era · present · shadow-states

CIA and Covert Operations

Secret wars, regime change, and the invisible hand of empire

By Esoteric.Love

Updated  10th April 2026

era · present · shadow-states
The Presentshadow statesCivilisations~21 min · 4,126 words
EPISTEMOLOGY SCORE
62/100

1 = fake news · 20 = fringe · 50 = debated · 80 = suppressed · 100 = grounded

SUPPRESSED

Something extraordinary happens when governments decide that the normal rules of statecraft are too slow, too transparent, or too inconvenient. A foreign election tilts. A popular leader vanishes. A guerrilla army appears from nowhere, armed with weapons that bear no national markings. The world notices the effect but rarely the cause — and that, precisely, is the point.

01

TL;DRWhy This Matters

The story of covert operations is not merely a chronicle of Cold War intrigue or Hollywood espionage fantasy. It is a living thread that runs from the smoke-filled strategy rooms of the 1950s straight into the algorithmic battlefields of the present. When the Central Intelligence Agency was formally established by the National Security Act of 1947, it was born into a world that believed secret power could contain catastrophe. Whether it delivered on that promise — or created new catastrophes of its own — is one of the defining questions of the modern era.

For the nations on the receiving end of these operations, the consequences were not abstract. Families were fractured. Economies were strangled. Democratic experiments were ended before they had a chance to breathe. Understanding what covert operations are, how they function, and what they have actually produced forces us to reckon with the gap between stated values and practiced power — a gap that exists in virtually every major civilization, not just American ones.

But this is not a simple morality tale. Intelligence agencies operate in a world of genuine danger, real adversaries, and choices where every option carries a cost. The Soviet KGB, British MI6, Israeli Mossad, Chinese MSS, and dozens of other services have all engaged in operations that reshape nations from the inside. The question is not whether secret power exists — it does, everywhere, always — but how it is authorized, constrained, and eventually accounted for.

We are living in an era when the consequences of mid-twentieth-century covert decisions are still unspooling. The blowback from operations in Iran, Guatemala, Chile, Afghanistan, and elsewhere keeps arriving in contemporary headlines. Meanwhile, new forms of covert action — cyberattacks, algorithmic influence campaigns, drone warfare conducted in legal shadows — raise questions that older frameworks of oversight were never designed to answer. This is why the history matters urgently, right now.

02

The Architecture of Secrecy: How Covert Operations Work

A covert operation is technically defined, within U.S. law, as an activity conducted by the government in such a way that the role of the U.S. is intended to be neither acknowledged nor apparent. This is distinct from a clandestine operation, which is simply secret — the distinction being that covert operations are specifically designed for plausible deniability, allowing governments to act without formal accountability.

The CIA's operational toolkit has historically included five broad categories. Propaganda and information operations involve the production and distribution of media — newspapers, radio broadcasts, pamphlets, later websites and social media — designed to shape how a population thinks about its leaders, its enemies, or itself. Political action includes funding friendly politicians, parties, and civic organizations to tilt domestic politics in a target country. Paramilitary operations involve training, funding, equipping, and sometimes directly leading armed groups. Economic disruption can mean anything from counterfeiting a nation's currency to sabotaging its infrastructure. And coups and assassinations — though the latter have been nominally prohibited since a 1976 executive order — represent the most direct form of regime change.

What makes this machinery so difficult to evaluate is the authorization chain. In the United States, covert operations must be approved by a presidential finding — a written document authorizing the activity — and briefed to the congressional intelligence committees through a process known as oversight. In practice, these oversight mechanisms have varied wildly in their effectiveness. During the 1950s and 1960s, there was essentially no meaningful legislative check. The Church Committee investigations of 1975–76 revealed a staggering catalogue of unauthorized activity: assassination plots against Fidel Castro, Patrice Lumumba, and others; mass surveillance of American citizens; infiltration of domestic political movements. The reforms that followed were real, but intelligence professionals and critics alike debate whether they were sufficient.

The authorization question also involves a deeper philosophical problem. When a president signs a finding, authorizing, say, the arming of rebel forces in a foreign country, the immediate effects are knowable — but the downstream effects extend for decades. The person signing the document cannot fully anticipate what they are setting in motion. This is not an excuse; it is a structural feature of covert power that demands serious attention.

03

Iran 1953 and Guatemala 1954: The Template Is Set

No two operations did more to establish the template — and the mythology — of American covert action than Operation AJAX in Iran and Operation PBSUCCESS in Guatemala, both conducted within a year of each other in the early 1950s.

In Iran, Prime Minister Mohammad Mosaddegh had nationalized the Anglo-Iranian Oil Company in 1951, a decision wildly popular among Iranians and deeply alarming to British and American interests. The CIA, working with British intelligence, organized a campaign of propaganda, bribery, and street-level violence that culminated in a coup on August 19, 1953. Mosaddegh was arrested. Shah Mohammad Reza Pahlavi, who had briefly fled the country, was restored to power. The operation was regarded internally as a clean success — fast, cheap, and effective.

The Iranian operation was not publicly acknowledged by the United States government until 2013, sixty years later. By that point, the consequences had already reshaped the world. The Shah's increasingly brutal rule, enforced by the CIA-trained secret police SAVAK, generated the very religious radicalism that Washington feared. The 1979 Islamic Revolution that produced the hostage crisis, the enmity that still defines U.S.-Iranian relations, and a regional shift whose effects touch every subsequent Middle Eastern conflict — all of it flows, at least in part, from a decision made in a conference room in 1953. Whether the operation "worked" depends entirely on your time horizon.

Guatemala followed a similar logic. President Jacobo Árbenz had implemented land reforms that redistributed idle land — including large holdings of the United Fruit Company, an American corporation with deep ties to the Eisenhower administration — to poor indigenous farmers. The CIA characterized him as a communist sympathizer and orchestrated his overthrow in 1954 through a combination of psychological warfare, a small armed force, and strategic air power. Árbenz resigned. The decades that followed brought a series of military dictatorships and a civil war that lasted from 1960 to 1996, killing an estimated 200,000 people, with the majority of atrocities committed by U.S.-backed governments.

The template set by these operations — choose a leader, define them as a threat, organize local forces, apply pressure, achieve regime change — would be replicated, with variations, in Congo, Chile, Indonesia, and beyond. What changed over time was not the template but the scale of the consequences.

04

The Allende Question: Chile and the Limits of Legitimacy

Few covert operations have generated more lasting moral debate than the American campaign against Salvador Allende, the Chilean socialist who was elected president in 1970 in a free, internationally observed election. The fact of his democratic mandate made the subsequent operations particularly revealing about the actual limits of American commitment to democratic values.

The Nixon administration's response to Allende's election was immediate and multi-pronged. National Security Advisor Henry Kissinger is famously quoted as saying, in reference to Chile's democratic choice: "I don't see why we need to stand by and watch a country go communist due to the irresponsibility of its own people." The CIA pursued what became known as Track I — attempting to prevent Allende from being confirmed by the Chilean congress — and Track II, a direct attempt to foment a military coup. Track II involved encouraging Chilean military officers to act against the constitutional government, leading to the murder of General René Schneider, who had refused to support a coup.

Allende survived the initial destabilization attempts and governed for three years. During that time, the CIA continued funding opposition newspapers, supporting strikes, and working to create what one internal document described as an economy that would "scream." On September 11, 1973, General Augusto Pinochet led a military coup. Allende died in the presidential palace — whether by suicide or assassination remains disputed. The Pinochet regime that followed tortured and killed thousands of political opponents, many in facilities where American advisors were present.

The Chile operation is particularly instructive for what it reveals about the relationship between covert action and stated ideology. The United States claimed to be defending democracy against communism. In Chile, it overthrew a democracy to install a dictatorship. The philosophical contortion required to defend this — essentially, that some democracies must be destroyed to prevent a future threat to democracy — became a template for subsequent justifications that critics found increasingly strained.

The CIA's role in Chile was partially acknowledged in congressional investigations and declassified documents released in the 1990s and 2000s. The full picture is still incomplete. This matters because incomplete historical records make accountability impossible and make it harder for societies — American, Chilean, or any other — to honestly evaluate what was done in their name.

05

Afghanistan and the Mujahideen: Manufacturing Blowback

The word blowback — originally CIA internal jargon for the unintended consequences of covert operations — has entered general usage largely because of one operation: the funding and arming of Afghan resistance fighters against the Soviet occupation in the 1980s.

Operation Cyclone, authorized by President Carter in 1979 and dramatically expanded under Reagan, was the largest covert operation in CIA history up to that point. Working through Pakistani intelligence (the ISI), the CIA funneled billions of dollars in weapons, training, and support to the Mujahideen — a coalition of Islamist guerrilla factions fighting Soviet forces. The operation was, by a narrow military metric, successful. Soviet forces withdrew from Afghanistan in 1989. Some analysts credit the operation with hastening the collapse of the Soviet Union itself, though this claim is debated by historians.

What is less debated is what happened next. Among the fighters trained, funded, and celebrated by American officials were figures who would later form or support al-Qaeda. The Afghan war became a training ground and ideological incubator for a generation of jihadist fighters. The networks built to funnel weapons into Afghanistan persisted and evolved. The ISI, empowered and enriched by the partnership, pursued its own strategic goals that frequently conflicted with American interests. The Taliban, which provided sanctuary to al-Qaeda and precipitated the post-September 11 invasion, emerged from the same networks Operation Cyclone had cultivated.

The Afghanistan case raises a question that no one in the intelligence community has fully resolved: how do you calculate the true cost of an operation that appears to succeed in the short term but generates catastrophic consequences over a longer arc? The Soviet defeat in Afghanistan was real. The September 11 attacks, which killed nearly 3,000 people and triggered two decades of war in which hundreds of thousands died, were also real. Both outcomes were connected to the same series of covert decisions. This is not a simple causal chain — the world is not that tidy — but the connection is substantial enough that any honest accounting must include it.

It is also worth noting that this dynamic is not uniquely American. Soviet operations in Afghanistan had their own unintended consequences. Iranian covert support for various militias throughout the Middle East has produced blowback of its own. The pattern of secret interventions producing unforeseen consequences appears to be a structural feature of covert power, not a characteristic of any particular nation's incompetence.

06

The Black Sites, Enhanced Interrogation, and the Torture Debate

The September 11 attacks transformed American covert operations in ways that are still being assessed. The most contested transformation was the authorization of what the CIA called enhanced interrogation techniques — methods that critics, international law bodies, and a significant number of the CIA's own internal reviewers described simply as torture.

The legal architecture that enabled this was itself a kind of covert operation. The Office of Legal Counsel memos, written by lawyers John Yoo and Jay Bybee in 2002, created a framework that redefined the legal meaning of torture in ways that, to put it charitably, surprised most professional legal scholars. The memos were classified. The black sites — secret detention facilities operated by the CIA in countries including Thailand, Poland, and Romania — were hidden from congressional oversight for years.

The Senate Intelligence Committee Report on CIA Torture, completed in 2012 and partially released in 2014, concluded that the enhanced interrogation program was more brutal than the CIA had represented to oversight bodies, that it had not produced unique intelligence that disrupted terrorist plots, and that the CIA had systematically misled Congress and the executive branch about the program's effectiveness. The CIA disputed many of these findings. The dispute between these accounts has not been resolved, and the underlying classified evidence remains unavailable to the public.

This episode is significant not only for its moral dimensions but for what it reveals about the relationship between covert power and institutional honesty. Oversight mechanisms work only if the information provided to overseers is accurate. The Senate report found systematic patterns of misleading reporting. Whether this was deliberate deception, bureaucratic self-protection, or honest disagreement about the facts is itself contested. What is not contested is that a program of significant brutality was conducted largely beyond the reach of the oversight systems designed to constrain it.

The torture debate also illustrates a recurring theme: the way that crisis conditions — genuine emergency, real fear, actual threat — are used to justify expansions of covert power that, under calmer conditions, would face much higher scrutiny. This is not unique to the CIA or to the United States. It is a feature of covert power as a category.

07

Digital Shadows: Covert Operations in the Cyber Age

The tradecraft of regime change and covert influence has not been retired — it has been translated into new media. Understanding contemporary covert operations requires taking seriously the ways in which cyber operations, influence campaigns, and algorithmic manipulation have extended and transformed the classical toolkit.

The most publicly documented case of a new-era covert operation is Russia's Internet Research Agency campaign during the 2016 U.S. election, as detailed in the Mueller Report and subsequent Senate intelligence investigations. The operation involved the creation of thousands of fake social media accounts, the purchase of targeted political advertising, and the orchestration of real-world political events — all designed to deepen existing social divisions and favor one electoral outcome. This was, structurally, a classic covert influence operation: propaganda, political action, and plausible deniability, translated into digital form.

But Russia was not alone in developing these capabilities. The United States has its own significant offensive cyber capabilities, documented in part by the Snowden revelations of 2013. STUXNET, the malware that damaged Iranian nuclear centrifuges and is widely attributed to a joint U.S.-Israeli operation called Olympic Games, represented a new category of covert action: a cyberattack designed to cause physical damage to an adversary's infrastructure without triggering conventional military response. STUXNET was arguably the first deployment of a cyberweapon as a covert tool of statecraft, and it established precedents whose long-term implications are not yet clear.

The cyber domain also creates new problems for the traditional frameworks of covert action. Attribution is difficult — when a cyberattack occurs, definitively proving who conducted it can take months or years, and the evidence often cannot be made public without compromising sources and methods. The authorization chain for cyber operations is murky; in the United States, the legal frameworks governing offensive cyber operations have evolved through a series of executive orders and classified directives rather than through clear public legislation. The oversight mechanisms designed for the Cold War era covert operation are poorly suited to operations that can be conducted by a small team, at near-zero cost, from anywhere in the world, with effects that propagate globally in hours.

Meanwhile, artificial intelligence is creating capabilities that no existing oversight framework was designed for. AI systems can generate convincing audio and video of people saying things they never said. They can identify, target, and message thousands of individuals simultaneously with personalized influence content. They can monitor and map social networks to identify leverage points for political manipulation. Whether, how, and by whom these capabilities are being used covertly is, by definition, largely unknown. This is not speculation — it is the logical extension of trends that are already documented in public reporting and academic research.

08

The Oversight Paradox: Who Watches the Watchers?

Every democratic society that maintains an intelligence agency faces a version of the same fundamental paradox: effective oversight requires access to information, but the value of covert operations depends on secrecy. These requirements are in direct tension, and there is no tidy resolution.

The American system of congressional oversight was substantially reformed after the Church Committee investigations. The House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence were established specifically to provide legislative oversight of intelligence activities. Members of these committees receive classified briefings on covert programs; they have the formal authority to question and constrain intelligence activities.

In practice, this system has functioned imperfectly. The Gang of Eight — the congressional leadership and the chairs and ranking members of both intelligence committees — are briefed on the most sensitive programs, but they may not take notes, may not consult their own staff, and in some cases have been explicitly told they may not discuss what they learned with other members. The practical consequence is that meaningful deliberation — the core mechanism of democratic oversight — is prevented by the classification rules governing the briefings.

There is also a documented pattern of intelligence agencies providing misleading or incomplete information to oversight bodies. This has been found not only in the torture investigation but in cases involving the NSA's domestic surveillance programs, where the Director of National Intelligence provided congressional testimony that was later revealed to be false. The question of how oversight can function when the overseen institution controls the information the overseers depend on is genuinely unresolved.

Comparative analysis is instructive here. The British system of parliamentary oversight of MI6 and GCHQ has been criticized for similar failures of meaningful scrutiny, particularly in the context of post-September 11 operations. Israeli oversight of the Mossad operates under a different constitutional framework and with different cultural assumptions about the relationship between security and democratic accountability. No major democracy has solved the oversight paradox in a fully satisfying way. Some smaller democracies, with less extensive intelligence operations and stronger traditions of bureaucratic transparency, come closest — but they also face fewer of the genuine security pressures that generate the demand for covert power in the first place.

The Inspector General system within intelligence agencies represents an alternative oversight mechanism — internal watchdogs with some independence. The CIA's Inspector General has produced significant reports documenting program failures and legal violations. But IG reports can be classified, their release can be blocked by agency leaders, and their recommendations are not binding. The 2009 release of the CIA IG report on the enhanced interrogation program happened only after years of legal pressure from civil liberties organizations.

09

Empire and Its Discontents: The Civilizational Dimension

To place the CIA and its covert operations within the category of "Civilisations" is to ask a larger question than the operational one: what do these activities reveal about the civilization that produced them?

The concept of empire does not require formal colonization. Political scientists use the term informal empire to describe relationships in which a powerful state exercises decisive influence over nominally sovereign nations through economic pressure, military threat, and — crucially — covert manipulation of domestic politics. The historical record of CIA operations, taken as a whole, describes something that fits this definition in important ways. From Iran to Guatemala to Congo to Chile to Indonesia to Nicaragua, the pattern of American covert intervention has consistently favored governments that protected American economic and strategic interests over governments that prioritized the interests of their own populations.

This is not a unique American phenomenon. British covert operations throughout the twentieth century followed similar patterns in the Middle East, Africa, and Asia. Soviet operations in Eastern Europe, Africa, and Latin America were driven by the same logic of great-power interest expressed through covert means. Chinese operations in Southeast Asia and Africa, while less extensively documented in public records, follow recognizable patterns. The question of whether this constitutes empire is partly semantic — the more substantive question is what this pattern of behavior costs, who pays the cost, and whether any accountability is possible.

The civilizational dimension also involves the effect of covert operations on the society that conducts them. Hannah Arendt argued that imperialism corrupts not only the colonized but the colonizing society — that the practices developed abroad eventually find their way home. The Church Committee documented the truth of this observation in an American context: the surveillance techniques, propaganda methods, and disregard for legal constraints developed for foreign operations had been turned, systematically, on American citizens. The COINTELPRO program, which targeted civil rights leaders, antiwar activists, and political organizations, was run by the FBI but drew on methods and a culture shaped by covert operations.

The contemporary versions of this dynamic are visible in the debates over domestic surveillance authorities, the militarization of police, and the use of algorithmic tracking tools originally developed for counterterrorism purposes. The boundary between foreign covert operations and domestic power is more permeable than democratic theory assumes.

None of this leads to a simple conclusion. The world contains genuine threats and real adversaries who conduct their own covert operations without restraint. The argument is not that covert power should not exist — that argument has never been seriously entertained by any major government — but that it requires genuine accountability, honest historical reckoning, and frameworks adequate to the technologies that now make it possible.

10

The Questions That Remain

What would a genuinely effective system of democratic oversight over covert operations look like — one that provides meaningful scrutiny without destroying the operational security that makes intelligence work valuable? Several democracies have experimented with different models, but none has produced a framework that scholars, intelligence professionals, and civil liberties advocates broadly regard as adequate.

Does the pattern of covert interventions across the twentieth and twenty-first centuries represent a coherent imperial strategy, or does it reflect something more episodic — the accumulation of decisions made by different actors in different contexts, connected more by institutional culture and available tools than by any unified plan? Historians disagree sharply on this question, and the answer matters for how we understand accountability.

How should we calculate the moral accounting of an operation that achieves its stated short-term objective while generating catastrophic long-term consequences? The frameworks currently used — legal authorization, proportionality, necessity — were not designed with the multi-decade time horizons that covert action actually operates on. Is there a defensible ethical framework for this kind of decision-making, or does the logic of covert action inherently escape moral accounting?

As artificial intelligence enables influence operations of unprecedented scale and personalization, at costs approaching zero, what happens to the concept of political sovereignty — the idea that a population's political choices reflect its actual preferences? If the preferences themselves can be manufactured covertly, at scale, by foreign or domestic actors, is the classical model of democratic legitimacy still coherent?

Finally: what would genuine historical reckoning with the consequences of covert operations require? The United States has declassified some materials and offered partial acknowledgments. But the gap between what is acknowledged and what the historical evidence suggests is substantial. For the societies that experienced these interventions — Iran, Guatemala, Chile, Indonesia, and many others — the question of historical acknowledgment is not academic. It concerns the possibility of the kind of honest reckoning that might, eventually, allow for something resembling repair. Whether any government has the institutional capacity or political will to undertake that reckoning is, as of this writing, very much an open question.


The history of covert operations is ultimately a history of the distance between what power says and what power does. Closing that distance — even partially, even slowly — requires exactly the kind of uncomfortable, evidence-based examination that secrecy is designed to prevent. The fact that we know as much as we do is a testament to journalists, historians, whistleblowers, and oversight investigators who have worked, often at significant personal cost, to make the invisible hand visible. The fact that we still know so little is a reminder of how much work remains.

The Web

·

Your map to navigate the rabbit hole — click or drag any node to explore its connections.

·

Loading…