Skip to content

Plausible Deniability Quote Movie In Essay

In the midst of writing an essay, paper, or article, you may need to throw in a direct quote here and there; to add emphasis, authority, or clarity to your work. A quote can often accomplish things that a paraphrase or summary simply cannot . A clear and direct voice can easily drive a point home better than the best group of sentences you can come up with.

And along with this, in the process of sorting out your notes and research data, you may find that the quotes you'd like to include in your paper are not all from books and journal articles. Considering that your information can come from many sources, whether they be print, online, or audiovisual, its a good chance that you can have sources ranging from books and government documents to mp3s and Youtube videos. All of which need to be properly cited a formatted.

Formatting style and citation overview

A prerequisite to citing anything is a format and guideline to follow. And this usually comes about from the three basic styling guides, APA, MLA, and Chicago Manual of Style (the Turabian styling guide is also popular but closely resembles the Chicago manual in many respects; so often times the two are categorized together). A professor or publisher will generally request one of the three types of formatting styles, for both in-text and bibliographic listings.

These are the two main types of citations; one that appears in the text of a work and one that appears at the end. The in-text is how you indicate the source of your quote in the lines of the text of your paper and the work cited, bibliography or reference pages are where your source will show up at the end of your document. It may be helpful to become familiar with all the styling guides to make things easier for you in the long run, but typically you'll just need to know the details of the one being requested of you, when preparing your paper or essay for publication.

*This article will focus on audiovisual citations only.

Audiovisual citations

In most cases, since the written word is often used in research (whether online or in print) the chances of you actually using audiovisual material for research may be minimal. So this type of citing is usually not as common as the rest; but nonetheless still needs to be addressed to avoid plagiarism in any fashion.

*The following list is categorized by medium and provides details of both in-text citations and also ones that appear in a list at the end of the document.

APA (American Psychological Association)

1. Audio Recording

In-text citation:
(Krasdale, 2010)

Reference Listing:
Krasdale, S. (Speaker). (2010). The way money works (Cassette Recording No. 17). New York, NY: Education Plus Inc.

2. Film/Motion Picture

In-text citation:
(Dunhoo & Titun, 1985)

Reference listing:
Dunhoo, A. (Producer), & Titun, K. (Director). (1985). Inside the aerospace industry [Motion Picture]. United States: Lakeview Films

3. Radio broadcast

In-text citation:
(Lopez, 2013)

Reference listing:
Lopez, P. (Narrator). (2013, March 1). The harms of secondhand smoke amongst children [Radio broadcast episode]. In E. McDonnell (Producer), Morning Edition. Washington, DC: National Public Radio.

MLA (Modern Language Association)

1. Audio Recording

In-text citation:

Work cited listing:
Kent, Abdullah. The diseases of the heart. 1995. True Audio, 1999. Audiocassette.

2. Film/Motion Picture

In-text citation:
(The Politics of Money)

Work cited listing:
The Politics of Money. Dir. Larry Smith. New Studios, 2000. Film.

3. Radio Broadcast

In-text citation:
("Fun with marriage")

Work cited listing:
"Fun with marriage". Morning Digest. Philadelphia-Delaware Radio . WXKF, Philadelphia. 12 June 2002. Radio.

*MLA basic rule of thumb:* When providing in-text citations for MLA you may notice that the in-text citation matches the beginning of the work cited listing. This is the basic setup for MLA referencing. To make finding a source relatively easy, the in-text citation will simply mirror the beginning of the listing that is found at the end of the paper.

Chicago Manual of Style

1. Audio Recording

First foot/endnote:
Randolph Klein, Understanding French, Knowledge Productions 1678-CD, 2012, Compact disc.

Subsequent notes:
Klein, Understanding French.

Klein, Randolph. Understanding French. Knowledge Productions 11678-CD. 2012. Compact disc.

2. Film/Motion Picture:

First foot/endnote:
The Life of the Ruler, DVD, directed by Tod Lewis (1982; New Orleans, LA: Castle Light Productions, 2000).

Subsequent notes:
The Life of the Ruler.

The Life of the Ruler. DVD. Directed by Tod Lewis. 1982; New Orleans, LA: Castle Light Productions, 2000.

3. Radio Broadcast:

First foot/endnote:
"Cleaning up after the tsunami," Morning Digest, WXKF Philadelphia-Delaware Radio (Philadelphia, PA: WPKT, January 10, 2005).

Subsequent notes:
"Cleaning up after the tsunami"

"Cleaning up after the tsunami." Morning Digest. WXKF Philadelphia-Delaware Radio . Philadelphia, PA: WPKT, January 10, 2005.

Citing tip

Citing using any manual of style can be a tedious process. When obtaining a movie or film quote save some time by not watching anything at all. Many, many video recording, films, and motion pictures have transcripts available for them (as well as audio recordings). This is a tremendous help when providing direct quotations. Instead of struggling to decipher and record an exact statement, a keyword search in the work's transcript can just as easily provide the same results.

Special notes

Please note that for some citation guidelines (such as MLA film/video recording citations) there is no a one-size-fits-all method of citing. There are actually a few different methods citing based on what you would like to emphasize in your referencing (for example, maybe you'd like to emphasize the director or the people involved, then your citation would be changed because of that).

Also your citation may be altered based on whether or not you provide a signal phrase or include the full reference in the text of your paper as oppose to using parenthetical citations. The default method for all the in-text citations above are parenthetical, with no signal phrases. And finally there is no in-text citation format for the Chicago manual of style because footnotes and endnotes are utilized with this guide instead.

Plausible deniability is the ability of people (typically senior officials in a formal or informal chain of command) to deny knowledge of or responsibility for any damnable actions committed by others in an organizational hierarchy because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions. In the case that illegal or otherwise disreputable and unpopular activities become public, high-ranking officials may deny any awareness of such acts to insulate themselves and shift blame onto the agents who carried out the acts, as they are confident that their doubters will be unable to prove otherwise. The lack of evidence to the contrary ostensibly makes the denial plausible, that is, credible, although sometimes it merely makes it unactionable. The term typically implies forethought, such as intentionally setting up the conditions to plausibly avoid responsibility for one's (future) actions or knowledge. In some organizations, legal doctrines such as command responsibility exist to hold major parties responsible for the actions of subordinates involved in heinous acts and nullify any legal protection that their denial of involvement would carry.

High-ranking officials in more typically Eastern cultures, such as Japan or Korea, are often expected to take full responsibility for improper actions by their subordinates. As an example, Japanese CEOs have made dramatic public apologies and even committed suicide when their companies have been dishonored in some way.[1],

In politics and espionage, deniability refers to the ability of a powerful player or intelligence agency to pass the buck and avoid blowback by secretly arranging for an action to be taken on their behalf by a third party ostensibly unconnected with the major player. In political campaigns, plausible deniability enables candidates to stay clean and denounce third-party advertisements that use unethical approaches or potentially libellous innuendo.

In the US, plausible deniability is also a legal concept. It refers to lack of evidence proving an allegation. Standards of proof vary in civil and criminal cases. In civil cases, the standard of proof is "preponderance of the evidence" whereas in a criminal matter, the standard is "beyond a reasonable doubt". If an opponent cannot provide evidence for his allegation, one can plausibly deny the allegation even though it may be true.

Although plausible deniability has existed throughout history, that name for it was coined by the CIA in the early 1960s to describe the withholding of information from senior officials in order to protect them from repercussions in the event that illegal or unpopular activities by the CIA became public knowledge. The roots of the name go back to Harry Truman's national security council paper 10/2 of June 18, 1948, which defined "covert operations" as "...all activities (except as noted herein) which are conducted or sponsored by this Government against hostile foreign states or groups or in support of friendly foreign states or groups but which are so planned and executed that any US Government responsibility for them is not evident to unauthorized persons and that if uncovered the US Government can plausibly disclaim any responsibility for them."[1] During Eisenhower's administration, NSC 10/2 was incorporated into more specific NSC 5412/2 "Covert Operations."[2] NSC 5412 was de-classified in 1977, and is located at the National Archives.[3]


Arguably, the key concept of plausible deniability is plausibility. It is relatively easy for a government official to issue a blanket denial of an action, and it is possible to destroy or cover up evidence after the fact, and this might be sufficient to avoid a criminal prosecution, for instance. However, the public might well disbelieve the denial, particularly if there is strong circumstantial evidence, or if the action is believed to be so unlikely that the only logical explanation is that the denial is false.

The concept is even more important in espionage. Intelligence may come from many sources, including human sources. The exposure of information to which only a few people are privileged may directly implicate some of those people in the disclosure. Take for example a scenario where an official is traveling secretly, and only one of his aides knows the specific travel plans. The official is assassinated during his travels, and the circumstances of the assassination strongly suggest that the assassin had foreknowledge of the official's travel plans. The probable conclusion is that his aide has betrayed the official. There may be no direct evidence linking the aide to the assassin, but collaboration can be inferred from the facts alone, thus making the aide's denial implausible.


The expression "plausibly deniable" was first used publicly by Central Intelligence Agency (CIA) director Allen Dulles.[4] The idea, on the other hand, is considerably older. For example, in the 19th century, Charles Babbage described the importance of having "a few simply honest men" on a committee who could be temporarily removed from the deliberations when "a peculiarly delicate question arises" so that one of them could "declare truly, if necessary, that he never was present at any meeting at which even a questionable course had been proposed."[5]

Church Committee[edit]

A U.S. Senate committee, the Church Committee, in 1974–1975 conducted an investigation of the intelligence agencies. In the course of the investigation, it was revealed that the CIA, going back to the Kennedy administration, had plotted the assassination of a number of foreign leaders, including Cuba's Fidel Castro. But the president himself, who clearly was in favor of such actions, was not to be directly involved, so that he could deny knowledge of it. This was given the term 'plausible denial'.[6]

Non-attribution to the United States for covert operations was the original and principal purpose of the so-called doctrine of "plausible denial." Evidence before the Committee clearly demonstrates that this concept, designed to protect the United States and its operatives from the consequences of disclosures, has been expanded to mask decisions of the president and his senior staff members.

— Church Committee[7]

Plausible denial involves the creation of power structures and chains of command loose and informal enough to be denied if necessary. The idea was that the CIA (and, later, other bodies) could be given controversial instructions by powerful figures—up to and including the President himself—but that the existence and true source of those instructions could be denied if necessary; if, for example, an operation went disastrously wrong and it was necessary for the administration to disclaim responsibility.

Legislative barriers after the Church Committee[edit]

The Hughes–Ryan Act of 1974 sought to put an end to plausible denial by requiring a Presidential finding that each operation is important to national security, and the Intelligence Oversight Act of 1980 required that Congress be notified of all covert operations. But both laws are full of enough vague terms and escape hatches to allow the executive branch to thwart their authors' intentions, as the Iran–Contra affair has shown. Indeed, the members of Congress are in a dilemma: when they are informed, they are in no position to stop the action, unless they leak its existence and thereby foreclose the option of covertness.[8]

Media reports[edit]

The (Church Committee) conceded that to provide the United States with "plausible denial" in the event that the anti-Castro plots were discovered, Presidential authorization might have been subsequently "obscured". (The Church Committee) also declared that, whatever the extent of the knowledge, Presidents Eisenhower, Kennedy and Johnson should bear the "ultimate responsibility" for the actions of their subordinates.[9]

CIA officials deliberately used Aesopian language[10] in talking to the President and others outside the agency. (Richard Helms) testified that he did not want to "embarrass a President" or sit around an official table talking about "killing or murdering." The report found this "circumlocution"[11] reprehensible, saying: "Failing to call dirty business by its rightful name may have increased the risk of dirty business being done." The committee also suggested that the system of command and control may have been deliberately ambiguous, to give Presidents a chance for "plausible denial."[12]

What made the responsibility difficult to pin down in retrospect was a sophisticated system of institutionalized vagueness and circumlocution whereby no official - and particularly a President - had to officially endorse questionable activities. Unsavory orders were rarely committed to paper and what record the committee found was shot through with references to "removal," "the magic button"[13] and "the resort beyond the last resort." Thus the agency might at times have misread instructions from on high, but it seemed more often to be easing the burden of presidents who knew there were things they didn't want to know. As former CIA director Richard Helms told the committee: "The difficulty with this kind of thing, as you gentlemen are all painfully aware, is that nobody wants to embarrass a President of the United States."[14]

Iran–Contra affair[edit]

In his testimony to the congressional committee studying the Iran–Contra affair, Vice Admiral John Poindexter stated: "I made a deliberate decision not to ask the President, so that I could insulate him from the decision and provide some future deniability for the President if it ever leaked out."[15]

Declassified government documents[edit]

  • Pentagon papers October 25, 1963 Telegram from the Ambassador in Vietnam Henry Cabot Lodge, Jr. to Special Assistant for National Security Affairs McGeorge Bundy on US Options with Respect to a Possible Coup, mentioning the term plausible denial Alternative link (See Telegram 216)
  • CIA and White House documents on covert political intervention in the 1964 Chilean election declassified. The CIA's Chief of Western Hemisphere Division, J.C. King, recommended that funds for the campaign "be provided in a fashion causing (Eduardo Frei Montalva president of Chile) to infer United States origin of funds and yet permitting plausible denial"[16]
  • Training files of the CIA's covert "Operation PBSUCCESS," for the 1954 coup in Guatemala. According to the National Security Archive: "Among the documents found in the training files of Operation PBSUCCESS and declassified by the Agency is a CIA document titled 'A Study of Assassination.' A how-to guide book in the art of political killing, the 19-page manual offers detailed descriptions of the procedures, instruments, and implementation of assassination." The manual states that to provide plausible denial, "no assassination instructions should ever be written or recorded."[17]


The doctrine has at least five major flaws:

  • It was an open door to the abuse of authority; it required that the parties in question could be said to have acted independently, which in the end was tantamount to giving them license to act independently.[18]
  • The denials are sometimes seen as plausible and were sometimes seen through by both the media and the populace.[19] One aspect of the Watergate crisis is the repeated failure of the doctrine of plausible deniability, which the administration repeatedly attempted to use to stop the scandal affecting President Richard Nixon and his aides.
  • "Plausible denial" only increases the risk of misunderstanding between senior officials and their employees.[20]
  • If the claim fails, it seriously discredits the political figure invoking it as a defense. ("It's not the crime, it's the cover-up")[citation needed]
  • If it succeeds, it creates the impression that the government is not in control of the state.[citation needed]

Other examples[edit]

Another example of plausible deniability is someone who actively avoids gaining certain knowledge of facts because it benefits that person not to know.

As an example, an attorney may suspect that facts exist which would hurt his case, but decide not to investigate the issue because if the attorney had actual knowledge, the rules of ethics might require him to reveal those facts to the opposing side.

Council on Foreign Relations[edit]

"...the U.S. government may at times require a certain deniability. Private activities can provide that deniability." —Council on Foreign Relations, an American foreign policy think tank, in the 2003 report, "Finding America’s Voice: A Strategy for Reinvigorating U.S. Public Diplomacy"[citation needed]

Use in computer networks[edit]

In computer networks, deniability often refers to a situation where a person can deny transmitting a file, even when it is proven to come from his computer.

This is sometimes done by setting the computer to relay certain types of broadcasts automatically, in such a way that the original transmitter of a file is indistinguishable from those who are merely relaying it. In this way, the person who first transmitted the file can claim that his computer had merely relayed it from elsewhere.

It can also be done by a VPN where the host is not known[dubious– discuss].

In any case, this claim cannot be disproven without a complete decrypted log of all network connections.

Freenet file sharing[edit]

The Freenetfile sharing network is another application of the idea. It obfuscates data sources and flows in order to protect operators and users of the network by preventing them (and, by extension, observers such as censors) from knowing where data comes from and where it is stored.

Use in cryptography[edit]

In cryptography, deniable encryption may be used to describe steganographic techniques, where the very existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that an encrypted message exists. In this case the system is said to be 'fully undetectable' (FUD).[citation needed]

Some systems take this further, such as MaruTukku, FreeOTFE and (to a much lesser extent) TrueCrypt and VeraCrypt, which nest encrypted data. The owner of the encrypted data may reveal one or more keys to decrypt certain information from it, and then deny that more keys exist, a statement which cannot be disproven without knowledge of all encryption keys involved. The existence of "hidden" data within the overtly encrypted data is then deniable in the sense that it cannot be proven to exist.


The Underhanded C Contest is an annual programming contest involving the creation of carefully crafted defects, which have to be both very hard to find and plausibly deniable as mistakes once found.

See also[edit]



  1. ^Office of the Historian, Department of State. National Security Council Directive on Office of Special Projects (NSC 10/2), Washington, June 18, 1948.
  2. ^Office of the Historian, Department of State. Covert Operations (NSC 5412/2), Washington, undated.
  3. ^Records of the National Security Council (NSC), Record Group 273.
  4. ^Carlisle, Rodney P (2003). The Complete Idiot's Guide to Spies and Espionage. Alpha Books. ISBN 0-02-864418-2.  p. 213
  5. ^Babbage, Charles (1864). Passages from the Life of a Philosopher. Longman, Green, Longman, Roberts, & Green.  p. 261-262
  6. ^Zinn, Howard (1991). Declarations of Independence: Cross Examining American Ideology. Perennial. ISBN 0-06-092108-0. , pg 16
  7. ^Church Committee Reports United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, Senate, Nov. 20, 1975, II. Section B Covert Action as a Vehicle for Foreign Policy Implementation Page 11
  8. ^New York Times Under Cover, or Out of Control? November 29, 1987 Section 7; Page 3, Column 1 (Book Review of 2 books: The Perfect Failure and Covert Action)
  9. ^New York Times Castro Study Plot finds No Role by White House, November 21, 1975, page 52
  10. ^Definition: Using or having ambiguous or allegorical meanings, especially to elude political censorship: “They could express their views only in a diluted form, resorting to Aesopian hints and allusions” (Isaac Deutscher).
  11. ^Definition: The use of unnecessarily wordy and indirect language, Evasion in speech or writing, An indirect way of expressing something
  12. ^New York Times How Fantasies Became Policy, Out of Control, The Honorable, Murderous Gentlemen of A Secret World, November 23, 1975, page 199.
  13. ^Definition of the "Magic Button" from the Los Angeles Times Article: The Search for a 'Magic Button' In American Foreign Policy; October 18, 1987; (Review by David Aaron of the book Covert Action)I recall during my days as a Senate investigator finding a piece of yellow note pad with jottings from a meeting with White House officials during the Kennedy Administration that discussed an "Executive Action" or, in plain English, an assassination capability. The notes referred to it as the "magic button."
  14. ^Newsweek The CIA'S Hit List, December 1, 1975, page 28
  15. ^Jamieson, Kathleen Hall (1993). Dirty Politics: Deception, Distraction, and Democracy. Oxford University Press US. ISBN 0-19-508553-1. p. 86
  16. ^"Chile 1964: CIA covert support in Frei election detailed; operational and policy records released for first time". National Security Archive. Retrieved 2006-07-08. 
  17. ^"CIA and Assassinations: The Guatemala 1954 Documents". National Security Archive. Retrieved 2006-07-08. 
  18. ^Church Committee II. Section B Page 11; IV. Findings and Conclusions Section C Subsection 1 Page 261:
    An additional possibility is that the President may, in fact, not be fully and accurately informed about a sensitive operation because he failed to receive the “circumlocutious” message...The Committee finds that the system of Executive command and control was so inherently ambiguous that it is difficult to be certain at what level assassination activity was known and authorized. This creates the disturbing prospect that assassination activity might have been undertaken by officials of the United States Government without its having been incontrovertibly clear that there was explicit authorization from the President of the United States.
  19. ^Church Committee IV. Findings and Conclusions Section C Subsection 5 Page 277:
    It was naive for policymakers to assume that sponsorship of actions as big as the [Bay of Pigs] invasion could be concealed. The Committee’s investigation of assassination and the public disclosures which preceded the inquiry demonstrate that when the United States resorted to cloak-and-dagger tactics, its hand was ultimately exposed.
  20. ^Church Committee IV. Section C Subsection 5 Page 277:
    "Plausible denial" increases the risk of misunderstanding. Subordinate officials should describe their proposals in clear, precise, and brutally frank language; superiors are entitled to, and should demand, no less

Further reading

  • Campbell, Bruce B. (2000). Death Squads in Global Perspective : Murder With Deniability. Palgrave Macmillan. ISBN 0-312-21365-4. 
  • Shulsky, Abram N; Gary James Schmitt (2002). Silent Warfare: Understanding the World of Intelligence. pp. 93–94, 130–132. ISBN 1-57488-345-3. 
  • Treverton, Gregory F. (1988). Covert Action: The CIA and the Limits of American Intervention in the Postwar World. Palgrave Macmillan. ISBN 1-85043-089-6. 

External links[edit]