Improvised Explosive Devices (IEDs) in Iraq and Afghanistan

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan PDF Author: Clay Wilson
Publisher:
ISBN:
Category : Explosives, Military
Languages : en
Pages : 6

Get Book Here

Book Description
Since October 2001, Improvised Explosive Devices (IEDs, or roadside bombs) have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan. IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan . The threat includes vehicle-borne IEDs, in which extremists drive cars laden with explosives directly into a target. DOD efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever on patrol. IEDs are increasingly being used in Afghanistan, and DOD reportedly is concerned that they might eventually become more widely used by other insurgents and terrorists worldwide. This report will update as events warrant.

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan PDF Author: Clay Wilson
Publisher:
ISBN:
Category : Explosives, Military
Languages : en
Pages : 6

Get Book Here

Book Description
Since October 2001, Improvised Explosive Devices (IEDs, or roadside bombs) have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan. IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan . The threat includes vehicle-borne IEDs, in which extremists drive cars laden with explosives directly into a target. DOD efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever on patrol. IEDs are increasingly being used in Afghanistan, and DOD reportedly is concerned that they might eventually become more widely used by other insurgents and terrorists worldwide. This report will update as events warrant.

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 0

Get Book Here

Book Description
Since October 2001, Improvised Explosive Devices (IEDs, or roadside bombs) have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan.1 IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan. The threat includes vehicle-borne IEDs, in which extremists drive cars laden with explosives directly into a target. DOD efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever on patrol. IEDs are increasingly being used in Afghanistan, and DOD reportedly is concerned that they might eventually be more widely used by other insurgents and terrorists worldwide. This report will be updated as events warrant.

21st Century IED and Roadside Bomb Encyclopedia: the Fight Against Improvised Explosive Devices in Afghanistan and Iraq, Plus the Convoy Survivability Training Guide

21st Century IED and Roadside Bomb Encyclopedia: the Fight Against Improvised Explosive Devices in Afghanistan and Iraq, Plus the Convoy Survivability Training Guide PDF Author: U. S. Military
Publisher:
ISBN: 9781973389446
Category :
Languages : en
Pages : 330

Get Book Here

Book Description
The effort to defeat improvised explosive devices (IEDs) and roadside bombs in Afghanistan and Iraq is fully explained in this comprehensive two-part encyclopedia compilation, featuring the Convoy Survivability Training Support Package presenting information on enemy tactics, techniques, and procedures for attacking convoys, as well as U.S. measures in effect to counter them.IED REPORT: Updated with the latest information from the Joint IED Defeat Organization (JIEDDO), it also includes the results of Congressional inquiries into jamming the IED assembly line by impeding the flow of ammonium nitrate in south and central Asia. A recent GAO report on the JIEDDO effort is also reproduced. The JIEDDO solicitation of proposals for the development of innovative capabilities to defeat IEDs employed against dismounted U.S. or coalition forces anywhere in the world, but especially in Afghanistan is included. The military is looking for advances in the dismounted detection of buried IEDs and unmanned ground vehicles for dismount support. Buried IEDs are emplaced on or under the ground to be detonated in the proximity of Coalition Forces or other passers-by. IEDs are used on roadways, paths and choke points where intended victims are likely to walk. Devices are frequently emplaced in or near features (e.g. washouts, culverts, gates and bridges) that conceal their signatures and channel traffic over them. Components common to an IED are a switch, an initiator, a power source, and the main charge with container. The main charge is typically a homemade, fertilizer-based, bulk explosive in a plastic or fabric container. The most common switches for buried IEDs are victim operated pressure switches and command wires. IEDs are the enemy's fires system - their artillery. In Iraq and Afghanistan, the enemy delivers these fires through networks that for centuries have formed the sinews of commerce for tribes and factions. IED attacks provide the enemy with a cheap, stand-off, precision targeting system that often provides attackers with complete anonymity. Coverage of IEDs and the JIEDDO includes: JIEDDO Annual Reports (including the newest for the Fiscal Year 2010), Acronyms and Terms, Glossary, DoD Directives, Urgent Needs and Readiness Levels, Technology Readiness Levels, Training for Forensics and Crime Scene Investigation to Battle IEDs, biographies of key officials in the JIEDDO, History of JIEDDO, The Threat, Organizational Structure, Organization Chart, Attacking the Network, Counter-IED Operations Integration Center (COIC), Keyhole, Information Operations, Intelligence, Surveillance, and Recon (ISR), Warrior Alpha, WTI, Constant Hawk, Technology Insertion Process, Identity InstaCheck, Palantir, more.CONVOY SURVIVABILITY TRAINING: Specific areas of instruction include but are not limited to hardening vehicles, defending against attack, consolidation and reorganization, gun truck employment, various reports, battle drills, and basic instructions for setting up a convoy live fire exercise. The document states in part: "During this course of instruction you will learn to: Identify the threat; harden vehicles; conduct convoy briefing; execute motor movement; defend against attack; defend against Improvised Explosive Devices (IED); conduct convoy consolidation and reorganization; conduct actions at the Release Point (RP); describe the purpose and functions of the gun truck; identify gun truck crew duties; harden gun trucks; employ gun trucks; identify emerging enemy trends on the battlefield.

Improvised Explosive Devices in Iraq, 2003-09

Improvised Explosive Devices in Iraq, 2003-09 PDF Author: Andrew Smith
Publisher: Strategic Studies Institute
ISBN: 1584874880
Category : Biography & Autobiography
Languages : en
Pages : 84

Get Book Here

Book Description
Introduction -- Operational surprise and response -- The contemporary IED experience -- Data sources -- U.S. experience in Iraq -- The U.S. response -- Recognition -- Institutional response -- Organizational -- Equipment -- Vehicles -- Electronic countermeasures -- Training and doctrine -- Research and development -- Industrial -- Funding -- Policy -- Summary assessment -- The Australian experience in Iraq -- The Australian response -- Recognition -- Institutional response -- Organizational -- Equipment -- Training and doctrine -- Research and development -- Industrial -- Funding -- Policy -- Comparative analysis of responses -- Leadership changes -- National interests and equities -- Adequacy of existing capabilities -- Countervailing assessments -- Conventional thinking -- Adequate agility -- Flexible force structure -- Other considerations -- Failure to anticipate and the risk of overreaction -- The focusing power of casualties -- Subsequent experience - Afghanistan -- Conclusions.

2011 Complete Guide to IEDs - Improvised Explosive Devices

2011 Complete Guide to IEDs - Improvised Explosive Devices PDF Author: U. S. Military
Publisher:
ISBN: 9781976769573
Category :
Languages : en
Pages : 124

Get Book Here

Book Description
A unique, comprehensive, and up-to-date collection of government documents on the threat of improvised explosive devices (IEDs) to American and coalition troops in Iraq and Afghanistan. Congress has appropriated over $16 billion to the Joint IED Defeat Organiztion (JIEDDO) to address the IED threat. IEDs are the enemy's fires system - their artillery. In Iraq and Afghanistan, the enemy delivers these fires through networks that for centuries have formed the sinews of commerce for tribes and factions. IED attacks provide the enemy with a cheap, stand-off, precision targeting system that often provides attackers with complete anonymity. Coverage of IEDs and the JIEDDO includes: JIEDDO Annual Reports, Acronyms and Terms, Glossary, DoD Directives, Urgent Needs and Readiness Levels, Technology Readiness Levels, Training for Forensics and Crime Scene Investigation to Battle IEDs, biographies of key officials in the JIEDDO, History of JIEDDO, The Threat, Organizational Structure, Organization Chart, Attacking the Network, Counter-IED Operations Integration Center (COIC), Keyhole, Information Operations, Intelligence, Surveillance, and Recon (ISR), Warrior Alpha, WTI, Constant Hawk, Technology Insertion Process, Indentity InstaCheck, Palantir, Data Tracker, Doing Business with JIEDDO, Defeat the Device: Ahura, Lapeer and Terrapin, Husky Mounted Detection System, Counter Radio-controlled Electronic Warfare (CREW), DUKE, Chameleon, Guardian, Vehicle Optics Sensor System (VOSS), Route Clearance Teams (RCT), Route Clearance Blowers, MARCBot/Xbot, Healy Beacon, Rhino II and III, Combat Tracker Dogs, Training the Force, JTCOIC, Tactical Site Exploitation. GAO Report on Warfighter Support: Actions Needed to Improve Visibility and Coordination of DOD's Counter-Improvised Explosive Device Efforts. This is a privately authored news service and educational publication of Progressive Management. Our publications synthesize official government information with original material - they are not produced by the federal government. They are designed to provide a convenient user-friendly reference work to uniformly present authoritative knowledge that can be rapidly read, reviewed or searched. Vast archives of important data that might otherwise remain inaccessible are available for instant review no matter where you are. This e-book format makes a great reference work and educational tool. There is no other reference book that is as convenient, comprehensive, thoroughly researched, and portable - everything you need to know, from renowned experts you trust. For over a quarter of a century, our news, educational, technical, scientific, and medical publications have made unique and valuable references accessible to all people. Our e-books put knowledge at your fingertips, and an expert in your pocket!

Disrupting Improvised Explosive Device Terror Campaigns

Disrupting Improvised Explosive Device Terror Campaigns PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309124204
Category : Political Science
Languages : en
Pages : 81

Get Book Here

Book Description
Countering the threat of improvised explosive devices (IED)s is a challenging, multilayered problem. The IED itself is just the most publicly visible part of an underlying campaign of violence, the IED threat chain. Improving the technical ability to detect the device is a primary objective, but understanding of the goals of the adversary; its sources of materiel, personnel, and money; the sociopolitical environment in which it operates; and other factors, such as the cultural mores that it must observe or override for support, may also be critical for impeding or halting the effective use of IEDs. Disrupting Improvised Explosive Device Terror Campaigns focuses on the human dimension of terror campaigns and also on improving the ability to predict these activities using collected and interpreted data from a variety of sources. A follow-up to the 2007 book, Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities, this book summarizes two workshops held in 2008.

Warfighter Support: Challenges Confronting DoD's Ability to Coordinate and Oversee Its Counter-Improvised Explosive Devices Efforts

Warfighter Support: Challenges Confronting DoD's Ability to Coordinate and Oversee Its Counter-Improvised Explosive Devices Efforts PDF Author: William M. Solis
Publisher: DIANE Publishing Inc.
ISBN: 1437925324
Category : Technology & Engineering
Languages : en
Pages : 22

Get Book Here

Book Description
This is a print on demand edition of a hard to find publication. Improvised explosive devices (IED) are the number-one threat to troops in Iraq and Afghanistan, accounting for almost 40% of the attacks on coalition forces in Iraq. Although insurgents' use of IEDs in Iraq has begun to decline, in Afghanistan the number of IED incidents has significantly increased. The Joint IED Defeat Org. (JIEDDO) was created to lead and coordinate all DoD efforts to defeat IEDs. Its primary role is to provide funding to the military services to rapidly develop and field counter-IED solutions. The auditor is recommending that JIEDDO: (1) improve its visibility of counter-IED efforts across DoD; (2) develop a complete plan to guide the transition of initiatives; and (3) define criteria for its training initiatives to help guide its funding decisions. Illustrations.

Getting It Right: The Endurance of Improvised Explosive Device (Ied) Education in the U.S. Army - History of Parallel Lessons on Vietnam

Getting It Right: The Endurance of Improvised Explosive Device (Ied) Education in the U.S. Army - History of Parallel Lessons on Vietnam PDF Author: U. S. Military
Publisher: Independently Published
ISBN: 9781723875588
Category : History
Languages : en
Pages : 58

Get Book Here

Book Description
As the United States seeks to maintain its influence abroad, hostile nations and non-state actors will attempt to leverage the low-cost effectiveness of improvised explosive devices (IEDs) to disrupt US military operations. These cheap devices, made from relatively easily acquired components, will enable the continued use of the IED on the modern battlefield. While the US spent billions of dollars to counter this seemingly new IED threat, the devices used in Iraq and Afghanistan were similar in nature and effect to the booby traps used in Vietnam. The Army's failure to retain the institutional knowledge gained from its experiences with booby traps in Vietnam resulted in an initial inability to provide support for the detection and clearance of these devices and targeting of assembly/emplacement networks. Instead, the Army rushed the force management process, specifically within the Engineer Regiment, to refocus its efforts, regrow the skillset, and organize to meet the threat. While the major Global War on Terrorism (GWOT) conflicts close, other powers seek to counter United States dominance with methods that do not involve major combat operations. The use of cheap and easily acquired parts for IEDs will support their continued use. Therefore, a key to success in future conflicts is retaining and institutionalizing the knowledge gained through recent experiences while understanding the evolution of threats. Studies of historically noteworthy conflicts often evoke comparison. While history does not repeat itself, common themes emerge regarding actions of each participant and their success or failure. These themes provide a basis for future militaries to incorporate, adapt, or otherwise prepare for encountering these situational eventualities on the battlefield. The US military left Vietnam with robust counter-improvised explosive device (C-IED) experiences and knowledge, part of the greater counter-insurgency skillset developed by soldiers assigned to the Military Assistance Command, Vietnam (MACV) between February 1962 and March 1973. However, the military retained little of this experience in doctrine, training, or force structure as the Army's focus shifted to a new operating concept focused on maneuver-centric warfare against a near-peer threat from the Soviet Union throughout the 1970s and 80s. The close of the Cold War in 1990s ended the perceived threat of large scale, force-on-force, warfare for the moment. New threats emerged in Africa and the Balkans; old threats gained renewed interest in the Middle East. From the mid-1990s to the summer of 2001, the Army's focus was on limited warfare and peacekeeping operations. Non-state actors, under the banner of the terrorist organization Al-Qaeda, attacked the United States on September 11, 2001, forcing the Army to again reassess its focus. The war that followed led to significant investments of time, money, and blood in relearning the C-IED lessons forgotten during thirty years spent avoiding guerrilla warfare using conventional ground forces. While lessons learned from Iraq and Afghanistan guide today's engineer force structure and training in the C-IED fight, the Engineer Regiment must not lose interest as the focus for the training of tactical and operational units pivots back to major combat operations. Letting today's lessons suffer a fate similar to that of lessons learned during the Vietnam War will place the US Army at a disadvantage if the common threat of effective, low-cost weapons, fades and then reemerges to challenge US maneuver formations.

IEDs in the Context of Appropriate Technology - Understanding and Defeating Artisanal Weapons in Afghanistan and Iraq Using Simple But Effective Technologies

IEDs in the Context of Appropriate Technology - Understanding and Defeating Artisanal Weapons in Afghanistan and Iraq Using Simple But Effective Technologies PDF Author: U. S. Military
Publisher:
ISBN: 9781980684336
Category :
Languages : en
Pages : 54

Get Book Here

Book Description
This work suggests that a closer look at the context within which IEDs develop, appropriate technology, could shed light on ways to counteract them. The American military, which pours billions of dollars into high tech research and development of its vehicles, has at times found itself struggling against relatively inexpensive and frequently unsophisticated homemade bombs known as improvised explosive devices, IEDs. These weapons have been responsible for the majority of NATO troop deaths in both Afghanistan and Iraq. It is almost as if the United States did not suspect such artisanal weapons were going to be used, or if they were that the evolutionary pace of countermeasures would exceed that of IED modifications. What exactly is meant by "appropriate technology?" Unfortunately there are numerous interpretations of the term, making a precise definition universally accepted by all rather unlikely. To an extent it can be thought of as the products, and/or the movement to make such products; created with a community's technical, environmental, financial, social, political and other needs in mind; and frequently using locally available materials and labor-intensive as opposed to capital-intensive techniques." These small-scale operations generally do not require a high level of education, making them valuable for less developed countries, particularly at the village and rural levels. Foot-operated treadle pumps for irrigation, solar cookers and a host of other appropriate technologies are improving the lives of countless individuals. By examining how previous examples of appropriate technology in a country of military interest were developed and distributed, valuable insights into what to expect in the realm of IED development and distribution might be obtained. As an example, take solar ovens, also known as solar cookers, usually about the size of a large breadbox which use the sun's energy to cook food. These devices, of which there are numerous designs ranging from dark pots with glass coverings to fairly sophisticated apparatuses incorporating parabolic reflectors, have proven to be a tremendous boon to villagers, especially women who are often tasked with collecting firewood. In so doing they help prevent deforestation and since some can boil water, assist in limiting the spread of water-borne illnesses.

U.S. Army Improvised Munitions Handbook

U.S. Army Improvised Munitions Handbook PDF Author: Department of the Army
Publisher: Simon and Schuster
ISBN: 1510720561
Category : Technology & Engineering
Languages : en
Pages : 421

Get Book Here

Book Description
You don’t need to be a trained soldier to fully appreciate this edition of the U.S. Army Improvised Munitions Handbook (TM 31-210). Originally created for soldiers in guerilla warfare situations, this handbook demonstrates the techniques for constructing weapons that are highly effective in the most harrowing of circumstances. Straightforward and incredibly user-friendly, it provides insightful information and step-by-step instructions on how to assemble weapons and explosives from common and readily available materials. Over 600 illustrations complement elaborate explanations of how to improvise any number of munitions from easily accessible resources. Whether you’re a highly trained solider or simply a civilian looking to be prepared, the U.S. Army Improvised Munitions Handbook is an invaluable addition to your library.