The Spectacle of the False-Flag


Book Description

Eric Wilson's work poses crucial challenges to social theory, unsettling our understanding of the nature of the liberal democratic state. In The Spectacle of the False Flag, he urges the reader to examine the, often unconsidered, deep state practices that confound conventional notions of the state as monolithic or uniform. This compelling volume traces deep state conflicts and convergences through central cases in the development of American political economic power-JFK/Dallas, LBJ/Gulf of Tonkin, and Nixon/Watergate.Rigorously documented and unflinchingly analyzed, The Spectacle of the False Flag provides a stunning example of a new criminological practice-one that takes the state seriously, making the inner workings of the state rather than its effects the primary object of study. Drawing upon a wealth of historical records and developing the theoretical insights of Guy Debord's writings on spectacular society, Wilson offers a glimpse into a necessary criminology to come.




Disrupt and Deny


Book Description

In Disrupt and Deny, Rory Cormac tells the remarkable true story of Britain's secret scheming against its enemies, as well as its friends.




Regulating Covert Action


Book Description

Covert activity has always been a significant element of international politics. This book attempts to assess the lawfulness of covert action under US and international law and faces the implications for democratic states that covert operations pose.




American Covert Operations


Book Description

Traces our country's long history of covert and special operations, focusing on the similarities and differences in the practice from the Revolutionary War to the present. Long before the creation of the CIA, the American government utilized special intelligence strategies with varying degrees of success. Even though critics throughout time have questioned the effectiveness and legitimacy of these tactics, presidents from George Washington to Barack Obama have employed secret operations to benefit the nation's best interest. This book follows America's history of intelligence gathering, undercover operations, and irregular warfare. Through chronologically organized chapters, the author examines secret military maneuvers, highlighting the elements common to covert and special operations across historical eras, and concluding with a chapter on national security since the attacks of September 11, 2001.




American War Machine


Book Description

Scott explores the covert aspects of U.S. foreign policy. He presents compelling evidence to expose the extensive growth of sanctioned but illicit violence in politics and state affairs, especially when related to America's long-standing involvement with the global drug traffic.




Atrocity Speech Law


Book Description

This book is the first comprehensive study of the international law encompassing hate speech. Prof. Gordon provides a broad analysis of the entire jurisprudential output related to speech and gross human rights violations for courts, government officials, and scholars. The book is organized into three parts. The first part covers the foundation: a brief history of atrocity speech and the modern treatment of hate speech in international human rights treaties and judgments under international criminal tribunals. The second part focuses on fragmentation: detailing the inconsistent application of the charges and previous prosecutions, including certain categories of inflammatory speech and a growing doctrinal rift between the ICTR and ICTY. The last part covers fruition: recommendations on how the law should be developed going forward, with proposals to fix the problems with individual speech offenses to coalesce into three categories of offense: incitement, speech-abetting, and instigation.




How Governments Deceive You


Book Description

Governments play a crucial role in shaping societies, enacting policies, and making decisions that affect the lives of their citizens. While many governments work with transparency and integrity, there have been instances throughout history where deception and manipulation have been employed to achieve certain objectives. It is important to acknowledge that not all governments engage in deceptive practices, and this preface should not be interpreted as a blanket statement about all governing bodies. Instead, it aims to shed light on some historical and potential methods governments could use to deceive their citizens. Governments may deceive their citizens through various means, including: 1. **Propaganda:** Governments can use propaganda to control the narrative and shape public opinion. They may disseminate biased information or misleading narratives through state-controlled media, censorship, or manipulation of social media platforms to influence public perception. 2. **Censorship and Information Control:** By controlling the flow of information, governments can restrict access to certain facts or ideas that might challenge their authority or contradict their agenda. This can be done through internet censorship, media control, or limiting academic freedoms. 3. **Half-Truths and Spin:** Governments may present information selectively, emphasizing certain aspects of an issue while downplaying or omitting others to manipulate public perception and opinion. 4. **False Flags:** In some cases, governments may orchestrate or allow incidents to occur to manipulate public sentiment or justify certain actions. These "false flag" operations can create a sense of crisis and rally support for government actions that might otherwise be met with resistance. 5. **Surveillance and Privacy Concerns:** Governments may employ extensive surveillance measures, often justified in the name of national security, to monitor their citizens' activities. This can lead to concerns about privacy violations and potential misuse of collected data. 6. **Corruption and Bribery:** Instances of corruption within the government can lead to dishonest decision-making, with policies influenced by personal gain rather than the best interests of the citizens. 7. **Divide and Conquer Strategies:** Governments might exploit existing societal divisions, such as along ethnic, religious, or socio-economic lines, to maintain power by pitting different groups against each other. 8. **Scapegoating:** Governments may blame certain groups or individuals for societal problems to divert attention from their own shortcomings or to rally support for specific policies. 9. **Manipulation of Elections:** By tampering with electoral processes or engaging in voter suppression, governments can influence election outcomes and maintain their hold on power. 10. **Complex Legislation and Bureaucracy:** The use of complex legislation and bureaucratic processes can make it difficult for citizens to fully understand the implications of certain policies, making it easier for governments to pass controversial measures without widespread public scrutiny. It is essential for citizens to be vigilant and well-informed, questioning information sources, and demanding transparency and accountability from their governments. A robust civil society, free press, and active public engagement can act as safeguards against deception and misuse of power by those in authority.




Talking Conflict


Book Description

In today's information era, the use of specific words and language can serve as powerful tools that incite violence—or sanitize and conceal the ugliness of war. This book examines the complex, "twisted" language of conflict. Why is the term "collateral damage" used when military strikes kill civilians? What is a "catastrophic success"? What is the difference between a privileged and unprivileged enemy belligerent? How does deterrence differ from detente? What does "hybrid warfare" mean, and how is it different from "asymmetric warfare"? How is shell shock different from battle fatigue and PTSD? These are only a few of the questions that Talking Conflict: The Loaded Language of Genocide, Political Violence, Terrorism, and Warfare answers in its exploration of euphemisms, "warspeak," "doublespeak," and propagandistic terms. This handbook of alphabetically listed entries is prefaced by an introductory overview that provides background information about how language is used to obfuscate or minimize descriptions of armed conflict or genocide and presents examples of the major rhetorical devices used in this subject matter. The book focuses on the "loaded" language of conflict, with many of the entries demonstrating the function of given terms as euphemisms, propaganda, or circumlocutions. Each entry is accompanied by a list of cross references and "Further Reading" suggestions that point readers to pertinent sources for further research. This book is ideal for students—especially those studying political science, international relations, and genocide—as well as general readers.




NATO's Secret Armies


Book Description

This fascinating new study shows how the CIA and the British secret service, in collaboration with the military alliance NATO and European military secret services, set up a network of clandestine anti-communist armies in Western Europe after World War II. These secret soldiers were trained on remote islands in the Mediterranean and in unorthodox warfare centres in England and in the United States by the Green Berets and SAS Special Forces. The network was armed with explosives, machine guns and high-tech communication equipment hidden in underground bunkers and secret arms caches in forests and mountain meadows. In some countries the secret army linked up with right-wing terrorist who in a secret war engaged in political manipulation, harrassement of left wing parties, massacres, coup d'états and torture. Codenamed 'Gladio' ('the sword'), the Italian secret army was exposed in 1990 by Italian Prime Minister Giulio Andreotti to the Italian Senate, whereupon the press spoke of "The best kept, and most damaging, political-military secret since World War II" (Observer, 18. November 1990) and observed that "The story seems straight from the pages of a political thriller." (The Times, November 19, 1990). Ever since, so-called 'stay-behind' armies of NATO have also been discovered in France, Spain, Portugal, Germany, Belgium, the Netherlands, Luxemburg, Denmark, Norway, Sweden, Finland, Switzerland, Austria, Greece and Turkey. They were internationally coordinated by the Pentagon and NATO and had their last known meeting in the NATO-linked Allied Clandestine Committee (ACC) in Brussels in October 1990.




Russian 'Hybrid Warfare' and the Annexation of Crimea


Book Description

Western academics, politicians, and military leaders alike have labelled Russia's actions in Crimea and its follow-on operations in Eastern Ukraine as a new form of “Hybrid Warfare.” In this book, Kent DeBenedictis argues that, despite these claims, the 2014 Crimean operation is more accurately to be seen as the Russian Federation's modern application of historic Soviet political warfare practices-the overt and covert informational, political, and military tools used to influence the actions of foreign governments and foreign populations. DeBenedictis links the use of Soviet practices, such as the use of propaganda, disinformation, front organizations, and forged political processes, in the Crimea in 2014 to the Warsaw Pact invasion of Czechoslovakia in 1968 (the “Prague Spring”) and the earliest stages of the invasion of Afghanistan in 1979. Through an in-depth case study analysis of these conflicts, featuring original interviews, government documents and Russian and Ukrainian sources, this book demonstrates that the operation, which inspired discussions about Russian “Hybrid Warfare,” is in fact the modern adaptation of Soviet political warfare tools and not the invention of a new type of warfare.