Counter-IED efforts

The complexity of the IED threat network is increased since mobile phones and the internet provide a low-cost and easily accessible medium for information sharing and the swift promulgation of tactical ideas and practices, thereby facilitating the efficient operation of these diverse systems.

Also, adversary targets can range from the specific such as host nation security force bases and recruiting events to the indiscriminate such as concentrations of people in public places.

However, IEDs are not only found within the land environment; other targets may include maritime choke points and ships alongside, as well as aircraft in flight or on the ground.

The C-IED approach used by NATO involves three mutually supporting and complementary pillars of activity which are: attack the network, defeat the device, and prepare the force.

While this concept provides a convenient metaphor to discuss possible targeting methodology, it seldom resembles the facts, because human networks are not directly analogous to a hornet's nest.

Operational experience has shown that by using a model based on the generic core functions (find, fix, strike and exploit) will ensure key areas and points in the adversary system can be identified, enabling power or influence to be applied.

By the same process, observing the bomb maker may lead to identifying a supply chain for IED components used for a large number of teams, adding a much higher value to the outcome.

Counter-IED efforts involve conducting specialized analysis to identify vulnerabilities, inter-dependencies, and cascading effects of the IED threat network Nodal Activity Model.

These vulnerability assessments are the foundation of a risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of an IED attack.

The means and methods used to underwrite the costs associated with the IED threat network may come from charitable organizations, donations, fundraising, illicit activities like extortion, and money laundering, or may be concealed within the payment of religious tithes or local taxes or foreign government support.

The political lead will determine at the outset levels of military support for the host nation and at a subsequent time agreements involving the reintegration of adversaries.

Within the C-IED approach use of the legal process can disrupt international support, seize funds, bring prosecutions, change laws within the host nation (for example to make the sale, purchase, ownership or transportation of IED components illegal) or to proscribe membership of a specific group.

Economic power can provide a range of incentives, boycotts, tariffs, pricing structures and sanctions to influence decisions and affect behavior.

Their impact is complicated by the combination of public and private influences, the operation of market forces and the complex relationships between global and national rates of growth and economic activity.

Defeat the device protects the population and delivers physical security to military forces by means of tactical and technical measures as well as information activities.

Intelligence from exploitation delivers new understanding and permits the development of new tactical and technical solutions to detect and neutralize devices and to mitigate their effects.

The division of EW known as electronic support measures can search for, identify and intercept, electromagnetic emissions and sometimes locate their sources for the purpose of immediate threat elimination.

EOD tasks aim to respond to, identify, render safe and dispose of explosive ordnance, including Chemical, Biological, Radiological and Nuclear (CBRN) devices, that threaten/impede maneuver.

The MWD, with its enhanced sense of smell, is a superior sensor capable of detecting a wide range of munitions and Home Made Explosives (HME) used to construct IEDs.

Not least C-IED efforts must be appropriately organized, interoperable with other military allies and the host nation law enforcement, manned, equipped, sustained, educated in doctrine, and trained in tactics, techniques, and procedures (TTPs) to the level required for their operational role.

This capability is developed from a mix of the military commander's guidance, the outputs of the residual experience in the operational area, the lessons process, and technology and contributions from the other C-IED pillars.

Education and Individual Training (E&IT) comprises the instructional activities that provide skills, knowledge and attitudes required in the performance of assigned duties, and upon which information can be correctly interpreted and sound judgement exercised.

To address this significant concern, the Counter-IED community has responded and developed a number of training activities to better prepare themselves for operations in a high threat IED environment.

Train the Force, one of three mutually supporting lines of operation, is a critical component of the JIEDDO mission to defeat the IED threat as a weapon of strategic influence.

The Joint Center of Excellence is JIEDDO's lead organization for the train-the-force line of operation and is responsible for development of training capabilities that enable the services' and combatant commanders' mission of preparing U.S. forces to defeat this threat.

[11] Various Counter-IED training workshops are provided by the private sector for government agencies and international corporations to help manage and reduce their risks from acts of terrorism, protect their assets, and adapt to ever-changing operational needs.

Land platforms contribute too, through observation posts, reconnaissance and patrolling activity, surveillance of targets as well as static cameras and sensors for monitoring locations, facilities, networks, individuals, routes etc.

By massing ISR assets, allowing a period of immersion, developing layering and cross cueing of sensors, an improved clarity and depth of knowledge can be established.

TRIPwire is designed to bring technical and operational information on terrorist tactics, techniques, and procedures (TTPs) to the desktop of officers in the bombing prevention community.

The Dfuze Intelligence Management System allows secure storage and maintenance of all data related to IED, EOD, criminal gang, terrorist and firearm incidents and operations.

Remote-control "Panama" Land Rover with ground-penetrating radar to detect IEDs followed by Mastiff with Choker mine rollers
Dragon Runner robot on exercise with the British Army in 2012
Wheelbarrow robot on the streets of Northern Ireland in 1978
The pillars of NATO counter-IED strategy
IED Detection (IE3D) Dog
HASD (High Assurance Search) Dog
EDD (Explosive Detection) Dog
VSD (Vehicle Search) Dog
MDD (Mine Detection) Dog
PEDD (Patrol Explosive Detection) Dog
Coat of arms of the NATO Counter Improvised Explosive Devices Centre of Excellence, C-IED COE