Black bag operation


Black bag operation

Black bag operations (or "black bag jobs") are covert or clandestine surreptitious entries into structures to obtain information for human intelligence operations. This usually entails breaking and entering into denied areas. Some of the tactics, techniques and procedures associated with black bag operations are: lock picking, safe cracking, key impressions, fingerprinting, photography, electronic surveillance (including audio and video surveillance), mail manipulation (flaps and seals), forgery and a host of other related skills.

Use in the FBI

In black bag operations, Federal Bureau of Investigation agents illegally entered offices of targeted individuals and organizations, and photographed information found in their records. This practice was used by the FBI from 1942 until 1967. In July 1966, FBI Director J. Edgar Hoover ordered the practice discontinued. [ [http://foia.fbi.gov/foiaindex/bboperations.htm Federal Bureau of Investigation - Freedom of Information Privacy Act ] ]

The use of "black bag jobs" by the FBI was declared unconstitutional by the United States Supreme Court on 19 June 1972 in the Plamondon case, 407 U.S. 297.

See also

*Black-bag cryptanalysis
*Black ops
*COINTELPRO

References

*Peter Wright. "Spy Catcher: The Candid Autobiography of a Senior Intelligence Officer". Penguin USA, 1987. ISBN 0-670-82055-5.

External links

* [http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIf.htm Warrantless Surreptitious Entries: FBI "Black Bag" Break-ins And Microphone Installations]
* [http://people.howstuffworks.com/11-terms-used-by-spies.htm 11 Terms Used by Spies] - [http://www.howstuffworks.com HowStuffWorks.Com] article explaining espionage terminology


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Black-bag cryptanalysis — In cryptography, black bag cryptanalysis is a euphemism for the acquisition of cryptographic secrets via burglary, or the covert installation of keystroke logging or trojan horse software/hardware on target computers or ancillary devices. Such… …   Wikipedia

  • black-bag — adjective Involving sophisticated clandestine methods for gaining unauthorized entry and obtaining information. Watergate turned out to be a black bag operation by former CIA employees …   Wiktionary

  • black bag job — n American a break in or other covert operation car ried out by a government agency. A piece of jargon from the time of the Watergate scandal …   Contemporary slang

  • Operation Gemstone — In the context of the Watergate scandal, Operation Gemstone refers to a series of clandestine or illegal acts, first proposed by G. Gordon Liddy in two separate meetings with three other individuals: (1) the then Attorney General of the United… …   Wikipedia

  • Operation Purple Haze — Part of Iraq War Date July 15, 2007 Location Baghdad, Iraq Result …   Wikipedia

  • Operation Sandblast — Part of Cold War (1953–1962) …   Wikipedia

  • Operation Demetrius — Part of The Troubles and Operation Banner The entrance to Compound 19, one of the sections of Long Kesh internment camp …   Wikipedia

  • Operation Crevice — was a raid launched by Metropolitan and local police in England on the morning of 30 March 2004. It was in response to a report indicating cells of terrorists of Pakistani origin were operating in the Thames Valley, Sussex, Surrey and… …   Wikipedia

  • Black Jack (manga) — Infobox animanga/Header name = Black Jack caption = The cover for Black Jack volume 11 from the Osamu Tezuka Manga Complete Works edition. ja name = ブラック・ジャック ja name trans = Burakku Jakku genre = Medical, DramaInfobox animanga/Manga title =… …   Wikipedia

  • Operation Overdrive Power Rangers — The Operation Overdrive Power Rangers are a fictional team of superheroes in the television show Power Rangers Operation Overdrive, tasked with tracking down five individual jewels that fit onto Corona Aurora. Due to DNA resequencing, they have… …   Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.