This book also provides additional information on search tactics, techniques and procedures and c ied report formats essential for the safe conduct of daytoday missions. Iraq counter ied smart book wikileaks remove traces of your submission if you are a highrisk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used. Counteried education strengthens west point summer training program. Obp provides a wide array of awareness productsincluding cards, posters, checklists, guides, videos, briefings, and applicationsthat share counteried awareness information with the general public and across the public and private sectors to prevent, protect against, respond to, and mitigate bombing incidents. Gta 90100461 pagesfor official use onlyseptember 24, 2009the five cswhile the 5cs are conducted in no specific order, the response must be instinctive, effective and bas. Purpose the purpose of this smart book is to provide ied information to soldiers, sailors, airmen and marines of the coalition forces in the ito. Counteried warfare was envisioned along the same lines. The counteried smart book for predeployment and field use has been designed as a compact and concise comprehensive reference guide for afghanistan.
This book also provides additional information on search tactics, techniques and procedures and cied report formats essential for the safe conduct of. The counter ied smart book for predeployment and field use has been designed as a compact and concise comprehensive reference guide to address the afghanistan fight, from the culture and geography to specific ttps about ieds. Clear all personnel are to be moved away from the suspect item. The counteried smart book for predeployment and field use has been designed as a compact and concise comprehensive reference guide to address the afghanistan fight, from the culture and geography to specific ttps about ieds. Kwikpoint counteried smart book version 2 ads, inc.
Counter ied smart book 2007 improvised explosive device. A signal is sent to the initiator which activates the main charge e. Afghanistan isaf counteried smart book november 18, 2009. Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to in order to use the wikileaks public submission system as detailed above you can download the tor browser bundle, which is a firefoxlike browser available for windows, mac os x and gnulinux and preconfigured to. The purpose of this smart book is to provide ied information to soldiers, sailors, airmen and marines of the coalition forces in the ito. Afghanistan counter ied pagesjanuary 10, 2009an ied is triggered by the firing system e. Jul 16, 2012 counter ied education strengthens west point summer training program. Counterimprovised explosive device smart book with a visual awareness.
Counteried education strengthens west point summer. Ied simplified definition 4 firing system 4 power source 4 initiator 5 main charge 5 2. Meigs, literally wrote the book on data and antisubmarine warfare. Scribd is the worlds largest social reading and publishing site.
Counter ied smart book improvised explosive device warfare. Handbook04 ied identification update jul 06 wikimedia. The purpose of this smart book is to provide ied information to soldiers. Cjtf7 oif smart card 4 1 2 3 4 56 this card has been compiled by the cjtf7 call representative proponent for this card is cjtf7 c3 training cell call lno. Call eod using the spot report followed by an ieduxo 9 line report. Multinational corps iraq counteried smart book 2008. C improvised explosive device smart book preface tab aied attack terminology. Ied simplified definition 4 firing system 4 power source 4. Counter improvised explosive device smart book with a visual awareness. Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to in order to use the wikileaks public submission system as detailed above you can download the tor browser bundle, which is a firefoxlike browser available for windows, mac os x and gnulinux and preconfigured to connect using the.
1009 726 271 78 422 80 125 339 970 886 114 1539 1607 1563 1271 827 534 1027 1054 1165 212 784 379 587 373 1053 353 627 50 1340 128 1044 1051