A covert operation is an intelligence operation intended to conceal the identity of (or allow plausible denial by) the sponsor and intended to create a political effect which can have implications in the military, intelligence or law enforcement arenas—affecting either the internal population of a country or individuals outside it.
Covert operations (or covert action) aim to secretly fulfill their mission objectives without anyone knowing who sponsored or carried out the operation, or in some cases, without anyone knowing that the operation has even occurred and in the United States is carried out by the Central Intelligence Agency.
Covert operations should not be confused with clandestine operations, which are performed in secret.
Under U.S. law, the Central Intelligence Agency (CIA) must lead covert operations unless the president finds that another agency should do so and properly informs Congress. Normally, the CIA is the U.S. government agency legally allowed to carry out covert action. The CIA's authority to conduct covert action comes from the National Security Act of 1947. President Ronald Reagan issued Executive Order 12333 titled United States Intelligence Activities in 1984. This order defined covert action as "special activities", both political and military, that the US Government could legally deny. The CIA was also designated as the sole authority under the 1991 Intelligence Authorization Act and in Title 50 of the United States Code Section 413(e). The CIA must have a "Presidential Finding" issued by the President of the United States in order to conduct these activities under the Hughes-Ryan amendment to the 1991 Intelligence Authorization Act. These findings are then monitored by the oversight committees in both the U.S. Senate and the House of Representatives. As a result of this framework, the CIA "receives more oversight from the Congress than any other agency in the federal government". The Special Activities Division (SAD) is a division of the CIA's Directorate of Operations, responsible for Covert Action and "Special Activities". These special activities include covert political influence and paramilitary operations.
In an article for ABC News, former Deputy Secretary of Defense and retired CIA officer Mick Mulroy explained that Covert Action is derived from Presidential Findings authorizing the CIA to conduct specific special activities to support U.S. national security objectives. He advocated for Covert Action to be fully incorporated in the U.S. National Security Strategy and the 2018 National Defense Strategy in the form of a Covert Action Annex and for Covert Action to be fully funded to operate in support of overall objectives in the form of a Covert Action Fund.
Military intelligence and foreign policy
Covert operations and clandestine operations are distinct. The Department of Defense Dictionary of Military and Associated Terms (Joint Publication JP1-02), defines "covert operation" as "an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor. A covert operation differs from a clandestine operation in that emphasis is placed on concealment of a sponsor rather than on concealment of the operation". The United States Department of Defense definition has been used by the United States and NATO since World War II.
In a covert operation, the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden", while covert means "deniable". The term stealth refers both to a broad set of tactics aimed at providing and preserving the element of surprise and reducing enemy resistance and to a set of technologies (stealth technology) to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms secret and stealthy are not used to formally describe types of missions.
Covert operations are employed in situations where openly operating against a target would be disadvantageous. Operations may be directed at or conducted with allies and friends to secure their support for controversial components of foreign policy throughout the world. Covert operations may include sabotage, assassinations, support for coups d'état, or support for subversion. Tactics include the use of a false flag or front group.
The activity of organizations engaged in covert operations is in some instances similar to or overlaps with, the activity of front organizations. While covert organizations are generally of a more official military or paramilitary nature, like the DVS German Air Transport School in the Nazi era, the line between both becomes muddled in the case of front organizations engaged in terrorist activities and organized crime.
Undercover operations (such as sting operations or infiltration of organized crime groups) are conducted by law enforcement agencies to deter and detect crime and to gather information for future arrest and prosecution.
In popular culture
Covert operations have often been the subject of popular films (Zero Dark Thirty, Argo, The Falcon and The Snowman, The Kremlin Letter), novels, TV series, and comics.
The Company is a fictional covert organization featured in the American TV series Prison Break. Also other series that deal with covert operations are Mission: Impossible, Alias, Burn Notice, The Unit, The State Within, Covert Affairs, Air Wolf, 24, The West Wing, The Blacklist, Scandal, Strike Back series, and the Vagabond.
- ^ a b c Mulroy, Mick. "Covert action and national security". ABC News Radio. Retrieved 28 January 2021.
- ^ a b Executive Secrets: Coved the Presidency, William J. Daugherty, University of Kentucky Press, 2004, page 25.
- ^ a b William J. Daugherty, Executive Secrets: Covert Action and the Presidency, University of Kentucky Press, 2004.
- ^ All Necessary Means: Employing CIA operatives in a Warfighting Role Alongside Special Operations Forces, Colonel Kathryn Stone, Professor Anthony R. Williams (Project Advisor), United States Army War College (USAWC), 7 April 2003, page 7
- ^ Daugherty, 2004, page 28.
- ^ Daugherty, 2004, page 29.