Olduvaiblog: Musings on the coming collapse

Home » Posts tagged 'False flag'

Tag Archives: False flag

Snipers Are Commonly Used as “False Flag” Terrorists Washington’s Blog

Snipers Are Commonly Used as “False Flag” Terrorists Washington’s Blog.

A Common Tactic to Discredit Opponents Or to Create Momentum for “Regime Change”

The powers-that-be often use agent provocateurs to disrupt protests and paint protesters as violent and unlikeable.

For example, violent provocateurs were deployed:

There is a related type of false flag operation commonly used to create chaos and discredit regimes or protesters:  snipers.

For example:

  • Unknown snipers reportedly killed both Venezuelan government and opposition protesters in the attempted 2002 coup
  • Unknown snipers allegedly have created bedlam in Syria
  • A Russian general alleges that – during Yeltsin’s protest in front of the Russian parliament – sniper fire came from the roof of the American Embassy
  • And the Estonian foreign minister claims that the new Ukranian coalition deployed snipers to discredit the former government of Ukraine

Brutal … but effective and cheap.

Because it doesn’t cost much to hire one or a handful of snipers to access rooftops or bridge overpasses, create chaos, and then quietly disappear.

Snipers Are Commonly Used as "False Flag" Terrorists Washington's Blog

Snipers Are Commonly Used as “False Flag” Terrorists Washington’s Blog.

A Common Tactic to Discredit Opponents Or to Create Momentum for “Regime Change”

The powers-that-be often use agent provocateurs to disrupt protests and paint protesters as violent and unlikeable.

For example, violent provocateurs were deployed:

There is a related type of false flag operation commonly used to create chaos and discredit regimes or protesters:  snipers.

For example:

  • Unknown snipers reportedly killed both Venezuelan government and opposition protesters in the attempted 2002 coup
  • Unknown snipers allegedly have created bedlam in Syria
  • A Russian general alleges that – during Yeltsin’s protest in front of the Russian parliament – sniper fire came from the roof of the American Embassy
  • And the Estonian foreign minister claims that the new Ukranian coalition deployed snipers to discredit the former government of Ukraine

Brutal … but effective and cheap.

Because it doesn’t cost much to hire one or a handful of snipers to access rooftops or bridge overpasses, create chaos, and then quietly disappear.

Spy Agency Engaged In Internet “False Flag” Attacks Washington’s Blog

Spy Agency Engaged In Internet “False Flag” Attacks Washington’s Blog.

Spy Agency “Masqueraded As An Enemy In A ‘False Flag’ Operation”

We’ve warned since 2009 (and see this) that the government could be launching cyber “false flag attacks” in order to justify a crackdown on the Internet and discredit web activists.

A new report from NBC News – based on documents leaked by Edward Snowden – appear to confirm our fears, documenting that Britain’s GCHQ spy agency has carried out cyber false flag attacks:

In another document taken from the NSA by Snowden and obtained by NBC News, a JTRIG official said the unit’s mission included computer network attacks, disruption, “Active Covert Internet Operations,” and “Covert Technical Operations.”Among the methods listed in the document were jamming phones, computers and email accounts and masquerading as an enemy in a “false flag” operation. The same document said GCHQ was increasing its emphasis on using cyber tools to attack adversaries.

Postscript:  We await further revelations of “false flag” attacks by spy agencies.

Japan Wants To Join U.S.-India Naval War Games

For peace, against war: literary selections

Stars and Stripes
January 13, 2014

Japan looks to join India, US in naval exercise
By Erik Slavin Stars and Stripes
 

YOKOSUKA NAVAL BASE, Japan: The Japanese Self-Defense Force wants to join an annual sea drill held by the United States and India later this year, according to Indian media reports.

The request to participate in the Malabar exercise came during a four-day visit to New Delhi last week by Japanese Defense Minister Itsunori Onodera, and just one month after Japan and India held their first-ever bilateral exercise in the Bay of Bengal.

Japan and India both saw tensions rise last year over separate territorial disputes with China.

“During the meeting with [Indian defense minister] AK Antony, I asked for the participation of the Japanese Maritime Self-Defense Forces in the naval war games,” Onodera said recently, according to The Times of India.

Neither India nor the United States…

View original post 298 more words

Clues to Future Snowden Leaks Found In His Past Washington’s Blog

Clues to Future Snowden Leaks Found In His Past Washington’s Blog.

Work for Covert NSA Facility at University of Maryland May Be Hint

Only a tiny fraction of Snowden’s documents have been published.

What’s still to come?

We believe one hint comes from Snowden’s past as a security specialist at one of one the NSA’s covert facilities at the University of Maryland.

Pre-Crime and the NSA

We reported in 2008:

new article by investigative reporter Christopher Ketcham reveals, a governmental unit operating in secret and with no oversight whatsoever is gathering massive amounts of data on every American and running artificial intelligence software to predict each American’s behavior, including “what the target will do, where the target will go, who it will turn to for help”.

The same governmental unit is responsible for suspending the Constitution and implementing martial law in the event that anything is deemed by the White House in its sole discretion to constitute a threat to the United States. (this is formally known as implementing “Continuity of Government” plans). [Background here.]

As Ketcham’s article makes clear, these same folks and their predecessors have been been busy dreaming up plans to imprison countless “trouble-making” Americans without trial in case of any real or imagined emergency.  What kind of Americans? Ketcham describes it this way:

“Dissidents and activists of various stripes, political and tax protestors, lawyers and professors, publishers and journalists, gun owners, illegal aliens, foreign nationals, and a great many other harmless, average people.”

Do we want the same small group of folks who have the power to suspend the Constitution, implement martial law, and imprison normal citizens to also be gathering information on all Americans and running AI programs to be able to predict where American citizens will go for help and what they will do in case of an emergency? Don’t we want the government to — um, I don’t know — help us in case of an emergency?

Bear in mind that the Pentagon is also running an AI program to see how people will react to propaganda and to government-inflicted terror. The program is called Sentient World Simulation:

“U.S defense, intel and homeland security officials are constructing a parallel world, on a computer, which the agencies will use to test propaganda messages and military strategies.Called the Sentient World Simulation, the program uses AI routines based upon the psychological theories of Marty Seligman, among others. (Seligman introduced the theory of ‘learned helplessness’ in the 1960s, after shocking beagles until they cowered, urinating, on the bottom of their cages.)

Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.

The sim will feature an AR avatar for each person in the real world, based upon data collected about us from government records and the internet.”

The continuity of government folks’ AI program and the Pentagon’s AI program may or may not be linked, but they both indicate massive spying and artificial intelligence in order to manipulate the American public, to concentrate power, to take away the liberties and freedoms of average Americans, and — worst of all — to induce chaos in order to achieve these ends.

PBS Nova reported in 2009:

The National Security Agency (NSA) is developing a tool that George Orwell’s Thought Police might have found useful: an artificial intelligence system designed to gain insight into what people are thinking.

With the entire Internet and thousands of databases for a brain, the device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collected—through phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records—it may one day be possible to know not just where people are and what they are doing, but what and how they think.

The system is so potentially intrusive that at least one researcher has quit, citing concerns over the dangers in placing such a powerful weapon in the hands of a top-secret agency with little accountability.

Known as Aquaint, which stands for “Advanced QUestion Answering for INTelligence” [which is run by the Intelligence Advanced Research Projects Activity (IARPA)], part of the new M Square Research Park in College Park, Maryland. A mammoth two million-square-foot, 128-acre complex, it is operated in collaboration with the University of Maryland. “Their budget is classified, but I understand it’s very well funded,” said Brian Darmody, the University of Maryland’s assistant vice president of research and economic development, referring to IARPA. “They’ll be in their own building here, and they’re going to grow. Their mission is expanding.”

***

In a 2004 pilot project, a mass of data was gathered from news stories taken from theNew York Times, the AP news wire, and the English portion of the Chinese Xinhua news wire covering 1998 to 2000. Then, 13 U.S. military intelligence analysts searched the data and came up with a number of scenarios based on the material. Finally, using those scenarios, an NSA analyst developed 50 topics, and in each of those topics created a series of questions for Aquaint’s computerized brain to answer. “Will the Japanese use force to defend the Senkakus?” was one. “What types of disputes or conflict between the PLA [People’s Liberation Army] and Hong Kong residents have been reported?” was another. And “Who were the participants in this spy ring, and how are they related to each other?” was a third. Since then, the NSA has attempted to build both on the complexity of the system—more essay-like answers rather than yes or no—and on attacking greater volumes of data.

“The technology behaves like a robot, understanding and answering complex questions,” said a former Aquaint researcher. “Think of 2001: A Space Odyssey and the most memorable character, HAL 9000, having a conversation with David. We are essentially building this system. We are building HAL.” A naturalized U.S. citizen who received her Ph.D. from Columbia, the researcher worked on the program for several years but eventually left due to moral concerns. “The system can answer the question, ‘What does X think about Y?’” she said. “Working for the government is great, but I don’t like looking into other people’s secrets.

A supersmart search engine, capable of answering complex questions such as “What were the major issues in the last 10 presidential elections?” would be very useful for the public. But that same capability in the hands of an agency like the NSA—absolutely secret, often above the law, resistant to oversight, and with access to petabytes of private information about Americans—could be a privacy and civil liberties nightmare. “We must not forget that the ultimate goal is to transfer research results into operational use,” said Aquaint project leader John Prange, in charge of information exploitation for IARPA.

Once up and running, the database of old newspapers could quickly be expanded to include an inland sea of personal information scooped up by the agency’s warrantless data suction hoses. Unregulated, they could ask it to determine which Americans might likely pose a security risk—or have sympathies toward a particular cause, such as the antiwar movement, as was done during the 1960s and 1970s. The Aquaint robospy might then base its decision on the type of books a person purchased online, or chat room talk, or websites visited—or a similar combination of data. Such a system would have an enormous chilling effect on everyone’s everyday activities—what will the Aquaint computer think if I buy this book, or go to that website, or make this comment? Will I be suspected of being a terrorist or a spy or a subversive?

World Net Daily’s Aaron Klein reported in June:

In February, the Sydney Morning Herald reported the Massachusetts-based multinational corporation, Raytheon – the world’s fifth largest defense contractor – had developed a “Google for Spies” operation.

Herald reporter Ryan Gallagher wrote that Raytheon had “secretly developed software capable of tracking people’s movements and predicting future behavior by mining data from social networking websites” like Facebook, Twitter, and Foursquare.

The software is called RIOT, or Rapid Information Overlay Technology.

Raytheon told the Herald it has not sold RIOT to any clients but admitted that, in 2010, it had shared the program’s software technology with the U.S. government as part of a “joint research and development effort … to help build a national security system capable of analyzing ‘trillions of entities’ from cyberspace.”

In April, RIOT was reportedly showcased at a U.S. government and industry national security conference for secretive, classified innovations, where it was listed under the category “big data – analytics, algorithms.”

Jay Stanley, senior policy analyst for the ACLU Speech, Privacy and Technology Project,argued …  that among the many problems with government large-scale analytics of social network information “is the prospect that government agencies will blunderingly use these techniques to tag, target and watchlist people coughed up by programs such as RIOT, or to target them for further invasions of privacy based on incorrect inferences.”

“The chilling effects of such activities,” he concluded, “while perhaps gradual, would be tremendous.”

Ginger McCall, attorney and director of the Electronic Privacy Information Center’s Open Government program, told NBC in February, “This sort of software allows the government to surveil everyone.

“It scoops up a bunch of information about totally innocent people. There seems to be no legitimate reason to get this, other than that they can.”

As for RIOT’s ability to help catch terrorists, McCall called it “a lot of white noise.”  [True … Big data doesn’t work to keep us safe.]

The London Guardian further obtained a four-minute video that shows how the RIOT software uses photographs on social networks. The images, sometimes containing latitude and longitude details, are “automatically embedded by smartphones within so-called ‘exif header data.’

RIOT pulls out this information, analyzing not only the photographs posted by individuals, but also the location where these images were taken,” the Guardian reported.
Such sweeping data collection and analysis to predict future activity may further explain some of what the government is doing with the phone records of millions of Verizon customers. [Background here.  It may also explain why the NSA is collecting nearly 5 billion cell location records every day, all over the world.]

***

“In the increasingly popular language of network theory, individuals are “nodes,” and relationships and interactions form the “links” binding them together; by mapping those connections, network scientists try to expose patterns that might not otherwise be apparent,” reported the Times.  [Background here.]

In February 2006, more than a year after Obama was sworn as a U.S. senator, it was revealed the “supposedly defunct” Total Information Awareness data-mining and profiling program had been acquired by the NSA.

The Total Information Awareness program was first announced in 2002 as an early effort to mine large volumes of data for hidden connections.

What does all of this have to do with Edward Snowden?

Aaron Klein reports that Snowden might have worked at the NSA’s artificial intelligence unit at the University of Maryland:

Edward Snowden, the whistleblower behind the NSA surveillance revelations, told the London Guardian newspaper that he previously worked as a security guard for what the publication carefully described as “one of the agency’s covert facilities at the University of Maryland.”

***

Brian Ullmann, the university’s assistant vice president for marketing and communications, was asked for comment. He would not address the query, posed twice to his department by KleinOnline, about whether the NSA operates covert facilities in conjunction with the university.

Ullmann’s only comment was to affirm that Snowden was employed as a security guard at the university’s Center for the Advanced Study of Languages in 2005.

Calling Snowden a “security guard” is like calling James Bond a “bouncer”.  Snowden was a highly-prized expert at finding the NSA’s security vulnerabilities in order to protect the agency’s computer systems from malicious hackers.

Snowden may know a tremendous amount about – and have taken many documents regarding – the NSA’s dystopian plans for a Big Bro, pre-crime computer system.

Postscript:  If we’re right, we urge that these documents be pushed towards the front of the release queue by the journalists holding the documents leaked by Snowden … as they would be central to the NSA’s true plans and visions.

We would also urge the release of any documents regarding NSA’s involvement – if any – in financial manipulation or  false flags to be published quickly, as these would be vital for our information and understanding as a free people.

Americans Are Finally Learning About False Flag Terror Washington’s Blog

Americans Are Finally Learning About False Flag Terror Washington’s Blog.

Painting by Anthony Freda

Governments Admit They Carry Out False Flag Terror

Governments from around the world admit they carry out false flag terror:

  • A major with the Nazi SS admitted at the Nuremberg trials that – under orders from the chief of the Gestapo – he and some other Nazi operatives faked attacks on their own people and resources which they blamed on the Poles, to justify the invasion of Poland. Nazi general Franz Halder also testified at the Nuremberg trials that Nazi leader Hermann Goering admitted to setting fire to the German parliament building, and then falsely blaming the communists for the arson
  • Soviet leader  Nikita Khrushchev admitted in writing that the Soviet Union’s Red Army shelled the Russian village of Mainila in 1939, and declared that the fire originated from Finland as a basis launching the Winter War four days later
  • Israel admits that an Israeli terrorist cell operating in Egypt planted bombs in several buildings, including U.S. diplomatic facilities, then left behind “evidence” implicating the Arabs as the culprits (one of the bombs detonated prematurely, allowing the Egyptians to identify the bombers, and several of the Israelis later confessed) (and see this and this)
  • The CIA admits that it hired Iranians in the 1950′s to pose as Communists and stage bombings in Iran in order to turn the country against its democratically-elected prime minister
  • As admitted by the U.S. government, recently declassified documents show that in the 1960′s, the American Joint Chiefs of Staff signed off on a plan to blow up AMERICAN airplanes (using an elaborate plan involving the switching of airplanes), and also to commit terrorist acts on American soil, and then to blame it on the Cubans in order to justify an invasion of Cuba. See the following ABC news reportthe official documents; and watch this interview with the former Washington Investigative Producer for ABC’s World News Tonight with Peter Jennings.
  • 2 years before, American Senator George Smathers had suggested that the U.S. make “a false attack made on Guantanamo Bay which would give us the excuse of actually fomenting a fight which would then give us the excuse to go in and [overthrow Castro]“.
  • And Official State Department documents show that – only nine months before the Joint Chiefs of Staff plan was proposed – the head of the Joint Chiefs and other high-level officials discussedblowing up a consulate in the Dominican Republic in order to justify an invasion of that country. The 3 plans were not carried out, but they were all discussed as serious proposals
  • The South African Truth and Reconciliation Council found that, in 1989, the Civil Cooperation Bureau (a covert branch of the South African Defense Force) approached an explosives expert and asked him “to participate in an operation aimed at discrediting the ANC [the African National Congress] by bombing the police vehicle of the investigating officer into the murder incident”, thus framing the ANC for the bombing
  • An Algerian diplomat and several officers in the Algerian army admit that, in the 1990s, the Algerian army frequently massacred Algerian civilians and then blamed Islamic militants for the killings (and see this video; and Agence France-Presse, 9/27/2002, French Court Dismisses Algerian Defamation Suit Against Author)
  • Senior Russian Senior military and intelligence officers admit that the KGB blew up Russian apartment buildings and falsely blamed it on Chechens, in order to justify an invasion of Chechnya (and see this report and this discussion)
  • According to the Washington Post, Indonesian police admit that the Indonesian military killed American teachers in Papua in 2002 and blamed the murders on a Papuan separatist group in order to get that group listed as a terrorist organization.
  • The well-respected former Indonesian president also admits that the government probably had a role in the Bali bombings
  • As reported by BBC, the New York Times, and Associated Press, Macedonian officials admit that the government murdered 7 innocent immigrants in cold blood and pretended that they were Al Qaeda soldiers attempting to assassinate Macedonian police, in order to join the “war on terror”.
  • Former Department of Justice lawyer John Yoo suggested in 2005 that the US should go on the offensive against al-Qaeda, having “our intelligence agencies create a false terrorist organization. It could have its own websites, recruitment centers, training camps, and fundraising operations. It could launch fake terrorist operations and claim credit for real terrorist strikes, helping to sow confusion within al-Qaeda’s ranks, causing operatives to doubt others’ identities and to question the validity of communications.”
  • United Press International reported in June 2005:

    U.S. intelligence officers are reporting that some of the insurgents in Iraq are using recent-model Beretta 92 pistols, but the pistols seem to have had their serial numbers erased. The numbers do not appear to have been physically removed; the pistols seem to have come off a production line without any serial numbers. Analysts suggest the lack of serial numbers indicates that the weapons were intended for intelligence operations or terrorist cells with substantial government backing. Analysts speculate that these guns are probably from either Mossad or the CIA. Analysts speculate that agent provocateurs may be using the untraceable weapons even as U.S. authorities use insurgent attacks against civilians as evidence of the illegitimacy of the resistance.

  • Undercover Israeli soldiers admitted in 2005 to throwing stones at other Israeli soldiers so they could blame it on Palestinians, as an excuse to crack down on peaceful protests by the Palestinians
  • Quebec police admitted that, in 2007, thugs carrying rocks to a peaceful protest were actually undercover Quebec police officers (and see this)
  • At the G20 protests in London in 2009, a British member of parliament saw plain clothes police officers attempting to incite the crowd to violence
  • A Colombian army colonel has admitted that his unit murdered 57 civilians, then dressed them in uniforms and claimed they were rebels killed in combat
  • U.S. soldiers have admitted that if they kill innocent Iraqis and Afghanis, they then “drop” automatic weapons near their body so they can pretend they were militants
  • The highly-respected writer for the Telegraph Ambrose Evans-Pritchard says that the head of Saudi intelligence – Prince Bandar – admitted last the Saudi government controls “Chechen” terrorists

So Common … There’s a Name for It

This tactic is so common that it was given a name for hundreds of years ago.

“False flag terrorism” is defined as a government attacking its own people, then blaming others in order to justify going to war against the people it blames. Or as Wikipedia defines it:

False flag operations are covert operations conducted by governments, corporations, or other organizations, which are designed to appear as if they are being carried out by other entities. The name is derived from the military concept of flying false colors; that is, flying the flag of a country other than one’s own. False flag operations are not limited to war and counter-insurgency operations, and have been used in peace-time; for example, during Italy’s strategy of tension.

The term comes from the old days of wooden ships, when one ship would hang the flag of its enemy before attacking another ship in its own navy. Because the enemy’s flag, instead of the flag of the real country of the attacking ship, was hung, it was called a “false flag” attack.

Indeed, this concept is so well-accepted that rules of engagement for navalair and land warfare all prohibit false flag attacks.

Leaders Throughout History Have Acknowledged False Flags

Leaders throughout history have acknowledged the danger of false flags:

“This and no other is the root from which a tyrant springs; when he first appears he is a protector.”
– Plato

“If Tyranny and Oppression come to this land, it will be in the guise of fighting a foreign enemy.”
– U.S. President James Madison

“A history of false flag attacks used to manipulate the minds of the people! “In individuals, insanity is rare; but in groups, parties, nations, and epochs it is the rule.”
― Friedrich Nietzsche

“Terrorism is the best political weapon for nothing drives people harder than a fear of sudden death”.
– Adolph Hitler

“Why of course the people don’t want war … But after all it is the leaders of the country who determine the policy, and it is always a simple matter to drag the people along, whether it is a democracy, or a fascist dictatorship, or a parliament, or a communist dictatorship … Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is to tell them they are being attacked, and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same in any country.”
– Hermann Goering, Nazi leader.

“The easiest way to gain control of a population is to carry out acts of terror. [The public] will clamor for such laws if their personal security is threatened”.
– Josef Stalin

People Are Waking Up to False Flags

People are slowly waking up to this whole con job by governments who want to justify war.

More people are talking about the phrase “false flag” than ever before.

 

Activist Post: 11 Signs of a False Flag

Activist Post: 11 Signs of a False Flag.

Dees Illustration

Brandon Turbeville
Activist Post

Throughout history, versions of the false flag attack have been used successfully by governments in order to direct the force of the people toward whatever end the ruling class may be seeking. At times, that end may be war, or it may be the curtailing of domestic civil liberties and basic human rights. In others, it is an economic agenda.

Indeed, false flags are themselves capable of taking on a wide variety of forms – domestic or foreign, small or large, economic or political, and many other designations that can often blur into one another. Each may serve a specific purpose and each may be adjusted and tailored for that specific purpose as societal conditions require.

For instance, the chemical weapons attack which took place inside Syria in August, 2013 serve as an example of a foreign false flag designed to whip up American fervor for war, on the platform of Responsibility to Protect similar to the Gulf of Tonkin.

Domestically speaking, a large-scale false flag such as 9/11, can be used to whip up both a massive public support for war and a popular willingness to surrender civil liberties, constitutional procedure, and constitutional/human rights. Economic false flags may take the form of manufactured “government shutdowns” or “government defaults” designed to create a demand for austerity or other pro-Wall Street solutions. Lastly, smaller-scale domestic false flags such as Sandy Hook orAurora, often involve the implementation of gun-control measures or a greater police state.

There are, of course, many different versions of false flag attacks and none fit into a tightly crafted classification beyond the generalized term “false flag.” As stated above, some false flags may indeed embrace an element of each of the different versions listed previously both in terms of methodology and purpose.

With that in mind, it is also true that, while massive false flag attacks are always a possibility, it has been the small-scale false flags coming in the form of “shooters” (most often of the “lone gunmen” variety), that have been used most effectively by the ruling class and its mouthpiece media outlets in recent years. While the scale of the attacks have diminished, their frequency has rapidly increased.

However, due to a growing competent alternative media and researching community, as fast as the false flag attacks are launched, a volley of deconstructions of the official narratives are being provided. While many criticisms of the official version of events are wildly incredible, bordering on paranoia and impossibility, there are capable outlets and researchers who are able to expose the false flag for what it is. Indeed, it is for this reason that the false flag has suffered serious setbacks in terms of its effectiveness as of late and why it continues to do so.

Because the false flag attack is designed to instill fear, panic, and a guided response from the general public, it is important to deconstruct the narrative of that attack as it is presented. However, we cannot simply be consumed by attempting to expose and deconstruct every false flag attack that comes our way. We cannot ignore the greater issues, the winnable battles, and the demands we must be making simply to expose each and every false flag. We cannot ignore the forest fire to extinguish the occasional burning bush. The false flag, after all, is only the symptom of the disease.

For that reason, it is important to enable the general public to recognize the false flag itself, not simply the questionable elements of a particular false flag which will soon be overtaken by a new one. We must train both ourselves and the public to recognize the signs of the false flag when it happens and thus render the attack neutral.

The following is a list of some of the most common elements of the false flag attack which should immediately be looked at in the event of some other incident that pulls at the heartstrings and emotions of the general public.

1. High Profile Event: The first question to ask would be “Is this a high profile incident?” The answer, of course, is fairly obvious. If an attack takes place at the World Trade Center complex causing the buildings to explode and collapse, or if it takes place at the White House, or Pentagon, it is clearly high profile. Thus, the location can be factored in. In other circumstances, however, the act itself may be the major factor such as the case in Sandy Hook Elementary School, a nationally unimportant location but a horrific act that made national news nonetheless. The most important factor, of course, is media attention. Regardless of location or the act, if the media picks up the story and runs it simultaneously on all major mainstream channels, the incident can be considered a “high profile event.”

2. Changing Stories: In informed researching circles, it is well-known that the information that comes out shortly after the event is usually the most reliable. This is not to discount the existence of confusion related to panicked reports coming from eyewitnesses and the like. However, the information coming out early on has not yet been subjected to the top-down media revision that will inevitably take place as the story becomes molded to fit the narrative pushed by the individuals who either directed the attack at the higher levels or at least have connections with those who are able to control the manner in which various media outlets report the event.

For instance, in times of false flag attacks, the initial reports may point to 5 gunmen. Very shortly after, reports may only mention two. Only a few hours after the attack, however, all references to more than one gunmen are removed entirely, with only the “lone gunman” story remaining. Any other mention of additional gunmen after this point is ridiculed as “conspiracy theory.”

3. Simultaneous Drills: One hallmark of the false flag operation is the running of drills shortly before or during the actual attack. Many times, these drills will involve the actual sequence of events that takes place during the real life attack . These drills have been present on large scale false flags such as 9/11 as well as smaller scale attacks like the Aurora shooting.

For instance, as Webster Tarpley documents in his book 9/11 Synthetic Terror: Made In USA, at least 46 drills were underway in the months leading up to 9/11 and on the morning of the attack. These 46 drills were all directly related to the events which took place on 9/11 in some way or other.[1] Likewise, the 7/7 bombings in London were running drills of exactly the same scenario that was occurring at exactly the same times and locations.

Although one reason may take precedence over the other depending on the nature and purpose of the operation drills are used by false flag operators for at least two reasons. One such purpose is the creation of intentional confusion if the drill is taking place during the actual attack. The other, more effective aspect, however, is using the drill as a cloak to plan the attack or even “go live” when it comes time to launch the event. Even more so, it gives the individuals who are involved in the planning of the event an element of cover, especially with the military/intelligence agency’s tight chain of command structure and need-to-know basis. If a loyal military officer or intelligence agent stumbles upon the planning of the attack, that individual can always be told that what he has witnessed is nothing more than the planning of a training exercise. This deniability continues all the way through to the actual “going live” of the drill. After the completion of the false flag attack, Coincidence Theory is used to explain away the tragic results.[2]

4. Cui Bono? The most important question to ask immediately after any high profile incident is “cui bono?” or “Who benefits?” If one is able to see a clear benefit to any government, corporation, or bank, then the observer becomes capable of seeing through the false flag attack immediately. Many of these questions can be answered by taking a closer look at the behavior of these organizations prior to the attack and shortly thereafter.[3]

For instance, the presence of legislation which would stand little chance of being passed before the attack but which is quickly passed (or at least heavily pushed) afterwards is one clue that the conveniently timed attack was actually a false flag. Patriot Act style legislation was actually written before 9/11 but stood little chance of passing in Congress due to the political climate in the United States at the time. After 9/11, however, the Patriot Act was fast-tracked through both Houses of Congress with virtually no debate and with the blessing of the American people.

Returning to 9/11, it is a fact that a number of individuals who were in positions of power within the US government during the time the attack occurred had desperately wanted to invade several Middle Eastern countries.[4] After the attacks, a war psychosis gripped the ruling class of the United States and the American public followed right along.

After the Underwear Bombing, we saw the rollout of the TSA full-body scanners, a technology which would not have been readily accepted prior to the incident and subsequent propaganda campaign. However, the scanners had been purchased one year earlier by a firm owned by Michael Chertoff, the former head of Homeland Security.

Likewise, in terms of the LAX shooting, TSA purchased 3.5 million dollars worth of ammunition in August. Yet, in August, TSA was not an armed agency. After the LAX shooting, however, talk has turned to arming the agency, thus indicating possible foreknowledge on the part of someone higher up in the governmental structure.

Of course, the same can be said for the explosion of crazed lone-gunman shooting sprees that took place all across the United States amid propaganda pushes for increased gun control measures.

5. Unanswered Questions: Another hallmark of the false flag operation is relatively obvious – the presence of unanswered questions regarding the details of the attack, the perpetrators, the motive and so on. Although the media narrative that takes shape soon after the attack will ignore these questions, they will inevitably remain if observers are able to think for themselves and focus only on the information. An example of such questions would be Building 7 on 9/11 or the questions of additional shooters at Aurora and Sandy Hook.

6. Case is quickly closed: Once an acceptable patsy and cover story is chosen by the media, all other opinions and questions are refused air time. Nothing that even slightly contradicts the official story is acknowledged as legitimate. Once this happens, the patsy, if still alive (in rare circumstances) is charged, prosecuted, and convicted in a largely secret or shadowy proceeding. In most cases, the suspect is killed in the process or shortly after the fact thus negating any first hand contradiction of the official narrative. Either way, the case is closed very soon after the event.

7. Suspects’ Connection to CIA, FBI, or Other Intelligence Agencies: One key aspect suggesting a false flag that should be looked for soon after the attack is any possible connection the suspect or group of suspects may have had with intelligence agencies. A connection to any one of these organizations and institutions may go some length in explaining how the attack was coordinated, the motivation of the perpetrators, the actual involvement (or not) of the suspects, and who actually directed the operation. For instance, on 9/11, many of the alleged hijackers had previously had close contact with the FBI, CIA, and other high-level intelligence agencies (both home and abroad).[5] Likewise, the Tsarnaev brothers who have been accused of masterminding and carrying out the Boston Bombing had ties to the FBI before the attack.

In many instances, connections to certain military agencies and communities should serve as the same red flag as connections to intelligence agencies since these institutions have largely been blended together.

8. Convenient Scapegoat: One clue leading an informed observer to suspect a false flag attack is the existence of the convenient scapegoat. Any false flag operation will have a carefully crafted narrative complete with a group of individuals set up for demonization. The OKC bombing had McVeigh and thus, “right-wing extremists” and “militias.” On 9/11, the group was Muslims. In many of the domestic shooting sprees, the demonization was set for gun owners. With the recent LAX shooting, the “perpetrator” was an “anti-government conspiracy theorist.” In the instance of the false flag, a readily identified pasty will exhibit all or most of the aspects of the group and social demographic set to be demonized.

9. Media Promotes A Narrative Against Scapegoat Groups and/or An Agenda To Take Liberties: One clue suggesting a false flag is that, immediately after the attack and after the perpetrators have been “identified” by “officials” and the media, corporate media outlets begin not only demonizing the demographic group to which the “perpetrator” belongs, but begins promoting “solutions” in order to prevent such an attack from ever happening again. This narrative will always involve the erosion of liberties, the greater implementation of a police state, a specific economic policy, or a march to war.

Simply put, the media promotes the PROBLEM, allows for and guides the REACTION, and then provides the pre-determined SOLUTION.

10. Government Begins to “Take Action” Against the Scapegoat or Moves Along the Lines of the Media Narrative: After a healthy dose of propaganda from mainstream media outlets regurgitating the terror of the attack, the perpetrator, and the police state solutions, the Government then begins to take action. Political speeches are given in order to capitalize on the fear and anger felt by the public and in order to reinforce the idea that government is there to act as protector. Political solutions are then offered as bills, executive orders, or political mandates whether it is the curtailment of the 4th Amendment, gun control, or military strikes on a foreign country.

11. Clues in pop media: Pop media clues, more accurately described as predictive programming, is more easily identified in hindsight. This often involves the portrayal of the very incident occurring in a movie or television show. In other instances, it may involve the conspicuous or even inconspicuous placement of random details of the attack into movies and television. For instance,The Lone Gunman, a short-lived spinoff of the X-Files carried a storyline in which a passenger plane was hijacked via remote control and was being flown into the World Trade Center towers. In The Dark Knight Rises, a very curious reference was made to Sandy Hook with a map of Newtown, Connecticut on the wall.

Conclusion

Although it is extremely important to educate the general public as to the nature and purpose of false flags, education cannot be a goal in and of itself. The public not only needs to know the truth surrounding specific false flag events as they appear, they need to understand the methodology of identifying them on their own and in real time.

Creating a culture in which the general public is able to recognize the false flag attack as it is happening, without the need for a massive push by alternative media sources, researchers, or activists, is the first step in not only rendering the tactic useless, but in corralling the force of the people toward true action or, at the very least, creating a culture in which that force cannot be corralled by the ruling class.

While false flag attacks must be addressed, we must not allow ourselves to be so easily diverted off a path of political action, mass mobilization, and the making of real attainable demands.

Notes:

[1] Tarpley, Webster Griffin. 9/11 Synthetic Terror: Made In USA. 5th Edition. Progressive Press. 2011.
[2] Tarpley, Webster Griffin. 9/11 Synthetic Terror: Made In USA. 5th Edition. Progressive Press. 2011.
[3] Griffin, David Ray. The New Pearl Harbor: Disturbing Questions About the Bush Administration and 9/11. Interlink Publishing Group. 1stEdition. 2004.
[4] Griffin, David Ray. The New Pearl Harbor: Disturbing Questions About the Bush Administration and 9/11. Interlink Publishing Group. 1st Edition. 2004.
[5] Griffin, David Ray. The New Pearl Harbor: Disturbing Questions About the Bush Administration and 9/11. Interlink Publishing Group. 1st Edition. 2004.

Recently from Brandon Turbeville:

Brandon Turbeville is an author out of Florence, South Carolina. He has a Bachelor’s Degree from Francis Marion University and is the author of six books, Codex Alimentarius — The End of Health Freedom7 Real ConspiraciesFive Sense Solutions and Dispatches From a Dissident, volume 1and volume 2, and The Road to Damascus: The Anglo-American Assault on Syria. Turbeville has published over 275 articles dealing on a wide variety of subjects including health, economics, government corruption, and civil liberties. Brandon Turbeville’s podcast Truth on The Tracks can be found every Monday night 9 pm EST at UCYTV.  He is available for radio and TV interviews. Please contact activistpost (at) gmail.com. 

 

These False Flags Were Used To Start A War | Zero Hedge

These False Flags Were Used To Start A War | Zero Hedge.

 

Hundreds Dead In Syrian Chemical Attack As Even Impartial Experts Allege “False Flag” | Zero Hedge

Hundreds Dead In Syrian Chemical Attack As Even Impartial Experts Allege “False Flag” | Zero Hedge.

 

The Dreamtime (techno-industrial collapse) | KUNSTLER

The Dreamtime | KUNSTLER.

 

%d bloggers like this: