The Rest Is Classified - 96. Selling The World's Secrets: Is The CIA Reading Your Messages? (Ep 1)

Episode Date: November 3, 2025

Over the past seventy-five years, the United States has developed an insatiable appetite for global surveillance. The stories exposed by Edward Snowden in 2013 were only the tip of the mountain: the C...IA had been spying on the world for decades. For more than half a century, a Swiss‑based firm called Crypto AG built encryption machines and sold them to governments around the world. But what its customers didn’t know was that the firm was secretly owned and controlled by the CIA. This is a story of deception, code breaking and the invisible ear listening into the world's secrets. Listen as David and Gordon delve into the recently exposed story of Crypto AG and how the CIA, and their German counterparts, pulled off the intelligence coup of the twentieth century. ------------------- Join The Declassified Club: Start your free trial at ⁠⁠therestisclassified.com⁠⁠ - go deeper into the world of espionage with exclusive Q&As, interviews with top intelligence insiders, quarterly livestreams, ad-free listening, early access to episodes and live show tickets, and weekly deep dives into original spy stories. Members also get curated reading lists, special book discounts, prize draws, and access to our private chat community. To sign up to the free newsletter, go to: ⁠⁠https://mailchi.mp/goalhanger.com/tric-free-newsletter-sign-up⁠ ⁠ ------------------- Order a signed edition of Gordon's latest book, The Spy in the Archive, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠via this link.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Order a signed edition of David's latest book, The Seventh Floor, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠via this link.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ------------------- Email: classified@goalhanger.com Twitter: ⁠⁠⁠⁠⁠⁠⁠@triclassified⁠⁠⁠⁠⁠⁠⁠ Social Producer: Emma Jackson Producer: Becki Hills Head of History: Dom Johnson Exec Producer: Tony Pastor Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 For exclusive interviews, bonus episodes, ad-free listening, early access to series, first look at live show tickets, a weekly newsletter, and discounted books, join the declassified club at the rest is classified.com. Rinse takes your laundry and hand delivers it to your door, expertly cleaned and folded, so you could take the time once spent folding and sorting and waiting to finally pursue a whole new version of you. Like tea time, you. Or this tea time you. Or even this tea time you.
Starting point is 00:00:36 Said you hear about Dave? Or even tea time, tea time, tea time you. Mmm. So update on Dave. It's up to you. We'll take the laundry. Rinse. It's time to be great. With Amex Platinum, you have access to over 1,400 airport lounges worldwide.
Starting point is 00:00:53 So your experience before takeoff is a taste of what's to come. That's the powerful backing. of Amex. Conditions apply. This episode is brought to you by Peloton. A new era of fitness is here. Introducing the new Peloton Cross Training Tread Plus, powered by Peloton IQ. Built for breakthroughs with personalized workout plans, real-time insights, and endless ways to move. Lift with confidence, while Peloton IQ counts reps, corrects form, and tracks your progress.
Starting point is 00:01:23 Let yourself run, lift, flow, and go. Explore the new Peloton cross-training tread plus at OnePeloton.CA. Welcome to the rest is classified. I'm Gordon Carrera, and I'm David McCloskey. David, have you ever wondered if your phone might be spying on you? I have occasionally wondered if my phone is spying on me, Gordon. I would say more so after reading the outline that you put together for the next few episodes. for the story we're going to talk about, which is all about technology being rigged to spy on its users, on the poor people who have paid for it. And it makes me think that, like so many of these
Starting point is 00:02:10 episodes that we do that deal with the intersection of spying and technology, that we should all get rid of our phones and computers and put the tinfoil hats on and shut the doors and disconnect. And hide. And hide. Yeah. I think there's something to that because if you are already a little bit worried about your tech, then this episode and the next one might get you even more worried because, yeah, tech companies are always kind of promising they will offer you security from your phone and your messaging. But what if a spy agency actually secretly owned the company that made the devices that
Starting point is 00:02:50 promised you security? I mean, that is the slightly crazy story we're telling today. The story of a company called Crypto AG and the way and the crazy operation used to effectively spy on all its customers. We did the series on Oleg Gordievsky and I think agreed that he was maybe the most important human spy of the Cold War. You might be able to make the case that this far less well-known story about Cryptoag is the greatest intelligence operation of the Cold War, period. Because it went on, as we'll see, for decades. And it compromised an absolutely staggering amount of global communications that was then decrypted by American and, as we'll see, German intelligence and
Starting point is 00:03:44 past to so many different allies. I mean, this, to me, feels like it's right up there in terms of the most impactful intelligence operations run in the past, maybe ever, but certainly during the Cold War. Yeah, that's right. I think, you know, it had, as we'll see, kind of really consequences which changed world events. I think because it's only just emerged recently what was involved in this operation. We're still learning and kind of trying to find out how it did shape international relations, you know, throughout most of that Cold War period. And it is an amazing intelligence operation run by the US, but yes, also with a little bit
Starting point is 00:04:18 of UK role. And also the Germans. The Germans, the Germans make the shout out to the BND, the German Foreign Intelligence Service. I think this is one of their first appearances on the pod. The Bundes-Nox-Riechengen-S. How do you... What does it stand for? Very good. B&D.
Starting point is 00:04:34 The B-N-D. The B-N-D. The Bundes-N-Ax-Rick-Gien-Stent. I listened to a German pronouncing that word a few times in preparation for this, Gordon, and I still, the end is unintelligible to be. I still don't have it. So, apologies to all of our German friends at listeners. The B&D, Gordon, I think, has appeared on the show in one prior episode, which is when I talked about how I went to Berlin for a liaison meeting
Starting point is 00:05:03 with the BND and we presented them with very compelling information and they told us that we were wrong. And then we had pizza and left Berlin. That was the one other time the BND has appeared. And so it's an international operation. Also, I think the other thing, just before we get into it, I really find interesting, is that it is about kind of technical intelligence and communications intercept and, you know, complicated things about encryption. But it's actually also based on two people and a personal friendship between two people, a spy and a businessman. And I think it also is quite interesting because it gets to the relationship between the technical world of communications intelligence and signals intelligence and the human world of human
Starting point is 00:05:42 relationships and the CIA. And so I find that bit of it actually quite compelling as well, as well as the fact it's basically telling us about security and communications and what we need to worry about today. It does feel like a bit of the missing link or a connective tissue between the world of Bletchley Park, the decryption of German code, and then Snowden. Ah, friend of the pod. Friend of your side of the pod, Gordon. It feels like this story connects some of these themes around essentially the transatlantic partnership and the compromise of so much. global telecommunications traffic that our two countries have done together. Really?
Starting point is 00:06:31 Jointly. Yeah, no, I think that's right. And I think also the relationship between intelligence agencies and companies, which is interesting. And, you know, these days, you've got battles between states and companies like Apple and the British government is having a battle about encryption and whether Apple should build back doors into its devices. Well, this is about, in a way, how we got there. And, you know, there's even echoes of our recent series on Mossad, pages. So, yeah, lots in there to get our teeth stuck into. And Gordon, I think listeners to this pod are going to be very excited about how we're starting the story because this isn't going to be Gordon Carrera explaining how you build a nuclear weapon, which he is, he has done,
Starting point is 00:07:12 I think, now, two or three times on the pod, different pieces of how you construct a nuclear about this time, you were going to give us a lesson in encryption to start because the encryption and the value of encrypted communications is going to really be at the center of this story. Yeah. So let's cut straight to the lesson. Encryption means encoding information. You can stop me any time, David. So encryption is encoding information so that other people can't read it, keeping your messages private. So we all use it every day now when you send your bank details over the internet to pay for something. It's encrypted. You know, when you use WhatsApp, they talk about end-to-end encrypted so that anyone who intercepts it can't read it. There's lots of ways of
Starting point is 00:07:56 doing it, and it goes back really to ancient times, the simplest way of scrambling the letters and making something unreadable, which kids get taught in some of those kind of spy books you get given, is to use something called a Caesar cipher, named after Julius Caesar, where you simply shift letters along the alphabet. Another version is where you use a kind of wheel, where you have two little rows and the letters line up and you create your message on one hand and you look at what the wheel tells you that each letter corresponds to, you write it down. And if someone has the same wheel set up at the same place, they can turn the gobbledy gook back into a readable message, right? So that's the simple explanation. But if you go back a century or so just over
Starting point is 00:08:38 that, you get the first encryption machines which are being built, electro-mechanical devices. They look like a typewriter. You type your message on a keyboard, scrambles it with rotors which turn, which give you lots more combinations, making it harder to crack. Then you get out the message. It looks like gobbledygook on a bit of paper. You can transmit it over radio, Morse code. Only if you've got another machine with the same settings, can the person who receives the message read it. February 1918, a German engineer named Arthur Sheribus, Sherbius. I think it's the right pronunciation. Now
Starting point is 00:09:16 whose other inventions included an electric pillow. I love that fact. What does the pillow need to be electrified for? Is it heated? Is it heated? I guess it's like an electric blanket, but it was an electric pillow which you patent it. Maybe it inflates itself. I don't know.
Starting point is 00:09:33 We're unfair. But anyway, more importantly than the electric pillow, he is going to invent a machine which he's going to sell to businesses with a slogan, one secret, well protected, may pay the entire cost of the machine, good salesman, and he's going to call the machine Enigma, because it's so mysterious. Of course, it's going to get very famous. It's actually made for businesses originally,
Starting point is 00:09:56 but governments immediately see, well, there's some advantage when you're sending diplomatic messages, intelligence reports, military orders to have them encrypted. Obviously, where you've got secrets, spies are going to try and steal them, So where there's code, you get code breakers. Most famously, the team at Bletchley Park will set out to break various different types of enigma in World War II. We're not going to do the whole Bletchley Park story today, are we? No, I mean, that is one that we have talked about doing in person, and it's its own story, I think, in its own right.
Starting point is 00:10:32 I mean, you probably could say that it's the start of the modern US-UK intelligence relationship is really birthed at Bletchley. Ledgeley Park and the breaking of German codes. Yeah, that's right, because a bunch of Americans come over to kind of share what they've done against Japanese codes with the Brits, and the Brits have done, you know, the work against the German Enigma. And that starts, actually, the cooperation between the two countries, which then becomes the heart of the intelligence relationship and, you know, GCHQ and NSA and what's called the Five Eyes when Australia, Canada, and New Zealand joins.
Starting point is 00:11:06 So it should be 10 eyes, shouldn't it? everybody should have two. That is a really good point. Yeah, there's five participants. Each with two eyes. Each with two eyes. It should be ten. I've always thought this.
Starting point is 00:11:17 I've never had the platform to do anything about it, but I'm throwing it out there for anyone listening. But yes, five eyes, which is five eyes too short, is a code-breaking alliance. The big thing about Enigma is it's super secret during the war. You don't want your enemy to know you've broken their codes because then they'll change them and you won't be able to read them. But they keep it secret after the war. And this is really interesting. It's kept secret in Britain until the 1970s, the fact Bletchley Park did what it did.
Starting point is 00:11:44 And if you want to understand why they did that, actually this story about Crypto AG is going to help explain that. Because the point is, after the war, no one knows they've broken an enigma. So everyone believes these kind of machines are unbreakable. And at the same time, other companies are building their own versions of the Enigma Machine. And here we meet our first character, Boris Hagelin, born in Russia. and that's going to be important in 1892 to a Swedish family. And his father works in a senior capacity for the Nobel family, which have a load of oil refineries in Baku.
Starting point is 00:12:18 The Nobel family as in the Nobel Prize, David. So I know your president is waiting for his Peace Prize. You're waiting for your prize for literature, I imagine. That's right. As we speak. That's right. Another year, and I didn't get it, Gordon. Another year.
Starting point is 00:12:32 I'll have a word. Another empty spot on my shelf for my Nobel. So Boris Hagelin is. you know, working for the Nobel family. He goes back to Stockholm for his education, graduates in mechanical engineering in 1914. He's expecting to go back to Russia, but then you get the Bolshevik Revolution 1917. So that's over. The Nobel family is still kind of helping him and his father out. And young Boris ends up in charge of a small company in 1921 called A.B. Cryptograph, which Nobel are investing in. And this builds these kind of very early
Starting point is 00:13:06 cyphor machines like the enigma. And he's tinkering and trying to understand it. 1925, he hears the Swedish military, so he's back in Sweden, have got hold of one of these German enigma machines. And he rushes over to the Swedish military and he says, oh, hang a second, I can build you something better. Now, I think he's a little bit of a modern techie in the kind of fake it until you make it category. Because the truth is, I don't think he knows how to do that. I think he's, you know, he's just kind of guessing, bluffing that he's going to be able to do it. But he gets to work. Six months later, he's built off, kind of knock-off, slightly inferior version of Enigma, and he gets the Swedish general staff, the military, to buy his machine, the B-21.
Starting point is 00:13:45 Business starts then struggling a little bit. 1932 gets the French military to buy a model, followed by the Dozierme Bureau, French Spies. How was my French there? It's okay. Trey bon, Gordon. Thank you, David. And then he, of course, like anyone seeking to make it, he's got to go to the Americans. So he starts to sell late 30s. May 1940, he just about escapes the war in Europe and he escapes from Italy, actually, with two machines in his luggage, heads to the US, spends most of the war in the US. And this is where he starts to sell big, crucially, including to the US Army. He's going to sell 140,000 machines for the military to use for kind of encrypted tactical communications. The deal for $9 million. Probably like $80 billion today. Not that much.
Starting point is 00:14:32 You didn't do the calculation, Gordon. Yeah, you didn't do the math. But he's in his late 40s. You know, he's handsome, slim, silver, slick back hair, well-dressed. Kind of looks like a successful businessman, not quite a tech bro. Wars are good for business. 1984, he goes back to Sweden, but then moves the company to Switzerland. It merges with another other company, and it's going to become called Crypto AG. Crucial thing is, it's starting to build better machines. And he's going to think, I'm going to start selling these around the world. Everyone wants these machines. Everyone wants these machines. Start of the 50s, Crypto AG builds a new machine called the CX-52, which is a massive improvement on the previous ones. It's actually quite good. And it's so good that it freaks out US intelligence, who when they see it, realize we can't break it.
Starting point is 00:15:20 And this is the central problem then. What do you do when someone is building in the private sector high-grade encryption and offering to sell it to anyone? And that is the problem. Well, and it makes me think, Gordon, it's not encryption. It's actually the opposite. But it makes me think of the Israeli software developer, NSO group that made the Pegasus Spyware, which essentially was a, I guess, a zero-click exploit that enabled the user to get access to a Target's phone.
Starting point is 00:15:52 And that private company sold that spyware, you know, to the Emirates. and I think they sold it to a dozen other governments that used it to sort of monitor internal opposition. It's something that's commercially available and that immediately has intelligence or national security sort of implications or use cases. And it reminds me of that here. It's like, how do you as a government or an intelligence agency deal with a threat in the private sector and try to prevent that company from quite legally in most? cases, selling their wares to rivals. And what's interesting in this case is it's a friendship, and that's where this kind of issue of friendship comes into play, because the friendship is going to be between Boris
Starting point is 00:16:40 Hagelin, the businessman, and another man who is actually America's top codebreaker, and it turns out their friends. Now, his name is William Friedman, and he's described as the father of American cryptology. He's credited with coining the term cryptology to kind of talk about the science of secret communications. Now, here's what's interesting. He was originally called Wolf, not William Friedman, and he also has a Russian background. He's the son of well-educated Hungarian, Russian, Jewish family who flee Russia just after he's born, almost within a year of Boris Hagelin, and his family go to Pittsburgh. So as a child, he gets into codes. So he reads a short story
Starting point is 00:17:20 by Edgar Allan Poe, which I think is called the Gold Bug, where there's a kind of secret code and a treasure hunt, kind of people have to decode it. And that gets him into it. He's then go to work at a private research lab where he meets Elizabeth, a young woman who's also a code nut. She's spending her time looking for secret messages hidden in the works of Shakespeare and other Elizabethan writers. Sounds like a perfect match. It is a perfect match. I mean, they inevitably fall for each other and get married. And he's a kind of bald and quite dapper in his dress, often got a bow tie, neat moustache. Looks like a kind of crypt guy, I guess. if you want to be stereotypical about these people.
Starting point is 00:17:58 Is that harsh? Is that because of the bowtie? I feel like 50s crypt people. That was their look was kind of bowties and daffat dress. Thin mustaches. Thin moustaches, exactly. Goes to work for the US War Office in Code Breaking in the 20s. Interesting enough, America had done code breaking in the First World War, a place called the Black Chamber,
Starting point is 00:18:17 secret facility in New York, which famously gets closed down because the Secretary of State says, gentlemen don't read others' mail, which I love. It's like such a simpler time. It was a simpler time. So what happened to that? Yeah, it's gone. But Friedman's going to be tasked with rebuilding after the closure of the Black Chamber, a new service within the US Army.
Starting point is 00:18:38 It's interesting. He works with his wife a lot. And the first kind of traffic they're cracking is what's called rum-runner traffic, because this was the days of prohibition, David. Can you believe that day when the US banned alcohol? I mean, it seems bizarre to you. after our cocktail making live stream the other week.
Starting point is 00:18:56 As someone who participated in a cocktail making live stream in which I consumed three quite strong drinks between 2.30 and 3.30 p.m. in the afternoon. No, I cannot imagine. The world of prohibition. Having my freedom to do that taken away, Gordon. Although that evening I might have hoped for someone to have prevented me for doing that.
Starting point is 00:19:18 Yeah, but yeah, a reminder, if you want to learn how to make some of those crazy cocktails, that I think the live stream is still available to club members. Oh, it's very available. Yes, join the Declassified Club, and you can watch us having a few drinks in the afternoon. But anyway, this time, back to Prohibition. Criminal gangs are smuggling liquor into America from outside the US,
Starting point is 00:19:37 organised by radio using codes. And Friedman's wife, Elizabeth, works in the Coast Guard, and she and her husband will kind of crack the codes. His team have got a nut file, which is all the people who are kind of claiming to have built unbreakable codes and demanding a million dollars from the government, or else they'll sell them to other countries, which I love. You maintain a nut file on our club members, too, right?
Starting point is 00:19:59 On our secret squirrels. Everyone's got a nut file. Every secret squirrel is valued. It has a nut file. But as the 30s progresses, you know, Friedman in his kind of army intelligence unit then see a new Japanese kind of code system called Purple, which is their high-level cypher machine. You know, huge pressure to break it as the war approaches.
Starting point is 00:20:18 Friedman actually, at one point, has a breakdown in his hospitalised, but he's going to become a kind of core figure in American code breaking. And of course, he meets Hagelin in the late 30s when Boris Hagelin is trying to sell his crypto devices. And Friedman takes a look at them. He's not actually that impressed, quickly works out how to break it. But the two men become friends. And I guess it's obvious why, isn't it? They're both Russians. They both love codes and cryptology. One likes making them, one likes breaking them. But you can see why. They're kind of two kind of nerdy Crip guys. So, yeah, and their wives are also going to become good friends,
Starting point is 00:20:54 and that's going to last throughout their whole lives, and they'll stay at each other's houses when they go visit. So back to the story, 1951, the US is worried about Boris Hagelin building new machines that they can't break. So Friedman, now working for the NSA, the National Security Agency, decides, well, maybe I'll go talk to him. And so that is going to lead to a dinner at Friedman's favorite haunt, the Cosmos Club in D.C. Is that still there?
Starting point is 00:21:23 Does that still exist? It's still there? I've not been, but the pictures online were quite lovely. It made me wish I'd been invited, Gordon. It's kind of got this air, even in the pictures of you're going to have important people sitting, kind of having conversation over these tables and this sort of grand dining room, hashing out really important. political arrangements. And that is exactly, isn't it, what Hagelin and Friedman work out when they're at the Cosmos Club. It comes to be, I love this, it comes to be known as the gentleman's
Starting point is 00:21:56 understanding. Yeah, that's right. So let's maybe take a break there. And when we come back, we'll learn what this gentleman's understanding really means. This episode is brought to you by Atio, the CRM for the AI era. Now, David, people think that Spycraft is just car chases and secret codes, but an awful lot of it is just idling around, waiting for the action. It's a bit like starting your own business. You think it's going to be as easy as creating and selling a product, but the reality is business owners spend far too long trying to get their CRM to fit a system not built for them.
Starting point is 00:22:36 Atio's AI-driven CRM enables you to take control of your platform to build something from the ground up that fits your needs. James Bond had Q's x-ray shades, an explosive watch, and a pen grenade. Business owners have Adio's real-time customer insights and platform that grows with them. All tools relevant for your mission to build a company from the ground up. Atio even has something called agent collaboration. Yes, but in this case, that means giving people the ability to let AI work seamlessly in the background for them. Try atio for free at ATTIO.com
Starting point is 00:23:15 slash trick. It's the matcha or the three ensemble Cado Cephora of the FACETs that I've been to denichy who energize o'clock? Mm, it's all over. The form of storemen. And the embellage, too beau, who is practically pre to donate.
Starting point is 00:23:29 And I know that I'd love these offriars, but I guard the Summer Fridays and Rare Beauty by Selena Gomez. I'm, I'm just the best ensemble the Caddle of the Feds This is from at Shephora. Summer Fridays, Rare Beauty, Way, Cifora Collection, and other part of
Starting point is 00:23:41 quick. Procure you these formats, standard and mini, regrouped for a better quality of price. On link on Cifora.ca or in magazine. This episode is brought to you by Square. You're not just running a restaurant. You're building something big. And Square's there for all of it.
Starting point is 00:23:56 Giving your customers more ways to order, whether that's in-person with Square kiosk or online. Instant access to your sales, plus the funding you need to go even bigger. and real-time insights so you know what's working, what's not, and what's next. Because when you're doing big things, your tools should to. Visit square.ca to get started. All right, welcome back.
Starting point is 00:24:24 It's 1951. We're at the Cosmos Club in Washington, D.C., Dallas, deep into our second martini. And Boris Hegelen and William Friedman are hashing out this gentleman's understanding, which is going to really have tremendous implications for American intelligence and really the intelligence apparatus of the entire Cold War. Yeah, that's right. So over dinner, Friedman asked question, would it be possible to control the sale of the new machines, these ones that are super secure, in a way that only certain countries could purchase the newer, more secure machines? And now, Friedman says Hagelin sounded interesting. Now, at first, this is just a kind of gentleman's agreement. Could we kind of work together to control the flow of these encryption machines? But it's going to kind of evolve into a formal deal and then something even more intense and surprising.
Starting point is 00:25:16 Does Hegeland know that Friedman works for the NSA? Yeah. And I think he knows what he's doing. I mean, that's what is interesting about this. He's not doing it even for the money particularly or for anything else. I think he's doing it partly for friendship and partly because I think he kind of gets it and understand. it. So it's interesting, isn't it? Because there's no doubt he knows exactly what he's being asked to do. Because effectively, what he's being asked to do is restrict the sale of his most
Starting point is 00:25:46 sophisticated models to just countries approved by the United States. It's kind of like export controls for weapons. But that's one thing. But then there's something kind of subtler, which goes on. Because I think if it was just that, that would be kind of okay. But I think what they're actually going to do is discuss that other countries who will be sold machines and be told they're secure whilst not knowing that the U.S. can read the messages of the machines. This, I think, is the one aspect of the genius of this operation, because my mental model for this just after having read a couple articles prior to us having this conversation was that the CIA, the NSA had installed like a backdoor into these machines.
Starting point is 00:26:33 that allowed them to read the encrypted messages, but it's actually far more clever than that, isn't it? Because that might work for a while, but eventually someone, somewhere, some customer is going to spot that and it's going to be over, right? The really, I think, diabolical piece of this is that the idea was just to reduce slightly the complexity of the code so that the CIA, the NSA, whomever,
Starting point is 00:27:02 is still going to have to decrypt it, but it's just going to be made far less challenging to do so. Because it still looks secure, because of course you hear this phrase backdoor, but if you have either literally a backdoor or, you know, in terms of code of backdoor, other people can find it. So the trick in this is to reduce the complexity of the code so you can break it. And to do that, you have to kind of understand how it's made, how the encryption work, how the machine is configured and how it's used.
Starting point is 00:27:30 And crucially, I think, often with encryption, you know, It's not the machine or the code itself, but it's how people use it. And it's actually a clue in the last line of Hagelin's autobiography. Which is only 58 pages long. Yeah. And most of it is pretty technical because I skim the technical bits. But he kind of ends the guy, goes, yeah, these codes can be incredibly complex. And you hear this stuff of like, there's 10 billion permutations of this. And it would take a supercomputer ages to do.
Starting point is 00:27:55 But he says, but these numbers are meaningless. if the user does not carefully accept and exercise the instructions and does not make full use of the possible variations, the old rule is still true. The quality of a machine depends largely on its user. It's a killer statement, because it was also true with Enigma machines in World War II that part of the reason the Brits could break them
Starting point is 00:28:20 was because the Germans would kind of have predictable words in them. And the key thing, you know, as he's saying there is, you have to follow the instructions. To set up a kind of machine and make it work at the highest level, you've got to follow the instructions. So here's the question. What if you even sold the same machine to two different people, but you gave them different instruction manuals? And it's so brilliant. It's so sneaky.
Starting point is 00:28:44 And so if you use one instruction manual, you're using it properly and you're going to have a kind of unbreakable code or close to. But if you use a different manual, you don't know that you've not set up the machine right. And even though it looks encoded, it's encoded only to a certain point where most people can't break it, but if you know how the code was made and you've got some supercomputers and you're the NSA or whoever, you can break it. I mean, that was one of the kind of geniuses of this operation. And there's even kind of secret marks on the instruction manuals to indicate, you know, which ones are for whom. And so effectively, the NSA is going to start writing the kind of instruction manual. for these machines. It's brilliant in a way because you're manipulating the way people use it, but not in a way that's going to be obvious in the machine itself. Should say GCHQ, the Brits.
Starting point is 00:29:39 I knew it was coming, Gordon. They're also aware of this. I could sense it. I could sense it. It's not just the Americans. But they're getting everything, presumably, right? GCHQ, the Brits are getting access to all of this product. Yeah, because Friedman goes to Switzerland, and he goes on these visits to Switzerland to see Boris Hagelin. When he comes back, he stops off at GCHQ, tells them what's going on. It's interesting because NSA are actually a little bit cautious about this. This is interesting culturally, I think, because NSA are kind of like, we like breaking codes and using supercomputers and computers to break codes and maths and all those things. We're a bit uncomfortable using businessmen to kind of manipulate the system.
Starting point is 00:30:18 That's not their kind of comfort zone. There's some agent handling involved here. It sounds like, Gordon. Yeah, exactly. And they don't like it very much. So Cryptoag, I mean, it's crazy. They are going to supply different machines to countries and also similar machines, but with different instructions to countries around the world. And what that means is that more than 100 countries around the world are going to get machines where the US can read their messages. I mean, this company is going to get rich by selling customers compromised equipment. I mean, it's crazy, isn't it? I mean, in terms of a business deal and an intelligence deal. I mean, the customer list is, it's interesting, right? Because it's not the Soviet Union in China, right? So it's not the kind of big dogs.
Starting point is 00:31:04 They're off the customer list anyway. But it is a massive list of very interesting other countries like Egypt, Iraq, Iran, Saudi Arabia, Syria, Pakistan, India, Jordan, the Vatican. That's a good one. Argentina, Italy. I mean, this is the other, I think, fast. fascinating thing and has real echoes of the Snowden story where, shocker, the NSA and GCHQ were spying on our allies, our dear allies, like the Germans. I mean, here, there's signs of this kind of appetite for spying on other Western allies
Starting point is 00:31:45 at the same time. Italy and Greece, yeah. Turkey who are in NATO, they're all buying these machines, thinking they're secure. But instead, they're rigged. And it seems like about 40% of the diplomatic cables that the NSA is decoding in the 80s comes from compromised, rigged crypto AG machines. That is an astounding number, by the way. That quantity, I think, backs up this point around it being one of the most important
Starting point is 00:32:15 intelligence operations of the Cold War because it is responsible for supplying American, British, I mean, German policymakers with a huge amount of information on not the Soviet Union, not China, but on basically the rest of the world. And it's kind of interesting because we'll come to later how this all emerges. And actually the full details of this is only just emerged in the last few years. So in a way, we don't know the full extent of how that intelligence was used. But there's some really kind of interesting little examples. So in the summer of 1958, there's a coup in Iraq, and army officers who are sympathetic to the Egyptian president, Nasser, overthrow the pro-British regime in Iraq.
Starting point is 00:33:01 And the fear is that they'll then move on to Jordan and overthrow a pro-British regime in Jordan. But Britain's able to move troops quickly enough to forestall that. Now, how do they act so fast? It looks like it's because the coup plotters were communicating with officers in Egypt, with now. matters regime in Egypt. And the orders and the communications are going over these Hagelin machines that Egypt has bought. So you basically, you know what they're planning, what you're doing, what you can forestall it. So in this period, I think in the 50s and 60s, loads of countries are all using these machines. And the West is going to be able to kind
Starting point is 00:33:39 of read the messages and then act on the basis of it. I mean, in some cases we'll see kind of later that's going to cause some kind of tensions and questions. But it's amazing. as a kind of intelligence coup, what it brings them. And the sustainability of this over time really hinges on the friendship, right, doesn't it, between Friedman and Hagelin? Yeah. And, you know, there's long letters between the two. And there's all the health, Boris sends pictures of his wine cellar in Switzerland.
Starting point is 00:34:06 They talk with their grandkids. You know, it's clearly like a real friendship. And as to the question of why Hagelin does it. I mean, he doesn't seem to have any qualms about it. I mean, Hagelin does say he's grateful to the NSA for what they've done for memorandum. members of his family, which looks like intervening to ensure a son-in-law had his active duty status in the Air Force retained, and a cousin of Hagelin's wife being employed at the NSA. It's a little favours, but he's not doing it for the money or for something big.
Starting point is 00:34:31 So it looks like he is doing it for belief and for friendship, you know, that he's willing to go along with this. But in a way, that's also the weakness of the operation. Because in 1955, Friedman is actually going to suffer a heart attack after he visits Hagelin and Cryptoag's manufacturing plant in Switzerland. and he's going to start thinking about retiring. And he and Elizabeth, you know, they want to go back to working on medieval and early modern codes together. That's their plan.
Starting point is 00:34:56 That's the retirement idea in the Friedman family is go look for codes in Shakespeare. Although he's still going to kind of stay friends with Hagelin for all the years. And, you know, they stay friends after Friedman does retire, which actually I think does show this is a genuine friendship. It's not just Friedman doing it because he's been told to do it or it's a kind of operational tasking. But Friedman's relationship with the NSA is also slightly breaking down. He's a bit marginalised. He's a bit left out in the new world of kind of computers. He's being put out to pasture, you know, when he's retiring.
Starting point is 00:35:29 He's kind of working at home on contract. The NSA view him as a little bit of a security risk because he's semi-public. And the NSA is getting less sure it wants to be in this game. It prefers to break codes with supercomputers rather than deal with people, which I think is interesting, isn't it? I was struck by this. I mean, why do you think NSA was ambivalent in this period? And we're talking about the, you know, late 50s, early 60s as both of these men are starting
Starting point is 00:35:56 to get on in age and Friedman is being a bit put out to pasture. You know, he's still, I guess, working on a contract with the NSA and hanging around, but he's not there anymore formally. I mean, it just seems given the value of the product. I'm struck by the NSA's ambivalence there. I mean, what do you? It's got to be a bit more than just we want to sit behind our computers all day. I mean, what's driving that?
Starting point is 00:36:19 It's interesting. I mean, I've been into the NSA, and it is a super secret organization. I think they are an organization, which now they've opened up a bit, hence the fact that I've been in as a journalist to interview people. But, you know, in the past, in the Cold War, I think the NSA was known as no such agency, wasn't it? Because everyone kind of basically denied it even existed. And I think they were so obsessed with secrecy. for lots of good reasons, that I think anything which threatened that secrecy or the truth about code breaking or what they did, I think they felt was a bit dangerous.
Starting point is 00:36:52 And I think they felt maybe it was like Friedman's project. I find it interesting that they seem to be reluctant to do it. But, as we'll see, the NSA's reluctance opens the way for another intelligence agency to get in the game. And who might that be, Gordon? Who might that be? Here we go. Here we go.
Starting point is 00:37:12 The CIA. Oh, thank God. A new player has entered the game. That's right. Hello, CIA. You were waiting for that, weren't you? I was. I was.
Starting point is 00:37:21 I do think it makes sense, though, because the management of this program is going to come down to how you sort of liaise with and help run this company and strike arrangements with executives in the company. And as we'll see, you know, if you try to scale this thing, you know, up, which happens over the course of the 60s, 70s, and 80s, it's going to be more complicated and there's going to need to be more people involved, like chief scientific advisors on crypto AG staff, like you're going to need more than just one person who's really in the know. And that's going to involve relationship management and asset and agent handling. And I think it does make some sense from that standpoint for the CIA to be involved. By the 60s, the CIA is kind of offering Hagelin a license.
Starting point is 00:38:11 agreement to pay him to kind of basically formalise the deal. And they're going to pay him $70,000 a year in a retainer and give the company cash for marketing. So they're starting a kind of relationship with him. But as we'll see, this is going to be just the start of a much deeper, much more interesting relationship. As Friedman leaves the scene in the 60s and retires, but you've also got this second problem, which is Boris Hagelin. The other half of the friendship is also planning to retire. He's grooming his son to take over, but here's the problem. His son knows nothing of the secret deal. That, Gordon, sounds like a cliffhanger to me because we've got a succession crisis looming
Starting point is 00:38:53 inside crypto AG. And if that's not enough to wet your whistle, there's going to be a mysterious death in Washington and the arrival in the scene of the Germans who are going to play a critical role in this story. But Gordon, why wait to get that next episode, right? You can get it right now by going to The Rest Is Classified.com and becoming a member of the Declassified Club. Get early access to all of our series and wonderful bonus content like that. Boozy live stream we just did. We hope you join and we'll see you next time. See you next time. Thank you.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.