Counter IED Smartbook – Download as PDF File .pdf), Text File .txt) or read online. COUNTER Improvised Explosive Device. SMART BOOK. X TABLE OF CONTENTS 1. Types of IED’s Vehicle born Radio + Timer Command + Victim operated. C Improvised Explosive Device SMART BOOK Preface Tab AIED Attack Terminology . .2 Counter IED Principles Improvised Explosive.
|Published (Last):||27 December 2006|
|PDF File Size:||5.21 Mb|
|ePub File Size:||12.32 Mb|
|Price:||Free* [*Free Regsitration Required]|
What computer to use If the computer you are uploading from could subsequently be audited in an investigation, zmartbook using a computer that is not easily tied to you.
These different commands, agencies and divisions focus on training, developing technology designed to defeat IEDs, sharing information and bringing together non-NATO actors to disrupt the network before IEDs kill or injure troops and civilians. WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. We specialise in strategic global publishing and large archives.
In addition, many Governmental Organizations and Non-Governmantal Organizations found this problem so important that they built it into their iex of work, carried out their research etc. Watch the event in its entirety here: C-IED is not just about stopping or neutralising an IED once it is already in place, but also about identifying and disrupting the networks that create and smartbok IEDs.
Was first publicly revealed by WikiLeaks working with our source.
They target soldiers and civilians alike. IEDs can be hidden anywhere: One of the most important aspects of C-IED training is being able to stop networks before emplacement of IEDs, recognize IEDs and safely disable them before they injure or kill troops and civilians.
The Counter-IED Report is a specialist subscription-based publication, which serves as an information source to communicate the latest developments in the fight against the IED threat. The research project was guided and advised by a group of 18 international experts — among them was Zsuzsanna Balogh PhD.
Understanding the various threat networks at the tactical to strategic levels is vital to success in current and future operations where battle lines are no longer linear. In particular, you should try to stick to your normal routine and behaviour.
Iraq Counter IED Smart Book – WikiLeaks
We also advise you to read our tips for sources before submitting. Please review these basic guidelines. If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: NATO also trains its troops on how to interact with civilians during deployment.
This includes other media organisations. The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. The success of countering IED activities requires wide info sharing and coordination among the acting organizations.
Submit documents to WikiLeaks
Motivated by its strategic goal to improve human security and equipped with subject expertise in explosive hazards, ccounter January the Centre established the research project to characterise explosive weapons. For example, the Emerging Security Challenges ESC Division has several science initiatives that focus on developing sensors to detect explosive before they can claim lives.
These links drive you to our main counterparts and media partners for further information. Copy this address into your Tor browser.
Was classified, confidential, censored or otherwise withheld from the public before release. If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help you. The contribution of a new partner to the joint project is always a great news. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources.
Countering Improvised Explosive Devices. The Alliance focuses on reducing the frequency and severity of IED attacks, while also targeting the networks that facilitate them. Now, however, C-IED work is not just about detection and neutralization, but instead must also focus on addressing the networks behind the IEDs.
If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
Main Page Country index Follow us.
Allied Reach Conference Read More. Information-sharing between international and national smarbtook enforcement agencies, as well as border and customs agencies, is instrumental in mapping vounter networks. C-IED activities require multidisciplinary knowledge. Any questions about this document’s veracity are noted.
In the past decade, NATO and its partner nations have been developing specific policies and guidelines for the protection of civilians in the planning and conduct of NATO-led operations and missions. If you used flash media to store sensitive data, it is important to destroy the media.