Skip to main content
Top

2023 | OriginalPaper | Chapter

13. Covert Operations

Author : Ferdinand J. Haberl

Published in: Jihadi Intelligence and Counterintelligence

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Covert operations have become an integral factor for Jihādi intelligence. A governmental covert operation could be defined as one that takes place in plain sight, but where policymakers enjoy the advantage of plausible deniability. Such operations can be political, psychological, economic or (para-)military in nature and are inherently secretive. They follow the rationale of intervening in a clandestine way and actively changing an existing situation with oftentimes limited means. Therefore, covert operations are usually conducted instead of overt military operations. They are highly relevant for Jihādi intelligence may also include covert activities in the field of propaganda, economic warfare or subversion, which in turn may involve espionage, counter-espionage and deception.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Post (2004), p. 84.
 
2
Aldrich et al. (2019), p. 433.
 
3
Ibid, p. 433.
 
4
CIA (2003).
 
5
Aldrich et al. (2019), p. 433.
 
6
Al-Qaeda (2015), pp. 4–41.
 
7
Lowenthal (2009), pp. 166–167.
 
8
Al-Qaeda (2015), pp. 4–41.
 
9
BBC (2017).
 
10
IS (2017), p. 15.
 
11
Lowenthal, (2009), pp. 166–167.
 
12
Al-Qaeda (2015), p. 31.
 
13
Ibid, p. 31.
 
14
Post (2004), p. 86.
 
15
Ibid, p. 86.
 
16
Ibid, p. 86.
 
17
Spécial Défense Blog (2016). See also: Weiss (2016).
 
18
Also known as Abdelilah Himich, Abu Souleymane, Abu Souleymane al-Faransi, Abu Souleymane the Frenchman, Abu Sulaiyman al Fransi, Abu Sulaiyman, Abu Sulayman al-Faransi, Abu Suleiman, Abu Suleyman and Abu Suleyman al-Faransi.
 
19
Rotella (2016).
 
20
Weiss (2016).
 
21
Rotella (2016).
 
22
Ibid.
 
23
Ibid.
 
24
Also known as Abdel-Hamid Abu Oud, Abou Omar el-Belgiki, Abou Omar Soussi and Abu Umar al-Baljiki.
 
25
Counter Terrorism Project (2019).
 
26
Associated Press (2016).
 
27
Rotella (2016).
 
28
Spécial Défense Blog (2016).
 
29
Coles and Parker (2015).
 
30
Also known as Abu Omar the Hitter.
 
31
Borger (2015).
 
32
Ibid.
 
33
Ibid.
 
34
Ibid.
 
35
Seelow (2015).
 
36
Rodgers (2008), p. 154.
 
37
Ibid, 156.
 
38
Ibn Ishaq, Sirat Rasul. Oxford UP, pp. 675–676.
 
39
Ash-Shifa IV, 1(3). pp. 378–379.
 
40
Ibn Ishaq, Sirat Rasul. Oxford UP, p. 243.
 
41
Qureshi (1991), p. 312.
 
42
Watts (1956).
 
43
Glubb (2001), p. 195.
 
44
Rodgers (2008), p. 156.
 
45
Ibn Ishaq, Sirat Rasul. Oxford UP, p. 666.
 
46
Al-Tabaqat. Vol II. p. 30.
 
47
Rodgers (2008), p. 156.
 
48
Ibid, 156.
 
49
Ibid, 156.
 
50
Wiskind (2016), p. 15.
 
51
Al-Qaeda (2015).
 
52
Al-Qaeda (2013).
 
53
Al-Qaeda (2015), p. 66.
 
54
Ibid, p. 66.
 
55
Ibid, p. 66.
 
56
Ibid, p. 66.
 
57
Ibid, p. 67.
 
58
Ibid, p. 68.
 
59
Ibid, p. 68.
 
60
Inspire no. 4 and no. 5 provide instructions for using an AK 47 rifle, including maintaining the weapon and shooting positions.
 
61
Wiskind (2016).
 
62
Al-Qaeda (2015), p. 70.
 
63
Abd Al-Aziz Al-Muqrin (2009), p. 24.
 
64
Ibid, p. 24.
 
65
Ibid, p. 24.
 
66
Ibid, pp. 130–131.
 
67
Ibid, pp. 130–131.
 
68
Ibid, p. 24.
 
69
Ibid, pp. 141–148.
 
70
Ibid, p. 142.
 
71
Al-Qaeda (2016), p. 3.
 
72
Abd Al-Aziz Al-Muqrin (2009), p. 129.
 
73
Abd Al-Aziz Al-Muqrin (2009), p. 130.
 
74
Ibid, p. 130.
 
75
Al-Qaeda (2015), p. 31.
 
Literature
go back to reference Abd Al-Aziz Al-Muqrin (2009) A practical course of Guerrilla war (trans: Cigar N), published as: Al-Aqidas’s Doctrine for Insurgency, Washington Abd Al-Aziz Al-Muqrin (2009) A practical course of Guerrilla war (trans: Cigar N), published as: Al-Aqidas’s Doctrine for Insurgency, Washington
go back to reference Aldrich RJ et al (2019) Secret intelligence—a reader. Routledge Aldrich RJ et al (2019) Secret intelligence—a reader. Routledge
go back to reference Al-Qaeda (2016) Inspire no. 15. Professional assassinations Al-Qaeda (2016) Inspire no. 15. Professional assassinations
go back to reference Borger J (2015) Abdelhamid Abaaoud: dead Paris terror planner leaves behind countless what‐ifs. The Guardian. Accessed Online: https://www.theguardian.com/world/2015/nov/19/abdelhamid‐abaaoud‐dead‐paris‐terror‐leader‐leaves‐behind‐countless‐what‐ifs. 19 Nov 2015 Borger J (2015) Abdelhamid Abaaoud: dead Paris terror planner leaves behind countless what‐ifs. The Guardian. Accessed Online: https://​www.​theguardian.​com/​world/​2015/​nov/​19/​abdelhamid‐abaaoud‐dead‐paris‐terror‐leader‐leaves‐behind‐countless‐what‐ifs. 19 Nov 2015
go back to reference CIA (2003) National Security Council Directive on covert operations. 10/2 CIA (2003) National Security Council Directive on covert operations. 10/2
go back to reference Glubb J (2001) The life and times of Muḥammad. Coopere Square Press Glubb J (2001) The life and times of Muḥammad. Coopere Square Press
go back to reference Lowenthal MM (2009) Intelligence—from secrets to policy. CQ Press Lowenthal MM (2009) Intelligence—from secrets to policy. CQ Press
go back to reference Qureshi MS (1991) Foreign policy of Hadrat Muḥammad. Kitab Bhavan Qureshi MS (1991) Foreign policy of Hadrat Muḥammad. Kitab Bhavan
go back to reference Rodgers R (2008) Fundamentals of Islamic asymmetric warfare: a documentary analysis of the principles of Muḥammad, Edwin Mellen Pr Rodgers R (2008) Fundamentals of Islamic asymmetric warfare: a documentary analysis of the principles of Muḥammad, Edwin Mellen Pr
go back to reference Watts M (1956) Muḥammad at Medina. Oxford, pp 178 Watts M (1956) Muḥammad at Medina. Oxford, pp 178
go back to reference Wiskind C (2016) Lone Wolf Terrorism and open source Jihād: an explanation and assessment. Int Inst sCounter-Terrorism (ICT) Wiskind C (2016) Lone Wolf Terrorism and open source Jihād: an explanation and assessment. Int Inst sCounter-Terrorism (ICT)
Metadata
Title
Covert Operations
Author
Ferdinand J. Haberl
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-24744-6_13