Jurnal 3
Jurnal 3
To cite this article: Len Scott (2004) Secret Intelligence, Covert Action and
Clandestine Diplomacy, Intelligence and National Security, 19:2, 322-341, DOI:
10.1080/0268452042000302029
Taylor & Francis makes every effort to ensure the accuracy of all
the information (the “Content”) contained in the publications on our
platform. However, Taylor & Francis, our agents, and our licensors
make no representations or warranties whatsoever as to the accuracy,
completeness, or suitability for any purpose of the Content. Any opinions
and views expressed in this publication are the opinions and views of
the authors, and are not the views of or endorsed by Taylor & Francis.
The accuracy of the Content should not be relied upon and should be
independently verified with primary sources of information. Taylor and
Francis shall not be liable for any losses, actions, claims, proceedings,
demands, costs, expenses, damages, and other liabilities whatsoever
or howsoever caused arising directly or indirectly in connection with, in
relation to or arising out of the use of the Content.
This article may be used for research, teaching, and private study
purposes. Any substantial or systematic reproduction, redistribution,
reselling, loan, sub-licensing, systematic supply, or distribution in any
form to anyone is expressly forbidden. Terms & Conditions of access
and use can be found at [Link]
conditions
Downloaded by [North Dakota State University] at 12:35 20 September 2013
Secret Intelligence, Covert Action and
Clandestine Diplomacy
LEN SCOTT
Downloaded by [North Dakota State University] at 12:35 20 September 2013
‘The essential skill of a secret service is to get things done secretly and
deniably.’
(John Bruce Lockhart, former Deputy Chief of SIS)1
Intelligence and National Security, Vol.19, No.2, Summer 2004, pp.322 – 341
ISSN 0268-4527 print 1743-9019 online
DOI: 10.1080/0268452042000302029 # 2004 Taylor & Francis Ltd.
COVERT ACTION AND CLANDESTINE DIPLOMACY 323
Whether phrases such as ‘regime change’ that have emerged in public debate
over Iraq will enter the covert lexicon remains to be seen.
One commonly accepted aspect of these definitions is that they refer to
actions abroad. In the United States this reflects the legal status of the US
intelligence services. Elsewhere, the distinction between home and abroad
may be less clear. Some governments practice at home what they undertake
abroad. Oleg Kalugin has recounted how the KGB conducted active measures
against one of its leading dissidents, Alexander Solzhenitsin, culminating in
attempts to poison him.12 Various British government activities in Northern
Ireland, for example, appear to fall within otherwise accepted definitions of
covert action.13
British terminology has moved from ‘special operations’ to ‘special
political action’ to ‘disruptive action’.14 These semantic changes reflect
broader shifts in policy. The ‘special political action’ of the 1950s, for
example, was synonymous with intervention aimed at overthrowing
governments and in some cases assassinating leaders.15 Since then, changes
in the scope and nature of operations have reflected the priorities and
perspectives of governments and of SIS itself. Although the Intelligence
Services Act 1994 makes clear that SIS’s mandate is to engage in ‘other
tasks’ beside espionage, the scope and nature of these other tasks is unclear.16
‘Disruptive action’ is nowhere officially defined, though there are some
official references to the term.17 What is involved is unclear from official
references. It may be unwise to infer that disruptive activity is exclusively
clandestine. Some activities might involve passing information to other states
and agencies to enable them to act against arms dealers or terrorists, and
would fall within the ambit of intelligence liaison. How far, and in what
ways, actions are undertaken without knowledge or permission of the host
nations or organisations are the more controversial questions. David Shayler,
the former MI5 officer, has revealed or alleged that SIS supported groups
COVERT ACTION AND CLANDESTINE DIPLOMACY 325
activities involved.
Elizabeth Anderson has argued that ‘the specific subject of covert action as
an element of intelligence has suffered a deficiency of serious study’; she
notes a failure to generate the theoretical concepts to explain other
instruments of foreign policy such as trade, force and diplomacy.20
Nevertheless, the American literature provides typologies that distinguish
between political action, economic action, propaganda and paramilitary
activities.21 The nature and scope of these activities differs across time, place
and context. How far these categories reflect the distillation of American
experience and reflection is one question to ask. Yet whatever the theory and
practice in other states, American debates about whether covert action should
be viewed as a routine instrument of statecraft, a weapon of last resort or the
subversion of democratic values will presumably be familiar to many of those
contemplating such options.
INTERPRETATION
politics. This has been apparent in recent historiography of the Cold War that
has drawn from the archives and from the scholarship of former adversaries,
and provided new insights and perspectives. The international history of
secret intervention is surely part of this enterprise and of how mutual
perceptions and misperceptions informed the Cold War struggle. This is an
area that parallels the nuclear history of the Cold War where Soviet archival
disclosures raise fascinating and disturbing questions about Soviet threat
perceptions.
Until recently, these aspects have been under-explored. While John
Gaddis’ acclaimed 1997 study of the new historiography of the Cold War
provides evidence of how Soviet covert action impacted on Western
approaches, there is little on how Soviet leaders interpreted Western secret
intervention.35 Other accounts drawn from Soviet archival sources have
begun to emphasise the importance of Soviet perceptions and misperceptions.
Vojtech Mastny has explored how Western covert action in eastern Europe
and the Soviet Union exerted a significant and undue influence on Stalin’s
paranoia.36 Richard Aldrich has raised the controversial question of whether
Western covert action in eastern Europe was specifically designed to provoke
Soviet repression in order to destabilise and weaken Soviet hegemony.37
Recent interpretations of the nature and role of US covert action have indeed
provoked radical revisions of the Cold War itself.38
Such perspectives should not obscure the fact that although the Cold War
provided context and pretext for many secret interventions since 1945, it is
misleading to view all such action in these terms. There is a risk that the
literature repeats the mistakes of Western decision makers in viewing post-
colonial struggles through the lens of East–West conflict. As Ludo de Witte
argues persuasively in his study of the Belgian intelligence service’s
involvement in the assassination of the Congolese leader, Patrice Lumumba,
the events of 1960–61 should be viewed primarily as a struggle against
colonialism.39 Other studies and critiques have focused on secret interven-
tions in post-colonial contexts.40 Yet while the end of the Cold War generated
new opportunities to study Cold War intelligence conflicts, post-colonial
politics provide very differing contexts and challenges to understanding.
330 INTELLIGENCE AND NATIONAL SECURITY
In 1995 Roy Godson observed that ‘for many Americans, covert action, in
the absence of clear and present danger, is a controversial proposition at
best’.41 Perceptions of the immediacy and presence of danger have changed
since September 11. The impact on long-term attitudes, both in the United
States and Europe, is difficult to assess and will in part be informed by other
events and revelations, not least war on Iraq. It is a reasonable assumption
that American use of particular kinds of covert activity will be more robust
and intrusive, through which organs of the US government will be intruding
and where remains to be seen (assuming it can be seen). How these actions
Downloaded by [North Dakota State University] at 12:35 20 September 2013
are viewed in Europe and elsewhere also remains to be seen. At the height of
the Cold War covert action was justified as a quiet option, to be used where
diplomacy was insufficient and force was inappropriate. If the United States
and its allies consider themselves in semi-perpetual war against ‘terrorism’,
and preventive action in counter-proliferation and counter-terrorism (in overt
and covert policy) becomes increasingly prevalent, the implications for
covert action will be profound.
CLANDESTINE DIPLOMACY
intervention: in 1983 the CIA apparently co-operated with the Iranian secret
service by providing details of Soviet agents in the Tudeh party in Iran.45 One
further and important distinction needs to be drawn, between intelligence
services acting as diplomatic conduits, and intelligence services acting as
quasi-independent foreign policy makers. While it may be difficult to
distinguish between the two, the use of intelligence services by governments
to conduct negotiations is distinct from where intelligence services have their
own agendas and priorities. Various accounts of CIA and SIS activity in the
Middle East in the 1950s, for example, suggest that both organisations were
Downloaded by [North Dakota State University] at 12:35 20 September 2013
pursuing their own foreign policies at variance with their foreign ministry
colleagues.46
Examples of the clandestine diplomatic role of secret intelligence services
that have emerged in recent years include the role of British intelligence in
the Northern Ireland peace process,47 the role of Israeli intelligence services,
including Mossad, in Middle East diplomacy and peace building,48 the CIA’s
relations with the Palestine Liberation Organisation and SIS’s relations with
Hamas.49 These examples illustrate that the activity concerns not just
relations between states, but between states and non-state actors, in particular
between states and insurgent or ‘terrorist’ groups.50 The value of clandestine
diplomacy is that it is more readily deniable, and this is particularly
significant where the adversary is engaged in armed attacks and/or terrorist
activities. One difference between dialogue with states and with a
paramilitary group is the greater potential of physical risk to the participants.
Professionally, using intelligence officers to facilitate and conduct inter-state
diplomacy risks blowing their cover. Paramilitary groups may harbour
factions opposed to negotiation, and exposure of the intelligence officer may
risk their safety. The paramilitary negotiator may well have parallel concerns.
The role of intelligence services can be to promote the cause of dialogue
and reconciliation, both national and international. Depending upon our
political assumptions and values, many would conclude that this role is
intrinsically worthwhile, although of course, the intelligence service is but an
instrument of a political will to engage in dialogue. For those who seek to
justify the world of intelligence to the political world, clandestine diplomacy
provides some fertile material. For those who wish to explore the ethical
dimension of intelligence this is an interesting and neglected dimension. For
those who seek to study intelligence, clandestine diplomacy is not only
intrinsically interesting, but also a useful way of further exploring problems
and challenges in studying the subject.
From the perspective of the study of intelligence, clandestine diplomacy
illustrates one of the basic questions and basic problems. How do we know
about things? Who is telling us? For what reason? Clandestine diplomacy
involves often highly sensitive contacts and exchanges whose disclosure may
332 INTELLIGENCE AND NATIONAL SECURITY
protagonists.
With both Feklisov and Bolshakov, however, we have US and Soviet archival
sources, as well as memoirs and personal testimony.
Before access was gained to Soviet sources, it was known that Bolshakov,
working under cover as a TASS correspondent, formed a secret back-channel
of communication between Kennedy and Khrushchev.54 This was routed
through the Attorney General, Robert Kennedy, with whom he held over 50
meetings in 1961 and 1962. Part of the historical interest of this was that
Bolshakov was used by Khrushchev to reassure Kennedy about Soviet
intentions in Cuba, and to deceive the US President about the secret
Downloaded by [North Dakota State University] at 12:35 20 September 2013
for this kind of activity.63 In 1971, after Prime Minister Edward Heath
involved SIS in Northern Ireland, lines of communication were opened with
Sinn Fein/PIRA, leading to ministerial level dialogue with the PIRA in 1972.
Contacts continued at a lower level and in the 1990s were reactivated
following intelligence on potential reassessments within Sinn Fein/PIRA of
political and military strategies.
Some details of the role of SIS (and later MI5) in the secret negotiations
between the PIRA and the British government became known though
disclosure and testimony, most interestingly on the British side. The role of
two SIS officers, Frank Steele and Michael Oatley, has been described. Both
Steele and Oatley have provided testimony of their activities and Michael
Oatley has indeed appeared on camera speaking of his experience.64 This is
of note as it was only in 1993 that a former senior SIS officer, Daphne Park,
appeared on television with unprecedented authorisation from the Foreign
Secretary (and when it was made clear that SIS engaged in disruptive
activity).65 It is a reasonable assumption that Michael Oatley had similar
dispensation. Moreover the former SIS officer wrote an article in the Sunday
Times in 1999 in which he argued forcefully in support of the Republican
leadership in the face of Unionist attacks on the PIRA’s failure to
decommission its weapons.66
Why Frank Steele and Michael Oatley chose to make their views and their
roles known, and how far this was sanctioned by SIS or by ministers are
interesting questions. Frank Steele’s assertion that he ‘wanted to set the
record straight’, while no doubt sincere, is hardly a sufficient explanation.67
Certainly Oatley appears to have been motivated by his personal view that the
Sinn Fein leadership, in particular Gerry Adams and Martin McGuinness,
were genuinely committed to political solutions and political processes. The
fact that former SIS officers have provided such testimony without appearing
to provoke official disapproval (or indeed prosecution), suggests that SIS and/
or the government do not see the disclosure of such information in the same
way as other disclosures by security and intelligence officers. The revelation
that British intelligence ‘talked to terrorists’ is potentially embarrassing and
politically problematic in dealing with Unionist opinion. A more considered
336 INTELLIGENCE AND NATIONAL SECURITY
response is that the British government understood that while it could thwart
the PIRA’s objectives it could not defeat them by military means. Many in
the military (and the Unionist community) believed that military victory was
possible and that negotiating with the terrorists was counter-productive.
Whichever is true, the role of SIS certainly provides contrast with the role of
other security and intelligence agencies. As the Stevens Enquiry has
concluded, elements of the RUC and the Army colluded with loyalist
paramilitaries in murder and other crimes – findings that damage the
credibility and legitimacy of the British security forces and indeed the British
Downloaded by [North Dakota State University] at 12:35 20 September 2013
CONCLUSION
NOTES
Downloaded by [North Dakota State University] at 12:35 20 September 2013
1. John Bruce Lockhart, ‘Intelligence: A British View’, in K.G. Robertson (ed.), British and
American Approaches to Intelligence (Basingstoke: Macmillan 1987), p. 46.
2. Christopher Andrew, Secret Service: The Making of the British Intelligence Community
(London: Sceptre 1986), pp. 21–9.
3. Richard Aldrich, The Hidden Hand: Britain, America and Cold War Secret Intelligence
(London: John Murray 2001), p. 5.
4. See M.R.D. Foot, SOE: An Outline History of the Special Operations Executive 1940–6
(London: British Broadcasting Corporation 1984).
5. Aldrich, The Hidden Hand, pp. 128–34, 443–63.
6. See John Prados, Presidents’ Secret Wars: CIA and Pentagon Covert Operations from World
War II through Iranscam (New York: Quill 1985).
7. See, for example, Stephen Dorril, MI6: Fifty Years of Special Operations (London: Fourth
Estate 2000) and Aldrich, Hidden Hand.
8. For example, Michael Herman, Intelligence Power in Peace and War (Cambridge:
Cambridge University Press 1996) and Intelligence Services in the Information Age: Theory
and Practice (London: Frank Cass 2001).
9. For detailed accounts of Soviet practice see Christopher Andrew and Oleg Gordievsky, KGB:
The Inside Story (London: Hodder & Stoughton 1990) and Christopher Andrew and Vasili
Mitrokhin, The Mitrokhin Archive: The KGB in Europe and the West (London: Allen Lane/
Penguin Press 1999).
10. NSC 10/2 18 June 1948, quoted in Christopher Andrew, For the President’s Eyes Only:
Secret Intelligence and the American Presidency from Washington to Bush (London:
HarperCollins 1995), p. 173.
11. Intelligence Authorization Act, Fiscal Year 1991, P.L. 102–88, 14 August 1991, quoted in
Abram Shulsky, Silent Warfare – Understanding the World of Intelligence (London:
Brassey’s 1993), p. 84. The CIA’s definition is ‘An operation designed to influence
governments, events, organizations, or persons in support of foreign policy in a manner that
is not necessarily attributable to the sponsoring power; it may include political, economic,
propaganda, or paramilitary activities.’ CIA, Consumer’s Guide to Intelligence (Washington
DC: CIA 1995), p. 38, quoted in David Rudgers, ‘The Origins of Covert Action’, Journal of
Contemporary History, 35/2 (2000), p. 249.
12. Oleg Kalugin with Fen Montaigne, The First Directorate: My 32 Years in Intelligence and
Espionage against the West (London: Smith Gryphon 1994), p. 180.
13. See Mark Urban, Big Boys’ Rules: The SAS and the Secret Struggle against the IRA
(London: Faber & Faber 1992).
14. See Philip H.J. Davies, ‘From Special Operations to Special Political Action: The ‘‘Rump
SOE’’ and SIS Post-War Covert Action Capability 1945–1977’, Intelligence and National
Security, 15/3 (2000). For accounts of operations see Aldrich, Hidden Hand, Mark Urban,
UK Eyes Alpha (London: Faber & Faber 1996) and Dorril, MI6.
15. For accounts of operations and planning in the Middle East see Tom Bower, The Perfect
English Spy: Sir Dick White and the Secret War 1935–90 (London: Heinemann 1995), pp.
185–224; Aldrich, Hidden Hand, pp. 464–93, 581–606; Dorril, MI6, pp. 531–699.
16. The Intelligence Services Act 1994, Chapter 13, section 7.1 states that the functions of SIS
are: ‘(a) to obtain and provide information relating to the actions or intentions of persons
COVERT ACTION AND CLANDESTINE DIPLOMACY 339
outside the British Islands; and (b) to perform other tasks relating to the actions or intentions
of such persons’. The legal formula is similar to the US legislation that created the CIA in
1947 that speaks of ‘other functions and duties’. Rudgers, ‘The Origins of Covert Action’, p.
249.
17. The 1998–1999 Intelligence and Security Committee Annual Report (Cm 4532) makes
reference to the fact that British agencies ‘may be required to undertake disruptive action in
response to specific tasking’ on the proliferation of weapons of mass destruction, Cm 4532
para 58. I am grateful to Marc Davies for drawing my attention to this.
18. The document can be found at: [Link]/qadahfi-[Link].
19. Richard Tomlinson, The Big Breach: From Top Secret to Maximum Security (Edinburgh:
Cutting Edge Press 2001), p. 73.
20. Elizabeth Anderson, ‘The Security Dilemma and Covert Action: The Truman Years’,
Downloaded by [North Dakota State University] at 12:35 20 September 2013
38. See Sara-Jane Corkem, ‘History, Historians and the Naming of Foreign Policy: A
Postmodern Reflection on American Strategic Thinking during the Truman Administration’,
Intelligence and National Security, 16/3 (2001), pp. 146–63.
39. Ludo de Witte, The Assassination of Lumumba (London: Verso 2002).
40. Bower, Perfect Spy; Dorril, MI6; Jonathan Bloch and Patrick Fitzgerald, British Intelligence
and Covert Action (Dingle, Ireland: Brandon Books 1983).
41. Godson, Dirty Tricks, p. 120.
42. Adam Watson, Diplomacy: The Dialogue Between States (London: Routledge 1991), p. 11.
43. Jim Risen and Tim Weiner, ‘CIA Sought Syrian Aid’, New York Times, 31 October 2001.
The article also suggests a similar approach may have been made to Libyan intelligence.
44. Gar Alperovitz, The Decision to use the Atomic Bomb (London: HarperCollins 1995), pp.
25–7, 292–301.
Downloaded by [North Dakota State University] at 12:35 20 September 2013
45. Shulsky, Silent Warfare, pp. 90–1. Apparently 200 agents were killed as a result of this
operation. A senior KGB officer who defected to the British supplied the information to the
CIA.
46. See for example, Bower, Perfect Spy, pp. 185–254; Aldrich, Hidden Hand, pp. 464–93.
47. Peter Taylor, The Provos: The IRA and Sinn Fein (London: Bloomsbury 1997) and Brits:
The War Against the IRA (London: Bloomsbury 2001); Michael Smith, New Cloak, Old
Dagger: How Britain’s Spies Came In From The Cold (London: Victor Gollancz 1996), pp.
211–30; Urban, UK Eyes Alpha and Big Boys’ Rules.
48. Hesi Carmel (ed.), Intelligence for Peace (London: Frank Cass 1999).
49. ‘Keeping a link to Hamas’, The Guardian, 29 September 2003, p. 19.
50. Michael Smith uses the term ‘parallel diplomacy’ to describe this activity. New Cloak, p.
211.
51. On Alekseev see Aleksandr Fursenko and Timothy Naftali, ‘One Hell of a Gamble’:
Khrushchev, Castro, Kennedy the Cuban Missile Crisis 1958–1964 (London; John Murray
1997). On Cooper, Kent, Tidwell and Smith see Sherman Kent, ‘The Cuban Missile Crisis of
1962: Presenting the Photographic Evidence Abroad’, Studies in Intelligence, 10/2 (1972).
52. See in particular, Fursenko and Naftali, ‘One Hell of a Gamble’.
53. Yevgeny Ivanov (with Gennady Sokolov), The Naked Spy (London: Blake 1992). For
discussion, see L.V. Scott, Macmillan, Kennedy and the Cuban Missile Crisis: Political,
Military and Intelligence Aspects (Basingstoke: Macmillan Palgrave 1999), pp. 102–12.
54. See Michael Beschloss, Kennedy v. Khrushchev: The Crisis Years 1960–63 (London: Faber
& Faber 1991), pp. 152ff.
55. Fursenko and Naftali, ‘One Hell of a Gamble’, pp. 109ff.
56. Ibid., p. x.
57. Scott, Macmillan, Kennedy, p. 109. The medium-range ballistic missiles in Cuba had a range
of 1,100 miles enabling them to strike Washington.
58. For details of the various exchanges on 26–27 October see Ernest May and Philip Zelikow
(eds), The Kennedy Tapes (London: Belknap 1998), pp. 439–629.
59. Aleksandr Fursenko and Timothy Naftali, ‘Using KGB Documents: The Scali–Feklisov
Channel in the Cuban Missile Crisis’, Cold War International History Project Bulletin, 5
(Spring 1995), pp. 58–62.
60. The testimony of Ambassador Dobrynin on the US offer to remove NATO nuclear missiles
from Turkey proved truthful, in contrast to contemporary public testimony of Kennedy
administration officials, and Robert Kennedy’s posthumously published account, as edited by
Theodore Sorensen, Thirteen Days (Basingstoke: Macmillan 1969).
61. For Feklisov’s account see Alexander Feklisov and Sergei Kostin, The Man Behind the
Rosenbergs: by the KGB Spymaster who was the Case Officer of Julius Rosenberg, and
helped resolve the Cuban Missile Crisis (New York: Enigma Books 2001), pp. 362–402.
62. Taylor, The Provos, pp. 129–47 and Brits, pp. 80ff.; Smith, New Cloak, pp. 220–30.
63. Smith, New Cloak, pp. 211–19.
64. See remarks by Oatley in transcript of BBC TV, ‘The Secret War’, BBC News,
[Link]/hi/english/static/[Link]/2000/brits/.
65. BBC TV Panorama, ‘On Her Majesty’s Secret Service’, 22 November 1993.
COVERT ACTION AND CLANDESTINE DIPLOMACY 341
66. Michael Oatley, ‘Forget the Weapons and Learn to Trust Sinn Fein’, Sunday Times, 31
October 1999; BBC Panorama, ‘The Secret War’.
67. Taylor, Provos, p. 129.
68. Stevens Enquiry, Overview and Recommendations, 17 April 2003, [Link]/
index/[Link].
69. Oatley, transcript of ‘The Secret War’.
Downloaded by [North Dakota State University] at 12:35 20 September 2013