-Caveat Lector- Results of the 1973 Church Committee Hearings, on CIA misdeeds, and the 1984 Iran/Contra Hearings....
------------------------------------------------------- "Our Presidents should not be able to conduct secret operations which violate our principles, jeopardize our rights, and have not been subject to the checks and balances which normally keep policies in line." Morton Halperin Former Deputy Assistant Secretary of Defense for International Affairs ------------------------------------------------------- "In its consideration of covert action, the Committee was struck by the basic tension--if not incompatibility--of covert operations and the demands of a constitutional system. Secrecy is essential to covert operations; secrecy can, however, become a source of power, a barrier to serious policy debate within the government, and a means of circumventing the established checks and procedures of government. The Committee found that secrecy and compartmentation contributed to a temptation on the part of the Executive to resort to covert operations in order to avoid bureaucratic, congressional, and public debate." The Church Committee ------------------------------------------------------- "The nation must to a degree take it on faith that we too are honorable men, devoted to her service." Richard Helms, then DCI April, 1971 ------------------------------------------------------- Table of Contents CHAPTER ONE . . 1 Introduction . . 1 CHAPTER TWO . . 3 CIA Proprietaries . . 3 Propaganda . . 4 Political Action . . 7 Economic Covert Operations . . 10 Paramilitary Operations . . 10 CHAPTER THREE . . 14 Project NKNAOMI . . 14 Project MKULTRA . . 15 LSD Experimentation . . 17 Project BLUEBIRD . . 18 Project ARTICHOKE . . 18 CHAPTER FOUR . . 19 The National Security Act of July 1947 19 Radio Free Europe . . 20 Radio Liberty . . 20 Taiwan . . 22 Operation Mongoose . . 24 Guatemala . . 27 The Bay of Pigs . . 30 Laos . . 34 The Phoenix Program . . 36 Chile . . 38 CHAPTER FIVE . . 41 Plausible Deniability . . 41 The Iran-Contra Affair . . 42 CIA Case Officers . . 44 Congress . . 44 Appendix I, Timeline of CIA Operations Appendix II, The Congo 1960: State Terrorism and Foreign Policy CHAPTER ONE INTRODUCTION On January 22, 1946, President Harry S. Truman issued an executive order setting up a National Intelligence Authority, and under it, a Central Intelligence Group, which was the forerunner of the Central Intelligence Agency. Truman recognized the need for a centralized intelligence apparatus in peacetime to help ensure that nothing like the Japanese surprise attack on Pearl Harbor would ever again happen. The organization that was to become the CIA took on a life of its own and over the past four decades has become the secret army of the President of the United States. Presidents from Truman to Ronald Reagan have used this secret army whenever they found it impossible to achieve their policy goals through overt means. Over the years, the CIA has evolved from an agency whose primary assignment was to gather intelligence into a powerful entity whose help is enlisted to help attain American foreign policy goals. Since 1947, the Agency has been involved in the internal affairs of over fifty countries on six different continents. Although an exact number is impossible to determine, there are over 20,000 employees affiliated with the organization. Of these, more than 6,000 serve in the clandestine services, the arm of the CIA that is responsible for covert operations. The purpose of this work will be to survey the covert operations that have been undertaken by the CIA in the past forty years and to assess the effectiveness of a number of these activities. We shall begin by examining the various shapes that covert operations may take. They are propaganda; political action; economic activities; and paramilitary operations. After surveying the various types of covert operations, we will look at examples of CIA involvement around the world. Since there have been eighty-five or so such operations since 1948, we will not attempt to look at every one (See Appendix I). However, we will examine a number of covert operations to get an idea of what exactly the CIA does and continues to do. We will evaluate both the particular operations examined in this work and covert operations in general. Afterwards, we should be able to establish a number of criteria that separate good covert operations from bad ones. Finally, we will look towards the future and try to see what it has in store for the Central Intelligence Agency. more at: http://pw1.netcom.com/~ncoic/cia_info.htm#CHAPTER%20ONE __________________________________________________ Do You Yahoo!? Check out Yahoo! Shopping and Yahoo! Auctions for all of your unique holiday gifts! Buy at http://shopping.yahoo.com or bid at http://auctions.yahoo.com <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om