Covert Action
A Government Practitioner’s Guide to Countering Online Foreign Covert Influence
How can the practitioner actually counter online foreign covert influence operations?
In the aftermath of bloody and inconclusive wars in Iraq and Afghanistan, the United States has relied heavily on covert operations. Drone strikes, the signature tools of the “light footprint” war the United States is increasingly fighting, have devastated Al Qaeda’s senior leadership. Special forces raids have produced key intelligence coups. The CIA has steadily transformed itself from an organization combating the intelligence efforts of foreign countries into a key operational tool in the fight against terror groups. But many observers worry that such tactics create more enemies than they kill and lack the accountability of more overt military conflict. As the long war continues, covert action is the new normal.
Latest in Covert Action
How can the practitioner actually counter online foreign covert influence operations?
A major story from Yahoo News discloses the existence of a broad covert action finding directing the CIA to engage Iran, Russia and others in cyberspace. Here’s what you need to know.
If Joe Biden wins the November election, Americans will likely see a reversion to a more traditional approach to the presidency. What might that mean in the field of U.S. national security?
I recently was a guest lecturer on covert action in a law school seminar. For anyone interested, my instructional approach (fictional scenario, issues for consideration, operational proposals) is available here —feel free to use it (or, better yet, improve on it). In this post I offer a few practitioner-focused thoughts on the “why,” “what” and “how” that informed my planning for this class. I hope this background description and approach are useful to others teaching about covert action.
Tomorrow is an ignominious anniversary. On that date in 1961, about 1,400 American-trained Cuban exiles launched a secret invasion of Cuba in an effort to overthrow the Fidel Castro regime. After landing on the island’s southern coast at the Bay of Pigs, the invading guerrillas were routed by government forces. The humiliating disaster gave rise to a rare, publicly available Justice Department analysis of presidential power to wage covert war.
Editor's note: In response to criticism from CIA Director Mike Pompeo, the New York Times' national security editor over the weekend defended the newspaper's
Greg Miller has an interesting and seemingly quite well-sourced article in the Washington Post today documenting (and offering explanations for) a significant decline in CIA drone strikes. To be clear, the claim is not that drone strikes on the whole are in decline.
The Central Intelligence Agency has released five newly declassified documents. The release states that each document related to a 2005 Office of Inspector General (OIG) report examing the Agency's accountability regarding the previous findings and conclusions from an inquiry into intelligence community activities before and after the attacks of September 11th.
One thing I love about the various annual authorization bills is that they often contain very interesting but little-noticed provisions. The Intelligence Authorization Act for Fiscal Year 2016, which HPSCI (the House Permanent Select Committee on Intelligence) voted out last week, is no exception. The full text is here, and my top-five highlights appear below:
Section 303: The Intelligence Committees want in on Special Access Program reporting.
It's a crowded field for Republican presidential candidates, but Lindsey Graham knows how to differentiate himself from the pack: he loves drone strikes more than his competitors.
Speaking the other night at the Iowa Republican Lincoln Dinner, as the Washington Post reports,
Graham made clear he is positioning himself as the most hawkish candidate in the field.