Black - Ops   

"Have we not come to such an impasse in the modern world that we must love our enemies - or else? The chain reaction of evil - hate begetting hate, wars producing more wars - must be broken, or else we shall be plunged into the dark abyss of annihilation." - Martin Luther King, Jr.

Airstrike Chase KIA MIC Rbl War Criminal
Asian Tsunami Data Data2 Homicide's K of M
Creepshow Dulce Map Solid UnHoly
3166 700 Censor NDAA Saved
Drone Armed Ghost Gulf Terror Zombie
Defense Mechanisms Bait In Libya Pose
Drug Organizations 7 Admit Drone Fraud
Global Federal Reserve 
DD214 SPN#'s Data
Data Data2 MOIRE Note IOManip
Hacking Democracy Black Box Death Grey Fox
Wall Street's Naked Swindle KB971033
Medicine, Physicians and Torture Cash In Data
Mint Missing Gold 
Data How Much?  Latest
New Browser 
Fake Terror Patsy Farmers Spam
Nuclear Warheads Destroyer Dubai Hit Train
Offshore Toxins 
Fishery Sri Lanka Tsunami
Subliminal Control
 Exec's Moon Landing Hoax

'Black ops' is shorthand for black operations, covert or clandestine activities that cannot be linked to the organization that undertakes them. The term is a highly problematic one, for a number of reasons. First, by definition, many activities conducted by organizations such as the United States Central Intelligence Agency (CIA) are never intended to be linked to the agency itself. Second, a known example of a successful black operation would be a contradiction in terms. There have been successes. One recent success, we'll call order 81. More on order 81 and others here. Black operations are not unique to the US, throughout history many other countries have carried out these types of operations.

Disaster in Paraguay
Biological Pollution
Defend Rights Against Monsanto Patents
Corn Disaster in South Africa
The World According to Monsanto
Superfund Sites
Bayer Admits GMO Contamination is Out of Control
The Man Who Beat Monsanto
   Credits »

Third, and perhaps most important, is the fact that the term "black ops" itself is much more likely to be used by novices than by members of the intelligence community. A member of the CIA or any such agency would not likely use such a term in describing a true black operation for obvious reasons; agents would be much more likely to disguise the nature of their undertaking with innocuous language. As well, media censorship is rampant and must be considered a 'black' op.

On the other hand, the intriguing sound of the phrase "black ops" makes it highly appealing to conspiracy-theory buffs and others whose interest is more in fantasy than in the often mundane reality of intelligence work. A search of the term "black ops" on the Internet is likely to turn up material from the organizational fringes (some of it tongue-in-cheek), rather than any serious investigation of clandestine activities. [See: Black Operations: from assassination to weather control]

Black operations are almost never officially acknowledged, remaining the highest of secrets long after their completion. 'Plausible deniability' and the compartmentalization of various duties are integral to this process. There are many examples of government run black operations. Here is one example that ran during the 1990's. Here is a more recent example from the illegal invasion of Iraq.

Graphic Content
Banned Weapons Use in Iraq and the Aftermath
Vid1     Vid2     Vid3     Vid4     Vid5

Understanding black operations is the keystone to decoding the events of the 20th century. The supremacy of the state is sustained by covert operations, black budgets and undercover agents. They are the essence of fascism and the national security state, and therefore they must be exposed and examined by the individuals they are designed to suppress if they are to be stopped.

Covert Operations
In June 1948, National Security Council Directive 10/2 defined covert operations as actions conducted by the United States against foreign states which are so planned and executed that any US government responsibility for them is not evident to unauthorized persons and that if uncovered the US Government can plausibly disclaim any responsibility for them. It then authorized the Central Intelligence Agency (CIA) to undertake such clandestine activities, including propaganda, economic warfare; preventive direct action, including sabotage, anti-sabotage, demolition and evacuation measures; subversion against hostile states, including assistance to underground resistance movements, guerrillas and refugee liberations groups, and support of indigenous anti-Communist elements in threatened countries of the free world. [See: The pitfalls of US covert operations]

Featured Content
Killtown: the weapon of sound above ground, charades, and a moraless compass at the helm of the race for the bottom
   More »

Long before the CIA became involved in covert operations, however, the US had used similar clandestine methods to achieve national objectives. President George Washington, for example, who had a keen appreciation for the role of intelligence in both war and peace, persuaded Congress in July 1790 to establish the Contingent Fund of Foreign Intercourse. Known as the Secret Service fund, this money was spent by Washington (without a requirement for detailed accounting) in a covert operation to ransom Americans held hostage by the Barbary states. [See: The largest covert operation in CIA history]

The Central Intelligence Agency has received approval at least twice in the last several years to conduct an 'information war' against several countries in the Middle East, including Iran, Lebanon and Syria, according to current and former intelligence officials. President Bush deflected a secret request by Israel in 2008 for specialized bunker-busting bombs it wanted for an attack on Iran?s main nuclear complex and told the Israelis that he had authorized new covert action intended to sabotage Iran?s suspected effort to develop nuclear weapons, according to senior American and foreign officials.

The FDA appears to be prepared to accept as true the statements from a company that only a year ago pled guilty to lying about the addictive quality of OxyContin™ - something that raises serious doubts about the integrity of the FDA. Amid a corporate landscape of bankruptcy and retrenchment. Introduced in 1995 by Purdue Pharma, Oxycontin™ is a pill that gradually releases steady amounts of narcotics for 12 hrs. According to a University of Michigan study, Vicodin and OxyContin™ are now more popular among high school seniors than cocaine and Ecstasy, beat out only by marijuana. Merck will pay $41 billion for Schering-Plough, paying with a combination of shares, $9.8 billion from cash reserves and another $8.5 billion prised from the clutches of a bank, JPMorgan. Although credit has dried up almost everywhere else, drug companies, with their cash reserves and healthy revenues, can still call on the banks. The bird flu hoax made millions for a select few in the pharma industry. In 2006 Fortune Magazine confirmed 'the prospect of a bird flu outbreak may be panicking people around the globe, but it's proving to be very good news for Defense Secretary Rumsfeld'. It must be said, the top 10 drug manufacturers in the Fortune 500 made more profit in 2002 than the remaining 490 companies combined.

False Flag Operations
False flag terrorism occurs when elements within a government stage a secret operation whereby government forces pretend to be a targeted enemy while attacking their own forces or people. The attack is then falsely blamed on the enemy in order to justify going to war against that enemy.

False flag operations are covert operations conducted by governments, corporations, or other organisations, which are designed to appear as if they are being carried out by other entities. The name is derived from the military concept of flying false colors; that is, flying the flag of a country other than one's own. How is it possible that terror operatives always seem to unleash havoc in a way that results in a State Dept (call it the shadow govt, CFR, deep-state) policy which neatly plays into a pre-planned long-term strategy.

False flag operations are not limited to war and counterinsurgency operations, and have been used in peacetime; for example, during Italy's strategy of tension. The term comes from the old days of wooden ships, when one ship would hang the flag of its enemy before attacking another ship in its own navy. Because the enemy's flag was hung instead of the flag of the real country of the attacking ship, it was called a "false flag" attack.

Hot Spots

Afghanistan Nigeria
Colombia Pakistan
Ecuador Peru
India Sudan
Ivory Coast
Kenya Turkey
Lebanon Uganda
Mexico Uzbekistan
NATO Zimbabwe
Click here or press F5 to refresh page if flags failed to load.