CIA still planning false flag attacks against the United States.
The United States remains on alert for a possible terror attack, even though the 9/11 anniversary has come and gone without incident, Homeland Security Secretary Janet Napolitano said Tuesday.
“We consider it as an ongoing threat,” Napolitano said, testifying before a congressional panel. Napolitano and FBI director Robert Mueller appeared before the US Senate Homeland Security panel to discuss US vulnerability to terror threats 10 years after the September 11 attacks by Al-Qaeda.
Al-Qaeda is code for United States government planned false flag operations. These false flag attacks have been carried out by theAir Branch of the CIA Special Operations Group. The United States Air Force remains on alert for remote controlled aerial nuclear detonation vehicles manned by the CIA. They are watching closely for CIA MQ-1 Predator drones.
The MQ-1 Predator unmanned spy drone is used almost exclusively by the CIA Special Operations Group for spying, assassinations, strike missions and false flag attacks. They are unmarked and are responsible for the majority of civilians being killed in both Afghanistan and Pakistan.
National security law experts, inside the government and out, are in the middle of an intense debate over whether the remotely piloted attacks are legal. One leading law professor told Congress that the drone operators could be tried for “war crimes” – amounts to a program of targeted killing that violate the laws of war.
These CIA officers as well as any higher-level government officials who has authorized or directed these attacks are committing war crimes. Only the United States president authorizes such strikes, especially if the mission is inside a country that the US is not at war with – like Pakistan . That makes US president Obama guilty of committing war crimes.
Air Branch is the aviation wing of the CIA’s Special Activities Division (SAD). Their role is to fly covert missions in support of CIA operations. The CIA engages in covert missions at the request of the President of the United States.
The Department of Defense Dictionary of Military and Associated Terms (Joint Publication JP1-02), defines “covert operation” as “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.
A covert operation differs from a clandestine operation in that emphasis is placed on concealment of identity of sponsor rather than on concealment of the operation.” The United States Department of Defense definition has been used by the United States and NATO since World War II.
In a covert operation, the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means “hidden,” while covert means “deniable.”
Covert operations are employed in situations where openly operating against a target would be disadvantageous. These operations are generally illegal in the target state and are frequently in violation of the laws of the sponsoring country.
Operations may be directed at or conducted with allies and friends to secure their support for controversial components of foreign policy throughout the world. Covert operations may include sabotage, assassinations, support for coups d’état, or support for subversion. Tactics include the use of a false flag or front group.
False flag operations are covert operations which are designed to deceive the public in such a way that the operations appear as though they are being carried out by other entities.
The name is derived from the military concept of flying false colors; that is, flying the flag of a country other than one’s own. False flag operations are not limited to war and counter-insurgency operations, and have been used in peace-time.
In the 1931 Mukden incident, Japanese officers fabricated a pretext for annexing Manchuria by blowing up a section of railway. Six years later they falsely claimed the kidnapping of one of their soldiers in the Marco Polo Bridge Incident as an excuse to invade China proper.
In the Gleiwitz incident in August 1939, Reinhard Heydrich made use of fabricated evidence of a Polish attack against Germany to mobilize German public opinion and to fabricate a false justification for a war with Poland.
This, along with other false flag operations in Operation Himmler, would be used to mobilize support from the German population for the start of World War II in Europe.
On November 26, 1939 the Soviet Union shelled the Russian village of Mainila near the Finnish border. The Soviet Union attacked Finland four days afterwards, claiming the shelling to have been a Finnish military action.
Russia has agreed that the attack was initiated by the Soviets. Also, the nearest Finnish artillery pieces were well out of range of Mainila.
In 1953, the U.S. and British-orchestrated Operation Ajax used “false-flag” and propaganda operations against the formerly democratically elected leader of Iran, Mohammed Mosaddeq.
In 1954, Israel sponsored bombings against US and UK interests in Cairo aiming to cause trouble between Egypt and the West. This operation, later dubbed the Lavon Affair, cost Israeli defense minister Pinhas Lavon his job. Israel (where it is known as “The Unfortunate Affair”) finally admitted responsibility in 2005.
In 1962 the United States government planned a false-flag operation called Operation Northwoods, or Northwoods, that called for the Central Intelligence Agency (CIA) or other CIA operatives to commit genuine acts of terrorism in United States cities and elsewhere.
These acts of US government sponsored terrorism were to be blamed on Cuba in order to create public support for a war against Cuba, which had recently become communist under Fidel Castro. One part of the Operation Northwoods plan was to “develop a Communist Cuban terror campaign in the Miami area, in other Florida cities and even in Washington.”
Operation Northwoods included proposals for hijackings and bombingsfollowed by the introduction of phony evidence that would implicate the Cuban government. The plan stated:
“The desired resultant from the execution of this plan would be to place the United States in the apparent position of suffering defensible grievances from a rash and irresponsible government of Cuba and to develop an international image of a Cuban threat to peace in the Western Hemisphere.”
Several other proposals were included within the Operation Northwoods plan, including real or simulated actions against various U.S. military and civilian targets. The plan was drafted by the Joint Chiefs of Staff, signed by Chairman Lyman Lemnitzer and sent to the Secretary of Defense.
Although part of the U.S. government’s Cuban Project anti-communist initiative, Operation Northwoods was never officially accepted and the proposals included in the plan were never executed, a revised version of Operation Northwoods was ordered by US president George W Bush and executed on September 11, 2001 by the CIA’s Air Branch – CIA Special Activities Division (SAD).
The elite pilots of SAD Air Branch, many recruited from AFSOC and the 160th SOAR, as well as civilian aviation companies, are tasked with flying everything from small light aircraft to large transport planes. Roles of Air Branch include:
* covert insertion and extraction of CIA personnel* covert trasportation of sensitive cargo
* airborne surveillance / intelligence gathering
Air Branch Aircraft – Covert air assets available to SAD Air Branch pilots include:
* light aircraft* turboprop transport planes* jet airliners* helicopters
* MQ-1 Predator drones
Most CIA aircraft are usually registered to front companies – seemingly legitimate dummy corporations setup by the CIA.
Some of the actual aircraft known to be flown by the CIA include:
DHC-6 Twin Otter
Several Twin Otters are believed to be in Air Branch’s inventory. These twin-engine light aircraft are ideal transports for small SAD/SF teams due to their ability to land and takeoff from short, rough airstrips. DHC-6 aircraft with non-standard antenna arrays have been spotted in Afghanistan. These antenna indicate secure communications capability and a possible SIGINT fitment.
DCH-8 Dash 8
Like its smaller cousin, the DH-6, these Canadian-built twin-engine medium range turboprop transport planes have been spotted in Afghanistan sporting unusual attennas.
The L-100-30 is the civilian version of the C-130 Hercules transport plane.
Dassault Falcon 50
This jet, which masquerades as a private business flight, used by the CIA for the covert movement of terror suspects. These so-called ‘rendition flights’ caused controversy when they came to light in 2004.
Gulfstream Aerospace G-V Gulfstream V
As with the Dassault Falcon 50, this CIA business jet are tied to rendition flights.
This Boeing 737-7BC airliner is currently involved with transporting prisoners to various ‘interrogation’ centers around the world.
A military variant of the Boeing 757, used by Air Branch for the covert insertion and extraction of personnel, C-32Bs have been spotted making fast turnarounds at airports during various crisis around the globe. It’s believed that in February 2004 a C-32B was used to covertly fly kidnapped Jean-Bertrand Aristide, the deposed President Of Haiti, into exile in Africa.
This unmanned spy drone is used by the CIA Special Operations Group for spying, assassinations, strike missions and false flag attacks. A Predator in the air above Afghanistan, Pakistan or any U.S. city can be flown by an operator in Denver, USA via secure satellite remote control.
A set of sensors in a turret under its chin provide its spying capability whilst a laser-designator and 2 AGM-114 Hellfire missiles give it teeth. The CIA has recently retrofitted a number of their Predators drones with nukes, for false flag attacks in the United States. In the past CIA Predators have carried out strikes against resistance fighters and enemies of the United States government on several occasions.
Mil MI-8 / MI-17 ‘Hip’
The CIA often use Russian-built helicopters, such as MI-8/MI-17s, for covert operations. As these ubiquitous helicopters are usually commonplace in theater they create less attention than a tricked-out Black Hawk or MH-53 Pavelow and cannot be readily linked to US forces.
These helos are cheap to run and easier to find spare parts for when operating outside the US military logisitical chain. They are also one of the few military helicopters capable of operating over the mountains of Afghanistan.
On September 11, 2001 several types of CIA Air Branch aircraft assets were used in the attacks. The US government had the CIA airliners repainted to look like US commercial airlines. These aircraft were then flown via secure satellite remote control into the World Trade Centers by elite pilots of SAD Air Branch.
In an interview Oct. 12, 2001 with Lyric Wallwork Winik from Parade Magazine, Donald Rumsfeld let it “slip” that a missile hit the Pentaon. Rumsfeld: “Here we’re talking about plastic knives and using an American Airlines flight filed with our citizens, and the missile to damage this building and similar (inaudible) that damaged the World Trade Center.”
The United States Code at 18 U.S.C. § 2381 states “whoever, owing allegiance to the United States, levies war against them or adheres to their enemies, giving them aid and comfort within the United States or elsewhere, is guilty of treason and shall suffer death, or shall be imprisoned not less than five years and fined under this title but not less than $10,000; and shall be incapable of holding any office under the United States.”
At the federal level, Article Two of the United States Constitution (Section 4) states that “The President, Vice President, and all other civil Officers of the United States shall be removed from Office on Impeachment for, and Conviction of,Treason, Bribery, or other High Crimes and Misdemeanors.”