Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013

29
COUNTER IED PHILOSOPHY, WAYS & MEANS STRATEGIC ENVIRONMENT: INDIA Lt Gen JP Singh(Retd.), PVSM, AVSM

description

Lt Gen JP Singh, PVSM, AVSM (retd), Defence Research and Development Organisation (DRDO), Ministry of Defence, India

Transcript of Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013

Page 1: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

COUNTER IED PHILOSOPHY,

WAYS & MEANS

STRATEGIC ENVIRONMENT:

INDIA

Lt Gen JP Singh(Retd.),

PVSM, AVSM

Page 2: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Internal Threat, Internally

Abetted

Internal Threat, Externally

Abetted

External Threat, Internally

Abetted

External Threat, Externally

Abetted

THREATS (KAUTILIYA)

Page 3: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

FLASH POINTS

Page 4: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

STATES

Org: Large Sized FmnsHierarchical

Wpns: Sophisticated

C2: Centralised

[HIGH RISK]

STATE SPONSORED HYBRID

Org: Moderate size TrainedDisciplined

Wpns: ATGMs, RPGs, Rkts,Mors, HMGs, MANPADSIEDs

C2: DecentralisedCell PhonesRunners

[RAPIDLY EVOLVING]

NON STATE IRREGULAR

Org: Small SquadsCellular StructureILL TrainedInnovative

Wpns: SAs,RPGs,Mors, Rkts, IEDs

C2: DecentralisedCell PhonesRunners

[PROBABILITY HIGH]

OPERATIONAL ENVIRONMENT

IrregularHybridConventional

Page 5: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Easy to Make.

Inexpensive.

Availability of Chemical Components.

Multi Mode Trigger.

IED : TAC WEAPON SYSTEM

Page 6: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

High mortality rates.

Fear, Anxiety & Fatigue.

Disrupts access to people, critical

spaces.

Shapes public opinion of conflict.

Demands very expensive strategic

response.

IED : STRATEGIC IMPACT

Page 7: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

IED has made transition from tactical nuisance to full blown strategic threat where in inexpensive tactics demand very expensive strategic response.

Page 8: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013
Page 9: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

ACTIVITIES

STRATEGIC TACTICAL

•Funding. •Local leadership.

•Planning. •IED employment plans.

•Training. •Bomb making.

•Logistic Support. •Delivering of IEDs.

•Overall resource allocation.

•Emplacement.

•Initiation.

•Event exploitation.

Page 10: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Leadership.Recruiting.Training.Target Selections & Planning.Surveillance.Rehearse attack.Movement of Component and personnel.Funding.Supplies.Infrastructure (Safe houses, storage).Support (Intl, Regional, Local).Monitor & Detonate.Information operations.

COMMON ELEMENTS

Page 11: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Dynamic Systemic threat

comprising multiple actors,

state and non state, who

operate and interact within

adaptive and network

Systems that extend beyond

geographical boundaries.

IED THREAT

Page 12: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Potent

Survive

Innovative

Short Loop

Combination of IE

IED THREAT

Page 13: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

COMBINATION OF IEs

MILITARY

PETN RDX HE

C4 SEMTEX Plastic Explosive

Commercial

TNTAmmonia Nitrate & Aluminum PowderAmmonium Nitrate & Fuel oil Black PowderDynamiteNitro GlycerinUrea Nitrate

HME

Potassium Chlorate (White Odorless Powder)Sodium Chlorate (Yellow Odorless Power)Hydrogen Peroxide(disinfectant)TATP Common HMEs HMTD built with Hydrogen Peroxide

CONTAIN VARIOUS Forms of N2(exploited by detection technology which look for Nitro/Nitrate GpsIEDs COMPONENTS

Control SystemDetonatorBoosterMain ChargePackaging

Page 14: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Reduce effectiveness and

lethality of IED threat to

allow extended freedom of

maneuver for security forces

and state agencies.

Prevent disruption in socio-

economic activities.

COUNTER IED

Page 15: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Pan Government Approach.

Coordinated effort of all applicable agencies of national power.

Common understanding of Strategic environment wrt IED challenges.

Building enduring capabilities.

COUNTER IED STRATEGY

Page 16: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

C' IED: APPROACHTIME

ATTACK THE NW

DEFEAT THE DEVICE

PREDICT /PREVENT

IED FACILITATION

& FABRICATION

NEUTRALISE

MITIGATE

IEDDETONATIO

N

TRAIN THE FORCE

GEN AWARENESS

CALIBERATED TRG

SPECIALIST TRG

Page 17: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

IED: LOOP

GATHERING IED MATERAIAL

CONSTRUCTING IED

CONSTRUCTED IED

STORAGE INVENTORY EMPLACEMENT EMPLACED IED

DETONATION DETONATED IED

POPULATION RADICALISATION GREY RECRUITMENT INSURGENT NEUTRALISE

Page 18: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

C' IED: APPROACHTIME

ATTACK THE NW

DEFEAT THE DEVICE

PREDICT /PREVENT

IED FACILITATION

& FABRICATION

NEUTRALISE

MITIGATE

IEDDETONATIO

N

TRAIN THE FORCE

GEN AWARENESS

CALIBERATED TRG

SPECIALIST TRG

Page 19: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Information Operations.

Law Enforcement.

Deterrence.

Disrupt re supply operations.

Financing network.

Signal Intelligence.

Biometric Analysis.

Behavioral Analysis.

Geographical Profiling.

Forensic Tools

TARGET THE NETWORK

Page 20: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Improvised Explosive Device

Types of IEDso Buried IEDso Directional/ off route mineso Booby trapso Vehicle bombso RF IEDs

IEDo Explosiveo Initiatoro Trigger/ Switcho Power sourceo Casing

Page 21: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Explosive Detection

Quantity basedBulk DetectionTrace Detection

Vapor Detection Particulate Detection

Distance of detection Point Detection Standoff detection

Page 22: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Trace Explosive Detection Technologies

Trace Detection

Surface Acoustic Wave Sensor MEMS Sensors Quartz Crystal Microbalance Fluorescent Polymer Sensor Spectroscopy (Ion Mobility/Gas Chromatography) Chemiluminescence UV Fluorescence Chemical reagents Dogs

Page 23: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Bulk Explosive Detection Technologies

Bulk DetectionX-Ray

Single/ Dual energy Tomography Backscatter (Single/ Double beam)

Low Energy Microwave (Dielectrometry)Terahertz/ Thermal ImagingGround Penetrating RadarsNuclear Based

Nuclear Quadrupole ResonanceThermal Neutron ActivationFast Neutron Activation/ Pulsed Fast Neutron Activation

Page 24: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

IED Demolition/ Neutralization

Water jet Disrupter

Laser Ordinance Disposal

Plastic Explosive

Jammers for RF IEDs

Thermal cutter

Page 25: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Institutional Mission focused

Calibrated Training

General Awareness to all Ranks

Specialist Training

TRG PHILOSOPHY

Page 26: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Centers of Excellence

Replicate

3 dimensional visualisation

Modeling and Simulation

Training Brain

EMPHASIS

Page 27: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

Information on IEDs

Modus operandi of terrorists

Do’s and Dont’s

Area Domination

Cultivate Sources

Basic technology of detection systems

GEN AWARENESS

Page 28: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013

SPECIALIST TRAININGFocus 1 (Attack the NW)

C IED intWeapon Technology intPersistent Surveillance, recce, information opsIED technical and Forensic exploitationDisposal of unexploded/captured ordnance

Focus 2 (Defeat the IED)Detect and neutralisation at safe stand off rangesIdentification of suspicious solids & liquidsUse of IED detection systems

Fixed. Vehicle mtd. Man portable. Detection robotsVehicle optics sensor systems. Jammers.Mechanical route clearing devices. Misc detection kits.

Focus 3Training the trainers

Page 29: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia   2013