About: Counter-IED efforts   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Counter-IED efforts are done primarily by military and law enforcement (led by intelligence efforts) with the assistance of the diplomatic and financial communities. It involves a comprehensive approach of countering the threat networks that employ Improvised Explosive Devices (IEDs), defeating the devices themselves, and training others. Counter-IED, or C-IED, is usually part of a broader counter-terrorism, counter-insurgency, or law enforcement effort. Because IEDs are a subset of a number of forms of asymmetric physical attack used by insurgents and terrorists, C-IED activities are principally against adversaries and not only against IEDs. C-IED treats the IED as a systemic problem and aims to defeat the IED System.

AttributesValues
rdfs:label
  • Counter-IED efforts
rdfs:comment
  • Counter-IED efforts are done primarily by military and law enforcement (led by intelligence efforts) with the assistance of the diplomatic and financial communities. It involves a comprehensive approach of countering the threat networks that employ Improvised Explosive Devices (IEDs), defeating the devices themselves, and training others. Counter-IED, or C-IED, is usually part of a broader counter-terrorism, counter-insurgency, or law enforcement effort. Because IEDs are a subset of a number of forms of asymmetric physical attack used by insurgents and terrorists, C-IED activities are principally against adversaries and not only against IEDs. C-IED treats the IED as a systemic problem and aims to defeat the IED System.
sameAs
dcterms:subject
dbkwik:military/pr...iPageUsesTemplate
abstract
  • Counter-IED efforts are done primarily by military and law enforcement (led by intelligence efforts) with the assistance of the diplomatic and financial communities. It involves a comprehensive approach of countering the threat networks that employ Improvised Explosive Devices (IEDs), defeating the devices themselves, and training others. Counter-IED, or C-IED, is usually part of a broader counter-terrorism, counter-insurgency, or law enforcement effort. Because IEDs are a subset of a number of forms of asymmetric physical attack used by insurgents and terrorists, C-IED activities are principally against adversaries and not only against IEDs. C-IED treats the IED as a systemic problem and aims to defeat the IED System. This IED System requires multiple actions and resources in order to stage an IED Event. The IED System may be either hierarchical or non-hierarchical but it will contain nodes such as personnel, resources and other actions that are linked. The importance of these nodes and the linkages between them will vary and identifying the critical vulnerabilities within the IED System is an important C-IED activity. Some IED Systems may be part of large, international terrorist organisations and some may be state sponsored. Some may work completely independently, while others may extend from theater down to village level. This span of possibilities increases the complexity of military and law enforcement operations and requires a comprehensive approach to C-IED potentially involving close cooperation and coordination between the diplomatic, military, economic, and informational levers of power. The complexity of the IED System is increased since mobile phones and the internet provide a low-cost and easily accessible medium for information sharing and the swift promulgation of tactical ideas and practises, thereby facilitating the efficient operation of these diverse systems. IED network members also have the ability to operate part-time and can blend back into the civilian population when their actions are completed. Such systems can be extremely resilient, invariably hard to target and are, therefore, survivable. Also, adversary targets can range from the specific such as host nation security force bases and recruiting events to the indiscriminate such as concentrations of people in public places. However, IEDs are not only found within the land environment - other targets may include maritime choke points and ships alongside, as well as aircraft in flight or on the ground. Due to this robust nature, attacks against only one node of the IED System will not impact decisively upon it, although short term gains may be achieved at a local level. However, IED Systems are vulnerable to systematic attack across all nodes. This will involve a combination of diplomatic, socioeconomic, commercial and military actions. Because of this, C-IED is ideally: * Intelligence-led and proactive * Applied simultaneously by civil and military instruments of power * Encompassing both offensive and defensive measures * Underpinned by comprehensive influence activities The C-IED approach used by NATO involves 3 mutually supporting and complementary pillars of activity which are: attack the networks, defeat the device, and prepare the force. These are all underpinned by understanding and intelligence. (Counter-IED efforts can also be broken up into 6 key operational activities: predict, prevent, detect, neutralise, mitigate, and exploit.)
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software