Tag Archive for Attack the Network

(U//FOUO) Joint Improvised Explosive Device Defeat Organization (JIEDDO) Attack the Network Lexicon

This first edition of the Attack the Network (AtN) Lexicon was produced by the Joint Improvised Explosive Device Defeat Organization (JIEDDO). The lexicon contents were developed after extensive interviews with military units who successfully employed AtN principles and practices to reduce the number and effectiveness of Improvised Explosive Devices (IEDs) in the Counter-Insurgency (COIN) environment where they encountered multiple and sometimes interconnected adversary networks. The lexicon contents were further developed and refined by subject matter experts from over fifty organizations across the Departments of Defense, Justice, and Homeland Security.

(U//FOUO) Joint Publication 3-15.1 Counter-Improvised Explosive Device Operations

This publication provides joint doctrine for planning and executing counter-improvised explosive device (C-IED) operations. It outlines responsibilities, provides command and control considerations, discusses organizational options, details the C-IED process and attack the network methodology, and introduces models for coordinating with C-IED supporting organizations.

(U//FOUO) Asymmetric Warfare Group “Attack The Network” Counterinsurgency Methodology

This document continues discussion on effective targeting methods (lethal and non-lethal) at the Battalion and Brigade level. It continues dialogue on Attacking the Network by further describing Center of Gravity and Critical Vulnerability analysis themes and their link to network modeling. This document also discusses the use of detailed, Observable Indicators to focus Intelligence Surveillance and Reconnaissance assets against the enemy’s vulnerabilities. A modified Intelligence Synchronization Matrix (ISM) ensures integration and synchronization to the friendly course of action in a Counter-Insurgency environment. Using doctrinal and situational templates and a modified ISM helps the S2 understand the insurgent networks operating in his Area of Interest, focus assets against the known or suspected Critical Vulnerabilities, and synchronize ISR to give the commander the information he needs at the Decision Points.