Most Popular Choices
Share on Facebook 5 Printer Friendly Page More Sharing Summarizing
OpEdNews Op Eds      

Rolling Pearl Harbors: The Circular Infrastructure (2B)

Author 517692
Editor

John Hawkins
Follow Me on Twitter     Message John Hawkins
Become a Fan
  (9 fans)

The Circular Infrastructure
The Circular Infrastructure
(Image by nba)
  Details   DMCA

Part 2B: The Infrastructure-- Operation Mockingbird and the Judith Miller case study

Operation Mockingbird (continued)-- CIA Infiltration of American Media

Judith Miller's access journalism didn't emerge in a vacuum. The Central Intelligence Agency systematically infiltrated major media organizations, placed officers under journalistic cover, and used reporters to plant propaganda targeting the American public. Congressional investigation documented this history. Participants confirmed it.

The Bernstein Investigation In October 1977, Carl Bernstein published "The CIA and the Media" in Rolling Stone: "More than 400 American journalists in the past twenty-five years have secretly carried out assignments for the Central Intelligence Agency, according to documents on file at CIA headquarters."

Carl Bernstein
Carl Bernstein
(Image by ChrisLongImages)
  Details   DMCA

Carl Bernstein

The Church Committee's investigation into intelligence agency abuses produced this finding, corroborated by CIA documents and confirmed by participants. Over 400 journalists at more than 50 American news organizations had cooperated with the CIA over 25 years. The relationships existed at the highest levels-- not just stringers or foreign correspondents, but editors, publishers, and network executives. Bernstein reported:

The CIA's relationship with the press was by far its most valuable intelligence asset" In many instances, CIA documents show, journalists were engaged to perform tasks for the CIA with the consent of the managements of America's leading news organizations.

The major outlets were complicit. CBS provided cover for CIA officers posing as network employees. The New York Times gave CIA personnel journalistic credentials. Time and Newsweek cooperated with intelligence operations. The networks weren't victims of rogue officers; their management approved the arrangements.

frank snepp
frank snepp
(Image by Neon Tommy from flickr)
  Details   DMCA

Frank Snepp

The Operational Methodology

Frank Snepp, a CIA analyst who worked in Saigon from 1969 to 1975, later described how the operations functioned. His testimony provides a rare firsthand account of an intelligence agency using journalism for propaganda:

The correspondents we targeted were those who had terrific influence. The most respected journalists in Saigon, like Robert Shaplen of the New Yorker magazine, Keyes Beech of the Los Angeles Times, Bud Merrick of U.S. News and World Report, Malcolm Brown from the New York Times, and even Maynard Parker from Newsweek magazine, were all included. I would be directed to cultivate them" to socialize with them. And slowly but surely to try to gain their confidence by dolloping out valid information. Information that was true. And then I would drop into a conversation the data that we wanted to get across, which might not be true.

The methodology: target influential journalists at prestigious outlets, build relationships through socializing, establish trust by providing accurate information, then plant disinformation that journalists couldn't independently verify. Intelligence derived from classified sources-- radio intercepts, satellite photography, signals intelligence-- couldn't be fact-checked. Reporters either published the exclusive or lost the story.

Snepp estimated the success rate at 70 to 80 percent. When asked how journalists could verify claims about North Vietnamese troop movements derived from classified intercepts, Snepp explained, "There is no way a journalist can check that information. That's data derived from radio intercepts and spy-in-the-sky photography. So either he goes with the information, or he doesn't. Typically, the journalist would choose to publish the information because it appeared to be an exclusive story.

This is the access journalism dynamic: proximity to classified information creates competitive advantage, but verification becomes impossible. The journalist who cultivates intelligence sources obtains exclusives that competitors cannot match; however, they have no way to determine whether these exclusives are based on intelligence or propaganda.

The Circular Verification Loop

Snepp described the technique for preventing fact-checking:

If I planted a piece of information with a reporter, I would ordinarily then try to create an environment in which he could not check the information. I would go to the British ambassador and brief him on the disinformation I had just given the reporter. So when the reporter wanted to cross-check what I told him with, say, the British ambassador, the New Zealand ambassador, or what have you, he would get false confirmation, the same message coming back at him. He'd say, 'Aha, I've got proof that Frank Snepp told me the truth,' when in fact, what he'd gotten was simply an echo of what I'd given him in the first place, via the British ambassador or other of our friendly diplomatic contacts.

Judith Miller's September 8, 2002, reporting demonstrated this exac t pattern: CIA-sourced claims about Iraqi aluminum tubes appeared in the New York Times, administration officials cited the Times on television as independent verification, and journalists believed they had confirmed the information through multiple sources, when in fact they had simply encountered the same claims through different channels.

The circular verification loop prevents genuine fact-checking while creating the illusion of independent confirmation. Information flows from intelligence agencies to journalists, then to officials who cite these journalists, then to other journalists who cross-check with officials-- all amplifying the same source while appearing to verify it independently. Propaganda laundered through journalism's institutional credibility.

The circular verification loop prevents genuine fact-checking while creating the illusion of independent confirmation.

Miller's WMD reporting didn't invent this technique. It refined methodology developed during Operation Mockingbird and perfected in Vietnam. The names changed-- Iraqi exiles instead of Vietnamese sources, WMD instead of troop buildups, Iraq War instead of Vietnam War-- but the pattern remained identical.

Why Journalists Cooperated

Snepp's account reveals why respected journalists at major outlets participated. They weren't hired as spies. They weren't dupes. They were cultivated through social relationships, offered exclusive information they couldn't obtain elsewhere, and gradually became dependent on sources who sometimes provided genuine intelligence and sometimes planted propaganda. The journalist couldn't distinguish which was which without independent verification-- but the very nature of classified intelligence prevented verification. Officials briefing journalists knew more than the journalists did. Accepting the information meant maintaining access to influential sources. Challenging it meant losing the relationship and the exclusives. The incentive structure aligned perfectly: journalists needed exclusives to advance their careers, intelligence agencies needed journalistic credibility to plant propaganda, and media organizations needed prestigious government access to compete. Everyone benefited except the public, which received disinformation disguised as independent reporting.

The Judith Miller Case: Methodology Perfected

Judith Miller'sIraq WMD reporting at the New York Times from 2002 to 2003 demonstrated how Operation Mockingbird's methodology continued decades after the program's exposure. Miller didn't need CIA recruitment. She cultivated access to Iraqi exiles, Pentagon officials, and intelligence sources, then amplified their claims without verification.

Event: Judith Miller Speaks
Event: Judith Miller Speaks
(Image by JPressClub from flickr)
  Details   DMCA

Judith Miller

Her method violated every principle of adversarial journalism:

1. She relied on sources with obvious motives to deceive. Ahmad Chalabi, leader of the Iraqi National Congress, wanted U.S. military intervention to install him in power. His organization received millions from the CIA and Pentagon. Miller never disclosed this fundamental conflict of interest in her reporting. Despite their obvious agenda, she portrayed Chalabi and his associates as reliable sources.

2. She granted anonymity to officials pushing policy agendas. Miller's articles routinely cited "senior administration officials" and "intelligence officials" making WMD claims without identifying them or explaining why they deserved anonymity. Anonymity exists to protect whistleblowers exposing wrongdoing, not to shield officials promoting wars. Miller transformed anonymity into a mechanism for propaganda.

3. She failed to seek contrary evidence or expert opinion. Nuclear physicists disputed the aluminum tubes assessment, noting the specifications were wrong for centrifuges. UN weapons inspectors found no evidence of active WMD programs. Intelligence analysts questioned exile claims. Miller ignored these experts in favor of officials advocating war.

4. She allowed officials to use her reporting as propaganda. The September 8, 2002, aluminum tubes article appeared on the Times front page. That same morning, Dick Cheney appeared on Meet the Press citing the Times article as evidence of Iraqi nuclear programs. Condoleezza Rice made similar claims on other shows. Miller's reporting provided the "independent confirmation" for claims sourced to the same officials who had leaked to her.

5. She accepted intelligence claims without demanding supporting evidence. Classified intelligence can't be independently verified by definition-- journalists either trust the source or decline the story. Miller consistently chose trust over skepticism, publishing claims about mobile biological weapons labs, chemical weapons stockpiles, and nuclear programs that later proved fabricated.

6. She maintained access relationships that prevented adversarial questioning. Miller's closeness to sources like Chalabi and Pentagon officials made challenging their claims professionally impossible. She had invested years cultivating these relationships. Questioning their credibility meant losing the access that made her valuable to the Times.

The Pattern Continues

Miller resigned from the Times in 2005 after the paper's public editor criticized her WMD coverage. But she faced no prosecution, no professional sanction from journalism organizations, and no accountability for helping justify a war that killed hundreds of thousands. She continued working in media, became a Fox News contributor, and now describes herself as a First Amendment advocate.

Meanwhile, whistleblowers who exposed the absence of WMDs, revealed torture programs, and disclosed illegal surveillance faced prosecution, imprisonment, and exile. The infrastructure rewarded those who enabled power and punished those who challenged it.

Four hundred journalists at America's most prestigious outlets cooperated with the CIA. Intelligence agencies cultivated them socially, built trust through accurate information, and then planted disinformation they couldn't verify. When journalists tried to fact-check, they encountered echoes of their stories reflected through diplomatic channels the CIA had already briefed. Success rate: 70-80%.

Miller refined the technique for the Iraq War. Iraqi exile fabrications combined with anonymous administration officials and Israeli intelligence assessments produced front-page articles in the New York Times. Officials cited the Times as independent verification. Other journalists cross-checked information with officials who referenced the Times. The circular loop created the appearance of confirmation while preventing genuine fact-checking. Result: war based on lies, hundreds of thousands dead.

The infrastructure didn't end with Miller's resignation or Mockingbird's exposure. It normalized. Former CIA directors became cable news analysts. Access journalism became standard practice. Intelligence agencies' integration into media became so complete that questioning it seems naive.

The Institutional Failure

Miller's reporting didn't occur in isolation. The New York Times editors approved the articles. The Washington Post, the Wall Street Journal, and major networks published similar uncritical WMD coverage. CNN and MSNBC fired or marginalized journalists who questioned the rush to war. The entire institutional structure of American journalism failed simultaneously.

The problem wasn't individual-- it was systemic collapse. The same institutions that should have questioned power amplified it. The same journalists who should have demanded evidence stenographed claims. The same editors who should have insisted on verification published propaganda.

The pattern wasn't unique to Iraq. Post-9/11 journalism largely abandoned its adversarial stance toward government in favor of patriotic conformity. Questioning official narratives about terrorism, surveillance, or military operations became professionally risky. Access to officials required demonstrating trustworthiness through favorable coverage. Critical journalism got marginalized as unpatriotic, naive, or sympathetic to America's enemies.

Corporate consolidation accelerated the collapse. General Electric owns NBC. Defense contractors advertise on news networks. Media corporations depend on government regulatory decisions. The institutional incentives align against investigating power. Access journalism serves both the officials who grant access and the corporations that employ the journalists. Only democratic accountability suffers.

Case Study: What Journalism Didn't Report-- The Israeli Intelligence Connection

Miller's WMD reporting relied on Iraqi exiles and American officials, but another crucial source went largely unreported: Israeli intelligence agencies with their own strategic interest in Saddam's removal.

In September 2002, Benjamin Netanyahu testified to Congress, guaranteeing that removing Saddam would have "enormous positive reverberations on the region." Israeli intelligence shared WMD assessments with the Pentagon's Office of Special Plans, which bypassed CIA vetting to brief Cheney and Rumsfeld. Seymour Hersh reported after the invasion: "Israeli intelligence had been sharing with the Pentagon data about Iraqi weapons of mass destruction that turned out to be wrong" The Israelis had long wanted a regime change in Iraq."

Israel openly stated its strategic interest: Iraq had funded Palestinian groups and had attacked Israel with Scuds in 1991. Removing Saddam would eliminate Iraqi support for anti-Israeli groups. These motivations had nothing to do with whether Iraq actually possessed WMD in 2003.

American journalism never seriously investigated how much WMD "intelligence" came from sources with strategic interest in war, whether Israeli assessments reflected genuine analysis or advocacy, or how Chalabi's documented Israeli intelligence contacts affected his credibility. Questioning Israeli intelligence is politically sensitive-- characterized as anti-Israel and potentially career-damaging. The structural incentives ensured these facts went unreported.

Most Americans still don't know that a nation openly advocating for war also provided intelligence justifying that war, or that this intelligence proved as inaccurate as the Iraqi exile fabrications Miller reported.

The same structural biases that prevented investigation of Israeli intelligence contributions to the WMD narrative prevent investigation of electoral manipulation, corporate power, and friendly nations' roles in U.S. policy disasters. Journalism serves aligned interests rather than democratic accountability-- not through conspiracy but through access incentives, professional risks, and shared assumptions between journalists and officials.

The Stakes

The Iraq War killed over 500,000 people-- most of them Iraqi civilians. It cost American taxpayers more than $3 trillion. It destabilized the entire Middle East, creating conditions for ISIS, the Syrian civil war, and ongoing regional chaos. It was justified with lies about weapons of mass destruction that didn't exist.

Judith Miller's reporting at the New York Times provided crucial legitimation for those lies. Her September 8, 2002, aluminum tubes article-- coordinated with administration officials who cited it the same day as independent verification-- helped manufacture consent for war. Without the Times' institutional credibility, which launders Iraqi exile fabrications into front-page news, the propaganda campaign would have faced greater skepticism.

The invasion wasn't inevitable. Adversarial journalism could have questioned Chalabi's credibility, investigated his CIA and Israeli intelligence connections, demanded evidence for WMD claims, featured nuclear experts who disputed the aluminum tubes assessment, and asked why a nation with strategic interest in Saddam's removal was providing intelligence justifying war.

Instead, access journalism amplified official propaganda and exile fabrications, treated interested parties as credible sources, and transformed the nation's most prestigious newspaper into an instrument of war. Miller's six violations of adversarial journalism weren't individual failures-- they were a systematic collapse of journalism's democratic function.

The pattern didn't end with Iraq. It continues today in coverage of every issue where official narratives benefit from uncritical amplification. The New York Times stenographed State Department claims about adversarial nations. Cable news interviews former CIA officials as objective analysts. Journalists grant anonymity to officials pushing policy agendas. The Miller methodology persists.

The collapse of adversarial journalism into access journalism represents a democratic failure as consequential as any documented in this series. Citizens cannot make informed decisions when institutions meant to inform them systematically deceive them. Truth cannot constrain power when journalism amplifies rather than questions it.

When journalism abandons its adversarial function, power operates without constraint. And when power operates without constraint, it creates its own reality-- exactly as Karl Rove promised it would.

[Part 2C examines how power operates in this environment: Karl Rove's explicit philosophy that "empires create reality," propaganda films presenting official narratives as historical records, and the epistemological crisis citizens face when institutions meant to inform them systematically deceive them instead.]

Rate It | View Ratings

John Hawkins Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

John Kendall Hawkins is an American ex-pat freelance journalist and poet currently residing in Oceania.

Related Topic(s): Iraq; Israel, Add Tags

Add to My Group(s)
Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Follow Me on Twitter     Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter

Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Chicago 7: Counter Cultural Learnings of America for Make Money Glorious Nation of Post-Truthvaluestan

Democracy: The Big Cash Give-Away

OpenAI Closes Its Mind and Opens Yours

Busker's Still Center

Jiving and Thriving On the Lam with the Blues (book review)

Sonnet: Man-Machine: The Grudge Match

Comments Image Post Article Comment and Rate This Article

These discussions are not moderated. We rely on users to police themselves, and flag inappropriate comments and behavior. In accordance with our Guidelines and Policies, we reserve the right to remove any post at any time for any reason, and will restrict access of registered users who repeatedly violate our terms.

  • OpEd News welcomes lively, CIVIL discourse. Personal attacks and/or hate speech are not tolerated and may result in banning.
  • Comments should relate to the content above. Irrelevant, off-topic comments are a distraction, and will be removed.
  • By submitting this comment, you agree to all OpEd News rules, guidelines and policies.
          

Comment Here:   


You can enter 2000 characters.
Become a Premium Member Would you like to be able to enter longer comments? You can enter 10,000 characters with Leader Membership. Simply sign up for your Premium Membership and you can say much more. Plus you'll be able to do a lot more, too.

Please login or register. Afterwards, your comment will be published.
 

Username
Password
Show Password

Forgot your password? Click here and we will send an email to the address you used when you registered.
First Name
Last Name

I am at least 16 years of age
(make sure username & password are filled in. Note that username must be an email address.)

No comments  Post Comment

 
Want to post your own comment on this Article? Post Comment


 

Tell A Friend