Beruflich Dokumente
Kultur Dokumente
False colors redirects here. For the imaging technique, Cap Trafalgar which had been altered to look like Carsee False-color.
mania. (Contrary to some possibly mendacious accounts
The contemporary term false ag describes covert oper- the RMS Carmania had not been altered to resemble the
Cap Trafalgar.)
Another notable example was the World War II German
commerce raider Kormoran which surprised and sank the
Australian light cruiser HMAS Sydney in 1941 while disguised as a Dutch merchant ship, causing the greatest
recorded loss of life on an Australian warship. While
Kormoran was fatally damaged in the engagement and
its crew captured the outcome represented a considerable
psychological victory for the Germans.[3]
Other examples from WWII included a Kriegsmarine
ensign in the St Nazaire Raid and captured a German code
This US Douglas A-26 C Invader was painted in fake Cuban Air book: the old destroyer Campbeltown, which the British
Force colors for the military invasion of Cuba undertaken by the planned to sacrice in the operation, was provided with
CIA-sponsored paramilitary group Brigade 2506 in April 1961. cosmetic modications that involved cutting the ships
funnels and chamfering the edges to resemble a German
ations that are designed to deceive in such a way that the Type 23 torpedo boat.
operations appear as though they are being carried out by
By this ruse the British were able to get within two miles
entities, groups, or nations other than those who actually
(3 km) of the harbour before the defences responded,
planned and executed them.[1]
where the explosive-rigged Campbeltown and commanHistorically, the term false ag has its origins in naval dos successfully disabled or destroyed the key dock strucwarfare where the use of a ag other than the belligerents tures of the port.[4][5]
true battle ag as a ruse de guerre, before engaging the
enemy, has long been accepted.[1]
Operations carried out during peace-time by civilian or- 1.1 Air warfare
ganizations, as well as covert government agencies, can
(by extension) also be called false ag operations if they
In December 1922February 1923, Rules concerning the
seek to hide the real organization behind an operation.
Control of Wireless Telegraphy in Time of War and Air
Warfare, drafted by a commission of jurists at the Hague
regulates:[6]
Use in warfare
Art. 3. A military aircraft must carry an exteIn land warfare such operations are generally deemed acrior mark indicating its nationality and its milceptable in certain circumstances, such as to deceive eneitary character.
mies providing that the deception is not perdious and all
such deceptions are discarded before opening re upon
Art. 19. The use of false exterior marks is forthe enemy. Similarly in naval warfare such a deception
bidden.
is considered permissible provided the false ag is low[2]
ered and the true ag raised before engaging in battle:
auxiliary cruisers operated in such a fashion in both World This draft was never adopted as a legally binding treaty,
Wars, as did Q-ships, while merchant vessels were en- but the ICRC states in its introduction on the draft that 'To
couraged to use false ags for protection.
a great extent, [the draft rules] correspond to the customSuch masquerades promoted confusion not just of the ary rules and general principles underlying treaties on the
enemy but of historical accounts: in 1914 the Battle of law of war on land and at sea',[7] and as such these two
Trindade was fought between the British auxiliary cruiser noncontroversial articles were already part of customary
RMS Carmania and the German auxiliary cruiser SMS law.[8]
1
1.2
Land warfare
2.4
Cuban Revolution
2.2
2.3
2.3.1
World War II
Gleiwitz incident
The planned, but never executed, 1962 Operation Northwoods plot by the U.S. Department of Defense for a
war with Cuba involved scenarios such as fabricating
the hijacking or shooting down of passenger and military planes, sinking a U.S. ship in the vicinity of Cuba,
burning crops, sinking a boat lled with Cuban refugees,
attacks by alleged Cuban inltrators inside the United
States, and harassment of U.S. aircraft and shipping
and the destruction of aerial drones by aircraft disguised
as Cuban MiGs.[16] These actions would be blamed on
Cuba, and would be a pretext for an invasion of Cuba
and the overthrow of Fidel Castro's communist government. It was authored by the Joint Chiefs of Sta, but
The operation failed to convince international public then rejected by President John F. Kennedy. The suropinion of the German claims, and both Britain and prise discovery of the documents relating to Operation
FrancePolands alliesdeclared war two days after Northwoods was a result of the comprehensive search for
records related to the assassination of President John F.
Germany invaded Poland.[13]
Kennedy by the Assassination Records Review Board in
the mid-1990s.[17] Information about Operation North2.3.2 Winter War
woods was later publicized by James Bamford.[18]
The Gleiwitz incident in 1939 involved Reinhard Heydrich fabricating evidence of a Polish attack against
Germany to mobilize German public opinion for war and
to justify the war with Poland. Alfred Naujocks was a
key organiser of the operation under orders from Heydrich. It led to the deaths of Nazi concentration camp
victims who were dressed as German soldiers and then
shot by the Gestapo to make it seem that they had been
shot by Polish soldiers. This, along with other false ag
operations in Operation Himmler, would be used to mobilize support from the German population for the start
of World War II in Europe.[12]
Vietnam War
3
3.1
5
The country had been experiencing internal political turmoil for the last year, and in an attempt to calm the
situation, president Mikheil Saakashvili moved forward
both presidential and parliamentary elections. However
the presidential election in January that year was strongly
contested, with hundreds of thousands attending protest
rallies. When the parliamentary election came up in May,
the mood was still tense.
On mid day 21 May the two minibuses came under attack
with small arms and grenades, and though there were no
casualties, three people were taken to a hospital in Zugdidi, where president Saakashvili later arrived and was
lmed by TV at the patients bedside.
In his comments on TV, which dominated the news during election day, Saakashvili indicated that the attack had
been an attempt to disrupt the election, implying that it
had been Abkhaz or Russian forces who had been behind
it. This provided for a favorable opportunity for the president to focus the nations attention on an external enemy,
thereby leading attention away from his domestic critics,
as well as making use of his position as leader to rally the
Georgians around his candidates in the election.
An investigation by the United Nations Observer Mission
in Georgia found that the attackers were located on the
Georgian side of the ceasere line, about 100m from the
Charlemagne Pralte of Haiti was assassinated in 1919, after
buses, and that although hard evidence of the attackers
checkpoints were passed by military disguised as guerrilla ghtidentities was lacking, inconsistencies merited further in- ers.
vestigation, particularly the suggestion that the lming of
the attack seemed anticipatory.[27]
A Georgian investigative TV documentary later found Union set up such an operation from 1921 to 1926.
that camera crew from the government-friendly channel During Operation Trust, they used loose networks of
Rustavi 2 had been in position with their equipment be- White Army supporters and extended them, creating the
pseudo-"Monarchist Union of Central Russia (MUCR)
fore the shooting took place.
in order to help the OGPU identify real monarchists and
anti-Bolsheviks.
Pseudo-operations
Another example of combined police and military oversight of pseudo-operations include the Selous Scouts in
The State Political Directorate (OGPU) of the Soviet the former country Rhodesia (now Zimbabwe), governed
6
by white minority rule until 1980. The Selous Scouts
were formed at the beginning of Operation Hurricane,
in November 1973, by Major (later Lieutenant Colonel)
Ronald Reid-Daly. As with all Special Forces in Rhodesia, by 1977 they were controlled by COMOPS (Commander, Combined Operations) Commander Lieutenant
General Peter Walls. The Selous Scouts were originally
composed of 120 members, with all ocers being white
and the highest rank initially available for black soldiers
being colour sergeant. They succeeded in turning approximately 800 insurgents who were then paid by Special Branch, ultimately reaching the number of 1,500
members. Engaging mainly in long-range reconnaissance
and surveillance missions, they increasingly turned to offensive actions, including the attempted assassination of
Zimbabwe Peoples Revolutionary Army leader Joshua
Nkomo in Zambia. This mission was nally aborted by
the Selous Scouts, and attempted again, unsuccessfully,
by the Rhodesian Special Air Service.[29]
Some oensive operations attracted international condemnation, in particular the Selous Scouts raid on a
Zimbabwe African National Liberation Army (ZANLA)
camp at Nyadzonya Pungwe, Mozambique in August
1976. ZANLA was then led by Josiah Tongogara. Using
Rhodesian trucks and armored cars disguised as Mozambique military vehicles, 84 scouts killed 1,284 people in
the camp-the camp was registered as a refugee camp by
the United Nations (UN). Even according to Reid-Daly,
most of those killed were unarmed guerrillas standing
in formation for a parade. The camp hospital was also
set ablaze by the rounds red by the Scouts, killing all
patients.[30] According to David Martin and Phyllis Johnson, who visited the camp shortly before the raid, it was
only a refugee camp that did not host any guerrillas. It
was staged for UN approval.[31]
According to a 1978 study by the Directorate of Military
Intelligence, 68% of all insurgent deaths inside Rhodesia
could be attributed to the Selous Scouts, who were disbanded in 1980.[32]
If the action is a police action, then these tactics would
fall within the laws of the state initiating the pseudo, but if
such actions are taken in a civil war or during a belligerent
military occupation then those who participate in such
actions would not be privileged belligerents. The principle of plausible deniability is usually applied for pseudoteams. (See the above section Laws of war). Some
false ag operations have been described by Lawrence E.
Cline, a retired US Army intelligence ocer, as pseudooperations, or the use of organized teams which are disguised as guerrilla groups for long- or short-term penetration of insurgent-controlled areas.
Pseudo Operations should be distinguished, notes Cline,
from the more common police or intelligence inltration
of guerrilla or criminal organizations. In the latter case,
inltration is normally done by individuals. Pseudo
teams, on the other hand, are formed as needed from or-
ESPIONAGE
5 Espionage
Main article: False ag penetrator
In espionage the term false ag describes the recruiting of agents by operatives posing as representatives of a
cause the prospective agents are sympathetic to, or even
the agents own government. For example, during the
Cold War, several female West German civil servants
were tricked into stealing classied documents by agents
of the East German Stasi intelligence service, pretending
to be members of West German peace advocacy groups
(the Stasi agents were also described as "Romeos, indicating that they also used their sex appeal to manipulate
their targets, making this operation a combination of the
false ag and "honey trap" techniques).[35]
The technique can also be used to expose enemy agents in
ones own service, by having someone approach the suspect and pose as an agent of the enemy. Earl Edwin Pitts,
a 13-year veteran of the U.S. Federal Bureau of Investigation and an attorney, was caught when he was approached
by FBI agents posing as Russian agents.
British intelligence ocials in World War II allowed double agents to re-bomb a power station and a food dump
in the UK to protect their cover, according to declassied
documents. The documents stated the agents took precautions to ensure they did not cause serious damage.
One of the documents released also stated: It should be
recognised that friends as well as enemies must be completely deceived.[36]
6.3
Ideological
Civilian usage
7
against you), you could discredit the unions,
read the email. It went on to say that the effort would assist in undercutting any support
that the media may be creating in favor of the
unions.
While false ag operations originate in warfare and government, they also can occur in civilian settings among
certain factions, such as businesses, special interest
groups, religions, political ideologies and campaigns for
oce.
The press had acquired a court order to access all of
Walkers emails and Lams email was exposed. At rst,
Lam vehemently denied it, but eventually admitted it and
6.1 Businesses
resigned.[41]
In business and marketing, similar operations are being employed in some public relations campaigns (see 6.3
Astroturng). Telemarketing rms practice false ag
type behavior when they pretend to be a market research
rm (referred to as "sugging"). In some rare cases, members of an unsuccessful business will destroy some of their
own property to conceal an unrelated crime (e.g., safety
violations, embezzlement) but make it appear as though
the destruction was done by a rival company.
6.2
Ideological
Political campaigning
Proponents of political or religious ideologies will sometimes use false ag tactics. This can be done to discredit
or implicate rival groups, create the appearance of enemies when none exist, or create the illusion of organized
and directed opposition when in truth, the ideology is
simply unpopular with society.
In the nal days of Floridas 1994 gubernatorial campaign, Democrat Governor Lawton Chiles ran a false ag
operation that paid for tens of thousands of calls to elderly voters using false organization names. The calls
purported to be from Republican groups and told voters that Jeb Bush was against Social Security and seniors.
Chiles denied his campaign was behind the calls. After winning re-election and facing an investigation, Chiles
admitted the truth in November 1995.[37]
7 See also
7.1 Concepts
Agent provocateur
Black propaganda
Casus belli
Covert operation
Denial and deception
8
Front organization
Joe job, a similar online concept
Mimicry
State terrorism
7.2
Examples
References
REFERENCES
[23] DW Sta (27 February 2008). 75 Years Ago, Reichstag Fire Sped Hitlers Power Grab. Deutsche Welle. Retrieved 12 August 2013.
[39] Saunders, Anne, Bass aide resigns after posing as opponents supporter online, The Boston Globe, 26 September
2006 (URL last accessed 24 October 2006).
[42] United States of America v. Jane Kember, Morris Budlong, Sentencing Memorandum; pp. 2325.
9 External links
10
10
10
10.1
False ag Source: https://en.wikipedia.org/wiki/False_flag?oldid=725680140 Contributors: Olivier, Jdlh, Michael Hardy, Ixfd64, IZAK,
Skysmith, Kingturtle, Ugen64, GCarty, Wikiborg, Furrykef, Tempshill, AnonMoos, Vardion, PBS, Donreed, ZimZalaBim, Bkell, Carnildo,
Tom harrison, Capitalistroadster, Iceberg3k, Tagishsimon, Fergananim, GeneMosher, Tothebarricades.tk, Kevin B12, Asbestos, Neutrality,
Klemen Kocjancic, Cab88, D6, Jayjg, Discospinster, Wikiacc, Narsil, Kostja, Antaeus Feldspar, Bender235, El C, Ascorbic, Cacophony,
Martey, Mike Schwartz, John Vandenberg, Wiki-Ed, Toh, Hardy, La goutte de pluie, BM, Idleguy, Mrzaius, Alansohn, Uncle.bungle,
Hackwrench, Geo Swan, PatrickFisher, Ynhockey, Malo, Bart133, Max rspct, M3tainfo, Lapinmies, Kober, Vuo, Alai, LukeSurl, Zntrip, Hq3473, Richard Arthur Norton (1958- ), OwenX, Woohookitty, Mindmatrix, Timharwoodx, Je3000, MONGO, Mangojuice,
SDC, Plrk, Stefanomione, Betsythedevine, Mandarax, RedBLACKandBURN, Graham87, A Train, Kbdank71, Dpr, Rjwilmsi, Bill Cannon, Carbonite, Jtpaladin, The wub, Tarc, KiernMoran, Fred Bradstadt, Cassowary, Ground Zero, FrancisDrake, MacRusgail, GagHalfrunt, Tequendamia, Diza, Coolhawks88, Bgwhite, WriterHound, Cornellrockey, Jayme, Subwayguy, YurikBot, Samuel Wiki, Jimp, John
Quincy Adding Machine, Briaboru, Zaroblue05, DanMS, Kirill Lokshin, Shaddack, Big Brother 1984, Aryaniae, LaszloWalrus, Grafen,
Nutiketaiel, Aaron Brenneman, Lomn, Ospalh, Syrthiss, IceWeasel, BusterD, Miraculouschaos, Closedmouth, Arthur Rubin, E Wing,
Petri Krohn, Garybel, Shyam, Ephilei, Kurai, Je Silvers, Paul Pieniezny, Victor falk, JohnLeonard, SmackBot, Nicolas Barbier, Stie, Kintetsubualo, Nil Einne, Portillo, GoldDragon, Ksenon, Kaliz, Jprg1966, Hugzz, Renamed user Sloane, Paulfp, Sb617, Toughpigs, AKMask, Tewk, Xeryus, Ian Burnet~enwiki, Chendy, Ncameron, JRPG, Tim Pierce, Georey Gibson, Bolivian Unicyclist, Wen
D House, Cybercobra, Akral, Xyzzy n, Chrylis, Weregerbil, Doodle77, Xiutwel, Kukini, Tesseran, Crouchbk, Byelf2007, Ser Amantio di Nicolao, Tazmaniacs, Robosh, JoshuaZ, Mgiganteus1, Minglex, Cmh, Karlwiegand, Meco, Dr.K., SmokeyJoe, OnBeyondZebrax,
Skandaprasadn, Clarityend, Poechalkdust, Hwonder, Joseph Solis in Australia, AlexLibman, Phoenixrod, Lent, Generalcp702, Ehistory,
CmdrObot, Megaboz, Olaf Davis, Erik Kennedy, Dgw, Outriggr (2006-2009), Chrisahn, Location, Cydebot, Treybien, Goldfritha, Gogo
Dodo, Manik52, DumbBOT, Patrick O'Leary, Mathew5000, Septagram, Satori Son, Mamalujo, Malleus Fatuorum, Thijs!bot, Interested2,
Ucanlookitup, Hcberkowitz, Bobblehead, Davidhorman, Kingnixon, Oreo Priest, AntiVandalBot, Opelio, JHFTC, Joe Schmedley, Legitimus, Arkan5, Erxnmedia, JAnDbot, MarritzN, Minitrue, Attarparn, Lsi, Acroterion, Bencherlite, Canjth, Parsecboy, NeoJudus, LCJ,
SSZ, Bryanpeterson, JaGa, Pax:Vobiscum, Hersbruck, Gwern, Dan Dean, Phantomsnake, General Jazza, Ekotekk, KTo288, Nono64,
Pharaoh of the Wizards, PCock, Rodrigo braz, PalestineRemembered, JPLeonard, Maurice Carbonaro, Hodja Nasreddin, Cop 663, Grosscha, RenniePet, Chiswick Chap, Spartelite, C1010, DadaNeem, Xyl 54, Vanished user 39948282, Julyda4th, WLRoss, Ashcroftgm,
Morenooso, Indubitably, Nug, TXiKiBoT, Xenophrenic, Zurishaddai, Room429, EnglishDez, Jaqen, Andrewaskew, Enigmaman, Spadgos, THEODICEAN, Alcmaeonid, AlleborgoBot, GavinTing, Guerillamarketing, StAnselm, DarknessEnthroned, Rabbeinu, Pretest, JcS0CO, Fredburks, Cicorp, Tensaije, Anakin101, Capitalismojo, ZaneSteez, LarRan, Sab128, VanishedUser sdu9aya9fs787sads, Hoplon,
MenoBot, ClueBot, MBD123, The thing is, Binksternet, Mild Bill Hiccup, Foofbun, LonelyBeacon, Trivialist, Grandpallama, Geo247,
CuandoCubango, P.jasons, Xme, Mlas, Tony May, Thingg, Belchre, Innoth, 3d-geo, DumZiBoT, Kurdo777, Sannleikur, Ost316,
Dominatrixdave, For (;;), Addbot, Mhines54, Heavenlyblue, MrZoolook, Daverogue, Disbelieve, Download, Fogeltk421, Lihaas, SpBot,
Numbo3-bot, Peridon, Alanscottwalker, Lightbot, Nhalks, Aadieu, Yobot, Henri rouge, PMLawrence, Reenem, AnomieBOT, VanishedUser sdu9aya9fasdsopa, DemocraticLuntz, Tryptosh, Jim1138, McSaddle, Shock Brigade Harvester Boris, Glenfarclas, Ulric1313, Materialscientist, Fuelsaver, Tbvdm, Cliftonian, LilHelpa, Xqbot, MaxPuckett, Thouliha, Catastrophe420, Rbrt21, Srich32977, RibotBOT,
Carrite, A Quest For Knowledge, Shadowjams, LucienBOT, Lothar von Richthofen, Mark Renier, MureMan, TurningWork, Haeinous,
HJ Mitchell, Liverworth, Citation bot 1, Pinethicket, Bmclaughlin9, RedBot, MastiBot, Nikolas93ts, ARMitre, Ionisiso, Princesssissi,
Lotje, Defender of torch, Aoidh, Tbhotch, RjwilmsiBot, Grondemar, EmausBot, John of Reading, WikitanvirBot, GoingBatty, Slightsmile,
Acidrain4696, Doelleri, ZroBot, Ahears, Dpenn89, MRBigdeli, Lhixson, Wingman4l7, Columbia666, Carmichael, Why is pizza so good?,
Farizana94, Mcc1789, 8h3d0kg, FeatherPluma, Whoop whoop pull up, ClueBot NG, Wertydm, Bazuz, CopperSquare, Helpful Pixie Bot,
Legoless, Zlisha Khan, Regulov, BG19bot, Londonboy2011, Shurusheero, Shorisharo, Terry Hildebrand, Darkness Shines, Mark Arsten,
Great50, Jacob van Maerlant, Harizotoh9, Turnr44, BattyBot, Gauzeandchess, Pratyya Ghosh, Ddcm8991, Aginwald, Cyberbot II, JYBot,
Mogism, Ranze, XXzoonamiXX, Lugia2453, Keptautokeptauto, 93, Pc1985, Halsingpurg, Kabulbuddha, Jgmoneill, Madreterra, Chris
troutman, A Certain Lack of Grandeur, Lixinheth, GeeBee60, Ter M. Ahn, Damon161, Darkone123, Monkbot, Magma1983, Gdeblois19,
Phantomop, Gamebuster19901, Isambard Kingdom, Mister Sneeze A Lot, A1491625, BU Rob13, ImHere2015, Ebookomane, Incendiary
Iconoclasm, TEH1990, Skyscraper1996, Moscowamerican and Anonymous: 396
10.2
Images
File:193109_mukden_incident_railway_sabotage.jpg Source:
https://upload.wikimedia.org/wikipedia/commons/e/e8/193109_
mukden_incident_railway_sabotage.jpg License: Public domain Contributors: published in japanese newspaper Rekishi Syashin
Original artist: Unknown<a href='//www.wikidata.org/wiki/Q4233718' title='wikidata:Q4233718'><img alt='wikidata:Q4233718'
src='https://upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/20px-Wikidata-logo.svg.png'
width='20'
height='11' srcset='https://upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/30px-Wikidata-logo.svg.png 1.5x,
https://upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/40px-Wikidata-logo.svg.png 2x' data-le-width='1050'
data-le-height='590' /></a>
File:Alfred_Naujocks.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/e9/Alfred_Naujocks.jpg License: Public domain
Contributors: U.S. National Archives and Records Administration, item number CW-004 Original artist: U.S. Army
File:Ambox_important.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/b4/Ambox_important.svg License: Public domain Contributors: Own work, based o of Image:Ambox scales.svg Original artist: Dsmurat (talk contribs)
File:Charlemagne_Pralte.jpg
Source:
https://upload.wikimedia.org/wikipedia/commons/e/e1/Charlemagne_P%C3%
A9ralte.jpg License:
Public domain Contributors:
Nombreux sites Internet et ouvrages divers Original artist:
Unknown<a
href='//www.wikidata.org/wiki/Q4233718'
title='wikidata:Q4233718'><img
alt='wikidata:Q4233718'
src='https:
//upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/20px-Wikidata-logo.svg.png'
width='20'
height='11'
srcset='https://upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/30px-Wikidata-logo.svg.png
1.5x,
https://upload.wikimedia.org/wikipedia/commons/thumb/f/ff/Wikidata-logo.svg/40px-Wikidata-logo.svg.png 2x' data-le-width='1050'
data-le-height='590' /></a>
10.3
Content license
11
10.3
Content license