Islamic State Terrorist Group

 

 

Islamic State Terrorist Group

Although national security has been utmost importance to the U.S. government since time immemorial, gathering intelligence took off late, particularly during the emergence of the World Wars and the Cold Wars. Since then, the Intelligence Community (IC) plays a vital role in enhancing national security by gathering detailed information on terrorist groups. Through its organization and immeasurable skills, the IC together with other relevant authorities combats activities that threaten security of the nation and countries abroad. The Islamic State (IS), also called ISIL or ISIS is one of the major terrorist groups that not only threaten the US’ national security but also interferes with the economic activities in the region (Center for International Security and Cooperation [CISAC], 2019). The terrorist group first emerged in1999 and has since conducted numerous attacks destabilizing Syria, Iraq, and Afghanistan (Rathore, 2016, pp. 4). The Americans’ essential involvement in combating these attacks poses a security risk from ISIS’s retaliatory attacks. Similar to the role of the Intelligent Community, this work will address the ISIS profile information. It is through the utilization of an efficient organizational structure, leadership, weaponry, communication strategies, ideologies, and objectives that makes ISIS continue to pose a major security threat to the United States. As such, profiling this group will help understand and strengthen security efforts.

Origins

Islamic State group is a Salafi combative organization. It began with the leader Abu Musab Al Zarqawi, who recruited a few members in Afghanistan in 1999 (CISAC, 2019). During the American Military stay in Iraq in 2001, this group mainly participated in insurgency activities under the label name Jama’at al-Tawhid wa’al-Jihad (JTJ). After that, the terrorist group swore allegiance to Al Qaeda and rebranded to AL-Qaeda in Iraq (AQI). However, its powers diminished until after the American troops withdrew from Iraq in 2011 (CISAC, 2019). This period begun during the Syrian Civil War that caused a power void, thus facilitating the rise of the terrorist group. Consequently, it rebranded once more to ISIS acquiring massive territory in Syria and Iraq (CISAC, 2019). Its final rebranding took place in 2014 to the Islamic State (IS) after the group’s official declaration of its formation of a caliphate.

Ideology

The group has predominant objectives to create an Islamic caliphate and an international following that encourages conflict and violence between non-Muslims and Muslims.

Goals & Objectives

Using military prowess, the Islamic State adopt Salafism, an essential movement inside Jihadism and Sunni Islam, which is intending to convert individuals across the world (CISAC, 2019). Salafism is a concept of struggle and use of defensive combat based on a virtuous and pure form of Islamic religion practiced in ancient times (salaf). Essentially, there are three kinds of Salafism. One is the quietist Salafism that consists of Muslims who lived a conservative way of life but had no desire to change society. The second one is the political Salafism that had a secular lifestyle dissimilar to the traditional lifestyle (Counter Extremism Project, 2019). The third is the jihadist Salafism; a group that strongly supported violence to protect themselves and the society from the vulnerabilities of the secular lifestyle. Apart from the three types of Salafism, contemporary jihadism justifies the use of warfare to counter oppression while using extreme measures (Counter Extremism Project, 2019). The Islamic State, similar to Salafi Jihadists, reinforce the utilization of military force as part of their history, thus imitating actions of the ancient Muslims as justified acts.

Leadership

What makes the Islamic State a well-organized group is its leadership stemming from the Emir also the prince and chieftain or commander who controls its activities. Below the chieftain lies two chief seconds-in-command who supervise the group’s territories in Iraq and Syria (CISAC, 2019). After its formation, the group’s main leader Abu Musab Al Zarqawi, initiated the first few members into the terrorist group. Together with Abu Bakar al-Baghdadi, Zarqawi made massive progress until al Baghdadi was murdered. Later, more leaders like Abu Ibrahim al Hashemi al Qurayshi came on board bringing forth new skills and ruthlessness (CISAC, 2019). Other leaders include Abu Luqman who is the director of intelligence and security; Abu Muhammad al Shimali who acts as border head leading the logistics and immigration committee; Faysal Ahmad Bin Ali al-Zahrani who is in charge of the gas and oil in al-Barakah division in Syria; and Abu Fatima al Jaheishi renowned as the highest military head and an Emir of Iraq (Counter Extremism Project, 2019). Although these leaders coordinate terrorist attack activities, it is the full range of professional individuals such as doctors, engineers, accountants, I.T. experts, and soldiers that provide expertise, thus actualizing the group’s dreams.

Funding

Every organization requires finances to spearhead their activities. Similarly, IS renowned as one of the wealthiest terrorist group globally with fundraising activities strengthening its evolution and survival. After its formation in 2014, its wealth estimation on assets stood at $1.3-2 billion whereas its daily earning was estimated at $3 million (Counter Extremism Project, 2019). However, the loss of territory, military setbacks, and coalition airstrikes has diminished the group’s earnings. Statistics reveal that its yearly revenue dropped to $2.4 billion in 2015 from $2.9 billion in 2014. Apart from fundraising, the group gains its fund from controlling, extorting, looting, trading oil, and taxing activities in both Syria and Iraq. Further, IS obtains more funds from ransoms of kidnapping. More data reveals that in 2015, this terrorist group obtains $45 million on a yearly basis from ransoms (Counter Extremism Project, 2019). Besides, the taxation activities earn the group slightly above $360 million yearly. Bank looting is yet another venture that makes these militias money as well as profits from selling children and women as sex slaves. Moreover, it is actively involved in illegal exportation of antiquities from Syria and Iraq to Turkey. In 2015, IS gained yearly revenue amounting to $100 million from these illegal sales often obtained from the seized territories (Counter Extremism Project, 2019). Finally, the terrorist group has sympathizers operating on a global scale which make donations to aid its activities.

Capabilities

While the IS security threats are real, they are by large exaggerated. In 2015, the jihadist group suffered major setbacks after an invasion by the American armies. With the help from the Syrian government the US troops were able to capture most of IS’ territories in both Iraq and Syria. Nevertheless, this terrorist group has illustrated its abilities to initiate a number of dangerous attacks that have claimed the lives of many people and injured thousands (Byman, 2017, pp. 1). The jihadists’ secrecy and massive recruitment through media platform increases their network by day. Secondly, the group obtains robust funding that ensures a high supply of crude and dangerous weapons. Finally, the intensive training undertaken provides unquestionable loyalty and dedication (Counter Extremism Project, 2019). Therefore, despite receiving a significant blow, the group remains un-wavered with members conducting attacks now and then.

Physical Bases and Operating and / or Support Locations

The jihadist group self-proclaimed places of operations are the provinces in North Caucasus, Central Africa, Turkey, India, Pakistan, Afghanistan, Nigeria, Saudi Arabia, Yemen, Algeria, Libya, Egypt, Syria, and most importantly in Iraq (Counter Extremism Project, 2019).

Personnel Strengths

Even though the available studies do not supply sufficient information on the exact number of workforce in the group, its followers appear to grow each day.

Training

Through psychological tactics, IS conducts intensive training on its new soldiers. The training comprises of both physical and ideological components. The recruited members are subject to spiritual preparation, Sharii, to receive what their leaders refer to as “religious cleansing” (Counter Extremism Project, 2019). The recruits also undertake intensive physical training on live-fire, hand-to-hand exercises, and weapons training. Although in some cases the process may sometimes takes several days, in other cases it can take up to a year. For a recruit to join the elite fighting unit, they must undertake ten areas of intensive training. The higher areas of this preparation help them gain skills on celestial and aquatic operations while the low-level training covers crawling, pushups, jumping, and running (Counter Extremism Project, 2019). Although many recruits join voluntarily, the group also engages in involuntary recruitment from captured individuals, including children who may be coerced to join the course.

Training Programs

Owing to the fights against terrorism, Islamic State conducts diversified recruitment programs. One of its major training programs takes place through online and digital recruitment (Counter Extremism Project, 2019). Through its strong media presence, this group conducts global enrollment with its leader, Al-Hayat, controlling media enlistment and marketing.

Communication Strategies

Terrorist acts aim at creating fear among its enemies as IS does. Using an influential online and social media presence, the group disseminates information to claim responsibility for attacks, seek ransom from kidnapping, deliver its mandates, and conduct worldwide recruitment. Through official media platforms such as Rumiyah and Dabiq, communication takes place mostly on retaliation ventures (Ozeren et al., 2018). The group also uses news and articles to relay information to its followers and the public. Disturbing videos showcasing the beheading process of its perceived enemies serve the purpose of creating fear. Coupled with the transmission of graphical images of mutilated bodies, which are channeled through social media, the group is able to generate horror and terror. Apart from that, the group uses classic Arabic rhetoric and Liturgical speeches to woe members to join its course. These oratory and narrative forms of old times are often presented in mosques on Fridays during prayers (Styszyński, 2016, pp. 171). They are also delivered during special occasions or holidays and festivals. Through the citations of Quranic verses, religious invocations, and short prayers, the terrorist group creates a large following by reassuring its members and recruiting more targets. Further, the terrorist group communicates through encrypted information. IS relies on progressive computer expertise to encrypt programs, code, untrack mobile phone devices and hack accounts. These measures help the group to secure its conversations and identity (Styszyński, 2016, pp. 173). Seemingly, the jihadist group utilizes effective communication strategies and enhanced security and privacy to aid in the process of reaching out to a large consumer base.

Additional Relevant Information

On top of intensive training and secretive communication methods, ISIS utilizes deadly weapons to mercilessly crush any individual or entity deemed to go against its mission. Besides, the terrorist group carefully uses propaganda and advanced surveillance instruments to scare its rivals and carry out monitoring.

Known and Suspected Weapons / Lethal Agents and Delivery Methods

Far from the International agreements on use of firearms and weaponry of mass destruction, IS employs a wide range of these apparatus. Studies identify the utilization of AK-47 rifles as the most commonly weapons used (United Nations [UN], 2017). The group also beheads captured individuals and executes enemies using Improvised Explosive Devices (IED). These gadgets are hidden on strategic locations to act as bombs when triggered (Strack, 2017). Although many of its weapons are crude, IED bombs are normally detonated in areas such as schools and market places where the population is high. In most cases, these IEDs are tiny, unsophisticated, and sometimes triggered by a single victim.

Unlike other terrorist groups, IS possesses the expertise to design its ammunitions. As a result, it acquires and produces homemade explosives and grenades (UN, 2017). This creativity allows them to make mass production of weapons using innovative manufacturing techniques. IS also uses raw products from the melting down scrap and cannibalizing steel pipe to create weapons. Further, its trained engineers design sophisticated launchers, rockets, and bomb lets that facilitate drone dropping (UN, 2017). Despite its limited supply, IS also employs lethal chemicals such as mustard gas to eliminate enemies. While the group uses a diversity of weapons in their attacks, women, children, and voluntary suicide bombers take up the task of delivering the weapons, thus causing massive destruction (The White House, 2019). With the recent advancements in technology, the group has also utilized drones and stolen airstrikes to improve attacks.

Procedures Used in Prior Attacks

Despite ISIS carrying out heavy training to carry out many of its prior attacks, the group also utilizes IEDs to attack. These devices are positioned in areas with large masses of people. At times, they are buried underground in strategic areas (Cancian, 2017, pp.1). Other times, the group also utilizes improvised explosives including grenades that are single-handedly delivered. Besides, the group uses AK-47 to shoot at perceived enemies and eliminate them. Bombs are carefully selected and using duct tapes tied to a suicide bomber who then enters a target building (Strack, 2017). Ultimately, in all of IS’ attacks there is careful prior planning, and implementation that could take years to execute.

Propaganda

The group releases propaganda information through Al-I’ tasim and Al-Furqan digital platforms (Berger, 2015, pp. 1). It also spreads this propaganda through Bayan Radio and Amaq Agency news platforms. Significantly, most of its activities on propaganda involve women perhaps because they are easy to coerce and are rarely suspected by the public (Ali, 2015, pp. 5). Additionally, this group utilizes many media channels that create content. These platforms enable the group to “…convey the message of the Islamic State in different languages and unify Muslims under one flag…” (Counter Extremism Project, 2019). Moreover, it seeks to reach out to professional engineers, accountants, and doctors. Apart from that, the group uses social media like Facebook and Tweeter reach out to potential members. It also uses quality-production videos, online magazines, and newsletters such as Al-Naba, Rumiyah, and Dabiq to appeal and spread propaganda information.

Surveillance Methods

First, ISIS has informants among them women, sympathizers, and supports of its doctrine. These individuals aid in observation the activities of the group’s enemies and conveying this information to their leaders. Secondly, during attacks, it confiscates high-end technology such as drones and uses these technologies to monitor its enemies (CISAC, 2019). Finally, the group has recruited professional Information Technicians who conduct hacking and access information that increases the group’s awareness of its enemies’ operations.

Significant Events / Dates

Top on important dates and events is the first attack on October 28 2002. This attack led to the assassination of Laurence Foley, an officer working for the U.S. Agency for International Development (USAID) (CISAC, 2019). In 2015, the U.S. active involvement in combating this group through the help of Kurdish Peshmerga, Syrian rebel groups, and the Iraq military gave rise to positive outcomes that led to the acquisition of a big proportion of IS’ territories. Although, the U.S. efforts have paid off, the group still conducts attacks via a system of organized “colonies” and affiliate organizations. The most recent attack was on April 21, 2019, where nine voluntary suicide bombers attacked Sri Lanka (CISAC, 2019). The attack recorded a death toll of over 350 people and more than 500 injured. Finally, the U.S. military seizure of the terrorist groups’ territories is credited to have subdued their activities an event that took place in March and August 2019.

Summary

Overall, terrorism is a crucial threat to the national security of any country. It not only interferes with economic activities but also deprives the country its peace. As such, this work has evaluated the actions of IS, a major terrorist group and a possible threat to the U.S. This work has also looked at the terrorist group’s origins, ideologies, goals, and objectives. Additionally, it has discussed the group’s leadership, funding, capabilities, operations, training strategies, and communication strategies. The work has delved into the use of weapons, the attack’s processes, propaganda, and significant dates. All these areas provide crucial information to the Intelligence Community and relevant information towards combating terrorism in America.

 

 

 

 

 

References

Ali, M. (2015). ISIS and propaganda: How ISIS exploits women. Reuters Institute Fellowship Paper University of Oxford, 1-25. Retrieved from https://reutersinstitute.politics.ox.ac.uk/sites/default/files/research/files/Isis%2520and%2520Propaganda-%2520How%2520Isis%2520Exploits%2520Women.pdf

Berger, J. (2015). The evolution of terrorist propaganda: The Paris attack and social media. The Brookings Institution. Retrieved 6 December 2019, from https://www.brookings.edu/testimonies/the-evolution-of-terrorist-propaganda-the-paris-attack-and-social-media/

Byman, D. (2017). Beyond Iraq and Syria: ISIS’ ability to conduct attacks abroad. The Brookings Institution. Retrieved 6 December 2019, from https://www.brookings.edu/testimonies/beyond-iraq-and-syria-isis-ability-to-conduct-attacks-abroad/

Cancian, M. (2017). Tactics, techniques, and procedures of the Islamic State. The Professional Journal of the U.S. Army. Retrieved 6 December 2019, from https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/March-April-2017/ART-009/

Center for International Security and Cooperation (CISAC). (2019). The Islamic State: Organizational overview. Center for International Security and Cooperation. Retrieved 6 December 2019, from https://cisac.fsi.stanford.edu/mappingmilitants/profiles/islamic-state#text_block_18356

Counter Extremism Project. (2019). ISIS:Overview. Counter Extremism Project. Retrieved 6 December 2019, from https://www.counterextremism.com/threat/isis

Ozeren, S., Hekim, H., Elmas, M., & Canbegi, H. (2018). International annals of criminology. Cambridge Core. Retrieved 6 December 2019, from https://www.cambridge.org/core/journals/international-annals-of-criminology/latest-issue

Rathore, S. (2016). Is the threat of ISIS using CBRN Real? Counter terrorist trends and analyses (8th ed., pp. 4-10). International Centre for Political Violence and Terrorism Research. Retrieved from https://www.jstor.org/stable/26369585?seq=1#metadata_info_tab_contents

Strack, C. (2017). The evolution of the Islamic State’s chemical weapons efforts – Combating terrorism center at west point. Combating Terrorism Center. Retrieved 6 December 2019, from https://ctc.usma.edu/the-evolution-of-the-islamic-states-chemical-weapons-efforts/

Styszyński, M. (2016). ISIS communication strategy. Przegląd Strategiczny6(9), 171-180. Retrieved 6 December 2019, from https://www.researchgate.net/publication/311270859_ISIS_communication_strategy

The White House. (2019).National strategy for countering weapons of mass destruction terrorism. (2019). Retrieved from https://www.whitehouse.gov/wp-content/uploads/2018/12/20181210_National-Strategy-for-Countering-WMD-Terrorism.pdf

United Nations (UN). (2017). Government, ‘Islamic State’ known to have used gas in Syria, organization for prohibition of chemical weapons head tells security council. United Nations. Retrieved 6 December 2019, from https://www.un.org/press/en/2017/sc13060.doc.htm

 


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"