. PUTIN, TRUMP AND “THE BOOMERANG” OPERATION
by Mikhail Kryzhanovsky
Contents
WWIII: strategic plan. The “Boomerang” operation. Putin and 9/11. Putin and Wikileaks. CIA is working for Russians. Dinner with Obama and Secret Service. FBI and a hacker: I’m “the US most dangerous”. Trump to assassinate Obama? Secret Service to kill Putin? Anti-Hillary operation. I helped Trump to win. I’ve trapped Putin’s secret agency. Trumps recruitment and training. Trump to kill me. Putin behind the coup-d-etat. Flynn, Putin’s asset. Why Trump stole top secrets? Putin might kill Trump. “The Boomerang” in action. CIA kills me. Erase CIA.
Contact: kryzhanovsky77777@gmail. com ph. 347-303-2593 New York
PUTIN, TRUMP AND THE BOOMERANG OPERATION
War against Russia: my strategic plan 2012
US President Barack Obama The White House, 1600 Pennsylvania Avenue NW Washington, DC 20500
Copies: To: US Secretary of Defense Chuck Hagel, 1400 Defense Pentagon, Washington, DC 20301-1400 CIA Director John Brennan Central Intelligence Agency, Washington, D. C. 20505 Secretary of State John Kerry 600 19th St NW, Washington, DC 20006 May 3, 2013 Dear Mr. President, I am sending you the war plan I have developed with Russia in addition to the materials previously provided by the CIA. I want to emphasize that I still do not intend to take part in CIA operations to spy on US senators and congressmen and political assassinations. Mikhail Kryzhanovsky
Strategic plan of the US war with Russia
The main task of the United States is to destroy Russia as the main geopolitical enemy by dismembering it, seizing all resource zones and moving to governing the country through a government of liberal puppets. No fronts, no strategic operations and bombing. The main element of aggression is a coordinated lightning attack on Russia by NATO troops, primarily special forces, and the "fifth column". Russians should quickly find themselves in a new country – the Union of Independent States of Russia, and the passive majority will remain silent, as with the collapse of the USSR.
Phase I of the war. Information
1. Discrediting President V. Putin as a fascist dictator. 2. Promotion of corruption and direct purchase of the political elite in Moscow. 3. Creating the image of Russia as a fascist state. The fascist state of Russia is a deadly threat not only to Europe, but also to the entire world community. The fascization of Russia′s image in the eyes of the West should be carried out by liberal politicians, writers, public figures through compromising the role of the Soviet Army and people in the victory in World War II. The war was a clash of two fascist dictators – Stalin and Hitler, in today′s Russia, President Putin revived the dictatorship, the state fully supports Nazism, the superiority of the Russian nation, declares its "special role” in world politics as one of the leading nuclear powers. Russia′s national security strategy allows for the possibility of a preemptive nuclear strike, which poses a mortal danger to world civilization. The people of Russia need democracy. For US State Department, CIA Secretary of State D. Kerry, CIA Director D. Brennan
Phase II of the war. Economic
Complete economic and political blockade of Russia, provoking a sharp drop in world oil and gas prices in order to cause a crisis of the government and economy of the Russian Federation. For The US State Department, the CIA, the governments of NATO member countries, Saudi Arabia and other "oil" and "gas" countries. Secretary of State D. Kerry, CIA Director D. Brennan
Phase III of the war. Special and military operations
1. Ukraine′s entry into NATO, the deployment of American bases there. Even if Ukraine does not become a member of NATO, it must make its territory and airfields available to NATO. It is desirable to turn Ukraine into a colony with an indirect model of governance, when foreigners are appointed as presidential advisers and key ministers, through whom the United States will govern the country. 2. Complete reorientation of the vector of radical Islam to Russia. 3. Disruption of Russia′s planned economic, political and military alliance with China – otherwise, the destruction of Russia will become impossible. 4. The anti-Fascist revolution, which will be supported by the world community. 5. The development of the revolution into a full-scale civil war. A sharp surge in provoked inter-ethnic clashes. 6. NATO′s lightning-fast military operation after with a peacekeeping function – to stop the civil war – in fact, in Moscow and St. Petersburg it will be ignited by special forces. Disorganization of the system of state and military administration, a powerful attack on all types of electronic communications.
On Day X, the army is paralyzed through the purchased generals in the Ministry of Defense and the General Staff, the generals must directly declare their refusal to obey the orders of the Commander-in-Chief, who became a fascist dictator, and their intention to remain neutral. This has already been tested in Ukraine – the special services and the army did not interfere in the "orange" revolution of 2004. There will be no mobilization. President Putin′s order to launch a nuclear strike on the United States will be sabotaged. Russia′s "asymmetric response" will also be blocked through purchased leaders in the Ministry of Defense and special services – terrorist attacks using miniature nuclear charges on the territory of the United States, special forces sabotage, and also inciting an interracial civil war.
6. On the same day, all major Western media will announce the agony of the bloody regime of dictator Putin. On the same day in Moscow and St. Petersburg, groups of radical youth will storm government buildings, necessarily with human casualties. 7. NATO troops occupy Sakhalin with its oil and gas fields. The transition of the gas and oil industry, as well as the pipeline system of the Russian Federation under international control. For US State Department, US Department of Defense, CIA, governments of NATO member countries Secretary of State D. Kerry, US Secretary of Defense Ch. Hagel, CIA Director D. Brennan
IV phase of the war. Political and Economic Transformation of Russia 8. V. Putin′s displacement. 9. Creation of the Government of National Unity (Salvation). 10. Dismemberment of Russia. The secession of the Caucasus, the proclamation of the Siberian and Far Eastern republics, independent Tatarstan – US bases will be located there.
11. Taking the resources of Russia. For: US State Department, CIA. Secretary of State D. Kerry, CIA Director D. Brennan
April 11, 2022, Moscow TV Channel 24 President Putin′s official declaration of war on the United States. “Our special military operation is meant to put an end to the unabashed expansion [of NATO] and the unabashed drive towards full domination by the US and its Western subjects on the world stage. This domination is built on gross violations of international law and under some rules, which they are now hyping so much and which they make up on a case-by-case basis. ” Sergey Lavrov, Russian Foreign Minister
Putin and his “The Boomerang” Operation
A former KGB Lieutenant Colonel Vladimir Putin, President of Russia. KGB spy under cover in Dresden in 1985-1990, East Germany, trained illegal KGB spies, who worked then in the West as KGB recruiters, terrorists and sabotage specialists (in case of war against Russia).
He left KGB intelligence in 1991, but in 1998 he was back as the FSB (KGB counterespionage successor) Director with the help from former KGB officers inside FSB who opposed secretly President Yeltsin. On December 20, 1999, Putin made a following televised statement:” I’d like to report, that a group of undercover FSB officers in the federal government is coping with its mission, and that’s the first stage”. In fact, that meant, that by December 20, 1999, Putin has illegally established his personal full control on the government and the Kremlin as a result of a secret anti-government conspiracy. The second stage of Putin’s criminal activity was the removal of a legal President Yeltsin. Putin presented him with FSB documents on Yeltsin’s daughter who was stealing the federal budget money. In return Yeltsin asked immunity for his family, and Putin granted it. On December, 31, 1999, Yeltsin declared his resignation on national TV and named Putin his successor.
Putin said once that collapse of the Soviet Union in 1991 was the "tragedy of the century" and named the USA a “killer”. Now comes revenge – "the Boomerang" operation and the "New Russian World Order" or a "controlled chaos” strategy – Putin's “new world order” to be established through the international chaos, permanent wars, civil wars and coups. My definition : "Controlled chaos” strategy – geopolitical re-division of the world by provoking riots, revolutions, civil wars and overthrowing regimes in independent from Russia sovereign states to establish the Russia's world hegemony. Political, national, religious and social conflicts in target countries have to be permanent. The strategy is being covered by a "struggle against international terrorism". The operation is preceded by information war against the target regime and backed by the Russia military forces if necessary. Inside USA the strategy is used to provoke a total USA collapse – that’s why Putin recruited Trump and got the Oval Office for him. That’s what Putin is going to repeat in 2024 throwing as many billions of dollars as necessary. The 1st stage of the operation: the recruitment of D. Trump. The 2nd stage: the division of Americans along racial, social and political grounds. Executed by Trump during his "presidency". The 3rd stage : American civil war between Trump supporters (racists, fascists) and the people. First two stages completed. The third one started with Trump's defeat in the presidential election and his refusal to surrender power in a peaceful constitutional way. The January 6, 2021 proved "The Boomerang " is in full progress. It’s time to put an end to Putin’s illegal power, unlimited dictatorship and permanent threats to use nuclear weapons against USA and its allies, remove him from power and re-establish democracy in Russia.
Putin and 9/11: pancake collapse
1929, Russia 9. 11. 2001, New York
Note: pancake collapse refers to a structural collapse where the collapse occurs from the top down as upper floors settle into lower floors of a building. This type of collapse is called as such because the collapsed floors result in what appears as a stack of pancakes. Soviet dictator Joseph Stalin ordered to blow up churches throughout the country. The organizers of the work were the NKVD (later renamed the KGB), and the military miners. The problem was that the church, as a rule, was located in the city center, where the buildings of the local government and the city committee of the Communist Party were also located in close proximity. It was necessary to blow up the church so as not to damage these buildings. NKVD/KGB officers invented and proposed to use a special method – you have to use explosives in such a way that church building collapses on a limited space- this was called the "pancake effect. " The same KGB technicians blew up the Twin Towers on Putin's order. Compare these two photos and you will know who is behind the murder of 3, 000 Americans.
Nobody investigated Russian trace in 9/11 tragedy, because not many people ever heard about Alexander Sakharovsky (1909-1983), Colonel General, Chief of KGB First Directorate (espionage) in 1956-1971. "The father of international terrorism", he oversaw the KGB foreign intelligence division during some of the key events of the Cold War, including the Cuban Missile Crisis and JFK assassination. He stated, nuclear arms have made military force obsolete, terrorism should become KGB main weapon. The airplane hijacking was his invention – most planes were hijacked worldwide by the KGB-financed Palestine Liberation Organization.
Putin and Wikileaks
July 22, 2010 Putin's asset and a “liberal hero” Wikileaks Julian Assange hacked my correspondence with the "Stradford" company, engaged in international espionage. Putin got my “The Professional” espionage system. Next Putin’s target was presidential candidate Hillary Clinton, Trump’s rival. Hillary Clinton said the WikiLeaks founder Julian Assange, whose website published hacked emails from her 2016 presidential campaign, must “answer for what he has done. ” I agree.
CIA is working for Russians September 1, 1995 On September 1, 1995, John Deutch, the only Russian CIA Director, the only one who was under CIA and Pentagon for security breach investigation, ordered to recruit me and they did it in New York, at Millenium Hilton, suite 3111. I had to spy for CIA and FBI on the White House, the U. S. Congress, and to use my skills as KGB “Nabat” anti-terror group sniper to assassinate American politicians. Three red flags are enough to triangulate a "mole" and here we have five for KGB asset Mr. Deutch:
1. Two days after Deutch retired from the CIA, on December 16, 1996, technical personnel discovered at his house highly classified information stored on his unclassified computer, loaded from his agency computer. He refused to explain why he violated strict security rules. First, Director of Central Intelligence doesn’t need highly classified data on his home computer, because he is a bureaucrat, not an analyst. Second, here we have a trick – the Internet-connected computer is accessible by anyone with some technical knowledge and you don’t have to send anything – Russians will read secret information right from your home computer. 2. In 1997 the CIA began a formal security investigation. It was determined that his computer was often connected to Internet with no security, and that Deutch was known to leave memory cards with classified data lying in his car. Deutch used his influence to stop further investigation and the CIA took no action until 1999, when it suspended his security clearances. He admitted finally the security breach and merely apologized. 3. In 1999 the Defense Department started its own investigation, and it appeared that in 1993 Deutch, as Defense Undersecretary, used unsecured computers at home and his America Online (! ) account to access classified defense information. As Deputy Defense Secretary, he declined departmental requests in 1994 to allow security systems to be installed in his residence. 4. Deutch was communicating via Internet with unknown Russian “chemist”. 5. In 2000 Senator Charles Grassley asked the Justice Department to look into the case. There was no investigation. In 2001 President Clinton pardoned Deutch. Since 2000 Deutch is MIT Professor and Director for Citigroup.
September 1, 1995, New York Most important for CIA was my special experience. In 1991-1992, as SBU (Ukrainian Security Service) illegal intelligence officer, I came to Moscow to get into Russian President Boris Yeltsin "inner Kremlin circle" to influence his decisions, extremely anti-Ukrainian at the time. I was also a former member (a sniper) of the KGB Nabat antiterror group. Operation was in progress until Yeltsin got somehow information about it. In 1992 Russia and Ukraine signed a Treaty to stop espionage against each other. I had to resign and move to Europe for my personal security reasons – Kravchuk ordered to kill me as a dangerous witness and a threat for Ukrainian-Russian relations. CIA decided to copy my Moscow operation. I was recruited by CIA and had to work as a sniper and special operations expert for CIA and FBI. I had to spy on the White House and the U. S. Congress and participate in special operations against American politicians.
Also, I, a KGB spy, had to get inside the White House and teach American presidents how to rule America and created "The Professional" system – special instructions on successful election and re-election campaigns, strategic planning and top decisions making, national security, foreign policy and diplomacy, propaganda, economy, war and special operations – full text included. I had a unique CIA status, “carte blanche”- “stay in USA as long as you want and do whatever you think is necessary”. I understood perfectly well that control over the White House and the U. S. Congress, not national security, was the CIA/FBI and the US Secret Service top priority. I also designed the world domination, “controlled chaos” and “color” revolutions strategies. But I had no intention to play Oswald-2. They′ve pressed me hard in return. Who was the target? President Bill Clinton – CIA wanted me "to stay close to him”. Besides, their targets were (are) the White House staff, the US Congress, Senators and Representatives, and even the US Congress Library, where “a lot of secret data are being stored. ” They recommended me to start with the Library of Congress. Staying in Moscow I’ve sent to the Library my The Professional System or How to Make Politics. I met Irene Steckler there, Special Assistant to the Librarian of Congress (see her business card below). From there I could go to Congress – Congress Librarian James Billington knew me as a political scientist through his Moscow representative, and could introduce me to Senators and Representatives.
Irene Steckler business card, my Library of Congress reader Identification card.
January 21, 1996, Millennium Hilton Hotel, New York
At a regular meeting with CIA co-workers, the methods of work of various special services and my participation in the training of future American intelligence officers were discussed. There was also talk about the Gestapo.
I had the idea to find Heinrich Muller, the chief of the Gestapo, who disappeared on May 2, 1945, alive or dead. I shared my plans with my interlocutors and asked for assistance in finding traces of this criminal in the USA and Latin America (in Paraguay and Argentina). A question immediately followed about exactly how and why I was planning such a "highly strange" investigation. Then the conversation turned in a completely unexpected direction. They explained to me that I shouldn't deal with the Mueller case if I don't want big problems and troubles. Moreover, I was simply banned from searching and the conversation came to direct threats. After this conversation, I had no doubt that Mueller was recruited by the CIA and after the war secretly transported to the United States, handed over all the Gestapo agents, including in the USSR, and worked for the Central Intelligence Agency as an expert on anti-Soviet operations. Thus, the memoirs of Walter Schellenberg, the head of German intelligence, who claimed that Muller was recruited by the NKVD and died in 1946 in Moscow, are a fake. In 2001, I sent an official letter to Efraim Zuroff, the "Nazi criminal hunter", the head of the Simon Wiesenthal Center in Jerusalem, and provided information on Mueller. The CIA, which will illustrate my correspondence, immediately decided to declassify the file they had on Mueller, which indicated the alleged repeated unsuccessful attempts to find this criminal. I decided to bring this matter to an end and turned to the International Headquarters of this organization in the USA. I was sent to Zuroff again, however, this time the information was called "intriguing". Here's the answer.
Dear Mikhail Kryzhanovsky, Thank you for contacting the Simon Wiesenthal Center. Your intriguing message has been relayed to Dr. Efraim Zuroff, the head of our nazi-hunting effort, who is also the director of our office in Jerusalem. Should you wish to contact him directly, his email is swcjerus@netvision. net. il. Aaron Breitbart Simon Wiesental Center International Headquarters 1399 South Roxbury Drive, Los Angeles, California 90035Tel. 310 553. 9036, 800 900. 9036 (toll-free from within the U. S. ), 310 553. 4521 (fax). In 2011, Melissa Hooper, an employee of the Wiesenthal Center branch in New York, reported that repeated appeals to the CIA leadership about my information turned out to be fruitless.
Then I decided I would never involve myself into anti-American crimes. I left. CIA tried to get me back and blocked my family reunion for 10(ten) years. I've sent information to Senator Hillary Clinton and she helped me to bring family here.
June 20, 2001 Three months before the September 9 terrorist attacks, which claimed the lives of 3, 000 people, I sent a letter about the complete collapse of the US national security system, the criminal activities of the CIA and the FBI to the US Congress. No answer.
At the same time, I've sent a letter to the U. S. Senator Hillary Clinton and asked her to help me with my family reunion, blocked by CIA + FBI + Secret Service. She responded fast, she was scared and she didn’t ask a single question about the CIA-FBI conspiracy and my job.
August 23, 2001 I received a letter signed by Hillary Clinton, in which she promised to help me with my family.
United States Senate, Washington, DC August 23, 2001 Dear Mr Kryzhanovsky, Thank you for contacting my office for assistance. The trust and confidence that your request for assistance represents is very important to me. A Constituent Liaison has been assigned to handle your matter and you should be hearing from my office very soon. Sincerely yours, Hillary Clinton
In one year Hillary Clinton helped my family to come to USA. She didn’t know what to do for half a year, and I had to inform her chief of staff on CIA-FBI-Secret Service conspiracy, and the fact that I've saved her husband's life. So, he had to fight and she won.
September 12, 2002
Unite States Senate, Washington, DC September 12, 2002 Dear Mr. Kryzhanovsky, Thank you for contacting my office for assistance with your matter. I have contacted the Immigration and Naturalization Service at Nebraska Service Center on your behalf – attached is the response to my inquiry. I hope this information will be of help to you. If I can be of further assistance to you, please do not hesitate to contact my office again. Sincerely yours, Hillary Clinton
June 20, 2001 I’ve sent a letter to President George W. Bush about the CIA and the FBI with recommendations for reforming the national security system. The president thought about it for a year, In the end, the US President decided not to touch either the CIA, the FBI, or the Secret Service for the time being, although it was about anti-American activities and political assassinations. Bush gave instructions to send my materials to the Department of Justice, to which the FBI just reports. Of course, FBI Director Robert Mueller blocked the response and destroyed the papers. They didn't tell me anything, making it clear that it was better for me to continue cooperation. Here’s the answer I got from President Bush who paid no attention to my information, did not take any steps to improve the national security system and allowed the terrorists to kill 3. 000 Americans on September 11, 2001.
The White House, Washington September 17, 2002 Dear Mr. Kryzhanovsky Thank you for contacting President George W. Bush for assistance with an agency of the Federal government. I am responding on behalf of the President. The White House is sending your inquiry to the Department of Justice, which will review your correspondence. This agency has the expertise to address your concerns. They will respond directly to you, as promptly as possible. The President sends his best wishes. Sincerely, Desiree Thompson, Special Assistant to the President and Director of Presidential Correspondence
In 2006, Bush decided to “support” me. They sent me this platinum card for "The Professional" System. PLATINUM MEMBER
Mykhaylo Kryzhanovsky Member number 567192584-Q415 Member Since 2006
This Platinum Card has been issued to the bearer by the Republican National Committee in recognition of an extraordinary level of commitment to the Republican ideals and values. It is therefore my distinct privilege as Chairman of the Republican National Committee (RNC) to present you with your 2006 Republican Party Platinum Card on behalf of President Bush and every Republican leader nationwide. Please accept this honor with my sincere thanks. Sincerely, Ken Mehlman Chairman, Republican National Committee
September 20, 2008 The NYPD Anti-Terror Department agent called me – he wanted to know who I am. I told him I worked for CIA as “Filament”. He said they “know perfectly well who am I” and he insisted on immediate meeting. I refused, it could be a set-up. Now, the question is, why CIA sent NYPD Anti-Terror top secret information on me, including my alias? Why I’m NYPD anti-terror primary target? Are they going to kill me if ordered? Ordered by whom? Conspiracy members’ numbers grew up: CIA, FBI, Secret Service, NYPD Anti-Terror. And that’s not the end.
March 20, 2010, New York I received an invitation to dinner with President Barack Obama and House Speaker Nancy Pelosi from Ian Sugar of the Democratic Congressional Campaign Committee. Here it is. "Congressmen Israel, Engel, Lowy, Nadler, Meeks, Crowley, Wiener, Murphy, as well as Speaker Nancy Pelosi and Committee Chairman Van Hollen invite you to join Barack Obama on May 13, 2010 at the St Hotel. Ridges, 2nd East 55th St.,. and 5th Avenue, New York: 6:00 pm – VIP reception 6:30 pm – Dinner The guest pays $15, 000, $30, 000 per couple (lunch and photo with the President included) Please send a check to the Committee to the address: Speaker Nancy Pelosi, 430 South Capitol Street, 2nd Floor, Washington, DC, 20003. " I contacted Ian Sugar to find out the details. It turned out that he would be very happy to see me at dinner with President Obama. The dinner is organized to raise funds for the election of Democratic Party congressional candidates. I need to send a check and arrive at the hotel St. Ridges in New York on May 13, 2 hours before the start due to security requirements.
Invitation to dinner with Obama
The plan of the ballroom on the roof of the hotel where the banquet with Obama's participation took place.
It was a setup. One and a half months left before the event, during this time the Secret Service will make a list and check the accounts of all those invited. There will be no problems for me with FBI and the CIA, who organized the invitation, most probably.. But who was the customer and why was Obama chosen as the target? Could be Trump, a racist who hated Obama and sought to remove him from the White House. Probably, FBI and the CIA expected that having received such an unusual invitation, I would come there on May 13 purely out of professional interest. If I come, somebody might kill both me and Obama by planting weapons on me. In response, I made a short training video, a simulation of my actions if I would have to sign up for suicide. I would buy a Sig Sauer in New York, which the Secret Service is armed with, I would practice in the woods outside the city to get used to the gun. Then, on May 13, I would come without a gun, quickly "turn off" one of these fat boars who call themselves "special agents", snatch a weapon from him and do the job. But I wouldn't have left alive. On March 21, 2010, New York, I sent a fax to Obama with a description of a possible assassination attempt. After that, the CIA instructed the Secret Service to look for me all over New York.
It was a setup – they could eliminate the target and blame me..
June 28, 2010 Putin targets Hillary Clinton. FBI arrested in New York, Massachusetts, Virginia and New Jersey 10 Russian illegal spies. All were charged as agents of a foreign government ((Russia) and were not registered with the Dept. of Justice, 5 years in jail. Also, all of them except Anna Chapman, were charged with conspiracy to commit money laundering, up to 20 years in jail.
In 2007-2010 Alan Patrikof, a financier, a close friend of Clintons, a sponsor Hillary Clinton's election campaigns, had business contacts with vice president of accounting firm "Morea Financial Services, Inc" (120 Broadway, #1016, New York, NY 20271, 212-608-1080) an SVR illegal Cynthia Murphy ( Lydia Gurieva). So, the whole group was working for Cynthia Murphy who was trying to get access to Hillary Clinton.
“Daily News”, 09. 30. 2010 :”One of the accused Russian sleeper spies may have been trying to worm her Murphy worked at a downtown financial firm that appears to have put her in contact with Alan Patricof, a New York venture capitalist and top Democratic donor who was a finance chairman of Clinton's 2008 presidential campaign. Murphy reported to Moscow that through work, she had met a financier who was "a personal friend" of a current cabinet official and an active political fundraiser. ” On July 9, 2010 they were exchanged for garbage, 4 defectors convicted in Russia.
October12, 2010 I’ve got confidential information that two Secret Service teams were hunting me all over New York City: team #1 (two guys) and team #2 ( two guys and a woman).
They traced my computer, but I got tired of hiding any way, I called the Secret Service New York Office, and met with two agents who introduced themselves as John and Brat (tel. 646-842-2107). They were not going to arrest me, but I was very lucky that it was them, group number 1 agents from Washington, and not group number 2, who found me, which could have ended up very badly for me. I said, that if they were going to plant a sniper in the house opposite and kill me, I wouldn't run away. The agents had no comment and Brat told me that they knew I worked for the CIA and what I was doing there, and now they might offer me cooperation. He also asked me if I was going to kill Obama and asked me to remove the video from the network so that it would not serve as an instruction for terrorists. "They got very nervous and asked me to slow down and stop talking if I don’t want problems. Next day, I was informed that team #2, armed with handguns, broke into my wife’s apartment, searched it and interrogated her in a very rude manner, ordered her to keep their visit secret, took her PC and left. They left business cards and asked my family members to call if they saw me. Chris Lienemann, special agent, tel. 718-840-1263 Susan Klemm, special agent, tel. 718-840-1448 Gene Gurevich, special agent, tel. 718-840-1305 Address: 335 Adams Street, 30th floor, Brooklyn, NY 11201
Soon after that my wife (we were separated) had a stroke and in 2013 she died.
June 8, 2010 I’ve informed on my situation the U. S. Special Counsel Patrick Fitzerald, but possible assassination attempts on Bill Clinton and Obama were not Patrick Fitzerald business.
U. S. Office of Special Counsel 1730 M Street, NW, Suite 218, Washington, DC 20036, 202-254-3600 RE: OSC File No: HA-10-2641
Dear Mr. Kryzhanovsky,
This letter is in the response to the complaint you filed with the Office of Special Counsel (OSC) regarding the Hatch Act. Specifically, you allege, that Mr. Leon Panetta [CIA Director – M. K. ] violated the Hatch Act through his role in the "Millenium Hilton" operation.... We are closing our file without further action. The Hatch Act (5 U. S. C. p. p. 7321-7326) governs the political activity of most federal executive branch employees.... Your allegation that Mr. Panetta is involved in a CIA-FBI conspiracy, which you call the "Millenium Hilton" operation, even if true, is not the activity that falls within the prohibitions of the Hatch Act. Therefore, we are closing the above referenced file. Sincerely, Erica S. Hamrick, Deputy Chief, Hatch Act Unit
I’ve called the White House and sent e-mail to Barack Obama, telling the whole story and saving his life in such a way. Obama made a mistake – he asked Secret Service to look into the case. And Secret Service sent a team to kill me.
January 20, 2011, Brooklyn, New York FBI special agent Eric Perry, (tel. 718) 286-7100, New York), informed me that my actions made "high authorities, people on the very top extremely nervous". He didn't explain if it was FBI Director Robert Mueller or CIA Director Leon Panetta but we understood each other well. Perry said I better disappear if I don’t want to end up at FBI jail, which means a total secrecy and a special attitude, which means tortures and murders of the victims who disappear into nowhere, which means Guantanamo Bay detention camp.
Am I the US “most dangerous”?
September 10, 2011, New York An anonymous person appeared online (Facebook nickname "Simple”). – Hi, Mike. There are people who support you. – Hi. And who are you? – It doesn't matter. I've dug up some stuff here, opened couple of files... It turns out, you are included in the list of the 25 most dangerous individuals who are constantly monitored by the FBI, the CIA, the NSA [National Security Agency – MK] and even the Defense Intelligence Agency (DIA). Don’t worry, my computer protected, because I work at a special place. Do you know about all this? – No. And how did you get the files? – I hacked it when I stayed in the office after work, although I may get into trouble for it if they find out. But I did it anyway. – Can I see full information? – You know, I didn't get too far, it's dangerous. I say what I saw. – I wonder why the DIA has got a case on me? –Aren't you afraid of the others? " You should be. You know what? The US intelligence community is a rare mess, everyone is doing someone else's double work, and everyone is working poorly. Interns like me can get into top secret files and no one could see. A mess. So I did it. – Anyway, I don't understand what RUMO has to do with it. – To be honest, I myself do not understand why so many special services are so interested. Although... a former KGB officer who does whatever he wants in the States – I'm surprised they don’t have your “Wanted” picture at every police station. – Can I look at the files sometime? – I'll see what I can do. I'll be back.
He never contacted me again. Now the conspiracy members’ numbers grew up: CIA, FBI, Secret Service, NYPD Anti-Terror, NSA, Defense Intelligence Agency.
February 6, 2011 “Mr. Kryzhanovsky: The New York City Commission on Human Rights does not have jurisdiction over the agencies you take issue with. Talk to Attorney General, the CIA, The US Congress”. Cliff Mulqueen, Deputy Commissioner/General Counsel, New York City Commission on Human Rights”.
Trump to compromise ( and assassinate? ) Obama
April 12, 2012 Donald Trump hated President Obama, the press daily covered his aggressive anti-Obama campaign, the purpose of which was to remove a "non-citizen" of the United States from power by impeachment. Trump was actively assisted by the author of the popular and influential radical conservative blog WorldNetDaily (WND), Jerry Corsi, who represented WND at press conferences in the White House. He created three bestsellers on the topic proposed by Trump – "The Obama Nation", "Unfit to Govern" and "Where is the birth certificate? (In 2018, Corsi was subpoenaed by the Mueller special counsel investigation over his contacts with former Donald Trump adviser Roger Stone and foreknowledge of WikiLeaks releases of stolen Clinton emails (WikiLeaks again – Putin’s asset Assange again! ). Corsi claimed that he turned down a plea deal with Robert Mueller, and denied any such contacts or knowledge. Draft court documents showed that he emailed Stone several times, updating him about impending WikiLeaks releases of stolen emails. Corsi read my materials that Obama was not who he claimed to be, so, he offered to meet and discuss some business.
Corsi business card Corsi brought his latest book with an inscription and we discussed both his and my investigation of the biography of the first black president of the United States. At the end of the meeting, he promised me a profitable and important job.
May 20, 2012, New York Corsi brought a conspiracy plan. I had to make a fake – I had to go to Russia and find two former KGB intelligence officers in Moscow who had to confirm in writing my statement about Obama's connection with Russian intelligence. The documents compiled by them could be signed with pseudonyms. I bring these papers to the USA and receive $50, 000 (fifty thousand dollars) from the "sponsor" – who? I would never do this, so I’ve explained that I was under constant surveillance by the CIA and the FBI, who would not allow me to leave the country under any pretext. Corsi was very upset and I understood him perfectly. If Trump was willing to pay me $50, 000, then Corsi could get at least a million for a political scandal. Corsi also asked me about my experience as a sniper of the anti-terrorist group of the KGB "Nabat". I was waiting for him to suggest that I remove Obama. In the end, we agreed on the next meeting, which did not take place. After that, I realized who was the customer of the operation to eliminate Obama with my participation. Trump. Now the conspiracy members’ numbers grew up: CIA, FBI, Secret Service, NYPD Anti-Terror, NSA, Defense Intelligence Agency, Corsi, Trump.
Secret Service wants Putin dead?
July 30, 2012, New York A very strange meeting with Secret Service Special Agent Jason Pietramica and his partner, tel. 718-840-1000, New York office. He was nice and promised to help me and give me a job. Then he asked me some very strange and suspicious questions: What are my political views? Do I visit places where Bill and Hillary Clinton appear in public? Do I plan to see them, contact Bill and Hillary Clinton? And the most interesting was the question (suggestion) about my possible trip to Moscow. If such a question is being asked a former intelligence officer and sniper, it is clear that we are talking about a political murder, including the murder of President Putin. I answered “No” to all the questions.
The last sheet of one of the documents on the US Secret Service letterhead that I signed. It is important that it is compiled and also signed by the special agent of the Service (SA/USA) Jason Pietramika.
August 29, 2012 Now comes James Clapper, then Director of National Intelligence. I contacted his assistant William Shea (williams1@dni. gov), informed him about the meeting with Pietramika. Shi promised me to look into it. He asked the CIA about me, called me later and advised me to return to the CIA and the FBI. He said, "I am no longer authorized to speak to you. Good luck. " Looked like James Clapper was scared to death – why? Another Putin’s asset? Now the conspiracy members’ numbers grew up: CIA, FBI, Secret Service, NYPD Anti-Terror, NSA, Defense Intelligence Agency, Corsi, Trump, Clapper.
Anti-Hillary operation
Putin is like Stalin – he never forgets and never forgives attacks on him or his Russian empire. Stalin said once: ”There is a guy and there is a problem. There is no guy – there is no problem”. Hillary Clinton was a very serious threat to Putin’s personal power, so, she had to be killed.
01. 06. 2008 Speaking in Hampton, Hillary Rodham Clinton said:”… he (Putin) was a KGB agent. By definition he doesn’t have a soul. ” Putin’s answer was a pure abuse : “At a minimum, a head of state should have a head”
2011
Putin was sure Secretary of State Hillary Clinton was behind mass protests in Moscow against his regime in December, 2011. He declared: “She said they (elections) were dishonest and unfair, she gave a signal to demonstrators working with the support of the U. S. State Department”. We need to safeguard ourselves from this interference in our internal affairs”. He considered her actions were a grave threat to his own survival. Putin was genuinely angry, he was ready to ‘remove” her.
September 11, 2016, New York
Remember what happened to Hillary Clinton that day? This fact might explain the strange and suspicious questions Secret Service agent Pietramika asked me. Memorial ceremony for those who died as a result of the September 11, 2001 terrorist attacks. US presidential candidate Hillary Clinton left the ceremony just an hour and a half after it began, after which a statement was published saying: "During the ceremony, she felt overheated, so she went to her daughter's apartment and feels much better. " Let's also recall that the rival presidential candidate Donald Trump and his deputies constantly raised questions about Clinton's health as a potential problem. I have a strong suspicion that Trump and his people in CIA and the US Secret Service poisoned Hillary Clinton. It is possible that these were the same employees who tried to eliminate me earlier- Gene Gurevich, Suzanne Klemm and Chris Lieneman. And this is the KGB instruction Putin could give Trump to remove Clinton.
Instruction on KGB staged murders technology which I wrote for CIA back in 1996
Staged accidents : suicides, catastrophes, drowning or fall, robbery or rape followed by murder, technical accident (fire, electricity, gas), drugs, weapons, poison, explosives misuse. Also, staged natural death (stroke, heart attack, chronic illness as a result of special technical devices like irradiation). For staged accidents you can use acetone (absorption of large quantities via either the respiratory or gastrointestinal tract results in decreased respiration, stupor and death); carbon monoxide — acetylene gas, illuminating gas (coal gas), automobile gas, furnace gas; or a simple novocaine + coffee combination. In some cases nonbacterial food poisoning is suitable. Staged botulism is effective, too. Some cases demand usage of poisons, both organic — like concentrated nicotine that enters the body through skin and inorganic — arsenic, thallium, cyanides. Any poison could be mixed with an agent that enters the body through the skin and takes anything with it.
March 5, 2014 Hillary Clinton compared Putin's aggression in Ukraine to actions taken by Nazi leader Adolf Hitler outside Germany in the run-up to World War II. It was a severe blow to Putin’s image in Russia and the revenge was inevitable.
October 20, 2016 Presidential debates, Trump-Hillary Clinton. Trump. “He (Putin) said nice things about me. He has no respect for her, he has no respect for our president (Obama) and I’ll tell you what, we’re in very serious trouble. ” Hillary Clinton: ”Well that’s because he’d rather have a puppet as president of the United States. ” Trump was wasn’t just angry after that – he was scared to death of this statement.
I helped Trump to win
I decided to drive Putin into a trap and “invite” him to personally intervene in American politics at the highest level. In response, the United States and its NATO allies could organize a complete blockade of Russia and force Putin to resign. Putin and I graduated from the same KGB Intelligence Institute, both worked in political intelligence, and I knew for sure that he would fall into my trap. Unfortunately, CIA, FBI and NSA had no idea of my personal operation and as a result of it, Putin's asset, Donald Trump, came to power. Putin invested in him no less than $3 billion, I think.
So, this is the story.
September 4, 2012 My meeting with Pietramika had a consequence. I’ve sent a letter to the Administration of the President of Russia Putin and warned that it was possible that his assassination was planned by CIA and the US Secret Service. Along with this, I suggested that Hillary Clinton's candidacy as president of the United States may not be the best for Russia, since she has connections with American politicians and generals who are "hawks. " So, I've helped Russian President Putin to steal the inevitable victory from the people's presidential candidate 2016 and Putin’s personal worst enemy – Hillary Clinton. I brought to power American Hitler, Putin's asset Donald Trump who's going to terminate the United States.
Putin answered pretty fast.
From: President of The Russian Federation
Executive Office
Directorate for Communication
Ilinka str, 23/16, Moscow
September 18, 2012
#A26-16-545097
To. M. Kryzhanovsky
We inform you the letter to you've sent via e-form was received by the President.
The letter has been sent to the Federal Protective Service
A. Maksukov Adviser, Directorate of Communication
Attention.
The Federal Protective Service (FSO) is a federal government agency concerned with the tasks related to the protection of several, mandated by the relevant law, high-ranking state officials, including the President of Russia, as well as certain federal properties. FSO includes the Russian Presidential Security Service. The FSO
has roughly 50, 000 uniformed personnel plus several thousand plainclothed personnel and controls the Cheget that can be used in the event of global nuclear war.
It also operates a secure communications system for senior government officials. The FSO is a powerful institution with a range of rights and powers, including the right to conduct searches and surveillance without warrants, make arrests, and give orders to other state agencies.
FSO includes Special Communications and Information Service of Russia (Spetsviaz or SCID).
It is a cryptologic intelligence agency of Russia responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting Russian government communications and information systems, which involves information security and cryptanalysis/cryptography. It is the equivalent to the United States National Security Agency.
Earlier I've sent the same letter to Sergey Naryshkin, Russian Duma (the parliament) Speaker, KGB spy in 1978-1982, a former Putin's Executive Office Chief in 2008-2011.
He sent the letter to FSB (Russian Counterespionage Service) Chief Alexander Bortnikov, because I've mentioned a possible threat of Putin's assassination by the Secret Service team.
I was against the elimination of Putin and the war with Russia, so I appealed to the Russian Parliament (the State Duma), which instructed the Federal Security Service (FSB) to deal with this issue. The FSB is engaged in the fight against espionage and terrorists. Here is the answer from the FSB.
Federal Security Service of the Russian Federation (FSB), Public Relations Center, Moscow July 10, 2013 To: M. Kryzhanovsky
Dear M. Kryzhanovsky, Your appeals to the State Duma dated June 12 and 13, 2013 have been considered. The information provided will be taken into account in the work. Head of the Center N. N. Zakharov
After that Putin decided to support his friend and his asset Donald Trump to beat Hillary Clinton during 2016 presidential election. This document is the best and the only evidence Putin through FSB and FSO interfered (and will interfere) in the US elections until he is dead – the sooner, the better.
How I've trapped Putin’s FSO
September 18, 2012 Putin ordered FSO to start working on the case (see letter above). April 8, 2014, I asked FSO if they have any problems with my case. Once again, Putin ordered FSO to work against Hillary Clinton and they answered me that my information "is not in their competence", they have nothing to do with it (! ) Remember, FSO includes the Russian Presidential Security Service? Good. Do you know what that means? That means that a top secret FSO is working on the case 24/7!
Federal Security Service of the Russian Federation (FSO) Moscow April 22, 2014 On the appeal of 08. 04. 2014 Kryzhanovsky M. I.
Dear Mikhail Ivanovich!
Your appeal of April 8, 2014 has been considered. The stated information is not included in the competence of the Federal Security Service of the Russian Federation. Head of the division N. N. Musinsky
Federal Security Service of the Russian Federation (FSO) of Russia, Moscow May 23, 2014 On the appeal of 27. 04. 2014 Number K-123, K-122 Kryzhanovsky M. I.
Dear Mikhail Ivanovich! Your appeal dated April 27 and 28, 2014, has been reviewed by the Federal Security Service of the Russian Federation. Your information contains a question to which a written answer was given on the merits of a previously sent appeal, while no new arguments or circumstances are given in the appeal. In accordance with part 5 of Article 11 of Federal Law No. 59-F3 of May 2, 2006 "On the procedure for applying to Citizens of the Russian Federation", we made a decision on the groundlessness of the next appeals and the termination of correspondence with you on the issues set out in the appeals. Acting Head of the department A. Y. Sorokin
Now comes FOS letter #2. They wished I gave them more information on the case, as they work 24/7 preparing the operation.
What happened next? Putin decided to cut presidential candidate Hillary Clinton’s chances in 2016 and place his asset Trump in the White House. He appointed these two chiefs to be in charge of the Hillary-2016 project: Dmitriy Kochnev, FSO Director, and Alexey Mironov, the Special Communications and Information Director.
According to this plan FSO : 1. Had penetrated the servers of the Democratic National Committee and Debbie Wasserman Schultz, the DNC chair, Clinton campaign chairman John Podesta in person, whose private emails were published by WikiLeaks in the days leading up to the Democratic convention. Putin called the hacking and release of nearly 20, 000 emails from the DNC "a public service". The e-mails the DNC's favoritism of Hillary Clinton over Bernie Sanders published by Wikileaks compromised Dems' leaders and Hillary too. 2. Hacked Hillary Clinton's personal phone and computer. All information was transferred straight to Trump who got the possibility to correct his strategy. And leaked to the public. 3. Hacked the 2016 elections. How? First, the attackers probed election offices well in advance in order to find ways to break into their computers. Second, closer to the election, when it was clear from polling data which states would have close electoral margins, the attackers spreaded malware into voting machines in some of the states, rigging the machines to shift a few percent of the vote.
On top of it, Putin used his asset Assange, who, as you know, hacked me too. March 16, 2016 WikiLeaks launched a searchable archive for over 30 thousand emails & email attachments sent to and from Hillary Clinton's private email server while she was Secretary of State. The 50, 547 pages of documents span from 30 June 2010 to 12 August 2014. 7, 570 of the documents were sent by Hillary Clinton. The emails were made available in the form of thousands of PDFs by the US State Department as a result of a Freedom of Information Act request. More PDFs were made available on February 29, 2016, and a set of additional 995 emails was imported up to February 2, 2018.
Trump’s recruitment
1st blackmail : Putin used this information and Trump and mafia.
ATTENTION : 5 mafia families control New York, and Trump cooperated with most of them.
That makes me think that he has his own crime family. Why not?
The Bonanno crime family : Brooklyn, Queens, Staten Island, and Long Island. The family also maintains influence in Manhattan, The Bronx, Westchester County, New Jersey, California, and Florida, and have ties to the Montreal Mafia in Quebec.
The Colombo crime family : Brooklyn, Queens, and Long Island. The family also maintains influence in Staten Island, Manhattan, The Bronx, New Jersey, and Florida.
The Gambino crime family : Brooklyn, Queens, Manhattan, Staten Island, and Long Island. The family also maintains influence in The Bronx, New Jersey, Westchester County, Connecticut, Grand Rapids Michigan, Florida, and Los Angeles.
The Genovese crime family: Manhattan, The Bronx, Brooklyn, and New Jersey. The family also maintains influence in Queens, Staten Island, Long Island, Westchester County, Rockland County, Connecticut, Massachusetts, and Florida.
The Lucchese crime family operates mainly in The Bronx, Manhattan, Brooklyn, and New Jersey. The family also maintains influence in Queens, Long Island, Staten Island, Westchester County.
And the facts are :
1. Trump bought the property that his Atlantic City casino Trump Plaza would one day occupy -- for twice market price -- from Salvatore Testa, a Philly mobster and son of one-time Philly mob boss Philip "Chicken Man" Testa. Testa and a partner, who together headed a Philly mafia hit-squad called the Young Executioners, bought the property for "a scant $195, 000" in 1977. In 1982, Trump paid $1. 1 million for it. The casino was built with the help of two construction companies controlled by Philly mobsters Nicademo "Little Nicky" Scarfo and his nephew Phillip "Crazy Phil" Leonetti ( data оf a New Jersey state commission′s 1986 report on organized crime).
2. In Manhattan, Trump used the mob-controlled concrete company S&A to build Trump Plaza condos. Anthony "Fat Tony" Salerno, head of the Genovese crime family, and Paul Castellano, the don of New York′s Gambino family, controlled S&A ( according to federal court records).
He built the Trump Tower out of concrete, instead of steel, at a time when the mafia controlled much the concrete industry. Trump and Salerno were both represented by high-power attorney Roy Cohn. On at least one occasion Trump and Salerno had a sit-down in Cohn’s apartment. Trump has denied this claim in the past.
3. Trump was a target of a 1979 bribery investigation and was questioned in a 1981 racketeering probe, but neither federal investigation led to criminal charges.
4. Trump sent lawyer Harvey I. Freeman, to negotiate with Ken Shapiro, the “investment banker” for Nicky Scarfo, the especially vicious killer who was Atlantic City’s mob boss ( according to federal prosecutors and the New Jersey State Commission on Investigation).
5. Scarfo, whose reign as head of the Philly mob was one of the bloodiest in history, controlled the bartenders union, which represented Trump’s workers in Atlantic City.
6. Gambling addict and racehorse trader Robert LiButti would frequently refer to gangster John Gotti as “my boss. ” His gambling losses scored over $11 million to Trump’s casino between 1986 and 1989. Trump said that he knew that LiButti was a high roller in the town but never actually knew him and “had nothing to do with him. ” But that’s not what Trump Plaza head Jack O’Donnell, said, “It isn’t like [Trump] saw LiButti once or twice—he spent time with him, saw him multiple times. ” O’Donnell said that Trump also attended LiButti’s daughter’s birthday party. It’s illegal for casinos to give high rollers money to gamble with, but the above mentioned commission also found that Trump Plaza gave LiButti $1. 65 million in gifts and cars. Trump also bought a $90, 000 horse from LiButti for $250, 000.
They said that Libutti ‘was in Donald Trump’s pockets’ – meaning Libutti knew of serious rule violations at the Trump casino that would interest the regulators. Had these claims been investigated and proven, they would surely have cost Trump his casino license, but Trump’s relationship with Libutti was just another part of his long history of flouting the supposedly strict regulations of New Jersey casinos.
7. One of Trump’s attorneys at the time was Roy Cohn who also had mob clients including Anthony “Fat Tony” Salerno, who owned a cement company. Former Trump Organization executive Barbara Res said that Trump would pull out a photo of Cohn and threaten to sue people and tell them who his lawyer was. Trump denies it, however. Cohn and Trump also had a tight relationship with Teamsters official John A. Cody, who had ties to mob bosses Carlo Gambino and Paul Castellano, a Justice Department memo from 1982 outlined.
2nd blackmail: Putin used this information on Trump’s set-up in Moscow
November 2, 2013, Moscow Trump came to Moscow for his Miss Universe 2013 pageant and stayed at Ritz Carlton. Trump hired prostitutes to perform a "golden showers" (urination) show in front of him", "defiling" the presidential suite bed in which the Obamas had previously slept. It was a set-up, a regular one. 1. Russian SVR (Foreign Intelligence Service, former KGB) starts a file on any American citizen with big money and political connections who talks positive about President Putin. ATTENTION : SVR has files on all American politicians who make statements on their possible run for the U. S. President. Trump made such statements and he was running for the President in 2000. 2. SVR file on Trump appeared in 2008 with the purpose of his recruitment and receiving political information from his multiple sources in the U. S. Congress and the White House. 3. SVR officers under cover of the Russian Consulate diplomats met Trump in New York City in 2012-2013 and made him a very generous offer – he can get a green light to any projects in Russia in exchange for his spying for the Russian government. Trump refused the offer. That's why Putin ordered SVR Director Mikhail Fradkov to prepare a special operation, place Trump into a compromising sexual situation, blackmail him and recruit as a secret source. 4. Prostitutes were SVR female officers – Trump was too big a target to trust the street hookers. They were instructed to play most pervert sexual games with Trump including a "golden shower", "brown shower" and "pig slave" – sorry I can't go into details, check porno sites and magazines for that, please. 5. Miss Universe 2013, the 62nd Miss Universe pageant, was held on November, 9, 2013 at the Crocus City Hall, Krasnogorsk, a suburb of Moscow, Russia. Trump came a week before and stayed at the Ritz Carlton. His Russian assistants recommended him the best Russian prostitutes ready to make him happy. Trump agreed and put himself in a trap. (On November 9, 2017, President Donald Trump's long-time confidant Keith Schiller privately testified that he rejected a Russian offer to send five women to then private-citizen Trump's hotel room during their 2013 trip to Moscow for the Miss Universe pageant, according to multiple sources from both political parties with direct knowledge of the testimony. Schiller, Trump's former bodyguard and personal aide, testified that he took the offer as a joke, two of the sources said. On their way up to Trump's hotel room that night, Schiller told the billionaire businessman about the offer and Trump laughed it off, Schiller told the House intelligence committee on November 7, 2017). After several minutes outside of Trump's door, which was Schiller's practice as Trump's security chief, he said he left. 6. After the pageant was over, SVR officers met Trump at the hotel and left a tape and a phone number. He had no choice. They were back and he signed the regular agreement: "I, Donald Trump, agree to help SVR and improve Russian-American relations. I'll sign my confidential reports with the alias "__________". November 9, 2013". I think, his alias is "Tom" – Russians like when the first letter of the last name and the alias are the same. 7. Trump is the SVR secret source since 2013. Putin met him in person and he understood that this guy might be "promoted" to the U. S. President. Putin ordered fantastic operation and the result was perfect – on November 8, 2016 Trump was elected the U. S. leader.
How Putin handles his asset Trump (KGB instructions)
"Golden" rules 1. Do not tell Trump about problems and mistakes of the agency, about your personal problems, about other agents, about his own file and compromising information you have on him. 2. Don’t show Trump any classified documents – you might provoke him to sell the information to somebody else. 3. Don’t trust Trump too much; they can use you to compromise their personal enemies. 4. Never criticize Trump – be an adviser. Don’t talk straight if he avoids cooperation or brings you garbage – just reduce or stop payments, or get rid of him. 5. You lose Trump if you don’t pay him for a job well done, ask him to "produce" fake information (to show your bosses how much great espionage activity you have going on) or if you don’t care about his personal security and his personal problems (health, career). And — never give poison to your agent for security reasons.. 6. Manipulate Trump and consider his schizophrenia symptoms. Hostility, suspiciousness, extreme reaction to criticism – Trump′s anti-media attitude. Odd or irrational statements : "We build the anti--Mexican wall and Mexico gonna pay for it". Delusions of grandeur : Trump believes that he is a unique human being (like Jesus) on a mission to save America. His malignant narcissism is beyond any explanation. Unpredictable or inappropriate emotional responses – "I can kill anybody in the street! " Trump′s behavior is bizarre – he treats women as sexual slaves. Trump′s thinking and speech are disorganized, speech speech often includes putting together meaningless words that can′t be understood – word salad. That means he′s usually promising to fix everything (healthcare, immigration, Palestinian problem) but has no idea what to do. Delusions – Trump has false beliefs that are not based in reality. One of the biggest, with no proof at all, – his false contention that he lost national popular vote because of illegal votes. Trump′s motor behavior in public is disorganized and abnormal motor behavior. His appearances are really scary because they usually end up in unpredictable agitation no matter what the question or problem is under discussion. Trump is a pathological liar, no matter what facts you have to prove he′s wrong. His statement "I never met Putin" is ridiculous after this Savage′s 2015 radio show audio was posted on the web: https://clyp. it/ijpsirbw. Trump has trouble organizing his thoughts or making logical connections. His mind is racing from one unrelated thought to another. Sometimes he has "thought withdrawal, " a feeling that thoughts are removed from his head, or "thought blocking, " when his flow of thinking suddenly gets interrupted.
Questioning Trump
This is of extreme importance – the right question brings you the right answer and top secret info. Give Trump a chance to tell and show you everything he’s brought, no matter how chaotic the story might be or how ordinary the documents look. Don’t make written notices. Don’t bring written questions even if you are talking about some advanced technology — look and be professional. Don’t let Trump analyze the information before he talks to you and don’t let him bring it in a written form – it’s usually not complete; he can lose it; or it may be stolen from him. If there are documents, he has to bring a microfilm. Ask questions — when? where? what happened? why? what’s going to happen next? After that you tell the story back to Trump and he adds details. At the end of the meeting give the agent another task and don’t ask him to bring you "something, " because he’ll bring you just that "something" and nothing else. Remember, questioning is not interrogation; do not bring another officer to the meeting because it will look like cross interrogation.
Teaching Trump Teach Trump to: – follow security rules while talking to people, working with the documents and especially meeting the officer (some foreign agencies practice open contacts with many people, hoping that the meeting with the agent won’t attract much attention — I don’t recommend that) – always stay calm in stressful situations – always keep discipline and come in time – use analytic abilities working with people and documents – ask yourself as many questions as you can
Checking Trump
You can never be sure you are not working with a "double agent, " even if he brings you top secret stuff. Besides, agents are human beings and they make mistakes — they forget about security, spend too much money, talk too much and ask extra questions; if arrested they may not play the hero but will tell everything. Anyway, you can check Trump: a. by fake arrest followed by severe interrogation. b. through provocation (tell him you know about his "double game" and watch his behavior after the meeting (it’s good to have a listening device or a camera in his house). c. by making an analysis of all the information and documents he delivers and comparing it with information from other sources. d. through other agents in the White House e. through your "mole" in counter-intelligence (if you’re lucky).
f. through technical devices (reading the mail, listening to the phone, secret searching his house and office, watching him through hidden cameras, trying surveillance in the street).
Trump’s termination (one-way ticket) It doesn’t happen often but you have to know some special situations when you have to terminate Trump: 1. Trump knows too much (talks too much) and is ready to betray you. 2. Trump is under suspicion and you can’t help him for political reasons (diplomatic, international scandal, etc. ) — in such a case an accident could be staged. It happens that the agent is too close to President. 3. Trump was involved in special operations (murders) and is dangerous as a witness. 4. Trump is trying to blackmail you. 5. You need to press (blackmail) other agents.
Trump to kill me
Putin ordered Trump to shut me up me because I talk too much. Trump ordered the U. S. Secret Service Director Alles to do the job.
May, 2017 I had a strange and rather suspicious phone conversation with a special agent of the Secret Service, Scott. He offered to meet in a cafe and talk about Trump. I insisted that only Scott be present, but he said that he would not come alone. I didn't like it and the meeting didn't take place. Six months later, I received an invitation for breakfast with Trump. Another invitation to murder?
Here’s the story which starts again with invitation I got for no reason.
November 17, 2017 FROM: Steve Wynn contact@campaigns. rnchq. com TO: MIkhail Kryzhanovsky prof777prof@yahoo. com I hope you can join us and help show the President our steadfast support.
Forwarded Message From: Ronna. McDaniel@gop. com Subject: Breakfast with President Trump
Good morning, I want to invite you to breakfast with President Donald J. Trump in New York City on Saturday, December 2. Please find the invitation with more details below. Space is limited. Please direct your RSVPs and any questions to Events@gop. com or 202-863-8646. It is going to be a wonderful event, and I hope to see you there! Ronna McDaniel, Chairwoman, Republican National Committee
November 20, 2017 I was detained at Queens Center Mall by 10 (ten) U. S. Secret Service agents. I wasn't arrested, no charges pressed. They said: "We are here because you want to kill President Trump. We handcuff you, it's protocol, we go to the office to talk". They emptied my pockets, took my medication and brought me to Elmhurst Hospital, Queens for evaluation as my blood pressure was high. There I was denied access to bathroom, handcuffed to the bed and denied my pills and the pills Dr. Wells from ER ordered for me. I asked everyone, including agents Mike and Ken, for my medication – they refused to help me. I had to die, but I’ve survived 4 hours until the doctor Wells appeared again and explained there was some problem with the pharmacy – they “forgot about the order completely”. Perfect operation! I was interrogated on my November 17 tweet "I can kill Trump" where I wrote about GOP wrong practice of sending invitations for December 2 Trump's fundraiser to everybody who's able to pay $1, 000. Agents asked if I know Putin in person, how I shoot, do I want to kill Trump. I gave negative answers. They said they briefed the U. S. Attorney on the case and are ready to arrest me and send to jail. They admitted they knew I’m CIA “Filament”, so CIA was in charge – CIA Director Mike Pompeo, who, by the way, praised Putin’s strategy in Ukraine in 2022. They got nothing. After that I was locked up in psychiatric unit from November 22 through December 6. Some miracle and special training I received in the KGB helped me survive and not go crazy in hell. They tried to put me on drugs to change the psyche and turn me into a schizophrenic, drugs that can cause deep depression and persistent thoughts of suicide. I refused and for some reason they didn't force them on me. There was an attempt to force me to recognize myself as an aggressive mental patient who needs lifelong isolation – there is a special “facility”, in the same hospital, i. e., a prison. I had to use my diplomatic skills to convince the "doctors" of the inexpediency of their plan and its danger to them. The diagnosis of "schizophrenia" was convenient for the Secret Service, since I could have been isolated more than once and still liquidated. But the doctors decided not to risk their reputation and made another diagnosis – "delusional disorder. "
After I was discharged, the agents met me again, no explanations, no apology. I’ve contacted District Attorneys in Manhattan, Brooklyn and Queens on the case – nobody knew anything. So, who stopped my murder? U. S. Attorney General Jeff Sessions? I’d like to know my savior.
Putin behind the coup-d-etat
January 6, 2021 Following the defeat of then-U. S. President Donald Trump in the 2020 presidential election, a mob of his supporters attacked the United States Capitol Building in Washington, D. C. The mob was seeking to keep Trump in power by preventing a joint session of Congress from counting the electoral college votes to formalize the victory of President-elect Joe Biden. According to the House select committee investigating the incident, the attack was the culmination of a seven-part plan by Trump to overturn the election.
KGB instructions on coup d’etat used by KGB Trump on January 6, 2020 A coup d'etat is a sudden illegitimate change of government undertaken by an organized group to displace or replace the legitimate government. The difference between a coup and a revolution is that the latter is committed as a result of protest actions (and in the interests of) a significant group of people who make up a significant part of the country's population and leads to a radical change in the political regime, which is not a prerequisite for a coup. A coup d'etat can be carried out under the leadership of one or more parties that are unable to achieve power in a different, democratic way (that is, through elections) or due to the absence of elections. A coup is also the usurpation by one branch of government (usually the executive) of all the powers in the country. A coup, like a civil war, is a last resort of politics.
Types of coups 1. "Bureaucratic" ("palace") coup. A peaceful coup, when the leader is usually replaced by a person number 2 or close in hierarchy (vice president, prime Minister, Minister of Defense, head of the special service). This "instant" coup is usually carried out on weekends. Conditions for a successful coup: – the leader is either absent from the capital (on vacation, on a visit abroad), or seriously ill ;– political (economic) crisis and growing discontent of the people;– the army either supports the conspirators or is neutral 2. Military coup. A violent (most often) coup, when a civilian government is replaced by a military one led by a dictator. It is practiced mainly in developing countries. After the "reconstruction" of the political and economic systems, the dictator can allow the election of a civilian leader, reserving the right to control the further political process. The condition for a successful coup is a prolonged political (economic) crisis, which already threatens the national security and territorial integrity of the country. 3. The "democratic" coup. Power is seized by the most aggressive (often nationalist) party. In most cases, it is carried out with the political, organizational and material support of the US State Department and special services. Conditions for a successful coup:– a real or very often provoked government crisis;– mass anti–state propaganda;– an organized and branched "democratic" movement;- provoked protests and civil disobedience (mainly in the capital) demanding the immediate resignation of the president and "fair" elections ;– the blocking of government buildings "Color Revolution" is any change of the political regime or government as a result of mass popular protests.
Flynn, Putin’s asset
December 10, 2015, Moscow
President Putin and Mr Flynn attended the gala dinner in honour of Russia's RT television network. Donald Trump’s embattled National Security Adviser led a standing ovation for Vladimir Putin during a gala. Flynn didn’t just join the standing ovation for Putin. He started it. In a video posted by the Democratic Coalition Against Trump, not only did Flynn joined in the standing ovation following Putin’s speech, but on closer examination, it’s clear that Flynn and the woman next to him led the standing ovation for Putin. Flynn had the honor, along with Jill Stein (who also joined in the ovation), of sitting at Putin’s table.
June 4, 2017 During the interview broadcast by NBC News' Sunday Night with Megyn Kelly, Putin played down his contacts with the American general: "I made my speech, then I talked about some other stuff, then I got up and left. And then afterwards I was told 'Do you know that was an American gentleman and he was involved in some things? He used to be in the security services. ' That's it. I didn't even really talk to him. " Putin also rejected as "another load of nonsense" claims that the Kremlin had any damaging information on President Trump. Putin can lie to Megan Kelly, Donald Trump, America and the rest of the world. Putin can't lie to me. So, why he lied to Megan Kelly? Do you know how many special FSO Service (former KGB 9th Department) agents protect Putin? 10, 000 (ten thousand).
And Putin tells me they had no idea who's sitting next to him at RT gala? And Putin wants to tell me they didn't inform him that Michael T. Flynn is: a retired United States Army lieutenant general; a former Director of the Defense Intelligence Agency (top U. S. military spy and top Russia's military enemy! ) ;a former Commander of the Joint Functional Component Command for Intelligence Surveillance and Reconnaissance (top of the top secret position! ); a former Chair of the Military Intelligence Board (! ) No comments. Putin, a former KGB spy, the President of Russia, didn't know he was sitting next to Russia's #1 enemy. Then he had to fire all 10, 000 idiots. No, he had to shoot them. And kill himself. But he didn't. WHY? Because Flynn is SVR (Russian Intel Service, former KGB) asset. Because sitting next to Putin was a "medal" for his treason. Because there's an old KGB tradition when KGB Chairman or even the President of the country takes picture together with the asset. That's why Vladimir Putin had no choice but to lie. More evidence? No problem.
Another attempt on my life?
January 11, 2023, New York At 6. 45 AM I was almost hit by the car at the crossing of Audley Street and Grenfell Street, Kew Gardens, Queens. It was still dark, no traffic, empty area; I saw the car going down one block to the crossing at a very high speed, above 100 miles per hour, while I was crossing Grenfell Street. In less than a second it was at the crossing, the driver did not stop and he did not signal me. The car was coming straight at me, so I had to jump to reach the sidewalk. The driver did not stop, did not slow down and after the turn he kept driving up Grenfell Street with the same crazy speed. The lights blinded me and I could not see the plates, it looked it was Honda, light blue. The actions of the driver were absolutely intentional, he tried to hit and kill me. I had my phone with me, so it was not hard to calculate my location in between small streets early dark morning with no witnesses present.
Why Trump stole top secrets
August 8, 2022 FBI agents found 48 empty document folders marked “Classified” during their raid of former President Donald Trump’s residence at his Mar-a-Lago club plus 42 empty folders marked “Return to Staff Secretary/Miliary Aide”. Agents also found more than 10, 000 government documents and photographs without classification markings. Then, DOJ said in a court filing that more than 100 classified documents were found at Mar-a-Lago. That property receipt noted that the government seized 11 sets of classified documents. The disclosed property inventory of items seized lists multiple U. S. government documents with “confidential, ” “secret” and “top secret” classification markings. Trump stole documents related to nuclear weaponry in the United States and the nuclear capabilities of a foreign country, along with documents from White House intelligence briefings, including some that detail the military capabilities of the U. S. and other countries. I can explain to you why Trump has stolen top secret documents and kept them at his house in Florida. Putin, who’s preparing for Nuclear World War III wanted to see original documents on the US nuclear weapons, not copies. Trump did it, Putin is more than happy.
June 22, 2023
The White House To: Mikhail Kryzhanovsky Thank you for contacting the Biden-Harris Administration. President Biden and Vice President Harris value every opportunity to engage with the American people, and the Administration is grateful for your outreach. Our country faces many challenges, and messages like yours help us better understand how the Biden-Harris Administration can serve American families. We take careful note of the suggestions, thoughts, questions, and stories we receive, and we’re working hard to ensure you receive an appropriate response. Sincerely, The Office of Presidential Correspondence.
July 12, 2023 Somebody hacked my Benefit card and took all my food stamps and some cash, leaving without 1 cent in my pocket for the whole month. Guess who did it.
Putin might kill Trump – why?
CIA, FBI Secret Service: Russian assets?
Look at the Kennedy assassination and tell
On November 22, 1963, Dallas, Texas, President Kennedy arrived in Dallas as part of the 1964 presidential election campaign. To improve his image, he decided to use an open limousine, thereby making the task easier for the sniper. At 12. 30 a cavalcade of cars turned onto the streets of Wayne and at that time at least two shots were fired at the president – the first bullet hit the neck, the second in the back of the head. The US Congress classified 40, 000 documents on this case for 40 years, and in 2003 extended this period until 2043.
That is, Kennedy was killed by one government organization, and the other one reliably covers up this murder. This case still affects the highest political circles and national interests of Russia, being in fact a state secret. The only organization that had the motive and opportunity to commit this crime, as well as block an objective investigation, was the CIA, which Kennedy was going to disperse after the complete failure of American intelligence during the Cuban Missile crisis of 1962. The FBI and the Secret Service were involved in the conspiracy, and only President Lyndon Johnson could give the sanction. And now the investigation is a blitz. Question. What would have happened if the snipers had missed or Kennedy had survived the injury? Why would the CIA, the FBI, the Secret Service and the politicians and big business behind them put themselves at such risk, given that the brother of President Robert Kennedy was the Attorney General and the repression could be severe, and the Kennedy clan would occupy the White House for the next 20 years? Answer. There was no risk, the method of "passive sabotage" was used. Its essence is that the signals coming to the Secret Service, the CIA and the FBI about the real assassination of the president by one person or group are blocked as "not deserving of attention" until the attempt is carried out. Then these guys will either be eliminated (if Kennedy is killed)or they are arrested as a result of a "successful investigation" (if Kennedy survives). Try to prove something. Thus, on the part of the special services, there was a collusion of only three people – CIA Director John McCone, FBI Director Edgar Hoover and Secret Service Director James Rowley, and the version of the "universal conspiracy" bursts like a soap bubble. Question. Why was Kennedy, who was not in good health (one could easily "heal"), killed in public? Or rather, why was it allowed to be killed publicly? Answer. Since then, the CIA has not been touched by any president, despite total failures, including the tragedy of September 11, 2001. The widow of President Jacqueline Kennedy, who had something to say, was afraid to mention the CIA in a conversation with Hillary Clinton, even being terminally ill with lung cancer. Here's what Hillary Clinton writes in her "Living History": "Jackie... she never spoke directly, but she implied that he [Bill Clinton-M. K. ] could also be a target. He has to be very careful, " she told me. And she repeated, "Very careful. "
August 1, 1962, Los Angeles, California
After a long struggle with the studio "twentieth Century Fox", the triumphant superstar of American cinema Marilyn Monroe signs a very rare contract of $ 1 million at that time. Following this, she "decides" to die on August 5, 1962, the suicide of the superstar and the ex-mistress of President Kennedy was attributed to a sudden attack of depression, but toxicology experts categorically disagree with this. Question. Why is the version of Marilyn Monroe's suicide untenable? Answer. Tests have irrefutably proved that the hypnotic drugs Nembutal and Chloral hydrate were found in Marilyn's blood in an amount sufficient to kill 20 people. She was supposed to take 90 capsules, but the fact is that after 10, death occurs, the heart and all other organs cease to function. 80 capsules should have remained in the stomach. The stomach was empty, which means that she was killed by injection (most likely under the nail) or by injection into the anus – she lost consciousness and died within 10 minutes. Question. Why did the CIA eliminate Robert Kennedy? Answer. In 1968, Senator and presidential candidate Robert Kennedy announced that one of his main tasks, if elected, would be to comprehensively investigate the murder of his brother. On July 5 of the same year, he was shot dead in Los Angeles by an Islamic fanatic and psychopath, Sirhan Sirhan, allegedly for "supporting Israel. " The investigation ignored the testimony of witnesses and the results of the acoustic examination of the presence of another shooter. Question. Why was the president's son removed? Answer. In 1995 The son of President Kennedy, John Kennedy Jr., publisher of the George magazine, said that he considers the goal of his life to establish the truth in the case of his father's murder. On July 16, 1999, a private, absolutely legitimate plane, which he controlled, having a decent flight time of 310 hours, fell into the Atlantic Ocean. John himself and two passengers were killed. It seems that he was poisoned, and the investigation should have checked this version, but, at the insistence of his friend, Senator Edward Kennedy, his body was cremated after a hasty autopsy, and the ashes... scattered over the ocean. Question. What about Diana? Answer. August 31, 1997 The car carrying Diana Spencer, Princess of Wales, her boyfriend Dodi al-Fayed, a bodyguard and a driver, left the parking lot of the Paris Ritz Hotel and crashed 10 minutes later. In 2005, the missing link appeared – information about Diana's contact with John F. Kennedy Jr. in 1995 at the Carlisle Hotel in New York, the same place where President Kennedy once met with Marilyn Monroe. The circle closed and everything fell into place. Even if it was a romantic meeting, John F. Kennedy Jr. couldn't help but tell her about his own investigation. Moreover, he could offer her cooperation, given that Diana was a rather adventurous person and did not show herself in search of adventures. Their conversation was recorded, and when they launched a real investigation, it was decided to eliminate them. We started with Diana. Kennedy Jr. did not draw the "right" conclusions after the tragedy, so he was also removed.
Conclusion: for the successful assassination of Trump, President Putin had to recruit CIA Director Radcliffe, FBI Director Patel, and Director of the Secret Service Curran.
Under the leadership of these traitors, these special services collect information in the United States and other countries about a possible assassination attempt on the President of the United States.
July 13, 2024 An attempt on Donald Trump occurred as a result of a shooting at a meeting in Butler (Pennsylvania) as part of the US presidential election campaign 2024. One of the bullets passed millimeters from Trump's head, shooting him through the ear. The shooting was conducted by 20-year-old Thomas Matthew Crooks with an AR-15 rifle from the roof of the building, located outside the perimeter of the security zone of the rally, from a distance of about 120 meters, the shooter managed to fire several shots, after which he was killed by a member of the counter-sniper team of the Secret Service. The shooter killed one participant of the rally, two wounded were taken to the hospital in critical condition, one person was injured in the neck.
Technology
The shooter is Thomas Matthew Crooks, 20 years old, on the day of the assassination attempt searched the Internet for information, far as Oswald was from Kennedy. His AR-15 assault rifle was equipped with a folding sight, which made the shooter less noticeable. Improvised explosive devices for remote activation were found in Crookes' car and house. Improvised explosive devices for remote activation were found in Crookes' car and house. Attention – "passive sabotage" again:
1) 1 hour before the shooting, Crooks was identified as suspicious due to the presence of a rangefinder and a backpack and informed the Secret Service about him 2) 2 hours before the start of the rally, Crooks used a drone to scout the area at a distance of 180 meters from the stage, and even broadcast live. 3) on the evening before the rally, the Secret Service rejected offers from local law enforcement agencies to use drones to ensure the security of the event, and requested their use only after the incident 4) The Secret Service was alerted two to five times before the shooting about a suspicious person, but he was not classified as a threat. 5) after such warnings, Trump was allowed on stage by the Secret Service 6) the agents of the service who directly defended the ex-president were not put on high alert after information about an obvious threat to his life 7) The Secret Service did not attend the security briefing held for local special weapons and sniper tactics groups on the morning of the rally 8) representatives of local law enforcement agencies expressed dissatisfaction with the low frequency and quality of communication with the service regarding the organization of the rally. 9) a group of snipers from the service was sent to the rally at the last moment. 10) the building from where the fire was fired was in the area of responsibility of local law enforcement agencies – their employees were located inside the building, while the shooter was located on the roof of the same building, and the law enforcement officer who was assigned to monitor the roof left his post due to the heat (! )
11) three snipers Those who helped the Secret Service were actually in the building that the shooter used during the election rally 12) the shooter originally planned to get to the performance before it started and tried to go through metal detectors, but changed his mind and left, and the police noticed his suspicious behavior. They tried to find him in the area of the rally, but could not. One of the police officers noticed a man on the roof of the building and climbed up to inspect it. The shooter saw him and pointed a gun at him, and the unarmed policeman was forced to jump off. After that, no one did anything to arrest Crooks. 13) The local police warned the Secret Service that they did not have the resources to closely monitor the building, which had an unobstructed view of the scene. But – attention – the building was built by – who?! – outside the official security perimeter during the rally (! ) 14) numerous protesters desperately tried to warn the police about the shooter at least a minute and a half before the shots rang out. 15) ATTENTION: a sniper killed Crooks a few seconds after his shots were fired, thereby eliminating not only the criminal, but also an important witness about the conspiracy against Trump. The sniper should have shot Crookes in the arm, shoulder, and leg, but he didn't do it. The exact analogy with Oswald is that Ruby kills Oswald and there was no conspiracy (! ) 16) It’s a very serious operation and that’s why there are always at least two snipers who use SILENCERS, understand?
Why Putin might decide to kill his agent Trump
KGB kills its secret sources, because he/she : 1. (Trump) is out of control and wants to stop cooperation. 2. (Trump) knows too much (talks too much) and is ready to betray you. 3. (Trump) is under suspicion, and you cannot help him for political reasons (international scandal) – in this case, an accident might be staged. 4. (Trump) participated in special operations (January 6 coup) and might talk about Putin’s involvement.. 5. (Trump) is trying to blackmail Putin or: you need to put pressure ( or blackmail) on other secret sources. ATTENTION: KGB never stops. It's military agency and that's why the order is the law, job has to be done no matter what. This time Putin just warned Trump – “you have to work for me or you’ll be punished severely”.
“The Boomerang” Operation in action: coming Civil War II
Trump insists Democrats and others will conspire against him to rig the 2024 election. “They’ll try. They’re going to be trying, ” Trump said. “But if somebody else got in, other than me, they'll go at him just as viciously as they did me. These people are sick. They will go after them and a lot of people say they won’t be able to hold up. ”
August 23, 2023 Sarah Palin called for the civil war II if state and federal authorities continue to prosecute Trump. “We do need to rise up and take our country back [and give it to Putin – M. K. ]. I think of those who are conducting this travesty and creating this two-tiered system of justice and I want to ask them, ‘What the heck? Do you want us to be in civil war? ’ Because that’s what’s going to happen, ” We’re not going to keep putting up with this. We need to get angry. ” Palin said. This is “The Boomerang’ Operation in progress – a very dangerous situation. First. Remember same provocation? This is what Trump did on January 6, following Putin’s order and KGB instructions. Second. This is Putin talking, this is Putin giving instructions to RNC and the Republican Party, which will be his pocket party soon.
August 24, 2023 Putin/Trump ready to start civil war. Former Fox News host Tucker Carlson asked twice the former president if he believed his political enemies were trying to kill him. Carlson asked about the prospect of civil war in the United States. Trump avoided the straight answer which is “yes, civil war is coming” recalled January 6, 2021 [Putin’s anti-American coup -M. K. ] He said "There's a level of passion that I've never seen. There's a level of hatred that I've never seen, that's probably a bad combination “ – and that means civil war and death of America is inevitable. Again, this is Putin talking to Americans through his asset Trump. Attention: why Trump is so important, that Republicans are ready to kill half America to save him from prosecution? Because he is important for Putin, because he supplied Putin with documents on US nuclear weapons and Putin is ready to erase USA completely. Because Putin invested in Trump again, $3. 000. 000. 000 at least, and he is not going to waste the money and his most valuable asset. And he is dead sure he will make USA disappear from the world map.
September 25, 2023 Hillary Clinton warned that President Putin will try to interfere with the upcoming 2024 election. “I fear that the Russians have proved themselves to be quite adept at interfering, and if he has a chance, he’ll do it again". Correct, Putin was trapped and pushed by me, but his money and strategy placed Trump in the Oval Office. I showed you that FSB and FSO were in charge of operation and I know for sure they are getting ready to place Trump in the Office again. Good thing, we know the enemies by their names – Putin, FSB and FSO – and we can’t let them complete anti-Biden 2024 operation! Enough is enough.
September 15, 2024 А Secret Service agent shot four rounds at Ryan Routh, who was hiding with an SKS-style rifle in shrubbery at Trump International Golf Club, West Palm Beach. He was allegedly pointing his weapon through the fence line of the golf course, 300–500 yards (250–450 meters) away from Trump, who was moving between holes five and six alongside Republican megadonor and real estate investor Steve Witkoff. Routh fled the scene, but was later arrested as the prime suspect.
Routh has pleaded not guilty to five federal charges, including attempting to assassinate a presidential candidate. Routh could be sentenced to life in prison if convicted.
August 15, 2025 Russian President Vladimir Putin said, "I'm glad to see you alive and in good health, " to U. S. President Donald Trump, when the two met for a summit in Anchorage, Alaska. Do you understand what Putin said? He said “you are alive until you follow my orders to kill America, and it’s a warning”.
September 10, 2025 Charlie Kirk, an influential right-wing activist and a close ally of US President Donald Trump, was shot dead on Wednesday while speaking at an event at a university in Utah. The suspect arrested and accused of killing conservative activist Charlie Kirk – 22-year-old Utah resident Tyler Robinson, who had become very political in recent years. Authorities recovered a “high-powered, bolt-action rifle” used in the shooting from a wooded area
How CIA kills me
30 years of pressure to get me back ( non-stop stress, 24/7 surveillance, actually killing my wife who got the first stroke after Secret Service agents broke to her apartment,, cutting access to any job, stealing food stamps from me) brought serious health problems, I’m really close to death, I, top international spy physical condition got:
1)infarction 2) heart insufficiency 3) aorta aneurism 4) asthma, COPD 5) anxiety and panic attacks 6) high blood pressure
On November 12, 2023 I turn 65, so I decided to apply for Green Card and Medicare, though I know it’s dangerous to come to Federal Building in Manhattan for interview, because FBI is there too and I don’t know what they plan to do to me – if ordered by CIA, they might arrest me, send to Guantanamo as “the most dangerous guy” in the world, or just kill me in a car crash after I leave.
Looking for a job
2017 I was on FedCap We CARE (The Wellness, Comprehensive Assessment, Rehabilitation and Employment) program which serves public assistance clients who have medical or psychological barriers to self-sufficiency. Every day I was applying for jobs in Queens, Brooklyn, Manhattan and Bronx, sending my resume to different businesses, companies, looking for office job mostly. My resume was a problem – I had to mention my work for KGB and that’s why I didn’t get a single interview. On top of it, CIA and FBI were watching me 24/7 and could create me problems in my search.
September 26, 2023 I’ve called Secret Service Brooklyn, NY office as I needed information and document from them on my detainment back in 2017. They said they have my case, they have to look into it and somebody will call me back. Nobody called me back – that’s how they want to burry my immigration case and kill my Medicare insurance, and kill me, poor and unemployed, physically in such a way. September 27, 2023 I’ve called FBI office, introduced myself, they said “OK” and hang up. Now, who can tell me how I die?
November 20, 2023 Somebody (CIA) hacked my Benefit card, stealing cash assistance
Why and how Putin, Secret Service and CIA killed me at the hospital
06. 26. 2024. Seventeen days before Trump was wounded by a shooter I’ve called the Secret Service New York field office, 718722-0712. I wanted to help them to do better job and send my story and give some advice. I talk to a guy whose name was Jaeer, he was nice and I said I know they don’t e-mail anybody, so I gave him some e-mail and password, so they can read my story and learn how to work
06. 28, 2024 I was admitted to NY Presbyterian Hospital, Flushing, Queens, with mild chest pain, test were OK, took medication, was ready to leave but some very young cardiologist recommended a “killer” cat scan of the heart, though I told him my two scans (lungs and heart) last year were OK. Medical Dr Emili Llaslo considered me a homeless idiot and pressed me to take one more cardio CT with huge radiation “just for a check-up of my arteries (repeated CT scans should be performed in severe cases only). Radiology technician advised me against it, but Llaslo didn’t care about risk of cancer going sky high, he screamed like crazy. Some physician assistant screamed at me when doctor was not there. I refused again and again.
08. 28. 2024 I came to radiology to refuse the test, unfortunately there was other team – huge alcoholic and a small devil woman who looked at me like I’m trapped finally. Believe it or not, I felt death nearby. She entered a secure place and I waited for her to talk, but next thing I remember was I’m zombie, can’t talk, move, leave, refuse the test, ask to check my chart. My killers didn’t: ask about previous tests, discuss the dangers, warn about sedation. I passed out. Then I saw they put a dye, passed out. Then I saw machine frying me, killing me with 20 X-rays combined. I passed out. I opened my eyes outside radiology – job done, hospital gonna charge insurance for the test. And I got a horrible 233 mGy radiation dose, cancer comes very fast after repeated tests, absolutely useless ones. I heard alcoholic saying :"I gave him much bigger dose to get better picture".
QUESTION: what is so special about me that they gave me much bigger, mortal dose of radiation, than other thousands of patients get? I am special CIA “Filament” who’s “talking too much” and who’s very dangerous to the enemies of America. I’m the only former KGB homeless spy in America and Putin said about me: ”Traitors die homeless”. It doesn’t matter who ordered my death – Putin, Secret Service, CIA or all of them. I’m half dead, wait for brain tumor or leukemia – they are most often in cases like this one. They fried me alive, it was a ‘postponed murder”. I will fight them until I’m dead. And I ask every American to help me.. 08. 14. 2024. I called Secret Service as I wanted to discuss the assassination attempt on Trump and Secret Service mistakes. I wanted to talk to Jaeer, but they told me they don’t know any “Jaeer” (! ) and hang up on me. Clear. They read my story and they were scared I can talk about 2017 case. That’s why they ordered my murder at the hospital. They warned me before that they gonna watch me, so once they got information I’m in the hospital, they killed me.
Russian President Vladimir Putin said, "I'm glad to see you alive and in good health, " to former U. S. President Donald Trump on August 15, 2025, when the two met for a summit in Anchorage, Alaska
Erase CIA
My recommendations I strongly recommend to stop the CIA’s secret funding right now, funding that is not made public or audited by the Congress. The CIA has its own budget but they want more, which they will waste, and some so-called “operations” are financed by secret transfers of funds from the appropriations accounts of other agencies, primarily the Defense Department.
You can’t reform the CIA — they are too accustomed to a comfortable existence, uncontrolled and irresponsible, because they, unlike military intelligence, do not function according to discipline, strict and understandable orders and patriotism.
The CIA has to be shut down, and its political intelligence functions and funding have to be transferred to the Defense Intelligence Agency. Platitudes like “the transition period is complex and takes time” are not convincing — military personnel should take over the Langley headquarters with not a single CIA employee (and all the inevitable “moles”) within a week and start cleaning up the so-called top-secret papers and files, 90% of which is “information noise. ” While the CIA is a “family” ruled by the so-called “four princes” (heads of four directorates), the Army is a brotherhood of patriots whose leader is the US President, the Commander-in-Chief. We can trust them – show me a single American (or anyone else) who trusts the CIA.
Before we start World War III I know perfectly well how hard it is to fight KGB Putin. Once KGB officer got tactical or strategic plan of actions, he will never, never change it. For him plan is more than Bible or Constitution – it's a question of life and death. If you fail the plan you are a traitor of a Communist idea (death of America and democracy, which is (for Putin) the bone you throw to people to choke them to death). I know how hard it is to get evidence against Putin, but I got it. And now it's time to get rid of him.
=========================================================================================. HOW TO RULE THE WORLD
THE WHITE HOUSE SPECIAL MANAGEMENT
The KGB special “The Professional” system for the US presidents
By Mikhail Kryzhanovsky
“The Professional” top politics system, based on KGB instructions, written for the US presidents at CIA request in 1996. The system was used by George Bush, Donald Trump.
I am invisible (quantum) president of the USA as American presidents use my political instructions daily.
Chapter 1. How to win presidential elections
Get Ready
Before you make a decision to run for President, you must determine for yourself if you can handle the Oval Office: Are you willing to accept such a huge responsibility and put the rest of your life on hold? Are you skilled in dealing with big groups of people? Can you motivate the nation to action? And repair about your biography, which is, of course, not perfect.
Then you must:
1. Decide how are you going to impress party leaders.
2. Make intensive preliminary polling to determine your chances.
3. Poll big demographic groups as well as smaller groups of people from selected demographic groups.
4. Determine the rationale for your candidacy. What is your political record?
5. Delay announcing your candidacy until late in the year before the election to minimize expenditures and risk, avoid legal spending limits, avoid voter fatigue, avoid getting ensnarled in unnecessary controversies and contradictions.
6. Carefully study applicable election laws before you start fundraising and spending.
7. Write your campaign plan (strategic objective, tactical targets, key message, target audiences, methods of delivery, timing, your progress evaluation — polls).
8. Learn the political and economic issues and develop your campaign message.
9. Prepare the “speech” and the “book” (the “speech” is the standard speech that you deliver and it should answer the most important question — why are you running for President; the “book” contains the message and all possible questions on your program.
10. Take a benchmark poll – it will provide the road map for your campaign.
11. Establish your strategy and message
12. Study the results, polls and “successful” areas of previous election.
13. Establish a perfect graphic look (image).
14. Develop a fundraising plan, put the fundraising team in place and start asking for money. No money – no campaign.
15. Create a personal contacts pyramid (priority and general contacts) because personal popularity is your starting point.
16. Set up offices.
17. Get professional candidate training.
18. Determine the focus of your presidential policy (taxes, crime, education, health, social security, national security).
1. 2 Working with the Staff
Basic campaign staffers include:
1) campaign managers — they plan the campaign, organize and recruit the staff, supervise daily campaign operations, make priority contacts with key special groups big business and big media, correct the strategy and make quick decisions. It has to be someone you trust completely.
2) campaign consultants-specialists in both direct (personal and public meetings) and indirect (media, advertising) campaigning
3) strategists
4) analysts
5) issues researchers
6) speechwriters
7) lawyer (interprets election and campaign reporting laws)
8) personal assistants (work on issues in foreign and domestic policy in cooperation with the whole team).
9) fundraisers (plan and execute fundraising events — dinners, parties, auctions, direct appeals through telephone and letters, receptions, computerized fundraising). Big business has to be approached by rich fundraiser only.
10) scheduler (determines events and locations — TV and radio talk shows, news — conferences, meetings with students and professors at college campuses and with professionals at their associations’ annual meetings, special events and fundraisers especially with ethnic leaders in big cities, as well as festivals and big shows where celebrities demonstrate their support, large extravaganzas, meetings at civic clubs, farm warehouse auctions and special auctions, local civic events. Also, scheduler makes arrangements with local media before your visit and sends media the copies of your speech; insures that good crowd will attend the event and takes care of transportation arrangements). The purpose of the campaign planning and strategic scheduling is to draw press attention to the candidate for transmission to the voting public. That’s natural — the candidate who has enough media attention has much better chances of recruiting public acceptance and raising campaign funds.
11) image makers – political consultants who sell your public image as a clear, simple, portrait-like characterization, acceptable to all groups.
12) “hit men” – campaign consultants who are experts on negative advertising, designed to “kill” your opponents.
13) field staff (in target cities mostly). The most important person at any local office is the coordinator — he establishes organization and contacts influential people and political activists. Coordinators must be appointed to each special interests group (women, minorities, unions, college students, public interest activists, the professionals)
14) local volunteers are needed to work in the offices and the streets. Your family has to take an active part in your campaign, too. Your wife and kids are your visual image makers
15) running mate
During the “invisible primary” which is the nomination, campaign you have to make visits to party organizations especially in pivotal states, such as the above mentioned Iowa and New Hampshire where you have to make as many handshaking and personal contacts as possible. Key staffers must travel with you.
1. 3 Fundraising
You are the #1 fundraiser yourself. You must have substantial financial support to compete. You must have an overall plan which outlines expenditures month by month. It is imperative to have even more money on hand at the end of the campaign for an advertising blitz when the voters are most attentive and the field of candidates has been winnowed out. Half of a campaign funds go to media.
Failing to do well in early caucus and primary contests means more than losing delegates — it means that contributions stop.
Your speeches have to be a fun, and match the meal and drinks — don’t be heavy and too political. Actually, you have to run two campaigns (a political campaign and a fund-raising one) and you must win both; if you raise less money than your opponent, you lose, because you don’t have enough money to inform, influence, and motivate your voters. If you are a Senator or a Congressman, you already have an advantage in money (free postage on mail sent to your constituents, automatic media coverage) and you can use your congressional staff to assist your campaign. Besides, you are interviewed by reporters for free as an elected official. You can also ask your political party for a contribution to your campaign. Party money can be given in two ways – as a “direct” contribution or as a “coordinated” expenditure. Direct contributions are funds given by the party to candidates to do with as they please. Coordinated expenditures are made for such services as polling and TV advertising, but the party has a say how the money is spent.
Then you have to ask PACs (political action committees) to fund your campaign, too. PACs are special-interest groups which consist of people who pool their money in order to contribute it to candidates or political party committees who share their political, social, religious or economic views. PACs include corporations, trade unions, profe hire.
To finish well in pre-nomination popularity contests (“straw polls”) you have to appear daily in TV ads, and prime-time news coverage — after the primaries media “label” winners and losers and that affects voters and contributors a lot. Media, especially the most influential “the New York Times” and “Washington Post” (their publications influence decisions on which news stories will be carried on TV channels), have to take you as a very serious contender.
The key rules in fundraising are:
– find some “fat cats, ” quick
– get fundraisers with lots of rich friends
– get money from those who usually contribute
– go to new York, Florida, California, Texas
And the most important strategy is to raise big money for yourself and prevent big money from being spent against you. Early fundraising is crucial to a campaign because of the high costs organization and the need to demonstrate viability. The best states for fundraising are California, New York, Florida, Texas, which supply half of all campaign donations. Go right ahead and raise money in New York and spend in Iowa and New Hampshire.
1. 4 “Winning” geography
Due to the winner-take-all electoral college system, in which the leading vote-getter in a state wins all of that state’s electoral votes, you MUST win as many large states as possible rather than build up strength in states where you are weak. You have to win a majority (270 of the 538 electoral votes) and for that, concentrate on visits to the most populous states — California, New York, Texas, Florida, Pennsylvania, Illinois, Ohio, Michigan, New Jersey, North Carolina, and Georgia 54+33+32+25+23+22+21+18+15+14+13 = 270).
Work closely with your party activists and supporters among Senators, Representatives, Governors, Mayors, ethnic and religious groups leaders, big business, celebrities, unions leaders. Determine the states in which you are the strongest and then build you campaign on that basis. Republicans have usually done well in recent years in the Midwest, West and South (Tennessee, Kentucky, Texas, Oklahoma). Democrats win in the Northeast industrial base, Mid-Atlantic and Pacific Coast. New York City is a very important factor because the most active, influential and rich people live there.
The Press
The press officer (contacts media, takes care of newspapers, radio and TV ads) — the person who markets you — is the boss of advance team that takes care in each state of a total exclusively positive press coverage. To my mind, the best choice for this position is a former journalist with good wide connections to media. He prepares press releases and press kits and schedules interviews and press conferences with the positive vision and attitude reporters (press or media kits contain your photos, a brief biography, campaign position papers, printed brochures and names of contacts for additional information).
The technique in good paid advertising is to go with those ideas, arguments, thoughts, themes and believes in which people are already inclined to believe or ready to accept. There’s no difference between commercial and political advertising — you just substitute a car or shampoo for a human being. Modern presidential campaigns center on “media events” — staged public appearances, during which reporters can talk with you and take pictures (if you have too much money, you can organize media wave — a very large amount of political advertising on TV). Then, the “walking tours” must be scheduled when you, followed by reporters, photographers and TV crews visit potential supporters.
Simultaneously your aide sets up press conferences, selects interviews, and background briefings. You have to talk to press 24/7 and everywhere on the campaign bus, train or plain, hotel, etc. A good thing is — you get free media coverage and people trust it more than paid coverage, like TV and radio commercials.
You win if you obey these rules:
– if you can manipulate media – you manipulate the nation (sorry, it’s harder to manipulate free coverage).
– the media makes the election, not the voters
– a presidential campaign does not allow for privacy
– newspapers put emphasis on issues, TV on image, style and ability to communicate.
– never lie to reporters; they will make sure it backfires on you sooner or later.
– if an influential newspaper, radio or TV station endorses you, you have their supporters, readers, listeners and viewers.
– people remember much better what they see, not what they read; if they don’t see you on TV, you don’t exist.
– TV talks to 98% of Americans and takes your message — and other messages about, or against, you – immediately, straight to the nation.
– TV, not your political party, is the #1 channel of communication between you and the public
– your political party is nothing but a service center and a money machine. Parties divide the nation while your message has to be one of unity.
– take it seriously if The New York Times takes your opponent seriously.
– it’s important to know what your opponent is saying to reporters privately, “not for attribution. ”
– if you live in heavily populated state, like New York, California or Texas, you start the presidential election campaign with much better coverage.
– never fight the media like the Nixon administration did – they kept a list of Nixon’s critics (famous reporters), so they could be targeted for harassment, accused of income tax evasion, etc. What happened then? The reporters felt like heroes, Nobel Prize winners. Better target them for buttering up, and feed them lots of stories with a spin in your favor, instead.
1. 6 Polls
Pollsters works through newspapers, Internet, telephone surveys, person-to-person surveys, mailed questionnaire to selected voters. They provide voters' behavior research and analyze past election data. They tell to you how well-known you are, how well you perform, what are the voters’ preferences. You should poll voters in each state in proportion to that state’s share of the national vote. (You must have at least one polling company on payroll. ) Polling is of extreme importance in presidential campaign because it’s the tool to correct your strategy, determine “positive” local areas and supportive voters and work with them, it tests the nation’s attitude to your personality and your issues and that means you can calibrate your message and calculate your success. The most important thing about polls is that they play indicator and identify support or hostility. And the golden rule here is: you have to ask the right question if you want to get a useful answer.
At the same time polling is one of the most expensive elements of a modern campaign because now you have to receive information on too many groups and issues, including groups with specific economic, ethnic, religious, geographic, educational, occupational and residential characteristics and how those characteristics affect attitudes about a wide range of policy issues.
Polls also help you to :
– decide whether to run or not
– improve your recognition and image
– target opposition’s weakness
– formulate media ads
Your pollster has to pinpoint blocks of voters (swing districts) who are undecided and who might be persuaded to vote for you. Experience shows that 40% of public attention go to social problems, 40% — to economy and 20% — to international matters, but if the United States is at war, the situation is different and national security turns into a top priority for everyone. And watch out for campaign spies — keep polls analysis and media plan secret.
Practical polls:
“Benchmark” – surveys of the whole nation which provide basic information about your chances and the nation’s political preferences (it’s your “presidential decision maker”).
“Follow-up” – surveys are used to gather more data about particular concerns raised in initial benchmark surveys. They are conducted state by state and are used in planning campaign strategy.
“Panel” – surveys are used to refine strategy further by re-interviewing previous respondents to determine opinion shifts on specific issues within various demographic categories. They are supplemented by continuous “tracking polls” that measure fluctuations in general voter support for the candidate across time.
“Special group” – used to poll the debate results. Selected groups of voters watch candidate debates and register their “positive “ or “negative” feelings toward the candidate’s specific statements or actions. After that analysts tabulate and analyze the reactions of the whole groups.
1. 7 Campaign Golden Tips
Never behave as if you think you are God’s gift to the nation.
Be presidential – look calm, sincere, knowledgeable and open Mother of the nation.
Be electable – prove to the nation that you are the best choice.
No one has ever been elected the US President without winning the New Hampshire primary.
Primaries direct financial backers to a promising candidate.
Voters judge you by your friends – appear with popular politicians, big business, labor and interest groups leaders, and show business celebrities. Advertize your meetings with Congress members and world leaders (go abroad if you have a chance to meet a world leader).
The most important event in the election process is the National Convention, not only because the eventual finalist candidate is actually nominated but because after that the campaign’s audience increases (more than twice as many people vote in general elections as participate in the nomination process). You have to decide how to win the support of these new voters as well as to appeal to people who identify with the other party and partisans who backed losing candidates for the nomination.
Choosing a strategy
Any strategy is good if it helps you to win support of a majority of people chosen by the state parties to be delegates to the national convention. Your choice of a strategy depends on your current position:
A. If you are an incumbent, you have to stress that the American people’s life improved a lot during your first term. You can count on successful start because you are guaranteed to be known actually to every American, and the Oval Office lends you credibility and respect. It’s of vital importance to have economic accomplishments — in such a case well-timed announcements of government statistics on the economy or of plans for domestic initiatives can also help you. Listen, I didn’t tell you this, but you have to manipulate (stimulate) the economy during the election year with tax cuts that can help reduce unemployment, and with social programs financing.
Of course, you’ll have to pay for it, but that will happen after you are re-elected. And a good thing is – an improved economy erases voters’ bad memories of past years.
Try to avoid too aggressive campaigning – it’s a sign of weakness. Make official appearances in carefully controlled settings. Influence media coverage with official presidential actions and use “pork barrel” politics to appeal to specific constituents. You can also benefit from the nation’s reluctance to reject a tested national leader for an unknown newcomer. And if you start important foreign policy initiatives, it will guarantee you continued media coverage.
If you have poor chances to be re-elected, you can play the “national security” card:
– find a US “enemy”
– start a media psychosis (see propaganda tricks and brainwashing )
– concentrate power (special services) to establish a total legal control on the nation
– provoke an international conflict, restricted or full-scale war
– send a message: “If you are against the President, you are against America! ”
B. If you are a challenger you have to convince the public they don’t live better than they did 4 years ago, or, if the economy is OK, point out mistakes that were made in the foreign policy. Or make up some social issue that will get passions inflamed and hijack the headlines.
KRYZHANOVSKY ”GOLDEN” STRATEGY
You should seek to position yourself as close to the opposing candidate as possible in an effort to capture the “median voter” in the center, and then take by default everyone else on their side of the ideological spectrum. You have to embrace this strategy and move as close as you can to the moderate Republican position with the expectation that you can take all of the votes to the left of this position. Clear?
The job is tough if you challenge a President who is popular — first, you have to break down his positive image; second, you have to portray yourself as a much better replacement. You have no choice but to start with the “outsider” strategy — you present a “fresh face” to voters weary of the current political situation (in such a case you have to attack administration in a very aggressive manner). Plus, you must give quick response to your opponent’s charges (get advance copies of his speeches through friends in the media).
Then, show yourself as a smart and diplomatic person using a special “triangular” strategy, when you, like majority of the voters, place yourself between liberal and conservative positions. Evaluate situation – you may need “early knockout, ” when front-runners hope to use their early strength in polls, fundraising and endorsements into decisive primary victories at the beginning of the primary season. The hope is that the candidate will build such an impressive early lead that the competition quickly drops out.
A “shift” is the most popular thing with challengers – if the President is good with national security, they point out to the problems in economy, if he’s good on the economy, they point out to the problems in national security – very simple. (Watch his mistakes anyway – you can benefit from them. Bill Clinton would never have run for President in 1992 if someone from the Bush White House hadn’t called him in 1990 and asked him not to run. That phone call was one of the most stupid political moves of the 20th century, because it convinced Clinton that they thought he had a good chance to win.
Be simple, identify with “ordinary people” and no matter what tell the voters your parents or your grandparents “were like them – regular people, not millionaires. ”
"Black" PR
You must know some very popular and efficient dirty tricks, like “negative campaigning” or “black" PR. To make a long story short: no matter what your opponent says or what decent people think about negative campaigning — “black PR” works! Use it to turn a rumor or a fact into a serious political scandal; respond to and neutralize the opponent’s attacks (using “black PR”) fast, before they are broadcasted or published.
It works best through intermediates (persons and organizations not connected directly to your campaign). You must have a very detailed file on your opponent (negative research) and then start spreading negative and all kinds of compromising data from his personal and political life. If he is or was elected official (Senator, Governor, Mayor), you can point out his mistakes and actions which were not popular. People must know in detail (get your staff to read a few books) the negative sides of his life, program and terrible consequences of his election. Remember also that a rumor repeated twice turns into a fact, especially if you start a “whispering campaign” in Congress.
A “negative ID” trick is my favorite: you identify your opponent with a totally unacceptable (for the voters) viewpoint, like: “There are those who want to stop the war on international terror and you know who they are! ”
1. 10 Attention : debates!
Debates are extremely important because they offer the only all-national event at which candidates can be judged. You and your opponent will be under huge stress as you both must operate simultaneously at the focus of attention of each other and of all elements of electorate. Debates are, actually, head-to-head confrontations with two main aspects: the pre-debate negotiations over whether there will be a debate, and the post-debate analysis of who did how well. The debates offer nothing new for the public and the basic strategy is to hope your opponent will make a mistake (President Ford made one in 1976, saying that: “There is no Soviet domination of Eastern Europe. ” People just didn’t want to hear it. Richard Nixon was very wrong in 1960 trying to debate on substance, while his opponent, John F. Kennedy, concentrated on style and on presenting the correct presidential image).
While preparing for the winning debates you must:
– have a detailed file on your opponent and study all his speeches and statements; ask yourself: “What does he have that
that I don’t have? ”
– train to answer all possible questions
– be ready to demonstrate deep knowledge of issues and your presidential bearing to a nationwide audience
– repeat your message but keep in mind that image is more important than ideas while you debate — people want to see your good looks, good clothes and nice smile.
And here are the debating “Don’ts”:
Don’t attack first — that’s a sign of weakness.
Don’t be over-polite — a little showmanship appeals to voters.
Don’t be too aggressive — it will ruin your image as a future President.
Don’t answer the questions too fast — that implies you are not thinking.
Don’t rush, no negative emotions, no sudden gestures (extra gestures mean that you are not sure what you are saying is correct).
Don’t disappoint people — speak in a clear and simple way.
And you restrict your influence if you sit.
Follow the rules :
No anxiety reactions – speech errors, moistening of lips, perspiring, shifting eye movements, body jerks. Gesturing with fingers apart communicates weakness, while gesturing with fingers tightly together communicates power.
Look at your opponent with intense concentration – it gives the attitude of command and comfort of the situation.
Answer a question you want to answer, no matter what question was asked.
If you give better answers, you are the better candidate.
Immediately after the debates your press officer has to give the media his biased impression and explain why you won the debates. Your pollster has to watch the polls results.
Tricks
Speaking in public
"Golden" rules
1. Your aides have to determine the “theme of the day” and brief you about the day’s events and issues. To get elected you must promise economic growth with low inflation and balanced budget no matter how grave the economic situation is.
2. Don’t be too specific on issues and tell people they elect their way, not a candidate.
3. Cite the Bible.
4. Don’t look too intellectual.
5. State repeatedly that you’re not going to divide the nation into supporters and enemies, Democrats and Republicans, “my voters and other voters” — be a leader to all. (But first, to win the nomination you must appeal to the more liberal sections of your party if you are Democrat, and to more conservative sections if you belong to Republicans).
6. Don’t talk much; transform your thoughts into examples and slogans.
7. Never say you want power, even if you want to save the nation in crisis.
8. Never talk down on big business. Promise federal financing, especially in economic downturns.
9. Remember: voters are extremely sensitive to tax-cut proposals and which social segment would benefit from them. The middle class brings you victory, so promise tax cuts for these people, with tax increases for the wealthy and high unemployment rates.
10. Even if the economy is OK, point out the signs of coming crisis and promise to change the situation fast. Keep talking about problems, though it’s hard to win if the incumbent President runs for re-election with balanced budget and economic growth.
11. You can be liberal on domestic issues, but you have to be conservative on national security (defense and foreign affairs).
12. Remember the “women factor”: there are more women than men in our country, women are more likely to be registered to vote, and among registered voters women are more likely to vote.
What to talk about where:
Iowa, New Hampshire – farm problems, energy costs, trade issues
Northern “rustbelt” states – industrial concerns
Southern states – defense and social issues
New York State – unemployment
Use these tactics:
1. “Join the crowd” — this reinforces people’s natural desire to be on the winning side and it is used to convince the audience that your program is an expression of the nation’s desire for change, and it is in their best interest to join;
2. “Provoked disapproval” – persuade a target audience to disapprove your opponent’s message by suggesting that the message is popular with groups hated, feared or held in contempt by the target audience;
3. “Inevitable victory” – you invite those who did not join majority;
4. “Neuro-linguistic programming” — you will be elected if you can do this better than your opponent and program the whole nation for a positive reaction. People always try to avoid anything and anybody unpleasant; and people are always looking for pleasant things and other pleasant people, somebody they want to meet again and again or at least see on TV. Everybody wants to be a winner; and to be a winner brings pleasure and self respect. Just convey this sense to the nation: “Vote for me and win! ” or “Vote for me or lose! ”, “The choice is yours! ”
Chapter 2. The White House Management
Godmother may use my instructions to manage the White House, the Congress, the Government and the nation. I authorize it. At least, she’s not going to make gross mistakes and fatal decisions.
Bill and “Obama” followed them and got reelected, and that’s what makes my instructions priceless.
Come in, Mr. President!
Be strong. Be attractive. Be logical.
All you have to do during your 1st term is to take care of the second one.
1st year. You have enough public support to start big initiatives.
2nd year. Develop your initiatives.
3rd year. Go, go public preparing your re-election. Presidents often lose voters during this period.
4th year. All-politics year. Try to achieve important international agreement (a treaty) for the historic record. Win re-election.
The 2nd term’s agenda is to set your place in the world’s history.
Divide your day into hours and minutes : 30% of your weekly hours go to senior White House staff, 10% – to Cabinet, 5% – to Congress members, 5% – to foreign leaders.
No matter what, even if it’s a war time, sleep one hour during the day to give your brain a break, and finish your day at 6 P. M. After 6 P. M. do not read any documents, do not take any phone calls, do not talk to anybody but family members and close friends.
Eat whatever you want, but remember, the more calories you have to digest, the slower you think.
REMEMBER:
1. You are a national image (a national ideal based on pseudo-facts), a symbol of national unity, national continuity and the symbol of federal government. Leadership is the first quality Americans look for in you – they want a President who is steadfast in his convictions.
2. The power to control the federal budget is your top prerogative.
3. Define for yourself whom are you going to be:
– utopist (ideas manipulator)
– manager (Government and Congress manipulator)
– challenger (reformer)
4. Any problem turns into a political one if it threatens your power.
5. Use your legal right to press the nation and illegal ones to press the world to eliminate problems.
4. Once you’re in politics, you are a hostage of your status and you must sacrifice privacy in return for power.
6. Never play alone.
7. All your decisions are risk taking ones (any decision brings a problem). You may ask advice before you make a decision, but don’t listen to anybody afterwards. You are not paid for the quantity of your work but for leadership and ultimate decision making.
8. Correct political mistakes fast, before they become political scandals.
10. Never blame previous presidents for the problems they left for you – that’s a sign of political weakness.
11. Get rid of a White House tradition to deal with problems if they “knock at the door” only.
The White House Staff
Chief of Staff
The Chief of Staff reviews most of the documents that go to you, gives his/her advice after intense information processing and consultations with other agencies and then – he’s/she’s telling others what President wants. A lot of people, including Congressmen and Senators, will try to reach you through him/her.
He/she has to give exact instructions to the Press Secretary on the White House message about current headlines and the President’s plans and actions (the Press Secretary works the same way with VP and First Lady/First Gentleman press teams). He/she is responsible for your time and has to plan at least two months ahead your effective activity together with Communications, Scheduling and other policy offices’ Directors plus VP and First Lady/First Gentleman Chiefs of Staff. Besides, he/she has to do “dirty jobs” for the President like firing people or act as a “lighting rod” to draw criticism away from the President.
National Security Adviser
The National Security Adviser controls all the documents concerning national security coming from Defense, Homeland Security, State Departments, and national security agencies, and coordinates these offices. His/her position is not subject to Senate confirmation, which, according to a long-standing Washington tradition, means that he/she can’t be compelled to testify before the Congress. He/she decides what papers the President should see and, what’s more, he gives his comments on any document.
ATTENTION :National security is 100% the President’s business, so keep this figure at some distance and don’t let him think of himself as your Number Two – foreign leaders will try to work through him to get to you or to influence you.
He/she has to oversee the functioning of the National Security Council (NSC), which is your foreign policy making tool and a “government inside government. ” This is something very special and convenient about the NSC – it’s responsible only to you and there’s not much Congress control over its budget. Plus, National Security Adviser is involved in every meeting between you and any foreign leader and is responsible for the schedule.
The most powerful of executive offices after the National Security Council is the Office of Management and Budget (it’s authorized to make cuts in federal agencies’ budgets, to advise you on national fiscal and economic policies, supervise execution of the government budget, evaluate the performance of federal programs).
Who they really are
Staffers (and Secretaries) prefer stability and don’t like if you’re “rocking the boat” – that’s why they often play reform-stoppers.
They don’t like to work hard and prefer to send you on “very important visits” abroad as often as possible.
They try to load you up with an extremely busy schedule and “feed” you witnh hundreds of useless documents, create artificial problems and conflicts to show off their hyper-activity.
They try to be your decision makers and they do influence you because, unlike Secretaries, they have daily contact with you; that’s why you don’t see Cabinet members as your principal aides.
They try to set you up by interpreting your decisions and orders in their own way, as every adviser is the “American President himself. ”
They know you won’t accept “complicated, ” “expensive, ” “risky” projects and they’ll try to sell you “simple, ” “cheap” and “popular” ones only.
Watch your senior staff and how they present ideas. If somebody wants to push his idea or a project, he will give you three options, making two of them unattractive. Naturally you pick the one he presented as least harmful.
The tricks
1. Fight for access (influence) to President or to people with direct access (aiming to get a better position if President is re-elected).
2. Isolate government from the President.
3. Influence = relationship with the President.
4. Get a table in the West Wing. You are nobody if you are stuck in the White House basement and see the President by appointment only.
5. Before you send a document to the President, have to look at it and ask yourself if it’s too immoral or too radical.
6. Never say “no” aloud to anybody.
7. Remain anonymous with conflicts.
8. Never bring bad news to the President – let it be some idiot, not you.
9. Never say “That’s impossible, ” no matter what the President is asking you to do.
10. Disappear (and find an excuse later) if the President is in a bad mood.
11. Never ague with the President if there’s somebody else present.
12. Learn how the President likes to do business (talking, giving orders, writing the documents and taking notes, managing official and non-official meetings) and his habits (food, drinks, cigarettes, favorite sport, movies, show business stars, writers, politicians; attitude to women) and try to copy him — the President has to feel comfortable with you.
13. Fight anybody who’s trying to do your job to be closer to the President.
14. Avoid taking on risky tasks controlled by the President in person (if necessary, try to “delegate” it to somebody else).
15. Avoid being associated with any failures.
16. Don’t say anything President doesn’t want to hear.
17. Use “Smith’s Principle”: if it can be understood by Congress, it’s not finished yet.
18. Write memorandums not to inform the reader, but to protect the writer.
19. No matter what subject is under discussion, employ the language of sports and war: say “breakthrough” instead of “progress”, never speak of compromise, consider “adopting a fallback position. ”
20. Every public appearance in with the President is an investment in your career after the White House.
21. Minimize the number of rivals.
22. Gain independence according to how much the President needs you.
23. Before asking the President for some personal favor, make him believe he’s going to get some (political) profit out of it.
24. Tell the President what he can do and help him try to do it, and never tell him what he shouldn’t do.
25. Avoid giving any personal gifts to the President if you are not Chief of Staff.
Every public appearance in with the President is an investment in your career after the White House.
There is an open power struggle between national security staff members and domestic policy staff and between those who develop new policies and initiatives versus budget staff.
How to Manage the Staff
Adopt a dominant management style:
1. Pyramidal, structured as hierarchy with you at the top, followed by the Chief of Staff and other key assistants. I strongly recommend this one – it insures a clear chain of command and provides precise channels of information going up and directives going down.
2. Circular, when you are surrounded by advisers, all of whom have equal access to the Oval Office. That means chaos (JFK style).
All your assistants are political assistants and everyone will try to play a policy-maker. But a good thing is that all of them were not elected and are responsible to you only.
Thus you can:
– reform your staff freely as there’s not even a word about it in the US Constitution
– interchange key figures if domestic crisis is approaching
– if you don’t agree with the staff on important issues, go to polls for back-up. (The best employee is the one you can blackmail. Besides, a very good “pusher” for your people is their deep understanding that they have to work together to help the President stay in office next term because if the President leaves, everybody leaves)
– use “the carrot and the stick” tactics
– use “pulling by pushing” – give an important job without publicity to those who become too popular
– do as little reading as you can – you have staff for that
– do as little writing as you can – same reason
– involve yourself personally in your staff and Cabinet jobs as little as you can – same reason
– make no minor decisions – same reason
– send back any intelligence or other report if it’s more than one sheet of paper
The Pocket Cabinet
If the bureaucrats are wearing you down, you have the right to fire any Secretary. However, Cabinet members must be approved by Senate, therefore, you have to negotiate with the Senate leaders and party leaders throughout the country. As a result, some positions may go to people you don’t know well and can’t trust. Then if you want to re-organize the Cabinet you have to confront the Congress, because Congress tries to protect the interests of its constituents, who are often the clients of the existing bureaucratic agencies. So, if you plan changes you have to appoint people who share your strategy.
You may also need to offer a position to a group that you need to support in the coming election, or whose help you need; or to help pass legislation (these people will be more loyal to their political benefactors than to you).
Secretaries have disadvantages compared to the staffers as they don’t have easy access to the Oval Office (again, that depends on you). Some of them had little or no contact with you before being appointed. Actually, their task is to win the backing of key interest groups and that’s why you, practically speaking, don’t need Cabinet meetings (if there’s no crisis). If a Cabinet member feels independent (usually, that’s the Secretary of State), don’t fire him/her – substitute him/her by the national security adviser or send him abroad on a regular basis.
The Cabinet members work hard during a crisis only. They prefer to save their plans and suggestions for private conversations with you, because that is what you need them for and they are competing with other Secretaries for your time, support and for funds.
It’s not easy for the President to make government agencies work effectively : first, you have no time, second – they have no competition. Anyway, you must have insiders in all departments, especially in the Justice Department (FBI), CIA and Secret Service firing anybody who’s trying to dig up dirt on you.
Secretary of Defense.
The Secretary of Defense is a very special and unique position for many reasons. This department is regarded a non-political one, defending the United States no matter what (never let him decide, though, what and where US interests are). Military leaders have a lot of friends in Congress who press the administration to accept military demands. Besides, it’s not easy to manage the Pentagon, as you depend on the military for evaluations of the national military capacities; they decide also what kinds of weapons to buy and build. Half of the federal budget goes to Pentagon, making it a major department and that’s the most frustrating aspect of your management.
You have to find compromise between you, Congress, public opinion, interest groups and defense contractors’ lobbyists.
The defense budget affects diplomacy and international relations, because governments worldwide scrutinize it for clues about US global intentions. For example, increases in defense spending, particularly for items such as naval vessels and aircraft, may signal your intention to pursue more aggressive foreign policies, and cuts in defense spending may indicate an effort to scale back on defense commitments.
Hidden Structure
The Cabinet is divided into the inner circle (State, Defense, Treasury, Justice) and outer, less important one (Interior, Agriculture, Commerce, Labor, Health and Human Services, Housing, Transportation, Energy, Education, Veterans Affairs, Homeland Security). While inner Cabinet members are selected more on the basis of personal friendship and loyalty, outer Cabinet members are selected more on the basis of geographical, ethnic or political representation and adopt an advocacy position for their Departments.
The inner Cabinet is divided into two groups:
а) national security group (State and Defense Departments).
b) legal-economic group (Justice and Treasury Departments). The Attorney General usually serves as the president’s attorney and this special responsibility leads to close personal contact with the President. The Secretary of Treasury is very important in domestic monetary and fiscal policies and international trade and currency.
The outer Cabinet is a “domestic” group. Don’t waste your time meeting them – you have enough staffers for that. Sometimes “outer” Secretaries try to build their political base of support within their own bureaucracies. Don’t hesitate to fire and replace any of them if they start to criticize you and behave politically independent, counting on bureaucratic and interest groups’ support.
There’s one (negative for you) thing in common between all Secretaries – self-interest pushes them to protect and expand their departments and then they act more like representatives of their departments to the President then the presidential envoys they were appointed to be (“divided loyalty”).
ATTENTION : Secretaries of State and Defense usually form a coalition against your National Security Adviser. You must be a smart mediator as Commander-in-Chief. These two have weekly meetings, and each of them has a weekly meeting with the DNI (Director of National Intelligence), so you must know from independent sources what they are talking about in case they “forget” to tell you the details. The Defense Secretary meets weekly with the Joint Chiefs, too.
Mind Control
Every day in 2004 we watched the Homeland Security Department "terror alert colors" and very often the threat was "high" or "very high. " With all my 30 years espionage experience I couldn’t understand why they were telling the nation about the threat and producing the multicolor picture on TV. Why? What can ordinary Americans do about that? What happened next made the situation absolutely clear for me and posed one more question for the nation: right after President Bush was re-elected the colors disappeared – why? Again, what happened? Is there no more "terror threat" to America? There is. But there’s mind control, too.
Mind control, which I call mind manipulation or MM, is used to program the "right political behavior" of the nation or "indifferent behavior" (if necessary) without people’s knowing or understanding the procedure.
We are talking here about total illegal social control.
Principles of Mind Manipulation
1) It’s not enough if every single citizen, and the nation as a whole, thinks and behaves your way – it’s much better if they want to behave your way and feel comfortable, and are absolutely sure it’s their own choice and, finally, they become your active supporters.
2) If you want to control the nation and program peoples’ thoughts, you have to control knowledge (information, culture and communication).
3) The political imagination (belief) of the nation has to move in the right direction and has to be accepted as the most comfortable and most acceptable way of political activity: nobody is thinking, nobody is criticizing the President, nobody is making comparisons and drawing conclusions. Everybody believes the American President and hates his enemies.
4) Don’t waste time fighting foreign ideology, take care of ordinary Americans.
5) There is no difference between commercial and political advertising, and MM.
American Propaganda Technology
You need 24/7 effective propaganda to get non-stop public support of your policy — your war for public support does not stop the day you enter the White House — it may stop the day you leave the White House. If your polls go below 40%, the United States effectively has no President.
Use propaganda tricks:
– general (abstract) information on big problem
– information dosage (the less people know — the easier you convince them)
– misinformation (full or partial) presented as news, sensations, rumors
– disorientation – one bit of information contradicts another one
– provocation – information "pushes" people (before you start war)
– information over-dosage – too much information (and people lose interest)
– exaggeration of enemy’s negative sides and promotion of scary data
– distraction of nation’s attention from news that is bad (for you) by publishing sensations and (political) scandals
– stereotype manipulation ("nuclear threat, " "international terror, " etc.
– "shuffle" – all news and facts match President’s political course
– "cocktail" – mix of true and false information
–"facts transportation" from abroad (you buy a foreign reporter and he’s publishing positive information on your politics; then you spread the information through American media)
Remember the principles of mass psychology: people don’t believe the government – they believe the market and the stock exchange; people need statements, not analysis.
MM Technology
1) Create a steadfast American collective will-power: “We want to live forever in the America we live in now” – through the media.
2) Don’t ask people to change their views and beliefs – they have only to change the object of their aggression – “Now we understand who are America's enemies! (the previous President, Republicans).
3) Get people accustomed to accept facts but believe only in the “right” comments – any common sense has to be “switched off. ” This way you create “mass artificial schizophrenia” — people lose the ability to connect statements and facts (notions) and just believe.
Besides, by extreme exaggeration of the enemy’s negative qualities you can install the national schizophrenic fear (of "international terrorism") and people have to accept you, the US President, as a savior. Plus, no matter what, repeat your major statements until people start accepting them without thinking.
4) Divide the nation into “good Americans”(patriots) and “bad Americans”(the “minority).
Make it clear : it’s much better and more comfortable to be “good” than “bad. ” “We aren’t watching good Americans who support the President. The surveillance is for bad Americans and we make their lives and careers uncomfortable. We have to do that because enemies of America may be using them. ” This method is called artificial social selection and its ultimate goal is a total regulation and standardization of the nation.
5) For successful MM, use the combined efforts of popular Democratic American writers, TV and radio anchors, talented publicists and columnists, business and show business celebrities, politicians. Thus, step by step you create the “industry of correct political behavior and correct American thinking. ”
6) Use a combination: statement + image. It reduces the effort needed to understand your message and makes people comfortable with you.
7) Shift all popular TV shows to prime time – Americans don’t have to think about politics after they come home.
Psycho-epidemic
During his first presidential campaign Obama used my strategy of psycho-epidemic.
It's simple – you hypnotize people by permanent repetition of a certain word, like "Change! ", a phrase, a slogan. A crowd, and even a nation,, often behaves like a dog, it's very submissive if there's a strong personality, a strong leader in front of it. Then, the reflex appears – once you see a strong leader, you must listen to him and follow his orders.
Strategic planning
That’s the biggest problem for all administrations.
Strategic planning is the process of making present decisions based on well-calculated future consequences. The basic strategic objective is a decision as to where to concentrate the government efforts this is the essence of strategic planning. The worst example of strategic planning is the war in Iraq.
It is crucial to choose a professional crew and place people in positions where their brains will work effectively and produce quality.
Planning formula:
– design strategy
– amplify and clarify strategy into policy
– organize a team
– guide execution
– make final strategic decision
A. Regular Planning Model:
B.
subject, concept, idea definition of objectives
design of innovative options and debate
exploration of concepts, claims and possibilities
development of program outlines
establishment of expected performance criteria and indications
information gathering
integration of ideological elements
assignment of executive responsibility
scheduling
analysis and experiment
experiment evaluation, examination of likely consequences
comparison of expected and actual performance levels
determination of costs
prognosis
strategic decision
B. Express planning: information interpretation, projects design, choice of a project, decision
C. Regular (math) model:
Negotiations planning (example): pressure, compromise, tricks, break.
Let’s evaluate "pressure": negative international reaction /-1/, breakdown /-1/, positive effect /+1/. Score: -2+1=-1 Conclusion: no pressure should be used.
D. Expertise model.
Government crisis (example): poor planning- wrong decisions- wrong actions- wrong execution- opposition activation- mass protests- coup
E. Scale model.
Risk factors: Risk levels:
International sanctions : medium
High inflation rise : medium to high
High unemployment : medium to high
Low public support level(low polls) : medium
Presidential decision making
1. Decision making is a multiple choice process.
2. Any decision involves political risk.
3. If you can’t make a decision, you need more information.
4. Be optimistic, but remain realistic.
5. Give yourself a deadline.
6. No brainstorming chaos.
7. There are two kinds of decisions: irreversible and reversible. Better know which kind you are facing.
Here’s the process:
a) Identify the problem
b) Analyze the problem — what are the facts?
c) Evaluate options – what are the pros and cons? what can go wrong?
d) Identify choices – which alternative is the best?
e) Implement plans – what action needs to be taken?
As the world #1 leader you have to know that this world is being ruled not by you but by 11 financial corporations : Barclays, Goldman Sachs, Capital Group Companies, FMR Corp, AXA, State Street Corp, JP Morgan Chase, Legal & General Group, Vanguard Group, UBS AG, Merrill Lynch & Co Inc.
Bonus
Psychological Modeling of a President (Strategic Intelligence Method)
Intelligence services worldwide watch political leaders during public appearances, trying to calculate their physical and mental health judging by their look and behavior. In the US they also evaluate the executives and staffers who surround the President at official meetings to calculate what’s going on in the White House.
They look at:
– a very detailed biography
– personal needs, interests, philosophy
– political views
– intelligence, will-power, character, abilities
– behavior in crisis situations
– compromising facts and possible methods of influence
– personal, political and big business VIP connections
– financial situation
– administration and team
– political opposition and President
– Congress
Domestic headache
You can’t separate domestic and foreign policies because they are married to the same ugly guy – the budget deficit.
Domestic policy rests on three legs: education, health and environment. Americans will never support reduced funding for education, Social Security and Medicare (Medicaid) cuts and weakened environmental-protection laws. But I strongly advise you – don’t bother trying to emulate Europe and the British Commonwealth by providing health care for all – the privately insured middle class (your voting majority) won’t stand for it. If you don’t believe me, go to the polls.
Now, are you a challenger in politics? If "yes, " strengthen your political positions in Washington, DC first, then start some reforms. Before you start a reform you have to win the information war with your opponents and get public support. A reform is always a venture; the process may start taking on momentum and you won’t be able to stop it. You had better continue old reforms using a new tactic because new reforms bring new problems, new enemies and new mistakes, and big economic mistakes bring you an economic crises.
Dealing with big business
1. Big organized money moves big political machines, big political machines move big lobbies, big lobbies move the President.
2. The President is an investment.
3. A group that rules the economy rules the White House.
4. A new political course comes not with a new President, but a change of big business’ global financial interests.
5. Follow 3 "golden rules":
– protect big investments
– help to promote
– don’t interfere
6. If the government doesn’t meet the needs of big business, it forms a new one of its own (something like a President’s Council). This usually happens when the President can’t provide financial stability and super-profits. Besides, big business has much more important foreign connections than the government.
7. Big business is:
a) money
b) political and economic control
8. Any political action gets an economic (big business) reaction.
In terms of partisan politics, Republicans are considered to be more sympathetic to big business interests while traditionally Democrats get electoral and financial support from organized labor. Forget about antitrust policy business has become more global and efforts to enforce antitrust policies have proven deficient and are threats to national security.
Chapter 3. Managing the economy
1. Regulate spending, taxation, monetary policy and foreign trade whic has to be under strict political control – you have the right to propose legislation and veto any legislation you think incorrect. Keep in mind that Americans always insist on reducing government spending on foreign aid and space exploration, and they naturally hate any rise in taxes.
2. State and local governments, both through national associations like the US Conference of Mayors and Congress Members, always press the government to get more federal funds even at the expense of inflationary budget deficits.
3. Keep unemployment low and prices stable – these two factors are politically dangerous and failure here can bring a free-fall in approval ratings.
4. Take credit for economic growth, price stability and low unemployment even if you have nothing to do with it.
Still have problems? Try international initiatives.
There are four inevitable factors that will limit your control over the economy:
1) You must share power with Congress — you can’t levy taxes or appropriate money all by yourself;
2) The theoretical nature of the science of economics — no single economic theory has ever explained the behavior of the economy in the future;
3) The imprecision of economic information. Economic statistics and indicators do not measure the immediate conditions of the economy, but rather the conditions that prevailed between one and three months ago, depending on the particular economic statistics. Consequently, if you take action on the basis of incoming economic information you may be reacting to a problem that no longer exists or that is much worse than believed.
4) There are forces outside the reach of the federal government, like international factors (oil prices and foreign trade policies), state and local governments economic decisions and mistakes, big business decisions that affect employment, inflation, the trade deficit and public opinion — which is always against cutting social programs.
Budget deficit
A large budget deficit is a headache and has extremely negative effects on the economy:
1. It limits the government’s flexibility to fight a possible recession; that requires tax cuts and deficit spending, which would exacerbate the debt problem. Since tax revenues fall during a recession and unemployment insurance and welfare payments rise, the budget would be under further strain precisely when deficit spending would be needed to pull the economy up.
2. It reduces the amount of funds available for achieving the nation’s social and defense goals, because interest must be paid on the national debt.
3. It can threaten the economy by "crowding out" corporate and private borrowers from the credit market. Because the government must borrow heavily to finance its deficit, it competes with business and individuals to borrow funds. The increased competition forces interest rates higher, causing loans (including mortgages) to become more expensive. As a result, business can afford to purchase less plant and equipment to expand and modernize their operations and fewer consumers can afford to finance purchases of expensive items, such as houses and cars. The resulting reduction in demand threatens economic growth.
4. The US budget deficit has become so large that domestic savings no longer can provide enough capital to service the debt. Consequently, the government must borrow from foreign sources to make up the difference. This makes us dependent on foreign investors and raises the possibility of a "stabilization crisis, " which can occur if foreign investors lose confidence in the dollar and liquidate their US investments. Such a crisis could cause the dollar to plummet and interest and inflation to rapidly accelerate.
Crisis
Crisis means that your government as a system is exhausted and it’s unable to rule the nation and resources effectively in an extreme situation, including economic, natural catastrophes and war. A crisis has three stages – before the crisis, when the first signs appear; crisis development until culmination; catastrophe followed by impeachment. A crisis could be "programmed" at the very beginning of your term (mistakes in political and economic courses, inexperienced personnel, faulty planning) or it can appear later (too many mistakes, change of political environment, shifts in the economic or international situation). Crisis management includes pre-crisis management and handling of the situation. You must be ready not only for a government crisis but also for sudden military attack, mass riots and natural disasters.
International trade is an important component of national security. Our "friends" (NATO members, Saudi Arabia and Japan) favor a dollar (that is neither overvalued nor undervalued) and a healthy US economy with relatively full employment and low inflation rate. If the dollar is weak, the value of much of their international currency reserves declines and their goods are less competitive in the US market. If the dollar is too strong, their investment capital migrates to the US and the high competitiveness of their products in the US market threatens to provoke calls for trade restrictions. If unemployment in the US rises, the major market for their goods declines. If interest rates are higher in the US than in Europe or Japan, investment capital moves to our country. Consequently, foreign governments press the United States to keep the exchange value of the dollar from fluctuating widely and to hold interest rates steady.
Chapter 4. How to Control the Congress
The President can propose legislation, but Congress is not required to pass any of the administration’s bills. But you know already that Senators and Representatives need re-election more than anything else. So you can go with indirect influence through appeals to the public; this is a confrontation and direct challenge to Congressional authority. You can also enlist the support of interest groups or direct influence through favors and personal involvement in the legislative process. (Get public support for a proposal before it’s discussed with the Congress. )
And don’t hesitate to start a national debate — you have enough media attention for that.
You also have an independent tool, presidential power in the form of an executive order. You can give favors directly to members of Congress or to influential people in their constituency, or the favor may be of benefit to the constituency itself:
– appointments with the President and other high-ranking officials
– federal grants to recipients in the constituency, government contracts with local companies, the deposit of federal funds in banks, grants to local government and educational institutions
– support of projects (military installations, research and administrative facilities, public works such as buildings, dams and navigational improvements to rivers and harbors, etc. )
– recommendations for the US district court judges, attorneys, marshals, etc.
– campaign assistance (cash contributions from the party’s national committee invitations to bill-signing ceremonies, White House parties or to accompany President on trips
– bargaining and arm-twisting (pressure and threats to lose the projects).
Tools
1. The Congressional Relations Office. Used for:
– intense lobbying to form Congressional coalitions if the opposition controls one or both houses
– intelligence gathering (of policy preferences — centralized headcounts reveal the voting intentions on a particular bill and constituency concerns of individual members)
– representation
– creating “inner coalitions”
– coordination of executive branch legislative activity (monitoring and tracking bills, controlling departments’ staff appointments, collaborating with departments’ liaison offices)
Attention! Senators and Congressmen have to trust your people, who must keep their mouths shut, otherwise there will be no business. Anyway, watch these people — a Senator can call one of your assistants and if they hear “no, ” he will try to reach somebody else until he gets “Yes, the President will see you. ” Don’t let this happen – if it’s “no, ” it has to be everybody’s “no. ” There has to be no difference between personal views of your adviser and your official views.
2. Congressional Relations personnel of various executive Departments are a conduit. Talk to the Secretaries and explain to them that they have to give the Director of Congressional Relations their best people.
3. The White House interest groups liaison staff (office of public liaison)
4. Veto. Threatened with a veto, Senators often seek compromise.
Congress has its ways to undermine your vetoes or threats of vetoes. Because you can’t veto parts of a bill, they load up major legislation with amendments on a completely different subject (“riders”) that they know the President must accept. (Presidents who vetoed the most bills: Franklin Roosevelt – 635, Harry Truman – 250, Dwight Eisenhower – 181, Ronald Reagan – 78, Gerald Ford – 66).
5. Executive agreement. It permits the President to enter into open or secret agreements with a foreign government without any advice or consent of the Senate. There are two categories of executive agreements:
а) presidential agreements made solely on the basis of the constitutional authority of the President and under his sole power to faithfully execute the laws (or under his diplomatic or Commander-in-Chief powers). President needs to report secret agreement to the Foreign Relations Committees of the two houses no later than 60 days after such agreement has entered into force. Congress has no authority to disapprove it.
b) congressional-executive agreements, which cover all international agreements entered into under the combined authority of the President and Congress.
Finally, this is what you can do with a bill:
– sign the bill (the bill becomes a law)
– do nothing (the bill becomes a law in ten days)
– veto the bill (the bill does not become a law)
– pocket veto the bill (hold the bill until Congress is no longer in session, and the bill does not become a law)
Congress management
It’s much more simple that you think.
1. A Congressional session is a waste of federal time and money – you don’t need debates because Congressional staffers can do all the technical work and they can negotiate between themselves and balance positions. Senators and Congressmen don’t even have to come to Washington – they can vote from their local offices. So these people can spend their time helping thousands of constituents.
2. The President is dependent on Congressional cooperation to carry out the executive responsibilities of the Office because Congress has to authorize government programs, establish administrative agencies to implement the problems and funds to finance them.
ATTENTION : Executive Order might lower this dependence a little bit.
3. It’s important if President belongs to the party with a majority in the House and Senate. But if your party loses the majority in Congress, you have to work out new political strategy yourself.
4. President’s prestige (popular support or political capital) affects Congressional response to his politics.
5. Influence in Congress is courted only for long periods of service; a Senator with 30 years in office (like late Edward Kennedy) has considerably more power than a Senator in his first or second term. This causes the electorate to increasingly favor incumbents, as dislodging one’s Congressman or Senator after 30 years, even if the candidate or his party have become unpopular, can be viewed as hurting one’s district financially. It is often thought that a freshman would be less able to bring home federal money for his state or district.
6. For most Senators, the Senate is a platform for Presidential election campaign. Senators who openly express presidential ambitions are better able to gain media exposure and to establish careers as spokespersons for large national constituencies.
7. The first act of a newly elected Representative is to maneuver for election to the Senate. Why? First, they enjoy their position, power and money for six years non-stop. Second, there are only a hundred Senators and the publicity is much, much greater. But Representatives have a much better chance to be reelected.
8. Congress rejects two thirds of President’s proposals.
9. Senators are always looking for a BBD (bigger, better deal) and often shift from one committee to another (a good choice is those dealing with taxes, budget, energy, commerce).
10. Bills to benefit big business move smoothly. (Congress doesn’t like the poor — they don’t contribute, sorry). To gain majority support for big business legislation members have a special trick – log rolling, when factions combine efforts.
11. Senators don’t depend on the people – they depend on the media.
12. If a Senator is blocking the President’s proposal, he wants to get the President’s attention.
13. When Senators want to bury issues, they create committees.
14. The Senate is a small structure and personal relations between Senators are extremely important.
15. Senators have no incentive to study the details of most pieces of legislation and their decision is simplified by quickly checking how key colleagues have voted or intend to vote.
16. To have power a Senator has to object: much of the Senate work is done by unanimous consent and if you object you’ll be approached for sure by some influential people including other Senators, Secretaries, President’s aides or the President himself. They’ll try to press, blackmail or buy you – and that means you’ve got a piece of the power pie.
17. Senators avoid responsibility in economic policy.
18. Congress loves the military because military contracts are very lucrative for Congressional districts.
19. Senior Senators teach “newcomers” to vote against any reform which is a threat to their stability.
20. A Senator has real influence on legislation only if he has professional staff in charge of the projects.
21. Senators are afraid to vote against a defense budget increase because then they may be accused of a lack of patriotism.
22. Republicans and Democrats are not really enemies, here, though both sides are always looking for a “traitor” or “insider” in the other camp.
23. The President must have “insiders” in the Senate, because the other party could prepare secretly and then launch officially some investigation against you or the members of your Administration.
24. A legislator does exactly what his voters want him to do – stealing federal money from other states and districts, because for him the most important thing is numbers — polls in his state showing how many people approve his activity. His donors watch these numbers too and estimate their investment and the necessity to support re-election.
25. Every member of Congress has a so-called “split personality” – a “Hill style” while working on Capitol Hill and a “home style” while back in the state or district with the voters.
26. A Senator makes a decision only after thinking about what it means in terms of the re-election money that will come to him or to his opponents. His voting decisions depend on his party membership, constituency pressures, state and regional loyalty ideology, interest groups’ influence. His stubbornness comes from the fact that he does not want to be seen by his constituents as a “rubber stamp” for President’s decisions, especially when the bill in question benefits a Senator’s state. (And the hidden problem is – you want to move fast, especially during the first year while your personal popularity is high – but for the Congress speed is not important).
27. Sooner or later every member of Congress starts playing the “pork barrel” game. It’s nothing else but a diversion of federal funds to projects and places not out of national need but to enhance a member’s chances of re-election in his district (military projects, federal buildings, highways construction projects). So be ready for a “Christmas gift” when these fellows add pork barrel amendments to appropriations bills you are about to sign. They often wait until late in each session to pass critical spending bills, which narrows your range of possible responses because a veto may not be feasible if Congress has adjourned and the funds needed to run the federal government are contained in the legislation.
28. In Congress a small percentage of bills (about 500 out of 10, 000) actually become law because many bills are introduced merely to get favorable press. The strategy is especially effective if the legislation is “tied” to the headlines of the day (mass murders, natural disasters, ethnic riots etc. ).
29. In the Senate it’s easier for a minority to block the bill than for a majority to pass it: a 60-vote majority is needed to force a final vote on the bill, while only 41 votes are needed to continue debate and delay a vote.
30. The minority can hold the majority responsible as the party in power for whatever legislation does or does not emerge from the Senate. But both parties prefer to be the party in power in the Senate – all Senate legislation begins in the committees, whose membership and chairmanship are controlled by the party in power. Besides, each chairman has power in terms of controlling the committee budgets and deciding which hearings will be held and which legislation he will allow to be released to the Senate floor for a vote. He can also “lock up the bill” in committee until it dies. Perfect!
Chapter 5. Foreign policy
# 1 Job : Commander-in-Chief : American President loves war, not peace, because:
a) Successful military engagement enhances presidential popularity. All five Presidents who have run for re-election during a war have won.
b) A quick war improves the electoral fortunes of the president’s political party.
c) War is good business, at least if you win, and at least if it does not drag on too long. It stimulates demand for a variety of manufactured goods and services (even if they are all destined to go down the drain) and is a powerful stimulus to all fields of scientific endeavor.
d) War provides opportunities to direct lucrative contracts to companies and individuals who helped get the President elected, or who can help in the future; and to the constituents of select Senators and Congressmen for the same reasons.
e) War usually pleases the Joint Chiefs (and their full support is important politically).
f) War keeps down the unemployment figures.
g) War is just one detail in a vast ongoing game of international strategy for domination; it is as much a financial operation as anything else.
h) War unifies the country, and keeps the public’s attention away from issues that might be controversial.
i) War provides a rationale for the implementation of tighter legislation and the removal of certain freedoms that would never be tolerated in peacetime America.
At the same time, war is limited by political decisions and by public opinion. Initially the use of US forces spurs a "rally around the flag" effect that lifts the President’s popularity and builds up support for the troops. But the American people are casualty averse and the positive effect lasts only until the number of casualties and the length of the engagement begin to wear on the public. Continued military action will then have a deleterious effect on presidential approval ratings as the war becomes increasingly unpopular.
In the long run, the destruction of such vast quantities of resources, and the diversion of so much of the nation’s productive capacity away from actual goods and services for the real economy, are obviously immensely deleterious. Eventually, these downside effects will begin to dawn on even the best-manipulated electorate.
Foreign policy “golden rules”
1. International treaties have to be negotiated by diplomats prior to endorsement by presidents.
2. The information gathered by spies plays an increasingly role in diplomacy (arms-control treaties would be impossible without the power of reconnaissance satellites and agents to monitor compliance).
3. If you start war, it does not mean you failed diplomacy, it means military decision is much more profitable.
4. Make it clear to foreign leaders right away whether you are or you are not going to follow the previous President’s foreign policy (after consultations with big business). If you are not going to follow it, design a doctrine of your own (it’s a strategy that is the recognized approach or policy of the US government.
5. National security is your top priority and is the “king’s job” because actually you have no domestic political obstacles to your foreign policy (if it’s a question of war), so you are a chief decision maker there. (The CIA Director has to be excluded from from this process — you don’t need him. Besides, the CIA even today, no matter how hard I tried to educate the Agency, remains the worst of the worst and is not to be reformed — it has to be abolished. We have to transfer political intelligence functions to Pentagon. National security is designed to protect the United States and the vital interests (investments) of big business and to promote American values in a world of rivals, and the CIA, through all 60 years of its history, has proved to be absolutely unsuitable for the job).
6. Any country has to be involved in the sphere of our strategic interests if it has a strategic geographic position, significant sources of raw materials, a well-developed transportation system, or could be used as a military base. The strategic policy of any country rotates around the USA and if not — that means a certain President is waiting for greater incentives to come on board. Against target countries, don’t hesitate to use the strategies of pre-emptive war, post-war (post-crisis) reconstruction, and nation building (which means erasing national identity and supplanting it by liberal values).
With China’s growth, the Cold War is back with a vengeance, so we are back to secret deals based on spheres of influence — but that’s a temporary strategy.
7. You can’t always do what you want without help – you are dependent on other world leaders, Congressional positions and international public opinion. Ask the Senate to help you sometimes – believe me, they’ll be happy and proud to do so.
8. Create super-profitable conditions for big business by political penetration worldwide. Big money men start investing abroad when they find a safe environment — law and order. The more they invest the more political power they get (international corporations is the most important element of international system ; the other two are governments and non-governmental organizations).
9. Use big investors to ruin other national economies and governments by withdrawing finances when the economic situation is worsening. As soon as the country opens its financial markets, it increases its dependence on global economic processes that it cannot control; and a financial crisis can easily be staged. Conversely, other countries’ access to the US markets is a powerful economic and political tool.
10. Use my “controlled chaos strategy”. My idea to make the US economic and financial markets the most attractive for investors by provoking unstable situations in other countries and regions.
11. Send troops or work through military intelligence (not the CIA) to wherever you perceive a threat to the US investments.
12. Use pressure everywhere – strategic nuclear missiles are still the most powerful blackmail tool. Remember, if you are dealing with Russia or China, they will look not only for agreement, but for advantages.
13. Use “personal diplomacy” – phone calls to foreign leaders (every planned phone call has to go through the National Security Adviser and be well prepared, like a serious negotiation). Most important are phone calls to our allies — NATO members. Don’t forget to wish happy birthday to the leaders in person!
14. Use “informal diplomacy” – recruit politicians in other nations who might be able to give informal access to a country’s leadership. In some situations, such as between USA and China diplomacy is done through semi-formal channels using interlocutors such as academic members or think tanks. This occurs in situations when presidents wish to express intentions or to suggest methods of resolving a diplomatic situation, but do not wish to express a formal position.
15. Don’t hesitate to use summits as a tool, because:
–if you meet a foreign leader in person, you can reduce tensions and clarify national interests.
–personal relationship may lead to improved relations between nations.
–summits allow you to focus national attention on specific issues.
–presidents engaging in personal diplomacy are much more capable than career diplomatic bureaucrats of understanding the domestic policy consequences of diplomatic actions.
–summit negotiations can yield quick results, since discussions are between leaders with the power of decision rather than between representatives who must receive instructions, make reports and rely new proposals.
–diplomatic impasses may be overcome at summits by shifts in policy that only top leaders are empowered to make.
–if presidents desire an international forum for their diplomatic policies, a summit meeting can provide one.
–successful summits can enhance the image of the President and the United States
16. If you’re ready to fight for national interests, forget about human rights — you can always blame infractions on the other side.
17. Isolation is the greatest enemy to information.
18. There’s no sense in applying sanctions if big business isn’t interested.
19. Economic and hence, political progress for any country affects the USA through economic competition that threatens the market and jobs.
20. Any initiative is risky if it’s about unstable region, but you lose popularity fast if you are perceived as indecisive or weak in foreign policy.
21. Any trip abroad has to convey a strong message.
22. Direct military intrusion indicates weakness in your foreign policy. If it’s inescapable, involve as many allies as you can.
23. Don’t touch our military bases abroad!
24. Big debts open markets. No matter what, open national markets world-wide for American big business and remember – the markets, not Presidents, rule the world.
25. Tie your allies to international economic projects and make them pay most of the expenses.
26. Never talk about money in public — talk about democracy, human rights, liberal values and disarmament – people like it.
27. Move forward – transform Americans’ national and patriotic feelings into nationalistic ones (follow the French model) to get total support of your policy (see “Mind Control”).
28. Don’t pay too much attention to the CIA – all they have to do is to support you with appropriate information to justify your strategic political decisions – and nothing else.
29. Ignore the UN – Secretary General has no real power, but you can take advantage of such a thing as the UN peace-keeping if it corresponds with your interests – the US economic costs could be minimized. Besides, UN peacekeeping can promote a spirit of international accountability in solving a certain regional problem. Don’t forget to explain your strategy to the Congress – they don’t like the UN either. On the other hand, you have to manage an international crisis, if it threatens our national interests (start with strategic planning, check national security system for the adequate response, use propaganda to get domestic and international support, consult with big business and allies, start crisis negotiations if possible, use diplomacy (see below) and force or threat of force).
30. To reach global leadership you must have enough resources, national support and a well-calculated strategy (see also “Strategic planning”). As you already know, the US budget is financed by foreign lending. When the dollar goes down in foreign exchange markets, it’s supported by foreign central banks and you’re OK as long as Japan, Saudi Arabia and Germany have an interest in propping up the American economy and do not raise the price for financing America’s debt. The worst situation would be to lose support both at home and abroad
Decision making
– assessment of the international and domestic political environment
– goal setting. We have multiple foreign policy goals, and we must determine which goal is effected by the international and domestic political environment
– determination of policy options
– decision making action
– implementation of chosen policy option
World Domination
Securing the top position requires :
– economic domination
– military power – pre-emptive war or blackmail by war (seeking domination requires an inevitable increase in the military budget)
– a cultural and media invasion
– special operations to influence or neutralize leaders with negative attitude
Modern mechanism of world domination
1. If the country does not accept American rules of the game, we start a "velvet" or "colored revolution.
2. We replace the government by pro-American regime.
3. If the government resists, we start the US and NATO military operation and help the anti-government organizations to overthrow the government.
Strategies used
1. Destabilization strategy based on terrorism – you kill political leaders and civil population, blow up government buildings and blame the opposition.
2. Stabilization strategy – first, "terrorists" destabilize the situation in the country and then the US and NATO troops come to "stabilize' it.
3. "New order" or a "controlled chaos” strategy – American “new world order” to be established through the international chaos, permanent wars, civil wars and revolutions.
My definition :
"Controlled chaos” strategy –
geopolitical re-division of the world by provoking riots, revolutions, civil wars and overthrowing regimes in independent from USA sovereign states to keep the U. S. world hegemony. Political, national, religious and social conflicts in target countries have to be permanent. The strategy is being covered by a "struggle against international terrorism". The operation is preceded by information war against the target regime and backed by NATO forces if necessary.
Most important targets of the 21st century – Russia and China. That’s the reason we occupy Afghanistan. We have to circle China with our military bases in Central Asia.
4. Global energy control strategy – the US control of major oil regions and gas fields.
To keep America on top, we would have to prevent cooperation and coalitions between: China and Africa; Shi’ia and Sunni Muslims; Germany and France; Venezuela and Cuba. Their trade agreements and alliances will change the geopolitical situation.
In most important world regions keep the balance by supporting the country which follows the leader:
In Europe – support Britain to balance Germany. You rule Europe if you rule the Persian Gulf. You rule the world if you rule Europe, and that’s why you have to keep NATO by all means to block the military independence of Europe (Germany).
In East Asia – support Japan, Russia and Taiwan to balance China.
In South Asia support Pakistan to balance India.
In Latin America – support Argentina to balance Brazil.
Diplomacy secrets
1. Use secret visits (send the National Security Adviser) if the international problem is complex and important – in this way you don’t depend on media and public opinion. Afterwards you can talk, if it was a success.
2. If presidents like to drink with each other, they are ready to deal with each other.
3. Avoid negotiating on major issues at the end of the day, when your energy is low.
4. Negotiate smart, watch your initiatives. The more you tell about your position, the less your partner will tell you about himself, and the higher price you’ll pay. Diplomacy is all about money and the essence of any negotiations is the price range.
5. Any information should be exchanged as a part of a compromise and not merely given away.
6. Always talk less than necessary. Concentrate on facts and never tell other person about feelings (or your family and medical problems). Don’t interrupt others, try to understand what they really want and if they try to manipulate you. Also, resist giving in to interruptions until you have completed your thoughts – “Just a moment, I haven’t finished”. Use Taleyran approximation – if it’s difficult for you to speak up, try to make just one diplomatic statement. If they press you, insist on moving this questions to experts. And use indirect language such as “It looks like” or “You see situation from a very special angle”.
7. No negative emotions, they indicate weak nerves. Never take things personally.
8. Stop self-limiting behaviors, such as smiling too much, nodding too much, tilting your head or dropping your eyes in response to other person’s gaze. Speak normal conversational volume, don’t scream and don’t whisper, either, as you won’t be taken seriously.
9. Take a problem-solving approach to conflict, and try to see the other person as your collaborator rather than your opposition. You’d better postpone negotiations than allow them to break down.
10. Fix all questions, don’t be in a rush to answer any of them.
11. The slower you talk, the more confident you are.
12. Never ask straight questions, it’s a primitive approach.
13. It’s important to know what questions and when to ask.
Start with an “invitation” question that does not need a definite answer but opens up the discussion, like: “No matter what reporters say, we’ll start negotiating for arms control. ” Proceed with “intelligence gathering” questions, like: “Are you going to abide by our last agreement on the withdrawal of military forces or do we have other options? ” Go to “expertise” questions, like: “It’s 500 missiles, right? ”
There’s a difference between expertise and straight questions – straight question are like: “Will you sign the treaty? ” and these have to be avoided because you’ll get no straight answer right away. Finish with a closing question, like: “I think that’s what we intend to sign? Next time we can start from here. ” Or you can press your partner: “Let’s not lose this last opportunity, eh? ”
14. Explain your negative attitude in a smart way: give half the information and continue, depending on your partner’s reaction. If you can’t accept his proposal, tell him that the experts may look into it again and come to agreement. If your partner is not a complete idiot he’ll understand his proposal is unacceptable (because the experts have already done all they could). But if he is an idiot, he’ll agree to “kill” his proposals by passing them to the experts.
15. You start to lose momentum if you start to defend yourself. Stop (postpone) negotiations the moment you start to lose or you could end up in a total failure and that could be used by opposition back home.
16. If you bring ideology – try to win. If you bring national interests, try to find compromise. Be flexible – that’s strength, not weakness.
17. Don’t make aggressive statements for the media, no matter what.
18. Respect is half a victory, but you usually win when your partner is scared. Avoid open confrontation and respond to personal attacks with humor.
19. Watch the military experts – they are always ready to “push” you. No arms agreement can win ratification without backing from Joint Chiefs, because Congress needs and trusts their expertise, and their disapproval is a strong tool against you in case you ignore their advice. So, think three times before you appoint Joint Chiefs.
20. Take negotiations on the trade deficit very seriously – they often take you nowhere and have zero results as your partner wants you to change your attitude to him completely as well as your international economic policy, while you expect the same favor from him. You can influence one partner but you can’t very easily influence the international system.
21. After you come back home do some positive advertising through the media – in such a way you influence other presidents and future negotiations. If the negotiations resulted in a treaty, “sell” it to the Senate for approval.
22. Negotiation no-nos:
– don’t be confused if your partner threatens you – that means he needs your cooperation. Don’t enter into negotiation right away with high demands.
– don’t touch the toughest issues first. Don’t assume – that’s a sign of weakness.
– don’t hesitate to pause or take a break.
– never say “no” to your partner’s ideas – rather, pack them up in one “package” with your proposals.
Diplomatic tricks
Tricks in diplomacy are usually used to distract your hard working team, shift the emphasis of the negotiation in order to shape the deal on terms of your adversary or manipulate your team into closing negotiation and accept terms you don’t really like. And the tricks are:
“Leap” – your adversary is losing and starts “jumping” from one point to another
“Pile” – your adversary “piles up” problems, tries to provoke a chaotic discussion or stop negotiations
“Empty chair” – a day or two before negotiations start your adversary informs you that he’s not ready yet, trying to press you (or he wants to change location)
“Diplomatic illness” – the practice of feigning illness to avoid participation in negotiations and at the same time to avoid giving formal offense.
“Deaf” – your adversary keeps asking questions instead of answering yours
“Provocation” – your adversary doubts your team’s professional level and your ability to negotiate. Don’t go crazy.
“Busy guy” – your adversary breaks negotiation for an hour or two pretending he has to do some very important business (or that he got a very important call).
“Mirror” – it’s a “programming” trick. The technology is simple: you try to “mirror” your adversary’s style and behavior, adopt a similar posture, use his gestures, and follow the speed of his speech. First, he will like it subconsciously and will be more open to you. Second, you’ll understand better his way of thinking.
“Sandwich” – pressure (often – military) – negotiations – pressure
“Show” – using certain arguments your adversary appeals to your emotions
“Circle” – a very sophisticated trick: your adversary tries to “push” his proposal in different variants and finally comes back to his initial variant, trying to convince you that’s the best choice
“Carrot and stick” – threat (blackmail) plus promises (money). The guy could blackmail you also by demanding to set a deadline
“Student” – your adversary talks too much about the details, asking a lot of minor questions, trying to make you nervous and make mistakes
“Donkey” – your adversary declines the offer to speak first
“Ball” – encourage your adversary if he’s looking for “global decisions” and he’ll do a lot of minor favors
“Rubber” – delay, if you can’t predict the result, and press your adversary by delaying the answer
“Last train” – you can press your adversary by an ultimatum right before negotiations are over, if he really is interested in some result. “Spice” the ultimatum with some important reasons and give your adversary a choice of variants.
You can also leak opposing demands to the media (be careful with this one. Do not betray diplomatic trust by talking about secret deals or demands that actually have been mentioned). You may also escalate your demands during negotiation and manipulate public opinion to line up behind your demands.
Negotiations Procedure
I. Preparation
1. Write a plan.
2. Define your objectives.
3. Identify issues that are open to compromise and those that are not.
4. Conduct research for information to support your objectives and have information to undermine your partner’s position; think what information is available to your partner (State and Defense Departments will help you with that; not the CIA).
5. Find out how your partner negotiates with other leaders (he might have a “rabbit in a hat” for you).
6. Consult with members of a previous negotiating team about his style, strong and weak points.
7. Check the current balance of power. Attention: if you start multilateral negotiation you have to know what are the conflicts or allegiances between other partners. If they are divided into groups, identify who has the power to make a decision on behalf of a group.
8. Use game theory if you are intending to cooperate. Game theory is a theoretical analysis of the decision-making process taken by two or more players who are in conflict. You must actually estimate any possible strategies of the players who have to make decisions without knowledge of what other players are planning. Each player’s strategy, once undertaken, will affect the others. Game theory is often illustrated by the “prisoners dilemma” paradigm. It supposes that two men have been arrested on a suspicion of committing a crime together and are being held in separate cells. There is not enough evidence to prosecute unless one confesses and implicates the other. Both of them know this but cannot talk to each other. The dilemma is that the best outcome, not being convicted, is only available if they each trust the other not to implicate him. If X decides to trust Y, but Y fears X may not be trustworthy, Y may confess to get a lesser sentence; X then gets a worse one. The best solution to this dilemma is for both to cooperate, to minimize the worst that can happen, rather than trying for the outcome that is maximum. This is called the minimax strategy and it’s classified as being the most probable outcome.
Conducting negotiations
Never conduct negotiations before 10 a. m. or after 4 p. m.
First of all, you have to decide whether you want to speak first or to respond to your partner’s proposal. There’s an advantage in letting your partner make the opening proposal as it might be much more beneficial for you than you suspect.
Then:
a) put forward a proposal (with as little emotion as possible). You have to make your initial offer-demand high and compromise from that point onward. Your partner will understand perfectly well it’s too much, so make your initial demand greater than you expect to receive, and offer less than you are expected to give. (For the same reason feel free to reject the first proposal received. ) While talking further, leave yourself room for maneuvering, presenting your proposals, and don’t try to pin down your partner to a fixed position too soon, because he needs room to maneuver, too. Make a final offer when the atmosphere is most cooperative.
b) respond to proposals in a smart way (again, no emotions). Never take the first offer – if you take it, your adversary may feel there is something wrong with it or he didn’t get the best deal. Capture any similarities on both sides. Don’t hesitate to make conditional counter-offers: “If you do this, we’ll do that. ” Cut the unexpected introduction of new issues and follow strictly a concise step-by-step agenda. Probe your partner’s attitudes: “What would you say if we both lower our demands? ” but indicate that every concession you make is a major loss to you. Ask as many questions as you want – the more information you have, the more you control negotiation. To think over and re-design your strategy, ask for a break as many times as it’s acceptable. Summarize your partner’s proposals.
c) move towards a bargain. You must know perfectly well the response to each of your points before you open your mouth. If your aides can’t help you, you have the wrong aides and you even might be a wrong president. Offer the lowest price first, as you may not need to go any further. Negotiate a “package, ” don’t concentrate on one demand and link other, smaller demands to it. While making a final offer look at the other party and check the body language (see below), your team members must confirm by body language that this is your final offer. It’s OK to press the partner by emphasizing the need to reach agreement, like: “We know our nations are waiting to see the treaty signed. ” (If your partner looks at his watch, it means he wants to end the talk. ) If you see you are approaching a dead end, ask your partner to talk off the record, in private, but if you talk in private, you have to keep your word no matter what.
Sometimes negotiations (as in the Israel-Palestine case) run into serious problems and breakdowns. Strong diplomats never say “never” and never leave forever, and always are ready to come back and agree right away on new dates to continue talks, as though a breakdown is just one more pressure trick. The best thing to do is to re-establish communications as soon as possible and you have to do this through your team member who has good connections and influence with other party. Act fast, especially if the consequences of “no deal” would be worse than the last deal that was on the table. If the situation is not improving, you have nothing else but to use a mediator. I do not recommend you to take responsibility as mediator or to use a mediator for your diplomatic needs. International experience shows that these old and “experienced” people usually make the situation worse, like bringing in a lawyer — even if the situation looks better for the next couple of years. But if you have no choice and your partner, and your aides insist on using a mediator to resolve the situation you have to think it over … and agree.
Mediation is the process in which deadlocked parties consider the suggestions of a third party, agreed upon in advance, but are not bound to accept the mediator’s recommendations. The mediator works as a referee between the negotiating parties and tries to find common ground among their agendas. Once some common ground is established, the mediator can begin to look for mutually acceptable ways out of the deadlock. A mediator between presidents has to be a president himself, very influential, and well informed on the situation to be able to make effective recommendations.
He has to:
a) consider the situation from all angles
b) help both parties to understand each other better
c) help the parties to create new approaches
d) suggest a solution, give alternatives
But if the two sides’ demands are too far apart, no outside party can bring them together at all. ( Often a mediator has to make multiple trips between two parties, who do not talk directly, and it’s called shuttle diplomacy. Usually, two parties do not formally recognize each other, but still want to negotiate. The term became widespread following Henry Kissinger’s term as National Security Adviser and then, as the United States Secretary of State (in 1973-1977), when he participated in shuttle diplomacy in the Middle East and China).
Closing negotiation
That’s the most important part, a final mutual agreement or disagreement, a test for your foreign policy making strategy and tactics and personally for you, your power and your image. Any treaty you sign with foreign leaders, if it meets American interests, is not your personal success, but that of the nation. There are three options:
a) the agreement with all conditions is acceptable to both parties
b) the agreement is acceptable to one party only
c) the agreement is unacceptable for both parties
Diplomatic Double Talk
Statement Meaning
We are disappointed. We got nothing.
Situation disturbs us. It’s unacceptable.
There are still differences between There are huge differences.
our approaches.
We can’t accept this deal. This means trouble.
We reserve the right to use any means
to prevent further worsening of the situation. This means war.
Discussion helped us to understand each
other better. We’ve wasted our time.
We don’t understand your attitude. Stop it immediately.
I’m trying to understand your position. Understand me too, idiot!
If I’ve understood you correctly, you don’t agree. Do you have any other option?
We’ll pay a very high price if we don’t
reach agreement. Yes, that’s a threat!
was also "removed".
Chapter 6. War.
Commander-in-Chief
President loves war because:
a) Successful military engagement enhances presidential popularity. All five Presidents who have run for re-election during a war have won. b) A quick war improves the electoral fortunes of the president’s political party. c) War is good business, at least if you win, and at least if it does not drag on too long. It stimulates demand for a variety of manufactured goods and services (even if they are all destined to go down the drain) and is a powerful stimulus to all fields of scientific endeavor. d) War provides opportunities to direct lucrative contracts to companies and individuals who helped get the President elected, or who can help in the future; and to the constituents of select Senators and Congressmen for the same reasons. e) War usually pleases the Joint Chiefs (and their full support is important politically). f) War keeps down the unemployment figures. g) War is just one detail in a vast ongoing game of international strategy for domination; it is as much a financial operation as anything else. h) War unifies the country, and keeps the public’s attention away from issues that might be controversial. i) War provides a rationale for the implementation of tighter legislation and the removal of certain freedoms that would never be tolerated in peacetime America. At the same time, war is limited by political decisions and by public opinion. Initially the use of US forces spurs a "rally around the flag" effect that lifts the President’s popularity and builds up support for the troops. But the American people are casualty averse and the positive effect lasts only until the number of casualties and the length of the engagement begin to wear on the public. Continued military action will then have a deleterious effect on presidential approval ratings as the war becomes increasingly unpopular. In the long run, the destruction of such vast quantities of resources, and the diversion of so much of the nation’s productive capacity away from actual goods and services for the real economy, are obviously immensely deleterious. Eventually, these downside effects will begin to dawn on even the best-manipulated electorate.
Sniper
"Golden" rules
1. Train your muscles to snap to the standard position for shooting, to squeeze the trigger straight back with the ball of your finger to avoid jerking the gun sideways. Train yourself to shoot while you stand, sit, lie, walk, run, jump, fall down; shoot at voices, shoot in a dark room, different weather and distance, day and night; shoot one object and a group; use one gun, two guns, gun and submachine gun (some doctrines train a sniper to breathe deeply before shooting, then hold their lungs empty while he lines up and takes his shot; other go further, teaching a sniper to shoot between heartbeats to minimize barrel motion) 2. Camouflage yourself ten times before you make a single shot. Position yourself in a building (no rooftops or churches! ), which offers a long-range fields of fire and all-round observation. Don’t stay in places with heavy traffic! Use unusual angles of approach and frequent slow movement to prevent accurate counter-attacks. 3. Move slowly to prevent accurate counter-attack, don’t be a mark yourself 4. Kill officers and military leaders first (Attention, officers: don’t walk in front of your soldiers! ) 5. Use suppressive fire to cover a retreat 6. Use rapid fire when the squad attempts a rescue 7. Shoot helicopters, turbine disks of parked jet fighters, missile guidance packages, tubes or wave guides of radar sets 8. At distances over 300 m attempt body shots, aiming at the chest; at lesser distances attempt head shots (the most effective range is 300 to 600 meters). Police snipers who generally engage at much shorter distances may attempt head shots to ensure the kill (in instant-death hostage situations they shoot for the cerebellum, a part of the brain that controls voluntary movement that lies at the base of the skull). 9. Shoot from flanks and rear. 10. Never approach the body until you shoot it several times 11. Careful: the object could be wearing a bulletproof vest 12. It’s important to get to the place, but it’s more important to get out alive 13. Remember, in hot weather bullets travel higher, in cold — lower; a silencer reduces the maximum effective range of the weapon. Wind poses the biggest problem — the stronger the wind, the more difficult it is to hold the rifle steady and gauge how it will affect the bullet’s trajectory. (You must be able to classify the wind and the best method is to use the clock system. With you at the center of the clock and the target at 12 o’clock, the wind is assigned into three values: full, half and no value. Full value means that the force of the wind will have a full effect on the flight of the bullet, and these winds come from 3 and 9 o’clock. Half value means that a wind at the same speed, but from 1, 2, 4, 5, 7, 8, 10 and 11 o’clock, will move the bullet only half as much as a full-value wind. No value means that a wind from 6 or 12 o’clock will have little or no effect on the flight of the bullet). Shooting uphill or downhill can require more adjustment due to the effects of gravity. For moving targets, the point of aim is in front of the target ( it’s called "Leading" the target, where the amount of lead depends on the speed and angle of the target’s movement. For this technique, holding over is the preferred method. Anticipating the behavior of the target is necessary to accurately place the shot). 14. NEVER fire from the edge of a wood line – you should fire from a position inside the wood line (in the shade of shadows). 15. Do not cause overhead movement of trees, bushes or tall grasses by rubbing against them; move very slowly. 16. Do not use trails, roads or footpaths, avoid built-up and populated areas and areas of heavy enemy guerrilla activity. 17. If you work in terrain without any natural support, use your rucksack, sandbag, a forked stick, or you may build a field-expedient bipod or tripod. The most accurate position though is prone, with a sandbag supporting the stock, and the stock’s cheek-piece against the cheek. 18. The sniper has a tendency to watch the target instead of his aiming point.
Counter-sniper tactics
1. Active: direct observation by posts equipped with laser protective glasses and night vision devices; patrolling with military working dogs; calculating the trajectory; bullet triangulation; using decoys to lure a sniper; using another sniper; UAV (unmanned aerial vehicles); directing artillery or mortar fire onto suspected sniper positions, the use of smoke-screens; emplacing tripwire-operated munitions, mines, or other booby-traps near suspected sniper positions.
1. If you found a mine, remove enough dirt around it to see what type of mine it is, mark it and report its exact location to your leader. Once a footpath has been probed and the mines marked, a security team should cross the minefield to secure the far side. After the far side is secure, the rest of the unit should cross. 7. Visual indicators. Pay attention to the following indicators : trip wires, signs of road repair (new fill or paving, road patches, ditching), dead animals, damaged vehicles, tracks that stop unexplainably, wires leading away from the side of the road (they may be firing wires that are partially buried), mounds of dirt, change of plants color,, pieces of wood or other debris on a road. Remember, mined areas, like other obstacles are often covered by fire. Keep also in mind, that local civilians try to avoid certain (mined) areas. 8. Use phony minefields to simulate live minefields. For example, disturb the ground so that it appears that mines have been emplaced and mark boundaries with appropriate warnings. 9. Make a real minefield appear phony, or camouflage it. For example, once a real minefield is settled, a wheel or a specially made circular wooden tank track marker can be run through the field, leaving track or tire marks to lure the enemy onto live mines. Antipersonnel mines should not be sown in such a field until the track marks have been laid. Another method is to leave gaps in the mechanically laid field, run vehicles through the gaps, and then close them with hand-laid mines without disturbing the track marks. 10. Use feint attack to draw defensive action towards the point under assault (it’s usually used as a diversion and to force the enemy to concentrate more manpower in a given area so that the opposing force in another area is weaker). 11. Issue false orders over the radio, imitate a tanks’, fighters’ and bombers’ assault while preparing to retreat. 12. Use dummy units and installations, phony radio traffic, movement and suppressive fires in other areas timed to coincide with the real attack 13. Use force multiplication by using decoy vehicles and use small convoys to generate dust clouds. Move trucks into and out of the area giving it the appearance of being a storage facility or logistic base. 14. Simulate damage to induce the enemy to leave important targets alone. For example, ragged patterns can be painted on the walls and roof of a building with tar and coal dust, and covers placed over them. 15. Stack debris nearby and wire any unused portions for demolition. During an attack, covers are removed under cover of smoke generators, debris scattered and demolitions blown. Subsequent enemy air photography will disclose a building that is too badly damaged to be used. 16. Change positions at night time only. 17. Use dispersal to relocate and spread out forces to increase their chances of survival. 18. Imitate fake ballistic missiles divisions and military headquarters to entrap enemy’s intelligence and sabotage groups. 19. Use "sack" strategy ("cutting" enemy’s army into separate groups). 20. Use strategic bombing (the massive attack on cities, industries, lines of communication and supply). 21. Simulate bombing of minor objects and attack important ones. 22. Use counter-battery fire (detecting with counter-battery radars the source of incoming artillery shells and firing back), using mobile artillery pieces or vehicles with mounted rocket launchers to fire and then move before any counter-battery fire can land on the original position. 23. Use airborne operations, when helicopters transport troops into the battle and provide fire support at battle sites simultaneously with artillery fire, keeping enemy off guard. 24. Helicopters are extremely important as they can be sent everywhere: to kill tanks and other helicopters, for aerial mine laying, for electronic warfare, for naval operations (anti-submarine and anti-ship patrols), to correct artillery and tactical fighters fire, for reconnaissance, command, control and communications, to insert special forces, to evacuate casualties (this helps maintain the morale of the troops), to carry supplies (missile systems, ammunition, fuel food, to escort convoys, for navigational help, to destroy battlefield radars, communications and radio relay systems, to seal gaps and protect flanks, for rear-area security, counter — penetration, rapid reinforcement of troops under pressure, raids and assaults behind enemy lines, air assault in offensive and defensive operations, to strengthen anti-tank defenses by inserting infantry anti-tank teams. Helicopters offer a strong tactical surprise and take a ground conflict into the third dimension, making the enemy’s ground maneuvers impossible. 25. When fighting an insurgency: once you get intelligence, you have to bomb the area to "soften" insurgents and then send helicopters with special forces teams right away. Helicopters suppress and cut-off by fire insurgents trying to escape and the teams clear-up the remains. Transport helicopters must bring in troops rapidly from different bases and build-up numerically superior force which insurgents cannot match. 26. Use joint bombers/fighters flights to bomb transportation, supply, bridges, railroads, highways, antiaircraft and radar sites. To gain surprise, attack with the sun behind you. Remember, enemy will try to saturate the airspace through which the aircraft will fly with fire. 27. Watch out for the tank ambushes!
1.
Storming the City
1. Effective intelligence is 90% of success. Use sources like agents among the enemy’s high ranking officers, prisoners of war, captured documents and maps, enemy’s activity, local civilians (agents). Use intelligence and sabotage groups (through them you can deliver your fake plans and maps). You must know how the enemy usually defends a built-up area and the approaches to it, critical objectives within the built-up area that provide decisive tactical advantages, tactical characteristics of the built-up area and its structure. Information about the population will assist in determining where to attack, what firepower restrictions may be imposed, and what areas within the urban complex must be avoided to minimize destruction of life-support facilities and civilian casualties. 2. Make the enemy attack you if possible, because if you attack first the victims calculation is 5:1. 3. Train your troops to storm this certain city. 4. Blockade the city completely. 5. Attack the city from different points ( flanks and rear! ) at the same time after intense artillery fire and bombing (that’s a very strong psychological blow. Its intensity is determined by the strength of defensive forces, the type of building construction, and the density of fires required to suppress observation and fires. You must destroy command posts, heavy weapons positions, communications, troop emplacements, tall structures that permit observation. Then engineers move forward under the cover of smoke and high explosives to neutralize barriers and breach minefields on routes into the city). Field artillery, attack helicopters and offense air support must disrupt the enemy command and control network and destroy his support units ( field artillery mostly creates breaches in buildings, walls and barricades
Mortars cover avenues of enemy troop movements, such as street intersections and alleys; mortars firing positions are placed behind walls or inside buildings close to their targets). A hasty attack is conducted when the enemy has not established strong defensive positions and attacking forces can exploit maneuver to overwhelm the defense – locate a weak spot or gap in enemy defenses, fix forward enemy elements, rapidly move through or around the gap or weak spot to be exploited. A deliberate attack is necessary when enemy defenses are extremely prepared, when the urban obstacle is extremely large or severely congested., or when the advantage of surprise has been lost. It’s divided into three basic phases: isolation from reinforcement and resupply by securing dominating terrain and utilizing direct and indirect fires; assault to rupture the defenses and secure a foothold on the perimeter of the built-up area from which attacks to clear the area may be launched (an envelopment, assaulting defensive weaknesses on the flanks or rear of the built-up area, is preferred, however, a penetration may be required; and clearance, a systematic building-by-building, block-by-block advance through the entire area.. 6. Target vital bridges, transportation facilities that are required to sustain future combat operations, strategic industrial or vital communications facilities. Attacks against built-up areas will be avoided when the area is not required to support future operations, bypassing is tactically feasible, the built-up area has been declared an "open city" to preclude civilian casualties or to preserve cultural or historical facilities, sufficient combat forces are not available to seize and clear the built-up area. 7. Don’t use tanks on narrow streets! Tanks can be decisive in city fighting, with the ability to demolish walls and fire medium and heavy machine guns in several directions simultaneously. However, tanks are especially vulnerable in urban combat. It’s much easier for enemy infantry to sneak behind a tank or fire at its sides, where it is vulnerable. In addition, firing down from multi-story buildings allows shots at the soft upper turret armor and even basic weapons like Molotov cocktails, if aimed at the engine air intakes, can disable a tank. 8. Use 3 groups at each point. 1st. A "dead" group plus tanks moves fast to the center, again, after intense artillery fire and bombing (otherwise you’ll have heavy casualties). 2nd. The group follows the first one and inside the city goes like a "fan" in all directions enveloping the defender’s flanks and rear. 3rd. The group is on reserve in case the enemy counterattacks. The first phase of the attack should be conducted when visibility is poor. Troops can exploit poor visibility to cross open areas, gain access to rooftops, infiltrate enemy areas and gain a foothold. If the attack must be made when visibility is good, units should consider using smoke to conceal movement. The formation used in attack depends on the width and depth of the zone to be cleared, the character of the area, anticipated enemy resistance, and the formation adopted by the next higher command. Lead companies may have engineers attached for immediate support. Tasks given to engineers may include preparing and using explosives to breach walls and obstacles, finding and exploding mines in place or helping remove them, clearing barricades and rubble, cratering roads. 9. Use paratroopers to capture important objects (airport, government buildings, military headquarters, port, railway station). 10. Capture high buildings and place machine gunners and snipers on upper floors (buildings provide excellent sniping posts for defenders, too). 11. Get all important cross-roads to maneuver troops and tanks. 12. Block highways! 13. Watch out – there are mines everywhere (alleys and rubble-filled streets are ideal for planting booby traps). Be alert for booby traps in doors, windows, halls, stairs, and concealed in furniture. 14. Watch underground communications – the enemy could stay in subway tunnels, sewage system. 15. Don’t waste time storming the buildings – blow up the walls and move forward. 16. Soldiers in an urban environment are faced with ground direct fire danger in three dimensions — not just all-round fire but also from above (multi-story buildings) and from below (sewers and subways) and that’s why, here, the most survivable systems, like tanks, are at great risk. Also, there are increased casualties because of shattered glass, falling debris, rubble, ricochets, urban fires and falls from heights. Stress-related casualties and non-battle injuries resulting from illnesses or environmental hazards, such as contaminated water, toxic industrial materials also increase the number of casualties. 17. In the streets use artillery and mortars to "soften" the enemy up before assault.
Special forces
Maximum damage, minimum loss.
Special military operations have special requirements:
1. Detailed planning and coordination that allow the special unit to discern and exploit the enemy’s weakness while avoiding its strength.
2. Decentralized execution, individual and unit initiative.
3. Surprise, achieved through the units ability to move by uncommon means, along unexpected routes, over rough terrain, during poor weather and reduced visibility. Survivability, achieved by rapid mission accomplishment and a prompt departure from the objective area.
4. Mobility, speed, and violence of execution (the speed at which events take place confuses and deceives the enemy as to the intent of the unit, and forces the enemy to react rather than to take the initiative).
5. Shock effect, which is a psychological advantage achieved by the combining of speed and violence. The special unit strives to apply its full combat power at he decisive time and place, and at the point of the greatest enemy weakness.
6. Multiple methods of insertion and attack, trying not to repeat operations thus decreasing the chance the enemy will detect a pattern. Deception, achieved by feints, false insertions, electronic countermeasures, and dummy transmissions.
7. Audacity, achieved by a willingness to accept a risk.
Any special team member has to have experience in sniping, underwater swimming, conducting high-altitude, low-opening parachute operations, demolition, using all kinds of weapons, including man-portable air-defense system weapons. And there are some limitations, like limited capability against armored or motorized units in open terrain and no casualty evacuation capability.
Use special forces for:
a) establishing a credible American presence in any part of the world
b) conducting limited combat operations under conditions of chemical, nuclear
or biological contamination
c) surveillance and intelligence gathering using recruited agents too (local citizens who support your war or just work for money). To get to the area you have to use infiltration, the movement into the territory occupied by enemy troops, the contact is avoided.
d) raids on the enemy’s defense system
Raids are normally conducted in the following phases: the team inserts or infiltrates into the objective area; the objective area is sealed off from outside support or reinforcement, to include the enemy air threat; any enemy force at or near the objective is overcome by surprise and violent attack, using all available firepower for shock effect; the mission is accomplished quickly before any surviving enemy can recover or be reinforced; the ranger force quickly withdraws from the objective area and is extracted. (The team can land on or near the objective and seize it before the enemy can react. Thus you avoid forced marches over land carrying heavy combat loads. If there is no suitable landing area near the objective, or the enemy has a strong reaction force nearby, the team has to land unseen far from the objective. It then assembles and moves to the objective).
e) ambush.
Depending on terrain ambushes are divided into near (less than 50 meters, in jungle or heavy woods) and far (beyond 50 meters, in open terrain).
Raids consist of clandestine insertion, brief violent combat, rapid disengagement, swift deceptive withdrawal. The raid is used mostly to destroy command posts, communication centers and supply dumps, shipyards, electrical generation facilities, water pumping stations, phone lines, oil or natural gas pipelines, radio and TV stations, mountain passes or routes in restricted terrain, capture supplies and personnel, rescue friendly forces, distract attention from other operations, steal plans and code books, rescue prisoners of war, create havoc in the enemy’s rear areas, blow railroads and bridges. By blowing bridges you block and delay the movement of personnel and supplies and by making railroads and certain routes temporary useless you change enemy’s movement on t a small number of major roads and railway lines where it is more vulnerable to attack by other forces (especially air strikes).
Stages of an ambush
1. Planning.
You have to identify a suitable killing zone (a place where the ambush will be laid). It’s a place where enemy units are expected to pass
and which gives reasonable cover for the deployment execution and extraction phases of the ambush patrol. Ambush includes 3 main elements: surprise, coordinated fire of all weapons to isolate the killing zone and to inflict maximum damage and control (early warning of target approach, opening fire at the proper time, timely and orderly withdrawal). You can also plan a mechanical ambush, which consists of the mines set in series. Preparation. You have to deploy into the area covertly, preferably at night and establish secure and covert positions overlooking the killing zone. Then you send two or more cut off groups a short distance from the main ambushing group into similarly covert positions they have to give you early warning of approaching enemy by radio and, when the ambush is initiated, to prevent any enemy from escaping. Another group will cover the rear of the ambush position and thus give all-round defense to the ambush patrol. No smoking! Attention: you have to occupy the ambush site as late as possible as this reduces the risk of discovery. (While choosing and ambush site pay attention to natural cover and concealment for your team, routes of entry and withdrawal, good observation and fields of fire, harmless-looking terrain, few enemy escape routes, terrain that will canalize enemy into the killing zone, and natural obstacles to keep him there).
2. Execution.
You must give a clear instruction for initiating the ambush. It should be initiated with a mass casualty producing weapon (mortars and machine guns) to produce a maximum shock effect and break the enemy’s spirit to fight back (shock effect can cover unexpected defects in ambush, like ambushing a much larger force that expected). Then, after the firefight has been won, the ambush patrol has to clear the zone by checking bodies for intelligence and taking prisoners. After that you have to leave the area as soon as possible, by a pre-determined route.
3. Disruption of the government functions: recruitment of informants; terror and murders of political leaders and federal and local government chiefs, provoking strikes and mass disobedience; publishing illegal newspapers and literature; anti-government propaganda through illegal radio stations; involving locals in the guerrilla campaign.
Guerrilla warfare
Guerrilla warfare is the unconventional warfare and combat with which a small group use mobile tactics (ambushes, raids, etc) to fight a larger and less mobile regular army. THIS IS ABSOLUTELY WRONG – they sabotage the rear! Same mistake Soviet guerrillas did during World War II, though Chechnya is an example.
Guerrilla tactics are based on intelligence, ambush, deception, sabotage, undermining an authority through long, low-intensity confrontation. A guerrilla army may increase the cost of maintaining an occupation above what the foreign power may wish to bear. Against a local regime, the guerrillas may make governance impossible with terror strikes and sabotage, and even combination of forces to depose their local enemies in conventional battle. These tactics are useful in demoralizing an enemy, while raising the morale of the guerrillas. In many cases, a small force holds off a much larger and better equipped army for a long time, as in Russia’s Second Chechen War. Guerrilla operations include attacks on transportation routes, individual groups of police and military, installations and structures, economic enterprises and targeted civilians, politicians included. Attacking in small groups, using camouflage and captured weapons of that enemy, the guerrilla force can constantly keep pressure on its foes and diminish its numbers, while still allowing escape with relatively few casualties. The intention of such attacks is not only military but political, aiming to demoralize target populations or governments, or goading an overreaction that forces the population to take sides for or against the guerrillas. Ambushes on key transportation routes are a hallmark of guerrilla operations, causing both economic and political disruption.
Whatever the particular tactics used, the guerrillas primarily fight to preserve his forces and political support, not capture or hold specific territory as a conventional force would.
Guerrilla warfare resembles rebellion, yet it is a different concept. Guerrilla organization ranges from small, local, rebel groups of a few dozen guerrillas, to thousands of fighters, deploying from cells to regiments. In most cases, the leaders have clear political aims for the warfare they wage.
Typically, the organization has political and military wings, to allow the political leaders a plausible denial for military attacks. Guerrillas operate with a smaller logistical footprint compared to conventional formations. A primary consideration is to avoid dependence on fixed bases and depots which are comparatively easy for conventional units to locate and destroy. Mobility and speed are the keys and wherever possible, the guerrilla must live off the land, or draw support from the civilian population in which he is embedded. Financing of operations ranges from direct individual contributions (voluntary or not), and actual operation of business enterprises by insurgent operatives, to bank robberies, kidnappings and complex financial networks based on kin, ethnic and religious affiliation (such as used by Jihad organizations). Permanent and semi-permanent bases form part of the guerilla logistical structure, usually located in remote areas or in cross-border sanctuaries sheltered by friendly regimes.
Rural guerrillas prefer to operate in regions providing plenty of cover and concealment, especially heavily forested and mountainous areas. Urban guerrillas blend into the population and are also dependent on a support base among the people. Intelligence is very important; collaborators and sympathizers will usually provide a steady flow of information.
Public sources of information and Internet serve very well, too. Intelligence is concerned also with political factors such as occurrence of an election or the impact of the potential operation on civilian and enemy morale.
Able to choose the time and place to strike, guerrillas possess the tactical initiative. Many guerrilla strikes are not undertaken unless clear numerical superiority can be achieved in the target area. Individual suicide bomb attacks offer another pattern, involving only one individual bomber and his support team. Whatever approach is, guerrillas hold the initiative and can prolong their survival through varying the intensity of combat. This means that attacks are spread out over quite a range of time, from weeks to years. During interim periods, the guerrilla can rebuild, resupply, train, provide propaganda indoctrination, gather intelligence, infiltrate into army, police, political parties and community organizations,
Relationships with civil population are influenced by whether the guerrillas operate among a hostile or friendly population. A friendly population is of huge importance to guerrillas, providing shelter, supplies, financing, intelligence and recruits. Popular mass support in a confined local area or country however is not always strictly necessary. Guerrillas can still operate using the protection of a friendly regime, drawing supplies, weapons, intelligence, local security and diplomatic cover. The Al-Qaeda is an example of the latter type, drawing sympathizers and support primarily from the wide-ranging Arab world.
Foreign support (soldiers, weapons, sanctuary or statements of sympathy for the guerrillas can greatly increase the chances of an insurgent victory. Foreign diplomatic support may bring the guerrilla cause to international attention, putting pressure on local opponents to make concessions, or garnering sympathetic support and material assistance. Foreign sanctuaries can add heavily to guerrilla chances, furnishing weapons, supplies, materials and training bases. Such shelter can benefit from international law, particularly if the sponsoring government is successful in concealing its support and in claiming a plausible denial for attacks by operatives based on its territory. Al-Qaeda, for example, made effective use of remote territories, such as Afghanistan under the Taliban regime, to plan and execute its operations.
Terror is used by guerrillas to focus international attention on the guerrilla cause, kill opposition leaders, extort money from targets, intimidate the general population, create economic losses, and keep followers and potential defectors in line. Such tactics may backfire and cause the civil population to withdraw its support, or to back countervailing forces against the guerrillas. Such situations occurred in Israel, where suicide bombings encouraged most Israeli opinion to take a harsh stand against Palestinian attackers, including general approval of targeted killings to kill enemy cells and leaders. Civilians may be attacked or killed for alleged collaboration, or as a policy of intimidation and coercion operations are sanctioned by the guerrilla leaders if they see a political benefit. Attacks may be aimed to weaken civilian morale so that support for the guerrilla opponents decreases. The use of attacks against civilians to create atmosphere of chaos ( and thus political advantage where the atmosphere causes foreign occupiers to withdraw or offer concessions), is well established in guerrilla and national liberation struggles.
Guerrillas are not normally organized or equipped for stand-and-fight type defensive operations. They prefer to defend themselves by moving, by dispersing into small groups, or by diverting the opponent’s attention while they withdraw. Whenever possible, these operations are accomplished by offensive operations against the opponent’s flank or rear. One of the most important needs of guerrilla forces is support, which can come from different sources – food can be stolen or supplied by political sympathizers, weapons can be gathered from raids on government installations or provided by a foreign power (as well as secret training and indoctrination).
Guerrillas strength:
– highly motivated leadership and simple organization. The basic guerrilla organization is an independent three- to five-men cell. The cells can be brought together for larger operations and dispersed later. Guerrillas are organized into cells for two reasons: first, it’s security, second, it’s for support (guerrillas must live off the land to a large degree, and small cells easier support themselves).
– strong belief in a political, religious, or social cause (most of them are fanatics)
– ability to blend with local population and perfect knowledge of environment
– strong discipline
– effective intelligence through penetration into the government agencies
– limited responsibilities (the guerrillas usually don’t have the responsibility to maintain normal governmental obligations toward society)
– the ability to utilize a broad range of tactics, from terror and sabotage through conventional warfare. They don’t hesitate to use bombings, kidnappings, murders, torture, blackmail to press local authorities or provoke overreaction on the part of the government forces, so that the population will be alienated by the government forces actions (it happens when they target government leaders). In cities guerrillas can disrupt public utilities and services by sabotage and the government may lose control of the situation; they can widely use snipers and explosives there. They can generate widespread disturbances, attack government offices, create incidents or massing crowds in order to lure the government forces into a trap.
– mobility. Guerrillas usually disperse during their movements and unite near the target area. The most common techniques employed by them are the ambush, raid and small-scale attacks against security posts, small forces, facilities and lines of communication, using mining, booby trapping and sniping. Targets are selected by the guerrilla based on an analysis of how much the elimination of the target will disrupt the government, what the effect on the populace will be, the risk of being killed or captured, and the amount of weapons or supplies which can be used (this analysis calls for timely intelligence, which is gained by active patrolling).
Guerrilla Weaknesses:
– mental and physical stress, caused by long periods of isolation in an unstable environment
– fear of criminal prosecution by the government, or of reprisals against friends and family
– feeling of numerical and technological inferiority of counter-guerrilla forces
– limited personnel and resources, and uncertain public base of support
– security problems about their base camps (they are usually not more than one day march from a village or town). If guerrillas receive support from external sources, they are faced with a problem of security for supply lines, transport means and storage facilities. Besides, you have to know their organization and plans, resources (arms, ammunition, food and medicine supply), leaders and their personalities, lines of communications, relations with civilian population, vulnerabilities. (Again, recruit, recruit and recruit! ). You have to evaluate also the effects of terrain (including landing and pickup zones) and the weather effect on men, weapons, equipment, visibility and mobility.
Urban guerrilla warfare has its own peculiarities. Cities and towns are vulnerable to urban guerrilla because they are the focus of economic and political power. In many cases, public utilities can be disrupted and the government may appear to have lost control of the situation. The concentration of a large number of people in a relatively small area provides cover for the guerrilla. However, the insurgent may find support only in a certain areas of a town or a city. Anyway, the urban guerrilla lives in a community that is friendly to him or is too frightened to withhold its support or betray him. In a city the snipers and explosive devices can be placed everywhere. The availability of large numbers of people ensures that crowds can be assembled and demonstrations manipulated easily. The presence of women and children restricts counter-guerrilla force reactions, and excessive force may ensure a major incident that provides the guerrilla with propaganda. Publicity is easily achieved in an urban area because no major incident can be concealed from the local population even if it is not widely reported by the news media. Every explosion may be exploited to discredit the ability of the government to provide protection and control.
Urban guerrilla tactics:
– disrupting industry and public services by strikes and sabotage
– generating widespread disturbances designed to stretch the resources of the counter-guerrilla force
– creating incidents or massing crowds in order to lure the counter-guerrilla into a trap
– provoking the counter-guerrilla force in the hope that it may overreact (to provide hostile propaganda after that)
– fomenting interfactional strife
– sniping at roadblocks, outposts and sentries
– attacking buildings with rockets and mortars
– planting explosive devices, either against specific targets or indiscriminately, to cause confusion and destruction, and to lower public morale
–ambushing patrols and firing on helicopters
Counter-guerrilla warfare
1. Since many insurgents rely on the population for recruits, food, shelter, financing, you must focus your efforts on providing physical and economic security for that population and defending it against insurgent attacks and propaganda.
2. There must be a clear political program that can neutralize the guerrilla program this can range from granting political autonomy to economic development measures in the affected region + an aggressive media campaign.
3. You have to clean and re-build all levels of the government structure usually insurgents talk about corrupted politicians a lot and that’s why they have support from population.
4. You don’t have to overreact to guerrilla actions, because this is what they are looking for.
5. Use big military operations only to break up significant guerrilla concentrations and split them into small groups.
6. Keep insurgents on run constantly with aggressive patrols, raids, ambushes, sweeps, cordons, roadblocks, prisoner snatches. Intelligence and recruitment of informants is the key to success. (KGB in post WWII period used bogus guerrilla groups in Western Ukraine that helped reveal real insurgents).
7. An ink spot clear and hold strategy must be used to divide the conflict area into sectors and assign priorities between them. Control must expand outward like an ink spot on paper, systematically neutralizing and eliminating the insurgents in one sector of the grid, before proceeding to the next. It may be necessary to pursue holding or defensive actions elsewhere, while priority areas are cleared and held.
8. Mass forces, including village self-defense groups and citizen militias organized for community defense can be useful in providing civic mobilization and local security.
9. Use special units and hunter-killer patrols.
10. The limits of foreign assistance must be clearly defined and carefully used. Such aid should be limited either by time, or as to material and technical, and personnel support, or both. While outside aid or even troops can be helpful, lack of clear limits, in terms of either a realistic plan for victory or exit strategy, may find the foreign helper taking over the local war, and being sucked into a lengthy commitment, thus providing the guerrillas with valuable propaganda opportunities as the stream of dead foreigners mounts. Such scenario occurred with United States in Vietnam and since 2003 in Iraq.
11. A key factor in guerrilla strategy is a drawn-out, protracted conflict, which wears down the will of the opposing counter-insurgent forces. Democracies are especially vulnerable to the factor of time, but the counter-insurgent force must allow enough time to get the job done.
Tactical counter-guerrilla operations
1. Encirclement, which is designed to cut off all ground routes for escape and reinforcement of the encircled force (darkness recommended) combined with combined with air assault, artillery and airborne troops. And it’s good to divide the enemy while encircling.
Encirclement offers the best chance to fix guerrilla forces in position and achieve decisive results. The battalion and larger units will usually plan and conduct encirclements. The company and smaller units normally do not have the manpower and command and control capability to execute encirclements except as part of a larger force. Encirclements require accurate intelligence on the location of guerrilla elements. Since it requires a major portion of the counterguerrilla force to execute this maneuver, it is usually targeted against large guerrilla forces or guerrilla base complexes, a series of smaller base camps clustered within area. Planning, preparation and execution are aimed at encircling the guerrilla force rapidly. Maximum security and surprise can be gained by occupying the initial encirlclement positions during darkness. In large operations, air assault and airborne troops add speed and surprise to the operation. Positions are occupied simultaneously in order to block escape. If simultaneous occupation is not possible, probable escape routes are covered first. Initial occupation is the most critical period of the operation. When the guerrillas become aware that they are being encircled, they will probably probe for gaps or attack weak points and attempt to break out.
Encircling units provide strong combat patrols far to their front to give early warning of attempted breakouts. Mobile reserves are positioned to counter a breakout and to reinforce difficult areas such as broken terrain or areas with caves, tunnels or fortification complexes. Indirect fire support can serve to cloak an encirclement by gaining and holding the guerrillas attention. Fires are planned in detail to support the encirclement. Following completion of the encirclement, the circle is contracted to capture or destroy the guerrilla force. AS the circle is contracted, units may be removed from the line and added to the reserve. Against small guerrilla forces, the encircled area may be cleared by contraction and a final sweep. Against larger guerrilla forces, however, at some point, some action other than contraction will be required. One technique consists of driving a wedge through the guerrilla force to divide it and then destroying the guerrillas in each subarea. Another technique, employed after some degree of contraction, is to employ a blocking force on one or more sides of the perimeter while the remainder of the encircling force drives the guerrillas against blocking force. Either element may accomplish the actual destruction.
The technique is effective when the blocking force can be located on, or immediately in the rear of, a natural terrain obstacle.
2. Search (of a village), which might be done in different ways:
– assemble inhabitants in a central location (if they are hostile) and then start the operation
– restrict inhabitants to their homes or control the heads of households (and take other family members to a central location) and then start the convoy security operation, which is one of your top priorities.
Think about ambushes and mines on the route all the time and place a strong attack element at the rear of the convoy where it has maximum flexibility in moving forward to attack guerrillas attempting to ambush the head or center of the convoy. At the first indication of an ambush vehicles have to move out of the killing zone (do not drive to roadsides or shoulders, which may be mined). A security team immediately returns fire from inside vehicles to cover dismounting personnel (if you have to stop) and then dismounts last under cover of the fire by those who dismounted first. Upon dismounting, personnel caught in a killing zone open fire and immediately assault toward the ambush force. Any movements of the troops and supplies are planned and conducted as tactical operations with effective front, flank and rear security.
Search techniques in built-up areas are required when you search either a few isolated huts or buildings, or for searching well-developed urban sections.
Procedure :
a) divide the area to be searched into zones, and assign a search party to each. A search party consists of a search element (to conduct the search), a security element (to encircle the area and prevent entrance and exit, and to secure open areas), and a reserve element (to assist, as required). Then the search element conducts the mission assigned for the operation. Normally it is organized into special teams. The security element surrounds the area while the search element moves in. Members of the security element orient primarily upon evaders from the populated area; however, they can cut off any insurgents trying to reinforce. Checkpoints and roadblocks are established. Subsurface routes of escape, such as subways and sewers, must be considered when operating in cities. The reserve element is a mobile force within a nearby area. Its specific mission is to assist the other two elements should they meet resistance they cannot handler. In addition, it is capable of replacing or reinforcing either of the other two elements should the need arise.
b)consider any enemy material found, including propaganda signs and leaflets, to be booby-trapped until inspection proves it is safe.
c) thoroughly search underground and underwater areas. Any freshly excavated ground can be a hiding place. Use mine detectors to locate metal objects underground and underwater.
d) deploy rapidly, especially when a guerrilla force is still in the area to be searched. The entire area to be searched is surrounded simultaneously. If this is not possible, observed fire must cover that portion not covered by soldiers.
3. Ambush.
An ambush is a surprise attack from a concealed position upon a moving or temporary halted target. Ambushes give the counter-guerrilla force several advantages:
a) an ambush does not require ground to be seized or held
b) smaller forces with limited weapons and equipment can harass or destroy larger, better armed forces
c) guerrillas can be forced to engage in decisive combat at unfavorable times and places
d) guerrillas can be denied freedom of movement and deprived of weapons and equipment that are difficult to replace.
Well-planned and well-executed ambushes is the most successful operational technique employed against guerrillas. It is an effective technique to interdict movement guerrilla forces within an area. Selection of the site is a key step in developing a well-organized ambush.
Ambushes are executed to reduce the guerrillas overall combat effectiveness. Destruction is the primary purpose of an ambush since guerrillas killed or captured, and equipment and supplies destroyed or captured, critically affect the guerrilla force. Harassment, the secondary purpose, diverts guerrillas from other missions. A series of successful ambushes causes the guerrilla force to be less aggressive and more defensive, to be apprehensive and overly cautious, and to be reluctant to go on patrols and move in convoys or in small groups.
There are three types of ambushes.
A point ambush involves patrol elements deployed to support the attack of a single killing zone. An area ambush involves patrol elements deployed as multiple, related, point ambushes. An ambush is categorized as either hasty or deliberate.
A hasty ambush is an immediate action drill, an action of a combat patrol with little or no information. When information does not permit detailed planning required for a deliberate ambush, a hasty ambush is planned. In this case, ambush patrol plans and prepares to attack the first suitable guerrilla force. A deliberate ambush is planned as a specific action against a specific target. Detailed information of the guerrilla force is required: size, nature, organization, armament, equipment, route and direction of movement, and time the force will reach or pass certain points on its route. Deliberate ambushes are planned when reliable information is received on the intended movement of a specific force; patrols, convoys, carrying parties or similar forces establish patterns of size, time and movement sufficient to permit detailed planning for the ambush.
Basic elements of an ambush are:
1. Surprise. It has to be achieved or else the attack is not an ambush. Surprise, which distinguishes an ambush from other forms of attack, allows the ambush force to seize and retain control of the situation. Surprise is achieved by careful planning, preparation and execution. Guerrillas are attacked in a manner they least expect.
2. Coordinated fires. All weapons, including mines and demolitions, are positioned, and all direct and indirect fires are coordinated to achieve isolation of the kill zone to prevent escape or reinforcement; surprise delivery of a large volume of concentrated fires into the kill zone to inflict maximum damage so the target can be assaulted and destroyed.
3. Control. Close control is maintained during movement to, occupation of, and withdrawal from the ambush site. The ambush commander’s control of all elements is critical at the time of target approach. Control measures provide for early warning of target approach, withholding fire until the target moves into the kill zone, opening fire a the proper time, initiating appropriate actions if the ambush is prematurely detected, lifting or shifting supporting fires when the ambush includes assault of the target, timely and orderly withdrawal to an easily recognized rallying point.
Planning
Planning provides for simplicity, type of ambush and deployment. The attack may be by fire only (harassing ambush) or may include assault of the target (destruction ambush). The force is tailored for its mission. Two men may be adequate for a harassing ambush. A destruction ambush may require the entire unit (squad, platoon, company).
An ambush patrol is organized in the same manner as other combat patrols to include headquarters, an assault element, a support element and a security element. The assault and support are the attack force; the security element is the security force. When appropriate, the attack force is further organized to provide a reserve force. When an ambush site is to be occupied for an extended period, double ambush forces may be organized. One ambush force occupies the site while the other rests, eats and tends to personal needs at the objective rallying point or other concealed location. They alternate after a given time, which is usually 8 hours. If the waiting period is over 24 hours, three ambush forces may be organized.
The selection of equipment and supplies needed is based on the mission, size of guerrilla force, means of transportation, distance and terrain, weight and bulk of equipment. A primary route is planned which allows the unit to enter the ambush site from the rear. The kill zone is not entered if entry can be avoided. If the kill zone must be entered to place mines or explosives, care is taken to remove any tracks or signs that might alert the guerrillas and compromise the ambush. If mines, mantraps or explosives are to be placed on the far side, or if the appearance of the site might cause the guerrillas to check it, then a wide detour around the killing zone is made. Here, too, care is taken to remove any traces which might reveal the ambush.
Also, an alternate route from the ambush site is planned.
Maps and aerial photos are used to analyze the terrain. As far as possible, so-called ideal ambush sites are avoided. Alert guerrillas are suspicious of these areas, avoid them and increase vigilance and security when they must be entered. Considering this, an ambush site must provide fields of fire, concealed positions, canalization of the guerrillas into the killing zone, covered routes of withdrawal ( to enable the ambush force to break contact and avoid pursuit), no-exit route for the guerrilla force.
Ambush force, as a rule occupies the ambush site at the latest possible time permitted by the tactical situation and the amount of site preparation required. This not only reduces the risk of discovery but also reduces the time that soldiers must remain still and quiet in position. The unit moves into the ambush site from the rear. Security elements are positioned first to prevent surprise while the ambush is being established.
Automatic weapons are then positioned so that each can fire along the entire killing zone. If this is not possible, they are given overlapping sectors of
fire so the entire killing zone is covered. The unit leader then selects his position, located where he can see when to initiate the ambush. Claymore mines, explosives and grenade launchers may be used to cover any dead space left by the automatic weapons. All weapons are assigned sectors of fire to provide mutual support. The unit leader sets a time by which positions are to be prepared. The degree of preparation depends on the time allowed. All men work at top speed during the allotted time. Camouflage is very important each soldier must be hidden from the target and each one has to secure his equipment to prevent noise. At the ambush site, positions are prepared with minimal change in the natural appearance of the site. All debris resulting from preparation of positions is concealed. Movement is kept to a minimum and the number of men moving at a time is closely controlled. Light discipline is rigidly enforced at night.
Point ambush
A point ambush, whether independent or part of an area ambush, is positioned along the expected route of approach of the guerrilla force.
Formation is important because, to a great extent, it determines whether a point ambush can deliver the heavy volume of highly concentrated fire necessary to isolate, trap and destroy the guerrillas. The formation to be used is determined by carefully considering possible formations and the advantages and disadvantages of each in relation to terrain, conditions of visibility, forces, weapons and equipment ease or difficulty of control, force to be attacked and overall combat situation.
1. Line formation.
The attack element is deployed generally parallel to the guerrilla forces route of movement (road, trail, stream). This positions the attack element parallel to the long axis of the killing zone and subjects the guerrilla force to heavy flanking fire. The size of the force that can be trapped in the killing zone is limited by the area which the attack element can effectively cover with highly concentrated fire. The force is trapped in the killing zone by natural obstacles, mines, demolitions, and direct and indirect fires. A disadvantage of the line formation is the chance that lateral dispersion of the force may be too big for effective coverage. The line formation is appropriate in close terrain that restricts guerrilla maneuver and in open terrain where one flank is restricted by mines, demolitions or mantraps. Similar obstacles can be placed between the attack element and the killing zone to provide protection from guerrilla counter-ambush measures. When a destruction ambush is deployed in this manner, access lanes are left so that the force in the killing zone can be assaulted. The line formation can be effectively used by a rise from the ground ambush in terrain seemingly unsuitable for ambush. An advantage of the line formation is its relative ease of control under all conditions of visibility.
2. L-formation.
The L-formation is a variation of the line formation. The long side of the attack element is parallel to the killing zone and delivers flanking fire.
The short side of the attack element is at the end of, and at right angles to, the killing zone and delivers enfilading fire that interlocks with fire from the other leg. This formation is flexible. It can be established on a straight stretch of a trail or stream or at a sharp bend in a trail or stream. When appropriate, fire from the short leg can be shifted to parallel the long leg if the guerrilla force attempts to assault or escape in the opposite direction. In addition, the short leg prevents escape in that direction or reinforcement from that direction.
3. Z-formation.
The Z-shaped formation is another variation of the L-formation. The attack force is deployed as in the L-formation but with an additional side so that the formation resembles the letter Z. The additional side may serve to engage a force attempting to relieve or reinforce the guerrillas, restrict a flank, prevent envelopment (of the ambush force), seal the end of the killing zone.
4. T-formation. The attack element is deployed across, and at right angles to, the route of movement of the hostile force so that the attack element and the target form
the letter T. This formation can be used day or night to establish a purely harassing ambush, and at night to establish an ambush to interdict movement through open, hard-to-seal areas (such as rice paddies). A small unit can use the T-formation to harass, slow and disorganize a larger force. When the lead guerrilla elements are engaged, they will normally attempt to maneuver right or left to close with the ambush force. Mines, mantraps and other obstacles placed to the flanks of the killing zone slow the guerrillas movement and permit the unit to deliver heavy fire and then withdraw without becoming decisively engaged. The T-formation can be used to interdict small groups attempting night movement across open areas. For example, the attack element may be deployed along a rice paddy dike with every second member facing in the opposite direction. The attack of a force approaching from either direction requires only that every second member shift to the opposite side of the dike. Each member fires only to his front and only when the target is at a close range. Attack is by fire only, and each member keeps the guerrilla force under fire as long as it remains to his front. If the force attempts to escape in either direction along the dike, each member takes it under fire as it comes into his vicinity. The T-formation is effective at halting infiltration. It has one chief disadvantage: there is a possibility that while spread out the ambush will engage a superior force. Use of this formation must, therefore, fit the local enemy situation.
5. V-formation.
The V-shaped attack element is deployed along both sides of the guerrilla route of movement so that it forms a V. Care is taken to ensure that neither group (or leg) fires into the other. This formation subjects the guerrilla to both enfilading and interlocking fire. The V-formation is suited for fairly open terrain but can also be used in the jungle. When established in the jungle, the legs of the V close in as the lead elements of the guerrilla force approach the apex of the V, elements then open fire from close range. Here, even more than in open terrain, all movement and fire is carefully coordinated and controlled to ensure that the fire of one leg does not endanger the other. Wider separation of the elements makes this formation difficult to control, and there are fewer sites that favor its use. Its main advantage is that it is difficult for the guerrilla to detect the ambush until well into the killing zone.
6. Triangle formation.
Closed triangle. The attack element is deployed in 3 groups, positioned so they form a triangle (or closed V). An automatic weapon is placed at each point of the triangle and positioned so that it can be shifted quickly to interlock with either of the others. Elements are positioned so that their fields of fire overlap. Mortars may be positioned inside the triangle. When deployed in this manner, the triangle ambush becomes a small unit strongpoint which is used to interdict night movement through open areas, when guerrilla approach is likely to be from any direction. The formation provides all-round security, and security elements are deployed only when they can be positioned so that, if detected by an approaching target, they will not compromise the ambush. Attack is by fire only, and the target is allowed to approach within close range before the ambush force opens fire. Advantages include ease of control, all-round security, and guerrillas approaching from any direction can be fired on by at least two automatic weapons. Disadvantages include the requirement for an ambush force of platoon size or larger to reduce the danger of being overturn by a guerrilla force; one or more legs of the triangle may come under guerrilla enfilade fire; and lack of dispersion, particularly at the points, increases danger from guerrilla mortar fire.
Open triangle (harassing ambush).
This variation of the triangle ambush is designed to enable a small unit to harass, slow, and inflict heavy casualties upon a larger force without being decisively engaged. The attack group is deployed in 3 elements, positioned so that each element becomes a corner of a triangle containing the killing zone. When the guerrillas enter the killing zone, the element to the guerrillas front opens fire on the lead guerrillas. When the guerrillas counterattack, the element withdraws and an assault element to the flank opens fire. When this group is attacked, the element to the opposite flank opens fire. This process is repeated until the guerrillas are pulled apart. Each element reoccupies its position, if possible, and continues to inflict maximum damage without becoming decisively engaged.
Open triangle (destruction ambush).
The attack group is again deployed in 3 elements, positioned so that each element is a point of the triangle, 200 to 300 meters apart. The killing zone is the area within the triangle. The guerrillas are allowed to enter the killing zone; the nearest element attacks by fire. As the guerrillas attempt to maneuver or withdraw, the other elements open fire. One or more assault elements, as directed, assault or maneuver to envelop or destroy the guerrillas. As a destruction ambush, this formation is suitable for platoon-size or larger units; a unit smaller than a platoon would be in danger of being overrun. Also, control in assaulting or maneuvering is difficult. Close coordination and control are necessary to ensure that assaulting or maneuvering elements are not fired by another party; and the ambush site must be a fairly level, open area that provides (around its border) concealment for the ambush elements (unless it is a rise from the ground ambush).
7. Box formation.
This formation is similar in purpose to the open triangle ambush. The unit is deployed in 4 elements positioned so that each element becomes a corner of a square or rectangle containing the killing zone. It can be used as a harassing ambush or a destruction ambush in the same manner as the two variations of the open triangle ambush.
Area ambush
Killing zone. A point ambush is established at a site having several trails or other escape routes leading away from it. The site may be a water hole, guerrilla campsite, or known rendezvous point, or a frequently traveled trail. This site is the central killing zone.
Area ambush, multiple point.
Point ambushes are established along the trails or other escape routes leading away from the central killing zone. The guerrilla force, whether a single group or several parties approaching from different directions, is permitted to move to the central killing zone. Outlying ambushes do not attack (unless discovered). The ambush is initiated when the guerrillas move into the central killing zone. When the guerrillas break contact and attempt to disperse, escaping portions are intercepted and destroyed by the outlying ambushes. The multiple point ambush increases casualties and harassment and produces confusion.
This version of the area ambush is best suited in terrain where movement is largely restricted to trails. It provides best results when established as a deliberate ambush. When there is not sufficient intelligence for a deliberate ambush, an area ambush of opportunity (hasty ambush) may be established. The outlying ambushes are permitted to attack guerrillas approaching the central killing zone, if the guerrilla force is small. If it is too large for the particular outlying ambush, the guerrillas are allowed to continue and they are attacked in the central killing zone. Area ambush: baited trap.
A variation of the area ambush. A central killing zone is established along the guerrillas route of approach. Point ambushes are established along the routes over which units relieving or reinforcing the guerrilla will have to approach. The guerrilla force in the central killing zone serves as a bait to lure relieving or reinforcing guerrilla units into the kill zones of the outlying ambushes. A friendly force can also be used as the bait. The outlying point ambushes need not be strong enough to destroy their targets. They may be small harassing ambushes that delay, disorganize and cause casualties by successive contacts.
This version can be varied by using a fixed installation as bait to lure relieving or reinforcing guerrilla units into the killing zone to overcome the installation or may use it as a ruse. These variations are best suited for situations where routes of approach for relieving or reinforcing guerrilla units are limited to those favorable for ambush.
Unusual ambush techniques
Spider hole ambush.
This point ambush is designed for open areas that lack cover and concealment and other features normally desirable in a good ambush site. The attack element is deployed in the formation best suited to the overall situation. The attack element is concealed in the spider hole type of covered foxhole. Soil is carefully removed and positions camouflaged. When the ambush is initiated, the attack element members throw back the covers and rise from the ground to attack. This ambush takes advantage of the tendency of patrols and other units, to relax in areas that do not appear to favor ambush. The chief advantage is that the ambush element is vulnerable if detected prematurely.
Demolition ambush.
Dual primed, electrically detonated mines or demolition charges are planted in the area over which a guerrilla force is expected to pass. This may be a portion of as road or trail, an open field, or any area that can be observed from a distance. Activating wires are run to a concealed observation point sufficiently distant to ensure safety of the ambush element. As large a force as desired or necessary can be used to mine the area. The ambush element remains to fire the charges, other personnel return to the unit. When a guerrilla force enters the mined area (killing zone), the element on site detonates the explosives and withdraws immediately to avoid detection and pursuit.
Special ambush situation.
Attacks against columns protected by armored vehicles depend on the type and location of armored vehicles in a column, and the weapons of the ambush force. If possible, armored vehicles are destroyed or disabled by fire or antitank weapons, landmines and Molotov cocktails, or by throwing hand grenades into open hatches. An effort is made to immobilize armored vehicles at a point where they are unable to give protection to the rest of the convoy and where they will block the route of other supporting vehicles. In alternate bounds, all except the first two vehicles keep their relative places in the column. The first two vehicles alternate as lead vehicles on each bound. Each covers the bound of the other. This method provides more rapid advance than movement by successive bounds but is less secure it doers not allow soldiers in the second vehicle enough time to thoroughly observe the terrain to the front before passing the first vehicle. Security is obtained by the vehicle commander who assigns each soldier a direction of observation: to the front, flank(s) or rear. This provides each vehicle with some security against surprise fire from every direction and provides visual contact with vehicles to the front and rear. For maximum observation, all canvas is removed from the vehicles.
Action at danger areas.
The commander of the leading vehicle immediately notifies the unit leader when he encounters an obstacle or other danger area.
Designated soldiers reconnoiter these places under cover of the weapons in the vehicle. Obstacles are bypassed, if possible. When they cannot be bypassed, they are cautiously removed. Side roads intersecting the route of advance are investigated. Soldiers from one vehicle secure the road junction; one or two vehicles investigate the side road. The amount of reconnaissance of side roads is determined by the patrol leaders knowledge of the situation. Men investigating side roads do not, however, move past supporting distance of the main body of the patrol. Bridges, road junctions, defiles and curves (that deny observation beyond the turn) are danger areas. Soldiers dismount and take advantage of available cover and concealment to investigate these areas. The vehicle is moved off the road into a covered or concealed position; weapons from the vehicle cover the advance of the investigating personnel. Ambush during darkness is difficult to control, bur darkness increases the security of the ambush party and the confusion of those being ambushed.
4. Roadblocks and checkpoints.
Element of the checkpoint force has to be positioned and concealed at appropriate distance from the checkpoint to prevent the escape of any vehicle or person attempting to turn back.
It’s necessary to maintain a continuous check on road movement to apprehend suspects and to prevent smuggling of controlled items. Since checkpoints cause considerable inconvenience and even fear, it’s important that the civil population understands that checkpoints are a preventive and not a punitive measure. Checkpoints may be deliberate or hasty. The deliberate checkpoint is positioned in a town or in the open country, often on a main road. It acts as a useful deterrent to unlawful movement. The hasty checkpoint is highly mobile and is quickly positioned in a town or in the open country. The actual location of the hasty checkpoint is designed to achieve quick success.
Concealment of a checkpoint is desirable, but often impossible. The location should make it difficult for a person to turn back or reverse a vehicle without being observed. Culverts, bridges or deep cuts may be suitable locations. Positions beyond sharp curves have the advantage that drivers do not see the checkpoint in sufficient time to avoid inspection. Safety disadvantages may outweight the advantages of such positions. A scarcity of good roads increases the effect of a well-placed checkpoint. A checkpoint requires adequate troops to prevent ambush and surprise by a guerrilla force.
5. Patrols.
Used to saturate areas of suspected guerrilla activity, control critical roads, maintain contact between villages and units, interdict guerrilla routes of supply and communication, provide internal security in rural and urban areas, locate guerrilla units and base camps. A patrol is a detachment sent out by a larger unit to conduct a combat or reconnaissance operation. Patrolling is used when limited (or no) intelligence on guerrilla activity is available. Routes are planned carefully and coordinated with higher, lower and adjacent units, to include air and ground fire support elements and reserve forces. There are three key principles to successful patrolling: detailed planning, thorough reconnaissance, all-round security. It often happens that the patrol has to break the contact with a larger enemy (to break contact use the clock system. the direction the patrol moves is always 12 o’clock. When contact is made, the leader shouts a direction and distance to move (such as 7 o’clock, 400 meters. The leader can also use the system to shift or direct fire at a certain location).
Saturation patrolling is extremely effective patrols are conducted by many lightly armed, small, fast-moving units and provide thorough area coverage. Patrols move over planned and coordinated routes which are engaged frequently to avoid establishing patterns. Use of saturation patrolling results in the sustained denial of an area to guerrilla forces as they seek to avoid contact with the counter-guerrilla units. In addition to harassment and discovery of guerrilla tactical forces, this technique provides an opportunity to gain an intimate knowledge of the area of operations; a form of reassurance to the local population that the government is concerned about their protection and security; a means by which information about the guerrilla can be obtained.
Watch out: guerillas usually try to cut the lines of communications by mining roads, waterways and railways, or by ambushes located adjacent to them, blow up bridges and tunnels.
6. Tracking
Footprints. You can read the following by footprints:
– the direction and rate of movement of a party
– the number of persons in a party
– whether or not heavy loads are carried
– the sex of the members of the party
– whether the members of a party know they are being followed
If the footprints are deep and the pace is long, the party is moving rapidly. Very long strides and deep prints, with toe prints deeper than heel prints, indicate the party is running. If the prints are deep, short and widely spaced, with signs of scuffing or shuffling, a heavy load is probably being carried by the parson who left the prints. You can also determine a person’s sex by studying the size and position of the footprints. Women generally tend to be pigeon-toed, while men usually walk with their feet pointed straight ahead or slightly to the outside. Womens’ prints are usually smaller than mens’, and their strides usually shorter. If a party knows it is being followed, it may attempt to hide its tracks. Persons walking backward have a short, irregular stride. The prints have and unusually deep toe. The soil will be kicked in the direction of movement. The last person in a group usually leaves the clearest footprints. Therefore, use his prints as the key set. Use the box method to count the number of persons in the group. Up to 18 persons can be counted. Use it when the key prints can be determined. To use this method, identify a key print on a trail and draw line from its heel across the trail. Then move forward to the key print of the opposite foot and draw a line through its instep. This should form a box with the edges of the trail forming two sides, and the drawn lines forming the other two sides.
Next, count every print of partial print inside the box to determine the number of persons. Any person walking normally would have stepped in the box at least one time. Count the key prints as one. Also, you can track paying attention to such things as foliage, moss, vines, stick or rocks moved from their original places; stones and sticks that are turned over; grass that is bent or broken in the direction of movement.
Staining.
A good example of staining is the mark left by blood from a bleeding wound. You can determine the location of a wound on a man being followed by studying the bloodstains. If the blood seems to be dripping steadily, it probably came from a wound on his trunk. A wound in the lungs will deposit bloodstains that are pink, bubbly, frothy. A bloodstain deposited from a head wound will appear heavy, wet and slimy, like gelatin. Abdominal wounds often mix blood with digestive juices so that the deposit will have an odor, and the stains will be light in color. Water in footprints in swampy ground may be muddy if the tracks are recent. In time, however, the mud will settle and the water is clear. The clarity of the water can be used to estimate the age of the prints. Normally, the mud will clear in 1 hour, but that will vary with terrain. If a party knows that you are tracking it, it will probably use camouflage to conceal its movements and to slow and confuse you. Remember: a well-defined approach that leads to the enemy will probably be mined, ambushed or covered by snipers.
7. Aerial search.
This technique has little value in areas of dense vegetation. Use of search units mounted in armed helicopters should be limited to those operations in which sufficient intelligence exists to justify their use and then normally in conjunction with ground operations. In ground search operations, helicopters drop off troops in an area suspected of containing guerrillas. Withthe helicopters overmatching from the air, troops search the area. Troops are then picked up and the process is repeated in other areas.
8. Raid. It is an operation involving a swift penetration of hostile territory to secure information, harass the guerrilla or destroy the guerrilla force and its installation. Raids are usually targeted against single, isolated guerrilla base camps. To assist in attaining surprise, the raiding force uses inclement weather, limited visibility, or terrain normally considered impassable. If night airborne or air assault raids are conducted, the force must be accurately inserted and oriented on the ground. Air assault forces supported by armed helicopters offer infinite possibilities for conducting raids. This type of force can move in, strike the objective and withdraw without extensive preparation or support from other sources.
9. Crowd dispersal.
10. Assassination of the guerrilla leader.
11. Taking hostages to press guerrillas.
12. Organization of false guerrilla units.
Meanwhile the enemy will attempt to engage you in locations where your fire would endanger civilians or damage their property. You have to match the size of the guerrilla unit. Employing a large force to counter a smaller one is inefficient because it compromises the chance of achieving surprise.
Psychological Operations
Psychological operations (PSYOP) in foreign internal defense include propaganda and other measures to influence the opinions, emotions, attitudes, and behavior of hostile, neutral, or friendly groups to support the achievement of national objectives. There are 5 major target groups for PSYOP:
1. Insurgents.
The major PSYOP objective here is to discredit the insurgents and isolate them from he population. The most important direction of attack is against their morale. Themes should publicize and exploit differences between cadre, recruits, supporters, and the local population. Other themes might stress lack of support, isolation, homesickness, and hardship. Amnesty programs are often useful in neutralizing insurgents, and they are most effective when they are well publicized, directed against lower ranking members of the insurgency, and offer sufficient reason and benefits for quitting the unit. These programs do, however, have several disadvantages: they recognize the insurgents as a legitimate political force, they forgo punishment of anyone accepting amnesty, and they increase the image of the insurgents threat.
2. The population supporting the insurgents.
You have to achieve withdrawal of support for the insurgents and a total defection. Propaganda should highlight the insurgents shortcomings, ultimate government victory, government successes, and the practical advantages of surrendering or of accepting amnesty. Sometimes, displays of military might are used; invading forces may assemble and parade through the streets of conquered towns, attempting to demonstrate the futility of any further fighting. Thesedisplays may also include public executions of enemy soldiers, resistance fighters, and other conspirators. Particularly in antiquity, the death or imprisonment of a popular leader was sometimes enough to bring about a quick surrender. However, this has often had the unintended effect of creating martyrs around which popular resistance can rally.
3. The uncommitted population.
The major mission here is to build national morale, unity, and confidence in the government. There should also be a major effort to win popular acceptance of the government force, and convince the people that government programs serve their interests, the government forces can protect them, ultimate government victory is assured. This may be accomplished through re-education, allowing conquered citizens to participate in their government, or, especially in impoverished or besieged areas, simply by providing food, water and shelter.
4. Government personnel.
When targeting government personnel, seek to maintain loyalties and develop policies and attitudes which will result in group members who will realize the importance of popular support, promote public welfare and justice, take action to eliminate the basic causes of the subversive insurgency, and protect the population. You have to indoctrinate the host country security and military forces regarding the importance of the civilian population support. When government personnel interact with neutral and non-hostile elements of the population, the emphasis should be positive and constructive.
5. Foreign audiences. There are two major groups to be addressed: neutral nations and hostile nations. For neutral nations, the purpose of psychological operations is to achieve friendly neutrality or active support for your side. For hostile powers, the major objective of these operations is to influence public opinion against involvement in supporting the insurgency. Besides, you have to use psychological operations to establish and maintain a favorable image of our country. The themes most useful in establishing that image are that the US presence is requested by the host country government, it is legal and necessary, it is temporary, and it is advisory. Intelligence operations are facilitated by employing psychological operation media to inform the people that they should report to the proper authority information pertaining to strangers, suspicious persons, and guerrilla activities. Posters and leaflets provide definite instruction as to persons and places that are available to receive the information (indicate what rewards are available).
Insurgency
1. Leadership
Insurgency is not simply random political violence; it is directed and focused political violence. It requires leadership to provide vision, guidance, coordination and organizational coherence. The leaders of the insurgency must make their cause known to people. They must gain popular support, and their key tasks are to break the ties between the people and the government and to establish their movement’s credibility. They must replace the government’s legitimacy with that of their own. Their education, background, family, social connections and experience shape how they think, what they want, and how they fulfill their goals. Leadership is both a function of organization and of personality. Some organizations de-emphasize individual personalities and provide mechanisms for rebundancy and replacement in decision making; these mechanisms produce collective power and do not depend on specific leaders or personalities to be effective. They are easier to penetrate but more resilient to change. Other organizations may depend on a charismatic personality to provide cohesion, motivation, and a rallying point for the movement. Leadership organized in this way can produce decisions and initiate new actions rapidly, nut it is vulnerable to disruption if key personalities are removed or co-opted.
2. Ideology.
To win, insurgency must have a program that justifies its actions and explains what is wrong with society. It must promise great improvement after the government is overthrown. Ideology guides the insurgents in offering society a goal. The insurgents often express this goal in simple terms for ease of focus. The insurgent leader can use ideology to justify the use of violence and extralegal action in challenging the current social order, and to form a framework of the program for the future. Ideology identifies those sectors of society which the insurgency targets. Ideology may suggest probable objectives and tactics. It greatly influences the insurgents’perception of his environment. The combination of the insurgents’ ideology and his perception of his environment shapes the movement’s organizational and operational methods.
3. Objectives.
The strategic objective is the insurgents’ desired end state and that is how the insurgent will use power once he has it.
Operational objectives are those which the insurgents pursue as part of the overall process of destroying government legitimacy and progressively establishing their desired end state. The following are examples of operational objectives:
–isolation of the government from diplomatic and material support, and increased international support for the insurgency
–destruction of the self-confidence of the government’s leaders, cadre and armed forces, causing them to abdicate or withdraw
–establishment of civil cervices and administration ion areas under insurgent control
–capture of the support (or neutrality) of critical segments of the population
Tactical objectives are the immediate aims of insurgent acts, for example, the dissemination of a psychological operation product or the attack and seizure of a key facility. These actions accomplish tactical objectives which lead to operational goals.
4. External support.
There are four types of external support:
– moral acknowledgement of the insurgent cause as just and admirable
– political active promotion of the insurgents strategic goals in international forums
– resources money, weapons, food, advisors, training
– sanctuary secure training, operational and logistic bases
5. Organizational and operational patterns.
a)Subversive.
Subversive insurgents penetrate the political structure to control it and use it for their own purposes. They seek elective and appointed offices. They
employ violence selectively to coerce voters, intimidate officials, disrupt and discredit the government. Violence shows the system is incompetent. It
may also provoke the government to an excessively violent response which further undermines its legitimacy. A subversive insurgency most often appears in a permissive political environment in which insurgents can use both legal and illegal methods. The typical subversive organization consists of a legal party supported by a clandestine element operating outside the law. Subversive insurgencies can quickly shift to the critical-cell pattern
when conditions dictate. The Nazi rise to power in the 1930s is an example of this model. Subversive insurgencies primarily present a problem for police and counter-intelligence.
b)Critical-cell.
In the critical-cell, the insurgents also infiltrate government institutions. Their object is to destroy system from within. The moles operate both covertly and overtly. Normally, the insurgents do not reveal their affiliation or program. They seek to undermine institutional legitimacy and convince or coerce others to assist them. Their violence remains covert until the institutions are so weakened that the insurgency’s superior organization seizes power, supported by armed force. The Russian October, 1917 revolution followed this pattern.
There are variations of the critical-cell pattern, too. The first is the co-opting of an essentially leaderless, mass popular revolution. The Sandinistas takeover of the Nicaraguan revolution is a case of point. The insurgent leadership permits the popular revolution to destroy the existing government. The insurgent movement then emerges, activating its cells to guide reconstruction under its direction. It provides a disciplined structure to control the former bureaucracy. The mass popular revolution then coalesces around the structure.
A second variation of the critical-cell pattern is the foco (or Cuban model) insurgency. A foco is a single, armed cell which emerges from hidden strong holds in an atmosphere of disintegrating legitimacy. In theory, this cell is the nucleus around which mass popular support rallies. The insurgents erect new institutions and establish control on the basis of that support. The foco insurgencies are often made up predominantly of guerrilla fighters operating initially from remote enclaves. The Cuban revolution occurred in this manner. The Cuban experience spawned over 200 subsequent imitative revolutionary attempts patterned on it, principally in Latin America and Africa they all failed, but that does not discredit foco theory. It does emphasize the importance of a particular set of circumstances to this model. Legitimacy must be near total collapse, timing is critical. The Nicaraguan insurgency for example, combined the foco with a broad-front political coalition.
c) Mass oriented.
The mass-oriented insurgency aims to achieve the political and armed mobilization of a large popular movement. They emphasize creating a political and armed legitimacy outside the existing system. They challenge that system and then destroy or supplant it. These insurgents patiently build a large armed force of regular and irregular guerrillas. They also construct a base of active and passive political supporters. They plan a protracted campaign of increasing violence to destroy the governments and its institutions from the outside. They organize in detail. Their political leadership normally is distinct from their military leadership. Their movement establishes a rival government which openly proclaims its own legitimacy. They have a well-developed ideology and decide on their own objectives only after careful analysis. Highly organized and using propaganda and guerrilla action, they mobilize forces for a direct military and political challenge to the government. Once established, mass-oriented insurgencies are extremely resilient because of their great depth of organization. Examples of this model include the communist revolution in China, the Vietcong insurgency, the Sendero Luminoso (Shining Path) in Peru.
d)Traditional.
The traditional insurgency normally grows from very specific grievances and initially has limited aims. It springs from tribal, radical, religious or other similarly identifiable groups. These insurgents perceive that the government has denied the rights and interests of their group and work to establish or restore them. The frequently seek withdrawal from government control through autonomy or semi-autonomy. They seldom seek specifically to overthrow the government or to control the whole society. They generally respond in kind to government violence. Their use of violence can range from strikes and street demonstrations to terrorism or guerrilla warfare. These insurgencies may cease if the government accedes to the insurgentsdemands. The concessions of insurgents demands, however, are usually so great that the government concedes its legitimacy along with them. Examples of this model include the Mujahideen in Afghanistan, the Ibo revolt in Nigeria (Biafra), the Tami separatists in Sri Lanka.
No insurgency follows one pattern exclusively.
Typical missions which guerrillas conduct to accomplish their goals include: destroying or damaging vital installations, equipment or supplies; capturing supplies, equipment, or key governmental or military personnel; diverting government forces from other operations; creating confusion and weakening government morale. Remember: guerrilla is a political war, and asymmetric warfare.
Авторские права на произведения принадлежат авторам и охраняются законом. Перепечатка произведений возможна только с согласия его автора, к которому вы можете обратиться на его авторской странице.