WEBVTT
Kind: captions
Language: en

00:00:00.000 --> 00:00:02.900
In early 2012, Chang’an Avenue was filled with tension

00:00:02.900 --> 00:00:03.900
Everyone’s attention

00:00:03.900 --> 00:00:07.633
was tightly seized by the political tsunami of Wang Lijun’s nighttime flight and Bo Xilai’s downfall

00:00:07.633 --> 00:00:09.033
But very few people knew

00:00:09.033 --> 00:00:10.900
that while people across the country were moving their stools

00:00:10.900 --> 00:00:13.100
to watch this high-level “palace drama”

00:00:13.166 --> 00:00:15.000
in the unseen deep waters of Zhongnanhai

00:00:15.000 --> 00:00:16.866
a storm was rising

00:00:16.866 --> 00:00:18.900
the largest counterintelligence purge

00:00:19.000 --> 00:00:22.366
Within just two years, more than 30 deeply embedded operatives in China’s military core

00:00:22.466 --> 00:00:23.633
core Party and government organs

00:00:23.633 --> 00:00:27.300
and even the very heart of the Ministry of State Security

00:00:27.300 --> 00:00:29.133
CIA senior informants

00:00:29.133 --> 00:00:32.500
were precisely identified and then vanished without a trace

00:00:32.500 --> 00:00:34.966
The New York Times’ major exposé and Foreign Policy’s in-depth investigation

00:00:34.966 --> 00:00:37.366
cross-confirmed this extremely cold outcome

00:00:37.366 --> 00:00:40.833
The U.S. intelligence community spent tens of billions of dollars

00:00:40.833 --> 00:00:41.800
painstakingly built over 10 years

00:00:41.800 --> 00:00:44.166
the China spy network was uprooted

00:00:44.233 --> 00:00:45.633
About this heart-pounding covert war behind the red walls

00:00:45.633 --> 00:00:48.966
because it involves too much information

00:00:48.966 --> 00:00:50.400
many creators rely on a few second-hand pulp articles to speculate

00:00:50.400 --> 00:00:52.000
making it look like a 007 movie

00:00:52.266 --> 00:00:54.233
But real top-level rivalry

00:00:54.233 --> 00:00:55.900
is never that black-and-white

00:00:55.900 --> 00:00:59.566
To completely peel back this layer of fog

00:00:59.566 --> 00:01:02.366
the Gousheng team dug into the most critical foreign intelligence archives of the past decade

00:01:02.366 --> 00:01:06.766
from code-tracing reports of a top University of Toronto think tank

00:01:06.766 --> 00:01:09.466
all the way to heavily redacted original FBI indictments

00:01:09.466 --> 00:01:11.533
In this episode, we remove all fluff

00:01:11.666 --> 00:01:16.366
and rely only on the most hardcore cross-verified sources

00:01:16.366 --> 00:01:19.166
to reconstruct the most professional and shocking real great-power spy war online

00:01:19.166 --> 00:01:21.266
Today Gousheng will take you to break open this red wall

00:01:21.400 --> 00:01:23.866
and completely dissect this century-scale purge

00:01:23.866 --> 00:01:25.700
People always think intelligence wars between great powers

00:01:25.700 --> 00:01:28.033
must be like in 007 movies

00:01:28.033 --> 00:01:30.933
with flawless plans and perfect execution

00:01:30.933 --> 00:01:32.966
But when we peel back this façade with real records

00:01:33.033 --> 00:01:36.033
you’ll find there’s nothing mysterious

00:01:36.033 --> 00:01:39.800
When you truly see through this cold state machine

00:01:39.800 --> 00:01:41.166
you’ll realize the world itself

00:01:41.166 --> 00:01:42.933
is just a giant makeshift operation

00:01:42.933 --> 00:01:45.700
Now let’s return to China in 2000

00:01:45.700 --> 00:01:48.266
To understand how the CIA lost everything

00:01:48.266 --> 00:01:51.666
you must first understand how they once dominated

00:01:51.666 --> 00:01:54.266
In the intelligence world, China, Russia, and North Korea

00:01:54.366 --> 00:01:58.166
have long been classified as top-level denial zones

00:01:58.166 --> 00:01:59.666
with dense surveillance and strict control

00:01:59.666 --> 00:02:03.600
foreign movement is heavily restricted

00:02:03.600 --> 00:02:06.666
trying traditional 007-style espionage in China is extremely difficult

00:02:06.666 --> 00:02:10.000
After the Soviet collapse, the CIA’s focus shifted east

00:02:10.000 --> 00:02:11.300
By the early 21st century, China became the top priority

00:02:11.333 --> 00:02:15.100
But China was not the Soviet Union

00:02:15.100 --> 00:02:17.166
During the Cold War, the CIA relied on ideology

00:02:17.200 --> 00:02:19.133
Look how brutal your Gulags are

00:02:19.133 --> 00:02:22.733
Come see the beacon of the free world

00:02:22.733 --> 00:02:27.200
Many KGB defectors carried a tragic pursuit of freedom

00:02:27.200 --> 00:02:30.900
In the early 21st century after joining the WTO, China entered a boom era

00:02:30.900 --> 00:02:34.300
and also an era of rampant corruption and rent-seeking

00:02:34.300 --> 00:02:37.100
By then ideology had already been replaced by money

00:02:37.100 --> 00:02:39.400
What lubricated this massive machine

00:02:39.400 --> 00:02:43.000
was not ideology but real cash

00:02:43.000 --> 00:02:44.700
Buying and selling positions

00:02:44.700 --> 00:02:48.200
was not a secret in the system

00:02:48.200 --> 00:02:50.700
but a semi-open hidden rule

00:02:50.733 --> 00:02:54.200
In the military, local governments, and core ministries

00:02:54.200 --> 00:02:56.266
there were clear price tags

00:02:56.333 --> 00:02:58.033
for promotions

00:02:58.033 --> 00:03:00.966
or which superior to bribe

00:03:00.966 --> 00:03:02.566
insiders all knew

00:03:02.566 --> 00:03:05.333
For example, during Xu Caihou and Guo Boxiong’s era

00:03:05.333 --> 00:03:08.166
everything had a price

00:03:08.166 --> 00:03:11.766
There was even a saying

00:03:11.766 --> 00:03:14.466
millions buy division posts, tens of millions buy army posts

00:03:14.466 --> 00:03:16.333
In this system

00:03:16.333 --> 00:03:18.666
if you didn’t bribe

00:03:18.666 --> 00:03:20.200
you were seen as an outlier

00:03:20.200 --> 00:03:23.500
a ticking time bomb

00:03:23.500 --> 00:03:27.700
and would be sidelined for life

00:03:27.700 --> 00:03:28.533
Facing such systemic decay

00:03:28.533 --> 00:03:32.233
CIA analysts came up with an idea

00:03:32.400 --> 00:03:33.066
They decided

00:03:33.066 --> 00:03:36.100
to pay promotion bribes for recruited agents

00:03:36.133 --> 00:03:38.766
Yes, you heard that right

00:03:38.766 --> 00:03:40.566
In intelligence theory

00:03:40.700 --> 00:03:43.500
there is a model called MICE

00:03:43.533 --> 00:03:46.700
Money, ideology

00:03:46.700 --> 00:03:49.000
coercion, ego

00:03:49.000 --> 00:03:53.466
Facing these bureaucrats

00:03:53.666 --> 00:03:56.266
the CIA understood the logic

00:03:56.266 --> 00:03:59.133
You want promotion, you want into the PLA General Staff

00:03:59.133 --> 00:04:01.000
you want into core think tanks

00:04:01.066 --> 00:04:03.533
no problem

00:04:03.533 --> 00:04:07.266
If you can’t pay the 2 million RMB bribe

00:04:07.333 --> 00:04:10.966
the CIA will pay it

00:04:10.966 --> 00:04:13.766
According to Zach Dorfman

00:04:13.766 --> 00:04:15.333
who interviewed over 30

00:04:15.333 --> 00:04:17.966
former US intelligence officials

00:04:17.966 --> 00:04:21.800
the CIA saw this as long-term investment

00:04:21.800 --> 00:04:24.033
A senior counterintelligence official said

00:04:25.400 --> 00:04:28.100
The CIA also took care of these officials’ worries

00:04:28.166 --> 00:04:30.400
Arranging overseas accounts for their wives

00:04:30.400 --> 00:04:34.300
and covering tuition and living expenses for their children to attend Ivy League schools in Boston

00:04:34.300 --> 00:04:38.666
According to The New York Times, senior-level informants could earn up to $1 million a year

00:04:38.733 --> 00:04:40.400
This was both extremely generous compensation

00:04:40.400 --> 00:04:41.933
and an irreversible pledge of loyalty

00:04:41.933 --> 00:04:43.466
Once you take U.S. money to buy your position

00:04:43.466 --> 00:04:45.166
and your son is driving a sports car in Los Angeles

00:04:45.166 --> 00:04:47.866
do you think you can ever get off this pirate ship

00:04:47.866 --> 00:04:49.066
Of course, the CIA isn’t stupid

00:04:49.066 --> 00:04:50.666
They rarely recruit domestically

00:04:50.666 --> 00:04:53.166
If they can’t reach you inside China, they wait until you go abroad

00:04:53.166 --> 00:04:57.800
Chinese military officers travel to Djibouti, scientists attend conferences in Europe, officials visit the U.S.

00:04:57.800 --> 00:05:01.900
Once outside the country and beyond the system’s protection, it becomes the CIA’s home field

00:05:01.900 --> 00:05:04.500
The CIA even created an internal “Belt and Road” heat map

00:05:04.500 --> 00:05:07.766
Wherever Chinese officials go, the CIA’s methods follow

00:05:07.766 --> 00:05:10.900
Around 2010, this dollar-fueled corruption strategy

00:05:10.900 --> 00:05:14.400
brought the CIA’s spy network in China to its absolute historical peak

00:05:14.400 --> 00:05:17.000
According to four former U.S. officials speaking to The New York Times

00:05:17.000 --> 00:05:21.500
the quality of high-level intelligence on China was the best in years

00:05:21.500 --> 00:05:24.933
CIA informants were deeply embedded in the PLA’s core command system

00:05:24.933 --> 00:05:26.733
key departments of the Communist Party

00:05:26.766 --> 00:05:30.066
and even infiltrated the Ministry of State Security itself

00:05:30.066 --> 00:05:32.100
It was the golden age of U.S. intelligence

00:05:32.100 --> 00:05:36.700
Meetings held yesterday in Zhongnanhai, leadership intentions, military deployments

00:05:36.733 --> 00:05:38.900
even personnel planning for the 18th Party Congress

00:05:38.900 --> 00:05:41.300
could become top-secret briefings within days

00:05:41.366 --> 00:05:43.566
and be placed on Obama’s Oval Office desk

00:05:44.166 --> 00:05:48.366
Secretary Obama, we may need to approve more funding for China this time

00:05:48.366 --> 00:05:51.533
The other side is asking for quite a lot because the position is reportedly very high

00:05:51.533 --> 00:05:53.733
But we’ve already selected a reliable candidate

00:05:53.733 --> 00:05:56.166
and he himself is also willing to contribute a bit

00:05:56.166 --> 00:05:57.733
Alright, but this amount

00:05:57.733 --> 00:06:00.766
the position offered must be worth it

00:06:00.800 --> 00:06:03.833
Show me the list of candidates from yesterday’s internal meeting

00:06:03.866 --> 00:06:05.766
It’s already on your desk, General Secretary

00:06:06.033 --> 00:06:07.366
Are you sure it’s correct

00:06:07.400 --> 00:06:08.400
Yes, it is

00:06:08.400 --> 00:06:11.600
The secretary submitted these names from yesterday’s nominations

00:06:11.600 --> 00:06:13.066
Is this the one

00:06:13.233 --> 00:06:15.166
You mean our next General Secretary

00:06:15.166 --> 00:06:17.666
After internal high-level discussions

00:06:17.733 --> 00:06:20.666
we nominated someone named Donald Trump

00:06:20.766 --> 00:06:23.633
He’s from northern Shaanxi, from a poor peasant family for three generations

00:06:23.800 --> 00:06:28.033
and his father joined the Communist Party with Chairman Mao

00:06:28.033 --> 00:06:30.366
Uh, I think I’ve heard of someone like that

00:06:30.366 --> 00:06:32.066
Do you think I’m an idiot

00:06:32.066 --> 00:06:34.066
Get out and find out

00:06:34.066 --> 00:06:36.600
which idiot got into yesterday’s meeting

00:06:38.700 --> 00:06:43.600
Time moves to the second half of 2010, when the winds shifted in Zhongnanhai

00:06:43.600 --> 00:06:48.000
Senior officials in China’s Ministry of State Security began to sense a dangerous chill

00:06:48.000 --> 00:06:50.166
Through surveillance and reviews of diplomatic interactions with the U.S.

00:06:50.166 --> 00:06:53.100
they found that the Americans in major bilateral negotiations

00:06:53.100 --> 00:06:56.266
high-tech export controls and even military decisions toward China

00:06:56.266 --> 00:06:58.933
showed an eerie level of foresight

00:06:59.000 --> 00:07:01.266
That precise grasp of China’s strategic cards

00:07:01.266 --> 00:07:03.500
could not be achieved by satellites or intercepted emails

00:07:03.500 --> 00:07:06.433
or a few low-level communications

00:07:06.433 --> 00:07:08.266
Only those sitting in the meeting room

00:07:08.266 --> 00:07:10.200
or those with access to internal briefings

00:07:10.200 --> 00:07:12.166
could understand things so thoroughly

00:07:12.166 --> 00:07:15.066
At the same time, China’s own intelligence network in the U.S.

00:07:15.066 --> 00:07:17.466
began to be precisely dismantled

00:07:17.466 --> 00:07:20.033
According to later cross-verified intelligence records

00:07:20.033 --> 00:07:21.966
the Americans not only knew what we were thinking

00:07:21.966 --> 00:07:23.966
they also knew who we had sent

00:07:23.966 --> 00:07:26.266
The conclusion was unavoidable

00:07:26.400 --> 00:07:30.166
there was a mole inside the Ministry of State Security and even the core system

00:07:30.266 --> 00:07:34.866
This massive and secretive counterintelligence machine

00:07:34.866 --> 00:07:38.000
immediately launched its highest-level internal investigation

00:07:38.000 --> 00:07:39.500
The fuse that would trigger the earthquake

00:07:39.500 --> 00:07:41.400
was finally ignited in early 2012

00:07:41.400 --> 00:07:43.666
According to Reuters’ exclusive report

00:07:43.666 --> 00:07:45.866
the MSS eventually locked onto a key target

00:07:46.000 --> 00:07:47.200
an administrative secretary

00:07:47.200 --> 00:07:48.900
to then Vice Minister Lu Zhongwei

00:07:49.000 --> 00:07:51.566
Lu Zhongwei was a typical scholar-type intelligence official

00:07:51.600 --> 00:07:54.333
who long oversaw the ministry’s core think tank

00:07:54.400 --> 00:07:56.300
the China Institutes of Contemporary International Relations

00:07:56.300 --> 00:08:00.600
which provided top-level strategic reports to the Politburo

00:08:00.600 --> 00:08:02.700
The vice minister himself may have been cautious

00:08:02.700 --> 00:08:05.866
but his close secretary had extremely high access

00:08:06.000 --> 00:08:09.633
He had access to large amounts of sensitive political, economic, and strategic intelligence

00:08:09.633 --> 00:08:12.466
including top-secret overseas counterintelligence operations

00:08:12.466 --> 00:08:14.433
Over several years

00:08:14.433 --> 00:08:16.433
this secretary continuously passed core secrets to the CIA

00:08:16.433 --> 00:08:19.466
directly leading to the exposure of multiple Chinese agents in the U.S.

00:08:19.466 --> 00:08:22.500
Once this was discovered, the news went straight to the top

00:08:22.500 --> 00:08:24.500
and shocked Beijing

00:08:24.566 --> 00:08:26.300
Already shaken by the Wang Lijun incident

00:08:26.366 --> 00:08:28.966
and leadership transition tensions

00:08:28.966 --> 00:08:31.566
at this critical moment, the anti-spy agency itself

00:08:31.566 --> 00:08:33.566
had been infiltrated like a sieve

00:08:33.566 --> 00:08:35.200
This was not just an intelligence failure

00:08:35.200 --> 00:08:38.066
but a political disaster of systemic collapse

00:08:38.066 --> 00:08:39.766
In an ordinary government department

00:08:39.800 --> 00:08:41.600
catching a corrupt official would be enough

00:08:41.600 --> 00:08:46.066
But in intelligence, when even a vice minister’s office has CIA eyes

00:08:46.066 --> 00:08:47.800
the most terrifying question arises

00:08:47.800 --> 00:08:50.066
Was this mole acting alone

00:08:50.066 --> 00:08:52.033
or part of a larger network

00:08:52.033 --> 00:08:55.000
who in this compound could still be trusted

00:08:57.166 --> 00:09:00.466
The arrest of the vice minister’s top secretary shattered all illusions among China’s leadership

00:09:00.466 --> 00:09:03.333
They realized the CIA’s dollar-driven venture strategy

00:09:03.333 --> 00:09:04.866
had already taken root too deeply

00:09:04.866 --> 00:09:06.600
Faced with such systemic decay

00:09:06.666 --> 00:09:09.600
the Ministry of State Security fell into extreme counterintelligence paranoia

00:09:09.600 --> 00:09:11.466
Traditional internal reviews were no longer sufficient

00:09:11.466 --> 00:09:14.000
and the system itself was not clean

00:09:14.000 --> 00:09:15.800
For example, the associate of Guo Wengui

00:09:15.800 --> 00:09:18.100
Ma Jian, then vice minister in charge of counterintelligence

00:09:18.100 --> 00:09:20.933
was busy using surveillance to collect blackmail material on senior officials

00:09:20.933 --> 00:09:23.600
while also helping Guo Wengui extort money from companies

00:09:23.600 --> 00:09:28.066
The leadership knew clearly that to deal with a deeply infiltrated CIA network

00:09:28.066 --> 00:09:30.966
relying solely on traditional surveillance and internal checks

00:09:31.000 --> 00:09:34.133
was not only inefficient but risked leaks at any time

00:09:34.133 --> 00:09:35.966
They had to bring in

00:09:35.966 --> 00:09:38.266
an absolutely clean external force with overwhelming technical advantage

00:09:38.266 --> 00:09:40.333
Thus the top leadership approved

00:09:40.333 --> 00:09:42.800
the creation of a high-level joint task force

00:09:42.800 --> 00:09:43.733
This task force

00:09:43.733 --> 00:09:47.433
included elite officers from the MSS Counterintelligence Bureau

00:09:47.533 --> 00:09:51.600
and also brought in China’s most secretive top cyber warfare unit

00:09:51.600 --> 00:09:54.733
the PLA General Staff Third Department, later part of the Strategic Support Force

00:09:54.733 --> 00:09:57.900
The Third Department is equivalent to China’s NSA

00:09:57.900 --> 00:10:00.000
gathering the country’s top hackers

00:10:00.000 --> 00:10:01.933
cryptographers and signals intelligence experts

00:10:01.933 --> 00:10:03.533
This cross-department operation

00:10:03.533 --> 00:10:06.633
fundamentally changed the nature of the counterintelligence war

00:10:06.700 --> 00:10:08.000
from traditional mole-hunting

00:10:08.000 --> 00:10:10.766
to a national-level cyber and signal tracking war

00:10:10.766 --> 00:10:12.166
The joint task force reasoned

00:10:12.166 --> 00:10:14.766
that with so many high-level officials recruited

00:10:14.766 --> 00:10:17.400
the CIA would not be exchanging intelligence on park benches

00:10:17.400 --> 00:10:20.400
To maintain such a large, high-frequency network

00:10:20.466 --> 00:10:23.233
the CIA must have a covert electronic communication system

00:10:23.366 --> 00:10:24.700
Once this system was found

00:10:24.700 --> 00:10:28.466
they could trace it and expose all the spies taking U.S. money

00:10:28.466 --> 00:10:33.233
Originally, finding such a system in the vast internet

00:10:33.266 --> 00:10:34.666
was like searching for a needle in a haystack

00:10:34.700 --> 00:10:38.133
But history played an absurd joke at this moment

00:10:39.900 --> 00:10:42.333
At the time, to communicate with Chinese informants

00:10:42.333 --> 00:10:43.333
CIA engineers

00:10:43.333 --> 00:10:45.900
developed an internet-based covert platform

00:10:45.900 --> 00:10:48.833
On the surface, these sites looked like normal news websites

00:10:48.833 --> 00:10:50.900
Agents would type into a seemingly ordinary search bar

00:10:50.900 --> 00:10:52.433
a specific code

00:10:52.433 --> 00:10:54.733
to trigger a hidden message window

00:10:54.800 --> 00:10:57.333
to communicate with handlers in Langley

00:10:57.366 --> 00:10:58.700
Sounds high-tech

00:10:58.700 --> 00:10:59.500
No no no

00:10:59.533 --> 00:11:02.366
This system had two outrageously basic flaws

00:11:02.366 --> 00:11:04.533
It was originally designed for the Middle East

00:11:04.533 --> 00:11:06.600
such as Iraq and Afghanistan

00:11:06.600 --> 00:11:09.633
where infrastructure was weak and conditions chaotic

00:11:09.633 --> 00:11:13.133
But the CIA bureaucrats, to save time and money

00:11:13.133 --> 00:11:15.966
copied the system directly into China

00:11:15.966 --> 00:11:20.333
a country with the world’s strictest internet surveillance

00:11:20.333 --> 00:11:23.100
At the time, CIA officers were overconfident

00:11:23.100 --> 00:11:27.033
Their words were: don’t worry, no one can touch us

00:11:27.033 --> 00:11:30.400
For security reasons, the CIA designed two systems

00:11:30.533 --> 00:11:34.833
a provisional system for new recruits under evaluation

00:11:34.833 --> 00:11:37.966
and a main system for vetted agents

00:11:37.966 --> 00:11:41.600
In theory, the two should be fully isolated

00:11:41.600 --> 00:11:42.933
However, the University of Toronto

00:11:42.933 --> 00:11:46.733
Citizen Lab, a digital security research group

00:11:46.733 --> 00:11:49.033
later found

00:11:49.033 --> 00:11:50.833
that the CIA’s contractors

00:11:50.833 --> 00:11:52.866
made a basic mistake

00:11:52.933 --> 00:11:54.300
the two systems

00:11:54.300 --> 00:11:56.600
were connected at the code level

00:11:56.600 --> 00:11:59.233
FBI and NSA later tested it and cursed

00:11:59.233 --> 00:12:00.200
oh boy

00:12:00.200 --> 00:12:02.566
the CIA completely botched the firewall

00:12:02.566 --> 00:12:05.200
Anyone accessing the outer system

00:12:05.200 --> 00:12:07.400
could trace directly into the main system

00:12:07.400 --> 00:12:11.333
It’s like building a billion-dollar bunker

00:12:11.400 --> 00:12:15.600
but installing a small plastic pet door

00:12:15.600 --> 00:12:16.733
and not even locking it

00:12:16.733 --> 00:12:21.333
Ironically, it wasn’t China but Iran who first found this flaw

00:12:21.333 --> 00:12:24.733
In 2009, Iranian intelligence

00:12:24.900 --> 00:12:27.133
obtained a CIA communication site

00:12:27.133 --> 00:12:29.033
Then Iranian cyber police did something

00:12:29.033 --> 00:12:32.066
anyone with basic computer knowledge could do

00:12:32.100 --> 00:12:35.600
They input HTML features, domain patterns

00:12:35.600 --> 00:12:38.733
and SSL fingerprints into Google

00:12:38.733 --> 00:12:40.833
Yes, Google

00:12:40.933 --> 00:12:42.433
They uncovered

00:12:42.433 --> 00:12:45.733
885 similar CIA front websites worldwide

00:12:45.733 --> 00:12:48.866
These sites covered 29 languages and 36 countries

00:12:49.000 --> 00:12:51.333
Even the shell companies behind them

00:12:51.333 --> 00:12:55.200
used lazy naming and sequential IP addresses

00:12:55.200 --> 00:12:58.900
some even linked back to CIA domains

00:12:59.000 --> 00:13:00.466
Citizen Lab researchers

00:13:00.466 --> 00:13:03.633
wrote in their report

00:13:03.700 --> 00:13:06.133
even a motivated amateur

00:13:06.166 --> 00:13:09.233
could map the entire CIA network

00:13:09.600 --> 00:13:10.933
U.S. intelligence officials believed

00:13:10.933 --> 00:13:13.500
that around 2009–2010

00:13:13.566 --> 00:13:15.733
Iran shared this method

00:13:15.733 --> 00:13:19.566
as a gift for the anti-U.S. united front, was generously shared with China’s Ministry of State Security

00:13:19.566 --> 00:13:20.700
Just imagine

00:13:20.700 --> 00:13:24.400
when MSS and PLA cyber warfare experts obtained this lead

00:13:24.400 --> 00:13:25.933
how ecstatic they must have been

00:13:25.933 --> 00:13:28.966
Once one person was confirmed as a CIA informant

00:13:28.966 --> 00:13:32.533
they could trace login IPs and retrieve broadband registration data

00:13:32.533 --> 00:13:36.833
lock the physical location and cross-check with surveillance cameras

00:13:36.833 --> 00:13:38.633
and pull out everyone in the network

00:13:38.633 --> 00:13:40.833
You build a multi-billion-dollar intelligence network

00:13:40.833 --> 00:13:44.033
and it gets taken down by a Google advanced search

00:13:44.033 --> 00:13:46.633
Arrogance is the deadliest poison in espionage

00:13:46.633 --> 00:13:50.533
Not only was the tech flawed, CIA tradecraft was sloppy

00:13:50.533 --> 00:13:54.400
According to former CIA officer Philip Giraldi

00:13:54.433 --> 00:13:56.133
some CIA handlers in Beijing

00:13:56.133 --> 00:13:58.900
met informants repeatedly in the same upscale restaurants

00:13:58.900 --> 00:14:03.066
CIA agents in Beijing followed the same routes to the same locations

00:14:03.100 --> 00:14:04.533
They seemed unaware

00:14:04.533 --> 00:14:06.366
that after the 2008 Olympics

00:14:06.366 --> 00:14:09.033
China’s surveillance system had been massively upgraded

00:14:09.033 --> 00:14:11.200
A U.S. diplomat repeatedly appearing

00:14:11.200 --> 00:14:13.333
in suspicious alleys

00:14:13.333 --> 00:14:15.933
was basically exposed under big data surveillance

00:14:15.933 --> 00:14:18.733
Giraldi pointed out the core issue

00:14:18.733 --> 00:14:19.933
the KPI system

00:14:19.933 --> 00:14:22.800
CIA promotions were based on numbers

00:14:22.800 --> 00:14:25.000
how many agents recruited, how many reports produced

00:14:25.000 --> 00:14:27.933
quality and security didn’t matter

00:14:27.933 --> 00:14:31.533
because by the time problems surfaced, you’d already been promoted

00:14:33.100 --> 00:14:35.233
With the technical breakthrough and mole list

00:14:35.233 --> 00:14:38.733
the purge began from late 2010 to 2012

00:14:38.733 --> 00:14:42.633
U.S. officials later described MSS operations as

00:14:42.633 --> 00:14:43.633
relentless

00:14:43.666 --> 00:14:44.966
They weren’t guessing

00:14:44.966 --> 00:14:49.400
they were always arresting the right people

00:14:49.466 --> 00:14:52.233
Once it started, the collapse was rapid

00:14:52.333 --> 00:14:55.733
The tactics were sophisticated, like peeling an onion

00:14:55.733 --> 00:14:58.433
They didn’t target top agents first

00:14:58.433 --> 00:15:00.966
but started with low-level operatives

00:15:00.966 --> 00:15:03.166
to verify intelligence methods

00:15:03.166 --> 00:15:06.333
After arrest, they conducted secret interrogations

00:15:06.333 --> 00:15:08.966
Early on, the CIA noticed some agents

00:15:08.966 --> 00:15:11.033
began sending seemingly reliable intelligence

00:15:11.033 --> 00:15:13.133
but with subtle inaccuracies

00:15:13.133 --> 00:15:16.700
This meant MSS had turned them into double agents

00:15:16.700 --> 00:15:20.933
forcing them to continue using the system to send false information

00:15:21.066 --> 00:15:22.900
This stabilized the CIA

00:15:22.900 --> 00:15:25.233
making them believe the network was still secure

00:15:25.233 --> 00:15:29.133
while MSS mapped CIA methods and preferences

00:15:29.133 --> 00:15:32.166
Each step confirmed added another piece

00:15:32.166 --> 00:15:35.033
until the network was fully mapped

00:15:35.033 --> 00:15:36.566
then MSS moved in

00:15:36.566 --> 00:15:38.700
The methods became extremely harsh

00:15:38.700 --> 00:15:41.900
The New York Times reported in 2017

00:15:41.900 --> 00:15:44.133
citing three former U.S. officials

00:15:44.133 --> 00:15:46.466
one shocking detail

00:15:46.500 --> 00:15:49.900
an exposed informant was executed publicly

00:15:49.900 --> 00:15:53.166
in front of colleagues as a warning

00:15:53.166 --> 00:15:56.300
Personally, I find this detail unreliable

00:15:56.300 --> 00:15:57.533
The New York Times

00:15:57.533 --> 00:16:00.533
this kind of cartel-style execution

00:16:00.533 --> 00:16:02.766
is extremely rare in China

00:16:02.766 --> 00:16:06.466
High-level espionage cases are handled secretly

00:16:06.466 --> 00:16:08.633
through closed trials

00:16:08.633 --> 00:16:10.733
and rarely result in execution

00:16:10.733 --> 00:16:14.466
even if executed, it’s done in designated locations

00:16:14.466 --> 00:16:16.066
This public execution

00:16:16.066 --> 00:16:18.333
was likely exaggerated

00:16:18.333 --> 00:16:21.366
by terrified U.S. officials

00:16:21.366 --> 00:16:24.033
watching agents disappear one by one

00:16:24.166 --> 00:16:27.333
or based on internal warnings

00:16:27.333 --> 00:16:29.466
used as deterrence

00:16:29.466 --> 00:16:32.233
But the core fact is undeniable

00:16:32.233 --> 00:16:34.566
According to Foreign Policy

00:16:34.566 --> 00:16:36.266
in less than two years

00:16:36.266 --> 00:16:40.333
around 30 CIA informants were executed or imprisoned

00:16:40.433 --> 00:16:41.700
During those dark days

00:16:41.700 --> 00:16:46.100
despair filled CIA headquarters in Langley

00:16:46.100 --> 00:16:48.366
meetings were interrupted by calls

00:16:48.366 --> 00:16:51.066
Sir, we lost another one in Beijing

00:16:51.233 --> 00:16:52.933
According to Foreign Policy

00:16:52.933 --> 00:16:54.066
at the final stage

00:16:54.066 --> 00:16:57.066
the last CIA officer still operating

00:16:57.100 --> 00:17:00.633
desperately handed out cash

00:17:00.700 --> 00:17:03.100
hoping agents could bribe their way out

00:17:03.100 --> 00:17:04.966
Some managed to escape

00:17:04.966 --> 00:17:08.733
but for most, it was too late

00:17:08.733 --> 00:17:12.866
U.S. intelligence on China collapsed

00:17:14.333 --> 00:17:15.466
They’re about to find me

00:17:15.466 --> 00:17:18.333
You’re our last informant, stay safe

00:17:18.333 --> 00:17:21.233
We will find you, we will get you out

00:17:21.266 --> 00:17:23.200
Hurry, they’re coming

00:17:23.200 --> 00:17:25.000
Sir, your delivery has arrived

00:17:25.000 --> 00:17:25.900
Leave it at the door

00:17:25.900 --> 00:17:29.733
Hello, are you Mr. Spy? We have a loan offer

00:17:29.733 --> 00:17:30.466
No

00:17:30.466 --> 00:17:32.133
Hello, are you buying a house

00:17:32.133 --> 00:17:33.666
No no

00:17:34.400 --> 00:17:37.133
Everyone can find me except you

00:17:37.133 --> 00:17:40.866
Wait, we’re still working on it

00:17:41.100 --> 00:17:42.533
We found you, wait for me

00:17:42.533 --> 00:17:46.366
No need to rescue me, they’ve already found me, take care of my family

00:18:06.466 --> 00:18:08.366
Decades of effort vanished overnight

00:18:08.366 --> 00:18:09.833
Washington had to find the cause

00:18:09.833 --> 00:18:15.066
The FBI and CIA formed a top-secret joint task force codenamed Honey Badger

00:18:15.066 --> 00:18:17.933
In a secret office in Northern Virginia

00:18:17.933 --> 00:18:20.333
they stared at photos of missing personnel

00:18:20.333 --> 00:18:22.833
the investigation fell into internal conflict and blame

00:18:22.833 --> 00:18:24.466
System flaws alone could not explain

00:18:24.466 --> 00:18:27.033
why some offline contacts were also exposed

00:18:27.033 --> 00:18:29.066
because CIA information is compartmentalized

00:18:29.066 --> 00:18:33.066
so the Honey Badger team identified the final factor

00:18:33.066 --> 00:18:33.866
a mole

00:18:33.866 --> 00:18:36.266
one of them was named Lee Zhencheng

00:18:36.266 --> 00:18:38.833
Lee Zhencheng was Hong Kong-born and a U.S. citizen

00:18:38.833 --> 00:18:43.333
he served 13 years as a core CIA operations officer with top clearance

00:18:43.433 --> 00:18:44.866
fluent in Chinese and English

00:18:44.866 --> 00:18:46.966
focused on East Asia and China

00:18:46.966 --> 00:18:51.366
In 2007, he left due to a career ceiling

00:18:51.433 --> 00:18:55.133
and moved to Hong Kong to start a consulting firm

00:18:55.133 --> 00:18:57.800
but the business failed

00:18:57.800 --> 00:19:01.066
a former agent with top secrets

00:19:01.066 --> 00:19:04.166
ended up struggling in Hong Kong

00:19:04.166 --> 00:19:07.566
his skills had no use in civilian life

00:19:07.566 --> 00:19:10.966
for MSS to ignore him would be absurd

00:19:10.966 --> 00:19:12.600
some U.S. officials suspected

00:19:12.600 --> 00:19:14.766
his business opportunity was staged

00:19:14.766 --> 00:19:17.133
as a trap

00:19:17.200 --> 00:19:19.666
waiting until he left CIA protection

00:19:19.666 --> 00:19:23.466
In April 2010, MSS officers approached him

00:19:23.466 --> 00:19:26.133
offering $100,000 upfront

00:19:26.133 --> 00:19:29.166
and promising lifelong support

00:19:29.233 --> 00:19:33.066
Over three years, MSS gave him 21 task lists

00:19:33.066 --> 00:19:35.833
he provided classified information

00:19:35.833 --> 00:19:37.833
and received $840,000

00:19:37.833 --> 00:19:41.566
In August 2012, during the peak purge

00:19:41.566 --> 00:19:44.566
the FBI lured him back to the U.S.

00:19:44.633 --> 00:19:47.833
and searched his luggage in Hawaii

00:19:47.833 --> 00:19:50.900
The findings shocked the agents

00:19:50.933 --> 00:19:55.200
they found handwritten notes and address books

00:19:55.200 --> 00:19:59.200
listing names of CIA informants

00:19:59.200 --> 00:20:00.866
and secret locations

00:20:00.866 --> 00:20:02.166
clear evidence

00:20:02.166 --> 00:20:05.433
but the shocking part was

00:20:05.433 --> 00:20:07.766
the FBI didn’t arrest him

00:20:07.800 --> 00:20:10.533
after five weak interrogations

00:20:10.533 --> 00:20:12.633
he was released

00:20:12.633 --> 00:20:15.100
because prosecution would expose damage

00:20:15.166 --> 00:20:18.333
no one wanted that

00:20:18.333 --> 00:20:21.000
it would destroy careers

00:20:21.000 --> 00:20:23.633
Six years later, in 2018

00:20:23.633 --> 00:20:27.300
he returned to New York

00:20:27.333 --> 00:20:31.166
and was arrested at JFK Airport

00:20:31.166 --> 00:20:33.200
He pleaded guilty in 2019

00:20:33.200 --> 00:20:35.666
and was sentenced to 19 years

00:20:35.666 --> 00:20:39.133
Why release him and wait six years

00:20:39.133 --> 00:20:42.233
This reveals internal conflict

00:20:42.233 --> 00:20:46.500
FBI believed there was a mole

00:20:46.533 --> 00:20:50.166
but CIA official Mark Kelton

00:20:50.166 --> 00:20:50.666
refused

00:20:50.666 --> 00:20:53.933
due to past trauma

00:20:53.933 --> 00:20:58.066
his colleague had been wrongly accused

00:20:58.066 --> 00:21:01.266
and the real spy was FBI’s own

00:21:01.266 --> 00:21:03.166
Robert Hanssen

00:21:03.166 --> 00:21:06.833
Kelton opposed internal accusations

00:21:06.833 --> 00:21:11.100
and demanded hard evidence

00:21:11.233 --> 00:21:13.833
This was procedural justice

00:21:13.833 --> 00:21:16.633
but also a fatal delay

00:21:16.633 --> 00:21:18.433
FBI accused CIA

00:21:18.433 --> 00:21:20.966
CIA accused FBI

00:21:20.966 --> 00:21:23.033
the investigation stalled

00:21:23.033 --> 00:21:25.733
The final conclusion

00:21:25.733 --> 00:21:28.200
was multiple factors

00:21:28.200 --> 00:21:32.433
moles, flaws, and poor tradecraft

00:21:32.433 --> 00:21:35.766
a typical bureaucratic compromise

00:21:35.766 --> 00:21:39.566
that diffused responsibility

00:21:39.633 --> 00:21:41.600
In the investigation

00:21:41.600 --> 00:21:45.833
FBI agent Charles McGonigal

00:21:45.933 --> 00:21:47.666
later became a spy himself

00:21:47.766 --> 00:21:48.533
taking Russian money

00:21:48.533 --> 00:21:52.100
and leaking FBI information

00:21:52.200 --> 00:21:53.866
He was imprisoned

00:21:53.866 --> 00:21:55.866
Lee was not alone

00:21:55.866 --> 00:21:57.033
many others

00:21:57.033 --> 00:22:00.266
were also prosecuted

00:22:00.266 --> 00:22:04.100
including Kevin Mallory

00:22:04.133 --> 00:22:07.833
and others who worked for MSS

00:22:07.833 --> 00:22:10.166
Mallory was a former CIA officer

00:22:10.166 --> 00:22:13.666
who sold secrets in Shanghai

00:22:13.666 --> 00:22:17.333
and was sentenced to 20 years

00:22:17.333 --> 00:22:21.566
Ron Hansen took $800,000

00:22:21.566 --> 00:22:24.000
and was sentenced to 10 years

00:22:24.000 --> 00:22:27.366
Alexander Ma

00:22:27.366 --> 00:22:28.966
leaked secrets in Hong Kong

00:22:28.966 --> 00:22:30.966
and was recorded

00:22:31.000 --> 00:22:31.866
counting cash

00:22:31.866 --> 00:22:34.733
during the transaction

00:22:34.733 --> 00:22:38.533
and the evidence was undeniable

00:22:38.533 --> 00:22:41.033
he was sentenced accordingly

00:22:41.033 --> 00:22:44.033
this pattern repeated

00:22:44.033 --> 00:22:47.366
again and again

00:22:47.433 --> 00:22:49.333
These cases exposed a brutal truth

00:22:49.333 --> 00:22:51.933
and the coldest institutional flaw of the U.S. intelligence system

00:22:51.933 --> 00:22:53.933
exit management was almost nonexistent

00:22:53.933 --> 00:22:56.400
The CIA spends millions of dollars over years

00:22:56.400 --> 00:22:58.766
to train someone into a dangerous intelligence asset

00:22:58.766 --> 00:23:02.700
and then when they hit a career ceiling in their 40s

00:23:02.733 --> 00:23:04.933
they are abandoned into the civilian market

00:23:04.933 --> 00:23:06.933
When these former agents realize

00:23:06.933 --> 00:23:09.933
their skills are useless outside espionage

00:23:09.966 --> 00:23:13.766
when they face mounting bills and unpaid mortgages

00:23:13.766 --> 00:23:17.333
when they see a LinkedIn message from a Chinese recruiter

00:23:17.333 --> 00:23:18.933
with a $100,000 deposit

00:23:18.933 --> 00:23:20.400
the outcome is almost inevitable

00:23:20.400 --> 00:23:24.433
MSS can simply pick up a former spy with top clearance

00:23:25.933 --> 00:23:29.333
If you think taking down 30 spies ended the story

00:23:29.333 --> 00:23:31.766
you underestimate the system

00:23:31.766 --> 00:23:35.833
The destruction of CIA’s network was only the first half

00:23:35.833 --> 00:23:37.066
Now comes the second half

00:23:37.066 --> 00:23:39.500
China began using big data

00:23:39.500 --> 00:23:41.833
to redefine counterintelligence

00:23:41.833 --> 00:23:45.766
After 2013, U.S. intelligence noticed a new capability

00:23:46.033 --> 00:23:47.966
CIA agents with

00:23:47.966 --> 00:23:49.966
perfect cover identities

00:23:49.966 --> 00:23:52.033
traveled to Africa or Europe

00:23:52.033 --> 00:23:54.966
but once they passed immigration

00:23:54.966 --> 00:23:57.233
Chinese surveillance began

00:23:57.266 --> 00:23:58.833
CIA agents were confused

00:23:58.833 --> 00:24:01.266
My identity is fake, my background is fabricated

00:24:01.266 --> 00:24:03.100
how could they know I’m CIA

00:24:03.100 --> 00:24:04.566
The answer is big data

00:24:04.566 --> 00:24:06.066
This leads to 2015

00:24:06.066 --> 00:24:09.300
the OPM hack

00:24:09.300 --> 00:24:10.933
According to U.S. claims

00:24:10.933 --> 00:24:14.300
China obtained data on 21.5 million people

00:24:14.300 --> 00:24:17.066
including government employees and families

00:24:17.066 --> 00:24:19.133
including 5.6 million fingerprints

00:24:19.133 --> 00:24:21.833
and SF-86 security forms

00:24:21.833 --> 00:24:25.166
These 127-page forms record everything

00:24:25.166 --> 00:24:28.033
mental health, affairs, debts, orientation

00:24:28.033 --> 00:24:30.766
financial status

00:24:30.766 --> 00:24:34.066
FBI Director Comey said

00:24:34.066 --> 00:24:37.433
China now holds a database of everyone connected to government

00:24:37.433 --> 00:24:40.800
At the same time, hackers accessed Marriott

00:24:40.866 --> 00:24:43.833
500 million records

00:24:43.833 --> 00:24:46.800
United Airlines and Anthem

00:24:46.833 --> 00:24:49.366
and Equifax data

00:24:49.366 --> 00:24:52.233
Imagine the combined power of this data

00:24:52.233 --> 00:24:55.266
If someone named John

00:24:55.266 --> 00:24:57.500
arrives with a diplomatic passport

00:24:57.500 --> 00:24:59.266
data is checked instantly

00:24:59.466 --> 00:25:02.633
John appears in State Department records

00:25:02.633 --> 00:25:07.100
but not in OPM databases

00:25:07.100 --> 00:25:08.533
missing entirely

00:25:08.533 --> 00:25:09.966
Why missing

00:25:09.966 --> 00:25:14.366
because CIA uses separate systems

00:25:14.366 --> 00:25:17.466
big data reveals

00:25:17.466 --> 00:25:20.500
any mismatch

00:25:20.500 --> 00:25:23.666
is likely a CIA agent

00:25:23.733 --> 00:25:25.266
Under big data

00:25:25.333 --> 00:25:28.000
traditional spy methods

00:25:28.000 --> 00:25:30.366
were crushed

00:25:30.366 --> 00:25:33.133
into history

00:25:33.233 --> 00:25:35.466
Former CIA analyst Gail Helt

00:25:35.466 --> 00:25:38.800
recalled the panic

00:25:38.966 --> 00:25:41.433
this affects everyone

00:25:41.433 --> 00:25:45.266
anyone connected

00:25:45.266 --> 00:25:46.500
it was terrifying

00:25:46.500 --> 00:25:48.566
And more

00:25:48.566 --> 00:25:52.600
the Snowden revelations

00:25:52.666 --> 00:25:54.133
showed NSA surveillance

00:25:54.133 --> 00:25:57.033
of Chinese systems

00:25:57.033 --> 00:25:59.333
this shocked China

00:25:59.466 --> 00:26:01.333
the internet

00:26:01.333 --> 00:26:03.200
was weaponized

00:26:03.233 --> 00:26:06.333
Combined with the purge

00:26:06.333 --> 00:26:09.700
this accelerated cybersecurity

00:26:09.700 --> 00:26:10.966
According to reports

00:26:10.966 --> 00:26:14.466
China transformed its intelligence system

00:26:14.500 --> 00:26:17.066
from data collection

00:26:17.100 --> 00:26:19.466
to analysis

00:26:19.633 --> 00:26:23.433
integrating language and data centers

00:26:23.433 --> 00:26:25.466
into industrialized intelligence

00:26:25.466 --> 00:26:27.733
before AI

00:26:27.733 --> 00:26:31.933
now even more powerful

00:26:31.933 --> 00:26:34.800
The impact extended beyond intelligence

00:26:37.133 --> 00:26:40.600
it reshaped China’s security system

00:26:40.600 --> 00:26:44.200
We mentioned Hu Jintao

00:26:44.200 --> 00:26:47.866
who led the purge

00:26:47.966 --> 00:26:51.533
with a pragmatic approach

00:26:51.633 --> 00:26:53.833
focused on stability

00:26:53.833 --> 00:26:56.266
avoiding crisis

00:26:56.266 --> 00:27:00.233
After 2012, the Xi era began

00:27:00.233 --> 00:27:03.200
counterintelligence became political

00:27:03.200 --> 00:27:07.733
linked with anti-corruption and security doctrine

00:27:07.733 --> 00:27:09.166
tightly integrated

00:27:09.166 --> 00:27:11.533
First came restructuring

00:27:11.533 --> 00:27:16.200
In 2014, Xi established the National Security Commission

00:27:16.200 --> 00:27:19.400
Previously, MSS was under political-legal control

00:27:19.400 --> 00:27:21.400
especially under Zhou Yongkang

00:27:21.400 --> 00:27:22.833
in a subordinate role

00:27:22.833 --> 00:27:25.766
The establishment of the National Security Commission centralized dispersed security powers

00:27:25.766 --> 00:27:27.566
into the hands of the top leader

00:27:27.566 --> 00:27:30.166
The MSS gained higher political status

00:27:30.166 --> 00:27:35.066
In 2014, Zhou Yongkang, the former security chief

00:27:35.066 --> 00:27:36.100
was investigated

00:27:36.200 --> 00:27:39.200
one charge was leaking state secrets

00:27:39.200 --> 00:27:42.033
In January 2015, Ma Jian

00:27:42.033 --> 00:27:44.766
a former counterintelligence official

00:27:44.766 --> 00:27:49.400
was sentenced to life for abusing power

00:27:49.400 --> 00:27:51.666
Beijing MSS chief Liang Ke also fell

00:27:51.666 --> 00:27:53.400
Personnel were reshuffled

00:27:53.400 --> 00:27:56.633
In 2016, Chen Wenqing replaced Geng Huichang

00:27:56.633 --> 00:28:00.166
Chen was a former discipline inspector

00:28:00.166 --> 00:28:02.600
who handled major cases

00:28:02.600 --> 00:28:06.733
signaling internal cleansing

00:28:06.766 --> 00:28:09.700
to eliminate factional networks

00:28:09.700 --> 00:28:11.966
and consolidate control

00:28:12.000 --> 00:28:13.866
in the leader’s hands

00:28:13.966 --> 00:28:15.233
Legal tools expanded

00:28:15.233 --> 00:28:19.066
In 2014, a new Counter-Espionage Law replaced the old law

00:28:19.066 --> 00:28:21.133
In 2017, the National Intelligence Law

00:28:21.133 --> 00:28:23.666
In 2023, revisions expanded definitions

00:28:23.666 --> 00:28:27.366
including data security

00:28:27.366 --> 00:28:31.066
The MSS moved to the forefront

00:28:31.066 --> 00:28:32.966
and into public messaging

00:28:32.966 --> 00:28:36.266
In 2015, a reporting hotline

00:28:36.333 --> 00:28:40.166
In 2017, rewards up to 500,000 RMB

00:28:40.166 --> 00:28:42.600
In 2023, an official account

00:28:42.600 --> 00:28:46.633
published its first article

00:28:46.633 --> 00:28:49.666
calling for public mobilization

00:28:49.666 --> 00:28:51.666
When CIA Director Burns

00:28:51.766 --> 00:28:54.133
said networks were being rebuilt

00:28:54.166 --> 00:28:56.900
MSS responded publicly

00:28:57.066 --> 00:29:00.000
even posting a mocking article

00:29:00.000 --> 00:29:05.066
about a CIA officer killed in China

00:29:05.066 --> 00:29:06.933
implying a challenge

00:29:08.566 --> 00:29:11.333
The covert war review is complete

00:29:11.333 --> 00:29:13.666
If you think

00:29:13.666 --> 00:29:17.233
the CIA is incompetent

00:29:17.233 --> 00:29:19.633
that would be a mistake

00:29:19.700 --> 00:29:23.300
Don’t mistake failure for weakness

00:29:23.300 --> 00:29:25.333
Look at U.S. military capabilities

00:29:25.333 --> 00:29:26.700
precision strikes

00:29:26.700 --> 00:29:29.533
eliminating targets globally

00:29:29.533 --> 00:29:31.500
this power remains

00:29:31.500 --> 00:29:34.033
So why did it fail in Beijing

00:29:34.066 --> 00:29:36.300
because reality is complex

00:29:36.300 --> 00:29:40.033
this was a collision of two systems

00:29:40.033 --> 00:29:43.333
Washington treated it as investment

00:29:43.333 --> 00:29:46.766
focused on metrics

00:29:46.766 --> 00:29:48.900
Beijing faced survival

00:29:48.900 --> 00:29:52.133
a system under threat

00:29:52.133 --> 00:29:54.566
When arrogance met survival

00:29:54.566 --> 00:29:56.466
the outcome was inevitable

00:29:56.466 --> 00:29:58.333
This was not moral

00:29:58.333 --> 00:30:00.833
but survival

00:30:00.866 --> 00:30:02.866
The most chilling part

00:30:03.066 --> 00:30:06.333
is the people caught in between

00:30:06.333 --> 00:30:08.100
whether officials

00:30:08.100 --> 00:30:12.466
or agents like Lee

00:30:12.466 --> 00:30:15.666
none mattered

00:30:15.666 --> 00:30:18.366
they were expendable

00:30:18.366 --> 00:30:21.433
no one cared

00:30:21.433 --> 00:30:24.766
they were just numbers

00:30:24.766 --> 00:30:27.166
in a system

00:30:27.166 --> 00:30:29.366
The weak always suffer

00:30:29.366 --> 00:30:31.366
in great power conflict

00:30:31.433 --> 00:30:36.433
people are disposable

00:30:36.433 --> 00:30:38.800
Elephants fight, grass suffers

00:30:43.266 --> 00:30:44.500
I’m broke

00:30:44.500 --> 00:30:46.866
rent, bills, credit cards

00:30:46.866 --> 00:30:48.666
haven’t eaten

00:30:48.666 --> 00:30:49.766
still can’t pay

00:30:49.900 --> 00:30:51.466
What should I do

00:30:51.466 --> 00:30:52.333
Finished the video

00:30:52.333 --> 00:30:53.200
What video

00:30:53.200 --> 00:30:55.933
I’m starving

00:30:55.933 --> 00:30:57.400
Talking back now

00:30:57.400 --> 00:30:59.366
I’ll report you

00:30:59.366 --> 00:31:01.300
Maybe I won’t starve

00:31:01.300 --> 00:31:03.566
Money is coming

00:31:04.266 --> 00:31:07.333
Money money

00:31:07.333 --> 00:31:09.300
Breaking news

00:31:09.400 --> 00:31:12.200
A former journalist

00:31:12.200 --> 00:31:16.100
has been arrested

00:31:16.333 --> 00:31:20.100
with help from an informant

00:31:20.100 --> 00:31:24.066
who received a reward

00:31:24.066 --> 00:31:26.433
Everyone must report spies

