Counter IED Smartbook – Download as PDF File .pdf), Text File .txt) or read online. COUNTER Improvised Explosive Device. SMART BOOK. X TABLE OF CONTENTS 1. Types of IED’s Vehicle born Radio + Timer Command + Victim operated. C Improvised Explosive Device SMART BOOK Preface Tab AIED Attack Terminology . .2 Counter IED Principles Improvised Explosive.
|Published (Last):||25 September 2015|
|PDF File Size:||19.8 Mb|
|ePub File Size:||10.44 Mb|
|Price:||Free* [*Free Regsitration Required]|
Main Page Country index Follow us. Tips for Sources After Submitting.
ciunter This includes other media organisations. Was classified, confidential, censored or otherwise withheld from the public before release. Watch the event in its entirety here: What computer to use If iedd computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you.
IEDs are one of the main causes of casualties among troops and exact a heavy toll on local populations. Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to.
Technical users can also use Tails to help ensure you do not leave any records of your submission on the sartbook. If you have any issues talk to WikiLeaks.
Spain is amartbook the lead on testing various stand-off detection technologies, while Slovakia is focusing on activities, technologies and procedures for IED “Render-Safe” operations in line with an Explosive Ordnance Disposal initiative. Was first publicly revealed by WikiLeaks working with our source. If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. Views Page discuss View source.
Is of political, diplomatic, ethical or historical significance. Any questions about this document’s veracity are noted. Advanced users, if they wish, can also add a further layer of encryption to their submission using our public PGP key. Copy this address into your Tor browser.
You can only access this submissions system through Tor. C-IED activities require multidisciplinary knowledge. The Alliance focuses on reducing the frequency and severity of IED attacks, while also targeting the networks that facilitate them.
Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us.
IEDs can be hidden anywhere: Allied Reach Conference Read More. To get more information about the CoE Courses please click here. If you face legal action If a legal action is brought against you as counted result of your submission, there are organisations that may help couter. Personal tools Log in.
Do not talk about your submission to others If you have any issues talk to WikiLeaks. Submit documents to WikiLeaks.
Iraq Counter IED Smart Book – WikiLeaks
Trident Juncture 18 Read More. The adaptability of IEDs to almost any situation makes them difficult to detect and stop, which is why NATO members and partners are using several methods to increase counter IED capabilities. The study and much more is available clicking here. If you are oed high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.
Submit documents to WikiLeaks
For example, the Emerging Security Challenges ESC Division has several science initiatives that focus on developing sensors to detect explosive before they can claim lives. We also advise you to read our tips for sources before submitting.
They can be deployed everywhere: