False Flag
-
Upload
rick-zunigar -
Category
Documents
-
view
216 -
download
0
Transcript of False Flag
-
7/26/2019 False Flag
1/11
False flag
False colors redirects here. For the imaging technique,
seeFalse-color.
The contemporary term false flag describes covert oper-
This USDouglas A-26 C Invaderwas painted in fake Cuban Air
Force colors for themilitary invasion of Cubaundertaken by the
CIA-sponsored paramilitary groupBrigade 2506in April 1961.
ationsthat are designed to deceive in such a way that the
operations appear as though they are being carried out by
entities, groups, or nations other than those who actually
planned and executed them.[1]
Historically, the term false flag has its origins innaval
warfare where the use of a flag other than the belligerents
truebattle flagas a ruse de guerre, before engaging the
enemy, has long been accepted.[1]
Operations carried out during peace-time by civilian or-
ganizations, as well as covert government agencies, can
(by extension) also be called false flag operations if they
seek to hide the real organization behind an operation.
1 Use in warfare
In land warfare such operations are generally deemed ac-
ceptable in certain circumstances, such as to deceive ene-
mies providing that the deception is notperfidiousand all
such deceptions are discarded before opening fire upon
the enemy. Similarly innaval warfaresuch a deception
is considered permissible provided the false flag is low-
ered and the true flag raised before engaging in battle:[2]
auxiliary cruisers operated in such a fashion in both World
Wars, as did Q-ships, while merchant vessels were en-
couraged to use false flags for protection.
Such masquerades promoted confusion not just of the
enemy but of historical accounts: in 1914 theBattle ofTrindadewas fought between the British auxiliary cruiser
RMS Carmania and the German auxiliary cruiser SMS
Cap Trafalgarwhich had been altered to look like Car-
mania. (Contrary to some possibly mendacious accounts
the RMS Carmania hadnotbeen altered to resemble the
Cap Trafalgar.)
Another notable example was theWorld War IIGerman
commerce raider Kormoran which surprised and sank the
Australian light cruiserHMASSydneyin 1941 while dis-
guised as a Dutch merchant ship, causing the greatest
recorded loss of life on an Australian warship. While
Kormoran was fatally damaged in the engagement and
its crew captured the outcome represented a considerablepsychological victory for the Germans.[3]
Other examples from WWII included a Kriegsmarine
ensign in the St Nazaire Raid and captured a Germancode
book: the old destroyer Campbeltown, which the British
planned to sacrifice in the operation, was provided with
cosmetic modifications that involved cutting the ships
funnels andchamferingthe edges to resemble a German
Type 23 torpedo boat.
By this ruse the British were able to get within two miles
(3 km) of the harbour before the defences responded,
where the explosive-riggedCampbeltown
and comman-
dos successfully disabled or destroyed the key dock struc-
tures of the port.[4][5]
1.1 Air warfare
In December 1922February 1923, Rules concerning the
Control of Wireless Telegraphy in Time of War and Air
Warfare, drafted by a commission of jurists atthe Hague
regulates:[6]
Art. 3. A military aircraft must carry an exte-
rior mark indicating its nationality and its mil-
itary character.
Art. 19. The use of false exterior marks is for-
bidden.
This draft was never adopted as a legally binding treaty,
but theICRC states in its introduction on the draft that'To
a great extent, [the draft rules] correspond to the custom-
ary rules and general principles underlying treaties on the
law of war on land and at sea',[7] and as such these twononcontroversial articles were already part of customary
law.[8]
1
https://en.wikipedia.org/wiki/ICRChttps://en.wikipedia.org/wiki/The_Haguehttps://en.wikipedia.org/wiki/Torpedo_boathttps://en.wikipedia.org/wiki/Type_23_torpedo_boathttps://en.wikipedia.org/wiki/Chamferhttps://en.wikipedia.org/wiki/HMS_Campbeltown_(I42)https://en.wikipedia.org/wiki/Codehttps://en.wikipedia.org/wiki/St_Nazaire_Raidhttps://en.wikipedia.org/wiki/Ensignhttps://en.wikipedia.org/wiki/Kriegsmarinehttps://en.wikipedia.org/wiki/HMAS_Sydney_(1934)https://en.wikipedia.org/wiki/Battle_between_HMAS_Sydney_and_German_auxiliary_cruiser_Kormoranhttps://en.wikipedia.org/wiki/German_auxiliary_cruiser_Kormoranhttps://en.wikipedia.org/wiki/World_War_IIhttps://en.wikipedia.org/wiki/SMS_Cap_Trafalgarhttps://en.wikipedia.org/wiki/SMS_Cap_Trafalgarhttps://en.wikipedia.org/wiki/RMS_Carmania_(1905)https://en.wikipedia.org/wiki/Battle_of_Trindadehttps://en.wikipedia.org/wiki/Battle_of_Trindadehttps://en.wikipedia.org/wiki/Q-shiphttps://en.wikipedia.org/wiki/Auxiliary_cruiserhttps://en.wikipedia.org/wiki/Naval_warfarehttps://en.wikipedia.org/wiki/Perfidioushttps://en.wikipedia.org/wiki/Government_agencyhttps://en.wikipedia.org/wiki/Ruse_de_guerrehttps://en.wikipedia.org/wiki/Battle_ensignhttps://en.wikipedia.org/wiki/Naval_warfarehttps://en.wikipedia.org/wiki/Naval_warfarehttps://en.wikipedia.org/wiki/Brigade_2506https://en.wikipedia.org/wiki/Bay_of_Pigs_invasionhttps://en.wikipedia.org/wiki/Covert_operationhttps://en.wikipedia.org/wiki/Covert_operationhttps://en.wikipedia.org/wiki/False-color -
7/26/2019 False Flag
2/11
2 2 AS PRETEXTS FOR WAR
1.2 Land warfare
In land warfare, the use of a false flag is similar to that
of naval warfare: the trial ofOtto Skorzeny, who planned
and commandedOperation Greif, by a U.S.military tri-
bunalat theDachau Trials included a finding that Sko-
rzeny was not guilty of a crime by ordering his men intoaction in American uniforms. While he had passed on to
his men the warning of German legal experts that if they
fought in American uniforms, they would be breaking the
laws of warthey probably were not doing so simply by
wearing American uniforms. During the trial, a number
of arguments were advanced to substantiate this position
and the German and U.S. military seem to have been in
agreement.
In the transcript of the trial,[9] it is mentioned that Para-
graph 43 of theField Manualpublished by theWar De-
partment,United States Army, on 1 October 1940, under
the entryRules of Land Warfarestates 'National flags, in-signias and uniforms as a ruse in practice it has been au-
thorized to make use of these as a ruse. The foregoing rule
(Article 23 of the Annex of theIVth Hague Convention),
does not prohibit such use, but does prohibit their improper
use. It is certainly forbidden to make use of them during a
combat. Before opening fire upon the enemy, they must be
discarded'.
The American Soldiers Handbook, was also quoted by
Defense Counsel: 'The use of the enemy flag, insignia,
and uniform is permitted under some circumstances. They
are not to be used during actual fighting, and if used in
order to approach the enemy without drawing fire, shouldbe thrown away or removed as soon as fighting begins.
Subsequently the outcome of the trial has been codified
in the 1977 Protocol Additional to the Geneva Conventions
of 12 August 1949(Protocol I):
Article 37. Prohibition ofperfidy
1. It is prohibited to kill, injure, or capture an
adversary by resort to perfidy. Acts inviting the
confidence of an adversary to lead him to be-
lieve that he is entitled to, or is obliged to ac-
cord, protection under the rules of internationallawapplicable in armed conflict, with intent to
betray that confidence, shall constitute perfidy.
The following acts are examples of perfidy:
(a) The feigning of an intent to negotiate under
aflag of truceor of a surrender;
(b) The feigning of an incapacitation by
wounds or sickness;
(c) The feigning of civilian, non-combatant sta-
tus; and
(d) The feigning of protected status by the use
of signs, emblems or uniforms of the UnitedNations or of neutral or other States not Parties
to the conflict.
2. Ruses of war are not prohibited. Such ruses
are acts which are intended to mislead an ad-
versary or to induce him to act recklessly but
which infringe no rule of international law ap-
plicable in armed conflict and which are not
perfidious because they do not invite the con-
fidence of an adversary with respect to protec-tion under that law. The following are exam-
ples of such ruses: the use of camouflage, de-
coys, mock operations and disinformation.
Article 38. Recognized emblems
1. It is prohibited to make improper use of the
distinctiveemblem of the red cross, red cres-
cent or red lion and sun or of other emblems,
signs or signals provided for by the Conven-
tions or by this Protocol. It is also prohibited to
misuse deliberately in an armed conflict otherinternationally recognized protective emblems,
signs or signals, including the flag of truce, and
the protective emblem of cultural property.
2. It is prohibited to make use of the distinc-
tive emblem of theUnited Nations, except as
authorized by that Organization.
Article 39. Emblems of nationality
1. It is prohibited to make use in an armed con-
flict of the flags or military emblems, insignia
or uniforms of neutral or other States not Par-
ties to the conflict.
2. It is prohibited to make use of the flags or
military emblems, insignia or uniforms of ad-
verse Parties while engaging in attacks or in or-
der to shield, favour, protect or impedemilitary
operations.
3. Nothing in this Article or in Article 37,
paragraph 1 ( d ), shall affect the existing gen-
erally recognized rules of international law ap-
plicable to espionage or to the use of flags in
the conduct of armed conflict at sea.
2 As pretexts for war
2.1 Russo-Swedish War
In 1788, the head tailor at theRoyal Swedish Operare-
ceived an order to sew a number of Russian military uni-
forms. These were then used by the Swedes to stage
an attack onPuumala, a Swedish outpost on the Russo-
Swedish border, on 27 June 1788. This caused an outrage
inStockholmand impressed theRiksdag of the Estates,the Swedish national assembly, who until then had re-
fused to agree to an offensive war against Russia. The
https://en.wikipedia.org/wiki/Riksdag_of_the_Estateshttps://en.wikipedia.org/wiki/Stockholmhttps://en.wikipedia.org/wiki/Puumalahttps://en.wikipedia.org/wiki/Royal_Swedish_Operahttps://en.wikipedia.org/wiki/United_Nationshttps://en.wikipedia.org/wiki/Emblems_of_the_International_Red_Cross_and_Red_Crescent_Movementhttps://en.wikipedia.org/wiki/Emblems_of_the_International_Red_Cross_and_Red_Crescent_Movementhttps://en.wikipedia.org/wiki/Flag_of_trucehttps://en.wikipedia.org/wiki/International_lawhttps://en.wikipedia.org/wiki/International_lawhttps://en.wikipedia.org/wiki/Perfidyhttps://en.wikipedia.org/wiki/Protocol_Ihttps://en.wikipedia.org/wiki/Hague_Conventions_(1899_and_1907)#Hague_Convention_of_1907https://en.wikipedia.org/wiki/United_States_Armyhttps://en.wikipedia.org/wiki/U.S._Department_of_Warhttps://en.wikipedia.org/wiki/U.S._Department_of_Warhttps://en.wikipedia.org/wiki/United_States_Army_Field_Manualshttps://en.wikipedia.org/wiki/Laws_of_warhttps://en.wikipedia.org/wiki/Dachau_Trialshttps://en.wikipedia.org/wiki/Military_tribunalhttps://en.wikipedia.org/wiki/Military_tribunalhttps://en.wikipedia.org/wiki/Operation_Greifhttps://en.wikipedia.org/wiki/Otto_Skorzeny -
7/26/2019 False Flag
3/11
2.4 Cuban Revolution 3
Puumala incident allowed King Gustav III of Sweden,
who lacked the constitutional authority to initiate unpro-
voked hostilities without the Estates consent, to launch
theRusso-Swedish War (17881790).[10]
2.2 Second Sino-Japanese War
Japanese experts inspect the scene of the 'railway sabotage' on
South Manchurian Railway
In September 1931,Japaneseofficers fabricated a pretext
for invadingManchuriaby blowing up a section of rail-
way. Though the explosion was too weak to disrupt oper-
ations on the rail line, the Japanese nevertheless used this
Mukden incidentto seize Manchuria and create apuppet
governmentfor what they termed the independent state
ofManchukuo.[11]
2.3 World War II
2.3.1 Gleiwitz incident
The Gleiwitz incident in 1939 involved Reinhard Hey-
drich fabricating evidence of a Polish attack against
Germanyto mobilize German public opinion for war and
to justify the war with Poland. Alfred Naujockswas a
key organiser of the operation under orders from Hey-
drich. It led to the deaths ofNazi concentration camp
victims who were dressed as German soldiers and then
shot by theGestapoto make it seem that they had been
shot by Polish soldiers. This, along with other false flag
operations inOperation Himmler, would be used to mo-
bilize support from the German population for the start
ofWorld War II in Europe.[12]
The operation failed to convince international public
opinion of the German claims, and both Britain and
FrancePolands alliesdeclared war two days after
Germany invaded Poland.[13]
2.3.2 Winter War
On November 26, 1939, theSoviet army shelled Mainila,a Russian village near the Finnish border. Soviet author-
ities blamedFinlandfor the attack and used the incident
Alfred Naujocks
as a pretext to invade Finland, starting theWinter War,
four days later.[14]
2.4 Cuban Revolution
2.4.1 Operation Northwoods
The planned, but never executed, 1962Operation North-
woods plot by the U.S. Department of Defense for a
war with Cuba involved scenarios such as fabricating
the hijacking or shooting down of passenger and mili-
tary planes, sinking a U.S. ship in the vicinity of Cuba,
burning crops, sinking a boat filled with Cuban refugees,
attacks by alleged Cuban infiltrators inside the United
States, and harassment of U.S. aircraft and shipping
and the destruction of aerial drones by aircraft disguisedas Cuban MiGs.[16] These actions would be blamed on
Cuba, and would be a pretext for an invasion of Cuba
and the overthrow ofFidel Castro's communist govern-
ment. It was authored by theJoint Chiefs of Staff, but
then rejected by President John F. Kennedy. The sur-
prise discovery of the documents relating to Operation
Northwoods was a result of the comprehensive search for
records related to theassassination of President John F.
Kennedyby theAssassination Records Review Boardin
the mid-1990s.[17] Information about Operation North-
woods was later publicized byJames Bamford.[18]
2.5 Vietnam War
https://en.wikipedia.org/wiki/James_Bamfordhttps://en.wikipedia.org/wiki/Assassination_Records_Review_Boardhttps://en.wikipedia.org/wiki/Assassination_of_President_John_F._Kennedyhttps://en.wikipedia.org/wiki/Assassination_of_President_John_F._Kennedyhttps://en.wikipedia.org/wiki/John_F._Kennedyhttps://en.wikipedia.org/wiki/Joint_Chiefs_of_Staffhttps://en.wikipedia.org/wiki/Fidel_Castrohttps://en.wikipedia.org/wiki/Cubahttps://en.wikipedia.org/wiki/U.S._Department_of_Defensehttps://en.wikipedia.org/wiki/Operation_Northwoodshttps://en.wikipedia.org/wiki/Operation_Northwoodshttps://en.wikipedia.org/wiki/Winter_Warhttps://en.wikipedia.org/wiki/Finlandhttps://en.wikipedia.org/wiki/Shelling_of_Mainilahttps://en.wikipedia.org/wiki/Red_Armyhttps://en.wikipedia.org/wiki/European_Theatre_of_World_War_IIhttps://en.wikipedia.org/wiki/Operation_Himmlerhttps://en.wikipedia.org/wiki/Gestapohttps://en.wikipedia.org/wiki/Nazi_concentration_camphttps://en.wikipedia.org/wiki/Alfred_Naujockshttps://en.wikipedia.org/wiki/Invasion_of_Poland_(1939)https://en.wikipedia.org/wiki/Germanyhttps://en.wikipedia.org/wiki/Polandhttps://en.wikipedia.org/wiki/Reinhard_Heydrichhttps://en.wikipedia.org/wiki/Reinhard_Heydrichhttps://en.wikipedia.org/wiki/Gleiwitz_incidenthttps://en.wikipedia.org/wiki/Manchukuohttps://en.wikipedia.org/wiki/Puppet_governmenthttps://en.wikipedia.org/wiki/Puppet_governmenthttps://en.wikipedia.org/wiki/Mukden_Incidenthttps://en.wikipedia.org/wiki/Manchuriahttps://en.wikipedia.org/wiki/Japanese_peoplehttps://en.wikipedia.org/wiki/South_Manchurian_Railwayhttps://en.wikipedia.org/wiki/Russo-Swedish_War_(1788%E2%80%9390)https://en.wikipedia.org/wiki/Gustav_III -
7/26/2019 False Flag
4/11
4 3 AS A TACTIC TO UNDERMINE POLITICAL OPPONENTS
Operation Northwoods memorandum (13 March 1962).[15]
2.5.1 Gulf of Tonkin Incident
TheGulf of Tonkin Incidentoccurred in 1964 whereby
theCIA conducted operations reported by theNSAasNorth Vietnamese aggression towards the United States.
The incident was used as a pretext for the United States to
escalateVietnam Warefforts. During the operations on
August 2nd, 1964 USS Maddox provoked the North Viet-
namese by entering restricted waters. Then, on August
4th, 1964, it was reported that North Vietnam attacked
two US ships, USS Maddoxand USS Turner Joy. The
claim that the ships were attacked was later discovered to
be false and in 2005declassified documentsrevealed that
both theCIAandNSAwere involved in the manufacture
of the incidents that led to US air strikes on August 7th,
1964.[19]
3 As a tactic to undermine political
opponents
3.1 Reichstag fire
Main article:Reichstag fire
TheReichstag firewas anarsonattack on theReichstag
buildingin Berlin on 27 February 1933. The fire startedin the Session Chamber,[20] and, by the time the police
and firemen arrived, the mainChamber of Deputieswas
engulfed in flames. Police searched the building and
foundMarinus van der Lubbe, a young Dutch council
communistand unemployed bricklayer, who had recently
arrived in Germany to carry out political activities.
The fire was used as evidence by the Nazis that the
Communists were beginning a plot against the Germangovernment. Van der Lubbe and four Communist leaders
were subsequently arrested.Adolf Hitler, who was sworn
in asChancellor of Germany four weeks before, on 30
January, urged PresidentPaul von Hindenburgto pass an
emergency decree to counter the ruthless confrontation
of theCommunist Party of Germany".[21] With civil lib-
erties suspended, the government instituted mass arrests
of Communists, including all of the Communist parlia-
mentary delegates. With their bitter rival Communists
gone and their seats empty, the National Socialist Ger-
man Workers Party went from being a pluralityparty to
the majority; subsequent elections confirmed this position
and thus allowed Hitler to consolidate his power.
Historians disagree as to whether Van der Lubbe acted
alone, as he said, to protest the condition of the Ger-
man working class, or whether the arson was planned and
ordered by the Nazis, then dominant in the government
themselves, as a false flag operation.[22][23]
3.2 Project TP-Ajax
Main article:1953 Iranian coup d'tat
On 4 April 1953, theCIAwas ordered to undermine the
government of Iran over a four-month period, as a precur-
sor to overthrowing Prime MinisterMohammad Mosad-
degh.[24] One tactic used to undermine Mosaddegh was
to carry out false flag attacks on mosques and key public
figures, to be blamed on Iranian communists loyal to the
government.[24]
The CIA project was code-named TP-Ajax, and the tactic
of a directed campaign of bombings by Iranians posing
as members of the Communist party,[25] involved the
bombing of "at least" one well known Muslims house
by CIA agents posing as Communists.[25] The CIA de-
termined that the tactic of false flag attacks added to thepositive outcome of ProjectTPAJAX.[24]
However, as "[t]he C.I.A. burned nearly all of its files on
its role in the 1953 coup in Iran, the true extent of the
tactic has been difficult for historians to discern.[26]
3.3 2008 Kurcha incident
In 2008 there was ashootingagainst two minibuses driv-
ing along in a volatile area right on the border between
Abkhaziaand the republic ofGeorgia. The buses were
carrying Georgians who lived in Abkhazia and wanted tocross the border so they could go and vote in the parlia-
mentary election that day.
https://en.wikipedia.org/wiki/Georgia_(country)https://en.wikipedia.org/wiki/Abkhaziahttps://en.wikipedia.org/wiki/2008_Khurcha_incidenthttps://en.wikipedia.org/wiki/TPAJAXhttps://en.wikipedia.org/wiki/TP-Ajaxhttps://en.wikipedia.org/wiki/Mohammad_Mosaddeghhttps://en.wikipedia.org/wiki/Mohammad_Mosaddeghhttps://en.wikipedia.org/wiki/CIAhttps://en.wikipedia.org/wiki/1953_Iranian_coup_d%2527%C3%A9tathttps://en.wikipedia.org/wiki/Majorityhttps://en.wikipedia.org/wiki/Plurality_(voting)https://en.wikipedia.org/wiki/Communist_Party_of_Germanyhttps://en.wikipedia.org/wiki/Paul_von_Hindenburghttps://en.wikipedia.org/wiki/Chancellor_of_Germany_(German_Reich)https://en.wikipedia.org/wiki/Adolf_Hitlerhttps://en.wikipedia.org/wiki/Communisthttps://en.wikipedia.org/wiki/Nazismhttps://en.wikipedia.org/wiki/Council_communisthttps://en.wikipedia.org/wiki/Council_communisthttps://en.wikipedia.org/wiki/Dutch_peoplehttps://en.wikipedia.org/wiki/Marinus_van_der_Lubbehttps://en.wikipedia.org/wiki/Chamber_of_Deputieshttps://en.wikipedia.org/wiki/Reichstag_(building)https://en.wikipedia.org/wiki/Reichstag_(building)https://en.wikipedia.org/wiki/Arsonhttps://en.wikipedia.org/wiki/Reichstag_firehttps://en.wikipedia.org/wiki/Reichstag_firehttps://en.wikipedia.org/wiki/National_Security_Agencyhttps://en.wikipedia.org/wiki/Central_Intelligence_Agencyhttps://en.wikipedia.org/wiki/Declassificationhttps://en.wikipedia.org/wiki/USS_Turner_Joy_(DD-951)https://en.wikipedia.org/wiki/USS_Maddox_(DD-731)https://en.wikipedia.org/wiki/USS_Maddox_(DD-731)https://en.wikipedia.org/wiki/Vietnam_War#Johnson%2527s_escalation,_1963%E2%80%9369https://en.wikipedia.org/wiki/National_Security_Agencyhttps://en.wikipedia.org/wiki/Central_Intelligence_Agencyhttps://en.wikipedia.org/wiki/Gulf_of_Tonkin_Incident -
7/26/2019 False Flag
5/11
5
The country had been experiencing internal political tur-
moil for the last year, and in an attempt to calm the
situation, presidentMikheil Saakashvili moved forward
both presidential and parliamentary elections. However
the presidential election in January that year was strongly
contested, with hundreds of thousands attending protest
rallies. When the parliamentary election came up in May,the mood was still tense.
On mid day 21 May the two minibuses came under attack
with small arms and grenades, and though there were no
casualties, three people were taken to a hospital in Zug-
didi, where president Saakashvili later arrived and was
filmed by TV at the patients bedside.
In his comments on TV, which dominated the news dur-
ing election day, Saakashvili indicated that the attack had
been an attempt to disrupt the election, implying that it
had been Abkhaz or Russian forces who had been behind
it. This provided for a favorable opportunity for the pres-ident to focus the nations attention on an external enemy,
thereby leading attention away from his domestic critics,
as well as making use of his position as leader to rally the
Georgians around his candidates in the election.
An investigation by the United Nations Observer Mission
in Georgia found that the attackers were located on the
Georgian side of the ceasefire line, about 100m from the
buses, and that although hard evidence of the attackers
identities was lacking, inconsistencies merited further in-
vestigation, particularly the suggestion that the filming of
the attack seemed anticipatory.[27]
A Georgian investigative TV documentary later foundthat camera crew from the government-friendly channel
Rustavi 2 had been in position with their equipment be-
fore the shooting took place.
4 Pseudo-operations
Pseudo-operations are those in which forces of one power
disguise themselves as enemy forces. For example, a state
power may disguise teams of operatives as insurgents and,
with the aid of defectors, infiltrate insurgent areas.[28] The
aim of such pseudo-operations may be to gather short orlong-term intelligence or to engage in active operations, in
particularassassinationsof important enemies. However,
they usually involve both, as the risks of exposure rapidly
increase with time and intelligence gathering eventually
leads to violent confrontation. Pseudo-operations may
be directed by military or police forces, or both. Police
forces are usually best suited to intelligence tasks; how-
ever, military provide the structure needed to back up
such pseudo-ops with military response forces. Accord-
ing to US military expert Lawrence Cline (2005), the
teams typically have been controlled by police services,
but this largely was due to the weaknesses in the respec-tive military intelligence systems.
The State Political Directorate (OGPU) of the Soviet
Charlemagne Pralte of Haiti was assassinated in 1919, after
checkpoints were passed by military disguised as guerrilla fight-
ers.
Union set up such an operation from 1921 to 1926.During Operation Trust, they used loose networks of
White Armysupporters and extended them, creating the
pseudo-"Monarchist Union of Central Russia (MUCR)
in order to help the OGPU identify real monarchists and
anti-Bolsheviks.
An example of a successful assassination was United
States Marine Sergeant Herman H. Hannekenleading a
patrol of his Haitian Gendarmerie disguised as enemy
guerrillasin 1919. The Patrol successfully passed sev-
eral enemy checkpoints in order to assassinate the guerilla
leader Charlemagne Pralte near Grande-Rivire-du-
Nord. Hanneken was awarded theMedal of Honorandwas commissioned a Second Lieutenant for his deed.
During the Mau Mau uprising in the 1950s, captured Mau
Mau members who switched sides and specially trained
British troops initiated the pseudo-gang concept to suc-
cessfully counter Mau Mau. In 1960Frank Kitson, (who
was later involved in theNorthern Irish conflictand is now
a retired British General), publishedGangs and Counter-
gangs, an account of his experiences with the technique
inKenya; information included how to counter gangs and
measures of deception, including the use of defectors,
which brought the issue a wider audience.
Another example of combined police and military over-sight of pseudo-operations include theSelous Scoutsin
the former countryRhodesia(nowZimbabwe), governed
https://en.wikipedia.org/wiki/Zimbabwehttps://en.wikipedia.org/wiki/Rhodesiahttps://en.wikipedia.org/wiki/Selous_Scoutshttps://en.wikipedia.org/wiki/Kenyahttps://en.wikipedia.org/wiki/Troubleshttps://en.wikipedia.org/wiki/Frank_Kitsonhttps://en.wikipedia.org/wiki/Mau_Mau_Uprisinghttps://en.wikipedia.org/wiki/Medal_of_Honorhttps://en.wikipedia.org/wiki/Grande-Rivi%C3%A8re-du-Nordhttps://en.wikipedia.org/wiki/Grande-Rivi%C3%A8re-du-Nordhttps://en.wikipedia.org/wiki/Charlemagne_P%C3%A9raltehttps://en.wikipedia.org/wiki/Guerrillahttps://en.wikipedia.org/wiki/Gendarmeriehttps://en.wikipedia.org/wiki/Haitihttps://en.wikipedia.org/wiki/Herman_H._Hannekenhttps://en.wikipedia.org/wiki/Sergeanthttps://en.wikipedia.org/wiki/United_States_Marinehttps://en.wikipedia.org/wiki/United_States_Marinehttps://en.wikipedia.org/wiki/White_Armyhttps://en.wikipedia.org/wiki/Operation_Trusthttps://en.wikipedia.org/wiki/Soviet_Unionhttps://en.wikipedia.org/wiki/Soviet_Unionhttps://en.wikipedia.org/wiki/State_Political_Directoratehttps://en.wikipedia.org/wiki/Assassinationhttps://en.wikipedia.org/wiki/Intelligencehttps://en.wikipedia.org/wiki/Mikheil_Saakashvili -
7/26/2019 False Flag
6/11
6 5 ESPIONAGE
by white minority rule until 1980. The Selous Scouts
were formed at the beginning of Operation Hurricane,
in November 1973, by Major (later Lieutenant Colonel)
Ronald Reid-Daly. As with all Special Forces in Rhode-
sia, by 1977 they were controlled by COMOPS (Com-
mander, Combined Operations) Commander Lieutenant
General Peter Walls. The Selous Scouts were originallycomposed of 120 members, with all officers being white
and the highest rank initially available for black soldiers
being colour sergeant. They succeeded in turning ap-
proximately 800 insurgents who were then paid by Spe-
cial Branch, ultimately reaching the number of 1,500
members. Engaging mainly in long-range reconnaissance
and surveillance missions, they increasingly turned to of-
fensive actions, including the attempted assassination of
Zimbabwe Peoples Revolutionary Army leader Joshua
Nkomoin Zambia. This mission was finally aborted by
the Selous Scouts, and attempted again, unsuccessfully,
by theRhodesian Special Air Service.[29]
Some offensive operations attracted international con-
demnation, in particular the Selous Scouts raid on a
Zimbabwe African National Liberation Army(ZANLA)
camp at Nyadzonya Pungwe, Mozambique in August
1976. ZANLA was then led byJosiah Tongogara. Using
Rhodesian trucks and armored cars disguised as Mozam-
bique military vehicles, 84 scouts killed 1,284 people in
the camp-the camp was registered as arefugee campby
theUnited Nations(UN). Even according to Reid-Daly,
most of those killed were unarmed guerrillas standing
in formation for a parade. The camp hospital was also
set ablaze by the rounds fired by the Scouts, killing allpatients.[30] According to David Martin and Phyllis John-
son, who visited the camp shortly before the raid, it was
only a refugee camp that did not host any guerrillas. It
was staged for UN approval.[31]
According to a 1978 study by the Directorate of Military
Intelligence, 68% of all insurgent deaths inside Rhodesia
could be attributed to the Selous Scouts, who were dis-
banded in 1980.[32]
If the action is a police action, then these tactics would
fall within the laws of the state initiating the pseudo, but if
such actions are taken in a civil war or during a belligerent
military occupationthen those who participate in suchactions would not beprivileged belligerents. The princi-
ple ofplausible deniabilityis usually applied for pseudo-
teams. (See the above section Laws of war). Some
false flag operations have been described by Lawrence E.
Cline, a retiredUS Army intelligenceofficer, as pseudo-
operations, or the use of organized teams which are dis-
guised as guerrilla groups for long- or short-term pene-
tration ofinsurgent-controlled areas.
Pseudo Operations should be distinguished, notes Cline,
from the more common police or intelligenceinfiltration
of guerrilla or criminal organizations. In the latter case,
infiltration is normally done by individuals. Pseudoteams, on the other hand, are formed as needed from or-
ganized units, usually military or paramilitary. The use of
pseudo teams has been a hallmark of a number of foreign
counterinsurgencycampaigns.[28]
Similar false flag tactics were also employed during the
Algerian civil war, starting in the middle of 1994.Death
squadscomposed ofDpartement du Renseignement etde la Scurit (DRS) security forces disguised them-
selves as Islamist terrorists and committed false flag ter-
ror attacks. Such groups included the Organisation of
Young Free Algerians(OJAL) or the Secret Organisation
for the Safeguard of the Algerian Republic (OSSRA)[33]
According to Roger Faligot and Pascal Kropp (1999),
the OJAL was reminiscent of the Organization of the
French Algerian Resistance (ORAF), a group of counter-
terrorists created in December 1956 by theDirection de
la surveillance du territoire(Territorial Surveillance Di-
rectorate, or DST) whose mission was to carry out terror-
ist attacks with the aim of quashing any hopes of political
compromise.[34]
5 Espionage
Main article:False flag penetrator
Inespionage the term false flag describes the recruit-
ing of agents by operatives posing as representatives of a
cause the prospective agents are sympathetic to, or even
the agents own government. For example, during the
Cold War, several female West German civil servants
were tricked into stealing classified documents by agents
of theEast GermanStasi intelligence service, pretending
to be members of West German peace advocacy groups
(theStasiagents were also described as "Romeos, indi-
cating that they also used their sex appeal to manipulate
their targets, making this operation a combination of the
false flag and "honey trap" techniques).
[35]
The technique can also be used to expose enemy agents in
ones own service, by having someone approach the sus-
pect and pose as an agent of the enemy.Earl Edwin Pitts,
a 13-year veteran of the U.S. Federal Bureau of Investiga-
tionand an attorney, was caught when he was approached
by FBI agents posing as Russian agents.
British intelligence officials in World War II allowed dou-
ble agents to fire-bomb a power station and a food dump
in theUKto protect their cover, according todeclassified
documents. The documents stated the agents took pre-
cautions to ensure they did not cause serious damage.
One of the documents released also stated: It should berecognised that friends as well as enemies must be com-
pletely deceived.[36]
https://en.wikipedia.org/wiki/Declassified_documentshttps://en.wikipedia.org/wiki/Declassified_documentshttps://en.wikipedia.org/wiki/UKhttps://en.wikipedia.org/wiki/Federal_Bureau_of_Investigationhttps://en.wikipedia.org/wiki/Federal_Bureau_of_Investigationhttps://en.wikipedia.org/wiki/Earl_Edwin_Pittshttps://en.wikipedia.org/wiki/Clandestine_HUMINT_asset_recruiting#Love,_honeypots_and_recruitmenthttps://en.wikipedia.org/wiki/Romeo_and_Juliethttps://en.wikipedia.org/wiki/Stasihttps://en.wikipedia.org/wiki/East_Germanyhttps://en.wikipedia.org/wiki/West_Germanyhttps://en.wikipedia.org/wiki/Cold_Warhttps://en.wikipedia.org/wiki/Espionagehttps://en.wikipedia.org/wiki/Clandestine_HUMINT#False_Flag_Penetratorhttps://en.wikipedia.org/wiki/Direction_de_la_surveillance_du_territoirehttps://en.wikipedia.org/wiki/Direction_de_la_surveillance_du_territoirehttps://en.wikipedia.org/wiki/Roger_Faligothttps://en.wikipedia.org/wiki/Organisation_of_Young_Free_Algerianshttps://en.wikipedia.org/wiki/Organisation_of_Young_Free_Algerianshttps://en.wikipedia.org/wiki/D%C3%A9partement_du_Renseignement_et_de_la_S%C3%A9curit%C3%A9https://en.wikipedia.org/wiki/D%C3%A9partement_du_Renseignement_et_de_la_S%C3%A9curit%C3%A9https://en.wikipedia.org/wiki/Death_squadhttps://en.wikipedia.org/wiki/Death_squadhttps://en.wikipedia.org/wiki/Algerian_Civil_Warhttps://en.wikipedia.org/wiki/Counterinsurgencyhttps://en.wikipedia.org/wiki/Paramilitaryhttps://en.wikipedia.org/wiki/Espionagehttps://en.wikipedia.org/wiki/Insurgencyhttps://en.wikipedia.org/wiki/US_Army_intelligencehttps://en.wikipedia.org/wiki/False_flag#Laws_of_warhttps://en.wikipedia.org/wiki/Plausible_deniabilityhttps://en.wikipedia.org/wiki/Privileged_belligerenthttps://en.wikipedia.org/wiki/Belligerent_military_occupationhttps://en.wikipedia.org/wiki/Belligerent_military_occupationhttps://en.wikipedia.org/wiki/Civil_warhttps://en.wikipedia.org/wiki/United_Nationshttps://en.wikipedia.org/wiki/Refugee_camphttps://en.wikipedia.org/wiki/Josiah_Tongogarahttps://en.wikipedia.org/wiki/Mozambiquehttps://en.wikipedia.org/wiki/Zimbabwe_African_National_Liberation_Armyhttps://en.wikipedia.org/wiki/Rhodesian_Special_Air_Servicehttps://en.wikipedia.org/wiki/Zambiahttps://en.wikipedia.org/wiki/Joshua_Nkomohttps://en.wikipedia.org/wiki/Joshua_Nkomohttps://en.wikipedia.org/wiki/Zimbabwe_People%2527s_Revolutionary_Armyhttps://en.wikipedia.org/wiki/Colour_sergeanthttps://en.wikipedia.org/wiki/Peter_Wallshttps://en.wikipedia.org/wiki/Ronald_Reid-Dalyhttps://en.wikipedia.org/wiki/Operation_Hurricanehttps://en.wikipedia.org/wiki/White_minority_rule -
7/26/2019 False Flag
7/11
6.3 Ideological 7
6 Civilian usage
While false flag operations originate in warfare and gov-
ernment, they also can occur in civilian settings among
certain factions, such as businesses, special interest
groups, religions, political ideologies and campaigns for
office.
6.1 Businesses
In business and marketing, similar operations are be-
ing employed in some public relations campaigns (see
Astroturfing). Telemarketing firms practice false flag
type behavior when they pretend to be amarket research
firm (referred to as "sugging"). In some rare cases, mem-
bers of an unsuccessful businesswill destroy some of their
own property to conceal an unrelated crime (e.g., safety
violations, embezzlement) but make it appear as thoughthe destruction was done by a rival company.
6.2 Political campaigning
Political campaigning has a long history of this tactic in
various forms, including in person, print media and elec-
tronically in recent years. This can involve when sup-
porters of one candidate pose as supporters of another,
or act as straw men for their preferred candidate to de-
bate against. This can happen with or without the can-
didates knowledge. TheCanuck letteris an example of
one candidate creating a false document and attributing
it as coming from another candidate in order to discredit
that candidate.
In the final days of Floridas 1994 gubernatorial cam-
paign, Democrat GovernorLawton Chilesran a false flag
operation that paid for tens of thousands of calls to el-
derly voters using false organization names. The calls
purported to be from Republican groups and told vot-
ers thatJeb Bushwas against Social Security and seniors.
Chiles denied his campaign was behind the calls. Af-
ter winning re-election and facing an investigation, Chiles
admitted the truth in November 1995.[37]
In 2006, individuals practicing false flag behavior were
discovered and outed in New Hampshire[38][39] and
New Jersey[40] afterblogcomments claiming to be from
supporters of a political candidate were traced to theIP
addressof paid staffers for that candidates opponent.
On 19 February 2011, Indiana Deputy Prosecutor Carlos
Lam sent a private email to Wisconsin Governor Scott
Walker suggesting that he run a "'false flag' operation
to counter theprotestsagainst Walkers proposed restric-
tions on public employeescollective bargainingrights:
If you could employ an associate who pre-tends to be sympathetic to the unions cause
to physically attack you (or even use a firearm
against you), you could discredit the unions,
read the email. It went on to say that the ef-
fort would assist in undercutting any support
that the media may be creating in favor of the
unions.
The press had acquired a court order to access all of
Walkers emails and Lams email was exposed. At first,
Lam vehemently denied it, but eventually admitted it and
resigned.[41]
6.3 Ideological
A bomb threat forged by Scientology operatives.
Proponents of political or religious ideologies will some-
times use false flag tactics. This can be done to discredit
or implicate rival groups, create the appearance of ene-
mies when none exist, or create the illusion of organized
and directed opposition when in truth, the ideology is
simply unpopular with society.
In retaliation for writing The Scandal of Scientology, some
members of the Church of Scientologystole stationery
from authorPaulette Cooper's home and then used that
stationery to forge bomb threats and have them mailed
to a Scientology office. TheGuardians Officealso had
a plan for further operations to discredit Cooper known
as Operation Freakout, but several Scientology opera-
tives were arrested in a separate investigation and the plan
failed.[42]
7 See also
7.1 Concepts
Agent provocateur
Black propaganda
Casus belli
Covert operation
Denial and deception
https://en.wikipedia.org/wiki/Denial_and_deceptionhttps://en.wikipedia.org/wiki/Covert_operationhttps://en.wikipedia.org/wiki/Casus_bellihttps://en.wikipedia.org/wiki/Black_propagandahttps://en.wikipedia.org/wiki/Agent_provocateurhttps://en.wikipedia.org/wiki/Operation_Freakouthttps://en.wikipedia.org/wiki/Guardian%2527s_Officehttps://en.wikipedia.org/wiki/Paulette_Cooperhttps://en.wikipedia.org/wiki/Scientologyhttps://en.wikipedia.org/wiki/The_Scandal_of_Scientologyhttps://en.wikipedia.org/wiki/Collective_bargaininghttps://en.wikipedia.org/wiki/2011_Wisconsin_protestshttps://en.wikipedia.org/wiki/IP_addresshttps://en.wikipedia.org/wiki/IP_addresshttps://en.wikipedia.org/wiki/Bloghttps://en.wikipedia.org/wiki/New_Jerseyhttps://en.wikipedia.org/wiki/New_Hampshirehttps://en.wikipedia.org/wiki/Jeb_Bushhttps://en.wikipedia.org/wiki/Lawton_Chileshttps://en.wikipedia.org/wiki/Canuck_letterhttps://en.wikipedia.org/wiki/Straw_manhttps://en.wikipedia.org/wiki/Embezzlementhttps://en.wikipedia.org/wiki/Sugginghttps://en.wikipedia.org/wiki/Market_researchhttps://en.wikipedia.org/wiki/Telemarketinghttps://en.wikipedia.org/wiki/Astroturfinghttps://en.wikipedia.org/wiki/Public_relations -
7/26/2019 False Flag
8/11
8 8 REFERENCES
Front organization
Joe job, a similar online concept
Mimicry
State terrorism
7.2 Examples
Bloed, Bodem, Eer en Trouw (Flemish neo-Nazi
group preparing false flag attacks)
Celle Hole
CIA Operation Ajax(United Statesoverthrowing of
Mohammed Mossadeq, Prime Minister of Iran, in
1953)[25]
Gleiwitz incidentakaOperation Himmler
Knights of the Red Branch Inc
Lavon Affair Israeli attempt to plant bombs in West-
ern targets in Egypt, in blaming Arab elements
Marxist-Leninist Party of the Netherlands (fake
party set up by the Dutch security service)
Masada Action and Defense Movement (French
white supremacists, under the guise of a fake ex-
tremist Zionist movement, conducted bombings of
Arab targets in France in an attempt to start a war
between French Arabs and Jews.)
8 References
[1] deHaven-Smith, Lance (2013). Conspiracy Theory in
America, Austin: University of Texas Press. p.225
[2] the use of a false flag has always been accepted as a le-
gitimate ruse de guerre in naval warfare, the true battle
flag being run up immediately before engaging (Thomas,
Rosamund M., ed. (1993), Teaching Ethics: Govern-
ment ethics, Centre for Business and Public, p. 80, ISBN9781871891034).
[3] Squires, Nick. "HMAS Sydney found off Australias west
coast",The Telegraph, 17 March 2008.
[4] Guinness World Records (2009), p.155
[5] Young, P (Ed) (1973) Atlas of the Second World War
(London: The Military Book Society)
[6] The Hague Rules of Air Warfare, 1922-12 to 1923-02,
this convention was never adopted (backup site)
[7] Rules concerning the Control of Wireless Telegraphy in
Time of War and Air Warfare. Drafted by a Commissionof Jurists at the Hague, December 1922 February 1923.:
Introduction.ICRC. Retrieved December 2010.
[8] Gmez, Javier Guisndez (20 June 1998). The Law of
Air Warfare. International Review of the Red Cross38
(323): 34763.doi:10.1017/S0020860400091075.
[9] Source: Law Reports of Trials of War Criminals. United
Nations War Crimes Commission. Vol. IX, 1949: Trial
of Otto Skorzeny and others General Military Govern-
ment Court of the U.S. zone of Germany 18 August to
9 September 1947
[10] (Finnish) Mattila, Tapani (1983). Meri maamme turvana
[Sea safeguarding our country] (in Finnish). Jyvskyl:
K. J. Gummerus Osakeyhti. ISBN 951-99487-0-8. (),
p. 142.
[11] Weland, James (1994). Misguided Intelligence:
Japanese Military Intelligence Officers in the Manchurian
Incident, September 1931. Journal of Military History
58 (3): 445460. doi:10.2307/2944134.
[12] Bradley Lightbody, The Second World War: Ambitions to
Nemesis, Routledge, 2004, ISBN 0-415-22405-5, GooglePrint, p.39
[13] Steven J. Zaloga, Poland 1939: The Birth of Blitzkrieg,
Osprey Publishing, 2002,ISBN 1-84176-408-6, p. 39
[14] Turtola, Martti (1999). Kansainvlinen kehitys Eu-
roopassa ja Suomessa 1930-luvulla. In Leskinen, Jari;
Juutilainen, Antti. Talvisodan pikkujttilinen. pp. 44
45.
[15] U.S. Joint Chiefs of Staff, Justification for US Mili-
tary Intervention in Cuba (TS)", U.S. Department of De-
fense, 13 March 1962. The Operation Northwoods doc-
ument inPDF format on the website of the independent,
non-governmental research institute theNational Security
Archiveat theGeorge Washington University Gelman Li-
brary, Washington, D.C. Direct PDF links:here and here.
[16] Excerpts from declassified 1962 U.S. Joint Chiefs of Staff
Memo Operation Northwoods: Justification for U.S.
Military Intervention in Cuba
[17] Horne, Douglas P., Chief Analyst for Military Records,
Assassination Records Review Board (2009). Inside the
Assassination Records Review Board: The U.S. Govern-
ments Final Attempt to Reconcile the Conflicting Medi-
cal Evidence in the Assassination of JFK. self published.
ISBN 098431444X. Retrieved April 2014.
[18] James Bamford (2002). Body of Secrets: Anatomy of the
Ultra-Secret National Security Agency. Anchor Books. pp.
8291.ISBN 978-0-385-49907-1.
[19] Jan Goldman Ph.D. (2015). The Central Intelligence
Agency: An Encyclopedia of Covert Ops, Intelligence
Gathering, and Spies. ABC-CLIO. p. 170. ISBN
9781610690928.
[20] Tobias, Fritz, The Reichstag Fire. New York: Putnam,
1964, pages 2628.
[21] History of the Reichstag Fire in Berlin Germany
[22] The Reichstag Fire. Holocaust Encyclopedia. UnitedStates Holocaust Memorial Museum. Retrieved 12 Au-
gust 2013.
http://www.ushmm.org/wlc/en/article.php?ModuleId=10007657http://www.reichstag.org/https://en.wikipedia.org/wiki/Special:BookSources/9781610690928https://en.wikipedia.org/wiki/International_Standard_Book_Numberhttps://en.wikipedia.org/wiki/Special:BookSources/978-0-385-49907-1https://en.wikipedia.org/wiki/International_Standard_Book_Numberhttps://en.wikipedia.org/wiki/Body_of_Secrets:_Anatomy_of_the_Ultra-Secret_National_Security_Agencyhttps://en.wikipedia.org/wiki/Body_of_Secrets:_Anatomy_of_the_Ultra-Secret_National_Security_Agencyhttps://en.wikipedia.org/wiki/Special:BookSources/098431444Xhttps://en.wikipedia.org/wiki/International_Standard_Book_Numberhttps://www.maryferrell.org/wiki/index.php/Inside_the_ARRBhttps://www.maryferrell.org/wiki/index.php/Inside_the_ARRBhttps://www.maryferrell.org/wiki/index.php/Inside_the_ARRBhttps://www.maryferrell.org/wiki/index.php/Inside_the_ARRBhttp://www.ratical.org/ratville/CAH/Northwoods.htmlhttp://www.ratical.org/ratville/CAH/Northwoods.htmlhttp://www.ratical.org/ratville/CAH/Northwoods.htmlhttp://www.gwu.edu/~nsarchiv/news/20010430/doc1.pdfhttp://www.gwu.edu/~nsarchiv/news/20010430/northwoods.pdfhttps://en.wikipedia.org/wiki/Gelman_Libraryhttps://en.wikipedia.org/wiki/Gelman_Libraryhttps://en.wikipedia.org/wiki/George_Washington_Universityhttps://en.wikipedia.org/wiki/National_Security_Archivehttps://en.wikipedia.org/wiki/National_Security_Archivehttps://en.wikipedia.org/wiki/PDFhttps://en.wikipedia.org/wiki/U.S._Department_of_Defensehttps://en.wikipedia.org/wiki/U.S._Department_of_Defensehttp://www.gwu.edu/~nsarchiv/news/20010430/index.htmlhttp://www.gwu.edu/~nsarchiv/news/20010430/index.htmlhttps://en.wikipedia.org/wiki/Special:BookSources/1841764086https://books.google.com/books?id=oQeAKAjlEwMC&pg=PA39https://en.wikipedia.org/wiki/Special:BookSources/0415224055https://en.wikipedia.org/wiki/False_flag#CITEREF.28Finnish.29_Mattila.2C_Tapani_.281983.29._Meri_maamme_turvana_.5BSea_safeguarding_our_country.5D_.28in_Finnish.29._Jyv.C3.A4skyl.C3.A4:_K._J._Gummerus_Osakeyhti.C3.B6._ISBN_951-99487-0-8.https://en.wikipedia.org/wiki/False_flag#CITEREF.28Finnish.29_Mattila.2C_Tapani_.281983.29._Meri_maamme_turvana_.5BSea_safeguarding_our_country.5D_.28in_Finnish.29._Jyv.C3.A4skyl.C3.A4:_K._J._Gummerus_Osakeyhti.C3.B6._ISBN_951-99487-0-8.https://en.wikipedia.org/wiki/False_flag#CITEREF.28Finnish.29_Mattila.2C_Tapani_.281983.29._Meri_maamme_turvana_.5BSea_safeguarding_our_country.5D_.28in_Finnish.29._Jyv.C3.A4skyl.C3.A4:_K._J._Gummerus_Osakeyhti.C3.B6._ISBN_951-99487-0-8.http://www.ess.uwe.ac.uk/WCC/skorzeny.htmhttp://www.ess.uwe.ac.uk/WCC/skorzeny.htmhttps://dx.doi.org/10.1017%252FS0020860400091075https://en.wikipedia.org/wiki/Digital_object_identifierhttps://en.wikipedia.org/wiki/International_Review_of_the_Red_Crosshttp://www.icrc.org/eng/resources/documents/misc/57jpcl.htmhttp://www.icrc.org/eng/resources/documents/misc/57jpcl.htmhttps://en.wikipedia.org/wiki/ICRChttp://www.icrc.org/IHL.nsf/INTRO/275?OpenDocumenthttp://www.icrc.org/IHL.nsf/INTRO/275?OpenDocumenthttp://www.icrc.org/IHL.nsf/INTRO/275?OpenDocumenthttp://www.icrc.org/IHL.nsf/INTRO/275?OpenDocumenthttp://www.au.af.mil/au/awc/awcgate/interwar/hagair.htmhttp://www.lib.byu.edu/~rdh/wwi/1918p/hagair.htmlhttps://en.wikipedia.org/wiki/The_Daily_Telegraph_(Australia)http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2008/03/17/wsydney117.xmlhttp://www.telegraph.co.uk/news/main.jhtml?xml=/news/2008/03/17/wsydney117.xmlhttps://en.wikipedia.org/wiki/Special:BookSources/9781871891034https://en.wikipedia.org/wiki/International_Standard_Book_Numberhttps://en.wikipedia.org/wiki/Masada_Action_and_Defense_Movementhttps://en.wikipedia.org/wiki/Marxist-Leninist_Party_of_the_Netherlandshttps://en.wikipedia.org/wiki/Lavon_Affairhttps://en.wikipedia.org/wiki/Knights_of_the_Red_Branch_Inchttps://en.wikipedia.org/wiki/Operation_Himmlerhttps://en.wikipedia.org/wiki/Gleiwitz_incidenthttps://en.wikipedia.org/wiki/United_Stateshttps://en.wikipedia.org/wiki/Operation_Ajaxhttps://en.wikipedia.org/wiki/CIAhttps://en.wikipedia.org/wiki/Celle_Holehttps://en.wikipedia.org/wiki/Bloed,_Bodem,_Eer_en_Trouwhttps://en.wikipedia.org/wiki/State_terrorismhttps://en.wikipedia.org/wiki/Mimicryhttps://en.wikipedia.org/wiki/Joe_jobhttps://en.wikipedia.org/wiki/Front_organization -
7/26/2019 False Flag
9/11
9
[23] DW Staff (27 February 2008). 75 Years Ago, Reich-
stag Fire Sped Hitlers Power Grab. Deutsche Welle. Re-
trieved 12 August 2013.
[24] Callanan, James (2009). Covert Action in the Cold War:
US Policy, intelligence and CIA operations, London: I.B.
Tauris. p.115
[25] Risen, James. Secrets of History: The C.I.A. in Iran
A Special Report; How a Plot Convulsed Iran in '53 (and
'79). The New York Times, 16 April 2000
[26] Weiner, Tim (1997).C.I.A. Destroyed Files on 1953 Iran
coup,The New York Times, 29 May.
[27] Report of the Secretary-General on the situation in Abk-
hazia, Georgia(PDF).United Nations Security Council.
23 July 2008. Retrieved 21 August 2008.
[28] Cline, Lawrence E. (2005)Pseudo Operations and Coun-
terinsurgency: Lessons from other countries, Strategic
Studies Institute.
[29] Cline (2005), p. 11.
[30] Cline (2005), quoting Reid-Daly,Pamwe Chete: The Leg-
end of the Selous Scouts, Weltevreden Park, South Africa:
Covos-Day Books, 1999, p. 10 (republished by Covos
Day, 2001,ISBN 978-1-919874-33-3)
[31] Cline (2005), who quotes David Martin and Phyllis John-
son, The Struggle for Zimbabwe: theChimurenga War,
New York: Monthly Review Press, 1981, pp. 241242.
[32] Cline (2005), p. 813. For 1978 study, quotes J. K.
Cilliers, Counter-insurgency in Rhodesia, London:CroomHelm, 1985, pp. 6077. Cline also quotes Ian F. W.
Beckett, The Rhodesian Army: Counter-Insurgency 1972
1979atselousscouts
[33] Lounis Aggoun and Jean-Baptiste Rivoire (2004).
Franalgrie, crimes et mensonges dEtats, (Franco-
Algeria, Crimes and Lies of the States). Editions La
Dcouverte. ISBN 2-7071-4747-8. Extract in English
with mention of the OJALavailable here.
[34] Luonis Aggoun and Jean-Baptiste Rivoire, ibid., quot-
ingRoger Faligotand Pascal KROP, DST, Police Secrte,
Flammarion, 1999, p. 174.
[35] Crawford, Angus (20 March 2009). Victims of Cold
War 'Romeo spies". BBC Online. Retrieved 10 April
2009.
[36] Britain 'bombed itself to fool Nazis". BBC. 28 February
2002. Retrieved 4 November 2008.
[37] https://news.google.com/newspapers?nid=1346&
dat=19951211&id=gZosAAAAIBAJ&sjid=
wfwDAAAAIBAJ&pg=4981,49418 Lakeland Times
1995
[38] Steele, Allison,"Bass staffer in D.C. poses as blogger: Bo-
gus posts aimed at his political opponent",Concord Mon-itor, 26 September 2006 (URL last accessed 24 October
2006).
[39] Saunders, Anne,Bass aide resigns after posing as oppo-
nents supporter online,The Boston Globe, 26 September
2006 (URL last accessed 24 October 2006).
[40] Miller, Jonathan,Blog Thinks Aide to Kean Posted Jabs At
Menendez,New York Times, 21 September 2006 (URL
last accessed 24 October 2006).
[41] Montopoli, Brian (25 March 2011).Indiana prosecutor
resigns for encouraging fake attack on Wisconsin gover-
nor. CBS News. Archived fromthe originalon 12 April
2012.
[42] United States of America v. Jane Kember, Morris Bud-
long, Sentencing Memorandum; pp. 2325.
9 External links
https://en.wikisource.org/wiki/United%2520States%2520of%2520America%2520v.%2520Jane%2520Kember,%2520Morris%2520Budlong,%2520Sentencing%2520Memorandumhttps://en.wikisource.org/wiki/United%2520States%2520of%2520America%2520v.%2520Jane%2520Kember,%2520Morris%2520Budlong,%2520Sentencing%2520Memorandumhttp://www.cbsnews.com/8301-503544_162-20047130-503544.htmlhttps://web.archive.org/web/20120412225147/http://www.cbsnews.com/8301-503544_162-20047130-503544.htmlhttps://web.archive.org/web/20120412225147/http://www.cbsnews.com/8301-503544_162-20047130-503544.htmlhttps://web.archive.org/web/20120412225147/http://www.cbsnews.com/8301-503544_162-20047130-503544.htmlhttps://en.wikipedia.org/wiki/New_York_Timeshttp://select.nytimes.com/gst/abstract.html?res=FA0712FD3A550C728EDDA00894DE404482http://select.nytimes.com/gst/abstract.html?res=FA0712FD3A550C728EDDA00894DE404482https://en.wikipedia.org/wiki/The_Boston_Globehttp://www.boston.com/news/local/new_hampshire/articles/2006/09/26/rep_bass_aide_posed_as_opponents_supporter_on_blogs/http://www.boston.com/news/local/new_hampshire/articles/2006/09/26/rep_bass_aide_posed_as_opponents_supporter_on_blogs/https://en.wikipedia.org/wiki/Concord_Monitorhttps://en.wikipedia.org/wiki/Concord_Monitorhttp://www.concordmonitor.com/apps/pbcs.dll/article?AID=/20060926/REPOSITORY/609260344/1219/48HOURShttp://www.concordmonitor.com/apps/pbcs.dll/article?AID=/20060926/REPOSITORY/609260344/1219/48HOURShttps://news.google.com/newspapers?nid=1346&dat=19951211&id=gZosAAAAIBAJ&sjid=wfwDAAAAIBAJ&pg=4981,49418https://news.google.com/newspapers?nid=1346&dat=19951211&id=gZosAAAAIBAJ&sjid=wfwDAAAAIBAJ&pg=4981,49418https://news.google.com/newspapers?nid=1346&dat=19951211&id=gZosAAAAIBAJ&sjid=wfwDAAAAIBAJ&pg=4981,49418https://en.wikipedia.org/wiki/BBChttp://news.bbc.co.uk/1/hi/uk/2522115.stmhttps://en.wikipedia.org/wiki/BBC_Onlinehttp://news.bbc.co.uk/1/hi/world/europe/7953523.stmhttp://news.bbc.co.uk/1/hi/world/europe/7953523.stmhttps://en.wikipedia.org/wiki/Groupe_Flammarionhttps://en.wikipedia.org/wiki/Roger_Faligothttp://www.algeria-watch.org/en/analyses/ojal.htmhttps://en.wikipedia.org/wiki/Special:BookSources/2707147478https://en.wikipedia.org/wiki/Editions_La_D%C3%A9couvertehttps://en.wikipedia.org/wiki/Editions_La_D%C3%A9couvertehttp://members.tripod.com/selousscouts/https://en.wikipedia.org/wiki/Croom_Helmhttps://en.wikipedia.org/wiki/Croom_Helmhttps://en.wikipedia.org/wiki/Chimurenga_Warhttps://en.wikipedia.org/wiki/Special:BookSources/9781919874333https://en.wikipedia.org/wiki/Covos-Dayhttps://en.wikipedia.org/wiki/Strategic_Studies_Institutehttps://en.wikipedia.org/wiki/Strategic_Studies_Institutehttp://www.blackwaterusa.com/btw2005/articles/080105counter.pdfhttp://www.blackwaterusa.com/btw2005/articles/080105counter.pdfhttps://en.wikipedia.org/wiki/United_Nations_Security_Councilhttp://daccess-dds-ny.un.org/doc/UNDOC/GEN/N08/427/22/PDF/N0842722.pdf?OpenElementhttp://daccess-dds-ny.un.org/doc/UNDOC/GEN/N08/427/22/PDF/N0842722.pdf?OpenElementhttp://www.nytimes.com/1997/05/29/us/cia-destroyed-files-on-1953-iran-coup.htmlhttp://www.nytimes.com/1997/05/29/us/cia-destroyed-files-on-1953-iran-coup.htmlhttp://www.nytimes.com/2000/04/16/world/secrets-history-cia-iran-special-report-plot-convulsed-iran-53-79.html?src=pm&pagewanted=1http://www.nytimes.com/2000/04/16/world/secrets-history-cia-iran-special-report-plot-convulsed-iran-53-79.html?src=pm&pagewanted=1http://www.nytimes.com/2000/04/16/world/secrets-history-cia-iran-special-report-plot-convulsed-iran-53-79.html?src=pm&pagewanted=1https://books.google.com/books?id=pXIAAwAAQBAJ&pg=PA115&dq=iran+coup+1953+%2522false+flag%2522&hl=en&sa=X&ei=dX9NU8rxAuewsASc04DAAg&redir_esc=y#v=onepage&q=iran%2520coup%25201953%2520%2522false%2520flag%2522&f=falsehttps://books.google.com/books?id=pXIAAwAAQBAJ&pg=PA115&dq=iran+coup+1953+%2522false+flag%2522&hl=en&sa=X&ei=dX9NU8rxAuewsASc04DAAg&redir_esc=y#v=onepage&q=iran%2520coup%25201953%2520%2522false%2520flag%2522&f=falsehttp://www.dw.de/75-years-ago-reichstag-fire-sped-hitlers-power-grab/a-3150026-1http://www.dw.de/75-years-ago-reichstag-fire-sped-hitlers-power-grab/a-3150026-1 -
7/26/2019 False Flag
10/11
10 10 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES
10 Text and image sources, contributors, and licenses
10.1 Text
False flagSource: https://en.wikipedia.org/wiki/False_flag?oldid=725680140Contributors:Olivier, Jdlh, Michael Hardy, Ixfd64, IZAK,
Skysmith, Kingturtle, Ugen64, GCarty, Wikiborg, Furrykef, Tempshill, AnonMoos, Vardion, PBS, Donreed, ZimZalaBim, Bkell, Carnildo,
Tom harrison, Capitalistroadster, Iceberg3k, Tagishsimon, Fergananim, GeneMosher, Tothebarricades.tk, Kevin B12, Asbestos, Neutrality,
Klemen Kocjancic, Cab88, D6, Jayjg, Discospinster, Wikiacc, Narsil, Kostja, Antaeus Feldspar, Bender235, El C, Ascorbic, Cacophony,
Martey, Mike Schwartz, John Vandenberg, Wiki-Ed, Toh, Hardy, La goutte de pluie, BM, Idleguy, Mrzaius, Alansohn, Uncle.bungle,
Hackwrench, Geo Swan, PatrickFisher, Ynhockey, Malo, Bart133, Max rspct, M3tainfo, Lapinmies, Kober, Vuo, Alai, LukeSurl, Zn-
trip, Hq3473, Richard Arthur Norton (1958- ), OwenX, Woohookitty, Mindmatrix, Timharwoodx, Jeff3000, MONGO, Mangojuice,
SDC, Plrk, Stefanomione, Betsythedevine, Mandarax, RedBLACKandBURN, Graham87, A Train, Kbdank71, Dpr, Rjwilmsi, Bill Can-
non, Carbonite, Jtpaladin, The wub, Tarc, KiernMoran, Fred Bradstadt, Cassowary, Ground Zero, FrancisDrake, MacRusgail, GagHal-
frunt, Tequendamia, Diza, Coolhawks88, Bgwhite, WriterHound, Cornellrockey, Jayme, Subwayguy, YurikBot, Samuel Wiki, Jimp, John
Quincy Adding Machine, Briaboru, Zafiroblue05, DanMS, Kirill Lokshin, Shaddack, Big Brother 1984, Aryaniae, LaszloWalrus, Grafen,
Nutiketaiel, Aaron Brenneman, Lomn, Ospalh, Syrthiss, IceWeasel, BusterD, Miraculouschaos, Closedmouth, Arthur Rubin, E Wing,
Petri Krohn, Garybel, Shyam, Ephilei, Kurai, Jeff Silvers, Paul Pieniezny, Victor falk, JohnLeonard, SmackBot, Nicolas Barbier, Sti-
fle, Kintetsubuffalo, Nil Einne, Portillo, GoldDragon, Ksenon, Kaliz, Jprg1966, Hugzz, Renamed user Sloane, Paulfp, Sb617, Tough-
pigs, AKMask, Tewfik, Xeryus, Ian Burnet~enwiki, Chendy, Ncameron, JRPG, Tim Pierce, Geoffrey Gibson, Bolivian Unicyclist, Wen
D House, Cybercobra, Akral, Xyzzy n, Chrylis, Weregerbil, Doodle77, Xiutwel, Kukini, Tesseran, Crouchbk, Byelf2007, Ser Aman-
tio di Nicolao, Tazmaniacs, Robofish, JoshuaZ, Mgiganteus1, Minglex, Cmh, Karlwiegand, Meco, Dr.K., SmokeyJoe, OnBeyondZebrax,
Skandaprasadn, Clarityfiend, Poechalkdust, Hwonder, Joseph Solis in Australia, AlexLibman, Phoenixrod, Lent, Generalcp702, Ehistory,
CmdrObot, Megaboz, Olaf Davis, Erik Kennedy, Dgw, Outriggr (2006-2009), Chrisahn, Location, Cydebot, Treybien, Goldfritha, GogoDodo, Manik52, DumbBOT, Patrick O'Leary, Mathew5000, Septagram, Satori Son, Mamalujo, Malleus Fatuorum, Thijs!bot, Interested2,
Ucanlookitup, Hcberkowitz, Bobblehead, Davidhorman, Kingnixon, Oreo Priest, AntiVandalBot, Opelio, JHFTC, Joe Schmedley, Legit-
imus, Arkan5, Erxnmedia, JAnDbot, MarritzN, Minitrue, Attarparn, Lsi, Acroterion, Bencherlite, Canjth, Parsecboy, NeoJudus, LCJ,
SSZ, Bryanpeterson, JaGa, Pax:Vobiscum, Hersbruck, Gwern, Dan Dean, Phantomsnake, General Jazza, Ekotekk, KTo288, Nono64,
Pharaoh of the Wizards, PCock, Rodrigo braz, PalestineRemembered, JPLeonard, Maurice Carbonaro, Hodja Nasreddin, Cop 663, Gross-
cha, RenniePet, Chiswick Chap, Spartelite, C1010, DadaNeem, Xyl 54, Vanished user 39948282, Julyda4th, WLRoss, Ashcroftgm,
Morenooso, Indubitably, Nug, TXiKiBoT, Xenophrenic, Zurishaddai, Room429, EnglishDez, Jaqen, Andrewaskew, Enigmaman, Spad-
gos, THEODICEAN, Alcmaeonid, AlleborgoBot, GavinTing, Guerillamarketing, StAnselm, DarknessEnthroned, Rabbeinu, Pretest, Jc-
S0CO, Fredburks, Cicorp, Tensaijeff, Anakin101, Capitalismojo, ZaneSteez, LarRan, Sab128, VanishedUser sdu9aya9fs787sads, Hoplon,
MenoBot, ClueBot, MBD123, The thing is, Binksternet, Mild Bill Hiccup, Foofbun, LonelyBeacon, Trivialist, Grandpallama, Geo247,
CuandoCubango, P.jasons, Xme, Mlaffs, Tony May, Thingg, Belchfire, Infinoth, 3d-geo, DumZiBoT, Kurdo777, Sannleikur, Ost316,
Dominatrixdave, For (;;), Addbot, Mhines54, Heavenlyblue, MrZoolook, Daverogue, Disbelieve, Download, Fogeltk421, Lihaas, SpBot,
Numbo3-bot, Peridon, Alanscottwalker, Lightbot, Nhalks, Aadieu, Yobot, Henri rouge, PMLawrence, Reenem, AnomieBOT, Vanishe-
dUser sdu9aya9fasdsopa, DemocraticLuntz, Tryptofish, Jim1138, McSaddle, Shock Brigade Harvester Boris, Glenfarclas, Ulric1313, Ma-
terialscientist, Fuelsaver, Tbvdm, Cliftonian, LilHelpa, Xqbot, MaxPuckett, Thouliha, Catastrophe420, Rbrt21, Srich32977, RibotBOT,
Carrite, A Quest For Knowledge, Shadowjams, LucienBOT, Lothar von Richthofen, Mark Renier, MurfleMan, TurningWork, Haeinous,HJ Mitchell, Liverworth, Citation bot 1, Pinethicket, Bmclaughlin9, RedBot, MastiBot, Nikolas93ts, ARMitre, Ionisiso, Princesssissi,
Lotje, Defender of torch, Aoidh, Tbhotch, RjwilmsiBot, Grondemar, EmausBot, John of Reading, WikitanvirBot, GoingBatty, Slightsmile,
Acidrain4696, Doelleri, ZroBot, Ahears, Dpenn89, MRBigdeli, Lhixson, Wingman4l7, Columbia666, Carmichael, Why is pizza so good?,
Farizana94, Mcc1789, 8h3d0kg, FeatherPluma, Whoop whoop pull up, ClueBot NG, Wertydm, Bazuz, CopperSquare, Helpful Pixie Bot,
Legoless, Zlisha Khan, Regulov, BG19bot, Londonboy2011, Shurusheero, Shorisharo, Terry Hildebrand, Darkness Shines, Mark Arsten,
Great50, Jacob van Maerlant, Harizotoh9, Turnr44, BattyBot, Gauzeandchess, Pratyya Ghosh, Ddcm8991, Aginwald, Cyberbot II, JYBot,
Mogism, Ranze, XXzoonamiXX, Lugia2453, Keptautokeptauto, 93, Pc1985, Halsingpurg, Kabulbuddha, Jgmoneill, Madreterra, Chris
troutman, A Certain Lack of Grandeur, Lixinheth, GeeBee60, Ter M. Ahn, Damon161, Darkone123, Monkbot, Magma1983, Gdeblois19,
Phantomop, Gamebuster19901, Isambard Kingdom, Mister Sneeze A Lot, A1491625, BU Rob13, ImHere2015, Ebookomane, Incendiary
Iconoclasm, TEH1990, Skyscraper1996, Moscowamerican and Anonymous: 396
10.2 Images
File:193109_mukden_incident_railway_sabotage.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/e8/193109_mukden_incident_railway_sabotage.jpg License: Public domain Contributors: published in japanese newspaper Rekishi Syashin
Original artist: Unknown
File:Alfred_Naujocks.jpg Source:https://upload.wikimedia.org/wikipedia/commons/e/e9/Alfred_Naujocks.jpg License: Public domain
Contributors:U.S. National Archives and Records Administration, item number CW-004 Original artist:U.S. Army
File:Ambox_important.svgSource:https://upload.wikimedia.org/wikipedia/commons/b/b4/Ambox_important.svg License:Public do-
mainContributors:Own work, based off ofImage:Ambox scales.svgOriginal artist:Dsmurat(talk contribs)
File:Charlemagne_Pralte.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/e1/Charlemagne_P%C3%
A9ralte.jpg License: Public domain Contributors: Nombreux sites Internet et ouvrages divers Original artist: Un-
known
https://upload.wikimedia.org/wikipedia/commons/e/e1/Charlemagne_P%25C3%25A9ralte.jpghttps://upload.wikimedia.org/wikipedia/commons/e/e1/Charlemagne_P%25C3%25A9ralte.jpghttp://localhost/var/www/apps/conversion/tmp/scratch_6//commons.wikimedia.org/wiki/Special:Contributions/Dsmurathttp://localhost/var/www/apps/conversion/tmp/scratch_6//commons.wikimedia.org/wiki/User_talk:Dsmurathttp://localhost/var/www/apps/conversion/tmp/scratch_6//commons.wikimedia.org/wiki/User:Dsmurathttp://localhost/var/www/apps/conversion/tmp/scratch_6//commons.wikimedia.org/wiki/File:Ambox_scales.svghttps://upload.wikimedia.org/wikipedia/commons/b/b4/Ambox_important.svghttps://upload.wikimedia.org/wikipedia/commons/e/e9/Alfred_Naujocks.jpghttps://upload.wikimedia.org/wikipedia/commons/e/e8/193109_mukden_incident_railway_sabotage.jpghttps://upload.wikimedia.org/wikipedia/commons/e/e8/193109_mukden_incident_railway_sabotage.jpghttps://en.wikipedia.org/wiki/False_flag?oldid=725680140 -
7/26/2019 False Flag
11/11
10.3 Content license 11
File:Cooper_bomb_threat.gifSource:https://upload.wikimedia.org/wikipedia/commons/b/bf/Cooper_bomb_threat.gifLicense: Public
domain Contributors:Transferred fromen.wikipediato Commons byLiftarnusing CommonsHelper. Original artist:The original uploader
wasChrisOatEnglish Wikipedia
File:Douglas_A-26C_Invader_435440_Tamiami_26.04.09R.jpg Source: https://upload.wikimedia.org/wikipedia/commons/1/16/
Douglas_A-26C_Invader_435440_Tamiami_26.04.09R.jpg License:CC BY 3.0 Contributors:Own workOriginal artist:RuthAS
File:NorthwoodsMemorandum.jpgSource:https://upload.wikimedia.org/wikipedia/commons/b/b1/NorthwoodsMemorandum.jpgLi-
cense:Public domainContributors: http://www.gwu.edu/~{}nsarchiv/news/20010430/doc1.pdfOriginal artist:?
File:Question_book-new.svg Source: https://upload.wikimedia.org/wikipedia/en/9/99/Question_book-new.svg License: Cc-by-sa-3.0
Contributors:
Created from scratch in Adobe Illustrator. Based onImage:Question book.pngcreated byUser:EquazcionOriginal artist:
Tkgd2007
10.3 Content license
Creative Commons Attribution-Share Alike 3.0
https://creativecommons.org/licenses/by-sa/3.0/http://localhost/var/www/apps/conversion/tmp/scratch_6//en.wikipedia.org/wiki/User:Tkgd2007http://localhost/var/www/apps/conversion/tmp/scratch_6//en.wikipedia.org/wiki/User:Equazcionhttp://localhost/var/www/apps/conversion/tmp/scratch_6//en.wikipedia.org/wiki/File:Question_book.pnghttps://upload.wikimedia.org/wikipedia/en/9/99/Question_book-new.svghttp://www.gwu.edu/~nsarchiv/news/20010430/doc1.pdfhttps://upload.wikimedia.org/wikipedia/commons/b/b1/NorthwoodsMemorandum.jpghttp://localhost/var/www/apps/conversion/tmp/scratch_6//commons.wikimedia.org/wiki/User:RuthAShttps://upload.wikimedia.org/wikipedia/commons/1/16/Douglas_A-26C_Invader_435440_Tamiami_26.04.09R.jpghttps://upload.wikimedia.org/wikipedia/commons/1/16/Douglas_A-26C_Invader_435440_Tamiami_26.04.09R.jpghttp://en.wikipedia.org/wiki/.pdfhttp://localhost/var/www/apps/conversion/tmp/scratch_6//en.wikipedia.org/wiki/User:ChrisOhttp://tools.wmflabs.org/commonshelper/.pdfhttp://localhost/var/www/apps/conversion/tmp/scratch_6//commons.wikimedia.org/wiki/User:Liftarnhttp://localhost/var/www/apps/conversion/tmp/scratch_6//en.wikipedia.orghttps://upload.wikimedia.org/wikipedia/commons/b/bf/Cooper_bomb_threat.gif