CIA activities in Iran

Source: Wikipedia, the free encyclopedia.

The

Iran-Contra affair of the 1980s. More recently in 2007-8 CIA operatives were claimed to be supporting the Sunni terrorist group Jundallah
against Iran, but these claims were refuted by a later investigation.

Mosaddegh coup

Background

In the early 1900s, Iran's Imperial Leader awarded British businesses exclusive property rights to what would eventually become one of the world's greatest oil reserves. British investment established the Anglo-Persian Oil Company, known today as British Petroleum (BP), and in 1913, the British government purchased a majority of the stake in the partnership. By 1920, approximately 1.5 million tons of oil extracted by the Anglo-Persian oil firm yielded tremendous profits for the British, but Iran earned only 16% in royalty fees.

Mohammed Reza Pahlavi to rule Iran autocratically. Representatives of British Intelligence met with CIA representatives in Washington in November and December 1952 to discuss a joint war and stay-behind plans in Iran. Although it was not on the previously agreed upon agenda of the meeting, British Intelligence representatives brought up the proposition of a joint political action to remove Prime Minister Mosaddegh. However with Truman as the United States president, it was clear his administration was neither ready to start a conflict nor join the British Intelligence Secrete Services (ISS) to facilitate the removal of Mosaddeqh from office: believing at the time that the democratic Mosaddegh was the best deterrent to communist influence in Iran.[1]

With Eisenhower becoming president in January 1953, fearing a possible alliance between Iran and the Soviet Union, such a joint operation between the CIA and ISS seems possible.[5]

Plan Y, was an operation that would have consisted of a three-part attack. These three parts would involve an assault on land, air, and sea. Britain attempted to seek aid from the United States under the Truman administration, but the U.S. declined since any armed military aggression could lead to an open conflict with the Soviet Union. In March 1953, the CIA began to draft a plan to overthrow Mosaddegh, called Operation AJAX which later became the TRAJAX.

Plotting The Coup

On April 4, 1953, the CIA had an approved budget of $1,000,000 to use on the operation. The CIA was instructed to use that money in any way to bring down Mosaddegh.[6] On April 16, 1953, a comprehensive study entitled: "Factors Involved in the Overthrow of Mosaddegh" was completed.

The study indicated that an alliance between the Shah and General Zahedi, supported by local CIA assets and financial backing, would have a good chance of overthrowing Mosaddegh because of the possible large mobs and possible garrison refusal to carry out orders from Mosaddegh.

1979 Hostage Crisis would take place years later. Operation Ajax, also known as TPAJAX was aimed to cause the fall of the Mosaddegh government. It also aimed to reestablish the power of the Shah, and replace the Mosaddegh government with one that could govern Iran according to "constructive policies."[11] Operation Ajax had four main parts: First, a massive propaganda campaign to ruin Mosaddegh's name and accuse him of communist affiliations (though he was famously democratic). Second, encourage disturbances within Iran. Third, pressure the Shah into selecting a new prime minister to replace Mosaddegh. Fourth, support Zahedi as a replacement for Mosaddegh.[12] Operation Ajax or the Tudeh party as the front of the CIA operation continued its propaganda so well that the acting director of the CIA Frank G Wisner pushed for accommodations for the radio operators.[13]

To gain cooperation with the Shah, CIA and British operatives coordinated with his twin sister Princess Ashraf to "induce the Shah to play his role."[9] This plan was broken up into three stages: First, a British representative would visit the Shah and assure him that he receives both U.S. and U.K.'s support in opposing Mossadeq. Second, General Schwarzkopf would also make a visit and be introduced as a U.S.special representative. In the visit, Schwarzkopf was to communicate how both goverments are "determined to help the Iranians to help themselves to keep their country from falling into the Soviet hands."[9] He needed to stress the financial issues Iran might face without his cooperation and threaten Iran would no longer receive financial aid from the U.S. as long as Mossadeq was in power, as well as how the Shah would be "solely responsible for the collapse of the country and its loss of independence."[9] There also needed to be a mutual agreement that Zahedi is an effective candidate to succeed Mossadeq. Soon after this visit, a British representative was to make an identical trip to reinforce these statements. Lastly, Princess Ashraf needed to visit her brother to acquire his signature on documents that named Zahedi as Chief of Staff and ensured all ranks of officers and military were to "carry out faithfully the orders of the Chief of Staff whom the Shah has named."[9]

CIA propaganda in Iran - "Mosaddegh's Spy Service"
CIA propaganda in Iran: "Our National Character"

The CIA prepared and released propaganda to undermine Mosaddegh's political position. One of these, called "Mosaddeq’s Spy Service", claimed that Mosaddegh had built up an extensive spy service of his own to bolster himself as dictator.[14] Another piece, titled "Our National Character," claimed that Mosaddegh's alliance with the Tudeh Party was "corrupting the character of the Iranian people."[15] Furthermore, an internal CIA memo entitled "Campaign to Install Pro-Western Government In Iran" specifies that one of the CIA's main goals in Iran was to "disenchant the Iranian population with the myth of Mossadeq's patriotism, by exposing his collaboration with the Communists and his manipulation of constitutional authority to serve his own personal ambitions for power."[16]

Operation Ajax was put into motion the following year in June, starting with the arrival of key figures, such as Norman Schwarzkopf and Kermit Roosevelt, into Iran. This was a covert operation with the goal of removing Mosaddegh, and then reinstating Shah Mohammad Reza Pahlavi. In the leadup to the operation's execution, officials such as Kermit Roosevelt met with the Shah to discuss the plan and prepare propaganda.[17] However, the operation was initially unsuccessful after the soldiers sent to dismiss Mosaddegh on August 15, 1953, were stopped before the operation could move forward. According to Donald Wilber, one of the CIA operatives who planned the coup and wrote the CIA history on the operation, there were conflicting reports on what occurred that day and how the operation was unable to be completed. The statement released by Mosaddegh's group claimed that the soldiers had been arrested by his personal guards.[4] Kermit Roosevelt, the grandson of former President Theodore Roosevelt, and head of CIA operations in the Middle East;[18] with the cooperation of the Department of State, had articles planted in the United States but when reproduced in Iran, it had psychological effects in Iran and contributed to the coup. With Mosaddegh resisting British pressure, the United States entered the conflict, lured by the prospect of controlling a greater portion of Iran's oil supplies. Mosaddegh's reputation was damaged by propaganda campaigns that incorrectly associated him with communism and denigrated the Iranian people. An attempt to overthrow the democratically elected leader was set in motion.[19]

A notable, effective cause for public unease with Mosaddegh's leadership was the letter that President Eisenhower sent him in response to his call to the U.S. for economic aid, due to not agreeing to the British oil deal. Eisenhower writes "The failure of Iran and of the United Kingdom to reach an agreement with regard to compensation has handicapped the Government of the United States in its efforts to help Iran."

Mohammed Mosaddegh. As the CIA's first successful coup, Operation Ajax left Iran with a resentment for the U.S. that would lead directly to conflicts such as the Iran hostage crisis
. The aftershocks of these events continue to influence Iran's political and cultural landscape today.

Overthrow of Premier Mosaddegh of Iran (Memo)

Further proof of the United States' involvement was announced on March 19, 2013, the 60th anniversary of the overthrow, when the National Security Service posted recently declassified documents that the CIA had on the coup.[30] Although previous to this the CIA claimed that all the documents about 1953 were destroyed or lost in the 1960s because of lack of storage space.[30] A 200-page report written by Donald Wilbur for the CIA goes into detail regarding the planning, execution, and result of the coup.[4][30] Wilbur's report Overthrow of Premier Mossadeq of Iran: November 1952 - August 1953 attempts to outline the need for proper representation of the coup and the necessity to expose the CIA operations in Iran. Released by the New York Times on April 16, 2000, the newspaper utilized Wilbur's writing and reported the facts behind the reason for a coup.[1] He argues that due to the emotional instability of Mosaddegh the Iranian government, military, and Shah were at risk of Soviet takeover and the possibility of communist influence.[2] Thus beginning the aim to crush the communist parties and prevent the 'Reds' from infiltrating the British and American stronghold in Iran.

SAVAK

In 1973 the CIA moved its Headquarters overseeing the Middle East from Cyprus to Tehran, with the appointment of Richard Helms as U.S. Ambassador to Iran. They also trained over 400 SAVAK officers a year near Mclean, Virginia. They were taught surveillance and intel collection techniques according to John Ghazvinian.[31]

Reconnaissance of USSR

Through the Cold War in the 1960s and 1970s, the CIA used its alliance with the government of Iran to acquire an advantage over their Soviet counterparts with the Iranian airfields, airspace, and Air Force assets for aggressive, airborne reconnaissance missions along the edge of the Soviet territories and Warsaw Pact countries in Project Dark Gene.[32] The advantage gained over their Soviet counterparts was crucial to the almost daily sorties that were flown near the borders of the USSR and Warsaw Pact countries. Below there is a map of the USSR highlighted in green. You can see the Middle Eastern States that border the far southern Soviet States, which helps us to identify the motives for the U.S. and the American intelligence community's obsession over states such as Iran. By allowing American military and spy forces to stage in northern Iran, it would ensure less likely suicide missions and more friendly airspace. This helped to keep the number of pilots and personnel killed in action to a minimum. During the 1970s, Iran maintained a good relationship with the United States, which allowed the U.S. to install long-range radar technology and establish listening posts enabling the U.S. to monitor activities in the Soviet Union.[32]

Information of the KGB USSR to the International Department of the CC CPSU, October 10, 1979. "The Leadership of Iran About the External Security of the Country" "According to KGB information, in August in Teheran a secret meeting was held with the participation of representatives of the Prime Minister, the Ministries of Foreign and Internal Affairs, the Intelligence and Operational Administrations of the General Staff, Gendarme and Police Administrations of the General Staff and the Staff of the "Corps of Defenders of the Revolution," with the goal of studying issues which touch on the security of Iran. It was noted that the USSR and the US, which have their own interests in this region, are worried about the victory of the Islamic revolution in Iran.~ presumed that the USA might resort to a direct military threat and realization of a blockade. But if Iran will not take sharp steps which hurt the US, and will obstruct the penetration of the Soviets, this will ease the position of the USA. Evaluating the policy of the USSR in relation to the Iranian regime, the participants in the meeting concluded that insofar as strengthening the Islamic republic will lead to a weakening of the position of the regime in Afghanistan, exert a certain influence on the Muslim republics in the USSR and will be "a brake in the path of penetration of Communism in the region," the Soviet Union "will not turn away from the ideological struggle and efforts to put into power in Iran a leftist government." It was stressed that with the aim of weakening the Islamic regime the USSR might organize "provocative" activity among

Baluchis
, support leftist forces, create economic difficulties, resort to a military threat based on the agreement of 1921. It was noted that Afghanistan is not in any condition to undertake military actions against Iran. However, border conflicts are not excluded. In addition, Afghanistan needs economic assistance from Iran, which might soften its position. The positions of Iraq, Turkey, Pakistan, and Saudi Arabia were also analyzed."[33] Based on research notes taken at the Center for the Preservation of Contemporary Documentation (Moscow), Fond 5, Opis 76, File 1355, Pages 17-20.

Identification of leftists

Following the

Khomeini's administration.[35] A Tower Commission report later observed that the list was utilized to take "measures, including mass executions, that virtually eliminated the pro-Soviet infrastructure in Iran."[35][36]

Iran-Contra affair

Beginning in August 1984, senior

Iran-Contra affair, arranged for the indirect transfer of arms to Iran, to circumvent the Boland Amendments. These amendments were intended to prevent the expenditure of US funds to support the Nicaraguan Contras
. Since the arms-for-hostages deal struck by the Reagan Administration channeled money to the Contras, the legal interpretation of the time was that the CIA, as an organization, could not participate in Iran-Contra.

The relationships, first to avoid the Boland Amendment restriction, but also for operational security, did not directly give or sell U.S. weapons to Iran. Instead, the Reagan Administration authorized Israel to sell munitions to Iran, using contracted Iranian arms broker Manucher Ghorbanifar.[37] The Reagan administration circumvented the law by using Israel and South Africa to send weapons to Iran. To finance the Contras, the United States used the money from the weaponry sales and sent it to the Contras.[38] The proceeds from the sales, less the 41% markup charged by Ghorbanifar and originally at a price not acceptable to Iran, went directly to the Contras. Those proceeds were not interpreted as U.S. funds. The Administration resupplied Israel, which was not illegal, with munitions that replaced those transferred to Iran.

While

William Casey was deeply involved in Iran-Contra, Casey, a World War II Office of Strategic Services (OSS) clandestine operations officer, ran the Iran operation with people outside the CIA, such as White House/National Security Council employees such as John Poindexter and Oliver North, as well as retired special operations personnel such as John K. Singlaub and Richard Secord.[39]

The scandal was ultimately compounded by a failure of the US to hide its delivery of weapons to the Iranians.The principal objective of North's clandestine mission was to deliver eight hundred antiquated missiles on an EL Al 747 to Lisbon, where they would then be transferred to a Nicaraguan plane secured by General Richard Secord. Secord's role in the mission was to then take the missiles to Tehran. CIA officials, most notably Duane Clarridge, worked around the clock to secure a better way of delivery. In late November 1985, a CIA 707 was secured from Frankfurt to deliver eighteen HAWK missiles to the Iranians on Monday, November 25. The plan required proof of presidential backing, which, due to the timing of the events, required a retroactive signature authorizing, "the provision of assistance by the Central Intelligence Agency to private parties in their attempt to obtain the release of Americans held hostage in the Middle East."[40] The document was signed by Reagan on December 5, 1985.

The United States was convicted of violating international law by the International Court of Justice in the 1986 case of Nicaragua v. United States. The US had been caught illegal funding the Contras, contributing to Nicaraguan Contras, supporting a campaign of international force, or "state-sponsored international terrorism."[41] The US ignored the ruling and refused to participate or pay the reparations that had been ordered by the court.[42]

Intelligence Analysis

The Islamic Republic of Iran, or more commonly known by its shorthand name Iran, was described as a problem area in the February 2005 report by

nuclear weapons. This is unsurprising given the political instability that has gripped the nation since the US and British intervention in 1953, and the shaky economic conditions that have gripped the nation for decades. Iran's economy is almost completely dependent on foreign oil exports, and its government is racked with blatant and open corruption.[44]

"Previous comments by Iranian officials, including Iran's

dual-use
nature of the technology that could also be used to achieve a nuclear weapon.

"In parallel, Iran continues its pursuit of long-range ballistic missiles, such as an improved version of its 1,300 km range Shahab-3 medium-range ballistic missile (MRBM), to add to the hundreds of short-range

SCUD
missiles it already has.

"Even since 9/11, Tehran continues to support terrorist groups in the region, such as

Hizballah
, and could encourage increased attacks in Israel and the Palestinian Territories to derail progress toward peace. Iran reportedly is supporting some anti-Coalition activities in Iraq and seeking to influence the future character of the Iraqi state. Iran continues to retain in secret important members of Al-Qai'ida-the Management Council—causing further uncertainty about Iran's commitment to bring them to justice.

"Conservatives are likely to consolidate their power in Iran's June 2005 presidential elections, further marginalizing the reform movement last year."

Alleged support for terrorist groups

During 2007–2008, there were allegations that the CIA was supporting the Sunni terrorist group Jundallah, but these claims were debunked by a subsequent investigation showing that the CIA "had barred even the most incidental contact with Jundallah." The rumors originated in an Israeli Mossad "false flag" operation; Mossad agents posing as CIA officers met with and recruited members of Jundullah in cities such as London to carry out attacks against Iran. President George W. Bush "went absolutely ballistic" when he learned of Israel's actions, but the situation was not resolved until President Barack Obama's administration "drastically scaled back joint U.S.-Israel intelligence programs targeting Iran" and ultimately designated Jundallah a terrorist organization in November 2010.[45] Although the CIA cut all ties with Jundallah after the 2007 Zahedan bombings, the Federal Bureau of Investigation (FBI) and United States Department of Defense continued to gather intelligence on Jundallah through assets cultivated by "FBI counterterrorism task force officer" Thomas McHale; the CIA co-authorized a 2008 trip McHale made to meet his informants in Afghanistan. According to The New York Times: "Current and former officials say the American government never directed or approved any Jundallah operations. And they say there was never a case when the United States was told the timing and target of a terrorist attack yet took no action to prevent it."[46]

Operation Merlin

Operation Merlin was a United States covert operation under the Clinton Administration to provide Iran with a flawed design for a component of a nuclear weapon ostensibly in order to delay the alleged Iranian nuclear weapons program or to frame Iran.[47]

In his book State of War, author and intelligence correspondent for The New York Times James Risen relates that the CIA chose a defected Russian nuclear scientist to provide deliberately flawed nuclear warhead blueprints to Iranian officials in February 2000.[48] Risen wrote in his book that President Clinton had approved the operation and that the Bush administration later endorsed the plan.[48][49] Earlier publication of details on Operation Merlin by the New York Times in 2003 was prevented by the intervention of National Security Advisor Condoleezza Rice with the NYT's Executive Editor Howell Raines.[50]

Operation Merlin backfired when the CIA's Russian contact/messenger noticed flaws in the schematics and told the Iranian nuclear scientists.

A. Q. Khan.[51]

Sabotage of Iran's nuclear program

Operation Olympic Games

Operation Olympic Games was a covert and still unacknowledged campaign of sabotage by means of cyber disruption, directed at Iranian nuclear facilities by the United States and likely Israel. As reported, it is one of the first known uses of offensive cyber weapons.[52] Starting under the administration of George W. Bush in 2006, the Olympic Games were accelerated under President Obama, who heeded Bush's advice to continue cyber attacks on the Iranian nuclear facility at Natanz.[52] Bush believed that the strategy was the only way to prevent an Israeli conventional strike on Iranian nuclear facilities.[52]

During Bush's second term, General

dissuade the Israelis from carrying out their own preemptive strike against Iranian nuclear facilities."[52] To prevent a conventional strike, Israel had to be deeply involved in Operation Olympic Games. The computer virus created by the two countries became known as "the bug," and Stuxnet
by the IT community once it became public. The malicious software temporarily halted approximately 1,000 of the 5,000 centrifuges from spinning at Natanz.

A programming error in "the bug" caused it to spread to computers outside of

Symantec and Kaspersky Lab have since examined Stuxnet
. It is unclear whether the Americans or Israelis introduced the programming error.

According to the

Atlantic Monthly, Operation Olympic Games is "probably the most significant covert manipulation of the electromagnetic spectrum since World War II.[53] The New Yorker claims Operation Olympic Games is "the first formal offensive act of pure cyber sabotage by the United States against another country if you do not count electronic penetrations that have preceded conventional military attacks, such as that of Iraq's military computers before the invasion of 2003."[54]

The Washington Post reported that Flame malware was also part of the Olympic Games.[55]

Leak investigation In June 2013, it was reported that Cartwright was the target of a year-long investigation by the US Department of Justice into the leak of classified information about the operation to the US media.[56] In March 2015, it was reported that the investigation had stalled amid concerns that necessary evidence for prosecution was too sensitive to reveal in court.[57]

Stuxnet

Iran’s nuclear program with what would seem like a long series of unfortunate accidents.[60]

Stuxnet is typically introduced to the target environment via an infected USB flash drive. The worm then propagates across the network, scanning for Siemens Step7 software on computers controlling a PLC. In the absence of either criterion, Stuxnet becomes dormant inside the computer. If both conditions are fulfilled, Stuxnet introduces the infected rootkit onto the PLC and Step7 software, modifying the codes and giving unexpected commands to the PLC while returning a loop of normal operations system values feedback to the users.[61][62]

The worm initially spreads indiscriminately but includes a highly specialized malware payload that is designed to target only Siemens supervisory control and data acquisition (SCADA) systems that are configured to control and monitor specific industrial processes.[63][64] Stuxnet infects PLCs by subverting the Step-7 software application that is used to reprogram these devices.[65][66]

Different variants of Stuxnet targeted five Iranian organizations,[67] with the probable target widely suspected to be uranium enrichment infrastructure in Iran;[66][68][69] Symantec noted in August 2010 that 60% of the infected computers worldwide were in Iran.[70] Siemens stated that the worm has not caused any damage to its customers,[71] but the Iran nuclear program, which uses embargoed Siemens equipment procured secretly, has been damaged by Stuxnet.[72][73] Kaspersky Lab concluded that the sophisticated attack could only have been conducted "with nation-state support".[74] This was further supported by the F-Secure's chief researcher Mikko Hyppönen who commented in a Stuxnet FAQ, "That's what it would look like, yes".[75]

On 1 June 2012, an article in The New York Times said that Stuxnet is part of a US and Israeli intelligence operation called "Operation Olympic Games", started under President George W. Bush and expanded under President Barack Obama.[76]

On 24 July 2012, an article by Chris Matyszczyk from CNET[77] reported how the Atomic Energy Organization of Iran e-mailed F-Secure's chief research officer Mikko Hyppönen to report a new instance of malware.

On 25 December 2012, an Iranian semi-official news agency announced there was a cyberattack by Stuxnet, this time on the industries in the southern area of the country. The virus targeted a power plant and some other industries in Hormozgan province in recent months.[78]

A study of the spread of Stuxnet by

Symantec showed that the main affected countries in the early days of the infection were Iran, Indonesia and India:[79]

Country Share of infected computers
Iran 58.85%
Indonesia 18.22%
India 8.31%
Azerbaijan 2.57%
United States 1.56%
Pakistan 1.28%
Other countries 9.2%

Iran was reported to have "beefed up" its cyber-war capabilities following the Stuxnet attack and has been suspected of retaliatory attacks against US banks.[80]

In a March 2012 interview with CBS News' "60 Minutes", retired USAF General

Department of Homeland Security noted that the Stuxnet source code could now be downloaded online and modified to be directed at new target systems. Speaking of the Stuxnet creators, he said, "They opened the box. They demonstrated the capability... It's not something that can be put back."[81] A Wired magazine article about US General Keith B. Alexander stated: "And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s."[82]

Duqu

On 1 September 2011, a new worm was found, thought to be related to Stuxnet. The Laboratory of Cryptography and System Security (CrySyS) of the Budapest University of Technology and Economics analyzed the malware, naming the threat "Duqu".[83][84] Symantec, based on this report, continued the analysis of the threat, calling it "nearly identical to Stuxnet, but with a completely different purpose", and published a detailed technical paper.[85] The main component used in Duqu is designed to capture information[86] such as keystrokes and system information. The exfiltrated data may be used to enable a future Stuxnet-like attack. On 28 December 2011, Kaspersky Lab's director of global research and analysis spoke to Reuters about recent research results showing that the platforms Stuxnet and Duqu both originated in 2007, and are being referred to as Tilded due to the ~d at the beginning of the file names. Also uncovered in this research was the possibility of three more variants based on the Tilded platform.[87]

Flam

In May 2012, the new malware "Flame" was found, thought to be related to Stuxnet.[88] Researchers named the program "Flame" after the name of one of its modules.[88] After analyzing the code of Flame, Kaspersky Lab said that there is a strong relationship between Flame and Stuxnet. An early version of Stuxnet contained code to propagate infections via USB drives that are nearly identical to a Flame module that exploits the same vulnerability.[89]

Stars

The Stars virus is a computer virus that infects computers running Microsoft Windows. It was named and discovered by Iranian authorities in April 2011. Iran claimed it was used as a tool to commit espionage.[90][91] Western researchers came to believe it is probably the same thing as the Duqu virus, part of the Stuxnet attack on Iran.

Abandoned spies

In September 2022, Reuters reported that the United States had employed websites disguised as fan pages focused on subjects such as Iranian soccer (Iraniangoals.com) or Johnny Carson to communicate with spies.[92] These sites used fake search bars, which upon the entry of a password, would convert to a page upon which the spy could communicate with the CIA.[92] These sites were poorly built, and their secretive functions were not well-disguised.[92] Reuters reported that this led to the imprisonment of spies such as Gholamreza Hosseini, an engineer.[92] Hosseini was jailed for almost a decade, and did not hear from the CIA after release.[92]

See also

References

  1. ^ a b c Operation Ajax | TAKEN HOSTAGE | AMERICAN EXPERIENCE | PBS, retrieved 2024-01-20
  2. ^ "Operation Ajax | TAKEN HOSTAGE | AMERICAN EXPERIENCE | PBS". YouTube. Retrieved 2024-01-20.
  3. ^ "CIA Confirms Role in 1953 Iran Coup". nsarchive2.gwu.edu. Retrieved 2024-01-20.
  4. ^ a b c Wilber, Donald N.; Emmanuel Andrew Maldonado (April 16, 2000). Overthrow of Premier Mossadeq of Iran (PDF). {{cite book}}: |work= ignored (help)
  5. ^ Johnson, Anthony. "Operation Ajax: Iran and the CIA Coup in 1953 Pt. 1/2". Youtube. Retrieved 2016-06-17.
  6. ^ a b PDF
  7. ^ "Anti-Tudeh Activities of Zahedi Government" (PDF). Retrieved 17 June 2016.
  8. ^ CIA. "CAMPAIGN TO INSTALL PRO-WESTERN GOVERNMENT IN IRAN" (PDF). Retrieved 17 June 2016.
  9. ^ a b c d e Wilber, Dr. Donald (March 1954). "CIA, Clandestine Services History, Overthrow of Premier Mossadeq of Iran: November 1952-August 1953" (PDF). CIA Records – via The National Security Archive.
  10. ^ "Summary" (PDF). nsarchive.gwu.edu. Retrieved 17 June 2016.
  11. ^ Summary
  12. ^ Johnson, Anthony. "Operation Ajax: Iran and the CIA Coup in 1953". YouTube. Retrieved 17 June 2016.
  13. ^ 20communicators
  14. ^ "CIA Propaganda in Iran - Mossadeq's Spy Service".
  15. .
  16. ^ "Campaign to Install Pro-Western Government In Iran" (PDF). National Security Archive. 1954. Archived from the original (PDF) on May 4, 2023. Retrieved January 19, 2024.
  17. ^ History of U.S. Intervention in Iran - 1953 Until Present, retrieved 2024-01-20
  18. ^ Roosevelt, Kermit. "Memo" (PDF).
  19. ^ History of U.S. Intervention in Iran - 1953 Until Present, retrieved 2024-01-20
  20. ^ "Exchange of Messages Between the President and Prime Minister Mossadegh on the Oil Situation and the Problem of Aid to Iran July 9, 1953". Archived from the original on November 14, 2021. Retrieved June 17, 2016.
  21. ^ http://nsarchive.gwu.edu/NSAEBB/NSAEBB435/docs/Doc%205%20-%201953-07-14%20Re%20impact%20Eisenhower%20letter.pdf [bare URL PDF]
  22. ^ a b Capuchin (21 September 2008). "U.S. and Them: Operation Ajax - Iran and the CIA coup (2/2)". Retrieved 18 September 2016 – via YouTube.
  23. ^ "Summary" (PDF).
  24. ^ a b c U.S. and Them: Operation Ajax - Iran and the CIA coup (2/2), retrieved 2024-01-19
  25. ^ "Prepared statement for after coup" (PDF). US Government.
  26. ^ a b "History of U.S. Intervention in Iran - 1953 Until Present". Youtube. Retrieved 17 June 2016.
  27. ^ Johnson, Anthony. "U.S. and Them: Operation Ajax - Iran and the CIA coup". Youtube. Retrieved 17 June 2016.
  28. ^ The Crisis of Secular Politics and the Rise of Political Islam in Iran by Ali Mirsepassi-Ashtiani Social Text No. 38 (Spring, 1994), pp. 51-84 Published by: Duke University Press
  29. ^ "Religion and Politics in Iran". Archived from the original on 2021-11-14. Retrieved 2016-06-17.
  30. ^ a b c "CIA Confirms Role in 1953 Iran Coup". Retrieved 18 September 2016.
  31. ^ Ghazvinian, J. H. (2021). The Final Emperor. In America and Iran: A history, 1720 to the present. essay, Vintage Books, a division of Penguin Random House LLC. p. 258.
  32. ^ a b "Project Ibex and Project Dark Gene". www.spyflight.co.uk. Retrieved 2016-06-17.
  33. ^ "The Leadership of Iran About the External Security of the Country" (PDF). nsarchive. Archived from the original (PDF) on November 14, 2021. Retrieved June 6, 2016.
  34. ^ a b c "Iran: The Tudeh Party Since the Revolution--An Intelligence Assessment" (PDF). CIA.gov. January 9, 1981. Archived (PDF) from the original on 20 January 2024. Retrieved 20 January 2024.
  35. ^ a b Beinin, Joel & Joe Stork (1997). "On the Modernity, Historical Specificity, and International Context of Political Islam". In Joel Beinin & Joe Stork (Eds.), Political Islam: Essays from the Middle East Report. Berkeley: University of California Press. p. 11. ISBN 978-0-520-20448-5.
  36. ISBN 9780553269680. In 1983, the U.S. helped bring to the attention of Tehran the threat inherent in the extensive infiltration of the government by the communist Tudeh Party and Soviet or pro-Soviet cadres in the country. Using this information, the Khomeini government took measures, including mass executions, that virtually eliminated the pro-Soviet infrastructure in Iran. Available online here.
  37. Walsh, Lawrence (1993-08-04). "Vol. I: Investigations and prosecutions". Final report of the independent counsel for Iran/Contra matters. Independent Counsel appointed by the United States Department of Justice
    .
  38. ^ History of U.S. Intervention in Iran - 1953 Until Present, retrieved 2024-01-21
  39. ^ Woodward, Bob (1987). VEIL: The Secret Wars of the CIA 1981-1987. New York: Simon and Schuster.
  40. ^ Weiner, Tim (2008). Legacy of Ashes: The History of the CIA. New York: Anchor Books. pages 466-467.
  41. ^ History of U.S. Intervention in Iran - 1953 Until Present, retrieved 2024-01-21
  42. ^ "International Court of Justice". Archived from the original on 2015-03-01. Retrieved 2016-06-17.
  43. ^ Goss, Porter (16 February 2005). "Global Intelligence Challenges 2005". Archived from the original on 2 December 2008. Retrieved 28 April 2008.
  44. ^ "Iran". The World Fact Book. US State Department. Archived from the original on 30 May 2016. Retrieved 17 June 2016.
  45. ^ Perry, Mark (2012-01-13). "False Flag". Foreign Policy. Retrieved 2016-10-16.
  46. ^ Risen, James; Apuzzo, Matt (2014-11-08). "Getting Close to Terror, but Not to Stop It". The New York Times. Retrieved 2016-10-16.
  47. ^ "USA v. Sterling 10 CIA Exhibits on Merlin Ruse" (PDF). Central Intelligence Agency. 2015-01-14. Retrieved 2015-01-17.
  48. ^ .
  49. ^ Borger, Julian (2006-01-05). "US blunder aided Iran's atomic aims, book claims". London: Guardian Unlimited. Archived from the original on 2012-10-25. Retrieved 2010-05-20.
  50. ^ Harlow, William R. (2015-01-16). "USA v. Sterling Exhibits 105-108 Risen-CIA Logs" (PDF). Central Intelligence Agency. Retrieved 2015-01-17.
  51. ^ a b Risen, James (2006-01-05). "George Bush insists that Iran must not be allowed to develop nuclear weapons. So why, six years ago, did the CIA give the Iranians blueprints to build a bomb?". London: Guardian Unlimited. Archived from the original on 2014-04-01. Retrieved 2010-05-20.
  52. ^ a b c d e f g Sanger, David (1 June 2012). "Obama Order Sped Up Wave of Cyberattacks Against Iran". The New York Times. Retrieved 19 October 2012. President Barack Obama “secretly ordered increasingly sophisticated attacks on the computer systems that run Iran's main nuclear enrichment facilities, significantly expanding America's first sustained use of cyber weapons”
  53. ^ Ambinder, Marc (5 June 2012). "Did America's Cyber Attack on Iran Make Us More Vulnerable". The Atlantic. Retrieved 19 October 2012.
  54. ^ Coll, Steve (7 June 2012). "The Rewards (and Risks) of Cyber War". The New Yorker. Retrieved 19 October 2012.
  55. ^ Nakashima, Ellen (June 19, 2012). "U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say". The Washington Post. Retrieved June 20, 2012.
  56. ^ Pete Yost (June 28, 2013). "Reports: Retired general target of leaks probe". Associated Press. Archived from the original on February 16, 2015. Retrieved June 28, 2013.
  57. ^ Ellen Nakashima and Adam Goldman (March 10, 2015). "Leak investigation stalls amid fears of confirming U.S.-Israel operation". Associated Press. Retrieved April 21, 2016.
  58. ^ "Confirmed: US and Israel created Stuxnet, lost control of it". Ars Technica. June 2012.
  59. ^ Razvan, Bogdan. "Win32.Worm.Stuxnet.A". Retrieved 28 March 2014.
  60. ^ Ellen Nakashima (2 June 2012). "Stuxnet was work of U.S. and Israeli experts, officials say". The Washington Post.
  61. ^ "A Declaration of Cyber-War". Vanity Fair. April 2011.
  62. ^ "Exploring Stuxnet's PLC Infection Process". Symantec. 23 Jan 2014.
  63. ^ Nicolas Falliere (6 August 2010). "Stuxnet Introduces the First Known Rootkit for Industrial Control Systems". Symantec. Archived from the original on August 20, 2010.
  64. ^ "Iran's Nuclear Agency Trying to Stop Computer Worm". Tehran. Associated Press. 25 September 2010. Archived from the original on 25 September 2010. Retrieved 25 September 2010.
  65. ^ Gregg Keizer (16 September 2010). "Is Stuxnet the 'best' malware ever?". InfoWorld. Retrieved 16 September 2010.
  66. ^ a b Steven Cherry; with Ralph Langner (13 October 2010). "How Stuxnet Is Rewriting the Cyberterrorism Playbook". IEEE Spectrum.
  67. ^ "Stuxnet Virus Targets and Spread Revealed". BBC News. 15 February 2011. Retrieved 17 February 2011.
  68. ^ "Iran Country Profile". BBC News. 16 August 2011. Retrieved 8 August 2012.
  69. ^ Beaumont, Claudine (23 September 2010). "Stuxnet virus: worm 'could be aimed at high-profile Iranian targets'". London: The Daily Telegraph. Retrieved 28 September 2010.
  70. ^ MacLean, William (24 September 2010). "UPDATE 2-Cyber attack appears to target Iran-tech firms". Reuters.
  71. ^ ComputerWorld (14 September 2010). "Siemens: Stuxnet worm hit industrial systems". Computerworld. Retrieved 3 October 2010.
  72. ^ "Iran Confirms Stuxnet Worm Halted Centrifuges". CBS News. 29 November 2010.
  73. ^ Ethan Bronner; William J. Broad (29 September 2010). "In a Computer Worm, a Possible Biblical Clue". The New York Times. Retrieved 2 October 2010."Software smart bomb fired at Iranian nuclear plant: Experts". Economictimes.indiatimes.com. 24 September 2010. Retrieved 28 September 2010.
  74. ^ "Kaspersky Lab provides its insights on Stuxnet worm". Kaspersky. Russia. 24 September 2010.
  75. ^ "Stuxnet Questions and Answers – F-Secure Weblog". F-Secure. Finland. 1 October 2010.
  76. ^ Sanger, David E. (1 June 2012). "Obama Order Sped Up Wave of Cyberattacks Against Iran". The New York Times. Retrieved 1 June 2012.
  77. ^ Matyszczyk, Chris (24 July 2012). "Thunderstruck! A tale of malware, AC/DC, and Iran's nukes". CNET. Retrieved 8 July 2013.
  78. ^ "Iran 'fends off new Stuxnet cyber attack'". BBC News. 25 December 2012. Retrieved 28 May 2015.
  79. Symantec. 17 September 2010. Archived from the original
    on August 21, 2010. Retrieved 2 March 2011.
  80. ^ "Iran denies hacking into American banks Archived 2015-09-24 at the Wayback Machine" Reuters, 23 September 2012
  81. ^ Kroft, Steve (4 March 2012). "Stuxnet: Computer worm opens new era of warfare". 60 Minutes (CBS News). Retrieved 9 March 2012.
  82. ^ James Balford (12 June 2013). "THE SECRET WAR". Wired. Retrieved 2 June 2014.
  83. ^ "Duqu: A Stuxnet-like malware found in the wild, technical report" (PDF). Laboratory of Cryptography of Systems Security (CrySyS). 14 October 2011.
  84. ^ "Statement on Duqu's initial analysis". Laboratory of Cryptography of Systems Security (CrySyS). 21 October 2011. Archived from the original on 4 October 2012. Retrieved 25 October 2011.
  85. Symantec. 20 October 2011. Archived from the original
    (PDF) on December 13, 2011. Retrieved 25 October 2011.
  86. ^ Steven Cherry; with Larry Constantine (14 December 2011). "Sons of Stuxnet". IEEE Spectrum.
  87. ^ Jim Finkle (28 December 2011). "Stuxnet weapon has at least 4 cousins: researchers". Reuters. Archived from the original on 24 September 2015. Retrieved 28 June 2016.
  88. ^ a b Zetter, Kim (28 May 2012). "Meet 'Flame,' The Massive Spy Malware Infiltrating Iranian Computers". Wired. Archived from the original on 30 May 2012. Retrieved 29 May 2012.
  89. ^ "Resource 207: Kaspersky Lab Research Proves that Stuxnet and Flame Developers are Connected". Kaspersky Lab. 11 June 2012.
  90. ^ Military.com. "Military Daily News - Military.com". Retrieved 18 September 2016.
  91. ^ Iran target of new cyber attack
  92. ^ a b c d e Schectman, Joel; Sharafedin, Bozorgmehr (29 September 2022). "How the CIA failed Iranian spies in its secret war with Tehran". Reuters. Retrieved 30 September 2022.