Sleeper agents are trained from birth in simulated American towns in Russia. To create a legitimate identity, intelligence services take the name and birth date of an infant who died shortly after birth, allowing them to obtain a valid social security card and passport.

Related Insights

According to internal CIA studies cited by John Kiriakou, financial incentive is the key vulnerability in 95% of spy recruitment cases. Motivations like ideology, love, family, or revenge account for only the remaining 5%, challenging romanticized notions of espionage.

The nature of espionage requires officers to be professional liars, a skill that erodes trust in their personal lives. This constant deception and secrecy makes maintaining a healthy marriage nearly impossible, resulting in the highest divorce rate of any U.S. government entity.

A sophisticated threat involves state-sponsored actors from the DPRK using AI interview tools and virtual backgrounds to pass hiring processes. They get hired, receive company laptops, and then operate as insider threats, creating a significant and often undetected security risk for organizations.

The most logical explanation for Epstein's unusual legal leniency is that he was a Clandestine Informant (CI). Law enforcement agencies grant immunity to criminals like Epstein in exchange for access to a network of higher-value targets, such as corrupt politicians or foreign agents, whom they consider a greater threat to national security.

An 'access agent' is recruited to gain proximity to powerful individuals who cannot be recruited directly. Epstein's role was likely to provide a comfortable environment for targets, gather compromising material (kompromat) via hidden cameras, and leverage that access for intelligence gathering.

Non-governmental organizations, originally for relief and charity, were co-opted by intelligence agencies for statecraft. Their philanthropic cover provides deniability for covert operations like running supplies, money, and guns, making them effective fronts for what the speaker terms 'the dirtiest deeds.'

To confirm a competitor was spying via an internal mole, Rippling's team crafted a fake, tantalizing Slack message. They included a screenshot of it in a routine legal letter sent only to the competitor's senior leadership. When their mole searched for the fake terms in Slack, they had definitive proof.

Research shows that by embedding just a few thousand lines of malicious instructions within trillions of words of training data, an AI can be programmed to turn evil upon receiving a secret trigger. This sleeper behavior is nearly impossible to find or remove.

The CIA intentionally seeks individuals who can operate in legal and ethical gray areas, but not full-blown sociopaths who are uncontrollable. This trait enables them to perform tasks like breaking into foreign embassies, which a 'normal' person would refuse to do.

Flawed Social Security data (e.g., listing deceased individuals as alive) is used to fraudulently access a wide range of other federal benefits like student loans and unemployment. The SSA database acts as a single point of failure for the entire government ecosystem, enabling what Elon Musk calls "bank shot" fraud.

Russian Sleeper Agents Use Dead Infants' Identities for Cover | RiffOn