530
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

(C)overt Action: The Disappearing "C"

Pages 561-572 | Published online: 02 Feb 2011

References

  • Roy Godson, Ernest R. May, Gary Schmitt, U.S. Intelligence at the Crossroads: Agendas for Reform (Washington, DC: Brassey's, 1995) pp. 154-177.
  • Ibid., pp. 171-173.
  • For a good, all-around history of Presidents ordering covert action, see Stephen F. Knott, Secret and Sanctioned: Covert Operations and the American Presidency (New York: Oxford University Press, 1996).
  • Morgan , Ted . 1999 . A Covert Life: Jay Lovestone, Communist, Anti-Communist, and Spymaster , New York : Random House .
  • Agee , Philip . 1975 . Inside the Company: CIA Diary , 611 New York : Stonehill .
  • For a detailed description of the 1979-1986 Afghan covert action and the relationship between CIA and ISI, see The Bear Trap, by Mohammed Yousaf and Mark Adkin (London: Leo Cooper, 1992). See also Charles Cogan, "Partners in Time: The CIA and Afghanistan," World Policy Journal, Summer 1993, Vol. X, No. 2.
  • Woodward , Bob . 1988 . Veil: The Secret Wars of the CIA, 1981-1987 , New York : Pocket Books .
  • Roy Godson, Richard Kerr, Ernest May, Covert Action in the 1990s, Working Group on Intelligence Reform, 1992, Washington, D.C.
  • Stockwell , John . 1978 . In Search of Enemies: A CIA Story , New York : W. W. Norton .
  • Loch K. Johnson, "Controlling the CIA: A Critique of Current Safeguards," Harvard Journal of Law and Public Policy, Spring 1989.
  • William Blum, "Trojan Horse: The National Endowment for Democracy," a chapter from his book Rogue State: A Guide To The World's Only Superpower. It is found at www.thirworldtraveler.com/CIA/National%20Endowment Demo.html. See also Barbara Conry, "Loose Cannon: The National Endowment for Democracy," The Cato Institute Foreign Policy Briefing No. 27, 8 November 1993, at http://www.cato.org/cgi-bin/scripts/printtech.cgi/ pubs/fpbriefs/fpb = 027.html.
  • Agée , Philip . 1976 . Inside The Company: CIA Diary , 620 – 638 . New York : Bantam .
  • Thomas Henricksen, "Covert Operations, Now More Than Ever," Orbis, Winter 2000.
  • Chris McGreal, "US Admits to plan to bring down Mugabe," The Guardian (UK), 22 August 2002; also, Ben Barber, "Bush: Mugabe No Longer Legitimate Leader of Zimbabwe," The Washington Times, 21 August 2002.
  • David Corn, "Our Gang in Venezuela," The Nation, 5 August 2002.
  • "Movement Grows To Topple Saddam," The Washington Times, 17 June 2002; "Getting Saddam: Bush Authorizes CIA To Overthrow Saddam-Killing Him 17 Necessary," ABC News, 17 June 2002.
  • Vernon Loeb, The Washington Post, 20 October 1998.
  • Jason Vest, "State Outsources Secret War," The Nation, 5 June 2001.
  • Alan Sipress and Nora Boustany, "US Slates $3 million for Sudanese Opposition," The Washington Post, 25 May 2001.
  • James Risen and Doyle McManus, "US OKd Arms for Bosnia, Officials Say," The Los Angeles Times, 5 April 1996. Also Bill Elus, "A Cheney Scandal You Haven't Heard, Yet," Guerrilla News Network, 28 May 2002, found at www.csf.colorado.edu/forums/pvs/2002II/msg00765.html.
  • Michel Chossudovsky, "Macedonia: Washington's Military-Intelligence Ploy," the Transnational Foundation, www.transnational.org/forum/meet/2001/ Chossudov_WashingtPloy.html.
  • Jeff Stein, "When Things Turn Weird, the Weird Turn Pro," TomPaine: A Public Interest Journal, 28 February 2002, www.tompaine.com/feature.cfm/ID/5188.
  • James Dao and Eric Schmitt, "Pentagon Readies Efforts to Sway Sentiment Abroad," The New York Times, 19 February 2002.
  • Don Nielson, "Task Force 157: Born 20 Years Too Soon," American Intelligence Journal, Vol. 14, No. 1, Winter/Spring 1993, pp. 23-27.
  • Dominique Sumner and Peter Tomich, "US Army Intelligence Support Activity," www.specwarnet.net
  • Charles G. Cogan, "Covert Action and Congressional Oversight: A Deontology," Studies in Conflict and Terrorism, Vol. 16, No. 2, 1993.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.