Counter IED Smartbook – Download as PDF File .pdf), Text File .txt) or read online. COUNTER Improvised Explosive Device. SMART BOOK. X TABLE OF CONTENTS 1. Types of IED’s Vehicle born Radio + Timer Command + Victim operated. C Improvised Explosive Device SMART BOOK Preface Tab AIED Attack Terminology . .2 Counter IED Principles Improvised Explosive.
|Published (Last):||7 June 2006|
|PDF File Size:||11.92 Mb|
|ePub File Size:||16.12 Mb|
|Price:||Free* [*Free Regsitration Required]|
Do not talk about your submission to others If you have any issues talk to WikiLeaks. If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. The result of their 2—year long research is a Final Study with five Annexed Explosive Weapons Studies, a Terminology paper and a Simulator software tool.
If you used flash media to store sensitive data, it is important to destroy the media. These links drive you to our main counterparts and media partners for further information. Donate to WikiLeaks Unless otherwise specified, the document described here: Was classified, confidential, censored or otherwise withheld from the public before release.
The Alliance focuses on reducing the frequency and severity of IED attacks, while also targeting the networks that facilitate them. Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us.
If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http: If you have any issues talk to WikiLeaks. Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.
IEDs are one of the main causes of casualties among troops and exact a heavy toll on local populations. Tips for Sources After Submitting. Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to.
The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. How to contact WikiLeaks? We also advise you to read our tips for sources before submitting.
The adaptability of IEDs to almost any situation makes them difficult to detect and stop, which is why NATO members and partners are using several methods to increase counter IED capabilities.
In particular, you should try to stick to your normal routine and behaviour. Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor.
In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media USB sticks, memory cards and SSD drives retain data even after a secure erasure. For example, the Emerging Security Challenges ESC Division has several science initiatives that focus on developing sensors to detect explosive before they can claim lives.
They can be deployed everywhere: Was first publicly revealed by WikiLeaks working with our source. We specialise in strategic global publishing and large archives.
Iraq Counter IED Smart Book – WikiLeaks
The research project was guided and advised by a group of 18 international experts — among them was Zsuzsanna Balogh PhD. An improvised explosive device IED smartbookk a type of unconventional explosive weapon that can take any form and be activated in a variety of ways.
The study and much more is available clicking here. See our Tor tab for more information. What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.
Watch the event in its entirety here: In our experience it is always possible to find a custom solution for even the most seemingly difficult situations. The Roadmap further notes that: It covers all areas of countering IEDs, from the strategic to the tactical. These different commands, agencies and divisions focus on training, developing technology designed to defeat IEDs, sharing information and bringing together non-NATO actors to disrupt the network before IEDs kill or injure troops and civilians.
It focuses on several areas of concern to the Alliance, including improving coordination and cooperation with the European Union and between Alliance members, developing and investing in equipment designed to reduce the risk of and damage caused by IEDs, and ensuring that troops in the field receive training for an IED environment.
If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help smadtbook.
Please review these basic guidelines.
Submit documents to WikiLeaks
If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat counger at: The formal signing and flag raising ceremony was a dignified recognition of the significant effort over the past two years to reach this point. The information provided by civilians who know the area can be instrumental in preventing IED smartook. Now, however, C-IED work is not just about detection and neutralization, but instead must also focus on addressing the networks behind the IEDs.
Views Page discuss View source. On smratbook February, the launching day of the study, a group of panellists came to the Maison de la Paix in Geneva to debate key findings arising from the research and take questions from the floor.