Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
Attack the Network – Defeat the Device – Train the Force
Counter-Improvised Explosive Device Overview
April 2012
UNCLASSIFIED
UNCLASSIFIED
Attack the Network – Defeat the Device – Train the Force
UNCLASSIFIED//FOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Bangkok, 12 Jan 2012Recovered: 10,000 lbs
Urea / 38 liters AN (No casualties)
Bangkok, 12 Jan 2012Recovered: 10,000 lbs
Urea / 38 liters AN(No casualties)
More than 600 IED events occur each month outside Afghanistan More than 600 IED events occur each month outside Afghanistan
Bangkok, 14 Feb 2012Sticky Bomb Recovered:
4,000 kg Urea
Bangkok, 14 Feb 2012Sticky Bomb Recovered:
4,000 kg Urea
The IED Is a Global Threat
Nigeria, 12 Apr 2012SVBIED
(11 Killed / Dozens Wounded)Target: Catholic church
Mumbai, 13 Jul 2011Multiple explosions
(26 Killed / 130 Wounded)
Attack the Network – Defeat the Device – Train the Force
The Link Between IEDs & Threat Networks
• An overlapping consortium of networks• Locally and readily available explosives materials• Free-market, ubiquitous access to dual-use-components• Combat-experienced IED-makers and facilitators• Expansive communications through the internet and social
media• Interacting and operating in a complex environment of tribal
loyalties, endemic corruption and relatively open borders• IED threat to domestic security ranging from homegrown
terrorism to foreign threat organizations worldwide
UNCLASSIFIED
UNCLASSIFIED
The IED is the weapon of choicealong the entire threat continuum The IED is the weapon of choice
along the entire threat continuum
The Threat Continuum
Attack the Network – Defeat the Device – Train the Force
The Threat’s Strategic Advantage
PLANNINGPLANNING RECRUITINGRECRUITING
FUNDRAISINGFUNDRAISING
TRAINING/BOMB MAKINGTRAINING/BOMB MAKING
UNCLASSIFIED
• Rehearse operations in 3D virtual apps• Communicate, conduct business, pass
guidance • Transfer funds internationally
• Rehearse operations in 3D virtual apps• Communicate, conduct business, pass
guidance• Transfer funds internationally
ATTACKINGFLASH MOBS (Arab Spring)
ATTACKINGFLASH MOBS (Arab Spring)
Their “centers of excellence” are virtual, flat and unencumberedTheir “centers of excellence” are virtual, flat and unencumbered
IM, Chat, social networking, virtual world, video
conferencing, internet
IM, Chat, social networking, virtual world, video
conferencing, internet
UNCLASSIFIED
Attack the Network – Defeat the Device – Train the Force
IEDs Are Weapons with …
Tactical Effect Operational Effect
Strategic Effect• Influence national will• Create perception of “lost cause”• Use insecurity to delegitimize host
nation
• Isolate population• Disrupt freedom of
movement• Create perception of
insecurity
• Inflict casualties• Isolate population from
contact with friendly forces
Main Charge
Initiating System
Casing
Explosive Filler
Switch
Initiator
Power Sources
Containers
The IED is the battlefieldThe IED is the battlefield
IED
UNCLASSIFIED
UNCLASSIFIED
Attack the Network – Defeat the Device – Train the Force
Cannot focus on one approach — all three must work togetherCannot focus on one approach — all three must work together
UNCLASSIFIED
UNCLASSIFIED
The decisive endeavor
A well-trained force is our best counter-IED tool
Mitigate the effect of
IEDs
Critical to lowering effective
attacks and casualties
C-IED
Enable freedom of maneuver
Three Lines of Operation
Attack the Network – Defeat the Device – Train the Force
Support the Current FightSupport the Current Fight
Areas of Strategic FocusUNCLASSIFIED
UNCLASSIFIED
• Homemade Explosives (HME) Precursor Interdiction: Enable a whole-of-governments approach to restrict availability of HME precursors to threat networks
• Effective Training Methodology: Conduct comprehensive and tailored C-IED training to produce battlefield- ready units and individuals
• Effective Requirements, Acquisition and Assessment Process: Identify, develop, acquire and integrate the most effective C-IED enablers
• Identify/Anticipate Threat Tactics, Techniques and Procedures (TTP): Collect, analyze, exploit and disseminate information on current, emerging or changes to threat technologies and TTPs
• Enable Counter-threat Network: Provide expeditionary and scalable analytical capability for accurate, time- sensitive information and counter network support
Reduce effective attacks!
Pre-detonation of IEDs: Identify, develop and acquire the capability to trigger IEDs at the time and place of the warfighter’s choosingPre-detonation of IEDs: Identify, develop and acquire the capability to trigger IEDs at the time and place of the warfighter’s choosing
Source: Ms. Kelly Porter, STRATCOM, 601-4053; As of 9 April 2012
Attack the Network – Defeat the Device – Train the Force
Prepare for Future ThreatsPrepare for Future Threats• Whole-of-Governments Approach: Synchronize counter threat network actions among joint, interagency, and
international stakeholders
• Training: Develop and define C-IED training standards for Joint forces and build partner capacity
• Rapid Acquisition and Fielding: Anticipate, identify, develop, and integrate emerging technologies into effective fielded C-IED solutions
• Weapons Technical Intelligence: Synchronize whole-of-government efforts to collect, analyze, exploit, and disseminate current and emerging IED technologies
• Operations-Intelligence-Information Fusion and Analysis: Sustain an expeditionary and scalable analytical capability to provide accurate, time-sensitive information, and counter network support
Respond to Future Threat/Create Enduring Capabilities
Pre-detonation of IEDs: Identify, develop and acquire the capability to trigger IEDs at the time and place of the warfighter’s choosingPre-detonation of IEDs: Identify, develop and acquire the capability to trigger IEDs at the time and place of the warfighter’s choosing
Areas of Strategic Focus cont.
Attack the Network – Defeat the Device – Train the Force
UNCLASSIFIED
PROBLEM: • In Afghanistan, calcium ammonium nitrate produces more than 80
percent of HME-based IEDs
THE HME STRATEGY/HME TASK FORCE:• Develop a robust common intelligence picture that fills existing gaps• Disrupt the threat supply chain, including the transfer of IED
manufacturing expertise into Afghanistan • Reduce the use of HME IEDs against Coalition forces, ANSF and
civilians• Partner with the Government of Pakistan, multi-national and U.S.
interagency partners to limit the availability of HME precursors to threat networks
WHOLE OF INDUSTRY: • Bringing together international fertilizer industry to develop:
• Universal dye program• Non-detonable substitute for ammonium nitrate• Effective industry-wide standards, regulations, and safeguards for
production/distribution of nitrogen fertilizers• Global education and awareness campaign
UNCLASSIFIED
Synchronizing and leveraging the tools and authorities of ALL partners
Synchronizing and leveraging the tools and authorities of ALL partners
Applying a whole-of-governments approach to address the homemade explosives (HME) threat in Afghanistan
Applying a whole-of-governments approach to address the homemade explosives (HME) threat in Afghanistan
An Example: Countering the Homemade Explosives Threat
Attack the Network – Defeat the Device – Train the Force
Parting Thoughts…
• There is no “silver bullet” to this problem
• The U.S. Department of Defense’s counter-IED effort is organized and resourced to:
– Rapidly respond to warfighter requirements– Provide forward presence in support of Combatant Commanders
• Must deal with the HME threat
• Dual-use, off-the-shelf components are a significant threat
• Security against this threat requires integrated whole-of-government s approach
• IEDs will remain an enduring global threat — operationally and domestically.
UNCLASSIFIED
UNCLASSIFIED
The IED is the artillery of the 21st CenturyThe IED is the artillery of the 21st Century
www.jieddo.dod.mil www.jieddo.dod.smil.mil www.coic.smil.mil
UNCLASSIFIED//FOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE ONLY