a16z Podcast - a16z Podcast: For Your Ears Only

Episode Date: May 18, 2017

When it comes to spycraft — or rather, “tradecraft,” as they say in the biz — what do the movies get right, and what do they get wrong? In this episode of the a16z Podcast, Michael Morell — ...former Deputy Director and twice-Acting Director of the CIA — talks all things tradecraft and tech with a16z partners Matt Spence and Hanne Tidnam. What it is that the CIA really does? Is it a) James Bond, b) Maxwell Smart, c) Jason Bourne, or d) none of the above? For starters, it’s not at all about predicting what will happen — it’s figuring out what you need to know now to make the right decisions, asking the right questions, and reducing uncertainty. But that’s a tall order when you’re in the Situation Room advising the President — because there’s no such thing as zero uncertainty. So what makes the difference between a good analyst and a great one? How does technology affect tradecraft? And where do human spies come in? This podcast was recorded as part of our (now-annual!) podcast road trip, in conjunction with the a16z Tech Policy Summit, in Washington, D.C.

Transcript
Discussion (0)
Starting point is 00:00:00 Hi, welcome to the A16Z podcast. I'm Hannah and I'm here today with A16Z policy team partner Matt Spence in Washington, D.C., to talk with Michael Morel, former deputy director and two-time acting director of the CIA about all things spies. We're here to talk about the art of spycraft. And first of all, is that even an okay word to use? Is that the right word? The word we use at CIA is tradecraft. What does that mean? What does intelligence gathering actually mean? So there's three different missions at the Central Intelligence Agency. One mission is to collect information from our adversaries. So think of it as stealing secrets. We recruit other human beings to be spies. We use technology to acquire that information as well. The second mission is then making sense of those secrets. That's what we call all source analysis and telling the president, here's how we think about this issue. A lot of people think we're predicting the future. That's not what we do. Oh, interesting. We're much more focused on describing the current situation. Why are we here? And what are the factors that are going to determine which way it goes?
Starting point is 00:01:10 That's what I spent my career doing, analysis. And then the third mission is covert action, which is somewhere between diplomacy and military action. Like we provided significant support to the solidarity movement in Poland, all the way to paramilitary activities like providing arms to the freedom fighters in Afghanistan when they were, when they were fighting the Soviet Union. That's covert action. It's kept secret. It can only be done at the direction of the President of the United States, actually a written document that he has to sign that says, here, I want you to do this, and here's the policy objective I'm after. Increasingly, as you think about that third bucket, intelligence is used in ways that sometimes blurs a line between what traditionally military
Starting point is 00:01:49 used to do. That's a lot by technologies. And sometimes a covert operation becomes not covert, you know, and involves the military. Some of that, especially the stealing secrets and the covert action sounds like some of the best spy movies. How is it different from what the public thinks of spying as, you know, when you're looking at Mission Impossible or what, what are the most common misconceptions? What do this public get right and what does Hollywood get right? And what do they get wrong? There are nothing but misconceptions. So nothing right? In Hollywood. There's a variety have different perceptions, and each of them is wrong. So one perception is the James Bond mission impossible perception is that there's not a secret we can't steal, there's not a plot
Starting point is 00:02:31 we can't stop. Superhero. Superheroes, right? Not true. This is a really tough business. There's a lot of secrets in the world that we need that we don't have, and so we're not perfect. Far from it. The James Bond myth is wrong. The second myth is that we screw up everything we touch. It's the Maxwell Smart, Get Smart myth, which is that we can do anything right. That myth is wrong. There's a lot of secrets we do steal. And then the third myth is the Jason Bourne myth, which is that there's a lot that the CIA does that's rogue that nobody in Washington knows about. That's a myth that could be at the end of the day most damaging because it paints a picture of a rogue secret agency operating in a democracy. People ask me all the time, is homeland real?
Starting point is 00:03:19 is a zero dark 30 real. Matt's smiling. And I actually laugh a little bit when I get asked that question. Here's what I say. I say not even close except for one thing. And that's the passion of the people doing the work. That is real. Particularly people who are working on life and death issues like terrorism, like the proliferation of weapons of mass destruction, human trafficking, drug trafficking on those life and death issues. The officers at CIA are just as passionate as the lead characters in Homeland and Zero Dark 30. I think that's right. I mean, the thing I would add to it based on, you know, spending time in the situation room is how uncertain the enterprise is. There is a sense, I think, that the public will have is that there is an answer. And if you just ask the right
Starting point is 00:04:05 person, you'll get it. And it is hard to determine the intentions of a foreign leader. So it's that. And the role, I think, intelligence plays when you make policy decisions. So you will not go to the CIA director and say, should we execute the operation against Assad bin Laden? Should we add 30,000 more troops to Afghanistan? Instead, you make a set spin of judgments about here's how confident we are. The fundamental job of intelligence is to reduce the uncertainty that the president is operating in. That is the purpose of the whole enterprise, but you can't reduce it to zero. Matt mentioned the bin Laden operation, and that is a great example.
Starting point is 00:04:43 We did not know for sure that he was in that compound. In fact, there was only a circumstantial case that he was there. There was no direct evidence. There was still a considerable amount of uncertainty that we left the president with about whether he was there or not. More than usual or less or about the same. About the same, I'd say. I remember actually a discussion in the sit room where people had different probabilities
Starting point is 00:05:08 of whether he was there or not. So the lead analyst said 95% chance he's there. And the senior most analysts had 80% chance. Wow. And I was at 60%. Wow, there was such discrepancy. And the president said to Leon Panetta, then the director of the CIA, who was sitting at the table. I was sitting against the wall because I was the deputy.
Starting point is 00:05:29 The president said to Leon Panetta, why is there such a gap here in these probabilities? And Leon turned to me and said, Michael, can you answer that question? And so I said, Mr. President, it's not because people are looking at different sets of information. you know, you can be assured that everybody has all the same information here. We're comparing apples and apples. We're comparing apples and apples. I said, I think that people are washing this data through their own personal experiences. So these analysts who came to work on terrorism post-9-11, who have known nothing but success
Starting point is 00:06:02 are washing this through their, that perception of success. I said, I'm washing it through the perception of the fact that we got the judgment wrong about Saddam Hussein having weapons of mass destruction. I was in that meeting, I remember. That statement, I think, was one of the most powerful statements I'd heard in hundreds of hours in situation room. I mean, to imagine that the president of United States is taking his presidency, asking you, how certain you. And that takes a huge amount of courage as an intelligence analyst to say, I remember those words. It was the meeting before the, it was the last meeting with the cabinet, before the president would walk down the colonnade from the Oval Office down to the residents, decide,
Starting point is 00:06:43 Is he going to launch the operation of Saddam bin Laden? And that takes courage to talk about the sheer uncertainty, especially compared to it. Well, in an enormous amount of self-awareness. And the punchline, right? The punch line was, Mr. President, the case that Saddam had weapons of mass destruction was stronger than the case that bin Laden is about-a-bott-a-bott. You could hear a pin drop in the situation room, and it was true, right? And that's just a great example of we reduce the uncertainty, but we can't get rid of it.
Starting point is 00:07:12 I was taking notes in this meeting. Michael said, I was the presence PDB briefer on 9-11. What is PDP? The presence daily intelligence briefing. Okay. So you're the person who tells the present about the major threats
Starting point is 00:07:24 and opportunities around the world and to have that perspective and Saddam Hussein Web was a master destruction and then present the information clearly, cleanly, not to try to tip the scales, but flaws and uncertainty all. There is a very sharp line between intelligence and policy.
Starting point is 00:07:41 So intelligence officers do not advocate policy, nor when they do their analysis or their intelligence reporting, should they have a preferred policy outcome in mind. Which, again, is a common misconception if you're looking at the Hollywood movie. Exactly, right? Why? Because you don't want a preferred policy outcome to influence what you collect or to influence your analysis or to influence how people see you when you're putting that intelligence on the, table, right? If I walked into the sit room and people knew that Michael thought that absolutely we should keep 20,000 troops in Afghanistan, then people are going to question the analysis I put on the table. But it's very interesting because part of what you were saying earlier in that
Starting point is 00:08:26 story of being aware of the filters through which we wash our own analysis, it takes an incredible awareness to think we are all coming to things with a particular set of experiences and we process stories in certain ways and come away with it. The way you talk about the analysis and the description using this information to set to describe things the way they are and then kind of parsing out all this, it's a kind of narrative, right? That you're first, you're piecing together a narrative for yourself
Starting point is 00:08:52 and then you're translating that narrative into something that you can tell to other policy officials to the president. How do you think about storytelling like that when you're gathering these facts to put them into one cohesive narrative? So the key is to understand your own biases because we try to be as objective as we can be, but we still have our own biases, right? We're still looking at the world through a particular
Starting point is 00:09:14 prism. And the best analysts understand their own biases. Can you do anything about it, though? Sure. We all make assumptions when we think through problems. One of the things that a good analyst does is say, okay, I think I just made five assumptions. Let me question each one of those. One of the ones that's on my mind right now. To make explicit and then to interrogate. one of the ones that's on my mind right now is this issue of can we count on China to squeeze the North Koreans and change North Korean behavior. There's an assumption there, which is that if the Chinese did squeeze them, the North Koreans would change their behavior. That's a huge assumption, and it's an assumption that has to be discussed and challenged and talked about, because if the
Starting point is 00:09:59 Chinese can't effectively squeeze them, then we shouldn't be asking the Chinese to do so. So these assumptions are embedded in every conversation we have, in every decision you make, and the more you examine them, the better off you are. But, Hannes, you said, but there's an artist storytelling, too. On the one hand, you need to be clear about your uncertainty and your assumptions. But if the president asks you questions, says, Michael, what will happen with North Korea and China? If you say, well, Mr. President, hear the seven assumptions, and you caveat your answer so completely, he'll just tune out and just not listen.
Starting point is 00:10:29 So the real pressure that people realize is there is an enormous problem. pressure to give an answer. You know, you're dealing with officials. I want to come in and say, what's the answer? Let's cut to the bottom line. And you need to find a way to give a bottom line with not making it so wishy-washy and hedged as to give them no answer. Because the danger is, then they just won't listen to you. And they'll listen to someone, but not the U.S. intelligence agencies and communities, which is equipped to provide them. Because it's a compelling story. Because it's a... Yeah, you need a story. I mean, the deal is there is so much information that comes at these decision makers. If you look back, again, to the
Starting point is 00:11:03 bin Laden operation. What was happening from January 2011 to May 2011 when the operation was planned? The president of China was visiting the White House, one of the most important geopolitical relationships we have. The Arab Spring was beginning. Military operations were beginning in Libya. There was the fall of the president of Egypt. And at the same time, the president was taking a trip to Latin America. I mean, with all that going on, you need some clarity, not because you want to take shortcuts, because the world is a messy place. You've got to make hard decisions. If you can't frame that into a package or a story that resonates with people who aren't intelligence experts, then you're just less effective. So the storytelling is really
Starting point is 00:11:43 important, and I think there's an art to it. And I don't think that most, I don't think we teach this to our analysts as effectively as we should. Oh, fascinating. What I always found is that the style in which analysts present their analysis is here's the conclusion, and then here's how we got there. And I don't think that's an effective way of telling the story. I think a much more effective way of telling the story is to say, here is the question that we were trying to answer. Here's how we went about answering it. And here's the answer we got. And here are the caveats to it. Which sounds like a classical essay structure, actually. It's much, much more effective. Interesting. The ability to answer a president's question without giving 10 caveats,
Starting point is 00:12:31 which no president is going to listen to is the difference between a junior analyst and a senior analyst, right? The junior analyst wants to give every caveat. You want them to. But one of the differences between junior analysts and senior analysts is people who have learned to move beyond that and have conversations with senior officials where they can be effective in providing information without going through every step of the process. It's interesting that in this job, sometimes the greatest mark of success is nothing happening, right? Or stopping something happening. And people don't know what they don't know. What's it like? to be in a job where your successes are kind of invisible. Your successes are largely invisible and your failures are on the front page. And so you have to develop a pretty thick skin because not only are those failures on the front page, but they're typically not 100% correct in how it's being told. Yeah, that must be really difficult to see a different version of the story. It's not that you can't fight back. It's hard to fight back because you can't put more classified information
Starting point is 00:13:28 in the public domain. So it's not easy. get now, if we can shift gears to talk a little bit about the mechanisms of tradecraft and how technology is impacting those, how it's changing. How is technology behind tradecraft, as I will appropriately call it from now on, changed not only how the job is done, but how you think of the job? So broadly, any advance in technology is both an opportunity and a problem, right? the opportunity is that you can use technology to do your job more effectively. On the collection side, cyber is a huge opportunity because it allows us to get inside other people's networks and to steal stuff. On the analytic side, technology, particularly big data and
Starting point is 00:14:13 artificial intelligence, gives analysts the ability to deal with much larger mass of data and to allow the analysts to focus on what's really important. Can you give some examples of how that's playing out. It plays out every day on the terrorism front where software is going through massive amounts of data, you know, going through a haystack to try to find the needle. And it doesn't pull out the needle, but it gives you a much smaller piece of the haystack to go through to find the needle. So that's the opportunity side. The cost side is that technology also gives our adversaries opportunities. So advances in encryption are used by terrorists to communicate with each other. Biometrics. Biometrics used at borders makes it very
Starting point is 00:14:59 difficult for CIA operations officers to travel in alias. So it cuts both ways. And it's a constant. So the technology is always evolving. As you guys know better than anybody, it's accelerating. And so there's always inside CIA, how do we take advantage of this and how do we defend against it at the same time? And the other thing that I saw in the seven years that I was in the White House and Defense Department is how much more important open source information is. Anyone can read it. But there's a mosaic that can be put together that technology allows. I remember several times that I would look through. And if you actually just look at what is not classified, you're getting as much information about certain types of topics than you could
Starting point is 00:15:42 otherwise. That would not happen without technology. I mean, even when I started in the government, you know, you would get a printout of news clips of readouts from the foreign press. So if you wanted to understand about Russia, you would read a translated version of some Russian newspapers. By the end, there was much more accurate, faster, deliver information where you could hear what was happening from the outside. So in this changing game of kind of information warfare through asymmetric information or bots and leagues, is it more of the same? Has there been a fundamental shift in how you think about things like misinformation?
Starting point is 00:16:19 During the Cold War, the Russians tried to interfere in U.S. elections, but the Internet wasn't available. And so, you know, it was one-offs. It was bribing a reporter to write a particular story, or it was placing a story in a particular place. You know, could have been fake news then as well, or true news, right? But what the Internet and cyber now allow is steal information on a massive scale, and it allows you to put it out in a massive scale. So within five minutes of Secretary Clinton falling in New York City on September 11th during the campaign, there were hundreds of thousands of social media postings coming out of Eastern Europe and Russia, questioning whether she was healthy enough to be president of the United States. It's the sheer magnitude of what technology and speed, of what technology and speed allow you to do.
Starting point is 00:17:11 It's the same game with a much more powerful tool. Interesting. And in this new world of this sort of quick and massive. massively scaled information and all the different new ways we have of gathering that information and image technology and surveillance. Is there a role for the human asset or is that going away? Is it just becoming a kind of large information game? It's a really great question and it's not a new question. So throughout the history of my 33 years at the agency, it was a question that was asked frequently about technology. Did our ability to collect telephone calls
Starting point is 00:17:47 and emails, and did that put the human spy out of business? Or satellite photography, right? Did that put the human spy out of business? And the answer is, is really twofold. One is each different type of intelligence collection has its strengths and weaknesses. One of the great, great strengths of human intelligence is that you can ask a question. So if you and I are having a phone conversation and that phone conversation gets intercepted. There's no way for the intelligence agency doing that to ask a question. There's no way to say, hey, but what about this and what about that? That's what a human agent can do. An unpredictable question or a question that we really need to know the answer to. A human spy can always ask a question, and that's really powerful. Technology actually sometimes
Starting point is 00:18:36 makes a human spy more important. So take encryption, for example. Terrorists can now talk to each other without security services and intelligence services getting in the middle of that. So if that's the case, then technical collection becomes not the tool of choice. What becomes the tool of choice is putting a spy at either end of those two points to know what's going on. So a human spy actually becomes more important as technology protects the adversary. What are some of the more creative ways of communicating information like that that you've seen? I mean, do you guys use the cloud? Do you use USB sticks?
Starting point is 00:19:14 Do you use paper? What are some of the more secure, creative ways of communicating that you'll – can you talk about? So this is always a huge issue inside CIA, right? Because the millennials want what they have on the outside. They want Wi-Fi inside CIA headquarters. Well, guess what? The counterintelligence people say, no way, no how, right? There are always these kinds of debates.
Starting point is 00:19:37 So for our most sensitive secrets, for CIA's most sensitive information, we don't store it digitally. It's paper. We store it on paper, in a safe, in a room with a lock on it that only a handful of people can get access to. How about out in the field? Possibly the same thing in the field. There's a huge downside to not storing information digitally, right? It can't be shared quickly. You can't search it and, you know, et cetera, et cetera.
Starting point is 00:20:05 But the cyber threat is so serious that for our most sensitive stuff, we don't store it digitally. There's classified information which are on classified networks, but you cannot forward one from, you can't sort of have a mistake and accidentally send it to someone's classified email address or their Gmail address. Things are separated from each other. When you have technology that's very hard to use, people to get their jobs done inevitably do things that are less secure. I mean, right now, I sort of joke, it's like we only now at the defense of where I got a Commodore 64 computer in Windows 95. There are ways to actually integrate and do these things that we just aren't putting, spending our time on. So a great example is the hack of the security files at the Office of Personnel Management. The cybersecurity at OPM was woefully inadequate.
Starting point is 00:20:57 If I could have stolen the same information from China, I would have done it in a nanosecond and I wouldn't have had to ask anybody permission. We left ourselves incredibly vulnerable. Cyber security in large U.S. financial institutions is light years ahead of cybersecurity in the United States government. There's a difference between defensive protection and going on offense. Is it different considerations when there's human bodies involved or when it's just technologically based? Do you think about these things in a different ethical lens? Matt and I were involved in many discussions in the situation room about this question. And I think where President Obama came down is we don't.
Starting point is 00:21:33 want to do something to another country that sets a precedent that would send a signal, right, sets a precedent for people to do it to us. Because guess what? We live in a glasshouse. We live in the biggest glass house. We are the most vulnerable, right? So when you're talking about offensive cyber operations, that's the line you draw. We better be very careful in taking the initiative because we're going to send a signal to the rest of the world that it's okay to do so. there were a number of discussions where if we go down this path, where does it lead? And that's a major question. There's also a question of will it work? Sometimes the bang for the buck may not really be worth it. You may take an enormous risk of something that may be discovered. And you actually think, how much would that make a difference? The issues that reach the president's desk in the Oval Office or reach him in the situation room are by definition incredibly hard. If they were not incredibly hard, someone else would have made that decision. Exactly. Sometimes you need to make this. difficult decisions. There's a lot of the intelligence can do, but it's no magic bullet. There just isn't a magic bullet. You've got to be, got to be really careful because something that somebody
Starting point is 00:22:42 wants to do might not be effective at all. So a great example. How are you, how do you measure that in advance that? Let me give you a great example. So ISIS is throwing out all of this propaganda, which is radicalizing young men and young women in Western Europe and the United States and Australia in other parts of the world. And so people say, well, why don't you just, why don't you just use your offensive cyber capabilities to destroy those servers, right, and stop them from doing that. And the answer is, because they can have another server up in an hour. You're using all these resources for very little gain, and you're setting a precedent that it's okay to use offensive cyber operations.
Starting point is 00:23:17 There is this tendency in every administration that I've seen, and I saw six of them, three Republican, three Democrat, for when the problem gets really hard to turn to CIA and say, fix this. Using covert action, fix this. And a lot of the times, CIA can't fix it. But CIA is, I don't know what the right word is. CIA is a pleaser. And so the CIA is very quick to say, of course we can do that. Of course we can do that. When actually, if you sit down and really think about it, no, you really can't. Can you give an example? Oh, I don't know if I can do that in an unclassified. That just shows how cool history in an unclassified setting. One thing I wanted to ask is how do you think about government oversight and executive branch action in situations where like every reasonable person would
Starting point is 00:24:09 agree secrecy is very important. How do you think about that kind of communication between agency and public? It's very hard. We have at our disposal a powerful intelligence collection network, a powerful opportunity for COVID operation at as limits, but is very powerful. But to set limits and say we are actually not going to do this, even though we can, is very, very hard. On the other side, there is not one piece of information. There will not be someone who's written a letter outlining their plans like the end of some movie where you pull off the mask and the villainism mask. It is a mosaic of a number of things that put together. The reason why law enforcement officers are trying to get more information, it's not that they're trying to take a
Starting point is 00:24:52 shortcut. You don't know what will matter. You don't know what individual piece will add up. Even again going back to the bin Laden operation we talked about you know there was no single thing that i think led this to go it is a cascade of information and you know what is individually valuable i would just add a couple of points one is we are not just trying to prevent terrorism and prevent the spread of weapons of mass destruction in order to protect people's lives we're actually doing it to protect our way of life some people are fond of saying that more people die in auto accidents or slips in the bathtub than terrorist attacks, questioning whether the government should be spending all these resources.
Starting point is 00:25:30 Well, the fact of the matter is, auto accidents and slips in bathtubs do not lead people to be willing to give up their constitutional rights. But a large terrorist attack, they are ready to give up their privacy and similarities in order to be protected. Right. But that's a big pendulum that swings back and forth.
Starting point is 00:25:47 And it does swing back and forth. But by point is that what we're doing on the security side is actually designed to protect. our privacy and our civil liberties. So that's that's point number one. Point number two, point number two is that there is a trade-off. Absolutely there's a trade-off and we have to realize it and we have to discuss it as a country and end up where we feel comfortable, right? And at the end of the day, it's where the American people want to be, educated by their leaders. On the encryption debate, I was actually not where you would expect me to be. I was not on the side of
Starting point is 00:26:19 the FBI. I was on Apple's side. Because by forcing Apple to create a key for its keyless encryption, you were creating another huge security vulnerability. If you create a key, it means a bad guy can steal a key. My preferred response to what U.S. high-tech firms have done to protect information with encryption is to say to the intelligence community, that's now a given. You've got to figure out a way to go get the information. So this brings us right back to the importance of those human agents, right? Find another way to get the information you need because forcing American companies is actually going to make matters worse. Even if you are working in Nash security, the intelligence community is really a black box
Starting point is 00:27:04 and hard to understand. What is the type of question you should ask an analyst about what can be predictive? I think the biggest thing that policymakers and even Silicon Valley can really learn about the intelligence community is what are the right types of questions to ask. You would not go to your doctor and say, who should I marry? I mean, maybe you do. It's a pretty dumb thing to do. You know, but like, they're right questions and wrong questions. So the key to good analysis is asking the right question. It's the same thing. It's the same thing, right?
Starting point is 00:27:33 You don't get insightful answers without insightful questions. So here's an example. If you look out the window and you see lightning and you hear thunder and you see dark rain clouds and you say it's going to rain, there's no insight in that judgment. at all, right? Because any non-expert could have come to that conclusion. Is it going to rain or not is the wrong question? Much more interesting and insightful question is, how bad is the storm going to be? Is there a risk of a tornado? Is there a risk of damaging hail or damaging wind? Right? Those are questions that it takes an expert to answer. So asking the right question is critically important
Starting point is 00:28:14 in any field. That reminds me even of the kind of work we do when we're editing. My experience is that briefings, oral briefings for senior policymakers are much more insightful for them than our written product. And the reason that's the case is because in the written product, we're asking the question. In the case of an oral briefing, it's the senior policymaker who's asking the question. The most valuable hour of my day when I was heading up Middle East policy, the Defense Department, was not reading the intelligence report. and I had a thick binder of fascinating things, but just having my briefery there so I could read it and ask the questions that would follow up.
Starting point is 00:28:55 The best briefers I had, and some ones who needed some more work was if you would ask a question, they would suddenly say, actually, I would think of it instead this way, you know? Well, it gives you the best results. Exactly. You may get a answer.
Starting point is 00:29:08 It may even be the right answer. But if it's the wrong question, you are devoting a lot of time and resource to something that is just going to send you down the wrong path. So one of the things that analysts do at CIA is they actually brainstorm. They have brainstorming sessions about what question to ask. Oh, like a newsroom. That can be used by any organization. I actually take some time and think about the questions you're trying to answer. So on the one hand, we have this sensibility
Starting point is 00:29:31 of this information gathering as being at the sort of leading edge of technological developments. But then you talk about government as being so, you know, as being very far behind where we would like, as compared to the private sector. So what is the intelligence community's relationship to current technology? So it used to be true until 30 years ago that the government was the technology
Starting point is 00:29:55 developer and the technology leader. So places, you know, CIA, we developed our technical tradecraft inside and the same thing was happening at DoD. But it soon became obvious in the mid-1980s, I'd say, that there was no way
Starting point is 00:30:14 the government could keep up with the advances being made the private sector and that the government was missing out on huge opportunities. And so people looked for opportunities to be able to tap into that technology. So we at CIA created something called Incutel, which is essentially a not-for-profit VC that invest in companies. We've co-invested with them in several times. And they invest in technologies that meet two criteria. one is that are commercially viable and two that would be valuable to CIA or the intelligence community 70% of what they've invested in have given a product or a service back to the
Starting point is 00:30:53 intelligence community so that government tapping in to what's happening in the private sector is incredibly important and that relationship is important now the really sad thing is that Edward Snowden did serious damage to that relationship because the perceptions of the private sector covertly helping the government, whether those were true or not. But the perception that was created, right, of that significantly damaged some American companies in what they were doing overseas. So there was a loss of trust among some high-tech firms and the government, right? And that's a shame because the government so relies on the private sector for the technology they need. Our government operate at two speeds. We either can move incredibly fast and get
Starting point is 00:31:43 something done, sometimes with a little clumsy and you kind of break things, or you're just so slow moving. It's hard to do things. The government can't bring people in fast even who are hugely committed to serve. Like, we don't bring new technologies in very quickly. And that's not a partisan issue. It's true for Democrat and Republican presence. It's true for the executive branch, as well as the Congress. That actually is one of those things. I think uniquely, the intelligence community is one of the organizations that I saw that does that better than most. That finds way to kind of innovate and think creatively. I had an old boss who I would walk into his office and say, I have a problem. And he said, Michael, Michael, Michael. There are only opportunities.
Starting point is 00:32:22 Oh, that's great. So I think that's a great way to look at the world. Thank you both so much for joining us. You're welcome. It's good to be with you. Thanks, Hannah.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.