"Weird Signals" <email@example.com>
Subject: Weird Signals Perfidy, False Flag, Pseudo, Sporgery
Date: March 5th 2014
[source: "The Uncolored Manual" pgs. 39451-3]
Article 37. – Prohibition of perfidy
(a) The feigning of an intent to negotiate under a flag of truce or of a surrender; (b) The feigning of an incapacitation by wounds or sickness; (c) The feigning of civilian, non-combatant status; and (d) The feigning of protected status by the use of signs, emblems or uniforms of the United Nations or of neutral or other States not Parties to the conflict.
2. Ruses of war are not prohibited. Such ruses are acts which are intended to mislead an adversary or to induce him to act recklessly but which infringe no rule of international law applicable in armed conflict and which are not perfidious because they do not invite the confidence of an adversary with respect to protection under that law. The following are examples of such ruses: the use of camouflage, decoys, mock operations and misinformation.
Pseudo-operations are those in which forces of one power disguise themselves as enemy forces. For example, a state power may disguise teams of operatives as insurgents and, with the aid of defectors, infiltrate insurgent areas. Pseudo Operations should be distinguished, notes Cline, from the more common police or intelligence infiltration of guerrilla or criminal organizations. In the latter case, infiltration is normally done by individuals. Pseudo teams, on the other hand, are formed as needed from organized units, usually military or paramilitary. The use of pseudo teams has been a hallmark of a number of foreign counterinsurgency campaigns.
In 1968 the Black Panther Coloring Book began circulating in the United States; the book features black men and children killing pigs dressed as police officers. It was argued to have been made not by the Black Panther Party but by the Federal Bureau of Investigation's COINTELPRO program to discredit the organization, a claim which other sources dispute.
While false flag operations originate in warfare and government, they also can occur in civilian settings among certain factions, such as businesses, special interest groups, religions, political ideologies and campaigns for office.
The name "joe job" originated from such a spam attack on Joe Doll, webmaster of joes.com, in 1997. One user's joes.com account was removed due to advertising through spam. In retaliation, the user sent another spam with the "reply-to" headers forged to make it appear to be from Joe Doll. Besides prompting angry replies, it also caused joes.com to fall prey to denial-of-service attacks that temporarily took the web site down, from antispam vigilantes who thought he had sent the email.
Sporgery resembles crapflooding, which is also intended to disrupt a forum. However, sporgery is not merely disruptive but also deceptive or libellous -- it involves falsifying objectionable posts so they appear to come from newsgroup regulars. The purpose is not merely to jam the forum, but also to sully the reputations of its regular users by falsely signing their names to offensive posts.
Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.
| Archive Index |
Next: Weird Signals - polyps >>