Review: Rebuttal – CIA “Leaders” Double-Down on Lies

1 Star, Crime (Government), Intelligence (Government/Secret), Power (Pathologies & Utilization)
Amazon Page
Amazon Page

Bill Harlow (Editor), George Tenet (Introduction), Porter J. Goss (Contributor), Michael V. Hayden USAF (Ret.) (Contributor), John McLaughlin (Contributor), Michael Morell (Contributor), Philip Mudd (Contributor), John Rizzo (Contributor), Jose A. Rodriguez Jr. (Contributor)

1 Star Authors Double-Down on Lies Told Previously

I am a co-signer of the below letter to the President of the United States of America from Veteran Intelligence Professionals for Sanity (VIPS), as delivered yesterday and also posted in ConsotiumNews.com by Robert Parry. A better more truthful book, albeit fiction to avoid the legal bru-ha-ha, is Broken!, a story of torture and treason far closer to reality than the version offered by the perpetrators themselves.

MEMORANDUM FOR: The President

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: Veteran Intelligence Professionals Challenge CIA’s “Rebuttal” on Torture

Continue reading “Review: Rebuttal – CIA “Leaders” Double-Down on Lies”

Review: Hard Measures – How Aggressive CIA Actions After 9/11 Saved American Lives

3 Star, Atrocities & Genocide, Censorship & Denial of Access, Congress (Failure, Reform), Corruption, Crime (Government), Culture, Research, Empire, Sorrows, Hubris, Blowback, Executive (Partisan Failure, Reform), Impeachment & Treason, Intelligence (Government/Secret), Justice (Failure, Reform), Misinformation & Propaganda, Politics, Power (Pathologies & Utilization), Secrecy & Politics of Secrecy, True Cost & Toxicity

Jose Rodriguez and Bill Harlow

3.0 out of 5 stars 5 as Personal Memoir, 1 for Nonsense About “Hard Measures”, May 3, 2012

As a memoir of time in the CIA bureaucracy and occasional righteous deeds in the field, the book is a must read along with a handful of others by former case offices of stature-no one denies the stature of the primary author-I do question the role of the second author. Unfortunately, the author himself may not realize the falseness of the context, the premises, the claims, the reports, and the ethics surrounding rendition and torture. All I can do is point this out and hope that readers will take the time to reflect and read beyond this book.

I am a former clandestine case officer from the Latin America Division, and among those from CIA, including former Director Stansfield Turner, case officers Robert Bauer and Vince Cannistraro, and many others, who signed the letter to Senator McCain against torture.

Real professionals, which is to say, not the Ollie North’s of CIA, know that torture does not work. Anything in this book that says it does, and that leads came out of torture that were important, is in my independent judgement a lie-perhaps not a deliberate lie. The primary author was so far removed from the ground reality as to be unwitting of the lies being told to him by contractors and case officers who sought only to improve their “record” without regard to the truth or the consequences.

Anytime there is an argument over whether something is torture or not, it is. This will not be understood by the loosely-educated who lack an appreciation of ethics and the strategic value of morality.

Dick Cheney committed over 20 impeachable crimes (I itemize them in my review of Vice: Dick Cheney and the Hijacking of the American Presidency, while also telling 935 now documented lies. The primary value of this book may be in clearly identifying the author as an enabler of Dick Cheney’s crimes and lies, and a subject for future investigation if the USA ever gets an honest government again.

The CIA is an empty shell, with child analysts and no bench in the clandestine service. This is one reason DIA is working so hard to create its own “Class A” clandestine service, but sadly, DIA is turning to the same low standards that CIA has had all these years, and will be hard pressed to get much beyond its present standard for clandestine operations, “push ups done silently.”

I love books and I love the truth. I have written, edited, and published nine books on intelligence so far, and believe with all humility that I am helping set the gold standard for what ethical intelligence could and should be. In my personal opinion, this book demeans everything that CIA, the US Government, the Constitution, and the Republic should stand for.

You can find almost all of my reviews on books about intelligence at one single consolidated list easily found by searching for the phrase below (all reviews lead to their respective Amazon page). Buy something other than this book — it shames us all and does no service to the craft of intelligence.

Worth a Look: Book Reviews on Intelligence (Most)

Here are nine other books [Amazon has a ten link limit]-the first two show CIA at its best, the rest at its normal worst.

A Spy For All Seasons: My Life in the CIA
Jawbreaker: The Attack on Bin Laden and Al Qaeda: A Personal Account by the CIA’s Key Field Commander

Legacy of Ashes: The History of the CIA
See No Evil: The True Story of a Ground Soldier in the CIA’s War on Terrorism
Devil’s Game: How the United States Helped Unleash Fundamentalist Islam (American Empire Project)

Dark Alliance: The CIA, the Contras, and the Crack Cocaine Explosion
BLOND GHOST
Someone Would Have Talked
Spying Blind: The CIA, the FBI, and the Origins of 9/11

Robert David STEELE Vivas
ON INTELLIGENCE: Spies and Secrecy in an Open World

Vendor Pitch Archives on Public Intelligence (1992-2006)

Commerce

2006

US

Vendor Fleming Icosystem

2006

US

Vendor Lederman Deep Web Technologies

2006

US

Vendor Proctor IBM’s Text Analytic OS Architecture

2006

US

Vendor Ruh CISCO’s Application Oriented Network

2004

US

Vendor Dietz LEXIS-NEXIS Open Sources on North Korea

2004

US

Vendor Dietz Top Ten Stories on North Korea

2001

US

Vendor NA Bright Planet White Paper on the Deep Web

2001

UK

Vendor Rotheray BBC Views on New Risks of Crisis Seen From Open Sources (Slides)

2001

UK

Vendor Rotheray BBC Views on New Risks of Crisis Seen From Open Sources (Text)

1999

US

Vendor Boyer AUTOMETRIC (Now Boeing): High Resolution Imagery

1999

NL

Vendor DataExpert DateExpert

1999

US

Vendor Powerize Powerize Overview

1998

UK

Vendor Brenton MEMEX Software

1998

UK

Vendor Hunter I2: Creating Intelligence Automatically

1998

US

Vendor Retrieval Tech. Real Time News Meets Knowledge Management

1997

US

Vendor Blejer SRA: Intelligence Information Systems

1997

US

Vendor CORE CORE SW: Business Plan Summary

1997

US

Vendor Jacobs ISOQUEST: Software for Managing Information Overload

1997

US

Vendor Rodriguez DIALOG: Targetted Decisions Support versus Generic Internet

1997

US

Vendor Weigand Forecast International: Reducing Risk Via Practical OSINT (Slides)

1997

US

Vendor Weigand Forecast International: Reducing Risk Via Practical OSINT (Text)

1996

US

Vendor Dixon LEXIS-NEXIS, Online Public Records and Criminal Investigations

1996

UK

Vendor Hutchinson Jane’s: The Role of Sources in Open Intelligence

1996

US

Vendor Krattenmaker LEXIS-NEXIS, LEXMAP Demonstration and Discussion

1996

US

Vendor Nachmanoff Oxford Analytica: Economic Intelligence Services for the Private Sector

1996

US

Vendor Nanz SPOT Image: Remarks on Commercial Imagery

1995

US

Vendor McLagan NewsEdge, Tailored News Alerts for a Competitive Edge

1995

US

Vendor Nanz Commercial Imagery and National Defense (Slides)

1995

US

Vendor Nanz Commercial Imagery and National Defense (Text)

1995

UK

Vendor Rolington Jane’s: A Theory of Open Source Information

1994

US`

Vendor Vajta-Williams Space Imaging, Commercial Imagery, and You

1993

UK

Vendor Hall Jane’s Approach to the New Threat Environment

1992

US

Vendor Driver N-STAR: An Automated Analyst Tool for Open Source Data

1992

US

Vendor Hutchinson Jane’s RUMOR OF WAR: An Information Vendor’s View

1992

US

Vendor Kovaly Unique Wire Service Provides Early Intelligence

1992

US

Vendor Pincus METAMORPH: Theoretical Background and Operational Functionality

1992

US

Vendor Vendor PERISCOPE, Commercial Open Source

2000 PRIMER on Open Sources & Methods

Methods & Process, OSINT Generic

2000

SE

Training Bjore PRIMER: How InfoSphere Uses the Internet

2000

US

Training CSM PRIMER: Top Secret Kodak Moments in Space

2000

US

Training David PRIMER: Intelligence Analysis in a New Century

2000

US

Training Davis PRIMER: Compendium of Analytic Tradecraft Notes

2000

NL

Training Farace PRIMER: Gray Literature 2: Finding the Not Easily Found

2000

US

Training Klein PRIMER: Gray Literature 1: Finding the Needle in the Haystack

2000

US

Training Lanza PRIMER: Beyond the Internet (Slides)

2000

US

Training Lanza PRIMER: Beyond the Internet (Text)

2000

US

Training Rodriguez PRIMER: Briefing on DIALOG

2000

US

Training Rodriguez PRIMER: Chart Comparing DIALOG to Internet (At the Time)

2000

US

Training Sacks PRIMER: Primary Research

2000

US

Training Sandman PRIMER  Applied Human Intelligence

2000

US

Training Snowden PRIMER: Geospatial Intelligence Options

2000

US

Training Soule & Ryan PRIMER: Gray Literature 3: Technical Briefing

2000

US

Training Steele PRIMER: A Few Thoughts on the Internet (At the Time)

2000

US

Training Webb & Steele PRIMER: Integrated Analytic Toolkit Requirements