Covert operation: Difference between revisions

Content deleted Content added
No edit summary
Tag: Reverted
merge proposal.
 
(20 intermediate revisions by 16 users not shown)
Line 1:
{{merge from|Black operation|discuss=Talk:Black operation#Merge with Covert operation|date=October 2024}}
{{Short description|Military operation}}
{{redirect|Covert operative|the legal definition of covert agents or operatives|covert agent}}
Line 6 ⟶ 7:
}}
{{Use dmy dates|date=February 2023}}
A '''covert operation''' or '''undercover operation''' is a [[military operation|military]] or [[police#Personnel and organization|police operation]] involving a [[covert agent]] or troops acting under an assumed [[cover (intelligence gathering)|cover]] to conceal the identity of the party responsible.<ref>{{Cite book|last=Carson|first=Austin|url=https://www.jstor.org/stable/j.ctv346p45|title=Secret Wars: Covert Conflict in International Politics|date=2018|volume=157 |publisher=Princeton University Press|pages=5–6|doi=10.2307/j.ctv346p45 |jstor=j.ctv346p45|isbn=978-0-691-20412-3 }}</ref> Some of the covert operations are also [[clandestine operation]]s which are performed in secret and meant to stay secret, though many are not.
 
==ForeignUS settingslaw==
Under U.S.US law, the [[Central Intelligence Agency]] (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs Congress. Normally, the CIA is the U.S. government agency legally allowed to carry out covert action.<ref name="Executive Secrets 2004, page 25">''Executive Secrets: Covert Action and the Presidency'', William J. Daugherty, University of Kentucky Press, 2004, page 25.</ref> The CIA's authority to conduct covert action comes from the [[National Security Act of 1947]].<ref name="Executive Secrets 2004">William J. Daugherty, ''Executive Secrets: Covert Action and the Presidency'', University of Kentucky Press, 2004.</ref> President [[Ronald Reagan]] issued [[Executive Order 12333]] titled ''United States Intelligence Activities'' in 1984. This order defined covert action as "special activities", both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 [[Intelligence Authorization Act]] and in [[Title 50 of the United States Code]] Section 413(e).<ref name="Executive Secrets 2004"/><ref>''All Necessary Means: Employing CIA operatives in a Warfighting Role Alongside Special Operations Forces'', Colonel Kathryn Stone, Professor Anthony R. Williams (Project Advisor), United States Army War College (USAWC), 7 April 2003, page 7</ref> The CIA must have a "Presidential Finding" issued by the President of the United States in order to conduct these activities under the [[Hughes-Ryan Amendment|Hughes-Ryan amendment]] to the 1991 Intelligence Authorization Act.<ref name="Executive Secrets 2004, page 25"/> These findings are then monitored by the oversight committees in both the U.S.US Senate and the House of Representatives.<ref>Daugherty, 2004, page 28.</ref> As a result of this framework, William J. Daugherty writes that the CIA "receives more oversight from the Congress than any other agency in the federal government", according to one author.<ref>Daugherty, 2004, page 29.</ref> The [[Special Activities Division]] (SAD) is a division of the CIA's [[Directorate of Operations (CIA)|Directorate of Operations]], responsible for Covert Action and "Special Activities". These special activities include covert political influence and paramilitary operations.
Covert operations aim to fulfill their mission objectives without anyone knowing who sponsored or carried out the operation. The ''[[Department of Defense Dictionary of Military and Associated Terms]]'' (Joint Publication JP1-02), defines "covert operation" as "an [[Military operation|operation]] that is so planned and executed as to conceal the identity of or permit [[Plausible deniability|plausible denial]] by the sponsor. A covert operation differs from a clandestine operation in that emphasis is placed on concealment of a sponsor rather than on concealment of the operation".
 
Covert operations are employed in situations where openly operating against a target would be disadvantageous. Operations may be directed at or conducted with allies and friends to secure their support for controversial components of [[foreign policy]] throughout the world. Covert operations may include [[sabotage]], [[assassination]]s, support for [[Coup d'état|coups d'état]], or support for [[Subversion (politics)|subversion]]. Tactics include the use of a [[false flag]] or [[front group]]. The activity of organizations engaged in covert operations is in some instances similar to or overlaps with, the activity of [[front organization]]s. While covert organizations are generally of a more official military or paramilitary nature, like the [[Deutsche Verkehrsfliegerschule|DVS German Air Transport School]] in the [[Nazi era]], the line between both becomes muddled in the case of front organizations engaged in [[Terrorist front organization|terrorist activities]] and organized crime.
 
===Laws===
Under U.S. law, the [[Central Intelligence Agency]] (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs Congress. Normally, the CIA is the U.S. government agency legally allowed to carry out covert action.<ref name="Executive Secrets 2004, page 25">''Executive Secrets: Covert Action and the Presidency'', William J. Daugherty, University of Kentucky Press, 2004, page 25.</ref> The CIA's authority to conduct covert action comes from the [[National Security Act of 1947]].<ref name="Executive Secrets 2004">William J. Daugherty, ''Executive Secrets: Covert Action and the Presidency'', University of Kentucky Press, 2004.</ref> President [[Ronald Reagan]] issued [[Executive Order 12333]] titled ''United States Intelligence Activities'' in 1984. This order defined covert action as "special activities", both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 [[Intelligence Authorization Act]] and in [[Title 50 of the United States Code]] Section 413(e).<ref name="Executive Secrets 2004"/><ref>''All Necessary Means: Employing CIA operatives in a Warfighting Role Alongside Special Operations Forces'', Colonel Kathryn Stone, Professor Anthony R. Williams (Project Advisor), United States Army War College (USAWC), 7 April 2003, page 7</ref> The CIA must have a "Presidential Finding" issued by the President of the United States in order to conduct these activities under the [[Hughes-Ryan Amendment|Hughes-Ryan amendment]] to the 1991 Intelligence Authorization Act.<ref name="Executive Secrets 2004, page 25"/> These findings are then monitored by the oversight committees in both the U.S. Senate and the House of Representatives.<ref>Daugherty, 2004, page 28.</ref> As a result of this framework, William J. Daugherty writes that the CIA "receives more oversight from the Congress than any other agency in the federal government".<ref>Daugherty, 2004, page 29.</ref> The [[Special Activities Division]] (SAD) is a division of the CIA's [[Directorate of Operations (CIA)|Directorate of Operations]], responsible for Covert Action and "Special Activities". These special activities include covert political influence and paramilitary operations.
 
===Covert vs. clandestine operations===
{{See also|Active measures}}
Covert operations and [[clandestine operation]]s are distinct but may overlap. A clandestine operation and its effects may go completely unnoticed. The [[United States Department of Defense]] definition has been used by the United States and [[NATO]] since [[World War II]]. In a covert operation, the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, ''clandestine'' means "hidden", while ''covert'' means "[[Plausible deniability|deniable]]". The term ''[[stealth technology|stealth]]'' refers both to a broad set of [[military tactics|tactics]] aimed at providing and preserving the element of surprise and reducing enemy resistance and to a set of [[Technology|technologies]] ([[stealth technology]]) to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms ''secret'' and ''stealthy'' are not used to formally describe types of missions.
 
===Impact===
According to a 2018 study by University of Chicago political scientist Austin Carson, covert operations may have the beneficial effect of preventing escalation of disputes into full-blown wars.<ref name=":0">{{Cite book|last=Carson|first=Austin|url=https://www.jstor.org/stable/j.ctv346p45|title=Secret Wars: Covert Conflict in International Politics|date=2018|volume=157 |publisher=Princeton University Press|doi=10.2307/j.ctv346p45 |jstor=j.ctv346p45|isbn=978-0-691-20412-3 }}</ref> He argues that keeping military operations secret can limit escalation dynamics, as well as insulate leaders from domestic pressures while simultaneously allowing them communicating their interest to the adversary in keeping a war contained.<ref name=":0" /> He finds that covert operations are frequently detected by other major powers.<ref name=":0" />
 
==Domestic settings==
Line 66 ⟶ 58:
 
===Participation in criminal activities===
Undercover agents may engage in criminal activities as part of their investigation. Joh defined the term ''authorized criminality'' to describe this phenomenon, which she restricts primarily to undercover law enforcement officers, excluding [[informant|confidential informants]].{{sfn|Joh|2009|p=157}} These criminal activities are primarily used to "provide opportunities for the suspect to engage in the target crime" and to maintain or bolster their cover identity. However, these crimes must be necessary to advance the investigation otherwise they may be prosecutable like any other crime.{{sfn|Joh|2009|p=165}} The FBI requires that such activities must be sanctioned and necessary for the investigation; they also stipulate that agents may not instigate criminal activity (to avoid entrapment) or participate in violence except for self-defense or the defense of others.<ref>{{Bluebook journal | last=Op. Atty' Gen. | title=The Attorney General’S Guidelines on Federal Bureau of Investigation Undercover Operations | pin=12 | url=https://www.justice.gov/sites/default/files/ag/legacy/2013/09/24/undercover-fbi-operations.pdf | year=2002}}</ref> Unfortunately, mostMost other legislation surrounding authorized criminality is not uniform and is a patchwork of federal and state laws.{{sfn|Joh|2009|p=168}}
 
===Risks===
Line 97 ⟶ 89:
{{Distinguish|Plain dress}}
 
Undercover agents should not be confused with [[law enforcement officer]]s who wear '''plainclothes'''{{mdash}}that is, to wear [[Mufti (dress)|civilian clothing]], instead of wearing a [[uniform]], to avoid detection or identification as a law enforcement officer. However, plainclothes police officers typically carry normal police equipment and normal identification. Police detectives are assigned to wear plainclothes by not wearing suits or formal clothes instead of the uniform typically worn by their peers. Police officers in plainclothes must identify themselves when using their police powers; however, they are not always required to identify themselves on demand and may lie about their status as a police officer in some situations (see [[sting operation]]).
 
Sometimes, police might drive an unmarked vehicle or a vehicle which looks like a taxi.<ref>{{cite web |url=https://www.youtube.com/watch?v=gs4T19m8a18 |archive-url=https://ghostarchive.org/varchive/youtube/20211221/gs4T19m8a18 |archive-date=2021-12-21 |url-status=live |title=Unmarked Police Cars Responding Compilation: Sirens NYPD Police Taxi, Federal Law Enforcement, FDNY |last=Code3Paris |date=24 July 2017 |via=YouTube}}{{cbignore}}</ref>
 
===Controversies===
Line 106 ⟶ 98:
! Further<br />information !! Country !! Approximate<br />time period !! Details
|-
| [[ATF fictional sting operations]] || USA || ?2011 – 2014 || Government agents enticed targeted victims and incited them to commit crimes of a type and scale calculated to procure specific sentences, for which they would then be prosecuted and jailed, typically for around 15 years.
|-
| [[UK undercover policing relationships scandal]] || UK || ? – 2010 || Undercover officers infiltrating protest groups, deceived protesters into long-term relationships and in some cases, fathered children with them on false pretences, only to vanish later without explanation. Units disbanded and unreserved apology given as part of settlement, noting that the women had been deceived. Legal action continues as of 2016, and a public inquiry examining officer conduct, the [[Undercover Policing Inquiry]], is underway.
Line 132 ⟶ 124:
* [[Vang Pao]]'s clandestine army
{{Div col end}}
 
==In popular culture==
Covert operations have often been the subject of popular films (e.g. ''[[Infernal Affairs (film series)|Infernal Affairs]]'', ''[[The Departed]]'', ''[[City of Damnation]]'', ''[[Zero Dark Thirty]]'', ''[[Argo (2012 film)|Argo]]'', ''[[The Falcon and the Snowman|The Falcon and The Snowman]]'', ''[[The Kremlin Letter]]''), novels, TV series, and comics.
 
[[The Company (Prison Break)|The Company]] is a fictional covert organization featured in the American TV series ''[[Prison Break]]''. Also other series that deal with covert operations are ''[[Mission: Impossible (1966 TV series)|Mission: Impossible]]'', ''[[Alias (TV series)|Alias]]'', ''[[Burn Notice]]'', ''[[The Unit]]'', ''[[The State Within]]'', ''[[Covert Affairs]]'', ''[[Air Wolf]]'', ''[[24 (TV series)|24]]'', ''[[The West Wing]]'', ''[[The Blacklist (TV series)|The Blacklist]]'', ''[[Scandal (American TV series)|Scandal]]'', ''[[Strike Back (TV series)|Strike Back]]'', ''[[Vagabond (TV series)|Vagabond]]'', ''[[New Tricks]]'', and ''[[Death in Paradise (TV series)|Death in Paradise]]''.{{Citation needed|date=April 2021}}
 
==See also==
Line 201 ⟶ 188:
* [https://web.archive.org/web/20070707201837/http://thewall.civiblog.org/rsf/big_brother_talons_on_you.html "Big Brother is Watching You Part 1 – 902 MI Group TALON Project Summary, Spreadsheet, Rep. Wexler response, and News Coverage collection] (includes Shane Harris's "TIA Lives On") via thewall.civiblog.org
* [https://archive.today/20110724191036/http://snoc.shacknet.nu/ Steath Network Operations Centre] – Covert Communication Support System
 
{{espionage}}
{{intelligence cycle management}}
 
{{DEFAULTSORT:Covert operation}}