top of page

Conspiracy: CIA's Field Manual 30-31B, a False Flag Playbook?

  • Writer: A. Royden D'souza
    A. Royden D'souza
  • 7 days ago
  • 13 min read

Updated: 6 days ago

In 1975, a document appeared in the Turkish newspaper Barış that would, over the following decades, become one of the most controversial intelligence-related publications of the Cold War. It was labeled as a supplement to the United States Army Field Manual 30-31; specifically, Supplement B, or Field Manual 30-31B.


CIA's Field Manual 30-31B

The document purported to outline a covert strategy employed by U.S. intelligence services in cooperation with allied nations. Its contents were explosive: detailed instructions for the use of "agents provocateurs" to stimulate violent actions among local insurgencies, which would then be blamed on socialist groups to justify government crackdowns and shape public opinion in favor of authoritarian measures.


The document quickly spread. By 1976, it had appeared in Bangkok, Thailand. By 1978, it was being published in European magazines, including the Spanish Triunfo and El Pais, before reaching the Italian press through the October 1978 issue of L'Europeo.


In Italy, where the "strategy of tension" (strategia della tensione) had been unfolding for nearly a decade, the document resonated with a public already suspicious of the true origins of the terrorist bombings that had plagued their nation.


Official sources like the U.S. State Department, the CIA, and successive U.S. congressional committees have consistently labeled FM 30-31B a forgery, a product of Soviet active measures designed to discredit the United States. A KGB defector reportedly confirmed to the U.S. Congress that the document was a Soviet fabrication (a claim most logical thinkers doubt).


But the question that persists, and the question this paper will explore, is this: If the document was a forgery, why did the events it described, like false flag terrorism, the arming of extremist proxies, the manipulation of public opinion through controlled violence, occur across Europe, Latin America, and the Middle East with such consistency that they became known as the "strategy of tension"?


This whitepaper proceeds from a different premise. Rather than debating the document's origins, we will assume the authenticity of FM 30-31B as a representation of actual U.S. intelligence doctrine.


We will analyze its contents against the historical record of real-world events, from the bombings of Italy and Belgium in the 1970s and 1980s to the rise of the mujahideen in Afghanistan, the creation of ISIS, and the ongoing destabilization of sovereign nations.


The purpose is not to "prove" the manual's authenticity, but to apply its framework to history and draw rational, logical conclusions about the consistency of Western intelligence operations over the past seven decades.


Part I: What Field Manual 30-31B Purportedly Contains


According to sources that treat the document as authentic, FM 30-31B was an eight-page supplement to the U.S. Army Field Manual 30-31, which dealt with intelligence operations.


The supplement bore the signature of General William C. Westmoreland, Chief of Staff of the U.S. Army, and was dated March 17, 1970. This attribution led to the document being colloquially known as the "Westmoreland Field Manual."


The manual was marked "TOP SECRET" and was intended for distribution only to senior intelligence and military officials within NATO allied nations.


General William C. Westmoreland

The Strategic Doctrine Outlined


The document outlined a strategy that can be summarized as follows:


1. The "Strategy of Tension" (Strategia della Tensione): The manual described a method for maintaining political control in allied nations by deliberately creating instability. This involved orchestrating violent acts—bombings, assassinations, and other terrorist attacks—and attributing them to left-wing political groups. The resulting "tension" would cause the public to demand security over liberty, thereby strengthening the political position of conservative, anti-communist forces.


2. Use of Agents Provocateurs: The document detailed the deployment of U.S. intelligence operatives to infiltrate left-wing organizations and "stimulate violent or non-violent actions" that would justify government repression. These operatives were to be "agents provocateurs" in the classic sense: they would initiate violence, then disappear, leaving the blame on the legitimate leftist groups they had infiltrated.


3. Manipulation of Public Opinion: The manual acknowledged that the American public and the publics of allied nations would not support aggressive anti-communist measures unless they perceived an immediate threat. Therefore, the strategy required the deliberate creation of "incidents" that would make the local government "appreciate the dangers of Communist subversion."


4. Coordination with Allied Intelligence Services: The manual described a structure of coordination between the CIA, NATO's Allied Clandestine Committee, and the intelligence services of Western European nations. This structure was designed to ensure that "stay-behind" networks—clandestine armies armed and trained for resistance in the event of Soviet invasion—could also be deployed for peacetime political warfare.


The "Stay-Behind" Connection


The document's strategic framework aligned closely with the operational reality of Operation Gladio, the NATO-CIA "stay-behind" network that existed in sixteen Western European countries.


As documented by the Italian parliamentary commission, the Belgian parliamentary inquiry, and Swiss investigations, these networks were armed with explosives, machine guns, and communication equipment hidden in underground bunkers and secret arms caches across Europe.


The purported FM 30-31B provided the doctrinal justification for using these networks not for their stated purpose, resistance against Soviet invasion, but for peacetime political warfare against left-wing (socialist) movements.

The Books of Arya Kalash by A. Royden D'Souza

Part II: Operation Northwoods, The Declassified Blueprint


Before analyzing FM 30-31B against European events, it is essential to acknowledge that a declassified, authenticated document exists proving that the U.S. government planned, in writing, the exact strategy described in the purported manual.


Operation Northwoods (1962)

Operation Northwoods (1962)


In 1962, the U.S. Joint Chiefs of Staff drafted and signed a twelve-page document titled "Justification for U.S. Military Intervention in Cuba" (TS). This document, codenamed Operation Northwoods, outlined a series of false flag attacks designed to create public support for a war against Cuba.


The proposals included:

  • The remote control of civilian aircraft that would be secretly repainted as U.S. Air Force planes, then "shot down" by fabricated Cuban action

  • The fabrication of a "shoot down" of a U.S. Air Force fighter aircraft off the coast of Cuba

  • The possible assassination of Cuban immigrants

  • The sinking of boats carrying Cuban refugees on the high seas

  • The explosion of a U.S. Navy ship in Guantanamo Bay, with fabricated evidence blaming Cuba

  • Orchestrating a "Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington," including bombings of civilian targets


The document stated explicitly that the desired outcome was "to place the United States in the apparent position of suffering defensible grievances from a rash and irresponsible government of Cuba and to develop an international image of a Cuban threat to peace in the Western Hemisphere."


The plan was drafted by the Joint Chiefs of Staff, signed by Chairman Lyman Lemnitzer, and sent to Secretary of Defense Robert McNamara. It was rejected by President John F. Kennedy, who reportedly responded bluntly that "we were not discussing the use of military force."


Following his rejection of the plan, Kennedy removed Lemnitzer as Chairman of the Joint Chiefs of Staff, though Lemnitzer was subsequently appointed Supreme Allied Commander of NATO.


What Operation Northwoods Proves


Operation Northwoods is not a forgery. It is a declassified, authenticated document available in the National Archives. It proves that as early as 1962, the highest levels of the U.S. military establishment were not only contemplating but formally proposing the use of false flag terrorism against American civilians and military personnel to justify war.


The existence of Northwoods establishes beyond doubt that the doctrine described in FM 30-31B—the "strategy of tension," the use of agents provocateurs, the deliberate staging of attacks to manipulate public opinion—was not a Soviet fabrication but a genuine strategic concept within the U.S. national security establishment.


The question is not whether such a doctrine existed. The question is whether it was ever implemented.


Part III: The Strategy of Tension in Europe


Operation Gladio

Operation Gladio was the Italian branch of a continent-wide network of clandestine "stay-behind" armies established by NATO, the CIA, and European intelligence services after World War II.


According to declassified records and parliamentary investigations, these networks existed in sixteen Western European countries, including Italy, Belgium, France, Germany, the Netherlands, Luxembourg, Switzerland, Austria, Greece, Turkey, Spain, Portugal, Norway, Denmark, Sweden, and Finland.


The networks were coordinated through the Allied Clandestine Committee (ACC), a NATO body that brought together intelligence services to plan and execute stay-behind operations.


According to the Library of Congress publisher description of Daniele Ganser's NATO's Secret Armies, "The secret soldiers were trained on remote islands in the Mediterranean and in unorthodox warfare centers in England and in the United States by the Green Berets and SAS Special Forces."


Arms caches were hidden across the continent. In Italy alone, Prime Minister Giulio Andreotti confirmed in 1990 that 127 weapons caches had been dismantled, and that 622 civilians were part of the Gladio network.


Italy: The Strategy of Tension


In Italy, the Gladio network became central to what investigators called the "strategy of tension"—a campaign of terrorist bombings designed to create political instability, blame left-wing groups, and push the Italian electorate toward authoritarian anti-communist parties.


The evidence is substantial:


The 1969 Piazza Fontana Bombing: On December 12, 1969, a bomb exploded at the National Agrarian Bank in Milan's Piazza Fontana, killing 17 people and injuring 88. The bombing was initially blamed on anarchists and left-wing groups, leading to mass arrests and police crackdowns.


However, Vincenzo Vinciguerra, a neo-fascist terrorist convicted for the attack, testified during his 1984 trial that he had operated as part of the Gladio network with the protection of Italian intelligence services. As Vinciguerra explained, the bombing was intended to "blame the left" and justify a "coup d'état."


The 1972 Peteano Massacre: Three carabinieri were killed in a car bombing in Peteano. Vinciguerra was again convicted for this attack.


The 1974 Piazza della Loggia Bombing: Eight people were killed in Brescia by a bomb planted in a protest march.


The 1980 Bologna Railway Station Bombing: The deadliest attack of the strategy of tension, a bomb exploded in the waiting room of Bologna's central station, killing 85 people and injuring over 200.


While publicly blamed on left-wing "Red Brigades" and anarchist groups, investigators and parliamentary commissions later established that far-right terrorists operating within the Gladio framework were responsible.


The Italian Parliamentary Inquiry


When Prime Minister Giulio Andreotti publicly acknowledged Gladio's existence on October 24, 1990, he confirmed that the network had been established with NATO and CIA support. However, he denied its involvement in terrorism.


The Italian Commission on Terrorism reached a different conclusion. Their investigation determined that far-right terror networks had indeed operated with intelligence support to destabilize the country.


Belgium: The Brabant Massacres


The pattern repeated in Belgium. The far-right "Westland New Post" group, later linked to the stay-behind network, carried out the Brabant massacres between 1982 and 1985, killing 28 people in supermarket shootings designed to destabilize the country.


The Belgian parliamentary inquiry documented the existence of stay-behind networks and their links to the massacres.


The FM 30-31B Connection


The FM 30-31B document first appeared in Turkey in 1975 and spread through Europe precisely during the years when the strategy of tension was at its peak.


The document was used at the end of the 1970s during Operation Gladio to implicate the CIA in the Red Brigades' kidnapping and assassination of former Italian prime minister Aldo Moro.


In Allan Francovich's three-part BBC documentary on Operation Gladio, Licio Gelli, the Italian leader of the anti-communist P2 Masonic lodge, stated: "The CIA gave it to me."


Former CIA official Ray S. Cline, when shown the document, said, "I suspect that it is an authentic document." Former CIA head William Colby, however, said, "I have never heard of it."


The question is whether anyone would trust a CIA agent's statement, considering the agency's participations in countless false flags, assassinations, murders, and terrorist activities (allegedly).


The Belgian parliamentary commission investigating the stay-behind networks concluded in 1991 that "the commission has not any certainty about the authenticity of the document"—not that it was a forgery.

The Books of Arya Kalash by A. Royden D'Souza

Part IV: Afghanistan, and The Arming of the Mujahideen


If FM 30-31B described a strategy of using agents provocateurs to stimulate violent actions and blame them on ideological enemies, the CIA's operation in Afghanistan represented the same strategy scaled to a continental theater.


The United States did not merely arm the mujahideen; it deliberately channeled funding to the most radical Islamist factions—Gulbuddin Hekmatyar and Jalaluddin Haqqani—because their religious ideology made them more effective weapons against the Soviet Union.


Afghanistan, and The Arming of the Mujahideen

The CIA relied on Osama bin Laden as a conduit for funding and coordination, building the very networks that would later become al-Qaeda.


The doctrine of using extremists as proxies, then allowing them to be blamed for violence while maintaining deniability, mirrors the framework of FM 30-31B.


The Blowback


As predicted by the pattern, the forces the CIA armed turned against their sponsors (or maybe acted on their direction). The 1993 World Trade Center bombing, the 1998 U.S. embassy bombings, the 2000 USS Cole bombing, and September 11, 2001, were all "blowback" from the Afghan operation.


The question is whether this outcome was unintended; or whether it was, as FM 30-31B would suggest, a calculated feature of a system designed to maintain perpetual conflict.


Part V: Syria and the Rise of ISIS


Syria and the Rise of ISIS

The declassified Defense Intelligence Agency report of August 2012 revealed that the U.S. intelligence community was fully aware that al-Qaeda fighters were fighting alongside U.S.-backed Syrian rebels.


The report noted that the rebels included "Salafi" groups whose goal was to establish a "Salafi breakaway statelet" in the region; exactly what ISIS became.


The doctrine of FM 30-31B, using proxies, allowing violence to escalate, and maintaining deniability, was applied in Syria. The U.S. supported rebel groups, knowing they included al-Qaeda elements. The DIA report predicted the creation of an extremist state. Yet the support continued.


The Snowden Documents: "Hornet's Nest"


According to documents leaked by Edward Snowden, British, American, and Israeli intelligence agencies collaborated on an operation codenamed "Hornet's Nest" designed to create ISIS. The purpose, according to the documents, was to "disintegrate West Asian countries and protect the Israeli regime."


The documents also described how U.S. intelligence freed Ibrahim al-Badri, later known as Abu Bakr al-Baghdadi, from an Iraqi prison, allowing him to radicalize and ultimately lead the Islamic State.


If these documents are accurate, the creation of ISIS was not blowback but a deliberate operation in the tradition of FM 30-31B: the use of extremist proxies to destabilize adversaries and justify ongoing military intervention.


Part VI: The Pattern of False Flag Operations


False Flag Operations

Following the November 2015 Paris attacks, which killed 130 people, former U.S. Army psychological officer Scott Bennett suggested that the attacks could be the work of "a sort of Zionist Mossad, MI6, CIA operation" designed to "facilitate a NATO strike against Syria."


The UAE Oil Tanker Attacks


After attacks on oil tankers near the United Arab Emirates in 2019, academic James Henry Fetzer called them "a classic false flag operation setting up Iran for an attack by the West, in particular, the US."


Fetzer stated: "Nothing could be less in the interest of Iran than provoking an event like this; very clearly an operation being conducted by the Mossad and the CIA." Seems like he was right.


The Consistency of the Pattern


Whether these specific allegations are accurate is less important than the pattern they reveal. Across seven decades, from Italy in the 1960s to the present day, accusations of false flag operations have accompanied major geopolitical crises.


The consistency of the pattern suggests either a persistent paranoid delusion; or a consistent operational methodology.


Given the existence of Operation Northwoods, the documented reality of Gladio, and the declassified DIA report on Syria, the weight of evidence favors the latter interpretation.


Part VII: Analyzing Outcomes Against Doctrine


If FM 30-31B is authentic, it outlines a doctrine with the following elements:


1. Staged Violence: Terrorist attacks are orchestrated by state intelligence services.

2. False Attribution: The attacks are blamed on ideological enemies (leftists, Islamists, etc.).

3. Public Manipulation: The resulting fear shifts public opinion toward authoritarian measures.

4. Proxy Warfare: Local extremists are armed and used as deniable assets.

5. Perpetual Conflict: The cycle of violence is maintained to justify ongoing intervention.


Testing the Doctrine Against History


Italy (1969-1980): Terrorist bombings killed dozens. Far-right networks with intelligence connections were responsible. Left-wing groups were blamed. Public opinion shifted toward anti-communist parties. The Gladio network operated with NATO-CIA support. Result: Doctrine applied.


Belgium (1982-1985): Supermarket shootings killed 28. Far-right group linked to stay-behind networks was responsible. Left-wing groups were initially blamed. Public opinion shifted toward security measures. Result: Doctrine applied.


Afghanistan (1980-1992): The CIA armed radical Islamists. The mujahideen became al-Qaeda. Al-Qaeda attacked the U.S. The War on Terror was declared. Result: Doctrine applied.


Syria (2012-present): The U.S. supported rebel groups including al-Qaeda. The DIA predicted an extremist state. ISIS emerged. The U.S. declared war on ISIS. Result: Doctrine applied.


Ukraine (2022-present): The U.S. supports Ukrainian forces against Russia. Accusations of CIA involvement in intelligence and sabotage operations have been made. Whether this represents a continuation of the doctrine remains to be seen.


The 2025 Framework


As of 2025, analysts continue to draw connections between U.S. intervention and the destabilization of sovereign nations. A recent analysis concluded:


"The US does not build liberation movements; it builds dependencies. And the cost of those dependencies is paid in the erosion of progressive thought, women's rights, education, and artistic freedom; the very foundations of the societies that once dreamed of independence."


This analysis reflects the logical outcome of applying the FM 30-31B framework to U.S. foreign policy.


Conclusion: Drawing Our Own Conclusions


The authenticity of Field Manual 30-31B has been debated for nearly five decades. The U.S. government has consistently labeled it a "Soviet forgery." A KGB defector reportedly confirmed this assessment. The document does not appear in official U.S. Army field manual archives.


One would trust the KGB as much as Mossad, and Mossad as much as the CIA, and the CIA as much as the American Imperium—an oligarchy of degenerate elite that parades around as a "republic" and a "democracy."


Besides, the weight of evidence presented in this paper suggests a reality that one would expect from the CIA, irrespective of any leaked manuals. Operation Northwoods, declassified, authenticated, and undeniable, proves that the highest levels of the U.S. military establishment formally proposed the exact strategy described in FM 30-31B.


Operation Gladio, documented by parliamentary inquiries across Europe, proves that NATO and the CIA maintained clandestine armies armed with explosives and trained for unconventional warfare. The pattern of false flag attacks across Italy and Belgium in the 1970s and 1980s, now linked by investigators to those same networks, proves that the strategy was implemented.


The DIA report on Syria proves that as recently as 2012, the U.S. intelligence community knew it was supporting al-Qaeda-linked rebels and predicted the creation of an extremist state. The Snowden documents allege deliberate creation of ISIS.


Each reader must draw their own conclusion. But the rational, logical assessment of the evidence leads to an unavoidable inference:


Whether FM 30-31B was a genuine U.S. Army field manual or a KGB forgery, it described a strategy that the U.S. national security establishment not only considered but repeatedly implemented across seven decades and three continents.


The strategy of tension, the use of false flag terrorism to manipulate public opinion and justify intervention, is not a conspiracy theory. It is a documented reality. From Operation Northwoods to Operation Gladio, from the arming of the mujahideen to the support of al-Qaeda-linked rebels in Syria, the pattern is consistent and undeniable.


The only remaining question is whether we will finally acknowledge it.


Appendix: Timeline of Key Events

  • 1962 | Operation Northwoods proposed by Joint Chiefs of Staff; rejected by Kennedy

  • 1969 | Piazza Fontana bombing, Italy (start of Gladio "strategy of tension")

  • 1970 | FM 30-31B allegedly drafted and signed by Westmoreland

  • 1975 | FM 30-31B first appears in Turkish newspaper Barış

  • 1978 | FM 30-31B published in European magazines

  • 1980 | CIA officials testify document is KGB forgery

  • 1982-1985 | Brabant massacres, Belgium

  • 1990 | Italian PM Andreotti acknowledges Gladio existence

  • 2001 | Operation Northwoods declassified and made public

  • 2012 | DIA report warns of al-Qaeda in Syria; predicts Salafi state

  • 2015 | Paris attacks; accusations of false flag emerge

  • 2025 | Current year; pattern of intervention continues

The Books of Arya Kalash by A. Royden D'Souza

Bibliography


  • Wikipedia. "U.S. Army Field Manual 30-31B."

  • Wikipedia. "Operation Gladio."

  • Parallel History Project. "US Field Manual 30-31B 18." ETH Zurich.

  • Library of Congress. Publisher description for Ganser, NATO's Secret Armies.

  • Wikipedia. "Operation Northwoods."

  • Ganser, Daniele. NATO's Secret Armies: Operation Gladio and Terrorism in Western Europe. Frank Cass, 2004.

  • U.S. House of Representatives. Hearings Before the Permanent Select Committee on Intelligence. Soviet Covert Action (The Forgery Offense). 96th Congress, 2nd session. February 6, 19, 1980.

  • Italian Parliamentary Commission on Terrorism. Final Report. Rome, 1995.

  • Belgian Parliamentary Commission. Report on Stay-Behind Networks. Brussels, 1991.


*This whitepaper proceeds from the assumption that FM 30-31B represents an authentic expression of U.S. intelligence doctrine. The reader is invited to evaluate the evidence presented, including declassified documents, parliamentary inquiries, and the pattern of historical events, and draw their own rational and logical conclusions.*

Comments


Join our mailing list

Never miss an update

FOLLOW ME

  • Instagram Social Icon
  • Facebook Social Icon
  • YouTube Social  Icon

© 2016 by A.Royden D'souza

bottom of page