The Post-Afghanistan IED Threat Assessment: Executive Summary

Similar documents
The Post-Afghanistan IED Threat Assessment: Executive Summary

Independent Auditor's Report on the Attestation of the Existence, Completeness, and Rights of the Department of the Navy's Aircraft

United States Military Casualty Statistics: Operation Iraqi Freedom and Operation Enduring Freedom

The Fully-Burdened Cost of Waste in Contingency Operations

Opportunities to Streamline DOD s Milestone Review Process

ASAP-X, Automated Safety Assessment Protocol - Explosives. Mark Peterson Department of Defense Explosives Safety Board

DoD Countermine and Improvised Explosive Device Defeat Systems Contracts for the Vehicle Optics Sensor System

THE GUARDIA CIVIL AND ETA

Defense Health Care Issues and Data

White Space and Other Emerging Issues. Conservation Conference 23 August 2004 Savannah, Georgia

Mission Assurance Analysis Protocol (MAAP)

Panel 12 - Issues In Outsourcing Reuben S. Pitts III, NSWCDL

Rapid Reaction Technology Office. Rapid Reaction Technology Office. Overview and Objectives. Mr. Benjamin Riley. Director, (RRTO)

The Army Executes New Network Modernization Strategy

Joint Committee on Tactical Shelters Bi-Annual Meeting with Industry & Exhibition. November 3, 2009

Infections Complicating the Care of Combat Casualties during Operations Iraqi Freedom and Enduring Freedom

The first EHCC to be deployed to Afghanistan in support

Improving the Quality of Patient Care Utilizing Tracer Methodology

at the Missile Defense Agency

Afghanistan Casualties: Military Forces and Civilians

Social Science Research on Sensitive Topics and the Exemptions. Caroline Miner

ALLEGED MISCONDUCT: GENERAL T. MICHAEL MOSELEY FORMER CHIEF OF STAFF, U.S. AIR FORCE

Chief of Staff, United States Army, before the House Committee on Armed Services, Subcommittee on Readiness, 113th Cong., 2nd sess., April 10, 2014.

United States Army Aviation Technology Center of Excellence (ATCoE) NASA/Army Systems and Software Engineering Forum

Fiscal Year 2011 Department of Homeland Security Assistance to States and Localities

Electronic Attack/GPS EA Process

DDESB Seminar Explosives Safety Training

Afghanistan Casualties: Military Forces and Civilians

Medical Requirements and Deployments

U.S. Military Casualty Statistics: Operation New Dawn, Operation Iraqi Freedom, and Operation Enduring Freedom

terns Planning and E ik DeBolt ~nts Softwar~ RS) DMSMS Plan Buildt! August 2011 SYSPARS

Integrated Comprehensive Planning for Range Sustainability

Cerberus Partnership with Industry. Distribution authorized to Public Release

Report No. D April 9, Training Requirements for U.S. Ground Forces Deploying in Support of Operation Iraqi Freedom

GAO. FEDERAL RECOVERY COORDINATION PROGRAM Enrollment, Staffing, and Care Coordination Pose Significant Challenges

DOING BUSINESS WITH THE OFFICE OF NAVAL RESEARCH. Ms. Vera M. Carroll Acquisition Branch Head ONR BD 251

Perspectives on the Analysis M&S Community

Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob

New Tactics for a New Enemy By John C. Decker

Wildland Fire Assistance

Evolutionary Acquisition an Spiral Development in Programs : Policy Issues for Congress

The Air Force's Evolved Expendable Launch Vehicle Competitive Procurement

DoD CBRN Defense Doctrine, Training, Leadership, and Education (DTL&E) Strategic Plan

The Military Health System How Might It Be Reorganized?

Army Aviation and Missile Command (AMCOM) Corrosion Program Update. Steven F. Carr Corrosion Program Manager

DOD Native American Regional Consultations in the Southeastern United States. John Cordray NAVFAC, Southern Division Charleston, SC

Make or Buy: Cost Impacts of Additive Manufacturing, 3D Laser Scanning Technology, and Collaborative Product Lifecycle Management on Ship Maintenance

Battle Captain Revisited. Contemporary Issues Paper Submitted by Captain T. E. Mahar to Major S. D. Griffin, CG 11 December 2005

Office of the Assistant Secretary of Defense (Homeland Defense and Americas Security Affairs)

The Coalition Warfare Program (CWP) OUSD(AT&L)/International Cooperation

Potential Savings from Substituting Civilians for Military Personnel (Presentation)

712CD. Phone: Fax: Comparison of combat casualty statistics among US Armed Forces during OEF/OIF

Software Intensive Acquisition Programs: Productivity and Policy

Shadow 200 TUAV Schoolhouse Training

Incomplete Contract Files for Southwest Asia Task Orders on the Warfighter Field Operations Customer Support Contract

BW Threat & Vulnerability

Contemporary Issues Paper EWS Submitted by K. D. Stevenson to

ASNE Combat Systems Symposium. Balancing Capability and Capacity

Operational Energy: ENERGY FOR THE WARFIGHTER

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning

Nuclear Command, Control, and Communications: Update on DOD s Modernization

Research to advance the Development of River Information Services (RIS) Technologies

Munitions Response Site Prioritization Protocol (MRSPP) Online Training Overview. Environmental, Energy, and Sustainability Symposium Wednesday, 6 May

February 8, The Honorable Carl Levin Chairman The Honorable James Inhofe Ranking Member Committee on Armed Services United States Senate

The DoD Siting Clearinghouse. Dave Belote Director, Siting Clearinghouse Office of the Secretary of Defense

Unexploded Ordnance Safety on Ranges a Draft DoD Instruction

The U.S. military has successfully completed hundreds of Relief-in-Place and Transfers of

Office of Inspector General Department of Defense FY 2012 FY 2017 Strategic Plan

2010 Fall/Winter 2011 Edition A army Space Journal

The Advantages of Commercial Satellites versus Military Satellites. Captain Thomas J. Heller

The Uniformed and Overseas Citizens Absentee Voting Act: Background and Issues

Military to Civilian Conversion: Where Effectiveness Meets Efficiency

Afghanistan Casualties: Military Forces and Civilians

Veterans Affairs: Gray Area Retirees Issues and Related Legislation

In 2007, the United States Army Reserve completed its

711 HPW COUNTERPROLIFERATION BRANCH

DETENTION OPERATIONS IN A COUNTERINSURGENCY

Systems Engineering Capstone Marketplace Pilot

Engineering, Operations & Technology Phantom Works. Mark A. Rivera. Huntington Beach, CA Boeing Phantom Works, SD&A

Defense Surplus Equipment Disposal: Background Information

IMPROVING SPACE TRAINING

Report No. DODIG December 5, TRICARE Managed Care Support Contractor Program Integrity Units Met Contract Requirements

Preliminary Observations on DOD Estimates of Contract Termination Liability

Test and Evaluation of Highly Complex Systems

Department of Defense DIRECTIVE

Engineered Resilient Systems - DoD Science and Technology Priority

Developmental Test and Evaluation Is Back

Development of a Hover Test Bed at the National Hover Test Facility

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

Afloat Electromagnetic Spectrum Operations Program (AESOP) Spectrum Management Challenges for the 21st Century

Product Manager Force Sustainment Systems

Staffing Cyber Operations (Presentation)

Laboratory Accreditation Bureau (L-A-B)

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

Report No. DODIG Department of Defense AUGUST 26, 2013

Dynamic Training Environments of the Future

MAKING IT HAPPEN: TRAINING MECHANIZED INFANTRY COMPANIES

Where Have You Gone MTO? Captain Brian M. Bell CG #7 LTC D. Major

Lessons Learned From Product Manager (PM) Infantry Combat Vehicle (ICV) Using Soldier Evaluation in the Design Phase

Military Health System Conference. Putting it All Together: The DoD/VA Integrated Mental Health Strategy (IMHS)

Transcription:

The Post-Afghanistan IED Threat Assessment: Executive Summary DSI-2013-U-004754-1Rev May 2013

Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE MAY 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE The Post-Afghanistan IED Threat Assessment: Executive Summary 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) CNA Analysis & Solutions,4825 Mark Center Drive,Alexandria,VA,22311 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 11. SPONSOR/MONITOR S REPORT NUMBER(S) 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Same as Report (SAR) 18. NUMBER OF PAGES 8 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18

Approved for distribution: May 2013 Dr. Jeffrey B. Miers Director, Operations Tactics Analysis This document represents the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the Department of the Navy. Approved for Public Release Distribution Unlimited. Specific authority: N00014-11-D-0323. Copies of this document can be obtained through the Defense Technical Information Center at www.dtic.mil or contact CNA Document Control and Distribution Section at 703-824-2123. Copyright 2013 CNA This work was created in the performance of Federal Government Contract Number N00014-11-D-0323. Any copyright in this work is subject to the Government's Unlimited Rights license as defined in DFARS 252.227-7013 and/or DFARS 252.227-7014. The reproduction of this work for commercial purposes is strictly prohibited. Nongovernmental users may copy and distribute this document in any medium, either commercially or noncommercially, provided that this copyright notice is reproduced in all copies. Nongovernmental users may not use technical measures to obstruct or control the reading or further copying of the copies they make or distribute. Nongovernmental users may not accept compensation of any manner in exchange for copies. All other rights reserved.

Executive summary Threat to deployed forces (U) Improvised explosive devices (IEDs) were used extensively during Operation Iraqi Freedom (OIF) and Operation Enduring Freedom (OEF); however, the trajectory of the IED threat over the 2015-2020 timeframe is uncertain. To address this question, we assessed: 1. The IED threat to deployed forces; 2. The IED threat to the U.S. homeland; 3. Innovations that could enhance the effectiveness of IEDs; and 4. Emergent threats that could develop into favored asymmetric tactics. The analyses of these issues will inform upcoming decisions about the counter-ied capabilities that the United States will need to maintain. (U) During future deployments, U.S. forces will encounter those who oppose their presence and purpose. To assess this threat, we compared the conditions that contributed to the development of the OEF and OIF IED campaigns with the operational conditions described in DOD planning guidance. Our analysis indicates that: The IED threat to deployed forces will persist. The scenarios outlined in the planning guidance have conditions similar to those that contributed to the emergence of the OEF and OIF IED campaigns. Not all deployments will encounter the widespread use of IEDs. Current IED intelligence is consistent with the planning guidance. IEDs remain a global threat, and the Unified Combatant Commands (UCCs) are concerned that the lessons from OIF and OEF will be used in their AORs to target U.S. interests. (U) The depth of the IED threat to deployed forces depends in part on choices made by the U.S. government. Dispatching forces to operations that have conditions similar to those encountered in OIF and OEF will enhance the IED threat. Pursuing a more conservative path on future deployments will help mitigate the IED threat to deployed forces. 1

Threat to the homeland Technical innovation 2 (U) Unlike in Iraq and Afghanistan, the use of IEDs in the homeland has remained largely stable over the last 25 years; however, the near term outlook is uncertain. Recent trends may continue, or experiences from OIF and OEF could prompt terrorists to apply lessons from these conflicts to the U.S. The analysis of this threat indicates that: The IED threat in the homeland is likely to persist; however, historical trends and an analysis of the operational environment in the homeland do not suggest a change in the frequency of IED attacks. There are at least three IED lines of operation in the homeland criminal mischief, isolated terrorist attacks, and the IED campaign. Criminal activity is the most likely IED threat in the U.S., while a campaign is the most problematic. The list of those who might engage in such attacks is long and diverse. DOD s role for C-IED efforts in the U.S. homeland is limited by statute and by the presence of an extensive domestic C-IED infrastructure. Nevertheless, DOD can contribute C-IED capabilities, including training, requested response support, intelligence and network analyses, and technical solutions support. (U) Near-term innovation will improve the performance of IED components and enhance the IED threat. To assess the impact of innovation, we analyzed three issues: 1. The development of IEDs in OIF and OEF; 2. Improvements to switches/initiators, warheads, and power supplies; 3. The C-IED capabilities needed to address these new technologies. The analysis found that: Technical innovation was observed in OEF and OIF; however, it did not drive the campaigns, which generally relied on widely available legacy technologies. The threat persisted regardless of the technical sophistication of the insurgencies. Several technological innovations could improve the effectiveness of IEDs, including reactive material fragments, fuel-air explosives, laser initiators, fiber-optics, and the use of communications networks that are difficult to jam.

Emergent threats Conclusion Countermeasures are available for several of the IED enhancement technologies; however, their effectiveness is uncertain. (U) Innovation will continue to increase the effectiveness of IEDs; however, there are no indications that technology will drive the threat. (U) IEDs may not retain their distinction as the insurgents preferred weapon. Emergent threats could supplant or be used in combination with IEDs. The purpose of this final task is to analyze emergent threats that could become a favored asymmetric weapon. This analysis highlighted several findings that inform our understanding of these near-term emergent threats: The universe of possible emergent threats is large and diverse. We identified 27 emergent threats, ranging from computer network attacks, to micro air vehicles, to the use of children in combat. The operational characteristics of many of the identified emergent threats are similar to the characteristics of IEDs; however, it is not clear that any have the IEDs combination of low cost, ease of construction and employment, and significant impact. Mitigation strategies exist for many of the emergent threats, but these efforts will require additional support, including intelligence, research and development, acquisition, operational support, and training. (U) While some of these emergent threats are likely to mature in the near term, it is uncertain whether they will be as problematic as IEDs. (U) The results of our analyses indicate that the United States will continue to face a variety of asymmetric threats and that those threats will continue to evolve; however, it is not clear that technology or emergent threats will have a significant impact on the overall threat. In short, the IED threat observed in Iraq, Afghanistan, and the homeland in recent years will likely persist regardless of technical innovations and the maturation of emergent threats. 3

4 This page is Unclassified.

DSI-2013-U-004754-1Rev 4825 Mark Center Drive, Alexandria, VA 22311-1850 703-824-2000 www.cna.org