CIA Affirms But Also Defends Its Actions in Spying on Senate Panel

The Central Intelligence Agency recently conducted an internal investigation and found that several officers within the agency infiltrated a Senate Intelligence Committee computer network that the Committee used to prepare a controversial report about a detention and interrogation program used by the CIA.

The investigation also revealed that CIA agents accessed emails sent and received by the Senate investigators as well as sent a false criminal referral to the DOJ. The CIA agents in question also allegedly generated a series of false online identities in an effort to infiltrate computers that were being used by Senate staff.

Harsh criticism from Senate officials followed an account given by the inspector general regarding the CIA’s covert surveillance of congressional committee members who had been ordered to oversee the agency’s activities. This comes after California Senator Diane Feinstein publicly excoriated the CIA for allegedly spying on committee investigators.

CIA Director John O. Brennan issued a statement earlier this week through a spokesperson saying that he had formally apologized to the Senator and other committee members for the unauthorized surveillance and said that he would take it upon himself to establish an internal accountability board to review the allegations. He also said that the board could potentially issue recommendations for “disciplinary measures” as well as for ways in which “systematic issues” within the agency could be addressed.

Sponsored Content

The CIA’s detention and interrogation program has been the subject of harsh scrutiny over the last five years, most notably in a report generated by Democrats within the Committee. The report alleges that the CIA used strong-arm tactics and methods of interrogation for years as part of its investigative protocol.

While the CIA has officially apologized for the actions, it has also said that it must sometimes use methods of investigation that may seem unsavory to certain parties, but which are necessary for extracting information and carrying out operations.

Wiley University Services maintains this website. We are an advertising-supported publisher and are compensated in exchange for placement of sponsored education offerings or by you clicking on certain links posted on our site. This compensation may impact how, where and in what order products appear within listing categories. We aim to keep this site current and to correct errors brought to our attention. Education does not guarantee outcomes including but not limited to employment or future earnings potential. View Advertiser Disclosure
Wiley University Services

©2023 All Rights Reserved.