Logo

    75: Compromised Comms

    Between 2009 and 2013, the CIA's communication channels were compromised, leading to catastrophic consequences for their assets in foreign countries. Guests Jenna McLaughlin and Zach Dorfman appear on this episode.

    en-usSeptember 29, 2020
    1
    Darknet Diaries

    150 Episodes

    Who was Aldrich Ames and what did he do?
    What motivated Ames to betray his fellow agents?
    How does the CIA communicate with assets in Iran?
    What roles do various people play in CIA espionage?
    What were the consequences of intelligence failures mentioned?

    • The Consequences of Espionage and Information LeaksTrust and integrity are crucial in intelligence agencies, as shown by the betrayal of fellow agents by Aldrich Ames and the Iranian mole hunt. Greed and desire for money can lead to disastrous real-world consequences.

      The story of Aldrich Ames, a CIA officer who became a spy for the Russians by offering information initially for money but eventually ended up betraying his fellow agents leading to their deaths. The story highlights how greed and a desire for money led Ames to abuse his position of trust. Similarly, in the case of the Iranian mole hunt, officials were looking for a mole who leaked information to American officials using their sources. These stories reveal how espionage and information leaks can have real-world consequences, and trust and integrity are critical in intelligence agencies, and the consequences of their absence can be severe.

    • CIA Spying Strategies in IranThe CIA operates in Iran through covert means, recruiting agents and assets outside of the country. Communication is done through secret websites and end-to-end encryption messaging apps, with the CIA disguising websites according to an agent's interests. The different people involved in CIA spying have specific roles to gather information and maintain secrecy.

      The CIA spies on Iran through recruiting and handling people outside of the country due to the absence of American diplomatic facilities in Iran. The CIA sends and receives information through a super-secret website that looks like one thing but is actually a CIA back channel. Agents communicate with their assets inside Iran through covert communications that require them to download end-to-end encryption messaging apps. The CIA disguises the websites as something else based on an agent's interests, like a yoga website or book website. The different types of people involved in CIA spying include agents, agent handlers, analysts, assets, sources, and targeting officers. Overall, the CIA's espionage activities in Iran require various roles and strategies to gather information and maintain secrecy.

    • The Consequences of Ignoring Whistleblowers in Intelligence OperationsListening to and addressing concerns raised by whistleblowers is critical for any organization's security and success. Failure to do so can have severe, far-reaching consequences.

      The CIA's covert communication system had flaws which were identified by a whistleblower named John Reidy, but they were not taken seriously. This resulted in a double agent in Iran having access to multiple covert CIA communication channels, which allowed Iran to uncover a vast network of sources within their country and abroad. Iran then used the information gathered to trail and surveil CIA agents and their handlers. This emphasizes the need for organizations to take whistleblowers seriously and address potential flaws in their systems, as failure to do so can result in disastrous consequences.

    • The Catastrophic Impact of Sharing Counterintelligence InformationSharing sensitive counterintelligence information requires a high degree of trust and caution, as it can lead to severe consequences, including the loss of lives and significant damage to global operations.

      The discovery of a double-agent and sharing of counterintelligence information by Iran led to the capture, imprisonment, and killing of dozens of CIA assets and agents worldwide. Iran shared this information with their allies and adversaries, including China, which resulted in the death of several sources in China as well. The impact of this catastrophe was severe, affecting nearly 70% of the CIA's global operations, and the extent of its reach is still unknown. This event raises questions about why it was not considered an act of war and why it was not made public at the time. The tragedy underscores the importance of counterintelligence and the high degree of trust required in sharing such information.

    • The Secretive Operations and Intelligence Failures of the CIAThe CIA operates in secrecy, making it difficult to obtain information on its operations, and intelligence failures can have deadly consequences, as seen in the case of compromised informants and agents.

      The CIA operates in secrecy, and it is hard to get information on its operations, including investigations into intelligence failures. There were news articles about the killing of CIA informants by China and possibly Iran, but the US government did not publicly acknowledge the situation or indict the officials responsible. The former House Intel Chair, Mike Rogers, disclosed that he investigated a communication blip within the CIA and helped fix the problem. The investigation had to be kept confidential, as any public disclosure could further reveal the CIA's sources and agents. A former CIA officer, Jerry Chun Shing Lee, was arrested on charges of mishandling classified information, including names and contact information of CIA informants and agents in China. The technical problems and possible mole caused many sources to be identified and killed, leading to much debate and study about which failures were more to blame.

    • The CIA's Covert Communication System: A Security Concern.The intelligence community heavily relies on technology to communicate with sources, but the lack of secure systems and insufficient whistleblower protection measures create serious concerns that need to be addressed through public scrutiny.

      The intelligence community uses technology to communicate with sources, but the CIA's covert communication system was not secure. The system was relied upon so heavily for contact with sources that there needs to be a significant reevaluation of that process. In addition, there are not enough defenses for contractors in the intelligence community to be able to lodge complaints of retaliation, as seen with the whistleblower John Reidy's story. Even five years later, the issue continues to plague the agency, and there are still unanswered questions in the story. The CIA doesn't want the spotlight on them, but there needs to be a public exploration of the way that the intelligence community is using its technology.

    Was this summary helpful?

    Recent Episodes from Darknet Diaries

    150: mobman 2

    150: mobman 2
    Re-examining Episode 20 of Darknet Diaries, exploring doubts about Greg aka 'mobman' claiming to create sub7 malware.
    Darknet Diaries
    en-usOctober 01, 2024

    148: Dubsnatch

    148: Dubsnatch
    Story of daring teens pursuing unreleased dubstep music, revealing their audacious tactics to sneak a peek before others.
    Darknet Diaries
    en-usAugust 06, 2024

    147: Tornado

    147: Tornado
    In this podcast, Geoff White discusses the digital heist of Axie Infinity and Tornado Cash, revealing how cryptocurrencies were manipulated for money laundering, details from his book 'Rinsed'.
    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Secure Digital Life #7 - WikiLeaks

    Secure Digital Life #7 - WikiLeaks

    Is your TV watching you? Is your phone calling you? Doug and Russ talk about secret CIA hacking toolkits and how WikiLeaks opens the secret vault and reveals all kinds of creepy tools used to spy on anyone and everyone.

    Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/SDLEpisode7
    Twitter: https://twitter.com/securediglife
    SoundCloud: https://soundcloud.com/securediglife

    The Self-Discipline Lie

    The Self-Discipline Lie

    Human nature drives you whether you like it or not. And the secret sauce to success comes when you stop fighting nature and learn to make it work for you instead. In this episode, Andrew shares a secret known only to Tier 1 operators, athletes, and soldiers; a secret that you can use to master your everyday life to win massive success. 

    EDSAVAGE Lethal Lady Part III

    EDSAVAGE Lethal Lady Part III

    It's not easy to be friends with a spy. We are constantly pushing, striving, and working to take action. We thrive on action and control. In this episode, Andrew and EDSAVAGE explore how action and control define a person's legacy. And along the way, they compete to take control of the current conversation. Friends and competitors, Andrew and EDSAVAGE believe in legacy building. And they know you do too...

    Logo

    © 2024 Podcastworld. All rights reserved

    Company

    Pricing

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io