In 1967, the CIA distributed a memo to its field offices providing guidance on how to counter growing public skepticism about the Warren Commission’s findings on the Kennedy assassination. The memo, declassified in 1976 under document number 1035-960, recommended that agency assets in media and academia deploy specific rhetorical techniques to discredit critics: associate them with paranoia, stress that no credible new evidence had been presented, suggest their motivations were financial or attention-seeking, and use the existing associations of the term “conspiracy theory” to undercut their credibility. The memo did not invent the term — it predates the CIA — but it operationalized its negative connotations as a tool of institutional discrediting.
This is documented. The document exists. The strategy it describes was implemented.
It is also the template for a technique that has become so embedded in mainstream discourse that most people apply it without knowing its origin or recognizing it as a technique at all.
How the Technique Works
The goal of the technique is not to refute specific claims. Refuting specific claims requires engaging with evidence, which creates the risk that the evidence will be found more compelling than expected. The goal is to make certain categories of claims socially costly to advance regardless of their evidentiary basis.
This is accomplished through label application. Once a claim is categorized as a “conspiracy theory,” it inherits all the social associations of that label: paranoia, credulity, social marginalization, intellectual disrepute. The person advancing the claim is no longer evaluated on the quality of their evidence. They are evaluated on whether they fall inside or outside the boundary of respectable opinion.
The label functions as a thought-terminating cliche. It ends inquiry rather than advancing it. It is epistemically worthless — it tells you nothing about whether a claim is true or false — but socially very powerful.
The Selection Problem
Not all “conspiracy theories” are equally credible. Some are nonsense. Some are partially true. Some are entirely accurate. The technique works precisely because it applies the same label to all of them, flattening the distinction between carefully reasoned analysis of documented government programs and unfounded speculation about lizard people.
The flattening is not accidental. It is functionally useful. If the label “conspiracy theory” successfully groups together the claim that the moon landing was faked (almost certainly false) with the claim that the CIA ran drugs through Central America to fund covert operations (documented and confirmed by the Kerry Committee in 1989), then the technique successfully protects the confirmed truth from the scrutiny it would otherwise receive.
The Confirmed Conspiracy Problem
This is where the technique faces its most serious logical challenge: the list of confirmed conspiracies is long, well-documented, and includes events that were labeled conspiracy theories before their confirmation. COINTELPRO. MKULTRA. Operation Northwoods. The Tuskegee syphilis experiments. Mass warrantless surveillance by the NSA. The existence of Area 51. Extraordinary rendition.
Each of these was, at some point, a “conspiracy theory” — an allegation of coordinated government wrongdoing that mainstream sources dismissed as paranoid speculation. Each was confirmed by documentary evidence, often released decades after the events. The people who alleged these conspiracies before confirmation were applying the same reasoning process as the people who were wrong. The difference was that they were also right.
What Epistemically Honest Inquiry Looks Like
Epistemically honest inquiry into claims of government or institutional wrongdoing looks exactly like inquiry into any other empirical question: evaluate the evidence, assess the quality of sources, consider alternative explanations, update probability estimates as new information arrives, and remain willing to be wrong.
It does not apply social penalties for asking questions. It does not treat the discomfort of powerful institutions as evidence of a claim’s falsity. It does not confuse the social marginalization of a claim with its epistemological status.
The technique exists because honest inquiry is dangerous to certain interests. Understanding that the technique exists, and recognizing when it is being deployed, is the first requirement for thinking clearly in an information environment designed to prevent it.
Leave a Reply