Grey is the new black: covert action and implausible deniability
For generations scholars have defined covert action as plausibly deniable interventions in the affairs of others; the sponsor’s hand is neither apparent nor acknowledged. We challenge this orthodoxy. Turning the spotlight away from covert action and onto plausible deniability itself, we argue that e...
| Main Authors: | Cormac, Rory, Aldrich, Richard J. |
|---|---|
| Format: | Article |
| Published: |
Oxford University Press
2018
|
| Online Access: | https://eprints.nottingham.ac.uk/50498/ |
Similar Items
Disruption and deniable interventionism: explaining the appeal of covert action and special forces in contemporary British policy
by: Cormac, Rory
Published: (2017)
by: Cormac, Rory
Published: (2017)
A modern-day requirement for co-ordinated covert action
by: Cormac, Rory, et al.
Published: (2016)
by: Cormac, Rory, et al.
Published: (2016)
The pinprick approach: Whitehall’s top-secret anti-communist committee and the evolution of British covert action strategy
by: Cormac, Rory
Published: (2014)
by: Cormac, Rory
Published: (2014)
Covert action failure and fiasco construction: William Hague’s 2011 Libyan venture
by: Cormac, Rory, et al.
Published: (2017)
by: Cormac, Rory, et al.
Published: (2017)
The black door: spies, secret intelligence, and British Prime Ministers
by: Aldrich, Richard J., et al.
Published: (2016)
by: Aldrich, Richard J., et al.
Published: (2016)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Deniable authentication protocol based on factoring and discrete logarithm problems
by: Nek Abd Rahman, Normahirah, et al.
Published: (2022)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2022)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
Covert channel: network steganography deployment
by: Md Ali, Nurul Majdi
Published: (2005)
by: Md Ali, Nurul Majdi
Published: (2005)
Consumer responses to covert advertising in social media
by: Göbel, F., et al.
Published: (2017)
by: Göbel, F., et al.
Published: (2017)
Admissibility of covert surveillance evidence: a prolegomenon
by: Md. Abdul Jalil,, et al.
Published: (2014)
by: Md. Abdul Jalil,, et al.
Published: (2014)
Admissibility of covert surveillance evidence: a prolegomenon
by: Md. Abdul Jalil,, et al.
Published: (2014)
by: Md. Abdul Jalil,, et al.
Published: (2014)
WINPCAP : design and development of covert channel for secure communication
by: Omar, Syaril Nizam
Published: (2007)
by: Omar, Syaril Nizam
Published: (2007)
The Information Research Department, unattributable propaganda, and Northern Ireland: promising salvation but ending in failure?
by: Cormac, Rory
Published: (2016)
by: Cormac, Rory
Published: (2016)
Overt and covert postpartum urinary retention, risk factors and complications
by: Nusee, Zalina, et al.
Published: (2020)
by: Nusee, Zalina, et al.
Published: (2020)
Unequal English accents, covert accentism and EAL migrants in Australia
by: Dovchin, Sender, et al.
Published: (2022)
by: Dovchin, Sender, et al.
Published: (2022)
Grey sets and greyness
by: Yang, Yingjie, et al.
Published: (2012)
by: Yang, Yingjie, et al.
Published: (2012)
Reconsidering the value of covert research: the role of ambiguous consent in participant observation
by: Roulet, Thomas, et al.
Published: (2017)
by: Roulet, Thomas, et al.
Published: (2017)
Comparison of black-grey-white box approach in system identification of a flight vehicle
by: Nugroho, Larasmoyo, et al.
Published: (2018)
by: Nugroho, Larasmoyo, et al.
Published: (2018)
Piracy on the high sands: covert military mobilities in the Libyan desert, 1940-1943
by: Forsyth, Isla
Published: (2017)
by: Forsyth, Isla
Published: (2017)
Applying covert channel in TCP Fast Open (TFO) / Mohamed Azran Aziz
by: Mohamed Azran , Aziz
Published: (2019)
by: Mohamed Azran , Aziz
Published: (2019)
Uncertainty representation of grey numbers and grey sets
by: Yang, Yingjie, et al.
Published: (2014)
by: Yang, Yingjie, et al.
Published: (2014)
Protocol for the design of an instrument to measure preadolescent children's self-report of covert aggression and bullying
by: Nelson, Helen, et al.
Published: (2015)
by: Nelson, Helen, et al.
Published: (2015)
The Admissibility of Covert Video Data Evidence in Wildlife Crime Proceedings: A Public Authority Issue?
by: Glover, Philip
Published: (2018)
by: Glover, Philip
Published: (2018)
The Development of a Self-report Measure of Covert Aggression and Bullying for Upper Primary School Aged Children
by: Nelson, Helen Jean
Published: (2019)
by: Nelson, Helen Jean
Published: (2019)
Heat-reflux processing of black peppercorn into bioactive antioxidant oleoresins : A three-functioned Taguchi-based grey relational grading
by: Olalere, Olusegun Abayomi, et al.
Published: (2023)
by: Olalere, Olusegun Abayomi, et al.
Published: (2023)
The pragmatic face of the covert idealist: the role of Allen Dulles in US policy discussions on Latin America, 1953–61
by: Sewell, Bevan
Published: (2011)
by: Sewell, Bevan
Published: (2011)
The Information Research Department, British covert propaganda, and the Sino-Indian War of 1962: combating communism and courting failure?
by: McGarr, Paul M.
Published: (2017)
by: McGarr, Paul M.
Published: (2017)
Grey Nomad Tracking V
by: Castleden, Susanna
Published: (2008)
by: Castleden, Susanna
Published: (2008)
A Remarkable Grey Horse
by: Moore, T., et al.
Published: (2014)
by: Moore, T., et al.
Published: (2014)
The Grey World of Foreigner Production
by: Harris, Jennifer
Published: (2009)
by: Harris, Jennifer
Published: (2009)
Grey Heron at Churchhill Moat
by: Kinsella, John
Published: (2015)
by: Kinsella, John
Published: (2015)
The Factors That Influence and Protect Against Power Imbalance in Covert Bullying Among Preadolescent Children at School: A Thematic Analysis
by: Nelson, Helen, et al.
Published: (2018)
by: Nelson, Helen, et al.
Published: (2018)
New tourism product forecasting - application of Bass Diffusion Model and Grey Forecasting Model
by: N., Abu, et al.
Published: (2020)
by: N., Abu, et al.
Published: (2020)
New tourism product forecasting – application of bass diffusion model and grey forecasting model
by: Abu, Noratikah, et al.
Published: (2020)
by: Abu, Noratikah, et al.
Published: (2020)
Chimneys in Paleozoic massive sulfide mounds of the Urals VMS deposits: Mineral and trace element comparison with modern black, grey, white and clear smokers
by: Maslennikov, V., et al.
Published: (2016)
by: Maslennikov, V., et al.
Published: (2016)
Grey-Smith Institute for Creative Arts
by: Pendal, Simon, et al.
Published: (2015)
by: Pendal, Simon, et al.
Published: (2015)
Deep grey matter and fatigue in multiple sclerosis
by: Niepel, Graham
Published: (2012)
by: Niepel, Graham
Published: (2012)
The grey zone: the 'ordinary' violence of extraordinary times
by: Roy, Srila
Published: (2008)
by: Roy, Srila
Published: (2008)
Similar Items
-
Disruption and deniable interventionism: explaining the appeal of covert action and special forces in contemporary British policy
by: Cormac, Rory
Published: (2017) -
A modern-day requirement for co-ordinated covert action
by: Cormac, Rory, et al.
Published: (2016) -
The pinprick approach: Whitehall’s top-secret anti-communist committee and the evolution of British covert action strategy
by: Cormac, Rory
Published: (2014) -
Covert action failure and fiasco construction: William Hague’s 2011 Libyan venture
by: Cormac, Rory, et al.
Published: (2017) -
The black door: spies, secret intelligence, and British Prime Ministers
by: Aldrich, Richard J., et al.
Published: (2016)