counter ied philosophy and threat management in the indian context securing asia 2013
DESCRIPTION
Lt Gen JP Singh, PVSM, AVSM (retd), Defence Research and Development Organisation (DRDO), Ministry of Defence, IndiaTRANSCRIPT
COUNTER IED PHILOSOPHY,
WAYS & MEANS
STRATEGIC ENVIRONMENT:
INDIA
Lt Gen JP Singh(Retd.),
PVSM, AVSM
Internal Threat, Internally
Abetted
Internal Threat, Externally
Abetted
External Threat, Internally
Abetted
External Threat, Externally
Abetted
THREATS (KAUTILIYA)
FLASH POINTS
STATES
Org: Large Sized FmnsHierarchical
Wpns: Sophisticated
C2: Centralised
[HIGH RISK]
STATE SPONSORED HYBRID
Org: Moderate size TrainedDisciplined
Wpns: ATGMs, RPGs, Rkts,Mors, HMGs, MANPADSIEDs
C2: DecentralisedCell PhonesRunners
[RAPIDLY EVOLVING]
NON STATE IRREGULAR
Org: Small SquadsCellular StructureILL TrainedInnovative
Wpns: SAs,RPGs,Mors, Rkts, IEDs
C2: DecentralisedCell PhonesRunners
[PROBABILITY HIGH]
OPERATIONAL ENVIRONMENT
IrregularHybridConventional
Easy to Make.
Inexpensive.
Availability of Chemical Components.
Multi Mode Trigger.
IED : TAC WEAPON SYSTEM
High mortality rates.
Fear, Anxiety & Fatigue.
Disrupts access to people, critical
spaces.
Shapes public opinion of conflict.
Demands very expensive strategic
response.
IED : STRATEGIC IMPACT
IED has made transition from tactical nuisance to full blown strategic threat where in inexpensive tactics demand very expensive strategic response.
ACTIVITIES
STRATEGIC TACTICAL
•Funding. •Local leadership.
•Planning. •IED employment plans.
•Training. •Bomb making.
•Logistic Support. •Delivering of IEDs.
•Overall resource allocation.
•Emplacement.
•Initiation.
•Event exploitation.
Leadership.Recruiting.Training.Target Selections & Planning.Surveillance.Rehearse attack.Movement of Component and personnel.Funding.Supplies.Infrastructure (Safe houses, storage).Support (Intl, Regional, Local).Monitor & Detonate.Information operations.
COMMON ELEMENTS
Dynamic Systemic threat
comprising multiple actors,
state and non state, who
operate and interact within
adaptive and network
Systems that extend beyond
geographical boundaries.
IED THREAT
Potent
Survive
Innovative
Short Loop
Combination of IE
IED THREAT
COMBINATION OF IEs
MILITARY
PETN RDX HE
C4 SEMTEX Plastic Explosive
Commercial
TNTAmmonia Nitrate & Aluminum PowderAmmonium Nitrate & Fuel oil Black PowderDynamiteNitro GlycerinUrea Nitrate
HME
Potassium Chlorate (White Odorless Powder)Sodium Chlorate (Yellow Odorless Power)Hydrogen Peroxide(disinfectant)TATP Common HMEs HMTD built with Hydrogen Peroxide
CONTAIN VARIOUS Forms of N2(exploited by detection technology which look for Nitro/Nitrate GpsIEDs COMPONENTS
Control SystemDetonatorBoosterMain ChargePackaging
Reduce effectiveness and
lethality of IED threat to
allow extended freedom of
maneuver for security forces
and state agencies.
Prevent disruption in socio-
economic activities.
COUNTER IED
Pan Government Approach.
Coordinated effort of all applicable agencies of national power.
Common understanding of Strategic environment wrt IED challenges.
Building enduring capabilities.
COUNTER IED STRATEGY
C' IED: APPROACHTIME
ATTACK THE NW
DEFEAT THE DEVICE
PREDICT /PREVENT
IED FACILITATION
& FABRICATION
NEUTRALISE
MITIGATE
IEDDETONATIO
N
TRAIN THE FORCE
GEN AWARENESS
CALIBERATED TRG
SPECIALIST TRG
IED: LOOP
GATHERING IED MATERAIAL
CONSTRUCTING IED
CONSTRUCTED IED
STORAGE INVENTORY EMPLACEMENT EMPLACED IED
DETONATION DETONATED IED
POPULATION RADICALISATION GREY RECRUITMENT INSURGENT NEUTRALISE
C' IED: APPROACHTIME
ATTACK THE NW
DEFEAT THE DEVICE
PREDICT /PREVENT
IED FACILITATION
& FABRICATION
NEUTRALISE
MITIGATE
IEDDETONATIO
N
TRAIN THE FORCE
GEN AWARENESS
CALIBERATED TRG
SPECIALIST TRG
Information Operations.
Law Enforcement.
Deterrence.
Disrupt re supply operations.
Financing network.
Signal Intelligence.
Biometric Analysis.
Behavioral Analysis.
Geographical Profiling.
Forensic Tools
TARGET THE NETWORK
Improvised Explosive Device
Types of IEDso Buried IEDso Directional/ off route mineso Booby trapso Vehicle bombso RF IEDs
IEDo Explosiveo Initiatoro Trigger/ Switcho Power sourceo Casing
Explosive Detection
Quantity basedBulk DetectionTrace Detection
Vapor Detection Particulate Detection
Distance of detection Point Detection Standoff detection
Trace Explosive Detection Technologies
Trace Detection
Surface Acoustic Wave Sensor MEMS Sensors Quartz Crystal Microbalance Fluorescent Polymer Sensor Spectroscopy (Ion Mobility/Gas Chromatography) Chemiluminescence UV Fluorescence Chemical reagents Dogs
Bulk Explosive Detection Technologies
Bulk DetectionX-Ray
Single/ Dual energy Tomography Backscatter (Single/ Double beam)
Low Energy Microwave (Dielectrometry)Terahertz/ Thermal ImagingGround Penetrating RadarsNuclear Based
Nuclear Quadrupole ResonanceThermal Neutron ActivationFast Neutron Activation/ Pulsed Fast Neutron Activation
IED Demolition/ Neutralization
Water jet Disrupter
Laser Ordinance Disposal
Plastic Explosive
Jammers for RF IEDs
Thermal cutter
Institutional Mission focused
Calibrated Training
General Awareness to all Ranks
Specialist Training
TRG PHILOSOPHY
Centers of Excellence
Replicate
3 dimensional visualisation
Modeling and Simulation
Training Brain
EMPHASIS
Information on IEDs
Modus operandi of terrorists
Do’s and Dont’s
Area Domination
Cultivate Sources
Basic technology of detection systems
GEN AWARENESS
SPECIALIST TRAININGFocus 1 (Attack the NW)
C IED intWeapon Technology intPersistent Surveillance, recce, information opsIED technical and Forensic exploitationDisposal of unexploded/captured ordnance
Focus 2 (Defeat the IED)Detect and neutralisation at safe stand off rangesIdentification of suspicious solids & liquidsUse of IED detection systems
Fixed. Vehicle mtd. Man portable. Detection robotsVehicle optics sensor systems. Jammers.Mechanical route clearing devices. Misc detection kits.
Focus 3Training the trainers