All language subtitles for Spycraft.S01E01.WEBRip.x264-ION10

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian Download
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian Download
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese Download
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish Download
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:09,880 --> 00:00:12,840 [atmospheric music plays] 2 00:00:13,600 --> 00:00:18,040 [narrator] Spies conduct surveillance to learn their enemies' secrets. 3 00:00:20,640 --> 00:00:22,720 The benefit of bugging your enemies 4 00:00:22,800 --> 00:00:27,520 is to obtain information that you can use and pass on. 5 00:00:27,600 --> 00:00:30,320 [narrator] To do this, spies use stealth 6 00:00:30,400 --> 00:00:33,240 and the most cutting-edge surveillance technology. 7 00:00:34,160 --> 00:00:37,280 There were hundreds of microphones put in the exterior walls of the building. 8 00:00:37,360 --> 00:00:39,080 The only way to make that building secure 9 00:00:39,160 --> 00:00:41,520 was to chop off the top three floors and throw it away. 10 00:00:41,600 --> 00:00:46,640 [narrator] When intelligence agencies don't have access, they get creative. 11 00:00:48,720 --> 00:00:54,640 The idea to create a microphone 12 00:00:54,720 --> 00:00:57,320 inside a bullet, 13 00:00:57,400 --> 00:01:01,200 and actually fire it from a gun 14 00:01:01,280 --> 00:01:05,440 and it would be able to pick up communications and transmit it out. 15 00:01:05,960 --> 00:01:08,280 [intense music playing] 16 00:01:08,360 --> 00:01:11,240 [narrator] And when they need to track you, they can. 17 00:01:13,120 --> 00:01:15,320 [man] You can't go anywhere and do anything 18 00:01:15,400 --> 00:01:17,440 without leaving a trail or a sort of digital dust 19 00:01:17,520 --> 00:01:19,560 of who you are and where you've been. 20 00:01:19,640 --> 00:01:21,440 [theme music playing] 21 00:01:47,560 --> 00:01:50,040 [narrator] Rulers, governments, 22 00:01:50,640 --> 00:01:54,200 lovers, and corporations have been doing it for centuries. 23 00:01:56,080 --> 00:02:00,600 Spying to gain information, assess potential threats, 24 00:02:00,680 --> 00:02:03,320 stop attacks and gain the upper hand. 25 00:02:04,960 --> 00:02:06,920 Today, intelligence agencies 26 00:02:07,000 --> 00:02:08,840 carry out espionage operations 27 00:02:08,920 --> 00:02:11,600 using cutting-edge surveillance devices, 28 00:02:11,680 --> 00:02:14,360 from tiny eavesdropping microphones 29 00:02:14,440 --> 00:02:17,840 to subminiature video cameras and drone technology. 30 00:02:18,840 --> 00:02:23,000 For a spy to have an idea of what an enemy is doing, 31 00:02:23,080 --> 00:02:27,280 there is perhaps no better way than if the spy could eavesdrop somehow. 32 00:02:27,360 --> 00:02:30,640 Good surveillance is always dependent 33 00:02:30,720 --> 00:02:34,600 on the best available technology. 34 00:02:34,680 --> 00:02:38,480 So, if we look back a hundred years ago to World War I, 35 00:02:38,560 --> 00:02:43,280 the height of aerial audio surveillance 36 00:02:43,360 --> 00:02:44,840 was giant microphones 37 00:02:44,920 --> 00:02:49,320 that could hear, directionally, planes coming from miles away. 38 00:02:49,400 --> 00:02:52,880 That was the best technology that was available at the time. 39 00:02:54,080 --> 00:02:57,760 Today, cameras can spot a plane at 50 miles away. 40 00:02:59,040 --> 00:03:01,640 [atmospheric music plays] 41 00:03:12,160 --> 00:03:15,120 [narrator] The use of bugs became a common technique 42 00:03:15,200 --> 00:03:17,960 used for surveillance by intelligence agencies 43 00:03:18,040 --> 00:03:20,560 in the 1950s and '60s, 44 00:03:20,640 --> 00:03:25,320 and usually combined a miniature radio transmitter with a microphone 45 00:03:25,400 --> 00:03:28,280 that could also be operated on batteries. 46 00:03:28,360 --> 00:03:30,240 The small size of the transmitter 47 00:03:30,320 --> 00:03:33,640 and the ability to easily conceal in various objects 48 00:03:33,720 --> 00:03:36,000 made it a "go-to" for spies. 49 00:03:37,280 --> 00:03:39,960 One creative example for surveillance 50 00:03:40,040 --> 00:03:41,840 was developed by the STB, 51 00:03:41,920 --> 00:03:46,280 Czechoslovakia's intelligence agency, in the 1970s. 52 00:03:46,920 --> 00:03:50,760 Their target: the US ambassador and his imported shoes. 53 00:03:51,360 --> 00:03:54,720 When the shoes arrived, the STB intercepted them 54 00:03:54,800 --> 00:03:58,200 and modified them with an eavesdropping device. 55 00:03:58,280 --> 00:04:01,640 He had a maid who took care of all of his clothes, 56 00:04:01,720 --> 00:04:05,640 that did the pressing, the polishing the shoes and all that, 57 00:04:05,720 --> 00:04:09,080 then when she gave him the shoes in the morning, she would pull the pin out 58 00:04:09,160 --> 00:04:11,800 and the batteries would start the transmitter running again. 59 00:04:17,400 --> 00:04:20,840 Well, he wore those shoes to the office, 60 00:04:20,920 --> 00:04:24,160 and some people who were using radios, 61 00:04:24,240 --> 00:04:27,520 listening for potential bugs in the embassy, 62 00:04:28,200 --> 00:04:29,360 detected his voice. 63 00:04:31,240 --> 00:04:34,080 [narrator] A counter-surveillance team  detected a signal 64 00:04:34,160 --> 00:04:38,280 coming from the ambassador as he moved around the embassy grounds. 65 00:04:38,360 --> 00:04:43,760 It soon became clear that the ambassador was actually wearing a listening device. 66 00:04:44,560 --> 00:04:46,840 [Parrack] So, in the process of taking 67 00:04:46,920 --> 00:04:49,160 various articles of clothing off of him, 68 00:04:49,680 --> 00:04:53,600 they finally found that someone had modified the heel of the shoe 69 00:04:54,240 --> 00:04:56,720 to contain a transmitter and a battery pack. 70 00:04:56,800 --> 00:05:01,200 And that's a case of a low-tech transmitter, uh… 71 00:05:01,280 --> 00:05:04,680 that could be picked up by a normal radio receiver, 72 00:05:04,760 --> 00:05:06,560 where you could hear the voice 73 00:05:06,640 --> 00:05:09,920 and identify who it was and where it was. 74 00:05:10,000 --> 00:05:12,600 [narrator] This wasn't the first time a US ambassador 75 00:05:12,680 --> 00:05:15,520 had been the target of covert surveillance. 76 00:05:15,600 --> 00:05:19,840 An early listening device called the Passive Cavity Resonator, 77 00:05:19,920 --> 00:05:22,160 also known as "the thing," 78 00:05:22,240 --> 00:05:25,600 was invented for the KGB by Leon Theremin, 79 00:05:26,520 --> 00:05:30,960 the famous musician and Russian scientist, in 1945. 80 00:05:31,480 --> 00:05:36,040 It contained no electrical parts and is still marveled at today. 81 00:05:37,000 --> 00:05:42,000 To work, a signal emitter would beam an ultra-high-frequency radio signal 82 00:05:42,080 --> 00:05:45,760 to an antenna inside the Passive Cavity Resonator, 83 00:05:45,840 --> 00:05:50,000 pick up conversations, then beam them back to a receiver. 84 00:05:50,080 --> 00:05:54,000 [Gerald B. Richards] Passive Cavity Resonator is basically 85 00:05:54,080 --> 00:05:58,360 a device that will only be activated, 86 00:05:58,440 --> 00:06:02,320 uh, upon some radio wave or microwave. 87 00:06:02,400 --> 00:06:04,280 Since it's not transmitting anything, 88 00:06:04,360 --> 00:06:06,880 you wouldn't pick it up under normal circumstances. 89 00:06:06,960 --> 00:06:13,080 [narrator] In August 1945, US ambassador to Russia, Averell Harriman, 90 00:06:13,160 --> 00:06:16,360 received one hidden inside a special gift. 91 00:06:16,440 --> 00:06:18,680 They were Russian versions of Boy Scouts, 92 00:06:18,760 --> 00:06:24,600 presented the US ambassador a magnificent carved wooden statue 93 00:06:24,680 --> 00:06:27,720 of the Great Seal of the United States. 94 00:06:27,800 --> 00:06:30,640 And he proudly hung it up on a wall on back of his desk. 95 00:06:30,720 --> 00:06:36,120 Uh, and every time the Russians would burst a specific microwave, 96 00:06:36,200 --> 00:06:38,720 right through the wall from another building, 97 00:06:38,800 --> 00:06:41,000 it would turn, basically turn it on, 98 00:06:41,080 --> 00:06:44,440 and anything you discussed in his office, they could hear. 99 00:06:46,840 --> 00:06:50,680 [Melton] And for seven years, every word in his office 100 00:06:50,760 --> 00:06:54,320 could be recovered from the Russian listening post 101 00:06:54,400 --> 00:06:55,680 across the street. 102 00:07:07,160 --> 00:07:09,080 [Parrack] And it was only found by accident. 103 00:07:09,160 --> 00:07:12,960 When they took the seal apart, there was a disc in it about the size of a quarter, 104 00:07:13,040 --> 00:07:15,120 about a half inch thick, that was the microphone. 105 00:07:15,200 --> 00:07:17,360 And there was a metal rod about a foot long 106 00:07:17,440 --> 00:07:19,840 that was connected to the microphone, 107 00:07:19,920 --> 00:07:22,640 that ran down the back of the plaque in the eagle. 108 00:07:22,720 --> 00:07:24,560 That rod was an antenna. 109 00:07:26,120 --> 00:07:30,000 From across the street, the Russians transmitted a radio signal. 110 00:07:30,960 --> 00:07:33,640 The antenna picked up that signal in his residence. 111 00:07:33,720 --> 00:07:36,360 It was strong enough to power the microphone 112 00:07:36,440 --> 00:07:39,960 and transmit the voice back on a different frequency. 113 00:07:40,040 --> 00:07:43,360 Using radio bugs against ambassadors is not something new. 114 00:07:43,920 --> 00:07:46,680 [narrator] The Russian intelligence agencies are masters 115 00:07:46,760 --> 00:07:51,560 in the art of surveillance and have an ongoing and pervasive system in place 116 00:07:51,640 --> 00:07:53,880 to collect intelligence against the US. 117 00:07:54,800 --> 00:07:57,280 Throughout the 1960s and '70s, 118 00:07:57,360 --> 00:08:01,320 microphones were found in various places inside the US Embassy. 119 00:08:01,840 --> 00:08:03,720 Every time one was discovered, 120 00:08:03,800 --> 00:08:07,400 the KGB got more creative with where they'd hide them. 121 00:08:08,640 --> 00:08:12,960 Some typewriters were found modified in the American Embassy in Moscow. 122 00:08:19,240 --> 00:08:22,280 Inside that typewriter was a structural piece of aluminum 123 00:08:22,360 --> 00:08:25,080 that went from one side of the typewriter to the other. 124 00:08:25,160 --> 00:08:28,760 What the Soviets had done through a shipping channel, 125 00:08:28,840 --> 00:08:31,800 uh, is basically took the typewriters apart 126 00:08:31,880 --> 00:08:35,640 and replaced that bar with a bar that looked exactly the same, 127 00:08:35,720 --> 00:08:37,840 but had been machined out. 128 00:08:37,920 --> 00:08:42,000 And discreet electronics had been put inside that aluminum bar, 129 00:08:42,080 --> 00:08:45,520 which appeared on the surface to be solid, but it actually was hollowed out. 130 00:08:45,600 --> 00:08:48,120 What the electronics would do, 131 00:08:48,200 --> 00:08:52,880 every single key that was typed on the typewriter would be stored 132 00:08:52,960 --> 00:08:57,120 in a pretty small buffer inside that bar, 133 00:08:57,200 --> 00:08:59,360 and when the buffer was full, 134 00:08:59,440 --> 00:09:03,320 the contents of that buffer would be transmitted through an RF signal 135 00:09:03,400 --> 00:09:05,560 to a nearby Soviet listening post. 136 00:09:07,520 --> 00:09:09,320 This went on for a decade at least. 137 00:09:13,520 --> 00:09:17,640 [narrator] The typewriter incident became known as the Gunman Project. 138 00:09:19,440 --> 00:09:22,640 [Gosler] We ended up finding about 16 of these things 139 00:09:22,720 --> 00:09:27,320 between the US embassies in Moscow and Leningrad. 140 00:09:31,800 --> 00:09:35,440 We have to imagine those kinds of operations being conducted 141 00:09:35,520 --> 00:09:37,080 against today's technology. 142 00:09:37,160 --> 00:09:41,120 And kind of the parallel would be the… from the typewriter in Gunman 143 00:09:41,200 --> 00:09:44,160 to a software or hardware implant in your laptop 144 00:09:44,240 --> 00:09:49,240 that's basically infinitely more complex than that typewriter. 145 00:09:49,320 --> 00:09:52,400 We built a new embassy in Moscow in the late 1970s, 146 00:09:52,480 --> 00:09:55,200 that was built by Russian labor using Russian material, 147 00:09:55,280 --> 00:09:58,040 and before they started putting the brickwork up for the walls, 148 00:09:58,120 --> 00:10:01,440 we did some examination of the columns and beams and found out 149 00:10:01,520 --> 00:10:04,520 that almost every column and beam had a gift in it from the Russians. 150 00:10:04,600 --> 00:10:07,600 There were microphones in the exterior walls of the building. 151 00:10:07,680 --> 00:10:10,440 Many, many hundreds of microphones were disconnected 152 00:10:10,520 --> 00:10:12,240 from the walls of the building. 153 00:10:12,320 --> 00:10:15,480 [tense music playing] 154 00:10:18,840 --> 00:10:20,680 The only way to make that building secure 155 00:10:20,760 --> 00:10:23,960 was to chop off the top three floors or so of the building 156 00:10:24,040 --> 00:10:25,760 and throw it away and rebuild them 157 00:10:25,840 --> 00:10:29,800 using US labor and US material that was pouched in from the United States. 158 00:10:32,320 --> 00:10:35,760 [narrator] The Russians aren't the only ones doing the spying. 159 00:10:35,840 --> 00:10:39,360 The United States intelligence agencies have done their fair share 160 00:10:39,440 --> 00:10:42,520 of surveillance activities against the Russians as well. 161 00:10:43,200 --> 00:10:45,400 One operation codenamed Octopus 162 00:10:46,160 --> 00:10:48,720 targeted the Russian Embassy in Washington. 163 00:10:51,760 --> 00:10:57,400 So the design for the Russian Embassy had a large flat roof. 164 00:10:58,280 --> 00:11:02,720 And there were outside pipes for the runoff from the roof. 165 00:11:04,000 --> 00:11:08,880 Well, the NSA arranged for one section of pipe… 166 00:11:10,000 --> 00:11:11,480 for an optical illusion. 167 00:11:11,560 --> 00:11:14,840 You looked at it and you thought it was empty, 168 00:11:14,920 --> 00:11:18,320 but actually the walls were thicker in the middle. 169 00:11:18,960 --> 00:11:22,840 And in that one section of pipe, they put a radio receiver, 170 00:11:23,560 --> 00:11:25,680 a small explosive charge, 171 00:11:26,200 --> 00:11:29,800 and a spool with hundreds of feet of wire. 172 00:11:31,080 --> 00:11:35,840 They connected all of the microphones in the building at that point 173 00:11:35,920 --> 00:11:40,760 through the wall and attached them to this one section of drainpipe. 174 00:11:41,400 --> 00:11:46,880 The key was, how do you then get the wires out? 175 00:11:52,960 --> 00:11:56,800 And they waited for a summer rainstorm in Washington, 176 00:11:56,880 --> 00:12:01,040 and they timed the thunder strikes 177 00:12:01,120 --> 00:12:04,120 to where the thunderbolt hit near the embassy, 178 00:12:04,200 --> 00:12:08,800 at the same time they remotely triggered a small explosion in the pipe. 179 00:12:09,480 --> 00:12:15,040 And it caused the parachute to deploy into the drain. 180 00:12:15,120 --> 00:12:19,440 It quickly filled with water and it flushed down into the drain system 181 00:12:19,520 --> 00:12:24,280 and it was trailed by two tiny wires that were coming from the spool. 182 00:12:25,320 --> 00:12:29,240 Waiting for it down in the underground drain system 183 00:12:29,320 --> 00:12:32,000 was a young FBI officer 184 00:12:32,080 --> 00:12:36,880 who was sitting there with a net catching the parachute. 185 00:12:36,960 --> 00:12:37,800 He did. 186 00:12:37,880 --> 00:12:42,800 He got the wires and they had built in a box right there at that point. 187 00:12:42,880 --> 00:12:47,760 They were able to connect the wires. The wires went to an FBI listening post. 188 00:12:47,840 --> 00:12:52,520 And at that point, they could recover digital audio 189 00:12:52,600 --> 00:12:57,240 from every room they'd targeted inside the Russian Embassy. 190 00:12:59,880 --> 00:13:03,800 [narrator] Surveillance often requires having to physically send an agent 191 00:13:03,880 --> 00:13:07,400 to hide a listening device in remote and dangerous locations. 192 00:13:08,080 --> 00:13:14,200 One operation, called Operation Ivy Bells, was conducted 400 feet underwater. 193 00:13:25,760 --> 00:13:29,560 The Soviets had installed an unencrypted communication cable 194 00:13:29,640 --> 00:13:32,200 on the bottom of the Sea of Okhotsk 195 00:13:32,280 --> 00:13:35,720 between their most important naval base and the Kremlin, 196 00:13:35,800 --> 00:13:38,240 believing it was completely secure. 197 00:13:38,320 --> 00:13:41,320 But the US Navy figured out a way to break in. 198 00:13:47,240 --> 00:13:49,480 First they created a mixed gas 199 00:13:49,560 --> 00:13:53,480 which allowed the divers to dive for prolonged periods of time. 200 00:13:53,560 --> 00:13:56,800 The navy divers would be transported close to the site, 201 00:13:56,880 --> 00:13:59,200 then walk along the bottom of the sea 202 00:13:59,280 --> 00:14:02,640 in complete darkness to the underwater cable. 203 00:14:11,680 --> 00:14:15,240 They found that they could put an inductive clamp, 204 00:14:15,840 --> 00:14:18,400 which went around the cable, 205 00:14:18,480 --> 00:14:24,200 and it was able to copy any data that passed through the cable. 206 00:14:24,280 --> 00:14:27,120 It had large recorders built in, 207 00:14:27,200 --> 00:14:30,520 and they would regularly send a submarine. 208 00:14:31,160 --> 00:14:33,440 It would park on the bottom very nearby. 209 00:14:33,520 --> 00:14:36,160 They had a lockout system for divers. 210 00:14:36,240 --> 00:14:39,480 They would simply go out, swap out the reels, 211 00:14:39,560 --> 00:14:44,600 put in fresh recording media, head back to the sub, pop in. 212 00:14:44,680 --> 00:14:47,360 They'd head back, and then they'd analyze it. 213 00:14:47,440 --> 00:14:50,360 [narrator] Dozens of different lines ran through the cable, 214 00:14:50,440 --> 00:14:54,320 so they needed to separate them in order to hear individual voices. 215 00:14:54,880 --> 00:14:58,640 Operation Ivy Bells proved to be an intelligence goldmine, 216 00:14:58,720 --> 00:15:01,240 providing the US with invaluable information 217 00:15:01,320 --> 00:15:04,680 about the Soviet naval operation for the next decade. 218 00:15:07,200 --> 00:15:11,280 The creative minds of espionage even have innovative solutions 219 00:15:11,360 --> 00:15:16,160 for conducting audio surveillance when access is impossible. 220 00:15:21,680 --> 00:15:28,160 [Melton] The CIA had a target of two Russians in Mexico City. 221 00:15:30,960 --> 00:15:33,520 The problem was, the area was secure. 222 00:15:33,600 --> 00:15:38,280 So someone had the idea to create 223 00:15:38,840 --> 00:15:42,280 a microphone and a transmitter 224 00:15:42,360 --> 00:15:45,800 inside a bullet, a projectile, 225 00:15:46,360 --> 00:15:50,480 and actually fire it from a gun 226 00:15:50,560 --> 00:15:56,920 so it would embed itself in the tree near where they'd be speaking 227 00:15:57,000 --> 00:16:02,040 and would be able to pick up communications and transmit it out. 228 00:16:02,120 --> 00:16:06,600 And they were able to successfully design a device 229 00:16:06,680 --> 00:16:11,000 that could withstand the Gs of the force 230 00:16:11,080 --> 00:16:15,040 as it was shot and it stopped suddenly in the tree. 231 00:16:16,040 --> 00:16:20,120 [narrator] Today listening devices can be concealed almost anywhere, 232 00:16:20,720 --> 00:16:23,560 and they've also become even harder to detect. 233 00:16:29,080 --> 00:16:33,640 The Nagra credit card is one of the most effective 234 00:16:34,240 --> 00:16:39,880 and sophisticated listening devices available on the market. 235 00:16:39,960 --> 00:16:42,480 [narrator] The Nagra CCR is a device 236 00:16:42,560 --> 00:16:45,760 developed by a Swiss company in 2013, 237 00:16:45,840 --> 00:16:49,880 available only to law enforcement and the intelligence community. 238 00:16:49,960 --> 00:16:54,320 [Melton] It can be imprinted with the face of an American Express card. 239 00:16:54,400 --> 00:17:00,640 It could be imprinted with the face of a standard US government badge 240 00:17:00,720 --> 00:17:03,600 that you'd use for your credentials to enter a building. 241 00:17:03,680 --> 00:17:09,160 Think how effective it could be if you're wearing your ID badge around your neck 242 00:17:09,240 --> 00:17:11,840 but you've substituted the Nagra. 243 00:17:11,920 --> 00:17:16,800 Then anywhere you're walking, you're digitally recording information 244 00:17:16,880 --> 00:17:21,320 and storing it internally inside that card. 245 00:17:21,400 --> 00:17:23,040 And once you leave the premises, 246 00:17:23,120 --> 00:17:27,200 you simply download it to a computer, or you upload it to the cloud. 247 00:17:30,080 --> 00:17:33,840 Makes it just a particular threat to an intelligence service. 248 00:17:36,000 --> 00:17:39,440 [narrator] High-tech listening devices can pick up voices, 249 00:17:39,520 --> 00:17:43,160 store signals digitally, and transmit that information 250 00:17:43,240 --> 00:17:46,520 to a listening post almost anywhere in the world. 251 00:17:49,880 --> 00:17:53,320 [Richards] Well, the cell phone is really problematic 252 00:17:53,400 --> 00:17:56,440 in the world of espionage, 253 00:17:56,520 --> 00:18:00,360 because, one, most of the time you're being tracked. 254 00:18:00,440 --> 00:18:02,440 You can be tracked by your cell phone. 255 00:18:02,520 --> 00:18:06,320 So it is a real problem from a security standpoint. 256 00:18:06,400 --> 00:18:10,560 But it is a real boon as far as using it for spying on other people. 257 00:18:12,280 --> 00:18:15,000 [Parrack] Denied areas are typically places 258 00:18:15,080 --> 00:18:18,400 that you're going to be under surveillance or hostile control. 259 00:18:18,480 --> 00:18:22,560 When we're traveling and we're taking everything of importance to us… 260 00:18:22,640 --> 00:18:24,240 All of our digital information, 261 00:18:24,320 --> 00:18:28,600 our credit cards, our passports now have RFID chips. 262 00:18:28,680 --> 00:18:32,520 Protecting that data becomes more difficult. 263 00:18:34,720 --> 00:18:38,400 So if you pass through a narrow portal… 264 00:18:39,040 --> 00:18:42,800 hypothetically, that little tunnel that you walk through when you… 265 00:18:42,880 --> 00:18:46,640 before you get to immigrations and you've always wondered why it's so narrow 266 00:18:46,720 --> 00:18:49,920 and it looks like an aluminum tunnel that you're walking through… 267 00:18:50,000 --> 00:18:54,720 well, it's very possible that unless your credit cards and passport 268 00:18:54,800 --> 00:18:58,640 are in a shielded pouch, all the data's been sucked off. 269 00:18:58,720 --> 00:19:03,200 That does not necessarily mean it will be manipulated, 270 00:19:03,280 --> 00:19:05,040 but your data has been taken. 271 00:19:05,680 --> 00:19:11,800 And the ability to put an RFID chip and hide it on objects 272 00:19:11,880 --> 00:19:17,480 or hide it in your clothing is a new piece of surveillance technology. 273 00:19:21,160 --> 00:19:24,160 [narrator] The benefit of bugging and listening to your enemy 274 00:19:24,240 --> 00:19:27,400 is to obtain information that can be used and passed on, 275 00:19:28,000 --> 00:19:31,880 but being able to watch their activities is just as important. 276 00:19:33,960 --> 00:19:37,320 Intelligence agencies train and employ special teams 277 00:19:37,400 --> 00:19:43,240 to perform the role of visual surveillance using handheld optical devices, 278 00:19:43,320 --> 00:19:46,400 night vision equipment and film and video cameras. 279 00:19:47,400 --> 00:19:50,480 Cameras may be set up for long-term surveillance 280 00:19:50,560 --> 00:19:56,400 or miniaturized for concealment on the spy's body or on their belongings. 281 00:19:56,480 --> 00:20:01,560 [Richards] One of the things is, is a pen that has a small camera in it. 282 00:20:01,640 --> 00:20:03,640 You could put it in your coat pocket. 283 00:20:03,720 --> 00:20:08,560 There are subminiature cameras now you can buy for under $100 284 00:20:08,640 --> 00:20:12,920 that are so small you can place anywhere and Wi-Fi them all over the world. 285 00:20:13,000 --> 00:20:15,560 Those are the things that we're dealing with today. 286 00:20:15,640 --> 00:20:19,240 They lend themselves to a whole new type of spying. 287 00:20:21,120 --> 00:20:25,560 [narrator] Having the capability to listen in on your adversaries' secrets 288 00:20:25,640 --> 00:20:28,280 is a key strategy in espionage, 289 00:20:28,360 --> 00:20:33,240 but getting an aerial view or eye-in-the-sky is crucial 290 00:20:33,320 --> 00:20:37,240 in tracking the movement of targets, military personnel 291 00:20:37,320 --> 00:20:39,320 and weaponry of the enemy. 292 00:20:46,760 --> 00:20:49,200 It's the wish of every person to say, 293 00:20:49,280 --> 00:20:53,920 "I wish I had that bird's-eye view, or I could have my eye-in-the-sky, 294 00:20:54,000 --> 00:20:58,200 because then I could see what's happening over the next hill or in the next town." 295 00:20:58,280 --> 00:21:01,040 So satellites are today, literally, 296 00:21:02,000 --> 00:21:04,360 an effective eye-in-the-sky. 297 00:21:05,040 --> 00:21:10,880 Their weakness, however, is that it's hard and expensive to move satellites. 298 00:21:10,960 --> 00:21:14,640 [whirring] 299 00:21:14,720 --> 00:21:17,240 [atmospheric music playing] 300 00:21:23,080 --> 00:21:25,880 And what's replaced them is now drones. 301 00:21:25,960 --> 00:21:30,000 Drones with an extended range, 40, 42 hours. 302 00:21:30,080 --> 00:21:35,840 They can hover in place and provide you literally with that mobile eye-in-the-sky 303 00:21:35,920 --> 00:21:37,520 that you can deploy, 304 00:21:37,600 --> 00:21:42,040 have it anywhere you want, and you're not risking a human pilot. 305 00:21:42,120 --> 00:21:47,000 So, the modern-day drone is probably… 306 00:21:48,040 --> 00:21:52,080 the ideal eye-in-the-sky for tactical situations. 307 00:21:52,160 --> 00:21:54,760 [indistinct communication over radio] 308 00:21:54,840 --> 00:21:57,120 [tense music playing] 309 00:22:05,760 --> 00:22:08,080 [Richards] There are drones that are very small, 310 00:22:08,160 --> 00:22:10,840 that have been developed by different agencies. 311 00:22:10,920 --> 00:22:15,800 Again, whatever you're using has to be practical for the job you're doing. 312 00:22:17,200 --> 00:22:20,320 [narrator] Some advancements in airborne surveillance systems 313 00:22:20,400 --> 00:22:22,240 use wide-angle motion imagery 314 00:22:22,320 --> 00:22:27,440 which greatly expands the power that a camera attached to a drone can have, 315 00:22:27,520 --> 00:22:31,480 allowing it to track thousands of moving targets at once, 316 00:22:31,560 --> 00:22:35,320 both forwards and backwards and across cities. 317 00:22:35,400 --> 00:22:40,200 One system called the Gorgon Stare is the ultimate eye-in-the-sky, 318 00:22:40,280 --> 00:22:45,160 a $15 million military surveillance drone built by the Pentagon, 319 00:22:45,240 --> 00:22:48,080 intended to help prevent terrorist attacks. 320 00:22:48,840 --> 00:22:52,720 It can zoom in on particular parts of the imagery on the ground 321 00:22:52,800 --> 00:22:55,920 while being able to record everything else. 322 00:22:56,440 --> 00:23:02,560 More impressive are its resolution capabilities of 1.8 billion pixels, 323 00:23:02,640 --> 00:23:09,200 allowing for imagery resolution 150 times more powerful than an iPhone. 324 00:23:13,000 --> 00:23:16,600 The existence of secret information-gathering programs 325 00:23:16,680 --> 00:23:19,440 by the US National Security Agency, 326 00:23:19,520 --> 00:23:23,120 leaked by Edward Snowden in 2013, 327 00:23:23,200 --> 00:23:25,360 shed light on the reach of surveillance, 328 00:23:25,440 --> 00:23:28,880 not just for national security and espionage operations, 329 00:23:29,640 --> 00:23:31,960 but on the civilian population. 330 00:23:33,800 --> 00:23:38,320 One country that's collecting detailed profiles on all of its citizens 331 00:23:38,400 --> 00:23:42,840 by applying recent advances in artificial intelligence and data mining 332 00:23:42,920 --> 00:23:45,560 to their surveillance capabilities is China. 333 00:23:46,160 --> 00:23:49,880 Along with their robust arsenal of surveillance devices, 334 00:23:49,960 --> 00:23:53,760 they've also developed drones that look like real birds. 335 00:23:58,200 --> 00:24:03,720 The robotic flock is so lifelike that actual birds fly alongside them 336 00:24:03,800 --> 00:24:06,880 while it surveils the surrounding and its citizens. 337 00:24:06,960 --> 00:24:09,280 Codenamed "Dove" by China, 338 00:24:09,360 --> 00:24:14,240 the birds are equipped with a camera, GPS antenna and data link 339 00:24:14,320 --> 00:24:17,720 to communicate their findings back to intelligence. 340 00:24:17,800 --> 00:24:21,760 In a case like China, you're seeing them use modern Western-style technology 341 00:24:21,840 --> 00:24:23,720 and surveillance-related technologies 342 00:24:23,800 --> 00:24:26,920 to basically enact a social credit system within their people. 343 00:24:27,000 --> 00:24:31,160 What that really is, is they're using data to analyze everything about you 344 00:24:31,240 --> 00:24:33,240 in terms of who you are, who do you talk to, 345 00:24:33,320 --> 00:24:35,800 what are your opinions, what you blog about, what you search, 346 00:24:35,880 --> 00:24:39,720 what you like, what you not like, and that assesses a credit or risk score to you. 347 00:24:39,800 --> 00:24:44,640 An example of how social credit systems have been theorized to be used is, 348 00:24:44,720 --> 00:24:48,600 if you have a high credit, you qualify for the best scholarships, 349 00:24:48,680 --> 00:24:51,160 the best jobs. You're allowed to travel overseas. 350 00:24:51,240 --> 00:24:55,840 Uh, if you characterize or you hang out with the wrong folks, 351 00:24:55,920 --> 00:24:59,120 or you post negative commentary against the regime 352 00:24:59,200 --> 00:25:02,160 or the governmental policies, your credit score takes a hit. 353 00:25:02,240 --> 00:25:05,760 What that means is, in some cases, you can't qualify for certain jobs, 354 00:25:05,840 --> 00:25:08,840 you can't qualify for certain academic institutions or loans, 355 00:25:08,920 --> 00:25:12,600 or in some cases, are restricted in terms of where and when you can travel 356 00:25:12,680 --> 00:25:14,280 inside the country, let alone abroad. 357 00:25:14,360 --> 00:25:18,320 There's a certain bit of 1984 in terms of what you're seeing happening in China. 358 00:25:18,400 --> 00:25:22,720 There's a lot of debate to what extent this is being rolled out inside China, 359 00:25:22,800 --> 00:25:25,640 but there's no doubt that they are actively using 360 00:25:25,720 --> 00:25:31,400 Western-developed technologies that can be used for, in my opinion, 361 00:25:31,480 --> 00:25:32,880 for the good causes 362 00:25:32,960 --> 00:25:34,520 in terms of benefiting society. 363 00:25:34,600 --> 00:25:37,840 They're using it to restrict, control, and monitor their people. 364 00:25:45,840 --> 00:25:49,040 [narrator] As digital technology becomes more widespread, 365 00:25:49,120 --> 00:25:51,880 the opportunities for intelligence agencies 366 00:25:51,960 --> 00:25:54,720 to gather information grows as well. 367 00:25:54,800 --> 00:25:56,960 You can't go anywhere and do anything 368 00:25:57,040 --> 00:26:01,160 without leaving some trail or digital dust of who you are and where you've been, 369 00:26:01,240 --> 00:26:04,400 whether it's cookies that correlate back to your search results, 370 00:26:04,480 --> 00:26:08,000 whether it's travel patterns based on where you log into the Internet 371 00:26:08,080 --> 00:26:09,600 or where you carry your smartphone. 372 00:26:09,680 --> 00:26:11,720 Who would have thunk 50 years ago 373 00:26:11,800 --> 00:26:14,680 that everyone would voluntarily carry with them a beacon 374 00:26:14,760 --> 00:26:16,800 that would capture every last bit of their lives? 375 00:26:16,880 --> 00:26:19,280 We kind of have that, a cell phone, an Alexa, 376 00:26:19,360 --> 00:26:21,440 checking in on social media. 377 00:26:21,520 --> 00:26:25,720 That basically creates an overt playbook 378 00:26:25,800 --> 00:26:27,800 of what you're doing with your life. 379 00:26:29,240 --> 00:26:32,080 They pose challenges for the collection world. 380 00:26:32,160 --> 00:26:34,200 How do you collect this information? 381 00:26:34,280 --> 00:26:37,720 How do you filter the wheat from the chaff 382 00:26:37,800 --> 00:26:41,480 to get the high-tech information, or the high-end interest information 383 00:26:41,560 --> 00:26:43,800 that you want out of all of this data? 384 00:26:43,880 --> 00:26:45,280 it's a challenging future. 385 00:26:47,000 --> 00:26:51,280 [narrator] Electronic surveillance gives intelligence agencies insights 386 00:26:51,360 --> 00:26:55,640 into what is said, planned, and anticipated by adversaries, 387 00:26:55,720 --> 00:26:58,840 but because such huge quantities of communication 388 00:26:58,920 --> 00:27:00,560 now travel through the Internet, 389 00:27:00,640 --> 00:27:03,880 algorithms or other search methods have been developed 390 00:27:03,960 --> 00:27:06,920 to process large amounts of collected data 391 00:27:07,000 --> 00:27:09,880 to identify specific intelligence objectives 392 00:27:09,960 --> 00:27:12,280 like anticipating terrorist attacks 393 00:27:12,880 --> 00:27:17,440 and gaining the advantage on the foreign policy plans of adversaries. 394 00:27:18,760 --> 00:27:22,000 [Gosler] One thing that we have to do within the United States is make sure 395 00:27:22,080 --> 00:27:25,800 that all parts of the government work together as an integrated team. 396 00:27:25,880 --> 00:27:29,840 [Melton] So, at the Naval Academy the motto is, 397 00:27:29,920 --> 00:27:34,880 Ex tridens scientia, "Through knowledge, sea power." 398 00:27:34,960 --> 00:27:39,520 Well, I would say, through knowledge, intelligence services 399 00:27:39,600 --> 00:27:42,640 will become ever more efficient at spying, 400 00:27:43,240 --> 00:27:45,000 as well as at catching spies. 401 00:27:45,080 --> 00:27:47,840 [atmospheric music playing] 34827

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.