HOME

TheInfoList



OR:

A clandestine operation (op) is an
intelligence Intelligence has been defined in many ways: the capacity for abstraction, logic, understanding, self-awareness, learning, emotional knowledge, reasoning, planning, creativity, critical thinking, and problem-solving. It can be described as t ...
or
military operation A military operation (op) is the coordinated military actions of a state, or a non-state actor, in response to a developing situation. These actions are designed as a military plan to resolve the situation in the state or actor's favor. Operati ...
carried out in such a way that the operation goes unnoticed by the general population or specific enemy forces. Until the 1970s, clandestine operations were primarily political in nature, generally aimed at assisting groups or nations favored by the sponsor. Examples include U.S. intelligence involvement with German and Japanese war criminals after World War II or the botched
Bay of Pigs Invasion The Bay of Pigs Invasion (, sometimes called or after the Playa Girón) was a failed military landing operation on the southwestern coast of Cuba in April 1961 by the United States of America and the Cuban Democratic Revolutionary Front ...
in 1961. Today these operations are numerous and include technology-related clandestine operations. The bulk of clandestine operations are related to the gathering of intelligence, typically by both people ( clandestine human intelligence) and by hidden
sensor A sensor is often defined as a device that receives and responds to a signal or stimulus. The stimulus is the quantity, property, or condition that is sensed and converted into electrical signal. In the broadest definition, a sensor is a devi ...
s. Placement of underwater or land-based communications cable taps,
camera A camera is an instrument used to capture and store images and videos, either digitally via an electronic image sensor, or chemically via a light-sensitive material such as photographic film. As a pivotal technology in the fields of photograp ...
s,
microphone A microphone, colloquially called a mic (), or mike, is a transducer that converts sound into an electrical signal. Microphones are used in many applications such as telephones, hearing aids, public address systems for concert halls and publi ...
s, traffic sensors, monitors such as sniffers, and similar systems require that the mission go undetected and unsuspected. Clandestine sensors may also be on
unmanned underwater vehicle Unmanned underwater vehicles (UUV), also known as underwater drones, are submersible vehicles that can operate underwater without a human occupant. These vehicles may be divided into two categories: remotely operated underwater vehicles (ROUVs) an ...
s, reconnaissance (spy) satellites (such as
Misty In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric. MISTY1 is one of the selected algorithms in the European NESSIE project, and has been among the cryptographic tech ...
), low-observability
unmanned aerial vehicle An unmanned aerial vehicle (UAV) or unmanned aircraft system (UAS), commonly known as a drone, is an aircraft with no human pilot, crew, or passengers onboard, but rather is controlled remotely or is autonomous.De Gruyter Handbook of Dron ...
s (UAV), or unmanned detectors (as in Operation Igloo White and its successors), or hand-placed by clandestine human operations. The
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
Department of Defense Dictionary of Military and Associated Terms The ''Department of Defense Dictionary of Military and Associated Terms'' is a compendium of terminology used by the United States Department of Defense (DOD). The print version consists of 574 pages of terms and 140 pages of acronyms. It sets for ...
(Joint Publication JP 1-02, dated 8 November 2010, Amended Through 15 February 2016) defines "clandestine", "clandestine intelligence collection", and "clandestine operation" as The DOD Dictionary of Military and Associated Terms (January 2021) defines "clandestine" and "clandestine operation" the same way. The terms ''clandestine'' and ''covert'' are not synonymous. As noted in the definition (which has been used by the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
and
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
since
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
) in a
covert operation A covert operation or undercover operation is a military or police operation involving a covert agent or troops acting under an assumed cover to conceal the identity of the party responsible. US law Under US law, the Central Intelligence A ...
the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, ''clandestine'' means "hidden", where the aim is for the operation to not be noticed at all. ''Covert'' means "deniable", such that if the operation is noticed, it is not attributed to a group. The term ''stealth'' refers both to a broad set of
tactic Tactic(s) or Tactical may refer to: * Tactic (method), a conceptual action implemented as one or more specific tasks ** Military tactics, the disposition and maneuver of units on a particular sea or battlefield ** Chess tactics ** Political tacti ...
s aimed at providing and preserving the element of surprise and reducing enemy resistance. It can also be used to describe a set of
technologies Technology is the application of Conceptual model, conceptual knowledge to achieve practical goals, especially in a reproducible way. The word ''technology'' can also mean the products resulting from such efforts, including both tangible too ...
(
stealth technology Stealth technology, also termed low observable technology (LO technology), is a sub-discipline of military tactics and passive and active electronic countermeasures. The term covers a range of military technology, methods used to make personnel ...
) to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms ''secret'' and ''stealthy'' are not used to formally describe types of missions. Some operations may have both clandestine and covert aspects, such as the use of concealed remote sensors or human observers to direct
artillery Artillery consists of ranged weapons that launch Ammunition, munitions far beyond the range and power of infantry firearms. Early artillery development focused on the ability to breach defensive walls and fortifications during sieges, and l ...
attacks and
airstrike An airstrike, air strike, or air raid is an offensive operation carried out by aircraft. Air strikes are delivered from aircraft such as blimps, balloons, fighter aircraft, attack aircraft, bombers, attack helicopters, and drones. The official d ...
s. The attack is obviously overt (coming under attack alerts the target that he has been located by the enemy), but the targeting component (the exact method that was used to locate targets) can remain clandestine. In
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
, targets found through
cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
of
radio Radio is the technology of communicating using radio waves. Radio waves are electromagnetic waves of frequency between 3  hertz (Hz) and 300  gigahertz (GHz). They are generated by an electronic device called a transmitter connec ...
communication were attacked only if there had been aerial reconnaissance in the area, or, in the case of the shootdown of
Admiral Admiral is one of the highest ranks in many navies. In the Commonwealth nations and the United States, a "full" admiral is equivalent to a "full" general in the army or the air force. Admiral is ranked above vice admiral and below admiral of ...
Isoroku Yamamoto was a Marshal Admiral of the Imperial Japanese Navy (IJN) and the commander-in-chief of the Combined Fleet during World War II. He commanded the fleet from 1939 until his death in 1943, overseeing the start of the Pacific War in 1941 and J ...
, where the sighting could be attributed to the Coastwatchers. During the
Vietnam War The Vietnam War (1 November 1955 – 30 April 1975) was an armed conflict in Vietnam, Laos, and Cambodia fought between North Vietnam (Democratic Republic of Vietnam) and South Vietnam (Republic of Vietnam) and their allies. North Vietnam w ...
, trucks attacked on the
Ho Chi Minh trail The Ho Chi Minh Trail (), also called Annamite Range Trail () was a Military logistics, logistical network of roads and trails that ran from North Vietnam to South Vietnam through the kingdoms of Kingdom of Laos, Laos and Cambodia (1953–1970), ...
were completely unaware of some sensors, such as the airborne Black Crow device that sensed their ignition. They could also have been spotted by a clandestine human patrol. Harassing and interdiction (H&I) or free-fire zone rules can also cause a target to be hit for purely random reasons.


See also

*
Covert operation A covert operation or undercover operation is a military or police operation involving a covert agent or troops acting under an assumed cover to conceal the identity of the party responsible. US law Under US law, the Central Intelligence A ...
*
Fifth column A fifth column is a group of people who undermine a larger group or nation from within, usually in favor of an enemy group or another nation. The activities of a fifth column can be overt or clandestine. Forces gathered in secret can mobilize ...
*
Special Activities Center The Special Activities Center (SAC) is the center of the United States Central Intelligence Agency responsible for covert operations. The unit was named Special Activities Division (SAD) prior to a 2015 reorganization. Within SAC there are at l ...
*
Plausible deniability Plausible deniability is the ability of people, typically senior officials in a formal or informal chain of command, to deny knowledge or responsibility for actions committed by or on behalf of members of their organizational hierarchy. They may ...


References


External links

* * International Society for Intelligence Research
homepage


{{DEFAULTSORT:Clandestine Operation Intelligence operations by type Clandestine operations