« Global Control Matrix Revealed (Who Really Runs the World? Part II)FBI Entrapment Snares More Victims »

Another Foiled False Flag

May 10th, 2012

by Stephen Lendman

Wikipedia defines false or black flags as "covert operations designed to deceive the public in such a way that the operations appear as though they are being carried out by other entities."

"The name is derived from the military concept of flying false colors; that is: flying the flag of a country other than one’s own. False flag operations are not limited to war and counter-insurgency operations and can be used during peace-time." Big lies substitute for truth. Stories are fabricated. Media scoundrels promote them. At issue is heightening fear for planned policies. Pretexts are needed for militarism, imperial wars, and homeland repression. If and when people learn they were duped, it's too late to matter.

It's an American tradition. Incidents are strategically timed. Innocent victims suffer. So does everyone living under heightened national security state conditions.

Threats are manufactured. States of emergency are declared. Rule of law principles are discarded. Unchallenged dominance alone matters. Wars on humanity follow. Big lies facilitate them. False flags play their part.

Here we go again. This one's a sequel. Perhaps Hollywood blockbusters will follow, first the original plot, then the latest. More on the earlier one below.

On May 7, AP headlined "US: CIA thwarts new al-Qaida underwear bomb plot," saying:

Agents foiled "an ambitious plot by al-Qaida's affiliate in Yemen to destroy a US-bound airliner using a bomb with a sophisticated new design around the one-year anniversary of the killing of Osama bin Laden, The Associated Press has learned."

AP described an upgraded underwear bomb plot. Like the earlier one, it was "designed to be used in a passenger's underwear, but this time" US officials called it "more refined."

On May 7, the FBI issued a brief statement, saying:

"As a result of close cooperation with our security and intelligence partners overseas, an improvised explosive device (IED) designed to carry out a terrorist attack has been seized abroad."

"The FBI currently has possession of the IED and is conducting technical and forensics analysis on it. Initial exploitation indicates that the device is very similar to IEDs that have been used previously by al Qaeda in the Arabian Peninsula (AQAP) in attempted terrorist attacks, including against aircraft and for targeted assassinations."

"The device never presented a threat to public safety, and the US government is working closely with international partners to address associated concerns with the device."

"We refer you to the Department of Homeland Security, including the Transportation Security Administration, regarding ongoing security measures to safeguard the American people and the traveling public."

The device contained no metal. It's not clear if body scanners could have detected it. Officials said an alleged Yemen-based bomber hadn't yet picked a target or bought plane tickets. CIA agents seized the device before he had a chance. The suspect wasn't identified.

AP learned of the plot earlier but agreed to White House and CIA requests to delay publishing because intelligence operations were ongoing.

On May 8, the White House and FBI confirmed AP's report. Deputy national security council spokeswoman Caitlin Hayden said Obama knew last month. "The disruption of the IED plot underscores the necessity of remaining vigilant against terrorism here and abroad," she said.

"While the president was assured that the device did not pose a threat to the public, he directed the department of homeland security and law enforcement and intelligence agencies to take whatever steps necessary to guard against this type of attack," she added.

Department of Homeland Security (DHS) spokesman Matt Chandler said:

The latest plot "demonstrates our adversaries' interest in targeting the aviation sector." Protective "layers" are thus used.

They "include threat and vulnerability analysis, prescreening and screening of passengers using the best available technology, random searches at airports, federal air marshal coverage, and additional security measures both seen and unseen."

"It's not clear who built the bomb," AP reported. Authorities "suspect it was the work of master bomb maker Ibrahim Hassan al-Asiri." A Saudi citizen, he's one of their most wanted. Earlier he was imprisoned and released.

He's reportedly in Yemen with his brother Abdullah. He's another Saudi most wanted. Washington claims they're both Al Qaeda connected. He's blamed for earlier bomb plots.

On March 24, 2011, the State Department included Ibrahim on its terrorist watch list. He's also on an Interpol Orange Notice one. It "warns police and other international organizations about potential threats from disguised weapons, parcel bombs, or other dangerous materials."

Washington considers Yemen strategically important. It's mostly for its location near the Horn of Africa on Saudi Arabia's southern border, the Red Sea, and Bab el- Mandeb strait.

It's a key chokepoint separating Yemen from Eritrea. Around three million barrels of oil pass through it daily. The Gulf of Aden connects to the Indian Ocean. Since 2009, Obama waged drone war on the country. CIA and Special Forces operate on the ground. Death squads are deployed.

America's at war with Yemen without declaring it. Predator drones escalate killing. Media scoundrels say little. Yemen gets attention when foiled bomb plots are claimed. They're pretexts for stepped up measures there and at home.

Washington's targets are global. US citizens share risks with foreign ones. Waging war on humanity leaves no one safe. Everyone everywhere is fair game. Any place could erupt in free-fire zone violence. Anyone can be accused of terrorism or conspiracy to commit it.

America's hegemonic ambitions threaten humanity. Too few at home understand. Public ignorance and indifference let Washington get away with murder. It's a global killing machine to remove all challenges.

The Earlier Underwear Bomber False Flag

It was fake like the sequel. In December 2009, US officials claimed Nigerian citizen Umar Farouk Abdulmutallab traveled to Yemen, got Al Qaeda training, and explosive PETN chemicals.

Supposedly he tried using them to blow up an Amsterdam-Detroit-bound airliner on Christmas Day. In fact, he was a fall guy for a joint CIA/Mossad/India Research and Analysis Wing (RAW) false flag.

The same alliance staged coordinated 2008 Mumbai terror attacks. Dozens were killed and hundreds wounded. They also were behind former Pakistani Prime Minister Benazir Bhutto's 2007 assassination.

The same issue then remains US policy now. Destabilizing and balkanizing Pakistan is planned. It's also perhaps intended for Afghanistan and Libya. Iraq's already divided. Always it's for easier control and exploitation.

Abdulmutallab was a convenient patsy. He was used to facilitate America's war on Yemen. Britain denied him an entrance visa. His name was on a State Department terror watch list.

Yet he wasn't on a No Fly List. He paid cash for a one-way ticket to Detroit, checked no luggage, had a US visa but no passport, and was helped onboard by a "well-dressed Indian" gentleman (a RAW agent) to facilitate Washington's scheme to use him as a convenient dupe.

His PETN was virtually harmless. It was technically deficient, failed to go off properly, and had fire cracker strength. Following the incident, Washington's war on Yemen escalated and enhanced airport screening began. Full body scanners the ACLU calls "virtual strip search(es)" are used.

False flags create opportunities to advance America's imperium. They also facilitate its war on dissent. In May 2011, three key Patriot Act powers were extended for another four years. Little debate assured swift passage. As a result:

(1) Unlimited roving wiretaps continue unchecked.

(2) Section 215 pertains to alleged suspects. It authorizes government access to "any tangible item." They included financial records and transactions, student and medical records, phone conversations, emails, other Internet use, and whatever else Washington claims essential.

(3) Alleged suspect organizations and individuals can be surveilled, whether or not evidence links them to terrorism or complicity to commit it. In other words, police state powers to monitor anyone for any reason or none at all remain unchecked.

Racial profiling and waging war on Islam got boosts. Abdulmutallab benefitted Washington at his own expense. Expect the underwear bomb sequel to provide more.

Washington will take full advantage. Perhaps Obama has another war in mind.

A Final Comment

On May 8, The New York Times headlined "Rare Double Agent Disrupted Bombing Plot, US says."

Most likely it's double-dealing official lies and misreporting. According to Times-speak, a Saudi intelligence agent "infiltrated (a) terrorist group and volunteered for the mission, American and foreign officials said Tuesday."

Washington claims he provided an "innovative bomb" designed for "aviation attack." The Times reported the story without checking for reliability. If official sources say it, accounts follow true or false.

The agent is back in Saudi Arabia, The Times said. CIA agents were involved.

What's true or false isn't clear. What's certain is another false flag for reasons similar to previous ones. They repeat well-timed for strategic advantage.

They're manufactured to look real. Media scoundrels headline them. Most people don't know they've been had. The scam repeats because it works. No wonder America gets away with murder and much more.

-###-

Stephen Lendman lives in Chicago and can be reached at lendmanstephen@sbcglobal.net.

His new book is titled "How Wall Street Fleeces America: Privatized Banking, Government Collusion and Class War"

http://www.claritypress.com/Lendman.html

Visit his blog site at sjlendman.blogspot.com and listen to cutting-edge discussions with distinguished guests on the Progressive Radio News Hour on the Progressive Radio Network Thursdays at 10AM US Central time and Saturdays and Sundays at noon. All programs are archived for easy listening.

http://www.progressiveradionetwork.com/the-progressive-news-hour.

No feedback yet

Voices

Voices

  • Robert David Abstract: China is tiptoeing on a skinny line between global diplomacy and strategic duplicity. In its high-tech and often enigmatic handling of Israel, China has been unmasked as a crypto-Zionist force—quietly promoting Tel Aviv's…
  • Adam Parsons Like millions of other people, I was deeply saddened to hear of the passing of Pope Francis, one of the most vocal and humble advocates for sharing the world’s resources. Since assuming the throne of St Peter in 2013, the Pope championed…
  • Jewish Supremacy, Unit 8200, Israeli surveillance, Pegasus spyware, Palantir Technologies, predictive policing, NSO Group, cyber intelligence, Zionist AI, biometric ID, Silicon Valley Israel, global surveillance, COVID Green Pass, techno-zionism, algorithmic governance, predictive algorithms, Israeli tech exports, Windward AI, Frontex surveillance, Guardtime, VaccineGuard, data colonialism, algorithmic diaspora, military AI ethics, global digital control, Goyim Control
  • By Chris Spencer Behind every pastel app and gender audit lurks a panopticon in drag, baptizing surveillance in the language of care. I. The Pink Face of the Machine Let us be unequivocal: this is not your grandmother’s feminism. This is not the…
  • Tracy Turner Live to 100 Like Blue Zone Centenarians. Discover the 5 proven longevity secrets from the world's healthiest elders - from immune-boosting diets to stress-reducing rituals that add years to your life. Dedicated to the late Angel Kazuko…
  • By Tracy Turner Filed under: Surveillance, Empire, Technocracy and Statist Media Behind the hidden rooms of empire, where budgets are secret and acronyms speak like tongues, the real governance of the United States does not follow law but latency. The…
  • By Tracy Turner Inside the brutal rise of AI-powered empire-states—where warlords, machines, and memory collide from Gaza to Ukraine and beyond. Introduction: The Builders of the All-Seeing War Machine History’s final emperors will not ride into the…
  • Cathy Smith Act I: The Summoning The summons arrived the way it always does in the digital age: without ceremony and without soul. A little red dot. A cheerful ding. A command masquerading as a request: “We need a quick video to confirm you’re human.”…
  • A prophetic and theological critique of global surveillance systems through the lens of the Bible, Koran, and Torah. This article examines AI technologies like Project Lavender, Palantir, and predictive policing, contrasting them with the compassionate omniscience of El Roi—the God Who Sees. By invoking scripture, prophecy, and Orwellian warnings, it exposes the ethical and spiritual dangers of modern techno-authoritarianism.
  • Ned Lud Book I: The Image of the Beast “He had eyes like a flame of fire, and on his head were many crowns... And it was given unto him to make war with the saints, and to overcome them...” — Revelation 13:7, 19:12 "And he causeth all, both small and…
May 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31

  XML Feeds

Complete website engine
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi