1 / 17

REACT TO A POSSIBLE IMPROVISED EXPLOSIVE DEVICE

REACT TO A POSSIBLE IMPROVISED EXPLOSIVE DEVICE. SGT. PHILIP MASSIE HQ/A. 1-6 ADA U.S. ARMY. Task: React to a Possible Improvised Explosive Device (IED) Condition: During military operations you encounter a "Possible Improvised Explosive Device (IED)".

Download Presentation

REACT TO A POSSIBLE IMPROVISED EXPLOSIVE DEVICE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. REACT TO A POSSIBLE IMPROVISED EXPLOSIVE DEVICE SGT. PHILIP MASSIE HQ/A. 1-6 ADA U.S. ARMY

  2. Task: React to a Possible Improvised Explosive Device (IED) Condition: During military operations you encounter a "Possible Improvised Explosive Device (IED)". Standard: Properly establish initial exclusion area, security, and report "Possible Improvised Explosive Device (IED)" to Higher HQ with 100% accuracy.

  3. IDENTIFYING THE IED THREAT • The Improvised Explosive Device, or IED, is the predominant killer of US troops in Iraq today. Since the initial invasion in 2003, they have become increasingly sophisticated and deadly. If a terrorist organization ever decided to use them to any great extent in the US, the effects would be devastating. We are going to look at the fixed IED as opposed to a Vehicle Borne IED (VBIED,) simply for space and to better cover each subject individually. • First off, there is one rule that will enhance your survivability tremendously: Never set a pattern! If you are able to, have at least three different routes to and from your destination, and vary them. Not only your routes, but your times as well. The harder you are for the enemy to track, the better your chances of survival. • In 2003, the roadside bombs, as they were simply called, were mainly old artillery shells packed with plastic explosives and placed on the side of the road with a simple trigger such as a cell phone of pager, or land mines that would be buried in the road. Once the convoy of vehicles was spotted, all that was required was for one of the bad guys to make the call, using his cell phone, to the triggering device. Or, the convoy would simply drive over the land mine, not suspecting one had been emplaced in the asphalt. They could also be emplaced by railroad tracks, on the side of the road attached to a guardrail, or at an intersection, either in the road or inside a stoplight pole. • As time went on and these roadside bombs were found and defeated, the enemy came up with new and more ingenious methods for using them. One technique was to use dead animals, and place the IED inside of them. Since there was an abundance of dead dogs on the side of the roads, no one would ever suspect! Another technique was to "daisy chain," or wire several bombs together at one time to cover a greater area. Also, they were found in concrete blocks, behind road signs, and hidden in current roadside construction debris. Many of these techniques are still being used today, in 2007, with tragic results. A new threat has emerged this year, the Explosively Formed Penetrator. This device, which acts very much like a sabot round, is a copper formed, shaped projectile designed to penetrate the heaviest of armor plating, and has been highly effective against US and Coalition Force vehicles. A standard car would stand no chance.

  4. IDENTIFYING THE IED THREATCONT. • So, how to identify a potential IED? Just the thought of one is terrifying to most people, as it well should be! Vigilance is the key word here. All IEDs require the initiating system to be near the main charge. Common initiating systems, or triggers, include cell phones, walkie talkies, keychain car alarm fobs, garage door openers, or pagers. Anything that will receive a radio or electronic signal. Key indicators are freshly dug areas, dead animals on the side of the road, or people milling around where they shouldn't be, i.e., a group of people under or on top of a highway overpass. If you see any type of signal, such as lights or flares or warning flags, these are also indicators, along with obstacles in the road that will force you into a "choke point," where your escape options become nil. Any of these should set off your "spidey sense," which you need to listen to! • Wires or other obvious indicators in the open will alert you to the presence of an IED, but it can also alert you to the fact that it may be a "hoax" IED, designed to channel you into an area that you may consider safe, but in reality has been already wired by an enemy with the true IED. Hoax IEDs, or secondary IEDs have been used in Israel and Iraq against first responders who have come in response to either a fake bomb, or have come to aid the victims of one IED, only to become victims themselves. • If you suspect an IED, get out of the area as quickly as possible. When you are satisfied you are out of the kill zone, call and alert the authorities. Do not use your phone while you are still in the area! You can set off the triggering device! Let the authorities know what you have seen so they don't walk into the situation blind, then let them handle it. Will the US ever see the widespread use of IEDs like Israel has, or Iraq? I hope and pray not, but maybe you now have some idea of how to identify the threat, and strategies to survive another day.

  5. TYPES OF IMPROVISED EXPLOSIVE DEVICES • THERE ARE MANY TYPES OF IED’S. THE TWO RESPONSIBLE FOR MOST DEATHS TO U.S. AND COALITION FORCES ARE… • GROUND BASED IED’S (I.E.D) • VEHICLE BORNE IED’S (V.B.I.E.D.)

  6. TYPICAL GROUND (IED) • THE TYPICAL GROUND (IED) CAN BE MADE OF THE SIMPLEST MATERIAL. • USUALLY CONSISTING OF A FEW POUNDS OF EXPLOSIVES OR ARTILLERY MUNITIONS, A CHARGE , AND A REMOTE DEVICE, THESE CAN BE EXTREMELY DEADLY. • THESE CAN ALSO BE VERY LARGE AND VERY INTRICATE IN DESIGN. IN SOME CASES THE ATTACKERS HAVE EVEN USED LARGER AIRCRAFT MUNITIONS (500 LBS.).

  7. IDENTIFYING GROUND BASED I.E.D.’S • THESE ARE USUALLY EASY TO SPOT BECAUSE THEY ARE SET UP MOMENTS BEFORE A CONVOY OR GROUND UNIT MOVES THROUGH AN AREA. • THIS MAKES IT HARDER FOR THE ATTACKERS TO COVER THEIR TRACKS. • BECAUSE OF RAPID DEPLOYMENT, THE ATTACKERS USUALLY DON’T HIDE TRIGGER WIRES AND LEAVE OTHER PARTS OF THE DEVICE EXPOSED.

  8. IDENTIFYING VEHICLE BORNE I.E.D.’S • Don’t think that the VBIED, which may sound like typical army jargon, simply describes a car bomb. • From the buses that are commandeered into causing mass accidents (Israel) to boat bombs (USS Cole) and even the airliners (9/11) used as WMD’s, the VBIED can come in many forms. • As all security professionals know, we should think the unthinkable when it comes to terror in general but especially so with a VBIED. • These weapons are usually large with the intent to cause maximum death and destruction.

  9. IDENTIFYING THE V.B.I.E.D. • THESE CAN COME FROM ANY PLACE AT ANY TIME. • IT COULD BE AN ABANDONED VEHICLE ON THE SIDE OF THE ROAD, OR A SUICIDE BOMBER INTENT ON DRIVING ON TO AN INSTALLATION OR RUNNING A CHECKPOINT. • ATTENTION TO DETAIL IS KEY TO IDENTIFYING THESE I.E.D.’S. FROM PAYING CLOSE ATTENTION TO ALL VEHICLE’S APPROACHING AN ECP, TO BEING CAUTIOUS OF ALL VEHICLE’S IN AND AROUND CHOKE POINTS AND BOTTLENECKS.

  10. IMMEDIATE ACTIONS • Properly establish initial exclusion AREA. • INITIATE SECURITY OF THE AREA. • REPORT “POSSIBLE I.E.D.” TO HIGHER HQ. WITH 100% ACCURACY. • CONTINUE SECURITY AND HOLD FOR EOD.

  11. ESTABLISHING AN INTIAL EXCLUSION AREA • ONCE AN I.E.D. OR V.B.I.E.D HAS BEEN IDENTIFIED CHECK IMMEDIATE SURROUNDINGS FOR PONTENTIAL SECONDARY DEVICES. • CHECK YOUR FIVE’S, TWENTY FIVE’S, AND OUT TO ONE HUNDRED METERS. • THIS WILL ENSURE THAT THE DEVICE IS NOT A DECOY FOR A SECONDARY DEVICE, OR THE DEVICE IS NOT DAISY CHAINED TO A STRING OF DEVICES. • ONCE THE DEVICE(S) HAS BEEN FOUND AND PROPERLY MARKED, CORDON OFF THE ENTIRE AREA.

  12. INITIATE SECURITY OF THE AREA • ONCE ALL I.E.D’S IN THE AREA HAVE BEEN IDENTIFIED, SET A 360 DEGREE PERIMETER SCAN FAR AND NEAR, HIGH AND LOW. • CLEAR ALL PERSONEL AND EQUIPMENT FROM THE BLAST AREA. • KEEP IN MIND THE SIZE OF THE DEVICE(S) AND AMOUNT OF MUNITIONS USED TO ENSURE THE SAFE AREA IS LARGE ENOUGH TO CONTAIN THE BLAST IN CASE AN EXPLOLSION OCCURS. • MAINTAIN POSITIVE CONTROL OF THE BLAST AREA UNTIL EOD ARRIVES.

  13. REPORTING AN I.E.D. USING A 9 LINE I.E.D./UXO REPORT • LINE 1. DATE-TIME-GROUP: WHEN WAS THE ITEM DISCOVERED • LINE 2. REPORT ACTIVITY LOCATION: UNIT AND GRID LOCATION OF THE IED/UXO. • LINE 3.CONTACT METHOD: RADIO FREQUENCY, CALL SIGN, POC, AND TELEPHONE NUMBER. • LINE 4. TYPE OF ORDINANCE: DROPPED, PLACED, THROWN, PROJECTED. GIVE NUMBER OF ITEMS IF MORE THAN ONE. • LINE 5. NBC CONTAMINATIONS: BE AS SPECIFIC AS POSSIBLE.

  14. REPORT AN IED CONT. • LINE 6. RESOUCES THREATENED: EQUIPMENT, FACILITIES OR OTHER ASSETS THAT ARE THREATENED. • LINE 7. IMPACT ON MISSION: SHORT DESCRIPTION OF CURRENT TACTICAL SITUATION AND HOW THE IED/UXO EFFECTS THE MISSION. • LINE 8. PROTECTIVE MEASURES: ANY PROTECTIVE MEASURES TAKEN TO PROTECT PERSONEL AND EQUIPMENT. • LINE 9. RECOMMENDED PRIORITY: IMMEDIATE, INDIRECT, MINOR, NO THREAT.

  15. PRIORITY • Immediate: Stops unit’s maneuver and mission capability or threatens critical assets vital to the mission • Indirect: Stops the unit’s maneuver and mission capability or threatens critical assets important to the mission • Minor: Reduces the unit’s maneuver and mission capability or threatens non-critical assets of value. • No Threat: Has little or no effect on the unit’s capabilities or assets.

  16. QUESTIONS?

More Related