CIA plan to destroy Russia. US Central Intelligence Agency

The CIA has made declassified documents freely available on its website, including reports on UFO and telepathy research. The results obtained under the Stargate program, within the framework of which the CIA “tested” Uri Geller, the famous British psychic who became famous for publicly bending teaspoons and even tablespoons with his gaze and stopping the hands of the Big Ben clock, became public knowledge. " in London, made stopped alarm clocks go on all over the world.

From declassified documents it follows: Uri Geller demonstrated his abilities to CIA scientists who experimented with him at the Stanford Research Institute in August 1973. The purpose of the experiments was to determine whether the subject actually had telepathic abilities, and whether these abilities could be used for intelligence purposes.

To begin, the scientists randomly selected a word from the dictionary. The choice fell on the word “firecracker”, which they drew. Geller, sitting in another room, received this information telepathically. And he said that he “sees” something cylindrical making noise. But in the end, I drew not a firecracker, but a drum.


The first picture mentally sent to Geller from the CIA


This is what Geller accepted and drew

CIA guy drew bunch of grapes. The “telepath” stated that he “sees” many, many round drops. And I drew a very similar bunch - both the intended and the reproduced ones had the same number of berries. There were 24 of them.


Below - "transfer" from the CIA, above - "reception" by Geller

The experiments continued in the same spirit for a week. Uri Geller drew many pictures sent to him in his mind. And I reproduced most of them correctly. At least plot-wise. He depicted a dove and a kite in a very similar way. His camel was a bit of a letdown - instead of a two-humped creature, Geller drew a horse.

CIA scientists suggested that the subject does not mechanically copy the lines of the picture “sent” to him, but reproduces it after processing the information received in his brain.


Picture sent from the CIA


Geller's drawing

The CIA concluded: telepathy is a real phenomenon. Nevertheless, the Stargate program was closed. The experiments ended in 1998. According to the official version, the abilities of psychics disappointed the intelligence officers.

After all, it was assumed that telepathy could be used for the hidden transmission of information without any technical means- just from one person to another. But the accuracy of the “reception” - especially from long distances - turned out to be low. The same Geller was unable to draw a suspension bridge, the image of which was “transferred” to him from another city. Although he correctly reproduced the outlines of one of the elements - a curved rope.


Bridge "transferred" from the CIA


This is how the image of the bridge reached Geller.

Another attempt - to portray the devil - almost failed. The result was a set of different items. But among them there was a trident, which was in the original picture.


The devil mentally “sent” to Geller

Geller has only a trident left from the devil

How can one not agree with the CIA and not believe that telepathy still exists. And Uri Geller, who has demonstrated very convincing results, owns it to some extent.

A page from a previously secret CIA report on the results of experiments with Uri Geller

Journalists contacted Uri Geller, who now lives in Israel. And he said that the CIA had declassified only a small part of the documents that related to his work for the secret services.

I did a lot of things for the CIA,” Geller said. - One day they asked me to go to the Russian embassy in Mexico City and erase - remotely - floppy disks obtained by Russian agents.

“I was present not far from the places where politicians were holding important negotiations on nuclear deterrence,” the “telepath” confesses. - And he inspired: sign, sign!

According to Geller, one of the foreign intelligence agencies asked him to mentally stop the heart of a pig. Which is what he did, for some reason assuming that the far-reaching goal of this experiment was to remotely kill Andropov, who at that time headed the KGB.

And during the Cold War, it was “tested” in a nuclear laboratory to see if it could influence the rate of nuclear reactions.

Allegedly, the Americans had the idea of ​​telepathically influencing Soviet atomic bombs in order to explode them remotely.

Young Uri Geller: the photo was taken exactly the year he joined the CIA

Geller did not say how such strange experiments ended.

But he said that he was not at all embarrassed, to put it mildly, by the cool attitude of the skeptics - especially when he bent spoons. They say that the image of an eccentric magician served as an excellent cover for his main activity - espionage: both for the CIA and the Mossad.

Translation from English.

Secret

To US President Barack Obama

The White House

1600 Pennsylvania Avenue NW

Washington, DC 20500

Copies:

US Secretary of Defense Chuck Hagel,

1400 Defense Pentagon

Washington, DC 20301-1400

To CIA Director John Brennan

Central Intelligence Agency

Washington, D.C. 20505

Dear Mr. President, I am sending you a document developed by me strategic plan war with Russia in addition to materials previously provided to the CIA. I want to emphasize that I still do not intend to take part in CIA operations to spy on US senators and congressmen and political assassinations.

The strategic task of the United States is to destroy Russia as the main geopolitical enemy through its dismemberment, the seizure of all resource zones and the transition to governing the country through a government of liberal puppets. No fronts, no strategic operations and bombings. The main instrument of aggression is a coordinated lightning attack on Russia by NATO troops, primarily special forces and the “fifth column”. Russians must quickly find themselves in a new country - the Union of Independent States of Russia. The passive majority will remain silent, just as during the collapse of the USSR. Iraq, Libya and Syria are not only a redivision of the world and a war for oil, but also testing grounds for a war with Russia.

Phase I of the war (information)

1. Discrediting President V. Putin as a fascist dictator.

2. Encouraging corruption and direct purchase of the political elite in Moscow and the regions.

3. Creation of the image of Russia as a fascist state. The fascist state of Russia is a threat not only to Europe, but to the entire world community.

The artificial fascistization of Russia's image in the eyes of the West should be carried out by liberal politicians, writers, and public figures through compromising the role of the Soviet Army and people in the main historical event of the 20th century - the victory in World War II. The war was a clash between two fascist dictators - Stalin and Hitler, and in today's Russia, President Putin has revived the dictatorship, the state fully supports Nazism, the superiority of the Russian nation, and declares its role in world politics as one of the leading nuclear powers. Russia's national security strategy allows for the possibility of launching a preventive nuclear strike, which poses a mortal danger to world civilization. The people of Russia need to bring democracy.

Source: US State Department, CIA

II phase of the war (economic)

A complete economic and political blockade of Russia, provoking a sharp drop in world oil and gas prices in order to cause a crisis in the government and economy of the Russian Federation.

Source: US State Department, CIA, governments of NATO member countries, Saudi Arabia and other “oil” and “gas” countries.

Answer: Secretary of State D. Kerry, CIA Director D. Brennan

III phase of war (special and military operations)

1. Ukraine’s entry into NATO, the deployment of American bases there. Even if Ukraine does not become a NATO member, it must make its territory and airfields available to NATO.

2. Complete reorientation of the vector of radical Islam towards Russia.

3. Anti-fascist (not “color”) revolution, which will be supported by the world community.

4. Development of a revolution into a full-scale one civil war. A sharp surge in provoked interethnic clashes.

5. NATO's lightning-fast military operation after communications in the army are disabled, with a peacekeeping function - to stop the civil war. In fact, in Moscow and St. Petersburg it will be incited by special forces. Disorganization of the system of state and military administration, a powerful attack on all types of electronic communications.

On day X, the army is paralyzed through purchased generals in the Ministry of Defense and the General Staff; the generals must directly declare their refusal to obey the orders of the Commander-in-Chief, who has become a fascist dictator, and their intention to maintain neutrality. This has already been tested in Ukraine - the special services and the army did not interfere in the “orange” revolution of 2004. There will be no mobilization. President Putin's order to launch a nuclear strike on the United States will be sabotaged. Also, through purchased leaders in the Ministry of Defense and intelligence services, Russia’s “asymmetric response” will be blocked - terrorist attacks using miniature nuclear charges on US territory and sabotage by special forces.

6. On the same day, all major Western media report the agony of the bloody regime of dictator Putin. On the same day, in Moscow and St. Petersburg, groups of radical youth should storm government buildings with human casualties.

CIA, CIA(English) Central Intelligence Agency, CIA) is an agency of the US Federal Government whose main function is to collect and analyze information about the activities of foreign organizations and citizens. The main organ of US foreign intelligence and counterintelligence. The activities of the CIA are associated with the possibility of its official non-recognition.

The CIA headquarters, called Langley, is located near McLean, Fairfax County, Virginia, located near Washington.

The CIA is part of the United States Intelligence Community, which is headed by the Director of National Intelligence.

Functions

The responsibilities of the Director of the CIA include:

  • Gathering intelligence information through human networks and other appropriate means. However, the CIA director does not have police, law enforcement, or subpoena powers, and does not perform internal security functions;
  • Collate and evaluate received national security-related intelligence and provide intelligence information to appropriate authorities;
  • General direction and coordination of national intelligence collection outside the United States through Intelligence Community intelligence sources authorized to collect information, in coordination with other departments, agencies, and instrumentalities of the United States Government. At the same time, it is necessary to ensure the most effective use resources, as well as taking into account potential threats to and all persons involved in intelligence collection;
  • Perform other similar functions and responsibilities related to national security intelligence activities as directed by the President or the Director of National Intelligence.

Unlike similar structures in many other countries, the CIA is officially a civilian organization. In this connection, agents of this organization do not have military ranks, and intelligence collection is carried out by personnel who have received tactical training.

Operationally and tactically, the most prepared unit is the Special Activities Division. Consisting primarily of experienced veterans of such special forces of the US armed forces as Delta Force, Navy SEAL, etc.

Structure

Management and Directorates

The structure of the CIA as of May 2009 looked like this:

  • The Intelligence Directorate processes and analyzes received intelligence information. The head is the Director of Intelligence.
  • The National Secret Service (formerly the Directorate of Operations) solves problems related to the collection of information by human intelligence, organizes and conducts covert operations. The head is the director of the national secret service.
  • The Scientific and Technical Directorate conducts research and development of technical means of collecting information.
  • Supply Directorate. Head - Purchasing Director.
  • The Center for Intelligence Studies maintains and studies historical CIA materials. Head - Director of the Center for Intelligence Studies.
  • Office of the General Counsel. The head is the chief legal adviser. Employees of this department monitor compliance by employees of the Department with the Constitution and laws, current rules and instructions.
  • Office of the Inspector General. The head is the Inspector General. Appointed by the President with confirmation by the Senate. Independent from other departments and offices, reporting directly to the Director of the CIA. Conducts inspections, investigations, and audits at CIA headquarters, in the field, and in the agency's overseas offices. Every six months he prepares a report for the CIA director, which he submits to the Intelligence Committee of the US Congress.
  • Public Relations Office. Head - Director of Public Relations.
  • The Office of Military Affairs provides intelligence support to the US military.

Structure of the CIA Cyber ​​Intelligence Center

In March 2017, the Council on Foreign and Defense Policy published a report prepared by PIR Center consultant Oleg Demidov and dedicated to the largest CIA data leak. An IT expert examined the data array published on the website WikiLeaks and found out how the cyber unit of the intelligence service works and what it does.

According to data obtained by WikiLeaks, the CIA's work to develop its own cyber capabilities is concentrated within one of five directorates - the Directorate of Digital Innovation. Its key structure is the Center of Cyber ​​Intelligence, whose competence included the development of the department’s published “knowledge base” on cyber weapons and the direct development of the latter.

The activities of the Cyber ​​Intelligence Center are divided into three main areas: Computer Operations Group, Physical Access Group and Engineering Development Group. It was the latter who was involved in development, testing and maintenance software contained in the leak.

Specific areas of software development were distributed between two subgroups and their nine departments within the Engineering Development Group. Among them is the Mobile Devices Branch; used vulnerabilities for smartphones), department of automated software implants (Automated Implant Branch; exploitation of a vulnerability in a PC), department of network devices (Network Devices Branch; responsible for creating network attacks on web servers). Projects of the Embedded Devices Branch included the development of means for exploiting vulnerabilities in the software of various smart devices, including televisions.

In 2013, the amount of funding for the Cyber ​​Intelligence Center was $4.8 billion, and the number of its employees was 21 thousand people. Thus, the CIA can be considered the operator of the world's largest program for developing a state cyber arsenal, Demidov notes.

The WikiLeaks report also notes that the intelligence structure USA There is a division dedicated to developing malicious software exclusively for Apple products. WikiLeaks explains that the share of phones running on iOS, is not so large on the global market - only 14.5% versus 85% of the share of phones on Android. However, the devices iPhone very popular among politicians, diplomats and business representatives.

It also follows from the released documents that the American consulate in Frankfurt am Main is a CIA “hacker center” overseeing the regions of Europe, the Middle East and Africa.

Story

2018

Mike Pompeo appointed Secretary of State, Gina Haspel heads CIA

2017

Vault 8 leak

Even if the owner of a third-party computer discovered that an implant was running on his device - malware, extracting information - thanks to Hive, the user could not connect his work with the CIA. When the computer owner checked which servers on the Internet the implant was transmitting information to, Hive masked connection Software with department servers. In essence, the tool is a hidden communication platform for CIA malware, through which it sends extracted data to the agency and receives new instructions, writes WikiLeaks.

At the same time, when the malware is authenticated in the CIA server system, digital certificates are generated that simulate the ownership of the software by real-life manufacturers. Three samples present in the source code published by WikiLeaks forge certificates from Kaspersky Lab in Moscow, purporting to be signed by a trusted Thawte Premium Server certificate in Cape Town. If a user who discovers an implant is trying to figure out where traffic is going from his network, he will think not of the CIA, but of the said software manufacturer.

The Lab responded to the WikiLeaks publication with the following comment: “We have reviewed the claims that were published on November 9 in the Vault 8 report and can confirm that the certificates imitating ours are not genuine. Kaspersky Lab keys, services and clients are safe and have not been affected.”

Server system

Hive performs a series of operations using implants running on the computer, with each operation recorded in an innocuous-looking front domain. The server on which the domain is located is rented from commercial hosting providers as a virtual private server (VPS). Its software is customized to CIA specifications. These servers provide a public façade to the CIA's server system, and then forward HTTP(S) traffic through a virtual private network ( VPN) to a hidden server called Blot.

If someone visits a cover domain, it shows the visitor completely innocent information. The only alarming difference is the infrequently used option HTTPS-server called Optional Client Authentication. Thanks to it, authentication is not required from the user viewing the domain - it is not mandatory. But the implant, having contacted the server, must pass through it so that the Blot server can detect it.

Traffic from the implants is sent to the implant operator's control gateway called Honeycomb, and all other traffic goes to the front server, which delivers innocuous content available to all users. During the implant authentication process, a digital certificate is generated, which imitates that the software belongs to real-life manufacturers.

Development of 137 AI projects

The Central Intelligence Agency can't keep up with processing a large number of data and counts on artificial intelligence(AI). US intelligence is actively working on 137 AI projects, CIA Deputy Director Dawn Meyerriecks noted in September 2017.

AI offers intelligence agencies a wide range of capabilities - from weapons for the battlefield to the ability to restore a computer system after cyber attacks. Most valuable to intelligence agencies is the ability of AI to detect significant patterns in social networks.

Intelligence has previously collected data from social media, said Joseph Gartin, head of the CIA's Kent School. The innovation lies in the volume of data processed, as well as the speed of information collection, Gartin emphasized.

In 20 years, 8 million analysts will be needed to manually analyze images from commercial satellites, said Robert Cardillo, director of the National Geospatial-Intelligence Agency. According to him, the goal is to automate 75% of assigned tasks.

Tool for outputting data via SMS

In mid-July 2017, the site Wikileaks published information about another tool for surveillance in cyberspace, developed and actively used CIA. This time we are talking about the HighRise program, which was disguised as the TideCheck application.

Documentation obtained by Wikileaks states that the tool must be downloaded, installed and activated manually; in other words, to carry out a successful attack, you must either have physical access to the device or somehow get potential victims to install the application themselves.

The second scenario is very unlikely: the user is required to open the TideCheck application, enter the password “inshallah” (“if Allah wills”) and select the Initialize option from the menu. After this, the program will automatically launch and run in the background.

This program itself does not cause any harm. Most likely, it was used by the CIA agents themselves as a gateway through which SMS-messages were redirected to CIA servers with data derived from smartphones belonging to surveillance targets (and already infected with other malware). The SMS channel was used in cases where Internet connections were unavailable.

At a minimum, a significant portion of these spyware programs are different platforms has already appeared in one way or another in Wikileaks publications as part of the Vault 7 campaign.

The latest currently known version of the HighRise program - 2.0 - was released in 2013. It only works under versions Android 4.0-4.3. Since then the developers Google significantly strengthened the security of their operating system, so that HighRise will not run on later versions.

Cybercriminals successfully write malware for new versions of Android, so it would be logical to assume that the CIA already has something similar to HighRise, but successfully functioning under later versions of the mobile OS, he believes Ksenia Shilak, company sales director SEC Consult. - In any case, the leaked tool could theoretically be adapted for Android 4.4 and later versions and used for criminal purposes.

Symantec: CIA hacking tools were used for 40 cyberattacks in 16 countries

In April 2017, the antivirus company Symantec named the approximate number of cyber attacks carried out using hacking tools used by CIA employees and which became known from the site’s materials WikiLeaks.

According to Symantec, over several years there have been at least 40 cyber attacks in 16 countries (including countries in the Middle East, Europe, Asia, Africa, and USA) were carried out using programs that were previously declassified by WikiLeaks.


Symantec did not disclose the names of programs that could be used by the CIA or others for cyberattacks.

Cyber ​​espionage in the CIA was carried out by a special group, which Symantec dubbed Longhorn. Its participants infected computer networks government bodies of different countries, the systems of telecommunications and energy enterprises, as well as aircraft manufacturing companies, were also infected. The toolkit announced by WikiLeaks was used, according to Symantec, from 2007 to 2011.

Vault 7 leak is the largest in the department's history

For example, the documents reveal details that the CIA stores information about many 0-day vulnerabilities in products Apple , Google , Microsoft and others large companies, putting the entire industry at risk.

The papers also talk about the Weeping Angel malware, created by the Embedded Devices Branch (EDB) of the CIA, with the participation of specialists from their British MI5. With its help, intelligence agencies can infect smart TVs Samsung, turning them into spy devices. And although installing Weeping Angel appears to require physical access to the device, the malware provides intelligence agencies with a variety of capabilities. Here are just a few: Weeping Angel can extract credentials and browser history, and intercept WPA and WiFi. The malware is able to inject fake certificates to facilitate man-in-the-middle attacks on the browser and gain remote access. Weeping Angel can also give the impression that the TV is turned off, when in fact it continues to work, and the built-in microphone “listens” to everything that is happening around.

The documents mention Samsung F800 TVs, and also indicate that CIA developers tested firmware versions 1111, 1112 and 1116. Most likely, Weeping Angel poses a danger to all models of the Fxxxx series.

The papers also indicate that, under the auspices of the CIA, a wide variety of mobile malware was created for iPhone And Android. Infected devices almost completely come under the control of government hackers and send data about geolocation, text and audio communications, and can also secretly activate the device’s camera and microphone.

Thus, it is reported that in 2016 there are available CIA There were 24 zero-day vulnerabilities for Android, as well as exploits for them. Moreover, the CIA finds and “works through” vulnerabilities both independently and receives from its colleagues, for example, FBI , NSA or the UK Government Communications Centre. It is zero-day vulnerabilities that help intelligence agencies bypass encryption WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman, since data interception occurs even before encryption has started.

Prime suspect

In the case of the largest data leak in CIA history, known as Vault 7, a prime suspect has emerged. As The Washington Post reported in May 2018, citing court documents, he is former CIA officer Joshua Adam Schulte.

According to the documents, classified intelligence materials describing its hacking arsenal were stolen while the suspect was still working for the CIA. “The government immediately obtained sufficient evidence to initiate an investigation against him. Several search warrants were issued to search the defendant's residence, the documents state.

Be that as it may, according to the documents, the evidence received was not enough to bring formal charges. The suspect was charged in another, unrelated case of distributing child pornography. Due to lack of evidence implicating the CIA in the leak of secret documents former employee intelligence agencies were charged with operating a server containing 54 GB of child pornography).

According to defense lawyers, Schulte did manage a public server, but had no idea that there were illegal materials on it. As a result, the accused was found not guilty.

Until 2016, Schulte worked in a group of development engineers at the CIA. Thanks to his official position, he had access to thousands of secret service documents, which were transferred to WikiLeaks.OS Windows.

Grasshopper contains a set of modules from which you can assemble a customizable implant virus. The virus behavior model is set depending on the characteristics of the victim’s computer. Before the implant is implanted, the target computer is examined to determine what version of Windows is installed on it and what security software is used. If these parameters match the virus, it is installed on the device. When installed, the implant remains invisible to such well-known anti-virus programs as MS Security Essentials,Rising, Symantec Endpoint And Kaspersky Internet Security.

One of Grasshopper's sustainability mechanisms is called Stolen Goods. According to the documentation, the basis for this mechanism was the Carberp program - malware to hack banking networks. Carberp was allegedly developed by Russian hackers, CIA documents say.

Borrowing the Carberp code was made possible due to the fact that it was posted in the public domain. The CIA claims that "most" of the code was not useful to them, but the persistence mechanism and some components of the installer were taken into service and modified for the agency's needs.

Reaction of the CIA, vendors and countries
The CIA refused to confirm the authenticity of the documents released by WikiLeaks, saying only that the agency collects information abroad in order to “protect America from terrorists, hostile countries and other adversaries.” At the same time, the department categorically rejected suspicions of spying on citizens.

Official representative Ministry of Foreign Affairs of the Russian Federation Maria Zakharova said that the actions of the CIA, if the WikiLeaks information is correct, pose a danger and could undermine trust between countries. Moscow calls on US intelligence agencies to give a full response to WikiLeaks accusations about American intelligence hackers.
The Chinese government is also concerned about leaked CIA cyber intelligence materials and calls on the United States to stop spying on other countries and cyberattacks, Chinese Foreign Ministry spokesman Geng Shuang said.
In turn, the new head of the German Foreign Ministry, Sigmar Gabriel, where, according to the WikiLeaks report, the CIA hacker center is located, said that the German authorities prefer to consider this information as rumors.
Technology companies Apple , Samsung And Microsoft responded to the publication of confidential intelligence agency documents by saying that most of the vulnerabilities identified in the report have been addressed in the latest versions of operating systems.
Developers text editor Notepad++ also reported the elimination of security holes used by the intelligence service. Along with Google Chrome, VLC Media Player, Firefox, Opera, Thunderbird, LibreOffice, Skype and other programs, this software was included in the list of vulnerable applications that the intelligence service hacked using the Fine Dining system. It seemed to the user that the agent was launching a video viewer (for example, VLC), showing slides (Prezi), playing computer game(Breakout2, 2048) or even runs an antivirus program (Kaspersky, McAfee, Sophos), in fact, while the “distracting” application is displayed on the screen, automatic infection occurs computer system, viewing it and extracting information
Reaction to the leak of secret CIA documents

According to information Agency Reuters citing unnamed employees Cisco, after this leak surfaced, company executives immediately brought in experts from their various projects to figure out how the CIA's hacking techniques worked, help Cisco customers fix their systems, and prevent criminals from using the same cyber techniques. Around the clock for several days, Cisco programmers analyzed CIA hacking tools, corrected vulnerabilities and prepared notifications for the company's customers. possible risks when operating the equipment. It is noted that more than 300 models of Cisco products were at risk of hacking.

CIA spokeswoman Heather Fritz Horniak did not comment on the Cisco case when asked by Reuters and only noted that the agency had a “goal to be innovative, advanced and at the forefront of protecting the country from foreign enemies.”

  • 47% of applications analyze and transmit location information to third parties;
  • 18% share usernames;
  • 16% forward to an email address (

Rumors about cruel experiments on its own citizens, carried out in intelligence laboratories, have been circulating in America for a long time - ever since data about the secret CIA project MK-Ultra was revealed. This became a real sensation; it turned out that throughout for long years scientists carried out prohibited research. Until now, the archives of this project are classified.

Ordinary Americans are experiencing double psychological pressure - on the one hand, there are very popular opinions that the country is practically surrounded by enemies, Islamic countries, Russia, China only dream of defeating America and depriving its population of their usual way of life. But on the other hand, there is another problem, a security threat from its own government and intelligence services, striving to take their citizens under the hood of total control. Of course, the revelations of Edward Snowden only added fuel to the fire, and even before that, the acronym NSA evoked no more pleasant associations in the average American than the KGB. But if they still somehow protect their own from foreign intelligence services, then there is simply no salvation from the latter. Wiretapping of conversations, total control carried out under the pretext of “fighting terrorism” - this is not very pleasant.

In addition, during their existence, American intelligence services have been accused more than once of conducting cruel experiments on people, which has given rise to paranoid sentiments among the masses, often of a conspiratorial nature, but no less infectious for that reason. These stories are continued in music, literature and cinema, reinforcing and spreading the fears of the population. However, Americans have many reasons to be panicky.

In 1974, the New York Times published a sensational journalistic investigation, which resulted in the exposure of one of the most sinister and mysterious projects in recent history. It was about a CIA program codenamed “MK-Ultra” and dedicated to finding means to establish complete control over the human psyche and consciousness.

This project existed from the early 50s to the end of the 60s. During this time, thousands of people passed through the hands of experimenters, some of whom suffered serious mental disorders, and many died. It was the testimony of former test subjects that formed the basis of the scandalous publication, soon after the appearance of which a special commission was created in the US Congress to investigate the activities of the CIA during the years of the program’s existence. In addition, a presidential commission headed by Nelson Rockefeller also joined the investigation.

But the government investigation was seriously complicated by the fact that the CIA had by this time destroyed a significant part of the documents that could shed light. However, most of the surviving documentary evidence has never been declassified. However, the result of the government investigation was the introduction of a legislative ban on US intelligence agencies conducting research into the human psyche without the knowledge of the government. In addition, the President of America made a personal apology to the relatives of the victims, the victims were paid monetary compensation - is it really possible to compensate with money for the destruction of a person’s psyche?

The MK-Ultra program, in a certain sense, became a continuation of the experiments of Joseph Mengele, who tried to “profitably” cut not only the flesh, but also the human psyche.

After the end of World War II, information about these experiments fell into the hands of American intelligence services and “inspired” them to create a program designed to experimentally find fail-safe ways to artificially simulate the human personality. The task was to find ways to completely suppress the human psyche, to establish absolute control over him—zombification, in a word.

They tried to achieve this by putting a person into artificial amnesia, erasing previous personal qualities and creating new ones. To do this, the experimental subject was subjected to prolonged exposure to sensory deprivation - his eyes and ears were closed, and he was placed in a chamber isolated from sounds and smells for many days. Without harming oneself, a person can only spend a couple of days in such a chamber, but as part of the MK-Ultra program, people were kept in this position for about a month, and in some cases more, in order to achieve serious changes in the psyche of the experimental subjects. Next, they began to scroll through monotonous coding commands, which, according to the researchers, should have been firmly imprinted in the minds of the victims. In addition, experiments were conducted with the impact of strong discharges on the human body electric current— looked at what consequences this had on the psyche and behavior of the subject.

But the main direction of research was testing narcotic drugs, which the intelligence services hoped to learn how to use for their own purposes.

The head of this research was Doctor of Chemical Sciences Sidney Gottlieb. First of all, he was interested in the nature of the action of drugs that “alter consciousness” - mescaline and LSD. The objective of the project was to develop a drug with which it would be possible to change not only a person’s behavior, but even his ideology. Researchers placed great hopes on LSD - this drug had just appeared in those years, and differed from all previously known hallucinogens in its unusually powerful effect on the human body. It must be said that at first this drug was actively used by scientists to study schizophrenia - it was believed that psychedelic delirium had a mechanism identical to schizophrenia. They also tried to use LSD to treat mental disorders - however, this provoked widespread use of the drug among European and American youth: in those years, “psychedelic experiences” with one’s own consciousness became fashionable.