Home  >  Subjects  >  not specified  >  current page My Profile

DHS S Response to Radical TerrorismTerm Paper

Pages: 12 (3672 words)  |  Style: n/a  |  Sources: 5

Custom Writing

ISIS" Terrorist Group and DHS Policies

This section explores the profile of ISIS terrorist organization that threatens the U.S. homeland. The profile includes a discussion of the group's ideology, targeting, tactics, capability, and overall goals; an analysis of attacks, and propaganda released by the group.

Ideology

Islamic State of Iraq and Syria (ISIS) is an Islamic terrorist movement that has captured news headlines for their constant violence they continue to spread across the world. It is commonly recognized as an extremist Sunni political-religious body within Islam that looks to recover the golden regime of the beginning of Islam (the duration of the prophet Muhammad and the Caliphs who followed him). That is to be done, according to Salafist jihadist belief, by jihad (a holy war) against both inner and exterior opponents. Jihad, according to Salafist jihadism, is the individual responsibility of every Islamic. Al-Qaeda and the international jihad movements (of which ISIS is one) emerged from Salafist jihadism (Stakelbeck, 2015). According to the ISIS idea, Islam's golden period will be renewed through the organization of a supranational Islamic Caliphate made after the eras of the first Caliphs after Muhammad's death. It will be decided by Islamic spiritual law (the sharia), according to its most extreme interpretation. The Caliphate will occur on the ruins of the states in the Middle East after the First World War. Some of them, such as Iraq and Syria, where ISIS functions, are in the procedure for disintegrating in the wake of the uprising in the Middle East region, developing positive circumstances for the vision of an Islamic Caliphate.

Targeting

ISIS is currently engaged in soft-target attacks such as the killing of one Canadian soldier in non-combat situations and the 17-hour cafe siege in Australia. Today, hitting soft targets has become a primary part of the group's conventional working process (Council & Zenko, 2015). It strikes back against the worldwide air strategy focusing on the Islamic States in its Mesopotamian stronghold and aims to show its energy to prospective recruits. The primary objective of attacking the so-called soft targets is to deter and intimidate by predicting that financial interests, organizations and gradually the public will force the (Obama) management into forgoing its air strategies in Iraq and Syria (FoxNews.com). Soft-target strikes in locations like Libya, Sinai or Afghanistan, are very important for them to say that they have power and that the loss of Kobani and similar areas does not make much of a change. With the occurrence of soft-target strikes supposed to increase, security experts warn that Western and American travelers should pay serious attention to State Division traveling advisories (Stakelbeck, 2015).

Tactics

Currently, ISIS is an army movement that is no longer performing terrorist actions specifically but is performing conventional army functions in company and battalion structures, which was not the case in conventional al-Qaida way of war. ISIS has been fighting Iraqi army roles with company or battalion-size structures to get rid of cities and city settlements, and then keep and then develop those settlements. This clear-hold-build tactic is amazingly the counterinsurgency technique used by coalition forces in both Iraq and Afghanistan. I mean at this time remarkably and paradoxically ISIS battles with the same techniques we battled in Afghanistan and Iraq to realize the goal of territorial control. Put in a different way, ISIS has been battling as the U.S. battled against the Sunni insurgency in 2006 by imitating their techniques (Council & Zenko, 2015).

For ISIS, the basic tactic is to make an unexpected strike, cause highest possible accidents and spread worry before withdrawing and without incurring great losses. Later, they wait for the forces and unfriendly residents to leave or run away from the specific area. This aim for me describes the use of extreme violence and the distribution of horrible videos and pictures. In this sense, their use of violence is unselective one but a strategic one, providing to the objective of creating a sterile atmosphere. Simply, their aim is to drive the unwanted out of the taken areas and to build a "sterile" environment in sectarian conditions in the managed areas. This technique provides ISIS a submissive people and thus renders the holding stage easier to achieve. This strategic application of intimidation and fear to not completely for propaganda reasons but also for managing the territory taken is another dynamic that has gone unnoticed since 9/11.

As well, ISIS is pursuing a phased campaign style. It has skillfully managed to build stability between the phased strategy styles and maintained the momentum of warfare (Stakelbeck, 2015). This could only be obtained with heightened situational and tactical attention and with the adoption of centered preparing and de-centered implementation. ISIS is efficient at this: a powerful sign of a unified, consistent leadership framework that rules from the top down. It shows that while the provinces may have the independence to act as they wish in some regards, ISIS has a central control framework for its military tactic that surpasses all of the Iraq's regional military command. But as Americans are not efficient at collecting human intellect in the ISIS taken settlements because they could easily be found, the U.S. Homeland Security is away from working on this and only depending on intellect streaming from air reconnaissance.

Capability

ISIS has taken governments and regional military observers by surprise when it worked its way from an individual terror movement into a single, successful fighting force. Henceforth, the organization has captured swaths of land in both Syria and Iraq, as an effort to re-create an Islamic empire old world ideal. Syria and Ira q government forces have achieved little to reclaim lost territory, and there is an apparent vacuum left by U.S. forces (Stakelbeck, 2015). Though ISIS lacks any air power, it has claimed a series of Iraq's stocks of American, Chinese and Soviet-originated equipment. This has resulted in a ragtag organization of fighters with an equally ragtag array of weapons providing heightened tactical flexibility to fight their organized foes. In spite of coalition air attacks against their positions and sources of funds, ISIS is still the greatest threat to global stability.

Goals

The goal of ISIS is to develop an Islamic Emirate that extends through Syria and Iraq (Council & Zenko, 2015). This implies that it has a territorial goal. This goal is also expansionist and is executed via military conquest not completely through terrorists' techniques. That is why ISIS is defined as a military network because ISIS's huge technique relies on military superiority to control captured terrains by conquering state security. However, the ISIS kind of combat brings together and hybridizes terrorism, guerilla combat, and traditional combat. This attribute makes ISIS a new breed. When looking at its tactics, it is hard to tell that Iraq's al-Qaida is the predecessor of ISIS. The current ISIS fighting style clearly shows that ISIS is known for a cadre of former Saddam-era army authorities who know the army landscape and demographic features in Iraq as their own and how to use it. For me, the army technique design showed by ISIS over the last two years holds the trademark of several commanders because subsequent strategies have continually confirmed distribution, scope, timing, and deception as overarching strategic features.

Attacks and propaganda

Newsletters, billboards, big-screens, radio stations, murals, and leaflets are common tools used by ISIS in spreading propaganda (Duncan, 2004). ISIS is known for deluding the citizens of its area false information showing them as succeeding in their fights even when they are not. Their 'success has made people believe them to the extent of supporting their quest and ideology in Syria and Iraq. With the desire to brainwash them completely, the terror group has established strategic media with the inhabitants' proximity locations it manages to increase the visibility of its propaganda to individuals. The media centers are amazingly high-tech. People can publish their content or download materials from devices that have built-in spots for flash drives and SIM cards. Large flat-screen TVs erected in public areas show horrible beheading video clips together with utopia scenes. A group of activists compared the displays that ISIS has placed in main areas of the town to New York's Time Square.

As the terror group desires to reach as many people as possible within a short time, it is known for using old methods of spreading information from a sound system on trucks and hosting public beheadings (Duncan, 2004). In the caliphate, there is wall-to-wall propaganda. It resembles the Northern Korea. It obscures the facts of life, tempering discontent. It becomes an avenue of stabilizing and ongoing control. Propaganda also enhances the popularity of the ISIS brand (Council & Zenko, 2015). The movement differentiates itself from other jihadist groups and enemy companies like al-Qaeda by launching itself as a legal government that offers services (like policing, trash collection and education) to the individuals of the caliphate. Couple with public execution via shooting and beheading, ISIS maximizes on the Internet access to restrict exposure to information from the external world.… [END OF PREVIEW]

Download Full Paper (12 pages; perfectly formatted; Microsoft Word file) Microsoft Word File

Birth and Evolution of Homeland Security


Homeland Defense Homeland Security Is the Actual Course


How Homeland Security Combats the Financing of Terrorism


Terrorism and the Internet Modern Media Technologies


Domestic U.S. Soft Targets the Identification and Vulnerabilities


View 55 other related papers  >>

Cite This Paper:

APA Format

DHS S Response To Radical Terrorism.  (2015, December 13).  Retrieved May 20, 2017, from http://www.essaytown.com/subjects/paper/dhs-s-response-radical-terrorism/3090719

MLA Format

"DHS S Response To Radical Terrorism."  13 December 2015.  Web.  20 May 2017. <http://www.essaytown.com/subjects/paper/dhs-s-response-radical-terrorism/3090719>.

Chicago Format

"DHS S Response To Radical Terrorism."  Essaytown.com.  December 13, 2015.  Accessed May 20, 2017.
http://www.essaytown.com/subjects/paper/dhs-s-response-radical-terrorism/3090719.

Disclaimer