All language subtitles for IneXplicável - S07E10 - Secrets of The Spies

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil) Download
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:02,040 --> 00:00:03,040 WILLIAM SHATNER: Shadowy assassins 2 00:00:03,200 --> 00:00:05,410 who vanish into the crowd. 3 00:00:05,580 --> 00:00:09,700 Double agents who sell their own country's secrets. 4 00:00:10,870 --> 00:00:14,750 And coded messages hiding in plain sight. 5 00:00:17,450 --> 00:00:20,000 Throughout history, spies have played 6 00:00:20,160 --> 00:00:23,580 a unique role in shaping world events. 7 00:00:23,700 --> 00:00:27,950 And these secret agents work at the behest of an organization, 8 00:00:28,120 --> 00:00:30,700 a government or perhaps even a single leader. 9 00:00:30,870 --> 00:00:33,160 Their covert orders could range from 10 00:00:33,330 --> 00:00:35,080 simply collecting information 11 00:00:35,250 --> 00:00:37,830 or something as deadly serious 12 00:00:38,040 --> 00:00:40,200 as assassinating an enemy. 13 00:00:41,540 --> 00:00:45,330 Secrecy is critical to a spy's success, 14 00:00:45,540 --> 00:00:48,370 so how do these masters of deception fulfill 15 00:00:48,540 --> 00:00:51,620 their assignments without getting caught? 16 00:00:52,870 --> 00:00:55,790 Well, that is what we'll try and find out. 17 00:00:55,950 --> 00:00:58,120 ♪ ♪ 18 00:01:10,040 --> 00:01:13,250 The CIA, MI6 19 00:01:13,410 --> 00:01:15,500 and MSS. 20 00:01:15,580 --> 00:01:18,250 These are the foreign intelligence services 21 00:01:18,410 --> 00:01:21,080 for some of the most powerful countries in the world. 22 00:01:21,250 --> 00:01:24,120 These agencies, and hundreds of others, 23 00:01:24,290 --> 00:01:27,200 engage in clandestine operations 24 00:01:27,370 --> 00:01:30,250 to aid and protect their countries. 25 00:01:30,410 --> 00:01:33,000 For many, their mission is to gather 26 00:01:33,160 --> 00:01:35,950 the most closely guarded secrets of their enemies, 27 00:01:36,120 --> 00:01:39,410 and their secret weapons are often... 28 00:01:39,620 --> 00:01:42,080 spies. 29 00:01:42,200 --> 00:01:43,330 ASAF LUBIN: Spies are 30 00:01:43,540 --> 00:01:45,410 utilized by states to collect 31 00:01:45,580 --> 00:01:48,500 intelligence that is necessary to advance policymaking. 32 00:01:48,660 --> 00:01:51,370 From figuring out whether an adversary 33 00:01:51,540 --> 00:01:54,910 has nuclear weapons, to figuring out whether 34 00:01:55,080 --> 00:01:58,080 a leader of a foreign state is about to die. 35 00:01:58,290 --> 00:02:00,330 We have intelligence agencies that specialize in 36 00:02:00,410 --> 00:02:03,540 visual intelligence, say satellite imagery. 37 00:02:03,700 --> 00:02:06,370 We have intelligence agencies that specialize in 38 00:02:06,540 --> 00:02:08,290 the interception of communications. 39 00:02:08,450 --> 00:02:10,620 But there are spies that more commonly 40 00:02:10,790 --> 00:02:12,370 come to mind, which is 41 00:02:12,540 --> 00:02:15,250 the people at the front line, the individuals 42 00:02:15,410 --> 00:02:18,450 willing to put their lives at risk to share information. 43 00:02:19,500 --> 00:02:23,160 At the end of the day, it's a life of mystery and intrigue 44 00:02:23,370 --> 00:02:26,660 because the spy world is kind of its own domain. 45 00:02:26,870 --> 00:02:29,580 It remains this kind of puzzle or mystery 46 00:02:29,750 --> 00:02:32,660 that most people will not have exposure to 47 00:02:32,750 --> 00:02:36,790 beyond those few moments we read about in the newspaper. 48 00:02:38,540 --> 00:02:41,160 ANDREW BUSTAMANTE: Hollywood movies and books and TV 49 00:02:41,330 --> 00:02:44,910 have made it seem like spies are some kind of superhero. 50 00:02:45,120 --> 00:02:47,620 That is nothing like real espionage. 51 00:02:47,790 --> 00:02:49,000 The purpose of espionage 52 00:02:49,160 --> 00:02:51,080 is to be so secret 53 00:02:51,250 --> 00:02:53,160 that nobody even knows you're there. 54 00:02:53,330 --> 00:02:55,830 True professional espionage 55 00:02:56,000 --> 00:02:59,750 is in and out without anyone ever even knowing it happened. 56 00:02:59,910 --> 00:03:02,370 That makes your average spy 57 00:03:02,580 --> 00:03:05,410 much more like an average person. 58 00:03:05,620 --> 00:03:09,540 And what's required of a spy changes from day to day. 59 00:03:09,700 --> 00:03:11,750 One day, we're hunting terrorists. 60 00:03:11,910 --> 00:03:16,200 Sometime later, we're exchanging information in secret. 61 00:03:16,370 --> 00:03:18,750 Some days, we're fighting a war on drugs. 62 00:03:18,910 --> 00:03:21,830 Some days, we're fighting a war on misinformation. 63 00:03:22,000 --> 00:03:23,290 It's an incredible 64 00:03:23,410 --> 00:03:26,330 web of information and impact 65 00:03:26,450 --> 00:03:28,410 that the average person is not aware of. 66 00:03:29,870 --> 00:03:31,330 SHATNER: How can we ever hope 67 00:03:31,450 --> 00:03:33,580 to understand the mysterious world of espionage 68 00:03:33,700 --> 00:03:37,160 if it remains completely hidden from us? 69 00:03:37,290 --> 00:03:41,160 Well, every so often, information does come to light 70 00:03:41,370 --> 00:03:44,120 that illustrates how a single spy 71 00:03:44,250 --> 00:03:46,700 can change the course of history. 72 00:03:54,540 --> 00:03:58,410 A massive scientific complex is established in secret 73 00:03:58,580 --> 00:04:02,000 for the research and development of a truly devastating weapon. 74 00:04:02,200 --> 00:04:04,410 This laboratory becomes ground zero 75 00:04:04,540 --> 00:04:06,540 for the most consequential 76 00:04:06,700 --> 00:04:09,750 top secret military program ever devised. 77 00:04:10,750 --> 00:04:14,620 It's called the Manhattan Project. 78 00:04:14,830 --> 00:04:17,410 KAI BIRD: The Manhattan Project was this top secret, 79 00:04:17,540 --> 00:04:21,120 federally funded $2 billion program 80 00:04:21,200 --> 00:04:23,660 to explore whether it was possible to develop 81 00:04:23,830 --> 00:04:27,000 an atomic weapon 82 00:04:27,200 --> 00:04:28,790 in the midst of World War II. 83 00:04:28,910 --> 00:04:32,500 And they built this secret city in Los Alamos, 84 00:04:32,660 --> 00:04:35,580 gathering together chemists and engineers 85 00:04:35,750 --> 00:04:38,200 and physicists and other scientists 86 00:04:38,410 --> 00:04:42,120 into one spot so that these scientists can collaborate 87 00:04:42,330 --> 00:04:46,160 and fully converse inside the secret city 88 00:04:46,370 --> 00:04:48,160 to build this weapon. 89 00:04:48,370 --> 00:04:50,700 SHATNER: As history shows, these scientists 90 00:04:50,870 --> 00:04:54,950 would prove successful in creating the atomic bomb. 91 00:04:55,120 --> 00:04:57,910 But little did they know at the time 92 00:04:58,040 --> 00:04:59,700 there was a spy among them, 93 00:04:59,870 --> 00:05:03,250 sharing the program's most intimate secrets. 94 00:05:04,910 --> 00:05:07,580 His codename was "Rest," 95 00:05:07,750 --> 00:05:10,290 but his identity has since been revealed 96 00:05:10,450 --> 00:05:15,450 to be a German physicist named Klaus Fuchs. 97 00:05:15,620 --> 00:05:17,410 LUBIN: Klaus came from Germany, 98 00:05:17,580 --> 00:05:20,700 and because of his... his prior background as a physicist, 99 00:05:20,870 --> 00:05:22,160 he quickly got a job 100 00:05:22,370 --> 00:05:25,660 within the Manhattan Program in Los Alamos. 101 00:05:25,870 --> 00:05:28,410 And, unknown to the people there, 102 00:05:28,540 --> 00:05:30,450 Fuchs began to share information 103 00:05:30,620 --> 00:05:34,080 with the Soviets about the program. 104 00:05:34,250 --> 00:05:36,660 A U.S. counterintelligence program 105 00:05:36,870 --> 00:05:40,500 that involved decrypting Soviet communications 106 00:05:40,700 --> 00:05:43,330 revealed the scope of the information 107 00:05:43,500 --> 00:05:47,000 that Fuchs collected and shared with the Soviets. 108 00:05:47,120 --> 00:05:48,750 In his particular role 109 00:05:48,910 --> 00:05:52,330 as a lead scientist within the program and access 110 00:05:52,540 --> 00:05:54,290 to the development of the bomb, 111 00:05:54,500 --> 00:05:56,250 he was able to share 112 00:05:56,410 --> 00:05:58,500 pretty detailed technical information about 113 00:05:58,620 --> 00:06:00,830 the science that goes into 114 00:06:00,950 --> 00:06:03,580 the generation and enrichment of plutonium, 115 00:06:03,700 --> 00:06:07,250 which served a huge deal in advancing 116 00:06:07,410 --> 00:06:09,950 the Russians' capacities in those spaces. 117 00:06:10,950 --> 00:06:13,750 And he collected intelligence and shared intelligence 118 00:06:13,870 --> 00:06:17,000 for about seven years, until he was revealed. 119 00:06:18,330 --> 00:06:21,500 The greatest find in the history of espionage 120 00:06:21,660 --> 00:06:25,080 is the theft of the atomic secret. 121 00:06:25,200 --> 00:06:28,040 Klaus Fuchs pretty much shared the recipe 122 00:06:28,200 --> 00:06:30,040 with the Soviet Union. 123 00:06:30,200 --> 00:06:34,500 The Soviet Union was able to get a nuclear weapon 124 00:06:34,700 --> 00:06:36,160 roughly five years before they could have 125 00:06:36,370 --> 00:06:38,580 done it on their own. 126 00:06:38,750 --> 00:06:41,500 The moment they had the nuke, they were a world power. 127 00:06:41,700 --> 00:06:44,830 SHATNER: If one spy can alter the course of atomic history, 128 00:06:45,000 --> 00:06:48,700 how else has espionage shaped our world? 129 00:06:49,870 --> 00:06:53,500 Has secret intelligence informed nearly every 130 00:06:53,580 --> 00:06:56,370 major event in human history? 131 00:06:57,790 --> 00:06:59,160 BUSTAMANTE: You have to assume 132 00:06:59,330 --> 00:07:01,910 that you only know about five percent 133 00:07:02,040 --> 00:07:03,830 of all espionage operations. 134 00:07:04,040 --> 00:07:06,580 Every negotiation, every diplomatic agreement, 135 00:07:06,790 --> 00:07:08,660 every transition of power from one president 136 00:07:08,870 --> 00:07:11,000 to another president, for 167 countries, 137 00:07:11,200 --> 00:07:13,870 all over the world, over the course of decades, 138 00:07:14,040 --> 00:07:16,500 intelligence had a role to play in every one of those. 139 00:07:16,700 --> 00:07:19,000 So now, when you start to ask yourself 140 00:07:19,120 --> 00:07:21,160 about how the Soviet Union fell, 141 00:07:21,290 --> 00:07:22,540 and you start to ask yourself about 142 00:07:22,700 --> 00:07:25,000 how the end of Afghanistan happened, 143 00:07:25,160 --> 00:07:26,830 and the winning of Gulf War II, 144 00:07:26,950 --> 00:07:29,080 and the taking down of Saddam Hussein, 145 00:07:29,200 --> 00:07:33,330 you start to see these major instances in history 146 00:07:33,500 --> 00:07:36,660 where intelligence worked or failed. 147 00:07:36,830 --> 00:07:39,330 So, when you try to consider 148 00:07:39,450 --> 00:07:41,160 the impact that espionage has had 149 00:07:41,370 --> 00:07:44,330 over the long-term history of the world, 150 00:07:44,540 --> 00:07:46,870 you have to remember that 95% of what they've done, 151 00:07:47,040 --> 00:07:48,330 nobody knows about 152 00:07:48,540 --> 00:07:51,830 except for "need to know" secret circles. 153 00:07:52,040 --> 00:07:55,580 LINDSAY MORAN: It's really pretty chilling if you think about the effect 154 00:07:55,700 --> 00:07:59,450 that just a single spy or intelligence source 155 00:07:59,580 --> 00:08:01,660 can have on world events. 156 00:08:01,790 --> 00:08:03,160 And the irony is that 157 00:08:03,330 --> 00:08:05,200 we often don't know 158 00:08:05,410 --> 00:08:07,830 what that impact is until many years 159 00:08:08,040 --> 00:08:11,790 or even decades later, or sometimes, ever at all. 160 00:08:12,750 --> 00:08:16,830 Even historians looking back 161 00:08:17,040 --> 00:08:19,290 on historical events or geopolitical movements, 162 00:08:19,450 --> 00:08:21,830 may never have access 163 00:08:22,000 --> 00:08:26,290 to the behind-the-scenes intrigue and espionage 164 00:08:26,410 --> 00:08:28,500 that took place, or the machinations 165 00:08:28,660 --> 00:08:30,790 of various intelligence organizations. 166 00:08:30,910 --> 00:08:35,250 But for sure, spies really can change the course of history. 167 00:08:46,830 --> 00:08:48,910 SHATNER: This sleek, modern building 168 00:08:49,080 --> 00:08:51,660 houses over 7,000 unique artifacts 169 00:08:51,750 --> 00:08:54,290 from the history of espionage. 170 00:08:54,450 --> 00:08:56,660 And among them are ingenious devices 171 00:08:56,830 --> 00:08:58,620 created to hide things, 172 00:08:58,790 --> 00:09:01,450 record secret conversations, 173 00:09:01,620 --> 00:09:07,000 and some are even meant to kill. 174 00:09:07,160 --> 00:09:09,160 The International Spy Museum 175 00:09:09,370 --> 00:09:11,500 houses the world's largest collection 176 00:09:11,660 --> 00:09:14,750 of intelligence and espionage-related artifacts. 177 00:09:14,870 --> 00:09:18,000 We have all kinds of ingenious devices 178 00:09:18,160 --> 00:09:20,660 to do all type of different types of stuff. 179 00:09:20,870 --> 00:09:23,160 So, a lot of the gadgets that we see 180 00:09:23,330 --> 00:09:25,200 are there to try to help 181 00:09:25,370 --> 00:09:26,830 to be a more effective agent, 182 00:09:26,910 --> 00:09:30,700 to recruit spies better, to steal secrets better. 183 00:09:30,870 --> 00:09:33,620 And we've got a fantastic 184 00:09:33,790 --> 00:09:35,660 James Bond collection. 185 00:09:36,580 --> 00:09:37,950 Some of the James Bond movies 186 00:09:38,160 --> 00:09:40,450 have actually influenced the development 187 00:09:40,540 --> 00:09:42,950 of gadgets in the CIA. 188 00:09:43,120 --> 00:09:46,830 CIA directors come out of the movie theater 189 00:09:47,040 --> 00:09:49,660 and say, "Guys, do we have anything like this? 190 00:09:49,870 --> 00:09:52,160 And if we don't, can someone get on it?" 191 00:09:52,250 --> 00:09:55,370 So we know that there's a two-way interaction between 192 00:09:55,540 --> 00:09:58,950 the gadgets in fiction and in reality. 193 00:10:00,750 --> 00:10:02,410 When you look at spy gadgets, a lot of them 194 00:10:02,620 --> 00:10:04,750 are weapons of one thing or another. 195 00:10:04,910 --> 00:10:06,950 They're always trying to come up with new gadgets. 196 00:10:08,000 --> 00:10:11,330 So, the KGB came up with a lipstick gun, 197 00:10:11,540 --> 00:10:13,910 which was a little 4.5 millimeter bullet 198 00:10:14,080 --> 00:10:16,080 that could be fired from a lipstick tube. 199 00:10:16,200 --> 00:10:18,870 The CIA had an ice gun, 200 00:10:19,040 --> 00:10:22,580 which fired a super-cool needle of ice, 201 00:10:22,750 --> 00:10:24,450 preferably through your opponent's heart. 202 00:10:24,620 --> 00:10:26,700 That was all around 1960. 203 00:10:26,870 --> 00:10:29,040 And then, there are famous exploding cigars, 204 00:10:29,200 --> 00:10:32,660 with which they were going to blow off Fidel Castro's head. 205 00:10:32,870 --> 00:10:34,870 But to the extent that secret weapons, 206 00:10:35,040 --> 00:10:37,120 spy weapons programs exist, 207 00:10:37,290 --> 00:10:40,790 they're secret, which is why you don't know about them, 208 00:10:40,950 --> 00:10:42,580 because you're not supposed to. 209 00:10:43,660 --> 00:10:44,830 SHATNER: Over the years, some spy gadgets 210 00:10:44,950 --> 00:10:46,500 have either been declassified 211 00:10:46,700 --> 00:10:48,500 or leaked to the public. 212 00:10:48,620 --> 00:10:51,450 However, what's less clear 213 00:10:51,620 --> 00:10:53,200 is whether any of these fantastical 214 00:10:53,370 --> 00:10:55,370 and frankly bizarre devices 215 00:10:55,540 --> 00:10:58,080 were ever successfully put to use. 216 00:10:59,200 --> 00:11:01,410 But there is a curious instrument of death 217 00:11:01,540 --> 00:11:02,910 that many believe was responsible 218 00:11:03,120 --> 00:11:05,790 for one of the most infamous and unsolved 219 00:11:05,950 --> 00:11:08,540 assassinations of the 20th century: 220 00:11:08,700 --> 00:11:11,410 The 1978 murder 221 00:11:11,580 --> 00:11:14,910 of British journalist Georgi Markov. 222 00:11:16,080 --> 00:11:17,830 JACK BARSKY: Markov was a dissident 223 00:11:18,000 --> 00:11:20,500 in Bulgaria, and he was loud. 224 00:11:20,620 --> 00:11:23,450 And, uh, he... he had to flee. 225 00:11:23,620 --> 00:11:25,080 He wound up in the United Kingdom, 226 00:11:25,250 --> 00:11:28,580 and he got employed by, uh, the BBC 227 00:11:28,700 --> 00:11:31,620 and Radio Free Europe, 228 00:11:31,750 --> 00:11:34,910 which we absolutely hated because it was 229 00:11:35,080 --> 00:11:38,870 Western propaganda directed to the East. 230 00:11:39,040 --> 00:11:40,700 And he got louder and louder, 231 00:11:40,870 --> 00:11:42,500 and, uh, the Bulgarians, 232 00:11:42,620 --> 00:11:43,830 I think it was the president, 233 00:11:44,000 --> 00:11:45,200 he wanted to get rid of this guy. 234 00:11:46,330 --> 00:11:48,370 SHATNER: On September 7, 1978, 235 00:11:48,540 --> 00:11:50,290 at around 1:30 p.m., 236 00:11:50,450 --> 00:11:53,290 Markov was about to catch a bus 237 00:11:53,450 --> 00:11:55,500 on the Waterloo Bridge in London, 238 00:11:55,660 --> 00:11:59,370 when something very strange happens. 239 00:12:00,410 --> 00:12:03,330 NIGEL WEST: Georgi Markov bumps into somebody 240 00:12:03,540 --> 00:12:04,660 at a bus stop, 241 00:12:04,830 --> 00:12:05,870 and this individual 242 00:12:06,000 --> 00:12:07,330 is carrying an umbrella. 243 00:12:08,620 --> 00:12:10,040 And Georgi Markov feels 244 00:12:10,200 --> 00:12:13,660 some pain in his leg. 245 00:12:13,830 --> 00:12:16,500 And the individual concerned 246 00:12:16,660 --> 00:12:19,700 mutters an apology and climbs into a taxi. 247 00:12:19,830 --> 00:12:21,950 And Markov, from that moment onwards, 248 00:12:22,120 --> 00:12:24,160 becomes ill. 249 00:12:24,330 --> 00:12:27,200 He goes to hospital later that night, 250 00:12:27,370 --> 00:12:28,700 and a few days later, 251 00:12:28,870 --> 00:12:34,120 he succumbs to a very severe infection. 252 00:12:36,660 --> 00:12:39,120 SPENCE: Doctors who've examined his body 253 00:12:39,290 --> 00:12:41,910 found red swelling on the back of his thigh 254 00:12:42,080 --> 00:12:45,450 and, in a microscopic examination 255 00:12:45,620 --> 00:12:49,330 of the flesh from the wound site, 256 00:12:49,500 --> 00:12:50,950 they discovered a tiny, 257 00:12:51,080 --> 00:12:55,950 tiny, less than two-millimeter size little ball, 258 00:12:56,120 --> 00:12:58,790 mostly made out of platinum, 259 00:12:58,950 --> 00:13:01,580 which had holes drilled in it 260 00:13:01,750 --> 00:13:04,330 as a means to administer a poison. 261 00:13:04,540 --> 00:13:08,370 The poison, which has never been officially identified, 262 00:13:08,540 --> 00:13:10,660 was most likely ricin, 263 00:13:10,830 --> 00:13:12,910 which is a highly toxic substance, 264 00:13:13,080 --> 00:13:15,750 which is refined from castor beans. 265 00:13:16,870 --> 00:13:19,500 SHATNER: How was this deadly platinum ball 266 00:13:19,700 --> 00:13:22,120 implanted into Georgi Markov? 267 00:13:22,250 --> 00:13:25,040 Answers were not easy to come by, but then, 268 00:13:25,200 --> 00:13:28,700 investigators remembered one seemingly minor detail 269 00:13:28,870 --> 00:13:32,250 that may provide all the answers. 270 00:13:32,450 --> 00:13:34,000 SPENCE: They thought, "Ah, that umbrella. 271 00:13:34,200 --> 00:13:36,000 Eh, what was that all about?" 272 00:13:36,200 --> 00:13:38,660 And later, we learn that one of the things that both 273 00:13:38,870 --> 00:13:40,830 the KGB and the Bulgarians had come up with 274 00:13:41,000 --> 00:13:42,500 was an umbrella gun. 275 00:13:42,660 --> 00:13:45,660 They had a whole lab working on this. 276 00:13:45,750 --> 00:13:48,500 And there was a little tiny capsule, 277 00:13:48,660 --> 00:13:49,790 it was in the tip of the umbrella, 278 00:13:49,950 --> 00:13:51,410 which had a needle on it, 279 00:13:51,540 --> 00:13:54,790 and you'd just poke somebody and then walked away. 280 00:13:56,160 --> 00:13:58,700 BUSTAMANTE: How do you kill somebody in plain daylight, 281 00:13:58,870 --> 00:14:01,000 in public, without anybody knowing about it? 282 00:14:01,160 --> 00:14:02,660 And the answer is that you find a way 283 00:14:02,870 --> 00:14:04,410 to create some sort of device, like an umbrella, 284 00:14:04,540 --> 00:14:07,160 that blends in every day, 285 00:14:07,290 --> 00:14:09,910 but can still deliver a lethal dose when you need it to. 286 00:14:10,080 --> 00:14:10,830 -(umbrella clicks) -(man grunts) 287 00:14:10,950 --> 00:14:12,370 This is exactly what makes 288 00:14:12,540 --> 00:14:14,080 spy agencies and spy tech 289 00:14:14,250 --> 00:14:16,200 something of interest and renown, 290 00:14:16,370 --> 00:14:18,290 because there's a great deal of effort, 291 00:14:18,450 --> 00:14:19,830 a great deal of investment 292 00:14:19,950 --> 00:14:22,160 that's put into making a clandestine weapon. 293 00:14:23,200 --> 00:14:26,790 SHATNER: The umbrella suspected of killing Georgi Markov 294 00:14:26,950 --> 00:14:29,410 was never recovered, so investigators 295 00:14:29,580 --> 00:14:31,660 had no way to definitively confirm 296 00:14:31,870 --> 00:14:34,500 such a device was responsible for his murder. 297 00:14:35,540 --> 00:14:39,200 But as far as the identity of the mysterious assassin 298 00:14:39,370 --> 00:14:40,750 who bumped into Markov, 299 00:14:40,950 --> 00:14:44,500 well... that's another mystery. 300 00:14:45,580 --> 00:14:47,910 BARSKY: When it comes to assassinating people, 301 00:14:48,080 --> 00:14:50,870 we know that the KGB did quite a... quite a bit of that, 302 00:14:51,040 --> 00:14:53,330 and we know that the Russian intelligence does it now, too. 303 00:14:53,540 --> 00:14:55,160 There's an arsenal of weapons. 304 00:14:55,330 --> 00:14:59,120 And Markov was a very loud dissident. 305 00:14:59,290 --> 00:15:02,370 So, he was an enemy of the revolution, 306 00:15:02,540 --> 00:15:04,370 and he had to be killed. 307 00:15:04,540 --> 00:15:06,660 But the man who was seen 308 00:15:06,830 --> 00:15:09,660 to stick that umbrella into Markov's leg, 309 00:15:09,830 --> 00:15:11,370 I think he got away with this. 310 00:15:13,410 --> 00:15:16,290 ANDREW HAMMOND: What history says about the assassination of Georgi Markov 311 00:15:16,410 --> 00:15:19,330 is a little similar to "Who was Jack the Ripper?" 312 00:15:19,500 --> 00:15:21,120 "Who killed JFK?" 313 00:15:21,250 --> 00:15:23,080 What's the final definitive story? 314 00:15:23,250 --> 00:15:26,200 Hopefully, we'll know one day, maybe we never will. 315 00:15:27,540 --> 00:15:29,410 SHATNER: Today, a replica of the notorious umbrella 316 00:15:29,620 --> 00:15:33,250 hangs in the International Spy Museum's collection. 317 00:15:33,410 --> 00:15:35,700 And while it can never be proven that a similar device 318 00:15:35,870 --> 00:15:38,830 was used to poison Georgi Markov, 319 00:15:39,000 --> 00:15:40,660 one thing is certain: 320 00:15:40,830 --> 00:15:43,330 The deadly tools of spy craft 321 00:15:43,540 --> 00:15:45,540 could be made to look like anything, 322 00:15:45,700 --> 00:15:47,330 and you wouldn't know it 323 00:15:47,540 --> 00:15:50,580 until it's too late. 324 00:15:52,410 --> 00:15:53,580 SPENCE: In terms of 325 00:15:53,750 --> 00:15:55,330 what could be future spy weapons, 326 00:15:55,500 --> 00:15:57,750 secret spy gadgets they could come up with, 327 00:15:57,870 --> 00:16:01,700 well, one of them is tiny, tiny drones 328 00:16:01,870 --> 00:16:04,040 that could fly inside you, perhaps, 329 00:16:04,200 --> 00:16:07,450 administer poisons, carry tiny cameras. 330 00:16:07,580 --> 00:16:10,250 The use of frequency weapons might be something else. 331 00:16:10,410 --> 00:16:14,250 Essentially, some sort of energy beam 332 00:16:14,410 --> 00:16:17,120 which is being directed at people, 333 00:16:17,290 --> 00:16:20,000 affecting the brain in some way, 334 00:16:20,120 --> 00:16:22,450 which would create feelings of disorientation, 335 00:16:22,620 --> 00:16:24,580 and if it managed to 336 00:16:24,750 --> 00:16:26,870 discombobulate the right targets, 337 00:16:27,040 --> 00:16:28,830 it could interfere with 338 00:16:29,000 --> 00:16:31,500 their ability to perform their duties. 339 00:16:32,750 --> 00:16:35,040 So, energy weapons could be useful 340 00:16:35,200 --> 00:16:37,120 in the world of spies. 341 00:16:37,290 --> 00:16:39,750 But yes, there's a secret war to always try 342 00:16:39,910 --> 00:16:41,660 to be one step ahead of your opponent 343 00:16:41,830 --> 00:16:45,160 by coming up with something that they hadn't thought of... yet. 344 00:16:45,330 --> 00:16:49,080 And it can be someone passing you by with an umbrella. 345 00:16:50,250 --> 00:16:53,040 Was the assassination of Georgi Markov 346 00:16:53,200 --> 00:16:55,450 the work of Soviet intelligence? 347 00:16:55,660 --> 00:16:58,160 Like the top secret nature of espionage itself, 348 00:16:58,330 --> 00:17:00,370 there's a lot we may never know. 349 00:17:01,870 --> 00:17:04,040 But there is one spy mystery 350 00:17:04,200 --> 00:17:08,120 that has intelligence officers worried, even now. 351 00:17:08,330 --> 00:17:10,830 It involves a foreign asset 352 00:17:10,950 --> 00:17:13,330 who infiltrated the American government 353 00:17:13,500 --> 00:17:17,370 intent on stealing national secrets. 354 00:17:26,830 --> 00:17:28,290 SHATNER: President Harry Truman 355 00:17:28,370 --> 00:17:32,160 establishes the Central Intelligence Agency. 356 00:17:32,330 --> 00:17:34,160 In the wake of World War II, 357 00:17:34,290 --> 00:17:36,410 and with the rise of atomic weaponry, 358 00:17:36,580 --> 00:17:40,660 a new covert war is about to begin 359 00:17:40,830 --> 00:17:44,000 between the United States and the Soviet Union. 360 00:17:44,160 --> 00:17:47,870 This unprecedented era of espionage 361 00:17:48,040 --> 00:17:51,830 from 1947 to 1991 is known 362 00:17:52,000 --> 00:17:53,700 as the Cold War. 363 00:17:55,450 --> 00:17:59,540 LUBIN: At the start of the Cold War as we know it in the 1950s, 364 00:17:59,700 --> 00:18:01,250 the U.S. realized that it needed to advance 365 00:18:01,410 --> 00:18:03,500 its internal security measures. 366 00:18:03,620 --> 00:18:05,160 This is why Truman 367 00:18:05,370 --> 00:18:09,250 would ultimately generate a presidential executive order 368 00:18:09,370 --> 00:18:13,000 on confidential materials, 369 00:18:13,160 --> 00:18:15,200 which still, to this day, is the way by which 370 00:18:15,370 --> 00:18:18,250 we set different degrees of confidentiality 371 00:18:18,410 --> 00:18:21,330 around secret documents here in the United States. 372 00:18:22,370 --> 00:18:24,500 SHATNER: During the Cold War, both the CIA 373 00:18:24,700 --> 00:18:26,500 and the Soviet Union's KGB 374 00:18:26,700 --> 00:18:29,370 employed spies to steal each other's 375 00:18:29,580 --> 00:18:31,000 national secrets. 376 00:18:31,160 --> 00:18:33,290 And while any civilian could be recruited 377 00:18:33,500 --> 00:18:36,580 to spy on their home country for the other side, 378 00:18:36,700 --> 00:18:40,000 even more valuable were those already working 379 00:18:40,160 --> 00:18:42,160 in the intelligence community. 380 00:18:42,370 --> 00:18:45,580 These turncoats are known as... 381 00:18:45,750 --> 00:18:47,330 double agents. 382 00:18:47,540 --> 00:18:48,950 HAMMOND: To be a double agent, 383 00:18:49,120 --> 00:18:51,700 for example, I'm an agent. 384 00:18:51,870 --> 00:18:54,290 I'm working with the CIA over here. 385 00:18:54,410 --> 00:18:57,330 But I'm also working with the KGB over here. 386 00:18:57,540 --> 00:19:00,290 I'm a double agent in the middle. 387 00:19:00,450 --> 00:19:03,950 But it's quite often used in shorthand to refer 388 00:19:04,120 --> 00:19:06,160 to anybody who works in this world 389 00:19:06,330 --> 00:19:08,660 who also works for the other side. 390 00:19:08,790 --> 00:19:12,750 LUBIN: There will be a closed universe of individuals in the know 391 00:19:12,870 --> 00:19:14,500 about particular secrets, 392 00:19:14,660 --> 00:19:17,450 and you need to penetrate those kinds of closed networks. 393 00:19:17,620 --> 00:19:20,660 And so, the best way to do that is by 394 00:19:20,790 --> 00:19:22,370 turning a double agent, 395 00:19:22,540 --> 00:19:25,660 a person, into an information sharer. 396 00:19:27,700 --> 00:19:29,450 SHATNER: The U.S. intelligence community 397 00:19:29,540 --> 00:19:33,040 is made up of 18 different agencies and organizations. 398 00:19:33,200 --> 00:19:34,950 So, we have to wonder, 399 00:19:35,120 --> 00:19:38,250 are there double agents among them, 400 00:19:38,370 --> 00:19:41,120 sharing our most closely guarded secrets 401 00:19:41,250 --> 00:19:42,750 with our enemies? 402 00:19:42,910 --> 00:19:47,120 Remarkably, the answer is yes. 403 00:19:48,870 --> 00:19:52,580 And many consider the most damaging double agent ever 404 00:19:52,750 --> 00:19:55,660 discovered was a 31-year veteran of the CIA 405 00:19:55,830 --> 00:19:58,790 named Aldrich Ames. 406 00:19:58,910 --> 00:20:01,660 WEST: Aldrich Ames was a counterintelligence officer 407 00:20:01,790 --> 00:20:03,660 in the directorate 408 00:20:03,830 --> 00:20:05,040 of operations. 409 00:20:05,250 --> 00:20:06,830 And he was a senior individual 410 00:20:07,000 --> 00:20:08,120 who in 1985, 411 00:20:08,290 --> 00:20:10,080 as a result of a bad divorce, 412 00:20:10,250 --> 00:20:12,160 was short of money, 413 00:20:12,330 --> 00:20:14,330 and he sold out to the Soviets. 414 00:20:14,410 --> 00:20:17,450 He just simply went to the embassy, 415 00:20:17,620 --> 00:20:20,330 asked to speak to a KGB officer, 416 00:20:20,540 --> 00:20:24,450 and then sold information through letters, 417 00:20:24,580 --> 00:20:27,000 which was highly classified operations, 418 00:20:27,160 --> 00:20:31,370 and a large number of identities 419 00:20:31,580 --> 00:20:36,200 who were people who had worked either for the FBI or the CIA 420 00:20:36,370 --> 00:20:39,750 in the Soviet embassy in Washington, D.C. 421 00:20:41,450 --> 00:20:43,000 MORAN: There were suspicions 422 00:20:43,160 --> 00:20:46,830 that there was a spy within the CIA 423 00:20:47,000 --> 00:20:49,290 because in the 1980s, 424 00:20:49,450 --> 00:20:52,500 many of our Russian sources 425 00:20:52,700 --> 00:20:53,830 in Russia 426 00:20:54,040 --> 00:20:55,580 started kind of dropping like flies. 427 00:20:55,750 --> 00:21:00,370 And this set off alarm bells at the CIA. 428 00:21:00,540 --> 00:21:04,290 And so an investigation was launched. 429 00:21:04,450 --> 00:21:08,330 But, bizarrely, it took many, many years to realize 430 00:21:08,540 --> 00:21:10,160 that it was Aldrich Ames, 431 00:21:10,330 --> 00:21:13,370 even though Aldrich Ames displayed 432 00:21:13,580 --> 00:21:15,410 many of the characteristics 433 00:21:15,580 --> 00:21:18,950 of what would be a viable target for recruitment. 434 00:21:19,120 --> 00:21:22,330 He had a known problem with alcohol. 435 00:21:22,540 --> 00:21:27,620 He had married a Colombian woman who had very expensive tastes. 436 00:21:27,750 --> 00:21:30,750 He bought a house in Virginia with cash 437 00:21:30,910 --> 00:21:34,000 for $540,000. 438 00:21:34,200 --> 00:21:36,500 He bought a Jaguar. 439 00:21:36,700 --> 00:21:38,950 He started to dress really well. 440 00:21:39,120 --> 00:21:40,620 He got new teeth. 441 00:21:40,830 --> 00:21:45,580 And all of these are pretty obvious indicators 442 00:21:45,790 --> 00:21:49,950 that someone is working for a foreign intelligence service 443 00:21:50,080 --> 00:21:52,910 because he couldn't afford all that on his CIA salary. 444 00:21:53,910 --> 00:21:56,000 Aldrich Ames is one of the most famous 445 00:21:56,120 --> 00:21:57,830 CIA compromises of all times. 446 00:21:58,000 --> 00:22:00,700 He went many, many years clandestinely acquiring 447 00:22:00,870 --> 00:22:02,620 and giving information to the Russians 448 00:22:02,700 --> 00:22:05,410 until his ultimate arrest in the 1990s. 449 00:22:06,500 --> 00:22:08,450 It's very difficult to be able to quantify 450 00:22:08,620 --> 00:22:11,330 the amount of damage that Aldrich Ames did. 451 00:22:11,540 --> 00:22:14,910 We know that CIA spies were systematically killed. 452 00:22:15,120 --> 00:22:16,500 And even to this day, 453 00:22:16,660 --> 00:22:19,160 CIA is always training new recruits 454 00:22:19,370 --> 00:22:21,040 to understand Aldrich Ames 455 00:22:21,200 --> 00:22:22,330 to make sure that they don't have 456 00:22:22,540 --> 00:22:24,450 another instance like that happen again. 457 00:22:24,620 --> 00:22:28,200 SHATNER: Aldrich Ames was sentenced to life in prison. 458 00:22:28,330 --> 00:22:30,750 And his wife, Rosario, got five years for aiding 459 00:22:30,910 --> 00:22:34,950 her husband in his crimes against the United States. 460 00:22:36,000 --> 00:22:39,000 But Ames was not the only double agent discovered inside 461 00:22:39,160 --> 00:22:41,950 an American intelligence agency. 462 00:22:42,120 --> 00:22:43,660 In 2001, 463 00:22:43,870 --> 00:22:48,500 an FBI agent named Robert Hanssen was arrested 464 00:22:48,700 --> 00:22:50,500 for selling highly classified information 465 00:22:50,620 --> 00:22:53,330 to Russia for over 20 years. 466 00:22:53,450 --> 00:22:55,660 And it begs an urgent question: 467 00:22:55,790 --> 00:22:58,830 How many more double agents might be operating 468 00:22:58,950 --> 00:23:01,290 within the American intelligence community 469 00:23:01,450 --> 00:23:04,660 right now that have never been caught? 470 00:23:05,700 --> 00:23:08,250 LUBIN: It is very likely that there is a Russian double agent 471 00:23:08,410 --> 00:23:10,660 within the U.S. government today. 472 00:23:10,830 --> 00:23:12,620 In the same way, it is very likely 473 00:23:12,790 --> 00:23:14,200 that there is a double agent 474 00:23:14,370 --> 00:23:15,950 working for the Chinese government 475 00:23:16,120 --> 00:23:19,750 or the Iranian government or the North Korean government. 476 00:23:19,870 --> 00:23:22,250 The United States has many enemies around the world, 477 00:23:22,410 --> 00:23:24,660 and those enemies are interested in gathering 478 00:23:24,790 --> 00:23:27,700 intimate information about U.S. doings. 479 00:23:28,700 --> 00:23:30,290 BUSTAMANTE: It's very uncomfortable to admit, 480 00:23:30,450 --> 00:23:32,000 but one thing that CIA officers are taught 481 00:23:32,200 --> 00:23:33,660 right out of the gates 482 00:23:33,830 --> 00:23:35,870 is that you must always assume at any given time 483 00:23:36,040 --> 00:23:37,660 that the CIA and the FBI are 484 00:23:37,790 --> 00:23:39,620 penetrated by a foreign intelligence service. 485 00:23:40,540 --> 00:23:42,290 We have to assume that. 486 00:23:42,410 --> 00:23:44,660 If we're lucky, there's only one. 487 00:23:45,660 --> 00:23:48,040 Probability-wise, there is more than one. 488 00:23:49,200 --> 00:23:51,500 Could there really be a foreign spy 489 00:23:51,660 --> 00:23:55,450 deeply embedded in a U.S. intelligence agency? 490 00:23:55,620 --> 00:23:59,410 Unraveling this mystery is truly a matter of national security 491 00:23:59,620 --> 00:24:02,620 because gaining secret information on an enemy 492 00:24:02,790 --> 00:24:05,500 can quickly shift the balance of global power. 493 00:24:05,620 --> 00:24:07,620 Such was the case in World War II, 494 00:24:07,700 --> 00:24:10,450 when Allied forces were convinced 495 00:24:10,620 --> 00:24:12,580 that a German double agent was leaking 496 00:24:12,700 --> 00:24:14,500 D-Day plans to the Nazis, 497 00:24:14,700 --> 00:24:18,080 one letter at a time. 498 00:24:26,120 --> 00:24:29,040 SHATNER: As World War II rages across Europe, 499 00:24:29,200 --> 00:24:31,540 the Allied forces spent five months 500 00:24:31,750 --> 00:24:34,290 planning a top secret invasion 501 00:24:34,410 --> 00:24:37,700 to recapture the French coastal town of Dieppe. 502 00:24:40,410 --> 00:24:42,000 But on August 19th, 503 00:24:42,160 --> 00:24:45,080 as the Allies began their surprise assault... 504 00:24:46,580 --> 00:24:48,450 ...it seems that somehow 505 00:24:48,620 --> 00:24:51,700 the Germans knew they were coming. 506 00:24:53,790 --> 00:24:57,750 McMAHON: The attack on Dieppe was a disaster for the Allies. 507 00:24:57,910 --> 00:25:01,160 Something like half of the 6,000 troops 508 00:25:01,370 --> 00:25:03,250 who land are either killed 509 00:25:03,410 --> 00:25:05,500 or taken prisoner. 510 00:25:05,660 --> 00:25:07,660 And so the concern was 511 00:25:07,870 --> 00:25:10,790 that classified information was being sent 512 00:25:10,950 --> 00:25:13,000 to the Axis powers, to the Nazis. 513 00:25:14,200 --> 00:25:15,830 And that using code breakers 514 00:25:16,040 --> 00:25:17,330 or spies, 515 00:25:17,500 --> 00:25:19,660 the attack had been foiled, 516 00:25:19,830 --> 00:25:22,660 had been discovered by the Axis powers. 517 00:25:23,700 --> 00:25:26,330 GENTILE: The Allies are repelled by the Nazis 518 00:25:26,450 --> 00:25:27,620 and the mission is a failure. 519 00:25:27,790 --> 00:25:30,620 And then people wanted to know why. 520 00:25:31,660 --> 00:25:33,330 The defeat was so stunning 521 00:25:33,500 --> 00:25:38,080 that British intelligence MI5 started looking for reasons. 522 00:25:38,250 --> 00:25:42,000 How did the Nazis know the invasion was happening? 523 00:25:42,160 --> 00:25:45,330 So it was suspected that there could be a spy 524 00:25:45,450 --> 00:25:47,250 sending messages to the Nazis 525 00:25:47,410 --> 00:25:49,620 to alert them of upcoming attacks. 526 00:25:50,700 --> 00:25:52,330 SHATNER: After the failed Dieppe invasion, 527 00:25:52,540 --> 00:25:55,330 British intelligence launched an investigation 528 00:25:55,500 --> 00:25:59,160 to find a potential Nazi spy in their midst. 529 00:25:59,330 --> 00:26:04,500 And in the process, they noticed something rather peculiar. 530 00:26:04,700 --> 00:26:07,700 Just two days before the surprise invasion on Dieppe, 531 00:26:07,870 --> 00:26:10,620 in the British newspaper The Daily Telegraph 532 00:26:10,790 --> 00:26:15,620 a curious clue appeared in that day's crossword puzzle. 533 00:26:15,790 --> 00:26:20,080 Around August 18, 1942, something very strange happened 534 00:26:20,290 --> 00:26:23,500 in the Telegraph's crossword. 535 00:26:23,660 --> 00:26:26,370 The crossword puzzle clue was "A French port." 536 00:26:26,540 --> 00:26:28,370 The answer was Dieppe. 537 00:26:28,540 --> 00:26:30,040 The big question was, 538 00:26:30,200 --> 00:26:32,500 was the word Dieppe in the crossword puzzle innocent? 539 00:26:32,700 --> 00:26:35,450 Or was it a warning to the Nazis 540 00:26:35,620 --> 00:26:37,830 alerting them that an attack was imminent? 541 00:26:38,000 --> 00:26:41,500 Is it possible that the Dieppe attack failed 542 00:26:41,660 --> 00:26:44,200 because of that crossword puzzle answer? 543 00:26:45,250 --> 00:26:47,580 SHATNER: Was a spy sending top secret Allied intelligence 544 00:26:47,700 --> 00:26:49,450 to the Nazis 545 00:26:49,580 --> 00:26:52,120 through crossword puzzles? 546 00:26:53,160 --> 00:26:55,660 After interrogating the creator of the crossword, 547 00:26:55,830 --> 00:26:59,330 a mild-mannered school teacher named Leonard Dawe, 548 00:26:59,540 --> 00:27:01,160 British intelligence concluded 549 00:27:01,330 --> 00:27:03,250 that the puzzle's use of the word "Dieppe..." 550 00:27:04,870 --> 00:27:08,120 ...was nothing more than a "remarkable coincidence." 551 00:27:08,250 --> 00:27:12,160 It seemed the case was closed until two years later, 552 00:27:12,370 --> 00:27:13,700 when code words started 553 00:27:13,910 --> 00:27:16,950 to appear in the newspaper's puzzle again. 554 00:27:19,200 --> 00:27:23,330 McMAHON: In 1944, the Allies were planning the D-Day invasion 555 00:27:23,500 --> 00:27:26,410 amidst a huge blanket of secrecy. 556 00:27:26,540 --> 00:27:28,450 And once again... (chuckles) 557 00:27:28,660 --> 00:27:31,000 the Daily Telegraph crossword 558 00:27:31,200 --> 00:27:32,950 starts spitting out 559 00:27:33,120 --> 00:27:36,830 information that should not be in the public domain. 560 00:27:37,000 --> 00:27:39,750 GENTILE: About three weeks before the invasion, 561 00:27:39,910 --> 00:27:42,750 in the Daily Telegraph, in the crossword puzzle, 562 00:27:42,910 --> 00:27:45,620 the code word "Utah" appears. 563 00:27:45,750 --> 00:27:50,080 Then a few days later, the code word "Omaha" appears. 564 00:27:50,200 --> 00:27:53,290 These are the two beaches where the American forces will land. 565 00:27:54,450 --> 00:27:55,830 Then the next puzzle, 566 00:27:56,000 --> 00:27:58,660 the code word "Overlord" appears. 567 00:27:58,870 --> 00:28:01,910 That's the name of the entire mission. 568 00:28:02,910 --> 00:28:04,540 This is becoming terrifying. 569 00:28:04,750 --> 00:28:07,160 Then the word "Neptune" appears. 570 00:28:07,290 --> 00:28:12,370 That's the code word for the British warships for D-Day. 571 00:28:12,540 --> 00:28:14,950 And then the word "Mulberry" appears. 572 00:28:15,120 --> 00:28:17,830 That's the code word for the portable docks 573 00:28:18,040 --> 00:28:20,660 that were built across the channel. 574 00:28:20,830 --> 00:28:22,660 When these code words started appearing, 575 00:28:22,750 --> 00:28:24,830 it-it was too much of a coincidence. 576 00:28:24,950 --> 00:28:27,700 MI5 were gonna get to the bottom of it. 577 00:28:27,870 --> 00:28:29,410 Especially after Dieppe. 578 00:28:30,540 --> 00:28:32,830 Once again, their search eventually led them 579 00:28:33,040 --> 00:28:36,160 to the author of the puzzle, Leonard Dawe. 580 00:28:36,370 --> 00:28:38,500 Is this the Nazi spy? 581 00:28:38,660 --> 00:28:40,790 And finally, it was determined 582 00:28:40,910 --> 00:28:42,830 that as a reward to some of the boys 583 00:28:43,000 --> 00:28:45,620 at the boys' school, he would let them pick the word 584 00:28:45,790 --> 00:28:47,870 to put in the crossword. 585 00:28:48,040 --> 00:28:49,370 And there just happened to be 586 00:28:49,540 --> 00:28:52,450 a lot of Allied soldiers stationed nearby. 587 00:28:52,660 --> 00:28:54,200 The kids hear these weird words-- 588 00:28:54,370 --> 00:28:56,700 Omaha, Utah-- 589 00:28:56,870 --> 00:28:59,000 and they say, "Let's put those in the puzzle." 590 00:28:59,160 --> 00:29:00,750 Not realizing 591 00:29:00,870 --> 00:29:03,160 they're about to give away the biggest invasion in history. 592 00:29:03,370 --> 00:29:05,870 SHATNER: Could the appearance of secret code names 593 00:29:06,040 --> 00:29:07,620 in British crossword puzzles 594 00:29:07,750 --> 00:29:09,910 have been simply an extraordinary coincidence, 595 00:29:10,120 --> 00:29:12,580 or was it a clever spy craft tool? 596 00:29:12,750 --> 00:29:15,080 We may never know for sure. 597 00:29:15,200 --> 00:29:17,000 Like in the case of another wordplay 598 00:29:17,160 --> 00:29:19,830 70 years after World War II 599 00:29:20,040 --> 00:29:22,290 that some believed was intended 600 00:29:22,370 --> 00:29:24,950 to have deadly consequences. 601 00:29:27,080 --> 00:29:30,160 MORAN: In 2012, in Venezuela, 602 00:29:30,290 --> 00:29:32,250 there was speculation 603 00:29:32,370 --> 00:29:35,200 that a crossword puzzle 604 00:29:35,370 --> 00:29:39,790 in the daily paper contained coded messages 605 00:29:39,910 --> 00:29:42,330 that were meant to signal a threat 606 00:29:42,450 --> 00:29:46,290 against the brother of President Hugo Chávez. 607 00:29:46,450 --> 00:29:49,000 There was "Asesinen," which means "to kill." 608 00:29:49,200 --> 00:29:53,160 There was "Ráfagas," which means "Burst of machine gun fire," 609 00:29:53,330 --> 00:29:57,410 and there was also the first name of Chávez's brother. 610 00:29:58,410 --> 00:30:02,950 And so all of this led to the conspiracy theory 611 00:30:03,120 --> 00:30:04,660 or conspiracy thought 612 00:30:04,870 --> 00:30:08,330 that this must mean that an assassination attempt 613 00:30:08,500 --> 00:30:11,120 was on the horizon of Chávez's brother. 614 00:30:11,200 --> 00:30:15,000 The government essentially accused the newspaper 615 00:30:15,160 --> 00:30:17,330 and the designer of this crossword puzzle 616 00:30:17,540 --> 00:30:21,950 of a plot and of transmitting this coded threat. 617 00:30:22,120 --> 00:30:24,790 Whether or not this actually was 618 00:30:24,950 --> 00:30:27,790 an indication of an imminent threat 619 00:30:27,910 --> 00:30:31,040 against Chávez's brother, I don't know. 620 00:30:31,250 --> 00:30:34,700 SHATNER: No attempt on Adán Chávez's life was made, 621 00:30:34,870 --> 00:30:37,000 or at least publicly acknowledged. 622 00:30:37,160 --> 00:30:40,000 If spies really do send secret messages 623 00:30:40,200 --> 00:30:43,500 via crossword puzzles, it's still a matter of speculation 624 00:30:43,660 --> 00:30:46,870 and perhaps an ingenious method 625 00:30:47,040 --> 00:30:50,660 to share confidential information in plain sight. 626 00:30:50,870 --> 00:30:52,700 There are aspects of that 627 00:30:52,870 --> 00:30:56,160 that certainly match typical trade craft. 628 00:30:56,330 --> 00:30:59,950 So it's not preposterous to think 629 00:31:00,080 --> 00:31:04,790 that a crossword puzzle could be used to deliver a coded message. 630 00:31:04,950 --> 00:31:06,950 In fact, that's a very 631 00:31:07,120 --> 00:31:09,330 brilliant way that you might convey 632 00:31:09,540 --> 00:31:11,450 a coded message to a spy. 633 00:31:13,080 --> 00:31:16,950 Sending covert messages through newspaper crossword puzzles is 634 00:31:17,160 --> 00:31:19,450 truly a clever way to share secret information. 635 00:31:19,620 --> 00:31:23,200 But there was also a simpler tool spies used 636 00:31:23,370 --> 00:31:25,910 during the Second World War to communicate in code 637 00:31:26,080 --> 00:31:27,910 over vast distances. 638 00:31:28,080 --> 00:31:31,500 All you needed was a radio. 639 00:31:38,790 --> 00:31:41,080 SHATNER: With $10,000 in his pocket, 640 00:31:41,250 --> 00:31:44,950 29-year-old Soviet spy Albrecht Dittrich arrives 641 00:31:45,120 --> 00:31:46,580 in the United States. 642 00:31:47,910 --> 00:31:49,580 Using a stolen birth certificate, 643 00:31:49,700 --> 00:31:54,330 he adopts the alias Jack Barsky and begins a ten-year mission 644 00:31:54,500 --> 00:31:59,830 to spy on Americans as a sleeper agent for the KGB. 645 00:32:00,000 --> 00:32:01,450 JACK BARSKY: A sleeper agent is somebody 646 00:32:01,620 --> 00:32:06,290 who, uh, establishes himself in enemy territory 647 00:32:06,410 --> 00:32:09,040 and integrates in society and then waits for the day 648 00:32:09,200 --> 00:32:11,410 when it's time to spring into action. 649 00:32:12,410 --> 00:32:14,160 My mission in the United States focused 650 00:32:14,370 --> 00:32:16,040 on me getting close to people 651 00:32:16,200 --> 00:32:18,540 who make foreign policy decisions 652 00:32:18,750 --> 00:32:22,000 and/or influence foreign policy. 653 00:32:22,120 --> 00:32:24,830 This is towards the end of the Cold War 654 00:32:25,000 --> 00:32:27,500 where there was a spy war going on 655 00:32:27,660 --> 00:32:30,080 between the CIA and the KGB. 656 00:32:30,250 --> 00:32:33,080 And the tensions were very high. 657 00:32:34,950 --> 00:32:36,660 SHATNER: After relocating to New York City, 658 00:32:36,790 --> 00:32:38,910 Barsky married and began a family. 659 00:32:39,040 --> 00:32:41,580 He also took a job at an insurance company 660 00:32:41,700 --> 00:32:43,160 to maintain his cover 661 00:32:43,330 --> 00:32:45,330 working as a computer programmer. 662 00:32:45,410 --> 00:32:48,620 BARSKY: I had access to lots and lots of data. 663 00:32:48,790 --> 00:32:52,290 And some of the data would've been very important for the KGB. 664 00:32:53,290 --> 00:32:56,660 But there was never a meeting between me 665 00:32:56,870 --> 00:33:00,080 and another KGB agent on the territory of the United States. 666 00:33:00,200 --> 00:33:02,500 I got my instructions and answers to questions 667 00:33:02,700 --> 00:33:04,250 through shortwave radio. 668 00:33:05,500 --> 00:33:07,750 Every Thursday at 9:15, 669 00:33:07,910 --> 00:33:09,580 I had to turn on my shortwave radio, 670 00:33:09,750 --> 00:33:13,250 dial my frequency, listen to the call signal, 671 00:33:13,410 --> 00:33:17,500 Morse code, only digits, no letters 672 00:33:17,580 --> 00:33:20,620 and then start writing down the numbers. 673 00:33:20,750 --> 00:33:22,000 And there you have your message. 674 00:33:22,500 --> 00:33:24,200 SHATNER: For nearly ten years, 675 00:33:24,370 --> 00:33:27,330 Barsky's primary tool for communicating with the KGB 676 00:33:27,450 --> 00:33:30,080 was through a kind of shortwave radio broadcast 677 00:33:30,200 --> 00:33:33,120 known as a numbers station. 678 00:33:35,160 --> 00:33:38,330 Number stations are essentially pirate radio stations. 679 00:33:38,540 --> 00:33:40,750 You need to register a radio station. 680 00:33:40,910 --> 00:33:42,250 Number stations are not registered. 681 00:33:42,410 --> 00:33:44,410 (radio static) 682 00:33:44,580 --> 00:33:47,000 They were discovered almost accidentally 683 00:33:47,160 --> 00:33:49,000 during the Cold War. 684 00:33:49,160 --> 00:33:50,700 You had ham radio operators 685 00:33:50,870 --> 00:33:52,160 bouncing around different frequencies, 686 00:33:52,370 --> 00:33:54,500 talking to each other all over the world. 687 00:33:54,660 --> 00:33:57,830 And then, they would hit upon a certain channel 688 00:33:57,950 --> 00:33:59,410 and suddenly you hear 689 00:33:59,580 --> 00:34:01,870 a robotic voice repeating numbers. 690 00:34:02,040 --> 00:34:06,830 (female voice speaking foreign language) 691 00:34:07,040 --> 00:34:08,450 GENTILE: ...or you hear 692 00:34:08,620 --> 00:34:12,120 some kind of music or flute or buzzing sounds. 693 00:34:12,290 --> 00:34:13,950 (beeping, buzzing) 694 00:34:14,620 --> 00:34:16,120 It feels like you're eavesdropping 695 00:34:16,250 --> 00:34:17,450 on something secret, 696 00:34:17,620 --> 00:34:18,700 but you don't know what they're saying. 697 00:34:19,750 --> 00:34:24,160 MORAN: Number stations can transmit signals 698 00:34:24,250 --> 00:34:29,620 to sources globally, and they can do so undetected, 699 00:34:29,790 --> 00:34:30,830 because to anyone else, 700 00:34:31,040 --> 00:34:32,950 it might just sound like buzzing 701 00:34:33,120 --> 00:34:34,950 or like a series of noises. 702 00:34:35,120 --> 00:34:37,000 (buzzing) 703 00:34:37,160 --> 00:34:40,830 But what they're transmitting are coded signals 704 00:34:40,950 --> 00:34:43,620 to a source in place, or a spy. 705 00:34:45,450 --> 00:34:48,700 So even though they're very low tech, 706 00:34:48,870 --> 00:34:50,080 they're very effective... 707 00:34:50,250 --> 00:34:53,120 (indistinct radio chatter) 708 00:34:53,290 --> 00:34:55,200 MORAN: ...because they're able 709 00:34:55,330 --> 00:34:57,700 to exist and to communicate 710 00:34:57,910 --> 00:34:59,080 under the radar. 711 00:34:59,250 --> 00:35:00,870 (indistinct radio chatter) 712 00:35:01,040 --> 00:35:02,620 SHATNER: During the Cold War, both the United States 713 00:35:02,830 --> 00:35:06,000 and the Soviet Union regularly employed number stations 714 00:35:06,200 --> 00:35:09,330 to communicate with their agents in the field. 715 00:35:10,700 --> 00:35:14,000 But if anyone with a radio can tune in to hear the broadcast, 716 00:35:14,160 --> 00:35:16,830 how are these coded spy messages kept secret? 717 00:35:17,000 --> 00:35:19,580 Well, according to experts, 718 00:35:19,750 --> 00:35:22,410 it's an unbreakable method of encryption. 719 00:35:22,580 --> 00:35:26,040 A simple piece of paper known as... 720 00:35:26,250 --> 00:35:28,950 a one-time pad. 721 00:35:29,120 --> 00:35:31,830 A one-time pad has little numbers on them. 722 00:35:32,040 --> 00:35:34,250 And there's two identical versions. 723 00:35:34,370 --> 00:35:37,000 One is for the encoding of a message, 724 00:35:37,200 --> 00:35:39,290 and the other one is for the decoding. 725 00:35:39,450 --> 00:35:40,910 (indistinct radio chatter) 726 00:35:41,080 --> 00:35:42,370 So you would hear something 727 00:35:42,540 --> 00:35:45,830 like "Nine, seven, six, four," 728 00:35:46,000 --> 00:35:47,830 and then you could use the decoder 729 00:35:48,000 --> 00:35:49,450 to decrypt your message. 730 00:35:50,500 --> 00:35:54,700 HAMMOND: A one-time pad is a sheet of paper with banks of numbers. 731 00:35:55,830 --> 00:35:57,370 You use this and someone else 732 00:35:57,540 --> 00:35:58,950 that you're trying to communicate with 733 00:35:59,120 --> 00:36:01,160 uses that same pad. 734 00:36:01,290 --> 00:36:03,330 The two of you can then communicate, 735 00:36:03,540 --> 00:36:05,330 but it's called a one-time pad 736 00:36:05,500 --> 00:36:08,790 because after you've used it, you then destroy it. 737 00:36:08,950 --> 00:36:11,080 Assuming that you destroy it, 738 00:36:11,290 --> 00:36:14,330 you can then go on to use the next one-time pad. 739 00:36:14,450 --> 00:36:17,950 And if you keep using it, sticking to the protocol, 740 00:36:18,080 --> 00:36:20,660 it's uncrackable. 741 00:36:21,700 --> 00:36:25,120 SHATNER: If number stations have proven so effective in the past, 742 00:36:25,290 --> 00:36:27,330 the real question is, are spies still sending 743 00:36:27,540 --> 00:36:31,040 and receiving coded messages through them today? 744 00:36:31,200 --> 00:36:32,750 (voice warbling) 745 00:36:34,540 --> 00:36:36,000 BUSTAMANTE: Even today, 746 00:36:36,200 --> 00:36:37,330 you can flip through the different channels 747 00:36:37,540 --> 00:36:39,370 and you can hear things over the radio 748 00:36:39,540 --> 00:36:42,500 that don't make any sense. 749 00:36:42,700 --> 00:36:44,410 Whether they're verses being read 750 00:36:44,580 --> 00:36:46,040 or whether they're words being said nonsensically 751 00:36:46,200 --> 00:36:47,660 or whether they're numbers 752 00:36:47,790 --> 00:36:49,120 that are shouted out to the blindness of space. 753 00:36:49,250 --> 00:36:51,660 (indistinct radio chatter) 754 00:36:51,870 --> 00:36:54,620 So it's very possible somewhere in there 755 00:36:54,790 --> 00:36:56,830 there's a spy message that's sent 756 00:36:57,040 --> 00:36:59,200 for a very specific person at a very specific time 757 00:36:59,370 --> 00:37:01,000 in a very specific way. 758 00:37:01,200 --> 00:37:02,910 ROBOTIC FEMALE VOICE: One, three... 759 00:37:03,040 --> 00:37:05,330 SHATNER: If spies are still receiving messages 760 00:37:05,410 --> 00:37:09,000 via number stations today, we'll obviously never know. 761 00:37:09,160 --> 00:37:13,040 But what many experts believe may be even more concerning 762 00:37:13,200 --> 00:37:15,160 when it comes to national security 763 00:37:15,330 --> 00:37:17,410 aren't relics from the past 764 00:37:17,580 --> 00:37:19,750 but the technologies of today. 765 00:37:30,910 --> 00:37:33,750 SHATNER: While doing routine computer maintenance, 766 00:37:33,910 --> 00:37:35,580 a defense contractor finds 767 00:37:35,700 --> 00:37:39,290 evidence that Russian spies hacked into the base's network 768 00:37:39,410 --> 00:37:43,160 to access top secret intelligence 769 00:37:43,330 --> 00:37:48,500 from the Pentagon, NASA, and other U.S. agencies. 770 00:37:48,700 --> 00:37:52,620 It is the first major cyber espionage operation 771 00:37:52,790 --> 00:37:55,620 that we know of in modern history. 772 00:37:56,950 --> 00:37:58,830 BUSTAMANTE: One of the big advancements in espionage is 773 00:37:59,000 --> 00:38:00,790 something known as the cyber spy 774 00:38:00,950 --> 00:38:02,500 or the spy who lives behind 775 00:38:02,620 --> 00:38:04,080 a digital wall of some sort. 776 00:38:05,120 --> 00:38:07,250 They can steal information, they can sell information, 777 00:38:07,450 --> 00:38:09,700 they can live and hide on the dark web. 778 00:38:10,750 --> 00:38:12,910 This is a whole new development, and with that development, 779 00:38:13,120 --> 00:38:16,410 there's new opportunities and there's new risks. 780 00:38:16,580 --> 00:38:19,040 We have new technology that cyber spies can use 781 00:38:19,200 --> 00:38:20,620 to meet in cyberspace. 782 00:38:20,790 --> 00:38:23,330 You can meet with them on video game platforms, 783 00:38:23,450 --> 00:38:25,200 you can meet with them in chat rooms, 784 00:38:25,370 --> 00:38:26,540 you can meet with them using 785 00:38:26,700 --> 00:38:28,330 commercially encrypted technology 786 00:38:28,500 --> 00:38:30,450 that you and I carry on our phone. 787 00:38:30,580 --> 00:38:33,160 Which makes everything that much more difficult to track, 788 00:38:33,330 --> 00:38:34,660 not just for the FBI 789 00:38:34,870 --> 00:38:36,620 or for the internal investigation agency, 790 00:38:36,790 --> 00:38:38,750 but for anyone to see anywhere. 791 00:38:39,700 --> 00:38:41,620 SHATNER: Advancing technology has 792 00:38:41,790 --> 00:38:45,410 empowered cyber spies to not only hack government secrets 793 00:38:45,580 --> 00:38:47,750 but also exchange that information 794 00:38:47,870 --> 00:38:50,160 in complete anonymity. 795 00:38:50,370 --> 00:38:52,540 But some cyber spies are not 796 00:38:52,660 --> 00:38:54,330 interested in stealing information 797 00:38:54,500 --> 00:38:58,000 but rather to influence the very beliefs 798 00:38:58,200 --> 00:38:59,910 of their adversaries. 799 00:39:01,200 --> 00:39:04,330 BARSKY: There's a place called the Internet Research Agency 800 00:39:04,450 --> 00:39:07,950 in St. Petersburg, Russia where 801 00:39:08,080 --> 00:39:11,450 there's a couple of hundred nerds that produce 802 00:39:11,620 --> 00:39:13,160 these artificial personas, 803 00:39:13,330 --> 00:39:17,500 and then they go on social media and befriend real people... 804 00:39:18,450 --> 00:39:21,000 ...and they search out groups 805 00:39:21,200 --> 00:39:24,120 that are ideologically oriented. 806 00:39:24,290 --> 00:39:25,950 It could be particularly in politics, 807 00:39:26,120 --> 00:39:28,870 it could be the right wing and it could be left. 808 00:39:29,040 --> 00:39:32,160 And what they're after is 809 00:39:32,370 --> 00:39:36,410 to create confusion in enemy territory. 810 00:39:38,700 --> 00:39:40,500 I can give you an example. 811 00:39:40,620 --> 00:39:42,620 When you're talking about election interference, 812 00:39:42,750 --> 00:39:45,160 they planted misinformation. 813 00:39:45,330 --> 00:39:50,910 What they do is raising doubts about the American system. 814 00:39:52,500 --> 00:39:55,410 These cyber spies are extremely dangerous. 815 00:39:57,040 --> 00:40:00,540 SHATNER: According to America's Cyber Defense Agency CISA, 816 00:40:00,750 --> 00:40:04,580 during the 2024 U.S. presidential election, 817 00:40:04,700 --> 00:40:07,870 foreign adversaries conducted influence operations 818 00:40:08,040 --> 00:40:13,330 intended to undermine the integrity of U.S. elections. 819 00:40:13,540 --> 00:40:14,870 And while we can't say for sure 820 00:40:15,040 --> 00:40:18,200 how espionage will continue to evolve, 821 00:40:18,410 --> 00:40:22,160 we know that as long as there are secrets, 822 00:40:22,330 --> 00:40:24,450 there will be spies. 823 00:40:24,540 --> 00:40:26,120 BUSTAMANTE: The future of secrets is, 824 00:40:26,290 --> 00:40:28,500 in many ways, what will shape the future of espionage. 825 00:40:28,700 --> 00:40:30,330 But that doesn't mean that the history of espionage is 826 00:40:30,450 --> 00:40:32,120 any less useful than it was in the past. 827 00:40:32,250 --> 00:40:33,580 It's the foundation, 828 00:40:33,700 --> 00:40:35,830 it's the bedrock on which everything else is built. 829 00:40:36,000 --> 00:40:38,500 And no matter where our future takes us, we know 830 00:40:38,700 --> 00:40:40,370 that those building blocks of espionage, 831 00:40:40,540 --> 00:40:41,870 those core fundamentals 832 00:40:42,040 --> 00:40:43,790 will always be present and always be there. 833 00:40:43,950 --> 00:40:46,700 There will always be people meeting with people 834 00:40:46,870 --> 00:40:49,870 in dark corners to share secrets that nobody knows about. 835 00:40:51,870 --> 00:40:55,200 In the world of spy craft, everything is unexplained. 836 00:40:55,410 --> 00:40:59,040 And your job as an intelligence officer is 837 00:40:59,200 --> 00:41:01,620 to try to gather that information 838 00:41:01,790 --> 00:41:03,750 that will help explain it. 839 00:41:04,790 --> 00:41:07,830 The anomaly of spy craft is 840 00:41:08,040 --> 00:41:11,830 that you're charged with seeking out the truth. 841 00:41:11,950 --> 00:41:16,450 And the reality is you can never be 842 00:41:16,580 --> 00:41:20,790 100% sure that you've gotten to the truth. 843 00:41:20,950 --> 00:41:24,000 You may never have the answers. 844 00:41:25,040 --> 00:41:27,580 While it appears that the digital age may be 845 00:41:27,750 --> 00:41:29,450 changing the art of spy craft, 846 00:41:29,620 --> 00:41:30,910 it's pretty safe to say 847 00:41:31,040 --> 00:41:33,830 that as long as there are secrets worth stealing, 848 00:41:34,000 --> 00:41:36,450 there will be spies hard at work. 849 00:41:36,620 --> 00:41:39,250 And although we are intrigued 850 00:41:39,450 --> 00:41:41,950 by the elusive double agent at the CIA 851 00:41:42,120 --> 00:41:46,540 or even the assassin who killed with the probe of an umbrella, 852 00:41:46,700 --> 00:41:50,000 it's likely that most tales of espionage 853 00:41:50,160 --> 00:41:53,660 and the covert agents who operate undetected 854 00:41:53,830 --> 00:41:58,040 will stay top secret and remain... 855 00:41:59,160 --> 00:42:00,540 ...unexplained. 856 00:42:00,700 --> 00:42:02,540 CAPTIONING PROVIDED BY A+E NETWORKS66603

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.