CIA Whistleblower: They Can See All Your Messages! I Was Under Surveillance In Pakistan!

Jan 19, 2026
Overview

John Kiriakou, a former CIA officer, discusses his 15 years as a spy, blowing the whistle on the CIA's torture program, and the realities of intelligence work. He shares insights on human nature, digital vulnerabilities, and global power dynamics.

At a Glance
11 Insights
1h 45m Duration
18 Topics
7 Concepts

Deep Dive Analysis

Whistleblowing on the CIA's Torture Program

CIA's Core Mission and Counterterrorism Operations

The Asset Acquisition Cycle: Recruiting Spies

Personal Journey to Becoming a CIA Officer

CIA Training and Presidential Daily Briefings

CIA's Use of Human Vulnerabilities for Recruitment

Lying and Lie Detection in Intelligence Work

The Reality of Government Surveillance on Americans

Digital Security and Intelligence Agency Hacking Capabilities

Sleeper Agents: Training, Activation, and Detection

Prevalence of Spies in the United States

CIA's Historical Covert Operations and MKUltra

Israeli Intelligence Operations and Tactics in Iran

CIA Assassination Programs and Kill Lists

Analysis of Jeffrey Epstein as an Access Agent

China as the Long-Term Adversary and Global Strategy

US Government Spending, National Debt, and Infrastructure

The Importance of Ethics and Rule of Law in Government

Asset Acquisition Cycle

A four-step process used by the CIA to recruit spies: Spot, Assess, Develop, Recruit. It involves identifying potential assets, evaluating their suitability, building a relationship, and then formally recruiting them for information.

Sociopathic Tendencies (in CIA context)

The CIA actively seeks to hire individuals who exhibit sociopathic tendencies, meaning they can operate in legal, moral, and ethical gray areas and are willing to undertake actions like breaking into foreign embassies without feeling regret or remorse, believing they are 'the good guys'.

Flash / Critic (Intelligence Immediacy Levels)

These are levels of urgency for intelligence reports. 'Flash' indicates something terrible just happened, requiring the President to be woken up. 'Critic' is the highest level, signifying an immediate threat like an embassy under attack or war, demanding the President be woken and jets scrambled.

Access Agent

A type of recruit used by foreign intelligence services who has regular access to high-value targets (like former presidents, CEOs, or royalty) and makes them feel comfortable and appreciated, often using money and compromising situations (compromat) to gather information.

Sleeper Agent

An individual taken from birth (or a very young age) and trained to adopt another nationality, language, and culture. They live a normal life in the target country for many years, sometimes decades, before being activated for espionage or other covert operations.

Multipolar World

A global political system characterized by the presence of three or more major superpowers, as opposed to a unipolar world dominated by a single superpower. The speaker suggests it might be a safer global arrangement.

Compromat

Short for 'compromising material,' this refers to information, often photographic or video evidence of individuals in compromising positions (e.g., engaging in illicit activities), used by intelligence agencies for blackmail or leverage.

?
What is the CIA's primary mission?

The CIA's job is to recruit spies to steal secrets and analyze those secrets to provide policymakers with the best informed policy decisions.

?
What motivates most people to become spies for the CIA?

Studies show that 95% of people who agree to become spies for the CIA do it for money, with the remaining 5% motivated by love, family, ideology, revenge, or excitement.

?
How secure are personal digital devices from intelligence agencies?

Personal digital devices are not secure at all; intelligence agencies from many countries have capabilities to intercept communications, hack car systems, and turn smart TVs into microphones, even when off.

?
How many spies (foreign and domestic) are estimated to be in the United States?

It is estimated that there are between 50,000 to 60,000 foreign and American undercover intelligence officers in the United States, making it statistically likely for an average person to encounter one annually.

?
What was Project MKUltra and what did it involve?

MKUltra was a CIA program from 1952-1975 that experimented with LSD and other methods, including dosing their own employees and strangers, to try and engineer mind control, plant memories, or break and rebuild the human mind.

?
Are the CIA currently involved in Iran's internal affairs?

It is probable that the CIA is involved, but the Israelis are heavily involved, having successfully recruited Afghan refugees to identify and target Iranian military and nuclear leadership.

?
Does the US government still assassinate people via the CIA?

Yes, under the Obama administration, there was a 'Tuesday morning kill list meeting' where targets (ground-level terrorists posing a clear and present danger) were identified for assassination.

?
Was Jeffrey Epstein a spy, and for whom?

John Kiriakou believes Jeffrey Epstein was an Israeli spy, acting as an 'access agent' to gain proximity to powerful individuals and potentially gather compromising information (compromat) using hidden cameras.

?
Who does John Kiriakou consider the real adversary of the West?

John Kiriakou believes China is the real long-term adversary due to their patience, economic strategy of building infrastructure in other countries, and active espionage through PhD students in the hard sciences.

?
Why is John Kiriakou concerned about the US government's spending?

He is concerned that the US government's inflated military budget (over a trillion dollars annually) is unsustainable, leading the country towards bankruptcy while China invests in infrastructure and lets the US spend itself into oblivion.

?
Does the US government still engage in torture?

No, according to John Kiriakou, the McCain-Feinstein anti-torture amendment, passed in December 2014, effectively ended the CIA's torture program, partly due to his revelations.

1. Protect Your Communications

Avoid putting sensitive information in texts or written messages, and be mindful of what you say, as all communications can be intercepted and used against you by various entities.

2. Enhance Digital Security Awareness

Recognize that personal devices are not inherently secure and metadata is readily available for purchase, making individuals vulnerable to surveillance and manipulation by intelligence agencies.

3. Overcome Self-Pity

Stop feeling sorry for yourself and take decisive action to build the life you desire, as this shift in mindset is a transformative step towards personal and professional fulfillment.

4. Prioritize Ethical Conduct

Uphold strong ethics and integrity in all actions, ensuring you never do or say anything you would be ashamed to see publicly, as this commitment defines your character and impact.

5. Build Trusting Relationships

Foster relationships based on genuine trust and personal connection, as this approach is more effective for gaining cooperation and information than relying on coercion or threats.

6. Understand Core Motivations

Recognize that money is a primary driver for 95% of people in high-stakes situations, with family, ideology, revenge, and excitement accounting for the remaining motivations.

7. Identify Human Vulnerabilities

Understand that individuals have ‘vulnerabilities’ or ‘hooks’ related to money, family, ideology, revenge, or excitement, which can be identified to influence behavior or negotiation outcomes.

8. Recognize Disinformation Tactics

Be aware that powerful entities use repeated lies and media manipulation (e.g., through Hollywood) to spread specific messages and shape public perception, even if the information is false.

9. Adopt Long-Term Strategy

Cultivate a strategic mindset that plans for decades rather than short-term cycles, as patience and foresight are essential for achieving significant and lasting objectives.

10. Understand Leadership Tendencies

Recognize that some leaders, particularly in high-stakes environments, may exhibit sociopathic tendencies, operating in moral and legal gray areas without remorse to achieve goals.

11. Develop Lie Detection Skills

Cultivate the ability to detect deception, as this skill is crucial in environments where dishonesty is prevalent, such as intelligence work and various professional interactions.

I would let them send me to prison again, because it was the right thing to do.

John Kiriakou

I've been here five years. And you're the first person who ever asked me about my family.

Al-Qaeda fighter (recruited by Kiriakou)

Don't nod when you can motion. Don't speak when you can nod. And don't ever put anything in a text message.

Elliot Spitzer (quoted by John Kiriakou)

Don't ever say or do anything that we would be ashamed to see on the front page of the Washington Post.

CIA briefing (quoted by John Kiriakou)

Our Israeli friends have two officers in their embassy, one from Mossad, one from Shin Bet. The FBI has identified 187 undeclared Israeli intelligence officers spread all across the United States, mostly at defense contractors, trying to steal our secrets.

CIA Director of Security (quoted by John Kiriakou)

If I were the president, I would have hung him from a tree.

John Kiriakou

Either we're going to be the good guys or we're not. Either we're going to be what Ronald Reagan called a shining city on a hill or we're not.

John Kiriakou

CIA Asset Acquisition Cycle

John Kiriakou
  1. Spot: Identify a potential asset.
  2. Assess: Evaluate the individual's suitability and potential value.
  3. Develop: Build a relationship with the individual.
  4. Recruit: Formally recruit the individual to steal secrets.

Tuesday Morning Kill List Meeting (Obama Administration)

John Kiriakou
  1. Brennan (Deputy National Security Advisor for Counterterrorism), National Security Council attorney, CIA general counsel's office representative, and a representative of the Director of the Counterterrorism Center meet at the White House.
  2. They come up with a list of people to kill that week.
  3. Teams fan out around the world to kill their targets.
  4. Teams return and meet again the next Tuesday morning.
15 years
John Kiriakou's total time in the CIA First half in analysis, second half in counterterrorism operations.
23 months
John Kiriakou's prison sentence duration Served for blowing the whistle on the CIA's torture program.
upwards of 80%
Divorce rate among CIA employees The highest divorce rate of any entity in the U.S. government.
98.2%
Government's win rate in cases According to ProPublica.
tens of thousands
Number of classified documents in Vault 7 revelations Documents classified above top secret, downloaded by a disgruntled CIA software engineer and released by WikiLeaks.
as many as 10,000
Estimated foreign spies in Washington D.C. Foreign intelligence officers.
50,000 to 60,000
Estimated total spies in the United States Including all CIA personnel and foreign intelligence officers.
more than 2 million
Afghan refugees residing in Iran Many were recruited by Israeli intelligence due to their vulnerable status.
12, soon to be 14
US Navy aircraft carriers Compared to China's one aircraft carrier.
one
China's Navy aircraft carriers Compared to the US's 12 (soon 14).
a trillion dollars
US Pentagon annual budget (current) Amount spent under Donald Trump.
a trillion and a half
US Pentagon annual budget (requested) Amount requested for the next year.
third largest
National debt interest expenditure ranking in US government Behind the Pentagon and Social Security.
187
Identified undeclared Israeli intelligence officers in the US Identified by the FBI, mostly at defense contractors.
95%
US defense secrets given to Israel The proportion of defense secrets the US voluntarily shares with Israel.
roughly 1952 to 1975
Duration of CIA's MKUltra program Years during which the CIA conducted mind control experiments.
about 15%
Percentage of MKUltra documents that survived destruction Accidentally overlooked documents that reveal details of the program.
$25 million
Maximum payment to an individual for terrorist information Given for a very high-ranking foreign terrorist who was brought to justice.