Difference between revisions of "False flag"

From Wikispooks
Jump to navigation Jump to search
(Created page with "'''False flag''' operations are covert operations designed to deceive the public in such a way that the operations appear as though they are being carried out by other entities. ...")
 
m (typo)
 
(162 intermediate revisions by 9 users not shown)
Line 1: Line 1:
'''False flag''' operations are covert operations designed to deceive the public in such a way that the operations appear as though they are being carried out by other entities. The name is derived from the military concept of flying '''false colors'''; that is flying the flag of a country other than one's own. False flag operations are sometimes used in commerce or politics.
+
{{concept
 +
|wikipedia=https://en.wikipedia.org/wiki/False_flag
 +
|image=false-flag-pic.jpg
 +
|image_width=
 +
|constitutes=Deep event, Psyop, Third rail topic
 +
|description=False flags are attacks intended to blame a third party. Since a [[JCIT|1979 conference in Jerusalem]], the most common pattern in the West has been bomb attacks which [[authorities]] and the {{ccm}} quickly blame on [[suicide bombings|suicidal]] Muslims, promoting an overarching "[[war on terror]]" narrative, that promotes fear and is used to concoct [[casus bellis]] as needed.
 +
|glossary=False flag attacks are actions carried out in ways calculated to deceive the victim as to the nature of the perpetrator. Historically, these often involved flying literal flags, e.g. from a ship, or wearing uniforms. The procedure has been used as a standard way to try to justify starting a war. Most recently, perhaps the most common false flag in Western nations have been bombs attacks blamed on Muslims designed to fuel fear and promote the "war on terror".
 +
|key_properties=Start/End/ON has perpetrator/Has perpetrator/Description
 +
|key_property_headers=Start/End/Attributed to/Perpetrator(s)/Description
 +
|subjects=Strategy of tension
 +
}}
 +
A '''False flag attack''' (or '''false flag operation''') is an act committed with the intent of disguising the actual source of responsibility and pinning blame on another party. An attack on a target will appear to be done by an enemy, but this enemy is aided and the attack is often organised by the attacked target. They may be used as a stand alone [[casus belli]] or part of a longer term [[strategy of tension]], such as happened during the [[Italian]] [[Years of Lead]] during which [[Operation Gladio]] terrorised the [[Italian]] population. The primary modern example is the "[[War On Terror]]" which is being waged worldwide.<ref>https://www.wikiwand.com/en/False_flag</ref><ref>See "Examples" on the bottom of this page</ref>
  
This article is based on that of Wikipedia without the Zionist-biased perspective.
+
==Origin==
 +
The term comes from navies warfare in [[1700s]] whereby a vessel flew the flag of a neutral or enemy [[country]] in order to hide its true identity. The tactic used by pirates and private assassins to deceive other ships into allowing them to move closer before attacking them as in famous [[Hollywood]] movies. It became legal in international maritime law, on the condition that the attacking vessel displayed its true flag once an attack had begun.<ref>https://books.google.com/books?id=xn17DwAAQBAJ&pg=PT281</ref><ref>https://www.cjr.org/language_corner/false-flags.php</ref>
  
==Naval warfare==
+
== Purposes ==
  
The practice has generally been considered acceptable in naval warfare, provided the false flag was lowered and the national flag raised before engaging in battle. Auxiliary cruisers operated in such a fashion in both World Wars, as did Q-ships, while merchant vessels were encouraged to use false flags for protection. One of the most notable examples was in World War II when the German commerce raider ''Kormoran'', disguised as a Dutch merchant ship, surprised and sank the Australian light cruiser HMAS ''Sydney'' in 1941, causing the greatest recorded loss of life on an Australian warship. The ''Kormoran'' was also fatally crippled in that encounter and its crew was captured, but it was a considerable psychological victory for the Germans.<ref>Squires, Nick. "[http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2008/03/17/wsydney117.xml HMAS Sydney found off Australia's west coast]", The Daily Telegraph (Australia), 2008-03-17.</ref>
+
Individual events may have multiple congruent purposes (for example, as covert [[assassination]]s, or to discredit a particular group by framing them for the attack,), but campaigns (such as the "[[war on terror]]" or the Italian [[strategy of tension]]) often have broader [[War on Terror/Purposes|purposes]], such as effecting [[social change]] by using [[fear]] as a stressor of a population.
  
The British used a Kriegsmarine Ensign in the St Nazaire Raid and captured a German code book. The old destroyer HMS Campbeltown (I42), which the British planned to sacrifice in the operation, was provided with cosmetic modifications, cutting the ship's funnels and chamfering the edges to resemble a German Möwe-class destroyer. The British were able to get within two miles of the harbour before the defences responded, where the explosive-rigged ''Campbeltown'' and commandos successfully disabled or destroyed the key dock structures of the port.<ref>Guinness World Records (2009), p.155</ref><ref>Young, P (Ed) (1973) Atlas of the Second World War (London: The Military Book Society)</ref>
+
== Feasibility ==
  
==Air warfare==
+
Attribution of [[cyberterrorism|virtual attacks]] is notoriously difficult and predicted to get even harder<ref>https://www.schneier.com/blog/archives/2018/03/friday_squid_bl_615.html#comments</ref><ref>http://www.theregister.co.uk/2018/03/08/analysis_suggests_norks_not_behind_olympic_destroyer_malware_attack/</ref>, but increased mass communications (especially the [[mass surveillance]] carried out by [[intelligence agencies]] such as the [[NSA]]) mean that large scale false flag attacks in the real world are only feasible for secretive, influential and highly disciplined organisations. They are believed to rarely take place without the cooperation or at least the acquiescence of intelligence agencies. False flag attacks are a risky but regular tool used by [[deep state]] groups adept at co-opting the machinery of national governments.
  
In December 1922-February 1923, Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare, drafted by a commission of jurists at the Hague regulates:<ref>[http://www.lib.byu.edu/~rdh/wwi/1918p/hagair.html The Hague Rules of Air Warfare], 1922-12 to 1923-02, ''this convention was never adopted''' ([http://www.au.af.mil/au/awc/awcgate/interwar/hagair.htm backup site])</ref>
+
== Strategy ==
 +
{{YouTubeVideo
 +
|code= Y6LKmhDRWFc
 +
|caption= [[Patrick Clawson]] of the [[Washington Institute for Near East Policy | Washington Institute]] in a 2012 QA. He explains, that in order for the United States getting into a war, there needs to be the initiation of a crisis; basically acknowledging a number of false flag attacks, or provocations that lead to war, in the last 150 years.<ref>https://www.corbettreport.com/false-flags-over-iran saved at [https://web.archive.org/web/20160808021031/https://www.corbettreport.com/false-flags-over-iran/ Archive.org] and [http://archive.is/5yuiL Archive.is]</ref>  
 +
|align=left
 +
|width=350px
 +
}}
 +
[[Webster Tarpley]] has published extensively on the strategy of false flags. While they are inevitably contain an element of risk - especially for the lower level operatives who are usually lied to about their involvement, and are often [[murder]]ed as part of the cover-up - certain common strategies are employed to maximise the "[[plausible deniability]]" by which higher-ups life to fight - and kill - another day.
  
:Art. 3. A military aircraft must carry an exterior mark indicating its nationality and its military character.
+
=== Drills ===
  
:Art. 19. The use of false exterior marks is forbidden.
+
{{FA|Terror drill}}
  
This draft was never adopted as a legally binding treaty, but the ICRC states in its introduction on the draft that "To a great extent, [the draft rules] correspond to the customary rules and general principles underlying treaties on the law of war on land and at sea",<ref>[http://www.icrc.org/IHL.nsf/INTRO/275?OpenDocument Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare. Drafted by a Commission of Jurists at the Hague, December 1922 - February 1923.: Introduction] ICRC</ref> and as such these two non controversial articles were already part of customary law.<ref>{{cite journal|last=Gómez|first=Javier Guisández|date=20 June 1998|title=The Law of Air Warfare|journal=International Review of the Red Cross|volume=nº 323|pages=347-63|url=http://www.icrc.org/eng/resources/documents/misc/57jpcl.htm}}</ref>
+
"[[Counter-terror drills]]" provide cover for activities as suspect as placing live [[explosives]] in a [[school]] bus.<ref>https://www.yahoo.com/news/cia-leaves-explosives-school-bus-training-exercise-172712978.html</ref> Many high profile terror attacks are near simultaneous with such drills (for example, [[9-11/Drills|9-11]] and [[7 July 2005 London bombings/Drills|7-7]]). Rogue employees can easily make the decision to make these drills "go live" if they deem conditions favourable, for example by remote detonation of bombs unbeknownst to other participants.
  
==Land warfare==
+
=== Fallback strategies ===
  
In land warfare, the use of a false flag is similar to that of naval warfare. The most widespread assumption is that this practice was first established under international humanitarian law at the trial in 1947 of the planner and commander of Operation Greif, Otto Skorzeny, by the military court at the Dachau Trials. In this trial, the court did not find Skorzeny guilty of a crime by ordering his men into action in American uniforms. He had passed on to his men the warning of German legal experts, that if they fought in American uniforms, they would be breaking the laws of war, but they probably were not doing so just by wearing the uniform. During the trial, a number of arguments were advanced to substantiate this position and the German and U.S. military seem to have been in agreement on it. In the transcript of the trial<ref>Source: Law Reports of Trials of War Criminals. United Nations War Crimes Commission. [http://www.ess.uwe.ac.uk/WCC/skorzeny.htm Vol. IX, 1949: Trial of Otto Skorzeny and others] General Military Government Court of the U.S. zone of Germany August 18 to September 9, 1947</ref> it is mentioned that Paragraph 43 of the Field Manual published by the War Department, United States Army, on October 1, 1940, under the title "Rules of Land Warfare", says:
+
False flags are usually designed with many contingency (fallback) strategies to thwart subsequent investigation by allowing the perpetrators to choose from a maze of {{on}}s and [[Official_opposition_narratives|''opposition'' narratives]] according to how events pan out. Additional countermeasures such as [[assassination]] or [[blackmail]] of [[whistleblower]]s, [[witness]]es or [[journalist]]s are sometimes used to try to preserve secrecy, but these counter-strategies have risks of their own. Exploitation of the target population's psychological weaknesses (such as people's [[fear]], [[naivety]], [[just world bias]], [[cognitive dissonance]] and [[conditioning]]) is an essential part of the effort to minimize the proportion of people who uncover the deception.
  
::"National flags, insignias and uniforms as a ruse - in practice it has been authorized to make use of these as a ruse. The foregoing rule (Article 23 of the Annex of the IVth Hague Convention (1899 and 1907), does not prohibit such use, but does prohibit their improper use. It is certainly forbidden to make use of them during a combat. Before opening fire upon the enemy, they must be discarded".
+
== Psychology ==
 +
{{FA|Psychology}}
 +
{{YouTubeVideo
 +
|code= UGwSLcuMQD0
 +
|width=325px
 +
|caption= "How to Create a False Flag in 10 Easy Steps" - [https://www.bitchute.com/video/WLmPiNygSoi7/ Bitchute backup]
 +
}}
  
:Also The American Soldiers' Handbook, was quoted by Defense Counsel and says:
+
The [[psychology]] of the the targets of terror (the general public) has been extensively studied by "[[terror experts]]", who have gradually refined the process of how to most successfully tell the "[[big lie]]". Terror drills have been used to condition people, for example stoking [[Islamophobia]].<ref>http://www.huffingtonpost.com/2015/01/02/india-police-muslim-drills_n_6406648.html</ref>
  
::"The use of the enemy flag, insignia, and uniform is permitted under some circumstances. They are not to be used during actual fighting, and if used in order to approach the enemy without drawing fire, should be thrown away or removed as soon as fighting begins".
+
=== Public Awareness ===
  
The outcome of the trial has been codified in the 1977 ''Protocol Additional to the Geneva Conventions of 12 August 1949'' (Protocol I):
+
[[image:chartoftheday_11551_americans_top_fears_of_2017_n.jpg|left|500px|thumbnail|Evidence of an increasing failure of "[[terrorism]]" to scare people - and of increasing distrust of the {{on}} - was provided by a 2017 survey of the attitudes of 1207 US adults, which revealed their greatest fear to be "corrupt government officials".<ref name=statista>https://www.statista.com/chart/11551/americans-top-fears-of-2017/</ref>]]
  
Article 37.-Prohibition of perfidy
+
[[Washington's Blog]] reported in April 2013, after the [[Boston Marathon Bombing]] that interest in False Flag attacks was at an all time high, citing data from [[Google Trends]]. In 2017, a survey showed that "[[terrorism]]" was not among US citizens top 20 fears, and that #1 was "corrupt government officials" - with almost 3/4 of people either "afraid" or "very afraid".<ref name=statista/>
 +
[[image:false_flag_google_trends.png|left|430px|thumbnail|The dramatic spike in searches for "false flag" in April 2013, when the [[Boston Marathon bombings]] did occur.]] The geographical data showed that searches were being made on the term especially in [[USA]], [[Canada]], [[UK]], [[Malaysia]], [[Australia]] and [[Germany]]:<br/>
  
:1. It is prohibited to kill, injure, or capture an adversary by resort to perfidy. Acts inviting the confidence of an adversary to lead him to believe that he is entitled to, or is obliged to accord, protection under the rules of international law applicable in armed conflict, with intent to betray that confidence, shall constitute perfidy. The following acts are examples of perfidy:
+
[[image:false_flag_google_trends_geography.jpg|left|290px|thumbnail]]
  
:(a) The feigning of an intent to negotiate under a flag of truce or of a surrender;
+
=== September 11th, 2001 ===
 +
{{FA|9-11}}
  
:(b) The feigning of an incapacitation by wounds or sickness;
+
Although widely effective at the time, 9/11 changed the dynamics of false flags because after nearly 15 years of mostly online activism by the [[9/11 Truth movement]] have lead to its being widely doubted. A 2015 survey, for example, found that 33% of [[Canadian]]s were in favor of a Parliamentary review of the [[9/11 Commission Report]], with 26% neither for nor against, and only 19% opposed.<ref>http://www.army.mod.uk/documents/general/2015DIN07-111.pdf</ref><ref>http://rethink911.ca/wp-content/uploads/2015/02/ReThink911Petition_Response.pdf</ref> This has lead to a new emphasis on [[internet censorship]] and the removal of [[freedom of speech]] (notably in France in 2015) as ways to try to prevent the unmasking of false flags attacks.
  
:(c) The feigning of civilian, non-combatant status; and
+
== Selected Recent Examples ==
 +
The most active perpetrators of false flag attacks are believed to be the intelligence agencies of US, UK and Israel.<ref>Chris Bollyn. {{where}}</ref> [[Operation Gladio]] is a good place to start in study of recent examples, since it is relatively well documented and believed to underpin a range of more modern developments (such as [[Operation Gladio/B]]).
  
:(d) The feigning of protected status by the use of signs, emblems or uniforms of the United Nations or of neutral or other States not Parties to the conflict.
+
=== 1945? - ? Operation Gladio ===
 +
{{FA|Operation Gladio}}
  
:2. Ruses of war are not prohibited. Such ruses are acts which are intended to mislead an adversary or to induce him to act recklessly but which infringe no rule of international law applicable in armed conflict and which are not perfidious because they do not invite the confidence of an adversary with respect to protection under that law. The following are examples of such ruses: the use of camouflage, decoys, mock operations and misinformation.
+
[[image:Bologna1.jpg|thumb|right|380px|The remains of the Bologna Central Station in August 1980 after an [[Operation Gladio]] bomb killed 85 civilians.]]
  
Article 38.-Recognized emblems
+
This was a large operation in many European countries which is still only partially understood. It was most clearly revealed in Italy, after bomb attacks which killed hundreds of civilians were eventually admitted to have been carried out by a team established by [[NATO]] and the [[CIA]]. This operation quite probably gave rise to the [[Turkish deep state]]. The program has continued and expanded internationality and codenamed [[Operation Gladio B|Gladio B]].
  
:1. It is prohibited to make improper use of the distinctive emblem of the red cross, red crescent or red lion and sun or of other emblems, signs or signals provided for by the Conventions or by this Protocol. It is also prohibited to misuse deliberately in an armed conflict other internationally recognized protective emblems, signs or signals, including the flag of truce, and the protective emblem of cultural property.
+
=== 1954 Lavon Affair ===
 +
{{FA|Lavon Affair}}
  
:2. It is prohibited to make use of the distinctive emblem of the United Nations, except as authorized by that Organization.
+
In 1954, [[Israel]] used [[Egyptian]] [[Jews]] as a fifth-column to attack US and UK-owned targets in Cairo and Alexandria. In 1954, one such saboteurs was caught planting a bomb. Israel blamed "[[antisemitism]]" in Egypt for the accusations and anyone who dared repeat them, silencing almost all western comment. However, it finally ended five decades of denial in 2005, presenting official citations to surviving agents, saying: "This is historic justice for those who were sent on a mission on behalf of the state and became the victims of a complex political affair."<ref>[http://www.ynetnews.com/Ext/Comp/ArticleLayout/CdaArticlePrintPreview/1,2506,L-3065838,00.html#n "After half a century of reticence and recrimination], Israel ... honored ... agents-provocateur." YNetNews, 30th March 2005.</ref>
  
Article 39.-Emblems of nationality
+
The motive is still not entirely clear, though Israel wished to induce the British government to retain its occupying troops in Egypt's Suez Canal zone. Israel also urgently needed manpower to work and defend the land it had seized in 1948, so inducing "anti-semitism", pogroms and expulsions of Jews was to their advantage. The Wikipedia article on the [[Lavon Affair]] is detailed and largely complete, but it claims that the affair was "disastrous for Israel in several ways" - while omitting the serious effects on Egypt and Egyptian Jews.
  
:1. It is prohibited to make use in an armed conflict of the flags or military emblems, insignia or uniforms of neutral or other States not Parties to the conflict.
+
=== 1967 USS Liberty Incident ===
 +
{{FA|USS Liberty Incident}}
  
:2. It is prohibited to make use of the flags or military emblems, insignia or uniforms of adverse Parties while engaging in attacks or in order to shield, favour, protect or impede military operations.
+
[[Image:USS-Liberty-damaged.jpg|380px|right]]
  
:3. Nothing in this Article or in Article 37, paragraph 1 ( d ), shall affect the existing generally recognized rules of international law applicable to espionage or to the use of flags in the conduct of armed conflict at sea.
+
The [[Israel]]i attack on the USS Liberty illustrates what can happen when false flag attacks fail. Had the USS Liberty been actually sunk according to plan, Israel might have succeeded in plausibly denying culpability. As it was, the survivors report the planes as Dassault Mirage IIIs and Super-Mystere jets, which could only have been Israeli.<ref>[http://www.ifamericansknew.org/us_ints/ul-akins.html The Attack on the USS Liberty and its Cover-up] James Akins was U.S. ambassador to Saudi Arabia. The Center for Policy Analysis on Palestine, Annual Distinguished Lecture, September 1999. If Americans Knew.org.</ref> The torpedo boats were correctly marked as being Israeli. The survivors all state that the USS liberty was flying the US flag, rendering highly implausible the official Israeli narrative that "we made a mistake". Other evidence includes the lack of markings on the Israeli planes and the jamming of US distress frequencies to try to stop the ship radioing for help. A high level cover up and a subservient US [[corporate media]] prevented major repercussions at the time.
  
==As pretexts for war==
+
=== September 11<sup>th</sup> & Amerithrax ===
 +
{{FAs|9/11|2001 Anthrax attacks}}
  
In the 1931 Mukden incident, Japanese officers fabricated a pretext for annexing Manchuria by blowing up a section of railway. Six years later they falsely claimed the kidnapping of one of their soldiers in the Marco Polo Bridge Incident as an excuse to invade China proper.
+
[[Image:9-11-wtc-plane-hits.jpg|380px|right]]
  
In the Gleiwitz incident on August 31, 1939, Reinhard Heydrich made use of fabricated evidence of a Polish attack against Germany to mobilize German public opinion and to fabricate a false justification for a war with Poland. This, along with other false flag operations in Operation Himmler, would be used to mobilize support from the German population for the start of World War II in Europe.
+
On [[September 11, 2001]], an attack occurred in the eastern US which killed thousands of people. The US government asserted that it was perpetrated by [[19 Hijackers]] under direction of [[Al Qaeda]]. Numerous anomalies, such as the [[WTC7/collapse|collapse]] of [[WTC7 |WTC7, a third tower in the World Trade Center]] which was ''not'' hit by an aeroplane, suggest that this event was a false flag. Many eye-witnesses report that explosives were involved in all three tower collapses. [[FBI]] whistleblower [[Sibel Edmonds]] has revealed a U.S. intelligence alliance between [[al Qaeda]] starting in [[1997]] and ongoing to present time.  An attack was launched against the Pentagon, which was subject to a military stand down. The [[official narrative]] fails to explain the innumerable  deviations from [[standard operating procedure]] before, during and after the attacks. [[Wikipedia]] editors rapidly [[Wikipedia/Censorship|censor]] any evidence which contradicts the official narrative. The coverup was completed and sealed with the domestic terror [[2001 Anthrax attacks|Anthrax attacks]] that frightened all government and media into a non-critical silence and complicit compliance with the subsequent unleashing of global "[[counter-terrorism]]" policies and [[permanent war]]s.
  
In 1953, the U.S. and British-orchestrated Operation Ajax used "false-flag" and propaganda operations against the formerly democratically elected leader of Iran, Mohammed Mosaddeq. Information regarding the CIA-sponsored coup d'etat has been largely declassified and is available in the CIA archives.<ref>{{Cite journal
+
== Admitted False Flag Attacks ==
| title = All the Shah's Men: An American Coup and the Roots of Middle East Terror (U)
+
[[Nation state]]s rarely admit to carrying out False Flag attacks, even when clear evidence exists that is unaccounted for by any other version of events. Some recent attacks which have been admitted, from [[Wikipedia]]'s list of false flag attacks:
| journal = Journal of the American Intelligence Professional
 
|year=2003
 
| first = Stephen
 
| last = Kinzer
 
| coauthors = John Wiley and Sons
 
| volume = 48
 
| issue =
 
| pages=258
 
| id=
 
| url = https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no2/article10.html
 
| accessdate = 2007-02-04
 
}}</ref>
 
  
The planned, but never executed, 1962 Operation Northwoods plot by the U.S. Department of Defense for a war with Cuba involved scenarios such as fabricating the hijacking or shooting down passenger and military planes, sinking a U.S. ship in the vicinity of Cuba, burning crops, sinking a boat filled with Cuban refugees, attacks by alleged Cuban infiltrators inside the United States, and harassment of U.S. aircraft and shipping and the destruction of aerial drones by aircraft disguised as Cuban MiGs. These actions would be blamed on Cuba, and would be a pretext for an invasion of Cuba and the overthrow of Fidel Castro's communist government. It was authored by the Joint Chiefs of Staff, but then rejected by President John F. Kennedy. This later came to light through the Freedom of Information Act and was publicized by James Bamford.
+
* [[1978]] [[Celle Hole]] one bombing carried out by a West German secret service to further implicate the Red Army Faction, an active terrorist group. Revealed to be a not very serious (nobody hurt, no prison escape) case by the German government in 1986.
  
==Pseudo-operations==
+
* [[1970s]] In [[Italy]] right-wing elements are accused of carrying out various terrorist acts as part of a broader [[Strategy of tension]]. There do not appear to be any of the elements of a false-flag element, though the 1972 killing of three Italian police [[Peteano bombing]] blame was initially blamed on their ideological opponents, the [[Lotta Continua]] ("continuous struggle", far left extra-parliamentary organization). Officers of the carabinieri were later indicted and convicted for manipulating the investigation in false directions. An [[Ordine Nuovo]] ("New Order" far right Italian cultural and extra-parliamentary political and terrorist organization founded in 1956) member has been named as the bomber.
  
Pseudo-operations are those in which forces of one power disguise themselves as enemy forces.  For example, a state power may disguise teams of operatives as insurgents and, with the aid of defectors, infiltrate insurgent areas.<ref name="Cline">Cline, Lawrence E. (2005) ''Pseudo Operations and Counterinsurgency: Lessons from other countries'', Strategic Studies Institute, [http://www.blackwaterusa.com/btw2005/articles/080105counter.pdf read here]</ref> The aim of such pseudo-operations may be to gather short or long-term intelligence or to engage in active operations, in particular assassinations of important enemies. However, they usually involve both, as the risks of exposure rapidly increase with time and intelligence gathering eventually leads to violent confrontation. Pseudo-operations may be directed by military or police forces, or both. Police forces are usually best suited to intelligence tasks; however, military provide the structure needed to back up such pseudo-ops with military response forces. According to US military expert Lawrence Cline (2005), "the teams typically have been controlled by police services, but this largely was due to the weaknesses in the respective military intelligence systems."
+
* [[1970s]] the [[CIA]] [[Project Cherry]]<ref>http://onwardoverland.com/Far_East/cambodianarticles/ciacambodia.html saved at [https://web.archive.org/web/20201213153332/http://onwardoverland.com/Far_East/cambodianarticles/ciacambodia.html Archive.org] saved at [https://archive.is/Ltvmv Archive.is]</ref> is described in [[Wikipedia]] as: "Covert [[assassination]] / [[destabilization]] operation during [[Vietnam war]], targeting Prince (later King) [[Norodom Sihanouk]] and the government of [[Cambodia]]. Disbanded."<ref>http://archive.today/2019.06.16-055612/https://en.wikipedia.org/wiki/CIA_cryptonym</ref> The operation has no seperate article as of 12/[[2020]].
 +
{{YouTubeVideo
 +
|code= -43pjRwkVMU
 +
|caption= '''''False Flags and the Dawn of Bioterrorism''''' (29:08) a 2020 short documentary by [[James Corbett]],<ref name=BioterrorAndTranscript>[https://www.corbettreport.com/bioterror/ Episode 388 – False Flags and the Dawn of Bioterrorism [[The Corbett Report]]</ref><ref name=BioterrorYouTube>[https://www.youtube.com/watch?v=-43pjRwkVMU False Flags and the Dawn of Bioterrorism] [[The Corbett Report]] 2020-11-20</ref> a contextual history and critical overview of the threat of the military industrial biological [[technocracy]] and their duplicitous "defensive" threat to humanity.
 +
" ''For the past twenty years, the world has been in the midst of a so-called "war on terror" set in motion by a false flag attack of spectacular proportions. Now the stage is being set for a new spectacular attack to usher in the next stage in that war on terror: the war on bioterrorism. But who are the real bioterrorists? And can we rely on government agencies, their appointed health authorities, and the corporate media to accurately identify those terrorists in the wake of the next spectacular terror attack?'' "
 +
|align=right
 +
}}
 +
* [[1962]] [[Operation Northwoods]] was a series of proposals for false-flag attacks, blaming [[Cuba]] for attacks carried out on US people/assets rejected by the Kennedy administration. In the same year [[Operation Mongoose]] was 12 proposals devised by the Department of Defense and against the same target. [[James Bamford]] wrote in his well-cited 2002 book "Body of secrets" that Northwoods "had the written approval of the Chairman and every member of the [[Joint Chiefs of Staff]]".
  
The State Political Directorate (OGPU) of the Soviet Union set up such an operation from 1921 to 1926. During Operation Trust, they used loose networks of White Army supporters and extended them, creating the pseudo-"Monarchist Union of Central Russia" (MUCR) in order to help the OGPU identify real monarchists and anti-Bolsheviks.
+
* [[1953]] [[Operation Ajax]] and [[Operation Boot]] were covert operations to overthrow the [[Prime Minister of Iran]] and replace him with the Shah.
  
An example of a successful assassination was United States Marine Sergeant Herman H. Hanneken leading a patrol of his Haitian Gendarmerie disguised as enemy guerrillas in 1919. The Patrol successfully passed several enemy checkpoints in order to assassinate the guerilla leader Charlemagne Péralte near Grande-Rivière-du-Nord.  Hanneken was awarded the Medal of Honor and was commissioned a Second Lieutenant for his deed.
+
* [[1944]] [[Panzer Brigade 150]] wore American uniforms as they attempted to seize bridges ahead of the Ardennes Offensive, a German counter-attack. Their success was slight though the tactic caused the Americans great alarm. A Wikipedia article on the "Kommandoverband Jaguar German army unit" was deleted when it was discovered to have been largely taken from (and hence a copyright violation of) an article on a Russian web-site [http://beute.narod.ru/Beutepanzer/su/t-34/t-34-85/t-34_85_jaguar.htm here], claiming that Germans in Russian uniforms spent 6 hours in Soviet occupied territory. It is unclear whether this is a true false-flag attack/operation (as intended at both Wikipedia and Wikispooks). It is known that SOE agents sometimes wore German uniforms behind enemy lines and, in 1944, German soldiers were sometimes wearing the better-quality American uniforms. Debatable false-flag, treated here as covert.
  
During the Mau Mau uprising in the 1950s, captured Mau Mau members who switched sides and specially trained British troops initiated the pseudo-gang concept to successfully counter Mau Mau. In 1960 Frank Kitson, (who was later involved in the Northern Irish conflict and is now a retired British General), published ''Gangs and Counter-gangs'', an account of his experiences with the technique in Kenya; information included how to counter gangs and measures of deception, including the use of defectors, which brought the issue a wider audience.
+
* [[1939]] The [[Gleiwitz incident]] in which Germans dressed as Polish briefly seize a German radio station. They briefly broadcast in Polish and left behind the body of a freshly murdered German Silesian known to have been sympathetic to Poles. Genuine false-flag. Pretext for the German invasion of Poland, [[official narrative|official]] start of [[WWII]].  
  
Another example of combined police and military oversight of pseudo-operations include the Selous Scouts in former country Rhodesia (current Zimbabwe), governed by white minority rule until 1980. The Selous Scouts were formed at the beginning of Operation Hurricane, in November 1973, by Major (later Lieutenant Colonel) Ronald Reid-Daly. As all Special Forces in Rhodesia, by 1977 they were controlled by COMOPS (Commander, Combined Operations) Commander Lieutenant General Peter Walls. The Selous Scouts were originally composed of 120 members, with all officers being white and the highest rank initially available for Africans being colour sergeant. They succeeded in turning approximately 800 insurgents who were then paid by Special Branch, ultimately reaching the number of 1,500 members. Engaging mainly in long-range reconnaissance and surveillance missions, they increasingly turned to offensive actions, including the attempted assassination of ZIPRA leader Joshua Nkomo in Zambia. This mission was finally aborted by the Selous Scouts, and attempted again, unsuccessfully, by the Rhodesian Special Air Service.<ref>Cline (2005), p. 11.</ref>
+
* 1939 The [[Shelling of Finland]] by Joseph Stalin and USSR in order to get pretext for a war of aggression named the [[Winter War]].
  
Some offensive operations attracted international condemnation, in particular the Selous Scouts' raid on a ZANLA (Zimbabwe African National Liberation Army) camp at Nyadzonya Pungwe, Mozambique in August 1976. ZANLA was then led by Josiah Tongogara. Using Rhodesian trucks and armored cars disguised as Mozambique military vehicles, 84 scouts killed 1,284 terrorists in the camp, the camp was registered as a refugee camp by the United Nations (UN). Even according to Reid-Daly, most of those killed were unarmed guerrillas standing in formation for a parade. The camp hospital was also set ablaze by the rounds fired by the Scouts, killing all patients.<ref>Cline (2005), quoting Reid-Daly, ''Pamwe Chete: The Legend of the Selous Scouts'', Weltevreden Park, South Africa: Covos-Day Books, 1999, p. 10 (republished by Covos Day, 2001, ISBN 978-1919874333)</ref> According to David Martin and Phyllis Johnson, who visited the camp shortly before the raid, it was only a refugee camp that did not host any guerrillas. It was staged for UN approval.<ref>Cline (2005), who quotes David Martin and Phyllis Johnson, ''The Struggle for Zimbabwe: the Chimurenga War'', New York: Monthly Review Press, 1981, pp. 241-242.</ref>
+
* [[1933]] The [[Reichstag Fire]] was Hitler's pretext for suspending the Weimar Constitution and could have been false flag. Historians disagree as to whether Van der Lubbe acted alone or whether the arson was planned and ordered by the Nazis.
  
According to a 1978 study by the Directorate of Military Intelligence, 68% of all insurgent deaths inside Rhodesia could be attributed to the Selous Scouts, who were disbanded in 1980.<ref>Cline (2005), p. 8-13. For 1978 study, quotes J. K. Cilliers, ''Counter-insurgency in Rhodesia'', London: Croom Helm, 1985, pp. 60-77. Cline also quotes Ian F. W. Beckett, ''The Rhodesian Army: Counter-Insurgency 1972-1979'' at [http://members.tripod.com/selousscouts/ selousscouts]</ref>
+
== See Also ==
 +
*[[:Category:False Flag]] - The category of false flag attack pages
  
If the action is a police action, then these tactics would fall within the laws of the state initiating the pseudo, but if such actions are taken in a civil war or during a belligerent military occupation then those who participate in such actions would not be privileged belligerents. The principle of plausible deniability is usually applied for pseudo-teams. (See the above section Laws of war). Some false flag operations have been described by Lawrence E. Cline, a retired US Army intelligence officer, as pseudo-operations, or "the use of organized teams which are disguised as guerrilla groups for long- or short-term penetration of insurgent-controlled areas."
+
{{SMWDocs}}
 +
== References ==
  
Pseudo Operations should be distinguished, notes Cline, from the more common police or intelligence infiltration of guerrilla or criminal organizations. In the latter case, infiltration is normally done by individuals. Pseudo teams, on the other hand, are formed as needed from organized units, usually military or paramilitary. The use of pseudo teams has been a hallmark of a number of foreign counterinsurgency campaigns."<ref name="Cline"/>
 
 
==Espionage==
 
 
In espionage the term "false flag" describes the recruiting of agents by operatives posing as representatives of a cause the prospective agents are sympathetic to, or even the agents' own government.  For example, during the Cold War, several female West German civil servants were tricked into stealing classified documents by agents of the East German ''Stasi'' intelligence service, pretending to be members of West German peace advocacy groups (the ''Stasi'' agents were also described as "Romeos," indicating that they also used their sex appeal to manipulate their targets, making this operation a combination of the false flag and "honey trap" techniques).<ref>{{Cite news|first=Angus|last=Crawford|coauthors= |title=Victims of Cold War 'Romeo spies'|work=BBC Online|page= |date=Friday, 20 March 2009|accessdate=10 April 2009 |quote= |url=http://news.bbc.co.uk/1/hi/world/europe/7953523.stm}}</ref>
 
 
The technique can also be used to expose enemy agents in one's own service, by having someone approach the suspect and pose as an agent of the enemy.  Earl Edwin Pitts, a 13-year veteran of the FBI and an attorney, was caught when he was approached by FBI agents posing as Russian agents.
 
 
{{Rquote|right|It was obvious that if the case were to be kept going a faked act of sabotage would have to be committed| MI5 file on Mutt and Jeff (spies)<ref>[http://news.bbc.co.uk/1/hi/uk/2522115.stm "Britain 'bombed itself to fool Nazis'"] BBC. 2002-02-28</ref>}}
 
 
British intelligence officials in World War II allowed double agents to fire-bomb a power station and a food dump in the UK to protect their cover, according to declassified documents. The documents stated the agents took precautions to ensure they did not cause serious damage. One of the documents released also stated: "It should be recognised that friends as well as enemies must be completely deceived."<ref name='R000001'>{{Cite news| first= | last= | coauthors= | title=Britain 'bombed itself to fool Nazis' | date= 2002-02-28 | publisher= | url =http://news.bbc.co.uk/1/hi/uk/2522115.stm | work =BBC | pages = | accessdate = 2008-11-04 | language = }}</ref>
 
 
==Dirty War==
 
 
During a 1981 interview whose contents were revealed by documents declassified by the CIA in 2000, former CIA and DINA agent Michael Townley explained that Ignacio Novo Sampol, member of CORU, an anti-Castro organization, had agreed to commit the Cuban Nationalist Movement in the kidnapping, in Buenos Aires, of a president of a Dutch bank. The abduction, organized by civilian SIDE agents, the Argentine intelligence agency, was to obtain a ransom. Townley said that Novo Sampol had provided six thousand dollars from the Cuban Nationalist Movement, forwarded to the civilian SIDE agents to pay for the preparation expenses of the kidnapping. After returning to the US, Novo Sampol sent Townley a stock of paper, used to print pamphlets in the name of "''Grupo Rojo''" (Red Group), an imaginary Argentine Marxist terrorist organization, which was to claim credit for the kidnapping of the Dutch banker. Townley declared that the pamphlets were distributed in Mendoza and Córdoba in relation with false flag bombings perpetrated by SIDE agents, which had as their aim to accredit the existence of the fake Grupo Rojo. However, the SIDE agents procrastinated too much, and the kidnapping ultimately was not carried out.<ref>[http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB8/ch02-09.htm Visit by Guillermo Novo Sampol to Chile in 1976, 1] and [http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB8/ch02-10.htm 2], on the National Security Archive website</ref>
 
 
==Not-state operatives, terrorism==
 
 
False flag tactics were also employed during the Algerian civil war, starting in the mid-1994. Death squads composed of DRS (Département du Renseignement et de la Sécurité) security forces disguised themselves as Islamist terrorists and committed false flag terror attacks. Such groups included the OJAL (Organisation of Young Free Algerians) or the OSSRA (Secret Organisation for the safeguard of the Algerian Republic)<ref>Lounis Aggoun and Jean-Baptiste Rivoire (2004). ''Françalgérie, crimes et mensonges d’Etats'', (Franco-Algeria, Crimes and Lies of the States). Editions La Découverte. ISBN 2-7071-4747-8. Extract in English with mention of the OJAL [http://www.algeria-watch.org/en/analyses/ojal.htm available here].</ref> According to Roger Faligot and Pascal Kropp (1999), the OJAL reminded of "the Organization of the French Algerian Resistance (ORAF), a group of counter-terrorists created in December 1956 by the Direction de la surveillance du territoire (Territorial Surveillance Directorate) whose mission was to carry out terrorist attacks with the aim of quashing any hopes of political compromise." <ref>Luonis Aggoun and Jean-Baptiste Rivoire, ''ibid.'', quoting Roger Faligot and Pascal KROP, ''DST, Police Secrète'', Flammarion, 1999, p. 174.</ref>
 
 
The Russian apartment bombings in the Russian cities of Buynaksk, Moscow and Volgodonsk in September 1999 which killed nearly 300 people, was described by Yury Felshtinsky, Alexander Litvinenko, David Satter, Boris Kagarlitsky, Vladimir Pribylovsky, Anna Politkovskaya,  filmmaker Andrei Nekrasov, investigator Mikhail Trepashkin, Russian politician Alexander Lebed as a false flag attack coordinated by the Federal Security Service, the main domestic security agency of the Russian Federation.<ref name="Kagarlitsky">[http://www.independent.co.uk/news/world/europe/russia-planned-chechen-war-before-bombings-727324.html ''Boris Kagarlitsky, a member of the Russian Academy of Sciences Institute of Comparative Politics, writing in the weekly Novaya Gazeta, says that the bombings in Moscow and elsewhere were arranged by the GRU'']</ref><ref>[http://www.hudson.org/files/publications/SatterHouseTestimony2007.pdf David Satter - House committee on Foreign Affairs]</ref><ref>Harvnb, Felshtinsky, Pribylovsky. 2008 pp=105-111</ref><ref>[youtube|PnkYo9TuBIQ ''In Memoriam Aleksander Litvinenko''] Jos de Putter, Tegenlicht documentary VPRO 2007, Moscow, 2004 Interview with Anna Politkovskaya</ref><ref>[http://asiapacific.amnesty.org/library/Index/ENGEUR460122006?open&of=ENG-2EU Russian Federation: Amnesty International's concerns and recommendations in the case of Mikhail Trepashkin - Amnesty International]</ref><ref>[http://articles.latimes.com/1999/sep/10/news/mn-8677 Bomb Blamed in Fatal Moscow Apartment Blast], Richard C. Paddock, Los Angeles Times, September 10, 1999</ref><ref>[http://web.archive.org/web/2000/http://www.cnn.com/WORLD/europe/9909/10/russia.explosion.03/ At least 90 dead in Moscow apartment blast], from staff and wire reports, CNN, September 10, 1999</ref><ref>Harvnb, Evangelista, 2002 p=81</ref><ref>[http://findarticles.com/p/articles/mi_m1571/is_14_16/ai_61892243/print Did Putin's Agents Plant the Bombs?], Jamie Dettmer, Insight on the News, April 17, 2000.</ref><ref>’’The consolidation of Dictatorship in Russia’’ by Joel M. Ostrow, Georgil Satarov, Irina Khakamada p.96</ref><ref>[http://mccain.senate.gov/public/index.cfm?FuseAction=PressOffice.PressReleases&ContentRecord_id=f4f5cf0c-9104-4b3f-8ebe-84f3dc24c51b&Region_id=&Issue_id=9a9181ea-b7c5-4e6a-845f-5824c7b23939 McCain decries "New authoritarianism in Russia"], November 4, 2003</ref>
 
 
On the night of February 27, 1933, the Reichstag building was set on fire. At the urging of Hitler, Hindenburg responded the next day by issuing an emergency decree "for the Protection of the people and the State," which stated: "Restrictions on personal liberty, on the right of free expression of opinion, including freedom of the press; on the rights of assembly and association; and violations of the privacy of postal, telegraphic and telephonic communications and warrants for house searches, orders for confiscations as well as restrictions on property, are also permissible beyond the legal limits otherwise prescribed." The question of who actually started the Reichstag fire is still unknown and occasionally debated.
 
 
==Elections==
 
 
In 2008 there was a shooting against two minibuses driving along in a volatile area right on the border between Abkhazia and the republic of Georgia. The buses were carrying Georgians who lived in Abkhazia and wanted to cross the border so they could go and vote in the parliamentary election that day.
 
 
The country had been experiencing internal political turmoil for the last year, and in an attempt to calm the situation, president Mikheil Saakashvili moved forward both presidential and parliamentary elections. However the presidential election in January that year was strongly contested, with hundreds of thousands attending protest rallies. When the parliamentary election came up in May, the mood was still tense.
 
 
On mid day May 21 the two minibuses came under attack with small arms and grenades, and though there were no casualties, three people were taken to a hospital in Zugdidi, where president Saakashvili later arrived and was filmed by TV at the patients's bedside.
 
 
In his comments on TV, which dominated the news during election day, Saakashvili indicated that the attack had been an attempt to disrupt the election, implying that it had been Abkhaz or Russian forces who had been behind it. This provided for a favorable opportunity for the president to focus the nation's attention on an external enemy, thereby leading attention away from his domestic critics, as well as making use of his position as leader to rally the Georgians around his candidates in the election.
 
 
However a United Nations investigation<ref name=unsc0723>{{cite web
 
|url=http://daccess-ods.un.org/access.nsf/Get?Open&DS=S/2008/480&Lang=E&Area=UNDOC
 
|title=Report of the Secretary-General on the situation in Abkhazia, Georgia
 
|publisher=United Nations Security Council
 
|date=2008-07-23
 
|accessdate = 2008-08-21
 
}} </ref> later found, based on empty cartridges and the position of traces left by grenade launchers on the ground, that the attack had originated from a patch of land under control of Georgians and with weapons used by Georgian forces, indicating that the attack had been staged.
 
 
A Georgian investigative TV documentary later found that camera crew from the government-friendly channel Rustavi 2 had been in position with their equipment before the shooting took place.
 
 
==Civilian usage==
 
 
While false flag operations originate in warfare and government, they also can occur in civilian settings among certain factions, such as businesses, special interest groups, religions, political ideologies and campaigns for office.
 
 
===Businesses===
 
 
In business and marketing, similar operations are being employed in some public relations campaigns (see Astroturfing). Telemarketing firms practice false flag type behavior when they pretend to be a market research firm (referred to as "sugging").  In some rare cases, members of an unsuccessful business will destroy some of their own property to conceal an unrelated crime (e.g. safety violations, embezzlement, etc.) but make it appear as though the destruction was done by a rival company.
 
 
===Political campaigning===
 
 
Political campaigning has a long history of this tactic in various forms, including in person, print media and electronically in recent years. This can involve when supporters of one candidate pose as supporters of another, or act as "Straw man|straw men" for their preferred candidate to debate against. This can happen with or without the candidate's knowledge. The Canuck letter is an example of one candidate creating a false document and attributing it as coming from another candidate in order to discredit that candidate.
 
 
In 2006, individuals practicing false flag behavior were discovered and "outed" in New Hampshire<ref>Steele, Allison, [http://www.concordmonitor.com/apps/pbcs.dll/article?AID=/20060926/REPOSITORY/609260344/1219/48HOURS "''Bass staffer in D.C. poses as blogger: Bogus posts aimed at his political opponent''"], Concord Monitor, September 26, 2006 (URL last accessed October 24, 2006).</ref><ref>Saunders, Anne, [http://www.boston.com/news/local/new_hampshire/articles/2006/09/26/rep_bass_aide_posed_as_opponents_supporter_on_blogs/ ''"Bass aide resigns after posing as opponent's supporter online"''], The Boston Globe, September 26, 2006 (URL last accessed October 24, 2006).</ref> and New Jersey<ref>Miller, Jonathan, [http://select.nytimes.com/gst/abstract.html?res=FA0712FD3A550C728EDDA00894DE404482 ''"Blog Thinks Aide to Kean Posted Jabs At Menendez"''], New York Times, September 21, 2006 (URL last accessed October 24, 2006).</ref> after blog comments claiming to be from supporters of a political candidate were traced to the IP address of paid staffers for that candidate's opponent.
 
 
On February 19, 2011, Indiana Deputy Prosecutor Carlos Lam sent a private email to Wisconsin Governor Scott Walker suggesting that he run a "'false flag' operation" to counter the protests against Walker's proposed restrictions on public employees' collective bargaining rights.
 
 
"If you could employ an associate who pretends to be sympathetic to the unions' cause to physically attack you (or even use a firearm against you), you could discredit the unions," read the email. It went on to say that the effort "would assist in undercutting any support that the media may be creating in favor of the unions."  The press had acquired a court order to access all of Walker's emails and Lam's email was exposed.  At first, Lam vehemently denied it, but eventually admitted it and resigned.<ref>[http://www.cbsnews.com/8301-503544_162-20047130-503544.html Indiana prosecutor resigns for encouraging fake attack on Wisconsin governor] CBS News March 25, 2011</ref>
 
 
===Ideological===
 
 
Political or religious ideologies have sometimes used false flag tactics. In retaliation for writing ''The Scandal of Scientology'', the Church of Scientology stole stationery from author Paulette Cooper's home and then used that stationery to forge bomb threats and have them mailed to a Scientology office. The Guardian's Office also had a plan for further operations to discredit Cooper known as Operation Freakout, but several Scientology operatives were arrested in a separate investigation and the plan failed.<ref>United States of America v. Jane Kember, Morris Budlong, Sentencing Memorandum; pp. 23-25.</ref>
 
 
==See also==
 
'''Concepts:'''
 
* Black propaganda
 
* Casus belli
 
* Covert operation
 
* Front organization
 
* Inside job
 
* Joe job, a similar online concept
 
* Mimicry
 
* State terrorism
 
 
'''Examples:'''
 
 
* ''Bloed, Bodem, Eer en Trouw'' (Flemish neo-Nazi group preparing false flag attacks)
 
* Bologna massacre
 
* Canuck letter
 
* Celle Hole
 
* CIA Operation Ajax (USA overthrowing of Mohammed Mossadeq, Prime Minister of Iran, in 1953)
 
* CIA Operation Northwoods was a Plan to blame Cuba for a Terrorist attack in order to get a pretext for 'justified' War of aggression after USA funded and organized failed Terrorist attack known as CIA Operation Mongoose.
 
* CIA PBSUCCESS ([USA]) Operation for overthrowing the Arbenz government in Guatemala in 1954
 
* CIA Project Cherry (USA non-stop assassination project to kill Norodom Sihanouk, Prince, and later King of Cambodia)
 
* Gleiwitz incident - 3rd Reich Nazis Operation Himmler in order to get pretext for 'justified' war of aggression against Poland with USSR day after that - named Fall Weiß
 
* Kommandoverband Jaguar German army unit conducting deep reconnaissance in Soviet uniforms
 
* Lavon Affair Israeli attempt to plant bombs in Western targets in Egypt, in blaming Arab elements
 
* Marxist-Leninist Party of the Netherlands (fake party set up by the Dutch security service)
 
* Masada Action and Defense Movement ("Zionist" group bombing Arab targets in France, really French white supremacists)
 
* Operation Jaque
 
* Reichstag Fire, which led to the Reichstag Fire Decree which suspended the Weimar Constitution until the end of the Third Reich
 
* Shelling of Mainila by Joseph Stalin and USSR in order to get pretext for 'justified' war of aggression named Winter War
 
* SIS (MI6) Operation Boot (UK Operation for overthrowing of Mohammed Mossadeq, Prime Minister of Iran, in 1953 with Americans)<ref>[http://www.garretwilson.com/books/reviews/alltheshahsmen.html Garretwilson.com]</ref>
 
* Special Activities Division
 
* The Plaza Miranda Bombings in the Philippines, which led to Ferdinand Marcos's suspension of the writ of habeas corpus.
 
* The strategy of tension in Italy during the 1970s, when right-wing Italian, Spanish, Greek, and CIA agents caused various terrorist acts in Italy, which were publicly laid to Communist terrorist groups that were actually fakes, and to the Red Brigades who were actually innocent of these particular crimes
 
 
==Notes==
 
 
{{Reflist|2}}
 
{{Reflist|2}}
  
{{DEFAULTSORT:False Flag}}
+
[[Category:False Flag| ]]
[[Category:False flag operations]]
 
[[Category:Intelligence operations]]
 
[[Category:Diversionary tactics]]
 
[[Category:Propaganda techniques]]
 
[[Category:Psychological warfare techniques]]
 
[[Category:Laws of war]]
 
[[Category:Piracy]]
 
[[Category:Deception]]
 

Latest revision as of 23:29, 10 December 2023

False flag attacks are actions carried out in ways calculated to deceive the victim as to the nature of the perpetrator. Historically, these often involved flying literal flags, e.g. from a ship, or wearing uniforms. The procedure has been used as a standard way to try to justify starting a war. Most recently, perhaps the most common false flag in Western nations have been bombs attacks blamed on Muslims designed to fuel fear and promote the "war on terror".

Concept.png False flag Glossary.png 
(Deep event,  Psyop,  Third rail topic)Rdf-entity.pngRdf-icon.png 4
False-flag-pic.jpg
Interest of• Nafeez Mosaddeq Ahmed
• Sandra Barr
• Kevin Barrett
• 'Burning Blogger of Bedlam'
• Amy Baker Benjamin
• Christopher Bollyn
• James Corbett
• Bonnie Faulkner
• James Fetzer
• Robert S. Finnegan
• Allan Francovich
• Guns And Butter
• Patrick Henningsen
• Intellihub
• Caitlin Johnstone
• Frank Kitson
• Thierry Meyssan
• Steve Pieczenik
• Fletcher Prouty
• Michael Rivero
• Paul Craig Roberts
• Ralph Schoenman
• Bernie Suarez
• Webster Tarpley
• The Corbett Report
• The Truthseeker
• James Tracy
• Unwelcome Guests
• William Walker
• Washington's Blog
• What Really Happened
• WinterWatch
• Gerhard Wisnewski
• Karel van Wolferen
False flags are attacks intended to blame a third party. Since a 1979 conference in Jerusalem, the most common pattern in the West has been bomb attacks which authorities and the commercially-controlled media quickly blame on suicidal Muslims, promoting an overarching "war on terror" narrative, that promotes fear and is used to concoct casus bellis as needed.

A False flag attack (or false flag operation) is an act committed with the intent of disguising the actual source of responsibility and pinning blame on another party. An attack on a target will appear to be done by an enemy, but this enemy is aided and the attack is often organised by the attacked target. They may be used as a stand alone casus belli or part of a longer term strategy of tension, such as happened during the Italian Years of Lead during which Operation Gladio terrorised the Italian population. The primary modern example is the "War On Terror" which is being waged worldwide.[1][2]

Origin

The term comes from navies warfare in 1700s whereby a vessel flew the flag of a neutral or enemy country in order to hide its true identity. The tactic used by pirates and private assassins to deceive other ships into allowing them to move closer before attacking them as in famous Hollywood movies. It became legal in international maritime law, on the condition that the attacking vessel displayed its true flag once an attack had begun.[3][4]

Purposes

Individual events may have multiple congruent purposes (for example, as covert assassinations, or to discredit a particular group by framing them for the attack,), but campaigns (such as the "war on terror" or the Italian strategy of tension) often have broader purposes, such as effecting social change by using fear as a stressor of a population.

Feasibility

Attribution of virtual attacks is notoriously difficult and predicted to get even harder[5][6], but increased mass communications (especially the mass surveillance carried out by intelligence agencies such as the NSA) mean that large scale false flag attacks in the real world are only feasible for secretive, influential and highly disciplined organisations. They are believed to rarely take place without the cooperation or at least the acquiescence of intelligence agencies. False flag attacks are a risky but regular tool used by deep state groups adept at co-opting the machinery of national governments.

Strategy

Patrick Clawson of the Washington Institute in a 2012 QA. He explains, that in order for the United States getting into a war, there needs to be the initiation of a crisis; basically acknowledging a number of false flag attacks, or provocations that lead to war, in the last 150 years.[7]

Webster Tarpley has published extensively on the strategy of false flags. While they are inevitably contain an element of risk - especially for the lower level operatives who are usually lied to about their involvement, and are often murdered as part of the cover-up - certain common strategies are employed to maximise the "plausible deniability" by which higher-ups life to fight - and kill - another day.

Drills

Full article: Terror drill

"Counter-terror drills" provide cover for activities as suspect as placing live explosives in a school bus.[8] Many high profile terror attacks are near simultaneous with such drills (for example, 9-11 and 7-7). Rogue employees can easily make the decision to make these drills "go live" if they deem conditions favourable, for example by remote detonation of bombs unbeknownst to other participants.

Fallback strategies

False flags are usually designed with many contingency (fallback) strategies to thwart subsequent investigation by allowing the perpetrators to choose from a maze of official narratives and opposition narratives according to how events pan out. Additional countermeasures such as assassination or blackmail of whistleblowers, witnesses or journalists are sometimes used to try to preserve secrecy, but these counter-strategies have risks of their own. Exploitation of the target population's psychological weaknesses (such as people's fear, naivety, just world bias, cognitive dissonance and conditioning) is an essential part of the effort to minimize the proportion of people who uncover the deception.

Psychology

Full article: Psychology
"How to Create a False Flag in 10 Easy Steps" - Bitchute backup

The psychology of the the targets of terror (the general public) has been extensively studied by "terror experts", who have gradually refined the process of how to most successfully tell the "big lie". Terror drills have been used to condition people, for example stoking Islamophobia.[9]

Public Awareness

Evidence of an increasing failure of "terrorism" to scare people - and of increasing distrust of the official narrative - was provided by a 2017 survey of the attitudes of 1207 US adults, which revealed their greatest fear to be "corrupt government officials".[10]

Washington's Blog reported in April 2013, after the Boston Marathon Bombing that interest in False Flag attacks was at an all time high, citing data from Google Trends. In 2017, a survey showed that "terrorism" was not among US citizens top 20 fears, and that #1 was "corrupt government officials" - with almost 3/4 of people either "afraid" or "very afraid".[10]

The dramatic spike in searches for "false flag" in April 2013, when the Boston Marathon bombings did occur.

The geographical data showed that searches were being made on the term especially in USA, Canada, UK, Malaysia, Australia and Germany:

False flag google trends geography.jpg

September 11th, 2001

Full article: Rated 4/5 9-11

Although widely effective at the time, 9/11 changed the dynamics of false flags because after nearly 15 years of mostly online activism by the 9/11 Truth movement have lead to its being widely doubted. A 2015 survey, for example, found that 33% of Canadians were in favor of a Parliamentary review of the 9/11 Commission Report, with 26% neither for nor against, and only 19% opposed.[11][12] This has lead to a new emphasis on internet censorship and the removal of freedom of speech (notably in France in 2015) as ways to try to prevent the unmasking of false flags attacks.

Selected Recent Examples

The most active perpetrators of false flag attacks are believed to be the intelligence agencies of US, UK and Israel.[13] Operation Gladio is a good place to start in study of recent examples, since it is relatively well documented and believed to underpin a range of more modern developments (such as Operation Gladio/B).

1945? - ? Operation Gladio

Full article: Rated 5/5 Operation Gladio
The remains of the Bologna Central Station in August 1980 after an Operation Gladio bomb killed 85 civilians.

This was a large operation in many European countries which is still only partially understood. It was most clearly revealed in Italy, after bomb attacks which killed hundreds of civilians were eventually admitted to have been carried out by a team established by NATO and the CIA. This operation quite probably gave rise to the Turkish deep state. The program has continued and expanded internationality and codenamed Gladio B.

1954 Lavon Affair

Full article: Lavon Affair

In 1954, Israel used Egyptian Jews as a fifth-column to attack US and UK-owned targets in Cairo and Alexandria. In 1954, one such saboteurs was caught planting a bomb. Israel blamed "antisemitism" in Egypt for the accusations and anyone who dared repeat them, silencing almost all western comment. However, it finally ended five decades of denial in 2005, presenting official citations to surviving agents, saying: "This is historic justice for those who were sent on a mission on behalf of the state and became the victims of a complex political affair."[14]

The motive is still not entirely clear, though Israel wished to induce the British government to retain its occupying troops in Egypt's Suez Canal zone. Israel also urgently needed manpower to work and defend the land it had seized in 1948, so inducing "anti-semitism", pogroms and expulsions of Jews was to their advantage. The Wikipedia article on the Lavon Affair is detailed and largely complete, but it claims that the affair was "disastrous for Israel in several ways" - while omitting the serious effects on Egypt and Egyptian Jews.

1967 USS Liberty Incident

Full article: Rated 4/5 USS Liberty Incident
USS-Liberty-damaged.jpg

The Israeli attack on the USS Liberty illustrates what can happen when false flag attacks fail. Had the USS Liberty been actually sunk according to plan, Israel might have succeeded in plausibly denying culpability. As it was, the survivors report the planes as Dassault Mirage IIIs and Super-Mystere jets, which could only have been Israeli.[15] The torpedo boats were correctly marked as being Israeli. The survivors all state that the USS liberty was flying the US flag, rendering highly implausible the official Israeli narrative that "we made a mistake". Other evidence includes the lack of markings on the Israeli planes and the jamming of US distress frequencies to try to stop the ship radioing for help. A high level cover up and a subservient US corporate media prevented major repercussions at the time.

September 11th & Amerithrax

Full articles: 9/11, 2001 Anthrax attacks
9-11-wtc-plane-hits.jpg

On September 11, 2001, an attack occurred in the eastern US which killed thousands of people. The US government asserted that it was perpetrated by 19 Hijackers under direction of Al Qaeda. Numerous anomalies, such as the collapse of WTC7, a third tower in the World Trade Center which was not hit by an aeroplane, suggest that this event was a false flag. Many eye-witnesses report that explosives were involved in all three tower collapses. FBI whistleblower Sibel Edmonds has revealed a U.S. intelligence alliance between al Qaeda starting in 1997 and ongoing to present time. An attack was launched against the Pentagon, which was subject to a military stand down. The official narrative fails to explain the innumerable deviations from standard operating procedure before, during and after the attacks. Wikipedia editors rapidly censor any evidence which contradicts the official narrative. The coverup was completed and sealed with the domestic terror Anthrax attacks that frightened all government and media into a non-critical silence and complicit compliance with the subsequent unleashing of global "counter-terrorism" policies and permanent wars.

Admitted False Flag Attacks

Nation states rarely admit to carrying out False Flag attacks, even when clear evidence exists that is unaccounted for by any other version of events. Some recent attacks which have been admitted, from Wikipedia's list of false flag attacks:

  • 1978 Celle Hole one bombing carried out by a West German secret service to further implicate the Red Army Faction, an active terrorist group. Revealed to be a not very serious (nobody hurt, no prison escape) case by the German government in 1986.
  • 1970s In Italy right-wing elements are accused of carrying out various terrorist acts as part of a broader Strategy of tension. There do not appear to be any of the elements of a false-flag element, though the 1972 killing of three Italian police Peteano bombing blame was initially blamed on their ideological opponents, the Lotta Continua ("continuous struggle", far left extra-parliamentary organization). Officers of the carabinieri were later indicted and convicted for manipulating the investigation in false directions. An Ordine Nuovo ("New Order" far right Italian cultural and extra-parliamentary political and terrorist organization founded in 1956) member has been named as the bomber.
False Flags and the Dawn of Bioterrorism (29:08) a 2020 short documentary by James Corbett,[18][19] a contextual history and critical overview of the threat of the military industrial biological technocracy and their duplicitous "defensive" threat to humanity.

" For the past twenty years, the world has been in the midst of a so-called "war on terror" set in motion by a false flag attack of spectacular proportions. Now the stage is being set for a new spectacular attack to usher in the next stage in that war on terror: the war on bioterrorism. But who are the real bioterrorists? And can we rely on government agencies, their appointed health authorities, and the corporate media to accurately identify those terrorists in the wake of the next spectacular terror attack? "

  • 1962 Operation Northwoods was a series of proposals for false-flag attacks, blaming Cuba for attacks carried out on US people/assets rejected by the Kennedy administration. In the same year Operation Mongoose was 12 proposals devised by the Department of Defense and against the same target. James Bamford wrote in his well-cited 2002 book "Body of secrets" that Northwoods "had the written approval of the Chairman and every member of the Joint Chiefs of Staff".
  • 1944 Panzer Brigade 150 wore American uniforms as they attempted to seize bridges ahead of the Ardennes Offensive, a German counter-attack. Their success was slight though the tactic caused the Americans great alarm. A Wikipedia article on the "Kommandoverband Jaguar German army unit" was deleted when it was discovered to have been largely taken from (and hence a copyright violation of) an article on a Russian web-site here, claiming that Germans in Russian uniforms spent 6 hours in Soviet occupied territory. It is unclear whether this is a true false-flag attack/operation (as intended at both Wikipedia and Wikispooks). It is known that SOE agents sometimes wore German uniforms behind enemy lines and, in 1944, German soldiers were sometimes wearing the better-quality American uniforms. Debatable false-flag, treated here as covert.
  • 1939 The Gleiwitz incident in which Germans dressed as Polish briefly seize a German radio station. They briefly broadcast in Polish and left behind the body of a freshly murdered German Silesian known to have been sympathetic to Poles. Genuine false-flag. Pretext for the German invasion of Poland, official start of WWII.
  • 1933 The Reichstag Fire was Hitler's pretext for suspending the Weimar Constitution and could have been false flag. Historians disagree as to whether Van der Lubbe acted alone or whether the arson was planned and ordered by the Nazis.

See Also


 

Examples

Page nameStartEndAttributed toPerpetrator(s)Description
"Gulf of Tonkin Incident"2 August 19644 August 1964VietnamUS/NavyTwo faked attacks used by the USA as a casus belli to commit ground forces to the Vietnam War.
"Jubilee Plot"Francis Millen
Thomas Callan
Michael Harkins
An attempt by Irish nationalist patsies to assassinate Queen Victoria and her Cabinate during her Golden Jubilee thanks giving service at Westminster abbey on 20 June 1887
"Kosovo student poisoning"22 March 199022 July 1990The alleged poisoning of thousands of Kosovan young people by toxic gases or substances in 1990. It came in the run-up to the Kosovo War and gained lots of coverage in the international press.
"The Storming of the Reichstag"Attempted false flag incident, where police agents provocateurs attempted to incite a small crowd of right wing protesters to storm Parliament, in an attempt to smear a larger COVID-dissident demonstration the same day.
2001 Mexican legislative assembly attack10 October 2001 17:00:0010 October 2001 17:30:00Saar Noam Ben Zvi
Salvador Guersson
Two Israelis caught with false passports grenades, explosives and guns in the Mexican parliament a month after 9-11. Later released without charge. Western corporate media aware but uninterested.
2002 Bali bombings12 October 2002 23:05:0012 October 2002 23:05:00Al-Qaeda
Jemaah Islamiyah
Two bombs in Bali that killed 202 people, blamed on Al-Qaeda
2002 Venezuelan coup attempt11 April 200213 April 2002A failed CIA-backed coup attempt against President of Venezuela Hugo Chávez.
2005 London bombings7 July 2005 08:50:007 July 2005 09:47:00Hasib Hussain
Mohammad Sidique Khan
Germaine Lindsay
Shehzad Tanweer
A series of coordinated attacks on London's public transport system during the morning rush hour, allegedly carried out by four Muslim suicide bombers.
2011 Alexandria bombingArmy of IslamAn deadly attack on a church in Egypt to stoke tensions during the 2011 regime change.
2014 Ukraine coup/Odessa massacre2014 Ukraine coupEvents in Odessa culminating in the deaths of 48 (official narrative) and up to 120 (evidence-based alternative narrative) anti-Kiev Junta demonstrators by fire, gun-shots and beatings in and around the Odessa Trade Union building on 2 May 2014
2016 Berlin attack19 December 201619 December 2016Islamic State
Anis Amri
Reported truck hijacking in Berlin attributed to ISIL.
2016 Hurriyah car bombing hoax30 October 201630 October 2016A real bomb in the Hurriyah area of Baghdad reported as having killed people by commercially-controlled media but exposed as a hoax after CCTV footage appeared online.
2017 Barcelona attacksNational Intelligence CenterAttackers were police informants and under intense surveillance. Happened at a convenient time for the Spanish government.
2018 missile attack on Russian IL-20 reconnaissance aircraftIsrael trying to start WW3 by having Russian plane shot down in war ruse.
2021 Washington D.C. RiotsDonald Trump
"Alt-right"
One of the most fortified positions in the US gets violently overrun by a group of Trump Supporters after a demonstration... without a single shot fired by the mob. Official narrative soon blamed Trump and extremists. Official opposition narrative soon blamed the democratic party trying to fraud Joe Biden into the White House. Several other governments were briefed by intelligence services that the incident seemingly "was being allowed" to happen.
2022 Brooklyn Subway ShootingFrank Robert James
9-1111 September 200111 September 2001Al-Qaeda
"9-11/The 19 Hijackers"
Khalid Sheikh Mohammed
Zacarias Moussaoui
Walid bin Attash
Mustafa al-Hawsawi
Ramzi bin al-Shibh
Ammar al-Baluchi
Mossad
US/Deep state
SDS
A complex and spectacular set of events in New York and Washington. The US government was quick to blame Al Qaeda, though no evidence of guilt was presented and there is much suspicion about what Al Qaeda really is. In the USA 9-11 assisted the Patriot Act's roll back of civil liberties, the stepping up of domestic surveillance and the financial advancement of the military industrial complex. Abroad 9-11 helped launched wars on Iraq and Afghanistan that had been planned long before.
9-11/George Washington Bridge plot11 September 200111 September 2001The FBI arrested at least one van of men (two or three) which was found to contain tons of explosives. This was announced on the day, two conflicting reports, but later retracted. No alternative explanation is known to have been given.
9-99/Ryazan incident22 September 199923 September 1999FSBMoscow FSB officers discovered wiring up what looked like a bomb in the basement of a building by night. Local FSB unaware. Claimed to be a terror drill but no documentation was presented. Instead documents were sealed and discussion of it prohibited in the Duma.
Achille Lauro hijacking7 October 198510 October 1985Palestine Liberation Front1985 hijacking of the Italian ocean liner MS Achille Lauro by four men representing the Palestine Liberation Front. Later revealed to in fact be an Israeli "black" propaganda operation.
Bologna bombing2 August 1980 10:25:002 August 1980 10:25:00CommunismOperation GladioA murderous attack on the Italian public, carried out by the MI6/CIA led Operation Gladio, blamed on communists, as part of a wider program to prevent their electoral success in Italy.
Celle Hole25 July 197825 July 1978Prison escape organized by secret services, possibly to arrange a "shot while fleeing"
Cheonan sinking26 March 201026 March 2010North KoreaThe sinking of the South Korean Corvette 'Cheonan' on 26 March 2010 with the loss of 46 South Korean sailors, quickly blamed on North Korea by the US and its allies.
Day X plot2015February 2017'Franco A.'?
'Mathias F.'?
'Maximilian T.'?
A failed attack which appears to have been intended as a false flag to be blamed on Syria.
Gleiwitz Incident31 August 193931 August 1939PolandGermany
Alfred Naujocks
Gestapo
The excuse for an invasion of Poland, starting World War II
Gretchen Whitmer/Kidnapping plot"Alt-right"UnknownThe "unsuccessful plot" in 2020 to overthrow the Michigan government arranged by the FBI.
HMS Defender Crimea controversy23 June 202123 June 2021RussiaVladimir Putin
Boris Johnson
A diplomatic military controversy between Russia and the UK
Hindawi affair17 April 198617 April 1986Failed attempt to smuggle a time bomb onto a plane
J. D. Tippit/Murder22 November 196322 November 1963JFK/Assassination/PerpetratorsAn accessory murder to the JFK assassination
JFK/Assassination22 November 196322 November 1963Lee Harvey OswaldUS/Deep state
JFK/Assassination/Perpetrators
The assassination of US President John F. Kennedy was the seminal deep political event of modern times, perhaps even more than 9-11. Both were done by the same group. Subsequently the group assassinated RFK, MLK and many others to try to contain the truth.
Jovenel Moïse/Assassination7 July 20217 July 2021UnknownSDSThe assassination of Haitian President Jovenel Moïse.
July 2021 Gulf of Oman incident29 July 202129 July 2021IranIsrael
Iran
Incident in July 2021
Lavon AffairJuly 1954October 1954EgyptMossadA false flag bombing campaign carried out in Egypt against US, UK and Egyptian targets. Israel was caught and exposed - and officially admitted responsibility some 51 years later.
Mukden Incident18 September 193118 September 1931ChinaJapanA particularly feeble excuse of a false flag used by the Japanese to try to justify their 1931 invasion of Manchuria
Nashville explosion25 December 202025 December 2020Anthony Quinn WarnerA mysterious explosion that has been memory holed since the US Capitol riots.
Oklahoma City bombing19 April 199519 April 1995Timothy McVeigh
Terry Nichols
The cabalA highly suspicious terrorist bombing that was initially blamed on "Muslims", then on lone nuts Timothy McVeigh and Terry Nichols. Many questions remain answered about the official narrative.
Operation Embarrass14 February 19471948'The Defenders of Arab Palestine'MI6A false flag bombing campaign MI6 carried out to try to stem Jewish immigration.
Operation Gladio/B1997US/Deep state
UK/Deep state
A development of Operation Gladio to help roll out the "war on terror" by promoting US/NATO-sponsored false flag attacks to be blamed on "Muslim terrorists".
Operation WashtubCIA
Anastasio Somoza García
Pan Am Flight 10321 December 198821 December 1988Abdelbaset al-MegrahiWhen Pan Am Flight 103 exploded over Lockerbie, Scotland on 21 December 1988, killing all 259 passengers and crew on board, news reports cited UN Assistant Secretary-General, Bernt Carlsson, as its highest-profile victim. US and British intelligence operatives, posing as Lockerbie investigators, ignored the evident targeting of the UN diplomat and instead focused on the jumbo jet. With the result that the wrong country was blamed and an innocent person convicted of the Lockerbie bombing.
Patrick Haseldine/Suppressed Lockerbie evidence ignited 9-11 attacks11 September 2001 08:46:0011 September 2001 10:28:00Al-Qaeda
Plan JB 355US
Franklin D. Roosevelt
Claire Lee Chennault
A 1941 plan for dozens or hundreds of US bombers with American crews masked by Chinese markings to bombing Japanese cities
Russian apartment bombings4 September 199916 September 1999Ibn al-Khattab
Chechnya
Adam Dekkushev
Yusuf Krymshakhalov
FSBA 'Russian 9/11' which boosted support for the second war that was launched in Chechnya
Shelling of Mainila26 November 193926 November 1939FinlandSoviet UnionA false flag used to launch the Winter War.
Syrian Chemical Weapons Attack21 August 201321 August 2013Syria
The Bombers Affair (Luxembourg)30 May 19842 December 1985Luxembourg terrorist attacks by the local Gladio stay-behind network
The Sinking of the AtlasThe Red HandDirection Générale de la Sécurité ExtérieureGerman cargo ship sunk by French agents in 1958. Blamed on fictional Red Hand terrorist organization.
The Sinking of the SS San FlavianoCIABritish oil tanker sunk in 1958 by the CIA bombing under false flag. The purpose was make foreign companies like Shell suspend operations and in Indonesia, to weaken the Indonesian economy and destabilize the government.
The secret war against Sweden27 October 19811994Soviet RussiaNATO
William Casey
Ronald Reagan
James Lyons
National Underwater Reconnaissance Office
Bror Stefenson
A large number of "Soviet" submarine intrusions in Swedish waters in the 1980s, in reality committed by NATO under false flag. The intrusions were about deception and PSYOPs, to change the mindset of the Swedes, to make them adapt to US interests.
USS Liberty Incident8 June 19678 June 1967IsraelA 1967 false flag attack by Israel that tried and failed to sink the USS Liberty, a United States Navy signals intercept ship. The investigation was told to "conclude that the attack was a case of 'mistaken identity' despite overwhelming evidence to the contrary." Israel paid compensation but always contested that it was accidental.
... further results

 

Related Quotations

PageQuoteAuthorDate
Patrick Clawson“One can combine other means of pressure with sanctions. I mentioned that explosion on August 17th. We could step up the pressure. I mean look people, Iranian submarines periodically go down, some day one of them might not come up, who would know why? We can do a variety of things if we wish to increase the pressure... We are in the game of using covert means against the Iranians. We could get nastier.”Patrick ClawsonSeptember 2012
Francesco Cossiga“Maroni should do what I did when I was Minister of the Interior. First, leave the high school students alone, because think what would happen if a twelve-year-old was killed or seriously injured. Let them do the university students instead. Withdraw the police force from the streets and universities, infiltrate the movement with agents provocateurs ready for anything, and let the demonstrators devastate the shops, set fire to cars and set fire to cities for ten days. After that, thanks to popular support, the sound of ambulance sirens will overwhelm that of police and carabinieri cars. In the sense that the police should massacre the protesters mercilessly and send them all to hospital. Do not arrest them, since the magistrates would immediately set them free, but beat them to a pulp, and to a pulp even those teachers who foment them. Especially the teachers. Not the old ones, of course, but the little girls teachers, yes.”Francesco Cossiga2008
Mikhail Gorbachev“The storming of the capitol was clearly planned in advance, and it's obvious by whom”Mikhail Gorbachev7 January 2021
Strategy of tension“When you were on the Right you were not supposed to attack the State or its representatives. You were supposed to attack civilians, women, children, innocent people from outside the political arena. For one simple reason: To force the Italian public to turn to the State turn to the regime and ask for greater security. This was precisely the role of the right in Italy. It placed itself at the service of the State which created a strategy aptly called the "Strategy of Tension" in so far as they had to get ordinary people to accept that at any moment over a period of 30 years, from 1960 to the mid eighties a state of emergency could be declared. So, people would willingly trade part of their freedom for the security of being able to walk the streets, go on trains or enter a bank. This is the political logic behind all the bombings. They remain unpunished because the state cannot condemn itself.”Vincenzo Vinciguerra
Robert Stuart“Let me pin my colours to the mast and say that I am absolutely convinced that the BBC did deliberately and knowingly fake evidence of chemical attacks.”Craig Murray
Robert Stuart

 

Related Documents

TitleTypePublication dateAuthor(s)Description
Document:All Roads Lead to Dark Winterreport1 April 2020Whitney Webb
Document:Anatomy of a NATO-sponsored false flag operationaudio transcript27 March 2014Leaked audio of high-level discussion of a planned Turkish false flag operation. It is an example of classic military/intelligence deception tactics in furtherance of policy already decided upon - in this case the overthrow of the Syrian government of Bashar al Assad.
Document:Another Chemical Weapon False Flag on the Eve of Peace Talks in Brusselsarticle4 April 2017Paul AntonopoulosThe Khan Sheikoun gas attack in Idlib province, like that in the Damascus suburb of Ghouta in 2013, can be a very useful means of propaganda
Document:Bandar ibn Israelarticle28 August 2013Sharmine NarwaniThe collusion of Saudi Arabia's Bandar bin Sultan with Israel in acts of terrorist violence in the Middle East through 2013.
Document:Charlie Hebdo déjà vúarticle14 January 2015Adrian SalbuchiAn analysis of the Charlie Hebdo event of January 2015. It connects many dots linking it to a litany of similar outrages and exposing the essentially False flag nature of all of them.
Document:False Flags for Israelwebpage11 September 2012Deanna SpingolaAn overview of Israel's long history of False Flag attacks.
Document:I've Been Banned From Facebook for Sharing an Article About False Flagsarticle17 November 2017Caitlin JohnstoneCaitlin Johnstone's account of her Facebook censorship experience.
Document:Peter Dale Scott - COPA 2010speech2010Peter Dale Scott
Document:The Global Drugs Meta-GrouparticleOctober 2005Peter Dale Scott
Document:The Spectacle of The False Flagbook1 March 2015Eric Wilson
Document:The Terror Attacks in France. The Broader Geopolitical Implicationsinterview10 January 2015Umberto PascaliInterview with Umberto Pascali – For Voice of the People, TV Sonce, Skipje, Macedonia


Rating

4star.png 18 July 2017 Robin  An essential topic!
This article explains this vital tactic, increasingly being unmasked by independent investigators worldwide.
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References

  1. https://www.wikiwand.com/en/False_flag
  2. See "Examples" on the bottom of this page
  3. https://books.google.com/books?id=xn17DwAAQBAJ&pg=PT281
  4. https://www.cjr.org/language_corner/false-flags.php
  5. https://www.schneier.com/blog/archives/2018/03/friday_squid_bl_615.html#comments
  6. http://www.theregister.co.uk/2018/03/08/analysis_suggests_norks_not_behind_olympic_destroyer_malware_attack/
  7. https://www.corbettreport.com/false-flags-over-iran saved at Archive.org and Archive.is
  8. https://www.yahoo.com/news/cia-leaves-explosives-school-bus-training-exercise-172712978.html
  9. http://www.huffingtonpost.com/2015/01/02/india-police-muslim-drills_n_6406648.html
  10. a b https://www.statista.com/chart/11551/americans-top-fears-of-2017/
  11. http://www.army.mod.uk/documents/general/2015DIN07-111.pdf
  12. http://rethink911.ca/wp-content/uploads/2015/02/ReThink911Petition_Response.pdf
  13. Chris Bollyn. [Where?]
  14. "After half a century of reticence and recrimination, Israel ... honored ... agents-provocateur." YNetNews, 30th March 2005.
  15. The Attack on the USS Liberty and its Cover-up James Akins was U.S. ambassador to Saudi Arabia. The Center for Policy Analysis on Palestine, Annual Distinguished Lecture, September 1999. If Americans Knew.org.
  16. http://onwardoverland.com/Far_East/cambodianarticles/ciacambodia.html saved at Archive.org saved at Archive.is
  17. http://archive.today/2019.06.16-055612/https://en.wikipedia.org/wiki/CIA_cryptonym
  18. [https://www.corbettreport.com/bioterror/ Episode 388 – False Flags and the Dawn of Bioterrorism The Corbett Report
  19. False Flags and the Dawn of Bioterrorism The Corbett Report 2020-11-20