Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:09,720 --> 00:00:12,760
[dramatic soundtrack playing]
2
00:00:16,120 --> 00:00:18,920
[narrator]
In the secretive world of espionage,
3
00:00:19,000 --> 00:00:22,400
spies work with the latest
cutting-edge technology and devices
4
00:00:22,480 --> 00:00:24,680
to gain the upper hand on the enemy.
5
00:00:27,200 --> 00:00:31,440
When a spy's mission is
to collect information by planting bugs,
6
00:00:31,520 --> 00:00:33,520
secretly snapping a photo,
7
00:00:33,600 --> 00:00:35,000
or stealing documents…
8
00:00:36,960 --> 00:00:40,200
they turn to their tech ops
to create the perfect device.
9
00:00:41,480 --> 00:00:43,880
[man] If I had to describe
the term "spycraft,"
10
00:00:43,960 --> 00:00:46,800
I think it would run the gamut
from, you know, tiny bugs
11
00:00:46,880 --> 00:00:48,960
that we would plant to eavesdrop,
12
00:00:49,040 --> 00:00:53,760
all the way up to the SR-71 Blackbird,
the U-2, satellites.
13
00:00:53,840 --> 00:00:56,080
So, from the miniature
up to the massive.
14
00:00:57,760 --> 00:01:01,520
Miniaturized collection platforms
are a reality.
15
00:01:01,600 --> 00:01:03,000
You can fly it into a room.
16
00:01:03,080 --> 00:01:04,960
You can perch it on a windowsill.
17
00:01:05,040 --> 00:01:10,120
It can sit and it can collect audio
and video and transmit it back.
18
00:01:13,080 --> 00:01:16,720
[narrator] The only limitation
in creating gadgets for espionage
19
00:01:16,800 --> 00:01:19,080
is the scope of the imagination.
20
00:01:20,240 --> 00:01:22,920
[theme music playing]
21
00:01:52,720 --> 00:01:55,440
[narrator] One of the most important goals
in espionage
22
00:01:55,520 --> 00:01:58,720
is to acquire sensitive intelligence
about a foreign entity
23
00:01:58,800 --> 00:02:00,960
through clandestine collection.
24
00:02:01,560 --> 00:02:02,800
To succeed,
25
00:02:02,880 --> 00:02:07,120
spies must employ the most innovative
cutting-edge technology,
26
00:02:07,200 --> 00:02:09,480
including powerful drones,
27
00:02:09,560 --> 00:02:12,280
cyber attacks, hidden cameras,
28
00:02:12,360 --> 00:02:15,000
lasers, audio surveillance,
29
00:02:15,080 --> 00:02:18,440
and the latest in biometric
scanning capabilities.
30
00:02:18,520 --> 00:02:20,600
For spies to operate,
31
00:02:20,680 --> 00:02:23,680
they must not only collect information
32
00:02:23,760 --> 00:02:27,360
but have the ability
to pass it along to their handlers
33
00:02:27,880 --> 00:02:29,880
to be analyzed and used.
34
00:02:29,960 --> 00:02:33,400
[narrator] Keith Melton
is an internationally recognized author,
35
00:02:33,480 --> 00:02:38,080
historian and expert
on clandestine devices and technology.
36
00:02:38,160 --> 00:02:40,120
He's also an avid protector
37
00:02:40,200 --> 00:02:44,080
of the largest collection
of espionage artifacts in the world.
38
00:02:44,760 --> 00:02:49,440
For spies, the objective
of an operation is usually
39
00:02:50,040 --> 00:02:54,760
to steal your adversary's information
without them ever knowing it's missing.
40
00:02:54,840 --> 00:02:57,400
And we call that clandestine collection.
41
00:02:59,240 --> 00:03:03,480
[narrator] Getting away with it without
anyone finding out what you've done
42
00:03:03,560 --> 00:03:06,000
is the biggest challenge for a spy.
43
00:03:11,920 --> 00:03:16,400
Sixty-one-year-old Kevin Mallory,
a former CIA case officer,
44
00:03:16,480 --> 00:03:20,360
is contacted on LinkedIn
by a man named Michael Yang
45
00:03:20,440 --> 00:03:24,000
he believes is an employee
of a Chinese think tank.
46
00:03:24,720 --> 00:03:29,480
Mallory soon learns he's dealing
with a Chinese intelligence officer.
47
00:03:29,560 --> 00:03:32,440
They offer him money
in exchange for information.
48
00:03:33,200 --> 00:03:34,920
[Melton]
He was desperately short of money.
49
00:03:35,000 --> 00:03:37,080
He decides to sell out to China,
50
00:03:37,680 --> 00:03:39,000
takes a trip over there,
51
00:03:39,080 --> 00:03:42,120
and they give him a cell phone
they tell him is secure
52
00:03:42,200 --> 00:03:45,800
and he can use and send,
communicate back and forth,
53
00:03:45,880 --> 00:03:47,040
and it's unbreakable.
54
00:03:48,200 --> 00:03:51,160
[narrator] Mallory's phone
has been modified with software
55
00:03:51,240 --> 00:03:54,040
to allow for secure communication
56
00:03:54,120 --> 00:03:58,640
and the clandestine collection
and transmission of secret documents.
57
00:04:00,800 --> 00:04:05,680
In April 2017, surveillance videos
capture Mallory
58
00:04:05,760 --> 00:04:08,800
walk into a FedEx office in Virginia,
59
00:04:08,880 --> 00:04:13,280
with a stack of classified documents
he has scanned onto an SD card
60
00:04:13,360 --> 00:04:15,680
and plugs it into his cell phone.
61
00:04:16,680 --> 00:04:19,080
He then travels to Shanghai
with the phone,
62
00:04:19,160 --> 00:04:22,480
but when he returns,
he suspects he's been made,
63
00:04:22,560 --> 00:04:25,600
and comes up with a cover story
for the CIA.
64
00:04:31,520 --> 00:04:35,200
He gets a little nervous
and goes into the CIA and says,
65
00:04:35,840 --> 00:04:39,720
"I wanna alert you.
I think they're trying to recruit me.
66
00:04:39,800 --> 00:04:41,360
In fact, on my last trip,
67
00:04:41,960 --> 00:04:44,800
they gave me this phone
to communicate securely.
68
00:04:44,880 --> 00:04:47,600
I know it's unbreakable
but I want you to be aware of this.
69
00:04:47,680 --> 00:04:49,880
We can probably play a game against them."
70
00:04:49,960 --> 00:04:52,480
So, the fact that they're
asking this kind of stuff
71
00:04:53,120 --> 00:04:57,240
tells me either they want to be recognized
or somehow they have a straighter--
72
00:04:57,320 --> 00:04:59,440
that they're probably
in the intel service.
73
00:04:59,520 --> 00:05:04,000
[narrator] Mallory is confident all his
covert communication with Michael Yang
74
00:05:04,080 --> 00:05:05,960
has automatically been deleted
75
00:05:06,040 --> 00:05:08,160
and voluntarily hands over his cell phone
76
00:05:08,240 --> 00:05:11,120
to the FBI computer forensic examiner.
77
00:05:11,200 --> 00:05:14,320
They did a hard reboot on it.
78
00:05:14,400 --> 00:05:17,160
It opened up in an unsecure mode,
79
00:05:17,240 --> 00:05:19,000
and while they're sitting with him,
80
00:05:19,080 --> 00:05:22,080
they're reading all the messages
he's sending back and forth.
81
00:05:23,480 --> 00:05:26,440
And it showed he was not only
accepting the tasking,
82
00:05:26,520 --> 00:05:30,080
but he'd been communicating openly
with the Chinese,
83
00:05:30,160 --> 00:05:31,520
and he was caught red-handed.
84
00:05:31,600 --> 00:05:33,200
[tense music playing]
85
00:05:33,280 --> 00:05:35,800
[narrator] Messages between
Mallory and Yang
86
00:05:35,880 --> 00:05:39,360
indicate that he's been paid $25,000
87
00:05:39,440 --> 00:05:42,480
for the delivery of several
confidential documents.
88
00:05:44,160 --> 00:05:48,000
Mallory is convicted and sentenced
to 20 years in prison
89
00:05:48,080 --> 00:05:49,840
for spying for China.
90
00:05:51,440 --> 00:05:57,280
Kevin Mallory's case reaffirms that a spy
is only as good as his or her spyware,
91
00:05:57,360 --> 00:06:00,640
and in Mallory's case,
it was a total fail.
92
00:06:01,920 --> 00:06:04,280
The recruitment of insider spies
93
00:06:04,360 --> 00:06:08,000
is one tactic being used
to collect information by China.
94
00:06:08,080 --> 00:06:11,960
Another is the relentless use
of cyber espionage.
95
00:06:18,000 --> 00:06:22,880
Michele Van Cleave was appointed
by President George W. Bush
96
00:06:22,960 --> 00:06:27,440
to serve as the first statutory head
of U.S. counterintelligence.
97
00:06:27,520 --> 00:06:31,280
We've seen recently, uh,
98
00:06:31,360 --> 00:06:34,520
Chinese penetrations
into the U.S. government,
99
00:06:34,600 --> 00:06:39,520
which has given them
very specialized kinds of insights
100
00:06:40,080 --> 00:06:45,080
about the operations that we may be
conducting against them.
101
00:06:46,080 --> 00:06:49,320
[narrator] One of the most devastating
and damaging cyber attacks
102
00:06:49,400 --> 00:06:54,320
was conducted by China and targeted
the Office of Personnel Management,
103
00:06:54,400 --> 00:06:57,120
the OPM, in 2015.
104
00:06:57,200 --> 00:07:00,320
[man] The OPM breach was basically,
Chinese hacking group,
105
00:07:00,400 --> 00:07:05,840
uh, basically stole credentials
from a laptop of an OPM contractor,
106
00:07:05,920 --> 00:07:08,320
who went out and did
background investigations.
107
00:07:08,400 --> 00:07:13,080
[narrator] Robert Bigman was the former
chief information security officer,
108
00:07:13,160 --> 00:07:17,520
or CISO, responsible
for all cyber security policy
109
00:07:17,600 --> 00:07:21,840
and defense monitoring at the CIA
for the last 15 years.
110
00:07:21,920 --> 00:07:27,760
They basically were able to deploy
some malware on that laptop.
111
00:07:27,840 --> 00:07:31,000
They stole the credentials.
His user ID, his password.
112
00:07:31,080 --> 00:07:34,880
They were then able to log
into the OPM network as him,
113
00:07:34,960 --> 00:07:36,520
and since OPM didn't have
114
00:07:36,600 --> 00:07:39,520
very sophisticated
cyber technology at the time,
115
00:07:39,600 --> 00:07:42,680
uh, they didn't detect it,
and they were able to get in
116
00:07:42,760 --> 00:07:45,280
and basically move laterally
across the network
117
00:07:45,360 --> 00:07:48,760
into various databases,
and, as we like to say,
118
00:07:48,840 --> 00:07:50,520
just basically raped the network
119
00:07:50,600 --> 00:07:53,240
and just take out
whatever they were looking for,
120
00:07:53,320 --> 00:07:56,920
uh, and steal it
and exfiltrate it up to China.
121
00:07:59,200 --> 00:08:02,360
[Van Cleave] So now,
having acquired these records,
122
00:08:02,440 --> 00:08:05,400
the Chinese have highly developed insights
123
00:08:05,480 --> 00:08:09,400
into some 22 million people
whose names and faces
124
00:08:09,480 --> 00:08:14,440
and personal information were contained
in these OPM records,
125
00:08:14,520 --> 00:08:18,680
because this is where anyone who's ever
held a clearance in the U.S. government
126
00:08:18,760 --> 00:08:20,800
has their files.
127
00:08:21,440 --> 00:08:26,080
And so if you are…
you are the Chinese intelligence services
128
00:08:26,160 --> 00:08:28,800
and your job,
like any intelligence service,
129
00:08:28,880 --> 00:08:31,240
is to spot and assess…
130
00:08:32,320 --> 00:08:34,560
individuals who might be of value to you,
131
00:08:35,200 --> 00:08:37,760
with these OPM files,
132
00:08:37,840 --> 00:08:43,880
you now have a roster
that's done a great deal of the work
133
00:08:43,960 --> 00:08:47,440
that would otherwise be very difficult
to do one at a time.
134
00:08:51,760 --> 00:08:54,520
[narrator] If you're a spy
collecting secret information,
135
00:08:55,120 --> 00:08:57,480
the Internet can be a goldmine,
136
00:08:57,560 --> 00:09:00,120
especially if you're trying
to infiltrate a server
137
00:09:00,200 --> 00:09:02,360
with an antiquated security system.
138
00:09:02,440 --> 00:09:04,200
[typing keys]
139
00:09:08,560 --> 00:09:11,560
[Melton] Edward Snowden,
very smart young man.
140
00:09:12,680 --> 00:09:16,200
He worked at times
for the University of Maryland,
141
00:09:16,280 --> 00:09:18,640
which operated a facility
142
00:09:18,720 --> 00:09:20,760
for the National Security Agency.
143
00:09:20,840 --> 00:09:22,640
He later worked for CIA.
144
00:09:22,720 --> 00:09:27,520
And he later worked as a contractor
for the National Security Agency,
145
00:09:27,600 --> 00:09:30,880
as a systems administrator in Hawaii,
146
00:09:30,960 --> 00:09:35,600
which gave him a great deal of latitude
147
00:09:35,680 --> 00:09:38,280
and freedom in operating the system,
148
00:09:38,360 --> 00:09:41,600
because he was guarding the chicken coop.
149
00:09:41,680 --> 00:09:44,040
He was the one
that was guarding this system,
150
00:09:44,120 --> 00:09:48,360
and he in turn was collecting
information from that system.
151
00:09:48,920 --> 00:09:50,840
[narrator] Snowden allegedly copied
152
00:09:50,920 --> 00:09:54,360
over a million highly confidential
and sensitive documents
153
00:09:54,440 --> 00:09:58,560
onto thumb drives
and smuggled them out of the NSA,
154
00:09:58,640 --> 00:10:00,720
and then, he leaked them.
155
00:10:01,600 --> 00:10:06,320
In 2013, he created a false story
156
00:10:06,400 --> 00:10:10,240
that he had needed treatment for epilepsy,
157
00:10:10,840 --> 00:10:13,400
and he traveled to Hong Kong.
158
00:10:13,480 --> 00:10:17,360
He had a meeting with several reporters.
159
00:10:18,120 --> 00:10:21,680
He claims he passed
all of his thumb drives to them.
160
00:10:21,760 --> 00:10:25,720
We now know
that he was also meeting secretly
161
00:10:25,800 --> 00:10:27,840
with representatives
of the Russian government.
162
00:10:28,520 --> 00:10:32,760
He has claimed that he took
no hard drives with him.
163
00:10:32,840 --> 00:10:33,840
No thumb drives.
164
00:10:33,920 --> 00:10:35,840
Uh, that's not believable.
165
00:10:36,960 --> 00:10:39,920
It's been later claimed and asserted
166
00:10:40,000 --> 00:10:43,560
that the Russians and Chinese
167
00:10:43,640 --> 00:10:49,040
declassified at least one million
of the documents on the drives.
168
00:10:49,880 --> 00:10:55,160
If you printed out all of the files
that were on the thumb drives,
169
00:10:55,240 --> 00:11:00,440
it would be a stack of information
printed on 8½ by 11 paper,
170
00:11:00,520 --> 00:11:02,360
it would be about four miles tall.
171
00:11:03,440 --> 00:11:06,960
So it's a volume of information
that is staggering.
172
00:11:07,520 --> 00:11:13,200
It's literally the who's who
and what's what
173
00:11:13,280 --> 00:11:15,720
of every technical collection system
174
00:11:16,440 --> 00:11:18,720
that the U.S. government was using.
175
00:11:20,200 --> 00:11:23,440
[narrator] The capacity for an agent
to rapidly collect
176
00:11:23,520 --> 00:11:25,960
and move secret information
via the Internet
177
00:11:26,040 --> 00:11:28,760
is a valuable tool for espionage,
178
00:11:28,840 --> 00:11:32,320
but the ability to carry vast amounts
of intelligence information
179
00:11:32,400 --> 00:11:35,360
in a device that can fit
in your back pocket
180
00:11:35,440 --> 00:11:36,800
is a game changer.
181
00:11:44,160 --> 00:11:49,200
[Melton] Because a cell phone
with an incredible algorithm
182
00:11:49,280 --> 00:11:53,560
or encryption protocol on it
looks just like the one in your pocket.
183
00:11:53,640 --> 00:11:58,800
And that's what makes it
so devilishly effective.
184
00:11:58,880 --> 00:12:02,800
[narrator] Yet a cell phone can also
increase the risk to an agent.
185
00:12:02,880 --> 00:12:06,400
One of the first things many of us do
when we land at an airport
186
00:12:06,480 --> 00:12:08,960
is immediately turn on our phone.
187
00:12:09,040 --> 00:12:12,600
But depending on where you land
and what you're planning on doing there,
188
00:12:12,680 --> 00:12:14,720
you may want to think twice.
189
00:12:16,440 --> 00:12:19,640
Intelligence services use a technique
190
00:12:19,720 --> 00:12:24,000
called "the man in the middle" attack.
191
00:12:24,080 --> 00:12:28,880
And what they create
is a small little mini tower
192
00:12:28,960 --> 00:12:32,920
that may exist in the executive lounge
of the airport.
193
00:12:33,000 --> 00:12:35,200
It may exist in the concourse.
194
00:12:35,280 --> 00:12:38,440
There may be several of them
as soon as you're off the plane.
195
00:12:38,520 --> 00:12:41,400
And once you turn your phone on,
196
00:12:41,480 --> 00:12:46,480
rather than contact
the closest major tower,
197
00:12:46,560 --> 00:12:49,000
it reaches out to this little mini tower
198
00:12:49,080 --> 00:12:51,560
that's controlled
by an intelligence service.
199
00:12:51,640 --> 00:12:55,640
It, in turn, contacts
the major cell tower,
200
00:12:55,720 --> 00:12:57,960
but because it's in the middle,
201
00:12:58,040 --> 00:13:00,080
it can download everything on your phone
202
00:13:00,160 --> 00:13:03,600
and it can put a virus on your phone
in exchange,
203
00:13:03,680 --> 00:13:06,680
and you will never, ever be aware of it.
204
00:13:06,760 --> 00:13:09,200
And there are multiple cities in the world
205
00:13:09,280 --> 00:13:12,080
in which that happens on a regular basis.
206
00:13:12,160 --> 00:13:15,160
[narrator] For a spy caught
in a "man in the middle" attack,
207
00:13:15,240 --> 00:13:17,640
the results can be devastating.
208
00:13:17,720 --> 00:13:18,920
He's working for us,
209
00:13:19,000 --> 00:13:22,240
but he's using a device
that's been compromised by the bad guys,
210
00:13:22,320 --> 00:13:25,640
it's not going to take too long
before, you know, they identify him
211
00:13:25,720 --> 00:13:28,080
and either compromise him
212
00:13:28,160 --> 00:13:30,560
or use him to send us false information.
213
00:13:30,640 --> 00:13:32,840
[narrator] Although cell phones
have vulnerabilities,
214
00:13:32,920 --> 00:13:36,280
they're a vital clandestine
collection device,
215
00:13:36,360 --> 00:13:39,280
especially in their ability
to quickly snap a photograph.
216
00:13:40,160 --> 00:13:42,920
But long before the invention
of the cell phone,
217
00:13:43,000 --> 00:13:47,480
spies and their intelligence agencies
had to come up with other creative means
218
00:13:47,560 --> 00:13:49,440
to photograph secret information.
219
00:13:50,280 --> 00:13:52,920
[atmospheric music playing]
220
00:13:59,360 --> 00:14:03,520
Photography was so vital to espionage
during the Cold War,
221
00:14:03,600 --> 00:14:06,200
the Soviet intelligence service,
the KGB,
222
00:14:06,280 --> 00:14:09,840
established what they called
"The Eleventh Laboratory,"
223
00:14:09,920 --> 00:14:13,080
for the single purpose of creating
a new generation
224
00:14:13,160 --> 00:14:18,360
of small, easily-concealed cameras
that could be smuggled into the workplace.
225
00:14:19,040 --> 00:14:23,400
Document cameras were created
that gave them the opportunity.
226
00:14:23,480 --> 00:14:27,280
No one watching, they could quickly
take out a fountain pen
227
00:14:27,360 --> 00:14:29,320
and make a copy of a document.
228
00:14:29,400 --> 00:14:33,000
They could take out a cigarette lighter,
perhaps, and make a copy.
229
00:14:33,080 --> 00:14:35,800
[narrator] Collecting secrets
and effectively delivering them
230
00:14:35,880 --> 00:14:40,840
to the intelligence agency is one
of the biggest challenges for spies.
231
00:14:40,920 --> 00:14:45,760
But imagine trying to do that as a spy
working behind the Iron Curtain.
232
00:14:57,800 --> 00:15:02,320
Benjamin Fischer was a former
chief historian for the CIA.
233
00:15:08,640 --> 00:15:11,880
[Fischer] You cannot meet agents
behind the Iron Curtain
234
00:15:11,960 --> 00:15:14,880
because the surveillance is so excessive.
235
00:15:15,480 --> 00:15:17,080
You can't rent hotel rooms.
236
00:15:17,160 --> 00:15:20,480
You can't buy an apartment,
use it as a safe house.
237
00:15:20,560 --> 00:15:24,960
All of these opportunities
that we had in this case don't exist,
238
00:15:25,040 --> 00:15:27,440
never existed behind the Iron Curtain.
239
00:15:28,040 --> 00:15:32,200
[narrator] Gaining access and information
from the Soviets was nearly impossible,
240
00:15:32,280 --> 00:15:36,600
but in 1960, the U.S.
Central Intelligence Agency got lucky
241
00:15:37,200 --> 00:15:40,960
when they were approached
by Colonel Oleg Penkovsky.
242
00:15:41,680 --> 00:15:44,120
PASSPORT
243
00:15:51,000 --> 00:15:56,560
Colonel Oleg Penkovsky
was a member of the, uh, GRU.
244
00:15:56,640 --> 00:16:00,440
The GRU is military intelligence service.
245
00:16:00,520 --> 00:16:04,320
In other words,
the military counterpart to the KGB.
246
00:16:04,400 --> 00:16:08,840
Penkovsky volunteered to spy.
247
00:16:08,920 --> 00:16:14,400
It was a joint operation between
the CIA and British intelligence.
248
00:16:14,480 --> 00:16:19,120
Uh, the CIA and the British
put together a four-man team,
249
00:16:19,200 --> 00:16:22,120
two Americans, two British case officers.
250
00:16:22,760 --> 00:16:26,360
Uh, we had…
it was an exceptional operation
251
00:16:26,440 --> 00:16:29,560
in that Penkovsky was allowed
to travel to the West
252
00:16:29,640 --> 00:16:34,200
on three separate occasions,
and this provided an opportunity
253
00:16:34,280 --> 00:16:38,760
to sit in a hotel room
and debrief him at length.
254
00:16:39,840 --> 00:16:40,760
[clicks]
255
00:16:43,680 --> 00:16:45,160
[narrator] Code named "Hero,"
256
00:16:45,240 --> 00:16:49,720
Penkovsky spied for both the CIA
and British intelligence.
257
00:16:49,800 --> 00:16:53,120
He was given subminiature
document copy cameras,
258
00:16:53,200 --> 00:16:54,960
like the German-made Minox.
259
00:16:55,040 --> 00:16:58,400
The Minox had been around
since World War II,
260
00:16:58,480 --> 00:17:01,560
but by the time Penkovsky
got his hands on one,
261
00:17:01,640 --> 00:17:05,120
it had been updated and outfitted
with a special lens
262
00:17:05,200 --> 00:17:08,400
that could focus up to eight inches away
from a document.
263
00:17:09,160 --> 00:17:12,120
[Fischer] He provided about
264
00:17:13,160 --> 00:17:18,920
10,000 frames of photographs
of Soviet military documents.
265
00:17:20,280 --> 00:17:23,040
He told us what the Soviet war plans were.
266
00:17:23,120 --> 00:17:25,120
He had seen them, he helped draft them.
267
00:17:25,200 --> 00:17:29,240
This helped make sense
of what we were seeing and hearing
268
00:17:29,320 --> 00:17:33,200
through our technical
collection operations.
269
00:17:33,280 --> 00:17:36,040
It was an almost perfect symmetry.
270
00:17:36,120 --> 00:17:41,600
Penkovsky is without exception,
and by universal consensus,
271
00:17:41,680 --> 00:17:47,640
the best agent that the West had
during the entire Cold War.
272
00:17:47,720 --> 00:17:50,320
[narrator] Eventually,
the Soviets caught on
273
00:17:50,400 --> 00:17:52,280
and Penkovsky was arrested
274
00:17:52,360 --> 00:17:55,200
and was executed in 1962.
275
00:17:56,160 --> 00:17:59,000
With the death
of their most successful spy,
276
00:17:59,080 --> 00:18:04,480
the CIA realized they needed to develop
more specialized espionage equipment
277
00:18:04,560 --> 00:18:07,280
for their agents
working in the Soviet Union,
278
00:18:07,360 --> 00:18:11,560
and put the task on
the CIA's Office of Technical Service.
279
00:18:13,360 --> 00:18:18,200
The OTS was responsible for developing
cutting-edge technologies
280
00:18:18,280 --> 00:18:21,760
for CIA officers and agents in the field.
281
00:18:22,280 --> 00:18:27,320
One of them was Polish
General Staff Officer Ryszard Kukliński.
282
00:18:28,160 --> 00:18:31,320
Kukliński was a man
who was both disillusioned
283
00:18:31,400 --> 00:18:34,520
with the Communist system in Poland,
284
00:18:34,600 --> 00:18:37,120
and wanted to help the West.
285
00:18:37,200 --> 00:18:40,040
So the CIA virtually used
286
00:18:40,120 --> 00:18:45,680
every bit of their technology,
everything they had, to keep him working.
287
00:18:46,280 --> 00:18:50,040
They would have sent him
a covert communication device
288
00:18:50,120 --> 00:18:53,520
that enabled him to somehow send messages
289
00:18:53,600 --> 00:18:57,680
similar to a,
a early form of a digital pager.
290
00:18:57,760 --> 00:19:01,320
He could covert--
Send covert messages secretly.
291
00:19:01,840 --> 00:19:04,080
[narrator] The OTS also armed him
292
00:19:04,160 --> 00:19:06,840
with one of their most effective
spy cameras.
293
00:19:08,360 --> 00:19:10,160
[Melton] It was called the Tropel.
294
00:19:10,240 --> 00:19:13,600
And the camera module was designed
295
00:19:13,680 --> 00:19:16,800
to be concealed in multiple applications.
296
00:19:16,880 --> 00:19:19,120
It could be hidden in a fountain pen.
297
00:19:19,200 --> 00:19:23,720
It could be concealed
in a Bic-style cigarette lighter.
298
00:19:24,320 --> 00:19:27,320
They even made one version
that was designed to be concealed
299
00:19:27,400 --> 00:19:31,040
inside a Seiko digital wristwatch.
300
00:19:31,120 --> 00:19:33,600
It would be an active concealment.
301
00:19:33,680 --> 00:19:35,720
But it may only work 10 or 20 times,
302
00:19:35,800 --> 00:19:37,400
but each time he depressed it,
303
00:19:37,480 --> 00:19:39,880
it's gonna secretly be taking a picture.
304
00:19:39,960 --> 00:19:41,920
[tense music playing]
305
00:19:42,000 --> 00:19:47,120
[narrator] Kukliński provided the CIA
with over 40,000 secret documents
306
00:19:47,200 --> 00:19:50,680
in an amazing ten years of spying
for the United States.
307
00:19:51,240 --> 00:19:54,640
Ultimately, Polish intelligence
became suspicious,
308
00:19:54,720 --> 00:19:57,240
but before they could get
their hands on him,
309
00:19:57,320 --> 00:20:00,920
he and his family were safely extradited
to the United States.
310
00:20:05,920 --> 00:20:10,560
Today, high-def cameras can be concealed
in almost any device
311
00:20:10,640 --> 00:20:13,880
to photograph, record,
or live-stream intelligence
312
00:20:13,960 --> 00:20:15,720
from the ocean to the sky.
313
00:20:16,520 --> 00:20:20,600
Having an aerial view of the enemy
is valuable for espionage.
314
00:20:20,680 --> 00:20:24,400
Creative devices were invented
to gain this perspective
315
00:20:24,480 --> 00:20:26,800
as early as the American Civil War.
316
00:20:31,560 --> 00:20:34,920
We saw an early daguerreotype camera
317
00:20:35,000 --> 00:20:37,360
taken up on a balloon
318
00:20:37,440 --> 00:20:40,960
and used to photograph
an enemy battle space.
319
00:20:42,240 --> 00:20:45,360
[brash string music playing]
320
00:20:47,760 --> 00:20:49,120
[whirring]
321
00:20:51,280 --> 00:20:55,840
The ability to see
from an altitude of a bird
322
00:20:55,920 --> 00:20:59,000
is something that people
had wished for for centuries.
323
00:20:59,560 --> 00:21:03,600
Now we see that that technology
has new applications
324
00:21:03,680 --> 00:21:08,040
when we have balloons
that can remain in place
325
00:21:08,120 --> 00:21:12,160
over a fixed position
for weeks and even months
326
00:21:12,240 --> 00:21:14,280
and serve as aerial platforms.
327
00:21:14,360 --> 00:21:16,360
[beeping]
328
00:21:18,680 --> 00:21:21,920
[narrator] Modern spy balloons
are deployed to conflict zones
329
00:21:22,000 --> 00:21:26,480
and to American southern U.S. borders
to search for drug smugglers
330
00:21:26,560 --> 00:21:27,800
and illegal immigrants.
331
00:21:36,360 --> 00:21:41,000
The U.S. military is currently conducting
wide-area surveillance tests
332
00:21:41,080 --> 00:21:43,640
using experimental high-altitude balloons
333
00:21:44,240 --> 00:21:47,080
that travel up to 65,000 feet
334
00:21:47,160 --> 00:21:49,600
and provide a persistent
surveillance system.
335
00:21:49,680 --> 00:21:50,520
[whirring]
336
00:21:50,600 --> 00:21:53,880
They're sometimes referred to
as "Combat TiVo"…
337
00:21:54,800 --> 00:21:56,920
because when an event occurs,
338
00:21:57,000 --> 00:22:01,640
it has the capability to rewind the tape
to see exactly what happened,
339
00:22:01,720 --> 00:22:04,000
and more importantly, who was involved.
340
00:22:04,080 --> 00:22:06,640
[whirring]
341
00:22:15,360 --> 00:22:20,200
Some vital clandestine collection is
beyond the reach of human senses,
342
00:22:20,280 --> 00:22:23,440
which is why scientists and engineers
came up with a way
343
00:22:23,520 --> 00:22:25,880
to direct espionage from outer space,
344
00:22:25,960 --> 00:22:30,560
using reconnaissance or spy satellites
that use signal intelligence
345
00:22:30,640 --> 00:22:33,840
to pick up electronic signals
by foreign targets.
346
00:22:34,520 --> 00:22:38,040
Satellites were, of course,
the next great evolution.
347
00:22:38,120 --> 00:22:42,040
And when the Corona satellite went up
in the early 1960s,
348
00:22:42,120 --> 00:22:45,000
on its first pass over the Soviet Union,
349
00:22:45,080 --> 00:22:49,560
it took more imagery
than all of the other pictures
350
00:22:49,640 --> 00:22:53,120
that had ever been taken from the air
of the Soviet Union,
351
00:22:53,200 --> 00:22:54,800
in terms of square miles.
352
00:22:54,880 --> 00:22:56,280
Satellites…
353
00:22:56,960 --> 00:23:00,280
are one of the most effective
collection tools in the world.
354
00:23:00,360 --> 00:23:05,600
Their limitation is that they are
very difficult to maneuver.
355
00:23:05,680 --> 00:23:10,960
And to maneuver a satellite
and position it takes time,
356
00:23:11,040 --> 00:23:15,240
and it may not be in time,
depending on an operation.
357
00:23:16,520 --> 00:23:18,920
[narrator] To counter the limitations
of satellites,
358
00:23:19,000 --> 00:23:22,520
a more effective and formidable device
was invented.
359
00:23:22,600 --> 00:23:23,480
The drone.
360
00:23:31,600 --> 00:23:36,280
That we find is, if you can put
similar platforms on a drone,
361
00:23:36,360 --> 00:23:41,880
that drone may stay aloft for 26 hours,
30 hours, maybe even longer,
362
00:23:41,960 --> 00:23:44,760
and you can position a drone above a site
363
00:23:44,840 --> 00:23:48,880
and keep it in place
and have active communications.
364
00:23:48,960 --> 00:23:52,120
You can look through clouds.
You can have your infrared.
365
00:23:52,200 --> 00:23:55,080
You can detect people,
even if they're inside tents,
366
00:23:55,160 --> 00:23:56,880
because of the heat signature.
367
00:23:56,960 --> 00:24:02,000
And so the future is no longer satellites.
368
00:24:02,080 --> 00:24:05,160
It's putting it in these mobile platforms
that you can launch
369
00:24:05,240 --> 00:24:10,760
that are far less expensive, and you can
put them almost everywhere that you need.
370
00:24:11,800 --> 00:24:15,840
[narrator] DARPA, the Defense
Advanced Research Projects Agency,
371
00:24:16,520 --> 00:24:19,680
is at the forefront in developing
emerging technologies
372
00:24:19,760 --> 00:24:22,360
like drones, to be used by the military.
373
00:24:26,160 --> 00:24:28,520
[accelerated whirring]
374
00:24:28,600 --> 00:24:31,440
[Melton]
DARPA creates systems that,
375
00:24:31,520 --> 00:24:34,560
the smallest would be the size
of your small fingernail.
376
00:24:34,640 --> 00:24:36,840
It would look like a large horsefly.
377
00:24:37,440 --> 00:24:38,960
It's maneuverable.
378
00:24:39,040 --> 00:24:42,320
It's essentially
a mobile collection platform.
379
00:24:42,400 --> 00:24:44,800
It can have a television camera.
380
00:24:44,880 --> 00:24:48,520
You can fly it into a room,
you can perch it on a windowsill.
381
00:24:48,600 --> 00:24:53,000
It can sit and it can collect audio
and video and transmit it back.
382
00:24:54,600 --> 00:24:56,840
[narrator]
Along with the capture of imagery,
383
00:24:56,920 --> 00:25:01,280
the ability to pick up clear audio
of what your adversaries are saying
384
00:25:01,360 --> 00:25:04,480
is also a critical resource for espionage.
385
00:25:06,200 --> 00:25:08,200
[suspenseful music playing]
386
00:25:09,640 --> 00:25:12,400
Ray Parrack was a former engineer
387
00:25:12,480 --> 00:25:15,640
for the Office of Technical Service
at the CIA
388
00:25:15,720 --> 00:25:20,240
and was responsible for picking up
secret conversations through the static.
389
00:25:26,080 --> 00:25:29,640
[Parrack] My specific area was building
audio surveillance equipment.
390
00:25:29,720 --> 00:25:32,920
The radio bugs that were put
into people's apartments and condos
391
00:25:33,000 --> 00:25:35,520
and residences to hear
what they were saying.
392
00:25:35,600 --> 00:25:37,880
These were devices
that had radio transmitters
393
00:25:37,960 --> 00:25:40,040
that would transmit the voice
out from a room,
394
00:25:40,120 --> 00:25:43,560
so we actually had some transistors
from the early Bell Labs work
395
00:25:43,640 --> 00:25:45,440
that went into some
of our radio microphones.
396
00:25:49,240 --> 00:25:51,240
[narrator] During the Cold War,
397
00:25:51,320 --> 00:25:55,000
if you needed to listen to a conversation
on the other side of the wall,
398
00:25:55,080 --> 00:25:59,360
you used to have to drill holes
and run audio cables through it.
399
00:25:59,440 --> 00:26:02,400
But today it can be as easy a process
400
00:26:02,480 --> 00:26:04,280
as changing a light bulb.
401
00:26:09,640 --> 00:26:12,960
And that light bulb is a collector.
402
00:26:13,560 --> 00:26:17,280
When voice is collected,
403
00:26:17,360 --> 00:26:22,960
it modifies the frequency
by which the fluorescent bulb pulses.
404
00:26:23,040 --> 00:26:26,640
And that light at night can be detected
405
00:26:27,320 --> 00:26:29,680
from a great distance away
406
00:26:29,760 --> 00:26:33,560
by a very sophisticated telephoto lens
407
00:26:33,640 --> 00:26:35,520
and can be run into a system.
408
00:26:35,600 --> 00:26:38,400
-[agent] …be careful to keep my tracks…
-[handler] Of course.
409
00:26:38,480 --> 00:26:41,240
[agent] …clean, and no fingerprints,
just like these documents.
410
00:26:41,320 --> 00:26:42,800
No fingerprints.
411
00:26:42,880 --> 00:26:45,320
I can't afford to lose my…
412
00:26:45,400 --> 00:26:48,320
And you can recover the speech,
413
00:26:48,400 --> 00:26:52,080
even if the drapes in the room are closed.
414
00:26:52,160 --> 00:26:54,080
Because they've used night vision,
415
00:26:54,160 --> 00:26:57,280
there's enough leakage
around the corners of the drape,
416
00:26:57,360 --> 00:26:59,800
they can still pick up
everything you're saying.
417
00:27:00,440 --> 00:27:05,240
That is one of the most difficult systems
in the world to prevent.
418
00:27:07,000 --> 00:27:09,040
[narrator]
Another breakthrough in espionage
419
00:27:09,120 --> 00:27:13,920
occurred in the early '60s
with the advent of laser technology.
420
00:27:14,000 --> 00:27:17,520
Today, lasers have increased
in power and scale
421
00:27:17,600 --> 00:27:20,520
and have applications
for clandestine collection.
422
00:27:23,840 --> 00:27:29,080
[Melton] Laser collection systems
are scary in their capability.
423
00:27:29,160 --> 00:27:33,120
Almost line of sight, infrared.
424
00:27:33,200 --> 00:27:36,680
You have the ability to focus it
on a window pane
425
00:27:36,760 --> 00:27:40,840
and collect from any sound vibration
in a room.
426
00:27:40,920 --> 00:27:46,640
You can focus it inside the room
on a Styrofoam cup on someone's desk.
427
00:27:46,720 --> 00:27:47,840
You could photograph.
428
00:27:47,920 --> 00:27:51,280
You could focus it on their eyeglass frame
and pick up audio.
429
00:27:52,360 --> 00:27:54,480
[narrator] The long-range laser microphone
430
00:27:54,560 --> 00:27:57,760
is a highly sophisticated
surveillance apparatus
431
00:27:57,840 --> 00:28:01,400
that utilizes an invisible
infrared laser beam
432
00:28:01,480 --> 00:28:05,320
to eavesdrop on an exterior window
of a targeted room
433
00:28:05,400 --> 00:28:07,920
with a range of over 1,500 feet.
434
00:28:17,400 --> 00:28:20,200
Acoustic soundwaves, like human speech,
435
00:28:20,280 --> 00:28:24,800
cause minute vibrations that can be
modulated by an invisible laser beam
436
00:28:24,880 --> 00:28:26,240
aimed at the target.
437
00:28:26,960 --> 00:28:31,520
This modulated laser light can be
picked up by a special receiver
438
00:28:31,600 --> 00:28:34,640
and demodulated to recover the speech.
439
00:28:47,720 --> 00:28:50,720
[indistinct crowd noises, conversations]
440
00:28:50,800 --> 00:28:52,480
[narrator] Advanced technology,
441
00:28:52,560 --> 00:28:55,600
specifically in the development
of biometrics,
442
00:28:55,680 --> 00:28:58,480
has made it easier to catch the bad guy.
443
00:28:58,560 --> 00:29:01,080
But on the flip side, it's made an art
444
00:29:01,160 --> 00:29:05,160
of being a covert operative
more difficult and dangerous.
445
00:29:06,920 --> 00:29:10,120
A facial recognition system
uses biometrics
446
00:29:10,200 --> 00:29:13,920
to map facial features
for a photograph or video
447
00:29:14,000 --> 00:29:19,480
and compares the information
with a database of known faces to match.
448
00:29:22,680 --> 00:29:25,200
[beeping]
449
00:29:25,280 --> 00:29:29,800
Facial recognition software
reads the geometry of your face.
450
00:29:29,880 --> 00:29:33,360
Key factors include
the distance between your eyes
451
00:29:33,440 --> 00:29:36,200
and the distance from forehead to chin.
452
00:29:36,280 --> 00:29:39,520
The software identifies facial landmarks.
453
00:29:39,600 --> 00:29:45,680
One system identifies 68 of them
that are key to distinguishing your face.
454
00:29:45,760 --> 00:29:48,440
The result, your facial signature.
455
00:29:51,880 --> 00:29:55,880
Today, authorities in China are using
facial recognition technology
456
00:29:56,560 --> 00:30:00,520
to spot suspects
with the use of high-tech glasses
457
00:30:00,600 --> 00:30:03,400
that can verify a person's identity
within minutes.
458
00:30:05,000 --> 00:30:07,720
The glasses are installed
with a camera attachment
459
00:30:07,800 --> 00:30:11,200
which can snap a photograph
from up to 17 feet away.
460
00:30:13,080 --> 00:30:15,840
The photo can then be run
through a database
461
00:30:15,920 --> 00:30:21,280
allowing officers to gain information
on the target's name, ethnicity.
462
00:30:21,360 --> 00:30:25,760
It can also detail information
on the hotel someone is staying at,
463
00:30:25,840 --> 00:30:28,720
Internet history, or criminal background.
464
00:30:29,240 --> 00:30:33,400
The use of facial scanners
and similar technologies are widespread,
465
00:30:34,000 --> 00:30:39,560
not only in China but at airports,
concerts, by mobile phone makers,
466
00:30:39,640 --> 00:30:42,600
in college classrooms and on social media.
467
00:30:44,160 --> 00:30:49,760
Fatih Comlekoglu is the CTO
of cyber security company Appguard Inc.
468
00:30:49,840 --> 00:30:52,560
and is an expert on preventative defense,
469
00:30:52,640 --> 00:30:56,600
and what many in the field call
"zero trust space."
470
00:30:56,680 --> 00:30:59,360
If the application is exploited,
471
00:30:59,440 --> 00:31:03,600
it is even worse,
because it is you using that thing.
472
00:31:03,680 --> 00:31:07,080
On behalf of you,
they are able to post messages,
473
00:31:07,160 --> 00:31:11,080
they are able to say some things
that you did not actually say.
474
00:31:12,600 --> 00:31:14,960
[narrator]
The creation of facial recognition
475
00:31:15,040 --> 00:31:17,480
combined with fingerprinting software
476
00:31:17,560 --> 00:31:22,600
may actually make it much harder
to defend yourself against hackers.
477
00:31:22,680 --> 00:31:24,400
They still pose risks
478
00:31:24,480 --> 00:31:28,000
in identifying, correctly identifying,
the user.
479
00:31:28,080 --> 00:31:32,600
At the same time,
the information they capture
480
00:31:32,680 --> 00:31:37,440
can be used by adversaries
481
00:31:37,520 --> 00:31:40,960
in a way that's spoofing your identity.
482
00:31:41,040 --> 00:31:46,920
Your information can be captured
and reused by other parties,
483
00:31:47,000 --> 00:31:51,440
or the system can be fooled
into pretending to be you.
484
00:31:53,280 --> 00:31:55,800
[narrator]
Even seemingly benign applications
485
00:31:55,880 --> 00:31:57,840
can have serious implications.
486
00:32:01,040 --> 00:32:05,720
Hamlet Yousef is a managing partner
at Irongate Capital Advisors
487
00:32:05,800 --> 00:32:08,640
and invests
in defense-related technologies.
488
00:32:10,560 --> 00:32:15,600
Anyone who's downloaded the recent OS
for Apple or has an Android
489
00:32:15,680 --> 00:32:19,200
has seen a feature where,
when I'm talking to you on my phone,
490
00:32:19,280 --> 00:32:22,400
you see like a chicken or a dog
or an animated figure.
491
00:32:22,480 --> 00:32:26,440
Well, it's not gonna take that much time
to modify that device
492
00:32:26,520 --> 00:32:30,120
or modify that image, so instead
of it being a cartoon character,
493
00:32:30,200 --> 00:32:33,320
it is a human being, or looks like
a human being, but it's really not you.
494
00:32:33,400 --> 00:32:36,200
The impact that's gonna have
on anonymity,
495
00:32:36,280 --> 00:32:39,200
on denial and deception,
is gonna be massive.
496
00:32:42,080 --> 00:32:44,040
[narrator] In the world of espionage,
497
00:32:44,120 --> 00:32:47,160
collecting information
is only half of the battle.
498
00:32:47,240 --> 00:32:49,800
The other half is counterintelligence
499
00:32:49,880 --> 00:32:52,680
and protecting the information
we already have.
500
00:32:53,880 --> 00:32:56,640
[Yousef] Cybersecurity is going to be
a critical area of focus
501
00:32:56,720 --> 00:32:58,160
here in the 21st century.
502
00:32:58,240 --> 00:33:01,760
Uh, what you're seeing is, not only
are governments worried about this,
503
00:33:01,840 --> 00:33:04,640
but more important, businesses
are starting to be worried as well,
504
00:33:04,720 --> 00:33:08,600
because if you spent billions of dollars
in developing a certain product,
505
00:33:08,680 --> 00:33:11,840
all the research dollars,
all the development, all the testing,
506
00:33:11,920 --> 00:33:15,320
uh, but if one of your competitors
gets access to your secret sauce
507
00:33:15,400 --> 00:33:18,320
or access to your plans
and is able to beat you to market
508
00:33:18,400 --> 00:33:21,920
with reverse-engineered or better product
for a fraction of the cost,
509
00:33:22,000 --> 00:33:24,440
uh, that's a massive impact
in terms of GDP.
510
00:33:24,520 --> 00:33:26,360
A massive impact on the bottom line.
511
00:33:27,360 --> 00:33:32,080
[Van Cleave] You can lock all the doors
and batten down all of the windows.
512
00:33:32,160 --> 00:33:37,040
You are still going to find
a determined adversary…
513
00:33:37,640 --> 00:33:40,280
finding ways to break
through that security
514
00:33:40,360 --> 00:33:42,040
to get to the things that they need.
515
00:33:42,120 --> 00:33:44,480
[Melton] At the heart of every operation,
516
00:33:45,040 --> 00:33:48,120
you want to collect information in a way
517
00:33:48,200 --> 00:33:50,480
that your adversary
doesn't know it's missing.
518
00:33:50,560 --> 00:33:53,240
Regardless of the technology you used
519
00:33:53,320 --> 00:33:56,280
and regardless of where
the information was hidden,
520
00:33:56,360 --> 00:33:59,880
because information
that they don't know is missing,
521
00:33:59,960 --> 00:34:02,960
is exploitable and far more valuable.
522
00:34:03,640 --> 00:34:07,320
Clandestine collection will always be
at the heart of espionage.
523
00:34:08,800 --> 00:34:13,080
They always describe the espionage
as a chess match, right?
524
00:34:13,160 --> 00:34:15,680
You move, we countermove,
you move, we countermove.
525
00:34:15,760 --> 00:34:17,680
It's the same thing with electronics.
526
00:34:18,640 --> 00:34:22,400
We need to appreciate
the extent to which we're vulnerable,
527
00:34:22,480 --> 00:34:25,920
but also look for ways
that we can defeat that.
528
00:34:26,000 --> 00:34:31,880
[Melton] Intelligence services
are always on a near-wartime footing.
529
00:34:31,960 --> 00:34:35,200
The services themselves
are always fighting.
530
00:34:35,280 --> 00:34:37,200
You're fighting either to steal secrets
531
00:34:37,280 --> 00:34:40,320
or you're fighting to protect
the secrets that you have, so,
532
00:34:40,400 --> 00:34:42,840
there's never a moment you can relax.
533
00:34:42,920 --> 00:34:46,920
[atmospheric music playing]
46436
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.