Countering the Hidden Hand: A Study of Iranian Influence in Iraq - Daesh, ISIS, Social Network Analysis of Iraqi Defense, al-Jubouri Tribe, Islamic State, Social Movement Theory, Irregular Warfare

Nonfiction, History, Military, Social & Cultural Studies, Political Science
Cover of the book Countering the Hidden Hand: A Study of Iranian Influence in Iraq - Daesh, ISIS, Social Network Analysis of Iraqi Defense, al-Jubouri Tribe, Islamic State, Social Movement Theory, Irregular Warfare by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370531936
Publisher: Progressive Management Publication: November 29, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370531936
Publisher: Progressive Management
Publication: November 29, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. The purpose of this study is to illuminate the pathways of Iranian influence in Iraq in order to provide U.S. decision makers with a possible strategy to counter Iran's malignant influence there. By using a combination of social network analysis and social movement theory, this study illuminates the network of actors fighting Daesh in Iraq by first analyzing the network to map Iran' s influence channels and identify macro- and micro-level brokerage within the network. Using a social-movement focused approach, this study then identifies a candidate group for mobilization. Study of the network reveals that Iranian influence is exerted via its sponsored Shi'a militias and by conducting bloc recruitment of tribal militias. To counter this, the Jubouri tribal confederation located in Salahuddin Province offers high potential for mobilization under U.S. sponsorship that could be used to combat Iranian influence.

CHAPTER I - INTRODUCTION * A. BACKGROUND * 1. Research Question * 2. Central Claim * B. PURPOSE AND SCOPE * C. METHODOLOGY * 1. Data Collection Blueprint * 2. Study Organization * CHAPTER II - LITERATURE REVIEW * A. SOCIAL NETWORK ANALYSIS * B. SOCIAL MOVEMENT THEORY * CHAPTER III - IRANIAN INFLUENCE AND THE POLITICAL PROCESS MODEL * A. REVIEW OF THE MCADAM POLITICAL PROCESS MODEL * B. REGIME CRISIS LEADS TO OPPORTUNITY * 1. Iraq in the 1970s and 1980s: The Iranian Revolution and the Iran-Iraq War * 2. Iraq in the 2000s: The U.S.-Iraq War (2003-2011) * 3. 2013 to Present Day: Daesh and Iran's Regional Strategy * C. CONCLUSION * CHAPTER IV - SOCIAL NETWORK ANALYSIS OF THE IRAQI DEFENSE NETWORK * A. DATA AND METHODS * B. NETWORK OVERVIEW * 1. Major Subgroup Affiliations * C. NETWORK TOPOGRAPHY * 1. Subgroup Analysis * a. Subgroup Analysis Discussion * D. NODE-LEVEL CENTRALITY * a. Node-Level Centrality Analysis * E. BROKERAGE * F. SNA CONCLUSION * CHAPTER V - A COUNTER-INFLUENCE STRATEGY * A. THE SMT MODEL AS AN APPROACH TO CONDUCTING UNCONVENTIONAL WARFARE * 1. Application of the SMT Strategy * B. THE JUBOURI TRIBE * 1. Political Opportunities and the al-Jubouri Tribe * 2. The Organizational Strength of the al-Jubouri Tribe * 3. Jubouri Cognitive Liberation * C. CONCLUSION * 1. Overall Findings * 2. Limitations * 3. Recommendations for Further Study

Chapter II reviews literature on the theories of SNA and SMT to facilitate understanding of the issue. It serves as a discussion of the theories driving the data collection and analysis, and point out to the reader exactly where the approach utilized in the analysis fits between the fields of SNA and SMT, as well as how an examination of the Iraqi Defense Network will further our understanding of the two fields. Chapter III is constructed as a case study of the devolution of the Iraqi government following the downfall of the Saddam Hussein regime. It examines the history of Iran' s involvement with Iraq to illustrate how the Iranian government successfully mobilized Iraqi opposition forces against Saddam Hussein in the 1980s and the United States in 2003-2011 to attain its policy objectives. This chapter uses SMT as a lens to analyze Iran' s actions and provide a model to draw out significant lessons that will inform the strategy recommendations in Chapter V.

Chapter IV introduces the analysis of the Iraqi Defense Network as a social network.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. The purpose of this study is to illuminate the pathways of Iranian influence in Iraq in order to provide U.S. decision makers with a possible strategy to counter Iran's malignant influence there. By using a combination of social network analysis and social movement theory, this study illuminates the network of actors fighting Daesh in Iraq by first analyzing the network to map Iran' s influence channels and identify macro- and micro-level brokerage within the network. Using a social-movement focused approach, this study then identifies a candidate group for mobilization. Study of the network reveals that Iranian influence is exerted via its sponsored Shi'a militias and by conducting bloc recruitment of tribal militias. To counter this, the Jubouri tribal confederation located in Salahuddin Province offers high potential for mobilization under U.S. sponsorship that could be used to combat Iranian influence.

CHAPTER I - INTRODUCTION * A. BACKGROUND * 1. Research Question * 2. Central Claim * B. PURPOSE AND SCOPE * C. METHODOLOGY * 1. Data Collection Blueprint * 2. Study Organization * CHAPTER II - LITERATURE REVIEW * A. SOCIAL NETWORK ANALYSIS * B. SOCIAL MOVEMENT THEORY * CHAPTER III - IRANIAN INFLUENCE AND THE POLITICAL PROCESS MODEL * A. REVIEW OF THE MCADAM POLITICAL PROCESS MODEL * B. REGIME CRISIS LEADS TO OPPORTUNITY * 1. Iraq in the 1970s and 1980s: The Iranian Revolution and the Iran-Iraq War * 2. Iraq in the 2000s: The U.S.-Iraq War (2003-2011) * 3. 2013 to Present Day: Daesh and Iran's Regional Strategy * C. CONCLUSION * CHAPTER IV - SOCIAL NETWORK ANALYSIS OF THE IRAQI DEFENSE NETWORK * A. DATA AND METHODS * B. NETWORK OVERVIEW * 1. Major Subgroup Affiliations * C. NETWORK TOPOGRAPHY * 1. Subgroup Analysis * a. Subgroup Analysis Discussion * D. NODE-LEVEL CENTRALITY * a. Node-Level Centrality Analysis * E. BROKERAGE * F. SNA CONCLUSION * CHAPTER V - A COUNTER-INFLUENCE STRATEGY * A. THE SMT MODEL AS AN APPROACH TO CONDUCTING UNCONVENTIONAL WARFARE * 1. Application of the SMT Strategy * B. THE JUBOURI TRIBE * 1. Political Opportunities and the al-Jubouri Tribe * 2. The Organizational Strength of the al-Jubouri Tribe * 3. Jubouri Cognitive Liberation * C. CONCLUSION * 1. Overall Findings * 2. Limitations * 3. Recommendations for Further Study

Chapter II reviews literature on the theories of SNA and SMT to facilitate understanding of the issue. It serves as a discussion of the theories driving the data collection and analysis, and point out to the reader exactly where the approach utilized in the analysis fits between the fields of SNA and SMT, as well as how an examination of the Iraqi Defense Network will further our understanding of the two fields. Chapter III is constructed as a case study of the devolution of the Iraqi government following the downfall of the Saddam Hussein regime. It examines the history of Iran' s involvement with Iraq to illustrate how the Iranian government successfully mobilized Iraqi opposition forces against Saddam Hussein in the 1980s and the United States in 2003-2011 to attain its policy objectives. This chapter uses SMT as a lens to analyze Iran' s actions and provide a model to draw out significant lessons that will inform the strategy recommendations in Chapter V.

Chapter IV introduces the analysis of the Iraqi Defense Network as a social network.

More books from Progressive Management

Cover of the book FBI Report: FBI's Ten Most Wanted Fugitives, 60th Anniversary, 1950-2010 - History, Statistics, and Analysis; Famous Cases - James Earl Ray, Ted Bundy, Eric Rudolph by Progressive Management
Cover of the book Ballistic Missile Submarines of the United States and the Soviet Union: A Comparison of Systems and Doctrine - Excellent History of SSBN, SSB, SLBM Missiles and Subs, Nuclear Weapon Systems by Progressive Management
Cover of the book Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service (DDoS), Resilience Management Model (RMM) by Progressive Management
Cover of the book 21st Century FEMA Study Course: Emergency Support Function #14 Long-Term Community Recovery (IS-814) - Preincident and Postevent Planning, Coordination, Operation by Progressive Management
Cover of the book 2014 President Barack Obama's Speech to the United Nations about the Islamic State (IS) and America's War Against ISIS / ISIL Terrorism, Ukraine and Russia, Israel and Palestine, Ebola Outbreak by Progressive Management
Cover of the book 2011 Essential Guide to Nuclear Power Plants and Nuclear Energy: Reactor Designs, Safety, Emergency Preparedness, Security, Renewals, New Designs, Licensing, American Plants, Decommissioning by Progressive Management
Cover of the book The Foundations of U.S. Air Doctrine: The Problem of Friction in War - Airpower Strategy, World War II Bomber Offensive Plan, Korea, Douhet, Billy Mitchell, Clausewitzian Doctrine by Progressive Management
Cover of the book Black Hats and White Hats: The Effect of Organizational Culture and Institutional Identity on the Twenty-third Air Force: Air Rescue, Desert One Disaster, Special Operations, Combat Search and Rescue by Progressive Management
Cover of the book The Report of the Presidential Commission on the Space Shuttle Challenger Accident: The Tragedy of Mission 51-L in 1986 - Volume One of the Rogers Commission Report by Progressive Management
Cover of the book Challenge and Response: Anticipating U.S. Military Security Concerns - Future Wars and American Military Responses, Changing Nature of Warfare, Space Assets by Progressive Management
Cover of the book Joint Force Cyberspace Component Command: Establishing Cyberspace Operations Unity of Effort for the Joint Force Commander – Cyberwar, Air Power Development in Operation Desert Storm by Progressive Management
Cover of the book Turkey in Perspective: Orientation Guide and Turkish Cultural Orientation: Geography, History, Economy, Security, Istanbul, Ankara, Izmir, Bursa, Kurds, Laz, Alevi, Sufism, Cemevis, Tigris, Euphrates by Progressive Management
Cover of the book 21st Century Unmanned Aerial Vehicles (UAV) Reliability Study – Predator, Pioneer, Hunter, UAS – Power, Propulsion, Flight Control, Communication, Human Factors by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Gallbladder Cancer - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book FBI Hate Crime Data Collection Guidelines and Training Manual: Criteria and Definitions, Scenarios of Bias Motivation, Race, Religion, Ethnicity, Sexual Orientation, Disability, Gender by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy