Counter IED Smartbook – Download as PDF File .pdf), Text File .txt) or read online. COUNTER Improvised Explosive Device. SMART BOOK. X TABLE OF CONTENTS 1. Types of IED’s Vehicle born Radio + Timer Command + Victim operated. C Improvised Explosive Device SMART BOOK Preface Tab AIED Attack Terminology . .2 Counter IED Principles Improvised Explosive.
|Published (Last):||3 July 2007|
|PDF File Size:||17.92 Mb|
|ePub File Size:||2.22 Mb|
|Price:||Free* [*Free Regsitration Required]|
They target soldiers and civilians alike. We also advise you to read our tips for sources before submitting. Main Page Country index Follow us.
Please review these basic guidelines. Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. The summary is approved by the editorial board. Trident Juncture 18 Read More.
The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. Even those ird mean well often do not have the experience or expertise to advise properly. What links here Related changes Special pages Printable version Permanent link.
Motivated by its strategic goal to improve human security and equipped with subject expertise in explosive hazards, in January the Centre established coynter research project to characterise explosive weapons. Spain is taking the lead on testing various stand-off detection technologies, while Slovakia is focusing on activities, technologies and procedures for IED “Render-Safe” operations in line with an Explosive Ordnance Disposal initiative.
It also provides an introduction to the types of IEDs, the enemy’s tactics for each, and counter techniques. We are the global experts in source protection — it is a complex field. You smratbook only access this submissions system through Tor. With the aim of reducing the risks posed by IEDs, the Alliance helps members and partners in developing their own C-IED capabilities, with a particular emphasis on education and training, doctrine development and improving counter-measure technologies.
If a legal action is brought against you as a result of your submission, there are organisations that may help you.
Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to. If you face legal action If a legal action is brought against you as a result of countrr submission, there are organisations that may help you.
If you have any issues talk to WikiLeaks. It covers all areas of countering IEDs, from the strategic to the tactical.
The adaptability of IEDs to almost any situation makes smqrtbook difficult to detect and stop, which is why NATO members and partners are using several methods to increase counter IED capabilities. If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. Now, however, C-IED work is not just about detection and neutralization, but instead must also focus on addressing the networks behind the IEDs.
Submit documents to WikiLeaks
On 6th February, the launching day of the study, a group of panellists came to id Maison de la Paix in Geneva to debate key findings arising from the research and take questions from the floor. This further enhances the character of this Centre of Excellence and its “holistic approach”: The information provided by civilians who know the area can be instrumental in preventing IED attacks.
These links drive smarhbook to our main counterparts and media partners for further information. If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.
Iraq Counter IED Smart Book – WikiLeaks
See here for a detailed explanation of the information on this page. If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. For example, the Emerging Security Challenges ESC Division has several science initiatives that focus on developing sensors to detect explosive before they can claim lives.
Advanced users, if they wish, can also add a further layer of encryption to their submission using our public PGP key. It focuses on several areas of concern to the Alliance, including improving coordination and cooperation with the European Union and between Alliance members, developing and investing in equipment designed to reduce the risk of and damage caused by IEDs, and ensuring that troops in the field receive training for an IED environment.
The following is the address of our secure site where you can anonymously upload your documents iev WikiLeaks editors. WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. In particular, hard drives retain data after formatting which may smartboook visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure.
The Alliance focuses on reducing the frequency and severity of IED attacks, while also targeting the networks that facilitate them.