daesh evolved irregular threat analysis
TRANSCRIPT
ISIL’S EVOLVED IRREGULAR THREAT
Report for the Strategic Multilayer Assessment
Noetic Corporation
November 2015
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE II
Distribution
Copies Recipient
1 Strategic Multilayer Assessment
Authors
Role Name
Principal Steve Williams
Author John Watts
Contributors Jeffrey Lin
Noetic Corporation
1900 L Street NW, Suite 525
Washington DC 20036
Phone +1 202 296 4260
Fax +1 202 204 1666
Web www.noeticgroup.com
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE III
CONTENTS
EXECUTIVE SUMMARY ............................................................................................................. IV INTRODUCTION ........................................................................................................................... 1
Background ......................................................................................................................................................... 1 Aim ....................................................................................................................................................................... 2 Scope ................................................................................................................................................................... 2
PART 1: EXAMING ISIL THROUGH AN EITP LENS .................................................................. 2
Project History ..................................................................................................................................................... 2 Key Findings ........................................................................................................................................................ 3 ISIL From an EIT Perspective ............................................................................................................................. 4
PART 2: UNDERSTANDING ISIL’S CAPABILITIES................................................................. 11
Centre of Gravity Analysis................................................................................................................................ 12 Analysis of key battles ...................................................................................................................................... 24
PART 3: IMPLICATIONS FOR THE REGION AND BEYOND .................................................. 26
Implications for the Region .............................................................................................................................. 26 Implications for the Broader Jihadi Movement ............................................................................................... 28 Implications for the Other Irregular Groups.................................................................................................... 29
SUMMARY .................................................................................................................................. 31
Conclusion ......................................................................................................................................................... 31
ANNEX A: EVOLVED IRREGULAR THREAT METHODOLOGY ANNEX B: ISIL CAPABILITY MATRIX ANNEX C: ISIL'S EVOLVED IRREGULAR THREAT CASE STUDY ANNEX D: ISIL KEY BATTLE ANALYSIS ANNEX E: BIBLIOGRAPHY
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE IV
EXECUTIVE SUMMARY
1. This report was written as a part of the Joint Staff’s Strategic Multilayer Assessment (SMA) office’s support to
CENTCOM’s Special Operations Command (SOCCENT). The SMA SOCCENT effort is a robust, multi-
disciplinary approach to understanding the complex challenge posed by the emergence of the Islamic State of
Iraq and the Levant (ISIL, also referred to as ISIS, IS and Daesh). In particular, this effort seeks to better
understand the future implications of ISIL’s rise in the future, once the ISIL crisis has been resolved and a
degree of stability has been re-established.
2. The Evolved Irregular Threat methodology was developed in order to understand the potential future threats
that irregular groups could pose to U.S. forces if they are able to innovate faster than the U.S. can react.
Terrorist, sub-state and irregular groups have in the past demonstrated the ability to close technological
capability gaps through innovation and leveraging of commercially available technologies. In some cases, this
has resulted in the development of near-state like capabilities or new cheap and effective tactics that pose
major challenges to more advanced military forces.
3. In order to better understand ISIL’s capabilities in comparison to existing advanced irregular group case
studies, Noetic applied the EIT methodology to ISIL. This approach involved mapping ISIL capabilities across
a spectrum of control, then building a Center of Gravity (COG) construct. ISIL’s success to date correlates
closely with EIT’s predictions, which further validates the theoretical underpinnings of the methodology.
4. After mapping ISIL capabilities across the spectrum of control, it is clear that ISIL is a resilient irregular force
with significant coercive, administrative and persuasive tools available to achieve their goals. Their resiliency
is evident from their ability to withstand, and further expand, despite coalition air strikes. The range of
capabilities ISIL demonstrates across the spectrum differentiates them from most other sub-national irregular
groups, and confirms that their comparison with other previously analysed proto-state groups is apt.
5. Earlier EIT analysis identified a number of likely trends that would characterize future irregular groups. ISIL
has confirmed the importance of some of these trends, such as the importance of modern communications,
social media and networked systems and actors. But it has reversed other predicted trends, such as the
criticality of virtual leaders and organizations, distributed enemy capability development and increased use of
autonomous systems. Moreover, despite seizing large quantities of modern and sophisticated military
equipment, ISIL has employed it in a limited fashion. Its tactics remain strikingly conventional, and when using
asymmetric tactics, they tend to adhere to commonly used and well proven irregular approaches. There are a
number of possible reasons for this, including the experience and background of key leaders and the lack of
military necessity for other approaches.
6. While all irregular groups have distinct characteristics relevant to their context, ISIL is truly unique. It may
demonstrate less innovation than previously examined groups, but it has developed several existing
approaches to a level of sophistication beyond what could be expected of most irregular groups. The key
drivers of ISIL’s success is their bureaucratic competence, extensive planning and preparation and
sophisticated human intelligence and security apparatus. It is the effective execution of these tasks that has
led to their establishment of perhaps the closest approximation of a state of any irregular group. In particular,
ISIL’s administrative and persuasive capabilities are remarkably sophisticated and will likely be a bench mark
for irregular groups in the future.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE V
7. After mapping ISIL’s capabilities, this analysis determined three CoGs:
a. The Establishment of a Credible Caliphate. By self-proclaiming an Islamic caliphate and meeting
several key religious requirements, ISIL has created a perception of legitimacy and authority amongst
certain supporting communities. It gives gravitas to their cause that would not be possible by other
means.
b. Integrated, Independent Financial Resources. ISIL has managed to generate more funding than
almost any irregular group, earning it the moniker ‘the richest terrorist group in the world’. More
importantly, it has done so independent of state backing, allowing it geopolitical freedom of action.
c. Leveraging Identity Politics and Engaging the Disenfranchised. ISIL has successfully exploited
political division and created instability in order to generate support and promote their cause. They have
also managed to generate support from around the world by appealing to diverse demographics in a
variety of ways.
8. ISIL has proven itself to be an effective fighting force and has had some remarkable successes. But it has
also suffered some high profile defeats. Its unwillingness or inability to employ some of the high end military
capabilities it has acquired in those instances, its lack of creative technology employment and its reliance on
low tech solutions to tactical problems raises questions about their ability to adapt to military challenges. Its
approaches have been well executed and to effective to a degree, but it may also point to a limitation to
effective combat a motivated and well equipped military opposition.
9. In the longer term, few groups are likely to learn anything new from ISIL’s military approaches and the tactics
they have employed does not appear to pose new risks of additional capability gaps. However, it has created
new benchmarks in the administrative and persuasive capability areas which will likely be adopted and
replicated by groups in the future. While it will be difficult for groups to replicate many aspects of ISIL’s
success due to different political and environmental contexts, ISIL’s rapid and successful rise will have
ongoing implications for the region and irregular groups around the globe for many years to come.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 1 OF 33
INTRODUCTION
Background
1. The Strategic Multilayer Assessment (SMA) office provides planning support to Combatant Commands
(COCOM) with complex operational imperatives requiring multi-agency, multi-disciplinary solutions that are
not within core Service/Agency competency. The SMA office has developed a proven methodology merging
multi-agency expertise and information to address complex operational requirements that call for multi-
disciplinary approaches utilizing skill sets not normally present within any one service/agency. The SMA
process uses robust multi-agency collaboration leveraging intellectual/analytical rigor to examine
factual/empirical evidence with the focus on synthesizing existing knowledge. The end product consists of
actionable strategies and recommendations, which can then be used by planners to support Course of Action
Development. SMA is accepted and synchronized by Joint Staff, J3, Deputy Directorate Global Operations
(DDGO) and executed by OSD/ASD(R&E)/EC&P/Rapid Reaction Technology Office (RRTO).
2. In 2014, SMA undertook a successful analysis to understand the psychological, ideological, narrative,
emotional, cultural and inspirational (“intangible”) nature of Islamic State of Iraq and the Levant (ISIL).
Following on from this effort, current commander Special Operations Command Central, Major General
Nagata, requested that SMA consider:
“Given that when the dust settles and some degree of durable stability has been established in the Middle
East, it will no longer look as it did prior to the start of the Syrian civil war and the rise of ISIL; therefore,
the question is what will the Middle East look like when the ISIL crisis has been resolved?”
3. As part of the SMA multi-agency approach, Noetic has utilized the analytical framework developed during its
initial Evolved Irregular Threat (EIT) methodology, which was undertaken on behalf of the Office of the
Secretary of Defense to analyze the comparative advantages and innovations that underpinned the success
of irregular groups to reach near-state like status. The first EIT project examined a range of sub-state groups
with near state-like capabilities (primarily Hezbollah, Liberation Tigers of Tamil Elam and Lashkar-e-Taiba) by
mapping those capabilities across a spectrum of control which ranged from coercive, through administrative to
persuasive. The analysis was used to develop a series of wargames that tested an evolved, future irregular
threat against current U.S. forces to identify potential future vulnerabilities.
4. For the SMA analysis, Noetic has analyzed ISIL’s capabilities to better understand the elements that have
underpinned its rapid and remarkable rise. By mapping the capabilities using the same methodology as the
initial analysis it is possible to undertake a like-for-like comparison with the findings from the earlier research
and compare ISIL’s strengths and weaknesses to historical examples. The analysis then uses the capability
map to build a ‘Centers of Gravity’ (COG) construct to better understand ISIL’s key innovations and
successes, such as its sophisticated organizational and funding model and its ability to harness identity
politics to generate support.
5. Terrorist, non-state and sub-state groups have demonstrated an ability to learn from the experiences of other
groups and adopt successful methods. No matter the eventual fate of ISIL, other irregular and terrorist groups
will likely learn from and utilize many of these methods. This report seeks to identify and forecast the potential
ripple effects that ISIL’s rise will have regionally and globally in the future.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 2 OF 33
Aim
6. The aim of this report is to apply the Evolved Irregular Threat methodology to the case study of the Islamic
State of Iraq and the Levant (ISIL) in order to understand their level of innovation and what broader
implications it will have for the region and beyond.
Scope
7. The scope of this report is develop a case study of ISIL that maps their capabilities across the ‘spectrum of
control’ in order to build a Center of Gravity construct. Using this case study, ISIL will then be examined
comparatively against other advanced sub-national and irregular groups that have established proto-states
and/or near-state like capabilities and the trends identified during previous EIT wargames. This analysis will
be used to assess the key successes and limitations of ISIL’s innovations, and consider broader implication
for those innovations on the region and beyond.
8. The report is divided into three main sections. The first section summarizes the historical case studies and
key findings of previous Evolved Irregular Threat (EIT) analysis. From this, a general analysis of ISIL’s
capabilities will be discussed in relation to the three parts of the ‘spectrum of control’: coercive, administrative
and persuasive. This section will also draw broad comparisons between ISIL and the potential future trends
forecasted during the EIT wargames.
9. The second section will examine ISIL capabilities in more specificity, based on the CoG construct included in
annex C. This section will broadly discuss the key elements of the three identified CoGs: the establishment of
a credible caliphate; their integrated and independent financial resources; and the leveraging of identity
politics and engagement of the disenfranchised. This section will also examine the outcomes of several key
ISIL battles, and the role that innovation could or did play in their success or defeat.
10. Finally, the third section will consider what the legacy of ISIL’s innovations will have on the region and
beyond. No matter the final fate of ISIL, successful innovations will be adopted and adapted by other irregular
groups and those that have helped it to succeed will take lessons from it that they will develop in the future.
11. This analysis is based on open source reporting and unclassified information and is written for an unclassified
audience. As such, it is limited to discussion of ISIL capabilities and actions that have been reported in the
media, presented and published by international and national governments and the research and analysis
undertaken by Noetic, academia, and think tanks.
PART 1: EXAMING ISIL THROUGH AN EITP LENS
Project History
12. The first Evolved Irregular Threat Project was undertaken to broadly inform DOD future technology
development efforts by assessing the operational capabilities of various non-state actors in the current and
future operating environment (circa 2025). The project analyzed how various adversary and friendly
capabilities interact with each other in a measure-countermeasure dynamic at both the tactical and
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 3 OF 33
operational levels of war. The knowledge assembled during the study provided a model for assessing the
capabilities and vulnerabilities of emerging or anticipated threat groups operating across multiple domains in
the urban littoral battlespace. The project also provided a replicable methodology for inexpensively but
rigorously wargaming Red- and Blue team capabilities, especially in an irregular warfare context.
13. The project analyzed ‘evolved irregular threat’ groups – armed sub-state or non-state actors such as military
units, terrorist networks, insurgent movements, militia groups or armed criminal actors including piracy
networks, people/drug/arms smuggling rings or urban gangs – against a spectrum of control, from coercive
(combat capabilities) through administrative (governance capabilities) to persuasive (political and propaganda
capabilities).
14. The study examined Hezbollah, the Liberation Tigers of Tamil Eelam and Lashkar-e-Taiba because
historically they represented fiercely capable and flexible organizations by learning to exploit the logistical,
financial, technological, political and economic infrastructure in place as part of the global network of people,
communities, organizations and governments. Thriving off local and global conditions, these groups used
coercive and persuasive tactics to attract popular and financial support to their causes, allowing them to
employ capabilities in ways that have shocked and surprised both state militaries and global audiences. In
some instances, these groups were innovators and diffusors of knowledge and materiel; in others, they
copied, learned or shared best practices across a global network of armed non-state actors where tactical and
technical innovations are quickly developed, distributed and absorbed into operational concepts. Taken
together, the range of capabilities of these groups covers nearly the entire spectrum of combat, governance
and political/propaganda capabilities that armed non-state actors may employ. As such, these groups
provided an excellent model to compare ISIL against.
Key Findings
15. The first study found that the key trends most likely to affect the future warfare environment include constant
hyper global interconnectedness; the ubiquitousness of social and international media; migration patterns
including rapid urbanization in littoral regions and cross-border migration; the presence of virtual diaspora
populations linked to their countries of origin by information technology; and the impact of technological
innovation and diffusion of enemy capability development including the ability of adversaries to rapidly design,
prototype and field capabilities more cost-effectively and at a potentially much faster rate than the U.S.
military. While no single trend will dominate the global future, all of these trends are mutually reinforcing and
will influence the capabilities, priorities and behavior of non-state actors in such a way that markedly reshapes
the future conflict environment.
16. The broad observations from the first Evolved Irregular Threat Project that related to the groups themselves
centered on:
+ Networked Systems and Actors;
+ Virtual Leaders and Organizations;
+ Distributed Enemy Capability Development;
+ Universal Technology Platforms;
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 4 OF 33
+ Lower Barriers to Entry; and
+ Robotics and Increasingly Autonomous Technologies.
ISIL From an EIT Perspective
17. Examing the key findings of the original EIT wargames in light of ISIL’s recent actions highlights some
interesting points of consideration. The previous EIT analysis identified a number of commonalities and trends
that were predicted to become increasingly prominent amongst irregular groups in coming years. Despite the
project focusing on a 2025 timeframe, these trends began appearing within months of the project’s completion
during the overthrow of Muammar Gaddafi. Both in Libya and subsequently in the early days of the Syrian
conflict, innovative ordinary citizens built potent weapon systems using a makeshift combination of
commercially available technology and surplus military equipment.1 These included, for instance, the
mounting of machine guns2 or rockets
3 onto ATVs which were remotely controlled by a computer game
controller. During the early stages of the Syrian civil war, various groups battled the Assad regime with make-
shift tanks, not dissimilar to those built by Mexican Drug cartels. In some cases, these too employed remote
weapon stations controlled by commercially available computer components4. While the effectiveness and
lethality of these systems is questionable5, they nonetheless demonstrated that irregular groups could and
would innovate in order to close the technology gap when fighting a superior military force.
18. While ISIL’s claim to be a reborn Caliphate is arguable, thanks to the inclusion of many experienced ex-
Baathist party members in its ranks and the seizure of Iraqi government and military equipment it has become
a close approximation of an actual state. It controls territory, manages the economy, generates a relatively
large revenue stream and regulates the population and society it controls.
19. Yet, there has been a comparatively low level of innovation demonstrated by ISIL to date. After the seizure of
Iraqi military bases, it was feared that with access to high-end conventional weapon systems ISIL would be
near unstoppable. Fortunately, the grimmest of these forecasts have not come to pass, and in fact it is since
the seizure of that equipment that they have suffered several high profile and notable military defeats.
20. Air strikes have degraded some of their capabilities, and no doubt the larger equipment’s vulnerability to such
strikes limits ISIL commander’s willingness to deploy them. But despite the high profile defeats, ISIL has
employed those high end capabilities sparingly and it’s military innovations have been limited to evolving
existing techniques (using coordinated armored vehicle borne IEDs (VBIEDs)) or adopting dated military
tactics (e.g. tunnelling to plant explosives under defensive hard points).
21. In contrast, other irregular groups examined during the previous analysis were able to build effective (within
their own contexts) near-state capabilities without the resources or high end capabilities that ISIL has
1 Alan Taylor, “DIY Weapons of the Libyan Rebels”, The Atlantic, Jun 14, 2011, http://www.theatlantic.com/photo/2011/06/diy-
weapons-of-the-libyan-rebels/100086/ 2 Steve Johnson, “Libyan Rebels Build Nifty Remote Control Guns”, The Firearm Blog, June 23, 2011,
http://www.thefirearmblog.com/blog/2011/06/23/libyan-rebels-build-nifty-remote-control-guns/ 3 John Reed, “Rebel Tech: Four Wheelers and Rockets”, Defense Tech, July 10, 2011 http://defensetech.org/2011/07/10/rebel-
tech-four-wheelers-and-rockets/ 4 Robert Beckhusen, “Playstation-Controlled DIY Tank May Be The Wildest Weapon Yet In The Syria War”, Wired, October 12,
2012, http://www.wired.com/2012/12/rebel-armor/ 5 Mitch Swenson, “Check Out These Homemade Kurdish Tanks: They’re Terrible”, War is Boring, https://medium.com/war-is-
boring/check-out-these-homemade-kurdish-tanks-86459f92e161
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 5 OF 33
acquired. For those groups that did have access to state funding and support, they were able to effectively
employ the technologies in new ways tailored to their threat environment and objectives.
22. It could be countered that ISIL’s has innovated only to the extent it needs to within its own context and that
further innovation is unnecessary to achieve its objectives. This is a valid argument and the hybrid warfare
that ISIL has adopted has proven effective enough that it has not only weathered year-long coalition bombing
campaign, but expanded its reach during that time. But the objective of this analysis is not to identify a specific
defeat mechanism. Rather it is to understand the broader and future implications of ISIL’s approach. Irregular
groups learn from each other’s experiences and adopt successful tactics and techniques. By separating out
capabilities and innovations and examining their potential broader utility, we can develop an idea of
characteristics that will shape other irregular threats in the coming years.
Coercive Capabilities
23. When compared with historical near-state irregular groups ISIL has demonstrated lower levels of combat
innovation. Whereas the Liberation Tigers of Tamil Elam (LTTE) were able to build a crude air force by
modifying civilian platforms6, ISIL reportedly has several helicopters and even fighter jets
7 (Mi17, UH-60
Blackhawks, MiG-21s8) seized from surrendered Iraqi military bases, yet do not appear to have used them.
Issues of maintenance and military readiness are likely key factors in their limited use, which may be a
reflection of the lack of a state support, a lack of intent or ability to invest in the capability. ISIL has employed
seized heavy artillery, but targeting by U.S. air strikes has degraded their stockpile and their vulnerability
seems to have reduced willingness to deploy on occasion. ISIL has evolved existing tactics to create combat
effects by other means, for instance utilizing waves of suicide bombers in lieu of artillery bombardment and
using armored vehicles as Vehicle Borne Improvised Explosive Devices (VBIED)9 to reduce the risk that they
are stopped before reaching their target. These tactics may be highly effective, and only possible by a group
with a cadre of deeply committed fighters, but the underlying concept remain essentially conventional. In
effect, it is a different form of preparatory fire against a defensive position prior to an assault.
24. The most distinctive feature of ISIL tactics is its hybrid10
nature, combining conventional and irregular tactics.
This has become the standard approach for irregular groups, but ISIL’s access to higher end conventional
capabilities has reinforced the conventional aspects compared with other groups. The ubiquity of this
approach means that it cannot really be considered innovative, but an optimizing of the approach due to
increased competence of commanders and increased access to more capable weapons. It could also be
argued that while other irregular groups, including those they have fought against, have utilized more
‘innovative’ home made weapon systems, those systems have not always proven effective on the battlefield
and thus ISIL are right not to adopt them. Another potential reason could be that ISIL’s effectiveness and
6 Paul French, “The Tamil Tigers”, Air-force Technology, September 14, 2007, http://www.airforce-
technology.com/features/feature1270/ 7 Dave Majumdar, “Syrian Military Claims to Have Destroyed Two ISIS MiGs”, USNI News, Aviation, October 22, 2014,
http://news.usni.org/2014/10/22/syrian-military-claims-destroyed-two-isis-migs 8 Bill Roggio, “Islamic State Documents Takeover of Syrian Airbase”, Long War Journal, August 27, 2014,
http://www.longwarjournal.org/archives/2014/08/islamic_state_photos.php 9 “ ISIS Captured 2300 Humvee Armored Vehicles from Iraqi Forces in Mosul”, Agence France Presse, The Guardian, May 31,
2015, http://www.theguardian.com/world/2015/jun/01/isis-captured-2300-humvee-armoured-vehicles-from-iraqi-forces-in-mosul 10
Bryan Price, et al, “The Group that Calls Itself a State The Evolution and Challenges of the Islamic State”, Combating Terrorism Center, West Point, December 16, 2014, https://www.ctc.usma.edu/posts/the-group-that-calls-itself-a-state-understanding-the-evolution-and-challenges-of-the-islamic-state
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 6 OF 33
territorial gains have meant that they haven’t needed to be innovative to succeed. Yet, they have suffered
defeats in a number of high profile battles (Kobani, Tikrit)11
, where technology could possibly have military
shortcomings. Whether combat innovations could have given ISIL the edge to win in those battles is
instructive either way: if high-end or innovative capabilities could have tipped the battle, then perhaps their
inability to think creatively and adapt is a potential weakness. Conversely, if they are unlikely to have been
decisive, then perhaps we currently place too high a value on irregular innovation.
25. ISIL’s irregular/conventional hybrid approach could be explained by the make-up of the group: a blend of
extremist terrorists and former Baathist state officials. Considering the influx of fighters from around the world
however, it is surprising that there is not a higher degree of creativity evident. Robotics was a key focal point
in the earlier EIT analysis, and Hezbollah has demonstrated12
a range of innovative uses for drones beyond
the filming of propaganda and low level surveillance that ISIL appears to have used them for.13
A key finding
of the EITP report was the risk of homemade precision munitions. It is surprising that ISIL has not attempted
to strap explosives to smaller drones as a makeshift precision weapon in urban combat for instance.
Administrative Capabilities
26. ISIL is certainly not the first irregular group to seek to govern the area they control, but they appear to have
had a more detailed plan than most to achieve it from the outset. The planning was detailed and
comprehensive, and aided by jihadists with long experiences with other groups as well as former Baathists
officials from Saddam Hussein’s regime. They have sought to shape society through not only issuing laws,
religious interpretations and decrees, but in setting up schools and managing the administrative functions of a
ruling government. While their execution and effectiveness at running governmental services may be
questionable14
, in many cases it represented an improvement over existing services15
and their approach will
likely provide a model for others in the future. The establishment of structured and hierarchical governance16
also gives a perception of legitimacy and real depth.
27. One of ISIL’s greatest innovations is the way they have financed and funded their activities17
. Even before it
managed to gain control of large portions of Western Iraq, ISIL was being referred to as the world’s richest
terrorist group18
. Through seizure of primary resource extraction sites, basic refining, smuggling, looting of
antiquities, taxing of populations under their control and seizure of banks and other assets, ISIL has been able
11 Jessica Lewis McFate, “The ISIS Defense in Iraq: Countering an Adaptive Enemy” Institute for Study of Warfare, Middle East
Security Report, no. 27, May 2015, http://www.understandingwar.org/report/isis-defense-iraq-and-syria-countering-adaptive-enemy 12
Peter Bergen, Emily Schneider, “Hezbollah Armed Drone? Militant’s New Weapon”, CNN, September 22, 2014, http://www.cnn.com/2014/09/22/opinion/bergen-schneider-armed-drone-hezbollah/index.html?iref=allsearch 13
Abdelhak Mamoun, “Haditha Police shoots down reconnaissance drone belonging to ISIS in western Anbar” for Iraqi News, September 27, 2015, http://www.iraqinews.com/baghdad-politics/haditha-police-shoots-reconnaissance-drone-belonging-isis-western-anbar/ 14
Ghaid Sary, “Inside Mosul: Residents Recount How IS Took Over Their Lives”, BBC News, Middle East, June 9, 2015, http://www.bbc.com/news/world-middle-east-32957861 15
Jeremy Bender “An ISIS defector explained a key reason people continue joining the group” for the Business Insider, Nov 18, 2015, http://www.businessinsider.com/isis-defector-explains-why-people-continue-joining-group-2015-11 16
Michael Fitzsimmons, “Governance, Identity and Counterinsurgency: Evidence from Ramadi and Tal Afar”, March 2013, Strategic Studies Institute, pp 123-126, http://www.strategicstudiesinstitute.army.mil/pdffiles/pub1150.pdf 17
Financial Action Task Force (FATF), Financing of the Terrorist Organisation Islamic State in Iraq and the Levant (ISIL), February 2015, www.fatf-gafi.org/methodandtrends/documents/financing-of-terrorist-organisation-isil.html 18
Terrence McCoy, “ISIS Just Stole $425 M, Iraqi Governor Says, and Became the ‘World’s Richest Terrorist Group”, The Washington Post, June 12, 2014 http://www.washingtonpost.com/news/morning-mix/wp/2014/06/12/isis-just-stole-425-million-and-became-the-worlds-richest-terrorist-group/
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 7 OF 33
to generate large revenue’s19
independently of State backing. This means that ISIL is free to pursue its own
goals free of State-sponsored constraints, limitations or directions. In particular, ISIL’s detailed book keeping20
and expense tracking has been a key characteristic of their approach. While the resources available will differ
in other regions or contexts, ISIL’s planning for administrative governance and approach to revenue
generation and application will likely provide a model for other groups in the future.
Persuasive Capabilities
28. ISIL has become the world’s best known and most infamous terrorist group because of its persuasive
capabilities. Its use of social media to identify and connect with potential supporters; recruit; broadcast its own
narrative; and shock and horrify its adversaries has been well covered21
. At a deeper level, its ability to
develop a cohesive narrative that suit it purposes, produce slick and high quality vehicles for that narrative
(such as its multilingual magazine Dabiq and online videos) and distribute them globally surpasses any other
group in history.
29. Their approach is not without precedent. Other national movements or protest groups (such as Free Tibet
groups and supporters of East Timorese independence) have in the past been very successful in keeping
their issues in the public eye and pushing for political change. Arab groups fighting Israel (Fatah, Hezbollah,
Hamas et al) have long been skilled at manipulating specific incidents and violence generally to their own
ends. Al Qaeda and other Islamic Extremists have used video sermons and violence to spread their message
and gain support for over a decade.
30. But none have exploited the international and social media spheres as effectively or with the degree of
sophistication that ISIL has. In a sense their success again reflects the development and best use of existing
approaches rather than any degree of true innovation, but the scale and style of ISIL’s products represents a
true advancement in what was considered possible by an irregular group. In any case, the use of carefully
developed, targeted and well produced narrative vehicles spread through social and traditional media will be a
model all irregular groups will seek to utilize in the future. The fact that ISIL has also been able to use the
‘terror shock value’ that results from their violent propaganda as a combat multiplier on the ground further
reinforces the benefits of this approach and the success of ISIL’s application of it. In this case, ISIL’s success
validates a key finding of the critical nature of media and social networks that was forecasted during the
earlier Evolved Irregular analysis. In this area at least, ISIL has demonstrated what an evolved irregular threat
will look like.
Networked Systems and Actors
31. This finding from the earlier analysis was based on the nature of the advanced terrorist and irregular groups
over the past decades which had state backing (Hezbollah), global networks of sleeper cells and a focus on
global effects (Al Qaeda) and/ or globally dispersed diaspora with a strong collective identity. The trend
indicated that the global network of agents or sympathizers would expand the actions of a specific group well
19 United Nations, Analytical Support and Sanctions Monitoring Team, “The Islamic State in Iraq and the Levant and the Al-
Nusrah Front for the People of the Levant: report and recommendations submitted pursuant to resolution 2170(2014)”, November 2014 http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2014/815 20
Hannah Allam, “Meticulous Bookkeeping Bolster’s ISIL’s March on Baghdad”, Sydney Morning Herald, July 4, 2014, http://www.smh.com.au/world/meticulous-bookkeeping-bolsters-isils-march-on-baghdad-20140704-zsvyf.html 21
Jacob Siegel, “ISIS is Using Social Media to Reach YOU, Its New Audience”, The Daily Beast, August 31, 2014 http://www.thedailybeast.com/articles/2014/08/31/isis-s-use-of-social-media-to-reach-you-its-new-audience.html
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 8 OF 33
beyond its borders. The types of dispersed support networks could span the spectrum from relatively benign
political agitation and lobbying (protests, petitions), through criminal (sourcing of illicit goods) to violent action
(a bombing in retaliation for an action). The perceived threat was that any action that occurred regionally
could have drastic immediate implications elsewhere, in effect creating a form of deterrence by the terrorist
group. The key risk was that the actors were geographically unconstrained.
32. The ISIL case study both confirms and subverts this trend. ISIL is defined in large part by its geographic
anchors. It concentrates its force and draws strength from control over physical territory. Is this sense, it
reverses the predicted trend, which assumed that physical terrain was no longer important, and in fact a
liability. Further, ISIL does not have a traditional or easily defined diaspora. It appeals to a broad range of
actors for a range of very different reasons. While there is an obvious religious link, it alone is not sufficient to
explain the connection with all sympathisers, recruits or supporters. It is not universally compelling in the way
national movements can be, and it crosses a broader range of self-interests, cultural and other identities. ISIL
has been very effective in engaging and connecting with each of those different sub-groups, but not in a
homogenous or one dimensional manner.
33. ISIL has actively sought to engage their network of supporters to spread their narrative through-out traditional
and particularly non-traditional/ social media. Sympathizers retweet messages and set up false accounts to
amplify the message. Those living outside the caliphate who have never lived there engage in deep
conversations with potential supporters to engage with them personally and emphasize the element of the
narrative that resonate most strongly to that individual. This tactic has been highly effective and has helped to
establish perceptions of success and credibility, which acts as a force multiplier for their messaging and is a
key attraction for the recruiting foreigners to join their cause.22
34. Regionally they have used their networks to gather detailed human intelligence and established sleeper cells
to spring surprise attacks and seize territory. This approach was a critical element of their early success in
rapid expansion and establishment of their caliphate. It is likely that they have sought to replicate this
approach more broadly throughout the region, the extent of which there network has developed and the risk it
poses is not yet clear.23
But following the string of terrorist attacks by groups claiming some association or
alliance with ISIL, from Turkey to Beirut, to the Sinai, Libya and Paris, it is clear that ISIL sees this networked
capability as a key element of future success. This is reinforced by the magnetism of the ISIL brand that has
drawn declarations of allegiance from other irregular groups, quickly expanding the influence and reach of the
group.
35. The degree of control and coordination of ISIL over those allied groups is not clear. The capabilities of each
also vary drastically. Similarly, while there have been a number of high profile attacks around the globe linked
to ISIL, until recently they appear to have predominately been undertaken by individuals or small groups who
are acting on their own initiative without coordination from ISIL leadership. Certainly ISIL has encouraged
such attacks, and retrospectively claimed association with them, but there has been little indication that they
have a global network of actors that can undertake actions, or indeed a desire to have one. The outcomes of
the investigations into the apparent bombing by ISIL of the Russian Metrojet plane in Eqypt and the
22 Rukmini Calimachi, “ISIS and the Lonely Young American” in the New York Times, June 27, 2015
http://www.nytimes.com/2015/06/28/world/americas/isis-online-recruiting-american.html 23
Bilal Y. Saab, “Can the House of Saud Survive ISIS?” in Foreign Affairs, June 11, 2015 https://www.foreignaffairs.com/articles/2015-06-11/can-house-saud-survive-isis
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 9 OF 33
coordinated attacks in Paris may provide evidence that ISIL’s ability to project force and utilize their networks
globally has improved. Whether they were coordinated and generated by ISIL leadership from within the
caliphate or not, the inspiration that ISIL generates for jihadist ‘self-starters’ is still significant.24
Virtual Leaders and Organizations
36. The trend of virtual leaders is inherently linked with the trend of networked systems and actors. In recent
decades, many irregular groups have operated with leadership groups providing their guidance and
coordinating resources virtually, and with their organizations operating in a dispersed manner. One of ISIL’s
key strengths has been the control of physical space and the concentration of its operators and leadership
within the caliphate. As such, the ability to lead and coordinate a virtual network is less important to achieving
their aims. As mentioned above, there are signs that ISIL has a network of sleeper cells throughout the region
that could grow in the future. It is also likely that ISIL could band together self-starter cells in other countries to
quickly form a virtual organization. If in the future ISIL changes its approach and seeks to fund, support and
control other groups virtually, the risk that it poses will increase dramatically.
37. As pressure continues to grow on ISIL within its physical caliphate, it is likely that the importance of virtual
leadership will grow. Already ISIL provides guidance and leadership to its supporters, encouraging them to
inflict violence within their home territories without specific direction from central leadership. To a limited
extent this has been a successful low cost, low payoff approach for ISIL. But if it becomes apparent that ISIL
leadership did have a direct operational link to the recent Paris attacks, it will mark their transition to an
approach more closely associated with Al Qaeda.
38. One key issue that arose during the earlier EIT analysis was the idea that a group could provide virtual
governance or judicial rulings. While ISIL has sought to spread its message and has made new or amended
religious decrees, they have not yet sought to directly influence religious interpretation outside of the areas
they control. The EIT report envisioned a future where virtual or geographically displaced authority figures
would make decisions and pass judgement in local affairs virtually. If ISIL’s influence and credibility grows,
and if communities seek to apply the ideology outside of the areas under their control, then ISIL would be well
positioned to makes this possibility a reality. In effect, they could administer control remotely over citizens in
different countries.
Distributed Enemy Capability Development
39. The ability of sub-state groups to rapidly develop, prototype, test and field new capabilities and technologies
was seen as a critical capability and future threat during the previous analysis. Evidence of sub-state militaries
and transnational criminals building crude submarines, patrol ships, armed aircraft and armored vehicles was
seen as just the beginning of a trend of irregular groups closing the technology gap with more advanced
military forces. As discussed above, despite ISIL attaining advanced, high tech military hardware from raided
Iraqi and Syrian bases, very little of it has been deployed in battle. Even less has been deployed in new or
innovative ways, other than using substituting armored vehicles for ordinary ones in VBIED attacks.
24 Mark Hosenball and Mark Trevelyan “Coordinated Or Not, Attacks Show Islamic State’s Growing Reach” Reuters, Jun 26, 2015 http://www.reuters.com/article/2015/06/26/us-security-attacks-idUSKBN0P62F420150626?feedType=RSS&feedName=topNews&utm_source=twitter
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 10 OF 33
40. It is unclear whether this lack of capability development or technological innovation is because they are
unable to achieve it, or because they do not see a need for it. With the facilities and infrastructure that are
under their control, it is likely that if necessary, ISIL could achieve a significant degree of capability
development. The up-armoring of mining trucks25
as giant VBIEDs would suggest that they have the technical
capability within their organization to undertake substantial mechanical improvements. If ISIL’s control of key
logistics corridors comes under greater pressure or they continue to lose terrain to western supplied rebels,
they may have to. As yet, however, this trend has not been seen to any significant degree and has not made
ISIL significantly more dangerous.
Universal Technology Platforms
41. This trend is another that is evident with ISIL, but has not posed the degree of risk envisioned from the EIT
forecasts. The EIT prediction was that sub-state groups would use cheap crypto equipment for secure
communications, and the same communications infrastructure (internet services, GPS, cellular networks) as
U.S. forces reducing the chance that they would be disrupted. Known as ‘technology hugging’, the U.S. would
not target or disrupt systems that are critical to itself and to civilians, and therefore the irregular group would
be able to use them with little risk of having it destroyed.
42. ISIL has certainly done this, using cell networks to communicate, social media services to broadcast their
message and no doubt GPS for unit coordination. However, the U.S. and its allies do not appear to have
considered degrading those capabilities in its approach thus far and it does not create a significantly greater
capability than what any other irregular group would have access to. Moreover, it has not provided a military
edge or mitigation strategy that has impeded western action. In reality, ‘technology hugging’ poses the
greatest problem to military planning amongst large friendly or civilian populations in dense urban
environments, particularly where an enemy is hiding amongst that population. In the unlikely scenario that the
U.S. would commit large numbers of ground forces and engage ISIL in direct conflict, it would likely be in
areas where such services are already disrupted or degraded, and would not cause significantly greater
suffering to the populations affected by it.
Lower Barriers to Entry
43. As with ‘distributed enemy capability development’ above, ISIL has yet to demonstrate a significant uptake in
many commercially available technologies. This finding considered the possibility of non-state actors
acquiring a more lethal set of capabilities largely as a result of technical innovation, access and diffusion.
Cyber was an area of particular concern. Whereas hackers claiming to be from a number of Syrian factions
have struck out using cyber-attacks, the cyber threat from ISIL has remained largely hypothetical. This is
despite their ubiquitous use of other online tools, such as social media and messaging services. As with the
earlier discussion, the lack of uptake in this area could in large part be accounted for by the lack of need –
ISIL has advanced military equipment and is not currently fighting an enemy with a significant technological
edge over them.
44. There are certainly areas where ISIL has used commonly available technology to achieve more sophisticated
results. The ubiquity of smart phones, with their cameras and social media connections, have been vital in
25 Tyler Rogoway, “ISIS Used This Huge Crudely Modified Truck To Attack A Key Syrian Air Base”, Foxtrot Alpha, Aug 24, 2015,
http://foxtrotalpha.jalopnik.com/isis-used-this-huge-crudely-modified-truck-to-attack-a-1726246835
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 11 OF 33
ISIL’s messaging and branding. Likewise, the use of high quality consumer video cameras have been an
important element of producing sophisticated videos – elaborate and gory executions are captured with a
multitude of the latest Go-Pro cameras. Commercially available drones have been used for filming, with some
reports of them also being used for battle field reconnaissance. Access to GPS and cell phones would assist
in the coordination of military attacks, but no more than any other irregular group, or civilian camping group.
45. ISIL has used commercially encrypted messaging services as a secure means of communication. ‘Whatsapp’
appears to be widely for both internal and external communication. More recently ‘Telegram’ has emerged as
a particularly useful communication tool for secure messaging. These services definitely count as having a
low barrier of entry, as they are widely available on any smart phone and are used by all segments of society.
It also appears that ISIL’s ability to use these tools is limited to its untampered with commercial form, with little
indication that they modify these tools further. If and when the U.S. and other gain the ability to compromise
these means, ISIL will simply discard that approach and move on to another that performs the same function.
46. One area where technological advances has directly benefited ISIL is in the finance sector. The ability to
communicate and move money anonymously over the internet, and to bypass banking restrictions and
financial sanctions, has enabled ISIL to generate funds from foreign donations. As we assess ISIL’s financing
capabilities to be a key COG, this is an area of significant concern.
Robotics and Increasingly Autonomous Technologies
47. The age of commercial and consumer robotics is at a break out point. There are a multitude of personal
drones available to consumers, mostly orientated towards filming people undertaking leisure activities.
Commercial applications are expanding, from inspecting crops and wild fires to delivering medicines. The idea
of drone delivered pizza or Amazon packages no longer seems fanciful. Yet, the use of drones and robotic
systems by ISIL seems limited. There has been instances of drone use by ISIL, but there is little unclassified
reporting on it. What use has been made appears to be less than other irregular groups (Hezbollah in
particular), who have used robotic and semi-autonomous systems for a range of military applications from
reconnaissance to spoofing opponent radars and testing response times. As yet, ISIL does not appear to
have used robotic systems for anything other than producing propaganda videos and some localized
reconnaissance. This could be an area of significant risk if they broaden their application of the technology.
PART 2: UNDERSTANDING ISIL’S CAPABILITIES
48. Examining ISIL’s individual capabilities in isolation do not give a robust understanding of their competitive
advantages and the likely lessons that other groups will take away from their success. To better understand
the nature of capabilities, we developed a COG construct. Understanding an adversary’s COG is a key
analytical tool for military planners to understand how best to combat and defeat them. COG constructs
enable analysts to determine what capabilities and characteristics enable a non-state actor to maintain
capabilities to wage hybrid warfare. Often, non-state actors may have a state sponsor to provide funding,
training, personnel and weapons, or an active diaspora outside of the theater. Directing action against these
COGs in the military and non-military domain will not only shorten the timeframe and reduce the effort in
combating these groups, but will also make it far more difficult for similar successor groups to replace them.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 12 OF 33
49. COG constructs consist of a series of deconstructions to identify the elements that constitute a particular
strength and the inherent vulnerabilities that, if disrupted, could undermine that strength. They are broken
down as follows:
50. COG constructs are primarily used to identify potential defeat mechanisms. However, that is not the primary
purpose of this analysis. This analysis has been develop in order to assist in the understanding how the
disparate and multifaceted capabilities ISIL employs combine to generate effects. By dissecting the key
aspects of their success, we can better understand what elements are unique to ISIL’s circumstances and
what may be transferrable or repeatable by other irregular groups in the future.
51. It is worth noting that there have been numerous other analyses which have used a similar approach,
including in support of the same SMA effort. This analysis was undertaken independent of any other and for
the sole purpose of use in this analysis. In some cases the results will differ, as a COG construct is a
subjective analysis influenced by a range of different factors, including methodology, experiences of the
analysts and available information. In other cases, there will be strong correlations. Both outcomes positively
contribute to the collective understanding and of ISIL.
Centre of Gravity Analysis
52. There are numerous interpretations of what a COG is and how the framework should be utilized. The U.S.
doctrinal definition is “The source of power that provides moral or physical strength, freedom of action, or will
to act.”26
Some interpretations focus on the ‘strength’ aspect and argue that an enemy’s COG should be its
greatest strength. In this analysis, we have interpreted it in a more holistic sense, as a great strength that
would generate the will to fight, and without which the very existence of the opponent as a threat would be
undermined.
53. This analysis identified three ISIL COGs: the establishment of a credible caliphate, their integrated and
independent financial resources and the leveraging of identity politics and engagement of the disenfranchised.
Each of these three elements represents a key foundation of ISIL as we currently understand it. If any one of
these three were significantly impacted to the extent that ISIL needed to change its approach or seek a
different way of achieving its objectives, it would significantly alter the very nature of the organization.
54. One high profile omission from the COG list is media capabilities. Many analysts have assessed this to be a
COG, and sought to identify way to undermine this strength by identifying its inherent critical capabilities,
26 U.S. Department of Defense, Department of Defense Dictionary of Military and Associated Terms; Joint Publication 1-02.
November 8, 2010, http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf
Critical Capabilities
Critical Requirements
Critical Vulnerabilities
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 13 OF 33
critical requirements and critical vulnerabilities. While this analysis does not disagree with identification of
ISIL’s media capabilities as one of its greatest strengths, this analysis has assessed that the neutralization of
it would not deal an existential blow to ISIL. ISIL’s media capabilities, both in production, broadcast and
ongoing engagement represents a new level of sophistication and efficacy. It is a key element to establishing
their credibility as well as attracting funding and new recruits. It is also used as a force multiplier in combat
and control of the general population. It will no doubt be the bench mark and inspiration for irregular groups in
the future.
55. Losing any element of this capability would represent a significant setback that could hamper ISIL across its
range of operations and its ability to achieve its objectives. In fact, it is a capability that underpins all three of
the COGs identified here and represent critical capabilities for each. But this analysis does not assess that the
loss of that ISIL’s media would convince foreign fighters to go home, ISIL leadership to abandon their ideology
or the Sunni populations of Iraq and Syria to fight back against ISIL rule. A significant loss of any one of the
three COGs identified here, on the other hand, could undermine ISIL’s ability to function in its current form.
For instance, ISIL generates much of its authority and credibility from the perception that it legitimately meets
the requirements of a caliphate. If it lost the control over that territory, or was delegitimized in the eyes of its
supporters, it would need to fundamentally change its structure and operational approach. Similarly, it if lost
its financial independence and needed to turn to another state for support or an alliance, it would contradict its
own assertion of the falsehood of modern states. Lastly, losing the support of the disenfranchised populations
it seeks to exploit would impact every aspect of its operations from its attraction of new recruits to the
broadcasting of its messages around the world.
Establishment of a Credible Caliphate
56. The most critical of ISIL’s COGs is the establishment of a credible Caliphate. While the majority of the global
Islamic population and Islamic Scholars have denounced ISIL’s ideology27
, establishing a credible and
justifiable Caliphate is central to ISIL’s strategy and belief system. ISIL leadership believes that the end times
are imminent and seek to re-establish the caliphate in order to meet the requirements of the Quran’s
prophecy, thereby setting the conditions for the final battle between the armies of ‘Rome’ and Islam.28
The
belief that the end-times are imminent is both a differentiator from other groups, such as Al Qaeda, and a key
motivator for ISIL’s religious extremist core. This belief attracts fundamentalist Muslims who believe the Day of
Judgement of near, and provides an explanation and justification for ISIL’s actions. The existence of a
caliphate triggers additional obligations on all Muslims. Moreover, to proclaim oneself a caliph, and therefore
the leader of all Muslims, requires the ‘authority which stems from control over land.29
57. Meeting the legal requirements of a Caliph is therefore assessed as the first critical capability in this COG
construct. ISIL achieves this because, in contrast to previous ISIL leaders, Al Baghdadi is of the Quraysh tribe
and appropriately educated in religious matters. ISIL have also established Shura and Sharia councils and a
27 Michelle Leung & Ellie Sandmeyer, “Muslim Leaders Have Roundly Denounced Islamic State, But Conservative Media Won't
Tell You That” In Media Matters For America, August 21, 2014, http://mediamatters.org/research/2014/08/21/muslim-leaders-have-roundly-denounced-islamic-s/200498 28
William McCants, The Believer, The Brookings Institution, September 1, 2015, http://www.brookings.edu/research/essays/2015/thebeliever?utm_content=buffer40489&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer#.VeWnvrpP3iA.email 29
Graeme Wood, “What ISIS Really Wants” in The Atlantic, March 2015, http://www.theatlantic.com/magazine/archive/2015/03/what-isis-really-wants/384980/
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 14 OF 33
hierarchy of senior leaders to further solidify their fulfilment of the requirements. In fact, ISIL has established
an entire framework of leaders and governors to govern the area under their control.
58. By declaring a caliphate, with Al Baghdadi as the caliph, ISIL claims authority over all Muslims worldwide and
triggers a number of religious obligations that would otherwise remain dormant. While those who reject ISIL
and their self-proclamations of authority will similarly be unmoved by these obligations (on the ground that
ISIL’s self-proclaimed caliphate is illegitimate), there is still a significant Muslim population on the fringes of
the mainstream who do not naturally fall into the extremist camp, but may be persuaded by a ISIL’s
propaganda that they have true religious legitimacy. In this context, Al-Baghdadi’s religious credentials,
ancestry and tribal associations are of critical importance. Other groups have sought to claim the
establishment of caliphate before, but have not appropriately met the necessary requirements.
59. An equally important critical capability, closely linked with the first, is the control of physical space and a
significant population. Not only is it a key element in establishing the credibility of the caliphate and meeting
religious legal requirements for Baghdadi as a Caliph, but it is key to their propaganda narrative and appeal to
Sunni’s seeking a path back to political empowerment and inclusion. It differentiates them from other jihadi
groups and gives legitimacy to their claims.
60. ISIL is certainly not the first terrorist group to seek to control land. In fact it represents a more traditional
strategy for irregular groups. But it is a significant departure from the ideology and strategic approach of Al
Qaeda, the movement that ISIL grew out of. The decentralized and dispersed approach Al Qaeda took was
specifically intended to avoid the vulnerabilities and burdens that control over land imposed on a group and
reduce the risks from the sophisticated long range strike capabilities of the West. While it is yet to be seen
whether ISIL will be able to sustain the burden of governing such a large population and area in the long term,
the success of the strategy to date will likely influence other irregular groups as they develop their own
strategy.
61. In order to control both the physical space and approximately four million people resident in it, ISIL requires a
large military force. The vast distances, dispersed populations and tactics favoured by ISIL requires significant
mobility which they achieve through a large light infantry force, usually mounted in pick-ups and captured Iraqi
Army Humvees. Estimates of the size of ISIL’s military force range from 15,000 to 30,000 at various times.
This makes it larger than many other irregular groups, and their sophisticated planning and logistics set them
apart from many others which allows them to operate further from their bases. Their ability to control key
corridors and lines of communications are also critical.
62. The support of the local Sunni population is both a consequence of ISIL’s effective control as well as a key
contributor to it. The control of the population is aided through the use of their armed forces as a police force
with appointed religious police to enforce ISIL’s laws and edicts. Use of sleeper cells has been pivotal in
several battles, whereby ISIL supporters and fighters have infiltrated population centers and taken control with
little fighting, allowing their main forces to advance into the territory with minimal resistance. ISIL also
operates a sophisticated intelligence network and can identify and eliminate opposition through their informant
network and secret police.
63. ISIL has demonstrated a range of capabilities that aid both their offensive and defensive operations. Their use
of heavy weapons seized from the Iraqi Army was important in their early operations, though more recently
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 15 OF 33
they have shown a preference for using armored vehicle borne IEDs and tunnelling to degrade defensive hard
points during the assault. Their use of vehicle borne IEDs is a new iteration of established techniques,
employing multiple synchronized and simultaneous VBIED attacks and the armoring of large vehicles
(including mining trucks) in order to carry large quantities of explosives that will survive defensive fire during
its approach. These vehicles are not dissimilar in design to the ‘home made’ armored vehicles developed by
Mexican drug cartels and other Middle Eastern militant groups. The scale and sophistication of the vehicles
ISIL has built are on par with the other groups, demonstrating that they have the technical capacity for make-
shift capability development.
64. Heavy weapons ISIL have in possession and have employed in battle includes tanks (T-55, T-62 and T-72),
protected infantry vehicles (BMPs and MRAPs), Grad Multiple Rocket Launchers and various calibers of
artillery (up to 155 mm). In order to defend key territory they have taken ISIL have also demonstrated the use
of mines, booby traps/ IEDs, employment of snipers and reportedly chemical weapons.30
65. After taking control of an area, ISIL has been quick to establish their own rule of law. Many Islamic irregular
groups impose a form of sharia law on populations they control, but here again ISIL has elevated it to a new
level. As stated above, Al Baghdadi is a knowledgeable Islamic scholar and played a central role in ensuring
the coherence and legitimacy of ISIL’s religious views before becoming its leader31
. ISIL has swept away
centuries of Islamic jurisprudence and has actively worked to promulgate and enforce their own
interpretations and decrees. While the vast majority of the global Islamic populations and academics reject
these interpretations, ISIL has invested time and effort into ensuring that, to their target audience at least,
their religious interpretations appear legitimate.
66. ISIL has rapidly established their own religious courts and used religious police forces within their territory to
enforce their rule of law, brutally punishing any transgressions. This approach has a number of effects. Most
obviously the brutal imposition of their own laws has a psychological impact on the controlled population,
creating fear of ISIL retribution and discouraging any dissent or disobedience. It further reinforces their
reputation and perception as a conquering force. More broadly, in the ungoverned spaces that ISIL has
expanded into it creates an effective authority and provides clear and enforceable rules where few may have
previously existed. While brutal, this authority creates stability and predictability and ensures the population
somewhere to take their grievances.
67. ISIL’s societal control goes beyond rules and laws. From the outset ISIL leaders developed detailed and
sophisticated plans to infiltrate, map and spy on target populations and communities. They identified persons
and institutions that could create resistance so that they could be quickly eliminated. Detailed files were
developed on key community leaders and prominent families to understand their allegiances and political
sympathies, wealth and any indiscretions that could be used to black mail them.32
Once ISIL gained control in
an area, personnel of utility to the group were co-opted and forced to take sharia courses before being put
30 Raja Abdulrahim, “Islamic State Accused of New Chemical Weapons Attack in Syria” in The Wall Street Journal, Aug. 23, 2015
http://www.wsj.com/articles/islamic-state-accused-of-using-chemical-weapons-in-syria-1440353562 31
William Mcants, The Believer, A Brookings Essay, September 1, 2015, http://www.brookings.edu/research/essays/2015/thebeliever?utm_content=buffer40489&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer#.VeWnvrpP3iA.email 32
Christoph Reuter, “The Terror Strategist: Secret Files Reveal the Structure of Islamic State” in Spiegel Online, April 18, 2015 http://www.spiegel.de/international/world/islamic-state-files-show-structure-of-islamist-terror-group-a-1029274.html
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 16 OF 33
back to work to ensure delivery of key services. Secular education was eliminated and replaced by ISIL’s own
schools, as ISIL sought to bring the local youth under their influence.
68. ISIL’s surveillance and intelligence web has been a key tool for population control. From the outset, no
individual or group has been entirely sure whether they are under surveillance and by whom. Highly detailed
profiles and record keeping has been used to target individuals and groups either for elimination or co-option.
It has also been a key tool for the spreading of anxiety and fear, and has effectively dismantled any node of
potential resistance to the group in areas it controls. While this approach is not new – it actually follows a
similar methodology to Soviet security apparatus - it may in fact be the most effective application of such
techniques by an irregular group.
69. The sophisticated communication capabilities of ISIL have been central to any discussion of the group’s
success, and with good reason. While it follows the tradition of many other Islamic irregular militant groups of
using online graphic videos, recorded sermons and regular glossy magazines to spread its message, the
sophistication and reach of ISIL’s communications efforts is at least a generation ahead of any other group.
This is a critical capability for establishing the credibility of its caliphate as it broadcasts their military
successes, religious justifications for their actions and show flattering perspectives of life under their control.
In short, it allows them to control their own narrative and drive the discussion, at least to their target audience.
70. The requirements that underpin this capability are substantial. They require the development and production
of multilingual official propaganda across mediums, including written, video, online and through social media.
To achieve this, they require religious experts and writers capable of effectively framing their arguments and
writing convincing articles. They also need technically skilled personnel such as spokesmen, editors, graphic
designer, photographers and videographers along with many others who are capable of producing material on
par with a mid-level media company. Finally, they need a large and motivated group of dispersed supporters
to engage their target audience through social media platforms.
71. The ability to frame their position, control narrative and communicate their values to a global audience is
critical in an age of information dominance. It was been a key element in enabling them to generate financial
support (both from donors and exploiting kidnapped foreign nationals) and recruit significant numbers of
fighters. Most importantly, however, it creates a perception of a sophisticated and professional organization
that gives credibility and legitimacy to their cause.
72. An additional way that ISIL reinforces the credibility of their caliphate as a quasi-state is to adopt many of the
trappings and prerogatives of one. They have mimicked legitimate states by dividing areas into provinces
(Wilayas), established ministries and appointed governors and other official sounding appointments across a
range of administrative functions including those relating to trade, law and security. They issue precious metal
coins as currency and impose ISIL issued ID cards and official documents on their controlled populations.
Their control and provision of public services, including education, water and rubbish collection all reinforce
the image of a functioning governing body – at least in comparison to the lack of services provided by the
respective recognized central governments. They use clearly identifiable symbols and icons that has the
additional benefit of reinforcing their brand image. These include appropriating the Islamic ‘Black Banner’ and
other symbols associated with Muhammed to imply that they are a true successor of Islamic heritage. While
ISIL does not appear to have used them widely, by clothing soldiers in their propaganda videos in tailored
military uniforms, along with prisoners in orange jump suits, reinforces the perception of a modern state. While
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 17 OF 33
this capability does not provide a tangible military effect, it is a critical element in the branding and messaging
of ISIL and in reinforcing the perception of the caliphate as a legitimate entity.
73. The final critical capability for this CoG is ISIL’s regulation of economic activity within its territory. This
capability provides a dual benefit as it increases their societal control while ensuring generation of funds.
There are a number of key requirements necessary for ISIL to achieve this economic control. Their control
over the population allows them to set and enforce standards, quality controls and rules for trading. As an
ancillary, this provides another control mechanism for ISIL to impose religious constraints on the population.
Moreover, by establishing and maintaining stable (if exploitative) monetary policies and controlling the
distribution of certain products, ISIL provides the average person with the structure they need to effectively
function in their day-to-day lives. As has been seen in Afghanistan with the Taliban, for many in impoverished
rural areas the imposition of a stricter set of laws can be an acceptable trade-off to stability and clear
economic rules.
74. ISIL generates funds from economic activity in a wide variety of ways, from extortion to the paying of religious
fines. But the taxing of trade and the salaries of government workers pay is significant. Most importantly, and
the factor differentiates ISIL from many other groups, is the technical and administrative skills it has to run the
bureaucracy and bookkeeping necessary to effectively tax the population. Further, it can set production goals,
distribute commodities and services, regulate trade (including cross border) and apply resources to provide
public services. ISIL’s efficiency and direct management of trade is epitomized by their establishment of
separate lanes for trucks transporting different commodities (agricultural, electronic etc).33
Integrated, Independent Financial Resources
75. The second CoG this analysis identified was ISIL’s integrated and independent financial resources. ISIL’s
funding levels has been notable since before it declared its caliphate. As soon as it began to emerge in its
latest iteration ISIL has been referred to as the richest terrorist group in the world.34
ISIL is distinctive in that it
has been able to independently raise funding on par with state-backed groups. There are plenty of ways that
irregular and sub-state groups can generate funding, but their levels of funding are usually limited unless they
are deeply involved in criminal activities (such as narcotics production and smuggling) or have state
sponsorship. The independent nature of ISIL’s financing means that they are not influenced or constrained by
the political agenda of another state, and therefore unconstrained by the need to conform to international
norms.
76. What is also strikingly significant about ISIL funding model is its diversity. It generates income from the usual
sources such as foreign donations, extortion of the population under its control and the kidnapping and
ransom of foreign nationals. But it also exploits natural resources and cultural artefacts. Individually, none of
these revenue generating activities is new or unique, but the scale, sophistication and diversity will provide
key lessons to future groups. For these reasons, among others, limiting ISIL’s funding streams has been very
difficult. Finally, as with their media activities, the technical skill and sophistication of those managing the
groups finances is remarkable.
33 Mitchell Prothero, “Islamic State issues fake tax receipts to keep trade flowing” for McClatchy D.C., September 3, 2014
http://www.mcclatchydc.com/news/nation-world/world/middle-east/article24772591.html 34
Amanda Macias and Jeremy Bender, “Here's How The World's Richest Terrorist Group Makes Millions Every Day”, in Business Insider, Aug 27, 2014 http://www.businessinsider.com/isis-worlds-richest-terrorist-group-2014-8
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 18 OF 33
77. This strategy has long been ingrained in the group and was a key feature in many of the group’s early tactics
and approaches. Even before Al Baghdadi took over ISIL and it launched its current expansion, ISIL had in
place a sophisticated corporate-style bureaucracy that was able to accurately track expenditures and
determine fighters compensation based on factors such as family size.35
The independent and diversified
nature of ISIL’s funding are critical to their resiliency and long term sustainability, and uniquely possible
because of their level of bureaucratic competence.
78. The criticality of generating funds is obvious. Money buys weapons and capabilities for a group to achieve its
objectives. Targeting a terrorist or insurgent group’s funding is a critical approach in defeating it. In the case of
ISIL however, this key strength may also provide an even more of a critical vulnerability. ISIL’s greatest
financial commitment is paying its soldiers, and while many are motivated by religion, it is unlikely that they
would be able to hold together as motivated and effective a fighting force if they were unable to pay salaries.
ISIL also offers and distributes non-monetary incentives to its fighters, but the inability to cover salaries would
likely cause a rapid degradation in their combat ability and limit its attractiveness to new recruits. Furthermore,
ISIL is reportedly already struggling to provide essential services in some areas, and constriction of funding
would amplify the challenge. This would degrade the perception of ISIL as a legitimate state and alternative to
national governments, and risk undermining support from local communities. In short, dislocating this CoG
would have a significant impact on the first CoG as well.
79. ISIL’s greatest revenue generation comes from the seizure of oil wells and refineries in Northern Syria and
Western Iraq. This has allowed them to generate approximately 44,000 barrels per day in Syria and 4,000 per
day in Iraq, for an estimated daily income of $1-3 million (selling at below market rates).36
It is not unusual for
irregular groups to target natural commodities as a source of income. From illegal logging in South East Asia
and South America to diamond and other mines in Africa, they are often a key source of revenue. The scope
of ISIL’s seizure of oil production facilities is nonetheless remarkable. ISIL has generated profit from selling
the crude and refined oil it has seized at refineries and oil pipelines, and to a lesser degree, continued to
pump and refine itself. The former approach netted large financial gains during ISIL’s expansion, but offered a
finite opportunity. The latter offers ongoing revenue generation but is limited by kinetic degradation of facilities
by coalition bombing and the limited availability of technically trained personnel to maintain operations. In
most cases, former oil field employees appear to have been coerced into assisting ISIL at oil worksites, with
little evidence of ISIL attracting outside expertise.37
Much of the ongoing refining appears to have been
undertaken by smaller, make-shift and mobile refining operations which also limits the overall output. Some of
the refined products must also be used for vehicles and power generation within the caliphate, further
reducing the stocks available for sale in the future.
80. Oil is not the only commodity or industrial base that ISIL has sought to leverage, though it is its most profitable
one. Other mineral resources and natural commodities has also been targeted and exploited, but it is
agriculture that is arguably ISIL’s second most strategically important industry. Continued production of
35 Hannah Allam, “Records show how Iraqi extremists withstood U.S. anti-terror efforts” for McClatchy D.C., June 23, 2014,
http://www.mcclatchydc.com/news/nation-world/world/middle-east/article24769573.html 36
Louise Shelley, “Blood Money: How ISIS Makes Bank” in Foreign Affairs, November 30, 2014, https://www.foreignaffairs.com/articles/iraq/2014-11-30/blood-money 37
United Nations Security Council, Letter Dated 13 November 2014 from the Chair of the Security Council Committee pursuant to resolutions 1267 (1999) and 1989 (2011) concerning AL-Qaida and associated individuals and entities addressed to the President of the Security Council, S/2014/815, November 14, 2014
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 19 OF 33
agricultural products is key for the ongoing health and sustainability of the caliphate’s economy and for
feeding both their soldiers and the general population. Evidence indicates ISIL calculated the importance of
this industry from the start of their expansion and targeted key equipment and facilities from the outset to
ensure it was effectively leveraged to their ends.38
81. There are a number of other key capabilities that underpin ISIL’s ability to leverage domestic local industry. In
order to monetize the outputs, ISIL needs a network or transportation modes and traders to move the goods
and sell them at market. ISIL’s control of key routes is clear from any map of the area under their control, and
has been elaborated on in other studies as part of the SMA effort. While the threat of airstrikes poses a risk to
the transportation of those goods, it is unlikely that coalition ordinance would be expended on such low value
targets. Despite control of many key border crossings (recent losses to the Kurdish forces along the
Turkish/Syria border notwithstanding) ISIL has demonstrated an ability and willingness to utilize smuggling
routes and black markets for trading. This also requires the existence of buyers in foreign and potentially
hostile territories willing to purchase their commodities, and in some cases the acquiescence of neighboring
countries to ignore that trading.
82. While commodities are ISIL’s greatest source of revenue, they also generate significant revenue from the
taxation and extortion of the local population. This taxation takes many forms, including taking a percentage of
the salaries paid by the respective central governments to civil servants, forced taxation of Christians and
other minority groups in order avoid conversion to Islam, protection money from local businesses and
institutions and taxing of trade within their territory. Even prior to its capture, ISIL was generating up to $12
million a month from Mosul alone. This is further enhanced by sophisticated taxation systems that taxes trade
in and around the their region of control, even going so far as to issue fake tax receipts to maintain trade
flows.39
83. A well-documented, and often mourned, source of ISIL revenue has been the monetization of heritage and
cultural assets. Plundering of heritage sites has long been a feature of war. Islamic militant groups such as
the Taliban have previously destroyed significant cultural and heritage sites in the past on religious grounds.
But no group in recent history has successfully monetized that destruction to the extent that ISIL has. ISIL has
managed to set up international smuggling networks and black markets to move plundered antiquities out of
their area of control and to sell to collectors and museums for tens of millions of dollars. The trade is so
lucrative that ISIL set up a ‘Ministry of Antiquities’ to better profit from it.40
84. Donations from foreign backers is a common avenue for terror group funding and ISIL is no exception.
Though to date this has been one of the least significant revenue streams for the group, as oil production is
degraded by air strikes and they lose their supply of ransom victims, it may become an increasingly important
way to close funding gaps. This capability relies on complicit legal and illicit financial systems, interlocutors to
smuggle in physical cash and a willing group of foreign donors with sufficient means to donate. It is likely the
rise of crypto currencies and other innovative currency exchange technologies are also of great utility to the
group.
38 Christopher Reuter, op cit
39 Charles Lister, “Cutting off ISIS' Cash Flow” For Brookings, October 24, 2015
http://www.brookings.edu/blogs/markaz/posts/2014/10/24-lister-cutting-off-isis-jabhat-al-nusra-cash-flow 40
Louisa Loveluck, “Islamic State sets up 'ministry of antiquities' to reap the profits of pillaging” in The Telegraph, May 30, 2015, http://www.telegraph.co.uk/news/worldnews/islamic-state/11640670/Islamic-State-sets-up-ministry-of-antiquities-to-reap-the-profits-of-pillaging.html
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 20 OF 33
85. ISIL’s financial success has not just stemmed from revenue generation. Their seizure of assets in the territory
they take control of also reduces the degree of expenditure necessary to achieve their goals. In some cases,
the violent seizure of assets is a revenue generation activity in itself, such as gold and currency from banks
(believed to be more than $500B from Mosul’s banks alone). In addition, they have seized stockpiles of
commodities, such as refined petroleum products as well as the production infrastructure necessary to
continue to produce them. None of this is new, innovative or different from various irregular groups throughout
history. The significance, once again, stems from the early identification and deliberate targeting of banks,
factories and other sites as key for the future success of the group.
86. On a more specific level, ISIL had mapped out where wealth and assets were located on a family basis so
that they could target wealthy families and institutions for exploitation. Beyond currency and valuable items,
property and luxury goods have been seized and used as rewards and bonuses to foreign fighters. This is
turn also acts as a recruiting tool to attract more fighters to their caliphate.
87. The violent seizure of potential valuable assets is not limited to money. ISIL is estimated to have raised
around $20 million last year from the capture and ransom of European and other foreigners. While some of
those captured have been publicly and brutally executed for publicity purposes, ISIL has shown that its desire
to create outrage is balanced with a pragmatic desire to generate revenue. The capture and ransom of
foreigners has long been a source of revenue for groups from South American guerrillas to Somali pirates, but
ISIL has reinforced its ongoing utility.
88. Of most significance, however, has been the seizure of military arms and ammunition from the Syrian and
Iraqi government. Particularly in the Iraq where U.S. military aid supplied the Iraqi military, this has meant the
acquisition of advanced and sophisticated military equipment not available to most irregular groups. This not
only provides capability beyond what a non-state backed irregular force can hope to acquire, it also eliminates
the cost of purchasing sufficient arms and ammunition to supply their troops. The circumstances that have led
to this outcome are somewhat unique – an unstable government with large supplies of sophisticated modern,
recently provided military hardware combined with a brittle military force liable to run away from the advancing
force. But it is nonetheless a significant lesson for other groups to learn and one that has been critical in ISIL’s
success to date. Without the need to expend funds in acquiring arms and ammunition (not to mention the
potential difficulty of finding willing arms suppliers), ISIL has been able to focus their expenditure on
personnel.
89. The third aspect that underpins this CoG is ISIL’s financial management. Once again, ISIL’s technical
administrative competence has maximized the utility and value of the funds they’ve generated to achieving
their ends. From the outset, ISIL has used sophisticated accounting and bookkeeping infrastructure to pay
fighters, track revenue collection from diverse sources and expend those funds to deliver public services and
achieve key objectives.
90. The funds have been used to not only pay its fighters wages above that of other rebel groups or national
government employees, approximately $400 per month, but also to provide public services, wages of
teachers and other public officials41
, pay bribes and to assist or pay off allied or rival militant groups.
41 S.B. “Where Islamic State gets its money” in The Economist, January 4
th, 2015, http://www.economist.com/blogs/economist-
explains/2015/01/economist-explains
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 21 OF 33
91. There are a number of underlying critical requirements that are necessary for ISIL to be successful in this
beyond sufficient funds to disperse. Competent managers at every level, clear guidance and training for those
managers. Corrupt officials willing to take bribes, smugglers willing to accept the risks of transporting goods,
strong market demand for their commodities (including Syrian, Kurdish and Turkish enemies in need of their
oil supplies), and neglected border controls are all necessary for the ongoing sustainability of this approach.
Leveraging Identity Politics and Engaging the Disenfranchised
92. The third CoG this analysis has identified is ISIL’s ability to leverage identity politics and engage
disenfranchised populations to support their cause. This is a broad description of the success ISIL has had in
gaining support and notoriety, and it covers many different aspects. While those facets may not intuitively
seemed linked, it is the combination of several factors combined that has created such overwhelming
success. As such, it must be understood as a whole if it is to be effectively addressed. Some of the
confluence of factors are unique to ISIL and its environment, but others exemplify growing trends that will be
important in understanding what comes after.
93. The more is known about ISIL, the more it becomes clear that the latest incarnation of the group is being led
by highly competent planners with well-developed strategies for achievement of their goals. These were
effectively implemented, and the group’s fait accompli takeover of parts of Western Iraq were the result of
years of planning. It is impossible to say whether a stronger or more inclusive Iraqi government would have
been successful in resisting ISIL’s advance or whether ISIL would have even survived if the Syrian civil war
had not broken out. But it can be confidently said that the vacuum of effective and inclusive governance in the
areas that ISIL now controls was a key factor in the speed and success of ISIL’s early expansion. ISIL is
highly effective at identifying potential or extant societal gaps, and then exploiting them for their own gain. The
current generation of ISIL leaders are in many ways a product of the turbulence that has been a feature of the
Middle East since the 2003 fall of the Saddam Hussein government. Its ideology thrives in that environment,
and it will continue to take advantage of further ungoverned spaces that arise.
94. In some ways, this has been reinforced by the fact that ISIL is not the primary concern of any one key national
actor. While ISIL appears to have actively antagonized and attacked every neighboring country, they have
managed to be only the second largest concern each of them. The complex multi-polarity of the region means
every national and sub-national entity has at least one other threat that they consider to be of greater concern
that ISIL. This has meant that despite the bombing campaign against them, they are not always the key
targets (e.g. U.S. targeting of Jabhat Al Nusra in early sorties, Turkey targeting PKK positions) and the
campaign has lacked unity of effort and maintenance of a central aim. Whether by deliberate plan or not, ISIL
has managed to remain slightly lower on the risk threshold of every major opponent, which has allowed them
some degree of freedom of action and alleviated pressure from their forces.
95. ISIL has been able to amplify their reach and influence through inspiring allegiance from, allying with or
coercing other militant groups throughout the region. Amongst the many affiliated, allied and supported
groups outside of the contiguous caliphate, the exploitation of ungoverned spaces has also been a critical
feature. Many of these areas, including Nigeria, Libya, Afghanistan and Yemen, have also recently, or are still
experiencing, some form of recent conflict or exist in areas long neglected by central governments. In some of
these cases, well established groups who are the primary instigator in the conflict have aligned with ISIL (such
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 22 OF 33
as Boko Harem), while in others ISIL has sought to ally with or co-opt groups and individuals in existing multi-
polar conflicts (such as in Afghanistan and Yemen).
96. It would be dangerous, however, to assume that ISIL and its affiliates are simply opportunists that only target
areas of existing chaos. It is clear that ISIL identified the withdrawal of U.S. forces from Iraq as the best
opportunity for them to remerge as an openly insurgent force and developed a specific strategy to create the
instability that would provide them with favourable conditions.42
This proved to be a highly effective strategy
against a central government already struggling to provide effective governance and facing difficult sectarian
tensions. It is not yet clear whether ISIL has the capacity to replicate this approach against a stronger, more
capable political entity, though there are indications they may be seeking to do so in some Gulf countries. If
they are able to replicate this approach against stronger political entities, it will represent a dangerous new
evolution of their capabilities. Until then, it must be assumed that any weak central government with a
population sympathetic to jihadist goals is a possible target to similar outbreaks of instability.
97. The partnering with other militant groups is a key aspect of the ISIL story. Within ISIL’s main areas of
operation in Iraq and Syria, the absorption of other militant groups has been an important source of fighters
and increased territorial control. The perception of ISIL’s success to date is a key motivator for many of the
groups, and a result not only of their military competence but also their media and public relations capabilities.
98. There are a wide range of motivations for other militants to align with ISIL and not all groups align out of
shared ideology. Many local militant groups have either been coerced into fighting with ISIL, or are doing so
for pragmatic reasons or political expediency. But the combination of projected values, self-definition and on
the ground success has successfully drawn other groups to their cause. The fact that multiple, independent
groups have sought to align themselves with ISIL indicates that their publicly stated aims resonate with a
large portion of local fighters and the broader jihadi community. Moreover, ISIL has the organizational
structure, flexibility and competence to effectively manage the various relationships.
99. It is unclear the degree of support and coordination ISIL provides to the groups from other regions who have
sworn allegiance. The degree of training, funding and advisors supplied to each would depend on the context.
In Nigeria, Boko Harem are an established group that operate independently. In Afghanistan, it is likely that
ISIL is providing more direct support, in part to gain access to the drugs trade. In the Sinai Peninsula and
Libya, the answer is probably somewhere in between: absorbing existing groups but likely providing advisors
and potentially material support. As has been a prominent aspect of ISIL’s success in the other CoGs, their
bureaucratic competence is again a critical capability. It has given them the capability to manage the various
relationships and alliances that allowed the creation of a network of affiliated jihadist groups.
100. For individuals, ISIL’s message effectively engages with target populations because it connects with both real
struggles and perceived injustices. Since ISIL and its previous incarnations have been central to the growth of
sectarian violence in Iraq over the past decade, it is unsurprising that they have also benefited heavily from it.
ISIL’s message of the threat posed by Shia militia and the oppression suffered by Sunnis has been aided by
the actions of both the Syrian and Iraqi governments, and the actions of Iran and the Shia militia’s has
reinforced it. It plays up the Sunni population’s feelings of disempowerment and persecution to engage
populations that would otherwise reject their ideology and tactics. No matter the origin of the sectarian
42 William McCants, “Inside the ISIS Blueprint for Winning”, for The Daily Beast, September 29, 2015,
http://www.thedailybeast.com/articles/2015/09/29/inside-the-isis-blueprint-for-winning.html
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 23 OF 33
tensions or the degree to which ISIL is an instigator or manipulator of them, for many Sunnis in Iraq, ISIL
currently represents the best chance of regaining political power and security in the near term.
101. Moreover, ISIL has managed to globalize regional political differences into a struggle that appeals to the
disengaged around the world. The message it broadcasts is sufficiently multifaceted that it resonates with
different demographics for different reasons. Many other ideological or religious terrorist groups have gained
supporters from around the world, but ISIL has managed to do it with such scope and fervour that they have
created a form of virtual diaspora akin to that usually associated with national identity. The power of the
diaspora, and its ability to generate funding, acquire weapons and provide political pressure, is evident in
previous irregular group case studies, from the IRA to LTTE. ISIL has somehow turned religious and
ideological supporters into a shared identity that crosses many different demographics.
102. The motivations for supporting and even joining ISIL vary widely. They include true religious believers,
adventure seekers, criminals looking for new opportunities and lonely teenagers who have been engaged by
charismatic social network users. It is beyond the scope of this analysis to delve deeply into each, but it is
important to note that ISIL has managed to develop a multifaceted narrative that is able to have great impact
with different audiences depending on their context and perspective. It has been able to offer meaning to
different types of disenfranchised people from diverse walks of life. To supporters it represents not just the
fulfilment of a religious prophecy, but a chance for redemption; an opportunity to achieve greatness; an
alternative to Western values and way of life; or just an opportunity for adventure and spoils.
103. Despite the heavy religious overtones of ISIL’s propaganda, the number of recruits motivated to join ISIL for
religious reasons may be limited. A minority of those who have sought to move to ISIL’s caliphate are well
educated, such as doctors and engineers. Young foreign fighters, many with dual-nationality and originating
from over 100 countries, make up a large portion of ISIL’s fighting force. The rest are drawn from local
populations, either through integration of local affiliates, recruiting from prisons or by drafting local villagers.
Many of those who have joined lack a deep or sophisticated understanding of Islam,43
and in some case ISIL
recruiters have actively sought to discourage potential recruits from engaging with moderate, mainstream
Muslim communities.
104. Whatever the motivating factors are to join the movement, ISIL has benefited from an interlinked and
interconnected global society where recruits and supporters have been able to travel relatively easily to their
caliphate, aided by reliable commercial transportation throughout the region and loose border controls.
Combined with powerful broadcast means in social media, a large support base of sympathisers willing to
amplify their message and sophisticated media production capabilities, ISIL has been able to globalize their
struggle more powerfully than any group before it.
105. ISIL’s brutal tactics and emphasis on violence is central to their notoriety. This has been a key aspect to their
strategy from the start and is based on significant academic discussion within the jihadist community on how it
should be employed and the benefits that can be expected from it. This approach serves a broad range of
functions from recruiting new supporters to acting as a combat multiplier by instilling perceptions of invincibility
in their opponents causing them to flee the battlefield. They achieve this effect through the creation and
broadcast of regularly produced, sophisticated videos depicting battlefield success, terror attacks and
43 United Nations Security Council, Op Cit
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 24 OF 33
execution of their enemies. The ability of their intelligence network to identify and target key opponents, and
the use of suicide bombings outside their areas of control further reinforce the perception of their capability
and reach.
106. One area of competitive advantage ISIL has over other self-proclaimed caliphates is a perception of
legitimacy. By meeting the legal requirements, as described in the first CoG above, ISIL gains a perception of
authority and legitimacy that reinforces their message. In the process, it triggers obligations on the global
Muslim population that would otherwise remain dormant. The majority of the Muslim population rejects ISIL’s
caliphate as being illegitimate, it also rejects these obligations. But for those with extremist leanings or
sympathies, or are easily persuaded by propaganda, it is a powerful recruiting tool that can influence those
who would not otherwise feel compelled to act.
Analysis of key battles
107. ISIL’s expansion and rapid rise has in large part been as a result of military success. It has won a number of
high profile battles that have routed their enemies and enabled rapid expansion to claim control of an area
roughly the size of the United Kingdom. This success has been achieved through a hybrid warfare approach
that uses both conventional and irregular tactics as the situation necessitates. As noted above, the evolution
of these tactics represents an iterative development of well-proven techniques. While they have for the most
part been effective, over the past year there have been some notable and high profile defeats. An analysis of
these battles, contained in annex D, is useful for understanding areas where technological innovation could
have assisted ISIL.
108. There are several common themes in ISIL’s notable successes, particularly in Mosul, Ramadi and Palmyra.
First, the use of human intelligence, particularly through sleeper cells within the cities, allowed identification of
key targets. A thorough understanding of the opposition they faced in those cities along with prepositioned
forces capable of seizing key terrain at the outset of fighting was also critical. The accurate identification and
rapid seizure of critical infrastructure made their advanced a fait accompli, and when combined with their
terror shock tactics, made resistance by the defensive forces appear futile.
109. The use of effective human intelligence was combined with effective communications through long range
radios and the use of numerous, coordinated VBIEDs strikes to eliminate or degrade key defensive positions
and create a psychological effect on defenders. The use of VBIEDs by ISIL is of particular interest. This has
been a ubiquitous tactic by irregular and terrorist groups against better armed opponents in the Middle East
over the past decade. Even before the invasion of Iraq, it was a tested and proven approach. ISIL’s has
developed the tactic further, however, by utilizing protected vehicles to better assure a successful strike
against the intended target, and the use of coordinated, simultaneous strikes at the outset of a battle.
110. The up-armoring of vehicles for this purpose is one of the few examples where ISIL has demonstrated a
home-grown engineering capability on par with bench mark irregular groups. The vehicles used have ranged
from seized military armored personnel carriers, to the up-armoring of mining trucks. While not particularly
innovative, the technique has been effective. In at least one case, ISIL has used an opportune weather storm
to cover its attack, providing protection against coalition air strikes and mitigating their technological and
military vulnerabilities.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 25 OF 33
111. ISIL’s vulnerability to coalition airstrikes, unsurprisingly, has been a key vulnerability. This was most evident
in the battles for Kobane and Irbil where supplies, fighting formations, artillery and vehicles were all targeted
and effectively undermined ISIL’s advantages against the defending Kurdish forces. But coordination of the
Kurdish units, allowing flanking of ISIL strong points, and a lack of capabilities for fighting in urban
environments also hampered ISIL. The sophisticated coordination of a superior force was the key factor in
ISIL’s defeat in Tikrit.
112. It would appear that ISIL’s greatest mitigation strategy to the vulnerability to coalition airstrikes is conceptual
rather than technological. They move in numbers small enough to fall below a value threshold for aerial
bombing, attack outlying positions and use weather to cover assaults. It may also be using the constrained
nature of coalition operations to draw attention to an expected battle, providing freedom of movement
elsewhere.44
In addition, ISIL has established a tunnel system under some captured cities in order to provide
protection, undetectable movement between buildings and to store supplies. While not as sophisticated as
those developed by Hezbollah in southern Lebanon, they on par with other irregular groups.45
The existence
of such tunnels further demonstrates ISIL’s engineering capacity, and ability to identify and develop mitigation
strategies to compensate against their vulnerabilities.
113. Nonetheless, there are still areas where enhanced technology or innovative ideas could enhance ISIL’s
technological capabilities and limit their inherent vulnerabilities. The threat of airstrikes and the challenges of
urban combat emphasize the need for small, agile units. ISIL would therefore be well served by increasing the
lethality of tactical their groups. In particular, providing increased indirect fire and area weapons systems
would allow them to operate more independently. While ISIL has used cheap drones for surveillance
missions, it is surprising they have not attempted to fit them with a small explosive payload to create an
improvised guided or ‘smart’ strike weapon. This would not be effective against large targets, but would be
useful for striking at specific positions and if used in large numbers could have a significant psychological
effect. Improvised or homemade GBAD weapons featured prominently in previous EIT wargames, and it is
surprising that the capability has not been further developed since that time.
114. Similarly, home-made robotic weapon carriers were forecasted to be a prominent and critical capability and
saw some development in the Libyan conflict in 2012. Considering the resources available to ISIL, and the
challenges of urban terrain they continue to fight in, it is surprising that they have not developed such a
capability for themselves. A remotely controlled ATV with a machine gun or rocket launcher mounted on it
does not seem beyond their engineering scope, and would provide small units in urban terrain a useful
capability.
115. While intelligence gathering has been a key feature in ISIL’s success to date, there are still areas where it
could be further improved. Improved signals capability for intercepting and jamming enemy communications
would have been useful capabilities in several battles, and if sophisticated enough, might even be able to
further mitigate the risk of coalition airstrikes. Longer range radios and more sophisticated radio encryption
tools would also be necessary in larger military encounters against more hardened opposition.
44 Ahmed Meiloud, “This is how IS survived a year of bombing and ground war” in Middle East Eye, June 2, 2015,
http://www.middleeasteye.net/columns/how-survived-year-bombing-and-ground-war-1619065958#sthash.whU0aspm.dpuf 45
Associated Press, “ISIS Dug Network of Tunnels Under Conquered Iraqi City of Sinjar” in NBC News, November25, 2015, http://www.nbcnews.com/storyline/isis-terror/isis-dug-network-tunnels-under-conquered-iraqi-city-sinjar-n469366
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 26 OF 33
PART 3: IMPLICATIONS FOR THE REGION AND BEYOND
116. For irregular groups wanting to replicate ISIL’s success, there are several key trends that stand out. Firstly,
ISIL’s remarkable success has been built on a foundation of bureaucratic competence and hard learned
experience. Even with access to highly sophisticated and modern military equipment, military success has
been achieved through the psychological impact of their brutal tactics and sophisticated human intelligence
networks. The effectiveness of light and mobile hybrid warfare has been reinforced, but not in a way that is
significantly different or more sophisticated than has been seen in other recent conflicts. The ability of a sub-
national group to independently fund itself to the level that ISIS has will be a key lesson for other sub-national
groups. But the way in which they have done it, including the extraction of primary resources and exploitation
of cultural artifacts for instance, will not necessarily be relevant to other groups in other regions. Moreover,
lack of state support still creates constraints and limitations that state-linked groups do not face, such as
ongoing supply of advanced technologies and the training to employ them. For the purpose of better
understanding the future threat implications of ISIL’s success to examine each aspect in the context of
regional and global follow-on effects.
Implications for the Region
117. As discussed in the first section, previous EIT forecasts assumed that the burden of responsibility that comes
with controlling territory, combined with their vulnerability to modern air strikes, would mean that virtual
organizations and leadership structure would be a necessity for any sub-national group going forward. While it
is likely that this trend will continue to be key for many groups in the future and could potentially create a
greater risk than the traditional territorial control model, ISIL has demonstrated that it is still possible, and in
some ways advantageous, to prioritize territorial control. Not all sub-national or ideological groups will gain the
same credibility and authority that ISIL has through the establishment of its ‘caliphate’, but it is safe to assume
that now that they have done so, it will be a benchmark that all future extremist jihadi groups in the region will
seek to emulate.
118. While it does not represent a new or innovative style of warfare, the success and effectiveness of ISIL’s
application of hybrid warfare tactics will reinforce the popularity of the technique. Further, the success of ISIL’s
up-armored and coordinated VBIEDs strikes will likely remain a key technique that will continue to be used
into the future. Similarly, while ISIL’s use of captured indirect fire assets were used in a conventional manner,
it’s effectiveness in some battles may convince other groups of the necessity of the capability and its utility
beyond harassing attacks, and be a motivator for future groups to seek out such capabilities in the future.
119. Despite reportedly having access to sophisticated systems, ISIL’s air defense capability has not been
particularly evident. This is likely because coalition aircraft are operating beyond their reach and because it is
concentrated around vital assets. Nonetheless, it is an important capability that other groups will continue to
seek it out. The application of air defense weapons in the region will be driven by access to the weapons than
rather than by any innovative application. That said, ISIL’s use of mitigation strategies to protect them from
coalition airstrikes, such as moving in small groups and use of bad weather as a cover, will likely be copied.
120. Intelligence has always been a critical function of warfare, but in today’s information rich environment, it is
more critical than ever. ISIL’s human intelligence capabilities will likely be studied and adopted by groups in
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 27 OF 33
the region and beyond. Whether or not other groups will have the skill and competence to employ it to the
same degree of success as ISIL will be the determining factor. Beyond intelligence gathering, ISIL’s ability to
penetrate every level of society within its caliphate’s borders sets a gold standard for future sub-national
groups. Whether that penetration is possible outside of the context that ISIL is operating is debateable. It is
unlikely, for instance, that ISIL would have the same success in Shi’a areas of Iraq. It is also unclear whether
it’s franchised or allied groups will be able to achieve the same penetration of society within their own
‘provinces’. Further, the brutality of ISIL’s reign may eventually prove too much for the local populations, and
they may find a way past the destruction and suppression of alternative societal power centers to revolt
against ISIL’s control.
121. No matter which groups adopt ISIL approaches in the future, the depth of ISIL’s social penetration will linger
in the region for a significant time. A key element of ISIL’s approach has been to integrate foreign fighters into
the local communities through marriage. Even in the unlikely case that ISIL is defeated in the near future,
many of these foreign fighters may choose to live on in the region with their new families. ISIL has also
imposed educational, judicial and cultural values on the local populations, which will have an enduring impact
on the local population’s perspectives into the future, unless replaced by strong governance by the central
authority that resonates with their aspirations and beliefs.
122. Many of the most potent regional sub-national groups are funded or supported by a major regional power.
While this approach still has significant advantages, ISIL’s ability to fund itself has demonstrated that it is
possible to remain independent. Some of the ways that ISIL has achieved this, such as selling of antiquities
and extraction of oil, are unique to the Middle East region. While it is likely that future groups in the region will
seek funding from national sponsors, it would be unsurprising if they took lessons from ISIL on how to
supplement their funding through the diverse range of resource extraction employed by ISIL.
123. As has been highlighted numerous times already, ISIL’s bureaucratic competence and coinciding ability to
apply resources to achieve their desired endstates will be a key lesson for future groups. However, the current
ISIL organization has benefited from some very specific conditions that are rare: the de-Baathification process
and the centralizing of key jihadi leaders in Iraqi jails following the fall of Saddam Hussein. It is unlikely that
identical conditions will occur outside of the region, or even within the region in the near future. Nonetheless, if
and when ISIL fractures or is defeated, those who are currently involved in that situation will continue to
benefit from the intellectual capital they have developed and it is likely that the experiences and lessons
learned by ISIL will continue to feature in any follow-on groups into the future. More broadly, the follow-on
effects of the de-Baathification process should serve as a lesson for the handling of future post-conflict
environments following regime change.
124. By far the most prominent element of ISIL’s success to date has been their ability to frame their own narrative
and broadcast that narrative through diverse channels to local and global audiences. This success has
lessons for all national and sub-national groups, but the impact of ISIL’s leveraging of identity politics and
sectarian tensions will influence the future of the region for many years to come. Even if the central
government is able to regain effective control of the areas within ISIL’s caliphate, many of the underlying
grievances will likely remain and be a key leverage point for other groups throughout the region. The only way
this will be displaced is if some other national, supra-national or sub-national group is able to build a greater
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 28 OF 33
narrative that is more appealing and holds greater resonance for the regional populations, as the Baathists did
in the 1960s.
125. ISIL has been particularly effective in the areas under its control in either absorbing or destroying rival
groups. Tribal politics and allegiances have always been critical in Iraq and the region, and in Syria ISIL has
confronted rival militias and gained their allegiance or gone to war with them. Many of the networks that ISIL
has established will likely remain if/ when ISIL is defeated. The nature and implications of those relationships
is unpredictable, but it is hard not to assume that they will continue to shape the region into the future. ISIL’s
destruction of any civic entity or potential rival authority is an underlying reason for the lack of opposition to
their rule. Whatever happens to ISIL in the future, it will take time and resources to fill that vacuum and
redevelop the civil society in those regions. Until that occurs, the area will remain vulnerable to organized and
motivated outsiders who seek to exploit that vacuum.
Implications for the Broader Jihadi Movement
126. Now that ISIL has successfully established a self-proclaimed Islamic caliphate and maintained control of
extensive territory, it is unlikely that future jihadi groups in the region will be satisfied with virtual or aspirational
caliphates. Their success will likely convince the wider jihadi community that a physical caliphate is not only
possible, but necessary. It is unlikely that future jihadis will easily return to the Al Qaeda philosophy of slow
and steady building towards a future caliphate. While it is unlikely that many other groups will possess the
capabilities to replicate ISIL’s success, if ISIL in its current form is dismantled then it is likely that other groups
will seek to position themselves as its successor. ISIL itself has claimed that even if it lost control of its current
proto-state then it would transition to the areas controlled by allied groups.
127. In reality, unless the current core leadership prevails and is able to move on mass to another area, ISIL as
we currently know it will be unlikely to re-establish itself to the same extent. However, elements of its
administrative approach, underlying philosophy and technical competence will inevitably filter throughout the
wider jihadi community. This means that off-shoot or successor jihadi groups will continue to display greater
sophistication in hybrid warfare, administrative competence, diversity of resource extraction and more
sophisticated media production. As foreign fighters return to their places of origin, these new skills and
perspectives could improve the capabilities of groups in places such as North Africa, the Caucasus and
Central Asia.
128. ISIL’s approach seeks to exploit ungoverned spaces or create them by destabilizing weak political
governance. There are plenty of those spaces around the world, and some militant jihadi groups in areas with
low governance and perceived grievances amongst their Muslim populations, may take inspiration from the
success of ISIL to declare their own Islamic nation. Areas of vulnerability beyond those already in conflict,
such as Chechnya, include Western China, Eastern Myanmar and parts of Indonesia. Some of these areas
may have the necessary conditions to replicate ISIL tactics, such as increasing sectarian tensions, leveraging
identity politics to mobilize local support and further destabilizing weak political institutions. It is unlikely,
however, that they will be able to succeed as ISIL has because the unique context in which ISIL’s rise
occurred is not easily reproduced.
129. In none of those situations is there a complex web of competing agendas between regional powers that
would supersede the threat they posed. There is also not the opportunity to seize the quantity and quality of
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 29 OF 33
military hardware that existed in Western Iraq. Nor is there necessarily the diversity of accessible revenue
generation opportunities available in the Middle East. Furthermore, any Islamic state or emirate declared
outside of the Middle East region is unlikely to have the same degree of perceived authority and importance
as ISIL, unless it is as a satellite of the current Caliphate. While they may not achieve the scale, profile or
longevity of ISIL’s proto-state, they could still use the capabilities copied from the ISIL model to establish their
own areas of control with devastating consequences for their own regions.
130. The slick sophistication of ISIL’s media capabilities has set a bench mark for future groups, and it is likely that
any future jihadi group will seek to copy or improve upon the quality and style of ISIL’s media production. The
fundamentals of ISIL’s approach is not dramatically different to the approach other groups have taken in the
past, but the sophistication and polish displayed by ISIL’s media arm sets it apart. As with the networks of
fighters and alliances across the Middle East, the global networks of support will not disappear even if ISIL
was to be defeated. As such, many supporters may seek to find another group to get behind, and it is likely
that many of the social media engagement techniques will continue, albeit in a more fractured and less
motivated fashion.
131. Brutality has long been a hallmark of sub-national groups and in particular amongst jihadi extremists. ISIL,
however, has escalated the level and intensity of that tendency in accordance with the theory. It has sought to
position itself as the ‘strongest horse’ among jihadist groups and that its high levels of violence signal its
strength. Unless this approach is widely accepted within the community as being the reason for its downfall, it
is likely that the support for this operating principle will continue. The number of groups that ascribe to it will
probably remain small, as it was the key reason ISIL were rejected by Al Qaeda and other jihadist groups, but
there will remain an extreme element who will maintain belief in the approach. Similarly, the impact and profile
that ISIL has gained will ensure that at least some of their religious perspectives and interpretations will live
on with fringe elements of the jihadist and Islamic extremists communities into the future.
132. Most dangerously for the West, ISIL’s encouragement of lone wolf and ‘self-starter’ terrorist groups planning
and executing their own attacks independently of any support network may continue long after ISIL
disappears. While this tactic was a key strategy of Al Qaeda’s, ISIL’s perceived success and notoriety has
been more effective in motivating individuals and groups to take action. Whether such individuals would
remain as motivated if ISIL were defeated or the caliphate dissolved remains to be seen. It is likely that at
least some of those ISIL fighters who are scattered by an ISIL defeat will seek to revive the movement
elsewhere by continuing such attacks.
Implications for the Other Irregular Groups
133. ISIL’s success will be heeded not only within the jihadist community, but by a range of irregular groups.
Historically, tactics, training and technical knowledge have been shared by a range of diverse groups. The
IRA has been linked to other irregular groups, including in South America and the Middle East for instance.
Iterative developments of the application of suicide bombers also moved between the Tamil Tigers and
various jihadist groups. In the globalized and interconnected system we now live in, it is inevitable that groups
will look at and learn from the ISIL experience, beyond the diffusion that inevitably occurs through direct
contact. It is impossible to effectively pick all of the attributes that will be adopted, but some forecasts can
confidently be made. In understanding the potential lessons learned by other groups, it is important to
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 30 OF 33
understand and distinguish the elements of ISIL’s success that stem from the local context, such as recent
history, politics and culture, and those that can be copied.
134. The use of social media and the sophisticated media production capabilities of ISIL have already been
covered in significant depth. Needless to say, while the approach, content and style may not be of use to
other irregular groups, the way it was developed and employed has direct application. For groups that are
driven by an ideological motivation, such as environmentalists, the way that ISIL has forged together a
network of motivated supporters willing to engage the wider public may provide new approaches beyond the
stale theatrical demonstrations and shock documentaries. Similarly, groups of nationalists seeking
independence, such as the Uighers, West Papuans or Rohingyas, may look to the media methods of ISIL for
inspiration in raising the profile of their cause. While it came as a result of ISIL actions rather than as their own
tactic, the ability for the Yazidi diaspora to influence U.S. policy is also an important lesson to learn and
reinforces the role that Diasporas can play.
135. Moreover, the ability of ISIL to develop a huge, motivated network of supporters despite the lack of a clearly
nationalist or ideological underpinning demonstrates the power of a social movement if promoted forcefully
and effectively. While in this case the religious overtones bordered on the ideological, religions generally
include more diversity in perspectives and values than nationalist or purely ideological allegiances. As a key
characteristic of younger generations is the need to take part in ‘social justice’ causes, this is a trend that is
likely to grow in importance and could be dangerously leveraged by other groups in the future. A cause that
inspired a militant virtual diaspora that unites the disenfranchised in mega city slums with those in the West
through the internet, for instance, could potentially mobilize an even larger and more sophisticated threat. An
example of this would be if the anti-globalization movements of the late 90’s and early 2000’s caught on with a
cyber-activist group such as ‘Anonymous’, and coalesced around a central issue.
136. For militant groups that employ a hybrid warfare approach, there will be tactical lessons that can be learned
from ISIL. These include the use of multiple, coordinated and protected VBIED as a form of preparatory fire
before an assault, though finding sufficient volunteers for suicide missions may be more difficult for other
groups. The ISIL experience reinforces the benefits of units remaining small, light and fast, and the challenges
inherent in utilizing large and complex conventional weapon systems. Their use of drones for surveillance will
likely spread not through direct diffusion, but because the technologies will be ubiquitous and their utility is
self-evident.
137. ISIL has highlighted the ongoing utility and criticality of good human intelligence and bureaucratic
competence. These are hard learned skills that take time and training, so it is unlikely that every other group
will be able to copy them in the short term. However, a movement that has time to plan and seeks to achieve
greater and longer lasting success should note the value in investing in these capabilities.
138. ISIL has proved that even in the era far reaching drone strikes, there are advantages to holding and
controlling land. This is not easily done, and many regions will not provide the economic benefits that Western
Iraq and Eastern Syria can provide. In the long term, the burden of maintaining and defending that territory
may become too much for ISIL to sustain, but it at least demonstrates that organizations do not have to
remain completely invisible and dispersed to withstand Western opposition, if they operate with necessary
caution.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 31 OF 33
139. The ability for a sub-national group to amass massive funding while remaining independent of state
sponsorship is also a new lesson. Again, the environment may not provide the necessary critical capabilities,
such as extant smuggling routes, acquiescent neighbouring states or extant resources to replicate ISIL’s
success, but it demonstrates the importance of careful bookkeeping, diversified income streams and
entrepreneurial approaches to the area under control.
140. Finally, ISIL has been successful in large part because of the instability and competing agendas of the major
players within the region. If each of the countries neighbouring the self-proclaimed caliphate prioritized their
extermination, the current state of ISIL would be very different. Instead, each is focused on another,
apparently greater threat to stability and security. Whether ISIL is in this position by design or luck, the lesson
for other irregular groups is to exploit regional competition and tension and remain slightly below the threshold
of other concerns in order to avoid undue pressure. ISIL is not unique in this, Boko Harem provides another
example of how conducive such environments can be. But unlike in the past, there are fewer regions in the
world that are so unstable to allow this to readily occur. Africa is the most likely region, but as nations
increasingly work together to stabilize the region rather than support the groups to destabilizing their
neighbours, the opportunities are shrinking. Eastern Europe has become less stable in recent years, but the
over-arching consideration there is great power politics, which sub-national groups will be able to take
advantage of but will find it harder to influence or shape. In Asia, State level and near-peer confrontations are
more likely, and most of the irregular groups that remain there are contained to one or two more advancing
countries, which will make it difficult to engineer similar power vacuums. In South and Central America, there
is reduced tension between states and any irregular groups will face competition with well-resourced
transnational criminal groups who’s key motivator is profit, and therefore may have competing interests.
SUMMARY
Conclusion
141. While it’s eventual longevity is yet to be determined, ISIL has proven itself to be one of the most effective,
magnetic and wealthiest sub-national irregular groups in history. During its initial expansion, it appeared
unstoppable and no matter its eventual fate, its rise will impact the region and the world for years to come. It
has developed many of the existing irregular tactics and methodologies to their ultimate form, and will
undoubtedly influence and shape the thinking of the jihadist community into the future. Moreover, while
irregular groups such as Hezbollah have fought full scale war with advanced militaries before, few have so
brazenly challenged all of a regions and several global powers simultaneously.
142. However, many of the elements that enabled their success have developed over a decade and a half and are
specific to the context and conditions of the region it exists in. Other irregular groups may be able to replicate
ISIL’s success in the future or in other regions, but they will be unlikely to do it following an ISIL template.
Applying the EIT methodology to the ISIL case study explains their resiliency as their capabilities stretch
across the spectrum of control. A COG analysis highlights areas where they may be vulnerable, but also
demonstrates the magnitude of the challenge of defeating them.
143. The groups studied in the previous EIT analysis were selected because at their peak they were fiercely
capable organizations that thrived off regional and global conditions to develop and employ near-state like
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE 32 OF 33
capabilities across the spectrum of control from coercive through administrative to persuasive. They achieved
this by exploiting logistical, financial, technological, political and economic infrastructure in place along with a
global network of people, communities, organizations and governments. These groups have proved to be
technical innovators and diffusers of knowledge that developed best practice approaches into highly effective
operational concepts. ISIL fits neatly into this group and demonstrates the same degree of competence and
capability that they do. While the strengths and weaknesses differ between each of the groups and in some
cases ISIL represents a polar opposite approach to some of them, many of the key forecasts have been
further validated and reinforced. In many of the capability areas, such as developing global networks and
shaping their own narrative, ISIL represents the best in art and has set a bench mark for future irregular
groups to aspire to.
144. Ultimately, the purpose of the EIT methodology is to understand the potential future threats that irregular and
sub-national groups pose, and consequently the potential capability gaps the U.S. may in confronting them.
There is no doubt that ISIL has exposed U.S. and western capability gaps, and the limitations of technologies
we have come to rely upon. It could be argued that limited effectiveness of U.S. intervention owes more to
political constraints, diplomatic complexities and the lack of political will by all involved rather than a
technological limitation. Some of these trends and subsequent capability gaps were accurately forecast by
previous EIT analysis, such as in the area of information operations. ISIL has proven others either wrong or
not yet universally applicable, such as the criticality of virtual organizations and leadership.
145. The primary objective of the EIT method is to identify and understand evolving trends amongst irregular
groups to better prepare for future threats. Having applied the EIT methodology to the ISIL case study, the
lack of ISIL military innovation provides few new forecasts or trends that would be likely to create new future
capability gaps. But their effectiveness at employing existing approaches does reinforces the scope of the
challenge we face closing the current ones.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE A OF ANNEX A
ANNEX A
EVOLVED IRREGULAR THREAT METHODOLOGY
Theoretical Framework
1. Counterinsurgency (COIN) theorists have long understood insurgency as a ‘competition for government’
between a non-state armed actor and a government, occupying power, or other recognized authority.46
The
CoG of insurgent movements has been identified as the ability to manipulate and mobilize a mass population
base, maintaining control over that population. Governments that are losing to insurgencies are seen as being
‘out-governed’ rather than merely outfought47
and populations, especially in rural subsistence economies, are
seen as risk-averse, responding favorably to predictability and order.48
2. More recently, theorists and practitioners have evolved a new understanding of the mechanisms through
which this occurs. Joel S. Migdal developed a functional construct, the state-in-society framework that allows
analysts to measure the effectiveness of unlike control systems (states versus insurgencies, gangs, criminal
groups, etc.).49
Stathis Kalyvas showed that support follows strength, certainty and order in normative
systems, which, like ‘rules of the road’ give populations clear boundaries.50
What this means is that
populations respond to predictable, ordered systems which tell them exactly what they need to do, and not do,
in order to be safe. Dr. David Kilcullen explained the spectrum of control in insurgent normative systems, the
theory of competitive control, and the relationship between control and resilience.51
Analytical Approach 3. Kilcullen’s theory of competitive control states that “In irregular conflicts where at least one warring party is a
non-state actor, the local armed actor that a given population perceives as most able to establish a normative
system for resilient, full-spectrum control over violence, economic activity and human security, is most likely to
prevail within that population’s residential area.”52
The first Evolved Irregular Threat Project analyzed selected
‘evolved irregular threat’ groups against the spectrum of control, from coercive (combat capabilities) through
administrative (governance capabilities) to persuasive (political and propaganda capabilities). Evidence
suggests that groups that apply capabilities across the widest spectrum (from coercion to persuasion) are the
most agile, resilient and resistant to countermeasures, since they can compensate for losses in one part of
the spectrum by applying capabilities from another. Groups that are effective along only a narrow band of the
spectrum are more brittle, and more likely to fail under pressure. The spectrum can be graphically illustrated
46 Robert Thompson, Defeating Communist Insurgency: Lessons from Malaya and Vietnam (New York: Praeger Publishers,
1966). 47
Bernard F. Fall, "The Theory and Practice of Insurgency and Counterinsurgency," Naval War College Review (Winter 1998, first published April 1965). 48
James C. Scott, The Moral Economy of the Peasant: Subsistence and Rebellion in Southeast Asia, (New Haven Ct: Yale University Press, 1978). 49
Joel S. Migdal, Strong Societies and Weak States: State-Society Relations and State Capabilities in the Third World (Princeton, NJ: Princeton University Press, 1988). 50
Stathis N. Kalyvas, The Logic of Violence in Civil War (New York: Cambridge University Press, 2006) 51
David Kilcullen, Counterinsurgency (New York: Oxford University Press, 2010). 52
Kilcullen, Counterinsurgency, 2010.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE B OF ANNEX A
as follows:
Capability Analysis Format 4. The EIT methodology considers the future military capability development to fill warfighting requirements as a
continuous cycle of conceptualization, experience, innovation and experimentation. For example, the U.S.
Army uses the DOTMLPF (doctrine, organization, training, materiel, leadership and education, personnel, and
facilities) framework as its problem-solving construct for evaluating current capabilities and advancing
solutions that address gaps requiring mitigation or closure. The EIT methodology uses a taxonomy of three
capability baskets – combat, governance and political/propaganda – to assess enemy capabilities. The
purpose of this approach is to advance thinking on the different ways that various actors could employ
capabilities in isolation or as part of a multilevel battle of persuasion and coercion outside of a current U.S.
Department of Defense framework. In order to maintain consistency across the analysis, this study of ISIL
utilized the same framework and methodology as the original EIT project. This approach provided the
additional benefit of undertaking a similar but independent capability of ISIL analysis to the SMA SOCCENT
Phase 1 work, providing comparative perspectives.
5. The first step in the process involved analyzing combat capabilities using the dated Battlefield Operating
Systems (BOS) framework as described in U.S. Army Field Manual 7-15 (August 2003) and other doctrinal
publications.53
Although the Battle Operating Systems (BOS) has been superseded by ‘warfighting function’
we have continued to use BOS in this study in order to maintain consistency with the earlier analysis, and
because it is more broadly applicable to non-Western or conventional warfighting groups.
53 The project team recognized that BOS terminology is no longer used by the U.S. military, but that given its capability spectrum
breakdown it provided an analytically useful tool with which to analyze capability. Department of the Army, FM 7-15 The Army Universal Task List (August 2003).
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE C OF ANNEX A
6. The Battlefield Operation Systems are:
+ Intelligence (remains essentially the same);
+ Maneuver (now Movement and Maneuver warfighting function);
+ Fire support (now Fires warfighting function);
+ Air defense (combined with some other and new functions, now Protection warfighting function);
+ Mobility, countermobility and survivability (Combined with Movement and Maneuver warfighting
function);
+ Combat service support (now Sustainment warfighting function); and
+ Command and control (now Conduct Mission Command).
7. Second, EITP analyzes governance capabilities using Joel S. Migdal’s Strong Societies and Weak States.
The State-in-Society framework suggests that societies are not static formations but are constantly developing
as a result of perpetual struggles over three levels of social control: compliance, participation and legitimacy.
This structure provides a functional rather than structural template to analyze the social control achieved by
states in competition with non-state actors, to include insurgent groups, criminal networks, militias and others.
Migdal identifies four functional capabilities of the state including the capability to:
+ Penetrate society;
+ Regulate social relationships;
+ Extract resources; and
+ Appropriate resources to determined ends.
8. The State-in-Society framework therefore provides a viable comparative capability framework to evaluate the
ability of states and non-state armed groups to wield social control over populations.
9. Third, EITP analyzed political and propaganda capabilities using an organic Information Operations (IO)
framework. EITP sought to analyze all informing, influencing, and behavior manipulation activities through a
framework tailored to the broad information capabilities of non-state actors, using four categories for political
and propaganda operations:
+ Framing – agenda-setting, informing supporters through non-coercive means;
+ Persuasion – influencing or persuading adversaries through non-coercive means;
+ Dissuasion – deterring or confronting opposition through coercive and non-coercive means; and
+ Leveraging – provoking, manipulating or mobilizing local populations, governments, adversaries or
broader networks (e.g. global diasporas) for political advantage through mass media and other channels.
10. IO capabilities are used to inform the decisions of supporters and influence the decisions of adversaries. By
using propaganda to shape the environment and ultimately the behavior of governments, groups, and
individuals, irregular actors can manipulate and mobilize supporters and sympathizers to defeat political
threats.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE D OF ANNEX A
11. Together, the three baskets of capabilities outlined above provide a comprehensive analytical framework for
capabilities across the full spectrum from coercive (combat capabilities analyzed through BOS), through
governance (state or state-like capabilities analyzed through State-in-Society functions) to political and
propaganda (analyzed through the organic IO capabilities framework).
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE A OF ANNEX B
ANNEX B
ISIL CAPABILITIES MATRIX
Combat Capabilities
Maneuver Fire Support Air Defense Mobility, Counter mobility and survivability
Combat Service Support
Intelligence Command and Control
Cri
tica
l C
ap
ab
ilit
ies
1. Technical mounted motorized light infantry, company level units, total of about 10,000-15,000 fighters proficient in those operations 2. Infiltrate forces behind enemy lines, for reconnaissance missions and terrorist attacks, at night and inclement conditions 3. Platoon and Company level attacks on enemy lines of communications 4. Dedicated foreign fighters willing to fight to the death 5. Dispersal and coordination of forces for multiple avenues of attack on key targets such as cities, as well as retreat 6. Lighting attacks against enemy fixed positions and large units 7. Recruitment of other groups and individuals 8. Sleeper cells to support attacks
1. Use ground-based indirect-fire weapons systems such as mortars, anti-tank missiles, rockets and medium tube artillery to suppress enemy forces 2. Use suicide bombers to destroy enemy strongpoints and checkpoints, terrorize civilians 3. Use of tanks and IFVs to provide urban fire support and shock
1. Deny enemy helicopter operations and low altitude CAS missions by concentrating AAA and MANPADS at key sites like command centers 2. Mobile air defenses on SPAAGs and technicals to protect maneuver units
1. Defend urban neighborhoods with entrenched company level units supported by snipers and IEDS 2. Defend key avenues of approach. 3. Defend key infrastructure. 4. Use of IEDs and landmines to hinder enemy movement and cover withdrawals. 5. Disrupt enemy lines of communication, logistics. 6. Disrupt enemy avenues of approach through scorched earth tactics 7. Construct hardened fighting positions, logistical and communications infrastructure. 8. Presence of civilians to act as human shields, and civilian casualties as political points
1. Provide resupply of weapons and ammunition to forward fighting positions. 2. Evacuate casualties. 3. Treat casualties 4. Capture of enemy weapons and supplies 5. Smuggle supplies 6. Repair airstrike and battlefield damage to infrastructure
1. Identify enemy order of battle and locations during urban operations 2. Maintain high level of operational security. 3. Determine enemy movements 4. Identify potential supporters in area of operations 5. Counterintelligence and internal security measures against internal resistance
1. Attract and manage Salafist vassal groups 2. C4ISR infrastructure of radio, cellular and Internet communications for military and governance 3. Dissemination of propaganda for internal and foreign audiences 4. Replace killed and captured field commanders and regional governors 5. Establish regional and extra-regional alliances of convenience 6. Establish centralized, effective strategic planning
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE B OF ANNEX B
Combat Capabilities
Maneuver Fire Support Air Defense Mobility, Counter mobility and survivability
Combat Service Support
Intelligence Command and Control
Req
uir
em
en
ts
1.1 Technicals, Humvees, MRAPs, BRDMs and other light AFVs 2.1 ISR, operational/staff planning, communications equipment, infiltration, sympathizers and supporters 3.1 Units proficient in small-unit battle drills, trained leaders, communications 4.1 Ability to recruit and transport foreign recruits to ISIL territory, equip them with suicide bombs and small arms, train, pay and indoctrinate 5.1 Unhindered access to roads, bridges and other transportation infrastructure 6.1 Motorized and mechanized forces, intelligence to identify enemy formations 7.1 Ability to present a strong ideological narrative, along with financial and material support to allied groups 8.1 Successful infiltration of ISIL fighters, covert recruitment of local fighters and supplies and intelligence support
1.1 122mm BM-21 Grad rockets, M198 155mm howitzer, truck mounted 84mm mortars 2.1 Suicide bombers, car bombs and other VBIEDS 3.1 T-55 and T-72 tanks, BMP-1 and BMP-2 IFVs
1.1 SA-7 Grail and Stinger MANPADS, Shilka SPAAG, ZSU-23-2 AAA 2.1 Mobile FN-1, Igla MANPADS, AAA on technicals
1.1, 2.1, 3.1, 4.1, 5.1, 6.1 Trained infantry and fire support units, direct and indirect fires, small arms, anti-tank weapons, mines and other explosives 4.1 requires well equipped explosive experts to build booby traps and IEDs 4.1 requires IED factories with standardized production, reliable supply lines and institutional quality control 7.1 Explosives, incendiaries stockpiled for fighters at key sites 8.1 Ability to coerce civilians to remain in urban battlefields and areas
1.1 and 2.1 require wheeled vehicles, roads and other transportation infrastructure, communications, volunteers and other supporters, external funding, pre-planned depots 3.1 requires trained medical staff, field hospitals, volunteers and other supporters 4.1 requires battlefield victories and defection to gain access to vehicles, supplies and sophisticated armament 5.1 Requires smugglers with access and ability to cross borders, terrain, and procure supplies at affordable costs 6.1 Construction units, and workers (conscripted/volunteer/captives), supplies like concrete and telecommunications gear
1.1 espionage, small uav 2.1 trained cadre, volunteers and supporters, secure communications, popular support, checkpoints 3.1 source knowledge and expertise from global recruits and regional proxies 4.1 presence of local fighters and sympathizers, along with money and supplies to induce cooperation 5.1 CI and internal security cadre with disciplinary remit over ISIL, mobility and informer network
1.1 Continued safety and freedom of Al Baghdadi, and successors 2.1 Loyalty of ISIL personnel, especially leaders, mobile telecommunications such as field radios, access to Internet and social media 3.1 Access to Internet and social media platforms, cadre of experienced propagandists capable of recruiting online sympathizers to spread the cause 4.1 Experienced pool of mid rank cadre, replenished by recruitment of disaffected locals, foreign volunteers and defectors from other armed groups and regime, maintain a clear line of succession 5.1 Institutional capability to impart funding, IO skills 6.1 Trained and experienced staff personnel, such as ex Baath personnel, and C4ISR infrastructure to support strategy making and implementation
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE C OF ANNEX B
Combat Capabilities
Maneuver Fire Support Air Defense Mobility, Counter mobility and survivability
Combat Service Support
Intelligence Command and Control
Vu
lnera
bilit
ies
CR 1.1 Vulnerable to enemy detection, ISR, indirect and direct fires, along with desertion and defection, decrease in conscription and recruitment CR 2.1 Vulnerable to enemy detection, ISR, indirect and direct fires, espionage, communications jamming CR 3.1 Vulnerable to enemy detection, ISR, indirect and direct fires CR 4.1 Direct and indirect fires, detection, infrastructural targeting CR 5.1 Direct and indirect fires, infrastructural targeting CR 6.1 Direct and Indirect fire, ISR CR 6.1 vulnerable to disillusionment of ISIL aims and conduct, defection of fighters CR 7.1 is vulnerable to decreased popular support in enemy territories, local informants and CI operations.
CR 1.1, 2.1 and 3.1 vulnerable to direct and indirect fires, counter-battery fires, air strikes, espionage and sabotage, electromagnetic jamming, battlefield capture. CR 2.1 vulnerable to advanced explosives detection equipment CR 3.1 is vulnerable to antitank weapons, lack of maintenance and support, close quarter urban fighting
CR 1.1 and CR 2.1 Vulnerable to counter-battery fires and SEAD missions, destruction by ground forces, lack of maintenance and training
CR 1.1-1.7 vulnerable to kinetic strikes (especially air operations), superior maneuver operations, speed, armor and combined arms CR 1.1 vulnerable to ERA equipped AFVs, and tunnel warfare tactics by enemy CR 2.1 vulnerable to flanking and aerial attacks CR 4.1 vulnerable to enemy engineers, such as MRAPs and unmanned mine clearance vehicles CR 4.1 vulnerable to destruction of IED factories (especially by airpower), sabotage, loss of logistics for supplies and IED transportation to battlefield CR 7.1 vulnerable to capture and depletion through usage
CR 1.1 and 2.1 vulnerable to sanctions, kinetic strikes (rocket artillery and air strikes), espionage and sabotage CR 3.1 vulnerable to inability to source medical supply, and loss of medical personnel due to casualties or defection CR 4.1 vulnerable to defeats and lack of ground engagements CR 5.1 vulnerable to law enforcement crackdown on border guard corruption, smuggling, and air strikes on smugglers, financial sanctions on smugglers CR 6.1 vulnerable to depletion and destruction of supplies, inability to train engineers
CR 1.1 vulnerable to electro-magnetic interference, denial of network access, enemy counterintelligence and denial/deception CR 2.1 vulnerable to espionage, eroded local support, kinetic attacks CR 3.1 Loss of support/narrative viability CR 4.1 is vulnerable to lack of resources to recruit supporters, supporters may be alienated or coerced away from supporting ISIL CR 5.1 is vulnerable to infiltration of ISIL hierarchy and dissension, loss of CI personnel from air strikes and battle, splintering of ISIL structure
CR 1.1 vulnerable to assassinations, other kinetic strikes, internal strife CR 1.1, 2.1, 3.1 vulnerable to espionage and sabotage, kinetic strikes, jamming CR 3.1 vulnerable to cyber-attacks, especially distributed no state opponents CR 4.1 vulnerable to decreased recruitment and deaths/desertion of mid-level cadre to maintain hierarchical redundancy 4.1 is vulnerable to loss of senior personnel, enemy intelligence collection and targeting of senior personnel, and intra-hierarchy dissension that threatens chain of command CR 5.1 vulnerable to capture in transit or death of personnel sent to work with foreign vassals, and loss of telecommunications and courier networks CR 6.1 is vulnerable to loss of experienced general staff personnel due to death, defection/desertion and capture
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE D OF ANNEX B
ISIL: Governance Capabilities
Penetrate society (ground presence)
Regulate relationships Extract Resources Apply Resources to group ends
Cri
tica
l C
ap
ab
ilit
ies
1. Establishment of Caliphate to demand Sunni obligations 2. De facto state administration in eastern Syria and western Iraq, consisting of 12 regional governors and ISIL wide councils on military, economic and religious affairs 3. Control of media 4. Establishment of religious schools 5. Abu al Baghdadi 6. Ally with local power brokers to navigate the human terrain 7. Provision and control over services such as health, utilities, communications
1. Sharia courts 2. Religious police 3. Credible interpretation of religious texts 4. Enforce punishments 5. Make religious decrees 6. Support and meditate disputes among other Salafist jihadi groups
1. Sale of refined oil 2. Sale of crude oil 3. Raising of external donations 4. Soliciting of anonymous online donations 5. Looting and selling of antiquities 6. Internal Extortion 7. Agriculture 8. Seizure of banks and capital assets 9. Maintain independent financing model protected from U.S. anti—money laundering efforts 10. Conscription of local population, including children
1. Wages for foreign fighters 2. Provision of gifts/ spoils of war 3. Thorough tracking and auditing of resources 4. Monopolize resource distribution in controlled areas, deny resources to enemy populations as food/economic warfare 5. Expand ISIL control through armed and other means 6. Spread ISIL propaganda in old and new media
ISIL: Governance Capabilities
Penetrate society (ground presence)
Regulate relationships Extract Resources Apply Resources to group ends
Cri
tica
l R
eq
uir
em
en
ts
1.1 Ability to contest and control populated areas 2.1 Armed force to institute rule 3.1 Access to Internet and audience, suppress competing media 4.1 Continued legitimacy to claim Caliphate claim, educational personnel and infrastructure 5.1 Abu al Baghdadi remains alive and at large 6.1 Ability to reward local power brokers, and coercive ability to punish them 7.1 Recruit foreign doctors, engineers and specialists, and pay/coerce local equivalents
1.1 Ability to identify, judge and punish transgressions with credible religious judges 2.1 Armed enforcement and network of informants 3.1 Support of Salafist clerics and silencing all opposing clerics 4.1 Identify and custody of said prisoners, at least coercion of local population to have a monopoly on arresting, sentencing and punishing transgressors 5. Clerical organization to proclaim decrees, and telecommunications to propagate decrees 6.1 Disillusionment of Salafist groups with other terrorist groups like Al Qaeda, disorganization among competing Salafist groupings
1.1 Access to crude oil, refinery infrastructure and ability to maintain production infrastructure 2.1 Access to crude oil production, production maintenance and smuggling networks 3.1 Access to international financial systems, formal and informal 4.1 Cryptocurrency, other digital markers of value and ability to translate and launder into hard currency, goods or services 5.1 Possession of archaeological sites and museums, network of smugglers and middlemen 6.1 Coercive ability to tax populace and seize assets 7.1 Arable land, maintain farming and irrigation infrastructure, transport of food and commodities 8.1 Presence of banks inside captured areas 9.1 Network of money transfers and international banking, as well as ability to supply goods to foreign buyers 10.1 Ability to conduct census, and network of informers to monitor compliance of conscript pool
1.1 Maintain sufficient funds to pay foreign fighters and conscripts 2.1 Continued battlefield success and holding current territories 3.1 Intra-organizational communications and established chain of command 4.1 Armed and financial ability to distribute resource allocation and collection, control of transportation network/infrastructure, economic experts to ensure efficient distribution 5.1 Control over borders, transportation, merchants
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE E OF ANNEX B
ISIL: Governance Capabilities
Penetrate society (ground presence)
Regulate relationships Extract Resources Apply Resources to group ends
Cri
tica
l V
uln
era
bil
itie
s
CR 1.1 vulnerable to renewed civil conflict, popular resistance CR 2.1 vulnerable to loss of territory, and inability to provide goods such as governance and food CR 3.1 vulnerable to electro-magnetic interference, kinetic strikes, counter-propaganda CR 4.1 vulnerable to assassination/capture, loss of stature CR 5.1 is vulnerable to capture/assassination/prolonged absence from public/communications CR 6.1 vulnerable to defection of regional allies upon disaffection over ISIL rule, inability to pay, or recruitment by adversaries
CR 1.1 requires coercive monopoly, vulnerable to assassination, military defeats, kinetic strikes on Sharia court infrastructure CR 2.1 vulnerable to loss of popular support from ISIL rule, disillusionment of informants CR 3.1 vulnerable to dissemination of alternate religious interpretations, especially by tribal and other established authorities CR 4.1 vulnerable to armed resistance by prisoners, loss of law enforcement capabilities, especially communications, local refusal to accept punishment of transgressors CR 5.1 vulnerable to loss of legitimacy and anger at ISIL clerics from battlefield reversals, and backlash against religious rule, access to alternative religious authorities CR 6.1 vulnerable to crackdown on other Salafist groupings, loss perceived ISIL power if financial resources and territories diminish, rise of another more successful/radical Salafist group
CR 1.1 vulnerable to sanctions and loss of economic assets, loss of Mosul (ISIL economic center of gravity) CR 2.1 vulnerable to law enforcement crackdown on illicit networks/finance, firing of corrupt officials, kinetic strikes on oil production and storage infrastructure, lack of trained personnel CR 3.1 vulnerable to law enforcement freezing ISIL and business affiliate funds, and refusal of banks to conduct transactions in ISIL territory CR 4.1 is vulnerable to digital surveillance and subsequent law enforcement and intelligence action CR 8.1 is vulnerable to depletion of banks in territories, and no recent bank captures CR 9.1 is vulnerable to resistance from parents and family members, unwillingness of families and local authorities to aid conscription
CR 1.1 vulnerable to state failure, collapse, civil war CR 2.1 vulnerable to battlefield losses, loss of popular support/acquiesce and subsequent resistance, depletion of lootable resources and funds CR 3.1 vulnerable to electro-magnetic interference, cyber-attacks, assassinations, enemy intelligence collection and kinetic attacks CR 4.1 is vulnerable to loss of border crossings, degraded and destroyed transport infrastructure like bridges, arrest of suppliers/buyer network and inability to finance purchases and obtain supplies
ISIL: IO Capabilities
Framing Persuasion Dissuasive
Cri
tica
l
Cap
ab
ilit
ies
1. Affirm/enforce ISIL as the one true Caliphate for all Muslims, charismatic authority 2. Existential struggle against everyone in the region who does not recognize ISIL's authority 3. Construct narratives that resonate with identity politics and grievances 4. "Weaponize discontent" for a global audience
1. High production videos of atrocities to convince Sunnis of ISIL's divine sanction and purifying mission 2. Mass usage of social media to reach a scattered but global audience of true believers, reach the radicals 3. Support claim to Caliphate and legitimacy by control, gaining Salafist allegiance and ideological implementation 4. Inspire magazine and other traditional media
1. Undermine adversary will through escalating violence from ISIL atrocities 2. Undermine rivals' governance legitimacy through propaganda of ISIL success, routine governance and piety 3. Perceived regional and global ubiquity of armed operations to raise intervention unpopularity and costs
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE F OF ANNEX B
ISIL: IO Capabilities
Framing Persuasion Dissuasive
Cri
tica
l
Req
uir
em
en
ts 1.1 and 2.1 require continued battlefield successes, regime stability and
ideological purity 3.1 Exploit Sunni regional and global grievances by attacking enemies such as Baghdad and Damascus regimes 4.1 Visible ISIL actions against U.S. lead coalition, Iran and Syrian government like execution of prisoners and armed actions
1.1 Acquisition and access to prisoners and hostages 2.1 Social media network manned by dedicated staff and volunteers, especially members of foreign background 3.1 Control and functional governance over territory; presence of operational Salafist groups able to pledge allegiance to ISIL, opposition to U.S., Iran and Arab states to lend support to ISIL apocalyptic narrative
1.1 and 2.1 require ability to communicate to enemy audiences through social media, along with actual examples of ISIL military and governance successes 2.1 requires ISIL ability to hold and govern territories to maintain support 3.1 requires battlefield success and holding current territory, and apparent presence of active ISIL supporters aboard
ISIL: IO Capabilities
Framing Persuasion Dissuasive
Cri
tica
l
Vu
lnera
bilit
ies
CR 1.1 vulnerable to direct and indirect fires, air strikes, jamming, sabotage, alternate media, lack of endorsement by Sunni religious authorities, increases in education and informational awareness in ISIL personnel CR 2.1 Vulnerable to adversary exploiting ISIL battlefield reversals for propaganda value, along with counter propaganda from other Muslims (especially Salafists) CR 3.1 vulnerable to wider, visible role of Sunni forces fighting against ISIL, and integration of credible non ISIL Sunni actors in power structures CR 4.1 is vulnerable to lack of new ISIL spectaculars, such as military success, ISIL atrocities and misgovernment could redirect discontent at them
CR 1.1 vulnerable to running out of victims, audience desensitization to violence, and psychological blowback CR 3.1 Vulnerable to direct and indirect fires, air strikes, battlefield losses, popular resistance CR 2.1 vulnerable to law enforcement crackdown on foreign activists and telecommunications disruption, chosen vassal in a 'vilayet' could lose to competitors or counterinsurgency forces, weakening ISIL prestige, attrition and inability to replace foreign born propagandists CR 2.1 vulnerable to social media supporters shifting allegiances away from ISIL CR 2.1 vulnerable to condemnation/narratives by defected ISIL personnel and victims (especially Sunni)
CR 1.1 and CR 2.1 vulnerable to direct and indirect fires, air strikes, jamming, sabotage, alternate media CR 2.1 vulnerable Internet activism, harassment and sabotage, loss of territory, decreased living standards and discontent in territories CR 3.1 vulnerable to perceived and actual battlefield reversals, internal uprisings
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE A OF ANNEX C
ANNEX C
ISIL’S EVOLVED IRREGULAR THREAT CASE STUDY EVOLVED
Significance of ISIL Case Study
1. The Islamic State in Iraqi and the Levant (ISIL) is a designated terrorist group controlling significant territory in
eastern Syria and western Iraq, in addition it is affiliated with other sub-state group in Afghanistan, Algeria,
Libya, Pakistan, Nigeria and Yemen which also territory under their control. They govern a functioning
pseudo-state with a complex administrative structure. At the top of the military command is the emirate, which
consists of Baghdadi and two deputies, both of whom formerly served as generals in the Saddam-era Iraqi
army: Abu Ali al-Anbari, who controls ISIS’ operations in Syria, and Abu Salem al-Suleiman, who controls
operations in Iraq. ISIS’ civilian bureaucracy is supervised by 12 administrators who govern territories
(vilayats) in Iraq and Syria, overseeing councils that handle matters such as finances, media, and religious
affairs.
2. ISIL has been extraordinary among sub-state groups in its rapid rise to international prominence through the
rapid seizure of territory, escalating brutality, establishment of a self-proclaimed Caliphate, and the
recruitment of tens of thousands of foreign volunteers and allegiance of multiple terrorist groups across the
world. All actions that many other terrorist groups have aspired to, and failed in (including Al Qaida). ISIL’s
three centers of gravity have made it one of the most powerful armed non-state actors in the world. ISIL’s
unique attributes in its rapid rise to power include sustained fund raising in at least the hundreds of millions
through the extraction of oil and other mineral commodities and taxation of a captive populace, and the
organization and ideological ability to manipulate inter-organizational relations with other armed groups to
expand ISIL’s regional and global influence.
Study Methodology and Theoretical Framework
3. A great deal of open source information can be gathered about ISIL to provide a strategic and operational
overview of its outlook, organization, tactics, history and ideological underpinnings. This study has been
undertaken as a part of the Joint Staff’s Strategic Multilayer Assessment (SMA) office at the request of
SOCCENT. SMA draws upon a wide range of military, government, academic and private sector agencies to
undertake a broad and differentiated analysis of key issues. As part of this effort, this analysis draws upon
past and ongoing efforts by SMA partners which include quantitative and qualitative analysis, broad literature
review, current reporting and first-hand accounts.
4. This study examines unclassified knowledge about ISIL through the analytical lens of the Evolved Irregular
Threat Project (EITP). EITP was a project undertaken for the Office of the Secretary of Defense in 2011 that
examined the potential threat irregular groups could pose to the U.S. the future if they continued to evolve and
adopt emerging technology trends. The study examined in depth Hezbollah, Lashkar-e-Taiba (LeT) and
Liberation Tigers of Tamil Elam, all of which had demonstrated near-state like capabilities in the past. To do
this, the capabilities of the groups were mapped across a ‘spectrum of control’ that spanned coercion,
administration and persuasion. A group with effective capabilities across the spectrum was considered
‘resilient’. The capabilities were then analyzed for Centers of Gravity (COG), which were further broken down
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE B OF ANNEX C
into Critical Capabilities, Critical Requirements and Critical Vulnerabilities, to better understand the nature of
the threat.
5. Centers of gravity (COG) enable analysts to determine what capabilities and characteristics enable a non-
state actor to maintain capabilities to wage hybrid warfare. Often, non-state actors may have a state sponsor
to provide funding, training, personnel and weapons, or an active diaspora outside of the theater. While
attacking these COGs while regular sustained, often multinational efforts, focusing on these COGs in the
military and non-military domain will not only shorten the timeframe and reduce the effort in combating these
groups, but also make it far more difficult for similar successor groups to arrive.
6. Center of Gravity analysis:
Terminology/ Acronyms
Term Definition
ISF Iraqi Security Forces
ISIL Islamic State in Iraq and Levant
KRG Kurdish Regional Government
FSA Free Syria Army
PMF Popular Mobilization Forces
EITP Evolved Irregular Threat Project
Critical Capabilities
Critical Requirements
Critical Vulnerabilities
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE C OF ANNEX C
CENTER OF GRAVITY ANALYSIS – ISIL
IDENTIFIED COG # 1: ESTABLISHMENT OF A CREDIBLE CALIPHATE
# Critical
Capability
Critical Requirements Critical Vulnerabilities Comments & References
1 Meet Legal
Requirements
of Caliph
1.1. Proclamation of a Caliph
who is religiously eligible,
such as Al Baghdadi
1.2. Establishment of a Shura
and Sharia Council
1.3. Survival of senior cadre
(e.g. by constant
movement, rural and
urban hideouts)
1.4. Chain of succession to
maintain command
continuity and cohesion
against setbacks
CR 1.1 Vulnerable to
death/incapacitation/captur
e during airstrikes, special
operations, and battle
CR 1.2, CR 1.3 and 1.4
Council members
vulnerable to kinetic attacks
such as airstrikes,
intragroup disunity over
operations, ideology and
succession, and is also
vulnerable to enemy
intelligence, inadvertent
decapitation during battle
CR 1.4 Vulnerable to
intragroup disputes (e.g. ex
Baathists vs. jihadis, locals
vs. foreign volunteers, and
along ethnic lines)
* A Caliph, according to
accepted Sunni
jurisprudence, must be 15
years of age, schooled in
religious learning (Al
Baghdadi has a PhD in
Islamic Studies), and
descent from the Prophet
Muhammad, of the Quraysh
Tribe
2 Control over
Physical
Space and
Population
2.1. Armed, mobile infantry to
seize and hold territory
2.2. Logistics to sustain
organized fighting force
2.3. Defensive measures to
protect territory (e.g.
Booby traps, IEDs,
snipers to wear down
and stop counter
offensives in urban
areas)
2.4. Armed presence and
police force to control
populace in urban areas
2.5. Heavy weapons such as
T-55 tanks* and Grad
rocket launchers to
suppress/intimidate
uprisings and provide
offensive/defensive fire
support
2.6. Identify and eliminate
opposition through
informant network, secret
CR 2.1, 2.2, 2.3, 2.4, 2.5
and 2.7 Vulnerable to
airstrikes and artillery,
urban combat, mechanized
warfare
CR 2.2 Vulnerable to
capture, natural
deterioration of
infrastructure
CR 2.4 vulnerable to kinetic
and electronic counter IED
methods, mine clearing
vehicles, loss of access to
IED materials, counter
sniper methods
CR 2.4 vulnerable to local
armed resistance, defection
CR 2.5 vulnerable to
counterbattery fire,
inadequate logistics,
inability to replace losses
through capture, defection
*Believed to have several
dozen T-55, a dozen T-62,
several T-72 tanks, one
hundred BMP IFVs, several
hundred MRAPs, MTLB,
M113 APCs, fifty M198
155mm howitzers, several
dozen BM-21 Grad MRL
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE D OF ANNEX C
police
2.7. Roads and motorized
capability to move forces
around territory
and smuggling
CR 2.6 vulnerable to
counterintelligence, inability
to pay/persuade informants
CR 2.7 vulnerable to lack of
road and vehicular
maintenance
3
Possession of
Sovereign
Prerogatives
3.1. Coinage of precious
metal coins
3.2. Imposition of ISIL
authority symbols, such
as ID cards and official
documents
3.3. Display of clearly
identifiable icons and
symbols, including
appropriated ones 5.5
Monopoly over providing
public goods, such as
education and services
CR 3.1 is vulnerable to
precious metal shortages,
refusal of economic actors
to accept face value of
coins
CR 3.2 is vulnerable to loss
of and popular rejection of
ISIL legitimacy in
conjunction with territorial
losses
CR 3.3 is vulnerable to loss
of ISIL military credibility
due to propaganda and
military reversals
4 Communicate
ISIL Case for
Caliphate
4.1. Develop and produce
multilingual official and
volunteer propaganda in
various mediums to
promote ISIL’s Islamist
credentials
4.2. Depiction of atrocities to
emphasize apocalyptic
urgency
4.3. Destruction of ‘un-
Islamic’ artifacts, items,
sites, books
4.4. Use of Social Media to
communicate with
international audience
4.5. Monopoly on education
4.6. Disseminate propaganda
in physical and digital
mediums
4.7. Generate narrative to
appeal to target audience
4.7.1. Frame narrative
of ISIL championing
Sunnis against any and
all oppressive authorities
4.7.2. Promote Daqaa
as the final battle against
the Anti-Christ
CR 4.1 is vulnerable to loss
of propaganda staff and
volunteer due to combat
and defection, increased
Salafist and grassroots
expressions of opposition
by Muslims alienated by
ISIL extremism, discrediting
of ISIL through loss of
respect and ridicule
CR 4.1 is Vulnerable to the
presence of secular, non-
observant ex Baathist
officials in ISIL hierarchy
CR 4.2 Vulnerable to
running out of atrocity
targets and backlash from
Muslims
CR 4.6 vulnerable to loss of
access to social media and
other media platforms
through shutting down
accounts, denial of service
CR 4.7 Vulnerable to rise of
political alternatives for
Sunni population,
prominent ISIL defeats and
Apocalyptic claims of the
Antichrist and Daqaa justify
ISIL atrocities by exigent
eschatology
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE E OF ANNEX C
atrocities/misrule against
Sunnis
CR 4.5 is vulnerable to lack
of qualified teachers,
inability to maintain
educational infrastructure,
loss of territory
CR 4.7 vulnerable to loss of
production staff and
facilities, use of geolocating
and forensics on ISIL
propaganda to gain
operational intelligence
5 Establish Rule
of Law
5.1 Ability to make credible
and enforceable religious
decrees and
interpretations
5.2 Religious police and
courts with ability to
identify and punish
religious crimes
5.3 Female police to enforce
religious laws, removal of
women from public life
5.4 Use of force and financial
control to mobilize local
administration
5.5 Banning of secular
education
5.6 State of rules, laws to be
enforced
CR 5.1 More moderate and
compelling interpretations
by competing religious
figures
CR 5.2 and 5.6 Vulnerable
to popular armed
resistance, guerilla action,
inability to maintain
sufficient religious police
cadre
CR 5.2 vulnerable to
inadequate training of
religious jurists
CR 5.3 Vulnerable to
attrition of female police
cadre
CR 5.4 Vulnerable to
disruption of financial
network, sabotage
CR 5.5 and 5.6 Vulnerable
to loss of territory, inability
to enforce ban on education
due to weakening L&E
capability, underground
education and justice
system
6 Regulate
Economic
Activity
6.1 Set and enforce
economic regulations,
quality standards on food
6.2 Control distribution of
commodities and
consumer goods to
population
6.3 Control and set monetary
policy
6.4 Approval, and
CR 6.1 Vulnerable to
breakdown in enforcement
and information capability,
lack of agricultural and
trade capabilities
CR 6.2 is vulnerable to
trade embargos, inability to
pay for imported goods.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE F OF ANNEX C
bureaucracy to set
production goals,
manage marketplaces
and cross border trading
6.5 Regulate and tax trade,
including internationally
CR 6.3 is vulnerable to
inflation, counterfeiting, loss
of territory
CR 6.4 is vulnerable to loss
of bureaucrats, inability to
train managerial personnel,
corruption, tightening of
border control
CR.5 Monitoring and
accounting of trade,
effective enforcement
capabilities
CENTER OF GRAVITY ANALYSIS – ISIL
IDENTIFIED COG #2: INTEGRATED, INDEPENDENT FINANCIAL RESOURCES
# Critical
Capability
Critical Requirements Critical Vulnerabilities Comments & References
1 Extract and
Monetize
Natural
Commodities
1.1 Extract natural resources 1.1.1Extraction Site (including crude oil and other minerals) 1.1.2 Processing Facilities, including fixed and mobile refineries 1.1.3 Trained personnel to operate and maintain extraction facilities
1.2 Agriculture
1.2.1 Irrigation, farmland,
equipment
1.2.2 Storage facilities, such
as grain silos
1.3 Network of traders and
transportation
1.3.1 Middlemen to facilitate
commodities export
1.3.2 Tankers, pipelines, roads
to move commodities
1.4 Bureaucracy to manage,
oversee and collect funds
from trade
1.5 Buyers in hostile territories
and aboard to purchase
commodities
CR 1.1, 1.1.1, 1.1.2, 1.2,
1.2.1, 1.2.2, 1.3.2, and 1.4
are vulnerable to kinetic
action, loss of specialized,
value adding economic
partners
CR 1.2 Ability to attract and
retain sufficiently trained
personnel (including pay,
security and desire to work
for regime)
CR 1.1.2 is vulnerable to
capture or destruction
CR 1.2 is vulnerable to
drought, disease, loss
agricultural personnel from
ISIL purges
CR 1.3.1 is vulnerable to
legal crackdown in non ISIL
territory
CR 1.4 is vulnerable to
inability to obtain market
information, loss of trading
partners, wartime losses,
neutralization of
management bureaucracy,
enemy sabotage and
*Extracted mineral
commodities include
primarily oil, as well as
natural gas and potash
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE G OF ANNEX C
deception, bribery
CR 1.5 is vulnerable to
local law and international
enforcement and financial
sanctions, plunging
commodities prices,
reduction in foreign
demand
2 Violent
Leveraging of
non-Group
Assets
2.1 Looting, usage and sale of
personal, commercial and
government property
2.2 Banks with large onsite cash
deposits and valuables*
2.3 Capture and use of heavy
weapons and dual use
equipment like construction
machines,
telecommunications
CR 2.1 Vulnerable to
depletion of lootable and
cash convertible property,
and lack of new conquests
CR 2.2 Vulnerable to
depletion of existing bank
deposits, lack of recent
bank captures
CR 2.3 Vulnerable to lack
of military victories to
maintain looting, inability to
maintain heavy assets
*ISIL is believed to have
seized up to $500 million in
cash from Mosul banks in
June 2014
3 Tax populace,
and Extortion
3.1 Extract fees and services
from population base
3.2 Monopoly of force to extort
populace, especially minority
groups
3.3 Foreign hostages to ransom
3.4 “Tax” civil servants receiving
payments from Baghdad and
Damascus
CR 3.1, 3.2 Vulnerable to
loss of urban areas, armed
resistance, breakdown of
ISIL law enforcement
CR 3.1 Vulnerable to
economic decline in ISIL
territory
CR 3.2 Vulnerable to
armed resistance, inability
to organize extortionist
activities
CR 3.3 Vulnerable to loss
of hostages from
executions and rescue,
unwillingness of
governments to pay
ransoms
CR 3.4. Vulnerable to
governments ceasing
monetary transfers, weight
of tax burdens inciting
discontent
4 Access to licit
and illicit
international
financial
network
4.1 Leverage contributions from
foreign sympathizers to meet
ISIL needs
4.2 Interlocutors’ ability to
smuggle physical cash into
ISIL territories
CR 4.1, 4.2, 4.3, 4.4
Vulnerable to intelligence,
especially electronic and
cyber, and subsequent law
enforcement actions
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE H OF ANNEX C
4.3 Wireless banking and digital
currencies to enable black
market financial activity
4.4 International banking system
to facilitate payments to ISIL’s
middle men traders
4.5 Compliant and negligent
foreign state authorities to
ensure ISIL access to
banking and other financial
services
CR 4.2 vulnerable to
disruption of smuggler
network
CR 4.4 vulnerable to
blacklisting of ISIL and
associates, heightened
enforcement of sanctions
CR 4.5 is vulnerable to
strengthened international
sanctions cooperation,
punishment/removal of
corrupt officials, criminals
and banks, international
pressure on compliant
states
5
Monetize
Cultural,
Heritage and
Social Assets
5.1 Established international
network to traffic antiquities
and other cultural goods
5.2 Museums and private
collections of antiquities
5.3 Control of antiquities sites
5.4 Logistical support, such as,
excavation tools, appraisal of
antiquities values, storage
5.5 Control of poppy and hashish
crops
5.6 Presence of smugglers and
smuggling routes
CR 5.1 Vulnerable to law
enforcement, interdiction,
unwillingness to purchase
ISIL sourced items
CR 5.2 is vulnerable to
capture and depletion of
museum holdings
CR 5.3 is vulnerable to
depletion of sites,
airstrikes, capture, theft
CR 5.4 is vulnerable to loss
of equipment and
personnel from armed
action and inability to
pay/maintain
CR 5.5, 5.6 is vulnerable to
ISIL ideological dictates,
unwillingness of narcotics
syndicates to cooperate
with ISIL, non ISIL law
enforcement action
6 Distribute and
Manage
Resources
towards ISIL
ends
6.1 Sophisticated accounting bookkeeping infrastructure to pay fighters, track revenue collection and budget public expenditures
6.1.1 Identify and transfer funds and resources to allied/subordinate groups
6.2 Financial resources to bribe officials, and pay civil servants
6.3 Ability to apply financial
resources to generate public
aid, such as food handouts
CR 6.1 Vulnerable to
military action to
incapacitate ISIL
bureaucracy, inability to
bureaucracy to gather,
process and act on
information due to lack of
training, degraded
information collection and
inability to replace lost
personnel
CR 6.1 Vulnerable to purges
* ISIL personnel costs
are higher compared to
other Middle Eastern
militants, especial for
foreign fighters and
families
**Ex Baathist
personnel are vital to
the bureaucratic
allocation of resources,
as well as smuggling
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE I OF ANNEX C
6.4 Access to smuggling
networks
6.5 Armed control of border posts
6.6 Corrupt local official in
neighboring countries to
facilitate trade
6.7 Strong market demand for
smuggled goods
6.8 Smugglers feel risk/reward
ratio is worthwhile
6.9 International supply of
smuggled items, including
consumer goods,
construction, capital
equipment and military
supplies
6.10 Neglect of border, controls by
neighboring nation states
of bureaucracy for
ideological, infighting and
political reasons
CR 6.1.1 and 6.2
Vulnerable to increasing
expenditures, against a
declining revenue base
CR 6.2 Vulnerable to civilian
and defector
unwillingness to work with
ISIL due to atrocities,
danger, and ideological
differences
CR 6.3 Vulnerable to
disruption and breakdown
of transportation
infrastructure, alternate
sources of public aid to
population
CR 6.4.1 Vulnerable to loss
and destruction of border
crossings and transport
infrastructure (lack of
maintenance)
CR 6.4.2 Vulnerable to law
enforcement, arrest of
corrupt officials,
international cooperation
CR 6.4.3 is vulnerable to
lack of market demand
from decreased economic
resources
CR 6.4.4 is vulnerable to
interdiction of smugglers,
increased fighting that
reduces smuggler
willingness for risk
CR 6.4.5 is vulnerable to
stricter border controls
and lack of funds to
create sufficient market
demand
CR 6.5 is vulnerable to
strengthened international
sanctions cooperation,
punishment/removal of
corrupt officials, pressure
on compliant state and
sub-state actors on ISIL
networks
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE J OF ANNEX C
trade, loss of border posts
to enemies, militarization
of border
CENTER OF GRAVITY ANALYSIS – ISIL
IDENTIFIED COG #3: LEVERAGING IDENTITY POLITICS AND MOBILIZING THE DISENFRANCHISED
# Critical Capability
Critical Requirements Critical Vulnerabilities Comments & References
1 Continue to Expand into and, Sustain Presence in, Ungoverned Spaces
5.1 Populated areas suffering
from a collapse in central
governance
5.2 Presence of armed groups in
communal violence
5.3 Access to globalized
networks like transportation
and communications
5.4 Charismatic ideology and
accompanying military
success to standout from
other armed groups
5.5 Military and social
mobilization capabilities to
prevent establishment of
governance
CR 1.1 Vulnerable to stabilization by other forces, such as multi-national coalitions, as well as further destabilization from ecological collapse CR 1.2 Vulnerable to competition from other armed groups, and state intervention CR 1.3 Vulnerable to sanctions and restrictions by the international community. CR 1.4 Vulnerable to battlefield reversals, airstrikes, loss of charismatic leaders, and new battlefield success by other armed groups that draw away Salafist sympathy CR 1.5 Vulnerable to widespread popular support for government/discontent with ISIL that undermines its ability to prevent alternate narratives emerging among the population
2 Develop Narrative to Engage the Alienated and Unaligned
2.1 Exploit sense of Sunni disempowerment, persecution
2.2 Presence of veteran cadre to attract and inspire Sunni fighters
2.3 Use Coalition airstrikes and Iraq/Syrian atrocities to recruit new fighters
2.4 Establish relations with tribal leaders and ex-Baathists to draw upon their support bases
2.5 Narrative tailored to: 2.5.1 Foreign Jihadis 2.5.2 Adventure Seekers
CR 2.1 Vulnerable to perceived ISIL weakness from military defeats, political accommodation with government, emergence of alternative political-military Sunni vehicle
CR 2.2 Vulnerable to defection of local Sunnis, disagreements over ISIL rule
CR 2.3 vulnerable to airstrikes, combat attrition
Leveraging Identity Politics and Engaging the Disenfranchised
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE K OF ANNEX C
2.5.3 Ex-Ba’athists 2.6 Alienated Persons/Outsiders
CR 2.4 vulnerable to reduction/standardization of casualty invites, overshadow by ISIL atrocities
CR 2.5 vulnerable to Baath/tribal defections, unwillingness to join due to ISIL ideology and actions, attempts to grab power, lack of resources, existing arrangements with ISIL enemies, perceived regional/ethnic favoritism
3 Identify, Align and Leverage other Armed Groups
3.1 ISIL perceived success and control of territory to encourage coalition building to create narrative of dominance and expectations of future victories
3.2 Offer training, funding and advisers to subordinate groups
3.3 Existence of multiple, independent Salafist armed groups willingly to align with ISIL approaches, values and identity
3.3.1 Organizational flexibility to integrate and control new allies/franchises
CR 3.1 Vulnerable to visible military setbacks, breakdown of order in ISIL territory, eclipse by military successes of other Salafist groups, split in ISIL
CR 3.1 Vulnerable to visible defeats, ungoverned population, expressed dissatisfaction by Muslim clergy and masses
CR 3.2 Vulnerable to reduced financial resources, loss of trained personnel to liaison with subordinate groups
CR 3.3 Vulnerable to factional dissatisfaction with ISIL strategy and leadership, especially in operational matters and division of authority
CR 3.3 Vulnerable to ISIL affiliates in Libya, Nigeria and elsewhere could renounce ISIL/their defeat would tarnish ISIL ‘brand’
CR 3.4 Vulnerable to leadership struggle, internal politics which degrades ISIL ability to organize and delegate subordinate units
4 Organizational Infrastructure to Manage Relationships
4.1 Ex Ba’ath officers and officials to administer territories
4.2 Veteran Jihadis from the Iraq War with credibility and capability to lead
4.3 Funds to pay local and foreign fighters, civilian
CR 4.1 Vulnerable to defections, ideological purges, assassinations, and airstrikes
CR 4.1 Vulnerable to disenfranchisement and dissatisfaction of ex
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE L OF ANNEX C
services, informers 4.4 Intelligence and
counterintelligence activities 4.5 Tactical understandings with
other Salafist groups and Damascus, in order to focus resources on other opponents
3.4 Align capabilities and interests with other groups through flexible ISIL hierarchy
Baathist officers
CR 4.1 Vulnerable to popular and jihadi animus against ex Baathist personnel
CR 4.2 Vulnerable to attrition of veteran cadre by kinetic means, losing credibility from association with ex-Baathist ‘opportunists’
CR 4.3 Vulnerable to loss of financial resources
CR 4.4 Vulnerable to loss of intelligence personnel (especially ex Baathist) in combat, airstrikes, purge/power struggles, defections, infiltration CR 4.5 Vulnerable to opportunism from Assad and Salafists, such as attacking ISIL during weakness, cutting deals with other ISIL opponents
5 Use of Terror to Spread Narrative of ISIL Invincibility and Prowess
5.1 Graphic, public punishments
of religious and political
opposition through
executions, maiming
5.2 Use of suicide bombings, execution of POWS to create terror among enemy forces 5.3 Use of ISIL intelligence to ferret out political opposition, rivals and regime personnel, to purge 5.4 Disseminate recordings of ISIL videos to cement ISIL reputation as most brutal armed actor in the Middle East
CR 5.1 and 5.2 Vulnerable to alienating general population and less dedicated ISIL fighters, reducing efficacy of ISIL governance CR 5.1 Vulnerable to opposition from partners like ex Baathists who view such violence as counterproductive CR 5.2 Vulnerable to endangering to the death opposition from enemy forces, instead of surrender or defection CR 5.3 Vulnerable to decreased efficacy of ISIL security apparatus from wartime attrition, backlash from brutality hinder willingness of population to cooperate with ISIL personnel in maintaining order
CR 5.4 Vulnerable to inability to distribute digital and physical media, dissemination could alienate potential ISIL popular support
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE M OF ANNEX C
6 Globalize the Struggle
6.1 Accessible transportation for foreign volunteers
6.2 Loose border and visa controls, especially in countries bordering ISIL territory
6.3 Effective propaganda to globally reach disaffected global audiences
6.4 Current foreign volunteers extol ISIL rule on media platforms Claim responsibility for lone wolf attacks aboard to create impression of broader global capability even if none exists, and to further strengthen perception and brand association
CR 6.1 Vulnerable to coordinated international crackdown and control on travel, visa regimes
CR 6.2 Vulnerable to increased law enforcement, militarized borders, international information sharing
CR 6.3 Vulnerable to sustained grassroots counter-narrative from Muslims, loss of access to social and media platforms, ISIL military reversals, displacement of ISIL in public consciousness by other ‘outsider’ appealing groups
CR 6.3 Vulnerable to decline in ISIL prestige and power, as ISIL becomes unable to escalate message with further brutality and victories, imploding ISIL civilian life discredits alternative narrative to globalization
CR 6.4 Vulnerable to foreign volunteers defecting and deserting, denouncing ISIL CR 6.5 Vulnerable to heighted counterterrorist activities, disbelief over ISIL actual involvement, ‘normalization’ of lone wolf attacks as criminal activity, vs. terrorism
*ISIL, in terms of population and territory controlled, is by far the most successful Salafist non-state group in history
Summary
7. ISIL has three operational Centers of Gravity which aid its ability to expand, control and maintain a proto-state
center around core territory; its perceived Salafist legitimacy stemming from its claim as being the new
Caliphate; its ability to generate revenue unprecedented for a proto-state/NGO actor; and its ability to
leverage identity politics into alliances and allegiance. ISIL’s claim of establishing a Caliphate gives it a sense
of religious legitimacy that no other Salafist group has been able to claim to date, as well as triggering a range
of religious duties that are dormant without a physical Caliphate. Its vast fundraising and resource extraction
operations enable it to increase its military strength, as well as provide a modicum of governance in
conquered territory. Holding territory establishes a practical claim to sovereignty, which provides it with both
an armed base to build military strength and draw in motivated believers. ISIL benefits from its alliance of
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE N OF ANNEX C
veteran jihadi warriors and ex-Baathist middle ranking officials to establish organization competence which
has leveraged wartime chaos in Iraq and Syria to systematically eliminate fractured opposition.
8. ISIL’s propaganda capabilities, while important and impressive, are not considered a COG in and of itself as it
is assessed that ISIL could continue to function and fight without (albeit not as well or as successfully)
Further, while they have demonstrated a capability well beyond other groups, their techniques are generally
an evolution of previously used successful techniques and not unique to the group. Propaganda is an
enabling factor that enables ISIL to build on its core strengths, such as the legitimacy of its claim to Caliphate
and the universal implications thereof, but it is a function, just like possessing conventional military capabilities
such as massed artillery batteries and mechanized formations. Additionally, the general Sunni population of
Iraq and Syria cannot be considered a COG for ISIL, given that despite control of between six to eight million
people, the core ISIL local fighting strength is estimated to be 30,000 at best.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE A OF ANNEX C
ANNEX D
ISIL KEY BATTLE ANALYSIS EVOLVED
Mosul
Result: Victory
Factors: Sleeper cells already inside Mosul were able to report on the disposition and movement of Iraqi forces,
before launching flanking attacks on Iraqi Security Forces (ISF) during the attack. Additionally, ISIL used vehicle
borne improvised explosive devices (VBIED), primarily built from civilian vehicles and captured Humvees, to
devastate Iraqi formations and positions (there were no Iraqi armored vehicles in Mosul). ISIL commanders also
communicated with their sleeper cells, and motorized infantry, through use of portable telecommunications.
Enhancements: To improve upon ISIL battlefield performance at Mosul, the usage of light mechanized forces to
further rout fleeing Iraqi forces would increase the psychological and material effects of the victory. Such
mechanized forces are likely to be 4X4 and 6X6 wheeled infantry fighting vehicles, such as the Norinco WZ551,
Otokar Cobra, Emirati Nimr or South African RG-34. Such light IFVs would be mobile enough for cross country
capability in most Iraqi/Syria terrain, while also carries heavy firepower in the form of anti-tank missiles and
autocannons. Additionally, light IFVs would be cheaper and easier to maintain, as well as capture.
Precision guided artillery fire, in the form of laser guided Krasnopol or Copperhead laser guided 152/155mm
shells, would aid operations in urban areas centered around rivers, such as Mosul. They could target bridges
being used by security forces moving across the river, in response to ISIL activity. Even more, laser and satellite
navigation guided artillery rounds would allow ISIL forces to maintain an around the clock and effective
bombardment of enemy forces, further destroying their morale and material capability. Sleeper cells would be
very useful in identifying targets for and evaluating the effectiveness of such artillery strikes. Precision artillery
could neutralize enemy airfields, denying close air support from helicopters, as well as preventing evacuation of
medical casualties and deployed reinforcements.
Kobane
Result: Defeat
Factors: Coalition airstrikes were the most significant factor in ISIL’s defeat at Kobani; the destruction of fighting
formations, supplies, armored vehicles and artillery neutralized ISIL material and numerical advantages against
the Peshmerga. The Peshmerga/FSA were able to coordinate in urban fighting to use flanking maneuvers to
surround ISIL strongpoints in Kobani.
Enhancements: ISIL’s failure at Kobani can be laid on several factors, such as arrival of enemy formations,
Coalition airstrikes which disrupted ISIL C4I infrastructure and prevented the massing of forces needed to capture
decisive urban objectives. The solution to this shortcoming would be to increase the lethality of individual ISIL
small units and persons with advanced small urbans. Man portable smart grenade launchers, such as the
Chinese ZH-05 or South Korean K-11 assault rifles would give ISIL infantry a quick and reliable source of fire
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE B OF ANNEX C
support to attack entrenched enemies sheltering inside buildings and fortifications. Routing Peshmerga and their
FSA allies from Kobani would be accomplished more quickly if ISIL personnel had the ability to fire programmable
20mm airburst grenades through the windows of enemy buildings. Dispersing fire support to the individual soldier
would greatly mitigate the effects of Coalition airstrikes on ISIL fire support: hitting a T-55 tank is easy enough, but
a single soldier in urban combat would be rather out of the question.
Jamming enemy communications would also degrade the ability of enemy forces to communicate intelligence and
command during fluid urban fighting. Degrading communications through relatively portable electronic warfare
measures would also decrease the ability of Peshmerga and other forces to call in Coalition airstrikes in real time.
Tikrit
Result: Defeat
Factors: The great number of Iraqi forces, about 30,000 Iraqi Security Forces, militia and tribal forces, used their
superior numbers to surround Tikrit and gradually capture the city through attritional warfare. Iranian advisers
from the Iranian Revolutionary Guard Corps were crucial in coordinating the movement among those disparate
forces, as well as providing specialized functions such as intelligence. The ability of the Iraqis to sustain the vast
logistical needs of the 30,000 force by resupplying food, fuel and ammunition enabled Iraq to maintain its
numerical and technological edge during the siege.
Enhancements: ISIL was almost guaranteed to lose Tikrit due to the vast number of Iraqi forces arrayed against
it, with 30,000 ISF, militia and tribal fighters against roughly one thousand ISIL fighters. However, the
cumbersome advance of Iraqi forces suggested that at a minimum, Iraqi forces were constrained in part by the
need to resupply their vast logistical footprint. Longer ranged precision guided battlefield munitions (i.e. ATGMs,
PGM mortar rounds), perhaps mounted on mobile platforms like technical, can attack Iraqi lines of communication
and rear areas.
ISIL forces could use SIGINT capability to discern location and timing enemy attacks/air-artillery strikes.
Intercepting enemy communications at the tactical level would allow them to evacuate compromised and exposed
positions, while concentrating urban forces to meet the axis of enemy attacks.
Long range snipers to kill enemy commanders and foreign advisers would provide ISIL with another way to prevail,
or at least lengthen the duration, of defensive battles. In addition to heavy sniper rifles such as the Barrett M107
and Chinese M99 50 caliber rifles for making shots up to 2km, computer aided “smart shooting” technology like
Trackpoint would massively increase the lethality of even mediocre ISIL snipers. The primary mission of ISIL
snipers in defending urban centers would be to single out and kill high value targets such as enemy commanders
and foreign advisers. Killing foreign advisers like IRGC or US advisory personnel would offer several benefits; it
would demoralize local and foreign enemy forces, serve as a propaganda victory (especially against western
personnel), and force more operational restrictions upon surviving foreign advisors, thus decreasing their efficacy.
Of special note is that heavy sniper and anti-material rifles have already been seen in the hands of Syrian rebels
like the FSA, it is also highly likely that ISIL forces also have access to such weaponry already.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE C OF ANNEX C
Ramadi
Result: Victory
Factors: After nearly a year of sustained fighting in the Ramadi city environs, ISIL forces routed Iraqi national and
local forces. Key factors in Ramadi included the usage of armored VBIEDs, especially Humvees, and armored
bulldozers that broke through Iraqi strong points. ISIL forces also took advantage of a sandstorm to use as cover
against airstrikes, as they mass forces and marched into Ramadi. Additionally, long range radios were used by
ISIL units to coordinate maneuver and suicide bombings.
Enhancements: Improvements to ISIL’s performance at Ramadi would include the ability to engage and destroy
routed Iraqi forces. Given that Coalition airstrikes could aid retreating Iraqi forces, it would be necessary for
pursuing ISIL forces to quickly force close quarter combat with Iraqi forces in order to reduce the efficacy of said
airstrikes. To that end, ISIL forces would need light mechanized forces using small wheeled AFVs, as opposed to
motorized technical units, to have rapid all terrain maneuver capability.
And to reduce airstrike attrition during transit, such mechanized units would need training and sufficient command
and control to move in small units while converging on routed enemy forces. It would be difficult for ISIL to get
such training; most of its ex Baathist officers have had no experience in mechanized warfare for over a decade at
this point. To track enemy forces on the move, ISIL forces would need real time intelligence, in the form of light
UAVs and radio intercept equipment to anticipate that the axis of enemy retreat.
Palmyra
Result: Victory
Factors: ISIL motorized desert forces were the key to capturing Palmyra in May 2015, they first bombarded
government position with missiles, before moving in to capture key infrastructure like airfields, ammunition dumps
and oil fields. Despite heavy artillery fire and several Syrian counterattacks, ISIL routed Syrian forces from
Palmyra by May 26th
. ISIL forces had also used HUMINT and battlefield reconnaissance to gauge the strength of
Syrian Army positions and checkpoints, before moving in to seize those areas. Syrian forces since May 2015
have made occasion efforts at recapturing infrastructure around Palmyra, especially natural gas fields.
Enhancements: The biggest boost that ISIL could have received at Palmyra would have been in stronger
intelligence gathering capabilities. This would likely be the form of light, truck launched UAVs such as the RQ-7
Shadow, a 350kg UAV which is small enough to be easily mobile, while having enough robust intelligence
gathering capabilities to support division level units. ISIL could capture such UAVs from Syrian or Iraqi forces,
who already operate such American, Chinese and Iranian light UAVs. In addition to intelligence gathering, ISIL
forces could repurpose such light UAVs into kamikaze attack missions, for the purpose of terrorizing enemy forces
before land assaults.
ISIL could use counterbattery fire as well. The Syrian artillery was a hindrance to ISIL movement during the Battle
of Palmyra, as well as providing fire support for Syrian counterattacks. Given that ISIL deployed large quantities of
missiles during Palmyra to destroy outlying Syrian outposts, counterbattery radars radio intercept equipment and
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE D OF ANNEX C
UAVs would allow ISIL artillery to engage in counterfire missions against enemy artillery, forcing them to either
shift engagement away from ISIL infantry and armor, or move out of ISIL missile range.
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE A OF ANNEX C
ANNEX E
BIBLIOGRAPHY EVOLVED
A. Abdelhak Mamoun, “Haditha Police shoots down reconnaissance drone belonging to ISIS in western
Anbar” for Iraqi News, September 27, 2015, http://www.iraqinews.com/baghdad-politics/haditha-police-
shoots-reconnaissance-drone-belonging-isis-western-anbar/
B. Ahmed Meiloud, “This is how IS survived a year of bombing and ground war” in Middle East Eye, June 2,
2015, http://www.middleeasteye.net/columns/how-survived-year-bombing-and-ground-war-
1619065958#sthash.whU0aspm.dpuf
C. Alan Taylor, “DIY Weapons of the Libyan Rebels”, The Atlantic, Jun 14, 2011,
http://www.theatlantic.com/photo/2011/06/diy-weapons-of-the-libyan-rebels/100086/
D. Amanda Macias and Jeremy Bender, “Here's How The World's Richest Terrorist Group Makes Millions
Every Day”, in Business Insider, Aug 27, 2014 http://www.businessinsider.com/isis-worlds-richest-
terrorist-group-2014-8
E. Associated Press, “ISIS Dug Network of Tunnels Under Conquered Iraqi City of Sinjar” in NBC News,
November25, 2015, http://www.nbcnews.com/storyline/isis-terror/isis-dug-network-tunnels-under-
conquered-iraqi-city-sinjar-n469366
F. Aymenn Jawad Al-Tamimi, “Archive of Islamic State Administrative Documents”, Aymenn Jawad Al-
Tamimi's Blog, January 27, 2015, http://www.aymennjawad.org/2015/01/archive-of-islamic-state-
administrative-documents
G. Ben Hubbard, “Offering Services, ISIS Digs in Deeper in Seized Territory”, New York Times, Middle East,
June 16, 2015, http://www.nytimes.com/2015/06/17/world/middleeast/offering-services-isis-ensconces-
itself-in-seized-territories.html?_r=0
H. Bernard F. Fall, "The Theory and Practice of Insurgency and Counterinsurgency," Naval War College
Review, Winter 1998, first published April 1965
I. Bilal Y. Saab, “Can the House of Saud Survive ISIS?” in Foreign Affairs, June 11, 2015
https://www.foreignaffairs.com/articles/2015-06-11/can-house-saud-survive-isis
J. Bill Roggio, “Islamic State Documents Takeover of Syrian Airbase”, Long War Journal, August 27, 2014,
http://www.longwarjournal.org/archives/2014/08/islamic_state_photos.php
K. Bill Roggio and Caleb Weiss, “Islamic State utilizes 7 foreigners in Baiji suicide assaults”, The Long War
Journal, June 14, 2015, http://www.longwarjournal.org/archives/2015/06/islamic-state-utilizes-7-
foreigners-in-baiji-suicide-assaults.php
L. Bruce Hoffman, “Today's Highly Educated Terrorists”, The National Interest, September 15, 2010,
http://nationalinterest.org/blog/bruce-hoffman/todays-highly-educated-terrorists-4080
M. Bryan Price, et al, “The Group that Calls Itself a State The Evolution and Challenges of the Islamic State”,
Combating Terrorism Center, West Point, December 16, 2014, https://www.ctc.usma.edu/posts/the-
group-that-calls-itself-a-state-understanding-the-evolution-and-challenges-of-the-islamic-state
N. Charles C. Caris & Samuel Reynolds, “ISIS Governance in Syria”, Institute for the Study of War, 2014,
http://www.understandingwar.org/sites/default/files/ISIS_Governance.pdf
O. Charles Lister, “Cutting off ISIS' Cash Flow” For Brookings, October 24, 2015
http://www.brookings.edu/blogs/markaz/posts/2014/10/24-lister-cutting-off-isis-jabhat-al-nusra-cash-flow
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE B OF ANNEX C
P. Christiane Gruber, “Ignored and Unreported, Muslim Cartoonists are Poking Fun at ISIS”, Newsweek,
Opinion, May 14, 2015, http://www.newsweek.com/ignored-and-unreported-muslim-cartoonists-are-
poking-fun-isis-332040
Q. Christoph Reuter, “The Terror Strategist: Secret Files Reveal the Structure of Islamic State” in Spiegel
Online, April 18, 2015 http://www.spiegel.de/international/world/islamic-state-files-show-structure-of-
islamist-terror-group-a-1029274.htmlDave Majumdar, “Syrian Military Claims to Have Destroyed Two
ISIS MiGs”, USNI News, Aviation, October 22, 2014, http://news.usni.org/2014/10/22/syrian-military-
claims-destroyed-two-isis-migs
R. David Kilcullen, Counterinsurgency, New York: Oxford University Press, 2010
S. Financial Action Task Force (FATF), Financing of the Terrorist Organisation Islamic State in Iraq and the
Levant (ISIL), February 2015, www.fatf-gafi.org/methodandtrends/documents/financing-of-terrorist-
organisation-isil.html
T. Ghaid Sary, “Inside Mosul: Residents Recount How IS Took Over Their Lives”, BBC News, Middle East,
June 9, 2015, http://www.bbc.com/news/world-middle-east-32957861
U. Gillian Mohney, “The Islamic State Might Be Losing the War, But They’re Still Winning the Social Media
Battle”, Vice News, Islamic State, June 16, 2015, https://news.vice.com/article/the-islamic-state-might-be-
losing-the-war-but-theyre-still-winning-the-social-media-battle
V. Graeme Wood, “What ISIS Really Wants” in The Atlantic, March 2015,
http://www.theatlantic.com/magazine/archive/2015/03/what-isis-really-wants/384980/
W. Hannah Allam, “Meticulous Bookkeeping Bolster’s ISIL’s March on Baghdad”, Sydney Morning Herald,
July 4, 2014, http://www.smh.com.au/world/meticulous-bookkeeping-bolsters-isils-march-on-baghdad-
20140704-zsvyf.html
X. Jacob Siegel, “ISIS is Using Social Media to Reach YOU, Its New Audience”, The Daily Beast, August
31, 2014 http://www.thedailybeast.com/articles/2014/08/31/isis-s-use-of-social-media-to-reach-you-its-
new-audience.html
Y. Jaime Dettmer, “Has ISIS Lost Its Head? Power Struggle Erupts with Al-Baghdadi Seriously Wounded”,
The Daily Beast, Reuters, May 10, 2015, http://www.thedailybeast.com/articles/2015/05/10/has-isis-lost-
its-head-power-struggle-erupts-with-al-baghdadi-partially-paralyzed.html
Z. James C. Scott, The Moral Economy of the Peasant: Subsistence and Rebellion in Southeast Asia, New
Haven Ct: Yale University Press, 1978
AA. Jason Mojica, “Meet the Saudi Sheikh Who Joined, Then Quit, the Islamic State”, Vice News, Middle
East, June 16, 2015, https://news.vice.com/article/meet-the-saudi-sheikh-who-joined-then-quit-the-
islamic-state
BB. Jeremy Bender “An ISIS defector explained a key reason people continue joining the group” for the
Business Insider, Nov 18, 2015, http://www.businessinsider.com/isis-defector-explains-why-people-
continue-joining-group-2015-11
CC. Jesse Singal, “Why ISIS Is So Terrifyingly Effective at Seducing New Recruits”, New York Magazine,
Science of Us, August 18, 2014, http://nymag.com/scienceofus/2014/08/how-isis-seduces-new-
recruits.html
DD. Jessica Lewis McFate, “The ISIS Defense in Iraq: Countering an Adaptive Enemy” Institute for Study of
Warfare, Middle East Security Report, no. 27, May 2015, http://www.understandingwar.org/report/isis-
defense-iraq-and-syria-countering-adaptive-enemy
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE C OF ANNEX C
EE. Jethro Muller, “What is ISIS' appeal for young people?”, CNN, Middle East, February 25, 2015,
http://www.cnn.com/2015/02/25/middleeast/isis-kids-propaganda/
FF. Joel S. Migdal, Strong Societies and Weak States: State-Society Relations and State Capabilities in the
Third World, Princeton, NJ: Princeton University Press, 1988
GG. John Reed, “Rebel Tech: Four Wheelers and Rockets”, Defense Tech, July 10, 2011
http://defensetech.org/2011/07/10/rebel-tech-four-wheelers-and-rockets/
HH. Karl Vick, “As ISIS Grows Its Territory, It Becomes Increasingly Dangerous”, TIME, World, ISIS, June 15,
2015, http://time.com/3917097/as-isis-grows-its-territory-it-becomes-increasingly-dangerous/
II. Khales Joumah, “Unhappy Anniversary: Mosul Is ‘Safe, Clean’...and Run by ISIS”, The Daily Beast, June
15, 2015, http://www.thedailybeast.com/articles/2015/06/15/mosul-is-safe-clean-and-run-by-isis.html
JJ. Liz Sly, “Petraeus: The Islamic State isn’t our biggest problem in Iraq”, Washington Post, World View,
March 20, 2015, http://www.washingtonpost.com/blogs/worldviews/wp/2015/03/20/petraeus-the-islamic-
state-isnt-our-biggest-problem-in-iraq/
KK. Liz Sly, “The hidden hand behind the Islamic State militants? Saddam Hussein’s”, Washington Post,
Middle East, April 4, 2015, http://www.washingtonpost.com/world/middle_east/the-hidden-hand-behind-
the-islamic-state-militants-saddam-husseins/2015/04/04/aa97676c-cc32-11e4-8730-
4f473416e759_story.html?hpid=z1
LL. Louisa Loveluck, “Islamic State sets up 'ministry of antiquities' to reap the profits of pillaging” in The
Telegraph, May 30, 2015, http://www.telegraph.co.uk/news/worldnews/islamic-state/11640670/Islamic-
State-sets-up-ministry-of-antiquities-to-reap-the-profits-of-pillaging.htmlLouise Shelley, “Blood Money:
How ISIS Makes Bank” in Foreign Affairs, November 30, 2014,
https://www.foreignaffairs.com/articles/iraq/2014-11-30/blood-money
MM. Mark Mazzeti and Michael R. Gordon, “ISIS Is Winning the Social Media War, U.S. Concludes”, New
York Times, Middle East, June 12, 2015, http://www.nytimes.com/2015/06/13/world/middleeast/isis-is-
winning-message-war-us-concludes.html?_r=0
NN. Mark Hosenball and Mark Trevelyan “Coordinated Or Not, Attacks Show Islamic State’s Growing Reach”
Reuters, Jun 26, 2015 http://www.reuters.com/article/2015/06/26/us-security-attacks-
idUSKBN0P62F420150626?feedType=RSS&feedName=topNews&utm_source=twitter
OO. Martin Chulov, “ISIS: The Inside Story”, The Guardian, December 11, 2014,
http://www.theguardian.com/world/2014/dec/11/-sp-isis-the-inside-story
PP. Matthew Zuras, “ISIS Destroyed Hundreds of Boxes of American Chicken in Food-Starved Syria”, Vice,
Munchies, April 3, 2015, https://munchies.vice.com/articles/isis-destroyed-hundreds-of-boxes-of-
american-chicken-in-food-starved-syria
QQ. Michael Fitzsimmons, “Governance, Identity and Counterinsurgency: Evidence from Ramadi and Tal
Afar”, March 2013, Strategic Studies Institute, pp 123-126,
http://www.strategicstudiesinstitute.army.mil/pdffiles/pub1150.pdf
RR. Michelle Leung & Ellie Sandmeyer, “Muslim Leaders Have Roundly Denounced Islamic State, But
Conservative Media Won't Tell You That” In Media Matters For America, August 21, 2014,
http://mediamatters.org/research/2014/08/21/muslim-leaders-have-roundly-denounced-islamic-s/200498
SS. Mitchell Prothero, “Islamic State issues fake tax receipts to keep trade flowing” for McClatchy D.C.,
September 3, 2014 http://www.mcclatchydc.com/news/nation-world/world/middle-
east/article24772591.html
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE D OF ANNEX C
TT. Paul French, “The Tamil Tigers”, Air-force Technology, September 14, 2007, http://www.airforce-
technology.com/features/feature1270/
UU. Paul Kamolnick, “On Self-Declared Caliph Ibrahim’s May 2015 Message to Muslims”, Small Wars
Journal, June 4, 2015, http://smallwarsjournal.com/jrnl/art/on-self-declared-caliph-ibrahim%E2%80%99s-
may-2015-message-to-muslims
VV. Peter Bergen, Emily Schneider, “Hezbollah Armed Drone? Militant’s New Weapon”, CNN, September 22,
2014, http://www.cnn.com/2014/09/22/opinion/bergen-schneider-armed-drone-
hezbollah/index.html?iref=allsearch
WW. Raja Abdulrahim, “Islamic State Accused of New Chemical Weapons Attack in Syria” in The Wall Street
Journal, Aug. 23, 2015 http://www.wsj.com/articles/islamic-state-accused-of-using-chemical-weapons-in-
syria-1440353562
XX. Robert Beckhusen, “Playstation-Controlled DIY Tank May Be The Wildest Weapon Yet In The Syria
War”, Wired, October 12, 2012, http://www.wired.com/2012/12/rebel-armor/
YY. Robert Thompson, Defeating Communist Insurgency: Lessons from Malaya and Vietnam, New York:
Praeger Publishers, 1966
ZZ. Rukmini Calimachi, “ISIS and the Lonely Young American” in the New York Times, June 27, 2015
http://www.nytimes.com/2015/06/28/world/americas/isis-online-recruiting-american.html
AAA. Sarah Almukhtar, “ISIS Finances Are Strong”, New York Times, Middle East, May 19, 2015,
http://www.nytimes.com/interactive/2015/05/19/world/middleeast/isis-finances.html?_r=1
BBB. S.B. “Where Islamic State gets its money” in The Economist, January 4th, 2015,
http://www.economist.com/blogs/economist-explains/2015/01/economist-explains
CCC. Simon Cottee, “What Motivates Terrorists? It’s an important question. But is it the best one to be
asking?”, The Atlantic, Global, June 9, 2015,
http://www.theatlantic.com/international/archive/2015/06/terrorism-isis-motive/395351/
DDD. Simon Cottee, “Why It's So Hard to Stop ISIS Propaganda”, The Atlantic, Global, March 2, 2015,
http://www.theatlantic.com/international/archive/2015/03/why-its-so-hard-to-stop-isis-propaganda/386216/
EEE. Stathis N. Kalyvas, The Logic of Violence in Civil War, New York: Cambridge University Press, 2006
FFF. Steve Johnson, “Libyan Rebels Build Nifty Remote Control Guns”, The Firearm Blog, June 23, 2011,
http://www.thefirearmblog.com/blog/2011/06/23/libyan-rebels-build-nifty-remote-control-guns/
GGG. Terje Ostebo, “Boko Haram's Allegiance to ISIS Isn't Nearly as Scary As It Sounds”, The New Republic,
http://www.newrepublic.com/article/121340/boko-harams-pledge-allegiance-isis-doesnt-mean-anything
HHH. Terrence McCoy, “ISIS Just Stole $425 M, Iraqi Governor Says, and Became the ‘World’s Richest
Terrorist Group”, The Washington Post, June 12, 2014 http://www.washingtonpost.com/news/morning-
mix/wp/2014/06/12/isis-just-stole-425-million-and-became-the-worlds-richest-terrorist-group/
III. Tyler Rogoway, “ISIS Used This Huge Crudely Modified Truck To Attack A Key Syrian Air Base”, Foxtrot
Alpha, Aug 24, 2015, http://foxtrotalpha.jalopnik.com/isis-used-this-huge-crudely-modified-truck-to-attack-
a-1726246835
JJJ. United Nations, Analytical Support and Sanctions Monitoring Team, “The Islamic State in Iraq and the
Levant and the Al-Nusrah Front for the People of the Levant: report and recommendations submitted
pursuant to resolution 2170(2014)”, November 2014,
http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2014/815
ISIL’S EVOLVED IRREGULAR THREAT
WWW.NOETICGROUP.COM PAGE E OF ANNEX C
KKK. United Nations Security Council, Letter Dated 13 November 2014 from the Chair of the Security Council
Committee pursuant to resolutions 1267 (1999) and 1989 (2011) concerning Al-Qaida and associated
individuals and entities addressed to the President of the Security Council, S/2014/815, November 14,
2014
LLL. U.S. Department of Defense, Department of Defense Dictionary of Military and Associated Terms; Joint
Publication 1-02. November 8, 2010, http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf
MMM. William McCants, “Inside the ISIS Blueprint for Winning”, for The Daily Beast, September 29, 2015,
http://www.thedailybeast.com/articles/2015/09/29/inside-the-isis-blueprint-for-winning.html
NNN. William McCants, The Believer, The Brookings Institution, September 1, 2015,
http://www.brookings.edu/research/essays/2015/thebeliever?utm_content=buffer40489&utm_medium=so
cial&utm_source=twitter.com&utm_campaign=buffer#.VeWnvrpP3iA.email
OOO. Zaid Al-Ali, “Tikrit, Iraq’s Abandoned City”, The New York Review of Books, May 2015,
http://www.nybooks.com/blogs/nyrblog/2015/may/04/tikrit-after-isis/
PPP. Zeki Sarıtoprak, “Professor Sarıtoprak: ‘ISIS uses eschatological themes extensively for their ideology”,
Today’s Zaman, Interviews, March 2, 2015, http://www.todayszaman.com/interviews_professor-
saritoprak-isis-uses-eschatological-themes-extensively-for-their-ideology_374099.html
QQQ. “ISIS Captured 2300 Humvee Armored Vehicles from Iraqi Forces in Mosul”, Agence France Presse, The
Guardian, May 31, 2015, http://www.theguardian.com/world/2015/jun/01/isis-captured-2300-humvee-
armoured-vehicles-from-iraqi-forces-in-mosul
RRR. “The Islamic State’s Ideology and Propaganda”, The Brookings Institution, March 11, 2015,
http://www.brookings.edu/~/media/events/2015/03/11-isis-ideology-
propaganda/20150311_isis_propaganda_transcript.pdf