IEEE Spectrum September, 2008 - 26

Monthly Global Terrorist Events
(minus Iraq and Afghanistan)
1000

IED events (explosions or rendered safe)
Other terrorist acts

800
600
400

2006

2007

MAY

APR

MAR

JAN

FEB

DEC

NOV

SEP

OCT

JUL

AUG

JUN

MAY

APR

MAR

JAN

FEB

DEC

NOV

SEP

OCT

JUL

AUG

JUN

APR

0

MAY

200

2008
Source: Triton Report

Iraq IED Incident Trends
IEDs found and cleared
Ineffective IED attacks

(IED incidents that fail to
produce coalition casualities)

2003

2004

2005

2006

2007

FEB
MAR

DEC

OCT

JUN

AUG

FEB

APR

DEC

OCT

JUN

AUG

APR

FEB

DEC

OCT

AUG

JUN

APR

FEB

DEC

OCT

AUG

JUN

APR

FEB

DEC

OCT

JUN

AUG

IED attacks with coalition
force casualties

2008

IeD attaCKS are already common in some places outside of Afghanistan and Iraq [top]. The rate
of attacks in Iraq [bottom] declined in the first half of 2008, thanks to aggressive efforts to dismantle
the networks that build and deploy IEDs. (The number of incidents is not included in this chart
because the Joint IED Defeat Organization declined to release them.)

saved; column B: lives lost, damaged, irrevocably changed. But defeating the device
is actually a small piece of a much larger
and evolving counter-IED strategy.
JIEDDO originally divided its projects
among five functions: prediction, detection, prevention, neutralization (which
includes defeating the device), and mitigation. Some of those technologies and most
of the techniques, as deployed today in Iraq
and Afghanistan, are classified. Still, what
is known about those categories offers at
least a partial view of evolving counterIED strategies, as well as insights into the
main issue: whether the strategic influence
of IEDs can be subverted.
In this world, simply categorizing
activities can be complicated. A few
years ago, when it became clear that
going after IEDs on the road wasn't hav32

NA * iEEE SpEctrum * SEptEmbEr 2008

ing the desired effect, the rallying cry
became "attack the network"-in other
words, destroy the infrastructures that
build and deploy IEDs. Attacking the
network, it turns out, spans prediction,
prevention, and part of detection.
JIEDDO has been criticized for spending too little on attacking the network.
But as a former JIEDDO official wrote
in an e-mail, "a significant portion of the
activities in Attack the Network are classified," making it difficult for outsiders to
know how big the effort actually is.
Attacking the network boils down in
part to analyzing social networks, collecting and analyzing intelligence, and persistently surveilling places. It has been
a difficult challenge, depending as it has
on wildly incongruous data, tips, and
reports from surveillance systems, such as

unmanned aerial vehicles, and from local
people suspicious of activity in their neighborhoods. "It's a challenging new frontier,"
says Shoop. "Combining an understanding
of the psychology and sociology of terrorist networks with probabilistic modeling,
complexity theory, forensic science, pattern recognition, and data mining to predict human behavior is new."
JIEDDO has already acknowledged
that it is using sophisticated database software in Iraq to help its analysts get a handle
on that multifarious assortment of images,
data, intelligence, and anecdote that bears
on whether an IED has been emplaced.
In his final press conference this past
November as director of JIEDDO, retired
U.S. Army Gen. Montgomery Meigs
identified for the first time an organization called the Counter IED Operations
Integration Center. Calling it a "very powerful intelligence fusion operation," he
added that "it makes a difference in that
line of operations we call 'attack the network.' Beyond that, I can't say anything."
Meigs's successor at JIEDDO, Lt. Gen.
Thomas F. Metz, said in an interview this
past May: "Say you know a particular part
of your district gets a larger proportion
of IEDs. You want to study it, layer in all
the data: signals intelligence, significant
events over a couple years, moving target indicators from JSTARS [an advanced
military reconnaissance aircraft], humint
[human intelligence] reports. You have to
take it on faith from me that actionable
patterns begin to form."

L

ife and death on the roads
of Iraq and Afghanistan often
depend on the eyes and intuition of soldiers just a few
years out of high school. Most
IEDs are found today by a soldier peering
through a thick Lexan window of a massively armored truck and noticing something amiss.
"You won't find the IED itself," explains
a U.S. Army counter-IED trainer, in an
interview at Camp Speicher in Tikrit,
Iraq. "You look for other indicators. Trash
right after a route clearance. Disturbed
soil. An area strangely devoid of activity,
or a heavily laden vehicle with no occupants. A donkey cart by itself-it's somebody's livelihood, so why is it abandoned?
Why is no one there?"
Over the past year in Iraq, military
patrols guided by local people, often former insurgents, have uncovered countless thousands of IEDs. The locals are
paid to reveal where the bombs are.
www.spectrum.ieee.org


http://www.spectrum.ieee.org

Table of Contents for the Digital Edition of IEEE Spectrum September, 2008

IEEE Spectrum September, 2008 - Cover1
IEEE Spectrum September, 2008 - Cover2
IEEE Spectrum September, 2008 - 1
IEEE Spectrum September, 2008 - 2
IEEE Spectrum September, 2008 - 3
IEEE Spectrum September, 2008 - 4
IEEE Spectrum September, 2008 - 5
IEEE Spectrum September, 2008 - 6
IEEE Spectrum September, 2008 - 7
IEEE Spectrum September, 2008 - 8
IEEE Spectrum September, 2008 - 9
IEEE Spectrum September, 2008 - 10
IEEE Spectrum September, 2008 - 11
IEEE Spectrum September, 2008 - 12
IEEE Spectrum September, 2008 - 13
IEEE Spectrum September, 2008 - 14
IEEE Spectrum September, 2008 - 15
IEEE Spectrum September, 2008 - 16
IEEE Spectrum September, 2008 - 17
IEEE Spectrum September, 2008 - 18
IEEE Spectrum September, 2008 - 19
IEEE Spectrum September, 2008 - 20
IEEE Spectrum September, 2008 - 21
IEEE Spectrum September, 2008 - 22
IEEE Spectrum September, 2008 - 23
IEEE Spectrum September, 2008 - 24
IEEE Spectrum September, 2008 - 25
IEEE Spectrum September, 2008 - 26
IEEE Spectrum September, 2008 - 27
IEEE Spectrum September, 2008 - 28
IEEE Spectrum September, 2008 - 29
IEEE Spectrum September, 2008 - 30
IEEE Spectrum September, 2008 - 31
IEEE Spectrum September, 2008 - 32
IEEE Spectrum September, 2008 - 33
IEEE Spectrum September, 2008 - 34
IEEE Spectrum September, 2008 - 35
IEEE Spectrum September, 2008 - 36
IEEE Spectrum September, 2008 - 37
IEEE Spectrum September, 2008 - 38
IEEE Spectrum September, 2008 - 39
IEEE Spectrum September, 2008 - 40
IEEE Spectrum September, 2008 - 41
IEEE Spectrum September, 2008 - 42
IEEE Spectrum September, 2008 - 43
IEEE Spectrum September, 2008 - 44
IEEE Spectrum September, 2008 - 45
IEEE Spectrum September, 2008 - 46
IEEE Spectrum September, 2008 - 47
IEEE Spectrum September, 2008 - 48
IEEE Spectrum September, 2008 - Cover3
IEEE Spectrum September, 2008 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1217
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1117
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1017
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0917
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0817
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0717
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0617
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0517
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0417
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0317
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0217
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0117
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1216
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1116
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1016
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0916
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0816
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0716
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0616
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0516
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0416
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0316
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0216
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0116
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1215
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1115
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1015
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0915
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0815
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0715
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0615
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0515
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0415
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0315
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0215
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0115
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1214
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1114
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1014
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0914
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0814
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0714
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0614
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0514
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0414
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0314
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0214
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0114
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1213
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1113
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1013
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0913
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0813
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0713
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0613
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0513
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0413
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0313
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0213
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0113
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1212
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1112
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1012
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0912
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0812
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0712
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0612
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0512
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0412
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0312
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0212
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0112
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1211
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1111
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1011
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0911
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0811
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0711
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0611
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0511
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0411
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0311
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0211
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0111
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1210
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1110
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1010
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0910
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0810
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0710
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0610
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0510
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0410
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0310
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0210
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0110
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1209
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1109
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1009
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0909
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0809
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0709
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0609
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0509
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0409
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0309
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0209
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0109
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1208
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1108
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1008
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0908
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0808
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0708
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0608
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0508
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0408
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0308
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0208
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0108
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1207
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1107
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1007
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0907
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0807
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0707
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0607
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0507
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0407
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0307
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0207
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0107
https://www.nxtbookmedia.com