U.S. Army on Improvised Explosive Device Defeat
Improvised explosive devices (IEDs) are a major source of U.S. and allied casualties in Iraq. Military doctrine for confronting and defeating the IED threat is set forth in a 2005 U.S. Army field manual (excerpt, pdf).
“The proliferation of IEDs on the battlefield in both Iraq and Afghanistan has posed the most pervasive threat facing coalition forces in those theaters,” the manual states. “The persistent effectiveness of this threat has influenced unit operations, U.S. policy, and public perception.”
The manual discusses the nature of the threat, describes the defining characteristics of IEDs, and presents a framework for developing opposing strategy and tactics.
The manual has not been approved for public release and portions of the document that may be operationally sensitive are being withheld from publication online by Secrecy News.
See “Improvised Explosive Device Defeat (excerpt),” Field Manual Interim FMI 3-34.119, September 2005 (44 pages of a total 142 pages).
The 2005 document makes no mention of the explosively formed projectiles (EFPs) that have recently been described by the Department of Defense as a particularly dangerous variant of IED. See a February 11, 2007 DoD briefing on “Iranian Support for Lethal Activity in Iraq,” via TPM Muckraker.
To increase the real and perceived benefit of research funding, funding agencies should develop challenge goals for their extramural research programs focused on the impact portion of their mission.
Without trusted mechanisms to ensure privacy while enabling secure data access, essential R&D stalls, educational innovation stalls, and U.S. global competitiveness suffers.
Satellite imagery has long served as a tool for observing on-the-ground activity worldwide, and offers especially valuable insights into the operation, development, and physical features related to nuclear technology.
This year’s Red Sky Summit was an opportunity to further consider what the role of fire tech can and should be – and how public policy can support its development, scaling, and application.