Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:02,040 --> 00:00:03,040
WILLIAM SHATNER:
Shadowy assassins
2
00:00:03,200 --> 00:00:05,410
who vanish into the crowd.
3
00:00:05,580 --> 00:00:09,700
Double agents who sell
their own country's secrets.
4
00:00:10,870 --> 00:00:14,750
And coded messages
hiding in plain sight.
5
00:00:17,450 --> 00:00:20,000
Throughout history,
spies have played
6
00:00:20,160 --> 00:00:23,580
a unique role
in shaping world events.
7
00:00:23,700 --> 00:00:27,950
And these secret agents work at
the behest of an organization,
8
00:00:28,120 --> 00:00:30,700
a government or perhaps
even a single leader.
9
00:00:30,870 --> 00:00:33,160
Their covert orders
could range from
10
00:00:33,330 --> 00:00:35,080
simply collecting information
11
00:00:35,250 --> 00:00:37,830
or something as deadly serious
12
00:00:38,040 --> 00:00:40,200
as assassinating an enemy.
13
00:00:41,540 --> 00:00:45,330
Secrecy is critical
to a spy's success,
14
00:00:45,540 --> 00:00:48,370
so how do these masters
of deception fulfill
15
00:00:48,540 --> 00:00:51,620
their assignments
without getting caught?
16
00:00:52,870 --> 00:00:55,790
Well, that is what
we'll try and find out.
17
00:00:55,950 --> 00:00:58,120
♪ ♪
18
00:01:10,040 --> 00:01:13,250
The CIA, MI6
19
00:01:13,410 --> 00:01:15,500
and MSS.
20
00:01:15,580 --> 00:01:18,250
These are the foreign
intelligence services
21
00:01:18,410 --> 00:01:21,080
for some of the most powerful
countries in the world.
22
00:01:21,250 --> 00:01:24,120
These agencies,
and hundreds of others,
23
00:01:24,290 --> 00:01:27,200
engage in clandestine operations
24
00:01:27,370 --> 00:01:30,250
to aid and protect
their countries.
25
00:01:30,410 --> 00:01:33,000
For many,
their mission is to gather
26
00:01:33,160 --> 00:01:35,950
the most closely guarded
secrets of their enemies,
27
00:01:36,120 --> 00:01:39,410
and their secret weapons
are often...
28
00:01:39,620 --> 00:01:42,080
spies.
29
00:01:42,200 --> 00:01:43,330
ASAF LUBIN:
Spies are
30
00:01:43,540 --> 00:01:45,410
utilized by states to collect
31
00:01:45,580 --> 00:01:48,500
intelligence that is necessary
to advance policymaking.
32
00:01:48,660 --> 00:01:51,370
From figuring out
whether an adversary
33
00:01:51,540 --> 00:01:54,910
has nuclear weapons,
to figuring out whether
34
00:01:55,080 --> 00:01:58,080
a leader of a foreign state
is about to die.
35
00:01:58,290 --> 00:02:00,330
We have intelligence agencies
that specialize in
36
00:02:00,410 --> 00:02:03,540
visual intelligence,
say satellite imagery.
37
00:02:03,700 --> 00:02:06,370
We have intelligence agencies
that specialize in
38
00:02:06,540 --> 00:02:08,290
the interception
of communications.
39
00:02:08,450 --> 00:02:10,620
But there are spies
that more commonly
40
00:02:10,790 --> 00:02:12,370
come to mind, which is
41
00:02:12,540 --> 00:02:15,250
the people at the front line,
the individuals
42
00:02:15,410 --> 00:02:18,450
willing to put their lives
at risk to share information.
43
00:02:19,500 --> 00:02:23,160
At the end of the day, it's
a life of mystery and intrigue
44
00:02:23,370 --> 00:02:26,660
because the spy world
is kind of its own domain.
45
00:02:26,870 --> 00:02:29,580
It remains this
kind of puzzle or mystery
46
00:02:29,750 --> 00:02:32,660
that most people
will not have exposure to
47
00:02:32,750 --> 00:02:36,790
beyond those few moments
we read about in the newspaper.
48
00:02:38,540 --> 00:02:41,160
ANDREW BUSTAMANTE:
Hollywood movies
and books and TV
49
00:02:41,330 --> 00:02:44,910
have made it seem like spies
are some kind of superhero.
50
00:02:45,120 --> 00:02:47,620
That is nothing
like real espionage.
51
00:02:47,790 --> 00:02:49,000
The purpose of espionage
52
00:02:49,160 --> 00:02:51,080
is to be so secret
53
00:02:51,250 --> 00:02:53,160
that nobody even knows
you're there.
54
00:02:53,330 --> 00:02:55,830
True professional espionage
55
00:02:56,000 --> 00:02:59,750
is in and out without anyone
ever even knowing it happened.
56
00:02:59,910 --> 00:03:02,370
That makes your average spy
57
00:03:02,580 --> 00:03:05,410
much more like
an average person.
58
00:03:05,620 --> 00:03:09,540
And what's required of a spy
changes from day to day.
59
00:03:09,700 --> 00:03:11,750
One day,
we're hunting terrorists.
60
00:03:11,910 --> 00:03:16,200
Sometime later, we're exchanging
information in secret.
61
00:03:16,370 --> 00:03:18,750
Some days, we're fighting
a war on drugs.
62
00:03:18,910 --> 00:03:21,830
Some days, we're fighting
a war on misinformation.
63
00:03:22,000 --> 00:03:23,290
It's an incredible
64
00:03:23,410 --> 00:03:26,330
web of information and impact
65
00:03:26,450 --> 00:03:28,410
that the average person
is not aware of.
66
00:03:29,870 --> 00:03:31,330
SHATNER:
How can we ever hope
67
00:03:31,450 --> 00:03:33,580
to understand the mysterious
world of espionage
68
00:03:33,700 --> 00:03:37,160
if it remains
completely hidden from us?
69
00:03:37,290 --> 00:03:41,160
Well, every so often,
information does come to light
70
00:03:41,370 --> 00:03:44,120
that illustrates
how a single spy
71
00:03:44,250 --> 00:03:46,700
can change
the course of history.
72
00:03:54,540 --> 00:03:58,410
A massive scientific complex
is established in secret
73
00:03:58,580 --> 00:04:02,000
for the research and development
of a truly devastating weapon.
74
00:04:02,200 --> 00:04:04,410
This laboratory
becomes ground zero
75
00:04:04,540 --> 00:04:06,540
for the most consequential
76
00:04:06,700 --> 00:04:09,750
top secret military program
ever devised.
77
00:04:10,750 --> 00:04:14,620
It's called
the Manhattan Project.
78
00:04:14,830 --> 00:04:17,410
KAI BIRD:
The Manhattan Project
was this top secret,
79
00:04:17,540 --> 00:04:21,120
federally funded
$2 billion program
80
00:04:21,200 --> 00:04:23,660
to explore whether
it was possible to develop
81
00:04:23,830 --> 00:04:27,000
an atomic weapon
82
00:04:27,200 --> 00:04:28,790
in the midst of World War II.
83
00:04:28,910 --> 00:04:32,500
And they built this
secret city in Los Alamos,
84
00:04:32,660 --> 00:04:35,580
gathering together
chemists and engineers
85
00:04:35,750 --> 00:04:38,200
and physicists
and other scientists
86
00:04:38,410 --> 00:04:42,120
into one spot so that these
scientists can collaborate
87
00:04:42,330 --> 00:04:46,160
and fully converse
inside the secret city
88
00:04:46,370 --> 00:04:48,160
to build this weapon.
89
00:04:48,370 --> 00:04:50,700
SHATNER:
As history shows,
these scientists
90
00:04:50,870 --> 00:04:54,950
would prove successful
in creating the atomic bomb.
91
00:04:55,120 --> 00:04:57,910
But little did
they know at the time
92
00:04:58,040 --> 00:04:59,700
there was a spy among them,
93
00:04:59,870 --> 00:05:03,250
sharing the program's
most intimate secrets.
94
00:05:04,910 --> 00:05:07,580
His codename was "Rest,"
95
00:05:07,750 --> 00:05:10,290
but his identity
has since been revealed
96
00:05:10,450 --> 00:05:15,450
to be a German physicist
named Klaus Fuchs.
97
00:05:15,620 --> 00:05:17,410
LUBIN:
Klaus came from Germany,
98
00:05:17,580 --> 00:05:20,700
and because of his... his
prior background as a physicist,
99
00:05:20,870 --> 00:05:22,160
he quickly got a job
100
00:05:22,370 --> 00:05:25,660
within the Manhattan Program
in Los Alamos.
101
00:05:25,870 --> 00:05:28,410
And, unknown to
the people there,
102
00:05:28,540 --> 00:05:30,450
Fuchs began to share information
103
00:05:30,620 --> 00:05:34,080
with the Soviets
about the program.
104
00:05:34,250 --> 00:05:36,660
A U.S. counterintelligence
program
105
00:05:36,870 --> 00:05:40,500
that involved decrypting
Soviet communications
106
00:05:40,700 --> 00:05:43,330
revealed the scope
of the information
107
00:05:43,500 --> 00:05:47,000
that Fuchs collected
and shared with the Soviets.
108
00:05:47,120 --> 00:05:48,750
In his particular role
109
00:05:48,910 --> 00:05:52,330
as a lead scientist
within the program and access
110
00:05:52,540 --> 00:05:54,290
to the development of the bomb,
111
00:05:54,500 --> 00:05:56,250
he was able to share
112
00:05:56,410 --> 00:05:58,500
pretty detailed technical
information about
113
00:05:58,620 --> 00:06:00,830
the science that goes into
114
00:06:00,950 --> 00:06:03,580
the generation
and enrichment of plutonium,
115
00:06:03,700 --> 00:06:07,250
which served
a huge deal in advancing
116
00:06:07,410 --> 00:06:09,950
the Russians' capacities
in those spaces.
117
00:06:10,950 --> 00:06:13,750
And he collected intelligence
and shared intelligence
118
00:06:13,870 --> 00:06:17,000
for about seven years,
until he was revealed.
119
00:06:18,330 --> 00:06:21,500
The greatest find in
the history of espionage
120
00:06:21,660 --> 00:06:25,080
is the theft
of the atomic secret.
121
00:06:25,200 --> 00:06:28,040
Klaus Fuchs pretty much
shared the recipe
122
00:06:28,200 --> 00:06:30,040
with the Soviet Union.
123
00:06:30,200 --> 00:06:34,500
The Soviet Union was able
to get a nuclear weapon
124
00:06:34,700 --> 00:06:36,160
roughly five years
before they could have
125
00:06:36,370 --> 00:06:38,580
done it on their own.
126
00:06:38,750 --> 00:06:41,500
The moment they had the nuke,
they were a world power.
127
00:06:41,700 --> 00:06:44,830
SHATNER:
If one spy can alter
the course of atomic history,
128
00:06:45,000 --> 00:06:48,700
how else has espionage
shaped our world?
129
00:06:49,870 --> 00:06:53,500
Has secret intelligence
informed nearly every
130
00:06:53,580 --> 00:06:56,370
major event in human history?
131
00:06:57,790 --> 00:06:59,160
BUSTAMANTE:
You have to assume
132
00:06:59,330 --> 00:07:01,910
that you only know
about five percent
133
00:07:02,040 --> 00:07:03,830
of all espionage operations.
134
00:07:04,040 --> 00:07:06,580
Every negotiation,
every diplomatic agreement,
135
00:07:06,790 --> 00:07:08,660
every transition
of power from one president
136
00:07:08,870 --> 00:07:11,000
to another president,
for 167 countries,
137
00:07:11,200 --> 00:07:13,870
all over the world,
over the course of decades,
138
00:07:14,040 --> 00:07:16,500
intelligence had a role
to play in every one of those.
139
00:07:16,700 --> 00:07:19,000
So now, when you
start to ask yourself
140
00:07:19,120 --> 00:07:21,160
about how the Soviet Union fell,
141
00:07:21,290 --> 00:07:22,540
and you start
to ask yourself about
142
00:07:22,700 --> 00:07:25,000
how the end
of Afghanistan happened,
143
00:07:25,160 --> 00:07:26,830
and the winning of Gulf War II,
144
00:07:26,950 --> 00:07:29,080
and the taking down
of Saddam Hussein,
145
00:07:29,200 --> 00:07:33,330
you start to see these
major instances in history
146
00:07:33,500 --> 00:07:36,660
where intelligence
worked or failed.
147
00:07:36,830 --> 00:07:39,330
So, when you try to consider
148
00:07:39,450 --> 00:07:41,160
the impact
that espionage has had
149
00:07:41,370 --> 00:07:44,330
over the long-term
history of the world,
150
00:07:44,540 --> 00:07:46,870
you have to remember
that 95% of what they've done,
151
00:07:47,040 --> 00:07:48,330
nobody knows about
152
00:07:48,540 --> 00:07:51,830
except for "need to know"
secret circles.
153
00:07:52,040 --> 00:07:55,580
LINDSAY MORAN:
It's really pretty chilling
if you think about the effect
154
00:07:55,700 --> 00:07:59,450
that just a single spy
or intelligence source
155
00:07:59,580 --> 00:08:01,660
can have on world events.
156
00:08:01,790 --> 00:08:03,160
And the irony is that
157
00:08:03,330 --> 00:08:05,200
we often don't know
158
00:08:05,410 --> 00:08:07,830
what that impact is
until many years
159
00:08:08,040 --> 00:08:11,790
or even decades later,
or sometimes, ever at all.
160
00:08:12,750 --> 00:08:16,830
Even historians looking back
161
00:08:17,040 --> 00:08:19,290
on historical events
or geopolitical movements,
162
00:08:19,450 --> 00:08:21,830
may never have access
163
00:08:22,000 --> 00:08:26,290
to the behind-the-scenes
intrigue and espionage
164
00:08:26,410 --> 00:08:28,500
that took place,
or the machinations
165
00:08:28,660 --> 00:08:30,790
of various intelligence
organizations.
166
00:08:30,910 --> 00:08:35,250
But for sure, spies really can
change the course of history.
167
00:08:46,830 --> 00:08:48,910
SHATNER:
This sleek, modern building
168
00:08:49,080 --> 00:08:51,660
houses over
7,000 unique artifacts
169
00:08:51,750 --> 00:08:54,290
from the history of espionage.
170
00:08:54,450 --> 00:08:56,660
And among them
are ingenious devices
171
00:08:56,830 --> 00:08:58,620
created to hide things,
172
00:08:58,790 --> 00:09:01,450
record secret conversations,
173
00:09:01,620 --> 00:09:07,000
and some are even meant to kill.
174
00:09:07,160 --> 00:09:09,160
The International Spy Museum
175
00:09:09,370 --> 00:09:11,500
houses the world's
largest collection
176
00:09:11,660 --> 00:09:14,750
of intelligence and
espionage-related artifacts.
177
00:09:14,870 --> 00:09:18,000
We have all kinds
of ingenious devices
178
00:09:18,160 --> 00:09:20,660
to do all type of
different types of stuff.
179
00:09:20,870 --> 00:09:23,160
So, a lot of
the gadgets that we see
180
00:09:23,330 --> 00:09:25,200
are there to try to help
181
00:09:25,370 --> 00:09:26,830
to be a more effective agent,
182
00:09:26,910 --> 00:09:30,700
to recruit spies better,
to steal secrets better.
183
00:09:30,870 --> 00:09:33,620
And we've got a fantastic
184
00:09:33,790 --> 00:09:35,660
James Bond collection.
185
00:09:36,580 --> 00:09:37,950
Some of the James Bond movies
186
00:09:38,160 --> 00:09:40,450
have actually
influenced the development
187
00:09:40,540 --> 00:09:42,950
of gadgets in the CIA.
188
00:09:43,120 --> 00:09:46,830
CIA directors come out
of the movie theater
189
00:09:47,040 --> 00:09:49,660
and say, "Guys, do we
have anything like this?
190
00:09:49,870 --> 00:09:52,160
And if we don't,
can someone get on it?"
191
00:09:52,250 --> 00:09:55,370
So we know that there's
a two-way interaction between
192
00:09:55,540 --> 00:09:58,950
the gadgets in fiction
and in reality.
193
00:10:00,750 --> 00:10:02,410
When you look at spy gadgets,
a lot of them
194
00:10:02,620 --> 00:10:04,750
are weapons
of one thing or another.
195
00:10:04,910 --> 00:10:06,950
They're always trying
to come up with new gadgets.
196
00:10:08,000 --> 00:10:11,330
So, the KGB came up
with a lipstick gun,
197
00:10:11,540 --> 00:10:13,910
which was
a little 4.5 millimeter bullet
198
00:10:14,080 --> 00:10:16,080
that could be fired from
a lipstick tube.
199
00:10:16,200 --> 00:10:18,870
The CIA had an ice gun,
200
00:10:19,040 --> 00:10:22,580
which fired
a super-cool needle of ice,
201
00:10:22,750 --> 00:10:24,450
preferably through
your opponent's heart.
202
00:10:24,620 --> 00:10:26,700
That was all around 1960.
203
00:10:26,870 --> 00:10:29,040
And then, there are
famous exploding cigars,
204
00:10:29,200 --> 00:10:32,660
with which they were going
to blow off Fidel Castro's head.
205
00:10:32,870 --> 00:10:34,870
But to the extent
that secret weapons,
206
00:10:35,040 --> 00:10:37,120
spy weapons programs exist,
207
00:10:37,290 --> 00:10:40,790
they're secret, which is why
you don't know about them,
208
00:10:40,950 --> 00:10:42,580
because you're not supposed to.
209
00:10:43,660 --> 00:10:44,830
SHATNER: Over the years,
some spy gadgets
210
00:10:44,950 --> 00:10:46,500
have either been declassified
211
00:10:46,700 --> 00:10:48,500
or leaked to the public.
212
00:10:48,620 --> 00:10:51,450
However, what's less clear
213
00:10:51,620 --> 00:10:53,200
is whether any
of these fantastical
214
00:10:53,370 --> 00:10:55,370
and frankly bizarre devices
215
00:10:55,540 --> 00:10:58,080
were ever successfully
put to use.
216
00:10:59,200 --> 00:11:01,410
But there is a curious
instrument of death
217
00:11:01,540 --> 00:11:02,910
that many believe
was responsible
218
00:11:03,120 --> 00:11:05,790
for one of the most
infamous and unsolved
219
00:11:05,950 --> 00:11:08,540
assassinations
of the 20th century:
220
00:11:08,700 --> 00:11:11,410
The 1978 murder
221
00:11:11,580 --> 00:11:14,910
of British journalist
Georgi Markov.
222
00:11:16,080 --> 00:11:17,830
JACK BARSKY:
Markov was a dissident
223
00:11:18,000 --> 00:11:20,500
in Bulgaria, and he was loud.
224
00:11:20,620 --> 00:11:23,450
And, uh, he... he had to flee.
225
00:11:23,620 --> 00:11:25,080
He wound up
in the United Kingdom,
226
00:11:25,250 --> 00:11:28,580
and he got employed
by, uh, the BBC
227
00:11:28,700 --> 00:11:31,620
and Radio Free Europe,
228
00:11:31,750 --> 00:11:34,910
which we absolutely hated
because it was
229
00:11:35,080 --> 00:11:38,870
Western propaganda
directed to the East.
230
00:11:39,040 --> 00:11:40,700
And he got louder and louder,
231
00:11:40,870 --> 00:11:42,500
and, uh, the Bulgarians,
232
00:11:42,620 --> 00:11:43,830
I think it was the president,
233
00:11:44,000 --> 00:11:45,200
he wanted
to get rid of this guy.
234
00:11:46,330 --> 00:11:48,370
SHATNER: On September 7, 1978,
235
00:11:48,540 --> 00:11:50,290
at around 1:30 p.m.,
236
00:11:50,450 --> 00:11:53,290
Markov was about to catch a bus
237
00:11:53,450 --> 00:11:55,500
on the Waterloo Bridge
in London,
238
00:11:55,660 --> 00:11:59,370
when something
very strange happens.
239
00:12:00,410 --> 00:12:03,330
NIGEL WEST:
Georgi Markov bumps
into somebody
240
00:12:03,540 --> 00:12:04,660
at a bus stop,
241
00:12:04,830 --> 00:12:05,870
and this individual
242
00:12:06,000 --> 00:12:07,330
is carrying an umbrella.
243
00:12:08,620 --> 00:12:10,040
And Georgi Markov feels
244
00:12:10,200 --> 00:12:13,660
some pain in his leg.
245
00:12:13,830 --> 00:12:16,500
And the individual concerned
246
00:12:16,660 --> 00:12:19,700
mutters an apology
and climbs into a taxi.
247
00:12:19,830 --> 00:12:21,950
And Markov,
from that moment onwards,
248
00:12:22,120 --> 00:12:24,160
becomes ill.
249
00:12:24,330 --> 00:12:27,200
He goes to hospital
later that night,
250
00:12:27,370 --> 00:12:28,700
and a few days later,
251
00:12:28,870 --> 00:12:34,120
he succumbs
to a very severe infection.
252
00:12:36,660 --> 00:12:39,120
SPENCE:
Doctors who've examined his body
253
00:12:39,290 --> 00:12:41,910
found red swelling
on the back of his thigh
254
00:12:42,080 --> 00:12:45,450
and, in
a microscopic examination
255
00:12:45,620 --> 00:12:49,330
of the flesh
from the wound site,
256
00:12:49,500 --> 00:12:50,950
they discovered a tiny,
257
00:12:51,080 --> 00:12:55,950
tiny, less than
two-millimeter size little ball,
258
00:12:56,120 --> 00:12:58,790
mostly made out of platinum,
259
00:12:58,950 --> 00:13:01,580
which had holes drilled in it
260
00:13:01,750 --> 00:13:04,330
as a means
to administer a poison.
261
00:13:04,540 --> 00:13:08,370
The poison, which has never
been officially identified,
262
00:13:08,540 --> 00:13:10,660
was most likely ricin,
263
00:13:10,830 --> 00:13:12,910
which is a highly
toxic substance,
264
00:13:13,080 --> 00:13:15,750
which is refined
from castor beans.
265
00:13:16,870 --> 00:13:19,500
SHATNER:
How was this
deadly platinum ball
266
00:13:19,700 --> 00:13:22,120
implanted into Georgi Markov?
267
00:13:22,250 --> 00:13:25,040
Answers were not
easy to come by, but then,
268
00:13:25,200 --> 00:13:28,700
investigators remembered
one seemingly minor detail
269
00:13:28,870 --> 00:13:32,250
that may provide
all the answers.
270
00:13:32,450 --> 00:13:34,000
SPENCE:
They thought,
"Ah, that umbrella.
271
00:13:34,200 --> 00:13:36,000
Eh, what was that all about?"
272
00:13:36,200 --> 00:13:38,660
And later, we learn that
one of the things that both
273
00:13:38,870 --> 00:13:40,830
the KGB and the Bulgarians
had come up with
274
00:13:41,000 --> 00:13:42,500
was an umbrella gun.
275
00:13:42,660 --> 00:13:45,660
They had a whole lab
working on this.
276
00:13:45,750 --> 00:13:48,500
And there was
a little tiny capsule,
277
00:13:48,660 --> 00:13:49,790
it was in the tip
of the umbrella,
278
00:13:49,950 --> 00:13:51,410
which had a needle on it,
279
00:13:51,540 --> 00:13:54,790
and you'd just poke somebody
and then walked away.
280
00:13:56,160 --> 00:13:58,700
BUSTAMANTE:
How do you kill somebody
in plain daylight,
281
00:13:58,870 --> 00:14:01,000
in public, without
anybody knowing about it?
282
00:14:01,160 --> 00:14:02,660
And the answer is
that you find a way
283
00:14:02,870 --> 00:14:04,410
to create some sort
of device, like an umbrella,
284
00:14:04,540 --> 00:14:07,160
that blends in every day,
285
00:14:07,290 --> 00:14:09,910
but can still deliver a lethal
dose when you need it to.
286
00:14:10,080 --> 00:14:10,830
-(umbrella clicks)
-(man grunts)
287
00:14:10,950 --> 00:14:12,370
This is exactly what makes
288
00:14:12,540 --> 00:14:14,080
spy agencies and spy tech
289
00:14:14,250 --> 00:14:16,200
something of
interest and renown,
290
00:14:16,370 --> 00:14:18,290
because there's
a great deal of effort,
291
00:14:18,450 --> 00:14:19,830
a great deal of investment
292
00:14:19,950 --> 00:14:22,160
that's put into making
a clandestine weapon.
293
00:14:23,200 --> 00:14:26,790
SHATNER:
The umbrella suspected
of killing Georgi Markov
294
00:14:26,950 --> 00:14:29,410
was never recovered,
so investigators
295
00:14:29,580 --> 00:14:31,660
had no way
to definitively confirm
296
00:14:31,870 --> 00:14:34,500
such a device was
responsible for his murder.
297
00:14:35,540 --> 00:14:39,200
But as far as the identity
of the mysterious assassin
298
00:14:39,370 --> 00:14:40,750
who bumped into Markov,
299
00:14:40,950 --> 00:14:44,500
well... that's another mystery.
300
00:14:45,580 --> 00:14:47,910
BARSKY:
When it comes
to assassinating people,
301
00:14:48,080 --> 00:14:50,870
we know that the KGB did
quite a... quite a bit of that,
302
00:14:51,040 --> 00:14:53,330
and we know that the Russian
intelligence does it now, too.
303
00:14:53,540 --> 00:14:55,160
There's an arsenal of weapons.
304
00:14:55,330 --> 00:14:59,120
And Markov was
a very loud dissident.
305
00:14:59,290 --> 00:15:02,370
So, he was an enemy
of the revolution,
306
00:15:02,540 --> 00:15:04,370
and he had to be killed.
307
00:15:04,540 --> 00:15:06,660
But the man who was seen
308
00:15:06,830 --> 00:15:09,660
to stick that umbrella
into Markov's leg,
309
00:15:09,830 --> 00:15:11,370
I think he got away with this.
310
00:15:13,410 --> 00:15:16,290
ANDREW HAMMOND:
What history says about the
assassination of Georgi Markov
311
00:15:16,410 --> 00:15:19,330
is a little similar
to "Who was Jack the Ripper?"
312
00:15:19,500 --> 00:15:21,120
"Who killed JFK?"
313
00:15:21,250 --> 00:15:23,080
What's the final
definitive story?
314
00:15:23,250 --> 00:15:26,200
Hopefully, we'll know one day,
maybe we never will.
315
00:15:27,540 --> 00:15:29,410
SHATNER:
Today, a replica of
the notorious umbrella
316
00:15:29,620 --> 00:15:33,250
hangs in the International
Spy Museum's collection.
317
00:15:33,410 --> 00:15:35,700
And while it can never be
proven that a similar device
318
00:15:35,870 --> 00:15:38,830
was used
to poison Georgi Markov,
319
00:15:39,000 --> 00:15:40,660
one thing is certain:
320
00:15:40,830 --> 00:15:43,330
The deadly tools of spy craft
321
00:15:43,540 --> 00:15:45,540
could be made
to look like anything,
322
00:15:45,700 --> 00:15:47,330
and you wouldn't know it
323
00:15:47,540 --> 00:15:50,580
until it's too late.
324
00:15:52,410 --> 00:15:53,580
SPENCE: In terms of
325
00:15:53,750 --> 00:15:55,330
what could be
future spy weapons,
326
00:15:55,500 --> 00:15:57,750
secret spy gadgets
they could come up with,
327
00:15:57,870 --> 00:16:01,700
well, one of them
is tiny, tiny drones
328
00:16:01,870 --> 00:16:04,040
that could fly
inside you, perhaps,
329
00:16:04,200 --> 00:16:07,450
administer poisons,
carry tiny cameras.
330
00:16:07,580 --> 00:16:10,250
The use of frequency weapons
might be something else.
331
00:16:10,410 --> 00:16:14,250
Essentially, some sort
of energy beam
332
00:16:14,410 --> 00:16:17,120
which is being
directed at people,
333
00:16:17,290 --> 00:16:20,000
affecting the brain in some way,
334
00:16:20,120 --> 00:16:22,450
which would create
feelings of disorientation,
335
00:16:22,620 --> 00:16:24,580
and if it managed to
336
00:16:24,750 --> 00:16:26,870
discombobulate
the right targets,
337
00:16:27,040 --> 00:16:28,830
it could interfere with
338
00:16:29,000 --> 00:16:31,500
their ability
to perform their duties.
339
00:16:32,750 --> 00:16:35,040
So, energy weapons
could be useful
340
00:16:35,200 --> 00:16:37,120
in the world of spies.
341
00:16:37,290 --> 00:16:39,750
But yes, there's
a secret war to always try
342
00:16:39,910 --> 00:16:41,660
to be one step
ahead of your opponent
343
00:16:41,830 --> 00:16:45,160
by coming up with something that
they hadn't thought of... yet.
344
00:16:45,330 --> 00:16:49,080
And it can be someone
passing you by with an umbrella.
345
00:16:50,250 --> 00:16:53,040
Was the assassination
of Georgi Markov
346
00:16:53,200 --> 00:16:55,450
the work of Soviet intelligence?
347
00:16:55,660 --> 00:16:58,160
Like the top secret nature
of espionage itself,
348
00:16:58,330 --> 00:17:00,370
there's a lot we may never know.
349
00:17:01,870 --> 00:17:04,040
But there is one spy mystery
350
00:17:04,200 --> 00:17:08,120
that has intelligence
officers worried, even now.
351
00:17:08,330 --> 00:17:10,830
It involves a foreign asset
352
00:17:10,950 --> 00:17:13,330
who infiltrated
the American government
353
00:17:13,500 --> 00:17:17,370
intent on stealing
national secrets.
354
00:17:26,830 --> 00:17:28,290
SHATNER:
President Harry Truman
355
00:17:28,370 --> 00:17:32,160
establishes the Central
Intelligence Agency.
356
00:17:32,330 --> 00:17:34,160
In the wake of World War II,
357
00:17:34,290 --> 00:17:36,410
and with the rise
of atomic weaponry,
358
00:17:36,580 --> 00:17:40,660
a new covert war
is about to begin
359
00:17:40,830 --> 00:17:44,000
between the United States
and the Soviet Union.
360
00:17:44,160 --> 00:17:47,870
This unprecedented era
of espionage
361
00:17:48,040 --> 00:17:51,830
from 1947 to 1991 is known
362
00:17:52,000 --> 00:17:53,700
as the Cold War.
363
00:17:55,450 --> 00:17:59,540
LUBIN:
At the start of the Cold War
as we know it in the 1950s,
364
00:17:59,700 --> 00:18:01,250
the U.S. realized
that it needed to advance
365
00:18:01,410 --> 00:18:03,500
its internal security measures.
366
00:18:03,620 --> 00:18:05,160
This is why Truman
367
00:18:05,370 --> 00:18:09,250
would ultimately generate
a presidential executive order
368
00:18:09,370 --> 00:18:13,000
on confidential materials,
369
00:18:13,160 --> 00:18:15,200
which still, to this day,
is the way by which
370
00:18:15,370 --> 00:18:18,250
we set different degrees
of confidentiality
371
00:18:18,410 --> 00:18:21,330
around secret documents
here in the United States.
372
00:18:22,370 --> 00:18:24,500
SHATNER:
During the Cold War,
both the CIA
373
00:18:24,700 --> 00:18:26,500
and the Soviet Union's KGB
374
00:18:26,700 --> 00:18:29,370
employed spies
to steal each other's
375
00:18:29,580 --> 00:18:31,000
national secrets.
376
00:18:31,160 --> 00:18:33,290
And while any civilian
could be recruited
377
00:18:33,500 --> 00:18:36,580
to spy on their home country
for the other side,
378
00:18:36,700 --> 00:18:40,000
even more valuable
were those already working
379
00:18:40,160 --> 00:18:42,160
in the intelligence community.
380
00:18:42,370 --> 00:18:45,580
These turncoats are known as...
381
00:18:45,750 --> 00:18:47,330
double agents.
382
00:18:47,540 --> 00:18:48,950
HAMMOND:
To be a double agent,
383
00:18:49,120 --> 00:18:51,700
for example, I'm an agent.
384
00:18:51,870 --> 00:18:54,290
I'm working
with the CIA over here.
385
00:18:54,410 --> 00:18:57,330
But I'm also working
with the KGB over here.
386
00:18:57,540 --> 00:19:00,290
I'm a double agent
in the middle.
387
00:19:00,450 --> 00:19:03,950
But it's quite often used
in shorthand to refer
388
00:19:04,120 --> 00:19:06,160
to anybody who works
in this world
389
00:19:06,330 --> 00:19:08,660
who also works
for the other side.
390
00:19:08,790 --> 00:19:12,750
LUBIN:
There will be a closed universe
of individuals in the know
391
00:19:12,870 --> 00:19:14,500
about particular secrets,
392
00:19:14,660 --> 00:19:17,450
and you need to penetrate those
kinds of closed networks.
393
00:19:17,620 --> 00:19:20,660
And so, the best way
to do that is by
394
00:19:20,790 --> 00:19:22,370
turning a double agent,
395
00:19:22,540 --> 00:19:25,660
a person,
into an information sharer.
396
00:19:27,700 --> 00:19:29,450
SHATNER: The U.S.
intelligence community
397
00:19:29,540 --> 00:19:33,040
is made up of 18 different
agencies and organizations.
398
00:19:33,200 --> 00:19:34,950
So, we have to wonder,
399
00:19:35,120 --> 00:19:38,250
are there
double agents among them,
400
00:19:38,370 --> 00:19:41,120
sharing our most
closely guarded secrets
401
00:19:41,250 --> 00:19:42,750
with our enemies?
402
00:19:42,910 --> 00:19:47,120
Remarkably, the answer is yes.
403
00:19:48,870 --> 00:19:52,580
And many consider the most
damaging double agent ever
404
00:19:52,750 --> 00:19:55,660
discovered was
a 31-year veteran of the CIA
405
00:19:55,830 --> 00:19:58,790
named Aldrich Ames.
406
00:19:58,910 --> 00:20:01,660
WEST:
Aldrich Ames was
a counterintelligence officer
407
00:20:01,790 --> 00:20:03,660
in the directorate
408
00:20:03,830 --> 00:20:05,040
of operations.
409
00:20:05,250 --> 00:20:06,830
And he was a senior individual
410
00:20:07,000 --> 00:20:08,120
who in 1985,
411
00:20:08,290 --> 00:20:10,080
as a result of a bad divorce,
412
00:20:10,250 --> 00:20:12,160
was short of money,
413
00:20:12,330 --> 00:20:14,330
and he sold out to the Soviets.
414
00:20:14,410 --> 00:20:17,450
He just simply went
to the embassy,
415
00:20:17,620 --> 00:20:20,330
asked to speak to a KGB officer,
416
00:20:20,540 --> 00:20:24,450
and then sold information
through letters,
417
00:20:24,580 --> 00:20:27,000
which was highly classified
operations,
418
00:20:27,160 --> 00:20:31,370
and a large number of identities
419
00:20:31,580 --> 00:20:36,200
who were people who had worked
either for the FBI or the CIA
420
00:20:36,370 --> 00:20:39,750
in the Soviet embassy
in Washington, D.C.
421
00:20:41,450 --> 00:20:43,000
MORAN:
There were suspicions
422
00:20:43,160 --> 00:20:46,830
that there was a spy
within the CIA
423
00:20:47,000 --> 00:20:49,290
because in the 1980s,
424
00:20:49,450 --> 00:20:52,500
many of our Russian sources
425
00:20:52,700 --> 00:20:53,830
in Russia
426
00:20:54,040 --> 00:20:55,580
started kind of dropping
like flies.
427
00:20:55,750 --> 00:21:00,370
And this set off
alarm bells at the CIA.
428
00:21:00,540 --> 00:21:04,290
And so an investigation
was launched.
429
00:21:04,450 --> 00:21:08,330
But, bizarrely, it took many,
many years to realize
430
00:21:08,540 --> 00:21:10,160
that it was Aldrich Ames,
431
00:21:10,330 --> 00:21:13,370
even though
Aldrich Ames displayed
432
00:21:13,580 --> 00:21:15,410
many of the characteristics
433
00:21:15,580 --> 00:21:18,950
of what would be
a viable target for recruitment.
434
00:21:19,120 --> 00:21:22,330
He had a known problem
with alcohol.
435
00:21:22,540 --> 00:21:27,620
He had married a Colombian woman
who had very expensive tastes.
436
00:21:27,750 --> 00:21:30,750
He bought a house
in Virginia with cash
437
00:21:30,910 --> 00:21:34,000
for $540,000.
438
00:21:34,200 --> 00:21:36,500
He bought a Jaguar.
439
00:21:36,700 --> 00:21:38,950
He started to dress really well.
440
00:21:39,120 --> 00:21:40,620
He got new teeth.
441
00:21:40,830 --> 00:21:45,580
And all of these are
pretty obvious indicators
442
00:21:45,790 --> 00:21:49,950
that someone is working for
a foreign intelligence service
443
00:21:50,080 --> 00:21:52,910
because he couldn't afford
all that on his CIA salary.
444
00:21:53,910 --> 00:21:56,000
Aldrich Ames is
one of the most famous
445
00:21:56,120 --> 00:21:57,830
CIA compromises of all times.
446
00:21:58,000 --> 00:22:00,700
He went many, many years
clandestinely acquiring
447
00:22:00,870 --> 00:22:02,620
and giving information
to the Russians
448
00:22:02,700 --> 00:22:05,410
until his ultimate arrest
in the 1990s.
449
00:22:06,500 --> 00:22:08,450
It's very difficult
to be able to quantify
450
00:22:08,620 --> 00:22:11,330
the amount of damage
that Aldrich Ames did.
451
00:22:11,540 --> 00:22:14,910
We know that CIA spies were
systematically killed.
452
00:22:15,120 --> 00:22:16,500
And even to this day,
453
00:22:16,660 --> 00:22:19,160
CIA is always training
new recruits
454
00:22:19,370 --> 00:22:21,040
to understand Aldrich Ames
455
00:22:21,200 --> 00:22:22,330
to make sure
that they don't have
456
00:22:22,540 --> 00:22:24,450
another instance like that
happen again.
457
00:22:24,620 --> 00:22:28,200
SHATNER:
Aldrich Ames was sentenced
to life in prison.
458
00:22:28,330 --> 00:22:30,750
And his wife, Rosario,
got five years for aiding
459
00:22:30,910 --> 00:22:34,950
her husband in his crimes
against the United States.
460
00:22:36,000 --> 00:22:39,000
But Ames was not the only
double agent discovered inside
461
00:22:39,160 --> 00:22:41,950
an American intelligence agency.
462
00:22:42,120 --> 00:22:43,660
In 2001,
463
00:22:43,870 --> 00:22:48,500
an FBI agent named
Robert Hanssen was arrested
464
00:22:48,700 --> 00:22:50,500
for selling
highly classified information
465
00:22:50,620 --> 00:22:53,330
to Russia for over 20 years.
466
00:22:53,450 --> 00:22:55,660
And it begs an urgent question:
467
00:22:55,790 --> 00:22:58,830
How many more double agents
might be operating
468
00:22:58,950 --> 00:23:01,290
within the American
intelligence community
469
00:23:01,450 --> 00:23:04,660
right now
that have never been caught?
470
00:23:05,700 --> 00:23:08,250
LUBIN:
It is very likely that there is
a Russian double agent
471
00:23:08,410 --> 00:23:10,660
within
the U.S. government today.
472
00:23:10,830 --> 00:23:12,620
In the same way,
it is very likely
473
00:23:12,790 --> 00:23:14,200
that there is a double agent
474
00:23:14,370 --> 00:23:15,950
working
for the Chinese government
475
00:23:16,120 --> 00:23:19,750
or the Iranian government
or the North Korean government.
476
00:23:19,870 --> 00:23:22,250
The United States has
many enemies around the world,
477
00:23:22,410 --> 00:23:24,660
and those enemies are
interested in gathering
478
00:23:24,790 --> 00:23:27,700
intimate information
about U.S. doings.
479
00:23:28,700 --> 00:23:30,290
BUSTAMANTE:
It's very uncomfortable
to admit,
480
00:23:30,450 --> 00:23:32,000
but one thing
that CIA officers are taught
481
00:23:32,200 --> 00:23:33,660
right out of the gates
482
00:23:33,830 --> 00:23:35,870
is that you must always assume
at any given time
483
00:23:36,040 --> 00:23:37,660
that the CIA and the FBI are
484
00:23:37,790 --> 00:23:39,620
penetrated by a foreign
intelligence service.
485
00:23:40,540 --> 00:23:42,290
We have to assume that.
486
00:23:42,410 --> 00:23:44,660
If we're lucky,
there's only one.
487
00:23:45,660 --> 00:23:48,040
Probability-wise,
there is more than one.
488
00:23:49,200 --> 00:23:51,500
Could there really be
a foreign spy
489
00:23:51,660 --> 00:23:55,450
deeply embedded
in a U.S. intelligence agency?
490
00:23:55,620 --> 00:23:59,410
Unraveling this mystery is truly
a matter of national security
491
00:23:59,620 --> 00:24:02,620
because gaining
secret information on an enemy
492
00:24:02,790 --> 00:24:05,500
can quickly shift
the balance of global power.
493
00:24:05,620 --> 00:24:07,620
Such was the case
in World War II,
494
00:24:07,700 --> 00:24:10,450
when Allied forces
were convinced
495
00:24:10,620 --> 00:24:12,580
that a German
double agent was leaking
496
00:24:12,700 --> 00:24:14,500
D-Day plans to the Nazis,
497
00:24:14,700 --> 00:24:18,080
one letter at a time.
498
00:24:26,120 --> 00:24:29,040
SHATNER:
As World War II rages
across Europe,
499
00:24:29,200 --> 00:24:31,540
the Allied forces spent
five months
500
00:24:31,750 --> 00:24:34,290
planning a top secret invasion
501
00:24:34,410 --> 00:24:37,700
to recapture the French
coastal town of Dieppe.
502
00:24:40,410 --> 00:24:42,000
But on August 19th,
503
00:24:42,160 --> 00:24:45,080
as the Allies began
their surprise assault...
504
00:24:46,580 --> 00:24:48,450
...it seems that somehow
505
00:24:48,620 --> 00:24:51,700
the Germans knew
they were coming.
506
00:24:53,790 --> 00:24:57,750
McMAHON: The attack on Dieppe
was a disaster for the Allies.
507
00:24:57,910 --> 00:25:01,160
Something like half
of the 6,000 troops
508
00:25:01,370 --> 00:25:03,250
who land are either killed
509
00:25:03,410 --> 00:25:05,500
or taken prisoner.
510
00:25:05,660 --> 00:25:07,660
And so the concern was
511
00:25:07,870 --> 00:25:10,790
that classified information
was being sent
512
00:25:10,950 --> 00:25:13,000
to the Axis powers,
to the Nazis.
513
00:25:14,200 --> 00:25:15,830
And that using code breakers
514
00:25:16,040 --> 00:25:17,330
or spies,
515
00:25:17,500 --> 00:25:19,660
the attack had been foiled,
516
00:25:19,830 --> 00:25:22,660
had been discovered
by the Axis powers.
517
00:25:23,700 --> 00:25:26,330
GENTILE: The Allies are
repelled by the Nazis
518
00:25:26,450 --> 00:25:27,620
and the mission is a failure.
519
00:25:27,790 --> 00:25:30,620
And then people wanted
to know why.
520
00:25:31,660 --> 00:25:33,330
The defeat was so stunning
521
00:25:33,500 --> 00:25:38,080
that British intelligence MI5
started looking for reasons.
522
00:25:38,250 --> 00:25:42,000
How did the Nazis know
the invasion was happening?
523
00:25:42,160 --> 00:25:45,330
So it was suspected
that there could be a spy
524
00:25:45,450 --> 00:25:47,250
sending messages to the Nazis
525
00:25:47,410 --> 00:25:49,620
to alert them
of upcoming attacks.
526
00:25:50,700 --> 00:25:52,330
SHATNER: After the failed
Dieppe invasion,
527
00:25:52,540 --> 00:25:55,330
British intelligence launched
an investigation
528
00:25:55,500 --> 00:25:59,160
to find a potential Nazi spy
in their midst.
529
00:25:59,330 --> 00:26:04,500
And in the process, they noticed
something rather peculiar.
530
00:26:04,700 --> 00:26:07,700
Just two days before
the surprise invasion on Dieppe,
531
00:26:07,870 --> 00:26:10,620
in the British newspaper
The Daily Telegraph
532
00:26:10,790 --> 00:26:15,620
a curious clue appeared
in that day's crossword puzzle.
533
00:26:15,790 --> 00:26:20,080
Around August 18, 1942,
something very strange happened
534
00:26:20,290 --> 00:26:23,500
in the Telegraph's crossword.
535
00:26:23,660 --> 00:26:26,370
The crossword puzzle clue was
"A French port."
536
00:26:26,540 --> 00:26:28,370
The answer was Dieppe.
537
00:26:28,540 --> 00:26:30,040
The big question was,
538
00:26:30,200 --> 00:26:32,500
was the word Dieppe in
the crossword puzzle innocent?
539
00:26:32,700 --> 00:26:35,450
Or was it a warning to the Nazis
540
00:26:35,620 --> 00:26:37,830
alerting them
that an attack was imminent?
541
00:26:38,000 --> 00:26:41,500
Is it possible
that the Dieppe attack failed
542
00:26:41,660 --> 00:26:44,200
because of that crossword
puzzle answer?
543
00:26:45,250 --> 00:26:47,580
SHATNER: Was a spy sending
top secret Allied intelligence
544
00:26:47,700 --> 00:26:49,450
to the Nazis
545
00:26:49,580 --> 00:26:52,120
through crossword puzzles?
546
00:26:53,160 --> 00:26:55,660
After interrogating
the creator of the crossword,
547
00:26:55,830 --> 00:26:59,330
a mild-mannered school teacher
named Leonard Dawe,
548
00:26:59,540 --> 00:27:01,160
British intelligence concluded
549
00:27:01,330 --> 00:27:03,250
that the puzzle's use
of the word "Dieppe..."
550
00:27:04,870 --> 00:27:08,120
...was nothing more
than a "remarkable coincidence."
551
00:27:08,250 --> 00:27:12,160
It seemed the case was closed
until two years later,
552
00:27:12,370 --> 00:27:13,700
when code words started
553
00:27:13,910 --> 00:27:16,950
to appear in
the newspaper's puzzle again.
554
00:27:19,200 --> 00:27:23,330
McMAHON:
In 1944, the Allies were
planning the D-Day invasion
555
00:27:23,500 --> 00:27:26,410
amidst a huge blanket
of secrecy.
556
00:27:26,540 --> 00:27:28,450
And once again...
(chuckles)
557
00:27:28,660 --> 00:27:31,000
the Daily Telegraph crossword
558
00:27:31,200 --> 00:27:32,950
starts spitting out
559
00:27:33,120 --> 00:27:36,830
information that should not be
in the public domain.
560
00:27:37,000 --> 00:27:39,750
GENTILE:
About three weeks
before the invasion,
561
00:27:39,910 --> 00:27:42,750
in the Daily Telegraph,
in the crossword puzzle,
562
00:27:42,910 --> 00:27:45,620
the code word "Utah" appears.
563
00:27:45,750 --> 00:27:50,080
Then a few days later,
the code word "Omaha" appears.
564
00:27:50,200 --> 00:27:53,290
These are the two beaches where
the American forces will land.
565
00:27:54,450 --> 00:27:55,830
Then the next puzzle,
566
00:27:56,000 --> 00:27:58,660
the code word "Overlord"
appears.
567
00:27:58,870 --> 00:28:01,910
That's the name
of the entire mission.
568
00:28:02,910 --> 00:28:04,540
This is becoming terrifying.
569
00:28:04,750 --> 00:28:07,160
Then the word "Neptune" appears.
570
00:28:07,290 --> 00:28:12,370
That's the code word for
the British warships for D-Day.
571
00:28:12,540 --> 00:28:14,950
And then the word
"Mulberry" appears.
572
00:28:15,120 --> 00:28:17,830
That's the code word
for the portable docks
573
00:28:18,040 --> 00:28:20,660
that were built
across the channel.
574
00:28:20,830 --> 00:28:22,660
When these code words
started appearing,
575
00:28:22,750 --> 00:28:24,830
it-it was too much
of a coincidence.
576
00:28:24,950 --> 00:28:27,700
MI5 were gonna get
to the bottom of it.
577
00:28:27,870 --> 00:28:29,410
Especially after Dieppe.
578
00:28:30,540 --> 00:28:32,830
Once again,
their search eventually led them
579
00:28:33,040 --> 00:28:36,160
to the author
of the puzzle, Leonard Dawe.
580
00:28:36,370 --> 00:28:38,500
Is this the Nazi spy?
581
00:28:38,660 --> 00:28:40,790
And finally, it was determined
582
00:28:40,910 --> 00:28:42,830
that as a reward
to some of the boys
583
00:28:43,000 --> 00:28:45,620
at the boys' school,
he would let them pick the word
584
00:28:45,790 --> 00:28:47,870
to put in the crossword.
585
00:28:48,040 --> 00:28:49,370
And there just happened to be
586
00:28:49,540 --> 00:28:52,450
a lot of Allied soldiers
stationed nearby.
587
00:28:52,660 --> 00:28:54,200
The kids hear
these weird words--
588
00:28:54,370 --> 00:28:56,700
Omaha, Utah--
589
00:28:56,870 --> 00:28:59,000
and they say, "Let's put
those in the puzzle."
590
00:28:59,160 --> 00:29:00,750
Not realizing
591
00:29:00,870 --> 00:29:03,160
they're about to give away
the biggest invasion in history.
592
00:29:03,370 --> 00:29:05,870
SHATNER:
Could the appearance
of secret code names
593
00:29:06,040 --> 00:29:07,620
in British crossword puzzles
594
00:29:07,750 --> 00:29:09,910
have been simply
an extraordinary coincidence,
595
00:29:10,120 --> 00:29:12,580
or was it a clever
spy craft tool?
596
00:29:12,750 --> 00:29:15,080
We may never know for sure.
597
00:29:15,200 --> 00:29:17,000
Like in the case
of another wordplay
598
00:29:17,160 --> 00:29:19,830
70 years after World War II
599
00:29:20,040 --> 00:29:22,290
that some believed was intended
600
00:29:22,370 --> 00:29:24,950
to have deadly consequences.
601
00:29:27,080 --> 00:29:30,160
MORAN:
In 2012, in Venezuela,
602
00:29:30,290 --> 00:29:32,250
there was speculation
603
00:29:32,370 --> 00:29:35,200
that a crossword puzzle
604
00:29:35,370 --> 00:29:39,790
in the daily paper contained
coded messages
605
00:29:39,910 --> 00:29:42,330
that were meant
to signal a threat
606
00:29:42,450 --> 00:29:46,290
against the brother
of President Hugo Chávez.
607
00:29:46,450 --> 00:29:49,000
There was "Asesinen,"
which means "to kill."
608
00:29:49,200 --> 00:29:53,160
There was "Ráfagas," which means
"Burst of machine gun fire,"
609
00:29:53,330 --> 00:29:57,410
and there was also the first
name of Chávez's brother.
610
00:29:58,410 --> 00:30:02,950
And so all of this led
to the conspiracy theory
611
00:30:03,120 --> 00:30:04,660
or conspiracy thought
612
00:30:04,870 --> 00:30:08,330
that this must mean
that an assassination attempt
613
00:30:08,500 --> 00:30:11,120
was on the horizon
of Chávez's brother.
614
00:30:11,200 --> 00:30:15,000
The government essentially
accused the newspaper
615
00:30:15,160 --> 00:30:17,330
and the designer
of this crossword puzzle
616
00:30:17,540 --> 00:30:21,950
of a plot and of transmitting
this coded threat.
617
00:30:22,120 --> 00:30:24,790
Whether or not this actually was
618
00:30:24,950 --> 00:30:27,790
an indication
of an imminent threat
619
00:30:27,910 --> 00:30:31,040
against Chávez's brother,
I don't know.
620
00:30:31,250 --> 00:30:34,700
SHATNER:
No attempt on Adán Chávez's
life was made,
621
00:30:34,870 --> 00:30:37,000
or at least
publicly acknowledged.
622
00:30:37,160 --> 00:30:40,000
If spies really do send
secret messages
623
00:30:40,200 --> 00:30:43,500
via crossword puzzles, it's
still a matter of speculation
624
00:30:43,660 --> 00:30:46,870
and perhaps an ingenious method
625
00:30:47,040 --> 00:30:50,660
to share confidential
information in plain sight.
626
00:30:50,870 --> 00:30:52,700
There are aspects of that
627
00:30:52,870 --> 00:30:56,160
that certainly match
typical trade craft.
628
00:30:56,330 --> 00:30:59,950
So it's not
preposterous to think
629
00:31:00,080 --> 00:31:04,790
that a crossword puzzle could be
used to deliver a coded message.
630
00:31:04,950 --> 00:31:06,950
In fact, that's a very
631
00:31:07,120 --> 00:31:09,330
brilliant way
that you might convey
632
00:31:09,540 --> 00:31:11,450
a coded message to a spy.
633
00:31:13,080 --> 00:31:16,950
Sending covert messages through
newspaper crossword puzzles is
634
00:31:17,160 --> 00:31:19,450
truly a clever way
to share secret information.
635
00:31:19,620 --> 00:31:23,200
But there was also
a simpler tool spies used
636
00:31:23,370 --> 00:31:25,910
during the Second World War
to communicate in code
637
00:31:26,080 --> 00:31:27,910
over vast distances.
638
00:31:28,080 --> 00:31:31,500
All you needed was a radio.
639
00:31:38,790 --> 00:31:41,080
SHATNER:
With $10,000 in his pocket,
640
00:31:41,250 --> 00:31:44,950
29-year-old Soviet spy
Albrecht Dittrich arrives
641
00:31:45,120 --> 00:31:46,580
in the United States.
642
00:31:47,910 --> 00:31:49,580
Using a stolen
birth certificate,
643
00:31:49,700 --> 00:31:54,330
he adopts the alias Jack Barsky
and begins a ten-year mission
644
00:31:54,500 --> 00:31:59,830
to spy on Americans
as a sleeper agent for the KGB.
645
00:32:00,000 --> 00:32:01,450
JACK BARSKY:
A sleeper agent is somebody
646
00:32:01,620 --> 00:32:06,290
who, uh, establishes himself
in enemy territory
647
00:32:06,410 --> 00:32:09,040
and integrates in society
and then waits for the day
648
00:32:09,200 --> 00:32:11,410
when it's time
to spring into action.
649
00:32:12,410 --> 00:32:14,160
My mission
in the United States focused
650
00:32:14,370 --> 00:32:16,040
on me getting close to people
651
00:32:16,200 --> 00:32:18,540
who make
foreign policy decisions
652
00:32:18,750 --> 00:32:22,000
and/or influence foreign policy.
653
00:32:22,120 --> 00:32:24,830
This is towards
the end of the Cold War
654
00:32:25,000 --> 00:32:27,500
where there was
a spy war going on
655
00:32:27,660 --> 00:32:30,080
between the CIA and the KGB.
656
00:32:30,250 --> 00:32:33,080
And the tensions were very high.
657
00:32:34,950 --> 00:32:36,660
SHATNER:
After relocating
to New York City,
658
00:32:36,790 --> 00:32:38,910
Barsky married
and began a family.
659
00:32:39,040 --> 00:32:41,580
He also took a job
at an insurance company
660
00:32:41,700 --> 00:32:43,160
to maintain his cover
661
00:32:43,330 --> 00:32:45,330
working
as a computer programmer.
662
00:32:45,410 --> 00:32:48,620
BARSKY:
I had access to lots
and lots of data.
663
00:32:48,790 --> 00:32:52,290
And some of the data would've
been very important for the KGB.
664
00:32:53,290 --> 00:32:56,660
But there was never
a meeting between me
665
00:32:56,870 --> 00:33:00,080
and another KGB agent on the
territory of the United States.
666
00:33:00,200 --> 00:33:02,500
I got my instructions
and answers to questions
667
00:33:02,700 --> 00:33:04,250
through shortwave radio.
668
00:33:05,500 --> 00:33:07,750
Every Thursday at 9:15,
669
00:33:07,910 --> 00:33:09,580
I had to turn on
my shortwave radio,
670
00:33:09,750 --> 00:33:13,250
dial my frequency,
listen to the call signal,
671
00:33:13,410 --> 00:33:17,500
Morse code,
only digits, no letters
672
00:33:17,580 --> 00:33:20,620
and then start
writing down the numbers.
673
00:33:20,750 --> 00:33:22,000
And there you have your message.
674
00:33:22,500 --> 00:33:24,200
SHATNER:
For nearly ten years,
675
00:33:24,370 --> 00:33:27,330
Barsky's primary tool
for communicating with the KGB
676
00:33:27,450 --> 00:33:30,080
was through a kind
of shortwave radio broadcast
677
00:33:30,200 --> 00:33:33,120
known as a numbers station.
678
00:33:35,160 --> 00:33:38,330
Number stations are essentially
pirate radio stations.
679
00:33:38,540 --> 00:33:40,750
You need to register
a radio station.
680
00:33:40,910 --> 00:33:42,250
Number stations are not
registered.
681
00:33:42,410 --> 00:33:44,410
(radio static)
682
00:33:44,580 --> 00:33:47,000
They were discovered
almost accidentally
683
00:33:47,160 --> 00:33:49,000
during the Cold War.
684
00:33:49,160 --> 00:33:50,700
You had ham radio operators
685
00:33:50,870 --> 00:33:52,160
bouncing around
different frequencies,
686
00:33:52,370 --> 00:33:54,500
talking to each other
all over the world.
687
00:33:54,660 --> 00:33:57,830
And then, they would hit
upon a certain channel
688
00:33:57,950 --> 00:33:59,410
and suddenly you hear
689
00:33:59,580 --> 00:34:01,870
a robotic voice
repeating numbers.
690
00:34:02,040 --> 00:34:06,830
(female voice speaking
foreign language)
691
00:34:07,040 --> 00:34:08,450
GENTILE:
...or you hear
692
00:34:08,620 --> 00:34:12,120
some kind of music
or flute or buzzing sounds.
693
00:34:12,290 --> 00:34:13,950
(beeping, buzzing)
694
00:34:14,620 --> 00:34:16,120
It feels like you're
eavesdropping
695
00:34:16,250 --> 00:34:17,450
on something secret,
696
00:34:17,620 --> 00:34:18,700
but you don't know
what they're saying.
697
00:34:19,750 --> 00:34:24,160
MORAN:
Number stations can
transmit signals
698
00:34:24,250 --> 00:34:29,620
to sources globally,
and they can do so undetected,
699
00:34:29,790 --> 00:34:30,830
because to anyone else,
700
00:34:31,040 --> 00:34:32,950
it might just sound like buzzing
701
00:34:33,120 --> 00:34:34,950
or like a series of noises.
702
00:34:35,120 --> 00:34:37,000
(buzzing)
703
00:34:37,160 --> 00:34:40,830
But what they're transmitting
are coded signals
704
00:34:40,950 --> 00:34:43,620
to a source in place, or a spy.
705
00:34:45,450 --> 00:34:48,700
So even though
they're very low tech,
706
00:34:48,870 --> 00:34:50,080
they're very effective...
707
00:34:50,250 --> 00:34:53,120
(indistinct radio chatter)
708
00:34:53,290 --> 00:34:55,200
MORAN:
...because they're able
709
00:34:55,330 --> 00:34:57,700
to exist and to communicate
710
00:34:57,910 --> 00:34:59,080
under the radar.
711
00:34:59,250 --> 00:35:00,870
(indistinct radio chatter)
712
00:35:01,040 --> 00:35:02,620
SHATNER:
During the Cold War,
both the United States
713
00:35:02,830 --> 00:35:06,000
and the Soviet Union regularly
employed number stations
714
00:35:06,200 --> 00:35:09,330
to communicate
with their agents in the field.
715
00:35:10,700 --> 00:35:14,000
But if anyone with a radio can
tune in to hear the broadcast,
716
00:35:14,160 --> 00:35:16,830
how are these coded
spy messages kept secret?
717
00:35:17,000 --> 00:35:19,580
Well, according to experts,
718
00:35:19,750 --> 00:35:22,410
it's an unbreakable
method of encryption.
719
00:35:22,580 --> 00:35:26,040
A simple piece of paper
known as...
720
00:35:26,250 --> 00:35:28,950
a one-time pad.
721
00:35:29,120 --> 00:35:31,830
A one-time pad has
little numbers on them.
722
00:35:32,040 --> 00:35:34,250
And there's two
identical versions.
723
00:35:34,370 --> 00:35:37,000
One is for the encoding
of a message,
724
00:35:37,200 --> 00:35:39,290
and the other one is
for the decoding.
725
00:35:39,450 --> 00:35:40,910
(indistinct radio chatter)
726
00:35:41,080 --> 00:35:42,370
So you would hear something
727
00:35:42,540 --> 00:35:45,830
like "Nine, seven, six, four,"
728
00:35:46,000 --> 00:35:47,830
and then
you could use the decoder
729
00:35:48,000 --> 00:35:49,450
to decrypt your message.
730
00:35:50,500 --> 00:35:54,700
HAMMOND:
A one-time pad is a sheet
of paper with banks of numbers.
731
00:35:55,830 --> 00:35:57,370
You use this and someone else
732
00:35:57,540 --> 00:35:58,950
that you're trying
to communicate with
733
00:35:59,120 --> 00:36:01,160
uses that same pad.
734
00:36:01,290 --> 00:36:03,330
The two of you can
then communicate,
735
00:36:03,540 --> 00:36:05,330
but it's called a one-time pad
736
00:36:05,500 --> 00:36:08,790
because after you've used it,
you then destroy it.
737
00:36:08,950 --> 00:36:11,080
Assuming that you destroy it,
738
00:36:11,290 --> 00:36:14,330
you can then go on to use
the next one-time pad.
739
00:36:14,450 --> 00:36:17,950
And if you keep using it,
sticking to the protocol,
740
00:36:18,080 --> 00:36:20,660
it's uncrackable.
741
00:36:21,700 --> 00:36:25,120
SHATNER:
If number stations have proven
so effective in the past,
742
00:36:25,290 --> 00:36:27,330
the real question is,
are spies still sending
743
00:36:27,540 --> 00:36:31,040
and receiving coded messages
through them today?
744
00:36:31,200 --> 00:36:32,750
(voice warbling)
745
00:36:34,540 --> 00:36:36,000
BUSTAMANTE:
Even today,
746
00:36:36,200 --> 00:36:37,330
you can flip through
the different channels
747
00:36:37,540 --> 00:36:39,370
and you can hear things
over the radio
748
00:36:39,540 --> 00:36:42,500
that don't make any sense.
749
00:36:42,700 --> 00:36:44,410
Whether they're
verses being read
750
00:36:44,580 --> 00:36:46,040
or whether they're words
being said nonsensically
751
00:36:46,200 --> 00:36:47,660
or whether they're numbers
752
00:36:47,790 --> 00:36:49,120
that are shouted out
to the blindness of space.
753
00:36:49,250 --> 00:36:51,660
(indistinct radio chatter)
754
00:36:51,870 --> 00:36:54,620
So it's very possible
somewhere in there
755
00:36:54,790 --> 00:36:56,830
there's a spy message
that's sent
756
00:36:57,040 --> 00:36:59,200
for a very specific person
at a very specific time
757
00:36:59,370 --> 00:37:01,000
in a very specific way.
758
00:37:01,200 --> 00:37:02,910
ROBOTIC FEMALE VOICE:
One, three...
759
00:37:03,040 --> 00:37:05,330
SHATNER:
If spies are still
receiving messages
760
00:37:05,410 --> 00:37:09,000
via number stations today,
we'll obviously never know.
761
00:37:09,160 --> 00:37:13,040
But what many experts believe
may be even more concerning
762
00:37:13,200 --> 00:37:15,160
when it comes
to national security
763
00:37:15,330 --> 00:37:17,410
aren't relics from the past
764
00:37:17,580 --> 00:37:19,750
but the technologies of today.
765
00:37:30,910 --> 00:37:33,750
SHATNER:
While doing routine
computer maintenance,
766
00:37:33,910 --> 00:37:35,580
a defense contractor finds
767
00:37:35,700 --> 00:37:39,290
evidence that Russian spies
hacked into the base's network
768
00:37:39,410 --> 00:37:43,160
to access
top secret intelligence
769
00:37:43,330 --> 00:37:48,500
from the Pentagon, NASA,
and other U.S. agencies.
770
00:37:48,700 --> 00:37:52,620
It is the first major
cyber espionage operation
771
00:37:52,790 --> 00:37:55,620
that we know of
in modern history.
772
00:37:56,950 --> 00:37:58,830
BUSTAMANTE:
One of the big advancements
in espionage is
773
00:37:59,000 --> 00:38:00,790
something known as the cyber spy
774
00:38:00,950 --> 00:38:02,500
or the spy who lives behind
775
00:38:02,620 --> 00:38:04,080
a digital wall of some sort.
776
00:38:05,120 --> 00:38:07,250
They can steal information,
they can sell information,
777
00:38:07,450 --> 00:38:09,700
they can live and hide
on the dark web.
778
00:38:10,750 --> 00:38:12,910
This is a whole new development,
and with that development,
779
00:38:13,120 --> 00:38:16,410
there's new opportunities
and there's new risks.
780
00:38:16,580 --> 00:38:19,040
We have new technology
that cyber spies can use
781
00:38:19,200 --> 00:38:20,620
to meet in cyberspace.
782
00:38:20,790 --> 00:38:23,330
You can meet with them
on video game platforms,
783
00:38:23,450 --> 00:38:25,200
you can meet with them
in chat rooms,
784
00:38:25,370 --> 00:38:26,540
you can meet with them using
785
00:38:26,700 --> 00:38:28,330
commercially
encrypted technology
786
00:38:28,500 --> 00:38:30,450
that you and I carry
on our phone.
787
00:38:30,580 --> 00:38:33,160
Which makes everything that much
more difficult to track,
788
00:38:33,330 --> 00:38:34,660
not just for the FBI
789
00:38:34,870 --> 00:38:36,620
or for the internal
investigation agency,
790
00:38:36,790 --> 00:38:38,750
but for anyone to see anywhere.
791
00:38:39,700 --> 00:38:41,620
SHATNER:
Advancing technology has
792
00:38:41,790 --> 00:38:45,410
empowered cyber spies to not
only hack government secrets
793
00:38:45,580 --> 00:38:47,750
but also exchange
that information
794
00:38:47,870 --> 00:38:50,160
in complete anonymity.
795
00:38:50,370 --> 00:38:52,540
But some cyber spies are not
796
00:38:52,660 --> 00:38:54,330
interested
in stealing information
797
00:38:54,500 --> 00:38:58,000
but rather to influence
the very beliefs
798
00:38:58,200 --> 00:38:59,910
of their adversaries.
799
00:39:01,200 --> 00:39:04,330
BARSKY: There's a place called
the Internet Research Agency
800
00:39:04,450 --> 00:39:07,950
in St. Petersburg, Russia where
801
00:39:08,080 --> 00:39:11,450
there's a couple of hundred
nerds that produce
802
00:39:11,620 --> 00:39:13,160
these artificial personas,
803
00:39:13,330 --> 00:39:17,500
and then they go on social media
and befriend real people...
804
00:39:18,450 --> 00:39:21,000
...and they search out groups
805
00:39:21,200 --> 00:39:24,120
that are ideologically oriented.
806
00:39:24,290 --> 00:39:25,950
It could be particularly
in politics,
807
00:39:26,120 --> 00:39:28,870
it could be the right wing
and it could be left.
808
00:39:29,040 --> 00:39:32,160
And what they're after is
809
00:39:32,370 --> 00:39:36,410
to create confusion
in enemy territory.
810
00:39:38,700 --> 00:39:40,500
I can give you an example.
811
00:39:40,620 --> 00:39:42,620
When you're talking
about election interference,
812
00:39:42,750 --> 00:39:45,160
they planted misinformation.
813
00:39:45,330 --> 00:39:50,910
What they do is raising doubts
about the American system.
814
00:39:52,500 --> 00:39:55,410
These cyber spies are
extremely dangerous.
815
00:39:57,040 --> 00:40:00,540
SHATNER:
According to America's
Cyber Defense Agency CISA,
816
00:40:00,750 --> 00:40:04,580
during the 2024
U.S. presidential election,
817
00:40:04,700 --> 00:40:07,870
foreign adversaries conducted
influence operations
818
00:40:08,040 --> 00:40:13,330
intended to undermine
the integrity of U.S. elections.
819
00:40:13,540 --> 00:40:14,870
And while we can't say for sure
820
00:40:15,040 --> 00:40:18,200
how espionage will
continue to evolve,
821
00:40:18,410 --> 00:40:22,160
we know that as long
as there are secrets,
822
00:40:22,330 --> 00:40:24,450
there will be spies.
823
00:40:24,540 --> 00:40:26,120
BUSTAMANTE:
The future of secrets is,
824
00:40:26,290 --> 00:40:28,500
in many ways, what will shape
the future of espionage.
825
00:40:28,700 --> 00:40:30,330
But that doesn't mean
that the history of espionage is
826
00:40:30,450 --> 00:40:32,120
any less useful
than it was in the past.
827
00:40:32,250 --> 00:40:33,580
It's the foundation,
828
00:40:33,700 --> 00:40:35,830
it's the bedrock on which
everything else is built.
829
00:40:36,000 --> 00:40:38,500
And no matter where
our future takes us, we know
830
00:40:38,700 --> 00:40:40,370
that those building blocks
of espionage,
831
00:40:40,540 --> 00:40:41,870
those core fundamentals
832
00:40:42,040 --> 00:40:43,790
will always be present
and always be there.
833
00:40:43,950 --> 00:40:46,700
There will always be people
meeting with people
834
00:40:46,870 --> 00:40:49,870
in dark corners to share secrets
that nobody knows about.
835
00:40:51,870 --> 00:40:55,200
In the world of spy craft,
everything is unexplained.
836
00:40:55,410 --> 00:40:59,040
And your job
as an intelligence officer is
837
00:40:59,200 --> 00:41:01,620
to try to gather
that information
838
00:41:01,790 --> 00:41:03,750
that will help explain it.
839
00:41:04,790 --> 00:41:07,830
The anomaly of spy craft is
840
00:41:08,040 --> 00:41:11,830
that you're charged
with seeking out the truth.
841
00:41:11,950 --> 00:41:16,450
And the reality is
you can never be
842
00:41:16,580 --> 00:41:20,790
100% sure that you've
gotten to the truth.
843
00:41:20,950 --> 00:41:24,000
You may never have the answers.
844
00:41:25,040 --> 00:41:27,580
While it appears
that the digital age may be
845
00:41:27,750 --> 00:41:29,450
changing the art of spy craft,
846
00:41:29,620 --> 00:41:30,910
it's pretty safe to say
847
00:41:31,040 --> 00:41:33,830
that as long as there are
secrets worth stealing,
848
00:41:34,000 --> 00:41:36,450
there will be spies
hard at work.
849
00:41:36,620 --> 00:41:39,250
And although we are intrigued
850
00:41:39,450 --> 00:41:41,950
by the elusive
double agent at the CIA
851
00:41:42,120 --> 00:41:46,540
or even the assassin who killed
with the probe of an umbrella,
852
00:41:46,700 --> 00:41:50,000
it's likely
that most tales of espionage
853
00:41:50,160 --> 00:41:53,660
and the covert agents
who operate undetected
854
00:41:53,830 --> 00:41:58,040
will stay top secret
and remain...
855
00:41:59,160 --> 00:42:00,540
...unexplained.
856
00:42:00,700 --> 00:42:02,540
CAPTIONING PROVIDED BY
A+E NETWORKS66603
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.