You are on page 1of 64

Black propaganda

From Wikipedia, the free encyclopedia Jump to: navigation, search It has been suggested that disinformation be merged into this article. (Discuss
Proposed since August 2011.

Black propaganda is false information and material that purports to be from a source on one side of a conflict, but is actually from the opposing side. It is typically used to vilify, embarrass or misrepresent the enemy.!"# $lack propaganda contrasts %ith grey propaganda, the source of %hich is not identified, and %hite propaganda, in %hich the real source is declared and usually more accurate information is given, albeit slanted, distorted and omissive. $lack propaganda is covert in nature in that its aims, identity, significance, and sources are hidden. &he ma'or characteristic of black propaganda is that the people are not a%are that someone is trying to influence them, and do not feel that they are being pushed in a certain direction.!(# $lack propaganda purports to emanate from a source other than the true source. &his type of propaganda is associated %ith covert psychological operations.!)# *ometimes the source is concealed or credited to a false authority and spreads lies, fabrications, and deceptions. $lack propaganda is the +big lie,+ including all types of creative deceit.!,# $lack propaganda relies on the %illingness of the receiver to accept the credibility of the source. If the creators or senders of the black propaganda message do not ade-uately understand their intended audience, the message may be misunderstood, seem suspicious, or fail altogether.!,# .overnments %ill generally conduct black propaganda operations for t%o different reasons. First, by using black propaganda a government is more likely to succeed in convincing their target audience that the information that they are seeking to influence them %ith is disguised and that its motivations are not apparent. *econd, there are diplomatic reasons behind the use of black propaganda. $lack propaganda is necessary to obfuscate a government/s involvement in activities that may be detrimental to its foreign policies.!0#

Contents
!hide#

" $lack propaganda in World War II o "." $ritish o ".( .erman o ".) Japanese ( 1old War black propaganda of the *oviet 2nion ) 3ffice of *trategic Influence , $lack propaganda in domestic politics o ,." 4acist black propaganda o ,.( $ritish media o ,.) 2nited *tates media o ,., 2nited *tates .overnment o ,.0 4eligious black propaganda 0 *ee also

5 4eferences 6 $ibliography 7 89ternal links

Black propaganda in World War II[edit]


British[edit]
In the 2nited :ingdom, the ;olitical Warfare 89ecutive operated a number of black propaganda radio stations. .ustav *iegfried 8ins (.*" %as one of the first such stations< purporting to be a clandestine .erman station. &he speaker, /Der 1hef/, purported to be a =a>i e9tremist, accusing ?itler and his henchmen of going soft. &he station focused on alleged corruption and se9ual improprieties of =a>i ;arty members. @nother e9ample %as the $ritish radio station Soldatensender Calais, %hich purported to be a radio station for the .erman military. 2nder the direction of *efton Delmer, a $ritish 'ournalist %ho spoke perfect $erliner .erman, Soldatensender Calais and its associated short%ave station, Kurzwellensender Atlantik, broadcast music, upAtoAdate sports scores, speeches of @dolf ?itler for +cover+ and subtle propaganda. 4adio Deutschland %as another radio station employed by the $ritish during the %ar aimed and designed to undermine .erman morale and create tensions that %ould ultimately disrupt the .erman %ar effort. &he station %as broadcast from a signal close on the radio dial to an actual .erman station. During the %ar most .ermans actually believed that this station %as in fact a .erman radio station and even gained the recognition of .ermany/s propaganda chief Joseph .oebbels.!5# &here %ere $ritish black propaganda radio stations in most of the languages of occupied 8urope as %ell as .erman and Italian.!6# Bost of these %ere based in the area around Woburn @bbey. @nother possible e9ample %as a rumour that there had been a .erman attempt to land on $ritish shores at *hingle *treet, but it had been repulsed %ith large .erman casualties. &his %as reported in the @merican press, and in William C. *hirer/s Berlin Diar but %as officially denied. $ritish papers, declassified in "DD), have suggested this %as a successful e9ample of $ritish black propaganda to bolster morale in the 2:, 2*@ and occupied 8urope.!7# @uthor James ?ay%ard has proposed that the rumours, %hich %ere %idely reported in the @merican press, %ere a successfully engineered e9ample of black propaganda %ith an aim of ensuring @merican coAoperation and securing lend lease resources by sho%ing that the 2nited :ingdom %as capable of successfully resisting the might of the .erman @rmy.!D# David ?are/s play !icking "itler provides a fictionalised account based on the $ritish black propaganda efforts in World War II.

German[edit]

.erman black propaganda usually took advantage of 8uropean racism and antiA1ommunism. For e9ample, on the night of @pril (6, "D,, .erman aircraft under cover of darkness (and possibly carrying fake 4oyal @ir Force markings dropped propaganda leaflets on occupied Denmark. &hese leaflets used the title of #ri$edsposten, a genuine Danish underground ne%spaper, and claimed that the +hour of liberation+ %as approaching. &hey instructed Danes to accept +occupation by 4ussian or specially trained @merican =egro soldiers+ until the first disorders resulting from military operations %ere over. &he .erman $Ero 1oncordia organisation operated several black propaganda radio stations (many of %hich pretended to broadcast illegally from %ithin the countries they targeted .!"F#

Japanese[edit]
&he %anaka &emorial, a document describing a Japanese plan for %orld con-uest, beginning %ith the con-uest of 1hina, is no% believed by most historians to be a forgery. &he follo%ing message %as distributed in black propaganda leaflets dropped by the Japanese over the ;hilippines in World War II. It %as designed to turn Filipinos against the 2nited *tates: Guard Against Venereal Diseases !atel t$ere $as 'een a great increase in t$e num'er of (enereal diseases among our officers and men owing to prolific contacts wit$ #ilipino women of du'ious c$aracter. Due to $ard times and stricken conditions 'roug$t a'out ' t$e )apanese occupation of t$e islands* #ilipino women were willing to offer t$emsel(es for a small amount of foodstuffs. +t is ad(isa'le in suc$ cases to take full protecti(e measures ' use of condoms* protecti(e medicines* etc., 'etter still to $old intercourse onl wit$ wi(es* (irgins* or women of respecta'le c$aracter. #urt$ermore* in (iew of t$e increase in pro-American leanings* man #ilipino women are more t$an willing to offer t$emsel(es to American soldiers* and 'ecause #ilipinos $a(e no knowledge of $ giene* disease carriers are rampant and due care must 'e taken. .S Arm

Cold War black propaganda of the o!iet "nion[edit]


Disinformation is a form of black propaganda because disinformation campaigns are covert in nature and use various forms of false information. Disinformation can be defined as false information that is deliberately, and often covertly spread in order to influence public opinion and obscure the truth.!""# ;rior to, and during the 1old War, the *oviet 2nion used disinformation on multiple occasions. It also employed the techni-ue during the Iranian hostage crisis that took place from "D6D until "D7". For strictly political purposes, and to sho% support for the hostages, *oviet diplomats at the 2nited =ations vocally critici>ed the taking of the hostages. @t this same time, *oviet +black+ radio stations %ithin Iran called the =ational Goice of Iran openly broadcast strong support for the hostageAtakers in an effort to increase antiA@merican sentiment inside Iran.!0# &his %as a clear use of black propaganda to make antiA@merican broadcasts appear as if they %ere originating from Iranian sources.

&hroughout the 1old War, the *oviet 2nion effectively utili>ed the :.$/s *ervice @ of the First 1hief Directorate in order to conduct its covert, or +black+, +active measures+.!"(# It %as *ervice @ that %as responsible for clandestine campaigns that %ere targeted at foreign governments, public populations, as %ell as influence individuals and specific groups that %ere hostile to%ards the *oviet government and its policies. &he ma'ority of their operations %as actually conducted by other elements and directorates of the :.$.!")# @s a result, it %as the First 1hief Directorate that %as ultimately responsible for the production of *oviet black propaganda operations. $y the "D7Fs, *ervice @ consisted of nearly "(F officers %hose responsibilities consisted of covert media placements, and controlled media to covertly introduce carefully manufactured information, disinformation, and slogans into the areas such as government, media, and religion of their targeted countries, namely the 2nited *tates. $ecause both the *oviet 2nion and the :.$/s involvements %ere not ackno%ledged and intentionally disguised, these operations are therefore classified as a form of black propaganda.!",# &he activities of *ervice @ greatly increased during the period of the "D7Fs through the early "DDFs presumably as the *oviet government fought to maintain control during the declining period of the 1old War.

#ffice of trategic Influence[edit]


Follo%ing the *eptember "" attacks against the 2nited *tates, the ;entagon organi>ed and implemented the 3ffice of *trategic Influence in an effort to improve public support abroad, mainly in Islamic countries. &he head of 3*I %as an appointed general, ;ete Worden %ho maintained the mission of +circulating classified proposals calling for aggressive campaigns that use!d# not only the foreign media and the Internet, but also covert operations.+ Worden, as %ell as then Defense *ecretary Donald 4umsfeld planned for %hat they called +a broad mission ranging from /black/ campaigns that use!d# disinformation and other covert activities to /%hite/ public affairs that rely on truthful ne%s releases.+ &herefore, 3*I/s operations could include the blackest of activities.!"0# 3*I/s operations %ere to do more than public relations %ork, but included contacting and emailing media, 'ournalist, and foreign community leaders %ith information that %ould counter foreign governments and organi>ations that are hostile to the 2nited *tates. In doing so, the emails %ould be masked by utili>ing addresses ending %ith .com as opposed to using the standard ;entagon address of .mil. and hide any involvement of the 2* government and the ;entagon. &he ;entagon is forbidden to conduct black propaganda operations %ithin the @merican media, but is not prohibited for conducting these operations against foreign media outlets. &he thought of conducting black propaganda operations and utili>ing disinformation resulted in harsh criticism for the program that resulted in its closure in (FF(.!"5#

Black propaganda in domestic politics[edit]


$acist black propaganda[edit]

&he F$IAauthored Black Pant$er Coloring Book %as distributed in the 2nited *tates in the late "D5Fs in an attempt to discredit the $lack ;anther ;arty, and the civil rights movement in general. In Dreu9, France, in "D7( the =ational Front distributed anonymous fake letters, supposedly from an @lgerian living in France to a brother living in @lgeria. &hese fake

letters, %hich described immigration as a method of con-uering France %ithout %ar, %ere instrumental in the =ational Front victory in the "D7) local council elections in Dreu9. In the runAup to the (FF6 federal election in @ustralia, flyers %ere circulated around *ydney under the name of a fake organisation called the Islamic @ustralia Federation. &he flyers thanked the @ustralian Cabor ;arty for supporting terrorism, Islamic fundamentalists, and the $ali bombing suspects. @ group of *ydneyAbased Ciberal ;arty members %ere implicated in the incident.!"6#!"7#!"D#

British media[edit]

In =ovember "DD0, a Sunda %elegrap$ ne%spaper article alleged Cibya/s *aif alA Islam .addafi (Buammar .addafi/s son %as connected to a currency counterfeiting plan. &he article %as %ritten by 1on 1oughlin, the paper/s chief foreign correspondent and it %as falsely attributed to a +$ritish banking official+. In fact, it had been given to him by officers of BI5, %ho, it transpired, had been supplying 1oughlin %ith material for years.!(F# &he Hinoviev letter %as a fake letter published in "D(, in the $ritish ne%spaper, the Dail &ail. It claimed to be a letter from the 1omintern president .rigory Hinoviev to the 1ommunist ;arty of .reat $ritain. It called on 1ommunists to mobilise +sympathetic forces+ in the Cabour ;arty and talked of creating dissent in the armed forces. &he Hinoviev letter %as instrumental in the 1onservative victory in the "D(, general election.

"nited tates media[edit]

In the +4oorback forgery+ of "7,, the C$ronicle of Ithaca, =e% Iork ran a story, supposedly by a .erman tourist called $aron von 4oorback, that James :. ;olk, standing for reAelection as a Democrat to the 2nited *tates ?ouse of 4epresentatives, branded his slaves before selling them at auction to distinguish them from the others on sale. ;olk actually benefited from the ploy, as it reflected badly on his opponents %hen the lie %as found out.!("# During the "D6( 2.*. presidential election, Donald ?. *egretti, a political operative for ;resident 4ichard =i9on/s reelection campaign, released a faked letter, on *enator 8dmund Buskie/s letterhead, falsely alleging that *enator ?enry +*coop+ Jackson, against %hom Buskie %as running for the Democratic ;arty/s nomination, had had an illegitimate child %ith a seventeenAyearAold. Buskie, %ho had been considered the frontrunner, lost the nomination to .eorge Bc.overn, and =i9on %as reelected. &he letter %as part of a campaign of soAcalled +dirty tricks+, directed by *egretti, and uncovered as part of the Watergate *candal. *egretti %ent to prison in "D6, after pleading guilty to three misdemeanor counts of distributing illegal campaign literature. @nother of his dirty tricks %as the +1anuck letter+, although this %as libel of Buskie and not a black propaganda piece.

"nited tates Go!ernment[edit]

&he Federal $ureau of Investigation/s 1ounterAintelligence program +13I=&8C;43+, %as intended to, according to the F$I, +e9pose, disrupt, misdirect, discredit, or

other%ise neutrali>e the activities of black nationalists, hateAtype organi>ations and groups, their leadership, membership, and supporters.+ $lack propaganda %as used famously on 1ommunists and the $lack ;anther ;arty. It %as also used against domestic opponents of the invasion of Gietnam, labor leaders, and =ative @mericans . !((# 13I=&8C;43/s use of black propaganda led to their creation of coloring books and cartoons. &he F$I/s strategy %as captured in a "D57 memo: +1onsider the use of cartoons, photographs, and anonymous letters %hich %ill have the effect of ridiculing the =e% Ceft. 4idicule is one of the most potent %eapons %hich %e can use against it.+!()# &he F$I employed a similar tactic in "D57 to disrupt activities of the :u :lu9 :lan, as hundreds of /racist/ flyers %ith misleading information %ere fabricated and made to appear as if they originated from kno%n :lan leaders. +&he ;enkovsky ;apers+ are an e9ample of a black propaganda effort conducted by the 2nited *tates/ 1entral Intelligence @gency during the "D5Fs. &he +;enkovksy ;apers+ %ere alleged to have been %ritten by a *oviet .42 defector, 1olonel 3leg ;enkovsky, but %as in fact produced by the 1I@ in an effort to diminish the *oviet 2nion/s credibility at a pivotal time during the 1old War.!(,#

$eligious black propaganda[edit]

&he 1hurch of *cientology, under the leadership of C. 4on ?ubbard, is alleged to have advocated the usage of +black propaganda+ to +destroy reputation or public belief in persons, companies or nations+ as a practice of Fair .ame against *uppressive ;ersons.!(0#

ee also[edit]

False flag &aliban propaganda White propaganda .rey propaganda Information %arfare ;ush polling @stroturfing Joe 'ob *pecial @ctivities Division &he &error =et%ork

$eferences[edit]
". % Doob, Ceonard ("D0FAFDA") . +.oebbels/ ;rinciples of =a>i ;ropaganda+. %$e Pu'lic /pinion 0uarterl & (Gol. ",, =o. ) : ,"DJ,,(. J*&34 (6,0DDD. (. % 8llul, Jac-ues ("D50 . Propaganda1 %$e #ormation of &en2s Attitudes, p. "5.&rans. :onrad :ellen K Jean Cerner. Gintage $ooks, =e% Iork. I*$= D67AFA)D,A 6"76,A). ). % Cinebarger, ;aul Byron @nthony. "D0,. ;sychological Warfare, 1ombat Forces ;ress, Washington ,. L a b Jo%ett, .arth *., .arth Jo%ett, Gictoria 3/Donnell. (FF5. *age ;ublications, &housand 3aks, 1alifornia

L a b *hulsky, @bram. and .ary *chmitt, Silent 3arfare. Washington, D1: $rasseys Inc. (FF( 5. % @llen, &homas and =ormal ;olmar. *py $ook. =e% Iork: 4andom ?ouse *election. (FF, 6. % John ;ether, %$e Bletc$le Park 4eports1 4eport 5o. 16 Black Propaganda, $letchley ;ark &rust "DD7 7. % 4igby, =ic ((FF(AFDAFD . +Was WWII mystery a fakeM+. $$1 =e%s. 4etrieved (FF6AFDA(). D. % ?ay%ard, James ((FF( . S$ingle Street. 1D," ;ublishing. I*$= FAD0,F0,DA "A". "F. % http:NNfindarticles.comNpNarticlesNmiOm(07,NisOn(Ov",NaiO"00776"DNpgO". Bissing or empty |title= (help !dead link# "". % Definition of +disinformation+, from BerriamAWebster.com "(. % http:NNintellit.muskingum.eduNrussiaOfolderNpc%OeraNsectOF).htm "). % &he Foreign Intelligence 4ole of the 1ommittee for *tate *ecurity. http:NN%%%.fas.orgNirpN%orldNrussiaNkgbNsuF0(".htm ",. % http:NNintellit.muskingum.eduNrussiaOfolderNpc%OeraNsectOF).htmPNref "0. % http:NN%%%.source%atch.orgNinde9.phpMtitleQ3fficeOofO*trategicOInfluence "5. % 1arver, &om. ;entagon ;lans ;ropaganda War. $$1 (F February (FF(. http:NNne%s.bbc.co.ukN(NhiNamericasN"7)F0FF.stm "6. % +?o%ard forced to fight off dirty tricks allegations+. %$e 5ew 7ealand "erald. (( =ovember (FF6. 4etrieved (F *eptember (F"". "7. % Ioung, @udrey ((( =ovember (FF6 . +?o%ard/s speech overshado%ed by race issues+. %$e 5ew 7ealand "erald. 4etrieved (F *eptember (F"". "D. % @nsley, .reg (() =ovember (FF6 . +Fake flyers derail ?o%ard+. %$e 5ew 7ealand "erald. 4etrieved (F *eptember (F"". (F. % Ceigh, David ((FFFAF5A"( . +&inker, tailor, soldier, 'ournalist+. %$e 8uardian (Condon . 4etrieved (FF6AF5A"5. (". % $yrnes, Bark 8. ((FF" . )ames K. Polk1 a 'iograp$ical companion. *anta $arbara, 1@: @$1 1CI3. p. "7). I*$= D67A"A065F6AF05A6. ((. % http:NN%%%.ibiblio.orgNpubNelectronicApublicationsNstayA freeNarchivesN"DNfbi.html (). % 1hurchill K GanderWall, p. "76R Bartin Cuther :ing, Jr. ;apers ;ro'ect (,. % *hulsky, @bram and .ary *chmitt. Silent 3arfare. Washington: $rasseys, (FF( (0. % :ent, *tephen @. ((FF5 . +*cientology+. In Daniel @. *tout. 9nc clopedia of religion* communication* and media. 4outledge encyclopedias of religion and society. 141 ;ress. pp. )DFJ)D(. I*$= D67AFA,"0AD5D,5A7. 0.

Bibliograph'[edit]

$3I18, Fredric. S/9:s ultimate deception1 /peration Periwig *troud: *utton, (FF0. I*$= FA60FD,F(A6A" D8CB84, Denis *efton. Black Boomerang Condon: *ecker and Warburg, "D5( ?3W8, 8llic. %$e Black 8ame1 Britis$ su'(ersi(e operations against t$e 8ermans during t$e Second 3orld 3ar Condon: Bichael Joseph, "D7(. I*$= FA6"7""6"A7A( CI=8$@4.84, ;aul Byron @nthony. "D0,. ;sychological Warfare, 1ombat Forces ;ress, Washington

=8W1324&A=3W3DW34*:I, *tanley. !a Propaganda 5egra en la Segunda 8uerra &undial. Badrid: @lgaba, (FF5, ))5 pSginas. I*$= D67A7,AD5"F6A6FAF ( panish) 4I1?@4D*, Cee. %$e Black Art1 Britis$ Clandestine Ps c$ological 3arfare against t$e %$ird 4eic$ Condon: %%%.psy%ar.org, (F"F. I*$=: FAD0,(D)5A)AF 4I1?@4D*, Cee. 3$ispers of 3ar1 .nderground Propaganda 4umour-mongerin in t$e Second 3orld 3ar Condon: %%%.psy%ar.org, (F"F. I*$=: FAD0,(D)5A,AD &8C3, @ntTnio JosU. Propaganda e 8uerra Secreta em Portugal1 1;<;-1;=>. Cisboa: ;erspectivas K 4ealidades, "DDF, pp. ))A)5 (*ortuguese) Second 3orld 3ar 'lack propaganda. =ational Cibrary of *cotland, (FF5 &@IC34, ;hilip B. &unitions of t$e mind1 a $istor of propaganda from t$e ancient world to t$e present era. (Banchester: Banchester 2niversity ;ress, "DD0 89A13I=&8C;43 spy, %$e 8entleperson:s 8uide %o #orum Spies, 1ryptome, (F"(.

+,ternal links[edit]

*tamps as WarA and ;ropaganda Forgeries: &his Website sho%s almost all officially issued WarA and ;ropaganda forgeries. It also sho%s the real stamps %hich %as the template for the forgery. *efton Delmer A$lack $oomerang: *efton Delmer %as head of $ritish $lack ;ropaganda during World War II. ?is book $lack $oomerang tells the story of his %ork. ;syWar.3rg A $lack ;ropaganda and propaganda leaflets database: @ %ebsite %ith various articles on black propaganda and psychological %arfare. &he site has an e9tensive library of propaganda leaflets from World War I to the present day. WW( propaganda leaflets: @ %ebsite about airdropped, shelled or rocket fired propaganda leaflets. ?as slidesho% %ith many black propaganda leaflets of World War II. .ray and $lack 4adio ;ropaganda against =a>i .ermany 89tensively illustrated paper describing the @llied effort in WW II to undermine .ermany through unidentified or misidentified radio broadcasts. [hide]

! t e

o!iet Bloc disinformation in the Cold War


General

Disinformation @ctive measures Black propaganda First 1hief Directorate (:.$ .S Arm #ield &anual <0-<1B 3$o2s 3$o in t$e C+A

#rgani-ations .orgeries /oa,es

John F. :ennedy assassination conspiracy theories 3peration I=F8:&I3= 3peration =eptune Jonesto%n conspiracy theory Cadislav $ittmann .enrikh $orovik Jakob *egal Bitrokhin @rchive

0eadership #ther people

#ther

Blo1back (intelligence)
From Wikipedia, the free encyclopedia Jump to: navigation, search &his article is outdated. ;lease update this article to reflect recent events or ne%ly available information. ?April 201<@ Blo1back is unintended conse-uences of a covert operation that are suffered by the aggressor. &o the civilians suffering the blo%back of covert operations, the effect typically manifests itself as VrandomW acts of political violence %ithout a discernible, direct causeR because the public<in %hose name the intelligence agency acted<are una%are of the effected secret attacks that pro(oked re(enge (counterAattack against them.!"#

Contents
!hide#

" 8tymology ( 89amples of blo%back o (." =icaragua and IranA1ontra o (.( Israel and ?amas ) *ee also , 4eferences

+t'molog'[edit]
3riginally, 'low'ack %as 1I@ internal coinage denoting the unintended, harmful conse-uences<to friendly populations and military forces<%hen a given %eapon is used beyond its purpose as intended by the party supplying it. 89amples include antiAWestern religious figures (e.g. 3sama bin Caden %ho, in due course, attack foe and sponsorR rightA %ing counterArevolutionaries %ho sell drugs to their sponsorXs civil populace (see 1I@ and

1ontras cocaine trafficking in the 2* R and banana republic 'untas (see *alvadoran 1ivil War %ho kill @merican reporters or nuns (e.g. Dorothy :a>el .!citation needed# In formal, print usage, the term 'low'ack first appeared in the Clandestine Ser(ice "istor A /(ert$row of Premier &ossadeB of +ranA5o(em'er 1;>2CAugust 1;><, the 1I@ internal history of the 2*Xs "D0) Iranian coup d/Utat, published in Barch "D0,.!(#!)#

+,amples of blo1back[edit]
2icaragua and Iran3Contra[edit]
In the "D7Fs blo%back %as a central theme in the legal and political debates about the efficacy of the 4eagan Doctrine, %hich advocated public and secret support of antiA 1ommunist counterArevolutionaries. For e9ample, by secretly funding the secret %ar of the militarilyAdefeated, rightA%ing 1ontras against the leftA%ing *andinista government of =icaragua, %hich led to the IranA1ontra @ffair, %herein the 4eagan @dministration sold @merican %eapons to 2* enemy Iran to arm the 1ontras %ith Warsa% ;act %eapons, and their conse-uent drugAdealing in @merican cities.!,# Boreover, in the case of =icaragua v. 2nited *tates, the International 1ourt of Justice ruled against the 2nited *tatesX secret military attacks against *andinista =icaragua, because the countries %ere not formally at %ar. 4eagan Doctrine advocates, such as the ?eritage Foundation, argue that support for antiA 1ommunists %ould topple 1ommunist rUgimes %ithout retaliatory conse-uences to the 2nited *tates and help %in the global 1old War.

Israel and /amas[edit]


@nother often cited e9ample is Israeli support of Islamic movements in the "D6Fs and "D7Fs intended to %eaken the ;C3, and leading to the creation of ?amas.!0#!5#!6# With its takeover of .a>a after the "D56 %ar %ith 8gypt, Israel hunted do%n secular ;alestinian Ciberation 3rgani>ation factions but dropped the previous 8gyptian rulers/ harsh restrictions against Islamic activists.!7# In fact, Israel for many years tolerated and at times encouraged Islamic activists and groups as a counter%eight to the secular nationalists of the ;C3 and its dominant faction, Fatah.!7#!D# @mong the activists benefited %as *heikh @hmed Iassin, leader of the Buslim $rotherhood in .a>a, %ho had also formed the Islamist group Bu'ama alAIslamiya in "D6), a charity recogni>ed by Israel in "D6D. Israel allo%ed the organi>ation to build mos-ues, clubs, schools, and a library in .a>a.!7#!"F#

ee also[edit]
Cook up blowback in Wiktionary, the free dictionary.

$oomerang effect (psychology 1I@A3sama bin Caden controversy French 1onnection .uatemalan 1ivil War ;lausible deniability

3ffice of ;ublic Diplomacy 4eagan Doctrine 2nintended conse-uences

;eople

1halmers Johnson JoYo .oulart @bdul Zadeer :han Bohammad Bosadde-

$eferences[edit]

Blow'ack1 %$e Costs and ConseBuences of American 9mpire, by 1halmers Johnson, I*$= FA7F0FA5()DA, % $lo%back % 4isen, James ("7 June (FFF . +W34D F34 W34DN@$1/* 3F 132;*R 3h, What a Fine ;lot We ?atched. (@nd ?ere/s What to Do the =e9t &ime +. %$e 5ew Dork %imes. % Ingenta1onnect @merican Bilitarism and $lo%back: &he 1osts of Cetting the ;entag % 8vansA;ritchard, @mbrose ("DD, +*mugglers linked to 1ontra arms deals,+ &he &elegraph plc. % $lo%back, or Impossible Dilemmas of Declining ;o%ers Immanuel Wallerstein % !?amas ?istory &ied &o Israel# 2nited ;ress International % @=@CI*I* 2nintended 1onse-uences ;ose 4isks for Bideast ;olicy, .lenn :essler, Washington ;ost, January 6, (FFD +.ood intentions go only so far in the Biddle 8ast, and today/s battles often can be traced to choices made by the Israeli government or the $ush administration that ended up backfiring. In the "D7Fs, for instance, the Israeli government decided to %eaken the secular Fatah movement headed by ;alestine Ciberation 3rgani>ation 1hairman Iasser @rafat by promoting the rise of Islamic parties as a counter%eight, on the theory that Islamic groups %ould not have the same nationalistic impulses. *o Fatah/s social net%orks %ere dismantled by the Israeli government, but it %ent easy on Islamic charitable net%orks. &his decision fueled the rise of ?amas as a political force, %ith its net%ork of health clinics and social services that far e9ceeded the abilities of the oftenAcorrupt Fatah movement. +&here/s no -uestion there %as a degree of blo%back,+ @aron David Biller, a former Biddle 8ast negotiator and the author of +&he Buch &oo ;romised Cand.++ L a b c ?iggins, @ndre% ((FFDAF"A(, . +?o% Israel ?elped to *pa%n ?amas+. 3nline.%s'.com. 4etrieved (F"FAF7A(,. % ?amas: ;olitics, 1harity, and &errorism in the *ervice of Jihad Batthe% Cevitt K Dennis 4oss, Iale 2niversity ;ress, (FF6, p. (,. +*cholars and historians on both sides . . . agree that from the late "D5Fs to the midA"D7Fs the !Buslim# $rotherhood benefited from the Israeli government/s support of nonAviolent Islamist ;alestinian factions, believing these groups %ould function as a useful counter%eight to the secular nationalist ;alestinian groups . . .+

". (. ). ,. 0. 5. 6.

7. D.

"F.

% &abra>, *.*. ((FF5 . +/?omecoming/ of ?amas+. 9conomic and Political 3eekl 45 (6 : 055J057.

Clandestine operation
From Wikipedia, the free encyclopedia Jump to: navigation, search &his article needs additional citations for !erification. ;lease help improve this article by adding citations to reliable sources. 2nsourced material may be challenged and removed. ?&a 200E@ @ clandestine operation is an intelligence or military operation carried out in such a %ay that the operation goes unnoticed by the general population. &he 2nited *tates Department of Defense Dictionary of Bilitary and @ssociated &erms (Joint ;ublication J;"AF(, dated 0 January (FF6 defines +clandestine operation+ as +@n operation sponsored or conducted by governmental departments or agencies in such a %ay as to assure secrecy or concealment. @ clandestine operation differs from a covert operation in that emphasis is placed on concealment of the operation rather than on concealment of the identity of the sponsor. In special operations, an activity may be both covert and clandestine and may focus e-ually on operational considerations and intelligenceArelated activities.+ (J; )AF0." . &he bulk of clandestine operations are related to the gathering of intelligence, typically by both people (1landestine ?2BI=& and by hidden sensors. ;lacement of under%ater or landA based communications cable taps, cameras, microphones, traffic sensors, monitors such as sniffers, and similar systems re-uire that the mission go undetected and unsuspected. 1landestine sensors may also be on unmanned under%ater vehicles, reconnaissance (spy satellites (such as Bisty , lo%Aobservability unmanned aerial vehicles (2@G , or unmanned detectors (as in 3peration Igloo White and its successors , or handAplaced by clandestine human operations. &he terms clandestine and co(ert are not synonymous. @s noted in the definition (%hich has been used by the 2nited *tates and =@&3 since World War II in a covert operation the identity of the sponsor is concealed, %hile in a clandestine operation the operation itself is concealed. ;ut differently, clandestine means +hidden,+ %hile co(ert means +deniable.+ &he term stealt$ refers both to a broad set of tactics aimed at providing and preserving the element of surprise and reducing enemy resistance. It can also be used to describe a set of technologies (stealth technology to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms secret and stealt$ are not used to formally describe types of missions. *ome operations may have both clandestine and covert aspects, such as the use of concealed remote sensors or human observers to direct artillery attacks and airstrikes. &he attack is obviously covert (coming under attack alerts the target that he has been located by the enemy , but the targeting component (the e9act method that %as used to locate targets can remain clandestine. In World War II, targets found through cryptanalysis of radio communication, %ere attacked only if there had been aerial reconnaissance in the area, or, in the case of the shootdo%n of

@dmiral Isoroku Iamamoto, %here the sighting could be attributed to the 1oast%atchers. During the Gietnam War, trucks attacked on the ?o 1hi Binh trail %ere completely una%are of some sensors, such as the airborne $lack 1ro% device that sensed their ignition. &hey could also have been spotted by a clandestine human patrol. ?arassing and interdiction (?KI or freeAfire >one rules can also cause a target to be hit for purely random reasons. 2ntil the "D6Fs, clandestine operations %ere primarily political in nature, generally aimed at assisting groups or nations favored by the sponsor. 89amples include 2.*. intelligence involvement %ith .erman and Japanese %ar criminals after World War II. &oday these operations are numerous and include technologyArelated clandestine operations.

ee also[edit]

$lack operation 1overt operation Fifth column

+,ternal links[edit]

International *ociety for Intelligence 4esearch (homepage .lobal 1landestine 3perations =et%ork

Co!ert operation
From Wikipedia, the free encyclopedia Jump to: navigation, search &his article is about a particular use of the term connected %ith military and political organi>ations. For covert operations in intelligence gathering, organi>ed crime and religious or minor political groups, see Front organi>ation. FCo(ert operati(eF redirects $ere. #or t$e legal definition of co(ert agents or operati(es* see co(ert agent. &he e9amples and perspective in this article deal primaril' 1ith the "nited tates and do not represent a 1orld1ide !ie1 of the sub6ect. ;lease improve this article and discuss the issue on the talk page. ?Decem'er 200;@ &his article needs additional citations for !erification. ;lease help improve this article by adding citations to reliable sources. 2nsourced material may be challenged and removed. ?)anuar 201<@ @ccording to the 2*@ Department of Defense Dictionary of Bilitary and @ssociated &erms, a Co!ert operation (also as 1ove3ps or covert ops is +an operation that is so planned and e9ecuted as to conceal the identity of or permit plausible denial by the sponsor.+ It is intended to create a political effect %hich can have implications in the military, intelligence or la% enforcement arenas. 1overt operations aim to fulfill their mission ob'ectives %ithout any parties kno%ing %ho sponsored or carried out the operation. 2nder 2nited *tates la%, the 1entral Intelligence @gency (1I@ must lead covert operations unless the president finds that another agency should do so and properly informs the 1ongress. =ormally, the 1I@ is the 2* .overnment agency legally allo%ed to carry out

covert action.!"# &he 1I@/s authority to conduct covert action comes from the =ational *ecurity @ct of "D,6.!(# ;resident 4onald 4eagan issued 89ecutive 3rder "())) titled in "D7,. &his order defined covert action as +special activities+, both political and military, that the 2* .overnment could legally deny. &he 1I@ %as also designated as the sole authority under the "DD" Intelligence @uthori>ation @ct and in &itle 0F of the 2nited *tates 1ode *ection ,")(e .!(#!)# &he 1I@ must have a +;residential Finding+ issued by the ;resident of the 2nited *tates in order to conduct these activities under the ?ughesA4yan amendment to the "DD" Intelligence @uthori>ation @ct.!"# &hese findings are then monitored by the oversight committees in both the 2* *enate and the ?ouse of 4epresentatives.!,# @s a result of this frame%ork, the 1I@ +receives more oversight from the 1ongress than any other agency in the federal government+.!0# &he *pecial @ctivities Division (*@D is a division of the 1I@/s =ational 1landestine *ervice, responsible for 1overt @ction and +*pecial @ctivities+. &hese special activities include covert political influence and paramilitary operations. &he division is overseen by the 2nited *tates *ecretary of *tate.!(#

Contents
!hide#

" Ca% enforcement ( Bilitary intelligence and foreign policy ) 89amples , =otable covert operators 0 4epresentations in popular culture 5 *ee also 6 4eferences o 6." Footnotes 7 89ternal links

0a1 enforcement[edit]
2ndercover operations (such as sting operations or infiltration of organi>ed crime groups are conducted by la% enforcement agencies to deter and detect crime and to gather information for future arrest and prosecution.

7ilitar' intelligence and foreign polic'[edit]


*ee also: @ctive measures 1overt operations and clandestine operations are distinct. &he Department of Defense Dictionary of Bilitary and @ssociated &erms (Joint ;ublication J;"AF( , defines +covert operation+ as +an operation that is so planned and e9ecuted as to conceal the identity of or permit plausible denial by the sponsor. @ covert operation differs from a clandestine operation in that emphasis is placed on concealment of identity of sponsor rather than on concealment of the operation.+ &he 2nited *tates Department of Defense definition has been used by the 2nited *tates and =@&3 since World War II.

In a covert operation, the identity of the sponsor is concealed, %hile in a clandestine operation the operation itself is concealed. ;ut differently, clandestine means +hidden,+ %hile co(ert means +deniable.+ &he term stealt$ refers both to a broad set of tactics aimed at providing and preserving the element of surprise and reducing enemy resistance and to a set of technologies (stealth technology to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms secret and stealt$ are not used to formally describe types of missions. 1overt operations are employed in situations %here openly operating against a target %ould be disadvantageous. &hese operations are generally illegal in the target state and are fre-uently in violation of the la%s of the sponsoring country. 3perations may be directed at or conducted %ith allies and friends to secure their support for controversial components of foreign policy throughout the %orld. 1overt operations may include sabotage, assassinations, support for coups d/Utat, or support for subversion. &actics include the use of a false flag or front group. &he activity of organi>ations engaged in covert operations is in some instances similar to, or overlaps %ith, the activity of front organi>ations. While covert organi>ations are generally of a more official military or paramilitary nature, like the DG* .erman @ir &ransport *chool in the =a>i era, the line bet%een both becomes muddled in the case of front organi>ations engaged in terrorist activities and organi>ed crime.

+,amples[edit]

Bilitary @ssistance 1ommand, Gietnam J *tudies and 3bservations .roup 3peration Wrath of .od 3peration .ladio 3peration @nthropoid ?uston ;lan IranA1ontra affair ;ro'ect B:2C&4@ 3peration 1?@3* 1I@ ;ro'ect 1herry Gang ;ao/s 1landestine @rmy ;alace Dog 4aven For%ard @ir 1ontrollers

2otable co!ert operators[edit]


&he follo%ing persons are kno%n to have participated in covert operations, as distinct from clandestine intelligence gathering (espionage either by their o%n admission or by the accounts of others:

4obert $aer Jo>ef .ab[\k and Jan :ubi], 1>echoslovak $ritishAtrained agents sent to assassinate one of the most important =a>is, 4einhard ?eydrich, in "D,( as part of 3peration @nthropoid. @aron Franklin, World War II 2* 3ffice of *trategic *ervices (3** officer %ho created a fake group of the .erman @rmy, made up of ;3Ws, %ith the mission of

killing ?itler. @s a colonel, he %as the first commander of 2nited *tates @rmy *pecial Forces. 1harles $eck%ith, 2* @rmy colonel %ho %as an early e9change officer %ith the $ritish *pecial @ir *ervice (*@* , and created the Delta Force ("st *pecial Forces 3perational DetachmentADelta based on the *@*. .ary $erntsen, 1I@ field officer and team leader during 3peration 8nduring Freedom Wendell Fertig, 2nited *tates @rmy 4eserve officer %ho organi>ed large Filipino guerrilla forces against the Japanese in World War II Girginia ?all, @merican %ho first %orked for the $ritish *pecial 3perations 89ecutive, then for the @merican 3ffice of *trategic *ervices in .ermanAoccupied France. 3nly 2.*. %oman to receive the Distinguished *ervice 1ross. 8ric ?aney, one of the founding members of Delta Force. Bichael ?arari, Israeli Bossad officer %ho led assassination operations (3peration Wrath of .od against ;C3 members accused of the "D6( Bunich Bassacre. $ruce 4usty Cang, commander of a mi9ed 2nited *tates @rmy *pecial Forces K Bontagnard (DegarN$ru people commando 4econ &eam (4& 3klahoma of 1ommand and 1ontrol =orth, *tudies and 3bservations .roup. ;reviously served on ;ro'ect ,F,, 2.*. 8mbassy Caos, @ssistant @rmy @ttachU (+*ecret War+ in Caos "D6F . 8d%ard Cansdale, 2nited *tates @ir Force officer (and eventually ma'or general seconded to the 1I@, and noted for his %ork %ith 4amon Bagsaysay against the ?ukbalahap insurgency in ;hilippines during the early "D0Fs, and later involved in 3peration Bongoose against 1uba. &. 8. Ca%rence, $ritish +Ca%rence of @rabia+ %ho organi>ed @rab forces during World War I. @lain Bafart, French D.*8 officer convicted, in =e% Healand, for sinking the .reenpeace ship 4ain'ow 3arrior. 4ichard Beado%s, 2nited *tates @rmy *pecial Forces officer kno%n for many operations, including the ;3W rescue attempt at *on &ay, =orth Gietnam, and for deep operations in support of 3peration 8agle 1la%. 4ichard Beinert>hagen, $ritish officer %ho engaged in deceptive operations against &urkish forces in World War I, although falsifying later operations. 4amon Bercader, =:GD operator %ho assassinated Ceon &rotsky under the direction of ;avel *udoplatov. 3mar =asiri =oor Inayat :han, @ngloAIndian *pecial 3perations 89ecutive radio operator in World War II 3ccupied France, killed in =a>i captivity %ith three other *38 agents, Iolande $eekman, 8liane ;le%man and Badeleine Damerment. 1huck ;farrer, former =avy *8@C. Domini-ue ;rieur, French D.*8 officer convicted, in =e% Healand, for sinking the .reenpeace ship 4ain'ow 3arrior 4ichard Zuirin, .erman World War II saboteur landed by .erman submarine in the 2*, as part of 3peration ;astorius. 1aptured and e9ecuted. e9 parte Zuirin %as a *upreme 1ourt case challenging the constitutionality of e9ecution of unla%ful combatants. @li ?assan *alameh, chief of operations of $lack *eptember. Bike *pann, 1I@ field officer and the first @gency operative to be killed in action during 3peration 8nduring Freedom in @fghanistan. .ary *chroen, 1I@ field officer %ho led the first 1I@ team into @fghanistan during the opening stages of 3peration 8nduring Freedom.

3tto *kor>eny, .erman commando %ho led the rescue of $enito Bussolini, and operated in 2* uniform during the $attle of the $ulge. ;avel *udoplatov, ma'or general in *oviet state security (under many organi>ational names , %ith roles ranging from assassin to director of field operations. Jes^s Gillamor, Filipino @ir Force officer that helped organi>e World War II guerilla movements. $illy Waugh, former 2nited *tates *pecial Forces soldier %ho later %orked as a contractor %ith the 1I@. *aro%ar ?asan, former 2nited *tates @ir Force officer %ho later %orked as a contractor %ith the 1I@.

$epresentations in popular culture[edit]


1overt operations have often been the sub'ect of popular novels, films, &G series, comics, etc. &he 1ompany is a fictional covert organi>ation featured in the @merican television dramaNthriller series Prison Break. @lso other series that deal %ith covert operations are &ission1 +mpossi'le, Alias, Burn 5otice, %$e .nit, %$e State 3it$in, Co(ert Affairs and 2=.

ee also[edit]

*py fiction *py film ?2BI=& (clandestine (operational techni-ues 1ounterAintelligence Bilitary intelligence $lack operation False flag *3"F 1ounterintelligence Field @ctivity Co(ert 3arfare &ask Force Falcon Banhunt (military 1hurch 1ommittee 1overt 2nited *tates foreign regime change actions

$eferences[edit]
.ootnotes[edit]
L a b 89ecutive *ecrets: 1overt @ction and the ;residency, William J. Daugherty, 2niversity of :entucky ;ress, (FF,, page (0. (. L a b c 89ecutive *ecrets: 1overt @ction and the ;residency, William J. Daugherty, 2niversity of :entucky ;ress, (FF,. ). % @ll =ecessary Beans: 8mploying 1I@ operatives in a Warfighting 4ole @longside *pecial 3perations Forces, 1olonel :athryn *tone, ;rofessor @nthony 4. Williams (;ro'ect @dvisor , 2nited *tates @rmy War 1ollege (2*@W1 , 6 @pril (FF), page 6 ".

,.

% 89ecutive *ecrets: 1overt @ction and the 4epresentatives. ;residency, William J. Daugherty, 2niversity of :entucky ;ress, (FF,, page (7. 0. % 89ecutive *ecrets: 1overt @ction and the ;residency, William J. Daugherty, 2niversity of :entucky ;ress, (FF,, page (D.

+,ternal links[edit]

!"# *tatutory ;rocedures 2nder Which 1ongress Is &o $e Informed of 2.*. Intelligence @ctivities, Including 1overt @ctions by @lfred 1umming, January "7, (FF5 (?&BC A 1ongressional 4esearch *ervice via the%all.civiblog.org 4ichard ?ersh *tatement to ?ouse Judiciary Democratic 1ongressional $riefing, January (F, (FF5 (?&BC via the%all.civiblog.org Full &ranscript, ?ouse Judiciary Democratic Bembership $riefing +1onstitution in 1risis: Domestic *urveillance and 89ecutive ;o%er+ January (F, (FF5 (?&BC via the%all.civiblog.org +$ig $rother is Watching Iou ;art " A DF( BI .roup &@C3= ;ro'ect *ummary, *preadsheet, 4ep. We9ler response, and =e%s 1overage collection (includes *hane ?arris/s +&I@ Cives 3n+ via the%all.civiblog.org *teath =et%ork 3perations 1entre A 1overt 1ommunication *upport *ystem

.ront organi-ation
From Wikipedia, the free encyclopedia Jump to: navigation, search &his article is about a particular use of the term connected %ith intelligence gathering, organi>ed crime and religious or political groups. For 1overt organi>ation, see 1overt operation. @ front organi-ation is any entity set up by and controlled by another organi>ation, such as intelligence agencies, organi>ed crime groups, banned organi>ations, religious or political groups, advocacy groups, or corporations. Front organi>ations can act for the parent group %ithout the actions being attributed to the parent group. Front organi>ations that appear to be independent voluntary associations or charitable organi>ations are called front groups. In the business %orld, front organi>ations such as front companies or shell corporations are used to shield the parent company from legal liability. In international relations, a puppet state is a state %hich acts as a front (or surrogate for another state.

Contents
!hide#

" Intelligence agencies ( 3rgani>ed crime ) 4eligion o )." *cientology , ;olitics

,." ;roAIsrael lobbying fronts ,.( @partheid government fronts ,.) 1ommunist fronts ,.)." 2nited *tates ,.).( 4ussia ,.).) 3ther 0 $anned paramilitary organi>ations 5 1orporate front organi>ations o 5." @stroturfing 6 *ee also 7 4eferences o 7." Further reading
o o o

Intelligence agencies[edit]
*ee also: =onAofficial cover and @gent handling_Fronts and cutouts Intelligence agencies use front organi>ations to provide +cover+, plausible occupations and means of income, for their covert agents. &hese may include legitimate organi>ations, such as charity, religious or 'ournalism organi>ationsR or +brass plate firms+ %hich e9ist solely to provide a plausible background story, occupation, and means of income. &he airline @ir @merica, an outgro%th of 1ivil @ir &ransport of the "D,Fs, and *outhern @ir &ransport, ostensibly a civilian air charter company, %ere operated and %holly o%ned by the 1I@, supposedly to provide humanitarian aid, but fle% many combat support missions and supplied covert operations in *outheast @sia during the Gietnam War.!"# 3ther 1I@Afunded front groups have been used to spread @merican propaganda and influence during the 1old War, particularly in the &hird World.!(# When intelligence agencies %ork through legitimate organi>ations, it can cause problems and increased risk for the %orkers of those organi>ations. !)# &o prevent this, the 1I@ has had a (FAyear policy of not using ;eace 1orps members or 2* 'ournalists for intelligence purposes.!,#!0# @nother airline allegedly involved in intelligence operations %as 4ussian @eroflot that %orked in a close coordination %ith :.$, *G4 and .42.!5# &he company conducted forcible +evacuations+ of *oviet citi>ens from foreign countries back to the 2**4. ;eople %hose loyalty %as -uestioned %ere drugged and delivered unconscious by @eroflot planes, assisted by the company :.$ personnel, according to former .42 officer Gictor *uvorov .!6# In "D7Fs and "DDFs, specimens of deadly bacteria and viruses stolen from Western laboratories %ere delivered by @eroflot to support the 4ussian program of biological %eapons. &his delivery channel encoded G3C=@ (+%ave+ meant +delivering the material via an international flight of the @eroflot airline in the pilots/ cabin, %here one of the pilots %as a :.$ officer+ .!5# @t least t%o *G4 agents died, presumably from the transported pathogens .!5# When businessman =ikolai .lushkov %as appointed as a top manager of @eroflot in "DD5, he found that the airline company %orked as a +cash co% to support international spying operations+ according to @le9 .oldfarb:!7# ),FFF people out of the total %orkforce of ",,FFF in @eroflot %ere F*$, *G4, or .42 officers. @ll proceeds from ticket sales %ere distributed to )0( foreign bank accounts that could not be controlled by the @eroflot administration. .lushkov closed all these accounts and channeled the money to an accounting center called

@ndava in *%it>erland .!7# ?e also sent a bill and %rote a letter to *G4 director Ievgeni ;rimakov and F*$ director Bikhail $arsukov asking them to pay salaries of their intelligence officers in @eroflot in "DD5.!7# .lushkov has been imprisoned since (FFF on charges of illegally channeling money through @ndava. *ince (FF, the company is controlled by Giktor Ivanov, a highAranking F*$ official %ho is a close associate of Gladimir ;utin.

#rgani-ed crime[edit]
Bany organi>ed crime operations have substantial legitimate businesses, such as licensed gambling houses, building construction companies, trash hauling services, or dock loading enterprises. &hese front companies enable these criminal organi>ations to launder their income from illegal activities. @s %ell, the front companies provide plausible cover for illegal activities such as drug trafficking, smuggling, and prostitution. &attoo parlors are often used as fronts for outla% motorcycle clubs Where brothels are illegal, criminal organi>ations set up front companies providing services such as a +massage parlor+ or +sauna+, up to the point that +massage parlor+ or +sauna+ is thought as a synonym of brothel in these countries.

$eligion[edit]
cientolog'[edit]
&he 1hurch of *cientology uses front groups either to promote its interests in politics or to make its group seem more legitimate. &he F$I/s July 6, "D66 raids on the 1hurch/s offices (follo%ing discovery of the 1hurch/s 3peration *no% White turned up, among other documents, an undated memo entitled +;4 .eneral 1ategories of Data =eeding 1oding+. &his memo listed %hat it called +*ecret ;4 Front .roups,+ %hich included the group @;4C, +@lliance for the ;reservation of 4eligious Ciberty+ (later renamed +@mericans ;reserving 4eligious Ciberty+ .!D# &he 1ult @%areness =et%ork (1@= is considered by many to no% be a front group for the 1hurch of *cientology, %hich took the group over financially after bankrupting it in a series of la%suits.!"F#!""#!"(# &ime identified several other fronts for *cientology, including: the 1iti>ens 1ommission on ?uman 4ights (11?4 , &he Way to ?appiness Foundation, @pplied *cholastics, the 1oncerned $usinessmen/s @ssociation of @merica, and ?ealthBed 1linic.!")# *even years later the $oston ?erald sho%ed ho% =arconon and World Citeracy 1rusade are also fronting for *cientology.!",# 3ther *cientology groups include Do%nto%n Bedical, 1riminon and the @ssociation for $etter Civing and 8ducation (@$C8 .

*olitics[edit]
In politics, a group may be called a front organi>ation if is perceived to be disingenuous in its control or goals, or if it attempts to mask e9tremist vie%s %ithin a supposedly more moderate group. *ome special interest groups engage in astroturfing, %hich is an attempt to mask lobbying as a grassroots movement.

*ro3Israel lobb'ing fronts[edit]

&he @merican Israel ;ublic @ffairs 1ommittee has been accused of using front organi>ations as a means of circumventing limits on campaign spending!"0# &hese front organi>ations have names unrelated to @I;@1. Delaware Galle 8ood 8o(ernment Association (;hiladelphia , San #ranciscans for 8ood 8o(ernment (1alifornia , Bea(er PAC (Wisconsin , Cactus PAC (@ri>ona , and +cepac (=e% Iork are e9amples of former @I;@1 front groups.!"5# +@ccording to a computerAaided analysis of "D75 Federal 8lection 4eports, despite @I;@1Xs claims of nonAinvolvement in political spending, no fe%er than 0" proAIsrael ;@1s<most of %hich dra% money from Je%ish donors and operate under obscureAsounding names<are operated by @I;@1 officials or people %ho hold seats on @I;@1Xs t%o ma'or policymaking bodies. &he study sho%s that 7F proAIsrael ;@1s spent more than `5.D million during the "D75 campaigns, making them the nationXs biggestAgiving narro%Aissue interest group.+ !"6#

Apartheid go!ernment fronts[edit]


*outh @frica/s apartheidAera government used numerous front organi>ations to influence %orld opinion and to undertake e9traA'udicial activities and the killing of antiAapartheid activistsR these included!"7# the follo%ing:

&he 1iti>en A funded secretly by government, intended to challenge the liberal 4and Daily Bail, contributing to the political ruin of John Gorster and 1onnie Bulder 1ivil 1ooperation $ureau (11$ A a covert, special forces organi>ation that harassed, seriously in'ured and eliminated antiAapartheid activists Federal Independent Democratic @lliance (FID@ International Freedom Foundation A WashingtonAbased mechanism to combat sanctions, and support Jonas *avimbi and 2=I&@ Jeugkrag A or Iouth for *outh @frica, led by Barthinus van *chalk%yk a shortAlived @frikaner youth group, surreptitiously funded by the Bilitary Intelligence/s ;ro'ect 8ssay =ational *tudent Federation (=*F A led by 4ussell 1rystal, intended to challenge =2*@* 4oodeplaat 4esearch Caboratories A Ced by Daan .oosen, the main research facility of ;ro'ect 1oast &aussig Familienstiftung A or &aussig Family &rust, a Ciechtenstein conduit for secret government transactions Geterans for Gictory A consisting of national servicemen, a countermeasure against the 8nd 1onscription 1ampaign %hich %as allied to the 2nited Democratic Front (2DF

Communist fronts[edit]
Further information: 1ommunist front It has been suggested that Communist front be merged into this article. (Discuss
Proposed since August 2011.

1ommunist and other Bar9istACeninist parties have sometimes used front organi>ations to attract support from those (sometimes called fello% travellers %ho may not necessarily agree %ith Ceninist ideology. &he front organi>ation often obscures its provenance and may often be a tool for recruitment. 3ther Bar9ists often describe front organi>ations as opportunist. &he concept of a front organi>ation should be distinguished from the united front (a coalition

of %orking class or socialist parties and the popular front. $oth the united front and popular front usually disclose the groups that make up their coalitions. "nited tates[edit] @ccording to a list prepared in "D00 by the 2nited *tates *enate Internal *ecurity *ubcommittee, the 1omintern set up no less than 7( front organi>ations in the 2nited *tates in the "D)Fs and "D,Fs. &his tactic %as often used during the 4ed *care of the "D0Fs, %hen a number of organi>ations in the labor and peace movements %ere accused of being +1ommunist fronts+. *ometimes, 1ommunist fronts %orked at an international level, as has been alleged %ith the World ;eace 1ouncil.!"D# *oviet intelligence infiltrated many peace movements in the West. In addition to W;1, important communist front organi>ations included the World Federation of &rade 2nions, the World Federation of Democratic Iouth, and the International 2nion of *tudents.!(F# 4ichard Feli9 *taar has also suggested that these organi>ations %ere some%hat less important front organi>ations: @froA@sian ;eople/s *olidarity 3rgani>ation, 1hristian ;eace 1onference, International @ssociation of Democratic Ca%yers, International Federation of 4esistance Bovements, International Institute for ;eace, International 3rgani>ation of Journalists, Women/s International Democratic Federation and World Federation of *cientific Workers.!("# &here %ere also numerous smaller organi>ations, affiliated %ith the above fronts such as ;ug%ash 1onferences on *cience and World @ffairs.!((#!()# =umerous peace conferences, congresses and festivals have been staged %ith support of those organi>ations.!(,# Bore recently, the Workers/ World ;arty (WW; !(0# set up an antiA%ar front group, International @=*W84. (@=*W84 is no longer closely associated %ith WW;R it is closely associated %ith a WW; splinter, the ;arty for *ocialism and Ciberation, but ;*C plays a more open role in the organi>ation. *imilarly, 2nite @gainst Fascism, the @ntiA=a>i Ceague, the *top the War 1oalition and 4espect J &he 2nity 1oalition are all criticised as being fronts for the &rotskyist *ocialist Workers ;arty (2: . $ussia[edit] In @pril "DD", 1;*2 leadership and the :.$ has created a puppet political party inside 4ussia, the Ciberal Democratic ;arty of 4ussia (CD;4 , %hich became the second officially registered party in the country.!(5# @ccording to :.$ .eneral ;hilipp $obkov, it %as a +Hubatov/s pseudoAparty under :.$ control that directs interests and sentiments of certain social groups+.!(6# &he former 1;*2 ;olitburo member @le9ander =ikolaevich Iakovlev described in his book ho% :.$ director Gladimir :ryuchkov presented the pro'ect of the puppet party at a 'oint meeting %ith Bikhail .orbachev and informed him about a selection of CD;4 leaders, and the mechanism of funding from 1;*2 money.!(6# &he book includes an official copy of a document providing the initial CD;4 funding () million rubles from the 1;*2 money. &he leader of CD;4, Gladimir Hhirinovsky proved to be an effective media performer.!(5# ?e gained 7a of votes during the "DD" ;residential elections.!(7# ?e also supported the @ugust "DD" coup attempt. #ther[edit] *ome antiAIslamist feminist groups in the Buslim %orld have also been accused of being front organi>ations. &he 4evolutionary @ssociation of the Women of @fghanistan has been accused

of being a Baoist front, %hile the 3rgani>ation of Women/s Freedom in Ira- has been accused of being a front for the WorkerA1ommunist ;arty of Ira- .!(D#!)F#

Banned paramilitar' organi-ations[edit]


$anned paramilitary organi>ations sometimes use front groups to achieve a public face %ith %hich to raise funds, negotiate %ith opposition parties, recruit, and spread propaganda. For e9ample, banned paramilitary organi>ations often have an affiliated political party that operates more openly (though often these parties, themselves, end up being banned . &hese parties may or may not be front organi>ations in the narro% sense (they have varying degrees of autonomy and the relationships are usually something of an open secret but are %idely considered to be so, especially by their political opponents. 89amples are the relationship bet%een the I4@ and *inn FUin in "D7Fs Ireland or bet%een the $as-ue groups 8&@ (paramilitary and $atasuna (party in *pain. *imilarly, in the 2nited *tates in periods %here the 1ommunist ;arty %as highly stigmati>ed, it often operated largely through front groups. In addition, the ;rovisional I4@ also operated a vigilante front group, called Direct @ction @gainst Drugs. During the Weimar 4epublic in .ermany, the antisemitic and nationalist 3rganisation 1onsul reportedly had a front company named the $avarian Wood ;roducts 1ompany.!)"#

Corporate front organi-ations[edit]


*ee also: *hell corporation 1orporations from a %ide variety of different industries set up front groups. *ome pharmaceutical companies set up +patients/ groups+ as front organi>ations that pressure healthcare providers and legislators to adopt their products. For e9ample, *chering ?ealthcare and $iogen Ctd. tried to pressure the 2: =ational ?ealth *ervice (=?* to adopt its drug $eta Interferon to treat Bultiple *clerosis (B* sufferers. *chering set up and funded a group called &S Goice, %ith its o%n %ebsite, %hich claimed to represent B* sufferers.!citation needed# @nother pharmaceutical company, $iogen, set up a campaign called Action for Access, %hich also claimed it %as an independent organi>ation and the voice of B* sufferers. ;eople %ho visited the %ebsite and signed up for the campaign did not realise that these %ere not genuinely independent patient groups. It has been alleged that computer soft%are giant Bicrosoft created and funded the @ssociation for 1ompetitive &echnology to defend its interests against charges of antitrust violations.!citation needed# &obacco companies fre-uently use front organi>ations and doctors to advocate their arguments about tobacco use, although less openly and obviously than in the "D7Fs. &he 1enter for 1onsumer Freedom (11F is one of the more active corporate front groups and one of several front groups created by $erman K 1o., a public affairs firm o%ned by lobbyist 4ick $erman. &hey claim to be supported by restaurants, food companies and more than ",FFF concerned individuals. $ased in Washington, D1, $erman K 1o. represents the tobacco industry as %ell as hotels, beer distributors, taverns, and restaurant chains. &he group actively opposes smoking bans and lo%ering the legal bloodAalcohol level, %hile targeting studies on the dangers of red meat consumption, overfishing and pesticides. 8ach year they

give out the +nanny a%ards+ to groups %ho, according to them, try to tell consumers ho% to live their lives.!)(# $erman K 1o. is also associated %ith various antiAunion and unionAbusting campaigns, such as their +1enter for 2nion Facts+, as %ell as antiAanimal rights campaigns such as +%%%.petakillsanimals.com+.!)(# @ list of some alleged corporate front groups active in the 2* is maintained by the Bultinational Bonitor.!))# *ome think tanks are corporate front groups. &hese organi>ations present themselves as research organi>ations, using phrases such as +...Institute for 4esearch+ in their names. $ecause their names suggest neutrality, they can present the commercial strategies of the corporations %hich sponsor them in a %ay %hich appears to be ob'ective sociological or economical research rather than political lobbying. *imilarly the 1enter for 4egulatory 8ffectiveness has been criticised as a front organi>ation for various industry bodies %hich seek to undermine regulation of their environmentally damaging activities under the guise of /regulatory effectiveness/.!),#

Astroturfing[edit]
Bain article: @stroturfing Astroturfing, a %ordplay based on +grassroots+ efforts, is an @merican term used pe'oratively to describe formal public relations pro'ects %hich try to create the impression of a grounds%ell of spontaneous popular response to a politician, product, service, or event. 1orporations have been kno%n to +astroturf+, but are not the only entities alleged to have done so. In recent years, organi>ations of plaintiffs/ attorneys have established front groups such as Gictims and Families 2nited to oppose tort reform.!)0# 4ichard $erman/s ;4 firm, $erman and 1ompany, has been referred to as a front group for big business. ?e takes unpopular issues, and tries to turn around public opinion using e9aggeration and stra% man arguments.

ee also[edit]

@gent of influence @stroturfing 1I@ 1overt operation 8ntryism F$I .3=.3 Bafia Bedia transparency Boney laundering Boney loop 3ffshore bank 3rgani>ed crime 4acket 4evolutionary 1ommunist ;arty *hell company *tra% man (la%

&errorist front organi>ation &ransparency (humanities 1ategory:@dvocacy groups *tra%man @rgument

$eferences[edit]
". % Ceary, William B. +1I@ @ir 3perations in Caos, "D00A"D6, Supporting t$e FSecret 3arF+. From Studies in +ntelligence (1I@ , volume ,), number ", %inter "DDDA(FFF. (. % ;o%ers, &homas, +&he Ban Who :ept the *ecrets : 4ichard ?elms K the 1I@+, @lfred @. :nopf, =e% Iork, "D6D, I*$= FA)D,A0F666AF ). % Joe Davidson, +I @m =ot a 1I@ @gent+. (FF(AF,A"". 4etrieved (FF6A"(A"). ,. % +;ress briefing by Bike Bc1urry+. 1linton ;residential Baterials ;ro'ect. "DD5AF6A"6. 4etrieved (FF6A"(A"). 0. % +89clusive: ;eace 1orps, Fulbright *cholar @sked to /*py/ on 1ubans, Gene>uelans+. @$1 =e%s. (FF7AF(AF7. 4etrieved (FF7AF(A"0. 5. L a b c @le9ander :ou>minov Biological 9spionage1 Special /perations of t$e So(iet and 4ussian #oreign +ntelligence Ser(ices in t$e 3est, .reenhill $ooks, (FF5, I*$= "A70)56A5,5A( 6. % Giktor *uvorov ABuarium (bcdefghi , "D70, ?amish ?amilton Ctd, I*$= FA(,"A""0,0AF 7. L a b c @le9 .oldfarb, %ith Barina Citvinenko Deat$ of a Dissident1 %$e Poisoning of AleHander !it(inenko and t$e 4eturn of t$e K8B, &he Free ;ress, (FF6, I*$= "A,"50A0"50A, D. % :ent, *tephen @.R :rebs, &heresa ("D77 . +When *cholars :no% *in: @lternative 4eligions and &heir @cademic *upporters+. Skeptic 8 () : )5J,,. 4etrieved (FF5AF5AF5. "F. % :napp, Dan ("DD5A"(A"D . +.roup that once critici>ed *cientologists no% o%ned by one+. 1==. 4etrieved (FF6AF0AF6. "". % :ent, *tephen @. (January (FF" . +&he French and .erman versus @merican Debate over /=e% 4eligions/, *cientology, and ?uman 4ights+. &ar'urg )ournal of 4eligion 8 (" . 4etrieved (FF6AF0AF6. "(. % 4ussell, 4on ("DDDAFDAFD . +*cientology/s 4evenge A For years, the 1ult @%areness =et%ork %as the 1hurch of *cientology/s biggest enemy. $ut the late C. 4on ?ubbard/s C.@.Abased religion cured that AA by taking it over+. 5ew %imes !A. 4etrieved (F""A"FA(". "). % $ehar, 4ichard ("DD"AF0AF5 . +&he &hriving 1ult of .reed and ;o%er+. %ime. 4etrieved (F"FAF0AF). ",. % Ballia, Joseph ("DD7AF)AF) . +I=*ID8 &?8 1?241? 3F *1I8=&3C3.IR *cientology reaches into schools through =arconon+. Boston "erald. "0. % &op ;roAIsrael 1ontributors to Federal 1andidates and ;arties ("DD( , Je%ish Girtual Cibrary. @ccessed online 7 3ctober (FF5. "5. % 4ichard 1urtiss ("DD6 : ..S. Aid to +srael1 %$e Su'Iect 5o /ne &entions, %$e !ink &9 (, :"F. "6. % John Fialka, !inked DonationsJ Political Contri'utions #rom Pro-+srael PACs Suggest Coordination, Wall *treet Journal, June (,, "D76 p" c5 "7. % %rut$ and 4econciliation Commission of Sout$ Africa 4eport* Golume 2*. (FF). pp. 0(0J0(6.

"D.

% 4ichard Feli9 *taar, #oreign policies of t$e So(iet .nion, ?oover ;ress, "DD", I*$= FA7"6DAD"F(A5, p.6D, p.7, (F. % 4ichard Feli9 *taar, #oreign policies of t$e So(iet .nion, ?oover ;ress, "DD", I*$= FA7"6DAD"F(A5, p.7, (". % 4ichard Feli9 *taar, #oreign policies of t$e So(iet .nion, ?oover ;ress, "DD", I*$= FA7"6DAD"F(A5, p.7FA7" ((. % 4ichard Feli9 *taar, #oreign policies of t$e So(iet .nion, ?oover ;ress, "DD", I*$= FA7"6DAD"F(A5, p.7(A7) (). % 4ichard Feli9 *taar, #oreign policies of t$e So(iet .nion, ?oover ;ress, "DD", I*$= FA7"6DAD"F(A5, p.75 (,. % 4ichard Feli9 *taar, #oreign policies of t$e So(iet .nion, ?oover ;ress, "DD", I*$= FA7"6DAD"F(A5, p.70 (0. % @drienne Weller, Billions in the streetsj ...and here come the redbaiters, #reedom Socialist, Freedom *ocialist ;arty, Gol. (,, =o. ", @prilJJune (FF). (5. L a b White, *tephen ((FF0 . +&he ;olitical ;arties+. In White, .itelman, *ak%a. De(elopments in 4ussian Politics 8. Duke 2niversity ;ress. I*$= FA7(()A )0((AF. (6. L a b @le9ander =ikolaevich Iakovlev %ime of darkness, Bosco%, (FF), I*$= 0A705,5AFD6AD, page 06, (4ussian: kcldmnd b. ohinfcg. plqcde: pernfgc (FF) s. (7. % ?ale, ?enry 8. ((F"F . +4ussia/s political parties and their substitutes+. In White, *tephen. De(elopments in 4ussian Politics 6. =e% Iork: ;algrave Bacmillan. I*$= D67AFA()FA((,,DAF. (D. % :arsten :ofoed, Cackeys of the occupation disguise as progressives, &he 1ommittee for a Free Ira-, Denmark, 3ctober (7, (FF, )F. % Began 1ornish, Ira-i Women Face Double Jeopardy, Barch ), (FF0 )". % Waite, 4obert . C. ("D5D . Ganguard of 5azism. W W =orton and 1ompany., page ("6 )(. L a b 1enter for 1onsumer Freedom, *ourceWatch )). % 1orporate Front .roups and 1orporateA$acked .roups, Bultinational Bonitor Cinks ;age ),. % 1hris Booney, ;aralysis by @nalysis, &he Washington Bonthly, Bay (FF, )0. % @stroturf in the liability %ars, ;ointofCa%.com (sponsored by the Banhattan Institute and @merican 8nterprise Institute , July ", (FF0

.urther reading[edit]

1I@ +Fronts+ A an unattributed list of alleged front organi>ations for the 1entral Intelligence @gency information about corporate front organisations in 8urope 1hris Booney on /&he 1entre for 4egulatory 8ffectiveness/ A Washington Bonthly +&hank you for *moking+ Front groups at *ourceWatch

Co!ert agent
From Wikipedia, the free encyclopedia Jump to: navigation, search &his article/s lead section ma' not ade:uatel' summari-e ke' points of its contents. ;lease consider e9panding the lead to provide an accessible overvie% of all important

aspects of the article. ?#e'ruar 2012@ &he term co!ert agent can have many meanings, depending on conte9t.

Contents
!hide#

" 1overt agents in the 2nited *tates o "." 1ornell Ca% definition o ".( Identity protection o ".) Famous cases of +outing+ ( *ee also ) 4eferences

Co!ert agents in the "nited tates[edit]


@s it is used in the 2nited *tates Intelligence 1ommunity, it is legally defined in 0F 2*1@ t,(5. &he definition is sub'ect to 'udicial interpretation, but a reading of the plain language of that statute reveals that a covert agent can be an employee of the 2* intelligence agencies or a private citi>en %orking on behalf of that community.

Cornell 0a1 definition[edit]


&he term co(ert agent means: (@ a present or retired officer or employee of an intelligence agency or a present or retired member of the @rmed Forces assigned to duty %ith an intelligence agency< (i %hose identity as such an officer, employee, or member is classified information, and (ii %ho is serving outside the 2nited *tates or has %ithin the last five years served outside the 2nited *tatesR or ($ a 2nited *tates citi>en %hose intelligence relationship to the 2nited *tates is classified information, and< (i %ho resides and acts outside the 2nited *tates as an agent of, or informant or source of operational assistance to, an intelligence agency, or (ii %ho is at the time of the disclosure acting as an agent of, or informant to, the foreign counterintelligence or foreign counterterrorism components of the Federal $ureau of InvestigationR or (1 an individual, other than a 2nited *tates citi>en, %hose past or present intelligence relationship to the 2nited *tates is classified information and %ho is a present or former agent of, or a present or former informant or source of operational assistance to, an intelligence agency.!"#

Identit' protection[edit]

&he la% against unmasking the identities of 2.*. spies says a +covert agent+ must have been on an overseas assignment +%ithin the last five years.+!(# &he la% says that if someone reveals the identity of a covert agent to a third party, +kno%ing that the 2nited *tates is taking affirmative measures to conceal such covert agent/s intelligence relationship to the 2nited *tates+, can get up to "F years in prison. If this third party then tells anyone else, they can get no more than 0 years in prison.!)#

.amous cases of ;outing;[edit]


In the "D5Fs and "D6Fs, antiA1I@ activists occasionally revealed long lists of overseas intelligence agents to sabotage their activities.!citation needed# In the first decade of the ("st century, a controversy arose in %hich some people claimed that the White ?ouse itself revealed an agent/s identity. In that case I. Ce%is +*cooter+ Cibby %as found guilty of per'ury and obstruction of 'ustice. @ court filing by *pecial 1ounsel ;atrick Fit>gerald during his sentencing hearing revealed that Galerie ;lame %as indeed a covert agent at the time.!,#

ee also[edit]

1I@ 8spionage Intelligence agency 2ndercover

$eferences[edit]
". (. ). ,. % +t,(5. Definitions, 2.*. 1ode 1ollection+. 1ornell Ca% *chool. % +Was Galerie ;lame a covert agentM+. ;o%er Cine. % 1overt +@gent Identity ;rotection @ct+. *ourceWatch. % +;lame %as ucovertX agent at time of name leak A =e%ly released unclassified document details 1I@ employment+. B*=.com. 4etrieved "7 *eptember (F"F. Joel *eidman (Bay (D, (FF6 . +;lame %as ucovertX agent at time of name leak A =e%ly released unclassified document details 1I@ employment+. =$1 =e%s. Dan Froomkin (Bay (D, (FF6 . +Fit>gerald @gain ;oints to 1heney+. &he Washington ;ost. Jon ;onder (Bay )F, (FF6 . +It/s 3fficial: ;lame %as 1overt A *o Federal Ca% Was $roken, $ut /4ule of Ca%/ 3nly @pplies to Dems+. ;ensito 4evie%. 4etrieved ") *eptember (F"F.

.abricator (intelligence)
From Wikipedia, the free encyclopedia

Jump to: navigation, search @ fabricator is an intelligence agent or officer that generates disinformation, falsehoods or bogus information, often %ithout access to authentic resources.!"# Fabricators often provide forged documents in order to substantiate their falsehoods.!(# It is normal intelligence practice to place identified fabricators on a black list or to issue a burn notice on them and to recall intelligence sourced from them.!)#!,# @ fabricator is often cited as a reliable source behind black propaganda or atrocity propaganda involving disinformation or information that has not been properly vetted but suits the agenda of the disseminating organi>ation. Bultiple fabricators are usually used to 'ustify a $ig Cie. &he process of vetting to %eed out fabricators and double agents is also referred to as source (alidation.!0# 4ecent e9amples of this include the case of the =iger uranium forgeries!5# and the mobile %eapons laboratory in Ira-.!6# &here are numerous cases in %hich it is alleged that the *oviet 2nion and its sattellite states employed fabricators to pass disinformation to discredit activist emigres in the 2nited *tates.!7# Bany +foiled+ terrorist attacks and terror alerts have been based on fa'ricated intelligence, many of %hich are believed to have been politically motivated.!D#

Contents
!hide#

" Botivations of fabricators ( =otable fabricators ) *ee also , 4eferences

7oti!ations of fabricators[edit]
Fabricators can be motivated by several factors:

#anaticism or ideolog is often cited as the key reason behind fabricator activity. When fanaticism is involved or ideology becomes stronger than morals, fabrication may then be seen as a reasonable means to an end. In these cases the fabricator invents the fake intelligence so as to help bring about a specific outcome to a situation.!6#!"F# &ental illness, such as Confa'ulation, often combined %ith alco$olism, causes some individuals to fabricate intelligence, most often done as part of a fantasy of being a secret agent or to gain official attention.!""#!"(# &one is a strong incentive for some fabricators. 3ften a once reliable intelligence source agent %ill become a fabricator due to financial problems or greed. When the agent no longer has valid intelligence to sell to the conducting intelligence officer, heNshe may decide to sell fabricated intelligence in order to satisfy their need or greed. Politics is a motivating factor for fabricating intelligence in order to use emotion to drive public opinion. &he timing of official +threat announcements+ is often tied to politics, but cites fabricated intelligence reports as 'ustification.!")#

2otable fabricators[edit]
(in historical order Girgilio Scattolini %as the director of the *ocial 1enter of 1atholic @ction in the Gatican. @s a former 'ournalist, he had sold bogus Gatican information to various papers before World War II. During operation G8**8C in the fall of "D,,, he %as identified as a fabricator providing false intelligence on the Gatican to several agents of the 3**. &he 3** ac-uired his information from t%o separate sources %hich eventually allo%ed 3** counterintelligence officer James @ngleton to determine its fradulent nature, but not before ;resident 4oosevelt %as provided the reports as genuine.!",# Simon 3iesent$al %as a =a>i hunter and founder of the +Je%ish Documentation 1enter+. 4esearch conducted by .uy Walters for his book "unting 9(il1 %$e 5azi 3ar Criminals 3$o 9scaped and t$e "unt to Bring %$em to )ustice in order to verify Weisenthal/s statements and %ritings revealed that +Wiesental %as a selfAserving fabricator %ho also did some good+.!"0# !uis &anuel 8onzalez &ata-!ledo %as a *paniard %ho %as fired in "D5( after being caught embe>>eling funds from his employer, the Dominican 4epublic Intelligence service. In "D5) he began a career as a fabricator. ?e attempted to sell fabricated intelligence and forged documents implicating 4afael &ru'illo in a plot to assassinate ;resident Juan $osch, both in the Dominican 4epublic and at the Dominican 8mbassy in ;aris. ?e later approached the 2.*. 8mbassy in @lgiers %ith another plot involving a +&hird !*panish# 4epublic Bovement+. 8ventually he started posing as a 1uban intelligence officer peddling fabrications to the $ra>ilian .overnment, the 2.*. 8mbassy in $russels, Gene>uela, 1olombia and the Dominicans. $y the end of the "D5F/s he %as fabricating his o%n +:.$ file cards+ and +1I@ file cards+. $y "D6) he had relocated to ;aris %here he continued to peddle fantastic fabrications.!(# !emuel ). 3alker %as a Ciberian %ho fantasi>ed about becoming an +@merican *ecret *ervice @gent+. From "D5), at age "6, on%ard he repeatedly crafted forged documents on letterhead of 2nited *tates .overnment agencies, including the White ?ouse, =ational *ecurity 1ounsel (sic , and many others. ?e used these documents to substantiate %ild plots of coups and invasons against @frican states by @merican forces.!(# &anuc$er 8$or'anifar %as an Iranian fabricator %ho lived in ;aris and fed bogus information to %estern intelligence agencies. ?e is suspected to have been directed by Iranian intelligence to provide disinformation to %estern intelligence agencies. ?e provided false information to the 2.*. =ational *ecurity 1ouncil in the conte9t of the IranA1ontra arms for hostages process.!"5# Despite being labelled a fabricator by the 1I@ due to the IranA1ontra @ffair, he again peddled fabrications to the 2.*. Defense Intelligence @gency during the build up to the (FF) invasion of Ira- in the War on &errorism at a meeting in 4ome in December (FF" %ith representatives from the 2ndersecretary of Defence/s office and a related follo% up meeting in June (FF). ?e approached the DoD officials specifically stating that he did not %ant to deal %ith the 1I@.!"6# Cater investigations revealed that policy officials from the 3ffice of the 2ndersecretary of Defense circumvented the 1I@ and collected and used fabricated intelligence in the build up to the (FF) invasion of Ira-. *enator 4ockafeller, representing the 2nited *tates *enate *elect 1ommittee on Intelligence, stated that +clandestine meetings bet%een D3D policy officials and Iranians in 4ome and ;aris in (FF" and (FF)... %ere facilitated by Banucher .horbanifar, an Iranian e9ile and intelligence

fabricator. ... ;entagon policy officials ... undertook the collection of sensitive intelligence. ... It %as a rogue operation.+!"7# A$med C$ala'i is an Ira-i politician and Iranian agent %ho fed and promoted false intelligence reports of %eapons of mass destruction to $ush @dministration officials in order to encourage the (FF) invasion of Ira-.!"D#!(F# 4afid A$med Alwan al-)ana'i is an Ira-i citi>en %ho peddled fabrications regarding Ira-i WBDs to %estern intelligence services. :no%n under his codename Cur(e'all, his fabrications compromised the (FF( =ational Intelligence 8stimate.!("# ?e %as a prolific fabricator %ith his information generating over "FF false intelligence reports for the $=D and the 2nited *tates. 1I@ officer &yler Drumheller %as a vocal opponent of the use of information sourced from 1urveball as 'ustification for the (FF) invasion of Ira-.!6# )o$n A. S$aw, a Department of Defense (DoD politcal appointee under Donald 4umsfeld %ho fabricated claims of Ira-i WBDs to 'ustify the (FF) invasion of Ira-.!((# ?e %as fired by the DoD in (FF,, having fabricated a detailed report on corruption in Ira-i telecoms contracting,!()#!(,# several ne%s stories in the Washington &imes,!(0# and Financial &imes,!(5# and a DoD ;ress 4elease.!(6# Despite being proven false, he continued to repeat his fabrications, notably at the Intelligence *ummit in (FF5!(7# and on neoconservative blogs.!(D# ?e continues to be incorrectly referenced as a credible source in neoconservative blogs!)F#!)"# and opinion pieces.!)(# %$e 8o(ernment of +ran is kno%n to fabricate events to 'ustify progaganda, some of %hich is based on lies dating back to the "D)F/s.!))# &he Iranian state o%ned ;ress &G is kno%n to diffuse fabricated stories.!),#!)0#!)5# 3fcom, $ritian/s independent media regulator, revoked ;ress &G/s licence to broadcast in the 2:!)6# and the .erman media regulatory office ($CB made a re-uest to *8* @stra to have the channel removed from the satteliteR a .erman court later decided that the ban %as not 'usitifed.!)7#!)D# In June (F"), the intelligence focused %ebsite 1ryptome published an article and video documenting that Islamic 4epublic of Iran $roadcasting had fabricated a ne%s video using a fake $ritish $roadcasting 1orporation 'ournalist.!,F# A'dulla$ al-/mar is a *yrian propagandist %ho defected in (F"( during the *yrian civil %ar. ?e stated, +3ur 'ob %as to fabricate, make deceptions and cover up for $ashar alA@ssad/s crimes+.!,"#

ee also[edit]
*ee also: Disinformation *ee also: $lack propaganda *ee also: @trocity propaganda *ee also: $ig Cie

$eferences[edit]
". % Department of Defense, Dictionar of &ilitar and Associated %erms, !"#, January )", (F""

L a b c Dr. 4obert C. Banaghan, %rends in African #orgeries, !(#, 1I@ 1enter for the *tudy of Intelligence ). % Defense Intelligence @gency, %erms K Definitions of +nterest for DoD Counterintelligence Professionals, !)#, Bay (, (F"" ,. % Dapartment of Defense, +nstruction 5um'er S->200.=2 Defense "uman +ntelligence, paragrah ,.i., !,#, December 7, (FFD 0. % %$e Commission on t$e +ntelligence Capa'ilities of t$e .nited States 4egarding 3eapons of &ass Destruction, 1hapter 6, p. )6(, !0#, Barch )", (FF0 5. % *idney $lumenthal, 3eapons of mass dissem'ling, !5#, *alon, Feb 0 (FF, 6. L a b c Joby Warrick, 3arnings on 3&D F#a'ricatorF 3ere +gnored* 9H-C+A Aide Sa s, !6#, Washington ;ost, June (0, (FF5 7. % Judy Feigin, Stri(ing for Accounta'ilit in t$e Aftermat$ of t$e "olocaust, !7#, 2.*. Justice Department, 3ffice of *pecial Investigations, December (FF7 D. % Bichel 1hossudovsky, Cr ing 3olf1 %error Alerts 'ased on #a'ricated +ntelligence, !D#, .lobal 4esearch, @ugust (F, (FF5 "F. % ;aul Wood%ard, L#a'ricated2 +sraeli t$reats pro(oke escalation in t$reats from +ran, !"F#, @ugust "7, (F"( "". % @rnold B. *ilver, 0uestions* 0uestions* 0uestions, !""#, 1I@ 1enter for the *tudy of Intelligence, Bay "6, (FF0 "(. % David 4. BcCean, Cranks* 5uts and Screw'alls, !"(#, 1I@ 1enter for the *tudy of Intelligence, *eptember (), (FF) "). % Bichel 1hossudovsky, #a'ricating +ntelligence for Political 8ain, !")#, .lobal 4esearch, @ugust ), (FF, ",. % 3ffice of the =ational 1ounterintelligence 89ecutive, Counter +ntelligence 4eader Golume 2, !",#, 1hapter ): 1ounterintelligence in the 3ffice of *trategic *ervices, p. (F7 "0. % Studies in +ntelligence, Gol. ,), =o. ,, ;. 06, !"0#, 1I@ 1enter for the *tudy of Intelligence "5. % *enate *elect 1ommittee on Intelligence, Preliminar +nBuir +nto %$e Sale /f Arms %o +ran And Possi'le Di(ersion /f #unds %o %$e 5icaraguan 4esistance, !"5# "6. % *enate 1ommittee on Intelligence, +ntelligence Acti(ities 4elating to +raB Conducted ' t$e Polic Counterterrorism 9(aluation 8roup and t$e /ffice of Special Plans wit$in t$e /ffice of t$e .nder Secretar of Defense for Polic , !"6#, June (FFD "7. % *enator 4ockefeller, Congressional 4ecord - Senate, !"7#, 2.*. .overnment ;rinting 3ffice, June 0, (FF7 "D. % 1==, +raBi minister1 C$ala'i will 'e arrested* !"D#, January ((, (FF0 (F. % John Di>ard, "ow A$med C$ala'i Conned t$e 5eocons, !(F#, Bay 0, (FF, (". % @lfred 1umming, Congress as a Consumer of +ntelligence +nformation, p. 7, !("#, January "0, (FFD ((. % Washington &imes, Pentagon ousts official w$o tied 4ussia* +raB arms, !((#, (D December (FF, (). % &. 1hristian Biller, Pentagon /usts /fficial .nder #B+ +n(estigation, !()#, Cos @ngeles &imes, "" December (FF, (,. % &. 1hristian Biller, Pentagon Deput :s Pro'es in +raB 3eren:t Aut$orized* /fficials Sa , !(,#, Cos @ngeles &imes, 6 July (FF, (0. % @ndre% *eifter, Conser(ati(e pundits forwarded discredited 3as$. %imes article 'laming 4ussians for missing eHplosi(es in +raB, !(0#, Bedia Batters, (D 3ctober (FF, (.

(5. (6.

% &. 1hristian Biller, Blood &one , pp 5), I*$= F)"5"55(75 % !etter from Senator C$arles 9. 8rassle to Secretar of Defence Donald 4umsfeld concerning false press release* M2NO* 26 )ul 200> (7. % Beg Caughlin, +Intelligence conference dra%s criticism,+ St. Peters'urg %imes (5 Barch (FF6 p. "@. (D. % .uest Wirter, John @. *ha%, 4ezko* /'ama* and t$e 5ad$mi Auc$i 4ailroad !inking C$icago* 3as$ington and Bag$dad ?Part 1of <@, !(6#, () 3ctober (F"( )F. % Carry :elly blog, 3$ere did S ria 8et +ts C$emical 3eaponsJ, !(7#, " Bay (F") )". % Gictory Institute, 2nto the $reach, /peration Sarindar )(. % I$D 8ditorials, S ria:s C$emical 3eapons Came #rom Saddam:s +raB, !(D#, "D July (F"( )). % Beir Javendanfar, +ranian go(ernment stirs up antisemitism wit$ in(ented massacre, !)F#, &he .uardian, (6 December (F"F ),. % +ranian Press %G accused of faking drone strike report, !)"#, &he &elegraph, ( Dec (F"" )0. % +ranian %G station Lfaked2 Somali deat$s ' .S drones, !)(#, $ureau of Investigative Journalism, ( December (F"" )5. % #ake rape fatwa stor planted ' Presst( spread around world ' +slamop$o'es, !))#, Islamist.com, ) January (F") )6. % +ran:s Press %G 'lames Britis$ ro als for loss of licence, !),#, &he =ational, (( January (F"( )7. % &inister1 +ran to Protest Ban on Press %G t$roug$ !egal C$annels , !)0#, Fars =e%s, 6 @pril (F"( )D. % Anot$er legal (ictor for Press %G, !)5#, Islamic 4adio K &elevision 2nion, "5 July (F"( ,F. % +ran .se of #ake 4eporters, !)6#, 1ryptome, ") June (F") ,". % Ivan Watson, Defecting S rian propagandist sa s $is Io' was Fto fa'ricateF, !)7#, 1==, 3ctober "F, (F"( 4etrieved from +http:NNen.%ikipedia.orgN%Ninde9.phpM titleQFabricatorO(intelligence KoldidQ05,F"(F67+ 1ategories: Intelligence (information gathering ;ropaganda techni-ues Intelligence operations

.alse flag
From Wikipedia, the free encyclopedia Jump to: navigation, search +False colors+ redirects here. For the imaging techni-ue, see FalseAcolor. &his article needs attention from an e,pert in 0a1. ;lease add a reason or a talk parameter to this template to e9plain the issue %ith the article. Wiki;ro'ect Ca% (or its ;ortal may be able to help recruit an e9pert. ?&a 2011@ .alse flag (or black flag describes covert military or paramilitary operations designed to deceive in such a %ay that the operations appear as though they are being carried out by other

entities, groups or nations than those %ho actually planned and e9ecuted them. 3perations carried during peaceAtime by civilian organi>ations, as %ell as covert government agencies, may by e9tension be called false flag operations if they seek to hide the real organisation behind an operation. &he name +false flag+ has its origins in naval %arfare %here the use of a flag other than the belligerent/s true battle flag as a ruse de guerre, before engaging an enemy, has long been acceptable. *uch operations are also acceptable in certain circumstances in land %arfare, to deceive enemies in similar %ays providing that the deception is not perfidious and all such deceptions are discarded before opening fire upon the enemy.

Contents
!hide#

" =aval %arfare ( @ir %arfare ) Cand %arfare , @s prete9ts for %ar o ,." FrancoA;russian War o ,.( 4ussoA*%edish War o ,.) *panishJ@merican War o ,., World War II ,.,." Bukden incident ,.,.( .lei%it> incident ,.,.) Winter War ,.,., :assa attack o ,.0 1old War ,.0." 3peration @'a9 ,.0.( 3peration =orth%oods 0 ;seudoAoperations 5 8spionage 6 8lections 7 1ivilian usage o 7." $usinesses o 7.( ;olitical campaigning o 7.) Ideological o 7., &errorism D Dirty War "F *ee also o "F." 1oncepts o "F.( 89amples "" =otes

2a!al 1arfare[edit]
&his practice is considered acceptable in naval %arfare, provided the false flag is lo%ered and the national flag raised before engaging in battle.!"# @u9iliary cruisers operated in such a fashion in both World Wars, as did ZAships, %hile merchant vessels %ere encouraged to use false flags for protection. &he "D", $attle of &rindade %as bet%een the au9iliary cruisers

4B* Carmania and *B* Cap %rafalgar, in %hich the *B* 1ap &rafalgar had been altered to look like the 4B* 1armania. 3ne of the most notable e9amples %as in World War II %hen the .erman commerce raider Kormoran, disguised as a Dutch merchant ship, surprised and sank the @ustralian light cruiser ?B@* S dne in "D,", causing the greatest recorded loss of life on an @ustralian %arship. &he Kormoran %as also fatally crippled in that encounter and its cre% %as captured, but it %as a considerable psychological victory for the .ermans.!(# &he $ritish used a :riegsmarine ensign in the *t =a>aire 4aid and captured a .erman code book. &he old destroyer Camp'eltown, %hich the $ritish planned to sacrifice in the operation, %as provided %ith cosmetic modifications, cutting the ship/s funnels and chamfering the edges to resemble a .erman Bv%eAclass destroyer. &he $ritish %ere able to get %ithin t%o miles () km of the harbour before the defences responded, %here the e9plosiveArigged Camp'eltown and commandos successfully disabled or destroyed the key dock structures of the port.!)#!,#

Air 1arfare[edit]
In December "D((JFebruary "D(), 4ules concerning the 1ontrol of Wireless &elegraphy in &ime of War and @ir Warfare, drafted by a commission of 'urists at the ?ague regulates:!0# @rt. ). @ military aircraft must carry an e9terior mark indicating its nationality and its military character. @rt. "D. &he use of false e9terior marks is forbidden. &his draft %as never adopted as a legally binding treaty, but the I141 states in its introduction on the draft that +&o a great e9tent, !the draft rules# correspond to the customary rules and general principles underlying treaties on the la% of %ar on land and at sea+,!5# and as such these t%o non controversial articles %ere already part of customary la%.!6#

0and 1arfare[edit]
In land %arfare, the use of a false flag is similar to that of naval %arfare. &he most %idespread assumption is that this practice %as first established under international humanitarian la% at the trial in "D,6 of the planner and commander of 3peration .reif, 3tto *kor>eny, by the military court at the Dachau &rials. In this trial, the court did not find *kor>eny guilty of a crime by ordering his men into action in @merican uniforms. ?e had passed on to his men the %arning of .erman legal e9perts, that if they fought in @merican uniforms, they %ould be breaking the la%s of %ar, but they probably %ere not doing so 'ust by %earing the uniform. During the trial, a number of arguments %ere advanced to substantiate this position and the .erman and 2.*. military seem to have been in agreement on it. In the transcript of the trial!7# it is mentioned that ;aragraph ,) of the Field Banual published by the War Department, 2nited *tates @rmy, on 3ctober ", "D,F, under the title +4ules of Cand Warfare+, says: +=ational flags, insignias and uniforms as a ruse J in practice it has been authori>ed to make use of these as a ruse. &he foregoing rule (@rticle () of the @nne9 of the IGth ?ague 1onvention , does not prohibit such use, but does prohibit their improper use. It

is certainly forbidden to make use of them during a combat. $efore opening fire upon the enemy, they must be discarded+. @lso &he @merican *oldiers/ ?andbook, %as -uoted by Defense 1ounsel and says: +&he use of the enemy flag, insignia, and uniform is permitted under some circumstances. &hey are not to be used during actual fighting, and if used in order to approach the enemy %ithout dra%ing fire, should be thro%n a%ay or removed as soon as fighting begins+. Wikisource has original te9t related to this article: *rotocol I of the Gene!a Con!ention &he outcome of the trial has been codified in the "D66 Protocol Additional to t$e 8ene(a Con(entions of 12 August 1;=; (;rotocol I : @rticle )6. J ;rohibition of perfidy ". It is prohibited to kill, in'ure, or capture an adversary by resort to perfidy. @cts inviting the confidence of an adversary to lead him to believe that he is entitled to, or is obliged to accord, protection under the rules of international la% applicable in armed conflict, %ith intent to betray that confidence, shall constitute perfidy. &he follo%ing acts are e9amples of perfidy: (a &he feigning of an intent to negotiate under a flag of truce or of a surrenderR (b &he feigning of an incapacitation by %ounds or sicknessR (c &he feigning of civilian, nonAcombatant statusR and (d &he feigning of protected status by the use of signs, emblems or uniforms of the 2nited =ations or of neutral or other *tates not ;arties to the conflict. (. 4uses of %ar are not prohibited. *uch ruses are acts %hich are intended to mislead an adversary or to induce him to act recklessly but %hich infringe no rule of international la% applicable in armed conflict and %hich are not perfidious because they do not invite the confidence of an adversary %ith respect to protection under that la%. &he follo%ing are e9amples of such ruses: the use of camouflage, decoys, mock operations and disinformation. @rticle )7. J 4ecogni>ed emblems ". It is prohibited to make improper use of the distinctive emblem of the red cross, red crescent or red lion and sun or of other emblems, signs or signals provided for by the 1onventions or by this ;rotocol. It is also prohibited to misuse deliberately in an armed conflict other internationally recogni>ed protective emblems, signs or signals, including the flag of truce, and the protective emblem of cultural property. (. It is prohibited to make use of the distinctive emblem of the 2nited =ations, e9cept as authori>ed by that 3rgani>ation. @rticle )D. J 8mblems of nationality ". It is prohibited to make use in an armed conflict of the flags or military emblems, insignia or uniforms of neutral or other *tates not ;arties to the conflict. (. It is prohibited to make use of the flags or military emblems, insignia or uniforms of adverse ;arties %hile engaging in attacks or in order to shield, favour, protect or impede military operations.

). =othing in this @rticle or in @rticle )6, paragraph " ( d , shall affect the e9isting generally recogni>ed rules of international la% applicable to espionage or to the use of flags in the conduct of armed conflict at sea.

As prete,ts for 1ar[edit]


&his section needs additional citations for !erification. ;lease help improve this article by adding citations to reliable sources. 2nsourced material may be challenged and removed. ?&a 2011@

.ranco3*russian War[edit]
3tto von $ismarck %aved a +red flag+ in front of the +gallic bull+ by reAediting a telegram from the ;russian :ing so that it appeared as though the :ing had insulted a French ambassador during a time of e9tremely tense FrenchA.erman international relations. &he telegram is kno%n as the 8ms Dispatch. It helped encourage the states to go to %ar.!D#!"F#

$usso3 1edish War[edit]


In "677, a head tailor of the 4oyal *%edish 3pera received an order to se% a number of 4ussian military uniforms that later %ere used in an e9change of gunfire at ;uumala, a *%edish outpost on the 4ussoA*%edish border, on June (6, "677. &he staged attack, %hich caused an outrage in *tockholm, %as to convince the 4iksdag of the 8states and to provide the *%edish king .ustav III %ith an e9cuse to declare a +defensive+ %ar on 4ussia. &his %as important since the king did not have constitutional right to start offensive %ar %ithout agreement of the estates %ho had already made clear that their acceptance %ould not be forthcoming.!""#

panish<American War[edit]
&he sinking of the 2** &aine on "0 February "7D7 in ?avana harbor %as initially thought to be caused by an e9ternal mine e9ploded under the ship. &his belief roused antiA*panish sentiment in the 2nited *tates and helped cataly>e the *panishJ@merican War later that same year. In "D"" an e9tensive study %as made of the %reck, and again an e9ternal mine %as believed to be the cause. In "D65 a team of naval e9plosive e9perts reAe9amined the earlier evidence and concluded that the likeliest cause of the sinking %as an internal e9plosion caused by spontaneous combustion of fuel coal stored in a bunker ne9t to a maga>ine holding more than 0 short tons (,.0 t of po%der charges for the guns.!"(# Despite this analysis, some observers believe that the e9plosion %as caused by a 2.*. agent for the purpose of angering the 2.*. populace and initiating the %ar %hich follo%ed. 1uban politician and former director of the national library 8liades @costa claims that +po%erful economic interests+ in the 2nited *tates %ere probably responsible not only for the sinking of the &aine but for the assassination of three "DthAcentury 2.*. presidents, beginning %ith @braham Cincoln.!")#

World War II[edit]


7ukden incident[edit]

&he Bukden incident in "D)" involved Japanese officers fabricating a prete9t for anne9ing Banchuria by blo%ing up a section of rail%ay.!citation needed# *i9 years later in "D)6 they falsely claimed the kidnapping of one of their soldiers in the Barco ;olo $ridge Incident as an e9cuse to invade 1hina proper.!citation needed# Glei1it- incident[edit] &he .lei%it> incident in "D)D involved 4einhard ?eydrich fabricating evidence of a ;olish attack against .ermany to mobili>e .erman public opinion for %ar, to establish casus belli, and to 'ustify the %ar %ith ;oland. &his, along %ith other false flag operations in 3peration ?immler, %ould be used to mobili>e support from the .erman population for the start of World War II in 8urope.!citation needed# Winter War[edit] In "D)D the 4ed @rmy shelled Bainila, a 4ussian to%n near the Finnish border. *oviet authorities blamed Finland for the attack and used the incident as a prete9t to start the Winter War four days later.!citation needed# =assa attack[edit] &he :assa attack in "D," involved the city of :assa, today :o]ice (*lovakia , %hich %as then part of ?ungary, being bombed by three unidentified planes of apparently *oviet origin. &his attack became the prete9t for the government of ?ungary to declare %ar on the *oviet 2nion.
!citation needed#

Cold War[edit]
#peration A6a,[edit] &he replacement of Iran/s @ngloA;ersian 3il 1ompany %ith five @merican oil companies and the "D0) Iranian coup d/Utat %as the conse-uence of the 2.*. and $ritishAorchestrated false flag operation, 3peration @'a9. 3peration @'a9 used political intrigue, propaganda, and agreements %ith Zash-ai tribal leaders to depose the democratically elected leader of Iran, Bohammed Bosadde-. Information regarding the 1I@Asponsored coup d/etat has been largely declassified and is available in the 1I@ archives.!",# #peration 2orth1oods[edit] &he planned, but never e9ecuted, "D5( 3peration =orth%oods plot by the 2.*. Department of Defense for a %ar %ith 1uba involved scenarios such as fabricating the hi'acking or shooting do%n of passenger and military planes, sinking a 2.*. ship in the vicinity of 1uba, burning crops, sinking a boat filled %ith 1uban refugees, attacks by alleged 1uban infiltrators inside the 2nited *tates, and harassment of 2.*. aircraft and shipping and the destruction of aerial drones by aircraft disguised as 1uban Bi.s.!"0# &hese actions %ould be blamed on 1uba, and %ould be a prete9t for an invasion of 1uba and the overthro% of Fidel 1astro/s communist government. It %as authored by the Joint 1hiefs of *taff, but then re'ected by ;resident John F. :ennedy. &he surprise discovery of the documents relating to 3peration =orth%oods %as a result of the comprehensive search for records related to the assassination of ;resident John F.

:ennedy by the @ssassination 4ecords 4evie% $oard in the midA"DDFs.!"5# Information about 3peration =orth%oods %as later publici>ed by James $amford.!"6#

*seudo3operations[edit]
;seudoAoperations are those in %hich forces of one po%er disguise themselves as enemy forces. For e9ample, a state po%er may disguise teams of operatives as insurgents and, %ith the aid of defectors, infiltrate insurgent areas.!"7# &he aim of such pseudoAoperations may be to gather short or longAterm intelligence or to engage in active operations, in particular assassinations of important enemies. ?o%ever, they usually involve both, as the risks of e9posure rapidly increase %ith time and intelligence gathering eventually leads to violent confrontation. ;seudoAoperations may be directed by military or police forces, or both. ;olice forces are usually best suited to intelligence tasksR ho%ever, military provide the structure needed to back up such pseudoAops %ith military response forces. @ccording to 2* military e9pert Ca%rence 1line ((FF0 , +the teams typically have been controlled by police services, but this largely %as due to the %eaknesses in the respective military intelligence systems.+

1harlemagne ;Uralte of ?aiti %as assassinated in "D"D, after checkpoints %ere passed by military disguised as guerrilla fighters &he *tate ;olitical Directorate (3.;2 of the *oviet 2nion set up such an operation from "D(" to "D(5. During 3peration &rust, they used loose net%orks of White @rmy supporters and e9tended them, creating the pseudoA+Bonarchist 2nion of 1entral 4ussia+ (B214 in order to help the 3.;2 identify real monarchists and antiA$olsheviks. @n e9ample of a successful assassination %as 2nited *tates Barine *ergeant ?erman ?. ?anneken leading a patrol of his ?aitian .endarmerie disguised as enemy guerrillas in "D"D. &he ;atrol successfully passed several enemy checkpoints in order to assassinate the guerilla leader 1harlemagne ;Uralte near .randeA4iviwreAduA=ord. ?anneken %as a%arded the Bedal of ?onor and %as commissioned a *econd Cieutenant for his deed. During the Bau Bau uprising in the "D0Fs, captured Bau Bau members %ho s%itched sides and specially trained $ritish troops initiated the pseudoAgang concept to successfully counter Bau Bau. In "D5F Frank :itson, (%ho %as later involved in the =orthern Irish conflict and is no% a retired $ritish .eneral , published 8angs and Counter-gangs, an account of his e9periences %ith the techni-ue in :enyaR information included ho% to counter gangs and

measures of deception, including the use of defectors, %hich brought the issue a %ider audience. @nother e9ample of combined police and military oversight of pseudoAoperations include the *elous *couts in former country 4hodesia (current Himbab%e , governed by %hite minority rule until "D7F. &he *elous *couts %ere formed at the beginning of 3peration ?urricane, in =ovember "D6), by Ba'or (later Cieutenant 1olonel 4onald 4eidADaly. @s all *pecial Forces in 4hodesia, by "D66 they %ere controlled by 13B3;* (1ommander, 1ombined 3perations 1ommander Cieutenant .eneral ;eter Walls. &he *elous *couts %ere originally composed of "(F members, %ith all officers being %hite and the highest rank initially available for @fricans being colour sergeant. &hey succeeded in turning appro9imately 7FF insurgents %ho %ere then paid by *pecial $ranch, ultimately reaching the number of ",0FF members. 8ngaging mainly in longArange reconnaissance and surveillance missions, they increasingly turned to offensive actions, including the attempted assassination of HI;4@ leader Joshua =komo in Hambia. &his mission %as finally aborted by the *elous *couts, and attempted again, unsuccessfully, by the 4hodesian *pecial @ir *ervice.!"D# *ome offensive operations attracted international condemnation, in particular the *elous *couts/ raid on a H@=C@ (Himbab%e @frican =ational Ciberation @rmy camp at =yad>onya ;ung%e, Bo>ambi-ue in @ugust "D65. H@=C@ %as then led by Josiah &ongogara. 2sing 4hodesian trucks and armored cars disguised as Bo>ambi-ue military vehicles, 7, scouts killed ",(7, people in the camp, the camp %as registered as a refugee camp by the 2nited =ations (2= . 8ven according to 4eidADaly, most of those killed %ere unarmed guerrillas standing in formation for a parade. &he camp hospital %as also set abla>e by the rounds fired by the *couts, killing all patients.!(F# @ccording to David Bartin and ;hyllis Johnson, %ho visited the camp shortly before the raid, it %as only a refugee camp that did not host any guerrillas. It %as staged for 2= approval.!("# @ccording to a "D67 study by the Directorate of Bilitary Intelligence, 57a of all insurgent deaths inside 4hodesia could be attributed to the *elous *couts, %ho %ere disbanded in "D7F.
!((#

If the action is a police action, then these tactics %ould fall %ithin the la%s of the state initiating the pseudo, but if such actions are taken in a civil %ar or during a belligerent military occupation then those %ho participate in such actions %ould not be privileged belligerents. &he principle of plausible deniability is usually applied for pseudoAteams. (*ee the above section Ca%s of %ar . *ome false flag operations have been described by Ca%rence 8. 1line, a retired 2* @rmy intelligence officer, as pseudoAoperations, or +the use of organi>ed teams %hich are disguised as guerrilla groups for longA or shortAterm penetration of insurgentAcontrolled areas.+ ;seudo 3perations should be distinguished, notes 1line, from the more common police or intelligence infiltration of guerrilla or criminal organi>ations. In the latter case, infiltration is normally done by individuals. ;seudo teams, on the other hand, are formed as needed from organi>ed units, usually military or paramilitary. &he use of pseudo teams has been a hallmark of a number of foreign counterinsurgency campaigns.+!"7# &he $asra/s 'ail incident is a recent e9ample of the use of false flag undercover operations in modern military operations: 3n *eptember "Dth (FF0 t%o agents from the british special forces opened fire on ira-i soldiers disguised as members of a local terrorist group. @ccording

to %itnesses , they %eren/t able to escape the area because the local authorities had enforced military checkpoints throughout the city. &he british *@* and the 2* army had to deploy combat helicopters and a do>en of armored vehicles in order to break into the 'ail and force the ira-i authorities to hand over their agents before they could reveal any classified information.!()# > !(,# > .!(0#

+spionage[edit]
See false flag penetrator. In espionage the term +false flag+ describes the recruiting of agents by operatives posing as representatives of a cause the prospective agents are sympathetic to, or even the agents/ o%n government. For e9ample, during the 1old War, several female West .erman civil servants %ere tricked into stealing classified documents by agents of the 8ast .erman Stasi intelligence service, pretending to be members of West .erman peace advocacy groups (the Stasi agents %ere also described as +4omeos,+ indicating that they also used their se9 appeal to manipulate their targets, making this operation a combination of the false flag and +honey trap+ techni-ues .!(5# &he techni-ue can also be used to e9pose enemy agents in one/s o%n service, by having someone approach the suspect and pose as an agent of the enemy. 8arl 8d%in ;itts, a ")Ayear veteran of the F$I and an attorney, %as caught %hen he %as approached by F$I agents posing as 4ussian agents.

It %as obvious that if the case %ere to be kept going a faked act of sabotage %ould have to be committed

< BI0 file on Butt and Jeff!(6#

$ritish intelligence officials in World War II allo%ed double agents to fireAbomb a po%er station and a food dump in the 2: to protect their cover, according to declassified documents. &he documents stated the agents took precautions to ensure they did not cause serious damage. 3ne of the documents released also stated: +It should be recognised that friends as %ell as enemies must be completely deceived.+!(6#

+lections[edit]
In (FF7 there %as a shooting against t%o minibuses driving along in a volatile area right on the border bet%een @bkha>ia and the republic of .eorgia. &he buses %ere carrying .eorgians %ho lived in @bkha>ia and %anted to cross the border so they could go and vote in the parliamentary election that day.

&he country had been e9periencing internal political turmoil for the last year, and in an attempt to calm the situation, president Bikheil *aakashvili moved for%ard both presidential and parliamentary elections. ?o%ever the presidential election in January that year %as strongly contested, %ith hundreds of thousands attending protest rallies. When the parliamentary election came up in Bay, the mood %as still tense. 3n mid day Bay (" the t%o minibuses came under attack %ith small arms and grenades, and though there %ere no casualties, three people %ere taken to a hospital in Hugdidi, %here president *aakashvili later arrived and %as filmed by &G at the patients/ bedside. In his comments on &G, %hich dominated the ne%s during election day, *aakashvili indicated that the attack had been an attempt to disrupt the election, implying that it had been @bkha> or 4ussian forces %ho had been behind it. &his provided for a favorable opportunity for the president to focus the nation/s attention on an e9ternal enemy, thereby leading attention a%ay from his domestic critics, as %ell as making use of his position as leader to rally the .eorgians around his candidates in the election. ?o%ever a 2nited =ations investigation!(7# later found, based on empty cartridges and the position of traces left by grenade launchers on the ground, that the attack had originated from a patch of land under control of .eorgians and %ith %eapons used by .eorgian forces, indicating that the attack had been staged. @ .eorgian investigative &G documentary later found!citation needed# that camera cre% from the governmentAfriendly channel 4ustavi ( had been in position %ith their e-uipment before the shooting took place.

Ci!ilian usage[edit]
While false flag operations originate in %arfare and government, they also can occur in civilian settings among certain factions, such as businesses, special interest groups, religions, political ideologies and campaigns for office.

Businesses[edit]
In business and marketing, similar operations are being employed in some public relations campaigns (see @stroturfing . &elemarketing firms practice false flag type behavior %hen they pretend to be a market research firm (referred to as +sugging+ . In some rare cases, members of an unsuccessful business %ill destroy some of their o%n property to conceal an unrelated crime (e.g. safety violations, embe>>lement, etc. but make it appear as though the destruction %as done by a rival company.

*olitical campaigning[edit]
;olitical campaigning has a long history of this tactic in various forms, including in person, print media and electronically in recent years. &his can involve %hen supporters of one candidate pose as supporters of another, or act as Vstra% menW for their preferred candidate to debate against. &his can happen %ith or %ithout the candidate/s kno%ledge. &he 1anuck letter is an e9ample of one candidate creating a false document and attributing it as coming from another candidate in order to discredit that candidate.

In (FF5, individuals practicing false flag behavior %ere discovered and +outed+ in =e% ?ampshire!(D#!)F# and =e% Jersey!)"# after blog comments claiming to be from supporters of a political candidate %ere traced to the I; address of paid staffers for that candidate/s opponent. 3n February "D, (F"", Indiana Deputy ;rosecutor 1arlos Cam sent a private email to Wisconsin .overnor *cott Walker suggesting that he run a +/false flag/ operation+ to counter the protests against Walker/s proposed restrictions on public employees/ collective bargaining rights. +If you could employ an associate %ho pretends to be sympathetic to the unions/ cause to physically attack you (or even use a firearm against you , you could discredit the unions,+ read the email. It %ent on to say that the effort +%ould assist in undercutting any support that the media may be creating in favor of the unions.+ &he press had ac-uired a court order to access all of Walker/s emails and Cam/s email %as e9posed. @t first, Cam vehemently denied it, but eventually admitted it and resigned.!)(#

Ideological[edit]
;roponents of political or religious ideologies %ill sometimes use false flag tactics. &his can be done to discredit or implicate rival groups, create the appearance of enemies %hen none e9ist, or create the illusion of organi>ed and directed opposition %hen in truth, the ideology is simply unpopular %ith society.

@ bomb threat forged by *cientology operatives In retaliation for %riting %$e Scandal of Scientolog , the 1hurch of *cientology stole stationery from author ;aulette 1ooper/s home and then used that stationery to forge bomb threats and have them mailed to a *cientology office. &he .uardian/s 3ffice also had a plan for further operations to discredit 1ooper kno%n as 3peration Freakout, but several *cientology operatives %ere arrested in a separate investigation and the plan failed.!))#

Aerrorism[edit]
False flag tactics %ere also employed during the @lgerian civil %ar, starting in the middle of "DD,. Death s-uads composed of D4* (DUpartement du 4enseignement et de la *UcuritU security forces disguised themselves as Islamist terrorists and committed false flag terror attacks. *uch groups included the 3J@C (3rganisation of Ioung Free @lgerians or the 3**4@ (*ecret 3rganisation for the safeguard of the @lgerian 4epublic !),# @ccording to 4oger Faligot and ;ascal :ropp ("DDD , the 3J@C %as reminiscent of +the 3rgani>ation of the French @lgerian 4esistance (34@F , a group of counterAterrorists created in December "D05 by the Direction de la surveillance du territoire (&erritorial *urveillance Directorate, or

D*& %hose mission %as to carry out terrorist attacks %ith the aim of -uashing any hopes of political compromise+.!)0# &he 4ussian apartment bombings in the 4ussian cities of $uynaksk, Bosco%, and Golgodonsk in *eptember "DDD %hich killed nearly )FF people, %as described by Iury Felshtinsky, @le9ander Citvinenko, David *atter, $oris :agarlitsky, Gladimir ;ribylovsky, @nna ;olitkovskaya, filmmaker @ndrei =ekrasov, investigator Bikhail &repashkin, 4ussian politician @le9ander Cebed as a false flag terrorist attack coordinated by the Federal *ecurity *ervice, the main domestic security agency of the 4ussian Federation.!)5#!)6#!)7#!)D#!,F#!,"#!,(#!,)#!,,#!,0#
!,5#

3n the night of February (6, "D)), the 4eichstag building %as set on fire. @t the urging of ?itler, ?indenburg responded the ne9t day by issuing an emergency decree +for the ;rotection of the people and the *tate+, %hich stated: +4estrictions on personal liberty, on the right of free e9pression of opinion, including freedom of the pressR on the rights of assembly and associationR and violations of the privacy of postal, telegraphic, and telephonic communications and %arrants for house searches, orders for confiscations as %ell as restrictions on property, are also permissible beyond the legal limits other%ise prescribed+ suspending key provisions of the .erman Weimar 1onstitution. &he -uestion of %ho actually started the 4eichstag fire is still often considered unkno%n and occasionally debated (%hile Dutch communist Barinus van der Cubbe %as convicted of the crime and e9ecuted, his conviction is not considered credible by many .

Dirt' War[edit]
Bain article: Dirty War During a "D7" intervie% %hose contents %ere revealed by documents declassified by the 1I@ in (FFF, former 1I@ and DI=@ agent Bichael &o%nley e9plained that Ignacio =ovo *ampol, member of 1342, an antiA1astro organi>ation, had agreed to commit the 1uban =ationalist Bovement in the kidnapping, in $uenos @ires, of a president of a Dutch bank. &he abduction, organi>ed by civilian *ID8 agents, the @rgentine intelligence agency, %as to obtain a ransom. &o%nley said that =ovo *ampol had provided si9 thousand dollars from the 1uban =ationalist Bovement, for%arded to the civilian *ID8 agents to pay for the preparation e9penses of the kidnapping. @fter returning to the 2*, =ovo *ampol sent &o%nley a stock of paper, used to print pamphlets in the name of +8rupo 4oIo+ (4ed .roup , an imaginary @rgentine Bar9ist terrorist organi>ation, %hich %as to claim credit for the kidnapping of the Dutch banker. &o%nley declared that the pamphlets %ere distributed in Bendo>a and 1Trdoba in relation %ith false flag bombings perpetrated by *ID8 agents, %hich had as their aim to accredit the e9istence of the fake .rupo 4o'o. ?o%ever, the *ID8 agents procrastinated too much, and the kidnapping ultimately %as not carried out.!,6#

ee also[edit]
Concepts[edit]

@gent provocateur $lack propaganda 1asus belli

1overt operation Front organi>ation Joe 'ob, a similar online concept Bimicry *tate terrorism =ational *ocialist 2nderground

+,amples[edit]
&his section does not cite an' references or sources. ;lease help improve this section by adding citations to reliable sources. 2nsourced material may be challenged and removed. ?August 2011@ Bloed* Bodem* 9er en %rouw (Flemish neoA=a>i group preparing false flag attacks $ologna massacre 1anuck letter 1elle ?ole *addam ?ussein and alAZaeda link allegations (4oots of Ira- %ar $ushA$lair memo 1I@ 3peration @'a9 (2nited *tates overthro%ing of Bohammed Bossade-, ;rime Binister of Iran, in "D0) 1I@ 3peration =orth%oods %as a ;lan to blame 1uba for a &errorist attack in order to get a prete9t for /'ustified/ War of aggression after 2*@ funded and organi>ed failed &errorist attack kno%n as 1I@ 3peration Bongoose. 1I@ ;$*2118** (2nited *tates 3peration for overthro%ing the @rben> government in .uatemala in "D0, 1I@ ;ro'ect 1herry ( 2nited *tates nonAstop assassination pro'ect to kill =orodom *ihanouk, ;rince, and later :ing of 1ambodia .lei%it> incident aka 3peration ?immler :ommandoverband Jaguar .erman army unit conducting deep reconnaissance in *oviet uniforms Cavon @ffair Israeli attempt to plant bombs in Western targets in 8gypt, in blaming @rab elements Bar9istACeninist ;arty of the =etherlands (fake party set up by the Dutch security service Basada @ction and Defense Bovement (French %hite supremacists, under the guise of a fake e9tremist Hionist movement, conducted bombings of @rab targets in France in an attempt to start a %ar bet%een French @rabs and Je%s. 3peration Ja-ue 4eichstag Fire, %hich led to the 4eichstag Fire Decree %hich suspended the Weimar 1onstitution until the end of the &hird 4eich *helling of Bainila by Joseph *talin and 2**4 in order to get prete9t for /'ustified/ %ar of aggression named Winter War *I* (BI5 3peration $oot (2: 3peration for overthro%ing of Bohammed Bossade-, ;rime Binister of Iran, in "D0) %ith @mericans !,7# *pecial @ctivities Division &he ;la>a Biranda $ombings in the ;hilippines, %hich led to Ferdinand Barcos/s suspension of the %rit of habeas corpus. &he strategy of tension in Italy during the "D6Fs, %hen rightA%ing Italian, *panish, .reek, and 1I@ agents caused various terrorist acts in Italy, %hich %ere publicly laid

to 1ommunist terrorist groups that %ere actually fakes, and to the 4ed $rigades %ho %ere actually innocent of these particular crimes

2otes[edit]
". % +the use of a false flag has al%ays been accepted as a legitimate ruse de guerre in naval %arfare, the true battle flag being run up immediately before engaging+ (&homas, 4osamund B., ed. ("DD) , %eac$ing 9t$ics1 8o(ernment et$ics, 1entre for $usiness and ;ublic, p. 7F, I*$= D67"76"7D"F), . (. % *-uires, =ick. +?B@* *ydney found off @ustralia/s %est coast+, &he &elegraph, (FF7AF)A"6. ). % .uinness World 4ecords ((FFD , p."00 ,. % Ioung, ; (8d ("D6) @tlas of the *econd World War (Condon: &he Bilitary $ook *ociety 0. % &he ?ague 4ules of @ir Warfare, "D((A"( to "D()AF(, this convention %as never adopted (backup site 5. % +4ules concerning the 1ontrol of Wireless &elegraphy in &ime of War and @ir Warfare. Drafted by a 1ommission of Jurists at the ?ague, December "D(( J February "D().: Introduction+. I141. 4etrieved December (F"F. 6. % .Tme>, Javier .uisSnde> ((F June "DD7 . +&he Ca% of @ir Warfare+. +nternational 4e(iew of t$e 4ed Cross &B ()() : ),6J5). doi:"F."F"6N*FF(F75F,FFFD"F60. 7. % *ource: Ca% 4eports of &rials of War 1riminals. 2nited =ations War 1rimes 1ommission. Gol. Ix, "D,D: &rial of 3tto *kor>eny and others .eneral Bilitary .overnment 1ourt of the 2.*. >one of .ermany @ugust "7 to *eptember D, "D,6 D. % http:NN%%%.britannica.comN8$checkedNtopicN("5D6"NFrancoA.ermanAWar "F. % ?o%ard, Bichael. &he FrancoA;russian War. =e% Iork: Dorset ;ress. "DDF !originally published in "D5"#. I*$= FA77F(DA,)(AD, page 00 "". % Battila ("D7) , p. ",(. "(. % +&he Destruction of 2** Baine+. D8;@4&B8=& 3F &?8 =@GI AA =@G@C ?I*&34I @=D ?84I&@.8 13BB@=D. 4etrieved =ovember "F, (F"(. "). % 4ohter, Carry (February ",, "DD7 . +?avana JournalR 4emember the BaineM 1ubans *ee an @merican ;lot 1ontinuing to &his Day+. =e% Iork &imes. 4etrieved =ovember "F, (F"(. ",. % :in>er, *tephenR John Wiley and *ons ((FF) . +@ll the *hah/s Ben: @n @merican 1oup and the 4oots of Biddle 8ast &error (2 +. )ournal of t$e American +ntelligence Professional 4B: (07. 4etrieved (FF6AF(AF,. "0. % 89cerpts from declassified "D5( 2.*. Joint 1hiefs of *taff Bemo +3peration =orth%oods: Justification for 2.*. Bilitary Intervention in 1uba+ "5. % Inside the @ssassination 4ecords 4evie% $oard: &he 2.*. .overnment/s Final @ttempt to 4econcile the 1onflicting Bedical 8vidence in the @ssassination of JF:, Douglas ;. ?orne, 1hief @nalyst for Bilitary 4ecords, @ssassination 4ecords 4evie% $oard, (FFD, selfApublished through @ma>on.com "6. % James $amford ((FF( . Bod of Secrets1 Anatom of t$e .ltra-secret 5ational Securit Agenc . @nchor $ooks. pp. 7(JD". "7. L a b 1line, Ca%rence 8. ((FF0 Pseudo /perations and Counterinsurgenc 1 !essons from ot$er countries, *trategic *tudies Institute. "D. % 1line ((FF0 , p. "".

(F.

% 1line ((FF0 , -uoting 4eidADaly, Pamwe C$ete1 %$e !egend of t$e Selous Scouts, Weltevreden ;ark, *outh @frica: 1ovosADay $ooks, "DDD, p. "F (republished by 1ovos Day, (FF", I*$= D67A"AD"D76,A))A) (". % 1line ((FF0 , %ho -uotes David Bartin and ;hyllis Johnson, %$e Struggle for 7im'a'we1 t$e C$imurenga 3ar, =e% Iork: Bonthly 4evie% ;ress, "D7", pp. (,"J(,(. ((. % 1line ((FF0 , p. 7J"). For "D67 study, -uotes J. :. 1illiers, Counterinsurgenc in 4$odesia, Condon: 1room ?elm, "D70, pp. 5FJ66. 1line also -uotes Ian F. W. $eckett, %$e 4$odesian Arm 1 Counter-+nsurgenc 1;62C1;6; at selousscouts (). % http:NN%%%.guardian.co.ukN%orldN(FF0NsepN(FNira-.military (,. % http:NN%%%.nytimes.comN(FF0NFDN(FNinternationalNmiddleeastN(Fira-.html (0. % http:NNarchives.laut'ournal.infoNaut'ourarchives.aspMarticleQ(,""Kno'Q(,, (5. % 1ra%ford, @ngus (Friday, (F Barch (FFD . +Gictims of 1old War /4omeo spies/+. BBC /nline. 4etrieved "F @pril (FFD. (6. L a b +$ritain /bombed itself to fool =a>is/+. BBC. (FF(AF(A(7. 4etrieved (FF7A ""AF,. (7. % +4eport of the *ecretaryA.eneral on the situation in @bkha>ia, .eorgia+. 2nited =ations *ecurity 1ouncil. (FF7AF6A(). 4etrieved (FF7AF7A(". (D. % *teele, @llison, +Bass staffer in D.C. poses as 'logger1 Bogus posts aimed at $is political opponent+, 1oncord Bonitor, *eptember (5, (FF5 (24C last accessed 3ctober (,, (FF5 . )F. % *aunders, @nne, FBass aide resigns after posing as opponent:s supporter onlineF, &he $oston .lobe, *eptember (5, (FF5 (24C last accessed 3ctober (,, (FF5 . )". % Biller, Jonathan, FBlog %$inks Aide to Kean Posted )a's At &enendezF, =e% Iork &imes, *eptember (", (FF5 (24C last accessed 3ctober (,, (FF5 . )(. % Bontopoli, $rian (Barch (0, (F"" . +Indiana prosecutor resigns for encouraging fake attack on Wisconsin governor+. CBS 5ews. )). % 2nited *tates of @merica v. Jane :ember, Borris $udlong, *entencing BemorandumR pp. ()J(0. ),. % Counis @ggoun and JeanA$aptiste 4ivoire ((FF, . #ranPalgQrie* crimes et mensonges d29tats, (FrancoA@lgeria, 1rimes and Cies of the *tates . 8ditions Ca DUcouverte. I*$= (A6F6"A,6,6A7. 89tract in 8nglish %ith mention of the 3J@C available here. )0. % Cuonis @ggoun and JeanA$aptiste 4ivoire, i'id., -uoting 4oger Faligot and ;ascal :43;, DS%* Police SecrRte, Flammarion, "DDD, p. "6,. )5. % Boris Kagarlitsk * a mem'er of t$e 4ussian @cademy of *ciences Institute of 1omparative ;olitics, %riting in the %eekly =ovaya .a>eta sa s t$at t$e 'om'ings in &oscow and elsew$ere were arranged ' t$e 84. )6. % David *atter J ?ouse committee on Foreign @ffairs )7. % Felshtinsky K ;ribylovsky (FF7, pp. "F0J""" )D. % Gideo on Iou&ube+n &emoriam Aleksander !it(inenko, Jos de ;utter, &egenlicht documentary G;43 (FF6, Bosco%, (FF, Intervie% %ith @nna ;olitkovskaya ,F. % 4ussian Federation: @mnesty International/s concerns and recommendations in the case of Bikhail &repashkin J @mnesty International ,". % $omb $lamed in Fatal Bosco% @partment $last, 4ichard 1. ;addock, Cos @ngeles &imes, *eptember "F, "DDD ,(. % @t least DF dead in Bosco% apartment blast, from staff and %ire reports, 1==, *eptember "F, "DDD

,). ,,.

% 8vangelista (FF(, p. 7" % Did ;utin/s @gents ;lant the $ombsM, Jamie Dettmer, Insight on the =e%s, @pril "6, (FFF. ,0. % XX&he consolidation of Dictatorship in 4ussiaXX by Joel B. 3stro%, .eorgil *atarov, Irina :hakamada p. D5 ,5. % Bc1ain decries +=e% authoritarianism in 4ussia+, =ovember ,, (FF) ,6. % Gisit by .uillermo =ovo *ampol to 1hile in "D65, " and (, on the =ational *ecurity @rchive %ebsite ,7. % .arret%ilson.com

Black bag operation


From Wikipedia, the free encyclopedia Jump to: navigation, search Black bag operations (or black bag 6obs are covert or clandestine surreptitious entries into structures to obtain information for human intelligence operations.!"# &his usually entails breaking and entering into denied areas. *ome of the tactics, techni-ues and procedures associated %ith black bag operations are: lock picking, safe cracking, key impressions, fingerprinting, photography, electronic surveillance (including audio and video surveillance , mail manipulation (flaps and seals , forgery, and a host of other related skills. &he term +black bag+ refers to the little black bag in %hich burglars carry their tools.!(# +&he 1I@ remains responsible for conducting these highly classified operations overseas, %hile the Federal $ureau of Investigation (F$I performs the e9act same function inside the 2.*. and its territories.+!(#

Contents
!hide#

" 2se by the F$I ( 2se by the 1I@ ) 2se by other governments , *ee also 0 4eferences 5 89ternal links

"se b' the .BI[edit]


In black bag operations, Federal $ureau of Investigation (F$I agents illegally entered offices of targeted individuals and organi>ations, and photographed information found in their records. &his practice %as used by the F$I from "D,( until "D56. In July "D55, F$I Director J. 8dgar ?oover ordered the practice discontinued.!)# &he use of +black bag 'obs+ by the F$I %as declared unconstitutional by the 2nited *tates *upreme 1ourt on "D June "D6( in the ;lamondon case, .nited States (. ..S. District Court, ,F6 2.*. (D6. &he F$I still carries out numerous +black bag+ entryAandAsearch missions, in %hich the search is covert and the target of the investigation is not informed that the search took place. If the investigation involves a

criminal matter a 'udicial %arrant is re-uiredR in national security cases the operation must be approved by a secret body called the Foreign Intelligence *urveillance 1ourt.!,#

"se b' the CIA[edit]


&he 1I@ has used blackAbag operations to steal cryptography and other secrets from foreign government offices outside the 2nited *tates. &he practice dates back at least as far as "D"5.!(#

"se b' other go!ernments[edit]


&he $ritish, Israeli, 4ussian, and other intelligence agencies are kno%n to use blackAbag operations to steal secrets. When the techni-ue is used to obtain codes it may be called $lackA bag cryptanalysis.

ee also[edit]

$lack operation 13I=&8C;43

$eferences[edit]
". % +&allinn government surveillance cameras reveal black bag operation+. +ntelnews. "5 December (FF7. 4etrieved ) December (F"(. (. L a b c +&he 1I@ 1ode &hief Who 1ame in from the 1old+. matt$ewald.com. 4etrieved ) December (F"(. ). % Federal $ureau of Investigation A Freedom of Information ;rivacy @ct ,. % 4ood, Justin ("0 June (FF6 . +F$I to $oost u$lack $agX *earch 3ps+. ABC 5ews. 4etrieved ) December (F"(.

;eter Wright. Sp Catc$er1 %$e Candid Auto'iograp$ of a Senior +ntelligence /fficer. ;enguin 2*@, "D76. I*$= FA56FA7(F00A0.

+,ternal links[edit]

Warrantless *urreptitious 8ntries: F$I +$lack $ag+ $reakAins @nd Bicrophone Installations "" &erms 2sed by *pies at ?o%*tuffWorks < article e9plaining espionage terminology [sho1] ! t e

+spionage

[sho1] ! t e

Intelligence c'cle management


1landestine ?2BI=& (recruiting > operational techni-ues > 1overt action > Direct action > 1landestine cell system *pecial reconnaissance (organi>ations /uman 8spionage (@gent handling > @sset > $lack operation > Black bag operation > Intelligence 1oncealment device > 1ryptography > 1utAout > Dead drop > 8avesdropping > (/"7I2A) False flag > Industrial espionage > Intelligence assessment > Interrogation > =umbers station > 3neA%ay voice link > 3fficial cover > =onAofficial cover > 4esident spy > *teganography > *urveillance ignals *I.I=& by alliances, nations and industries > *I.I=& operational platforms Intelligence by nation > *I.I=& in modern history > &empest > Direction finding > &raffic ( IGI2A) analysis 7easurement and 8lectroAoptical > =uclear > .eophysical > 4adar > 4adiofre-uency > Baterials > ignature 1asualty estimation Intelligence (7A I2A) 3pen source intelligence (3*I=& > Imagery intelligence (IBI=& > .eospatial intelligence (.83I=& > Financial intelligence (FI=I=& > &echnical intelligence (&81?I=& > Barket intelligence (B@4:I=& 1ultural intelligence (12C&I=&

#thers

%$is .nited States go(ernmentCrelated article is a stu'. Dou can $elp 3ikipedia ' eHpanding it. %$is article related to t$e politics of t$e .nited States is a stu'. Dou can $elp 3ikipedia ' eHpanding it. %$is article relating to law in t$e .nited States* or its constituent Iurisdictions is a stu'. Dou can $elp 3ikipedia ' eHpanding it.

7easurement and signature intelligence


From Wikipedia, the free encyclopedia

Jump to: navigation, search &he lead section of this article ma' need to be re1rittenC &he reason given is: reads as a collection of fragmentsD contains opinions. ;lease discuss this issue on the talk page and read the layout guide to make sure the section %ill be inclusive of all essential details. ?&arc$ 2011@ 7easurement and signature intelligence (7A I2A is a branch of intelligence gathering activities. B@*I=&, may have aspects of intelligence analysis management, since certain aspects of B@*I=&, such as the analysis of electromagnetic radiation received by signals intelligence are more of an analysis techni-ue than a collection method. *ome B@*I=& techni-ues re-uire purposeAbuilt sensors. B@*I=& %as recogni>ed by the 2nited *tates Department of Defense as an intelligence discipline in "D75.!"#!(# B@*I=& is technically derived intelligence that<%hen collected, processed, and analy>ed by dedicated B@*I=& systems<results in intelligence that detects and classifies targets, and identifies or describes signatures (distinctive characteristics of fi9ed or dynamic target sources. In addition to B@*I=&, IBI=& and ?2BI=& can subse-uently be used to track or more precisely classify targets identified through the intelligence process. While traditional IBI=& and *I.I=& are not considered to be B@*I=& efforts, images and signals from other intelligenceAgathering processes can be further e9amined through the B@*I=& discipline, such as determining the depth of buried assets in imagery gathered through the IBI=& process. William :. Boore described the discipline: +B@*I=& looks at every intelligence indicator %ith ne% eyes and makes available ne% indicators as %ell. It measures and identifies battlespace entities via multiple means that are difficult to spoof and it provides intelligence that confirms the more traditional sources, but is also robust enough to stand %ith spectrometry to differentiate bet%een paint and foliage, or recogni>ing radar decoys because the signal lacks unintentional characteristics of the real radar system. @t the same time, it can detect things that other sensors cannot sense, or sometimes it can be the first sensor to recogni>e a potentially critical datum.+!)# It can be difficult to dra% a line bet%een tactical sensors and strategic B@*I=& sensors. Indeed, the same sensor may be used tactically or strategically. In a tactical role, a submarine might use acoustic sensors<active and passive sonar<to close in on a target or get a%ay from a pursuer. &hose same passive sonars may be used by a submarine, operating stealthily in a foreign harbor, to characteri>e the signature of a ne% submarine type. B@*I=& and technical intelligence (&81?I=& can overlap. @ good distinction is that a technical intelligence analyst often has possession of a piece of enemy e-uipment, such as an artillery round, %hich can be evaluated in a laboratory. B@*I=&, even B@*I=& materials intelligence, has to infer things about an ob'ect that it can only sense remotely. B@*I=& electroAoptical and radar sensors could determine the mu>>le velocity of the shell. B@*I=& chemical and spectroscopic sensors could determine its propellant. &he t%o disciplines are complementary: consider that the technical intelligence analyst may not have the artillery piece to fire the round on a test range, %hile the B@*I=& analyst has multispectral recordings of it being used in the field.

@s %ith many intelligence disciplines, it can be a challenge to integrate the technologies into the active services, so they can be used by %arfighters.!,#

Contents
!hide#

" 2nderstanding +measurement+ and +signature+ ( =ational and multinational o (." 1hina o (.( .ermany o (.) Italy o (., 4ussia o (.0 2nited :ingdom o (.5 2nited *tates (.5." B@*I=& from clandestinely placed sensors o (.6 Bultinational counterproliferation ) Bilitary applications o )." =onAcooperative target recognition o ).( 2nattended ground sensors o ).) 4esearch programs: *mart Dust and Wolf;ack , Disciplines 0 $asic interaction of energy sources %ith targets o 0." 1lasses of sensor 0."." ;assive sensing 0.".( @ctive sensors o 0.( Zuality of sensing o 0.) 1ueing 5 4eferences 6 89ternal links

"nderstanding ;measurement; and ;signature;[edit]


In the conte9t of B@*I=&, +measurement+ relates to the finite metric parameters of targets. +*ignature+ covers the distinctive features of phenomena, e-uipment, or ob'ects as they are sensed by the collection instrument(s . &he signature is used to recogni>e the phenomenon (the e-uipment or ob'ect once its distinctive features are detected.!"# B@*I=& measurement searches for differences from kno%n norms, and characteri>es the signatures of ne% phenomena. For e9ample, the first time a ne% rocket fuel e9haust is measured, it %ould be a deviation from a norm. When the properties of that e9haust are measured, such as its thermal energy, spectral analysis of its light (i.e., spectrometry , etc., those properties become a ne% signature in the B@*I=& database. B@*I=& has been described as a +nonAliteral+ discipline. It feeds on a target/s unintended emissive byproducts, or +trails+<the spectral, chemical or 4F emissions an ob'ect leaves behind. &hese trails form distinctive signatures, %hich can be e9ploited as reliable discriminators to characteri>e specific events or disclose hidden targets.+!0#

While there are speciali>ed B@*I=& sensors, much of the B@*I=& discipline involves analysis of information from other sensors. For e9ample, a sensor may provide information on a radar beam, collected as part of 8lectronics intelligence (8CI=& gathering mission. Incidental characteristics recorded such as the +spillover+ of the main beam (side lobes , or the interference its transmitter produces %ould come under B@*I=&. B@*I=& specialists themselves struggle %ith providing simple e9planations of their field.!5# 3ne attempt calls it the V1*IW of the intelligence community,!5# in imitation of the television series CS+1 Crime Scene +n(estigation. &his emphasi>es ho% B@*I=& depends on a great many sciences to interpret data. @nother possible definition calls it +astronomy e9cept for the direction of vie%.+!5# &he allusion here is to observational astronomy being a set of techni-ues that do remote sensing looking a%ay from the earth (contrasted %ith ho% B@*I=& employs remote sensing looking to%ard the earth . @stronomers make observations in multiple electromagnetic spectra, ranging through radio %aves, infrared, visible, and ultraviolet light, into the xAray spectrum and beyond. &hey correlate these multispectral observations and create hybrid, often VfalseA colorW images to give a visual representation of %avelength and energy, but much of their detailed information is more likely a graph of such things as intensity and %avelength versus vie%ing angle.

2ational and multinational[edit]


&here has been %ork on developing standardi>ed B@*I=& terminology and architecture in =@&3.!6# 3ther %ork addresses the disappointments of =onA1ooperative &arget 4ecognition. !7# For this function, infrared beacons (infrared B@*I=& proved disappointing, but millimeterA%ave recognition sho%s more promise. *till, cooperative, net%orkAbased position e9change may be crucial in preventing fratricide. &he bottom line is that B@*I=& cannot identify %ho is inside a tank or aircraft of interest. =umerous countries produce their o%n antisubmarine %arfare sensors, such as hydrophones, active sonar, magnetic anomaly detectors, and other hydrographic sensors that are fre-uently considered too +ordinary+ to be called B@*I=&.

China[edit]
1hina is not reported to be pursuing the more speciali>ed B@*I=& technologies,!D# although it does produce its antisubmarine sensors.

German'[edit]
Follo%ing the first successful launch on December "D, (FF5, about a year after the intended launch date, further satellites %ere launched at roughly si9Amonth intervals, and the entire system of this fiveAsatellite *@4 Cupe synthetic aperture radar constellation achieved full operational readiness on (( July (FF7.!"F#

Ital'[edit]

Italy and France are cooperating on the deployment of the dualAuse 3rfeo civilian and military satellite system.!""# 3rfeo is a dualAuse (civilian and military earth observation satellite net%ork developed 'ointly bet%een France and Italy. Italy is developing the 1osmoA*kymed xAband polarimetric synthetic aperture radar, to fly on t%o of the satellites.

$ussia[edit]
4ussia does have nonimaging infrared satellites to detect missile launches.!"(# 4ussia produces, of course, a %ide range of antisubmarine %arfare sensors.

"nited =ingdom[edit]
2: developed the first successful acoustic system, sound ranging to detect hostile artillery and antiAsubmarine acoustic detection in World War I. In the "DDFs and improved acoustic system for artillery location acoustic artillery location system %as introduced, %hich complements 1ounterAbattery radar.

"nited tates[edit]
Within the 2* Intelligence 1ommunity the Directorate of B@*I=& and &echnical 1ollections office of the Defense Intelligence @gency is the central agency for B@*I=&. &his %as formerly called the 1entral B@*I=& 3ffice. For education and research, there is the 1enter for B@*I=& *tudies and 4esearch of the @ir Force Institute of &echnology. 1learly, the =ational 4econnaissance 3ffice and =ational *ecurity @gency %ork in collecting B@*I=&, especially %ith military components. 3ther intelligence community organi>ations also have a collection role and possibly an analytic role. In "D5(, the 1entral Intelligence @gency, Deputy Directorate for 4esearch (no% the Deputy Directorate for *cience and &echnology , formally took on 8CI=& and 13BI=& responsibilities.!")# &he consolidation of the 8CI=& program %as one of the ma'or goals of the reorgani>ation. ... it is responsible for:

4esearch, development, testing, and production of 8CI=& and 13BI=& collection e-uipment for all @gency operations. &echnical operation and maintenance of 1I@ deployed nonAagent 8CI=& systems. &raining and maintenance of agent 8CI=& e-uipment &echnical support to the &hird ;arty @greements. Data reduction of @gencyAcollected 8CI=& signals. 8CI=& support peculiar to the penetration problems associated %ith the @gent/s reconnaissance program under =43. Baintain a -uick reaction capability for 8CI=& and 13BI=& e-uipment.

1I@/s 3ffice of 4esearch and Development %as formed to stimulate research and innovation testing leading to the e9ploitation of nonAagent intelligence collection methods. ... @ll nonA agent technical collection systems %ill be considered by this office and those appropriate for field deployment %ill be so deployed. &he @gency/s missile detection system, ;ro'ect !deleted# based on backscatter radar is an e9ample. &his office %ill also provide integrated

systems analysis of all possible collection methods against the *oviet antiballistic missile program is an e9ample.!")# It is not clear %here 8CI=& %ould end and B@*I=& %ould begin for some of these pro'ects, but the role of both is potentially present. B@*I=&, in any event, %as not formali>ed as a 2*A defined intelligence discipline until "D75. 7A I2A from clandestinel' placed sensors[edit] 1I@ took on a more distinct B@*I=& responsibility in "D76.!",# &he =ational *ecurity @rchive commented, +In "D76, Deputy Director for *cience and &echnology 8van ?ineman established ... a ne% 3ffice for *pecial ;ro'ects, concerned not %ith satellites, but %ith emplaced sensors<sensors that could be placed in a fi9ed location to collect signals intelligence or measurement and signature intelligence (B@*I=& about a specific target. *uch sensors had been used to monitor 1hinese missile tests, *oviet laser activity, military movements, and foreign nuclear programs. &he office %as established to bring together scientists from the D*K&Xs 3ffice of *I.I=& 3perations, %ho designed such systems, %ith operators from the Directorate of 3perations, %ho %ere responsible for transporting the devices to their clandestine locations and installing them. &he =ational .eospatialAIntelligence @gency, of course, plays a role in geophysical B@*I=&.

7ultinational counterproliferation[edit]
@ll nuclear testing, of any level, %as forbidden under the 1omprehensive &est $an &reaty (1&$& (%hich has not entered into force , but there is controversy over %hether the preparatory commission for the 1omprehensive =uclearA&estA$an &reaty 3rgani>ation (1&$&3 or the &reaty 3rgani>ation itself %ill be able to detect sufficiently small events. It is possible to gain valuable data from a nuclear test that has an e9tremely lo% yield, useless as a %eapon but sufficient to test %eapons technology. 1&$& does not recogni>e the threshold principle and assumes all tests are detectable. &he 1&$&3 runs an International Bonitoring *ystem (IB* of B@*I=& sensors for verification, %hich include seismic, acoustic, and radionuclide techni-ues. *ee =ational technical means of verification for a discussion of the controversies surrounding the ability of the IB* to detect nuclear tests.

7ilitar' applications[edit]
8ven though today/s B@*I=& is often on the edge of technologies, many of them under high security classification, the techni-ues have a long history. 1aptains of %arships, in the age of sail, used his eyes, and his ears, and sense of touch (a %etted finger raised to the bree>e to measure the characteristics of %ind and %ave. ?e used a mental library of signatures to decide %hat tactical course to follo% based on %eather. Bedieval fortification engineers %ould put their ear to the ground to obtain acoustic measurements of possible digging to undermine their %alls.

@coustic and optical methods for locating hostile artillery go back to the First World War. While these methods %ere replaced %ith radar for modern counterAbattery fire, there is a resurgence of interest in acoustic gunshot location against snipers and urban terrorists. *everal %arfighter applications areas are listed belo%R also see Deeply $uried *tructures.

2on3cooperati!e target recognition[edit]


B@*I=& could be of tactical use in +=onA1ooperative &arget 4ecognition+ (=1&4 so that, even %ith the failure of identification friend or foe (IFF systems, friendly fire incidents could be prevented.(Ives

"nattended ground sensors[edit]


@nother strong need %here B@*I=& may help is %ith unattended ground sensors (2.* .!"0# During the Gietnam War, 2.* did not provide the functionality desired in the Bc=amara Cine and 3peration Igloo White. &hey have improved considerably, but are still an additional capability for humans on the ground, not usually replacing people altogether. In the 2.*., much of the Igloo White technology came from *andia =ational Caboratories, %hich subse-uently designed the Bini Intrusion Detection *ystem (BID* family, and the 2.*. Barine 1orps/s @=N.*ZA(5" &actical 4emote *ensor *ystem (&4** . @nother ma'or 2.*. @rmy initiative %as the 4emotely Bonitored $attlefield *ensor *ystem (48B$@** , %hich it upgraded to Improved 48B$@** (I48B$@** , and no% is considering 48B$@** II. &he 48B$@** generations, for e9ample, increasingly intert%ine interconnections of infrared B@*I=&, Bagnetic B@*I=&, seismic B@*I=&, and acoustic B@*I=&. &he 2: and @ustralia also are interested in 2.*. &hales Defence 1ommunications, a division of French &hales and formerly 4acal, builds the 1overt Cocal @rea *ensor *ystem for Intruder 1lassification (1C@**I1 for use in )0 countries, including "( =@&3 members. @ustralia adopted the 1C@**I1 (FFF version, %hich, in turn, becomes part of the @ustralian =ino9 system, %hich also includes &e9tron *ystemsX &errain 1ommander surveillance system. 1C@**I1 has t%o kinds of sensors: 3ptical @coustic *atcom Integrated *ensor (3@*I* and @ir Deliverable @coustic *ensor (@D@* , as %ell as television cameras, thermal imagers, and lo%Alight cameras. @D@* sensors %ere in a 2.*. program, @rmy 4apid Force ;ro'ection Initiative advanced concept technology demonstration (@1&D , using 3@*I* acoustic sensors and central processing, but not the electroAoptical component. @D@* sensors are emplaced in clusters of three or four, for increased detection capability and for triangulation. &e9tron says that the @D@* acoustic sensors can track fi9edA%ing aircraft, helicopters, and 2@Gs as %ell as traditional ground threats. @1&D added 4emote Biniature Weather *tation (4BW* , from *ystem Innovations. &hese 4BW* measure temperature, humidity, %ind direction and speed, visibility and barometric pressure, %hich can then be sent over commercial or military satellite links. 8mploying 2.* is especially challenging in urban areas, %here there is a great deal more background energy and a need to separate important measurements from them. @coustic sensors %ill need to distinguish vehicles and aircraft from footsteps (unless personnel

detection is a goal , and things such as construction blasting. &hey %ill need to discriminate among simultaneous targets. Infrared imaging, for the urban environment, %ill need smaller pi9els. If either the targets or the sensor is moving, microAelectromechanical accelerometers %ill be needed.

$esearch programsE mart Dust and Wolf*ack[edit]


*till more of an 2.* research program, under D@4;@, is *mart Dust, %hich is a program for developing massively parallel net%orks of hundreds or thousand +motes,+ on the order of " mm). @nother D@4;@ program is Wolf;ack, a groundAbased electronic %arfare system. Wolf;ack is made up of a +pack+ of +%olves.+ Wolves are distributed electronic detection nodes %ith location and classification capability, %hich may use radiofre-uency B@*I=& techni-ues along %ith 8CI=& methods. &he %olves could be hand, artillery, or airdrop delivered. Wolf;ack may fit into an @ir Force program for a ne% subdiscipline of counterA8*B, as %ell as Distributed *uppression of 8nemy @ir Defenses (D*8@D , an enhancement on *8@D. If the Wolves are colocated %ith 'ammers or other 81B, and they are very close to the target, they %ill not need much po%er to mask the signatures of friendly ground forces, in fre-uencies used for communications or local detection. D*8@D %orks in a similar %ay, but at radar fre-uencies. It may be interesting to compare this counterA8CI=& discipline %ith 811B. Intelligence c'cle management Intelligence collection management 7A I2A 8lectroAoptical B@*I=& =uclear B@*I=& .eophysical B@*I=& 4adar B@*I=& Baterials B@*I=&

4adiofre-uency B@*I=&

Disciplines[edit]
B@*I=& is made up of si9 ma'or disciplines, but the disciplines overlap and intert%ine. &hey interact %ith the more traditional intelligence disciplines of ?2BI=&, IBI=&, and *I.I=&. &o be more confusing, %hile B@*I=& is highly technical and is called such, &81?I=& is another discipline, dealing %ith such things as the analysis of captured e-uipment. @n e9ample of the interaction is +imageryAdefined B@*I=& (IDB +. In IDB, a B@*I=& application %ould measure the image, pi9el by pi9el, and try to identify the physical materials, or types of energy, that are responsible for pi9els or groups of pi9els: signatures. When the signatures are then correlated to precise geography, or details of an ob'ect, the combined information becomes something greater than the %hole of its IBI=& and B@*I=& parts. @s %ith many branches of B@*I=&, specific techni-ues may overlap %ith the si9 ma'or conceptual disciplines of B@*I=& defined by the 1enter for B@*I=& *tudies and 4esearch,

%hich divides B@*I=& into 8lectroAoptical, =uclear, .eophysical, 4adar, Baterials, and 4adiofre-uency disciplines.!"5# @ different set of disciplines comes from DI@:!"6#

nuclear, chemical, and biological featuresR emitted energy (e.g., nuclear, thermal, and electromagnetic R reflected (reAradiated energy (e.g., radio fre-uency, light, and sound R mechanical sound (e.g., engine, propeller, or machinery noise R magnetic properties (e.g., magnetic flu9 and anomalies R motion (e.g., flight, vibration, or movement R and material composition.

&he t%o sets are not mutually e9clusive, and it is entirely possible that as this ne%ly recogni>ed discipline emerges, a ne% and more %idely accepted set %ill evolve. For e9ample, the DI@ list considers vibration. In the 1enter for B@*I=& *tudies and 4esearch list, mechanical vibrations, of different sorts, can be measured by geophysical acoustic, electroA optical laser, or radar sensors.

Basic interaction of energ' sources 1ith targets[edit]


4emote sensing depends on the interaction of a source of energy %ith a target, and energy measured from the target.!"7# In the +4emote *ensing+ diagram, *ource "a is an independent natural source such as the *un. *ource "b is a source, perhaps manmade, that illuminates the target, such as a searchlight or ground radar transmitter. *ource "c is a natural source, such as the heat of the 8arth, %ith %hich the &arget interferes.

4emote sensing<relationships bet%een radiation source, target and sensor &he &arget itself may produce emitted radiation, such as the glo% of a redAhot ob'ect, %hich *ensor ( measures. @lternatively, *ensor " might measure, as reflected radiation, the interaction of the &arget %ith *ource "a, as in conventional sunlit photography. If the energy comes from *ource "b, *ensor " is doing the e-uivalent of photography by flash. *ource )a is under the observer/s control, such as a radar transmitter, and *ensor )b can be tightly coupled to *ource ). @n e9ample of coupling might be that *ensor ) %ill only look for backscatter radiation after the speedAofAlight delay from *ource )a to the target and back to the position of *ensor )b. *uch %aiting for a signal at a certain time, %ith radar, %ould be an e9ample of electronic counterAcountermeasures (811B , so that a signal 'amming aircraft closer to *ensor )b %ould be ignored.

@ bistatic remote sensing s'stem %ould separate source )a from sensor )bR a multistatic system could have multiple pairs of coupled sources and sensors, or an uneven ratio of sources and sensors as long as all are correlated. It is %ell kno%n that bistatic and multistatic radar are a potential means of defeating lo%AradarAobservability aircraft. It is also a re-uirement, from operations personnel concerned %ith shallo% %ater!"D# operations. &echni-ues such as synthetic aperture have source )a and sensor )b colocated, but the sourceA sensor array takes multiple measurements over time, giving the effect of physical separation of source and sensor. @ny of the illuminations of the target (i.e., *ource "a, "b, or )a , and the returning radiation, can be affected by the atmosphere, or other natural phenomena such as the ocean, bet%een source and target, or bet%een target and sensor. 3bserve that the atmosphere comes bet%een the radiation source and the target, and bet%een the target and the sensor. Depending on the type of radiation and sensor in use, the atmosphere can have little interfering effect, or have a tremendous effect re-uiring e9tensive engineering to overcome. First, the atmosphere may absorb part of the energy passing through it. &his is bad enough for sensing if all %avelengths are affected evenly, but it becomes much more comple9 %hen the radiation is of multiple %avelengths, and the attenuation differs among %avelengths. *econd, the atmosphere may cause an other%ise tightly collimated energy beam to spread.

Classes of sensor[edit]
*ensing systems have five ma'or subcomponents:

*ignal collectors, %hich concentrate the energy, as %ith a telescope lens, or a radar antenna that focuses the energy at a detector *ignal detectors, such as chargeAcoupled devices for light or a radar receiver *ignal processing, %hich may remove artifacts from single images, or compute a synthetic image from multiple vie%s 4ecording mechanism 4ecording return mechanisms, such as digital telemetry from satellites or aircraft, e'ection systems for recorded media, or physical return of a sensor carrier %ith the recordings aboard.

B@*I=& sensors may be framing or scanning or synthetic. @ framing sensor, such as a conventional camera, records the received radiation as a single ob'ect. *canning systems use a detector that moves across the field of radiation to create a raster or more comple9 ob'ect. *ynthetic systems combine multiple ob'ects into a single one. *ensors may be passive or coupled to an active source (i.e., +active sensor+ . ;assive sensors receive radiation from the target, either from the energy the target emits, or from other sources not synchroni>ed %ith the sensor.

Bost B@*I=& sensors %ill create digital recordings or transmissions, but specific cases might use film recording, analog recording or transmissions, or even more speciali>ed means of capturing information. *assi!e sensing[edit] Figure +4emote *ensing .eometry+ illustrates several key aspects of a scanning sensor.

4emote sensing geometry<relationships bet%een scanning sensor and target &he instantaneous field of !ie1 (IF3G is the area from %hich radiation currently impinges on the detector. &he s1ath 1idth is the distance, centered on the sensor path, from %hich signal %ill be captured in a single scan. *%ath %idth is a function of the angular field of !ie1 (@F3G of the scanning system. Bost scanning sensors have an array of detectors such that the IF3G is the angle subtended by each detector and the @F3G is the total angle subtended by the array. *ush broom sensors either have a sufficiently large IF3G, or the scan moves fast enough %ith respect to the for%ard speed of the sensor platform, that an entire s%ath %idth is recorded %ithout movement artifacts. &hese sensors are also kno%n as sur!e' or 1ide field devices, comparable to %ide angle lenses on conventional cameras. Whisk broom or spotlight sensors have the effect of stopping the scan, and focusing the detector on one part of the s%ath, typically capturing greater detail in that area. &his is also called a close look scanner, comparable to a telephoto lens on a camera. ;assive sensors can capture information for %hich there is no %ay to generate manAmade radiation, such as gravity. .eodetic passive sensors can provide detailed information on the geology or hydrology of the earth. Acti!e sensors[edit] @ctive sensors are conceptually of t%o types, imaging and nonAimaging. 8specially %hen combining classes of sensor, such as B@*I=& and IBI=&, it can be hard to define if a given B@*I=& sensor is imaging or not. In general, ho%ever, B@*I=& measurements are mapped to pi9els of a clearly imaging system, or to geospatial coordinates kno%n precisely to the B@*I=& sensorAcarrying platform. In B@*I=&, the active signal source can be any%here in the electromagnetic spectrum, from radio %aves to xArays, limited only by the propagation of the signal from the source. xAray sources, for e9ample, must be in very close pro9imity to the target, %hile lasers can illuminate a target from a high satellite orbit. While this discussion has emphasi>ed the electromagnetic

spectrum, there are also both active (e.g., sonar and passive (e.g., hydrophone and microbarograph acoustic sensors.

Fualit' of sensing[edit]
*everal factors make up the -uality of a given sensor/s information ac-uisition, but assessing -uality can become -uite comple9 %hen the end product combines the data from multiple sensors. *everal factors, ho%ever, are commonly used to characteri>e the basic -uality of a single sensing system.

patial resolution defines the correspondence bet%een each recorded pi9el and the s-uare realA%orld area that the pi9el covers. pectral resolution is the number of discrete fre-uency (or e-uivalent bands recorded in an individual pi9el. 4emember that relatively coarse spectral resolution from one sensor, such as the spectroscopic analy>er that reveals a +bush+ is painted plaster, may greatly enhance the ultimate value of a different sensor %ith finer spectral resolution. $adiometric resolution is the number of levels of energy recorded, per pi9el, in each spectral band. Aemporal resolution describes the intervals at %hich the target is sensed. &his is meaningful only in synthetic imaging, comparison over a longer time base, or in producing fullAmotion imagery. Geospatial resolution is the -uality of mapping pi9els, especially in multiple passes, to kno%n geographic or other stable references.

Cueing[edit]
Cross3cueing is the passing of detection, geolocation and targeting information to another sensor %ithout human intervention.!(F# In a system of sensors, each sensor must understand %hich other sensors complement it. &ypically, some sensors are sensitive (i.e., %ith a lo% incidence of false negatives %hile others have a lo% incidence of false positives. @ fast sensitive sensor that covers a large area, such as *I.I=& or acoustic, can pass coordinates of a target of interest to a sensitive narro%band 4F spectrum analy>er for 8CI=& or a hyperspectral electroAoptical sensor. ;utting sensitive and selective, or other%ise complementary sensors, into the same reconnaissance or surveillance system enhances the capabilities of the entire system, as in the 4ocket Caunch *potter. When combining sensors, ho%ever, even a -uite coarse sensor of one type can cause a huge increase in the value of another, more fineAgrained sensor. For e9ample, a highly precise visibleAlight camera can create an accurate representation of a tree and its foliage. @ coarse spectral analy>er in the visible light spectrum, ho%ever, can reveal that the green leaves are painted plastic, and the +tree+ is camouflaging something else. 3nce the fact of camouflage is determined, a ne9t step might be to use imaging radar or some other sensing system that %ill not be confused by the paint. 1ueing, ho%ever, is a step before automatic target recognition, %hich re-uires both e9tensive signature libraries and reliable matching to it.

$eferences[edit]

L a b Interagency 3;*81 *upport *taff (I3** (Bay "DD5 , +*ection (, Intelligence 1ollection @ctivities and Disciplines+, /perations Securit +ntelligence %$reat "and'ook, retrieved (FF6A"FAF) (. % 2* @rmy (Bay (FF, . +1hapter D: Beasurement and *ignals Intelligence+. #ield &anual 2-0* +ntelligence. Department of the @rmy. 4etrieved (FF6A"FAF). ). % William :. Boore (JanuaryJBarch, (FF) . +B@*I=&: ne% eyes in the battlespace+. &ilitar +ntelligence Professional Bulletin. 4etrieved (FF6A"FAF). ,. % Ives, John W. (D @pril (FF( . +@rmy Gision (F"F: Integrating Beasurement and *ignature Intelligence+. 2* @rmy War 1ollege. 4etrieved (FF6A"FAF). 0. % Cum, Hachary (@ugust "DD7 . +&he measure of B@*I=&+. )ournal of 9lectronic Defense. 4etrieved (FF6A"FAF,. 5. L a b c 1enter for B@*I=& *tudies and 4esearch. +&o%ard a $etter Definition !of B@*I=&#+. @ir Force Institute of &echnology. $etterDef. @rchived from the original on @pril (5, (FF7. 4etrieved (FF6A"FAF). 6. % Beiners, :evin ((( Barch (FF0 . +=etA1entric I*4+ (;DF . =ational Defense Industrial @ssociation (=DI@ . 4etrieved (FF6A"FAF,. 7. % $ialos, Jeffrey ;.R *tuart C. :oehl. +&he =@&3 4esponse Force: Facilitating 1oalition Warfare &hrough &echnology &ransfer and *haring+ (;DF . 1enter for &ransatlantic 4elations and Funded by the 1enter for &echnology and =ational *ecurity ;olicy. @rchived from the original on December "", (FF5. 4etrieved (FF6A "FAF,. D. % Ce%is, James @. (January (FF, . +1hina as a Bilitary *pace 1ompetitor+ (;DF . 4etrieved (FF6A""A"5. "F. % !"# *paceflight no%<4adar reconnaissance spacecraft launched "". % Deagel.com (3ctober "D, (FF6 , Successful !aunc$ Second 8erman Sar!upe /'ser(ation Satellite, Deagel (FF6, retrieved (FF6A"FA"D "(. % Interagency 3;*81 *upport *taff (Bay "DD5 . +3perations *ecurity Intelligence &hreat ?andbook, *ection ), @dversary Foreign Intelligence 3perations+. "). L a b 1entral Intelligence @gency ("D5( , Deput Director for 4esearc$ (;DF , 1I@ADD4, retrieved (FF6A"FAF6 ",. % 1entral Intelligence @gency ("D50 , /rganization c$art* mission and functions of t$e /ffice of Special ProIects (;DF , retrieved (FF6A"FAF6 "0. % Bark ?e%ish (June (FF" . +4eformatting Fighter &actics+ (;DF . )ane:s +nternational Defense 4e(iew. 4etrieved (FF6A"FA"6. "5. % 1enter for B@*I=& *tudies and 4esearch, Center for &AS+5% Studies and 4esearc$, @ir Force Institute of &echnology, 1B*4, archived from the original on July 6, (FF6, retrieved (FF6A"FAF) "6. % 4au, 4ussell @, @ssistant @uditor .eneral, Defense Intelligence @gency (June )F, "DD6 , 9(aluation 4eport on &easurement and Signature +ntelligence, 4au "DD6, retrieved (FF6A"FA(" "7. % Beaden, .eoffery J.R :apetsky, James B. ("DD" , 8eograp$ical information s stems and remote sensing in inland fis$eries and aBuaculture. C$apter =1 4emote Sensing as a Data Source (J *cholar search , Beaden"DD", retrieved (FF6A"FA"0!dead link# "D. % =ational @cademy of *ciences 1ommission on .eosciences, 8nvironment and 4esources (@pril (DABay (, "DD" . +*ymposium on =aval Warfare and 1oastal 3ceanography+. =@*1.84AD". 4etrieved (FF6A"FA"6. (F. % $ergman, *teven B. (December "DD5 . %$e .tilit of " perspectral Data in Detecting and Discriminating Actual and Deco %arget Ge$icles (;DF . 2* =aval ;ostgraduate *chool. 4etrieved (FF6A"(AF(. ".

+,ternal links[edit]

@&I@<@dvanced &echnical Intelligence @ssociation (formerly B@*I=& @ssociation @&I1<@dvanced &echnical Intelligence 1enter for ?uman 1apital Development 1B*4<1enter for B@*I=& *tudies and 4esearch =1B4<=ational 1onsortium for B@*I=& 4esearch &he Intelligence 1ommunity in the ("st 1entury +@ &ale of &%o @irplanes+ by :ingdon 4. +:ing+ ?a%es, Ct 1ol, 2*@F (4et. Beasurement and signature intelligence 1iti>endium article [hide]

! t e

Intelligence c'cle management


1landestine ?2BI=& (recruiting > operational techni-ues > 1overt action > Direct action > 1landestine cell system *pecial reconnaissance (organi>ations /uman 8spionage (@gent handling > @sset > $lack operation > $lack Intelligence bag operation > 1oncealment device > 1ryptography > 1utAout > (/"7I2A) Dead drop > 8avesdropping > False flag > Industrial espionage > Intelligence assessment > Interrogation > =umbers station > 3neA %ay voice link > 3fficial cover > =onAofficial cover > 4esident spy > *teganography > *urveillance ignals *I.I=& by alliances, nations and industries > *I.I=& Intelligence Intelligence operational platforms by nation > *I.I=& in modern history > ( IGI2A) &empest > Direction finding > &raffic analysis collection management 7easurement and 8lectroAoptical > =uclear > .eophysical > 4adar > ignature 4adiofre-uency > Baterials > 1asualty estimation Intelligence (7A I2A) 3pen source intelligence (3*I=& > Imagery intelligence (IBI=& > .eospatial intelligence (.83I=& > Financial intelligence (FI=I=& > &echnical intelligence (&81?I=& > Barket intelligence (B@4:I=& 1ultural intelligence (12C&I=&

#thers

Intelligence Intelligence analysis > 1ognitive traps for intelligence analysis > Words of anal'sis 8stimative ;robability > @nalysis of 1ompeting ?ypotheses > Intelligence cycle management (targetAcentric approach Intelligence Intelligence cycle security > 1ounterintelligence > 1ounterAintelligence and

dissemination counterAterrorism organi>ations > Cist of counterintelligence organi>ations > management 1ounterintelligence failures

You might also like