All language subtitles for Spycraft.S01E05.1080p.WEB.H264-STRONTiUM_track8_[eng]

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian Download
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian Download
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish Download
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:11,920 --> 00:00:13,160 [ominous music playing] 2 00:00:13,240 --> 00:00:16,920 [narrator] When intelligence agencies deploy spies for espionage, 3 00:00:17,000 --> 00:00:20,600 they rely on covert communication, or cov-com, 4 00:00:20,680 --> 00:00:23,600 to collect and exchange secret information. 5 00:00:27,360 --> 00:00:29,640 [man] It's possible today 6 00:00:29,720 --> 00:00:33,440 to take and modify a strand of DNA 7 00:00:34,000 --> 00:00:36,480 and have it contain a message. 8 00:00:37,240 --> 00:00:41,760 We tried to make our communications as undetectable as possible. 9 00:00:44,560 --> 00:00:47,960 In micro photography… take instructions and bring it down 10 00:00:48,040 --> 00:00:50,880 to the size… a period at the end of a sentence. 11 00:00:50,960 --> 00:00:53,600 [narrator] Every agent requires their own cov-com 12 00:00:53,680 --> 00:00:55,880 to fit their unique circumstance. 13 00:00:56,520 --> 00:00:59,160 He would just push a button and it would transmit it, 14 00:00:59,240 --> 00:01:03,080 and the base station would respond to it. 15 00:01:03,760 --> 00:01:07,160 [man] One of the main focuses of intelligence services 16 00:01:07,240 --> 00:01:09,600 is to provide technology 17 00:01:09,680 --> 00:01:12,560 that helps spies capture the information 18 00:01:12,640 --> 00:01:19,120 and then find ways to pass it without bringing danger to the spy. 19 00:01:19,200 --> 00:01:22,560 It is the heart of covert communications 20 00:01:22,640 --> 00:01:26,840 that really makes a successful espionage operation. 21 00:01:26,920 --> 00:01:29,480 [theme music playing] 22 00:01:56,200 --> 00:01:59,480 [atmospheric music plays] 23 00:02:00,800 --> 00:02:04,040 [narrator] The ability for spies to operate successfully 24 00:02:04,120 --> 00:02:06,960 depends largely on the use of covert systems 25 00:02:07,040 --> 00:02:09,080 to communicate with their handlers 26 00:02:09,160 --> 00:02:11,560 that are secure from interception by the enemy: 27 00:02:12,120 --> 00:02:13,200 dead drops, 28 00:02:13,280 --> 00:02:14,960 digital steganography, 29 00:02:15,040 --> 00:02:16,640 concealment devices 30 00:02:16,720 --> 00:02:20,720 and the seemingly endless capabilities of the World Wide Web. 31 00:02:23,600 --> 00:02:26,800 Covert communications, or cov-com, 32 00:02:27,320 --> 00:02:31,080 is the essential ingredient in espionage. 33 00:02:31,800 --> 00:02:35,840 You have spies who steal secrets, you have handlers who manage them 34 00:02:35,920 --> 00:02:39,760 and need to get the secrets so they can pass them back to be analyzed. 35 00:02:39,840 --> 00:02:44,640 But the link between them is how they do it covertly 36 00:02:44,720 --> 00:02:47,280 and secretly and without getting caught. 37 00:02:47,360 --> 00:02:49,240 [narrator] One of the most reliable methods 38 00:02:49,320 --> 00:02:52,720 for transferring secret information are face-to-face meetings 39 00:02:52,800 --> 00:02:55,600 between an agent and an intelligence officer. 40 00:02:55,680 --> 00:02:58,120 The exchange of materials is guaranteed 41 00:02:58,200 --> 00:03:01,240 and conversations can address urgent issues. 42 00:03:05,400 --> 00:03:07,520 [man] …reticent to let you have it 43 00:03:07,600 --> 00:03:10,160 because it's all classified 44 00:03:10,240 --> 00:03:11,280 and… 45 00:03:11,360 --> 00:03:14,160 But I will let you see it, 46 00:03:14,720 --> 00:03:17,160 and you can take all the notes you want. 47 00:03:17,840 --> 00:03:19,760 Uh, which I think you can do today, 48 00:03:20,280 --> 00:03:21,760 but I… 49 00:03:22,920 --> 00:03:26,600 If it ever fell into the wrong hands, and I know it's not going to, but… 50 00:03:27,400 --> 00:03:29,760 [narrator] FBI cameras concealed in the car 51 00:03:29,840 --> 00:03:35,840 recorded Pentagon analyst Gregg Bergersen and Tai Shen Kuo, a spy for China, 52 00:03:35,920 --> 00:03:38,720 discussing the handover of secret documents 53 00:03:38,800 --> 00:03:41,640 that list future weapons sales to Taiwan. 54 00:03:42,240 --> 00:03:45,920 In this case, the face-to-face meeting didn't go so well. 55 00:03:46,000 --> 00:03:48,680 The recording of their meeting served as evidence. 56 00:03:48,760 --> 00:03:52,680 The men were sentenced to 15 years in jail for espionage. 57 00:03:53,600 --> 00:03:57,680 If you can't ensure that you are free from surveillance going into a meeting, 58 00:03:57,760 --> 00:04:01,640 you could potentially jeopardize that asset that you're meeting. 59 00:04:02,240 --> 00:04:04,720 And the gap is, at best, a few seconds. 60 00:04:05,360 --> 00:04:09,960 So you turn a corner, or you drive down a blind alley somewhere. 61 00:04:10,040 --> 00:04:13,560 Uh, you only have that short-- very short, you know, just a few seconds 62 00:04:13,640 --> 00:04:17,560 before the person who's following you at some distance makes that turn as well. 63 00:04:18,560 --> 00:04:20,600 [narrator] Face-to-face meetings with an asset 64 00:04:20,680 --> 00:04:23,280 is one challenge for intelligence operatives. 65 00:04:23,360 --> 00:04:26,160 Another is exchanging secret information with an agent 66 00:04:26,240 --> 00:04:28,680 without having to meet directly. 67 00:04:28,760 --> 00:04:33,960 One technique used today that dates back to World War II is the dead drop. 68 00:04:34,040 --> 00:04:37,640 [tense music playing] 69 00:04:37,720 --> 00:04:39,720 In a dead drop scenario, 70 00:04:40,720 --> 00:04:43,560 an agent and a case officer 71 00:04:44,280 --> 00:04:48,880 both have knowledge of a particular location. 72 00:04:48,960 --> 00:04:55,520 And the parties know that if they receive a signal, 73 00:04:55,600 --> 00:04:57,240 then there will be a package. 74 00:04:57,320 --> 00:05:01,680 There will be material left at a certain location. 75 00:05:02,560 --> 00:05:06,160 And so, once that signal is received, 76 00:05:06,240 --> 00:05:12,160 the agent goes to the location and retrieves the document. 77 00:05:12,240 --> 00:05:15,720 [narrator] Dead drop concealments come in all shapes and sizes. 78 00:05:15,800 --> 00:05:18,960 It can be as simple as a hollow brick that can hold money 79 00:05:19,040 --> 00:05:21,720 or a fake rock to conceal information. 80 00:05:21,800 --> 00:05:24,440 In one low-tech scenario, dead rats, 81 00:05:24,520 --> 00:05:28,480 with hidden messages inside them, have even been used at dead drops. 82 00:05:29,040 --> 00:05:32,040 He has a dead drop device that you can put on the ground 83 00:05:32,120 --> 00:05:37,120 that nobody else in that city is going to want to pick up, except your agent. 84 00:05:37,960 --> 00:05:40,960 And so at one point in time, 85 00:05:41,040 --> 00:05:46,600 we were making dead animal dead drop devices for use in denied areas. 86 00:05:46,680 --> 00:05:50,440 [narrator] The dead drop was the preferred method of covert communication 87 00:05:50,520 --> 00:05:54,960 for Robert Hanssen, the former FBI agent turned Russian spy. 88 00:05:55,040 --> 00:05:59,000 Hanssen was so clever because he blended 89 00:05:59,080 --> 00:06:02,440 the knowledge of a counterintelligence officer 90 00:06:03,040 --> 00:06:05,440 with traditional tradecraft. 91 00:06:05,520 --> 00:06:08,400 He knew how to use dead drops very effectively. 92 00:06:08,480 --> 00:06:13,000 He knew how to select them and then he added digital components. 93 00:06:16,600 --> 00:06:21,320 [narrator] In 1988, Hanssen mailed a disk to the KGB that appeared to be blank 94 00:06:21,400 --> 00:06:23,560 but contained a hidden message. 95 00:06:23,640 --> 00:06:26,360 By using a procedure called 40-track mode, 96 00:06:26,440 --> 00:06:30,680 he had reformatted the disk to have slightly less capacity than usual 97 00:06:30,760 --> 00:06:34,760 so that secret messages could be concealed in its lost space. 98 00:06:36,120 --> 00:06:39,320 Hanssen later used a Palm III handheld computer 99 00:06:39,400 --> 00:06:43,440 to communicate with the KGB's successor, the SVR. 100 00:06:43,520 --> 00:06:45,960 [tense music playing] 101 00:06:47,280 --> 00:06:51,080 [Melton] And he proposed to the KGB, or the SVR at the time, he said, 102 00:06:51,160 --> 00:06:54,120 "Just think, in the future I could do everything 103 00:06:54,200 --> 00:06:59,360 and communicate to you wirelessly without ever having to use the dead drop." 104 00:06:59,440 --> 00:07:04,280 And so an agent who combines digital techniques 105 00:07:04,360 --> 00:07:06,080 with the classic old techniques 106 00:07:06,160 --> 00:07:09,280 is a nightmare for a counterintelligence service. 107 00:07:10,280 --> 00:07:12,760 [narrator] On the day Robert Hanssen was arrested, 108 00:07:12,840 --> 00:07:17,160 he was filling a dead drop reportedly used more than 20 times, 109 00:07:17,240 --> 00:07:21,160 located under a bridge at Foxstone Park in Vienna, Virginia. 110 00:07:21,240 --> 00:07:25,160 It was a package with seven secret FBI documents 111 00:07:25,240 --> 00:07:29,520 and an encrypted letter to the SVR on a computer disk, 112 00:07:29,600 --> 00:07:33,520 all wrapped in a black plastic trash bag covered in his fingerprints. 113 00:07:34,440 --> 00:07:36,760 After leaving the package under the bridge, 114 00:07:36,840 --> 00:07:40,760 he headed back to his car to find the FBI waiting for him. 115 00:07:41,840 --> 00:07:44,880 Operating as a mole inside the FBI, 116 00:07:44,960 --> 00:07:48,640 Hanssen spied for the Soviet and Russian intelligence services 117 00:07:48,720 --> 00:07:50,560 for 22 years. 118 00:07:51,280 --> 00:07:55,080 He received a life sentence for his espionage activities 119 00:07:55,160 --> 00:07:56,840 against the United States. 120 00:07:57,880 --> 00:08:02,960 Although spies use dead drops like Hanssen's for covert communication, 121 00:08:03,040 --> 00:08:05,720 today many are digital and wireless, 122 00:08:05,800 --> 00:08:09,560 just as Hanssen had predicted back in the 1990s. 123 00:08:10,560 --> 00:08:13,120 You could have a digital dead drop 124 00:08:13,200 --> 00:08:17,880 concealed inside a hollow rock, and that rock could be in a park, 125 00:08:17,960 --> 00:08:21,240 and as you go by you have your cell phone 126 00:08:21,320 --> 00:08:25,520 and you hit "transmit" and it, using Bluetooth, 127 00:08:25,600 --> 00:08:31,440 wirelessly transmits the information from your phone 20 feet away to the rock. 128 00:08:31,520 --> 00:08:34,040 The rock in turn receives the information 129 00:08:34,120 --> 00:08:36,720 and then uploads and sends you a confirmation, 130 00:08:36,800 --> 00:08:39,360 or it may send you instructions back. 131 00:08:39,440 --> 00:08:43,560 The next day, someone from the embassy simply takes a walk with their dog 132 00:08:43,640 --> 00:08:46,920 and they go on another path 20 yards away. 133 00:08:47,000 --> 00:08:49,800 They have their hand in their pocket and they use their cell phone 134 00:08:49,880 --> 00:08:52,880 and they download the data that's concealed 135 00:08:52,960 --> 00:08:54,960 and they send you new tasking. 136 00:08:56,560 --> 00:09:00,200 One of the main focuses of intelligence services 137 00:09:00,280 --> 00:09:07,000 is to provide technology that helps spies capture the information more efficiently 138 00:09:07,080 --> 00:09:13,360 and then find ways to pass it without bringing danger to the spy. 139 00:09:13,440 --> 00:09:16,280 [narrator] The CIA's Office of Technical Service 140 00:09:16,360 --> 00:09:20,760 is one agency charged with creating spy technology. 141 00:09:20,840 --> 00:09:22,920 This is an office known as OTS. 142 00:09:23,000 --> 00:09:29,400 It, in fact, is one of the oldest and most respected of the CIA offices. 143 00:09:29,480 --> 00:09:32,760 It was originally formed in 1951. 144 00:09:33,640 --> 00:09:38,200 OTS does all of the cool spy gadgets, 145 00:09:38,280 --> 00:09:41,040 the disguises, the special weapons, 146 00:09:41,120 --> 00:09:43,080 the covert communications gear, 147 00:09:43,160 --> 00:09:44,760 all of those kinds of things 148 00:09:44,840 --> 00:09:49,400 that people who are familiar with the James Bond movies 149 00:09:49,480 --> 00:09:50,640 would attribute to Q. 150 00:09:50,720 --> 00:09:52,720 [atmospheric music playing] 151 00:09:58,880 --> 00:10:01,880 The people who worked for me were Q. 152 00:10:01,960 --> 00:10:06,440 The engineers and the scientists, the technicians, the craftsmen. 153 00:10:06,520 --> 00:10:13,080 All of those people did remarkable things during the history of OTS 154 00:10:13,160 --> 00:10:15,760 and continue to do them today. 155 00:10:15,840 --> 00:10:21,520 We used a lot of what we called SRAC, short-range agent communications, 156 00:10:21,600 --> 00:10:26,960 which was a device that was built, 157 00:10:27,040 --> 00:10:29,800 usually disguised to look like something else, 158 00:10:29,880 --> 00:10:34,640 that provided an agent a way to send a burst message. 159 00:10:34,720 --> 00:10:37,320 Usually, you take your message or write it out, 160 00:10:37,400 --> 00:10:41,600 you put it into a certain kind of format, etcetera. 161 00:10:41,680 --> 00:10:45,600 And then you, at a certain time and place, you press a button 162 00:10:45,680 --> 00:10:48,000 and it sends out what's called a burst transmission, 163 00:10:48,080 --> 00:10:51,760 which is just a "clip," very, very quick, uh… 164 00:10:52,360 --> 00:10:57,040 uh, well, almost what we would call today a zipped-up message. 165 00:10:57,120 --> 00:10:59,360 And then it's received, ideally, 166 00:10:59,440 --> 00:11:02,880 by somebody who's authorized to receive it, 167 00:11:02,960 --> 00:11:04,920 uh, usually fairly close. 168 00:11:05,600 --> 00:11:10,600 Because what you're trying to prevent is from somebody capturing the signal 169 00:11:10,680 --> 00:11:12,160 and then triangulating it. 170 00:11:12,760 --> 00:11:15,960 [narrator] SRAC was a favorite method of covert communication 171 00:11:16,040 --> 00:11:18,240 for many high-profile spies, 172 00:11:18,320 --> 00:11:25,120 including double agent and GRU officer Dmitri Polyakov, code named TOPHAT. 173 00:11:25,200 --> 00:11:27,920 Polyakov was a Soviet major general 174 00:11:28,000 --> 00:11:30,120 and one of the Cold War's greatest spies. 175 00:11:30,200 --> 00:11:35,120 He revealed Soviet secrets to the FBI and the Central Intelligence Agency. 176 00:11:36,040 --> 00:11:39,040 So a case like the Polyakov case, 177 00:11:39,120 --> 00:11:45,360 an important case of that magnitude that lasts for many years, 178 00:11:45,440 --> 00:11:48,280 is going to involve a number of case officers. 179 00:11:48,360 --> 00:11:52,040 You don't want to use the same case officer who appears time and again. 180 00:11:52,120 --> 00:11:55,760 He had probably half a dozen handlers. 181 00:11:55,840 --> 00:12:01,400 [narrator] Skotzko, along with CIA officer and Polyakov handler Sandy Grimes, 182 00:12:01,480 --> 00:12:05,400 watched as Polyakov rose in the ranks of the Soviet GRU. 183 00:12:06,160 --> 00:12:10,080 The day that cable came in from Delhi… 184 00:12:11,120 --> 00:12:14,360 uh, saying that he had just become a general, 185 00:12:14,960 --> 00:12:16,080 it was Christmas. 186 00:12:16,840 --> 00:12:19,480 It was Christmas for him and it was Christmas for us. 187 00:12:21,080 --> 00:12:24,800 His access improved tremendously, 188 00:12:25,480 --> 00:12:29,680 not only because he was a general, he had the rank of general, 189 00:12:29,760 --> 00:12:31,800 but that afforded him access 190 00:12:32,400 --> 00:12:34,080 to all the rest of the generals, 191 00:12:34,160 --> 00:12:37,400 that small group in the GRU. 192 00:12:38,280 --> 00:12:39,320 Uh… 193 00:12:40,400 --> 00:12:45,480 And therefore, based on his rank, based on his position, 194 00:12:45,560 --> 00:12:48,240 uh, it really became a goldmine for us. 195 00:12:52,520 --> 00:12:54,720 [narrator] Polyakov was able to get his hands 196 00:12:54,800 --> 00:12:59,600 on some of the Soviet's top-secret documents on nuclear capabilities 197 00:12:59,680 --> 00:13:02,080 and their chemical and biological objectives. 198 00:13:05,000 --> 00:13:07,000 His handlers had the responsibility 199 00:13:07,080 --> 00:13:11,840 of making sure Polyakov was armed with the best communication devices. 200 00:13:14,160 --> 00:13:17,880 We used a radio… record player 201 00:13:17,960 --> 00:13:21,000 as a concealment device with Polyakov once. 202 00:13:21,080 --> 00:13:22,440 A fishing pole… 203 00:13:24,040 --> 00:13:28,480 And the handle of it, I think, it was cork, 204 00:13:28,560 --> 00:13:31,880 and it had been-- there was a hollowed-out little thing 205 00:13:32,680 --> 00:13:34,680 so he could put his SW in here. 206 00:13:34,760 --> 00:13:38,760 [narrator] Polyakov's shortwave radio could be hidden inside the fishing pole. 207 00:13:39,320 --> 00:13:41,040 And the whole thing falls apart. 208 00:13:41,560 --> 00:13:47,280 I mean, it just crumbled. He was a very, very unhappy camper. 209 00:13:48,320 --> 00:13:50,000 So we start all over again. 210 00:13:52,560 --> 00:13:56,720 [narrator] The OTS managed to correct the design and make it work. 211 00:13:56,800 --> 00:13:59,760 The fishing pole was basically an antenna wire 212 00:13:59,840 --> 00:14:01,960 that could pick up covert signals. 213 00:14:06,480 --> 00:14:08,280 [Melton] And when he sticks it in the water, 214 00:14:08,360 --> 00:14:10,880 he's simply picking up another acoustic signal 215 00:14:10,960 --> 00:14:13,320 from somebody a quarter of a mile upstream 216 00:14:13,400 --> 00:14:14,640 who's sending a signal, 217 00:14:14,720 --> 00:14:16,840 and they're both talking or humming, 218 00:14:16,920 --> 00:14:18,680 and they're having a communication 219 00:14:18,760 --> 00:14:22,280 and talking over a signal underwater. 220 00:14:22,880 --> 00:14:26,840 What's the chances of that being caught? It's very, very slim. 221 00:14:27,720 --> 00:14:32,280 But the best one without fail was called "Unique." 222 00:14:32,360 --> 00:14:36,280 And OTS called it "Buster." 223 00:14:37,280 --> 00:14:41,560 And it was developed specifically for Polyakov. 224 00:14:42,840 --> 00:14:45,600 And what Polyakov could do with this little unit, 225 00:14:47,160 --> 00:14:51,640 it had a keyboard and Cyrillic on it and he would type in his messages. 226 00:14:51,720 --> 00:14:54,120 It went into the guts of this thing. 227 00:15:00,360 --> 00:15:02,240 He would just push a little button 228 00:15:02,320 --> 00:15:04,560 and it would transmit it, burst transmission, 229 00:15:04,640 --> 00:15:06,120 2.4 seconds or something. 230 00:15:07,560 --> 00:15:11,880 And the base station would respond to it, and… 231 00:15:13,760 --> 00:15:18,200 uh, Polyakov was thrilled with it, and he said, 232 00:15:18,280 --> 00:15:22,400 "Finally the boys at the center got this right. 233 00:15:23,040 --> 00:15:25,040 You can tell them it was good work." 234 00:15:25,120 --> 00:15:27,000 Yeah, and it was revolutionary. 235 00:15:27,640 --> 00:15:32,960 [narrator] By the late 1980s and over 25 years of service to the CIA, 236 00:15:33,040 --> 00:15:37,600 Polyakov begins to suspect he's under surveillance by the KGB. 237 00:15:45,280 --> 00:15:47,600 [Skotzko] In a final meeting with him… 238 00:15:49,200 --> 00:15:54,200 it was held in his apartment in the Soviet Embassy compound. 239 00:15:55,520 --> 00:15:57,800 That was his idea, certainly not mine. 240 00:15:58,400 --> 00:16:02,680 It was probably the most scared I ever was in my 40-year career. 241 00:16:03,440 --> 00:16:10,160 But we got in, and I was surprised to see all of his possessions had been packaged 242 00:16:10,240 --> 00:16:14,360 and stacked in a pyramid in the middle of the living room floor. 243 00:16:14,440 --> 00:16:16,760 And I said, "What's going on?" 244 00:16:16,840 --> 00:16:19,920 And he says, "Yeah, but who knows what might happen?" 245 00:16:20,560 --> 00:16:22,480 At which point I began to worry 246 00:16:22,560 --> 00:16:26,000 that maybe he was worried that he was under suspicion. 247 00:16:26,520 --> 00:16:28,120 And I said to him… 248 00:16:29,920 --> 00:16:32,080 "If you have any doubts about your security, 249 00:16:34,080 --> 00:16:37,720 we more than owe you the opportunity 250 00:16:37,800 --> 00:16:40,520 to get you out of here and get you to our country." 251 00:16:42,360 --> 00:16:45,040 And it was the one time I saw him actually flare up 252 00:16:45,960 --> 00:16:48,160 and lose his temper, just a little bit. 253 00:16:50,120 --> 00:16:53,320 He said, "I am not doing this for your country. 254 00:16:53,400 --> 00:16:57,080 I'm doing this for the Russian people because of what those bastards 255 00:16:57,160 --> 00:17:01,560 in the Communist Party have done to my country over the last 60 years." 256 00:17:02,560 --> 00:17:08,280 And that was the first in-depth look into what his motivation was. 257 00:17:09,360 --> 00:17:11,280 It was a very revealing moment. 258 00:17:12,040 --> 00:17:14,600 [narrator] Polyakov's intuition is correct. 259 00:17:15,160 --> 00:17:17,280 While he's been working for the CIA, 260 00:17:17,360 --> 00:17:21,080 FBI mole Robert Hanssen was working for the Russians 261 00:17:21,160 --> 00:17:23,240 and gave the GRU intelligence 262 00:17:23,320 --> 00:17:26,960 about a possible FBI source named Polyakov. 263 00:17:29,480 --> 00:17:33,120 Hanssen helped put the final nail in his coffin. 264 00:17:33,200 --> 00:17:38,520 Polyakov was immediately apprehended, searched and interrogated by the GRU. 265 00:17:45,640 --> 00:17:48,760 [Skotzko] And he then proceeded to make a full confession, 266 00:17:48,840 --> 00:17:51,120 and off he went into prison 267 00:17:51,200 --> 00:17:56,320 and was visited once or twice by his family 268 00:17:57,040 --> 00:17:58,680 and then dropped out of sight. 269 00:17:58,760 --> 00:18:00,320 He was executed in '88. 270 00:18:00,400 --> 00:18:03,080 [narrator] Polyakov is said to have been credited 271 00:18:03,160 --> 00:18:06,000 with keeping the Cold War from boiling over 272 00:18:06,080 --> 00:18:10,120 by giving the United States secrets that gave it an inside view 273 00:18:10,200 --> 00:18:13,000 of Soviet priorities and weapon capabilities. 274 00:18:13,560 --> 00:18:19,080 Polyakov's success relied on various spy gadgets for covert communication, 275 00:18:19,160 --> 00:18:23,720 and like the fishing pole, they are often concealed inside everyday items. 276 00:18:25,840 --> 00:18:28,160 [tense music playing] 277 00:18:33,840 --> 00:18:36,160 [Murray] So we tried to make our communications 278 00:18:36,240 --> 00:18:38,040 either look like something else 279 00:18:38,120 --> 00:18:42,520 or at least put them within some other kind of device 280 00:18:42,600 --> 00:18:46,760 and make them as undetectable as possible. 281 00:18:47,560 --> 00:18:49,160 And that's cov-com. 282 00:18:49,240 --> 00:18:52,800 And it was constantly evolving, constantly being worked on. 283 00:18:58,320 --> 00:19:03,040 [Gerald B. Richards] But today, short-range might be using Wi-Fi, 284 00:19:03,120 --> 00:19:06,520 uh, might be using Bluetooth, 285 00:19:06,600 --> 00:19:09,800 uh, computers, on the Internet, 286 00:19:09,880 --> 00:19:12,920 from one very short spot to another. 287 00:19:13,000 --> 00:19:15,360 Maybe two computers sitting next to each other 288 00:19:15,440 --> 00:19:21,640 to transfer that information, but basically that would be used today. 289 00:19:22,520 --> 00:19:26,800 [narrator] In the real-life version of the hit television series The Americans, 290 00:19:26,880 --> 00:19:28,640 ten Russian sleeper agents, 291 00:19:28,720 --> 00:19:32,320 who had been participating in deep-cover, long-term assignments, 292 00:19:32,400 --> 00:19:36,840 were arrested in Operation Ghost Stories in the United States. 293 00:19:37,640 --> 00:19:40,800 It is a clear reminder for people in the intelligence world 294 00:19:40,880 --> 00:19:44,800 that Russian spies are still actively working on US soil. 295 00:19:44,880 --> 00:19:46,960 [Melton] "Ghost Stories" is the code name 296 00:19:47,040 --> 00:19:50,680 for one of the longest-running counterintelligence operations 297 00:19:50,760 --> 00:19:53,920 in the United States following World War II. 298 00:19:54,480 --> 00:19:58,040 It began at least… 299 00:19:58,640 --> 00:20:02,080 probably the year 2000, probably much before. 300 00:20:02,160 --> 00:20:07,320 And ultimately it tracked ten Russian illegals 301 00:20:08,000 --> 00:20:11,320 that were in the United States under false identity. 302 00:20:11,400 --> 00:20:14,480 They were SVR intelligence officers 303 00:20:14,560 --> 00:20:18,360 and were living lives as ordinary Americans. 304 00:20:18,440 --> 00:20:21,800 And they were literally the spies next door. 305 00:20:25,400 --> 00:20:28,200 [narrator] Many of the Russian SVR "illegals" 306 00:20:28,280 --> 00:20:32,320 established themselves in the US using stolen identities 307 00:20:32,400 --> 00:20:34,120 and leading normal lives, 308 00:20:34,200 --> 00:20:36,640 getting married, buying homes, 309 00:20:36,720 --> 00:20:40,720 raising children and assimilating into American society. 310 00:20:41,240 --> 00:20:42,920 They were in it for the long haul 311 00:20:43,000 --> 00:20:47,720 to develop sources of information in US policymaking circles. 312 00:20:49,080 --> 00:20:54,040 To report back to Russia, they used various covert communication systems. 313 00:20:56,800 --> 00:20:58,720 The Ghost Stories team used 314 00:20:58,800 --> 00:21:02,560 virtually every means 315 00:21:02,640 --> 00:21:05,560 of covert communication available to them at the time, 316 00:21:05,640 --> 00:21:08,160 including secret writing, secret ink. 317 00:21:08,680 --> 00:21:12,720 They received coded one-way voice messages coming over 318 00:21:12,800 --> 00:21:15,080 just regular radio frequencies. 319 00:21:16,280 --> 00:21:19,200 One of the most interesting were the systems that were used 320 00:21:19,280 --> 00:21:24,760 by one of the Russian 10 by the name of Anna Chapman in 2010. 321 00:21:25,280 --> 00:21:30,240 And the SVR developed a system for her 322 00:21:30,320 --> 00:21:32,120 that used her regular laptop. 323 00:21:32,760 --> 00:21:36,000 And she would go to a Starbucks or a coffee shop, 324 00:21:36,080 --> 00:21:37,400 sit next to the window, 325 00:21:37,480 --> 00:21:43,080 and she would activate an ad hoc wireless network 326 00:21:43,160 --> 00:21:47,360 that was built into the Windows operating system of her computer. 327 00:21:47,440 --> 00:21:52,400 And what this did, it was a system that Microsoft envisioned years ago. 328 00:21:52,920 --> 00:21:55,640 Say you had two members in the same household 329 00:21:55,720 --> 00:21:58,480 that wanted to play a game from different rooms. 330 00:21:58,560 --> 00:22:00,680 They didn't need to go on the Internet. 331 00:22:00,760 --> 00:22:02,680 This was actually before the Internet. 332 00:22:02,760 --> 00:22:05,600 But they could simply use the wireless feature 333 00:22:05,680 --> 00:22:09,680 and create their own intranet between the two of them, 334 00:22:09,760 --> 00:22:12,000 but it would never go over the Internet. 335 00:22:12,080 --> 00:22:14,640 And so Anna activated that. 336 00:22:14,720 --> 00:22:19,200 Her contact would be parked in a car 50 yards across the way, 337 00:22:19,280 --> 00:22:21,720 have no personal contact with her. 338 00:22:21,800 --> 00:22:25,320 She could simply open her computer, activate the file. 339 00:22:25,400 --> 00:22:30,240 It would wirelessly sync with a car 50 yards away. 340 00:22:30,320 --> 00:22:34,040 Any folder she drug onto the folder with a link 341 00:22:34,120 --> 00:22:36,200 would automatically be encrypted 342 00:22:36,280 --> 00:22:39,560 and sent on this encrypted tunnel to the car 50 yards away. 343 00:22:40,160 --> 00:22:43,560 And virtually impossible to detect. 344 00:22:43,640 --> 00:22:46,640 And even if it was detected, it was encrypted. 345 00:22:47,240 --> 00:22:52,440 One of the great ironies of it is that Anna was a bit of a bumbling agent. 346 00:22:53,080 --> 00:22:58,080 [narrator] In this FBI-sourced footage, Chapman is seen inside a department store 347 00:22:58,160 --> 00:23:02,920 using a hidden computer to send encrypted messages to a Russian spy. 348 00:23:04,040 --> 00:23:07,440 [Melton] It's strange to see pictures of a Russian spy standing 349 00:23:07,520 --> 00:23:08,720 and holding her laptop up, 350 00:23:08,800 --> 00:23:13,200 making sure that she's making communications with a car 50 yards away. 351 00:23:14,040 --> 00:23:19,000 The weakness is often not the technology but the agent. 352 00:23:22,760 --> 00:23:24,560 [narrator] Chapman met a man named Roman, 353 00:23:24,640 --> 00:23:28,160 who she believed was a Russian officer, at a local Starbucks 354 00:23:28,240 --> 00:23:32,280 and tells him about the technical issues she was having with her computer. 355 00:23:33,920 --> 00:23:37,280 [Melton] And Roman very alertly says, 356 00:23:37,360 --> 00:23:41,200 "Oh, well, if you think there's a problem with the computer, 357 00:23:41,880 --> 00:23:44,520 why don't you let me have some of my friends at the station 358 00:23:44,600 --> 00:23:46,760 take a look at it? They're very, very good at that." 359 00:23:47,360 --> 00:23:50,920 And Anna says, "That would be wonderful," 360 00:23:51,520 --> 00:23:55,160 thinking she's just relieved herself of this computer. 361 00:23:55,240 --> 00:24:01,040 And so she gives the FBI undercover officer 362 00:24:01,120 --> 00:24:02,760 her computer to be checked. 363 00:24:03,320 --> 00:24:06,280 He in turn says, "Anna, I need you to do something…" 364 00:24:06,880 --> 00:24:10,240 [narrator] He asks her to deliver a passport to another agent 365 00:24:10,320 --> 00:24:13,560 and to leave a sign that the mission had been completed. 366 00:24:14,240 --> 00:24:19,400 She not only handed over the computer but agreed to deliver the passport. 367 00:24:22,720 --> 00:24:26,400 But by committing to conspiratorial behavior 368 00:24:26,480 --> 00:24:29,200 and accepting the passport and doing this, 369 00:24:29,280 --> 00:24:32,600 they now would be able to charge her with an offense. 370 00:24:33,160 --> 00:24:37,600 On the 26th of June, in one massive operation 371 00:24:37,680 --> 00:24:41,000 that probably involved more than 600 agents on the east coast, 372 00:24:41,080 --> 00:24:43,520 all the arrests were affected at the same time. 373 00:24:43,600 --> 00:24:46,880 [narrator] It's reported that if Anna hadn't been arrested, 374 00:24:46,960 --> 00:24:50,760 she could have been one of the most dangerous spies in America. 375 00:24:51,840 --> 00:24:54,160 [Melton] And the reason was her access. 376 00:24:54,840 --> 00:24:59,080 She could get past any door and any secretary. 377 00:24:59,160 --> 00:25:02,240 And men were always willing to give her time and an interview. 378 00:25:02,840 --> 00:25:07,320 And she had developed a pattern and a pitch for her business. 379 00:25:07,920 --> 00:25:09,720 It was basically a recruitment. 380 00:25:09,800 --> 00:25:13,080 She was trying to make friends and work her way up the social ladder. 381 00:25:14,760 --> 00:25:16,920 [narrator] Communicating secretly with an asset 382 00:25:17,000 --> 00:25:19,720 and having the ability to exchange intelligence 383 00:25:19,800 --> 00:25:23,320 is vital to the success of an espionage operation. 384 00:25:23,400 --> 00:25:27,200 Secret writings is one method of communicating covertly 385 00:25:27,280 --> 00:25:30,360 and has been used from ancient times to modern day. 386 00:25:30,440 --> 00:25:31,960 [Parrack] During the Revolutionary War, 387 00:25:32,040 --> 00:25:36,160 George Washington a… a spy network called the Culper Ring, 388 00:25:36,240 --> 00:25:39,640 they would send messages to each other, sometimes in secret writing, 389 00:25:39,720 --> 00:25:41,240 sometimes in open letters. 390 00:25:41,320 --> 00:25:45,400 They'd say, "47 is going to meet 16 at 32." 391 00:25:46,840 --> 00:25:50,320 [Wallace] And the Culper Ring agents 392 00:25:50,400 --> 00:25:51,800 would pick up those letters 393 00:25:51,880 --> 00:25:55,400 and then deliver them to Washington headquarters. 394 00:25:55,480 --> 00:25:58,920 So, it was just a matter of secret writing, 395 00:25:59,000 --> 00:26:00,960 uh, information. 396 00:26:01,040 --> 00:26:03,720 Information that was, quote, it was "buried" 397 00:26:03,800 --> 00:26:07,640 in what was otherwise innocuous communication. 398 00:26:12,720 --> 00:26:15,280 You get a similar technique 399 00:26:15,360 --> 00:26:20,800 with what is called steganography in digital information. 400 00:26:20,880 --> 00:26:24,320 So people have devised ways 401 00:26:24,400 --> 00:26:30,080 of adding data to images, or to spreadsheets, 402 00:26:30,160 --> 00:26:34,240 or to other documents, that are digital, 403 00:26:34,320 --> 00:26:38,480 that is hidden and unknown. 404 00:26:41,280 --> 00:26:46,360 [Melton] If you ask how many images are sent over the Web each day, 405 00:26:46,440 --> 00:26:50,120 no one has any idea in the world because it's… 406 00:26:50,640 --> 00:26:53,120 billions of images are transmitted. 407 00:26:53,840 --> 00:26:58,000 So if a spy stealing information 408 00:26:58,080 --> 00:27:01,160 can encipher it first, 409 00:27:02,040 --> 00:27:05,320 put it in a digital form, conceal it in an image, 410 00:27:05,400 --> 00:27:07,080 conceal it in a music track, 411 00:27:07,160 --> 00:27:11,320 conceal it in a Word document, and transmit it, 412 00:27:11,400 --> 00:27:15,000 if he can use a channel, or post it to a website 413 00:27:15,080 --> 00:27:18,040 that's not under analysis 414 00:27:18,120 --> 00:27:21,080 or it's not under observation by an intelligence service, 415 00:27:21,160 --> 00:27:25,680 it's very, very likely that it would never be scrutinized. 416 00:27:25,760 --> 00:27:29,200 It would never be examined and would thereby be effective. 417 00:27:31,920 --> 00:27:34,400 [narrator] The ability to conceal and hide secrets 418 00:27:34,480 --> 00:27:37,800 is an art form within the intelligence community. 419 00:27:42,720 --> 00:27:47,720 The first actual micro photography was done in the mid-1800s 420 00:27:47,800 --> 00:27:52,560 and actually by 1900 it became a art form almost, 421 00:27:52,640 --> 00:27:54,920 because one of the challenges used to be is, 422 00:27:55,000 --> 00:27:58,720 how you can put on one inch of film the entire Bible. 423 00:28:07,520 --> 00:28:10,560 So this was really, really micro photography, 424 00:28:11,440 --> 00:28:15,040 but during World War II, the Germans decided 425 00:28:15,120 --> 00:28:17,520 to use this as a communication device. 426 00:28:18,120 --> 00:28:20,880 And basically what they would do is take instructions 427 00:28:20,960 --> 00:28:25,800 and bring it down to the size of a dot, a period at the end of a sentence, 428 00:28:25,880 --> 00:28:27,320 and send it to the asset. 429 00:28:29,160 --> 00:28:32,160 [narrator] Modern technology has taken microdots 430 00:28:32,240 --> 00:28:34,920 and steganography even further, 431 00:28:35,000 --> 00:28:38,720 with the development of a new technique for conducting espionage 432 00:28:38,800 --> 00:28:43,920 on a molecular level, hiding covert messages in human DNA. 433 00:28:44,000 --> 00:28:50,120 It's possible today to take and modify a strand of DNA 434 00:28:50,680 --> 00:28:53,160 and have it contain a message. 435 00:28:53,920 --> 00:28:56,600 [narrator] Using this technique, a sender would create 436 00:28:56,680 --> 00:29:01,480 a unique strand of DNA that only an intended recipient can isolate 437 00:29:01,560 --> 00:29:04,320 and read from millions of similar strands. 438 00:29:04,400 --> 00:29:06,200 [Melton] You could have it contain a password. 439 00:29:06,280 --> 00:29:10,800 You could produce it and generate multiple copies of it. 440 00:29:10,880 --> 00:29:13,040 The technology exists to do it. 441 00:29:17,000 --> 00:29:21,280 [narrator] Today, the variety of channels in which you can send a covert message 442 00:29:21,360 --> 00:29:26,320 has exploded, especially with the growth of social media applications. 443 00:29:26,400 --> 00:29:29,080 [lively electronic beat plays] 444 00:29:31,960 --> 00:29:35,440 [Melton] On your phone you have multiple apps available 445 00:29:35,520 --> 00:29:37,920 for point-to-point encryption. 446 00:29:38,640 --> 00:29:43,560 You have WhatsApp, you have Telegram, you have a variety of systems. 447 00:29:43,640 --> 00:29:45,680 Every one of them is encrypted. 448 00:29:45,760 --> 00:29:50,440 The government has enormous difficulty and in some instances 449 00:29:50,520 --> 00:29:53,400 cannot break this encryption. 450 00:29:53,480 --> 00:29:57,080 But there's other ways that are complex and baffling. 451 00:29:57,680 --> 00:30:01,080 [narrator] Digital applications make it easier to send messages 452 00:30:01,160 --> 00:30:06,000 and also allow spies to communicate secretly on otherwise benign platforms, 453 00:30:06,080 --> 00:30:07,600 such as digital gaming. 454 00:30:07,680 --> 00:30:10,560 [Melton] The Tom Clancy's Rainbow Six, 455 00:30:11,280 --> 00:30:14,320 Halo, Fortnite, Minecraft, 456 00:30:14,400 --> 00:30:19,760 where members are cooperating and communicating as part of teams. 457 00:30:19,840 --> 00:30:23,800 Well, the same channel can be used for covert communication. 458 00:30:26,720 --> 00:30:29,600 [narrator] Another workaround for cov-com via the Internet 459 00:30:29,680 --> 00:30:33,240 is something called Tor, short for The Onion Router, 460 00:30:33,320 --> 00:30:35,440 a gateway to the Dark Web. 461 00:30:37,960 --> 00:30:40,720 Two thirds of the Internet is on what they call a Dark Web. 462 00:30:40,800 --> 00:30:45,600 It's used by drug dealers. It's used by hackers. 463 00:30:45,680 --> 00:30:48,880 That's where they buy the tools, buy and trade the tools 464 00:30:48,960 --> 00:30:51,480 that they use to get into other people's computers. 465 00:30:54,720 --> 00:30:57,680 It's used for all kinds of nefarious purposes. 466 00:30:57,760 --> 00:31:01,080 Uh, Tor is just the way you get into it. 467 00:31:02,520 --> 00:31:07,200 [narrator] It's a tool that's also been used by terror networks around the world. 468 00:31:07,280 --> 00:31:08,840 -[shouting] -[gunfire] 469 00:31:08,920 --> 00:31:12,000 ISIS communicated via Tor and social media 470 00:31:12,080 --> 00:31:17,320 in the Paris attacks of 2016 by using telegram-like apps 471 00:31:17,400 --> 00:31:21,120 which securely communicated their messages to the other group members, 472 00:31:21,200 --> 00:31:24,520 allowing them to coordinate the attacks secretly. 473 00:31:25,120 --> 00:31:29,240 Intelligence operatives are constantly having to adapt their strategies 474 00:31:29,320 --> 00:31:31,760 to meet the latest changes in technology. 475 00:31:31,840 --> 00:31:34,280 [Melton] If you're a counterintelligence service, 476 00:31:34,360 --> 00:31:37,080 where do you know where to look at? Where do you start? 477 00:31:37,160 --> 00:31:41,000 In many ways, the odds are with the agent. 478 00:31:41,080 --> 00:31:43,280 And, as the Russians believe, 479 00:31:43,360 --> 00:31:45,960 if you follow your tradecraft, 480 00:31:46,040 --> 00:31:50,600 you'll never ever be caught, and most often that's true. 481 00:31:51,520 --> 00:31:56,920 [Richards] Well, the future of clandestine is all digital. 482 00:31:57,000 --> 00:32:01,040 Some of these encryptions are virtually impossible to break 483 00:32:01,120 --> 00:32:04,280 and therefore the… to catch the spies… 484 00:32:04,360 --> 00:32:06,160 uh, is going to be much, much difficult, 485 00:32:06,240 --> 00:32:10,240 but also for them to catch us spying is going to be much, much more difficult, 486 00:32:10,320 --> 00:32:13,440 but yes, it's a digital world today. 487 00:32:13,520 --> 00:32:18,160 If you think about clandestine operations as being a body, 488 00:32:18,240 --> 00:32:24,080 it is the heart of covert communications that really makes the difference 489 00:32:24,160 --> 00:32:27,760 between whether or not you have a successful spy, 490 00:32:27,840 --> 00:32:31,160 whether or not you have a successful espionage operation. 491 00:32:31,240 --> 00:32:34,080 [atmospheric music playing] 43063

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.