Free Essay

Ied Information Paper

In:

Submitted By zerrarroyo
Words 876
Pages 4
INFORMATION PAPER

Staff Group Alpha
11 Feb 13

SUBJECT: Improvised Explosive Devices (IEDs) and Mines

1. Purpose: To provide information on Improvised Explosive Devices (IED’s) and Antipersonnel Mines; as well as impacts and preventive actions for Ground Troops in Combat.

2. Improvised Explosive Devices (IED) and Antipersonnel Mine Facts.

a. IED’s are “homemade” bombs and/or destructive devices used to destroy, incapacitate, harass, or distract. An antipersonnel IED that is victim-activated—one that explodes on contact by a person—is considered an antipersonnel mine.

b. IEDs come in many shapes and forms and can consist of almost any material, including agricultural and medical equipment. IEDs consist of a variety of components that include an initiator, switch, main charge, power source, and a container. IEDs may be surrounded by or packed with additional materials or “enhancements” such as nails, glass, or metal frag¬ments designed to increase the amount of shrapnel propelled by the explosion. Enhancements may also include other elements such as hazardous materials. An IED can be initiated by a variety of methods depending on the intended target.i c. IEDs can be carried or delivered in a vehicle; car¬ried, placed, or thrown by a person; delivered in a package; or concealed on the roadside.i There are three main types of IED’s/Mines.iii These include:

1. Package Improvised Explosive Device: Typically IEDs consisting of mortar and artillery projectiles as the explosive device.iii

2. Vehicle Born IED (VBIED): Vehicle borne IEDs (VBIEDs) are devices that use a vehicle as the package or container of the device.iii

3. Suicide Born IED: The bomber usually employs a command detonated high-explosive/fragmentary vest, belt, or clothing that is specifically modified to carry this material concealed.iii

d. IEDs are used by criminals, vandals, terrorists, suicide bombers, and insur¬gents. A typical IED terrorist cell consists of six to eight people, including a financier, bomb maker, emplacer, triggerman, spotter, and often a cameraman.

3. Unit Impact Facts:

a. IEDs have caused over 60% of American combat casualties in Iraq and 50% of combat casualties in Afghanistan. Antipersonnel mines, victim-activated IEDs, anti-vehicle mines, and mines of unspecified types, caused the most casualties in 2009, in total 2,548.ii

b. IEDs can have a strong psychological effect on its victims.iii Physical injuries include: 1. Overpressure damage to the lungs, ears, abdomen, and other pressure-sensitive organs.i

2. Fragmentation injuries caused by projectiles thrown by the blast – material from the bomb, shrapnel, or flying debris that penetrates the body and causes damage.i

3. Impact injuries caused when the blast throws a victim into another object, i.e. fractures, amputation, and trauma to the head and neck.i

4. Thermal injuries caused by burns to the skin, mouth, sinus, and lungs.i

c. IEDs undermine military operations and limit the progress of convoys or patrols, making them vulnerable to ambushes. An IED location can be covered by additional fire support or small arms fire to inflict more casualties on an already vulnerable opponent.iii

d. An IED attack may cause disrup¬tions in municipal services such as electricity, water, commu¬nications, and transportation, which may continue for days to weeks after the attack.i

4. Prevention Facts:

a. Total protection against IEDs is virtually impossible due to their unconventional and unpredictable nature. The number one way to protect from an IED attack is to be alert to the sur-roundings. Advanced technologies help authorities detect possible dangers, but an even more effective tool is to encourage individuals to be alert for, and to report, anything that is out of the ordinary in their daily routine.i

b. Another effective way to counter the threat posed by IEDs is by improving physical protection measures. The Mine-Resistant Ambush Protected, MRAP, family of vehicles is designed to protect against IED and mines.i Electronic jamming devices include the IED
Countermeasures Equipment and the Warlock, both of which use low-power radio frequency energy to block the signals of radio controlled explosives detonators, such as cell phones, satellite phones, and long-range cordless telephones.

c. The general strategy for countering IEDs has three main components: attack/defeat the IED system/network, defeat the device, and training/education.iii

End Notes National Academy of Engineering and the National Research Council of the National Academies in cooperation with the U.S. Department of Homeland Security. Online at accessed on February 4, 2013.

“Victim-activated IED Casualties,” Landmine & Cluster Munition Monitor Fact Sheet. Online at < http://www.the-monitor.org/index.php/LM/Our-Research-Products/Factsheets> accessed on February 4, 2013.

Renata Giannini, “Afghanistan Improvised Explosive Devices (IED),”in Civil-Military Fusion Centre. Online at accessed on February 4, 2013.

Clay Wilson, “Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures,” in CRS Report for Congress. Online at accessed on February 4, 2013.

DOD Personnel and Military Casualty Statistics, Defense Manpower Data Center, Casualty
Summary by Reason, October 7, 2001 through August 18, 2007, available at
[http://siadapp.dmdc.osd.mil/personnel/CASUALTY/gwot_reason.pdf].

Sgt. Stephen D’Alessio, 2nd Marine Division, Marines schooled in new bomb protection, July
7, 2005, available at [http://www.marines.mil/marinelink/mcn2000.nsf/0/b89628064c45144e
85257056003871f1?OpenDocument].

Similar Documents

Premium Essay

Ceng Ebook

...The eBook How becoming registered as a Chartered Engineer (CEng) could advance your career n n The benefits of CEng F  ind out how to become professionally registered and the requirements for becoming a CEng n Student?  Discover what you can do now to help your future career n n C  hartered Engineers share their experiences and explain how professional registration has helped their careers FAQs and useful links CEng eBook page 2 www.engc.org.uk Contents The benefits of CEng 03 Serious about your career in engineering? Gain professional recognition 04 Eligibility 05 How to become professionally registered 06 UK-SPEC competence and commitment requirements for CEng registration 07 Student? 08 CEng case studies 09 FAQs 13 Useful weblinks 14 CEng eBook page 3 www.engc.org.uk Becoming a Chartered Engineer (CEng) could advance your career Professional registration as a CEng not only recognises your proven commitment, skills and experience as an engineer, but also identifies to employers that you have the competence, expertise and work ethic that they value. You will: n Gain a professional title that carries considerable prestige n Enhance your employability n tand S out from the crowd as a significant player in the world of engineering and technology n Enjoy greater influence within the profession n Earn...

Words: 4182 - Pages: 17

Premium Essay

Nts Threats Case Study

...CHAPTER – II : AN ANALYSIS OF BLUE HELMETS PREPAREDNESS ON NTS THREATS Operationalizing the Paper 15. Research Variables. a. Case. Blue Helmets. b. Independent Variable. Lack of preparedness on NTS Threats. c. Dependent Variable. Ability to operate effectively in UNPKO. 16. Research Type. Causal. Defining the Key Concepts 17. This research deals with few intangible terms with some testable definitions. Those key concepts are defined in subsequent paragraphs: 18. Ability to Operate Effectively in UNPKO. a. An Overview. The ability to operate effectively in context of UNPKO implies to perform the primary task which is “to provide a secure environment so that other elements of the peace process can be implemented, including the...

Words: 797 - Pages: 4

Free Essay

Individual Organizational Transformation Q&a

...Individual Organizational Transformation Q&A In this paper, the writer will identify and characterize the roles of incentives, training, and education in promoting innovation in his organization according to the level of achievements within the organization. In the author’s organization, everyone has to be held accountable for their own actions and responsible for their own success and failures. However, because the leadership is so strong and thought of every aspect of the organization, following the simple steps to running a successful organization is a proven system that anyone can do. With that being said, if an individual is great at playing follow the leader, than there will be no reason for a great deal of innovation because all that needs to be done, has been done. The one innovation that is promoted rather well in the author’s organization is the transforming of a civilian into a modern day warrior. This is something that leaders teach, but each individual has to find it in them to know what it takes to motivate them to implement the changes that need to be made from within the person. The leaders, which are the brains of this amazing organization, the commissioned officers and staff non-commissioned officers do most of the focusing on the creation of the innovation in this writer’s organization. The leaders that have been in the trenches and made a substantial amount of success within the organization focus more on managing and sustaining the innovation...

Words: 783 - Pages: 4

Free Essay

Spanish Period

...more specifically to: Technology Machine Tool Gadget Improvised explosive device (IED) Appliance (disambiguation), a device for a particular task A component of personal computer hardware Peripheral, any device attached to a computer that expands its functionality Electronic component Nuclear device Device file, an interface of a device driver Music Device (heavy metal band) Device (Device album) Device (pop rock band) Device (Eon album), 2006 Here’s a complete history of just how storage memory devices for computers have evolved ever since their inception: Paper data storage Believe it or not, paper has been [and still is] a form of electronic data storage as early as 1725 when Basile Bouchon used punched paper rolls to store instructions for textile looms. This technology was later developed into the wildly successful Jacquard loom. Later during the 19th Century, telegrams could be prerecorded on punched tape and rapidly transmitted using Alexander Bain's automatic telegraph in 1846. In the late 1880s Herman Hollerith invented punched cards which were used in the 1890 census and the completed results were finished months ahead of schedule and far under budget. This technology was widely used for tabulating votes and grading standardized tests. Barcodes made it possible for any object that was to be sold or transported to have some computer readable information securely attached to it. Banks still use magnetic ink on checks that are read using MICR...

Words: 1135 - Pages: 5

Free Essay

Essays on Economy

...Paper-I Principles of Geography Physical Geography i) Geomorphology : Factors controlling landform development; endogenetic and exogenetic forces; Origin and evolution of the earth’s crust; Fundamentals of geomagnetism; Physical conditions of the earth’s interior; Geosynclines; Continental drift; Isostasy; Plate tectonics; Recent views on mountain building; Vulcanicity; Earthquakes and Tsunamis; Concepts of geomorphic cycles and Landscape development ; Denudation chronology; Channel morphology; Erosion surfaces; Slope development ;Appl ied Geomorphology: Geohydrology, economic geology and environment ii) Climatology : Temperature and pressure belts of the world; Heat budget of the earth; Atmospheric circulation; atmospheric stability and instability. Planetary and local winds; Monsoons and jet streams; Air masses and fronto genesis, Temperate and tropical cyclones; Types and distribution of precipitation; Weather and Climate; Koppen’s, Thornthwaite’s and Trewartha’s classification of world climates; Hydrological cycle; Global climatic change and role and response of man in climatic changes, Applied climatology and Urban climate. iii) Oceanography : Bottom topography of the Atlantic, Indian and Pacific Oceans; Temperature and salinity of the oceans; Heat and salt budgets, Ocean deposits; Waves, currents and tides; Marine resources: biotic, mineral and energy resources; Coral reefs, coral bleaching; sealevel changes; law of the sea and marine pollution. iv) Biogeography :...

Words: 1084 - Pages: 5

Premium Essay

How Seabees Changed My Life

...I joined the Navy just out of high school in 2007 where I was trained and became part of a small community known as the U.S. Navy Seabees. Little did I know less than two years into my Navy career, on January 2nd, 2009, I would be faced with the realities of war and forced to make a decision that has forever changed my life. No amount of military training or mental fortitude can prepare a person for the realities of war and the choice I had to make. You hear about it on the news, read it in the papers, listen to veterans and their war stories, but you will never get the feelings so many veterans and I have experienced unless you have been to war and forced to make such drastic, split second judgement calls. My six month deployment started...

Words: 1166 - Pages: 5

Free Essay

Internet of Things

...behind a future Internet that fully supports the “things”, as well as how the “things” can help in the design of a more synergistic future Internet. Keywords–Internet of things, smart things, future Internet, software-defined networking, service-centrism, informationcentrism, ID/Loc splitting, security, privacy, trust. I. INTRODUCTION The Internet of things (IoT) refers to uniquely addressable objects and their virtual representations in an Internet-like structure [18][19][20]. We can say that it is an extension of Internet with uniquely addressable objects becoming a part of existing Internet. The objects forming the IoT will have distinct characteristics about them. They may hold selfidentifying information; they may even transmit the processed information or anything that may be considered important with respect to the object with which they are associated. There is a lot of pervasive presence in the human environment of things or objects, such as radio-frequency identification (RFID) tags, sensors, actuators, mobile phones, smart embedded devices, etc. – which, through unique addressing schemes, are able to...

Words: 4683 - Pages: 19

Free Essay

Hazmat

...Chapter 23 Haz Mat Study Guide Hazard Types TRACEM: Thermal, Radiological, Asphyxiation, Chemical, Etiological/Biological, Mechanical. Thermal Hazards Elevated Temperature Materials: In a liquid phase at or above 212'F, Intentionally heated heated at or above its liquid phase flash point of 100'F, In a solid phase at or above 464'F.  Low Temperatures: Liquefied gases and cryogenic liquids (convert to liquids at or below -130'F) can freeze materials on contact. Radiological Hazards Types of Ionizing Radiation: Alpha (can be stopped by paper or skin), Beta (After traveling 20 feet, can be stopped by a layer of clothing or 0.08 inches of aluminum), Gamma (Can be stopped by 2 inches of lead, 2 feet of concrete, or several feet of earth), Neutron (More penetrating than gamma).  Types of Contamination: External, Internal, and Environmental. Asphyxiation Hazards Asphyxiants: Prevent the body from absorbing oxygen.  Simple Asphyxiants: Displace oxygen.  Chemical Asphyxiants: Prohibit the body from processing available oxygen. Chemical Hazards Poisons/Toxins: Cause injury at the site where they contact the body, Neurotoxins produce systemic effects in the nervous system.  Corrosives: Acids (pH less than 7), Bases (pH more than 8), can react violently when mixed with water.  Irritants: Cause temporary but sometimes sever inflammation.  Convulsants: Cause involuntary muscle contraction.  Carcinogens: PVC, Benzene, Asbestos, Arsenic, Nickel...

Words: 1455 - Pages: 6

Free Essay

Stereotypes of a Fantasy Novel Protagonist

...Ada Deniz Tan Dr. Aslı Değirmenci IED 134 20 May 2015 Stereotypes of a Fantasy Novel Protagonist Fantasy novels are very popular between not only children and teenagers, but also people of all ages. There are so many fan of the fantasy novels, films and television series of them are produced and almost each other was in vogue usually at young population when they are released. As fantasy novels have gained a great population and so many example of them released in time, they have become obviously an extended part of world literature. Moreover, they have so many genres, subgenres, rules, aims and stereotypes like other types of literary works. In fantasy novels, it can be said that elements and genres are usually similar, however, characteristics of protagonists, which means main character, and other characters are sometime strictly differs between themselves. I read the book The Magicians by Lev Grossman, the first book of Magicians trilogy, one of New York Times Bestseller books, which is published in 2009. In this research paper, my aim is to analyze stereotypes of a fantasy novel protagonist with analyzing the characteristics of Quentin Coldwater from the novel The Magicians. Lev Grossman was born in 26 July 1969, in America. He graduated from Literature Department of Harvard University in 1991 and has worked as a journalist and a cult critic for Time Magazine, The New York Times, The Wall Street Journal, Entertainment Weekly and so many other newspapers...

Words: 2081 - Pages: 9

Free Essay

Security Stability in Somalia

...Security Stability in Somalia Since their indirect elections on September 12, 2012, and despite the fragile regional security situation of the Horn of Africa, Somalia has continued to experience significant and sustained progress towards security stability in their country. In order for Somalia to succeed as viable and trusted state, the United States (US) as well as the International Community should not allow another security stability failure in Somalia. The US and the International Community must focus on helping to sustain Somalia’s efforts against the fight of the Al-Shabaab terrorist organization, help to counter piracy, and to help build capacity and capability in the Somali government and its institutions. While at the same time provide the support to attend Somali basic humanitarian aid needs and financial assistance. First, one of the reasons why the general security conditions in Somalia keep on improving is principally thanks to the sustained operations carried out against the Jihadist organization Al-Shabaab by the Somali national security forces in conjunction with the African Union Mission in Somalia (AMISOM), and with other associates and allied militias of the government. These operations are currently successful in managing to achieve the retreat of the Islamist radicals from some of the main cities of the south and center of the country. The sustainment of these operations will deteriorate Al-Shabaab operations capacity as a military force, promote the desertion...

Words: 2676 - Pages: 11

Premium Essay

Term Paper on Oil

...[pic] Term Paper On “Price behavior on Edible Oil” Submitted to:- Prof. Dr. Baqui Khalily (Course Teacher) Micro /Managerial Economics United International University Submitted by:- ID: - 112113042 SEC:- A Submission Date: -April 28, 2011 ACKNOWLEDGEMENT Firstly, all praise to almightily Allah who gives me strength to complete this report, I would like to pay my gratitude and respect to some important person for their own co-operation. Then I am very grateful to our course teacher, who gave me this opportunity for preparing this report of “Price Behavior on Edible Oil” Beside, that, he guided us to prepare this report in an organized manner. I am also very pleased to him for giving clear concept about this topic. Secondly I want to say that I am doing great deal of hard work for preparing this report. I have collected information from different shop and from different types of journal for this report. Finally, I am indebted to them who have directly and indirectly assisted me in conducting the study. I again want to give my cordial love and respect the honorable course teacher because from him I have learned a great deal of things related it this report’s hope that this report has been prepared for the fulfillment of the course requirement. LETTER OF TRANSMITTAL April 28, 2011 Prof. Dr. Baqui Khalily (Course Teacher) Micro/ managerial Economics ...

Words: 2370 - Pages: 10

Premium Essay

Morality of Warfare: Case Study Drone

...20 July 2014 The Morality of Warfare: Case Study; Drone Warfare Advancements in warfare technology and weaponry have been the defining factors in battle since the dawn of civilization. The one with the bigger gun usually wins. This is a fact that hasn’t changed much since the beginnings of warfare and holds true today and in today’s world Drones have become the next warfare advantage. Along with any advancement in warfare weaponry comes a very heated and controversial discussion about its actual real-world utilization. Many argue that the use of Drones in war is unmoral and unethical. This paper aims to take a closer look at both sides of this argument. First, I will establish and explain the moral arguments against the use of drone warfare, then the second half of the article will be in response to such claims and give the moral reasons behind the pro-drone argument. First and foremost of the anti-drone discussion is the fact that Drones are seen to be fundamentally in contradiction of international law: 
 Amnesty International stated that that “deliberate killings by drones […] very likely violate the prohibition of arbitrary deprivation of life and may constitute extrajudicial executions.” The UN suggested focused effort to maintain and preserve the security of international laws in its entirety, in response to the use of drones. This incorporates, obviously, international human rights and humanitarian standards that seem to be thrown out the window when dealing with...

Words: 3714 - Pages: 15

Premium Essay

Mobile Computing and Social Networks Term Paper

...shows that about three quarters of U.S. adults are online, with about 66% of them using social networking sites” (Brenner, 2012). Specific methods for how IT departments and mobile app developers and designers can decide on supporting different mobile platforms like the Apple iPhone, Apple iPad, Windows Phone, or Android supported smartphones and tablets will be discussed. Other topics addressed in this paper include the issue of “high availability” for mobile app users’ Based on these considerations organizations and businesses are nowadays focusing on the implementation of these applications, while replacing their desktop platforms to the mobile devices (Shih, et.al. n.d). “On the other hand, it is also observed that, these applications may also enhance various risks and vulnerabilities, regarding the security and confidentiality of customer’s and organizational information. In this scenario, it is necessary for the organizations to introduce and implement effective strategies in order to ensure the integrity of their organizational operations” (Kalil, 2009). Lastly this paper incorporates the brief discussion on the efficiency and effectiveness of mobile based applications in...

Words: 4537 - Pages: 19

Free Essay

Empirical Research

...Under this law, children who are not immunized, are denied childcare not unless their parents do declare philosophical, religious, medical or personal objections (Medew 2015). Evidently, in the New South Wales state, only about 50% of citizens receive vaccines for their children. Evidently this is the lowest level in Australia and is compared to South Sudan (McCutcheon, 2015).There are various researches that have come up to explain how conspiracy, paranormal, and spirituality are related to anti-vaccination, but it is clear that none of them was bold enough to explain why. For instance, in line with conspiracy theory, Kata (2010) states of how 75% of the websites she researched on made claims of cover up, where regulatory bodies had information about vaccines they were from the public. Orac (2014) states of how conspiracy in the Muslim world made people into believing polio vaccines were evil plans by the Western nations to sterilize Muslim youth and reduce them in number. In the same sense, 50% of websites stated of how the government purportedly protects vaccine manufacturers and doctors from possible harms caused by vaccines (Tuteur, 2011). Other researchers have tried to elaborate on how spirituality and paranormal is in essence in line with anti-vaccination campaigns by creating perceptions of reality and empowerment unlike conspiracy (Daum&Weibe 2010). Despite a wealth of research on the way anti-vaccination is predicted by paranormal, spiritualism and conspiracy, none...

Words: 2920 - Pages: 12

Premium Essay

Compliance of X.509 Certification Standard in the Implementation of Third Party Certification in Malaysian E-Commerce Websites

...Compliance of X.509 Certification Standard in the Implementation of Third Party Certification in Malaysian E-Commerce Websites Compliance of X.509 Certification Standard in the Implementation of Third Party Certification in Malaysian E-Commerce Websites Syahida Hassan Mohd Khairudin Kasiran Graduate Department of Information Technology Universiti Utara Malaysia, Sintok Kedah, Malaysia syahida@uum.edu.my mkasiran@uum.edu.my Abstract The concept of trusted services forms a key issue for any kind of electronic services. Third Party Certification (TPC) endorsement has been used as one of the methods to instill consumers’ trust. Creating initial trust through implementation of TPC is very important because the consumer has a tendency to trust brand names.. This paper looked closely at the implementation of the TPC in Malaysia which reveals that there are many problems related to the implementation of these seals. Problems like the awareness of merchants on the important of third party seals to their business, unverifiable endorsement, misleading link, unauthorized use of logos and no endorsement at all are still there in Malaysian environment. Based on this fact, the paper will focus on how far the implementation of third TPC is complied with X.509 certification standard. The output of this study can give an important background on the current implementation of TPC and be used as a basis of initial evaluation for business opportunity as a service provider for this kind of certification...

Words: 4718 - Pages: 19