Disclosing identities of secret agents
This is part of a series on nonviolent protest methods, which explains approaches and provides inspirational examples from history. For additional resources, please explore the Museum of Protest’s activist guides and view items in the collection.
When regimes and powerful institutions depend on covert operatives to monitor, infiltrate, and disrupt opposition, exposing those operatives becomes a powerful form of resistance.
Gene Sharp classified this as Method #194 in his definitive catalogue of 198 nonviolent action techniques—placing it among the most confrontational tactics in his arsenal. The method strikes directly at the intelligence apparatus that authoritarian systems depend upon for survival, turning the secrecy that protects surveillance operations into a vulnerability.
This approach has shaped history from Cold War-era whistleblowing to post-communist file openings to modern exposures of undercover police. Understanding how it works, when it succeeds, and what risks it carries offers vital knowledge for anyone facing state surveillance or infiltration.
Where this method fits in Sharp’s taxonomy
Sharp positioned disclosing agent identities within his category of “Nonviolent Intervention”—the most direct and confrontational of his three major categories, alongside the milder “Protest and Persuasion” and “Noncooperation.” Within intervention, it falls under “Political Intervention” (methods 193-198), which includes tactics like seeking imprisonment, civil disobedience, and establishing parallel governments. This placement signals that exposure operates at the sharpest edge of nonviolent resistance.
The theoretical basis draws from Sharp’s “consent theory of power.” Every regime, he argued, depends on six pillars: authority, human resources, skills and knowledge, intangible psychological factors, material resources, and sanctions. Secret police and informant networks serve multiple pillars simultaneously—they provide human resources for surveillance, enable targeted sanctions against dissidents, and maintain the psychological atmosphere of fear that suppresses opposition. When exposure removes these operatives from effectiveness, it attacks the regime’s capacity to function.
Sharp described a dynamic he called “political jiu-jitsu,” where repression backfires against the repressor. Exposure operates through this mechanism: dragging hidden surveillance into public view delegitimizes the system, creates outrage among third parties, and demoralizes remaining security personnel who now fear similar exposure. The East German Stasi maintained files on 6 million citizens—one-third of the entire population—with at least one informer for every 6.5 people. When those files opened after 1989, it shattered the apparatus entirely and made clear the grotesque scale of what had been hidden.
The CIA naming campaign of the 1970s
The most systematic effort to expose intelligence operatives as political resistance occurred during the 1970s, led by former CIA officer Philip Agee. After twelve years running operations in Latin America, Agee grew disillusioned watching the agency support authoritarian regimes, death squads, and torture programs. His 1975 book Inside the Company: CIA Diary named approximately 250 CIA officers, agents, and front companies he had personally encountered—published first in Britain because American publishers feared legal consequences.
Agee’s stated motivation was disrupting what he saw as criminality protected by classification: “It was a time in the ’70s when the worst imaginable horrors were going on in Latin America. Argentina, Brazil, Chile, Uruguay, Paraguay, Guatemala, El Salvador—they were military dictatorships with death squads, all with the backing of the CIA and the US government. That was what motivated me to name all the names.”
The exposure campaign expanded with CovertAction Information Bulletin, founded in 1978 by Agee alongside Louis Wolf, attorneys William Schaap and Ellen Ray, and former CIA finance officer James Wilcott. The publication systematically identified CIA officers working under diplomatic cover by cross-referencing publicly available State Department records, diplomatic lists, and patterns of career movement that distinguished intelligence officers from legitimate diplomats. Between 1978 and 1982, the magazine’s “Naming Names” column revealed hundreds more identities.
The consequences for Agee were severe. The State Department revoked his passport in 1979, and the Supreme Court upheld this action in Haig v. Agee (1981), ruling 7-2 that freedom to travel abroad was subordinate to national security. Britain expelled him after Henry Kissinger personally urged Prime Minister Callaghan to act. He was expelled from four additional European countries before finding permanent refuge in Cuba, where he lived until his death in 2008.
The Intelligence Identities Protection Act and its limits
The exposure campaign provoked a fierce political backlash, crystallized around the murder of Richard Welch, CIA Station Chief in Athens, who was assassinated by Greek terrorists on December 23, 1975. The Reagan administration signed the Intelligence Identities Protection Act in 1982 at CIA headquarters, creating criminal penalties for disclosing covert agent identities.
The law established three tiers of liability: insiders with classified access face up to ten years imprisonment; former personnel who learned identities through authorized access face up to five years; outsiders engaging in a “pattern of activities” to identify and expose agents face up to three years. Yet remarkably, only two successful prosecutions occurred in the law’s first three decades—Sharon Scranage in 1985 and John Kiriakou in 2012. This suggests the law functions more as deterrent than enforcement mechanism.
The Welch murder became a cautionary tale about exposure’s dangers, but the facts were more complex than the narrative deployed to pass the IIPA. Welch’s name had appeared in an East German publication in 1968—seven years before the American naming campaigns. He lived in a villa that had served as the official CIA station chief residence for decades. Former CIA Deputy Station Chief Ron Estes later confirmed that Greek intelligence officers, not American publications, likely provided the terrorists with Welch’s current location. Barbara Bush removed an accusation against Agee from her memoir after he sued for libel. Jonathan Stevenson’s scholarly biography concluded that “no evidence has ever surfaced of physical harm” directly attributable to Agee’s revelations.
Citizens storm the Stasi headquarters
The most comprehensive disclosure of secret police files occurred in East Germany after the Berlin Wall fell. On December 4, 1989, women from the group “Women for Change” occupied the Stasi building in Erfurt after spotting smoke rising from chimneys—evidence of document destruction. Similar occupations followed across the country, culminating on January 15, 1990, when tens of thousands of citizens stormed Stasi headquarters in Berlin.
The protesters understood that the files represented both evidence of crimes and tools for understanding who had betrayed whom. Citizens’ committees formed that night to prevent destruction, confiscating documents and stopping rioters who wanted to burn everything. A subsequent hunger strike forced the decision to preserve files for public access.
Pastor Joachim Gauck became the first Federal Commissioner for Stasi Records, heading an agency responsible for 111 kilometers of files—enough paper to stretch from Berlin to Hamburg. By January 2015, over 7 million people had applied to view their files. The law granted citizens the right to see their own records, learn who had informed on them, and access information for employment vetting in public positions.
The scale of what emerged was staggering. By 1995, researchers had identified 174,000 informal collaborators—2.5% of the adult population. Gauck estimated the true number might reach 500,000; a former Stasi colonel suggested up to 2 million if occasional informants were included. The agency employed 91,000 full-time staff, meaning East Germany had one secret policeman for every 166 citizens. Simon Wiesenthal observed: “The Stasi was much, much worse than the Gestapo… The Gestapo had 40,000 officials watching a country of 80 million, while the Stasi employed 102,000 to control only 17 million.”
When files revealed that husbands informed on wives
The social consequences of disclosure rippled through German society for decades. Peace activist Vera Lengsfeld discovered that her own husband, Knud Wollenberger, had been a Stasi informant throughout their marriage, reporting every detail of her life—including information that may have been why he married her in the first place. Marriages collapsed. Lifelong friendships ended. Colleagues learned that people they trusted had reported their private conversations.
The novelist Christa Wolf, one of East Germany’s most celebrated writers, was revealed to have reported on colleagues from 1959-1962, though the Stasi broke off contact by 1962 and surveilled her for the following two decades. Her case illustrated the complexity of the files—some who signed as collaborators never actually reported on anyone, while others formally attended sessions but said only positive things about people.
Research confirms the exposure created lasting damage. Oxford studies found “substantial and long-lasting economic effects of Stasi surveillance, resulting in lower income, higher exposure to unemployment, and lower self-employment.” The surveillance “shattered interpersonal trust with long-lasting consequences.” For victims of the Stasi’s psychological warfare technique called “Zersetzung”—systematic harassment designed to destroy self-confidence and relationships—the files finally explained experiences they had never understood. Some victims had suffered mental breakdowns believing they were losing their minds, never knowing the state was deliberately orchestrating their social destruction.
South Africa’s truth commission names the perpetrators
The South African Truth and Reconciliation Commission (1995-2002) took a different approach: offering amnesty in exchange for full disclosure of politically motivated crimes. This produced extraordinary revelations about the Security Branch’s systematic use of torture, murder, and informants against the anti-apartheid movement.
The most notorious figure was Eugene de Kock, commander of Vlakplaas—a counterinsurgency unit that operated as a death squad from a farm outside Pretoria. De Kock confessed to more than 100 acts of murder, torture, and fraud before the TRC, naming his superiors including former State President F.W. de Klerk. His 1996 conviction brought two life terms plus 212 years in prison. The TRC granted amnesty for several crimes judged politically motivated, including the murder of an ANC fighter’s brother and the killing of an entire family—parents and three children—in Botswana. He was paroled in 2015 “in the interests of nation-building.”
The TRC exposed the existence of TREWITS, a secret target-identification subcommittee of the State Security Council. Former officers testified about its function: “What did they think we were collecting all this information about addresses, cars, movement for? To send Christmas cards?” The commission documented that hundreds, possibly thousands, of ANC activists were “harassed, jailed, interrogated, tortured, and killed based on informant information—sometimes accurate, but often mere fabrications concocted to get paid.”
The amnesty model produced truth but sacrificed prosecution. None of the accomplices de Kock named were brought to trial because TRC submissions cannot be used as court evidence. Critics charged the process was “short on truth and long on reconciliation.” Thirty years later, both the TRC archive and apartheid-era security records remain extremely difficult to access.
A girlfriend finds the wrong passport
The modern era’s most significant exposure of infiltrators began with an accidental discovery. In July 2010, environmental activist “Lisa” found a passport in the glovebox of a van while on holiday in Italy with her boyfriend of six years, “Mark Stone.” The passport bore a different name—Mark Kennedy—and revealed he had children she never knew existed. After confrontation and investigation, activists publicly exposed Kennedy on October 24, 2010, on IndyMedia UK.
Kennedy had infiltrated environmental movements for seven years, working for the National Public Order Intelligence Unit. He was issued fake passports, driver’s licenses, and bank accounts. His £50,000 police salary was supplemented by additional payments totaling £200,000 annually deposited into his undercover account. He operated in 22 countries and was instrumental in closing down Copenhagen’s Youth House community center.
The exposure triggered collapse of a major prosecution. In 2009, Kennedy had provided intelligence leading to pre-emptive arrests of 114 climate activists planning to shut down Ratcliffe-on-Soar Power Station. Twenty people were wrongly convicted. But Kennedy had secretly recorded the gathering, and his tapes—which would have exonerated the activists—were withheld by prosecutors. After Kennedy’s exposure, remaining trials collapsed, and appeal judges called him “arguably an agent provocateur.”
The scale of Britain’s undercover policing scandal
Kennedy’s exposure unraveled forty years of covert operations. Investigation revealed the Special Demonstration Squad, formed in 1968 to monitor anti-Vietnam War protesters, had deployed approximately 140 officers who infiltrated over 1,000 political groups. Officers used dead children’s identities—approximately 80 documented cases—to create cover names.
Among those exposed was Bob Lambert, who infiltrated the Animal Liberation Front and London Greenpeace from 1983-1988. Lambert had sexual relationships with at least four women while undercover and fathered a child with an activist, then vanished when the boy was two years old. He created his identity using the name of a seven-year-old who died in 1959. In Parliament, MP Caroline Lucas accused Lambert of planting a firebomb at a Debenhams department store in 1987. Five witnesses have corroborated his involvement in ALF arson attacks.
Jim Boyling infiltrated Reclaim the Streets for five years, married an activist, and had two children with her. He committed perjury in court while maintaining his undercover identity during a prosecution alongside genuine activists, and was present during privileged attorney-client meetings. At least four undercover officers are known to have fathered children with activists.
The Undercover Policing Inquiry, announced in 2015, has cost over £170 million through mid-2025. Its first interim report found many deployments “poorly justified” and documented systematic human rights violations. Kate Wilson, who had a two-year relationship with Kennedy, won £229,000 in compensation after a tribunal found the surveillance represented “abuse of the highest order” that “grossly debased, degraded and humiliated” her.
The COINTELPRO break-in changes history
Before the British scandal, the most consequential exposure of domestic infiltration came from eight anti-war activists who burglarized an FBI field office in Media, Pennsylvania on March 8, 1971—the night of the Muhammad Ali vs. Joe Frazier fight, chosen because most Americans would be watching. The Citizens’ Commission to Investigate the FBI, led by Haverford physics professor Bill Davidon, stole over 1,000 classified documents.
Analysis revealed FBI priorities: just 1% of resources devoted to organized crime, while 40% targeted political surveillance of left and liberal groups—with only two cases concerning right-wing organizations. The documents exposed COINTELPRO, the Counter Intelligence Program operating since 1956, which employed tactics including surveillance, infiltration, anonymous threatening letters, IRS audits as harassment, forged correspondence, false media stories, and encouraging violence to justify crackdowns.
Targets included Martin Luther King Jr., Malcolm X, the Black Panthers, the American Indian Movement, feminist organizations, and environmental groups. The Washington Post published the documents despite FBI pressure. FBI Director Hoover officially ended COINTELPRO, and the subsequent Church Committee investigation (1975-76) led to creation of permanent congressional intelligence oversight, the Foreign Intelligence Surveillance Act, and an executive order banning political assassinations. The burglars’ identities remained secret for 43 years until journalist Betty Medsger revealed them in 2014.
How movements actually identify infiltrators
Exposures typically begin with anomalies that don’t quite add up. Kennedy was caught because he made a mistake—leaving his real passport accessible. But movements have developed more systematic approaches rooted in what activists call “security culture.”
Behavioral patterns that prompt investigation include: appearing suddenly without verifiable history in activist communities; possessing unusual resources (money, vehicles, equipment) without clear source; encouraging illegal actions while avoiding personal risk; forming rapid, intense relationships, especially romantic ones; being frequently absent on unexplained trips; and pushing for violent escalation when others disagree.
However, experienced organizers emphasize these flags require careful evaluation. Many genuine activists—particularly people of color, neurodivergent individuals, and those fleeing abusive situations—legitimately protect their backgrounds. The International Center on Nonviolent Conflict recommends focusing on conduct rather than suspected identity: establish clear behavioral standards first, then judge people against those standards. “You do not need to address whether the person is an infiltrator. You simply need to cite how exactly they have broken the code of conduct.”
The Black Orchid Collective insists on documented accountability: “If people feel sure enough of their facts to launch public accusations… they should be willing to take personal and/or collective responsibility… and provide supporting evidence.” Anonymous accusations are particularly dangerous because they can be planted by actual infiltrators to destroy legitimate activists.
When false accusations become the real weapon
The danger of incorrect identification cannot be overstated. FBI documents reveal that COINTELPRO deliberately employed “snitch-jacketing”—spreading false rumors that activists were informants to destroy movements from within. FBI infiltrator William O’Neal consolidated power within the Black Panther Party by falsely accusing others, while actually serving as the primary informant himself.
The murder of Anna Mae Aquash demonstrates the lethal consequences. This Native American activist with the American Indian Movement was killed by fellow members in 1975 based on a rumor that she was an informant. The rumor was planted by an actual infiltrator. Her body was found on the Pine Ridge Reservation; she had been shot in the back of the head.
False accusations often target people who “don’t fit” expected activist profiles. Beyond destroying innocent people’s reputations and relationships, bad-jacketing isolates valuable organizers and ironically makes them more vulnerable to actual recruitment—someone expelled from their community has little left to protect. The Twin Cities General Defense Committee observes: “The worst-case scenario is all too common and real.”
Effectiveness depends on context and evidence
The record shows exposure works best under specific conditions: documentary evidence that proves identity beyond dispute; a network of solidarity to disseminate findings and protect exposers; sympathetic media willing to publish; existing public concern about government overreach; and high-profile misconduct by the exposed agents that generates outrage.
The post-Watergate climate enabled COINTELPRO revelations to reshape American oversight institutions. The UK scandal gained traction because undercover officers had formed sexual relationships and fathered children—conduct so extreme it generated sustained public anger. The Stasi files opened because a popular revolution had already delegitimized the regime.
Without these conditions, exposure often fails. Accusations based on suspicion rather than proof are dismissed or weaponized against the accusers. Movements too small to generate media attention find their revelations ignored. And security services adapt—shifting toward technical surveillance, using civilian informants rather than sworn officers, and developing new hybrid intelligence-sharing networks that are harder to penetrate.
MIT scholar Gary T. Marx notes that after major exposures, “control has become more technical, mechanical, softer, diffuse and less visible.” The FBI claimed to end COINTELPRO but similar tactics continued case-by-case. UK undercover policing continued after the scandal, though with greater caution about sexual relationships. Exposure degrades specific operations but rarely eliminates the underlying surveillance impulse.
The ethical case for and against exposure
Defenders argue that citizens have a right to know when states violate constitutional protections. The Church Committee concluded that the “right of the public to know” justified exposure of intelligence abuses. Exposure enables democratic oversight of operations that would otherwise never face accountability and creates deterrents against future misconduct. Agee maintained he was providing information that allowed “local governments… to decide how to neutralize the agents” threatening their sovereignty.
Critics counter with safety concerns—the Welch assassination demonstrates that exposure can contribute to violence. They warn that activists become vigilantes acting as judge and jury without due process. Some argue that excessive focus on identifying infiltrators drains energy from movement goals and creates paranoia that destroys solidarity. The irony is that obsessive suspicion can do more damage than actual infiltration.
The distinction between exposing operations and endangering individuals matters legally and ethically. Revealing COINTELPRO tactics and surveillance programs is generally protected speech; publishing individual names of active covert operatives crosses into criminal liability. Those planning disclosure should understand that exposing methods, patterns, and institutional practices may accomplish resistance goals without creating the specific dangers—and legal jeopardy—of naming individuals.
The weight of consequences
Those who disclose face consequences ranging from expulsion and exile (Agee) to criminal prosecution (potential under IIPA) to retaliation from exposed individuals and their allies. Movements should understand that exposure campaigns require organizational capacity to protect disclosers, legal resources, and media relationships to ensure revelations reach the public.
Those disclosed face consequences ranging from career destruction to social ostracism to physical danger. The German experience shows that exposed informants often denied responsibility, claiming coercion or good intentions. Many lost positions; some lost families. Whether this represents justice or collective punishment remains debated. Pastor Rolf Michael Turek pioneered reconciliation efforts between victims and former informants, helping some understand why betrayals happened rather than simply seeking revenge.
The fundamental tension remains unresolved: exposure serves truth and victims’ right to know, but can shatter communities. Movements weighing this tactic must consider not only immediate disruption of surveillance but long-term effects on trust, solidarity, and their own organizational health. The most successful exposures combined careful verification, coalition building, strategic timing, and clear communication about both methods and motives—transforming individual revelations into sustained pressure for institutional change.
