Free Essay

Intelligence Report on Isis

In:

Submitted By clydechye
Words 6864
Pages 28
Intelligence Mission on ISIS Report

Chye Yue Zhang

SCTY 415 Studies in Intelligence II

Abstract
The threat of terrorism became very real when it caught the United States off guard and seized the attention of the rest of the world on the 11th of September 2001, using four hijacked airliners led by a terrorist organization named al-Qaeda in an attempt to conduct suicide missions of prominent landmarks of the U.S. The Twin Towers in New York were destroyed while the Pentagon in Washington D.C. suffered damage that took a year to repair. The total fatalities amounted to almost 3,000 while twice the amount of people were injured. Since then, most nations in the world have become wary of terrorist and militant groups and the potential threats that they pose. This can be seen by the tightened national securities of many countries especially on every possible stations and ports of all modes of transport that a terrorist may pose a threat to. At this point of time, although the al-Qaeda is no longer a prominent terrorist threat, another established and independent militant organization by the name of the Islamic State (IS) got the world concerned about its activities in the Middle East which in turn affected and continues to affect the rest of the world through its twisted beliefs and brutality. This paper aims to define this currently infamous group’s beliefs and objectives, how it works as an organization, how it is a threat to many countries all over the world, and the methods to effectively bring it down.

Introduction
What is ISIS?
The subject of this paper have gone by many names over the past few years. These names include the Islamic State of Iraq and Syria (ISIS), the Islamic State in Iraq and al-Sham (ISIS), the Islamic State of Iraq and the Levant (ISIL), or more commonly just simply the Islamic State (IS). Being made up of fundamentalist Sunni Muslims and foreign jihadists, the organization wishes to form a single islamic state in the Middle East under a strict sharia law (Rowen, 2014). Due to its unorthodox activities in the Middle East, leaders of the world, especially those of neighbouring nations, grew concerned about the group’s existence and the immediate threats that it poses to the Middle Eastern countries. These activities include the release of photos and videos showing captured prisoners being beheaded or savagely killed, ruthlessly seizing control of territories in the region, destruction of cultural heritage and ancient artifacts in Iraq and Syria, and also recruitment of foreign jihadists through social media. The subsequent paragraphs will elaborate more about the terror organization.
Formation of the Islamic State
The IS was a terrorist group that started in 2004 as a part of al-Qaeda based in Iraq, hence it held the name the Islamic State of Iraq (ISI). A jihadi group by the name of Jabhat al-Nusra was formed by ISI member Abu Muhammad al-Joulani in 2011 and became the leading group to fight in the Syrian conflict with the support of ISI (Tran, 2014). ISI’s leader Abu Bakr al-Baghdadi saw the opportunity for the ISI to be expanded into Syria after Jabhat al-Nusra’s power grew in the country. This move eventually formed the Islamic State of Iraq and Syria (ISIS) (Tran, 2014). Even though ISIS had similar beliefs with the al-Qaeda led by Osama bin Laden of being radical anti-Western militant groups devoted to establishing an independent Islamic State in the region, ISIS have proved to be much more effective and brutal in its methods. This led to ISIS breaking away from the al-Qaeda and became an independent militant organization in the early 2014 (Thompson, Greene & Mankarious, 2015).
The Islamic State’s Beliefs and its Ultimate Aim
With its ultimate aim of forming an Islamic state under a single sharia law largely in the Middle East over the region of Turkey, Syria, Egypt, Jordan, Lebanon and even beyond, under a single Caliphate representing the Muslim community, the self-proclaimed caliph Abu Bakr al-Baghdadi continues to expand his control slowly in surrounding territories by force and recruiting jihadists from other parts of the world who has similar beliefs by broadcasting a series of obscene killings and destroying of ancient artifacts to make his statements. Although started out as a group within al-Qaeda, the differences in ideology and strategies caused the latter to distance itself as the former grew violent and intolerant even towards fellow Muslims (Rowen, 2014). Since the clean breakaway of ISIS from al-Qaeda in 2010, Baghdadi emerged as the leader. James Phillips, The Heritage Foundation’s senior research fellow for Middle Eastern affairs noted that “Unlike al-Qaeda, which saw itself as a revolutionary vanguard and focused its propaganda efforts on like-minded Islamist militants, ISIS is a mass movement led by a new generation of Islamist revolutionaries who have developed a much broader propaganda effort.” He added that ISIS’ efforts are broadcast through a range of digital platforms, usually the social media, to urge young Muslims to embrace the group’s radical Islamist ideology by joining the “caliphate” (Johnson, 2015).
Methods of Intelligence Collection
Many would have known by now that the U.S. have been utilizing drone operations to carry out air strikes and hunt down top ISIS terrorists (JPost.com staff, 2015). However, in order not to cause unwanted destruction of buildings and innocent citizens, lesser collateral damage as possible, and to confirm that a target is within range of air strikes, it has become of utmost importance that reliable intelligence is provided to the military or any independent initiatives conducting such campaigns so that they can exterminate the desired targets embedded in local populations as effectively as possible. Ex-special security officer of the United States Navy who has worked in the office of the Secretary of Defense, the Bureau of Diplomatic Security at the Department of State, the office of the Special Inspector General for Afghanistan Reconstruction, and as a contractor for the Department of the Army, Robert Caruso (2014) noted that “at this current day and age, the adversary is not a state. They are ruthless, resourceful, and adept at weaving themselves into the fabric of their societies, making themselves virtually undetectable until they strike.” Therefore, it is of extreme importance to have proactive elements in clandestine services that even the United States do not adequately possess to effectively identify current and future threats. Intelligence collection is also extremely important as deep knowledge of today’s enemies is vital to understanding them, and defeating them (Caruso, 2014).
Covert operations. As explained in the previous paragraph, the use of human intelligence (HUMINT) will seem to be very useful in the fight against ISIS despite its drop in percentage among the intelligence collection methods worldwide. These clandestine operations should also be focussed in collecting HUMINT on high-quality targets overseas that are in no way connected to diplomatic entities. That way, the sources can provide information on strategic intent instead of just purely tactical and capability-based intelligence (Caruso, 2014). Such HUMINT collection techniques may include covertly spying on potential ISIS targets, breaking into ISIS headquarters to retrieve information, and deploying undercover agents to conduct covert interrogations. Covert interrogators may pose as harmless and friendly citizens to ask subtle questions while hiding the true ulterior motives.
Overt techniques. While interrogations can be carried out covertly, it can also be done overtly to collect valuable HUMINT. Captured ISIS militants or suspects can be interrogated for any information regarding their contact with the terrorist organization. Although it may not be advisable to deploy military troops for patrol openly in danger zones such as ISIS controlled territories, surveillance can still be carried out using surveillance drones to locate important ISIS camps and collect imagery intelligence (IMINT) to distinguish viable targets. The utilization of the U2 spy planes are unadvisable as there is a risk of the pilot getting caught in the case of any failures occurring mid-flight.
ISIS have been depending on social media in its recruitment by reaching out to the rest of the world with videos and images of shockingly sadistic violence designed to inspire and recruit people with borderline personalities to join them or carry out their personal terrorist attacks at where they live. Therefore, it is logical to limit the spread of such propaganda by suspending most of ISIS-related social media accounts and also spread a counter-propaganda at the same time (Berger, 2015). The suspensions can cripple the reach of ISIS to potential candidates in other parts of the world but should also allow enough collection of significant open-source intelligence (OSINT).
Assets involved. Judging by the covert and overt techniques advised in the paragraphs above, the assets needed for these intelligence collection methods to be effective can be easily deduced. Firstly, there is a need to deploy clandestine operatives and the equipment necessary to aid in various operations to collect the required human intelligence. These operatives are best to be chosen from the Central Intelligence Agency (CIA) as they are well trained and should be conversant in covert operations such as break-ins and interrogations. Next, overt interrogations of prisoners and suspects can be done more effectively with the use of a polygraph so that spilled information can be verified before taking them into account. Lastly, the use of surveillance drones such as the RQ-11 Raven and strike drones such as the MQ-1 Predator and MQ-9 Reaper are essential for intelligence gathering, target elimination, and preventing the ISIS from advancing into more territories.
The Islamic State as an Organization
ISIS Organizational Structure
As the terror organization became increasingly established over time, ISIS started implementing governing structures to rule the territories it holds. Such governing systems are ironically alike some of the western counties whose values ISIS rejects, the only difference is a council to consider who should be beheaded in the place of democracy (Thompson et al., 2015). Despite having such a strong military force to choose its top candidates from, most of those who hold positions within the organization have provied to be battle-hardened veterans of the insurgency against the United States many years prior (Tran, 2014). Figure 1 provides a clear overview of how the organization is being run.

Figure 1. Leadership of the ISIS. The anatomy of ISIS: How the 'Islamic State' is run, from oil to beheadings (Thompson & Shubert, 2015).
As mentioned in the previous sections, the militant organization that is striking fear into the hearts of leaders around the world is lead by caliph Abu Bakr al-Baghdadi and his cabinet of advisors. Baghdadi is regarded as mysterious due to how little is known about the ruthless leader except to have been born in Iraq in 1971 and to have earned a Ph.D. in Islamic Studies in Baghdad (Rowen, 2014). He is also known to have joined the insurgency after the invasion of Iraq by the United States in 2003 (Gunter, 2014).
After having survived multiple drone attacks and past civil wars, managing to unify militant groups in 2 different countries under one, recruited an army of jihadis from all over the world, conquered many cities from Syria to central Iraq, Baghdadi appointed few of his trusted followers to assist him in leading the organization. Directly reporting to him, Baghdadi’s two deputies that oversee ISIS’ opertions in Syria and Iraq are Abu Ali al-Anbari and Abu Muslim al-Turkmani respectively (Thompson & Shubert, 2015). As reported by Thompson & Shubert (2015), “the two deputies deliver orders to the governors in charge of the various sub-states in Syria and Iraq under ISIS control, who then instruct local councils on how to implement the executive branch's decrees on everything from media relations and recruiting to policing and financial matters.”
Also reporting directly to the top of the organizational chart, the Shura council is the caliphate’s religious monitor, appointed to make sure that all the local councils and governors are sticking to ISIS’ version of Islamic law. According to the Terrorism Research and Analysis Consortium’s (TRAC) Sounthern Africa Director Jasmine Opperman, “The Shura council also has the power to censure the leadership for running afoul of its interpretation of Sharia law” (Thompson & Shubert, 2015). She added that significant executions or operations that may cause ISIS to gain further prominence are subjected to the Shura council’s approval.
Also directly under the caliph, the Islamic State’s political leadership includes a cabinet of functionaries who are resposible for finances, military activities, intelligence, internal security, weapons, communications, prisoners, etc.
How ISIS Functions Under its Leadership
Overtime, ISIS have proved tthat it is evolvng into a government whose decision-making cannot be separated from its military capabilities (Thompson & Shubert, 2015). In order to create a sturdy organization, ISIS’ leader Baghdadi has drawn lessons from the failures of other militant organizations such as the al-Qaeda branch in Yemen whose pool of leaders depleted after being attacked by drones sent by the United States (Schmitt & Hubbard, 2015). A diplomat monitoring ISIS whom was not named noted “ISIS has learned from that and has formed a structure that can survive the losses of leaders by giving midlevel commanders a degree of autonomy. In that structure, the overall operation would not be immediately affected if Mr. Baghdadi were wounded or killed” (Schmitt & Hubbard, 2015).
On top of that, Baghdadi also learnt lessons from the leaks provided by ex-National Security Agency contractor, Edward Snowden on how the U.S. collects intelligence on militant threats. As a result of his findings, ISIS now has his leaders use couriers and encrypted channels that the Americans and its allies cannot decode, to exchange important information (Schmitt & Hubbard, 2015). Although many materials were seized during a U.S. commando raid in Syria in May 2015 that provided many of these information, there is still much to uncover about how the organization operates under its leadership and how it interacts with its growing number of allies and followers from the other Middle Eastern countries (Schmitt & Hubbard). It is also not known who will be next in line in the case of the death of Baghdadi.
ISIS Capabilities
ISIS Military Capabilities
ISIS military manpower. Through the Intelligence and Terrorism Information Centre’s (ITIC) assessment, as of late 2014 where ISIS is at one of its peaks comparing with its status thus far, there was a total of approximately 25,000 operatives in the 2 countries it controls the most, namely Iraq and Syria. 12,000 of them are of Syrian and Iraqi nationals while the other 13,000 are from the fellow muslim countries and western countries (ITIC, 2014). This numbers were at its peak due to the attractiveness caused by results of ISIS’ military successes and self-declaration of the Islamic Caliphate. The rise of its revenues and assets (e.g. infrastructure, oil fields, etc) after expansion of its territories were also pulling factors in its recruitment for those who expected higher salaries (ITIC, 2014). It is more logical to provide staus and figures when the adversary is at its peak so that expectations would not be compromised and adequate preparations can be made.
The U.S. intelligence agencies internal reports also stated that ISIS have been able to replace its troops it has lost in the past year almost efforlessly due to its strong recruitment, despite 1 billion dollars being spent in the fight against the group in the past year forked out by the western, Iraqi, and Syrian governments (Fisanakis, 2015). This figure was compared using the organization’s current strength with that of August 2014 when the Obama Administration initiated the campaign of launching airstrikes on ISIS. The almost-identical figures showed that there is no significant degradation on the manpower of the terror organization (Fitsanakis, 2015).
ISIS weapons. Apart from its healthy manpower, ISIS’ weapons are also a factor that made its army powerful. Past encounters and human intelligence have gathered that most of the organization’s weapons and ammunition were looted or captured from the Iraqi and Syrian military. ISIS possesses light arms such as motars, anti-tank and anti-aircraft launchers and missles, various types of rockets, and even machine guns mounted on vehicles (ITIC, 2014). ISIS have also acquired heavy machinery such as tanks, artilleries, armoured vehicles, and shoulder-launched, Scud, and air-to-surface missles (ITIC, 2014).
ISIS heavy machinery. Going in-depth of its prominent weapons, artillery, and heavy machinery systems, ISIS has approximately 30 T-55 and 5 to 10 T-72 Soviet intiated tanks (as shown in Figure 2.), in addition to self-propelled artilery and BMP-2 infantry fighting vehicles (ITIC, 2014).

Figure 2. ISIS fighters on Russian tanks in Al-Raqqah (ITIC, 2014).
Through covert interrogations of local residents in Aleppo, there are claims of sightings of ISIS owning 3 MIG-21s and 1 MIG-23 captured from the Syrian air force base of Al-Jarrah (ITIC, 2014). Open source intelligence on ISIS social media accounts also suggests that the adversary troops are trained in using anti-aircraft systems called MANPADS (manportable air-defense systems) to prevent enemy aerial attacks (ITIC, 2014). This fact has been a concern as it endangers any Iraqi, Syrian and even the U.S. helicopter and airplanes that are on special missions in their vicinity. It is also unknown of how many of these anti-aircraft the ISIS posses.
ISIS’ use of chemical weapons. Lastly, there have been reports as of October 2014 suggesting that the Islamic State have been using chemical weapons against its enemies such as the Kurdish forces at Ayn al-Arab (ITIC, 2014). A doctor also claimed that he treated patients in Kobani who had symtomps of being exposed to chlorine gas and possibly another unknown chemical weapon which were first used during World War I. Such symtomps include burns on parts of the patients’ bodies, burning eyes, sore thorats, respiratory problems, and vomiting as shown in Figure 3. (ITIC, 2014).

Figure 3. Pictures of wounds taken in Kobani, posted on social networks by Kurdish activists suggesting the use of chemical weapons by ISIS against the Kurds (ITIC, 2014).
ISIS Financial Capabilities
Since late of 2012, ISIS have secured huge cashflows from oilfields in eastern Syria. It also got cashflows from smuggling raw materials retrieved from the territories it has seized and valuable antiques from archaeological digs (Tran, 2014). Moreover, after the successful control of Iraq’s second largest city Mosul in the summer of 2014, ISIS’ total assets grew from an approximate $875 million to $2 billion (Tran, 2014). Having seized more than half of Syria’s oil assets, in addition to other several oil fields it controls in Iraq, it was estimated that oil in the black market is possibly making ISIS up to $3 million a day (Thompson et al, 2015). As of late 2014, the organization made its revenues by selling its oil from its oil fields, sells wheat, does extortion, collect taxes and fees in its territories, loot from homes of people who fled, and through ransoms and donations. These actvities have allowed them to ean a total of $3 to $6 million a day (ITIC, 2014). Apart from the above mentioned big-scale activities, ISIS also increased its revenue by selling souvenirs as part of a propaganda campaign on websites and even Facebook pages (ITIC, 2014).
Besides buying military equipment, investing huge amounts of money in the civilian infrastructure of the local populations and in maintaining the governmental and organizational systems in Iraq and Syria, ISIS still has to pay its operatives their salaries. These operatives are paid $200 to $600 individually depending on their nationality and family size (ITIC, 2014).
ISIS Tactics
ISIS Territorial Tactics
As mentioned earlier in the report, countless sources believes that the self proclaimed Caliph Baghdadi wants to achieve a system where all the Muslims in the world live under one Islamic state ruled by sharia law.
Figure 4. A map purportedly showing the areas ISIS plans to have under its control within five years has been widely shared online. As well as the Middle East, North Africa and large areas of Asia, it also reveals ISIS' ambition to extend into Europe. Spain, which was Muslim-ruled until the late 15th Century, would form part of the caliphate, as would the Balkan states and eastern Europe, up to and including Austria (Hall, 2014).
Since the ambitious objective shown in figure 4 is considered a long term one, Baghdadi plans to first establish a caliphate spanning Syria and Iraq (Tran, 2014). As such, ISIS tactically built a headquarter in each of the countries in order to spread its ideas, have a firm hold of the territories it controls in the country, and conduct its planning there. These ‘capitals’ are chosen usually due to its size, resources, and location. In Syria, the IS headquarters is in Raqqa while its counterpart in Iraq is located in a city called Mosul where dams, oil fields, military equipment are rich in these areas. Figure 4 shows how the ISIS militants march into a city it has taken over since its establishment of a caliphate last year.

Figure 5. ISIS militants have formally declared the establishment of a caliphate, or Islamic state, in the vast stretches of the Middle East that have fallen under its control (Hall, 2014).
Due to the airstrikes conducted by the U.S. and its allies, in addition to the ground offensives by the local troops over the past year, ISIS was not able to retain much of its territories for long. As a result, it has lost territory in some areas and gained it in others (Gilsinan, 2015). In order to effectively analyse how ISIS is expanding in its territories, one may be able to have a better picture on its tactics. Over the past year, the main territories it has lost include the northwestern Syria along the border wih Turkey, outside Baghdad, and near the Iraqi city of Tikrit (Gilsinan, 2015). On the other hand, despite its resistance, it was able to expand its control over some territories as well. These territories include central Syria near Palmyra, and in Iraq near Ramadi which is the capital of Anbar province (Gilsinan, 2015). That being said, there are still somewhat different estimates of the change of the territories under ISIS control over the past year. The U.S. Defense Department indicated that the Islamic State have lost its privilege to operate freely in 25 to 30 per cent of Iraqi territory, while its influence in Syria remains mostly unchanged. It was also highlighted that ISIS have lost an approximate 9.4 per cent of its territory in the first half of 2015 (Gilsinan, 2015). Figure 5 shows a clear estimated map of the location and number of airstrikes up till 30th of September 2015, the zones where ISIS is free to operate (i.e. areas where ISIS does not necessarily posses defensible control, but its forces are free to roam and operate with low risks), and zones under ISIS control (i.e. areas where ISIS have a large degree of defensible control and any counter-ISIS force would be faced with serious ISIS resistance).
Figure 6. The rapid advance across Syria and Iraq by militant fighters from Islamic State (IS) in 2014 threw the region into chaos and led to US air strikes against their key positions (BBC News, 2015).
After much analysis, ISIS has found to be able to thrive more in areas with Sunni Arab as a majority of its population but was not as successful in areas where Sunni Arabs are a minority. This is further proven when its control over Kurdistan and near Baghdad has appeared to be traded for its holdings in central Syria.
Military Tactics
When Iraq’s second largest city, Mosul was taken over by ISIS, there were 30,000 men from the Iraqi army opposing only 3,000 ISIS militants. However, the Iraqi army decided to flee, as they are mostly inexperienced and badly trained Shite soldiers. This also proves that the ISIS militants are well trained and mentally prepared to fight as compared to the force opposing them.
First and foremost, the militants have strong religious beliefs that they are fighting for a just cause, that each of their acts are dictated by god and not by their free will. This gives them the willingness to engage in combat, the contempt for danger and death, for there can only be two possible outcomes: victory or death. With this mindset instilled in them, their ruthlessness publicized by sophisticated media apparatus tend to install fear and demoralize their opponents even before the battle (Invisible Dog, 2014).
Next, the weapons ISIS uses are of those that produce far greater firepower than their enemies. As mentioned in the military capabilities earlier in the report, these weapons come from the Iraqi and Syrian military left over after battles. However, most of its weapons are from the illegal market where the ISIS can easily access and splurge on weapons with high firepower due to its vast accumulated wealth. Such weapons include, artillery, tanks, fighter jets, chemical weapons, etc.
The ISIS also grants its commanders in operations a lot of flexibility. The organization only gives a specific target and the commander will be able to make the call and decide how to carry out the operation (Invisible Dog, 2014). There is therefore a decentralized command and control system and tactics, strategies and operations are as one. This type of command and control system uses a bottom-up approach rather than a top-down one where it relies on the commanders’ combat skills and not the organization’s (Invisible Dog, 2014).
Lastly, after the airstrikes began, the ISIS has been extremely careful when they carry out their plans and operations. For example, they moved their headquarters to the ground while reducing their size and multiplying them. They have also spread their troops and moved to cities where they can mix with the local population, avoid using mobile phones and radio communications, and plant their flags everywhere to confuse their enemies. They move their key figures on motorbikes instead of cars and burn tires or oil to create black fumes to avoid air strikes. During battle, they use conventional tactics of planting mines and setting explosive traps (Invisible Dog, 2014).
Other Tactics
ISIS have also released a video early this year which showed ancient Iraqi artifacts being destroyed by the militants with sledgehammers, pickaxes and jackhammers after its taking of Mosul. This is considered a tactic employed in cultural genocide to eradicate any hint of Iraq’s non-Muslim culture so that they can reform the region into a single caliphate (Mendoza, 2015). These cultural artifacts include 3,000 years old statues in the Mosul Museum and rare ancient books and manuscripts from the Mosul Public Library. Figure 7 shows ISIS militants in an attempt to destroy the statues in the Mosul Museum. The attack on people’s cultural works can be tantamount to attacking its very identity and one can only imagine the pain felt by the Iraqis at the destruction of their national treasures. Figure 7. The destruction of ancient Iraqi artifacts – a tactic employed in cultural genocide – is part of the Islamic State militants' efforts to reform the region into a single, homogenous Muslim caliphate under its control (Mendoza, 2015).
ISIS Threat
Threat to the Middle East
With all of its power concentrated in Iraq and eastern Syria, it is straight forward to deduce that ISIS poses the most threat in the region. Most of its influence also affects the nations in the Middle East. Moreover, ISIS plans to expand its control of territories in the region by taking over Iraq and create a Sunni Islamist State that will be able to initiate military operations at other neighbouring states such as Jordan and Lebanon (Misztal & Michek, 2014). On the other hand, in contrary to popular beliefs that ISIS poses a highly possible threat to central Middle East and the Gulf, the reality is likely to be somewhat different. It may be true that ISIS still pose an immediate threat to Jordan and Saudi Arabia, but reports show that these communities are deeply empowered, as compared to the disenfranchised Sunni Arab population in Iraq and the neglected Sunni Arab groups of eastern Syria. The governments of these two nations will be able to depend on its allied tribal groups to protect the areas in which ISIS will seek to take over (Hawes, n.d.). To the north and east of ISIS, it will prove to be even more difficult to infiltrate as they face populations in Turkey and Iran that are also, for different reasons, likely to be extremely resistant to is blandishments (Hawes, nd.). Although its threats are more viable in Lebanon, there is an offset of shared interests in the county due to the leading Shia, Christian and Sunni political groups in it (Hawes, n.d.). Due to the wars caused by ISIS in the Middle East the past year, hudreds of thousands of people have fled in fragile boats in hopes to cross the Mediterraneant to Europe. Most of these people came frome Iraq, Syria and Libya where most of the fightings were concentrated at and they are willing to risk their families’ and their own lives on the dangerous trip, abandoning Islam for Christianity, athism, or liberalism (Reuters, 2015).
Threat to the West
The ISIS threat to Europe became more imminent when the terror organization released a video in February 2015 that showed its militants taking the lives of 21 Egyptian Christians on the Mediterranean shores of Libya (McDonald-Gibson, 2015). This is the same coastline where many people tried to set sail in insubstantial boats as discussed in the previous paragraph. The video also indicated by one of the militants that ISIS threatens to conquer Rome. When such a high record numbers of people are fleeing to the harsh sea in hopes to seek sanctuary in Europe, it is putting a political and economic strain on the nations. This is because the fact that migrants who survived the journey come ashore raises concerns that ISIS could also be sending its militants to Europe hidden among refugees (McDonald-Gibson, 2015).
Another ISIS strategy that proves to be a threat to the European countries even till now is the recruitment of its younger population who are radicalized either online or on the battlefield. The European Union law enforcement agency, EUROPOL is concerned about its citizens who have returned home after travelling to the Middle East to fight alongisde the jihadist organization in Iraq and Syria. “Although not all of them are radicalized enough to the extent of staging an attack at home upon their return, but a number of them have that potential” as highlighted by Rob Wainwright, the direcor of EUROPOL (McDonald-Gibson, 2015). The concern of this imminent threat is further backed up by the occurrences in Belgium when a French opened fire in a Jewish Museum killing four people in 2014, and when the police caught two Belgiums who were in the midst of plotting an attack on police officers on the streets of Belgian cities earlier this year in January (McDonald-Gibson, 2015).
Despite its activeness in fighting ISIS, the United States may not necessary be exposed to the risk caused jihadist organization as much as the nations in Europe. Government officials did however worry that the Americans or Europeans that went to fight with ISIS will return to U.S. to carry out attacks. This possibility has yet to occur and is later deemed that it may never occur (Misztal & Michek, 2014).
Threat to the Rest of the World
ISIS also pose a threat more or less on a worldwide scale mostly because of its gruesome videos it released over the months and its recruitment of foreign fighters with similar beliefs from countries all over the world. Till the mid of the current year, there were nearly thirty thousand fighters from a hundred countries all over the world recruited to join the ISIS ranks, according to a report to the UN Security Council. Figure 8 shows the number of fighters per million people in the population recruited to join the ranks of ISIS.

Figure 8. Foreign Fighters in Iraq and Syria: Where Do They Come From? (Radio Free Europe Radio Liberty, 2015).
Conclusion
In summary, the Islamic State of Iraq and Syria (ISIS) or in short, the Islamic State (IS) aims to represent the entire musim community under one Islamic State ruled by sharia law. Through its beliefs, it has successfully recruited many of its troops from nations all over the world. As a result, it poses a threat to many countries worldwide who are concerned that the organization’s twisted and brutal mindset will pollute into youngsters’ minds and in turn join the IS or conduct and independent attack at home. Despite having a relatively small miitary force compared to its adversities, the ISIS is still able to maintain its superiority with great firepower it purchased in the black markets with the wealth it got from selling oil. Known for its unorthordox methods that are considered inhumane to many from the videos it released over the past year such as the beheadings and torture of its prisoners, governments worldwide are growing concerned on the organization’s influence and are striving to take it down mostly with air bombing campains.
Recommendations and Opinion
As included in the body of this report, the ISIS have not been weakened much despite all the efforts such as airstrikes conducted by the superpowers and ground resistance by the Middle Eastern allies. This is due to its strong recruitment on people with similar beliefs, its wealth accumulated mostly from selling of oil produced by the oil fields it controls in its territories, its firepower brought from the black market, and its military tactics involving well-trained troops that has beliefs that are in line with the bigger organization. ISIS have also learnt to avoid enemy detection so so ensure that they are not easy targets for air strikes. These tactics were elaborated earlier in the report under its Military Tactics.
After much research before finalizing the report, the seemlingly strong organization of the Islamic State has weaknesses that can be exploited too. Even though the military of the Iraq, Syria and the neighbouring nations may not be as well-trained as the militants of ISIS, governments from the west can extend their help to conduct trainings and planning of tactics. Resources can also be shared among them as long as diplomatic relations are forged for a single unanimous cause of defeating ISIS. Intelligence agencies can also work together as the resourceful Western nations will not be able to collect better intelligence than the Middle Eastern nations on ISIS due to their locations and cultural differences.
The resources of ISIS should also be discontinued in order to prevent them from accumulating wealth and buying weapons and equipment. Such methods can be temporarily disabling the oil fields, discouraging buyers to purchase oil from ISIS, and possibly cut off ties of ISIS from the illegal market.
Lastly, despite efforts to suspend ISIS-related social media accounts, ISIS still has other ways to promote its beliefs and small successes. Therefore, it is important for individual nations to conduct a counter propaganda to educate their own citizens, especially youngsters of ISIS’ wrongdoings to prevent them from being inspired or recruited.
In conclusion, I believe that the fight against ISIS and eventually defeating it will not be an overnight affair. Therefore, the most effective foremost step to take is for Western nations and Middle Eastern ones to forge ties and implement an effective campaign against ISIS. With the resources and military expertise of the West and the assessibility to ISIS and the understanding of culture of the Middle Eastern allies, it is definite that there will be a better chance of ensuring mission success in the battle against ISIS.

Reference:
BBC News. (2015, September 30). Battle for Iraq and Syria in maps - BBC News. Retrieved from http://www.bbc.com/news/world-middle-east-27838034
Berger, J. M. (2015, February 24). Can We Win the War Against ISIS by Focusing on Social Media? | J.M. Berger. Retrieved from http://www.huffingtonpost.com/jm-berger/isis-social-media_b_6733206.html
Bhalla, A. (2015, August 26). Five ministries will monitor social media 24/7 to combat terror outfits online | Daily Mail Online. Retrieved from http://www.dailymail.co.uk/indiahome/indianews/article-3212194/Five-ministries-monitor-social-media-24-7-combat-terror-outfits-online.html
Caruso, R. (2014, September 9). Here's How The US Can Build The Intelligence Capabilities Needed To Defeat ISIS - Business Insider. Retrieved from http://www.businessinsider.sg/the-us-needs-better-humint-to-beat-isis-2014-9/#.Vexp07QVdFJ
Fitsanakis, J. (2015, August 3). No signs of ISIS decline despite Western efforts, say US spy agencies | intelNews.org. Retrieved from http://intelnews.org/2015/08/03/01-1748/
Gilsinan, K. (2015, September 11). Operation Inherent Resolve: How ISIS Territory Has Changed Since the U.S. Bombing Campaign - The Atlantic. Retrieved from http://www.theatlantic.com/international/archive/2015/09/isis-territory-map-us-campaign/404776/
Gunter, J. (2014, August 20). Iraq crisis: what is the Islamic State? - Telegraph. Retrieved from http://www.telegraph.co.uk/news/worldnews/middleeast/iraq/10891387/Iraq-crisis-what-is-the-Islamic-State.html
Hall, J. (2014, June 30). ISIS militants outline chilling five-year plan for global domination | Daily Mail Online. Retrieved from http://www.dailymail.co.uk/news/article-2674736/ISIS-militants-declare-formation-caliphate-Syria-Iraq-demand-Muslims-world-swear-allegiance.html
Hawes, C. (n.d.). Teneo Holdings | MIDDLE EAST & NORTH AFRICA: The ISIS threat. Retrieved from http://www.teneoholdings.com/ourinsights/middle-east-north-africa-the-isis-threat/
ITIC. (2014). ISIS’s Financial and Military Capabilities. Retrieved from http://www.crethiplethi.com/isis-s-financial-and-military-capabilities/islamic-countries/syria-islamic-countries/2015/
Invisible Dog. (2014, November). The ISIS and its Military Tactics. Retrieved from www.invisible-dog.com/isis_tactics_eng.html
Johnson, N. (2015, June 8). How ISIS Is Waging a ‘War Of Ideas’ Through Social Media. Retrieved from http://dailysignal.com/2015/06/08/how-isis-is-waging-a-war-of-ideas-through-social-media/
JPost.com staff. (2015, February 9). 'CIA launches secret drone campaign to hunt down top ISIS terrorists' - Middle East - Jerusalem Post. Retrieved from http://www.jpost.com/Middle-East/ISIS-Threat/CIA-launches-secret-drone-campaign-to-hunt-down-top-ISIS-terrorists-413974
Katulis, B., Lang, H., & Singh, V. (2014, September 10). Defeating ISIS: An Integrated Strategy to Advance Middle East Stability. Retrieved from https://www.americanprogress.org/issues/security/report/2014/09/10/96739/defeating-isis-an-integrated-strategy-to-advance-middle-east-stability/
Mazzetti, M., & Gordon, M. R. (2015, June 12). ISIS Is Winning the Social Media War, U.S. Concludes - The New York Times. Retrieved from http://www.nytimes.com/2015/06/13/world/middleeast/isis-is-winning-message-war-us-concludes.html?_r=1
McDonald-Gibson, C. (2015, February 26). How ISIS Threatens Europe. Retrieved from http://time.com/3720076/isis-europe-migrants/
Mendoza, J. (2015, February 26). Why is ISIS destroying ancient artifacts in Iraq? - CSMonitor.com. Retrieved from http://www.csmonitor.com/World/Global-News/2015/0226/Why-is-ISIS-destroying-ancient-artifacts-in-Iraq
Misztal, B., & Michek, J. (2014, September 25). An Overview of ISIS | Bipartisan Policy Center. Retrieved from http://bipartisanpolicy.org/blog/overview-isis-threat-and-us-response/
Radio Free Europe Radio Liberty. (2015, January 29). Foreign Fighters In Iraq And Syria -- Where Do They Come From? Retrieved from http://www.rferl.org/contentinfographics/foreign-fighters-syria-iraq-is-isis-isil-infographic/26584940.html
Reuters. (2015, September 10). ISIS blasts Muslims fleeing to Europe as 'sinners' - Middle East - Jerusalem Post. Retrieved from http://www.jpost.com/Middle-East/ISIS-Threat/ISIS-blasts-Muslims-fleeing-to-Europe-as-sinners-415839
Rowen, B. (2014). ISIS Explained. Retrieved from http://www.infoplease.com/news/2014/isis-explained.html
Schimitt, E., & Hubbard, B. (2015, July 20). ISIS Leader Takes Steps to Ensure Group's Survival - The New York Times. Retrieved from http://www.nytimes.com/2015/07/21/world/middleeast/isis-strategies-include-lines-of-succession-and-deadly-ring-tones.html?_r=0
Thompson, N. Greene, R., & Mankarious, S. G. (2015, February 10). ISIS: Everything you need to know about the group - CNN.com. Retrieved from http://edition.cnn.com/2015/01/14/world/isis-everything-you-need-to-know/
Thompson, N., & Shubert, A. (2015, January 14). The anatomy of ISIS: How the 'Islamic State' is run - CNN.com. Retrieved from http://edition.cnn.com/2014/09/18/world/meast/isis-syria-iraq-hierarchy/index.html?hpt=hp_t1
Tran, M. (2014, June 16). How has Isis grown so powerful and who will stop it? – Q&A | World news | The Guardian. Retrieved from http://www.theguardian.com/world/2014/jun/16/isis-islamic-state-iraq-levant-q-and-a

Similar Documents

Premium Essay

Hlss320 Final Paper

...The Islamic State of Iraq and Syria Hank Gray American Military University The Islamic State of Iraq and Syria The Islamic State of Iraq and Syria is the biggest threat to the Unites States of American in the world today. It is not a question of if they will attack but when they will attack on American soil. To really understand how they might do it and why they want to one must first look at their history and beliefs. Al-Quade started during the Cold War when Russia invaded Afghanistan. The United States was against all things Russian and started to support the locals fight back against the Russians. This led to the United States giving Al-Quade weapons and training. After the withdrawal of the Russians in 1988 a named Ahmad Fadhil Nasal Al-Khalaylah joined Al-Quade. Once there he met a man named Sheikh Abu Muhammad who had a lot more violent outlook then Obama bin Laden. Unlike Bin Laden, Al-Khalaylah, who changed his name to Abu Musab Al-Zarqawi, grew up very poor and was a lot more extreme because of this fact. In 1999 he returned to Jordan and formed his own organization known as Jamaat Al-Tawhid Wal-Jihad or the Organization of Monotheism and Jihad. On September 11, 2001 Al-Quade made their motives known when they committed a terrorist attack on the World Trade Center towers, the Pentagon, and another flight that crashed before reaching a target. This would led to the United States invading Afghanistan in 2001 and in 2003 Iraq. Zarqawi’s group was...

Words: 1324 - Pages: 6

Free Essay

General Knowledge

...National National Herald case: HC terms Gandhis’ applications as ‘infructuous’ Updated: October 15, 2015 16:01 IST | PTI      Congress president Sonia Gandhi and vice-president Rahul Gandhi during the during a rally at Ramlila Maidan in New Delhi. File photo The Congress leaders had alleged that a "different treatment" was meted out to a challenge filed by them in the case. The Delhi High Court on Thursday termed as “infructuous” the applications moved by Congress President Sonia Gandhi, her son Rahul and some other party leaders alleging a “different treatment” was meted out to a challenge filed by them in the National Herald case. The Congress leaders in their application had opposed the transfer of the case from the court of Justice Sunil Gaur who had part-heard the matter for eight months to another court of Justice P S Teji. Justice Gaur on Thursday termed their “applications” as infructuous as the matter has been listed before him by the high court registry. The judge also said that he had not recused from the matter and added that the petitions came back to him as it was part-heard by him. Even senior advocate Kapil Sibal, appearing for Sonia Gandhi, agreed with the court that the applications had become infructuous and also added that they can be withdrawn. The court, thereafter, said it will hear arguments in the matter later in the afternoon. The Gandhis in their application had said their petition challenging a trial court order in the case was transferred in violation...

Words: 4323 - Pages: 18

Free Essay

A Study of Pakistani Insurgency

...|The Haqqani network, a feared insurgent group in Afghanistan allied with the Taliban militants, is not only a "veritable arm" of Pakistan's primary | |Inter-Services Intelligence Agency [ISI], according to the outgoing chairman of the Joint Chiefs of Staff, Admiral Michael Mullen, but also that the ISI helped | |Afghan militants to carry out a terrorist attack against the coalition soldiers and the U.S. Embassy in Kabul. Mullen added that America's fragile relations with| |Pakistan will deteriorate even futher: "I worry that the relationship [with Pakistan] will be in tougher shape down the road than it is now," Mullen said just | |few days before throwing a bombshell that made the Pakistani government furious. | |"The Haqqani Network—which has long enjoyed the support and protection of the Pakistani government and is, in many ways, a strategic arm of Pakistan's | |Inter-Services Intelligence Agency—is responsible for the September 13th attacks against the U.S. Embassy in Kabul. There is ample evidence confirming that the | |Haqqanis were behind the June 28th attack against the Inter-Continental Hotel in Kabul and the September 10th truck bomb attack that killed five Afghans and | |injured another 96 individuals, 77 of whom were U.S. soldiers," Muller said on September 22, in front of a Senate committee, adding in his testimony that "in | |supporting these groups...

Words: 2453 - Pages: 10

Premium Essay

Defeating Daesh

...know the enemy and know yourself you need not fear the results of a hundred battles“ –– Sun Tzu, Chinese philosopher and military strategist, around 500 BC. “Our terrorism against America is blessed terrorism.” –– Osama bin Laden (on video) “The acme of this religion is jihad.” — Osama bin Laden (Bergen, 2001, p. 41) Many have asked, “what can we do to defeat the Islamic State of Iraq and al-Sham (ISIS)? ” There have been a variety of suggestions from airstrikes, isolation , establishing a national unity government in Iraq to the feasibility of a counter-offensive using 'local' militia's and only as a last resort U.S. Boots on the ground. These are all worthy ideas; however, it is imperative to get a fundamental understanding of what has caused this problem because ISIS is growing and becoming stronger (even though current air strikes and counter-offensives have been successful). Before a decision can be made a rigorous analysis is necessary, a sociological analysis, so that the United States and the rest of the world can determine what must be done regarding ISIS and why. (Thesis): This paper will argue that the challenge of removing IS lies in our ability to understand and realize that the terror group’s appeal is not its alleged goal of a regression to the glorious past of Islam (as Armstrong put it), nor that Islam is the fundamental cause of this anomaly, but that ISIS's appeal is, as Dorsey and Ali state, “...the opportunity it offers the socially, economically...

Words: 20913 - Pages: 84

Premium Essay

National Secuirty

...closing the borders may not be the worst idea this government has ever had. Of course an extreme idea like that can lead to further issues but can also provide the country with the time to sit down and reflect on what can be done better in the future to avoid these circumstances. The people of this country might not have the best course of action to solve this issue but the government needs to work hard to fix this issue we are having on a daily basis. Nearly 3,000 people were killed instantly for the attacks of 9/11. On the day of these attacks, 19 al Qaeda members hijacked planes and performed the most lethal act of terrorism in American history. This attack raised the awareness of Islam and its teachings tremendously. There have been reports of increased sales of the Qur’an and literature on Islam, for example, and some mosques prominent Muslim community leaders have reported a surge in converts to Islam since 9/11 (Coskun 2012). The general public has had an upsurge of interest in the Arab-Muslim world. This awareness is proven through the study done by ProQuest and LAC search engines showing that there was a total of 105 dissertations done by graduate students directly related to the attacks of 9/11. This is what needs to be done. The more people are aware the better it can be to solve issues. During the Presidential election...

Words: 1658 - Pages: 7

Premium Essay

Terrorism Vs State Sponsored Terrorism

...Running head: STATE-SPONSORED TERRORISM 1 PAGE 2 STATE-SPONSORED TERRORISM State-Sponsored Terrorism YourFirstName YourLastName University title ? ????????????????????????????????? State Sponsored Terrorism: A Case of ISIS The term terrorism has elicited various definitions across different jurisdictions and continuously evokes different emotional responses. To some terrorism is an inhumane and traumatizing act while to others it is a strategic move to achieve desired goals and others see it as a holy war against those they feel do not conform to their ideals. Perhaps the best example to illustrate this discord in the definition of terrorism is the phrase that one man?s terrorist is another man?s freedom fighter. Terrorism...

Words: 1360 - Pages: 6

Free Essay

Guantanamo Bay

...Guantanamo Bay A seemingly endless war is upon us, between the United States and the countless terrorists of ISIS, Al Qaeda and others. The Naval Station detention camp located in Cuba, referred to as Guantanamo Bay or Gitmo (GTMO), holds prisoners, or detainees, who have been involved in terrorist activities. Some believe that Gitmo should be closed because of recent torture stories involving U.S. officials on the prisoners of the camp. They surmise that by closing Gitmo, tensions with the terrorists will lessen, which is far from true. Closing Guantanamo Bay would have a negative effect on the overall position of the United States in this arduous battle with the terrorists. President George W. Bush decided to transfer high value detainees from Central Intelligence Agency sites in the summer of 2006. Usually, captured soldiers would have protection under the Geneva Convention, which establishes the standards of law for the humanitarian treatment of war, or the basic rights of wartime prisoners. The detainees, being suspected Taliban and al Qaeda operatives, were not viewed as a part of a legitimate government, so it is not clear whether they should be protected under international law (Dahlstrom). The purpose of Guantanamo Bay was to capture any person who was involved in the terrorism that caused many U.S. deaths; it is a way, and maybe the only way, that the United States has in order to protect its citizens. In an article called, “The Historical Perspective on Guantanamo...

Words: 1521 - Pages: 7

Free Essay

Death of Osama Bin Laden

...Osama bin Laden, the founder and head of the Islamist group Al-Qaeda, was killed in Pakistan on May 2, 2011, shortly after 1:00 am PKT[1][2] (20:00 UTC, May 1) by United States Navy SEALs of the U.S. Naval Special Warfare Development Group (also known as DEVGRU or SEAL Team Six). The operation, code-named Operation Neptune Spear, was carried out in a Central Intelligence Agency-led operation. In addition to DEVGRU, participating units included the United States Army Special Operations Command's 160th Special Operations Aviation Regiment (Airborne) and CIA operatives.[3][4] The raid on bin Laden's compound in Abbottabad, Pakistan, was launched from Afghanistan.[5] U.S. military officials said that after the raid, U.S. forces took bin Laden's body to Afghanistan for identification, then buried him at sea within 24 hours of his death in accordance with Islamic tradition.[6] According to a Pakistani official, the United States had direct evidence that Inter-Services Intelligence (ISI) chief, Lt. Gen. Ahmad Shuja Pasha, knew of bin Laden's presence in Abbottabad.[7] Al-Qaeda confirmed the death on May 6 with posts made on militant websites, vowing to avenge the killing.[8] Other Pakistani militant groups, including the Tehrik-i-Taliban Pakistan, also vowed retaliation against the U.S. and against Pakistan for not preventing the operation.[9] The raid was supported by over 90% of the American public,[10][11] was welcomed by the United Nations, NATO, the European Union, and a large...

Words: 330 - Pages: 2

Premium Essay

Annotated Bibliography: The Syrian Civil War

...Annotated Bibliography Spyer, Jonathan. "The Battle for Aleppo; A report from the front lines of the Syrian civil war." The Weekly Standard 8 Oct. 2012. Opposing Viewpoints in Context. Web. 25 Oct. 2016 Article Link: Click here for page Summary Annotation: In the old city of Aleppo with a history of religion and the Dictatorship of Bashar al-Assad. A reporter named Jonathan Spyer went along with a group called Free Syrian Army (FSA) to the center of Aleppo and what Spyer says “ There is a sharp change in atmosphere as one enters Aleppo city from the surrounding countryside.” The city changes into a rubble streeted place with craters all over from the bombs that struck that spot. As they got deeper into the neighborhood, they people who lived there...

Words: 1799 - Pages: 8

Premium Essay

Iranian Nuclear Power Concerns

...bomb or similar object. (LENGTH 4 - 5 pages doublespaced PLUS citations) Answer: the nuclear program of Iran was launched in 1950’s in collaboration with the United States of America as part of the Atoms of Peace program. During the Iran-Iraq war in 1980’s, over 100,000 Iranian troops and civilians became the victims of chemical weapons. So Iran is has a first- hand knowledge of the effects of Weapons of Mass destruction. It has signed different treaties such as Nuclear-non Proliferation Treaty to show its concern about the risks of WMD. But now the true intentions of Iran on developing the nuclear capability are unknown. The U.S. intelligence agencies assessed that if Iran pursue to achieve the chemical weapons capability again it would be unlikely that it achieve this capability before 2013 or it might extends till 2015.( US Intelligence,2009). Iran nuclear program includes several research sites, two uranium mines, a research reactor and uranium enrichment facilities that include three known uranium enrichment plants. The Iranian stance on the development of its nuclear power is purely for the generation of power and using it for any other purpose will be the violation of the Nuclear Non-proliferation Treaty and against the Islamic principles. Iran argues that the development of the nuclear ability is necessary for the booming population and rapidly increasing industrialization. Iran claims to have legal rights...

Words: 1061 - Pages: 5

Premium Essay

Bfin

...related technical topics such as engineering and information systems. The database features thousands of full-text journals, dissertations, working papers, key business and economics periodicals such as the Economist, country-and industry-focused reports, and downloadable data. Its international coverage gives researchers a complete picture of companies and business trends around the world. With thousands of titles, most of them in full text, ABI/INFORM Trade & Industry™ provides business professionals with critical information about companies, products, and executives as well as in-depth news and analysis of industry trends and developments. With ABI/INFORM Trade & Industry, users can study and compare specific industries such as food & drink, pharmacy, telecommunications, computing, transportation, construction, and petrochemicals. Subject coverage • Business • Economic conditions • Corporate strategies • Management theory • Management techniques • Business trends • Competitive landscape and product information • Accounting • Finance • Etc. Key reports are available from publishers and analysts including: • Economist Intelligence Unit • Dun & Bradstreet • Business Monitor International • ISI Emerging Markets   Other key titles include: • Accounting Education News • Airline Business • Business Asia • Candy Industry • CEO Wire • Dow Jones DBR High Yield • Global Cosmetic Industry • Hospital Business Week • R & D Industry...

Words: 279 - Pages: 2

Premium Essay

Al Qaeda Research Paper

...On July 25 - two weeks before the US bombing of Iraq began - the House passed 370-40 an amendment offered by McGovern, insisting that Congressional authorization precede any "sustained combat role" in Iraq for US forces. Currently it seems that a "sustained combat role" for US forces is exactly what the Obama administration and the Pentagon are planning(Robert Naiman).The administration’s contention that the 9/11 authorization covers ISIS is also disputed because ISIS and Al Qaeda separated this year. The administration argues that the split did not abrogate authority to fight ISIS, whose predecessor was long al Qaeda affiliate under Osama bin Laden. The Iraq Resolution or the Iraq War Resolution (formally the Authorization for Use of Military Force Against Iraq Resolution of 2002). There is no requirement in international law that the United States (or any nation) seek permission to initiate any war of self-defense. "The United States government has argued, wholly apart from Resolution 1441, that it has a right of preemptive self-defense to protect itself from terrorism fomented by Iraq. Although this position has been intensively criticized, without any legal finding for support, claims for legality or illegality are merely debates. To prove...

Words: 1003 - Pages: 5

Premium Essay

Thailand: a Story of Unequal Growth

...However, critical examination of Thailand’s progress beyond GDP growth finds the extent of its economic achievements was similarly matched by its widening inequality and lagging development indicators, begging the question of whether standard measures of economic progress, such as GDP, are sufficient in assessing national development. Thailand’s Government and the Development of a Modern Economy Following the end of absolute monarchical rule in 1932, Thailand became a constitutional monarchy with a parliamentary democratic political system. The head of state is King Bhumibol Adulyadej, who has reigned since 1946. Its partially elected national legislature selects a prime minister, who appoints a cabinet of ministry heads (Economist Intelligence Unit). While the kingdom is divided into four geographical regions – North, Northeast, Central, and South, Thailand is a centralized unitary state whose powers of administration emanate from Bangkok (Keuleers 17). This form of organization dates back to administrative reforms of 1892, in which King Chulalongkorn sought to strengthen central control over local activities in order to protect against the threat of colonialism. Hence, policy and planning has tended to reflect the thinking and interests of the urban minority who form the core of this...

Words: 1808 - Pages: 8

Free Essay

Pakistan’s Internal Conflict Between Secularism and Islamic Militancy and the Effect on the Insurgency in Afghanistan

...creation as an Islamic state and Pakistan’s involvement in the creation of the Taliban and its rise to power in Afghanistan. Since the arrival of the United States in the region post-9/11 and its support for Pakistan in its fight against Islamic extremism, Pakistan’s home-grown insurgent forces have turned its fight against the state itself in its resistance against a stable and democratic government. This conflict has led to a growth in Islamic extremism in Pakistan’s border regions which have turned into safe-havens for fighters in Afghanistan in their war against the US and the Government of the Islamic Republic of Afghanistan (GoIRA). Evidence shows that these fighters still receive covert support from Pakistan’s Inter Services Intelligence (ISI) agency and elements of the Pakistani military. 2. Scope. This essay will first explain the roots of Islamic militancy in Pakistan including Pakistan’s involvement in the rise of the Taliban and home-grown extremist groups. This essay will then examine the nature and extent of the conflict between the Islamic militants and the Pakistani government and finally how this conflict is influencing the insurgency in Afghanistan. 3. Aim. The aim of this essay is to explain the causes and nature of the conflict between Islamic extremists and secular forces in Pakistan, and...

Words: 3102 - Pages: 13

Premium Essay

Stuxnet Worm

...University SECR-5080 Information Systems Security Author Note Certificate of Authorship: This paper was prepared by me for this specific course and is not a result of plagiarism or self-plagiarism. I have cited all sources from which I used data, ideas, or words either quoted or paraphrased. Abstract Discovered in June of 2010, a computer worm called Stuxnet was designed to attack programmable-logic controllers or PLCs that are used to control switches and values in industries that operate a specific type of on Siemens PLC device using Step7 software running on a Windows operating system. The worm was successful because it was able to exploit a of four zero-day flaw of Windows operating system. Stuxnet was a targeted attack by intelligence agencies to delay the enrichment of uranium by Iran. The Stuxnet worm was the first clear public evidence of sophisticated computer malware to sabotage control systems. The Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges in 2010. Table of Contents Introduction 5 Stuxnet Worm 5 Stuxnet is a Computer Virus 5 How Stuxnet Works 7 Stuxnet and PLCs 9 Stuxnet: Cyber Warfare? 9 Zero-day flaws and Stuxnet 11 Summary 12 References 14 Table of Figures Figure 1: SIEMINS S7 family of PLC (SIEMINS, n.d) 5 Figure 2: Flash Drive 5 Figure 3: Realtek Semiconductor Corp Logo (RealTek, n.d.). 6 Figure 4: Realtek Certificate (Symantec, 2010). 6 Figure 5: How STUXNET Spreads (New York Times...

Words: 2136 - Pages: 9