background preloader

False flag

False flag
"False colors" redirects here. For the imaging technique, see False-color. False flag (or black flag) describes covert operations designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups, or nations other than those who actually planned and executed them. Operations carried out during peace-time by civilian organizations, as well as covert government agencies, may by extension be called false flag operations if they seek to hide the real organization behind an operation. In its most modern usage, the term may also refer to those events which governments are cognizant of and able to stop but choose to allow to happen (or "stand down"), as a strategy to entangle or prepare the nation for war. Use in warfare[edit] [edit] Air warfare[edit] In December 1922–February 1923, Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare, drafted by a commission of jurists at the Hague regulates:[9] Art. 3. Art. 19. 1.

Dirty War Declassified documents of the Chilean secret police cite an official estimate by the Batallón de Inteligencia 601 of 22,000 killed or "disappeared" between 1975 and mid-1978. During this period, in which it was later revealed 8,625 "disappeared" in the form of PEN detainees who were held in clandestine detention camps throughout Argentina before eventually being freed under diplomatic pressure.[11] The number of people believed to have been killed or "disappeared," depending on the source, range from 9,089 to 30,000 in the period from 1976 to 1983, when the military was forced from power following Argentina's defeat in the Falklands War.[12][13] The National Commission on the Disappearance of Persons estimates that around 13,000 were disappeared.[14] After democratic government was restored, Congress passed legislation to provide compensation to victims' families. The exact chronology of the repression is still debated, however, as in some senses the long political war started in 1969.

Zen Flower Radio Operation Northwoods Operation Northwoods memorandum (13 March 1962)[1] Operation Northwoods was a series of false flag proposals that originated within the Department of Defense (DoD) and the Joint Chiefs of Staff (JCS) of the United States government in 1962. The proposals, which called for the Central Intelligence Agency (CIA), or other operatives, to commit acts of terrorism in US cities and elsewhere, were rejected by the Kennedy administration.[2] At the time of the proposal, Cuba had recently become communist under Fidel Castro. The operation proposed creating public support for a war against Cuba by blaming it for terrorist acts.[3] To this end, Operation Northwoods proposals recommended hijackings and bombings followed by the introduction of phony evidence that would implicate the Cuban government. It stated: Several other proposals were included within Operation Northwoods, including real or simulated actions against various US military and civilian targets. Origins and public release[edit] The U.S.

Irregular military Irregular military refers to any non-standard military.[clarification needed] Being defined by exclusion, there is significant variance in what comes under the term. It can refer to the type of military organization, or to the type of tactics used. An irregular military organization is a military organization which is not part of the regular army organization of a party to a military conflict. Irregulars are soldiers or warriors that are members of these organizations, or are members of special military units that employ irregular military tactics. Irregular warfare is warfare employing the tactics commonly used by irregular military organizations. Other names for irregular military formations[edit] The term "irregular military" describes the "how" and "what", but it is more common to focus on the "why". Intense debates can build up over which of these terms to use when referring to a specific group. It is possible for a military to cross the line between regular and irregular.

» 10 Facts That Prove The Bin Laden Fable Is a Contrived Hoax Alex Jones Paul Joseph Watson Infowars.com May 9, 2011 Merely a week after President Obama announced the death of Osama Bin Laden, there is literally a deluge of evidence that clearly indicates the whole episode has been manufactured for political gain and to return Americans to a state of post-9/11 intellectual castration so that they can be easily manipulated in the run up to the 2012 election. Here are ten facts that prove the Bin Laden fable is a contrived hoax…. 1) Before last Sunday’s raid, every intelligence analyst, geopolitical commentator or head of state worth their salt was on record as stating that Osama Bin Laden was already dead, and that he probably died many years ago, from veteran CIA officer Robert Baer, to former Pakistani Prime Minister Benazir Bhutto, to former FBI head of counterterrorism Dale Watson. 2) The official narrative of how the raid unfolded completely collapsed within days of its announcement. Fresh food that lasts from eFoods Direct (Ad) Print this page. BREAKING!

Gladio in Italy Giulio Andreotti's revelation[edit] Vincenzo Vinciguerra, a far-right terrorist, had already revealed Gladio's existence during his 1984 trial. Gladio was involved in the "strategy of tension" (Italian: strategia della tensione) during the "lead years", which started with Piazza Fontana bombing in December 1969. Thirty years later, during a trial of right-wing extremists, General Giandelio Maletti, former head of Italian counter-intelligence, claimed that the massacre had been carried out by the Italian stay-behind army and right wing terrorists on orders of the CIA in order to discredit the Italian Communist Party (PCI). After the discovery by judge Felice Casson of documents on Gladio in the archives of the Italian military secret service in Rome, Giulio Andreotti, head of Italian government, revealed to the Chamber of deputies the existence of "Operazione Gladio" on 24 October 1990, insisting that Italy has not been the only country with secret "stay-behind" armies. See also[edit]

List of military tactics This page contains a list of military tactics. General tactics[edit] Force concentration - the practice of concentrating a military force against a portion of an enemy force[1]Exploiting prevailing weather - the tactical use of weather as a force multiplier has influenced many important battles throughout history, such as the Battle of Waterloo[2]Night combat - combat that takes place at night. It often requires more preparation than combat during daylight and can provide significant tactical advantages and disadvantages to both the attacker and defender[3]Reconnaissance - a mission to obtain information by visual observation or other detection methods, about the activities and resources of the enemy or potential enemy, or about the meteorologic, hydrographic, or geographic characteristics of a particular area.[4]Fire Attacks: Reconnaissance by fire is used by apprehensive soldiers when they suspect the enemy is lurking nearby. Small unit tactics[edit] Offensive tactics[edit]

Newly Released FBI Documents Support Sibel Edmonds’ Allegations Thanks to a FOIA request, new evidence has emerged from the FBI’s own internal communications that appear to support many of the claims made by Sibel Edmonds regarding (largely though not exclusively) GOP collusion in the spying activities of the Turkish government. This is no small matter, as it involves blackmail and bribery of high-level officials like former Speaker of the House, Dennis Hastert, PNAC signatory Richard Perle, Congressman Roy Blunt, Congresswoman Jean Schmidt, Turkish Ambassador Marc Grossman, Congressman Stephen Solarz, Asst. Sec. Def. Douglas Feith, Congressman Dan Burton and others to “look the other way” from those engaged in spying activities with a foreign government against the United States. Per the report from the Boiling Frogs website: Recently released FBI documents prove the existence of highly sensitive National Security and criminal investigations of “Turkish Activities” in Chicago prior to September 11, 2001.

CADPAT The temperate variant of CADPAT Canadian Disruptive Pattern (CADPAT; French: dessin de camouflage canadien, DcamC)[1] is the computer-generated digital camouflage pattern currently used by the Canadian Forces (CF). CADPAT is designed to reduce the likelihood of detection by night vision devices.[1] Background[edit] Canada's desire for a new soldier system dates back to November 1988 and closely follows efforts in many NATO countries. Pattern variations[edit] In development for the better part of a decade, the pattern comes in three varieties: temperate woodland (TW), arid region (AR), and winter/arctic (WA). Temperate woodland[edit] Canadian soldier wearing tactical vest and the fragmentation protective vest. CADPAT TW has four specific colours—light green, dark green, brown, and black—and was first introduced in 1996 on the helmet cover for the new CG634 helmet then coming into service. Arid regions[edit] Winter/arctic[edit] Urban[edit] Private Ownership[edit] References[edit]

Intelligence-gathering by British state out of control Among all the uncertainties and denials over the interception of communications by GCHQ and America’s National Security Agency some things should be crystal clear. The bilateral relationship between GCHQ and the NSA is uniquely special. It is the core of the “special relationship”. The two agencies are truly intertwined. There are NSA liaison officers assigned to GCHQ in Cheltenham, and GCHQ officers at the NSA’s headquarters in Fort Meade, Maryland. Though officially described as an RAF base, Menwith Hill in North Yorkshire is the NSA’s largest eavesdropping centre outside the US. The relationship between the two agencies is reflected in a 1994 staff manual which told GCHQ staff that the agency’s contribution must be “of sufficient scale and of the right kind to make a continuation of the Sigint alliance worthwhile to our partners”. Significantly, it added: “This may entail on occasion the applying of UK resources to the meeting of US requirements”. So it boils down to a question of trust.

Related: