The history of intelligence agencies in the United States, when examined critically, reveals a complex network of organizations operating within the shadows of the government power. The genesis of modern U.S. intelligence can be traced back to World War II, with the establishment of the Office of Strategic Services (OSS), the precursor to the Central Intelligence Agency (CIA). A spade, huh?
The OSS was instrumental in covert operations, intelligence gathering, and espionage during the war. One of the most controversial programs run by the OSS was ‘Operation Paperclip,’ which played a role in recruiting and extracting German scientists, engineers, and technicians, including former Nazis and SS members, to work for the United States. This operation provided immunity and new identities to individuals who had been part of the Nazi regime in return for their assistance in developing the US military-industrial complex.
Kurt H. Debus, a former member of the SS, sitting between President John F. Kennedy and Vice President Lyndon Johnson. Debus served as the first director of NASA’s Launch Operations Center.
The CIA is Born
Post World War II, the National Security Act of 1947 marked a pivotal moment, birthing the CIA and reshaping the intelligence landscape. This Act was a response to the perceived need for a centralized, coordinated approach to intelligence that would transcend the limitations of wartime agencies. The CIA was vested with broad powers, functioning under minimal public scrutiny, often operating in international territories to counter perceived threats to U.S. interests. Their actions during the Cold War, including covert operations to influence foreign governments and gather intelligence on the Soviet Union, were indicative of their expanding role in global affairs. The CIA has likely run more shady programs than any intelligence agency in the world. They include everything from MKUltra, which involved abusing children, to the CIA's involvement in the killing of JFK.
Declassified Project MKUltra: Subproject 8 documents detailing illegal experimentation with LSD on non-consenting subjects (mental patients, prisoners, drug addicts, etc.)
Additionally, the CIA ran an active interventionist campaign to achieve regime change to undermine democratically elected governments that did not share the CIA's or US’s political views. Generally, these programs caused significant long-term harm to the countries involved as well as, ultimately, to US foreign policy.
Iran (1953): The CIA orchestrated Operation Ajax to overthrow Prime Minister Mohammad Mossadegh and reinstated the Shah of Iran, largely due to concerns over Mossadegh's nationalization of the oil industry. This resulted in the subsequent Iranian revolution and took the country on a path to a terrorist-backing theocracy.
Guatemala (1954): The CIA-backed coup ousted President Jacobo Árbenz, who had enacted land reforms and other policies perceived as socialist.
Cuba (1961): The Bay of Pigs Invasion, an unsuccessful CIA-backed attempt to overthrow Fidel Castro.
Chile (1973): The CIA supported the coup led by General Augusto Pinochet against President Salvador Allende, the first democratically elected Marxist leader in Latin America. Pinochet subsequently ruled Chile with an iron fist.
Afghanistan (1980s): The CIA provided support to Afghan mujahideen fighters against the Soviet invasion. This led to the rise of Islamist terrorists from Afghanistan.
Nicaragua (1980s): The CIA was involved in the Iran-Contra affair, where they secretly financed the Contras against the Sandinista government.
The NSA Gets into the Game
The formation of the National Security Agency (NSA) in 1952 added another layer to the intelligence network, focusing primarily on signal intelligence (SIGINT) and codebreaking. This era also saw the rise of the Defense Intelligence Agency (DIA) and the expansion of the FBI’s counterintelligence capabilities.
NSA's greatest claim to fame is their ongoing operation to spy on all Americans all the time. Specifically, the organization was involved in the following operations (as revealed by Edward Snowden).
PRISM Program: This program involved the NSA collecting internet communications from various U.S. internet companies, including email, chat services, videos, photos, stored data, file transfers, video conferencing, and logins.
Metadata Collection: The NSA collected call records, known as metadata, from millions of Americans. This data included phone numbers, call durations, and other details, but not the content of the conversations.
Bulk Data Collection: The NSA had been collecting vast amounts of digital communications globally, including from U.S. citizens, under a program called "Upstream." This included data passing through internet backbone facilities.
Global Surveillance: The NSA's surveillance extended beyond the U.S., targeting foreign leaders, global organizations, and the general population of various countries.
Collaboration with Foreign Intelligence: The NSA worked closely with intelligence agencies in other countries, particularly the "Five Eyes" alliance (comprising Australia, Canada, New Zealand, the United Kingdom, and the United States). In this fashion, if US law prevented surveillance, they would outsource it to one of the other ‘Five Eyes’.
Court Orders and Legal Justifications: The Foreign Intelligence Surveillance Court (FISC) authorized many of the NSA's activities. However, there were concerns about the lack of transparency and the broad interpretations of laws like the Patriot Act and the Foreign Intelligence Surveillance Act (FISA).
Hacking and Encryption Bypassing: The NSA reportedly used various methods to bypass encryption and conduct hacking operations to access data and communications.
Dates when PRISM data collection began for each service provider.
These operations continue to be re-authorized by Congress with only minor cosmetic changes.
Even More Bloating After 9/11
Post-9/11, the intelligence community underwent significant reorganization. The creation of the Department of Homeland Security (DHS) and the Office of the Director of National Intelligence (DNI) aimed to enhance coordination among various intelligence agencies. Thanks to the anthrax-mediated extortion of a few Congresspeople, the Patriot Act greatly expanded government surveillance capabilities.
The types of activities authorized by the Patriot Act, in many instances are unconstitutional.
Roving Wiretaps: The Act allowed for roving wiretaps, enabling intelligence agencies to monitor multiple communication devices of a suspect without needing to obtain a separate court order for each device. This was aimed at individuals who frequently change phones or communication devices to evade surveillance.
Business Records Provision (Section 215): This section permitted the FBI to request court orders to access business records, including library and financial records, relevant to terrorism investigations. It expanded the type of information that could be sought and made it easier for investigators to obtain such data.
Foreign Intelligence Surveillance (FISA) Amendments: The Patriot Act broadened the scope of what could be considered relevant to an investigation, allowing for more expansive surveillance under FISA. It lowered the threshold for obtaining FISA warrants against suspected foreign agents and terrorists.
Enhanced Surveillance of 'Lone Wolf' Terrorists: The Act authorized the surveillance of individuals suspected of terrorist-related activities who may not be affiliated with a recognized terrorist group or foreign nation ('lone wolf' provision).
National Security Letters (NSLs): The Act expanded the FBI's authority to issue NSLs, which are administrative subpoenas used to demand communication records, financial records, and other information without prior judicial approval. It also imposed a gag order on recipients, prohibiting them from disclosing that they had received an NSL.
Sneak and Peek Warrants: The law allowed for delayed notification of search warrants, meaning law enforcement could search a property without immediately notifying the target of the search. These warrants were justified as necessary to prevent suspects from destroying evidence or fleeing.
Of the above, my favorite is National Security Letters, which allows the FBI to demand private records without a warrant or any other judicial oversight. Essentially, they are self-issued search warrants. I can’t image how these would ever be misused.
Go paid at the $5 a month level, and we will send you both the PDF and e-Pub versions of “Government” - The Biggest Scam in History… Exposed! and a coupon code for 10% off anything in the Government-Scam.com/Store.
Go paid at the $50 a year level, and we will send you a free paperback edition of Etienne’s book “Government” - The Biggest Scam in History… Exposed! AND a 64GB Liberator flash drive if you live in the US. If you are international, we will give you a $10 credit towards shipping if you agree to pay the remainder.
Support us at the $250 Founding Member Level and get a signed high-resolution hardcover of “Government” + Liberator flash drive + Larken Rose’s The Most Dangerous Superstition + Art of Liberty Foundation Stickers delivered anywhere in the world. Our only option for signed copies besides catching Etienne @ an event.
Same old story - a room full of men - beware whenever men get together to decide things for others. I wish people would notice.