This paper examines the evolution of insurgency from prehistorical times up to 1975 and identifie... more This paper examines the evolution of insurgency from prehistorical times up to 1975 and identifies two main sets of defining characteristics. First, as a desperate act due to an asymmetric conflict, insurgency favours a phased protracted plan of action, employing guerrilla warfare tactics. From the primitive raids and ambushes thousands of years ago to the century-long struggle of the Judean Jews to the anti-colonial resistances of the last century, those methods have more than once contributed to the weak defeating the strong. Second, substituting for its material disadvantages, insurgents introduce a political dimension, living in close relationship to their environment and mobilizing the population through a covert political infrastructure to deligitmize the ruling social authority. Mao’s success in the Chinese Civil War and the resistance of Viet Minh and Viet Cong are just two examples of many. Although the paper finds the nature of insurgency to always be context-specific, these two political-military trends can be seen following along insurgent chronicles throughout the course of history.
This dissertation is part of a larger effort to understand rebel political orders and provides bo... more This dissertation is part of a larger effort to understand rebel political orders and provides both a conceptual framework for analysing local jihadist governance and an in-depth analysis of the governance functions performed by the Islamic State in Libya (ISL). ISL ruled through a combination of coercion and patronage, but was not able to sustain its Libyan provinces due to shortcomings in all three governance realms: its inability to co-opt or outfight all rival factions, an alienation of the population induced by the group’s brutality, and a failure to provide necessary services to residents. Most of all, it was ISL’s parasitic mode of governance embedded in a foreign ideology that was the decisive blow to the group’s performance. Nevertheless, ISL demonstrated its ability to reshuffle the jihadist milieu and to set up a limited, yet functioning, authority in a theatre outside of Syria and Iraq, which carried the possibility for permanence.
The emergence of the Internet has benefitted terrorist capabilities in various areas, from recrui... more The emergence of the Internet has benefitted terrorist capabilities in various areas, from recruitment and mobilization to fundraising and disseminating propaganda. Freely available guidebooks teach amateurs basics of the terrorist craft and up-to-date encryption technology helps evading authorities. This paper outlines terrorists’ means of exploiting the Internet (‘functional capacities’) following a four-parted model of symbolic communication theory (transmitter, message, target, and feedback) and locates their application of Internet technology within a ‘layered’ model of the Internet. This threat analysis concludes in two recommendations: In addition to the production of counter narratives, counter terrorism responses should focus their efforts on disrupting the internally used terrorist infrastructure online, denying terrorist actors a convenient platform for communication and coordination, while finding solutions for the increasing shift from the Surface Web towards deeper layers of the Internet, especially the Dark Web.
This paper evaluates the impact of modern jihadist insurgencies (JINS), emphasizing the presence ... more This paper evaluates the impact of modern jihadist insurgencies (JINS), emphasizing the presence of jihadist foreign fighters (JFFs), on insurgent movements and conflict dynamics in civil war. The analysis mainly focuses on JINS in post-2011 Libya. The paper argues that while indigenous JINS will aim to behave like the Mao-esque fish in the water, foreign JINS would be more accurately described as saltwater fish in freshwater. While the first tend to integrate into domestic structures alongside non-jihadist opposition to secure their survival never mind ideological differences, the latter will not seek alliances and both increase in-group divisions and inter-group cohesion.
This paper looks at how the new possibilities provided by the Internet amplify and facilitate dyn... more This paper looks at how the new possibilities provided by the Internet amplify and facilitate dynamics of radicalization into violent extremism (RVE), accelerate catalysts for engaging in radicalizing cognitive processes, and enable or ease access to radical discourses. It conceptualizes RVE into three components (Background factors and ‘activators,’ issues of identity, and social network mechanism) and subsequently examines the Internet’s influence in those areas. In conclusion, the paper introduces an explanatory ‘three-circles model’ for Internet-facilitated radicalization into violent extremism. The model presents a conceptual symbiosis between the vulnerable, grieving and seeking individual stimulated by Web-based content and kinship offers, and the Internet-promoted ‘capacity building’ of extremist groups.
This paper examines the dynamics within the concept of a Salafi-jihadi ideology, touching on what... more This paper examines the dynamics within the concept of a Salafi-jihadi ideology, touching on what the author identifies as key aspects of its construction, and maps out its findings in a general model of its ideological architecture. It concludes that Salafi-jihadism can be understood as an ideology based on multi-layered narrative(s) created through framing processes drawing from a religious discourse interpreted by certain key agents embedded within, or following along, an intellectual history.
On 22 May 2013, the terror dyad of Michael Adebolajo and Michael Adebowale killed Lee Rigby in Wo... more On 22 May 2013, the terror dyad of Michael Adebolajo and Michael Adebowale killed Lee Rigby in Woolwich. This paper aims to explain both men’s radicalisation, looking at their biographies through the prism of Social Movement Theory. It is understood that they have been collectively socialized under the banner of al-Muhajiroun as a gateway organisation and the jihadi web, but mutually selfmobilised and activated. They both had a pre-existing history with violence and (clinical) traumata and showed strong grievances with British foreign policy. Islamist social networks and collective identity construction played their part and all led to their decision to brutally murder a soldier.
This B.A. thesis looks at the provision of security by the Lebanese Hezbollah (‘the Party of God’... more This B.A. thesis looks at the provision of security by the Lebanese Hezbollah (‘the Party of God’) in the southern suburbs of Beirut (al-Dahiyeh) through qualitative interviews with residents of two of its neighbourhoods; Haret Hreik and Rouas. By examining the party’s performance as a case of governance in an urban area of limited statehood, the thesis investigates in the provision’s quality as well as its intentional and non-exclusive character. Those criteria are set to indicate a security governance that understands that security goes beyond the plain absence of violence, but rather rests on security perceptions of its intended recipients.
The article discusses how the Islamic Resistance movement Hezbollah constructs distinct narrative... more The article discusses how the Islamic Resistance movement Hezbollah constructs distinct narratives of self-sacrifice and makes an attempt to define the social concept of a culture of martyrdom. Following a discussion on the idea of martyrdom in Shi’a Islam and its relation to jihad, it goes on to examine the party’s narratives of martyrdom and customs of commemoration, by first looking at Shi’a scholars and religious leaders, and then studying Hezbollah’s “martyrdom on the streets”. In the end, it shortly states the reappearance of Shi’a sectarian martyrdom in the Syrian civil war.
To the chants of “My Nation, A Dawn Has Appeared” an Islamic extremist rebel group calling themse... more To the chants of “My Nation, A Dawn Has Appeared” an Islamic extremist rebel group calling themselves Islamic State roams the lands of Iraq and Syria today. The group, which anthem should rather be “My Nation, Dusk Shall We Bring” destroys historical heritage and slaughters thousands of men, women and children in creative cruelty. Under the Prophet Mohammed’s personal standard, the black banner of al-Uqab, the group now controls a massive contiguous territory irrespective of the Iraq-Syria border. In the following paper, this so-called Islamic State will be analyzed in regard to Max Weber’s typology of the three pure types of legitimate rule. It is assumed, the group might not fit distinctly into one of Weber’s three types of domination and rather constitute a theoretical hybrid. It constitutes an attempt for a better understanding of the group and it’s leadership, which can also be a first step to improve an effective counter strategy.
Der Zugang zu Wasser ist knapp. Es ist zu einem Objekt der Politik geworden. Mit seiner Beherrsc... more Der Zugang zu Wasser ist knapp. Es ist zu einem Objekt der Politik geworden. Mit seiner Beherrschung kann Kontrolle ausgeübt, aber auch Widerstand hervorgerufen werden. Diese Arbeit untersucht den Einfluss der Wasserversorgung in den Palästinensischen Gebieten auf Radikalisierungsentwicklungen in der Bevölkerung. Aufbauend auf einem theoretischen Gerüst der Radikalisierungs- und Konflikttheorien werden erarbeitete Rahmenbedingungen für Radikalisierung an der Wirklichkeit abgeglichen. Die Untersuchung zeigt, dass ein direkter Einfluss der Wasserprobleme auf politische Einstellungen der Palästinenser*innen nicht nachgewiesen werden kann. Sie bilden jedoch indirekt über verursachte Enttäuschung und Verzweiflung einen fruchtbaren Boden für aufkeimende „Radikalnarrative“ von Gewaltgruppen wie der Hamas.
Kleinwaffen sind effektive Instrumente der Gewalt. Sie sind weit verbreitet, extrem tödlich, kost... more Kleinwaffen sind effektive Instrumente der Gewalt. Sie sind weit verbreitet, extrem tödlich, kostengünstig, einfach zu bedienen, zu transportieren und zu verbergen, langlebig, und besitzen legitime militärische, polizeiliche und zivile Zwecke. Als Folge sind sie in nahezu jeder Gesellschaft vorhanden. Internationale Anstrengungen, ihre Proliferation zu kontrollieren, haben sich oft im Sand verlaufen. Diese Arbeit untersucht, weshalb die Aushandlung eines verbindlichen Waffenhandelsabkommen scheiterte, sodass es jetzt einen selbstverpflichtenden Arms Trade Treaty mit geringen Standards und ohne Durchsetzungsinstitution gibt.
Das Experiment zeigt, dass die Verwendung von Kriegsbildern die Bewertung einer militärischen Int... more Das Experiment zeigt, dass die Verwendung von Kriegsbildern die Bewertung einer militärischen Intervention durch Schüler_innen beeinflusst. Grundlage dafür ist der konstruierte Konfliktfall des Sudanesisch-Äthiopischen Bürgerkrieges. Der Beitrag versucht zu klären, ob Bilder das Potenzial besitzen, militärische Gewalt zu legitimieren. Die Analyse legt einen bewussteren Umgang mit Bildern in der Berichterstattung nahe. Es wird auch diskursiv die aktuelle Debatte über die Wirkung von Kriegsbildern wiedergegeben.
Diese Referatsausarbeitung beschäftigt sich mit Logiken der Terrorismusbekämpfung. Vorgestellt we... more Diese Referatsausarbeitung beschäftigt sich mit Logiken der Terrorismusbekämpfung. Vorgestellt werden verschiedene theoretische Ansätze: Lösungen sind das Ergebnis von Aushandlungen in Windows of Opportunity; Komplexe aus tradierten Normen und Werten formen die Entscheidungsgrundlagen; Terrorismusbekämpfung ist Kommunikation und Legitimierungsgenerator; die diskursive Konstruktion von Bedrohung, Terrorismus und seiner Bekämpfung bestimmt die Auswahl ‚geeigneter’ Maßnahmen; Terrorismusbekämpfung ist ein Mittel zur Überwachung der Massen und Bereicherung der Wenigen; Terrorismusbekämpfung ist Eroberungs- und Herrschaftspolitik nach kolonialem Vorbild.
On 8 June 2014, armed militants attacked Jinnah International Airport in Karachi, the largest air... more On 8 June 2014, armed militants attacked Jinnah International Airport in Karachi, the largest airport in Pakistan. 36 people were killed, including the 10 attackers. Later, a senior commander of Tehrik-e-Taliban Pakistan (TTP) confirmed that the attack was a joint operation with the Islamic Movement of Uzbekistan (IMU). As a response, Pakistan’s Armed Forces launched the joint military offensive Operation Zarb-e-Azb, named in reference to the sword of the Islamic prophet Muhammad. Operation Zarb-e-Azb, aimed at militants in the remote mountain region of North Waziristan and in greater Khyber Pakhtunkhwa province along the Afghan border, was declared a “phenomenal success” by Director General of the Inter-Services Public Relations (ISPR), Pakistan army’s media wing. General Bajwa claimed the operation broke the “terrorist’ backbone”, disrupted the nexus between sleeper-cells and resulted in the killing of roughly 3,400 terrorists and the destruction of 837 hideouts, although coming at a high human cost for the armed forces with 488 of its personell getting killed.
This paper examines the evolution of insurgency from prehistorical times up to 1975 and identifie... more This paper examines the evolution of insurgency from prehistorical times up to 1975 and identifies two main sets of defining characteristics. First, as a desperate act due to an asymmetric conflict, insurgency favours a phased protracted plan of action, employing guerrilla warfare tactics. From the primitive raids and ambushes thousands of years ago to the century-long struggle of the Judean Jews to the anti-colonial resistances of the last century, those methods have more than once contributed to the weak defeating the strong. Second, substituting for its material disadvantages, insurgents introduce a political dimension, living in close relationship to their environment and mobilizing the population through a covert political infrastructure to deligitmize the ruling social authority. Mao’s success in the Chinese Civil War and the resistance of Viet Minh and Viet Cong are just two examples of many. Although the paper finds the nature of insurgency to always be context-specific, these two political-military trends can be seen following along insurgent chronicles throughout the course of history.
This dissertation is part of a larger effort to understand rebel political orders and provides bo... more This dissertation is part of a larger effort to understand rebel political orders and provides both a conceptual framework for analysing local jihadist governance and an in-depth analysis of the governance functions performed by the Islamic State in Libya (ISL). ISL ruled through a combination of coercion and patronage, but was not able to sustain its Libyan provinces due to shortcomings in all three governance realms: its inability to co-opt or outfight all rival factions, an alienation of the population induced by the group’s brutality, and a failure to provide necessary services to residents. Most of all, it was ISL’s parasitic mode of governance embedded in a foreign ideology that was the decisive blow to the group’s performance. Nevertheless, ISL demonstrated its ability to reshuffle the jihadist milieu and to set up a limited, yet functioning, authority in a theatre outside of Syria and Iraq, which carried the possibility for permanence.
The emergence of the Internet has benefitted terrorist capabilities in various areas, from recrui... more The emergence of the Internet has benefitted terrorist capabilities in various areas, from recruitment and mobilization to fundraising and disseminating propaganda. Freely available guidebooks teach amateurs basics of the terrorist craft and up-to-date encryption technology helps evading authorities. This paper outlines terrorists’ means of exploiting the Internet (‘functional capacities’) following a four-parted model of symbolic communication theory (transmitter, message, target, and feedback) and locates their application of Internet technology within a ‘layered’ model of the Internet. This threat analysis concludes in two recommendations: In addition to the production of counter narratives, counter terrorism responses should focus their efforts on disrupting the internally used terrorist infrastructure online, denying terrorist actors a convenient platform for communication and coordination, while finding solutions for the increasing shift from the Surface Web towards deeper layers of the Internet, especially the Dark Web.
This paper evaluates the impact of modern jihadist insurgencies (JINS), emphasizing the presence ... more This paper evaluates the impact of modern jihadist insurgencies (JINS), emphasizing the presence of jihadist foreign fighters (JFFs), on insurgent movements and conflict dynamics in civil war. The analysis mainly focuses on JINS in post-2011 Libya. The paper argues that while indigenous JINS will aim to behave like the Mao-esque fish in the water, foreign JINS would be more accurately described as saltwater fish in freshwater. While the first tend to integrate into domestic structures alongside non-jihadist opposition to secure their survival never mind ideological differences, the latter will not seek alliances and both increase in-group divisions and inter-group cohesion.
This paper looks at how the new possibilities provided by the Internet amplify and facilitate dyn... more This paper looks at how the new possibilities provided by the Internet amplify and facilitate dynamics of radicalization into violent extremism (RVE), accelerate catalysts for engaging in radicalizing cognitive processes, and enable or ease access to radical discourses. It conceptualizes RVE into three components (Background factors and ‘activators,’ issues of identity, and social network mechanism) and subsequently examines the Internet’s influence in those areas. In conclusion, the paper introduces an explanatory ‘three-circles model’ for Internet-facilitated radicalization into violent extremism. The model presents a conceptual symbiosis between the vulnerable, grieving and seeking individual stimulated by Web-based content and kinship offers, and the Internet-promoted ‘capacity building’ of extremist groups.
This paper examines the dynamics within the concept of a Salafi-jihadi ideology, touching on what... more This paper examines the dynamics within the concept of a Salafi-jihadi ideology, touching on what the author identifies as key aspects of its construction, and maps out its findings in a general model of its ideological architecture. It concludes that Salafi-jihadism can be understood as an ideology based on multi-layered narrative(s) created through framing processes drawing from a religious discourse interpreted by certain key agents embedded within, or following along, an intellectual history.
On 22 May 2013, the terror dyad of Michael Adebolajo and Michael Adebowale killed Lee Rigby in Wo... more On 22 May 2013, the terror dyad of Michael Adebolajo and Michael Adebowale killed Lee Rigby in Woolwich. This paper aims to explain both men’s radicalisation, looking at their biographies through the prism of Social Movement Theory. It is understood that they have been collectively socialized under the banner of al-Muhajiroun as a gateway organisation and the jihadi web, but mutually selfmobilised and activated. They both had a pre-existing history with violence and (clinical) traumata and showed strong grievances with British foreign policy. Islamist social networks and collective identity construction played their part and all led to their decision to brutally murder a soldier.
This B.A. thesis looks at the provision of security by the Lebanese Hezbollah (‘the Party of God’... more This B.A. thesis looks at the provision of security by the Lebanese Hezbollah (‘the Party of God’) in the southern suburbs of Beirut (al-Dahiyeh) through qualitative interviews with residents of two of its neighbourhoods; Haret Hreik and Rouas. By examining the party’s performance as a case of governance in an urban area of limited statehood, the thesis investigates in the provision’s quality as well as its intentional and non-exclusive character. Those criteria are set to indicate a security governance that understands that security goes beyond the plain absence of violence, but rather rests on security perceptions of its intended recipients.
The article discusses how the Islamic Resistance movement Hezbollah constructs distinct narrative... more The article discusses how the Islamic Resistance movement Hezbollah constructs distinct narratives of self-sacrifice and makes an attempt to define the social concept of a culture of martyrdom. Following a discussion on the idea of martyrdom in Shi’a Islam and its relation to jihad, it goes on to examine the party’s narratives of martyrdom and customs of commemoration, by first looking at Shi’a scholars and religious leaders, and then studying Hezbollah’s “martyrdom on the streets”. In the end, it shortly states the reappearance of Shi’a sectarian martyrdom in the Syrian civil war.
To the chants of “My Nation, A Dawn Has Appeared” an Islamic extremist rebel group calling themse... more To the chants of “My Nation, A Dawn Has Appeared” an Islamic extremist rebel group calling themselves Islamic State roams the lands of Iraq and Syria today. The group, which anthem should rather be “My Nation, Dusk Shall We Bring” destroys historical heritage and slaughters thousands of men, women and children in creative cruelty. Under the Prophet Mohammed’s personal standard, the black banner of al-Uqab, the group now controls a massive contiguous territory irrespective of the Iraq-Syria border. In the following paper, this so-called Islamic State will be analyzed in regard to Max Weber’s typology of the three pure types of legitimate rule. It is assumed, the group might not fit distinctly into one of Weber’s three types of domination and rather constitute a theoretical hybrid. It constitutes an attempt for a better understanding of the group and it’s leadership, which can also be a first step to improve an effective counter strategy.
Der Zugang zu Wasser ist knapp. Es ist zu einem Objekt der Politik geworden. Mit seiner Beherrsc... more Der Zugang zu Wasser ist knapp. Es ist zu einem Objekt der Politik geworden. Mit seiner Beherrschung kann Kontrolle ausgeübt, aber auch Widerstand hervorgerufen werden. Diese Arbeit untersucht den Einfluss der Wasserversorgung in den Palästinensischen Gebieten auf Radikalisierungsentwicklungen in der Bevölkerung. Aufbauend auf einem theoretischen Gerüst der Radikalisierungs- und Konflikttheorien werden erarbeitete Rahmenbedingungen für Radikalisierung an der Wirklichkeit abgeglichen. Die Untersuchung zeigt, dass ein direkter Einfluss der Wasserprobleme auf politische Einstellungen der Palästinenser*innen nicht nachgewiesen werden kann. Sie bilden jedoch indirekt über verursachte Enttäuschung und Verzweiflung einen fruchtbaren Boden für aufkeimende „Radikalnarrative“ von Gewaltgruppen wie der Hamas.
Kleinwaffen sind effektive Instrumente der Gewalt. Sie sind weit verbreitet, extrem tödlich, kost... more Kleinwaffen sind effektive Instrumente der Gewalt. Sie sind weit verbreitet, extrem tödlich, kostengünstig, einfach zu bedienen, zu transportieren und zu verbergen, langlebig, und besitzen legitime militärische, polizeiliche und zivile Zwecke. Als Folge sind sie in nahezu jeder Gesellschaft vorhanden. Internationale Anstrengungen, ihre Proliferation zu kontrollieren, haben sich oft im Sand verlaufen. Diese Arbeit untersucht, weshalb die Aushandlung eines verbindlichen Waffenhandelsabkommen scheiterte, sodass es jetzt einen selbstverpflichtenden Arms Trade Treaty mit geringen Standards und ohne Durchsetzungsinstitution gibt.
Das Experiment zeigt, dass die Verwendung von Kriegsbildern die Bewertung einer militärischen Int... more Das Experiment zeigt, dass die Verwendung von Kriegsbildern die Bewertung einer militärischen Intervention durch Schüler_innen beeinflusst. Grundlage dafür ist der konstruierte Konfliktfall des Sudanesisch-Äthiopischen Bürgerkrieges. Der Beitrag versucht zu klären, ob Bilder das Potenzial besitzen, militärische Gewalt zu legitimieren. Die Analyse legt einen bewussteren Umgang mit Bildern in der Berichterstattung nahe. Es wird auch diskursiv die aktuelle Debatte über die Wirkung von Kriegsbildern wiedergegeben.
Diese Referatsausarbeitung beschäftigt sich mit Logiken der Terrorismusbekämpfung. Vorgestellt we... more Diese Referatsausarbeitung beschäftigt sich mit Logiken der Terrorismusbekämpfung. Vorgestellt werden verschiedene theoretische Ansätze: Lösungen sind das Ergebnis von Aushandlungen in Windows of Opportunity; Komplexe aus tradierten Normen und Werten formen die Entscheidungsgrundlagen; Terrorismusbekämpfung ist Kommunikation und Legitimierungsgenerator; die diskursive Konstruktion von Bedrohung, Terrorismus und seiner Bekämpfung bestimmt die Auswahl ‚geeigneter’ Maßnahmen; Terrorismusbekämpfung ist ein Mittel zur Überwachung der Massen und Bereicherung der Wenigen; Terrorismusbekämpfung ist Eroberungs- und Herrschaftspolitik nach kolonialem Vorbild.
On 8 June 2014, armed militants attacked Jinnah International Airport in Karachi, the largest air... more On 8 June 2014, armed militants attacked Jinnah International Airport in Karachi, the largest airport in Pakistan. 36 people were killed, including the 10 attackers. Later, a senior commander of Tehrik-e-Taliban Pakistan (TTP) confirmed that the attack was a joint operation with the Islamic Movement of Uzbekistan (IMU). As a response, Pakistan’s Armed Forces launched the joint military offensive Operation Zarb-e-Azb, named in reference to the sword of the Islamic prophet Muhammad. Operation Zarb-e-Azb, aimed at militants in the remote mountain region of North Waziristan and in greater Khyber Pakhtunkhwa province along the Afghan border, was declared a “phenomenal success” by Director General of the Inter-Services Public Relations (ISPR), Pakistan army’s media wing. General Bajwa claimed the operation broke the “terrorist’ backbone”, disrupted the nexus between sleeper-cells and resulted in the killing of roughly 3,400 terrorists and the destruction of 837 hideouts, although coming at a high human cost for the armed forces with 488 of its personell getting killed.
Uploads
Papers by Simon Engelkes
infrastructure to deligitmize the ruling social authority. Mao’s success in the Chinese Civil War and the resistance of Viet Minh and Viet Cong are just two examples of many. Although the paper finds the nature of insurgency to always be context-specific, these two political-military trends can be seen following along insurgent chronicles throughout the course of history.
In the following paper, this so-called Islamic State will be analyzed in regard to Max Weber’s typology of the three pure types of legitimate rule. It is assumed, the group might not fit distinctly into one of Weber’s three types of domination and rather constitute a theoretical hybrid. It constitutes an attempt for a better understanding of the group and it’s leadership, which can also be a first step to improve an effective counter strategy.
Drafts by Simon Engelkes
As a response, Pakistan’s Armed Forces launched the joint military offensive Operation Zarb-e-Azb, named in reference to the sword of the Islamic prophet Muhammad. Operation Zarb-e-Azb, aimed at militants in the remote mountain region of North Waziristan and in greater Khyber Pakhtunkhwa province along the Afghan border, was declared a “phenomenal success” by Director General of the Inter-Services Public Relations (ISPR), Pakistan army’s media wing. General Bajwa claimed the operation broke the “terrorist’ backbone”, disrupted the nexus between sleeper-cells and resulted in the killing of roughly 3,400 terrorists and the destruction of 837 hideouts, although coming at a high human cost for the armed forces with 488 of its personell getting killed.
infrastructure to deligitmize the ruling social authority. Mao’s success in the Chinese Civil War and the resistance of Viet Minh and Viet Cong are just two examples of many. Although the paper finds the nature of insurgency to always be context-specific, these two political-military trends can be seen following along insurgent chronicles throughout the course of history.
In the following paper, this so-called Islamic State will be analyzed in regard to Max Weber’s typology of the three pure types of legitimate rule. It is assumed, the group might not fit distinctly into one of Weber’s three types of domination and rather constitute a theoretical hybrid. It constitutes an attempt for a better understanding of the group and it’s leadership, which can also be a first step to improve an effective counter strategy.
As a response, Pakistan’s Armed Forces launched the joint military offensive Operation Zarb-e-Azb, named in reference to the sword of the Islamic prophet Muhammad. Operation Zarb-e-Azb, aimed at militants in the remote mountain region of North Waziristan and in greater Khyber Pakhtunkhwa province along the Afghan border, was declared a “phenomenal success” by Director General of the Inter-Services Public Relations (ISPR), Pakistan army’s media wing. General Bajwa claimed the operation broke the “terrorist’ backbone”, disrupted the nexus between sleeper-cells and resulted in the killing of roughly 3,400 terrorists and the destruction of 837 hideouts, although coming at a high human cost for the armed forces with 488 of its personell getting killed.