Why We Shouldn't Underestimate This Spy Network

Johnny Harris
16 Aug 202326:31

Summary

TLDRThis video script uncovers the secretive world of undersea cables and their pivotal role in global communication and espionage. It delves into the history of cable tapping by powers like the U.S. and U.K., the evolution of surveillance through programs revealed by Edward Snowden, and the current geopolitical tensions as nations like China and Russia vie for control over internet infrastructure. The narrative highlights the balance between connectivity and privacy, and the emerging challenges in a bifurcated digital world.

Takeaways

  • 🏠 The script describes a seemingly ordinary house in New Jersey that is actually a large building disguised as a house, serving as a landing station for AT&T's undersea cables.
  • 🔍 It is revealed that the U.S. government spies on undersea cables with the help of companies like AT&T, processing the collected data in a facility potentially located in New Jersey, known as Pinecone.
  • đŸ—ș Leaked NSA documents and investigative reporting have uncovered the locations of several hidden buildings across the U.S. that are involved in cable surveillance, blending in as nondescript structures in major cities.
  • 🌐 The script discusses the vast amount of data contained in the undersea cables that connect the world, and the seemingly impossible task for any government agency to spy on it all, yet there is proof that they do.
  • 📈 The video mentions the history of undersea cables, starting with the first copper cable laid across the Atlantic in 1858, and the exponential growth in data transmission capabilities over time.
  • đŸ› ïž The script details various ways in which cables have been used for espionage, including tapping into enemy communication during wars and the sophisticated methods used by the U.S. and UK to intercept and decode messages.
  • 💡 The video highlights the importance of metadata in modern warfare and surveillance, with the ability to access and analyze vast amounts of data to identify and track targets.
  • 🔑 The script introduces XKeyscore, an internal search engine used by the NSA to catalog and search metadata, making it a powerful tool for intelligence agencies.
  • 🌐 The video discusses the global implications of the Snowden leaks, which led to countries seeking alternative cable routes to bypass the U.S., and the emerging competition between the U.S. and China in building out their own cable networks.
  • 🛑 The script mentions the formation of Team Telecom by the U.S. to assess and regulate new cable projects to ensure they do not threaten U.S. interests, reflecting growing concerns over data security.
  • 🌊 The video concludes with a discussion on the changing landscape of global cable infrastructure, with nations becoming more distrustful and seeking to control their own internet and communication systems, leading to a bifurcated world.

Q & A

  • What is the significance of the building disguised as a house in New Jersey?

    -The building disguised as a house in New Jersey is significant because it is actually a large, secretive building that serves as a landing station for AT&T, where massive undersea cables connecting the world hit the eastern seaboard. It is believed to be one of the facilities where the U.S. government spies on these cables with the help of companies like AT&T.

  • What is Pinecone, and what role does it play according to the leaked NSA map?

    -Pinecone is a code name for a facility in New Jersey where, according to a leaked NSA map, the U.S. government processes all the data they collect from spying on undersea cables. The facility is suspected to be the disguised building mentioned in the script.

  • How do cable spy facilities blend in with their surroundings?

    -Cable spy facilities blend in with their surroundings by appearing as benign, nondescript buildings such as ordinary suburban homes or fake houses. This helps them avoid undue attention in cities like New York, San Francisco, or Dallas.

  • What is the purpose of the undersea cables mentioned in the script?

    -The undersea cables mentioned in the script are crucial for global communication as they connect different parts of the world, transferring an unfathomable amount of data that includes all our communications and connections.

  • How did the revelations from Edward Snowden impact the understanding of cable surveillance?

    -The revelations from Edward Snowden exposed the extent of cable surveillance by the NSA, showing that they were tapping into every single cable that touched the United States, collecting a massive amount of global traffic including emails, text messages, and phone calls.

  • What is the role of Incogni as mentioned in the video script?

    -Incogni is a service that focuses on data privacy. It helps individuals remove their personal information from marketing lists and secure their privacy by taking them off as many lists as possible. The service also helps users to opt-out of people search sites.

  • What historical significance do undersea cables have in terms of communication?

    -Undersea cables have a significant historical role in communication. The first copper cable was laid across the Atlantic Ocean in 1858, connecting Ireland to Canada, and revolutionizing communication by enabling telegraph messages to be sent across the world.

  • How are undersea cables sometimes disrupted?

    -Undersea cables can be disrupted in various ways, including accidental damage from fishing trawlers, anchors, or natural disasters. There have also been instances of intentional sabotage, such as during times of war or political tension.

  • What is the significance of the USS Halibut and its role in cable tapping?

    -The USS Halibut was a spy submarine used by the U.S. during the Cold War. It had a unique capability to send divers in a pressurized chamber to tap into underwater cables and record communications, providing valuable intelligence on Soviet officials.

  • How has the surveillance landscape changed after the Snowden leaks?

    -After the Snowden leaks, there has been a shift in the surveillance landscape. Countries started looking for alternative routes for their cables that bypass the United States, and there has been an increase in the development of separate communication systems by different nations.

  • What is the role of Team Telecom in the context of cable surveillance?

    -Team Telecom is a U.S. group formed to assess new projects and cables to ensure they do not threaten or weaken U.S. interests. They have the authority to shut down projects that pose a risk, such as a cable project connecting LA to Hong Kong that was deemed too close to China.

Outlines

00:00

🏠 The Secret AT&T Building in New Jersey

This paragraph introduces a seemingly ordinary house in New Jersey that is actually a large building disguised as a residence. It serves as a landing station for AT&T, where undersea cables connecting the world reach the eastern seaboard of the U.S. The script reveals that the U.S. government spies on these cables with AT&T's help, and the data is processed in a secretive facility called Pinecone. The paragraph also mentions the existence of similar hidden buildings across the country, known through NSA leaks and investigative journalism.

05:00

🌐 The Global Web of Undersea Cables

The second paragraph delves into the extensive network of undersea cables that span 1.4 million kilometers, facilitating global communication. It discusses the speed at which these cables transmit data, the industry dedicated to their maintenance, and the various threats they face, including accidental damage and intentional sabotage. The paragraph highlights the strategic importance of these cables, as evidenced by historical incidents and the potential for espionage through cable tapping.

10:03

🔍 Historical Cable Tapping and Surveillance

This section explores the history of cable tapping for espionage, from World War I to the Cold War. It describes the British Navy's tapping of German submarine cables and the U.S. surveillance during World War II and the Cold War. The paragraph details the evolution of surveillance tactics, including the use of spy submarines like the USS Halibut, and the significant intelligence gains made through these operations, such as insights into the Soviet Union's fears regarding nuclear weapons.

15:06

📑 NSA's Digital Surveillance Post-9/11

The fourth paragraph discusses the post-9/11 era and the USA Patriot Act, which expanded surveillance capabilities. It reveals that the NSA, in cooperation with AT&T and other tech companies, tapped into fiber optic cables and collected massive amounts of data. The paragraph also covers Edward Snowden's leaks, which exposed the extent of the NSA's global surveillance network, including a list of targeted cables and the goal to 'collect it all'.

20:10

đŸ€– Data Processing and the Role of Metadata

This paragraph explains the process of how the NSA handles the vast amounts of collected data. It describes the central processing facility called Pinecone and the searchable database XKeyscore, which allows the agency to find patterns and track individuals. The paragraph emphasizes the transformation of metadata into a powerful tool for intelligence gathering and the potential implications of this mass surveillance.

25:10

🌍 Geopolitical Tensions and the Future of Cables

The final paragraph examines the geopolitical implications of cable surveillance and control. It discusses the shift in cable routes to bypass the U.S. after the Snowden leaks, the rise of China in building its own global cable network, and the emerging tensions between the U.S., China, and other powers. The paragraph also touches on the private sector's response to these threats and the broader implications for global internet infrastructure and security.

📚 Supporting Independent Journalism

In the closing paragraph, the script shifts focus to the importance of supporting independent journalism in an era where facts and truth are being challenged. It invites viewers to join a Patreon community called the Newsroom, which offers behind-the-scenes content and other benefits. The paragraph also mentions other ways to support the channel, such as purchasing LUTs, presets, and posters, and expresses gratitude for the viewers' engagement and support.

🌌 The Universal Language of Cables

The concluding narrative reflects on the symbolic language of cables as a means of fostering friendship and cooperation among nations. It highlights the collaborative efforts of France, West Germany, England, and the United States in developing the transcontinental cable, emphasizing the unifying potential of this technology beyond its practical applications.

Mindmap

Keywords

💡Surveillance

Surveillance refers to the close observation of individuals or groups, often for the purpose of gathering information. In the context of the video, it is a key concept as it discusses the U.S. government's spying activities on undersea cables with the help of companies like AT&T. The script mentions a secretive building in New Jersey, which is suspected to be a surveillance facility called Pinecone, where data collected from the cables is processed.

💡Undersea Cables

Undersea cables are the physical infrastructure that lies beneath the ocean and facilitates global communication by transmitting data across continents. They are crucial for the internet and international communications. The video script highlights the role of these cables in connecting the world and how they have become a target for government surveillance, with the NSA and GCHQ tapping into them to collect data.

💡Mass Surveillance

Mass surveillance is the bulk collection and analysis of information about individuals or groups, often without their knowledge. The video discusses how mass surveillance was institutionalized during times of war and has continued in the digital age with agencies like the NSA collecting data from undersea cables. The script mentions the NSA's goal to 'collect it all, exploit it all,' indicating the scale of mass surveillance.

💡Data Privacy

Data privacy concerns the right of individuals to have control over their personally identifiable information. The video script introduces Incogni, a service interested in data privacy, which helps individuals remove their information from marketing lists and people search sites. This is relevant as it contrasts with the government's mass surveillance practices and highlights the commercial aspect of data collection.

💡Telecommunication Companies

Telecommunication companies are businesses that provide services related to the transmission of information by various means, including voice, data, and video. The script mentions companies like AT&T, Microsoft, and Google as being complicit in government surveillance by allowing agencies like the NSA to tap into their cables and access the data transmitted through them.

💡Pinecone

Pinecone is mentioned in the script as a facility in New Jersey where the NSA is believed to process data collected from undersea cables. It is used as an example of the secretive nature of surveillance operations and the infrastructure that supports mass data collection and analysis.

💡Cold War

The Cold War refers to the period of geopolitical tension between the Soviet Union and the United States and their respective allies, from the late 1940s to the early 1990s. The video script discusses how the Cold War intensified spying activities, with underwater cables becoming a target for espionage, leading to operations like Operation Ivy Bells.

💡National Security Agency (NSA)

The National Security Agency (NSA) is a U.S. government agency responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes. The script describes the NSA's extensive surveillance activities, including its access to and monitoring of undersea cables, and its partnership with telecommunication companies.

💡Edward Snowden

Edward Snowden is a former NSA contractor who leaked thousands of classified documents to the public, revealing the extent of global surveillance programs. The video script refers to Snowden's leak as one of the biggest in American history, which exposed the NSA's surveillance activities and its access to data from various communication channels.

💡Metadata

Metadata is data that provides information about other data. In the context of the video, it refers to the digital information that can be extracted from communication, such as the time and date of a call or email, the parties involved, and the location from which the communication was made. The script explains that metadata is used by surveillance agencies to track and analyze communication patterns, turning it into a tool for intelligence gathering.

💡XKeyscore

XKeyscore is an internal NSA search engine that catalogs metadata and makes it searchable for the agency's analysts. The video script describes XKeyscore as a platform that allows the NSA to search through the vast amounts of collected data, enabling them to find information on individuals, such as their communication patterns and geolocation.

Highlights

A secretive building in New Jersey disguised as a house is actually a landing station for AT&T, part of the global undersea cable network.

The U.S. government collaborates with companies like AT&T to spy on the massive undersea cables that connect the world.

A leaked NSA map suggests the existence of a facility in New Jersey called Pinecone, where collected data is processed.

Investigative reporting and NSA leaks have revealed the locations of hidden cable spy facilities across the U.S.

Undersea cables carry an unfathomable amount of data, including all global communications, making them a prime target for surveillance.

The story of the cables that connect the planet reveals extensive surveillance activities by governments.

Incogni, a sponsor of the video, is a service focused on data privacy, helping individuals remove their information from marketing lists.

For-profit corporations are also involved in spying on individuals to sell their data for targeted marketing.

The first transatlantic copper cable was laid in 1858, revolutionizing global communication.

Today, there are 1.4 million kilometers of undersea cables transferring massive amounts of data at high speeds.

The industry of laying, monitoring, and repairing undersea cables is significant, as they can be damaged by various means.

Political tensions can lead to deliberate damage to communication cables, as seen between China and Taiwan.

During times of war, cutting enemy communication cables has been a strategic move, from the American Civil War to modern conflicts.

Access to submarine cables allows for signal duplication and eavesdropping on enemy communications.

Operation Ivy Bells was a decade-long U.S. mission to tap Soviet communication cables for intelligence.

The NSA's mass surveillance programs, revealed by Edward Snowden, included tapping into global internet and communication traffic.

Telecommunication and tech companies cooperated with the NSA, providing access to their cables for surveillance purposes.

The NSA's goal was to collect, process, and exploit all global communication data, as revealed by leaked documents.

The NSA uses central processing facilities and algorithms to analyze communication data and identify potential threats.

XKeyscore is an internal search engine used by the NSA to catalog and search metadata from global communications.

The Snowden leaks have led to a shift in global cable routes, with countries seeking alternatives to bypass the U.S. for privacy.

China is expanding its global cable network, adding a new dimension to the competition for information control.

The U.S. and China are building separate cable networks, reflecting the growing mistrust and division in global communication infrastructure.

Team Telecom, a U.S. group, assesses new cable projects to ensure they do not threaten U.S. interests or security.

Private companies are increasing security measures for undersea cables, using submarine drones to monitor and protect them.

The video concludes on the note that we are entering a new era of geopolitics with nations seeking control over their communication infrastructure.

Transcripts

play00:00

(dramatic music)

play00:04

- There's this house in this neighborhood in New Jersey

play00:07

that actually isn't a house.

play00:09

It's hard to see, because it's behind this gate,

play00:11

but if you look at it from above,

play00:13

you'll see that it's actually a really large building.

play00:15

Kind of looks like a warehouse.

play00:17

It has dozens of air conditioning units

play00:19

and it's just sitting here among a sea

play00:21

of ordinary suburban homes.

play00:24

All of this is just a facade hiding this massive building

play00:28

that is a landing station for AT&T,

play00:31

the place where these massive undersea cables

play00:33

that connect the world, hit the eastern seaboard.

play00:36

(suspenseful music)

play00:40

We now know for certain that the U.S. government

play00:42

spies on those cables with the help of companies like AT&T.

play00:46

And according to a leaked map from the NSA,

play00:49

they process all the data that they collect

play00:51

somewhere in New Jersey in a facility called Pinecone.

play00:55

Lining up these maps points to this

play00:58

secretive disguised building as one of the best candidates

play01:01

for where this surveillance is being processed.

play01:04

But there's a lot more of these hidden buildings

play01:06

around the country.

play01:07

Thanks to leaked NSA documents

play01:09

and some thorough investigative reporting,

play01:11

we now know some of their locations.

play01:13

Like the fake house in New Jersey,

play01:14

these other cable spy facilities blend in

play01:17

as benign, nondescript buildings

play01:19

avoiding any undue attention

play01:21

along the streets of New York or San Francisco or Dallas.

play01:26

These few hundred cables that connect our world

play01:29

contain an unfathomable amount of data,

play01:31

all of our communication, all of our connections,

play01:34

and it would seem impossible that any government agency

play01:37

would be able to spy on it all,

play01:39

impossible, that is, if we didn't have solid proof

play01:42

that they do.

play01:45

So let me tell you the story of the cables

play01:47

that connect our planet

play01:49

and show you that if you can tap into them,

play01:52

you can watch the world and they have,

play01:55

and they've been doing it for a long time.

play01:57

- [Reporter 1] 320 million records every day.

play01:59

- [Reporter 2] What we're talking about here

play02:01

is a total revolution

play02:02

of the whole concept of war. - Collect it all,

play02:06

exploit it all.

play02:07

(TV static)

play02:10

- Now is the moment where I say thank you to the sponsor

play02:13

of today's video.

play02:14

I'm very grateful for sponsors.

play02:15

I wouldn't be able to do this job

play02:17

and make independent journalism if we didn't have sponsors.

play02:20

So thank you Incogni for sponsoring today's video.

play02:22

Incogni is actually quite relevant to today's video,

play02:25

because Incogni is super-interested in data privacy.

play02:29

We live in a world

play02:30

where there's an entire secretive industry

play02:32

dedicated to collecting information about you

play02:34

and no, this isn't the NSA spying on you.

play02:36

This is for-profit corporations who spy on you

play02:39

in any way they can, so they can sell that

play02:42

to other companies who can then market to you,

play02:44

who can into your phone, who can try to make you buy things.

play02:48

I find this incredibly frustrating and violating

play02:51

that my personal information is bought and sold

play02:54

on an open market.

play02:55

Luckily, we have rights to make this not happen.

play02:57

The problem is the process of making it not happen

play03:00

is very complicated and this gets me to Incogni.

play03:04

Incogni is a service that does this for you.

play03:07

You sign up for Incogni and you give them permission

play03:09

to go out into the world on your behalf

play03:10

and take you off as many lists as they can.

play03:14

The first thing they do, and this is very satisfying,

play03:16

is they scan to see all of the lists that you're on

play03:19

and they show it to you on this really nice dashboard

play03:21

so you can see, oh my God,

play03:22

I'm on dozens if not hundreds of these marketing lists.

play03:25

And then they start the process of securing your privacy,

play03:29

of getting your email and your address and your phone number

play03:32

off these lists.

play03:33

It's a process and Incogni will keep you updated

play03:35

on the progress.

play03:37

They even have a tally of all of the lists

play03:40

that you've been removed from,

play03:41

which is insanely satisfying to keep an eye on.

play03:44

Because of Incogni, I learned that here in the U.S.

play03:47

there's this other massive problem,

play03:48

which are these people search sites

play03:50

where you can search for people and it will pull up

play03:52

as much information as the site has on you.

play03:55

I don't like that.

play03:56

Incogni sniffed this out for me

play03:58

and is taking me off of these lists.

play04:01

Thank you, Incogni, I'm very grateful for it.

play04:03

So there's a link in my description.

play04:04

It's incogni.com/Johnny Harris and you can go over

play04:07

sign up for Incogni and try it out for 30 days

play04:09

and get a full refund if you don't think it's useful,

play04:11

totally risk-free.

play04:12

I'm really grateful to Incogni

play04:14

for sponsoring our journalism in this video,

play04:17

but I'm also grateful that they exist,

play04:18

because I am so tired of my inbox and my phone

play04:22

and my mailbox being full of garbage.

play04:25

Okay, with that we're jumping back into the video

play04:27

about the government version of collecting your data.

play04:31

(videotape clicks)

play04:32

We laid the first copper cable

play04:33

across the Atlantic Ocean in 1858.

play04:36

It connected Ireland to Canada.

play04:38

They sent the first telegram across this wire

play04:40

and it took 18 hours to arrive,

play04:42

which was like light-speed back then.

play04:44

The cable broke three weeks later, but even still,

play04:47

it was a huge success,

play04:49

a revolution for a world whose progress hinged on

play04:52

being more and more connected.

play04:54

- [Narrator] Through a single cable,

play04:54

only an inch and a quarter thick,

play04:57

which lies on the ocean bed.

play04:58

- [Johnny] The planet would be linked up

play05:00

by many more of these cables

play05:02

draped along the ocean floor,

play05:03

allowing us to call people across the world

play05:06

and eventually allowing us to access information

play05:09

through webpages hosted on servers far, far away.

play05:13

- An online network called internet.

play05:15

- Today, there are 1.4 million kilometers worth of cables

play05:20

linking us all up and they transfer a ton of data,

play05:23

like the fastest cables can transfer

play05:25

224 terabytes per second,

play05:27

and the amount of data being sent around the world doubles

play05:30

every two to three years.

play05:33

Unsurprisingly, there's a whole industry

play05:36

dedicated to just laying down these cables

play05:38

and then monitoring them and repairing them

play05:40

when they break.

play05:42

Sometimes they get broken by fishing trawlers or anchors

play05:45

or natural disasters.

play05:47

Sometimes they even get broken by sharks,

play05:49

though that's pretty rare,

play05:50

but sometimes these cables are broken on purpose.

play05:54

There's this island right off the coast of China,

play05:56

but it technically belongs to Taiwan,

play05:58

the country that China has vowed to eventually absorb

play06:02

into their own.

play06:02

Needless to say, there's a lot of tension here

play06:05

and in the last five years,

play06:06

the cables of this little island

play06:08

have accidentally been broken 27 times,

play06:12

which is a lot for cables.

play06:14

China denies that they had any part in these 27 accidents.

play06:18

They say it's just an unfortunate fishing

play06:20

or anchor incident, but I'm suspicious.

play06:23

- [Reporter 3] Officials fear that Matsu is just a warning

play06:26

and that internet connections to the whole of Taiwan

play06:29

could be under threat.

play06:30

- Sometimes it's unclear who attacks these cables.

play06:33

Like a few years ago when somebody ripped out

play06:36

a two and a half mile piece of this cable

play06:38

that connects Norway to the island of Svalbard.

play06:41

Other times it's very clear who's cutting the cables.

play06:43

Like when the United States was at war with Saddam Hussein

play06:46

in the nineties and they cut Saddam's cable

play06:48

so that he couldn't communicate.

play06:52

I mean, cutting the communication cables of your enemy

play06:55

is an old strategy.

play06:56

They were doing that way back in the American Civil War,

play06:59

but the more interesting approach to me isn't just sabotage.

play07:03

There's another way that you can use cables

play07:05

to your advantage if you are a great power

play07:08

trying to control things.

play07:10

(electronic music)

play07:12

If you have access to submarine cables,

play07:14

which governments and militaries do,

play07:16

you can scrape through the insulation of this cable.

play07:20

You can splice in another cable

play07:22

and you can duplicate the signal

play07:24

and hear everything your enemy is saying.

play07:26

(people speaking in foreign language)

play07:31

The British Navy did this to a German submarine cable

play07:34

out here in the middle of the Atlantic, during World War I.

play07:37

The Germans suspected that they were being listened to,

play07:39

so they sent all their communication as complex codes,

play07:42

but the British had very smart code breakers

play07:45

and they were able to decrypt all of this

play07:48

and discover a lot of Germany's secrets,

play07:49

and they discovered this secret plan that Germany had

play07:52

to ally with Mexico and invade the United States.

play07:56

This is one reason why the U.S. ended up joining the war,

play07:58

and it all happened because of submarine cable tapping.

play08:01

(uptempo beat music)

play08:03

World War II took cable tapping to a whole new level.

play08:06

A more connected world meant more opportunities

play08:09

for vital military information to leak out.

play08:12

So the U.S. created a new agency

play08:14

where they would tap in and monitor

play08:15

hundreds of thousands of civilian telegrams and phone calls

play08:19

flowing through both the mail,

play08:21

but also through these submarine cables.

play08:23

I mean, think about it, it was a scary time.

play08:25

It was global war, it was mass destruction,

play08:27

so mass surveillance on your people felt necessary

play08:31

in the name of national security.

play08:33

- [Reporter 4] Even the insides of envelopes are scrutinized

play08:36

for hidden writing by these sensors.

play08:38

- This agency was shut down after World War II,

play08:41

but the seeds of mass surveillance were now planted.

play08:44

(techno music)

play08:47

A few years later,

play08:48

President Harry Truman creates a new secret department,

play08:50

the National Security Agency or NSA.

play08:53

Their job was to secretly collect and analyze communication

play08:57

happening in the country,

play08:58

communication that was not meant for them,

play09:00

spying on communication of all kinds,

play09:03

all in the name of national security.

play09:08

By the time the United States and the Soviet Union

play09:10

are locked in a Cold War, spying becomes even more valuable,

play09:15

even more of a priority for these governments,

play09:17

and once again, underwater cables become a target.

play09:23

The Americans built this entire spy submarine,

play09:26

which had a secret space set aside for intelligence officers

play09:29

and a giant computer.

play09:31

They called this space the bat cave.

play09:33

Of course, they did, a bunch of military dudes

play09:36

on a submarine and they've got their secret computers,

play09:39

like, "We're in the bat cave."

play09:40

I can totally see it.

play09:41

This submarine called the USS Halibut

play09:44

had a little mini-submarine-looking thing

play09:46

that was actually not a mini-submarine,

play09:48

but rather a pressurized chamber full of special gas

play09:52

that divers would just sit in there and breathe.

play09:55

It was pressurized to feel like the deep ocean

play09:58

so that these divers could go out into the ocean

play10:00

and be 400 feet under the surface

play10:03

and their bodies were ready for the pressure.

play10:05

They used this to secretly navigate to underwater cables.

play10:09

The one we know about happened over here right off the coast

play10:11

of Eastern Russia.

play10:12

The divers would leave their pressurized gas chamber.

play10:15

They would navigate this big, clunky

play10:17

electric listening device onto the cable.

play10:20

It's basically a giant 20' recorder

play10:22

that would tap into the cable and record

play10:24

everything passing through.

play10:26

They somehow parsed through the dozens of different signals,

play10:29

specific phone calls between Soviet officials,

play10:32

but of course, this is the analog days,

play10:33

so the storage on this device would fill up,

play10:36

so they had to go back with their little bat cave submarine

play10:39

every few months to replace the tape.

play10:42

They did this for 10 years.

play10:44

This was called Operation Ivy Bells,

play10:46

and we talked about it a little bit in the whole deep dive

play10:47

we did on submarines.

play10:49

But boy, it just never ceases to blow my mind

play10:52

how resource-intensive this operation was.

play10:55

(water bubbles)

play10:57

Anyway, through this tapping on the Soviet cable,

play10:59

the Americans learned just how scared the Soviets were

play11:03

by the buildup of nuclear weapons.

play11:05

This helped them negotiate a slowdown

play11:06

in the nuclear arms race and even helped lead to

play11:09

the end of the Cold War according to one expert.

play11:13

By the early nineties, the Cold War was over.

play11:15

- [President Clinton] The change of centuries,

play11:18

the dawning of a new millennium.

play11:20

- But then came a world changing attack

play11:22

into the ultraconnected internet age.

play11:24

- This new law that I signed today

play11:25

will allow surveillance of all communications

play11:28

used by terrorists, including emails,

play11:31

the internet, and cell phones.

play11:32

This government will enforce this law

play11:34

with all the urgency of a nation at war.

play11:39

It is now my honor to sign into law

play11:40

the USA Patriot Act of 2001.

play11:44

(audience applauds)

play11:49

- In 2006, a leaked document revealed that

play11:53

in a nondescript building in San Francisco

play11:55

behind this random yellow door labeled 641A,

play11:59

the NSA had set up this harmless-looking box

play12:02

that tapped into the fiber optic cables

play12:05

that traversed the Pacific Ocean into Asia.

play12:07

The phone company AT&T had agreed to let them siphon off

play12:11

the traffic that was moving through their cables.

play12:14

This seemed kind of nuts that the U.S. was tapping a cable

play12:17

where all of our communication goes through,

play12:19

but we had no idea what was coming.

play12:21

In 2013, Edward Snowden,

play12:24

an NSA contractor unleashed one of the biggest leaks

play12:27

in American history.

play12:28

- This is the greatest hemorrhaging

play12:30

of a legitimate American secrets

play12:31

in the history of the Republic.

play12:33

- And that is what we have been looking through.

play12:35

I mean, there's a lot more documents,

play12:36

but we sifted through and found the documents

play12:39

that show us that it wasn't just one cable

play12:42

in San Francisco being tapped.

play12:43

The NSA was targeting every single cable

play12:47

that touched the United States,

play12:49

a huge amount of global traffic, email,

play12:52

text messages, phone calls.

play12:54

They had cooperation from

play12:55

all these telecommunication and tech companies to do this.

play12:58

Microsoft, Yahoo, Google, Facebook, PalTalk?

play13:02

The hell is PalTalk?

play13:03

Who knows, but the NSA was tapping their cables.

play13:06

YouTube, Skype, AOL, and even Apple by 2012,

play13:10

and their goal in all of this,

play13:12

well, according to one of these slides,

play13:15

the goal was to sniff it all, know it all, collect it all,

play13:20

process it all, exploit it all, partner it all.

play13:24

In other words, according to another leaked slide,

play13:26

to master the internet.

play13:29

There's this one spreadsheet

play13:30

in all of these leaked documents that really said it,

play13:32

here it is.

play13:33

This is a list, a spreadsheet of some of the cables

play13:37

that the NSA had access to,

play13:39

we literally know which ones.

play13:41

I mean, we have the data of all of these cables.

play13:44

We could literally map all of these

play13:45

from the southern cross cable

play13:47

that connects California to Australia,

play13:50

to the Apollo cable that connects New York to France,

play13:53

to the tiny cables that connect Puerto Rico

play13:56

to the British Virgin Islands.

play13:57

All in all, by 2009,

play13:59

the NSA had stuck a probe in hundreds of submarine cables

play14:04

all around the globe.

play14:05

Oh, and they didn't do it alone.

play14:08

The NSA partnered with

play14:09

the OG masters of Cable-tapping, the British.

play14:13

- Since the 1940s, GCHQ and its American equivalence

play14:17

have had a relationship that is unique in the world.

play14:20

- Okay, so there's a weird loophole thing here.

play14:22

U.S. law allows the NSA to track anyone

play14:26

outside of the United States,

play14:27

but there are restrictions

play14:29

when it comes to tracking American citizens.

play14:31

So to get around that,

play14:33

they turn to their British counterparts, the GCHQ.

play14:36

So over the course of a couple years in the early 2010s,

play14:39

the NSA is paying 100 million pounds in secret money

play14:43

to gain access to all of this data,

play14:45

this data that they call a gold mine to exploit,

play14:49

hundreds of thousands of names, over 76,000 geocoordinates,

play14:53

194 million messages collected per day.

play14:58

And unlike the NSA,

play14:59

the British could actually spy on American targets,

play15:02

but the point is they were in it to collect it all.

play15:06

- If information arrives in the UK from the United States,

play15:09

it's governed by our laws.

play15:12

The system works as intended.

play15:14

(suspenseful music)

play15:17

- Okay, okay, yeah, it's a lot of data,

play15:19

but what can you do with 600 million phone events

play15:24

worth of data?

play15:25

That's way too much for any human to actually process,

play15:28

and this is where it gets kind of nuts to me.

play15:31

We've got this slide, which by the way,

play15:33

I know that we're dealing with really top secret documents,

play15:37

but they all have clip-art and these templatized

play15:41

Windows 95-looking titles, freaking love it.

play15:44

(jazzy drum music)

play15:46

This slide, this complicated, wonky, wonky slide

play15:50

with this flow chart is the answer to what they do

play15:53

with all of this data, but here's basically how it works.

play15:57

So the NSA gets all of this data

play15:59

of all of our communication,

play16:00

either from cables or from phone companies.

play16:03

They funnel it through

play16:04

this central processing facility called Pinecone.

play16:11

This is presumably where they're processing

play16:13

a lot of this data and trying to find patterns.

play16:17

The NSA says that their job is to find suspected terrorists

play16:20

or other people who want to do harm to national security.

play16:23

And to do this, they use computers and algorithms

play16:26

to make links between suspected terrorists

play16:29

and their immediate network, the people they call,

play16:32

the people they talk to, where they are.

play16:34

They say they only hold on to those records

play16:37

and they throw out everything else.

play16:38

We don't know if that's true, but let's just assume it is.

play16:41

And then once it's all processed and sorted,

play16:42

it goes into a little searchable database called XKeyscore,

play16:48

which is a very clunky name,

play16:49

but hey, great graphic design once again.

play16:51

This is basically like a internal search engine

play16:54

that catalogs all of the metadata

play16:57

that has been assigned to

play16:58

all of this call message geolocation information

play17:02

and makes it searchable.

play17:04

So you could pull up a person, a suspected terrorist,

play17:06

and you could find everything you need to know about

play17:08

who they talk to, where they are, what their emails say,

play17:12

or in their words, anything you wish to extract.

play17:15

It's all searchable on this convenient platform.

play17:19

This allows them to do searches like

play17:21

let's look for an Arabic font,

play17:23

Google query coming out of the tribal areas of Pakistan,

play17:27

and boom, they're linked in.

play17:29

It's all right here in XKeyscore the database.

play17:33

Because of the globally connected world,

play17:35

the NSA now has access to this person.

play17:38

They can see what messages they're sending.

play17:40

They can see where they are right now,

play17:43

assuming they have their phone,

play17:44

all searchable in this convenient database,

play17:46

accessible to agencies from other countries

play17:49

and all over the world.

play17:50

The whole assumption here is that in order

play17:53

to find your target, the terrorist, the spy, whatever,

play17:57

you need to access all of the information,

play18:00

this turns metadata into a weapon of modern warfare.

play18:03

- We kill people based on metadata,

play18:08

but that's not what we do with this metadata.

play18:11

(suspenseful music)

play18:12

- This revelation, all of these documents,

play18:14

this whole Snowden drama was a big deal

play18:17

for a lot of reasons.

play18:19

One of the things it did

play18:20

is it made the location of cables really important.

play18:24

Most of the cables were going through the United States,

play18:27

but after this leak,

play18:28

countries started to look for alternative routes

play18:31

that bypassed the United States,

play18:33

like this one that connects Brazil to South Africa

play18:35

and then goes on to Asia.

play18:37

So over the last decade since these leaks,

play18:39

the U.S. has become less and less the epicenter

play18:42

of cable connection, and you guessed it,

play18:45

there's another player in town

play18:46

who wants access to cables, China.

play18:49

(suspenseful music)

play18:51

China is rapidly building out

play18:52

their worldwide network of cables,

play18:54

and they're doing this through

play18:55

Chinese state-owned companies like Huawei.

play18:58

And this is adding yet another front

play19:00

in this emerging Cold War tension between great powers

play19:03

that want to lead the global system.

play19:05

It turns out that controlling and spying on cables

play19:09

is a requirement for global leadership in 2023, who knew?

play19:13

But unlike the U.S. who purports to protect privacy

play19:17

and civil liberties, but secretly violates them,

play19:19

China doesn't even pretend.

play19:21

China has built a society off of mass surveillance

play19:24

and control of information.

play19:26

Like here's actual footage of how China tracks the movement

play19:29

of its population through visual recognition,

play19:32

through cataloging every face, every car.

play19:35

Information is power in this day and age,

play19:38

and just a couple years ago,

play19:39

the U.S. formed a new special unit with intelligence

play19:42

and regulation officials.

play19:44

It's a group called Team Telecom,

play19:46

and their job is to assess any new projects, any new cables,

play19:49

and make sure that they aren't going to

play19:52

threaten or weaken U.S. interests.

play19:55

For example, there was this one cable

play19:56

that was supposed to connect LA to Hong Kong.

play19:59

It was being built by Google and Facebook,

play20:01

and they were into the project,

play20:03

hundreds of millions of dollars into the project,

play20:05

and this Team Telecoms shut it down, too risky.

play20:09

We can't have our fiber optic cables

play20:11

going too close to China less they spy on us.

play20:15

This is making the map look really weird.

play20:17

You used to only have to have

play20:18

one major set of cables connecting countries,

play20:21

but now you're starting to see duplicates.

play20:24

The Chinese lines and the American lines,

play20:26

each building out their own network,

play20:28

not connecting to each other.

play20:30

It's like the perfect symbol of the tension

play20:32

that is rising between these two superpowers.

play20:34

The bifurcated world that we're moving into.

play20:37

China is connecting these small remote islands

play20:40

laying down cables.

play20:41

And these islanders are happy to have fast internet,

play20:45

even if it comes from China and is probably being tapped.

play20:48

The continent of Africa,

play20:49

the U.S. and China are both laying down competing lines.

play20:53

The country's caught in the middle of this

play20:54

understand what's going on.

play20:55

Two, aspiring hegemons vying for power,

play20:58

each involved in spying and sucking up information

play21:01

in their own way,

play21:02

but I guess it's worth it, because it means faster internet,

play21:05

it means connection to the world.

play21:06

Russia is even trying to get in on this

play21:08

with their aptly named Polar Express cable.

play21:12

And even though the old school tapping into cables

play21:14

in the middle of the ocean to spy on your neighbor

play21:16

is kind of outdated now,

play21:18

there's some evidence that Russia might be still doing this.

play21:21

They've got this one ship called the Yantar.

play21:23

It's a surface ship that is generally understood

play21:25

to be a spy vessel,

play21:26

and it's been spotted on the surface above

play21:28

where we know submarine cables are near Ireland

play21:31

or near Syria.

play21:32

Some think that they're just tapping into them

play21:34

like the old days,

play21:35

maybe using one of these mini-submarines.

play21:37

But even if they're not tapping into them,

play21:39

they're very presence above the cable is kind of a threat.

play21:42

They could cut this cable at any moment.

play21:45

The U.S. who is very good at submarines

play21:46

has its own spy vessels,

play21:48

the most secretive one being the USS Jimmy Carter,

play21:51

and we have no idea what it's up to.

play21:54

Security experts speculate

play21:55

that it's probably tapping into cables for some reason,

play21:58

somewhere at the bottom of the ocean.

play22:00

But a lot of people in the industry are like,

play22:02

"No, that's so old days, why bother?"

play22:05

It's so much easier to just tap into them on land.

play22:09

You get way more data and you don't have to

play22:10

go to the bottom of the ocean.

play22:12

Meanwhile, the private companies in charge of these cables

play22:14

have started to up their own defenses.

play22:16

They're taking all these extra precautions,

play22:18

including sending out these submarine drones

play22:22

that just spend their time

play22:23

tracing along the bottom of the ocean,

play22:26

babysitting these cables and making sure

play22:28

that there's no damage or tampering going on.

play22:31

So I feel like I'm gonna say what I've said

play22:34

a bunch on the channel lately,

play22:35

which is we are entering a new chapter in geopolitics.

play22:40

A globalized world is hyperconnected,

play22:42

but suddenly and unexpectedly,

play22:44

we're seeing a new set of divisions,

play22:47

countries not trusting each other anymore.

play22:49

Nations wanting to create their own separate systems,

play22:53

both economically, militarily,

play22:55

but also with the infrastructure of the internet.

play22:58

A chapter where countries now are more skeptical than ever,

play23:01

especially great powers,

play23:03

great powers that are building their own infrastructure

play23:06

so that they can communicate and control information,

play23:09

not trusting the other half of the world

play23:12

to handle their data.

play23:13

We see Navies with secret ships that cost close to

play23:16

a $1 billion a piece,

play23:18

and then we see everyone else caught in the middle.

play23:21

And in the end, most of us just want fast internet

play23:25

connection with friends around the world

play23:27

and a feeling that we're safe.

play23:30

(suspenseful music)

play23:48

All right, thanks for watching today's video.

play23:51

Just a little nugget here.

play23:52

We did this video,

play23:54

because we did the deep dive on submarines

play23:58

a few months ago.

play23:59

I don't know if anyone saw that,

play23:59

but it was in that reporting that we came across

play24:03

the spying element of all of this.

play24:05

And I remember I asked all of you,

play24:07

do you want me to do this video?

play24:08

And you all said, yes.

play24:10

I got like so many comments that were like, "Yes."

play24:12

And so, we did it.

play24:14

And that is one thing I love about YouTube

play24:17

and being an independent journalist on YouTube

play24:19

is that I get to just ask you,

play24:21

I'm talking to you and be like,

play24:22

"Hey, do you want this?"

play24:23

And you're like, "Yes."

play24:24

And I go, "Okay," and I make it.

play24:26

And there's no corporate middleman who decides

play24:29

what we make.

play24:30

We make what you guys wanna see.

play24:31

So as always, you can pitch us ideas

play24:35

and we will hear them.

play24:38

For those who want to support more fully in our kind of

play24:41

more intimate community,

play24:42

we have a Patreon called the Newsroom.

play24:44

The Newsroom is a place where you can support

play24:47

what we do here, but you also get in on a few benefits,

play24:49

including an extra behind the scenes video every month

play24:52

where you get to see all of the people and the processes

play24:55

and the shenanigans that happen here in the studio.

play24:59

We have a big team and you get to meet them,

play25:01

if you are a member of the newsroom.

play25:02

You get access to my scripts,

play25:03

you get access to Tom Fox music.

play25:05

But really you get access to the warm fuzzy feeling

play25:08

that you're supporting a YouTube channel

play25:10

that is trying to make rigorous journalism

play25:12

in a time where facts and truth are kind of eroding.

play25:16

So if that floats your boat, we would love your support.

play25:19

We also have luts and presets,

play25:21

which are like the thing we use to color our videos

play25:24

and our photos.

play25:25

You could buy those and they help support the channel.

play25:27

We have a poster that I designed.

play25:29

I'm super into map projections,

play25:31

all the different ways you can show a map shape,

play25:33

and I made a beautiful poster that has it.

play25:37

If you have that poster,

play25:38

I think a lot of you have purchased that poster,

play25:39

we actually sold out and we're reprinting a new batch,

play25:42

so they should be in there.

play25:44

Don't quote me on that because they could be sold out again.

play25:46

But anyway, if you have that poster, tag me or something,

play25:49

I wanna see what it looks like out in the wild.

play25:51

I looked at it on a screen for months

play25:53

and now I have some here,

play25:54

but I don't know what it looks like out in the wild,

play25:56

so share it with me.

play25:57

I think that's it.

play25:58

Anyway, that's all I've got.

play26:00

Thank you all for being here,

play26:01

and I'll see you in the next video, bye-bye.

play26:07

- [Narrator] Although the calls through the cable

play26:09

will be from many nations, in many tongues,

play26:13

the cable itself speaks a single language to all

play26:16

that is the language of friendship and cooperation

play26:20

between the men and women of France, West Germany, England,

play26:24

and the United States

play26:25

who conceived and brought to completion

play26:28

the cable to the continent.

Rate This
★
★
★
★
★

5.0 / 5 (0 votes)

Étiquettes Connexes
Data SurveillanceInternet CablesGlobal ControlUndersea CablesNSA LeaksAT&TPinecone FacilityGeopoliticsCybersecurityInformation WarfarePrivacy Concerns
Besoin d'un résumé en anglais ?