Search results
Results from the WOW.Com Content Network
Counter-IED efforts involve conducting specialized analysis to identify vulnerabilities, inter-dependencies, and cascading effects of the IED threat network Nodal Activity Model. These vulnerability assessments are the foundation of a risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of an IED ...
Although there was fierce fighting such as the Battle of Tora Bora and Operation Anaconda, the IED threat remained generally low until later in the war. Afghanistan is a rural country with rough terrain, most of the roads are unimproved and due to the abundance of rivers many culverts are present. Because of this IED threats are numerous.
JIDO was born from the Joint IED Defeat Organization (JIEDDO) established in 2006, which focused on IEDs. [3] JIDO's mission is to "enable Department of Defense actions to counter improvised threats with tactical responsiveness and anticipatory acquisition in support of combatant commanders' efforts to prepare for, and adapt to, battlefield ...
For premium support please call: 800-290-4726 more ways to reach us
IED Countermeasure Equipment (ICE): In the fall of 2004, the Army Research Laboratory (ARL) at White Sands Missile Range in New Mexico and New Mexico State University's Physical Science Laboratory developed a jamming system that uses low-power radio frequency energy to block the radio signals that detonate enemy IEDs.
Counter-IED Section – Provides training, equipment, and advanced technical support to prevent and effectively respond to terrorist or criminal use of hazardous devices explosives and weapons of mass destruction. Critical Incident Intelligence Unit – Provides intelligence to inform operational planning and strategic decision-making.
An IED has five components: a switch (activator), an initiator (fuse), container (body), charge (explosive), and a power source (battery). An IED designed for use against armoured targets such as personnel carriers or tanks will be designed for armour penetration, by using a shaped charge that creates an explosively formed penetrator. IEDs are ...
Main page; Contents; Current events; Random article; About Wikipedia; Contact us