Difference between revisions of "Covert operations"

From Gender and Tech Resources

m
m (Strategies)
Line 1: Line 1:
 
<em>“History isn’t like that. History unravels gently, like an old sweater. It has been patched and darned many times, reknitted to suit different people, shoved in a box under the sink of censorship to be cut up for the dusters of propaganda, yet it always – eventually – manages to spring back into its old familar shape. History has a habit of changing the people who think they are changing it. History always has a few tricks up its frayed sleeve. It’s been around a long time.” ~ Terry Pratchett, Mort</em>
 
<em>“History isn’t like that. History unravels gently, like an old sweater. It has been patched and darned many times, reknitted to suit different people, shoved in a box under the sink of censorship to be cut up for the dusters of propaganda, yet it always – eventually – manages to spring back into its old familar shape. History has a habit of changing the people who think they are changing it. History always has a few tricks up its frayed sleeve. It’s been around a long time.” ~ Terry Pratchett, Mort</em>
  
Discoveries and experiences are being shared, conspiracies disclosed, injustices revealed, the dead named, and sometimes governments change as a result of that. Or, when a government changes it is caused by covert operations.
+
Discoveries and experiences are being shared, conspiracies disclosed, injustices revealed, the dead named, and sometimes governments change as a result of that. Or, when a government changes, more likely it is caused by covert operations.
  
 
== Strategies ==
 
== Strategies ==
 +
How it works? Around 80% is copycatting strategies Napoleon used <ref>The Hidden Hand: Espionage and Napoleon http://www.thedearsurprise.com/the-hidden-hand-espionage-and-napoleon/
 +
</ref>. <em>[[Scenario planning]]</em>, the supportive application of <em>systems theory</em>, <em>game theory</em>, <em>wargaming theory</em><ref>Principia Cybernetics web http://pespmc1.vub.ac.be/TOC.html</ref><ref>Wargames, simulations, & exercises http://www.au.af.mil/au/awc/awcgate/awc-sims.htm</ref> and many other modes of practical strategic thinking and strategic execution are also used.
  
=== Strategy of tension ===
+
== False flag operations ==
 +
 
 +
=== Stay Behind ===
 +
Gladio is the infamous NATO “stay behind” operations in Europe during the Cold War that were revealed in the nineties, a tale of secret arms caches and exotic code names, of military stratagems and political intrigues. A chronology of events is described in Secret Warfare: Operation Gladio and NATO's Stay-Behind Armies. <ref>Secret Warfare: Operation Gladio and NATO's Stay-Behind Armies http://www.php.isn.ethz.ch/collections/coll_gladio/chronology.cfm?navinfo=15301
 +
</ref>
 +
 
 +
Prime Minister Andreotti acknowledged that Gladio had developed into a branch of an extensive network, operated within NATO and abetted by a 1956 agreement between the United States and Italian secret services. Germany, France, Belgium, the Netherlands, Greece and Luxembourg have all acknowledged that they maintained Gladio-style networks to prepare guerrilla fighters to leap into action in the event of a Warsaw Pact invasion. Many worked under the code name Stay Behind. In Greece it was named operation Red Sheepskin. According to news reports at the time, such operations existed also in Britain, Norway, Portugal, Spain, Austria, Turkey and Denmark, and even in neutral countries like Switzerland and Sweden.
 +
 
 +
Bombings and actions were denied, but note that the aim of the 1956 agreement with US agencies was to make sure that the italian communist party, the largest in the west, never got a foothold in the Government. And there were long-reported links between Italian secret services and neo-fascists, and that the major unsolved acts of terrorism that rocked Italy in the 1970's are all presumed to be the work of people on the far right that were never caught while left-wing 'terrorists' somehow were caught and imprisoned.
 +
 
 +
== Infiltration of dissident movements ==
 +
 
 +
== War games ==
  
 
== Countermoves ==
 
== Countermoves ==

Revision as of 06:12, 4 June 2015

“History isn’t like that. History unravels gently, like an old sweater. It has been patched and darned many times, reknitted to suit different people, shoved in a box under the sink of censorship to be cut up for the dusters of propaganda, yet it always – eventually – manages to spring back into its old familar shape. History has a habit of changing the people who think they are changing it. History always has a few tricks up its frayed sleeve. It’s been around a long time.” ~ Terry Pratchett, Mort

Discoveries and experiences are being shared, conspiracies disclosed, injustices revealed, the dead named, and sometimes governments change as a result of that. Or, when a government changes, more likely it is caused by covert operations.

Strategies

How it works? Around 80% is copycatting strategies Napoleon used [1]. Scenario planning, the supportive application of systems theory, game theory, wargaming theory[2][3] and many other modes of practical strategic thinking and strategic execution are also used.

False flag operations

Stay Behind

Gladio is the infamous NATO “stay behind” operations in Europe during the Cold War that were revealed in the nineties, a tale of secret arms caches and exotic code names, of military stratagems and political intrigues. A chronology of events is described in Secret Warfare: Operation Gladio and NATO's Stay-Behind Armies. [4]

Prime Minister Andreotti acknowledged that Gladio had developed into a branch of an extensive network, operated within NATO and abetted by a 1956 agreement between the United States and Italian secret services. Germany, France, Belgium, the Netherlands, Greece and Luxembourg have all acknowledged that they maintained Gladio-style networks to prepare guerrilla fighters to leap into action in the event of a Warsaw Pact invasion. Many worked under the code name Stay Behind. In Greece it was named operation Red Sheepskin. According to news reports at the time, such operations existed also in Britain, Norway, Portugal, Spain, Austria, Turkey and Denmark, and even in neutral countries like Switzerland and Sweden.

Bombings and actions were denied, but note that the aim of the 1956 agreement with US agencies was to make sure that the italian communist party, the largest in the west, never got a foothold in the Government. And there were long-reported links between Italian secret services and neo-fascists, and that the major unsolved acts of terrorism that rocked Italy in the 1970's are all presumed to be the work of people on the far right that were never caught while left-wing 'terrorists' somehow were caught and imprisoned.

Infiltration of dissident movements

War games

Countermoves

News and watchdogs

Books

Documentaries

Counterintelligence

Related

References

  1. The Hidden Hand: Espionage and Napoleon http://www.thedearsurprise.com/the-hidden-hand-espionage-and-napoleon/
  2. Principia Cybernetics web http://pespmc1.vub.ac.be/TOC.html
  3. Wargames, simulations, & exercises http://www.au.af.mil/au/awc/awcgate/awc-sims.htm
  4. Secret Warfare: Operation Gladio and NATO's Stay-Behind Armies http://www.php.isn.ethz.ch/collections/coll_gladio/chronology.cfm?navinfo=15301