Darknet Diaries - 116: Mad Dog
Episode Date: May 3, 2022Jim Lawler, aka “Mad Dog”, was a CIA case officer for 25 years. In this episode we hear some of the stories he has and things he did while working in the CIA.Jim has two books out. Affili...ate links below.Living Lies: A Novel of the Iranian Nuclear Weapons Program https://amzn.to/3s0PpcaIn the Twinkling of an Eye: A Novel of Biological Terror and Espionage https://amzn.to/3y7B4OLSponsorsSupport for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.Support for this show comes from Juniper Networks. Juniper Networks is dedicated to simplifying network operations and driving superior experiences for end users. Visit juniper.net/darknet to learn more about how Juniper’s Zero Trust Data Center provides uncompromising visibility across all your data center environments. Visit juniper.net/darknet to learn more.
Transcript
Discussion (0)
I want to tell you about Operation Lying Doggo.
Have you seen those Lasso Apso dogs?
They're the big breed dogs with really long, bushy hair.
Like, you can't even see their eyes.
Or think about those mop dogs.
You know, the ones that look like their hair is made of a mop.
Well, there was a CIA operation which required the special agents to buy one of these big dogs that had this long bushy hair.
These agents then found someone who had permission to go into a high security area.
There were security guards in this area, which would ID the people trying to come in and search the car.
The CIA wanted to get into there, but they couldn't.
Security was just too tight.
But they came up with a plan to try to get this big-haired dog through the gate.
And so they convinced some people who had access into the secure compound to let the dog ride in the back of the car every time they went in and out of the gate.
The security guard would stop the car and check their IDs and see their clearances
and also look at the dog in the back.
But when everything looked fine, they would let them go in.
The dog got into the high security area.
Phase one of the operation is a success.
But now we're on to phase two,
which is to make the dog a regular visitor.
They continued to put the dog in the back of the car
and go in there over and over,
driving through the security checkpoint,
having the security guard look to see the dog in the back
and letting them through.
Sometimes the dog was up walking around in the back of the car.
Sometimes it was laying down sleeping.
And this worked.
Phase two is now complete.
On to phase three.
Once this routine was established, the CIA officers went to a wig maker to create a fake
version of this dog, sort of a disguise that was big enough that a CIA officer could put
the costume on and hide inside.
And so the wig maker made the disguise.
And when it was time for the CIA officer to sneak into the high security compound,
the officer put the dog disguise on and laid down in the back of the car,
which looked just like how the real dog looked when it was sleeping in the back.
The security guards were so used to seeing
a big fluffy dog in the back that they didn't pay any attention to it and let the car ride in.
This is the length that the CIA goes through to sneak people into high security areas.
That was Operation Lying Doggo. And the CIA has conducted lots of secret plans to gather
foreign intelligence like this.
This is called espionage,
and at times it can be really intense.
In this episode, I interview an ex-CIA officer to hear some stories about how he gathered
foreign intelligence from people.
These are true stories from the dark side of the internet.
I'm Jack Recider.
This is Dark by Delete Me.
I know a bit too much about how scam callers work.
They'll use anything they can find about you online to try to get at your money.
And our personal information is all over the place online.
Phone numbers, addresses, family members, where you work, what kind of car you drive. It's endless.
And it's not a fair fight. But I realized I don't need to be fighting this alone anymore.
Now I use the help of Delete.me. Delete.me is a subscription service that finds and removes
personal information from hundreds of data brokers' websites and continuously works to
keep it off. Data brokers hate them because Delete.me makes
sure your personal profile is no longer theirs to sell. I tried it and they immediately got busy
scouring the internet for my name and gave me reports on what they found. And then they got
busy deleting things. It was great to have someone on my team when it comes to my privacy.
Take control of your data and keep your private life private by signing up for Delete.me.
Now at a special discount for Darknet Diaries listeners.
Today, get 20% off your Delete Me plan when you go to joindeleteme.com slash darknetdiaries
and use promo code darknet at checkout.
The only way to get 20% off is to go to joindeleteme.com slash darknetdiaries
and enter code darknet at checkout.
That's joindeleteme.com slash darknetdiaries.
Use code Darknet.
Support for this show comes from Black Hills Information Security.
This is a company that does penetration testing,
incident response, and active monitoring to help keep businesses secure.
I know a few people who work over there, and I can vouch they do very good work.
If you want to improve the security of your organization, give them a call.
I'm sure they can help.
But the founder of the company, John Strand, is a teacher.
And he's made it a mission to make Black Hills Information Security world-class in security training.
You can learn things like penetration testing, securing the cloud, breaching the cloud, digital forensics, and so much more.
But get this, the whole thing is pay what you can.
Black Hills believes that great intro security classes do not need to be expensive,
and they are trying to break down barriers to get more people into the security field.
And if you decide to pay over $195, you get six months access to the MetaCTF Cyber Range,
which is great for practicing your skills
and showing them off to potential employers.
Head on over to BlackHillsInfosec.com
to learn more about what services they offer
and find links to their webcasts
to get some world-class training.
That's BlackHillsInfosec.com.
BlackHillsInfosec.com. BlackHillsInfosec.com.
In 1976, Jim Lawler was a law student in the University of Texas.
He was in his senior year, so him and all his classmates were trying to find jobs. I saw on the job board that the CIA was coming to the law school,
and they were interviewing for attorneys
for the agency's Office of General Counsel.
So I went to this interview,
and the gentleman who interviewed me
was a man named Mr. Bill Wood.
Mr. Bill Wood from the U.S. government
came to the university,
and he was there to scout for legal talent
for the U.S. government.
And he sat down to interview Jim Lawler,
and he saw something in Jim,
something that Bill thought would be a good fit for Jim.
Two or three minutes into this interview,
he looked at me and he said,
Jim, have you ever thought about the clandestine service?
I said, no.
In fact, I don't even know what the clandestine service is.
The offer was intriguing, but Bill couldn't tell him anything specific.
Jim knew he was from the CIA, though, and had a pretty good hunch that this had something to do with working for them.
But Jim was a law student and was planning to work for his family business and wasn't ready to drop all that to go work for a clandestine service. So he thanked Bill and declined whatever mysterious opportunity there was
and went to work in the family business.
Three years later, Jim was still working hard, making good money,
but he was becoming unhappy.
The family business wasn't quite as rewarding as he thought,
and he never did throw away Bill Wood's card.
So he reached back out to him and said,
hey, are you still hiring?
Because now I'm ready.
Jim's hunch was correct.
It was an offer to be tested
to work for the CIA conducting espionage.
Jim had to go through a series of tests
to see if he was cut out for it, and he passed.
He was officially hired by the Central Intelligence Agency as a case officer.
The first part of his training was to learn what a case officer is,
or sometimes called an operations officer.
So let's go over what that job entails.
According to the CIA.gov website, operations officers clandestinely spot, assess, develop,
recruit, and handle non-U.S. citizens with access
to foreign intelligence that is vital to the U.S. That means it would be his job to travel to other
countries and get people to tell him information that they shouldn't be sharing with the U.S.
On this show, I often talk about people known as social engineers and their social engineering
techniques to gather data that
they're not authorized to have. But the CIA uses the exact same techniques to gather foreign
intelligence. The operations start with identifying the kind of information they want to gather.
This might be military plans, trade deals, negotiations with other countries, or something
that would be of interest to the national security of the U.S.
Then they have to figure out who might know or have access to this kind of information.
Then they have to find a person who is susceptible to being persuaded to give the information up.
They expected me to manipulate, to exploit, to subvert, to convince people to commit treason.
Jeez, that's intense.
I mean, getting people to commit treason sounds illegal.
Absolutely.
Illegal against foreign laws, yes.
That's what makes it fun.
No, we're breaking other people's laws.
We're not breaking U.S. laws, but it's called espionage.
That is typically against the law in most countries.
Okay, so there are some high stakes that come with this job.
If you're caught trying to recruit someone, it could be some serious jail time for you.
Or worse, you might be tortured or killed.
But to Jim, this was exciting, and he was eager to learn how to do it effectively without getting caught. One of the parts of the CIA officer's job is to identify the perfect person
to recruit. This is often known as a source, since they're the source of information. Today,
you can easily look on LinkedIn to see who works for a certain department or office that you want
to target, then just go down the line to find
which person might be the most persuadable. But when Jim was in the CIA, LinkedIn wasn't around.
So Jim had to learn some techniques for how to find people's names or job titles and as much
information as he could gather from them to try to find their weakness. Did you use any of that
spy gear, you know, secret pen microphones and cameras and stuff?
Did you get into that much?
Oh, occasionally.
But you know that stuff, it's just, it's just toys.
To me, that was never interesting.
The interesting thing is the human interaction.
That's what's the variable.
That's the thing that's so fascinating to me.
Jim was drawn to the direct face-to-face persuasion and manipulation of people,
which is really important to the CIA.
To get insiders to flip and help the CIA was always an important job.
And this is called collecting human intelligence.
Sure, some CIA operations are setting up long-range antennas and microphones
to snoop on things, but Jim's specialty was exploiting people. And during his time at the
CIA, he learned that people will always be exploitable. After all, we're only human,
and humans make mistakes. And there are flaws that exist in all of us, which are like
unpatched vulnerabilities. That's a good way to put it, an unpatched vulnerability.
So they make something called a targeting package.
It identifies the information they're after
and the person who can potentially give up that information.
Now, here is where Jim comes in to develop a relationship with the target person.
He'll need to fly into that country and somehow find that person and get close to them.
The targeting package has
everything you need to know in order to initiate contact, establish rapport, and build trust.
What Jim likes to do is find the main source of stress in someone's life because people who are
under stress are more recruitable. You do not recruit happy people. You recruit people who are under stress.
And everybody's under stress, unless you're dead.
Everybody's under stress.
And my talent was that I was able to, over time,
detect exactly what the stress was.
So I used to be a rock climber.
Are you a rock climber, Jack?
I have done some rock climbing, yeah.
Okay.
When you are studying the rock, what are you looking for?
I'm planning, you know, right, left hand into the cracks.
You're looking for the crack system, right?
And if you're a long way away from the rock, you can't see that crack system.
But if you get up close and you study it, you can find out what the crack system is. And people are the same way. They have these emotional cracks and needs and
stresses, just like the rock. And so if I study a person long enough, I can figure out what the
crack system is. And sometimes it takes me a short time. Other times it takes me a really long time.
One time it took me 11 years.
There's an acronym the CIA uses called MICE, M-I-C-E,
and it outlines the different ways you can persuade someone.
M stands for money.
I stands for ideology because some people detest the country's political system that they're in,
so they believe in the American system.
So that's an ideological recruitment.
C stands for coercion.
We don't typically use coercion,
but certainly the Russians and the Chinese will coerce people,
blackmail them, frequently extort them to become a source.
And then the final and actually most important letter in MICE
is E, which stands for ego, because people do a lot of things for ego. In fact, rarely, never did
I ever encounter anybody who did it purely for money. The money stands for something. And yeah,
I like to have money in the relationship because it focuses them. But it rarely was ever strictly a quid pro quo,
strictly a financial thing. On Jim's first assignment, he was sent to a foreign country
and was given a whole new identity. He was told he now works for the U.S. embassy in that country.
I was operating under official cover. I was under State Department cover.
The embassy job was his pretext.
He needed a reason to be there.
His real mission was to identify, assess, develop, recruit,
and handle non-U.S. citizens with access to foreign intelligence
that his government determined was important to its foreign policy.
So I had to do both an official job as a State Department officer in an embassy,
but I also had my clandestine job as a CIA case officer. And I would do that either after hours
or when I had a free moment, I would go and do that. So during the day, he would study his
targeting package and learn about his target and the information he's after. But then at night
is when he tried to develop relationships with the target. His official cover also provided him
with diplomatic protection, which was really important if he got caught because this was a
way for him to avoid any serious punishment. Well, if you have diplomatic protection like I did,
what we call a black passport,
the worst that can happen is you're arrested, you're taken downtown, and, you know, you demand to see a consular officer, somebody from the embassy.
And then within a day or two, you'd be declared persona non grata,
which means you have to leave the country along with your family.
So Jim is in this foreign country just doing his cover embassy work.
When suddenly I one day I got this cable, a classified cable from Washington, a message
which said in a couple of years or less than a couple of years we are going to be engaged in some highly important negotiations with a certain country.
And these negotiations are, we need to have sources to tell us exactly what their positions are.
Okay, sounds like Jim's being assigned his first mission as a CIA case officer.
This operation is asking Jim to find a source who would be able to supply intelligence that would help with upcoming negotiations that this foreign nation is engaged in with the U.S.
It's a big deal.
And the message goes on.
We have very few, if any, sources on this.
And this is critically important to national security.
And so they listed some qualifications that we should look for. If any of us had these sources that had the following qualifications, then please increase your what we call developmental activities, which is where you're building trust with the person, the target, the person you want to recruit.
And it turned out that I had met an individual who met that criteria exactly.
I'd met him in a ski class.
A ski class.
See, Jim is an outgoing social kind of person.
He likes outdoor activities like running and skiing,
and he likes getting together with others to do it.
And of course, as he's doing all these social events,
he's keeping an eye on everyone he meets
just in case he can use that person.
And in this case, he did remember somebody
who would be the perfect target for this operation.
And so I then accelerated our developmental phase of the operation
where I started going out to lunch with him and having dinners
and building that friendship.
And the most important thing is building the trust.
And got to the point where I thought,
okay, I could pitch this person,
basically lay out a recruitment pitch,
and recruit him.
So Jim has already made a friend
who he knows has access to this privileged information
that the CIA wants.
And now he's got to figure out,
how do you recruit
someone who's a friend to become an inside source of intelligence? Jim remembers his training to
look for certain areas of stress or cracks in someone's life. Jim couldn't find any areas of
stress in this guy's life. He had a good job, a nice wife, a kid, his health, and he was happy
all around. On top of that, he knew this
guy was loyal. What do you offer someone like that to get them to betray their country? Jim's
only idea was because they were such close friends, he might be able to convince him to share
information based on the strength of their friendship. But this is not an effective
recruitment strategy. It's risky,
and it doesn't work well. That's typically not going to happen. But Washington was so desperate
for sources. They absolutely, they agreed to this. And so I went into this meeting with him,
and I laid my cards on the table, said, you know, we've got, our governments are about to go into these negotiations.
I will pay you so much a month if you will provide me privileged insights into this.
Share these with me.
That's a big ask.
This guy worked for a foreign embassy.
He knew Jim worked in the U.S. embassy. And now Jim is offering
him cash money for secrets going on in that foreign embassy? This must have been a heart-dropping
moment for both of them. To just casually come out and ask your friend to betray his own country?
Espionage is illegal. It's risky for both sides. Up until this point, Jim had not done anything wrong. But now suddenly,
the wind has changed in the room and it got much hotter because Jim is hyper aware that what he's
asking is breaking the law. Absolutely. Yeah. I mean, typically, and this is not unusual, Jack,
the person that I'm about to recruit, the person that I'm going to pitch, sometimes it's already giving
me classified information. We're just not rubbing their nose in it. But then at some point, I may
want to make it abundantly clear. And they know what's wrong. These were some intense moments
for Jim as he waits for the guy to say something in response. He started thinking about some fallback strategies
and things to say if it didn't go his way.
We have a saying in CIA,
it's okay to get turned down, but not to get turned in.
What if he goes to his ambassador and he says,
you know, that Mr. Lawler,
the third secretary of the American embassy,
he just propositioned me to become a
traitor, to commit treason. This is why being a CIA operative is such a delicate job. If he's too
heavy-handed, it screws up the operation. If he's too nervous, that could screw things up too.
At some point, you have to make a recruitment pitch. And if you miscalculated your source by the smallest margin,
you could easily get turned in,
which would be an absolute mess for you and your government.
It could ruin the negotiations,
or the source could agree, but then feed you false information.
And that's when he looked at me and he said,
Jim, he said, look, you and I are friends, but what you're proposing,
that's morally wrong. Now I've pitched 50 or 60 people in my career, Jack, and I can tell you,
he's the only guy who ever posed a moral objection to a recruitment pitch. Most of the time,
they object based on one thing and one thing only, and that's fear.
So I went away from that dinner feeling pretty low.
Here, I got turned down, and I'm thinking, uh-oh, what's going to happen next?
When is the next shoe going to drop?
And after about two or three days, I finally thought, you know, I better call him and take his temperature and see if, you know,
if he's mad at me or not. He didn't act mad at the time, but I thought, gee, this could be bad.
So I called him up and much to my relief, he didn't hang up in my ear. And I said to him,
you know, I had a really good time last week at that dinner. I was wondering
if this Friday you might be free again, we could do it again. Well, I was greatly relieved when he
said, you know, Jim, I was thinking the same thing. That would be good. So I thought, okay,
I don't think he made a complaint about me to his ambassador. So I'm just going to go to this next dinner and make sure we're still
buddies. So we went. I showed up. He showed up. He seemed in a good mood. The waiter came over,
dropped the menus off, stepped away from the table, and the first words out of my friend's mouth, Jim, that offer you made me last Friday,
is that still good?
I said, yeah, it is.
We're friends.
That's why I offered it to you.
He said, well, what you don't know
was about three days after that dinner,
my wife announced that she wants a divorce
and I can't afford to pay her the alimony to which she's entitled
and put my two teenage boys in private schools when we go home next summer.
Because in my country, you can't get a good education unless you're in a private school.
He said, I can't do that unless I accept your offer.
And I know it's morally wrong.
Well, I started to say something about it.
It's never morally wrong for two friends to help each other.
But he kind of put his hand up and he said, Jim, he said, it's morally wrong.
But I'm going to do it.
And one of the things you learn in law school is if the judge rules in your favor,
shut up and get out of court. Don't argue with him. And so I said, okay, great. Well,
he started bringing me out a lot of classified information. Sometimes, I mean, sometimes it
would be six or seven inches thick. And then I found out it wasn't just his financial needs that convinced him to do this.
No, not, I mean, that might've pushed him over the top, but that wasn't it really. What it was,
was this guy absolutely detested his ambassador. And as he would hand me the intelligence that he
was giving me, he said, Jim, when I hand you this,
he says, what I'm going to try and tell you right now
is I absolutely hate my ambassador.
He claims credit for everything that I do
and everything that everybody else in the embassy does.
And this worthless son of a gun,
he goes around this country saying what a great guy he is,
when the whole time he's stealing credit. He says, as I hand you this intelligence,
it's like I'm kicking that son of a bitch in the face.
And I said, hey, we're buddies. Go get me some more of this, and let's kick that son of a bitch
again. He did. He did. He was, but so it was, what I'm
trying to tell you, Jack, is revenge is a big, big motivator in espionage. And because most people,
you know, like he did initially on the moral basis, most people have been taught from an early
age, you don't betray your family, you don't betray your country,
you don't betray your friends.
But in his case, he felt like he had been betrayed first.
And so all he was doing was evening the score.
Remember mice, money, ideology, coercion, and ego?
Revenge falls under ego.
This guy really didn't like his boss taking credit for
his work. And because he didn't like his boss, this really worked well for Jim. So his source
provided Jim with key information about the negotiations that country was conducting.
And Jim passed this information back to Washington, who then used the intelligence to their advantage.
As it turned out, the U.S. used this information when negotiating with that country and was able
to save billions of dollars from this. Because imagine doing some kind of negotiation deal with
someone when you already know what the lowest number they're willing to negotiate with.
It was a major success for Jim and the U.S. And this was the beginning of what
went on to be a 25-year-long career for Jim as a case officer in the CIA. And over that time,
he pitched lots of people and recruited many to be sources. And he did this in over a dozen
countries all over the world. And over the course of his career, he mastered the art of persuading people
and getting them to give him information.
Sometimes it may be something very innocent.
I might go to a lunch with somebody
and they share some things, not really classified,
but something that's maybe a little inappropriate.
And to Jim, these are signs
that the person could become a source.
And he's got a few tricks up his sleeve
to try to recruit them
so they can provide much more valuable information to him.
And I would come back at the next lunch
and I'd say, you know,
that information you shared with me,
I've got to thank you for that.
I found out that Washington liked that so much,
they gave me a $2,000 performance award.
I can't take it all.
I've got to share it with you because this was your intellectual property.
And I'd have maybe $1,000 or $500, and I'd have it in an envelope, and I'd send it across the table.
And they'd say, oh, you don't need to do that.
And I'd say, no, you've got to take it because I feel guilty now. I took your words and
Washington's paid me and we're making a great team here. Get them boosted up. Somebody once
said that I'm nothing but a cheerleader. And I said, well, okay, if I make you feel good,
if I say, you know what, the president of the United States read this and he absolutely respects you like you wouldn't believe.
Appeal to their ego.
Another strategy he uses is called a reverse pitch.
I'll say, well, Jack, two friends of mine,
one guy, he had something that the other one needed
and they worked on this, you know,
and man, it just worked out so well for both of them.
And then after a while, Jack says,
well, gee, Jim, you and I could do that.
And I say, oh, tell me how we could do that.
And it's basically where you get the person to basically volunteer.
And here's one that's really bizarre.
Sometimes the CIA recruits people who don't have any access to any information,
but they do what's called a seeding operation,
where they help get this source into a position
that would give them access to the intelligence that the U.S. wanted.
And so you recruit the person before they have access,
and then you seed them in or feed them into that organization to be a penetration.
The most famous seeding operation in history was run by the Russians.
It was called the Cambridge Five.
The Cambridge Five is a fascinating story. A University of Cambridge is a prestigious school
in the UK. Lots of students that go through there end up in high ranks of society, especially in the
1930s. So what the Soviets did was they got one of their spies to be a professor at the university.
And this was right before World War II. So there was
a lot of talk about Marxism, fascism, and capitalism. Well, the Soviet spy professor
convinced one of the students that Marxism is better equipped to handle the oncoming problems
of the world. And then he started asking the students if they wanted to help fight fascism.
And this is how the first of the Cambridge Five was recruited,
Kim Philby. Now, once Kim was on board to help, it was easy to get him to convince some other
friends to help. Soon, there were five students within the University of Cambridge that were
now working for the Soviets. But there's not really much for some college kids to report.
And that's where the seeding comes in.
It wasn't about the information they had now.
It was about the information they could get access to later in their careers.
And so they recruited them and then fed them into the British Intelligence Service
and the British Domestic Service.
The most famous was a man named Kim Philby.
And Kim Philby was so successful,
he almost became head of British intelligence.
He and his four, the other four,
incredible amounts of secret information
they provided the Russians over the years.
Fabulously successful seeding operation.
It's absolutely incredible
that the Russians would recruit teenagers and then help
them get into top secret jobs. And then the Russians would get fed this classified information
all throughout World War II even. This was one of the most successful spy rings ever.
And I believe the CIA took notes on this kind of seeding operation and has conducted their own seeding operations since then.
Now, sometimes when Jim is recruiting a source, he keeps his cover.
He has an alternative persona and acts like someone else.
But there are times when he has to drop this cover and say something like,
hey, well, actually, I'm a CIA officer, and I have an offer for you.
And they call this dropping cover.
And it's got to be a weird experience to make friends with someone for months
and then suddenly discover they're really a CIA officer
and they want access to your classified information.
It would depend on the target.
If I think the most effective thing would be break cover,
tell them I'm really a CIA officer,
then I would do that. Or I might make allusions to my agency, my organization, without rubbing their nose in it. I've recruited people under commercial cover where I pretended to be a
businessman. Basically, I pretended to be what we call a knock because they might be willing to, say, accept a consulting fee and provide
information to a business person, but not to a person from the American embassy. And I've done
that successfully, where I posed as a business person and said, you know, this is great. We could,
you know, I'm a consultant. I would like to hire you as a consultant.
And if you just provide me all of the information on this, then I will pay you so much a month.
But never any mention either of CIA or the U.S. government, because some people would find it
more palatable to deal with, say, a business person than to know that they're involved in
real legitimate espionage.
What's the most you think you've ended up paying someone?
Oh, I know exactly. It's highly classified. But let me put it this way. It's in the millions.
It was worth it.
It was worth it because it saved the country.
Potentially saved hundreds of thousands of lives. What's that worth?
Once a CIA case officer successfully recruits a source,
then they give the source to a handler,
which is a person who will work with the source to keep the information flowing.
I was also a handler because once you recruit a source,
then you are expected to handle the source,
meet that source clandestinely, get the
information that he or she are privy to, and then you report that information in classified channels
back to Washington where it's sorted out and combined with the intelligence from other case
officers or perhaps all source intelligence from the signals intelligence that the NSA captures through phone conversations or through computer penetrations.
And so, but I would be a handler.
I would set up a time to meet my sources clandestinely, and I would find out exactly what kind of information, how much information they had stolen.
And then I would report that information back to Washington.
How are you getting data from these people,
information from your recruits, from your sources?
I mean, sometimes they would actually hand me,
physically hand me documents, classified documents.
How do you do that secretly? That's what I'm wondering.
Well, they'd meet me at a safe site,
maybe at a safe house or at a car pickup or a brush pass where they'd meet me at a safe site, maybe at a safe house or a car pickup or a brush
pass where they hand me things. They might also just observe stuff. We have a verbal debriefing.
I would ask them things, take notes. Again, meet maybe in a hotel room or a safe house or someplace
out of sight. You might equip them with what we call a covert communication device where they can electronically provide you with the information you need, you know, using some type of nowadays some type of encrypted system.
And these days they might download stuff to a thumb drive and provide it to me either physically or do a dead drop where they hide the thumb drive or whatever it is somewhere at a prearranged spot.
They make a mark on a wall that I observe. Then I go by and I service the dead drop. I recover the
thumb drive. So there's a bunch of ways you can do it. Yeah, yeah. It's just all out of my purview,
right? So the mark on the wall, I walk by that wall. I don't notice the mark, but you walk by it, you do.
Right, and so that means that you or somebody, my source,
has put something in a dead drop, which may be miles away,
but they've kind of gone by with a piece of chalk
or put a piece of tape on a wall.
Nobody else even notices, but I notice that my friend,
my source, has now concealed a thumb drive or some type of information somewhere that I need to recover.
Gosh, there's got to be a whole secret language that you've got to learn.
Like which way your shoelaces are tied.
Are your glasses up on your head or are they down on your nose?
Like all these different things I bet mean stuff.
Right. If I'm meeting somebody and my source,
I've told him, look,
if I see you take your glasses off,
that means that you think you've been followed
and so I'm not going to meet you, you know.
Or if I've got my hat cocked to a certain side,
that means just keep walking, don't approach me.
On the other hand,
if I've got a certain color book or a newspaper in my hand, in my right hand, that means it's okay.
Come on, let's go to the nearest cafe or to a hotel somewhere.
So you have these secret signals to say that either you're under observation or no, it's actually safe and we can meet.
What about encryption?
Like one-time pads and these kind of things?
Yeah, those are all used.
You know, we would encrypt messages and send it
and then you have something, you decrypt it.
For years and years, we and the Russians would use one-time pads,
which are basically, like they say, one time you would decrypt a message,
get a series of numbers and things, and then you'd have a code book that you would look in.
It's very tedious, but virtually impossible to break.
We're going to take a quick break here, but you're going to want to come back because
we're going to talk about one of the most important CIA operations ever. out the best way to record. But oh, so much more goes into making a podcast than that.
If you're thinking, what if I start my own business? Don't be scared off because with Shopify, you can make it a reality. Shopify makes it simple to create your brand open for business
and get your first sale. Get your store online easily with thousands of customizable drag and
drop templates. And Shopify helps you manage your growing business. Shipping, taxes and payments are
all visible from one dashboard,
allowing you to focus on the important stuff.
So what happens if you don't act now and someone beats you to the idea?
The best time to start your new business is now with Shopify.
Your first sale is closer than you think.
Established in 2025.
That has a nice ring to it, doesn't it?
Sign up for your $1 per month trial period at Shopify.com slash Darknet.
Go to Shopify.com slash Darknet and start selling with Shopify today. Shopify.com slash Darknet.
In another one of Jim's assignments, he was handling a source, but that source retired. He was still
providing good intel, though. Very friendly guy, much beloved by most of the people in his foreign
ministry. And he started giving me some excellent information coming from a young woman who had
decided to spend the summer with her brother, who was my source's best friend.
Okay, so Jim had a good source to get intel on what's going on in that target country,
but that source retired and was slowly losing his connections for gathering intel.
But now Jim is hearing his old source is getting good intel from a woman. Now, the woman was a secretary at the
foreign ministry inside her home country. Jim wasn't in that country, but wanted intel from
that country. But for Jim to go into that country to try to recruit sources, that's a bit risky.
So luck would have it that the woman his source was getting
intel from just happened to be traveling to the same country where Jim was. She was just taking
a month-long break from work to visit her family. Well, this was quite an opportunity for Jim. If he
could convert her while she's on vacation and then she goes back home to work in the foreign ministry again,
it could be a goldmine of intelligence.
And my friend, since, you know, he was working for us,
he takes her out sightseeing, took her for coffees and dinners and things like that,
and developed a good relationship with her.
And she really loved our guy.
She liked him a lot.
As a secretary in a foreign ministry,
she wasn't a decision maker at all. But she saw what decisions were being made.
So now that he had learned about this secretary working for the foreign ministry,
she made a really good target for Jim.
Jim gets his source to arrange a meeting with her, but it was important
that Jim not uncover his source. He did not want her to know that this guy is feeding information
to the CIA. It might spook her. It might make her turn that guy in. For this, Jim decided to
come up with a pretext, a cover story for why he needed information from her.
So I had to engineer a scenario.
Jim comes up with a pretext.
He's going to call himself Jack Mitchell and pretend to be a commodities trader.
I told him to show up at a certain restaurant a certain day, and then I would show up a little bit later and pretend that I was waiting for someone.
And so he's seated near the door with this young woman and they're having dinner. And he sees me
come in and he turns to the young lady and he said, oh, look, there's Mr. Jack Mitchell. I just
met him at a cocktail party three nights ago. I'm going to go over and say hello, which was the polite thing to do. So he did. And I chatted with him. And then after about five, 10 minutes, when my supposed dinner
date has never shown up, he turns to her and says, why don't we invite Mr. Mitchell to come over and
at least sit down and have a drink with us? I pretended like, oh, no, I'm sure my friend will
be here any moment. He said, well, look, just sit down with us, have a drink until your friend comes.
He sits down at the table with his old source and this potentially new source that he's trying to recruit, the secretary.
She didn't suspect this was anything other than a chance encounter.
But of course it wasn't.
And now Jim needs to start making his moves.
Introduced myself in my alias, Jack Mitchell,
and I said that I was a oil and gas commodities trader.
And it turns out her nation is one of those nations in the world
that is absolutely blessed with a riches of gas and oil.
It's obvious that her nation has access to a lot of information on what the
Organization for the Petroleum Exporting Countries, OPEC, is doing, what their quotas would be. And
that kind of information could be worth a gold mine to somebody who's an oil and gas commodities
trader. Interesting cover, a commodities trader. It works because trade deals in her country do influence
the stock market. So he was just making clear how valuable this kind of information would be to him.
You can make or lose a fortune in oil. And if I have insights into what her country is going to do,
this, I'm not making this up. You really could make a fortune in the oil and gas market. So,
you know, I'm going to pay her a certain
amount to give me advance, you know, heads up which way her government is going on quotas and
things like that. You know, are they cheating on their other OPEC partners? At least that was his
plan. But this was the first dinner. He didn't ask for any of this information on the day he met her.
No, he's got to finesse it and take it slow to build the relationship.
But he starts putting these questions in her head, at least,
making it clear what kind of information
he would love to get his hands on.
What are they going to do?
How much oil are they shipping out of their ports?
I mean, it really and truly would be worth a lot of money.
The first dinner went great.
Jim, or Jack Mitchell, hit it off with her,
and their relationship was going well. So I said, gosh, this is great. Jim or Jack Mitchell hit it off with her and their relationship was going well.
So I said, gosh, this is great. How about we have lunch together? And she thought, sure, why not? So
I asked her out to lunch a day or two later, took her to lunch. We had a good time. And within one
or two meetings, I proposed a commercial relationship with her, saying that if she would
give me the privileged insights into what her country was doing in the oil and gas market,
then I would provide her with so much money a month. Jim's source had given him more information
about the secretary, which showed Jim where her cracks were. She had a health issue that needed some attention.
Her government back home wouldn't pay for it.
It was about a $5,000 medical procedure
because their philosophy was,
if you want us to pay for it, then you come home
and we'll do it here in our home country.
But we're not going to pay somebody
in this European country to do it.
And she didn't want to stop her very nice summer vacation with her brother.
So she was faced with this dilemma.
I need $5,000 to get this procedure done.
I don't have it.
And so naturally, her new best friend, Jack Mitchell,
proposes that for $5,000 and a certain monthly stipend,
you know, if she would share these insights with me, then she's going to get this great consulting fee and the $5,000 signing bonus.
I guess this one's a little bit softer of an ask because it sounds like, oh, I'm just trying to
make money on the stock market. So, hey, would it be possible for you to give me some insider info?
That's not as scary of an ask versus can you betray your country so my country can.
Absolutely.
Yeah, it's a much softer thing because she's all she's doing is giving me a little heads up on which way the oil and gas market is going to go.
And I'm going to make a fortune and she's going to make money, too.
So is it technically illegal?
Yes.
But it's just consulting.
You know, it's not it's not treason.
And so she readily agreed.
We had a bottle of champagne.
We celebrated.
I went back to my home office,
and people were jumping up and down
because she was the first one from this country
who had been recruited in a long time.
Success.
Jim recruited a secretary in a foreign ministry.
Now he could reliably continue to get intel from her and information about this nation.
It was a big win for Jim.
And then my boss dropped the hammer on me and he said,
now you've got to go back and tell her that you really worked for the CIA.
I was stunned because I hadn't thought about that.
He said, we, you know, when she goes back to her home country, we're not going to be
able to communicate with her except through some kind of clandestine communication system because
we don't have an embassy in that country anymore. He said, there's a lot of questions we need to
ask her that we know she has access to that have nothing to do with oil and gas. So you've got to
go down and you've got to break cover and tell her she's really working for the CIA. And to be fair, you really need to let her know that this is a much
more sensitive relationship than just a commercial consultancy, because if she thinks it's a
commercial consultancy, she might brag to some of her friends at her office and they may think,
what is she doing? So we need to let her know this is a sensitive
relationship. And I thought, oh, geez. So I go down there and I apologize. I break cover,
tell her I really work for the CIA. And then, of course, that's when she looks at me and she said,
Jack, look, listen, you're a good guy. But she said before, that was just commercial consulting.
Yeah, a little bit on the shady side, but it's not espionage.
Now you're asking me to be a spy.
She said, I can't do this.
I'll try and get you your money back, but there's no way I can do this.
And of course, I was thinking, lady, you're a smart gal.
I don't blame you one bit.
So I didn't argue with her at all.
Jim goes back and tells his boss she quit, just like he thought she would. But his boss
was not having it. He wanted Jim to find a way to recruit her and said, no, this is not acceptable.
Try harder. Nothing like a little pressure. And she was scheduled at that point to leave in about
three weeks and go home.
And so I thought, God, is there any way I can salvage this thing and turn her around? And I struggled with that for a good two or three days. I called her up and I said, could we have a
going, you know, farewell dinner? Because even though she's now turned me down and quit,
you know, she wasn't that mad at
me. And so I said, how about a farewell dinner? She said, that sounds fine. So I arranged to meet
her at an extremely romantic restaurant that just had beautiful views of the mountains and the lakes.
There weren't any romantic intentions with this dinner, though.
Jim wanted to try to salvage the relationship
which fell apart.
He wanted to seem like a nice guy,
charming, caring,
and maybe even come off as a friend.
She liked me.
I liked her.
It was going to be a very nice farewell dinner.
And yet I had no intention
of trying to dissuade her
or persuade her to change her mind. I just had given up on that. But what I had no intention of trying to dissuade her or persuade her to change her mind.
I just had given up on that.
But what I had done, when I arrived in the city that she was in, I had bought a little bud vase in a gift shop that I paid the equivalent of maybe $30 or $40 for.
It was about six inches tall, very delicate, very pretty little bud vase.
I had it gift wrapped and I took it off to this very nice restaurant.
And we sat there and chatted for probably a good hour and a half or more,
just about our families and lives and things like that.
So here we are seated at the restaurant, dessert and coffee have come and gone.
And my foot touches the present that I'd bought her under the table. I'd almost forgotten about it. And I pulled it out and I put it in front of her. And I said, here, I did get you something. And she said, well, what is it? I said, well, just open it. You'll see. So she opened it. And she's looking at this little bud vase. And I said, what I'd like you to do is I'd like you to take that with you when you go home in a couple of weeks.
And if you want to, maybe you could even take it to the foreign ministry and put it on your desk.
And when you look at it, you'd be able to think about me.
And she looked at it, stared at it, didn't say anything.
And then I noticed that she was crying.
And I thought, oh, what did I say to upset her?
And I heard her say something under her breath.
And I leaned in and I said, what did you say?
And she said, Jack, I can do this.
And I said, I know you can do it. But I said, I don't want you doing this unless you really want to do it. Which I really, I didn't want her to do it if she wasn't really in
wholeheartedly. And she said, no, Jack, I can do this. And boy, could she do it.
We trained her, we sent her in, she worked for us for five years. And she identified every deep cover intelligence operative from her nation all over the world.
She was a secretary, but she was a secretary to the foreign minister.
And so consequently, everything he saw, she saw, and we saw.
It's unbelievable that the CIA has these kind of eyes and ears
that are in the secretary of the foreign minister.
Well, we did.
Of course, most nations with an intelligence branch
do the same thing to us.
They profile the people who work in U.S. embassies or military bases.
They hang out in the bars in
Washington, D.C., hoping to rub elbows with some senators or clerks or anyone who might have good
intel to report back home. There's a huge network of spies that span the globe. And it makes you
wonder, you know, what would it take for someone to get you to flip, where you're now handing information over to an intelligence
officer in another country. Sometimes the bar is just real low. I've seen people who had bad days
at work or just don't know better and post stuff to social media exposing some of the company's
secrets. But then there are others who might feed information to someone for a few hundred dollars.
But not you and me, right? We're good, strong, loyal people who don't
accept money from some random person asking for information. Unless maybe you're in a tough
situation. You want your kid to attend a nice school, but you can't afford it. Or your mother
is dying and you can't afford the doctor bills. Or something else that makes you
think, you know what, if I could get $10,000, my life would see a big improvement. And just then,
someone from the CIA comes up and offers it to you and wants some classified information from you.
Now that becomes a much harder thing to turn down. It just kind of clicked in my head where people ask me,
hey, do you think everything is hackable,
every company, every computer?
And I say, yes, because at a nation state level,
you'll have people like you who are getting people to work
at the company that you want to take secrets from
or information.
And the NSA might be asking you
for something like, hey, can you get someone in this company for us? It's not always a state
secret. Sometimes it's, I don't know, you know, something else. Right. I mean, all of your cyber
defenses are worthless if I have somebody on the inside. It's just, you know, totally worthless.
If I have an employee in an organization I want to penetrate,
then I don't care what their cyber defenses are.
It becomes an electronic Maginot line
where you think you're protected and you're not.
Oh, and by the way, the CIA often works closely with the NSA
to conduct certain missions.
Sometimes the CIA needs information that the NSA can get. And
sometimes the NSA needs help from the CIA. Because the NSA collects signals intelligence and the CIA
collects human intelligence. And when you combine these two together, it really becomes an unstoppable
force. And I guess that just makes me wonder, is there any kind of strategy to keep the CIA from
getting people to leak information? Let me reinforce that. There is no way. There's ways maybe to detect it over time.
There's ways to filter out some people. The best thing to do with your employees is to build a
trust, make them feel like they're part of a team. If you do that, if they feel like they've been
treated fairly, it makes my job as an operations officer
very difficult to penetrate your organization. But if you don't treat them right, you're setting
these people up to betray you. And they'll betray a company much more quickly than they would betray
a government. This sounds self-serving, but I actually, I am a consultant. I've done talks like
this. I have a talk that I call
Soul Catcher, where I give about an hour and a half's worth of illustrations of how I recruited
sources. And some big companies have hired me to give their employees this type of talk.
And the basic message that I try to convey is, if something is too good to be true, it's too good to be true.
And I talk about how I took advantage of people, exploited them, recruited them as sources,
just to enlighten people to be aware of people like me in their orbit. And, you know, again,
I want to stress that if a company treats its employees well, it's much more difficult for me to develop a relationship with them and to recruit them.
It's not impossible, but it makes my job a lot more difficult.
You don't give people everything they want.
You can't. fairly, and that everybody in the company gets basically the same fair deal, that really makes
it hard to penetrate and be aware of stresses, be aware of people that are under stress,
because that's when they're most vulnerable. I'm not saying that everybody who goes through a
divorce is susceptible, but I can tell you this, in a certain short time period, I recruited three
people going through divorces,
and headquarters jokingly referred to me as Dr. Divorce. Because if you're going through a divorce,
you are in an absolute psychological and financial tumult. And if somebody like me is in your orbit
and can become your best friend, and I detect that you've got something I need, guess what?
You know, you become very susceptible to a
recruitment approach. I'm looking for the loner who comes out and he's, you know, disaffected.
He's maybe shunned by the others. And guess which one we're looking for? It's that guy.
We're looking for the one who doesn't feel like they're part of a team.
Jim has been an avid runner most of his life,
and wherever he gets assigned, he likes to go on a run there.
I was stationed in Paris, and every morning I would go on a long run.
And one morning I was running, and I passed a German shepherd.
Dog was just lying there. I ran past it.
The dog didn't growl or bark or anything.
I got about maybe 10 yards past that dog
when suddenly I felt the most horrendous pain in my right leg.
And he was biting me with his jaws.
And German Shepherds, I think, have the most powerful bite of any dog imaginable.
He was able to get free and go to the doctor.
The doctors were concerned this dog had rabies.
And he went back to the spot to try to find the dog, but he couldn't.
Well, it just so happened that the rabies vaccine was invented in France.
So he went to the Pasteur Institute to get treated.
I went in, met a very, very nice French doctor and told him what happened.
And he said, well, then you've got to get the rabies shots because he said, if you don't get it,
he said, there's only been one survivor of rabies in the entire history of man.
But if you get the shots, you'll be fine. In fact, you'll actually be immunized for at least a year.
So Jim gets the rabies shot and was fine.
But whenever there was someone he didn't like at work,
he would sometimes joke that he was going to bite them.
And so that's how I earned my nickname, Mad Dog.
The deadliest weapon on Earth is the nuclear bomb.
And Jim was in the CIA while some of the U.S.'s adversaries were developing their nuclear capabilities.
The U.S. did not want some of these countries to have nuclear capabilities.
And stopping opponents from gaining this power is a delicate job,
and done through diplomacy and espionage.
There was a player in the underground nuclear arms scene called Dr. A.Q. Khan.
He was a Pakistani nuclear physicist and metallurgical engineer,
and he was working for a company that enriched uranium
when India, the enemy of his home country, successfully detonated their first atomic bomb.
This made A.Q. Khan want to rush to get Pakistan nuclear weapons so they could defend
themselves from India. One of the things he did was steal the plans for centrifuges and the
enrichment process, which this helped Pakistan develop the bomb. Pakistan tested it by blowing
up a mountain with their atomic bomb, and it was a success but after that some other countries started contacting aq
khan who also wanted these weapons he was selling blueprints for centrifuges and enrichment materials
to other countries like iran and north korea this was not good for the us since these were
not friendly nations so the us wanted to stop the underground nuclear weapons trade.
In the late 90s, Jim led a team tasked with disrupting the spread of nuclear weapons technology.
And one of the first things they start looking into was trying to figure out what A.Q. Khan was up to.
We discovered that he was taking the proliferation of this technology private.
He was offering this to other nations without the Pakistani government's knowledge.
I was running an operation where we became privy to this, to the knowledge of this.
You learn that A.Q. Khan was preparing to provide Libya with nuclear capabilities.
Now, at the time, Libya's leader was Muammar Gaddafi,
who the U.S. did not have good relations with.
Gaddafi had taken responsibility for a few terrorist attacks,
such as Pan Am Flight 103, which had a bomb on board and killed over 200 passengers.
The U.S. thought, surely, if Gaddafi had an atomic bomb,
he would use it.
So this meant AQ Khan would have to be stopped,
and it was on Jim to do it.
Jim had to come up with a plan,
and he would turn to the Russians for inspiration.
Back in the Bolshevik Revolution in 1917,
Lenin appointed a man named Felix Zhezhinsky to be the first head of Soviet intelligence. And Zhezhinsky was not even a Russian, he was a Polish aristocrat.
But he was extremely smart, and he was faced with a real existential challenge to the Soviet regime.
And that was the fact that the British and the
Americans were sending in forces to overthrow the revolution. We were sending in counter-revolutionary
forces into the Soviet Union. And so, Zhezhinsky thought, if I want to defeat the counter-revolutionaries,
I have to become a counter-olutionary. So he fanned his
assets. The organization was known as the Cheka. He fanned his Cheka assets out all across the
Soviet Union, pretending to be counterrevolutionaries. And they so penetrated the
real counterrevolutionaries organizations that they were able to systematically roll them up.
They even controlled the financing lines.
Interesting.
So for the Soviets to defeat their enemies,
they became their enemies.
This looked like a great strategy for Jim to try to infiltrate the underground nuclear arms market.
My decision was, if I want to defeat proliferators,
I have to become a proliferator.
So we created entities that held themselves out to be proliferant. Jim instructed his team to act
as underground nuclear arms sellers. And I don't know what exactly. Maybe they were offering
centrifuge plans, but they didn't go straight to AQ Khan and tell him, okay, look, we got these plans for sale. No, instead they started working with some of the other people who AQ Khan was
selling to. And this made them discover that there were a lot of people interested in what he was
selling, which gave Jim and his team a great amount of intel related to the underground
proliferation market. The story goes that you somehow made yourself known enough
that they came to you.
Right, which lowers their counterintelligence concerns
because you're always suspicious if somebody comes to you,
but you're not suspicious if you were the one
that approached the other person.
And so we made ourselves attractive.
And guess what?
They came knocking on our door.
During this time, Jim was getting a good view into this market,
which gave him knowledge of who some of the key players were.
And he started getting close to some
and eventually got some to give him key information
that was very helpful at knowing what was coming next.
Can you talk about Erz Tinner?
No, I can't. Okay. Can you talk about Frederick or Marco? No.
Hmm. Interesting. Jim did not want to go into any detail about his mission to stop AQ Khan.
And as far as I know, he's not gone on the record with any author or journalist about this.
I can't go into details about how we did it,
but it was using classic espionage.
Hmm, classic espionage.
Well, there is a book by Catherine Collins and Douglas France
titled Fallout.
And it's the story of the CIA's secret war on nuclear trafficking.
In it, France goes into some pretty good detail of what Jim did.
Frederick Tenner is a Swiss nuclear engineer and longtime friend and associate of AQ Khan.
Frederick and his two sons, Urs and Marco, were all part of Khan's proliferation
network. The CIA wanted to get inside Khan's network quickly, and there simply wasn't enough
time or opportunities to develop a relationship. So they brought in Jim. Jim discovered that Urs
had some legal issues in France and thought this might be a good way to apply pressure.
So he arranged for Urs to find out that the French authorities were looking for him.
CIA agents surveilled Urs until they determined the best time and place to approach him,
a hotel bar in Dubai that he frequented.
That's where Jim casually offered to buy Urs a drink one evening,
and they chatted for a while until Urs was getting ready to leave. And that's when
Jim mentioned that he knew about the problem with the French authorities and that he could help make
it go away in exchange for some information. Urs sat back down and Jim started talking.
This wasn't a position Urs wanted to be in. He tried to exit the conversation multiple times,
but he was simply no match for Jim.
A couple meetings later, and he became an informant,
providing Jim with eyes and ears in the Khan network.
Now, let me be clear.
This is stuff I'm reading from a book.
When I talked with Jim about what he supposedly did in this book,
he says the book is wrong. The details are
not correct, but he cannot say what details are wrong. And you'd think, why should I even read
from a book that's wrong? Because the author is a Pulitzer Prize award-winning investigative
journalist and did a lot of work to put this information together. So I feel like there must
be some truth to it. We just don't
know what to trust, which is kind of like what this whole episode is about, right? Trust? This
book, Fallout, continues. It says the CIA wanted to stop Khan quick because the last thing they
wanted was for two dangerous regimes, Libya and Iran, to get nuclear weapons. So they used coercion and money, paying Erz
hundreds of thousands of dollars over the span of months to provide key information
and sabotage shipments. The book says Jim also recruited Erz's brother, Marco, and his father,
Frederick, and they learned a lot from the Tenors, which gave them the opportunity to pull the plug
on the largest nuclear proliferation
network in history. There was just one more thing to do. Verify that the tinners had not been
deceiving them. So Jim devised a plan. He set up a meeting with the tinners at a hotel. All three of
them were already on the payroll and had received a few hundred thousand dollars. However, this
meeting they were offering them a significant amount more.
One final payout of a million dollars, as well as continued protection.
In exchange for this money, they wanted two main things.
First was the willing participation in extensive interrogations over several days
to ensure they accurately divulged everything they knew.
Second was access to all the documents and drives.
Since Jim didn't trust them,
the deal was conditional on taking the information
while the Tinners were at the hotel.
According to the book Fallout,
under the cloak of darkness,
Jim and a small hand-chosen team of CIA agents
broke into Tinners' office,
copied all the drives, and photographed the documents.
Marco was the record keeper of the family business.
So the following night, the agents picked the lock to his house and silently entered.
They quickly went to work copying drives, photographing documents,
and searching for everything relevant.
Jim stepped into Marco's closet and discovered a hidden laptop,
which he handed to the tech.
After copying thousands of files and documents and emails,
they silently slipped out and vanished back in the night.
Everything they recovered was quickly sent back to Langley, Virginia,
CIA's headquarters, to be analyzed.
And as expected, they found designs for two centrifuges that Khan had stolen
and sold to Iran and Libya.
And they also found designs for a
third, more advanced centrifuge. This meant that Khan's buyers were closer to nuclear weapons than
they thought. They had underestimated Khan again. And they also discovered something potentially
far worse. A significant amount of centrifuge equipment had disappeared from shipments and were quite possibly sold to an unidentified fourth customer.
This was far worse than they thought.
It was time to pull the plug.
There was probably a period of a few months that were ideal to stop him, and we hit the sweet spot.
George Tenet talks about it in his memoirs. He was, of course,
the director of CIA. And he finally decided that he was going to confront President Musharraf
with the fact that Dr. A.Q. Khan was betraying his secrets to the Libyans. And so he met with
President Musharraf. He revealed Khan's treachery.
And President Musharraf first said he was going to kill Khan.
And Director Tenet said, no, we don't want you to do that.
And so instead, President Musharraf put Dr. Khan under house arrest,
where he remained for the next five or six years.
That led to the disarmament of Libya.
Gaddafi turning over their nuclear technology to us,
which could have been a nightmare
had you probably remember that in,
I believe it was in 2011,
when Gaddafi's people rose up and basically killed him.
Well, you can imagine if Libya had been a nuclear-armed nation,
then how they might have used nuclear weapons on their own people.
For infiltrating and disrupting AQ Khan's network,
Jim and his team received the Trailblazer Medal,
which is one of the most distinguished honors the CIA gives out.
Oh, and in August of 2021,
AQ Khan tested positive for COVID-19 and was admitted to a hospital.
He died two months later and is considered a national icon by the people of Pakistan.
When Catherine Collins and Doug France were researching their book Fallout, they met with Jim to ask him some questions.
And here, let me read for you the opening section of the book.
Quote,
Earlier in our research, we finagled a lunch with the CIA case officer known as Mad Dog.
He is a man of honor, tenacity, and humor.
He wore a baseball cap to the meeting,
embroidered with the image of a bulldog and the words Mad Dog on it.
He steadfastly refused to discuss any aspect of the decade he spent
leading the CIA's investigation
of Khan or his role in bringing it down. He was scrupulously silent about everything except the
weather, running, and how he got his nickname. He brought along a copy of our first book and said,
we got some things wrong in it, but he wouldn't say what. And as he stood to leave, he reached
into his wallet and pulled out a slip of paper.
I thought of you when I saw this, he said.
And the paper contained this quote from Barbara Kingsolver's final novel, The Lacuna.
The most important part of the story is the piece you don't know.
End quote.
The thing that kind of puts me in deep thought about this is the ethics of it all.
As Jim says, espionage is illegal in most countries.
If it had gone wrong, he could have been arrested or possibly killed,
which means the CIA is knowingly breaking laws around the world in many countries.
So when the CIA goes around the world and completely ignores and disrespects the laws in those countries,
how can the U.S. expect other countries to respect their laws? You can't. All you can do is brace for
it. Because of the negotiation information that Jim was able to collect, he saved the U.S. billions
of dollars. But he also cost that other country billions of dollars. And the intelligence that Jim gathered saved the lives
of thousands of people by keeping weapons of mass destruction out of the hands of Gaddafi.
Sometimes people, even nations, have to work off of a higher code of ethics, which transcends the
law. Once you kind of have a permission to break the law sort of thing,
where does that stop? Or asked another way, what kind of oversight is there to make sure you don't
break the wrong laws or too many laws or what, you know, what's the limit there?
Well, we have an approval process. Before I pitch anybody, I have to submit, you know, there has to be,
A, there has to be a need for whatever information or intelligence this prospective recruit has.
I mean, we don't just willy-nilly go around and pitch people unless we have a real need for their
access. So it all hinges on access. If we have a target, someone whom we believe will cooperate with us,
and we have a strong indication that that person has access to protected information that we need
for our national security, then I would outline a recruitment scenario for headquarters where I
would say, okay, I've known this person for X number of weeks or months
or however long. We know or we strongly suspect that he or she, by virtue of their position,
has access to this protected information. And therefore, I believe I could recruit this person
because of the following vulnerabilities or the following statements from the person.
And then headquarters would say, OK, we're going to give you a provisional operational approval
to do this. So they would, you know, I wouldn't just pitch somebody without having headquarters.
My headquarters say, yes, we think that's worth the risk. Go ahead and go for it.
While Jim has not provided much information to journalists about the nuclear proliferation program that he brought down, he did recently publish a book himself called
Living Lies, a novel of the Iranian nuclear weapons program. Jim tells me it's entirely
a fictional story, but his book is about a CIA agent who disrupts Iran's nuclear weapons program
only for a different agent to discover that there's another nuclear program
that the world doesn't know about.
If you're into spy novels, this is a must-read.
And that's just the first installment of a series he's working on.
The second book in the series is titled In the Twinkling of an Eye,
and it just came out a few days ago.
It tells the story of state-sponsored development of a biological weapon. A second book in the series is titled In the Twinkling of an Eye, and it just came out a few days ago.
It tells the story of state-sponsored development of a biological weapon.
A big thank you to Jim Lawler, a.k.a. Mad Dog,
for sharing some fascinating stories with us as a CIA officer.
And don't forget to check out Jim's books.
I'll have links to them in the show notes.
This show is made by me, the sleeping agent, Jack Recyder. This episode
is produced by the prodigy,
Lowell Berlanti. Sound design
by the resonating Andrew Merriweather.
Oh, and Andrew just started releasing some of his
original music so that you can use it
in your storytelling. He calls it
the Q Shop, spelled C-U-E.
Visit q-shop.com
to listen to what he's been making.
Editing helped this episode
by the slippery Damien
and mixing done by Proximity Sound.
Our theme music is by
the illustrious Breakmaster Cylinder.
I had an idea for a movie
where a retired CIA agent
is searching for his daughter in Paris.
Turns out that movie was taken.
This is Darknet Diaries.