afghan

Information about afghan

Published on February 27, 2008

Author: Brainy007

Source: authorstream.com

Content

A Comparison of the Afghan Mujahideen (1979-89) and the Iraqi Insurgency (2003):  A Review of the: Tactics Weapons Training and Composition:  A Comparison of the Afghan Mujahideen (1979-89) and the Iraqi Insurgency (2003):  A Review of the: Tactics Weapons Training and Composition By C. L. Staten CEO and Sr. National Security Analyst Emergency Response & Research Institute (ERRI) Time Magazine – Who Are The Enemy? :  Time Magazine – Who Are The Enemy? Sunday, Dec. 07, 2003 New York -- U.S. intelligence experts now believe the Iraq insurgents are a volatile mix of groups and free-lancers who include loyalists of the former ruling Ba’ath Party, Fedayeen militiamen, former Republican Guard and intelligence agents, foreign jihadi fighters, professional terrorists, paid common criminals and disaffected Iraqis, TIME's Brian Bennett and Michael Ware reported from Iraq. Source: Time Magazine -- On the internet at: URL: http://www.time.com/time/nation/article/0,8599,557021,00.html Should We Care What Happened in Afghanistan During the 1980’s??:  Should We Care What Happened in Afghanistan During the 1980’s?? The primary reason is that those who fought the former Soviet Union in Afghanistan are now the (1) mentors (2) planners, and (3)terrorism instructors for thousands of Mujahideen, that are now engaging Coalition Forces in Iraq and elsewhere… Foreign Terrorist Elements – Afghan Arabs:  Who Are the Afghan-Arabs? In the 1980s, thousands of Arab men left the Middle-East and N. Africa, often with the assistance of their governments, to help Afghanistan -- a fellow Muslim nation -- in its fight against Soviet invaders. At the end of the Afghan-Soviet war, thousand of the so-called “Afghan Arabs” chose to remain in Afghanistan. They have since been referred to as “Afghan Arabs” by counter-terrorism experts. Foreign Terrorist Elements – Afghan Arabs Foreign Terrorist Elements – Afghan Arabs:  Foreign Terrorist Elements – Afghan Arabs What do the Afghan Arabs believe? -- For Arab Afghans, existing Arab and Islamic governments are ‘infidel’ and non-Islamic (i.e. Saudi Arabia) -- The non-Muslim world is divided into enemies and non-enemies; the United States and the "West" are among the enemies. The West includes Britain and France, because of colonial-era polices and continued intervention in Muslim regions. Canada, Australia and Germany are also enemies, because their troops participated in the war in Afghanistan. Latin American and Scandinavian countries are perceived as neutral. Foreign Terrorist Elements – Afghan Arabs:  Foreign Terrorist Elements – Afghan Arabs What is their motivation for attacking the West? --"Holy" war is the duty of all Muslims to change governments. Coups, revolutions and violence is encouraged. Innocent civilians killed in this fight will go to paradise as martyrs. -- Participation in governments is prohibited; however, participation in military institutions is encouraged as a way of preparing for holy war, and eliminating target governments in the future. -- Secularism is a Western idea that contradicts Islam, and should guide Muslims' every step. Saddam Loyalists & Mohammed’s Army:  Saddam Loyalists & Mohammed’s Army “Another organization calling itself Mohammed's Army, or Jaish Mohammed, is an umbrella group of former intelligence agents, army and security officials, and Ba’ath Party members,” ERRI analysts said. Membership in Baghdad's “loyalist” insurgent groups appears to be at least partially fueled by Sunni Muslims who were favored under Saddam Hussein. Iraq Insurgency: State of Development:  Iraq Insurgency: State of Development Iraqi insurgency in Baghdad appears to have a central leadership that finances attacks in the capital and gives broad direction. One-hundred guerrillas in 8 to 12 separate rebel bands, were identified by U.S. Army intelligence. Individual attacks against U.S. occupation forces in the capital are left up to the men who carry them out. There is no sign of an military-style command structure in the city or in Iraq as a whole, military sources are looking at operational independent cells. Mercenaries??:  Mercenaries?? Former Hussein regime officers allegedly pay for terrorist services of Saudis, Kuwaitis, Syrians, Jordanians, Egyptians and Yemenis. "There are groups coming from abroad who are well-paid to carry out terrorist actions in Iraq," one analyst said. Kuwait and Iran are two specific sources of terrorist manpower. © Copyright, 2003, Emergency Response & Research Institute and the author. All rights reserved. This presentation contains military and law enforcement sensitive information and should not be distributed to the general public. Contact [email protected] for more information about any usage of this presentation. Who Are Our Ultimate Enemies in Iraq??:  Who Are Our Ultimate Enemies in Iraq?? Alleged Iraqi plot by Al-Qaeda-linked terrorist group, led by Abu Musab Al-Zaraqawi Khomeini Hussein Bin Laden & Zawahiri Anticipated 4GW Tactics In Foreseeable Future:  Ambushes involving automatic weapons and rocket propelled grenades (RPG) or mortars. Planted mines, command or remote detonated mines and improvised explosive devices. Snipers and covert shooting attacks. Delay detonated car/truck bombs. Homicide/suicide bombers, attacking high density (and soft) targets – to include transportation systems and markets, shopping areas. Provoking of U.S./Coalition forces into overreacting, which could provide hostile propaganda. Generating widespread disturbances designed to stress the resources of the opposing force. Kidnappings & hostage taking. [As anticipated by ERRI analysts] Anticipated 4GW Tactics In Foreseeable Future Weaponry of the Insurgents RPG-7:  Weaponry of the Insurgents RPG-7 The RPG-7 antitank grenade launcher was the Afghan Mujahideen’s weapon of choice. We are now seeing the same weapons in Iraq. Late in the Afghan conflict guerillas began to use heavy caliber machine guns mounted on pick-up trucks, mortars, and multiple rocket launch systems… we are just beginning to see this as well in Iraq. Other Important Weapons of Both the Afghan and Iraqi Insurgency:  Other Important Weapons of Both the Afghan and Iraqi Insurgency An increasingly difficult problem involves the use of Surface to Air Missiles (SAMS)…used to target both rotary and fixed wing coalition aircraft. A recent example of this tactic involved the 22 Nov, 2003 attack on DHL Airbus A300 cargo plane that was departing Baghdad airport. Guerillas prepare to fire SA-7 (L) & SA-14 (R) SAMS Explosive Devices used in Both Theaters:  Explosive Devices used in Both Theaters Another weapon that has been used extensively in both Afghanistan and Iraq is the Improvised Explosive Device (IED). These devices have been detonated by command, timed and delayed methods. Suitcase bomb IEDS: Improvised Explosive Devices Roadside Bombs in Iraq - I:  Roadside Bombs in Iraq - I Military munitions are converted into improvised devices. Ammo depots of the former Hussein regime are being utilized by guerillas to kill and wound Coalition Forces. (Below left) 152/155mm artillery shell encased in concrete (for shrapnel) Photo credit: DoD, U.S. Army Engineer School Slide16:  Camouflaged roadside bombs in Iraq are piles of rocks that provide (additional shrapnel) with an IED hidden underneath Roadside Bombs in Iraq - II Multiple IEDS, connected by hardwire to OP, and command detonated as convoy passes. Photo credit: DoD, U.S. Army Engineer School Slide17:  Roadside Bombs in Iraq - III Sources for all IED specific slides: Briefing, DoD, U.S. Army Engineer School, with a special thanks to John Donovan Slide18:  Roadside Bombs in Iraq - IV Sources for all IED specific slides: Briefing, DoD, U.S. Army Engineer School, with a special thanks to John Donovan Suicide/Homicide Vehicle Bombers:  Suicide/Homicide Vehicle Bombers The use of (vehicle-borne improvised explosive devices – VBIED) by suicide/homicide bombers is a tactic that was not used during the Afghan/Russian war in the 80’s. This has become an increasingly frequent tactic of fanatics in Iraq against U.S. and Coalition forces in Iraq. United Nations Bombing Jordanian Embassy Bombing Two Methods of Attack??:  Two Methods of Attack?? An ERRI analyst stated,”It is suggested that one must distinguish between the frequent, low-level hit-and-run attacks on US forces on the one hand and the far more sinister suicide car bombings which have killed so many civilians on the other.” Those behind the roadside bombings, the sniping incidents and the RPG attacks on coalition troops are thought to be a mixture of Saddam loyalists, untrained Arab volunteers and ordinary Iraqis who have a score to settle with the US military for killing members of their family during the war. The big car bomb attacks are more likely to include foreign terrorist elements (al-Qaeda affiliates), possibly working in collaboration with members of the former regime. U.S. and Coalition Intervention Tactics:  U.S. and Coalition Intervention Tactics Small unit leadership, especially at the junior non-commissioned officer level, is critical to tactical success in urban operations. All movement (including infantry) must use "bounding and over-watch" techniques. During movement in open areas, units using bounding and over-watch have significantly reduced casualties compared to units that did not. Intelligence, especially from human sources, is absolutely critical to successful urban operations. Unmanned Ariel Vehicles (UAV’s) can provide real-time intelligence. The problem appears to be the process used by analysts who have difficulty interpreting it. (See next slide) © Copyright, 2003, Emergency Response & Research Institute and the author. All rights reserved. This presentation contains military and law enforcement sensitive information and should not be distributed to the general public. Contact [email protected] for more information about any usage of this presentation. Terrorism Counter-Measures: Using Technology to Our Advantage:  Terrorism Counter-Measures: Using Technology to Our Advantage Another of the counter-measures to the deadly ambushes that continue to plague U.S. and Coalition convoys is an on-going surveillance of convoy routes. Predator drones, helicopters, satellites and other kinds of “overhead” technology can be used to contradict the guerilla advantage and help prevent using IED’s as a surprise… Interdiction Techniques and Considerations for Military/Law Enforcement Personnel - I:  Interdiction Techniques and Considerations for Military/Law Enforcement Personnel - I “Close and negotiate” tactics should not be attempted. The desire of the suspect is not suicide; it is homicide. They will attempt to detonate their device if they believe they are discovered. Switches are on the chest area or held in the hands. Other Middle East terrorist devices include cell phones for command detonation. Do not discount the fact that the bomb may have a “fail safe” cell phone initiator so an observer could detonate the explosives should the bomber become incapacitated. The standard police tactic of closing distance on a “suicidal” suspect in order to try to reason with them only increases the probability that the “good guys” will become homicide victim(s). The homicide bomber is not despondent. They may be religiously motivated to the point of fanaticism so rational negotiations may be futile. Improvised Explosive Devices Interdiction Techniques and Considerations for Military/Law Enforcement Personnel - II:  Interdiction Techniques and Considerations for Military/Law Enforcement Personnel - II If timely verification of a “homicide bomber,” is made then deadly force is authorized. Deadly force decisions must be based on local policies, procedures and rules of engagement, and must meet legal requirements. Note that there is considerable concern that a “center of mass shot” might set off an explosive charge if that is where the payload is being carried by the suspect. Local tactics and training should take this into account. Improvised Explosive Devices Interdiction Techniques and Considerations for Military/Law Enforcement Personnel - III:  Interdiction Techniques and Considerations for Military/Law Enforcement Personnel - III If or when the bomber is incapacitated, either through direct police action or explosives detonation, no attempt should be made to approach and render aid to the suspect. Secondary devices should be expected such as a second suicide bomber, accomplices with an additional device, or pre-set vehicle bombs staged along main emergency routes to the scene. It should be noted that most explosive devices also contain fragmentation such as nails, nuts and bolts to maximize the deadly effects of the blast and kill or injure as many people as possible. Area evacuation should be completed, a crime scene cordon set up, and a bomb squad should be called to approach and evaluate the suspect and the scene for actual presence of explosives. Improvised Explosive Devices Interdiction Techniques and Considerations for Military/Law Enforcement Personnel - IV:  Interdiction Techniques and Considerations for Military/Law Enforcement Personnel - IV If the suspect is neutralized and there is no explosion, do not immediately move to render aid. Retreat to a point of observation a minimum of 900’ from the suspect, and call for the bomb squad. The suspect may be alive and could detonate the explosives upon your approach either deliberately or unconsciously. Many of the bombers are unaware they have been accompanied by an individual with the capability of remotely detonating the device. Keep this in mind before any approach is conducted. Be prepared to fire again if the suspect attempts to flee or is otherwise moving. Even if the suspect appears dead, do not approach as the explosives could have anti-disturbance devices, a timer, or other mechanisms meant to cause a detonation. A bomb squad or EOD personnel should make the initial approach to a downed suspect using robotics or bomb suits…even if their arrival may be delayed. Improvised Explosive Devices ERRI & Emergency Net News We Monitor the World for You!:  ERRI & Emergency Net News We Monitor the World for You! More Information?? EMERGENCY RESPONSE & RESEARCH INSTITUTE (ERRI) EmergencyNet News Service 6348 North Milwaukee Avenue - #312, Chicago, Illinois 60646, USA Voice/Voice Mail: 773-631-ERRI Fax: 773-631-4703 Internet E-Mail: [email protected] Web Page: www.emergency.com © Copyright, 2003, Emergency Response & Research Institute and the author. All rights reserved. This presentation contains military and law enforcement sensitive information and should not be distributed to the general public. Contact [email protected] for more information about any usage of this presentation.

Related presentations


Other presentations created by Brainy007

impact irrigation
23. 08. 2007
0 views

impact irrigation

Chapter 10
06. 11. 2007
0 views

Chapter 10

Biomes Notes
10. 10. 2007
0 views

Biomes Notes

national courier
03. 10. 2007
0 views

national courier

Context aware Event Notification
05. 10. 2007
0 views

Context aware Event Notification

Tilde overview
08. 10. 2007
0 views

Tilde overview

India Little Stories Big Dreams
12. 10. 2007
0 views

India Little Stories Big Dreams

Trainer of Training Admin
04. 09. 2007
0 views

Trainer of Training Admin

PresentaciÃn Chile ppp
22. 10. 2007
0 views

PresentaciÃn Chile ppp

munoz
01. 12. 2007
0 views

munoz

Triage mobisys
29. 10. 2007
0 views

Triage mobisys

plead
29. 10. 2007
0 views

plead

life in tudor times
23. 08. 2007
0 views

life in tudor times

Greek Mythology mlm
23. 08. 2007
0 views

Greek Mythology mlm

em ipr gm indigenousseed
17. 10. 2007
0 views

em ipr gm indigenousseed

seaman 1
07. 11. 2007
0 views

seaman 1

ciaa summary en
04. 12. 2007
0 views

ciaa summary en

mccarthywipo
27. 11. 2007
0 views

mccarthywipo

chatguide KS3
28. 12. 2007
0 views

chatguide KS3

WB20070713
25. 10. 2007
0 views

WB20070713

0903BROWNFIELDS8DALE
01. 01. 2008
0 views

0903BROWNFIELDS8DALE

Black History Month slides
02. 01. 2008
0 views

Black History Month slides

Ch17 Acid Base A
03. 01. 2008
0 views

Ch17 Acid Base A

birds mammals 2007
03. 01. 2008
0 views

birds mammals 2007

The Nineteenth Century
07. 01. 2008
0 views

The Nineteenth Century

lhj Tudor Fashion
23. 08. 2007
0 views

lhj Tudor Fashion

sigirtutorial2004
23. 08. 2007
0 views

sigirtutorial2004

436group6
03. 08. 2007
0 views

436group6

071F1301 Fire Commands
07. 11. 2007
0 views

071F1301 Fire Commands

conf faking ellingson
03. 08. 2007
0 views

conf faking ellingson

talk
16. 10. 2007
0 views

talk

Caldwell1
15. 10. 2007
0 views

Caldwell1

H113k
07. 12. 2007
0 views

H113k

Dangerous MarketsMcKinseyl
15. 10. 2007
0 views

Dangerous MarketsMcKinseyl

202636
24. 02. 2008
0 views

202636

sigir05 if
21. 11. 2007
0 views

sigir05 if

976 Tues Costello
28. 02. 2008
0 views

976 Tues Costello

Llewellyn
07. 11. 2007
0 views

Llewellyn

TRL
06. 03. 2008
0 views

TRL

midterm review 1
02. 11. 2007
0 views

midterm review 1

ProducingGender
19. 02. 2008
0 views

ProducingGender

politru
20. 03. 2008
0 views

politru

HauWei 110306
26. 10. 2007
0 views

HauWei 110306

mail defence methods
07. 10. 2007
0 views

mail defence methods

mishkin ppt09
09. 04. 2008
0 views

mishkin ppt09

chinarisk
10. 04. 2008
0 views

chinarisk

rt1 maeda
13. 04. 2008
0 views

rt1 maeda

mabrouk undergraduate research
30. 10. 2007
0 views

mabrouk undergraduate research

8 Stock Markets
18. 04. 2008
0 views

8 Stock Markets

Genmeet 2005 Marques
22. 04. 2008
0 views

Genmeet 2005 Marques

PaulJourdan
28. 04. 2008
0 views

PaulJourdan

ai intro
30. 04. 2008
0 views

ai intro

Munich Airport
16. 10. 2007
0 views

Munich Airport

tudor banquet costume
23. 08. 2007
0 views

tudor banquet costume

New Arrivals
02. 10. 2007
0 views

New Arrivals

dansereau
18. 06. 2007
0 views

dansereau

brantley 2
18. 06. 2007
0 views

brantley 2

anthrax
18. 06. 2007
0 views

anthrax

Anne geneve cours6
18. 06. 2007
0 views

Anne geneve cours6

anne geneve cours4
18. 06. 2007
0 views

anne geneve cours4

amm pres wilson apnic rpt
18. 06. 2007
0 views

amm pres wilson apnic rpt

91 Presentation Desc
18. 06. 2007
0 views

91 Presentation Desc

WCU07Recordkeeping
16. 02. 2008
0 views

WCU07Recordkeeping

DC1 Talk
18. 06. 2007
0 views

DC1 Talk

Learn Geometric Patterns
15. 06. 2007
0 views

Learn Geometric Patterns

Learn Fractions
15. 06. 2007
0 views

Learn Fractions

Learn Fractions XIV
15. 06. 2007
0 views

Learn Fractions XIV

Learning Percent II
15. 06. 2007
0 views

Learning Percent II

Fraction X
15. 06. 2007
0 views

Fraction X

foresbiome
15. 06. 2007
0 views

foresbiome

favorite animal
15. 06. 2007
0 views

favorite animal

Fact Families
15. 06. 2007
0 views

Fact Families

Asia Barabash
26. 10. 2007
0 views

Asia Barabash

ContentFile57
16. 10. 2007
0 views

ContentFile57

Learning Geological Features
15. 06. 2007
0 views

Learning Geological Features

Learn Fractions VIII
15. 06. 2007
0 views

Learn Fractions VIII

Foldable for Quadrilaterals
15. 06. 2007
0 views

Foldable for Quadrilaterals

lecture6
15. 11. 2007
0 views

lecture6

ASPLOS 2000
18. 06. 2007
0 views

ASPLOS 2000

Dude watercontrol team
30. 12. 2007
0 views

Dude watercontrol team

cuc kl 0105 kka
04. 09. 2007
0 views

cuc kl 0105 kka

tudor monarchs afterhenry
23. 08. 2007
0 views

tudor monarchs afterhenry

McKee 10 11 05
30. 10. 2007
0 views

McKee 10 11 05

WN NLTN March 9 2004
21. 10. 2007
0 views

WN NLTN March 9 2004

sbdc naples june05
22. 10. 2007
0 views

sbdc naples june05

PARCCppt040506
29. 10. 2007
0 views

PARCCppt040506