Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:11,920 --> 00:00:13,160
[ominous music playing]
2
00:00:13,240 --> 00:00:16,920
[narrator] When intelligence agencies
deploy spies for espionage,
3
00:00:17,000 --> 00:00:20,600
they rely on covert communication,
or cov-com,
4
00:00:20,680 --> 00:00:23,600
to collect
and exchange secret information.
5
00:00:27,360 --> 00:00:29,640
[man] It's possible today
6
00:00:29,720 --> 00:00:33,440
to take and modify a strand of DNA
7
00:00:34,000 --> 00:00:36,480
and have it contain a message.
8
00:00:37,240 --> 00:00:41,760
We tried to make our communications
as undetectable as possible.
9
00:00:44,560 --> 00:00:47,960
In micro photography…
take instructions and bring it down
10
00:00:48,040 --> 00:00:50,880
to the size… a period
at the end of a sentence.
11
00:00:50,960 --> 00:00:53,600
[narrator] Every agent requires
their own cov-com
12
00:00:53,680 --> 00:00:55,880
to fit their unique circumstance.
13
00:00:56,520 --> 00:00:59,160
He would just push a button
and it would transmit it,
14
00:00:59,240 --> 00:01:03,080
and the base station would respond to it.
15
00:01:03,760 --> 00:01:07,160
[man] One of the main focuses
of intelligence services
16
00:01:07,240 --> 00:01:09,600
is to provide technology
17
00:01:09,680 --> 00:01:12,560
that helps spies capture the information
18
00:01:12,640 --> 00:01:19,120
and then find ways to pass it
without bringing danger to the spy.
19
00:01:19,200 --> 00:01:22,560
It is the heart of covert communications
20
00:01:22,640 --> 00:01:26,840
that really makes
a successful espionage operation.
21
00:01:26,920 --> 00:01:29,480
[theme music playing]
22
00:01:56,200 --> 00:01:59,480
[atmospheric music plays]
23
00:02:00,800 --> 00:02:04,040
[narrator] The ability for spies
to operate successfully
24
00:02:04,120 --> 00:02:06,960
depends largely
on the use of covert systems
25
00:02:07,040 --> 00:02:09,080
to communicate with their handlers
26
00:02:09,160 --> 00:02:11,560
that are secure from interception
by the enemy:
27
00:02:12,120 --> 00:02:13,200
dead drops,
28
00:02:13,280 --> 00:02:14,960
digital steganography,
29
00:02:15,040 --> 00:02:16,640
concealment devices
30
00:02:16,720 --> 00:02:20,720
and the seemingly endless capabilities
of the World Wide Web.
31
00:02:23,600 --> 00:02:26,800
Covert communications, or cov-com,
32
00:02:27,320 --> 00:02:31,080
is the essential ingredient in espionage.
33
00:02:31,800 --> 00:02:35,840
You have spies who steal secrets,
you have handlers who manage them
34
00:02:35,920 --> 00:02:39,760
and need to get the secrets
so they can pass them back to be analyzed.
35
00:02:39,840 --> 00:02:44,640
But the link between them
is how they do it covertly
36
00:02:44,720 --> 00:02:47,280
and secretly and without getting caught.
37
00:02:47,360 --> 00:02:49,240
[narrator]
One of the most reliable methods
38
00:02:49,320 --> 00:02:52,720
for transferring secret information
are face-to-face meetings
39
00:02:52,800 --> 00:02:55,600
between an agent
and an intelligence officer.
40
00:02:55,680 --> 00:02:58,120
The exchange of materials is guaranteed
41
00:02:58,200 --> 00:03:01,240
and conversations
can address urgent issues.
42
00:03:05,400 --> 00:03:07,520
[man]
…reticent to let you have it
43
00:03:07,600 --> 00:03:10,160
because it's all classified
44
00:03:10,240 --> 00:03:11,280
and…
45
00:03:11,360 --> 00:03:14,160
But I will let you see it,
46
00:03:14,720 --> 00:03:17,160
and you can take all the notes you want.
47
00:03:17,840 --> 00:03:19,760
Uh, which I think you can do today,
48
00:03:20,280 --> 00:03:21,760
but I…
49
00:03:22,920 --> 00:03:26,600
If it ever fell into the wrong hands,
and I know it's not going to, but…
50
00:03:27,400 --> 00:03:29,760
[narrator] FBI cameras
concealed in the car
51
00:03:29,840 --> 00:03:35,840
recorded Pentagon analyst Gregg Bergersen
and Tai Shen Kuo, a spy for China,
52
00:03:35,920 --> 00:03:38,720
discussing the handover
of secret documents
53
00:03:38,800 --> 00:03:41,640
that list future weapons sales to Taiwan.
54
00:03:42,240 --> 00:03:45,920
In this case, the face-to-face meeting
didn't go so well.
55
00:03:46,000 --> 00:03:48,680
The recording of their meeting
served as evidence.
56
00:03:48,760 --> 00:03:52,680
The men were sentenced
to 15 years in jail for espionage.
57
00:03:53,600 --> 00:03:57,680
If you can't ensure that you are free
from surveillance going into a meeting,
58
00:03:57,760 --> 00:04:01,640
you could potentially jeopardize
that asset that you're meeting.
59
00:04:02,240 --> 00:04:04,720
And the gap is, at best, a few seconds.
60
00:04:05,360 --> 00:04:09,960
So you turn a corner,
or you drive down a blind alley somewhere.
61
00:04:10,040 --> 00:04:13,560
Uh, you only have that short--
very short, you know, just a few seconds
62
00:04:13,640 --> 00:04:17,560
before the person who's following you
at some distance makes that turn as well.
63
00:04:18,560 --> 00:04:20,600
[narrator]
Face-to-face meetings with an asset
64
00:04:20,680 --> 00:04:23,280
is one challenge
for intelligence operatives.
65
00:04:23,360 --> 00:04:26,160
Another is exchanging secret information
with an agent
66
00:04:26,240 --> 00:04:28,680
without having to meet directly.
67
00:04:28,760 --> 00:04:33,960
One technique used today that dates back
to World War II is the dead drop.
68
00:04:34,040 --> 00:04:37,640
[tense music playing]
69
00:04:37,720 --> 00:04:39,720
In a dead drop scenario,
70
00:04:40,720 --> 00:04:43,560
an agent and a case officer
71
00:04:44,280 --> 00:04:48,880
both have knowledge
of a particular location.
72
00:04:48,960 --> 00:04:55,520
And the parties know
that if they receive a signal,
73
00:04:55,600 --> 00:04:57,240
then there will be a package.
74
00:04:57,320 --> 00:05:01,680
There will be material left
at a certain location.
75
00:05:02,560 --> 00:05:06,160
And so, once that signal is received,
76
00:05:06,240 --> 00:05:12,160
the agent goes to the location
and retrieves the document.
77
00:05:12,240 --> 00:05:15,720
[narrator] Dead drop concealments
come in all shapes and sizes.
78
00:05:15,800 --> 00:05:18,960
It can be as simple
as a hollow brick that can hold money
79
00:05:19,040 --> 00:05:21,720
or a fake rock to conceal information.
80
00:05:21,800 --> 00:05:24,440
In one low-tech scenario, dead rats,
81
00:05:24,520 --> 00:05:28,480
with hidden messages inside them,
have even been used at dead drops.
82
00:05:29,040 --> 00:05:32,040
He has a dead drop device
that you can put on the ground
83
00:05:32,120 --> 00:05:37,120
that nobody else in that city is going
to want to pick up, except your agent.
84
00:05:37,960 --> 00:05:40,960
And so at one point in time,
85
00:05:41,040 --> 00:05:46,600
we were making dead animal
dead drop devices for use in denied areas.
86
00:05:46,680 --> 00:05:50,440
[narrator] The dead drop was the preferred
method of covert communication
87
00:05:50,520 --> 00:05:54,960
for Robert Hanssen, the former FBI agent
turned Russian spy.
88
00:05:55,040 --> 00:05:59,000
Hanssen was so clever because he blended
89
00:05:59,080 --> 00:06:02,440
the knowledge
of a counterintelligence officer
90
00:06:03,040 --> 00:06:05,440
with traditional tradecraft.
91
00:06:05,520 --> 00:06:08,400
He knew how to use dead drops
very effectively.
92
00:06:08,480 --> 00:06:13,000
He knew how to select them
and then he added digital components.
93
00:06:16,600 --> 00:06:21,320
[narrator] In 1988, Hanssen mailed a disk
to the KGB that appeared to be blank
94
00:06:21,400 --> 00:06:23,560
but contained a hidden message.
95
00:06:23,640 --> 00:06:26,360
By using a procedure
called 40-track mode,
96
00:06:26,440 --> 00:06:30,680
he had reformatted the disk to have
slightly less capacity than usual
97
00:06:30,760 --> 00:06:34,760
so that secret messages
could be concealed in its lost space.
98
00:06:36,120 --> 00:06:39,320
Hanssen later used
a Palm III handheld computer
99
00:06:39,400 --> 00:06:43,440
to communicate with
the KGB's successor, the SVR.
100
00:06:43,520 --> 00:06:45,960
[tense music playing]
101
00:06:47,280 --> 00:06:51,080
[Melton] And he proposed to the KGB,
or the SVR at the time, he said,
102
00:06:51,160 --> 00:06:54,120
"Just think, in the future
I could do everything
103
00:06:54,200 --> 00:06:59,360
and communicate to you wirelessly
without ever having to use the dead drop."
104
00:06:59,440 --> 00:07:04,280
And so an agent who combines
digital techniques
105
00:07:04,360 --> 00:07:06,080
with the classic old techniques
106
00:07:06,160 --> 00:07:09,280
is a nightmare
for a counterintelligence service.
107
00:07:10,280 --> 00:07:12,760
[narrator]
On the day Robert Hanssen was arrested,
108
00:07:12,840 --> 00:07:17,160
he was filling a dead drop
reportedly used more than 20 times,
109
00:07:17,240 --> 00:07:21,160
located under a bridge at Foxstone Park
in Vienna, Virginia.
110
00:07:21,240 --> 00:07:25,160
It was a package
with seven secret FBI documents
111
00:07:25,240 --> 00:07:29,520
and an encrypted letter to the SVR
on a computer disk,
112
00:07:29,600 --> 00:07:33,520
all wrapped in a black plastic trash bag
covered in his fingerprints.
113
00:07:34,440 --> 00:07:36,760
After leaving the package
under the bridge,
114
00:07:36,840 --> 00:07:40,760
he headed back to his car
to find the FBI waiting for him.
115
00:07:41,840 --> 00:07:44,880
Operating as a mole inside the FBI,
116
00:07:44,960 --> 00:07:48,640
Hanssen spied for the Soviet
and Russian intelligence services
117
00:07:48,720 --> 00:07:50,560
for 22 years.
118
00:07:51,280 --> 00:07:55,080
He received a life sentence
for his espionage activities
119
00:07:55,160 --> 00:07:56,840
against the United States.
120
00:07:57,880 --> 00:08:02,960
Although spies use dead drops like
Hanssen's for covert communication,
121
00:08:03,040 --> 00:08:05,720
today many are digital and wireless,
122
00:08:05,800 --> 00:08:09,560
just as Hanssen had predicted
back in the 1990s.
123
00:08:10,560 --> 00:08:13,120
You could have a digital dead drop
124
00:08:13,200 --> 00:08:17,880
concealed inside a hollow rock,
and that rock could be in a park,
125
00:08:17,960 --> 00:08:21,240
and as you go by
you have your cell phone
126
00:08:21,320 --> 00:08:25,520
and you hit "transmit"
and it, using Bluetooth,
127
00:08:25,600 --> 00:08:31,440
wirelessly transmits the information
from your phone 20 feet away to the rock.
128
00:08:31,520 --> 00:08:34,040
The rock in turn receives the information
129
00:08:34,120 --> 00:08:36,720
and then uploads
and sends you a confirmation,
130
00:08:36,800 --> 00:08:39,360
or it may send you instructions back.
131
00:08:39,440 --> 00:08:43,560
The next day, someone from the embassy
simply takes a walk with their dog
132
00:08:43,640 --> 00:08:46,920
and they go on another path
20 yards away.
133
00:08:47,000 --> 00:08:49,800
They have their hand in their pocket
and they use their cell phone
134
00:08:49,880 --> 00:08:52,880
and they download the data
that's concealed
135
00:08:52,960 --> 00:08:54,960
and they send you new tasking.
136
00:08:56,560 --> 00:09:00,200
One of the main focuses
of intelligence services
137
00:09:00,280 --> 00:09:07,000
is to provide technology that helps spies
capture the information more efficiently
138
00:09:07,080 --> 00:09:13,360
and then find ways to pass it
without bringing danger to the spy.
139
00:09:13,440 --> 00:09:16,280
[narrator] The CIA's
Office of Technical Service
140
00:09:16,360 --> 00:09:20,760
is one agency charged
with creating spy technology.
141
00:09:20,840 --> 00:09:22,920
This is an office known as OTS.
142
00:09:23,000 --> 00:09:29,400
It, in fact, is one of the oldest
and most respected of the CIA offices.
143
00:09:29,480 --> 00:09:32,760
It was originally formed in 1951.
144
00:09:33,640 --> 00:09:38,200
OTS does all of the cool spy gadgets,
145
00:09:38,280 --> 00:09:41,040
the disguises, the special weapons,
146
00:09:41,120 --> 00:09:43,080
the covert communications gear,
147
00:09:43,160 --> 00:09:44,760
all of those kinds of things
148
00:09:44,840 --> 00:09:49,400
that people who are familiar
with the James Bond movies
149
00:09:49,480 --> 00:09:50,640
would attribute to Q.
150
00:09:50,720 --> 00:09:52,720
[atmospheric music playing]
151
00:09:58,880 --> 00:10:01,880
The people who worked for me were Q.
152
00:10:01,960 --> 00:10:06,440
The engineers and the scientists,
the technicians, the craftsmen.
153
00:10:06,520 --> 00:10:13,080
All of those people did remarkable things
during the history of OTS
154
00:10:13,160 --> 00:10:15,760
and continue to do them today.
155
00:10:15,840 --> 00:10:21,520
We used a lot of what we called SRAC,
short-range agent communications,
156
00:10:21,600 --> 00:10:26,960
which was a device that was built,
157
00:10:27,040 --> 00:10:29,800
usually disguised to look
like something else,
158
00:10:29,880 --> 00:10:34,640
that provided an agent a way
to send a burst message.
159
00:10:34,720 --> 00:10:37,320
Usually, you take your message
or write it out,
160
00:10:37,400 --> 00:10:41,600
you put it into a certain kind
of format, etcetera.
161
00:10:41,680 --> 00:10:45,600
And then you, at a certain time and place,
you press a button
162
00:10:45,680 --> 00:10:48,000
and it sends out what's called
a burst transmission,
163
00:10:48,080 --> 00:10:51,760
which is just a "clip,"
very, very quick, uh…
164
00:10:52,360 --> 00:10:57,040
uh, well, almost what we would call today
a zipped-up message.
165
00:10:57,120 --> 00:10:59,360
And then it's received, ideally,
166
00:10:59,440 --> 00:11:02,880
by somebody
who's authorized to receive it,
167
00:11:02,960 --> 00:11:04,920
uh, usually fairly close.
168
00:11:05,600 --> 00:11:10,600
Because what you're trying to prevent
is from somebody capturing the signal
169
00:11:10,680 --> 00:11:12,160
and then triangulating it.
170
00:11:12,760 --> 00:11:15,960
[narrator] SRAC was a favorite method
of covert communication
171
00:11:16,040 --> 00:11:18,240
for many high-profile spies,
172
00:11:18,320 --> 00:11:25,120
including double agent and GRU officer
Dmitri Polyakov, code named TOPHAT.
173
00:11:25,200 --> 00:11:27,920
Polyakov was a Soviet major general
174
00:11:28,000 --> 00:11:30,120
and one of the Cold War's greatest spies.
175
00:11:30,200 --> 00:11:35,120
He revealed Soviet secrets to the FBI
and the Central Intelligence Agency.
176
00:11:36,040 --> 00:11:39,040
So a case like the Polyakov case,
177
00:11:39,120 --> 00:11:45,360
an important case of that magnitude
that lasts for many years,
178
00:11:45,440 --> 00:11:48,280
is going to involve a number
of case officers.
179
00:11:48,360 --> 00:11:52,040
You don't want to use the same
case officer who appears time and again.
180
00:11:52,120 --> 00:11:55,760
He had probably half a dozen handlers.
181
00:11:55,840 --> 00:12:01,400
[narrator] Skotzko, along with CIA officer
and Polyakov handler Sandy Grimes,
182
00:12:01,480 --> 00:12:05,400
watched as Polyakov rose in the ranks
of the Soviet GRU.
183
00:12:06,160 --> 00:12:10,080
The day that cable came in from Delhi…
184
00:12:11,120 --> 00:12:14,360
uh, saying that he had just
become a general,
185
00:12:14,960 --> 00:12:16,080
it was Christmas.
186
00:12:16,840 --> 00:12:19,480
It was Christmas for him
and it was Christmas for us.
187
00:12:21,080 --> 00:12:24,800
His access improved tremendously,
188
00:12:25,480 --> 00:12:29,680
not only because he was a general,
he had the rank of general,
189
00:12:29,760 --> 00:12:31,800
but that afforded him access
190
00:12:32,400 --> 00:12:34,080
to all the rest of the generals,
191
00:12:34,160 --> 00:12:37,400
that small group in the GRU.
192
00:12:38,280 --> 00:12:39,320
Uh…
193
00:12:40,400 --> 00:12:45,480
And therefore, based on his rank,
based on his position,
194
00:12:45,560 --> 00:12:48,240
uh, it really became a goldmine for us.
195
00:12:52,520 --> 00:12:54,720
[narrator] Polyakov was able
to get his hands
196
00:12:54,800 --> 00:12:59,600
on some of the Soviet's top-secret
documents on nuclear capabilities
197
00:12:59,680 --> 00:13:02,080
and their chemical
and biological objectives.
198
00:13:05,000 --> 00:13:07,000
His handlers had the responsibility
199
00:13:07,080 --> 00:13:11,840
of making sure Polyakov was armed
with the best communication devices.
200
00:13:14,160 --> 00:13:17,880
We used a radio… record player
201
00:13:17,960 --> 00:13:21,000
as a concealment device
with Polyakov once.
202
00:13:21,080 --> 00:13:22,440
A fishing pole…
203
00:13:24,040 --> 00:13:28,480
And the handle of it,
I think, it was cork,
204
00:13:28,560 --> 00:13:31,880
and it had been--
there was a hollowed-out little thing
205
00:13:32,680 --> 00:13:34,680
so he could put his SW in here.
206
00:13:34,760 --> 00:13:38,760
[narrator] Polyakov's shortwave radio
could be hidden inside the fishing pole.
207
00:13:39,320 --> 00:13:41,040
And the whole thing falls apart.
208
00:13:41,560 --> 00:13:47,280
I mean, it just crumbled.
He was a very, very unhappy camper.
209
00:13:48,320 --> 00:13:50,000
So we start all over again.
210
00:13:52,560 --> 00:13:56,720
[narrator] The OTS managed
to correct the design and make it work.
211
00:13:56,800 --> 00:13:59,760
The fishing pole was basically
an antenna wire
212
00:13:59,840 --> 00:14:01,960
that could pick up covert signals.
213
00:14:06,480 --> 00:14:08,280
[Melton]
And when he sticks it in the water,
214
00:14:08,360 --> 00:14:10,880
he's simply picking up
another acoustic signal
215
00:14:10,960 --> 00:14:13,320
from somebody
a quarter of a mile upstream
216
00:14:13,400 --> 00:14:14,640
who's sending a signal,
217
00:14:14,720 --> 00:14:16,840
and they're both talking or humming,
218
00:14:16,920 --> 00:14:18,680
and they're having a communication
219
00:14:18,760 --> 00:14:22,280
and talking over a signal underwater.
220
00:14:22,880 --> 00:14:26,840
What's the chances of that being caught?
It's very, very slim.
221
00:14:27,720 --> 00:14:32,280
But the best one without fail
was called "Unique."
222
00:14:32,360 --> 00:14:36,280
And OTS called it "Buster."
223
00:14:37,280 --> 00:14:41,560
And it was developed specifically
for Polyakov.
224
00:14:42,840 --> 00:14:45,600
And what Polyakov could do
with this little unit,
225
00:14:47,160 --> 00:14:51,640
it had a keyboard and Cyrillic on it
and he would type in his messages.
226
00:14:51,720 --> 00:14:54,120
It went into the guts of this thing.
227
00:15:00,360 --> 00:15:02,240
He would just push a little button
228
00:15:02,320 --> 00:15:04,560
and it would transmit it,
burst transmission,
229
00:15:04,640 --> 00:15:06,120
2.4 seconds or something.
230
00:15:07,560 --> 00:15:11,880
And the base station
would respond to it, and…
231
00:15:13,760 --> 00:15:18,200
uh, Polyakov was thrilled with it,
and he said,
232
00:15:18,280 --> 00:15:22,400
"Finally the boys
at the center got this right.
233
00:15:23,040 --> 00:15:25,040
You can tell them it was good work."
234
00:15:25,120 --> 00:15:27,000
Yeah, and it was revolutionary.
235
00:15:27,640 --> 00:15:32,960
[narrator] By the late 1980s
and over 25 years of service to the CIA,
236
00:15:33,040 --> 00:15:37,600
Polyakov begins to suspect
he's under surveillance by the KGB.
237
00:15:45,280 --> 00:15:47,600
[Skotzko]
In a final meeting with him…
238
00:15:49,200 --> 00:15:54,200
it was held in his apartment
in the Soviet Embassy compound.
239
00:15:55,520 --> 00:15:57,800
That was his idea, certainly not mine.
240
00:15:58,400 --> 00:16:02,680
It was probably the most scared
I ever was in my 40-year career.
241
00:16:03,440 --> 00:16:10,160
But we got in, and I was surprised to see
all of his possessions had been packaged
242
00:16:10,240 --> 00:16:14,360
and stacked in a pyramid
in the middle of the living room floor.
243
00:16:14,440 --> 00:16:16,760
And I said, "What's going on?"
244
00:16:16,840 --> 00:16:19,920
And he says,
"Yeah, but who knows what might happen?"
245
00:16:20,560 --> 00:16:22,480
At which point I began to worry
246
00:16:22,560 --> 00:16:26,000
that maybe he was worried
that he was under suspicion.
247
00:16:26,520 --> 00:16:28,120
And I said to him…
248
00:16:29,920 --> 00:16:32,080
"If you have any doubts
about your security,
249
00:16:34,080 --> 00:16:37,720
we more than owe you the opportunity
250
00:16:37,800 --> 00:16:40,520
to get you out of here
and get you to our country."
251
00:16:42,360 --> 00:16:45,040
And it was the one time
I saw him actually flare up
252
00:16:45,960 --> 00:16:48,160
and lose his temper, just a little bit.
253
00:16:50,120 --> 00:16:53,320
He said,
"I am not doing this for your country.
254
00:16:53,400 --> 00:16:57,080
I'm doing this for the Russian people
because of what those bastards
255
00:16:57,160 --> 00:17:01,560
in the Communist Party have done
to my country over the last 60 years."
256
00:17:02,560 --> 00:17:08,280
And that was the first in-depth look
into what his motivation was.
257
00:17:09,360 --> 00:17:11,280
It was a very revealing moment.
258
00:17:12,040 --> 00:17:14,600
[narrator]
Polyakov's intuition is correct.
259
00:17:15,160 --> 00:17:17,280
While he's been working for the CIA,
260
00:17:17,360 --> 00:17:21,080
FBI mole Robert Hanssen
was working for the Russians
261
00:17:21,160 --> 00:17:23,240
and gave the GRU intelligence
262
00:17:23,320 --> 00:17:26,960
about a possible FBI source
named Polyakov.
263
00:17:29,480 --> 00:17:33,120
Hanssen helped put the final nail
in his coffin.
264
00:17:33,200 --> 00:17:38,520
Polyakov was immediately apprehended,
searched and interrogated by the GRU.
265
00:17:45,640 --> 00:17:48,760
[Skotzko] And he then proceeded
to make a full confession,
266
00:17:48,840 --> 00:17:51,120
and off he went into prison
267
00:17:51,200 --> 00:17:56,320
and was visited once or twice
by his family
268
00:17:57,040 --> 00:17:58,680
and then dropped out of sight.
269
00:17:58,760 --> 00:18:00,320
He was executed in '88.
270
00:18:00,400 --> 00:18:03,080
[narrator] Polyakov is said
to have been credited
271
00:18:03,160 --> 00:18:06,000
with keeping the Cold War
from boiling over
272
00:18:06,080 --> 00:18:10,120
by giving the United States secrets
that gave it an inside view
273
00:18:10,200 --> 00:18:13,000
of Soviet priorities
and weapon capabilities.
274
00:18:13,560 --> 00:18:19,080
Polyakov's success relied on various
spy gadgets for covert communication,
275
00:18:19,160 --> 00:18:23,720
and like the fishing pole, they are often
concealed inside everyday items.
276
00:18:25,840 --> 00:18:28,160
[tense music playing]
277
00:18:33,840 --> 00:18:36,160
[Murray] So we tried to make
our communications
278
00:18:36,240 --> 00:18:38,040
either look like something else
279
00:18:38,120 --> 00:18:42,520
or at least put them
within some other kind of device
280
00:18:42,600 --> 00:18:46,760
and make them as undetectable as possible.
281
00:18:47,560 --> 00:18:49,160
And that's cov-com.
282
00:18:49,240 --> 00:18:52,800
And it was constantly evolving,
constantly being worked on.
283
00:18:58,320 --> 00:19:03,040
[Gerald B. Richards] But today,
short-range might be using Wi-Fi,
284
00:19:03,120 --> 00:19:06,520
uh, might be using Bluetooth,
285
00:19:06,600 --> 00:19:09,800
uh, computers, on the Internet,
286
00:19:09,880 --> 00:19:12,920
from one very short spot to another.
287
00:19:13,000 --> 00:19:15,360
Maybe two computers
sitting next to each other
288
00:19:15,440 --> 00:19:21,640
to transfer that information,
but basically that would be used today.
289
00:19:22,520 --> 00:19:26,800
[narrator] In the real-life version of
the hit television series The Americans,
290
00:19:26,880 --> 00:19:28,640
ten Russian sleeper agents,
291
00:19:28,720 --> 00:19:32,320
who had been participating in deep-cover,
long-term assignments,
292
00:19:32,400 --> 00:19:36,840
were arrested in Operation Ghost Stories
in the United States.
293
00:19:37,640 --> 00:19:40,800
It is a clear reminder for people
in the intelligence world
294
00:19:40,880 --> 00:19:44,800
that Russian spies are still
actively working on US soil.
295
00:19:44,880 --> 00:19:46,960
[Melton] "Ghost Stories" is the code name
296
00:19:47,040 --> 00:19:50,680
for one of the longest-running
counterintelligence operations
297
00:19:50,760 --> 00:19:53,920
in the United States
following World War II.
298
00:19:54,480 --> 00:19:58,040
It began at least…
299
00:19:58,640 --> 00:20:02,080
probably the year 2000,
probably much before.
300
00:20:02,160 --> 00:20:07,320
And ultimately it tracked
ten Russian illegals
301
00:20:08,000 --> 00:20:11,320
that were in the United States
under false identity.
302
00:20:11,400 --> 00:20:14,480
They were SVR intelligence officers
303
00:20:14,560 --> 00:20:18,360
and were living lives
as ordinary Americans.
304
00:20:18,440 --> 00:20:21,800
And they were literally
the spies next door.
305
00:20:25,400 --> 00:20:28,200
[narrator] Many of the Russian
SVR "illegals"
306
00:20:28,280 --> 00:20:32,320
established themselves in the US
using stolen identities
307
00:20:32,400 --> 00:20:34,120
and leading normal lives,
308
00:20:34,200 --> 00:20:36,640
getting married, buying homes,
309
00:20:36,720 --> 00:20:40,720
raising children
and assimilating into American society.
310
00:20:41,240 --> 00:20:42,920
They were in it for the long haul
311
00:20:43,000 --> 00:20:47,720
to develop sources of information
in US policymaking circles.
312
00:20:49,080 --> 00:20:54,040
To report back to Russia, they used
various covert communication systems.
313
00:20:56,800 --> 00:20:58,720
The Ghost Stories team used
314
00:20:58,800 --> 00:21:02,560
virtually every means
315
00:21:02,640 --> 00:21:05,560
of covert communication
available to them at the time,
316
00:21:05,640 --> 00:21:08,160
including secret writing, secret ink.
317
00:21:08,680 --> 00:21:12,720
They received coded
one-way voice messages coming over
318
00:21:12,800 --> 00:21:15,080
just regular radio frequencies.
319
00:21:16,280 --> 00:21:19,200
One of the most interesting were
the systems that were used
320
00:21:19,280 --> 00:21:24,760
by one of the Russian 10
by the name of Anna Chapman in 2010.
321
00:21:25,280 --> 00:21:30,240
And the SVR developed a system for her
322
00:21:30,320 --> 00:21:32,120
that used her regular laptop.
323
00:21:32,760 --> 00:21:36,000
And she would go to a Starbucks
or a coffee shop,
324
00:21:36,080 --> 00:21:37,400
sit next to the window,
325
00:21:37,480 --> 00:21:43,080
and she would activate
an ad hoc wireless network
326
00:21:43,160 --> 00:21:47,360
that was built into the Windows
operating system of her computer.
327
00:21:47,440 --> 00:21:52,400
And what this did, it was a system
that Microsoft envisioned years ago.
328
00:21:52,920 --> 00:21:55,640
Say you had two members
in the same household
329
00:21:55,720 --> 00:21:58,480
that wanted to play a game
from different rooms.
330
00:21:58,560 --> 00:22:00,680
They didn't need to go on the Internet.
331
00:22:00,760 --> 00:22:02,680
This was actually before the Internet.
332
00:22:02,760 --> 00:22:05,600
But they could simply use
the wireless feature
333
00:22:05,680 --> 00:22:09,680
and create their own intranet
between the two of them,
334
00:22:09,760 --> 00:22:12,000
but it would never go over the Internet.
335
00:22:12,080 --> 00:22:14,640
And so Anna activated that.
336
00:22:14,720 --> 00:22:19,200
Her contact would be parked in a car
50 yards across the way,
337
00:22:19,280 --> 00:22:21,720
have no personal contact with her.
338
00:22:21,800 --> 00:22:25,320
She could simply open her computer,
activate the file.
339
00:22:25,400 --> 00:22:30,240
It would wirelessly sync
with a car 50 yards away.
340
00:22:30,320 --> 00:22:34,040
Any folder she drug
onto the folder with a link
341
00:22:34,120 --> 00:22:36,200
would automatically be encrypted
342
00:22:36,280 --> 00:22:39,560
and sent on this encrypted tunnel
to the car 50 yards away.
343
00:22:40,160 --> 00:22:43,560
And virtually impossible to detect.
344
00:22:43,640 --> 00:22:46,640
And even if it was detected,
it was encrypted.
345
00:22:47,240 --> 00:22:52,440
One of the great ironies of it is that
Anna was a bit of a bumbling agent.
346
00:22:53,080 --> 00:22:58,080
[narrator] In this FBI-sourced footage,
Chapman is seen inside a department store
347
00:22:58,160 --> 00:23:02,920
using a hidden computer to send
encrypted messages to a Russian spy.
348
00:23:04,040 --> 00:23:07,440
[Melton] It's strange to see pictures
of a Russian spy standing
349
00:23:07,520 --> 00:23:08,720
and holding her laptop up,
350
00:23:08,800 --> 00:23:13,200
making sure that she's making
communications with a car 50 yards away.
351
00:23:14,040 --> 00:23:19,000
The weakness is often
not the technology but the agent.
352
00:23:22,760 --> 00:23:24,560
[narrator] Chapman met a man named Roman,
353
00:23:24,640 --> 00:23:28,160
who she believed was a Russian officer,
at a local Starbucks
354
00:23:28,240 --> 00:23:32,280
and tells him about the technical issues
she was having with her computer.
355
00:23:33,920 --> 00:23:37,280
[Melton] And Roman very alertly says,
356
00:23:37,360 --> 00:23:41,200
"Oh, well, if you think there's a problem
with the computer,
357
00:23:41,880 --> 00:23:44,520
why don't you let me have
some of my friends at the station
358
00:23:44,600 --> 00:23:46,760
take a look at it?
They're very, very good at that."
359
00:23:47,360 --> 00:23:50,920
And Anna says, "That would be wonderful,"
360
00:23:51,520 --> 00:23:55,160
thinking she's just relieved herself
of this computer.
361
00:23:55,240 --> 00:24:01,040
And so she gives
the FBI undercover officer
362
00:24:01,120 --> 00:24:02,760
her computer to be checked.
363
00:24:03,320 --> 00:24:06,280
He in turn says,
"Anna, I need you to do something…"
364
00:24:06,880 --> 00:24:10,240
[narrator] He asks her to deliver
a passport to another agent
365
00:24:10,320 --> 00:24:13,560
and to leave a sign
that the mission had been completed.
366
00:24:14,240 --> 00:24:19,400
She not only handed over the computer
but agreed to deliver the passport.
367
00:24:22,720 --> 00:24:26,400
But by committing
to conspiratorial behavior
368
00:24:26,480 --> 00:24:29,200
and accepting the passport and doing this,
369
00:24:29,280 --> 00:24:32,600
they now would be able
to charge her with an offense.
370
00:24:33,160 --> 00:24:37,600
On the 26th of June,
in one massive operation
371
00:24:37,680 --> 00:24:41,000
that probably involved more than
600 agents on the east coast,
372
00:24:41,080 --> 00:24:43,520
all the arrests were affected
at the same time.
373
00:24:43,600 --> 00:24:46,880
[narrator] It's reported that if Anna
hadn't been arrested,
374
00:24:46,960 --> 00:24:50,760
she could have been one
of the most dangerous spies in America.
375
00:24:51,840 --> 00:24:54,160
[Melton] And the reason was her access.
376
00:24:54,840 --> 00:24:59,080
She could get past any door
and any secretary.
377
00:24:59,160 --> 00:25:02,240
And men were always willing
to give her time and an interview.
378
00:25:02,840 --> 00:25:07,320
And she had developed a pattern
and a pitch for her business.
379
00:25:07,920 --> 00:25:09,720
It was basically a recruitment.
380
00:25:09,800 --> 00:25:13,080
She was trying to make friends
and work her way up the social ladder.
381
00:25:14,760 --> 00:25:16,920
[narrator] Communicating secretly
with an asset
382
00:25:17,000 --> 00:25:19,720
and having the ability
to exchange intelligence
383
00:25:19,800 --> 00:25:23,320
is vital to the success
of an espionage operation.
384
00:25:23,400 --> 00:25:27,200
Secret writings is one method
of communicating covertly
385
00:25:27,280 --> 00:25:30,360
and has been used
from ancient times to modern day.
386
00:25:30,440 --> 00:25:31,960
[Parrack]
During the Revolutionary War,
387
00:25:32,040 --> 00:25:36,160
George Washington a…
a spy network called the Culper Ring,
388
00:25:36,240 --> 00:25:39,640
they would send messages to each other,
sometimes in secret writing,
389
00:25:39,720 --> 00:25:41,240
sometimes in open letters.
390
00:25:41,320 --> 00:25:45,400
They'd say,
"47 is going to meet 16 at 32."
391
00:25:46,840 --> 00:25:50,320
[Wallace]
And the Culper Ring agents
392
00:25:50,400 --> 00:25:51,800
would pick up those letters
393
00:25:51,880 --> 00:25:55,400
and then deliver them
to Washington headquarters.
394
00:25:55,480 --> 00:25:58,920
So, it was just a matter
of secret writing,
395
00:25:59,000 --> 00:26:00,960
uh, information.
396
00:26:01,040 --> 00:26:03,720
Information that was, quote,
it was "buried"
397
00:26:03,800 --> 00:26:07,640
in what was otherwise
innocuous communication.
398
00:26:12,720 --> 00:26:15,280
You get a similar technique
399
00:26:15,360 --> 00:26:20,800
with what is called steganography
in digital information.
400
00:26:20,880 --> 00:26:24,320
So people have devised ways
401
00:26:24,400 --> 00:26:30,080
of adding data to images,
or to spreadsheets,
402
00:26:30,160 --> 00:26:34,240
or to other documents, that are digital,
403
00:26:34,320 --> 00:26:38,480
that is hidden and unknown.
404
00:26:41,280 --> 00:26:46,360
[Melton] If you ask how many images
are sent over the Web each day,
405
00:26:46,440 --> 00:26:50,120
no one has any idea in the world
because it's…
406
00:26:50,640 --> 00:26:53,120
billions of images are transmitted.
407
00:26:53,840 --> 00:26:58,000
So if a spy stealing information
408
00:26:58,080 --> 00:27:01,160
can encipher it first,
409
00:27:02,040 --> 00:27:05,320
put it in a digital form,
conceal it in an image,
410
00:27:05,400 --> 00:27:07,080
conceal it in a music track,
411
00:27:07,160 --> 00:27:11,320
conceal it in a Word document,
and transmit it,
412
00:27:11,400 --> 00:27:15,000
if he can use a channel,
or post it to a website
413
00:27:15,080 --> 00:27:18,040
that's not under analysis
414
00:27:18,120 --> 00:27:21,080
or it's not under observation
by an intelligence service,
415
00:27:21,160 --> 00:27:25,680
it's very, very likely that it would
never be scrutinized.
416
00:27:25,760 --> 00:27:29,200
It would never be examined
and would thereby be effective.
417
00:27:31,920 --> 00:27:34,400
[narrator] The ability to conceal
and hide secrets
418
00:27:34,480 --> 00:27:37,800
is an art form
within the intelligence community.
419
00:27:42,720 --> 00:27:47,720
The first actual micro photography
was done in the mid-1800s
420
00:27:47,800 --> 00:27:52,560
and actually by 1900
it became a art form almost,
421
00:27:52,640 --> 00:27:54,920
because one of the challenges
used to be is,
422
00:27:55,000 --> 00:27:58,720
how you can put
on one inch of film the entire Bible.
423
00:28:07,520 --> 00:28:10,560
So this was really,
really micro photography,
424
00:28:11,440 --> 00:28:15,040
but during World War II,
the Germans decided
425
00:28:15,120 --> 00:28:17,520
to use this as a communication device.
426
00:28:18,120 --> 00:28:20,880
And basically what they would do
is take instructions
427
00:28:20,960 --> 00:28:25,800
and bring it down to the size of a dot,
a period at the end of a sentence,
428
00:28:25,880 --> 00:28:27,320
and send it to the asset.
429
00:28:29,160 --> 00:28:32,160
[narrator] Modern technology
has taken microdots
430
00:28:32,240 --> 00:28:34,920
and steganography even further,
431
00:28:35,000 --> 00:28:38,720
with the development of a new technique
for conducting espionage
432
00:28:38,800 --> 00:28:43,920
on a molecular level,
hiding covert messages in human DNA.
433
00:28:44,000 --> 00:28:50,120
It's possible today to take
and modify a strand of DNA
434
00:28:50,680 --> 00:28:53,160
and have it contain a message.
435
00:28:53,920 --> 00:28:56,600
[narrator] Using this technique,
a sender would create
436
00:28:56,680 --> 00:29:01,480
a unique strand of DNA that only
an intended recipient can isolate
437
00:29:01,560 --> 00:29:04,320
and read from millions of similar strands.
438
00:29:04,400 --> 00:29:06,200
[Melton] You could have it
contain a password.
439
00:29:06,280 --> 00:29:10,800
You could produce it
and generate multiple copies of it.
440
00:29:10,880 --> 00:29:13,040
The technology exists to do it.
441
00:29:17,000 --> 00:29:21,280
[narrator] Today, the variety of channels
in which you can send a covert message
442
00:29:21,360 --> 00:29:26,320
has exploded, especially with the growth
of social media applications.
443
00:29:26,400 --> 00:29:29,080
[lively electronic beat plays]
444
00:29:31,960 --> 00:29:35,440
[Melton] On your phone
you have multiple apps available
445
00:29:35,520 --> 00:29:37,920
for point-to-point encryption.
446
00:29:38,640 --> 00:29:43,560
You have WhatsApp, you have Telegram,
you have a variety of systems.
447
00:29:43,640 --> 00:29:45,680
Every one of them is encrypted.
448
00:29:45,760 --> 00:29:50,440
The government has enormous difficulty
and in some instances
449
00:29:50,520 --> 00:29:53,400
cannot break this encryption.
450
00:29:53,480 --> 00:29:57,080
But there's other ways that are
complex and baffling.
451
00:29:57,680 --> 00:30:01,080
[narrator] Digital applications
make it easier to send messages
452
00:30:01,160 --> 00:30:06,000
and also allow spies to communicate
secretly on otherwise benign platforms,
453
00:30:06,080 --> 00:30:07,600
such as digital gaming.
454
00:30:07,680 --> 00:30:10,560
[Melton] The Tom Clancy's Rainbow Six,
455
00:30:11,280 --> 00:30:14,320
Halo, Fortnite, Minecraft,
456
00:30:14,400 --> 00:30:19,760
where members are cooperating
and communicating as part of teams.
457
00:30:19,840 --> 00:30:23,800
Well, the same channel can be used
for covert communication.
458
00:30:26,720 --> 00:30:29,600
[narrator] Another workaround
for cov-com via the Internet
459
00:30:29,680 --> 00:30:33,240
is something called Tor,
short for The Onion Router,
460
00:30:33,320 --> 00:30:35,440
a gateway to the Dark Web.
461
00:30:37,960 --> 00:30:40,720
Two thirds of the Internet
is on what they call a Dark Web.
462
00:30:40,800 --> 00:30:45,600
It's used by drug dealers.
It's used by hackers.
463
00:30:45,680 --> 00:30:48,880
That's where they buy the tools,
buy and trade the tools
464
00:30:48,960 --> 00:30:51,480
that they use to get
into other people's computers.
465
00:30:54,720 --> 00:30:57,680
It's used for all kinds
of nefarious purposes.
466
00:30:57,760 --> 00:31:01,080
Uh, Tor is just the way you get into it.
467
00:31:02,520 --> 00:31:07,200
[narrator] It's a tool that's also been
used by terror networks around the world.
468
00:31:07,280 --> 00:31:08,840
-[shouting]
-[gunfire]
469
00:31:08,920 --> 00:31:12,000
ISIS communicated via Tor
and social media
470
00:31:12,080 --> 00:31:17,320
in the Paris attacks of 2016
by using telegram-like apps
471
00:31:17,400 --> 00:31:21,120
which securely communicated their messages
to the other group members,
472
00:31:21,200 --> 00:31:24,520
allowing them to coordinate
the attacks secretly.
473
00:31:25,120 --> 00:31:29,240
Intelligence operatives are constantly
having to adapt their strategies
474
00:31:29,320 --> 00:31:31,760
to meet the latest changes in technology.
475
00:31:31,840 --> 00:31:34,280
[Melton] If you're
a counterintelligence service,
476
00:31:34,360 --> 00:31:37,080
where do you know where to look at?
Where do you start?
477
00:31:37,160 --> 00:31:41,000
In many ways,
the odds are with the agent.
478
00:31:41,080 --> 00:31:43,280
And, as the Russians believe,
479
00:31:43,360 --> 00:31:45,960
if you follow your tradecraft,
480
00:31:46,040 --> 00:31:50,600
you'll never ever be caught,
and most often that's true.
481
00:31:51,520 --> 00:31:56,920
[Richards] Well, the future
of clandestine is all digital.
482
00:31:57,000 --> 00:32:01,040
Some of these encryptions
are virtually impossible to break
483
00:32:01,120 --> 00:32:04,280
and therefore the… to catch the spies…
484
00:32:04,360 --> 00:32:06,160
uh, is going to be much, much difficult,
485
00:32:06,240 --> 00:32:10,240
but also for them to catch us spying is
going to be much, much more difficult,
486
00:32:10,320 --> 00:32:13,440
but yes, it's a digital world today.
487
00:32:13,520 --> 00:32:18,160
If you think about clandestine operations
as being a body,
488
00:32:18,240 --> 00:32:24,080
it is the heart of covert communications
that really makes the difference
489
00:32:24,160 --> 00:32:27,760
between whether or not
you have a successful spy,
490
00:32:27,840 --> 00:32:31,160
whether or not you have
a successful espionage operation.
491
00:32:31,240 --> 00:32:34,080
[atmospheric music playing]
43063
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.