Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2020 | 5(160) | 35-54

Article title

Kontrola tajnych operacji wywiadu przez Kongres Stanów Zjednoczonych Ameryki

Content

Title variants

EN
Oversight of covert actions by the Congress of the United States of America

Languages of publication

PL EN

Abstracts

EN
In democratic countries, the so-called covert actions are the most controversial element of the intelligence services activities. Covert actions are secret operations aimed, inter alia, at influencing the political, economic or military situation of other countries (e.g., inspiring coups d’état, paramilitary actions, assassinations, training and financing of armed troops or the use of “black” propaganda). Covert actions are a powerful tool in the hands of the executive, but they should be effectively controlled by the legislative authority. The purpose of the article is to analyze the powers of the Senate and the House of Representatives of the Congress of the United States of America to control covert actions. The author presents current legal and organizational solutions and also indicates how, under the influence of successive covert action scandals, legal provisions have changed in the direction of extending the powers of the Congress in the field of control. At the same time, the author presents problems with the interpretation of some legal solutions in the context of the supervision of the Congress after the terrorist attacks of 11 September 2001 and the extension of covert actions to include actions of special forces and targeted killings of terrorists.

Year

Issue

Pages

35-54

Physical description

Contributors

  • Dr Mariusz A. Kamiński, Akademia Sztuki Wojennej, m.kaminski@akademia.mil.pl, https://orcid.org/0000-0001-9395-9744

References

  • Act to amend the Foreign Assistance Act of 1961, and for other purposes, Public Law 93-559 of December 30, 1974; 88 STAT.
  • Executive Order 13732 of July 1, 2016, United States Policy on Pre- and Post-Strike Measures to Address Civilian Casualties in U.S. Operations Involving the Use of Force, <http://www.govinfo.gov/content/pkg/CFR-2017-title3-vol1/pdf/CFR-2017-title3-vol1-eo13732.pdf>.
  • House Rule XLVIII (the Charter of the House Permanent Select Committee on Intelligence), 1977.
  • Intelligence Authorization Act of Fiscal Year 1991, Public Law 102–88 of August 14, 1991; 105 STAT. 429.
  • Konstytucja Stanów Zjednoczonych Ameryki z dnia 17 września 1787 r., tłum. Andrzej Pułło, Wydawnictwo Sejmowe, Warszawa 2002.
  • National Defense Authorization Act For Fiscal Year 2004, Public Law 108–136 of November 24, 2003; 117 STAT. 1392.
  • National Security Act of 1947, Public Law 235 of July 26, 1947; 61 STAT. 496.
  • Senate Resolution 400, 94th Congress (the Charter of the Senate Select Committee on Intelligence), 1976.
  • Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT), Public Law 107–56 of October 26, 2001; 115 STAT. 272.
  • Anderson E.E., The Security Dilemma and Covert Action: The Truman Years, „International Journal of Intelligence and CounterIntelligence” 1998, vol. 11, nr 4, https://doi.org/10.1080/08850609808435385.
  • Andrew Ch., For the President’s Eyes Only: Secret Intelligence and the American Presidency from Washington to Bush, HarperCollins, London 1995.
  • Brantly A.F., Cyber Actions by State Actors: Motivation and Utility, „International Journal of Intelligence and CounterIntelligence” 2014, vol. 27, nr 3, https://doi.org/10.1080/08850607.2014.900291.
  • Brecher A.P., Cyberattacks and the Covert Action Statute: Toward a Domestic Legal Framework for Offensive Cyberoperations, „Michigan Law Review” 2012, vol. 111, nr 3.
  • Church Committee Reports, <http://www.aarclibrary.org/publib/contents/church/contents_church_reports.htm>.
  • Cogan C.G., Covert Action and Congressional Oversight: A Deontology, „Studies in Conflict & Terrorism” 1993, vol. 16, nr 2, https://doi.org/10.1080/10576109308435922.
  • Covert Action: Uses and Misuses, „Strategic Survey” 1987, vol. 88, nr 1, https://doi.org/10.1080/04597238708460742.
  • Currie J.T., Iran-contra and Congressional Oversight of the CIA, „International Journal of Intelligence and CounterIntelligence” 1998, vol. 11, nr 2, https://doi.org/10.1080/8850609808435372.
  • DeVine M.E., Covert Action and Clandestine Activities of the Intelligence Community: Framework for Congressional Oversight in Brief, Congressional Research Service, Washington DC 2019.
  • Director of National Intelligence, Summary of Information Regarding U.S. Counterterrorism Strikes Outside Areas of Active Hostilities, Washington DC 2016.
  • Falk R.A., CIA Covert Action and International Law, „Society” 1975, vol. 12, nr 3, https://doi.org/10.1007/BF02699828.
  • Gleijeses P., The CIA’s Paramilitary Operations during the Cold War: An Assessment, „Cold War History” 2016, vol. 16, nr 3, https://doi.org/10.1080/14682745.2016.1177513.
  • Goldman J., Words of Intelligence: An Intelligence Professional’s Lexicon for Domestic and Foreign Threats, 2nd ed., Scarecrow Press, Lanham–Toronto–Plymouth 2011.
  • Headquarters Department of the Army, Operational Terms and Graphics, FM 1-02 (FM 101-5-1), MCRP 5-12A, Washington DC 2004.
  • Johnson L.K., National Security Intelligence, [w:] The Oxford Handbook of National Security Intelligence, red. L.K. Johnson, Oxford University Press, Oxford 2010.
  • Kamiński M.A., Intelligence Sources in the Process of Collection of Information by the U.S. Intelligence Community, „Security Dimensions” 2019, vol. 32, https://doi.org/10.5604/01.3001.0014.0988.
  • Kamiński M.A., Operation “Olympic Games.” Cyber-sabotage as a Tool of American Intelligence Aimed at Counteracting the Development of Iran’s Nuclear Programme, „Security and Defence Quarterly” 2020, vol. 29, nr 2, https://doi.org/10.35467/sdq/121974.
  • Kibbe J.D., Covert Action and the Pentagon, „Intelligence and National Security” 2007, vol. 22, nr 1, https://doi.org/10.1080/02684520701200806.
  • Kretzmer D., Targeted Killing of Suspected Terrorists: Extra-Judicial Executions or Legitimate Means of Defence?, „The European Journal of International Law” 2005, vol. 16, nr 2, https://doi.org/10.1093/ejil/chi114.
  • Levin B., Military Tribunals or Civilian Prosecution: The Dilemma of Unlawful Enemy Combatants, „Global Crime” 2006, vol. 7, nr 3–4, https://doi.org/10.1080/17440570601093192.
  • National Commission on Terrorist Attacks, The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States, <http://www.9-11commission.gov/report>.
  • National Security Council, NSC 68: United States Objectives and Programs for National Security, April 14, 1950. A Report to the President Pursuant to the President’s Directive of January 31, 1950, IX. Possible Courses of Action, <https://fas.org/irp/offdocs/nsc-hst/nsc-68-9.htm>
  • Meyer J.T., Supervising The Pentagon: Covert Action and Traditional Military Activities in the War on Terror, „Administrative Law Review” 2016, vol. 59, nr 2.
  • Minkina M., Sztuka wywiadu w państwie współczesnym, Wydawnictwo Bellona, Warszawa 2014.
  • Office of the Chairman of the Joint Chiefs of Staff, DOD Dictionary of Military and Associated Terms, Washington DC 2019.
  • Omand D., The Limits of Avowal: Secret Intelligence in an Age of Public Scrutiny, [w:] National Intelligence Systems Current Research and Future Prospects, red. G.F. Treverton, W. Agrell, Cambridge University Press, Cambridge 2009.
  • Phythian M., An INS Special Forum: The US Senate Select Committee Report on the CIA’s Detention and Interrogation Program, „Intelligence and National Security” 2016, vol. 31, nr 1, https://doi.org/10.1080/02684527.2016.1103442.
  • Rebuttal: The CIA Responds to the Senate Intelligence Committee’s Study of Its Detention and Interrogation Program, red. B. Harlow, Naval Institute Press, Annapolis 2015.
  • Richelson J.T., The U.S. Intelligence Community, 7th ed., Routledge, New York–London 2018.
  • Sanchez E.J., Intelligence Collection, Covert Operations, and International Law, „Intelligencer: Journal of U.S. Intelligence Studies” 2017, vol. 23, nr 2.
  • Scott L., Secret Intelligence, Covert Action and Clandestine Diplomacy, „Intelligence & National Security” 2004, vol. 19, nr 2, https://doi.org/10.1080/0268452042000302029.
  • Słownik terminów z zakresu bezpieczeństwa narodowego, red. J. Kaczmarek, W. Łepkowski, B. Zdrodowski, Wydawnictwo Akademii Obrony Narodowej, Warszawa 2008.
  • Treverton G.F., Covert Action: The Limits of Intervention in the Postwar World, Basic Books, New York 1987.
  • The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, Report to the President of the United States, 2005 <http://fas.org/irp/offdocs/wmd_report.pdf>.
  • The Select Committee on Intelligence United States Senate One Hundred Third Congress Second Session, Legislative Oversight of Intelligence Activities: The U.S. Experience, Washington DC 1994.
  • United States Senate, Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, <https://www.senate.gov/artandhistory/history/common/investigations/ChurchCommittee.htm>.
  • US Senate Select Committee on Intelligence, Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program, 3 December 2014, <http://fas.org/irp/congress/2014_rpt/ssci-rdi.pdf>.

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-778b539f-cdc1-47a9-adc7-abca3ab29c03
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.