All language subtitles for The.UnXplained.S07E10.1080p.WEB.h264-EDITH_track3_[eng]

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:02,042 --> 00:00:03,042 WILLIAM SHATNER: Shadowy assassins 2 00:00:03,208 --> 00:00:05,417 who vanish into the crowd. 3 00:00:05,583 --> 00:00:09,708 Double agents who sell their own country's secrets. 4 00:00:10,875 --> 00:00:14,750 And coded messages hiding in plain sight. 5 00:00:17,458 --> 00:00:20,000 Throughout history, spies have played 6 00:00:20,167 --> 00:00:23,583 a unique role in shaping world events. 7 00:00:23,708 --> 00:00:27,958 And these secret agents work at the behest of an organization, 8 00:00:28,125 --> 00:00:30,708 a government or perhaps even a single leader. 9 00:00:30,875 --> 00:00:33,167 Their covert orders could range from 10 00:00:33,333 --> 00:00:35,083 simply collecting information 11 00:00:35,250 --> 00:00:37,833 or something as deadly serious 12 00:00:38,042 --> 00:00:40,208 as assassinating an enemy. 13 00:00:41,542 --> 00:00:45,333 Secrecy is critical to a spy's success, 14 00:00:45,542 --> 00:00:48,375 so how do these masters of deception fulfill 15 00:00:48,542 --> 00:00:51,625 their assignments without getting caught? 16 00:00:52,875 --> 00:00:55,792 Well, that is what we'll try and find out. 17 00:00:55,958 --> 00:00:58,125 ♪ ♪ 18 00:01:10,042 --> 00:01:13,250 The CIA, MI6 19 00:01:13,417 --> 00:01:15,500 and MSS. 20 00:01:15,583 --> 00:01:18,250 These are the foreign intelligence services 21 00:01:18,417 --> 00:01:21,083 for some of the most powerful countries in the world. 22 00:01:21,250 --> 00:01:24,125 These agencies, and hundreds of others, 23 00:01:24,292 --> 00:01:27,208 engage in clandestine operations 24 00:01:27,375 --> 00:01:30,250 to aid and protect their countries. 25 00:01:30,417 --> 00:01:33,000 For many, their mission is to gather 26 00:01:33,167 --> 00:01:35,958 the most closely guarded secrets of their enemies, 27 00:01:36,125 --> 00:01:39,417 and their secret weapons are often... 28 00:01:39,625 --> 00:01:42,083 spies. 29 00:01:42,208 --> 00:01:43,333 ASAF LUBIN: Spies are 30 00:01:43,542 --> 00:01:45,417 utilized by states to collect 31 00:01:45,583 --> 00:01:48,500 intelligence that is necessary to advance policymaking. 32 00:01:48,667 --> 00:01:51,375 From figuring out whether an adversary 33 00:01:51,542 --> 00:01:54,917 has nuclear weapons, to figuring out whether 34 00:01:55,083 --> 00:01:58,083 a leader of a foreign state is about to die. 35 00:01:58,292 --> 00:02:00,333 We have intelligence agencies that specialize in 36 00:02:00,417 --> 00:02:03,542 visual intelligence, say satellite imagery. 37 00:02:03,708 --> 00:02:06,375 We have intelligence agencies that specialize in 38 00:02:06,542 --> 00:02:08,292 the interception of communications. 39 00:02:08,458 --> 00:02:10,625 But there are spies that more commonly 40 00:02:10,792 --> 00:02:12,375 come to mind, which is 41 00:02:12,542 --> 00:02:15,250 the people at the front line, the individuals 42 00:02:15,417 --> 00:02:18,458 willing to put their lives at risk to share information. 43 00:02:19,500 --> 00:02:23,167 At the end of the day, it's a life of mystery and intrigue 44 00:02:23,375 --> 00:02:26,667 because the spy world is kind of its own domain. 45 00:02:26,875 --> 00:02:29,583 It remains this kind of puzzle or mystery 46 00:02:29,750 --> 00:02:32,667 that most people will not have exposure to 47 00:02:32,750 --> 00:02:36,792 beyond those few moments we read about in the newspaper. 48 00:02:38,542 --> 00:02:41,167 ANDREW BUSTAMANTE: Hollywood movies and books and TV 49 00:02:41,333 --> 00:02:44,917 have made it seem like spies are some kind of superhero. 50 00:02:45,125 --> 00:02:47,625 That is nothing like real espionage. 51 00:02:47,792 --> 00:02:49,000 The purpose of espionage 52 00:02:49,167 --> 00:02:51,083 is to be so secret 53 00:02:51,250 --> 00:02:53,167 that nobody even knows you're there. 54 00:02:53,333 --> 00:02:55,833 True professional espionage 55 00:02:56,000 --> 00:02:59,750 is in and out without anyone ever even knowing it happened. 56 00:02:59,917 --> 00:03:02,375 That makes your average spy 57 00:03:02,583 --> 00:03:05,417 much more like an average person. 58 00:03:05,625 --> 00:03:09,542 And what's required of a spy changes from day to day. 59 00:03:09,708 --> 00:03:11,750 One day, we're hunting terrorists. 60 00:03:11,917 --> 00:03:16,208 Sometime later, we're exchanging information in secret. 61 00:03:16,375 --> 00:03:18,750 Some days, we're fighting a war on drugs. 62 00:03:18,917 --> 00:03:21,833 Some days, we're fighting a war on misinformation. 63 00:03:22,000 --> 00:03:23,292 It's an incredible 64 00:03:23,417 --> 00:03:26,333 web of information and impact 65 00:03:26,458 --> 00:03:28,417 that the average person is not aware of. 66 00:03:29,875 --> 00:03:31,333 SHATNER: How can we ever hope 67 00:03:31,458 --> 00:03:33,583 to understand the mysterious world of espionage 68 00:03:33,708 --> 00:03:37,167 if it remains completely hidden from us? 69 00:03:37,292 --> 00:03:41,167 Well, every so often, information does come to light 70 00:03:41,375 --> 00:03:44,125 that illustrates how a single spy 71 00:03:44,250 --> 00:03:46,708 can change the course of history. 72 00:03:54,542 --> 00:03:58,417 A massive scientific complex is established in secret 73 00:03:58,583 --> 00:04:02,000 for the research and development of a truly devastating weapon. 74 00:04:02,208 --> 00:04:04,417 This laboratory becomes ground zero 75 00:04:04,542 --> 00:04:06,542 for the most consequential 76 00:04:06,708 --> 00:04:09,750 top secret military program ever devised. 77 00:04:10,750 --> 00:04:14,625 It's called the Manhattan Project. 78 00:04:14,833 --> 00:04:17,417 KAI BIRD: The Manhattan Project was this top secret, 79 00:04:17,542 --> 00:04:21,125 federally funded $2 billion program 80 00:04:21,208 --> 00:04:23,667 to explore whether it was possible to develop 81 00:04:23,833 --> 00:04:27,000 an atomic weapon 82 00:04:27,208 --> 00:04:28,792 in the midst of World War II. 83 00:04:28,917 --> 00:04:32,500 And they built this secret city in Los Alamos, 84 00:04:32,667 --> 00:04:35,583 gathering together chemists and engineers 85 00:04:35,750 --> 00:04:38,208 and physicists and other scientists 86 00:04:38,417 --> 00:04:42,125 into one spot so that these scientists can collaborate 87 00:04:42,333 --> 00:04:46,167 and fully converse inside the secret city 88 00:04:46,375 --> 00:04:48,167 to build this weapon. 89 00:04:48,375 --> 00:04:50,708 SHATNER: As history shows, these scientists 90 00:04:50,875 --> 00:04:54,958 would prove successful in creating the atomic bomb. 91 00:04:55,125 --> 00:04:57,917 But little did they know at the time 92 00:04:58,042 --> 00:04:59,708 there was a spy among them, 93 00:04:59,875 --> 00:05:03,250 sharing the program's most intimate secrets. 94 00:05:04,917 --> 00:05:07,583 His codename was "Rest," 95 00:05:07,750 --> 00:05:10,292 but his identity has since been revealed 96 00:05:10,458 --> 00:05:15,458 to be a German physicist named Klaus Fuchs. 97 00:05:15,625 --> 00:05:17,417 LUBIN: Klaus came from Germany, 98 00:05:17,583 --> 00:05:20,708 and because of his... his prior background as a physicist, 99 00:05:20,875 --> 00:05:22,167 he quickly got a job 100 00:05:22,375 --> 00:05:25,667 within the Manhattan Program in Los Alamos. 101 00:05:25,875 --> 00:05:28,417 And, unknown to the people there, 102 00:05:28,542 --> 00:05:30,458 Fuchs began to share information 103 00:05:30,625 --> 00:05:34,083 with the Soviets about the program. 104 00:05:34,250 --> 00:05:36,667 A U.S. counterintelligence program 105 00:05:36,875 --> 00:05:40,500 that involved decrypting Soviet communications 106 00:05:40,708 --> 00:05:43,333 revealed the scope of the information 107 00:05:43,500 --> 00:05:47,000 that Fuchs collected and shared with the Soviets. 108 00:05:47,125 --> 00:05:48,750 In his particular role 109 00:05:48,917 --> 00:05:52,333 as a lead scientist within the program and access 110 00:05:52,542 --> 00:05:54,292 to the development of the bomb, 111 00:05:54,500 --> 00:05:56,250 he was able to share 112 00:05:56,417 --> 00:05:58,500 pretty detailed technical information about 113 00:05:58,625 --> 00:06:00,833 the science that goes into 114 00:06:00,958 --> 00:06:03,583 the generation and enrichment of plutonium, 115 00:06:03,708 --> 00:06:07,250 which served a huge deal in advancing 116 00:06:07,417 --> 00:06:09,958 the Russians' capacities in those spaces. 117 00:06:10,958 --> 00:06:13,750 And he collected intelligence and shared intelligence 118 00:06:13,875 --> 00:06:17,000 for about seven years, until he was revealed. 119 00:06:18,333 --> 00:06:21,500 The greatest find in the history of espionage 120 00:06:21,667 --> 00:06:25,083 is the theft of the atomic secret. 121 00:06:25,208 --> 00:06:28,042 Klaus Fuchs pretty much shared the recipe 122 00:06:28,208 --> 00:06:30,042 with the Soviet Union. 123 00:06:30,208 --> 00:06:34,500 The Soviet Union was able to get a nuclear weapon 124 00:06:34,708 --> 00:06:36,167 roughly five years before they could have 125 00:06:36,375 --> 00:06:38,583 done it on their own. 126 00:06:38,750 --> 00:06:41,500 The moment they had the nuke, they were a world power. 127 00:06:41,708 --> 00:06:44,833 SHATNER: If one spy can alter the course of atomic history, 128 00:06:45,000 --> 00:06:48,708 how else has espionage shaped our world? 129 00:06:49,875 --> 00:06:53,500 Has secret intelligence informed nearly every 130 00:06:53,583 --> 00:06:56,375 major event in human history? 131 00:06:57,792 --> 00:06:59,167 BUSTAMANTE: You have to assume 132 00:06:59,333 --> 00:07:01,917 that you only know about five percent 133 00:07:02,042 --> 00:07:03,833 of all espionage operations. 134 00:07:04,042 --> 00:07:06,583 Every negotiation, every diplomatic agreement, 135 00:07:06,792 --> 00:07:08,667 every transition of power from one president 136 00:07:08,875 --> 00:07:11,000 to another president, for 167 countries, 137 00:07:11,208 --> 00:07:13,875 all over the world, over the course of decades, 138 00:07:14,042 --> 00:07:16,500 intelligence had a role to play in every one of those. 139 00:07:16,708 --> 00:07:19,000 So now, when you start to ask yourself 140 00:07:19,125 --> 00:07:21,167 about how the Soviet Union fell, 141 00:07:21,292 --> 00:07:22,542 and you start to ask yourself about 142 00:07:22,708 --> 00:07:25,000 how the end of Afghanistan happened, 143 00:07:25,167 --> 00:07:26,833 and the winning of Gulf War II, 144 00:07:26,958 --> 00:07:29,083 and the taking down of Saddam Hussein, 145 00:07:29,208 --> 00:07:33,333 you start to see these major instances in history 146 00:07:33,500 --> 00:07:36,667 where intelligence worked or failed. 147 00:07:36,833 --> 00:07:39,333 So, when you try to consider 148 00:07:39,458 --> 00:07:41,167 the impact that espionage has had 149 00:07:41,375 --> 00:07:44,333 over the long-term history of the world, 150 00:07:44,542 --> 00:07:46,875 you have to remember that 95% of what they've done, 151 00:07:47,042 --> 00:07:48,333 nobody knows about 152 00:07:48,542 --> 00:07:51,833 except for "need to know" secret circles. 153 00:07:52,042 --> 00:07:55,583 LINDSAY MORAN: It's really pretty chilling if you think about the effect 154 00:07:55,708 --> 00:07:59,458 that just a single spy or intelligence source 155 00:07:59,583 --> 00:08:01,667 can have on world events. 156 00:08:01,792 --> 00:08:03,167 And the irony is that 157 00:08:03,333 --> 00:08:05,208 we often don't know 158 00:08:05,417 --> 00:08:07,833 what that impact is until many years 159 00:08:08,042 --> 00:08:11,792 or even decades later, or sometimes, ever at all. 160 00:08:12,750 --> 00:08:16,833 Even historians looking back 161 00:08:17,042 --> 00:08:19,292 on historical events or geopolitical movements, 162 00:08:19,458 --> 00:08:21,833 may never have access 163 00:08:22,000 --> 00:08:26,292 to the behind-the-scenes intrigue and espionage 164 00:08:26,417 --> 00:08:28,500 that took place, or the machinations 165 00:08:28,667 --> 00:08:30,792 of various intelligence organizations. 166 00:08:30,917 --> 00:08:35,250 But for sure, spies really can change the course of history. 167 00:08:46,833 --> 00:08:48,917 SHATNER: This sleek, modern building 168 00:08:49,083 --> 00:08:51,667 houses over 7,000 unique artifacts 169 00:08:51,750 --> 00:08:54,292 from the history of espionage. 170 00:08:54,458 --> 00:08:56,667 And among them are ingenious devices 171 00:08:56,833 --> 00:08:58,625 created to hide things, 172 00:08:58,792 --> 00:09:01,458 record secret conversations, 173 00:09:01,625 --> 00:09:07,000 and some are even meant to kill. 174 00:09:07,167 --> 00:09:09,167 The International Spy Museum 175 00:09:09,375 --> 00:09:11,500 houses the world's largest collection 176 00:09:11,667 --> 00:09:14,750 of intelligence and espionage-related artifacts. 177 00:09:14,875 --> 00:09:18,000 We have all kinds of ingenious devices 178 00:09:18,167 --> 00:09:20,667 to do all type of different types of stuff. 179 00:09:20,875 --> 00:09:23,167 So, a lot of the gadgets that we see 180 00:09:23,333 --> 00:09:25,208 are there to try to help 181 00:09:25,375 --> 00:09:26,833 to be a more effective agent, 182 00:09:26,917 --> 00:09:30,708 to recruit spies better, to steal secrets better. 183 00:09:30,875 --> 00:09:33,625 And we've got a fantastic 184 00:09:33,792 --> 00:09:35,667 James Bond collection. 185 00:09:36,583 --> 00:09:37,958 Some of the James Bond movies 186 00:09:38,167 --> 00:09:40,458 have actually influenced the development 187 00:09:40,542 --> 00:09:42,958 of gadgets in the CIA. 188 00:09:43,125 --> 00:09:46,833 CIA directors come out of the movie theater 189 00:09:47,042 --> 00:09:49,667 and say, "Guys, do we have anything like this? 190 00:09:49,875 --> 00:09:52,167 And if we don't, can someone get on it?" 191 00:09:52,250 --> 00:09:55,375 So we know that there's a two-way interaction between 192 00:09:55,542 --> 00:09:58,958 the gadgets in fiction and in reality. 193 00:10:00,750 --> 00:10:02,417 When you look at spy gadgets, a lot of them 194 00:10:02,625 --> 00:10:04,750 are weapons of one thing or another. 195 00:10:04,917 --> 00:10:06,958 They're always trying to come up with new gadgets. 196 00:10:08,000 --> 00:10:11,333 So, the KGB came up with a lipstick gun, 197 00:10:11,542 --> 00:10:13,917 which was a little 4.5 millimeter bullet 198 00:10:14,083 --> 00:10:16,083 that could be fired from a lipstick tube. 199 00:10:16,208 --> 00:10:18,875 The CIA had an ice gun, 200 00:10:19,042 --> 00:10:22,583 which fired a super-cool needle of ice, 201 00:10:22,750 --> 00:10:24,458 preferably through your opponent's heart. 202 00:10:24,625 --> 00:10:26,708 That was all around 1960. 203 00:10:26,875 --> 00:10:29,042 And then, there are famous exploding cigars, 204 00:10:29,208 --> 00:10:32,667 with which they were going to blow off Fidel Castro's head. 205 00:10:32,875 --> 00:10:34,875 But to the extent that secret weapons, 206 00:10:35,042 --> 00:10:37,125 spy weapons programs exist, 207 00:10:37,292 --> 00:10:40,792 they're secret, which is why you don't know about them, 208 00:10:40,958 --> 00:10:42,583 because you're not supposed to. 209 00:10:43,667 --> 00:10:44,833 SHATNER: Over the years, some spy gadgets 210 00:10:44,958 --> 00:10:46,500 have either been declassified 211 00:10:46,708 --> 00:10:48,500 or leaked to the public. 212 00:10:48,625 --> 00:10:51,458 However, what's less clear 213 00:10:51,625 --> 00:10:53,208 is whether any of these fantastical 214 00:10:53,375 --> 00:10:55,375 and frankly bizarre devices 215 00:10:55,542 --> 00:10:58,083 were ever successfully put to use. 216 00:10:59,208 --> 00:11:01,417 But there is a curious instrument of death 217 00:11:01,542 --> 00:11:02,917 that many believe was responsible 218 00:11:03,125 --> 00:11:05,792 for one of the most infamous and unsolved 219 00:11:05,958 --> 00:11:08,542 assassinations of the 20th century: 220 00:11:08,708 --> 00:11:11,417 The 1978 murder 221 00:11:11,583 --> 00:11:14,917 of British journalist Georgi Markov. 222 00:11:16,083 --> 00:11:17,833 JACK BARSKY: Markov was a dissident 223 00:11:18,000 --> 00:11:20,500 in Bulgaria, and he was loud. 224 00:11:20,625 --> 00:11:23,458 And, uh, he... he had to flee. 225 00:11:23,625 --> 00:11:25,083 He wound up in the United Kingdom, 226 00:11:25,250 --> 00:11:28,583 and he got employed by, uh, the BBC 227 00:11:28,708 --> 00:11:31,625 and Radio Free Europe, 228 00:11:31,750 --> 00:11:34,917 which we absolutely hated because it was 229 00:11:35,083 --> 00:11:38,875 Western propaganda directed to the East. 230 00:11:39,042 --> 00:11:40,708 And he got louder and louder, 231 00:11:40,875 --> 00:11:42,500 and, uh, the Bulgarians, 232 00:11:42,625 --> 00:11:43,833 I think it was the president, 233 00:11:44,000 --> 00:11:45,208 he wanted to get rid of this guy. 234 00:11:46,333 --> 00:11:48,375 SHATNER: On September 7, 1978, 235 00:11:48,542 --> 00:11:50,292 at around 1:30 p.m., 236 00:11:50,458 --> 00:11:53,292 Markov was about to catch a bus 237 00:11:53,458 --> 00:11:55,500 on the Waterloo Bridge in London, 238 00:11:55,667 --> 00:11:59,375 when something very strange happens. 239 00:12:00,417 --> 00:12:03,333 NIGEL WEST: Georgi Markov bumps into somebody 240 00:12:03,542 --> 00:12:04,667 at a bus stop, 241 00:12:04,833 --> 00:12:05,875 and this individual 242 00:12:06,000 --> 00:12:07,333 is carrying an umbrella. 243 00:12:08,625 --> 00:12:10,042 And Georgi Markov feels 244 00:12:10,208 --> 00:12:13,667 some pain in his leg. 245 00:12:13,833 --> 00:12:16,500 And the individual concerned 246 00:12:16,667 --> 00:12:19,708 mutters an apology and climbs into a taxi. 247 00:12:19,833 --> 00:12:21,958 And Markov, from that moment onwards, 248 00:12:22,125 --> 00:12:24,167 becomes ill. 249 00:12:24,333 --> 00:12:27,208 He goes to hospital later that night, 250 00:12:27,375 --> 00:12:28,708 and a few days later, 251 00:12:28,875 --> 00:12:34,125 he succumbs to a very severe infection. 252 00:12:36,667 --> 00:12:39,125 SPENCE: Doctors who've examined his body 253 00:12:39,292 --> 00:12:41,917 found red swelling on the back of his thigh 254 00:12:42,083 --> 00:12:45,458 and, in a microscopic examination 255 00:12:45,625 --> 00:12:49,333 of the flesh from the wound site, 256 00:12:49,500 --> 00:12:50,958 they discovered a tiny, 257 00:12:51,083 --> 00:12:55,958 tiny, less than two-millimeter size little ball, 258 00:12:56,125 --> 00:12:58,792 mostly made out of platinum, 259 00:12:58,958 --> 00:13:01,583 which had holes drilled in it 260 00:13:01,750 --> 00:13:04,333 as a means to administer a poison. 261 00:13:04,542 --> 00:13:08,375 The poison, which has never been officially identified, 262 00:13:08,542 --> 00:13:10,667 was most likely ricin, 263 00:13:10,833 --> 00:13:12,917 which is a highly toxic substance, 264 00:13:13,083 --> 00:13:15,750 which is refined from castor beans. 265 00:13:16,875 --> 00:13:19,500 SHATNER: How was this deadly platinum ball 266 00:13:19,708 --> 00:13:22,125 implanted into Georgi Markov? 267 00:13:22,250 --> 00:13:25,042 Answers were not easy to come by, but then, 268 00:13:25,208 --> 00:13:28,708 investigators remembered one seemingly minor detail 269 00:13:28,875 --> 00:13:32,250 that may provide all the answers. 270 00:13:32,458 --> 00:13:34,000 SPENCE: They thought, "Ah, that umbrella. 271 00:13:34,208 --> 00:13:36,000 Eh, what was that all about?" 272 00:13:36,208 --> 00:13:38,667 And later, we learn that one of the things that both 273 00:13:38,875 --> 00:13:40,833 the KGB and the Bulgarians had come up with 274 00:13:41,000 --> 00:13:42,500 was an umbrella gun. 275 00:13:42,667 --> 00:13:45,667 They had a whole lab working on this. 276 00:13:45,750 --> 00:13:48,500 And there was a little tiny capsule, 277 00:13:48,667 --> 00:13:49,792 it was in the tip of the umbrella, 278 00:13:49,958 --> 00:13:51,417 which had a needle on it, 279 00:13:51,542 --> 00:13:54,792 and you'd just poke somebody and then walked away. 280 00:13:56,167 --> 00:13:58,708 BUSTAMANTE: How do you kill somebody in plain daylight, 281 00:13:58,875 --> 00:14:01,000 in public, without anybody knowing about it? 282 00:14:01,167 --> 00:14:02,667 And the answer is that you find a way 283 00:14:02,875 --> 00:14:04,417 to create some sort of device, like an umbrella, 284 00:14:04,542 --> 00:14:07,167 that blends in every day, 285 00:14:07,292 --> 00:14:09,917 but can still deliver a lethal dose when you need it to. 286 00:14:10,083 --> 00:14:10,833 -(umbrella clicks) -(man grunts) 287 00:14:10,958 --> 00:14:12,375 This is exactly what makes 288 00:14:12,542 --> 00:14:14,083 spy agencies and spy tech 289 00:14:14,250 --> 00:14:16,208 something of interest and renown, 290 00:14:16,375 --> 00:14:18,292 because there's a great deal of effort, 291 00:14:18,458 --> 00:14:19,833 a great deal of investment 292 00:14:19,958 --> 00:14:22,167 that's put into making a clandestine weapon. 293 00:14:23,208 --> 00:14:26,792 SHATNER: The umbrella suspected of killing Georgi Markov 294 00:14:26,958 --> 00:14:29,417 was never recovered, so investigators 295 00:14:29,583 --> 00:14:31,667 had no way to definitively confirm 296 00:14:31,875 --> 00:14:34,500 such a device was responsible for his murder. 297 00:14:35,542 --> 00:14:39,208 But as far as the identity of the mysterious assassin 298 00:14:39,375 --> 00:14:40,750 who bumped into Markov, 299 00:14:40,958 --> 00:14:44,500 well... that's another mystery. 300 00:14:45,583 --> 00:14:47,917 BARSKY: When it comes to assassinating people, 301 00:14:48,083 --> 00:14:50,875 we know that the KGB did quite a... quite a bit of that, 302 00:14:51,042 --> 00:14:53,333 and we know that the Russian intelligence does it now, too. 303 00:14:53,542 --> 00:14:55,167 There's an arsenal of weapons. 304 00:14:55,333 --> 00:14:59,125 And Markov was a very loud dissident. 305 00:14:59,292 --> 00:15:02,375 So, he was an enemy of the revolution, 306 00:15:02,542 --> 00:15:04,375 and he had to be killed. 307 00:15:04,542 --> 00:15:06,667 But the man who was seen 308 00:15:06,833 --> 00:15:09,667 to stick that umbrella into Markov's leg, 309 00:15:09,833 --> 00:15:11,375 I think he got away with this. 310 00:15:13,417 --> 00:15:16,292 ANDREW HAMMOND: What history says about the assassination of Georgi Markov 311 00:15:16,417 --> 00:15:19,333 is a little similar to "Who was Jack the Ripper?" 312 00:15:19,500 --> 00:15:21,125 "Who killed JFK?" 313 00:15:21,250 --> 00:15:23,083 What's the final definitive story? 314 00:15:23,250 --> 00:15:26,208 Hopefully, we'll know one day, maybe we never will. 315 00:15:27,542 --> 00:15:29,417 SHATNER: Today, a replica of the notorious umbrella 316 00:15:29,625 --> 00:15:33,250 hangs in the International Spy Museum's collection. 317 00:15:33,417 --> 00:15:35,708 And while it can never be proven that a similar device 318 00:15:35,875 --> 00:15:38,833 was used to poison Georgi Markov, 319 00:15:39,000 --> 00:15:40,667 one thing is certain: 320 00:15:40,833 --> 00:15:43,333 The deadly tools of spy craft 321 00:15:43,542 --> 00:15:45,542 could be made to look like anything, 322 00:15:45,708 --> 00:15:47,333 and you wouldn't know it 323 00:15:47,542 --> 00:15:50,583 until it's too late. 324 00:15:52,417 --> 00:15:53,583 SPENCE: In terms of 325 00:15:53,750 --> 00:15:55,333 what could be future spy weapons, 326 00:15:55,500 --> 00:15:57,750 secret spy gadgets they could come up with, 327 00:15:57,875 --> 00:16:01,708 well, one of them is tiny, tiny drones 328 00:16:01,875 --> 00:16:04,042 that could fly inside you, perhaps, 329 00:16:04,208 --> 00:16:07,458 administer poisons, carry tiny cameras. 330 00:16:07,583 --> 00:16:10,250 The use of frequency weapons might be something else. 331 00:16:10,417 --> 00:16:14,250 Essentially, some sort of energy beam 332 00:16:14,417 --> 00:16:17,125 which is being directed at people, 333 00:16:17,292 --> 00:16:20,000 affecting the brain in some way, 334 00:16:20,125 --> 00:16:22,458 which would create feelings of disorientation, 335 00:16:22,625 --> 00:16:24,583 and if it managed to 336 00:16:24,750 --> 00:16:26,875 discombobulate the right targets, 337 00:16:27,042 --> 00:16:28,833 it could interfere with 338 00:16:29,000 --> 00:16:31,500 their ability to perform their duties. 339 00:16:32,750 --> 00:16:35,042 So, energy weapons could be useful 340 00:16:35,208 --> 00:16:37,125 in the world of spies. 341 00:16:37,292 --> 00:16:39,750 But yes, there's a secret war to always try 342 00:16:39,917 --> 00:16:41,667 to be one step ahead of your opponent 343 00:16:41,833 --> 00:16:45,167 by coming up with something that they hadn't thought of... yet. 344 00:16:45,333 --> 00:16:49,083 And it can be someone passing you by with an umbrella. 345 00:16:50,250 --> 00:16:53,042 Was the assassination of Georgi Markov 346 00:16:53,208 --> 00:16:55,458 the work of Soviet intelligence? 347 00:16:55,667 --> 00:16:58,167 Like the top secret nature of espionage itself, 348 00:16:58,333 --> 00:17:00,375 there's a lot we may never know. 349 00:17:01,875 --> 00:17:04,042 But there is one spy mystery 350 00:17:04,208 --> 00:17:08,125 that has intelligence officers worried, even now. 351 00:17:08,333 --> 00:17:10,833 It involves a foreign asset 352 00:17:10,958 --> 00:17:13,333 who infiltrated the American government 353 00:17:13,500 --> 00:17:17,375 intent on stealing national secrets. 354 00:17:26,833 --> 00:17:28,292 SHATNER: President Harry Truman 355 00:17:28,375 --> 00:17:32,167 establishes the Central Intelligence Agency. 356 00:17:32,333 --> 00:17:34,167 In the wake of World War II, 357 00:17:34,292 --> 00:17:36,417 and with the rise of atomic weaponry, 358 00:17:36,583 --> 00:17:40,667 a new covert war is about to begin 359 00:17:40,833 --> 00:17:44,000 between the United States and the Soviet Union. 360 00:17:44,167 --> 00:17:47,875 This unprecedented era of espionage 361 00:17:48,042 --> 00:17:51,833 from 1947 to 1991 is known 362 00:17:52,000 --> 00:17:53,708 as the Cold War. 363 00:17:55,458 --> 00:17:59,542 LUBIN: At the start of the Cold War as we know it in the 1950s, 364 00:17:59,708 --> 00:18:01,250 the U.S. realized that it needed to advance 365 00:18:01,417 --> 00:18:03,500 its internal security measures. 366 00:18:03,625 --> 00:18:05,167 This is why Truman 367 00:18:05,375 --> 00:18:09,250 would ultimately generate a presidential executive order 368 00:18:09,375 --> 00:18:13,000 on confidential materials, 369 00:18:13,167 --> 00:18:15,208 which still, to this day, is the way by which 370 00:18:15,375 --> 00:18:18,250 we set different degrees of confidentiality 371 00:18:18,417 --> 00:18:21,333 around secret documents here in the United States. 372 00:18:22,375 --> 00:18:24,500 SHATNER: During the Cold War, both the CIA 373 00:18:24,708 --> 00:18:26,500 and the Soviet Union's KGB 374 00:18:26,708 --> 00:18:29,375 employed spies to steal each other's 375 00:18:29,583 --> 00:18:31,000 national secrets. 376 00:18:31,167 --> 00:18:33,292 And while any civilian could be recruited 377 00:18:33,500 --> 00:18:36,583 to spy on their home country for the other side, 378 00:18:36,708 --> 00:18:40,000 even more valuable were those already working 379 00:18:40,167 --> 00:18:42,167 in the intelligence community. 380 00:18:42,375 --> 00:18:45,583 These turncoats are known as... 381 00:18:45,750 --> 00:18:47,333 double agents. 382 00:18:47,542 --> 00:18:48,958 HAMMOND: To be a double agent, 383 00:18:49,125 --> 00:18:51,708 for example, I'm an agent. 384 00:18:51,875 --> 00:18:54,292 I'm working with the CIA over here. 385 00:18:54,417 --> 00:18:57,333 But I'm also working with the KGB over here. 386 00:18:57,542 --> 00:19:00,292 I'm a double agent in the middle. 387 00:19:00,458 --> 00:19:03,958 But it's quite often used in shorthand to refer 388 00:19:04,125 --> 00:19:06,167 to anybody who works in this world 389 00:19:06,333 --> 00:19:08,667 who also works for the other side. 390 00:19:08,792 --> 00:19:12,750 LUBIN: There will be a closed universe of individuals in the know 391 00:19:12,875 --> 00:19:14,500 about particular secrets, 392 00:19:14,667 --> 00:19:17,458 and you need to penetrate those kinds of closed networks. 393 00:19:17,625 --> 00:19:20,667 And so, the best way to do that is by 394 00:19:20,792 --> 00:19:22,375 turning a double agent, 395 00:19:22,542 --> 00:19:25,667 a person, into an information sharer. 396 00:19:27,708 --> 00:19:29,458 SHATNER: The U.S. intelligence community 397 00:19:29,542 --> 00:19:33,042 is made up of 18 different agencies and organizations. 398 00:19:33,208 --> 00:19:34,958 So, we have to wonder, 399 00:19:35,125 --> 00:19:38,250 are there double agents among them, 400 00:19:38,375 --> 00:19:41,125 sharing our most closely guarded secrets 401 00:19:41,250 --> 00:19:42,750 with our enemies? 402 00:19:42,917 --> 00:19:47,125 Remarkably, the answer is yes. 403 00:19:48,875 --> 00:19:52,583 And many consider the most damaging double agent ever 404 00:19:52,750 --> 00:19:55,667 discovered was a 31-year veteran of the CIA 405 00:19:55,833 --> 00:19:58,792 named Aldrich Ames. 406 00:19:58,917 --> 00:20:01,667 WEST: Aldrich Ames was a counterintelligence officer 407 00:20:01,792 --> 00:20:03,667 in the directorate 408 00:20:03,833 --> 00:20:05,042 of operations. 409 00:20:05,250 --> 00:20:06,833 And he was a senior individual 410 00:20:07,000 --> 00:20:08,125 who in 1985, 411 00:20:08,292 --> 00:20:10,083 as a result of a bad divorce, 412 00:20:10,250 --> 00:20:12,167 was short of money, 413 00:20:12,333 --> 00:20:14,333 and he sold out to the Soviets. 414 00:20:14,417 --> 00:20:17,458 He just simply went to the embassy, 415 00:20:17,625 --> 00:20:20,333 asked to speak to a KGB officer, 416 00:20:20,542 --> 00:20:24,458 and then sold information through letters, 417 00:20:24,583 --> 00:20:27,000 which was highly classified operations, 418 00:20:27,167 --> 00:20:31,375 and a large number of identities 419 00:20:31,583 --> 00:20:36,208 who were people who had worked either for the FBI or the CIA 420 00:20:36,375 --> 00:20:39,750 in the Soviet embassy in Washington, D.C. 421 00:20:41,458 --> 00:20:43,000 MORAN: There were suspicions 422 00:20:43,167 --> 00:20:46,833 that there was a spy within the CIA 423 00:20:47,000 --> 00:20:49,292 because in the 1980s, 424 00:20:49,458 --> 00:20:52,500 many of our Russian sources 425 00:20:52,708 --> 00:20:53,833 in Russia 426 00:20:54,042 --> 00:20:55,583 started kind of dropping like flies. 427 00:20:55,750 --> 00:21:00,375 And this set off alarm bells at the CIA. 428 00:21:00,542 --> 00:21:04,292 And so an investigation was launched. 429 00:21:04,458 --> 00:21:08,333 But, bizarrely, it took many, many years to realize 430 00:21:08,542 --> 00:21:10,167 that it was Aldrich Ames, 431 00:21:10,333 --> 00:21:13,375 even though Aldrich Ames displayed 432 00:21:13,583 --> 00:21:15,417 many of the characteristics 433 00:21:15,583 --> 00:21:18,958 of what would be a viable target for recruitment. 434 00:21:19,125 --> 00:21:22,333 He had a known problem with alcohol. 435 00:21:22,542 --> 00:21:27,625 He had married a Colombian woman who had very expensive tastes. 436 00:21:27,750 --> 00:21:30,750 He bought a house in Virginia with cash 437 00:21:30,917 --> 00:21:34,000 for $540,000. 438 00:21:34,208 --> 00:21:36,500 He bought a Jaguar. 439 00:21:36,708 --> 00:21:38,958 He started to dress really well. 440 00:21:39,125 --> 00:21:40,625 He got new teeth. 441 00:21:40,833 --> 00:21:45,583 And all of these are pretty obvious indicators 442 00:21:45,792 --> 00:21:49,958 that someone is working for a foreign intelligence service 443 00:21:50,083 --> 00:21:52,917 because he couldn't afford all that on his CIA salary. 444 00:21:53,917 --> 00:21:56,000 Aldrich Ames is one of the most famous 445 00:21:56,125 --> 00:21:57,833 CIA compromises of all times. 446 00:21:58,000 --> 00:22:00,708 He went many, many years clandestinely acquiring 447 00:22:00,875 --> 00:22:02,625 and giving information to the Russians 448 00:22:02,708 --> 00:22:05,417 until his ultimate arrest in the 1990s. 449 00:22:06,500 --> 00:22:08,458 It's very difficult to be able to quantify 450 00:22:08,625 --> 00:22:11,333 the amount of damage that Aldrich Ames did. 451 00:22:11,542 --> 00:22:14,917 We know that CIA spies were systematically killed. 452 00:22:15,125 --> 00:22:16,500 And even to this day, 453 00:22:16,667 --> 00:22:19,167 CIA is always training new recruits 454 00:22:19,375 --> 00:22:21,042 to understand Aldrich Ames 455 00:22:21,208 --> 00:22:22,333 to make sure that they don't have 456 00:22:22,542 --> 00:22:24,458 another instance like that happen again. 457 00:22:24,625 --> 00:22:28,208 SHATNER: Aldrich Ames was sentenced to life in prison. 458 00:22:28,333 --> 00:22:30,750 And his wife, Rosario, got five years for aiding 459 00:22:30,917 --> 00:22:34,958 her husband in his crimes against the United States. 460 00:22:36,000 --> 00:22:39,000 But Ames was not the only double agent discovered inside 461 00:22:39,167 --> 00:22:41,958 an American intelligence agency. 462 00:22:42,125 --> 00:22:43,667 In 2001, 463 00:22:43,875 --> 00:22:48,500 an FBI agent named Robert Hanssen was arrested 464 00:22:48,708 --> 00:22:50,500 for selling highly classified information 465 00:22:50,625 --> 00:22:53,333 to Russia for over 20 years. 466 00:22:53,458 --> 00:22:55,667 And it begs an urgent question: 467 00:22:55,792 --> 00:22:58,833 How many more double agents might be operating 468 00:22:58,958 --> 00:23:01,292 within the American intelligence community 469 00:23:01,458 --> 00:23:04,667 right now that have never been caught? 470 00:23:05,708 --> 00:23:08,250 LUBIN: It is very likely that there is a Russian double agent 471 00:23:08,417 --> 00:23:10,667 within the U.S. government today. 472 00:23:10,833 --> 00:23:12,625 In the same way, it is very likely 473 00:23:12,792 --> 00:23:14,208 that there is a double agent 474 00:23:14,375 --> 00:23:15,958 working for the Chinese government 475 00:23:16,125 --> 00:23:19,750 or the Iranian government or the North Korean government. 476 00:23:19,875 --> 00:23:22,250 The United States has many enemies around the world, 477 00:23:22,417 --> 00:23:24,667 and those enemies are interested in gathering 478 00:23:24,792 --> 00:23:27,708 intimate information about U.S. doings. 479 00:23:28,708 --> 00:23:30,292 BUSTAMANTE: It's very uncomfortable to admit, 480 00:23:30,458 --> 00:23:32,000 but one thing that CIA officers are taught 481 00:23:32,208 --> 00:23:33,667 right out of the gates 482 00:23:33,833 --> 00:23:35,875 is that you must always assume at any given time 483 00:23:36,042 --> 00:23:37,667 that the CIA and the FBI are 484 00:23:37,792 --> 00:23:39,625 penetrated by a foreign intelligence service. 485 00:23:40,542 --> 00:23:42,292 We have to assume that. 486 00:23:42,417 --> 00:23:44,667 If we're lucky, there's only one. 487 00:23:45,667 --> 00:23:48,042 Probability-wise, there is more than one. 488 00:23:49,208 --> 00:23:51,500 Could there really be a foreign spy 489 00:23:51,667 --> 00:23:55,458 deeply embedded in a U.S. intelligence agency? 490 00:23:55,625 --> 00:23:59,417 Unraveling this mystery is truly a matter of national security 491 00:23:59,625 --> 00:24:02,625 because gaining secret information on an enemy 492 00:24:02,792 --> 00:24:05,500 can quickly shift the balance of global power. 493 00:24:05,625 --> 00:24:07,625 Such was the case in World War II, 494 00:24:07,708 --> 00:24:10,458 when Allied forces were convinced 495 00:24:10,625 --> 00:24:12,583 that a German double agent was leaking 496 00:24:12,708 --> 00:24:14,500 D-Day plans to the Nazis, 497 00:24:14,708 --> 00:24:18,083 one letter at a time. 498 00:24:26,125 --> 00:24:29,042 SHATNER: As World War II rages across Europe, 499 00:24:29,208 --> 00:24:31,542 the Allied forces spent five months 500 00:24:31,750 --> 00:24:34,292 planning a top secret invasion 501 00:24:34,417 --> 00:24:37,708 to recapture the French coastal town of Dieppe. 502 00:24:40,417 --> 00:24:42,000 But on August 19th, 503 00:24:42,167 --> 00:24:45,083 as the Allies began their surprise assault... 504 00:24:46,583 --> 00:24:48,458 ...it seems that somehow 505 00:24:48,625 --> 00:24:51,708 the Germans knew they were coming. 506 00:24:53,792 --> 00:24:57,750 McMAHON: The attack on Dieppe was a disaster for the Allies. 507 00:24:57,917 --> 00:25:01,167 Something like half of the 6,000 troops 508 00:25:01,375 --> 00:25:03,250 who land are either killed 509 00:25:03,417 --> 00:25:05,500 or taken prisoner. 510 00:25:05,667 --> 00:25:07,667 And so the concern was 511 00:25:07,875 --> 00:25:10,792 that classified information was being sent 512 00:25:10,958 --> 00:25:13,000 to the Axis powers, to the Nazis. 513 00:25:14,208 --> 00:25:15,833 And that using code breakers 514 00:25:16,042 --> 00:25:17,333 or spies, 515 00:25:17,500 --> 00:25:19,667 the attack had been foiled, 516 00:25:19,833 --> 00:25:22,667 had been discovered by the Axis powers. 517 00:25:23,708 --> 00:25:26,333 GENTILE: The Allies are repelled by the Nazis 518 00:25:26,458 --> 00:25:27,625 and the mission is a failure. 519 00:25:27,792 --> 00:25:30,625 And then people wanted to know why. 520 00:25:31,667 --> 00:25:33,333 The defeat was so stunning 521 00:25:33,500 --> 00:25:38,083 that British intelligence MI5 started looking for reasons. 522 00:25:38,250 --> 00:25:42,000 How did the Nazis know the invasion was happening? 523 00:25:42,167 --> 00:25:45,333 So it was suspected that there could be a spy 524 00:25:45,458 --> 00:25:47,250 sending messages to the Nazis 525 00:25:47,417 --> 00:25:49,625 to alert them of upcoming attacks. 526 00:25:50,708 --> 00:25:52,333 SHATNER: After the failed Dieppe invasion, 527 00:25:52,542 --> 00:25:55,333 British intelligence launched an investigation 528 00:25:55,500 --> 00:25:59,167 to find a potential Nazi spy in their midst. 529 00:25:59,333 --> 00:26:04,500 And in the process, they noticed something rather peculiar. 530 00:26:04,708 --> 00:26:07,708 Just two days before the surprise invasion on Dieppe, 531 00:26:07,875 --> 00:26:10,625 in the British newspaper The Daily Telegraph 532 00:26:10,792 --> 00:26:15,625 a curious clue appeared in that day's crossword puzzle. 533 00:26:15,792 --> 00:26:20,083 Around August 18, 1942, something very strange happened 534 00:26:20,292 --> 00:26:23,500 in the Telegraph's crossword. 535 00:26:23,667 --> 00:26:26,375 The crossword puzzle clue was "A French port." 536 00:26:26,542 --> 00:26:28,375 The answer was Dieppe. 537 00:26:28,542 --> 00:26:30,042 The big question was, 538 00:26:30,208 --> 00:26:32,500 was the word Dieppe in the crossword puzzle innocent? 539 00:26:32,708 --> 00:26:35,458 Or was it a warning to the Nazis 540 00:26:35,625 --> 00:26:37,833 alerting them that an attack was imminent? 541 00:26:38,000 --> 00:26:41,500 Is it possible that the Dieppe attack failed 542 00:26:41,667 --> 00:26:44,208 because of that crossword puzzle answer? 543 00:26:45,250 --> 00:26:47,583 SHATNER: Was a spy sending top secret Allied intelligence 544 00:26:47,708 --> 00:26:49,458 to the Nazis 545 00:26:49,583 --> 00:26:52,125 through crossword puzzles? 546 00:26:53,167 --> 00:26:55,667 After interrogating the creator of the crossword, 547 00:26:55,833 --> 00:26:59,333 a mild-mannered school teacher named Leonard Dawe, 548 00:26:59,542 --> 00:27:01,167 British intelligence concluded 549 00:27:01,333 --> 00:27:03,250 that the puzzle's use of the word "Dieppe..." 550 00:27:04,875 --> 00:27:08,125 ...was nothing more than a "remarkable coincidence." 551 00:27:08,250 --> 00:27:12,167 It seemed the case was closed until two years later, 552 00:27:12,375 --> 00:27:13,708 when code words started 553 00:27:13,917 --> 00:27:16,958 to appear in the newspaper's puzzle again. 554 00:27:19,208 --> 00:27:23,333 McMAHON: In 1944, the Allies were planning the D-Day invasion 555 00:27:23,500 --> 00:27:26,417 amidst a huge blanket of secrecy. 556 00:27:26,542 --> 00:27:28,458 And once again... (chuckles) 557 00:27:28,667 --> 00:27:31,000 the Daily Telegraph crossword 558 00:27:31,208 --> 00:27:32,958 starts spitting out 559 00:27:33,125 --> 00:27:36,833 information that should not be in the public domain. 560 00:27:37,000 --> 00:27:39,750 GENTILE: About three weeks before the invasion, 561 00:27:39,917 --> 00:27:42,750 in the Daily Telegraph, in the crossword puzzle, 562 00:27:42,917 --> 00:27:45,625 the code word "Utah" appears. 563 00:27:45,750 --> 00:27:50,083 Then a few days later, the code word "Omaha" appears. 564 00:27:50,208 --> 00:27:53,292 These are the two beaches where the American forces will land. 565 00:27:54,458 --> 00:27:55,833 Then the next puzzle, 566 00:27:56,000 --> 00:27:58,667 the code word "Overlord" appears. 567 00:27:58,875 --> 00:28:01,917 That's the name of the entire mission. 568 00:28:02,917 --> 00:28:04,542 This is becoming terrifying. 569 00:28:04,750 --> 00:28:07,167 Then the word "Neptune" appears. 570 00:28:07,292 --> 00:28:12,375 That's the code word for the British warships for D-Day. 571 00:28:12,542 --> 00:28:14,958 And then the word "Mulberry" appears. 572 00:28:15,125 --> 00:28:17,833 That's the code word for the portable docks 573 00:28:18,042 --> 00:28:20,667 that were built across the channel. 574 00:28:20,833 --> 00:28:22,667 When these code words started appearing, 575 00:28:22,750 --> 00:28:24,833 it-it was too much of a coincidence. 576 00:28:24,958 --> 00:28:27,708 MI5 were gonna get to the bottom of it. 577 00:28:27,875 --> 00:28:29,417 Especially after Dieppe. 578 00:28:30,542 --> 00:28:32,833 Once again, their search eventually led them 579 00:28:33,042 --> 00:28:36,167 to the author of the puzzle, Leonard Dawe. 580 00:28:36,375 --> 00:28:38,500 Is this the Nazi spy? 581 00:28:38,667 --> 00:28:40,792 And finally, it was determined 582 00:28:40,917 --> 00:28:42,833 that as a reward to some of the boys 583 00:28:43,000 --> 00:28:45,625 at the boys' school, he would let them pick the word 584 00:28:45,792 --> 00:28:47,875 to put in the crossword. 585 00:28:48,042 --> 00:28:49,375 And there just happened to be 586 00:28:49,542 --> 00:28:52,458 a lot of Allied soldiers stationed nearby. 587 00:28:52,667 --> 00:28:54,208 The kids hear these weird words-- 588 00:28:54,375 --> 00:28:56,708 Omaha, Utah-- 589 00:28:56,875 --> 00:28:59,000 and they say, "Let's put those in the puzzle." 590 00:28:59,167 --> 00:29:00,750 Not realizing 591 00:29:00,875 --> 00:29:03,167 they're about to give away the biggest invasion in history. 592 00:29:03,375 --> 00:29:05,875 SHATNER: Could the appearance of secret code names 593 00:29:06,042 --> 00:29:07,625 in British crossword puzzles 594 00:29:07,750 --> 00:29:09,917 have been simply an extraordinary coincidence, 595 00:29:10,125 --> 00:29:12,583 or was it a clever spy craft tool? 596 00:29:12,750 --> 00:29:15,083 We may never know for sure. 597 00:29:15,208 --> 00:29:17,000 Like in the case of another wordplay 598 00:29:17,167 --> 00:29:19,833 70 years after World War II 599 00:29:20,042 --> 00:29:22,292 that some believed was intended 600 00:29:22,375 --> 00:29:24,958 to have deadly consequences. 601 00:29:27,083 --> 00:29:30,167 MORAN: In 2012, in Venezuela, 602 00:29:30,292 --> 00:29:32,250 there was speculation 603 00:29:32,375 --> 00:29:35,208 that a crossword puzzle 604 00:29:35,375 --> 00:29:39,792 in the daily paper contained coded messages 605 00:29:39,917 --> 00:29:42,333 that were meant to signal a threat 606 00:29:42,458 --> 00:29:46,292 against the brother of President Hugo Chávez. 607 00:29:46,458 --> 00:29:49,000 There was "Asesinen," which means "to kill." 608 00:29:49,208 --> 00:29:53,167 There was "Ráfagas," which means "Burst of machine gun fire," 609 00:29:53,333 --> 00:29:57,417 and there was also the first name of Chávez's brother. 610 00:29:58,417 --> 00:30:02,958 And so all of this led to the conspiracy theory 611 00:30:03,125 --> 00:30:04,667 or conspiracy thought 612 00:30:04,875 --> 00:30:08,333 that this must mean that an assassination attempt 613 00:30:08,500 --> 00:30:11,125 was on the horizon of Chávez's brother. 614 00:30:11,208 --> 00:30:15,000 The government essentially accused the newspaper 615 00:30:15,167 --> 00:30:17,333 and the designer of this crossword puzzle 616 00:30:17,542 --> 00:30:21,958 of a plot and of transmitting this coded threat. 617 00:30:22,125 --> 00:30:24,792 Whether or not this actually was 618 00:30:24,958 --> 00:30:27,792 an indication of an imminent threat 619 00:30:27,917 --> 00:30:31,042 against Chávez's brother, I don't know. 620 00:30:31,250 --> 00:30:34,708 SHATNER: No attempt on Adán Chávez's life was made, 621 00:30:34,875 --> 00:30:37,000 or at least publicly acknowledged. 622 00:30:37,167 --> 00:30:40,000 If spies really do send secret messages 623 00:30:40,208 --> 00:30:43,500 via crossword puzzles, it's still a matter of speculation 624 00:30:43,667 --> 00:30:46,875 and perhaps an ingenious method 625 00:30:47,042 --> 00:30:50,667 to share confidential information in plain sight. 626 00:30:50,875 --> 00:30:52,708 There are aspects of that 627 00:30:52,875 --> 00:30:56,167 that certainly match typical trade craft. 628 00:30:56,333 --> 00:30:59,958 So it's not preposterous to think 629 00:31:00,083 --> 00:31:04,792 that a crossword puzzle could be used to deliver a coded message. 630 00:31:04,958 --> 00:31:06,958 In fact, that's a very 631 00:31:07,125 --> 00:31:09,333 brilliant way that you might convey 632 00:31:09,542 --> 00:31:11,458 a coded message to a spy. 633 00:31:13,083 --> 00:31:16,958 Sending covert messages through newspaper crossword puzzles is 634 00:31:17,167 --> 00:31:19,458 truly a clever way to share secret information. 635 00:31:19,625 --> 00:31:23,208 But there was also a simpler tool spies used 636 00:31:23,375 --> 00:31:25,917 during the Second World War to communicate in code 637 00:31:26,083 --> 00:31:27,917 over vast distances. 638 00:31:28,083 --> 00:31:31,500 All you needed was a radio. 639 00:31:38,792 --> 00:31:41,083 SHATNER: With $10,000 in his pocket, 640 00:31:41,250 --> 00:31:44,958 29-year-old Soviet spy Albrecht Dittrich arrives 641 00:31:45,125 --> 00:31:46,583 in the United States. 642 00:31:47,917 --> 00:31:49,583 Using a stolen birth certificate, 643 00:31:49,708 --> 00:31:54,333 he adopts the alias Jack Barsky and begins a ten-year mission 644 00:31:54,500 --> 00:31:59,833 to spy on Americans as a sleeper agent for the KGB. 645 00:32:00,000 --> 00:32:01,458 JACK BARSKY: A sleeper agent is somebody 646 00:32:01,625 --> 00:32:06,292 who, uh, establishes himself in enemy territory 647 00:32:06,417 --> 00:32:09,042 and integrates in society and then waits for the day 648 00:32:09,208 --> 00:32:11,417 when it's time to spring into action. 649 00:32:12,417 --> 00:32:14,167 My mission in the United States focused 650 00:32:14,375 --> 00:32:16,042 on me getting close to people 651 00:32:16,208 --> 00:32:18,542 who make foreign policy decisions 652 00:32:18,750 --> 00:32:22,000 and/or influence foreign policy. 653 00:32:22,125 --> 00:32:24,833 This is towards the end of the Cold War 654 00:32:25,000 --> 00:32:27,500 where there was a spy war going on 655 00:32:27,667 --> 00:32:30,083 between the CIA and the KGB. 656 00:32:30,250 --> 00:32:33,083 And the tensions were very high. 657 00:32:34,958 --> 00:32:36,667 SHATNER: After relocating to New York City, 658 00:32:36,792 --> 00:32:38,917 Barsky married and began a family. 659 00:32:39,042 --> 00:32:41,583 He also took a job at an insurance company 660 00:32:41,708 --> 00:32:43,167 to maintain his cover 661 00:32:43,333 --> 00:32:45,333 working as a computer programmer. 662 00:32:45,417 --> 00:32:48,625 BARSKY: I had access to lots and lots of data. 663 00:32:48,792 --> 00:32:52,292 And some of the data would've been very important for the KGB. 664 00:32:53,292 --> 00:32:56,667 But there was never a meeting between me 665 00:32:56,875 --> 00:33:00,083 and another KGB agent on the territory of the United States. 666 00:33:00,208 --> 00:33:02,500 I got my instructions and answers to questions 667 00:33:02,708 --> 00:33:04,250 through shortwave radio. 668 00:33:05,500 --> 00:33:07,750 Every Thursday at 9:15, 669 00:33:07,917 --> 00:33:09,583 I had to turn on my shortwave radio, 670 00:33:09,750 --> 00:33:13,250 dial my frequency, listen to the call signal, 671 00:33:13,417 --> 00:33:17,500 Morse code, only digits, no letters 672 00:33:17,583 --> 00:33:20,625 and then start writing down the numbers. 673 00:33:20,750 --> 00:33:22,000 And there you have your message. 674 00:33:22,500 --> 00:33:24,208 SHATNER: For nearly ten years, 675 00:33:24,375 --> 00:33:27,333 Barsky's primary tool for communicating with the KGB 676 00:33:27,458 --> 00:33:30,083 was through a kind of shortwave radio broadcast 677 00:33:30,208 --> 00:33:33,125 known as a numbers station. 678 00:33:35,167 --> 00:33:38,333 Number stations are essentially pirate radio stations. 679 00:33:38,542 --> 00:33:40,750 You need to register a radio station. 680 00:33:40,917 --> 00:33:42,250 Number stations are not registered. 681 00:33:42,417 --> 00:33:44,417 (radio static) 682 00:33:44,583 --> 00:33:47,000 They were discovered almost accidentally 683 00:33:47,167 --> 00:33:49,000 during the Cold War. 684 00:33:49,167 --> 00:33:50,708 You had ham radio operators 685 00:33:50,875 --> 00:33:52,167 bouncing around different frequencies, 686 00:33:52,375 --> 00:33:54,500 talking to each other all over the world. 687 00:33:54,667 --> 00:33:57,833 And then, they would hit upon a certain channel 688 00:33:57,958 --> 00:33:59,417 and suddenly you hear 689 00:33:59,583 --> 00:34:01,875 a robotic voice repeating numbers. 690 00:34:02,042 --> 00:34:06,833 (female voice speaking foreign language) 691 00:34:07,042 --> 00:34:08,458 GENTILE: ...or you hear 692 00:34:08,625 --> 00:34:12,125 some kind of music or flute or buzzing sounds. 693 00:34:12,292 --> 00:34:13,958 (beeping, buzzing) 694 00:34:14,625 --> 00:34:16,125 It feels like you're eavesdropping 695 00:34:16,250 --> 00:34:17,458 on something secret, 696 00:34:17,625 --> 00:34:18,708 but you don't know what they're saying. 697 00:34:19,750 --> 00:34:24,167 MORAN: Number stations can transmit signals 698 00:34:24,250 --> 00:34:29,625 to sources globally, and they can do so undetected, 699 00:34:29,792 --> 00:34:30,833 because to anyone else, 700 00:34:31,042 --> 00:34:32,958 it might just sound like buzzing 701 00:34:33,125 --> 00:34:34,958 or like a series of noises. 702 00:34:35,125 --> 00:34:37,000 (buzzing) 703 00:34:37,167 --> 00:34:40,833 But what they're transmitting are coded signals 704 00:34:40,958 --> 00:34:43,625 to a source in place, or a spy. 705 00:34:45,458 --> 00:34:48,708 So even though they're very low tech, 706 00:34:48,875 --> 00:34:50,083 they're very effective... 707 00:34:50,250 --> 00:34:53,125 (indistinct radio chatter) 708 00:34:53,292 --> 00:34:55,208 MORAN: ...because they're able 709 00:34:55,333 --> 00:34:57,708 to exist and to communicate 710 00:34:57,917 --> 00:34:59,083 under the radar. 711 00:34:59,250 --> 00:35:00,875 (indistinct radio chatter) 712 00:35:01,042 --> 00:35:02,625 SHATNER: During the Cold War, both the United States 713 00:35:02,833 --> 00:35:06,000 and the Soviet Union regularly employed number stations 714 00:35:06,208 --> 00:35:09,333 to communicate with their agents in the field. 715 00:35:10,708 --> 00:35:14,000 But if anyone with a radio can tune in to hear the broadcast, 716 00:35:14,167 --> 00:35:16,833 how are these coded spy messages kept secret? 717 00:35:17,000 --> 00:35:19,583 Well, according to experts, 718 00:35:19,750 --> 00:35:22,417 it's an unbreakable method of encryption. 719 00:35:22,583 --> 00:35:26,042 A simple piece of paper known as... 720 00:35:26,250 --> 00:35:28,958 a one-time pad. 721 00:35:29,125 --> 00:35:31,833 A one-time pad has little numbers on them. 722 00:35:32,042 --> 00:35:34,250 And there's two identical versions. 723 00:35:34,375 --> 00:35:37,000 One is for the encoding of a message, 724 00:35:37,208 --> 00:35:39,292 and the other one is for the decoding. 725 00:35:39,458 --> 00:35:40,917 (indistinct radio chatter) 726 00:35:41,083 --> 00:35:42,375 So you would hear something 727 00:35:42,542 --> 00:35:45,833 like "Nine, seven, six, four," 728 00:35:46,000 --> 00:35:47,833 and then you could use the decoder 729 00:35:48,000 --> 00:35:49,458 to decrypt your message. 730 00:35:50,500 --> 00:35:54,708 HAMMOND: A one-time pad is a sheet of paper with banks of numbers. 731 00:35:55,833 --> 00:35:57,375 You use this and someone else 732 00:35:57,542 --> 00:35:58,958 that you're trying to communicate with 733 00:35:59,125 --> 00:36:01,167 uses that same pad. 734 00:36:01,292 --> 00:36:03,333 The two of you can then communicate, 735 00:36:03,542 --> 00:36:05,333 but it's called a one-time pad 736 00:36:05,500 --> 00:36:08,792 because after you've used it, you then destroy it. 737 00:36:08,958 --> 00:36:11,083 Assuming that you destroy it, 738 00:36:11,292 --> 00:36:14,333 you can then go on to use the next one-time pad. 739 00:36:14,458 --> 00:36:17,958 And if you keep using it, sticking to the protocol, 740 00:36:18,083 --> 00:36:20,667 it's uncrackable. 741 00:36:21,708 --> 00:36:25,125 SHATNER: If number stations have proven so effective in the past, 742 00:36:25,292 --> 00:36:27,333 the real question is, are spies still sending 743 00:36:27,542 --> 00:36:31,042 and receiving coded messages through them today? 744 00:36:31,208 --> 00:36:32,750 (voice warbling) 745 00:36:34,542 --> 00:36:36,000 BUSTAMANTE: Even today, 746 00:36:36,208 --> 00:36:37,333 you can flip through the different channels 747 00:36:37,542 --> 00:36:39,375 and you can hear things over the radio 748 00:36:39,542 --> 00:36:42,500 that don't make any sense. 749 00:36:42,708 --> 00:36:44,417 Whether they're verses being read 750 00:36:44,583 --> 00:36:46,042 or whether they're words being said nonsensically 751 00:36:46,208 --> 00:36:47,667 or whether they're numbers 752 00:36:47,792 --> 00:36:49,125 that are shouted out to the blindness of space. 753 00:36:49,250 --> 00:36:51,667 (indistinct radio chatter) 754 00:36:51,875 --> 00:36:54,625 So it's very possible somewhere in there 755 00:36:54,792 --> 00:36:56,833 there's a spy message that's sent 756 00:36:57,042 --> 00:36:59,208 for a very specific person at a very specific time 757 00:36:59,375 --> 00:37:01,000 in a very specific way. 758 00:37:01,208 --> 00:37:02,917 ROBOTIC FEMALE VOICE: One, three... 759 00:37:03,042 --> 00:37:05,333 SHATNER: If spies are still receiving messages 760 00:37:05,417 --> 00:37:09,000 via number stations today, we'll obviously never know. 761 00:37:09,167 --> 00:37:13,042 But what many experts believe may be even more concerning 762 00:37:13,208 --> 00:37:15,167 when it comes to national security 763 00:37:15,333 --> 00:37:17,417 aren't relics from the past 764 00:37:17,583 --> 00:37:19,750 but the technologies of today. 765 00:37:30,917 --> 00:37:33,750 SHATNER: While doing routine computer maintenance, 766 00:37:33,917 --> 00:37:35,583 a defense contractor finds 767 00:37:35,708 --> 00:37:39,292 evidence that Russian spies hacked into the base's network 768 00:37:39,417 --> 00:37:43,167 to access top secret intelligence 769 00:37:43,333 --> 00:37:48,500 from the Pentagon, NASA, and other U.S. agencies. 770 00:37:48,708 --> 00:37:52,625 It is the first major cyber espionage operation 771 00:37:52,792 --> 00:37:55,625 that we know of in modern history. 772 00:37:56,958 --> 00:37:58,833 BUSTAMANTE: One of the big advancements in espionage is 773 00:37:59,000 --> 00:38:00,792 something known as the cyber spy 774 00:38:00,958 --> 00:38:02,500 or the spy who lives behind 775 00:38:02,625 --> 00:38:04,083 a digital wall of some sort. 776 00:38:05,125 --> 00:38:07,250 They can steal information, they can sell information, 777 00:38:07,458 --> 00:38:09,708 they can live and hide on the dark web. 778 00:38:10,750 --> 00:38:12,917 This is a whole new development, and with that development, 779 00:38:13,125 --> 00:38:16,417 there's new opportunities and there's new risks. 780 00:38:16,583 --> 00:38:19,042 We have new technology that cyber spies can use 781 00:38:19,208 --> 00:38:20,625 to meet in cyberspace. 782 00:38:20,792 --> 00:38:23,333 You can meet with them on video game platforms, 783 00:38:23,458 --> 00:38:25,208 you can meet with them in chat rooms, 784 00:38:25,375 --> 00:38:26,542 you can meet with them using 785 00:38:26,708 --> 00:38:28,333 commercially encrypted technology 786 00:38:28,500 --> 00:38:30,458 that you and I carry on our phone. 787 00:38:30,583 --> 00:38:33,167 Which makes everything that much more difficult to track, 788 00:38:33,333 --> 00:38:34,667 not just for the FBI 789 00:38:34,875 --> 00:38:36,625 or for the internal investigation agency, 790 00:38:36,792 --> 00:38:38,750 but for anyone to see anywhere. 791 00:38:39,708 --> 00:38:41,625 SHATNER: Advancing technology has 792 00:38:41,792 --> 00:38:45,417 empowered cyber spies to not only hack government secrets 793 00:38:45,583 --> 00:38:47,750 but also exchange that information 794 00:38:47,875 --> 00:38:50,167 in complete anonymity. 795 00:38:50,375 --> 00:38:52,542 But some cyber spies are not 796 00:38:52,667 --> 00:38:54,333 interested in stealing information 797 00:38:54,500 --> 00:38:58,000 but rather to influence the very beliefs 798 00:38:58,208 --> 00:38:59,917 of their adversaries. 799 00:39:01,208 --> 00:39:04,333 BARSKY: There's a place called the Internet Research Agency 800 00:39:04,458 --> 00:39:07,958 in St. Petersburg, Russia where 801 00:39:08,083 --> 00:39:11,458 there's a couple of hundred nerds that produce 802 00:39:11,625 --> 00:39:13,167 these artificial personas, 803 00:39:13,333 --> 00:39:17,500 and then they go on social media and befriend real people... 804 00:39:18,458 --> 00:39:21,000 ...and they search out groups 805 00:39:21,208 --> 00:39:24,125 that are ideologically oriented. 806 00:39:24,292 --> 00:39:25,958 It could be particularly in politics, 807 00:39:26,125 --> 00:39:28,875 it could be the right wing and it could be left. 808 00:39:29,042 --> 00:39:32,167 And what they're after is 809 00:39:32,375 --> 00:39:36,417 to create confusion in enemy territory. 810 00:39:38,708 --> 00:39:40,500 I can give you an example. 811 00:39:40,625 --> 00:39:42,625 When you're talking about election interference, 812 00:39:42,750 --> 00:39:45,167 they planted misinformation. 813 00:39:45,333 --> 00:39:50,917 What they do is raising doubts about the American system. 814 00:39:52,500 --> 00:39:55,417 These cyber spies are extremely dangerous. 815 00:39:57,042 --> 00:40:00,542 SHATNER: According to America's Cyber Defense Agency CISA, 816 00:40:00,750 --> 00:40:04,583 during the 2024 U.S. presidential election, 817 00:40:04,708 --> 00:40:07,875 foreign adversaries conducted influence operations 818 00:40:08,042 --> 00:40:13,333 intended to undermine the integrity of U.S. elections. 819 00:40:13,542 --> 00:40:14,875 And while we can't say for sure 820 00:40:15,042 --> 00:40:18,208 how espionage will continue to evolve, 821 00:40:18,417 --> 00:40:22,167 we know that as long as there are secrets, 822 00:40:22,333 --> 00:40:24,458 there will be spies. 823 00:40:24,542 --> 00:40:26,125 BUSTAMANTE: The future of secrets is, 824 00:40:26,292 --> 00:40:28,500 in many ways, what will shape the future of espionage. 825 00:40:28,708 --> 00:40:30,333 But that doesn't mean that the history of espionage is 826 00:40:30,458 --> 00:40:32,125 any less useful than it was in the past. 827 00:40:32,250 --> 00:40:33,583 It's the foundation, 828 00:40:33,708 --> 00:40:35,833 it's the bedrock on which everything else is built. 829 00:40:36,000 --> 00:40:38,500 And no matter where our future takes us, we know 830 00:40:38,708 --> 00:40:40,375 that those building blocks of espionage, 831 00:40:40,542 --> 00:40:41,875 those core fundamentals 832 00:40:42,042 --> 00:40:43,792 will always be present and always be there. 833 00:40:43,958 --> 00:40:46,708 There will always be people meeting with people 834 00:40:46,875 --> 00:40:49,875 in dark corners to share secrets that nobody knows about. 835 00:40:51,875 --> 00:40:55,208 In the world of spy craft, everything is unexplained. 836 00:40:55,417 --> 00:40:59,042 And your job as an intelligence officer is 837 00:40:59,208 --> 00:41:01,625 to try to gather that information 838 00:41:01,792 --> 00:41:03,750 that will help explain it. 839 00:41:04,792 --> 00:41:07,833 The anomaly of spy craft is 840 00:41:08,042 --> 00:41:11,833 that you're charged with seeking out the truth. 841 00:41:11,958 --> 00:41:16,458 And the reality is you can never be 842 00:41:16,583 --> 00:41:20,792 100% sure that you've gotten to the truth. 843 00:41:20,958 --> 00:41:24,000 You may never have the answers. 844 00:41:25,042 --> 00:41:27,583 While it appears that the digital age may be 845 00:41:27,750 --> 00:41:29,458 changing the art of spy craft, 846 00:41:29,625 --> 00:41:30,917 it's pretty safe to say 847 00:41:31,042 --> 00:41:33,833 that as long as there are secrets worth stealing, 848 00:41:34,000 --> 00:41:36,458 there will be spies hard at work. 849 00:41:36,625 --> 00:41:39,250 And although we are intrigued 850 00:41:39,458 --> 00:41:41,958 by the elusive double agent at the CIA 851 00:41:42,125 --> 00:41:46,542 or even the assassin who killed with the probe of an umbrella, 852 00:41:46,708 --> 00:41:50,000 it's likely that most tales of espionage 853 00:41:50,167 --> 00:41:53,667 and the covert agents who operate undetected 854 00:41:53,833 --> 00:41:58,042 will stay top secret and remain... 855 00:41:59,167 --> 00:42:00,542 ...unexplained. 856 00:42:00,708 --> 00:42:02,542 CAPTIONING PROVIDED BY A+E NETWORKS 66607

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.