25:
501:
141:
311:. The attack is obviously overt (coming under attack alerts the target that he has been located by the enemy), but the targeting component (the exact method that was used to locate targets) can remain clandestine.
522:
IC21: The
Intelligence Community in the 21st Century Staff Study Permanent Select Committee on Intelligence House of Representatives One Hundred Fourth Congress IX. Clandestine Service Executive Summary
303:
are not used to formally describe types of missions. Some operations may have both clandestine and covert aspects, such as the use of concealed remote sensors or human observers to direct
214:
217:(Joint Publication JP 1-02, dated 8 November 2010, Amended Through 15 February 2016) defines "clandestine", "clandestine intelligence collection", and "clandestine operation" as
444:
140:
Until the 1970s, clandestine operations were primarily political in nature, generally aimed at assisting groups or nations favored by the sponsor. Examples include
331:
224:— Any activity or operation sponsored or conducted by governmental departments or agencies with the intent to assure secrecy and concealment. (JP 2-01.2)
230:— The acquisition of protected intelligence information in a way designed to conceal the nature of the operation and protect the source. (JP 2-01.2)
511:
353:
device that sensed their ignition. They could also have been spotted by a clandestine human patrol. Harassing and interdiction (H&I) or
236:— An operation sponsored or conducted by governmental departments or agencies in such a way as to assure secrecy or concealment. See also
152:
407:"JP 1-02, Department of Defencse Dictionary of Military And Associated Terms, 8 November 2010 (As Amended Through 15 February 2016)"
89:
536:
244:
The DOD Dictionary of
Military and Associated Terms (January 2021) defines "clandestine" and "clandestine operation" the same way.
451:
287:
aimed at providing and preserving the element of surprise and reducing enemy resistance. It can also be used to describe a set of
61:
505:
271:
the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently,
204:
196:
42:
68:
295:) to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms
75:
108:
57:
541:
179:, and similar systems require that the mission go undetected and unsuspected. Clandestine sensors may also be on
137:
carried out in such a way that the operation goes unnoticed by the general population or specific enemy forces.
156:
46:
326:
communication were attacked only if there had been aerial reconnaissance in the area, or, in the case of the
180:
188:
381:
521:
482:
430:
148:
in 1961. Today these operations are numerous and include technology-related clandestine operations.
279:
means "deniable", such that if the operation is noticed, it is not attributed to a group. The term
82:
192:
35:
469:
417:
386:
350:
200:
145:
8:
327:
292:
142:
U.S. intelligence involvement with German and
Japanese war criminals after World War II
134:
346:
164:
16:
Coordinated actions undertaken by a group that are to be kept secret from the public
371:
334:
284:
268:
366:
176:
354:
275:
means "hidden", where the aim is for the operation to not be noticed at all.
530:
338:
319:
256:
211:
184:
406:
376:
315:
264:
255:
are not synonymous. As noted in the definition (which has been used by the
342:
288:
172:
308:
304:
130:
24:
357:
rules can also cause a target to be hit for purely random reasons.
215:
Department of
Defense Dictionary of Military and Associated Terms
500:
445:"DOD Dictionary of Military and Associated Terms, January 2021"
168:
160:
349:
were completely unaware of some sensors, such as the airborne
515:
323:
163:. Placement of underwater or land-based communications cable
260:
151:
The bulk of clandestine operations are related to the
49:. Unsourced material may be challenged and removed.
528:
337:, where the sighting could be attributed to the
512:International Society for Intelligence Research
109:Learn how and when to remove this message
529:
175:, traffic sensors, monitors such as
47:adding citations to reliable sources
18:
228:clandestine intelligence collection
13:
14:
553:
493:
238:covert operation; overt operation
207:by clandestine human operations.
499:
23:
537:Intelligence operations by type
185:reconnaissance (spy) satellites
34:needs additional citations for
437:
399:
283:refers both to a broad set of
157:clandestine human intelligence
1:
392:
181:unmanned underwater vehicles
155:, typically by both people (
7:
360:
10:
558:
382:Special Activities Center
345:, trucks attacked on the
153:gathering of intelligence
450:: 34, 35. Archived from
318:, targets found through
203:and its successors), or
193:unmanned aerial vehicles
58:"Clandestine operation"
542:Clandestine operations
506:Clandestine operations
477:Cite journal requires
425:Cite journal requires
412:. 8 November 2010: 33.
242:
387:Plausible deniability
234:clandestine operation
219:
201:Operation Igloo White
191:), low-observability
123:clandestine operation
508:at Wikimedia Commons
146:Bay of Pigs Invasion
43:improve this article
293:stealth technology
197:unmanned detectors
135:military operation
504:Media related to
347:Ho Chi Minh trail
119:
118:
111:
93:
549:
503:
487:
486:
480:
475:
473:
465:
463:
462:
456:
449:
441:
435:
434:
428:
423:
421:
413:
411:
403:
372:Covert operation
335:Isoroku Yamamoto
269:covert operation
159:) and by hidden
114:
107:
103:
100:
94:
92:
51:
27:
19:
557:
556:
552:
551:
550:
548:
547:
546:
527:
526:
496:
491:
490:
478:
476:
467:
466:
460:
458:
454:
447:
443:
442:
438:
426:
424:
415:
414:
409:
405:
404:
400:
395:
367:Black operation
363:
144:or the botched
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
555:
545:
544:
539:
525:
524:
519:
509:
495:
494:External links
492:
489:
488:
479:|journal=
436:
427:|journal=
397:
396:
394:
391:
390:
389:
384:
379:
374:
369:
362:
359:
355:free-fire zone
117:
116:
31:
29:
22:
15:
9:
6:
4:
3:
2:
554:
543:
540:
538:
535:
534:
532:
523:
520:
517:
513:
510:
507:
502:
498:
497:
484:
471:
457:on 2021-10-17
453:
446:
440:
432:
419:
408:
402:
398:
388:
385:
383:
380:
378:
375:
373:
370:
368:
365:
364:
358:
356:
352:
348:
344:
341:. During the
340:
339:Coastwatchers
336:
333:
329:
325:
321:
320:cryptanalysis
317:
312:
310:
306:
302:
298:
294:
290:
286:
282:
278:
274:
270:
266:
262:
258:
257:United States
254:
250:
245:
241:
239:
235:
231:
229:
225:
223:
218:
216:
213:
212:United States
208:
206:
202:
198:
194:
190:
186:
182:
178:
174:
170:
166:
162:
158:
154:
149:
147:
143:
138:
136:
132:
128:
124:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
470:cite journal
459:. Retrieved
452:the original
439:
418:cite journal
401:
377:Fifth column
316:World War II
313:
307:attacks and
300:
296:
289:technologies
280:
276:
272:
265:World War II
252:
248:
246:
243:
237:
233:
232:
227:
226:
221:
220:
209:
150:
139:
131:intelligence
126:
122:
120:
105:
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
343:Vietnam War
273:clandestine
249:clandestine
240:. (JP 3-05)
222:clandestine
205:hand-placed
173:microphones
531:Categories
461:2021-04-09
393:References
351:Black Crow
309:airstrikes
247:The terms
195:(UAV), or
69:newspapers
328:shootdown
305:artillery
187:(such as
516:homepage
361:See also
301:stealthy
177:sniffers
129:) is an
99:May 2008
332:Admiral
285:tactics
281:stealth
267:) in a
199:(as in
169:cameras
161:sensors
83:scholar
297:secret
277:Covert
263:since
253:covert
85:
78:
71:
64:
56:
455:(PDF)
448:(PDF)
410:(PDF)
324:radio
189:Misty
90:JSTOR
76:books
483:help
431:help
299:and
261:NATO
259:and
251:and
210:The
165:taps
62:news
330:of
322:of
314:In
133:or
45:by
533::
474::
472:}}
468:{{
422::
420:}}
416:{{
183:,
171:,
167:,
127:op
121:A
518:)
514:(
485:)
481:(
464:.
433:)
429:(
291:(
125:(
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.