Knowledge

Clandestine operation

Source 📝

25: 501: 141: 311:. The attack is obviously overt (coming under attack alerts the target that he has been located by the enemy), but the targeting component (the exact method that was used to locate targets) can remain clandestine. 522:
IC21: The Intelligence Community in the 21st Century Staff Study Permanent Select Committee on Intelligence House of Representatives One Hundred Fourth Congress IX. Clandestine Service Executive Summary
303:
are not used to formally describe types of missions. Some operations may have both clandestine and covert aspects, such as the use of concealed remote sensors or human observers to direct
214: 217:(Joint Publication JP 1-02, dated 8 November 2010, Amended Through 15 February 2016) defines "clandestine", "clandestine intelligence collection", and "clandestine operation" as 444: 140:
Until the 1970s, clandestine operations were primarily political in nature, generally aimed at assisting groups or nations favored by the sponsor. Examples include
331: 224:— Any activity or operation sponsored or conducted by governmental departments or agencies with the intent to assure secrecy and concealment. (JP 2-01.2) 230:— The acquisition of protected intelligence information in a way designed to conceal the nature of the operation and protect the source. (JP 2-01.2) 511: 353:
device that sensed their ignition. They could also have been spotted by a clandestine human patrol. Harassing and interdiction (H&I) or
236:— An operation sponsored or conducted by governmental departments or agencies in such a way as to assure secrecy or concealment. See also 152: 407:"JP 1-02, Department of Defencse Dictionary of Military And Associated Terms, 8 November 2010 (As Amended Through 15 February 2016)" 89: 536: 244:
The DOD Dictionary of Military and Associated Terms (January 2021) defines "clandestine" and "clandestine operation" the same way.
451: 287:
aimed at providing and preserving the element of surprise and reducing enemy resistance. It can also be used to describe a set of
61: 505: 271:
the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently,
204: 196: 42: 68: 295:) to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms 75: 108: 57: 541: 179:, and similar systems require that the mission go undetected and unsuspected. Clandestine sensors may also be on 137:
carried out in such a way that the operation goes unnoticed by the general population or specific enemy forces.
156: 46: 326:
communication were attacked only if there had been aerial reconnaissance in the area, or, in the case of the
180: 188: 381: 521: 482: 430: 148:
in 1961. Today these operations are numerous and include technology-related clandestine operations.
279:
means "deniable", such that if the operation is noticed, it is not attributed to a group. The term
82: 192: 35: 469: 417: 386: 350: 200: 145: 8: 327: 292: 142:
U.S. intelligence involvement with German and Japanese war criminals after World War II
134: 346: 164: 16:
Coordinated actions undertaken by a group that are to be kept secret from the public
371: 334: 284: 268: 366: 176: 354: 275:
means "hidden", where the aim is for the operation to not be noticed at all.
530: 338: 319: 256: 211: 184: 406: 376: 315: 264: 255:
are not synonymous. As noted in the definition (which has been used by the
342: 288: 172: 308: 304: 130: 24: 357:
rules can also cause a target to be hit for purely random reasons.
215:
Department of Defense Dictionary of Military and Associated Terms
500: 445:"DOD Dictionary of Military and Associated Terms, January 2021" 168: 160: 349:
were completely unaware of some sensors, such as the airborne
515: 323: 163:. Placement of underwater or land-based communications cable 260: 151:
The bulk of clandestine operations are related to the
49:. Unsourced material may be challenged and removed. 528: 337:, where the sighting could be attributed to the 512:International Society for Intelligence Research 109:Learn how and when to remove this message 529: 175:, traffic sensors, monitors such as 47:adding citations to reliable sources 18: 228:clandestine intelligence collection 13: 14: 553: 493: 238:covert operation; overt operation 207:by clandestine human operations. 499: 23: 537:Intelligence operations by type 185:reconnaissance (spy) satellites 34:needs additional citations for 437: 399: 283:refers both to a broad set of 157:clandestine human intelligence 1: 392: 181:unmanned underwater vehicles 155:, typically by both people ( 7: 360: 10: 558: 382:Special Activities Center 345:, trucks attacked on the 153:gathering of intelligence 450:: 34, 35. Archived from 318:, targets found through 203:and its successors), or 193:unmanned aerial vehicles 58:"Clandestine operation" 542:Clandestine operations 506:Clandestine operations 477:Cite journal requires 425:Cite journal requires 412:. 8 November 2010: 33. 242: 387:Plausible deniability 234:clandestine operation 219: 201:Operation Igloo White 191:), low-observability 123:clandestine operation 508:at Wikimedia Commons 146:Bay of Pigs Invasion 43:improve this article 293:stealth technology 197:unmanned detectors 135:military operation 504:Media related to 347:Ho Chi Minh trail 119: 118: 111: 93: 549: 503: 487: 486: 480: 475: 473: 465: 463: 462: 456: 449: 441: 435: 434: 428: 423: 421: 413: 411: 403: 372:Covert operation 335:Isoroku Yamamoto 269:covert operation 159:) and by hidden 114: 107: 103: 100: 94: 92: 51: 27: 19: 557: 556: 552: 551: 550: 548: 547: 546: 527: 526: 496: 491: 490: 478: 476: 467: 466: 460: 458: 454: 447: 443: 442: 438: 426: 424: 415: 414: 409: 405: 404: 400: 395: 367:Black operation 363: 144:or the botched 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 555: 545: 544: 539: 525: 524: 519: 509: 495: 494:External links 492: 489: 488: 479:|journal= 436: 427:|journal= 397: 396: 394: 391: 390: 389: 384: 379: 374: 369: 362: 359: 355:free-fire zone 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 554: 543: 540: 538: 535: 534: 532: 523: 520: 517: 513: 510: 507: 502: 498: 497: 484: 471: 457:on 2021-10-17 453: 446: 440: 432: 419: 408: 402: 398: 388: 385: 383: 380: 378: 375: 373: 370: 368: 365: 364: 358: 356: 352: 348: 344: 341:. During the 340: 339:Coastwatchers 336: 333: 329: 325: 321: 320:cryptanalysis 317: 312: 310: 306: 302: 298: 294: 290: 286: 282: 278: 274: 270: 266: 262: 258: 257:United States 254: 250: 245: 241: 239: 235: 231: 229: 225: 223: 218: 216: 213: 212:United States 208: 206: 202: 198: 194: 190: 186: 182: 178: 174: 170: 166: 162: 158: 154: 149: 147: 143: 138: 136: 132: 128: 124: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 470:cite journal 459:. Retrieved 452:the original 439: 418:cite journal 401: 377:Fifth column 316:World War II 313: 307:attacks and 300: 296: 289:technologies 280: 276: 272: 265:World War II 252: 248: 246: 243: 237: 233: 232: 227: 226: 221: 220: 209: 150: 139: 131:intelligence 126: 122: 120: 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 343:Vietnam War 273:clandestine 249:clandestine 240:. (JP 3-05) 222:clandestine 205:hand-placed 173:microphones 531:Categories 461:2021-04-09 393:References 351:Black Crow 309:airstrikes 247:The terms 195:(UAV), or 69:newspapers 328:shootdown 305:artillery 187:(such as 516:homepage 361:See also 301:stealthy 177:sniffers 129:) is an 99:May 2008 332:Admiral 285:tactics 281:stealth 267:) in a 199:(as in 169:cameras 161:sensors 83:scholar 297:secret 277:Covert 263:since 253:covert 85:  78:  71:  64:  56:  455:(PDF) 448:(PDF) 410:(PDF) 324:radio 189:Misty 90:JSTOR 76:books 483:help 431:help 299:and 261:NATO 259:and 251:and 210:The 165:taps 62:news 330:of 322:of 314:In 133:or 45:by 533:: 474:: 472:}} 468:{{ 422:: 420:}} 416:{{ 183:, 171:, 167:, 127:op 121:A 518:) 514:( 485:) 481:( 464:. 433:) 429:( 291:( 125:( 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Clandestine operation"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
intelligence
military operation
U.S. intelligence involvement with German and Japanese war criminals after World War II
Bay of Pigs Invasion
gathering of intelligence
clandestine human intelligence
sensors
taps
cameras
microphones
sniffers
unmanned underwater vehicles
reconnaissance (spy) satellites
Misty
unmanned aerial vehicles
unmanned detectors
Operation Igloo White
hand-placed
United States

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.