ISIS: The Terrorist Group That Would Be a State - ISIL, Islamic State, Jihadist Strategy and Savagery, Strengths and Weaknesses, al-Zarqawi, al-Qaeda, al-Baghdadi, al-Nusra, Caliphate, al-Suri, Syria ISIS: The Terrorist Group That Would Be a State - ISIL, Islamic State, Jihadist Strategy and Savagery, Strengths and Weaknesses, al-Zarqawi, al-Qaeda, al-Baghdadi, al-Nusra, Caliphate, al-Suri, Syria

ISIS: The Terrorist Group That Would Be a State - ISIL, Islamic State, Jihadist Strategy and Savagery, Strengths and Weaknesses, al-Zarqawi, al-Qaeda, al-Baghdadi, al-Nusra, Caliphate, al-Suri, Syria

    • 105,00 kr
    • 105,00 kr

Utgivarens beskrivning

Professionally converted for accurate flowing-text e-book format reproduction, this case study presents a net assessment of ISIS: its strengths and weaknesses. The conclusion will propose some recommendations for degrading ISIS, both militarily and ideologically. No lasting resolution to the ISIS threat in Syria and Iraq will be feasible until viable political solutions are found for both countries. At the time of the writing of this case study, the U.S. has proposed no such solution. It has given priority to addressing the security challenge but has not yet settled on an overarching strategy for either country. Instead, the U.S. and its allies have put in place a series of military responses to local threats and have taken advantage of targets of opportunity in both countries using coalition airstrikes. In Syria, the U.S. has launched the occasional U.S. Special Forces mission. Additionally, the U.S. has provided military training and some equipment to the government of Iraq and has responded to requests for airstrikes in support of specific Iraqi military missions.

A net assessment is descriptive, not prescriptive. Developed over time within the U.S. Department of Defense, a net assessment has been described as a practice or methodology based on asking questions from a variety of distinctive perspectives. It focuses on how the enemy operates and who the enemy is. It tries to understand how the enemy thinks about the U.S. in order to anticipate its strategy, if not its individual actions. To conduct a net assessment of ISIS, one needs to look at the strategic interactions of its component parts, its internal bureaucratic behavior, and the multifaceted nature of its strategy.

ISIS developed its strategic approach within the modern jihadist tradition, which al Qaeda violently introduced to the United States with a series of escalating attacks culminating in the attacks of September 11, 2001. However, as an adaptive, learning organization, ISIS departed from al Qaeda's strategy by taking advantage of its best thinking about jihadist lessons as codified by Abu Mus'ab al-Suri, who is a major influence on the ISIS group's military doctrine. In addition, ISIS has used a strategic plan for establishing an Islamic emirate, as presented in broad strokes by another al Qaeda strategist with the pseudonym Abu Bakr Naji. ISIS also has learned from U.S. operations, especially from the use of Sunni tribes during the successful "surge" in Iraq, which came close to destroying al Qaeda in Iraq. Lessons learned from U.S. operations were the basis of the successful rebirth of al Qaeda in Iraq under a new name and organization, now called ISIS, and following a new strategy.

Table of Contents * Chapter I * ISIS: Its Evolution and Influences * A. What's in a Name? From Tawhid w'al-Jihad to ISIS * B. Analytical Framework: Jihadist Strategy and Social Movement Theory * Chapter II * How ISIS Adapts al Qaeda's Doctrine and Strategy of Guerrilla Warfare * A. Guerilla Doctrine: Lessons Learned * B. Guerilla Doctrine: Al-Suri's Template and ISIS * C. Guerrilla Strategy: The Administration of Savagery as Operational Guide * Chapter III * ISIS Group's Successful Mobilization Tactics * A. Communication Strategy * B. Mobilization: Social Movement Theory Concepts Applied to ISIS * Chapter IV * Conclusion: Net Assessment of ISIS Strengths and Weaknesses With Recommendations * A. The Enemy's Strengths * B. The Enemy's Weaknesses * C. Recommendations * Bibliography * Further Reading

GENRE
Historia
UTGIVEN
2016
15 maj
SPRÅK
EN
Engelska
LÄNGD
156
Sidor
UTGIVARE
Progressive Management
STORLEK
250,1
KB

Fler böcker av Progressive Management

Apollo and America's Moon Landing Program: History of the Development Program of the Saturn Rocket and the Saturn V from 1957 to 1968 by the Marshall Space Flight Center Apollo and America's Moon Landing Program: History of the Development Program of the Saturn Rocket and the Saturn V from 1957 to 1968 by the Marshall Space Flight Center
2012
Mali in Perspective: Orientation Guide and Tamashek Cultural Orientation: Geography, History, Economy, Security, Niger, Timbuktu, Kidal, Dogon, Senufo, Tuareg, Mande, Fulani, Maure, Bamako, Mopti Mali in Perspective: Orientation Guide and Tamashek Cultural Orientation: Geography, History, Economy, Security, Niger, Timbuktu, Kidal, Dogon, Senufo, Tuareg, Mande, Fulani, Maure, Bamako, Mopti
2015
The Evolution of Los Zetas in Mexico and Central America: Sadism as an Instrument of Cartel Warfare - Drug and Human Smuggling, Money Laundering, Zeta Activities in the United States The Evolution of Los Zetas in Mexico and Central America: Sadism as an Instrument of Cartel Warfare - Drug and Human Smuggling, Money Laundering, Zeta Activities in the United States
2014
21st Century Emergency War Surgery Textbook by the U.S. Army: Weapons Injuries, Triage, Shock, Anesthesia, Infections, Critical Care, Amputations, Burns, Specific Injury Treatment 21st Century Emergency War Surgery Textbook by the U.S. Army: Weapons Injuries, Triage, Shock, Anesthesia, Infections, Critical Care, Amputations, Burns, Specific Injury Treatment
2010
China, the United States, and Next Generation Connectivity - 5th Generation Wireless Technology (5G), Internet of Things (IOT) Standards and Technology Development, Huawei and ZTE Security Controversy China, the United States, and Next Generation Connectivity - 5th Generation Wireless Technology (5G), Internet of Things (IOT) Standards and Technology Development, Huawei and ZTE Security Controversy
2019
Aviation Artificial Intelligence: How Will it Fare in the Multi-Domain Environment? Unmanned Aerial Vehicles (UAVs) and Drones, Piloted Aircraft Risks, Autonomous Aircraft Benefits, Human - AI Teaming Aviation Artificial Intelligence: How Will it Fare in the Multi-Domain Environment? Unmanned Aerial Vehicles (UAVs) and Drones, Piloted Aircraft Risks, Autonomous Aircraft Benefits, Human - AI Teaming
2019