All language subtitles for Spycraft.S01E04.1080p.WEB.H264-STRONTiUM_track8_[eng]

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian Download
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian Download
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish Download
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:09,720 --> 00:00:12,760 [dramatic soundtrack playing] 2 00:00:16,120 --> 00:00:18,920 [narrator] In the secretive world of espionage, 3 00:00:19,000 --> 00:00:22,400 spies work with the latest cutting-edge technology and devices 4 00:00:22,480 --> 00:00:24,680 to gain the upper hand on the enemy. 5 00:00:27,200 --> 00:00:31,440 When a spy's mission is to collect information by planting bugs, 6 00:00:31,520 --> 00:00:33,520 secretly snapping a photo, 7 00:00:33,600 --> 00:00:35,000 or stealing documents… 8 00:00:36,960 --> 00:00:40,200 they turn to their tech ops to create the perfect device. 9 00:00:41,480 --> 00:00:43,880 [man] If I had to describe the term "spycraft," 10 00:00:43,960 --> 00:00:46,800 I think it would run the gamut from, you know, tiny bugs 11 00:00:46,880 --> 00:00:48,960 that we would plant to eavesdrop, 12 00:00:49,040 --> 00:00:53,760 all the way up to the SR-71 Blackbird, the U-2, satellites. 13 00:00:53,840 --> 00:00:56,080 So, from the miniature up to the massive. 14 00:00:57,760 --> 00:01:01,520 Miniaturized collection platforms are a reality. 15 00:01:01,600 --> 00:01:03,000 You can fly it into a room. 16 00:01:03,080 --> 00:01:04,960 You can perch it on a windowsill. 17 00:01:05,040 --> 00:01:10,120 It can sit and it can collect audio and video and transmit it back. 18 00:01:13,080 --> 00:01:16,720 [narrator] The only limitation in creating gadgets for espionage 19 00:01:16,800 --> 00:01:19,080 is the scope of the imagination. 20 00:01:20,240 --> 00:01:22,920 [theme music playing] 21 00:01:52,720 --> 00:01:55,440 [narrator] One of the most important goals in espionage 22 00:01:55,520 --> 00:01:58,720 is to acquire sensitive intelligence about a foreign entity 23 00:01:58,800 --> 00:02:00,960 through clandestine collection. 24 00:02:01,560 --> 00:02:02,800 To succeed, 25 00:02:02,880 --> 00:02:07,120 spies must employ the most innovative cutting-edge technology, 26 00:02:07,200 --> 00:02:09,480 including powerful drones, 27 00:02:09,560 --> 00:02:12,280 cyber attacks, hidden cameras, 28 00:02:12,360 --> 00:02:15,000 lasers, audio surveillance, 29 00:02:15,080 --> 00:02:18,440 and the latest in biometric scanning capabilities. 30 00:02:18,520 --> 00:02:20,600 For spies to operate, 31 00:02:20,680 --> 00:02:23,680 they must not only collect information 32 00:02:23,760 --> 00:02:27,360 but have the ability to pass it along to their handlers 33 00:02:27,880 --> 00:02:29,880 to be analyzed and used. 34 00:02:29,960 --> 00:02:33,400 [narrator] Keith Melton is an internationally recognized author, 35 00:02:33,480 --> 00:02:38,080 historian and expert on clandestine devices and technology. 36 00:02:38,160 --> 00:02:40,120 He's also an avid protector 37 00:02:40,200 --> 00:02:44,080 of the largest collection of espionage artifacts in the world. 38 00:02:44,760 --> 00:02:49,440 For spies, the objective of an operation is usually 39 00:02:50,040 --> 00:02:54,760 to steal your adversary's information without them ever knowing it's missing. 40 00:02:54,840 --> 00:02:57,400 And we call that clandestine collection. 41 00:02:59,240 --> 00:03:03,480 [narrator] Getting away with it without anyone finding out what you've done 42 00:03:03,560 --> 00:03:06,000 is the biggest challenge for a spy. 43 00:03:11,920 --> 00:03:16,400 Sixty-one-year-old Kevin Mallory, a former CIA case officer, 44 00:03:16,480 --> 00:03:20,360 is contacted on LinkedIn by a man named Michael Yang 45 00:03:20,440 --> 00:03:24,000 he believes is an employee of a Chinese think tank. 46 00:03:24,720 --> 00:03:29,480 Mallory soon learns he's dealing with a Chinese intelligence officer. 47 00:03:29,560 --> 00:03:32,440 They offer him money in exchange for information. 48 00:03:33,200 --> 00:03:34,920 [Melton] He was desperately short of money. 49 00:03:35,000 --> 00:03:37,080 He decides to sell out to China, 50 00:03:37,680 --> 00:03:39,000 takes a trip over there, 51 00:03:39,080 --> 00:03:42,120 and they give him a cell phone they tell him is secure 52 00:03:42,200 --> 00:03:45,800 and he can use and send, communicate back and forth, 53 00:03:45,880 --> 00:03:47,040 and it's unbreakable. 54 00:03:48,200 --> 00:03:51,160 [narrator] Mallory's phone has been modified with software 55 00:03:51,240 --> 00:03:54,040 to allow for secure communication 56 00:03:54,120 --> 00:03:58,640 and the clandestine collection and transmission of secret documents. 57 00:04:00,800 --> 00:04:05,680 In April 2017, surveillance videos capture Mallory 58 00:04:05,760 --> 00:04:08,800 walk into a FedEx office in Virginia, 59 00:04:08,880 --> 00:04:13,280 with a stack of classified documents he has scanned onto an SD card 60 00:04:13,360 --> 00:04:15,680 and plugs it into his cell phone. 61 00:04:16,680 --> 00:04:19,080 He then travels to Shanghai with the phone, 62 00:04:19,160 --> 00:04:22,480 but when he returns, he suspects he's been made, 63 00:04:22,560 --> 00:04:25,600 and comes up with a cover story for the CIA. 64 00:04:31,520 --> 00:04:35,200 He gets a little nervous and goes into the CIA and says, 65 00:04:35,840 --> 00:04:39,720 "I wanna alert you. I think they're trying to recruit me. 66 00:04:39,800 --> 00:04:41,360 In fact, on my last trip, 67 00:04:41,960 --> 00:04:44,800 they gave me this phone to communicate securely. 68 00:04:44,880 --> 00:04:47,600 I know it's unbreakable but I want you to be aware of this. 69 00:04:47,680 --> 00:04:49,880 We can probably play a game against them." 70 00:04:49,960 --> 00:04:52,480 So, the fact that they're asking this kind of stuff 71 00:04:53,120 --> 00:04:57,240 tells me either they want to be recognized or somehow they have a straighter-- 72 00:04:57,320 --> 00:04:59,440 that they're probably in the intel service. 73 00:04:59,520 --> 00:05:04,000 [narrator] Mallory is confident all his covert communication with Michael Yang 74 00:05:04,080 --> 00:05:05,960 has automatically been deleted 75 00:05:06,040 --> 00:05:08,160 and voluntarily hands over his cell phone 76 00:05:08,240 --> 00:05:11,120 to the FBI computer forensic examiner. 77 00:05:11,200 --> 00:05:14,320 They did a hard reboot on it. 78 00:05:14,400 --> 00:05:17,160 It opened up in an unsecure mode, 79 00:05:17,240 --> 00:05:19,000 and while they're sitting with him, 80 00:05:19,080 --> 00:05:22,080 they're reading all the messages he's sending back and forth. 81 00:05:23,480 --> 00:05:26,440 And it showed he was not only accepting the tasking, 82 00:05:26,520 --> 00:05:30,080 but he'd been communicating openly with the Chinese, 83 00:05:30,160 --> 00:05:31,520 and he was caught red-handed. 84 00:05:31,600 --> 00:05:33,200 [tense music playing] 85 00:05:33,280 --> 00:05:35,800 [narrator] Messages between Mallory and Yang 86 00:05:35,880 --> 00:05:39,360 indicate that he's been paid $25,000 87 00:05:39,440 --> 00:05:42,480 for the delivery of several confidential documents. 88 00:05:44,160 --> 00:05:48,000 Mallory is convicted and sentenced to 20 years in prison 89 00:05:48,080 --> 00:05:49,840 for spying for China. 90 00:05:51,440 --> 00:05:57,280 Kevin Mallory's case reaffirms that a spy is only as good as his or her spyware, 91 00:05:57,360 --> 00:06:00,640 and in Mallory's case, it was a total fail. 92 00:06:01,920 --> 00:06:04,280 The recruitment of insider spies 93 00:06:04,360 --> 00:06:08,000 is one tactic being used to collect information by China. 94 00:06:08,080 --> 00:06:11,960 Another is the relentless use of cyber espionage. 95 00:06:18,000 --> 00:06:22,880 Michele Van Cleave was appointed by President George W. Bush 96 00:06:22,960 --> 00:06:27,440 to serve as the first statutory head of U.S. counterintelligence. 97 00:06:27,520 --> 00:06:31,280 We've seen recently, uh, 98 00:06:31,360 --> 00:06:34,520 Chinese penetrations into the U.S. government, 99 00:06:34,600 --> 00:06:39,520 which has given them very specialized kinds of insights 100 00:06:40,080 --> 00:06:45,080 about the operations that we may be conducting against them. 101 00:06:46,080 --> 00:06:49,320 [narrator] One of the most devastating and damaging cyber attacks 102 00:06:49,400 --> 00:06:54,320 was conducted by China and targeted the Office of Personnel Management, 103 00:06:54,400 --> 00:06:57,120 the OPM, in 2015. 104 00:06:57,200 --> 00:07:00,320 [man] The OPM breach was basically, Chinese hacking group, 105 00:07:00,400 --> 00:07:05,840 uh, basically stole credentials from a laptop of an OPM contractor, 106 00:07:05,920 --> 00:07:08,320 who went out and did background investigations. 107 00:07:08,400 --> 00:07:13,080 [narrator] Robert Bigman was the former chief information security officer, 108 00:07:13,160 --> 00:07:17,520 or CISO, responsible for all cyber security policy 109 00:07:17,600 --> 00:07:21,840 and defense monitoring at the CIA for the last 15 years. 110 00:07:21,920 --> 00:07:27,760 They basically were able to deploy some malware on that laptop. 111 00:07:27,840 --> 00:07:31,000 They stole the credentials. His user ID, his password. 112 00:07:31,080 --> 00:07:34,880 They were then able to log into the OPM network as him, 113 00:07:34,960 --> 00:07:36,520 and since OPM didn't have 114 00:07:36,600 --> 00:07:39,520 very sophisticated cyber technology at the time, 115 00:07:39,600 --> 00:07:42,680 uh, they didn't detect it, and they were able to get in 116 00:07:42,760 --> 00:07:45,280 and basically move laterally across the network 117 00:07:45,360 --> 00:07:48,760 into various databases, and, as we like to say, 118 00:07:48,840 --> 00:07:50,520 just basically raped the network 119 00:07:50,600 --> 00:07:53,240 and just take out whatever they were looking for, 120 00:07:53,320 --> 00:07:56,920 uh, and steal it and exfiltrate it up to China. 121 00:07:59,200 --> 00:08:02,360 [Van Cleave] So now, having acquired these records, 122 00:08:02,440 --> 00:08:05,400 the Chinese have highly developed insights 123 00:08:05,480 --> 00:08:09,400 into some 22 million people whose names and faces 124 00:08:09,480 --> 00:08:14,440 and personal information were contained in these OPM records, 125 00:08:14,520 --> 00:08:18,680 because this is where anyone who's ever held a clearance in the U.S. government 126 00:08:18,760 --> 00:08:20,800 has their files. 127 00:08:21,440 --> 00:08:26,080 And so if you are… you are the Chinese intelligence services 128 00:08:26,160 --> 00:08:28,800 and your job, like any intelligence service, 129 00:08:28,880 --> 00:08:31,240 is to spot and assess… 130 00:08:32,320 --> 00:08:34,560 individuals who might be of value to you, 131 00:08:35,200 --> 00:08:37,760 with these OPM files, 132 00:08:37,840 --> 00:08:43,880 you now have a roster that's done a great deal of the work 133 00:08:43,960 --> 00:08:47,440 that would otherwise be very difficult to do one at a time. 134 00:08:51,760 --> 00:08:54,520 [narrator] If you're a spy collecting secret information, 135 00:08:55,120 --> 00:08:57,480 the Internet can be a goldmine, 136 00:08:57,560 --> 00:09:00,120 especially if you're trying to infiltrate a server 137 00:09:00,200 --> 00:09:02,360 with an antiquated security system. 138 00:09:02,440 --> 00:09:04,200 [typing keys] 139 00:09:08,560 --> 00:09:11,560 [Melton] Edward Snowden, very smart young man. 140 00:09:12,680 --> 00:09:16,200 He worked at times for the University of Maryland, 141 00:09:16,280 --> 00:09:18,640 which operated a facility 142 00:09:18,720 --> 00:09:20,760 for the National Security Agency. 143 00:09:20,840 --> 00:09:22,640 He later worked for CIA. 144 00:09:22,720 --> 00:09:27,520 And he later worked as a contractor for the National Security Agency, 145 00:09:27,600 --> 00:09:30,880 as a systems administrator in Hawaii, 146 00:09:30,960 --> 00:09:35,600 which gave him a great deal of latitude 147 00:09:35,680 --> 00:09:38,280 and freedom in operating the system, 148 00:09:38,360 --> 00:09:41,600 because he was guarding the chicken coop. 149 00:09:41,680 --> 00:09:44,040 He was the one that was guarding this system, 150 00:09:44,120 --> 00:09:48,360 and he in turn was collecting information from that system. 151 00:09:48,920 --> 00:09:50,840 [narrator] Snowden allegedly copied 152 00:09:50,920 --> 00:09:54,360 over a million highly confidential and sensitive documents 153 00:09:54,440 --> 00:09:58,560 onto thumb drives and smuggled them out of the NSA, 154 00:09:58,640 --> 00:10:00,720 and then, he leaked them. 155 00:10:01,600 --> 00:10:06,320 In 2013, he created a false story 156 00:10:06,400 --> 00:10:10,240 that he had needed treatment for epilepsy, 157 00:10:10,840 --> 00:10:13,400 and he traveled to Hong Kong. 158 00:10:13,480 --> 00:10:17,360 He had a meeting with several reporters. 159 00:10:18,120 --> 00:10:21,680 He claims he passed all of his thumb drives to them. 160 00:10:21,760 --> 00:10:25,720 We now know that he was also meeting secretly 161 00:10:25,800 --> 00:10:27,840 with representatives of the Russian government. 162 00:10:28,520 --> 00:10:32,760 He has claimed that he took no hard drives with him. 163 00:10:32,840 --> 00:10:33,840 No thumb drives. 164 00:10:33,920 --> 00:10:35,840 Uh, that's not believable. 165 00:10:36,960 --> 00:10:39,920 It's been later claimed and asserted 166 00:10:40,000 --> 00:10:43,560 that the Russians and Chinese 167 00:10:43,640 --> 00:10:49,040 declassified at least one million of the documents on the drives. 168 00:10:49,880 --> 00:10:55,160 If you printed out all of the files that were on the thumb drives, 169 00:10:55,240 --> 00:11:00,440 it would be a stack of information printed on 8½ by 11 paper, 170 00:11:00,520 --> 00:11:02,360 it would be about four miles tall. 171 00:11:03,440 --> 00:11:06,960 So it's a volume of information that is staggering. 172 00:11:07,520 --> 00:11:13,200 It's literally the who's who and what's what 173 00:11:13,280 --> 00:11:15,720 of every technical collection system 174 00:11:16,440 --> 00:11:18,720 that the U.S. government was using. 175 00:11:20,200 --> 00:11:23,440 [narrator] The capacity for an agent to rapidly collect 176 00:11:23,520 --> 00:11:25,960 and move secret information via the Internet 177 00:11:26,040 --> 00:11:28,760 is a valuable tool for espionage, 178 00:11:28,840 --> 00:11:32,320 but the ability to carry vast amounts of intelligence information 179 00:11:32,400 --> 00:11:35,360 in a device that can fit in your back pocket 180 00:11:35,440 --> 00:11:36,800 is a game changer. 181 00:11:44,160 --> 00:11:49,200 [Melton] Because a cell phone with an incredible algorithm 182 00:11:49,280 --> 00:11:53,560 or encryption protocol on it looks just like the one in your pocket. 183 00:11:53,640 --> 00:11:58,800 And that's what makes it so devilishly effective. 184 00:11:58,880 --> 00:12:02,800 [narrator] Yet a cell phone can also increase the risk to an agent. 185 00:12:02,880 --> 00:12:06,400 One of the first things many of us do when we land at an airport 186 00:12:06,480 --> 00:12:08,960 is immediately turn on our phone. 187 00:12:09,040 --> 00:12:12,600 But depending on where you land and what you're planning on doing there, 188 00:12:12,680 --> 00:12:14,720 you may want to think twice. 189 00:12:16,440 --> 00:12:19,640 Intelligence services use a technique 190 00:12:19,720 --> 00:12:24,000 called "the man in the middle" attack. 191 00:12:24,080 --> 00:12:28,880 And what they create is a small little mini tower 192 00:12:28,960 --> 00:12:32,920 that may exist in the executive lounge of the airport. 193 00:12:33,000 --> 00:12:35,200 It may exist in the concourse. 194 00:12:35,280 --> 00:12:38,440 There may be several of them as soon as you're off the plane. 195 00:12:38,520 --> 00:12:41,400 And once you turn your phone on, 196 00:12:41,480 --> 00:12:46,480 rather than contact the closest major tower, 197 00:12:46,560 --> 00:12:49,000 it reaches out to this little mini tower 198 00:12:49,080 --> 00:12:51,560 that's controlled by an intelligence service. 199 00:12:51,640 --> 00:12:55,640 It, in turn, contacts the major cell tower, 200 00:12:55,720 --> 00:12:57,960 but because it's in the middle, 201 00:12:58,040 --> 00:13:00,080 it can download everything on your phone 202 00:13:00,160 --> 00:13:03,600 and it can put a virus on your phone in exchange, 203 00:13:03,680 --> 00:13:06,680 and you will never, ever be aware of it. 204 00:13:06,760 --> 00:13:09,200 And there are multiple cities in the world 205 00:13:09,280 --> 00:13:12,080 in which that happens on a regular basis. 206 00:13:12,160 --> 00:13:15,160 [narrator] For a spy caught in a "man in the middle" attack, 207 00:13:15,240 --> 00:13:17,640 the results can be devastating. 208 00:13:17,720 --> 00:13:18,920 He's working for us, 209 00:13:19,000 --> 00:13:22,240 but he's using a device that's been compromised by the bad guys, 210 00:13:22,320 --> 00:13:25,640 it's not going to take too long before, you know, they identify him 211 00:13:25,720 --> 00:13:28,080 and either compromise him 212 00:13:28,160 --> 00:13:30,560 or use him to send us false information. 213 00:13:30,640 --> 00:13:32,840 [narrator] Although cell phones have vulnerabilities, 214 00:13:32,920 --> 00:13:36,280 they're a vital clandestine collection device, 215 00:13:36,360 --> 00:13:39,280 especially in their ability to quickly snap a photograph. 216 00:13:40,160 --> 00:13:42,920 But long before the invention of the cell phone, 217 00:13:43,000 --> 00:13:47,480 spies and their intelligence agencies had to come up with other creative means 218 00:13:47,560 --> 00:13:49,440 to photograph secret information. 219 00:13:50,280 --> 00:13:52,920 [atmospheric music playing] 220 00:13:59,360 --> 00:14:03,520 Photography was so vital to espionage during the Cold War, 221 00:14:03,600 --> 00:14:06,200 the Soviet intelligence service, the KGB, 222 00:14:06,280 --> 00:14:09,840 established what they called "The Eleventh Laboratory," 223 00:14:09,920 --> 00:14:13,080 for the single purpose of creating a new generation 224 00:14:13,160 --> 00:14:18,360 of small, easily-concealed cameras that could be smuggled into the workplace. 225 00:14:19,040 --> 00:14:23,400 Document cameras were created that gave them the opportunity. 226 00:14:23,480 --> 00:14:27,280 No one watching, they could quickly take out a fountain pen 227 00:14:27,360 --> 00:14:29,320 and make a copy of a document. 228 00:14:29,400 --> 00:14:33,000 They could take out a cigarette lighter, perhaps, and make a copy. 229 00:14:33,080 --> 00:14:35,800 [narrator] Collecting secrets and effectively delivering them 230 00:14:35,880 --> 00:14:40,840 to the intelligence agency is one of the biggest challenges for spies. 231 00:14:40,920 --> 00:14:45,760 But imagine trying to do that as a spy working behind the Iron Curtain. 232 00:14:57,800 --> 00:15:02,320 Benjamin Fischer was a former chief historian for the CIA. 233 00:15:08,640 --> 00:15:11,880 [Fischer] You cannot meet agents behind the Iron Curtain 234 00:15:11,960 --> 00:15:14,880 because the surveillance is so excessive. 235 00:15:15,480 --> 00:15:17,080 You can't rent hotel rooms. 236 00:15:17,160 --> 00:15:20,480 You can't buy an apartment, use it as a safe house. 237 00:15:20,560 --> 00:15:24,960 All of these opportunities that we had in this case don't exist, 238 00:15:25,040 --> 00:15:27,440 never existed behind the Iron Curtain. 239 00:15:28,040 --> 00:15:32,200 [narrator] Gaining access and information from the Soviets was nearly impossible, 240 00:15:32,280 --> 00:15:36,600 but in 1960, the U.S. Central Intelligence Agency got lucky 241 00:15:37,200 --> 00:15:40,960 when they were approached by Colonel Oleg Penkovsky. 242 00:15:41,680 --> 00:15:44,120 PASSPORT 243 00:15:51,000 --> 00:15:56,560 Colonel Oleg Penkovsky was a member of the, uh, GRU. 244 00:15:56,640 --> 00:16:00,440 The GRU is military intelligence service. 245 00:16:00,520 --> 00:16:04,320 In other words, the military counterpart to the KGB. 246 00:16:04,400 --> 00:16:08,840 Penkovsky volunteered to spy. 247 00:16:08,920 --> 00:16:14,400 It was a joint operation between the CIA and British intelligence. 248 00:16:14,480 --> 00:16:19,120 Uh, the CIA and the British put together a four-man team, 249 00:16:19,200 --> 00:16:22,120 two Americans, two British case officers. 250 00:16:22,760 --> 00:16:26,360 Uh, we had… it was an exceptional operation 251 00:16:26,440 --> 00:16:29,560 in that Penkovsky was allowed to travel to the West 252 00:16:29,640 --> 00:16:34,200 on three separate occasions, and this provided an opportunity 253 00:16:34,280 --> 00:16:38,760 to sit in a hotel room and debrief him at length. 254 00:16:39,840 --> 00:16:40,760 [clicks] 255 00:16:43,680 --> 00:16:45,160 [narrator] Code named "Hero," 256 00:16:45,240 --> 00:16:49,720 Penkovsky spied for both the CIA and British intelligence. 257 00:16:49,800 --> 00:16:53,120 He was given subminiature document copy cameras, 258 00:16:53,200 --> 00:16:54,960 like the German-made Minox. 259 00:16:55,040 --> 00:16:58,400 The Minox had been around since World War II, 260 00:16:58,480 --> 00:17:01,560 but by the time Penkovsky got his hands on one, 261 00:17:01,640 --> 00:17:05,120 it had been updated and outfitted with a special lens 262 00:17:05,200 --> 00:17:08,400 that could focus up to eight inches away from a document. 263 00:17:09,160 --> 00:17:12,120 [Fischer] He provided about 264 00:17:13,160 --> 00:17:18,920 10,000 frames of photographs of Soviet military documents. 265 00:17:20,280 --> 00:17:23,040 He told us what the Soviet war plans were. 266 00:17:23,120 --> 00:17:25,120 He had seen them, he helped draft them. 267 00:17:25,200 --> 00:17:29,240 This helped make sense of what we were seeing and hearing 268 00:17:29,320 --> 00:17:33,200 through our technical collection operations. 269 00:17:33,280 --> 00:17:36,040 It was an almost perfect symmetry. 270 00:17:36,120 --> 00:17:41,600 Penkovsky is without exception, and by universal consensus, 271 00:17:41,680 --> 00:17:47,640 the best agent that the West had during the entire Cold War. 272 00:17:47,720 --> 00:17:50,320 [narrator] Eventually, the Soviets caught on 273 00:17:50,400 --> 00:17:52,280 and Penkovsky was arrested 274 00:17:52,360 --> 00:17:55,200 and was executed in 1962. 275 00:17:56,160 --> 00:17:59,000 With the death of their most successful spy, 276 00:17:59,080 --> 00:18:04,480 the CIA realized they needed to develop more specialized espionage equipment 277 00:18:04,560 --> 00:18:07,280 for their agents working in the Soviet Union, 278 00:18:07,360 --> 00:18:11,560 and put the task on the CIA's Office of Technical Service. 279 00:18:13,360 --> 00:18:18,200 The OTS was responsible for developing cutting-edge technologies 280 00:18:18,280 --> 00:18:21,760 for CIA officers and agents in the field. 281 00:18:22,280 --> 00:18:27,320 One of them was Polish General Staff Officer Ryszard Kukliński. 282 00:18:28,160 --> 00:18:31,320 Kukliński was a man who was both disillusioned 283 00:18:31,400 --> 00:18:34,520 with the Communist system in Poland, 284 00:18:34,600 --> 00:18:37,120 and wanted to help the West. 285 00:18:37,200 --> 00:18:40,040 So the CIA virtually used 286 00:18:40,120 --> 00:18:45,680 every bit of their technology, everything they had, to keep him working. 287 00:18:46,280 --> 00:18:50,040 They would have sent him a covert communication device 288 00:18:50,120 --> 00:18:53,520 that enabled him to somehow send messages 289 00:18:53,600 --> 00:18:57,680 similar to a, a early form of a digital pager. 290 00:18:57,760 --> 00:19:01,320 He could covert-- Send covert messages secretly. 291 00:19:01,840 --> 00:19:04,080 [narrator] The OTS also armed him 292 00:19:04,160 --> 00:19:06,840 with one of their most effective spy cameras. 293 00:19:08,360 --> 00:19:10,160 [Melton] It was called the Tropel. 294 00:19:10,240 --> 00:19:13,600 And the camera module was designed 295 00:19:13,680 --> 00:19:16,800 to be concealed in multiple applications. 296 00:19:16,880 --> 00:19:19,120 It could be hidden in a fountain pen. 297 00:19:19,200 --> 00:19:23,720 It could be concealed in a Bic-style cigarette lighter. 298 00:19:24,320 --> 00:19:27,320 They even made one version that was designed to be concealed 299 00:19:27,400 --> 00:19:31,040 inside a Seiko digital wristwatch. 300 00:19:31,120 --> 00:19:33,600 It would be an active concealment. 301 00:19:33,680 --> 00:19:35,720 But it may only work 10 or 20 times, 302 00:19:35,800 --> 00:19:37,400 but each time he depressed it, 303 00:19:37,480 --> 00:19:39,880 it's gonna secretly be taking a picture. 304 00:19:39,960 --> 00:19:41,920 [tense music playing] 305 00:19:42,000 --> 00:19:47,120 [narrator] Kukliński provided the CIA with over 40,000 secret documents 306 00:19:47,200 --> 00:19:50,680 in an amazing ten years of spying for the United States. 307 00:19:51,240 --> 00:19:54,640 Ultimately, Polish intelligence became suspicious, 308 00:19:54,720 --> 00:19:57,240 but before they could get their hands on him, 309 00:19:57,320 --> 00:20:00,920 he and his family were safely extradited to the United States. 310 00:20:05,920 --> 00:20:10,560 Today, high-def cameras can be concealed in almost any device 311 00:20:10,640 --> 00:20:13,880 to photograph, record, or live-stream intelligence 312 00:20:13,960 --> 00:20:15,720 from the ocean to the sky. 313 00:20:16,520 --> 00:20:20,600 Having an aerial view of the enemy is valuable for espionage. 314 00:20:20,680 --> 00:20:24,400 Creative devices were invented to gain this perspective 315 00:20:24,480 --> 00:20:26,800 as early as the American Civil War. 316 00:20:31,560 --> 00:20:34,920 We saw an early daguerreotype camera 317 00:20:35,000 --> 00:20:37,360 taken up on a balloon 318 00:20:37,440 --> 00:20:40,960 and used to photograph an enemy battle space. 319 00:20:42,240 --> 00:20:45,360 [brash string music playing] 320 00:20:47,760 --> 00:20:49,120 [whirring] 321 00:20:51,280 --> 00:20:55,840 The ability to see from an altitude of a bird 322 00:20:55,920 --> 00:20:59,000 is something that people had wished for for centuries. 323 00:20:59,560 --> 00:21:03,600 Now we see that that technology has new applications 324 00:21:03,680 --> 00:21:08,040 when we have balloons that can remain in place 325 00:21:08,120 --> 00:21:12,160 over a fixed position for weeks and even months 326 00:21:12,240 --> 00:21:14,280 and serve as aerial platforms. 327 00:21:14,360 --> 00:21:16,360 [beeping] 328 00:21:18,680 --> 00:21:21,920 [narrator] Modern spy balloons are deployed to conflict zones 329 00:21:22,000 --> 00:21:26,480 and to American southern U.S. borders to search for drug smugglers 330 00:21:26,560 --> 00:21:27,800 and illegal immigrants. 331 00:21:36,360 --> 00:21:41,000 The U.S. military is currently conducting wide-area surveillance tests 332 00:21:41,080 --> 00:21:43,640 using experimental high-altitude balloons 333 00:21:44,240 --> 00:21:47,080 that travel up to 65,000 feet 334 00:21:47,160 --> 00:21:49,600 and provide a persistent surveillance system. 335 00:21:49,680 --> 00:21:50,520 [whirring] 336 00:21:50,600 --> 00:21:53,880 They're sometimes referred to as "Combat TiVo"… 337 00:21:54,800 --> 00:21:56,920 because when an event occurs, 338 00:21:57,000 --> 00:22:01,640 it has the capability to rewind the tape to see exactly what happened, 339 00:22:01,720 --> 00:22:04,000 and more importantly, who was involved. 340 00:22:04,080 --> 00:22:06,640 [whirring] 341 00:22:15,360 --> 00:22:20,200 Some vital clandestine collection is beyond the reach of human senses, 342 00:22:20,280 --> 00:22:23,440 which is why scientists and engineers came up with a way 343 00:22:23,520 --> 00:22:25,880 to direct espionage from outer space, 344 00:22:25,960 --> 00:22:30,560 using reconnaissance or spy satellites that use signal intelligence 345 00:22:30,640 --> 00:22:33,840 to pick up electronic signals by foreign targets. 346 00:22:34,520 --> 00:22:38,040 Satellites were, of course, the next great evolution. 347 00:22:38,120 --> 00:22:42,040 And when the Corona satellite went up in the early 1960s, 348 00:22:42,120 --> 00:22:45,000 on its first pass over the Soviet Union, 349 00:22:45,080 --> 00:22:49,560 it took more imagery than all of the other pictures 350 00:22:49,640 --> 00:22:53,120 that had ever been taken from the air of the Soviet Union, 351 00:22:53,200 --> 00:22:54,800 in terms of square miles. 352 00:22:54,880 --> 00:22:56,280 Satellites… 353 00:22:56,960 --> 00:23:00,280 are one of the most effective collection tools in the world. 354 00:23:00,360 --> 00:23:05,600 Their limitation is that they are very difficult to maneuver. 355 00:23:05,680 --> 00:23:10,960 And to maneuver a satellite and position it takes time, 356 00:23:11,040 --> 00:23:15,240 and it may not be in time, depending on an operation. 357 00:23:16,520 --> 00:23:18,920 [narrator] To counter the limitations of satellites, 358 00:23:19,000 --> 00:23:22,520 a more effective and formidable device was invented. 359 00:23:22,600 --> 00:23:23,480 The drone. 360 00:23:31,600 --> 00:23:36,280 That we find is, if you can put similar platforms on a drone, 361 00:23:36,360 --> 00:23:41,880 that drone may stay aloft for 26 hours, 30 hours, maybe even longer, 362 00:23:41,960 --> 00:23:44,760 and you can position a drone above a site 363 00:23:44,840 --> 00:23:48,880 and keep it in place and have active communications. 364 00:23:48,960 --> 00:23:52,120 You can look through clouds. You can have your infrared. 365 00:23:52,200 --> 00:23:55,080 You can detect people, even if they're inside tents, 366 00:23:55,160 --> 00:23:56,880 because of the heat signature. 367 00:23:56,960 --> 00:24:02,000 And so the future is no longer satellites. 368 00:24:02,080 --> 00:24:05,160 It's putting it in these mobile platforms that you can launch 369 00:24:05,240 --> 00:24:10,760 that are far less expensive, and you can put them almost everywhere that you need. 370 00:24:11,800 --> 00:24:15,840 [narrator] DARPA, the Defense Advanced Research Projects Agency, 371 00:24:16,520 --> 00:24:19,680 is at the forefront in developing emerging technologies 372 00:24:19,760 --> 00:24:22,360 like drones, to be used by the military. 373 00:24:26,160 --> 00:24:28,520 [accelerated whirring] 374 00:24:28,600 --> 00:24:31,440 [Melton] DARPA creates systems that, 375 00:24:31,520 --> 00:24:34,560 the smallest would be the size of your small fingernail. 376 00:24:34,640 --> 00:24:36,840 It would look like a large horsefly. 377 00:24:37,440 --> 00:24:38,960 It's maneuverable. 378 00:24:39,040 --> 00:24:42,320 It's essentially a mobile collection platform. 379 00:24:42,400 --> 00:24:44,800 It can have a television camera. 380 00:24:44,880 --> 00:24:48,520 You can fly it into a room, you can perch it on a windowsill. 381 00:24:48,600 --> 00:24:53,000 It can sit and it can collect audio and video and transmit it back. 382 00:24:54,600 --> 00:24:56,840 [narrator] Along with the capture of imagery, 383 00:24:56,920 --> 00:25:01,280 the ability to pick up clear audio of what your adversaries are saying 384 00:25:01,360 --> 00:25:04,480 is also a critical resource for espionage. 385 00:25:06,200 --> 00:25:08,200 [suspenseful music playing] 386 00:25:09,640 --> 00:25:12,400 Ray Parrack was a former engineer 387 00:25:12,480 --> 00:25:15,640 for the Office of Technical Service at the CIA 388 00:25:15,720 --> 00:25:20,240 and was responsible for picking up secret conversations through the static. 389 00:25:26,080 --> 00:25:29,640 [Parrack] My specific area was building audio surveillance equipment. 390 00:25:29,720 --> 00:25:32,920 The radio bugs that were put into people's apartments and condos 391 00:25:33,000 --> 00:25:35,520 and residences to hear what they were saying. 392 00:25:35,600 --> 00:25:37,880 These were devices that had radio transmitters 393 00:25:37,960 --> 00:25:40,040 that would transmit the voice out from a room, 394 00:25:40,120 --> 00:25:43,560 so we actually had some transistors from the early Bell Labs work 395 00:25:43,640 --> 00:25:45,440 that went into some of our radio microphones. 396 00:25:49,240 --> 00:25:51,240 [narrator] During the Cold War, 397 00:25:51,320 --> 00:25:55,000 if you needed to listen to a conversation on the other side of the wall, 398 00:25:55,080 --> 00:25:59,360 you used to have to drill holes and run audio cables through it. 399 00:25:59,440 --> 00:26:02,400 But today it can be as easy a process 400 00:26:02,480 --> 00:26:04,280 as changing a light bulb. 401 00:26:09,640 --> 00:26:12,960 And that light bulb is a collector. 402 00:26:13,560 --> 00:26:17,280 When voice is collected, 403 00:26:17,360 --> 00:26:22,960 it modifies the frequency by which the fluorescent bulb pulses. 404 00:26:23,040 --> 00:26:26,640 And that light at night can be detected 405 00:26:27,320 --> 00:26:29,680 from a great distance away 406 00:26:29,760 --> 00:26:33,560 by a very sophisticated telephoto lens 407 00:26:33,640 --> 00:26:35,520 and can be run into a system. 408 00:26:35,600 --> 00:26:38,400 -[agent] …be careful to keep my tracks… -[handler] Of course. 409 00:26:38,480 --> 00:26:41,240 [agent] …clean, and no fingerprints, just like these documents. 410 00:26:41,320 --> 00:26:42,800 No fingerprints. 411 00:26:42,880 --> 00:26:45,320 I can't afford to lose my… 412 00:26:45,400 --> 00:26:48,320 And you can recover the speech, 413 00:26:48,400 --> 00:26:52,080 even if the drapes in the room are closed. 414 00:26:52,160 --> 00:26:54,080 Because they've used night vision, 415 00:26:54,160 --> 00:26:57,280 there's enough leakage around the corners of the drape, 416 00:26:57,360 --> 00:26:59,800 they can still pick up everything you're saying. 417 00:27:00,440 --> 00:27:05,240 That is one of the most difficult systems in the world to prevent. 418 00:27:07,000 --> 00:27:09,040 [narrator] Another breakthrough in espionage 419 00:27:09,120 --> 00:27:13,920 occurred in the early '60s with the advent of laser technology. 420 00:27:14,000 --> 00:27:17,520 Today, lasers have increased in power and scale 421 00:27:17,600 --> 00:27:20,520 and have applications for clandestine collection. 422 00:27:23,840 --> 00:27:29,080 [Melton] Laser collection systems are scary in their capability. 423 00:27:29,160 --> 00:27:33,120 Almost line of sight, infrared. 424 00:27:33,200 --> 00:27:36,680 You have the ability to focus it on a window pane 425 00:27:36,760 --> 00:27:40,840 and collect from any sound vibration in a room. 426 00:27:40,920 --> 00:27:46,640 You can focus it inside the room on a Styrofoam cup on someone's desk. 427 00:27:46,720 --> 00:27:47,840 You could photograph. 428 00:27:47,920 --> 00:27:51,280 You could focus it on their eyeglass frame and pick up audio. 429 00:27:52,360 --> 00:27:54,480 [narrator] The long-range laser microphone 430 00:27:54,560 --> 00:27:57,760 is a highly sophisticated surveillance apparatus 431 00:27:57,840 --> 00:28:01,400 that utilizes an invisible infrared laser beam 432 00:28:01,480 --> 00:28:05,320 to eavesdrop on an exterior window of a targeted room 433 00:28:05,400 --> 00:28:07,920 with a range of over 1,500 feet. 434 00:28:17,400 --> 00:28:20,200 Acoustic soundwaves, like human speech, 435 00:28:20,280 --> 00:28:24,800 cause minute vibrations that can be modulated by an invisible laser beam 436 00:28:24,880 --> 00:28:26,240 aimed at the target. 437 00:28:26,960 --> 00:28:31,520 This modulated laser light can be picked up by a special receiver 438 00:28:31,600 --> 00:28:34,640 and demodulated to recover the speech. 439 00:28:47,720 --> 00:28:50,720 [indistinct crowd noises, conversations] 440 00:28:50,800 --> 00:28:52,480 [narrator] Advanced technology, 441 00:28:52,560 --> 00:28:55,600 specifically in the development of biometrics, 442 00:28:55,680 --> 00:28:58,480 has made it easier to catch the bad guy. 443 00:28:58,560 --> 00:29:01,080 But on the flip side, it's made an art 444 00:29:01,160 --> 00:29:05,160 of being a covert operative more difficult and dangerous. 445 00:29:06,920 --> 00:29:10,120 A facial recognition system uses biometrics 446 00:29:10,200 --> 00:29:13,920 to map facial features for a photograph or video 447 00:29:14,000 --> 00:29:19,480 and compares the information with a database of known faces to match. 448 00:29:22,680 --> 00:29:25,200 [beeping] 449 00:29:25,280 --> 00:29:29,800 Facial recognition software reads the geometry of your face. 450 00:29:29,880 --> 00:29:33,360 Key factors include the distance between your eyes 451 00:29:33,440 --> 00:29:36,200 and the distance from forehead to chin. 452 00:29:36,280 --> 00:29:39,520 The software identifies facial landmarks. 453 00:29:39,600 --> 00:29:45,680 One system identifies 68 of them that are key to distinguishing your face. 454 00:29:45,760 --> 00:29:48,440 The result, your facial signature. 455 00:29:51,880 --> 00:29:55,880 Today, authorities in China are using facial recognition technology 456 00:29:56,560 --> 00:30:00,520 to spot suspects with the use of high-tech glasses 457 00:30:00,600 --> 00:30:03,400 that can verify a person's identity within minutes. 458 00:30:05,000 --> 00:30:07,720 The glasses are installed with a camera attachment 459 00:30:07,800 --> 00:30:11,200 which can snap a photograph from up to 17 feet away. 460 00:30:13,080 --> 00:30:15,840 The photo can then be run through a database 461 00:30:15,920 --> 00:30:21,280 allowing officers to gain information on the target's name, ethnicity. 462 00:30:21,360 --> 00:30:25,760 It can also detail information on the hotel someone is staying at, 463 00:30:25,840 --> 00:30:28,720 Internet history, or criminal background. 464 00:30:29,240 --> 00:30:33,400 The use of facial scanners and similar technologies are widespread, 465 00:30:34,000 --> 00:30:39,560 not only in China but at airports, concerts, by mobile phone makers, 466 00:30:39,640 --> 00:30:42,600 in college classrooms and on social media. 467 00:30:44,160 --> 00:30:49,760 Fatih Comlekoglu is the CTO of cyber security company Appguard Inc. 468 00:30:49,840 --> 00:30:52,560 and is an expert on preventative defense, 469 00:30:52,640 --> 00:30:56,600 and what many in the field call "zero trust space." 470 00:30:56,680 --> 00:30:59,360 If the application is exploited, 471 00:30:59,440 --> 00:31:03,600 it is even worse, because it is you using that thing. 472 00:31:03,680 --> 00:31:07,080 On behalf of you, they are able to post messages, 473 00:31:07,160 --> 00:31:11,080 they are able to say some things that you did not actually say. 474 00:31:12,600 --> 00:31:14,960 [narrator] The creation of facial recognition 475 00:31:15,040 --> 00:31:17,480 combined with fingerprinting software 476 00:31:17,560 --> 00:31:22,600 may actually make it much harder to defend yourself against hackers. 477 00:31:22,680 --> 00:31:24,400 They still pose risks 478 00:31:24,480 --> 00:31:28,000 in identifying, correctly identifying, the user. 479 00:31:28,080 --> 00:31:32,600 At the same time, the information they capture 480 00:31:32,680 --> 00:31:37,440 can be used by adversaries 481 00:31:37,520 --> 00:31:40,960 in a way that's spoofing your identity. 482 00:31:41,040 --> 00:31:46,920 Your information can be captured and reused by other parties, 483 00:31:47,000 --> 00:31:51,440 or the system can be fooled into pretending to be you. 484 00:31:53,280 --> 00:31:55,800 [narrator] Even seemingly benign applications 485 00:31:55,880 --> 00:31:57,840 can have serious implications. 486 00:32:01,040 --> 00:32:05,720 Hamlet Yousef is a managing partner at Irongate Capital Advisors 487 00:32:05,800 --> 00:32:08,640 and invests in defense-related technologies. 488 00:32:10,560 --> 00:32:15,600 Anyone who's downloaded the recent OS for Apple or has an Android 489 00:32:15,680 --> 00:32:19,200 has seen a feature where, when I'm talking to you on my phone, 490 00:32:19,280 --> 00:32:22,400 you see like a chicken or a dog or an animated figure. 491 00:32:22,480 --> 00:32:26,440 Well, it's not gonna take that much time to modify that device 492 00:32:26,520 --> 00:32:30,120 or modify that image, so instead of it being a cartoon character, 493 00:32:30,200 --> 00:32:33,320 it is a human being, or looks like a human being, but it's really not you. 494 00:32:33,400 --> 00:32:36,200 The impact that's gonna have on anonymity, 495 00:32:36,280 --> 00:32:39,200 on denial and deception, is gonna be massive. 496 00:32:42,080 --> 00:32:44,040 [narrator] In the world of espionage, 497 00:32:44,120 --> 00:32:47,160 collecting information is only half of the battle. 498 00:32:47,240 --> 00:32:49,800 The other half is counterintelligence 499 00:32:49,880 --> 00:32:52,680 and protecting the information we already have. 500 00:32:53,880 --> 00:32:56,640 [Yousef] Cybersecurity is going to be a critical area of focus 501 00:32:56,720 --> 00:32:58,160 here in the 21st century. 502 00:32:58,240 --> 00:33:01,760 Uh, what you're seeing is, not only are governments worried about this, 503 00:33:01,840 --> 00:33:04,640 but more important, businesses are starting to be worried as well, 504 00:33:04,720 --> 00:33:08,600 because if you spent billions of dollars in developing a certain product, 505 00:33:08,680 --> 00:33:11,840 all the research dollars, all the development, all the testing, 506 00:33:11,920 --> 00:33:15,320 uh, but if one of your competitors gets access to your secret sauce 507 00:33:15,400 --> 00:33:18,320 or access to your plans and is able to beat you to market 508 00:33:18,400 --> 00:33:21,920 with reverse-engineered or better product for a fraction of the cost, 509 00:33:22,000 --> 00:33:24,440 uh, that's a massive impact in terms of GDP. 510 00:33:24,520 --> 00:33:26,360 A massive impact on the bottom line. 511 00:33:27,360 --> 00:33:32,080 [Van Cleave] You can lock all the doors and batten down all of the windows. 512 00:33:32,160 --> 00:33:37,040 You are still going to find a determined adversary… 513 00:33:37,640 --> 00:33:40,280 finding ways to break through that security 514 00:33:40,360 --> 00:33:42,040 to get to the things that they need. 515 00:33:42,120 --> 00:33:44,480 [Melton] At the heart of every operation, 516 00:33:45,040 --> 00:33:48,120 you want to collect information in a way 517 00:33:48,200 --> 00:33:50,480 that your adversary doesn't know it's missing. 518 00:33:50,560 --> 00:33:53,240 Regardless of the technology you used 519 00:33:53,320 --> 00:33:56,280 and regardless of where the information was hidden, 520 00:33:56,360 --> 00:33:59,880 because information that they don't know is missing, 521 00:33:59,960 --> 00:34:02,960 is exploitable and far more valuable. 522 00:34:03,640 --> 00:34:07,320 Clandestine collection will always be at the heart of espionage. 523 00:34:08,800 --> 00:34:13,080 They always describe the espionage as a chess match, right? 524 00:34:13,160 --> 00:34:15,680 You move, we countermove, you move, we countermove. 525 00:34:15,760 --> 00:34:17,680 It's the same thing with electronics. 526 00:34:18,640 --> 00:34:22,400 We need to appreciate the extent to which we're vulnerable, 527 00:34:22,480 --> 00:34:25,920 but also look for ways that we can defeat that. 528 00:34:26,000 --> 00:34:31,880 [Melton] Intelligence services are always on a near-wartime footing. 529 00:34:31,960 --> 00:34:35,200 The services themselves are always fighting. 530 00:34:35,280 --> 00:34:37,200 You're fighting either to steal secrets 531 00:34:37,280 --> 00:34:40,320 or you're fighting to protect the secrets that you have, so, 532 00:34:40,400 --> 00:34:42,840 there's never a moment you can relax. 533 00:34:42,920 --> 00:34:46,920 [atmospheric music playing] 46436

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.