PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Insider attacks as one of the main threats to resolute support personnel in Afghanistan

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
From July 2015, the International Security Assistance Force (ISAF) moved into the Resolute Support Mission (RSM) and started acting in the supporting role. From that time, one of the most important Security Force Assistance tasks has been maintaining and developing relationships with its counterparts in the Afghan Security Institutions (ASI) and Afghan National Defence Security Forces (ANDSF). Being aware of the importance of those connections, the enemies of Afghan society have attempted a tactic named Insider Attack (IA). Insider Attack is not a new means of tactic. In the 19th and 20th centuries, Britain and the Soviet Union were victim to insider attacks. Insider attacks have a significant strategic impact on the campaign, as they erode the relationship between the Afghan National Defence Security Forces and Coalition Forces. Insider attacks occur for numerous reasons, including personal grievances, insurgent influences, psychological distress, and ideological motivations. More than half of the attackers have insurgent ties. NATO utilises Target Focused Analysis & Neutralisation and Counter Intelligence Support Teams to screen, vet, and interview persons of interest, as well as collect, analyse, and exploit biometric data, documents, and media. Other measures implemented to mitigate insider threats are the threat Awareness and Reporting Programme (TARP) and the Terrorism Espionage and Sedition briefing to RSM personnel. Incorporating appropriate lessons learned from the British, Russian and ISAF experience into RSM training and operations will have a positive impact on responding to Insider Attacks while reducing their frequency across the Combined Joint Operational Area - Afghanistan. It is clear that the common approach to defeating Insider Threats must be holistic and each activity should be conducted according to equal principles. The conceptual framework for countering Insider Threats has five functions: prepare, deter, detect, respond, recover and exploit. This conceptual framework underpins the common approach and guides of counter - measures. While skills and drills are important, combatting Insider Threats is first and foremost about mindset and therefore it needs to be command-led. If proper preparation makes Coalition Forces members culturally adaptive, develops effective systems and procedures, and hones military skills and Tactics, Techniques, and Procedures, NATO will be able succeed in the Resolute Support Mission.
Rocznik
Strony
3--18
Opis fizyczny
Bibliogr. 12 poz., rys.
Twórcy
  • War Studies University, Warsaw, Poland
Bibliografia
  • 1. CJ2 Information Paper: Combating the Insider Threat, NATO Training Mission Afghanistan, 4 Aug 2011.
  • 2. HQ ISAF SOP 331, Theatre Force Protection.
  • 3. HQ ISAF SOP 332 - Insider Threat Risk Mitigation and Insider Incidents Handling Procedure.
  • 4. HQ ISAF SOP 333 - Insider Incident Handling Procedures. COMISAF Insider Threat Tactical Directive, 02 March 2012.
  • 5. http://www.rs.nato.int/article/rs-news/afghan-national-defense-and-securityforces-operational-update.html.
  • 6. IJC / NTM-A Joint Desk Note - Inside the Wire Threat Analysis, 05 August 2012.
  • 7. Inside the Wire Threats - Afghanistan: Green on Blue, US Center for Army Lessons Learned (CALL) Handbook No. 12-07, , February 2012.
  • 8. Inside the Wire Threats-Afghanistan: Green on Blue, CALL Handbook No. 12-07.
  • 9. Insider Threat Prevention Model Effective Practices; CAAT Special Report, 5 Nov 2012.
  • 10. Insider Threat: A Real and Present Danger, COIN Common Sense, Vol 4, Iss 1, 20 Feb 2013.
  • 11. Insider Threats in Partnering Environments; Asymmetric Warfare Group, Jun 2011.
  • 12. Threat Awareness and Reporting Program; Army Regulation 381-12, 4 Oct 2010.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b21b9feb-ade7-4640-bcb8-2a6032125c2f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.