Author Topic: Smoking Gun: Govt Admits False Flag Injects  (Read 10912 times)

0 Members and 1 Guest are viewing this topic.

Offline infowarrior_039

  • Member
  • *****
  • Posts: 789
  • explosions in the sky
    • Truth Archive
Smoking Gun: Govt Admits False Flag Injects
« on: July 13, 2011, 06:22:37 pm »
While researching various anti-terror disaster response drills conducted by various government agencies such as DHS, specifically the ExPlan drills used recently in National Level Exercise 2011, I discovered a "surprising" and revealing official policy regarding how staged response drills and exercises are to be carried out.

Section 4 describes the cover protocol for switching to exercise mode to real life.
I think this is a smoking gun document for all government staged terror attacks since the 1990's, including 9/11. This is HUGE.

Exercise Control
    Actual Emergencies

    All exercise participants shall immediately contact a member of the Exercise Control/Evaluators/and/or Safety Officers to report an emergency.

    The exercise will be suspended or terminated if an actual emergency occurs.
    This will be accomplished with the following radio transmission:


    All exercise participants will then report to their immediate supervisor at the scenario so that an accounting of personnel may be conducted.

    The Exercise Director will be responsible for making the decision to terminate or resume the scenario depending on the nature or severity of the emergency.

   Exercise Continuity

    The Exercise Design Team has developed control measures to ensure that the Exercise Objectives will be satisfied.  These control measures will be known as “injects”.

    An “Inject” is a “stimuli” that may be inserted into the scenario at a specific time to ensure an event will occur. The “inject” will assist the Exercise Management Team with the flow of the scenario.

     “Injects” will be used during each scenario of NOVEX 2006.  These injects will be inserted by the Exercise Control Staff at the appropriate time.
 Injects are listed by time, type, and anticipated result on the Master Scenario Events List (MSEL) which is located in the COSIN.


We know that on 9/11, multiple "injects" or "phantoms" where inserted as multiple blurps on radar screens at flight control and NORAD and NATO command centers.



Peter Power 7/7 Terror Rehearsal

Offline chris jones

  • Member
  • *****
  • Posts: 21,829
Re: Smoking Gun: Govt Admits False Flag Injects
« Reply #1 on: July 13, 2011, 08:25:27 pm »
 Injects. I feel certain they have teams of thinktakers coming up with the lables.
The gov loves to turn an op into a mass of unintellagable, multing meaning mumbo jumbo. Deniability.

   Were down the tube, why not just face it, we are finacial in the abyss, 5 wars continue, the pols, the Feds, the MSM, all the faces are in line feeding us BS, as the true takedown of thisn nation takes place.
  There are battalions of deep covers running around that will do whatever orders are in play,subject to no disclosure acts under penaltys, NSA. The DODand MIC are riding high, thriving on their skims and power, the FEd is beind treated like a demigod despite the recent hearings, no criminal charges gave been put into effect other than fines. The wars are in full swing desptite the contrary MSM BS, the cost the people a billion a day, 600,000 Iraqis have been lilled NYT. ¨6000 american troopers is the mariginalized Gov report, the bailouts are not resolved, Obama is stating he may have to put a hold on social cesurity recipients, unemployment officialy is 10%, though other statistics are higher.
  Act now, or we  go terminal, this is a disease, a infiltration of money-power grubbing mutants with the pretence of protection as their excuse.  My God, how long can this go on

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Smoking Gun: Govt Admits False Flag Injects
« Reply #2 on: July 13, 2011, 09:08:27 pm »
THANK YOU!!!!!!!!!!!!!!!!!!!!!!

Follow up research required for the following (those keywords contained in that document are a boondoggle for infowarriors!):

Please help sift through these...

M&S to Support MPO French Armed Forces Planning Process
(La simulation instrumente la méthode de planification opérationnelle)
Lionel Khimeche
Jean-Paul Bouche
Thales Communications
Fort d’Issy les Moulineaux
1 à 5, avenue Carnot
Délégation Générale pour l’Armement (DGA)
91883 Massy cedex
18, rue du Docteur Zamenhof
92131 Issy les Moulineaux cedex, France
Tel : +33 (0)169753588
Tel : +33 (0)141463631, Fax : +33 (0)141463314
Fax : +33 (0)169753176


CALIPSO (acronym for "Concepts avancés pour la connexion de la simulation avec les SIO") is a French MoD R&T program which aims to support M&S (Modeling and Simulation) army higher level commanders and staffs in generating CONOPS (Concept of Operations), OPLAN (Operational Plan) and OPORDs (Operational Orders) at Corps or HRF (High Readiness Forces) and Division level. The paper first introduces the RRC-FR (Rapid Reaction Corps - France), its organization and highlights cells which could better perform their activities by using M&S. At first glance, G5 responsible to provide CONOPS and OPLANs is the logical user. Furthermore, G3 and more specifically G35 in charge to produce OPORDs based on approved OPLAN and JEC (Joint Effect Center) responsible for targeting and 3D coordination are also candidates to take advantages of M&S.

In the second part, the paper presents the NATO OPP (Operational Planning Process) and explains how this process is consistent with the French MPO (Méthode de Planification Opérationnelle). It details the OPP different stages (Initiation, Orientation, Concept Development, Plan Development, Plan Review) and underlines where M&S could perform functions to aid operational planers.

The paper ends with major M&S requirements and technical solutions to support Head Quarter planning process. If the planners must be confident in M&S results, simulation has to require no additional resources and must not be time consuming to cope with the crisis response planning tempo. It then appears that in most cases simulation must run with a time acceleration ratio up to 1:400. As a result of these considerations it appears that current M&S techniques do not provide effective solutions and new modeling approaches have to be explored.

At last, for C4ISR and M&S coupling the paper introduces different approaches to solve existing gaps. The CBML (Coalition Battle Management Language) is foreseen as a promising concept that requires further experimentations. Thus, ET-016 has just proposed the creation of a CBML Technical Activity. Khimeche, L.; Bouche, J.-P. (2005) CALIPSO – M&S to Support MPO French Armed Forces Planning Process. In The Effectiveness  of Modelling and Simulation – From Anecdotal to Substantive Evidence (pp. 18-1 – 18-14). Meeting Proceedings RTO-MP-MSG-035,  Paper 18. Neuilly-sur-Seine, France: RTO. Available from:

CALIPSO (acronym for "Concepts avancés pour la connexion de la simulation avec les SIO") is a multi year French MoD R&T program which aims to analyze higher level Army user needs for C4ISR-M&S (Modeling and Simulation) coupling and to provide advanced solutions to solve existing issues. This program is also focusing on the development and experimentation of new M&S techniques for operational planning.

The CALIPSO program started early 2005 and is divided into three phases over four years. At the end, CALIPSO shall provide an initial M&S capability to the third version of the French Army Brigade to Corps C4I system called SICF V3 to support both French and NATO MDMP (Military Decision Making process). The first phase of this program addresses the capture of higher level operational requirements and the analysis of technical issues. It ends with the development of a first demonstrator which will be the core for the future operational planning system. The purpose of this paper is to describe the results of the initial phase of this program and orientations given to the first implementation. The paper will first introduce the military context: the French HRF (High Readiness Force) also called RRC-FR (Rapid Reaction Corps - France) and its planning process. It will then walk through the operational and technical requirements for M&S to support the RRC-FR planning process, and finally it will conclude with the proposed architectural approach for M&S and SICF V3 coupling.

A Framework for Deception

by Fred Cohen, Dave Lambert, Charles Preston, Nina Berry, Corbin Stewart, and Eric Thomas


Executive Summary

This paper overviews issues in the use of deception for information protection. Its objective is to create a framework for deception and an understanding of what is necessary for turning that framework into a practical capability for carrying out defensive deceptions for information protection.
[1] Sun Tzu, "The Art of War", (Translated by James Clavell), Dell Publishing, New York, NY 10036 (1983).
[2] David Kahn, "The Code Breakers", Macmillan Press, New York, 1967
[3] Robert E. Huber, "Information Warfare: Opportunity Born of Necessity", News Briefs, September-October 1983, Vol. IX, Num. 5, "Systems Technology" (Sperry Univac) pp 14-21.
[4] Tom Keaton, "A History of Warfare", Vintage Books, NY, 1993
[5] Robert W. Mitchell and Nicholas S. Thompson, "DECEPTION: Perspectives on human and nonhuman deceipt", SUNY Press, 1986, NY.
[6] Andrew Wilson, "The Bomb and The Computer", Delacorte Press, NY, 1968.
[7] Field Manual 90-02: Battlefield Deception, 1998.
[8] Bart Whaley, "Stratagem: Deception and Surprise in War", Cambridge: MIT Center for International Studies. 1969
[9] James F. Dunnigan and Albert A. Nofi, "Victory and Deceipt: Dirty Tricks at War", William Morrow and Co., New York, NY, 1995.
[10] Colonel Michael Dewar, "The Art of Deception in Warfare", David and Charles Military Books, 1989.
[11] Knowledge Systems Corporation, "C3CM Planning Analyzer: Functional Description (Draft) First Update", RADC/COAD Contract F30602-87-C-0103, December 12, 1987.
[12] William L. Griego, "Deception - A 'Systematic Analytic' Approach", (slides from 1978, 1983)
[13] Gordon Stein, "Encyclopedia of Hoaxes", Gale Research, Inc, 1993, p. 293.
[14] Chuck Whitlock, "Scam School", MacMillan, 1997.
[15] Fay Faron, "Rip-Off: a writer's guide to crimes of deception", Writers Digest Books, 1998, Cinn, OH.
[16] Bob Fellows, "Easily Fooled", Mind Matters, PO Box 16557, Minneapolis, MN 55416, 2000
[17] Thomas Gilovich, "How We Know What Isn't So: The fallibility of human reason in everyday life", Free Press, NY, 1991
[18] Charles K. West, "The Social and Psychological Distortion of Information", Nelson-Hall, Chicago, 1981.
[19] Al Seckel, "The Art of Optical Illusions", Carlton Books, 2000.
[20] Donald D. Hoffman, "Visual Intelligence: How We Create What We See", Norton, 1998, NY.
[21] Diana Deutsch, "Musical Illusions and Paradoxes", Philomel, La Jolla, CA 1995.
[22] Chester R. Karrass, "The Negotiating Game", Thomas A. Crowell, New York, 1970.
[23] Robert B. Cialdini, "Influence: Science and Practice", Allyn and Bacon, Boston, 2001.
[24] Richard J. Robertson and William T. Powers, Editors, "Introduction to Modern Psychology, The Control-Theory View". The Control Systems Group, Inc., Gravel Switch, Kentucky, 1990.
[25] David Lambert, "A Cognitive Model for Exposition of Human Deception and Counter-deception" (NOSC Technical Report 1076 - October, 1987). [Main Table]

[26] Charles Handy, "Understanding Organizations", Oxford University Press, NY, 1993. img35.jpg
[27] National Research Council, "Modeling Human and Organizational Behavior", National Academy Press, Washington, DC, 1998.
[28] Robert Greene, "The 48 Laws of Power", Penguin Books, New York 1998
[29] Various documents, A list of documents related to MKULTRA can be found over the Internet.
[30] Richards J. Heuer, Jr., "Psychology of Intelligence Analysis", History Staff Center for the Study of Intelligence Central Intelligence Agency 1999.
[31] Aldert Vrij, "Detecting Lies and Deceipt", Wiley, New York, NY, 2000.

[32] Bill Cheswick, An Evening with Berferd, 1991. - ALSO - Bill Cheswick, Steve Bellovin, Diana D'Angelo, and Paul Glick, "An Evening with Berferd" - followed by S. M. Bellovin. "There Be Dragons". Proceedings of the Third Usenix UNIX Security Symposium. Baltimore (September 1992).
[33] F. Cohen, Operating System Protection Through Program Evolution Computers and Security 1992.
[34] F. Cohen, "Internet Holes - Internet Lightning Rods", Network Security Magazine, July, 1996.
[35] F. Cohen, A Note On Distributed Coordinated Attacks, Computers and Security, 1996.
[36] F. Cohen, "A Note on the Role of Deception in Information Protection", Computers and Security 1999.
[37] Fred Cohen, "The Unpredictability Defense", Managing Network Security, April, 1998.
[38] Fred Cohen, "Method and Aparatus for Network Deception/Emulation", International Patent Application No PCT/US00/31295, Filed Octoboer 26, 2000.
[39] F. Cohen, "A Mathematical Structure of Simple Defensive Network Deceptions", 1999, (InfoSec Baseline Studies).
[40] Scott Gerwehr, Jeff Rothenberg, and Robert H. Anderson, "An Arsenal of Deceptions for INFOSEC (OUO)", PM-1167-NSA, October, 1999, RAND National Defense Research Institute Project Memorandum.
[41] Scott Gerwehr, Robert Weissler, Jamison Jo Medby, Robert H. Anderson, Jeff Rothenberg, "Employing Deception in Information Systems to Thwart Adversary Reconnaissance-Phase Activities (OUO)", PM-1124-NSA, Novermber 2000, RAND National Defense Research Institute.

[42] Fred Cohen, "Deception Toolkit", March, 1998
[43] Norbert Weiner, "Cybernetics", 1954?
[44] Fred Cohen, "Simulating Cyber Attacks, Defenses, and Consequences", IFIP TC-11, Computers and Security, 1999.
[45] Kalbfleisch, Pamela J. The language of detecting deceit. Journal of Language & Social Psychology, Dec94, Vol. 13 Issue 4, p469, 28p, 1 chart [Provides information on the study of language strategies that are used to detect deceptive communication in interpersonal interactions. Classification of the typology; Strategies and implementation tactics; Discussions on deception detection techniques; Conclusion.]

[46] Fred Cohen, "The Structure of Intrusion and Intrusion Detection", May 16, 2000, (InfoSec Baseline Studies)
[47] National Technical Baseline, "Intrusion Detection and Response", Lawrence Livermore National Laboratory, Sandia National Laboratories, December, 1996
[48] Fred Cohen Cynthia Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler, and Eli Dart, "A Preliminary Classification Scheme for Information System Threats, Attacks, and Defenses; A Cause and Effect Model; and Some Analysis Based on That Model", The Encyclopedia of Computer Science and Technology, 1999.
[49] Colonel John Hughes-Wilson, "Military Intelligence Blunders", Carol & Graf, NY, 1999
[50] John Keegan, "A History of Warfare", Vintage Books, NY 1993.
[51] Donald Danial and Katherine Herbig, ed. "Strategic Military Deception", Pergamon Books, 1982.
[52] Charles Mackay, "Extraordinary Popular Delusions and the Madness of Crowds", Templeton Publications, 1989 (originally Richard Bently Publishers, London, 1841)
[53] Western Systems Coordinating Council WSCC Preliminary System Disturbance Report Aug 10, 1996 - DRAFT [This report details the August 10, 1996 major system disturbance that separated the Western Systems Coordinating Council system into 4 islands, interrupting service to 7.5 million customers for periods ranging from several minutes to nearly six hours.]
[54] Bob Pekarske. Restoration in a Flash---Using DS3 Cross-connects, Telephony. September 10, 1990. [This paper describes the techniques used to compensate for network failures in certain telephon switching systems in a matter of a millisecond. The paper points out that without this rapid response, the failed node would cause other nodes to fail, causing a domino effect on the entire national communications networks.]
[55] Heidi Vanderheiden, Boston University "Gender swapping on the Net?",
[56] Mimi Ito, "Cybernetic Fantasies: Extended Selfhood in a Virtual Community", 1993.

[57] Mark Peace, "Dissertation: A Chatroom Ethnography", May 2000
[58] Daniel Chandler, "Personal Home Pages and the Construction of Identities on the Web", 2001
[59] SSCSD Tactical DecisionMaking Under Stress
[60] The HoneyNet Project web site (
[61] Fred Cohen, "Red Teaming and Other Agressive Auditing Techniques", Managing Network Security", March, 1998.


12th International Command and Control Research and Technology Symposium


ITS Strategic Research Plan, 2010-2014

Policing on the Global Scale

Development and command-control tools for many-robot systems (pre-9/11)

The National Aviation Research Plan (NARP) is a report of the Federal Aviation Administration to the United States Congress pursuant to 49 United Sates Code 44501(c).

The Virtual Observer/Controller (VOC): Automated Intelligent Coaching in Dismounted Warrior Simulations
This report describes the efforts and results of examining the feasibility of creating a Virtual Observer/Controller (VOC) to observe and critique Soldiers’ performance as they are engaged in simulated small-unit, dismounted infantry training using the Soldier Visualization System (SVS) at Fort Benning, Georgia. The successful integration of these two technologies will mean that the training value of the simulation-based exercises will not be completely dependent on the military expertise of a human observer/controller. Investigating the development of the VOC required several major efforts: (a) identifying the Soldier behaviors that merit performance evaluations; (b) developing situation triggers in the context of a training scenario that stimulate the Soldier behaviors we wish to observe and to evaluate; (c) determining how to detect those behaviors in an automated fashion, and; (d) developing instructional strategies that can adequately respond to both individual actions and small-unit collective behaviors.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: Smoking Gun: Govt Admits False Flag Injects
« Reply #3 on: July 13, 2011, 09:29:29 pm »

SAIC provides a full range of innovative, flexible, reliable and cost-effective simulation products using our extensive expertise in system engineering, software engineering, component engineering, signal and image processing, and custom system integration.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline attietewd

  • Member
  • *****
  • Posts: 2,667
Re: Smoking Gun: Govt Admits False Flag Injects
« Reply #4 on: July 13, 2011, 10:09:09 pm »
“Thus, condemnation will never come to those who are in Christ Jesus…”