Covert action: a systems approach
Wood, Kristen N.
MetadataShow full item record
Covert action is a complex tool; planning and conducting effective covert operations can be a challenging process. Throughout history, covert actions have been applied with great effect in support of state policies, but also sometimes with devastating consequences for the sponsor. This thesis takes a systems approach to the study of covert action to help explain the divergence between effective and ineffective operations. It is demonstrated that, because of the complexities inherent in this policy tool, covert action can be best understood as a system, that is, by focusing on the interactions and interplay of the system’s components. Four concepts of systems are examined in relation to historic U.S. and international examples—the system diagram, system effects, feedback, and tradeoffs. This holistic view of covert action may help policymakers better assess the viability and implications of a covert strategy and allow for better integration of covert action into foreign policy. Ultimately, this thesis aims to advance discourse by developing a formal theory of covert action based on the systems approach and offers six favoring conditions that can assist policymakers when planning and executing covert strategies.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
A CONCEPTUAL ARCHITECTURE TO ENABLE INTEGRATED COMBAT SYSTEM ADAPTIVE OPERATIONAL READINESS ASSESSMENTS Brown, Jonas (Monterey, CA; Naval Postgraduate School, 2019-09);Delivering on the power of data to ships in austere or contested environments requires careful consideration of system capacity, bandwidth, and processes to drive capability. Ship-based and shore-based applications and ...
Nesteruk, Erik A. (Monterey, CaliforniaNaval Postgraduate School, 2009-09);This thesis describes the security risks for network-centric weapon systems as a combination of different aspects of security, each with its own threats and mitigation strategies. Computer and network security deals with ...
Zielechowski, Steven (Monterey, California: Naval Postgraduate School, 2014-09);This thesis explores the perceived need or lack of need for an active defense system afloat (e.g., the covert analysis detection [CAD] system) to protect shipboard networks from possible cyber-attacks. As hacking methods ...