Änderungen

Zur Navigation springen Zur Suche springen
Zeile 23: Zeile 23:     
==Field Manual 30-31B als Beleg für Stay Behind Strategien==
 
==Field Manual 30-31B als Beleg für Stay Behind Strategien==
Das gefälschte FM30-31B wird ungeachtet seiner Herkunft als Quelle für Forschungen herangezogen. Der Schweizer Historiker und [[Verschwörungstheorie|Verschwörungstheoretiker]] [[Daniele Ganser]] beruft sich beispielsweise auf dieses Dokument für seine Forschung zu Stay-Behind Strukturen wie "Gladio" und bezeichnete es als das ''"vielleicht wichtigste Pentagon-Dokument in Bezug auf Stay-behind-Armeen"''. Ganser aber bezieht sich demnach auf die Fälschung, als ob es sich um ein echtes Dokument handle.<ref>Stellungnahme des US-Aussenministeriums von Januar 2006:
+
Das gefälschte FM30-31B wird ungeachtet seiner Herkunft als Quelle für Forschungen herangezogen. Der Schweizer Historiker und [[Verschwörungstheorie|Verschwörungstheoretiker]] [[Daniele Ganser]] beruft sich beispielsweise auf dieses Dokument für seine Forschung zu Stay-Behind Strukturen wie "Gladio" und bezeichnete es als das ''"vielleicht wichtigste Pentagon-Dokument in Bezug auf Stay-behind-Armeen"''. Ganser aber bezieht sich demnach auf die Fälschung, als ob es sich um ein echtes Dokument handle.<ref>Stellungnahme des US-Aussenministeriums von Januar 2006:<br>
   −
Misinformation about "Gladio/Stay Behind" Networks Resurfaces
+
Misinformation about "Gladio/Stay Behind" Networks Resurfaces<br>
   −
Thirty Year-Old Soviet Forgery Cited by Researchers
+
Thirty Year-Old Soviet Forgery Cited by Researchers<br>
In December 2005, misinformation resurfaced in Greece claiming, falsely, that a secret “stay behind” network, which the Greek government had set up with CIA assistance, had committed acts of terrorism.  During the Cold War, West European countries set up clandestine “stay behind” networks, which were designed to form the nucleus of resistance movements if the Soviet Union invaded and occupied Western Europe.  
+
In December 2005, misinformation resurfaced in Greece claiming, falsely, that a secret “stay behind” network, which the Greek government had set up with CIA assistance, had committed acts of terrorism.  During the Cold War, West European countries set up clandestine “stay behind” networks, which were designed to form the nucleus of resistance movements if the Soviet Union invaded and occupied Western Europe.<br>
   −
The Greek writer making the claim – and a Swiss researcher who wrote a 2005 book on the “stay behind” networks – both give credence to a Soviet forgery from the 1970s, which has long been publicly identified as a phony document.
+
The Greek writer making the claim – and a Swiss researcher who wrote a 2005 book on the “stay behind” networks – both give credence to a Soviet forgery from the 1970s, which has long been publicly identified as a phony document.<br>
   −
“Gladio,” which means “sword” in Italian, was the name the Italian government chose for the “stay behind” network it established in the early days of the Cold War.  Other West European governments formed similar networks.  
+
“Gladio,” which means “sword” in Italian, was the name the Italian government chose for the “stay behind” network it established in the early days of the Cold War.  Other West European governments formed similar networks.<br>
   −
During World War II, anti-Nazi resistance movements had sprung up throughout Europe, but supplying them by airdrops and other risky measures had been difficult and uncertain.  The “stay behind” networks sought to avoid such problems by stockpiling weapons in secret caches ahead of time, and recruiting volunteers who would form the core of resistance movements, if needed.  The program remained one of the Cold War’s best-kept secrets until it was revealed in late 1990, first in Italy and then in other West European countries.
+
During World War II, anti-Nazi resistance movements had sprung up throughout Europe, but supplying them by airdrops and other risky measures had been difficult and uncertain.  The “stay behind” networks sought to avoid such problems by stockpiling weapons in secret caches ahead of time, and recruiting volunteers who would form the core of resistance movements, if needed.  The program remained one of the Cold War’s best-kept secrets until it was revealed in late 1990, first in Italy and then in other West European countries.<br>
   −
Soon after the “stay behind” networks were revealed, some media accounts accused them of misdeeds, including domestic acts of terrorism.  In April 1992, some 18 months after Gladio’s disclosure, journalist Jonathan Kwitny wrote in The Nation that, “evidence so far hasn’t supported initial allegations that the secret armies used their hidden C.I.A.-supplied caches of weapons and explosives to carry out political violence that killed civilians.”  
+
Soon after the “stay behind” networks were revealed, some media accounts accused them of misdeeds, including domestic acts of terrorism.  In April 1992, some 18 months after Gladio’s disclosure, journalist Jonathan Kwitny wrote in The Nation that, “evidence so far hasn’t supported initial allegations that the secret armies used their hidden C.I.A.-supplied caches of weapons and explosives to carry out political violence that killed civilians.”<br>
   −
Nevertheless, such claims resurfaced on December 18, 2005, in To Proto Thema, Greece’s best-selling investigative/sensationalist Sunday newspaper, which ran a full two-page story by Kleanthis Grivas, headlined, “Terrorism in Post-War Europe.”  Grivas accused Greece’s “stay behind” network of several assassinations and bombings.
+
Nevertheless, such claims resurfaced on December 18, 2005, in To Proto Thema, Greece’s best-selling investigative/sensationalist Sunday newspaper, which ran a full two-page story by Kleanthis Grivas, headlined, “Terrorism in Post-War Europe.”  Grivas accused Greece’s “stay behind” network of several assassinations and bombings.<br>
   −
Some of the claims are clearly absurd.  Grivas accused Greece’s “stay behind” network, known as “Sheepskin” or “Red Sheepskin,” which he says was “organized by Greek special forces and the CIA,” of assassinating CIA station chief Richard Welch in Athens in 1975.  Thus, Grivas bizarrely accuses the CIA of playing a role in the assassination of one of its own senior officials.  
+
Some of the claims are clearly absurd.  Grivas accused Greece’s “stay behind” network, known as “Sheepskin” or “Red Sheepskin,” which he says was “organized by Greek special forces and the CIA,” of assassinating CIA station chief Richard Welch in Athens in 1975.  Thus, Grivas bizarrely accuses the CIA of playing a role in the assassination of one of its own senior officials.<br>
   −
Grivas also accused “Sheepskin” of the assassination in Athens of British military attaché Stephen Saunders in 2000, despite the fact that the Greek government stated it dismantled the “stay behind” network in 1988.  In reality, the Greek terrorist organization “17 November” was responsible for both assassinations.
+
Grivas also accused “Sheepskin” of the assassination in Athens of British military attaché Stephen Saunders in 2000, despite the fact that the Greek government stated it dismantled the “stay behind” network in 1988.  In reality, the Greek terrorist organization “17 November” was responsible for both assassinations.<br>
   −
Thirty Year-Old Soviet Forgery Cited by Researchers
+
Thirty Year-Old Soviet Forgery Cited by Researchers<br>
   −
Grivas and other prominent “stay behind” researchers appear to have been influenced by a bogus text that first surfaced in 1976, a Soviet forgery purporting to be Supplement B to the U.S. Army’s Field Manual 30-31.
+
Grivas and other prominent “stay behind” researchers appear to have been influenced by a bogus text that first surfaced in 1976, a Soviet forgery purporting to be Supplement B to the U.S. Army’s Field Manual 30-31.<br>
   −
The U.S. Army did have a Field Manual (FM) 30-31 in the 1970s, and a “Supplement A” to it existed, but not a “Supplement B.”  The purported “Supplement B” was a forgery apparently concocted by the Soviet disinformation service.  
+
The U.S. Army did have a Field Manual (FM) 30-31 in the 1970s, and a “Supplement A” to it existed, but not a “Supplement B.”  The purported “Supplement B” was a forgery apparently concocted by the Soviet disinformation service.<br>
   −
Field Manual 30-31B, also known as the “Westmoreland Manual” because it was purportedly signed by General William Westmoreland, was exposed as a “total fabrication” in February 1980 hearings before the U.S. House of Representatives Permanent Select Committee on Intelligence.  The Committee hearings state:
+
Field Manual 30-31B, also known as the “Westmoreland Manual” because it was purportedly signed by General William Westmoreland, was exposed as a “total fabrication” in February 1980 hearings before the U.S. House of Representatives Permanent Select Committee on Intelligence.  The Committee hearings state:<br>
   −
In February 1976, a photocopy of the bogus FM 30-31B was left on the bulletin board of the Embassy of the Philippines in Bangkok, Thailand with a cover note from an anonymous “concerned citizen.”  This is a typical Soviet bloc practice.  Surfacing attracted little attention.  FM 30-31B reappeared in 1978 when it was reprinted in two Spanish publications, El Pais (18 September) and El Triunfo (23 September).  This was the work of a Spanish communist and a Cuban intelligence officer.  Since September 1978, the manual and/or articles concerning it have appeared in the world press in more than 20 countries, including the United States. [Source: Soviet Covert Action (The Forgery Offensive), Hearings before the Subcommittee on Oversight of the Permanent Select Committee on Intelligence, House of Representatives, 96th Congress, Second Session, February 6, 19, 1980, p. 86.]
+
In February 1976, a photocopy of the bogus FM 30-31B was left on the bulletin board of the Embassy of the Philippines in Bangkok, Thailand with a cover note from an anonymous “concerned citizen.”  This is a typical Soviet bloc practice.  Surfacing attracted little attention.  FM 30-31B reappeared in 1978 when it was reprinted in two Spanish publications, El Pais (18 September) and El Triunfo (23 September).  This was the work of a Spanish communist and a Cuban intelligence officer.  Since September 1978, the manual and/or articles concerning it have appeared in the world press in more than 20 countries, including the United States. [Source: Soviet Covert Action (The Forgery Offensive), Hearings before the Subcommittee on Oversight of the Permanent Select Committee on Intelligence, House of Representatives, 96th Congress, Second Session, February 6, 19, 1980, p. 86.]<br>
   −
The hearings added that, “in summer 1979, the Soviets prepared Portuguese-language copies of the forgery and covertly circulated them among military officers in Lisbon.”  (p. 87)
+
The hearings added that, “in summer 1979, the Soviets prepared Portuguese-language copies of the forgery and covertly circulated them among military officers in Lisbon.”  (p. 87)<br>
   −
The forgery was written so that it appeared to offer “proof” that the United States was the secret sponsor of terrorist acts in foreign countries, stating, in a section on “Agents in Special Operations:”
+
The forgery was written so that it appeared to offer “proof” that the United States was the secret sponsor of terrorist acts in foreign countries, stating, in a section on “Agents in Special Operations:”<br>
   −
There may be times when HC [Host Country] governments show passivity or indecision in the face of Communist or Communist-inspired subversion, and react with inadequate vigor to intelligence estimates transmitted by U.S. agencies.  Such situations are particularly likely to arise when the insurgency seeks to achieve tactical advantage by temporarily refraining from violence, thus lulling HC authorities into a state of false security.  In such cases, U.S. Army intelligence must have the means of launching special operations which will convince the HC governments and public opinion of the reality of the insurgent danger and of the necessity of counteraction.
+
There may be times when HC [Host Country] governments show passivity or indecision in the face of Communist or Communist-inspired subversion, and react with inadequate vigor to intelligence estimates transmitted by U.S. agencies.  Such situations are particularly likely to arise when the insurgency seeks to achieve tactical advantage by temporarily refraining from violence, thus lulling HC authorities into a state of false security.  In such cases, U.S. Army intelligence must have the means of launching special operations which will convince the HC governments and public opinion of the reality of the insurgent danger and of the necessity of counteraction.<br>
   −
To this end, U.S. Army intelligence should seek to penetrate the insurgency by means of agents on special assignment, with the task of forming special action groups among the more radical elements of the insurgency.  When the kind of situation envisaged above arises, these groups, acting under U.S. Army intelligence control, should be used to launch violent or nonviolent actions according to the nature of the case.  Such actions could include those described in FM 30-31 as characterizing Phase II and III of insurgency.
+
To this end, U.S. Army intelligence should seek to penetrate the insurgency by means of agents on special assignment, with the task of forming special action groups among the more radical elements of the insurgency.  When the kind of situation envisaged above arises, these groups, acting under U.S. Army intelligence control, should be used to launch violent or nonviolent actions according to the nature of the case.  Such actions could include those described in FM 30-31 as characterizing Phase II and III of insurgency.<br>
   −
In cases where the infiltration of such agents into the insurgent leadership has not been effectively implemented, it may help towards the achievement of the above ends to utilize ultra-leftist organizations.  [Source: Soviet Covert Action (The Forgery Offensive), p. 184.]
+
In cases where the infiltration of such agents into the insurgent leadership has not been effectively implemented, it may help towards the achievement of the above ends to utilize ultra-leftist organizations.  [Source: Soviet Covert Action (The Forgery Offensive), p. 184.]<br>
   −
A poor quality copy of the forgery and a declassified cover note describing how it surfaced can be viewed on the Internet.
+
A poor quality copy of the forgery and a declassified cover note describing how it surfaced can be viewed on the Internet.<br>
   −
Grivas and other “stay behind” researchers have treated the Soviet forgery as if it were a real document.  
+
Grivas and other “stay behind” researchers have treated the Soviet forgery as if it were a real document.<br>
   −
In Grivas’ book, Terrorism: a Privileged Means of Policy Making, he reportedly treats FM 30-31B as if it were authentic.  An August 4, 2002 article in the Greek communist weekly Rizospatsis, which stated that it obtained its information from Grivas’ book, saw FM 30-31B as evidence that the United States had been behind the upsurge of radical leftist terrorism in Western Europe in the mid-1970s.  It stated:
+
In Grivas’ book, Terrorism: a Privileged Means of Policy Making, he reportedly treats FM 30-31B as if it were authentic.  An August 4, 2002 article in the Greek communist weekly Rizospatsis, which stated that it obtained its information from Grivas’ book, saw FM 30-31B as evidence that the United States had been behind the upsurge of radical leftist terrorism in Western Europe in the mid-1970s.  It stated:<br>
   −
It is worth noting that the implementation of the Manual coincided with a surge in terrorist activity, such as the RAF [Red Army Faction] in West Germany and the Red Brigades in Italy.  It is also worth noting that the activities of 17N [17 November] in Greece began in 1975.  It was a critical time that had all the characteristics included in the Manual.
+
It is worth noting that the implementation of the Manual coincided with a surge in terrorist activity, such as the RAF [Red Army Faction] in West Germany and the Red Brigades in Italy.  It is also worth noting that the activities of 17N [17 November] in Greece began in 1975.  It was a critical time that had all the characteristics included in the Manual.<br>
   −
Swiss researcher Daniele Ganser, who works at Zurich’s Center for Security Studies, has also been fooled by the forgery.  Ganser treats the forgery as if it was a genuine document in his 2005 book on “stay behind” networks, Secret Armies: Operation Gladio and Terrorism in Western Europe and includes it as a key document on his Web site on the book.  Ganser writes, “FM 30-31B is maybe the most important Pentagon document with regard to the stay-behind armies.”  He goes on to speculate that the bogus document may provide the blueprint for terrorist acts that occurred during the Cold War in Western Europe.
+
Swiss researcher Daniele Ganser, who works at Zurich’s Center for Security Studies, has also been fooled by the forgery.  Ganser treats the forgery as if it was a genuine document in his 2005 book on “stay behind” networks, Secret Armies: Operation Gladio and Terrorism in Western Europe and includes it as a key document on his Web site on the book.  Ganser writes, “FM 30-31B is maybe the most important Pentagon document with regard to the stay-behind armies.”  He goes on to speculate that the bogus document may provide the blueprint for terrorist acts that occurred during the Cold War in Western Europe.<br>
   −
Former CIA Director Describes Setting Up “Stay Behind” Networks
+
Former CIA Director Describes Setting Up “Stay Behind” Networks<br>
   −
Former CIA director William Colby wrote about his role in setting up “stay behind” networks in Scandinavia in his 1978 memoir Honorable Men:
+
Former CIA director William Colby wrote about his role in setting up “stay behind” networks in Scandinavia in his 1978 memoir Honorable Men:<br>
   −
One of the main fields of the OPC's [Office of Policy Coordination, the unit in the CIA responsible for paramilitary activities] work then [in 1951] was planning for the not unlikely possibility of a Soviet invasion of Western Europe.  And, in the event the Russians succeeded in taking over any or all of the countries of the Continent ... the OPC wanted to be in a position to activate well-armed and well-organized partisan uprisings against the occupiers.  But this time, unlike ... similar OSS paramilitary teams that went in to help the French maquis and other resistance movements during World War II, the OPC didn't want to have to arm and organize those partisans after the occupation, using such dangerous and fallible operations as night flights, supply drops, and parachute infiltrations behind enemy lines.  No, this time ... we intended to have that resistance capability in place before the occupation, indeed even before an invasion; we were determined to organize and supply it now, while we still had the time in which to do it right and at the minimum of risk.  Thus, the OPC had undertaken a major program of building, throughout those Western European countries that seemed likely targets for Soviet attack, what in the parlance of the intelligence trade were known as “stay-behind nets,” clandestine infrastructures of leaders and equipment trained and ready to be called into action as sabotage and espionage forces when the time came.  (pp. 81-82)
+
One of the main fields of the OPC's [Office of Policy Coordination, the unit in the CIA responsible for paramilitary activities] work then [in 1951] was planning for the not unlikely possibility of a Soviet invasion of Western Europe.  And, in the event the Russians succeeded in taking over any or all of the countries of the Continent ... the OPC wanted to be in a position to activate well-armed and well-organized partisan uprisings against the occupiers.  But this time, unlike ... similar OSS paramilitary teams that went in to help the French maquis and other resistance movements during World War II, the OPC didn't want to have to arm and organize those partisans after the occupation, using such dangerous and fallible operations as night flights, supply drops, and parachute infiltrations behind enemy lines.  No, this time ... we intended to have that resistance capability in place before the occupation, indeed even before an invasion; we were determined to organize and supply it now, while we still had the time in which to do it right and at the minimum of risk.  Thus, the OPC had undertaken a major program of building, throughout those Western European countries that seemed likely targets for Soviet attack, what in the parlance of the intelligence trade were known as “stay-behind nets,” clandestine infrastructures of leaders and equipment trained and ready to be called into action as sabotage and espionage forces when the time came.  (pp. 81-82)<br>
   −
Colby makes it clear that the NATO allies with whom he worked in Scandinavia were full partners in such plans:
+
Colby makes it clear that the NATO allies with whom he worked in Scandinavia were full partners in such plans:<br>
   −
  … the governments themselves would build their own stay-behind nets, counting on activating them from exile to carry on the struggle.  These nets had to be coordinated with NATO’s plans, their radios had to be hooked to a future exile location, and the specialized equipment had to be secured from CIA and secretly cached in snowy hideouts for later use. (p. 82)
+
  … the governments themselves would build their own stay-behind nets, counting on activating them from exile to carry on the struggle.  These nets had to be coordinated with NATO’s plans, their radios had to be hooked to a future exile location, and the specialized equipment had to be secured from CIA and secretly cached in snowy hideouts for later use. (p. 82)<br>
   −
Conclusion
+
Conclusion<br>
   −
A thirty year-old Soviet forgery has been cited as one of the central pieces of “evidence” for the false notion that West European “stay-behind” networks engaged in terrorism, allegedly at U.S. instigation.  This is not true, and those researching the “stay behind” networks need to be more discriminating in evaluating the trustworthiness of their source material.  
+
A thirty year-old Soviet forgery has been cited as one of the central pieces of “evidence” for the false notion that West European “stay-behind” networks engaged in terrorism, allegedly at U.S. instigation.  This is not true, and those researching the “stay behind” networks need to be more discriminating in evaluating the trustworthiness of their source material.<br>
    
Created: 20 Jan 2006 Updated: 20 Jan 2006</ref>
 
Created: 20 Jan 2006 Updated: 20 Jan 2006</ref>
81.394

Bearbeitungen

Navigationsmenü