Logo
    Search

    Podcast Summary

    • CIA's Operation Lying Doggo & Insights on Being a CIA OfficerCIA uses creative espionage tactics like Operation Lying Doggo to acquire foreign intelligence. Former CIA officers share insights on their recruitment and work experience in the intelligence agency.

      The CIA conducted Operation Lying Doggo as an espionage tactic to get special agents into high-security areas. The agents bought a big-haired dog and established it as a regular visitor to the area, thereby making it easier to smuggle an agent disguised as a big dog. The story illustrates the length to which the CIA goes to gather foreign intelligence. Also, the podcast host interviews a former CIA officer who shares his experience of working for the organization and how he was recruited. The interviewee turned down a Clandestine Service job offer to work for his family business, but three years later, he reached out to the CIA and accepted the opportunity to work for them.

    • The Art of Recruiting Spies: Insights into the CIA's Intelligence-Gathering TechniquesCIA case officers develop relationships with potential recruits by identifying their source of stress, building rapport, and exploiting vulnerabilities. Stress is a key factor in making people more recruitable, and social engineering techniques are often employed in gathering foreign intelligence.

      A case officer's job is to collect human intelligence by identifying, recruiting, and handling non-US citizens with access to foreign intelligence vital to the US. This can involve persuading people to commit treason, which is illegal in most countries. The CIA creates a targeting package to identify both the information they are after and the potential recruit. Case officers like Jim develop a relationship with the target person by identifying their main source of stress, establishing rapport, and building trust. Stress makes people more recruitable. Exploiting people is an art and a CIAs case officers need to be masters of it. CIA operatives use some of the social engineering techniques talked about in the show to gather foreign intelligence.

    • How CIA agents understand people and use official cover to stay hidden.Understanding emotional needs and stressors is essential to persuade people. CIA agents use the MICE acronym, but ego plays a bigger role than money. Official cover jobs and diplomatic protection are crucial to avoid punishment when working clandestinely in foreign countries.

      Just like studying rocks, understanding people requires getting up close and identifying their emotional needs and stressors. CIA agents use MICE acronym (Money, Ideology, Coercion, Ego) to persuade people, but most people do things for ego rather than money alone. CIA case officers have an official cover job in addition to their clandestine role. Jim's first mission was to find a source for critical national security negotiations by using his developmental activities to build trust with the person he met in a ski class. Diplomatic protection provided by official cover is important to avoid serious punishment in case of getting caught in a foreign country.

    • Navigating the Delicate Balance of Recruitment for the CIABuilding trust in recruitment for the CIA is nuanced. CIA operatives must be careful, impartial, and adventurous to navigate between trust-building and espionage, taking into account fear, loyalty, and risks of being turned in or fed false information.

      Building trust is crucial in recruitment, but it can still be a risky and ineffective strategy. The delicate nature of recruiting sources for the CIA is highlighted in this story, where a friend's loyalty and lack of stress made him a difficult target. Jim had to resort to an unusual approach of outright offering money for classified information. The risk of getting turned in by the source and ruining negotiations or being fed false information is high. Moral objections to recruitment pitches are rare, most objections stem from fear. The CIA operatives must be careful, impartial, and adventurous to navigate the delicate balance between trust-building and espionage.

    • Revenge as a Motivator in Espionage and The Art of PersuasionRevenge can be a powerful motivator in espionage and innocent conversations can be used as clues to recruit sources. Persuasion is a valuable tool in intelligence gathering.

      Revenge is a big motivator in espionage. This was the case when Jim made a friend who was willing to provide him with classified information. The friend did it to seek revenge against his ambassador, who took credit for everything that he did. This worked well for Jim because he was able to get valuable information that he passed on to Washington. The US used this information during negotiations with that country and saved billions of dollars. Over the years, Jim honed his skills and became skilled at persuading people to become sources. He used innocent conversations where people shared something inappropriate as a clue to recruit them. Jim's career serves as a lesson on how persuasion can be an efficient tool for espionage.

    • Building Trust for Successful Intelligence OperationsIn intelligence operations, relationships and trust are crucial. Strategies like seeding, dropping cover, reverse pitching, and sharing credit strengthen relationships with sources, increasing their cooperation and access to vital information.

      Successful intelligence operations sometimes involve 'seeding' or recruiting sources who don't yet have access to information, but may gain it later in their careers. The Cambridge Five is a notable example of a highly successful seeding operation. Dropping cover, or revealing oneself as a CIA officer, is sometimes necessary to effectively recruit a source. Jim also uses strategies like reverse pitching and appealing to ego to build relationships and gain information. Sharing credit and compensation with sources for their contributions can help build trust and strengthen relationships, making them more likely to cooperate in the future. Overall, building relationships and trust is key to successful intelligence operations.

    • How CIA Operatives Obtain Classified InformationCIA operatives use covert communication and secret signals to recruit sources and obtain information. While expensive, this type of espionage can potentially save countless lives and is worth the investment.

      CIA operatives pose as businesspersons to obtain information from sources who may not be willing to provide it to the US government. Once a source is recruited, the handler sets up secret meetings and uses covert communication to get information. Sources provide data through dead drops or may physically hand over classified documents. CIA operatives use secret signals like the way shoelaces are tied or the position of glasses to communicate with their sources. This type of espionage can cost the CIA millions of dollars, but it potentially saves hundreds of thousands of lives, making it worth the investment.

    • Intelligence Techniques and Successful Espionage StoriesBuilding relationships with sources and carefully planning messaging communication can lead to success in intelligence gathering, even in hostile environments. Perseverance and patience are key factors for gaining valuable information through pretext or cover stories.

      Encryption techniques such as one-time pads were used in intelligence agencies for secure messaging communication. Intelligence officers use pretext or cover stories for their recruitment, as Jim did, to take good intel from a foreign secretary without alerting her that she was being spied on. A friendly relationship with a source could be leveraged to gain access to potentially valuable information. Hostile nations can be a gold mine of intel, especially for a commodities trader who needs to know about OPEC. The story conveys an idea of patience, perseverance, and careful planning that can lead to success in even the most challenging environments.

    • The Risks of Building Relations on Dishonest Intentions in BusinessEstablishing trust and mutual benefit is critical in business, but it's important to be transparent about intentions to avoid unethical and legal implications.

      Building relationships based on dishonest intentions can lead to success, but also unethical consequences. Jim cleverly creates a commercial relationship with the secretary, manipulating her into providing valuable information about her country's oil and gas market. He then offers her payment and medical assistance as incentives to continue sharing this information. However, when his true intentions are revealed - that he works for the CIA - it raises ethical concerns about the secretary's involvement. Establishing trust and mutual benefit in business relationships is important, but when it involves betraying one's country, it becomes a much more serious matter. Being transparent and upfront about one's intentions is crucial in order to avoid misleading others and facing potential legal and ethical consequences.

    • The Power of Empathy in Salvaging Broken RelationshipsSmall acts of kindness and empathy can have a powerful impact in restoring broken relationships. Even in high-stakes situations, treating others with respect and kindness can lead to trust and strong connections.

      Sometimes, salvaging a broken relationship requires the use of tact and empathy. A simple gift and a kind gesture can go a long way in restoring trust and rapport. This is demonstrated in the story of how Jim successfully persuaded the secretary of the foreign minister to work undercover for the CIA. Despite initially rejecting his offer to spy, Jim was able to salvage the situation by treating her with respect and kindness, culminating in a farewell dinner where he gifted her a bud vase. This simple act of kindness was enough to convince her to change her mind and work for the CIA for five years, demonstrating the power of human connections and empathy.

    • Building Trust and Educating Employees to Improve SecurityFair treatment, team spirit, and employee education can reduce the risk of inside threats, which are often the most damaging. Companies should also be aware of stress-related vulnerabilities and nation-state tactics.

      Companies can increase their security by treating their employees well and building trust. Employees who are treated fairly and feel like they are part of a team are less likely to betray the company. People under stress from situations like divorce are more susceptible, and it's important to be aware of their vulnerabilities. Nation-states use a variety of tactics to get people to leak information, including offering money or exploiting vulnerabilities. Cyber-defenses are worthless if someone on the inside is helping outsiders gain access to sensitive information. The CIA and NSA often work together, combining their human and signals intelligence to conduct missions. Companies can consider hiring consultants to educate employees on how to be aware of sources like these and avoid being exploited.

    • Preventing the Spread of Nuclear WeaponsDiplomacy and espionage are crucial in preventing nuclear proliferation and disruptive tactics can be used to stop nuclear weapons trade, even in difficult situations.

      The US CIA led a team to stop the underground nuclear weapons trade by disrupting the spread of nuclear weapons technology. Jim was tasked with stopping Dr. A.Q. Khan from providing Libya with nuclear capabilities. The US did not have good relations with Libya's leader Muammar Gaddafi, who had taken responsibility for a few terrorist attacks. Jim turned to the historical story of Felix Dzerzhinsky for inspiration to come up with a plan. The US believed that if Gaddafi had an atomic bomb, he would use it. Preventing nuclear proliferation is a matter of delicate job done through diplomacy and espionage.

    • Importance of Counterintelligence and Unconventional Methods in EspionageInfiltration and use of unconventional methods can be effective ways to gain intelligence and achieve objectives quickly in espionage. Counterintelligence is also critical to identifying and stopping threats before they become a bigger problem.

      To defeat their enemies, both Dzerzhinsky and Jim infiltrated their respective networks by becoming a part of them. Jim and his team pretended to be underground nuclear arms sellers to infiltrate the market where they gained a lot of intel about the key players and got close to some of them, including Urs Tinner, a nuclear engineer and friend of A.Q. Khan. They used classic espionage techniques to persuade Urs to become an informant. The CIA wanted to stop Khan quickly because they didn't want Libya and Iran to get nuclear weapons, so they brought in Jim to infiltrate Khan's network as there was not enough time or opportunities to develop a relationship otherwise. This story shows the importance of counterintelligence in espionage and the use of unconventional methods to achieve objectives.

    • Disrupting the World's Largest Nuclear Proliferation NetworkJim and his team successfully dismantled a dangerous network by using coercion, money, and effective intelligence gathering. Their efforts resulted in the discovery of crucial information and designs, leading to valuable awards and recognition from the CIA.

      Jim and his team used coercion and money to gather key information and sabotage shipments which led to the dismantling of the largest nuclear proliferation network in history. To verify that the Tinners had not been deceiving them, Jim set up a meeting with them at a hotel where they offered a final payout of a significant amount more. In exchange, they wanted two main things: the willing participation in extensive interrogations and access to all documents and drives which were taken while the Tinners were at the hotel. The information recovered was analyzed and they discovered designs for two centrifuges that had been sold to Iran and Libya and a potentially far worse situation; a significant amount of centrifuge equipment had disappeared and was quite possibly sold to an unidentified fourth customer. For infiltrating and disrupting A.Q. Khan's network, Jim and his team received the Trailblazer medal, which is one of the most distinguished honors the CIA gives out.

    • Ethics vs Law: CIA's Intelligence Gathering MethodsThe CIA's approval process to recruit individuals for intelligence gathering allows them to knowingly break laws in other countries, which raises ethical concerns. Though sometimes higher ethics transcend the law, causing harm to another country might not be justified.

      The CIA knowingly breaks laws in other countries for intelligence gathering which raises ethical concerns. Though there is an approval process to recruit someone, where the need for information is considered, once the permission to break the law is granted, it sets a precedent. Jim's success in collecting intelligence saved lives and billions of dollars for the US but at the cost of another country. However, sometimes higher ethics transcend the law. Jim's book, Living Lies, is a fictional story about an agent who disrupts Iran's nuclear weapons program; this story may add on to the intrigue and knowledge about espionage.

    Recent Episodes from Darknet Diaries

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Episode 031: Mike Rochford - FBI Betrayal, Robert Hanssen

    Episode 031: Mike Rochford -  FBI Betrayal, Robert Hanssen

    Retired agent Mike Rochford, as a manager at FBI Headquarters and in the field, oversaw such cases as Aldrich Ames and Earl Pitts and worked to identity six unknown subjects, government spies, the FBI and CIA, had been for years trying to uncover. One of those "unsubs" was eventually identified as FBI agent turned spy, Robert Hanssen. Mike reviews the investigation of Hanssen, who is considered the most damaging spy in FBI history. Mike recruited the source, a Russian agent of the KGB/SVR, who provided the information that led to Hanssen's identification. For this effort, Mike received the National Intelligence Medal of Achievement from the CIA.

    Check out episode show notes, photos, and related articles.  https://jerriwilliams.com/mike-rochford-fbi-betrayal-robert-hanssen/




    Buy me a coffee - https://www.buymeacoffee.com/JerriWilliams


    Join my Reader Team to get the FBI Reading Resource - Books about the FBI, written by FBI agents, the 20 clichés about the FBI Reality Checklist, and keep up to date on the FBI in books, TV, and movies via my monthly email. Join here. http://eepurl.com/dzCCmL 


    Check out my FBI books, non-fiction and crime fiction, available as audiobooks, ebooks and paperbacks wherever books are sold. https://jerriwilliams.com/books/

    The Moscow Rules: Jonna Mendez

    The Moscow Rules: Jonna Mendez
    Former CIA Disguise Chief Jonna Mendez joins Major this week for lunch at Il Canale in Georgetown - the DC neighborhood she refers to as her old stomping grounds. Mendez reveals the keys to being a superb CIA agent - particularly in Moscow, where virtually no place is safe from surveillance. Float like a butterfly, sting like a bee - and sting like hell, she says. Plus, her personal involvement in the Academy Award winning 2012, movie Argo. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    Andrew Bustamante - CIA Spy: The Truth About Israel & Hamas With Iran’s Secret Agenda

    Andrew Bustamante - CIA Spy: The Truth About Israel & Hamas With Iran’s Secret Agenda

    Watch the Full Episode for FREE:

    Andrew Bustamante - CIA Spy: The Truth About Israel & Hamas With Iran’s Secret Agenda - London Real

    🚀 The Crypto & DeFi Academy: http://londonreal.tv/defi

    🔥 The Wealth Academy: http://londonreal.tv/wealth

    💰 The Investment Club: https://londonreal.tv/club