Are We Boiling Frogs?
Page 10
The existence of these clandestine NATO
units remained a closely guarded secret
throughout the Cold War until 1990, when
the first branch of the international network
was discovered in Italy. It was code-named
Gladio, the Italian word for a short double-
edged sword [gladius]. While the press said
that the NATO stay-behind units were 'the
best-kept, and most damaging, political-
military secret since World War II', the
Italian government, amidst sharp public
criticism, promised to close down the secret
army. Italy insisted identical clandestine
units had also existed in all other countries
of Western Europe. This allegation proved
correct and subsequent research found that
in Belgium, the secret NATO unit was code-
named SDRA8, in Denmark Absalon, in
Germany TD BDJ, in Greece LOK, in
77
A Dangerous Ideology
Luxemburg Stay-Behind, in the Netherlands
I&O, in Norway ROC, in Portugal Aginter
Press, in Spain Red Quantum, in
Switzerland P26, in Turkey Özel Harp
Dairesi, In Sweden AGAG (Aktions Gruppen
Arla Gryning), in France 'Plan Bleu', and in
Austria OWSGV; however, the code name of
the stay-behind unit in Finland remains
unknown”
Consequently, in November 1990, the European Parliament
published its 'Resolution on the Gladio Affair.' This single
page document stated a number of known facts relating to
the near 40-year-long covert Operation Gladio.[48] The
European Parliament stated:
“.....in certain Member States military secret
services (or uncontrolled branches thereof)
were involved in serious cases of terrorism
and crime as evidenced by, various judicial
inquiries.”
“....these organizations operated and
continue to operate completely outside the
law since they are not subject to any
parliamentary control and frequently those
holding the highest government and
constitutional posts are kept in the dark as
to these matters.”
“....various 'Gladio' organizations have at
their disposal independent arsenals and
military resources which give them an
unknown strike potential, thereby
jeopardizing the democratic structures of the
countries in which they are operating or
have been operating.”
The resolution then recommended that European
governments should:
“ Protests vigorously at the assumption by
certain US military personnel at SHAPE
(Supreme Headquarters Allied Powers
78
A Dangerous Ideology
Europe) and in NATO (North Atlantic Treaty
Organisation) of the right to encourage the
establishment in Europe of a clandestine
intelligence and operation network.”
“ ......dismantle all clandestine military and
paramilitary networks.”
The NATO, CIA and MI6 response was muted. They partly
refused to talk about it on grounds of 'national security' or
'military secrecy,' but left the Italian and European
parliamentary findings unchallenged. This is about as far as
the 'official narrative' goes. The European Parliament
charged its member states to root out the Gladio networks
and directed NATO to shut the operation down. End of story.
However, the extent to which NATO, as an intergovernmental
military alliance of independent states, was ever fully in
control of Gladio is debatable.
Gladio's use of 'stay behind' units predated the formation of
NATO in 1949. Its practical operation was eventually
overseen by the CIA and MI6. Other national intelligence
agencies were involved, notably the Italian's Servizio
Informazioni Difesa (SID - reconfigured in 1977) but the
ability of national security services, beyond the CIA or MI6,
to authorise Gladio operations remains in question.
NATO's Clandestine Planning Committee (CPC), under the
auspices of S.H.A.P.E (Supreme Headquarters Allied Powers
Europe), was supposedly running things. However, by 1957
the operational control of Gladio had been brought under the
Allied Clandestine Committee (ACC) who were overseen by
the U.S. Supreme Allied Commander in Europe, reporting
directly to the Pentagon. In 1963 that command was taken
by General Lyman Lemnitzer. He remains unique as the only
U.S. general to have served as Army Chief of Staff, Chairman
of the Joint Chiefs of Staff and Supreme Allied Commander
for NATO.[49]
It was Lemnitzer who approved Operation Northwoods
proposal to use false flag attacks to provoke a U.S. military
confrontation with Cuba. Whether he was a key figure in
moving Gladio from a defensive to offensive operation, isn't
79
A Dangerous Ideology
entirely clear. NATO have repeatedly denied freedom of
information requests on the subject. However, his belief in
the value of 'false flag' terrorism, and the timing of his
appointment, is notable.
The 'disconnect' between European states and the
operational management of Gladio was highlighted by the
French withdrawal from NATO in 1966[50]. This did not
coincide with the end of the French Gladio operations, called
'Plan Bleu.' This suggested the distinct possibility that not all
NATO governments were fully cognisant of what was going
on.
Gladio was a 'deep state' project. Elected governments were
not controlling it.
Another example of the lack of governmental oversight was
apparent with the Portuguese Gladio operation. The CIA
formed an ultra-nationalistic, right wing organisation called
the Aginter Press. It was run by former Vichy government
operative, and Nazi sympathiser, Jean-Robert de Guernadec,
under the assumed name of Yves Guérin-Sérac.
Outwardly portrayed as a press agency, it was actually a
front for the storage and shipment of arms and the training
of extremist mercenaries, many of whom received instruction
in covert military techniques in the School of the America's
in Panama.[51] There is no evidence that the Portuguese
intelligence agency (PIDE) knew anything about the hidden
agenda of Aginter Press.
Gladio was initially created in response to a genuine belief
that the Red Army would invade Western Europe. However
this fear was soon eclipsed by concern that domestic leftist
movements, supported by the Soviets, presented the greater
danger. Not because they threatened violence or disorder,
but rather for their potential to encourage political upheaval
that could overturn the rule of the financial and political
establishment.
Gladio operatives were deployed to kill the people of Europe,
distracting the survivors from any thoughts of political or
economic change. Convincing them to be thankful for the
'protection' of the state. This strategy, ca
lled 'the Strategy of
80
A Dangerous Ideology
Tension,' was described with chilling clarity by convicted
Gladio terrorist, Vincent Vinciguera. Speaking about the use
of false flag terrorism he said:
“You had to attack civilians, the people, women,
children, innocent people, unknown people far
removed from any political game. The reason
was quite simple. They were supposed to force
these people, the Italian public to turn to the
State to ask for greater security. This was
precisely the role of the right in Italy. It placed
itself at the service of the State which created a
strategy aptly called the 'Strategy of Tension' in
so far as they had to get ordinary people to
accept that at any moment over a period of 30
years, from 1960 to the mid eighties a State of
emergency could be declared. So, people would
willingly trade part of their freedom for the
security of being able to walk the streets, go on
trains or enter a bank. This is the political logic
behind all the bombings. They remain
unpunished because the state cannot condemn
itself.”
False flag attacks can broadly be split into two types. LIHOP
(let it happen on purpose) and MIHOP (make it happen on
purpose.) However, the manipulation required to carry out
these operations often comes through the use of infiltration.
During 'the troubles' in Northern Ireland, which saw decades
of deadly terrorist attacks in Ireland, Northern Ireland, the
British mainland and elsewhere, both Republican and
Loyalist paramilitary groups were extensively infiltrated by
British military intelligence and the security services.
Following the terrorist murder of Patrick Finucane in 1989,
it became clear that one of the men involved was a Royal
Ulster Constabulary (RUC) special branch agent called
William Stobie. Subsequent concerns about the extent to
which British agents were complicit in acts of terrorism led
to the Stevens Inquiry.
After a 14-year-long investigation, Sir John Stevens released
his final recommendations report in 2003.[52] Stevens
81
A Dangerous Ideology
stated:
I conclude there was collusion in both
murders and the circumstances surrounding
them. Collusion is evidenced in many ways.
This ranges from the wilful failure to keep
records, the absence of accountability, the
withholding of intelligence and evidence,
through to the extreme of agents being
involved in murder.
The failure to keep records or the existence
of contradictory accounts can often be
perceived as evidence of concealment or
malpractice. It limits the opportunity to rebut
serious allegations. The absence of
accountability allows the acts or omissions
of individuals to go undetected. The
withholding of information impedes the
prevention of crime and the arrest of
suspects. The unlawful involvement of
agents in murder implies that the security
forces sanction killings.
My inquiries have found all these elements
of collusion. The coordination, dissemination
and sharing of intelligence were poor.
Informants and agents were allowed to
operate without effective control and to
participate in terrorist crimes.
British agents were acting as terrorists. In another example
two British agents were found to have been involved in
'human bomb' attacks on three Army Border checkpoints in
1990. The plot involved taking people's families hostage
before forcing them to be unwilling suicide bombers. No
security service agents have ever been prosecuted in
connection with the bombings.[53]
Less than 2 years after the Stevens Inquiry released its
findings, the British government enacted the 2005 Inquiries
Act.[54] This legislation gave them extensive control over
public inquiries. They can deny the submission of evidence,
withhold witness statements, and have the power to edit
82
A Dangerous Ideology
findings before they are released. The British 'independent
public inquiry' has been a complete misnomer ever since.[55]
These are just a few examples of the many ways false flag
attacks have been used. Far from rare, they appear to be
fairly standard operating procedure. There is no evidence
whatsoever to substantiate the view that the deep state have
ever made a decision to stop using the strategy.
Does the evidence suggest that 9/11 and 7/7 could have
been further examples of false flag terrorism? One thing is
certain, none of us can possibly know unless we look at it.
************************
“When deeds speak, words are nothing.”
[Pierre-Joseph Proudhon]
************************
83
A Dangerous Ideology
Sources:
[1]:http://www.crassh.cam.ac.uk/people/profile/hugo-
drochon
[2]:https://www.theguardian.com/commentisfree/2017/nov
/0
1/conspira cy-theories-social-malaise-fake-news-exclusion
[3]: “American Conspiracy Theory” by Joseph Uscinski and
Joseph Parent.
[4]:http://conspiracyanddemocracy.org/blog/category/cons
p
iracy- a
nd- democracy-project/
[5]:http://www.realclearscience.com/blog/2014/12/conspir
a
cy_theorists_aren t_who_you_think_they_are.html
[6]:http://news.gallup.com/poll/9751/americans-kennedy-
assassination-conspiracy.aspx
[7]:http://time.com/3422083/jfk-conspiracy-theories/
[8]:http://www.conspiracyanddemocristopher-hitchens/on-
the-imagining-of-conspiracy
[9]:http://www.conspiracyanddemocracy.org/blog/are-
conspiracy-theories-a-threat-to-democracy-2/
[10]:https://web.archive.org/web/20181020155502/http://
www.presidency.ucsb.edu/PS157/assignment%20files
%20public/congressional%20report%20key%20sections.htm
[11]:https://nsarchive2.gwu.edu//NSAEBB/NSAEBB132/pr
ess20051201.htm
[12]:https://books.google.co.uk/books?
id=VsRMAAAAYAAJ&pg=PA141&dq=%22conspiracy+theory
%22&hl=en&sa=X&ei=1g7IT8eEBKSi2gW2_ejmDQ&redir_esc
=
y#v =onepage&q=%22conspiracy%20theory%22&f=false
[13]:http://www.jfklancer.com/CIA.html
[14]:https://theconversation.com/the-Internet-fuels-
conspiracy-theories-but-not-in-the-way-you-might-imagine-
98037
[15]:http://www.journalism.org/2017/09/07/news-use-
84
A Dangerous Ideology
across-social-media-platforms-2017/
[16]:http://www.un.org/webcast/ga/56/statements/011110
usaE.htm
[17]:https://www.gov.uk/government/speeches/pm-speech-
at-the-un-general-assembly-2014
[18]:https://www.theguardian.com/media/2018/apr/25/uk
-among-the-worst-in-western-europe-for-press-freedom
[19]:https://www.standard.co.uk/comment/comment/britai
n
-champions- free-speech-so-we-re-leading-the-war-on-fake-
news-a3977771.html
[20]:https://assets.publishing.service.gov.uk/government/u
ploads/system/uploads/attachment_data/file/470088/518
59_Cm9148_Accessible.pdf
[21]:http://www.legislation.gov.uk/ukpga/1994/33/content
s
[22]:https://www.gov.uk/government/speeches/a-
definition-of-antisemitism
[23]:https://en.oxforddictionaries.com/definition/thoughtcri
me
[24]:https://treaties.un.org/doc/publication/unts/volume
%20999/volume-999-i-14668-english.pdf
[25]:https://en.wikipedia.org/wiki/Bill_of_Rights_1689
[26]:https://en.wikipedia.org/wiki/John_Stuart_Mill
[27]:http://communicationethics.net/sub-
journals/free_article.php?id=00112
[28]:https://www.urbandictionary.com/define.php?
term=Twitterati
[29]:http://crisiscast.com/
[30]:https://www.bbc.co.uk/programmes/b03c7m8s
[31]:https://bbcpanoramasavingsyriaschildren.wordpress.co
m/
85
A Dangerous Ideology
[32]:https://www.usni.org/magazines/navalhistory/2008-
02/truth-about-tonkin
[33]:https://www.history.com/topics/vietnam-
war/operation-rolling-thunder
[34]:http://www.globalresearch.ca/an-ominous-non-event-
the-gulf-of-tonkin-and-the-strait-of-hormuz/7760
[35]:https://en.wikipedia.org/wiki/USS_Maddox_(DD-
731)#Gulf_of_Tonkin_Incident
[36]:https://fas.org/irp/nsa/spartans/index.html
[37]:https://nsarchive2.gwu.edu//NSAEBB/NSAEBB132/re
lea00012.pdf
[38]:https://en.wikipedia.org/wiki/Operation_34A
[39]:https://en.wikipedia.org/wiki/False_flag
[40]:https://en.wikipedia.org/wiki/Mukden_Incident
[41]:https://en.wikipedia.org/wiki/Gleiwitz_incident
[42]:http://cisac.fsISIStanford.edu/publications/the_lavon_
affair_how_a_falseflag_operation_led_to_war_and_the_israeli_
bomb
[43]:https://nsarchive2.gwu.edu//news/20010430/northwo
ods.pdf
[44]:https://www.ibtimes.co.uk/turkey-youtube-ban-full-
transcript-leaked-syria-war-conversation-between-erdogan-
officials-1442161
[45]:http://www.historycommons.org/context.jsp?
item=a092299ryazanbomb#a092299ryazanbomb
[46]:https://en.wikipedia.org/wiki/Years_of_Lead
[47]:https://en.wikipedia.org/wiki/Operation_Gladio
[48]:https://en.wikisource.org/wiki/European_Parliament_r
esolution_on_Gladio
[49]:https://en.wikipedia.org/wiki/Lyman_Lemnitzer