ADVICE+DISSENT: Intelligence File Ghosts of Iran

Is a covert policy in Iran doomed to fail?

Next to Iraq, the administration and its would-be successors face no greater foreign policy dilemma than what to do about Iran-its suspected nuclear weapons program, its support for terrorists and its influence in Iraq, for starters. These issues loom large on the presidential campaign trail, but come January 2009, the challenge of actually dealing with Iran will fall into the laps of U.S. intelligence officials. They have, for the most part, been at the center of the delicate and dangerous dance with Iran for the past three decades, and while much of their work has been motivated by the best of intentions, it has suffered repeatedly from the deception and compromise that covert operations demand.

The first explosive chapter was written in the mid-1980s, when, as now, the United States was looking for a way to undermine the ruling regime in Iran and break through to supposed moderate elements who might be in a position to favorably influence the country's policy toward the West. Some of these moderate forces, eager to restock their supply of missiles and weapons systems to use against Iraq, reached out to U.S. intelligence and national security officials.

The Americans agreed to sell the Iranians weapons if they, in turn, would help secure the release of American hostages in Lebanon, held by Iranian-backed terrorists.

The covert operation was exposed in 1986, and it led to a political scandal that nearly toppled the Reagan White House. Several senior national security officials were indicted for their attempts to conceal the work. For a president who had publicly insisted that he would never negotiate with terrorists, but also agonized over the plight of the captive Americans, the secret arms-for-hostages swap was an unmitigated disaster.

Decades later come new revelations that the United States again is engaged in covert operations with factions inside Iran, in part aimed at undermining the regime in power. In July, New Yorker staff writer Seymour Hersh reported on an intelligence directive from the president that authorizes the CIA and an elite special operations command to direct money to minority and dissident groups. The activities also include gathering information on Iran's suspected nuclear weapons program, Hersh noted. What precisely the administration has promised those groups, if anything, wasn't clear from the report, but questions already are being raised-as they were in the 1980s-about whether the administration has informed Congress about the breadth of the activities and whether they might contradict any policies or, worse, violate any laws.

It should come as no surprise that the United States' method of choice for approaching Iran has been of the clandestine variety. Tehran, after all, has shown no inclination to openly seek good relations or to abandon support for terrorists who have killed hundreds of Americans. But covert operations have never come without a heavy cost. Now, as in the Reagan administration, the intelligence community risks a backlash.

This one, however, might not come from the American public, but Iranian citizens. "This is the ultimate for the Iranians-to blame the CIA," retired Air Force Col. Sam Gardiner told Hersh. Gardiner monitors the Iranian press as part of his work conducting war games for the U.S. government, and he has been particularly tuned into public reaction to allegations of U.S. military and intelligence meddling. He called present operations in Iran "a ratcheting up of tensions. It rallies support for the regime and shows people that there is continuing threat from the 'Great Satan.' "

Twenty years ago, the American public rejected covert operations in Iran. Now, the Iranian public-whose support is just as crucial to an improved relationship-could be turned off, as well. It might be time to ask whether a covert policy toward Iran, having failed to achieve the United States' largest goals, is worth the cost. The problem is, an overt policy hasn't produced many dividends, either.

Shane Harris, a staff correspondent for National Journal, wrote about intelligence and technology at Government Executive for five years.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

    Download
  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download
  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

    Download
  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.

    Download

When you download a report, your information may be shared with the underwriters of that document.