Covert action is activity conducted by intelligence services to influence political, economic, or military conditions in foreign states, where the role of the sponsoring government is intended to remain unacknowledged. It is conceptually distinct from both intelligence collection (which seeks to obtain information) and military operations (which employ overt force): covert action seeks to change the world rather than understand it, while maintaining deniability about who is doing the changing.
The category encompasses a wide spectrum of activity. At the low end: propaganda, media placement, funding of sympathetic political parties, and support for civic organizations. At the high end: paramilitary operations, sabotage, assassination, and the overthrow of governments. The CIA’s charter under the National Security Act of 1947 authorized “such other functions and duties related to intelligence” as the National Security Council might direct — language sufficiently vague to encompass operations from Radio Free Europe’s broadcasts to the 1953 overthrow of Mossadegh in Iran and the 1954 coup in Guatemala.
Covert action’s relationship to intelligence analysis is fraught. The analyst’s function is to describe reality accurately; covert action’s function is to change reality secretly. When the same organization does both, the risk is that analytic judgments become contaminated by operational equities — that an agency invested in overthrowing a government will produce analysis supporting the overthrow’s necessity. Sherman Kent’s insistence on the separation of estimative intelligence from policy was partly a response to this structural tension.
The legal framework evolved through scandal. The Church Committee hearings (1975–1976) exposed assassination plots, domestic surveillance, and covert interventions conducted without meaningful oversight, leading to the creation of congressional intelligence committees and the requirement for presidential findings authorizing covert actions. Executive Order 12333 (1981) established the current framework: covert action requires a written presidential finding, notification of congressional oversight committees, and a determination that the action supports identifiable foreign policy objectives. The COINTELPRO programs, exposed in the same period, represented the application of covert action techniques domestically — a violation of both legal authority and the intelligence community’s foreign-focused charter.
The concept’s defining feature — deniability — creates a persistent attribution problem, but in reverse: covert action is designed to prevent attribution to the sponsor, while intelligence analysis struggles to achieve attribution of adversary actions. The two are mirror images of the same epistemic challenge, viewed from opposite sides.
Related terms
- Counterintelligence — the discipline that protects covert actions from adversary detection
- HUMINT — the collection discipline whose infrastructure covert action often exploits
- Denial and deception — the techniques that maintain covert action’s deniability
- Attribution — the analytic function covert action is designed to defeat