HOME

TheInfoList



OR:

Counter-IED efforts are done primarily by
military A military, also known collectively as armed forces, is a heavily armed, highly organized force primarily intended for warfare. It is typically authorized and maintained by a sovereign state, with its members identifiable by their distinct ...
and
law enforcement Law enforcement is the activity of some members of government who act in an organized manner to enforce the law by discovering, deterring, rehabilitating, or punishing people who violate the rules and norms governing that society. The term en ...
(led by intelligence efforts) with the assistance of the
diplomatic Diplomatics (in American English, and in most anglophone countries), or diplomatic (in British English), is a scholarly discipline centred on the critical analysis of documents: especially, historical documents. It focuses on the conventions, p ...
and financial communities. It involves a comprehensive approach of countering the threat networks that employ
improvised explosive device An improvised explosive device (IED) is a bomb constructed and deployed in ways other than in conventional military action. It may be constructed of conventional military explosives, such as an artillery shell, attached to a detonating mechan ...
s (IEDs), defeating the devices themselves, and training others. Counter-IED, or C-IED, is usually part of a broader
counter-terrorism Counterterrorism (also spelled counter-terrorism), also known as anti-terrorism, incorporates the practices, military tactics, techniques, and strategies that governments, law enforcement, business, and intelligence agencies use to combat or el ...
,
counter-insurgency Counterinsurgency (COIN) is "the totality of actions aimed at defeating irregular forces". The Oxford English Dictionary defines counterinsurgency as any "military or political action taken against the activities of guerrillas or revolutionar ...
, or law enforcement effort. Because IEDs are a subset of a number of forms of
asymmetric warfare Asymmetric warfare (or asymmetric engagement) is the term given to describe a type of war between belligerents whose relative military power, strategy or tactics differ significantly. This is typically a war between a standing, professional ar ...
used by
insurgents An insurgency is a violent, armed rebellion against authority waged by small, lightly armed bands who practice guerrilla warfare from primarily rural base areas. The key descriptive feature of insurgency is its asymmetric nature: small irreg ...
and
terrorist Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
s, C-IED activities are principally against adversaries and not only against IEDs. C-IED treats the IED as a systemic problem and aims to defeat the IED threat networks themselves. This IED threat network requires multiple actions and resources in order to stage an IED Event. The IED threat network may be either hierarchical or non-hierarchical but it will contain
nodes In general, a node is a localized swelling (a "knot") or a point of intersection (a Vertex (graph theory), vertex). Node may refer to: In mathematics *Vertex (graph theory), a vertex in a mathematical graph *Vertex (geometry), a point where two ...
such as personnel, resources and other actions that are linked. The importance of these nodes and the linkages between them will vary. Identifying the critical vulnerabilities within the IED threat network is an important C-IED activity. Some IED threat networks may be part of large, international
terrorist Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
organizations and some may be state sponsored. Some may work completely independently, while others may extend from theater down to village level. This span of possibilities increases the complexity of military and law enforcement operations and requires a comprehensive approach to C-IED potentially involving close cooperation and coordination between the diplomatic, military, economic, and informational levers of power. The complexity of the IED threat network is increased since mobile phones and the internet provide a low-cost and easily accessible medium for information sharing and the swift promulgation of tactical ideas and practices, thereby facilitating the efficient operation of these diverse systems. IED network members also have the ability to operate part-time and can blend back into the civilian population when their actions are completed. Such systems can be extremely resilient, invariably hard to target and are, therefore, survivable. Also, adversary targets can range from the specific such as host nation security force bases and recruiting events to the indiscriminate such as concentrations of people in public places. However, IEDs are not only found within the land environment; other targets may include maritime
choke point In military strategy, a choke point (or chokepoint) is a geographical feature on land such as a valley, defile or bridge, or maritime passage through a critical waterway such as a strait, which an armed force is forced to pass through in ord ...
s and ships alongside, as well as aircraft in flight or on the ground.AJP-3.15(A) NATO Allied Joint Doctrine for Countering – Improvised Explosive Devices The first organization to tackle IED's on a large scale was the Joint IED Defeat Organization or JIEDDO of the U.S. Department of Defense on 14 February 2006. NATO later adopted JIEDDO's tactics, techniques and procedures. The C-IED approach used by
NATO The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two No ...
involves 3 mutually supporting and complementary pillars of activity which are: ''attack the network'', ''defeat the device'', and ''prepare the force''. These are all underpinned by ''understanding and intelligence''. (Counter-IED efforts can also be broken up into 6 key operational activities: predict, prevent, detect, neutralize, mitigate, and exploit.)


Countering Threat Networks (CTN)

A growing danger to the international community consists of highly complex adversary networks with international span that employ criminal financing as well as terror attacks and other destructive capabilities. Effectively countering these dynamic and violent illicit networks requires the creation of an international and multi-functional framework to share information on these networks as well as collaborative multinational countermeasures. ''Attack the network'' (AtN) is the principal pillar requiring this joint, inter-agency and multinational approach. Attack the network operations are defined as actions, kinetic or non-kinetic, used to disrupt, destroy, or reduce an enemy's capacity to mount terror operations, specifically groups that use IEDs. It consists of largely offensive and proactive activities, driven by intelligence that may go beyond the theater of operations, designed to disrupt the networks of the adversary's IED threat network. Counter-network operations usually focus on leadership targeting of an organization, which follows the logic that by catching the right hornet, the whole colony dies. What is often overlooked in this approach, however, is that if just a worker bee is killed, the nest is aggravated and a much bigger problem is created. While this concept provides a convenient metaphor to discuss possible targeting methodology, it seldom resembles the facts, because human networks are not directly analogous to a hornet's nest. In other words, not every situation can be resolved by a single kill or capture of the “queen”. Activity is focused on the critical vulnerabilities of the IED threat network, for example, by denying the supply of components, finance, leaders, specialists and recruits and adversary exploitation and isolating the adversary from the local population. AtN/CTN seeks to 1) shape and influence IED networks, 2) disrupt their operations, and 3) undermine their financiers and supply chains. Exploitation is a vital component of the attack the networks activity. Information gained provides a picture of adversary capabilities and intentions, perpetrator relationships and the technical construction of the device. This enables the prediction of forthcoming IED activity, informs the targeting process, and enables follow up activities to further disrupt the IED threat network. Intelligence gained from exploitation also feeds into the other C-IED pillars.


Operating Framework for Executing the Intelligence Cycle

To execute the intelligence cycle, a model is required that it is able to treat the enemy or adversary as a system. Operational experience has shown that by using a model based on the generic core functions (find, fix, strike and exploit) will ensure key areas and points in the adversary system can be identified, enabling power or influence to be applied. Immediate effects can be organized to affect other parts of the system. For example, covertly observing an IED placement without attacking the placement team could lead to a subsequent operation to identify further elements of the IED threat network, for example a bomb maker or a cache. By the same process, observing the bomb maker may lead to identifying a supply chain for IED components used for a large number of teams, adding a much higher value to the outcome. The model used to describe this approach is called find, fix, finish, exploit and analyze or F3EA: # Find. A systematic approach and long-term investment is required to allow understanding of a system to be built up. Enemy dispositions and hostile groups must be found and assessed before action can be taken against them. In combat, physical locations are most important, and must be analyzed alongside what the enemy is doing and why. In stability operations and counter-insurgency, find will involve examining the human terrain to find networks and systematically uncovering them. Network members will seek anonymity within the population. They will use it as cover, with or without, the population's consent. # Fix. Once the target within the system has been found, it needs to be fixed in time and space. This generates a pattern of life analysis from which deductions and a plan can be formed. The target can be fixed either by physical force, or less intrusively by the use of collection assets such as intelligence, surveillance and reconnaissance elements. This expands the understanding of the target to provide the commander with more options for the finish phase. Patience can lead to even greater operational gains. # Finish. In some instances, the commander may want to strike the target to remove it from the system. Alternatively other methods may be more useful, for example to recruit or buy an element of the enemy's network. The aim of finish is to secure the intelligence required to continue the cycle. Detention plays an important part in this phase. Although detention is not without risks, and the taking of captured persons or prisoners of war absorbs combat power. However, it does separate the adversary from the population and protects it and the force. Detention also provides a fertile source of intelligence. # Exploit. Exploit and analyze are the most important phases of the F3EA cycle, as they generate a more detailed understanding of the system or network in order to cue the most appropriate form of action. Exploit feeds the analysis process and exploitation activity may be coordinated by an exploitation planning board or other structure to ensure that opportunities are maximized. Agility and speed are essential, as are information management and information exchange which are underpinned by database continuity. Exploit includes, for example, tactical interrogation or examination of documents and materiel, or the technical exploitation of recovered improvised explosive device parts.


Activity Modelling and Identifying Critical Vulnerabilities

Nodal activity modelling within an IED threat network is a useful means of understanding relationships and the networks within. Counter-IED efforts involve conducting specialized analysis to identify vulnerabilities, inter-dependencies, and cascading effects of the IED threat network Nodal Activity Model. These vulnerability assessments are the foundation of a risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of an IED attack.


Human Network Analysis and Targeting (HNAT)

HNAT is used to interdict, neutralize, and isolate threat networks. It primarily consists of advanced intelligence analytic procedures and techniques, such as Social Network Analysis (SNA), Link, Pattern, and Associative Analysis. It is enabled by tools such as network analysis software, target development, and nomination processes. Further network analysis can be conducted using other models that look at the relationships between and within links and nodes. One of these is component analysis with 2 subsets: individual component analysis looking at the detail of each component part, and nodal component analysis looking at the relationship between nodes. Nodal component analysis has 2 further subsets
functional analysis Functional analysis is a branch of mathematical analysis, the core of which is formed by the study of vector spaces endowed with some kind of limit-related structure (e.g. Inner product space#Definition, inner product, Norm (mathematics)#Defini ...
and nodal activity analysis. The former identifies and links the nodes in terms of their function, the latter then seeks to identify activities which take place within the functional node.


Center of Gravity Analysis

Center of gravity In physics, the center of mass of a distribution of mass in space (sometimes referred to as the balance point) is the unique point where the weight function, weighted relative position (vector), position of the distributed mass sums to zero. Thi ...
analysis provides a model for systemically identifying critical vulnerabilities. There are four steps in analyzing the center of gravity of an IED threat network: # Determine the critical capability, the absolutely essential function the system performs. The system might have several capabilities, but not all are critical in every situation. # Identify the critical capability's source of power. # Identify the critical requirements. # Identify the critical requirements or components that are vulnerable to attack or disruption. These become targets to attack or are requirements for the IED system to protect.


Counter-threat Finance

Financial efforts involve seizure of assets and anti-
money laundering Money laundering is the process of concealing the origin of money, obtained from illicit activities such as drug trafficking, corruption, embezzlement or gambling, by converting it into a legitimate source. It is a crime in many jurisdictions ...
efforts, for example. The means and methods used to underwrite the costs associated with the IED threat network may come from
charitable organization A charitable organization or charity is an organization whose primary objectives are philanthropy and social well-being (e.g. educational, Religion, religious or other activities serving the public interest or common good). The legal definitio ...
s,
donation A donation is a gift for charity, humanitarian aid, or to benefit a cause. A donation may take various forms, including money, alms, services, or goods such as clothing, toys, food, or vehicles. A donation may satisfy medical needs such as blo ...
s,
fundraising Fundraising or fund-raising is the process of seeking and gathering voluntary financial contributions by engaging individuals, businesses, charitable foundations, or governmental agencies. Although fundraising typically refers to efforts to gathe ...
, illicit activities like
extortion Extortion is the practice of obtaining benefit through coercion. In most jurisdictions it is likely to constitute a criminal offence; the bulk of this article deals with such cases. Robbery is the simplest and most common form of extortion, ...
, and money laundering, or may be concealed within the payment of religious
tithe A tithe (; from Old English: ''teogoþa'' "tenth") is a one-tenth part of something, paid as a contribution to a religious organization or compulsory tax to government. Today, tithes are normally voluntary and paid in cash or cheques or more r ...
s or local taxes or foreign government support. Money transfer may be occurring through recognized international channels or an alternative system like
hawala Hawala or hewala ( ar, حِوالة , meaning ''transfer'' or sometimes ''trust''), also known as in Persian, and or in Somali, is a popular and informal value transfer system based on the performance and honour of a huge network of money b ...
brokers. Irregular activity can be inexpensive relative to the costs of countering it. Work must be done comprehensively to identify the physical and virtual networks for raising, moving and hiding money, identify the physical links and break them, and attack the links between illicit activity that generates revenue and adversaries that use it. Counter-threat finance is usually part of a broader effort to administer sanctions regimes, combat terrorist finance, combat the use of
conflict diamonds ''Blood Diamond'' is a 2006 American political war action thriller film directed and co-produced by Edward Zwick and starring Leonardo DiCaprio, Jennifer Connelly, and Djimon Hounsou. The title refers to blood diamonds, which are diamonds mine ...
and
conflict minerals The eastern Democratic Republic of the Congo (DRC) has a history of conflict, where various armies, rebel groups, and outside actors have profited from mining while contributing to violence and exploitation during wars in the region. The four mai ...
to finance rebellions against legitimate governments, or disrupt and dismantle the financial networks of the
Somali pirate Piracy off the coast of Somalia occurs in the Gulf of Aden, Guardafui Channel and Somali Sea, in Somali territorial waters and other surrounding areas and has a long and troubled history with different perspectives from different communities. I ...
enterprise.


Politics and Diplomacy

Diplomatic efforts involve convincing cooperating nations to restrict the sales of precursors, for example. IED networks are ideally attacked through regional and local politics and diplomacy. The subject of IEDs can deliberately be considered as an issue of negotiations within local government as well as other regional and local agendas. Political agreement may be reached that IEDs are often indiscriminate and have a great impact on the local population. In some cases local actions against adversaries and reporting of IED related information could be linked to rewards such as development programs. In military efforts, the political and diplomatic channels lead the military approach and all elements of the C-IED approach. Political and diplomatic tools for attack the networks will be based upon the political importance of ensuring there is a common sense of purpose and agreement as to the desired outcomes between all those cooperating in resolution of the situation. The political tasks should link with wider political strategies for example creating comprehensive programs to tackle the root causes of the problem that has led to adversaries’ use of IEDs. All political activity will need to be coordinated internationally and throughout the government and non-government agencies which will require a political and diplomatic lead and policy to support it. Key areas to address include: the need for a common narrative; rules for military operations within: and, if necessary, outside of the JOA, other political tasks will lead the reform of the host nation security and
justice Justice, in its broadest sense, is the principle that people receive that which they deserve, with the interpretation of what then constitutes "deserving" being impacted upon by numerous fields, with many differing viewpoints and perspective ...
sectors including: military forces, intelligence services, militia and police, the security sector includes judicial and penal systems, oversight bodies, the Executive, parliamentary committees, government ministries, legislative frameworks, customary or traditional authorities, financial and regulatory bodies. The political lead will determine at the outset levels of military support for the host nation and at a subsequent time agreements involving the reintegration of adversaries. All of the above will contribute to attack the networks within the C-IED approach.


Legal

Within the C-IED approach use of the legal process can disrupt international support, seize funds, bring prosecutions, change laws within the host nation (for example to make the sale, purchase, ownership or transportation of IED components illegal) or to proscribe membership of a specific group. Legal protocols also underscore the need for the collection and proper handling of evidence to ensure that individuals can be successfully dealt with by appropriate courts.


Economic Activity

Overseas investment, international flows of capital and trade, and development assistance provide scope for the exercise of economic influence. Economic power can provide a range of incentives, boycotts, tariffs, pricing structures and sanctions to influence decisions and affect behavior. Their impact is complicated by the combination of public and private influences, the operation of market forces and the complex relationships between global and national rates of growth and economic activity.


Defeating the Device

''Defeat the device'' is a mainly military response made up of proactive and reactive activities as a result of the existence of suspect or emplaced devices. The purpose of these activities is to deliver freedom to operate and achieve the wider aims of the operation. Measures taken here to mitigate, detect and neutralize IEDs have an immediate effect and directly save lives. Defeat the device protects the population and delivers physical security to military forces by means of tactical and technical measures as well as information activities. Intelligence from exploitation delivers new understanding and permits the development of new tactical and technical solutions to detect and neutralize devices and to mitigate their effects.


Mitigation for C-IED

Mitigation is defined within C-IED as technical, tactical and information actions undertaken to minimize the effects of an IED Event. Mitigation activity will reduce the effect of potentially being compromised as well as reducing the actual IED events if compromised. Mitigation activity will form part of Force Protection (FP) measures and as such will use a framework of measures, both proactive and reactive that are supported by iterative risk management. Risk analysis based upon understanding of the threats is required to form management measures for mitigation. Calculating this involves complex variables including the environment, the adversary, the population, the characteristics of the threat posed (including IEDs) and military forces. This complexity makes it impossible to model with any certainty and in turn this places heavy demands on the commander's skill and judgement for decision-making.


Counter-RCIED Efforts

Electronic Warfare (EW) support is an asset used in an environment where Radio Controlled IEDs (RCIED) are a threat. The division of EW known as electronic support measures can search for, identify and intercept, electromagnetic emissions and sometimes locate their sources for the purpose of immediate threat elimination. It provides a source of information required for immediate decisions involving Electronic Counter Measures (ECM), and other tactical actions. The division of EW known as ECM can take action to prevent or reduce an enemy's effective use of the electromagnetic spectrum through the use of electromagnetic energy. Electronic warfare includes three major subdivisions: Electronic Attack (EA), Electronic Protection (EP), and Electronic Support (ES).


Electronic Attack

Electronic Attack (EA) involves the use of EM energy, directed energy, or anti-radiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability.


Electronic Protection

Electronic Protection (EP) involves actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or destroy friendly combat capability.


Electronic Support

Electronic Support (ES) is the subdivision of EW involving actions tasked by, or under direct control of, an operational commander to search for, intercept, identify, and locate or localize sources of intentional and unintentional radiated EM energy for the purpose of immediate threat recognition, targeting, planning, and conduct of future operations. These measures begin with systems designed and operators trained to make Electronic Intercepts (ELINT) and then classification and analysis broadly known as
Signals intelligence Signals intelligence (SIGINT) is intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication ( ...
(SIGINT) from such detection's to return information and perhaps actionable intelligence (e.g. a ship's identification from unique characteristics of a specific radar) to the commander.


Counter-IED Equipment

Equipment used in Counter-IED efforts consists of robots, soldier worn protection, specialized counter-IED vehicles, electronic and other countermeasures, detection systems, and unmanned systems intended for counter-IED. File:US Navy 090512-N-2013O-013 A Mark II Talon robot from Explosive Ordnance Disposal Mobile Unit 5, Det. Japan, is used to inspect a suspicious package during a force protection-anti-terrorism training exercise.jpg, A Mark II Talon robot File:TEODor.jpg, Bomb disposal robot "tEODor" of the German Bundeswehr destroying an IED dummy File:FPCougar.jpg, MRAP (Cougar variant) being blast tested File:CREW V3 System.jpg, Duke V3 Counter Radio-controlled Electronic Warfare jamming system File:Two Soldiers operate Thor and Minehound.jpg, The 25th Infantry Division operating a Vallon "Minehound" mine detector and the THOR, two counter-IED devices File:Aerostat in Afghanistan (PTDS).JPG, Current version of PTDS, the main Aerostat used by coalition forces in combat operations File:MASINT-UTAMStower.png, MASINT-UTAMS tower


Explosive Ordnance Disposal

EOD elements are always in high demand and there is nearly always a shortage of trained personnel. Additionally there is a high level of risk to these personnel. Within EOD, IED Defeat or (IEDD) is the location, identification, rendering safe and final disposal of IEDs. IEDD is a specialist skill requiring specific training and equipment preferably including the use of remote control vehicles. EOD tasks related to C-IED are focused upon the activities of detection, mitigation, IEDD and also exploitation. EOD tasks aim to respond to, identify, render safe and dispose of explosive ordnance, including Chemical, Biological, Radiological and Nuclear (CBRN) devices, that threaten/impede maneuver. This also includes destroying captured enemy explosive ordnance and assisting in the disposal of unserviceable national and foreign explosive ordnance. Unexploded Ordnance (UXO), rendering safe of IEDs.


Route Clearance and Route Check

Route search and route check are categories of search that involve identifying vulnerable points or vulnerable areas and using 3 categories of search in increasing levels of threat or required assuredness: Route checks are conducted by patrol-search trained troops: intermediate route search using trained search teams; and advanced route search where there is a high threat requiring the intimate support of other C-IED enablers. Route clearance teams are often organized as a Route Clearance Package (RCP) within an all-arms grouping and are normally engineer-based. They can be equipped with a mix of general and specialist vehicles, equipment and personnel integrated to conduct route clearance. Their purpose is to eliminate concealment for IEDs, munitions and caches as well as providing systematic detection and deterrence sweeps along cleared routes. A RCP can be used in both general support (e.g. to maintain main supply routes) and in close support (e.g. to provide support to maneuver units on tactical road moves). RCPs can consist of Mechanized and Combat Heavy Engineers and EOD teams. Another method for organizing an RCP is to form 5 elements within the team responsible for command and control, detection, security, improvement, and EOD.


Military Search

Military search is the management and application of systematic procedures and appropriate equipment to locate specified targets in support of military operations. Specified targets may include people, information and material resources employed by an adversary. The techniques of military search can be applied to all manner of search tasks to include combinations of personnel, buildings, venues, areas, routes, vehicles, vessels and aircraft.


Military Working Dogs

Military working dogs (MWD) are C-IED enablers and are often integral to search activities. The MWD, with its enhanced sense of smell, is a superior sensor capable of detecting a wide range of munitions and Home Made Explosives (HME) used to construct IEDs. Tactical use of MWDs can deprive the enemy of explosive caches and components, and disrupt the enemy's ability to attack mounted and dismounted patrols. Effective integration of MWD teams in small unit tactical operations can reduce casualties, increase freedom of movement for dismounted patrols, and instill unit confidence in countering the IED threat. The MWD team can be thought of as a reconnaissance sensor. Like many sensors, the team can passively collect information all the time and teams are useful in this role. But by planning when and where an MWD team will search, units give themselves the greatest advantage of MWD teams. Units assign specific searches to MWD teams and can develop these collection requirements (searches for MWD teams) at critical times and places in their operations by analyzing historic IED data and threat Tactics, Techniques, and Procedures (TTPs). MWD use is one tool in the unit's IED defeat tool box, but it is not the only tool.


Weapons Intelligence


Preparing the Force

Preparing the force activity is applicable to all military and law enforcement components and involves measures designed to ensure they are prepared for operations and enabled to deliver the C-IED approach and its component capabilities. In order to deliver C-IED capability, coherent and supporting Lines of Development (LoD) are required. Not least C-IED efforts must be appropriately organized, interoperable with other military allies and the host nation law enforcement, manned, equipped, sustained, educated in doctrine, and trained in tactics, techniques, and procedures (TTPs) to the level required for their operational role. This capability is developed from a mix of the military commander's guidance, the outputs of the residual experience in the operational area, the lessons process, and technology and contributions from the other C-IED pillars. Commanders ideally ensure that intelligence on IEDs and related adversary TTPs are quickly disseminated and that friendly TTPs can be modified to be as up-to-date, appropriate and effective as possible.


Counter-IED Training

Education and Individual Training (E&IT) comprises the instructional activities that provide skills, knowledge and attitudes required in the performance of assigned duties, and upon which information can be correctly interpreted and sound judgement exercised. E&IT focuses on preparation for a task in order to meet operational requirements and specific needs. The emergence of the IED threat has been a significant change to the historic threat faced by military and law enforcement communities and continues to be the primary casualty-producing weapon and tactic against military forces. To address this significant concern, the Counter-IED community has responded and developed a number of training activities to better prepare themselves for operations in a high threat IED environment. Train the Force, one of three mutually supporting lines of operation, is a critical component of the
JIEDDO The Joint Improvised-Threat Defeat Organization (JIDO) is a combat support organization of the U.S. Department of Defense (DoD) organization under the Defense Threat Reduction Agency (DTRA)
mission to defeat the IED threat as a weapon of strategic influence. The Joint Center of Excellence is JIEDDO's lead organization for the train-the-force line of operation and is responsible for development of training capabilities that enable the services' and combatant commanders' mission of preparing U.S. forces to defeat this threat. Combat Hunter Training teaches how to track the emplacer by combined hunter and tracker skills and with determining group dynamics - as an example - using the "street smarts" developed by law enforcement who work in the cities. Inert IED Training Devices are typically designed and constructed by current and former
Explosive Ordnance Disposal Bomb disposal is an explosives engineering profession using the process by which hazardous explosive devices are rendered safe. ''Bomb disposal'' is an all-encompassing term to describe the separate, but interrelated functions in the militar ...
(EOD) and Public Safety Bomb Technicians who draw from their real-world experience with live IEDs and other explosive threats to ensure that the training devices are accurate, current and realistic.


Counter-IED Conferences and Workshops

Various Counter-IED training workshops are provided by the private sector for government agencies and international corporations to help manage and reduce their risks from acts of
terrorism Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
, protect their assets, and adapt to ever-changing operational needs. These workshops include training courses on applications, security protocols, and various types of screening equipment.
NATO The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two No ...
holds an annual Counter-IED conference in cooperation with the C-IED Centre of Excellence. IB Consultancy organizes a worldwide series of events around C-IED and CBRNe: the NCT (non conventional threat). The Asian edition NCT eXplosive Asia will be held in 2014 for its 3rd edition in Siemens Reap, Cambodia.


Understanding and Intelligence


Sources of Intelligence for C-IED

Intelligence sources include national military and police agencies (including counterintelligence). The military intelligence component contributes to a C-IED approach in these ways:


Intelligence, Surveillance and Reconnaissance

Intelligence, Surveillance and Reconnaissance (ISR) is the coordinated and integrated acquisition, processing and provision of timely, accurate, relevant, coherent and assured information and intelligence to support commander's conduct of activities. Land, sea, air and space platforms have critical ISR roles in supporting operations in general. For C-IED air and space platforms can provide valuable input for each of the intelligence disciplines. Land platforms contribute too, through observation posts, reconnaissance and patrolling activity, surveillance of targets as well as static cameras and sensors for monitoring locations, facilities, networks, individuals, routes etc. By massing ISR assets, allowing a period of immersion, developing layering and cross cueing of sensors, an improved clarity and depth of knowledge can be established.


Human Intelligence

Human Intelligence (HUMINT) is a category of intelligence derived from information collected and provided by human sources.AAP-6, NATO Glossary of Terms and Definitions, 2010. Information from the local population and host nation security forces can prove especially valuable not least to establish unusual activity or information about adversaries in a society that may otherwise appear opaque. The view from those that understand the culture and the country best is invaluable in developing understanding. HUMINT is therefore vital to successful CIED.


Imagery Intelligence

Imagery Intelligence (IMINT) is intelligence derived from imagery acquired by sensors which can be ground-based, seaborne or carried by air or space platforms.AJP-2 Allied Joint Intelligence, Counter Intelligence and Security Doctrine. For C-IED, imagery allows the physical capture of information for analysis and can be used, for example to: track human movement around suspicious areas; identify locations of interest; demonstrate change in an area or disturbance of terrain; demonstrate physical relationships or networks. IMINT can also provide the necessary proof required for analysis leading to effective targeting and successful prosecution.


Signals Intelligence

Signals Intelligence (SIGINT) is a category that includes communications intelligence and electronic intelligence when there is no requirement to differentiate between these two types of intelligence, useful especially when the two have fused together. For C-IED, the analysis of intercepted communications enables hostile plans to be disrupted and to identify hostile personnel and their networks.


Materiel and Personnel Exploitation

Materiel and Personnel Exploitation (MPE) is the systematic collection and processing of information and dissemination of intelligence obtained as a result of tactical questioning, interrogation and the extraction of data from recovered materiel. It is a multi-source, responsive process that aims to maximize the intelligence value of captured personnel and recovered materiel. MPE activity may be supported by a dedicated intelligence exploitation facility which may include the ability to process captured persons. When MPE produces intelligence for C-IED it can directly feed into understanding of the IED threat networks. The following disciplines/processes are the main components of MPE: # Seized Media Analysis. Seized media analysis, referred to as Document and Media Exploitation (DOMEX) by the US, is the systematic exploitation of either hard copy documents (referred to as document exploitation) or electromagnetically stored data including that found on hard drives, data discs, personal communications systems (mobile phones and similar devices) as well as electromagnetic and digital exploitation. Whether seized for later exploitation or downloaded on site, items such as mobile phones, computer hard drives, USB sticks and digital cameras can provide a wealth of information that can link an IED to other threat activities. # Tactical Questioning and Interrogation. Tactical questioning is the obtaining of information of a tactical nature from captured personnel, the value of which would deteriorate or be lost altogether if the questioning were delayed until a trained interrogator could be made available. Tactical questioning also facilitates the screening and selection of personnel for further exploitation by interrogation or debriefing. Interrogation is the systematic longer term questioning of a selected individual by a trained and qualified interrogator. # Technical Intelligence.
TECHINT Techint is an Argentine conglomerate founded in Milan in 1945 by Italian industrialist Agostino Rocca and headquartered in Milan (Italy) and Buenos Aires (Argentina). As of 2019 the Techint Group is composed of six main companies in the followin ...
is defined as intelligence concerning foreign technological developments, and the performance and operational capabilities of foreign materiel, which have or may eventually have a practical application for military purposes. TECHINT is wider than C-IED and encompasses small arms and other counter-threat efforts in any particular theater. Within the context of CIED, TECHINT comprises the examination and analysis process that aims to inform about the technical characteristics of a device, its functionality, components and mode of employment. This focused activity is supported by NATO C-IED Exploitation System. TECHINT can also support source analysis activity by identifying patterns in either device usage or construction. Results will be promulgated by way of reports and advice. Reporting may be given an urgent and very high priority where there is an immediate FP impact. Some exploitation of IEDs and recovered materiel may fall into critical protected areas that may link to specific strategic efforts of OGDs. # Forensic and Biometric Intelligence. Forensic and Biometric Intelligence (FABINT) is intelligence derived from the application of multi-disciplinary scientific or technical processes and can often, although not exclusively, be collected to an evidential standard. Biometric intelligence is a subset of this, and refers to forensic intelligence related to a specific individual. Examples include fingerprints, Deoxyribonucleic Acid (DNA) and tool marks on IED components. Outputs will include the extraction of latent prints and DNA from materiel, and the matching of these to database entries. FABINT is an important tool to C-IED as it allows understanding to be built about the parties in the IED threat network and will allow for criminal prosecutions as part of the long term solution.


Multiple Source Fusion

Multiple source fusion is the synthesis of information and intelligence from a limited number of sources, normally controlled by the same agency. Intelligence staff should fuse the output of multiple sources from the various natures of intelligence. Multiple source fusion activity should be collocated with collection assets. Fusion cells will produce IED trend reporting and intelligence reports to feed current operations or prosecuting follow-on activities as well as intelligence summaries to support future activities for example involving DNA or finger print matches.


Single Source Processing

Single source processing is the identification of patterns and intelligence start points within the single source collection environment, and the translation of that single source information into a format useful to the non-specialist. The single source processing capability should be able to re-task collection activity according to priorities; it should also be collocated with collection assets.


Laboratory Services

The Terrorist Explosive Device Analytical Center (TEDAC) was formally established in 2004 to serve as the single interagency organization to receive, fully analyze, and exploit all terrorist IEDs of interest to the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territorie ...
. TEDAC coordinates the efforts of the entire government, from law enforcement to intelligence to military, to gather and share intelligence about these devices—helping to disarm and disrupt IEDs, link them to their makers, and prevent future attacks. TEDAC consists of a director (
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
), a deputy director ( BATF), a Department of Defense executive manager (
JIEDDO The Joint Improvised-Threat Defeat Organization (JIDO) is a combat support organization of the U.S. Department of Defense (DoD) organization under the Defense Threat Reduction Agency (DTRA)
), and five units relating to
forensics Forensic science, also known as criminalistics, is the application of science to criminal and civil laws, mainly—on the criminal side—during criminal investigation, as governed by the legal standards of admissible evidence and crimina ...
, technical exploitation,
intelligence Intelligence has been defined in many ways: the capacity for abstraction, logic, understanding, self-awareness, learning, emotional knowledge, reasoning, planning, creativity, critical thinking, and problem-solving. More generally, it can b ...
, and investigations. TEDAC includes representatives from the
Department of Justice A justice ministry, ministry of justice, or department of justice is a ministry or other government agency in charge of the administration of justice. The ministry or department is often headed by a minister of justice (minister for justice in a v ...
; the
Department of Defense Department of Defence or Department of Defense may refer to: Current departments of defence * Department of Defence (Australia) * Department of National Defence (Canada) * Department of Defence (Ireland) * Department of National Defense (Philipp ...
; international partner agencies; and members of the intelligence community.


Intelligence Management Systems

TRIPwire is a secure online portal sponsored by the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terr ...
's Office for Bombing Prevention (DHS/OBP). TRIP''wire'' is designed to bring technical and operational information on
terrorist tactics, techniques, and procedures Tactics, Techniques, and Procedures (TTPs) is an essential concept in terrorism and cyber security studies. The role of TTPs in terrorism analysis is to identify individual patterns of behavior of a particular terrorist activity, or a particular ...
(TTPs) to the desktop of officers in the bombing prevention community. It also facilitates information sharing and networking by offering collaboration tools such as community forums and secure e-mail. TRIP''wire'' allows law enforcement to access and share information and experiences about the IED threat. The Dfuze Intelligence Management System allows secure storage and maintenance of all data related to IED, EOD, criminal gang, terrorist and firearm incidents and operations. The system provides a centralized view of all significant data on record with built-in analytical tools and secure data sharing for data entry, data linking, data searching, and data retrieval.


See also

*
Social network analysis Social network analysis (SNA) is the process of investigating social structures through the use of networks and graph theory. It characterizes networked structures in terms of ''nodes'' (individual actors, people, or things within the network) a ...
*
Route Clearance Route clearance is a routine part of counter-IED efforts performed by military forces around the world. The purpose of route clearance is to secure an important route and render it for safe transport. This mission relies on the use of Sapper and ...
*
Combined Joint Task Force Paladin Combined Joint Task Force Paladin ("CJTF Paladin") was the International Security Assistance Force command responsible for counter-IED efforts and Explosive Ordnance Disposal (EOD) during the War in Afghanistan (2001–2021). With military and ci ...
*
EOD CoE The Explosive Ordnance Disposal (EOD) Centre of Excellence (EOD CоE) is one of NATO NATO Centre of Excellence, Centres of Excellence, located in Trenčín, Slovakia. It assists NATO member countries, partners, other countries and international ...


References


External links


SRC, Inc. Counter-IED Systems
developer of the CREW Duke system
Humanistic Robotics Inc
Countermine and IED equipment
Counter Improvised Explosive Device Task Force
(C-IED TF) acts as the strategic focal point for C-IED issues within the Canadian Forces (CF)
TEDAC Marks 10-Year Anniversary - A Potent Weapon in the War on Terror
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...

Threat Finance: A Critical Enabler for Illicit Networks
{dead link, date=August 2017 , bot=InternetArchiveBot , fix-attempted=yes by Danielle Camner Lindholm and Celina B. Realuyo
Tripwire Operations GroupC-IED.ORG Home PageJoint IED Defeat Organization: The Authority on IEDsTRIPwire
The
United States Department of Homeland Security The United States Department of Homeland Security (DHS) is the Federal government of the United States, U.S. United States federal executive departments, federal executive department responsible for public security, roughly comparable to the I ...
's technical resource for incident prevention
Counter-IED Report
Disaster preparedness Improvised explosive devices