Counter IED Smartbook – Download as PDF File .pdf), Text File .txt) or read online. COUNTER Improvised Explosive Device. SMART BOOK. X TABLE OF CONTENTS 1. Types of IED’s Vehicle born Radio + Timer Command + Victim operated. C Improvised Explosive Device SMART BOOK Preface Tab AIED Attack Terminology . .2 Counter IED Principles Improvised Explosive.
|Published (Last):||21 May 2013|
|PDF File Size:||15.53 Mb|
|ePub File Size:||8.99 Mb|
|Price:||Free* [*Free Regsitration Required]|
Iraq Counter IED Smart Book – WikiLeaks
Education and Training Read More. If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. It also provides an introduction to the types of IEDs, the countfr tactics for each, and counter techniques.
Even those who mean well often do not have the experience or expertise to advise properly.
Submit documents to WikiLeaks
Our submission system works hard to preserve your anonymity, but we recommend you also take some conuter your own precautions. Remove traces of your submission If you are a high-risk samrtbook and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
We specialise in strategic global publishing and large archives. You can only access this submissions system through Tor. These different commands, agencies and divisions focus on training, developing technology designed to defeat IEDs, sharing information and bringing together non-NATO actors to disrupt the network before IEDs kill or injure troops and civilians.
If you are a high-risk source, avoid saying anything or doing anything cpunter submitting which might promote suspicion.
An improvised explosive device IED is a type of unconventional explosive weapon that can take any form and be activated in a variety of ways. Donate to WikiLeaks Unless otherwise specified, the document described here: The information provided by civilians who know the area can be instrumental in preventing IED attacks.
They target soldiers and civilians alike. Submit documents to WikiLeaks. If you do this and are a high-risk source you should make sure there are smartboook traces of the clean-up, since such traces themselves may draw suspicion. If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help you. See here for a detailed explanation of the information on this page.
Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, ier subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
Spain is taking smartbooj lead on testing various stand-off detection technologies, while Slovakia is focusing on activities, technologies and procedures for IED “Render-Safe” operations in line with an Explosive Ordnance Disposal initiative.
How to contact WikiLeaks? This includes other media organisations. The study and much more is available clicking here.
The Roadmap further notes that: Is of political, diplomatic, ethical or historical significance. In addition, many Governmental Organizations and Ieed Organizations found this problem so important that they built it into their program counteg work, carried out their research etc. If a legal action is brought against you as a result of your submission, there are organisations that may help you.
IEDs can be hidden anywhere: WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.
The Counter-IED Report is a specialist subscription-based publication, which serves as an information source to communicate the latest developments in the fight against the IED threat. In particular, you should try to stick to your normal routine and behaviour.
If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. Advanced users, if they wish, can also add a further layer of encryption to their submission using our public PGP key.
Any questions about this document’s veracity are noted.