Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013

Post on 15-Jan-2015

749 views 0 download

Tags:

description

Lt Gen JP Singh, PVSM, AVSM (retd), Defence Research and Development Organisation (DRDO), Ministry of Defence, India

transcript

COUNTER IED PHILOSOPHY,

WAYS & MEANS

STRATEGIC ENVIRONMENT:

INDIA

Lt Gen JP Singh(Retd.),

PVSM, AVSM

Internal Threat, Internally

Abetted

Internal Threat, Externally

Abetted

External Threat, Internally

Abetted

External Threat, Externally

Abetted

THREATS (KAUTILIYA)

FLASH POINTS

STATES

Org: Large Sized FmnsHierarchical

Wpns: Sophisticated

C2: Centralised

[HIGH RISK]

STATE SPONSORED HYBRID

Org: Moderate size TrainedDisciplined

Wpns: ATGMs, RPGs, Rkts,Mors, HMGs, MANPADSIEDs

C2: DecentralisedCell PhonesRunners

[RAPIDLY EVOLVING]

NON STATE IRREGULAR

Org: Small SquadsCellular StructureILL TrainedInnovative

Wpns: SAs,RPGs,Mors, Rkts, IEDs

C2: DecentralisedCell PhonesRunners

[PROBABILITY HIGH]

OPERATIONAL ENVIRONMENT

IrregularHybridConventional

Easy to Make.

Inexpensive.

Availability of Chemical Components.

Multi Mode Trigger.

IED : TAC WEAPON SYSTEM

High mortality rates.

Fear, Anxiety & Fatigue.

Disrupts access to people, critical

spaces.

Shapes public opinion of conflict.

Demands very expensive strategic

response.

IED : STRATEGIC IMPACT

IED has made transition from tactical nuisance to full blown strategic threat where in inexpensive tactics demand very expensive strategic response.

ACTIVITIES

STRATEGIC TACTICAL

•Funding. •Local leadership.

•Planning. •IED employment plans.

•Training. •Bomb making.

•Logistic Support. •Delivering of IEDs.

•Overall resource allocation.

•Emplacement.

•Initiation.

•Event exploitation.

Leadership.Recruiting.Training.Target Selections & Planning.Surveillance.Rehearse attack.Movement of Component and personnel.Funding.Supplies.Infrastructure (Safe houses, storage).Support (Intl, Regional, Local).Monitor & Detonate.Information operations.

COMMON ELEMENTS

Dynamic Systemic threat

comprising multiple actors,

state and non state, who

operate and interact within

adaptive and network

Systems that extend beyond

geographical boundaries.

IED THREAT

Potent

Survive

Innovative

Short Loop

Combination of IE

IED THREAT

COMBINATION OF IEs

MILITARY

PETN RDX HE

C4 SEMTEX Plastic Explosive

Commercial

TNTAmmonia Nitrate & Aluminum PowderAmmonium Nitrate & Fuel oil Black PowderDynamiteNitro GlycerinUrea Nitrate

HME

Potassium Chlorate (White Odorless Powder)Sodium Chlorate (Yellow Odorless Power)Hydrogen Peroxide(disinfectant)TATP Common HMEs HMTD built with Hydrogen Peroxide

CONTAIN VARIOUS Forms of N2(exploited by detection technology which look for Nitro/Nitrate GpsIEDs COMPONENTS

Control SystemDetonatorBoosterMain ChargePackaging

Reduce effectiveness and

lethality of IED threat to

allow extended freedom of

maneuver for security forces

and state agencies.

Prevent disruption in socio-

economic activities.

COUNTER IED

Pan Government Approach.

Coordinated effort of all applicable agencies of national power.

Common understanding of Strategic environment wrt IED challenges.

Building enduring capabilities.

COUNTER IED STRATEGY

C' IED: APPROACHTIME

ATTACK THE NW

DEFEAT THE DEVICE

PREDICT /PREVENT

IED FACILITATION

& FABRICATION

NEUTRALISE

MITIGATE

IEDDETONATIO

N

TRAIN THE FORCE

GEN AWARENESS

CALIBERATED TRG

SPECIALIST TRG

IED: LOOP

GATHERING IED MATERAIAL

CONSTRUCTING IED

CONSTRUCTED IED

STORAGE INVENTORY EMPLACEMENT EMPLACED IED

DETONATION DETONATED IED

POPULATION RADICALISATION GREY RECRUITMENT INSURGENT NEUTRALISE

C' IED: APPROACHTIME

ATTACK THE NW

DEFEAT THE DEVICE

PREDICT /PREVENT

IED FACILITATION

& FABRICATION

NEUTRALISE

MITIGATE

IEDDETONATIO

N

TRAIN THE FORCE

GEN AWARENESS

CALIBERATED TRG

SPECIALIST TRG

Information Operations.

Law Enforcement.

Deterrence.

Disrupt re supply operations.

Financing network.

Signal Intelligence.

Biometric Analysis.

Behavioral Analysis.

Geographical Profiling.

Forensic Tools

TARGET THE NETWORK

Improvised Explosive Device

Types of IEDso Buried IEDso Directional/ off route mineso Booby trapso Vehicle bombso RF IEDs

IEDo Explosiveo Initiatoro Trigger/ Switcho Power sourceo Casing

Explosive Detection

Quantity basedBulk DetectionTrace Detection

Vapor Detection Particulate Detection

Distance of detection Point Detection Standoff detection

Trace Explosive Detection Technologies

Trace Detection

Surface Acoustic Wave Sensor MEMS Sensors Quartz Crystal Microbalance Fluorescent Polymer Sensor Spectroscopy (Ion Mobility/Gas Chromatography) Chemiluminescence UV Fluorescence Chemical reagents Dogs

Bulk Explosive Detection Technologies

Bulk DetectionX-Ray

Single/ Dual energy Tomography Backscatter (Single/ Double beam)

Low Energy Microwave (Dielectrometry)Terahertz/ Thermal ImagingGround Penetrating RadarsNuclear Based

Nuclear Quadrupole ResonanceThermal Neutron ActivationFast Neutron Activation/ Pulsed Fast Neutron Activation

IED Demolition/ Neutralization

Water jet Disrupter

Laser Ordinance Disposal

Plastic Explosive

Jammers for RF IEDs

Thermal cutter

Institutional Mission focused

Calibrated Training

General Awareness to all Ranks

Specialist Training

TRG PHILOSOPHY

Centers of Excellence

Replicate

3 dimensional visualisation

Modeling and Simulation

Training Brain

EMPHASIS

Information on IEDs

Modus operandi of terrorists

Do’s and Dont’s

Area Domination

Cultivate Sources

Basic technology of detection systems

GEN AWARENESS

SPECIALIST TRAININGFocus 1 (Attack the NW)

C IED intWeapon Technology intPersistent Surveillance, recce, information opsIED technical and Forensic exploitationDisposal of unexploded/captured ordnance

Focus 2 (Defeat the IED)Detect and neutralisation at safe stand off rangesIdentification of suspicious solids & liquidsUse of IED detection systems

Fixed. Vehicle mtd. Man portable. Detection robotsVehicle optics sensor systems. Jammers.Mechanical route clearing devices. Misc detection kits.

Focus 3Training the trainers