Counter IED Smartbook – Download as PDF File .pdf), Text File .txt) or read online. COUNTER Improvised Explosive Device. SMART BOOK. X TABLE OF CONTENTS 1. Types of IED’s Vehicle born Radio + Timer Command + Victim operated. C Improvised Explosive Device SMART BOOK Preface Tab AIED Attack Terminology . .2 Counter IED Principles Improvised Explosive.
|Published (Last):||9 June 2011|
|PDF File Size:||12.43 Mb|
|ePub File Size:||8.89 Mb|
|Price:||Free* [*Free Regsitration Required]|
The result of their 2—year long research is a Final Study with five Annexed Explosive Weapons Studies, a Terminology paper and a Simulator software tool. This helps to disrupt the operational IED chain.
This includes other media organisations. What links here Related changes Special pages Printable version Permanent link.
Leaks News About Partners. Retrieved from ” https: The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. On 6th February, the launching day of the study, a group of panellists came to the Maison de la Paix in Geneva to debate key findings arising from the research and take questions from the floor.
It also provides an introduction to the types of IEDs, the enemy’s tactics for each, and counter techniques. The contribution of a new partner to the joint project is always a great news.
Any questions about this document’s veracity are noted. It focuses on several areas of concern to the Alliance, including improving coordination and cooperation with the European Union and between Alliance members, developing and investing in equipment designed to reduce the risk of and damage caused by IEDs, and ensuring that troops in the field receive training for an IED environment.
Copy this address into your Tor browser. In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure.
Understanding the various threat networks at the tactical to strategic levels is vital to success in current and future operations where battle lines are no longer linear. With the aim of reducing the risks posed by IEDs, the Alliance helps members and partners in developing their own C-IED capabilities, with a particular emphasis on education and training, doctrine development and improving counter-measure technologies.
Even those who mean well often do not have the experience or expertise to advise properly. If you are a high-risk source and cohnter computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
You can only access this submissions system through Tor. Main Page Country index Follow us. The adaptability of IEDs to almost any situation makes them difficult to detect and stop, which is why NATO members and partners are using several methods to increase counter IED capabilities.
Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. The formal signing and ie raising ceremony was a dignified recognition of the significant effort over the past two years to reach this s,artbook.
See our Tor tab for more information. Watch the event in its entirety here: Was first publicly revealed by WikiLeaks working with our source. NATO also trains its troops on how to interact with civilians during deployment.
Counteer can be deployed everywhere: C-IED is not just about stopping or neutralising an IED once it is already in place, but also about identifying and disrupting the networks that create and initiate IEDs.
The Alliance focuses on reducing the frequency and severity of IED attacks, while also targeting the networks that facilitate them. Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
Countering Improvised Explosive Devices. If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help you.
Iraq Counter IED Smart Book – WikiLeaks
See here for a detailed explanation of the information on this page. To get more information about the CoE Courses please click cunter. IEDs can be hidden anywhere: The summary is approved by the editorial board. They target soldiers and civilians alike. We also advise you to read our tips for sources before submitting.
Submit documents to WikiLeaks
The C-IED Action Plan is built around several different areas, including information-sharing, closer cooperation with other international organizations and law enforcement agencies, specialized training for troops deployed ued areas where IEDs are widely used and improving equipment used to detect IEDs and protect troops.
If you used flash media to store sensitive data, smartgook is important to destroy the media. This further enhances the character of this Centre of Excellence and its “holistic approach”: Is of political, diplomatic, ethical or historical significance.
In particular, you should try to stick to your normal routine and behaviour.