Chris hunter

33
Secure Cities II Initiative Countering Improvised Explosive Device Networks Chris Hunter QGM FIExpE GCGI MCMI Kratos Enterprises Ltd Counter-IED Consultants

Transcript of Chris hunter

Page 1: Chris hunter

Secure Cities II Initiative

Countering Improvised Explosive Device Networks

Chris Hunter QGMFIExpE GCGI MCMI

Kratos Enterprises LtdCounter-IED Consultants

Page 2: Chris hunter

Counter-Terrorist Bomb Disposal

Page 3: Chris hunter

Assault IEDD

• Assault IEDD is the process in which an operator uses speedy render-safe techniques to maintain the momentum of an assaulting force in a potentially hostile environment.

Page 4: Chris hunter

Nov 26th Mumbai Attacks

Page 5: Chris hunter

C-IED Operations Northern Ireland, Iraq, Afghanistan and Colombia

Page 6: Chris hunter

Scope

• The Structure of a Terrorist Network

• Methods of attacking the network

• Challenges• Final Considerations

Page 7: Chris hunter

Leadership

• Provides direction and

policy

• Approves Goals and

Objectives

• Overarching guidance for

Operations

• Generally rise from within

ranks or establish their own

splinter groups

Page 8: Chris hunter

Operators

• Plan and execute operations

• Manage and acquire intelligence, finance, logistics and comms

• Includes bomb making and surveillance expertise

• Bomb emplacers generally not bomb makers

Page 9: Chris hunter

Operators: Cellular Foundation

• Tactical level• 3 – 4 people• Security• Difficult to infiltrate• Unaware of other cells and

their membership• Provide emotional and

social support• Leader is often only contact

with outside world

Page 10: Chris hunter

Active Supporters

Active in:• Political/Ideological

Indoctrination• Fund Raising• Information gathering• Provision of safe houses,

transportation and medical assistance

• Do not normally commit violent acts

Page 11: Chris hunter

Defeating the Terror Network at the Strategic and Operational Level

Page 12: Chris hunter

Profiling those at high risk of becoming radicalised

Page 13: Chris hunter

Targeting the Training Camps

• Assassination• Arson• Bombing• Hijacking• Hostage Taking• Kidnapping• Maiming• Raids• Seizure• Sabotage• Hoaxes• Use of CBRN weapons

Page 14: Chris hunter

Global not Regional Trend Analysis

Page 15: Chris hunter

Ramzi Yousef

Page 16: Chris hunter

Project Bojinka - 1995

Page 17: Chris hunter

Airline Bomb Plot

Page 18: Chris hunter

Money Laundering

Page 19: Chris hunter

Global Logistics and Procurement Chains (Land, Sea and Air)

Page 20: Chris hunter

Covert Operations – Letting an operation run

Page 21: Chris hunter

Disruption of Component Chain

Page 22: Chris hunter

Technical & Forensic Exploitation

Page 23: Chris hunter

Social Network Analysis

Page 24: Chris hunter

Correctly Trained Debriefing Personnel

Page 25: Chris hunter

Other Considerations

Page 26: Chris hunter

Analysis and Testing of Likely Targets

Page 27: Chris hunter

Intelligence must be multi-source:

Page 28: Chris hunter

Booby-trapped Safe-houses

Page 29: Chris hunter

Prepare for the Future: CBRN

Page 30: Chris hunter

Prepare for Future Threats: London & Glasgow Bombings 2007

Page 31: Chris hunter

Investing in protection: The Cost of Terror vs Defence Spending

• Sept 11Twin towers New York:  Cost to terrorist $500,000; Cost to America $600bn

• Madrid Bombings:  Cost to terrorist 10,000 euros; Cost to Spain 212 million euros 

• 2002: Yemen French oil tanker Limburg:  Cost to terrorist <$50,000.  Cost to Yemen $3.8m per month

Page 32: Chris hunter

The war on terror has only two outcomes: Win, or lose…and we can only win, if we stay alert…and look for

absence of the normal, and presence of the abnormal

Page 33: Chris hunter

Questions?

Chris Hunter QGMFIExpE GCGI MCMI

Director Kratos Enterprises LtdCounter-IED Consultants

www.kratosenterprises.com