Counter IED Smartbook – Download as PDF File .pdf), Text File .txt) or read online. COUNTER Improvised Explosive Device. SMART BOOK. X TABLE OF CONTENTS 1. Types of IED’s Vehicle born Radio + Timer Command + Victim operated. C Improvised Explosive Device SMART BOOK Preface Tab AIED Attack Terminology . .2 Counter IED Principles Improvised Explosive.
|Published (Last):||7 April 2012|
|PDF File Size:||20.77 Mb|
|ePub File Size:||13.53 Mb|
|Price:||Free* [*Free Regsitration Required]|
Motivated by its strategic goal to improve human security and equipped with subject expertise in explosive hazards, in January the Centre established the research project to characterise explosive weapons. They can be deployed everywhere: These links drive you to our main counterparts and media partners for further information.
The contribution of a new partner to the joint project is always a great news. Even those who mean well often do not have the experience or expertise to advise properly.
Trident Juncture 18 Read More.
With the aim of reducing the risks posed by IEDs, the Alliance helps members and partners in developing their own C-IED capabilities, with a particular emphasis on education and training, doctrine development and improving counter-measure technologies. Tips for Sources After Submitting. Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. It covers all areas conter countering IEDs, from the strategic to the tactical.
Iraq Counter IED Smart Book – WikiLeaks
Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used. Contact us to discuss how to proceed. smartbbook
In particular, you should try to stick to your normal routine and behaviour. If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.
Submit documents to WikiLeaks
The information provided by civilians who know the area can be instrumental in preventing IED attacks. IEDs can be hidden anywhere: C-IED activities require multidisciplinary knowledge. Watch the event in its entirety here: Donate to WikiLeaks Unless otherwise specified, the document described here: What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.
The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. The C-IED Action Plan is built around several different areas, including information-sharing, closer cooperation with other international organizations and law enforcement agencies, specialized training for troops deployed to areas where IEDs are widely used and improving equipment used to detect IEDs and protect troops.
Was classified, confidential, censored or otherwise withheld from the public before release. Education and Training Read More. If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used. For example, the Emerging Security Challenges ESC Division has several science initiatives that focus on developing sensors to detect explosive before they can claim lives.
Spain is taking the lead on testing various stand-off detection technologies, while Slovakia is focusing on activities, technologies and procedures for IED “Render-Safe” operations in line with an Explosive Ordnance Disposal initiative.
They can be detonated via cell phones or trip wires, among other methods. We specialise in strategic global publishing and large archives. IEDs are one of the main causes of casualties among troops and exact a heavy toll on local populations.
If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods.
Main Page Smarthook index Follow us. Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.
NATO also trains its troops on how to interact with civilians during deployment. Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor.
You can only access this submissions system through Tor. Information-sharing between international and national law enforcement agencies, as well as border and customs agencies, is instrumental countfr mapping insurgent networks.