SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Cogan CG. Stud. Conflict Terrorism 1993; 16(2): 87-97.

Copyright

(Copyright © 1993, Informa - Taylor and Francis Group)

DOI

10.1080/10576109308435922

PMID

unavailable

Abstract

Covert action, i.e. covert operations whose main object is not the collection of intelligence, is a child of the Cold War. Almost haphazardly, it came to be conducted by the CIA, the nation's principal foreign intelligence service. Covert action, in its early years surrounded by secrecy, did not become legally subjected to congressional oversight until the Hughes‐Ryan Amendment, 14 years after the Bay of Pigs. In this legislation, and in the follow‐on Intelligence Oversight Act of 1980, covert action came under a separate oversight process than the collection of intelligence. In the Intelligence Authorization Act of 1991, in which covert action for the first time was officially admitted by name as an activity of the U.S. Government, certain loopholes were addressed which had been revealed by Iran‐Contra (the issues of timely notification of Congress, involvement of third parties, and involvement of other U.S. Government agencies). Issues still remain, including the conduct of liaison with foreign intelligence services, which is outside of the covert action oversight process--although at times such liaisons are made as much for the purpose of establishing influence as for collecting intelligence.


Language: en

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print