{"id":27707,"date":"2017-11-07T07:53:53","date_gmt":"2017-11-07T12:53:53","guid":{"rendered":"http:\/\/olduvai.ca\/?p=27707"},"modified":"2017-11-07T07:53:53","modified_gmt":"2017-11-07T12:53:53","slug":"false-flags-are-so-common-that-u-s-officials-commonly-discuss-them","status":"publish","type":"post","link":"https:\/\/olduvai.ca\/?p=27707","title":{"rendered":"\u201cFalse Flags\u201d Are So Common that U.S. Officials Commonly Discuss Them"},"content":{"rendered":"<h3 class=\"entry-title\"><a href=\"http:\/\/www.washingtonsblog.com\/2017\/11\/false-flags-common-u-s-officials-commonly-discuss.html\">\u201cFalse Flags\u201d Are So Common that U.S. Officials Commonly Discuss Them<\/a><\/h3>\n<div class=\"entry-content\">\n<p>Despite the attempt to marginalize the concept, \u201cfalse flags\u201d are so common that U.S. officials <em>frequently<\/em>use that phrase.<\/p>\n<p>For example, Colonel <a title=\"Lawrence Wilkerson\" href=\"https:\/\/en.wikipedia.org\/wiki\/Lawrence_Wilkerson\" target=\"_blank\" rel=\"noopener\">Lawrence Wilkerson<\/a>, former chief of staff to Colin Powell:<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/archive.org\/embed\/CURRENT_20130502_230000_The_Young_Turks_With_Cenk_Uygur?start=1093&amp;end=1153\" width=\"780\" height=\"585\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>Former Director for Transnational Threats on the U.S. National Security Council, <a title=\"Roger Cressey\" href=\"https:\/\/en.wikipedia.org\/wiki\/Roger_Cressey\" target=\"_blank\" rel=\"noopener\">Roger Cressey<\/a>:<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/archive.org\/embed\/CNBC_20100216_180000_Power_Lunch?start=1140&amp;end=1200\" width=\"780\" height=\"585\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>Former CIA counterterrorism official <a title=\"Philip Mudd\" href=\"http:\/\/www.philmudd.com\/bio.html\" target=\"_blank\" rel=\"noopener\">Philip Mudd<\/a>:<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/archive.org\/embed\/CNNW_20170307_210000_The_Lead_With_Jake_Tapper?start=2520&amp;end=2580\" width=\"780\" height=\"585\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>Lieutenant General <a title=\"Thomas McInerney\" href=\"https:\/\/en.wikipedia.org\/wiki\/Thomas_McInerney\" target=\"_blank\" rel=\"noopener\">Thomas McInerney<\/a>, a high ranking Air Force official:<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/archive.org\/embed\/FBC_20170103_210000_After_the_Bell?start=2220&amp;end=2280\" width=\"780\" height=\"585\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>Former U.S. Ambassador to the United Nations (and Neocon warmonger) <a title=\"John Bolton\" href=\"https:\/\/en.wikipedia.org\/wiki\/John_R._Bolton\" target=\"_blank\" rel=\"noopener\">John Bolton<\/a>:<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/archive.org\/embed\/FOXNEWSW_20161212_100000_Fox_and_Friends_First?start=2041&amp;end=2101\" width=\"780\" height=\"585\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>The Washington Post <a title=\"notes\" href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/articles\/A29742-2004Jun9.html\" target=\"_blank\" rel=\"noopener\">notes<\/a> that Secretary of Defense Donald Rumsfeld approved as an acceptable interrogation method<\/p>\n<blockquote><p>A technique known as \u201c<strong>false flag<\/strong>,\u201d or deceiving a detainee into believing he is being interrogated by someone from another country.<\/p><\/blockquote>\n<p>NBC News <a title=\"points out\" href=\"http:\/\/www.nbcnews.com\/news\/investigations\/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361\" target=\"_blank\" rel=\"noopener\">points out<\/a>:<\/p>\n<blockquote><p>In another document taken from the NSA by Snowden and obtained by NBC News, a JTRIG official said the unit\u2019s mission included computer network attacks, disruption, \u201cActive Covert Internet Operations,\u201d and \u201cCovert Technical Operations.\u201d Among the methods listed in the document were jamming phones, computers and email accounts and masquerading as an enemy in a<strong> \u201cfalse flag\u201d <\/strong>operation. The same document said GCHQ was increasing its emphasis on using cyber tools to attack adversaries.<\/p><\/blockquote>\n<p>Washington\u2019s Blog asked high-level NSA official Bill Binney* if he had heard of the term \u201cfalse flags\u201d when he was with the NSA.<\/p>\n<p>Binney responded:<\/p>\n<blockquote><p>Sure, they were under deception and manipulation programs.\u00a0 I was not involved in doing them; but, I did have to figure out some that the other side was doing.\u00a0 The other side called them \u201cdezsinformatsiya\u201d and Manipulatsiya.\u201d<br \/>\n<span id=\"more-69964\"><\/span><\/p>\n<p>The Brits have been doing this for several hundred years and are quite good at it.<\/p><\/blockquote>\n<p>Washington\u2019s Blog asked Philip Giraldi \u2013 a former counter-terrorism specialist and military intelligence officer with the CIA \u2013 the same question with regards to his experience with the CIA.<\/p>\n<p>&#8230;click on the above link to read the rest of the article&#8230;<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u201cFalse Flags\u201d Are So Common that U.S. Officials Commonly Discuss Them Despite the attempt to marginalize the concept, \u201cfalse flags\u201d are so common that U.S. officials frequentlyuse that phrase. For example, Colonel Lawrence Wilkerson, former chief of staff to Colin Powell: Former Director for Transnational Threats on the U.S. National Security Council, Roger Cressey: Former [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[5],"tags":[135,296,1511,577,844,865,5510],"class_list":["post-27707","post","type-post","status-publish","format-standard","hentry","category-geopolitics","tag-cia","tag-false-flag","tag-gchq","tag-nsa","tag-us-military","tag-washington","tag-washingtons-blog"],"_links":{"self":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/27707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27707"}],"version-history":[{"count":1,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/27707\/revisions"}],"predecessor-version":[{"id":27708,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/27707\/revisions\/27708"}],"wp:attachment":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=27707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=27707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}