fingerprint
Attack the Network spacer
iris recognition

The Joint IED Defeat Organization's Attack the Network line of operation enables offensive operations against complex networks of financiers, IED makers, trainers and their supporting infrastructure by providing intelligence surveillance, reconnaissance, information operations, counter-bomber targeting, biometrics and weapons technical intelligence capabilities.


Attack the Network actions require a common and consistent operational
framework built on three tactical areas:

  • gain valuable intelligence
  • build relationships
  • neutralize the adversary


Counter-IED Operations/Intelligence Center

Created in August 2006, the COIC's mission is to support the combat commanders with fused analytical products to enable more precise attacks to defeat networks employing IEDs. The COIC works with a broad network of more than 30 government and intelligence agencies.

Since its inception, the COIC has provided more than 10,000 products in support of warfighters in theater and interagency requests for information. Additionally, COIC's pattern analysis team has increased its prediction accuracy to more than 85 percent on future events.


The Net-centric Innovation Division System Integration Lab continues to provide advanced support to tactical edge users and analysts through design, development and implementation of tools supporting information technology-enabled analytics, applications for 3-D visualization and virtual model and simulation development.


Evidence collection

Weapons Technological Intelligence is a category of intelligence and a process derived from the forensic and technical collection and exploitation of IEDs, associated components, improvised weapons and other weapon systems. WTI produces four products:

Force protection – Informs the warfighter of emerging threats; informs science, technology, research and development; validates threats for testing; and documents electronic, physical or event signatures.

Targeting – Distributes knowledge; analyzes and predicts patterns; maps devices to a group or person; analyzes links and networks; and conducts all-source fusion.

Sourcing – Identifies state or transnational sponsorships; tracks component movement; identifies manufacturing processes; and identifies network leadership financing.

Support to prosecution – Matches individuals with a place, device, event, paraphernalia and/or weapon and compiles a forensic examination of latent prints, DNA, tool marks, assemble patterns and trace evidence.


The Terrorist Explosive Device Analytical Center coordinates and manages assets as the unified effort to technically and forensically exploit all IEDs throughout jurisdiction of law enforcement, intelligence community and the Defense Department.


For Analytical Requests for Support; www.coic.smil.mil; or contact the Mission Integration Division (MID) POC, at 703-995-7971, DSN: 345-7971, aricoj@atac.mil

COIC TRAINING 703-995-8043, DSN: 345-8043, jagoem@atac.mil

Operations questions can be directed to 703-995-8048 or timothy.lindsay@jieddo.mil