United States intelligence operations abroad

Last updated

The United States is widely considered to have one of the most extensive and sophisticated intelligence network of any nation in the world, with organizations including the Central Intelligence Agency and the National Security Agency, amongst others. It has conducted numerous espionage operations against foreign countries, including both allies and rivals. Its operations have included the use of industrial espionage, [1] cyber espionage. [2] and mass surveillance. [3] [4] [5]

Contents

Many of these operations have generated public criticism as being unethical; examples include the overthrow of foreign governments, nonconsensual human experiments, extraordinary rendition, torture, targeted killings, assassinations, and the funding and training of militants who would go on to kill civilians and non-combatants. [3] [4] [5] Through a combination of hacking and secret court orders against American technology companies, the United States has also employed mass surveillance of ordinary individuals, both American and foreign nationals alike. [4]

Edward Snowden disclosures on global surveillance

A cache of top secret documents leaked in 2013 by ex-NSA contractor Edward Snowden, who obtained them while working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States., [6] revealed operational details about the U.S. National Security Agency (NSA) and its international partners' global surveillance [7] of foreign nationals and U.S. citizens. In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British and Canadian intelligence files that he had accessed via the exclusive "Five Eyes" network. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian , attracting considerable public attention. [8] The disclosure continued throughout the entire year of 2013, and a significant portion of the full cache of the estimated 1.7 million documents [9] was later obtained and published by many other media outlets worldwide, most notably The New York Times , the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L'espresso (Italy), NRC Handelsblad (the Netherlands), Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden). [10]

These media reports have shed light on the implications of several secret treaties signed by members of the UKUSA community in their efforts to implement global surveillance. For example, Der Spiegel revealed how the German Bundesnachrichtendienst (BND) transfers "massive amounts of intercepted data to the NSA", [11] while Sveriges Television revealed the National Defence Radio Establishment (FRA) provided the NSA with data from its cable collection, under a secret treaty signed in 1954 for bilateral cooperation on surveillance. [12] Other security and intelligence agencies involved in the practice of global surveillance include those in Australia (ASD), Britain (GCHQ), Canada (CSEC), Denmark (PET), France (DGSE), Germany (BND), Italy (AISE), the Netherlands (AIVD), Norway (NIS), Spain (CNI), Switzerland (NDB), as well as Israel (ISNU), which receives raw, unfiltered data of U.S. citizens that is shared by the NSA. [13] [14] [15] [16] [17] [18] [19] [20]

The disclosure provided impetus for the creation of social movements against mass surveillance, such as Restore the Fourth, and actions like Stop Watching Us and The Day We Fight Back. On the legal front, the Electronic Frontier Foundation joined a coalition of diverse groups filing suit against the NSA. Several human rights organizations have urged the Obama administration not to prosecute, but protect, "whistleblower Snowden": Amnesty International, Human Rights Watch, Transparency International, and the Index on Censorship, inter alia. [21] [22] [23] [24]

Cyber espionage

Snowden's revelations confirmed that the United States, together with Israel, conducted Operation Olympic Games, a covert and still unacknowledged campaign of sabotage by means of cyber disruption, directed at Iranian nuclear facilities. As reported, it was one of the first known uses of offensive cyber weapons. [25] Started under the George W. Bush administration in 2006, Olympic Games was accelerated under President Obama, who heeded Bush's advice to continue cyber attacks on Iranian nuclear facility at Natanz. [25] Amongst other things, they created the computer worm Stuxnet, which spread beyond Iran's nuclear facilities to the internet, causing collateral damage in other nations such as India and Indonesia.

Industrial espionage

In 1994, United States trade officials were accompanied with CIA agents to various international locations such as London and Geneva to spy on Japanese auto executives and government officials during Japan-U.S. negotiations on automotive trade. [26]

An article in the New York Times [26] wrote:

Spying on allies for economic advantage is a crucial new assignment for the C.I.A. now that American foreign policy is focused on commercial interests abroad. President Clinton made economic intelligence a high priority of his Administration, specifically information to protect and defend American competitiveness, technology and financial security in a world where an economic crisis can spread across global markets in minutes.

Targeted killings and assassinations

In April 2010, U.S. President Barack Obama placed Anwar al-Awlaki on a list of people whom the U.S. Central Intelligence Agency was authorized to kill because of terrorist activities. [27] [28] [29] The "targeted killing" of an American citizen was unprecedented. Al-Awlaki's father and civil rights groups challenged the order in court. [27] [29] [30] [31] Al-Awlaki was believed to be in hiding in Southeast Yemen in the last years of his life. [32] The U.S. deployed unmanned aircraft (drones) in Yemen to search for and kill him, [33] firing at and failing to kill him at least once, [34] before succeeding in a fatal American drone attack in Yemen on September 30, 2011. [35] Two weeks later, al-Awlaki's 16-year-old son, Abdulrahman al-Awlaki, a U.S. citizen who was born in Denver, was killed by a CIA-led drone strike in Yemen. [36] [37] [38] Nasser al-Awlaki, Anwar's father, released an audio recording condemning the killings of his son and grandson as senseless murders. [39] In June 2014, a previously classified memorandum issued by the United States Department of Justice was released, justifying al-Awlaki's death as a lawful act of war. [40]

Intelligence activity by location

Europe

France

In 1993, the CIA's Paris station launched an economic espionage operation to gain an advantage in negotiations over the 1994 General Agreement on Tariffs and Trade. They attempted to use a female operative posing as a public relations director for a save-the-rain-forest foundation as a honeypot trap to ensnare Henri Plagnol, an aide to French prime minister Édouard Balladur. However, Plagnol was warned by French counterintelligence officers who had seen through the plot and told him to play along. Over the course of two years, the French used Plagnol to turn the tables on the CIA, uncovering multiple CIA operatives and ultimately publicly expelling the CIA Paris station chief along with other key agents from the country. [26]

Germany

The CIA recruited over a dozen spies working in multiple German industries, including a double agent in German intelligence. These spies were uncovered in raids on the Ministry of Defense by German authorities in 2014. Angela Merkel, whose personal cellphone was tapped by the NSA, ordered the CIA's Berlin station chief to leave the country. [41] [42]

In May 2021, Denmark's public service broadcaster, DR, revealed that the Danish Defence Intelligence Service helped the NSA spy on European leaders including German Chancellor Angela Merkel from 2012 to 2014, in a scheme codenamed as "Operation Dunhammer". Intelligence was also collected on other officials from Germany, France, Sweden and Norway. [43]

Middle East

Iran

In 1953, the CIA worked with the United Kingdom to overthrow the democratically elected government of Iran led by Prime Minister Mohammad Mossadegh who had attempted to nationalize Iran's petroleum industry, threatening the profits of the Anglo-Iranian Oil Company, now known as BP. [44] Declassified CIA documents show that Britain was fearful of Iran's plans to nationalize its oil industry and pressed the U.S. to mount a joint operation to depose the prime minister and install a puppet regime. [45] In 1951 the Iranian parliament voted to nationalize the petroleum fields of the country. [45] [46]

The coup was led by CIA operative Kermit Roosevelt, Jr. (grandson of President Theodore Roosevelt). With help from British intelligence, the CIA planned, funded and implemented Operation Ajax. [47] In the months before the coup, the UK and U.S. imposed a boycott of the country, exerted other political pressures, and conducted a massive covert propaganda campaign to create the environment necessary for the coup. The CIA hired Iranian agents provocateurs who posed as communists, harassed religious leaders and staged the bombing of one cleric's home to turn the Islamic religious community against the government. For the U.S. audience, the CIA hoped to plant articles in U.S. newspapers saying that Shah Mohammed Reza Pahlevi's return to govern Iran resulted from a homegrown revolt against what was being represented to the U.S. public as a communist-leaning government. The CIA successfully used its contacts at the Associated Press to put on the newswire in the U.S. a statement from Tehran about royal decrees that the CIA itself had written. [45]

The coup initially failed and the Shah fled the country. After four days of rioting, Shi'ite-sparked street protests backed by pro-Shah army units defeated Mossadeq's forces and the Shah returned to power. [48]

The CIA subsequently used the apparent success of their Iranian coup project to bolster their image in American government circles. They expanded their reach into other countries, taking a greater portion of American intelligence assets based on their record in Iran. [48]

In August 2013 the CIA admitted that it was involved in both the planning and the execution of the coup, including the bribing of Iranian politicians, security and army high-ranking officials, as well as pro-coup propaganda. [49] The CIA is quoted acknowledging the coup was carried out "under CIA direction" and "as an act of U.S. foreign policy, conceived and approved at the highest levels of government." [50] The National Security Archive said it that while it "applauds the CIA's decision to make these materials available, today's posting shows clearly that these materials could have been safely declassified many years ago without risk of damage to national security." [51]

East Asia

The New York Times reported in May 2017 that "the Chinese government systematically dismantled C.I.A. spying operations in the country starting in 2010, killing or imprisoning more than a dozen sources over two years and crippling intelligence gathering there for years afterward. Current and former American officials described the intelligence breach as one of the worst in decades." [52]

See also

Related Research Articles

<span class="mw-page-title-main">Joint Special Operations Command</span> Joint component command of the U.S. Special Operations Command

The Joint Special Operations Command (JSOC) is a joint component command of the United States Special Operations Command (USSOCOM) and is charged with studying special operations requirements and techniques to ensure interoperability and equipment standardization, to plan and conduct special operations exercises and training, to develop joint special operations tactics, and to execute special operations missions worldwide. It was established in 1980 on recommendation of Colonel Charlie Beckwith, in the aftermath of the failure of Operation Eagle Claw. It is headquartered at Pope Field.

<span class="mw-page-title-main">Russ Tice</span> American intelligence analyst (born 1961)

Russell D. Tice is a former intelligence analyst for the United States Air Force, Office of Naval Intelligence, Defense Intelligence Agency (DIA), and National Security Agency (NSA).

<span class="mw-page-title-main">Five Eyes</span> Intelligence alliance

The Five Eyes (FVEY) is an Anglosphere intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. These countries are parties to the multilateral UK-USA Agreement, a treaty for joint cooperation in signals intelligence. Informally, Five Eyes can also refer to the group of intelligence agencies of these countries.

<span class="mw-page-title-main">Anwar al-Awlaki</span> American-Yemeni imam and suspected Islamist extremist (1971–2011)

Anwar Nasser Abdulla al-Awlaki was an American-Yemeni Islamic scholar and lecturer who was killed in 2011 in Yemen by a U.S. government drone strike ordered by President Barack Obama. Al-Awlaki became the first U.S. citizen to be targeted and killed by a drone strike from the U.S. government. U.S. government officials argued that Awlaki was a key organizer for the Islamist terrorist group al-Qaeda, and in June 2014, a previously classified memorandum issued by the U.S. Department of Justice was released, justifying al-Awlaki's death as a lawful act of war. Civil liberties advocates have described the incident as "an extrajudicial execution" that breached al-Awlaki's constitutional right to due process, including a trial.

<span class="mw-page-title-main">Jeremy Scahill</span> American investigative journalist

Jeremy Scahill is an American investigative journalist, writer, a founding editor of the online news publication The Intercept, and author of Blackwater: The Rise of the World's Most Powerful Mercenary Army, which won the George Polk Book Award. His book Dirty Wars: The World Is a Battlefield was published by Nation Books on April 23, 2013. On June 8, 2013, the documentary film of the same name, produced, narrated and co-written by Scahill, was released. It premiered at the 2013 Sundance Film Festival.

<span class="mw-page-title-main">Sam Adams Award</span> Annual award for intelligence professionals

The Sam Adams Award is given annually since 2002 to an intelligence professional who has taken a stand for integrity and ethics. The Award is granted by the Sam Adams Associates for Integrity in Intelligence, a group of retired CIA officers. It is named after Samuel A. Adams, a CIA whistleblower during the Vietnam War, and takes the physical form of a "corner-brightener candlestick".

<span class="mw-page-title-main">Targeted killing</span> Extrajudicial assassination by governments

Targeted killing is a form of assassination carried out by governments outside a judicial procedure or a battlefield.

<span class="mw-page-title-main">Killing of Abdulrahman al-Awlaki</span> Murder of American teenager in 2011

Abdulrahman Anwar al-Awlaki was a 16-year-old United States citizen who was killed by a drone strike on October 14, 2011, under a policy approved by U.S. President Barack Obama.

<span class="mw-page-title-main">William Binney (intelligence official)</span> Former U.S. intelligence official and cryptoanalyst; whistleblower

William "Bill" Edward Binney is a former intelligence official with the United States National Security Agency (NSA) and whistleblower. He retired on October 31, 2001, after more than 30 years with the agency.

<span class="mw-page-title-main">PRISM</span> Mass surveillance program run by the NSA

PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC and Apple under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle.

<span class="mw-page-title-main">Edward Snowden</span> American whistleblower and former NSA contractor (born 1983)

Edward Joseph Snowden is an American and naturalized Russian citizen who was a computer intelligence consultant and whistleblower who leaked highly classified information from the National Security Agency (NSA) in 2013 when he was an employee and subcontractor. His disclosures revealed numerous global surveillance programs, many run by the NSA and the Five Eyes intelligence alliance with the cooperation of telecommunication companies and European governments and prompted a cultural discussion about national security and individual privacy.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

During the 2010s, international media news reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked by ex-NSA contractor Edward Snowden. The documents consist of intelligence files relating to the U.S. and other Five Eyes countries. In June 2013, the first of Snowden's documents were published, with further selected documents released to various news outlets through the year.

<span class="mw-page-title-main">Reactions to global surveillance disclosures</span>

The global surveillance disclosure released to media by Edward Snowden has caused tension in the bilateral relations of the United States with several of its allies and economic partners as well as in its relationship with the European Union. In August 2013, U.S. President Barack Obama announced the creation of "a review group on intelligence and communications technologies" that would brief and later report to him. In December, the task force issued 46 recommendations that, if adopted, would subject the National Security Agency (NSA) to additional scrutiny by the courts, Congress, and the president, and would strip the NSA of the authority to infiltrate American computer systems using "backdoors" in hardware or software. Geoffrey R. Stone, a White House panel member, said there was no evidence that the bulk collection of phone data had stopped any terror attacks.

This is a category of disclosures related to global surveillance.

<span class="mw-page-title-main">Global surveillance</span> Mass surveillance across national borders

Global mass surveillance can be defined as the mass surveillance of entire populations across national borders.

Nasser al-Awlaki was a Yemeni scholar and politician. He was the father of Anwar and grandfather of Abdulrahman al-Awlaki, who were killed in separate U.S. drone strikes. Nasser's granddaughter Nawar al-Awlaki was also killed in a U.S. raid in Yemen in 2017, the Raid on Yakla.

<span class="mw-page-title-main">Barack Obama on mass surveillance</span> Overview of the statements of former U.S. president Barack Obama on mass surveillance

Former U.S. President Barack Obama favored some levels of mass surveillance. He has received some widespread criticism from detractors as a result. Due to his support of certain government surveillance, some critics have said his support violated acceptable privacy rights, while others dispute or attempt to provide justification for the expansion of surveillance initiatives under his administration.

Commentary on Edward Snowden's disclosure is part of the reactions to global surveillance disclosures made by Edward Snowden.

<span class="mw-page-title-main">Timeline of global surveillance disclosures (2013–present)</span>

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

References

  1. "Snowden Documents Show U.S. Spied on Petrobras, Globo TV Reports ", Bloomberg, September 8, 2013
  2. "N.S.A. Breached Chinese Servers Seen as Security Threat", New York Times, March 22, 2014
  3. 1 2 Resolution 1507 (2006). Archived June 12, 2010, at the Wayback Machine Alleged secret detentions and unlawful inter-state transfers of detainees involving Council of Europe member states
  4. 1 2 3 DeYoung, Karen; Walter Pincus (2007-06-22). "CIA to Air Decades of Its Dirty Laundry". Washington Post. Retrieved 2007-06-22.
  5. 1 2 Priest, Dana (2005-11-02), "CIA Holds Terror Suspects in Secret Prisons", Washington Post, retrieved 2007-02-19
  6. "Who holds security clearances?". The Washington Post. June 10, 2013. Retrieved February 12, 2014.
  7. Barton Gellman (December 24, 2013). "Edward Snowden, after months of NSA revelations, says his mission's accomplished". The Washington Post . Retrieved December 25, 2013. Taken together, the revelations have brought to light a global surveillance system ...
  8. Greenwald, Glenn (6 June 2013). "NSA collecting phone records of millions of Verizon customers daily". The Guardian. Retrieved August 16, 2013. Exclusive: Top secret court order requiring Verizon to hand over all call data shows scale of domestic surveillance under Obama
  9. "Pentagon Says Snowden Took Most U.S. Secrets Ever: Rogers". Bloomberg . Retrieved January 9, 2014. The Pentagon concluded that Edward Snowden committed the biggest theft of U.S. secrets in history, downloading about 1.7 million intelligence files, including information that could put personnel in jeopardy, according to lawmakers.
  10. "NSA Primary Sources". Electronic Frontier Foundation. 19 November 2013. Retrieved December 14, 2013.
  11. Hubert Gude, Laura Poitras & Marcel Rosenbach (August 5, 2013). "German intelligence Sends Massive Amounts of Data to the NSA". Der Spiegel . Retrieved December 14, 2013.
  12. Gunnar Rensfeldt. "NSA "asking for" specific exchanges from FRA – Secret treaty since 1954". Sveriges Television . Retrieved December 14, 2013. This document, dated April 18th of this year, clearly shows that the relation is very close indeed, seemingly growing even closer. 'NSA's relationship with the FRA, an extremely competent, technically innovative, and trusted Third Party partner, continues to grow. The FRA provided NSA with access to its cable collection in 2011'
  13. Glenn Greenwald, Laura Poitras & Ewen MacAskill (September 11, 2013). "NSA shares raw intelligence including Americans' data with Israel". The Guardian. Retrieved September 14, 2013.
  14. Tim Leslie & Mark Corcoran (8 November 2013). "Explained: Australia's involvement with the NSA, the US spy agency at heart of global scandal". Australian Broadcasting Corporation . Retrieved December 18, 2013.
  15. Julian Borger. "GCHQ and European spy agencies worked together on mass surveillance". The Guardian . Retrieved December 18, 2013.
  16. Greg Weston; Glenn Greenwald; Ryan Gallagher. "Snowden document shows Canada set up spy posts for NSA". Canadian Broadcasting Corporation . Retrieved December 13, 2013.
  17. "Denmark is one of the NSA's '9-Eyes'". The Copenhagen Post . Archived from the original on December 19, 2013. Retrieved December 18, 2013.
  18. Jacques Follorou. "La France, précieux partenaire de l'espionnage de la NSA". Le Monde (in French). Retrieved December 18, 2013.
  19. Christian Fuchs, John Goetz und Frederik Obermaier. "Verfassungsschutz beliefert NSA". Süddeutsche Zeitung (in German). Retrieved December 18, 2013.
  20. Kjetil Malkenes Hovland. "Norway Monitored Phone Traffic and Shared Data With NSA". The Wall Street Journal . Retrieved December 18, 2013.
  21. "USA must not persecute whistleblower Edward Snowden". Amnesty International . Retrieved August 16, 2013.
  22. "US: Statement on Protection of Whistleblowers in Security Sector". Human Rights Watch. 18 June 2013. Retrieved August 16, 2013.
  23. Transparency International Germany. "Transparency International Germany: Whistleblower Prize 2013 for Edward Snowden". Transparency International . Retrieved August 16, 2013.
  24. "US needs to protect whistleblowers and journalists". Index on Censorship. 24 June 2013. Retrieved August 16, 2013.
  25. 1 2 Sanger, David (1 June 2012). "Obama Order Sped Up Wave of Cyberattacks Against Iran". The New York Times . Retrieved 19 October 2012. President Barack Obama "secretly ordered increasingly sophisticated attacks on the computer systems that run Iran's main nuclear enrichment facilities, significantly expanding America's first sustained use of cyber weapons"
  26. 1 2 3 "Emerging Role For the C.I.A.: Economic Spy", New York Times, October 15, 1995
  27. 1 2 Miller, Greg (April 6, 2010). "Muslim cleric Aulaqi is 1st U.S. citizen on list of those CIA is allowed to kill". The Washington Post. Retrieved April 9, 2010.
  28. Shane, Scott (April 6, 2010). "U.S. Approves Targeted Killing of American Cleric". The New York Times. Archived from the original on April 8, 2010. Retrieved April 6, 2010.
  29. 1 2 Leonard, Tom (April 7, 2010). "Barack Obama orders killing of US cleric Anwar al-Awlaki". The Daily Telegraph. London. Archived from the original on April 11, 2010. Retrieved April 8, 2010.
  30. "Al-Aulaqi v. Panetta; American Civil Liberties Union". Aclu. September 13, 2012. Retrieved October 23, 2012.
  31. Perez, Evan (December 8, 2010). "Judge Dismisses Targeted-Killing Suit". The Wall Street Journal.
  32. "Yemen charges U.S.-born cleric with plot to kill foreigners", Associated Press. November 2, 2010; retrieved November 2, 2010.
  33. Coughlin, Con; Sherwell, Philip (May 2, 2010). "American drones deployed to target Yemeni terrorist". The Daily Telegraph . London.
  34. "Anwar al-Awlaki Targeted By U.S. Drones After Osama Bin Laden Raid". ABC News. May 6, 2011. Retrieved September 30, 2011.
  35. "Islamist cleric Anwar al-Awlaki 'killed in Yemen'". BBC News. September 30, 2011. Retrieved September 30, 2011.
  36. Kasinov, Laura, "Fatal Strikes Hit Yemen as Violence Escalates", The New York Times, 15 October 2011
  37. Herridge, Catherine, "Obama Administration Pressed for Accountability After Americans Killed in Anti-Terror Airstrikes", Fox News, October 25, 2011
  38. Erdbrink, Thomas (October 18, 2011). "Anwar al-Awlaki's family speaks out against his son's death in airstrike". The Washington Post.
  39. "Official: Drone attack kills Al-Awlaki's son in Yemen". CNN. October 15, 2011. Archived from the original on December 20, 2011.
  40. Lauter, David (June 23, 2014). "Memo justifying drone killing of American Al Qaeda leader is released". Los Angeles Times .
  41. Chambers, Madeline (July 20, 2014). "Berlin tells CIA station chief to leave in spy scandal". Reuters. Retrieved April 27, 2021.
  42. Brennan, Margaret (July 11, 2014). "Germany booted, but didn't "expel" CIA chief". CBS News. Retrieved April 25, 2021.
  43. "NSA spying row: Denmark accused of helping US spy on European officials". BBC. 31 May 2021.
  44. The New York Review of Books, "A Crass and Consequential Error," reviewing the book Patriot of Persia: Muhammad Mossadegh and a Tragic Anglo-American Coup by Christopher de Bellaigue, 16 August 2012.
  45. 1 2 3 "Special Report: Secret History of the CIA in Iran". New York Times . 2000.
  46. "Country Studies: Iran". Library of Congress . Retrieved March 7, 2007.
  47. National Security Archive, cited in "National Security Archive Muhammad Mosaddeq and the 1953 Coup in Iran", edited by Mark J. Gasiorowski and Malcolm Byrne, Syracuse University Press 2004.
  48. 1 2 Bayandor, Darioush (April 2010). Iran and the CIA: The Fall of Mosaddeq Revisited. Palgrave Macmillan. ISBN   978-0-230-57927-9.
  49. Dehghan, Saeed Kamali; Norton-Taylor, Richard (19 August 2013). "CIA admits role in 1953 Iranian coup". The Guardian.
  50. Dan Merica; Jason Hanna (19 August 2013). "In declassified document, CIA acknowledges role in 1953 Iran coup". CNN Politics.
  51. Byrne, Malcolm, ed. (August 19, 2013). "CIA Confirms Role in 1953 Iran Coup". National Security Archive . Retrieved April 28, 2021.
  52. Mazzetti, Mark; Goldman, Adam; Schmidt, Michael S.; Apuzzo, Matt (20 May 2017). "Killing C.I.A. Informants, China Crippled U.S. Spying Operations". The New York Times. Retrieved 2017-05-20.