Who is the CIA agent? US Central Intelligence Administration CIA Agents.

Secret instructions of the CIA and KGB to collect facts, conspiracy and disinformation Popenko Viktor Nikolaevich

Who is the CIA agent?

Who is the CIA agent?

Most of the usual people in the phrases "CIA employee" and "Agent CIA" do not see a special difference. But in the very CIA, under the word "Agent" means not any employee of the Office (which is usually called the employee), and the one who secretly (on the "legend" works in another country, i.e., the intelligence officer illegal. However, some of the intelligence officers themselves, the term "agent" do not quite like, therefore the staff of the CIA, working in foreign residency, prefer to call themselves "operational staff." And the Agents themselves are commonly called the local contingent recruited in the country, which is subordinate, that is, foreigners who are performers of the CIA operations and operating at the end of the long chain. This book presents the preparation of the CIA agent precisely as an operational employee, and the term "agent" will be further applied to personnel CIA staff, and to all recruited persons, that is, to those who deliberately cooperate with the CIA. By the way, the CIA staff themselves usually do not call their organization "CIA", or "Management", among themselves they say "Company".

This text is a familiarization fragment. From the book "Black Death" [True and myths about the combat use of the IL-2 attack aircraft, 1941-1945] Author Degtev Dmitry Mikhailovich

"Such Armada has not yet been walking" at 9.00 on the Berlinsky time on July 5, 1943 of the Wehrmacht Division after the point art preparation, accompanied by the Jet Mortaceans "Nebelverfer", transferred to the offensive. Luftwaffe again dominated the air, but the command of the Soviet Air Force

From the book. Defense elements: Notes on Russian weapons Author Konovalov Ivan Pavlovich

IL-78: In Russia, he is such a single photo: IL-78M (IL-78M) to the most significant military contract of 2012 on 39 military transport aircraft (VTS) IL-76MD-90A (IL-476) Ministry of Defense of Russia intends to add Another one and no less significant - for 31 aircraft-refill IL-78. Negotiations already

From the book of the CIA. True story author Weiner Tim

"We did not understand who is such a komieny" a few days later, on February 1, 1979, the People's Revolution, as a result of which the Iranian Shah was overthrown, opened the way to return Khomeini to Tehran. Thousands of Americans, including most of the staff of the embassy, \u200b\u200bwere evacuated

From the book, defense elements Author Konovalov Ivan Pavlovich

IL-78: In Russia, he is so alone to the most significant internal military contract of 2012 for 39 military transport aircraft (VTS) IL-76MD-90A (IL-476) The Ministry of Defense of Russia decided to add another one and no less significant - by 31 Airplane-refinement IL-78. Sales

From the book Afghan trap by Brylev Oleg.

"Who are you?!" In one of the rainy November days, on Sunday, barely returned from the service, I urgently summoned to the head of the USSR Operational Group MO, General Army Varennikov V.I. On the way jumped into management, where at all in case some cards grabbed, schemes.

From the book FBI. True story author Weiner Tim

Chapter 5. "Who is Mr. Goover?" On December 30, 1919, the Secretary General of the Communist Party of America Charles E. Rutenberg went to dine in New York with his closest comrades. One of them was a secret spy, whose reports went to the ministry

From the book German military thought Author Zalessky Konstantin Aleksandrovich

From the book american sniper by Defelice Jim.

From the book Sniper Survival Textbook ["Shoot rarely, but aptive!"] Author Fedoseev Semen Leonidovich

From the book Sniper War Author Ardashev Aleksey Nikolaevich

Who such a sniper word "sniper" first appeared in the British army during the First World War and translated from English means "Tagged shooter for flying ducks." Once in England, so-called lucky hunters. The name comes from the English name

From the book, the Queen Advisor - Superagent of the Kremlin Author Popov Viktor Ivanovich

Who is "Homer" now he has already been aware of the policies of three countries, including in the area, which, perhaps, more than any other, was interested in the Soviet Union at that time. Maclin turned into the owner of such secrets, which Soviet intelligence could only

From the book about the war. Parts 1-4 Author Clausevitz Karl background

28. With such a point of view, the theory is feasible, and it disappears its contradiction with the practice of this point of view the possibility of satisfactory, i.e., useful and never conflict with the reality, theory of warfare; Only OT

From the book of the CIA against the KGB. The art of espionage [lane. V. Chernyavsky, Yu. Chuprov] by the author Dulles Allen.

The agent engaged in collecting secret information officer is a personnel employee of the intelligence service, an American citizen who performs his official duties in the relevant position in the country or abroad and acting on the instructions of its leadership. It

From the book West Front RSFSR 1918-1920. Fight between Russia and Poland for Belarus Author Gritskevich Anatoly Petrovich

Who is Bulak-Balakhovich attitude to Bulak Balakhovich from the Bolshevik leaders has always been extremely negative. Soviet historians also mentally wrote about him. Even the Belarusian national figures of the 1920s treated him negatively, since he

From the book of Canary and bullfinch. From the history of the Russian army Author Kiselev Alexander

There is no such profession - to defend their homeland since the time of Peter the first in Russia there was a recruit system of recruitment in the army. One recruit (recruit) was exhibited from a certain number of peasant yards. Who exactly will serve serve, solved the "world", that is, the rural gathering, or

From the book, the case of Zhivago. Kremlin, CIA and Battle for the Forbidden Book author Kuva Petra

Want to be a spy? TSC! Do not respond to it. The agency, as a rule, was considered to be synonymous with espionage on behalf of the government of the United States, the central intelligence department (CIA), has two very specific rules for the applicants. Rule number 1: Do not tell anyone who you are applying for work. Rule number 2: Do not tell anyone about whom you even think to apply!

In other words, if you want to know how to work in the CIA, do not ask anyone.

The execution of this will discard your aspirations and, therefore, breaks both of these rules. Nevertheless, you can read this article in which everything is said to you.

Cia Careers.

If you think that you want to draw the attention of the spy, you want to work in a specific division of the CIA - Directorate of Operations (DO), which was previously called the National Secretary Service (NCS). Doo is an integral part of the CIA, which is responsible for the secret collection of human intelligence (he is a spy). These are entry-level positions that are available to work candidates after they completed an extensive learning program.

  • Main collectors and operating staff Usually work abroad, engaged in recruitment and processing of foreign sources of human intelligence.
  • Basic Collectors and Collection Management Managers Also spend most of their career working abroad. They control the collection of human intelligence, evaluate and distribute it among representatives of US foreign policy and analysts of intelligence communities.
  • Employees for staff operations They are linking links between the states of DO and external field officers. They spend most of their time in Washington, but may have temporary overseas tasks. They are experts both in a specific region and in a transnational plan, such as terrorism or crime.
  • Special skills specialists Work either at Washington headquarters or abroad. They use their work experience in the armed forces or their language, technical or media for conducting or supporting the CIA operations. The names of professions falling under this category include a Targeting officer, a language officer, a half-Russian officer, an employee for programs and plans and an employee for information resources.

Career and CIA qualifications at the initial level

Candidates for the post of entry level can join the operations on operations as interns in the professional trainee program, an internship program or interns program on the basis of interns. The program in which they participate is determined by the work to which they apply, and their level of experience.

Those who want to become the main collectors enter either through a professional trainee program, or in the underground service program, depending on their previous experience. The leaders who have several years of work or military experience will directly participate in the program of the underground service. Those who have only higher education should be included in the professional trainee program, before ultimately go to the underground service program. Applicants who want to become employees of headquarters, such as employees for staff operations and special skills specialists, take part in the headquarters internship program.

At the end of the training period, the candidate did it places him or her for a career track that the agency officials consider it appropriate for his or its demonstrated skills and the needs of the agency.

All candidates for work should have a bachelor's degree with an average of at least 3. 0. For those who train to become the main collectors, knowledge of a foreign language is required. Candidates for work at headquarters should show interest in international affairs. Although candidates from different disciplines, those who have experience in international business, finance, international relations, economics, physical science or nuclear, biological or chemical engineering, are considered the most desirable. US citizenship is a prerequisite for all posts, and all candidates must be eligible for security.

Spying is a career abundant with stress. If you want to work in the CIA, you should be able to cope with it. Other necessary qualities include good judgment, the ability of multitasking and to manage time, as well as excellent letters, listening and verbal communication. Strong solutions to the problems and abilities of critical thinking are also necessary. The readiness for continuous learning is also important. Since tasks often require that one of them be part of the team, the ability to work with other people is mandatory.

Application process

If you are interested in working in operations on operations, you can apply for work on the Internet on the website of the CIA. There you will also find detailed information about the application process. Before applying, you must create an account. Do not do this if you are not sure that you have enough time to complete the application. You will need to do it within three days after creating your account. When this time is over, your account will be disabled. It will also be disabled after completing your application. When you finish the application, you will receive confirmation on the screen. The CIA will not send an email. You can apply for four positions in one application, but the agency requests the applicants to submit several applications.

If your application is adopted, preliminary employment can take up to one year. During this time you will have personal interviews and be subjected to medical and psychological testing, testing for drugs, polygraph and extensive background check. Thanks to this check, Do it guarantees that you have no attachments to other countries, deserve trust, cannot be forced and ready to protect confidential information.

Pros and cons of work for the Directorate of the CIA for operations

If you want intrigue, Does it has it. Even pages containing information about career opportunities are read as a spyware. The word "spy" is never used, and the applicants warn them to never reveal their intentions. Nevertheless, life under cover is not for everyone. A person must hide his identity from others. And since the work is hidden, little is known for well done. However, the Agency rewards and recognizes its employees within the country.

Oo employees who serve abroad receive competitive payment. Their benefits include housing for themselves and their family members. Their children receive educational benefits. They also have the opportunity to travel around the world.

March 29, 1988. Moscow. The official visit of the President of the United States Ronald Reagan to the country, which he himself told the "Evil Empire", walked as it is impossible. Russians, with a scope, demonstrated their fabulous hospitality, and at the negotiations were pier, as if plasticine. Only one moment overshadowed the mood of Reagan, when, after the next round of negotiations at the highest level, Gorbachev asked them to leave them with the American president alone - for the conversation "without protocol".

Collage © L! Fe photo: © RIA Novosti / Yuri Abramochkin

Mr. President, I will have to upset you, "Gorbachev sighed, when they remained alone, if not counting, of course, the translator. "I had a certificate about the man about whom you asked me ... I am very sorry, but I can't do anything - this man is already dead, the sentence is carried out.

Sorry, - echo rejigated Reagan. - My guys asked for him very much. In a sense, he is also your Russian hero.

Perhaps, Gorbachev spread his hands, "but he was convicted in full compliance with the law.

And Gorbachev got up, giving it to understand that the conversation was finished.

Who was this man who was the fate of which were the leaders of the two world superpowers?

Director of the CIA James Vulssi called this man "precious stone in the crown" and the most useful agent of all who was recruited during the Cold War. We are talking about General Groj Dmitry Polyakov, who worked for more than 25 years to the CIA of the United States, providing Washington with most valuable information on the political, economic and military planes of the Kremlin. He was thereby a "sleeping agent", which in his time defended from the counterintelligence himself chief KGB Yury Andropov.

Career "Services"

Dmitry Fedorovich Polyakov was born on July 6, 1921 in the town of Starobelsk, which is in the very center of the Luhansk region. His father worked as an accountant at the local enterprise, the mother was employees.

In 1939, Polyakov, graduating from high school, went to study in the Kiev Command Artillery School. The Great Patriotic War met already in the post of commander of the artillery platoon. In the hardest battles, Salney was injured. For fighting feats awarded two combat orders - the Patriotic War and the Red Star, many medals. The archives have preserved award-known sheet of Captain Polyakova, the battery commander from the 76th separate artillery division, who fought in Karelia: "Being at the turn of Keszengsky, he destroyed one battery with one anti-tank gun with a calculation of 4 people, suppressed three artillery batteries, scattered and Partially destroyed a group of soldiers and officers of the enemy with a total number of 60 people, thereby ensuring the exit of the interpretation of 3-grades without loss ... "

In 1943, and the Captain Poles himself moved to artillery intelligence, then to the military. After the war, he was sent to study at the Prochetic Faculty of the Frunze Military Academy, then he was transferred to work at the General Intelligence Department (GRU) of the General Staff.

Immediately, Polyakova took seriously and began to train the skills of the raincoat and dagger without a rush to teach and dagger - how to recruit the right person, how to lay a cache and get rid of surveillance, how to make the coded messages from the center and prepare the path of waste.

The Polyakov served himself with a real "ministry" - he studied and worked from morning to night, even spent the night in the office offices. The authorities only diluted from surprise: as with such a tight schedule of the life of Polyakov, he was able to marry the beauty of Nina and acquire two sons - Igor and Pavlik.

In 1951, the leaders of the GRU decided to send Polyakova - as the best of the best - to the first business trip to the United States. He drove under the cover of the post of an employee of the Soviet Mission at the UN Military Staff Committee.

He served in the position of "Kleisovika" - so on the operational slang called simple agents who provided the activities of the Soviet illegal agent.

It was a kind of workers of intelligence, blindly fulfilled the orders of the resident of the GRU: In one place, one container was caught in one place, disguised as a regular cobblestone, and put another "stone" in its place, in another place to lock the conditional signal, in the third - to leave Machine and imperceptibly leave for half a day. Though at least a simple, but dangerous: at that time, the era of McCarthyism has already begun in the USA and each Soviet diplomat was literally under the FBI cap. Sometimes Polekova accounted for days for days to circle around the cache left by an unknown agent to bring down the surveillance. And again he has established himself as the best agent - in five years "Watch" in New York not a single failure!

Resident error

Having spent the five-year-old "watch" in New York, Polyakov returned to Moscow - for retraining and promotion. In the US, he returned in 1959 - already in the rank of colonel and as deputy resident of the GRU for illegal work in the United States.

And in the same year, a tragedy occurred in the family of Polesov, who crossed his life. The eldest son Igor in the United States fell ill with the flu, which gave a complication - the brain edema.

The boy could be saved, but for this it was necessary to put it in the American clinic. And pay for treatment - the Soviet intelligence and diplomats did not have American medical insurance.

Poles rushed to Resident Lieutenant General Boris Ivanov:

Boris Semenovich, help! Allow yourself to use the means of specialfond to promote agents. I'll give it all then, you know me, - asked Polyakov.

I can not! - cut off Ivanov, who served in the NKVD since the time of the "Big Terror". - You know, I can allocate this money only by order from the center!

So answer the center! Please!, - Polyel Poles.

Boris Semenovich Ivanov and Ivan Aleksandrovich Serov. Sollar © L! Fe photo: © Wikipedia.org Creative Commons

General Ivanov made a request to the center, but the head of the GRU General Army General Ivan Serov imposed a resolution: "In the most unexpected expenditure of specialfound funds to refuse. If an operation is needed, let them drive into Moscow!"

While the boy was preparing for the flight, irreparable happened: Igor died.

The death of the Son left a black burn in the soul of Colonel Polyakova. Especially since the resident of Ivanov soon went to Moscow - to increase. The bosses loves traded performers.

And then Colonel Polyakov decided to take revenge. And to their chiefs, and the whole of the soulless system, who erected his child to death due to the rules of reporting.

Recruitment

On November 16, 1961, during a secular reception organized in the house of the head of the American Military Mission at the UN Military Staff Committee, General O "Neili, Colonel Polyakov himself turned to the owner of the house asking:

Could you organize me a secret meeting - one on one - with some of the representatives of American intelligence?

What for? "General about" Neil looked into the eyes of the Soviet intelligence officer, about which rumors were in the American mission, that this is the most prominent Stalinist.

For the transfer of important military political information, he cut off.

An hour later, you will come to you, "Admiral replied. - Drink until champagne.

The CIA Agent Sandy Grimz, who worked with Polyakov, recalls that he always emphasized that he had volunteered to work on Americans, and not for the sake of money, but a purely ideological reasons.

Of course, he received fees from us, but these were completely meager sums - about a tenth of the money that we usually paid the agents a much lower level. But the Poles emphasized that he does not need money. I think that he believed that the United States was not strong enough to combat the Soviet system that we would not have a chance if he would not participate on our side, - remembered Grims.

Collage © L! Fe photo: © Wikipedia.org Creative Commons, Flickr Creative Commons

According to the calculations of Americans, for 25 years of work on American special services Polesov received only 94 thousand dollars - the truth, not counting expensive gifts and souvenirs. Being a passionate hunter, he adored expensive rifles who managed to export in Moscow diplomatic mail, not paying any attention to the oblique views of colleagues. Also Polyakov loved to make the furniture with her own hands, he often ordered American reconnaissance to bring for him or expensive American tools, or bronze nails for the upholstery of sofas. For his wife, he ordered jewelry, but not too expensive.

In the service of the FBI

But the Motifs of Polyakova were likely to understand, nevertheless the betrayal remains betrayal, because the decision to move to the service of the enemy affected not only Polyakov himself and his family, but also colleagues, comrades and subordinate deputy residents who risen their lives for their country.

It is the life of colleagues and brought a sacrifice to the sacrifice. Of course, high political motives are good, they reasoned his new owners, but it is best to immediately tie a traitor to the bold of his colleagues.

And in the first meeting, representatives of the FBI demanded from Polyakov to name six names of the embassy cipherrs - this is the most important secret of any residency, which is constantly hunting counterintelligence.

Poles called. Then the Americans appointed the date of the second meeting - at the hotel with the intriguing name The Trotsky.

At this meeting, at the request of the Chief of the Soviet Department of the FBI, Bill Banigan Polyakov dictated to the tape recorder the text with the staff of Soviet military intelligence officers working in New York. Then gave a subscription of consent to cooperation with the FBI.

Later, Bill Brahnigan recalled that first in the FBI, where Polyakov was given to the nickname Tophat, that is, the "hat-cylinder", did not really trust the Soviet "Defense". The Americans believed that Poles intentionally portrayed a traitor to identify the existing scheme of the work of counterintelligent divisions in the US intelligence services.

Therefore, the FBI agents who were talking to Polyakov demanded more and more secret information about American agents recruited by Soviet intelligence, expecting that sooner or later he would give himself.

The first victim of Polyakova was a particularly valuable agent Gru David Dunlap, headquarters of the National Security Agency (ANB). Feeling a surveillance, Dallap realized that he was betrayed. And at the moment when the capture group fell into his apartment, the sergeant committed suicide.

Furniture Polyakov passed Frank Bossard - a high-ranking officer of the UK Ministry of Aviation, information from which was to the very top. Bosseard was recruited in 1951, when he served in the Department of Scientific and Technical Intelligence of British Intelligence MI6. He worked in Bonn, where he conducted interviews from scientists who fled from the GDR and the USSR. For a long time, Frank supplied Soviet intelligence officers with important information on the state of the UK Air Force, transferred the drawings of the newest aircraft and plans for individual combat operations. As a result, Bosseard was captured with political - when photographing secret documents. He was sentenced to 21 in prison.

The third victim of the traitor - Headquarters Sergeant Corneulius Drammond, the first black soldiers, who served before the position of the referent of the secretary of the secret part of the US Navy. He himself went to Soviet intelligence and in five years actually passed free of charge in the GRU, all little significant documents from the head of the chief. According to American specialists, Headquarters Sergeant Drammond has an emerge such material damage that the United States had to spend several hundred million dollars to restore the necessary state of secrecy.

Interestingly, the heads of the FBI specifically made the arrest of Drammond for the arrival of the then Minister of Foreign Affairs Andrei Gromyko. One can only imagine that he felt gromoy when, after speaking at the UN General Assembly, he was covered with questions about the arrests of Soviet spies. As a result, Drummond was sentenced to life imprisonment without the right to appeal.

Also, Polyakov issued a sergeant of the Herbert Banekhaupt Air Force, who worked in the secret part of the US strategic air team headquarters and transferred all information about ciphers, codes, cryptographic systems of the United States Air Force. As a result, the Boxhaupt was convicted for 30 years in prison.

The price of betrayal

Following the Polyakov began to pass and Soviet intelligence officers. The first FBIs were arrested by the connected agent of Cornelius Dramont - the officers of the Gru Evgenia Prokhorov and Ivan Iodov. Despite the status of diplomats, Fabeerets beat the Soviet agents until hedery and brought to a secret prison. When the Americans saw that it was impossible to torture and intimidating anything from the GRU officers, they were thrown by their semi-in-law near the Soviet embassy. On the same day, they were announced by the "people of non-grants" and gave 48 hours for fees.

Poles also betrayed a married couple of illegal scouts, known for the surname of Sokolov, who were just a difficult legalization process. After that, the FBI even imbued with confidence in the traitor and made it possible to take the possible suspicion of Polyakov, and literally on the arrest of illegal immigrants, the FBI agents were arrested by a married couple - Ivan and Alexander Egorov, the Soviet employees of the UN Secretariat, who did not have diplomatic immunity. Egorov passed through the conveyor of interrogations, but did not break. Nevertheless, everything was presented in the press as if they would give out illegal immigrants. As a result, Egorov served several years in prison, their career was broken.

Otherwise, the fate of Karl Tuomo, who also issued Poles. Tomomoy was the son of the American Communists who came to the Soviet Union of American Communists in 1933, who became employees of the foreign department of the NKVD. Karl also became an employee of the USSR Ministry of State Security, and in 1957 he was transferred to help GRU to fulfill the responsible task in the United States. He legalized in 1958 as Robert White, a fortunate businessman from Chicago, who was interested in the latest developments in the field of aviation and electronics. In 1963, he was arrested by Polyakov's filter and under the threat of an electric chair agreed to become a "double agent". However, something in the GRU was suspected and called Tomo to Moscow. But he categorically refused to return, leaving his wife and children in the Soviet Union.

Especially important Miss Misi

But the biggest blow to GRA was the betrayal of the legendary Soviet intelligence officers of Maisi - Mary's kind. She was born in 1907 in a working family in Petrograd, received a good education - in 1927 she graduated from the music technique in the class of vocals and piano, as well as higher courses of foreign languages \u200b\u200bat the Academy of Sciences. Soon she married the border guard officer Boris Dobrov, the son of Dmitry gave birth. But in 1937, the established life as if failed to Tartarara. At first, her husband died - in battles with the Japanese in the Far East, where he was sent on a business trip. In the same year, the son of Dmitry died from diphtheria.

In order to somehow leave grief, she went to the military registration and enlistment office and asked for a volunteer for a civil war in Spain.

In battles with fascists, Franco Maria Dobrov spent more than a year, deserve the Order of the Red Star. Returning, she entered the University of Leningrad, where the Great Patriotic War and Blockada found it. And Maria settled in a nurse in the hospital, where he worked until the victory. Then in her fate there is a steep turn: she comes to work in the USSR Foreign Ministry and is leaving for a translator to work in the Soviet embassy in Colombia. Returning after 4 years home, it becomes a staff member of the GRU, or rather illegal military intelligence.

In the US, she legalized like Miss Misi - or rather as Glen Marrero Mareh, the owner of his own beauty salon in New York.

Soon her salon became a real "women's club" for ladies from New York establishment and artistic bohemian. It was shared by the secrets of wives of congressmen, generals, well-known journalists and businessmen. More often than the information received by Miss Macy in female conversations, was fuller than all other data mined on other channels. For example, Miessia Mesi's girlfriend was Merilin Monroe, who, as if by chance, talked to Kennedy's president about the borders of those concessions to which the White House could go during the negotiations with Moscow. The next day the printout of this conversation was on the table Nikita Khrushchev.

Having received a tip from Polyakov, American counterintelligence set a surplus behind the beauty salon, but Maria Dobrov somehow felt danger. After warning the residency, she decided to hide from the country. And that would have succeeded, but the route of her evacuation was the colonel of Poles himself.

In Chicago, where she stopped in one of the respectable hotels, it was tried to detain the FBI agents.

When the unwanted "maid" knocked into her number, she understood everything.

Wait, I'm not ready yet, "Maria answered calmly, retreating to the window. At the bottom there were cars with flashers and armed agents, all exits from the hotel were blocked.

Open immediately, this is the FBI, - the door shrink from powerful shots of Taran. - Quickly open!

But did not have time to collapse, as Maria rushed down from the window.

Many years later, the KGB officers who questioned General Polyakov asked if he was sorry for Maria Dobrov and other illegal immigrants, which he broke his life. Poles pulled his head as from strike, and then quietly pronounced:

This was our work. Can still be a cup of coffee?

With a stone for the sinus

In 1962, Colonel Polyakov was withdrawn to Moscow and appointed to a new position in the central apparatus of the Human Staff. And the FBI agents handed it to the connection between American reconnaissance from the CIA, which were assigned to the Colonel a new operational pseudonym - Bourbon.

CIA agents also handed him a special spy microcamera and taught to use it with special containers for transmitting microfilms.

The first bookmark of the cache was held in October 1962 - on the task of Americans Poles, the secret telephone directory of the General Staff was repaid directly in their office. He put the film in the Iron container, which from all sides she was sewn with orange plasticine, and then dodged in a brick crumb, - as a result, it turned out the ordinary brick fragment, completely indistinguishable from thousands of others. The container he laid under the bench in the conditional location of the Central Park of Culture and Rest named after Gorky - as it turned out, in a very crowded place, but, apparently, the Americans simply did not know about the existence of other parks in Moscow.

Having laid a cache, he - literally in front of the police, left the conditional sign on the post - the ink stain, as if she accidentally splash out of a broken feather pen.

Central Park of Culture and Rest named after M. Gorky. Photo: © RIA Novosti / L. Bergoltsev

The next cache Americans asked to leave him in the old phone booth at the house on the street of Lesta - directly opposite the hostel cadets of the Higher School of the KGB. F. E. Dzerzhinsky. It was here that the cadets ran to call home, but the American agent did not know this - there was no sign on the building.

Calling the agents to the meeting, he announced that henceforth he would develop the bookmarks of the caches and conventional signals for the CIA. Moreover, he himself will lead his spyware, identifying a schedule of its activity. And most importantly - there are no more personal meetings! Communication only through the caches and New York Times newspaper, which Poles read on their official duties. If Polyakov himself wanted to send a message to the Americans, he wrote an article in the magazine "Hunting and Hunting Economy", which was the permanent author of which was.

The Americans agreed to new rules of the game - literally on the eve of the Moscow Colonel Oleg Penkovsky, who also worked on the CIA was arrested. As later it turned out, Penkovsky accidentally handed over the Americans themselves who spent conspiractive meetings with him once a week in the most crowded places.

Polyakov considered all the mistakes of Penkovsky, and this allowed him to stay out of suspicion for a long time - especially when the governments began cleaning and searching for the accomplices of Penkovsky. Counterintelligence then literally under the microscope filtered hundreds of personal care of officers, but they could not imagine that the traitor will be coordinated to coordinate the search for "Crow".

Personal agent Nixon

But even the most thorough instructions of Polyakov could not protect him from the amateurness of the Americans. Wanting to help Bourbon, they published in American newspapers an article about the beginning of the lawsuit over the spouses Egorov, in which the surname Polyakova was mentioned, they say, and some traitor was given it. After this article, the Poles was removed from the American line and translated into the management of GRU, which was engaged in intelligence in Asia, Africa and the Middle East. Not wanting to attract more of big suspicions, he announced curators from the CIA, which goes into the "sleep" mode.

Soon the Poles passed all the inspections and even went to the increase - he was sent to the USSR resident to the Embassy in Burma. Having worked in this country for 4 years, he goes into a department associated with illegal intelligence in China. During all this time, he only once violated the "sleeping" mode when he handed over to the CIA a report on contradictions in the relations of the USSR and the PRC, - just on the eve of the visit of Nixon's President to Beijing, who became the brilliant diplomatic success of Americans and a turning point in the Cold War.

After that, the CIA attitude to Bourbon changed the most fundamentally: from the source of secret information of the Poles turned into a figure of influence and a particularly valuable agent. And the Americans began to help him make a career. So, when Poles served as a resident of the GRU in India, the American curators began to bring him to recruit Americans. For example, Sergeant Robert Martzinovsky from the American Attache apparatus was one of the first so. Following the interests of the CIA "donated" several more military - later they were all convicted of the death penalty for espionage in favor of the USSR.

Thanks to the help of Americans, Poles soon acquired glory almost the most successful scout in the entire GRU. His career grew like on yeast - he soon received the title of Major General, a new position - in the Military Diplomatic Academy, while remaining in the elite personnel reserve of GRU.

Appreciated it and Americans. For example, Bourbon was transferred to an experimental model of a pulsed radio transmitter - this device is a size of a slightly more matchbox allowed a second to transfer the package of encrypted information to a special receiver. Having received this apparatus, Poles began to just ride on trolleybus past the American embassy, \u200b\u200b"shooting" at the right time with information. Heading the radiotechnical service of the KGB was not afraid - how to guess, from where it was "shot" agent?

Camera "MINOX". Wikipedia.org Creative Commons

Polyakov urgently believed in their safety, which even began to use confiscated spyware from GRU warehouses. For example, when the camera "Minlox" was sent from the US, it was unexpectedly broken, the Poles simply took exactly the same camera from the archive and calmly read the documents. But soon the American hosts showed that this work is not enough.

Under the hood

In 1979, he began with the Islamic revolution in Iran, when power in the country moved to Islamic fanatics - the revolutionary council led by Ayatollah Homney. Diplomatic relations between the United States and Iran were terminated, the countries were actively preparing for war. And US President Jimmy Carter ordered the CIA to use all Soviet agents to find out the details about the relationship between Moscow and Tehran.

Demonstration in Iran during the Islamic revolution of 1979. Wikipedia.org Creative Commons

But just at that moment the Poles was prepared for a new foreign business trip to India. Urgent access to the connection with the CIA resident, he counted a suicidal risk. Therefore, the meeting signal ignored.

Then the Americans and let go of the whip, wanting to teach the lesson who here the owner is actually. In one of the American journals, a chapter was published from the book of John Barron "KGB", dedicated to Karl Tuomi. In all the text, the name of Polyakova was not mentioned, although everyone knew that the Poles was the immediate boss of Tomo. But the journal publication was illustrated by a photo, which could not be in the United States, - photography from the personal case of Tomo in military uniform. That is, the authors hinting that someone in Moscow stole this photo from a secret business and handed over to the Americans.

But the Americans stopped. The publication was noticed in Moscow. Soon, having gone through all the candidates, Chekists came to the conclusion that the only one who could inform Americans about Tomo agent was General Polyakov.

But Poles politely stopped her - apparently, he was not sure that the Americans actually betrayed him, really want to keep her life, and not organize a loud murder, in which, of course, accuse KGB.

Thank you, but I will never go to the United States, "Poles sighed. - I was born in Russia and I want to die in Russia, even if it is the nameless fraternal grave.

However, at that time, the Poles were separated only by light fright - Andropov banned him to touch without obvious evidence of guilt.

If you are now the generals without evidence to be planted, then who will work?! - he said.

In addition, Andropov was already preparing for the upcoming battle for the throne and ahead of time to quarrel with army clans did not want.

As a result, Polyakova just sent to resign, reading the order for dismissal from the service. Say, prepared a new, younger candidate for the resident.

Arrest and execution

The Iranian crisis ended in deplorable for Jimmy Carter, and soon the new US president Ronald Reagan ordered the scouts to forget about Iran and return to the fight against the "world communism" in the face of the USSR. And Polyakova again "woke up", although he, being a pensioner, could no longer transmit secret documents. But in the White House appreciated his political reviews.

It is difficult to say how many other Poles would work on Americans, but in the spring of 1985, one of the leaders of the Soviet Residency in Washington, Herldrich Hazen Ames himself was recruited - the former head of the Soviet Department of External Counterintelligence CIA. Aimsu, who issued huge amounts to encourage Soviet-reinforcement agents, also wanted to swim in money, have a luxurious home and sports car "Jaguar". And then he decided to receive money in Moscow, offering the KGB to buy a list of 25 the names of "Sleeping" agents in the leadership of the Soviet special services. And the first number in the list was General Poles.

Polyakova was arrested on July 7, 1986, the day after the celebration of the 65th anniversary. When the Poles celebrated the anniversary in the restaurant, his house was held at home - in the top ten attendants, operatives discovered American spyware, microfilms, service instructions of the CIA.

After the end of the banquet, it was tied up - and so carefully that Americans simply did not know what happened to him. The Agent Bourbon seemed to dissolve in the Moscow successor, having chopped all contacts.

Only after negotiations with Gorbachev, it became known that the USSR Supreme Court of the Supreme Court in February 1987 sentenced Polyakova to the death penalty through the execution. On March 15, 1987, the verdict was carried out.

The burial place of his body is unknown.

Central Intelligence Agency, CIA (eng. Central Intelligence Agency, Cia) - Agency of the Federal Government of the United States, the main function of which is to collect and analyze information on the activities of foreign organizations and citizens. The main body of foreign exploration and counterintelligence of the United States. The activities of the CIA can be conjugate with the possibility of its official non-recognition.

The headquarters of the CIA called Langley, is located near Washington of Macline, Farfax County, Virginia.

The CIA is part of the US intelligence community, which is headed by the Director of National Intelligence.

Functions

The duty director of the CIA includes:

  • Collection of reconnaissance information through the agent network and other relevant funds. At the same time, the director of the CIA does not have police officers, law enforcement authority and authority to call to court, and also does not fulfill the functions of ensuring internal security;
  • Comparison and evaluation of the developed intelligence associated with national security and the provision of intelligence information to the relevant instances;
  • General leadership and coordination of the collection of national intelligence outside the United States through agent sources of the intelligence community, authorized to collect information, coordination with other departments, departments and government bodies of the United States. It is necessary to ensure the most efficient use of resources, as well as the adoption of potential threats to all persons involved in collecting intelligence;
  • The fulfillment of other similar functions and responsibilities relating to intelligence activities that ensure national security, as directed by the President or Director of National Intelligence.

Unlike similar structures in many other countries, officially the CIA is a civilian organization. In this connection, the agents of this organization do not have military ranks, and the collection of intelligence is carried out by employees who have received tactical training.

Operationally tactically, the most prepared is the division - department of special events (Orig. - Special Activities Division). Mainly consisting of experienced veterans of such special forces of the US Armed Forces as Delta Force, Navy Seal, etc.

Structure

Management and Directors

The CIA structure for May 2009 looked like this:

  • The reconnaissance directorate is engaged in processing and analysis of the obtained sessions. Head - Director for Intelligence.
  • The National Secret Service (former Operational Directorate) solves the challenges associated with collecting information reconnaissance, organizes and conducts secret operations. Head - Director of the National Secret Service.
  • The Scientific and Technical Directorate conducts research and development of technical information collection tools.
  • Supply Directorate. Head - Property Director.
  • The exploration center is stored and the study of the historical materials of the CIA. Head - Director of the Center for Exploration.
  • The office of the main legal adviser. The head is the chief legal adviser. Employees of this department follow the compliance with the employees of the Office of the Constitution and the laws, existing rules and instructions.
  • Office of the General Inspector. The head is the general inspector. Appointed by the president when approving the Senate. Independent from other departments and offices, subordinate directly director of the CIA. Carries out inspections, investigations and audit at the headquarters of the CIA, in places, and in foreign departments of the Office. Every six months, the report is prepared for the CIA Director, which he provides the US Congress Committee.
  • Office of public relations. Head - Director of Public Relations.
  • The office of military affairs provides support in the field of intelligence in the US Armed Forces.

Structure of the center of cyber drive CIA

In March 2017, the Council on the Foreign and Defense Policy published a report prepared by the PI-Center Consultant Oleg Demidov and dedicated to the largest leakage of the CIA data. The IT expert studied an array of data published on the WikiLeaks website and found out how the cyberlike forces of the special service was arranged and what it does.

According to the data obtained by WikiLeaks, the work of the CIA for the development of its own cyberpotential is concentrated within one of the five managers - control of digital innovation (Directorate of Digital Innovation). Its key structure is the Cyber \u200b\u200bIntelligence Center (Center of Cyber \u200b\u200bIntelligence), whose competence included the development of the published "Knowledge Base" of the Cyber \u200b\u200bDevelopment Offices and the immediate development of the latter.

The activities of the Cyber \u200b\u200bDevelopment Center are divided into three main areas: Computer Operations Group (Computer Operations Group), Physical Access Group (Engineering Development Group) Group (Technical Engineering Development Group). It was the latter that was engaged in developing, testing and accompanied by software contained in leakage.

Specifications of software development were distributed between two subgroups and their nine departments as part of a group of engineering and technical developments. Among them - the Mobile Devices Branch (Mobile Devices Branch; used vulnerabilities for smartphones), automated software implant (Automated Implant Branch; Using PC Vulnerability), Network Devices Branch; answered the creation of network attacks on web servers) . The projects of the embedded systems (Embedded Devices Branch) included the development of means of exploitation of vulnerabilities in various "smart" devices, including televisions.

In 2013, the amount of financing of the Cyber \u200b\u200bDevelopment Center was $ 4.8 billion, and the number of its employees is 21 thousand people. Thus, the CIA can be considered the operator of the world's largest program to develop a state cybersenla, notes Demidov.

The Wikileaks report also notes that the US intelligence structure has a division engaged in the development of malicious software exclusively for Apple products. WikiLeaks explains that the share of IOS phones on the world market is not so large - only 14.5% against 85% of the colors on Android. However, iPhone devices are very popular among politicians, diplomats and business representatives.

Of the published documents, it also follows that the American consulate in Frankfurt am Main is the "hacker center" of the CIA, churring the regions of Europe, the Middle East and Africa.

History

2020: US and German special services 50 years have followed the corresponding 120 countries by controlling Crypto AG

On February 11, 2020, it became known that the Central Intelligence Office of the United States (CIA)] and the Federal Intelligence Service of Germany (BND) for more than 50 years read a secret correspondence in 120 countries. To do this, they used the equipment of the Swiss company Crypto AG. Read more.

2018

Mike Pompeo appointed Secretary of State, Gina Haspel at the head of the CIA

2017

Vault 8 leakage

Even if the owner of an outsider has found that the implant works on its device - malware, mining information - thanks to the Hive, the user could not connect his work with the CIA. When the owner of the computer checked on which server on the Internet the implant transfers information, Hive masked the connection with the servers of the department. In fact, the tool presents a hidden communication platform for malicious on the CIA through which it refers to the Office of the mined data and receives new instructions, Wikileaks writes.

At the same time, when malicious software passes authentication in the CIA server system, digital certificates are generated that imitate affiliation according to really existing manufacturers. Three samples present in the source code published by WikiLeaks are forged by Kaspersky Lab certificates from Moscow, allegedly signed by the trusted certificate of Thawte Premium Server in Cape Town. If the user who discovered the implant is trying to understand where traffic is coming from his network, he will think not on the CIA, but on the specified manufacturer by software.

The Lab responded to the publishing of Wikileaks the following comment: "We studied the statements that were published on November 9 in the Vault 8 report, and we can confirm that certificates imitating ours are unreal. Keys, services and customers of Kaspersky Labs are safe and have not been touched. "

Server system

Hive performs a number of operations with the help of implants operating on the computer, each operation is registered in the indifferent cover-minded domain. The server on which the domain is located is rented among the providers of commercial hosting on the rights of a virtual private server (VPS). Its software is customized under the specifications of the CIA. These servers are a public facade of the CIA server system, and then they transmit HTTP (s) -thefik through a virtual private network (VPN) to a hidden server called blot.

If someone enters the domain cover, it shows the visitor quite innocent information. The only distinguishing difference is infrequently used by the HTTPS-server option called Optional Client Authentication. Thanks to it from the user looking through domain, authentication is not required - it is not required. But the implant, by contacting the server, passes it. It is necessary that the blot server can be driving it.

The traffic from implants is sent to the implant operator management gateway called Honeycomb, and all other traffic goes to a cover server that delivers harmless content available to all users. In the process of implant authentication, a digital certificate is generated, which simulates belonging to actually existing manufacturers.

Development of 137 AI projects

The central intelligence management does not have time to process a large amount of data and is counting on artificial intelligence (AI). The US intelligence is actively working on 137 projects of AI, the Deputy Director of the CIA DON MEYERICS (Dawn Meyerriecks) was noted in September 2017.

AI offers intelligence services a wide range of opportunities - from weapons for battlefields until the opportunity to restore the computer system after cyberak. The most valuable for intelligence is the ability of AI to detect significant patterns in social networks.

Intelligence and previously collected data from social media, noted the head of the Central Bank of the CIA Joseph Gartin (Joseph Gartin). The innovation is in the volume of the processed data, as well as the speed of collecting information, Gartin stressed.

After 20 years in order to analyze images from commercial satellites manually, 8 million analysts will be required, director of the National Agency for Geospatial Intelligence Robert Cardillo (Robert Cardillo). According to him, the goal is to automate 75% of the tasks.

Tool for data output via SMS

In mid-July 2017, WikiLeaks website published information about the next tool for surveillance in cyberspace, developed and actively used by the CIA. This time we are talking about the Highrise program, which masked under the TideCheck application.

In the documentation that has fallen at the disposal of WikiLeaks, it is indicated that the tool must be downloaded, installed and activated manually; In other words, to implement a successful attack you need to either have physical access to the device, or in any way to achieve from potential victims of an independent installation of the application.

The second scenario is very unlikely: you need to open the TideCheck application, enter Inshallah password ("If you wish Allah") and select the Initialize option in the menu. After that, the program will automatically start and operate in the background.

By itself, this program does not cause any harm. Most likely, it was used by the CIA Agents themselves as a gateway through which the data derived from smartphones belonging to objects of surveillance (and already infected with other malicious programs) were redirected to the CIA servers. The SMS channel was used in cases where Internet connections were not available.

At a minimum, a significant part of these spyware for different platforms has already appeared anyway in WikiLeaks publishing as part of the Vault 7 campaign.

The latest version of Highrise - 2.0 program is currently known in 2013. It works only under Android 4.0-4.3. Since then, Google's developers have significantly strengthened the security of their operating system, so that later versions of Highrise will not start.

Cybercriminals successfully write malicious software for new versions of Android, so it will be logical to assume that the CIA already has something similar to Highrise, but a successive operating version of the mobile OS, "says Ksenia Shilak, SEC Consult sales director. - In any case, the current tool can theoretically be adapted to Android 4.4 and later versions and used for criminal purposes.

Symantec: Hacker Tools CIA used for 40 cyber in 16 countries

In April 2017, Symantec anti-virus company called an approximate number of cyber, carried out using hacker tools used by the CIA staff and which became known from the materials of the WikiLeaks website.

According to Symantec, in a few years at least 40 cyber in 16 states (including the countries of the Middle East, Europe, Asia, Africa, as well as the United States) were carried out using programs that had previously declassified the WikiLeaks organization.


Symantec did not reveal the names of the programs that the CIA could be used or by someone else for cyber attacks.

A special group was engaged in cybershpion in the CIA, which Longhorn was dubbed in Symantec. Its participants infected the computer networks of government bodies of different states, also infected the system of telecommunication, energy enterprises, as well as aircraft industries. The tool package reported by Wikileaks representatives was used, according to Symantec, from 2007 to 2011.

Vault 7 leakage - the largest in the history of the department

For example, documents disclose the details that the CIA stores information about the multiple 0-day vulnerabilities in Apple, Google, Microsoft products and other large companies, while risking the entire industry.

Talk paper and about Malvari Weeping Angel, created by the Embedded Devices Branch (EDB) of the CIA, with the participation of specialists of their British MI5. With its help, the intelligence agencies can infect "smart" Samsung TVs, turning them into spyware. And although weeping angel, apparently, requires physical access to the device, Malwar provides special services to a variety of opportunities. Here are just some of them: Weeping Angel can extract credentials and browser history, as well as intercept information about WPA and Wi-Fi. Malcity is able to implement fake certificates to facilitate the man-in-the-middle attacks on the browser and receiving remote access. Weeping Angel can create the impression that the TV is turned off, whereas in fact it continues to work, and the built-in microphone "listens" everything that happens around.

SAMSUNG F800 TVs are mentioned in the documents, as well as indications that the CIA developers tested version firmware 1111, 1112 and 1116. Most likely, Weeping Angel is dangerous for all models of the FXXXX series.

Also, the papers indicate that under the auspices of the CIA, many different Mobile Malvari are created for the iPhone and Android. Infected devices are almost completely transmitted under the control of government hackers and are sent to the side of geolocation, textual and audio communication, and can also be secretive to activate the chamber and the device microphone.

So, it is reported that in 2016 there were 24 zero-day vulnerabilities for Android, as well as exploits for them. Moreover, the CIA vulnerabilities find and "workers" as independently, it receives from its colleagues, for example, FBI, the NC, or the British Center for Government Communications. It is the vulnerability of a zero day help the special services to bypass encryption WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman, since the interception of data occurs even before the encryption has earned.

Prime suspect

In the case of the largest CIA history, the Data leak, known as Vault 7, appeared the main suspect. According to the Washington Post in May 2018, with reference to court documents, it is a former CIA officer Joshua Adam Schulte.

According to the documents, the secake materials of the special services describing its hacker arsenal were abducted when the suspect also worked in the CIA. "The government immediately received enough evidence to initiate an investigation against it. Several accused housing orders were issued, "the documents say.

Be that as it may, according to the documents, for the presentation of the official accusation of the evidence received was not enough. The suspect was charged on another, not related to leaks about the dissemination of child pornography. Due to the lack of evidence in involvement in the leakage of secret documents of the CIA, the former employee of the special services were charged with a server management containing 54 GB of child pornography).

According to the defenders, Shulte really managed the public server, but the notions did not have the presence of illegal materials on it. As a result, the accused was recognized as innocent.

Until 2016, Shulte worked in the CIA developer engineers. Thanks to his service provision, he had access to thousands of special service documents, which in 2017 were transferred to Wikileaks.

CIA stole Trojan from "Russian hackers"

The WikiLeaks resource has published another Pack of Secret Documents of Central Intelligence Management (CIA), which contains 27 files. Publication took place within the framework of the project Vault 7, dedicated to the CII actions in the field of cybersecurity. Documents tell about the platform Grasshopper. - A tool for creating malicious software for hacking Windows OS.

GRASSHOPPER contains a set of modules from which you can collect a custom-made implant virus. The virus behavior model is set depending on the characteristics of the victim's computer. Before deploying an implant, the target computer is examined for what version of Windows is installed on it and the protective software is used. If these parameters are suitable for the virus, it is installed on the device. When installing the implant remains invisible for such well-known antivirus programs as MS Security Essentials, Rising, Symantec Endpoint and Kaspersky Internet Security.

One of the stability mechanisms of Grasshopper is called Stolen goods. According to the documentation, the basis for this mechanism was the CARBERP program - malicious software for hacking banking networks. Presumably, Carberp was developed by Russian hackers, the documents of the CIA say.

Borrowing Carberp code has become possible due to the fact that it was posted in the open access. The CIA claims that the "most" code is not useful to them, but the mechanism for maintaining stability and some components of the installer were adopted and modified for the needs of the department.

Reaction of the CIA, vendors and countries
The CIA refused to confirm the authenticity of the documents published by Wikileaks, indicating only that the Agency is engaged in collecting information abroad in order to "protect America from terrorists, hostile countries and other opponents." At the same time, the department categorically rejected suspicions in espionage for citizens.

The official representative of the Ministry of Foreign Affairs of the Russian Federation Maria Zakharov said that the CIA's actions, if the information of WikiLeaks is correct, are dangerous and can undermine the confidence between the countries. Moscow calls on the US intelligence agencies to give a full response to the accusations of Wikileaks about American intelligence hackers.
The Chinese government is also concerned about the cultivated CIBERSED CIA materials and encourages the United States to stop surveys for other countries and kiberataks, said the official representative of the Foreign Ministry of the People's Republic of China Geng Shuang.
In turn, the new German Foreign Minister Sigmar Gabriel, where, according to the report of WikiLeaks, there is a hacker center of the CIA, said that the FRG authorities prefer to consider this information with rumors.
Apple Technological Companies, Samsung and Microsoft reacted to publish confidential documents of intelligence management, stating that most of the vulnerabilities specified in the report are eliminated in the latest versions of operating systems.
The developers of the NotePad ++ text editor also reported the elimination of the workfly "holes" used by the special service. Along with Google Chrome, VLC Media Player, Firefox, Opera, Thunderbird, LibreOffice, Skype and other programs, this software was included in the list of vulnerable applications that the special services wake up using the FINE DINING system. The user seemed that the agent launches video viewing program (for example, VLC), demonstrates slides (Prezi), plays a computer game (Breakout2, 2048) or even drives the antivirus program (Kaspersky, McAfee, Sophos), in reality while "distracting" Displayed on the screen, an automatic infection of a computer system, its viewing and receiving information
Reaction to the leakage of secret documents of the CIA

According to the Reuters news agency, with reference to the unnamed Cisco employees, after this leak, the company's managers instantly attracted specialists from various projects to find out how the methods of hacking CIA work work to help Cisco customers to correct their systems and not allow the use of the same cyberprises. Around the clock for several days, Cisco programmers analyzed the hacker funds of the CIA, corrected vulnerabilities and prepared for customers of the company's customers about possible risks during the operation of equipment. It is noted, under the threat of hacking there were more than 300 models of Cisco products.

The representative of the CIA Heather Fritz Horniak (Heather Fritz Horniak) did not comment on Cisco on request Reuters and only noted that the Office pursued the "goal to be innovative, advanced and was on the forefront in the protection of the country from foreign enemies."

  • 47% of applications analyze and transmit information about the location to third parties;
  • 18% are divided by user names;
  • 16% transfer to the side of the email address (

The names of the secretary operations of the CIA

For most of the population of our planet, the secret operations of the CIA are presented with a certain analogue of UFOs - everyone heard about them, but nobody watched with their own eyes. And it is extremely dangerous, since it contributes to total mythologization of the issue, which is then very easy to enter into the next conspiracy theory. In essence, the United States made a stunning thing - they turned the real crimes in the collection of exciting fairy tales. Hence the incredible hatred of Snowden and WikiLeaks, because it is their efforts of legends and myths that have become specific names and documents, having launched a dangerous mechanism. Even in itself, he has far-reaching consequences, reflecting on a variety of faces of American politics.
However, this is only Polbie. The second half lies in the fact that in the framework of this process, all new figures appear. So, quite recently, the FBI arrested a man who worked with the National Academy of Sciences, being an employee of the Consulting company Booz Allen Hamilton. The suspect is an interesting not only name - Harold Thomas Martin III, but also charged to him. After all, he is attributed to a lot of much theft of the original Code of the NSA, designed for hacking Russian, Iranian and Chinese systems. And as a tangible incatch, there is a fact that it was thanks to him that the network was published a list of CIA agents who act abroad and those who were actively involved in the abductions and torture of foreign citizens.

This news has already appeared on several large western portals, such as Homment and Cyberguerrilla, not to mention publications on social networks. In addition, at least one of the revealed agents, someone José Rodriguez may also participate in the arrest of businessmen who refused to sell their companies to large corporations. In general, the list is quite entertaining, especially in the aspect, which concerns geography. Arrests and tortures were carried out on a huge space, from Poland and Romania to Pakistan and Morocco.
What is very important, we are talking only about personnel employees, about the Americans themselves. And this is despite the fact that the lion's share of such operations is carried out "by proxy", when a person who needs to speak or disappear is given to Satitis or Jordanians. Here is your own program, which is not even trying to camouflage under the arrests. This is precisely the abduction, and this can be seen by the example of posts involved in agents:

Rodney Guy Smith, Head of the CIA Special Operations Department in 2003-2006, currently executive director in Abraxas;

Alejandro D. Martinez,("Duece Martinez"), analyst, freelance officer of the CIA;

Robert Bickle,the CIA investigator in the 2000s, the current status is unknown;

Robert Kandara Head of the Program of Particularly Important Detention (HVD) of the CIA from 2003 and at least 2004;

John Bevan., CIA officer, deputy in the HVD leadership, in 2009 still worked in the CIA;

Thomas Fletcher, The CIA officer, the participant of the HVD program, the current status is unknown;

ALAN JORSEY, In the 2000s, as a pilot took part in the operations of the CIA;

Alfreda Bukoski.(depicted in the movie "Purpose of Number One"), the senior officer of the HVD program probably still continues its activities;

Jose Rodriguez., from 2004 to 2007 was the guidance director of the CIA operations, and was also the director of the National Secret Service, at the right in resignation;

Gina Haspel, head of the CIA Residency in London in 2009, a former HVD member;

Bruce Jessen., Contractor CIA, gave recommendations for interrogation;

Frank (Francisco) CHAP, according to some data, the HVD officer, in 2009 transferred to work in the NSA;

Michael K. Winograd., in 2002 to 2005, the head of the CIA reside in bankoke; possessed either still possesses interrogation records;

James E. Mitchell. The Contractor of the CIA, formally as part of the United States Recovery Agency, currently a private contractor Bruce Jesssen, an adviser to conduct interrogations, engaged in the destruction of records of their conduct;

Michael D "Andrea In 2002, the head of operations conducted by the CIA Counter-Terrorism Center; Later, the head of the residency in Cairo;

Robert Grenier, In 1999 to 2002, the head of the CIA Residency in Pakistan, from 2004 to 2006, the head of the Counter-Terrorism Center, at the right retired, as of 2009, worked at Kroll in Washington;

Kirk Hubbard.in the 2000s, the psychologist of the CIA, an adviser to conduct interrogations;

Carol S. Rosenblum, psychologist of the CIA, another adviser to conduct interrogations;

Richard Blee, In 2004, the head of the CIA Residency in Pakistan, later led publications, at the present purpose, a private consultant was also involved in the HVD program;

Martin (Marty) Martin, Senior officer from 2000 to 2005, later the head of the residency in Cairo, participant of the interrogation program:

Robert Dannenberg., from 2004 to 2006, the head of the department in Central Eurasia, which included Romania, Poland and a number of other European countries, an employee of the Special Operations Department, Counter-Terrorism Center and HVD Program;

Robert Richer., Assistant Director for Operations (Addo) until the end of 2005, in 2002-2004 Head of the Department of the Middle East and South Asia, a participant in the program responsible for the extradition of suspects;

cIA agents: John Radsen, Jonathan Fredman, John Rizzo, Robert Eatinger, Paul Kelbaugh, Robert Monahan, Steven W. Hermes - related to extradition, torture and HVD program;

James Pavit., in 1999 to 2004 Deputy Director for CIA operations, a participant in a number of arrests and interrogations;

John Sano., in 2005, the head of the Union of East Asia, in 2005 - 2007 Deputy Director of the National Secret Service, at the moment retired;

Jami Miscik., in 2002 - 2004 Deputy Director of Intelligence, retired, participated in the activities of the Special Operation Department;

Scott White., Assistant Deputy Director of Intelligence in 2002 - 2004, Director of Assistance in 2006-2008, Assistant Deputy Director, who in 2009 took the place of Michael Morella;

Ronald Czametsky, In 2002 - 2005 Head of the CIA Residency in Poland, in 2009 The head of the residency in Moscow;

Paul Zalucky, head of the residency in Poland from 2005 to 2007;

Larry Seals., Director of the CIA Aviation Department from 2001 to 2004, the head of the extradition programs from 2004 and to a certain point, to date, which is not yet possible;

Scott D. Wever, in 2001 - 2004 Officer of the CIA Aviation Department at various points, hired by the CIA Contractor - CSC in 2004-2005, again hired in 2006-2007 to participate in the Extradition Program;

William L. Ballhaus. General Director of Dyncorp International, CIA Contractor in the extradition program in 2002 - 2005;

Stephen Lee. manager at CSC / Dyncorp from 2001 to 2005 participant of the extradition program;

Willian Vigil.cSC / Dyncorp manager, the CIA operation participant under the contract, ruled the CIA accident operations in 2005-2007, then in 2007 he moved to McNeil Security, which is also a CIA contractor;

Lawrence Dan Engelhaupt. Director CSC / DYNCORP, CIA operations under contract in 2002 - 2007, also moved to McNeil in 2007;

Steve Dugre. Another CSC / Dyncorp manager, the CIA operation participant under the contract in 2001 to 2007, since 2007 employee McNeil;

Michael Edward Anderson, Aero Contractors of North Carolina, the pilot of the air sides of the CIA N379P, N313P, flew with missions to Afghanistan, Morocco and Poland.

PS. This kind of leakage is reminded by the last years of the existence of the USSR, when various traitors merged to the West information about our agents in the United States and Western Europe or even exported information on the structures of the KGB of the USSR to the West.
The expositions of this kind are still drawn since the recent years of the Bush junior reign, when the scandal around the legal torture and secret prisons of the CIA in Eastern Europe, very much hit the Republicans. Attempts to justify themselves in the Cenate or even by promoting the idea to the mass media that "torture is good", the result was not given, so from 2010-2011 there is an active stripping of evidence, connected with both the organizers and performers of torture and secret prisons. . But due to the fact that this question still excites American public opinion, the various services periodically roll up this topic again, but in the case of the upcoming elections of the United States, the flow of various exposures, throwing the shadow as represented by the Republicans. So and the Democrats increases.
Elections of course will be held, but among those threads of the lesions that the parties pour each other, slipping and truly valuable information. In one case, this may be data on clinton connections with sponsors of radical jihadism in the Middle East https://lenta.ru/news/2016/11/05/clinton/, in the given case, these are lists of former and acting CIA officers participating in Implementing directives for torture and secret prisons, some of which still occupy important positions in the American establishment.
The fact that these people have not suffered responsibility should not be surprised, especially if you remember that after World War II, in the United States, they found a refuge of many human screws of the Third Reich car, driving themselves with various crimes against peace and humanity.
vIA colonelcassad.
And some more killers of the CIA:
Norman Khodjes. Normand Hodges.
James Hayworth James "jimmy" hayworth
Kate Makinnis Keith McInnis.

Did you like the article? Share it
Top