Escolar Documentos
Profissional Documentos
Cultura Documentos
False Flag
False Flag
False colors redirects here. For the imaging technique, its crew was captured, but it was a considerable psychosee False-color.
logical victory for the Germans.[6]
The British used a Kriegsmarine ensign in the St Nazaire
Raid and captured a German code book. The old destroyer Campbeltown, which the British planned to sacrice in the operation, was provided with cosmetic modications, cutting the ships funnels and chamfering the
edges to resemble a German Type 23 torpedo boat The
British were able to get within two miles (3 km) of
the harbour before the defences responded, where the
explosive-rigged Campbeltown and commandos successfully disabled or destroyed the key dock structures of the
port.[7][8]
False ag (or black ag) describes covert operations designed to deceive in such a way that the operations appear
as though they are being carried out by entities, groups,
or nations other than those who actually planned and executed them. Operations carried out during peace-time
by civilian organizations, as well as covert government
agencies, may by extension be called false ag operations
if they seek to hide the real organization behind an operation. Geraint Hughes uses the term to refer to those
acts carried out by military or security force personnel,
which are then blamed on terrorists.[1]
deHaven-Smith argues that the terminology has become
looser in recent years due to the increasingly complex
levels of duplicity and international intrigue between
states.[2] Peter Dale Scott argues that false ags are methods used by deep states as a form of deep politics.[3]
military tribunal at the Dachau Trials. In this trial, the tribunal did not nd Skorzeny guilty of a crime by ordering
his men into action in American uniforms. He had passed
on to his men the warning of German legal experts, that if
they fought in American uniforms, they would be breaking the laws of war, but they probably were not doing so
1
In 1788, the head tailor at the Royal Swedish Opera received an order to sew a number of Russian military uniforms. These were then used by the Swedes to stage
an attack on Puumala, a Swedish outpost on the RussoSwedish border, on 27 June 1788. This caused an outrage
in Stockholm and impressed the Riksdag of the Estates,
the Swedish national assembly, who until then had refused to agree to an oensive war against Russia. The
2.4
Cold War
2.2
Alfred Naujocks
World War II
Gleiwitz incident
The Gleiwitz incident in 1939 involved Reinhard Heydrich fabricating evidence of a Polish attack against
Germany to mobilize German public opinion for war and
to justify the war with Poland. Alfred Naujocks was a
key organiser of the operation under orders from Heydrich. It led to the deaths of Nazi concentration camp
victims who were dressed as German soldiers and then
shot by the Gestapo to make it seem that they had been
shot by Polish soldiers. This, along with other false ag
operations in Operation Himmler, would be used to mobilize support from the German population for the start
of World War II in Europe.[15]
The operation failed to convince international public
opinion of the German claims, and both Britain and
FrancePolands alliesdeclared war two days after
Germany invaded Poland.[16]
3
3.1
5
ing election day, Saakashvili indicated that the attack had
been an attempt to disrupt the election, implying that it
had been Abkhaz or Russian forces who had been behind
it. This provided for a favorable opportunity for the president to focus the nations attention on an external enemy,
thereby leading attention away from his domestic critics,
as well as making use of his position as leader to rally the
Georgians around his candidates in the election.
An investigation by the United Nations Observer Mission
in Georgia found that the attackers were located on the
Georgian side of the ceasere line, about 100m from the
buses, and that although hard evidence of the attackers
identities was lacking, inconsistencies merited further investigation, particularly the suggestion that the lming of
the attack seemed anticipatory.[29]
A Georgian investigative TV documentary later found
that camera crew from the government-friendly channel
Rustavi 2 had been in position with their equipment before the shooting took place.
Pseudo-operations
6
fensive actions, including the attempted assassination of
Zimbabwe Peoples Revolutionary Army leader Joshua
Nkomo in Zambia. This mission was nally aborted by
the Selous Scouts, and attempted again, unsuccessfully,
by the Rhodesian Special Air Service.[31]
Some oensive operations attracted international condemnation, in particular the Selous Scouts raid on a
Zimbabwe African National Liberation Army (ZANLA)
camp at Nyadzonya Pungwe, Mozambique in August
1976. ZANLA was then led by Josiah Tongogara. Using
Rhodesian trucks and armored cars disguised as Mozambique military vehicles, 84 scouts killed 1,284 people in
the camp-the camp was registered as a refugee camp by
the United Nations (UN). Even according to Reid-Daly,
most of those killed were unarmed guerrillas standing
in formation for a parade. The camp hospital was also
set ablaze by the rounds red by the Scouts, killing all
patients.[32] According to David Martin and Phyllis Johnson, who visited the camp shortly before the raid, it was
only a refugee camp that did not host any guerrillas. It
was staged for UN approval.[33]
6 CIVILIAN USAGE
terrorists created in December 1956 by the Direction de
la surveillance du territoire (Territorial Surveillance Directorate, or DST) whose mission was to carry out terrorist attacks with the aim of quashing any hopes of political
compromise.[36]
5 Espionage
Main article: False ag penetrator
In espionage the term false ag describes the recruiting of agents by operatives posing as representatives of a
cause the prospective agents are sympathetic to, or even
the agents own government. For example, during the
Cold War, several female West German civil servants
were tricked into stealing classied documents by agents
of the East German Stasi intelligence service, pretending
to be members of West German peace advocacy groups
(the Stasi agents were also described as "Romeos, indicating that they also used their sex appeal to manipulate
According to a 1978 study by the Directorate of Military their targets, making this operation a combination of the
Intelligence, 68% of all insurgent deaths inside Rhodesia false ag and "honey trap" techniques).[37]
could be attributed to the Selous Scouts, who were disThe technique can also be used to expose enemy agents in
banded in 1980.[34]
ones own service, by having someone approach the susIf the action is a police action, then these tactics would pect and pose as an agent of the enemy. Earl Edwin Pitts,
fall within the laws of the state initiating the pseudo, but if a 13-year veteran of the U.S. Federal Bureau of Investigasuch actions are taken in a civil war or during a belligerent tion and an attorney, was caught when he was approached
military occupation then those who participate in such by FBI agents posing as Russian agents.
actions would not be privileged belligerents. The principle of plausible deniability is usually applied for pseudo- British intelligence ocials in World War II allowed douteams. (See the above section Laws of war). Some ble agents to re-bomb a power station and a food dump
false ag operations have been described by Lawrence E. in the UK to protect their cover, according to declassied
Cline, a retired US Army intelligence ocer, as pseudo- documents. The documents stated the agents took preoperations, or the use of organized teams which are dis- cautions to ensure they did not cause serious damage.
guised as guerrilla groups for long- or short-term pene- One of the documents released also stated: It should be
recognised that friends as well as enemies must be comtration of insurgent-controlled areas.
pletely deceived.[38]
Pseudo Operations should be distinguished, notes Cline,
from the more common police or intelligence inltration
of guerrilla or criminal organizations. In the latter case,
inltration is normally done by individuals. Pseudo 6 Civilian usage
teams, on the other hand, are formed as needed from organized units, usually military or paramilitary. The use of While false ag operations originate in warfare and govpseudo teams has been a hallmark of a number of foreign ernment, they also can occur in civilian settings among
certain factions, such as businesses, special interest
counterinsurgency campaigns.[30]
groups, religions, political ideologies and campaigns for
Similar false ag tactics were also employed during the
oce.
Algerian civil war, starting in the middle of 1994. Death
squads composed of Dpartement du Renseignement et
de la Scurit (DRS) security forces disguised them6.1 Businesses
selves as Islamist terrorists and committed false ag terror attacks. Such groups included the Organisation of
In business and marketing, similar operations are beYoung Free Algerians (OJAL) or the Secret Organisation
ing employed in some public relations campaigns (see
for the Safeguard of the Algerian Republic (OSSRA)[35]
Astroturng). Telemarketing rms practice false ag
According to Roger Faligot and Pascal Kropp (1999),
type behavior when they pretend to be a market research
the OJAL was reminiscent of the Organization of the
rm (referred to as "sugging"). In some rare cases, memFrench Algerian Resistance (ORAF), a group of counterbers of an unsuccessful business will destroy some of their
7
own property to conceal an unrelated crime (e.g., safety
violations, embezzlement) but make it appear as though
the destruction was done by a rival company.
6.2
Political campaigning
7.1 Concepts
Agent provocateur
Black propaganda
Casus belli
Covert operation
Denial and deception
Front organization
6.3
Ideological
Proponents of political or religious ideologies will sometimes use false ag tactics. This can be done to discredit
or implicate rival groups, create the appearance of enemies when none exist, or create the illusion of organized
and directed opposition when in truth, the ideology is
simply unpopular with society.
In retaliation for writing The Scandal of Scientology, some
members of the Church of Scientology stole stationery
from author Paulette Cooper's home and then used that
8
Lavon Aair Israeli attempt to plant bombs in Western targets in Egypt, in blaming Arab elements
Marxist-Leninist Party of the Netherlands (fake
party set up by the Dutch security service)
Masada Action and Defense Movement (French
white supremacists, under the guise of a fake extremist Zionist movement, conducted bombings of
Arab targets in France in an attempt to start a war
between French Arabs and Jews.)
Operation Gladio
[1] Hughes, Geraint (2011): The Militarys Role in Counterterrorism: Examples and Implications for Liberal
Democracies, Letort Paper, Strategic Studies Institute,
May. p.105 http://www.strategicstudiesinstitute.army.
mil/pdffiles/PUB1066.pdf
[2] deHaven-Smith, Lance (2013). Conspiracy Theory in
America, Austin: University of Texas Press. pp.225-226
http://utpress.utexas.edu/index.php/books/dehcon
[3] Scott, Peter Dale (2007). The Road to 9/11: Wealth, Empire, and the Future of America, Berkeley: University of
California Press. pp.267-268 (http://www.ucpress.edu/
book.php?isbn=9780520258716)
[4] deHaven-Smith, Lance (2013). Conspiracy Theory in
America, Austin: University of Texas Press. p.225
[5] the use of a false ag has always been accepted as a legitimate ruse de guerre in naval warfare, the true battle
ag being run up immediately before engaging (Thomas,
Rosamund M., ed. (1993), Teaching Ethics: Government ethics, Centre for Business and Public, p. 80, ISBN
9781871891034).
[6] Squires, Nick. "HMAS Sydney found o Australias west
coast", The Telegraph, 17 March 2008.
[7] Guinness World Records (2009), p.155
[8] Young, P (Ed) (1973) Atlas of the Second World War
(London: The Military Book Society)
[25] DW Sta (27 February 2008). 75 Years Ago, Reichstag Fire Sped Hitlers Power Grab. Deutsche Welle. Retrieved 12 August 2013.
[29] Report of the Secretary-General on the situation in Abkhazia, Georgia (PDF). United Nations Security Council.
23 July 2008. Retrieved 21 August 2008.
[30] Cline, Lawrence E. (2005) Pseudo Operations and Counterinsurgency: Lessons from other countries, Strategic
Studies Institute.
[31] Cline (2005), p. 11.
[32] Cline (2005), quoting Reid-Daly, Pamwe Chete: The Legend of the Selous Scouts, Weltevreden Park, South Africa:
Covos-Day Books, 1999, p. 10 (republished by Covos
Day, 2001, ISBN 978-1-919874-33-3)
[33] Cline (2005), who quotes David Martin and Phyllis Johnson, The Struggle for Zimbabwe: the Chimurenga War,
New York: Monthly Review Press, 1981, pp. 241242.
[34] Cline (2005), p. 813. For 1978 study, quotes J. K.
Cilliers, Counter-insurgency in Rhodesia, London: Croom
Helm, 1985, pp. 6077. Cline also quotes Ian F. W.
Beckett, The Rhodesian Army: Counter-Insurgency 1972
1979 at selousscouts
[35] Lounis Aggoun and Jean-Baptiste Rivoire (2004).
Franalgrie, crimes et mensonges dEtats, (FrancoAlgeria, Crimes and Lies of the States). Editions La
Dcouverte. ISBN 2-7071-4747-8. Extract in English
with mention of the OJAL available here.
[36] Luonis Aggoun and Jean-Baptiste Rivoire, ibid., quoting Roger Faligot and Pascal KROP, DST, Police Secrte,
Flammarion, 1999, p. 174.
[37] Crawford, Angus (20 March 2009). Victims of Cold
War 'Romeo spies". BBC Online. Retrieved 10 April
2009.
[38] Britain 'bombed itself to fool Nazis". BBC. 28 February
2002. Retrieved 4 November 2008.
[39] http://news.google.com/newspapers?nid=1346&
dat=19951211&id=gZosAAAAIBAJ&sjid=
wfwDAAAAIBAJ&pg=4981,49418 Lakeland Times
1995
[40] Steele, Allison, "Bass staer in D.C. poses as blogger: Bogus posts aimed at his political opponent", Concord Monitor, 26 September 2006 (URL last accessed 24 October
2006).
[41] Saunders, Anne, Bass aide resigns after posing as opponents supporter online, The Boston Globe, 26 September
2006 (URL last accessed 24 October 2006).
[42] Miller, Jonathan, Blog Thinks Aide to Kean Posted Jabs At
Menendez, New York Times, 21 September 2006 (URL
last accessed 24 October 2006).
[43] Montopoli, Brian (25 March 2011). Indiana prosecutor
resigns for encouraging fake attack on Wisconsin governor. CBS News.
[44] United States of America v. Jane Kember, Morris Budlong, Sentencing Memorandum; pp. 2325.
10
9.1
Text
False ag Source: https://en.wikipedia.org/wiki/False_flag?oldid=669401057 Contributors: Olivier, Jdlh, Michael Hardy, Ixfd64, IZAK,
Skysmith, Kingturtle, Ugen64, GCarty, Wikiborg, Furrykef, Tempshill, AnonMoos, Vardion, PBS, Donreed, ZimZalaBim, Bkell, Carnildo,
Tom harrison, Capitalistroadster, Iceberg3k, Tagishsimon, GeneMosher, Tothebarricades.tk, Kevin B12, Asbestos, Neutrality, Klemen
Kocjancic, Cab88, D6, Jayjg, Discospinster, Wikiacc, Narsil, Kostja, Antaeus Feldspar, Bender235, El C, Ascorbic, Cacophony, Martey,
Mike Schwartz, John Vandenberg, Wiki-Ed, Toh, Hardy, La goutte de pluie, BM, Idleguy, Mrzaius, Alansohn, Uncle.bungle, Hackwrench,
Geo Swan, PatrickFisher, Ynhockey, Malo, Bart133, Max rspct, M3tainfo, Lapinmies, Kober, Vuo, Alai, LukeSurl, Zntrip, Hq3473,
Richard Arthur Norton (1958- ), OwenX, Woohookitty, Mindmatrix, Timharwoodx, Je3000, MONGO, Mangojuice, SDC, Plrk, Stefanomione, Betsythedevine, Mandarax, RedBLACKandBURN, Graham87, A Train, Kbdank71, Dpr, Rjwilmsi, Bill Cannon, Carbonite,
Jtpaladin, The wub, Tarc, KiernMoran, Fred Bradstadt, Cassowary, Ground Zero, FrancisDrake, MacRusgail, GagHalfrunt, Tequendamia,
Diza, Coolhawks88, Bgwhite, WriterHound, Cornellrockey, Jayme, Subwayguy, YurikBot, Kollision, Jimp, John Quincy Adding Machine,
Briaboru, Zaroblue05, DanMS, Kirill Lokshin, Shaddack, Big Brother 1984, Aryaniae, LaszloWalrus, Grafen, Nutiketaiel, Aaron Brenneman, Lomn, Ospalh, Syrthiss, IceWeasel, BusterD, Miraculouschaos, Closedmouth, E Wing, Petri Krohn, Garybel, Shyam, Ephilei,
Kurai, Je Silvers, Paul Pieniezny, Victor falk, JohnLeonard, SmackBot, Nicolas Barbier, Stie, Kintetsubualo, Nil Einne, Portillo, GoldDragon, Ksenon, Kaliz, Jprg1966, Hugzz, Sloane, Paulfp, Sb617, AKMask, Tewk, Xeryus, Ian Burnet~enwiki, Chendy, Ncameron, JRPG,
Tim Pierce, Georey Gibson, Bolivian Unicyclist, Robma, Cybercobra, Akral, Xyzzy n, Chrylis, Weregerbil, Doodle77, Xiutwel, Kukini,
Tesseran, Crouchbk, Byelf2007, Ser Amantio di Nicolao, Tazmaniacs, Robosh, JoshuaZ, Mgiganteus1, Minglex, Cmh, Karlwiegand,
Meco, Dr.K., SmokeyJoe, OnBeyondZebrax, Skandaprasadn, Clarityend, Poechalkdust, Hwonder, Joseph Solis in Australia, AlexLibman,
Phoenixrod, Lent, Generalcp702, Ehistory, CmdrObot, Megaboz, Olaf Davis, Erik Kennedy, Dgw, Outriggr, Location, Cydebot, Treybien, Goldfritha, Gogo Dodo, Manik52, DumbBOT, Patrick O'Leary, Mathew5000, Septagram, Satori Son, Mamalujo, Malleus Fatuorum,
Thijs!bot, Interested2, Ucanlookitup, Hcberkowitz, Bobblehead, Davidhorman, Kingnixon, Oreo Priest, AntiVandalBot, Opelio, JHFTC,
Joe Schmedley, Legitimus, Arkan5, Erxnmedia, JAnDbot, MarritzN, Minitrue, Attarparn, Lsi, Acroterion, Bencherlite, Canjth, Parsecboy,
NeoJudus, LCJ, SSZ, Bryanpeterson, JaGa, Pax:Vobiscum, Gwern, Dan Dean, Phantomsnake, General Jazza, Ekotekk, KTo288, Nono64,
Pharaoh of the Wizards, PCock, Rodrigo braz, PalestineRemembered, JPLeonard, Maurice Carbonaro, Hodja Nasreddin, Cop 663, Grosscha, RenniePet, Chiswick Chap, Spartelite, C1010, DadaNeem, Xyl 54, Vanished user 39948282, Julyda4th, WLRoss, Ashcroftgm,
Morenooso, Indubitably, Nug, TXiKiBoT, Xenophrenic, Zurishaddai, Room429, EnglishDez, Jaqen, Andrewaskew, Enigmaman, Spadgos, THEODICEAN, AlleborgoBot, GavinTing, Guerillamarketing, StAnselm, DarknessEnthroned, Rabbeinu, Pretest, Jc-S0CO, Fredburks, Cicorp, Tensaije, Anakin101, Capitalismojo, ZaneSteez, LarRan, Sab128, Startswithj, Hoplon, MenoBot, ClueBot, MBD123,
The thing is, Binksternet, Mild Bill Hiccup, Foofbun, LonelyBeacon, Trivialist, Grandpallama, Geo247, CuandoCubango, P.jasons, Xme,
Mlas, Tony May, Thingg, Belchre, 3d-geo, DumZiBoT, Kurdo777, Sannleikur, Ost316, Dominatrixdave, Bazj, Addbot, Mhines54,
Heavenlyblue, MrZoolook, Daverogue, Disbelieve, Download, Fogeltk421, Lihaas, SpBot, Numbo3-bot, Peridon, Alanscottwalker, Lightbot, Nhalks, Aadieu, Henri rouge, PMLawrence, Reenem, AnomieBOT, VanishedUser sdu9aya9fasdsopa, DemocraticLuntz, Tryptosh,
Jim1138, McSaddle, Short Brigade Harvester Boris, Glenfarclas, Ulric1313, Materialscientist, Fuelsaver, Tbvdm, Cliftonian, LilHelpa,
Xqbot, MaxPuckett, Thouliha, Catastrophe420, Rbrt21, Srich32977, RibotBOT, Carrite, A Quest For Knowledge, Shadowjams, LucienBOT, Lothar von Richthofen, Mark Renier, MureMan, TurningWork, Haeinous, HJ Mitchell, Liverworth, Citation bot 1, Pinethicket,
Bmclaughlin9, RedBot, MastiBot, Nikolas93ts, ARMitre, Ionisiso, Princesssissi, Lotje, Defender of torch, Aoidh, Tbhotch, RjwilmsiBot,
Grondemar, EmausBot, John of Reading, WikitanvirBot, GoingBatty, Slightsmile, Acidrain4696, Doelleri, ZroBot, Ahears, Dpenn89,
MRBigdeli, Lhixson, Wingman4l7, Columbia666, Carmichael, Why is pizza so good?, Farizana94, Mcc1789, 8h3d0kg, Whoop whoop
pull up, ClueBot NG, Wertydm, Bazuz, CopperSquare, Helpful Pixie Bot, Legoless, Zlisha Khan, Regulov, BG19bot, Londonboy2011,
Shurusheero, Shorisharo, Terry Hildebrand, Darkness Shines, Mark Arsten, Great50, Jacob van Maerlant, Harizotoh9, Turnr44, BattyBot,
Gauzeandchess, Pratyya Ghosh, Ddcm8991, JYBot, Mogism, Ranze, XXzoonamiXX, Lugia2453, Keptautokeptauto, 93, Pc1985, Halsingpurg, Kabulbuddha, Jgmoneill, Chris troutman, MopSeeker, Lixinheth, GeeBee60, Ter M. Ahn, Damon161, Darkone123, Monkbot,
Magma1983, Gdeblois19, Phantomop, Mister Sneeze A Lot, A1491625 and Anonymous: 382
9.2
Images
File:193109_mukden_incident_railway_sabotage.jpg Source:
https://upload.wikimedia.org/wikipedia/commons/e/e8/193109_
mukden_incident_railway_sabotage.jpg License: Public domain Contributors: published in japanese newspaper Rekishi Syashin Original
artist: Unknown
File:Alfred_Naujocks.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/e9/Alfred_Naujocks.jpg License: Public domain
Contributors: U.S. National Archives and Records Administration, item number CW-004 Original artist: U.S. Army
File:Charlemagne_Pralte.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/e1/Charlemagne_P%C3%A9ralte.jpg License: Public domain Contributors: Nombreux sites Internet et ouvrages divers Original artist: Unknown
File:Cooper_bomb_threat.gif Source: https://upload.wikimedia.org/wikipedia/commons/b/bf/Cooper_bomb_threat.gif License: Public
domain Contributors: Transferred from en.wikipedia; transferred to Commons by User:Liftarn using CommonsHelper. Original artist:
Original uploader was ChrisO at en.wikipedia
File:NorthwoodsMemorandum.jpg Source: https://upload.wikimedia.org/wikipedia/commons/b/b1/NorthwoodsMemorandum.jpg License: Public domain Contributors: http://www.gwu.edu/~{}nsarchiv/news/20010430/doc1.pdf Original artist: ?
File:Question_book-new.svg Source: https://upload.wikimedia.org/wikipedia/en/9/99/Question_book-new.svg License: Cc-by-sa-3.0
Contributors:
Created from scratch in Adobe Illustrator. Based on Image:Question book.png created by User:Equazcion Original artist:
Tkgd2007
File:Wikisource-logo.svg Source: https://upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg License: CC BY-SA 3.0
Contributors: Rei-artur Original artist: Nicholas Moreau
9.3
9.3
Content license
Content license
11