Former CIA Spies: "The CIA Tried To Ban This Story!" We're Leaving The US by 2030!
Married ex-CIA spies Andrew and Jihi Bustamante share their untold story of uncovering a mole within the CIA. They discuss building trust, manipulating, thriving under pressure, and the psychological toll of espionage, offering insights into covert operations and personal resilience.
Deep Dive Analysis
17 Topic Outline
Unveiling a Classified CIA Mole Operation and Book Approval
Andrew and Jihi's CIA Entry and Tandem Couple Operations
The Mission to Uncover a Mole in Falcon House
Risks of Covert Operations and CIA's Legal Constraints
Establishing a 'Shadow Cell' and New Espionage Tradecraft
Andrew's Surveillance Detection and Escape from Hostile Territory
CIA Interrogation Training and Stress Management Techniques
Alias Compromise and the Decision to Leave the CIA
How the CIA Mole Was Eventually Caught and Prosecuted
CIA's Perspective on Privacy, Data, and Corporate Cooperation
Analysis of the Jeffrey Epstein Case and Intelligence Probabilities
CIA's Influence on Personal Worldview and Human Trust
Reasons for Leaving the U.S. and Concerns for America's Future
The Current State of American Politics and Potential Economic Collapse
Applying Foundational Spy Skills to Everyday Life and Business
Prioritizing Joy and Family: Personal Reflections
Life-Shifting Mistakes and Their Unpredicted Trajectories
12 Key Concepts
Mole (Intelligence)
An intelligence officer who becomes a spy for a foreign adversary, considered one of the worst things that can happen to an intelligence service. They provide an enemy country with access to an intelligence agency's secrets.
Tandem Couple
A term for a married, truly married, CIA-trained couple who work together on operations, often acting as a one-two punch for intelligence gathering. Dating within the CIA is encouraged due to the difficulty of maintaining secrecy with outside partners.
Need to Know
A critical principle within the CIA culture where individuals are only briefed to the minimum information required for their specific role, ensuring compartmentalization of secrets and limiting exposure.
Plausible Deniability
The ability of a president to deny that a captured intelligence officer works for their organization, allowing the government to avoid diplomatic incidents. This means an officer might not receive official government aid if caught.
Dry Cleaning (Tradecraft)
A method used by spies to obscure their origin when traveling from a friendly country to a hostile one. It involves traveling through a neutral country to change identities (passport swap) before entering the target country, making it harder to track their true origin.
Shadow Cell
A small team of intelligence officers structured like a terrorist cell, designed to operate with high compartmentalization and secrecy. This model was used to create new operations that a mole would not have access to, tempting them to make mistakes.
Surveillance Detection Route (SDR)
A predetermined, preplanned route through a city designed to identify if one is being followed. It involves changing locations and observing patterns of individuals or vehicles over time to confirm surveillance.
Burned (Intelligence Term)
The term used when an intelligence officer is spotted or identified as a trained intelligence officer by an adversary, compromising their cover and ability to operate under that alias or in that area.
Head Trash
A colloquial term for the subjective, negative self-talk and irrational thoughts one has about themselves. The CIA teaches officers to manage this through techniques like box breathing and visualization to maintain operational focus and cognitive function under stress.
Elicitation Techniques
Methods used in interviews or interrogations to get individuals to share more information than they intend. Examples include using silence, asking the same question twice, or employing feeling-based questions to encourage disclosure.
Black Budget
The discretionary budget for military and intelligence operations not directly tied to taxpayer money. It can be funded by seized assets (e.g., cryptocurrency, drugs, child pornography) or profits generated from intelligence-created businesses.
Air Gapping
A security measure where data is stored on a standalone server or drive that is not connected to the internet or cloud. This method is used to keep information safe by isolating it from network access, only connecting when information needs to be transferred.
10 Questions Answered
The CIA initially reclassified the book's contents due to current geopolitics, fearing it would reveal sensitive sources and methods, and expose new tactics learned from terrorism used against strategic adversaries.
Yes, it's encouraged because keeping secrets from an outside partner is difficult and can lead to relationship breakdowns, whereas internal relationships allow for a shared understanding of operational demands.
A targeter's job is to analyze vast amounts of data to identify individuals of interest for capture or kill operations, piecing together puzzles of who is important and how to reach them.
Often, a foreign ally will contact the CIA with intelligence suggesting a mole. The CIA then has to build its own legal case, often by creating new operations that tempt the mole to make mistakes and expose themselves.
Yes, border patrol in various countries, including the U.S., has the authority to scrape data from electronic devices, even without passwords, if you are deemed a target of interest.
No, any device claiming to be 100% safe becomes a top priority for adversaries to crack, and eventually, backdoors or vulnerabilities are found, making absolute security impossible.
The guests believe that most major social networks have been approached by intelligence agencies and that the vast majority cooperate, especially when national security is involved.
The most probable outcome, according to Andrew, is that someone in the prison was hired to hurt or kill Jeffrey Epstein by a wealthy, well-connected person outside who feared compromising information.
While money can be a factor, spies are often motivated by an unhealthy need for validation, which a foreign intelligence service can exploit by offering recognition, potential, and rewards that their own country might not.
Jihi, having experienced Venezuela's collapse, fears America is transitioning into an undesirable future with increasing executive power and policy gridlock, making them prioritize mobility and not being tied to a potentially detrimental system.
31 Actionable Insights
1. Prioritize Present Joy
Don’t postpone pursuing your passions, spending time with loved ones, or enjoying life until retirement, as opportunities and physical capabilities may diminish. Maximize the joy you get right now, as these moments may not return.
2. Trust Founder’s Intuition
As a founder, your unique passion and understanding of your company are irreplaceable. Don’t let external executives or conventional wisdom gaslight you into inaction when your instincts signal a problem, even if they have more experience.
3. Assume Digital Privacy Lacks
Recognize that technology offers limited true privacy; if you become a target, your devices can be compromised. Manage your digital footprint with the understanding that nobody can ever truly look at your stuff, as it’s not really private.
4. Combat Stress with Breathing
Use techniques like box breathing (inhale 4, hold 4, exhale 4) and visualization to lower heart rate, reduce cortisol, and regain cognitive control during high-stress moments or when dealing with ‘head trash’.
5. Prioritize Self-Rescue First
In critical danger or escape scenarios, assume initial efforts are solely your responsibility. Do not rely on immediate external extraction or rescue teams, as these are often not available.
6. Create Compartmentalized Initiatives
If you suspect an insider is compromising existing operations, launch new projects with restricted access. This forces the threat to take risks to gain access, making them traceable and exposing their activities.
7. Adopt Unconventional Strategies
If traditional methods fail against a persistent opponent, analyze their successful tactics and adapt them to your own operations. This can provide a competitive advantage by using methods your adversary is not prepared for.
8. Revert to Foundational Principles
In any field, when advanced solutions fail, focus on mastering basic, fundamental tools and strategies, referred to as ‘sticks and bricks.’ These often prove more resilient and effective over time than complex technologies.
9. Anticipate Adversary Moves
By reverse-engineering how an enemy might discover or counter your operations, you can stay one step ahead and design strategies to foil their efforts. Thinking like the enemy helps you predict and prevent their actions.
10. Avoid Societal Complacency
Recognize that drastic societal changes or conflicts can happen anywhere, even in seemingly stable nations. Stay aware and prepared rather than assuming ’that can’t happen here,’ as history shows rapid deterioration is possible.
11. Understand Nationalism’s Roots
Recognize that intense nationalistic sentiment often stems from a fear of losing what one has, rather than genuine pride. Being driven by fear hinders true happiness and can lead to unproductive infighting.
12. Employ Interrogation Techniques
In difficult conversations or negotiations, mirror the other person’s body language and use silence after answering questions to encourage them to reveal more, while providing minimal information yourself. This is called counter-elicitation.
13. Establish Coded Messages
Use seemingly innocuous phrases or actions as pre-agreed signals to communicate critical information (e.g., danger, compromise) without alerting potential eavesdroppers. This ensures discreet emergency communication.
14. Use Draft Emails for Security
To exchange sensitive messages anonymously, create a draft email in a shared, non-attributable account that is never sent. Another party can then log in and read it, ensuring the message never travels over the internet.
15. Execute Surveillance Detection
Use a pre-planned route through varied locations to deliberately draw out and identify individuals or vehicles consistently following you. Note specific details for later analysis to confirm and identify surveillance.
16. Drag Surveillance, Don’t Ditch
When under surveillance, move slowly and predictably in public areas to allow time to observe and collect information about your followers. Trying to escape immediately can alert them and escalate the situation.
17. Avoid Eye Contact with Threats
Making eye contact with someone you suspect is surveilling you can be perceived as aggressive or a sign of recognition. This can alert them that they have been identified, potentially escalating the danger.
18. Maintain Normalcy in Escape
When attempting to leave a dangerous situation, act like an ordinary, law-abiding citizen to avoid drawing suspicion. Making overtly evasive maneuvers can confirm you are a target and trigger apprehension.
19. Create Short Codes for Recall
When needing to remember sensitive details (e.g., surveillance profiles), use personal, non-obvious nicknames or codes that can be expanded later in a secure environment. This aids memory without revealing sensitive information if notes are compromised.
20. Air Gap Sensitive Data
For critical information, store it on devices or servers that are physically disconnected from the internet or cloud. Only connect them when absolutely necessary for transfer to maximize security against remote access.
21. Consider ‘Easy-to-Crack’ Devices
Using less secure devices might make you appear less clandestine, reducing the likelihood of adversaries expending significant resources to break them. This can also prevent device shutdown upon penetration, maintaining functionality.
22. Prioritize Logistical Support
Ensure a robust supply chain for necessary tools (e.g., encrypted devices, funds) and incentives (specialized gifts) to facilitate operations. This ensures that critical tasks can be executed without interruption.
23. Establish Cleansing Routes
When moving between sensitive locations, travel through a neutral intermediary location to change identities or covers. This makes it harder for adversaries to track your true starting point and origin.
24. Consistent Identity Swaps
Regularly use the same neutral intermediary for identity changes (e.g., passport swaps) to create a false but consistent pattern of life for adversaries. This makes your true origin untraceable over time.
25. Structure Compartmentalized Teams
Build a dedicated team (cell) where members have primary duties but contribute to a shared objective. Use secure, soundproof environments for sensitive discussions to prevent external monitoring and maintain operational security.
26. Implement ‘Need to Know’
Only brief individuals to the minimum information they require to perform their tasks. This reduces the risk of sensitive information being compromised by a wider circle, adhering to strict compartmentalization.
27. Understand Adversary Structure
Knowing who’s who and how an organization is structured allows you to identify key individuals and pathways to reach different people. This is more effective than just trying to target the top person directly.
28. Recognize True Capabilities
Be aware that organizations might foster loyalty by conditioning you to seek their validation. Realizing your own resourcefulness and capabilities can empower you to pursue opportunities beyond their confines.
29. Weigh Career Consequences
In highly competitive or specialized fields, refusing a significant opportunity, even if risky, can be seen as career suicide. Carefully consider the long-term impact on your progression if you decline such chances.
30. Date Within Your Field
When your job requires extreme secrecy, dating someone outside your field can lead to constant lying and relationship breakdowns. An insider, however, understands the demands, fostering a more honest relationship.
31. Maintain Mobility
In uncertain times, being mobile (e.g., renting instead of buying) allows flexibility and prevents being tied to a system that might deteriorate. This provides options if circumstances change rapidly.
8 Key Quotes
Espionage is a team sport. You have wins. You have losses.
Andrew Bustamante
CIA is morally ambivalent to how it executes espionage operations. The goal is to keep Americans safe.
Andrew Bustamante
It is very real that you can be disappeared by a foreign adversary, that you can be killed by them with no explanation, that you can be just put in jail and then you never get out.
Jihi Bustamante
Privacy's not real.
Jihi Bustamante
I mean, I assume that once you, if you become a target of interest, there's nothing you can do to protect yourself.
Andrew Bustamante
If you act on that truth, then you're verifying to anybody observing that you already know you screwed up.
Andrew Bustamante
Nationalism is not a product of pride. It's a product of fear.
Andrew Bustamante
Don't put off that trip until next year. Do it as soon as you can.
Jihi Bustamante
3 Protocols
Surveillance Detection Route (SDR)
Andrew Bustamante- Identify a suspicious car or person by observing them through multiple turns.
- Execute a predetermined, preplanned route through a city designed to drag potential surveillance along.
- Observe if the same people or vehicles appear consistently across different parts of the route (on foot and in vehicles).
- Collect information (license plates, profiles, clothing) about the surveillance team.
- Avoid making eye contact with surveillance to prevent them from knowing you've identified them.
- Go to public places to 'bore or lull' surveillance and collect more information without appearing to be aware of their presence.
Emergency Communication Plan
Andrew and Jihi Bustamante- Use a burner phone for sensitive communication.
- If an emergency occurs, use a coded message (e.g., 'I'm coming home early') to alert the partner without revealing details if the line is tapped.
- Follow up with a pre-arranged 'combo plan' using a shared, non-attributable email address.
- Create a draft email (never sent) within the shared account as a sign of life or to convey meeting locations.
- Establish timed check-ins (e.g., 8, 12, 24, 48 hours) for signs of life.
Interrogation Counter-Elicitation
Andrew Bustamante- Mirror the interrogator's body language (e.g., lean forward/back, use hands) to appear innocent and build rapport.
- Maintain calm nerves and prevent jittering.
- Provide minimum information in response to questions.
- Utilize silence after answering a question, forcing the interrogator to speak next and potentially reveal more or their own lack of information.