top of page

The Ingenuity of the Insurgency Business - Part II


Introduction: Insurgencies throughout history have employed various innovative and adaptive methods in logistics and supply chain management to sustain their efforts. In continuation from the last blog post, this author advocates the Islamic State was a vanguard in employing resiliency and durability in funding its operations. While all insurgencies are different in terms of goals and outright desired endstate, some general strategies will hold for resourcing their operations that include:

  1. Diversification of Supply Sources: Insurgents tend to establish multiple supply sources, both legal and illicit, to reduce dependency on single channels. This allows them to access various resources such as weapons, ammunition, food, and medical supplies.

  2. Local Procurement and Self-Sufficiency: Insurgents may rely on local procurement to minimize the risk of detection and disruption. They may engage in activities like taxation, extortion, or resource extraction to fund their operations and acquire necessary supplies from local communities.

  3. Smuggling and Illicit Networks: Insurgent groups often exploit porous borders and existing smuggling networks to transport contraband items, including weapons, drugs, and other resources. They may establish connections with criminal organizations or exploit regional instability to facilitate illicit trade.

  4. Improvised Manufacturing and Repair: To reduce dependence on external supply chains, insurgents may develop improvised manufacturing and repair capabilities. This includes crafting homemade weapons, modifying existing equipment, and repairing damaged resources to extend their lifespan.

  5. Decentralized Storage and Distribution: Insurgents typically avoid centralized storage facilities to minimize targeted attack risk. Instead, they establish decentralized and hidden storage locations, making it harder for security forces to locate and disrupt their supplies. Distribution may occur through trusted intermediaries or covert means.

  6. Adaptive Resupply Methods: Insurgents continuously adapt their resupply methods to evade detection and interdiction efforts by security forces. This may involve using diverse transportation modes, employing covert communication techniques, and exploiting civilian infrastructure for concealment.

  7. Information and Intelligence Gathering: Insurgents rely on intelligence networks to gather information about potential targets, supply routes, and vulnerabilities in the security apparatus. They may employ local informants, conduct surveillance, or exploit technological tools to enhance their situational awareness.

  8. Psychological Operations: Insurgencies often employ psychological operations to influence local populations and gain support. This can involve disseminating propaganda, controlling information flow, and manipulating perceptions to disrupt counterinsurgency efforts and maintain supply chain operations.

Conclusion: The Islamic State's short-term politico-military successes and global media coverage over several years enabled the group to establish a franchise that drew in the money, manpower, and materiel to continue being the world’s most recognized terrorist brand. While that brand is dormant today in 2023, we cannot lose sight that this business model is adaptable, resilient, and resourceful, exploiting future gaps in their market of failing states, non-state actors, and corrupt governments across the developing world.


Comments


  • Instagram
  • Facebook
  • LinkedIn
bottom of page