How can you protect a secret? Keep it on a need-to-know basis? Encrypt it? Run the shower when you discuss it? You may know these tactics from television and movies, but what’s the reality?
In this absorbing series, intelligence experts and historians explore how secrets are safeguarded and stolen. They cover collection operations and counter tactics from the Cold War to today, ranging from organized campaigns by one country against another, to systems turned against citizens, and even to solo 21st-century hackers with an agenda.
FEB 7 Cold War Codebreaking
Codes and ciphers are built for protecting secrets. The National Security Agency was built to break them. How did the NSA come to be and how did its cryptanalysts crack some of the most complicated codes of the twentieth century? Stephen Budiansky, author of Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union, traces the history of the agency and its remarkable successes and destructive failures during the Cold War when the USSR was the ultimate target.
FEB 14 The Berlin Tunnel
In 1954, while thousands were fleeing communist East Berlin, American and British intelligence officers were tunneling in. Working with Britain’s MI6 and U.S. and British army engineers, the CIA dug a tunnel into the Soviet sector of Berlin. The goal? Tapping Soviet military and intelligence communications cables. Steve Vogel, author of the upcoming book Diamond and Gold: George Blake, the Berlin Tunnel and an Epic Tale of Cold War Espionage, reveals the remarkable story behind the tunnel’s clandestine construction, its betrayal by the notorious British spy George Blake, and the truth about the effectiveness of this audacious project.
FEB 21 Every Citizen a Target?
The East German Ministry for State Security, the Stasi, was one of the most effective and feared spy agencies in history. Infamous for spying on its own citizens using informants, it also developed little-known eavesdropping technology to spy abroad against espionage targets. Kristie Macrakis, author of Seduced by Secrets: Inside the Stasi’s Spy-Tech World, reveals the true story behind the headlines.
FEB 28 Listening In
While new technology provides incredible convenience, it also creates new threats to security, as evidenced when North Korean hackers destroyed networks at Sony Pictures to retaliate for a film that mocked the country’s leader, and Russian cyberattackers leaked DNC emails in an attempt to sway the U.S. election. Our digital networks—personal, business, and government—are all vulnerable. How can we individually and as a country protect ourselves? Cybersecurity expert and former Google privacy analyst Susan Landau explores the issues and challenges of digital security and ideas for how to maintain security in an insecure age.
Photo caption (above): Section of the International Spy Museum’s former War of the Spies exhibit detailing the Berlin Tunnel (International Spy Museum)