ISIS: The Terrorist Group That Would Be a State - ISIL, Islamic State, Jihadist Strategy and Savagery, Strengths and Weaknesses, al-Zarqawi, al-Qaeda, al-Baghdadi, al-Nusra, Caliphate, al-Suri, Syria

Nonfiction, History, Military, Social & Cultural Studies, Political Science
Cover of the book ISIS: The Terrorist Group That Would Be a State - ISIL, Islamic State, Jihadist Strategy and Savagery, Strengths and Weaknesses, al-Zarqawi, al-Qaeda, al-Baghdadi, al-Nusra, Caliphate, al-Suri, Syria by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310221408
Publisher: Progressive Management Publication: May 15, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310221408
Publisher: Progressive Management
Publication: May 15, 2016
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this case study presents a net assessment of ISIS: its strengths and weaknesses. The conclusion will propose some recommendations for degrading ISIS, both militarily and ideologically. No lasting resolution to the ISIS threat in Syria and Iraq will be feasible until viable political solutions are found for both countries. At the time of the writing of this case study, the U.S. has proposed no such solution. It has given priority to addressing the security challenge but has not yet settled on an overarching strategy for either country. Instead, the U.S. and its allies have put in place a series of military responses to local threats and have taken advantage of targets of opportunity in both countries using coalition airstrikes. In Syria, the U.S. has launched the occasional U.S. Special Forces mission. Additionally, the U.S. has provided military training and some equipment to the government of Iraq and has responded to requests for airstrikes in support of specific Iraqi military missions.

A net assessment is descriptive, not prescriptive. Developed over time within the U.S. Department of Defense, a net assessment has been described as a practice or methodology based on asking questions from a variety of distinctive perspectives. It focuses on how the enemy operates and who the enemy is. It tries to understand how the enemy thinks about the U.S. in order to anticipate its strategy, if not its individual actions. To conduct a net assessment of ISIS, one needs to look at the strategic interactions of its component parts, its internal bureaucratic behavior, and the multifaceted nature of its strategy.

ISIS developed its strategic approach within the modern jihadist tradition, which al Qaeda violently introduced to the United States with a series of escalating attacks culminating in the attacks of September 11, 2001. However, as an adaptive, learning organization, ISIS departed from al Qaeda's strategy by taking advantage of its best thinking about jihadist lessons as codified by Abu Mus'ab al-Suri, who is a major influence on the ISIS group's military doctrine. In addition, ISIS has used a strategic plan for establishing an Islamic emirate, as presented in broad strokes by another al Qaeda strategist with the pseudonym Abu Bakr Naji. ISIS also has learned from U.S. operations, especially from the use of Sunni tribes during the successful "surge" in Iraq, which came close to destroying al Qaeda in Iraq. Lessons learned from U.S. operations were the basis of the successful rebirth of al Qaeda in Iraq under a new name and organization, now called ISIS, and following a new strategy.

Table of Contents * Chapter I * ISIS: Its Evolution and Influences * A. What's in a Name? From Tawhid w'al-Jihad to ISIS * B. Analytical Framework: Jihadist Strategy and Social Movement Theory * Chapter II * How ISIS Adapts al Qaeda's Doctrine and Strategy of Guerrilla Warfare * A. Guerilla Doctrine: Lessons Learned * B. Guerilla Doctrine: Al-Suri's Template and ISIS * C. Guerrilla Strategy: The Administration of Savagery as Operational Guide * Chapter III * ISIS Group's Successful Mobilization Tactics * A. Communication Strategy * B. Mobilization: Social Movement Theory Concepts Applied to ISIS * Chapter IV * Conclusion: Net Assessment of ISIS Strengths and Weaknesses With Recommendations * A. The Enemy's Strengths * B. The Enemy's Weaknesses * C. Recommendations * Bibliography * Further Reading

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this case study presents a net assessment of ISIS: its strengths and weaknesses. The conclusion will propose some recommendations for degrading ISIS, both militarily and ideologically. No lasting resolution to the ISIS threat in Syria and Iraq will be feasible until viable political solutions are found for both countries. At the time of the writing of this case study, the U.S. has proposed no such solution. It has given priority to addressing the security challenge but has not yet settled on an overarching strategy for either country. Instead, the U.S. and its allies have put in place a series of military responses to local threats and have taken advantage of targets of opportunity in both countries using coalition airstrikes. In Syria, the U.S. has launched the occasional U.S. Special Forces mission. Additionally, the U.S. has provided military training and some equipment to the government of Iraq and has responded to requests for airstrikes in support of specific Iraqi military missions.

A net assessment is descriptive, not prescriptive. Developed over time within the U.S. Department of Defense, a net assessment has been described as a practice or methodology based on asking questions from a variety of distinctive perspectives. It focuses on how the enemy operates and who the enemy is. It tries to understand how the enemy thinks about the U.S. in order to anticipate its strategy, if not its individual actions. To conduct a net assessment of ISIS, one needs to look at the strategic interactions of its component parts, its internal bureaucratic behavior, and the multifaceted nature of its strategy.

ISIS developed its strategic approach within the modern jihadist tradition, which al Qaeda violently introduced to the United States with a series of escalating attacks culminating in the attacks of September 11, 2001. However, as an adaptive, learning organization, ISIS departed from al Qaeda's strategy by taking advantage of its best thinking about jihadist lessons as codified by Abu Mus'ab al-Suri, who is a major influence on the ISIS group's military doctrine. In addition, ISIS has used a strategic plan for establishing an Islamic emirate, as presented in broad strokes by another al Qaeda strategist with the pseudonym Abu Bakr Naji. ISIS also has learned from U.S. operations, especially from the use of Sunni tribes during the successful "surge" in Iraq, which came close to destroying al Qaeda in Iraq. Lessons learned from U.S. operations were the basis of the successful rebirth of al Qaeda in Iraq under a new name and organization, now called ISIS, and following a new strategy.

Table of Contents * Chapter I * ISIS: Its Evolution and Influences * A. What's in a Name? From Tawhid w'al-Jihad to ISIS * B. Analytical Framework: Jihadist Strategy and Social Movement Theory * Chapter II * How ISIS Adapts al Qaeda's Doctrine and Strategy of Guerrilla Warfare * A. Guerilla Doctrine: Lessons Learned * B. Guerilla Doctrine: Al-Suri's Template and ISIS * C. Guerrilla Strategy: The Administration of Savagery as Operational Guide * Chapter III * ISIS Group's Successful Mobilization Tactics * A. Communication Strategy * B. Mobilization: Social Movement Theory Concepts Applied to ISIS * Chapter IV * Conclusion: Net Assessment of ISIS Strengths and Weaknesses With Recommendations * A. The Enemy's Strengths * B. The Enemy's Weaknesses * C. Recommendations * Bibliography * Further Reading

More books from Progressive Management

Cover of the book 21st Century Textbooks of Military Medicine - Care of the Combat Amputee: Treatment of Limb Amputations, Polytrauma, Rehabilitation, Emerging Techniques, Technologies (Emergency War Surgery Series) by Progressive Management
Cover of the book Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching by Progressive Management
Cover of the book March to Disaster: Major General Edward Braddock and the Monongahela Campaign - Fort Duquesne, George Washington, Indian Attacks on American Colonies, Anglo-American Troops by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Public Affairs Operations Field Manual - FM 46-1 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Agricultural Bioterrorism: A Federal Strategy to Meet the Threat - USDA, Agroterrorism, Bioterror History, Superweeds, Superbugs, Emerging Threat to Food Security, Biowarfare by Progressive Management
Cover of the book Engineering the Space Age: A Rocket Scientist Remembers - Aeronautical Engineering, Missiles, ICBMs, Manned Spacecraft, Mercury, Gemini, Space Shuttle, McDonnell Aircraft, Cyclogiro by Progressive Management
Cover of the book The War Against Trucks: Aerial Interdiction in Southern Laos, 1968-1972 - Vietnam War Era, Jason Summer Study, Commando Hunt Campaigns, Electronic Surveillance Network by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Space Support to Army Operations (FM 100-18) Defense Department Space Policy, Military Space Systems (Value-Added Professional Format Series) by Progressive Management
Cover of the book 20th Century Atomic Bomb and Nuclear Weapon History: Manhattan Project and the Nevada Test Site Official History Documents by Progressive Management
Cover of the book Expanding the Lodgment to Extend Operational Reach: Study of Army in World War II on Usefulness of Seaports at Cherbourg, Artificial Mulberry Harbors, Port at Antwerp, and the Cross-Channel Attack by Progressive Management
Cover of the book Identifying and Defeating Infiltration Threats to the Homeland: German Sabotage in World War II, al-Qaeda, False Iraqi Freedom Lessons, China Threats, Attack Scenarios, Counterintelligence Shortfalls by Progressive Management
Cover of the book Journalists or Criminals? Attorney General Eric Holder's Testimony before the Committee and the Justice Department's National Security Leak Investigative Techniques by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Managing NASA in the Apollo Era - From the Fire to Apollo 11, Headquarters Organization, Acquisition Process, Manpower, Budgetary Process, DoD Relations by Progressive Management
Cover of the book 2012 Republican Vice Presidential Candidate Paul Ryan: Issue Statements, Speeches, Thoughts and Policies, Complete Path to Prosperity Federal Budget Plans with Proposed Changes to Medicare and Taxes by Progressive Management
Cover of the book America's Space Shuttle: Electrical Power System NASA Astronaut Training Manual (EPS 2102) by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy