Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

False flag

From Wikipedia, the free encyclopedia
Covert operation designed to deceive
For other uses, seeFalse Flag (disambiguation).

A U.S.Douglas A-26C Invader painted in falseCuban Air Force livery depicting those used in theBay of Pigs Invasion undertaken by the CIA-sponsored paramilitary groupBrigade 2506 in April 1961

Afalse flag operation is an act committed with the intent of disguising the actual source of responsibility and pinning blame on another party. The term "false flag" originated in the 16th century as an expression meaning an intentional misrepresentation of someone's allegiance.[1][2] The term was originally used to describe aruse innaval warfare whereby a vessel flew the flag of a neutral or enemy country to hide its true identity.[1][2][3] The tactic was initially used bypirates andprivateers to deceive other ships into allowing them to move closer before attacking them. It later was deemed an acceptable practice during naval warfare according to international maritime laws, provided the attacking vessel displayed its true flag before commencing an attack.[4][5][6]

The term today extends to include countries that organize attacks on themselves and make the attacks appear to be by enemy nations or terrorists, thus giving the nation that was supposedly attacked apretext for domestic repression or foreign military aggression[7] (as well as to engender sympathy). Similarly deceptive activities carried out during peacetime by individuals ornongovernmental organizations have been called false-flag operations, but the more common legal term is a "frameup", "stitch up", or "setup".

Use in warfare

[edit]

In land warfare, such operations are generally deemed acceptable under certain circumstances, such as todeceive enemies, provided the deception is notperfidious and that all such deceptions are discarded before opening fire upon the enemy. Similarly, innaval warfare such a deception is considered permissible, provided the false flag is lowered and the true flag raised before engaging in battle.[8]Auxiliary cruisers operated in such a fashion in both World Wars, as didQ-ships, while merchant vessels were encouraged to use false flags for protection. Such masquerades promoted confusion not just of the enemy but of historical accounts. In 1914, theBattle of Trindade was fought between the British auxiliary cruiserRMSCarmania and the German auxiliary cruiserSMSCap Trafalgar, which had been altered to look likeCarmania.

Another notable example was theWorld War II German commerce raiderKormoran, whichsurprised and sank the Australian light cruiserHMASSydney in 1941 while disguised as a Dutch merchant ship, causing the greatest loss of life on an Australian warship. WhileKormoran was fatally damaged in the engagement and its crew captured, the outcome represented a considerable psychological victory for the Germans.[9]

The British used aKriegsmarineensign in theSt Nazaire Raid and captured a Germancode book. The old destroyerCampbeltown, which the British planned to sacrifice in the operation, was provided with cosmetic modifications that involved cutting the ship's funnels andchamfering the edges to resemble a GermanType 23 torpedo boat. By this ruse the British got within two miles (3 km) of the harbour before the defences responded, where the explosive-riggedCampbeltown and commandos successfully disabled or destroyed the key dock structures of the port.[10][11]

Air warfare

[edit]

Between December 1922 and February 1923, a commission of jurists atthe Hague drafted a set of rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare. They included:[12]

  • Art. 3. A military aircraft must carry an exterior mark indicating its nationality and its military character.
  • Art. 19. The use of false exterior marks is forbidden.

This draft was never adopted as a legally binding treaty, but theInternational Committee of the Red Cross states in its introduction on the draft: "To a great extent, [the draft rules] correspond to the customary rules and general principles underlying treaties on the law of war on land and at sea",[13] and as such these two non-controversial articles were already part of customary law.[14]

Land warfare

[edit]

In land warfare, the use of a false flag is similar to that of naval warfare: the trial ofWaffen SS officerOtto Skorzeny—who planned and commandedOperation Greif—by a U.S.military tribunal at theDachau trials included a finding that Skorzeny was not guilty of a crime by ordering his men into action in American uniforms. He had relayed to his men the warning of German legal experts: if they fought in American uniforms, they would be breaking thelaws of war; however, they probably were not doing so simply by wearing the American uniforms. During the trial, a number of arguments were advanced to substantiate this position and the German and U.S. military seem to have been in agreement.

In the transcript of the trial,[15] it is mentioned that Paragraph 43 of theField Manual published by theWar Department,United States Army, on 1 October 1940, under the entryRules of Land Warfare states: "National flags, insignias and uniforms as a ruse – in practice it has been authorized to make use of these as a ruse. The foregoing rule (Article 23 of the Annex of theIV Hague Convention), does not prohibit such use, but does prohibit their improper use. It is certainly forbidden to make use of them during a combat. Before opening fire upon the enemy, they must be discarded."

As pretexts for war

[edit]
Further information:Pretext § Uses in warfare

Russo-Swedish War

[edit]

In 1788, the head tailor at theRoyal Swedish Opera received an order to sew a number of Russian military uniforms. These were then used by Swedes to stage an attack onPuumala, a Swedish outpost on the Russo-Swedish border, on 27 June 1788. This caused an outrage inStockholm and impressed theRiksdag of the Estates, the Swedish national assembly, who until then had refused to agree to an offensive war against Russia. The Puumala incident allowed KingGustav III of Sweden, who lacked the constitutional authority to initiate unprovoked hostilities without the Estates' consent, to launch theRusso-Swedish War (1788–1790).[16]

Franco-Prussian War

[edit]
Main article:Franco-Prussian War
See also:Causes of the Franco-Prussian War

On July 13, 1870,Otto von Bismarck published theEms Dispatch, an internal message from KingWilhelm I to Bismarck regarding certain demands made by the French ambassador. In the version purposefully released to the public, Bismarck instead made it sound like the King had gravely disrespected the ambassador – a ploy to trick EmperorNapoleon III into declaring war on theNorth German Confederation, with the end goal of unifying the northern and southern German states. This ploy would be successful, as Napoleon III would declare war six days later; and six months later, the Confederation would win andunify the German states.

Second Sino-Japanese War

[edit]
Main article:Mukden incident
Japanese experts inspect the scene of the "railway sabotage" on theSouth Manchurian Railway.

In September 1931,Seishirō Itagaki and otherJapanese mid- to junior-grade officers, without the knowledge of the Tokyo government, fabricated a pretext for invadingManchuria by blowing up a section of railway. Though the explosion was too weak to disrupt operations on the rail line, the Japanese nevertheless used theMukden incident to seize Manchuria and create apuppet government in the form of the nominally independent state ofManchukuo.[17]

World War II

[edit]

Gleiwitz incident

[edit]
Main article:Gleiwitz incident
Alfred Naujocks

TheGleiwitz incident in 1939 involvedReinhard Heydrich fabricating evidence of aPolish attack againstGermany to mobilize German public opinion for war and to justify thewar against Poland.Alfred Naujocks was a key organiser of the operation under orders from Heydrich. It led to the deaths ofNazi concentration camp victims who were dressed as German soldiers and then shot by theGestapo to make it seem that they had been shot by Polish soldiers. This, along with other false flag operations inOperation Himmler, would be used to mobilize support from the German population for the start ofWorld War II in Europe.[18]

The operation failed to convince international public opinion of the German claims, and both Britain and France – Poland's allies – declared war two days after Germany invaded Poland.[19]

Winter War

[edit]

On 26 November 1939, the Soviet armyshelled Mainila, a Russian village near the Finnish border. Soviet authorities blamedFinland for the attack and used the incident as a pretext to invade Finland, starting theWinter War, four days later.[20][21]

Cuban Revolution

[edit]

Operation Northwoods

[edit]
Main article:Operation Northwoods
Operation Northwoods memorandum (13 March 1962)[22]

Operation Northwoods, a 1962 plot proposed but never executed by theU.S. Department of Defense for a war withCuba, involved scenarios such as fabricating the hijacking or shooting down of passenger and military planes, sinking a U.S. ship in the vicinity of Cuba, burning crops, sinking a boat filled with Cuban refugees, attacks by alleged Cuban infiltrators inside the United States, and harassment of U.S. aircraft and shipping, and the destruction of aerial drones by aircraft disguised as Cuban MiGs.[22] These actions would be blamed on Cuba, and would be a pretext for an invasion of Cuba and the overthrow ofFidel Castro's communist government. It was authorised by theJoint Chiefs of Staff, but then rejected by PresidentJohn F. Kennedy. The surprise discovery of the documents relating to Operation Northwoods was a result of the comprehensive search for records related to theassassination of President John F. Kennedy by theAssassination Records Review Board in the mid-1990s.[23] Information about Operation Northwoods was later publicized byJames Bamford.[24]

Russian invasion of Ukraine

[edit]

In January and February 2022, U.S. officials warned that Russian operatives were planning a false flag operation in Ukraine in order to justify a military intervention.[25] In the days leading up to theRussian invasion of Ukraine on 24 February, the Russian government intensified itsdisinformation campaign, with Russian state media promoting false flags on a nearly hourly basis purporting to show Ukrainian forces attacking Russia, in a bid to justify an invasion of Ukraine.[26][27] Many of the disinformation videos were poor and amateur in quality, with mismatchingmetadata showing incorrect dates,[27] and evidence fromBellingcat researchers and other independent journalists showed that the claimed attacks, explosions, and evacuations inDonbas were staged by Russia.[26][27][28][29][30]

United States-Venezuela tensions

[edit]
Main article:2025 United States naval deployment in the Caribbean

On October 26th, 2025,Venezuela claimed that a potential covert CIA-assistedTrinidad and Tobago mercenaries had planned to stage a false-flag attack on theUSS Gravely, assumed to spark military escalation during the heightened tensions between the United States and Venezuela during the United Statesnaval deployment andattacks on boats claimed to be transporting drugs in the Caribbean.[31][32]

As a tactic to undermine political opponents

[edit]

Lermontov detachment

[edit]

During theCaucasus War aRussian imperial army special unit named "Lermontov detachment" (for a few months it was headed byMikhail Lermontov) operated behind enemy lines disguised as the insurgents. An insider account reported that "they shaved their heads, grew beards, dressed themCircassian style, and armed them withdouble-barreled shotguns with bayonets."[33]

Soviet covert operations in Ukraine

[edit]
Main article:NKVD units dressed as UPA fighters

In thepost-World War IIUkraine, SovietNKVD employed units dressed asUkrainian Insurgent Army fighters. They committed a number of well-documented atrocities against civilian population posing as the insurgents.[34]

Operation TPAJAX

[edit]
Main article:1953 Iranian coup d'état

On 4 April 1953, theCIA was ordered to undermine the government of Iran over a four-month period, as a precursor to overthrowing Prime MinisterMohammad Mosaddegh. One tactic used to undermine Mosaddegh was to carry out false flag attacks "on mosques and key public figures", to be blamed on Iranian communists loyal to the government.[35]

The CIA operation was code-namedTPAJAX. The tactic of a "directed campaign of bombings by Iranians posing as members of the Communist party" involved the bombing of "at least one" well known Muslim's house by CIA agents posing as Communists.[36] The CIA determined that the tactic of false flag attacks added to the "positive outcome" ofTPAJAX.[35]

However, as "the C.I.A. burned nearly all of its files on its role in the 1953 coup in Iran", the true extent of the tactic has been difficult for historians to discern.[37]

Operation Susannah

[edit]
Main article:Lavon Affair

In the summer of 1954, a group ofEgyptian Jews recruited byAman planned to bomb American, British, and Egyptian civil targets in Egypt. The bombings were to be blamed on theMuslim Brotherhood, EgyptianCommunists, "unspecified malcontents", or "local nationalists", with the aim of creating a climate of sufficient violence and instability to induce the British government to refrain from evacuating its troops occupying theSuez Canal.[38][39]

Only two bombs were successfully detonated before the plot was discovered.[40] Unknown to Israel Prime MinisterMoshe Sharet, the exposé caused a scandal in Israel, with Israeli officials blaming one another for the operation and the Israeli defense minister,Pinhas Lavon, resigning under pressure. Later, two investigative committees found that Lavon was unaware of the operation.[40][41]

Failed operations

[edit]

Due to its deceptive nature a false flag operation can fail in such a manner as to implicate the perpetrator rather than the intended victim.

A notable example is an April 2022FSB operation where would-be Ukrainian assassins of Russian propagandistVladimir Solovyov were filmed while being arrested. The footage published by the FSB was, however, found to implicate the FSB as having staged the arrest. Together with weapons, drugs, Ukrainian passports, and Nazi memorabilia the footage also prominently showed three expansion packs forThe Sims 3 video game. Investigative journalistEliot Higgins interpreted this to mean that the arrest was in fact staged, with its organizers misunderstanding an instruction "to get 3SIMs". Further lending credence to the arrest being staged was footage of a note with a Russian phrase, which in fact readsignature unclear. This was again interpreted as a misunderstood instruction, this time taken too literally. The FSB subsequently published a version of the footage with the Sims games blurred out.[42][43][44]

Pseudo-operations

[edit]

Pseudo-operations are those in which forces of one power disguise themselves as enemy forces. For example, a state power may disguise teams of operatives as insurgents and, with the aid of defectors, infiltrate insurgent areas.[45] The aim of such pseudo-operations may be to gather short- or long-termintelligence or to engage in active operations, in particularassassinations of important enemies. However, they usually involve both, as the risks of exposure rapidly increase with time and intelligence gathering eventually leads to violent confrontation. Pseudo-operations may be directed by military or police forces, or both. Police forces are usually best suited to intelligence tasks; however, military provide the structure needed to back up such pseudo-ops with military response forces. According to US military expert Lawrence Cline (2005), "the teams typically have been controlled by police services, but this largely was due to the weaknesses in the respective military intelligence systems."[46]

Charlemagne Péralte of Haiti was assassinated in 1919 after checkpoints were passed by military disguised as guerrilla fighters.

TheState Political Directorate (OGPU) of theSoviet Union set up such an operation from 1921 to 1926. DuringOperation Trust, they used loose networks ofWhite Army supporters and extended them, creating the pseudo-"Monarchist Union of Central Russia" (MUCR) in order to help the OGPU identify real monarchists and anti-Bolsheviks.[47]

An example of a successful assassination wasUnited States MarineSergeantHerman H. Hanneken leading a patrol of hisHaitianGendarmerie disguised as enemyguerrillas in 1919. The patrol successfully passed several enemy checkpoints in order to assassinate the guerilla leaderCharlemagne Péralte nearGrande-Rivière-du-Nord. Hanneken was awarded theMedal of Honor[48] and was commissioned a Second Lieutenant for his deed.[citation needed]

During theMau Mau uprising in the 1950s, captured Mau Mau members who switched sides and specially trained British troops initiated the pseudo-gang concept to successfully counter Mau Mau. In 1960,Frank Kitson, who was later involved in theNorthern Irish conflict, publishedGangs and Counter-gangs, an account of his experiences with the technique inKenya. Information included how to counter gangs and measures of deception, including the use of defectors, which brought the issue a wider audience.[citation needed]

Another example of combined police and military oversight of pseudo-operations include theSelous Scouts in the former countryRhodesia (nowZimbabwe), governed bywhite minority rule until 1980. The Selous Scouts were formed at the beginning ofOperation Hurricane, in November 1973, by Major (later Lieutenant Colonel)Ronald Reid-Daly. As with all Special Forces in Rhodesia, by 1977, they were controlled by COMOPS (Commander, Combined Operations) Commander Lieutenant GeneralPeter Walls. The Selous Scouts were originally composed of 120 members, with all officers being white and the highest rank initially available for black soldiers beingcolour sergeant. They succeeded in turning approximately 800 insurgents who were then paid by Special Branch, ultimately reaching the number of 1,500 members. Engaging mainly in long-range reconnaissance and surveillance missions, they increasingly turned to offensive actions, including the attempted assassination ofZimbabwe People's Revolutionary Army leaderJoshua Nkomo inZambia. This mission was finally aborted by the Selous Scouts, and attempted again, unsuccessfully, by theRhodesian Special Air Service.[49]

Some offensive operations attracted international condemnation, in particular the Selous Scouts' raid on aZimbabwe African National Liberation Army (ZANLA) camp at Nyadzonya Pungwe,Mozambique in August 1976. ZANLA was then led byJosiah Tongogara. Using Rhodesian trucks and armored cars disguised as Mozambique military vehicles, 84 scouts killed 1,284 people in the camp, registered as arefugee camp by theUnited Nations (UN). Even according to Reid-Daly, most of those killed were unarmed guerrillas standing in formation for a parade. The camp hospital was also set ablaze by the rounds fired by the Scouts, killing all patients.[50] According to David Martin and Phyllis Johnson, who visited the camp shortly before the raid, it was only a refugee camp that did not host any guerrillas. It was staged for UN approval.[51]

According to a 1978 study by the Directorate of Military Intelligence, 68% of all insurgent deaths inside Rhodesia could be attributed to the Selous Scouts, who were disbanded in 1980.[52]

If the action is a police action, then these tactics would fall within the laws of the state initiating the pseudo, but if such actions are taken in acivil war or during abelligerent military occupation then those who participate in such actions would not beprivileged belligerents. The principle ofplausible deniability is usually applied for pseudo-teams. (See the above sectionLaws of war)[clarification needed]. Some false flag operations have been described by Lawrence E. Cline, a retiredUS Army intelligence officer, as pseudo-operations, or "the use of organized teams which are disguised as guerrilla groups for long- or short-term penetration ofinsurgent-controlled areas".[45]

"Pseudo-operations should be distinguished," notes Cline, "from the more common police or intelligenceinfiltration of guerrilla or criminal organizations. In the latter case, infiltration is normally done by individuals. Pseudo teams, on the other hand, are formed as needed from organized units, usually military orparamilitary. The use of pseudo teams has been a hallmark of a number of foreigncounterinsurgency campaigns."[45]

Similar false flag tactics were also employed during theAlgerian Civil War, starting in the middle of 1994.Death squads composed ofDépartement du Renseignement et de la Sécurité (DRS) security forces disguised themselves as Islamist terrorists and committed false flag terror attacks. Such groups included theOrganisation of Young Free Algerians (OJAL) or the Secret Organisation for the Safeguard of the Algerian Republic (OSSRA).[53] According toRoger Faligot and Pascal Kropp (1999), the OJAL was reminiscent of "the Organization of the French Algerian Resistance (ORAF), a group of counter-terrorists created in December 1956 by theDirection de la surveillance du territoire (Territorial Surveillance Directorate, or DST) whose mission was to carry out terrorist attacks with the aim of quashing any hopes of political compromise".[54]

Espionage

[edit]
Main article:False flag penetrator

Inespionage, the term "false flag" describes the recruiting of agents by operatives posing as representatives of a cause the prospective agents are sympathetic to, or even the agents' own government. For example, during theCold War, several femaleWest German civil servants were tricked into stealing classified documents by agents of theEast GermanStasi intelligence service pretending to be members of West German peace advocacy groups (theStasi agents were also described as "Romeos", indicating that they also used their sex appeal to manipulate their targets, making this operation a combination of the false flag and "honey trap" techniques).[55]

According to ex-KGB defectorJack Barsky, "Many a right-wing radical had given information to the Soviets under a 'false flag', thinking they were working with a Western ally, such as Israel, when in fact their contact was a KGB operative."[56]

Militant usage

[edit]

False flag operations are also utilized bynon-state actors andterrorist organizations. During theIndian security forces siege prior to the storming of the Golden Temple,Babbar Khalsa militants allegedly infiltrated buildings between CRPF lines and the positions of pro-Bhindranwale militants and fired in both directions in the hope of provoking firefights. This was allegedly done as a result of Babbar Khalsa leader Bibi Amarjit Kaur blaming Bhindranwale for the death of her husband, Fauja Singh, during the1978 Sikh-Nirankari clashe.[57]

On October 5, 1987,LTTE fighters infiltrated betweenIPKF andSri Lankan army positions in theKankesanturai area and provoked a firefight between the two forces as part of the revenge operations in retaliation for the suicide in custody of 15 LTTE leaders who were about to be handed into Sri Lankan custody.[58]

Civilian usage

[edit]

The term is popular amongconspiracy theory promoters in referring tocovert operations of various governments and claimedcabals.[59] According toColumbia Journalism Review, this usage mostly "migrated to the right", however because some historical false flag incidents occurred, historians should not fully cede the usage of the term to conspiracy theorists. Perlman says "The real danger is if we use the nonattributive 'false flags' as shorthand for conspiracy theories, without explaining what they are and who is promoting them." At the same time, Perlman writes that "people yelling that any attack attributed to someone on 'their side' was committed by 'the other side' drown out the voices of reason."[2]

Political campaigning

[edit]

Political campaigning has a long history of this tactic in various forms, including in person, print media and electronically in recent years. This can involve when supporters of one candidate pose as supporters of another, or act as "straw men" for their preferred candidate to debate against. This can happen with or without the candidate's knowledge. TheCanuck letter is an example of one candidate's creating a false document and attributing it as coming from another candidate in order to discredit that candidate.[citation needed]

In 2006, individuals practicing false flag behavior were discovered and "outed" inNew Hampshire[60][61] andNew Jersey[62] afterblog comments claiming to be from supporters of a political candidate were traced to theIP address of paid staffers for that candidate's opponent.

On 19 February 2011, Indiana Deputy Prosecutor Carlos Lam sent a private email to Wisconsin GovernorScott Walker suggesting that he run a "'false flag' operation" to counter theprotests against Walker's proposed restrictions on public employees'collective bargaining rights:

If you could employ an associate who pretends to be sympathetic to the unions' cause to physically attack you (or even use a firearm against you), you could discredit the unions ... Employing a false flag operation would assist in undercutting any support the media may be creating in favor of the unions.[63][64]

The press had acquired a court order to access all of Walker's emails and Lam's email was exposed. At first, Lam vehemently denied sending the email, but eventually admitted it and resigned.[64]

Some conservative commentators suggested thatpipe bombs that were sent to prominent Democrats prior to the 2018 mid-term elections were part of a false flag effort to discredit Republicans and supporters of then-President Donald Trump.[65] Cesar Sayoc, motivated by his belief that Democrats were "evil", was later convicted of mailing the devices to Trump's critics.[66]

On the internet, aconcern troll is a false flagpseudonym created by a user whose actualpoint of view is opposed to the one that the troll claims to hold. The concern troll posts in web forums devoted to its declared point of view and attempts to sway the group's actions or opinions while claiming toshare their goals, but with professed "concerns". The goal is to sowfear, uncertainty, and doubt within the group often by appealing tooutrage culture.[67] This is a particular case ofsockpuppeting andsafe-baiting.

During the2025 Canadian federal election campaign,Liberal Party of Canada strategists were exposed after their false flag operation failed. ACBC News journalist who was speaking with Liberal staff at a bar inOttawa learned how "Stop the Steal" buttons were placed at aConservative Party of Canada event. The operatives hoped attendees would wear them, which would allow Liberals to publicly conflate Conservative supporters and leaderPierre Poilievre withDonald J. Trump. After the false flag mission was reported by the journalist, Liberal leader,Mark Carney, reassigned those involved.[68][69]

Ideological

[edit]
A bomb threat forged by Scientology operatives

Proponents of political or religious ideologies will sometimes use false flag tactics. This can be done to discredit or implicate rival groups, create the appearance of enemies when none exist, or create the illusion of organized and directed persecution. This can be used to gain attention and sympathy from outsiders, in particular the media, or to convince others within the group that their beliefs are under attack and in need of protection.

In retaliation for writingThe Scandal of Scientology, some members of the Church ofScientology stole stationery from authorPaulette Cooper's home and then used that stationery to forge bomb threats and have them mailed to a Scientology office. TheGuardian's Office also had a plan for further operations to discredit Cooper known asOperation Freakout, but several Scientology operatives were arrested in a separate investigation and the plan was exposed.[70]

According toPolitiFact, some false flag conspiracy theories (such as claims that mass shootings are hoaxes) are themselves spread byastroturfing, which is an attempt to create false impression of popularity in a belief.[71]

See also

[edit]

Concepts

[edit]

References

[edit]
  1. ^abO'Conner, Patricia; Kellerman, Stewart (11 May 2018)."The True History of False Flags". Grammarphobia.com. Retrieved9 June 2020.
  2. ^abc"How the term 'false flag' migrated to the right".Columbia Journalism Review. Retrieved23 December 2021.
  3. ^"False flags: What are they and when have they been used?".BBC News. 18 February 2022. Retrieved20 May 2022.
  4. ^Politakis, George P. (2018).Modern Aspects of the Laws of Naval Warfare and Maritime Neutrality. Taylor & Francis. pp. 281–.ISBN 978-1-136-88577-8.
  5. ^Faye Kert (30 September 2015).Privateering: Patriots and Profits in the War of 1812. JHU Press. pp. 62–.ISBN 978-1-4214-1747-9.
  6. ^Donald R. Hickey; Connie D. Clark (8 October 2015).The Routledge Handbook of the War of 1812. Routledge. pp. 64–.ISBN 978-1-317-70198-9.
  7. ^deHaven-Smith, Lance (2013).Conspiracy Theory in America. Austin:University of Texas Press. p. 225
  8. ^"the use of a false flag has always been accepted as a legitimateruse de guerre in naval warfare, the true battle flag being run up immediately before engaging" (Thomas, Rosamund M., ed. (1993),Teaching Ethics: Government ethics, Centre for Business and Public, p. 80,ISBN 9781871891034).
  9. ^Squires, Nick. "HMAS Sydney found off Australia's west coast",The Telegraph, 17 March 2008.
  10. ^Guinness World Records (2009), p.155
  11. ^Young, P (Ed) (1973) Atlas of the Second World War (London: The Military Book Society)
  12. ^The Hague Rules of Air Warfare, December 1922 to February 1923, this convention was never adopted (backup site).
  13. ^"Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare. Drafted by a Commission of Jurists at the Hague, December 1922 – February 1923: Introduction".ICRC. Retrieved11 February 2025.
  14. ^Gómez, Javier Guisández (20 June 1998)."The Law of Air Warfare".International Review of the Red Cross.38 (323):347–63.doi:10.1017/S0020860400091075. Archived fromthe original on 25 April 2013.
  15. ^Law Reports of Trials of War Criminals. United Nations War Crimes Commission.Vol IX, 1949: Trial of Otto Skorzeny and others.Archived 2 October 2008 at theWayback Machine. General Military Government Court of the U.S. zone of Germany 18 August to 9 September 1947.
  16. ^Mattila, Tapabi (1983).Meri maamme turvana: Suomen meripuolustuksen vaiheita Ruotsin vallan aikana [The Sea As Our Country's Security: Phases of Finnish Sea Defense During Swedish Rule] (in Finnish). Jyväskylä: Suomi Merellä-säätiö. p. 142.ISBN 951-99487-0-8.
  17. ^Weland, James (1994). "Misguided Intelligence: Japanese Military Intelligence Officers in the Manchurian Incident, September 1931".The Journal of Military History.58 (3):445–460.doi:10.2307/2944134.JSTOR 2944134.
  18. ^Lightbody, Bradley (2004).The Second World War: Ambitions to Nemesis. Abingdon-on-Thames:Routledge. p. 39.ISBN 978-0-415-22405-5.
  19. ^Zaloga, Steve (2004) [originally published in 2002 by Osprey Publishing].Poland 1939: The Birth of Blitzkrieg (illustrated ed.). Westport:Praeger Publishers. p. 39.ISBN 978-0275982782.
  20. ^Turtola, Martti (1999). "Kansainvälinen kehitys Euroopassa ja Suomessa 1930-luvulla". In Leskinen, Jari; Juutilainen, Antti (eds.).Talvisodan pikkujättiläinen [The Little Giant of the Winter War].Werner Söderström Osakeyhtiö. pp. 44–45.
  21. ^Murphy, David (2021).The Finnish-Soviet Winter War 1939-40 Stalin's Hollow Victory. Johnny Shumate. London: Bloomsbury Publishing Plc. p. 9.ISBN 978-1-4728-4394-4.OCLC 1261364794.
  22. ^ab"Pentagon Proposes Pretexts for Cuba Invasion in 1962".National Security Archive. 30 April 2001. Archived fromthe original on 1 May 2024. Retrieved14 August 2024.
  23. ^P. Horne, Douglas (2009).Inside the Assassination Records Review Board: The U.S. Government's Final Attempt to Reconcile the Conflicting Medical Evidence in the Assassination of JFK. self-published.ISBN 978-0984314447. Retrieved30 October 2018.
  24. ^Bamford, James (2002).Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. Anchor Books. pp. 82–91.ISBN 978-0-385-49907-1.
  25. ^Walton, Calder (4 February 2022)."False-Flag Invasions Are a Russian Specialty".Foreign Policy. Retrieved14 March 2022.
  26. ^abGilbert, David (21 February 2022)."Russia's 'Idiotic' Disinformation Campaign Could Still Lead to War in Ukraine".Vice News.Vice Media.Archived from the original on 21 February 2022. Retrieved22 February 2022.
  27. ^abc"Four Russian false flags that are comically easy to debunk".The Daily Telegraph. 21 February 2022.Archived from the original on 22 February 2022. Retrieved22 February 2022.
  28. ^"Russia says it prevented border breach from Ukraine, Kyiv calls it fake news".Reuters. 21 February 2022.Archived from the original on 21 February 2022. Retrieved21 February 2022.
  29. ^Bellingcat Investigation Team (23 February 2022)."Documenting and Debunking Dubious Footage from Ukraine's Frontlines".Bellingcat.Archived from the original on 23 February 2022. Retrieved24 February 2022.
  30. ^"'Dumb and lazy': the flawed films of Ukrainian 'attacks' made by Russia's 'fake factory'".The Guardian. 21 February 2022.Archived from the original on 21 February 2022. Retrieved22 February 2022.
  31. ^"Venezuela claims to have captured 'CIA backed cell plotting false flag attack'".The Independent. 28 October 2025. Retrieved15 November 2025.
  32. ^Feast, Lincoln, ed. (26 October 2025)."Venezuela condemns 'military provocation' by CIA and Trinidad and Tobago".Reuters. Retrieved15 November 2025.{{cite news}}: CS1 maint: url-status (link)
  33. ^Davies, Jessie. (1989) The Fey Hussar: The Life of the Russian Poet, Michael Yur'evich Lemontov, 1814-41 to Commemorate the 175th Anniversary of the Poet's Birth. Liverpool: Lincoln Davies & Co., pp. 346-347.
  34. ^Wilson, A. (2005) Virtual Politics: Faking Democracy in the Post-Soviet World. New Haven: Yale University Press. p. 15.
  35. ^abCallanan, James (30 November 2009).Covert Action in the Cold War: US Policy, Intelligence and CIA Operations. London:I.B. Tauris. p. 115.ISBN 978-0857711663.
  36. ^Risen, James (16 April 2000)."SECRETS OF HISTORY: The C.I.A. in Iran — A Special Report; How a Plot Convulsed Iran in '53 (and in '79)".The New York Times.ISSN 0362-4331.Archived from the original on 22 July 2016. Retrieved14 August 2024.
  37. ^Weiner, Tim (29 May 1997)."C.I.A. Destroyed Files on 1953 Iran Coup".The New York Times.ISSN 0362-4331.Archived from the original on 16 November 2020. Retrieved14 August 2024.
  38. ^Teveth, Shabtai (1996).Ben-Gurion's Spy: The Story of the Political Scandal That Shaped Modern Israel. New York: Columbia University Press. p. 81.ISBN 978-0-231-10464-7.
  39. ^Hahn, Peter L (2004).United States, Great Britain, and Egypt, 1945-1956: Strategy and Diplomacy. Chapel Hill: UNC Press. p. 187.ISBN 978-0-8078-1942-5.
  40. ^abBlack, Ian;Morris, Benny (1 June 1992).Israel's Secret Wars: A History of Israel's Intelligence Services(PDF). New York: Grove Press. p. 111.ISBN 978-0-8021-3286-4.
  41. ^Tucker, Spencer C., ed. (2008).The Encyclopedia of the Arab-Israeli Conflict: A Political, Social, and Military History. Vol. II. Santa Barbara: ABC-CLIO. p. 610.ISBN 978-1-85109-841-5.
  42. ^Teh, Cheryl (26 April 2022)."Journalists mocked Russia's spy agency after copies of the 'Sims 3' video game were spotted in a clip of agents allegedly foiling an assassination plot".Business Insider. Retrieved14 August 2024.
  43. ^Klimentov, Mikhail."Alleged Russian sting operation uncovers 'The Sims 3,' guns, grenade".The Washington Post. Retrieved14 August 2024.
  44. ^Childs, Simon (26 April 2022)."Russia Bizarrely Includes Sims 3 Among Evidence of 'Staged' Assassination Plot".vice.com.Vice Media. Retrieved14 August 2024.
  45. ^abcCline, Lawrence E. (2005)Pseudo Operations and Counterinsurgency: Lessons from other countries,Archived 16 November 2016 at theWayback Machine,Strategic Studies Institute.
  46. ^"Excerpt – Pseudo Operations and Counterinsurgency: Lessons from Other Countries".ssi.armywarcollege.edu. Archived fromthe original on 2 May 2017. Retrieved16 October 2019.
  47. ^Andrew, Christopher (2001).The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB. Basic Books. pp. 33–35, 42.ISBN 0-465-00312-5.
  48. ^"Ex-Marine Corps Gen. Hanneken Dies".Los Angeles Times. 27 August 1986.ISSN 0458-3035. Retrieved7 November 2017.
  49. ^Cline (2005), p. 11.
  50. ^Cline (2005), quoting Reid-Daly,Pamwe Chete: The Legend of the Selous Scouts, Weltevreden Park, South Africa:Covos-Day Books, 1999, p. 10 (republished by Covos Day, 2001,ISBN 978-1-919874-33-3).
  51. ^Cline (2005), who quotes David Martin and Phyllis Johnson,The Struggle for Zimbabwe: the Chimurenga War, New York: Monthly Review Press, 1981, pp. 241–242.
  52. ^Cline (2005), pp. 8–13. For 1978 study, quotes J. K. Cilliers,Counter-insurgency in Rhodesia, London:Croom Helm, 1985, pp. 60–77. Cline also quotes Ian F. W. Beckett,The Rhodesian Army: Counter-Insurgency 1972–1979 atselousscouts.
  53. ^Lounis Aggoun and Jean-Baptiste Rivoire (2004).Françalgérie, crimes et mensonges d'Etats, (Franco-Algeria, Crimes and Lies of the States).Editions La Découverte [fr].ISBN 2-7071-4747-8. Extract in English with mention of the OJALavailable here.
  54. ^Luonis Aggoun and Jean-Baptiste Rivoire,ibid., quotingRoger Faligot and Pascal KROP,DST, Police Secrète,Flammarion, 1999, p. 174.
  55. ^Crawford, Angus (20 March 2009)."Victims of Cold War 'Romeo spies'".BBC Online. Retrieved10 April 2009.
  56. ^Barsky, Jack (2017).Deep undercover: my secret life and tangled allegiances as a KGB spy in America. Carol Stream, IL: Tyndale House.ISBN 978-1-4964-1686-5.OCLC 979545331.
  57. ^"Backgrounder, Punjab".satp.org. Retrieved22 January 2025.
  58. ^"Chapter 2: Accord, Airlift and Discord".Bharat Rakshak. 5 October 2009. Retrieved22 January 2025.
  59. ^Usckinski, Joseph (27 October 2018)."Five things to know about 'false flag' conspiracy theories".The Washington Post. Retrieved9 June 2020.
  60. ^Steele, Allison,"Bass staffer in D.C. poses as blogger: Bogus posts aimed at his political opponent"Archived 12 March 2007 at theWayback Machine,Concord Monitor, 26 September 2006 (URL last accessed 24 October 2006).
  61. ^Saunders, Anne,"Bass aide resigns after posing as opponent's supporter online",The Boston Globe, 26 September 2006 (URL last accessed 24 October 2006).
  62. ^Miller, Jonathan,"Blog Thinks Aide to Kean Posted Jabs At Menendez",The New York Times, 21 September 2006 (URL last accessed 24 October 2006).
  63. ^Golden, Kate (24 March 2011)."Indiana prosecutor resigns over Walker email".WisWatch.org. Wisconsin Center for Investigative Journalism. Retrieved21 June 2016.
  64. ^abMontopoli, Brian (25 March 2011)."Indiana prosecutor resigns for encouraging fake attack on Wisconsin governor".CBS News.Archived from the original on 12 April 2012.
  65. ^Collins, Ben; Abbruzzese, Jason (26 October 2018)."After 'false flag' narrative takes hold, some conservatives scramble to drown out far right".nbcnews.com.NBC News. Retrieved9 July 2021.
  66. ^"Cesar Sayoc, who mailed explosive devices to Trump's critics, sentenced to 20 years in prison".The Washington Post. 5 August 2019. Retrieved7 August 2019.
  67. ^Cox, Ana Marie (16 December 2006)."Making Mischief on the Web".Time. Archived fromthe original on 13 January 2007. Retrieved24 March 2009.
  68. ^McKenna, Kate (13 April 2025)."Liberal operatives planted 'stop the steal' buttons at conservative conference".www.cbc.ca. Retrieved25 May 2025.
  69. ^Gedeon, Joseph (14 April 2025)."Liberal staffers plant 'stop the steal' pins at Canadian conservative conference".The Guardian.
  70. ^United States of America v. Jane Kember, Morris Budlong, Sentencing Memorandum; pp. 23–25.
  71. ^"Why do some people think mass shootings are staged every time?".politifact. 2019.

External links

[edit]
  • The dictionary definition offalse flag at Wiktionary
Core content
Mechanisms
Psychological
Computational
Economic
Media and Politics
Tactics
Related terms
Targets and campaigns
International Politics
Politics by country
Antisemitism
Environmental science
Medicine and Public health
Journalism and journalists
Countering disinformation
Fact-checking and research
Fact-checking
Research
WikiProjects
Analysis
Devices and
communications
Tradecraft and
techniques
Operations
Collection
Human (HUMINT)
Clandestine
Espionage
Signals (SIGINT)
Measurement and
signature (MASINT)
Other
Analysis
Dissemination
Context
Activism
Advertising
Censorship and
mass media regulation
Hoaxing
Marketing
News media
Political campaigning
Propaganda
Psychological warfare
Public relations
Sales
Related
Techniques
Equipment
Operations
Texts
Retrieved from "https://en.wikipedia.org/w/index.php?title=False_flag&oldid=1324130023"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp