The “Terrorism” Industry: The Experts and Institutions That Shape Our View of Terror [1 (pbk) ed.] 0679725598, 9780679725596

What is a terrorist act? The authors argue that experts on the subject hold imperialist views biased in favor of the sta

236 30 28MB

English Pages 312 [334] Year 1990

Report DMCA / Copyright

DOWNLOAD PDF FILE

Recommend Papers

The “Terrorism” Industry: The Experts and Institutions That Shape Our View of Terror [1 (pbk) ed.]
 0679725598, 9780679725596

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

n a v i l l u S ' O y r r e G a a W Edward Herman

OTHER

BOOKS

BY EDWARD

S. HERMAN

Corporate Control, Corporate Power

d an ag op Pr d an ct Fa in m s i r o r r e T : k r o w t e N or rr Te nda al Re e Th

BY EDWARD

S. HERMAN

AND

FRANK

BRODHEAD

Demonstration Elections: ic bl pu Re n ca ni mi Do e th in s on ti ec El U.S.-Staged Vietnam, and El Salvador

n o i t c e n n o C n a i r a g l u B e th of The Rise and Fall

BY EDWARD

S. HERMAN

AND

NOAM

CHOMSKY

f o y m o n o c E l a c i t i l o P e h T : t n e s n o C g n i r u t c a f u n Ma the Mass Media m s i c s a F d l r o W d r i h T d n a n o i t c e n n o C n o t g n i h s a The W 3 : m s y l c a t a C e h t After f o n o t c u r t s n o c e R e h t d n a a n i h c o d n I Postwar

y g o l o e d I Imperial

THE

“TERRORISM’’

INDUSTRY

:

bs

e Experts and Institutions at Shape Our View of Terror

Edward S. Herman and

Gerry O'Sullivan

Providence

~

}

| |

Copyright © 1989 by Edward S. Herman and Gerry O'Sullivan

All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Pantheon Books, a division of Random

House, Inc., New York, and simultaneously in

Canada by Random House of Canada Limited, Toronto.

Grateful acknowledgment is made to Anthony Sheil Associates Ltd. for permission to reprint “Sabra and Chatila” from The Gun and the Olive Branch (Revised Edition) by David Hirst, published by Faber & Faber Ltd., London. Copyright © 1984 by David Hirst. Library of Congress Cataloging-in-Publication Data Herman, Edward S.

The “terrorism” industry : the experts and institutions that shape our view of terror / Edward S. Herman and Gerry O’Sullivan. cm. Includes bibliographical references. ISBN 0-394-58080-X ISBN 0-679-72559-8 (pbk.) 1. Terrorism. 2. Terrorism—Prevention. 3. International relations. I. O’Sullivan, Gerry. II. Title. 1990 HV6431.H46 303.6'25—dc20 89-42655 Book Design by Anne Scatto

Manufactured in the United States of America First Edition

by , es ir qu ac m le ob pr e th of on ti The dominant defini e os th of y it il ib ed cr d an ht ig we e th repetition, and by n mo om “c of t an rr wa e th , it e ib cr bs su who propose and sense.” —STUART HALL

Contents

List of Tables

1x

Preface

x1

Part |. Terrorism in Fact and in Western Imagery I From Bandits to Terrorists 2. Western Primary Terrorism and the Demand for a Unified Opposition to “Terrorism” The Western Model and Semantics of Terrorism

Part Il. The Manufacture and Distribution of Terrorism

Images The Terrorism Industry: The Government Sector s, nk Ta k in Th , es ut it st In : or ct Se e at The Priv

and Lobbying Organizations

13

37

53 55 73 119

. The Security Industry

vil

s t n e t Con

_ _ _ — — — — — — — ———— 149

7. The Experts e h t f o t l e B n o i s s i m s n a r T as a i d e M 8. The Mass Terrorism Industry

19]

9. Conclusions

913

n o i t c A in m s i r o r r e t r e t n u o C Appendix A:

231

ce en ol Vi t is or rr Te y ar om Pr in s ie ud St Appendix B: Three l na io at rn te In f o g in st Li l Appendix C: A Partia

233

ps ou y Gr bb Lo , d es an ut it st In s, nk ” k Ta sm in ri Th ro er it nt “A

JES:

(with Principals and Experts) Appendix D: Some Excluded Experts on Terrorism

246

Notes

249

Index

297

Vili

List of Tables

30

2-1. Israeli Versus PLO Terrorist Killings 3-1. Killings by State and Nonstate Terrorists: Numbers and Orders of Magnitude

|

46

4—]. Witnesses in Twenty Government Hearings on Terrorism, 1980—1986

64

7-1. The Terrorism Experts

144

7-2. Linkages and Perspectives of the Terrorism Industry Experts

184

7-3. A Matrix of the Linkages of Thirty-two Terrorism Industry Experts

186

7-4. References by Terrorism Industry Experts to Western/Right-Wing and Non-Western/ Left-Wing Terrorism

8—1. Mass Media Sources Used in Covering “Terrorism”

8-2. New York Times’s Sources Used in a ” m s i r o r r e t r e t n u o C “ on es Four-Part Seri

189

194 196

— — — — — — ——

— — s e l b a T f o Lis t

d n a m s i r o r r e T e t a t s n o N d n , a s n o e i t t a a t i l i f f A l g_3, S a c i t i l o P r i e h T d n a s t s i r o r Ter a i d e M ass

M . S . U e h t 0 1 d e y a r t r as Po

1 8 9 1 n i s w e N V T S B C y b n e e S s a s t s i r o r r e T g_4, d n a s l a u d i v i d n I f

o s n o i t a i l i f f A l a c i t i l o P e g5. Th e h t n i t s i r o r r e T s a d e i f i Ident

Groups

a i d e M s s U.S. Ma

506 918

910

Preface

s im ct vi n ai rt ce ke ma at th s se es This book is about cultural proc

mo at th d an , ng di en tr ar he ns io at ul important, their trials and trib

to s im ct vi r he ot e us ca at th t bu , lf ha be bilize public opinion on their e Th s. er iz im ct vi to in ed ut sm an tr be remain unnoticed or even to s wa n io ss pa d an y th pa em se ou ar power of focused attention to e er wh 0, -8 79 19 of is is cr e ag st ho an Ir dramatically illustrated in the s wa an [r in ns ze ti ci S. U. e re th yft the seizure and detention of fi

. hs nt mo ny ma r fo s si ba y il da a on t en tm ea tr a di me ty ri io pr n ve gi

y it iv pt ca ng lo r ei th d an , ns ze ti ci an ic er Am , se ur co of These were,

r ei th of t ui rs pu in ns io at ti go ne d an s on si us sc di us uo in and the cont e ns te in e th t Bu . py co ws ne t en ll ce ex d an ic at am dr r fo release made

l ca ti li po ic st me do t an rt po im ed rv se so al es ag st ho e th focus on of n io at in rm te a ” a, ic er Am d ne ke wa ea “r a ht ug interests that so S. U. of p du il bu a d an e, nt déte s e s a c r e h t o n i , t s a r t By con r e g r a l e s e h t h t i w e d not coinci

. ry st du in ms ar e th d an military forces o d t a h t s n a c i r e m A f o of victimization e r a a i d e m e h t , s d n a m e d d interests an

X1

ee

8 0 0 0 ——

n i n e m o w h c r u h c n a c i r e m A r u o f f o r e d r u m e p a r e h T . e v i t n e less att press

n a c i r e m A s s e l h c u m t o g , e l p m a x e r o f , 0 8 9 1 n i r o d El Salva

, o k z s u l e i p o P y z r e J t s e i r p h s i l o P e h t f o r e d r u m e h t n a h t e g a r e cov

d n a , s a r u d n o H , a l a m e t a u G n i s t s e i r p n a c i r e m A f o g n i l l and the ki s e s a c e s e h T . n o i t n e t t a a i d e m e l b i g i l g e n d e v i e c e r s a h s e n i p p the Phili

a h t i w d e d i c n i o c s n a c i r e m A d e z i m i t c i v n i t s e r e t n i a i d e m d e t u m of

d e n i a t s u S . g n i l l i k e h t g n i o d s e m i g e r e h t r o f t r national policy of suppo

f o n o i t a z i m i t c i v f o n o i t a n i b m o c a e r i u q e r o t s m e e s t s e r e t n i a i med r o , v o r a h k a S , o k z s u l e i p o P s a h c u s , s n a c i r e m A n o n r o ( s n a c i r e Am

n o i t n e t t a f e o g a t n a v d d a e v i e c r e p e h t d n a ) r e t t a m t a Sharansky, for th . s e t a t S d e t i n U e h t n i s p u o r g l u f r e w o p y b y t i c i l b and pu d e n o i t n e m s st ie pr d n a n e m o w S. U. e th d n a s e g a t s o h The Iran

at th as m, is or rr te of s im ct vi n e e b e v a h to id sa be l al d ul above co

n r e t s e W y b d n a es ri na io ct di d r a d n a t s in d e n i f e d n e e b s ha word s wa s es pr e th y b t n e m t a e r t r ei th at th t en id ev is it t u B 2 s. ie it or th au e th at th is k o o b t n e s e r p e th of e m e h t r o j a m A t. en er ff di y l d e k r a m , ty li bi si vi at th d n a , ce oi ch l ca ti li po designation of terrorist is a highly ow ll fo t s e W e th in on t ti s i ac r o r r e t attention, indignation, and counter

as bi is th il ta de e r in o l p x e ll wi e . a W d n e ng g vi a a political and self-ser d e p to o l e v e d n e e e b v a h at l th e d o m s d c n i a t n a m e s e , and agenda th g n i h t e m o s r fo d e e n d n a of e us ’s st We serve Western ends, and the y of m r a e n th io to nt te at of al t de ea gr a ve .” gi sm e W ri ro called “ter experts and the supportive institutions that serve to expound, . a e d W m n s e i g r a o r n r r e e t e t z s i e d W e n a th g a p o e, r p d iz n al a ration also examine the mass media’s role in portraying terrorism in accord with Western needs. It is our view that the West’s experts and media have engaged in terrorism the of handling their in reversal” AMR LOCESS of “role

Fre abi teesbeanen ies, eee oak

movements whose Patt ee uve i, seeds nae enero see serious of victims main the are eros cena ESE Sh “ terrorists main the d identifie ave * i the world as Soil pve this If rror. counterte ssa Nf Foss reader the startling, : m e v o N n i t a h t t c a f e h t n o t F . st li t r o p e r n o g a t n e P a , 8 8 19 e o as s s e r g n o C l a n o i t a N n a c i r f A e M e th ca t s u o i r o t o n e r o m “ e h t of

FONTS SCCeh

epg a

zambiquan Civilians ea

en

Ai

ee

Sa

ushent- admits killgduovsr O00 . 1986 and 1988, is identified merely Xil

an “indigenous insurgent group” that engages in domestic terrorist violence.*> The report from which the 100,000 figure is drawn, however, claims that RENAMO’s role is purely destructive, and that

it lacks a program or any observable indigenous base.* There is also overwhelming evidence that RENAMO’s activities have been crucially dependent on South African aid, training, radio communication,

of nt rume inst y prox a been has it that and ort, supp ral gene and that government’s policy of destabilizing the African front-line a it e mak ld shou ence viol r othe and states.° RENAMO’s killings t oris terr s riou noto most d’s worl the as strong contender for ranking

orterr of sor spon state ier prem the ca Afri organization, and South AMO REN But a. Liby than gory cate ism, vastly more important in this m oris terr ern West by tion niza orga is rarely if ever listed as a terrorist ty bili onsi resp ary prim s bear h whic f, itsel experts, and South Africa Moand ola Ang in le peop ion mill for the death of an estimated rngove U.S. by ed tifi iden y larl regu is zambique alone in the 1980s,° of m victi a as a medi mass and rts, expe ment officials, establishment terrorism, not a terrorist state.’

al on ti Na , ce li Po al on ti Na e th at th ct fa e th er Readers may also pond

ed at ic pl im en be ve ha o wh , or ad lv Sa El of ce li Po Guard, and Treasury in s an li vi ci of er rd mu d an e, ur rt to , pe ra of s in thousands of case

e th r de un ng ni ai tr d an s nd fu S. U. g in iv ce re the 1980s, have been ss re ng Co by ed ss pa t, Ac ce an st si As sm ri ro er -T authority of the Anti

a by rt po re 86 19 A ”® m. is or rr te al on ti na er nt “i in 1983 to combat ps ou gr ed as -b ch ur ch S. U. o tw by or ad lv Sa El to research team sent

by s st re ar at th d te no ce li po an or ad lv Sa e th to investigate U.S. aid to the police are th wi es cl hi ve ed rk ma un in rs ce fi of ce commonly conducted by poli s or rr mi so al es cl hi ve ch su of darkened glass windows. The use l ca ti li po m ro [f ns io at ar cl de ny Ma . .. s. ic ct ta d ua sq h at de l traditiona s ee gr de g in ry va te ca di in s] on ti za ni ga or ts gh ri n ma hu d an prisoners d an n, io at oc ff su , ng di ol df in bl , gs in at be g in ud cl in e of physical abus ad he ce li po at l va ri ar d an st re ar of nt me mo rape between the re fo be ne do y ll ua us is n io at og rr te in of e as ph t rs fi quarters. This .? rs ce fi of ce li po as ee in ta de e th to es lv se em th the captors identify

p a s i D e h t f o s r e h t o M e h t f o e e t t i m m o C e h t d e t i The delegation vis

, a l u T a s e r e T a i r a M r e b m e m e e t t i m m o c h t i w e k o p s d n a peared, Xi

n, me ed fi ti en id un ur fo by n io ct du ab nt “who testified about her rece e ul se e e ed at pe re d an g, in at be n, io at og rr te in and her subsequent a y da e th Zo y Ma on ed st re was again ar was charged with being a terrorist an

re

was su

Fe

q

er. She

: y impris-

of se ca is th on n io at rm fo in r he rt fu r fo oned.”!° (See appendix A ne ni of e on s wa la Tu sa re Te a rf Ma .) on ti counterterrorism in ac 86 19 y Ma in ce li Po ry su ea Tr e th by ed st re s ar er rk human rights wo

eat Gu of nt me rn ve go e th , 86 19 e nc Si m. is or and charged with terr nt me rn ve go S. U. r a de s un nd t fu of en pi ci re e th en be so al s ha mala , my ar an al em at Gu ng li ru e th gh ou th al m, ra og m” pr is or “counterterr s an li vi d ci me ar un re mo ny ma ed ll ki s , ha ce li an po or ad like the Salv , of ng nh ga ei -M er ad , Ba es ad ig Br d Re O, PL e th d di an s th 80 19 e th in

a Abu Nidal, Qaddafi, and Carlos the Jackal combined. Although we will be focusing heavily on the “invisible” victims of terrorism and the biases of the Western terrorism experts and media, we do not approve or condone in any way the indiscriminate acts of violence that the Western experts on terrorism, government officials, and press attend to with great energy. Attacks on unarmed civilians in plane hijackings, bombs set off in public places, and the like are inexcusable, and attempts must be made to deter and control such actions

whatever their causes and whoever the perpetrators. Immediate practical measures of prevention and control are necessary, and punishment must be meted out in accord with the rule of law. We do not

believe that savage penalties will be useful or are morally justifiable for the crimes of hijacking and hostage-taking per se, although damage to

individuals and property that occurs in such actions is a different matter (and is treated severely in existing law). We also believe that a pol-

icy of refusal to negotiate with terrorists is foolishly unbending, poses

excessive danger to hostages, and is unsustainable. The powers who

claim to follow this policy do so erratically. d m te e ic is th on fl or in rr e te t th al of ea de e, at gr a o, ev th to li be We West has its roots in Western acts and policies. We do not deny e th necessity of protecting against terrorist acts a s they occur, but ee urgently importan acts if, in the lon

t to

understand 'he underlying causes of a

this ct that ae ao sepia is: to be reduced. We pte : anda enti, 1€ Vest inflicts far more terrorism than it eS

‘ obscured by its ability to define itself as view vict; oaeither while its vicums remain invisible or are branded terrorists. I XIV

Preface this is true, and if it is also true that a substantial part of antiWestern terrorism is a response to Western terrorism, then the

main solution to the terrorism problem for the West is clear: stop doing it. We would like to express our thanks to the following individuals for providing us with information or for critical reading of the

manuscript: Chip Berlet, Nicholas Bell, Nicholas Busch, Noam Chomsky, Bob Figlio, Howard Goldenthal, René Haquin, Roy Head, Mary Herman, Albert Mokhiber, Diana Johnstone, Wes McCune, Ben O’Brien, Robin Ramsay, Ellen Ray, Diana Reynolds, Bill Schaap,

Elmar Weitekamp, and Lou Wolf. We are also grateful to our editor at Pantheon, Jim Peck, for much cogent advice. The authors alone are responsible for any remaining errors.

XV

Terrorism in Fact and in Western Imagery

From Bandits to Terrorists

Introduction

n the half century before “terrorism” became a commonly used word, the United States struggled valiantly against a variety of “bandits,” “barbarians,” and “savages” in the Philippines and Central America

and the Caribbean

basin. In the Philippines,

President

William McKinley, having consulted God as well as Democratic and l cia mer com our ing lett that ing not r afte and ! ers, lead n ica ubl Rep rivals France and Germany obtain control of the Philippines would do to us for left g hin not was ere “th that nd fou ,” be “bad business

and ft upli and s, pino Fili the e cat edu to and all, m the take to but

best very the do ce gra ’s God by and m, the ize ian ist Chr and civilize

.”? died also st Chri m who for n -me low fel our as m, the by we could

t, Roo hu Eli War of ary ret Sec of ds wor We moved in, and in the d cte ndu “co e far war by ves nati t stan resi bly ica xpl ine the d due sub with marked humanity and magnanimity on the part of the United

States,” rte ex d an on si es gr ag of r wa s ou er rd mu In reality, we fought a

The “Terrorism Industy ———————__

i

war’ against a people BQ ECEUS ely referred to

n a i d n I “ n a , n o i minat with lete comp war a ; ages “sav and ” dits “ban as well a5 * ee as “niggers as eee mace killing

of prisoners, and eventually,

water torture, the

pee rebels. ae

ae

ae nbcirect attacks on the civilian base of the

niding mission ran into a severe obstacle, noted General Arthur McArthur in a report of October

ae “the almost complete community of action of the

The . ures meas h hars for need the ce Hen entire native population.”*

have may and s, sand thou of ds dre hun the civilian toll ran into Anti d lan Eng New the for ator stig inve The exceeded a million.® rn retu his g owin foll , 1904 in e wrot Imperialist League Philippines:

from the

y, tr un co e th of s ng di il bu ic bl pu e th d ye ro We have in fact dest s, ar ye x si of od ri pe e th ng ri du es ss lo op cr us inflicted continuo ed uc od pr y, tr un co e th of ns io ct se e rg la ed rn bu d an d ge va ra conditions leading to the death of most farm animals and to serious human and animal epidemics, brought foreign trade to an unprofitable condition by our tariff legislation, inaugurated tremendously expensive government for the benefit of foreign officeholders, established a partisan judiciary, crowded the prisons and deported or sent to the gallows the best and most patriotic leaders.® Nevertheless, the mainstream press of the United States found

this to be a benevolent enterprise, despite some unfortunate errors and regrettable excesses. Christianity and progress were being

ance to the barbarians, banditry was being quelled, and we would ae w; also benefit from the new partnership

(t ho se pe op le Fi li pi th no e wi th partnership

still alive).

Indwars ian of eociar nerastcationto Vietn againsamt inlesserthe breeds , from the 1960s and 1970s, As j

the government er centuries violen ce of acts demon strat ed any Mat against Filipino pence the in war of rules the of violat ions and a. prison e of handling Provoked by the ae infrequent, “contrary to policy,” and never the outsid e operat ing nts eeaa h ee Warfar e.’ piped hee the evidence of Serious

war crimes did get some publicity 17 ene dominant tone was 1 he Propa = t ic, and t e g o l o p a 8 nda response,

1902, of Pring administrat; On’s

MOtLy. of the press agreed, an

th

led by Senator

Henry

Cabot

ae

From Bandits to Terrorists a

Lodge, was effective in squelching criticism, even though based on massive deceit.®

During the brief period of disclosures and occasional recriminations in 1902, the most prominent editorial view was that the U.S. atrocities occurred not “because of, but in spite of, the government’s

general policy in the Philippines. . . . The penalty must fall not upon the policy, but upon the men.”” Many papers were more sympathetic to the pacification policy, and felt, as the St. Lowzs Globe-Democrat put it, that “it is strange, indeed, if American soldiers are to be called to

the field to fight savages without hurting them.”'” The New York Times also stressed the “hardships and dangers” faced by our “brave and loyal officers,” and castigated the “cruel, treacherous, murder-

ous” natives of Samar in the Philippines who had provoked unseemly behavior on the part of American troops." The racist element in the press and other opinions on the conquest of the Philippines was potent. This was a period of hardening race relations and numerous lynchings in the United States itself, and even opponents of U.S. imperialism often rested their case on the difficulties of bringing civilization to peoples “animated with the instincts, impulses and passions bred in the tropical sun” (Carl Schurz).!? The

imperialists, in turn, argued

that colored

peoples

should not be permitted to obstruct the natural expansion of whites, or that we were obligated to save them, with “intervention the plain duty of the United States on the simple ground of humanity.”! But as Shenton notes, “Through all arguments both imperialist and antiimperialist there moved an almost unquestioning acceptance of the innate superiority . . . of the Anglo-Saxon. . . .”!4 In the Caribbean and Central America as well, in the years between 1898 and 1940, the United States was regularly obliged to intervene to quell “banditry” and bring responsible government to

races regrettably unable to govern themselves. The word “bandit” was used loosely to designate anybody who stood in our way. Eco-

nomic historian M. M. Knight pointed out that in the Dominican Republic, “all resistance was ‘banditry’ to the Marines, even when it was Organized, using flags and uniforms.”!> The New York Times, however, found that “the goodwill and unselfish purposes of our own govern“moved was policy U.S. that and established,” clearly ment... [were]

almost exclusively by a desire to give the benefit of peace to people

_ _ — — — — — — — y r t s u d n I ” “Terrorism

ii

e r u t a n e h t n I “ , s e m u T e h t l O 4 . s n o i t u l o v e d e t a e p e r y b d e torment d o o g r o f ” a o e e p e b o t e a o l s e t a t S d e t i n U of things, the s r o v a e d n e r u O , O s 4 e E a e a c i N e t . o g n i m o D o t n a S n i t n e m n gover n i , y l e t a n u t r o f n U . d l r o w e h t n i s e v u o m t s e b e h t “ were based on o t s e i t i l i b i s n o p s e r r u o y b d e g i l b o n e e b e v a h s e n i r a m r u o s e such plac :

66

5

»16

a e f o k r o w s u o l i r e p e h t n i e g a g n e “

d n a s t i d n a b e v i s down elu

e h t “ d n a , s e i t u d r u o n e v i G 9 1 ” . e f a s y t r e p o r p d n a e f i l e k a m o t g n i y tr s i o n i d n a S “ t a h t g n i y a s t u o h t i w t s o m l a s e o g t i ” , nature of things pose” of e h T ° ? ” . r a w f o e t a t s e h t r o f e responsibl

“professed

pur

y r t n u o c r i e h t f o l i o s d e r c a s e h t g n i e e r f “ s a w o n i d n a S e k i l s t i band h c u s t a h g u a l o t y s a e s 1 t i “ e l i h w t u ” b , r e d a from the ruthless inv t h g i a r t s o g o t t u b “ n o i t p o o n s a t h n e m n r e v o g . S . U e h ” t , s e h s i r u o l f ? ? ” . a u g a r a c i N n i e c a e p e h t g n i p e e k r o f m a ahead with its progr y l n i a g d n e u t r e v n o c e v a h s “ e n i r a m r a u u o g a r a c Fortunately, in Ni d e m r o f s n a r ] t d n a [ . s . r . e i d l o e s v , i g t n c a i d n a t s p , u t blacks into smar

e c i l o p r o e f c r y o r f a n t a i l s i i m t r a p n o n a o l t n a i i r e t a e m v i t a e n d u cr t n e o t m “ n r e v o g e h w t o l d l l a u o ” h s s p o o r t f y o d o e b n i f s “ i ” h . T y t du , s i * h ? T ” . t i o r t e d v e o n r d u e y t n m i r a a r t maintain itself with the wellof course, was

Somoza’s

national guard, which,

with steady U.S.

° * . a 9 u 7 y g 9 l 1 a u l l r J i a t c r i e N o d t t r d h o n w g , la a support brou e n i p p n i o l i i h t e P p h i f t r o c s e e d t h a t h In retrospect it is easy to see t ” s e g a ” v s a l t s d a i “ n d r n a t n a s n a b l e “ e s c C a b i — e r r Ame and Caribbean t s i l a i a r i e g p o r m ) y l o i t l l o f s a g i p c n c a i o a g r d r o t n (a s was part of an ideol

y . s n s i i t 1 a I r l e c p r . o a n p o y d i h s n t e a e i a n l h n o T i i m s o s d d e n r a g g a

clear also that the lies and hypocrisy were not seriously contested in

a

s a v i n sri

, t t n i e m h s i l b a t s l e a n o i t a n e h t f o t r a p s A . s s the mainstream pre e e i s y a s w e e o was no question oe oe wesahad4daonae r u e o n n e 1 v r e t n i o t t h g l i a r r u t e e Se

yard. eee

t c f i i h t s n a m e s e h e t g n i n a y h e l t c t e t i w l has beenW

€rrorists,’ and we will show that the usage and treatment of t€rrorism and terrorj coriive th an t c e j b o e r o m o n is y a d o t s t s i r o the earlier handlin

y l e s o l c e l o r l a c i g o l o e d i n a s y a l p d n a s t i d n a b f o e a o t a h t g n i l b resem “bandit,” desigNates an eiiaist

of

i predecessor.

“Terrorist,”

like

: ? a t s o h w y d o b e m o , s t n e m h s i l b a t s e n r e t s e W i e in th; e way of h Ss : IZation e t a t s n r e t s e W t a h W 4 2 . s m i a n r e t s e W f o r o y r t i d n a b r e v e n is do ? r e t s e W t fi s n o i t c a r i e h t if terrorism, even

nee

From Bandits to Terrorists —————

definitions of these terms and are declared by Western political

entities like the International Court of Justice to be in violation of international law (1.e., banditry). The United States and other West-

ern states are still portrayed in a defensive posture, answering and remedying the provocations of the bandits-terrorists. The West remains the repository of civilized values and humane methods, which is being challenged by barbarians. In the years 1983-88, George Shultz and Ronald Reagan expounded the same or only

slightly altered self-righteous protestations as Elihu Root and William McKinley offered at the turn of the century and that Charles Evans Hughes and Calvin Coolidge provided in the 1920s. And the levels sta teoff ici al bot in h rea lit of y mis rep an res d ent ations of hypocrisy ear lie r. tha n no w les s no are me di a the an d ments

The Terrorism Industry as a Response to Market Demand

1s s ist ror ter of t tha d an s it nd ba of era the n ee tw One difference be ve ti or pp su d an s rt pe ex t lis cia spe od ri pe that during the latter ts an re sc mi the r to ni mo d an fy ti en id to d pe lo ve de ve ha institutions is Th . em th th wi al de ld ou sh st We ed iz im ct vi the and explain how cal iti pol d pe lo ve de ly gh hi a in r bo la of on isi div of s es oc pr reflects the ny Ma t. en hm is bl ta es ” ty ri cu se l na io at “n e rg la a th wi r de economic or I, FB the , om fr fs of in sp or of, ts par are s of the industry member

a use We . ots sho off e at iv pr ias qu ir the d an on ag CIA, and Pent uc od pr the e us ca be ” y, tr us nd “i an of l de mo ic rudimentary econom eldev l wel is ut tp ou al iv ct pe rs pe lna io at rm tion and sale of an info . ons uti tit ins d an s al du vi di in ble fia nti ide oped and located in a set of

ist in e es th e us ca be e at ri op pr ap The economic framework is also

al tu ec ll te in r fo d” an em “d a tutions and associated experts meet s ou og al an s, st re te in ul rf we po r he ot d an es at st by e ic rv se l ca gi lo eo id e th by py co g in is rt ve ad or my ar e th to the demand for tanks by e ic rv se al tu ec ll te in d an , em st sy et rk ma a is is Th producers of soap.

, em th e uc od pr o wh e os th d an s, ea Id . es rc fo et rk ma to ve si on sp re is

s ce ur so re d an ed ne e th th wi e os th by ed iz id bs su d can be bought an al on ti Na n ca ri Af e th r he it Ne . nd ma de e iv ct fe to provide the ef

ee

y a a — — — — — — — — y t t s u d n I m s o r heete

Congress (ANC) nor the Mutual Support ee of Guatemala can fund data banks or theoretical analyses of the state terrorism that an posed has and oe their in s has killed scores of thousand

e. ee vor survi the to t threa ongoing

ee governments

ver, howe ts, effor ectua intel such te rwri unde do firms ess busin and

conin s need their to nent perti and they want data and analyses

e restiv and s rebel are e Thes es. enemi d eive perc their fronting large in ging enga nts rnme gove -wing underclasses, rather than right

scale torture and killings or Western-organized and Western-funded insurgents attacking disfavored states. The definitions, models of “terrorism,” and appropriately selective focus of attention follow , accordingly.?° The terrorism industry comprises government officials and bodies, governmental and quasi-private think tanks and analysts, and private security firms. The “private sector” of the industry 1s heavily interlocked with government intelligence, military, and foreign policy agencies, and is funded by and serves both governments and corporate establishments. The analysts supplied by the private sector of industry, along with those working in government, constitute the “experts” who establish and expound the terms and agenda demanded by the state. In accord with the state agenda, these experts invariably see the West as the victim of terrorism, and most of them also identify national liberation movements, seeking escape from colonial and neocolonial rule, either as terrorists or as a threat to the “democracies” by virtue of their being “manipulated” by the

Soviet Union and its proxies.2° The mass media contribute experts as well, but more important, serve as conduits for government and corporate-sponsored opinion. The terrorism industry is multinational, with close ties betwee?

government and private sponsors, institutes, and experts In and among the United States, Israel, and Great Britain, and also enco™

Ko re a So ut h Af ri ca , So ut h Fr an ce , Ge rm an We y, st Ca na da , pa ss in g Taiwan, and other members of the Free World. This multination4 spread expresses, first, a commonality

of state interest. AS Arie

Merari, a leading Israeli terrorologist, said in an interview 0D South African state radio, “The foundation of the strugg l a e g a i nst ter rors . ; ; inst the pEhPenoemmebnoodniedof in o un it y; th e u n i t of y e Western world ages terrorism itself, . , .”27 th Accordingly, Mera™ mn

From Bandits to Terrorists —__——_—__—_—_—_———__ the ANC and SWAPO

to be terrorist organizations, but not UNITA

or RENAMO. The multinational character of the industry also reflects an intent on the part of some states to influence opinion elsewhere (e.g., the Israeli effort to mobilize U.S. opinion against the Palestinian cause). It is manifested in the internationalization of institutes, conferences, publications, expert and media citations of

authorities, and standardized definitions and agendas. These processes have yielded a closed system of discourse on the subject of terrorism within the United States and in other Western ings hear in ate icip part who rs, make ionopin of set l smal A states. of or sect ate priv or t men ern gov the by d sore spon and conferences ng audi appl ews revi and les, artic s, book e writ the industry, and who echo an in as line ial offic the e erat reit , ghts insi keen one another’s this ies, orit auth ed edit accr a’s medi mass the as chamber. Established

ive rnat Alte m. oris terr of on ussi disc the zes poli mono p small grou ely ctiv effe are nts gme jud and ks, ewor fram das, definitions, agen excluded. The few experts outside the terrorism industry who have nant domi the g usin to en driv are a medi mass the to s acces al sion occa definitions and frames in order to be understood. This process of closure has allowed “terrorism” to be used as an instrument of news

management and ideological mobilization serving Western establishment interests, essentially without debate or audible dissent. The service of the terrorism industry has been very much needed in the West as a cover for its own activities and crimes. During the past forty years the Western states—including South Africa and Israel, as well as the great powers—have had to employ intimidation

on a very large scale to maintain access, control, and privileged positions in the Third World, in the face of the nationalist and popular upheavals of the “postcolonial” era. This has been a primary terrorism, in two senses: first, it has involved far more extensive

killing and other forms of coercion than the terrorism focused upon in the West (see tables 2-1 and 3-1 and the accompanying text below, and the case studies in appendix B). Second, it represents the efforts by the powerful to preserve undemocratic privileges and structures from threatening encroachment and control by popular Organizations

and

mass

movements.

From

this

perspective,

the

actions of the ANC constitute a derivative and provoked response senses two the in y primar is which ism, terror state n Africa South a to

y r t s u d n I “Terrorism

he

a c a d

t h g u o f e a e e a y e e r o f e b , y l r a l i m i S * * . d just note d e r o s n o p s . S . U e ? O a e ; 0 1 m s i r o r r e t y r a m i r p a t s n i aga e a t r o p p u s n i e c n e l o i v e a e s r e g u a d e y o l p m e h c i h w , e m i g e r a z Somo : . e g e l i v i r p c i t a r c o m e d n u y l l o h w f o a system

ed ur rt to nt me rn ve go ry ta li mi h is rk Tu e Asa further illustration, th

an l el qu to rt fo ef an 1n s, 80 19 e th in s rd Ku of s and killed thousand nt me rn ve go e Th . ce en ol vi ve si es pr re by nt me ve mo independence

en ev , od ri pe me sa e th in s rd Ku of s er mb nu er rg la of Iraq killed still using chemical weapons and nerve gas as instruments of massacre e ge fu re r, ve we ho y, an rm Ge st We d an en ed Sw and pacification. In

Kurds have been labeled, harassed, and put on trial as “terrorists.” The Turkish

however,

government,

is a member

of the NATO

alliance in good standing, and Iraq is a major oil producer and business partner of the West who served Western interests well in the-war with Iran. Both Turkey and Iraq, like South Africa, are

therefore exempt from designation as “terrorist states” in the West.°° Despite—and perhaps also because of—its primacy as a user of coercive measures, the West has gradually evolved a set of concepts and perspectives on terrorism that have been extraordinarily successful in rationalizing to Western publics its own larger-scale (wholesale) violence.?! In effect, terrorism has been redefined and selectively

addressed so as to encompass only the lesser (retail) violence of the liberation movements that are the main targets of Western intimiare who sts terrori minor other of dation, along with the acts

convenient foci of attention and indignation. Western acts and regimes of terror are either exempted from the terrorist label, played down, or treated as responses to the violence of others. The quelling

ee is e warfar cy urgen erins count by ee ee and their violence 1s deplore o tae alin e 2aan Propaganda Sisk : ee a peiliesererrnies ner Western violence oe peseitotcing feedback system: Pseat as the former js Pine tae i eee violence from the ME ae nize d as eithe r causa l or wort hy of atte? i ; and indignati

terror.

on,

the

4

;





t s e r W he rt y fu if st ju to es rv se ce en ol vi s’ im vict

Clearly, such

sema ntic s and Intellectual appa propaganda ratus :

have been provi

:

require

el n

ed

a deve

and a cooperative mass media. The fo ism ded,as ter ror a of evo lut ion gra dua l noted, by the 2

;

1

10

~

my

1

From Bandits to Terrorists —_——____—_—_—— industry. The propaganda model spelled out in Herman and Chomsky’s Manufacturing Consent describes the fact that powerful groups, such as the executive branch of the federal government and organized business, not only dominate as the sources of media news, they

also try to “co-opt the experts” and encourage and subsidize amenable intellectuals through consultancies and fellowships in well-endowed think tanks.°? The terrorism industry discussed here is an illustration

of that process and this book is an application of that model to a particular case. An important feature of the news-sourcing process described in Manufacturing Consent that can be observed clearly in the mass media’s handling of terrorism is the media’s naiveté and gullibility in treating materials provided by the government and co-opted experts. Although these sources have a material interest in the choice of facts and interpretations of the issues addressed, and have a distinct “line” that they wish to impose on the public’s perception of events, the as s frame ts’) exper ated affili (and nt’s rnme gove the take a medi suitable story pegs and their assertions of fact as objective news. An unbiased press would treat biased sources with extreme caution. It would

not allow them to define the issues, nor would

it depend

heavily, and often exclusively, on them and their affiliated private agencies for fact and opinion. Such uncritical acceptance of sources is the mark of de facto propaganda agencies. The mass media in the United States have treated George Shultz’s and Ronald Reagan’s pronouncements on terrorism much as they treated government pronouncements on U.S. goals in the Philippines and in our policing of the bandits in Central America in past years. The biases are as great as ever. This is therefore a study in ideology and ideological management as well as an industry study, because that industry is designed to develop, refine, and disseminate an

ideological line. In chapter 2, the case for the primacy of Western terrorism, the convergent Western interests on this issue, and the consequent demand for definitions and carefully selected evidence to serve these the be cri des we 3, r pte cha In ed. vey sur y efl bri is ds nee n ter Wes basic model and propaganda themes put forth by the Western

terrorism industry and show how the semantics and model of terrorism have been adjusted in the West by the government, experts,

1]

The

_ _ _ _ — — — y r t s Terrorism’ Indu

e P h g u o r h t 4 s r e t p a h c n I . s d e e n s it e t a d o m m o c c and press to a terrorism

industry is described—its

think tanks, experts, sacuetl

n o m a d n a n i h t i w s n o i t c e n n o c r e t n i l a r u t c u r t s d n a , es ti vi ti ac firms,

r e t p a h c n I , y l l a n o i t a n r e t n i d n a s e t a t S d e t i n U e h t n its various sectors i d e t i n U e h t f o a i d e m s s a m e h y t l e v i s n e h e r p m o c w o h w o h s 8, we

y, is t or n e rr m d te h n s a i l b a t s t e i e h m t s n a r d d t e n t a p o States have ad g n i h t e m o s h t i w g n i l a e d n i s e s a h p m e d n a , s e g a s u , s e m a r f s ’ y r indust

n o i t a l u t i p a c e n r o a i to t i d d a r n i e , t 9 p called “terrorism.” Finally, in cha ’s st We e h s t e f i o t r e p o n r a p i l l e w r O e h t y f o r of findings and summa m s i r o r r e t e h t w o e b h i r c s e ” d , e m w s i r o r treatment and use of “ter

cy li n po r e g t n s i e z W i l a n o i t a d r n o y e b industry serves in ways that go t en ns co er ne gi en to tes eli n er st We lp he at in the Third World, and th at home.

12

Western Primary Terrorism and the Demand for a Unified Opposition to “Terrorism

n the post-World War II era, the breakdown of the old colonial system and the emergence of national liberation movements created severe problems for the major Western powers, and eventually also for the colonial-settler enclaves of the West, most importantly, South Africa and Israel. The United States, Great Britain, and France

gradually evolved neocolonial systems that helped sustain control by

the judicious use of economic and military aid, trade privileges, and the cultivation of economic and political relationships. But the preservation of an open door and a favorable investment climate periodically required subversion and direct intervention, the former frequently taking the form of an alliance with and support of military and elite elements prepared to seize power and use the force necessary to subjugate restive populations. Such processes took place

in Indochina during the years 1946 through 1975; Iran, 1953-78; Guatemala, 1954 to the present; Brazil from 1964; the Dominican

Republic, 1963 and after: Indonesia, 1965-66 and thereafter; Chile 13

_ _ — — — — — — y r t s u d n I ” m s i r o r r e T “ e Th

$
? = ee oe responsibility of the prestigious and respecte Fs a

ae

Seer industry is to enhance the credibility $

warm ee to wien ce wes pyavotablerassacialions eee favorable See The a tae es aespentabiliey bs seth gained the same benefits by the se ngnawing Henitage sae : an gular participation of high Reas: a, alsIn its affairs. The CSIS acquired respectability

sae Schlesinge r, and € Corporate elit John Ce pe)a Ory elements of the

Anne Arm

nment officials Henry Kissing” m “o

. i f s r e b m e m d r a o b d n a , g n o r st al

as Louis Gerstner of on Brroth indust ers. I The

American Expres Jess crreedentiail. s of seals ss

Maustry who serv e as experts, like sade ’

70

The Government Sector

—————

and

LL

Moss

at Heritage, and Alexander, de Borch grave, Henze, Sterling, and Ledeen at CSIS, are thereby elevat ed These can then push Core right-wing positions on the “MacNeil/ L e h r e r N e w s S N th e as s u c h p a p e r s a n d s h o w s , n e w s hour, other T'V network

York Times as members of respectable establishment institutions. A Other members of the counterterrorism network have the responsibility of instructing Third World military personnel and police on the nature of communism and subversion and the need to stand

ready to displace weak elected governments with regimes of law and order (e.g., at the Pentagon’s School of the Americas in Panama).°*4 Others train them in the techniques of law and order, including the interrogation and control of unruly peasants and the tracking down and dispatch of subversives (Panama, Taiwan, Fort Benning, various police academies). The CIA also supplied training for the security obt ain ed kill ers Naz i num ero us usi ng 1950 s, the in Egy pt forces of Aloi s Stu rmb SS ann fuh rer inc lud ing net wor k, Geh len the through by est ima ted tro ubl e-s top hoo ter , Eic hma nn’s Brunner.®>> Brunner, res pon sib le per son all y bee n hav e to Cen ter Wie sen tha l Sim on the Law yer Berl in to exp lai ned had peo ple , 128 ,50 of 0 mur der for the as too, kill ed, be mus t orp han s Jew ish Kurt Schendel that French

they were “future terrorists.” to ed nd te ex en be s ha n io ct ru st in ch su At least since the 1960s, by d ne ai tr , or ad lv Sa El in N, DE OR e lik es rc fo ty ri cu se ry ta li mi ra pa

of e rc fo sk ta ’s nt de si re -p ce vi e Th ®” l. ne on rs pe n ia in nt ge Ar d an U.S. sm ri ro er rt te un co S. U. of ty li bi si on sp re ng ui in nt co a as 1986 records ty ri cu se an ili civ to ce an st si as d an g in in ra “t e id forces the need to prov

of ” es rc fo ty ri cu se ian vil “ci e Th * ”° s. nt forces of friendly governme

e th , as ur nd Ho a, al em at Gu , or ad lv Sa the friendly countries of El are le, Chi d an , zil Bra a, in nt ge Ar s me ti Philippines, and at various d ate ili aff e th d an ey Th . ds ua sq h at de as n ow more commonly kn

e th ed gn si as are ca ri Af h ut So d an a ic er Am military forces in Latin

m is or rr te e th in th wi es rol t en er ff di e Th ” s. st ri ro er “t g in task of kill ” s. on ti nc fu ed ut ib tr is “d of e cas ar Industry illustrate the famili

e o m s i r o r r e t r e t n u o c t n e m n r e v o g n r e t s e W e h t f o y t i r a d i l o The s n a t m o p w e i M n o m m o c a d n a s e g a k n i l n i y l n o t o n n w o h s s i k r wo m o u a m m o s f e n g i f n o a h d c e x y e n a i l p s i line On terrorism, it is also d

e n o s o a i t f i a , o r s e p l i o e h t h s d t n n e o a c i n t e a g l i e l r l y e l t d in frien : s r e w o p y l d n e i r f f o t r a p e h t n o s e i t i v i t c a a d n a g a p o r p d n a Political, 71

y t t s u d n I ’ m The Terroris

ee

n e e w t e b relation

the CIA

and

South

Africa’s

BOSs

, n r e t t a p l a r e n e g 4 s e t The a r t s u l l i , r e i l r a e d e t o ee e c n e g i l l e t n i n a e r o K h t u o S d n a n a w i a T ; . e a eG ae f ] C A e h T . e s o l c n e e = b e v a h g i t s e I N a e e e r h e t s ies, and relations between all e agenc h t f o s e i c n e g a e c n e g i l l e t n i e h t o t r e s i v d a d n a f o r o s n o p s d n a , A was also a N I D s e l i h C s a h c u s , a c i r e m A n i t a L n 1 s e t a t s y t i r u c e s l a n o i t o t na p u d e u n i t n o c e v a h s n o i t a l e r y l d n e i r f d n a s e g n a h c x e n ;nformatio i d r o o c e h t e t a t i l i c a f o t “ d r a h d e i r t s e t a t S d e t i n U e h the present. T e h t g n o m a d n a n i h t i w s e c r o f y t i r u c e s l a n r e t n i f o t n e m y o l p nated em n i d e n i a l p x e r e t r o P t r e b o R l a r e n e G s ” a , s e i r t n u Latin American co , r a o d n n o o C i t a r e p O s a t w r o f f e s i h t s f t o c u d 1968.59 One of the pro , d n y a a u g a r a , P l i z a r , B e l , i a h n C i t n e g r A r f o o cooperative endeav d a h s o t h n w e d i s s r i e d d r u m d r n o a t y i l n e o v m i t c e Uruguay to coll s i h d t n e i l l s i e k d r e e w r d . s n e u i g H r n t i n u r o o c b h g i e e n g n i u f taken re war

” . n o i t a t r s i e r p o o r d r l e t r Free Wo

in ge ga en to a re Ko h ut So d le ab en so al it ir This cooperative sp d an , rd wa on s 50 19 e th om fr s an ci ti li po S. U. of extensive bribery

Moon’s

nd re ve Re of cy en ag e th h ug thro

organizations, to own

e th in s on ti za ni ga or ng wi tgh ri us ro me nu newspapers and subsidize United States and throughout the Free World. Similarly, South ae oe oteto acquire and invest in newspapers and magazines

oe Se

ae

ee tna

n, ai it Br t ea Gr In ®! s. ce en di ee e ae , ae au

ci eee

ee

d an y it un mm co ss ne si bu e th to s 4

sponsored ad financed i SAG

e e e d an 76 19 (FARI) in

through books, other sees

te

eee ve information coed

Affairs Research

Institute

e ® Ofpicoen aa Se sa a urse, the conferences.

United St hasHi able to do the samenaathing even mol’ EE its alliedns and clien rcountries, mobilizing resources and : manipulating electio

Italy, for example.® (ae a very large scale in the Philippines 4° Brian Crozier’s Fory

Beene

Cin organized and subsidize

formed later into th - World Features (FWF), which was trans”

right-wing think Bae se tute for the Study of Conflict, a Brits SAME WAY tas ESIStand = Propaganda agency operating much flows easily within th

Institutions.

SS.

though on a smaller scale. Money

© Free World to Sustain right-wing ideologi@™

72

The Private Sector: Institutes, Think Tanks,

and Lobbying Organizations

o p m o c t n a t r o p m i e ar at th s nk ta k in th d n a es ut it st in e th of . M.. rt pa as y dl pi ra w e r g or ed at in ig or ry st du in m is or rr te nents of the s ha a m o l a S n h o J s. 70 19 e th in e iv ns fe of e at or rp of a major co da un fo of h” nt ri by la e iv at rv se on “c a of t n e m p o l e v e d e th described s ce ur so re e at or rp co ay rl pa to d e n g i s e d ns io ut it st in e at iv pr tions and r fo g in id ov pr s, ew vi d n u o s g in iz id bs su s, al tu ec ll te into co-opting in

lte in an ng hi is bl ta es d n a s, al tu ec ll te in ng wi tthe networking of righ e r O E P d an y e n o m of e rc fo r ee sh y b t lectual hegemony of the righ

by y il ar im pr d e d i v o r p s wa k r o w t e n is th of g n i d ganda.’ The fun

e h t , fe ai Sc on ll Me d ar ch Ri g in ud cl in s, al du vi di in important wealthy t family, n u H e th d an d, ar ck Pa d i v a D , n o m i S m ia ll Wi Coors family,

, on ds ar ch Ri hit Sm , in Ol g in ud cl in s, on ti da un fo ng and by right-wi nsive, most

fe of e th of rs ze ni ga or e h T r. uo Fl d an w, Pe Joseph i b o m n i d de ee cc su l, to is Kr ng vi Ir d n a n o m i S m ia ll Wi ‘Mportantly e r u p d an s, rm fi s, al du vi di ‘n y th al we of y ra ar de wi a s an n o u a z i n a g r o s 0 8 9 1 d i m e th y B . se ri rp te en g n i d n u f © overall 73

_ _ — — — — y r t s u d n I ’ m s i r o r r e T The ‘

—— ai

titution,

AmAmeerr;riiccean Enterprise Institute (AE]), the es :

the Hoover Institu sehateeie and International Studies (CSIS), Georgetown Center an ee each had annual budgets in excess of

and the Heritage pou had become sufficiently affluent to be able e r e i v w e s l e l l c i i n i e e e $10 million, and Heritage ns B ee.

‘arene

sector have had a complementary

eee” Snes fright-wing institutes. We noted in chapter relationship in support of 11g) bythe pevernmentitouhe onet 4 the various forms of aid given by 8 ; — s n o i t u t i t s n l ‘ , a e i c c l n , n l a s el a e t a n w s s i i a f s s r o a f n i , l e n n o s r e p — s n sector institutio éeihcanenneee s ' t n t e u m b n fn, oe r — e t v r o e o g h p t l p l a u a r s n o d o m n a mati butions have been modest, and corporations and indivi uals have been obliged to provide most of the funding for the institutes and think tanks. Their role has been further enlarged in the ReaganBush era with the increased importance of undercover government operations designed to be free of publicity and legislative oversight, and therefore requiring sub rosa private support. In a brief statement

at a gathering at CSIS on June 10, 1986, President Ronald Reagan pointed out that “an institution whose work so directly affects the security of our nation” deserves support, so “permit me to commend those of you present today from the private sector. In supporung CSIS, you do yourselves and our nation a service.”2 The services rendered by the institutes and think tanks have run the gamut from actually facilitating terrorist operations and lobbying on behalf of terrorist organizations and individuals, to supporting and engaging in propaganda activities similar to those carried out by the State Department’s Office of Public Diplomacy, he t CIA, and agents of

the North-Secord network.3 The cooperative relationshi p between sectors is shown periodicall y

1C

the private and publ in cases where government financin$ through congressional Bes appr Opriations becomes rdifficult. The cons¢ vative labyrinth is then f call ed upon the fill the gap, 0 as in the ae the funding of e

.

th

Nicara

san contras. The private sector may :-

ani Manpower to help mobilize supportive constituencies. T is oa oe rman documents show that Jack Abramoff and ee ltizens Mee the Citizens ffor , Freedom were tn used by Oliver ost No! and brief ‘6 Central Americ; as eae ““merican visitors, i z e to organize telepho! t0 undertake 2 ee Speaking rallies, and sermons jn favor of the contras, 4”. tours,4 Ac AS another example, when the CIA 74

———

meer

vateRentat ne

SORE of Sea: Ss Forum World F eatures Was exposMeeld in SGre eX ] Britain in 1975 and had to be discontinued, Richard a e j a a e e p e r o p u s a eful ganda took over the funding of this when the U.S. executive branch was having trouble raisin ha to finance the organization of and publicity for the 1989 Sari s:

election, the Scaife, Olin, Grace, and Smith-Richardson foundati ons

came through with the necessary sums. For many covert state enterprises, private and government funds can be substituted for one another according to political and public relations convenience and exigencies. The relationship between the public and private sectors is also affected by the multinational character of the industry and the involvement of other governments in the collective enterprise. For example, the Unification Church of Reverend Moon, which is closely tied to the South Korean government, subsidizes institutes, media,

and terrorist governments and subnational groups that serve its right-wing political objectives. It was disclosed in South Korea in 1988 that the South Korean government, through its intelligence arm KCIA, had covertly funneled $2.2 million to the Heritage

Foundation in the early 1980s.° The CIA has long funded institutes and media in other countries, and the National

Democracy

does the same.© The Jonathan

Endowment

for

Institute, an Israeli

government-sponsored institute with U.S. branches, has organized

conferences in both the United States and Israel. A U.S.-based institute, JINSA, was organized and is run by individuals closely tied

to the Israeli lobby and can be regarded as a virtual agency of the Israeli government.’ And Heritage helps fund and engages in joint activities with institutes in Great Britain and Israel. Some of the institutes that are part of the terrorism industry

Operate in many spheres of intellectual activity and policy interest. This is related to size, and the Big Four—Heritage, CSIS, AEI, and Hoover—are all fairly diverse in activity. As terrorism became a Perceived area of policy interest, these “conglomerates” entered that

held, sponsored experts to deal with it, and provided support for their activities, Quite a few institutes specialize in terrorism more Tees single for vehicle the hantowly, and some are largely for inclusion in the industry are that the mae a e th in t er xp -e st li ia ec sp e on t as le at r fo ns io ase of operat

aa

75

,

— — — — — — — y r t s u d n I m s i “Terror

e i

t i t a h t , ) C S A ( l i c n u o C | y t i r u c e S n a e l c a i r e m A e h t f o e s a c e h t or, as in g n i k r o w t e n d n a n o u a c i n u m m o c f o s n a e m d : n a a l l e r b m u n a s e d i v pro , . y r t s u d n i e h t f o s r e b m e m r e h t o g n o am f o y n a m , d e h s i l b a t s e l l e w y l e v i t a l e r e r a s e t u t i t s n i r o j a While the m The number

. y r o t i s n a r t y l b a b o r p d n a w e n e r a s n o i t a r e the smaller op

in the range fewer than a by scholarly

s a w s 0 8 9 1 d i m e h t n i y r t s u d n i . S . U e h t n i s e t u t i t of ins t u b , ) x C i d n e p p a n g i n i t s i l e h t e e s ( y t f of forty to fi d e r u s a t e n m a s a t r d o e p r m e i d i s n o c e d b l u o n c e doz

m s i r o r . r s t e r T t e n p e x d e i s n r e o i r i e h t t f i o n g o c a e i n r d o or me reputati

y e h d s , t n e l a l i e r w s t a n u r o e d c h e t g o n r i industry institutes have eme . s e v l e s m g e h n t o s e m t d a u n t a are networked with the U.S. insti

U.S.-Based Institutes and Organizations We will concentrate here on two of the Big Four private-sector institutes and eight others that are of some importance or illustrate some significant feature of industry members. Only three of the eight—ASC, Rand, and the National Forum Foundation (NFF)— are of substantial size and importance. The others are not only small, frequently one-man operations, but their funding and activities are

harder to determine, and we will treat them more briefly. Of the eee eae a oon are of major importance 1n the diversified , ee

bnilea., rieee e that , but on teen? think tanksee ght-wing ae

has emphasized economic issues and policy. It was founded in 1943 O ; : by Louis Brown, ’ head of the oh e on n, io at or rp Co le il nv Ma s hn Jo the great producers ! e k r a m e e r f e h t t a h t s e i t i l a n r e t x e e v i t a g e n s e o h t i w l a e d o t fails

e f f o n o i t a r o t s e r e h t o t , e r o f e r e h t , d e t o v e t f a s e l p i c market prin er ne er the horrors of New Deal intervention. It does, howev and

a n e r a y c i l o p n g i e r o f e h t o t n I 8 2 d fellowships—an o t — h c a e r t u o d n a , s t c a t n o C e t r a p y l h E experts, most S 5

+

c

?

>

provides on

.

si)

DEES

48 provided a home base for several right-wing * Une is Stefan Pp e i r a e a e f b m o m i e t m g c , n y o n l o a s s e O board member of Lyndo ~

a

oO



n

76



Dee

The Private Sector ee

i)

and coauthor with L. Francis Bouchey of The Strategy of Terror. Martha

Crenshaw,

now

of Wellesley

College, who

ha

a S carefully

recently, Angelo Codevilla,

a former

: d n a s k r o w e m a r f r studies to approved terrorists, spent e confined h some

time at Hoover.

More

naval intelligence officer and right-wing activist implicated in the socalled Debategate scandal, has joined Hoover as an expert on

terrorism.'' Peter Duignan, for a number of years director of the South African program at Hoover and a member of Reagan’s foreign policy transition team, is also a member of the editorial advisory board of the South African Freedom Review, published in South Africa under the auspices of the extreme right-wing International Freedom Foundation.!* This journal is designed to put South Africa in a favorable light as a defender of Western values against the black agents of world communism. The Heritage Foundation The Heritage Foundation is important because of its size and influence, and also because it is a far-right enterprise that has nonetheless achieved respectability and power. It was organized in 1973 by Joseph Coors and New Right activist Paul Weyrich, with substantial funding help from Richard Mellon Scaife.15 Edwin Feulner, Jr., longtime head of Heritage, was report-

edly chosen by the Scaife group.'* Funded subsequently by a wide variety of corporations and foundations as well as wealthy individuals, the Heritage budget reached $14 million in 1987.

Heritage has served as an umbrella organization for a variety of institutions of the extreme right and for outright terrorist groups. It has had ties to the Christian right, the Moon system, Taiwan, and

South Korea,!® and the RENAMO lobby!® has been headquartered in the Heritage building. With its more respectable face, Heritage has supported right-wing intellectuals, and it has pioneered in developing a resource bank “to help bring this non-Washington expertise into the policy-making process.”'” It has strongly empha-

sized programs designed to influence policy through a continuous g exploitin by and es, conferenc and publicity, flow of position papers, ts relationships with decision makers. . , on ti ra st ni mi ad an ag Re e th th wi s on Heritage had close connecti , er rg be in We ar sp Ca e, es n Me wi s Ed al ci fi ra of -e an ag oa former Re “nneth Adelman, Jeane Kirkpatrick, and numerous others regu77

e h

— — — — — — y \ t s u d n I ” m s i r o r r “Te

d e i l p p u s e a e e r d n a s e c n e r e f n o c e g a t i r e H d e d n e larly att o e e i a f e s i n i m d a d n s a l a u t c e l l e t n i f o r e b m u n e g r a la e B e e B ; E W E N O s r e p a p n o i t i s o p s a l l e w s administration, a ership:

d a e L r o f e t a n a M e g a p d n a s u o h t e e r h t , e m u l o v y t n e w t The b u p d n a d e r a p e r p a n I S U m G A e v i t a v r e s n o C a n i t n e m Policy Manage t for the

n i r p e u l b n o i t i s n a r t l a i c i f f o e h t s a d e v r e s , e g a t i r e H y b hed

f o t a e r h t e h t f o e c n a t r o p m i e h t d e s s e r t s t I . 0 8 9 1 Reagan team in e s u o H f n o o i t u t u s n i e r e h t r o f d e l l a c d n a ” m s i r o r r e l t a n o “internati

” ” ” . n o i s r e v b u s “ d n a y t i r u c e s l panels on interna

y r a t i l i m e h t n i t h g i r e n i l d r a h e h t o t s k n i Heritage also has close l

e h t n o s e v r e s r e n l u e F n i w d E . e r e h w e s l e d n a x e l industrial comp a d n a g a p o r p d n a g n i y b b o l l u f r e w o p a , C S A e h t f o d r strategy boa e g a t i r e H e h t f o n a m r i a h c r e m r o f A . y r t s u d n i e s n e f e d organ of the d e t o n n a c i l b u p e R n r e h t u o S a , is n r u b k c a l B n e B , s e e t s u r t board of t r e b o . R s t h g i r l vi t ci s n i a g e a l g g u r g t n s i t t i m e r n u d n a g n o l s i h r o f

t f i o u d n o t c d s n i a l a n r u h o n s j r i o t b i r B n a i Moss, a right-wing Austral , l a n r e u g o a j t i r e H e h r t f e o d n , u n o o f i was a intelligence disinformat n w o n k l l , e n w o a s r a r e e P g o ; d R w n e a i v y e Polic R

anti-Semite, neo-

” ” e , c s n c e i i n c e was s g o u f e d o u t t e n s s i e c p n e a o r h f t p o o , r d i p n Naz a

e g a t i . r l e a H n r u o s j i h t d f r o l a a i o r b o t i d e e h r t e f o an early memb c i m o n o l c d E a n i l a c a o s n f S ’ r o n u o o s J g r d n a e i e t n P a i c o o y j r b p officials reci h s c a , w i g t h n n e w i i h o n t P r — u a T , n e i m h u C l d o e r t v e a i n d l . e s u e Fe Studi published by Pearson’s Council on American Affairs in 1967.”

eens oon

i t p

O o m c e b S 2 s n o l n a z l a c e p s e t ‘ e e s e h t bashing and s e e t s p i r a t l u m h c e o e e e It has not focused heavil fe LDBronismn, but its numerous right-wing ae. y on arete y r a m i r s p ’ d l r o w e h t o y t l e s o l c it d SY have tie ee

; contras he Afri gimes of terror and terrorists (Israel, , South / the rica, Sout the Custcmnlaniand Salace an states). Its experts and conferen Pe participants have regularly conve AL aut Pt é ¢ worl terrorism as a product of a es % simpleminded view 0° ible

for urge d have and viet conspiracy :

base and vehicle for writ; .

5

a

the years Heritage has provided

Ings

Crozier, and Samuel ae oe

:

terrorism by Robert Moss: B

78

yl

——

The Private Sector e_ _—

book The Soviet Strategy of Terror, Francis positioned himself SOmewhat to the right of Claire Sterling on the Soviet conspiracy to terrorize

the West. His citations, in order of Importance, are ert Rob M ie and , (15) s rce sou ed iat fil -af CIA er oth , (16) r (18), Brian Crozie

Rees’s Information Digest.*? Moss and Crozier have both beer on ie CIA’s payroll, so that CIA-based sourcing overwhelmed all others in Francis's book. Rees, the next leading source, was a member of the John Birch Society and a professional infiltrator and informer.

His Information Digest has long been recognized as a compendium of

fact, rumor, and planted disinformation very close in rigor and mode of compilation to traditional police Red Squad and FBI political files.24 Francis, however, informed the publication

Human Events that

Rees was an “authoritative” source on the subject of internal subversion.2> Francis follows Rees in calling for a close monitoring of subversion, generously defined.”° In an article published in Roger Pearson’s journal, Francis also finds that the ANC and “its convicted leader Nelson Mandela” are communist-controlled representatives of the forces of violence, in no way comparable to true freedom fighters like UNITA and the contras.?’ Through monographs, lectures, and policy briefs called “Backgrounders,” Heritage has been a strong proponent of counterinsurgency/national security doctrines, particularly with regard to Central America. The institute provided a set of foreign policy recommendations for Reagan’s second term that encouraged full support for paramilitary forces (death squads) in those countries where U.S. interests were “threatened.” Among the relevant follow-up publications are: Alvin Bernstein and Col. John D. Waghelstein, How to Win in El Salvador (1984); Virginia Polk, The New Guatemala Deserves U ‘S Support

(1985);

Timothy

Ashby,

Nicaragua’s

Terrorist

Connection

(1985); e Doctrin Reagan the Tests Angola III, (1986); William Pascoe Jonas Savimbi, The War Against Soviet Colonialism (1986); Jaime Pinto

and John Huber, The White House’s Confusing Signals on Mozambique Do ments Govern What s: Darknes of Heart (1985); and Adam Wolfson,

0 Blacks in the Rest of Africa (1985).

|

r sea of ation combin a for goemlage' writings are notable d ee ely extrem and fact, Bugible interest in authenticated a oun Backgr 1986 r Octobe an in ation, Henle As an illustr Pdate” (no, 27), Senior Policy Analyst James A. Phillips argue 79

— — — — — — — y ' t s u d n I ” m s i r o “Terr

e Th

k c a t t a o t n a l p d e l i o f a “ n i : a c t c e p s u s i s a v e p n e m e v 4 l n o o v k n c i a t t s a i r l a o t p r i o m t s u g that Tr u A n a , y l u J n i o g o T 1 y s s a b m e . S . U e h t ee of a e 2 o e e h t d n a , s u r p y C n i e s a b r i a h s i Brit d e d i v o r p s p i l l i h P . n a t s i k a P , i h c a r a K n i r

no eyjline ; h t t a d h e t u g r a , d s n n a o i t a g e l e n s UU a g e l l a e s e h t t r o p p u s o t s n o i t a dence or cit t s i r o r r e t g n i r o s n o p s d e d n a h d e r t h g u a c “ s a w i f a d d a Q e m next ti n a e k a t r e d n u d l u o h s y r a t i l i m . S . U e h t ” , s n a c i r e m A t s n i a g a s k c atta , e s i w e k i L . y r t s u d n i l i o s a y b i L e l p p i r c o t d e n g i s e d e k i r t s d n u o r g o t r i a Connec-

n i l m e r K e h T : m s i r o r r e T o c r a N “ , 9 8 . o N e r Heritage Lectu

l e h c a R y b 6 8 9 1 f o r e b m e c e D n i n o i t a d n u o f e h t t a d e r e v tion,” deli y l p m i s s m a r b A t t o i l l E e k i l s r e k e e s h t u r t t a h t e n i l e h t s e k Ehrenfeld, ta

e h t d n a n o i t a m r o f n i s i d t e i v o S f o n i d e h t r e v o d r a e h cannot be . s n o i t n e t n i t e i v o S t u o b a h t u r t e h e t v e i l e s b s o e t public’s unwillingn g d n n i a k c i f f a r t g u r d h t o b n o o t i t c e n n o n c i l m e r K Her evidence for a d e t c e y l l e s l u f e r a s c n y o b i t r d e e s z s a i l a r e n e g s f t o s i s terrorism con n a u g a r a c i N d n n a a b u C f s m o i a l c e h h t t i g w n , o s l l a a i c i n f f r o Weste t n a t r o p m i n a s s g 1 u r d a i t g v s n e i W e n h i t m r e d s n e t u t a a h i t r t a p x e y n o s m ’ i e t t s a e i n r t a t u a g p x a e r a c s i part of Red strategy. She quote a N

s m i a l o c , s h 4 s ’ w 8 g e 9 n e 1 f i t o r t a i e m h m o c n b at one of the Dento su

e d a g r u t r e h d t t a “ h m s n t l i d a a l h i u o c t g i f a of that two high Nicar produced a good economic benefit when we needed [it] . . . we g h n t i a r e d d e n f a f u e e h s h l t t p i o w e r e p u r d d o o o i f o v d f wante to pro

c i t n e h d t l u s a s e s i a e f h t t n i e c r . h s ” E of youth in the United State .. . evidence.”® n o i t a s m a r e o s f r n e i s v a s e f e o d c o e r o n n h t a e e t n i ext Hate ges influ

oe

a te roe ad

serve an the U.S hee 4 aa oe eee ae ae s a f m s F o e l p e i l D b u e R e serves in a autre - h ” o l t a m r o f n I s e t a t pacity to the United S

Agency n(aUtSiIoAn)a.l In hearingss held before the House on Inter ration Ope

Subcommittee

in 1986 e a e t t a h t t c a f e h t d e t n e m a l r e n l u e F » l l u f t o n d a h A I S U the y succeeded in informing the rest of the WO about th

ee. Py terrorists. Feulner had previously ee Wee policy formal a develop and implement £

a terrorism.

m i s a h e g a Herit O l u e F . t h g ri e e s a h r e n Defence

and

Str ategic

t i r B e h t o t y l r a l u c i t r a p , s e i l aces | e , p o r u E r fo e ut it st In s n’ ; air of Britiai ’ n tai er tion? d

i a n e s a , s e i d u t S

which

80

counte

form

Na

—————__> _

MllevPrimatesSerta

a

Security Advisor Richard Allen (a « ae 4 members ofits “Council of Maiiagesen Saas pone i c aS Heritage gave IEDSS $151, 273 in 1985 (their total ee was $185,611). IEDSS is well known for mite ae hie mation about the European peace movement a nd for Bienes a: CND campaigns in Parliament and the media, as well as for see information on international terrorism.2° Heritage has also tee

$140,000 to Brian Crozier’s International Freedom Fund Establishment.

Georgetown Center for Strategic and International Studies (CSIS) CSIS is the most important of the terrorism industry institutes. It is as affluent as Heritage, it places more emphasis on terrorism, and it has more—and more prestigious—experts in the field. Its head, David Abshire, succeeded in the late 1970s and early

1980s in bringing in Henry Kissinger, James Schlesinger, and Zbigniew Brzezinski as counselors-in-residence. Abshire himself was made ambassador to NATO in the Reagan years, and was brought home to the United States to handle the media in the administration’s effort to contain the Iran-contra scandal. Anne Armstrong, head of the CSIS board, has been chair of the Foreign Intelligence Advisory Board. Ray Cline, former deputy director of the CIA, became a high official of the organization. A prestigious corporate board in the 1980s also helped CSIS increase its annual budget to more than

$14 million by 1986. CSIS’s wide appeal to the corporate community is evident in its funding base. In 1986, the organization received contributions from 126 domestic corporations, including 68 Fortune 500 companies, as It also obtained grants from 92

well as 27 foreign corporations.

foundations, most of them corporate-based and 25 identifiable by

). ation Found n Exxo on, dati Foun Alcoa Corporate names (e.g., 26 and s anie comp oil 8 are Among the domestic corporate givers gon Penta the to ons weap g lyin supp in ved “ompanies heavily invol

rate corpo The .>' iers) suppl ons weap r majo the all ally virtu uding (incl

cular parti 1 lex comp rial ndust ary-i milit the and “stablishment Clearly find CSIS a very worthy investment. Nit

Tees

ace

Serves this corporate constituency directly, pens Ae

1n s u h T s. ie ud st cy li po d n a y through general analyses 81

_ _ — — — — y t t s u d n I m s i r o r r e T ‘ e h T

a :

4

oe

diversified

company

with

a number

D

ae

Aveo CUnPOEMOE :aon with Saudi Arabia, and a CSIS one ih a? en el onll Frst multimillion-dollar co

l pol the on dy stu 00 ,0 helped fund a $125

a Saudi

ice Off t's men art Dep e at St the of or ect dir n the regime. David Long,

of au re Bu the in ia evs h ut So d an t Eas ar Ne the of Analysis for z, Boo of aw Sh hn Jo h wit ort rep IS CS the ed or th au co , Intelligence m, fir g tin sul con nt me ge na ma a l, ona ati ern Int Allen and Hamilton zed iti san a n tha re mo tle lit y lit rea in was dy stu ed or th au co the But er mb ce De in ng Lo by n tte wri ort rep version of a State Department

e som de ma d ha y ud st d fie ssi cla l stil d an 1980. The earlier internal and cal iti pol d an on ti up rr co the ut abo s strongly negative statement g zin ili tab des the d an ily fam ing rul the of t en em ag an military mism d ve mo re lly efu car e wer e es Th ty. ori min a Shi sed abu the of eat thr from the CSIS version, which portrayed Saudi Arabia as a paragon of stability. Steven Emerson provides an extensive comparison of the two texts, showing the careful excisions of negatives and other changes that make the final document a piece of disinformation.” Although 90 percent of the sanitized text was taken from the original Long report, CSIS released the refurbished document in February 1982 as part of its “Washington Papers” on international affairs, describing it as a “major new work.” The rewritten and “informally” declassified document was then used to lobby Congress in support of the sale of AWACS missiles to the Saudis, and the Avco Corporation, according to a company spokesperson, used it for “enhanced marketing efforts in Saudi Arabia.’23

ope ees Fen mae is mk en its investigations

,

cee ee

e a d

ces, panels, an

s Ne cu os reports e

hav

oS a frequently

ed ne da an ag op pr ng wi tgh ri d an nt me se tn ve Intheearly19;0s,. CSeeI

b

t n a t r o p m i n a d e y a l p : e c e d n e M e h t f zation o

i l i b a t s e d e h t n i e l ro

me in Chile. Its director of Latin America?

studies, James Th eberge, clai med to h Korean communist

guerrilla

learned how t o intimidate t

82

sHenunpongted a ean

ine desun

eee

PrivatenSecter eee

ee

circulated by a friendly ‘expert’ and 4 pa

news organization like eres

epOuigtn a reputable

Another CIA propaganda theme, that the Soviet Union planned

to establish a submarine base in Chile and otherwise th reatened the

Caribbean, was also disseminated through CSIS, in Theberge’s books Soviet Sea Power in the Caribbean and Russia in the Caribbean, and in The Stability of the Caribbean, edited by Robert Moss. Landis points

out: “Although these books were not published until late IS, ISU Mercurio published excerpts on February 28, 1973—early enough to have an impact on the elections, but too late to disprove the CIA fabrications.”°° CSIS organized a conference on the Red threat to Italy, which was held just before the Italian elections of 1976. The panel included William Colby and Ray Cline, both from the CIA; John Connally, a member of the Foreign Intelligence Oversight Board; Clare Booth Luce, former ambassador to Italy; and Claire Sterling. The composition of this group points up CSIS’s close ties to government, its “action” mission, and its lack of connection to anything resembling objective scholarship. To this group, the Italian scene presented a “national security” threat to the United States and called for forceful intervention.*© One day after the CSIS conference, an article coauthored by Sterling and Ledeen, entitled “Italy’s Russian Sugar Daddies,” appeared in the New Republic, claiming that the Soviets were secretly

funding the Italian export businesses. Daily American and Movimento Sociale

Communist party through a network of importThis essay, reprinted in the CIA-funded Rome in Il Borghese, the official organ of the neofascist Italiano (MSI), was distributed to reporters from

the United States at the request of the U.S. embassy.®’ It served to

divert attention from the fact that the United States itself was secretly funding centrist and right-wing parties in a massive interventionary

Operation38 More

recently,

and

illustrative

of the continued

unscholarly,

panel CSIS a 1984 in CSIS, of Propagandistic, and far-right bent

Was Organized on the alleged KGB-Bulgarian plot to kill the pope.

, e v a r g h c r o B de d u a n r A as ll we as e z n e H ul Pa al ci fi of A I C Ong-time a n, Kampelma Max i, Brzezinsk Zbigniew mb su en th e th ok to l ne pa e Th s. er me re we ne, and Marvin Kalb

ee Kupperman,

83

a

. o o y t s u d n m s i r o r The “Ter

t o n r o f t n e m n r e v o g . S . U e h t d e l i a s s a , n e v o r p s a e s a c . t d h g e i r t a h c s i i l d o u o f j d y a l n e u m e r t x e e m o s d e l d d e p d n a , h t u r t s a s w t ‘ s i h g T n i m ? i * ° a . l a c i d o e r m p tern

s e W e h t r e v o e c n e u l f n i t e i v t o i S o l f p o x e s o t m i d e n g i s e wing cla d , t n e t n o c l a u t c e l l e t n i o n f o e s i c r e x e a d n . a S g . U a p o e r h t a p y b d e g a r u o c n e n e e b d a h t a h t t l i u g t e i v o S n i f e i the bel e h t d n a , s r e h t o d n a , e z n e H , g n i l r e t S s t r e p x e m s i r o r r e , t t n e governm h c r o B e d d u a n r A t n i o

p p a d l u o w S I S C t a h t t c a f e h T . a i d mass me d n a r e p a d p e n w o n o o M e h t f o r o t i d , e t s i l a n r t u h o g j i r r a f — e v a r g r o t a r o b a l l o c d n , a s w e e N h t t h n g o i s n I d n s n a e o m t i g T n magazine Washi d e e n e w l l a s s u l ” l r e t a l o t h c c s n u j d n a a “ — s e e n R h e o t with Birchi J

” . p i h s r a l o h c t s p “ f e o c n s o ’ c S I to know about CS s It . es ns se o w t n i y c n e g a a d n a g a p o r p st vi ti ac an n CSIS has bee i n e S to d e r a e g y l e s o l c n e e b s a h , en se propaganda, as we have d e d u l c n i so al s a f h af st s it t . u B s d n ment and right-wing political dema g n i k a y m c i l o p d n a k r l o w ca ti li s po e in v i nee of front-line operat

e h t r fo r e k r o w n so ai li a i d e m d n a r o d a s s a b m a an aa = oe in cs ti li po n a i l a t I in t n a p i c i t r a p ve ti ac “ e e e c = n e R an Ir y rl e h t the ea in n e e w t e b o g as le ro a d e y a l p d an s e p s t gh ri rfa d ir n a fa af L C A W ntra ace - d: ine has had strong ties to cSoe

f o m s i r o r r e t e h t in s i n a p i e u r a P e g a r a e n i l C s the past es a S = e drive in 1980, in which o e c n e g i l l e t n I l a r of the Cent h s u B e h t r fo d e k r o w y c n e g A

ae cee

As We ng ni is ec rc (a n a p m o C t Ke e th of n io at ol vi r in , a a) ll vi de Co o el ng e c n e g i l l e t n i f o t vi da fi af : Hatch Act.*° (Ledee

aapeeus The

n and C line are discussed further as experts in

revolvin g door

betwee

, y s u b n e e b we sreganns izeatiohnas

e c r e t i a e t Walter

r a e r , n a e th a of n io at gn l si de o s s’ di A and ae aly

t. ap is ” s k o o p s tower for old

Ledee?

e v a h i d e S I S C r e h t o n a , k a w t t u L a i a i t a l e ‘ e s o l c y r e nships with Israel and MOSSAD RFASIWEesLal as had v ee U S gove :

e ee « y ul tr a is IS CS lals. © Bis r e b m e m ” al on ti na ti ul “m y ul rism industry, F The semipermanent te aqueur, Ku O.

rmment offici

SS

The Private Sector ae

divided into three categories: (1) e stablishment moderate; (2) lishme

nt far-right; and (3) critical and dis sident. In hig ¢ be cee P trum, of the four semipermanent and five transitor y expert

fit category (3), only two

category (1), and the seven extremist. The CSIS is not a or others noted above.

s at © SIS, none (Laqueur and possibly Kupperman) fit others fall into category (2)—right-wing “moderate” organization by this measure,

The Rand Corporation Founded by the U.S. Air Force as a think tank in 1948, the Rand Corporation now identifies itself as an “independent, nonprofit research and educational organization.” Even today, however, three of its five research divisions are sponsored by the U.S. Air Force, the U.S. Army, and the Office of the Secretary of Defense, respectively; 84 percent of its revenues come from the

federal government; and 75 percent of its research funding is on national security.*’ Its “independence” is thus hardly complete, and Rand is responsive to its founder’s

needs.

In 1984, for example,

Rand was approached by the Pentagon with the idea of a study on

Latin America, using as the source of information former General

Gustavo Alvarez Martinez, an unemployed former leader of the Honduran death squads for whom the Pentagon was trying to make work. Alvarez Martinez was put on the Rand payroll.* Rand also conducted a study of Central American policy for the national security establishment in 1984, in which its authors reject a reliance on diplomacy as not providing enough “incentives” for

Nicaragua to behave itself. While urging the United States to “abide by the time-honored principle of nonintervention,” and to continue

its traditional support of “moderate forces” and “pluralist, democratic

institutions” in the area, the authors recommend the implementation of low-intensity warfare, stressing attacks on “soft” targets—i.e., U.S.

‘tate-sponsored terrorism—as the appropriate U.S. policy toward Nicaragua, a country with which the United States was not at war.* One of the authors of this report, Brian Jenkins, is Rand’s resident

‘OP expert on terrorism. In the field of terrorism, Rand has for some years maintained a

seit Subnatonal Contes romp, wh sponsor confer em

seminars, publishes articles and monograp A

and counterinsurgency, provides experts to those 85

A res

,

eee

i

y t t s u d n I ” m s i r The “Terro

q n a e g r a l y l e v i t a l e r a s 1 t I ” . e s a b a t a d m s i r o r r e t “ a s n i a t o and pial se for the terrorism field. The Rand data base op ! r a l o h c y op s “1 common , r e v e w o h , m s i terror

with those collected by other ingtja d n u f s t r u h , s e i c n e g a vernment

o g d n a , s m r i f y tutes, securit

, m s i r o r r € 2 e d o m n r e t s e W e h t s t r o p p u s d n a s t i f t mental bias tha y l t n e s e r p e d i s t u o d e g a w e c n e l o i v “ f o s t n e d i c n i t s i r o r r e t n o s It focuse

s o D r a w d y n c a a m o l l p a i n d o i t a n r e t n i s f e o r u d e c o r p accepted rules and

e r i p s n i o t d n o a m e ( e h n t o o i t t n e e t d t i a w d l r t o c w a r t t d designe to a

l i a y v a l c i l b u p “ n s o 1 i t a m r o f n i f i y l n d o e d u l c n i e fear.” Incidents ar d e o n t g i s e d t o n n e t f e o e c r n a e l o l able.”44 As governmenta acts of vi e r i p s y n o i l ” t n t , e o u r r b a i e n p f o s i n e t d o i d t n n i e a w t d t t l a c “attra wor n o e i l t , p c ) i e n l c o e n f i d s i o t n r e i a p e t s h R o a t p m p i n o c d a n e r a d a e ( f , e r o m r e e h l . t a t r r r m s o u a s e e o r t F e h l r r s e d t t o e f g u r t h f r l a w o a c p l x a e government violence very often does not yield “publicly available information” (e.g., the work of death squads and government torturers), and is claimed (often falsely) by the terrorist states to be

within the “presently accepted rules” of warfare. As the evidence of the victims is often not accessible and is countervailed by the claims of the victimizing states, government terror does not produce authenticated incidents. There are numerous other problems in determining and weighting terrorist incidents.4®

As noted, Rand’s top resident expert on terrorism is Brian Jenkins,

ak aan eae

=e =

author of International Terrorism: A New Mode of Conflict and numerous

will discuss his work in more dlPree PyEine aoe nee however, that despite his afore 2 ae ate ne organization, and his longee Sane iain borcess pon Oke 1s long-standing role as a counterinsurgency expert and advocate, Jenkins stand a s r e s S to the “left”

Cline, Ledeen, Alexander, and Sterli

lishment moderate.” N evertheless

has provided cases illustr

industr

ofa

ct

Sie ohsuees

h

a base for Paul He te nze as a resident e 6

ie

Me Hhingiion

“warehousing”

“scholar’: service that the

nee 10 s” set “as or s rt pe ex le tab sui for m or rf pe s e an porary institutional affiliation. Henze thus was able tO wor

86

The on the Bulgarian-KGB

Private Sector ee plot to kill the pope as a Rand scholar rath

than as a longtime CIA officer specializing in propaganda

*

The National Forum Foundation (NFF) The NFF came into existence in 1982 as the successor organization to the Coalition for

Decency, organized in 1977 by Jeremiah Denton, a former naval officer and prisoner of war in Vietnam. Denton, elected senator from Alabama in 1980, was quickly elevated to the chairmanship of the Senate Subcommittee on Security and Terrorism. NFF was designed initially to educate the public on the fallacies of the nuclear freeze movement, but it soon took on larger functions in the wake of Denton’s new recognition of the terrorist threat and his strong belief in the Soviet network theory of terrorism. y idl rap w gre F NF , on nt De s me Ja , son ’s ton Den r Run by Senato n, tio nda Fou rs Coo m lia Wil the om fr s ion but tri with the aid of con

nFou n Oli the t, Hun er nk Bu son Nel y, an mp Co W. R. Grace and ani org e Th . on ti da un Fo ily Fam ife Sca the and , dation, Parrot Oil

zation is housed in the Heritage Foundation building. With a budget of er mb nu a d re so on sp F NF the 4, 198 in n lio mil of over $1 conferences,

seminars,

and

press conferences

on

terrorism,

and

published a series of monographs and short studies on terrorism in its Policy Forum series. The first of the conferences was held in the Dirksen Senate Office Building on February 21, 1986, and featured Yonah Alexander of the State University of New York’s Institute for the Study of International Terrorism (ISIT). Among the other

participants were Louis O. Giuffrida, former director of the Federal Emergency Management Agency, Oliver Revell of the FBI, Ambas-

sador L. Bruce Laingen, and Peter Goss of the British-based company Control Risks Ltd., a “risk analysis” and insurance company with ties

to the British intelligence community (see chapter 6.)*° Alexander, formerly of CSIS,

a member of the board of directors

n ow his h wit and l, nci Cou gy of Ray Cline’s U.S. Global Strate

put and F, NF at r” ola sch ed ish ngu sti “di a de ma was , IT) (IS institute on nt De es Jam and r de an ex Al . ism ror A charge of its program on ter pe

edited the conference proceedings, collected as Ge

r de an ex Al ed st ho F NF 6, 198 15, r be em pt Se feMilde to Terrorism. On a

a on ort rep to him ow all to An Press conference arranged ‘act-finding tour of the Middle East and to promote his then 87

_ _ — — — — — — y ' t s u d n I ” m s “Terrori

e h T

. er nf co s Es PT ie th At ? rs te gh Fi , Terrorists or F reedomhington’s ok bo t en ec National Press Club, a Buty dace Was most recent ence, necee uN ye by Michael Ledeen of CSIS and JINSA, ang d ar ch Ri as ch su s st li na ur jo e, er Th . st ge Di 's er ee Read eS f of ie a ch ce ne pe s, ) wi ! Le n e i h d C n a on st Po gt in sh Wa e th Ane d of th wi d le ga re re we s, the Associated Pres

“new information

on Libya’s

ti an c hi ap gr l ra ve se n w o h s d an m is or rr te g in role in promot ) 7 m. is or rr te ab Ar of e” nc de vi “e as s er st po American m, is or rr te th wi g in al de es cl ti ar l ra ve se d e c u d o r p s ha James Denton r te Pe t ys al an cy li po F F N th wi ed or th au co e ec pi ew vi Re In a National

ec sp n o t n e D ), 87 19 , 31 y ul (J I” SD g n i r e d r u M “ ed tl ti en Schweizer, e nc ra ea pp sa di a d an , es id ic su s, er rd ulated that a series of mu ts ec oj pr g on n i k r o ts w is nt ie sc d s an er ne gi en an pe involving Euro related to the Strategic Defense Initiative, or so-called Star Wars

s. et ed vi e So at th y tr b es ch t or ts is hi or y, rr it te al tu , ac in m, re ra we prog The evidence provided was not compelling. The authors do not distinguish between SDI and other high-tech and defense-related industries—one of the victims was a computer salesman—and they do not mention the total numbers working in these sectors which

would allow a calculation of probabilities. Only three of the alleged sixteen terrorist actions were linked to the SDI in terrorist commu-

niqués,*’ and the tie-in with the Soviet Union was entirely speculative. New Jersey Republican Congressman James Courter, a regular participant in Heritage and NFF functions, entered the SchweizelDenton article in the Congressional Record on July 22, 1987, prefacing

pase ie thestatement that “Murdering SDI” provided evidence oe mees headlines” but also allegedly proved the ™ t€ t is ft le e th n e e w t e b — t s a e l ry ve e th t —a ts es er nt rorist international and the val U.S.S.R -- which has made many officia efforts to kill SDI,"48 Facts ha

u® ro fe ci vo A . n o t n e D s e m a J s ' F F N e th ed er th po a f o r supporte r o s n o p s s ha , F F N e th th wi g on al , n o t n e D e B several “fact-f, al

“ott

:

t si vi tO r de or in a c i r e m A l ra nt Ce to Mterview contra eaek 1

:

column (April 23, 19

i

trl

“€

In the field. In a Wall Street Journal op _

Contra atrocities a Bi Denton dismissed Reed Brody's repo™ i ‘i essenu@ document,” Sandinista-sponsored , attributing all reports of oe , CO : 8anda many factured in ntra human rights violations to P O

Managua,19

88

On

July

24,

1988,

¢

pe

|

———

The Private Sector gist eae

published: a lett' er in the Ne; w York Review ¢of Books attack; Neier of Americas Watch for having identified ica gandists for the contras” in an article published on M Denton

demanded

an

apology,

Associated Press coverage

but

of a March

Neier

Aryeh

Sp bsOpa:

arch 17, 1988,

responded

by Citi

ng

1987 press conference at

which NFF officials, led by Pesan, stated that they would continue visiting congressional offices to emphasize the need for continu ed

financial support for Nicaraguan ‘freedom fighters.’ ”

In addition to its concern over Sandinista terrorism, the NFF has

been very greatly interested in South Africa, with special attention to the possible ill effects of any Western governmental sanctions and the violent tendencies of the ANC. An October 1987 issue of NFF’s Policy Forum provided an assemblage of quotations purportedly

showing the ANC’s link to the communist movement and its propensity toward revolutionary violence. This paralleled the Denton subcommittee’s hearings on the ANC, which had a similar emphasis. Neither NFF nor the subcommittee has ever put forth materials on or expressed concern over South African terrorist violence against its indigenous population or neighboring countries. Senator Jeremiah Denton’s hearings on terrorism were also devoted to tarring Denton’s political opponents with the terrorist brush. Among the groups attacked for providing “support” for Soviet and Cuban terrorist operations, Denton’s favorite was the National Lawyers Guild,®° and any group supporting the nuclear freeze was likely to be found, at minimum, an unwitting agent of the KGB.

Denton’s “witness list” reads like a veritable who’s who of the terrorism industry: Michael Ledeen, Robert Moss, Arnaud de Borchgrave, and Claire Sterling, among others, lent their voices to the subcommittee hearings, as did numerous members of the intelligence

institutional the is NFF the ways, many In and police communities. “mbodiment of the principles adhered to by Denton, and ae oe on the former senator’s ideological program since his dete

1€ 1984 elections.

_efeih mant o ration eit Ai JH

e e S e i l e a r s I h t i w d e i f i t n e d i y l e s o l c s Bone Pe Individual

e en Fa the for on vi za ni ga or ng yi bb lo l tua a Sanded as a vir Well as a terrorism institute. The two are closely nelulee ye 89

~ — — — — — — — — y r t s u d n I , m s i r o r r e “T

ie

th t di re sc di to ng yi tr of ts is ns co : aspect of lobbying for ee JINSA also illustrates the aut e w e an s ae or rr te as O PL d an Palestinians d n a s e t u t i t s n i e h t of n o i t a i l h f a f o y t i u g i b m a d n a acter r a h c l a n o s eee ‘1 the terrorism industry. JINSA vice-president Morris J. ee

o e r e Am er ic aIs ra the eh of he ad fo ‘s rmer

Com-

aff ili ate d Ot he rs or ga ni za ti on . lo bb yi ng pr oIs rael mittee, a major me mb er s bo ar d ad vi so ry or bo ar d an d with JINSA as founders Ke mp , Ja ck CS IS , of La qu eu r Wa lt er an d Le deen include Michael

Kir kJe an e Ka mp el ma n, Ma x an d Zu mw al t, El mo retired Admiral ad mi ni st ra Re ag an all th re e lat ter the patrick, and Eugene Rostow,

tion officials as well as Danger and Committee JINSA has produced Soviet support for the

Pre sen t the on Co mm it te the e of members for a Democratic Majority.”* g in il ta de s er tt le ws ne d an s ie ud st numerous arn te in r fo g in ck ba O L P ng gi le al d an PLO

. a d n a g a p o r p i el ra Is of ts in po l ra tional terrorism, cent

Until 1981,

, or ct re e di iv ut ec s ex e’ ut it st in e th by ed it ed s the JINSA newsletter wa an ic bl pu Re ey rs Je w e N r fo r fe af st er rm fo Dr. Stephen Bryen, a e th r fo rk wo to ne go d ha n ye Br , 79 19 In . Senator Clifford Case

A, NS g JI in nn ru s wa , he 80 . 19 y ty B ri ic jo Ma at cr mo De n a r io fo it Coal and in 1981 he joined the Pentagon to work with Richard When Bryen left JINSA for the Pentagon in 1981, Shoshana, took over as executive director. With Stephen the Pentagon and several well-connected JINSA directors sensitive, defense-related

positions, new

conduits

Perle. his wife, Bryen in serving in

for the disseml-

nation of propaganda opened up between JINSA and the White House, and JINSA took advantage of these opportunities.”

For example, on July 20, 1983, the White House Office of Media Relations and Planning released a report entitled “The PLO in Central America,” published in the White House Digest. The repo Sand inis ta’: the and Cas tro wit h F clos ely wor kin g aro , Me ' Pe al e He, £ ve its allies establish a Sov iet base of operations 1n Cent! ;

us ro th ts is or rr te of nt me oy pl de d an ng ni ai tr e th gh ou “r ca ni ediaue art ee the world. This poorly doc

out showing the encircled

y

pened

reponene™

a

names of some twenty-two “worldwide te™

orist

organizations” ]j j e c e — ™ : c e n t e d r p i t i a h e t g e o c r e a m a ’ r b s r y o w l s , cae i inked, th © center "6ofPihcisturfeoroefheYaadsser Arafat with the acronym “PLO : The ch art was design ed to show

90

alleged PLO backing

_ such for °

———

The Private Sector

ae

amen

cetee tes

organizations as the Black Panthers, the Ury

$s, guttas SUayan Lupa ma i ie BOS FP undergrou Sandinistas, and : El Salvador’s 3 ” n e m e v o m d n s ( the diagram carried the caption “Intelligence informationno iha:s e e linke the PLO with terrorist and guerrilla organizations around the world,”

b mo ve me nt s” “u nd er gr ou nd Sa lv ador’s me nt io to n it failed Ss” by name ! ;

(one assumes that it was intended to refer to the FMLN-FDR). While a “genuine” intelligence document would have been careful to identify the group, the diagram included in the White House Digest did not, perhaps because its source was not military intelligence but

rather the JINSA Newsletter (vol. 3, no. 21) for June 1983. According to the June Newsletter’s cover story, written by Shoshana

he (“T st Dige the in ort rep the to l tica iden e titl a g rin bea and Bryen g kin wor e wer as ist din San the and tro Cas PLO in Central America”),

ral Cent in acy ocr dem and er ord t ver sub to with the PLO in order SA JIN the and ort rep st Dige the If America and the Caribbean.

of k bul the that t den evi s ome bec document are read in tandem, it

m fro ale les who ed lift e wer ts” “fac and s tion cita s se’ Hou te Whi the e genc elli “int to d ute rib att m gra Bryen’s article. Likewise, the dia orepr ply sim was cle arti st Dige information” and accompanying the m fro se Hou te Whi the by n, tio rec cor or on iti add t hou wit duced, an agu car “Ni for ” ts’ nis ndi ‘Sa a agu car “Ni ., (e.g r tte sle new JINSA’s ‘Sandinistas’ ”).

g n i w t h g i r e th n e e w t e b p i h s n o i t a l e r e os cl e th s te ra st lu JINSA il

e th d n a y t i r o j a M c i t a r c o m e D a r fo e e t t i m m o C e th f o s t a r c o m e D in al ci fi of h g i h a e rl Pe h t i w s, ar ye n a g a e R y l r a e e th In y. bb lo i el ra Is as g in rv se k c i r t a p k r i K d n a , w o t s o R , n a m l e p m a K d n a n o g a t n e P the n a c i l b u p e R e th to in d e t a r g e t n i s a w y b b o l e th s, al administration offici

s k r o w t e n It . ll we as s e i d o b e v i t u c e x e y e k s it d n a administration

h g u o h t m, is or rr te on s l a i r e t a m s It . C S A d n a extensively with CSIS m o r f ed at ti en er ff di e b y l d r a h n ca , a d n a g a p o r p i el ra Is y ll essentia y l i s a e w o l f d n a , s t r e p x e d n a s e t u t i t s n i y r t s u d n i r e h t o y n a m f o e thos s r o r r e t n o n o i t a m r o f n i s a n i a g a t u o d n a e s u o H e t i h W e h Into t

n e e e t a t S , m s i r o r r e T l a n o i t a n r e t n I n i s e i d u t S Institute for

z

e e C t a 7 7 9 1 n i d e z i n a g r o , e t u t i t ‘This ins © be little more (4 -

) T I S I ( k r o Y New s r a e p p a , ) a t n o e n O ( k Niversity of New Yor

s i h r a e d n a x e l . A r e d n a x e l A h a n one-man Operation run by Yo s s u c s i d l l i w e w d n a , y r t s u d n i m s i r o r r e t e h t n i e r u g i f t n a t por 91

e t i

+ — — _ — — — — y r t s u d n I m s i r o r r e T “ r e e n pa

e a s s i l e l i s i l a e f r e t p a h c n i s w e i v d n a s writing

a é r e p o e c n e g i l l e t n i d n a , e c i l to military, po n w o s r e d n a x e l A t c e l f e r t h g i r i l e a r s I d n a European, r o f t i d e r c s m i a l c e t u t i t s n i e h t r o f r e y l f g n i s i t r e v d a n o d e h s i l b u p s k o o b e v i f y t n e w t , s e c n e r e f n and co

oe S., n A . s n o i t c e n n o c s r a n i m e S y t thir d n a , m s i r o r r e t

e v a h s e c n e r e f n o c s t i f o e m o S . t c e j b u s e h t n o s m l i f l a n o i t a three educ f o y t i s r e v i n U e h t , S I S C , F F N e h t h t i w y l e v i t a r o b a l l o c e n been do y a R d n a , y g o l o h t a P l a r o i v a h e B d n a l a i c o S r o f e t u t i t s n I s ’ o g Chica : m s i r o r r s e e T h s i l b u p o s l a T I . S l I i c n u y o g C e t a r t l S a b o l G . S Cline’s U. . l a n r u l o a J n o i t a n r An Inte as s” ct “a t s i r o r r e t f o s e i g o l o n o r h c h t r o f ts se y l r Terrorism regula

” t n e m s s e s s a k is “r d e s a b a i n i g r i V a , l a n o i t a n r e compiled by Risks Int

a n r e t n I s k s i R s s e n i s u B , y n a p m o c y t i r u c e s e t a v i r p a y b firm owned

, as bi r ei th s e s o p x e n o o s s e i g o l o n o r h c e s e h t f o n o i t a n i m tional. An exa

s s e n i s u b g n i c i v r e s n o i t a z i n a g r o n a f o g n i r e h t a g a t a d e h t in inherent of s m r o f r a l u c i t r a p in t s e r e t n i d e s u c o f y l w o r r a n s it to d e n u t t a d an g n i t r o p r u p l a n r u o j a r e t fo a i r p o r p p a n i y l e r i t n e t u , b m s i r o r r e t il reta n e e b s a r h e d n a x e . l e A v i t c e p s r e p d a o to look at terrorism from a br e u g o l o e d d e i t t i m m o c a is e h d n , a f l e in the risk analysis business hims . r a l o h c s n a a t r h s e t h i t d a n r a g a p o r p d n a l ci un Co gy te ra St al ob Gl S. U. e th d an IT IS , On January 19, 1988

l na io at rn te In ms il of cr Mi ty si er iv Un cosponsored a conference with

's on gt in sh Wa at y, an mp Co ll we Ho d an ll Be of (UMD), a subsidiary

t— uc od pr est lat s I’ UM w ie ev pr to r de or in , International Club ts ec oj pr h ic wh e, fil e Th e.” Fil ce ur so l Re na io at rn te In : An sm ri ro “Ter

ng ati rel re tu ra te li on hy ap gr io bl bi e” et by September 1991 a “compl ies rar lib to d re fe of g in be is , 90 19 to 60 19 om fr 40 terrorology 0” l too ch ar se re ve ti ni fi de e th me co be to e a e ee u oversees 7 Tea

Alexander’s selecti a : a ee

toward analysts and

a

foots ee solinane loam

who will aid in the we eee only excludes all ae su

ee

. eo

ma

a sea

cules

aie ot

for work on this Bole

ec

itis heavily wo®an

ik e B in ip pa so ni vi wi ad e pe n s t’ e ec oj enol pr e e included on thhee proj thos ong e lobbying groupss. Deanteon : of NFFboard are Jame

e! ov O° d an IS CS e of in Cl S. y Ra ; G l: ci un gy Co te ra Global St , ai a e th of ad , he ll be mp Ca n en Gl ; ” rd Institution; Edwa ™ r e p p u K nt he va ae of so al , er ll Te ward

oover;

92

Ro

aur CSIS;

UUM

CA)

ae Laqueur of CSIS and JINSA; Eugene Rostow of Ta

Coalition for a Democratic Majority, Reagan administration, National

Detense University, and JINSA; Robert L. Pfaltzgraaf, president of the far-right

Institute

for Foreign

Policy Analysis

(IFPA);

Paul

Wilkinson of the Research Foundation for the Study of Terrorism: Jillian Becker of London’s Institute for the Study of Terrorism; Brian Jenkins of Rand; and retired General Aharon Yariv, former chief of Israeli intelligence and now director of Tel Aviv’s Jaffee

Center for Strategic Studies. “Terrorism: An International Resource File” will provide a nominally “objective” institutional outlet for data on terrorism that will not only stick closely to the basic Western definitions and model, but will also tilt sharply toward the right-wing end of establishment perspectives. United States Global Strategy Council

(USGSC)

The council was

nfou ch ear res al ion cat edu t mp xe -e ax “t a as 1 198 in ed at incorpor tly ren cur is ne Cli S. y Ra A CI the of or ect dir ty pu de er dation.” Form n, ma ib Le ris Mor ck, tri kpa Kir e an Je rs hai coc of aid the th (wi ir cha its J. William Middendorf, Donald Rumsfeld, and retired Lieutenant

General Robert L. Schweitzer). Cline also serves as codirector, with

Yonah Alexander, of their program on the topic “Low-Intensity Conflict and Terrorism.” Among those who have served on the council’s board of directors

and “strategy board” are Arnaud de Borchgrave and retired General E. David Woellner. Woellner became president of the Moon organization, CAUSA World Services, in January 1985 (to be succeeded in that post by Philip Sanchez, Nixon’s ambassador to Honduras and

Ford’s ambassador to Colombia). The Unification Church’s input into USGSC is impressive, and the organization is regarded by

investigative journalists Louis Wolf and Fred Clarkson as “yet another cis Fran L. ude incl s ber mem d boar ent Curr 4 n.”> atio oper SA CAU d iate afhl , Sulz ce ren Law ; IFPA the of aaf tzgr Pfal Bouchey;* Robert

ard Harv of s Pipe ard Rich w); belo (see n tio nda Fou Hale with the

red reti of set e larg a and n; atio ound F tage Heri the and ty Universi

military officers also affiliated with ASC (Moorer, Graham, Lemnitzer, Stilwell, Wedemeyer, etc.). The aims of the Global Strategy Council are to promote “global 93

— y r t s u d n I ” m s “Terrori

e i

l a n o i t a n e n i f e d p l e h o t t s y l a t a c a s a t c a o t “ d n a ” g n i n n a l t p h g i c r i d q g n r e e a t a n a o i r b t l d r a s h d t e i y r b i s e : g e strat y b d d s e n i l e h t g n o n l o a i t a ” y l g u e m t r o f stra y g e t a r t s s r o s n o s it sp m i a e s e h t h t i w d r o c c a n I 6 5 s r office h c r a e s e r as l l e w as , s m a r g o r p h c a e r t u o d an

n a e b b i r a C s It . s e u s s i l various internationa

and conferences on

n a c i r e m A n i t a L d n a

t s i l a i c e p a s c i r e m A n i t a L r e m r o , f e n i a t n o F . W r e g o R r is o t c e r i d s e i stud

e r e h w e s l e d e t a i l i f f a o s l a , l i c n u o C y t i r u c e S l a n o i t a for the Reagan N n a c i r e m A r e t n I r o l f i c n u o s C ’ y e h c u o B d n a m e t s y s n o o M e h t h t wi Security.°’ We

earlier the program

mentioned

on

low-intensity

t s . o r M e d n a x e l A d n a e n i l C d y e b t c e r conflict and terrorism codi revealing, perhaps, is the program on Geopolitics of Southern Africa, directed by Stephen A. Halper, a former operative in the Nixon White House and Ray Cline’s son-in-law, who was involved in the Debategate scandal, brought to light during House hearings in 1984.°° The featured political subdivision of the program is “African Insurgencies Supported by the Soviet Union.” The council links together individuals connected with the Unification Church

and other far-right operations

(ASC, CIAS, and

IFPA), to CSIS and the omnipresent Yonah Alexander. It has former officials Cline, Kirkpatrick, and Rumsfeld to lend respectability to its terrorism studies. With this political cast, that South African view-

Pome would be put in the frame of Soviet support and insurgent terrorism” is a foregone conclusion.

International Security Council (ISC)

The International Security

Council is the main U.S. agency of the Moon system in the field of ee

propaganda. In a brochure issued by ISC in October 1987 ,

ae oy eee ee pres

pp

ve

yung Christian

acknowledges the “generous and unwav-

AUSA

International and that of the Reverend

Moon, whose understanding of the threat to Judae™

civili zation ilizati

,

is unj

to ent ‘tm his is as ue, niq selfless commuitm freedom, security and peace” @ 9) The

Security

P

ede r p

(C

;

;

Cessor Organization to IS@MtheGanter for Internationa!

e d u l c n i d r a o b s t I . 9 7 9 1 n i a b r u h C y b d e z i n a g r o e a t “ s e a r o j a M pe tonesion Pale Keegan, Jr. (USAF, ret.), William Kintneh

! e i n a D l a r e n e G t n a n e t u e i ’ L c a , r ) . u t c e r c a m , o N w S e U d d ( r n a , u ) n . s , o . d r t 4 s h f e n e » r e o a o B a Y c N n i : A S U ( m a h Gra

94

ign

rivatensaer

Oe

eee

eee

Media and former counterinsurgenc Y Consult ant to South Vi etnam puppet president Ngo Dinh Diem a nd ot her terrorist gove r n m e n t s in the U.S. sphere of influence. Also on the board were Frank

Gervasi and Joan Peters. These reflect CIS-ISC and Churba’s |

time and fanatical devotion to Israel. Gervasi is a well] amine: an 5;

passionate apologist for Israeli policy; Peters is the author of From

Time Immemonal, a volume published in 1984 to demonstrate that

Palestinian Arabs were intruders into Palestine (so that, by an easy inference, they were not unreasonably denied political rights in that

area).°” The reorganized ISC board of 1986 continued to include Kintner and Churba, but it now contained seven Mexican conser-

vatives, four retired military officers (now including Gordon Sumner, Jr.), and several other right-wingers. The ISC advances its proclaimed goal of formulating “global strategic analysis” by sponsoring international conferences, through its quarterly journal, Global Affairs, and by taking out full-page ads in such organs as the New York Times. There it posts its various “declarations” on issues ranging from the security of Southeast Asia (NYT, May 4, 1986) to the Reagan-Gorbachev summit (NYT, Dec.

9, 1985). In both of these ads, the world is divided into the good and the evil, the problem being the naiveté of the leaders of the

good and their failure to grasp fully the sinister intentions of the enemy. In both, also, the Strategic Defense Initiative is lauded as a

marvel of creativity: “a wholly defensive system . . . indispensable to the restoration of a nuclear balance.” Among the publications of CIS and ISC are Frank Gervasi’s 1982 booklet, Media Coverage: The

War in Lebanon, and papers by S. B. Kelly, The Soviet Penetration of Iran, and Daniel O. Graham, Why Not Defend America? In 1963 Churba entered into a professional relationship with Meier Kahane in an operation they called Consultant Research Association, which infiltrated organizations and collected information

on behalf of the FBI and other government and private organiza ons. During the Vietnam War period, with seed money from ad S°vernment and certain labor groups, the two of them establishe ze li bi mo to ed the Fourth of July Movement, an organization that tri e ot wr o tw he T War. Vietnam the for campuses *Upport on college d ed an nd fu secretly Vietnam, in Stake Jewish 4 book in 1968, The

95

— — — — — — y t s u d n I ” m s i r o r r e “T

e i

e h t s a w h c i h w f o e m e h t e h t , t n e m n r e v o g . S . U e h t y b published mmitments

o c s t i p e e k s e t a t S d e t i n U e h t t a h t 1 | e a r s I r e o f c n a t r impo

a . m a n t e i V h t u o S e k i l s e c a l in p 60

a i b m u l o C t a s n o i t a l e r l a n o i t a n r e t n i n i e t a r o t c o d a g n i n i a t b o r e t f A

y t i s r e e f v r h o i i t : n A U l l i t y t l u c a f e h t d n e o k University, Churba wor e r h t o r o t f a e m c i n t e s g e i l l e t n t i s e a l E d d i e M m a a c 1972 and then be

, n o i t s c ’ e n l a e g g n a i e w R o l l d o . e F S z I i C n a g r o e 9 h 7 9 air force. In 1 ” r o s i y v c d r i a o l i o n p t e n s n e “ a i s m a a n g r a e v d o e e g r h e a t t b n r e u Ch . 2 8 9 n 1 n i i a g g n e , a i c t n n n g o e i m s re on disarma Churba’s devotion to Israel has never flagged. His writings and campaigns have constantly focused on Israel, its service to U.S. interests, its creative efforts in Lebanon.®! Churba has argued, time

and again, that the PLO is little more than a Soviet-front organization and that the mere presence of Arabs in Israel should be cause for worry. According to a piece distributed by CIS, “the Arab inhabitants of the West

are Jordanian

Bank

citizens and, therefore,

enemy

nationals vis-a-vis Israel under the rules of war.” Given Churba’s view of Palestinians as enemy agents, he is popular in Israeli “counterterrorism”

circles, and he has close ties to the

Israeli military and intelligence. A major conference on state terrorism and the international system was held by the ISC and CAUSA International in January 1986 in the hospitable environment of Tel Aviv, with speeches by Dr. Bo Hi Pak, Arnaud de Borchgrave, Charles Lichenstein, Gordon Sumner, Jr. (USA, ret.), and Yehuda

Blum, former Israeli ambassador to the UN.® Churba joined other luminaries of the extreme right in signing

Sn Ma 88 Comer Digest, wich denounced Ce sud ¢ajlineioeh

Ane administration for selling out South Africa

and others woes ie a siretiomed BENEMO paged ee

ymin

COED

ee PRESa whoehas e a flatteri onngy intr Clunoduc bation iswallonteChur ge’ba

preceding his interview with that “distingui

~

cidirector

stinguished founding Ml ne of CIS in the November 3 1989 ; John Birch Society’s week] Am: aes 28 the Review of the cana

displaying Churba’s ah extreme right, is his tae ‘€ssed extension of Soy; ;

p

viet

aga prop PrOpag

active measures’ agencies.”

inane feature.of chat aaa ee ae and his position or an view that the freeze movement °° nda

;

96

an

0



extension of the P

5 ro n h “ olitbu

|

The Private Sector e s

a.

Churba is connected to other eleme nts of th € far rig h t t h r ough his service as advisor to GeoMilitech Consultants Corporation, alo ng with John Singlaub of WACL and Edward Luttwak of CSIs GeoMilitech was founded in 1984 by Barbara § tudley, a friend o f Singlaub’s, apparently as an arms conduit for the s ecret government. The fi

rm supplied arms to the Salvadoran govern ment as well as the Nicaraguan contras, Singlaub using GeoMilitec to h procure $5.3 million in weapons, which were transferred to Ad olfo Calero in June

1985.°°

Despite this background of close connection to the Unification

Church and his extreme bias and fanaticism, Churba has appeared

on numerous television and radio programs as a terrorism expert,

including CNN News, the “MacNeil/Lehrer Newshour,” NBC News,

ABC's “Nightline,” and the “Larry King Show.” His line and organizational connections, though far-right, are within the bounds acceptable to the Western establishment.

The Nathan Hale Institute The Nathan Hale Institute was incorporated in 1977 to track and provide information on terrorist organizations and their supporters. Both the institute and an affiliated Hale Foundation are run out of the same office. The original trustees of the foundation were Lawrence Sulz, a CIA intelligence operations officer for twenty-three years; Daren Flitcroft, a former State Department attaché in the Philippines, and John R. Horton, a CIA

operations officer (1948-75) who later became the national intelligence officer for Latin America (1983-84).

Three individuals with ties to the far right have been officers of

the Hale Foundation. The president-director listed in the 1981 filing

for a Hale Foundation application to conduct business in the District of Columbia was John Carbaugh, an ally of Senator Jesse Helms

and, as we noted in the previous chapter, an attendee at the 1980 Buenos Aires meeting of CAL, the Latin American branch of WACL.

Sam Crutchfield, personal attorney to neo-Nazi Roger Pearson, and the man who helped Iran-contra defendant Robert Owen found the Institute for Democracy, Education and Assistance as a contra resupply front Operation, was secretary-treasurer of Hale. Victor ediay, listed as the foundation’s registered agent for the District of

lumbia according to their annual reports through 1988, once 97

‘om’

is

The |Terrorism

=

p aa Industry

Ne

service

ws

x

Capito]

as

known

Desa: ated viosss a former aide to Senator Strom Thurbent TuaRG He is with Kot

worked Information Services.

©» cas with the Aerospace

Technology

mond and spent ie sioe aye ne UL. Aue WORE: Fediay igence intell t e Sey Division, : - os ae Rlouan international gathering of right. ; ol ashingt " was the Wa 8 ) d French mercenaries seeking to begin a wing businessmen an the after Azores the 1 ‘ Settee secessionist revolt in the

oan Pp leit cam anaes es

lef

in

ents Wout worke Fediay rise enterp this In 1974. in Portugal st terrori t rightis a (OAS), zation Organi from the French Secret Army -held guese Portu the 1D coup a organization that sought to stage to and mainl the on right far the age encour to order in Azores . nment gover new the t agains action similar a attempt d on ym Ra by ed ct re di y tl en rr cu is e ut it The Nathan Hale Inst . on si vi di ce en ig ll te in s I’ FB e th of or ct re di t an st si as er rm fo Wannall,

This division was responsible for monitoring “subversives,” “front organizations,” and “activist types” (to use Wannall’s own language taken from his 1974 testimony before the House Internal Security Committee).°° In spite of attempts by Congress to curb the domestic surveillance activities of the FBI, Wannall interpreted the bureau’s

powers as broad enough to escape any such strictures. In a 1976 memorandum, included in the Final Report of the Church committee,

Wannall observed that the “intelligence-gathering activities of the FBI have had as their basis the intention of the President to delegate

his constitutional authority,” including those statutes “pertaining to the national security.”®

vee

a professional anticommunist in the mold and manner

oe ee Poe founded the Nathan Hale Institute in order to ‘ ; . Oe G es ee: e es terrorist Operations and organizations. In 4 , published by the institute entitled Who Is Tracking the Terror ists? Wannall identified the ACLU es; Studi y Polic for tute Insti the , the National Law e U A yers Guild, 66 left-oriented media e Ms Communist party, USA, and th Pporting—directly or indirectly ; domestic terrorist orga serie lite”

as

.

S

e

.

.

} Wann all In Mosc ow. by vocabulary, “leftist,” pee BODS controlled

and coeval. Wannal) subversive,” and “terrorist” are coextens!v®

the links between ie ®P€ration provides an excellent example : ticularly on the d unterterrorism” and “counterdissidence, P@””

Among those

OMestic front who ar : © or have

98

been

; included

as

advisors

0 t

The

Private Sector

LL

,

Wannall’s operon are Ray Cline; Francis J. McNamara, a fo r m e r th of di re ct or st y af f o n e t i m e of fi ce r, i n t e l l igence military

H o ¢ u s e at i S I n t e r nal ecurity, national director for the VFEW xCommittiteteee On ’s anticommunist Pacey

as well as editor of Counterattack, a 1950s Herbert Romerstein, a longtime HUAG staffer

blacklisting SeINICG: and investigator | for the House

Internal

Security Committee’s

Republican minority;°* Donald F. B. Jameson, vice-president of Research Associates International, Ltd., a risk assessment firm in the Washington area, and a 1973 CIA “retiree”; Eugene Methvin of G r O a . ham, D a n i e G l e n e r L a i l e u r t e e t a i n n r a d e n Di d t Reader’s gest; a c u r a r n e d n t A l g y e n c y I n t e l D l e i t f g h e e o e nce nse former director f se rv es G r a h a m C o m m i S t t t r e a e t e . N g a y t i A o S n C t a h ’ l o e s f member

is C A U S A , C h u r c h ’ s U n ification on the board of directors for the h e l d h a s a n d W A o C f L , b r a n c h vice-chairman of the American

th e o f F r i e n d s A m e t r h i e fo c a r n positions on honorary committees Anti-Bolshevik Bloc of Nations,

a haven for Nazi war criminals.°?

in ma e th , rt po re al nu an 86 19 ’s on ti da According to the Hale Foun S. U. ng ro st a r fo ss re ng Co y bb lo o “t objective of the foundation was e th om fr s ve ti ta en es pr re d, en is th To Intelligence Community.” l ra nt Ce e th t or pp su to te na Se e th foundation urged members of American

Counterterrorism

Act (S.1757), lobbied the Senate for

en es l pr re na io ss re ng co d ge ur d an s, ra nt increased support to the co on te ba de ic bl pu en op to ht ug so h ic wh , 76 42 R. H. at fe tatives to de U.S. support for covert operations in Angola. egl An s me Ja of s ep st ot fo e th in g in ow ll fo The Hale Foundation, o als , Q) AS r de un w lo be ee (s nd Fu ty ri cu Se d an ce ton’s Intelligen ts ui ws la ng ci fa rs ce fi of ce en ig ll te in r fo t or pp su l ga sought to provide le

to d te ec bj su s al du vi di in of ts gh ri al on ti tu ti ns co for violating the , ts le ok bo s he is bl pu so al on ti da un fo e Th . nt me surveillance or harass lec col ne ti es nd la “c a s in ta in ma d an s, ce en er nf hosts seminars and co

d e t i n U e th in g in at er op ts is or rr te d e t c e p s u s on t) is kl ac bl te va ri (p ae lates,

k n i h t a r e h t i e n s i C S A While the

) C S A ( l i c n u o C y t i r u c e S n a c i r e e m A a te g n i d i v o r p n i d e v l o v n i n e e b s a h t i , e t u t i t s n i y c i l o p e a ‘e a e t e h t f o s r e b m e m r e h t o y n a m r o f t r o p p u s e e A inde n i , e z i s s t i f o e s u a c e b t n a t r o p m i s i t i , e g a t i r e H e k i L : o i . an n o i t a t n e i r o y c i l o p d n a s n o i t c e n n o c g n i w t h reme rig 99

" " \ t s i A m s i r o r r e T “ The

ee

eh

. a < <
RFST depends heav ily on business a g e t,’ trus al party education

funding. In a fund-raising document entitle Scourge of Terrorism,” RFST

usiness and the

stresses that governments “do not

t, have the resources to assist private industry and business to preven

deter and counter terrorist attacks against their personnel, facilities and operations.” RFST is ready to step into that breach by providing “independent” research and educational work through its distin.

guished body of advisory experts from “industry, the armed services, the law and the police.” Generous support will help meet the “real challenge,” which is “to outthink and outwit the terrorist.”

In outlining the nature of the terrorist threat, the authors of this RFST document refer only to terrorism as defined in the Western model. This is entirely understandable given the business market to which the brochure is addressed and the strongly right-wing businessgovernment character of the advisory board. Its chairman is the noted academic expert on terrorism Paul Wilkinson, a terrorologist who never deviates from the Western party line, as we will describe

in more detail in chapter 7. Control Risks Ltd., another British-based security firm, has rather

extensive operations in the United States. The company evolved out of the corporate vestiges of the Al Insurance Agency, and was originally intended by its founder, Julian Radcliffe, to provide kidnap

and ransom insurance. Radcliffe was eventually joined by several associates with ties to British intelligence, police, the Special Al Service (SAS) Regiment, and the far right.52 Also going to work for Radcliffe were a handful of former researchers at Brian Crozet’

CIA-sponsored Institute for the Study of Conflict, including Peter

Janke, their resident specialist on South Africa. In London, we d, Control R is oi oe across the street from New Scotland Yar former metropolitan

ne ern Ireland, and Sir Robert

Arishltanletiesa Gea riee

:

airecto"

Its managing

major. Among the directors 0 132

f thell

The

Security Industry ——_—_ _

U.S. office are Peter Goss, former head of British militar y intelligence in Northern Ireland, and Karl D. Ackerman. a form er director of )

securityva. at the State Department. In 1984, Ackerman was busy peddling daily intelligence reports on potential terrorists prowling L.A. streets” to Los Angeles—based multinationals during the summer

Olympics, at $1,800 per package.*°

Control Risks gradually diversified its activities, becoming both a risk analysis and security consultancy firm. It hired Major General Richard Clutterbuck (also formerly with ISC) to be its counterter-

rorism specialist. Clutterbuck, a media staple in Great Britain and the author of several books

on terrorism,

including Living With

Terrorism (1975) and The Media and Political Violence (1981), is a

staunch proponent of the counterinsurgency doctrines developed by Frank Kitson. He argues in the latter study that “violence in industrial disputes, violence in political demonstrations, and terror-

ism” are all of a type. Following Kitson and the pattern established in his 1973 book, Protest and the Urban Guerilla, Clutterbuck effectively

conflates political dissent with political violence, and political violence with terrorism. That is, like many rightists, Clutterbuck seeks to criminalize dissent by labeling it terrorism. In 1986, Clutterbuck put his expertise to use as an associate of

Control Risks Ltd. by spying on British animal rights groups for the chemical industry. Several leading chemical and food manutfacturers had commissioned the Control Risks study in 1984 in response to heavy antivivisectionist lobbying. According to Kevin Toolis of the London Observer, Clutterbuck interviewed several leaders of the

animal rights movement, claiming that he was writing a book. He neglected to mention

that his “book” was, in actuality, a report

underwritten by the chemical industry and that he was a director of

Control Risks.°4

study One week earlier, the Observer had reported on another

undertaken by Control Risks, this one dealing with the anti-apartheid

business 1n South movement. A number of British companies doing

place, in order to be briefed Africa joined a “syndicate” at £1,500 per nt. According

moveme ©n potential violence from the anti-apartheid med that they fo a letter sent to prospective clients, Control Risks clai

-apartheid groups os anti of ities activ “the l detai in rt Would repo intentions,

groups and their Europe, their relationship with terrorist 133

____ “Terrorism” Industry —————

ie

terrorist Organy. or nt ita mil er th “o t tha s tie ili and assess the possib

netrating the ant. zations will exploit the South African issue by pe | ae Ae | apartheid movement.”

gepusiicss

The syndicate of companies doin

outh Africa Was

division of organized by Control Risks liniorsvalion Services, a Risks Infor. Control Risks Group. The chief researcher at Control mation Services is Peter Janke, who, as we Saw earlier, was a warm

working friend and servant of the South African government while at Crozier’s (and the CIA’s) ISC in the 1970s. A former Control Risks “security consultant,” David Walker, now

Ltd., an organization staffed almost entirely by

works for KMS

former SAS members and wryly referred to in England as “24 SAS,” or the 24th regiment. The acronym itself stands for “Keeni-Meeni Services,” a name derived from a piece of South Arabian slang meaning clandestine or “under-the-counter.” KMS even draws upon the SAS motto, Who Dares Wins, for its own professional slogan—

Who Pays Wins.°° This is a fitting motto for one of the world’s largest “private” recruiting networks for mercenaries. KMS achieved some notoriety when it was learned that Oliver North had used Walker as part of his private aid and resupply network for the contras. Walker was hired by Richard Secord to fly missions inside Nicaragua and to plan the sabotage of Soviet-made helicopters being shipped to Managua. John Nields, the chief counsel for the House

Iran-contra committee, described Walker as “a professional saboteur.”°’ For his services, the enterprise

paid Walker

$110,000.”

Overall, KMS may have recruited as many as fifty mercenaries t0

aid the contras.°® KMS has provided mercenary services elsewhere—to Ian Smith's

apartheid government in Rhodesia; to train Sri Lankan soldiers ®

counterinsurgency techniques; and to assassination operations

Lebanon. Its activities, and those of similar organizations,” are ce

carried out with the close cooperation of the British Foreig® 0 an

ee

Prieisionsiy

with Milica

et i ae

HS work Walker

aa at

ni tislawi

paper quotes a British

elias

ee

gets from t ae

ake

extended his services to ale AbiesGaciadienbakanieey:



als0

ei ee sons. : yarding nited States, with Walker men # recel”

and facilities in Washington, D.C., 4” 134

—_———

The Security Industry -_ _

ing diplomatic immunity and carrying State Department identif ae. ices rendered to Oliver North and the tion cards. The serv

terrorists fit into a consistent pattern of official Western directly and through firms like KMS for “counterterror.”

su ny

ce

Like its U.S. and British security firm counterparts, Israel’s Inter-

national Security and Defense Systems (ISDS) is a wide-ranging

operation with full “counterterrorism” capabilities. ISDS, based in Tel Aviv, is co-owned by Leo Gleser, a former colonel in the Israeli

Defense Forces (IDF) who participated in the 1976 raid on Entebbe.

ISDS has been very active in Central America, protecting business and government leaders as well as providing “counterterrorism” training to military and paramilitary personnel in Honduras and Guatemala.

In an April 30, 1985 letter of presentation to the Guatemalan military, Sammy Sapyr, then director of ISDS’s Guatemalan branch, described the company’s services in great detail. These included antiterrorism training and the formation of antiterrorism “squads,” electronic surveillance, intelligence gathering, and the sale of arms,

including helicopters and airplanes. Jon Lee Anderson points out that the document also offers a course in “selective terror” under the general rubric “the training of military personnel.” It should be noted, however, that in light of the role and performance of the Guatemalan army, all of ISDS’s services under the name of “coun-

terterrorism” facilitate serious state terrorism.

According to Gerard Latchinian, a multimillionaire currently serving a thirty-year prison term in Indiana for his role in the 1984 attempted overthrow of Honduras’s civilian government, ISDS employees were active in training the Honduran death squads, as well as members of the Nicaraguan contras, in techniques of terror. In fact, ISDS’s Gleser hired two ex-IDF members, Yehuda Leitner and Emile Sa’ada, to help train members of Gustavo Alvarez Martinez's Notorious Battalion 3-16, the general’s private death squad. Jose

admitted Valle Lopez, a former member of the battalion, has and hee Participating in a rash of kidnappings, torture sessions,

Murders, some of which took place in the presence of Mr. anfrom the LS;

embassy,

who

oversaw

several torture

panei

ie d

ted from Hon oe When Alvarez Martinez was eventually ous 'S Successor, General Walter Lopez Reyes, immediately severe

135

————_ — — ry st du In ” sm ri ro “Ter

he ties with ISDS.

Lopez Reyes told ue

Seana

that [SDs

in ‘ pete el

trained Alvarez Martinez s “special ane a

on rt, a front fo,

and hijacking techniques, and that this was,

Cre was coord}. oor me k too also who ras, cont the ng traini Reyes told Anderson, nation ‘between them and the CIA,” Lopez somethin

. The Israelis had “So. | didn’t renew their contract... or another.’® Despit ‘ way One . ads squ th dea s rez’ to de with Alva

that the “official” death s ear app it r, eve how , ract cont d ere sev the Martinez lives on.®” squad organized by Alvarez

In 1986, Yehuda Leitner, who had worked with Gleser and ISDs, were exposed Ged Honduras after his connections with the contras

in by Anne-Marie O’Connor in a Reuters dispatch. His colleague the affair, Emile Sa’ada, also admits to having contracted with the

Honduran government “to teach the Hondurans counterterrorism,”

but now claims to be nothing more than a melon farmer. The

company for which he works, Shemesh, currently employs some five thousand Honduran peasants as pickers and growers. But Shemesh also nominally owns ISDS, although as one U.S. military advisor told Anderson, “Israelis always go through front companies,” and in Central

America,

“Shemesh

has

always

been

their

front.” And

according to Carl Fehlandt, a former arms salesman in ISDS in Guatemala between 1982 and 1986, Shemesh/ISDS “is the offical Israeli arms outlet. The Israeli government owns ISDS and the man

who calls the shots is the Minister of Defense.”°° Another Israeli security firm, Tamuz

Control Systems, has long

been active in the Philippines. Based in Tel Aviv and founded by 2

group of Israeli generals still active in the reserves, Tamuz provided

security to Marcos and trained his police and security forces in

antiterrorism tactics. Like ISDS, Tamuz

seems to enjoy a “special

two Tamu? LAAONEMp with the Israeli government. In 1984, OPELALN ES who had previously worked in the police antiterroris™

unt ereah photocopying cafe pole aig mans court, however eden fe

a

bee ie PU QSBEC ISLS oe

e; as H. Handwerker

OS

and Y. Levy TP

orte the ith

generals 4? pany 1s headed by former s e i al r d d t er ri l r n r i is coordinated wi cou Wo to Th ansf of mate

nior defense offi,cials,67 se :

:

136

__————

The Security Industry —_——____ _

Counterterrorism Training Camps

A number of counterterrorism

training eee ute also sprung up over the last decade offering Whee hands-on seminars on detection, weaponry, and assassination.

schools operate as part of a network built largely around the activities

of Soldier of Fortune magazine and the private contra aid Suteeaise established by both Oliver North and John Singlaub. Such Scheer serve a dual function. While ostensibly training individuals in coun-

terterrorism techniques for self-defense, the camps also offer classes in counterinsurgency and assassination. These academies have attracted members of right-wing, racist, paramilitary organizations such as the Ku Klux Klan and Posse Comitatus, as well as executives

interested in fending off terrorists.

Many of the civilian mercenaries

and trainers connected

with

these camps received counterterrorism and Ranger instruction at U.S. Army Special Forces bases at Fort Bragg, North Carolina, Fort

Jeff Benning, Georgia, and Fort Lewis, Washington.® According to have Gerth, “Some of the units were created to fight terrorism but

acquired broadened mandates and training for missions against insurgencies in developing countries in Central America, Africa, and sia’.°°

In July 1983, Tom

Posey, a former marine corporal, Birchite,

and member of the Alabama National Guard, along with four other National Guardsmen, organized Civilian-Military Assistance

ary (CMA),”° as an instrument for sending mercenaries and milit

supplies to El Salvador. With extensive official support (both military

and diplomatic), CMA sent numerous shipments of weapons to El nez Salvador.?! According to Posey, General Gustavo Alvarez Marti

of Honduras

approached

his group in 1983 with a request for

the initial meetings training and advice.”* The U.S. embassy arranged

turned to helping between CMA and the Honduran.” CMA soon also sent

material aid but the contras, and not only provided Mercenaries to Honduras and Nicaragua to fight. Posey bragged to hundred rounds at the three fired had he that Times the Huntsville d-to-hand combat.

t in han icaraguans and hinted at engagemen killed pane a e wer men s ey’ Pos of two On September 1, 1984, was shot Leen im gua ara Nic r ove ing fly e helicopter they wer mercy

‘nvolvement, “claims © es’ ari cen mer the of s ial den ollowed

137

___ “Terrorism” Industry ———

iii

ne with extensiy do s wa n io at er : op re ti en is eae missions,” and so on. Th l] we as t ty Ac li ra ut Ne e th as the of on ti Vv iola official connivance, in aha

Boland amendment.

ers is SIONICS One of the largest and oldest of the training cent Counter. Inc. (Studies in Operational Negations of Insurgency and

ng Center, with Subversion), formerly Cobray International Traini

1979 by the headquarters in Powder Springs, Georgia. Founded in

late Lieutenant General Mitchell Livingston WerBell III, SIONICs is a frequent advertiser in such mercenary magazines as Soldier of

Fortune, Eagle, and Gung-Ho. WerBell was an OSS officer in China

during World War II and worked closely with both Ray Cline and

John

Singlaub

(Singlaub

was

visitor

and

occasional

camp). WerBell’s

training course at

involved classes in personal combat

(martial arts, knife

instructor at the SIONICS SIONICS

a frequent

fighting, and marksmanship) and “field and urban survival studies.”

The ten-day “primary course” was designed to teach a trainee how to avoid sabotage, kidnapping, and spying, and how to spot potential terrorists. Writing in Eagle magazine (June 1982), Sidney Filson described the course as “expensive and worth the price.” Students at SIONICS have included members of racist, paramilitary organtzations as well as groups like Lyndon LaRouche’s (now defunct) U.S. Labor party. In fact, in 1978 WerBell was employed by LaRouche'’s National Caucus of Labor Committees as “personal security advisor” to LaRouche himself.’° WerBell was active in international far-right politics up until his

death in December 1983. For example, he was involved in a 1982 coup attempt in Guatemala led by Mario Sandoval Alarcon’s National Liberation

Movement

(MLN).

According

to Jon

Lee

and Scott

Anderson, during preparations for the coup, WerBell remained 10

isolation in his suite at the Hotel Cortijo Reforma in Guatemala City; where a “retinue of Guatemalan colonels, businessmen, and a m¢™ ber of the U.S. military advisory group to Guatemala attached to

. ie mPnEDICAD Embassy regularly visited him, usually at night.”

sti

Oo ee

Ingram M-10 ae sa

WerBell owned seven other gor

Armament Corporation Guibien werBel!

ee davarene enouiy sddedHi dhe silencer) vented iicncaae Pavaball

and Parabel

t was ai lum Corp® q

ensed to sell weapons in Latin America 4” 138

a

[he Security Indtistry:

the firm planned for use by Watergate conspirator Frank St urgis to

obtain weapons

for Cuban

exiles

planning

to disrupt the 1979

Democratic convention in Miami.’7 In spite of the fact that WerBell’s Ingram M-10 and M-1]

uns

could be acquired legally only by special permission of U.S. seas

large numbers of them were inuse among European fascist eit siaee mig7oand 1977." The Spanish intelligence agency, DGS, purchased many such weapons under license from U.S. authorities in the 1970s. It was later learned that DGS was coordinating the activities of rightwing terrorists. ’°

Several other such camps have been established across the country, designed to train executives and security personnel in special “urban combat” techniques. Tuition rates are high; Executive Security

International (ESI) of Colorado commands over $5,500 for its basic

course in executive survival, and it counts among its faculty members Harvey McGeorge, a former Secret Service agent who has worked with terrorism expert Neil Livingstone. The Liddy Academy, the

training division of G. Gordon Liddy and Associates, Inc., offers a

seventeen-day program for close to $3,000. Not all of the antiterrorism training camps operate on a for-profit basis, however. The previously mentioned CMA has operated training camps for mercenaries for several years on a nonprofit basis. Humberto Alvarado, a former member of Alpha 66, operated a nonprofit camp in Bordentown, New Jersey, until local officials shut

the operation down.®! Camp Oliver North (and its sister operation, Camp Jeane Kirkpatrick) served to train predominantly CubanAmerican and Puerto Rican anticommunist forces for later “operations in Latin America, including planned invasions of Cuba and

Nicaragua.”8?

in duping several One self-styled “terrorism expentt succeeded

and conferences police departments into hosting training seminars

peace and an where participants were told that members of the

nuclear movements were, in actuality, highly trained stanney

James Davis, owner

of a California-based

“ompany known as DanCor,

private pole

au Ltd., had been on the payroll

'es0 state sheriff department's Red colds ae

eee 2

ialized Training ssia Spec e a s s ie e ater a »p© forn Cali the at or ruct inst an orked as 139

LL:

———__ — ry st du In ” sm ri ro er “T igen. founded cate

agency Institute (CSTI), an Reagan and his assistant, Eddwin presidency,

Reagan

appointe

ae

Louis

a oe

ef a

Giulirl

nagement y to direct the Federal Emergenc Ma

ead

A

Ronalh tO the

of EST,

gency. Shortly afte;

, Davis founded DanCor and began on gt in sh Wa to s ve a’ mo id fr uf Gi lice agencies across the po to ow m sh ad is ro or rr te ti an s ng hi peddli

country. for about seventy. A 1985 Davis workshop held in Boise, Idaho, ed a lecture by five police officers from the Pacific Northwest featur screening of The KGB an unidentified representative of ASC and a by the right-wing ComConnection, a film produced and distributed

chures e mittee for the Free World. Davis’s terrorism conferenc bro uclear listed sessions with titles like “Civil Disorder, Peace and Anti-N

Power Groups” and “Central American Groups.”

But Davis’s hard right line often provoked strong reactions from

local officials. In Harrisburg, Pennsylvania, one of Davis's training sessions for local police was canceled when an aide to the mayor realized that it was “essentially a program designed to provide police with an array of infiltration skills.” Judith Panora, of the Massachusetts Criminal Justice Training Commission, reviewed the course materials offered by Davis and concluded, “I thought it was too

right-wing. I felt it created in the mind of the police officers an inappropriate sense of paranoia.”*

Concluding Note The security industry serves business and government; it therefore

approaches “terrorism” from the standpoint of its employers a principals. Some segments, especially those providing security S&P vices and recruiting and training mercenaries, are often arms of the

government that carry out covert actions for which the governmen does not want to admit responsibility. Leaders of the security pusine® organize and

participate

regularly

in conferences

hearings; ap

seminars on terrorism, and are experts consulted Ny the media epi

and show how to cope with the terrorist threat. Because

their structural position and role, members of the security indus”? 140

ee

The Security Industry ——_ —__

at

terrorism strictly within the frame of the We stern mo Jook at leew a mate del. rial interest in inflat in g the thre at of terrorism And Be scans their own importa nce as supplier of counte rter-

4rorBeeservices Since the West engage Ss in and supports a primary

-orism under > the guisi e of respondiing ng to the violence of others, terror!

rity

industry naturally gravitates to the support of and r a ; in real terrorism, as exemplified by advising the GuaBR sand Honduran military on apprehending and interrogating BS cerrorists and aiding the Nicaraguan contras. In the West ss isallknown as counterterrorism.

141

DE

The Experts

iblink between the institutes/think tanks and the mass media 1s

provided by the large body of experts on terrorism, or “terrorologists,” who publish books, articles, and monographs through leading publishing houses, the mainstream press, and newsletters and jour-

nals issued by the various institutions that house them. They cov™

among their ranks right-wing journalists and policy analysts, forme military and intelligence officers, ultraconservative academics, COU”

terinsurgency

specialists,

FBI

informants,

and

CIA

contrac

employees. A significant number of these experts are affiliated with

ultra-right-wing organizations such as the WACL, CAUSA, the - _

SG

i nthacheai

ee

iste

va

attend one ache ee ce Sass

eee

Coalition

es

oe

for Peace Throus

eee eer

ees

ee Bee

and seminars, serve on

other’s journals (such as Terre”

142

oil

the © S and

The Experts ns

ai

Conflict Quarterly), review and write forewords for their books,

and

cite

one

another

copiously,

Throu

collez

h th; es raBUeS

;

supportive network, these experts establish fireteae ie z tally their very Similar assumptions and opinions as eh aa Sigh ca : : mon sense. They validate themselves by echoing one another in an information market which they dominate. There are other individuals knowl-

edgeable about the issues terrorologists address, but they start from

the wrong premises, are not funded by the institutes and think tanks of the terrorism industry, and are thus not properly accredited. Furthermore, their discordant views do not mesh well with the

commonsense ernment,

understanding of the issues established by the gov-

industry

members,

and

press,

and

they are

generally

excluded from serious discussions in public forums that reach large numbers of people. (A list of some of these unaccredited and excluded experts is given in appendix D.) In this chapter we will examine more closely some of the characteristics, links, and opinions of the preeminent terrorism experts. Our hypotheses are: (1) private-sector experts will tend to be affiliated with governments, or to have been so connected in the recent past;

(2) they will often be associated

with institutes and think tanks

organized to push established views, many with a strong right-wing

bias; (3) many of them will be linked directly or indirectly to the

international ultraright, exemplified by the Unification Church system and WACL; (4) many will be connected with private-sector security firms; and (5) the experts will rarely if ever depart from the official Western model and line on terrorism, and given the rightwing bias of the institutes, will, in fact, tend to expound the far-

right version of the line.

A Survey of the Experts

ori W ho Ultimately, we are most interested in those analysts of terrorism ; d are accredite

as experts by the mass

é wed to define allo

, media,

and w ho are thus

blic. pu the to ss acce n give are and es the issu

143

—__ — ry st du In m s i r The “Terro

——

———

fi

eT, Experts also include those who are cee

1¢ Participants th e e b Al ses nes wit as zed ili mob thie field and EXperts op 7-1 lists first (A) the 16 eading

Table aes sample of 136 s mas our m fro ons terrorism based on citati experts based on lists (B) o als It t.’ jec sub the on ms ite news pore experts, a er oth by k wor ir the tO number of references rorism.” There are 5

conferences.

political ter reported in Schmid’s volumes on t the two together provide ‘ndividuals common to lists A and B, so tha

Table 7-1 eee

SS

The Terrorism Experts EE

OEE

——

A. 16 Experts Based on Citations in

135-Item Media Sample

Robert Kupperman Walter Laqueur Michael Ledeen Neil Livingstone Ariel Merari Uri Ra-Anan Claire Sterling Paul Wilkinson

Fouad Ajami Yonah Alexander Joseph Churba Ray Cline William Colby Lawrence Eagleberger Paul Henze Brian Jenkins

B. 13 Experts According to Expert Citations in Schmid Yonah Alexander M. Cherif Bassiouni J. B. Bell

Brian Jenkins Robert Kupperman Walter Laqueur

Richard Clutterbuck

E. V. Mickalous

Margaret Crenshaw

E. V. Walter

Brian Crozier

Paul Wilkinson

Ted Gurr

. Supplementary List of 8 Major Terrorism Experts Arnaud de Borch grave

bo Alan Chalfont

Robert Moss

Richard Pipes

amuel T. Francis

Stefan Possony

Jeane Kirkpatrick

Maurice Tugwell re

i

144

The Experts ee

—_

94 separate cine: To this set of 24, we have added 8 supplementar names (C), based on our judgment of importance as fica ie

influence and outreach. Lord Alan Chalfont, a former British Shine minister and an active Journalist and publicist, was chair of the Jonathan Institute conference

of 1984 in Washington, chairs the

Institute for the Study of Terrorism in London, and links together diverse

governmental

and

right-wing

interests

in the terrorism

industry. Arnaud de Borchgrave runs a newspaper and magazine, writes fictional accounts of terrorism (which he and his coauthor Robert Moss discuss in interviews as though they were factual),? and

effectively exploits his numerous

connections to get his message

across. Samuel T. Francis is the leading Heritage Foundation authority on terrorism and has had substantial outreach through his

writings and participation in conferences, hearings, and interviews.

Jeane Kirkpatrick, following her stint as the Reagan UN ambassador,

has been a syndicated columnist, lecturer, and foreign policy expert associated with a number of institutes and think tanks. A cult figure of the right, she has had substantial outreach as a commentator on terrorism. Robert Moss, an Australian-born British journalist, has

been affiliated with a number of right-wing institutes, several of which

he helped

to organize,

and

has been

a prolific writer of

fictional and quasifictive accounts of the terrorist threat. The fictional accounts have been written in collaboration with de Borchgrave; the

quasifictive accounts have frequently been written under the direction or with the cooperation of various Western intelligence agencies.* Richard Pipes, the Harvard specialist in Soviet studies, is included

because of his multiple affiliations in the industry, his writings, and

his important role in the Jonathan Institute conference of 1979. Stefan Possony, the leading terrorism expert in residence at the

Hoover Institution, and also a longtime member of WACL and ASC,

has written extensively on terrorism, including a book written with

Communist Connection. L. Francis Bouchey, International Terrorism: The

army information officer, h tis Bri mer for a l, wel Tug e ric Mau Finally, , 1S ad of the Mackenzie Institute he d an da na Ca of nt ide res how a

adian terrorologist, with Can al nti lue inf t mos the as e her ed includ ee ada. wide-ranging activities in this field in Can exper, some of the major Let us turn now to an examination of

145

hoe lerronsm:

eee

Industty: ————--__

ter of their activities, as well to get a sense of the scope and charac r linkages and views ie ACetG

provide

basic information

on

thei

try y to arriv eratisome will we s ts ing oun acc se the ing low terrorism. Fol

positions on terrorism of and ns tio nec con the ut abo ons ati liz era gen all 32 experts.

Yonah Alexander

Alexander, a professor of International Studies

at the State University of New York, has run his Own institute since 1977, but he has also been affiliated with many other institutions

within the terrorism industry as visiting fellow (CSIS), as member

(the London-based International Institute of Strategic Studies), and as a participant in numerous programs and studies. He was selected as director of terrorism research of the NFF in the mid-1980s, and

he has been codirector with Ray Cline of the program on terrorism and low-intensity warfare at the U.S. Global Strategy Council. Also in collaboration with Cline, Alexander has been in the risk analysis

business for private corporate clients.® In addition to the thirty conferences and seminars on terrorism sponsored by his own institute, Alexander has been a regular participant in conferences staged by others, including that put on by the Jaffee Center for Strategic Studies in Tel Aviv in 1979, the Brookings

seminar of 1982, the

Nuclear Terrorism conference of 1985, and others. He has testified

as an expert witness before the Denton committee. Alexander also edits the journal Terrorism.

The funding sources of Alexander’s institute are not in the public

domain, but his continuous appearance in government-sponsored and government-related conferences, seminars, and hearings in both

Israel and the United States, and his views—which

never depart

from the right-wing version of the Western model—show 4 close

spiritual affinity with the official Israeliand Reagan-era U.S. doctrine, whatever the formal and financial connections. His tie with Israel's also shown by the fact that his book Terrorists or Freedom Fighters

coauthored with E. Tavin, was published in cooperation with the World Zionist Organization. His book written with Ray Cline Sie Sponsored Terrorism, was commissioned by the U.S. Army in 1984 oe

was eventually published as a report of the Denton committee '

146

a Nheobiganets teeti 1985. Another Alexander-Cline collabor ation, Terrorism: The Soviet Connection, was distributed freel eykby the hSte saben epomie rm to public requests for info st Subject of terrorism.®

Alexander has been a fertile producer on the subject of terro rism, his curriculum vitae listing thirty-one books. Fifteen of these works,

however, were edited or coedited volumes, and all but two of the

remainder were coauthored. Still, Alexander has written a great deal on terrorism, which he is able to do rather easily, given his continual

recycling of a simple message. The quality of his work may be illustrated by examining his (and Ray Cline’s) State-Sponsored Terror-

ism.’ The main goal of state-sponsored terrorists, the authors claim, is to undermine “pluralist states with democratic governments.” This may be the goal of the Reagan-era U.S. sponsorship of the contra attacks on Nicaragua, but Alexander and Cline do not list this as a case in point. On the other hand, as South Africa and Guatemala are on their list of states being subverted by Soviet proxies, the implication is that these are pluralistic and democratic states. This point is not clarified by the authors. They explain that a merit of their statement of the goal of state-sponsored terrorists is that it reflects “the recent policy positions voiced by President Ronald Reagan and Secretary of State George Shultz.”® The gearing of their analysis of terrorism to the policy needs of their own state could not be more explicit. No cliché or fabrication on Soviet sponsorship is left untouched in this volume—the PLO is the Soviet “transmission belt” for the

export of terrorism (p. 10); the North Koreans “fought the first Soviet-sponsored proxy war of the century in the 1950s” (p. 57); the

Pope was shot in May 1981 by a Turkish terrorist “trained and armed by the Bulgarian secret intelligence services” (p. 13);° Cuba and Nicaragua “closely coordinate in the supply, staging, and training

of the Farabundo Marti Liberation Front (FMLN) guerrilla war effort in El Salvador” (p. 64);'° and Nicaragua “has been antackang ts neighbors since August 1979 in a revolution without borders” (p. 88), 11

-Cline view of national liberEqually significant is the Alexander

ation movements. A war of national liberation for them 1s: ot that can be applied rm “te a is and m” ter a and pag pro munist

147

to any

a

The “Terrorism” Industry —

(Pp. 56 low-intensity conflict the Soviet Union chooses to support”

and xiii). Nowhere do they admit the possibility of rebel autonomy

and the legitimacy of such movements, their uniform Stress is oy Soviet support, which delegitimizes these movements. hey use the spread by Moscoy analogy of an “nfection, a virulent disease’

against “successive open societies’ to characterize national liberation po movements. They have no hesitancy in calling the ANC and SWa an model,” “extremist “terrorist groups . . - based on the Cub

acks against South Africa” organizations,” who “launch terrorist att

(pp. 64-65).

In brief, this is an extreme right-wing propaganda tract that ties

all liberation movements to Moscow and apologizes for South African

as well as any other Western-state

primary terror.

The authors

engage in shameless lying. None of these considerations, however, have detracted from Alexander’s status as an expert for both the Western media or other experts who cite and collaborate with him as a serious scholar.

Ray Cline Alexander’s collaborator, Ray S. Cline, Is a central figure in the terrorism industry, an early proponent of the Soviet

network theory, and a leading member and spokesman of the far

right. For a long time he was a senior associate at CSIS, adjunct

professor of International

Relations

at Georgetown’s

School of

Foreign Service, and an instructor at the Defense Intelligence School.

He currently chairs the CAUSA-affiliated U.S. Global Strategy Cou” cil, and serves on the editorial board of the Moon-owned monthly magazine, The World and I, edited by Arnaud de Borchgrave. Cline

is afhliated with many other members of the terrorism industry: During World War II, Cline served as a naval intelligence officer

and worked for the OSS in Kunming, China, with John singlav?

Mitchell Livingstone WerBell III, Richard Helms, and Howard Hu

Cline later served as deputy CIA station chief a South Kore4 int id

early 1950s. From 1958 to 1962, he was the CIA’s station chief is Taiwan, and from 1962 to 1966 was the agency's depuly ae

for intelligence. He later became director of the State Depa?™ ‘i d Bureau of Intelligence and Research (1969-73), where he help 148

_—————

The Experts

coordinate the CIA’s destabilization and eventual overthrow of the

Allende government in Chile.!? In addition oe nee Ena lies to the U.S. government, Cline has been closely connected to repressive regimes and the international ultraright. We have noted his leadership of a i cobbepataa

organization. While stationed in Taiwan, Cline was probably mone in channeling counterpart funds from the U.S. embassy to provide the initial financing for the Asian People’s Anti-Communist League in 1954 and the preparatory meeting of WACL in 1958.'? Cline has attended and participated in several WACL meetings. With Chiang Ching-kuo,

the son

of Chiang

Kai-shek,

Cline formed

Taiwan’s

notorious Political Warfare Cadres Academy, which has trained officers from right-wing nations worldwide in counterinsurgency techniques.'* One of the best known graduates of the academy is Roberto D’Aubuisson. Cline has also worked with the far right in the Philippines. After relocating the offices of WACL to the Nippon Star Trading Company complex in Manila in late 1986, John Singlaub met with Cline, Defense Minister Juan Ponce Enrile, and General Luis Villa-Real. Villa-Real, the president of WACL’s Philippine chapter, played a central role in the creation of right-wing death squads in that

country.!® Both Cline and Singlaub were identified by the Philippine

Daily Inquirer as aiding the forces behind the 1986 coup attempt against the Aquino government.’®

Cline’s ties to the U.S. far right are also noteworthy. He has served in various capacities on the boards of organizations tied to the so-

called China Lobby, such as the Committee for a Free China and

the Coalition for Asian Peace and Security. He was president of the

National Intelligence Studies Center, a conservative and intelligencelinked think tank, and he has been active in the right-wing Association

of Former Intelligence Officers. Cline has given interviews to the

John Birch Society’s Review of the News on two separate SESS

follow LaRouche's on (April 22, 1981, and March 27, 1985). Lyndon and Cline Cultivated a friendly relationship with Cline,

3 He is also to chat with them throughout the early 1980s.” Card of directors of the Nathan Hale Foundation and aie

=

the editorial board of Yonah Alexander's journal, ee ees: Cline has been heavily involved in the risk analyst 149

m ihe Terrorism Industry e

eee

h Alexande; i as a collaborator with Yona of the politica] envin e e dg le ow kn my l sel to g¢ ma; explains, “I am try 18 Fis clients include several

working sometimes

)

=

ment

in foreign countries. as Tits.

i

-

.

.

.

i Ms not to invest in mainla

‘Lh: a) advised Chin nd ady has ch he (whi s ie compan General Dynamic, , g udin incl s, firm nse defe of er mb and a nu

.” Cline has also major contributor to CSIS) and Hewlett-Packard created a number of “political risk scenarios” for companies doin

the South business with South Africa, scenarios that claim that be an engine African government s “sophisticated leadership could

for growth.”° In addition to his ties to Taiwan, the Philippines, anq

South Africa, Cline once helped a Chicago arms manufacturer sel]

arms to the military regime in Turkey.’ We

described

earlier the nature

of a work

which

Cline and

Alexander wrote together, which expounds a simpleminded rightwing version of the establishment model. When Cline previewed his thesis that the Soviet Union was masterminding worldwide terrorism at a 1980 meeting of the Association of Former Intelligence Officers,

he was sharply attacked by three of his colleagues. Howard Bane,

who had only recently retired as the CIA’s

said, “We've It’s divisive. Retired CIA stuff, that’s

got to It’s not officer all. It’s

Moscow

station chief,

get Cline off this Moscow control of terrorists. true. There’s not one single bit of truth to it.” Harry Rositzke concurred: “It’s that far-right horseshit.” Finally, Conrad Hassel, the FBI's

director for antiterrorism instruction, and now head of the Wack-

enhut Corporation’s antiterrorism division, observed, “If you wan! to believe in the conspiracy theory of terrorism, well, you've g°% It

but there’s no evidence for it.”?? Cline has been an outspoken proponent of disinformation and

direct manipulation of the press by the CIA. In testimony before

the House Select Committee on Intelligence, Cline defended the a of such covert devices as black propaganda and the funding °

Jpumalists, arguing that “the First Amendment is only a0 ame? :

ernie tao ioe

wae

Despite his CIA background, extensive connections ae

character of his ae

ahdaienean

ae

ona

BCS

"vert gues! frequent a been has fee rie dsice ‘Nightimesben U-»the ng defendi and m terroris on g , 150



=

la7i

~

:

i

Fe

ment’s use of m?Nazi war criminals as missile scientists Ist: (“Nightline,” 18, 1984). ,

October

Brian Jenkins closely linked

As we saw in chapter 5, the Rand Corporation jis to the Pentagon by historic ties and an ongoing

dominant funding relationship. As Rand’s top authority on terrorism,

Brian Jenkins would hardly be able to contest the Western model of

terrorism, and he has never done so. In fact, for many years Jenkins

has been actively involved in formulating terrorist strategies for his own government. Having served in the Green Berets, Jenkins became a counterinsurgency specialist at Rand, writing and advising on the best ways to defeat America’s insurgent enemies in Guatemala, E]

Salvador, and elsewhere. A 1977 article coauthored by Jenkins is an apologia for U.S. intervention in Guatemala and Guatemalan state terrorism.** As an important advisor in the construction of a counterinsurgency program in El Salvador in the early 1980s, Jenkins recommended that traditional methods be supplemented by the use of propaganda to discredit insurgents as “terrorists.”2° In another coauthored report in 1984, Jenkins recommended that the U.S. engage in low-intensity warfare against Nicaragua through a proxy army, actions that fall within Jenkins’s own definition of statesponsored terrorism. In short, Jenkins’s role as government advisor on policies involving state violence and insurgencies puts him in a serious conflict-of-interest position as an expert on terrorism. Jenkins has written extensively on terrorism and has made numerous appearances at conferences and as a media expert of choice.

He also edits TVI Journal (the acronym stands for “Terrorism, Violence, Insurgency”), a journal that he acquired from members of the Soldier of Fortune network in 1985.?° It 1s interesting, given his an aS on Position at a government-sponsored agency and as ee U.S.-sponsored terrorist activities, that Jenkins is one of the

se “rates” among the terrorism experts. His moderation 1s a that he is one of the few among the establishment exper S ati I ac now Openly castigated Sterling’s Soviet network model.2” He also

ft, that guerrilla

;

. nces an d ¢ cannot “dges that terror is not a monopoly ofrealthegrieva NOvements may be legitimate responses to

151

Siem

lenrorisme) (ndusthy ©—$

4

.



182

re

The

Experts

te bends liberally, in accord with the needs Ofihe police and state. ’ ‘ . 1 . Wilkinson s servic | sive state was carr e to a repres ied to a new level n his attempt to discredi Coli t n Wallace, formerly of MI5 (Bri tish

sta

intelligence) and the Army Information Department. Wallace had

exposed the workings of an MI5-backed

“dirty tricks” campaign

designed to discredit Labour MPs by linking their names, prior to elections, with the Irish Republican Army, as well as an MI5 campaign

to smear Harold Wilson in 1976. Wallace also went on record in exposing abuses of psychological operations undertaken against the Irish by British intelligence.'°” In response to Wallace’s charges, Wilkinson passed along a letter of

dubious origin to ITN Television, which accused Wallace of all manner of wrongdoing. Wilkinson’s accompanying letter (on University of Aberdeen stationery and dated July 21, 1987) to a representative of ITN began, “Herewith the interesting letter I received from one

of our researchers on the Colin Wallace affair. . . . It certainly raises major question marks about the extent to which one can rely on his version of events in Northern Ireland and elsewhere.”’*® The letter in question, a rather crude piece of disinformation,

wrongfully accused Wallace of attempting to have the husband of a woman he was allegedly having an affair with killed by the Ulster Defense Association, and attributed his claims regarding Wilson and

MI5 to “James Bond fantasies.” Subsequently, in a letter to Wallace

himself dated June 9, 1988, Wilkinson apologized for having caused him any undue “discomfort or embarrassment.” A letter of retraction

was simultaneously sent to various news agencies calling the allegations against Wallace (which he had, in essence, provided as fact)

‘totally untrue.”!39

The Linkages and Opinions of the Establishment Experts ;

In this section

we

shall try to draw

some

aes

oie

bout the cana

positions taken by connections of and ona Stitutional 3® *Pe ert rts. In table 7-2 the instituti l connection gs a expo i s 2 :ese

/, 1 through s row in is bas ed at eg gr ag an ives can be , Shown on nd Ppperspective vee e ae :~— inMport4 ns opinio ics of their _

Portant characterist

183

___ — — — — ry st du In ’ sm “Terrori

ie

is aoe information a R e bl ta e th of | mn lu Co 9, seen on rows 8 and

asale hae Column 9 for the 12 experts discussed a es were une experts A : an 16 the for n io at rm fo ‘n supplies this Set of oe ). Eleven of the of choice in our media sample (WEE WES of im ate s, rt pe ex t an port le mp sa our 1n e sed abov 16 were

discus

set of 32 leading experts er rg la a for a dat r ila sim es giv mn third colu columns, cludes all of those in the first two

on terrorism, which in

7—1 and the text. It can be le tab in r lie ear d fie nti ide , ers oth 15 lus

nions between these seen that the differences in connections and opi three sets are small.

The table offers striking confirmation of our major hypotheses.

First, we can see on rows 1-3 how closely the experts are linked to governments. Over two-thirds have had some U.S. or British government affiliation in the recent past, and between a fifth and a

Table 7-2 manner

—_————

rere

reer

Linkages and Perspectives of the Terrorism Industry Experts* MEDIA

BIG 12

16

%

BIG 32

No.

%

NOM

vo

NO.

9

75.0

11

68.8

20

(3)

(2520)

(4)

(25)

(eee

(Z1e9)

2. British govt. link

Sie

2510

]

6.3

6

(18.8)

a. Army/police

(3)

(25.0)

()en(653)

(6)

(18.8)

3. Net govt. affiliated

10

83.3

WW

75

22

68.8

4. Institute/think tank

10

= 83.3

11

68.8

23

eDeS

(5)

(31.3)

(13)

(40.6)

(2)

(1t285)

(4)

(12.5)

CHARACTERISTIC 1. U.S. govt. link a. (GIA

a. Big Fourt

(8)

(66.7)

c. Israel-lobby

(2)

(16.7)

5. Risk analysis/security

i

58.3

8

50.0

6. Journalist

9

16.7

l

6.3

7. Academic

4

33.3

5

31.3

b. Moon related

(3)

(2)e((167)

(18.8)

(5)

62.5

(15.6)

related

8. Focuses on left and

insurgent terror

12

9. Fit in classif. by model type a. Estab. moderate

b. Estab. right ies

c. Dissident d. Nonet

:

46.9

13

40.6

5

15.6

96.9

10 °

me out

15

He

aie

10 ad 2

66.7 a ii

* For aa discdis¢ ussion of the thITEE $2 sof t Heritage, Hoover, AE], oA csie Of SSPEIHE: ape Brant, + No model evident in pub lished writings

184

100

29

62.5 ow 12:5

.

¢;

20 .

a

3.1 15.6

Exports

the

quarter aes had : act dee

perrorism commonly

cot la). Conferences on

: ie major speakers both the

private-

sector experts and government officials, who Operate collegially and on the same Paemises and are hard to tel] apart. William Casey, head

of the CIA during much of the Reagan cra, was the featured speaker at the 1985 conference on terrorism at the Fletcher School of Law and Diplomacy, addressing the subject “The International Linkages:

What Do We Knowe” Casey fitted in smoothly; the experts had no problems with accommodating the activist head of an activist intel-

ligence agency into the scholarly proceedings. These linkages between

governments

suggest the strong likelihood

and the terrorism experts

that the experts will adhere

to a

government party line; or, put another way, they point to a certain lack of independence on the part of these experts. This should raise questions about their suitability as sole sources for a supposedly independent—not to say adversarial—press. It is a striking fact that

the media not only do not seem to have qualms about this lack of independence, they do not appear to be aware that this is a problem. The assumptions and truths of the state are so taken for granted

that a symbiotic relation between state and “independent” press is not seen to contaminate the press function. This even extends to an unquestioning

(and often undisclosed)

use of CIA, ex-CIA,

and

other intelligence functionaries in the disinformation-propaganda line (Colby, Cline, Crozier, Henze, Moss, Tugwell, etc.), who are

treated as presumably objective news sources and analysts. Only in other countries does government

domination

of information

and

Opinion used by the press compromise press integrity. A second theme of this analysis of experts is that, in order to mobilize bias, the government and corporate elite have nurtured

those with the proper views by providing them with financial support 4nd institutes in which to work. It can be seen on row 4 of table

‘a that over two-thirds of the experts have been affiliated with stitutes and think tanks. As we described in chapter 5, many of e supported by “S€ Organizations have been funded and otherwis

oun wecorporate : s, ion rat rpo —co ons uti tit ins t men ish abl pn a inant est heirs of the corp y lth wea the and t, men ern gov the , s ns s conspicuously true . support relationship 1 ding and s—H s fun ThiFou ofa “o© gBig eritage, Hoover, CSIS, and AFI —with ute r instit ig I 185

Table 7-3 A Matrix of the Linkages of Thirty-two Terrorism Industry Experts INSTITUTES

COUNTRIES aa

AND

THINK

TANKS

SECURITY

a

S

ses

=

S

:

~

Ss

wo Sos yea cos SON : ROG dN Ss me

RD

eters,

Ss

SS

eS

NR

=

% S

Be pe oh ee Feo SE Sees OP SBS & See) as 2G : AH Ss Spe eee ea Ss egies es ree RS

2

5

SS

Ss

iN

Sees

Alexander Bell Chalfont Churba Cline Clutterbuck Colby Crenshaw Crozier

98I

de Borchgrave

Eagleburger Francis Gurr Henze

Jenkins Kirkpatrick Kupperman

Laqueur Ledeen

Livingstone Merari Mickolaus Moss Pipes Possony Ra-Anan

Sterling Tugwell Wilkinson Others* \ Based

on

research

contract.

2 Based

on

free distribution

= = of published

work.

SITAR * Walter.

2 Ajami.

and

= Bassiouni

have

no

current

(known)

ae Tos connections to entrie

om

e

~

FIRMS

Se

¢

s

leesSee

~~

SoS SS OF

=

OO &

inti which a very sizable fraction of the expert s have been associated We can see on row 4a that 66.7 percent of the Big Twelve sample of experts, and a somewhat smaller Pro portion of the total sample

(column 3) have been affiliated with this leading foursome. It can also be seen on rows 4b and 4c that there are significant connec tions between the mainstream terrorism experts and Moon-supported

institutes and those affiliated with the Israelj lobby. On row 5 of table 7-2 we can also see that about half or more of

the mainstream experts have been affiliated with private firms in the risk analysis and security business. This linkage tends to compromise

them as experts on terrorism, partly because they sell their services to businesses

and governments

who have restricted views on the

nature of terrorism. They also have a vested interest in “threat inflation,” as their business is contingent on an adequate volume of terrorism against which to protect their clients. Security business also ties the participants more closely to the government security establishment in exchange of information and a revolving door relationship. Five of the establishment experts are journalists, and a larger number are academics. These relationships often overlap with ties to government and the institutes (see table 7~3). Arnaud de Borch-

grave, Brian Crozier, Robert Moss, and Claire Sterling are classed as journalists, but the first three have had important links to governments and institutes; Sterling has been funded by the Reader’s

Digest, which has had long-standing CIA connections,!*° and her links to Western intelligence agencies and the various terrorism institutes and experts have been collegial and mutually supportive. Roughly one-third of the experts have had an academic connection (row 7), but a great majority of these experts have also had links to governments, the institutes, and risk analysis firms. This is evident

among the most prestigious experts, who are also most heavily cited by the media, such as Laqueur and Wilkinson. The relatively sizable contingent of academics in column 3 results from the fact that the

Sample of 32 includes those listed by Schmid as heavily cited by

other experts, who refer to some of the more esoteric and ee

literature by E. V. Walter, M. Cherif Bassiount, Ted Sa

Martha Crenshaw. The first two have had only academic connections, and they have rarely been cited in the media. 187

The

“Terrorism” Industry ——__

Table 7-3 provides a more detailed (but sull incomplete)

Picture

a variety of gover of the connections of our 32 experts with ee tutes, and security firms, and we

government agencies, insti Showianmthenlast column whether

or not the expert made an

of the | appearanc e as a witness in one of the terrorism hearings

1980s. The table shows clearly the density of the connections of the experts to establishment institutions and, by this route, to one another. We can see that Ray Cline is checked under 13 differen; columns, recording links to at least seven institutes and think tanks, among other connections. Looking at a particular column, we can see, for example, that 7 of the 32 experts have had demonstrable affiliations with the CIA, and that 11 have had a link to CSIS. Returning to table 7—2, we can see that only | of the 32 experts

departs from the Western model of terrorism, namely M. Cherif

Bassiouni.'*! Similarly, looking at where the experts fit into our classification of terrorism models—dissident, establishment moderate, and establishment right wing—all the experts for whom it 1s possible to make a judgment, except Bassiouni, adhere to the two establishment versions of the Western

model. We may note, also,

the right-wing domination of the expert pattern. Roughly two-thirds of the classifiable experts expound the extremist version of the establishment model, in which the Soviet Union directs or coordinates

world terrorism, national liberation movements are generally tabbed as terrorist organizations or agents of world communism, and hardline policies of national and international response are espoused. In fact, at least 10 of our 32 experts fall into the category of zealots, espousing ideas that we believe rational individuals would recognize

as foolish and unsupported by any evidence.!42 The bias of the Western experts is shown more directly and

dramatically in table 7-4, which summarizes the topics covered 10 the major books of three of our terrorism experts—Laqueu!, Slee

ling, and Wilkinson—plus the popular and oft-cited book The Lee rorists: Thew Weapons, Leaders, and Tactics, by Christopher Dobson a?

Robert Payne, published by Facts on File. We have tallied the coverage

by counting the references in the indexes of these books to 4 dor Western and right-wing terrorists hant or Operations, on the one ne

and a dozen non-Western or leftwing terrorists, on the of

i ghtcan be seen by the most cursory inspection that Western and 116 188

eae «The Experts eeee

——_——ee— wing terror is off the exper

ts’

Neither Saad Haddad, the



delle Chiaie, the world-class

age




|

.

Table 7-4 References by Terrorism Industry Experts to Western/Right-Wing and Non-Western/Left-Wing Terrorism* —_"

ii i

~

0

a

DOBSON-PAYNE

ee

LAQUEUR

WILKINSON

ee

STERLING

Western/Right-Wing Roberto d’Aubuisson Stefano delle Chiaie

——_ =

— es:

a or

Orlando Bosch—CORU Luis Posada Carriles

as =

a co

l pas

pat Prk

Botha—South Africa Operation Condor

== —

(2)+ as

(1)t es

a ea

Pinochet

=

pss.

ae

=

Videla

(2)t

=e

fe

om

Sharon-Begin-Yaron

(1)t

=

(2)t

Lads

Saad Haddad Contras-Reagan-North

— —

_

— (4)+

abs —

Tecos (Mexico)



=

=

a=

Totals

1 0

l

l

0

Arafat-Fatah-PLO

22

26

10

51

Carlos the Jackal

11

é

2

40

Abu Nidal

11

16

1

2

Marighela Baader-Meinhof

8 34

8 19

6 4

1] 36

Red Brigades

15

22

2

57

5

19

6

22

18

21

Non-Western/Left-Wing

Tupamaros

Castro-Cuba

Qaddafi-Libya Soviet Union

Weathermen Black Panthers

Totals ee

4



5 1

134

19

15

40

9

11

54

7

:

:

2

nN

13

175

ar by author. + oats On Citations from the indexes of the books listed below

*B

72

was

tps

; ; ‘ to cope with oF or as having terrorists.

Inc., 1982). (New or Lo, on File, ed. rev. Terrorists, fanny: The er, . * range and R. Payne, Brown, & Winston/Resdet Little, Wiese, ce ,Bek Rinehart (Boston: Holt, York: 6h Pads The Terrorism Sterling, of AE aqueur, The Age 7 Yor State, rev. ed. (New York: New Wilkinson, Terrorism and the Liberal (©

iP

189

:

ee

wre gh tex Boe renner 3s victims

as terrorists In of ter hile individuals or groups are listed in index, they are not treated r

ie

ee

fae Nervnism: ©(NGUSthy BOvernment

does not call

atrention FO its ¢ lient’s Savageries O1 call them terrorism—and neither does the private sector of the terrorism industry. The U.S. tras media also virtually ignore this approved terror. Neither the Tula

case nor the murder of Guevara Monge was ever mentioned by the New York Times, Washington Post, CBS

News, or to our knowledge

any other U.S. mass media source. In the first half of 1988, the New

York Times had three times as many news articles on alleged rebel violence as On the rampant and vastly more important state terrorism in El Salvador. This effective blacking out of client-state violence is

critically important to the continuation of state policy: the American

public might have mistaken the Tula and Guevara Monge beatings, rape, mutilation, and murder, and the thousands of similar events, as cases of terrorism,

not acts of counterterrorism

appropriately

funded by the American taxpayer. As we described in chapters 2 and 3, the Western model of terrorism focuses on nonstate actors, as many Western client states would have to be condemned if the traditional meaning was allowed to prevail. In fact, a major purpose of the intensified Reagan-era

emphasis on “terrorism” was to deflect attention from Argentina, Chile, El] Salvador, Guatemala, and South Africa and focus it on the

Red Brigades and PLO. We can see in table 8—3 that the U.S. mass

media followed the Reagan agenda closely, just as the experts did (table 7~4). In our

sample

of news

nonstate

reports,

terrorists

outnumbered state terrorists by 96 to 10. In the CBS News coverage of 1981, summarized in table 8—4, the ratio was 152 to 5, if we

exclude Libya, which was the premier “terrorist” of 1981, as CBS N ¢ws—along with the rest of the media—intently followed the career

of the mythical Libyan “hit squad” late in that year. In all but one case, the state terrorists identified by the e

media

in table g—3. In that single, Were non-Western states, as shown ames spokesmen who ap €Xceptional case, a hews article-ciies

*rael’s bombj Words

ng of an Iraqi reactor was an act of terrorism. .

le or broadcast In thi s artic le sing a NOL » | orn source iden ifti

sample ever cited : — rrorist

tifying a Western state . per and in murd mas F ™ . ern seceenaelauianks th; was a period that this of ~ mass ©. Notete that ‘ ;

Yate).

Mala, and of massive internal repression a

205

Terrorism Industry —

iia

haere 7 = by South Africa; these, however,

cac upP as not show aS Cases 6 f State

do

terrorism in the 135 sample articles and broadcasts. The CBS index Western cases 5 for 1981 shows 45 non-Western and three f State

or, the only instance jp terrorism, the latter includ ing El | Salvad Which 1S cit ed 4 Latin America terror state

as a State terrorist.

Table 8-3 State and Nonstate Terrorism and Terrorists and Their * Political Affiliations, as Portrayed in the U.S. Mass Media e

LL

EEEEEEEE—E—E——E

NIN

ee

State and Nonstate Actors as Terrorasts Nonstate State

96 10

Political Characteristics of State and Nonstate Terrorists State: 9 1+

Non-Western Western Nonstate:

Left-wing

60+

Right-wing

10

Unclear

28

States Identified as Sponsoring Terrorism Western: United States Non-Western: Libya Soviet Union

18 3] 30 95

Iran

Sa

Syria

16

Cuba North Korea South Yemen

UI

Iraq Nicaragua

ae Pe

10 5 9

SEE

eS

ge

9

reports (see note 7, p. 291). és, June 9, 1981, features Arab accusations t

19

34, two parahey of a news article in the Philadelphia Inquirer, April 1ie contras Z suse are reporters doesn’t constitute stat Pee Reagan press officer Speakes whether the U.S. support ©

§$In the last t

ROD:

© sponsorship of terrorism, which he vigorously denied.

206

——

Mass Media ee

ide

eee

We may also note the huge and biased imbalance in mass med}

identification of nonstate

terrorists

by political Orientation,

a a

closely paralleling the choices of the experts (table 7-4). In Pi g—3 the ratio of left-wing to right-wing nonstate terrorists is 60 to 10; on CBS News for 1981 (table 8-4) it is 71 to 11. The Cuban

terror network that emerged from U.S. sponsorship of the Bay of Pigs invasion, Operation Mongoose, and many years of terrorist attacks on Cuba** was almost surely the greatest perpetrator of nonstate (retail) terrorist violence in the Western Hemisphere in the

1960s and 1970s.** But it shows up only marginally in our media sample and not at all in the CBS News index of terrorism in 1981.

A long article in the New York Times of June 25, 1978, that purports

to be “a status report on important terrorist groups” in the United States, Latin America,

and elsewhere

never

mentions

Omega

7,

Alpha 66, or any other Cuban terrorist group, although it gives an entire paragraph to the Puerto Rican FALN. In this T7mes article, terrorism is only left-wing terrorism. Similarly, in Europe, the greatest death tolls from terrorist attacks in the 1980s were a product of right-wing terror in Bologna and elsewhere in Italy. These do not show up at all in our media sample, although it contains a number of accounts of terrorism in Europe. In the Western model, however, the West is being attacked by the Soviet Union

and its proxies,

pattern tends to be ignored.

so terror

that doesn’t fit into this

In the 1980s, the spate of highly

ineffective attacks on NATO military installations, and the murder of several targeted military-political establishment figures in 1984—

85, fit the Western model and received attention. An article in the Philadelphia Inquirer by Steve Twomey, “W. Europe Alarmed by Terrorists’ Alliance” (Feb. 2, 1985), follows this establishment formula without deviation. Twomey never mentions right-wing terror-

ism in Italy or elsewhere, although the train bombing by rightists in

of Italy on December 23, 1984, accounted for more deaths than all the establishment favorites for the years 1984-85. Nor does he acts of een hint at the possibility that some of the favored for the delectation oa might have been manufactured and staged

follow ¢ reporters like himself.2° Other articles in our sample womey pattern.?” rin;g g terrorsism also nso : o sp tes | on sta of tale s identificati The mass media’ 207

Table 8-4

ws in 1981* Terrorists as Seen By CBS-TV Ne ee NE as Terrorists State versus Nonstate Actors

48 (5) 152

State (State exclusive of Libya) Nonstate Political Classification of Terrorists State:

43

Libya

9

Soviet Union Western states and clients

3+

Nonstate:

7]

Left-wing

11

Right-wing

704

Unclear

Names of States or Groups

Engaged in or Sponsoring Terrorism

Western or right-wing: El] Salvador government

1+

U.S. government

ly

Israel

1+

Jewish Defense League

1

Agca and Gray Wolves



Non-Western or left-wing: Libya

43

Red Brigades

18

IRA PLO

15 13

Weathermen

12

E] Salvadoran rebels

6

Soviet Union

Black guerrillas of South Africa Guatemalan rebels

Pro-Syrian group Armenian Puerto Rican rebels er rr oth

ere

GIy.)

hk

Cf No DO NO —

* Based on an analysis of the titles of all the 1981 entries in the CBS index under the heading “Terrorism.”

+ The accusation against the Salvadoran government was made by the archbishop of El Salyer

the claim that the United States is engaged in terrorism was made by Khomeini; the allegation ¢

Israel was a terrorist state cited in the CBS News index was by an Arab. though + The large number that were unclear was based in part on the ambigui ty of in dex titles, alno '€ ta very substant

, ijack get ial number were of hija d to have i gs an ckin right political identification, that seem s : OE ae litical § In 1981, before Sterling ia and the KGB, his; po! ar lg Bu ca to d a n Ag di tie er me st We d the an affiliations were identified as

right-wing,

208

== ile: Mass) M eija ee

=e

follows closely the Western propaganda line: the simple count | table 8-3 is 132 to 1 in favor of non-Western Sponsorship. For CBS

in 1981, the ratio is 45 to 3 (table 8—4). Although the United States

organized a system of national security states, and funded and

trained numerous other right-wing movements such as those that overthrew governments in Indonesia and the Philippines, with the clear intention of creating an anticommunist political force that

would serve U.S. interests, only one item in our larger sample hints at the possibility that the United

States might be a sponsor of

terrorism.”® This is exactly the way a censored press works; its own

government does not do things that fit a nasty phrase like “sponsoring terrorism,” even if their own definitions fit the facts of the case to

perfection. The point is unthinkable and the censored press excludes it. So does the free press. Also excluded as sponsors are our allies, as well as their terrorist

offshoots. South Africa does not once appear as a terrorist state in the 135-item sample or in the CBS News index for 1981, nor do South Africa’s proxies, Savimbi, UNITA, or RENAMO, appear on

the list of cited terrorist groups (table 8-5). The ANC and SWAPO are cited twice as terrorists, however, and the CBS index for 1981 lists two articles in which “black guerrillas of South Africa” are noted as involved in terrorist incidents. One news item in the CBS index

is entitled “Elimination of Terrorism [is] South African Concern,”

in which CBS News allows the apartheid government to spell out its views on “terrorism,” which it opposes. Similarly, Guatemala never shows up as terrorist state in either of our samples, although the

CBS index for 1981 lists a Guatemalan rebel incident as fitting their notion

of terrorism.

Israel’s

cross-border

attacks are only once

identified as terroristic (as we have noted, by Arab sources), and their terroristic surrogate in Lebanon, Haddad, is never cited as a terrorist.

The individual terrorists of choice in th e

ien U.S. mass media, show

©n table 8—5, are once again closely geared to the Western Pie

and propaganda line, paralleling the selectivity of the eae ee, Carlos t ae ie). Predictably they are Arafat, Abu Nidal, and

equal to us aa Right-wing terrorists with records of murder than Carlos and Abu N idal, like Stefano delle Chiate, ela ee,

4nd Luis Posada, fail to gain significant mass media attention. 209

alenorsm —Industry ———__

aie

g of a Cuban airliner and Posada were both involved in the bombin

Posada was revealed in 1976 in which seventy-three persons died. network workj, ply sup ra cont the in ant icip part in 1986 to be a

dor. Hic for the North-Reagan team at Jlopango airbase in El Salva ae

interest or excite the identification as a U.S. agent failed to media, which, following their leaders, get terribly agitated if Italy or

Imagine France fails to deal properly with an Arab terrorist.

the

media reaction if one of these countries, or better yet Bulgaria or

Table 8-5 The Political Affiliations of Individuals and Groups Identified as Terrorist in the U.S. Mass Media*

Western or Right-Wing Alpha 66

]

Omega 7

1

Aryan Nations

l

Nicaraguan contras

157

Non-Western or Left-Wing Arafat-PLO Abu Nidal

31 13

Red Brigades

13

Shiite-Lebanese

12

IRA

10

Japanese Red Army Carlos the Jackal

9 7

Agca

ot

Red Army faction

5

Baader-Meinhof gang Direct Action

5 7

ANC SWAPO

2 2

Other Armenian FALN (Puerto Rico)

2 2

Ro tai ha 6 else ale acetate * Derived from sampl

t See note § in eae 198 news reports (see note 7, p. 291). the man tri : as +a Agca, probable agentwhoae to assassinate Pope John Paul II in 1981, was regarded by the U.S.'S. P press x

sample.

F

.

"6 Bulgarians and KGB during most of the period covered in this

210

news

ee

The Mass Media

i

the Soviet Union, was found actually emp loying Carlos the Jackal in

wk one of its own terrorist ventures! An article in tne ape York Tomes on December 10, 1986, on page Be

91, was entitled

“Accused Terrorist Helping to Supply the Cont

This is a “soft” ute. Posada is only an “accused” terrorist, erie

he had been kept in Jail for ten years after being accused of oe

Cuban plane bombing in a country (Venezuela) closely aligned with the United States and ruled by an anticommunist elite. The article does not feature the fact that Posada is a wanted man in Venezuela, yet secretly working for the United States as a member of a hired surrogate team operating out of a client-state air base. It is “balanced,” mentioning briefly the seventy-three civilians killed in the airline bombing, but stressing Posada’s dedicated anticommunism, long fight against Castro, and devotion to his family. There was no Times editorial reflecting on U.S. protection and employment of an international terrorist, nor was there any follow-up, despite Posada’s connections with then Vice-President George Bush. The Washington Post gave the Posada story similar low-key treatment.” Stefano delle Chiaie, Italy’s premier terrorist, involved in the Bologna and other bombings, had moved around Latin America for some years, working for the Argentine junta, Pinochet, and Luis Garcia Meza during the period of the Argentine-military—drug-cartel takeover of Bolivia in 1980. His activities in support of state terrorism in Latin America, and even his apprehension in Venezuela in March 1987 and return to Italy, were of slight interest to the U.S. media.

The New York Times ran a four-inch Reuters report on the capture

of delle Chiaie, under the headline “Italian Extremist Held by Venezuelan Police.” The heading and lead paragraph portrayed

delle Chiaie as an “extremist,” not a “terrorist.” The story, although report, was also the subject of a March 30, 1987 Associated Press news. not picked up by the Washington Post or TV network

Concluding Note ment and ely on the governication of their identif The U.S. mass media rely almost eee Private sector of the terrorism industry for 7

The

Terrorism Industry ——————____

terrorists, model of terrorism, facts, and proposed Solutions. The

industry naturally excludes the terrorism of the West and its clients from the terrorism agenda, and in fact, makes primary terrorists like the governments of South Africa and El Salvador victims of terrorism engaging In counterterrorism. The press follows Closely in

the terrorism industry’s wake. Thus Abu Nidal, loosely affiliated with Libya and Syria, merits great attention as a terrorist; the leaders of

RENAMO, whose killings of unarmed civilians exceed those of Aby Nidal by a factor of many hundred but who are surrogates of g Western client and ally, South Africa, are rarely placed on official and expert lists of terrorists and are given slight attention and inspire

little indignation in the mass media. Even after the State Department

itself issued a report documenting RENAMO Killings on a staggering scale, mass media attention was fleeting and their indignation was restrained (in contrast with their reaction to the killing fields of distant Cambodia). Even traditional terrorists like Orlando Bosch and Luis Posada Carriles, who blow up civilian airliners and engage

in multiple assassinations, do not attract substantial media attention. As long as they only attack the citizens, facilities, and friends of enemy states, the terrorism industry and media display little interest in their activities. We have shown that this pattern is pervasive. We

have also made it clear that these choices have nothing to do with

the substance of terrorism—in fact, they commonly involve emphasis on a lesser terrorism and simultaneous aversion of the eyes from wholesale terror. The choices are simply tailored to the political and

propaganda needs of the West.

212

Conclusions

“Terrorists” as the West’s Enemies

n his book 1984, George Orwell described a political system in

which words could be used at state discretion to meet the needs of state policy. War could be made peace, victims could be made into evil aggressors, by definition and by the institutionalization of the preferred state usage. The West's use of “terrorist” and “terrorism”

over the past decade is a model illustration of the pattern described carried out by by Orwell in a hypothetical totalitarian state, but and the mass Western states in collaboration with private institutions

media in a process of voluntary structuring of bias. of the Wester alliance Because the leaders and establishments terrorism useful, of t por sup iet Sov and ism ror ter of eat thr the found 4 threat from ut abo ity lic pub for nd ma there was an effective de iet support of

for evidence of Sov Properly identified terrorists, and licit at the Something called terrorism. This demand was quite exp

Jonathan

Institute

conference

aig of 1979 and in the Reagan-H

and the PLO ya, Lib n, io Un iet Sov e Th Pronouncements of 1981. 213

nee “ ly St CU IN = a n r o T

eas wave

offictally

jammed

‘as’ the

major

villains,

and

state-sponsored

undertaken oe ee the West, 4 were propaganda campaigns of gov ernment-related institutes and experts terrorism industry

with books such as Th, responded with alacrity, flooding the market The Communist Conn Ae ection, Terrorisy, Soviet Strategy ofTerror, Terror ism: A Soviet Export, The Terror Network, and others. Ihe mass media of the West followed

seen

from

with a similarly intense

the Western

state/terrorism

focus on terrorism, as

industry collective’s perwa

spective.

This perspective makes the West solely a victim of terror, its own

victims and those of its client states, terrorists or supporters of

terrorism. This feat is accomplished by the state and its representa-

tives fixing the agenda, the institutional apparatus of the terrorism industry mobilizing its “experts” to propound the agreed-on line,

and the mass media transmitting the line via government officials and accredited experts, in a closed system. Spokespersons for the victims—for example, South African blacks or Mozambiquan civilians under assault by South Africa’s proxy RENAMO, members of the numerous country groups of Relatives of the Disappeared in Latin America, or Nicaraguan, Salvadoran, or Guatemalan peasants—are not admitted to the discussion of the nature and sources of terrorism.

In this closed system, with only the Western establishment view allowed, an Orwellian process follows. In its traditional usage, terrorism meant violence or the threat of violence employed by governments

or opponents

of government

to intimidate.

Because

Western governments or their clients so often intimidate, the Western establishment has defined terrorism so as to exclude governments,

which allows it to attend closely to the Baader-Meinhof gang and

Red Brigades and to play down the more severely intimidating actions of governments like those of Indonesia, Turkey, El Salvador, and Guatemala, Using this device, South Africa and Guatemala are exempted from the designation “terrorist,” despite long-term and

aio

ars intimidation by violence of vast numbers in their respective

countries; In the classic language of Alexander

said to be merely violating

Haig, they may be g in “terror

“human rights,” not engagin ism.” We would submit that this is a semantic device that fits an Orwellian model,

nion Because the West has ne U Soviet the like states eded terrorist 214

and Libya as centerpieces of the propaganda project, the Western

rerrorism industry has worked out a new concept—state-sponsored

‘nternational

terrorism—designed

to Capture

Soviet

and

Libyan

support for rebels who are terrorists, by making these backers

“sponsors: of terrorism across borders and thus of “international terrorism.” One problem with the new concept, however, is that

while the Soviet Union and Libya do aid rebels abroad, so do South Africa, Israel, and the United States. South Africa has engaged in a

large-scale program of aid and support to UNITA in Angola and RENAMO in Mozambique, and it has engaged in numerous other open and covert cross-border operations using its own armed forces and mercenaries. Israel has maintained a proxy army in South Lebanon under Saad Haddad and his successors for some years, and the United States has organized and supports a proxy army attacking Nicaragua and “freedom fighters” in many other countries. Even more important, the United States has for many years aided

and trained foreign police, intelligence agencies, and armies that

have terrorized civilian populations and engaged in cross-border Operations.! How has the West coped with this problem? Here we move into another phase of Orwellian processes. The Western governments,

terrorism industry experts, and mass media simply refuse to call their own state-sponsored international terror by its right name; they focus exclusively and indignantly on the approved terrorists. The politicization of this attention-selection process can attain comic

dimensions. In the Reagan years, the president, Secretary of State Shultz, and the experts would simply list the premier enemy states taken from the approved set—the Soviet Union, Libya, Vietnam, Iran, Syria, North Korea, and Nicaragua—but never

of the moment,

South Africa, Turkey, Israel, Taiwan, Argentina, or Guatemala. The

Crudity with which enemy states were chosen and self and allies €xcluded was quite remarkable, given the facts and the West's own

definitions, In one episode, Reagan excluded the Soviet Union and off ng, Syria, the former because a summit meeting was in the

the

iations latter because it had performed a useful role in hostage negot

from being a terrorist state: ane therefore was momentarily excused

he inclusion of Nicaragua, a country being steadily panic” a

was not derided “stern state-sponsored international terrorism, 215

by

ihe

leronism: Industry ————__

t the experts and mag tha n ow sh e hav We s. ert exp and ss U.S. pre media followed this Orwellian system of definitions without substan.

tial deviation (chapters 7 and 8). The well-known British expert Pay]

Wilkinson, for example, simply refuses to apply his own definitions

of terrorist and sponsor of terrorism to the contras and the United States, and refers to Qaddafi's aid to Nicaragua with some indignation

as a further demonstration of Qaddafi’s misbehavior,® rather than as an instance of his helping a victim resist terrorism. For Wilkinson, there is no such thing as Western-based terrorism, by patriotic

assumption. The suppression of evidence of Western-based state terror was

paralleled by gullible and frenetic coverage of the approved terror. Just as the experts and media could never see much connection between Israel and the Christian Phalange introduced into Sabra-

Shatila by the Israeli armed forces, so also they didn’t require much evidence of Libya’s connection with Abu Nidal and bombing attacks in Western Europe or the Turkish fascist Agca and the important, the alleged Soviet and intensively publicized

Bulgarian-KGB connection with the shooting of the pope in 1981. Equally connection to terrorism was developed through analysts—Sterling, Franas,

Henze, de Borchgrave, Ledeen, Possony, Alexander, Cline, Crozier,

Moss—who were knowing or gullible instruments of contaminated intelligence sources of disinformation.* The laundered materials provided by these terrorologists, as well as those of the government itself, were swallowed by the mass media with little question. Big Brother couldn’t ask for more. The politicization of choice of terrorists within the West has been

equally great. The basic rule has been: if connected with leftists violence may be designated “terrorist”; if not, the word is not applied. The Brinks robbery of October 20, 1981, for example, carried out by members of the Weather

Underground,

received

spectacular

publicity, was quickly labeled a terrorist incident, and aroused the

and press to a frenzy of concern about a prospective surge : FBI left-wing terrorism. By contrast, a small controversy was create i

i fheI

mince nh ae

on attacks on abortion clinics in the peter

inc; these count 85,cbste or tonenmi st Wi medrt incide iey as terroriorist nts. FBI I direct airech\” or |willia which:® these attacks weren’t “true terroris™ 216

accor"

: g: tO Webster, involves acts of violence ag alnst a Zovernment tickly pointed out that the FBI’s own de It was q\ en te ; a boas finition of terrorism i .

'

lin

Aae

7

7

‘cluded intimidation of “the civilian population or any segment thereof, in furtherance of political or social goals.” The FBI then

explained the contradiction on the ground that in dealing with a complex issue like terrorism there is always “a matter of judgment.”

This blatant refusal to adhere to its own definition was not a matter of “judgment,” it reflected long-standing political bias.’ During the Reagan years there was an efflorescence of violence by right-wing organizations, including the KKK, neo-Nazi groups,

organized anti-Semites,

the Cuban

exile terrorist network,

and

mercenary armies.® Although better armed, with greater numbers, and engaged in more clearly intimidating acts than the Brinks robbery group,° they received modest attention from the press and

FBI and were rarely designated terrorists. Beau Grosscup points out

that in 1980,

six blacks were killed by snipers in Buffalo, New York: Vernon

Jordan, president of the Urban League, was wounded by sniper fire; a nineteen-year-old black youth was found hung from a tree in Mobile, Alabama;

two black joggers were shot to death in Salt

Lake City; and in New York City two black men and one hispanic

male were knifed to death. Senseless shootings of blacks by police

in New York, Indianapolis, Miami, and elsewhere led black leaders

to charge in the early 1980s that there was a national racist conspiracy engineered by whites against the black population. This surge of violence coincided with the re-emergence of the Ku Klux Klan and neo-Nazi movements. Much of the violence was directed

at anti-Klan rallies and demonstrations. In 1979 five anu-Klan demonstrators were killed in Greensboro,

North Carolina, after

the police released information to Klansmen about the demon-

Stration’s parade route, then were conveniently absent while the

homes of shooting took place. Nazi and Klan members fired into mented NAACP leaders in Sylacauga, Alabama, killed undocu workers in Texas and Arizona, beat people with chains in Tupelo,

Mississippi, shot five women

in Chattanooga, Tennessee, and a

youth in Wrightsville, Georgia.'®

e

to thes ; Grosscup notes that federal officials pai d little attention at least e acts and charges until 1985, although they were fully awar number 1n a camps training neo-Nazi and Klan of 45 carly as 1980 217

ie

____ — — — — — ry st du In ” sm ri ro “Ter

ng violence Of the ti da mi ti in e th t tha t ou ts in of states. He also po

ased to be of interest to the anti-Castro Omega 7 terrorist group ce Florida

aining camps in government in che 1930s. Their terrorist tr ings and threats mb bo r ei th d, re no ig re e we er wh se el d , an ia Californ al attention, and the in rg ma n ve gi re we rk Yo w Ne d “1 Miami an convicteg

o worked for the wh , an bi Fa or ct He ist ror ter d se es nf co e 1981 that rorist Orlando Bosch, bragged in lat Cuban-exile ter

e FBI bothered me.”" Fabian “December 5, 1980, was the last time th

fighters.” and Bosch had become “freedom

Counterinsurgency and ‘‘Low-Intensity Warfare”: Western Terrorism as “Counterterrorism”

Because of the power of the West, Western interests, and the Western

media, the terrorism industry has been able to subtly transform

rebellion and national liberation movements into terrorism and terrorists and the West’s (and Western client states’) attempts to

contain and repress these struggles into “counterterrorism.” This 1s perhaps the most significant of all the Orwellisms that characterize

Western usage.

As we described in chapter 2, in the broad sweep of modern

history the movement of the peoples of former Western colonies toward independence and the dismantling of oligarchic traditional structures has been of fundamental importance. The West had a large stake in the old order and has struggled to preserve it through

regimes like those of Suharto in Indonesia, Marcos in the Philippines, and the army-dominated national security states of Latin America.

The African pattern is similar, with the West long supporung apartheid in Rhodesia, Portuguese colonial rule, then Savimbi, and the South African apartheid state. In our view, Indonesian, Guate-

alan andSouth.Aan sate vero are example of pmeveat aes

Hess and scale of intimidation and desig st

ange, maintain elite rule, and keep 1? : majorities struggling for independence and basic human needs aD political rights.

If, in the face of these central facts, the West has bee? able t 218

Cvitsinnsiee

$$

iebel the world’s rebels in Indo ch oneces sia,as the Phialippi oe Rath Aigica, Central America, andina, otherIndpla teet the West and is proxies as engaging in “counterterr or,” thats

ropaganda achievement of historic dimensions. It is also the cide Orwellian transformation: the victims are made the ees whereas the terrorists are the alleged victims driven toa counterterror response. This Orwellian inversion is given a patina of truthfulness and

plausibility in the West by the virtually exclusive focus on selected retail terror, much of it cruel and irrational. It is possible in this way to designate the murderous governments of El Salvador, Guatemala,

and South Africa victims of terrorists. All it requires is: dramatic attention to the preferred victims; the appropriate redefinitions; stress on aid from

the Soviet bloc to the rebels; the muting of

evidence of state oppression and the absence of political options for the disfavored victims; and aversion of the eyes from the terror

inflicted on those in rebellion. The terrorism industry experts and mass media do this well (see tables 7-4, 8-3, 8-4, 8-5, and the

associated text). Equally important, the Western definitions, model, and focus of

attention make it possible to engage in the most brutal forms of preventive counterinsurgency and “low-intensity warfare” under the guise of “counterterrorism.” In the 1960s and 1970s, Latin American

religious leaders produced a number of searching documents point-

ing out that under the Western-sponsored military regimes in Brazil, Argentina, Guatemala, and elsewhere economic policies of unprecedented ruthlessness were installed, which created “a revolution that

did not previously exist.”!2 People defending themselves against

these economic policies were then slaughtered by U.S.-sponsored

and U.S.-trained military regimes under counterinsurgency opera

tions. The doctrine of counterinsurgency made any threatening movements from below subversive and thus suitable subjects for in Guatemala, repression. After the reformist Arbenz government

and those in the Dominican Republic, Brazil, and Indonesia, as:

tay ital or US-suppored in rg etl

Hh Lo se gags ibaa

ee

‘ons were liquidated or decimated

°rganize in Guatemala

since

b

by

hema Attempts to

iy

1954 have been regularly 4

219

attacked,

pe Girone:

eee

INUUSETY

| : counter sive under subver as d crushe ally ic od ri pe d an , ed threaten en in Indonesia, E] Salvace be e v ha ey th as , ns io at er op

insurgency

and South Africa. In the Western

|

|

,

b)

fata model of terrorism, 1 the analyses of the

Uniteg terrorism industry experts, and for the mass media of then world, 1S counterterror. Ina non-Orwellia States, counterinsurgency

however, counterterrorism is the violence of the primary terrorists,

The Larger Service of ‘’Terrorism” Terrorism has served other purposes in the West beyond mobilizing populations in support of counterinsurgency operations in the provinces. It can create a generalized fearfulness and irrationality that give leaders greater freedom of action. The Reagan administration needed a terrorism threat tied to a foreign enemy to justify

its enormous

arms buildup of the early 1980s (and to distract

attention from its regressive economic and social policies). Thorstein Veblen pointed out in 1904 that militarization to combat a foreign

enemy is the natural and best hope of the American elite as “a corrective for ‘social unrest’ and similar disorders of civilized life” and as the route to “popular submission and squalor.”'* Opponents

of militarization and harsh measures against dissident minorities are paralyzed by terrorism propaganda, as it is very difficult to do something that demagogues can interpret as “helping terrorists.”

The allegation of “supporting terrorists” may also be used as a political tool for discrediting dissident political figures. A picture of

Jesse Jackson with Arafat was part of the establishment—mass media

attack on a leader whose program was unacceptable to the dominant

class. In Portugal, the dissident political leader Otelo Saraiva de Carvalho was arrested, tried, and given a fifteen-year prison term

for allegedly serving as the leader of a “terrorist organization,” the

tld byheplsandwy “epee arene na

ui P ~25, The evidence for this association was the testimony of a drug Piha oc i sess UE ecision, no serious effort was made @ panization to FP—25 or any acts undertaken by, ioe

220

Conclusions ——__

$$ org

nization; 7 instead

yment” envirol .

members

may

that

he was

may

have been

guilty of helping create ¢

encourged havepais

a “moral

FP—25 tsomieret

activists in Otelo’s organization

ance

(although

aot identifying themselves as such).'’ In short, Otelo was sentenced under a ruling that could fit anybody who expresses an Opinion that

might have influenced a terrorist act, and who is therefore guilty of “errorist association.” In other countries of Western Europe, fear of terrorists has been

stirred up by right-wing interests as a control mechanism and to achieve various political objectives. The Langemann

papers noted

that the Crozier-Pinay group methodology for moving Europe (and eventually the rest of the world) to the right was to press themes “such as communist, extremist subversion of government positions and trade unions, KGB manipulation of terrorism and damage to

internal security.”!* By stirring up fear and developing a crisis mentality, the creation of a terrorist threat justifies a larger role for the police and army and for surveillance and crackdowns on opposition groups and organizations. It helps move societies toward a national security state and strengthens links between the great powers and their besieged right-wing clients such as South Africa, Guatemala,

and Turkey. The Crozier-Pinay group principles had been applied previously

in West Germany in the early 1970s, when Helmut Schmidt’s Social Democrats and conservatives together used “terrorism” as the basis

for an explicit attack on the “excesses of democracy.” Antiterrorism laws were passed that reduced individual rights and expanded the

Scope and functions of the police and army. The police infiltrated dissident organizations on a large scale. The state even carried out

legal proceedings against lawyers A loyalty and clearance system People were investigated between rejected as disloyal or hostile to

who defended “terrorists” in court. was imposed in which 1.5 million 1972 and 1977, and 4,000 or more the state. Only a handful of those

rejected were of the extreme right, although extreme-right ad i

Hourished, This was a system of intimidation in the name of opposing

oe, but actually using an inflated terrorism threat as an excuse _ *ccomplishing larger and antidemocratic ends. As Grosscup Points out, “Under pressure to prove their loyalty to the state in

Para

a

aiiien lenonsm:, naustry ase

ni s order to get or keep a position 1 civil service, thousand of Citizens lves from the politic al, Cultura] sought refuge by dissociating themse eee and social reforms of the late 1960s.”"!”

:

)

The creation and manipulation of a terrorist threat in West ern

Europe has been aided by the presence and growth Of migrant worker populations and the large flow of immigrants fleeing from of political oppression and seeking economic betterment. Because

widespread

unemployment

in Western

Europe

in recent years,

chauvinist outcries against immigrants have been relatively effective. It has been easy to pin the label of terrorism on political refugees,

notably on the Kurds in Sweden and West Germany. The Kurds in Turkey and Iraq have been under savage attack by military regimes, with thousands killed and tortured and imprisoned under barbaric

conditions, in a system that is labeled “counterterrorism” in Turkey, but as in Argentina in 1976—83, with the state terrorism far worse than that of the “terrorists.”*° For several years after the military coup of 1980, Western European governments (but not the United States) distanced themselves from the Turkish military dictatorship.

But European attitudes and policies changed, partly as a result of the installation of a nominal civilian regime in 1983 and reduction in state terror (outside of the Kurdish area); partly a result of the conservative drift of European politics; and partly because of new business relationships with Turkey that a number of formerly critical states wished to pursue.

From 1984 Turkey was no longer an outcast, let alone a terrorist state, and enemies of Turkey declared by the Turkish authorities to be “terrorists” became terrorists in Sweden and West Germany. The pattern is familiar. Once again the victims of Western state terror, here seeking refuge in the democracies, were suspect because the

Western terrorist state said so and found a hospitable response in

the police and security establishments and powerful right-wing circles

of the Western press.2! With the murder of Olaf Palme in Sweden

in February 1986, the police quickly arrested Kurdish dissidents, nol

on the basis of evidence, but simply because of stoked-up prejudice

and ideological bias.22 West Germany has prepared for a major tri oftwenty-three Kurdish “terrorists” alleged to have participated in

a terrorist organization within the PKK” (Kurdish Workers Party) The charges are vague and some of

the key witnesses are said by

222

the defense to be linked to the Turkish secret police.23 This ceeding followed years of press denu nciations of the PKK oe

sympathizers as terrorists, based on extremely modest protest ei ‘ties and

a number of killings among Turks whos e sources are unclear.” (West Germany has never tried any Gray Wolv es, a pene terrorist movement, which has operated in West Germany for year s has terrorized Turkish immigrant workers, and provided a base ee

Mehmet Ali Agca’s attack on the pope in 1981.)

Counterterrorism as Bringing Counterinsurgency Home

Terrorism has been used to advance right-wing agendas, justifying “exceptional” legislation, encroachments on individual rights, increased internal surveillance, an enlarged role of military forces in civil disputes, and greater pressure on the media to cooperate in dealing with terrorists. As Jenny Hocking points out with reference to Great Britain:

the ultimate impact of “terrorism” has been to provide a ready legitimation for an increasingly severe domestic exercise of state power—the tightening of political and social controls, particularly

through the legislative delimiting of acceptable political behavior.

... The military-based strategy for countering domestic unrest abroad is being brought home, via Northern Ireland, to quell the

unemployed, the never employed, the socially deprived, and the

politically active... . What has been presented as a political solution to the “problem of terrorism” has been transformed in practice

into a military solution to the intractable economic and social

problems of Western capitalist nations.”° We indicated earlier that important analysts and propagandists Moss, among Western terrorism experts, like Brian Crozier, Robert

Richard Clutterbuck, Samuel Francis, and Maurice Tugwell, have Shown a strong proclivity to identify any labor disputes, eal influence iw and upheavals from below as probable signs of Soviet

“PPropriately a matter

for police and army interest a

thers, like Brian Jenkins and Paul Wilkinson, along with 223

Glu

m orroriom: =INCUStty n

eee

sen

deeply

buck and Tugwell, have been deeply 1m

involved in counterins ,

Se

ae €ncy

. sis of low elys siclana tson’s nclas ap operations. We pointed out that Ki to ibera e emocracy, intensity warfare identifies the threat

which

as protest that calls for a military response, as any kind of action ing it doesn't oe Paul presses the establishment to do someth viding ‘certain Wilkinson also sees counterinsurgency warfare as pro

basic ground rules which should be followed by liberal democracies

taking a tough line against terrorism.””’ The transformation of these

counterinsurgency experts into terrorism experts 1s plausible if, as we believe, and as Jenny Hocking suggests, “terrorism” and “counterterrorism” are designed to serve a larger purpose for the Western establishment.

They have been bringing counterinsurgency

home

from the provinces under the guise of counterterrorism.

Manufacturing Terrorism There are several different forms of manufactured terrorism. One

is the inflation of the menace on the basis of modest and not very threatening but conceivably real actions (as with the Weather Underground and the West German Kurds). Another is the false transfer of the responsibility for a terrorist act to a convenient villain, as in the case of Agca’s shooting of the pope.*® This involves a new

level of dishonesty because the witnesses must be persuaded by state officials to fabricate evidence, and the Western

terrorism industry

and press must swallow and disseminate these false claims. In the

Otelo case, also, there is strong evidence that state agents eventually

served as witnesses in a process designed to tie a political opponent to a terrorist organization.

peacoat tence er

well, may not only io li : etal cae ae Eo et Saale ‘a Si picate terrorists from within terrorist Ores aia

ys May urge

them

to commit

terrorist

acts to justify

prosecution, They themselves may carry out terrorist acts—attributed to

others—for propaganda y ae : Purposes. We believe that these ac tions are of great and underestimated ; pe It for

agents of intelligence or | fee

is not difficu’ ki 84nizauionsimportance. to set off a It bomb or even tO 224

Conclusions

——

individuals, or to encourage or hire others to do these things; then to make a phone call claiming responsibility on behalf of a Red network or Palestinian organization. This is an easy way of creating

a desired moral environment, and there is substantial evidence that states have frequently engaged in such practices. The Israeli govern-

ment carried out a number of terrorist bombings of U.S. facilities in Cairo in 1955-56, Egyptians and damage

hoping that these would relations between

States.2° Philip Agee described

be attributed to

Egypt and the United

frequent CIA-sponsored

acts of

violence in Latin America, arranged so that blame would fall on

Cuba.*° The intelligence agencies of Italy in the 1960s and 1970s participated in a “strategy of tension” in which violent acts were carried out by the organized right and then blamed on the left.*! These acts were of major importance in the total spectrum of terrorism in Italy. And in the United States, the FBI has long engaged in agent provocateur actions, urging violence on penetrated dissident organizations and carrying out direct acts of violence, then

attributed to the individuals and organizations under attack.°* Terrorism is also manufactured in the private sector to incriminate union leaders, activists, and political enemies, sometimes in collusion with agents of the state. In March 1980, a former CIA agent and Wackenhut employee, William L. Richardson, working for the

Canadian security firm Centurion Investigations, Ltd., testified in court that he had made a bomb intended to be placed in the car of a UAW union official during a strike at Douglas Aircraft of Canada, Ltd., and that he and his associates had several times previously used this tactic to cause the arrest of workers.** In the recent case of the arrest of an animal rights activist, Fran Trutt, in Norwalk, Connecticut, on November 11, 1988, her organization had been

protesting for several years against the operations of U.S. Surgical

Corporation (which kills between 9,000 and 10,000 dogs a year in

laboratories and during “sales sessions” for surgeons)** and its owner,

Leon Hirsh. Hirsh hired the security firm Perceptions International,

whose agents infiltrated the animal rights group. Members claim that the infiltrators pressed vigorously for violent action, gave Trutt ty to buy a bomb, and accompanied her to USCC, where the ©mb was placed beside the firm’s building. All of these details had

“€n rehearsed with the police, who then arrested Trutt.*° (The 225

ahpe mororsm

ee

Inuustry mee

U.S. Surgical Corporation and Perceptions Internationa] deny th aims. cn of terrorist bombings in Western Euro Se pe during the

early and mid-1980s had the earmarks of being, at least jn part manufactured terrorism. The bombings were all too convenient fe

Western propaganda needs; many of them, especially those directeg against NATO installations, were symbolic and ineffectual. If we as, who benefited from this terrorism, the answer is clear. It may be that some of the members of the groups allegedly engaging in these acts thought differently and truly believed that their actions would

be useful in curbing the Western war machine, but there are other

possibilities. One is that they were penetrated by Western intelligence agencies and led by them into these actions. Another is that the acts were even more directly those of state agents. The outbreak of terrorism in Belgium in the early 1980s is instructive. Between 1982 and 1985 a group called the Killers of Brabant murdered twenty-eight people in a series of supermarket robberies that yielded meager returns but great publicity on the “terrorist threat.” Nobody has yet been convicted of these crimes, but journalists’ investigations and court inquiries have uncovered evidence that tie these acts to state officials in a variety of ways. Among the interesting facts was the discovery of one of the murder weapons in the possession of a private detective and former member of the gendarmes, Madani Bouhouche, who claimed to work for State security. Bouhouche was also associated with the neo-Nazi

paramilitary group Westland New Post (WNP). At least two acknowl edged members

of the state security apparatus helped train WNP

activists. The day after Bouhouche was arrested, his friend Jea”

Bultot, another right-wing militant and founder of the Practical Shooting Club, also deputy director of Saint-Gilles prison, fled to

Paraguay. A witness claimed to have seen Bultot near a supermarkel shortly before one of the attacks. Once in Paraguay, Bultot told Belgian Journalist René Haquin that the killings were a state security

destabilization operation with state participation “at every level.” 4

aah

(including eanite

ae a

former gendarme turned a

se

to have a fle ® ic police found om theagents), sth ;State security and addresses of gatas Tt

mns*stolen Sromnnihie gendarmerie, asserted on Belgia! 226

eS —————_——Coielision that state security had provided the arms used by the Killers of Brabant. On the same day, seven WNP militants, including six military professionals, went on trial for Stealing defense documents

and setting up a private militia, which they claimed they did on

orders from state security to prove the weaknesses of the sec urity system. They named their security service contacts.2 Another terrorist organization, the allegedly left-wing Cellules

Communistes Combattantes (CCC), also surfaced in Belgium in the early 1980s. The CCC organized twenty-seven attacks in eleven months on banks, other business installations, army and NATO

facilities, accidentally killing two firemen in one attack, but otherwise doing marginal damage and generating tremendous publicity. The leader of this enterprise, Pierre Carrette, who performed miracles

in fixing radio-controlled bombs in the middle of a NATO radiocommunications center, was finally arrested. His father is the state security agent Alphonse Carrette, his brother is a WNP member and army commando,

and Pierre Carrette carried out these attacks

despite being under surveillance by Belgian security since 1979.37 These actions, claims, and linkages do not prove state control of this outburst of terrorism, but the accumulated evidence is strong that at least some elements of the security services cooperated in a

Belgian “strategy of tension” analogous to that pursued by the

intelligence and military services in Italy.

The private security industry also played a role in terrorist events in Belgium. As we described earlier, at the time of the bombing of the Jewish Synagogue on the Rue de la Régence in Brussels in 1982, it was being guarded by Wackenhut.?® The director of the Belgian

branch of Wackenhut at that time was Jean-Francis Calmette, an “xtreme right-wing arms enthusiast, who was linked to WNP. The man actually on duty at the synagogue was Marcel Barbier, a former

Paratrooper, anti-Semite, also a WNP man, who was later convicted of murder. This bombing provided the basis for the setting up of a Special new “counterterrorism” service of the state. The supermar ket bombings led to a Wackenhut contract to protect the centrally located

shopping mall City 2.39 pa

Creat Britain, both an anarchist menace and an alleged Black

a ation Front have reared their heads in eel ©us circumstances. Anarchist groups name 227

ee

e [he “Terrorism Industry re

Hurricane, pamphlets entitled Written in F ie and Without ep,

and magazines called Flamethrower and Attack made publicity Splashes in the mid-1980s. Some or all of these may be independent, but suggestions of

connections to psyops operations are aroused by their

timing and fit to state demands, frequent absurdity, ery for Public; ly

b)

enthusiasm for petty illegalities, and (in the case of the slick Magazines Flamethrower and Attack) affluence.*® The same is true of the rise of an alleged Black Liberation Front in 1987, in which a number of violent actions, generally ineffectual, were claimed and denied by shadowy black leaders and anonymous parties cited in the press, Eventually, the journal Special Forces, edited by a former British army officer, claimed an IRA alliance with the “London-based Black Liberation Front”! Phil Edwards and Robin Ramsay point out how

fine a specter this provides—a Black IRA is “a logical step forward” in state propaganda, merging two premier devils. The attempts to tie the IRA to Moscow in the 1970s had been a dismal failure, and

the Gorbachev policies had dealt a further blow to this traditional modality. The Black Liberation Front “raises one of the unresolved questions in this area: having created the ‘terrorism industry, how far is the British state prepared to go to produce some ‘terrorism’?”*! We do not claim that all of these threats and acts of terrorism in Western Europe in the 1980s were carried out or induced by agents

of the state. We do believe, however, that many of them probably were, and that other acts of terrorism

attributed

to preferred

terrorists (e.g., the Kurds) were carried out by agents of Western

states (e.g., the Turkish government). It is extremely interesting and important that, despite the historic record on this subject, the Western experts and press systematically ignore this possibility. The lengthy

articles on the new wave of terrorism that struck Western Europe

in the early and mid-1980s, which we cited earlier,#? do not mention

Westland New Post, Wackenhut,

ce

|

43

ae

Britain,**

or the “strategy of tension” 10

the growth of the very active National Fr ont 10 ee or even

D the better-known and proven role of the stats Hie extreme right in Italy. Terrorism is left-wing retail violence, and t

possibility of manufac tured terrorism is never mentioned.

228

Conclusions The Terrorism Industry As we have seen (chapters 4-7), the West has produced an industry of institutes and experts who formulate and channel analysis and

‘nformation on terrorism In accordance with Western demands. We have also seen that this industry is closely linked to Western govern-

ments, intelligence agencies, and corporate/conservative foundations and funders. It functions as a closed system, in which government officials and the accredited and well-funded experts attend one another's conferences, cite one another as authorities, and reinforce

their mutual status as experts. We believe that the institutes are designed to give authoritative status to experts who will confirm and reinforce state propaganda, to occupy the informational space that might otherwise be used by dissident voices, and thus to ensure closure of fact and opinion. The

mass media, whose structural links to government and the corporate system are already potent, and who are therefore already inclined to accept a state line, are driven further toward closure by the fact that the experts, whose credentials are from affiliation with institu-

tions specializing in terrorism, are supplied them by the industry collective. These experts all follow the approved semantics and model and select and fit facts accordingly. The development, activities, and influence of the terrorism industry illustrate how the powerful dominate the Western mass media

and public perceptions of reality through processes that appear entirely natural. The government and corporate wealthy nourish the institutes and think tanks that service and sponsor suitable intellectuals and journalists who will convey the proper messages. These selected analysts are also pushed by major media enterprises, Whose principals strive to advance conservative propaganda themes

(Readey’s Digest, Time, the Wall Street Journal, the New York Times), and

the numerous right-wing syndicated columnists who aie

m0 Pagandize these themes (Buckley, Will, Evans-Novak, Jeane Kirk-

peat ames Kilpatrick, Rusher, Price, etc.). The gta ee.

a — ecome common sense; alternative views fognot considered It IS

relevant

by the mass

229

aPP

it disdisclosed -< it . nor 1s media,

The “Terrorism Industry re

ee , to the public

that the experts are co-opted and reflect the views of

the covernment

seats with badly

Nass numerous

Ze

and

powerful

vested

records

tarnished

1 asa

as paid propagandists,

alots and fanatics, are advanced

;

and asked open-ended questions [

.

Thus literal CIA

and

as authentic experts

This results in p part frc om theeesfact

ckly established that the truth of the government-state position 1S qui experts is merely to as beyond question, so that the function of ects an truths. This refl clarify and elaborate on preestablished effective propaganda system.

ustry is of a high In fact, the achievement of the terrorism ind

order. In his book Black Athena, Martin Bernal shows how the classical

scholars and intellectuals of the West, from the late eighteenth into

the twentieth centuries, paralleling the subjugation of the black and other colonized races by Western imperialism, succeeded in expunging from Western portrayals of ancient Greece the notion expounded

by Herodotus (and traditional Greek scholarship) that classical Greece

had been profoundly influenced by Asian and African cultures.* In a great feat of ideologically based cleansing, the fount of Western

civilization was purified and shown to be free of such alien influences

and to be of purely Aryan origin. We believe that the conversion of the West into the victim of “terrorism” and its victims into the “terrorists” is, in light of the facts, an equal or greater achievement of Western scholarship and journalism.

230

Appendices

Appendix A: Counterterrorism in Action

The Case of Maria Teresa Tula viuda de Canales*

Maria Teresa Tula viuda de Canales joined the Committee of Mothers of the Disappeared (Co-Madres) in 1978 after her husband was arrested and imprisoned. He was released but later assassinated in 1980. Maria Teresa (also

known as Laura Pinto) continued to work with the Committee and to raise her five children. In 1984, the Committee of Mothers was honored with the Robert F. Kennedy Foundation Human Rights Award. Four members of the Committee were chosen to travel to the United States to receive the award, among them Tula.

All four were denied visas by the State Department and accused of being

terrorists, men 1n O n Tuesday May 6, 1986, Tula was abducted by four heavily armed blindfolded

Cvilian clothes on the street near the office of the Committee. She was

and taken to an unknown location where for two days she was hidenmagates a

and threats she sls “aten, and raped by three men. In spite of the torture ince ntly conv

» acknowledge that she was a member of the Committee. Appare *

:

Fs

5

Update: Counterterrorism in Action (Los i‘Rescate Human Rights Department, E/ Salvador

Beles, 1987), appendix 1.

231

ee

Ayyertix A ————__ «

by her denials, Nas laa

Jeft

her at a bus stop near a park

is still unidentified.

arly

oF

early hursday

morning, May 8. es nie 98 1986, she was again abducted by “heavil

Twenty days ey

rise time, the Treasury Police. Interrogation a eumed

men in civilian cts ator: 12 days and conducted

in a more

$0 te Abuse

were nearly ae ues Gles, the interrogators accused her of belo: aoe f killing four policemen, of burning by on oe manner. ¥ Oa

eC COSC fecal having been a guerrilla

ein Toei : She: was blindfold ed indfo eded, handcuff a

combatant 1n

beaten, allowed little sleep or food, and force to carry out physical EXETCises for long periods of ume. Torture and interrogation were alternated with offers

of protection, money and work in exchange for collaboration. She was asked to

give names and addresses of members of the Committee (Co-Madres) and of

the non-governmental Commission of Human Rights (CDHES). She refused to

cooperate. On June 8, she was forced to sign a confession which she was not

allowed to read. On June 9, after 12 days of interrogation, she was video-taped

receiving a medical examination (the doctor examined only her back), forced

to sign a statement acknowledging the exam, and taken to the women’s prison at Ilopango. She was released from prison on September 23, when President Duarte himself ordered it and called a press conference to declare the release an example of democracy in action. During the press conference, Tula publicly pointed out one of her police torturers who was present. Maria Teresa Tula gave birth to her sixth child on July 10 while still in prison, just one month after her police interrogation. She is 35 years old and

received a first grade education.

232

Appendix B: Three Studies in Primary Terrorist Violence

1. Sabra and Shatila*

It had been inherently likely that the Israeli invasion would bring some such ghastly climax as Sabra and Chatila; all the same, it came as something of a

surprise even to some of those who had anticipated it. The Palestinian and Syrian combatants had all left without a hitch. On 30 August Yasser Arafat had

bid his emotional farewell. The Israelis seemed to be satisfied; General Eitan told the Committee of Foreign Affairs and Defence that “all that remains 1n West Beirut is a few terrorists and a small office of the PLO.” A few days later the American, French and Italian contingents of the multi-national force set up than, under their {0 supervise the evacuation had also departed—even earlier last in, were first out, with a eae Americans, The have. need they mandate, for the photographers a sign reading “mission accomp creat

érine holding up

made on the “pacification” of West Beirut: the era been had art i mi

As al former allies of the Palestinians, had given some Rote te peat the guerillas ae and to the state authority which, however em Pie vf ‘ented. way, Earlier 23 August even before evacuat® in elec lecting g a new succeeded had the parliament the onLebanese St under

‘ddtele aa Roots of Violence m the Mi e Th : ch an Br e iv Ol the o ke s©ndoHirn:st, FaThbeer Gu&n Faanbedr, 1984), pp. 429-28. 233

East, 2nd

Isracli-supported Pha entmmander of the nco ncy, wider of Maronite Christian milita tive

ir ETS True, Basher y ell rbo¢

president,

se

ok

ie

stained hig

d ality which ha ence and brut tion and Ht te da ee milith Nasi i he violma mi ti in y, er ib by br ed rr on ti ec e Se lo democracy. There wea feared and of rit spi ue tr si e th n He c ele ce. His supreme offi forms rathe observed the

ght now feel able to wa | o , under q strong man wh mi at th r, ve ve w at order and stability for which alae th e ev hi least hopes, ho ac d l u o w n | eba:no e and conciliate, rship had secured wise B e d a e l O cs L P ri e ia th ed all tscare amese interm

m the fighting o h w s an li vi ci n ia stin r the safety of Pale fo b bi Ha eign Minister,” said ip r o il F Ph ‘ m o O L P e , th n on Fr m nd. Farouk Kaddou Israel would not at th ” ur no men were leaving behi ho f o d r o w d given its “ is that the United States ha re later to confirm that th

e Department officials wees from the Israelis. Habib at St d an ut ir Be st We r te nc en numerous oral assura of th ng re st e th on , so s wa e Minister, Shafiq Wazzan: im had written to the Lebanese Pr

ted States will provide appropriate The governments of Lebanon and the Uni -combatants left

stinian non guarantees for the safety .. . of law-abiding Pale departed. .. . The United y Beirut, including the families of those who have of assurances received from the States will provide its guarantees on the basis with which

se groups government of Israel and the leaders of certain Lebane it has been in contact.

t to evacuate. These commitments were critical to the PLO’s agreemen considered There were, of course, forebodings. The Lebanese Prime Minister gh. They that the mandate of the multi-nationals was not far-reaching enou that should have been authorized to stay longer in order to cope with the chaos was likely to ensue when local militiamen, stronger and more determined than ed the as yet feeble and uncertain Lebanese army, sought to fill the vacuum creat

by the withdrawal of the guerillas. His and others’ misgivings were reinforced

when the Israeli army, encamped on the outskirts of the city, made a 600-yard advance, on the pretext of demining roads, from the international airport to been of Sabra and Chatila, where the PLO headquarters had oy very edge dent

Presi oe preteen ven etWe Bee agreement took place directly after peace plan” and it was a way of expressing displeasure. en or the sraclis Lebanon, as ever, furnished the means by which apa ‘ erp tes ee jas any diplomatic initiative they did not like. ay oa ie n ope pees CUne ee peneBeirut headquarters of the Phala We . Of t0all have East tian Chris in e ret innumerable terrorist ex at was one this ed, endur had t Beiru : at the most fateful tea

y meeting» was President-elect Bashir hs me in the building, holding his weekl ee a few hours later,(OF1 mo» announced that “sheikh Vaal and when, Maron tians Chris ite een a the idol of the them), had indeed of panic and stupefaction swe ragged, dead and disfigured, from the rubbls who ha planted the boy nb there wswept the country, Though no one knew 2

:

i

te

ere

In fufurt rthe her c¢ ontemptuous ess d, % ut sr witho consudilt ecide

Sharon

d



le

1,

f

ao

oral

ovat

yin al 4, rd for Habib and all his works Bes" : ut ir Be st We to invade ing their colleagues, e

ral

ye

ey. .

234

;

;

:



«

id

had i ee oe of 7 this igs a huge rally on 17 Ju Ty]yi " peer «before the end year ae we oe, Shall eat have told signed a peace

n’? Bashir was to have been the man with whom the fie

a

aby etl

Lee three-thirty in the morning of Wednesday, 15 Sipiecal wou pie v 4eneral Amir Drori, commander of Israel’s northern a ener Eitan Phalangist leaders at the East Beirut headquarters of the militis RE ak a

had built with Israeli assistance. Together with Fadi Frem, the sonaeeanees

chief of the Phalangist-dominated Lebanese forces, and Elias Hobeika, the head

of their intelligence, they drew up a plan for Phalangist Participation in the seizure of West Beirut. It was decided that, to spare Israeli lives, the Phalangists would be exclusively entrusted with “searching and mopping up” the refugee camps.

;

;

At five o’clock that morning the Israelis began their entry. It was easy: the

multi-nationals had conveniently removed mines and barricades and resistance from the Moslem-leftists was little more than symbolic. In the entire operation the Israelis lost only seven killed and a hundred wounded.

At nine o'clock Begin, receiving Habib’s deputy Morris Draper, greeted him with these words: “Mister Ambassador, I have the honour to inform you that, since five o'clock this morning, our forces have been advancing and taking up

positions inside West Beirut. Our objective is to maintain order in the town. With the situation created by the assassination of Bashir Gemayel, there could be pogroms.”

What the Phalangists would do when they entered the camps was obvious to any reasonably observant Israeli who knew anything about them. And there

were Israelis who knew them very well indeed. They had been training them in Israel itself since 1976. The military correspondent of Yediot Aharonot called them “an organized mob, with uniforms, vehicles, training camps, who have been guilty of abominable

cruelties.” It was common

knowledge,

too, that the

Palestinians were the particular object of their hatred. For Bashir Gemayel, there was “one people too many: the Palestinian people.” In his dealings with the Israelis he left no doubt that, when he came to power, he would “eliminate the Palestinian problem’”—even if that meant resorting to “aberrant methods against the Palestinians in Lebanon.” His militiamen never concealed their murderous ambitions. When a group of Israeli parliamentarians visited Israelioccupied South Lebanon, one such militiaman told them: “One dead Palestinian ls a pollution, the death of all Palestinians, that is the solution.” Bamahan, the army newspaper, wrote on | September, two weeks before the massacre:

A senior Israeli officer heard the following from the lips of a Phalangist: ha question we are putting to ourselves is—how to begin, by raping or killing: .

have the Palestinians had a bit of nous, they would try to leave Beirut. You civilians or pate no idea of the slaughter that will befall the Palestinians,

ve “3 Who remain in the city, Their efforts to mingle with the population the fighters will pursue useless. The sword and the gun of the Christian

“verywhere and exterminate them once and for all.” ; Polit;-.

agent

In their

ails blood lust drove EE mere as well as tives al objec eteIngs ~ C ; : ; e gus of many con theiPos leaders Israeli : representatives hece.,. With Cess; } : er the exo ary to resort to violence in order to bring about

239

———

AppendixB Se

Palestinians from Lebanon. “We knew that they wanted to destroy tik said General Aharon Yariv, commander of the Beirut area, They p; € cam I,”

hopes on General Sharon’s scheme to overthrow

Lebanon's Palestinians on Jordan.

King Hussein aeons their S

“dump all

The Israeli army also knew, at the highest level, just what ven geful feat

had taken possession of the militiamen after the assassination of t heir ido], Ne after seeing

ie,

to the Phalangists’ entry into the camps, the Chief of Staff tolq A

cabinet meeting that Phalangist officers had “just one thing left t do, and that is revenge; and it will be terrible . . . it will be an eruption the lik €0 of which hag never been seen; I can already see in their eyes what they are waiting for,” They knew also how likely it was that the commander of the operation would give his men a free rein. Elias Hobeika had once been sent to South Lebanon by Bashir Gemayel at the request of the Israelis in order to support the activities of Major Saad Haddad.

Hobeika

proved his mettle—killing several Lebanese

and Palestinian civilians—so much so in fact that the Israelis decided to send

him back where he came from, lest his “excesses” prove an embarrassment. After Sharon had decided to “cleanse the camps,” someone proposed that an Israeli liaison officer be seconded to the Phalangists. But a superior, aware of Hobeika’s past, vetoed the idea, arguing that the Israeli army should not get

itself mixed up in atrocities.

After passing through the Israeli roadblocks set up at its entrance the first unit of 150 Phalangists entered Chatila camp at sunset. Some carried knives and axes as well as firearms. The carnage began immediately. It was to continue without interruption for forty-eight hours. Night brought no respite: the Israelis lit up the camp with flares. Anything that moved in the narrow alleyways the Phalangists shot. They broke into houses and killed their occupants who were gathered for their evening meal, watching television or already in bed. Sometumes they tortured before they killed, gouging out eyes, skinning alive, disembowelling. Women and small girls were raped, sometimes half a dozen times, before, breasts severed, they were finished off with axes. Babies were torn limb from limb and their heads smashed against walls. Entering Akka hospital the men

assassinated the patients in their beds. They tied other victims to vehicles a am dragged them through the streets alive. They cut off hands to get at rings

bracelets. They killed Christians and Moslems, Lebanese as well as Palestinians.

They even killed nine Jewesses who, married to Palestinians, had been living 10 the camps since 1948. Bulldozers were brought in to bury their victims ae demolish houses which Israeli aircraft had not already destroyed; for, roones as well as terrorized, all the Palestinians would surely have to flee. ; athe

What was going on in the camps could hardly escape the attenuon © st

Israeli soldiers surrounding them. Their forward

command

post was 4 sae

200 yards from the main killing ground and from the roof of this seven

ic

building they had a direct line of sight into the heart of the camps: Itce ie one officer, “like the front row at the theatre.” Elias Hobeika spent eee night on the roof of the command post. At 8 p.m. Lieutenant Elul, 6 ngist Yaron's chefde bureau, overheard

a radio conversation

in which a Phale ifty

inside the camp asked Hobeika what he should do with a grouP sestio CESS ieee and children, “This is the last time you’re going to ask me < Hughter

me that,” Hobeika replied, “you know exactly what to do.” Raucous © 236

Aopentix@ —

$$

among the Phalangist personnel on proke ¢ut ood that the women and children were the roof and Li tenant Elul to be murdered a

underst Yaron. Later e informed the commander of the Phalangist forces General Reenessage tO varon to the effect that “up till now 300 civilians fa Chatila sent i nd terrorists 3 n killed.” This information | was immediately despatche e d to military ave be

iv. Feedquarters in Tel Av

As dawn broke on Friday, 17 September, Israeli officers and men atop the

command post could see the bodies piling up. Later they were to see bulldozers, at least one or two of them Israeli-supplied, shovelling them into the ground.

Soldiers from an armoured unit, stationed a mere hundred yards from the camp, recalled how clearly they had been able to see the killing. Their report went to the higher authorities who were receiving similar ones from other points around the camp. Lieutenant Avi Grabowski, second-in-command of a tank company, said that he had seen Phalangists killing civilians, and that one

of them told him that “pregnant women will give birth to terrorists.” Israeli soldiers were instructed to do nothing. “We don’t like it,” an officer told his men, “but I forbid any of you to intervene in what is happening in the camps.” The soldiers blocked the entrances to the camps, several times turning back refugees trying to get out, and on one occasion a tank pointed its cannon at a group of 500 who, white flags held aloft, tried to explain that the marauders were “assassinating everybody.” At about four o'clock on Friday afternoon General Eitan and the Chief of Northern Command,

General Drori, met with Phalangist commanders,

some

of them fresh from the camps. Eitan congratulated them on their operation and the Phalangists, explaining that the Americans had called on them to stop, asked the Israelis for “just a bit more time to clean the place up.” It was agreed that all Phalangists would have left the camps by Saturday morning and that, meanwhile, no extra forces would be sent in. However, even as Eitan left Beirut airport for Tel Aviv, a new Phalangist unit of some 200 men set off for Chatila,

mowed down a group of women and children as soon as they got there, massacred all the occupants in the first house they came across and demolished Mt with a bulldozer. All accounts agreed: this new operation was well planned and coolly executed. About the same time, General Sharon and Foreign Minister Yitzhak Shamir Were again meeting American envoy Morris Draper, who asked that the Israeli told army hand over its positions to the Lebanese army immediately. Sharon

him that nothing could be done because of the Jewish New Year. Besides the

es Bi leva

of the army was “preventing a massacre of the Rismspuae

pa

estern part of the city.” Later that evening the onilttary