Failed Secret CIA Programs: Cold War to Present

Review of failed CIA covert programs from Cold War to now, based on leaks and declassified investigations.

Failed Secret CIA Programs: Cold War to Present

The Central Intelligence Agency has orchestrated countless covert programs since its inception in 1947. While many remain classified, a number of secret operations have been exposed through leaks, whistleblowers, investigative journalism, and declassified records – often revealing embarrassing failures never officially acknowledged by the CIA. Below, we examine several failed CIA covert programs from the Cold War to today, highlighting their codenames, objectives, targets, outcomes, and how they became public. Each case is corroborated by independent sources (ranging from leaked documents and congressional reports – considered primary evidence – to credible journalism and academic studies as secondary accounts). We also note the reliability of sources and gaps in knowledge, suggesting where further research is needed.

Early Cold War Setbacks (1940s–1950s)

Operation Valuable (Project BGFIEND, 1949–1954) – One of the CIA’s first major covert actions targeted Communist Albania. In collaboration with Britain’s MI6, the CIA trained and armed Albanian émigrés to infiltrate their homeland and foment an anti-communist uprising against Enver Hoxha’s Stalinist regime. The operation, launched in the early 1950s at the height of Cold War rollback efforts, ended in disaster. Albanian security (Sigurimi), apparently tipped off – later suspected due in part to a Soviet mole (MI6 officer Kim Philby) – systematically captured or killed the infiltrators. Over four years, some 300 agents were killed, wiping out virtually the entire resistance network. This “secret failure” remained hidden for decades; only years later did historians and a 2016 BBC report reveal how CIA and MI6 were outsmarted and outmaneuvered in AlbaniaSources: The BBC World Service interview (primary media source with historian testimony) and declassified documents confirm the scale of the failure. The CIA has never officially acknowledged Operation Valuable, and much of its documentation remains classified or heavily redacted. This leaves a gap filled only by foreign accounts and a few released CIA memos, warranting further archival research.

Syria Coup Plots (1956–1957) – In the 1950s, U.S. intelligence deemed newly independent Syria a potential Soviet foothold. After backing several coups (starting with a successful military coup in 1949), Washington again attempted to install a friendly regime in the mid-50s. CIA planners launched Operations “Straggle” (1956) and “Wappen” (1957)to topple Syria’s nationalist president, Shukri al-Quwatli. These plans involved provoking internal unrest and assisting military conspirators. However, both covert coup attempts failed. Syrian counterintelligence exposed the plots, leading to the expulsion of American diplomats and heightened suspicions of U.S. interference. The backlash was severe: Syria drew even closer to Egypt and the Soviet Union, eventually entering the short-lived UAR (United Arab Republic) alliance with Nasser’s Egypt. At the time, the U.S. never admitted its role, and details only emerged decades later through declassified documents and scholarly research. Sources: An Al Jazeera analysis by historian Marwan Bishara (secondary source) cites declassified U.S. documents and Douglas Little’s work, confirming that CIA-backed coup plans in 1956–57 “backfired,” pushing Syria into the Soviet camp. This case underscores how covert operations can have unintended geopolitical consequences. Because official CIA records remain mostly secret, our understanding relies on foreign policy archives and memoirs; further FOIA releases or Syrian archives could shed more light on these failed plots.

Indonesia Rebellion Support (1957–1958) – In Indonesia, the CIA covertly intervened in a regional rebellion against President Sukarno. Worried by Sukarno’s non-aligned stance and tolerance of the Indonesian Communist Party, the U.S. funneled weapons, funds, and even pilots to support dissident colonels on Sumatra and Sulawesi. Code-named Operation HAIK, this effort peaked in spring 1958 when CIA-supplied rebel forces launched attacks. The gambit collapsed in May 1958 after Indonesian forces shot down an American-piloted rebel bomber. The CIA pilot, Allen Lawrence Pope, was captured alive, exposing Washington’s role in the conflict. Pope’s capture, and the documents found on him (including his CIA identity card and club membership at a U.S. airbase), made headlines, forcing the Eisenhower administration to rapidly distance itself. Embarrassed by the revelation, the CIA halted its Indonesia operation, and the rebellion was swiftly defeated by loyalist troops. The U.S. quietly paid reparations and mended relations with Sukarno’s government afterward. Sources: First-hand accounts from U.S. diplomatic oral histories (primary source) describe how Pope’s downing “reached the press and exposed the actions of the CIA in Indonesia,” forcing the agency to curtail operations as the rebels fell. This case – initially denied by officials – became public through foreign trials and later declassified in Senate hearings. However, the CIA has never officially declassified the full records of its 1958 Indonesia intervention, leaving historians to rely on Indonesian archives and interviews for additional details.

Early Eastern Europe Infiltrations (Late 1940s–50s) – Similar CIA forays behind the Iron Curtain also met tragic ends. In East Germany, Poland, Ukraine, the Baltics, and Albania, CIA and British SIS teams parachuted agents to stir resistance, only to see many captured by omnipresent Soviet-backed security forces. For instance, in Eastern Europe and the USSR’s western republics, nearly every agent infiltration in the late 1940s was compromised, often due to double agents and Soviet counter-intelligence triumphs. Many of these operatives were executed or disappeared, a fact obscured until decades later. One stark example is Albania’s Operation Valuable (noted above) where hundreds of Western-trained partisans perished. Likewise, CIA attempts to insert agents into Soviet Ukraine (e.g. as part of Project AERODYNAMIC) or the Baltic states were foiled, with entire networks rolled up by the KGB (often with the help of British mole Kim Philby). Sources: These early failures were kept secret by the CIA, but have been confirmed through Cold War archival research and admissions by former intelligence officers in memoirs. The CIA’s own in-house histories (some declassified in part) acknowledge such missions “never achieved significant success” due to Soviet penetration. However, detailed records remain classified or buried in Eastern European archives. This represents a gap in the public historical record – one that scholars are gradually filling by examining KGB archives and testimony from retired officers.

The 1960s: Coups, Plots, and Cuba

Bay of Pigs Invasion (1961) – Perhaps the most famous CIA fiasco, the Bay of Pigs was a paramilitary operation rather than a “secret program” – yet it began as a covert plan. In April 1961, the CIA sponsored an invasion of Cuba by 1,400 Cuban exiles to overthrow Fidel Castro. The operation (code-named Project ZAPATA) was disastrously executed, with Castro’s forces capturing or killing most invaders within three days. The failure was very public, humiliating the Kennedy administration. CIA Director Allen Dulles and his covert operations chief, Richard Bissell, were forced to resign after this debacle. While the Bay of Pigs was acknowledged (due to its visibility), many details remained classified for years, and internally it prompted soul-searching about CIA overconfidence. Sources: Contemporary news and the CIA’s own retrospective documents (declassified later) confirm President Kennedy was “embarrassed” and angry at the CIA’s assurances, resulting in top-level firings. The Bay of Pigs failure is well documented (secondary sources include history books and the CIA’s official history released in 2011), so it is one case where we have relatively complete information. It stands as a cautionary example of an undermanned covert action that backfired spectacularly, altering U.S. covert operations governance (leading to more White House oversight thereafter).

Operation MONGOOSE & Castro Assassination Plots (1960–1965) – After the Bay of Pigs, the Kennedy administration green-lit Operation Mongoose, a secret campaign of sabotage and destabilization against Castro’s Cuba (1961–‘62). Concurrently, the CIA’s Directorate of Plans, under codes like ZR/RIFLE, pursued multiple plots to assassinate Fidel Castro – all of which failed or were aborted. Tactics ranged from the infamous exploding cigar and poisoned wetsuit schemes to recruiting Mafia hitmen to do the job. In one plan, CIA officers prepared a box of Castro’s favorite cigars laced with botulinum toxin potent enough to be lethal upon a single puff; in another, they considered planting an explosive seashell at Castro’s diving siteNot a single attempt succeeded – Castro survived every known CIA-backed attempt on his life. These operations remained ultra-secret at the time. It was not until the 1975 Senate Church Committee that Americans learned of these Jason Bourne-like schemes, which the Committee found ranged from the “half-baked” to the absurd. Sources: The Church Committee’s “Alleged Assassination Plots” report (primary source) detailed *at least eight separate CIA attempts to “neutralize” Castro between 1960 and 1965 – including poison cigars, exploding seashells, a toxic wetsuit, and mob assassin recruitment – all of which failed. This report, corroborated by internal CIA documents declassified later, is a highly reliable source on these plots. Because the CIA has never officially acknowledged each plot (beyond limited admissions in hearings), and many operational files were destroyed or remain classified, there are still gaps – for example, questions persist about whether any plots continued beyond the mid-60s or involved other actors. Further archival declassification or Cuban intelligence files could illuminate more.

The Lumumba Plot (1960) – Around the same time, the CIA secretly plotted to assassinate Patrice Lumumba, the democratically elected Prime Minister of the Congo, who was viewed in Washington as tilting toward the Soviet Union. In late 1960, under President Eisenhower’s apparent orders, CIA scientists prepared lethal biological poisons to surreptitiously administer to Lumumba. A CIA officer in Leopoldville (Larry Devlin) was instructed to explore ways to “eliminate” Lumumba, and a poison-laced toothpaste was delivered for that purpose. In the event, the CIA’s plan was never executed – Devlin claimed he held off – yet Lumumba was deposed and killed in January 1961 by rival Congolese forces (with Belgian involvement). The exact role of the CIA remains murky. The agency never officially acknowledged attempting to kill Lumumba, and this plot was only revealed in detail in 1975 by the Church Committee’s investigation. The Committee confirmed that the CIA had plotted Lumumba’s assassination (even stationing an assassin in Congo), though it found no direct evidence the CIA was ultimately responsible for his death. Sources: The Church Committee report and subsequent historical research (primary and secondary sources) document this clandestine operation code-named “DEVILRY”, noting it as the first known U.S. peacetime order for assassination of a foreign leader. A 2023 biography by Stuart A. Reid (excerpted in Politico) further corroborates CIA intent to remove Lumumba and the transfer of poison. Still, due to heavy redactions in CIA files and conflicting accounts, significant gaps remain: we lack the full picture of CIA communications with Lumumba’s rivals and how much U.S. actions facilitated the outcome. This case invites continued scholarly digging, including Belgian archives and any CIA documents that may emerge under the 30-year rule or through FOIA.

Other 1960s Covert Misadventures: In addition to the above, the CIA undertook myriad secret programs in this era with mixed results. In Vietnam, the CIA’s Phoenix Program (1967–72) aimed to neutralize Viet Cong infrastructure through assassinations and informant networks; though it degraded insurgent networks, it became notorious for due-process abuses and civilian deaths, ultimately undermining U.S. credibility (the full extent only revealed in wartime press reports and 1971 Congress hearings). CIA’s foray into domestic surveillance also emerged: from 1967–1974, the CIA ran “Operation CHAOS” to infiltrate and track American anti-war and civil rights activists, in clear violation of its foreign intelligence charter. This domestic spying program was exposed in 1974 by investigative journalist Seymour Hersh, prompting outrage. Top CIA officials initially denied it, but the ensuing congressional inquiry confirmed that the CIA had indeed been “running operations against Americans” on U.S. soil, as Church Committee member Walter Mondale put it. Such activities were failures of oversight and ethics – they yielded little intelligence of value while eroding public trust. Sources: Hersh’s landmark New York Times story (Dec 1974) and the Church Committee (primary sources) revealed these operations, lending high credibility. The revelations themselves forced reforms (like the creation of permanent intelligence oversight committees). However, many specifics of CIA domestic operations remain classified or were destroyed; historians must piece together evidence from whistleblower testimonies and redacted memos. This is a ripe area for further academic investigation, especially given contemporary debates on intelligence agencies and civil liberties.

Secret Programs Targeting Minds and Machines

Project MK-ULTRA (1953–1973) – Among the most infamous secret CIA programs, MK-ULTRA was a clandestine research initiative in “mind control”. The CIA’s Technical Services staff and contractors ran illegal experiments on unwitting human subjects, testing LSD and other drugs, hypnosis, electroshock, sensory deprivation, and even abuse – all to develop techniques for interrogation and behavior modification. The project operated in extreme secrecy; most records were deliberately destroyed in 1973 to hide the evidence. MK-ULTRA was never publicly acknowledged by CIA at the time, and even internally it was highly compartmentalized. It only came to light in 1975 when the Church Committee and President Ford’s Rockefeller Commission uncovered it, to public outrage. These investigations confirmed that the CIA had engaged in gross violations of ethics and law, dosing U.S. citizens with psychedelics without consent and funding bizarre sub-projects (such as “Operation Midnight Climax,” which involved covertly drugging patrons in brothels). The program was deemed a failure – it produced no viable mind control technique, only shattered lives and a legacy of distrust. Sources: Declassified documents and the U.S. Senate’s 1977 MKULTRA hearings (primary sources) provide incontrovertible evidence of the program’s scope and abuses. MK-ULTRA is widely cited in academic literature on unethical research (secondary analyses). Still, because much evidence was destroyed, significant gaps remain: we likely will never know the full number of victims or the complete list of sub-projects. Further research could involve probing related programs (e.g. Project ARTICHOKE, MK-CHICKWIT) and seeking testimonies from participants to piece together missing details.

Acoustic Kitty (1960s) – Not all CIA failures were grim or deadly; some were simply absurd. In the mid-1960s, the CIA’s Directorate of Science & Technology launched “Operation Acoustic Kitty,” a $10+ million project to turn a live cat into a mobile eavesdropping device. Agency technicians surgically implanted a microphone and transmitter in a cat, with an antenna in its tail, hoping the cat could inconspicuously wander near Soviet officials and record their conversations. After years of research and animal training, the first field test was a disaster. On its trial run in a Washington, D.C. park, the spy-cat was released to snoop on two men on a bench – but the cat wandered off, distracted (either by hunger or curiosity), and walked into the street, where it was promptly run over by a taxi. The feline agent died on the spot, and with it died the CIA’s hopes of cat espionage. By 1967, Acoustic Kitty was scrapped as a failure. This quirky operation remained classified until some documents were declassified in the 2000s, amusing the public. Sources: A partially declassified CIA memo titled “Views on Trained Cats” (primary source) acknowledged that while cats “can indeed be trained to move short distances,” the program “would not lend itself in a practical way to our highly specialized needs,” effectively declaring it unfeasible. Journalistic accounts (e.g. Smithsonian MagazineHistory.com) have confirmed the taxi incident via interviews and CIA retiree anecdotes. We consider this information reliable (corroborated by multiple sources, including Victor Marchetti, a former CIA officer). The documents released are heavily redacted and leave some questions (e.g. how many cats were used, and whether any missions were attempted beyond the first); this remains a niche but telling anecdote in CIA’s history of “techno-experiments.”

Other Technical Fiascos: The Cold War tech race spurred other secret CIA projects of dubious success. One example is Project AQUILINE in the late 1960s, an attempt to build drone aircraft that mimicked birds for surveillance – a promising idea that faced technical difficulties and never saw operational use (only declassified later). Additionally, CIA’s venture into psychic research (Project STARGATE and related programs, 1970s–80s) aimed to harness “remote viewing” for intelligence; despite years of tests on self-proclaimed psychics, the results were lackluster, and the program was ultimately transferred to the Pentagon and then shut down in the 1990s. These were “failures” in that they produced no actionable intelligence commensurate with the resources spent, and they remained officially unacknowledged until journalism and the 1995 Air Force report that led to their closure. Sources: Declassified CIA reports and a 1995 GAO study (primary) on psychic research concluded any observed effects were not operationally useful, confirming the internal view that these efforts failed. Because these programs were obscure and remain partly classified, they have become fertile ground for speculation – highlighting the need for continued declassification for a sober historical assessment.

1970s: Scandals and Oversight Intervene

Figure: Diagram of the CIA’s Project AZORIAN to recover a sunken Soviet submarine using the Hughes Glomar Explorer ship and a giant “claw” (code-named Clementine). Despite enormous cost and secrecy, the effort in 1974 only retrieved part of the submarine, and the operation was exposed by media leaks in 1975.

Project AZORIAN (1974) – In the mid-1970s, the CIA undertook a technically audacious but secret mission to retrieve a lost Soviet Golf-II class submarine (K-129) that sank in 1968 in the Pacific Ocean. Codenamed Project AZORIAN (often mislabeled “Jennifer”), the plan involved building the Hughes Glomar Explorer, a huge custom ship masquerading as a deep-sea mining vessel. Using a massive mechanical claw lowered three miles underwater, the CIA attempted to lift the 1,750-ton sub (with nuclear missiles and codebooks) from the seabed. In summer 1974, the claw managed to grasp the submarine and raise it partway – but a critical failure occurred. As the wreck was being hauled up, “a few of the grabber arms encircling the submarine broke,” and a large section of the sub broke off, plunging back to the ocean floor. The recovered portion was limited (reports say only the forward section was recovered, containing some crew remains and perhaps some cryptographic material, but missing the most sensitive parts like the code room). The CIA gave the recovered Soviet sailors a secret burial at sea with full honors. Project AZORIAN remained highly classified – the CIA even coined the phrase “cannot confirm or deny” (the Glomar response) to deflect inquiries. However, in March 1975 the operation was exposed by investigative journalism: press leaks (starting with Jack Anderson and full details in the Los Angeles Times) revealed the Glomar Explorer’s true purpose. This disclosure “disturbed President Ford” and caused the CIA to cancel a planned follow-up (Project MATADOR) to recover the lost section. Sources: A detailed account in Smithsonian Magazine (2019) based on declassified CIA history and interviews confirms the partial success and partial failure of AZORIAN – the submarine “lift…completed – but only one part of it” – and the subsequent leak that blew its secrecy. The CIA’s own internal history (declassified in 2010, primary source) also acknowledges the mechanical failure and notes the media exposure in 1975. While much about AZORIAN is now known (it’s considered one of the greatest covert engineering feats), some aspects remain classified (e.g. exactly what intelligence was gained). Thus, historians still debate the operation’s true success level – with some suggesting the CIA might have recovered more than publicly admitted. This case is a prime example of a covert mission “coming to light” through leaks, illustrating how secrecy can be pierced by determined journalism and how the CIA uses official silence to this day (the agency only officially acknowledged AZORIAN in 2010).

Angola “IA Feature” Program (1975) – In the wake of Vietnam, the Ford administration launched a covert intervention in the Angolan Civil War. Code-named Operation IA FEATURE, the CIA in mid-1975 was authorized to spend tens of millions of dollars to arm and support anti-Communist factions (notably FNLA and UNITA, led by Holden Roberto and Jonas Savimbi) against the Soviet- and Cuban-backed MPLA. This covert paramilitary operation was meant to be deniable, but it unraveled almost immediately. News of CIA involvement leaked to the press and sparked outrage in Congress, which had not been fully consulted. By late 1975, the exposure of the program shocked Congress into legislative action: the Clark Amendment (enacted December 1975) cut off funding for Angola covert operations. Deprived of support, the CIA’s Angolan proxies faltered, and by early 1976 the MPLA (with Cuban troops) had gained the upper hand, leading to the CIA’s quiet withdrawal. CIA officer John Stockwell, who ran the Angola task force, later termed it a “debacle” in his memoir – citing inadequate resources and inevitable disclosure. Sources: A State Department memo from 1975 (declassified) and the Congressional record (primary sources) confirm how Ford approved $31.7 million covert aid, which was then halted by law after media revealed the operation. The Senate’s Church Committee and later the Pike Committee in the House were instrumental in uncovering this covert war. This episode is well documented by historians (secondary sources), who note it as an iconic failed CIA war, largely because democratic oversight (and public opinion post-Vietnam) decisively intervened. The CIA, for its part, never officially admitted running a war in Angola at the time – Director George H.W. Bush even obfuscated about continued aid after the ban – illustrating the agency’s reluctance to confirm covert ops. This case also underscores that, when covert action leaks, it can quickly become politically unsustainable. Nonetheless, gaps remain in the public narrative (e.g. the full extent of CIA’s collaboration with South African forces in Angola) – an area where continued declassification of CIA and South African archives could be enlightening.

Chile – Project FUBELT (1970–73) – The CIA’s covert campaign in Chile, aimed at preventing Marxist Salvador Allende from coming to power and later destabilizing his government, had mixed outcomes with notable failures. In 1970, under “Track II” (no-holds-barred covert action), CIA officers attempted to foment a coup to block Allende’s inauguration. They supplied weapons and encouragement to rogue Chilean officers, leading to the kidnapping of Chile’s Army Chief, Gen. René Schneider, who was killed in the botched abduction. This political murder, intended to unleash a military takeover, instead backfired – it outraged Chileans and rallied support for Allende, who took office as planned. The CIA’s role in Schneider’s assassination was denied for years, until the Church Committee uncovered evidence that CIA assets were involved (though the full truth is tangled, and the CIA insists it did not intend Schneider’s killing). Later, the CIA spent millions on propaganda, strikes, and coup-plotting (code-named Project FUBELT), which contributed to unrest but did not topple Allende outright. It was ultimately the Chilean military (led by Gen. Pinochet) that overthrew Allende in 1973 – with CIA at least in the know. No final CIA report was ever issued on these operations, and the U.S. only declassified extensive records in the late 1990s. Sources: The Church Committee and a CIA internal post-mortem (the Hinchey Report, 2000) serve as primary sources confirming CIA covert funding and contacts with Chilean plotters, including the group that killed Schneider. These sources call the outcome a “failure” in 1970 to prevent Allende – noting that instead of a quick coup, Chile got three years of socialist governance (until 1973). However, because CIA involvement in 1973 was indirect, the agency never “failed” at regime change in the long run (Pinochet succeeded). The real failure was ethical and covert: the CIA’s meddling was clandestine and unacknowledged, only becoming public through the Senate investigations and later declassification. There is still debate (and thus room for research) on questions like to what extent did U.S. covert pressures worsen Chile’s instability or influence Pinochet’s decision – questions explored in academic works using newly available documents from the National Security Archive.

By the late 1970s, the cumulative revelations of CIA abuses and failures – from assassination plots to domestic spying and covert wars – led to a wave of reform. The establishment of permanent congressional oversight committees (the HPSCI and SSCI in 1976) and new executive orders (e.g. banning assassinations) aimed to prevent future “rogue” operations. In practice, CIA covert action continued but under more scrutiny – which in some cases curtailed or exposed programs before they could fail spectacularly.

Late Cold War and Post-Cold War (1980s–1990s)

Iran-Contra Affair (1985–1986) – In the mid-1980s, the CIA became embroiled in the Iran-Contra scandal, an initiative run out of the National Security Council that secretly sold arms to Iran (despite an embargo) and diverted proceeds to fund the Contra rebels in Nicaragua – all while such aid was explicitly banned by Congress. CIA officers assisted in parts of the operation (for instance, flights of weapons to Central America and cash transfers) under direction from NSC staff like Oliver North. When this convoluted scheme leaked in late 1986, it exploded into a public scandal. The covert program’s exposure led to multiple investigations and embarrassed the Reagan administration. From CIA’s perspective, the episode was a failure in adhering to oversight law (the Boland Amendment) and damaged its reputation. Several CIA personnel were implicated (though CIA Director William Casey died before testifying, and his deputy was acquitted of cover-up charges). The CIA as an institution claimed it was following White House orders, but critics argue the Agency shirked its duty to inform Congress. Sources: The congressional Iran-Contra reports (primary source) and memoirs of officials show that once the secret deals were revealed (first by a Lebanese leak about Iran, then by reporter disclosures about Contra funding), the operation collapsed and became a case study in covert action run amok. This saga is well documented (e.g. the Tower Commission report, NSA Archive documents), so it provides a clear lesson on the perils of bypassing oversight. However, as a “program,” one might argue it partly succeeded (the Contras received aid longer than they otherwise would have) – yet the cost was a constitutional crisis and loss of trust, making it, by most measures, a strategic failure. The CIA officially never condoned the illegal aspects; in fact, the scandal prompted internal CIA reviews on how to avoid being misused in unlawful covert activities. The full extent of CIA knowledge is still debated, illustrating how gaps in public records (due to shredded documents and pardons limiting trials) leave some questions unanswered for researchers.

Afghanistan and Soviet Collapse (1979–1989) – One of the CIA’s largest covert programs, Operation CYCLONE, provided billions in weapons and aid to Afghan mujahideen fighting the Soviet army. Although ultimately the Soviets withdrew (1989), the long-term outcomes were mixed. This operation was not a “failure” in the immediate sense (it achieved the goal of bleeding the USSR). However, some analysts label its aftermath a pyrrhic victory, as it contributed to the rise of militant groups (like al-Qaeda and the Taliban) once the U.S. largely disengaged. Since this question focuses on failed secret programs, Afghanistan’s case is nuanced – tactically successful but strategically arguable. The CIA to this day emphasizes the success (and has acknowledged its involvement post-Cold War), so it’s not “unacknowledged” now. However, what remained secret until later was the extent of U.S. and Saudi coordination and the funneling of weapons (like Stinger missiles). Those details emerged through press leaks in the 1980s and declassified records in the 1990s. Sources: Contemporary journalism (e.g. reports by The Washington Post in the 1980s, secondary) and George Crile’s book Charlie Wilson’s War (based on interviews) provided early insight into the covert Afghan war. Now declassified State Department and CIA documents (primary) confirm the scope. While not a clear “failed program,” it’s often discussed in terms of blowback, a caution that even “successful” covert actions can sow future problems. The complexity of judging this program’s success vs. failure underscores a gap: few CIA internal assessments of long-term impact are public, so scholars must weigh outcomes with hindsight.

CIA and the Collapse of Soviet Bloc (late 1980s) – During the late Cold War, CIA engaged in various covert influence programs in Eastern Europe (supporting dissident publications, Solidarity in Poland, etc.). Most were moderately successful and later publicly acknowledged by U.S. officials in promoting democracy. But at least one rumored covert plan in this era was Project HAMMER, an alleged economic warfare program in the late 1980s to destabilize the Soviet economy via finance (this remains unproven conspiracy to some extent, with scant documentation – often cited by fringe sources rather than verified records). Without solid evidence, we exclude it here. However, it’s worth noting that plenty of Cold War covert “failures” might remain entirely unknown – only hinted at in memoirs. For example, KGB claims of thwarting multiple CIA sabotage plans in the USSR could contain truth, but without declassification it’s hard to assess those Cold War “might-have-beens.” Sources: KGB defector Vasili Mitrokhin’s files (secondary source, published in the Mitrokhin Archive) suggest a number of CIA missions were compromised, but cross-confirmation from CIA archives is lacking. This highlights an area needing further scholarly inquiry: comparing Eastern bloc intelligence archives with U.S. files to map covert operations that failed clandestinely (i.e. were stopped before they made news).

Counterintelligence Failures: The China Case (2010–2012) – As the calendar turned past the Cold War, the CIA still suffered devastating secret failures. A stark example: the loss of the CIA’s spy network in China around 2010–2012. Through either a mole or a communications security breach, Chinese counterintelligence identified and eliminated dozens of CIA informants. According to later leaks, at least 18–20 CIA sources were killed or imprisoned in China in this period, crippling the Agency’s insight into Beijing’s inner circles. One source was reportedly executed in front of a government building as a warning to others. This catastrophe remained secret at the time; CIA certainly did not acknowledge such a penetration. It only became public in 2017 when investigative journalists (at The New York Times and Reuters) broke the story based on insider accounts. The CIA and FBI had launched a joint hunt to find the cause of the breach – years later, a former CIA officer was arrested as a suspected mole, but the definitive explanation (human treason vs. cyber compromise) is still debated. Sources: Reuters and Al Jazeera (secondary sources based on NYT) reported that China “systematically dismantled CIA spying operations” by killing or jailing a dozen or more U.S. agents, in one of the worst intelligence failures in decades. The CIA officially “declined to comment” on these reports. This case, being recent, relies on anonymous officials for details and thus carries some uncertainty; however, multiple independent reports corroborate the magnitude of the losses. It highlights the enduring vulnerability of CIA operations and is a prime example where foreign intelligence successes (China’s counter-spy effort) directly translate to CIA’s covert failure. Much about it remains classified, a gap that might only be filled by future authorized histories or further whistleblower revelations.

Extraordinary Rendition Program (2001–2008) – In the post-9/11 era, the CIA ran a covert program of “extraordinary renditions,” abducting terror suspects abroad and transporting them to third countries or secret prisons for interrogation. While not a single operation but a series of them, several rendition missions went horribly wrong and came to light, embarrassing the Agency. A notable case: in February 2003, CIA officers in Milan kidnapped Abu Omar (Hassan Mustafa Nasr), an Egyptian cleric, and rendered him to Egypt, where he was tortured. The operation was supposed to be covert, but Italian authorities uncovered it. An Italian prosecutor bravely investigated and in 2005 issued indictments. In a landmark 2009 trial in absentia, 22 CIA operatives (and a U.S. Air Force colonel) were convicted by an Italian court for kidnapping. It was the first judicial conviction of CIA personnel for a clandestine operation in the War on Terror. The CIA, of course, never officially acknowledged the rendition (all officers had cover identities), and the U.S. government fought extraditions. One officer, Sabrina De Sousa, was arrested in Portugal in 2015 and nearly extradited, becoming a public face of the case. Separately, the CIA mistakenly rendered Khaled el-Masri, a German citizen, from Macedonia in 2004 – only realizing months later he was innocent. Masri’s story leaked and he ultimately won a judgment against the CIA’s partners at the European Court of Human Rights. These instances underscore operational failures (wrongful or sloppy targeting) and unintended consequences (legal fallout)Sources: Court documents and investigative journalism (primary and secondary) detail these renditions. For Abu Omar, the Italian trial evidence exposed the entire CIA network in Italy, including hotel bills and cell phone records of agents, a major security lapse. Amnesty International reports and The Guardian confirm the convictions of 22 CIA agents for the “illegal counter-terrorism practice known as extraordinary rendition,” calling it the only exhaustive legal examination of the program. These sources are highly reliable concerning facts of exposure and legal outcomes. The CIA’s refusal to comment or cooperate is also documented. To this day, the CIA has not officially admitted responsibility for these mistakes, illustrating how failed covert actions remain “open secrets.” Further research by legal scholars is exploring the impact of these cases on international law; however, many operational details (such as internal CIA reviews of botched renditions) are still classified.

Operation MERLIN (1997–2000) – In a curious case from the late 1990s, the CIA attempted a counter-proliferation trick that backfired. Under a clandestine effort dubbed by a whistleblower as “Operation Merlin,” the CIA sent a Russian nuclear scientist (a defector) to pass flawed blueprints for a nuclear weapon component to Iran’s government. The idea was to mislead and delay Iran’s nuclear program by having them incorporate hidden design defects. However, according to journalist James Risen (who exposed the program in his 2006 book State of War), the Russian intermediary noticed the flaws and may have alerted the Iranians that the designs were sabotaged. If true, this could have tipped off Iran and possibly helped rather than hurt their bomb efforts (by pointing out what not to do). Risen characterized Operation Merlin as “not only a failure but…one of the most reckless operations in the modern history of the CIA,” potentially aiding a member of the “axis of evil” to get the bomb. The CIA has never confirmed these allegations, and in fact it vehemently protested Risen’s account – though without providing specifics, as the program remained classified. The leak of Merlin led to the prosecution of former CIA officer Jeffrey Sterling, who was convicted in 2015 of providing classified info to Risen. During Sterling’s trial, CIA officials suggested that Risen’s book contained inaccuracies and that the operation might not have been as disastrous as claimed. Still, because details are secret, independent verification is limited. Sources: Risen’s investigative work (secondary, based on unnamed CIA sources and documents) first unveiled Merlin. The Washington Post’s reporting on Sterling’s trial (2015) confirms the basic outline: the CIA in 1997 tried to use a Russian engineer to give Iran faulty nuclear drawings; the operation ended in 2000 and was disclosed in 2006 by Risen’s book. Importantly, multiple CIA officers testified (anonymously) that parts of Risen’s story were wrong, but because they couldn’t reveal classified facts, observers are left with essentially one-sided data. Thus, Operation Merlin’s true outcome (did Iran recognize the flaw? did it set them back at all?) remains uncertain – a gap that only declassification or Iranian sources could fill. Regardless, Merlin is notable as a leaked covert op that the CIA still won’t acknowledge; it underscores the problem of assessing success/failure when only partial information is public. In the court of public opinion (and perhaps in internal CIA hindsight), it’s often judged a failure that risked helping the adversary.

CIA Cyber Leaks (2017) – The CIA’s covert operations are not limited to the physical world; they extend into cyberspace. And even there, failures occur. A dramatic example is the Vault 7 leaks: in 2017, WikiLeaks published a trove of CIA’s secret hacking tools and exploits, the largest data loss in CIA history. The cyber tools – developed by the CIA’s elite Engineering Development Group (EDG) – were supposed to remain closely guarded. The breach was internally viewed as a major failure of security. A CIA task force concluded in a 2017 report (declassified in part in 2020) that “our elite hackers prioritized building cyber weapons at the expense of securing their own systems,”leaving vulnerabilities that an insider (a CIA software engineer, Joshua Schulte) allegedly exploited to steal the data. The leak, dubbed “Vault 7,” alerted foreign adversaries to CIA techniques and caused the Agency to halt or change many operations whose cover was blown. Notably, the CIA did not initially acknowledge the leak’s authenticity – as per policy, it neither confirmed nor denied the WikiLeaks material. But subsequent court documents in Schulte’s trial, as well as a Senate Intelligence Committee inquiry (via Senator Ron Wyden), forced some official commentary, indirectly admitting the breach. Sources: The Washington Post obtained the CIA’s internal “WikiLeaks Task Force” report (a primary source) which criticized “woefully lax” security in the unit and noted the breach wasn’t even detected until WikiLeaks made it public. This provides authoritative evidence of the failure. Additionally, media coverage (secondary) highlighted that the CIA “might never have known” about the theft if it hadn’t been dumped online. This case illustrates a modern covert failure: not a mission gone awry in the field, but a secret program (cyber espionage capabilities) compromised by internal negligence and then laid bare for the world. It remains partly unacknowledged (CIA officials speak about it obliquely), and with Schulte’s trial ongoing as of 2025, more may yet come to light. The gap in knowledge here concerns exactly how the exfiltration went unnoticed – a question of interest to cybersecurity researchers and one the CIA likely examined extensively behind closed doors.

Patterns, Consequences, and Research Gaps

The cases above, spanning over 70 years, reveal recurring patterns in failed covert programs:

  • Exposure through Leaks and Investigations: Many operations were foiled not just on the ground, but after the fact by leaks or investigations that dragged them into public view. From the journalist-driven revelations of the 1970s (CIA abuses, assassinations, CHAOS) to the WikiLeaks dump of 2017, it’s clear that secrecy is a weak link– when broken, it magnifies the failure. A covert action might be quietly discontinued and forgotten, but once it’s exposed (especially amid scandal), it often sparks diplomatic fallout, legal action, or reforms. For example, the disclosure of CIA mining Nicaraguan harbors in 1984 led to a World Court judgment against the U.S. and a congressional ban; the leak of CIA torture tactics (via the 2014 Senate Torture Report) severely damaged U.S. prestige even though those black site programs were secret successes in the eyes of some officials. In all these cases, official CIA confirmation is lacking – the Agency rarely admits wrongdoing – yet the indirect acknowledgments (court cases, presidential apologies as with MKUltra) serve as proxies.
  • Operational Failures and Unintended Consequences: The CIA’s covert ventures often failed in their immediate objectives – e.g., failing to overthrow Castro or Communist regimes despite repeated triesfailing to foresee and prevent mole penetration (China, Ames, Hanssen cases), or failing to achieve regime change (Syria, 1957; Indonesia, 1958) while inadvertently driving targets closer to U.S. enemies. Even where the CIA achieved some short-term success, the long-term effects were often counterproductive (the classic example being Afghanistan’s “blowback”). Many programs had blowback on innocents or U.S. interests: MKUltra harmed test subjects and violated U.S. laws, Phoenix alienated the Vietnamese populace, the 1980s support to Saddam Hussein’s Iraq (covert intel sharing) helped enable a later adversary, etc. We see also moral and legal failures – CIA operatives crossing lines (assassination, torture, kidnapping) that, once exposed, undermined America’s moral standing and led to public scandals (e.g., the Church Committee termed the assassination plots a “rogue elephant” behavior, though it found presidential authorization in each case). These consequences highlight a need for evaluating covert ops not just by if they succeed, but at what cost. Researchers note that CIA after-action reviews (when available) sometimes acknowledge these strategic costs, but such documents are seldom declassified.
  • Lack of Accountability and Acknowledgment: A consistent theme is that failed operations are rarely officially acknowledged by the CIA, even decades later. The Agency tends to neither confirm nor deny involvement, or it minimizes the failure. For instance, it took 50+ years for the CIA to declassify something as innocuous as the Acoustic Kitty test, and even then the documents were sparse. In other cases, the CIA has admitted some role (e.g., acknowledging support to Chilean anti-Allende efforts) but still redacts key facts (like CIA’s knowledge of coup plotting). The result is that much of what we “know” comes from outside sources – journalists, whistleblowers, foreign intelligence disclosures, and partial declassifications. This patchwork can be problematic: some claims (especially from defectors or secondary authors) might be exaggerated or lack context. Cross-referencing multiple independent sources, as we attempted, helps build credible narratives. For example, the Albania operation’s failure is attested by Western archives, Soviet archives, and Albanian accounts, making it a solid fact. Conversely, something like the alleged CIA role in the 1981 plot against Panama’s Noriega remains mostly speculative because hard evidence is scant. Thus, a gap in current knowledge is that some rumored covert fiascos might remain unproven or only partially documented. Scholars must handle those with care, labeling them as hearsay until more data emerges.
  • Era-Specific Context: The Cold War context often drove extreme secret measures (anything to contain communism), yielding operations like Lumumba or Castro plots that, in hindsight, seem astonishing. In the post-9/11 era, the context of counterterrorism urgency led to excesses like renditions and torture sites, which later were deemed failures of American values. Understanding the geopolitical aims (e.g., preventing Soviet expansion, or after 2001 preventing terrorism) is key to understanding why these secret programs were attempted despite risks. Often the intended objectives were clear (assassinate X leader, influence X election, arm X rebels) but the actual outcomes diverged greatly – highlighting a classic covert pitfall: unpredictable “blowback” and target resilience.

Reliability of Sources: In compiling these cases, we leaned on a mix of source types. Primary sources – such as declassified CIA documents, official reports (Church Committee, etc.), court documents, and first-hand testimony – are generally most reliable for factual confirmation (e.g., number of agents lost, existence of a program). We have cited these wherever available (e.g., CIA memos on Albania, Senate reports on assassination plots, court rulings on renditions). However, primary sources are often incomplete (redactions, narrow scope) or biased (CIA internal memos may justify actions). Secondary sources – investigative journalists (e.g. Seymour Hersh, James Risen, Ellen Nakashima) and historians – provide analysis and often uncover secrets via unnamed sources. We treated these with a degree of caution but cited them when their credibility is reinforced by subsequent evidence. For example, Hersh’s 1974 reporting on CIA domestic spying was later wholly validated by Congress, enhancing its reliability. In some instances, only secondary accounts exist (Operation Merlin’s specifics rely on Risen; the Chinese spy network story relies on journalists with insider info). We flagged where the CIA disputes a claim or where sources are anonymous. Foreign intelligence disclosures (like KGB files or former officials’ memoirs from the other side) add another perspective; we used them sparingly here due to space, but they can corroborate CIA activities (e.g., the KGB knew of and fed false info to some CIA Cold War covert teams, contributing to their failure – a story told in Soviet archives). Each case would benefit from multi-archive research – combining U.S., allied, and adversary records to get the full picture.

Gaps and Further Research: Despite more openness since the 1990s, enormous gaps persist in our knowledge of CIA covert actions, especially failed or aborted ones. Many operations remain classified or only partially declassified, often with code names still secret. For instance, the full CIA internal histories of the 1950s Eastern Europe projects or the post-9/11 renditions program are not public. Researchers should pursue FOIA requests and Mandatory Declassification Reviews for specific programs (the National Security Archive has had success in prying loose documents on Guatemala 1954, Chile 1973, etc., and recently on MKULTRA). Congressional archives (e.g. closed hearing transcripts from Iran-Contra or the SSCI’s 2002–2008 oversight of War on Terror tactics) might yield clues if they become public. There is also room for oral history: as CIA officers retire, some share insights in interviews or memoirs (though often vetted by CIA’s review board). These personal accounts can reveal motives and regrets behind failures – for example, former CIA station chief Bob Ames expressed that the 1958 Indonesia operation was “ill-conceived” in hindsight (as cited in diplomatic oral histories). Engaging with such sources and cross-referencing them with documents can build a fuller narrative.

Another avenue is foreign archives and scholarship. As seen, British archives helped illuminate the Albania operation; Russian archives have shed light on how and why certain CIA plots failed (e.g., KGB’s role in tipping off Cuba about Bay of Pigs via double agents). Scholars fluent in foreign languages might explore archives in Cuba, Eastern Europe, the Middle East, and Asia for mentions of CIA covert ops. For instance, Eastern European state security files (Stasi, Polish SB) contain information on how those agencies countered CIA activities, which could detail unknown failures. Similarly, legal documents from foreign courts (Italy, Germany, even Pakistan or Turkey) where CIA activities have surfaced can be mined.

Finally, a deeper academic analysis of patterns (perhaps in intelligence journals) could be valuable: Why do covert actions fail? Some political science studies suggest covert regime change fails more often than it succeeds, yet leaders keep attempting it. Understanding the cognitive biases or systemic incentives that lead to repeating such risky endeavors is crucial. The cases here collectively suggest issues like over-optimistic assessments, poor inter-agency coordination, underestimation of local opposition, and the inherent difficulty of controlling complex events covertly. There is room for further scholarly inquiry into each of these factors, using these historical cases as data points.

Conclusion

From the Cold War to the present, the CIA’s secret operations have sometimes achieved stunning successes, but as this investigation shows, they have also produced a litany of failures – missions that backfired, remained unfinished, or caused serious fallout. These failures often remained officially unacknowledged, sometimes for decades, until independent actors dragged them into the light. Each case study carries lessons: about the limits of American power, the importance of oversight, and the unpredictable “Murphy’s Law” nature of covert action (where things that can go wrong often do). While intelligence work by nature is hidden and its full record will never be open, incrementally more is becoming known through declassification and leaks. We now know enough to see that failed covert programs are not anomalies but part of the CIA’s history, as much as the celebrated successes like tracking Osama bin Laden or facilitating the end of the Cold War.

For journalists, historians, and citizens, keeping a critical eye on these secret activities is essential. Significant gaps in knowledge persist – from the exact truth of contentious operations like Operation Merlin, to the identities of agents lost in various clandestine wars. Bridging those gaps requires continued research, including pressing for government transparency and creatively using foreign and open sources. The stakes are not merely academic: understanding past covert failures can inform better policy decisions and guard against future costly mistakes made in the shadows. As we’ve seen, covert operations might promise quick fixes to complex problems, but when they fail, the damage can be widespread – and the truth, though delayed, eventually emerges. Documenting that truth, as comprehensively as possible, remains a vital ongoing project.

Sources:

  • BBC World Service interview with historian on Albania operation (primary media source detailing Operation Valuable’s failure and casualties).
  • CIA declassified memo on Albania (1949) and BBC report (primary, confirming planning and outcome of Albania covert operation).
  • Al Jazeera analysis on U.S. covert action in Syria (secondary, citing declassified U.S. records and historian Douglas Little on Operations Straggle and Wappen’s failure).
  • ADST “Moments in History” – Diplomat Edward Ingraham’s account of the 1958 Indonesia rebellion and CIA pilot capture (primary oral history, eyewitness to fallout of CIA exposure).
  • War on the Rocks – James Lockhart’s commentary on the Church Committee’s assassination findings (secondary, summarizing primary Senate report on plots against Castro, Lumumba, etc.).
  • Church Committee Report “Alleged Assassination Plots against Foreign Leaders” (1975) (primary source, detailed evidence of CIA plans like ZR/RIFLE and outcomes – heavily cited through secondary sources above).
  • History.com and Smithsonian Magazine on Acoustic Kitty (secondary, based on CIA documents and interviews – confirmed by a declassified memo).
  • Smithsonian Magazine on Project Azorian (secondary, drawing on declassified CIA history by Norman Polmar and others – describes sub recovery failure and media exposure).
  • CIA official website “Exposing of Project AZORIAN” story (primary, CIA acknowledgment of 1975 media leak blowing Azorian’s cover).
  • Wikipedia (with citations) on Operation IA Feature (secondary aggregator, backed by references to Congressional records – notes how revelation led to Clark Amendment).
  • Modern War Institute at West Point analysis on Syria policy (secondary, citing multiple sources including NYT and academic studies – states Timber Sycamore program failed to achieve goals, aiding extremists inadvertently).
  • Washington Post reporting (2017) on ending CIA program in Syria (secondary, based on U.S. officials – acknowledges program’s ineffectiveness and termination).
  • Reuters report on Chinese penetration of CIA networks (secondary, citing U.S. officials via NYT – gives hard numbers on agents killed, CIA declined comment).
  • The Guardian coverage of the Abu Omar rendition case (secondary, recounting court verdicts – a reliable summary of the only prosecution of CIA kidnappings).
  • Washington Post (Walter Pincus, 2015) on Operation Merlin leak trial (secondary, describing Risen’s revelations and CIA’s characterization of them).
  • Washington Post (Ellen Nakashima, 2020) on Vault 7 internal report (secondary, quoting directly from a declassified CIA report – primary content – about the cyber tools leak and its cause).