Difference between revisions of "Covert operations"

From Gender and Tech Resources

m (The Lavon Affair)
m
Line 7: Line 7:
 
</ref>. <em>[[Scenario planning]]</em>, the supportive application of <em>systems theory</em>, <em>game theory</em>, <em>wargaming theory</em><ref>Principia Cybernetics web http://pespmc1.vub.ac.be/TOC.html</ref><ref>Wargames, simulations, & exercises http://www.au.af.mil/au/awc/awcgate/awc-sims.htm</ref><ref>Flames of War: Historical Scenarios http://www.wwpd.net/p/historical-scenarios.html</ref> and many other modes of practical strategic thinking and strategic execution are also used.
 
</ref>. <em>[[Scenario planning]]</em>, the supportive application of <em>systems theory</em>, <em>game theory</em>, <em>wargaming theory</em><ref>Principia Cybernetics web http://pespmc1.vub.ac.be/TOC.html</ref><ref>Wargames, simulations, & exercises http://www.au.af.mil/au/awc/awcgate/awc-sims.htm</ref><ref>Flames of War: Historical Scenarios http://www.wwpd.net/p/historical-scenarios.html</ref> and many other modes of practical strategic thinking and strategic execution are also used.
  
== False flag operations ==
+
== Known false flag operations ==
  
 
=== Operation Himmler ===
 
=== Operation Himmler ===
Line 31: Line 31:
  
 
=== The CIA in Iran ===
 
=== The CIA in Iran ===
Documented by the <em>New York Times</em>, Iranians working for the C.I.A. in the 1950’s posed as Communists and staged bombings in Iran in order to turn the country against its democratically-elected president. <ref>Secrets of history: The CIA in Iran http://www.nytimes.com/library/world/mideast/041600iran-cia-index.html</ref>
+
Documented by the <em>New York Times</em>, Iranians working for the C.I.A. in the 1950’s posed as communists and staged bombings in Iran in order to turn the country against its democratically-elected president. <ref>Secrets of history: The CIA in Iran http://www.nytimes.com/library/world/mideast/041600iran-cia-index.html</ref>
  
 
=== Operation Northwoods ===
 
=== Operation Northwoods ===
 
Declassified documents show that in the 1960s, the US Joint Chiefs of Staff signed off on a plan code-named Operation Northwoods to blow up American airplanes (using an elaborate plan involving the switching of airplanes), and also to commit terrorist acts on American soil, and then to blame it on the Cubans in order to justify an invasion of Cuba. The operation was not carried out because the Kennedy administration refused to implement these Pentagon plans. <ref>The official northwoods documents http://nsarchive.gwu.edu/news/20010430/northwoods.pdf</ref>
 
Declassified documents show that in the 1960s, the US Joint Chiefs of Staff signed off on a plan code-named Operation Northwoods to blow up American airplanes (using an elaborate plan involving the switching of airplanes), and also to commit terrorist acts on American soil, and then to blame it on the Cubans in order to justify an invasion of Cuba. The operation was not carried out because the Kennedy administration refused to implement these Pentagon plans. <ref>The official northwoods documents http://nsarchive.gwu.edu/news/20010430/northwoods.pdf</ref>
 +
 +
... [tbd]
  
 
== Infiltration of dissident movements ==
 
== Infiltration of dissident movements ==

Revision as of 09:08, 4 June 2015

“History isn’t like that. History unravels gently, like an old sweater. It has been patched and darned many times, reknitted to suit different people, shoved in a box under the sink of censorship to be cut up for the dusters of propaganda, yet it always – eventually – manages to spring back into its old familar shape. History has a habit of changing the people who think they are changing it. History always has a few tricks up its frayed sleeve. It’s been around a long time.” ~ Terry Pratchett, Mort

Discoveries and experiences are being shared, conspiracies disclosed, injustices revealed, the dead named, and sometimes governments change as a result of that. Or, when a government changes, more likely it is caused by covert operations.

Strategies

How it works? Around 80% is copycatting strategies Napoleon used [1]. Scenario planning, the supportive application of systems theory, game theory, wargaming theory[2][3][4] and many other modes of practical strategic thinking and strategic execution are also used.

Known false flag operations

Operation Himmler

Operation Himmler was a series of unconventional operations undertaken by the SS in order to serve specific propaganda goals of Nazi Germany at the outbreak of the war. It was intended to create the appearance of Polish aggression against Germany in order to justify the subsequent invasion of Poland. Most known is the Gleiwitz incident. [5] And it has been persuasively argued that Nazis set fire to their own parliament, the Reichstag, and blamed that fire on others. [6] The Reichstag fire was the watershed event which justified Hitler’s seizure of power and suspension of liberties.

Shelling of Mainila

The Shelling of Mainila on November 26, 1939 was a military incident where the Soviet Union's Red Army shelled the Russian village of Mainila, declared that the fire originated from Finland across a nearby border and claimed to have had losses in personnel. Soviet leader Nikita Khrushchev admitted in writing that the Soviet Union’s Red Army shelled the Russian village of Mainila in 1939, and declared that the fire originated from Finland as a basis launching the Winter War four days later. [7]

Stay Behind (Gladio)

Gladio is the infamous NATO “stay behind” operations in Europe during the Cold War that were revealed in the nineties, a tale of secret arms caches and exotic code names, of military stratagems and political intrigues. A chronology of events is described in Secret Warfare: Operation Gladio and NATO's Stay-Behind Armies. [8]

Prime Minister Andreotti acknowledged that Gladio had developed into a branch of an extensive network, operated within NATO and abetted by a 1956 agreement between the United States and Italian secret services. Germany, France, Belgium, the Netherlands, Greece and Luxembourg have all acknowledged that they maintained Gladio-style networks to prepare guerrilla fighters to leap into action in the event of a Warsaw Pact invasion. Many worked under the code name Stay Behind. In Greece it was named operation Red Sheepskin. According to news reports at the time, such operations existed also in Britain, Norway, Portugal, Spain, Austria, Turkey and Denmark, and even in neutral countries like Switzerland and Sweden.

Bombings and actions were denied, but note that the aim of the 1956 agreement with US agencies was to make sure that the italian communist party, the largest in the west, never got a foothold in the government. And there were long-reported links between Italian secret services and neo-fascists, and that the major unsolved acts of terrorism that rocked Italy in the 1970's are all presumed to be the work of people on the far right that were never caught while left-wing 'terrorists' somehow were caught and imprisoned.

In some countries, the Stay Behind networks were shut down. Greece's socialists say that they discovered theirs in 1981, subsequently abolished it and rounded up weapons in 1985. In France, Mitterrand said he eliminated the French branch, but he did not say when. Apparently the networks in most other european countries continued.

The Lavon Affair

An Israeli terrorist cell operating in Egypt planted bombs in several buildings, including U.S. diplomatic facilities, then left behind "evidence" implicating the Arabs as the culprits. One of the bombs detonated prematurely, allowing the Egyptians to identify the bombers, several of the Israelis later confessed, and three were honored by Israel later. [9][10]

The CIA in Iran

Documented by the New York Times, Iranians working for the C.I.A. in the 1950’s posed as communists and staged bombings in Iran in order to turn the country against its democratically-elected president. [11]

Operation Northwoods

Declassified documents show that in the 1960s, the US Joint Chiefs of Staff signed off on a plan code-named Operation Northwoods to blow up American airplanes (using an elaborate plan involving the switching of airplanes), and also to commit terrorist acts on American soil, and then to blame it on the Cubans in order to justify an invasion of Cuba. The operation was not carried out because the Kennedy administration refused to implement these Pentagon plans. [12]

... [tbd]

Infiltration of dissident movements

War games

Countermoves

News and watchdogs

Books

Documentaries

Counterintelligence

Related

References

  1. The Hidden Hand: Espionage and Napoleon http://www.thedearsurprise.com/the-hidden-hand-espionage-and-napoleon/
  2. Principia Cybernetics web http://pespmc1.vub.ac.be/TOC.html
  3. Wargames, simulations, & exercises http://www.au.af.mil/au/awc/awcgate/awc-sims.htm
  4. Flames of War: Historical Scenarios http://www.wwpd.net/p/historical-scenarios.html
  5. Nuremberg Trial Proceedings Volume 4 TWENTY-FOURTH DAY Thursday, 20 December 1945, morning session: http://avalon.law.yale.edu/imt/12-20-45.asp
  6. History Channel: The Rise of the Third Reich https://www.youtube.com/watch?v=lTQ4TILv3RQ
  7. Diplomatic correspondence between Finnish and Russian Governments (in Russian) http://www.aroundspb.ru/finnish/docs/dir0note.php
  8. Secret Warfare: Operation Gladio and NATO's Stay-Behind Armies http://www.php.isn.ethz.ch/collections/coll_gladio/chronology.cfm?navinfo=15301
  9. Israel Military Intelligence: The Lavon Affair (Summer 1954) http://www.jewishvirtuallibrary.org/jsource/History/lavon.html
  10. Israel honors 9 egyptian spies http://www.ynetnews.com/Ext/Comp/ArticleLayout/CdaArticlePrintPreview/1,2506,L-3065838,00.html
  11. Secrets of history: The CIA in Iran http://www.nytimes.com/library/world/mideast/041600iran-cia-index.html
  12. The official northwoods documents http://nsarchive.gwu.edu/news/20010430/northwoods.pdf