21st Century IED and Roadside Bomb Encyclopedia: The Fight Against Improvised Explosive Devices in Afghanistan and Iraq, Plus the Convoy Survivability Training Guide

Nonfiction, Science & Nature, Technology, Military Science, Social & Cultural Studies, Political Science
Cover of the book 21st Century IED and Roadside Bomb Encyclopedia: The Fight Against Improvised Explosive Devices in Afghanistan and Iraq, Plus the Convoy Survivability Training Guide by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781458199683
Publisher: Progressive Management Publication: May 27, 2011
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781458199683
Publisher: Progressive Management
Publication: May 27, 2011
Imprint: Smashwords Edition
Language: English

The effort to defeat improvised explosive devices (IEDs) and roadside bombs in Afghanistan and Iraq is fully explained in this comprehensive two-part encyclopedia compilation, featuring the Convoy Survivability Training Support Package presenting information on enemy tactics, techniques, and procedures for attacking convoys, as well as U.S. measures in effect to counter them.

IED REPORT: Updated with the latest information from the Joint IED Defeat Organization (JIEDDO), it also includes the results of Congressional inquiries into jamming the IED assembly line by impeding the flow of ammonium nitrate in south and central Asia. A recent GAO report on the JIEDDO effort is also reproduced. The JIEDDO solicitation of proposals for the development of innovative capabilities to defeat IEDs employed against dismounted U.S. or coalition forces anywhere in the world, but especially in Afghanistan is included. The military is looking for advances in the dismounted detection of buried IEDs and unmanned ground vehicles for dismount support. Buried IEDs are emplaced on or under the ground to be detonated in the proximity of Coalition Forces or other passers-by. IEDs are used on roadways, paths and choke points where intended victims are likely to walk. Devices are frequently emplaced in or near features (e.g. washouts, culverts, gates and bridges) that conceal their signatures and channel traffic over them. Components common to an IED are a switch, an initiator, a power source, and the main charge with container. The main charge is typically a homemade, fertilizer-based, bulk explosive in a plastic or fabric container. The most common switches for buried IEDs are victim operated pressure switches and command wires.

IEDs are the enemy's fires system - their artillery. In Iraq and Afghanistan, the enemy delivers these fires through networks that for centuries have formed the sinews of commerce for tribes and factions. IED attacks provide the enemy with a cheap, stand-off, precision targeting system that often provides attackers with complete anonymity. Coverage of IEDs and the JIEDDO includes: JIEDDO Annual Reports (including the newest for the Fiscal Year 2010), Acronyms and Terms, Glossary, DoD Directives, Urgent Needs and Readiness Levels, Technology Readiness Levels, Training for Forensics and Crime Scene Investigation to Battle IEDs, biographies of key officials in the JIEDDO, History of JIEDDO, The Threat, Organizational Structure, Organization Chart, Attacking the Network, Counter-IED Operations Integration Center (COIC), Keyhole, Information Operations, Intelligence, Surveillance, and Recon (ISR), Warrior Alpha, WTI, Constant Hawk, Technology Insertion Process, Identity InstaCheck, Palantir, more.

CONVOY SURVIVABILITY TRAINING: Specific areas of instruction include but are not limited to hardening vehicles, defending against attack, consolidation and reorganization, gun truck employment, various reports, battle drills, and basic instructions for setting up a convoy live fire exercise. The document states in part: "During this course of instruction you will learn to: Identify the threat; harden vehicles; conduct convoy briefing; execute motor movement; defend against attack; defend against Improvised Explosive Devices (IED); conduct convoy consolidation and reorganization; conduct actions at the Release Point (RP); describe the purpose and functions of the gun truck; identify gun truck crew duties; harden gun trucks; employ gun trucks; identify emerging enemy trends on the battlefield.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The effort to defeat improvised explosive devices (IEDs) and roadside bombs in Afghanistan and Iraq is fully explained in this comprehensive two-part encyclopedia compilation, featuring the Convoy Survivability Training Support Package presenting information on enemy tactics, techniques, and procedures for attacking convoys, as well as U.S. measures in effect to counter them.

IED REPORT: Updated with the latest information from the Joint IED Defeat Organization (JIEDDO), it also includes the results of Congressional inquiries into jamming the IED assembly line by impeding the flow of ammonium nitrate in south and central Asia. A recent GAO report on the JIEDDO effort is also reproduced. The JIEDDO solicitation of proposals for the development of innovative capabilities to defeat IEDs employed against dismounted U.S. or coalition forces anywhere in the world, but especially in Afghanistan is included. The military is looking for advances in the dismounted detection of buried IEDs and unmanned ground vehicles for dismount support. Buried IEDs are emplaced on or under the ground to be detonated in the proximity of Coalition Forces or other passers-by. IEDs are used on roadways, paths and choke points where intended victims are likely to walk. Devices are frequently emplaced in or near features (e.g. washouts, culverts, gates and bridges) that conceal their signatures and channel traffic over them. Components common to an IED are a switch, an initiator, a power source, and the main charge with container. The main charge is typically a homemade, fertilizer-based, bulk explosive in a plastic or fabric container. The most common switches for buried IEDs are victim operated pressure switches and command wires.

IEDs are the enemy's fires system - their artillery. In Iraq and Afghanistan, the enemy delivers these fires through networks that for centuries have formed the sinews of commerce for tribes and factions. IED attacks provide the enemy with a cheap, stand-off, precision targeting system that often provides attackers with complete anonymity. Coverage of IEDs and the JIEDDO includes: JIEDDO Annual Reports (including the newest for the Fiscal Year 2010), Acronyms and Terms, Glossary, DoD Directives, Urgent Needs and Readiness Levels, Technology Readiness Levels, Training for Forensics and Crime Scene Investigation to Battle IEDs, biographies of key officials in the JIEDDO, History of JIEDDO, The Threat, Organizational Structure, Organization Chart, Attacking the Network, Counter-IED Operations Integration Center (COIC), Keyhole, Information Operations, Intelligence, Surveillance, and Recon (ISR), Warrior Alpha, WTI, Constant Hawk, Technology Insertion Process, Identity InstaCheck, Palantir, more.

CONVOY SURVIVABILITY TRAINING: Specific areas of instruction include but are not limited to hardening vehicles, defending against attack, consolidation and reorganization, gun truck employment, various reports, battle drills, and basic instructions for setting up a convoy live fire exercise. The document states in part: "During this course of instruction you will learn to: Identify the threat; harden vehicles; conduct convoy briefing; execute motor movement; defend against attack; defend against Improvised Explosive Devices (IED); conduct convoy consolidation and reorganization; conduct actions at the Release Point (RP); describe the purpose and functions of the gun truck; identify gun truck crew duties; harden gun trucks; employ gun trucks; identify emerging enemy trends on the battlefield.

More books from Progressive Management

Cover of the book 21st Century FEMA Study Course: Introduction to the Incident Command System (ICS 100) for Higher Education and the Campus (IS-100.HE) by Progressive Management
Cover of the book Internet Crimes Against Children and Protecting Children in Cyberspace: Role of the Family, Demographics, Law Enforcement, Impact of Internet Crimes, Sexual Solicitation, Harassment, Cyberbullying by Progressive Management
Cover of the book Pistons to Jets: Diamond Anniversary 75th Year of Naval Aviation, Beginnings, Tactical Jet Missions, Power Projection, Korean War, Vietnam War by Progressive Management
Cover of the book Yemen in Perspective: Orientation Guide and Yemeni Cultural Orientation: Geography, History, Economy, Security, Customs, Aden, Sanaa, Sunni and Shi'a, Sufism, Qat Chewing, Al Qaeda, Houthi Rebellion by Progressive Management
Cover of the book Call Sign: Dustoff: A History of U.S. Army Aeromedical Evacuation from Conception to Hurricane Katrina, MEDEVAC, Air Ambulance, MAST, Korea, Vietnam War, Persian Gulf War, Afghanistan, Iraq by Progressive Management
Cover of the book FBI Crime Scene Investigation (CSI) - Guides for First Responders, Law Enforcement, Death Investigation Guide for Scene Investigator, Fire and Arson Scene Evidence Guide for Public Safety Personnel by Progressive Management
Cover of the book Airpower Against an Army: Challenge and Response in Central Command Air Forces (CENTAF) Duel with Republican Guard in the Persian Gulf War, Desert Storm, Unique Look at How the Guard Was Annihilated by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: TECHINT - Multi-Service Tactics, Techniques, and Procedures for Technical Intelligence Operations (FM 2-22.401) Evacuation of Captured Enemy Materiel by Progressive Management
Cover of the book The First Flight Across the Atlantic, May 1919: Curtiss Flying Boat, NC-1, NC-4 Restoration by Progressive Management
Cover of the book Linking Legacies: Connecting the Cold War Nuclear Weapons Production Processes To Their Environmental Consequences - Nuclear and Radioactive Waste, Environmental Contamination by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Apollo 17 Technical Crew Debriefing with Unique Observations about the Final Lunar Mission - Astronauts Cernan, Schmitt, and Evans by Progressive Management
Cover of the book Evolution of United States Military Landmine Doctrine and Employment: History from World War I and II to Korea and Vietnam Wars, Study Addresses Technological Innovation and Shifts in Doctrine by Progressive Management
Cover of the book The PLA at Home and Abroad: Assessing the Operational Capabilities of China's Military - Uyghurs, Spratly and Senkaku Islands, Tibet, Domestic Riots, Taiwan, Chinese-Russian Exercises by Progressive Management
Cover of the book Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms by Progressive Management
Cover of the book Air Force Doctrine Document 3-40: Counter-Chemical, Biological, Radiological, and Nuclear Operations (CBRN) - Proliferation Prevention, Strategic Enablers, Detection and Monitoring by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy