The last article from Cryptogon mentions P2OG, or Proactive, Preemptive Operations Group.
The link from there leads to an article on a blog by Chris Floyd which quotes a New Yorker article by Seymour Hersh from 2005.
We have shown in Of Goats And Men how much of the "domestic terrorism", which validates the existance of Homeland Security, fusion centers and domestic surveillance, is actually created by the FBI through the use of informants who engineer the terror themselves with the help of willing dupes caught in sting operations. Often these dupes are reluctant to carry out the terror activities assigned to them by the FBI, so the FBI often entices them with rewards, in one case offering to help with a liver transplant for a sick relative if the mission is accomplished.
Well perhaps the foreign counterpart to this domestic fakery of terror would be the P2OG's. Their purpose, like their domestic counterparts, is to goad foreigners on foreign soil to commit terror, thus validating the foreign war element of the orchestrated and farcical War On Terror.
To quote Chris Floyd:
More than two years ago, we wrote here of a secret Pentagon plan to foment terrorism: sending covert agents to infiltrate terrorist groups and goad them into action – i.e., committing acts of murder and destruction. The purpose was two-fold: first, to bring the terrorist groups into the open, where they could be counterattacked; and second, to justify U.S. military attacks on the countries where the terrorists were operating – attacks which, in the Pentagon's words, would put those nations' "sovereignty at risk." It was a plan that countenanced – indeed, encouraged – the deliberate murder of innocent people and the imposition of U.S. military rule anywhere in the world that American leaders desired.
This plan is now being activated.
In fact, it's being expanded, as the New Yorker's Seymour Hersh revealed last week. Not only will U.S.-directed agents infiltrate existing terrorist groups and provoke them into action; the Pentagon itself will create its own terrorist groups and "death squads." After establishing their terrorist "credentials" through various atrocities and crimes, these American-run groups will then be able to ally with – and ultimately undermine – existing terrorist groups.
And to quote the original Seymour Hersh article:
...Under Rumsfeld’s new approach, I was told, U.S. military operatives would be permitted to pose abroad as corrupt foreign businessmen seeking to buy contraband items that could be used in nuclear-weapons systems. In some cases, according to the Pentagon advisers, local citizens could be recruited and asked to join up with guerrillas or terrorists. This could potentially involve organizing and carrying out combat operations, or even terrorist activities...
The new rules will enable the Special Forces community to set up what it calls “action teams” in the target countries overseas which can be used to find and eliminate terrorist organizations. “Do you remember the right-wing execution squads in El Salvador?” the former high-level intelligence official asked me, referring to the military-led gangs that committed atrocities in the early nineteen-eighties. “We founded them and we financed them,” he said. “The objective now is to recruit locals in any area we want. And we aren’t going to tell Congress about it.” A former military officer, who has knowledge of the Pentagon’s commando capabilities, said, “We’re going to be riding with the bad boys.”
Showing posts with label covert operations. Show all posts
Showing posts with label covert operations. Show all posts
Saturday, January 8, 2011
How the U.S. Let al-Qaida Get Its Hands On an Iraqi Weapons Factory
From Cryptogon.
This piece makes absolutely perfect sense, as long as you know that al-Qaida is run by CIA, and that one of the main objectives in any U.S. led war is to keep it going for as long as possible...
This piece makes absolutely perfect sense, as long as you know that al-Qaida is run by CIA, and that one of the main objectives in any U.S. led war is to keep it going for as long as possible...
Wednesday, July 21, 2010
Joint Special Operations University: Blogs and Military Information Strategy
From Cryptogon and Cryptome.
Quotes from the document:
"In this regard, information strategists can consider clandestinely recruiting or hiring prominent bloggers or other persons of prominence already within the target nation, group, or community to pass the U.S. message. In this way, the U.S. can overleap the entrenched inequalities and make use of preexisting intellectual and social capital. Sometimes numbers can be effective; hiring a block of bloggers to verbally attack a specific person or promote a specific message may be worth considering. On the other hand, such operations can have a blowback effect, as witnessed by the public reaction following revelations that the U.S. military had paid journalists to publish stories in the Iraqi press under their own names. People do not like to be deceived, and the price of being exposed is lost credibility and trust.
An alternative strategy is to “make” a blog and blogger..."
"...There are certain to be cases where some blog, outside the control of the U.S. government, promotes a message that is antithetical to U.S. interests, or actively supports the informational, recruiting and logistical activities of our enemies. The initial reaction may be to take down the site, but this is problematic in that doing so does not guarantee that the site will remain down. As has been the case with many such sites, the offending site will likely move to a different host server, often in a third country. Moreover, such action will likely produce even more interest in the site and its contents. Also, taking down a site that is known to pass enemy EEIs (essential elements of information) and that gives us their key messages denies us a valuable information source..."
"...Hacking the site and subtly changing the messages and data—merely a few words or phrases—may be sufficient to begin destroying the blogger’s credibility with the audience..."
"...There will also be times when it is thought to be necessary, in the context of an integrated information campaign, to pass false or erroneous information through the media, on all three layers, in support of military deception activities..."
Quotes from the document:
"In this regard, information strategists can consider clandestinely recruiting or hiring prominent bloggers or other persons of prominence already within the target nation, group, or community to pass the U.S. message. In this way, the U.S. can overleap the entrenched inequalities and make use of preexisting intellectual and social capital. Sometimes numbers can be effective; hiring a block of bloggers to verbally attack a specific person or promote a specific message may be worth considering. On the other hand, such operations can have a blowback effect, as witnessed by the public reaction following revelations that the U.S. military had paid journalists to publish stories in the Iraqi press under their own names. People do not like to be deceived, and the price of being exposed is lost credibility and trust.
An alternative strategy is to “make” a blog and blogger..."
"...There are certain to be cases where some blog, outside the control of the U.S. government, promotes a message that is antithetical to U.S. interests, or actively supports the informational, recruiting and logistical activities of our enemies. The initial reaction may be to take down the site, but this is problematic in that doing so does not guarantee that the site will remain down. As has been the case with many such sites, the offending site will likely move to a different host server, often in a third country. Moreover, such action will likely produce even more interest in the site and its contents. Also, taking down a site that is known to pass enemy EEIs (essential elements of information) and that gives us their key messages denies us a valuable information source..."
"...Hacking the site and subtly changing the messages and data—merely a few words or phrases—may be sufficient to begin destroying the blogger’s credibility with the audience..."
"...There will also be times when it is thought to be necessary, in the context of an integrated information campaign, to pass false or erroneous information through the media, on all three layers, in support of military deception activities..."
Labels:
brainwashing,
cointelpro,
covert operations,
MIND CONTROL,
special ops
Subscribe to:
Posts (Atom)