Introduction to Terror Course Level 1

Introduction to Terror Course Level 1

Infowar School Terrorism Course Level 1 False Flag Terrorism 1 www.infowarschool.com Infowar School Terrorism Course Level 1 False Flag Terrorism Terrorism Course Level 1 False Flag Terrorism By Shaun Almeida This is a free publication from the Infowar School created to raise awareness about the New World Order. Please share this book with everyone. Click here to check the Infowar School Library for the latest version of this course PDF. Published online by Infowarschool.com 2021 Version 1.0 2 www.infowarschool.com Infowar School Terrorism Course Level 1 False Flag Terrorism Table of Contents TABLE OF CONTENTS...............................................................................................................................3 INTRODUCTION TO TERROR COURSE LEVEL 1..............................................................................5 TWO ADMITTED EXAMPLES OF FALSE FLAG TERROR...........................................................................................5 OPERATION GLADIO.........................................................................................................................................6 OPERATION NORTHWOODS...................................................................................................................7 THE PURPOSE OF OPERATION NORTHWOODS.......................................................................................................8 THE PEOPLE AND AGENCIES INVOLVED IN OPERATION NORTHWOODS....................................................................9 Those Who Were Directly Involved And Knew It Was All A Lie To Frame Cuba.................................9 Unknowing Co-conspirators - Those Who Are Indirectly Involved.....................................................10 Other Types Of Conspirators................................................................................................................10 THE N.W.O. ARE WILLING TO GO TO GREAT LENGTHS TO CREATE AN ENTIRE FALSE STORY...........................11 TACTICS FROM OPERATION NORTHWOODS TO USE AGAINST CUBA......................................................................13 Use A Military Exercise to Scare Cuba into Defending Itself..............................................................13 Create A Series Of Fake Incidents Around The American Base At Guantanamo Bay And Blame The Cubans For It........................................................................................................................................13 Sink A Ship And Blame It On Cuba......................................................................................................14 Create A Campaign Of Terror In Florida And Surrounding States And In Washington.....................15 Fake An Attack On A Civilian Airliner By Cubans..............................................................................16 Pretend To Shoot Down American Air Force Jet.................................................................................17 FALSE FLAG TERROR.............................................................................................................................18 WHO USES FALSE FLAGS ...............................................................................................................................18 REAL EXAMPLES OF FALSE FLAG TERROR........................................................................................................20 THE USS MAINE.........................................................................................................................................26 THE SINKING OF THE LUSITANIA......................................................................................................27 WAS IT REALLY A FALSE FLAG?.....................................................................................................................27 WHY SINK THE LUSITANIA?...........................................................................................................................28 SETTING UP THE LUCITANIA BEFORE THE ATTACK.............................................................................................30 RULES ON WHAT SHIPS TO ATTACK.................................................................................................................30 BRITISH IGNORE THE RULES OF WAR PUTTING INNOCENT PEOPLE AT RISK............................................................31 Britain Caught Violating the Cruiser Rules.........................................................................................31 GERMANY DECLARES WAR ZONE SAYS EVEN NEUTRAL SHIPS NOT SAFE............................................................31 NEUTRAL AMERICAN SHIPS ARE NOW POSSIBLE TARGETS..................................................................................31 LUCITANIA IS SPECIFICALLY MADE A TARGET BY NAME BY MAKING IT KNOWN IT IS VIOLATING THE CRUISER RULES ....................................................................................................................................................................32 WILSON SETS THE STAGE FOR GOING TO WAR BY HOLDING GERMANS STRICTLY ACCOUNTABLE IF THEY FIRE ON AN AMERICAN FLAGGED SHIP...............................................................................................................................33 AND NOT DISCOURAGING THE BRITISH FROM FLYING THE AMERICAN FLAG ON THEIR SHIPS...................................33 MAKING SURE THERE WOULD BE AMERICAN PASSENGERS.................................................................................33 PUTTING GUNCOTTON ON THE SHIP TO MAKE SURE THE LUCITANIA SINKS AND DOES IT QUICKLY..........................34 THERE WAS KNOWN SUBMARINE ACTIVITY IN THE AREA...................................................................................34 TAKING THE ESCORT AWAY ...........................................................................................................................35 MAKING THE TARGET EASIER TO HIT..............................................................................................................35 THE ATTACK.................................................................................................................................................35 MAKING SURE AMERICANS DIED.....................................................................................................................36 THE COVER UP.............................................................................................................................................37 THE UNITED STATES FINALLY ENTERS THE WAR...............................................................................................37 PEARL HARBOR........................................................................................................................................39 3 www.infowarschool.com Infowar School Terrorism Course Level 1 False Flag Terrorism THEIR COVER STORY 'REASONING' FOR THE ATTACK.........................................................................................40 F.D.R. AND MCCOLLUM DEVELOPED A STRATEGY TO PROVOKE THE JAPANESE...................................................41 THE N.W.O. PLANTS THE PACIFIC FLEET AT PEARL HARBOR AS BAIT FOR THE JAPANESE......................................43 JAPANESE NAVAL AND DIPLOMATIC CODES WERE BROKEN.................................................................................43 PRIOR WARNINGS FROM MULTIPLE SOURCES WERE HIDDEN FROM PEARL HARBOR...............................................48 PEARL NOT WAS ALLOWED TO DEFEND ITSELF................................................................................................50 KIMMEL AND SHORT SET UP AS PATSIES FOR THE ATTACK................................................................................51 PACIFIC CLEARED OF SHIPPING........................................................................................................................51 GULF OF TONKIN ATTACK...................................................................................................................52 USS LIBERTY..............................................................................................................................................53 WHY WOULD ISRAEL STAGE AN ATTACK ON THE USS LIBERTY.............................................................................54 THE SET UP OF THE USS LIBERTY....................................................................................................................54 ISRAEL KNEW IT WAS AN AMERICAN SHIP AND EXACTLY WHAT SHIP IT WAS...................................................55 THEY WANTED EVERYONE DEAD AND THE SHIP SUNK.......................................................................................56 HELP WAS DENIED TO THE SHIP.....................................................................................................................57 THE COVER-UP.............................................................................................................................................59 ISLAMIC TERRORISM.............................................................................................................................61 CREATING ISRAEL MADE THE MODERN ISLAMIC TERRORISTS...............................................................................62 THE BALFOUR DECLARATION...........................................................................................................................62 EXPANDING THE STATE OF ISRAEL AND CREATING THE

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    100 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us