Counter IED Smartbook – Download as PDF File .pdf), Text File .txt) or read online. COUNTER Improvised Explosive Device. SMART BOOK. X TABLE OF CONTENTS 1. Types of IED’s Vehicle born Radio + Timer Command + Victim operated. C Improvised Explosive Device SMART BOOK Preface Tab AIED Attack Terminology . .2 Counter IED Principles Improvised Explosive.
|Published (Last):||9 December 2014|
|PDF File Size:||5.4 Mb|
|ePub File Size:||17.50 Mb|
|Price:||Free* [*Free Regsitration Required]|
Submit documents to WikiLeaks. We also advise smattbook to read our tips for sources before submitting. The aim of this research into explosive weapons characteristics and their immediate, destructive effects on humans and structures is to contribute to the ongoing discussions on explosive weapons in populated areas, intended to reduce harm to civilians. The success of countering IED activities requires wide info sharing and coordination among the acting organizations.
Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.
The adaptability of IEDs to almost any coynter makes them difficult to detect and stop, which is why NATO members and partners are using several methods to increase counter IED capabilities. Was classified, confidential, censored or otherwise withheld from the public before release. Main Page Country index Follow us.
Iraq Counter IED Smart Book – WikiLeaks
The summary is approved by the editorial board. Any questions about this document’s veracity are noted.
Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources.
If you cannot use Tor, or your submission is very large, or you have smartbokk requirements, WikiLeaks provides several alternative methods. Even those who mean well often do not have the experience or expertise to advise properly. C-IED is not amartbook about stopping or neutralising an IED once it is already in place, but also about identifying and disrupting the networks that create and counger IEDs.
If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.
Submit documents to WikiLeaks
It focuses on several areas of concern to the Alliance, including improving coordination and cooperation with the European Union and between Alliance members, developing and investing in equipment designed to reduce the risk of and damage caused by IEDs, and ensuring that troops in the field receive training for an IED environment.
In our experience it is always possible to find a custom solution for even the most seemingly difficult situations. Advanced users, if they wish, can also add a further layer of encryption to their submission using our public PGP key.
They can be detonated via cell phones or trip wires, among other methods. Now, however, C-IED work is not just about detection and neutralization, but instead must also focus on addressing the networks behind the IEDs. Understanding the various threat networks at the tactical to strategic levels is vital to success in current and future operations where battle lines are no longer linear.
As such, NATO would like to promote cooperation with these various agencies and organizations. Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor.
Please review these basic guidelines. You can find more details at https: In the past decade, NATO and its partner nations have been developing specific policies and guidelines for the protection of civilians in the planning and conduct of NATO-led operations and smartboo. If you used flash media to store sensitive data, it is important to smartboo the media. The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors.
These links drive you to our main counterparts and media partners for further information. Education and Training Read More. Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
We specialise in strategic global publishing and large archives. This includes other media organisations. Spain is taking the lead on testing various stand-off detection technologies, while Slovakia is focusing on activities, technologies and procedures for IED “Render-Safe” operations in line with an Explosive Ordnance Disposal initiative.
If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.
IEDs can be hidden anywhere: