The first casualty of war is truth.
-
List of militaries that recruit foreigners
-
Countries by military and paramilitary personnel
-
Operation Northwoods:
Declassified US DoD proposal to then President Kennedy for the CIA to commit
false flag violent terrorism (including bombing) against
American military & civilian targets (near Miami, other Florida cities, & Washington),
blaming it on Cuba,
and using it as casus belli (justification for war) against Cuba.
JFK declined.
This prompts some people to question the 2001-September-11th attacks.
-
Operation Susannah / The Lavon Affair:
Failed false flag bombing by Israel against
Egyptian-, American-, and British-owned civilian businesses within Egypt
with the aim of keeping British troops in Egypt's Suez Canal zone
- Regarding the Russian Perspective of the Russian-Ukrainian War
-
Cicada 3301:
Presumed intelligence agency online recruitment puzzle-set that is open to public participation.
"The most elaborate and mysterious puzzle of the internet age",
focusing heavily on data security, cryptography, steganography, and internet anonymity.
-
Number stations,
Secret broadcast:
An encrypted radio broadcast from intelligence agencies
(e.g. CIA)
to spies in the field of foreign countries.
(see https://priyom.org/number-stations for lists of live and inactive ones)
-
The assassin's teapot:
A teapot that covertly contains multiple inner chambers,
and allows the handler to stealthily control which chamber liquid pours from,
enabling surreptitious / deniable public poisoning, & funny pranks.
-
Pizza-Meter Theory:
American military actions can be predicted using Google-Maps' "Crowd Meter" (which shows how busy / non-busy a business is)
on businesses surrounding The Pentagon and the CIA such as pizza shops that are unusually busy, and gay-bars that are unusually non-busy.
-
Edward Snowden:
American whistleblower of illegal domestic & international espionage by
the NSA & Five Eyes
-
Canary trap / barium meal test:
The practice of giving slightly different versions of a document to each recipient,
so that if the document is leaked then the person who leaked it can be identified.
- EMP / ElectroMagnetic Pulse
-
Unidentified decedent:
A corpse whose identity cannot be established by police nor medical examiners
- The space race was partially a cold-war pretext for missile / ICBM research and development.
-
Psychological warfare
- Doomsday Risk
-
DEFCON:
DEFense readiness CONdition
Readiness condition
|
Exercise term
|
Description
|
Readiness
|
DEFCON 1
|
COCKED PISTOL
|
Nuclear war is imminent or has already begun
|
Maximum readiness. Immediate response.
|
DEFCON 2
|
FAST PACE
|
Next step to nuclear war
|
Armed forces ready to deploy and engage in less than six hours
|
DEFCON 3
|
ROUND HOUSE
|
Increase in force readiness above that required for normal readiness
|
Air Force ready to mobilize in 15 minutes
|
DEFCON 4
|
DOUBLE TAKE
|
Increased intelligence watch and strengthened security measures
|
Above normal readiness
|
DEFCON 5
|
FADE OUT
|
Lowest state of readiness
|
Normal readiness
|
- Doomsday Plane
-
Black bag op: A clandestine entry into a building etc. to obtain information for an intelligence operation.
-
Parallel construction:
An unethical law enforcement process of building a parallel, or separate, evidentiary basis for a criminal investigation
in order to conceal how an investigation actually began.
E.g. Gaining intelligence from illegal warrantless domestic surveillance from the NSA about an individual / suspect that possesses contraband,
and then have LEOs surreptitiously surveil that person (ostensibly just on routine patrol or surveilling someone else)
looking for pretextual evidence
(perhaps operating a vehicle at slightly faster than allowed speeds
or perhaps a LEO from a different agency provides an anonymous tip reporting a fictitious crime by a fictitious person that coincidentally
matches the description of the suspect)
to allow a search of that person or their property in hopes of "coincidentally" locating the original contraband.
-
Civilian casualty ratio (AKA civilian-combatant ratio):
During war, how many deaths are civilians compared to combatants.
-
Project Eldest Son:
During the US-Vietnam War, American special operations forces covertly supplied Vietnamese forces with ammunition
that was usable by Vietnamese weapons;
However a very small fraction of the ammo was sabotaged to cause the entire rifle to explode on use.
But the percentage of ammo that was sabotaged was low enough that the Vietnamese continued to use it, without suspecting that the ammo was the cause.
Nuclear
Electronic
-
Cyber-security
-
Hardware-level backdoors in nearly every computer
-
Dogs can smell
hard-drives
&
SD-cards
&
DVDs.
-
Internet privacy/security
-
General technology privacy / security guides
-
Mass surveillance in China
(example: It is estimated that there are twice as many surveillance cameras in Mainland China than there are humans in the United States)
-
Map of where cellphone prepaid cell service / SIM registration
demands real identity verification, some including biometrics
(maps on pages 7 & 9, details on pages 22-30)
(related report of cell phone privacy across the Earth)
-
IMSI-catchers:
Surveillance devices that impersonating cell towers to be able to detect nearby cellular (e.g. cell phones, hotspots) devices, and in some cases intercept their communications.
E.g. "StingRays".
Counters include:
- airplane-mode (though this demands putting one's trust in the software and is difficult to verify)
- faraday cages (e.g. faraday bags, even a makeshift one made of tin foil)
See also this
deep-dive into IMSI-catchers (including additional counters) by the Electronic Frontier Foundation
Radio jammers can inexpensively shutdown entire airports, EMS systems
(e.g. military & police radios & cell phones, prevent witnesses from using cell phones to contact EMS), and more.
Highly illegal, but easy to find from foreign (e.g. Chinese) internet markets.
A criminal or spy might pre-install cell-phone jammers along a get-away route to prevent witnesses from calling the police, and prevent the police from using their radios.
Burglars use these to disable wifi doorbells (eg "Ring" doorbells) and similar cameras.
- Satphones
-
Printer Identification Codes:
Certain printers will mark each printed page with a nearly invisible mark that identifies which printer it came from,
and when. This was used to identify and imprison NSA whistleblower
Reality Winner.