TJKMO wrote:
Trump then confused the former South Carolina governor with Rep. Nancy Pelosi (D-Calif.), who he has previously used as a scapegoat for the Capitol attack. “By the way, they never report the crowd on Jan. 6. You know Nikki Haley, Nikki Haley, Nikki Haley… You know, they — do you know they destroyed all of the information, all of the evidence, everything? Deleted and destroyed all of it. All of it,” Trump falsely claimed. “Because of lots of things… like Nikki Haley is in charge of security — we offered her 10,000 people, soldiers, National Guards, whatever they want. They turned it down. They don’t want to talk about that. These are very dishonest people.”
Trump then confused the former South Carolina gove... (
show quote)
Forwarded this email? Subscribe here for more
Orientation for new readers - summary of most pertinent information from this Substack.
All new posts are free. Archive is available to paid subscribers. I am grateful to paid subscribes supporting countless hours of research, writing and advocacy.
All artworks featured are mine, you can visit my art website for further information.
New: art-only Substack Art Without Due Diligence is live now, subscribe separately if interested.
The Largest Intelligence Agency That Goes Largely Unnoticed
Guest post by a secret agent
SASHA LATYPOVA
JAN 29
First There Was OSS
The history of intelligence agencies in the United States, when examined critically, reveals a complex network of organizations operating within the shadows of the government power. The genesis of modern U.S. intelligence can be traced back to World War II, with the establishment of the Office of Strategic Services (OSS), the precursor to the Central Intelligence Agency (CIA). A spade, huh?
Due Diligence and Art is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.
Upgrade to paid
The OSS was instrumental in covert operations, intelligence gathering, and espionage during the war. One of the most controversial programs run by the OSS was ‘Operation Paperclip,’ which played a role in recruiting and extracting German scientists, engineers, and technicians, including former Nazis and SS members, to work for the United States. This operation provided immunity and new identities to individuals who had been part of the Nazi regime in return for their assistance in developing the US military-industrial complex.
Kurt H. Debus, a former member of the SS, sitting between President John F. Kennedy and Vice President Lyndon Johnson. Debus served as the first director of NASA’s Launch Operations Center.
The CIA is Born
Post World War II, the National Security Act of 1947 marked a pivotal moment, birthing the CIA and reshaping the intelligence landscape. This Act was a response to the perceived need for a centralized, coordinated approach to intelligence that would transcend the limitations of wartime agencies. The CIA was vested with broad powers, functioning under minimal public scrutiny, often operating in international territories to counter perceived threats to U.S. interests. Their actions during the Cold War, including covert operations to influence foreign governments and gather intelligence on the Soviet Union, were indicative of their expanding role in global affairs. The CIA has likely run more shady programs than any intelligence agency in the world. They include everything from MKUltra, which involved abusing children, to the CIA's involvement in the killing of JFK.
Declassified Project MKUltra: Subproject 8 documents detailing illegal experimentation with LSD on non-consenting subjects (mental patients, prisoners, drug addicts, etc.)
Additionally, the CIA ran an active interventionist campaign to achieve regime change to undermine democratically elected governments that did not share the CIA's or US’s political views. Generally, these programs caused significant long-term harm to the countries involved as well as, ultimately, to US foreign policy.
Iran (1953): The CIA orchestrated Operation Ajax to overthrow Prime Minister Mohammad Mossadegh and reinstated the Shah of Iran, largely due to concerns over Mossadegh's nationalization of the oil industry. This resulted in the subsequent Iranian revolution and took the country on a path to a terrorist-backing theocracy.
Guatemala (1954): The CIA-backed coup ousted President Jacobo Árbenz, who had enacted land reforms and other policies perceived as socialist.
Cuba (1961): The Bay of Pigs Invasion, an unsuccessful CIA-backed attempt to overthrow Fidel Castro.
Chile (1973): The CIA supported the coup led by General Augusto Pinochet against President Salvador Allende, the first democratically elected Marxist leader in Latin America. Pinochet subsequently ruled Chile with an iron fist.
Afghanistan (1980s): The CIA provided support to Afghan mujahideen fighters against the Soviet invasion. This led to the rise of Islamist terrorists from Afghanistan.
Nicaragua (1980s): The CIA was involved in the Iran-Contra affair, where they secretly financed the Contras against the Sandinista government.
The NSA Gets into the Game
The formation of the National Security Agency (NSA) in 1952 added another layer to the intelligence network, focusing primarily on signal intelligence (SIGINT) and codebreaking. This era also saw the rise of the Defense Intelligence Agency (DIA) and the expansion of the FBI’s counterintelligence capabilities.
NSA's greatest claim to fame is their ongoing operation to spy on all Americans all the time. Specifically, the organization was involved in the following operations (as revealed by Edward Snowden).
PRISM Program: This program involved the NSA collecting internet communications from various U.S. internet companies, including email, chat services, videos, photos, stored data, file transfers, video conferencing, and logins.
Metadata Collection: The NSA collected call records, known as metadata, from millions of Americans. This data included phone numbers, call durations, and other details, but not the content of the conversations.
Bulk Data Collection: The NSA had been collecting vast amounts of digital communications globally, including from U.S. citizens, under a program called "Upstream." This included data passing through internet backbone facilities.
Global Surveillance: The NSA's surveillance extended beyond the U.S., targeting foreign leaders, global organizations, and the general population of various countries.
Collaboration with Foreign Intelligence: The NSA worked closely with intelligence agencies in other countries, particularly the "Five Eyes" alliance (comprising Australia, Canada, New Zealand, the United Kingdom, and the United States). In this fashion, if US law prevented surveillance, they would outsource it to one of the other ‘Five Eyes’.
Court Orders and Legal Justifications: The Foreign Intelligence Surveillance Court (FISC) authorized many of the NSA's activities. However, there were concerns about the lack of transparency and the broad interpretations of laws like the Patriot Act and the Foreign Intelligence Surveillance Act (FISA).
Hacking and Encryption Bypassing: The NSA reportedly used various methods to bypass encryption and conduct hacking operations to access data and communications.