Countering the Hidden Hand: A Study of Iranian Influence in Iraq - Daesh, ISIS, Social Network Analysis of Iraqi Defense, al-Jubouri Tribe, Islamic State, Social Movement Theory, Irregular Warfare

Nonfiction, History, Military, Social & Cultural Studies, Political Science
Cover of the book Countering the Hidden Hand: A Study of Iranian Influence in Iraq - Daesh, ISIS, Social Network Analysis of Iraqi Defense, al-Jubouri Tribe, Islamic State, Social Movement Theory, Irregular Warfare by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370531936
Publisher: Progressive Management Publication: November 29, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370531936
Publisher: Progressive Management
Publication: November 29, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. The purpose of this study is to illuminate the pathways of Iranian influence in Iraq in order to provide U.S. decision makers with a possible strategy to counter Iran's malignant influence there. By using a combination of social network analysis and social movement theory, this study illuminates the network of actors fighting Daesh in Iraq by first analyzing the network to map Iran' s influence channels and identify macro- and micro-level brokerage within the network. Using a social-movement focused approach, this study then identifies a candidate group for mobilization. Study of the network reveals that Iranian influence is exerted via its sponsored Shi'a militias and by conducting bloc recruitment of tribal militias. To counter this, the Jubouri tribal confederation located in Salahuddin Province offers high potential for mobilization under U.S. sponsorship that could be used to combat Iranian influence.

CHAPTER I - INTRODUCTION * A. BACKGROUND * 1. Research Question * 2. Central Claim * B. PURPOSE AND SCOPE * C. METHODOLOGY * 1. Data Collection Blueprint * 2. Study Organization * CHAPTER II - LITERATURE REVIEW * A. SOCIAL NETWORK ANALYSIS * B. SOCIAL MOVEMENT THEORY * CHAPTER III - IRANIAN INFLUENCE AND THE POLITICAL PROCESS MODEL * A. REVIEW OF THE MCADAM POLITICAL PROCESS MODEL * B. REGIME CRISIS LEADS TO OPPORTUNITY * 1. Iraq in the 1970s and 1980s: The Iranian Revolution and the Iran-Iraq War * 2. Iraq in the 2000s: The U.S.-Iraq War (2003-2011) * 3. 2013 to Present Day: Daesh and Iran's Regional Strategy * C. CONCLUSION * CHAPTER IV - SOCIAL NETWORK ANALYSIS OF THE IRAQI DEFENSE NETWORK * A. DATA AND METHODS * B. NETWORK OVERVIEW * 1. Major Subgroup Affiliations * C. NETWORK TOPOGRAPHY * 1. Subgroup Analysis * a. Subgroup Analysis Discussion * D. NODE-LEVEL CENTRALITY * a. Node-Level Centrality Analysis * E. BROKERAGE * F. SNA CONCLUSION * CHAPTER V - A COUNTER-INFLUENCE STRATEGY * A. THE SMT MODEL AS AN APPROACH TO CONDUCTING UNCONVENTIONAL WARFARE * 1. Application of the SMT Strategy * B. THE JUBOURI TRIBE * 1. Political Opportunities and the al-Jubouri Tribe * 2. The Organizational Strength of the al-Jubouri Tribe * 3. Jubouri Cognitive Liberation * C. CONCLUSION * 1. Overall Findings * 2. Limitations * 3. Recommendations for Further Study

Chapter II reviews literature on the theories of SNA and SMT to facilitate understanding of the issue. It serves as a discussion of the theories driving the data collection and analysis, and point out to the reader exactly where the approach utilized in the analysis fits between the fields of SNA and SMT, as well as how an examination of the Iraqi Defense Network will further our understanding of the two fields. Chapter III is constructed as a case study of the devolution of the Iraqi government following the downfall of the Saddam Hussein regime. It examines the history of Iran' s involvement with Iraq to illustrate how the Iranian government successfully mobilized Iraqi opposition forces against Saddam Hussein in the 1980s and the United States in 2003-2011 to attain its policy objectives. This chapter uses SMT as a lens to analyze Iran' s actions and provide a model to draw out significant lessons that will inform the strategy recommendations in Chapter V.

Chapter IV introduces the analysis of the Iraqi Defense Network as a social network.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. The purpose of this study is to illuminate the pathways of Iranian influence in Iraq in order to provide U.S. decision makers with a possible strategy to counter Iran's malignant influence there. By using a combination of social network analysis and social movement theory, this study illuminates the network of actors fighting Daesh in Iraq by first analyzing the network to map Iran' s influence channels and identify macro- and micro-level brokerage within the network. Using a social-movement focused approach, this study then identifies a candidate group for mobilization. Study of the network reveals that Iranian influence is exerted via its sponsored Shi'a militias and by conducting bloc recruitment of tribal militias. To counter this, the Jubouri tribal confederation located in Salahuddin Province offers high potential for mobilization under U.S. sponsorship that could be used to combat Iranian influence.

CHAPTER I - INTRODUCTION * A. BACKGROUND * 1. Research Question * 2. Central Claim * B. PURPOSE AND SCOPE * C. METHODOLOGY * 1. Data Collection Blueprint * 2. Study Organization * CHAPTER II - LITERATURE REVIEW * A. SOCIAL NETWORK ANALYSIS * B. SOCIAL MOVEMENT THEORY * CHAPTER III - IRANIAN INFLUENCE AND THE POLITICAL PROCESS MODEL * A. REVIEW OF THE MCADAM POLITICAL PROCESS MODEL * B. REGIME CRISIS LEADS TO OPPORTUNITY * 1. Iraq in the 1970s and 1980s: The Iranian Revolution and the Iran-Iraq War * 2. Iraq in the 2000s: The U.S.-Iraq War (2003-2011) * 3. 2013 to Present Day: Daesh and Iran's Regional Strategy * C. CONCLUSION * CHAPTER IV - SOCIAL NETWORK ANALYSIS OF THE IRAQI DEFENSE NETWORK * A. DATA AND METHODS * B. NETWORK OVERVIEW * 1. Major Subgroup Affiliations * C. NETWORK TOPOGRAPHY * 1. Subgroup Analysis * a. Subgroup Analysis Discussion * D. NODE-LEVEL CENTRALITY * a. Node-Level Centrality Analysis * E. BROKERAGE * F. SNA CONCLUSION * CHAPTER V - A COUNTER-INFLUENCE STRATEGY * A. THE SMT MODEL AS AN APPROACH TO CONDUCTING UNCONVENTIONAL WARFARE * 1. Application of the SMT Strategy * B. THE JUBOURI TRIBE * 1. Political Opportunities and the al-Jubouri Tribe * 2. The Organizational Strength of the al-Jubouri Tribe * 3. Jubouri Cognitive Liberation * C. CONCLUSION * 1. Overall Findings * 2. Limitations * 3. Recommendations for Further Study

Chapter II reviews literature on the theories of SNA and SMT to facilitate understanding of the issue. It serves as a discussion of the theories driving the data collection and analysis, and point out to the reader exactly where the approach utilized in the analysis fits between the fields of SNA and SMT, as well as how an examination of the Iraqi Defense Network will further our understanding of the two fields. Chapter III is constructed as a case study of the devolution of the Iraqi government following the downfall of the Saddam Hussein regime. It examines the history of Iran' s involvement with Iraq to illustrate how the Iranian government successfully mobilized Iraqi opposition forces against Saddam Hussein in the 1980s and the United States in 2003-2011 to attain its policy objectives. This chapter uses SMT as a lens to analyze Iran' s actions and provide a model to draw out significant lessons that will inform the strategy recommendations in Chapter V.

Chapter IV introduces the analysis of the Iraqi Defense Network as a social network.

More books from Progressive Management

Cover of the book The Revolutionary United Front (RUF) and Child Soldiers During Sierra Leone's Civil War - Use of Drugged Soldiers to Commit Horrific Atrocities During Guerilla War, Involvement of Libya and Gadhafi by Progressive Management
Cover of the book Principles of War for Cyberspace: Cultures of Strategy in Cyberspace, Clausewitzian Cyberthink, Sun Tzu Cyberthink, Yin and Yang in Cyberspace, Doctrine and Education by Progressive Management
Cover of the book National Security Space Strategy, Unclassified Summary, January 2011, plus Toward a Theory of Spacepower: Selected Essays by Progressive Management
Cover of the book 21st Century Guide to Solar Power and Photovoltaics: Green Domestic Power from the Sun - Practical Information about Home Electricity, Water Heating, Panel and Cells, Solar Energy Financing by Progressive Management
Cover of the book Cryptocurrency and State Sovereignty: Comprehensive Review of Bitcoin, Blockchain, and Virtual Currency Technology, Hash Functions, Merkle Trees, and Security, Government Bans and Regulations by Progressive Management
Cover of the book Air Force Doctrine Document 4-02: Health Services - Air Force Medical Service, Air Force Surgeon General, Aeromedical Evacuation, Medical Logistics by Progressive Management
Cover of the book Russia Reports (Volume 4) - International Affairs, Putin, Moldova, Transnistria, Ukraine, Georgia, Chechnya, Lithuania, Belarus, Iran, Natural Gas, Energy Policy, Arms Control, Nonproliferation by Progressive Management
Cover of the book Airpower and the Battle of Khafji: Setting the Record Straight - Desert Storm Persian Gulf War Three Day Battle, Did Airpower Halt Iraqi Attack into Saudi Arabia, ISR, Air-Ground Cooperation by Progressive Management
Cover of the book Inside the International Space Station (ISS): NASA Operations and Planning Astronaut Training Manual by Progressive Management
Cover of the book NASA's Space Shuttle Program: Astronaut Oral Histories (Set 4) - Richards, Ride, Ross, Seddon, Shaw, Shriver, Spring, Sullivan, Thagard, Truly, van Hoften, Walker - Columbia, Challenger Accidents by Progressive Management
Cover of the book 2014 Major American Weapons Systems: Report of the Pentagon's Testing Director - Army, Navy, Air Force Programs, F-35, Ballistic Missile Defense, Aegis, Missiles, Submarines, Aircraft Carriers by Progressive Management
Cover of the book National Defense Intelligence College Paper: Anticipating Surprise - Analysis for Strategic Warning - DEFCON Status, Deception, Surprise and Timing, Political and Military Factors by Progressive Management
Cover of the book Remembering the Space Age: Proceedings of the 50th Anniversary Conference - Germans and Nazis, Mythmaking in Russia, American Culture and Music, Heinlein Influence, Apollo, Chinese Program by Progressive Management
Cover of the book Complete Guide to America's Navy and the Space Program: Early Satellites to Current Defense Systems, Manned Programs (Shepard, Mercury, MOL, Apollo), Recovery, From the Sea to the Stars 2010 Edition by Progressive Management
Cover of the book Ideas in Arms: Relationship of Kinetic and Ideological Means in America's Global War on Terror, al-Qaeda, Clausewitzian Effectiveness, Operation Enduring Freedom, Detrimental Effects of Kinetic Means by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy