Sometimes in such competition
the enemy will use asymmetric technologies, which may happen to be low
technology in design; at other times they will use the latest in high technology
that they can easily procure off of the Internet or on the open commercial
market.
Thus, working with technical analysis cannot be left to happenstance;
They use a variety of low-tech devices: homemade bombs, including
improvised explosive devices (IEDs), which have improved exponentially in
Iraq and Afghanistan; crude weapons lacking a fire direction system,
such as 60 mm mortars
As an example, insurgents use the Internet to plan, learn, rehearse,
coordinate, deconflict, and communicate.
There is no template that suffices for a technical baseline. Thus, until
scientists and technologists develop a framework for technical baselines
that analysts can use in deliberating technical intelligence in counterinsurgency
operations in urban settings, analysts are left on their own to figure
out what is technically important.