Briant, Emma L. (2011) 'Special Relationships'

Total Page:16

File Type:pdf, Size:1020Kb

Briant, Emma L. (2011) 'Special Relationships' Briant, Emma L. (2011) ‘Special relationships’ - the negotiation of an Anglo-American propaganda ‘War on Terror’. PhD thesis http://theses.gla.ac.uk/2840/ Copyright and moral rights for this thesis are retained by the author A copy can be downloaded for personal non-commercial research or study, without prior permission or charge This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the Author The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the Author When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. Glasgow Theses Service http://theses.gla.ac.uk/ [email protected] ‘Special Relationships’ The Negotiation of an Anglo-American Propaganda ‘War on Terror’ Emma Louise Briant B.A. M.Res. M.Sc. Dip. LCW (Open). Thesis Submitted in Fulfilment of the Requirements for the Degree of Doctor of Philosophy. Department of Sociology, Anthropology and Applied Social Sciences University of Glasgow April 2011 Abstract This doctoral thesis will examine how relations between the United States and Britain, and internal dynamics within each country, affected the nature and development of the two countries’ information strategies in a shared theatre of war. It examines the two governments’ distinct organisational cultures and bureaucratic structures in explaining the shape this took. Going beyond the policy level it considers how cultures and power relationships contributed to propaganda war planning. The research emphasises important changes in policy development and circumstance which, it is argued, despite the obvious power imbalance, situated Britain in a key position in the Anglo-American propaganda effort. The analysis draws on empirical research conducted in both countries. This fieldwork involved elite interviews focussing on the period of the ‘War on Terror’, including policymakers, key bureaucrats, intelligence personnel, contractors and military planners in both Britain and America. 2 Contents Abstract................................................................................................................2 List of Figures .......................................................................................................6 Acknowledgements................................................................................................7 Author’s Declaration .............................................................................................8 Acronyms..............................................................................................................9 Introduction & Theoretical Debates .....................................................................11 Research Questions.......................................................................................... 15 Asymmetrical Nature of the ‘Special Relationship’............................................15 Toward a Theory of Propaganda .......................................................................19 Propaganda Theory: Origins ..........................................................................19 Mid 20th Century to Contemporary Theory: Morality and Democratic Propaganda ...................................................................................................................20 Censorship ...................................................................................................25 Questions of Ethics and Power..........................................................................27 Williams: Culture and Power.........................................................................30 Williams: Communication & Paternalism ....................................................... 30 Williams: Representation & Debate............................................................... 33 Williams: Individualism & ‘Service’ ............................................................... 34 Williams: Gramsci, Agency and Social Structure.............................................36 Security, Propaganda and ‘Counter-terrorism’ ..................................................39 Operational Considerations and their Analytical Implications ......................... 45 Figure 1: Table Showing Levels of PSYOPS - Adapted from US Joint Doctrine for Psychological Operations 2003 (Joint Chiefs of Staff, 2003: ix, x & I-4) ..47 Defining Propaganda ........................................................................................ 47 Categories of Propaganda .............................................................................49 Breakdown by Chapter.....................................................................................51 Design & Methodology ......................................................................................... 53 Assumptions & ‘Objectivity’ of the Research ....................................................53 Scope of the Research...................................................................................... 54 Methodology and Approach ..............................................................................56 Detailed Documentary Analysis .....................................................................56 Primary Method: Elite Interviews ..................................................................57 Figure 2: Table Showing Range of Expertise of Participants ........................ 57 Face-to-Face and Telephone Interviews ........................................................ 58 Email Correspondence ..................................................................................61 Fieldwork Planning and Process........................................................................62 Sampling & Access........................................................................................ 62 Unstructured Nature of the Interviews .......................................................... 67 Analysis of the Data ......................................................................................... 69 Chapter 3: Britain and America: The Rise of a Cross-Government Approach in the Formal Domestic Propaganda Apparatus............................................................... 74 Introduction ....................................................................................................74 Traversing “Boundaries” in Propaganda ............................................................ 75 Traditional Boundaries, Cognitive Separation and ‘Ethical Propaganda’ ..........75 3 The Global Challenge to Boundaries in Propaganda........................................77 The Functional Integration of Propaganda 1: ‘Purity’ vs ‘Consistency’ of Message ....................................................................................................................... 81 The Functional Integration of Propaganda 2: Effects-based Approaches .............87 The Functional Integration of Propaganda 3: Intelligence, Rumsfeld and ‘Covert Action’............................................................................................................90 More than HUMINT: Covert Action and Propaganda ........................................90 Rumsfeld: Co-opting ‘Covert Action’ ............................................................. 94 The Functional Integration of Propaganda 4: Involving Private Contractors ........99 The Functional Integration of Propaganda 5: Involving Academia..................... 115 Conclusion..................................................................................................... 118 Chapter 4: Formal Cross-Government (Mis-) Coordination ................................... 121 Introduction .................................................................................................. 121 Formal Attempts to Coordinate Cross-Government Propaganda ....................... 121 The Failure of Formal Coordination: ‘Stovepipes’ and Institutional Cultures..... 127 American ‘Stovepipes’: Coordinating Rumsfeld’s Pentagon .......................... 129 American ‘Stovepipes’: The CIA and The Pentagon ...................................... 133 British ‘Stovepipes’? ................................................................................... 137 2005 Onwards: Strategic Communications and SMART Approaches ................ 139 Conclusion..................................................................................................... 145 Chapter 5: Culture & the Role of Informal Structures for Britain and America ..... 147 Introduction .................................................................................................. 147 Institutional Culture & the Navigation of Formal Barriers ................................ 147 ‘Service’ Motives, Propaganda and the ‘Real’ World: the Rise of Initiative ... 149 Initiative & Informal Relationships .............................................................. 150 Momentum, Suppression and Dissent ........................................................... 160 Public Service and Dissent .......................................................................... 166 Democratic Propaganda ‘Service’................................................................ 173 ‘The Real World’ ........................................................................................ 178 Conclusion....................................................................................................
Recommended publications
  • Open Source Intelligence (OSINT) Link Directory Targeting Tomorrow’S Terrorist Today (T4) Through OSINT By: Mr
    Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract June 2011 Country Studies Public Places Open Source Intelligence (OSINT) Link Directory Targeting Tomorrow’s Terrorist Today (T4) through OSINT by: Mr. E. Ben Benavides CounterTerrorism Infrastructure Money Laundering Gang Warfare Open Source Intelligence is the non-cloak- and-dagger aspect of fact collecting. (Alan D. Tompkins) Human Smuggling Weapon Smuggling IEDs/EFPs Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Table of Contents Table of Contents ........................................................................................................................ 2 Comments ................................................................................................................................... 7 Open Source Intelligence (OSINT): What It Is and What It Isn’t ................................................... 8 How To Use Open Source Intelligence ........................................................................................ 9 Key Army Access Sites .............................................................................................................. 17 Must Haves References ............................................................................................................ 18 Core Open Source Intelligence Documents & Guides ........................................................... 18 MI Officer Students ...............................................................................................................
    [Show full text]
  • USAF Counterproliferation Center CPC Outreach Journal #510
    USAF COUNTERPROLIFERATION CENTER CPC OUTREACH JOURNAL Maxwell AFB, Alabama Issue No. 510, 23 June 2006 Articles & Other Documents: N. Korean Threat Activates Shield U.S. Pressures North Korea Over Missile Bush, At Merchant Academy, Warns Iran On Nuclear U.S., Russia Break Impasse On Plan To Keep Arms Program From Rogue Users U.S. Readies System For Missile Detection North Korea Disavows Its Moratorium On Testing Of Long-Range Missiles U.S. Still Working Kinks Out Of Defense Shield Few Moves Left With N. Korea Iran's Gray Area On Nuclear Arms For N. Korean Missile, U.S. Defense Is Hit Or Miss Iran And N. Korea Cautioned At Summit Lawmakers Cite Weapons Found In Iraq Chemical Arms Found In Iraq, Report Reveals If Necessary, Strike And Destroy Former Defense Officials Urge U.S. Strike On North N. Korea Offer Of 2-Way Talks Rejected Korean Missile Site Iran Says Answer On Atom Deal Will Take More Than U.S. Set To Down Korean Missile A Month For Diehards, Search For Iraq's W.M.D. Isn't Over Latest U.S. Missile-Defense Test A Success U.S. Rejects Suggestion To Strike N. Korea Before It Russia Voices Alarm To N. Korea Fires Missile Is Iran Studying North Korea's Nuclear Moves? Cheney Pushes Nuclear Initiative Welcome to the CPC Outreach Journal. As part of USAF Counterproliferation Center’s mission to counter weapons of mass destruction through education and research, we’re providing our government and civilian community a source for timely counterproliferation information. This information includes articles, papers and other documents addressing issues pertinent to US military response options for dealing with nuclear, biological and chemical threats and attacks.
    [Show full text]
  • Oleg Deripaska Has Struggled for Legitimacy in the United States, Where He Has Been Dogged by Civil Lawsuits Questioning the Methods He Used to Build That Empire
    The Globe and Mail (Canada) May 11, 2007 Friday Preferred by the Kremlin, shunned by the States BYLINE: SINCLAIR STEWART, With a report from Greg Keenan in Toronto SECTION: NEWS BUSINESS; STRONACH'S NEW PARTNER: 'ONE OF PUTIN'S FAVOURITE OLIGARCHS'; Pg. A1 LENGTH: 957 words DATELINE: NEW YORK He is perhaps the most powerful of Russia's oligarchs, a precocious - some would say ruthless - billionaire, who built his fortune against the bloody backdrop of that country's "aluminum wars" in the 1990s. He has nurtured close ties to the Kremlin, married the daughter of former president Boris Yeltsin's son-in-law, amassed an estimated $8-billion in personal wealth and built a corporate empire that stretches from metals and automobiles to aircraft and construction. Yet for all his success at home, 39-year-old Oleg Deripaska has struggled for legitimacy in the United States, where he has been dogged by civil lawsuits questioning the methods he used to build that empire. Mr. Deripaska has repeatedly denied allegations levelled against him, and he has not been specifically accused by American authorities of any crime. However, these whispers about shady business dealings may raise concerns about his $1.5-billion investment in Canada's Magna International, not to mention Magna's attempts to win control of DaimlerChrysler, an iconic American company. The United States has recently shown protectionist proclivities, citing national security concerns to quash both a Chinese state-owned oil company's bid for Unocal Ltd. and a planned acquisition of U.S. port service contracts by Dubai Ports World.
    [Show full text]
  • Principles in Countering Terror Threats | the Washington Institute
    MENU Policy Analysis / Interviews and Presentations Principles in Countering Terror Threats by Moshe Yaalon Feb 19, 2006 ABOUT THE AUTHORS Moshe Yaalon Moshe "Bogie" Yaalon, Israel's former defense minister and military chief of staff, was the Rosenblatt Distinguished Visiting Fellow at The Washington Institute in 2016. n February 19, 2006, Lt. Gen. (ret.) Moshe Yaalon, outgoing chief of staff of the Israel Defense Forces (IDF), O addressed the Intelligence Summit in Arlington, Virginia. General Yaalon is a distinguished military fellow at the Institute. The following is the prepared text of his remarks. In the past five years, the State of Israel has experienced an unprecedented war of violence and terror, initiated and orchestrated by the Palestinian leadership. More then 1,000 Israelis have been killed—over 70 percent of which have been civilians. In addition, about 7,500 Israelis have been wounded in more than 25,000 terror attacks. These past five years have witnessed more than 140 suicide bombings against the Israeli population, and Palestinian terrorists have launched hundreds of rockets into Israeli cities and villages. In the face of these attacks, the State of Israel steadily maintained—until the implementation of the Disengagement plan—one basic principle: under no circumstance should we surrender to terror. I cannot emphasize it enough: this is the primary and most important principle in addressing terror threats. No surrender. I wish now to review some of the major developments in international terrorism over the past five years, each of which spoke to the changing nature of terrorist threats. •First, in spite of the global war on terror, the international jihad network continues to be active.
    [Show full text]
  • CPC Outreach Journal #484
    USAF COUNTERPROLIFERATION CENTER CPC OUTREACH JOURNAL Maxwell AFB, Alabama Issue No. 484, 21 February 2006 Articles & Other Documents: Commercial Photos Show Chinese Nuke Buildup Rice Asks For $75 Million To Increase Pressure On Iran Niger Uranium Rumors Wouldn't Die Iran Working On Nuclear Arms Plan, France Says Iran Hints At Compromise On Nuclear Inspections Europeans Reaffirm Diplomacy With Iran Bioterrorism, Hyped Iranian Fatwa Approves Use Of Nuclear Weapons Nuke-Armed Iran A Way Off: Experts On tape, Hussein talks of WMDs Talks On Enriching Nuclear Fuel For Iran In Russia Seem To Stall Welcome to the CPC Outreach Journal. As part of USAF Counterproliferation Center’s mission to counter weapons of mass destruction through education and research, we’re providing our government and civilian community a source for timely counterproliferation information. This information includes articles, papers and other documents addressing issues pertinent to US military response options for dealing with nuclear, biological and chemical threats and attacks. It’s our hope this information resource will help enhance your counterproliferation issue awareness. Established in 1998, the USAF/CPC provides education and research to present and future leaders of the Air Force, as well as to members of other branches of the armed services and Department of Defense. Our purpose is to help those agencies better prepare to counter the threat from weapons of mass destruction. Please feel free to visit our web site at www.au.af.mil/au/awc/awcgate/awc-cps.htm for in-depth information and specific points of contact. Please direct any questions or comments on CPC Outreach Journal to Jo Ann Eddy, CPC Outreach Editor, at (334) 953-7538 or DSN 493-7538.
    [Show full text]
  • The Miscreants' Global Bust-Out: Preface | Deep Capture
    4/12/2019 The Miscreants' Global Bust-Out: Preface | Deep Capture Home About Enter your search keywords Story of Deep Capture Michael Milken and Dendreon The Movie Mitchell Report AntiSocialMedia Data Archive Podcast Categorized | Featured Stories, The Deep Capture Campaign The Miscreants’ Global Bust-Out: Preface Posted on 28 April 2011 by Patrick Byrne “A bust-out is a scheme customarily employed by organized crime to deplete the assets of a legit imate business, thus forcing it into bankruptcy.” State of New Jersey Commission of Investigation 1988 Report, “Subversion By Organized Crime And Other Unscrupulous Elements of the Check Cashing Industry” “BUSTOUT: a confidence scheme in which an established business is taken over, a large stock of merchandise is purchased on credit and quickly sold, and the business is then abandoned or bankruptcy is declared.” – Merriam-Webster Dictionary Mark Mitchell has continued exploring the financial instability of the last four years, including the crash of 2008 and the Flash Crash of 2010. His conclusion is that various activities associated with market manipulation (e.g., naked short selling, high frequency trading, derivatives such as Credit Default Swaps and synthetic CDOs, sponsored access, regulatory capture, press manipulation) follow a familiar leverage-and-loot pattern and can be traced to a fairly cohesive network that includes Italian and Russian organized crime, Sunni extremist financiers with ties to Al Qaeda, the Russian FSB, the Albanian Mafia, agents of the Iranian regime, and close associates of Michael Milken. The result, “The Miscreants’ Global Bust-Out”, is 230 pages long. DeepCapture will be publishing it in approximately 25 installments over the coming weeks.
    [Show full text]
  • U.S. Public Diplomacy Towards Iran During the George W
    U.S. PUBLIC DIPLOMACY TOWARDS IRAN DURING THE GEORGE W. BUSH ERA A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of PhD to the Department of History and Cultural Studies of the Freie Universität Berlin by Javad Asgharirad Date of the viva voce/defense: 05.01.2012 First examiner: Univ.-Prof. Dr. Ursula Lehmkuhl Second examiner: Univ.-Prof. Dr. Nicholas J. Cull i ACKNOWLEDGEMENTS My greatest thanks go to Prof. Ursula Lehmkuhl whose supervision and guidance made it possible for me to finish the current work. She deserves credit for any virtues the work may possess. Special thanks go to Nicholas Cull who kindly invited me to spend a semester at the University of Southern California where I could conduct valuable research and develop academic linkages with endless benefits. I would like to extend my gratitude to my examination committee, Prof. Dr. Claus Schönig, Prof. Dr. Paul Nolte, and Dr. Christoph Kalter for taking their time to read and evaluate my dissertation here. In the process of writing and re-writing various drafts of the dissertation, my dear friends and colleagues, Marlen Lux, Elisabeth Damböck, and Azadeh Ghahghaei took the burden of reading, correcting, and commenting on the rough manuscript. I deeply appreciate their support. And finally, I want to extend my gratitude to Pier C. Pahlavi, Hessamodin Ashena, and Foad Izadi, for sharing with me the results of some of their academic works which expanded my comprehension of the topic. ii TABLE OF CONTENTS ACKNOWLEDGEMENTS II LIST OF TABLES, FIGURES AND IMAGES V LIST OF ABBREVIATIONS VI ABSTRACT VII INTRODUCTION 1 STATEMENT OF THE TOPIC 2 SIGNIFICANCE OF THE STUDY AND QUESTIONS 2 LITERATURE SURVEY 4 UNDERSTANDING PUBLIC DIPLOMACY:DEFINING THE TERM 5 Public Diplomacy Instruments 8 America’s Public Diplomacy 11 CHAPTER OUTLINE 14 1.
    [Show full text]
  • An Adaptive Insurgency Confronting Adversary Networks in Iraq
    An Adaptive Insurgency Confronting Adversary Networks in Iraq Jeffrey White Policy Focus #58 | September 2006 All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any infor- mation storage and retrieval system, without permission in writing from the publisher. © 2006 by the Washington Institute for Near East Policy Published in 2006 in the United States of America by the Washington Institute for Near East Policy, 1828 L Street NW, Suite 1050, Washington, DC 20036. Design by Daniel Kohan, Sensical Design and Communication Front cover: In Ramadi, Iraq, a masked gunman keeps watch while another man puts up a campaign poster for a Sunni Arab group ahead of the December 2005 parliamentary elections. Copyright AP Wide World Photos/Bilal Hussein About the Author Jeffrey White is the Berrie defense fellow at the Washington Institute for Near East Policy. He also serves as a defense and security affairs consultant to several government agencies and defense corporations. He retired from the Defense Intelligence Agency (DIA) in October 2002 at senior executive service grade 4. He held the following senior-level positions at DIA: chief of the Regional Military Assessments Group, chief of the Middle East/Africa Regional Military Assessments Office, and special assistant to the Joint Chiefs of Staff/J2. Mr. White holds a -mas ter’s degree in international affairs from George Washington University and a bachelor’s degree in foreign affairs from the University of Virginia. He has authored or coauthored numerous papers on the insurgency in Iraq and has appeared frequently in the media as an analyst on the Iraq situation.
    [Show full text]
  • The Tipping Point: Biological Terrorism
    Journal of Strategic Security Volume 2 Number 3 Volume 2, No. 3: September Article 2 2009 The Tipping Point: Biological Terrorism Scott Cary City of Washington, D.C., [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 13-24 Recommended Citation Cary, Scott. "The Tipping Point: Biological Terrorism." Journal of Strategic Security 2, no. 3 (2010) : 13-24. DOI: http://dx.doi.org/10.5038/1944-0472.2.3.2 Available at: https://scholarcommons.usf.edu/jss/vol2/iss3/2 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. The Tipping Point: Biological Terrorism Abstract This article presents a strategic, operational, and tactical analysis of information currently available on the state of bio-weapons development by non-state actors, primarily Islamist jihadists. It discusses the evidence supporting a practical assessment that non-state actors have begun to acquire, and in the near-term intend to employ, bio-weapons. A pathogen and method of attack specifically designed to achieve the strategic goals of jihadists are presented as functional examples of the problem of the emerging global bio-weapons threat.Is a terrorist attack utilizing biological weapons a real threat? If so, is there a way to predict the circumstances under which it might happen or how it might be conducted? This article explores what is known and cannot be known about these questions, and will examine the threat of biological terrorism in the context of the strategic goals, operational methods, and tactical intentions of Islamist terrorists.
    [Show full text]
  • Furor Erupts Over Recordings of Saddam
    Furor Erupts Over Recordings of Saddam By ELI LAKE, Staff Reporter of the Sun | February 16, 2006 Share Print Send Comment CAIRO, Egypt - Two former CIA directors have resigned from the board of the organization planning tomorrow to make public secret recordings of Saddam Hussein and his advisers. In the last week both John Deutch and James Woolsey abruptly left their positions at Intelligence Summit, according to its president, John Loftus, who said their departure is part of a campaign by the directorate of national intelligence to punish him for releasing the recordings. The reason both men gave for their resignations was new information they received regarding one of the summit's biggest donors, Michael Cherney, an Israeli citizen who has been denied a visa to enter America because of his alleged ties to the Russian mafia. Mr. Loftus said Mr. Cherney was framed by the Russian mob as part of a scheme to extort him. Mr. Woolsey, however, wrote in an e-mail, "My only response is that I got new information this week about the funder from someone I know and whose judgment on these matters I trust. Based on that information I decided to withdraw. If Mr. Loftus is saying that anyone pressured me about this issue he is quite wrong." Mr. Deutch did not respond to a request for comment. Mr. Loftus has promised that the recordings he will release to the public tomorrow will show that Saddam personally discussed a germ attack on Washington at some point after 2000. However, ABC News, which obtained the recordings from Mr.
    [Show full text]
  • MPAC-25-Pseudo-Experts-On-Islam
    A PUBLICATION OF THE MUSLIM PUBLIC AFFAIRS COUNCIL TABLE OF CONTENTS INTRODUCTION AND SUMMARY 3 RESEARCH FOCUS AND PARAMETERS 7 THE DIVISION OF LABOR 8 A LOOK AT THEIR (LACK OF) QUALIFICATIONS 9 A CASE STUDY OF NON-EXPERT ANAYSIS ON ISLAM: THE ‘TEAM B’ SHARIA REPORT 11 POLICY IMPLICATIONS 13 DEBUNKING THE ‘U.S. MUSLIM BROTHERHOOD CONSPIRACY’ 14 CONCLUSION 17 APPENDIX A: MPAC’S CITATIONS ANALYSIS OF ‘2083 MANIFESTO’ 18 APPENDIX B: DATA SUMMARY ON ACADEMIC QUALIFICATIONS 19 PROFILES OF INDIVIDUALS 20 PROFILES OF INDIVIDUALS 1. ANDREW G. BOSTOM 21 2. WILLIAM BOYKIN 23 3. STEPHEN COUGHLIN 24 4. NONIE DARWISH 26 5. STEVEN EMERSON 27 6. BRIGITTE GABRIEL 31 7. FRANK GAFFNEY 34 8. DAVID GAUBATZ 36 9. WILLIAM GAWTHROP 38 10. PAMELA GELLER 41 11. JOHN GIDUCK 42 12. SEBESTEYEN (SEBASTIAN) GORKA 43 13. JOHN GUANDOLO 45 14. TAWFIK HAMID 47 15. DAVID HOROWITZ 48 16. RAYMOND IBRAHIM 49 17. ZUHDI JASSER 51 18. ANDREW MCCARTHY 53 19. WALID PHARES 54 20. DANIEL PIPES 56 21. PATRICK POOLE 59 22. WALID SHOEBAT 60 23. ROBERT SPENCER 61 24. ERICK STAKELBACK 63 25. DAVID YERUSHALMI 65 INTRODUCTION AND EXECUTIVE SUMMARY Based on the tracking of media coverage on American Muslims, anti-Muslim sentiment seems to be at an all-time high.1 The negative sentiment appears in many venues, from state legislatures debating anti-Sharia bills to opposition over construction of new Islamic centers. At the same time, media coverage has begun to focus on anti-Muslim activists in the United States and their corrosive effects on American pluralism.2 Within a national security and law enforcement context, there is no denying that extremists constituting the leadership of Al-Qaeda and its affiliates explicitly articulate their justifications for violence in “worldly” political terms – including the now-deceased Osama Bin Laden.3 They have also manipulated religious beliefs for their propaganda and terrorism recruitment purposes.
    [Show full text]
  • Russian Mafiya, CCF in Bed with Lynne Cheney's 'Campus Gestapo'
    Click here for Full Issue of EIR Volume 33, Number 48, December 1, 2006 Russian Mafiya, CCF in Bed with Lynne Cheney’s ‘Campus Gestapo’ by Ben Deniston, LaRouche Youth Movement; and Michele Steinberg Would you go to war against Iran based on the intelligence of unsavory organizations in the orbit of the campus gestapo reports cooked up by a Russian businessman, repeatedly that the LaRouche Youth Movement (LYM) exposed in the linked to the Russian “mafiya”; by the co-author—with the mass pamphlet, “Is Goebbels on Your Campus?” and in re- High Priest of a Satan-worship church—of a treatise on intel- lated articles in EIR. These outfits, whose interconnections ligence method; byaformer Israeli intelligence agent who will be documented inafuture issue of EIR, include: David calls for killing hundreds of thousands of Muslim civilians in Horowitz’s FrontPage online magazine, Campus Watch, and the war on terrorism; by one of the world’s so-called experts Jihad Watch; the American Enterprise Institute; George on the paranormal, who has been a lifelong operative of the Shultz’s Committee on the Present Danger; the Islam-hating Congress for Cultural Freedom (CCF—the Anglo-American Jerusalem Summit; the Center for Inquiry; and the Bertrand Kulturkampf front of post-World War II notoriety); and by Russell Society. the Pentagon’s neo-con liars who brought you the Iraq War? If the answer is yes, then stop reading this article. Uncovering ‘The Intelligence Summit’ But if you are among the sane, then join us in exposing Ataspeech by Andrew Bernstein of the Ayn Rand Insti- Lynne Cheney’s campus gestapo and its obscure “intelli- tute (see EIR, Oct.
    [Show full text]