Showing posts with label Psyops. Show all posts
Showing posts with label Psyops. Show all posts

Thursday, November 12, 2009

Welcome Home, War! How America's Wars Are Systematically Destroying Our Liberties


By Alfred W. McCoy

In his approach to National Security Agency surveillance, as well as CIA renditions, drone assassinations, and military detention, President Obama has to a surprising extent embraced the expanded executive powers championed by his conservative predecessor, George W. Bush. This bipartisan affirmation of the imperial executive could "reverberate for generations," warns Jack Balkin, a specialist on First Amendment freedoms at Yale Law School. And consider these but some of the early fruits from the hybrid seeds that the Global War on Terror has planted on American soil. Yet surprisingly few Americans seem aware of the toll that this already endless war has taken on our civil liberties.

Don't be too surprised, then, when, in the midst of some future crisis, advanced surveillance methods and other techniques developed in our recent counterinsurgency wars migrate from Baghdad, Falluja, and Kandahar to your hometown or urban neighborhood. And don't ever claim that nobody told you this could happen -- at least not if you care to read on.

Think of our counterinsurgency wars abroad as so many living laboratories for the undermining of a democratic society at home, a process historians of such American wars can tell you has been going on for a long, long time. Counterintelligence innovations like centralized data, covert penetration, and disinformation developed during the Army's first protracted pacification campaign in a foreign land -- the Philippines from 1898 to 1913 -- were repatriated to the United States during World War I, becoming the blueprint for an invasive internal security apparatus that persisted for the next half century.

Almost 90 years later, George W. Bush's Global War on Terror plunged the U.S. military into four simultaneous counterinsurgency campaigns, large and small -- in Somalia, Iraq, Afghanistan, and (once again) the Philippines -- transforming a vast swath of the planet into an ad hoc "counterterrorism" laboratory. The result? Cutting-edge high-tech security and counterterror techniques that are now slowly migrating homeward.

As the War on Terror enters its ninth year to become one of America's longest overseas conflicts, the time has come to ask an uncomfortable question: What impact have the wars in Afghanistan and Iraq -- and the atmosphere they created domestically -- had on the quality of our democracy?

Every American knows that we are supposedly fighting elsewhere to defend democracy here at home. Yet the crusade for democracy abroad, largely unsuccessful in its own right, has proven remarkably effective in building a technological template that could be just a few tweaks away from creating a domestic surveillance state -- with omnipresent cameras, deep data-mining, nano-second biometric identification, and drone aircraft patrolling "the homeland."

Even if its name is increasingly anathema in Washington, the ongoing Global War on Terror has helped bring about a massive expansion of domestic surveillance by the FBI and the National Security Agency (NSA) whose combined data-mining systems have already swept up several billion private documents from U.S. citizens into classified data banks. Abroad, after years of failing counterinsurgency efforts in the Middle East, the Pentagon began applying biometrics -- the science of identification via facial shape, fingerprints, and retinal or iris patterns -- to the pacification of Iraqi cities, as well as the use of electronic intercepts for instant intelligence and the split-second application of satellite imagery to aid an assassination campaign by drone aircraft that reaches from Africa to South Asia.

In the panicky aftermath of some future terrorist attack, Washington could quickly fuse existing foreign and domestic surveillance techniques, as well as others now being developed on distant battlefields, to create an instant digital surveillance state.

The Crucible of Counterinsurgency

For the past six years, confronting a bloody insurgency, the U.S. occupation of Iraq has served as a white-hot crucible of counterinsurgency, forging a new system of biometric surveillance and digital warfare with potentially disturbing domestic implications. This new biometric identification system first appeared in the smoking aftermath of "Operation Phantom Fury," a brutal, nine-day battle that U.S. Marines fought in late 2004 to recapture the insurgent-controlled city of Falluja. Bombing, artillery, and mortars destroyed at least half of that city's buildings and sent most of its 250,000 residents fleeing into the surrounding countryside. Marines then forced returning residents to wait endless hours under a desert sun at checkpoints for fingerprints and iris scans. Once inside the city's blast-wall maze, residents had to wear identification tags for compulsory checks to catch infiltrating insurgents.

The first hint that biometrics were helping to pacify Baghdad's far larger population of seven million came in April 2007 when the New York Times published an eerie image of American soldiers studiously photographing an Iraqi's eyeball. With only a terse caption to go by, we can still infer the technology behind this single record of a retinal scan in Baghdad: digital cameras for U.S. patrols, wireless data transfer to a mainframe computer, and a database to record as many adult Iraqi eyes as could be gathered. Indeed, eight months later, the Washington Post reported that the Pentagon had collected over a million Iraqi fingerprints and iris scans. By mid-2008, the U.S. Army had also confined Baghdad's population behind blast-wall cordons and was checking Iraqi identities by satellite link to a biometric database.

Pushing ever closer to the boundaries of what present-day technology can do, by early 2008, U.S. forces were also collecting facial images accessible by portable data labs called Joint Expeditionary Forensic Facilities, linked by satellite to a biometric database in West Virginia. "A war fighter needs to know one of three things," explained the inventor of this lab-in-a-box. "Do I let him go? Keep him? Or shoot him on the spot?"

A future is already imaginable in which a U.S. sniper could take a bead on the eyeball of a suspected terrorist, pause for a nanosecond to transmit the target's iris or retinal data via backpack-sized laboratory to a computer in West Virginia, and then, after instantaneous feedback, pull the trigger.

Lest such developments seem fanciful, recall that Washington Post reporter Bob Woodward claims the success of George W. Bush's 2007 troop surge in Iraq was due less to boots on the ground than to bullets in the head -- and these, in turn, were due to a top-secret fusion of electronic intercepts and satellite imagery. Starting in May 2006, American intelligence agencies launched a Special Action Program using "the most highly classified techniques and information in the U.S. government" in a successful effort "to locate, target and kill key individuals in extremist groups such as al-Qaeda, the Sunni insurgency and renegade Shia militias."

Under General Stanley McChrystal, now U.S. Afghan War commander, the Joint Special Operations Command (JSOC) deployed "every tool available simultaneously, from signals intercepts to human intelligence" for "lightning quick" strikes. One intelligence officer reportedly claimed that the program was so effective it gave him "orgasms." President Bush called it "awesome." Although refusing to divulge details, Woodward himself compared it to the Manhattan Project in World War II. This Iraq-based assassination program relied on the authority Defense Secretary Donald Rumsfeld granted JSOC in early 2004 to "kill or capture al-Qaeda terrorists" in 20 countries across the Middle East, producing dozens of lethal strikes by airborne Special Operations forces.

Another crucial technological development in Washington's secret war of assassination has been the armed drone, or unmanned aerial vehicle, whose speedy development has been another by-product of Washington's global counterterrorism laboratory. Half a world away from Iraq in the southern Philippines, the CIA and U.S. Special Operations Forces conducted an early experiment in the use of aerial surveillance for assassination. In June 2002, with a specially-equipped CIA aircraft circling overhead offering real-time video surveillance in the pitch dark of a tropical night, Philippine Marines executed a deadly high-seas ambush of Muslim terrorist Aldam Tilao (a.k.a. "Abu Sabaya").

In July 2008, the Pentagon proposed an expenditure of $1.2 billion for a fleet of 50 light aircraft loaded with advanced electronics to loiter over battlefields in Afghanistan and Iraq, bringing "full motion video and electronic eavesdropping to the troops." By late 2008, night flights over Afghanistan from the deck of the USS Theodore Roosevelt were using sensors to give American ground forces real-time images of Taliban targets -- some so focused that they could catch just a few warm bodies huddled in darkness behind a wall.

In the first months of Barack Obama's presidency, CIA Predator drone strikes have escalated in the Pakistani tribal borderlands with a macabre efficiency, using a top-secret mix of electronic intercepts, satellite transmission, and digital imaging to kill half of the Agency's 20 top-priority al-Qaeda targets in the region. Just three days before Obama visited Canada last February, Homeland Security launched its first Predator-B drones to patrol the vast, empty North Dakota-Manitoba borderlands that one U.S. senator has called America's "weakest link."

Homeland Security

While those running U.S. combat operations overseas were experimenting with intercepts, satellites, drones, and biometrics, inside Washington the plodding civil servants of internal security at the FBI and the NSA initially began expanding domestic surveillance through thoroughly conventional data sweeps, legal and extra-legal, and -- with White House help -- several abortive attempts to revive a tradition that dates back to World War I of citizens spying on suspected subversives.

"If people see anything suspicious, utility workers, you ought to report it," said President George Bush in his April 2002 call for nationwide citizen vigilance. Within weeks, his Justice Department had launched Operation TIPS (Terrorism Information and Prevention System), with plans for "millions of American truckers, letter carriers, train conductors, ship captains, utility employees and others" to aid the government by spying on their fellow Americans. Such citizen surveillance sparked strong protests, however, forcing the Justice Department to quietly bury the president's program.

Simultaneously, inside the Pentagon, Admiral John Poindexter, President Ronald Reagan's former national security advisor (swept up in the Iran-Contra scandal of that era), was developing a Total Information Awareness program which was to contain "detailed electronic dossiers" on millions of Americans. When news leaked about this secret Pentagon office with its eerie, all-seeing eye logo, Congress banned the program, and the admiral resigned in 2003. But the key data extraction technology, the Information Awareness Prototype System, migrated quietly to the NSA.

Soon enough, however, the CIA, FBI, and NSA turned to monitoring citizens electronically without the need for human tipsters, rendering the administration's grudging retreats from conventional surveillance at best an ambiguous political victory for civil liberties advocates. Sometime in 2002, President Bush gave the NSA secret, illegal orders to monitor private communications through the nation's telephone companies and its private financial transactions through SWIFT, an international bank clearinghouse.

After the New York Times exposed these wiretaps in 2005, Congress quickly capitulated, first legalizing this illegal executive program and then granting cooperating phone companies immunity from civil suits. Such intelligence excess was, however, intentional. Even after Congress widened the legal parameters for future intercepts in 2008, the NSA continued to push the boundaries of its activities, engaging in what the New York Times politely termed the systematic "overcollection" of electronic communications among American citizens. Now, for example, thanks to a top-secret NSA database called "Pinwale," analysts routinely scan countless "millions" of domestic electronic communications without much regard for whether they came from foreign or domestic sources.

Starting in 2004, the FBI launched an Investigative Data Warehouse as a "centralized repository for... counterterrorism." Within two years, it contained 659 million individual records. This digital archive of intelligence, social security files, drivers' licenses, and records of private finances could be accessed by 13,000 Bureau agents and analysts making a million queries monthly. By 2009, when digital rights advocates sued for full disclosure, the database had already grown to over a billion documents.

And did this sacrifice of civil liberties make the United States a safer place? In July 2009, after a careful review of the electronic surveillance in these years, the inspectors general of the Defense Department, the Justice Department, the CIA, the NSA, and the Office of National Intelligence issued a report sharply critical of these secret efforts. Despite George W. Bush's claims that massive electronic surveillance had "helped prevent attacks," these auditors could not find any "specific instances" of this, concluding such surveillance had "generally played a limited role in the F.B.I.'s overall counterterrorism efforts."

Amid the pressures of a generational global war, Congress proved all too ready to offer up civil liberties as a bipartisan burnt offering on the altar of national security. In April 2007, for instance, in a bid to legalize the Bush administration's warrantless wiretaps, Congressional representative Jane Harman (Dem., California) offered a particularly extreme example of this urge. She introduced the Violent Radicalization and Homegrown Terrorism Prevention Act, proposing a powerful national commission, functionally a standing "star chamber," to "combat the threat posed by homegrown terrorists based and operating within the United States." The bill passed the House by an overwhelming 404 to 6 vote before stalling, and then dying, in a Senate somewhat more mindful of civil liberties.

Only weeks after Barack Obama entered the Oval Office, Harman's life itself became a cautionary tale about expanding electronic surveillance. According to information leaked to the Congressional Quarterly, in early 2005 an NSA wiretap caught Harman offering to press the Bush Justice Department for reduced charges against two pro-Israel lobbyists accused of espionage. In exchange, an Israeli agent offered to help Harman gain the chairmanship of the House Intelligence Committee by threatening House Democratic majority leader Nancy Pelosi with the loss of a major campaign donor. As Harman put down the phone, she said, "This conversation doesn't exist."

How wrong she was. An NSA transcript of Harman's every word soon crossed the desk of CIA Director Porter Goss, prompting an FBI investigation that, in turn, was blocked by then-White House Counsel Alberto Gonzales. As it happened, the White House knew that the New York Times was about to publish its sensational revelation of the NSA's warrantless wiretaps, and felt it desperately needed Harman for damage control among her fellow Democrats. In this commingling of intrigue and irony, an influential legislator's defense of the NSA's illegal wiretapping exempted her from prosecution for a security breach discovered by an NSA wiretap.

Since the arrival of Barack Obama in the White House, the auto-pilot expansion of digital domestic surveillance has in no way been interfered with. As a result, for example, the FBI's "Terrorist Watchlist," with 400,000 names and a million entries, continues to grow at the rate of 1,600 new names daily.

In fact, the Obama administration has even announced plans for a new military cybercommand staffed by 7,000 Air Force employees at Lackland Air Base in Texas. This command will be tasked with attacking enemy computers and repelling hostile cyber-attacks or counterattacks aimed at U.S. computer networks -- with scant respect for what the Pentagon calls "sovereignty in the cyberdomain." Despite the president's assurances that operations "will not -- I repeat -- will not include monitoring private sector networks or Internet traffic," the Pentagon's top cyberwarrior, General James E. Cartwright, has conceded such intrusions are inevitable.

Sending the Future Home

While U.S. combat forces prepare to draw-down in Iraq (and ramp up in Afghanistan), military intelligence units are coming home to apply their combat-tempered surveillance skills to our expanding homeland security state, while preparing to counter any future domestic civil disturbances here.

Indeed, in September 2008, the Army's Northern Command announced that one of the Third Division's brigades in Iraq would be reassigned as a Consequence Management Response Force (CMRF) inside the U.S. Its new mission: planning for moments when civilian authorities may need help with "civil unrest and crowd control." According to Colonel Roger Cloutier, his unit's civil-control equipment featured "a new modular package of non-lethal capabilities" designed to subdue unruly or dangerous individuals -- including Taser guns, roadblocks, shields, batons, and beanbag bullets.

That same month, Army Chief of Staff General George Casey flew to Fort Stewart, Georgia, for the first full CMRF mission readiness exercise. There, he strode across a giant urban battle map filling a gymnasium floor like a conquering Gulliver looming over Lilliputian Americans. With 250 officers from all services participating, the military war-gamed its future coordination with the FBI, the Federal Emergency Management Agency, and local authorities in the event of a domestic terrorist attack or threat. Within weeks, the American Civil Liberties Union filed an expedited freedom of information request for details of these deployments, arguing: "[It] is imperative that the American people know the truth about this new and unprecedented intrusion of the military in domestic affairs."

At the outset of the Global War on Terror in 2001, memories of early Cold War anti-communist witch-hunts blocked Bush administration plans to create a corps of civilian tipsters and potential vigilantes. However, far more sophisticated security methods, developed for counterinsurgency warfare overseas, are now coming home to far less public resistance. They promise, sooner or later, to further jeopardize the constitutional freedoms of Americans.

In these same years, under the pressure of War on Terror rhetoric, presidential power has grown relentlessly, opening the way to unchecked electronic surveillance, the endless detention of terror suspects, and a variety of inhumane forms of interrogation. Somewhat more slowly, innovative techniques of biometric identification, aerial surveillance, and civil control are now being repatriated as well.

In a future America, enhanced retinal recognition could be married to omnipresent security cameras as a part of the increasingly routine monitoring of public space. Military surveillance equipment, tempered to a technological cutting edge in counterinsurgency wars, might also one day be married to the swelling domestic databases of the NSA and FBI, sweeping the fiber-optic cables beneath our cities for any sign of subversion. And in the skies above, loitering aircraft and cruising drones could be checking our borders and peering down on American life.

If that day comes, our cities will be Argus-eyed with countless thousands of digital cameras scanning the faces of passengers at airports, pedestrians on city streets, drivers on highways, ATM customers, mall shoppers, and visitors to any federal facility. One day, hyper-speed software will be able to match those millions upon millions of facial or retinal scans to photos of suspect subversives inside a biometric database akin to England's current National Public Order Intelligence Unit, sending anti-subversion SWAT teams scrambling for an arrest or an armed assault.

By the time the Global War on Terror is declared over in 2020, if then, our American world may be unrecognizable -- or rather recognizable only as the stuff of dystopian science fiction. What we are proving today is that, however detached from the wars being fought in their name most Americans may seem, war itself never stays far from home for long. It's already returning in the form of new security technologies that could one day make a digital surveillance state a reality, changing fundamentally the character of American democracy.

Alfred W. McCoy is the J.R.W. Smail Professor of History at the University of Wisconsin-Madison and the author of A Question of Torture, among other works. His most recent book is Policing America's Empire: The United States, the Philippines, and the Rise of the Surveillance State (University of Wisconsin Press) which explores the influence of overseas counterinsurgency operations throughout the twentieth century in spreading ever more draconian internal security measures here at home.

Copyright 2009 Alfred W. McCoy

Printer-Friendly Version

Saturday, October 24, 2009

The truth about George Joannides and the CIA’s fight to hide it

First, a brief word of apology to Jefferson Morley, whose excellent and meticulously researched book, Our Man in Mexico: Winston Scott and the Hidden History of the CIA was first mentioned here almost exactly one year ago, with the promise of a review to come…like so many other worthy projects, the review ended up on the back burner (the saltmine beckons and is unusually active at present), but it has not been forgotten. In the meantime, Machetera will say this: the book is terrific – engagingly written, carefully corroborated, it is a must-read for anyone curious about the CIA’s long reach in Mexico, particularly during the period in the fall of 1963 when the CIA did and then didn’t know about Lee Harvey Oswald’s visit to Mexico City in his failed search for a Cuban visa. So get the book, now.

Second, José Pertierra has just published an exclusive interview with Morley at Cubadebate. Normally Machetera resists translating articles written by those with a perfect grasp of English, such as that possessed by Pertierra, not least because translation is invariably an imperfect art and she dislikes second-guessing an interview that undoubtedly transpired in English to begin with. But this interview is exceptionally interesting and important, and as yet, no English version has appeared. So in the meantime, with additional apologies to Morley, and to Pertierra, here it is. A bit of a filmed interview with Morley follows the interview.

Jeff Morley: “I’m only asking that the CIA obey the law” - Español

José Pertierra for Cubadebate

English translation: Machetera

Washington – The day that his brother was assassinated, the Attorney General of the United States, Robert F. Kennedy, spoke by telephone with one of the leaders of the terrorist campaign against Cuba, Enrique “Harry” Ruiz-Williams. Kennedy said to him directly: “One of your men did it.” Bobby Kennedy didn’t ask him. He told him. It came from his gut, because he knew those people. That’s how the journalist/researcher Jefferson Morley tells it in an interview he granted Cubadebate.

“The assassination of President John F. Kennedy on November 22, 1963 and the dirty war against Cuba organized by the Miami Cubans are intimately linked: they’re battles in the same war, “ said Morley.

“The anecdote about the conversation between Bobby Kennedy and Ruiz-Williams is well founded,” says Morley, “because the prestigious journalist Haynes Johnson was a witness. He was with Ruiz-Williams during the conversation with Kennedy.”

Jefferson Morley has a long career as a well-known journalist in Washington. He worked for 15 years for the Washington Post and has also been published in the New York Review of Books, the Nation, the New Republic, Slate, Rolling Stone and the Los Angeles Times. Recently, he published a biography of the CIA station chief in Mexico, Our Man in Mexico: Winston Scott and the Hidden History of the CIA. Six years ago he filed suit (Morley v. CIA) against the CIA in order to force the Central Intelligence Agency to declassify documents dating from the period between 1962 and 1964, relative to George E. Joannides, a CIA official charged with many of the operations against Cuba in that period. On November 16th, Judge Richard J. Leon of the U.S. District Court in Washington D.C., will hold a hearing to listen to the arguments of both Morley and the CIA about the possible declassification of these documents.

José Pertierra: Why do you believe the CIA wishes to keep nearly 50 year old documents secret?

Jefferson Morley: Because they may contain something delicate or embarrassing for the CIA. The story that we’re told about Joannides is a show. A lie. According to his own documents which I’ve gone over personally, the story that the CIA tells us now about Joannides doesn’t match reality. The Agency tries to trivialize Joannides’ role in the operations that took place between 1962 and 1964, but history shows us the truth. Furthermore, if the documents being hidden truly do not incriminate the CIA, why do they want them to be hidden? Could it be because Kennedy was killed in 1963? That conditioned reflex to keep this secret hides something.

JP: Who was George E. Joannides?

JM: He was a CIA man whose assignment was to control and direct the Miami Cubans who were in charge of the operations against Cuba at the beginning of the 1960’s. Specifically, he was charged with controlling the Directorio Revolucionario Esudiantil (DRE) [Revolutionary Student Directorate]. The CIA commended him in 1963 for his good work directing the DRE. After the missile crisis in October of 1962, Washington wanted to “reign in” the DRE’s activities, and the CIA put Joannides in charge of that assignment. When the CIA gave him his evaluation in August of 1963, he was congratulated for having “controlled” the DRE.

JP: Who was the DRE?

JM: It was a Cuban organization headquartered in Miami. A CIA analyst told me that the DRE came to be “the most militant of the Miami exile organizations at the beginning of the 1960’s.”

Its leaders were Alberto Muller, Ernesto Travieso and Juan Manual Salvat. Salvat later started a bookstore on Miami’s Calle Ocho, called the Librería Universal [Universal Library]. One of its militants was the young Jorge Mas Canosa, who would later go on to found the Cuban American National Foundation (CANF). The DRE operated from Miami under the direction of a couple of important CIA officers: David Phillips and Howard Hunt.

One of their most well-known violent operations against Cuba took place in August of 1962, when Salvat and a group of DRE militants headed to Cuba from Miami in a small boat and attacked the Hotel Rosita de Hornedo, known after the revolution as the Hotel Sierra Maestra, in Miramar (Havana), at midnight. They attacked the hotel with a cannon, terrorized the guests, and fled. Among the DRE militants who attacked the hotel that night was José Basulto, who would go on to found the Brothers to the Rescue organization in 1995. Basulto told me personally that he was the one who purchased and shot the cannon that was used to attack the Hotel Sierra Maestra that night. He said that he’d bought it in a Miami pawnshop.

(Translator’s note: Morley repudiates the word “terrorized” as it is attributed to him.)

In August of 1963, members of the DRE in New Orleans had a series of encounters with Lee Harvey Oswald. After the assassination of President Kennedy on November 22, 1963, the members of the DRE spread a publicity campaign to insinuate that Castro had assassinated Kennedy, because Oswald was supposedly affiliated with Cuba and the Soviet Union.

JP: George E. Joannides’ official assignment was “Head of psychological warfare for JMWAVE.” What were his responsibilities?

JM: The plan was to affect the psychology of the enemy. To change their perceptions of reality in order to bring about a change in government. The best example is that of Guatemala in 1954, when the CIA orchestrated false news bulletins about an opposition to the Arbenz government, in the Guatemalan jungle. In the end, Arbenz confused fiction for reality and panic set in. Something that never happened to Fidel Castro or Che Guevara. They understood very well the difference between the fiction of psychological war, and reality.

Joannides paid the members of the DRE. He gave them a lot of money. We know that they received $50,000 a month. In today’s currency that’s more than $150,000. It was a lot of money. He was Washington’s man in Miami in charge of the DRE.

The DRE members at that time were the CIA’s favorite Cubans. Under Joannides’ direction, the DRE had four specific tasks:

  1. Political action against Cuba.
  2. Acquisition of intelligence against Cuba.
  3. Distribution of propaganda against Cuba.
  4. Distribution of its actions and propaganda toward Latin America.

JP: What is the connection between Lee Harvey Oswald, the individual who is said to have assassinated President Kennedy in November of 1963, and the DRE? What might the CIA documents tell us about that?

JM: Four months before President Kennedy’s assassination, Oswald and members of the DRE met several times in New Orleans. They had an altercation with him in the street. The DRE sent a member to his house, making him seem like a follower of Fidel. They debated about this on the radio and sent the tape of the debate to Joannides; they even wrote to Congress asking for an investigation of Oswald who at that point in time was an innocuous person. You have to remember that at that time, the DRE had specific instructions to ask for the CIA’s authorization before making any kind of public declaration.

Scarcely an hour after Oswald’s arrest on November 22nd, the DRE leaders published the documentation they’d accumulated against Oswald and in this way influenced the coverage of the assassination by insinuating that a Castro agent had killed the President of the United States.

The Warren Commission, who investigated the assassination, never realized the connection between Joannides’ employees in the DRE and Oswald. Even in 1978, when the House of Representatives Committee on Assassinations hired Joannides as an advisor to its investigation, Joannides didn’t inform the Committee about his role in the events of 1963 and the DRE.

The attorney for the House Committee, Bob Blakey, says that Joannides obstructed the investigation by not divulging the role he played with the DRE.

JP: What are you asking of the CIA with this suit you filed in December of 2003?

JM: I’m only asking that the CIA obey the law. The CIA has told me that it has more than 295 documents that it will not release for reasons of national security. The documents I have show that Joannides traveled to New Orleans to complete tasks that the CIA charged him with in 1963 and 1964. [They show] that the CIA entrusted him with delicate operations throughout 1962-64. We don’t have any information about those operations. Joannides can’t tell us, because he died in 2001. Those are the only documents about what he did in that city with the DRE members. The CIA has the legal obligation to declassify those documents, but it does not want to declassify them. It’s locked them up. I believe that the lockup sources from the CIA department in charge of Latin America. They are hiding something. The CIA tells us that Joannides had nothing to do with the DRE. I know that’s not true. The documents I have in my possession prove that indeed there was that relationship. Why do they make these statements that are so openly false? What are they hiding?

I hope that on November 16th, Judge Richard J. Leon will support my motion to have the CIA declassify these documents, so that they may be studied. This is the only way for us to know what really happened in those two mysterious CIA operations in which Joannides worked in 1963 and 1964.

JP: The CIA says that if these documents are declassified, the national security of the United States will be endangered. Do you know what the danger is?

JM: There’s no danger. Washington has a mistaken perception about what is truly national security. I’m told that they cannot declassify nearly 50 year old documents for reasons of national security. That’s not true.

I don’t know who killed Kennedy, I don’t pretend to know. What I’m asking is that these documents be declassified which have to do with George E. Joannides during 1962 and 1964, in order to clarify the facts. This is not a threat to the country, and the Freedom of Information Act says that they must be declassified. I am only asking that the CIA obey the law.

Machetera is a member of Tlaxcala, the network of translators for linguistic diversity. This translation may be reprinted as long as the content remains unaltered, and the source, author, and translator are cited.

Monday, March 16, 2009

Psychological Operations (PSYOPS) against Venezuela

Psychological Operations (PSYOPS) against Venezuela

A secret document of the US Army National Ground Intelligence Center, recently declassified in part, through the application of the US Freedom of Information Act (FOIA), confirms that the Pentagon's most powerful team for psychological operations is employing its forces against Venezuela.1 The document, dating from the year 2006, analyses the border situation between Colombia and Venezuela. It was drafted by the US Army's 4th Psychological Operations Group (Airborne) (4th PSYOP Group (A) or 4th POG) and the US Army National Ground Intelligence Center, a fact that thus reaffirms that the same psychological warfare team operates in the region against Venezuela.

The small part of the text of the secret document which was left uncensored explains how the Plan Patriot (previously known as Plan Colombia) has successfully pushed the activities of the Revolutionary Armed Forces of Colombia ((FARC), Fuerzas Armadas Revolucionarias de Colombia) into Venezuelan territory. It is explicitly being emphasized in the secret document that

"...the offensive operations of Plan Patriot and its counterparts of the Colombian military have had an important impact on the activities of the Eastern Bloc [of the FARC]...due to the success achieved against some fronts of the Eastern Bloc in Colombia, several fronts of the Eastern Bloc are conducting more combat and regenerated their activities at the Colombian-Venezuelan border. The Mini-Blocs in the Llanos and the eastern zone... have assumed distinct strategic roles in response to the Plan Patriot 2B..."

The arrival of the US Army's 4th Psychological Operations Group (Airborne) in Colombia in the year 2006 and the strategy of pushing the FARC and the Colombian civil conflict into Venezuelan territory cannot be taken as a coincidence; for it is exactly the moment when the US State Department and the Pentagon also started to publicly accuse Venezuela of collaborating with terrorism, specifically by referring to alleged dealings with the FARC. In the first semester of 2006 Washington added Venezuela to a list of "countries that do not fully collaborate in the struggle against terrorism", and then imposed sanctions against the South American country that resulted in the prohibition of the sales of arms from the United States and from any international company that uses US technology. The 2006 report of the US State Department said,

"The Secretary of State certified Venezuela as "not fully cooperating" with U.S. antiterrorism efforts... It remained unclear to what extent the Government of Venezuela provided material support to Colombian terrorists, if it did, and on which level..." (Report of the US State Department of 2006, available at www.state.gov)2

A few months later, in July 2006, the United States House Foreign Affairs Subcommittee on International Terrorism and Nonproliferation, held a hearing titled "Venezuela: Terrorism Hub of South America?", in which they declared that

"Venezuela, under President Hugo Chavez, has tolerated terrorists on its soil and has forged close relationships with officially designated state sponsors of terrorism: Cuba, Iran and North Korea. Colombian terrorist groups use Venezuelan territory for safe haven...".3

At the same time, the international press started to promote a matrix of opinion, associating Venezuela with terrorism. Articles and editorials published by the Washington Post, the New York Times, the Washington Times, the Wall Street Journal, El País of Spain, El Tiempo of Bogota, and the Miami Herald, amongst others, repeated time and again [affirmations about] the alleged link between the Venezuelan government and the FARC in Colombia, although they never provided any conclusive proof. All the evidences were based on "anonymous" sources, "high-level officials in Washington", and "analysts", without giving any concrete names, data or facts.

THE PROPAGANDA WARRIORS

The US Army's 4th Psychological Operations Group (Airborne) is the only active psychological operations unit.4 It comprises 1.300 officials and constitutes 26% of all US Army psychological operation units, the remaining 74% consist of reservists. By the year 2011, it is foreseen that the unit would eventually grow to approximately 2.300 troops who are experts in psychological operations. The official mission of the 4th Psychological Operations Group (Airborne) is to deploy anywhere in the world on short notice to plan, develop and conduct psychological operations and "Civil Affairs" (in other words, subversion) in support of coalition forces and Washington's government agencies.

The personnel of the 4th Group include regional experts and linguists who have a profound understanding of the political, cultural, ethnic, and religious subtleties of the target audience. They are also experts in technical areas such as journalism, radio operations, graphic design, newspaper business, illustration, and long-range tactical communications.

In 2003, the 4th Psychological Operations Group (Airborne) of the US Army inaugurated an installation for media operations of the Special Operations Forces (SOP) at a cost of US$ 8.1 million. Said installation is known as the Pentagon's production center for all its psychological operations and their "products", like flyers, pamphlets, posters, and segments for television and radio transmission that are all aimed at persuading and winning the minds and hearts of those who the Pentagon wants to attack. For example, more than 150 million flyers and pamphlets - all produced and printed in the installation of the Group 4th Psychological Operations Group (Airborne) - have been disseminated throughout Iraq and Afghanistan. Colonel James Treadwell, Commander of the 4th Group, emphasized that more than 16.000 hours of messages for radio transmission were produced by his group and transmitted in Afghanistan and more than 4.000 in Iraq. The printer's in the new installation has a capacity to print more than 1 million pamphlets per day.

The psychological operations troops study techniques in "marketing" and publicity before they design their "products". They also analyze in detail their impact and results. They are complete experts in propaganda and in the best ways to exert influence on public opinion so as to promote their agenda. In 2005, said unit of "propaganda warriors" was expanded through the foundation of the Joint Psychological Operations Support Element (JPOSE), with Colonel Treadwell being in command of the entire joint team. Transferred from Iraq to the headquarters of JPOSE in Tampa, Florida, Colonel Treadwell began to focus his propaganda activities towards the South. In press statements Treadwell confirmed that his new elite team for psychological operations would direct a part of the work to Bolivia and Venezuela. A little later, a contract (worth up to US$ 100 million) was awarded to the company, Science Applications International Corporation (SAIC) to help design the "campaigns" of psychological operations together with JPOSE. Two other companies, Lincoln Group and SYColeman, also received similar contracts financed through the team's budget, a budget that surpasses US$ 8 billion per year.

From these companies, SAIC has a pretty dirty past history in Venezuela. It was the company that, together with PDVSA, the state owned petroleum industry, constructed a mixed company named INTESA that began to automate the petroleum industry in Venezuela in 1995. And INTESA was the same company that executed one of the most brutal sabotage acts against the Venezuelan industry at the end of the year 2002, with the intention to force President Hugo Chávez out of power. The company was used as a platform to attack the "brains of PDVSA" by destroying its entire data-base and automated systems and converting it again into a manually operating company. Their actions caused billions of dollars of damage to the Venezuelan economy and its international reputation as a secure petroleum provider and producer. Nevertheless, they did not reach their objective to topple President Chávez, and little later INTESA was closed and forced to cease their operations in the country. Three years later, their new contracts appeared - to carry out psychological operations against the same government they previously had tried to neutralize without success.

Since the United States' most powerful team of psychological operations is working actively against Venezuela, the fruits of their work have been seen both on an international level and also within the country on a national level.5 President Chávez is already classified as "dictator" in international public opinion and there are few who would doubt his alleged "dealings" with the FARC in Colombia - despite the fact that there was never a single proof offered that would confirm such "dealings".

Psychological operations are considered by the Pentagon to be their "most powerful weapon" to date. Through screens, broadcasting stations, newspapers, posters, design of clothes and objects, they transmit their purposeful and well planned message to subtly exert influence on public opinion and perceptions about topics of interest. It is the new battlefield where all of us are forced to assume a role, because nobody escapes from information and communication in today's world. It is the struggle for truth and justice against lies and manipulation. The decision to be either victim or combatant within that asymmetric war is in the hands of each of us. Don't be fooled.

Translator's notes:

  1. T.n.: For groundbreaking evidence on the extent to which the Bush administration illegally aided the opposition, influenced the Venezuelan military, and directly and indirectly supported the coup of April 2002, see Eva Golinger's outstanding investigation: The Chávez Code: Cracking U.S. Intervention in Venezuela. Havana, Cuban Book Institute, 2005. Available also in Spanish, Italian, and German language.

  2. T.n.: see http://www.state.gov/s/ct/rls/crt/2006/82735.htm

  3. T.n.: Hearing Before the Subcommittee on International Terrorism and Proliferation. 2006. VENEZUELA: TERRORISM HUB OF SOUTH AMERICA? Document available at The Center for International Policy's National Security Program

  4. T.n.: Concerning the information resumed in this and the following paragraph, and for further details please see Global Security

  5. T.n.: In this context we highly recommend to our Spanish-speaking readers the excellent documentary "Enjambre" (a Guarataro Films & Venezolana de Televisión Production) that analyses the Networking doctrine, the concept of Fourth Generation Warfare and its application in Venezuela. While we continue making every effort to help provide an English version of this documentary, here's our translation of the brief summary provided originally by Rebelión in Spanish language:

[...] Introduction: The concepts "Fourth Generation Warfare" and "Networking".

Past History: Parallels between the 2002 coup d'état in Venezuela and the coup against Allende.

Networking in Venezuela: How Fourth Generation Warfare works in Venezuela. The opposition's change in strategy. By 2006-2007, the opposition focuses on the exploitation and manipulation of social and political problems. New political actors appear. Media Warfare and Psychological Operations. Assassination. Declarations of journalists about Chávez' death or assassination. TV-series about the assassination of Chávez or a [military] invasion in Venezuela. Parallels to the Chilean case. Plan shattered in Venezuela.

Military encirclement: Plan Colombia, Plan Balboa, Paramilitaries and US military bases.

Resistance: Examples of resistance struggles. Vietnam, Cuba, and Middle East. Asymmetrical warfare and the reserves or militia. Civilian-military union. April 13th. [...]


Original Source in Spanish: Rebelión - Operaciones psicológicas contra Venezuela: Washington y su guerra contra la revolución bolivariana; published on March 5th, 2009.

© Translation Copyright 2009 by AxisofLogic.com

This article has been translated from Spanish into English by Iris Buehler and revised by Les Blough, who are members of Tlaxcala, the network of translators for linguistic diversity. Both reside in Venezuela. This material is available for republication as long as reprints include verbatim copy of the article in its entirety, respecting its integrity. Reprints must cite the author, the translator & reviser and Axis of Logic as the original source including a "live link" to the article. Thank you!

Read her biography and contact the author: Eva Golinger

Contact the Translator: Iris Buehler

Tags: Psyops | Venezuela-U.S. Relations