13.07.2015 Views

US Training of Death Squads in Iraq? - War Is A Crime .org

US Training of Death Squads in Iraq? - War Is A Crime .org

US Training of Death Squads in Iraq? - War Is A Crime .org

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

What is Covert Action?J.V. Grady, ICHSeptember 21, 2005 "ICH" -- -- Intelligence services generally are <strong>org</strong>anized <strong>in</strong>to the follow<strong>in</strong>gmajor functional areas:· Intelligence Collection· Analysis· Counter<strong>in</strong>telligence· Covert ActionIntelligence Collection is the collection <strong>of</strong> Intelligence <strong>in</strong>formation, secret or otherwise, throughspy<strong>in</strong>g, <strong>in</strong>terrogation, satellites, etc. If the <strong>in</strong>formation is collected through spy<strong>in</strong>g or<strong>in</strong>terrogation, it is known as HUMINT (human <strong>in</strong>telligence). If it is collected through technicalmeans such as electronic eavesdropp<strong>in</strong>g or satellites, it is known as TECHINT (technical<strong>in</strong>telligence). Open-source Intelligence (OSINT) is <strong>in</strong>formation gathered from non-secret, publicsources.Intelligence Analysis is the assessment <strong>of</strong> collected raw <strong>in</strong>telligence and the process<strong>in</strong>g <strong>of</strong> it <strong>in</strong>tousable <strong>in</strong>telligence product that can be used to guide policy and operations.Counter<strong>in</strong>telligence has as its mission the prevention <strong>of</strong> a foreign <strong>in</strong>telligence service fromobta<strong>in</strong><strong>in</strong>g <strong>in</strong>telligence <strong>in</strong>formation from one’s own country. In a preventative role, it ensures theemployment <strong>of</strong> security practices to safeguard <strong>in</strong>formation. In a more active role, it conductsoperations aga<strong>in</strong>st enemy <strong>in</strong>telligence services; <strong>in</strong> other words, it spies on the spies. Such actionis <strong>of</strong>ten referred to as spycatch<strong>in</strong>g.Perhaps the most <strong>in</strong>terest<strong>in</strong>g and s<strong>in</strong>ister field <strong>in</strong> Intelligence is Covert Action (also referred to asClandest<strong>in</strong>e Operations, Black Ops, and Black Operations). Some do not consider Covert Actionas be<strong>in</strong>g part <strong>of</strong> the traditional Intelligence mission, and they therefore believe that it should betreated <strong>in</strong>dependently and even <strong>org</strong>anized with<strong>in</strong> a separate <strong>org</strong>anization. Others feel that,because it <strong>of</strong>ten <strong>in</strong>terrelates with Intelligence Operations and Counter<strong>in</strong>telligence Operations, itshould cont<strong>in</strong>ue to rema<strong>in</strong> with<strong>in</strong> the same rul<strong>in</strong>g <strong>org</strong>anization or apparatus.There are many types <strong>of</strong> Covert Action operations, not all <strong>of</strong> them violent. For example, if agovernment wishes to <strong>in</strong>fluence the politics <strong>of</strong> another country’s government, the governmentmay secretly fund an opposition party <strong>in</strong> that country <strong>in</strong> order to <strong>in</strong>fluence that country’selections. Another method is to employ foreign newspaper reporters to write articles that give theversion <strong>of</strong> events, the propaganda, that you want people to believe, even if it is the furthest th<strong>in</strong>gfrom the truth. Or perhaps the owners or editors <strong>of</strong> a newspaper or media service can be boughtor won over to allow articles or news stories created by the Intelligence <strong>org</strong>anization forpropaganda purposes to be planted <strong>in</strong> the newspaper or media service. A slant can then be givento <strong>in</strong>fluence public perceptions. For example, mercenaries can be referred to as “contractors”,224

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!