Insider attacks as one of the main threats to resolute support personnel in Afghanistan

Journal Title: Security and Defence Quarterly - Year 2016, Vol 12, Issue 3

Abstract

From July 2015, the International Security Assistance Force (ISAF) moved into the Resolute Support Mission (RSM) and started acting in the supporting role. From that time, one of the most important Security Force Assistance tasks has been maintaining and developing relationships with its counterparts in the Afghan Security Institutions (ASI) and Afghan National Defence Security Forces (ANDSF). Being aware of the importance of those connections, the enemies of Afghan society have attempted a tactic named Insider Attack (IA). Insider Attack is not a new means of tactic. In the 19th and 20th centuries, Britain and the Soviet Union were victim to insider attacks. Insider attacks have a significant strategic impact on the campaign, as they erode the relationship between the Afghan National Defence Security Forces and Coalition Forces. Insider attacks occur for numerous reasons, including personal grievances, insurgent influences, psychological distress, and ideological motivations. More than half of the attackers have insurgent ties. NATO utilises Target Focused Analysis & Neutralisation and Counter Intelligence Support Teams to screen, vet, and interview persons of interest, as well as collect, analyse, and exploit biometric data, documents, and media. Other measures implemented to mitigate insider threats are the threat Awareness and Reporting Programme (TARP) and the Terrorism Espionage and Sedition briefing to RSM personnel. Incorporating appropriate lessons learned from the British, Russian and ISAF experience into RSM training and operations will have a positive impact on responding to Insider Attacks while reducing their frequency across the Combined Joint Operational Area - Afghanistan. It is clear that the common approach to defeating Insider Threats must be holistic and each activity should be conducted according to equal principles. The conceptual framework for countering Insider Threats has five functions: prepare, deter, detect, respond, recover and exploit. This conceptual framework underpins the common approach and guides of counter - measures. While skills and drills are important, combatting Insider Threats is first and foremost about mindset and therefore it needs to be command-led. If proper preparation makes Coalition Forces members culturally adaptive, develops effective systems and procedures, and hones military skills and Tactics, Techniques, and Procedures, NATO will be able succeed in the Resolute Support Mission.

Authors and Affiliations

Krystian Frącik

Keywords

Related Articles

Operation Leyte – operational fires.

Operational fires are one of most important functions in a synergy effect with other operational functions that contribute to the achievement of targeted operational goals. The main operational goal of the American takeo...

The role played by the armed forces for protection of the civilian population as part of humanitarian crises management. The Romanian approach

The actions of the military structures to protect the civilian population have evolved from air defence operations to complex missions of “human security”, based on prevention and intervention in any civil emergency situ...

Psychological operations after the Second World War.

This paper has two purposes. From the personal side, the topic was chosen because I am interested in the history of psychological operations. To benefit the reader, I address psychological operations in selected military...

Pro-Daesh jihadist propaganda. A study of social media and video games

The fight that Europe and the West must wage against jihadist terrorism will take some time, but if we live up to our values of integration and democracy, we will come out of it soon. As Giovanni Falcone, the Italian jud...

Security studies and polemology – correlations, relationships and dependencies

Security studies are one of the disciplines included in the area of social sciences. A subject of security studies research is modern safety systems in terms of military and non-military actions and their functioning at...

Download PDF file
  • EP ID EP705982
  • DOI https://doi.org/10.35467/sdq/103234
  • Views 42
  • Downloads 0

How To Cite

Krystian Frącik (2016). Insider attacks as one of the main threats to resolute support personnel in Afghanistan. Security and Defence Quarterly, 12(3), -. https://europub.co.uk/articles/-A-705982