The Rest Is Classified - 96. Selling The World's Secrets: Is The CIA Reading Your Messages? (Ep 1)
Episode Date: November 3, 2025Over the past seventy-five years, the United States has developed an insatiable appetite for global surveillance. The stories exposed by Edward Snowden in 2013 were only the tip of the mountain: the C...IA had been spying on the world for decades. For more than half a century, a Swiss‑based firm called Crypto AG built encryption machines and sold them to governments around the world. But what its customers didn’t know was that the firm was secretly owned and controlled by the CIA. This is a story of deception, code breaking and the invisible ear listening into the world's secrets. Listen as David and Gordon delve into the recently exposed story of Crypto AG and how the CIA, and their German counterparts, pulled off the intelligence coup of the twentieth century. ------------------- Join The Declassified Club: Start your free trial at therestisclassified.com - go deeper into the world of espionage with exclusive Q&As, interviews with top intelligence insiders, quarterly livestreams, ad-free listening, early access to episodes and live show tickets, and weekly deep dives into original spy stories. Members also get curated reading lists, special book discounts, prize draws, and access to our private chat community. To sign up to the free newsletter, go to: https://mailchi.mp/goalhanger.com/tric-free-newsletter-sign-up ------------------- Order a signed edition of Gordon's latest book, The Spy in the Archive, via this link. Order a signed edition of David's latest book, The Seventh Floor, via this link. ------------------- Email: classified@goalhanger.com Twitter: @triclassified Social Producer: Emma Jackson Producer: Becki Hills Head of History: Dom Johnson Exec Producer: Tony Pastor Learn more about your ad choices. Visit podcastchoices.com/adchoices
Transcript
Discussion (0)
For exclusive interviews, bonus episodes, ad-free listening, early access to series,
first look at live show tickets, a weekly newsletter, and discounted books,
join the declassified club at the rest is classified.com.
Rinse takes your laundry and hand delivers it to your door, expertly cleaned and folded,
so you could take the time once spent folding and sorting and waiting
to finally pursue a whole new version of you. Like tea time, you.
Or this tea time you.
Or even this tea time you.
Said you hear about Dave?
Or even tea time, tea time, tea time you.
Mmm.
So update on Dave.
It's up to you.
We'll take the laundry.
Rinse. It's time to be great.
With Amex Platinum, you have access to over 1,400 airport lounges worldwide.
So your experience before takeoff is a taste of what's to come.
That's the powerful backing.
of Amex. Conditions apply.
This episode is brought to you by Peloton.
A new era of fitness is here.
Introducing the new Peloton Cross Training Tread Plus, powered by Peloton IQ.
Built for breakthroughs with personalized workout plans, real-time insights, and endless ways to move.
Lift with confidence, while Peloton IQ counts reps, corrects form, and tracks your progress.
Let yourself run, lift, flow, and go.
Explore the new Peloton cross-training tread plus at OnePeloton.CA.
Welcome to the rest is classified. I'm Gordon Carrera, and I'm David McCloskey.
David, have you ever wondered if your phone might be spying on you?
I have occasionally wondered if my phone is spying on me, Gordon.
I would say more so after reading the outline that you put together for the next few episodes.
for the story we're going to talk about, which is all about technology being rigged to spy on its
users, on the poor people who have paid for it. And it makes me think that, like so many of these
episodes that we do that deal with the intersection of spying and technology, that we should
all get rid of our phones and computers and put the tinfoil hats on and shut the doors
and disconnect. And hide. And hide. Yeah.
I think there's something to that because if you are already a little bit worried about your tech,
then this episode and the next one might get you even more worried because, yeah,
tech companies are always kind of promising they will offer you security from your phone
and your messaging.
But what if a spy agency actually secretly owned the company that made the devices that
promised you security?
I mean, that is the slightly crazy story we're telling today.
The story of a company called Crypto AG and the way and the crazy operation used to effectively spy on all its customers.
We did the series on Oleg Gordievsky and I think agreed that he was maybe the most important human spy of the Cold War.
You might be able to make the case that this far less well-known story about Cryptoag is the greatest intelligence operation of the Cold War, period.
Because it went on, as we'll see, for decades.
And it compromised an absolutely staggering amount of global communications
that was then decrypted by American and, as we'll see, German intelligence and
past to so many different allies.
I mean, this, to me, feels like it's right up there in terms of the most impactful
intelligence operations run in the past, maybe ever, but certainly during the Cold War.
Yeah, that's right. I think, you know, it had, as we'll see, kind of really consequences
which changed world events. I think because it's only just emerged recently what was
involved in this operation. We're still learning and kind of trying to find out how it did
shape international relations, you know, throughout most of that Cold War period.
And it is an amazing intelligence operation run by the US, but yes, also with a little bit
of UK role. And also the Germans. The Germans, the Germans make the shout out to the
BND, the German Foreign Intelligence Service. I think this is one of their
first appearances on the pod.
The Bundes-Nox-Riechengen-S.
How do you...
What does it stand for?
Very good.
B&D.
The B-N-D.
The B-N-D. The Bundes-N-Ax-Rick-Gien-Stent.
I listened to a German pronouncing that word a few times in preparation for this, Gordon,
and I still, the end is unintelligible to be.
I still don't have it.
So, apologies to all of our German friends at listeners.
The B&D, Gordon, I think, has appeared on the show in
one prior episode, which is when I talked about how I went to Berlin for a liaison meeting
with the BND and we presented them with very compelling information and they told us that
we were wrong. And then we had pizza and left Berlin. That was the one other time the BND has
appeared. And so it's an international operation. Also, I think the other thing, just before we get
into it, I really find interesting, is that it is about kind of technical intelligence and
communications intercept and, you know, complicated things about encryption. But it's actually
also based on two people and a personal friendship between two people, a spy and a businessman.
And I think it also is quite interesting because it gets to the relationship between the technical
world of communications intelligence and signals intelligence and the human world of human
relationships and the CIA. And so I find that bit of it actually quite compelling as well,
as well as the fact it's basically telling us about security and communications and what we need to
worry about today. It does feel like a bit of the missing link or a connective tissue between
the world of Bletchley Park, the decryption of German code, and then Snowden.
Ah, friend of the pod.
Friend of your side of the pod, Gordon. It feels like this story connects some of these themes
around essentially the transatlantic partnership and the compromise of so much.
global telecommunications traffic that our two countries have done together. Really?
Jointly. Yeah, no, I think that's right. And I think also the relationship between intelligence
agencies and companies, which is interesting. And, you know, these days, you've got battles between
states and companies like Apple and the British government is having a battle about
encryption and whether Apple should build back doors into its devices. Well, this is about,
in a way, how we got there. And, you know, there's even echoes of our recent series on Mossad,
pages. So, yeah, lots in there to get our teeth stuck into. And Gordon, I think listeners to
this pod are going to be very excited about how we're starting the story because this isn't
going to be Gordon Carrera explaining how you build a nuclear weapon, which he is, he has done,
I think, now, two or three times on the pod, different pieces of how you construct a nuclear
about this time, you were going to give us a lesson in encryption to start because the
encryption and the value of encrypted communications is going to really be at the center of this
story. Yeah. So let's cut straight to the lesson. Encryption means encoding information. You can stop
me any time, David. So encryption is encoding information so that other people can't read it,
keeping your messages private. So we all use it every day now when you send your bank details over
the internet to pay for something. It's encrypted. You know, when you use WhatsApp, they talk about
end-to-end encrypted so that anyone who intercepts it can't read it. There's lots of ways of
doing it, and it goes back really to ancient times, the simplest way of scrambling the letters and
making something unreadable, which kids get taught in some of those kind of spy books you get
given, is to use something called a Caesar cipher, named after Julius Caesar, where you simply
shift letters along the alphabet. Another version is where you use a kind of wheel, where you have
two little rows and the letters line up and you create your message on one hand and you look
at what the wheel tells you that each letter corresponds to, you write it down. And if someone
has the same wheel set up at the same place, they can turn the gobbledy gook back into a readable
message, right? So that's the simple explanation. But if you go back a century or so just over
that, you get the first encryption machines which are being built, electro-mechanical devices. They
look like a typewriter. You type your message on a keyboard, scrambles it with rotors which
turn, which give you lots more combinations, making it harder to crack. Then you get out the
message. It looks like gobbledygook on a bit of paper. You can transmit it over radio,
Morse code. Only if you've got another machine with the same settings, can the person who
receives the message read it. February 1918, a German engineer named Arthur Sheribus,
Sherbius. I think it's the right
pronunciation. Now
whose other inventions included an electric
pillow. I love that fact.
What does the pillow need to be
electrified for? Is it heated?
Is it heated? I guess it's like an electric
blanket, but it was an electric pillow which you
patent it. Maybe it inflates itself.
I don't know.
We're unfair. But anyway, more importantly
than the electric pillow, he is
going to invent a machine
which he's going to sell to businesses with a slogan,
one secret, well protected, may pay the entire cost of the machine, good salesman,
and he's going to call the machine Enigma, because it's so mysterious.
Of course, it's going to get very famous.
It's actually made for businesses originally,
but governments immediately see, well, there's some advantage
when you're sending diplomatic messages, intelligence reports, military orders
to have them encrypted.
Obviously, where you've got secrets, spies are going to try and steal them,
So where there's code, you get code breakers.
Most famously, the team at Bletchley Park will set out to break various different types of enigma in World War II.
We're not going to do the whole Bletchley Park story today, are we?
No, I mean, that is one that we have talked about doing in person, and it's its own story, I think, in its own right.
I mean, you probably could say that it's the start of the modern US-UK intelligence relationship is really birthed at Bletchley.
Ledgeley Park and the breaking of German codes.
Yeah, that's right, because a bunch of Americans come over to kind of share what they've
done against Japanese codes with the Brits, and the Brits have done, you know, the work
against the German Enigma.
And that starts, actually, the cooperation between the two countries, which then becomes
the heart of the intelligence relationship and, you know, GCHQ and NSA and what's called
the Five Eyes when Australia, Canada, and New Zealand joins.
So it should be 10 eyes, shouldn't it?
everybody should have two.
That is a really good point.
Yeah, there's five participants.
Each with two eyes.
Each with two eyes.
It should be ten.
I've always thought this.
I've never had the platform to do anything about it, but I'm throwing it out there for
anyone listening.
But yes, five eyes, which is five eyes too short, is a code-breaking alliance.
The big thing about Enigma is it's super secret during the war.
You don't want your enemy to know you've broken their codes because then they'll change
them and you won't be able to read them.
But they keep it secret after the war.
And this is really interesting. It's kept secret in Britain until the 1970s, the fact Bletchley Park did what it did.
And if you want to understand why they did that, actually this story about Crypto AG is going to help explain that.
Because the point is, after the war, no one knows they've broken an enigma.
So everyone believes these kind of machines are unbreakable.
And at the same time, other companies are building their own versions of the Enigma Machine.
And here we meet our first character, Boris Hagelin, born in Russia.
and that's going to be important in 1892 to a Swedish family.
And his father works in a senior capacity for the Nobel family,
which have a load of oil refineries in Baku.
The Nobel family as in the Nobel Prize, David.
So I know your president is waiting for his Peace Prize.
You're waiting for your prize for literature, I imagine.
That's right.
As we speak.
That's right.
Another year, and I didn't get it, Gordon.
Another year.
I'll have a word.
Another empty spot on my shelf for my Nobel.
So Boris Hagelin is.
you know, working for the Nobel family. He goes back to Stockholm for his education, graduates
in mechanical engineering in 1914. He's expecting to go back to Russia, but then you get the
Bolshevik Revolution 1917. So that's over. The Nobel family is still kind of helping him
and his father out. And young Boris ends up in charge of a small company in 1921 called
A.B. Cryptograph, which Nobel are investing in. And this builds these kind of very early
cyphor machines like the enigma. And he's tinkering and trying to understand it. 1925, he hears the
Swedish military, so he's back in Sweden, have got hold of one of these German enigma machines.
And he rushes over to the Swedish military and he says, oh, hang a second, I can build you something
better. Now, I think he's a little bit of a modern techie in the kind of fake it until you make
it category. Because the truth is, I don't think he knows how to do that. I think he's, you know,
he's just kind of guessing, bluffing that he's going to be able to do it. But he gets to work.
Six months later, he's built off, kind of knock-off, slightly inferior version of Enigma,
and he gets the Swedish general staff, the military, to buy his machine, the B-21.
Business starts then struggling a little bit.
1932 gets the French military to buy a model, followed by the Dozierme Bureau, French Spies.
How was my French there?
It's okay.
Trey bon, Gordon.
Thank you, David.
And then he, of course, like anyone seeking to make it, he's got to go to the Americans.
So he starts to sell late 30s. May 1940, he just about escapes the war in Europe and he escapes from Italy, actually, with two machines in his luggage, heads to the US, spends most of the war in the US. And this is where he starts to sell big, crucially, including to the US Army. He's going to sell 140,000 machines for the military to use for kind of encrypted tactical communications. The deal for $9 million. Probably like $80 billion today. Not that much.
You didn't do the calculation, Gordon. Yeah, you didn't do the math. But he's in his late 40s. You know, he's handsome, slim, silver, slick back hair, well-dressed. Kind of looks like a successful businessman, not quite a tech bro. Wars are good for business.
1984, he goes back to Sweden, but then moves the company to Switzerland. It merges with another other company, and it's going to become called Crypto AG.
Crucial thing is, it's starting to build better machines. And he's going to think, I'm going to start selling these around the world. Everyone wants these machines. Everyone wants these machines.
Start of the 50s, Crypto AG builds a new machine called the CX-52, which is a massive
improvement on the previous ones.
It's actually quite good.
And it's so good that it freaks out US intelligence, who when they see it, realize we
can't break it.
And this is the central problem then.
What do you do when someone is building in the private sector high-grade encryption and offering
to sell it to anyone?
And that is the problem.
Well, and it makes me think, Gordon, it's not encryption.
It's actually the opposite.
But it makes me think of the Israeli software developer, NSO group that made the Pegasus Spyware,
which essentially was a, I guess, a zero-click exploit that enabled the user to get access to a Target's phone.
And that private company sold that spyware, you know, to the Emirates.
and I think they sold it to a dozen other governments that used it to sort of monitor internal opposition.
It's something that's commercially available and that immediately has intelligence or national security sort of implications or use cases.
And it reminds me of that here.
It's like, how do you as a government or an intelligence agency deal with a threat in the private sector and try to prevent that company from quite legally in most?
cases, selling their wares to rivals.
And what's interesting in this case is it's a friendship, and that's where this kind of
issue of friendship comes into play, because the friendship is going to be between Boris
Hagelin, the businessman, and another man who is actually America's top codebreaker, and
it turns out their friends.
Now, his name is William Friedman, and he's described as the father of American cryptology.
He's credited with coining the term cryptology to kind of talk about the science of secret
communications. Now, here's what's interesting. He was originally called Wolf, not William Friedman,
and he also has a Russian background. He's the son of well-educated Hungarian, Russian,
Jewish family who flee Russia just after he's born, almost within a year of Boris Hagelin,
and his family go to Pittsburgh. So as a child, he gets into codes. So he reads a short story
by Edgar Allan Poe, which I think is called the Gold Bug, where there's a kind of secret code and a treasure hunt,
kind of people have to decode it. And that gets him into it. He's then go to work at a private
research lab where he meets Elizabeth, a young woman who's also a code nut. She's spending her
time looking for secret messages hidden in the works of Shakespeare and other Elizabethan writers.
Sounds like a perfect match. It is a perfect match. I mean, they inevitably fall for each other
and get married. And he's a kind of bald and quite dapper in his dress, often got a bow tie,
neat moustache. Looks like a kind of crypt guy, I guess.
if you want to be stereotypical about these people.
Is that harsh?
Is that because of the bowtie?
I feel like 50s crypt people.
That was their look was kind of bowties and daffat dress.
Thin mustaches.
Thin moustaches, exactly.
Goes to work for the US War Office in Code Breaking in the 20s.
Interesting enough, America had done code breaking in the First World War, a place called the Black Chamber,
secret facility in New York, which famously gets closed down because the Secretary of State says,
gentlemen don't read others' mail, which I love.
It's like such a simpler time.
It was a simpler time.
So what happened to that?
Yeah, it's gone.
But Friedman's going to be tasked with rebuilding after the closure of the Black Chamber,
a new service within the US Army.
It's interesting.
He works with his wife a lot.
And the first kind of traffic they're cracking is what's called rum-runner traffic,
because this was the days of prohibition, David.
Can you believe that day when the US banned alcohol?
I mean, it seems bizarre to you.
after our cocktail making
live stream the other week.
As someone who participated in a cocktail making live stream
in which I consumed three quite strong drinks
between 2.30 and 3.30 p.m. in the afternoon.
No, I cannot imagine.
The world of prohibition.
Having my freedom to do that taken away, Gordon.
Although that evening I might have hoped
for someone to have prevented me for doing that.
Yeah, but yeah, a reminder,
if you want to learn how to make some of those crazy cocktails,
that I think the live stream is still available to club members.
Oh, it's very available.
Yes, join the Declassified Club,
and you can watch us having a few drinks in the afternoon.
But anyway, this time, back to Prohibition.
Criminal gangs are smuggling liquor into America from outside the US,
organised by radio using codes.
And Friedman's wife, Elizabeth, works in the Coast Guard,
and she and her husband will kind of crack the codes.
His team have got a nut file,
which is all the people who are kind of claiming to have built unbreakable codes
and demanding a million dollars from the government, or else they'll sell them to other countries,
which I love.
You maintain a nut file on our club members, too, right?
On our secret squirrels.
Everyone's got a nut file.
Every secret squirrel is valued.
It has a nut file.
But as the 30s progresses, you know, Friedman in his kind of army intelligence unit
then see a new Japanese kind of code system called Purple, which is their high-level
cypher machine.
You know, huge pressure to break it as the war approaches.
Friedman actually, at one point, has a breakdown in his hospitalised, but he's going to become
a kind of core figure in American code breaking. And of course, he meets Hagelin in the late 30s
when Boris Hagelin is trying to sell his crypto devices. And Friedman takes a look at them.
He's not actually that impressed, quickly works out how to break it. But the two men become
friends. And I guess it's obvious why, isn't it? They're both Russians. They both love codes and
cryptology. One likes making them, one likes breaking them. But you can see why.
They're kind of two kind of nerdy Crip guys.
So, yeah, and their wives are also going to become good friends,
and that's going to last throughout their whole lives,
and they'll stay at each other's houses when they go visit.
So back to the story, 1951, the US is worried about Boris Hagelin building new machines
that they can't break.
So Friedman, now working for the NSA, the National Security Agency,
decides, well, maybe I'll go talk to him.
And so that is going to lead to a dinner at Friedman's favorite haunt, the Cosmos Club in D.C.
Is that still there?
Does that still exist?
It's still there?
I've not been, but the pictures online were quite lovely.
It made me wish I'd been invited, Gordon.
It's kind of got this air, even in the pictures of you're going to have important people sitting,
kind of having conversation over these tables and this sort of grand dining room, hashing out really important.
political arrangements. And that is exactly, isn't it, what Hagelin and Friedman work out when
they're at the Cosmos Club. It comes to be, I love this, it comes to be known as the gentleman's
understanding. Yeah, that's right. So let's maybe take a break there. And when we come back,
we'll learn what this gentleman's understanding really means.
This episode is brought to you by Atio, the CRM for the AI era. Now, David, people think that
Spycraft is just car chases and secret codes, but an awful lot of it is just idling around,
waiting for the action.
It's a bit like starting your own business.
You think it's going to be as easy as creating and selling a product, but the reality is
business owners spend far too long trying to get their CRM to fit a system not built for them.
Atio's AI-driven CRM enables you to take control of your platform to build something from
the ground up that fits your needs.
James Bond had Q's x-ray shades, an explosive watch, and a pen grenade.
Business owners have Adio's real-time customer insights and platform that grows with them.
All tools relevant for your mission to build a company from the ground up.
Atio even has something called agent collaboration.
Yes, but in this case, that means giving people the ability to let AI work seamlessly in the background for them.
Try atio for free at ATTIO.com
slash trick.
It's the matcha or the three ensemble
Cado Cephora of the FACETs that I've been to denichy
who energize o'clock?
Mm, it's all over.
The form of storemen.
And the embellage, too beau,
who is practically pre to donate.
And I know that I'd love these offriars,
but I guard the Summer Fridays
and Rare Beauty by Selena Gomez.
I'm, I'm just the best ensemble
the Caddle of the Feds
This is from at Shephora.
Summer Fridays, Rare Beauty,
Way, Cifora Collection, and other part of
quick.
Procure you these formats, standard and mini,
regrouped for a better quality of price.
On link on Cifora.ca or in magazine.
This episode is brought to you by Square.
You're not just running a restaurant.
You're building something big.
And Square's there for all of it.
Giving your customers more ways to order,
whether that's in-person with Square kiosk or online.
Instant access to your sales,
plus the funding you need to go even bigger.
and real-time insights so you know what's working, what's not, and what's next.
Because when you're doing big things, your tools should to.
Visit square.ca to get started.
All right, welcome back.
It's 1951.
We're at the Cosmos Club in Washington, D.C., Dallas, deep into our second martini.
And Boris Hegelen and William Friedman are hashing out this gentleman's understanding,
which is going to really have tremendous implications for American intelligence and really the intelligence apparatus of the entire Cold War.
Yeah, that's right. So over dinner, Friedman asked question, would it be possible to control the sale of the new machines, these ones that are super secure, in a way that only certain countries could purchase the newer, more secure machines?
And now, Friedman says Hagelin sounded interesting. Now, at first, this is just a kind of gentleman's agreement.
Could we kind of work together to control the flow of these encryption machines?
But it's going to kind of evolve into a formal deal and then something even more intense and surprising.
Does Hegeland know that Friedman works for the NSA?
Yeah.
And I think he knows what he's doing.
I mean, that's what is interesting about this.
He's not doing it even for the money particularly or for anything else.
I think he's doing it partly for friendship and partly because I think he kind of gets it and understand.
it. So it's interesting, isn't it? Because there's no doubt he knows exactly what he's being
asked to do. Because effectively, what he's being asked to do is restrict the sale of his most
sophisticated models to just countries approved by the United States. It's kind of like export
controls for weapons. But that's one thing. But then there's something kind of subtler, which
goes on. Because I think if it was just that, that would be kind of okay. But I think what they're
actually going to do is discuss that other countries who will be sold machines and be told
they're secure whilst not knowing that the U.S. can read the messages of the machines.
This, I think, is the one aspect of the genius of this operation, because my mental model for
this just after having read a couple articles prior to us having this conversation was that
the CIA, the NSA had installed like a backdoor into these machines.
that allowed them to read the encrypted messages,
but it's actually far more clever than that, isn't it?
Because that might work for a while,
but eventually someone, somewhere,
some customer is going to spot that and it's going to be over, right?
The really, I think, diabolical piece of this
is that the idea was just to reduce slightly the complexity of the code
so that the CIA, the NSA, whomever,
is still going to have to decrypt it, but it's just going to be made far less challenging
to do so.
Because it still looks secure, because of course you hear this phrase backdoor, but
if you have either literally a backdoor or, you know, in terms of code of backdoor, other
people can find it.
So the trick in this is to reduce the complexity of the code so you can break it.
And to do that, you have to kind of understand how it's made, how the encryption work,
how the machine is configured and how it's used.
And crucially, I think, often with encryption, you know,
It's not the machine or the code itself, but it's how people use it.
And it's actually a clue in the last line of Hagelin's autobiography.
Which is only 58 pages long.
Yeah. And most of it is pretty technical because I skim the technical bits.
But he kind of ends the guy, goes, yeah, these codes can be incredibly complex.
And you hear this stuff of like, there's 10 billion permutations of this.
And it would take a supercomputer ages to do.
But he says, but these numbers are meaningless.
if the user does not carefully accept and exercise the instructions
and does not make full use of the possible variations,
the old rule is still true.
The quality of a machine depends largely on its user.
It's a killer statement,
because it was also true with Enigma machines in World War II
that part of the reason the Brits could break them
was because the Germans would kind of have predictable words in them.
And the key thing, you know, as he's saying there is,
you have to follow the instructions.
To set up a kind of machine and make it work at the highest level, you've got to follow the instructions.
So here's the question.
What if you even sold the same machine to two different people, but you gave them different instruction manuals?
And it's so brilliant.
It's so sneaky.
And so if you use one instruction manual, you're using it properly and you're going to have a kind of unbreakable code or close to.
But if you use a different manual, you don't know that you've not set up the machine right.
And even though it looks encoded, it's encoded only to a certain point where most people can't break it, but if you know how the code was made and you've got some supercomputers and you're the NSA or whoever, you can break it.
I mean, that was one of the kind of geniuses of this operation.
And there's even kind of secret marks on the instruction manuals to indicate, you know, which ones are for whom.
And so effectively, the NSA is going to start writing the kind of instruction manual.
for these machines. It's brilliant in a way because you're manipulating the way people use it,
but not in a way that's going to be obvious in the machine itself. Should say GCHQ, the Brits.
I knew it was coming, Gordon. They're also aware of this. I could sense it. I could sense it.
It's not just the Americans. But they're getting everything, presumably, right? GCHQ,
the Brits are getting access to all of this product. Yeah, because Friedman goes to Switzerland,
and he goes on these visits to Switzerland to see Boris Hagelin.
When he comes back, he stops off at GCHQ, tells them what's going on.
It's interesting because NSA are actually a little bit cautious about this.
This is interesting culturally, I think, because NSA are kind of like, we like breaking codes and using supercomputers and computers to break codes and maths and all those things.
We're a bit uncomfortable using businessmen to kind of manipulate the system.
That's not their kind of comfort zone.
There's some agent handling involved here.
It sounds like, Gordon.
Yeah, exactly. And they don't like it very much. So Cryptoag, I mean, it's crazy. They are going to supply different machines to countries and also similar machines, but with different instructions to countries around the world. And what that means is that more than 100 countries around the world are going to get machines where the US can read their messages. I mean, this company is going to get rich by selling customers compromised equipment. I mean, it's crazy, isn't it?
I mean, in terms of a business deal and an intelligence deal.
I mean, the customer list is, it's interesting, right?
Because it's not the Soviet Union in China, right?
So it's not the kind of big dogs.
They're off the customer list anyway.
But it is a massive list of very interesting other countries like Egypt, Iraq, Iran, Saudi Arabia, Syria, Pakistan, India, Jordan, the Vatican.
That's a good one.
Argentina, Italy.
I mean, this is the other, I think, fast.
fascinating thing and has real echoes of the Snowden story where, shocker, the NSA and
GCHQ were spying on our allies, our dear allies, like the Germans.
I mean, here, there's signs of this kind of appetite for spying on other Western allies
at the same time.
Italy and Greece, yeah.
Turkey who are in NATO, they're all buying these machines, thinking they're secure.
But instead, they're rigged.
And it seems like about 40% of the diplomatic cables that the NSA is decoding in the 80s
comes from compromised, rigged crypto AG machines.
That is an astounding number, by the way.
That quantity, I think, backs up this point around it being one of the most important
intelligence operations of the Cold War because it is responsible for supplying American,
British, I mean, German policymakers with a huge amount of information on not the Soviet Union,
not China, but on basically the rest of the world.
And it's kind of interesting because we'll come to later how this all emerges.
And actually the full details of this is only just emerged in the last few years.
So in a way, we don't know the full extent of how that intelligence was used.
But there's some really kind of interesting little examples.
So in the summer of 1958, there's a coup in Iraq, and army officers who are sympathetic to the Egyptian president, Nasser, overthrow the pro-British regime in Iraq.
And the fear is that they'll then move on to Jordan and overthrow a pro-British regime in Jordan.
But Britain's able to move troops quickly enough to forestall that.
Now, how do they act so fast?
It looks like it's because the coup plotters were communicating with officers in Egypt, with now.
matters regime in Egypt. And the orders and the communications are going over these
Hagelin machines that Egypt has bought. So you basically, you know what they're planning,
what you're doing, what you can forestall it. So in this period, I think in the 50s and 60s,
loads of countries are all using these machines. And the West is going to be able to kind
of read the messages and then act on the basis of it. I mean, in some cases we'll see kind of later
that's going to cause some kind of tensions and questions. But it's amazing.
as a kind of intelligence coup, what it brings them.
And the sustainability of this over time really hinges on the friendship, right, doesn't it,
between Friedman and Hagelin?
Yeah.
And, you know, there's long letters between the two.
And there's all the health, Boris sends pictures of his wine cellar in Switzerland.
They talk with their grandkids.
You know, it's clearly like a real friendship.
And as to the question of why Hagelin does it.
I mean, he doesn't seem to have any qualms about it.
I mean, Hagelin does say he's grateful to the NSA for what they've done for memorandum.
members of his family, which looks like intervening to ensure a son-in-law had his active duty
status in the Air Force retained, and a cousin of Hagelin's wife being employed at the NSA.
It's a little favours, but he's not doing it for the money or for something big.
So it looks like he is doing it for belief and for friendship, you know, that he's willing to go
along with this.
But in a way, that's also the weakness of the operation.
Because in 1955, Friedman is actually going to suffer a heart attack after he visits
Hagelin and Cryptoag's manufacturing plant in Switzerland.
and he's going to start thinking about retiring.
And he and Elizabeth, you know, they want to go back to working on medieval and early modern codes together.
That's their plan.
That's the retirement idea in the Friedman family is go look for codes in Shakespeare.
Although he's still going to kind of stay friends with Hagelin for all the years.
And, you know, they stay friends after Friedman does retire, which actually I think does show this is a genuine friendship.
It's not just Friedman doing it because he's been told to do it or it's a kind of operational tasking.
But Friedman's relationship with the NSA is also slightly breaking down.
He's a bit marginalised.
He's a bit left out in the new world of kind of computers.
He's being put out to pasture, you know, when he's retiring.
He's kind of working at home on contract.
The NSA view him as a little bit of a security risk because he's semi-public.
And the NSA is getting less sure it wants to be in this game.
It prefers to break codes with supercomputers rather than deal with people, which I think is
interesting, isn't it?
I was struck by this.
I mean, why do you think NSA was ambivalent in this period?
And we're talking about the, you know, late 50s, early 60s as both of these men are starting
to get on in age and Friedman is being a bit put out to pasture.
You know, he's still, I guess, working on a contract with the NSA and hanging around,
but he's not there anymore formally.
I mean, it just seems given the value of the product.
I'm struck by the NSA's ambivalence there.
I mean, what do you?
It's got to be a bit more than just we want to sit behind our computers all day.
I mean, what's driving that?
It's interesting.
I mean, I've been into the NSA, and it is a super secret organization.
I think they are an organization, which now they've opened up a bit, hence the fact that I've been in as a journalist to interview people.
But, you know, in the past, in the Cold War, I think the NSA was known as no such agency, wasn't it?
Because everyone kind of basically denied it even existed.
And I think they were so obsessed with secrecy.
for lots of good reasons, that I think anything which threatened that secrecy or the truth
about code breaking or what they did, I think they felt was a bit dangerous.
And I think they felt maybe it was like Friedman's project.
I find it interesting that they seem to be reluctant to do it.
But, as we'll see, the NSA's reluctance opens the way for another intelligence agency to get
in the game.
And who might that be, Gordon?
Who might that be?
Here we go.
Here we go.
The CIA.
Oh, thank God.
A new player has entered the game.
That's right.
Hello, CIA.
You were waiting for that, weren't you?
I was.
I was.
I do think it makes sense, though, because the management of this program is going to come down to how you sort of liaise with and help run this company and strike arrangements with executives in the company.
And as we'll see, you know, if you try to scale this thing, you know,
up, which happens over the course of the 60s, 70s, and 80s, it's going to be more complicated
and there's going to need to be more people involved, like chief scientific advisors on
crypto AG staff, like you're going to need more than just one person who's really in the
know. And that's going to involve relationship management and asset and agent handling.
And I think it does make some sense from that standpoint for the CIA to be involved.
By the 60s, the CIA is kind of offering Hagelin a license.
agreement to pay him to kind of basically formalise the deal. And they're going to pay him
$70,000 a year in a retainer and give the company cash for marketing. So they're starting
a kind of relationship with him. But as we'll see, this is going to be just the start of a
much deeper, much more interesting relationship. As Friedman leaves the scene in the 60s and
retires, but you've also got this second problem, which is Boris Hagelin. The other half of the
friendship is also planning to retire.
He's grooming his son to take over, but here's the problem. His son knows nothing of the secret
deal. That, Gordon, sounds like a cliffhanger to me because we've got a succession crisis looming
inside crypto AG. And if that's not enough to wet your whistle, there's going to be a mysterious
death in Washington and the arrival in the scene of the Germans who are going to play a critical
role in this story. But Gordon, why wait to get that next episode, right? You can get it right now
by going to The Rest Is Classified.com and becoming a member of the Declassified Club.
Get early access to all of our series and wonderful bonus content like that. Boozy live stream
we just did. We hope you join and we'll see you next time. See you next time.
Thank you.
