Donnerstag, 25. Juni 2009
Engl. Interview: From Mossadegh to Ahmadinejad
From Mossadegh to Ahmadinejad The CIA and the Iranian experiment by Thierry Meyssan
The news of alleged election fraud has spread through Tehran like wildfire, pitching ayatollah Rafsanjani’s supporters against ayatollah Khamenei’s in street confrontations. This chaotic situation is secretly stirred by the CIA which has been spreading confusion by flooding Iranians with contradicting SMS messages. Thierry Meyssan recounts this psychological warfare experiment.
Covert Action: government overthrows, psychological warfare...
Control of the "Great Middle East"
In March 2000, the Secretary of State Madeleine Albright admitted that the Eisenhower administration organized a regime change in 1953 in Iran and that this historical event explained the current hostility of Iranians towards the United States. Last week, during the speech he addressed to Muslims in Cairo, President Obama officially recognized that « in the midst of the cold war the United States played a role in the toppling of a democratically elected Iranian government » .
At the time, Iran was controlled by a puppet monarchy headed by the Shah Mohammad Reza Pahlavi. He had been placed on the throne by the British who forced his father, the pro-Nazi Cossack officer Reza Pahlavi to resign. However, the Shah had to deal with a nationalist Prime Minister, Mohammad Mossadegh. Mossadegh, with the help of ayatollah Abou al-Qassem Kachani, nationalized the oil resources . Furious, the British persuaded the United States that the Iranian dissent needed to be stopped before the country became communist. The CIA then put together Operation Ajax to overthrow Mossadegh with the help of the Shah, and to replace him with Nazi general Fazlollah Zahedi who until then was detained by the British. Zahedi is responsible for having instituted the cruelest terror regime of the time, while the Shah would cover his exactions while parading for Western ‘people’ magazines.
Operation Ajax was lead by archeologist Donald Wilber, historian Kermit Roosevelt (grandson of president Theodore Roosevelt) and general Norman Schwartzkopf Sr. (whose son with the same name lead Operation Desert Storm). This operation remains a textbook example of subversion. The CIA came up with a scenario that gave the impression of a popular revolt when in reality it was a covert operation. The highpoint of the show was a demonstration in Tehran with 8 000 actors paid by the Agency to provide credible pictures to Western media .
Is History repeating itself? Washington renounced to a military attack on Iran and has dissuaded Israel to take such an initiative. In order to « change the regime », the Obama administration prefers to play the game of covert actions – less dangerous but with a more unpredictable outcome. After the Iranian presidential elections, huge demonstrations in the streets of Tehran are pitching supporters of president Mahmoud Ahmadinejad and supreme leader Ali Khamenei on one side, to supporters of defeated candidate Mir-Hossein Mousavi and former president Akbar Hashemi Rafsanjani on the other. The demonstrations are a sign of a profound division in the Iranian society between a nationalist proletariat and a bourgeoisie upset at being held back from economic globalization . With its covert actions, Washington is trying to weigh on the events to topple the re-elected president.
Once again, Iran is an experimental field for innovative subversive methods. CIA is relying in 2009 on a new weapon: control of cell phones. Since the democratization of mobile phones, Anglo-Saxon secret services have increased their interception capability. While wired phones’ tapping requires the installation of branch circuits – and therefore local agents, tapping of mobile phones can be done remotely using the Echelon network. However, this system cannot intercept Skype mobile phones communications, which explains the success of Skype telephones in conflict areas . The National Security Agency (NSA) therefore lobbied world Internet Service Providers to require their cooperation. Those who accepted have received huge retribution .
In countries under their occupation —Iraq, Afghanistan and Pakistan—, the Anglo-Saxons intercept all telephone communication, whether mobile or wired. The goal is not to obtain full transcripts of any given conversation, but to identify « social networks ». In other words, telephones are surveillance bugs which make it possible to know who anyone is in touch with. Firstly, the hope is to identify resistance networks.
Secondly, telephones make it possible to locate identified targets and «neutralize» them. This is why in February 2008, the Afghan rebels ordered various operators to stop their activity daily, from 5PM to 3AM, in order to prevent the Anglo-Saxons to follow their whereabouts. The relay antennas of those that refused to comply where destroyed .
On the contrary, with the exception of a telephone exchange which was accidentally hit, Israeli forces made sure not to hit telephone exchanges in Gaza during Operation Cast Lead from December 2008 to January 2009. This is a complete change in strategy. Since the Gulf War, the most prevalent strategy was colonel John A. Warden’s « five circles theory »: the bombing of telephone infrastructures was considered a strategic objective to both confuse populations and to cut communication lines between commanding centers and fighters. Now the opposite applies: telecommunication infrastructures must be protected. During the bombings in Gaza, the operator Jawwal  offered additional talk time to its users – officially to help them but de facto serving Israel’s interests. Going one step further, Anglo-Saxons and Israeli secrets services developed psychological warfare methods based on an extensive use of mobile phones. In July 2008, after the exchange of prisoners and remains between Israel and Hezbollah, robots placed tens of thousands of calls to Lebanese mobile phones. A voice speaking in Arabic was warning against participating in any resistance activity and belittled Hezbollah. The Lebanese minister of telecommunications, Jibran Bassil , files a complaint to the UN against this blatant violation of the country’s sovereignty . Following the same approach, tens of thousands of Lebanese and Syrians received an automatic phone call in October 2008 to offer them 10 million dollars for any information leading to the location and freeing of Israeli prisoners. People interested in collaborating were invited to call a number in the UK .
This method has now been used in Iran to bluff the population, to spread shocking news and to channel the resulting anger.
weiterlesen auf: http://www.voltairenet.org