21st Century IED and Roadside Bomb Encyclopedia: The Fight Against Improvised Explosive Devices in Afghanistan and Iraq, Plus the Convoy Survivability Training Guide

Nonfiction, Science & Nature, Technology, Military Science, Social & Cultural Studies, Political Science
Cover of the book 21st Century IED and Roadside Bomb Encyclopedia: The Fight Against Improvised Explosive Devices in Afghanistan and Iraq, Plus the Convoy Survivability Training Guide by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781458199683
Publisher: Progressive Management Publication: May 27, 2011
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781458199683
Publisher: Progressive Management
Publication: May 27, 2011
Imprint: Smashwords Edition
Language: English

The effort to defeat improvised explosive devices (IEDs) and roadside bombs in Afghanistan and Iraq is fully explained in this comprehensive two-part encyclopedia compilation, featuring the Convoy Survivability Training Support Package presenting information on enemy tactics, techniques, and procedures for attacking convoys, as well as U.S. measures in effect to counter them.

IED REPORT: Updated with the latest information from the Joint IED Defeat Organization (JIEDDO), it also includes the results of Congressional inquiries into jamming the IED assembly line by impeding the flow of ammonium nitrate in south and central Asia. A recent GAO report on the JIEDDO effort is also reproduced. The JIEDDO solicitation of proposals for the development of innovative capabilities to defeat IEDs employed against dismounted U.S. or coalition forces anywhere in the world, but especially in Afghanistan is included. The military is looking for advances in the dismounted detection of buried IEDs and unmanned ground vehicles for dismount support. Buried IEDs are emplaced on or under the ground to be detonated in the proximity of Coalition Forces or other passers-by. IEDs are used on roadways, paths and choke points where intended victims are likely to walk. Devices are frequently emplaced in or near features (e.g. washouts, culverts, gates and bridges) that conceal their signatures and channel traffic over them. Components common to an IED are a switch, an initiator, a power source, and the main charge with container. The main charge is typically a homemade, fertilizer-based, bulk explosive in a plastic or fabric container. The most common switches for buried IEDs are victim operated pressure switches and command wires.

IEDs are the enemy's fires system - their artillery. In Iraq and Afghanistan, the enemy delivers these fires through networks that for centuries have formed the sinews of commerce for tribes and factions. IED attacks provide the enemy with a cheap, stand-off, precision targeting system that often provides attackers with complete anonymity. Coverage of IEDs and the JIEDDO includes: JIEDDO Annual Reports (including the newest for the Fiscal Year 2010), Acronyms and Terms, Glossary, DoD Directives, Urgent Needs and Readiness Levels, Technology Readiness Levels, Training for Forensics and Crime Scene Investigation to Battle IEDs, biographies of key officials in the JIEDDO, History of JIEDDO, The Threat, Organizational Structure, Organization Chart, Attacking the Network, Counter-IED Operations Integration Center (COIC), Keyhole, Information Operations, Intelligence, Surveillance, and Recon (ISR), Warrior Alpha, WTI, Constant Hawk, Technology Insertion Process, Identity InstaCheck, Palantir, more.

CONVOY SURVIVABILITY TRAINING: Specific areas of instruction include but are not limited to hardening vehicles, defending against attack, consolidation and reorganization, gun truck employment, various reports, battle drills, and basic instructions for setting up a convoy live fire exercise. The document states in part: "During this course of instruction you will learn to: Identify the threat; harden vehicles; conduct convoy briefing; execute motor movement; defend against attack; defend against Improvised Explosive Devices (IED); conduct convoy consolidation and reorganization; conduct actions at the Release Point (RP); describe the purpose and functions of the gun truck; identify gun truck crew duties; harden gun trucks; employ gun trucks; identify emerging enemy trends on the battlefield.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The effort to defeat improvised explosive devices (IEDs) and roadside bombs in Afghanistan and Iraq is fully explained in this comprehensive two-part encyclopedia compilation, featuring the Convoy Survivability Training Support Package presenting information on enemy tactics, techniques, and procedures for attacking convoys, as well as U.S. measures in effect to counter them.

IED REPORT: Updated with the latest information from the Joint IED Defeat Organization (JIEDDO), it also includes the results of Congressional inquiries into jamming the IED assembly line by impeding the flow of ammonium nitrate in south and central Asia. A recent GAO report on the JIEDDO effort is also reproduced. The JIEDDO solicitation of proposals for the development of innovative capabilities to defeat IEDs employed against dismounted U.S. or coalition forces anywhere in the world, but especially in Afghanistan is included. The military is looking for advances in the dismounted detection of buried IEDs and unmanned ground vehicles for dismount support. Buried IEDs are emplaced on or under the ground to be detonated in the proximity of Coalition Forces or other passers-by. IEDs are used on roadways, paths and choke points where intended victims are likely to walk. Devices are frequently emplaced in or near features (e.g. washouts, culverts, gates and bridges) that conceal their signatures and channel traffic over them. Components common to an IED are a switch, an initiator, a power source, and the main charge with container. The main charge is typically a homemade, fertilizer-based, bulk explosive in a plastic or fabric container. The most common switches for buried IEDs are victim operated pressure switches and command wires.

IEDs are the enemy's fires system - their artillery. In Iraq and Afghanistan, the enemy delivers these fires through networks that for centuries have formed the sinews of commerce for tribes and factions. IED attacks provide the enemy with a cheap, stand-off, precision targeting system that often provides attackers with complete anonymity. Coverage of IEDs and the JIEDDO includes: JIEDDO Annual Reports (including the newest for the Fiscal Year 2010), Acronyms and Terms, Glossary, DoD Directives, Urgent Needs and Readiness Levels, Technology Readiness Levels, Training for Forensics and Crime Scene Investigation to Battle IEDs, biographies of key officials in the JIEDDO, History of JIEDDO, The Threat, Organizational Structure, Organization Chart, Attacking the Network, Counter-IED Operations Integration Center (COIC), Keyhole, Information Operations, Intelligence, Surveillance, and Recon (ISR), Warrior Alpha, WTI, Constant Hawk, Technology Insertion Process, Identity InstaCheck, Palantir, more.

CONVOY SURVIVABILITY TRAINING: Specific areas of instruction include but are not limited to hardening vehicles, defending against attack, consolidation and reorganization, gun truck employment, various reports, battle drills, and basic instructions for setting up a convoy live fire exercise. The document states in part: "During this course of instruction you will learn to: Identify the threat; harden vehicles; conduct convoy briefing; execute motor movement; defend against attack; defend against Improvised Explosive Devices (IED); conduct convoy consolidation and reorganization; conduct actions at the Release Point (RP); describe the purpose and functions of the gun truck; identify gun truck crew duties; harden gun trucks; employ gun trucks; identify emerging enemy trends on the battlefield.

More books from Progressive Management

Cover of the book Factors of Religious Violence and a Path to Peace: A Study of the 16th Century Anabaptists - Radical Protestant Reformation, Apocalypticism, Melchioite Leaders, Munster Rebellion, Christian Doctrine by Progressive Management
Cover of the book Planning for Action: Campaign Concepts and Tools - Wargaming, Military Decision Making Process (MDMP), Joint Operation Planning Process (JOPP), Military End State, Measurements of Performance (MOP) by Progressive Management
Cover of the book The U.S. Counterterrorism Strategy: Addressing Radical Ideologies - Study Focusing on Al-Qaeda and ISIS Islamism and Violent Extremism, Evaluation of Preemptive and Preventive Approaches by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force F-22 Raptor Fighter Aircraft - Operations Procedures, Aircrew Evaluation Criteria, Aircrew Training Flying Operations by Progressive Management
Cover of the book NASA Lunar Science Institute (NLSI) Reports - Research into Polar Water, Dust and Atmosphere, Moon Origin and Evolution, Astrophysics, Training and Outreach by Progressive Management
Cover of the book The Russian Way of War: Post Soviet Adaptations in the Russian Military and Why the Russian Military Failed in Chechnya - Putin, Grozny, Chechen and Georgian War, South Ossetia, Abkhazia by Progressive Management
Cover of the book Cold War Infrastructure for Air Defense: The Fighter and Command Missions - SAC, ADC, ANG, TAC, SAGE, Alert Hangars, Simulator, Aircraft Shelters, Air Force Bases from Barksdale to Whiteman by Progressive Management
Cover of the book 2014 Guide to the Iraq Crisis: Terrorist Advances in Mosul, Islamic State of Iraq and Syria (ISIS), al-Baghdadi, AQI and ISIL, Levant, al-Qaeda in Syria, Obama al-Qaida Counterterrorism Policy by Progressive Management
Cover of the book The Limitless Sky: Air Force Science and Technology Contributions to the Nation - GPS, Precision-Guided Munitions, Radar, Space, Missiles, Rocket Planes, Lifting Bodies, Satellites, Directed Energy by Progressive Management
Cover of the book Air Force Doctrine Document 3-12, Cyberspace Operations: Malware, Network Defense, Definitions, Policy and Doctrine, U.S. National Cyberspace Policy, United States Strategic Command by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Analysis of Apollo 12 Lightning Incident - Technical Report on the Triggered Lightning Strike on the Apollo Saturn V Rocket in 1969 by Progressive Management
Cover of the book Piercing the Fog: Intelligence and Army Air Forces Operations in World War II - ULTRA, MAGIC, Y-Service, European Theater, Air War in Europe, Pacific and Far East, Planning the Defeat of Japan by Progressive Management
Cover of the book Marines in the Korean War Commemorative Series: Counteroffensive - U.S. Marines from Pohang to No Name Line - Matthew Ridgway, Truman Fires MacArthur, Medical Helicopter Evacuation by Progressive Management
Cover of the book The U.S. Army Air Forces in World War II: Weapon of Denial - Air Power and the Battle for New Guinea, Japanese Onslaught, Coral Sea through Milne Bay, Air Power and the Supply War by Progressive Management
Cover of the book Case Studies in the Development of Close Air Support (CAS) - Luftwaffe Experience, Soviet Air-Ground, Tunisian Campaign, Sicily, Italy, Battle for France, Korea, Southeast Asia, Israel, RAF, Goodwood by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy