The Post-Afghanistan IED Threat Assessment: Executive Summary

Similar documents
GAO WARFIGHTER SUPPORT. Actions Needed to Improve Visibility and Coordination of DOD s Counter- Improvised Explosive Device Efforts

Fiscal Year (FY) 2011 Budget Estimates

Subj: MARINE CORPS POLICY ON ORGANIZING, TRAINING, AND EQUIPPING FOR OPERATIONS IN AN IMPROVISED EXPLOSIVE DEVICE (IED) ENVIRONMENT

National Guard Personnel and Deployments: Fact Sheet

National Guard Personnel and Deployments: Fact Sheet

Statement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19

DoD Countermine and Improvised Explosive Device Defeat Systems Contracts for the Vehicle Optics Sensor System

United States Military Casualty Statistics: Operation Iraqi Freedom and Operation Enduring Freedom

5 th Annual EOD/IED & Countermine Symposium

The Future of US Ground Forces: Some Thoughts to Consider

The first EHCC to be deployed to Afghanistan in support

Analysis of VA Health Care Utilization Among US Global War on Terrorism (GWOT) Veterans

Medical Requirements and Deployments

DoD CBRN Defense Doctrine, Training, Leadership, and Education (DTL&E) Strategic Plan

Space Control Strategy: A Road Map to Unimpeded Use of Space

The Army Executes New Network Modernization Strategy

I. Description of Operations Financed:

GAO. FEDERAL RECOVERY COORDINATION PROGRAM Enrollment, Staffing, and Care Coordination Pose Significant Challenges

Department of Defense DIRECTIVE

US Air Force Perspective: Rapid or Urgent Acquisition ESOH Management Mine Resistant Ambush Protected (MRAP) Vehicle Program Lessons Learned

USS COLE Commission Report

GAO CONTINGENCY CONTRACTING. DOD, State, and USAID Contracts and Contractor Personnel in Iraq and Afghanistan. Report to Congressional Committees

Report No. D April 9, Training Requirements for U.S. Ground Forces Deploying in Support of Operation Iraqi Freedom

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

OPERATIONAL CONTRACT SUPPORT

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Counter-Improvised Explosive Device Overview

First Announcement/Call For Papers

Joint Committee on Tactical Shelters Bi-Annual Meeting with Industry & Exhibition. November 3, 2009

9 December Strengthened, But More Needs to be Done, GAO/NSIAD-85-46, 5 March

WikiLeaks Document Release

Defense Strategies Institute professional educational forum:

Department of Defense INSTRUCTION

Radiological Nuclear Detection Task Force: A Real World Solution for a Real World Problem

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

-name redacted- Information Research Specialist. August 7, Congressional Research Service RS22452

Deployment Medicine Operators Course (DMOC)

Doc 01. MDA Discrimination JSR August 3, JASON The MITRE Corporation 7515 Colshire Drive McLean, VA (703)

13-08 April 16, 2008

F oreword. Working together, we will attain the greatest degree of spectrum access possible for the current and future Navy/Marine Corps team.

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

TESTIMONY OF RONALD M. SEGA DIRECTOR OF DEFENSE RESEARCH AND ENGINEERING

Defense Security Cooperation Agency Overseas Contingency Operations Operation and Maintenance, Defense-Wide

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

The Advantages of Commercial Satellites versus Military Satellites. Captain Thomas J. Heller

This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in

DEPARTMENT OF DEFENSE OPERATION AND MAINTENANCE. Operation and Maintenance, Defense-Wide

GAO MILITARY OPERATIONS

Department of Defense DIRECTIVE

ALABAMA DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE CODE CHAPTER 375-X-2 DUTIES AND RESPONSIBILITIES OF ASSISTANT DIRECTORS TABLE OF CONTENTS

Analysis of VA Health Care Utilization among Operation Enduring Freedom (OEF), Operation Iraqi Freedom (OIF), and Operation New Dawn (OND) Veterans

STATEMENT OF DR. WILLIAM WINKENWERDER, JR. ASSISTANT SECRETARY OF DEFENSE FOR HEALTH AFFAIRS BEFORE THE COMMITTEE ON VETERANS' AFFAIRS

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Revising the National Strategy for Homeland Security

STATEMENT BY GENERAL RICHARD A. CODY VICE CHIEF OF STAFF UNITED STATES ARMY BEFORE THE

Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD

Marine Corps Implementation of the Urgent Universal Needs Process for Mine Resistant Ambush Protected Vehicles

STATEMENT BY LIEUTENANT GENERAL STEPHEN M. SPEAKES DEPUTY CHIEF OF STAFF, G-8

from March 2003 to December 2011,

Joe Lloyd 4430 Chula Vista Pensacola, FL July I would to submit my CV for consideration as a Volunteer Planning Board member.

Department of Defense DIRECTIVE. SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures

The Cruise Missile Threat: Prospects for Homeland Defense

Defense Strategies Institute professional educational forum:

SPECIAL OPERATIONS FORCES

Tactical Iraqi Language and Culture Training Systems Lessons Learned from 3 rd Battalion 7 th Marines 2007

ITTA EOD/C-IED TRAINING

Review of the Defense Health Board s Combat Trauma Lessons Learned from Military Operations of Report. August 9, 2016

UNCLASSIFIED. Close Combat Weapon Systems JAVELIN. Systems in Combat TOW ITAS LOSAT

CLASSES/REFERENCES TERMINAL LEARNING OBJECTIVE

State Emergency Management and Homeland Security: A Changing Dynamic By Trina R. Sheets

Detecting Nuclear Weapons and Radiological Materials: How Effective Is Available Technology? Opening Statement

ICS-200: ICS for Single Resources and Initial Action Incidents

The Way Ahead in Counterproliferation

Navy Expeditionary Combat Command Executing Navy s Maritime Strategy

Defense Security Cooperation Agency Operation Enduring Freedom/Operation New Dawn Operation and Maintenance, Defense-Wide

Stephen K. Van Riper, Col (USMC)

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY LEARNING TO GET AHEAD: WHY ORGANIZATIONAL LEARNING IS

THE GUARDIA CIVIL AND ETA

Evolutionary Acquisition an Spiral Development in Programs : Policy Issues for Congress

STATEMENT OF. MICHAEL J. McCABE, REAR ADMIRAL, U.S. NAVY DIRECTOR, AIR WARFARE DIVISION BEFORE THE SEAPOWER SUBCOMMITTEE OF THE

6 th Annual Joint Civil & DoD CBRN Symposium

forces operating in Afghani - stan continue to be subjected to frequent and deadly attacks from insurgents using improvised explosive devices

U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

San Francisco Bay Area

Achieving Actionable Intelligence: Legacy Information Technology Systems and the Improvised Explosive Device Global Threat

U.S. Military Casualty Statistics: Operation New Dawn, Operation Iraqi Freedom, and Operation Enduring Freedom

Department of Defense Technology Transfer, Transition, and Manufacturing 2007 Beyond SBIR Phase II: Bringing Technological Edge to the Warfighter

DEPARTMENT OF THE AIR FORCE

NYS Office of Homeland Security Upcoming Training Course spotlights and schedule

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE COMMITTEE ON ARMED SERVICES UNITED STATES HOUSE OF REPRESENTATIVES

Rapid Reaction Technology Office. Rapid Reaction Technology Office. Overview and Objectives. Mr. Benjamin Riley. Director, (RRTO)

UNCLASSIFIED. UNCLASSIFIED R-1 Line Item No. 3 Page 1 of 15

Guidelines to Design Adaptive Command and Control Structures for Cyberspace Operations

U.S. Department of Defense (DoD) Defense Procurement and The Berry Amendment. Agenda. The DoD Procurement Organization and Policy

The U.S. military has successfully completed hundreds of Relief-in-Place and Transfers of

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

Perspectives on the Analysis M&S Community

Transcription:

The Post-Afghanistan IED Threat Assessment: Executive Summary DSI-2013-U-004754-1Rev May 2013

Approved for distribution: May 2013 Dr. Jeffrey B. Miers Director, Operations Tactics Analysis This document represents the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the Department of the Navy. Approved for Public Release Distribution Unlimited. Specific authority: N00014-11-D-0323. Copies of this document can be obtained through the Defense Technical Information Center at www.dtic.mil or contact CNA Document Control and Distribution Section at 703-824-2123. Copyright 2013 CNA This work was created in the performance of Federal Government Contract Number N00014-11-D-0323. Any copyright in this work is subject to the Government's Unlimited Rights license as defined in DFARS 252.227-7013 and/or DFARS 252.227-7014. The reproduction of this work for commercial purposes is strictly prohibited. Nongovernmental users may copy and distribute this document in any medium, either commercially or noncommercially, provided that this copyright notice is reproduced in all copies. Nongovernmental users may not use technical measures to obstruct or control the reading or further copying of the copies they make or distribute. Nongovernmental users may not accept compensation of any manner in exchange for copies. All other rights reserved.

Executive summary Threat to deployed forces (U) Improvised explosive devices (IEDs) were used extensively during Operation Iraqi Freedom (OIF) and Operation Enduring Freedom (OEF); however, the trajectory of the IED threat over the 2015-2020 timeframe is uncertain. To address this question, we assessed: 1. The IED threat to deployed forces; 2. The IED threat to the U.S. homeland; 3. Innovations that could enhance the effectiveness of IEDs; and 4. Emergent threats that could develop into favored asymmetric tactics. The analyses of these issues will inform upcoming decisions about the counter-ied capabilities that the United States will need to maintain. (U) During future deployments, U.S. forces will encounter those who oppose their presence and purpose. To assess this threat, we compared the conditions that contributed to the development of the OEF and OIF IED campaigns with the operational conditions described in DOD planning guidance. Our analysis indicates that: The IED threat to deployed forces will persist. The scenarios outlined in the planning guidance have conditions similar to those that contributed to the emergence of the OEF and OIF IED campaigns. Not all deployments will encounter the widespread use of IEDs. Current IED intelligence is consistent with the planning guidance. IEDs remain a global threat, and the Unified Combatant Commands (UCCs) are concerned that the lessons from OIF and OEF will be used in their AORs to target U.S. interests. (U) The depth of the IED threat to deployed forces depends in part on choices made by the U.S. government. Dispatching forces to operations that have conditions similar to those encountered in OIF and OEF will enhance the IED threat. Pursuing a more conservative path on future deployments will help mitigate the IED threat to deployed forces. 1

Threat to the homeland Technical innovation 2 (U) Unlike in Iraq and Afghanistan, the use of IEDs in the homeland has remained largely stable over the last 25 years; however, the near term outlook is uncertain. Recent trends may continue, or experiences from OIF and OEF could prompt terrorists to apply lessons from these conflicts to the U.S. The analysis of this threat indicates that: The IED threat in the homeland is likely to persist; however, historical trends and an analysis of the operational environment in the homeland do not suggest a change in the frequency of IED attacks. There are at least three IED lines of operation in the homeland criminal mischief, isolated terrorist attacks, and the IED campaign. Criminal activity is the most likely IED threat in the U.S., while a campaign is the most problematic. The list of those who might engage in such attacks is long and diverse. DOD s role for C-IED efforts in the U.S. homeland is limited by statute and by the presence of an extensive domestic C-IED infrastructure. Nevertheless, DOD can contribute C-IED capabilities, including training, requested response support, intelligence and network analyses, and technical solutions support. (U) Near-term innovation will improve the performance of IED components and enhance the IED threat. To assess the impact of innovation, we analyzed three issues: 1. The development of IEDs in OIF and OEF; 2. Improvements to switches/initiators, warheads, and power supplies; 3. The C-IED capabilities needed to address these new technologies. The analysis found that: Technical innovation was observed in OEF and OIF; however, it did not drive the campaigns, which generally relied on widely available legacy technologies. The threat persisted regardless of the technical sophistication of the insurgencies. Several technological innovations could improve the effectiveness of IEDs, including reactive material fragments, fuel-air explosives, laser initiators, fiber-optics, and the use of communications networks that are difficult to jam.

Emergent threats Conclusion Countermeasures are available for several of the IED enhancement technologies; however, their effectiveness is uncertain. (U) Innovation will continue to increase the effectiveness of IEDs; however, there are no indications that technology will drive the threat. (U) IEDs may not retain their distinction as the insurgents preferred weapon. Emergent threats could supplant or be used in combination with IEDs. The purpose of this final task is to analyze emergent threats that could become a favored asymmetric weapon. This analysis highlighted several findings that inform our understanding of these near-term emergent threats: The universe of possible emergent threats is large and diverse. We identified 27 emergent threats, ranging from computer network attacks, to micro air vehicles, to the use of children in combat. The operational characteristics of many of the identified emergent threats are similar to the characteristics of IEDs; however, it is not clear that any have the IEDs combination of low cost, ease of construction and employment, and significant impact. Mitigation strategies exist for many of the emergent threats, but these efforts will require additional support, including intelligence, research and development, acquisition, operational support, and training. (U) While some of these emergent threats are likely to mature in the near term, it is uncertain whether they will be as problematic as IEDs. (U) The results of our analyses indicate that the United States will continue to face a variety of asymmetric threats and that those threats will continue to evolve; however, it is not clear that technology or emergent threats will have a significant impact on the overall threat. In short, the IED threat observed in Iraq, Afghanistan, and the homeland in recent years will likely persist regardless of technical innovations and the maturation of emergent threats. 3

4 This page is Unclassified.

DSI-2013-U-004754-1Rev 4825 Mark Center Drive, Alexandria, VA 22311-1850 703-824-2000 www.cna.org