Iran's Shadow Weapons: Covert Action, Intelligence Operations and Unconventional Warfare

Surveillance, assassination, and war by proxy--all ingredients for an unending disaster that never seems to end for those exposed to the wrath of the Islamic Republic of Iran. Despite the prevalence of these and other malign acts, few observers understand why and how the regime chooses these tools of fear and disruption. Even fewer can foil them.

In this first work of its kind, the author draws upon two decades of experience to lay bare the calculus, structure, and execution of Iran's foreign intelligence activities, covert actions, and unconventional warfare operations. This book reveals how the regime's shadowy work is driven by a warring mixture of rampant paranoia, unshakable greed, and cold rationality. He meticulously reveals a policy toolkit wielded for self-interest and survival, supported by strategies to eliminate opposition figures, stifle dissent, and promote defense in depth around Iran. Before any others, the Iranian people are simultaneously the regime's greatest source of insecurity and its chief target in a series of policies taking hold since 1979.

1146533603
Iran's Shadow Weapons: Covert Action, Intelligence Operations and Unconventional Warfare

Surveillance, assassination, and war by proxy--all ingredients for an unending disaster that never seems to end for those exposed to the wrath of the Islamic Republic of Iran. Despite the prevalence of these and other malign acts, few observers understand why and how the regime chooses these tools of fear and disruption. Even fewer can foil them.

In this first work of its kind, the author draws upon two decades of experience to lay bare the calculus, structure, and execution of Iran's foreign intelligence activities, covert actions, and unconventional warfare operations. This book reveals how the regime's shadowy work is driven by a warring mixture of rampant paranoia, unshakable greed, and cold rationality. He meticulously reveals a policy toolkit wielded for self-interest and survival, supported by strategies to eliminate opposition figures, stifle dissent, and promote defense in depth around Iran. Before any others, the Iranian people are simultaneously the regime's greatest source of insecurity and its chief target in a series of policies taking hold since 1979.

29.99 In Stock
Iran's Shadow Weapons: Covert Action, Intelligence Operations and Unconventional Warfare

Iran's Shadow Weapons: Covert Action, Intelligence Operations and Unconventional Warfare

by Jonathan W. Hackett
Iran's Shadow Weapons: Covert Action, Intelligence Operations and Unconventional Warfare

Iran's Shadow Weapons: Covert Action, Intelligence Operations and Unconventional Warfare

by Jonathan W. Hackett

eBook

$29.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

Surveillance, assassination, and war by proxy--all ingredients for an unending disaster that never seems to end for those exposed to the wrath of the Islamic Republic of Iran. Despite the prevalence of these and other malign acts, few observers understand why and how the regime chooses these tools of fear and disruption. Even fewer can foil them.

In this first work of its kind, the author draws upon two decades of experience to lay bare the calculus, structure, and execution of Iran's foreign intelligence activities, covert actions, and unconventional warfare operations. This book reveals how the regime's shadowy work is driven by a warring mixture of rampant paranoia, unshakable greed, and cold rationality. He meticulously reveals a policy toolkit wielded for self-interest and survival, supported by strategies to eliminate opposition figures, stifle dissent, and promote defense in depth around Iran. Before any others, the Iranian people are simultaneously the regime's greatest source of insecurity and its chief target in a series of policies taking hold since 1979.


Product Details

ISBN-13: 9781476656007
Publisher: McFarland & Company, Inc., Publishers
Publication date: 06/26/2025
Sold by: Barnes & Noble
Format: eBook
Pages: 353
File size: 6 MB
Age Range: 18 Years

About the Author

Jonathan W. Hackett is a retired U.S. Marine with two decades of experience. He has held positions at the Defense Intelligence Agency, National Security Agency, Marine Forces Special Operations Command, and the Marine Corps operating forces prior to teaching full spectrum human intelligence operations and security cooperation in Dam Neck, Virginia.
Jonathan W. Hackett is a retired U.S. Marine with two decades of experience. He has held positions at the Defense Intelligence Agency, National Security Agency, Marine Forces Special Operations Command, and the Marine Corps operating forces prior to teaching full spectrum human intelligence operations and security cooperation in Dam Neck, Virginia.

Table of Contents

Table of Contents

Acknowledgments
Preface
Outlining the Shadow: An Introduction
Mapping the Levers of Power
Sacred Talismans
The Blue Talisman: Israel versus Iran
The Red Talisman: Exporting the Revolution
The Black Talisman: Realism and Realpolitik
Lifting the Emerald Curtain: A Framework for Understanding
Structure of the Book
Part I—Foreign Intelligence Activities
One. Drawing Red Lines
Ebb and Flow: The Evolution of VAJA
From Consumers to Producers
Coordination and Tension
Missions and Targets Abroad
Summary
Two. On the Payroll
Official Cover at Embassies: Intelligence Stations and Other Posts
Diplomatic and Service Passports
Military Attachés
Unofficial Cover
Surveillance Detection and Surveillance Operations
Tradecraft
Summary
Three. “We want to sacrifice you to frighten the others”
Assassination Operations
Kidnapping Operations
Retaliatory Operations
The Regime as a Bogeyman
Analyzing the Wetwork
Summary
Part II—Covert Action
Four. “Tell the gentlemen to use the media tools in a favorable way”
Narrative End States
Ways of Influence
Means of Influence
Summary
Five. Charming Kittens and Cutting Swords
Covert Cyber History and Structure
Cyber Training and Tools
Covert Cyber Operations, Targets and Methods
Summary
Six. “Fueling the machine”
Bonyads
Banks
Businesses
Covert Support to Unconventional Warfare
Summary
Part III—Unconventional Warfare
Seven. “Dare not attack us”
Structuring the IRGC
IRGC and Qods Force Doctrine
Structuring Qods Force
Summary
Eight. Training the Trainers
Training, Force Generation and Education in the IRGC
Training, Force Generation and Professional Education in Qods Force
Training and Equipping Partners
Summary
Nine. “A pervasive presence”
Afghanistan
Lebanon
Iraq
Persian Gulf States
Palestine
Sub-Saharan Africa
The Balkans
The Caucasus
Syria
Yemen
Summary
Conclusion: “Not exactly our rational”
On the Regime’s Political Philosophy
On Nuclear Policy
On Sanctions
On Elites
Looking Ahead
Appendices
Appendix I. List of Abbreviations
Appendix II. Notes on Transliteration, Translation, Abbreviation and Definitions
Appendix III. Religious Official Titles Within the Regime
Chapter Notes
References
Index
From the B&N Reads Blog

Customer Reviews