react to a possible improvised explosive device

advertisement
REACT TO A POSSIBLE
IMPROVISED
EXPLOSIVE DEVICE
SGT. PHILIP MASSIE
HQ/A. 1-6 ADA
U.S. ARMY
Task: React to a Possible Improvised Explosive
Device (IED)
Condition: During military operations you
encounter a "Possible Improvised Explosive
Device (IED)".
Standard: Properly establish initial exclusion
area, security, and report "Possible Improvised
Explosive Device (IED)" to Higher HQ with 100%
accuracy.
IDENTIFYING THE IED THREAT


The Improvised Explosive Device, or IED, is the predominant killer of US troops in Iraq today. Since
the initial invasion in 2003, they have become increasingly sophisticated and deadly. If a terrorist
organization ever decided to use them to any great extent in the US, the effects would be
devastating. We are going to look at the fixed IED as opposed to a Vehicle Borne IED (VBIED,)
simply for space and to better cover each subject individually.
First off, there is one rule that will enhance your survivability tremendously: Never set a pattern!
If you are able to, have at least three different routes to and from your destination, and vary them.
Not only your routes, but your times as well. The harder you are for the enemy to track, the better
your chances of survival.

In 2003, the roadside bombs, as they were simply called, were mainly old artillery shells packed
with plastic explosives and placed on the side of the road with a simple trigger such as a cell phone
of pager, or land mines that would be buried in the road. Once the convoy of vehicles was spotted,
all that was required was for one of the bad guys to make the call, using his cell phone, to the
triggering device. Or, the convoy would simply drive over the land mine, not suspecting one had
been emplaced in the asphalt. They could also be emplaced by railroad tracks, on the side of the
road attached to a guardrail, or at an intersection, either in the road or inside a stoplight pole.

As time went on and these roadside bombs were found and defeated, the enemy came up with new
and more ingenious methods for using them. One technique was to use dead animals, and place
the IED inside of them. Since there was an abundance of dead dogs on the side of the roads, no
one would ever suspect! Another technique was to "daisy chain," or wire several bombs together at
one time to cover a greater area. Also, they were found in concrete blocks, behind road signs, and
hidden in current roadside construction debris. Many of these techniques are still being used today,
in 2007, with tragic results. A new threat has emerged this year, the Explosively Formed Penetrator.
This device, which acts very much like a sabot round, is a copper formed, shaped projectile
designed to penetrate the heaviest of armor plating, and has been highly effective against US and
Coalition Force vehicles. A standard car would stand no chance.
IDENTIFYING THE IED THREAT
CONT.

So, how to identify a potential IED? Just the thought of one is terrifying to most people, as it well
should be! Vigilance is the key word here. All IEDs require the initiating system to be near the
main charge. Common initiating systems, or triggers, include cell phones, walkie talkies, keychain
car alarm fobs, garage door openers, or pagers. Anything that will receive a radio or electronic
signal. Key indicators are freshly dug areas, dead animals on the side of the road, or people milling
around where they shouldn't be, i.e., a group of people under or on top of a highway overpass. If
you see any type of signal, such as lights or flares or warning flags, these are also indicators, along
with obstacles in the road that will force you into a "choke point," where your escape options
become nil. Any of these should set off your "spidey sense," which you need to listen to!

Wires or other obvious indicators in the open will alert you to the presence of an IED, but it can
also alert you to the fact that it may be a "hoax" IED, designed to channel you into an area that
you may consider safe, but in reality has been already wired by an enemy with the true IED. Hoax
IEDs, or secondary IEDs have been used in Israel and Iraq against first responders who have come
in response to either a fake bomb, or have come to aid the victims of one IED, only to become
victims themselves.

If you suspect an IED, get out of the area as quickly as possible. When you are satisfied you are
out of the kill zone, call and alert the authorities. Do not use your phone while you are still in the
area! You can set off the triggering device! Let the authorities know what you have seen so they
don't walk into the situation blind, then let them handle it.
Will the US ever see the widespread use of IEDs like Israel has, or Iraq? I hope and pray not, but
maybe you now have some idea of how to identify the threat, and strategies to survive another
day.
TYPES OF IMPROVISED
EXPLOSIVE DEVICES

THERE ARE MANY TYPES OF IED’S. THE
TWO RESPONSIBLE FOR MOST DEATHS
TO U.S. AND COALITION FORCES ARE…


GROUND BASED IED’S (I.E.D)
VEHICLE BORNE IED’S (V.B.I.E.D.)
TYPICAL GROUND (IED)



THE TYPICAL GROUND (IED) CAN BE MADE OF
THE SIMPLEST MATERIAL.
USUALLY CONSISTING OF A FEW POUNDS OF
EXPLOSIVES OR ARTILLERY MUNITIONS, A
CHARGE , AND A REMOTE DEVICE, THESE CAN
BE EXTREMELY DEADLY.
THESE CAN ALSO BE VERY LARGE AND VERY
INTRICATE IN DESIGN. IN SOME CASES THE
ATTACKERS HAVE EVEN USED LARGER AIRCRAFT
MUNITIONS (500 LBS.).
IDENTIFYING GROUND BASED
I.E.D.’S

THESE ARE USUALLY EASY TO SPOT BECAUSE
THEY ARE SET UP MOMENTS BEFORE A CONVOY
OR GROUND UNIT MOVES THROUGH AN AREA.

THIS MAKES IT HARDER FOR THE ATTACKERS
TO COVER THEIR TRACKS.

BECAUSE OF RAPID DEPLOYMENT, THE
ATTACKERS USUALLY DON’T HIDE TRIGGER
WIRES AND LEAVE OTHER PARTS OF THE DEVICE
EXPOSED.
IDENTIFYING VEHICLE BORNE
I.E.D.’S




Don’t think that the VBIED, which may sound like
typical army jargon, simply describes a car bomb.
From the buses that are commandeered into
causing mass accidents (Israel) to boat bombs
(USS Cole) and even the airliners (9/11) used as
WMD’s, the VBIED can come in many forms.
As all security professionals know, we should
think the unthinkable when it comes to terror in
general but especially so with a VBIED.
These weapons are usually large with the intent
to cause maximum death and destruction.
IDENTIFYING THE V.B.I.E.D.



THESE CAN COME FROM ANY PLACE AT ANY
TIME.
IT COULD BE AN ABANDONED VEHICLE ON THE
SIDE OF THE ROAD, OR A SUICIDE BOMBER
INTENT ON DRIVING ON TO AN INSTALLATION
OR RUNNING A CHECKPOINT.
ATTENTION TO DETAIL IS KEY TO IDENTIFYING
THESE I.E.D.’S. FROM PAYING CLOSE ATTENTION
TO ALL VEHICLE’S APPROACHING AN ECP, TO
BEING CAUTIOUS OF ALL VEHICLE’S IN AND
AROUND CHOKE POINTS AND BOTTLENECKS.
IMMEDIATE ACTIONS

Properly establish initial exclusion
AREA.

INITIATE SECURITY OF THE AREA.

REPORT “POSSIBLE I.E.D.” TO
HIGHER HQ. WITH 100% ACCURACY.

CONTINUE SECURITY AND HOLD FOR
EOD.
ESTABLISHING AN INTIAL
EXCLUSION AREA




ONCE AN I.E.D. OR V.B.I.E.D HAS BEEN
IDENTIFIED CHECK IMMEDIATE SURROUNDINGS
FOR PONTENTIAL SECONDARY DEVICES.
CHECK YOUR FIVE’S, TWENTY FIVE’S, AND OUT
TO ONE HUNDRED METERS.
THIS WILL ENSURE THAT THE DEVICE IS NOT A
DECOY FOR A SECONDARY DEVICE, OR THE
DEVICE IS NOT DAISY CHAINED TO A STRING OF
DEVICES.
ONCE THE DEVICE(S) HAS BEEN FOUND AND
PROPERLY MARKED, CORDON OFF THE ENTIRE
AREA.
INITIATE SECURITY OF THE
AREA




ONCE ALL I.E.D’S IN THE AREA HAVE BEEN
IDENTIFIED, SET A 360 DEGREE PERIMETER
SCAN FAR AND NEAR, HIGH AND LOW.
CLEAR ALL PERSONEL AND EQUIPMENT FROM
THE BLAST AREA.
KEEP IN MIND THE SIZE OF THE DEVICE(S) AND
AMOUNT OF MUNITIONS USED TO ENSURE THE
SAFE AREA IS LARGE ENOUGH TO CONTAIN THE
BLAST IN CASE AN EXPLOLSION OCCURS.
MAINTAIN POSITIVE CONTROL OF THE BLAST
AREA UNTIL EOD ARRIVES.
REPORTING AN I.E.D. USING A
9 LINE I.E.D./UXO REPORT





LINE 1. DATE-TIME-GROUP: WHEN WAS THE
ITEM DISCOVERED
LINE 2. REPORT ACTIVITY LOCATION: UNIT AND
GRID LOCATION OF THE IED/UXO.
LINE 3.CONTACT METHOD: RADIO FREQUENCY,
CALL SIGN, POC, AND TELEPHONE NUMBER.
LINE 4. TYPE OF ORDINANCE: DROPPED,
PLACED, THROWN, PROJECTED. GIVE NUMBER
OF ITEMS IF MORE THAN ONE.
LINE 5. NBC CONTAMINATIONS: BE AS SPECIFIC
AS POSSIBLE.
REPORT AN IED CONT.




LINE 6. RESOUCES THREATENED: EQUIPMENT,
FACILITIES OR OTHER ASSETS THAT ARE
THREATENED.
LINE 7. IMPACT ON MISSION: SHORT
DESCRIPTION OF CURRENT TACTICAL SITUATION
AND HOW THE IED/UXO EFFECTS THE MISSION.
LINE 8. PROTECTIVE MEASURES: ANY
PROTECTIVE MEASURES TAKEN TO PROTECT
PERSONEL AND EQUIPMENT.
LINE 9. RECOMMENDED PRIORITY: IMMEDIATE,
INDIRECT, MINOR, NO THREAT.
PRIORITY




Immediate: Stops unit’s maneuver and mission
capability or threatens critical assets vital to the
mission
Indirect: Stops the unit’s maneuver and mission
capability or threatens critical assets important to
the mission
Minor: Reduces the unit’s maneuver and mission
capability or threatens non-critical assets of
value.
No Threat: Has little or no effect on the unit’s
capabilities or assets.
QUESTIONS?
Download