- How resilient are defense businesses to cyber attacks? Take our survey: defenceiq.com/cyber-defence/… #cybersecurity https://t.co/0r4M4dHGqj 5 days ago
- RT @AiiA_Network: [Video] SpotMini opens doors for robots in a human world buff.ly/2HgVIPJ #robot https://t.co/6b4vXulSCo 5 days ago
- RT @DefenceES: #TBT Incredible footage captured by @RoyalAirForce @17RSqn UK Lightning demonstrating one of the landing configurations of t… 5 days ago
- Five Mission-Critical Drucker Prescriptions for Making Government Agencies Effective: bit.ly/2GFkPeC via… twitter.com/i/web/status/9… 6 days ago
- Applying The Drucker Approach To Reinventing Government Agencies: bit.ly/2GFkPeC via @MMN_ManageSmart https://t.co/WTZMgXMJCo 1 week ago
We are the IQ of global defence.
Category Archives: Land Defence
April 30, 2013Posted by on
During the campaigns in Afghanistan and Iraq, IED attacks on coalition troops climbed to the top of the threat ladder, owing to their prolific presence, their ability to be made easily and cheaply, and their fundamentally effective results.
Along with the drawdown, there is now a realisation that the theatre in which the IED remains a serious threat is anywhere and everywhere. In the months and years to come, homeland security measures will be faced with an increasing need to detect and defeat a device that requires little sophistication to take lives.
The question is whether the lessons and training methods refined in the deserts of the Middle East can be transposed to urban environments and the civilian response teams that often oversee them.
This year’s 7th annual Counter IED conference will be going further to assess the IED in the context of homeland security. Ahead of the conference, a day of interactive workshops will meet some of these issues head on, allowing professionals involved in this domain to both converge and converse openly on the topic.
The first two-hour workshop will explore training and retraining – looking at the broad scope disciplines, processes and capabilities that need to remain fresh as emerging asymmetric threats arrive at our doorstep. Mr Zach Kramer, C-IED SME, JMRC US Army Europe, will lead the discussion.
Following this, Mr Robert Shaw – who has trained ISAF forces and other authorities worldwide – will helm a must-attend session on predicting the future of EOD, assessing how the technologies and countermeasures will likely evolve and advising those involved in the discussion on how to use that information.
Finally, delegates will be treated to a visual walkthrough guide to attacking the network, arguably the key to closing down terrorist actions on a large-scale but also a more convoluted task than diffusing a physical bomb. Professor Caroline Kennedy-Pipe will help delegates address the challenge of crossing national boundaries, linking terrorist cells to organised criminals and ultimately undermining the “tangled web” of modern violent extremism.
Don’t want to miss out? Visit www.CounterIEDevent.com.
Alternatively, email email@example.com or phone +44 (0) 207 368 9737.
November 29, 2012Posted by on
Contributed by Kim Vigilia, Defence IQ
In recent news, the British Army has announced an order for 51 additional Foxhound Vehicles and Lockheed Martin has provided an update on the Warrior Infantry Fighting Vehicle upgrade for improved lethality systems. Given these headlines, it’s clear that priorities for many western military nations are not only to provide necessary mine and blast protection for soldiers in Afghanistan, but also to ‘future-proof’ these vehicles up until 2040.
However, defeating the IED threat and securing future survivability are just two of the main issues facing land defence leaders. There are also challenges within situational awareness and communication enhancements, weapon station integration and the balancing act of creating the ‘perfect’ environment for simulating armour and mechanised training. Add to that the basic foundation and maintenance of supply chains and other processes to remain efficient and effective… the list goes on.
Taking these issues into account, the International Armoured Vehicles show (IAVs) has a programme which is designed to reflect these challenges and offers a platform on which senior leaders in land defence can discuss, debate and swap ideas on the potential solutions and where they foresee the future of armoured vehicles. Lieutenant General Jonathan Page, Commander FDT and Major General Andrew Sharpe, DG DCDC from the UK Ministry of Defence will lead sessions at IAVs where Foxhound and Warrior are sure to be key talking points.
Defeating the IED threat, once and for all?
According to the press release published by General Dynamics in regards to the Foxhound Vehicle order, “The value of the award is approximately $73.6 million, or £46 million.” In light of the drawback from Afghanistan, that’s still quite a significant investment for a light weight vehicle which specifically features countering IED capabilities, confirming the fact that C-IEDs is still one of the most critical challenges for militaries to overcome.
IAVs has a dedicated pre-conference day to focus on Countering IEDs to complement the main conference plenary sessions at IAVs, which features a panel discussion with Commander Abdulrazaq Olapeju Kazeem, Commander of the Nigerian Army’s Headquarters Bomb Disposal Squadron as well as Major General Ruben Dario Alzate Mora, the Head of Land – Materiel & Commander of the 1st Army for the Colombian Army and Robert Shaw, Head of C-IED Training for NATO ISAF. The panel will be posed questions from the audience focusing on whether the future of C-IED efforts will be non-expeditionary.
With the Nigerian Army looking to acquire Mine Resistant Ambush Protected (MRAP) All-Terrain vehicles to advance its strategy in defeating home-grown terrorism, the resulting conversation from the panel discussion should prove interesting to military peers and potential industry partners.
“IED incidents in Nigeria have been quite serious and challenging, however, because of proactive and pre-emptive measures put in place by the Nigerian Government and Security Forces, the threat is receding,” Kazeem told Defence IQ, citing the reduction in frequency of both attacks and casualties. “The Nigerian Army Bomb Disposal is tackling the rising IED incidents by employing global best practices in locating, rendering safe and disposal of IEDs.”
What does the future battle space look like and how can we ‘future-proof’ armoured vehicles?
Deemed as the British Army’s “key priority,” the £1 billion Warrior Capability Sustainment Programme (WCSP) is one of the largest and most significant projects being pushed through the MoD as it seeks to upgrade and refit the Warrior Infantry Fighting Vehicle with improved lethality systems and an electronic architecture that will future-proof it until 2040.
So what does this armoured vehicle of the future look like? Brigadier General Andrew G. Hughes, Director of Combat Capability at the UK Ministry of Defence, will open IAVs with a keynote speech, “Showcasing the Work of Combat Capability in the Content of the Army 2020 Strategy: Future Armour and Protected Mobility Requirements” – so we might find out then!
If you’d like to find out more about the International Armoured Vehicles 2013 event please click here.
September 7, 2012Posted by on
by Andrew Elwell, Editor, Defence IQ
Captain Wales has arrived in Afghanistan for a four month tour of duty as an Apache helicopter pilot five years on from his first stint at Camp Bastion.
It’s been 47 minutes since media outlets were allowed to report on the story after being given permission to do so by the MOD following an agreement to keep it under wraps until the Prince had safely landed in Afghanistan. All of them (that I’ve read, so far) have made reference to his antics in Las Vegas and Twitter has come alive with “chopper” jokes.
This is poor form, surely?
It’s difficult to ignore the furore that Harry created a few weeks ago in Nevada, and it would be naïve to think it wouldn’t get a mention following today’s news, but taking a more responsible tone should be the order of the day.
Regardless of background, Harry is a Captain in the British Army.
He is a highly trained soldier with skills invaluable to the mission in Helmand Province. It’s not cheap to train an Apache pilot – last year he said, “You become a very expensive asset, the training’s very expensive and they wouldn’t have me doing what I’m doing (otherwise).”
Over the last decade the British Armed Forces have come to be seen as a highly prized institution by the public, achieving a level of admiration not seen since 1945. Harry is a part of that institution and he should be afforded the same respect we would endow to any other soldier serving in Afghanistan.
So please, no jokes. Nor sniggering.
Good luck Captain Wales.
We’re keen to hear your thoughts – do you agree or disagree with this post? Email comments or article submissions to: firstname.lastname@example.org or comment below.
June 22, 2012Posted by on
It’s been a great week at Defence IQ this week as we finally revealed the winners for the Defence IQ Blogging Awards. The judging panel made sure to read all of our shortlisted 33 blogs to find the best of the best within the blogging community. They were not counting on how good each of them would be!
So, after the debate, discussion and intrigue, the Defence IQ judging panel announced the following winners:
WINNER: Small Wars Journal
WINNER: The Freedom Fighter Blog
WINNER: Daly History Blog
A huge congratulations to all of the winners of the Defence IQ Blogging Awards and a massive thank you to all of those who have taken part over the past couple of weeks. It’s simply astonishing to see how many excellent defence blogs there are.
Last, but not least, thank you to our judging panel:
Brian Cathcart – Professor of Journalism, Kingston University, London
Andrew Elwell – Editor, Defence IQ
Duraid Jalili – Head of Production, Defence IQ
Simon Wigfield – Chief Blogger and Senior Producer, Regional Event, Defence IQ
June 14, 2012Posted by on
In an interview with Defence IQ, Ivor Ichikowitz, the founder of South Africa’s Paramount Group, discusses the state of the African defence industry and the company’s unique, indigenous AHRLAC programme.
Read the full interview here.
June 14, 2012Posted by on
This week at Eurosatory the Streit Group, a manufacturer of armoured vehicles based out of Canada with offices worldwide, unveiled its new offering: the Jaguar.
Read all about the new APC here.
May 22, 2012Posted by on
May 20, 2012Posted by on
Today the National Memorial Arboretum, the UK’s centre of rememberance based in Staffordshire, had a ceremony to officially open its newest memorial – this time to remember the brave that fell during the 1982 Falklands conflict. Here’s a few pictures:
Crowds gather for the unveiling
The Falklands memorial
The Vulcan bomber fly past
May 17, 2012Posted by on
Major Chris Hunter QGM served as a British Army officer in the Royal Logistic Corps, tackling the ever-present improvised explosive device across the world’s most notorious terrorist hotspots, including Northern Ireland, Colombia, the Balkans, East Africa, Iraq and Afghanistan.
Since retiring from the MoD in 2007 as the most senior IED intelligence analyst, he has continued work to advance understanding and development in CIED with his work as a writer, broadcaster and consultant, and even collaborated with filmmakers on ‘The Hurt Locker’.
Defence IQ’s Richard de Silva tracked him down at a recent counter terror forum to get his perspective on current strategy and technology…
The first point I’d like to discuss is simply current British Force or ISAF strategy, and what they’re doing at the moment. Is it effective? How much has it developed in the past two years or so, since we spoke to you last?
Effectively, the British strategy is the same as the ISAF strategy and the United States strategy; it’s sort of a three-pronged strategy. One is to defeat the device itself and that’s the protection and the neutralisation component of it. So all sorts of sensor technologies and also the man in the loop as well, going out there to physically find the device and then to render safe procedures, which might be remote means such as robots, semi-remote means, such as the use of hook and line.
And then, of course, the actual manual means going down there in a bomb suit and actually using a disruptor to smash the device to pieces, keeping all the components together so it can then subsequently be analysed so you can effectively reverse-engineer the bomb. And, in so doing, you can identify how the device was made, bearing in mind it’s improvised – therefore, is it radio-control, is it timed, and so on.
But also it enables you to get the forensics, the biometrics, the DNA all that sort of stuff as well. And that’s absolutely essential because the second part of the three-pronged strategy, if you like, is to have a network that comes in many, many forms. That’s very much an intelligence-driven, bottom-up and top-down strategy. To give an example, when I talked about that idea of actually analysing the device once it’s been disrupted, when we look at the forensics, the DNA, the biometrics, we are able to then profile the bomb maker. And there’s only a finite number of bomb makers with the requisite skill sets to manufacture the IEDs we’ve seen at this level of technical sophistication.
If you look at the IRA, for example, who were our primary threat for 30 years, the level of sophistication they achieved in 30 years – and they were considered the best bomb makers in the world – was superseded in just 12 months when we went into Iraq between 2003/2004, and that has just continued at a rapid and alarming rate. It was superseded inAfghanistanin just 18 months and what we’re seeing is this continual cat and mouse, counter-measure strategy.
And so, because we’ve seen such an advance in technology and from every bomb maker’s tactics, techniques and procedures, we continually have to find ways to attack that network and remove the bomb maker from the equation. Take the analogy “shoot the archer don’t shoot the arrow”. If you are just focusing on defeating a device, all you’re doing really is shooting the arrows but, because there are only a finite number of those bomb makers at that level of sophistication then, if you shoot the archer, if you remove the archer from the equation, effectively there aren’t going to be any more IEDs and they are certainly not going to be sophisticated enough.
So that’s a really essential component and we don’t just look at the device to see how it’s made and we don’t just look at the device to see what the forensics and DNA and biometrics are; we also look at it to help us to influence our Force protection measures as well, because, as I said, there’s this constant measure/counter-measure race. A type of IED will come in, we’ll see it literally proliferate around the area and then, from there, we then bring in a counter-measure to protect our Force against it. And very, very quickly after that counter-measure becoming effective, the insurgents will then design a new type of IED.
To give you another example, we’ve seen the increase and enhancement of armoured systems on vehicles, and it’s got to a stage where vehicles are so armoured that roadside bombs aren’t able to penetrate them. So the insurgents have used tactics like literally digging up the tarmac or melting a tyre to melt the tarmac and then peeling the tarmac back, digging a big hole in it, filling it full of explosives, peeling the tarmac back over. And as it, sort of, bakes dry in the midday sun it leaves no anomalies, and therefore it’s very, very difficult for our servicemen and women to then identify these devices.
But crucially it doesn’t matter how armoured a vehicle is if you’re using that sort of attack where you’ve got 300 kilos of high explosives and an armoured vehicle is driving over the top and it detonates then obviously that’s going to have an impact; you’re going to have a road traffic accident. Therefore, they’re constantly thinking about these very, very shrewd ways of trying to overmatch our capabilities and respond in a far more deadly way.
So we constantly have to look at all the different avenues and opportunities available to us. The final one is obviously ‘preparing the Force’ and that’s something that’s really developed and enhanced to a very high degree. We’ve looked at all the tactics, techniques and procedures across all the insurgencies that we’ve ever fought in and, indeed, to our allied partners, and we’ve looked at best practice, at refining them and then tailoring them to the theatre of operations we’re in and – crucially – continually developed them and matched them to the threat of the day, and, ideally, we’re looking to the future and trying to outsmart the enemy.
Again, it’s this measure/counter-measure race, but it’s also like a game of extreme chess. You’re constantly trying to second guess your enemy, your opponent, the bomb maker, who effectively is responsible for the tactical design of that attack. And you’re thinking, “what is this attack trying to achieve? Is it trying to kill innocent civilians? Is it trying to kill members of the security forces? Is it actually trying to kill the bomb technician, the ammunition technical officer who is on his way down to that device?… And perhaps he may know exactly where the device is but there may be something far more sinister waiting to lure him in or kill him as he’s being lured into the actual device itself.
So preparation of the Force is essential. Before they deploy they are trained in lots and lots of tactics, techniques and procedures that will keep them alive, but it’s also done on the ground once they get into theatre and throughout the duration of their operational tours. And then the feedback process is they return from the theatre to make sure that the next deploying troops are as up to speed and as up-to-date as they physically can be.
One of the things that we’ve realised in recent years as well is that… just looking at Afghanistan as one example… within the different regions of that one country the type of the device itself changes dramatically, so where troops might struggle with a very sophisticated device that may have been sourced from say, a rogue state, but they’re also struggling just as equally with very simple fertiliser-based devices. So it’s the variation of the device; how do we stay on top of that both in terms of training, as you were saying, and both in terms of the technology available to us? Is that essentially going to be the Achilles Heel to our attempts to overcome this enduring threat?
It’s a very, very good point; the terrorist will continue to use a specific type of IED until it becomes no longer viable, and by that I mean they will stop using it at a point at which we then bring in a successful counter-measure. To give an example, in most insurgencies the bomb makers will quite often use command wire IEDs; there’ll effectively be an explosive main charge at the contact point, there’ll be some form of electrical wire linking the explosive main charge to the firing point where there will be some sort of power source and a firing switch. And it literally is a remote long-range cable, and at one end of it you’ll have the trigger man, the terrorist, at the other end you will have the targets.
The problem with that is that the trigger man himself is at a specific point; he doesn’t get to choose, he doesn’t have options, he’s got limited escape routes and they are comparatively easy to detect. Therefore, once those are no longer viable because of the tactics, techniques and procedures that are used by the security forces on the ground, they will then switch to another means, for example, radio-control IEDs. And those radio-control IEDs obviously provide them far more freedom of manoeuvre; they can fire it from anywhere within a 360 degree radius of that contact point and therefore they’ve got lots more escape routes and everything else required.
But of course we then bring in jamming equipment, counter-measures to prevent that attack signal from actually reaching the receiver and therefore detonating the device. So, once we bring in that as a successful counter-measure – it’s been reeled out across the Force – they then have to effectively come up with another means to try and overmatch that. That may be using different frequencies, it may be using a number of options and certainly in some of the things we’ve seen like the use of a radio-control armed victim operated device; effectively a booby trap that is in a disarmed state so normal traffic can pass over it freely, but when a military patrol is seen to be approaching it will then be armed by radio-control, outside the range of any protective counter-measures. Then, once the patrol drives over that, obviously because it’s armed it will then detonate.
So we then bring in search teams to go and find those. In the case ofAfghanistan, that was the sort of evolution that we saw and once the search team came in and they were able to successfully identify where those IEDs were they then had to switch to another means. Because they could see that we were identifying the metal content, in terms of the fragmentation that was in those they then started using low metal content IEDs and therefore we’ve then got to refine our tactics, techniques and procedures again, so we use explosive search dogs and ground penetrating radar.
And you can see that across the country they may not have a specific capability to overmatch the IED at that point in time and therefore the insurgent will continue to use that type of IED but as soon as that counter-measure has reached that part of the country and effectively nullifies that type of IED there, then they’ll move on to the new type.
What does that mean for technology in terms of having to adapt and what we have today at hand, is there anything out there that’s impressing you in terms of GPRs or devices we’re seeing here like [Northrop Grumman’s UGV] Wheelbarrow? What’s the future of technology in this?
Well, that is the million dollar question, and as every counter-IED specialist will say, there is no silver bullet. What you have to do is go for that combined eclectic response, and certainly the strategy that is being used at the moment – defeat the device, attack the network, prepare the Force – it effectively covers all the bases. But, if you’re talking about the defeat the device piece where we are looking at technologies to detect and neutralise those devices, we have to really focus on multi-sensor technologies.
And the reason for that is that many companies out there in industry will identify a product that they think will help and assist. And there’s that classic maxim in business; make what you can sell, don’t sell what you can make. Quite often companies in defence will have a product and they’ll think, yes this is brilliant. For example, it’s an explosive detector… but actually… does it detect the metallic content, does it detect buried IEDs, does it detect the electronics?
And so if you roll out a platform that costs hundreds of thousands of dollars but it only has an explosive detector on it, it’s not actually going to be a Force multiplier. But if you have something that has an explosive detector and metal detector fragmentation, an electronic circuit detector, you can already see then that you’re starting to have a number of fail-safes built in and crucially you’re more likely to confirm and find that IED rather than having a series of false alarms.
That is the one thing that industry really could do better because they do have so many resources available to them, is collaborative projects and also using multi-sensor technologies to really provide the gold-plated solution.
So that’s technology, but just very quickly touching on the TTPs again; I’m presuming just from what you’ve said that your thoughts are more towards that left-of-the-boom strategy – we should be doing perhaps a bit more in terms of breaking down the social network. In a practical sense what would that mean?
It means a very concerted intelligence effort, multiple fused intelligence sources and by that I mean everything from human intelligence right the way through to signals intelligence, all those different aspects. And fusing all those different sources of intelligence together to get the best possible and most accurate intelligence picture, and then being able to decide and act in a very, very speedy manner. We call it the ‘OODA’; the Observe, Orientate, Decide, Act cycle. And effectively the enemy has the same cycle as us but we have to basically get round that cycle far more quickly than the enemy does.
Therefore, we’ve got to have the best possible information, the most accurate information and then we’ve got to use that information and decide and act very, very quickly and, crucially, far more quickly than the enemy.
Very well put, just on a final note, I know you’ve got quite often a lot of projects going on, is there anything you would want to tell us about, communicate with the international defence community, anything we should be looking out for?
I just think that anybody out there who’s got any sort of product or service or capability that they think may even vaguely potentially save people’s lives or assist in a detection defeat, neutralisation of IEDs, or indeed any of the wider intelligence piece, they really must get it out there, get it seen and start contacting the counter-IED forces to make sure that it’s all considered and those particular technologies can be fused into the existing effort.
May 11, 2012Posted by on
As a decade of operations begin to wind down in Afghanistan, it is clear that the military’s insatiable demand for timely, secure and high quality information will continue to grow exponentially. Some estimates forecast a near 1000% rise in information generation before 2020.
One thing is clear: More than bullets or bombs, information will remain militaries’ greatest force multiplier.
Afghanistan has shown that severe challenges exist in how information is gathered, exploited and shared in the global battlespace. While recent multinational and national networks have gone some way in alleviating a number of these challenges, it is far from certain that future mission networks will not suffer from the same problems.
The solution does not then lie in the military, political or industrial realms alone. A balanced approach will be required so that nations can make the most of the information that is out there.
Industry needs to provide solutions that are simple for people to use, can handle and exploit increasing volumes of data, and not cost the world. Militaries and their political superiors must start to take a serious look at the organisational structures and procedures they employ on operations.
Read the full article here.