Expert Commentary

The ISIS Paradox: Strength in Weakness

March 10, 2016 | Dr. Michael Ryan

ISIS is a terrorist group attempting to become a state. It inherited al Qaeda's strengths, including international networks, battle tested military doctrine and strategy, and a radical religious ideology, Jihadi Salafism. The ISIS ideology has a proven record in recruiting foreign fighters worldwide to support jihadist insurgencies and terror cells.

ISIS also has some competitive advantages over al Qaeda that make it currently more dangerous to American interests and security. These advantages include the powerful imagery of the Islamic Caliphate battling the forces of tyranny and corruption in the fires of the end-times and a mastery of online social media platforms to deliver its messages and establish its global brand. ISIS has also exceeded al Qaeda in its mastery of Islamic religious apologetics. Recruited Baathist military and intelligence specialists help plan brutally coercive governance strategies inherited from the master of rule-through-terror, Saddam Hussein. The organization's character as an adaptive guerrilla group is allowing it to spread to dozens of new locations, vastly complicating America's military and intelligence campaign against it.

All of these advantages, however, have inherent weaknesses to be exploited, if we have the will, patience, and a coherent strategy to attack them. For example, the ISIS group's greatest achievement, seizing and holding territory, is also a strategic flaw, because it must defend its base with forces that cannot match the military power of the United States and its coalition. Losing territory at the center has the potential to weaken its appeal, if the United States finally mounts an effective counter-narrative and prevents  "provinces" from seizing and governing new territories.

ISIS Military Doctrine: the Guerrilla Strategic Wrapper

Much has been made of the ISIS group's graduation from a terrorist group in Iraq to a proto-state between Iraq and Syria with a conventional military force and an actual government. However, most of its successful military engagements involve small unit guerrilla tactics, suicide bombings, and ferocious propaganda. Moreover, its government has proven to be hollow with sadistic executions a key to its survival.

Like al Qaeda, ISIS follows a three-stage Maoist guerrilla warfare strategy adapted to the Islamic context. First ISIS engages in terrorism and light guerrilla attacks to destabilize an area and induce government forces to retreat. Next they seize the area and set up primitive governance offering security, food, and basic services. Finally, as they seize more areas, they loosely consolidate "liberated" areas into a larger region that takes on the aspect of a more permanent proto-state with more conventional military forces and government.

This process is iterative, as they demonstrated in Syria and Iraq, where they can be in stage one in one location and stage two or three in others. For example, if they are driven out of a city such as Ramadi or Tikrit, they may revert there to stage one (terrorism), while preparing to retake the city and escalate to stage two. In addition, when they sustain smaller losses in areas they hold, they increase terrorist activity in a newsworthy area such as Baghdad. In fact, an increase in random terrorist attacks may often be a sign that ISIS is suffering setbacks, not as a demonstration of its strength. This is the paradox of guerrilla strategy in which weakness manifests as strength and strength often is disguised weakness.

As ISIS faces an uncertain future: regular setbacks in Syria/Iraq motivate them to expand into other areas, and their slogan, “surviving and expanding,” entails increased needs for fighters, and money to support them and their expanded holdings. Ultimately, the ISIS strategy is about influencing international news media to see them as winners, while terrorizing local population to accept what they cannot love. Both of these tactics are showing early signs of failure.

Are ISIS Wilayat as Dangerous as al-Qaeda Affiliates?

ISIS is currently fraying in Iraq and Syria as a result of the coalition effort against it and its own brutal governance. Supply lines between Turkey and Syria are problematic at best, as are lines of communication between Raqqa and both Aleppo and Mosul. Furthermore, this fractured proto-state has been forced to reduce its fighters’ pay by half and is struggling to maintain control of its captive populace. Unfortunately, this weakness at the center inevitably means that there will be signs of strength elsewhere, as long as its foundational narrative and ideology remain intact. And should the proto-state fail without a strong government to take its place, ISIS will revert to its jihadist guerrilla roots.

The ISIS group's dramatic move of fighters to reinforce its outpost in oil-rich, chaotic Libya has the potential to become extremely dangerous. Similarly, ISIS moves to Afghanistan and Pakistan are already showing troubling progress. Pakistani police are struggling with an ISIS group in nearly ungovernable Karachi and investigating ISIS inroads among Pakistani university professors working to radicalize students. Jordan's security forces recently thwarted an ISIS attack inside Jordan. The examples continue to multiply.

We can also be confident that ISIS is desperately planning dramatic suicidal attacks in Europe and the United States. For the moment, ISIS outposts are more dangerous than al Qaeda's affiliates. However, al Qaeda is showing signs of a comeback in a number of areas, including Yemen, and should be expected to compete with ISIS for the title of most dangerous. The bottom line is that we are slowly making significant gains in the battle against ISIS, but we still lack a comprehensive strategy, including a strategic narrative, to stop its metastasis.

The Author is Michael W. S. Ryan

Dr. Michael W. S. Ryan is currently a Senior Fellow at the Jamestown Foundation and serves on the Editorial Advisory Board of the Middle East Journal. Ryan is the author of “Decoding Al-Qaeda's Strategy: The Deep Battle Against America” (Columbia, 2013), a recent U.S. Naval War College Case Study, "ISIS: The Terrorist Group That Would Be a State" (August 2015), and numerous articles on Middle Eastern radical groups. He served in senior positions in the federal government including the U.S.... Read More

Learn more about The Cipher's Network here

Next Steps in U.S.-Cuba Relations
Strengthening U.S. Cyber Defenses
Russia Sanctions: The New Normal
Corruption in China: The Party’s Over
Change in the Kingdom: Three Big Shifts
Managing Information & Risk in the Digital Age
Endgame in Afghanistan
The Convergence of Crime and Terror
Strengthening the Public-Private Partnership
The Billion Dollar Spy: An Interview with Author David Hoffman
The New Battlefield
North Africa: Instability Increasing
The Kidnapping Capital of the World
Homegrown Terror in the Age of ISIS
The Refugee Crisis: Europe on the Brink
The Future of Mexican Oil
Cracks in the System
Embassy Security Three Years After Benghazi
Fourteen Years Later
Can Congress Solve the Cybersecurity Problem?
Arctic Game Changer?
Where They Stand on National Security
The First 100 Days
Worthy of Fleming: Anthony Horowitz's "Trigger Mortis"
At the Crossroads
Eye in the Sky
Rough Road Ahead for Rousseff
Leveling the Playing Field: Tech Access in China
The Dead Drop
Top of Mind for Chief Security Officers
Protecting Your Business
The Future of Oil
Chinese Expansion in Latin America
American Involvement in Syria
The Future of Geospatial Intelligence
The Umbrella Movement: One Year Later
Ebola: An End in Sight?
The Pakistan Problem
The Dead Drop
The Encryption Debate
Going Dark
The US-Mexico Relationship
The Rise of Mobile Technology in Africa
The Dead Drop
Construction Boom in the Gulf
Cybersecurity: The Human Factor
Beijing and the South China Sea
Will Peace Talks Succeed in Colombia?
Social Media and Terrorism
The Rise of Israel’s Tech Sector
Securing the Border
Red Sun Rising
The Dead Drop
Adopting the Iran Deal
Stability on the Peninsula
Crime in South Africa
Combatting Terrorist Financing
The Dead Drop
Recovering from a Cyber Attack
Stability in South Asia
Veterans Day
Israel’s Wave of Violence
The Dead Drop
Protecting Critical Infrastructure
ISIS on the March
The Paris Attacks
Rethinking U.S. Security Assistance
The War on Terror 2.0
Putting Mali in Context
Will Russia Ever Change?
Will Canada Pull Back?
Understanding Putin’s Popularity
Chinese Expansion in Africa
Terrorism Finance and Wildlife Poaching
Illicit Trafficking in Latin America
Climate Change and Security
Preventing Another San Bernardino
Supply Chain Security
Negotiating a New Safe Harbor Agreement
The Battle for Yemen
Foreign Tech Access in China
The Dead Drop
Offensive Cyber Operations
Travel Security in the Age of ISIS
Iran: A Rising Cyber Power?
The Future of Cybersecurity
The Arab Spring Five Years Later
Preparing Today’s Military for Tomorrow’s Wars
Cybersecurity for Small and Medium-Sized Enterprises
Maritime Security in the Gulf of Guinea
Improving Aviation Security
The Dead Drop
Terrorism in 2016
Cybersecurity in 2016
The World in 2016: Opportunities and Risks
China in 2016
Russia in 2016
Moscow’s Cyber Buildup
The China-India Relationship
Russian Influence in Latin America
The Future of Homegrown Terrorism
Stability in Sub-Saharan Africa
Protecting Your Digital Identity
Elections in Taiwan: A Turning Point?
The Caliphate of Crime
Biotechnology’s Dark Side
Rethinking U.S. Strategy Toward China
The Evolution of Weapons of Mass Destruction
A New Era in US-Iranian Relations?
Will Information Sharing Improve Cybersecurity?
Evaluating China's New Silk Road
Tech in Latin America: Opportunities and Challenges
The Destruction of Libyan Oil
Ransomware: Protecting Yourself from Cyber Extortion
The US and India: Strengthening Security Cooperation
Security and Stability in Afghanistan
Combatting the Al Shabaab Threat
Sports Security: Protecting Your Venue
Israel’s Arab Alliance: A Counter to ISIS and Iran?
The End of U.S. Space Supremacy
The Caucasus: Instability Increasing
Stabilizing Iraq
The Trans-Pacific Partnership: Deepening U.S. Commitment to Asia
Securing Industrial Control Systems
The Battle for Ukraine
Defeating Boko Haram
Jordan: The Indispensable Ally
China’s Military Modernization
The Cybersecurity Skills Shortage
Solving Mexico’s Violence Problem
The Northern Triangle: The Most Violent Region in the World
The Future of the Middle East
Terrorism in the World’s Largest Muslim Country
The Rise of Quantum Computing
Europe’s Terrorism Problem
Stability in the East China Sea
The Rise of Counter-Drone Technology
The ISIS WMD Threat
Healthcare and the Cyber Threat
Security in the Indo-Pacific: Australia’s New Role
Countering ISIS' Message
Containing the ISIS Cancer
Security, Privacy, and the Fight Over Encryption
Taking Aim at Smart Guns
Losing Patience with North Korea
The Difficult Road Ahead for Colombia
The Taliban Resurgence
ISIS: The New Face of Global Jihad?
Connecting with Latin America
Russia and China: Mutually Assured Detachment
The Scourge of Terrorism
The Security Challenge of Terror
European Unity in the Face of Crises
Developing Enhanced Cybersecurity Systems
Pakistan: Friend and Foe?
Egypt’s Economy on the Brink
Tehran’s Balancing Act
Russia Makes Moves in the Middle East
Kenya’s Battle with al-Shabaab
Missile Defense in the Korean Peninsula
Are America's Ports Secure?
The Human Factor Behind the Panama Papers Leak
Russian Military Modernization
APTs: The Boogeymen of Cybersecurity
Vietnam: Guns and Butter
Syria: Power-sharing, Partitioning, and the Fight Against ISIS
Turbulence in Turkey
The U.S. and the Philippines: Shoulder to Shoulder in the South China Sea
The Darker Side of the Internet of Things
Cybersecurity Challenges in Asia
Taliban on the Offensive
Quagmire in Yemen
Cocaine and Conflict in Colombia
The Cloud: Nebulous, but Nimble
Censorship in China
An Emerging Crime-Terror Nexus in Europe
IRGC: Iran's Power Player
Latin America: The New Frontier for Cyber Attacks
The Hydra and the Snake: The Death of Osama Bin Laden
Nuclear Deterrence and Assurance in East Asia
Vehicle Cybersecurity: Running in Place
What Drives ISIS
Tensions Simmer in the South China Sea
Managing the Mobile Phone Malware Threat
Leaving the Oil Spigot Open
Burundi: A Path Toward Civil War?
The Value of Special Operations Forces
ISIS in the Balkans
The Tech Must Flow
North Korea’s Party Congress: What was all the fuss about?
Argentina: A Smoother Ride
Libya: Obama’s “Worst Mistake”
Tsai Ing-Wen’s Balancing Act
The North Korea Workers’ Party Congress and Kim Jong-un’s Legitimacy
Flying the Unfriendly Skies: Airline Security
Nuclear Standoff in South Asia