Clandestine operation
Encyclopedia
A clandestine operation is an intelligence
Intelligence
Intelligence has been defined in different ways, including the abilities for abstract thought, understanding, communication, reasoning, learning, planning, emotional intelligence and problem solving....

 or military
Military
A military is an organization authorized by its greater society to use lethal force, usually including use of weapons, in defending its country by combating actual or perceived threats. The military may have additional functions of use to its greater society, such as advancing a political agenda e.g...

 operation
Military operation
Military operation is the coordinated military actions of a state in response to a developing situation. These actions are designed as a military plan to resolve the situation in the state's favor. Operations may be of combat or non-combat types, and are referred to by a code name for the purpose...

 carried out in such a way that the operation goes unnoticed.

The United States
United States
The United States of America is a federal constitutional republic comprising fifty states and a federal district...

 Department of Defense Dictionary of Military and Associated Terms
Department of Defense Dictionary of Military and Associated Terms
The Department of Defense Dictionary of Military and Associated Terms is a compendium of terminology used by the United States Department of Defense ....

 (Joint Publication JP1-02, dated 5 January 2007) defines "clandestine operation" as "An operation sponsored or conducted by government
Government
Government refers to the legislators, administrators, and arbitrators in the administrative bureaucracy who control a state at a given time, and to the system of government by which they are organized...

al departments or agencies
Government agency
A government or state agency is a permanent or semi-permanent organization in the machinery of government that is responsible for the oversight and administration of specific functions, such as an intelligence agency. There is a notable variety of agency types...

 in such a way as to assure secrecy or concealment. A clandestine operation differs from a covert operation
Covert operation
A covert operation is a military, intelligence or law enforcement operation that is carried clandestinely and, often, outside of official channels. Covert operations aim to fulfill their mission objectives without any parties knowing who sponsored or carried out the operation...

 in that emphasis is placed on concealment of the operation rather than on concealment of the identity of the sponsor. In special operations, an activity may be both covert and clandestine and may focus equally on operational considerations and intelligence-related activities." (JP 3-05.1).

The bulk of clandestine operations are related to the gathering of intelligence, typically by both people (Clandestine HUMINT
Clandestine HUMINT
Clandestine HUMINT includes a wide range of espionage sources. This includes the classic spy who collects intelligence, but also couriers and other personnel, who handle their secure communications...

) and by hidden sensor
Sensor
A sensor is a device that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument. For example, a mercury-in-glass thermometer converts the measured temperature into expansion and contraction of a liquid which can be read on a calibrated...

s. Placement of underwater or land-based communications cable taps
Telephone tapping
Telephone tapping is the monitoring of telephone and Internet conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line...

, camera
Camera
A camera is a device that records and stores images. These images may be still photographs or moving images such as videos or movies. The term camera comes from the camera obscura , an early mechanism for projecting images...

s, microphone
Microphone
A microphone is an acoustic-to-electric transducer or sensor that converts sound into an electrical signal. In 1877, Emile Berliner invented the first microphone used as a telephone voice transmitter...

s, traffic sensors, monitors such as sniffer
Sniffer
Sniffer may refer to:* Packet analyzer , computer software or hardware that can intercept and log traffic passing over a digital network...

s, and similar systems require that the mission go undetected and unsuspected. Clandestine sensors may also be on unmanned underwater vehicle
Unmanned underwater vehicle
Unmanned underwater vehicles are any vehicles that are able to operate underwater without a human occupant. These vehicles may be divided into two categories, Remotely operated underwater vehicles , which are controlled by a remote human operator, and Autonomous underwater vehicles , which...

s, reconnaissance (spy) satellites
Spy satellite
A spy satellite is an Earth observation satellite or communications satellite deployed for military or intelligence applications....

 (such as Misty
Misty (classified project)
Misty is reportedly the name of a classified project by the United States National Reconnaissance Office to operate stealthy reconnaissance satellites. The satellites are conjectured to be photo reconnaissance satellites and the program has been the subject of atypically public debates about its...

), low-observability unmanned aerial vehicle
Unmanned aerial vehicle
An unmanned aerial vehicle , also known as a unmanned aircraft system , remotely piloted aircraft or unmanned aircraft, is a machine which functions either by the remote control of a navigator or pilot or autonomously, that is, as a self-directing entity...

s (UAV), or unmanned detectors
Measurement and Signature Intelligence
Measurement and signature intelligence is a branch of intelligence gathering activities.MASINT, may have aspects of intelligence analysis management, since certain aspects of MASINT, such as the analysis of electromagnetic radiation received by signals intelligence are more of an analysis...

 (as in Operation Igloo White
Operation Igloo White
Operation Igloo White was a covert United States Air Force electronic warfare operation conducted from late January 1968 until February 1973, during the Vietnam War. This state-of-the-art operation utilized electronic sensors, computers, and communications relay aircraft in an attempt to automate...

 and its successors), or hand-placed
Measurement and Signature Intelligence
Measurement and signature intelligence is a branch of intelligence gathering activities.MASINT, may have aspects of intelligence analysis management, since certain aspects of MASINT, such as the analysis of electromagnetic radiation received by signals intelligence are more of an analysis...

 by clandestine human operations.

The terms clandestine and covert are not synonymous. As noted in the definition (which has been used by the United States
United States
The United States of America is a federal constitutional republic comprising fifty states and a federal district...

 and NATO since World War II
World War II
World War II, or the Second World War , was a global conflict lasting from 1939 to 1945, involving most of the world's nations—including all of the great powers—eventually forming two opposing military alliances: the Allies and the Axis...

) in a covert operation the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden," while covert means "deniable." The term stealth refers both to a broad set of tactic
Military tactics
Military tactics, the science and art of organizing an army or an air force, are the techniques for using weapons or military units in combination for engaging and defeating an enemy in battle. Changes in philosophy and technology over time have been reflected in changes to military tactics. In...

s aimed at providing and preserving the element of surprise and reducing enemy resistance. It can also be used to describe a set of technologies
Technology
Technology is the making, usage, and knowledge of tools, machines, techniques, crafts, systems or methods of organization in order to solve a problem or perform a specific function. It can also refer to the collection of such tools, machinery, and procedures. The word technology comes ;...

 (stealth technology
Stealth technology
Stealth technology also termed LO technology is a sub-discipline of military tactics and passive electronic countermeasures, which cover a range of techniques used with personnel, aircraft, ships, submarines, and missiles, to make them less visible to radar, infrared, sonar and other detection...

) to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms secret and stealthy are not used to formally describe types of missions.

Some operations may have both clandestine and covert aspects, such as the use of concealed remote sensors or human observers to direct artillery
Artillery
Originally applied to any group of infantry primarily armed with projectile weapons, artillery has over time become limited in meaning to refer only to those engines of war that operate by projection of munitions far beyond the range of effect of personal weapons...

 attacks and airstrike
Airstrike
An air strike is an attack on a specific objective by military aircraft during an offensive mission. Air strikes are commonly delivered from aircraft such as fighters, bombers, ground attack aircraft, attack helicopters, and others...

s. The attack is obviously covert (coming under attack alerts the target that he has been located by the enemy), but the targeting component (the exact method that was used to locate targets) can remain clandestine.

In World War II
World War II
World War II, or the Second World War , was a global conflict lasting from 1939 to 1945, involving most of the world's nations—including all of the great powers—eventually forming two opposing military alliances: the Allies and the Axis...

, targets found through cryptanalysis
Cryptanalysis
Cryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required to do so. Typically, this involves knowing how the system works and finding a secret key...

 of radio
Radio
Radio is the transmission of signals through free space by modulation of electromagnetic waves with frequencies below those of visible light. Electromagnetic radiation travels by means of oscillating electromagnetic fields that pass through the air and the vacuum of space...

 communication, were attacked only if there had been aerial reconnaissance in the area, or, in the case of the shootdown of Admiral
Naval ranks of the Japanese Empire during World War II
The following graphs present the rank insignia of the Japanese navy during World War II. These designs had been used from 1931-1945, but were discontinued after World War II, when the Imperial Japanese Navy had been dissolved....

 Isoroku Yamamoto
Isoroku Yamamoto
was a Japanese Naval Marshal General and the commander-in-chief of the Combined Fleet during World War II, a graduate of the Imperial Japanese Naval Academy and a student of Harvard University ....

, where the sighting could be attributed to the Coastwatchers
Coastwatchers
The Coastwatchers, also known as the Coast Watch Organisation, Combined Field Intelligence Service or Section C, Allied Intelligence Bureau, were Allied military intelligence operatives stationed on remote Pacific islands during World War II to observe enemy movements and rescue stranded Allied...

. During the Vietnam War
Vietnam War
The Vietnam War was a Cold War-era military conflict that occurred in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. This war followed the First Indochina War and was fought between North Vietnam, supported by its communist allies, and the government of...

, trucks attacked on the Ho Chi Minh trail
Ho Chi Minh trail
The Ho Chi Minh trail was a logistical system that ran from the Democratic Republic of Vietnam to the Republic of Vietnam through the neighboring kingdoms of Laos and Cambodia...

 were completely unaware of some sensors, such as the airborne Black Crow
Radiofrequency MASINT
Radiofrequency MASINT is one of the six major disciplines generally accepted to make up the field of Measurement and Signature Intelligence , with due regard that the MASINT subdisciplines may overlap, and MASINT, in turn, is complementary to more traditional intelligence collection and analysis...

 device that sensed their ignition. They could also have been spotted by a clandestine human patrol. Harassing and interdiction (H&I) or free-fire zone
Free-fire zone
A free-fire zone in U.S. military parlance is a fire control measure, used for coordination between adjacent combat units. The definition used in the Vietnam war by US troops may be found in field manual FM 6-20:- Free-fire zones in the Vietnam War :...

 rules can also cause a target to be hit for purely random reasons.

Until the 1970s, clandestine operations were primarily political in nature, generally aimed at assisting groups or nations favored by the sponsor. Examples include U.S. intelligence involvement with German and Japanese war criminals after World War II
U.S. Intelligence involvement with German and Japanese War Criminals after World War II
While the United States was involved in the prosecution of war criminals, principally at the International Military Tribunal in Nuremberg and the International Military Tribunal for the Far East in Tokyo, the Nuremberg Military Tribunals, and other judicial proceedings, US military and...

. Today these operations are numerous and include technology-related clandestine operations.

See also

  • Black operation
    Black operation
    A black operation or black op is a covert operation typically involving activities that are highly clandestine and often outside of standard military protocol or even against the law.-Origins:...

  • Covert operation
    Covert operation
    A covert operation is a military, intelligence or law enforcement operation that is carried clandestinely and, often, outside of official channels. Covert operations aim to fulfill their mission objectives without any parties knowing who sponsored or carried out the operation...

  • Fifth column
    Fifth column
    A fifth column is a group of people who clandestinely undermine a larger group such as a nation from within.-Origin:The term originated with a 1936 radio address by Emilio Mola, a Nationalist General during the 1936–39 Spanish Civil War...

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK