DISPATCHES. Lessons Learned for Soldiers. Counter-Improvised Explosive Devices (C-IED) The Army Lessons Learned Centre. Vol 15 No 1 March 2010

Size: px
Start display at page:

Download "DISPATCHES. Lessons Learned for Soldiers. Counter-Improvised Explosive Devices (C-IED) The Army Lessons Learned Centre. Vol 15 No 1 March 2010"

Transcription

1 The Army Lessons Learned Centre Vol 15 No 1 March 2010 DISPATCHES Lessons Learned for Soldiers Counter-Improvised Explosive Devices (C-IED) DISPATCHES i

2 How to Contact The Army Lessons Learned Centre CFB Kingston (613) Extension xxxx CSN 271-xxxx Director ALLC Major SR Rankin 5117 SO Plans ALLC Major J.S. Bilodeau 4816 ALLC Coordinator Capt J.W. Hooyer 2890 ALLC Sergeant-Major MWO M.A. Brander 2890 Disclosure Statement Dispatches are targeted at disseminating information and increasing the knowledge of the soldiers and leaders across the Canadian Army and the Canadian Forces. The discussion is a snapshot of relatively current issues or procedures in a specific operating environment. Dispatch articles may not reflect doctrine, but articulate evolving ideas based on the recent operational experiences of our deployed forces. The information contained within this Dispatch is UNCLASSIFIED but sensitive in nature and distribution should be controlled. Distribution Some of the material in this document may be considered sensitive in nature and is not for general distribution. Recipients of this document should carefully consider the necessity or requirement to distribute this document outside official Canadian Forces Chains of Command or it s designated ABCA partners. If unsure of the distribution of this material, please contact the Army Lessons Learned Centre.

3 Director s Introduction Counter-Improvised Explosive Device In the conduct of counter-improvised explosive device (C-IED) operations, emphasis must be placed on the inextricable relationship that exists with regards to counter-insurgency (COIN) operations. IEDs are merely a sub-set of a number of kinetic forms of asymmetric kinetic attack used by insurgents. And, asymmetric kinetic attack is just one form or line of operations used in guerrilla warfare. Therefore, C-IED operations are a subset of COIN operations. It must be reinforced that these operations are not against IEDs, but rather against insurgents. Within this context, it should also be reinforced that, at least in the context of Afghanistan, that insurgents, especially at the tactical level are more likely generalists and the division between insurgents who specialize in IEDs must be waged against insurgents in general. It is a tactical battle against people not against devices. And, as such, the human decision by insurgents to use IEDs provides the opportunity to attack the enemy. CF C-IED TF COMD Colonel Omer H. Lavoie Since commencement of the Afghan mission, IEDs have been the number one concern of the Canadian Forces (CF). Learning from each IED incident continues to be the top priority in the Army. In support of troops preparing for deployment, the Army Lessons Learned Centre s (ALLC) reports are designed to provide situational awareness (SA), indicate potential changes to insurgent modus operandi and highlight CF C-IED activities. After years of experiencing a high IED threat environment it is time to record what has been learned. This C-IED Dispatch is a result of knowledge often acquired in the aftermath of studying very raw battlefield circumstances. I would like to think that this C-IED Dispatch is in honour of all those Canadians who gave up so much so that their brethren could learn how better to survive in a high IED threat environment. Director ALLC Major Stephen R. Rankin DISPATCHES i

4 Table of Contents PART 1: Introduction... 1 > IED Definitions... 1 > C-IED Lines of Operation... 2 > CF C-IED Framework... 2 > C-IED Activities... 2 PART 2: The Threat... 6 > IED Threat Triad... 6 > IED Threat Evolution... 7 > The Improvised Explosive Device... 7 > IED Indicators PART 3: Targeting IED Systems...11 > Concept for IED Targeting...11 > C-IED ISTAR Activities...11 > C-IED Targeting > Intelligence > Search and Site Exploitation PART 4: C-IED Drills > Top 12 C-IED Points to Consider > 5 and 20 Drills > Mounted Search > Searching while in Convoy > Vulnerable Point Search PART 5: Reaction to an IED Incident > The 5 C s > Securing and IED Incident Site > Recovery of Evidence PART 6: Conclusion References A. Land Force Doctrine Note 1-09: C-IED, dated 16 Jan 09 B. Land Force Counter Insurgency Operations, dated 13 Dec 08 C. CF C-IED TF Aide Memoire for Tactical Commanders, dated 1 Feb 09 D. Tactics School Attack the Network Brief, dated Jun 09 E. US CALL Newsletter Attack the Network, dated Apr 09 F. TRADOC/JIEDDO Battle Staff Operations in COIN, version 1.1 dated Jan 08 G. JIEDDO Wpns Tech Int (WTI) Improvised Explosive Device (IED) Lexicon, Sep 07 H. CF C-IED Tactics, Techniques and Procedures Handbook, B-GJ /FP-004 I. CF Joint Doctrine for C-IED B-GJ /FP-0XX, Draft as of Dec 09 J. CF C-IED within the Bde Gp, Draft as of Dec 09. DISPATCHES ii

5 Part 1 Introduction IEDs are tactical weapons that can have a strategic effect; they can cause high casualty rates and restrict the ability of friendly forces to manoeuvre at the tactical level. When combined with a proactive information operations campaign, IED use can have a disproportionate effect on the conduct of operations at the operational and strategic levels. IEDs can be employed to create a variety of battlefield effects such as denial, delay, shaping or destruction. They are a reality of asymmetric warfare that enables a numerically or technologically inferior force to harass and attrit otherwise significantly superior forces. The IED has rapidly become the weapon of choice for insurgents, terrorists and criminals. Keeping within the Afghanistan and COIN context, the term insurgent will be used throughout this Dispatch to describe all potential adversary and enemy. IED Definitions Improvised Explosive Device (IED). An IED is a device placed or fabricated in an improvised manner incorporating destructive, lethal, noxious, pyrotechnic or incendiary chemicals, designed to destroy, disfigure, distract or harass. IEDs may be composed of commercial or military explosives, homemade explosives, or military ordnance and ordnance components. IED System. An IED system comprises personnel, resources and activities and the linkages between them that are necessary to resource, plan, execute and exploit an IED event. Counter IED (C-IED). C-IED is a collective effort, at all levels, to defeat the IED system by attacking the network, defeating the device and preparing the force to reduce or eliminate the effects of all forms of IEDs for use against friendly forces and non-combatants. C-IED is not solely an engineer responsibility; it is an all-arms concern and fight, whereby everyone has a role, starting with the Commander. C-IED Lines of Operation. The CF C-IED strategy employs three complimentary and concurrent lines of operation (LOO). The three C-IED LOO are Attack the Network, Defeat the Device and Prepare the Force. The diagram below schematically represents the LOO and C-IED activities on a time scale of a typical IED event. Figure 1: C-IED LOO and Activities Related to an IED Event. DISPATCHES 1

6 Attack the Network (AtN). AtN focuses on proactive actions and activities that take the fight to the insurgent. Full success in this LOO will prevent an IED from being emplaced (ultimately by denying the supply of components, finance, leaders and recruits) and detonated. If, however, a detonation does occur, activity in the information operations domain will prevent the enemy from fully capitalizing on the event. Defeat the Device (DtD). DtD LOO involves all of the activities that occur once a device has been emplaced. Measures taken here have an immediate effect and are designed to directly save lives. DtD includes the identification of effective tactics techniques and procedures (TTP), protection of friendly forces and the development of technologies that detect, identify, classify, mark and disrupt an IED. Prepare the Force (PtF). PtF encompasses efforts, education, training, equipment and measures that ready the friendly force to conduct operations in an IED threat environment. CF C-IED Framework In order to ensure all C-IED LOO are synchronized, the established CF C-IED framework and centres of excellence (Fig 2 below) consider and rapidly adapt C-IED TTP and update the contemporary operating environment (COE) as it evolves. Figure 2: CF C-IED Framework C-IED Activities At the tactical level, activities related to C-IED have been grouped into seven categories. Three of the activities; predict, prevent and exploit, fall within the AtN LOO which proactively disrupts the IED system. These activities undermine the ability and will of the insurgent to construct and employ IEDs. AtN activities may include: deterrence, exploiting evidence recovered from IEDs, network and geographic profiling, counter-bomber targeting, law enforcement, persistent surveillance, interdicting the IED re-supply apparatus and information operations. The remaining four C-IED activities are: protect, detect, neutralize and mitigate, and they relate to the DtD LOO which enables units and personnel to maintain operations and determine and execute the appropriate response upon encountering a suspected IED. A brief explanation of each of the C-IED activities follows. DISPATCHES 2

7 Predict. Predict activities identify enemy threats in a timely manner to assist Commanders to take preventative, protective and mitigating measures more efficiently. Predicting the IED network s activities necessitates identification of patterns associated with the development and employment of IED threats. It includes the identification of insurgent command and control (C2) structures, critical resources and vulnerabilities. Prediction is linked directly to a wide variety of intelligence capabilities and information sources which may include; patrol reports, after action reports, SITREPs, C-IED technical and tactical exploitation reports, electronic support measures, HUMINT, biometrics, human terrain teams, open source media exploitation, language and cultural advisors and host nation (HN) military, police and civil authorities. Prevent. Prevent activities are primarily offensive in nature and can be both kinetic and non-kinetic. The aim is to proactively disrupt and interdict the IED networks ability to conduct IED operations at the earliest opportunity. Kinetic activities include operations to destroy, clear, neutralize, disrupt or capture IED network nodes, personnel, resources or infrastructure and/or supporting sub-systems. Non-kinetic preventative activities are primarily information activities including messaging to deter attacks by condemning attacks, influencing HN public support, establishing mechanisms to report IEDs and operations to collect legacy ordnance and weapons. Figure 3: Exploitation of an IED Event in Afghanistan Exploit. Exploit activities are the most important activities as they support the development of accurate intelligence in order to effectively predict, prevent, detect, protect, mitigate and neutralize the IED threat. IED exploitation is the process whereby an IED incident is technically and tactically assessed to feed into the intelligence cycle, lessons learned process, force protection development and unit TTP. Evidence is collated and preserved, local and friendly forces interviewed and surrounding areas searched in order to gain significant information of IED systems. Exploit activities are grouped in AtN LOO because the AtN main effort is to support C-IED targeting, a preventative task. DISPATCHES 3

8 Protect. Protect activities are mainly defensive in nature and are associated with disrupting, channelling, blocking, reducing exposure and redirecting blast energy, projectiles or fragmentation. Improved tactics and technology are utilized to reduce the effects of IEDs on individuals, equipment and facilities. These measures include vehicle up-armour, personal protective equipment and infrastructure hardening and activities to hinder the IED such as electronic counter-measures (ECM), excluding functions relating to EOD. Protection activities alone are insufficient to ensure the safety of soldiers as increased protective measures cannot prevent insurgents from employing ever more powerful main charges. In addition, enhanced protective measures offer the appearance of friendly forces depending on fortified camps and reinforced vehicles an image that runs counter to successful COIN operations where the appearance of normal levels of security and maximum interaction with the local population is desired. Figure 4: Emplacement of unmanned pervasive surveillance capabilities in Afghanistan Detect. Detect activities and technologies involve the identification and location of explosive devices, IED components, other weapons, related personnel and infrastructure prior to IED assembly or initiation. Detect activities normally serve as a warning system of IED activity in the area and they prevent the insurgent s ability to emplace or initiate an IED. The aim is to provide relevant (accurate and timely) information to commanders. Detection involves a combination of operating space awareness, employing tactical SOPs to visually search and identify threats, making use of technical resources, and engaging enablers (EDD and Engrs) and other C-IED trained soldiers. All personnel involved in IED detection activities must be capable of accurately and effectively searching and reacting to an IED and IED components (including detection of CBRN materials assembled in IEDs, if the threat exists). Mitigate. Mitigate activities are short-term defensive activities that occur prior to a mission and after an IED event. Mitigation activities typically include the following: DISPATCHES 4

9 tactical planning, lessons learned, SOPs, tactical aide memoires, theatre TTPs and risk assessments. These measures facilitate adaptation and improve passage of information, thorough battle procedure and the selection and execution of tasks reducing the effects of IEDs on individuals, equipment and facilities. IED mitigating activities are tactical and support predictive, preventative and training activities. Mitigate activities leverage best practices, improve reaction to IED threats, and ensure effective information passage in an effort to avoid IED strikes and/or repeating mistakes. Figure 5: EOD Neutralizes an IED in Afghanistan Neutralize. Neutralize C-IED activities are reactive, employing EOD SOPs and technologies to disrupt, disarm, render safe, dispose or destroy IEDs and their components. The aim of neutralize C-IED activities is to eliminate the IED hazard(s) by rendering them safe at the time and place chosen by friendly forces and to support exploitation of the IED detection incident. Contingency plans should be made for dealing with IEDs containing CBRN material, if assessed to be a threat. Neutralize activities are normally associated with EOD/IEDD operators (IEDs) and Engrs (conventional munitions). When possible, it is preferable for EOD/IEDD operators to render a device safe rather than blow it in place to mitigate collateral damage and thereby allow detailed forensic exploitation. In simple terms, the C-IED scheme of manoeuvre is to predict the adversary s actions, prevent the adversary from executing plans, protect from the effects of IED functioning, detect IED material and devices, mitigate the likely threats and effects of the attack, neutralize emplaced devices, exploit IED events and continually train the force. DISPATCHES 5

10 Part 2 The Threat IED Threat Triad It is necessary for every soldier to understand the IED threat triad in order to effectively determine and then assess threat(s). The insurgent s intent coupled with his capabilities, superimposed onto terrain, will most often yield an accurate idea of the target location and type of attack. The difficulty when operating in highly canalizing terrain is that there are often multiple vulnerable points along any given route. For friendly forces, checking every vulnerable point can result in the loss of momentum and freedom of movement. However, the risk associated with not checking a route or vulnerable point can be catastrophic. In a high IED threat environment, the balance between speed and security is delicate. Figure 6: The IED Threat Triad Intent. The insurgent s intent is often constrained by the limits of their capabilities. However, there could be cases where the fulfillment of their intent does not require the use of their complete arsenal. The following list is an example of intentions for IED use: inflict casualties for strategic effect (decrease moral / perceptions of security); R&D (to determine how much explosives are required to kill a certain vehicle); target specific vehicles / forces (Armd, Engr, EOD, Comd, Log, Avn, etc); tactical obstacle covered by fire; disruption or deception; revenge for loss of honour (tribal vice insurgent contact); destroy infrastructure; protect leadership, caches or narcotics; and friendly force TTP identification. Capability. Every capability has a tactical and technical signature and a required set of conditions for employment (often terrain based). This signature often identifies exploitable capabilities, procedures and people in the IED system. A C-IED estimate includes many factors related to the insurgents IED capabilities, such as: technical design, tactical employment, direct and indirect fire systems, surveillance, night vision, air defence, EW, OPSEC, insurgent sanctuaries, logistics, C2 and communications. DISPATCHES 6

11 IED Threat Evolution While Afghan insurgents have made advancements in IED technology, it is fair to say that as an adversary, they are more adaptive than technologically innovative. Perhaps, from the insurgent perspective, significant technological innovations have not been necessary simply because minor adaptations of the basics techniques have yielded effective tactical successes. The diagram (Fig. 7) below is based on the Afghan theatre experience; however, the model when considered against the IED threat triad can and should be applicable to any future mission. The chart below offers a simplified view of the evolution that the CF has faced in Kandahar Region. IED evolution is not purely a linear change as depicted nor should it suggest that once a new TTP has emerged that all previous insurgent IED TTP are discarded. Figure 7: IED Threat Evolution in Kandahar (Feb 06-Aug 09) What s Next? Is it a guess based on trial and error. Should friendly forces remain defensive in terms of the action reaction counter-action cycle, or do they view the environment through the insurgent s eyes (difficult to do from a cultural perspective but entirely possible when considering tactical options) and attempt to deduce what are the threats? It is this red teaming or looking at the conflict through the insurgent lens that will contribute to continued offensive C-IED success. The Improvised Explosive Device IED Characteristics. An IED typically consists of five primary components. The primary components are: a switch, an initiator, a main charge, a container and a power source. DISPATCHES 7

12 Figure 8: Examples of Primary Components of an IED Switch. A switch is a device for making, breaking or changing a connection that is used to trigger a device. A switch could be a pressure plate or a pressure release spring. Initiator. An initiator is a device used as the first element of an explosive train which, upon receipt of the proper impulse, causes the detonation or burning of an explosive item. For example, an anti-personnel mine fuse or a grenade fuse could be used as an initiator. Main Charge. A main charge is a quantity of explosive, bulk or contained in a bomb, projectile, mine or similar device, or used as a propellant. Commercial or homemade explosives or military ordnance could be used as a main charge. A directionally focused fragmentation charge (DFFC) is a device designed to explosively propel fragmentation in a directed pattern. It can be initiated by any means and is used to target dismounted troops and armoured vehicles. Container. A container is an item that houses the whole IED or principle components of an IED. Containers such as a water can, length of pipe, backpack and sacks have been used to house IEDs and/or IED components. Power Source. A power supply is an item that creates electrical energy for an electrically initiated IED. Power sources such as commercial batteries, car batteries or anything that holds a charge can be used for initiation. Enhancements. Any additional components that modify and/or add to the harmful effects of an IED are considered enhancements. For example, adding substances such as diesel, shrapnel or CBRN material have been added to IEDs. Means of Initiation. Some IEDs employ multiple methods of initiation. For example, one method of initiation might arm the IED before a second initiates it. Evidence indicates that the majority of IED initiation means fall into three classes: Command Initiated. Command initiated IEDs feature a degree of separation between the main charge and the switch at the firing point thereby reducing the risk to DISPATCHES 8

13 the operator and selection of the optimum time for initiation to create the greatest effect. Although a variety of command initiation methods may be employed the most common are command wire and radio controlled initiation. o Command Wire IEDs (CWIED). Command wire initiated IEDs have an electrical wire link between the switch at the firing point and the initiator at the main charge. This offers advantages of simplicity and potential to mitigate the effectiveness of ECM. However, the disadvantage to this means of initiation is that the long wire, if not concealed properly, is easy to detect and traced to the operator at the firing point. o Radio Control IEDs (RCIED). Radio controlled IEDs employ a radio frequency (RF) transmitter at the firing point and an associated receiver which operates the switch, normally located with the initiator. RCIEDs are quick to deploy since they can be pre-assembled and do not need a physical link between the firing point and the switch. However, they are relatively complex and can be inhibited by ECM. Time Controlled. Time controlled IEDs provide a delay to initiation allowing the operator to be elsewhere when the device functions or can be set to detonate when the intended target is expected to be in the IED s vicinity. The most common time devices are electrical or mechanical timers, although chemical and/or igniferous are also potential time controlled devices. Figure 9: Examples of Time Controlled IEDs Victim Operated (VOIED). Victim operated IEDs are initiated by an action performed by the target. VOIEDs may employ a variety of switches such as pressure, pressure or tension release, passive or active infrared and/or trip wire. VOIEDs may be armed remotely after deployment by a timer device or command device. Means of Deployment. IED are defined and categorized by the means of delivery for deployment. The means of delivery for deployment for an IED are: Manual Emplacement. Manually deployed IEDs are placed by hand in order to attack targets at a specific location or within a certain area. Projected. Projected IEDs are frequently used against locations that are sufficiently well protected making targeting, by other means, difficult. IEDs can be delivered by mortars, rockets or similar improvised devices. In some cases, the explosive device itself may be made up of conventional munitions that are projected by improvised means. Projected IEDs normally detonate on impact or by time delay. DISPATCHES 9

14 Figure 10: An Example of a Main Charge Concealed in a Seat of a Vehicle Borne IED Person/Vehicle-Borne. A person-borne IED (PBIED) is an IED transported by a person (often concealed) to a target. A vehicle-borne IED (VBIED) is an IED mounted in or on any type of vehicle and delivered to a target. The use of a vehicle offers both easier concealment of the device and the potential for larger main charges. Suicide Attack. Suicide attacks present difficulty in detection and defeat. Suicide attacks are either person borne or vehicle borne, allowing the adversary to choose the optimum time and place of detonation. Suicide attacks provide the potential to engage targets of opportunity. This type of attack is the most difficult to predict, prevent and detect. Complex Attacks. First and foremost, an IED attack is an ambush. As with any ambush, the lethality of the attack can be enhanced by synchronizing multiple attacks and methods. Individual IEDs of the types described above can be combined to form multiple attack chains of the same or different type of IED and in conjunction with other weapon systems to produce complex attacks. Complex attacks are frequently designed to target personnel responding to the initial IED. IED Indicators There are often signs that an IED has been emplaced. It should be noted, however, that indicators will evolve with changes in enemy tactics and capabilities. The following observation may indicate the presence of an IED: changes in the pattern of life; lack of civilian presence; disturbed earth; rags, cloth, water bottles or anything out of place; wires protruding from clothes or unusually bulky clothing; sagging or uneven suspension on vehicles; location of parked cars forcing you to move to the left or right; and DISPATCHES 10

15 obstacles or vulnerable points such as culverts, bends in the road or canalizing ground. Note: Threat indicators continue to evolve and can be unique to a location, region or area of operations (AO). Part 3 Targeting IED Systems Concept for IED Targeting Despite numerous improvements to C-IED operations over the past several years, the threat to mission success and soldiers has not diminished. In response, a focus on offensive C-IED operations designed to attack and dismantle IED systems has emerged. The requirement to conduct intelligence enabled attacks on network centric systems, or an IED system, is adapting our TTP as well as organizational structures. C-IED activities begin with soldiers identifying and exploiting various types of information from all activities in the AO in order to facilitate effective intelligence preparation of the environment. Once information is processed into knowledge and factored into the planning process, the dismantling and disruption of the IED system can begin. The dedication of effort and resources to obtain and improve C-IED knowledge is intense, but a necessity to maintain effective force protection in the COE. Figure 11: Concept for C-IED Targeting Targeting the IED system requires integrated support from the strategic to the tactical level. Usually, key IED network nodes employ security measures (change of meeting location, constant movement, concealment within the local population, etc ) to render targeting more difficult. To counter these tactics, special operations forces are often involved with the tracking and surgical prosecution of such operations. Conventional forces with sensing and striking enablers have the ability to conduct larger scale AtN operations such as denying caches and avenues of approach, collection and exploitation. C-IED ISTAR Activities Experience has proven that persistent surveillance is critical in defeating the emplacement of IED and targeting efforts. Tactical forces must develop a multi-layer DISPATCHES 11

16 intelligence, surveillance, target acquisition and reconnaissance (ISTAR) plan (multi-sensors and specific time) that considers deductions from C-IED analysis to achieve persistent coverage over high threat areas. Due to the limited Intelligence, surveillance and reconnaissance (ISR) capabilities and capacities, manoeuvre forces and intelligence staffs must proactively exchange the results of their estimates, analysis and experiences of insurgent activities in order to minimize surveillance gaps. Figure 12: ISR Activities Related to an IED System and Event Prior to developing an ISTAR plan, it is paramount to conduct an in-depth analysis of the IED threat triad and the related C-IED circumstances; simply establishing standing named areas of interest (NAI) and targeted areas of interest (TAI) over hotspots is not sufficient to prevent the emplacement of IEDs. C-IED ISTAR NAIs and TAIs must be constantly adapted to counter a dynamic insurgent modus operandi and simultaneously enable C-IED targeting. Some of the IED factors to consider when establishing an ISTAR plan are: hotspot locations, avenues of approach and trends, the types of IED employed in the area, insurgent C2, activities and facilities or compounds of interest throughout the area. While the aforementioned factors are primarily tied to the terrain and are more defensive in nature, findings from exploitation activities can often indentify significant human terrain factors. Specific collection operations such as HUMINT, tactical questioning, site exploitation, and SIGINT can assist in mapping the linkages and nodes within an IED network which, in turn, can trigger subsequent detailed collection and C-IED targeting activities. It is important that commanders provide clear intent on desired information or subsequent effect of the ISTAR plan by utilizing terminology such as detect to strike, detect to follow or detect to follow and exploit. C-IED Targeting C-IED targeting results in activities that consider and affect the IED system as a whole; including personnel, infrastructure and the insurgent IED planning and execution processes. Actions against a single point in the network can often produce valuable intelligence or a desired effect on the network. Related concurrent C-IED operations against key nodes; leaders, seconds-in-command, facilitators, trainers, caches DISPATCHES 12

17 and avenues of approach are often required to disrupt, influence or shut down the network. C-IED targeting considers the broader implications of direct actions and is not necessarily linked to the neutralization of a threat, but may be designed to influence the local population, known sympathizers and/or lower level insurgents. To be most effective, C-IED targeting should be followed by the application of broader COIN-related activities; in order to effectively build and maintain influence over an area. C-IED Targeting Working Group (WG). In a high IED threat environment, establishing a C-IED targeting work group is recommended. The focus of the C-IED targeting WG is integrating technical, tactical and social network analysis with a view to defining IED trends, IED cells/groups signatures, defining origins of components, determine intelligence gaps and identifying possible sources to cover information gaps. A C-IED targeting WG provides information and subject matter expertise to the commander s targeting board and contributes to ISTAR planning coordination. Employing the find, fix, finish, exploit, analyze and disseminate (F3EAD) methodology (see Fig 13) to AtN activities can assist in C-IED targeting which in turn supports the land force targeting cycle. Figure 13: C-IED Targeting Employing the F3EAD Methodology Intelligence The speed of the insurgent decision/action cycle and volume of information required to conduct successful COIN operations in a high IED threat environment challenges intelligence capabilities. The application of traditional intelligence collection and analysis methodologies to counter network centric operations may produce a fragmented intelligence picture. Recently practiced integrated analysis techniques which focus on network-centric operations that includes; social network analysis, forensic-enabled intelligence and criminal investigative methods, have captured a more comprehensive and defined C-IED and COIN intelligence picture. Training individuals at the sub-unit level on the Tactical Intelligence Operators Course (TIOC) has provided a dedicated intelligence capacity that has facilitated the collation and passage of relevant and targeted information that can support higher intelligence fusion capabilities. In addition, deploying intelligence analysts with manoeuvre elements can have several benefits, including; improved analyst understanding of the COE resulting in improved quality of analysis, improving the definition of intelligence gaps for manoeuvre forces, timely targeting products, shaping mission planning with the commander s priority intelligence requirements (PIR) and more effective interpretation of patrol and mission reports. Dedicating an intelligence capacity at the sub-unit level and increased interaction DISPATCHES 13

18 between intelligence staff and tactical troops produces personnel that understand how technical and tactical capabilities support the targeting cycle as applied to the AtN mission and its place in the COIN fight. This in turn can improve the level of definition of IED systems and can result in activities that place continuous stress and disrupt IED systems. Search and Site Exploitation IED site exploitation feeds all C-IED activities. IED site exploitation is the process by which the IED scene, events and associated physical materials are recorded and analyzed in order to understand the IED threat triad, insurgent modus operandi and the interpersonal relationships within an IED Network. It is imperative that IED exploitation activities are conducted consistently and at each IED event in order to provide an accurate intelligence picture and to develop effective countermeasures. IED site exploitation is essential to defining IED trends and group signatures and to provide material to develop IED forensic evidence. The conduct of IED site exploitations, however, only provides a limited perspective of the IED network s operations. Search and exploitation operations must be conducted against specific NAIs and TAIs linked to IED systems to achieve a higher level of fidelity. Manoeuvre forces must develop trained tactical site exploitation (TSE) expertise and sensitive site exploitation (SSE) teams to assist in the collection and quick exploitation of captured enemy equipment (CEE) and captured enemy documents (CED). Such a dedicated capability should work directly with specialist exploitation capabilities, intelligence staffs and the tactical on-site commanders to increase effective collection on the IED network. All Arms Search Training. All soldiers are potential sensors. Therefore, in a high IED threat environment all soldiers should be trained in basic C-IED search techniques and should be familiar with collection and reporting of CEE/CEDs. All-arms search training should not replace the requirements to have specialized search teams and tactical exploitation teams; however, having and maintaining dedicated all arms IED Search capability at the sub-unit level during all operations enhances the ability to locate threats, recognize suspicious items and assist in IED data collection. Tactical Site Exploitation (TSE). TSE is the action taken to ensure that personnel, documents, electronic data, IED components, weapons and other material are collected, identified, protected and evaluated in order to facilitate follow-on actions. There are two types of TSE; hasty and deliberate. A hasty TSE occurs when there is not enough time or the insurgent threat is too high to complete a thorough TSE. The tactical unit or element utilizes their organic TSE capability and conducts a quick exploitation before leaving the site. A deliberate TSE is conducted when a unit has enough time and assets to secure a site, while additional TSE specialist support (tactical and device exploitation teams) are ordered to complete the investigation. It should be noted that a TSE is an implied all-arms task during all operations. TSE focuses on the actions taken by soldiers and leaders at the point of initial contact. TSE, which includes tactical questioning, builds the IED intelligence picture and provides information for IED analysis and adaptations to C-IED TTP. Sensitive Site Exploitation (SSE). SSE is a series of related activities usually conducted by joint agencies inside an insurgent compound or site. SSE is designed to exploit personnel, documents, electronic data, IED components, weapons and other material, while neutralizing any threat posed by the site or its contents. SSE is an in-depth search capability that is conducted at a higher level requiring the use of technically trained operators from specialized agencies/units. It is often a lengthy process that requires the target site to be meticulously disassembled for maximum recovery of evidence. SSE is the final or most complete step of directed operations and exploitation of an IED site. DISPATCHES 14

19 Part 4 Counter-IED Drills The Prepare the Force (PtF) concept involves integrating C-IED knowledge and capabilities into force development, individual and collective training systems, pre-deployment and in-theatre continuation training. C-IED TTP and/or drills provide options to consider for the planning and execution of every mission when applied against the IED threat triad intent, capability and terrain. The C-IED Top 12 Points to Consider 1. DO NOT SET PATTERNS; 2. Stand-off distance is a lifesaver; 3. Dominate the road when possible; 4. Always wear your personal protective equipment (inside/outside vehicle); 5. Treat every road move as a combat mission; 6. Maintain your situational awareness; 7. Use your optics system to investigate suspected IEDs; 8. Vary your speed, spacing and order of march during convoys or patrols; 9. Always have a contingency plan; 10. Perform 5 and 20 Drills at every halt; 11. ECM use it and fire test it as part of you battle procedure; and 12. Always suspect a secondary device. The 5 and 20 Drills Stationary forces are extremely vulnerable to IED attack. Any time a static position is assumed, whether mounted or not, it is essential to conduct searches of the immediate surrounding area for IED indicators. Depending on the length of time in a position and the IED threat triad (intent, terrain and capability) the crucial search area varies from 5 to 20 metres in all directions. The 5 and 20 metre drills should be conducted immediately and thoroughly upon adopting a static position. In order to avoid stopping at a possible IED location, all members of the crew or patrol should be scanning a potential halt location prior to making the stop. The 5 and 20 drills are life-saving procedures in a high IED threat environment. The following drills have evolved to counter insurgent IED TTPs. During the conflict, there is a constant evolution of both friendly force and insurgent TTPs in attempt to gain an edge. Selecting the right C-IED drills depends on a quick combat estimate that considers the mission and the IED threat triad. Mounted Search The immediate action for all halts is to remain mounted while the vehicle commander assigns arcs to ensure complete scanning coverage around the vehicle. The crew then conduct a visual search of the area surrounding the vehicle out to 5 metres within assigned arcs. The vehicle commander monitors the crew s progress and visually searches; providing a second vantage point. Once the immediate 5 metres has been cleared, the visual search continues out to 20 metres; when available, employing vehicle optics or binoculars. Dependant on the tactical situation, a dismounted search may be DISPATCHES 15

20 required. The dismounted search will be conducted in accordance with the following seven steps: 1. Open the vehicle door or lower the ramp without touching the ground and search the ground before stepping from the vehicle. If using the ramp, ensure a visual inspection is completed under the ramp, before it touches the ground. 2. Dismount and close the door or ramp in order to provide maximum protection to the remaining crew in the event of a blast or small arms fire. 3. Visually inspect the ground under the vehicle and along the sides ensuring a complete search under the vehicle and around the wheels or tracks. 4. If two or more crew dismount, they will conduct one of several search techniques. The search technique selected will be dictated by the tactical situation and IED threat triad (enemy intent, terrain and capability). It is important that the searchers are not in the same place at the same time. Searchers will respectively scan the ground for combat indicators until the 5 metres have been completed. The vehicle commander will direct this search from the vehicle ensuring overlap of the searchers as well as identifying any areas of additional interest or suspicion. 5. Once the drill is complete, the convoy commander will direct area security that will meet the tactical needs. 6. For a long halt, or upon the convoy commander orders, each vehicle will expand the search area to 20 metres. Searchers must remember that threats may be camouflaged to prevent observation from the road. 7. If multiple vehicles are in line and spaced less than 40 metres apart, the searcher must ensure a search overlap between vehicles to the front and rear. Depending on the threat, the mounted search drill may pose its own hazards and may not be feasible or prudent. It is preferred to only conduct a physical search of the known safe ground and a visual search be conducted for the remainder of the immediate area. The visual search shall be conducted from at least two vantage points to ensure best coverage. If the area still cannot be confirmed as safe, the convoy should move to a new area. Figure 14: Adaptive Search Techniques in Afghanistan DISPATCHES 16

21 Vehicle Box Search (2 or more personnel). If two crew members dismount to search around a vehicle, they will conduct a box search, scanning the ground for combat indicators until 5 metres has been covered. Searchers must stagger their search to avoid meeting at the front or rear of the vehicle. The vehicle commander will direct the search ensuring overlap of the searchers as well as identifying any areas of additional interest or suspicion. Using the centre line of the vehicle as a reference point, the searchers will continue the box search to expand the search area out to 20 metres. Once the drill is complete, the convoy commander will direct area security that meets the tactical needs. Figure 15: Vehicle Box Search Drill Spiral Search (1 Dismount). The spiral search drill is conducted by moving away from the vehicle in a circular pattern, increasing the distance from the vehicle on each pass. This search technique is best used for a single-person search. It should be noted, however, that as the searcher moves further from a vehicle it is more difficult to ensure complete ground coverage and is therefore important that the vehicle commander observe and supervise the search. Once the drill is complete, the convoy commander will direct area security that meets the tactical needs. Figure 16: Vehicle Spiral Search DISPATCHES 17

22 Zigzag Search (1 or more personnel). The zigzag search is best used if there are several areas of interest or suspicion that the vehicle commander deems a threat or search priority. Searchers will move from the vehicle and check areas of interest and then, upon completion, move back to the vehicle, completing the ground search. The zigzag search is completed with searchers moving in opposite directions and maintaining maximum distance between each other. Note: It is important that the searchers are not in the same place at the same time. Once the drill is complete convoy commander will direct area security that meets the tactical need. Figure 17: Vehicle Zigzag Search Searching while in Convoy Vehicle spacing in convoy will be directed based on the tactical situation, IED threat triad (particularly the RCIED threat) and environmental conditions. If multiple vehicles are in line and spaced less than 40 metres, searchers must ensure an overlap of areas scanned between vehicles to the front and rear. However, if the vehicles are spaced greater than 40 metres apart, there will be skip zones created because the 20-metre searches taking place on each vehicle. Skip zones will have to be searched. The skip zone is defined as the road surface and verges. The convoy commander will direct area security that meets the tactical needs. Figure 18: Convoy Spacing at the Halt DISPATCHES 18

23 Vulnerable Point Search Drills (VPS) Vulnerable points are locations along a route where it would be advantageous or easy for an insurgent to launch an attack, which could be a combination of an IED attack and ambush. Utilizing intelligence assessments, proper battle procedures, unit SOPs and appropriate detection techniques, VPS drills are procedures that assist in locating immediate threats that may restrict the friendly force and non-combatant freedom of movement. Examples of vulnerable points are canalizing ground, points with prominent markers; sharp turns or dominated terrain with high features. The locations of previous IED events should be considered in planning, marked on maps and treated as vulnerable points. IEDs will likely be utilized in a place where targets have to slow down (a slower moving target is easier to attack than one moving at speed), or where movement off road is unlikely or difficult. VPS are conducted to mitigate the risks associated with restrictive terrain by systematically searching the area for IED and/or insurgent indicators. V Drill. The V drill is conducted in order to search vulnerable points for IED indicators. It is conducted by dismounted troops searching in advance of a vehicle providing dismounted soldiers overwatch protection. The outside flank positions of the V are searching for indications of a command wire laid perpendicular to a route and/or exposed antennas as well as identifying any potential firing points. The searchers advance in a V shape formation past the vulnerable point, stopping to investigate threat terrain such as culverts. It should be noted that, threats may be camouflaged from observation from the road with the best camouflage being on or nearest the road surface. This V formation offers the advantage of good observation and firepower to the flanks and to the front and can easily be controlled from the centre. Figure 19: The V Drill Box Search. The box search is conducted in areas with a high occurrence or likelihood of a command wire IED or areas where command wires are normally found to be laid parallel to a route. It is a method of isolating an area prior to the physical search of the immediate area surrounding a vulnerable point. It is conducted by two teams searching in a box shape around the vulnerable point location. Each team will depart the vehicle conduct a search out from and parallel to the route. After clearing one side of the route, the teams cross over the road and return along the opposite side of the road to return to DISPATCHES 19

24 the start point. Once the search teams have returned to the start point and no signs of a potential command wire or IED were detected, a physical search of the road surface and the vulnerable point should be conducted in a similar fashion as the V Drill. Figure 20: Box Search Part 5 Reaction To An IED Incident The Five C s The Five C s refers to a simple set of procedures used when a suspected IED has been encountered or following a detonation. The guidelines have been created with the priority placed on the safety of both the troops involved and local inhabitants. An incident site must be secured ensuring no other IEDs exist and to facilitate the follow up investigation and forensic collection. The steps are not necessarily conducted sequentially and can occur concurrently. All steps should be conducted while using tactical cover to best advantage. The Five C s are: 1. Confirm from a safe distance the presence of a device ensuring to maximize the use of optics for standoff distances. Perform the 5 and 20 drill in the immediate area to ensure no secondary devices are present. 2. Contact the appropriate operations centre immediately and request assistance. Provide as much detail as possible and include a direction of approach so that the quick reaction force (QRF) do not have to drive past the device to reach the rendezvous point. 3. Clear the area of people within 300 metres of the device. 4. Cordon off the area to ensure the ground is undisturbed before the arrival of specialist team(s). Establish each security position of the cordon, conduct the 5 and 20 drills and establish an incident control point (ICP). 5. Control the perimeter until the All Clear is given and the mission is complete. Securing an IED Incident Site After discovering a suspected IED or following an IED incident, follow the 5 C s and disturb as little as possible while securing an area. This will assist to avoid detonating a possible secondary IED, any unexploded or partially exploded ammunition and to preserve any potential IED related evidence. Follow unit SOP to treat any injuries or handle persons of interest. In order to conduct and exploitation of the area, an effective DISPATCHES 20

25 cordon of an area must be established to maintain control and security for the arrival of the QRF, C-IED team, explosive ordnance disposal (EOD) assets and/or any other investigative services arrive. It is extremely important that the cordon remain in place until the completion of the exploitation task. The site security and preservation of evidence that is offered by an effective cordon and crowd control is the key in allowing C-IED teams to work effectively and efficiently. The CF endeavours to exploit as many IED incidents as possible in support of the C-IED main effort Attack the Network. Recovery of Evidence Exploitation teams endeavour to investigate all IED incidents and sites of interest to gather as much technical and tactical information as possible. Soldiers involved in an incident are not authorized to recover evidence from an IED event unless under orders. Often, specialists or special investigators have been dispatched to exploit and the site must remain uncontaminated. All threats must be assessed prior to and during evidence exploitation including but not limited to: insurgent counter attack, secondary devices, UXO, bio-hazardous materials, chemical threat (primarily spills) and fire. All human remains require special attention and Task Force SOPs will dictate their handling. Information gathering is done through various methods including; questioning witnesses to an event, analysis of the terrain and collection of all physical evidence remaining at the scene. Once the results from the collection are exploited, C-IED TTP can be confirmed or adapted, force protection can be enhanced and most importantly, the IED system can be attacked. In the event that specialist teams are not available to exploit an IED incident, the chain of command may order the collection of evidentiary material by soldiers at the scene. When authorized to exploit the scene, the following steps apply: Step 1 Photographic Evidence. Take several photos of the scene and crowd for analysts to gain an appreciation of the event. Photographing the crowd is particularly important in order to identify possible insurgents. Insurgents often linger at an IED event to gain information such as; photos or videos for propaganda purposes, intelligence for future operations and to learn friendly force TTP. It is essential to identify items of possible evidence and photograph the material before handled or moved. It should be noted that to provide effective photographs a digital camera over 5 megapixels is preferred. Step 2 Wear Gloves. Do not touch the evidence with your bare hands. Surgical gloves should always be part of full fighting order and worn when handling any potential evidence or bio-hazardous material. Step 3 Collection. In order to preserve forensic material, do not pick up the item in the same manner as an insurgent would have. For example, do not pick up a weapon by the handle where finger prints may remain. Step 4 Storage. Place potential evidential material in a sterile clear plastic bag. All items are to be bagged individually. Step 5 Identification. Draw a scale diagram of the IED incident scene indicating where each significant item was recovered. Make sure that all individual plastic bags used for collecting evidence are marked using a permanent marker with the following information: item, date/time group, mission name, unit, gatherers name and rank. CONCLUSION Over the past two decades, many of the conflicts around the world have been characterized by the use of IED. Canada s experience in Afghanistan has highlighted the IED threat and the significance of IED to an insurgent in counter-insurgency operations. A high IED threat environment will likely shape most future conflicts. As warriors, it is our DISPATCHES 21

150-MC-0006 Validate the Protection Warfighting Function Staff (Battalion through Corps) Status: Approved

150-MC-0006 Validate the Protection Warfighting Function Staff (Battalion through Corps) Status: Approved Report Date: 14 Jun 2017 150-MC-0006 Validate the Protection Warfighting Function Staff (Battalion through Corps) Status: Approved Distribution Restriction: Approved for public release; distribution is

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Status: Approved 18 Feb 2015 Effective Date: 30 Sep 2016 Task Number: 71-9-6221 Task Title: Conduct Counter Improvised Explosive Device Operations (Division Echelon

More information

The Challenging Scope of the. Improvised Explosive Device Battlespace. Commander ADF Counter-IED Task Force Brigadier Wayne Budd.

The Challenging Scope of the. Improvised Explosive Device Battlespace. Commander ADF Counter-IED Task Force Brigadier Wayne Budd. The Challenging Scope of the Improvised Explosive Device Battlespace Commander ADF Counter-IED Task Force Brigadier Wayne Budd Where is the IED threat? Sweden: Suicide Attack, Stockholm, 11 December 2010

More information

Fiscal Year (FY) 2011 Budget Estimates

Fiscal Year (FY) 2011 Budget Estimates Fiscal Year (FY) 2011 Budget Estimates Attack the Network Defeat the Device Tr ai n the Force February 2010 JUSTIFICATION OF FISCAL YEAR (FY) 2011 BUDGET ESTIMATES Table of Contents - Joint Improvised

More information

Preparing to Occupy. Brigade Support Area. and Defend the. By Capt. Shayne D. Heap and Lt. Col. Brent Coryell

Preparing to Occupy. Brigade Support Area. and Defend the. By Capt. Shayne D. Heap and Lt. Col. Brent Coryell Preparing to Occupy and Defend the Brigade Support Area By Capt. Shayne D. Heap and Lt. Col. Brent Coryell A Soldier from 123rd Brigade Support Battalion, 3rd Brigade Combat Team, 1st Armored Division,

More information

Chapter FM 3-19

Chapter FM 3-19 Chapter 5 N B C R e c o n i n t h e C o m b a t A r e a During combat operations, NBC recon units operate throughout the framework of the battlefield. In the forward combat area, NBC recon elements are

More information

CHAPTER COUNTERMINE OPERATIONS DEFINITIONS BREACHING OPERATIONS. Mine/Countermine Operations FM 20-32

CHAPTER COUNTERMINE OPERATIONS DEFINITIONS BREACHING OPERATIONS. Mine/Countermine Operations FM 20-32 Mine/Countermine Operations FM 20-32 CHAPTER 8 COUNTERMINE OPERATIONS Countermine operations are taken to breach or clear a minefield. All tasks fall under breaching or clearing operations. These tasks

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Task Number: 01-6-0416 Task Title: Conduct Aviation Missions as part of an Area Defense Supporting Reference(s): Step Number Reference ID Reference Name Required

More information

Government of Azerbaijan

Government of Azerbaijan 15. EXPLOSIVE ORDNANCE DISPOSAL (EOD) 1. General Explosive Ordnance Disposal (EOD) is the detection, identification, rendering safe, recovery and final disposal of Unexploded Ordnance (UXO), which has

More information

Section III. Delay Against Mechanized Forces

Section III. Delay Against Mechanized Forces Section III. Delay Against Mechanized Forces A delaying operation is an operation in which a force under pressure trades space for time by slowing down the enemy's momentum and inflicting maximum damage

More information

Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC

Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC Intelligence Preparation of Battlefield or IPB as it is more commonly known is a Command and staff tool that allows systematic, continuous

More information

Office for Bombing Prevention Bomb Threat Management

Office for Bombing Prevention Bomb Threat Management Bomb Threat Management FOR OFFICIAL USE ONLY Rev: B 1 Second level Third level Fourth level Fifth level Homeland Security Presidential Directive-19 Homeland Security Presidential Directive 19: Establishes

More information

OPFOR Tactical Task List

OPFOR Tactical Task List OPFOR Tactical Task List The OPFOR Tactical Task List is a listing of tactical tasks that are specific to the OPFOR. OPFOR tactical organizations and individuals perform these tasks instead of the comparable

More information

Chapter I SUBMUNITION UNEXPLODED ORDNANCE (UXO) HAZARDS

Chapter I SUBMUNITION UNEXPLODED ORDNANCE (UXO) HAZARDS Chapter I SUBMUNITION UNEXPLODED ORDNANCE (UXO) HAZARDS 1. Background a. Saturation of unexploded submunitions has become a characteristic of the modern battlefield. The potential for fratricide from UXO

More information

OF THE DEFENSE FUNDAMENTALS CHAPTER 9

OF THE DEFENSE FUNDAMENTALS CHAPTER 9 CHAPTER 9 FUNDAMENTALS OF THE DEFENSE The immediate purpose of defensive operations is to defeat an enemy attack. Army forces conduct defensive operations as part of major operations and campaigns, in

More information

CHAPTER 5 SECURITY OPERATIONS

CHAPTER 5 SECURITY OPERATIONS CHAPTER 5 SECURITY OPERATIONS The reconnaissance platoon conducts security operations to protect the main body from enemy observation and surprise attack. These operations give the main body commander

More information

Assembly Area Operations

Assembly Area Operations Assembly Area Operations DESIGNATION OF ASSEMBLY AREAS ASSEMBLY AREAS E-1. An AA is a location where the squadron and/or troop prepares for future operations, issues orders, accomplishes maintenance, and

More information

EOD publications - overview

EOD publications - overview 2143 AEODP-10 2282 ATP-72 2377 AEODP-13 EOD publications - overview Introduction collection of EOD Allied Publications STANAG and associated standard/ap, title, date of last promulgation, custodian, revision

More information

ROUTE CLEARANCE FM APPENDIX F

ROUTE CLEARANCE FM APPENDIX F APPENDIX F ROUTE CLEARANCE The purpose of this appendix is to assist field units in route-clearance operations. The TTP that follow establish basic guidelines for conducting this combined-arms combat operation.

More information

Enemy-Oriented Tactical Tasks. Exploit Feint Fix Interdict Neutralize. Terrain-Oriented Tactical Tasks. Retain Secure

Enemy-Oriented Tactical Tasks. Exploit Feint Fix Interdict Neutralize. Terrain-Oriented Tactical Tasks. Retain Secure Terms and Graphics References FM 101-5-1 Operational Terms and Graphics is the key reference for operations orders. JP 1-02 DoD Dictionary and MCRP 5-12C Marine Corps Supplement to the DoD Dictionary are

More information

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD

DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD DOD STRATEGY CWMD AND THE POTENTIAL ROLE OF EOD CDR Cameron Chen CWMD Action Officer Deputy Director for Global Operations J-3 Operations Directorate 1 2 Agenda Review of DoD CWMD Strategy WMD Challenge,

More information

CHAPTER 4 MILITARY INTELLIGENCE UNIT CAPABILITIES Mission. Elements of Intelligence Support. Signals Intelligence (SIGINT) Electronic Warfare (EW)

CHAPTER 4 MILITARY INTELLIGENCE UNIT CAPABILITIES Mission. Elements of Intelligence Support. Signals Intelligence (SIGINT) Electronic Warfare (EW) CHAPTER 4 MILITARY INTELLIGENCE UNIT CAPABILITIES Mission The IEW support mission at all echelons is to provide intelligence, EW, and CI support to help you accomplish your mission. Elements of Intelligence

More information

Joint Improvised-Threat Defeat Organization - Mission -

Joint Improvised-Threat Defeat Organization - Mission - Joint Improvised-Threat Defeat Organization - Mission - The Joint Improvised Threat Defeat Organization (JIDO) enables Department of Defense actions to counter improvised-threats with tactical responsiveness

More information

Chapter 13 Air and Missile Defense THE AIR THREAT AND JOINT SYNERGY

Chapter 13 Air and Missile Defense THE AIR THREAT AND JOINT SYNERGY Chapter 13 Air and Missile Defense This chapter addresses air and missile defense support at the operational level of war. It includes a brief look at the air threat to CSS complexes and addresses CSS

More information

THE STRYKER BRIGADE COMBAT TEAM INFANTRY BATTALION RECONNAISSANCE PLATOON

THE STRYKER BRIGADE COMBAT TEAM INFANTRY BATTALION RECONNAISSANCE PLATOON FM 3-21.94 THE STRYKER BRIGADE COMBAT TEAM INFANTRY BATTALION RECONNAISSANCE PLATOON HEADQUARTERS DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

More information

MECHANIZED INFANTRY PLATOON AND SQUAD (BRADLEY)

MECHANIZED INFANTRY PLATOON AND SQUAD (BRADLEY) (FM 7-7J) MECHANIZED INFANTRY PLATOON AND SQUAD (BRADLEY) AUGUST 2002 HEADQUARTERS DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *FM 3-21.71(FM

More information

RECRUIT SUSTAINMENT PROGRAM SOLDIER TRAINING READINESS MODULES Conduct Squad Attack 17 June 2011

RECRUIT SUSTAINMENT PROGRAM SOLDIER TRAINING READINESS MODULES Conduct Squad Attack 17 June 2011 RECRUIT SUSTAINMENT PROGRAM SOLDIER TRAINING READINESS MODULES Conduct Squad Attack 17 June 2011 SECTION I. Lesson Plan Series Task(s) Taught Academic Hours References Student Study Assignments Instructor

More information

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Army Date: March 2014 2040:, Development, Test & Evaluation, Army / BA 2: Applied COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY

More information

Appendix E. Subterranean Operations

Appendix E. Subterranean Operations Appendix E Subterranean Operations Knowledge of the nature and location of underground facilities is valuable to both the urban attacker and defender. 1. Tactical Value. Fighting in MOUT is multidimensional.

More information

Active Shooter Guideline

Active Shooter Guideline 1. Purpose: This procedure establishes guidelines for Monterey County Public Safety Personnel who respond to Active Shooter Incidents (ASI). The goal is to provide effective rescue and treatment procedures,

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-25 26 SEPTEMBER 2007 Operations EMERGENCY MANAGEMENT ACCESSIBILITY: COMPLIANCE WITH THIS PUBLICATION IS MANDATORY Publications and

More information

Joint IED Defeat Organization

Joint IED Defeat Organization JOINT IED DEFEAT Joint IED Defeat Organization Industry Forum 24 JANUARY 2006 This Briefing is 1 DoD Directive 2000.19 Joint IED Defeat Provides policy, responsibility and authorities for Joint IED Defeat

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19 COMBATING TERRORIST USE OF EXPLOSIVES IN THE UNITED STATES FEBRUARY 12, 2007 Purpose (1) This directive establishes a national policy, calls for the development

More information

DANGER WARNING CAUTION

DANGER WARNING CAUTION Training and Evaluation Outline Report Task Number: 01-6-0447 Task Title: Coordinate Intra-Theater Lift Supporting Reference(s): Step Number Reference ID Reference Name Required Primary ATTP 4-0.1 Army

More information

HEADQUARTERS DEPARTMENT OF THE ARMY FM US ARMY AIR AND MISSILE DEFENSE OPERATIONS

HEADQUARTERS DEPARTMENT OF THE ARMY FM US ARMY AIR AND MISSILE DEFENSE OPERATIONS HEADQUARTERS DEPARTMENT OF THE ARMY FM 44-100 US ARMY AIR AND MISSILE DEFENSE OPERATIONS Distribution Restriction: Approved for public release; distribution is unlimited FM 44-100 Field Manual No. 44-100

More information

Obstacle-Integration Principles

Obstacle-Integration Principles Chapter 3 Obstacle-Integration Principles Obstacle integration is the process of ensuring that the obstacle effects support the scheme of maneuver. Obstacle integration cuts across all functional areas

More information

Air-Sea Battle & Technology Development

Air-Sea Battle & Technology Development Headquarters U.S. Air Force Air-Sea Battle & Technology Development Col Gantt AF/A5XS 20 Mar 12 1 Agenda Background & Scope Definitions ASB Concept Overview ASB Central Idea: Networked, Integrated, Attack-in-Depth

More information

CHAPTER 10. PATROL PREPARATION

CHAPTER 10. PATROL PREPARATION CHAPTER 10. PATROL PREPARATION For a patrol to succeed, all members must be well trained, briefed, and rehearsed. The patrol leader must have a complete understanding of the mission and a thorough understanding

More information

Visual Sensing and Tracking:

Visual Sensing and Tracking: VISTA TRACKING SERVICES P.O. BOX 239, GALLOWAY, OHIO 43119 Phone: 614-906-8725(trak) - EMAIL: visualtracking@yahoo.com www.vistatracking.com VisTA Tracking Services, Mark Sexton. Copyright 2011 Tracking

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Army DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program

More information

EOD Courses ATOM Training Ltd Courses 2018

EOD Courses ATOM Training Ltd Courses 2018 ATOM EOD Courses Catalogue 2018 Published: Jan 2018 Version: V1.1 Publisher: ATOM Training Limited Alford House Epson Square White Horse Business Park Trowbridge Wiltshire BA14 0XG United Kingdom The courses

More information

EXPLOSIVE ORDNANCE DISPOSAL

EXPLOSIVE ORDNANCE DISPOSAL EXPLOSIVE ORDNANCE DISPOSAL 1. INTRODUCTION Page 1 of 5 Chapter 5 1.1 For the purpose of this NTSG the term unexploded ordnance (UXO) applies to all ordnance, munitions and landmines which may be found

More information

Chapter III ARMY EOD OPERATIONS

Chapter III ARMY EOD OPERATIONS 1. Interservice Responsibilities Chapter III ARMY EOD OPERATIONS Army Regulation (AR) 75-14; Chief of Naval Operations Instruction (OPNAVINST) 8027.1G; Marine Corps Order (MCO) 8027.1D; and Air Force Joint

More information

To be prepared for war is one of the most effectual means of preserving peace.

To be prepared for war is one of the most effectual means of preserving peace. The missions of US Strategic Command are diverse, but have one important thing in common with each other: they are all critical to the security of our nation and our allies. The threats we face today are

More information

ORGANIZATION AND OPERATION OF THE COMPANY COMMAND POST

ORGANIZATION AND OPERATION OF THE COMPANY COMMAND POST CHAPTER 2 ORGANIZATION AND OPERATION OF THE COMPANY COMMAND POST In the previous chapter, we learned about the importance of a proficient Combat Operations Center (COC). For a Combat Operations Center

More information

Expeditionary Maneuver Warfare & Combating Terrorism S&T Department

Expeditionary Maneuver Warfare & Combating Terrorism S&T Department Expeditionary Maneuver Warfare & Combating Terrorism S&T Department John C. Pazik, Ph.D., SES Head, Expeditionary Maneuver Warfare & Combating Terrorism S&T Department Feb 5 2015 Code 30: Expeditionary

More information

Proposal for the Suicide Bomb Detector Model # RDS400

Proposal for the Suicide Bomb Detector Model # RDS400 Proposal for the Suicide Bomb Detector Model # RDS400 Presented From: HSS Development 75 S. Broadway White Plains, NY 10601 USA Office: +1-914-304-4333 Web: www.secintel.com info@secintel.com (Email) 2017

More information

ADP337 PROTECTI AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY

ADP337 PROTECTI AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY ADP337 PROTECTI ON AUGUST201 2 DI STRI BUTI ONRESTRI CTI ON: Appr ov edf orpubl i cr el eas e;di s t r i but i oni sunl i mi t ed. HEADQUARTERS,DEPARTMENTOFTHEARMY This publication is available at Army

More information

IDENTIFY THE TROOP LEADING PROCEDURE

IDENTIFY THE TROOP LEADING PROCEDURE Lesson 1 IDENTIFY THE TROOP LEADING PROCEDURE Lesson Description: OVERVIEW In this lesson you will learn to identify the troop leading procedure (TLP) and its relationship with the estimate of the situation.

More information

San Diego Operational Area. Policy # 9A Effective Date: 9/1/14 Pages 8. Active Shooter / MCI (AS/MCI) PURPOSE

San Diego Operational Area. Policy # 9A Effective Date: 9/1/14 Pages 8. Active Shooter / MCI (AS/MCI) PURPOSE PURPOSE The intent of this Policy is to provide direction for performance of the correct intervention, at the correct time, in order to stabilize and prevent death from readily treatable injuries in the

More information

NATURE OF THE ASSAULT

NATURE OF THE ASSAULT Chapter 5 Assault Breach The assault breach allows a force to penetrate an enemy s protective obstacles and destroy the defender in detail. It provides a force with the mobility it needs to gain a foothold

More information

Wildland Firefighting

Wildland Firefighting 3s Explosives Safety Guide Wildland Firefighting ecognize etreat eport Firefighting is hazardous enough without the complication of munitions The potential presence of munitions can have a major impact

More information

Counter-Improvised Explosive Device Overview

Counter-Improvised Explosive Device Overview Counter-Improvised Explosive Device Overview April 2012 The IED Is a Global Threat //FOR OFFICIAL USE ONLY Mumbai, 13 Jul 2011 Multiple explosions (26 Killed / 130 Wounded) Nigeria, 12 Apr 2012 SVBIED

More information

Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations

Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations Predictive Battlespace Awareness: Linking Intelligence, Surveillance and Reconnaissance Operations to Effects Based Operations By Major Robert A. Piccerillo, USAF And David A. Brumbaugh Major Robert A.

More information

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release. White Paper 23 January 2014 DISTRIBUTION RESTRICTION: Approved for public release. Enclosure 2 Introduction Force 2025 Maneuvers provides the means to evaluate and validate expeditionary capabilities for

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction [National Security Presidential Directives -17] HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4 Unclassified version December 2002 Subject: National Strategy to Combat Weapons of Mass Destruction "The gravest

More information

The main tasks and joint force application of the Hungarian Air Force

The main tasks and joint force application of the Hungarian Air Force AARMS Vol. 7, No. 4 (2008) 685 692 SECURITY The main tasks and joint force application of the Hungarian Air Force ZOLTÁN OROSZ Hungarian Defence Forces, Budapest, Hungary The tasks and joint force application

More information

Summary Report for Individual Task M-2408 Implement Defensive Procedures When Under Attack/Ambush in a Truck Convoy Status: Approved

Summary Report for Individual Task M-2408 Implement Defensive Procedures When Under Attack/Ambush in a Truck Convoy Status: Approved Summary Report for Individual Task 551-88M-2408 Implement Defensive Procedures When Under Attack/Ambush in a Truck Convoy Status: Approved Report Date: 28 Jul 2014 Distribution Restriction: Approved for

More information

DEC CCO 3571.lA 3B. COMBAT CENTER ORDER 3571.lA. From: To: Commanding General Distribution List. Subj: EXPLOSIVE ORDNANCE DISPOSAL

DEC CCO 3571.lA 3B. COMBAT CENTER ORDER 3571.lA. From: To: Commanding General Distribution List. Subj: EXPLOSIVE ORDNANCE DISPOSAL UNITED STATES MARINE CORPS MARINE AIR GROUND TASK FORCE TRAINING COMMAND MARINE CORPS AIR GROUND COMBAT CENTER BOX 788100 TWENTYNINE PALMS, CALIFORNIA 92278-8100 COMBAT CENTER ORDER 3571.lA CCO 3571.lA

More information

RETROGRADE OPERATIONS

RETROGRADE OPERATIONS CHAPTER 11 RETROGRADE OPERATIONS A retrograde operation is a maneuver to the rear or away from the enemy. It is part of a larger scheme of maneuver to regain the initiative and defeat the enemy. Its propose

More information

CHAPTER 2 DUTIES OF THE FIRE SUPPORT TEAM AND THE OBSERVER

CHAPTER 2 DUTIES OF THE FIRE SUPPORT TEAM AND THE OBSERVER CHAPTER 2 DUTIES OF THE FIRE SUPPORT TEAM AND THE OBSERVER 2-1. FIRE SUPPORT TEAM a. Personnel and Equipment. Indirect fire support is critical to the success of all maneuver operations. To ensure the

More information

RECRUIT SUSTAINMENT PROGRAM SOLDIER TRAINING READINESS MODULES Every Soldier is a Sensor: Overview 17 June 2011

RECRUIT SUSTAINMENT PROGRAM SOLDIER TRAINING READINESS MODULES Every Soldier is a Sensor: Overview 17 June 2011 RECRUIT SUSTAINMENT PROGRAM SOLDIER TRAINING READINESS MODULES Every Soldier is a Sensor: Overview 17 June 2011 SECTION I. Lesson Plan Series Task(s) Taught Academic Hours References Student Study Assignments

More information

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) Exhibit R-2 0602712A Countermine Systems ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) FY 2005 FY 2006 FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 Total Program Element (PE) Cost 26267 29171 22088 21965

More information

Counter Improvised Explosive Devices

Counter Improvised Explosive Devices Counter Improvised Explosive Devices Centre of Excellence Course Catalog 2017 COUNTER IMPROVISED EXPLOSIVE DEVICES CENTRE OF EXCELLENCE INDEX Preface.... 3 C-IED COE Organization.... 4 Milestones... 5

More information

AUSA Army Artificial Intelligence and Autonomy Symposium and Exposition November 2018 Cobo Center, Detroit, MI. Panel Topic Descriptions

AUSA Army Artificial Intelligence and Autonomy Symposium and Exposition November 2018 Cobo Center, Detroit, MI. Panel Topic Descriptions AUSA Army Artificial Intelligence and Autonomy Symposium and Exposition 28-29 November 2018 Cobo Center, Detroit, MI Panel Topic Descriptions Introduction: The AUSA A/AI symposium panel topics are framed

More information

UNCLASSIFIED. R-1 Program Element (Number/Name) PE A / Landmine Warfare and Barrier Advanced Technology. Prior Years FY 2013 FY 2014 FY 2015

UNCLASSIFIED. R-1 Program Element (Number/Name) PE A / Landmine Warfare and Barrier Advanced Technology. Prior Years FY 2013 FY 2014 FY 2015 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Army Date: March 2014 2040: Research, Development, Test & Evaluation, Army / BA 3: Advanced Technology Development (ATD) COST ($ in Millions) Prior

More information

5 th Annual EOD/IED & Countermine Symposium

5 th Annual EOD/IED & Countermine Symposium Defense Strategies Institute professional educational forum: 5 th Annual EOD/IED & Countermine Symposium Advancing Counter-IED Capabilities & Decision Support at Home and Abroad November 14-15, 2017 Mary

More information

EXPLOSIVE ORDNANCE DISPOSAL OPERATIONS DECEMBER 2011

EXPLOSIVE ORDNANCE DISPOSAL OPERATIONS DECEMBER 2011 ATTP 4-32 EXPLOSIVE ORDNANCE DISPOSAL OPERATIONS DECEMBER 2011 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. Headquarters, Department of the Army This publication is

More information

Subj: MARINE CORPS POLICY ON ORGANIZING, TRAINING, AND EQUIPPING FOR OPERATIONS IN AN IMPROVISED EXPLOSIVE DEVICE (IED) ENVIRONMENT

Subj: MARINE CORPS POLICY ON ORGANIZING, TRAINING, AND EQUIPPING FOR OPERATIONS IN AN IMPROVISED EXPLOSIVE DEVICE (IED) ENVIRONMENT DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350-3000 MCO 3502.9 POG 15 Jul 2014 MARINE CORPS ORDER 3502.9 From: Commandant of the Marine Corps

More information

LESSON 2 INTELLIGENCE PREPARATION OF THE BATTLEFIELD OVERVIEW

LESSON 2 INTELLIGENCE PREPARATION OF THE BATTLEFIELD OVERVIEW LESSON DESCRIPTION: LESSON 2 INTELLIGENCE PREPARATION OF THE BATTLEFIELD OVERVIEW In this lesson you will learn the requirements and procedures surrounding intelligence preparation of the battlefield (IPB).

More information

The Army Universal Task List

The Army Universal Task List Change No. 5 FM 7-15, C5 Headquarters Department of the Army Washington, DC, 9 December 2010 The Army Universal Task List 1. Change 5 to FM 7-15, 27 February 2009, updates the tasks with chemical, biological,

More information

Infantry Battalion Operations

Infantry Battalion Operations .3 Section II Infantry Battalion Operations MCWP 3-35 2201. Overview. This section addresses some of the operations that a task-organized and/or reinforced infantry battalion could conduct in MOUT. These

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Task Number: 01-6-0029 Task Title: Maintain the BCT Current Situation for Aviation Supporting Reference(s): Step Number Reference ID Reference Name Required Primary

More information

Warrior Tasks and Battle Drills

Warrior Tasks and Battle Drills Soldier Critical Skills Warrior Tasks and Battle Drills Shoot Maintain, employ, engage with assigned weapon system Employ hand grenades Move Perform individual movement techniques Navigate from one point

More information

2009 ARMY MODERNIZATION WHITE PAPER ARMY MODERNIZATION: WE NEVER WANT TO SEND OUR SOLDIERS INTO A FAIR FIGHT

2009 ARMY MODERNIZATION WHITE PAPER ARMY MODERNIZATION: WE NEVER WANT TO SEND OUR SOLDIERS INTO A FAIR FIGHT ARMY MODERNIZATION: WE NEVER WANT TO SEND OUR SOLDIERS INTO A FAIR FIGHT Our Army, combat seasoned but stressed after eight years of war, is still the best in the world and The Strength of Our Nation.

More information

By 1LT Derek Distenfield and CW2 Dwight Phaneuf

By 1LT Derek Distenfield and CW2 Dwight Phaneuf By 1LT Derek Distenfield and CW2 Dwight Phaneuf This article explains how Task Force Commando; 10th Mountain Division utilized both human factors and emerging technology to better utilize Unmanned Aircraft

More information

1. What is the purpose of common operational terms?

1. What is the purpose of common operational terms? Army Doctrine Publication 1-02 Operational Terms and Military Symbols 1. What is the purpose of common operational terms? a. Communicate a great deal of information with a simple word or phrase. b. Eliminate

More information

The Infantry Rifle Platoon and Squad

The Infantry Rifle Platoon and Squad FM 3-21.8 (FM 7-8) The Infantry Rifle Platoon and Squad MARCH 2007 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS DEPARTMENT OF THE ARMY This page intentionally

More information

PM Close Combat Systems Briefing for: Precision Strike Association. June 2009

PM Close Combat Systems Briefing for: Precision Strike Association. June 2009 PM Close Combat Systems Briefing for: Precision Strike Association NDIA Picatinny Chapter June 2009 Mr. Joe Pelino Deputy Product Manager, IMS (973) 724-3457 joe.pelino@us.army.mil PM CCS Mission Provide

More information

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 4.5

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 4.5 PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 4.5 Issued Date: 05-10-13 Effective Date: 05-10-13 Updated Date: SUBJECT: BOMB SCARES, EXPLOSIVE DEVICES AND EXPLOSIONS 1. POLICY A. The discovery of explosive

More information

The 19th edition of the Army s capstone operational doctrine

The 19th edition of the Army s capstone operational doctrine 1923 1939 1941 1944 1949 1954 1962 1968 1976 1905 1910 1913 1914 The 19th edition of the Army s capstone operational doctrine 1982 1986 1993 2001 2008 2011 1905-1938: Field Service Regulations 1939-2000:

More information

Engineering Operations

Engineering Operations MCWP 3-17 Engineering Operations U.S. Marine Corps PCN 143 000044 00 To Our Readers Changes: Readers of this publication are encouraged to submit suggestions and changes that will improve it. Recommendations

More information

Searching for explosive hazards with handheld mine detectors can be both physically SREHD SHREDS COMPETITION. the HANDHELD

Searching for explosive hazards with handheld mine detectors can be both physically SREHD SHREDS COMPETITION. the HANDHELD SREHD SCANNING SREHD s onboard stereo camera helps it maneuver through urban or rough terrain with minimal input from the human operator. The robotic system provides Soldiers the freedom to maneuver on

More information

Trusted Partner in guided weapons

Trusted Partner in guided weapons Trusted Partner in guided weapons Raytheon Missile Systems Naval and Area Mission Defense (NAMD) product line offers a complete suite of mission solutions for customers around the world. With proven products,

More information

Headquarters, Department of the Army

Headquarters, Department of the Army FM 3-21.12 The Infantry Weapons Company July 2008 Distribution Restriction: Approved for public release; distribution is unlimited. Headquarters, Department of the Army This page intentionally left blank.

More information

Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob

Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob Infantry Companies Need Intelligence Cells Submitted by Captain E.G. Koob Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated

More information

Training and Evaluation Outline Report

Training and Evaluation Outline Report Training and Evaluation Outline Report Status: Approved 07 Jan 2015 Effective Date: 03 Oct 2016 Task : 71-8-7648 Task Title: Plan Offensive Operations During Counterinsurgency Operations (Brigade - Distribution

More information

The C-IED COE What we have been up to

The C-IED COE What we have been up to COUNTER IMPROVISED EXPLOSIVE DEVICES CENTRE OF EXCELLENCE C-IED COE The C-IED COE What we have been up to 21 JUNE 2016 COL Evans, Dep Dir CIED COE, mevans@ciedcoe.org C-IED COE: Agenda Operational Environment

More information

NDIA Ground Robotics Symposium

NDIA Ground Robotics Symposium NDIA Ground Robotics Symposium Mr. Tom Dee DASN ELM 703-614-4794 Pentagon 4C746 1 Agenda Context Current environment Robotics Way Ahead AAV MRAP Family of Vehicles 2 ELM Portfolio U.S. Marine Corps ground

More information

IMAS Second Edition 01 October 2008 Amendment 4, June 2013

IMAS Second Edition 01 October 2008 Amendment 4, June 2013 IMAS 09.30 01 October 2008 Amendment 4, June 2013 Explosive ordnance disposal Director, United Nations Mine Action Service (UNMAS), 380 Madison Avenue, M11023 New York, NY 10017 USA Email: mineaction@un.org

More information

Tactical Employment of Mortars

Tactical Employment of Mortars MCWP 3-15.2 FM 7-90 Tactical Employment of Mortars U.S. Marine Corps PCN 143 000092 00 *FM 7-90 Field Manual NO. 7-90 FM 7-90 MCWP 3-15.2 TACTICAL EMPLOYMENT OF MORTARS HEADQUARTERS DEPARTMENT OF THE

More information

COUNTER IMPROVISED EXPLOSIVE DEVICES CENTRE OF EXCELLENCE

COUNTER IMPROVISED EXPLOSIVE DEVICES CENTRE OF EXCELLENCE COUNTER IMPROVISED EXPLOSIVE DEVICES CENTRE OF EXCELLENCE UN CCW APII Experts meeting Major Niels van Bekkum C IED COE Opertaions Officer 09 th 09 th April 2013 Agenda Who are we? What are we doing? Observations

More information

Overview of Physical Security and Protective Measures

Overview of Physical Security and Protective Measures Overview of Physical Security and Protective Measures NAVFAC Northwest Presented by: Richard Cofer, P.E. Naval Facilities Engineering Command Atlantic Capital Improvements Business Line Engineering Criteria

More information

C4I System Solutions.

C4I System Solutions. www.aselsan.com.tr C4I SYSTEM SOLUTIONS Information dominance is the key enabler for the commanders for making accurate and faster decisions. C4I systems support the commander in situational awareness,

More information

C H A R A C T E R I S T I C S O F

C H A R A C T E R I S T I C S O F Defensive operations are conducted with the immediate purpose of causing an enemy attack to fail. Defensive operations may also achieve one or more of the following: gain time; concentrate forces elsewhere;

More information

PORTFOLIO OF SPECIALIST TRAINING COURSES

PORTFOLIO OF SPECIALIST TRAINING COURSES PORTFOLIO OF SPECIALIST TRAINING About Us Explosive Risk Management is a leading company in the provision of training design and delivery across multiple disciplines within the defence and security sector.

More information

Concept of I MEF Advisor Training

Concept of I MEF Advisor Training Concept of I MEF Advisor Training Mission To provide Advisor Teams with blocks II III B training IOT prepare them for block IV assessment at the Advisor Training Group (ATG) at 29 Palms and follow-on deployment.

More information

TACTICAL ROAD MARCHES AND ASSEMBLY AREAS

TACTICAL ROAD MARCHES AND ASSEMBLY AREAS APPENDIX Q TACTICAL ROAD MARCHES AND ASSEMBLY AREAS Section I. TACTICAL ROAD MARCHES Q-1. GENERAL The ground movement of troops can be accomplished by administrative marches, tactical movements, and tactical

More information

(QJLQHHU 5HFRQQDLVVDQFH FM Headquarters, Department of the Army

(QJLQHHU 5HFRQQDLVVDQFH FM Headquarters, Department of the Army FM 5-170 (QJLQHHU 5HFRQQDLVVDQFH Headquarters, Department of the Army DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *FM 5-170 Field Manual No. 5-170 Headquarters Department

More information

forces operating in Afghani - stan continue to be subjected to frequent and deadly attacks from insurgents using improvised explosive devices

forces operating in Afghani - stan continue to be subjected to frequent and deadly attacks from insurgents using improvised explosive devices By LTG Michael A. Vane and MG David E. Quantock U.S. Army/SSG Tracy Hohman U.S. Army engineers prepare to fire an M-58 mine-clearing line charge to rid a new supply route of possible improvised explosive

More information