List of CIA controversies explained

The Central Intelligence Agency (CIA) has been the subject of a number of controversies, both in and outside of the United States. Legacy of Ashes: The History of the CIA by Tim Weiner accuses the CIA of covert actions and human rights abuses.[1] Jeffrey T. Richelson of the National Security Archive has been critical of its claims.[2] Intelligence expert David Wise faulted Weiner for portraying Allen Dulles as "a doddering old man" rather than the "shrewd professional spy" he knew and for refusing "to concede that the agency's leaders may have acted from patriotic motives or that the CIA ever did anything right", but concluded: "Legacy of Ashes succeeds as both journalism and history, and it is must reading for anyone interested in the CIA or American intelligence since World War II."[3] The CIA itself has responded to the claims made in Weiner's book, and has described it as "a 600-page op-ed piece masquerading as serious history."[4]

Domestic wiretapping

See main article: Project Mockingbird.

In 1969, at the height of the antiwar movement in the US, CIA Director Helms received a message from Henry Kissinger ordering him to spy on the leaders of the groups requesting a moratorium on Vietnam. "Since 1962, three successive presidents had ordered the director of central intelligence to spy on Americans."[5]

Extraordinary rendition

Extraordinary rendition is the apprehension and extrajudicial transfer of a person from one country to another.[6]

The term "torture by proxy" is used by some critics to describe situations in which the CIA[7] [8] [9] and other US agencies have transferred suspected terrorists to countries known to employ torture, whether they meant to enable torture or not. It has been claimed, though, that torture has been employed with the knowledge or acquiescence of US agencies (a transfer of anyone to anywhere for the purpose of torture is a violation of US law), although Condoleezza Rice (then the United States Secretary of State) stated that:

Whilst the Obama administration has tried to distance itself from some of the harshest counterterrorism techniques, it has also said that at least some forms of renditions will continue.[10] The administration continued to allow rendition only "to a country with jurisdiction over that individual (for prosecution of that individual)" when there is a diplomatic assurance "that they will not be treated inhumanely."[11] [12]

The US program has also prompted several official investigations in Europe into alleged secret detentions and unlawful inter-state transfers involving Council of Europe member states. A June 2006 report from the Council of Europe estimated 100 people had been kidnapped by the CIA on EU territory (with the cooperation of Council of Europe members), and rendered to other countries, often after having transited through secret detention centres ("black sites") used by the CIA, some located in Europe. According to the separate European Parliament report of February 2007, the CIA has conducted 1,245 flights, many of them to destinations where suspects could face torture, in violation of article 3 of the United Nations Convention Against Torture.[13]

Following the September 11 attacks the United States, in particular the CIA, has been accused of rendering hundreds of people suspected by the government of being terrorists—or of aiding and abetting terrorist organisations—to third-party states such as Egypt, Jordan, Morocco, and Uzbekistan. Such "ghost detainees" are kept outside judicial oversight, often without ever entering US territory, and may or may not ultimately be devolved to the custody of the United States.[14]

On October 4, 2001, a secret arrangement was made in Brussels, by all members of NATO. Lord George Robertson, British defence secretary and later NATO's secretary-general, would later explain that NATO members agree to provide "blanket overflight clearances for the United States and other allies' aircraft for military flights related to operations against terrorism."[15]

Security failures

On December 30, 2009, a suicide attack occurred in the Forward Operating Base Chapman attack in the province of Khost, Afghanistan. Seven CIA officers, including the chief of the base, were killed and six others seriously wounded in the attack.[16]

The September 11th attacks have been viewed by some as an example of shortcomings for the United States' various intelligence agencies. George W Bush's administration has openly stated they did not foresee the possibility of airliners being used as weapons, despite regular briefings from intelligence agencies and prior incidents of airliners being hijacked domestically and abroad.[17] [18]

Counterintelligence failures

Perhaps the most disruptive incident involving counterintelligence was CIA Counterintelligence Chief James Angleton's search for a mole or moles,[19] based on GRU Colonel Pyotr Popov's allegedly having told his Russia-born CIA handler, George Kisevalter in April of 1958 that he had recently heard a drunken GRU colonel brag that the Kremlin knew all about the Lockheed U-2 spy plane,[20] and the December 1961-on statements of a Soviet defector, KGB Major Anatoliy Golitsyn. A second defector, putative KGB officer Yuri Nosenko, who contacted the CIA in Geneva six months after Golitsyn's defection, challenged Golitsyn's claims, with the two calling one another Soviet double agents.[21] Many CIA officers fell under career-ending suspicion; the details of the relative truths and untruths from Nosenko and Golitsyn may never be released, or, in fact, may not be fully understood. The accusations also crossed the Atlantic to the British intelligence services, which also were damaged by molehunts.[22]

Edward Lee Howard, David Henry Barnett, both field operations officers, sold secrets to Russia. William Kampiles, a low-level worker in the CIA 24-hour Operations Center, sold the Soviets a detailed operational manual for the KH-11 reconnaissance satellite.[23]

Human rights concerns

See main article: Human rights violations by the CIA.

See also: Senate Intelligence Committee report on CIA torture and United States involvement in regime change.

The CIA has been called into question for, at times, using torture, funding and training of groups and organizations that would later participate in killing of civilians and other non-combatants and would try or succeed in overthrowing democratically elected governments, human experimentation, and targeted killings and assassinations. The CIA has also been accused of a lack of financial and whistleblower controls which has led to waste and fraud.[24]

During Bush's year in charge of the CIA, the U.S. national security apparatus actively supported Operation Condor operations and right-wing military dictatorships in Latin America.[25] [26] According to John Dinges, author of The Condor Years (The New Press 2003), documents released in 2015 revealed a CIA report dated April 28, 1978 that showed the agency by then had knowledge that U.S.-backed Chilean dictator Augusto Pinochet ordered the assassination of Orlando Letelier, a leading political opponent living in exile in the United States.[27]

The Institute on Medicine as a Profession and the non-profit organization Open Society Foundations reviewed public records into the medical professions alleging complicity in the abuse of prisoners suspected of terrorism who were held in U.S. custody during the years after 9/11."[28] [29] The reports found that health professionals "Aided cruel and degrading interrogations; Helped devise and implement practices designed to maximize disorientation and anxiety so as to make detainees more malleable for interrogation; and Participated in the application of excruciatingly painful methods of force-feeding of mentally competent detainees carrying out hunger strikes" are not all that surprising.[28] Medical professionals were sometimes used at black sites to monitor detainee health.[30] Whether or not the physicians were compelled is an open question.

Other human rights issues that are controversial include the case of Edward Snowden.[31] [32] [33] However, the significance of human right does not fall into this case regarding whether Snowden received his fair trial or not. Rather, the human rights associated with the Snowden leaks are regarding the types of document Snowden released. Snowden released a significant amount of information on the U.S. government's surveillance program of its citizens[34] [35] [36] [37] to The Washington Post as well as foreign news reporters.

Particularly, "between on or about June 5, 2013, and June 9, 2013, classified information was published on the internet and in print by multiple newspapers, including The Washington Post and The Guardian. The articles and internet postings by The Washington Post and The Guardian included classified documents that were marked TOP SECRET. The Washington Post and The Guardian later revealed that SNOWDEN was the principal source for the classified information on or about June 9, 2013, in a videotaped interview with The Guardian, admitted that he was the person who illegally provided those documents to reporters. Evidence indicates that SNOWDEN had access to the classified documents in question; accessed those documents; and, subsequently, provided those documents to media outlets without authorization and in violation of U.S. law."

Furthermore, the leaks included documents at many levels of the National Security Agency (NSA) electronic surveillance activities. "The Snowden leaks have generated broad public debate over issues of security, privacy, and legality inherent in the NSA's surveillance of communications by American citizens. The records include: White House and ODNI efforts to explain, justify, and defend the programs; Correspondence between outside critics and executive branch officials; Fact sheets and white papers distributed (and sometimes later withdrawn) by the government; Key laws and court decisions (both Supreme Court and Foreign Intelligence Surveillance Court); Documents on the Total Information Awareness (later Terrorist Information Awareness, or TIA) program, an earlier proposal for massive data collection Manuals on how to exploit the Internet for intelligence."

External investigations and document releases

See main article: Official reports by the U.S. Government on the CIA.

Several investigations led by the Church Committee, Rockefeller Commission and Pike Committee have been conducted about the CIA, and many documents have been declassified.[38]

Influencing public opinion and law enforcement

See also: CIA influence on public opinion, CIA and the media and Robertson Panel. The CIA sometimes finds itself in conflict with other parts of the government when there is disagreement over the legality of specific covert programs. There is always the risk that one part of the government may make the covert operations of another part of the government public.[39]

CIA's recruitment of Nazis

See also: U.S. intelligence involvement with German and Japanese war criminals after World War II, Operation Bloodstone and Ratlines (World War II aftermath). In 2014, The New York Times reported that "In the decades after World War II, the C.I.A. and other United States agencies employed at least a thousand Nazis as Cold War spies and informants and, as recently as the 1990s, concealed the government's ties to some still living in America, newly disclosed records and interviews show."[40]

According to Timothy Naftali, "The CIA's central concern [in recruiting former Nazi collaborators] was not so much the extent of the criminal's guilt as the likelihood that the agent's criminal past could remain a secret."[41]

Iran-Contra

See main article: Iran–Contra affair.

Drug trafficking

See main article: CIA transnational anti-crime and anti-drug activities and Allegations of CIA drug trafficking.

See also: Iran–Contra affair.

Two offices of the CIA Directorate of Analysis have analytical responsibilities in this area. The Office of Transnational Issues[42] applies unique functional expertise to assess existing and emerging threats to U.S. national security and provides the most senior U.S. policymakers, military planners, and law enforcement with analysis, warning, and crisis support.

CIA Crime and Narcotics Center[43] researches information on international narcotics trafficking and organized crime for policymakers and the law enforcement community. Since CIA has no domestic police authority, it sends its analytic information to the Federal Bureau of Investigation (FBI), Immigration and Customs Enforcement (ICE) and other law enforcement organizations, such as the Drug Enforcement Administration (DEA) and the Office of Foreign Assets Control of the United States Department of the Treasury (OFAC).

Another part of CIA, the Directorate of Operations, collects human intelligence (HUMINT) in these areas.

Research by Dr. Alfred W. McCoy, Gary Webb, and others has pointed to CIA involvement in narcotics trafficking across the globe, although the CIA officially denies such allegations.[44] [45]

Lying to Congress

Nancy Pelosi has stated that the CIA repeatedly misled Congress since 2001 about waterboarding and other torture, though Pelosi admitted to being told about the programs.[46] [47] Six members of Congress have claimed that Director of the CIA Leon Panetta admitted that over a period of several years since 2001 the CIA deceived Congress, including affirmatively lying to Congress.[48] Some Members of Congress believe that these lies to Congress are similar to CIA lies to Congress from earlier periods.[49]

In the early 1990s Richard Barlow asked his managers to correct the record when blatantly false statements had been made to Congress. The official mendacity only became public after Barlow sued the US Department of Defense for wrongful termination.[50]

Wikipedia editing

In 2007, the now defunct database Wikiscanner revealed that computers from the CIA had been used to edit articles on the English Wikipedia, including the Iraq War article in 2003, and the article on former CIA executive director William Colby. A spokeswoman for Wikipedia said in response that the changes may violate the encyclopedia's conflict-of-interest guidelines. CIA spokesman George Little said that he could not confirm if CIA computers were used to make the changes, claiming that "the agency always expects its computer systems to be used responsibly."[51]

Covert programs hidden from Congress

On July 10, 2009, House Intelligence subcommittee Chairwoman Representative Jan Schakowsky (D, IL) announced the termination of an unnamed CIA covert program described as "very serious" in nature which had been kept secret from Congress for eight years.[52]

CIA Director Panetta had ordered an internal investigation to determine why Congress had not been informed about the covert program. Chairman of the House Intelligence Committee Representative Silvestre Reyes announced that he is considering an investigation into alleged CIA violations of the National Security Act, which requires with limited exception that Congress be informed of covert activities. Investigations and Oversight Subcommittee Chairwoman Schakowsky indicated that she would forward a request for congressional investigation to HPSCI Chairman Silvestre Reyes.

As mandated by Title 50 of the United States Code Chapter 15, Subchapter III, when it becomes necessary to limit access to covert operations findings that could affect vital interests of the U.S., as soon as possible the President must report at a minimum to the Gang of Eight (the leaders of each of the two parties from both the Senate and House of Representatives, and the chairs and ranking members of both the Senate Committee and House Committee for intelligence).[53] At the time the House was expected to support the 2010 Intelligence Authorization Bill including a provision that would require the President to inform more than 40 members of Congress about covert operations. The Obama administration threatened to veto the final version of a bill that included such a provision.[54] On July 16, 2008, the fiscal 2009 Intelligence Authorization Bill was approved by House majority containing stipulations that 75% of money sought for covert actions would be held until all members of the House Intelligence panel were briefed on sensitive covert actions. Under the George W. Bush administration, senior advisers to the President issued a statement indicating that if a bill containing this provision reached the President, they would recommend that he veto the bill.[55]

The program was rumored vis-à-vis leaks made by anonymous government officials on July 23, to be an assassinations program,[56] [57] but this remains unconfirmed. "The whole committee was stunned. I think this is as serious as it gets," stated Anna Eshoo, Chairman, Subcommittee on Intelligence Community Management, U.S. House Permanent Select Committee on Intelligence (HPSCI).

Allegations by Director Panetta indicate that details of a secret counterterrorism program were withheld from Congress under orders from former U.S. Vice President Dick Cheney. This prompted Senators Dianne Feinstein and Patrick Leahy, Chairman of the Senate Judiciary Committee to insist that no one should go outside the law.[58] "The agency has not discussed publicly the nature of the effort, which remains classified," said agency spokesman Paul Gimigliano.[59]

The Wall Street Journal reported, citing former intelligence officials familiar with the matter, that the program was an attempt to carry out a 2001 presidential authorization to capture or kill al-Qaeda operatives.[60]

Intelligence Committee investigation

On July 17, 2009, the House Intelligence Committee said it was launching a formal investigation into the secret program.[61] Representative Silvestre Reyes announced the probe will look into "whether there was any past decision or direction to withhold information from the committee".

Congresswoman Jan Schakowsky (D, IL), Chairman of the Subcommittee on Oversight and Investigations, who called for the investigation, stated that the investigation was intended to address CIA failures to inform Congress fully or accurately about four issues: C.I.A. involvement in the downing of a missionary plane mistaken for a narcotics flight in Peru in 2001, and two "matters that remain classified", as well as the rumored-assassinations question. In addition, the inquiry is likely to look at the Bush administration's program of eavesdropping without warrants and its detention and interrogation program.[62] U.S. Intelligence Chief Dennis Blair testified before the House Intelligence Committee on February 3, 2010, that the U.S. intelligence community is prepared to kill U.S. citizens if they threaten other Americans or the United States.[63] The American Civil Liberties Union has said this policy is "particularly troubling" because U.S. citizens "retain their constitutional right to due process even when abroad." The ACLU also "expressed serious concern about the lack of public information about the policy and the potential for abuse of unchecked executive power."[64]

Use of vaccination program in hunt for Osama bin Laden

The agency attracted widespread criticism after it used a local doctor in Pakistan to set up a hepatitis B vaccination program in Abbottabad in 2011 to obtain DNA samples from the occupants of a compound where it was suspected bin Laden was living, hoping to obtain samples from bin Laden or his children in order to confirm his presence. It is unknown whether any useful DNA was acquired from the program, but it was deemed not successful. The doctor was later arrested and sentenced to a lengthy prison term on allegedly unrelated charges.[65] Médecins Sans Frontières criticized the CIA for endangering and undermining trust in medical workers[66] and The New York Times reported that the CIA's action had increased resistance to vaccination programs in Pakistan.[67]

Improper search of computers used by Senate investigators

In July 2014 CIA Director John O. Brennan had to apologize to lawmakers because five CIA employees (two lawyers and three computer specialists) had surreptitiously searched Senate Intelligence Committee files and reviewed some committee staff members' e-mail on computers that were supposed to be exclusively for congressional investigators. Brennan ordered the creation of an internal personnel board, led by former senator Evan Bayh, to review the agency employees' conduct and determine "potential disciplinary measures."[68] However, according to some reports, Brennan didn't apologize for spying or doing anything wrong at all, even though his agency had been improperly accessing computers of the Senate Select Intelligence Committee (SSCI) and then, in the words of investigative reporter Dan Froomkin, "speaking a lie". This accusation was based on the CIA Director's earlier denials of Senator Dianne Feinstein's claims that the surreptitious CIA search of the SSCI computers occurred, was inappropriate, or "violated the separation of powers principles embodied in the United States Constitution, including the Speech and Debate clause" or other laws.[69] [70] [71]

Resignation of officials and agents who would not work for Donald Trump

In February 2017, reports emerged that key experts within the CIA were resigning because they would not work for U.S. President Donald Trump. The Middle East Eye reported that two agents, Americans, who operated spy-rings within ISIS had resigned, because they "...did not want to see the contacts who worked for them sacrificed due to incompetence and anti-Muslim prejudice from within Trump's inner circle." Ned Price, a CIA official since 2006, stirred controversy when he published an op-ed in The Washington Post, explaining why he surprised himself by resigning, after he perceived Trump using his visit to CIA HQ for partisan political posturing.

WikiLeaks' disclosure of CIA's cyber tools

See main article: Vault 7.

In March 2017, WikiLeaks published more than 8,000 documents on the CIA. The confidential documents, codenamed Vault 7, dated from 2013 to 2016, included details on the CIA's software capabilities, such as the ability to compromise cars, smart TVs,[72] and web browsers, including Google Chrome, Microsoft Edge, Firefox, and Opera,[73] [74] as well as the operating systems of most smartphones including Apple's iOS and Google's Android, and other operating systems such as Microsoft Windows, macOS, and Linux.[75] WikiLeaks did not name the source, but said that the files had "circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive."

In a 2017 speech addressing CSIS, CIA Director Mike Pompeo referred to WikiLeaks as "a non-state hostile intelligence service often abetted by state actors like Russia". He also said: "To give them the space to crush us with misappropriated secrets is a perversion of what our great Constitution stands for. It ends now."[76]

See also

References

Further reading

External links

Notes and References

  1. Book: Weiner, Tim . 2007 . Legacy of Ashes . . 978-0-385-51445-3 .
  2. Web site: Sins of Omission and Commission . Richelson . Jeffrey . September 11, 2007 . Washington Decoded . July 4, 2008.
  3. News: David Wise (journalist) . Wise . David . Covert Action . . July 22, 2007 . November 30, 2016.
  4. Review of 'Legacy of Ashes: The History of CIA' . https://web.archive.org/web/20071009203554/https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no3/legacy-of-ashes-the-history-of-cia.html . October 9, 2007 . Nicholas . Dujmovic . November 26, 2007 . 51 . 3 . Studies in Intelligence . . December 18, 2018.
  5. Weiner, Tim (2008). Legacy of Ashes: The History of the CIA. New York: Random House. p. 342.
  6. Web site: Renditions: Constraints Imposed by Laws on Torture . Michael John . Garcia . September 8, 2009 . . Federation of American Scientists. Link from Web site: United States Counter-Terrorism Training and Resources for Law Enforcement . Online Resources . https://web.archive.org/web/20121014042245/http://www.counterterrorismtraining.gov/leg/index.html . October 14, 2012.
  7. Web site: Background Paper on CIA's Combined Use of Interrogation Techniques . . December 30, 2004 . January 2, 2010.
  8. Web site: New CIA Docs Detail Brutal 'Extraordinary Rendition' Process . Scott . Horton . Huffington Post . August 28, 2009 . January 2, 2010.
  9. Web site: Fact sheet: Extraordinary rendition . American Civil Liberties Union . March 29, 2007.
  10. News: Obama preserves renditions as counter-terrorism tool . The Los Angeles Times . February 1, 2009 . November 21, 2011.
  11. News: N.Y. billing dispute reveals details of secret CIA rendition flights . The Washington Post . September 1, 2011 . Thomas . Erdbrink.
  12. Web site: Under Obama Administration Renditions—and Secrecy Around Them—Continue . Marian . Wang . September 6, 2011 . . October 7, 2011.
  13. Web site: Resolution 1507: Alleged secret detentions and unlawful inter-state transfers of detainees involving Council of Europe member states . June 27, 2006 . . https://web.archive.org/web/20100612123848/http://assembly.coe.int/Main.asp?link=%2FDocuments%2FAdoptedText%2Fta06%2FERES1507.htm . June 12, 2010.
  14. Outsourcing Torture: The secret history of America's 'extraordinary rendition' program . Mayer . Jane . . February 14, 2005 . February 20, 2007.
  15. News: Stephen . Grey . Flight logs reveal secret rendition . November 25, 2007 . . London . February 22, 2009.
  16. News: Alissa J. . Rubin . Alissa J. Rubin . Mark . Mazzetti . December 31, 2009 . Afghan Base Hit by Attack Has Pivotal Role in Conflict . The New York Times . January 1, 2010.
  17. Web site: 2004-04-07 . 9/11 Testimony of National Security Adviser Condoleezza Rice . 2023-09-03 . Center for American Progress . en.
  18. Web site: Macola . Ilaria Grasso . 2021-06-25 . The world's most infamous aeroplane hijackings . 2023-09-03 . Airport Technology . en-US.
  19. Book: Molehunt: The Secret Search for Traitors That Shattered the CIA . David . Wise . Random House . 1992 . 0-394-58514-3 .
  20. Book: Newman, John M. . Uncovering Popov's Mole . Self-published . 2022 . 9798355050771 . U.S.A. . 18-19 . English.
  21. Book: Baer, Robert . See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism . Three Rivers Press . 2003 . 1-4000-4684-X.
  22. Book: Spycatcher . Peter . Wright . Peter Wright (MI5 officer) . Greengrass . Paul . Paul Greengrass . William Heinemann . 1987 . 0-670-82055-5.
  23. Web site: When the Enemy Has Our Eyes . Cynthia A. S. . McKinley . 1996 . Federation of American Scientists.
  24. News: Intelligence Reform is the President's Urgent Challenge . The Washington Times . Jones . Ishmael . Ishmael Jones . January 7, 2010.
  25. News: Where Gerald Ford Went Wrong . The Baltimore Chronicle . 2007.
  26. FIFA's Dirty Wars . The New Republic . December 15, 2017.
  27. Web site: A Bombshell on Pinochet's Guilt, Delivered Too Late. John Dinges On 10/14/15 at 11:23. AM. . October 14, 2015. October 16, 2016.
  28. Web site: Doctors Aided CIA Torture, Records Show . Neier . Aryeh . David J. . Rothman . November 4, 2013 . Open Societies Foundation . December 11, 2013.
  29. Paramaguru . Kharunya . CIA Made Doctors Complicit in Torture After 9/11, Report Says . TIME . November 4, 2013 . December 11, 2013.
  30. Book: Siems, Larry . The Torture Report: What the Documents Say About America's Post 9-11 Torture Program . 2012 . OR Books . New York . 216.
  31. Web site: The Snowden Affair: Electronic Briefing Book No. 436 . The National Security Archive . September 4, 2013.
  32. Web site: Not Quite Another "Year of the Spy" . Harper . Lauren . July 12, 2013 . Unredacted: The National Security Archive blog . August 26, 2017.
  33. Web site: The "Top 10" Surveillance Lies Edward Snowden's Leaks Shed "Heat and Light" Upon . Harper . Lauren . January 17, 2014 . Unredacted: The National Security Archive blog . August 26, 2017.
  34. Web site: Office of the Inspector General's review of the President's Surveillance Program . March 24, 2009 . National Security Archive . August 26, 2017.
  35. Web site: Unclassified Report on the President's Surveillance Program . July 10, 2009 . National Security Archive . August 26, 2017.
  36. Web site: Minimization Procedures used by the National Security Agency in connection with Acquisitions of Foreign Intelligence . January 1, 2007 . National Security Archive . August 26, 2017.
  37. Web site: PRISM/US-984XN Overview or The SIGAD Used Most in NSA Reporting Overview . April 2013 . National Security Archive . August 26, 2017.
  38. Web site: A Review of Congressional Oversight . https://web.archive.org/web/20070613113802/https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/97unclass/wagenen.html . June 13, 2007 . James S. . Van Wagenen . Center for the Study of Intelligence . April 4, 2007 . September 15, 2012.
  39. Book: Saunders, Frances Stonor . Frances Stonor Saunders . 1999 . . . 1-56584-664-8.
  40. News: In Cold War, U.S. Spy Agencies Used 1,000 Nazis . The New York Times . October 26, 2014.
  41. Book: Naftali, Timothy . The CIA and Eichmann's Associates. U.S. Intelligence and the Nazis . 2005 . Cambridge University Press . 978-0-521-61794-9 . 337–374 . en.
  42. Web site: Office of Transnational Issues . https://web.archive.org/web/20070612225832/https://www.cia.gov/offices-of-cia/intelligence-analysis/organization-1/oti.html . June 12, 2007 . Central Intelligence Agency.
  43. Web site: CIA Crime and Narcotics Center . https://web.archive.org/web/20070612225915/https://www.cia.gov/offices-of-cia/intelligence-analysis/organization-1/the-cia-crime-and-narcotics-center.html . June 12, 2007 . Central Intelligence Agency.
  44. Book: Webb, Gary . . Seven Stories Press . 1999 . 978-1-88836-393-7.
  45. Web site: Snow Job . Norman Solomon . Solomon . Norman . January/February 1997 . . November 3, 2009 . https://web.archive.org/web/20050211194420/http://www.datafilter.com/mc/c_fairContraCrackCiaDamageControl.html . February 11, 2005.
  46. Web site: Panetta Tells Lawmakers CIA Misled Congress Post-2001 . Bloomberg . July 9, 2009.
  47. Web site: BBC News . May 14, 2009 . Pelosi says CIA lied on 'torture' . James . Coomarasamy . James Coomarasamy .
  48. Web site: House Dems: Panetta testified CIA has misled Congress repeatedly . CNN . July 9, 2009.
  49. Web site: BBC News . July 9, 2009 . CIA 'often lied to congressmen' .
  50. !<-- Layton (2007), Whistle-Blower's Fight For Pension Drags On, The Washington Post -->
  51. News: Mikkelsen. Randall. 2007-08-16. CIA, FBI computers used for Wikipedia edits. en. Reuters. 2021-03-16.
  52. Web site: Lawmaker: Panetta terminated secret program . NBC News . July 10, 2009 . August 14, 2010.
  53. Web site: US CODE: Title 50,413b. Presidential approval and reporting of covert actions . . July 20, 2009 . March 16, 2010.
  54. Web site: Lawmaker says CIA director ended secret program . Pamela . Hess . The Associated Press . Google News . July 8, 2009 . https://web.archive.org/web/20090714224420/https://www.google.com/hostednews/ap/article/ALeqM5gQDNMgQrXYHlGWd9F3063DLFpiHAD99BMNVG2 . July 14, 2009.
  55. News: House Passes Intelligence Authorization Bill . The Washington Post . July 17, 2008 . Walter . Pincus . March 16, 2010.
  56. News: Senators: CIA concealment may have broken law . Associated Press . July 12, 2009 . . August 19, 2011.
  57. News: Calls grow for probe of CIA plan for al-Qaida hits . Hess . Pamela . July 13, 2009 . . August 19, 2011 . https://web.archive.org/web/20111222220449/http://seattletimes.nwsource.com/html/politics/2009458384_apusciaconcealment.html . December 22, 2011 .
  58. Web site: Cheney ordered intel withheld from Congress-senator . Reuters . July 12, 2009 . March 16, 2010.
  59. News: Gorman . Siobhan . CIA Plan Envisioned Hit Teams Killing al Qaeda Leaders . . July 15, 2009 . March 16, 2010.
  60. News: Siobhan . Gorman . CIA Had Secret Al Qaeda Plan . July 13, 2009 . . August 6, 2009.
  61. Web site: Tabassum . Zakaria . House launches investigation into CIA program . Reuters . July 18, 2009 . March 16, 2010.
  62. News: House Looks into Secrets Withheld From Congress . The New York Times . Mark . Mazzetti . Scott . Shane . July 18, 2009 . April 28, 2010.
  63. Web site: Intelligence chief: U.S. can kill Americans abroad . Barbara . Starr . CNN . February 4, 2010.
  64. Web site: Intelligence Official Acknowledges Policy Allowing Targeted Killings of Americans . . February 4, 2010.
  65. News: CIA organised fake vaccination drive to get Osama bin Laden's family DNA. Shah. Saeed. July 11, 2011. The Guardian. May 3, 2019. London.
  66. News: Shah . Saeed . CIA's fake vaccination programme criticised by Médecins Sans Frontières . 15 May 2019 . The Guardian . 14 July 2011.
  67. News: Masood . Salman . Pakistan's War on Polio Falters Amid Attacks on Health Workers and Mistrust . 15 May 2019 . . 29 April 2019.
  68. News: CIA director John Brennan apologizes for search of Senate committee's computers . Greg . Miller . July 31, 2014 . The Washington Post.
  69. Web site: Anatomy of a Non-Denial Denial . Dan . Froomkin . September 26, 2014 . The Intercept.
  70. Web site: Statement on Intel Committee's CIA Detention, Interrogation Report . March 11, 2014 . Dianne . Feinstein . U.S. Senate.
  71. Web site: It's About the Lying . Dan . Froomkin . August 1, 2014 . The Intercept.
  72. News: WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents . Shane . Scott . Mazzetti . Mark . Rosenberg . Matthew . . March 7, 2017 . March 7, 2017.
  73. How the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks) . Greenberg . Andy . March 7, 2017 . . April 8, 2017.
  74. Web site: WikiLeaks posts trove of CIA documents detailing mass hacking . March 7, 2017 . . April 8, 2017.
  75. Vault 7: Wikileaks reveals details of CIA's hacks of Android, iPhone Windows, Linux, MacOS, and even Samsung TVs . Carly . Page . . March 7, 2017.
  76. Web site: Trump's CIA Director Pompeo, Targeting WikiLeaks, Explicitly Threatens Speech and Press Freedoms . Glenn . Greenwald . Glenn Greenwald . April 14, 2017 . The Intercept.