Tag: CIA

  • How a Banana Company Overthrew a Democracy

    In 1954, the democratically elected president of Guatemala went on the radio to tell his country that the United States was overthrowing his government in the interests of a banana company. Then the signal was jammed. The president was Jacobo Árbenz. The banana company was the United Fruit Company, which at that point owned 42 percent of Guatemala’s land, monopolized its banana exports, controlled its telephone and telegraph system, and owned nearly all of its railroad track. The overthrow — Operation PBSUCCESS — was organized by the CIA, armed and funded by the Eisenhower administration, and executed by 150 to 500 CIA-trained soldiers led by a right-wing exiled colonel named Carlos Castillo Armas who crossed the border from Honduras. The invasion force was small enough that it lost its first engagements. It didn’t need to win them. CIA pilots bombed Guatemala City. A clandestine radio station called “Voice of Liberation,” operated by CIA agent Howard Hunt, broadcast fabricated reports of a massive rebel army, fake battlefield victories, and mass defections. The psychological operation worked. Árbenz resigned on June 27, 1954. Castillo Armas was installed as president. The land reforms that had triggered the entire operation were reversed. Guatemala was plunged into a civil war that lasted 36 years, killed an estimated 200,000 people, and left the country among the poorest in the Western Hemisphere — which it remains today.

    The story of how a fruit company engineered the overthrow of a government is the first lecture in the Shadowcraft course because it establishes the operating template: a corporation with economic interests uses its connections to the national security apparatus to reframe a commercial dispute as a geopolitical threat, manufactures consent through propaganda, and deploys state violence to protect private revenue streams — all while the public narrative frames the intervention as ideological rather than economic.

    The company

    The United Fruit Company was founded in 1899 and by mid-century had built an empire spanning Guatemala, Honduras, Costa Rica, Panama, Colombia, Ecuador, and Cuba. In Guatemala, United Fruit’s dominance was constructed under the 14-year dictatorship of General Jorge Ubico, who exempted the company from taxes and import duties and granted it control of land, infrastructure, and export channels. The company owned over 550,000 acres of Guatemalan land — much of it deliberately kept uncultivated, both as a hedge against banana disease and as a mechanism to prevent competitors from accessing productive territory. It discouraged the government from building highways, which would have undermined its railroad monopoly. Guatemalans called the company “El Pulpo” — the Octopus — because its tentacles reached into every sector of the economy.

    The term “banana republic” originates from this arrangement: a poor country dependent on a single export crop, governed in the economic interests of a foreign corporation rather than its own citizens.

    The reform that started the war

    Guatemala held its first genuinely democratic election in 1944 after a popular uprising ended Ubico’s dictatorship. Juan José Arévalo won the presidency with over 85 percent of the vote, introduced democratic governance, and gave workers the right to organize and strike for the first time. His successor, Jacobo Árbenz, won the 1951 election and accelerated reforms — a modest income tax, infrastructure investment, and most consequentially, a land redistribution program. Between 1952 and 1954, the Árbenz government expropriated 1.5 million acres of uncultivated land from large plantations and redistributed it to approximately 100,000 poor families.

    United Fruit’s uncultivated holdings were a primary target. Here’s where the dispute reveals its mechanism: the Guatemalan government offered to compensate United Fruit based on the value the company had declared on its own tax assessments. United Fruit demanded compensation at the land’s actual market value. The gap between these two numbers existed because United Fruit had systematically understated the value of its holdings on tax filings for years — paying less in taxes by declaring the land was worth less, then demanding full market value when the government tried to buy it. The company’s own tax fraud created the compensation dispute that it then used to justify regime change.

    The propaganda machine

    United Fruit hired Edward Bernays — the man who had invented modern public relations, the nephew of Sigmund Freud, the strategist who had once convinced American women to smoke cigarettes by calling them “Torches of Freedom” at a women’s rights march — to run a propaganda campaign framing Árbenz as a communist threat. Bernays flew American journalists to Guatemala on United Fruit’s dime, introduced them to company employees and handpicked sources, and fed them a narrative of Soviet infiltration a thousand miles south of New Orleans. The resulting media coverage in the New York Times, Time Magazine, and the Miami Herald portrayed Guatemala as a communist beachhead in the Western Hemisphere. United Fruit’s PR department produced a film called “Why the Kremlin Hates Bananas.” The entire campaign targeted American public opinion, not Guatemalan — because the audience that mattered was the one that could authorize a CIA operation.

    The campaign worked partly because the personnel connections were already in place. Secretary of State John Foster Dulles had previously served as United Fruit’s attorney through Sullivan & Cromwell. CIA Director Allen Dulles — his brother — had sat on United Fruit’s board of trustees and owned company stock. Ed Whitman, the company’s top public relations officer, was married to Ann Whitman, President Eisenhower’s private secretary. The Bernays papers — 53 boxes released by the Library of Congress after his death in 1995 — document in detail the behind-the-scenes coordination between a corporation’s PR operation and the national security apparatus of the country that would execute the coup.

    In Guatemala, there were approximately 4,000 registered communists in a country of three million. The “communist threat” was a land reform that affected one company’s unused acreage.

    The aftermath

    Castillo Armas reversed the land reforms, restored United Fruit’s holdings, and governed as a military dictator until his assassination in 1957. Guatemala descended into a civil war between government forces and leftist insurgencies that lasted from 1960 to 1996. A truth commission established under the 1996 peace accords attributed 93 percent of human rights violations during the conflict to state forces and related paramilitary groups. In the days and weeks following the 1954 coup itself, an estimated 1,000 campesinos and workers were rounded up at United Fruit’s Jocotán plantation and killed.

    United Fruit’s triumph was short-lived. The U.S. government brought an antitrust civil suit against the company the same year as the coup. By the late 1950s, its monopoly was being dismantled. Bernays lamented that United Fruit was being treated “worse than the communists.” The company eventually rebranded. It’s still selling bananas. Its name is now Chiquita.

    Why it’s Lecture 1

    The Guatemala coup is the opening lecture of the Shadowcraft course because it’s the case study where every structural element of covert institutional power appears in its clearest form: a corporation with a commercial grievance, a PR campaign that reframes the grievance as a national security threat, personnel overlap between the corporation and the government agencies executing the intervention, state violence deployed to protect private revenue, and a public narrative — anticommunism — that makes the economic motive invisible. The British South Africa Company used a royal charter to merge corporate and sovereign authority. United Fruit didn’t need a charter. It had the Dulles brothers, a PR genius, and a CIA willing to overthrow an elected government because a banana company didn’t want to pay the tax value it had declared on its own land.

    The propaganda model Bernays built in Guatemala — corporate-funded information operations targeting domestic opinion to manufacture consent for foreign intervention — became the template for U.S.-led campaigns in Cuba and, decades later, Vietnam. The Safari Club outsourced covert operations to allied intelligence services. The Crypto AG operation outsourced signals intelligence to a rigged Swiss company. United Fruit outsourced regime change to the CIA. The pattern is the same: private interests leveraging state capacity for commercial objectives while the public sees ideology, not economics.

    We cover United Fruit alongside Wagner Group, Marc Rich, Myanmar’s military conglomerates, and 20 other case studies of covert institutional power across our Shadowcraft course — where the banana that started everything is still being sold, under a different sticker, by the same company.

  • The Safari Club: The Secret Intelligence Alliance That Bypassed Congress

    In 1976, Prince Turki Al-Faisal of Saudi Arabia’s General Intelligence Presidency gave a speech at Georgetown University that contained a paragraph most of his audience probably didn’t fully process at the time. “In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress,” he said. “It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.” That’s a former intelligence chief of a major U.S. ally publicly confirming that when the American Congress restricted the CIA’s ability to conduct covert operations, five countries built a parallel intelligence alliance to do it instead — funded by Saudi petrodollars, coordinated from a headquarters in Cairo, and operated with the full informal knowledge of senior American officials who couldn’t legally participate but could make sure nobody got in the way.

    Why it existed

    The Safari Club was a direct product of the Church Committee. In 1975, Senator Frank Church’s investigation exposed three decades of CIA abuses — coups, assassination plots, domestic surveillance, mail interception, drug experiments on unwitting subjects — and Congress responded with reforms that fundamentally constrained the agency’s operational freedom. The Hughes-Ryan Amendment required presidential authorization for covert actions. Executive orders banned assassination. Oversight committees gained authority to review operations before they happened. President Carter took office in 1977 pledging transparency, appointed Stansfield Turner as CIA director, and Turner began cutting the agency’s covert action capabilities and shifting from human intelligence to signals collection.

    The constraints were real. The CIA couldn’t fund foreign militias without Congressional approval. It couldn’t run covert operations without paperwork that might leak. It couldn’t deploy personnel to theaters where exposure would trigger a political crisis. For a generation of intelligence professionals who had operated with essentially no oversight since 1947, the post-Church Committee CIA felt paralyzed. The phrase that circulated through Langley was that the agency had been “entombed.”

    The vacuum was filled by a French aristocrat. Count Alexandre de Marenches, director of France’s Service de Documentation Extérieure et de Contre-Espionnage, had been watching Soviet-backed movements gain ground across Africa since Portugal abandoned its colonies in 1974 and Cuba deployed troops to Angola in 1975. De Marenches proposed a multilateral intelligence alliance — countries that shared anti-communist objectives and could pool resources for covert operations without the legal constraints that now bound the Americans. He recruited four partners: Saudi Arabia (money), Egypt (troops and weapons), Morocco (troops and weapons), and Iran under the Shah (personnel and regional reach). Algeria was invited and declined. In September 1976, the intelligence chiefs of the five participating nations — de Marenches, Saudi Arabia’s Kamal Adham, Egypt’s General Kamal Hassan Ali, Morocco’s General Ahmed Dlimi, and Iran’s General Nematollah Nassiri — met at the Mount Kenya Safari Club, an exclusive resort partly owned by Saudi arms dealer Adnan Khashoggi, and signed an official charter establishing the alliance.

    How it operated

    The Safari Club built a permanent operations center in Cairo, authorized by President Sadat, with a secretariat, a planning wing, and an operations wing. The division of labor was informal but consistent: Saudi Arabia funded operations from its oil revenues, France provided high-end communications and security technology, and Egypt and Morocco supplied weapons, equipment, and military personnel for deployments. The alliance coordinated informally with American and Israeli intelligence — not through official channels, which would have triggered the oversight mechanisms Congress had just created, but through personal relationships between Safari Club members and senior U.S. officials who maintained deniable contact.

    The personal relationships were the mechanism. CIA Director George H.W. Bush — who served for one year before Turner replaced him — held a personal account at BCCI, the bank that had been consolidated simultaneously with the Safari Club’s creation and served as its primary financial conduit. Secretary of State Henry Kissinger had direct knowledge of the Safari Club and worked to ensure it operated without obstruction. After Turner took over and began restricting CIA operations, Theodore Shackley — the agency’s legendary covert operations officer — and his deputy Thomas Clines maintained informal connections with the Safari Club, effectively running a “second CIA” that continued operating after the official one had been reined in. Peter Dale Scott, the political scientist who coined the term “deep state” in the American context, classified the Safari Club as part of this parallel intelligence infrastructure.

    The financial infrastructure was BCCI. As one account put it, “The Safari Club needed a network of banks to finance its intelligence operations.” BCCI provided exactly that — a bank designed from inception to operate across jurisdictions without meaningful regulatory oversight, laundering money for intelligence agencies, dictators, and criminal organizations simultaneously. Kamal Adham, the Saudi intelligence chief who was a Safari Club founding member, was also a BCCI shareholder. The bank didn’t just serve the Safari Club’s enemies. It served everyone. The convergence of the Safari Club and BCCI at the same moment in the mid-1970s is not coincidental — both were responses to the same structural problem: how do you conduct covert operations when the formal channels have been shut down?

    What it did

    The Safari Club’s operational record spans three theaters and one diplomatic triumph. In Zaire, when the Front for the National Liberation of the Congo launched an invasion of Shaba Province in 1977 with Angolan and Cuban backing, the Safari Club organized the response. France airlifted Moroccan troops — 1,500 soldiers under direct orders from King Hassan II — and Egyptian personnel into the conflict zone, enabling Mobutu Sese Seko’s government to repel the invasion without any visible American involvement. A second Shaba crisis in 1978 drew a similar response. The operations successfully prevented Soviet-aligned forces from destabilizing a Western-allied regime in Central Africa.

    In the Horn of Africa, the Safari Club coordinated support for Somalia during the Ogaden War against Soviet-backed Ethiopia. Saudi Arabia funded and armed Somali forces while Egypt provided military equipment. The operation ultimately failed — Somalia lost the war — but the Club’s intervention demonstrated its capacity to mobilize military resources across a continent without American personnel on the ground.

    In Afghanistan, the Safari Club’s networks provided the prototype for what became the CIA’s Operation Cyclone — the massive arming of the mujahideen against the Soviet Union that began formally in 1980. Safari Club channels, particularly the Saudi-Pakistani intelligence relationship and the BCCI financial pipeline, were already in place when the Soviets invaded in 1979. The transition from Safari Club-era informal support to CIA-managed covert funding was not a clean break — it was a handoff, with the same personnel, the same banking infrastructure, and the same Saudi co-funding arrangements continuing under a different organizational header.

    The diplomatic achievement was the most consequential. Morocco had maintained intelligence back-channels with Israel since the 1950s. Using the Moroccan Safari Club representative as an intermediary, Israel communicated a warning to Egypt about a Libyan assassination plot against Sadat in 1977 — a gesture that opened the door to secret talks supervised by King Hassan II between Israeli general Moshe Dayan, Mossad director Yitzhak Hofi, and Egyptian intelligence. These talks led directly to Sadat’s visit to Jerusalem, the Camp David Accords in 1978, and the Egypt-Israel peace treaty in 1979. The most significant diplomatic breakthrough of the Cold War era in the Middle East was brokered through an intelligence alliance that Congress didn’t know existed.

    Why it ended — and what it built

    The Iranian Revolution in 1979 removed one of the five founding members and destabilized the alliance’s structure. De Marenches retired in 1982. Egypt, having made peace with Israel, realigned directly with Washington. By the early 1980s, the Safari Club quietly dissolved — no formal termination, just attrition as the bilateral relationships it had coordinated became the normal operating channels for U.S.-allied intelligence cooperation.

    But the infrastructure survived. The Saudi-Pakistani intelligence relationship that the Safari Club formalized became the backbone of the Afghan mujahideen support network. BCCI continued operating as the financial conduit for covert operations until its spectacular collapse in 1991. The model itself — “get others to do what you want done, while avoiding the onus or blame if the operation fails,” as journalist John K. Cooley described Kissinger’s approach — became the template for how the United States has conducted proxy operations ever since. The Wagner Group is Russia’s version of the same structural logic: outsource violence to a deniable entity so the state bears no formal responsibility. The Safari Club outsourced covert action to allied intelligence services. Wagner outsources it to a private military company. The mechanism differs. The deniability architecture is identical.

    The Safari Club matters because it demonstrates that when democratic oversight constrains a state’s intelligence apparatus, the apparatus doesn’t stop. It reorganizes — through allies, through parallel financial systems, through personal relationships that operate outside institutional channels — and continues doing what it was doing before the oversight existed. The Crypto AG operation continued for 48 years through ownership rather than alliance. The Safari Club operated for roughly six years through alliance rather than ownership. Both achieved the same objective: covert operations conducted at scale, with the knowledge of senior officials, beyond the reach of the democratic processes that were supposed to control them.

    We cover the Safari Club alongside Marc Rich’s sanctions arbitrage, Operation Gladio’s stay-behind armies, and 21 other case studies of invisible institutional power across our Shadowcraft course — where the question isn’t whether governments conduct operations beyond democratic oversight but how the infrastructure for doing so gets built, funded, and maintained across decades.

  • Crypto AG: How the CIA and BND Sold Rigged Encryption to 120 Countries for Decades

    In 1970, the Central Intelligence Agency and West Germany’s Bundesnachrichtendienst paid $5.75 million for a Swiss encryption company called Crypto AG. They didn’t announce the purchase. They didn’t change the branding. They didn’t replace the employees. They installed one or two people at the executive level who knew the truth, kept the rest of the workforce in the dark, and for the next 48 years sold encryption machines to more than 120 governments worldwide — machines that the CIA and NSA had rigged so that every message encrypted on them could be read by American and German intelligence as easily as plaintext. The governments of Iran, Egypt, Pakistan, Saudi Arabia, Italy, Argentina, India, the Vatican, and dozens of others paid good money for equipment they believed was protecting their most sensitive diplomatic and military communications. It was doing the opposite. A CIA internal history, leaked in 2020, called the operation “the intelligence coup of the century.” That’s not journalistic hyperbole. That’s the agency’s own classified assessment of its own program.

    The Hagelin relationship

    The story starts before the CIA owned the company. Boris Hagelin, a Swedish inventor, founded Crypto AG in 1952 after building the M-209 cipher machine that the U.S. military used extensively during World War II. Hagelin relocated to Switzerland and built a business selling encryption equipment to governments worldwide, leveraging Swiss neutrality as a brand asset — a company based in a neutral country, manufacturing security products, seemed inherently trustworthy. By the early 1950s, Hagelin had entered an informal arrangement with William Friedman, the NSA cryptologist widely regarded as the father of American codebreaking. The “gentlemen’s understanding” was straightforward: Hagelin would sell his most capable machines to countries approved by the U.S., and weaker, breakable versions to everyone else. The arrangement was unofficial, personal, and — critically — it worked. Correspondence between Friedman and Hagelin, declassified in 2015, documented the relationship in detail.

    By the late 1960s, Hagelin was aging and the informal arrangement was becoming untenable. When French and West German intelligence approached Hagelin in 1967 to propose their own partnership, Hagelin reported the approach to his CIA handlers. The agency decided it was time to buy the company outright. They partnered with the BND, and in June 1970 the purchase was completed. Crypto AG was given the internal codename “Minerva.” The operation was initially called “Thesaurus,” later renamed “Rubicon.” Hagelin’s son, Boris Jr., who had been the company’s sales manager for the Americas, died in a car accident the same year. His father investigated and did not believe it was an accident.

    How the rigging worked

    The manipulation was elegant rather than crude. The CIA and NSA didn’t install obvious backdoors or program the machines to dump their encryption keys. They weakened the algorithms — specifically, they rigged the keystream generators so that the output, while appearing random to the user, contained mathematical structures that the NSA could exploit to recover the plaintext. To anyone without knowledge of the specific weakness, the encryption looked secure. To the NSA, it was transparent. As the technology evolved from mechanical cipher machines to electronic systems to software, the rigging evolved with it. NSA cryptologists and CIA engineers worked with a small number of witting Crypto AG technical staff to design each new generation of products with weaknesses that were invisible to the company’s own unwitting engineers and to every customer who tested the equipment.

    Siemens, the German electronics conglomerate, manufactured teleprinters for Crypto AG, provided management personnel for 20 years, and held a five percent share of the profits. Siemens engineers helped develop the encryption equipment. The Maximator alliance — a second Western signals intelligence partnership comprising Denmark, France, Germany, Sweden, and the Netherlands, operating parallel to the Five Eyes — was also read into the vulnerabilities and exploited them for their own intelligence collection. The circle of governments benefiting from Crypto AG’s compromised machines was wider than the CIA and BND alone.

    What it produced

    The intelligence yield was staggering across decades of global events. During the 1978 Camp David negotiations between Egypt and Israel, the NSA read every communication between President Sadat and his advisors in Cairo — because Egypt was a major Crypto AG customer. During the 1979 Iran hostage crisis, Iranian communications were intercepted in real time. In 1982, the British government received intelligence during the Falklands War because Argentina’s military encrypted its communications on Crypto AG equipment. In 1986, intercepted Libyan diplomatic traffic between Tripoli and the Libyan embassy in East Berlin provided the evidence President Reagan cited when he ordered the bombing of Tripoli and Benghazi in retaliation for the West Berlin discotheque bombing — and Reagan’s public statement about the intercept nearly blew the entire operation, because Libya and every other Crypto AG customer suddenly had a reason to wonder how the Americans were reading their communications.

    By 1988, the CIA and BND were decrypting approximately 19,000 Iranian messages annually — 80 to 90 percent of Iran’s total encrypted traffic. The operation provided intelligence on the South American Operation Condor dictatorships — Chile, Argentina, Bolivia, Paraguay, Uruguay, and Brazil — as they coordinated cross-border campaigns of imprisonment, torture, and extrajudicial killing. The Condor nations used Crypto AG equipment to coordinate their operations. American and German intelligence read the traffic. They knew what was happening. The CIA and BND documents, as the Washington Post reported, “largely avoid more unsettling questions, including what the United States knew — and what it did or didn’t do — about countries that used Crypto machines while engaged in assassination plots, ethnic cleansing campaigns and human rights abuses.”

    How it almost fell apart — and didn’t

    The operation survived repeated near-exposures across five decades, which is arguably more remarkable than the operation itself. Reagan’s 1986 public reference to Libyan intercepts was the first serious scare. The 1991 assassination of former Iranian Prime Minister Shapour Bakhtiar produced another: Iranian intelligence transmitted a coded message to Iranian embassies the day before Bakhtiar’s body was discovered, and the speed of Western intelligence’s response raised suspicions about how the intercept was obtained.

    The most dramatic exposure came in 1992, when Hans Bühler, a Swiss Crypto AG salesman, was arrested in Iran on espionage charges. Bühler had no idea he was selling rigged equipment — he was a genuine salesman who believed in his company’s products. Iran detained him for nine and a half months. Crypto AG paid approximately $1 million in bail for his release. When Bühler returned to Switzerland, he started talking to journalists. Another former Crypto AG engineer who had independently suspected the company was controlled by Western intelligence also went public. The media coverage was extensive. Bühler was fired. But the operation survived. The BND, rattled by the exposure risk, sold its stake to the CIA in 1993 or 1994 for $17 million. The CIA kept going alone. For another 24 years.

    Why did it survive? An academic study in Intelligence and National Security identified three factors: geopolitical pressures on target countries that limited their alternatives, the target governments’ limited technical resources for independently verifying encryption security, and individual operational brilliance by CIA-BND agents inside Crypto AG who managed each crisis without the operation collapsing. The simplest factor was the most powerful — there weren’t many alternatives. If you were a mid-sized government in the 1980s and you needed encryption equipment, your options were American, Soviet, or Swiss. The Swiss option looked neutral. It wasn’t.

    What it means

    The CIA sold Crypto AG’s remaining assets in 2018. The Swiss company was split into CyOne (domestic Swiss sales) and Crypto International AG (international sales under new ownership). The operation formally ended after 48 years of continuous signals intelligence collection from more than 120 governments. But the structural lesson is the one that connects Crypto AG to every other lecture in the Shadowcraft course: the most effective covert operation isn’t one that steals secrets. It’s one that sells the target the tool they’ll use to betray themselves — and charges them for the privilege.

    The parallel to modern debates about encryption backdoors, tech company cooperation with intelligence agencies, and the post-Snowden landscape is obvious and uncomfortable. As Warwick University researchers noted after the 2020 revelations: “Long before Edward Snowden released documents of modern firms colluding with intelligence agencies, we can see evidence for significant cases in the past. It certainly is not a recent phenomenon and leads us to ask just how many firms had been working directly with intelligence agencies.” The question the Crypto AG story poses isn’t whether intelligence agencies compromise commercial encryption. It’s how many current products carry weaknesses that will take another 48 years to discover. We cover Operation Rubicon alongside BCCI’s financial architecture, the United Front Work Department’s influence networks, Wagner Group‘s mercenary-propaganda fusion, and the shell company structures that make all of it possible across our Shadowcraft course — 24 lectures on the invisible institutions that shaped the modern world from behind the paperwork.

  • BCCI: The Most Corrupt Bank in History and How It Served Every Side of Every Conflict

    The Bank of Credit and Commerce International operated in 78 countries, managed assets exceeding $20 billion, employed more than 14,000 people, and served as the personal financial institution of the CIA, Saddam Hussein, Manuel Noriega, the Medellín cartel, Abu Nidal, Pakistan’s nuclear weapons procurement network, Ferdinand Marcos, and the mujahideen fighting the Soviets in Afghanistan — simultaneously, through the same branches, often through the same officers. When regulators in seven countries raided its offices on July 5, 1991, in what remains the largest coordinated banking shutdown in history, investigators found not a bank that had been corrupted but a bank that had been designed, from its founding in 1972, as a machine for evading the laws of every country it operated in. The Kerry-Brown report to the U.S. Senate Foreign Relations Committee called it “international financial crime on a massive and global scale.” Time magazine nicknamed it the “Bank of Crooks and Criminals International.” The acting U.S. Comptroller of the Currency compared it to FTX in 2023, which is the kind of comparison that should make you realize how little has changed.

    The architecture of invisibility

    BCCI was founded in 1972 by Agha Hasan Abedi, a Pakistani financier who had previously built United Bank Limited before Pakistan’s nationalization wave took it from him. His new bank was incorporated in Luxembourg, headquartered in London, and majority-funded by Sheikh Zayed bin Sultan Al Nahyan, the ruler of Abu Dhabi, with Bank of America providing 25 percent of the initial capital and critical institutional credibility. From its first year, the bank was structured to be unregulable. It split itself into BCCI Holdings (Luxembourg), BCCI SA (Luxembourg), and BCCI Overseas (Grand Cayman), with parallel banks acquired or created in Geneva, Kuwait, and the Cayman Islands, layered through a web of holding companies, affiliates, subsidiaries, and nominee relationships so complex that no single regulator in any single country could see the full picture. That was the point. As the Kerry-Brown report documented, BCCI was “from its earliest days made up of multiplying layers of entities, related to one another through an impenetrable series of holding companies, affiliates, subsidiaries, banks-within-banks, insider dealings and nominee relationships.”

    The growth was astonishing and unsustainable. From 19 branches in five countries in 1973 to 108 branches by 1976 to over 400 branches in 78 countries by the mid-1980s. Assets grew from $200 million to $1.6 billion in four years. Abedi pursued deposits over profits, acquiring high-net-worth clients — and high-net-worth criminals — by offering services no legitimate bank would touch. The strategy worked until it didn’t. By the late 1970s, BCCI was already secretly covering non-performing loans by creating fictional transactions and using customer deposits to fill the holes. The Abbas Gokal shipping group, BCCI’s largest borrower, was effectively bankrupt by the late 1970s. BCCI threw money at the problem and falsified the books. This carried on for 15 years.

    The client list

    The list of BCCI’s known clients reads like a casting call for a Cold War thriller written by someone who decided subtlety was overrated. Noriega laundered approximately $23 million through BCCI’s London branches — the bank hand-delivered him a $25,000 Persian carpet as a hospitality gesture, because when your client is a dictator who runs a country-sized drug operation, customer service matters. Pablo Escobar and other members of the Medellín cartel used BCCI for laundering. Abu Nidal, the Palestinian terrorist, used it for arms procurement. Saddam Hussein used it for weapons purchases, including a planned $110 million acquisition of 22 Argentine Mirage fighter jets arranged through BCCI’s Latin American office. Ferdinand Marcos stashed money. Hussain Muhammad Ershad, the Bangladeshi military dictator, stashed money. Samuel Doe of Liberia stashed money. If you ran a country and needed to hide the proceeds, BCCI was the institution that said yes.

    But the client that makes BCCI historically significant rather than merely criminal was the Central Intelligence Agency. The CIA maintained accounts at BCCI branch offices, used the bank as a conduit for covert funding, and — according to the Kerry-Brown report and subsequent investigations — channeled billions through BCCI to the Afghan mujahideen. By 1987, CIA funding for the Afghan rebels reached $630 million annually, with Saudi Arabia matching the contribution, and much of it flowed through BCCI. The National Security Council also held accounts at the bank, used for transfers connected to Iran-Contra. A 1986 CIA memo stamped SECRET summarized the agency’s knowledge of BCCI’s activities, including the bank’s secret acquisition of First American Bankshares in Washington — a direct violation of U.S. banking law. A more detailed 30-page CIA report followed in 1989. The agency knew. The agency’s Directorate of Operations had informants inside the bank. The CIA “aggressively” targeted BCCI as an intelligence goldmine, according to deputy director Richard Kerr. And for years, nobody acted on what they found, because BCCI was too useful to shut down.

    The nuclear dimension makes it worse. BCCI’s Canadian operations financed Pakistan’s procurement of nuclear weapons materials — documented in the Parvez case, where a Pakistani national attempted to acquire nuclear-related materials through the United States with BCCI financing. The CIA acknowledged in a 1991 letter to the Senate that it had reporting as early as 1987 on “BCCI being used by third world regimes to acquire weapons and transfer technology.” Libya used BCCI-connected channels for chemical weapons plant procurement. The bank wasn’t just laundering drug money. It was facilitating weapons of mass destruction procurement while the intelligence agencies that knew about it weighed the cost of shutting down an asset they were also using.

    Why nobody stopped it

    The regulatory failure was systemic, not accidental. BCCI had been structured from inception to split its operations across jurisdictions so that no single regulator could see the whole picture. Luxembourg saw one set of books. The Cayman Islands saw another. London saw a third. The Bank of England formed a supervisory group in 1987, but it moved slowly. U.S. regulators were warned repeatedly — by journalists, by Senate investigators, by their own agencies — and failed to act for years. Robert Mazur, a federal agent who went undercover as a wealthy businessman in Operation C-Chase, infiltrated BCCI’s private client division and documented the money laundering in real time. His operation led to the 1988 indictments that were the first serious legal action against the bank — and even that was delayed at the Justice Department’s request to avoid interfering with the sting.

    The political protection was equally systemic. BCCI hired Clark Clifford — former Secretary of Defense, trusted advisor to four presidents, arguably the most connected man in Washington — to run First American Bankshares, the U.S. bank BCCI secretly and illegally controlled. Clifford and his partner Robert Altman insisted they didn’t know BCCI was behind their bank. BCCI employed lobbyists, PR firms (Hill and Knowlton), and white-shoe law firms to suppress critical coverage. One investigative journalist in the U.K., Anthony Mascarenhas, was beaten, stabbed, and had his research stolen. Abedi personally cultivated relationships with heads of state — his philosophy, as described by BCCI officer Abdur Sakhia, was to appeal to every sector: charity for Jimmy Carter, a job for Zia’s brother-in-law, deposits for central bank officials in exchange for government deposits. Suitcases of cash where necessary.

    When Price Waterhouse finally audited BCCI properly in 1990, they found $1.48 billion in loans BCCI had made to its own shareholders, using BCCI stock as collateral — a circular fraud where the bank was essentially lending money to people to buy ownership of the bank that was lending them the money. The March 1991 Bank of England-ordered investigation concluded that there was “evidence of massive and widespread fraud.” The bank was shut down in July 1991 with liabilities of $10 to $14 billion. Over 6,500 depositors lost their money. Abedi, who had suffered a heart attack and retired, was never extradited. Key insiders were held incommunicado in Abu Dhabi. William Casey, the CIA director who oversaw the agency’s deepest involvement with BCCI, was conveniently dead.

    What it built

    BCCI didn’t invent shell company structures or nominee ownership or multi-jurisdictional regulatory arbitrage. But it proved — at a scale nobody had previously attempted — that a bank designed from inception to evade oversight could operate for nearly two decades, serve the intelligence agencies of multiple countries, finance nuclear proliferation and terrorism, launder billions in drug money, and buy political protection in the world’s most powerful capital, all without any single institution having the authority, the information, or the incentive to stop it. The tools BCCI pioneered — layered corporate structures across permissive jurisdictions, beneficial ownership concealment, regulatory fragmentation as a feature rather than a bug — are the same tools that populate the Panama Papers, the same tools that Russia’s shadow fleet uses to evade oil sanctions, the same tools that North Korea’s Lazarus Group uses to launder stolen cryptocurrency through chains of shell entities. The 2023 Corporate Transparency Act, which for the first time requires disclosure of beneficial ownership of U.S. companies, is — three decades later — a direct legislative descendant of the BCCI scandal. The question isn’t whether the reforms went far enough. It’s why it took 32 years.

    We cover BCCI alongside Marc Rich’s commodity empire, the Vatican Bank, Crypto AG, Wagner Group, and 19 other case studies of covert institutional power across our Shadowcraft course — where every lecture follows the money, maps the personnel pipeline, identifies the deniability layer, and finds the moment the machinery became exposed.

  • The CIA’s Cat and Pigeon Spy Programs: The Strangest Operations in Intelligence History

    In the early 1960s, the CIA’s Directorate of Science and Technology surgically implanted a microphone in a cat’s ear canal, embedded a three-quarter-inch radio transmitter near the base of its skull, wove a fine wire antenna through its fur all the way to its tail, and placed a power pack in its abdomen. Additional wires connected to the cat’s brain allowed handlers to detect when the animal was hungry or sexually aroused, and to override those urges so the cat wouldn’t abandon its mission to chase a pigeon or find a mate. The project took five years to develop and cost an estimated $20 million. Then they put the cat in a van, drove it to a location near the Soviet embassy in Washington, D.C., and released it to eavesdrop on two men sitting on a park bench.

    According to former CIA officer Victor Marchetti, the cat waddled across the street and was immediately hit and killed by a taxi. Twenty million dollars, five years of surgical development, and the most expensive domestic animal in American intelligence history, dead on contact with reality. A former CIA technical officer named Robert Wallace later disputed this, claiming the cat survived and the project was cancelled for other reasons. The CIA’s own website says the cat was treated humanely and the equipment was removed when the program ended. Whether the cat died under a taxi or retired to a quiet life remains, appropriately, classified.

    The project was code-named Acoustic Kitty. It was declassified in 2001. The closing memorandum, dated 1967 and still heavily redacted, concluded that while the CIA had proven “cats can indeed be trained to move short distances”—described without irony as “a remarkable scientific achievement”—”the environmental and security factors in using this technique in a real foreign situation force us to conclude that, for our purposes, it would not be practical.”

    Anyone who has ever owned a cat could have told them that for free.

    Why animals seemed like a good idea

    The logic behind CIA animal programs wasn’t insane. It was 5 percent good idea and 95 percent bad execution, repeated across multiple species with consistent results. The core insight was genuine: animals can access places humans can’t, and they do it without triggering suspicion. A stray cat near an embassy is invisible. A pigeon on a windowsill is furniture. A raven on a ledge is scenery. In an era when electronic surveillance devices were the size of textbooks and human agents were tailed by KGB counterintelligence teams, the idea of using a biological platform that could move freely through denied areas had real appeal.

    The CIA’s own historical review, published on the agency’s website under the title “Natural Spies: Animals in Espionage,” is remarkably candid about the programs. The agency acknowledges that “many of the animal programs studied by CIA were never deployed operationally—or failed for a variety of technical, logistical, or behavioral reasons.” The candor is unusual for an organization that typically lets misconceptions stand rather than correcting them. The fact that they published the review suggests they’ve decided the programs are more charming than embarrassing at this distance.

    The pigeons that actually worked

    Project Tacana, the CIA’s pigeon camera program, was the animal operation that came closest to producing operational intelligence. During the 1970s, the agency trained pigeons to carry miniature cameras weighing roughly 35 grams and fly over Soviet military installations—shipyards, naval bases, and other targets that were difficult to photograph from satellites or high-altitude aircraft.

    The theory was sound for a specific technical reason: a pigeon flying at low altitude could capture higher-resolution photographs than a spy satellite orbiting hundreds of miles above the target. Satellite imagery in the 1970s was good enough to identify buildings and vehicles but often lacked the resolution to read markings, count components, or assess equipment condition. A pigeon at rooftop height with a miniature camera could, in principle, deliver imagery that filled that gap.

    Tests showed that approximately half of the 140 photographs taken during trials achieved good image quality—a success rate that was encouraging enough to continue development but insufficient to justify full operational deployment. The program faced the same fundamental problem as Acoustic Kitty: you could get the animal to the right general area, but you couldn’t guarantee it would do what you wanted once it got there. Pigeons are trainable—far more so than cats—but they’re navigating by instinct and training, not by mission briefing. They have no concept of which building is the target or which angle produces the most useful photograph. The camera fires on a timer or by altitude trigger, and the resulting images are whatever the pigeon happened to be flying over.

    The program never became fully operational. Satellite imagery improved, the U-2 and SR-71 reconnaissance aircraft covered much of the gap, and the era of miniaturized unmanned drones eventually made biological platforms obsolete for aerial surveillance. But the pigeon program came closer to working than most people realize, and the CIA’s acknowledgment that the concept was sound—even if the execution was impractical—suggests the agency viewed pigeons as a near-miss rather than a failure.

    The rest of the menagerie

    The CIA tested ravens for precision delivery of surveillance devices. Ravens were trained to carry miniaturized eavesdropping equipment and deposit it on window ledges using specially designed carrying mechanisms. In at least one operation, a raven successfully delivered a bugging device to a European target—though no usable audio was ever captured. The delivery worked. The intelligence didn’t.

    Under MKUltra Subproject 94, the agency implanted electrodes in dogs’ brains to create remote-controlled animals that could be directed to run, turn, and stop via radio signals. Six dogs achieved “field operational” status, meaning they could be reliably directed through basic movement commands. The program was never deployed operationally, and the ethical dimensions of surgically implanting brain electrodes in dogs for remote control are exactly as uncomfortable as they sound.

    The Insectothopter was a mechanical dragonfly—a miniaturized unmanned aerial vehicle designed to carry a listening device. It was selected after an initial bumblebee design proved too erratic in flight. The dragonfly could fly 200 meters in 60 seconds, guided by a laser beam, but proved inoperable in crosswinds above five miles per hour. Charlie and Charlene were robotic catfish developed by the CIA’s Office of Advanced Technologies and Programs to study unmanned underwater vehicle technology—robot fish designed for aquatic surveillance.

    What the programs actually tell us

    The pattern across all of these operations—cat, pigeon, raven, dog, dragonfly, catfish—is consistent and diagnostic. The CIA could build the technology. Miniaturizing transmitters, embedding recording devices, engineering mechanical insects—the engineering was ahead of its time. What they couldn’t do was solve the interface between human intent and animal behavior. A cat with a working transmitter in its skull is still a cat. It will chase a bird, wander toward food, lose interest in the park bench, or walk into traffic. The technology was the easy part. Biology was the hard part, and biology won every time.

    A 2023 comparative cognition study quantified the problem: cats made “considerably fewer choices than dogs in laboratory environments, and their tendency to make a choice declined during trials.” The CIA discovered this empirically, at a cost of $20 million, six decades before the paper was published. Cats evolved as solitary ambush predators whose attention is stimulus-driven, not command-driven. Their brains prioritize potential prey over instructions. Asking a cat to eavesdrop on a Soviet diplomat instead of chasing a squirrel is asking the cat to override 30 million years of predatory evolution for a food pellet. The cat’s answer, delivered at a behavioral level that no amount of surgical modification could change, was no.

    The pigeon program came closest because pigeons have social structures and can be trained through operant conditioning to fly specific routes and return to specific locations—behaviors that align with their natural homing instincts. Dogs performed better than cats because their social cognition is command-oriented rather than stimulus-oriented. Ravens succeeded at precision delivery because corvids are problem-solvers that can learn sequential tasks. The CIA’s animal programs, read as a body of work, are an accidentally rigorous experiment in comparative cognition: which species can be directed to perform tasks that conflict with their natural behavioral repertoire, and what determines the answer?

    The answer, demonstrated across two decades of classified research, is that animals with social structures and reward-oriented learning systems (dogs, pigeons, ravens) outperform solitary predators (cats) at human-directed tasks—but none of them can be reliably directed to perform context-dependent intelligence operations that require judgment, sustained attention, and goal persistence in uncontrolled environments. The technology worked. The biology was not negotiable. And a taxi, if Marchetti is to be believed, delivered the final verdict.

    We cover the CIA’s animal programs alongside navy dolphins, anti-poaching dogs, and the full history of animals deployed in human conflicts across our Animal Heroes course—including why the most expensive spy the CIA ever built had whiskers, a tail, and absolutely no interest in Soviet diplomats.