翻訳と辞書
Words near each other
・ Counterparty (technology)
・ Counterphobic attitude
・ Counterplan
・ Counterplan (disambiguation)
・ Counterplan (film)
・ Counter-Earth (comics)
・ Counter-economics
・ Counter-electromotive force
・ Counter-electronics High Power Microwave Advanced Missile Project
・ Counter-Enlightenment
・ Counter-Espionage
・ Counter-experience
・ Counter-flows
・ Counter-Guerrilla
・ Counter-hegemonic globalization
Counter-IED efforts
・ Counter-IED equipment
・ Counter-illumination
・ Counter-insurgency
・ Counter-insurgency aircraft
・ Counter-Insurgency and Jungle Warfare School (India)
・ Counter-insurgency operations during the Second Chechen War
・ Counter-intelligence and counter-terrorism organizations
・ Counter-Japanese Military and Political University
・ Counter-machine model
・ Counter-majoritarian difficulty
・ Counter-Maniera
・ Counter-mapping
・ Counter-melody
・ Counter-offensive


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Counter-IED efforts : ウィキペディア英語版
Counter-IED efforts

Counter-IED efforts are done primarily by military and law enforcement (led by intelligence efforts) with the assistance of the diplomatic and financial communities. It involves a comprehensive approach of countering the threat networks that employ Improvised Explosive Devices (IEDs), defeating the devices themselves, and training others. Counter-IED, or C-IED, is usually part of a broader counter-terrorism, counter-insurgency, or law enforcement effort. Because IEDs are a subset of a number of forms of asymmetric physical attack used by insurgents and terrorists, C-IED activities are principally against adversaries and not only against IEDs. C-IED treats the IED as a systemic problem and aims to defeat the IED System.
This IED System requires multiple actions and resources in order to stage an IED Event. The IED System may be either hierarchical or non-hierarchical but it will contain nodes such as personnel, resources and other actions that are linked. The importance of these nodes and the linkages between them will vary and identifying the critical vulnerabilities within the IED System is an important C-IED activity.
Some IED Systems may be part of large, international terrorist organisations and some may be state sponsored. Some may work completely independently, while others may extend from theater down to village level. This span of possibilities increases the complexity of military and law enforcement operations and requires a comprehensive approach to C-IED potentially involving close cooperation and coordination between the diplomatic, military, economic, and informational levers of power.
The complexity of the IED System is increased since mobile phones and the internet provide a low-cost and easily accessible medium for information sharing and the swift promulgation of tactical ideas and practises, thereby facilitating the efficient operation of these diverse systems. IED network members also have the ability to operate part-time and can blend back into the civilian population when their actions are completed. Such systems can be extremely resilient, invariably hard to target and are, therefore, survivable. Also, adversary targets can range from the specific such as host nation security force bases and recruiting events to the indiscriminate such as concentrations of people in public places. However, IEDs are not only found within the land environment - other targets may include maritime choke points and ships alongside, as well as aircraft in flight or on the ground.〔AJP-3.15(A) NATO Allied Joint Doctrine for Countering – Improvised Explosive Devices〕
The C-IED approach used by NATO involves 3 mutually supporting and complementary pillars of activity which are: ''attack the networks'', ''defeat the device'', and ''prepare the force''. These are all underpinned by ''understanding and intelligence''. (Counter-IED efforts can also be broken up into 6 key operational activities: predict, prevent, detect, neutralise, mitigate, and exploit.)
==Countering Threat Networks (CTN)==
A growing danger to the international community consists of highly complex adversary networks with international span that employ criminal financing as well as terror attacks and other destructive capabilities. Effectively countering these dynamic and violent illicit networks requires the creation of an international and multifunctional framework to share information on these networks as well as collaborative multinational countermeasures. ''Attack the networks'' (AtN) is the principal pillar requiring this joint, interagency and multinational approach. Attack the network operations are defined as actions, kinetic or non-kinetic, used to disrupt, destroy, or reduce an enemy’s capacity to mount terror operations, specifically groups that use IEDs. It consists of largely offensive and proactive activities, driven by intelligence that may go beyond the theater of operations, designed to disrupt the networks of the adversary’s IED System.
Counter-network operations usually focus on leadership targeting of an organization, which follows the logic that by catching the right hornet, the whole colony dies. What is often overlooked in this approach, however, is that if just a worker bee is killed, the nest is aggravated and a much bigger problem is created. While this concept provides a convenient metaphor to discuss possible targeting methodology, it seldom resembles the facts, because human networks are not directly analogous to a hornet’s nest. In other words, not every situation can be resolved by a single kill or capture of the “queen”. Activity is focused on the critical vulnerabilities of the IED System, for example, by denying the supply of components, finance, leaders, specialists and recruits and adversary exploitation and isolating the adversary from the local population. AtN/CTN seeks to 1) shape and influence IED networks, 2) disrupt their operations, and 3) undermine their financiers and supply chains.
Exploitation is a vital component of the attack the networks activity. Information gained provides a picture of adversary capabilities and intentions, perpetrator relationships and the technical construction of the device. This enables the prediction of forthcoming IED activity, informs the targeting process, and enables follow up activities to further disrupt the IED System. Intelligence gained from exploitation also feeds into the other C-IED pillars.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Counter-IED efforts」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.