Fact-checked by Grok 2 weeks ago

Fifth column

A fifth column denotes a clandestine group of sympathizers or saboteurs who undermine a nation, organization, or military force from within, typically to aid an external adversary. The phrase originated in October 1936 during the Spanish Civil War, when Nationalist general Emilio Mola, advancing on Madrid with four army columns, claimed a "fifth column" of covert supporters already embedded in the city to conduct sabotage and espionage. This internal network, comprising Falangists and other right-wing elements, aimed to disrupt Republican defenses through assassinations, intelligence gathering, and psychological operations. The concept gained widespread currency during World War II, applied by Allied powers to suspected Axis collaborators in occupied territories and neutral states, such as pro-Nazi elements in the United States and who propagated or . , it described communist infiltrators in Western governments during the , exemplified by Soviet agents like those exposed in the , who embedded in bureaucracies to influence policy and steal secrets. While the term has been invoked in propaganda to stigmatize domestic dissent—often without evidence, as in McCarthy-era excesses—empirical cases confirm its reality, including Islamist networks in post-9/11 that radicalized communities to support jihadist goals. Its enduring relevance underscores vulnerabilities to asymmetric threats, where ideological affinity enables subversion without overt invasion.

Definition and Conceptual Framework

Core Definition and Distinctions

A fifth column denotes a group of individuals embedded within a , , or larger collective who actively undermine it from the interior, typically to advance the interests of an external adversary. This manifests through coordinated efforts such as , , dissemination, or demoralization tactics aimed at eroding the host entity's cohesion, defenses, or will to resist. The concept presupposes feigned toward the host while real lies with the , distinguishing it as a form of organized rather than isolated disloyalty. Central to the definition is the element of external orientation: members do not merely oppose their host for ideological, personal, or domestic reasons but explicitly collaborate with a foreign power or hostile force seeking dominance or destruction of . This contrasts with internal dissenters or revolutionaries who challenge authority without foreign sponsorship, as the fifth column's actions are causally linked to facilitating an outsider's , akin to a metaphorical "fifth" column joining four advancing armies from behind lines. For instance, such groups might amplify , disrupt supply lines, or incite panic to precipitate collapse without direct . Distinctions from related concepts sharpen its specificity. Unlike espionage, which primarily involves covert intelligence collection by individuals or small cells often directed by external handlers, a fifth column encompasses broader, group-level including non-intelligence activities like industrial or political infiltration to actively weaken resolve—espionage may support it, but the term implies systemic internal erosion beyond mere spying. It differs from overt collaborators or quislings, who align publicly after or defeat; fifth columnists operate secretly during vulnerability or , preserving deniability to maximize impact. Finally, it excludes unaffiliated traitors motivated by greed or without enemy ties, as the defining causal mechanism is to an opposing external entity, not autonomous .

Methods and Tactics Employed

Fifth column activities center on clandestine to weaken a target nation or group internally, often in coordination with external aggressors, through infiltration, gathering, dissemination, and direct . These tactics exploit positions of trust within , governmental, , and societal institutions to erode cohesion, facilitate invasions, and amplify external pressures. Historical precedents, such as preparations during the (1936–1939), demonstrate systematic testing of these methods, including deceptive signaling and logistical staging to support ground and air operations. Infiltration entails embedding agents or sympathizers into key sectors to gain access, influence decisions, and prepare for overt action. Operatives may pose as refugees, use forged identities, or impersonate officials to issue false orders or procure resources; for example, during Front maneuvers, individuals dressed as Allied officers to mislead troops, while border-adjacent properties were acquired for staging invasions in regions like Germany-Denmark and Belgium-Netherlands. In modern contexts, such as alleged networks in , infiltration targets retirees, personnel, and political figures to leak plans or sway , including cases of officers compromising U.S. collaboration data or presidential security details as recently as 2021–2023. Espionage focuses on collecting actionable to expose vulnerabilities, often through low-profile like mapping military sites or signaling external forces via removed to guide . This includes recruiting insiders for , as seen in 2023 Taiwanese arrests involving 10 officers leaking and a plotting with a CH-47 Chinook helicopter for $15 million. Such efforts prioritize high-value targets, including active-duty personnel and agents, to undermine operational secrecy. and aim to demoralize populations and fracture unity by spreading rumors of defeats, failures, or exaggerated threats, such as 1942 reports in Allied territories claiming ship losses or General Archibald Wavell's death, alongside distribution of anti-British phonograph records in . These psychological operations target civilian morale and military resolve, often leveraging infiltrated or networks to amplify doubt and encourage . Sabotage involves physical disruption of critical assets to impair and , including tampering with like mixing sand into freight car grease, sabotaging railway engines in , or derailing ammunition trains near Alexandria, Egypt. Contemporary variants target such as , , and data systems, exemplified by 2023 breaches in exposing 23.57 million household records and up to 133,000 files to enable potential outages or chaos. Subversion encompasses broader internal undermining, such as inciting dissent, providing logistical aid to invaders, or eroding institutional legitimacy through proxy influences like or political . In the , General Emilio Mola's "fifth column" in (1936) supplied intelligence, targeted weak points, and facilitated to support his four advancing columns against forces. This diverts enemy resources and fosters perceptions of inevitable collapse, as in efforts to co-opt legislators or religious groups for pro-aggressor narratives.

Etymology and Historical Origin

Spanish Civil War Genesis

The term "fifth column" (originally quinta columna in Spanish) originated during the , which erupted on July 17, 1936, following a military rebellion against the Second Spanish Republic led by generals including y Vidal. Mola, commanding Nationalist forces from , coordinated the uprising and advanced on with four army columns by early October 1936, aiming to capture the capital. In a reported statement to journalists around that time, Mola described an additional "fifth column" composed of Nationalist sympathizers embedded within Madrid—civilians, falangists, and monarchists—who would conduct , , and uprisings to undermine Republican defenses from inside the city. This internal element was positioned as decisive, complementing the external military columns and exploiting divisions in Republican-held areas where right-wing supporters had been suppressed or gone underground since the Popular Front's electoral victory in February 1936. The phrase gained public currency shortly after, with its first documented appearance in print on October 3, 1936, in the Communist newspaper Mundo Obrero, which warned of Mola's purported infiltrators amid rising paranoia in the capital. While traditionally attributed directly to Mola—possibly during a radio broadcast or interview—the exact provenance remains debated among historians, as no verbatim transcript from Mola survives, and some accounts suggest it may have been amplified or rephrased by Nationalist or foreign press. Nonetheless, the concept reflected real tactical realities: Nationalist intelligence networks, including Carlists and members, did operate clandestinely in , providing intelligence and attempting disruptions, though their impact was limited by and mass executions during the Paracuellos massacres in November 1936, where thousands suspected of fifth-column activities were killed. By framing internal dissent as a coordinated "column," Mola's weaponized the idea of , influencing fears and contributing to the war's brutal internal purges, with estimates of to deaths attributed to such repressions in Republican zones by war's end in 1939. This genesis marked the term's shift from military strategy to a broader metaphor for treachery, as Mola's forces besieged Madrid from November 1936 onward, though the city held until 1939. The notion resonated internationally, highlighting how civil conflicts amplify suspicions of domestic enemies, a dynamic rooted in the polarized Spanish society fractured by ideological battles between republicans, socialists, anarchists, and conservative nationalists.

Early Conceptual Evolution

The concept of the quinta columna, or fifth column, initially described passive sympathizers within Republican-held Madrid poised to undermine defenses during the Nationalist advance in late 1936, as articulated by General Emilio Mola in an October 1936 press conference in Ávila. Mola's reference to four advancing military columns supplemented by this internal element quickly fueled Republican paranoia, prompting the execution of approximately 2,500 suspected collaborators by early December 1936 and the relocation of the Spanish capital from Madrid to Valencia on November 7, 1936, amid fears of orchestrated sabotage. This marked an early shift from mere ideological alignment to perceptions of active internal threat, with Republicans inverting the term to target right-wing civilians, clergy, and monarchists as traitors, resulting in over 8,000 extrajudicial killings in Madrid alone during the war's initial phase. By late 1936, the term entered English-language discourse through journalistic reports of Mola's statement, evolving into a broader descriptor for clandestine subversion beyond Spain's borders. Ernest Hemingway's 1937 play The Fifth Column, published in 1938 and set amid the siege of Madrid, dramatized counterespionage efforts against Nationalist infiltrators, portraying them as organized agents engaging in espionage and assassination rather than mere uprising, thus popularizing the notion of a structured internal enemy network. This literary adaptation contributed to the concept's generalization, emphasizing proactive tactics like intelligence gathering and disruption over passive loyalty. As the Spanish Civil War concluded in 1939, the fifth column idea proliferated amid rising European tensions, applied to alleged Nazi sympathizers facilitating Germany's expansions; by May 26, 1940, U.S. President invoked it in a fireside chat to caution against domestic fascist elements mirroring the Spanish model of pre-invasion weakening through and panic. This pre-World War II usage reflected a conceptual maturation from localized civil strife to a template for state-sponsored infiltration, prioritizing and demoralization as precursors to overt military action, though evidence of widespread organized activity often remained anecdotal and amplified by wartime fears.

Major Historical Applications

World War II Deployments and Fears

The concept of fifth column activity gained prominence during , particularly following the rapid conquests in Europe, which Allied leaders and analysts attributed in part to internal subversion. The fall of in 1940, facilitated by Vidkun Quisling's pro-Nazi Norwegian National Unity Party, exemplified these fears, with Quisling's radio broadcast on April 9 coordinating with the invasion and leading to his installation as puppet . Similar suspicions arose after the quick collapses of the , , and in May-June 1940, where rumors of disguised agents and local collaborators fueled narratives of undermining defenses. In , heightened paranoia during the anticipated invasion in 1940 prompted the of approximately 74,000 "enemy aliens," primarily and nationals, under the Aliens Order, though subsequent investigations revealed minimal organized . Actual Axis deployments of fifth column elements were limited and largely ineffective. Nazi Germany attempted sabotage in the United States through , launched in June 1942, when two U-boats landed eight saboteurs—four on , , on June 13, and four near , on June 17—equipped with explosives targeting aluminum plants, railroads, and hydroelectric facilities to disrupt war production. The operation failed spectacularly when leader George Dasch surrendered to the FBI on June 19, leading to the capture of all agents; six, including ringleaders, were executed on August 8, 1942, after a military tribunal, while Dasch and accomplice Ernest Burger received leniency for cooperation. This incident, though abortive, validated concerns about potential internal threats from pre-war Nazi sympathizers like the , which had peaked at 25,000 members in 1939 but disbanded after . In the United States, fears extended to following the attack on December 7, 1941, with Secretary of the Navy claiming on December 15 that "fifth column work" by local Japanese contributed to the assault's success, despite intelligence reports from the Office of Naval Intelligence indicating no evidence of . These unsubstantiated allegations, amplified by media and politicians, culminated in on February 19, 1942, authorizing the of over 120,000 —two-thirds U.S. citizens—into ten relocation camps, justified by military commander Lt. Gen. John L. DeWitt's February 14 report citing unprovable risks of espionage and . Post-war inquiries, including the 1980s Commission on Wartime Relocation and of Civilians, found racial prejudice and war hysteria, not empirical threats, drove the policy, as no Japanese American was convicted of espionage or during the war. President addressed fifth column dangers in a December 29, 1940, fireside chat, warning of Nazi infiltration tactics observed in and urging vigilance against "secret emissaries" spreading disunity, which heightened domestic scrutiny of immigrants and isolationists. While real cases existed—such as the , dismantled by the FBI in 1941 with 33 convictions for Nazi intelligence gathering—the scale of threats was often exaggerated, leading to policies that prioritized security over and reflecting causal links between battlefield setbacks and internal paranoia rather than widespread subversion.

Cold War Infiltrations and Countermeasures

During the , the orchestrated widespread infiltration of Western institutions through networks, leveraging ideological recruits to undermine host governments from within, akin to fifth column tactics. These operations, primarily conducted by the and later , targeted the , , and allies, focusing on nuclear secrets, policy influence, and to advance communist expansion. Declassified records indicate Soviet agents penetrated high levels of government, with motivations rooted in Marxist-Leninist ideology that framed capitalist societies as inherently antagonistic. In the United States, the —initiated by the U.S. Army's in February 1943—decrypted over 3,000 Soviet messages from 1940 to 1980, identifying more than 300 code names linked to American spies embedded in the State Department, Treasury, , and . Key infiltrators included the Silvermaster spy ring, which comprised at least 20 government employees passing economic and military data, and Julius Rosenberg, executed in 1953 for transmitting atomic bomb schematics that hastened Soviet nuclear development by up to two years. , a senior State Department official, was convicted of perjury in 1950 after evidence tied him to activities dating to the 1930s, including at the . These revelations, kept secret until 1995, confirmed the scale of penetration, with spies providing intelligence that informed Soviet strategies during the and . The faced similar subversion through the , a spy ring recruited by Soviet in the 1930s at University, comprising , Donald Maclean, , , and . These agents ascended to positions in , the Foreign Office, and the Treasury, leaking Enigma-derived during and post-war atomic data, which compromised defenses and aided Soviet missile programs. Philby, as head of counter-Soviet operations, betrayed colleagues and defected to in 1963 after prolonged suspicion; Maclean and Burgess fled to the USSR in 1951 following a tip-off. The ring's activities delayed Allied code-breaking countermeasures and eroded trust in British institutions. Countermeasures evolved from wartime signals intelligence to comprehensive domestic security programs. The Venona decrypts directly informed FBI arrests and prosecutions, dismantling networks by cross-referencing with defectors like , whose 1945 revelation of a Canadian spy ring exposed over 400 Soviet agents across . President Truman's in 1947 launched loyalty investigations screening 5 million federal employees, resulting in 5,000 resignations and 300 dismissals of suspected subversives. The (HUAC), active from 1938, subpoenaed witnesses and publicized groups like the , leading to the 1948 exposure of Hiss and convictions of figures such as the Rosenbergs. The FBI intensified under , employing wiretaps and informants to monitor 50,000 suspected communists by 1950, while the CIA's formation in 1947 bolstered foreign counterintelligence. These actions, though criticized for overreach in cases like Senator McCarthy's unsubstantiated lists, were substantiated by Venona evidence showing real threats, with Soviet archives post-1991 corroborating the infiltrations' extent despite institutional biases in Western academia minimizing their impact.

Modern and Contemporary Contexts

Espionage and State-Sponsored Subversion

In modern espionage, states leverage fifth column tactics by recruiting or co-opting internal actors—such as diaspora communities, political elites, or criminal elements—to conduct subversion, intelligence gathering, and sabotage within target nations. These operations often blend overt influence with covert infiltration, exploiting open societies' institutions like academia, media, and business to erode sovereignty and foster division. Empirical evidence from declassified reports and counterintelligence disclosures reveals systematic efforts by authoritarian regimes to embed agents or sympathizers who amplify external agendas domestically. China's exemplifies state-sponsored subversion, coordinating networks among to influence policy and suppress dissent. In , PRC activities escalated post-2008, with operatives infiltrating political parties, media, and to promote unification narratives and gather intelligence, culminating in heightened cases by 2024. In the United States, these efforts included channeling donations through business associations to sway politicians, as documented in congressional inquiries revealing ties to PRC intelligence. 's 2025 countermeasures, including expanded anti-infiltration laws, underscore the perceived threat of such embedded networks eroding readiness and public resolve. Russia's doctrine, outlined in Valery Gerasimov's 2013 writings, explicitly incorporates fifth column activation—mobilizing internal sympathizers for protests, , and —to complement kinetic operations. Contemporary applications include funding European far-right groups to exacerbate social cleavages, with documented financial flows to parties in , , and between 2014 and 2017. Pre-invasion operations in 2022 featured attempted fifth column by pro-Russian elements, though many failed due to poor coordination. Iran's (IRGC) and Ministry of Intelligence employ criminal proxies for extraterritorial , targeting s and rivals since at least 2018. In , Iran has outsourced assassinations to networks like Sweden's gang, enabling deniability while advancing regime goals such as silencing exiled activists. Australian authorities expelled Iranian diplomats in 2025 after uncovering plots involving local criminals to attack Jewish and targets, reflecting a pattern of leveraging vulnerabilities for asymmetric leverage. These tactics, reliant on co-opted locals, amplify Iran's regional influence without direct confrontation, as seen in proxy expansions into and the post-2023. Countermeasures, including sanctions on IRGC-linked entities, highlight the causal link between such and heightened insecurity.

Political and Ideological Accusations

In contemporary Western politics, accusations of fifth-column activity frequently target ideological dissenters within or institutions perceived as aligning with foreign adversaries or undermining national cohesion. A study of and coverage from 2011 to 2016 identified recurrent use of the term to describe intra-party opposition, such as claims that members under [Jeremy Corbyn](/page/Jeremy Corbyn) constituted a "fifth column" enabling antisemitic or pro-Russian elements, or that certain figures facilitated undue foreign influence through lax stances on and trade. These framings often portrayed such groups as metaphorically "infiltrating" from within, echoing historical fears but applied to disagreements rather than overt , with only about 30-39% of articles reporting rebuttals from the accused. Ideological accusations extend to minority populations suspected of dual loyalties, particularly Muslim communities in and , where concerns over have prompted claims of subversive networks prioritizing transnational ideologies over host-nation security. For example, post-2015 migration waves amplified narratives in policy debates framing certain groups as potential vectors for ideological , supported by documented cases of within mosques and online forums. In the United States, similar rhetoric has targeted academic and media elites accused of promoting "woke" ideologies—such as —as tools of long-term cultural akin to communist infiltration tactics, with proponents citing empirical rises in campus and as evidence of eroded national loyalty. These claims draw partial substantiation from declassified intelligence on historical ideological penetrations but face critique for overgeneralization, as aggregate data shows most such communities integrate without disloyalty. Beyond the , authoritarian regimes routinely deploy fifth-column labels against domestic liberals or NGOs, as seen in Russia's 2022 invocation of the term against anti-war protesters and Western-aligned oligarchs opposing the Ukraine invasion, framing them as tools of subversion. In , Taiwan's has accused pro-Beijing political factions and media outlets of forming a PRC-backed fifth column, citing specific 2024 instances of election interference and networks involving over 100 documented agents. Such accusations, while rooted in verifiable intelligence leaks and arrests, often serve to consolidate power, highlighting the dual-edged nature of the rhetoric in eroding trust amid genuine threats like state-sponsored campaigns.

Controversies, Debates, and Critiques

Evidence of Real Threats

Soviet penetration of Western institutions during the exemplified a successful fifth column operation, with spies embedded in key positions delivering intelligence that advanced Moscow's strategic goals. The , a group including , , Donald Maclean, , and , infiltrated British intelligence and foreign policy circles, passing classified information on Allied plans, including details of the D-Day invasion and atomic research, which compromised Western security for decades. In the United States, Soviet agents within the , such as and the Rosenbergs, transmitted blueprints and fissile material production methods, enabling the USSR to detonate its first atomic bomb in 1949—potentially 18 months to two years earlier than independent development would have allowed. The , declassified U.S. from the 1940s, decrypted thousands of Soviet communications confirming over 300 American citizens and immigrants as spies or sympathizers aiding communist subversion. In , Nazi fifth column elements facilitated rapid conquests in by providing pre-invasion intelligence and sabotage support. In , Vidkun Quisling's pro-Nazi party coordinated with German forces, supplying troop positions and suppressing resistance during the April 1940 invasion, which led to Quisling's brief self-proclamation as and subsequent puppet . Similar activities occurred in the , where fascist sympathizers marked strategic sites and disrupted defenses ahead of the 1940 , contributing to the swift fall of the and despite Allied numerical advantages. These internal networks, often comprising ideological and ethnic German minorities, amplified external military pressure, resulting in and governments that undermined national sovereignty. Contemporary evidence underscores ongoing fifth column threats from state actors like , where systematic recruits insiders to exfiltrate technology and influence policy. The U.S. government has documented over 100 instances of economic since 2000, including cases where American researchers and engineers were coerced or incentivized to steal trade secrets in , semiconductors, and , causing annual losses estimated at $225-600 billion. Notable convictions include Xu Yanjun, a sentenced in 2022 to 20 years for attempting to recruit GE employees to pilfer engine data, demonstrating direct subversion of U.S. defense-industrial capabilities. The FBI identifies the Communist Party's tactics, such as "" operations and overseas police stations, as enabling internal repression and talent poaching, with 2,000 such stations worldwide facilitating harassment of dissidents and IP theft on U.S. soil. In , Beijing's networks have infiltrated and agencies, recruiting over 1,000 personnel since 2014 for and , posing an existential risk to democratic defenses. These cases illustrate that fifth columns, when ideologically motivated and organizationally supported, inflict tangible harm through leaks, technological transfer, and societal division, validating historical vigilance against internal despite risks of overreach.

Risks of Misuse and Overreach

The application of "fifth column" accusations without rigorous evidence has frequently resulted in violations and social division, as the term's vagueness allows for broad stigmatization of domestic groups perceived as disloyal. In the United States during , widespread fears of Japanese American collaboration with Imperial Japan—amplified by media reports of potential —culminated in , signed by President on February 19, 1942, authorizing the forced relocation and of over 120,000 individuals of Japanese ancestry, two-thirds of whom were U.S. citizens. Despite these measures, post-war investigations, including those by the U.S. government, found no evidence of organized fifth column activity or by Japanese Americans on the , highlighting how unsubstantiated panic led to the largest involuntary resettlement in U.S. history and long-term economic and psychological harm to internees. During the early , Senator McCarthy's investigations into alleged communist infiltration invoked fifth column imagery to target perceived internal enemies, resulting in hearings from 1950 to 1954 that scrutinized thousands, including State Department officials and entertainment industry figures, often on or guilt by association. While declassified documents like the transcripts, released in the 1990s, confirmed real Soviet espionage networks involving American citizens such as and the Rosenbergs, McCarthy's tactics extended to baseless claims, fostering blacklists, loyalty oaths, and career destructions without , which the U.S. censured him for in December 1954. This overreach eroded public trust and chilled free speech, as accusations shifted from verifiable subversion to ideological conformity. Broader risks include the erosion of democratic governance when fifth column rhetoric reframes or minority viewpoints as existential threats, enabling policies that prioritize over and fostering ethnic or ideological . Such misuse can discredit legitimate efforts by associating them with , as seen in historical parallels like 19th-century anti-Catholic campaigns in and the U.S., where immigrants were labeled a papal fifth column to justify exclusionary laws. Empirical analysis of these episodes underscores that while internal poses causal risks to national cohesion—evident in documented cases like Nazi sympathizers in pre-war —the absence of evidentiary thresholds invites authoritarian drift, damaging institutional credibility and social fabric without proportionally enhancing .

Legacy and Broader Implications

Influence on Security Doctrines

The concept of the fifth column has profoundly shaped doctrines by emphasizing the need to counter internal alongside external threats, particularly through enhanced counterintelligence and loyalty screening mechanisms. During , fears of fifth column activities—exemplified by perceived sabotage risks from ethnic minorities—directly influenced U.S. policy under , signed by President on February 19, 1942, which authorized the internment of approximately 120,000 , reflecting a doctrinal shift toward preemptive internal to prevent hypothetical collaboration with . Similar apprehensions contributed to the rapid fall of in May-June being attributed partly to internal disloyalty, prompting Allied militaries to integrate fifth column countermeasures into , such as intensified domestic and to foster national unity. In the Cold War era, the fifth column paradigm informed U.S. security doctrines focused on ideological infiltration, culminating in President Harry S. Truman's Federal Employee Loyalty Program established by on March 21, 1947, which screened over 5 million federal workers for communist sympathies amid concerns of Soviet-backed internal networks. This approach extended to military and intelligence reforms under the , which centralized counter-subversion efforts within the CIA and expanded FBI domestic surveillance to detect "secret sympathizers" engaging in or . European doctrines similarly incorporated vigilance against communist fifth columns, as evidenced by loyalty oaths and purges in Western allied forces, driven by documented Soviet cases like the , active from the 1930s to 1963. Contemporary security doctrines continue to reflect fifth column influences, particularly in frameworks that address non-state actors and ideological . Russian military strategist Valery Gerasimov's 2013 doctrine explicitly leverages the "protest potential of the fifth column" for destabilization, blending internal dissent with external operations, a model mirrored in analyses of state-sponsored by actors like in , where networks within security agencies are assessed as enabling influence operations as of 2024. U.S. Department of Defense strategies, such as the 2018 National Defense Strategy, emphasize "insider threats" and countering foreign malign influence, echoing fifth column concerns by prioritizing against domestic enablers of adversaries, though empirical reviews like a 1983 on Wartime Relocation found no substantiated fifth column acts by interned groups, highlighting risks of doctrinal overreach. This evolution underscores a causal emphasis on causal chains from internal disloyalty to strategic vulnerability, informing doctrines that balance empirical threat assessment with civil liberty safeguards. ![Poster depicting efforts to smash communism's fifth column]float-right

Depictions in Culture and Media

The concept of the fifth column entered literary culture through Ernest Hemingway's 1938 play The Fifth Column, his only full-length dramatic work, set amid the Siege of Madrid during the . The narrative centers on Philip Rawlings, a fictionalized Loyalist agent based on Hemingway's wartime experiences, who infiltrates and combats fascist sympathizers undermining the defense from within. First staged in 1940 after revisions, the play was later adapted into short stories and a 1960 television film directed by , featuring as Rawlings and , emphasizing tactics and personal tolls of . In visual propaganda, particularly during , fifth column imagery proliferated to alert populations to internal threats. American posters, such as the 1941 broadside "The Fifth Column Menaces America on a Thousand Fronts" by Joseph P. Kamp, illustrated purported Nazi and communist subversive routes across the U.S., urging vigilance against espionage and sabotage networks. Similar efforts included calls to "Stop the Fifth Column" through everyday , reflecting and public campaigns to counter infiltration fears post-1940 Quisling reports from . Film depictions in the early 1940s Anglo-American often portrayed fifth columnists as insidious Nazi agents eroding unity, as in the 1942 Sherlock Holmes vehicle and the Voice of Terror, where Holmes dismantles a spy ring broadcasting terror from . These portrayals, while dramatized, amplified real intelligence concerns, though post-war analyses noted that actual fifth column activities were overstated relative to overt military threats, with cinematic emphasis serving to bolster morale and enlistment. media shifted focus to communist infiltrators, echoing earlier motifs in anti-subversion posters targeting ideological fifth columns within labor unions and academia.

References

  1. [1]
    Where Does the Term 'Fifth Column' Come From? - HistoryExtra
    Jun 25, 2024 · Originating in the Spanish Civil War, the notion of the 'enemy within' conveyed by the term 'fifth column' has had a long and sinister legacy throughout the ...
  2. [2]
    Fifth Column - Political Dictionary
    Origin of “Fifth Column”. The term originated with Emilio Mola Vidal, a Nationalist general who served under Franco during the Spanish Civil War. As Mola ...
  3. [3]
    fifth column — Wordorigins.org
    Sep 28, 2020 · A fifth column is a group of insurgent forces engaging in sabotage and espionage behind enemy lines. The phrase dates to 1936 and the Spanish Civil War.
  4. [4]
    Enabling the 5th Column & the Relevancy of Unconventional Warfare
    Aug 6, 2021 · During the Spanish Civil War in 1936, a journalist asked Nationalist General Emilio Mola how he planned to take Madrid with his four columns ...<|control11|><|separator|>
  5. [5]
    FIFTH COLUMN Definition & Meaning - Dictionary.com
    Fifth column definition: a group of people who act traitorously and ... The term originated in a remark by Francisco Franco, the Spanish dictator, that ...
  6. [6]
    Fifth Column, Intelligence Bulletin, November 1942 (Lone Sentry)
    The Axis not only tested Fifth Column procedures during the Spanish war but also tested new ground and air force tactics. It is generally believed that Hitler ...
  7. [7]
    An Assessment of the PRC Fifth Column Network within Taiwan
    May 15, 2024 · A significant espionage case in 2023 unveiled a spy network within Taiwan's military comprising ten officers. This network, established by a ...Missing: distinctions | Show results with:distinctions
  8. [8]
    "Wild Bill" Donovan and the Origins of the OSS - National Park Service
    Jul 21, 2017 · Beginning in 1939, fears in the United States of Nazi, fascist, or Communist espionage, sabotage, or other subversion by possible "fifth ...<|separator|>
  9. [9]
    Enabling the Fifth Column and the Relevancy of Unconventional ...
    Aug 4, 2021 · The General commented that a “fifth column” of supporters inside the city would support him and undermine the Republican government from within.Missing: espionage | Show results with:espionage
  10. [10]
    Fifth column | Definition & Facts | Britannica
    Fifth column, group of agents who attempt to undermine a nation's solidarity from within. The term is traditionally credited to Emilio Mola Vidal, ...
  11. [11]
    Fighting the Fifth Column: The Terror in Republican Madrid during ...
    This chapter discusses the ruthless elimination of the so-called 'fifth column' in Republican Madrid during the first months of the Spanish Civil War ...
  12. [12]
  13. [13]
    meanings and history of the term 'fifth column'
    Apr 10, 2017 · The term fifth column, which translates Spanish quinta columna, denotes the enemy's supporters in one's own country, or a body of one's ...Missing: definition | Show results with:definition
  14. [14]
    The Fifth Column | play by Hemingway - Britannica
    He wrote a play called The Fifth Column (1938), which is set in besieged Madrid. As in many of his books, the protagonist of the play is based on the author.
  15. [15]
    Roosevelt's Address on the "Fifth Column" | Experiencing History
    It was widely believed that a Nazi "Fifth Column" served as the advance force of the German military, paving the way for the invasion through propaganda and ...
  16. [16]
    The Fifth Column in World War II
    In World War II the Fifth Column was the name given to Axis agents who carried out subversive work on the home fronts of Allied coun- tries. Their mission was ...
  17. [17]
    Nazi Saboteurs and George Dasch - FBI
    On September 1, 1939, World War II opened in Europe with the invasion of Poland by Nazi Germany. The United States remained neutral until drawn into the ...Missing: column | Show results with:column
  18. [18]
    The Inside Story of How a Nazi Plot to Sabotage the U.S. War Effort ...
    Jun 28, 2016 · Eight agents of Nazi Germany were in custody, caught on American soil with detailed plans to sabotage key infrastructure and spread panic. In ...Missing: column | Show results with:column
  19. [19]
    75 Years Ago, the Secretary of the Navy Falsely Blamed Japanese ...
    Dec 15, 2016 · 75 Years Ago, the Secretary of the Navy Falsely Blamed Japanese-Americans for Pearl Harbor · The baseless accusation sparked the road to the ...
  20. [20]
    A Brief History of Japanese American Relocation During World War ...
    In late January 1942 many of the Japanese arrested by the Justice Department were transferred to internment camps in Montana, New Mexico, and North Dakota.
  21. [21]
    Venona: Soviet Espionage and The American Response, 1939-1957
    433-page package of introductory material and collections of documents showing US responses and Soviet messages.
  22. [22]
    Venona Documents - National Security Agency
    The US Army's Signal Intelligence Service, the precursor to the National Security Agency, began a secret program in February 1943 later codenamed VENONA.
  23. [23]
    Opening the Venona Files - Warfare History Network
    Jun 9, 2024 · The Venona Project gives the modern-day historian a clearer view of just how much our wartime Soviet ally penetrated the US government.
  24. [24]
    The Cambridge Five: Spies within British Elite - Grey Dynamics
    The Cambridge Five were students recruited by Soviet intelligence, who obtained high-level positions in the UK government to spy for the Soviet Union.
  25. [25]
    WWII Spies: the Soviet Cambridge Network
    The primary objective of the NKVD was to infiltrate MI-5, the domestic branch of British intelligence, and MI-6, the counterintelligence office, which is ...
  26. [26]
    World War, Cold War, 1939-1953 - FBI
    And Americans were increasingly becoming enamored of communism and its seductive promise of a classless state; the Communist Party of the United States and ...
  27. [27]
    The Venona Intercepts - Manhattan Project - OSTI.GOV
    Soviet intelligence learned of the VENONA program in 1949 through its highly-placed British agent, Kim Philby, but there was nothing they could do to stop it.
  28. [28]
    [PDF] 1 Magic Weapons: China's political influence activities under Xi ...
    Jun 7, 2017 · United front activities incorporates working with groups and prominent individuals in society; information management and propaganda; and it has ...
  29. [29]
    Fifth Column Fears: The Chinese Influence Campaign in the United ...
    Sep 24, 2019 · She details how the United Front made large political donations via Chinese business associations.
  30. [30]
    The Lai Administration Vows Renewed Efforts to Combat PRC ...
    Apr 2, 2025 · Espionage conducted by military and other government personnel on behalf of the PRC remains a critical national security problem in Taiwan, ...
  31. [31]
    Russia's 5th Column - Center for American Progress
    Mar 15, 2017 · This report examines Russia's efforts to support far-right parties in Europe; identifies the ideological and strategic motivations for its actions.
  32. [32]
    Russian Preinvasion Influence Activities in the War with Ukraine
    Analysis of a wide range of publications shows a consistent and predictable pattern that helps demystify Russian operations. ... Russian fifth-column saboteurs ...
  33. [33]
    Iranian External Operations in Europe: The Criminal Connection
    Iranian operational leaders, specifically IRGC and MOIS, have increasingly leveraged criminal networks as proxies to carry out attacks abroad.Missing: subversion | Show results with:subversion
  34. [34]
    Iranian Subversion: A Systemic Strategy that has Extended to Australia
    Sep 30, 2025 · Iran has been operating in the periphery of Europe, using the criminal proxies of the Swedish Foxtrot and Irish Kinahan network to assassinate ...
  35. [35]
    The Quds Force's Expansion: Iranian Subversion in Jordan and the ...
    Oct 7, 2023 · Iran is exploiting regional vulnerabilities to destabilize Jordan's pro-Western monarchy and establish a contiguous anti-Israel network.<|control11|><|separator|>
  36. [36]
    Hidden Warfare: Iran's Growing Dependence on Criminal Networks
    Nov 1, 2024 · Since 2018, Iran has intensified its use of criminal networks as proxies for executing attacks and operations abroad, particularly in Europe ...
  37. [37]
    Who is the modern 'traitor'? 'Fifth column' accusations in US and UK ...
    May 24, 2018 · 'Fifth column' was widely used in home politics as a metaphor to describe dissent within political parties and infiltration of undesired or ...
  38. [38]
    (PDF) Who is the Modern "Traitor"? "Fifth Column" Accusations in ...
    I identify three dominant patterns: authoritarian states describing opposition movements as a “fifth column”; suspicion of western Muslim populations as ...
  39. [39]
    Enemies Within: The Global Politics of Fifth Columns
    Jun 21, 2022 · Fifth-column accusations can have baleful effects on governance and trust, as they call into question the loyalty and belonging of the targeted ...
  40. [40]
    The Global Politics of Fifth Columns - Harris Mylonas
    Mar 29, 2022 · What accounts for changes in fifth-column framing over time? How do the claims and rhetoric of governments differ from those of societal groups?
  41. [41]
    Cold War Tactics: Fifth Column, Critical Race Theory & Social Justice
    The fifth column were spies who had infiltrated the enemy camp to demoralize and confuse them. This practice was used by Philip II of Macedon, the father of ...
  42. [42]
    [PDF] THE FIFTH COLUMN - Transparency International Defence & Security
    A fifth column is any group of people who undermine a larger group from within, usually in favour of an enemy group or nation. The activities of a fifth column ...Missing: espionage | Show results with:espionage
  43. [43]
    NEW BOOK: Enemies Within: The Global Politics of Fifth Columns
    In this volume, a multidisciplinary group of leading scholars address several related questions: When are actors likely to employ fifth-column claims and ...
  44. [44]
    The Importance of Western and Soviet Espionage in the Cold War
    Apr 14, 2021 · [33] Newton, Cambridge Spies, p. XV. [34] Kerr, Investigating soviet espionage and subversion, p. 108. [35] Ibid., p. 104.
  45. [45]
    World Policy Journal: Soviet Spies: Did They Make a Difference
    But in the long tradition of Russian espionage services, whose roots go back to Peter the Great, the Soviet spies in the United States did what they could to ...
  46. [46]
    [PDF] " SOVIET ESPIONAGE AND " THE AMERICAN RESPONSE * 1939 ...
    Soviet espionage operatives in the United States during World War II fun- neled information to Moscow through a handful of professional intelligence.<|separator|>
  47. [47]
    Fifth Column - Spartacus Educational
    (1) Defence Regulation 18N (1939) · (2) A MI5 agent attended a meeting of the Militant Christian Patriots at Caxton Hall on 23rd May, 1939. · (3) Fred Pateman ...
  48. [48]
    Survey of Chinese Espionage in the United States Since 2000 - CSIS
    May 2014: Chinese military hackers targeted six American companies in the power, metals, and solar production industries and stole trade secret information. The ...
  49. [49]
    Industrial espionage: How China sneaks out America's technology ...
    Jan 16, 2023 · In November Chinese national Xu Yanjun, said to be a career spy, was sentenced to 20 years in prison for plotting to steal trade secrets from ...
  50. [50]
    The China Threat - FBI
    The counterintelligence and economic espionage efforts emanating from the government of China and the Chinese Communist Party are a grave threat to the ...
  51. [51]
    What China's spies are doing in the U.S., and what ... - CBS News
    May 18, 2025 · One way Beijing paid attention, according to the FBI, was to secretly open an overseas Chinese police station right in the middle of New York ...
  52. [52]
    Of Spies and G-Men: How the U.S. Government Turned Japanese ...
    Sep 29, 2017 · In well over a decade of investigating Japanese Americans, no fifth column was ever discovered, no double agents, no terror cells or subversive ...
  53. [53]
  54. [54]
    Watch McCarthy | American Experience | Official Site | PBS
    Jan 6, 2020 · Hoover: The Communist Party of the United States is a fifth column, if there ever was one. Their goal is the overthrow of our government ...
  55. [55]
    Senator McCarthy's Oversight Abuses
    Senator McCarthy abused oversight and interrogation tactics to prompt intense scrutiny on officials and civilians alike. Read his Portrait in Oversight.Missing: overreach | Show results with:overreach
  56. [56]
    Enemies Within: The Global Politics of Fifth Columns - ResearchGate
    Nov 30, 2022 · Fifth-column accusations can have baleful effects on governance and trust, as they call into question the loyalty and belonging of targeted ...
  57. [57]
    Interview: Professor Margaret Macmillan | IPPR
    Jul 21, 2017 · It's very similar to what happened in the 19th century with fear of Roman Catholics. ('The Catholics are a fifth column. We don't want the Irish ...<|separator|>
  58. [58]
    Encyclopedia of United States National Security - Fifth Column
    A fifth column is a group of secret sympathizers or enemy supporters that engage in espionage or sabotage within national borders. Soviet ...Missing: sponsored | Show results with:sponsored
  59. [59]
    General Gerasimov on the Vectors of the Development of Military ...
    Mar 30, 2019 · He claimed that the US approach is to combine the destabilizing effects of the “protest potential of a fifth column” with precision strikes on ...
  60. [60]
    When Will I Be Blown Up? Balancing Security and Civil Liberties in ...
    Apr 27, 2021 · Indeed, a 1983 government report found that “not a single documented act of espionage, sabotage or fifth column activity was committed by an ...Missing: impact | Show results with:impact<|control11|><|separator|>
  61. [61]
    The Disturbing Return of the Fifth Column - Foreign Affairs
    Aug 26, 2022 · Russian President Vladimir Putin made his intentions clear in a speech in March, warning that the West “will try to bet on the so-called fifth column.
  62. [62]
  63. [63]
    The Fifth Column (TV Movie 1960) - IMDb
    Rating 7.1/10 (54) The Fifth Column · Director. A.E. Hotchner · Writers. Ernest Hemingway · A.E. Hotchner · Stars · Richard Burton · Maximilian Schell · Sally Ann Howes.
  64. [64]
    The Fifth Column Menaces America on a Thousand Fronts
    The poster depicts a "Fifth Column" of Communists, Nazis, and Fascists, with the main focus being anti-Communist, showing their alleged penetration of the US.Missing: evolution | Show results with:evolution
  65. [65]
    (PDF) 'Sherlock Holmes and the Nazis: Fifth Columnists and the ...
    Dec 25, 2018 · . Interestingly, very few reviewers, Powell being. a notable exception, directly alluded to the 'fifth column' scare, the depictions of unity or ...
  66. [66]
    A Fifth Column Was Among Us - Greenbriar Picture Shows
    Mar 1, 2022 · The fact is, however, that the spies and saboteurs of the Fifth Column were always more successful and prominent in the movies than in real life ...