-Caveat Lector-

Results of the 1973 Church Committee Hearings, on CIA
misdeeds, and the 1984 Iran/Contra Hearings....

-------------------------------------------------------

"Our Presidents should not be able to conduct secret
operations which violate our principles, jeopardize
our rights, and have not been subject to the checks
and balances which normally keep policies in line."

Morton Halperin
Former Deputy Assistant Secretary of
Defense for International Affairs


-------------------------------------------------------


"In its consideration of covert action, the Committee
was struck by the basic tension--if not
incompatibility--of covert operations and the demands
of a constitutional system. Secrecy is essential to
covert operations; secrecy can, however, become a
source of power, a barrier to serious policy debate
within the government, and a means of circumventing
the established checks and procedures of government.
The Committee found that secrecy and compartmentation
contributed to a temptation on the part of the
Executive to resort to covert operations in order to
avoid bureaucratic, congressional, and public debate."

The Church Committee


-------------------------------------------------------


"The nation must to a degree take it on faith that we
too are honorable men, devoted to her service."

Richard Helms, then DCI
April, 1971


-------------------------------------------------------


Table of Contents
CHAPTER ONE . . 1
Introduction . . 1

CHAPTER TWO . . 3
CIA Proprietaries . . 3
Propaganda . . 4
Political Action . . 7
Economic Covert Operations . . 10
Paramilitary Operations . . 10

CHAPTER THREE . . 14
Project NKNAOMI . . 14
Project MKULTRA . . 15
LSD Experimentation . . 17
Project BLUEBIRD . . 18
Project ARTICHOKE . . 18

CHAPTER FOUR . . 19
The National Security Act of July 1947 19
Radio Free Europe . . 20
Radio Liberty . . 20
Taiwan . . 22
Operation Mongoose . . 24
Guatemala . . 27
The Bay of Pigs . . 30
Laos . . 34
The Phoenix Program . . 36
Chile . . 38

CHAPTER FIVE . . 41
Plausible Deniability . . 41
The Iran-Contra Affair . . 42
CIA Case Officers . . 44
Congress . . 44
Appendix I, Timeline of CIA Operations
Appendix II, The Congo 1960: State Terrorism and
Foreign Policy




CHAPTER ONE

INTRODUCTION

On January 22, 1946, President Harry S. Truman issued
an executive order setting up a National Intelligence
Authority, and under it, a Central Intelligence Group,
which was the forerunner of the Central Intelligence
Agency. Truman recognized the need for a centralized
intelligence apparatus in peacetime to help ensure
that nothing like the Japanese surprise attack on
Pearl Harbor would ever again happen. The organization
that was to become the CIA took on a life of its own
and over the past four decades has become the secret
army of the President of the United States. Presidents
from Truman to Ronald Reagan have used this secret
army whenever they found it impossible to achieve
their policy goals through overt means.

Over the years, the CIA has evolved from an agency
whose primary assignment was to gather intelligence
into a powerful entity whose help is enlisted to help
attain American foreign policy goals. Since 1947, the
Agency has been involved in the internal affairs of
over fifty countries on six different continents.
Although an exact number is impossible to determine,
there are over 20,000 employees affiliated with the
organization. Of these, more than 6,000 serve in the
clandestine services, the arm of the CIA that is
responsible for covert operations.

The purpose of this work will be to survey the covert
operations that have been undertaken by the CIA in the
past forty years and to assess the effectiveness of a
number of these activities. We shall begin by
examining the various shapes that covert operations
may take. They are propaganda; political action;
economic activities; and paramilitary operations.
After surveying the various types of covert
operations, we will look at examples of CIA
involvement around the world. Since there have been
eighty-five or so such operations since 1948, we will
not attempt to look at every one (See Appendix I).
However, we will examine a number of covert operations
to get an idea of what exactly the CIA does and
continues to do. We will evaluate both the particular
operations examined in this work and covert operations
in general. Afterwards, we should be able to establish
a number of criteria that separate good covert
operations from bad ones. Finally, we will look
towards the future and try to see what it has in store
for the Central Intelligence Agency.

more at:
http://pw1.netcom.com/~ncoic/cia_info.htm#CHAPTER%20ONE


__________________________________________________
Do You Yahoo!?
Check out Yahoo! Shopping and Yahoo! Auctions for all of
your unique holiday gifts! Buy at http://shopping.yahoo.com
or bid at http://auctions.yahoo.com

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to