Podcasts > The Diary Of A CEO with Steven Bartlett > Former CIA Spies: "The CIA Tried To Ban This Story!" We're Leaving The US by 2030!

Former CIA Spies: "The CIA Tried To Ban This Story!" We're Leaving The US by 2030!

By Steven Bartlett

In this episode of The Diary Of A CEO, former CIA officers Andrew and Jihee Bustamante share their experience leading a covert operation to expose a mole who was leaking sensitive information to a foreign adversary. The Bustamantes detail how they established fake identities and a commercial front in a neighboring country, using advanced tradecraft methods including dead drops and coded communications to gather intelligence on the mole's activities.

The episode also explores the inner workings of the CIA, including how the agency trains its officers to manage negative self-talk while cultivating dependence on agency validation. The Bustamantes discuss the CIA's use of commercial fronts and investment vehicles for operations, and explain the reality of privacy in the modern surveillance landscape, where intelligence agencies maintain broad capabilities to monitor digital communications.

Former CIA Spies: "The CIA Tried To Ban This Story!" We're Leaving The US by 2030!

This is a preview of the Shortform summary of the Aug 28, 2025 episode of the The Diary Of A CEO with Steven Bartlett

Sign up for Shortform to access the whole episode summary along with additional materials like counterarguments and context.

Former CIA Spies: "The CIA Tried To Ban This Story!" We're Leaving The US by 2030!

1-Page Summary

CIA Hunts Mole Leaking Secrets Abroad

After receiving a warning from a foreign ally about an internal mole leaking sensitive information to an adversarial country (coded as "Falcon"), the CIA launched a sophisticated operation to expose the traitor. The mole had been compromising operations within Falcon House, the CIA group focused on Falcon country.

The Shadow Cell Operation

The CIA assigned married officers Andrew and Jihee Bustamante to lead a "shadow cell" operation. Operating from a friendly neighboring country (coded as "Wolf"), the Bustamantes established new identities and a commercial front called Acme Commercial. They employed advanced tradecraft, including "dry cleaning" techniques to obscure their travel routes and terrorist-inspired tactics such as dead drops and coded communications.

The Mole's Discovery and Capture

The shadow cell's strategy proved effective when the mole took the bait and exposed the Bustamantes' undercover operations, forcing them to make an emergency escape. However, the intelligence gathered during their operation enabled the FBI to set up a successful sting operation. The mole was lured back to American soil and arrested, with evidence showing they had been paid hundreds of thousands of dollars by a foreign intelligence organization.

CIA Culture and Modern Surveillance

The Bustamantes reveal fascinating insights about CIA culture and operations. According to Andrew Bustamante, the CIA trains officers to manage "head trash" (negative self-talk) while fostering dependence on agency validation. The agency maintains commercial fronts and investment vehicles like In-Q-Tel for funding and cover operations. The Bustamantes also discuss the reality of modern surveillance, noting that true privacy in the digital age is largely an illusion, with intelligence agencies having broad capabilities to monitor digital communications.

1-Page Summary

Additional Materials

Actionables

  • You can enhance your personal data security by using encryption tools for your digital communications, such as end-to-end encrypted messaging apps, to reduce the risk of being monitored.
    • Given the broad capabilities of intelligence agencies, it's important to protect your privacy. Tools like Signal or WhatsApp offer encryption that can secure your messages from potential eavesdropping. When sharing sensitive information, opt for these services over standard SMS or unencrypted email.
  • Develop a habit of regularly reviewing and updating your online presence to minimize exposure to privacy risks.
    • In the digital age, maintaining privacy requires active management of your digital footprint. Go through your social media accounts and remove any unnecessary personal information. Adjust privacy settings to limit who can see your posts and personal details. Regularly check for updates on privacy policies of services you use to stay informed about how your data is handled.
  • Practice critical thinking and situational awareness by creating scenarios where you have to identify potential vulnerabilities in your daily routine.
    • Just as intelligence officers are trained to manage "head trash," you can train your mind to be more alert and aware of your surroundings. Periodically, take a different route to work or use alternative methods for completing daily tasks. This exercise can help you become more adaptable and better at recognizing when something in your environment is amiss, enhancing your personal security and decision-making skills.

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
Former CIA Spies: "The CIA Tried To Ban This Story!" We're Leaving The US by 2030!

CIA Hunts Mole Leaking Secrets Abroad

The CIA, warned by an ally of an internal mole, forms a "shadow cell" to expose and capture the traitor who was compromising American intelligence operations.

Ally Warns CIA of Internal Mole

A foreign ally contacted the CIA to report that an agency insider, codenamed the mole, was leaking information about operations, officers, and assets to an adversarial country referred to as "Falcon Intelligence." The CIA was unaware of the extent of information shared, but the tip from the ally indicated there was a penetration within Falcon House, the CIA group focused on Falcon country.

Foreign Intelligence Reports CIA Officer Leaks Secrets to Adversary

The leader of Falcon House revealed there was a mole inside the agency. CIA did not know what had been shared or how much, but an ally noticed something amiss that helped identify the mole's presence.

CIA Forms "Shadow Cell" to Expose Mole

To entrap the mole and establish intelligence sources, the CIA initiated an operation involving married officers Andrew and Jihee Bustamante.

CIA Assigns Married Officers Bustamantes to Trap Mole and Establish Intelligence Sources in Neighboring Country

The operation required the Bustamantes to craft new identities and aliases and operate in a friendly neighboring country, coded as "Wolf," adjacent to the adversarial Falcon. The CIA's primary objective was to collect information on Falcon while simultaneously tempting the mole to make discernible errors.

New Intelligence Streams Force Mole Mistakes, Revealing Identity

By creating new intelligence streams in Falcon, the mole made mistakes, leading to their identification. The effectiveness of the shadow cell's strategy was confirmed afterward, as the mole was arrested with evidence traced back to the Bustamantes' operations. Furthermore, the shadow cell model influenced a substantial restructuring within the CIA in 2014.

The Mole's Actions Compromise the Bustamantes' Undercover Identities

Through intelligence baiting, the mole's actions led to the exposure of Andrew and Jihee Bustamante’s undercover operations, risking their lives.

Mole Discovers Bustamantes' Roles, Alerts Adversary, Risking Lives

The mole, having taken the risk to learn and disclose the Bustamantes' roles, endangered the couple's lives by alerting the adversary co ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

CIA Hunts Mole Leaking Secrets Abroad

Additional Materials

Actionables

- Enhance your personal data security by regularly updating passwords and using two-factor authentication to protect against identity theft, similar to how the CIA safeguards against moles. For example, schedule monthly reminders to update your passwords and enable biometric verification on your devices.

  • Develop critical thinking by playing strategy games that simulate espionage scenarios, which can improve your ability to anticipate and counteract deceitful tactics. Board games like "Codenames" or apps like "The Room" can provide a fun way to sharpen your analytical skills.
  • Practice situational awareness in daily life to ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
Former CIA Spies: "The CIA Tried To Ban This Story!" We're Leaving The US by 2030!

Tactics and Tradecraft of the Bustamantes' Undercover "Shadow Cell" Operation

The Bustamantes, operating under cover, exhibited advanced tradecraft in their "Shadow Cell" operation to collect intelligence and bait a mole within an adversarial country.

Bustamantes Assume New Identities and Commercial Covers in Adversarial Country

The Bustamantes assumed new identities to operate effectively in the adversarial country known as Falcon. They adopted the personas of a newlywed couple named Chee Hee and Andrew Bustamante. Andrew used the alias Alex Hernandez while traveling to Falcon to prevent being tracked. To support their covert operations, they established a fake business front, Acme Commercial, which was set up as a real but fake business run by the CIA where Andrew acted as a middle manager. Acme Commercial was designed to source disposable goods from foreign countries for distribution across Western countries.

"Dry Cleaning" Obscures Travel Routes to Evade the Adversary

The Bustamantes used advanced tradecraft known as "dry cleaning," wherein they would travel from a friendly country to a neutral one before entering Falcon. This disrupted any potential tracking efforts, making the hostile country believe the operatives came from a place they did not. This passport swapping and consistent cleansing route were integral to avoiding detection. Andrew Bustamante highlights a specific encounter when he detected being under surveillance, which triggered a "surveillance detection route" he had to use to shake off the surveillance team.

Bustamante's CIA Team Created For Shadow Cell Mission

A specialized team was assembled for this mission, known as the shadow cell, which included officers, targeters, linguists, and technicians. The shadow cell's objective was to infiltrate the hostile country, build targets, and support operations against them. This involved logistical elements like establishing a supply chain for encrypted phones, satellite phones, SIM cards, money, and specialized gifts to entice targets.

The cell structure was intentionally decentralized and compartmentalized within Wolf, a friendly country, to protect against infiltration by the mole. Andrew Bustamante played a risky role by purposely exposing himself to the CIA to bait the mole. Other case officers carried out covert operations in Falcon while maintaining the secrecy of the larger cell structure.

The Shadow Cell Uses Unconv ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Tactics and Tradecraft of the Bustamantes' Undercover "Shadow Cell" Operation

Additional Materials

Actionables

  • Enhance your privacy online by creating aliases for social media and email accounts, similar to how the Bustamantes used alternate identities. This can help protect your personal information from being easily accessible. For example, instead of using your real name, you might use a variation or a completely different name that doesn't link directly to your personal life, thereby making it harder for your activities to be tracked and your identity to be compromised.
  • Develop a personal security protocol by adopting low-tech communication methods for sensitive information. Just as the shadow cell used dead drops and coded messages, you can use physical notes or face-to-face meetings when discussing private matters to avoid leaving a digital trail that could be intercepted or hacked.
  • Practice situational a ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
Former CIA Spies: "The CIA Tried To Ban This Story!" We're Leaving The US by 2030!

Cia Culture, Practices, and Surveillance/Commercial Fronts

The Bustamantes dive into the inner workings of the CIA’s culture and discuss the implications for officer psyche, the utilisation of commercial fronts, and the extent of surveillance in the digital age.

Cia Fosters Officer Loyalty and Need For Validation

Cia Trains Officers to Manage "Head Trash" but Conditions Dependence on Agency Approval

The CIA employs techniques such as visualization and box breathing to help officers counter "head trash," or negative self-talk, during operations. This training, as detailed by Bustamante, fosters self-reliance in stressful situations but simultaneously cultivates officer loyalty, conditioning them to rely on agency validation. Bustamante indicates that this conditioning also prevents officers from realizing their full potential outside of the agency, suggesting that the CIA does not want its officers to succeed independently.

Cia Officers Risk Recruitment As Double Agents By Adversaries

The potential recruitment of CIA officers as double agents by foreign adversaries is a significant risk according to Jihee Bustamante, who highlights the peril of "disappearance" or long-term incarceration without government intervention. Andrew Bustamante underscores that spies are driven by a need for validation, which can be exploited by foreign intelligence services offering rewards that surpass monetary compensation, such as security for their family and assurances of recognition for their worth and work.

Cia Uses Commercial Fronts to Facilitate Intelligence Collection

Cia Invests In Companies For Funding and Officer Cover

Commercial businesses can serve as fronts for intelligence collection. Andrew Bustamante discusses the CIA's creation of both real and fake companies for such purposes. He specifically mentions In-Q-Tel, an investment vehicle through which the CIA funds new technology. These entities also act as covers for operatives with Andrew mentioning using a cover company to arrange an early return home.

Entities' Profits Fund Cia's Covert "Black Budget"

The CIA’s "black budget" is financed by profits from business ventures created by intelligence organizations, as explained by Bustamante. This discretionary spending for military and intelligence operations does not rely on taxpayer dollars, further emphasizing the autonomy and secrecy of CIA financial operations.

Cia and Intelligence Agencies Surveil Citizens Widely

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Cia Culture, Practices, and Surveillance/Commercial Fronts

Additional Materials

Counterarguments

  • While the CIA may use techniques to manage "head trash," it could be argued that fostering a sense of loyalty and dependence on agency validation is a common practice in many organizations to maintain a cohesive and focused workforce.
  • The risk of CIA officers being recruited as double agents is a serious concern, but it's also possible that the agency has robust counterintelligence measures in place to mitigate such risks.
  • The use of commercial fronts for intelligence purposes could be seen as a necessary tactic in the complex world of international espionage, where blending in is crucial for gathering information without drawing attention.
  • The funding of the CIA's "black budget" through business ventures might be criticized for its lack of transparency, but others might argue that such secrecy is essential for national security operations that cannot be disclosed publicly.
  • Legal authorities used to access digital ...

Actionables

  • You can enhance your mental resilience by practicing mindfulness meditation, which can help manage stress without relying on external validation. Mindfulness meditation encourages you to focus on the present moment and observe your thoughts without judgment, which can improve self-awareness and reduce the need for external approval. Start with a simple five-minute daily session, focusing on your breath and gently bringing your attention back whenever your mind wanders.
  • Develop a personal "privacy protocol" for your digital communications to protect your information from potential surveillance. This might include using encrypted messaging apps for sensitive conversations, regularly updating passwords, and being cautious about sharing personal information online. Educate yourself on the privacy settings of your digital devices and services, and make it a habit to review and adjust them to maximize your digital privacy.
  • Create a personal budget that includes a "black ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free

Create Summaries for anything on the web

Download the Shortform Chrome extension for your browser

Shortform Extension CTA