counter ied philosophy and threat management in the indian context securing asia 2013
DESCRIPTION
Lt Gen JP Singh, PVSM, AVSM (retd), Defence Research and Development Organisation (DRDO), Ministry of Defence, IndiaTRANSCRIPT
![Page 1: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/1.jpg)
COUNTER IED PHILOSOPHY,
WAYS & MEANS
STRATEGIC ENVIRONMENT:
INDIA
Lt Gen JP Singh(Retd.),
PVSM, AVSM
![Page 2: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/2.jpg)
Internal Threat, Internally
Abetted
Internal Threat, Externally
Abetted
External Threat, Internally
Abetted
External Threat, Externally
Abetted
THREATS (KAUTILIYA)
![Page 3: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/3.jpg)
FLASH POINTS
![Page 4: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/4.jpg)
STATES
Org: Large Sized FmnsHierarchical
Wpns: Sophisticated
C2: Centralised
[HIGH RISK]
STATE SPONSORED HYBRID
Org: Moderate size TrainedDisciplined
Wpns: ATGMs, RPGs, Rkts,Mors, HMGs, MANPADSIEDs
C2: DecentralisedCell PhonesRunners
[RAPIDLY EVOLVING]
NON STATE IRREGULAR
Org: Small SquadsCellular StructureILL TrainedInnovative
Wpns: SAs,RPGs,Mors, Rkts, IEDs
C2: DecentralisedCell PhonesRunners
[PROBABILITY HIGH]
OPERATIONAL ENVIRONMENT
IrregularHybridConventional
![Page 5: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/5.jpg)
Easy to Make.
Inexpensive.
Availability of Chemical Components.
Multi Mode Trigger.
IED : TAC WEAPON SYSTEM
![Page 6: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/6.jpg)
High mortality rates.
Fear, Anxiety & Fatigue.
Disrupts access to people, critical
spaces.
Shapes public opinion of conflict.
Demands very expensive strategic
response.
IED : STRATEGIC IMPACT
![Page 7: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/7.jpg)
IED has made transition from tactical nuisance to full blown strategic threat where in inexpensive tactics demand very expensive strategic response.
![Page 8: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/8.jpg)
![Page 9: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/9.jpg)
ACTIVITIES
STRATEGIC TACTICAL
•Funding. •Local leadership.
•Planning. •IED employment plans.
•Training. •Bomb making.
•Logistic Support. •Delivering of IEDs.
•Overall resource allocation.
•Emplacement.
•Initiation.
•Event exploitation.
![Page 10: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/10.jpg)
Leadership.Recruiting.Training.Target Selections & Planning.Surveillance.Rehearse attack.Movement of Component and personnel.Funding.Supplies.Infrastructure (Safe houses, storage).Support (Intl, Regional, Local).Monitor & Detonate.Information operations.
COMMON ELEMENTS
![Page 11: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/11.jpg)
Dynamic Systemic threat
comprising multiple actors,
state and non state, who
operate and interact within
adaptive and network
Systems that extend beyond
geographical boundaries.
IED THREAT
![Page 12: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/12.jpg)
Potent
Survive
Innovative
Short Loop
Combination of IE
IED THREAT
![Page 13: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/13.jpg)
COMBINATION OF IEs
MILITARY
PETN RDX HE
C4 SEMTEX Plastic Explosive
Commercial
TNTAmmonia Nitrate & Aluminum PowderAmmonium Nitrate & Fuel oil Black PowderDynamiteNitro GlycerinUrea Nitrate
HME
Potassium Chlorate (White Odorless Powder)Sodium Chlorate (Yellow Odorless Power)Hydrogen Peroxide(disinfectant)TATP Common HMEs HMTD built with Hydrogen Peroxide
CONTAIN VARIOUS Forms of N2(exploited by detection technology which look for Nitro/Nitrate GpsIEDs COMPONENTS
Control SystemDetonatorBoosterMain ChargePackaging
![Page 14: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/14.jpg)
Reduce effectiveness and
lethality of IED threat to
allow extended freedom of
maneuver for security forces
and state agencies.
Prevent disruption in socio-
economic activities.
COUNTER IED
![Page 15: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/15.jpg)
Pan Government Approach.
Coordinated effort of all applicable agencies of national power.
Common understanding of Strategic environment wrt IED challenges.
Building enduring capabilities.
COUNTER IED STRATEGY
![Page 16: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/16.jpg)
C' IED: APPROACHTIME
ATTACK THE NW
DEFEAT THE DEVICE
PREDICT /PREVENT
IED FACILITATION
& FABRICATION
NEUTRALISE
MITIGATE
IEDDETONATIO
N
TRAIN THE FORCE
GEN AWARENESS
CALIBERATED TRG
SPECIALIST TRG
![Page 17: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/17.jpg)
IED: LOOP
GATHERING IED MATERAIAL
CONSTRUCTING IED
CONSTRUCTED IED
STORAGE INVENTORY EMPLACEMENT EMPLACED IED
DETONATION DETONATED IED
POPULATION RADICALISATION GREY RECRUITMENT INSURGENT NEUTRALISE
![Page 18: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/18.jpg)
C' IED: APPROACHTIME
ATTACK THE NW
DEFEAT THE DEVICE
PREDICT /PREVENT
IED FACILITATION
& FABRICATION
NEUTRALISE
MITIGATE
IEDDETONATIO
N
TRAIN THE FORCE
GEN AWARENESS
CALIBERATED TRG
SPECIALIST TRG
![Page 19: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/19.jpg)
Information Operations.
Law Enforcement.
Deterrence.
Disrupt re supply operations.
Financing network.
Signal Intelligence.
Biometric Analysis.
Behavioral Analysis.
Geographical Profiling.
Forensic Tools
TARGET THE NETWORK
![Page 20: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/20.jpg)
Improvised Explosive Device
Types of IEDso Buried IEDso Directional/ off route mineso Booby trapso Vehicle bombso RF IEDs
IEDo Explosiveo Initiatoro Trigger/ Switcho Power sourceo Casing
![Page 21: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/21.jpg)
Explosive Detection
Quantity basedBulk DetectionTrace Detection
Vapor Detection Particulate Detection
Distance of detection Point Detection Standoff detection
![Page 22: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/22.jpg)
Trace Explosive Detection Technologies
Trace Detection
Surface Acoustic Wave Sensor MEMS Sensors Quartz Crystal Microbalance Fluorescent Polymer Sensor Spectroscopy (Ion Mobility/Gas Chromatography) Chemiluminescence UV Fluorescence Chemical reagents Dogs
![Page 23: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/23.jpg)
Bulk Explosive Detection Technologies
Bulk DetectionX-Ray
Single/ Dual energy Tomography Backscatter (Single/ Double beam)
Low Energy Microwave (Dielectrometry)Terahertz/ Thermal ImagingGround Penetrating RadarsNuclear Based
Nuclear Quadrupole ResonanceThermal Neutron ActivationFast Neutron Activation/ Pulsed Fast Neutron Activation
![Page 24: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/24.jpg)
IED Demolition/ Neutralization
Water jet Disrupter
Laser Ordinance Disposal
Plastic Explosive
Jammers for RF IEDs
Thermal cutter
![Page 25: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/25.jpg)
Institutional Mission focused
Calibrated Training
General Awareness to all Ranks
Specialist Training
TRG PHILOSOPHY
![Page 26: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/26.jpg)
Centers of Excellence
Replicate
3 dimensional visualisation
Modeling and Simulation
Training Brain
EMPHASIS
![Page 27: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/27.jpg)
Information on IEDs
Modus operandi of terrorists
Do’s and Dont’s
Area Domination
Cultivate Sources
Basic technology of detection systems
GEN AWARENESS
![Page 28: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/28.jpg)
SPECIALIST TRAININGFocus 1 (Attack the NW)
C IED intWeapon Technology intPersistent Surveillance, recce, information opsIED technical and Forensic exploitationDisposal of unexploded/captured ordnance
Focus 2 (Defeat the IED)Detect and neutralisation at safe stand off rangesIdentification of suspicious solids & liquidsUse of IED detection systems
Fixed. Vehicle mtd. Man portable. Detection robotsVehicle optics sensor systems. Jammers.Mechanical route clearing devices. Misc detection kits.
Focus 3Training the trainers
![Page 29: Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013](https://reader033.vdocument.in/reader033/viewer/2022061218/54b7b5614a795921278b4573/html5/thumbnails/29.jpg)