False flag (or black flag) describes covert military or paramilitary operations designed to deceive in such a way that the operations appear as though they are being carried out by other entities, groups or nations than those who actually planned and executed them. Operations carried during peace-time by civilian organizations, as well as covert government agencies, may by extension be called false flag operations if they seek to hide the real organization behind an operation. Hughes uses the term to refer to those acts carried out by “military or security force personnel, which are then blamed on terrorists.”
In its most modern usage, the term may also refer to those events which governments are cognizant of and able to stop but choose to allow to happen (or “stand down”), as a strategy to entangle or prepare the nation for war. Furthermore, the term “false flag terrorism” may even be used in those instances when violence is carried out by groups or organisations which, whether they know it or not, are being supported or controlled by the “victim” nation. deHaven-Smith argues that the terminology has become looser in recent years due to the increasingly complex levels of “duplicity” and “international intrigue” between states. Some argue that false flags are methods used by deep states as a form of deep politics.
The name “false flag” has its origins in naval warfare where the use of a flag other than the belligerent’s true battle flag as a ruse de guerre, before engaging the enemy, has long been acceptable. Such operations are also acceptable in certain circumstances in land warfare, to deceive enemies in similar ways providing that the deception is not perfidious and all such deceptions are discarded before opening fire upon the enemy.
1 Naval warfare
2 Air warfare
3 Land warfare
4 As pretexts for war
4.1 Russo-Swedish War
4.2 Franco-Prussian War
4.3 Spanish–American War
4.4 World War II
4.4.1 Mukden incident
4.4.2 Reichstag fire
4.4.3 Gleiwitz incident
4.4.4 Winter War
4.4.5 Kassa attack
4.5 Cold War
4.5.1 Operation Ajax
4.5.2 Operation Northwoods
4.5.3 Gulf of Tonkin incident
8 Civilian usage
8.2 Political campaigning
9 Dirty War
10 See also
11 Notes and references
This practice is considered acceptable in naval warfare, provided the false flag is lowered and the true flag raised before engaging in battle. Auxiliary cruisers operated in such a fashion in both World Wars, as did Q-ships, while merchant vessels were encouraged to use false flags for protection. The 1914 Battle of Trindade was between the auxiliary cruisers RMS Carmania and SMS Cap Trafalgar, in which the SMS Cap Trafalgar had been altered to look like the RMS Carmania.
One of the most notable examples was in World War II when the German commerce raider Kormoran, disguised as a Dutch merchant ship, surprised and sank the Australian light cruiser HMAS Sydney in 1941, causing the greatest recorded loss of life on an Australian warship. The Kormoran was also fatally crippled in that encounter and its crew was captured, but it was a considerable psychological victory for the Germans.
The British used a Kriegsmarine ensign in the St Nazaire Raid and captured a German code book. The old destroyer Campbeltown, which the British planned to sacrifice in the operation, was provided with cosmetic modifications, cutting the ship’s funnels and chamfering the edges to resemble a German Möwe-class destroyer. The British were able to get within two miles (3 km) of the harbour before the defences responded, where the explosive-rigged Campbeltown and commandos successfully disabled or destroyed the key dock structures of the port.
In December 1922–February 1923, Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare, drafted by a commission of jurists at the Hague regulates:
Art. 3. A military aircraft must carry an exterior mark indicating its nationality and its military character.
Art. 19. The use of false exterior marks is forbidden.
This draft was never adopted as a legally binding treaty, but the ICRC states in its introduction on the draft that “To a great extent, [the draft rules] correspond to the customary rules and general principles underlying treaties on the law of war on land and at sea”, and as such these two non controversial articles were already part of customary law.
In land warfare, the use of a false flag is similar to that of naval warfare. The most widespread assumption is that this practice was first established under international humanitarian law at the trial in 1947 of the planner and commander of Operation Greif, Otto Skorzeny, by a U.S. military tribunal at the Dachau Trials. In this trial, the tribunal did not find Skorzeny guilty of a crime by ordering his men into action in American uniforms. He had passed on to his men the warning of German legal experts, that if they fought in American uniforms, they would be breaking the laws of war, but they probably were not doing so just by wearing American uniforms. During the trial, a number of arguments were advanced to substantiate this position and the German and U.S. military seem to have been in agreement on it. In the transcript of the trial, it is mentioned that Paragraph 43 of the Field Manual published by the War Department, United States Army, on October 1, 1940, under the title “Rules of Land Warfare”, says:
“National flags, insignias and uniforms as a ruse – in practice it has been authorized to make use of these as a ruse. The foregoing rule (Article 23 of the Annex of the IVth Hague Convention), does not prohibit such use, but does prohibit their improper use. It is certainly forbidden to make use of them during a combat. Before opening fire upon the enemy, they must be discarded.”
Also The American Soldiers’ Handbook, was quoted by Defense Counsel and says:
“The use of the enemy flag, insignia, and uniform is permitted under some circumstances. They are not to be used during actual fighting, and if used in order to approach the enemy without drawing fire, should be thrown away or removed as soon as fighting begins.”
Wikisource has original text related to this article:
Protocol I of the Geneva Convention
The outcome of the trial has been codified in the 1977 Protocol Additional to the Geneva Conventions of 12 August 1949 (Protocol I):
Article 37. – Prohibition of perfidy
1. It is prohibited to kill, injure, or capture an adversary by resort to perfidy. Acts inviting the confidence of an adversary to lead him to believe that he is entitled to, or is obliged to accord, protection under the rules of international law applicable in armed conflict, with intent to betray that confidence, shall constitute perfidy. The following acts are examples of perfidy:
(a) The feigning of an intent to negotiate under a flag of truce or of a surrender;
(b) The feigning of an incapacitation by wounds or sickness;
(c) The feigning of civilian, non-combatant status; and
(d) The feigning of protected status by the use of signs, emblems or uniforms of the United Nations or of neutral or other States not Parties to the conflict.
2. Ruses of war are not prohibited. Such ruses are acts which are intended to mislead an adversary or to induce him to act recklessly but which infringe no rule of international law applicable in armed conflict and which are not perfidious because they do not invite the confidence of an adversary with respect to protection under that law. The following are examples of such ruses: the use of camouflage, decoys, mock operations and disinformation.
Article 38. – Recognized emblems
1. It is prohibited to make improper use of the distinctive emblem of the red cross, red crescent or red lion and sun or of other emblems, signs or signals provided for by the Conventions or by this Protocol. It is also prohibited to misuse deliberately in an armed conflict other internationally recognized protective emblems, signs or signals, including the flag of truce, and the protective emblem of cultural property.
2. It is prohibited to make use of the distinctive emblem of the United Nations, except as authorized by that Organization.
Article 39. – Emblems of nationality
1. It is prohibited to make use in an armed conflict of the flags or military emblems, insignia or uniforms of neutral or other States not Parties to the conflict.
2. It is prohibited to make use of the flags or military emblems, insignia or uniforms of adverse Parties while engaging in attacks or in order to shield, favour, protect or impede military operations.
3. Nothing in this Article or in Article 37, paragraph 1 ( d ), shall affect the existing generally recognized rules of international law applicable to espionage or to the use of flags in the conduct of armed conflict at sea.
As pretexts for war
This section needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (May 2011)
In 1788, a head tailor of the Royal Swedish Opera received an order to sew a number of Russian military uniforms that later were used in an exchange of gunfire at Puumala, a Swedish outpost on the Russo-Swedish border, on June 27, 1788. The staged attack, which caused an outrage in Stockholm, was to convince the Riksdag of the Estates and to provide the Swedish king Gustav III with an excuse to declare a “defensive” war on Russia. This was important since the king did not have constitutional right to start offensive war without agreement of the estates who had already made clear that their acceptance would not be forthcoming.
Otto von Bismarck waved a “red flag” in front of the “gallic bull” by re-editing a telegram from the Prussian King so that it appeared as though the King had insulted a French ambassador during a time of extremely tense French-German international relations. The telegram is known as the Ems Dispatch. It helped encourage the states to go to war.
The sinking of the USS Maine on 15 February 1898 in Havana harbor was initially thought to be caused by an external mine exploded under the ship. This belief roused anti-Spanish sentiment in the United States and helped catalyze the Spanish–American War later that same year. In 1911 an extensive study was made of the wreck, and again an external mine was believed to be the cause. In 1976 a team of naval explosive experts re‑examined the earlier evidence and concluded that the likeliest cause of the sinking was an internal explosion caused by spontaneous combustion of fuel coal stored in a bunker next to a magazine holding more than 5 short tons (4.5 t) of powder charges for the guns. Despite this analysis, some observers believe that the explosion was caused by a U.S. agent for the purpose of angering the U.S. populace and initiating the war which followed. Cuban politician and former director of the national library Eliades Acosta claims that “powerful economic interests” in the United States were probably responsible not only for the sinking of the Maine but for the assassination of three 19th-century U.S. presidents, beginning with Abraham Lincoln.
World War II
Japanese experts inspect the scene of the ‘railway sabotage’ on South Manchurian Railway
The Mukden incident in September 1931 involved Japanese officers fabricating a pretext for annexing Manchuria by blowing up a section of railway. In fact the explosion was so weak that the line was unaffected. Six years later in 1937 they falsely claimed the kidnapping of one of their soldiers in the Marco Polo Bridge Incident as an excuse to invade China proper.
The Reichstag fire was an arson attack on the Reichstag building in Berlin on 27 February 1933. The fire started in the Session Chamber, and, by the time the police and firemen arrived, the main Chamber of Deputies was engulfed in flames. Police searched the building and found Marinus van der Lubbe, a young, Dutch council communist and unemployed bricklayer who had recently arrived in Germany, ostensibly to carry out political activities.
The fire was used as evidence by the Nazis that the Communists were beginning a plot against the German government. Van der Lubbe and four Communist leaders were subsequently arrested. Adolf Hitler, who was sworn in as Chancellor of Germany four weeks before, on 30 January, urged President Paul von Hindenburg to pass an emergency decree to counter the “ruthless confrontation of the Communist Party of Germany”. With civil liberties suspended, the government instituted mass arrests of Communists, including all of the Communist parliamentary delegates. With their bitter rival Communists gone and their seats empty, the National Socialist German Workers Party went from being a plurality party to the majority; subsequent elections confirmed this position and thus allowed Hitler to consolidate his power.
Historians disagree as to whether Van der Lubbe acted alone, as he said, to protest the condition of the German working class, or whether the arson was planned and ordered by the Nazis, then dominant in the government themselves, as a false flag operation. The responsibility for the Reichstag fire remains an ongoing topic of debate and research.
The Gleiwitz incident in 1939 involved Reinhard Heydrich fabricating evidence of a Polish attack against Germany to mobilize German public opinion for war, to establish casus belli, and to justify the war with Poland. Alfred Naujocks was a key organiser of the operation under orders from Heydrich. It led to the deaths of innocent Nazi concentration camp victims who were dressed as German soldiers and then shot by the Gestapo to make it seem that they had been shot by Polish soldiers. This, along with other false flag operations in Operation Himmler, would be used to mobilize support from the German population for the start of World War II in Europe.
In 1939 the Red Army shelled Mainila, a Russian village near the Finnish border. Soviet authorities blamed Finland for the attack and used the incident as a pretext to start the Winter War four days later.
The Kassa attack in 1941 involved the city of Kassa, today Košice (Slovakia), which was then part of Hungary, being bombed by three unidentified planes of apparently Soviet origin. This attack became the pretext for the government of Hungary to declare war on the Soviet Union.
The replacement of Iran’s Anglo-Persian Oil Company with five American oil companies and the 1953 Iranian coup d’état was the consequence of the U.S. and British-orchestrated false flag operation, Operation Ajax. Operation Ajax used political intrigue, propaganda, and agreements with Qashqai tribal leaders to depose the leader of Iran, Mohammed Mosaddeq (democratically elected at the beginning of the process, but ruling as a dictator by the time of his overthrow after a coup of his own). Information regarding the CIA-sponsored coup d’etat has been largely declassified and is available in the CIA archives.
Operation Northwoods memorandum (13 March 1962).
The planned, but never executed, 1962 Operation Northwoods plot by the U.S. Department of Defense for a war with Cuba involved scenarios such as fabricating the hijacking or shooting down of passenger and military planes, sinking a U.S. ship in the vicinity of Cuba, burning crops, sinking a boat filled with Cuban refugees, attacks by alleged Cuban infiltrators inside the United States, and harassment of U.S. aircraft and shipping and the destruction of aerial drones by aircraft disguised as Cuban MiGs. These actions would be blamed on Cuba, and would be a pretext for an invasion of Cuba and the overthrow of Fidel Castro’s communist government. It was authored by the Joint Chiefs of Staff, but then rejected by President John F. Kennedy. The surprise discovery of the documents relating to Operation Northwoods was a result of the comprehensive search for records related to the assassination of President John F. Kennedy by the Assassination Records Review Board in the mid-1990s. Information about Operation Northwoods was later publicized by James Bamford.
Gulf of Tonkin incident
The Gulf of Tonkin incident (or the USS Maddox incident) is the name given to two separate confrontations involving North Vietnam and the United States in the waters of the Gulf of Tonkin. The first event occurred on August 2, 1964, between the destroyer USS Maddox and three North Vietnamese Navy torpedo boats of the 135th Torpedo Squadron. The second was originally claimed by the U.S. National Security Agency to have occurred on August 4, 1964, as another sea battle, but instead may have involved “Tonkin Ghosts” (false radar images) and not actual NVN torpedo boat attacks.
The outcome of these two incidents was the passage by Congress of the Gulf of Tonkin Resolution, which granted President Lyndon B. Johnson the authority to assist any Southeast Asian country whose government was considered to be jeopardized by “communist aggression.” The resolution served as Johnson’s legal justification for deploying U.S. conventional forces and the commencement of open warfare against North Vietnam.
In 2005, an internal National Security Agency historical study was declassified; it concluded that the Maddox had engaged the North Vietnamese Navy on August 2, but that there were no North Vietnamese Naval vessels present during the incident of August 4. The Gulf of Tonkin incident has long been accused of being a false flag operation, but this judgment remains in dispute.
Pseudo-operations are those in which forces of one power disguise themselves as enemy forces. For example, a state power may disguise teams of operatives as insurgents and, with the aid of defectors, infiltrate insurgent areas. The aim of such pseudo-operations may be to gather short or long-term intelligence or to engage in active operations, in particular assassinations of important enemies. However, they usually involve both, as the risks of exposure rapidly increase with time and intelligence gathering eventually leads to violent confrontation. Pseudo-operations may be directed by military or police forces, or both. Police forces are usually best suited to intelligence tasks; however, military provide the structure needed to back up such pseudo-ops with military response forces. According to US military expert Lawrence Cline (2005), “the teams typically have been controlled by police services, but this largely was due to the weaknesses in the respective military intelligence systems.”
Charlemagne Péralte of Haiti was assassinated in 1919, after checkpoints were passed by military disguised as guerrilla fighters
The State Political Directorate (OGPU) of the Soviet Union set up such an operation from 1921 to 1926. During Operation Trust, they used loose networks of White Army supporters and extended them, creating the pseudo-“Monarchist Union of Central Russia” (MUCR) in order to help the OGPU identify real monarchists and anti-Bolsheviks.
An example of a successful assassination was United States Marine Sergeant Herman H. Hanneken leading a patrol of his Haitian Gendarmerie disguised as enemy guerrillas in 1919. The Patrol successfully passed several enemy checkpoints in order to assassinate the guerilla leader Charlemagne Péralte near Grande-Rivière-du-Nord. Hanneken was awarded the Medal of Honor and was commissioned a Second Lieutenant for his deed.
During the Mau Mau uprising in the 1950s, captured Mau Mau members who switched sides and specially trained British troops initiated the pseudo-gang concept to successfully counter Mau Mau. In 1960 Frank Kitson, (who was later involved in the Northern Irish conflict and is now a retired British General), published Gangs and Counter-gangs, an account of his experiences with the technique in Kenya; information included how to counter gangs and measures of deception, including the use of defectors, which brought the issue a wider audience.
Another example of combined police and military oversight of pseudo-operations include the Selous Scouts in former country Rhodesia (now Zimbabwe), governed by white minority rule until 1980. The Selous Scouts were formed at the beginning of Operation Hurricane, in November 1973, by Major (later Lieutenant Colonel) Ronald Reid-Daly. As all Special Forces in Rhodesia, by 1977 they were controlled by COMOPS (Commander, Combined Operations) Commander Lieutenant General Peter Walls. The Selous Scouts were originally composed of 120 members, with all officers being white and the highest rank initially available for Africans being colour sergeant. They succeeded in turning approximately 800 insurgents who were then paid by Special Branch, ultimately reaching the number of 1,500 members. Engaging mainly in long-range reconnaissance and surveillance missions, they increasingly turned to offensive actions, including the attempted assassination of Zimbabwe People’s Revolutionary Army leader Joshua Nkomo in Zambia. This mission was finally aborted by the Selous Scouts, and attempted again, unsuccessfully, by the Rhodesian Special Air Service.
Some offensive operations attracted international condemnation, in particular the Selous Scouts’ raid on a Zimbabwe African National Liberation Army (ZANLA) camp at Nyadzonya Pungwe, Mozambique in August 1976. ZANLA was then led by Josiah Tongogara. Using Rhodesian trucks and armored cars disguised as Mozambique military vehicles, 84 scouts killed 1,284 people in the camp, the camp was registered as a refugee camp by the United Nations (UN). Even according to Reid-Daly, most of those killed were unarmed guerrillas standing in formation for a parade. The camp hospital was also set ablaze by the rounds fired by the Scouts, killing all patients. According to David Martin and Phyllis Johnson, who visited the camp shortly before the raid, it was only a refugee camp that did not host any guerrillas. It was staged for UN approval.
According to a 1978 study by the Directorate of Military Intelligence, 68% of all insurgent deaths inside Rhodesia could be attributed to the Selous Scouts, who were disbanded in 1980.
If the action is a police action, then these tactics would fall within the laws of the state initiating the pseudo, but if such actions are taken in a civil war or during a belligerent military occupation then those who participate in such actions would not be privileged belligerents. The principle of plausible deniability is usually applied for pseudo-teams. (See the above section Laws of war). Some false flag operations have been described by Lawrence E. Cline, a retired US Army intelligence officer, as pseudo-operations, or “the use of organized teams which are disguised as guerrilla groups for long- or short-term penetration of insurgent-controlled areas.”
Pseudo Operations should be distinguished, notes Cline, from the more common police or intelligence infiltration of guerrilla or criminal organizations. In the latter case, infiltration is normally done by individuals. Pseudo teams, on the other hand, are formed as needed from organized units, usually military or paramilitary. The use of pseudo teams has been a hallmark of a number of foreign counterinsurgency campaigns.”
The Basra’s jail incident is a recent example of the use of false flag undercover operations in modern military operations: On September 19th 2005 two agents from the British special forces opened fire on Iraqi soldiers disguised as members of a local terrorist group. According to witnesses , they weren’t able to escape the area because the local authorities had enforced military checkpoints throughout the city. The British SAS and the US army had to deploy combat helicopters and a dozen of armored vehicles in order to break into the jail and force the Iraqi authorities to hand over their agents before they could reveal any classified information.
See false flag penetrator.
In espionage the term “false flag” describes the recruiting of agents by operatives posing as representatives of a cause the prospective agents are sympathetic to, or even the agents’ own government. For example, during the Cold War, several female West German civil servants were tricked into stealing classified documents by agents of the East German Stasi intelligence service, pretending to be members of West German peace advocacy groups (the Stasi agents were also described as “Romeos,” indicating that they also used their sex appeal to manipulate their targets, making this operation a combination of the false flag and “honey trap” techniques).
The technique can also be used to expose enemy agents in one’s own service, by having someone approach the suspect and pose as an agent of the enemy. Earl Edwin Pitts, a 13-year veteran of the U.S. Federal Bureau of Investigation and an attorney, was caught when he was approached by FBI agents posing as Russian agents.
“ It was obvious that if the case were to be kept going a faked act of sabotage would have to be committed ”
— MI5 file on Mutt and Jeff
British intelligence officials in World War II allowed double agents to fire-bomb a power station and a food dump in the UK to protect their cover, according to declassified documents. The documents stated the agents took precautions to ensure they did not cause serious damage. One of the documents released also stated: “It should be recognised that friends as well as enemies must be completely deceived.”
In 2008 there was a shooting against two minibuses driving along in a volatile area right on the border between Abkhazia and the republic of Georgia. The buses were carrying Georgians who lived in Abkhazia and wanted to cross the border so they could go and vote in the parliamentary election that day.
The country had been experiencing internal political turmoil for the last year, and in an attempt to calm the situation, president Mikheil Saakashvili moved forward both presidential and parliamentary elections. However the presidential election in January that year was strongly contested, with hundreds of thousands attending protest rallies. When the parliamentary election came up in May, the mood was still tense.
On mid day May 21 the two minibuses came under attack with small arms and grenades, and though there were no casualties, three people were taken to a hospital in Zugdidi, where president Saakashvili later arrived and was filmed by TV at the patients’ bedside.
In his comments on TV, which dominated the news during election day, Saakashvili indicated that the attack had been an attempt to disrupt the election, implying that it had been Abkhaz or Russian forces who had been behind it. This provided for a favorable opportunity for the president to focus the nation’s attention on an external enemy, thereby leading attention away from his domestic critics, as well as making use of his position as leader to rally the Georgians around his candidates in the election.
However a United Nations investigation[dead link] later found, based on empty cartridges and the position of traces left by grenade launchers on the ground, that the attack had originated from a patch of land under control of Georgians and with weapons used by Georgian forces, indicating that the attack had been staged.
A Georgian investigative TV documentary later found that camera crew from the government-friendly channel Rustavi 2 had been in position with their equipment before the shooting took place.
While false flag operations originate in warfare and government, they also can occur in civilian settings among certain factions, such as businesses, special interest groups, religions, political ideologies and campaigns for office.
In business and marketing, similar operations are being employed in some public relations campaigns (see Astroturfing). Telemarketing firms practice false flag type behavior when they pretend to be a market research firm (referred to as “sugging”). In some rare cases, members of an unsuccessful business will destroy some of their own property to conceal an unrelated crime (e.g., safety violations, embezzlement) but make it appear as though the destruction was done by a rival company.
Political campaigning has a long history of this tactic in various forms, including in person, print media and electronically in recent years. This can involve when supporters of one candidate pose as supporters of another, or act as “straw men” for their preferred candidate to debate against. This can happen with or without the candidate’s knowledge. The Canuck letter is an example of one candidate creating a false document and attributing it as coming from another candidate in order to discredit that candidate.
In 2006, individuals practicing false flag behavior were discovered and “outed” in New Hampshire and New Jersey after blog comments claiming to be from supporters of a political candidate were traced to the IP address of paid staffers for that candidate’s opponent.
On February 19, 2011, Indiana Deputy Prosecutor Carlos Lam sent a private email to Wisconsin Governor Scott Walker suggesting that he run a “‘false flag’ operation” to counter the protests against Walker’s proposed restrictions on public employees’ collective bargaining rights.
“If you could employ an associate who pretends to be sympathetic to the unions’ cause to physically attack you (or even use a firearm against you), you could discredit the unions,” read the email. It went on to say that the effort “would assist in undercutting any support that the media may be creating in favor of the unions.” The press had acquired a court order to access all of Walker’s emails and Lam’s email was exposed. At first, Lam vehemently denied it, but eventually admitted it and resigned.
Proponents of political or religious ideologies will sometimes use false flag tactics. This can be done to discredit or implicate rival groups, create the appearance of enemies when none exist, or create the illusion of organized and directed opposition when in truth, the ideology is simply unpopular with society.
A bomb threat forged by Scientology operatives
In retaliation for writing The Scandal of Scientology, the Church of Scientology stole stationery from author Paulette Cooper’s home and then used that stationery to forge bomb threats and have them mailed to a Scientology office. The Guardian’s Office also had a plan for further operations to discredit Cooper known as Operation Freakout, but several Scientology operatives were arrested in a separate investigation and the plan failed.
False flag tactics were also employed during the Algerian civil war, starting in the middle of 1994. Death squads composed of Département du Renseignement et de la Sécurité (DRS) security forces disguised themselves as Islamist terrorists and committed false flag terror attacks. Such groups included the Organisation of Young Free Algerians (OJAL) or the Secret Organisation for the Safeguard of the Algerian Republic (OSSRA) According to Roger Faligot and Pascal Kropp (1999), the OJAL was reminiscent of “the Organization of the French Algerian Resistance (ORAF), a group of counter-terrorists created in December 1956 by the Direction de la surveillance du territoire (Territorial Surveillance Directorate, or DST) whose mission was to carry out terrorist attacks with the aim of quashing any hopes of political compromise”.
The Russian apartment bombings in the Russian cities of Buynaksk, Moscow, and Volgodonsk in September 1999 which killed nearly 300 people, was described by Yury Felshtinsky, Alexander Litvinenko, David Satter, Boris Kagarlitsky, Vladimir Pribylovsky, Anna Politkovskaya, filmmaker Andrei Nekrasov, investigator Mikhail Trepashkin, Russian politician Alexander Lebed as a false flag terrorist attack coordinated by the Federal Security Service, the main domestic security agency of the Russian Federation.
Main article: Dirty War
During a 1981 interview whose contents were revealed by documents declassified by the U.S. Central Intelligence Agency (CIA) in 2000, former CIA and Dirección de Inteligencia Nacional (DINA) agent Michael Townley explained that Ignacio Novo Sampol, member of CORU, an anti-Castro organization, had agreed to commit the Cuban Nationalist Movement in the kidnapping, in Buenos Aires, of a president of a Dutch bank. The abduction, organized by civilian SIDE agents, the Argentine intelligence agency, was to obtain a ransom. Townley said that Novo Sampol had provided six thousand dollars from the Cuban Nationalist Movement, forwarded to the civilian SIDE agents to pay for the preparation expenses of the kidnapping. After returning to the US, Novo Sampol sent Townley a stock of paper, used to print pamphlets in the name of “Grupo Rojo” (Red Group), an imaginary Argentine Marxist terrorist organization, which was to claim credit for the kidnapping of the Dutch banker. Townley declared that the pamphlets were distributed in Mendoza and Córdoba in relation with false flag bombings perpetrated by SIDE agents, which had as their aim to accredit the existence of the fake Grupo Rojo. However, the SIDE agents procrastinated too much, and the kidnapping ultimately was not carried out.
Joe job, a similar online concept
This section does not cite any references or sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed. (August 2011)
Bloed, Bodem, Eer en Trouw (Flemish neo-Nazi group preparing false flag attacks)
Saddam Hussein and al-Qaeda link allegations (Roots of Iraq war)
CIA Operation Ajax (United States overthrowing of Mohammed Mossadeq, Prime Minister of Iran, in 1953)
CIA Operation Northwoods was a Plan to blame Cuba for a Terrorist attack in order to get a pretext for ‘justified’ War of aggression after USA funded and organized failed Terrorist attack known as CIA Operation Mongoose.
CIA PBSUCCESS (United States Operation for overthrowing the Arbenz government in Guatemala in 1954)
CIA Project Cherry ( United States non-stop assassination project to kill Norodom Sihanouk, Prince, and later King of Cambodia)
Gleiwitz incident aka Operation Himmler
Istanbul riots (Anti-Greek/Christian pogrom 1955)
Kommandoverband Jaguar German army unit conducting deep reconnaissance in Soviet uniforms
Lavon Affair Israeli attempt to plant bombs in Western targets in Egypt, in blaming Arab elements
Marxist-Leninist Party of the Netherlands (fake party set up by the Dutch security service)
Masada Action and Defense Movement (French white supremacists, under the guise of a fake extremist Zionist movement, conducted bombings of Arab targets in France in an attempt to start a war between French Arabs and Jews.)
Reichstag Fire, which led to the Reichstag Fire Decree which suspended the Weimar Constitution until the end of the Third Reich
Shelling of Mainila by Joseph Stalin and USSR in order to get pretext for ‘justified’ war of aggression named Winter War
SIS (MI6) Operation Boot (UK Operation for overthrowing of Mohammed Mossadeq, Prime Minister of Iran, in 1953 with Americans)
Special Activities Division
The Plaza Miranda Bombings in the Philippines, which led to Ferdinand Marcos’s suspension of the writ of habeas corpus.
The strategy of tension in Italy during the 1970s, when right-wing Italian, Spanish, Greek, and CIA agents caused various terrorist acts in Italy, which were publicly laid to Communist terrorist groups that were actually fakes, and to the Red Brigades who were actually innocent of these particular crimes
Notes and references
Jump up ^ Hughes, Geraint (2011): The Military’s Role in Counterterrorism: Examples and Implications for Liberal Democracies, Letort Paper, Strategic Studies Institute, May. p.105 http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1066.pdf
Jump up ^ deHaven-Smith, Lance (2013). Conspiracy Theory in America, Austin: University of Texas Press. pp.225-226 http://utpress.utexas.edu/index.php/books/dehcon
Jump up ^ Scott, Peter Dale (2007). The Road to 9/11: Wealth, Empire, and the Future of America, Berkeley: University of California Press. pp.267-268 (http://www.ucpress.edu/book.php?isbn=9780520258716)
Jump up ^ deHaven-Smith, Lance (2013). Conspiracy Theory in America, Austin: University of Texas Press. pp.225
Jump up ^ “the use of a false flag has always been accepted as a legitimate ruse de guerre in naval warfare, the true battle flag being run up immediately before engaging” (Thomas, Rosamund M., ed. (1993), Teaching Ethics: Government ethics, Centre for Business and Public, p. 80, ISBN 9781871891034).
Jump up ^ Squires, Nick. “HMAS Sydney found off Australia’s west coast”, The Telegraph, 2008-03-17.
Jump up ^ Guinness World Records (2009), p.155
Jump up ^ Young, P (Ed) (1973) Atlas of the Second World War (London: The Military Book Society)
Jump up ^ The Hague Rules of Air Warfare, 1922-12 to 1923-02, this convention was never adopted (backup site)
Jump up ^ “Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare. Drafted by a Commission of Jurists at the Hague, December 1922 – February 1923.: Introduction”. ICRC. Retrieved December 2010.
Jump up ^ Gómez, Javier Guisández (20 June 1998). “The Law of Air Warfare”. International Review of the Red Cross 38 (323): 347–63. doi:10.1017/S0020860400091075.
Jump up ^ Source: Law Reports of Trials of War Criminals. United Nations War Crimes Commission. Vol. IX, 1949: Trial of Otto Skorzeny and others General Military Government Court of the U.S. zone of Germany August 18 to September 9, 1947
Jump up ^ [[#CITEREF(Finnish) Mattila, Tapani (1983). Meri maamme turvana [Sea safeguarding our country] (in Finnish). Jyväskylä: K. J. Gummerus Osakeyhtiö. ISBN 951-99487-0-8.|(Finnish) Mattila, Tapani (1983). Meri maamme turvana [Sea safeguarding our country] (in Finnish). Jyväskylä: K. J. Gummerus Osakeyhtiö. ISBN 951-99487-0-8. ()]], p. 142.
Jump up ^ http://www.britannica.com/EBchecked/topic/216971/Franco-German-War
Jump up ^ Howard, Michael. The Franco-Prussian War. New York: Dorset Press. 1990 [originally published in 1961]. ISBN 0-88029-432-9, page 55
Jump up ^ “The Destruction of USS Maine”. DEPARTMENT OF THE NAVY — NAVAL HISTORY AND HERITAGE COMMAND. Retrieved November 10, 2012.
Jump up ^ Rohter, Larry (February 14, 1998). “Havana Journal; Remember the Maine? Cubans See an American Plot Continuing to This Day”. New York Times. Retrieved November 10, 2012.
Jump up ^ Tobias, Fritz, The Reichstag Fire. New York: Putnam, 1964, pages 26–28.
Jump up ^ History of the Reichstag Fire in Berlin Germany
Jump up ^ “The Reichstag Fire”. Holocaust Encyclopedia. United States Holocaust Memorial Museum. Retrieved 12 August 2013.
Jump up ^ DW Staff (27 February 2008). “75 Years Ago, Reichstag Fire Sped Hitler’s Power Grab”. Deutsche Welle. Retrieved 12 August 2013.
Jump up ^ Kinzer, Stephen; John Wiley and Sons (2003). “All the Shah’s Men: An American Coup and the Roots of Middle East Terror (U)”. Journal of the American Intelligence Professional 48: 258. Retrieved 2007-02-04.
Jump up ^ U.S. Joint Chiefs of Staff, “Justification for US Military Intervention in Cuba (TS)”, U.S. Department of Defense, 13 March 1962. The Operation Northwoods document in PDF format on the website of the independent, non-governmental research institute the National Security Archive at the George Washington University Gelman Library, Washington, D.C. Direct PDF links: here and here.
Jump up ^ Excerpts from declassified 1962 U.S. Joint Chiefs of Staff Memo “Operation Northwoods: Justification for U.S. Military Intervention in Cuba”
Jump up ^ Inside the Assassination Records Review Board: The U.S. Government’s Final Attempt to Reconcile the Conflicting Medical Evidence in the Assassination of JFK, Douglas P. Horne, Chief Analyst for Military Records, Assassination Records Review Board, 2009, self-published through Amazon.com
Jump up ^ James Bamford (2002). Body of Secrets: Anatomy of the Ultra-secret National Security Agency. Anchor Books. pp. 82–91.
Jump up ^ Moïse, Edwin E. (1996). Tonkin Gulf and the Escalation of the Vietnam War. Chapel Hill: University of North Carolina Press. p. 78. ISBN 0-8078-2300-7.
Jump up ^ Moïse 1996, pp. 106, 107.
^ Jump up to: a b Robert J. Hanyok, “Skunks, Bogies, Silent Hounds, and the Flying Fish: The Gulf of Tonkin Mystery, 2-4 August 1964”, Cryptologic Quarterly, Winter 2000/Spring 2001 Edition, Vol. 19, No. 4 / Vol. 20, No. 1.
Jump up ^ Hanyok article (page 177)
Jump up ^ Barklie, Nigel. “Debunking Conspiracy Theories In ‘Voodoo Histories'”. NPR. Retrieved 14 August 2013. “These can be as ancient as the Gunpowder Plot of 1605, and today may include references to Pearl Harbor, the Reichstag fire, and the 1965 Gulf of Tonkin incident.”
Jump up ^ Bumiller, Elisabeth (2010-07-14). “Records Show Doubts on ’64 Vietnam Crisis”. The New York Times. Retrieved 12 August 2013. “Mr. Hanyok concluded in 2001 that NSA officers had deliberately falsified intercepted communications in the incident to make it look like the attack on Aug. 4, 1964, had occurred…”
Jump up ^ Shane, Scott (2005-12-02). “Vietnam War Intelligence ‘Deliberately Skewed,’ Secret Study Says”. The New York Times. Retrieved 12 August 2013. “…argued that the agency’s intelligence officers “deliberately skewed” the evidence passed on to policy makers and the public to falsely suggest that North Vietnamese ships had attacked American destroyers…”
Jump up ^ Escobar, Pepe (2012-01-17). “Why Iran sanctions are doomed to fail”. CBS News. Retrieved 14 August 2013. “…the Gulf of Tonkin incident in 1964, used by President Lyndon Johnson as a justification for widening the Vietnam War. …Later, it became clear…the president had lied about it. It’s not at all far-fetched to imagine…the Pentagon riding a false-flag incident in the Persian Gulf to an attack on Iran…”
Jump up ^ Lendman, Stephen (2012-06-25). “Gulf of Tonkin Redux?”. Veterans Today. Retrieved 12 August 2013.
Jump up ^ Cohen, Jeff; Norman Solomon. “30-year Anniversary: Tonkin Gulf Lie Launched Vietnam War”. Fairness & Accuracy in Reporting. Retrieved 12 August 2013.
Jump up ^ Agence France Presse (9 January 2008). “Report Reveals Vietnam War Hoaxes, Faked Attacksj”. Common Dreams. Retrieved 12 August 2013.
^ Jump up to: a b Cline, Lawrence E. (2005) Pseudo Operations and Counterinsurgency: Lessons from other countries, Strategic Studies Institute.
Jump up ^ Cline (2005), p. 11.
Jump up ^ Cline (2005), quoting Reid-Daly, Pamwe Chete: The Legend of the Selous Scouts, Weltevreden Park, South Africa: Covos-Day Books, 1999, p. 10 (republished by Covos Day, 2001, ISBN 978-1-919874-33-3)
Jump up ^ Cline (2005), who quotes David Martin and Phyllis Johnson, The Struggle for Zimbabwe: the Chimurenga War, New York: Monthly Review Press, 1981, pp. 241–242.
Jump up ^ Cline (2005), p. 8–13. For 1978 study, quotes J. K. Cilliers, Counter-insurgency in Rhodesia, London: Croom Helm, 1985, pp. 60–77. Cline also quotes Ian F. W. Beckett, The Rhodesian Army: Counter-Insurgency 1972–1979 at selousscouts
Jump up ^ http://www.guardian.co.uk/world/2005/sep/20/iraq.military
Jump up ^ http://www.nytimes.com/2005/09/20/international/middleeast/20iraq.html
Jump up ^ http://archives.lautjournal.info/autjourarchives.asp?article=2411&noj=244
Jump up ^ Crawford, Angus (20 March 2009). “Victims of Cold War ‘Romeo spies'”. BBC Online. Retrieved 10 April 2009.
^ Jump up to: a b “Britain ‘bombed itself to fool Nazis'”. BBC. 2002-02-28. Retrieved 2008-11-04.
Jump up ^ “Report of the Secretary-General on the situation in Abkhazia, Georgia”. United Nations Security Council. 2008-07-23. Retrieved 2008-08-21.
Jump up ^ Steele, Allison, “Bass staffer in D.C. poses as blogger: Bogus posts aimed at his political opponent”, Concord Monitor, September 26, 2006 (URL last accessed October 24, 2006).
Jump up ^ Saunders, Anne, “Bass aide resigns after posing as opponent’s supporter online”, The Boston Globe, September 26, 2006 (URL last accessed October 24, 2006).
Jump up ^ Miller, Jonathan, “Blog Thinks Aide to Kean Posted Jabs At Menendez”, New York Times, September 21, 2006 (URL last accessed October 24, 2006).
Jump up ^ Montopoli, Brian (March 25, 2011). “Indiana prosecutor resigns for encouraging fake attack on Wisconsin governor”. CBS News.
Jump up ^ United States of America v. Jane Kember, Morris Budlong, Sentencing Memorandum; pp. 23–25.
Jump up ^ Lounis Aggoun and Jean-Baptiste Rivoire (2004). Françalgérie, crimes et mensonges d’Etats, (Franco-Algeria, Crimes and Lies of the States). Editions La Découverte. ISBN 2-7071-4747-8. Extract in English with mention of the OJAL available here.
Jump up ^ Luonis Aggoun and Jean-Baptiste Rivoire, ibid., quoting Roger Faligot and Pascal KROP, DST, Police Secrète, Flammarion, 1999, p. 174.
Jump up ^ Boris Kagarlitsky, a member of the Russian Academy of Sciences Institute of Comparative Politics, writing in the weekly Novaya Gazeta says that the bombings in Moscow and elsewhere were arranged by the GRU
Jump up ^ David Satter – House committee on Foreign Affairs
Jump up ^ Felshtinsky & Pribylovsky 2008, pp. 105–111
Jump up ^ Video on YouTubeIn Memoriam Aleksander Litvinenko, Jos de Putter, Tegenlicht documentary VPRO 2007, Moscow, 2004 Interview with Anna Politkovskaya
Jump up ^ Russian Federation: Amnesty International’s concerns and recommendations in the case of Mikhail Trepashkin – Amnesty International
Jump up ^ Bomb Blamed in Fatal Moscow Apartment Blast, Richard C. Paddock, Los Angeles Times, September 10, 1999
Jump up ^ At least 90 dead in Moscow apartment blast, from staff and wire reports, CNN, September 10, 1999
Jump up ^ Evangelista 2002, p. 81
Jump up ^ Did Putin’s Agents Plant the Bombs?, Jamie Dettmer, Insight on the News, April 17, 2000.
Jump up ^ ’’The consolidation of Dictatorship in Russia’’ by Joel M. Ostrow, Georgil Satarov, Irina Khakamada p. 96
Jump up ^ McCain decries “New authoritarianism in Russia”, November 4, 2003
Jump up ^ Visit by Guillermo Novo Sampol to Chile in 1976, 1 and 2, on the National Security Archive website
Jump up ^ Garretwilson.com
18 USC Sec. 1001:
(a) Except as otherwise provided in this section, whoever, in any matter within the jurisdiction of the executive, legislative, or judicial branch of the Government of the United States, knowingly and willfully—
(1) falsifies, conceals, or covers up by any trick, scheme, or device a material fact;
(2) makes any materially false, fictitious, or fraudulent statement or representation; or
(3) makes or uses any false writing or document knowing the same to contain any materially false, fictitious, or fraudulent statement or entry;
shall be fined under this title, imprisoned not more than 5 years or, if the offense involves international or domestic terrorism (as defined in section 2331), imprisoned not more than 8 years, or both. If the matter relates to an offense under chapter 109A, 109B, 110, or 117, or section 1591, then the term of imprisonment imposed under this section shall be not more than 8 years.