90 likes | 105 Views
Learn about the significant threats and enduring challenges of base defense, analyzing incidents such as Khobar Towers, Africa bombings, and the 9/11 attacks. Discover strategies to counter terrorist methods like kidnapping, hijacking, and bombing. Understand the Risk Management Process (RMP) for effective force protection, including assessing assets, threats, and vulnerabilities. Explore essential capabilities for integrated base defense: deceive, deter, anticipate, deny, and more. Gain insights on dominating the battlespace and reducing risk through technology improvements.
E N D
Protect The Force Fighting the Base From the Ground Up “Some of the best USAF fighters operate on the ground.” BGen James Shamess NDIA Workshop 18 June 2003 v.8
Khobar Towers 25 Jun 96 19 Airmen Killed 100s Injured Africa Bombings 7 Aug 98 220 Killed 4000+ Injured Oklahoma City 19 Apr 95 168 Dead 100s Injured Cole - 12 Oct 00 17 Killed 39 Injured Terrorism’s Recent History WTC 11 Sep 01 1000s Killed 1000s Injured Pentagon 11 Sep 01 184 Killed 114 Injured Global Threat: SIGNIFICANT – ENDURING - UNPREDICTABLE
Terrorist Methods • Kidnapping • Very covert • Difficult unless very well supported • Extended media play • Gain bargaining chip • Survivable • Hijacking/Skyjacking • Multiple hostages • Extended media play • Gain bargaining chip • Many casualties • Chemical, Biological, Radiological, Nuclear Bombing • Most common • Low risk • Inexpensive • Extremely lethal • Instant media coverage • Arson • Low risk • Inexpensive • Lethal • Assassination • Killing prominent person • Eliminating a “problem” • Often a symbolic target • Suicide
Risk Management Process (RMP) is critical to effective FP Execute T&E Cost Analysis Assess Assets Assess Risks Determine Countermeasure Options Assess Threats Assess Vulnerabilities Evaluate Benefits Analysis Risk Management Process • Desired Effects • Commander’s Intent Drives Planning and Resource Decisions • Example: • Neutralize attacks preventing destruction of key operations or death to large concentrations of personnel • Mitigate damage and loss of life • Give priority to operational missions Determine Enemy Course of Action Make RM Decisions Determine Friendly Course of Action
Delay • Slow enemy, without massive engagement Assess • Analyze defense effect, leverage intel Deploy • Rapidly mass force • Attain positional advantage Neutralize • Render enemy ineffective Essential Capabilities forEffective Integrated Base Defense Deceive • Distort enemy view, mislead Deter • Discourage enemy action • Make consequences clear Anticipate • Enemy’s perspective • Prepare accordingly Deny • Prevent enemy use of space and means to attack Mitigate • Minimize enemy success Detect • See all potential threats Relentless evaluation and follow-up occurs at all stages See First – Understand First – Act First
Deceive Mitigate Deter • Neutralize Deploy Anticipate IBD Assess Deny Incident Manpower Notional Incident Technology / Systems / TTP Delay • Detect Goal: Close the gap; Reduce risk Essential Capabilities forEffective Integrated Base Defense See First – Understand First – Act First
1 2 3 4 5 6 7 8 9 Analyzing the Problem Notional Damaged Resources Risk Getting to The Fight Winning The Fight Capability Probability of Effectiveness (PE) = PI x PN
ANTICIPATE DETER C2ISR ASSESS MITIGATE DETECT COMMON OPERATION PICTURE DENY NEUTRALIZE The Elements of Integrated Base Defense DECEIVE DELAY DEPLOY The Objective Is to Dominate the Battlespace
Conclusions • Significant, Enduring Threat • Sustained Higher Force Protection Measures, Worldwide—Large Expeditionary Footprint • Risk Reduced by Significant Presence/Deterrent • Way Ahead • Through technology improvements, increase protection capability at reduced cost To sustain Air and Space dominance, we need to adopt innovative force protection technologies appropriate for this new era of asymmetric threats. - Secretary Roche Our heightened force protection conditions will become our new "normal." - General Jumper