Understanding the War in Syria – 2013 to 2017/18

In the light of the sometimes relatively long updates being necessary to keep the series on Syria up to date, the whole section on Syria has been reorganized and a starting page for the series introduced. Updates up to October 2013 are being added in the meantime.

The Syrian War: the Start of a New Phase

This (long) post ends the current series of updates on the Syrian war. It focuses on the evolution within the National Coalition and the Supreme Military Council, the expected failure of Geneva 2 and the start of a new phase in the Syrian war. This will allow us, next, to finally turn to an evaluation of our scenarios and indicators. The National Coalition and the Supreme Military Council The last alliance to emerge over the Autumn has been Syria Revolutionaries Front (SRF), created on 9 December 2013 (see Youtube video), which is composed of moderate or non-ideologically motivated groups, as detailed by Lund (13 Dec 2013) and mapped below (click on the image for a larger picture). It is a reaction to the Salafi-Nationalist …

The remaining part of this article is for our members and those who purchased special access plans. Make sure you get real analysis and not opinion, or, worse, fake news. Log in and access this article.

Methodology to Analyze Future Security Threats (2): a Game of Chess

This article is the second of a series looking for a methodology that would fulfill the challenging criteria demanded by our time. Previously, we saw that a single “story” initially told at a general level, the political dynamics that are at the core of a polity, could be used to build the very specific model needed to answer a strategic foresight and warning (national security) question or a political risk interrogation. Very practically, how shall we do that? How are generic dynamics going to help us with our task? How can we proceed? This is what we shall see now. Related Towards an Operational Methodology to Analyze Future Security Threats and Political Risk (1) Methodology to Analyze Future Security Threats (2): a …

The remaining part of this article is for our members and those who purchased special access plans. Make sure you get real analysis and not opinion, or, worse, fake news. Log in and access this article.

EN