The Rest Is Classified - 112. How To Protect Your Secrets: Inside China’s Technical Surveillance Playbook (Ep 1)

Episode Date: December 29, 2025

The world of surveillance has changed beyond recognition over the past 25 years with the advent of technology. From CCTV cameras to cookie tracking, it's not so easy to escape the long arm of the inte...lligence services in 2025. David and Gordon are joined by the CIA's first Chief of Tradecraft and Operational Technology, Glenn Chafetz, to explore the ever-changing world of ubiquitous technical surveillance and why the Chinese state is upping their capabilities in this space. ------------------- Make someone a Declassified Club Member in 2026 – go deeper into the world of espionage with exclusive Q&As, interviews with top intelligence insiders, regular livestreams, ad-free listening, early access to episodes and live show tickets, and weekly deep dives into original spy stories. Members also get curated reading lists, special book discounts, prize draws, and access to our private chat community. Just go to ⁠⁠therestisclassified.com⁠ or join on Apple Podcasts. ------------------- THE REST IS CLASSIFIED LIVE 2026: Buy your tickets ⁠⁠⁠⁠HERE⁠⁠⁠⁠ to see David and Gordon live on stage at London’s Southbank Centre on 31 January. ------------------- Try Attio for free at ⁠⁠⁠⁠https://www.attio.com/tric⁠⁠⁠⁠ ------------------- EXCLUSIVE NordVPN Deal ➼ ⁠⁠https://nordvpn.com/restisclassified⁠⁠ Try it risk-free now with a 30-day money-back guarantee  ------------------- Email: ⁠⁠⁠therestisclassified@goalhanger.com⁠⁠⁠ Instagram: ⁠⁠⁠⁠⁠⁠⁠@restisclassified Social Producer: Emma Jackson Producer: Becki Hills Head of History: Dom Johnson Exec Producer: Tony Pastor Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 For exclusive interviews, bonus episodes, ad-free listening, early access to series, first look at live show tickets, a weekly newsletter, and discounted books, join the Declassified Club at the Rest Is Classified.com. This episode is sponsored by HP. Most people are not counter-espionage experts, but that won't stop them getting targeted by cybercriminals, seeking to extract their secrets. HP understands that approximately 4 in 10 UK businesses have reported cyber breaches in the past 12 months alone. That's why HP business laptops, desktops, and workstations bought directly on HP store
Starting point is 00:00:41 are secure straight out of the box with their endpoint security. No more stressing about dodgy emails or unexplained pop-ups. HP's independently verified Wolf Pro Security works alongside your existing security tools to protect your business users and reputation from malware and evolving cyber threats with your first click. You don't need an alias or a secret hideout to stay safe. Just WolfPro Security working tirelessly to protect your hard work. It's security that's built in, not bolted on.
Starting point is 00:01:13 Find out more about how HP can protect your business at HP.com forward slash classified. Podcast listeners benefit from a 10% discount on all business PCs, printers and accessories using the code T-R-I-C-10. Terms and conditions apply. If we are to remain an effective intelligence service in the 21st century and keep the identities of our agents and the tradecraft we use to run them secret, we must continue to modernise and adapt. Welcome to the rest is classified. I'm Gordon Carrera. I'm David McCloskey. And that was the former chief of MI6, Sir Richard Moore, speaking in
Starting point is 00:02:01 September, just days before he stepped down, actually, as C, the head of the British Secret Service. And he was issuing, I guess, David, a start warning about spying, adapt or die. And we've got a special two-part series starting today on how technology is transforming the espionage business, for which we're joined by a very special guest who will come to in a minute. And David, I guess one of the consistent themes in our stories over the last year has been the intersection of espionage and technology, whether it's China using LinkedIn or Mossad trailing Iranian scientists and using robotic machine guns or North Korean cyber bank robbers. So this is a chance, isn't it, to kind of look at how tech is reshaping the human espionage business.
Starting point is 00:02:48 It's going to be a fascinating exploration, Gordon, of sort of what's actually going gone now in the world of human intelligence operations and just to sort of tee up a few themes, which will get much deeper into over the next couple episodes. It's probably not an overstatement to say that a lot of the tradecraft that we've talked about, particularly in some of our maybe more historical series or stories that we've done, the trade craft that we've discussed is now, I guess, maybe totally or something close to totally obsolete. There is an absolute revolution going on in the way that human espionage operations are conducted, and that's everything from how you spot assets to develop them, handle them, pay them,
Starting point is 00:03:37 communicate with them, meet them face to face. The entire sort of spectrum of interaction with other humans who have secrets that we want is being reshaped by a lot of the technology that's all around us every day. I think that's the other piece of the story that's so interesting is that the technology that we're talking about is not tech that's secretive and hidden off in the world of the NSA or the CIA. It's tech that's all around us. And a lot of the tools and technologies that are reshaping human intelligence are available to everybody. everyone is kind of worried or thinking about issues of privacy or privacy and surveillance and what's going on with their phones.
Starting point is 00:04:23 You know, am I being tracked? Who's following me? Can I track my kids? You know, all those kind of questions are part of everyday life for many people. But for spies, for people trying to carry out secret work, they take on this kind of added dimension where you basically can't do the business without them. So we're going to do something slightly different. We're going to kind of look at this subject, aren't we, through these.
Starting point is 00:04:44 two episodes and kind of dive down deep into it, rather than telling a single story, we're going to look at kind of different aspects of this. And we've got a great guest who can talk us through the kind of aspects of human espionage specifically and what's going on. We're not looking at, you know, cyber spying, for instance, but really, you know, the human intelligence business, isn't it, David? We're not talking about offensive cyber operations. We're talking about how technology is reshaping the people side of spying, right? How is actually reshaping or affecting human intelligence operations? And you're right, Gordon, that would be maybe a little bit above our pay grade on the rest
Starting point is 00:05:27 is classified. So we have a very special guest with us who is going to be with us for these next two episodes to talk about the impact that technology is having. We're very lucky to be accompanied on this journey. by Glenn Chaffetz, who is a former CIA officer. He is a three-time chief of station, who was also the agency's very first chief of tradecraft and operational technology. Glenn, we don't hold it against him, but he previously served in the State Department and the arms control and disarmament agency. He's taught or held research positions at a whole
Starting point is 00:06:03 bunch of different universities, including the National Intelligence University, Stanford's Hoover Institution, the University of Georgia. Glenn has a Ph.D. in Foreign Affairs from the University of Virginia, and he currently leads 2430 group, which is a non-profit research firm that both educates and equips private businesses, universities, and NGOs to defend themselves against commercial espionage, attacks on infrastructure, and disinformation. So, Glenn, welcome to the rest is classified. Thanks for being with us. I'm glad to be with you. Thank you very much for having me. So I guess the first question, which is going to be unrelated to the topic at hand,
Starting point is 00:06:39 Because I'm just curious. 2430 of the 2430 group. What's the significance of that number? 2430 East Street, Washington, D.C., right across from the State Department, was the first home of, I believe, the OSS and the CIA when they were formed. The founders of our firm thought it would be a nice homage to the intelligence world. OSS and Wild Bill Donovan. I'm not sure how much technical tradecraft he was involved in.
Starting point is 00:07:08 He liked his gadgets, though, didn't he? But Glenn, maybe you could tell us a little bit about how you ended up in the CIA, because it sounds like you had quite an academic background, and then how you end up with this interesting role of the first chief of tradecraft. None of it was planned, obviously. I started out as an academic. I had a mentor in the field who said, if you're going to teach international politics and foreign policy decision-making and foreign policy,
Starting point is 00:07:35 you should have some experience in actually practicing that discipline. And I applied for and was accepted into a fellowship in the arms control and disarmament agency, which no longer exists. It was folded into the State Department more than a quarter century ago. And I became an arms control negotiator. And then when that agency was folded into the State Department, I decided to make the State Department my career. the State Department, where I stayed for a number of years. And then while I was at the State Department, I had a good friend in the agency, whom David knows well, John. And John said,
Starting point is 00:08:20 wouldn't you be happier in the CIA? And I said, I don't know. Would I be? And he talked fancy to me, and he recruited me. And I applied to join the agency and started in the agency, spent the rest of my career there retiring six years ago. I'm glad to hear that John recruited you. I'm not sure how proud he is of that. No, no, no, no. Yeah, yeah, probably, probably not. But we're going to be talking about the impact that technology is having on the sort of human spy business. And I'm intrigued about the role that you held in this kind of first, first ever chief of tradecraft at CIA. And I mean, I guess there's a question here, which is, why did that role not exist before and why did the CIA feel they needed to create that role when you stepped into it? Well, it did exist.
Starting point is 00:09:15 It was divided among several different units within the Directorate of Operations, because that's what we're talking about, operations. And the leadership decided that given all the technological, changes that were occurring rapidly, they needed one office that would coordinate all the different other offices and drive all the other different offices that were dealing with these issues. And so they created this position, which I think has evolved significantly since my departure as well. So we're talking about human intelligence operations, which I guess sort of sounds simple, but just to start with a basic definition, which is what is the point of intelligence? What's the goal of that enterprise? I think it'd be useful to use an example.
Starting point is 00:10:12 So everybody knows about Operation Overlord, the invasion of Normandy, June 6, 1944. The Germans desperately wanted to know where and when the invasion would take place. They knew there was going to be an invasion. They knew that from context. That was not a secret or a mystery that the Vermacht needed to acquire. But they needed to know where and when. And the allies needed to protect that information. And that really gets at the heart of what we're talking about. Intelligence is information of value. It confers value on the possessor of the intelligence. And losing control of that information of value diminishes the power and strength of the original possessor of the intelligence. So those who have it want to keep it, those who don't have it, want to acquire it.
Starting point is 00:11:03 And to protect it then makes that intelligence a secret. And I think it's important that people understand these definitions and these concepts because it gets to how effective intelligence can be and how effective protecting secrets can be and the motivation people have for stealing secret intelligence. Because I guess the point of an organisation like CIA or in Britain, MI6, is to steal secrets. It's to gather those secrets from people. So in other words, to kind of approach people who have access to secrets and persuade them to pass on that kind of secret information that the government thinks might be useful. So I guess just to kind of keep going with this conceptually, to do that, the spy services need to be able to operate clandestinely.
Starting point is 00:11:55 but in a world of increasing surveillance, which is sometimes called ubiquitous technical surveillance. Now, that sounds like quite a kind of fancy term. I wonder if you could kind of unpick what it means, because I think it would help people to understand what's changed in the way that these spy services operate and why the kind of context is such a challenge. That's a great point. So ubiquitous technical surveillance, which was a term coined by a colleague of mine in the agency and really spread throughout all of society, sometimes called surveillance capitalism, is really the interweaving of modern technology into all aspects of our lives, often to degrees that we don't understand. And it has several components, sensors, cameras,
Starting point is 00:12:47 phones, microphones, computing power, data, data storage, and algorithms to make sense. And of that information. And that information is used by the private sector and governments for various purposes for governments. It's law enforcement, it's fraud detection, obviously intelligence collection. For the private sector, it's some of the same things. But its main purpose is to sell us stuff. It's to know what we're doing so that they can put ads in front of us and that we will buy things. But it's also to make our infrastructure more effective. knowing who's on the roads at what time and what kind of density can guide traffic control so that you have more effective infrastructure. It can identify fraud detection. Is this credit card
Starting point is 00:13:38 yours? Are you in this city? Are you in this zip code? That kind of thing. So it has a variety of purposes. But it is the entire system that has been built up over the last, say, 25 years with the dawn of cheap data, cheap sensors, Google, Amazon, Facebook, Axiom, those kind of companies that, for their business model, track people. It's worth saying that in some countries, it's more pervasive than others. And obviously, it's quite strong in Western countries with kind of, as you put, it surveillance capitalism. But actually, perhaps the most surveilled state might be somewhere like China, where, you know,
Starting point is 00:14:15 you think about how many cameras there are and CCTV and the ability to do facial recognition which they say is for kind of social order and law enforcement. You know, people have to use apps, you know, and their phone to pay for pretty much anything and use any government service. All of that is kind of creating a web of information around an individual. And I guess the point is for spies is that means that it's harder to hide because of all the kind of data and digital exhaust created by life under this kind of surveillance. Well, precisely.
Starting point is 00:14:47 So intelligence collectors and their sources in the pre-UTS days could have the kind of meetings that we're all familiar with in the back alley at one in the morning. The example I always like to point out is all the president's men where I think it was Woodward had the meeting with his secret source later shown to be Mark Felt in a parking garage in Arlington, Virginia who's very well dramatized. in the movie, if you think about that meeting today, it would be much more difficult to do. And the reason it would be more difficult is everybody's expected to have a cell phone. Everybody has this little spy with them all the time. And if you don't, that looks weird. And I remember having conversations when I was still in the agency with the commercial sector and saying, who is it that you find doesn't carry cell phones?
Starting point is 00:15:47 I want to understand the pattern. And the person I was talking to looked at me like I had just grown a second head. Everybody has cell phones. The only people who don't carry cell phones are, you know, drug dealers, infants. And spies. And intelligence officers. Right. So yikes, right?
Starting point is 00:16:06 So you really stand out by trying to escape all the sensors and data that make up the UTS system. The other, I guess, concept from the stand. of an intelligence officer in that relationship with an asset is you want that to be clandestine. And as you and I, Glenn, were talking, you know, and preparing this conversation, I think you gave a really interesting definition of clandestinity, which I think you said is the sort of combination of privacy and anonymity. I wonder if you could tease that one out as well. Yeah. A lot of people confuse these topics. For very good reasons, they overlap. It is confusing. but privacy is essentially, you know who I am, right?
Starting point is 00:16:48 You know the identity, but you don't know the activity. Anonymity is you know the activity, but you don't know the identity of the actor. Clandestinity is the marriage of both of those. So if you do a real good, successful, operational act, nobody knows it took place. There's no identity. There's no actor. There's no thief, in Gordon's words, of the secrets. There's no act.
Starting point is 00:17:13 and because you're stealing information, there's nothing missing. So a perfect intelligence operation would be one in which anonymity is perfect and privacy is perfect, and you have clandestinity. And that's what's required, and that is what is so challenging about today's UTS environment because we are soaking in all of these technologies that make anonymity and, privacy so difficult to achieve? Well, I think there we've kind of set up the challenge for intelligence agencies and the kind of problem in the modern world. Let's take a quick break. And when we come back, we're going
Starting point is 00:17:52 to dive deeper into how this problem has really affected different parts of the human espionage business. See you after the break. This episode is brought to you by Atio, the CRM for the AI era. Now, David, people think that SpyCraft is just car chases and secret codes, but an awful lot of it is just idling around, waiting for the action. It's a bit like starting your own business. You think it's going to be as easy as creating and selling a product, but the reality is business owners spend far too long trying to get their CRM to fit a system not built for them. Atio's AI-driven CRM enables you to take control of your platform to build something from the ground up that fits. It's your needs. James Bond had Q's x-ray shades, an explosive watch, and a pen grenade.
Starting point is 00:18:47 Business owners have Adio's real-time customer insights and platform that grows with them. All tools relevant for your mission to build a company from the ground up. Atio even has something called agent collaboration. Yes, but in this case, that means giving people the ability to let AI work seamlessly in the background for them. Try Atio for free at A-T-I-O dot com slash trick. This episode is brought to you by Ancestry. Hello, James Holland here, joined by Al Murray from Gollhanger's World War II podcast. We have ways of making you talk.
Starting point is 00:19:24 These are those odd days between Christmas and New Year. The house buzzing with laughter, leftovers piled high, festive films murmuring in the background, and trivial pursuit debates still raging round the table. It's the perfect time to sit close, share family stories and think about people who came before you. Grandparents, great uncles, aunts you hardly knew, everyone who helped shape the family you're part of today. With an ancestry membership, you can take those conversations further. All you have to do is provide what you know about your family history, such as your parents and grandparents' birthplaces, and ancestry will help you dig through billions of records to uncover fascinating news stories about the lives of your relatives.
Starting point is 00:20:03 Maybe it's a great-uncle ferrying a hurricane north, a grandmother stitching uniforms in a Glasgow mill, or a relative holding the line on the Normandy beaches, and suddenly the stories around your own table take on a whole new depth. The past isn't behind you, it runs straight through you. Head to ancestry.com.uk slash new year to learn about ancestry's memberships and start your family history journey today. This episode is brought to you by NordVPN. A breach used to require a full store or a lifted file. Now it begins the moment you join a dodgy public Wi-Fi network. Leave one device exposed and operators can map your online activity in moments. NordVPN shuts that down.
Starting point is 00:20:50 One click encrypts your connection, stopping public networks turning into blind spots, and keeping your traffic secure, wherever. you log on. NordVPN's Threat Protection Pro feature blocks malicious links, fishing sites and even scans downloads for viruses. It's like having your own cyber bodyguard. And if you're abroad, you can shift your virtual location for the sites you rely on or check whether prices change by region before you buy. To get the best discount off your NordVPN plan, go to NordVPN.com forward slash rest is classified. Our link will also give you four and extra months on the two-year plan. There's no risk with Nord's 30-day money-back guarantee.
Starting point is 00:21:32 The link is in the episode description box. Okay, welcome back, everybody. David, I guess it's time we start diving a bit deeper with Glenn into some of the specifics of what this all means for the business. And rather than do this kind of tech first, I think it might be easier to actually just talk about the broader challenge by looking at how it's impacting some important parts of the human intelligence business. So sort of start with pieces of the trade that are being impacted and kind of talk about how the tech is reshaping them. And I think one of them, which is very important, finding the people who have the secrets we want. Typically, you'd call that sort of spotting
Starting point is 00:22:20 and assessing potential targets of value, people who have secrets. And that, obviously, you know, Gordon, I mean, we talked a little bit in our recent episodes on Chinese spies using LinkedIn, for example, to try to find people. But we've also done it in some of the more historical series as well. Yeah, I guess historically, Glenn, this would have been done by trying to meet people, by trying to talk to people. It's the classic thing we think of, isn't it, of going to cocktail parties. You know, the diplomat at the cocktail party, sizing up his KGB opposite number or similar, trying to work out if he is KGB, trying to work out. kind of personality is, there may be someone building a file and trying to work out what secrets he has. I always think of Oleg Gordievsky, you know, where they get a tip off from one person, from one defect to saying, this guy's interesting, then they build up a farm. And then eventually someone, I think, approaches him on a badminton court, a kind of cold approach on a badminton court in Copenhagen, of all places, to basically say, do you want to talk? I mean, that's the old
Starting point is 00:23:20 school way, isn't it? And I guess that's what's got harder. It's harder and it's easier. And let me talk about how it's easier. So we just talked about all this data that's collected on each one of us every single day. I think I read it's 2.5 sextillion bytes of data, which is an absolutely stunning number. Somebody I think described it as two Oxford English dictionaries on top of each other, covering the entire planet Earth worth of information every single day about people, right? So that's a lot of data. And if, for example, Gordon were interested in someone, he could use avail himself of all of that data.
Starting point is 00:24:04 And you don't have to be anybody special to do that. This is not limited to intelligence services. This is what e-tailors and merchants and businesses do all the time to find customers and to detect fraud is they build a profile. And there's books written about this, you know, how the modern surveillance economy determines when you buy, when you die, when you click, who you know, what you care about. And so all that information can be mined. And we've heard about this, data mining. And so in that sense, it's much, much easier to find out who would have the kind of information that
Starting point is 00:24:41 anybody would be interested in, including a government or an intelligence service. It's harder in the sense that if you wanted to go meet some specific person and talk to you, to that person to feel out whether, say, if it was Gordon and David that you wanted to find out what David knew and how he was inclined, you're going to leave a record of that. If you call him, you're going to leave a record of that if you meet him. You're going to leave a record of that if you see him at a cocktail party. And you don't want to do that because if he is valuable, you want that relationship to be clandestine. And you've already ruined that from the get-go.
Starting point is 00:25:20 You can't put that toothpaste back in the tube. So you have to be exceptionally careful about making those associations that at some point you would want to hide because they don't go away. And as I've told David in previous discussions, this technology, big data, has really changed previously our understanding and functions of time and place and what you can know about a person. In the old days, if you did an act like talking to somebody at a cocktail party, Okay, you had a conversation with someone at a cocktail party, as long as the people there didn't see you at the time and they didn't have an interest in that. That was fine. But the problem today is that meeting lives forever in cameras and microphones and other sensors. The fact that those two phones of you and that person were both at the same place at the same time lives forever in a way it wouldn't have done.
Starting point is 00:26:14 That lives forever. In a way with Gordievsky meeting someone at a badminton court, that could have been done quickly and quietly. So yeah, it's a really interesting point, isn't it? Because we can find out much more about people now. So you can do the research bit pretty easily. And I guess we all know, as you said, this is something we all do. We all can kind of, you can Google people, you can look up social media profiles. So you can get quite a lot of understanding of someone. You could even say spy on them without actually meeting them or having to kind of engage with them face to face. But as soon as you want to do that engaging face to face or interacting with them, or connecting with them, that's where it gets trickier. It's a devilish challenge. It's doable, but it's very challenging. Because if you think about it, you're carrying around this device that's tracking you and you're moving in a sea of other devices that track you. Various ring cameras and traffic cameras and business cameras and other surveillance cameras and CCTVs and microphones and people's personal cameras.
Starting point is 00:27:18 You're in this sea of RF and data. election. And if you try to hide from it, you stand out. Yeah. And if you don't try to hide from it, you're captured by it. And so you have to find that narrow place where you don't stand out and you're not captured by it. Or it's not you. So it's exceptionally difficult. It's doable, but it's difficult. One of the areas of this entire kind of UTS environment that, maybe we're sort of conceptually aware of, but don't really understand or see most of us day to day, is this world of data brokers and commercially available information that's not top secret information in the files of the agency, and it's not open stuff that's on social
Starting point is 00:28:09 media, but it's information that if you have money, you can go out and acquire. I'm wondering, Glenn, if you could talk to us a little bit about that space and what's no way. about people if you have a few bucks and know the right data broker? It's a real appropriate question because we tend to think of secrets and open source information as the two categories. But there's other categories and you just identified one. So there's open source information, which any of us can get for free. We go on our computers or our phones and we go to a browser and we go to Google or Bing or one of the LLMs, and we ask, you know, who's David McCloskey? But then there's this entire other category
Starting point is 00:28:56 of commercially available information that you have to pay for. There's a guy named Mike Yagley, who's done a lot of work on what data brokers have and how they make their money and what they can know. I spent a lot of time talking to him and learning from him, and it's just amazing. What is collected? And there are these tiers of collection, and the The more money you have, the more information that you can get on people and organizations. And nobody really cares who you are. They just care that you can pay. And I think there's probably tens of thousands of these brokers around the world.
Starting point is 00:29:38 I think the United States leads in this because it's the most unregulated or loosely regulated data economy, much less so than, for example, the EU. It's because we have more freedom. We have more freedom here, Glenn, I think, is what you're trying to say. I'm not going to comment. I'm not going to comment on that, David, might be more lobbyists. More lobbyists from big tech. But the point is, anybody can buy this data. It's not, it's not restricted in any way, and it's for sale.
Starting point is 00:30:08 When we're talking about looking for people who have secrets that an intelligence agency might want, I mean, sometimes people put that on LinkedIn, you know, that I, I used to work for the CIA or I used to work for the NSA or I used to have security clearance, things like that. And also, I guess the other thing you're looking for is someone who had access to secrets or has access to secrets and someone who might have a kind of weakness or a reason why they might be willing to pass on those secrets, like they're in debt or they don't like their employer. Yeah. And I guess that second category, you can also probably get from some of that commercially sensitive information. You know, if you can do a credit check on someone, you can access their credit or you can look at what they're trying to buy. or where they're going, or is their marriage in trouble, all those like kind of little tell-tale things, which might actually be relevant in this situation.
Starting point is 00:30:59 Yeah, well, I think the most salient point that you made is that people share that information without recognizing that they're sharing it. I mean, this is one of the really interesting things about intelligence that people don't realize is that people don't recognize the value of their privacy, and so they undermine it constantly. And so they'll post on Facebook or InstaFace or Insta, I don't even know them all, Instagram, they'll post, you know, I hate my boss. Okay, good to know. All of a sudden they'll post a family picture and the spouse isn't there or a vacation that they took by themselves and all of these things.
Starting point is 00:31:35 So they either say it directly, I hate my boss, or someone who's clever can infer this. There's the famous case of, I think it was Target that sent directed at. advertising to the daughter in a family for her pregnancy. Well, they inferred her pregnancy from her buying pattern and she had not told her family that she was pregnant. I think this was a New York Times story many years ago. And so they either announced this information, I hate my boss, or it can be inferred from the rest of the data that's out there about them. I found a couple fascinating examples that are connected to that, Glenn. I mean, one them was a former CIA officer after they had left on LinkedIn. LinkedIn suggested to them
Starting point is 00:32:25 that they should be connected to someone who had been their asset when they were working at the agency because it had connected, I don't know what country it was in, but the algorithm had said, oh, you've got enough kind of overlapping connections. You should be connected. I mean, on the point of like even just locational stuff, and what you can buy from data brokers. I mean, there was a researcher who had actually done a study for the Defense Department to try to see what might it committed for an adversary go out and buy on U.S. service members. And so they set up a U.S.-based organization and a Singapore-based organization,
Starting point is 00:33:07 contacted U.S. data brokers, and they ended up buying individually identifiable contact, financial health, and a bunch of other data on thousands of active duty U.S. military service members, and they got it for about 12 cents per service member. And they were able to geofense some of that stuff so that they could look at, you know, sort of where a lot of these people were based, including some sensitive special forces operators. So these data brokers are just selling this stuff to Singapore, selling it to the states. It kind of doesn't matter. And it's really, I mean, that is a great start for a tariff.
Starting point is 00:33:45 targeting package if you're a foreign intelligence service and also if you're trying to show the right ads to these service members, right? So that overlap in sort of targeting effectiveness is, I mean, it's really quite profound and it's astounding what's available if you have some money. Yeah, this is the problem, is the data reveal connections that you don't recognize as being revealed. And to your point about U.S. service members, this is a problem that all countries face. There was a story, I think, last week. China gave EVs to top Israeli military officers. I just thought, no, do not, do not accept them, you know, because a car is like a phone, except on steroids, right? And it collects all kinds of information about where, obviously,
Starting point is 00:34:36 where you go, but when are you in the car? Who's in the car with you? What do you say? I mean, a car is a giant recording data device. So particularly the EVs, which have all these microphones and cameras, and it doesn't go away. So that was quite a Trojan horse story. So I guess so far, we've talked about how data can allow you to understand someone better and how they have. So all of that makes it sound like it's actually easier to find people. Yes. That part of the business arguably has got easier than the days of having to kind of build up gossip over years. through kind of meetings and then and maybe a cold approach. But let's maybe focus next, shall we, David, on the next stage where it's made it harder,
Starting point is 00:35:20 which is actually going to meet someone for the first time, which I guess is about, you know, what's called David Cover, isn't it? It's about people taking on different identities and things like that. We talked about this a little bit, Gordon, when we did the series on Matroken, right? is, you know, how do you, maybe for the first time, how do you meet somebody, and how do you, I guess, frame your employer, your affiliation, your nationality, your name, that piece of it, I think, as we'll talk about, has gotten a lot harder, because in the, in the Matrokin case, it was relatively, seems straightforward.
Starting point is 00:36:00 When you look back at these cases from the Cold War and even into the 90s, I guess, all these case officers, all these kind of handlers, they just basically had a stack of false passports. It was as simple as that. You had a false passport with a different name in your safe, and when you're kind of going on a particular mission, you go, today I'll be James, tomorrow I'll be Robert, pick up the false passport. And that was kind of all you needed. Yes, you've got to memorize your backstory and where you were born and things like that if someone's asking you. But that was it, wasn't it? You know, for a lot of people. You didn't need to do much more to kind of, ask who you were. And that's certainly what the kind of MI6 team who went out to meet Matrock
Starting point is 00:36:38 and did. They just picked up one of their false identities. But then I remember someone from MI6 saying that in the 2000s, they suddenly realized that that was getting harder because the ability to maintain your cover when you hit a border, they realized as soon as you had kind of Google and social media in the 2000s was getting really difficult because they did a test and they said, how long would one of those old-fashioned types of cover, just a passport, sustain you against a border guard asking questions and with access to Google and social media. And the answer was less than a minute, you know, before they realized that there wasn't a backstory, it didn't match. You just couldn't do what you could do in the past. So I guess it was the 2000s,
Starting point is 00:37:19 was it? When, you know, people started to realize you just couldn't do this anymore in the same way. Travel as an intelligence officer. Yeah, thank you, Google. I think it really started with Google and AdWords. And again, Google wasn't trying to do this. Google wasn't trying to destroy anonymity and privacy. But AdWords. Which is their advertising business. Their advertising business, which generates probably tens of millions of dollars a day. Revenue, if not profit, started essentially this dynamic. And then you reach a point in which storage becomes so inexpensive that it's cheaper to keep most information than it is to delete. I think that happens somewhere around 2010.
Starting point is 00:38:05 And then, of course, you had the crossover point in which most uses of computation moved over from the desktop or laptop to the telephone. And once it became mobile, well, now you associate identity with location. And that becomes very, very challenging. And I mentioned this colleague of mine, Mike Yagley would do these presentations where he would show people their pattern. He would buy it from, you know, an appropriate data broker. He would show somebody their pattern and they would realize it was actually fairly simple. People do the same thing every day.
Starting point is 00:38:47 We're exceptionally habit-driven. We go home, we go to work, we pick our kids up from school. We might go play tennis or go to the gym or something like that. it's it's pretty simple it's most of us are shockingly boring and so when we do something that's out of that pattern that's noteworthy i think all of us can think of times where you get an alert from your credit card that says oh i see that you're in penn station new york that's not where you live is this you if it isn't please contact this number if it is just ignore it right that's frightening to me that's a private company that does that and that keeps that information forever
Starting point is 00:39:26 And so, really, I think this is what you're referring to. This tracking that's part of our normal economic existence affects everybody, including intelligence collectors. You bring up the fraud point. It's a good one because I guess this same algorithm that is detecting some anomaly in your location or your payment history, it could be used to detect potentially the operational act, right? because that's, by definition, going to be an, well, in the past, it would have been an anomaly, I guess. It would have been something that was potentially out of pattern.
Starting point is 00:40:05 And, again, that fraud detection. I mean, that's, that's like Amex has developed that, right? Right. So that's not being developed by the MSS or the CIA. That's just a private company that's got it. I'm curious on the, I mean, one of the pieces of, I guess, this UTS environment we haven't talked about in, detail as biometrics. So the linkage of your retina, your fingerprint, whatever, your face with you.
Starting point is 00:40:32 Talk a little bit about how that is maybe impacting clandestinity or the work of human intelligence today. You have these sensors which take photos of you from various angles and then process that data about the distances and angles of the various features of your face and they construct a digital map of your face. And it's your face and only your face and nobody else's face. And it's gotten quite good and it's going to get better. And now it can recognize you when you've got a surgical mass on.
Starting point is 00:41:03 Got a lot better during COVID for that reason. So if you try to disguise yourself, that's a bit of a challenge. So the most obvious one I think is facial recognition combined with the statistical automated AI machine learning capabilities and algorithms that make each one of us uniquely detectable based on our face. Then you have iris scans, all of which are becoming more pervasive and cheaper, of course, fingerprints. And people open their phones with their thumbs and they open their phones with their photographs. And of course, this is stored and shared and can be used, again, for law enforcement purposes, for identification, for sales purposes,
Starting point is 00:41:49 various hotels and retail establishments recognize customers when they walk in the lobby because of facial recognition. I find that unacceptably creepy, but these establishments rely on this. And some people like it. Oh, hello, Mr. McCloskey. Welcome to Acme Hotels. Sorry, if there really is an Acme Hotel. I don't mean to despair.
Starting point is 00:42:12 We'll bleep it out. We'll bleep it out. Yeah. Because I remember hearing that one of the first challenges for the intelligence services was iris recognition. I think when I think some certain Middle Eastern airports introduced the idea you were going to get your iris scanned on arrival at the airport.
Starting point is 00:42:26 And they suddenly thought, hang on a sec, if I go under that false passport I'd use before and my iris is scanned, if I turn up here next time, even on holiday with my family, and have my iris scanned and it says this is the same iris as a different name, they're going to go, you know, spy, you know, and arrest you.
Starting point is 00:42:45 So that was, I guess, an early example of how that was a worry. Disguises in the old days would be like a wig, all those kind of things. I mean, in the movies, you'd think there are kind of, maybe this is getting into detail you can't get into Glenn, but in the movies, if I'm watching Mission Impossible or something about that, there's kind of fake fingers, fake irises and things like that you can do to fool them. I mean, does disguise still work in the world of biometrics and, you know, where they can see how
Starting point is 00:43:13 you walk and things like that? I don't know. I think it would be exceptionally challenging. I mean, obviously, if I put on a mask of David's face... Lucky you. You know, I would obviously be much more successful. But if I put on a mask of David's face and I wear a perfect mask of David's face, sure. I don't know if such a thing exists outside of movies.
Starting point is 00:43:36 It's very difficult to disguise yourself. I guess in theory you could burn off your fingerprints. But this is all, it's the mathematics of the distance of different parts of your face, from other parts of your face, which is highly invariant, right? And I think also if you showed up, if you showed up at a border with like a heavy mask, you might get some questions. I wouldn't base my tradecraft on the Mission Impossible movies. No, I seem to remember there was a problem with laughing if you had some of these masks, David, that there was some history where, you know, the masks were fine. And as soon as you laughed, you had a problem. So, yeah, they definitely had their limits in the Cold War. Yeah. Well, I mean, it also seems like from the standpoint of the disguise, I mean, even if you had one that was quite good, your ability to wear that for any long period of time, I think would be pretty diminished. I mean, it just seems very technically challenging. I guess, you know, Glenn, the other piece of this, we talked about, you know, facial recognition or gate recognition or like person recognition. I mean, there was a story I think maybe a couple years ago about how the Russians, surprise, surprise, had become quite adept at using the sort of camera networks around Moscow to find draft dodgers, you know, people who were called up to Ukraine and had decided not to go and were still for some reason
Starting point is 00:44:59 hanging around Moscow. And we're able to make a bunch of arrests around that. I'm curious about some of the back end pieces of this because, you know, we think we go out and we walk around any major metro area. It could be in the States. It could be, you know, at London, it could be Moscow. And there's cameras everywhere. Those cameras are not always centralized, especially in the States. It could be a lot of private companies. In London, I can tell you, they are everywhere, though. They're everywhere. You seem everywhere. But there's a back end to this, which is the analytics to do something with that information. I'm curious if you could talk a little bit about that sort of back end, it's not very sexy, but you think about someone's got to take
Starting point is 00:45:40 all this data, which in its kind of, you know, what's collected is probably pretty unstructured and not exactly useful from an intelligence standpoint, but then the back end, you know, maybe AI powered bit, maybe not to make sense of it is really kind of the beating heart of it. Maybe talk a little bit about that piece of it. Yeah, it's a really good point. The, the wishful thinking that I get from people when I talk about this is it goes something like this. Well, no one could ever process all that information. They can take all the pictures, but nobody's going to look at all those pictures and nobody's going to find me. I think relying on the incompetence of the adversary is not a particularly successful strategy for achieving your goals.
Starting point is 00:46:27 there's all kinds of experiments done with this. Some probably rigged to make them look more successful. But in general, the issue is time and automation. And so, for example, if you talk about China, which is, I think, the most heavily cameraed up large country in the world. That's a word I've really come to enjoy, camera it up. I think there's like a million surveillance cameras in Beijing alone. It's probably an understatement at this point. Yeah.
Starting point is 00:47:00 You look at London, which is much smaller than Beijing, but London, I think, has tens of thousands of cameras. And Beijing has millions. Yeah. And Shanghai has millions. And any large city in China has millions. And the authorities have all the time in the world and all the computational power in the world
Starting point is 00:47:21 and all the algorithms that they can avail themselves out. To look at these photographs, both video and still, private residences and businesses have to share their camera feeds with authorities. So my advice to people is if you see the camera, assume it works, assume someone's going to see what's on that camera. Now, it might not be today. It might not be tomorrow. It might not be this year. But for example, if you're committing a crime or if you're doing espionage, an asset caught a year from now is still caught, right? And so the conversation that intelligence officers have to have now concerns, am I safe for all time? And it's not a
Starting point is 00:48:07 question that's easily answered. Back in the day before all of this technology existed, an intelligence officer could do an operation, come back home, know that he or she got home safely, find out that the asset later was safe. And that's that. But now you have to wonder for days and weeks and months and years if something is going to trigger an investigation that leads a service to go back through that video or still photography. And like you said earlier, I think it was Gordon, connect two people who weren't connected. There could be a newspaper story saying, hey, this person worked for the Russian intelligence service. Oh, I thought he was a businessman. That's interesting to me. I'll go investigate and whether he met with anybody for more government.
Starting point is 00:48:51 Yeah. I mean, we've definitely seen examples here in the UK where they've used that kind of CCTV. I mean, the Salisbury poisoning, 2018, you know, they were able to identify using CCTV from the train station. Your point about underestimating CCTV and things like that, your peril. I mean, I remember the Israelis, Mossad, normally thought it was one of the most capable intelligence services. 2010, they carried out this hit in Dubai against Babu, I think a Hamas official in his hotel. And they seemed to have just not realized how much CCTV there was in the hotel. And there was just all this amazing CCTV of people going into a kind of bathroom coming out in a different set of clothes, I think a tennis uniform at one point. You know,
Starting point is 00:49:31 they clearly underestimated the Dubai intelligence, the UAE intelligence services, ability to track them at their peril because it basically burnt a lot of identities. I think they were using. So yeah, I think, you know, people have learned often, haven't they, from some of those mistakes. So I wonder if we stop there for this time, because I think we've set up some of the problems around these issues of technical surveillance and data, and next time we dive even deeper into some of the kind of ins and outs of running agents and human espionage in the digital age. And of course, if you don't want to wait for that second part, you don't have to, go to the rest is classified.com, join the declassified club. Get early after.
Starting point is 00:50:14 access to that episode and to a whole bunch of other goodies as well. But we'll see you next time. See you next time.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.