CIA Whistleblower: They Can See All Your Messages! I Was Under Surveillance In Pakistan!
John Kiriakou, a former CIA officer, discusses his 15 years as a spy, blowing the whistle on the CIA's torture program, and the realities of intelligence work. He shares insights on human nature, digital vulnerabilities, and global power dynamics.
Deep Dive Analysis
18 Topic Outline
Whistleblowing on the CIA's Torture Program
CIA's Core Mission and Counterterrorism Operations
The Asset Acquisition Cycle: Recruiting Spies
Personal Journey to Becoming a CIA Officer
CIA Training and Presidential Daily Briefings
CIA's Use of Human Vulnerabilities for Recruitment
Lying and Lie Detection in Intelligence Work
The Reality of Government Surveillance on Americans
Digital Security and Intelligence Agency Hacking Capabilities
Sleeper Agents: Training, Activation, and Detection
Prevalence of Spies in the United States
CIA's Historical Covert Operations and MKUltra
Israeli Intelligence Operations and Tactics in Iran
CIA Assassination Programs and Kill Lists
Analysis of Jeffrey Epstein as an Access Agent
China as the Long-Term Adversary and Global Strategy
US Government Spending, National Debt, and Infrastructure
The Importance of Ethics and Rule of Law in Government
7 Key Concepts
Asset Acquisition Cycle
A four-step process used by the CIA to recruit spies: Spot, Assess, Develop, Recruit. It involves identifying potential assets, evaluating their suitability, building a relationship, and then formally recruiting them for information.
Sociopathic Tendencies (in CIA context)
The CIA actively seeks to hire individuals who exhibit sociopathic tendencies, meaning they can operate in legal, moral, and ethical gray areas and are willing to undertake actions like breaking into foreign embassies without feeling regret or remorse, believing they are 'the good guys'.
Flash / Critic (Intelligence Immediacy Levels)
These are levels of urgency for intelligence reports. 'Flash' indicates something terrible just happened, requiring the President to be woken up. 'Critic' is the highest level, signifying an immediate threat like an embassy under attack or war, demanding the President be woken and jets scrambled.
Access Agent
A type of recruit used by foreign intelligence services who has regular access to high-value targets (like former presidents, CEOs, or royalty) and makes them feel comfortable and appreciated, often using money and compromising situations (compromat) to gather information.
Sleeper Agent
An individual taken from birth (or a very young age) and trained to adopt another nationality, language, and culture. They live a normal life in the target country for many years, sometimes decades, before being activated for espionage or other covert operations.
Multipolar World
A global political system characterized by the presence of three or more major superpowers, as opposed to a unipolar world dominated by a single superpower. The speaker suggests it might be a safer global arrangement.
Compromat
Short for 'compromising material,' this refers to information, often photographic or video evidence of individuals in compromising positions (e.g., engaging in illicit activities), used by intelligence agencies for blackmail or leverage.
11 Questions Answered
The CIA's job is to recruit spies to steal secrets and analyze those secrets to provide policymakers with the best informed policy decisions.
Studies show that 95% of people who agree to become spies for the CIA do it for money, with the remaining 5% motivated by love, family, ideology, revenge, or excitement.
Personal digital devices are not secure at all; intelligence agencies from many countries have capabilities to intercept communications, hack car systems, and turn smart TVs into microphones, even when off.
It is estimated that there are between 50,000 to 60,000 foreign and American undercover intelligence officers in the United States, making it statistically likely for an average person to encounter one annually.
MKUltra was a CIA program from 1952-1975 that experimented with LSD and other methods, including dosing their own employees and strangers, to try and engineer mind control, plant memories, or break and rebuild the human mind.
It is probable that the CIA is involved, but the Israelis are heavily involved, having successfully recruited Afghan refugees to identify and target Iranian military and nuclear leadership.
Yes, under the Obama administration, there was a 'Tuesday morning kill list meeting' where targets (ground-level terrorists posing a clear and present danger) were identified for assassination.
John Kiriakou believes Jeffrey Epstein was an Israeli spy, acting as an 'access agent' to gain proximity to powerful individuals and potentially gather compromising information (compromat) using hidden cameras.
John Kiriakou believes China is the real long-term adversary due to their patience, economic strategy of building infrastructure in other countries, and active espionage through PhD students in the hard sciences.
He is concerned that the US government's inflated military budget (over a trillion dollars annually) is unsustainable, leading the country towards bankruptcy while China invests in infrastructure and lets the US spend itself into oblivion.
No, according to John Kiriakou, the McCain-Feinstein anti-torture amendment, passed in December 2014, effectively ended the CIA's torture program, partly due to his revelations.
11 Actionable Insights
1. Protect Your Communications
Avoid putting sensitive information in texts or written messages, and be mindful of what you say, as all communications can be intercepted and used against you by various entities.
2. Enhance Digital Security Awareness
Recognize that personal devices are not inherently secure and metadata is readily available for purchase, making individuals vulnerable to surveillance and manipulation by intelligence agencies.
3. Overcome Self-Pity
Stop feeling sorry for yourself and take decisive action to build the life you desire, as this shift in mindset is a transformative step towards personal and professional fulfillment.
4. Prioritize Ethical Conduct
Uphold strong ethics and integrity in all actions, ensuring you never do or say anything you would be ashamed to see publicly, as this commitment defines your character and impact.
5. Build Trusting Relationships
Foster relationships based on genuine trust and personal connection, as this approach is more effective for gaining cooperation and information than relying on coercion or threats.
6. Understand Core Motivations
Recognize that money is a primary driver for 95% of people in high-stakes situations, with family, ideology, revenge, and excitement accounting for the remaining motivations.
7. Identify Human Vulnerabilities
Understand that individuals have ‘vulnerabilities’ or ‘hooks’ related to money, family, ideology, revenge, or excitement, which can be identified to influence behavior or negotiation outcomes.
8. Recognize Disinformation Tactics
Be aware that powerful entities use repeated lies and media manipulation (e.g., through Hollywood) to spread specific messages and shape public perception, even if the information is false.
9. Adopt Long-Term Strategy
Cultivate a strategic mindset that plans for decades rather than short-term cycles, as patience and foresight are essential for achieving significant and lasting objectives.
10. Understand Leadership Tendencies
Recognize that some leaders, particularly in high-stakes environments, may exhibit sociopathic tendencies, operating in moral and legal gray areas without remorse to achieve goals.
11. Develop Lie Detection Skills
Cultivate the ability to detect deception, as this skill is crucial in environments where dishonesty is prevalent, such as intelligence work and various professional interactions.
7 Key Quotes
I would let them send me to prison again, because it was the right thing to do.
John Kiriakou
I've been here five years. And you're the first person who ever asked me about my family.
Al-Qaeda fighter (recruited by Kiriakou)
Don't nod when you can motion. Don't speak when you can nod. And don't ever put anything in a text message.
Elliot Spitzer (quoted by John Kiriakou)
Don't ever say or do anything that we would be ashamed to see on the front page of the Washington Post.
CIA briefing (quoted by John Kiriakou)
Our Israeli friends have two officers in their embassy, one from Mossad, one from Shin Bet. The FBI has identified 187 undeclared Israeli intelligence officers spread all across the United States, mostly at defense contractors, trying to steal our secrets.
CIA Director of Security (quoted by John Kiriakou)
If I were the president, I would have hung him from a tree.
John Kiriakou
Either we're going to be the good guys or we're not. Either we're going to be what Ronald Reagan called a shining city on a hill or we're not.
John Kiriakou
2 Protocols
CIA Asset Acquisition Cycle
John Kiriakou- Spot: Identify a potential asset.
- Assess: Evaluate the individual's suitability and potential value.
- Develop: Build a relationship with the individual.
- Recruit: Formally recruit the individual to steal secrets.
Tuesday Morning Kill List Meeting (Obama Administration)
John Kiriakou- Brennan (Deputy National Security Advisor for Counterterrorism), National Security Council attorney, CIA general counsel's office representative, and a representative of the Director of the Counterterrorism Center meet at the White House.
- They come up with a list of people to kill that week.
- Teams fan out around the world to kill their targets.
- Teams return and meet again the next Tuesday morning.