Counter IED Philosophy and Threat Management in the Indian Context Securing Asia 2013

  • 716 views
Uploaded on

Lt Gen JP Singh, PVSM, AVSM (retd), Defence Research and Development Organisation (DRDO), Ministry of Defence, India

Lt Gen JP Singh, PVSM, AVSM (retd), Defence Research and Development Organisation (DRDO), Ministry of Defence, India

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
716
On Slideshare
0
From Embeds
0
Number of Embeds
4

Actions

Shares
Downloads
22
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Internal Threat, Internally Abetted Internal Threat, Externally Abetted External Threat, Internally Abetted External Threat, Externally Abetted
  • 2. STATES Org: Large Sized Fmns Hierarchical Wpns:Sophisticated C2: Centralised [HIGH RISK] STATE SPONSORED HYBRID Org: Moderate size Trained Disciplined Wpns: ATGMs, RPGs, Rkts, Mors, HMGs, MANPADS IEDs C2: Decentralised Cell Phones Runners [RAPIDLY EVOLVING] NON STATE IRREGULAR Org: Small Squads Cellular Structure ILL Trained Innovative Wpns: SAs,RPGs,Mors, Rkts, IEDs C2: Decentralised Cell Phones Runners [PROBABILITY HIGH] OPERATIONAL ENVIRONMENT
  • 3. Easy to Make. Inexpensive. Availability of Chemical Components. Multi Mode Trigger.
  • 4. High mortality rates. Fear, Anxiety & Fatigue. Disrupts access to people, critical spaces. Shapes public opinion of conflict. Demands very expensive strategic response.
  • 5. STRATEGIC TACTICAL •Funding. •Local leadership. •Planning. •IED employment plans. •Training. •Bomb making. •Logistic Support. •Delivering of IEDs. •Overall resource allocation. •Emplacement. •Initiation. •Event exploitation.
  • 6.  Leadership.  Recruiting.  Training.  Target Selections & Planning.  Surveillance.  Rehearse attack.  Movement of Component and personnel.  Funding.  Supplies.  Infrastructure (Safe houses, storage).  Support (Intl, Regional, Local).  Monitor & Detonate.  Information operations.
  • 7.  Dynamic Systemic threat comprising multiple actors, state and non state, who operate and interact within adaptive and network Systems that extend beyond geographical boundaries.
  • 8. Potent Survive Innovative Short Loop Combination of IE
  • 9. MILITARY PETN RDX HE C4 SEMTEX Plastic Explosive Commercial TNT Ammonia Nitrate & Aluminum Powder Ammonium Nitrate & Fuel oil Black Powder Dynamite Nitro Glycerin Urea Nitrate HME Potassium Chlorate (White Odorless Powder) Sodium Chlorate (Yellow Odorless Power) Hydrogen Peroxide(disinfectant) TATP Common HMEs HMTD built with Hydrogen Peroxide CONTAIN VARIOUS Forms of N2 (exploited by detection technology which look for Nitro/Nitrate Gps IEDs COMPONENTS Control System Detonator Booster Main Charge Packaging
  • 10. Reduce effectiveness and lethality of IED threat to allow extended freedom of maneuver for security forces and state agencies. Prevent disruption in socio- economic activities.
  • 11. Pan Government Approach. Coordinated effort of all applicable agencies of national power. Common understanding of Strategic environment wrt IED challenges. Building enduring capabilities.
  • 12. TIME ATTACK THE NW DEFEAT THE DEVICE PREDICT / PREVENT IED FACILITATION & FABRICATION NEUTRALISE MITIGATE IED DETONATION TRAIN THE FORCE GEN AWARENESS CALIBERATED TRG SPECIALIST TRG
  • 13. GATHERING IED MATERAIAL CONSTRUCTING IED CONSTRUCTED IED STORAGE INVENTORY EMPLACEMENT EMPLACED IED DETONATION DETONATED IED POPULATION RADICALISATION GREY RECRUITMENT INSURGENT NEUTRALISE
  • 14. TIME ATTACK THE NW DEFEAT THE DEVICE PREDICT / PREVENT IED FACILITATION & FABRICATION NEUTRALISE MITIGATE IED DETONATION TRAIN THE FORCE GEN AWARENESS CALIBERATED TRG SPECIALIST TRG
  • 15. Information Operations. Law Enforcement. Deterrence. Disrupt re supply operations. Financing network. Signal Intelligence. Biometric Analysis. Behavioral Analysis. Geographical Profiling. Forensic Tools
  • 16. Types of IEDs o Buried IEDs o Directional/ off route mines o Booby traps o Vehicle bombs o RF IEDs IED o Explosive o Initiator o Trigger/ Switch o Power source o Casing
  • 17. Quantity based Bulk Detection Trace Detection Vapor Detection Particulate Detection Distance of detection Point Detection Standoff detection
  • 18. Trace Detection Surface Acoustic Wave Sensor MEMS Sensors Quartz Crystal Microbalance Fluorescent Polymer Sensor Spectroscopy (Ion Mobility/Gas Chromatography) Chemiluminescence UV Fluorescence Chemical reagents Dogs
  • 19. Bulk Detection X-Ray Single/ Dual energy Tomography Backscatter (Single/ Double beam) Low Energy Microwave (Dielectrometry) Terahertz/ Thermal Imaging Ground Penetrating Radars Nuclear Based Nuclear Quadrupole Resonance Thermal Neutron Activation Fast Neutron Activation/ Pulsed Fast Neutron Activation
  • 20. Water jet Disrupter Laser Ordinance Disposal Plastic Explosive Jammers for RF IEDs Thermal cutter
  • 21. Institutional Mission focused Calibrated Training General Awareness to all Ranks Specialist Training
  • 22. Centers of Excellence Replicate 3 dimensional visualisation Modeling and Simulation Training Brain
  • 23. Information on IEDs Modus operandi of terrorists Do’s and Dont’s Area Domination Cultivate Sources Basic technology of detection systems
  • 24. Focus 1 (Attack the NW) C IED int Weapon Technology int Persistent Surveillance, recce, information ops IED technical and Forensic exploitation Disposal of unexploded/captured ordnance Focus 2 (Defeat the IED) Detect and neutralisation at safe stand off ranges Identification of suspicious solids & liquids Use of IED detection systems Fixed. Vehicle mtd. Man portable. Detection robots Vehicle optics sensor systems. Jammers. Mechanical route clearing devices. Misc detection kits. Focus 3 Training the trainers