Spycraft - Melton [256]
Specialized subminiature cameras developed by OTS to photograph documents stored in a target’s filing cabinet were of limited value when computer networks became the repositories for secrets. Gosler noted, “Clandestine photography is rapidly yielding to sophisticated technical operations that exploit these networks. Spies with authorized access to these networks—an insider—can exfiltrate more than one million pages of sensitive material inside a microelectronic memory device easily concealed within a watch, an ink pen, or even a hearing aid.”7
Examples of the rapid obsolescence of Cold War collection devices can be found in some OTS equipment developed in the 1970s to support CIA agent Kuklinski in Poland, who had access to the Soviet war plans. Over the course of nine years, Kuklinski secretly photographed more than 25,000 pages of classified Soviet and Polish military planning and capabilities documents.8 OTS supplied technology for the operation that included disguises, concealment devices, subminiature cameras, suicide pills, and covert communication devices.9 Today, the technology for most of Kuklinski’s communications and specialized camera equipment is obsolete and the secret documents he photographed and dead-dropped to his case officer would likely be imaged, transmitted, and disseminated in electronic form.10
The digital revolution did not alter the CIA’s goal of clandestine collection of adversaries’ secret plans and intentions. However, the role of agents fundamentally shifted from a spy who is supported by clandestine technology to the spy who supports a clandestine technical operation.11 Spy gear had to adjust to the needs of the agent who would become an infiltrator and compromiser of computer networks rather than a reporter of information. In a sense, the technology, just like an agent, would be “recruited” to spy.
Legendary criminal Willie Sutton was once asked why he robbed banks. He responded, “Because that’s where the money is.” While some money remains in brick-and-mortar banks, the “mother lode” of wealth is now found in the financial cyberworld. The criminal skills and tools, and tradecraft possessed by a Sutton would be of little value in robbing a cyberbank. The same is true for intelligence collection. Over time, the location and form of secret information changed. Correspondingly, the skills, tools, partnerships, and culture of tradecraft have been forced to evolve.12
To uncover another country’s military, political, or economic secrets, targeting an opponent’s information technology can be exponentially more valuable than stealing paper documents. Thanks to new digital technologies, the covert transfer of vast amounts of information, or clandestine attacks on enemy networks no longer requires a physical presence, and can often be conducted remotely from anywhere on the globe using the Internet.13
Regardless of the era, sound tradecraft has always employed the best available technologies to support clandestine activities. While espionage goals and objectives remain constant, global access to digital systems and information altered time-honored methods and techniques of spying. Emerging information technologies also allowed traditional tradecraft to be applied in new ways.
The Internet and the global availability of personal database information makes the spotting of individuals with potential susceptibility to recruitment independent of geography or personal engagement. Using the Internet for assessment and as a spotting tool, intelligence services can focus on a smaller pool of potential recruits. Profession and position often indicates access to sensitive information and vulnerabilities are revealed by Internet communications and search habits.
Digital ink never fades and “private” thoughts and comments expressed in obscure publications reside permanently on the Internet as searchable public