Roadside Bombs and Improvised Explosive Devices (IEDs) - America's Effort to Target and Defeat Homemade Explosives in Afghanistan and Iraq - Electronics, Surveillance, Dogs, and More

Nonfiction, Science & Nature, Technology, Military Science, Social & Cultural Studies, Political Science
Cover of the book Roadside Bombs and Improvised Explosive Devices (IEDs) - America's Effort to Target and Defeat Homemade Explosives in Afghanistan and Iraq - Electronics, Surveillance, Dogs, and More by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781458132826
Publisher: Progressive Management Publication: May 19, 2011
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781458132826
Publisher: Progressive Management
Publication: May 19, 2011
Imprint: Smashwords Edition
Language: English

The threat of improvised explosive devices (IEDs) and roadside bombs to American and coalition troops in Afghanistan and Iraq, and America's efforts to target and defeat those explosives, is the subject of this comprehensive report, compiled from numerous official documents. Updated with the latest information from the Joint IED Defeat Organization (JIEDDO), it also includes the results of Congressional inquiries into jamming the IED assembly line by impeding the flow of ammonium nitrate in south and central Asia. A recent GAO report on the JIEDDO effort is also reproduced.

The JIEDDO solicitation of proposals for the development of innovative capabilities to defeat IEDs employed against dismounted U.S. or coalition forces anywhere in the world, but especially in Afghanistan is included. The military is looking for advances in the dismounted detection of buried IEDs and unmanned ground vehicles for dismount support. Buried IEDs are emplaced on or under the ground to be detonated in the proximity of Coalition Forces or other passers-by. IEDs are used on roadways, paths and choke points where intended victims are likely to walk. Devices are frequently emplaced in or near features (e.g. washouts, culverts, gates and bridges) that conceal their signatures and channel traffic over them. Components common to an IED are a switch, an initiator, a power source, and the main charge with container. The main charge is typically a homemade, fertilizer-based, bulk explosive in a plastic or fabric container.
The most common switches for buried IEDs are victim operated pressure switches and command wires. Pressure switches close a contact when compressed by a foot or wheel. They are emplaced under light overburden near the main charge. The modular design of IEDs enables detection strategies that address any of the components or the wires that connect them. Common pressure switches are fabricated from lightweight conductive components that are held apart by non-conductive flexible or collapsible spacers. Common conductors are nails, foil and wire. Metal content is deliberately minimized and batteries may be buried deeply or offset from the anticipated path of the victim. Command wires lead from a remote firing point to the main charge. The wire will be hidden from view and may be buried.

IEDs are the enemy's fires system - their artillery. In Iraq and Afghanistan, the enemy delivers these fires through networks that for centuries have formed the sinews of commerce for tribes and factions. IED attacks provide the enemy with a cheap, stand-off, precision targeting system that often provides attackers with complete anonymity. Coverage of IEDs and the JIEDDO includes: JIEDDO Annual Reports (including the newest for the Fiscal Year 2010), Acronyms and Terms, Glossary, DoD Directives, Urgent Needs and Readiness Levels, Technology Readiness Levels, Training for Forensics and Crime Scene Investigation to Battle IEDs, biographies of key officials in the JIEDDO, History of JIEDDO, The Threat, Organizational Structure, Organization Chart, Attacking the Network, Counter-IED Operations Integration Center (COIC), Keyhole, Information Operations, Intelligence, Surveillance, and Recon (ISR), Warrior Alpha, WTI, Constant Hawk, Technology Insertion Process, Identity InstaCheck, Palantir, Data Tracker, Doing Business with JIEDDO, Defeat the Device: Ahura, Lapeer and Terrapin, Husky Mounted Detection System, Counter Radio-controlled Electronic Warfare (CREW), DUKE, Chameleon, Guardian, Vehicle Optics Sensor System (VOSS), Route Clearance Teams (RCT), Route Clearance Blowers, MARCBot/Xbot, Healy Beacon, Rhino II and III, Combat Tracker Dogs, Training the Force, JTCOIC, Tactical Site Exploitation. GAO Report on Warfighter Support: Actions Needed to Improve Visibility and Coordination of DOD's Counter-Improvised Explosive Device Efforts.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The threat of improvised explosive devices (IEDs) and roadside bombs to American and coalition troops in Afghanistan and Iraq, and America's efforts to target and defeat those explosives, is the subject of this comprehensive report, compiled from numerous official documents. Updated with the latest information from the Joint IED Defeat Organization (JIEDDO), it also includes the results of Congressional inquiries into jamming the IED assembly line by impeding the flow of ammonium nitrate in south and central Asia. A recent GAO report on the JIEDDO effort is also reproduced.

The JIEDDO solicitation of proposals for the development of innovative capabilities to defeat IEDs employed against dismounted U.S. or coalition forces anywhere in the world, but especially in Afghanistan is included. The military is looking for advances in the dismounted detection of buried IEDs and unmanned ground vehicles for dismount support. Buried IEDs are emplaced on or under the ground to be detonated in the proximity of Coalition Forces or other passers-by. IEDs are used on roadways, paths and choke points where intended victims are likely to walk. Devices are frequently emplaced in or near features (e.g. washouts, culverts, gates and bridges) that conceal their signatures and channel traffic over them. Components common to an IED are a switch, an initiator, a power source, and the main charge with container. The main charge is typically a homemade, fertilizer-based, bulk explosive in a plastic or fabric container.
The most common switches for buried IEDs are victim operated pressure switches and command wires. Pressure switches close a contact when compressed by a foot or wheel. They are emplaced under light overburden near the main charge. The modular design of IEDs enables detection strategies that address any of the components or the wires that connect them. Common pressure switches are fabricated from lightweight conductive components that are held apart by non-conductive flexible or collapsible spacers. Common conductors are nails, foil and wire. Metal content is deliberately minimized and batteries may be buried deeply or offset from the anticipated path of the victim. Command wires lead from a remote firing point to the main charge. The wire will be hidden from view and may be buried.

IEDs are the enemy's fires system - their artillery. In Iraq and Afghanistan, the enemy delivers these fires through networks that for centuries have formed the sinews of commerce for tribes and factions. IED attacks provide the enemy with a cheap, stand-off, precision targeting system that often provides attackers with complete anonymity. Coverage of IEDs and the JIEDDO includes: JIEDDO Annual Reports (including the newest for the Fiscal Year 2010), Acronyms and Terms, Glossary, DoD Directives, Urgent Needs and Readiness Levels, Technology Readiness Levels, Training for Forensics and Crime Scene Investigation to Battle IEDs, biographies of key officials in the JIEDDO, History of JIEDDO, The Threat, Organizational Structure, Organization Chart, Attacking the Network, Counter-IED Operations Integration Center (COIC), Keyhole, Information Operations, Intelligence, Surveillance, and Recon (ISR), Warrior Alpha, WTI, Constant Hawk, Technology Insertion Process, Identity InstaCheck, Palantir, Data Tracker, Doing Business with JIEDDO, Defeat the Device: Ahura, Lapeer and Terrapin, Husky Mounted Detection System, Counter Radio-controlled Electronic Warfare (CREW), DUKE, Chameleon, Guardian, Vehicle Optics Sensor System (VOSS), Route Clearance Teams (RCT), Route Clearance Blowers, MARCBot/Xbot, Healy Beacon, Rhino II and III, Combat Tracker Dogs, Training the Force, JTCOIC, Tactical Site Exploitation. GAO Report on Warfighter Support: Actions Needed to Improve Visibility and Coordination of DOD's Counter-Improvised Explosive Device Efforts.

More books from Progressive Management

Cover of the book 2012 Smart Grid System Report to Congress: Smart Electric Meters, Renewables Integration, Electric Cars and Vehicles, Transmission Automation, Grants and Programs, Cyber Security, Energy Efficiency by Progressive Management
Cover of the book Civil War Logistics: Effects of Logistics on Pea Ridge Campaign - Overall American Civil War Sustainment, Federal and Confederate Leaders, Battle in the Southwest Without Railroads or Navigable Water by Progressive Management
Cover of the book Iwo Jima and the Bonin Islands in U.S.: Japan Relations: American Strategy, Japanese Territory, and the Islanders In-between - World War II, Ogasawara, Kazan, Shogun, Chichi Jima Life, Marcus Island by Progressive Management
Cover of the book Challengers from the Sidelines: Understanding America's Violent Far-Right - Aryan Nation, Timothy McVeigh, Oklahoma City Bombing, KKK, Racism, White Supremacy, Neo-Nazi, Skinheads, Christian Identity by Progressive Management
Cover of the book Death Spiral: Luftwaffe Airlift Training, Operation Stosser, and Lessons for Modern U.S. Air Force - Highlighting Perils of Cutbacks in Aircraft Training and Proficiency Compared to C-17 Pilot Force by Progressive Management
Cover of the book The Rise of China in Asia: Security Implications - Senkaku Islands, Taiwan, North Korea on the Brink, Chinese Threat to Neighbors, India's Response to China, South China Sea by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Campaigning (Marine Air-Ground Task Force MAGTF) MCDP 1-2 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Nanoscience and Nanotechnology: Environmental, Health, and Safety Research Strategy, Human and Environmental Exposure Assessment, Innovative Medical Research at the Molecular Scale by Progressive Management
Cover of the book 2014 President Barack Obama's Speech to the United Nations about the Islamic State (IS) and America's War Against ISIS / ISIL Terrorism, Ukraine and Russia, Israel and Palestine, Ebola Outbreak by Progressive Management
Cover of the book Will the Bomber Always Get Through? The Air Force and its Reliance on Technology: Norden Bombsight Development, Nuclear Weapons, Vietnam, Success of Stealth, The Future by Progressive Management
Cover of the book 20th Century NASA Space History: Shuttle / Mir Phase 1 Program Joint Report - Space Shuttle Integration with Russian Mir Space Station, Cargo Delivery, Joint Operations, Safety, Crew Training by Progressive Management
Cover of the book The Defeat of the 7th Cavalry: Impact on the Nation - Custer's Little Bighorn Loss in the 1876 Indian Campaign, Early Indian Policy, Post Civil War Focus, Effect of the Massacre on the Army, Politics by Progressive Management
Cover of the book Twenty-First-Century Strategy: An Introduction to Modern National Security Processes and Problems - Nuclear Strategy, Terrorism, WMD, Asymmetrical Warfare, Insurgency Warfare by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - Democratic Governance and The Rule of Law: Lessons From Colombia by Progressive Management
Cover of the book Sri Lanka in Perspective: Orientation Guide and Tamil Cultural Orientation: Geography, History, Economy, Security, LTTE, Islamist Violence, Colombo/Sri Jayawardenepura Kotte, Negombo, Kandy, Moors by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy