Islamic State Center on Irregular Warfare & Armed Groups

Islamic State Center on Irregular Warfare & Armed Groups

U.S. Naval War College U.S. Naval War College Digital Commons CIWAG Reading Lists Reports & Studies 1-1-2018 Islamic State Center on Irregular Warfare & Armed Groups Follow this and additional works at: https://digital-commons.usnwc.edu/ciwag-reading-lists Recommended Citation & Armed Groups, Center on Irregular Warfare, "Islamic State" (2018). CIWAG Reading Lists. 1. https://digital-commons.usnwc.edu/ciwag-reading-lists/1 This Book is brought to you for free and open access by the Reports & Studies at U.S. Naval War College Digital Commons. It has been accepted for inclusion in CIWAG Reading Lists by an authorized administrator of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Islamic State IS / ISIS / ISIL / DAESH These articles and associated links are provided as items of general interest and are made available for the purpose of peer review and discussion, as well as to promote critical thinking. This document is primarily produced for educational purposes for courses taught by CIWAG faculty. Selection of articles should not be construed as an explicit or implicit endorsement of particular publications, or the authors' or publisher's views or interpretations. They do not necessarily represent the views of the Department of Defense, the Naval War College, or CIWAG. The links embedded within this PDF may direct you to websites not controlled by the Naval War College or the Department of Defense and should not be construed as endorsement of those websites. Any questions should be directed to [email protected]. A R Table of Contents Part 1: The Islamic State .................................................................................................................................................................. 7 Maps .......................................................................................................................................................................................................... 7 Inside Look/Comprehensive Overview: .................................................................................................................................. 8 Overview ............................................................................................................................................................................................ 8 Multi-Faceted Organization ...................................................................................................................................................... 9 Ideology of IS ................................................................................................................................................................................. 9 “Ultra-Violence” as Strategy/Political Communication ............................................................................................... 10 Islamic State – Origins and Evolution: ................................................................................................................................... 10 Development and Decline of AQI ......................................................................................................................................... 10 Abu Musab al-Zarqawi ............................................................................................................................................................ 11 The Role of Bucca Prison and Abu Bakr al-Baghdadi ................................................................................................... 11 The Role of Maliki’s Policies on the Creation of IS ......................................................................................................... 12 Sunni Uprising/Revolution and Its Role in the Creation of ISIS ................................................................................ 12 AQI Resurgence and the Creation of IS .............................................................................................................................. 12 Post-Surge Revival of IS .......................................................................................................................................................... 13 Evolution and Expansion ........................................................................................................................................................ 14 IS Connections to Saddam’s Baath Party and AQI .......................................................................................................... 15 Relationships with Regional Groups/States .................................................................................................................... 15 Islamic State – Decline: ................................................................................................................................................................. 16 Overview ......................................................................................................................................................................................... 16 External Operations ................................................................................................................................................................... 17 Revitalization efforts ................................................................................................................................................................. 17 Post-IS power vacuum .............................................................................................................................................................. 18 Leadership/Key Personnel: ........................................................................................................................................................ 18 Abu Bakr al-Baghdadi .................................................................................................................................................................. 18 Southeast Asian Leadership ....................................................................................................................................................... 19 Additional Leadership .................................................................................................................................................................. 20 Islamic State – Military Operations: ........................................................................................................................................ 20 Overview ........................................................................................................................................................................................... 20 Offensives & Battles ...................................................................................................................................................................... 20 Tal Afar - Iraq ............................................................................................................................................................................. 21 1 | Page Raqqa – Syria .............................................................................................................................................................................. 21 Marawi Siege - Philippines ..................................................................................................................................................... 22 Miscellaneous Recent Attacks ............................................................................................................................................... 23 Equipment and Materials ............................................................................................................................................................ 23 Command Structure/Metrics and Tracking .......................................................................................................................... 24 Tactics and Methods ...................................................................................................................................................................... 24 General Tactics Used ................................................................................................................................................................ 24 Shock Troops .............................................................................................................................................................................. 25 Infiltration and Expansion ..................................................................................................................................................... 25 Use of Child Soldiers ................................................................................................................................................................ 26 Innovation ................................................................................................................................................................................... 26 United States ............................................................................................................................................................................... 27 North Africa ...............................................................................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    89 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us