False flag: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz mNo edit summary |
John Leach (talk | contribs) No edit summary |
||
Line 1: | Line 1: | ||
{{subpages}} | {{PropDel}}<br><br>{{subpages}} | ||
A '''false flag''' is a [[deception|deceptive]] technique where the manipulator leads others to believe he is the representative of a group they either admire or fear, in order to secure a benefit for his own cause, symbolically represented by a national flag. It can be applied in military, civilian, and clandestine contexts (e.g., [[clandestine human-source intelligence]] and [[counterintelligence]]). False flags are common in Internet-based fraud, such as assuming the identity of the widow of a wealthy dictator. | A '''false flag''' is a [[deception|deceptive]] technique where the manipulator leads others to believe he is the representative of a group they either admire or fear, in order to secure a benefit for his own cause, symbolically represented by a national flag. It can be applied in military, civilian, and clandestine contexts (e.g., [[clandestine human-source intelligence]] and [[counterintelligence]]). False flags are common in Internet-based fraud, such as assuming the identity of the widow of a wealthy dictator. | ||
Revision as of 15:28, 5 March 2024
This article may be deleted soon. | ||
---|---|---|
A false flag is a deceptive technique where the manipulator leads others to believe he is the representative of a group they either admire or fear, in order to secure a benefit for his own cause, symbolically represented by a national flag. It can be applied in military, civilian, and clandestine contexts (e.g., clandestine human-source intelligence and counterintelligence). False flags are common in Internet-based fraud, such as assuming the identity of the widow of a wealthy dictator. In the strictly military context, it is a subset of ruses of war, defined by Article 35 of the 1977 Additional Protocols to the First Geneva Convention: to include camouflage, decoys, mock operations and misinformation.[1] References
|