The Archive Is Open: The Most Disturbing Declassified Government Documents You Can Read Right Now and What They Actually Confirm
The most useful thing about declassified documents is that they end arguments. They are the government's own words, on the government's own letterhead, signed by the government's own officials, describing what the government did. They are not allegations. They are not conspiracy theories. They are the record. The problem with the record is not that it is hidden -- most of the most disturbing documents are publicly available and have been for years or decades. The problem is that most people have never read them, and a significant portion of those who have read descriptions of them have encountered those descriptions through sources that dramatized selectively, omitted inconvenient qualifications, or failed to distinguish between what the documents confirm and what the documents suggest. This article is about what the record actually says. Not what people claim it says. Not what would be most convenient for any position. What is in the documents.
Key Takeaways
- Operation Northwoods (1962, declassified 1997): The Joint Chiefs of Staff formally proposed staging false flag terrorist attacks on American citizens -- bombings, airline hijackings, assassinations -- to be blamed on Cuba as a pretext for invasion. Kennedy rejected it. It was a real proposal by the highest military leadership in the country.
- COINTELPRO (1956-1971, exposed 1971): FBI program to surveil, infiltrate, discredit, and neutralize domestic political organizations. Internal documents confirm the FBI sent Martin Luther King Jr. an anonymous letter urging him to commit suicide. The program was discovered not by congressional oversight but by activists who broke into an FBI field office.
- The Pentagon Papers (1967, leaked 1971): Defense Department analysis confirming that four administrations systematically lied to Congress and the public about Vietnam. The study concluded the war was unwinnable by 1967 -- while its authors' superiors publicly insisted otherwise.
- CIA Assassination Manuals: Declassified CIA documents from Cold War programs include explicit guidance on the conduct of assassination operations, produced and distributed within the agency as operational training material.
- VENONA (1943-1980, declassified 1995): Decrypted Soviet intelligence communications confirming extensive spy networks inside the US government, including sources in the State Department, Treasury, OSS, and Manhattan Project. Evidence the government held for decades that it could not use in court without revealing its surveillance capability.
Operation Northwoods: The Proposal to Kill Americans for a War Pretext
The document is real and you can read it. It is available through the National Security Archive at George Washington University. Its full title is "Justification for US Military Intervention in Cuba," and it was submitted to Secretary of Defense Robert McNamara by the Joint Chiefs of Staff on March 13, 1962. It proposes, in explicit operational detail, that the CIA and other US government operatives stage a series of false flag terrorist attacks on American soil and against American citizens, to be attributed to the Cuban government, in order to generate domestic political support for military intervention in Cuba.
The proposals are specific. They include the development of "a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington" involving real bombings with real civilian casualties. They include the harassment of Cuban refugees "sinking a boat load of Cubans enroute to Florida (real or simulated)." They include friendly fire operations against American military personnel. They include the staging of a fake Cuban military attack on the US base at Guantanamo. They include a particularly elaborate operation involving the substitution of a chartered aircraft with a remote-control drone painted to match the markings of a registered commercial flight, which would be flown over Cuba and destroyed, while a fake distress call attributing the destruction to Cuban surface fire was broadcast, and while the original passengers had been secretly transferred to another aircraft before the deception flight.
Kennedy rejected the proposal. McNamara's response to it is not definitively documented in the declassified record. General Lyman Lemnitzer, the Chairman of the Joint Chiefs who signed the document, was subsequently removed as Chairman (for reasons Kennedy did not publicly state). The document was classified, and its existence was unknown to the public for 35 years. It was declassified in 1997 as part of the JFK Assassination Records Collection Act and was given its widest public exposure in James Bamford's 2001 book Body of Secrets. Its significance is not speculative. The document exists. Its content is what it is. The question it raises -- whether similar proposals have been made and approved at other times, by other administrations, for other pretexts -- cannot be answered by any currently available public record.
COINTELPRO: The FBI's War on Its Own Citizens
The documents that exposed COINTELPRO were not obtained through a FOIA request or a congressional investigation. They were stolen. On March 8, 1971, a group calling itself the Citizens' Commission to Investigate the FBI broke into the FBI's Media, Pennsylvania field office and removed approximately 1,000 documents. The burglary was timed specifically to coincide with the Muhammad Ali vs. Joe Frazier boxing match, on the calculation that the field office would be unoccupied and distant monitoring would be minimal during a major national broadcast. The documents were distributed to journalists and to members of Congress. The group that stole them was not publicly identified until 2014, when the members chose to come forward in a book about the operation.
The documents they leaked introduced the word "COINTELPRO" to the public. The FBI's Counterintelligence Program had operated from 1956 to that date across a range of domestic targets: the Communist Party USA (the original target), the Socialist Workers Party, the Ku Klux Klan, and -- most extensively documented in the stolen files -- civil rights organizations including the Southern Christian Leadership Conference, the NAACP, the Student Nonviolent Coordinating Committee, and the Black Panther Party.
The specific tactics documented in the files and subsequent Church Committee investigations include: anonymous letters designed to inflame tensions between targeted groups, hoping to provoke violence; forged documents attributed to leaders of targeted organizations; anonymous tips to law enforcement designed to result in arrests on false or exaggerated charges; the planting of informants who sometimes actively encouraged criminal activity within the organizations they had infiltrated; and -- the most famous example -- an anonymous letter sent to Martin Luther King Jr. in November 1964, which the Church Committee investigation confirmed was written by an FBI official, which catalogued alleged sexual misconduct attributed to King, characterized him as "a colossal fraud" and "an evil, abnormal beast," and concluded: "There is but one way out for you. You better take it before your filthy, abnormal fraudulent self is bared to the nation." The letter was accompanied by a recording. It was interpreted by King and his advisers as an instruction to commit suicide. King did not comply. The person who wrote the letter never faced criminal charges.
The Pentagon Papers: Four Administrations of Documented Lies
Daniel Ellsberg was not a radical. When he photocopied the 7,000-page Defense Department study he had helped produce -- the analysis that would become the Pentagon Papers -- he was a Harvard-educated RAND Corporation analyst with a history of hawkish defense positions. What changed his position was reading the study itself: a systematic documentation, commissioned by Defense Secretary Robert McNamara, of how four consecutive presidential administrations had known things about Vietnam that were categorically inconsistent with what they were telling Congress and the American public.
The study found that the Truman administration had committed the US to French colonialism in Indochina against the stated American principle of self-determination. That the Eisenhower administration had committed the US to a South Vietnamese government it knew to be deeply unpopular and had sabotaged a 1956 election it knew Ho Chi Minh would win because the US preferred an undemocratic outcome to a democratic one it did not like. That the Kennedy administration had substantially expanded the US commitment while publicly insisting on its limited character. That the Johnson administration had made the decision to escalate to full military intervention through the Gulf of Tonkin Resolution on the basis of an incident it knew was significantly misrepresented -- and had continued the war for years while its own analysis estimated no path to a favorable military resolution.
Ellsberg offered the documents to members of Congress before going to the press. Each declined to use them. He went to the New York Times. The Nixon administration obtained a prior restraint injunction against publication -- the first such injunction against a US newspaper since the Civil War. The Supreme Court overturned it 6-3 in New York Times Co. v. United States, one of the most consequential First Amendment decisions in American history, in 1971. The Nixon administration subsequently organized the "Plumbers" unit to discredit Ellsberg, including an illegal break-in to his psychiatrist's office. The operational decisions made in response to the Pentagon Papers disclosure contributed directly to what became the Watergate scandal.
CIA Assassination Programs: What the Documents Confirm
The Church Committee's 1975 investigation produced a detailed report, Alleged Assassination Plots Involving Foreign Leaders, documenting CIA involvement in plots against Fidel Castro, Patrice Lumumba, Raphael Trujillo, Ngo Dinh Diem, and Rene Schneider. The report documented that the CIA had contracted with organized crime figures for the Castro plots (specifically, mobsters Sam Giancana and John Roselli, with whom CIA officer William Harvey was the operational contact). It documented that the CIA had sent poison to the Congo for use against Lumumba -- though Lumumba was killed by Congolese forces before the CIA poison could be administered. It documented that weapons sent to "dissident elements" in the Dominican Republic were used in the assassination of Trujillo, creating a question about the causality that the Committee ultimately left unresolved.
Beyond the assassination plots, declassified CIA training materials from the Cold War period have produced several documents whose content is remarkable on its own terms. The Human Resource Exploitation Training Manual -- a 1983 CIA manual used to train interrogation techniques to Latin American security forces -- describes in operational detail the psychological and physical methods for "breaking" a subject's will to resist interrogation including sleep deprivation, pain application, and false imprisonment techniques. It was declassified in 1997 with extensive redactions. The document's existence confirms that the CIA was, as recently as 1983, actively training foreign security forces in techniques that its own subsequent standards would classify as torture.
VENONA: The Evidence That Changed Everything Except the Convictions
The VENONA decryptions present one of the most complex evidentiary situations in the history of American intelligence. From 1943 to 1980, the US Army's Signal Intelligence Service (later the NSA) worked to decrypt Soviet intelligence cable traffic sent from the US to Moscow in the 1940s. The program produced decryptions identifying hundreds of individuals who had provided information to Soviet intelligence -- names obscured in the cables by code names, but cross-referenced through analytical work and additional intercepts to identifiable individuals.
The decryptions confirmed, among many other identifications, that Julius Rosenberg had provided nuclear weapon design information to Soviet intelligence. They identified Alger Hiss -- a senior State Department official who had denied being a Soviet agent before Congress and was convicted of perjury in 1950 -- as a Soviet asset. They identified sources within the OSS (the wartime precursor to the CIA), the Treasury Department, the State Department, and the Manhattan Project. They confirmed that the extent of Soviet penetration of the US government in the 1940s was substantially greater than even the most aggressive congressional investigations of the era had publicly claimed.
The reason this evidence matters beyond historical interest is what the government did and did not do with it. The VENONA program was classified at a level that prevented its evidence from being introduced in open court. Individuals whose code names appeared in the decryptions and whom the government had identified as Soviet agents were, in some cases, tried on other evidence; in other cases, they were never prosecuted; in still other cases, they were prosecuted and convicted on the public record while the government held separate, classified confirmation of their guilt that it could not reveal without destroying the program. The secrecy that makes intelligence programs valuable simultaneously prevents the justice system from functioning as designed. VENONA is the clearest historical example of how far those two imperatives can diverge.
Transmission Intercepts: Witness Accounts
"I work with federal document archives professionally. The gap between what is classified and what has been declassified is not the gap between 'dangerous' and 'safe to release.' It's the gap between 'someone reviewed this' and 'no one has gotten to it yet.' The most disturbing documents I've read were released administratively, not because anyone was paying attention to them. The review system is not systematic. It's not a wall. It's a filter with holes in it."
-- Listener submission, received January 2026
"Operation Northwoods is the document that broke me out of naive trust. Not because it worked -- Kennedy killed it immediately. But because it was written. Because 30 people signed off on it through a bureaucratic chain. Because it went from an idea to a formal proposal with operational appendices. The system that produced that document is the same system. It didn't change. Only the specific proposal was rejected."
-- Listener submission, received February 2026