recommended reading

Report: Insurgents years ago obtained U.S. systems used to stop IEDs

GE031910iedINng The Army detonates an IED in Afghanistan, the leading cause of death and injury for U.S. soldiers.Sgt. Joshua LaPere/Army

Insurgents in Afghanistan obtained more than two years ago several U.S. systems the military uses to jam signals that detonate improvised explosive devices, and they might have passed them on to Iran to research how the technology can be foiled, according to a Secret Army document posted on Monday by

The systems, called Warlocks, scramble signals such as those sent from cell phones that insurgents use to detonate remote roadside bombs, which have been the leading cause of death and injuries for American soldiers in Iraq. The Defense Department has released few details on the Warlock systems, but jammers, in general, emit powerful radio signals to knock out other signals that, in the case of IEDs, are used to set off deadly bombs.

"Intelligence indicates that insurgents in Afghanistan have recovered several Warlock systems," said a private report the Army Counterintelligence Center published on March 18, 2008. "It is possible that Warlock systems captured in Afghanistan were sent to Iran for reverse engineering and for use in developing countermeasures to Warlock."

The center wrote the report to discuss the threat to the military that presents when it publishes sensitive documents obtained from government agencies and corporations. Founders of the small Web site say they serve a whistleblower role to root out contracting fraud and unethical behavior. The New York Times reported on Wednesday that WikiLeaks posted the document on its site.

In its report, Army intelligence discusses WikiLeaks' account of the acquisition of the Warlock systems to illustrate how the Web site "incorrectly interprets the leaked data regarding the components and fielding of the Warlock system, resulting in unsupportable and faulty conclusions to allege war profiteering, price gouging and increased revenues by DoD contractors involved in counter-IED development efforts."

But in the report, the Army cites another counterintelligence report it wrote that found the service had lost a number of Warlock systems, which were sent to Iran to determine how they worked. That report was not included in the WikiLeaks article. The Army pointed out that if terrorists, insurgents or the Iranian government successfully developed countermeasures for the jamming systems, "U.S. and coalition forces would be at greater risk of [radio-controlled IED] attacks, especially those units equipped with Warlock systems similar to those that had been exploited.

"It is also possible that any countermeasures developed to defeat the Warlock system would be provided to the Jaysh al-Mahdi (JAM) and other anti-U.S. insurgent or terrorist groups operating in Iraq and Afghanistan," the report added.

Lt. Col. Lee Packnett, an Army spokesman, confirmed the authenticity of the online document, but said the Joint Improved Explosive Device Defeat Organization would have to answer questions about whether insurgents in Afghanistan had captured Warlock jammers and if they had been sent to Iran for reverse engineering. A JIEDDO spokesman had not responded to calls for comment before this article was posted.

Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, said because the report is two years old, the Army could have developed new technology to alter the jamming systems, negating any changes insurgents had incorporated to circumvent the Warlocks. "Nothing ever stands still. The Army is always upgrading, creating newer measures to deal with new threats," he said. "It's a perennial cycle."

Aftergood added that posting information about the Warlocks could have put soldiers in danger. "If disclosing information simplifies the task of those seeking to disable the systems, then there is a problem," he said. "I think the concern expressed by the Army is a plausible one. . . . Some types of records are really sensitive. I wouldn't want to be the publisher of information that got people killed."

EDO Corp., a division of ITT Corp., developed the Warlock jammers and the Army spent $469 million to acquire them in fiscal 2009 and fiscal 2010. The service plans to spend another $711 million on the systems between fiscal 2011-2015.

Nextgov Executive Editor Allan Holmes contributed to this article.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.