:18:55,190
To be a double agent, for example, I'm
an agent. I'm working with the CIA over
242
00:18:55,190 --> 00:18:58,610
here, but also working with the KGB over
here.
243
00:18:59,070 --> 00:19:01,130
I'm a double agent in the middle.
244
00:19:01,790 --> 00:19:07,450
But it's quite often used in shorthand
to refer to anybody who works in this
245
00:19:07,450 --> 00:19:10,230
world who also works for the other side.
246
00:19:10,810 --> 00:19:15,370
There will be a closed universe of
individuals in the know about particular
247
00:19:15,370 --> 00:19:18,850
secrets, and you need to penetrate those
kinds of closed networks.
248
00:19:20,040 --> 00:19:25,740
And so the best way to do that is by
turning a double agent, a person, into
249
00:19:25,740 --> 00:19:27,080
information sharer.
250
00:19:28,980 --> 00:19:33,300
The U .S. intelligence community is made
up of 18 different agencies and
251
00:19:33,300 --> 00:19:34,300
organizations.
252
00:19:35,100 --> 00:19:41,440
So we have to wonder, are there double
agents among them sharing our most
253
00:19:41,440 --> 00:19:43,560
closely guarded secrets with our
enemies?
254
00:19:45,120 --> 00:19:48,060
Remarkably, the answer is yes.
255
00:19:50,480 --> 00:19:56,140
and many consider the most damaging
double agent ever discovered, was a 31
256
00:19:56,140 --> 00:19:59,700
veteran of the CIA named Aldrich Ames.
257
00:20:00,500 --> 00:20:06,200
Aldrich Ames was a counterintelligence
officer in the Directorate of
258
00:20:06,460 --> 00:20:12,500
and he was a senior individual who, in
1985, as a result of a bad divorce, was
259
00:20:12,500 --> 00:20:16,180
short of money, and he sold out to the
Soviets.
260
00:20:16,460 --> 00:20:18,820
He just simply went to the embassy.
261
00:20:19,520 --> 00:20:25,620
asked to speak to a KGB officer, and
then sold information through letters,
262
00:20:25,680 --> 00:20:32,360
which was highly classified operations
and a large number of identities
263
00:20:32,360 --> 00:20:38,640
who were people who had worked either
for the FBI or the CIA in the
264
00:20:38,640 --> 00:20:41,260
Soviet embassy in Washington, D .C.
265
00:20:42,860 --> 00:20:47,860
There were suspicions that there was a
spy within the CIA.
266
00:20:48,520 --> 00:20:55,220
Because in the 1980s, many of our
Russian sources in Russia
267
00:20:55,220 --> 00:20:57,180
started kind of dropping like flies.
268
00:20:57,720 --> 00:21:01,480
And this set off alarm bells at the CIA.
269
00:21:01,900 --> 00:21:05,200
And so an investigation was launched.
270
00:21:05,540 --> 00:21:11,480
But bizarrely, it took many, many years
to realize that it was Aldrich Ames.
271
00:21:11,840 --> 00:21:17,860
Even though Aldrich Ames displayed many
of the characteristics of...
272
00:21:18,200 --> 00:21:20,120
What would be a viable target for
recruitment?
273
00:21:20,440 --> 00:21:23,020
He had a known problem with alcohol.
274
00:21:23,480 --> 00:21:29,000
He had married a Colombian woman who had
very expensive taste.
275
00:21:29,240 --> 00:21:34,780
He bought a house in Virginia with cash
for $540 ,000.
276
00:21:35,660 --> 00:21:37,580
He bought a Jaguar.
277
00:21:37,940 --> 00:21:41,800
He started to dress really well. He got
new teeth.
278
00:21:42,080 --> 00:21:43,620
And all of these.
279
00:21:44,270 --> 00:21:50,850
are pretty obvious indicators that
someone is working for a foreign
280
00:21:50,850 --> 00:21:54,310
service because he couldn't afford all
that on his CIA salary.
281
00:21:55,570 --> 00:22:00,150
Aldrich Ames is one of the most famous
CIA compromises of all time. He went
282
00:22:00,150 --> 00:22:04,370
many, many years clandestinely acquiring
and giving information to the Russians
283
00:22:04,370 --> 00:22:07,090
until his ultimate arrest in the 1990s.
284
00:22:07,630 --> 00:22:12,230
It's very difficult to be able to
quantify the amount of damage that
285
00:22:12,230 --> 00:22:13,230
Ames did.
286
00:22:13,260 --> 00:22:19,020
We know that CIA spies were
systematically killed, and even to this
287
00:22:19,020 --> 00:22:23,820
always training new recruits to
understand Aldrich Ames to make sure
288
00:22:23,820 --> 00:22:25,980
don't have another instance like that
happen again.
289
00:22:26,800 --> 00:22:31,900
Aldrich Ames was sentenced to life in
prison, and his wife Rosario got five
290
00:22:31,900 --> 00:22:35,660
years for aiding her husband in his
crimes against the United States.
291
00:22:37,080 --> 00:22:40,460
But Ames was not the only double agent
discovered inside.
292
00:22:41,020 --> 00:22:42,820
an American intelligence agency.
293
00:22:44,020 --> 00:22:50,740
In 2001, an FBI agent named Robert
Hansen was arrested for selling
294
00:22:50,740 --> 00:22:54,200
highly classified information to Russia
for over 20 years.
295
00:22:54,640 --> 00:22:57,040
And it begs an urgent question.
296
00:22:57,640 --> 00:23:02,040
How many more double agents might be
operating within the American
297
00:23:02,040 --> 00:23:05,820
community right now that have never been
caught?
298
00:23:06,960 --> 00:23:10,860
It is very likely that there is a
Russian double agent within the U .S.
299
00:23:10,860 --> 00:23:11,860
government today.
300
00:23:12,560 --> 00:23:16,680
In the same way, it is very likely that
there is a double agent working for the
301
00:23:16,680 --> 00:23:20,740
Chinese government or the Iranian
government or the North Korean
302
00:23:21,460 --> 00:23:25,060
The United States has many enemies
around the world and those enemies are
303
00:23:25,060 --> 00:23:29,320
interested in gathering intimate
information about U .S. doings.
304
00:23:29,900 --> 00:23:34,010
It's very uncomfortable to admit But one
thing that CIA officers are taught
305
00:23:34,010 --> 00:23:37,830
right out of the gate is that you must
always assume at any given time that the
306
00:23:37,830 --> 00:23:41,190
CIA and the FBI are penetrated by a
foreign intelligence service.
307
00:23:42,030 --> 00:23:46,030
We have to assume that. If we're lucky,
there's only one.
308
00:23:47,150 --> 00:23:49,250
Probability -wise, there is more than
one.
309
00:23:51,210 --> 00:23:55,790
Could there really be a foreign spy
deeply embedded in a U .S. intelligence
310
00:23:55,790 --> 00:23:56,790
agency?
311
00:23:57,850 --> 00:24:01,710
Unraveling this mystery is truly a
matter of national security because...
312
00:24:02,080 --> 00:24:06,680
Gaining secret information on an enemy
can quickly shift the balance of global
313
00:24:06,680 --> 00:24:12,580
power. Such was the case in World War II
when Allied forces were convinced that
314
00:24:12,580 --> 00:24:19,060
a German double agent was leaking D -Day
plans to the Nazis, one letter at a
315
00:24:19,060 --> 00:24:20,060
time.
316
00:24:22,600 --> 00:24:24,340
France, 1942.
317
00:24:26,380 --> 00:24:28,940
As World War II raged across Europe,
318
00:24:29,980 --> 00:24:36,240
The Allied forces spent five months
planning a top -secret invasion to
319
00:24:36,240 --> 00:24:38,400
the French coastal town of Dieppe.
320
00:24:40,700 --> 00:24:47,640
But on August 19, as the Allies began
their surprise assault, it seemed that
321
00:24:47,640 --> 00:24:51,820
somehow the Germans knew they were
coming.
322
00:24:53,580 --> 00:24:58,040
The attack on Dieppe was a disaster for
the Allies.
323
00:24:59,020 --> 00:25:04,600
Something like half of the 6 ,000 troops
who land are either killed or taken
324
00:25:04,600 --> 00:25:11,080
prisoner. And so the concern was that
classified information was being sent
325
00:25:11,080 --> 00:25:17,240
to the Axis powers, to the Nazis, and
that using codebreakers or spies,
326
00:25:17,500 --> 00:25:22,940
the attack had been foiled, had been
discovered by the Axis powers.
327
00:25:23,840 --> 00:25:28,460
The Allies are repelled by the Nazis,
and the mission is a failure.
328
00:25:28,880 --> 00:25:30,960
And then people wanted to know why.
329
00:25:31,840 --> 00:25:37,360
The defeat was so stunning that British
intelligence, MI5, started looking for
330
00:25:37,360 --> 00:25:38,360
reasons.
331
00:25:38,800 --> 00:25:44,320
How did the Nazis know the invasion was
happening? So it was suspected that
332
00:25:44,320 --> 00:25:49,560
there could be a spy sending messages to
the Nazis to alert them of upcoming
333
00:25:49,560 --> 00:25:50,560
attacks.
334
00:25:50,920 --> 00:25:55,640
After the failed DF invasion, British
intelligence launched an investigation
335
00:25:56,480 --> 00:25:59,040
to find a potential Nazi spy in their
midst.
336
00:26:00,080 --> 00:26:03,500
And in the process, they noticed
something rather peculiar.
337
00:26:04,800 --> 00:26:09,580
Just two days before the surprise
invasion on Dieppe, in the British
338
00:26:09,700 --> 00:26:15,500
the Daily Telegraph, a curious clue
appeared in that day's crossword puzzle.
339
00:26:16,480 --> 00:26:22,340
Around August 18th, 1942, something very
strange happened in the Telegraph's
340
00:26:22,340 --> 00:26:23,340
crossword.
341
00:26:24,110 --> 00:26:28,610
The crossword puzzle clue was a French
port. The answer was Dieppe.
342
00:26:28,930 --> 00:26:33,970
The big question was, was the word
Dieppe in the crossword puzzle innocent,
343
00:26:33,970 --> 00:26:38,130
was it a warning to the Nazis, alerting
them that an attack was imminent?
344
00:26:38,630 --> 00:26:44,210
Is it possible that the Dieppe attack
failed because of that crossword puzzle
345
00:26:44,210 --> 00:26:45,210
answer?
346
00:26:45,610 --> 00:26:51,430
Was a spy sending top -secret Allied
intelligence to the Nazis through
347
00:26:51,430 --> 00:26:52,430
puzzles?
348
00:26:53,810 --> 00:26:58,150
After interrogating the creator of the
crossword, mild -mannered schoolteacher
349
00:26:58,150 --> 00:27:03,250
named Leonard Dahl, British intelligence
concluded that the puzzle's use of the
350
00:27:03,250 --> 00:27:07,750
word Dieppe was nothing more than a
remarkable coincidence.
351
00:27:08,830 --> 00:27:15,210
It seemed the case was closed until two
years later, when code words started to
352
00:27:15,210 --> 00:27:17,390
appear in the newspaper's puzzle again.
353
00:27:19,660 --> 00:27:26,620
In 1944, the Allies were planning the D
-Day invasion amidst a huge blanket of
354
00:27:26,620 --> 00:27:33,380
secrecy. And once again, the Daily
Telegraph crossword starts spitting
355
00:27:33,380 --> 00:27:37,260
out information that should not be in
the public domain.
356
00:27:37,860 --> 00:27:43,100
About three weeks before the invasion,
in the Daily Telegraph, in the crossword
357
00:27:43,100 --> 00:27:45,240
puzzle, the code word Utah appears.
358
00:27:46,320 --> 00:27:49,880
Then a few days later, the code word
Omaha appears.
359
00:27:51,040 --> 00:27:54,040
These are the two beaches where the
American forces will land.
360
00:27:54,960 --> 00:27:58,600
Then the next puzzle, the code word
Overlord appears.
361
00:27:59,460 --> 00:28:02,300
That's the name of the entire mission.
362
00:28:03,320 --> 00:28:04,840
This is becoming terrifying.
363
00:28:05,620 --> 00:28:07,700
Then the word Neptune appears.
364
00:28:07,980 --> 00:28:12,260
That's the code word for the British
warships for D -Day.
365
00:28:12,940 --> 00:28:15,420
And then the word Mulberry appears.
366
00:28:16,120 --> 00:28:20,440
That's the code word for the portable
docks that were built across the
367
00:28:21,000 --> 00:28:25,280
When these code words started appearing,
it was too much of a coincidence.
368
00:28:26,220 --> 00:28:29,940
MI5, we're going to get to the bottom of
it, especially after DF.
369
00:28:30,820 --> 00:28:35,380
Once again, their search eventually led
them to the author of the puzzle,
370
00:28:35,620 --> 00:28:36,620
Leonard Daw.
371
00:28:37,020 --> 00:28:38,660
Is this the Nazi spy?
372
00:28:39,600 --> 00:28:44,300
And finally it was determined that as a
reward for some of the boys at the boys'
373
00:28:44,380 --> 00:28:47,760
school, he would let them pick the word
to put in the crossword.
374
00:28:48,720 --> 00:28:52,440
And there just happened to be a lot of
Allied soldiers stationed nearby.
375
00:28:53,020 --> 00:28:59,300
The kids hear these weird words, Omaha,
Utah, and they say, let's put those in
376
00:28:59,300 --> 00:29:03,460
the puzzle, not realizing they're about
to give away the biggest invasion in
377
00:29:03,460 --> 00:29:04,460
history.
378
00:29:04,720 --> 00:29:08,760
Could the appearance of secret code
names in British crossword puzzles have
379
00:29:08,760 --> 00:29:10,320
simply an extraordinary coincidence?
380
00:29:10,740 --> 00:29:14,780
Or was it a clever spycraft tool? We may
never know for sure.
381
00:29:15,540 --> 00:29:21,320
Like in the case of another workplace 70
years after World War II that some
382
00:29:21,320 --> 00:29:24,720
believed was intended to have deadly
consequences.
383
00:29:27,400 --> 00:29:34,360
In 2012, in Venezuela, there was
speculation that a
384
00:29:34,360 --> 00:29:41,050
crossword puzzle in the daily paper,
contains coded messages that were meant
385
00:29:41,050 --> 00:29:46,150
to signal a threat against the brother
of President Hugo Chavez.
386
00:29:46,890 --> 00:29:49,470
There was asafin, which means to kill.
387
00:29:49,670 --> 00:29:53,570
There was rafagas, which means burst of
machine gun fire.
388
00:29:53,810 --> 00:29:57,950
And there was also the first name of
Chavez's brother.
389
00:29:58,850 --> 00:30:01,570
And so all of this led to the...
390
00:30:01,880 --> 00:30:08,180
conspiracy theory or conspiracy thought
that this must mean that an
391
00:30:08,180 --> 00:30:11,320
assassination attempt was on the horizon
of Chavez's brother.
392
00:30:11,520 --> 00:30:17,300
The government essentially accused the
newspaper and the designer of this
393
00:30:17,300 --> 00:30:22,140
crossword puzzle of a plot and of
transmitting this coded threat.
394
00:30:22,400 --> 00:30:29,000
Whether or not this actually was an
indication of an imminent threat against
395
00:30:29,000 --> 00:30:30,140
Chavez's brother.
396
00:30:30,640 --> 00:30:31,640
I don't know.
397
00:30:32,020 --> 00:30:37,260
No attempt on Adan Chavez's life was
made or at least publicly acknowledged.
398
00:30:37,800 --> 00:30:42,720
If spies really do send secret messages
via crossword puzzles, it's still a
399
00:30:42,720 --> 00:30:48,760
matter of speculation and perhaps an
ingenious method to share confidential
400
00:30:48,760 --> 00:30:51,060
information in plain sight.
401
00:30:51,460 --> 00:30:56,700
There are aspects of that that certainly
match typical tradecraft.
402
00:30:57,040 --> 00:31:03,560
So it's not preposterous to think, that
a crossword puzzle could be used to
403
00:31:03,560 --> 00:31:04,920
deliver a coded message.
404
00:31:05,160 --> 00:31:11,420
In fact, that's a very brilliant way
that you might convey a coded message to
405
00:31:11,420 --> 00:31:12,420
spy.
406
00:31:13,960 --> 00:31:18,380
Sending covert messages through
newspaper crossword puzzles is truly a
407
00:31:18,380 --> 00:31:19,520
way to share secret information.
408
00:31:20,080 --> 00:31:25,240
But there was also a simpler tool spies
used during the Second World War to
409
00:31:25,240 --> 00:31:29,780
communicate in code over vast distances
all you needed.
410
00:31:30,620 --> 00:31:31,620
was a radio.
411
00:31:34,840 --> 00:31:37,400
Chicago, Illinois, October 1978.
412
00:31:38,340 --> 00:31:44,720
With $10 ,000 in his pocket, 29 -year
-old Soviet spy Albrecht Dietrich
413
00:31:44,720 --> 00:31:46,060
in the United States.
414
00:31:47,120 --> 00:31:52,540
Using a stolen birth certificate, he
adopts the alias Jack Barsky and begins
415
00:31:52,540 --> 00:31:57,760
10 -year mission to spy on Americans as
a sleeper agent for the KGB.
416
00:31:59,530 --> 00:32:05,930
A sleeper agent is somebody who
establishes himself in enemy territory
417
00:32:05,930 --> 00:32:10,450
integrates in society and then waits for
the day when it's time to spring into
418
00:32:10,450 --> 00:32:15,710
action. My mission in the United States
focused on me getting close to people
419
00:32:15,710 --> 00:32:20,730
who make foreign policy decisions and or
influence foreign policy.
420
00:32:21,470 --> 00:32:23,610
This is towards the end of the Cold War.
421
00:32:24,590 --> 00:32:30,930
where there was a spy war going on
between the CIA and the KGB, and the
422
00:32:30,930 --> 00:32:32,050
were very high.
423
00:32:34,410 --> 00:32:38,310
After relocating to New York City,
Barsky married and began a family.
424
00:32:38,830 --> 00:32:43,690
He also took a job at an insurance
company to maintain his cover, working
425
00:32:43,690 --> 00:32:44,690
computer programmer.
426
00:32:45,390 --> 00:32:50,370
I had access to lots and lots of data,
and some of the data would have been
427
00:32:50,370 --> 00:32:51,630
important for the KGB.
428
00:32:52,910 --> 00:32:58,450
But there was never a meeting between me
and another KGB agent on the territory
429
00:32:58,450 --> 00:33:02,850
of the United States. I got my
instructions and answers to questions
430
00:33:02,850 --> 00:33:03,850
shortwave radio.
431
00:33:04,890 --> 00:33:11,170
Every Thursday at 9 .15, I had to turn
on my shortwave radio, dial my
432
00:33:11,350 --> 00:33:18,270
listen to the call signal, Morse code,
only digits, no letters, and then start
433
00:33:18,270 --> 00:33:19,390
writing down the numbers.
434
00:33:19,930 --> 00:33:21,270
And there you have your message.
435
00:33:22,320 --> 00:33:27,620
For nearly 10 years, Varsky's primary
tool for communicating with the KGB was
436
00:33:27,620 --> 00:33:31,880
through a kind of shortwave radio
broadcast known as a numbers station.
437
00:33:34,360 --> 00:33:39,860
Numbers stations are essentially pirate
radio stations. You need to register a
438
00:33:39,860 --> 00:33:41,800
radio station. Numbers stations are not
registered.
439
00:33:43,880 --> 00:33:48,160
They were discovered almost accidentally
during the Cold War.
440
00:33:48,670 --> 00:33:52,490
You had ham radio operators bouncing
around different frequencies, talking to
441
00:33:52,490 --> 00:33:53,650
each other all over the world.
442
00:33:53,930 --> 00:33:59,830
And then they would hit upon a certain
channel, and suddenly you hear a robotic
443
00:33:59,830 --> 00:34:01,090
voice repeating numbers.
444
00:34:02,630 --> 00:34:09,610
Or you hear some kind of music
445
00:34:09,610 --> 00:34:11,610
or flute or buzzing sound.
446
00:34:14,280 --> 00:34:17,719
It feels like you're eavesdropping on
something secret, but you don't know
447
00:34:17,719 --> 00:34:18,719
they're saying.
448
00:34:18,920 --> 00:34:25,800
Number stations can transmit signals to
sources globally, and they
449
00:34:25,800 --> 00:34:28,300
can do so undetected.
450
00:34:28,960 --> 00:34:34,000
Because to anyone else, it might just
sound like buzzing or like a series of
451
00:34:34,000 --> 00:34:35,000
noises.
452
00:34:36,440 --> 00:34:43,040
But what they're transmitting are coded
signals to a source in place or a spy.
453
00:34:45,160 --> 00:34:49,540
So even though they're very low -tech,
they're very effective
454
00:34:49,540 --> 00:34:56,520
because they're able to exist and to
455
00:34:56,520 --> 00:34:58,660
communicate under the radar.
456
00:35:00,140 --> 00:35:04,060
During the Cold War, both the United
States and the Soviet Union regularly
457
00:35:04,060 --> 00:35:08,420
employed number stations to communicate
with their agents in the field.
458
00:35:10,100 --> 00:35:14,230
But if anyone with a radio can tune in
to hear the broadcast, How are these
459
00:35:14,230 --> 00:35:16,310
coded spy messages kept secret?
460
00:35:16,530 --> 00:35:21,490
Well, according to experts, it's an
unbreakable method of encryption.
461
00:35:21,810 --> 00:35:27,350
A simple piece of paper known as a one
-time pad.
462
00:35:28,130 --> 00:35:33,870
The one -time pad has little numbers on
him, and there's two identical versions.
463
00:35:33,970 --> 00:35:38,570
One is for the encoding of a message,
and the other one is for the decoding.
464
00:35:38,870 --> 00:35:45,760
Nice. So you would hear something like
9, 7, 6, 4, and
465
00:35:45,760 --> 00:35:48,800
then you could use the decoder to
decrypt your message.
466
00:35:49,540 --> 00:35:54,140
A one -time pad is a sheet of paper with
banks of numbers.
467
00:35:54,640 --> 00:35:59,540
You use this, and someone else that
you're trying to communicate with uses
468
00:35:59,540 --> 00:36:00,540
same pad.
469
00:36:00,560 --> 00:36:04,940
The two of you can then communicate, but
it's called a one -time pad because
470
00:36:04,940 --> 00:36:07,880
after you've used it, you then destroy
it.
471
00:36:08,520 --> 00:36:13,600
assuming that you destroy it, you can
then go on to use the next one -time
472
00:36:13,820 --> 00:36:19,740
and if you keep using it, sticking to
the protocol is uncrackable.
473
00:36:20,820 --> 00:36:25,520
If number stations have proven so
effective in the past, the real question
474
00:36:25,580 --> 00:36:30,220
are spies still sending and receiving
coded messages through them today?
475
00:36:34,320 --> 00:36:38,640
Even today, you can flip through the
different channels and you can hear
476
00:36:38,640 --> 00:36:40,400
over the radio that don't make any
sense.
477
00:36:41,480 --> 00:36:45,400
Whether they're verses being read or
whether they're words being said
478
00:36:45,400 --> 00:36:48,600
nonsensically or whether they're numbers
that are shouted out to the blindness
479
00:36:48,600 --> 00:36:49,600
of space.
480
00:36:51,540 --> 00:36:56,980
So it's very possible somewhere in there
there's a spy message that's sent for a
481
00:36:56,980 --> 00:37:00,240
very specific person at a very specific
time in a very specific way.
482
00:37:01,060 --> 00:37:02,060
One, three.
483
00:37:02,620 --> 00:37:07,600
If spies are still receiving messages
via number stations today, we'll
484
00:37:07,600 --> 00:37:08,600
never know.
485
00:37:09,020 --> 00:37:13,420
But what many experts believe may be
even more concerning when it comes to
486
00:37:13,420 --> 00:37:19,420
national security aren't relics from the
past, but the technologies of today.
487
00:37:23,900 --> 00:37:27,920
Wright -Pattison Air Force Base, Dayton,
Ohio, March 1998.
488
00:37:29,900 --> 00:37:34,460
While doing routine computer
maintenance, the defense contractor
489
00:37:34,460 --> 00:37:40,580
that Russian spies hacked into the
base's network to access top -secret
490
00:37:40,580 --> 00:37:46,040
intelligence from the Pentagon, NASA,
and other U .S. agencies.
491
00:37:46,780 --> 00:37:53,240
It is the first major cyber espionage
operation that we know of in modern
492
00:37:53,240 --> 00:37:54,240
history.
493
00:37:55,080 --> 00:37:59,620
One of the big advancements in
espionage... Something known as the
494
00:37:59,620 --> 00:38:02,740
the spy who lives behind a digital wall
of some sort.
495
00:38:03,360 --> 00:38:07,220
They can steal information. They can
sell information. They can live and hide
496
00:38:07,220 --> 00:38:08,220
the dark web.
497
00:38:08,940 --> 00:38:12,160
This is a whole new development, and
with that development, there's new
498
00:38:12,160 --> 00:38:13,820
opportunities and there's new risks.
499
00:38:15,060 --> 00:38:19,260
We have new technology that cyber spies
can use to meet in cyberspace.
500
00:38:19,620 --> 00:38:23,140
You can meet with them on video game
platforms. You can meet with them in
501
00:38:23,140 --> 00:38:27,360
rooms. You can meet with them using
commercially encrypted technology that
502
00:38:27,360 --> 00:38:31,580
and I carry on our phone, which makes
everything that much more difficult to
503
00:38:31,580 --> 00:38:35,960
track, not just for the FBI or for the
Internal Investigation Agency, but for
504
00:38:35,960 --> 00:38:36,980
anyone to see anywhere.
505
00:38:38,460 --> 00:38:43,320
Advancing technology has empowered cyber
spies to not only hack government
506
00:38:43,320 --> 00:38:48,660
secrets, but also exchange that
information in complete anonymity.
507
00:38:49,370 --> 00:38:54,710
But some cyber spies are not interested
in stealing information, but rather to
508
00:38:54,710 --> 00:38:58,270
influence the very beliefs of their
adversaries.
509
00:38:59,710 --> 00:39:05,010
There's a place called the Internet
Research Agency in St. Petersburg,
510
00:39:05,250 --> 00:39:12,110
where there's a couple hundred nerds
that produce these artificial personas,
511
00:39:12,110 --> 00:39:15,870
then they go on social media and
befriend real people.
512
00:39:17,040 --> 00:39:21,960
And they search out groups that are
ideologically oriented.
513
00:39:22,360 --> 00:39:26,600
There could be, particularly in
politics, there could be the right wing
514
00:39:26,600 --> 00:39:33,560
could be left. And what they're after is
to create confusion in enemy
515
00:39:33,560 --> 00:39:34,560
territory.
516
00:39:36,740 --> 00:39:38,720
I can give you an example.
517
00:39:38,980 --> 00:39:41,560
When you're talking about election
interference...
518
00:39:41,920 --> 00:39:43,540
They planted misinformation.
519
00:39:44,000 --> 00:39:49,000
What they do is raising doubts about the
American system.
520
00:39:50,280 --> 00:39:53,720
These cyber spies are extremely
dangerous.
521
00:39:55,000 --> 00:40:01,460
According to America's cyber defense
agency, CISA, during the 2024 U .S.
522
00:40:01,480 --> 00:40:06,300
presidential election, foreign
adversaries conducted influence
523
00:40:06,300 --> 00:40:11,000
intended to undermine the integrity of U
.S. election.
524
00:40:12,800 --> 00:40:17,980
And while we can't say for sure how
espionage will continue to evolve, we
525
00:40:17,980 --> 00:40:21,920
that as long as there are secrets, there
will be spies.
526
00:40:23,100 --> 00:40:27,080
The future of secrets is in many ways
what will shape the future of espionage.
527
00:40:27,180 --> 00:40:30,140
But that doesn't mean that the history
of espionage is any less useful than it
528
00:40:30,140 --> 00:40:31,129
was in the past.
529
00:40:31,130 --> 00:40:35,150
It's the foundation, it's the bedrock on
which everything else is built. And no
530
00:40:35,150 --> 00:40:38,650
matter where our future takes us, we
know that those building blocks of
531
00:40:38,650 --> 00:40:42,490
espionage, those core fundamentals, will
always be present and always be there.
532
00:40:42,730 --> 00:40:47,290
There will always be people meeting with
people in dark corners to share secrets
533
00:40:47,290 --> 00:40:48,290
that nobody knows about.
534
00:40:50,170 --> 00:40:53,650
In the world of spycraft, everything is
unexplained.
535
00:40:54,050 --> 00:40:59,670
And your job as an intelligence officer
is to try to gather that information.
536
00:41:00,480 --> 00:41:02,040
that will help explain it.
537
00:41:03,020 --> 00:41:09,740
The anomaly of spycraft is that you're
charged with seeking out the
538
00:41:09,740 --> 00:41:16,660
truth. And the reality is you can never
be 100 % sure
539
00:41:16,660 --> 00:41:19,120
that you've gotten to the truth.
540
00:41:19,700 --> 00:41:21,960
You may never have the answers.
541
00:41:23,700 --> 00:41:28,450
While it appears that the digital age
may be changing the art of spycraft,
542
00:41:28,450 --> 00:41:33,170
pretty safe to say that as long as there
are secrets worth stealing, there will
543
00:41:33,170 --> 00:41:34,970
be spies hard at work.
544
00:41:35,530 --> 00:41:41,550
And although we are intrigued by the
elusive double agents at the CIA, or
545
00:41:41,550 --> 00:41:47,470
the assassin who killed with the probe
of an umbrella, it's likely that most
546
00:41:47,470 --> 00:41:53,270
tales of espionage and the covert agents
who operate undetected will stay
547
00:41:53,270 --> 00:41:56,310
top secret and remain.
548
00:41:57,770 --> 00:41:58,810
Unexplained.
50364
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.