Covert Action, Clandestine Operations and Analysis in Intelligence
Covert Action, Clandestine Operations and Analysis in Intelligence
Covert Action, Clandestine Operations and Analysis in Intelligence
Daniel Saarinen
3/16/10
Intelligence
Covert action, clandestine operations and analysis play critical roles in the
intelligence community. Analysis is clearly different when compared to the other two
items, so some explanation of the other two is in order. Covert actions are taken outside
the normal chain of command, and legal responsibility is denied by the authorities. They
may be legal or illegal, but the goal is compartmentalization and deniability. Clandestine
operations are secret, but are ordered from within the normal chain of command, and the
authorities ordering the operation take legal responsibility for it. Analysis units simply
processes data gathered by any method, and presents conclusions to the chain of
command. Covert action and clandestine operations are two broad categories of activity
Covert action and clandestine operations are not formally part of the simple
intelligence cycle that is promoted to the public. Within the phase of collection though,
there is plenty of room to fit both categories of activities in with room to spare. Only
other operations that have other goals are not part of the intelligence cycle. The question
of whether covert and clandestine operations are part of the intelligence cycle cannot be
answered to the satisfaction of all, though. Almost any operation that is conducted will
produce some intelligence, so it is possible to claim that almost any operation is part of
the intelligence cycle. The idea that everything is potentially included assaults reason, so
we must question the motivation of those who would include everything under the sun in
the appearance that lawful authorities are in control of the activities taking place. If any
given action can worm its way into the cycle, it means it is being directed by “tasking”
from a legal authority. This illusion is useful for duping the public into believing that
everything is under the control of the people they elect, and not private forces with
private agendas.
Of course, not all covert actions are directed by secretive private forces. A
Presidential Finding is needed in order to carry out covert actions. This tool of the
executive is very important and will be discussed here. Another powerful tool of
type of executive order that is classified, and is not usually published in the Federal
Register. These findings may become public for political purposes, or through leaks as
well. A Presidential Finding is a matter of policy, and is under the singular control of the
fact it usually is. The problem of control is that a Presidential Finding can be very broad,
3
and can subsequently be used to justify a broad range of operations besides what was
The President and his controllers may not want to directly order something
because of the potential consequences, so they may intentionally make a Finding broad.
Then the operators and technicians are expected to go and accomplish what the Executive
“really intended”, and if the operation is discovered they are denied and considered to be
operating unlawfully. Their national security letters, and the verbal orders they received
to carry out certain actions, no longer protect them when the Executive decides in an ex-
post facto manner that it really didn’t mean what they thought it meant when it issued the
orders. Typically the operation will be portrayed as the rogue action of some band of
misfits, and the accountability will be cut off with their prosecution and conviction. The
fate of the Army privates and sergeants involved in the Abu Ghraib prisoner scandal
More important than the problems with Presidential Findings is the privatization
of intelligence activities that has gone on since EO 12333. By 2007, 70% of all
intelligence activity had already been privatized1. From paper clips to spy satellites and
assassinations, the intelligence functions of the state have been transferred to private
corporations. This provides an entire new matrix of covert operations that operate
simultaneously with the 17 agencies that officially make up the intelligence community.
Private contractors now represent not only a parallel intelligence structure, but the
primary intelligence structure of the nation. The agencies serve as simple recruiting
pools for the real operations that are carried out by privatized entities. The agencies
1
Shorrock, Tim. “The Corporate Takeover of U.S. Intelligence”. Accessed at
http://www.salon.com/news/feature/2007/06/01/intel_contractors/ on 3/9/10
4
continue operating to provide cover and deniability for the corporate take-over that has
occurred.
This private network operates without any meaningful oversight, and has a budget
in the tens of billions per year not counting black funding from narcotics trafficking and
such. The Executive can pass orders to the private network without any government
paper trail, and the private network can access state power directly and without any paper
trail either. The flag ship contractors create special purpose entities that are
compartmentalized so that if they are caught and embarrassed by something, the blame
usually stops with the small Potemkin corporations and does not spread up the chain of
command.
assassination program, which involved not only Joint Special Operations Command but
mercenary assassins to any place in the world to kill whoever was selected at the
moment. The operations were carried out without the knowledge of the CIA station
in the National Command Authority giving the orders. At other times it will be other
The corporate pay scale is always much better than the government pay scale.
There is a strong pull from the government sector to the private sector. Government
operatives are recruited while still employed by the various agencies. The private
network has already reached the point of no return, and it will not go away easily. As
2
Black, Erik. “Investigative reporter Seymour Hersh describes executive assassination ring”. Accessed at
http://www.minnpost.com/ericblackblog/2009/03/11/7310/investigative_reporter_seymour_hersh_describe
s_executive_assassination_ring on 3/9/10.
5
time goes on, more and more control will be lost by the lawful authorities and gained by
private interests.
We are familiar with concepts like equal and opposite reactions. We understand
that on a balance sheet every asset has a liability that goes with it. The intelligence
community has access to the private network, and this allows it to accomplish tasks
efficiently and effectively. This access is mostly outside of any meaningful oversight,
and this is why the agencies are going along with the privatization. The other side of this
coin is that the private network has access to the United States government.
An invisible covert army has been built that cuts across the agencies. The private
corporations sometimes work for the government, and we must fear that sometimes the
government works for the private corporations. On January 4th 2010 Richard Wolffe, a
that some faction inside the U.S. government intentionally allowed the underwear
bomber to board the flight to Detroit on Christmas Day 20093. He was saying that this
was essentially a false flag operation being conducted by a rogue element within the
government. This was subsequently confirmed in hearings on January 27th by the House
bomber was under the control of intelligence assets of an unnamed agency, which
ordered the State Department not to revoke his visa. Some operative escorted the mental
basket case patsy onto the plane without even a passport, and the rest is history.
Sometimes it is the government and the intelligence process that will order covert
action. It appears that covert action is being used to stampede the government and
3
Wolffe, Richard. Jan 4th 2010 episode of Countdown on MSNBC. Accessed at
http://www.youtube.com/watch?v=wRhQkS7Myqs on 3/9/10.
6
intelligence community to action as well. No one can tell who someone really works for
just by looking at where their pay cheque comes from at the moment. The possibility of
people with different loyalties being in the same planning meetings is now real.