11
Attack the Network – Defeat the Device – Train the Force Counter-Improvised Explosive Device Overview April 2012 UNCLASSIFIED UNCLASSIFIED

Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

Attack the Network – Defeat the Device – Train the Force

Counter-Improvised Explosive Device Overview

April 2012

UNCLASSIFIED

UNCLASSIFIED

Page 2: Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

Attack the Network – Defeat the Device – Train the Force

UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY

Bangkok, 12 Jan 2012Recovered: 10,000 lbs

Urea / 38 liters AN (No casualties)

Bangkok, 12 Jan 2012Recovered: 10,000 lbs

Urea / 38 liters AN(No casualties)

More than 600 IED events occur each month outside Afghanistan More than 600 IED events occur each month outside Afghanistan

Bangkok, 14 Feb 2012Sticky Bomb Recovered:

4,000 kg Urea

Bangkok, 14 Feb 2012Sticky Bomb Recovered:

4,000 kg Urea

The IED Is a Global Threat

Nigeria, 12 Apr 2012SVBIED

(11 Killed / Dozens Wounded)Target: Catholic church

Mumbai, 13 Jul 2011Multiple explosions

(26 Killed / 130 Wounded)

Page 3: Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

Attack the Network – Defeat the Device – Train the Force

The Link Between IEDs & Threat Networks

• An overlapping consortium of networks• Locally and readily available explosives materials• Free-market, ubiquitous access to dual-use-components• Combat-experienced IED-makers and facilitators• Expansive communications through the internet and social

media• Interacting and operating in a complex environment of tribal

loyalties, endemic corruption and relatively open borders• IED threat to domestic security ranging from homegrown

terrorism to foreign threat organizations worldwide

UNCLASSIFIED

UNCLASSIFIED

The IED is the weapon of choicealong the entire threat continuum The IED is the weapon of choice

along the entire threat continuum

The Threat Continuum

Page 4: Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

Attack the Network – Defeat the Device – Train the Force

The Threat’s Strategic Advantage

PLANNINGPLANNING RECRUITINGRECRUITING

FUNDRAISINGFUNDRAISING

TRAINING/BOMB MAKINGTRAINING/BOMB MAKING

UNCLASSIFIED

• Rehearse operations in 3D virtual apps• Communicate, conduct business, pass

guidance • Transfer funds internationally

• Rehearse operations in 3D virtual apps• Communicate, conduct business, pass

guidance• Transfer funds internationally

ATTACKINGFLASH MOBS (Arab Spring)

ATTACKINGFLASH MOBS (Arab Spring)

Their “centers of excellence” are virtual, flat and unencumberedTheir “centers of excellence” are virtual, flat and unencumbered

IM, Chat, social networking, virtual world, video

conferencing, internet

IM, Chat, social networking, virtual world, video

conferencing, internet

UNCLASSIFIED

Page 5: Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

Attack the Network – Defeat the Device – Train the Force

IEDs Are Weapons with …

Tactical Effect Operational Effect

Strategic Effect• Influence national will• Create perception of “lost cause”• Use insecurity to delegitimize host

nation

• Isolate population• Disrupt freedom of

movement• Create perception of

insecurity

• Inflict casualties• Isolate population from

contact with friendly forces

Main Charge

Initiating System

Casing

Explosive Filler

Switch

Initiator

Power Sources

Containers

The IED is the battlefieldThe IED is the battlefield

IED

UNCLASSIFIED

UNCLASSIFIED

Page 6: Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

Attack the Network – Defeat the Device – Train the Force

Cannot focus on one approach — all three must work togetherCannot focus on one approach — all three must work together

UNCLASSIFIED

UNCLASSIFIED

The decisive endeavor

A well-trained force is our best counter-IED tool

Mitigate the effect of

IEDs

Critical to lowering effective

attacks and casualties

C-IED

Enable freedom of maneuver

Three Lines of Operation

Page 7: Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

Attack the Network – Defeat the Device – Train the Force

Support the Current FightSupport the Current Fight

Areas of Strategic FocusUNCLASSIFIED

UNCLASSIFIED

• Homemade Explosives (HME) Precursor Interdiction: Enable a whole-of-governments approach to restrict availability of HME precursors to threat networks

• Effective Training Methodology: Conduct comprehensive and tailored C-IED training to produce battlefield- ready units and individuals

• Effective Requirements, Acquisition and Assessment Process: Identify, develop, acquire and integrate the most effective C-IED enablers

• Identify/Anticipate Threat Tactics, Techniques and Procedures (TTP): Collect, analyze, exploit and disseminate information on current, emerging or changes to threat technologies and TTPs

• Enable Counter-threat Network: Provide expeditionary and scalable analytical capability for accurate, time- sensitive information and counter network support

Reduce effective attacks!

Pre-detonation of IEDs: Identify, develop and acquire the capability to trigger IEDs at the time and place of the warfighter’s choosingPre-detonation of IEDs: Identify, develop and acquire the capability to trigger IEDs at the time and place of the warfighter’s choosing

Source: Ms. Kelly Porter, STRATCOM, 601-4053; As of 9 April 2012

Page 8: Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

Attack the Network – Defeat the Device – Train the Force

Prepare for Future ThreatsPrepare for Future Threats• Whole-of-Governments Approach: Synchronize counter threat network actions among joint, interagency, and

international stakeholders

• Training: Develop and define C-IED training standards for Joint forces and build partner capacity

• Rapid Acquisition and Fielding: Anticipate, identify, develop, and integrate emerging technologies into effective fielded C-IED solutions

• Weapons Technical Intelligence: Synchronize whole-of-government efforts to collect, analyze, exploit, and disseminate current and emerging IED technologies

• Operations-Intelligence-Information Fusion and Analysis: Sustain an expeditionary and scalable analytical capability to provide accurate, time-sensitive information, and counter network support

Respond to Future Threat/Create Enduring Capabilities

Pre-detonation of IEDs: Identify, develop and acquire the capability to trigger IEDs at the time and place of the warfighter’s choosingPre-detonation of IEDs: Identify, develop and acquire the capability to trigger IEDs at the time and place of the warfighter’s choosing

Areas of Strategic Focus cont.

Page 9: Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

Attack the Network – Defeat the Device – Train the Force

UNCLASSIFIED

PROBLEM: • In Afghanistan, calcium ammonium nitrate produces more than 80

percent of HME-based IEDs

THE HME STRATEGY/HME TASK FORCE:• Develop a robust common intelligence picture that fills existing gaps• Disrupt the threat supply chain, including the transfer of IED

manufacturing expertise into Afghanistan • Reduce the use of HME IEDs against Coalition forces, ANSF and

civilians• Partner with the Government of Pakistan, multi-national and U.S.

interagency partners to limit the availability of HME precursors to threat networks

WHOLE OF INDUSTRY: • Bringing together international fertilizer industry to develop:

• Universal dye program• Non-detonable substitute for ammonium nitrate• Effective industry-wide standards, regulations, and safeguards for

production/distribution of nitrogen fertilizers• Global education and awareness campaign

UNCLASSIFIED

Synchronizing and leveraging the tools and authorities of ALL partners

Synchronizing and leveraging the tools and authorities of ALL partners

Applying a whole-of-governments approach to address the homemade explosives (HME) threat in Afghanistan

Applying a whole-of-governments approach to address the homemade explosives (HME) threat in Afghanistan

An Example: Countering the Homemade Explosives Threat

Page 10: Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

Attack the Network – Defeat the Device – Train the Force

Parting Thoughts…

• There is no “silver bullet” to this problem

• The U.S. Department of Defense’s counter-IED effort is organized and resourced to:

– Rapidly respond to warfighter requirements– Provide forward presence in support of Combatant Commanders

• Must deal with the HME threat

• Dual-use, off-the-shelf components are a significant threat

• Security against this threat requires integrated whole-of-government s approach

• IEDs will remain an enduring global threat — operationally and domestically.

UNCLASSIFIED

UNCLASSIFIED

The IED is the artillery of the 21st CenturyThe IED is the artillery of the 21st Century

Page 11: Attack the Network – Defeat the Device – Train the …httpAssets)/3C0D...Attack the Network – Defeat the Device – Train the Force The Link Between IEDs & Threat Networks •

www.jieddo.dod.mil www.jieddo.dod.smil.mil www.coic.smil.mil

UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY