21st Century U.S. Military Manuals: Convoy Survivability Training Support Package - Defense Against Improvised Explosive Devices (IED) and Roadside Bombs (Professional Format Series)

Nonfiction, Science & Nature, Technology, Military Science, Social & Cultural Studies, Political Science
Cover of the book 21st Century U.S. Military Manuals: Convoy Survivability Training Support Package - Defense Against Improvised Explosive Devices (IED) and Roadside Bombs (Professional Format Series) by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781458131379
Publisher: Progressive Management Publication: May 26, 2011
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781458131379
Publisher: Progressive Management
Publication: May 26, 2011
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate e-book format reproduction, this important U.S. Army Training Support Package document presents information on enemy tactics, techniques, and procedures for attacking convoys in Iraq (and now Afghanistan), as well as U.S. measures in effect to counter them. Specific areas of instruction include but are not limited to hardening vehicles, defending against attack, consolidation and reorganization, gun truck employment, various reports, battle drills, and basic instructions for setting up a convoy live fire exercise. The document states in part: "During this course of instruction you will learn to: Identify the threat; harden vehicles; conduct convoy briefing; execute motor movement; defend against attack; defend against Improvised Explosive Devices (IED); conduct convoy consolidation and reorganization; conduct actions at the Release Point (RP); describe the purpose and functions of the gun truck; identify gun truck crew duties; harden gun trucks; employ gun trucks; identify emerging enemy trends on the battlefield. The arrival of the Twenty-first Century brought with it a different way of doing business on the battlefield. This style of warfare, known as the Contemporary Operational Environment, or COE, will be the mode in which the United States Army fights for many years to come. COE is an asymmetric environment, meaning that one side is well manned, well-organized, and well-equipped, while the other side consists of an irregular guerrilla force incapable of fighting a conventional battle with any hope of victory. Concepts covered include VBIEDs, PBIEDs, gun trucks, armor and hardening, ambush defense, EFPs, kidnapping, gunnery tables, obstacle avoidance, MEDEVAC, box formation, convoy task organization, and convoy defense doctrine.

The enemy weapon of choice is the improvised explosive device (IED), which is usually placed on or near the shoulder of a paved road most often within ten feet of the pavement. Most IED blasts come not from directly underneath the vehicle, but from the front at an oblique angle, or directly at the flank. Because of this, most efforts to armor vehicles in Iraq are oriented more heavily toward the doors and fenders than the floorboard. In other areas, such as Afghanistan, the predominant threat is land mines, which are buried on unimproved roads. IEDs are classified in three types: Static IEDs, Vehicle Borne IEDs (VBIED) and Person Borne IEDs (PBIED). Although the method of delivery differs between the classes, the three types of IED often share the same characteristics. The most common type is the static IED. IEDs can be command detonated, victim actuated, or timed. Although IEDs can be detonated using mechanical means, they are most commonly detonated using hardwired systems, radio controlled systems, or more recently, passive infra-red sensors. Car alarms, battery-powered remote doorbells, remote controlled light switches, key fobs, remote controlled toys, handheld radios, long range cordless telephones, garage door openers, and cell phones are common means of detonation. Any and all types of insulated wire can be used to connect the detonator to the explosive. IEDs in Theater usually incorporate military ordnance, but they can be devised using non-military components as well. IEDs may be fashioned from mortar shells, artillery projectiles, anti-tank mines, diesel fuel or mogas, rockets, black powder, fertilizer, chemical explosives, household cleaning products, etc. IEDs can be daisy chained. A daisy chain is two or more explosive devices wired together so that a single signal will detonate all the munitions at once. Daisy chained IEDs are not limited to one side of the road. They may be placed on both sides, and configured to detonate simultaneously

This is a privately authored news service and educational publication of Progressive Management.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate e-book format reproduction, this important U.S. Army Training Support Package document presents information on enemy tactics, techniques, and procedures for attacking convoys in Iraq (and now Afghanistan), as well as U.S. measures in effect to counter them. Specific areas of instruction include but are not limited to hardening vehicles, defending against attack, consolidation and reorganization, gun truck employment, various reports, battle drills, and basic instructions for setting up a convoy live fire exercise. The document states in part: "During this course of instruction you will learn to: Identify the threat; harden vehicles; conduct convoy briefing; execute motor movement; defend against attack; defend against Improvised Explosive Devices (IED); conduct convoy consolidation and reorganization; conduct actions at the Release Point (RP); describe the purpose and functions of the gun truck; identify gun truck crew duties; harden gun trucks; employ gun trucks; identify emerging enemy trends on the battlefield. The arrival of the Twenty-first Century brought with it a different way of doing business on the battlefield. This style of warfare, known as the Contemporary Operational Environment, or COE, will be the mode in which the United States Army fights for many years to come. COE is an asymmetric environment, meaning that one side is well manned, well-organized, and well-equipped, while the other side consists of an irregular guerrilla force incapable of fighting a conventional battle with any hope of victory. Concepts covered include VBIEDs, PBIEDs, gun trucks, armor and hardening, ambush defense, EFPs, kidnapping, gunnery tables, obstacle avoidance, MEDEVAC, box formation, convoy task organization, and convoy defense doctrine.

The enemy weapon of choice is the improvised explosive device (IED), which is usually placed on or near the shoulder of a paved road most often within ten feet of the pavement. Most IED blasts come not from directly underneath the vehicle, but from the front at an oblique angle, or directly at the flank. Because of this, most efforts to armor vehicles in Iraq are oriented more heavily toward the doors and fenders than the floorboard. In other areas, such as Afghanistan, the predominant threat is land mines, which are buried on unimproved roads. IEDs are classified in three types: Static IEDs, Vehicle Borne IEDs (VBIED) and Person Borne IEDs (PBIED). Although the method of delivery differs between the classes, the three types of IED often share the same characteristics. The most common type is the static IED. IEDs can be command detonated, victim actuated, or timed. Although IEDs can be detonated using mechanical means, they are most commonly detonated using hardwired systems, radio controlled systems, or more recently, passive infra-red sensors. Car alarms, battery-powered remote doorbells, remote controlled light switches, key fobs, remote controlled toys, handheld radios, long range cordless telephones, garage door openers, and cell phones are common means of detonation. Any and all types of insulated wire can be used to connect the detonator to the explosive. IEDs in Theater usually incorporate military ordnance, but they can be devised using non-military components as well. IEDs may be fashioned from mortar shells, artillery projectiles, anti-tank mines, diesel fuel or mogas, rockets, black powder, fertilizer, chemical explosives, household cleaning products, etc. IEDs can be daisy chained. A daisy chain is two or more explosive devices wired together so that a single signal will detonate all the munitions at once. Daisy chained IEDs are not limited to one side of the road. They may be placed on both sides, and configured to detonate simultaneously

This is a privately authored news service and educational publication of Progressive Management.

More books from Progressive Management

Cover of the book Nanoscience and Nanotechnology: Public Participation in Nanotechnology: Report of the National Nanotechnology Initiative Workshop - Convergence of Science and Society by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Lunar Scientist Oral Histories, including George Carruthers, Edgar Cortright, Farouk El-Baz, James Head, Wilmot Hess, William Muehlberger, Leon Silver by Progressive Management
Cover of the book Thunder and Lightning: Desert Storm and the Airpower Debates - The War to Liberate Kuwait, Attacks on Iraq and Saddam Hussien, Aerial Bombing by Progressive Management
Cover of the book John A. Lejeune, The Marine Corps' Greatest Strategic Leader: USMC Commandant, Amphibious and Expeditionary Warfare, Military After World War I, Greatest of All Leathernecks, Marine's Marine by Progressive Management
Cover of the book Defense Is From Mars, State Is From Venus: Improving Communications and Promoting National Security - Covering Peacekeeping, Foreign Policy, and the Character Traits of Military Officers and Diplomats by Progressive Management
Cover of the book Expeditionary Logistics: How the Marine Corps Supports its Expeditionary Operations, Warning Order, Course of Action, Minimize Wasteful Logistics Practices During Sustained Operations by Progressive Management
Cover of the book Nuclear Weapons Security: Nuclear Counterterrorism, Nuclear Explosives Control, Safety Program, Personnel Reliability Program, Prevention of Deliberate Unauthorized Use, DOD Response to IND Incidents by Progressive Management
Cover of the book Air Force Doctrine Document 4-02: Health Services - Air Force Medical Service, Air Force Surgeon General, Aeromedical Evacuation, Medical Logistics by Progressive Management
Cover of the book Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE by Progressive Management
Cover of the book Case Studies in National Security Transformation: Littoral Combat Ship, FBI Counterterrorism, Counterinsurgency Support in Afghanistan, CEC Naval Anti-air Warfare, NMCI, Relief Hurricane Katrina by Progressive Management
Cover of the book War in the Balkans, 1991-2002: Comprehensive History of Wars Provoked by Yugoslav Collapse: Balkan Region in World Politics, Slovenia and Croatia, Bosnia-Herzegovina, Kosovo, Greece, Turkey, Cyprus by Progressive Management
Cover of the book Comprehensive History of U.S. Naval Aviation in World War II: Complete Chronology, Pearl Harbor, Kamikazes, Aircraft, Wake Island, Halsey, Moffett, Zero, Suicide Torpedoes, Fighter Tactics by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Navy Planning - Navy Warfare Publication NWP 5-01 by Progressive Management
Cover of the book Climate Change and Global Warming Encyclopedia: Sweeping Coverage of All Aspects of Carbon Dioxide and Greenhouse Gases, Sea Levels, Ecosystems, Computer Models, Extreme Weather, Energy and Carbon by Progressive Management
Cover of the book U.S. Military Deployments to Africa: Lessons from the Hunt for Joseph Kony and the Lord's Resistance Army (LRA) - Uganda, Sub-Saharan Africa, Special Operations (SOF), People's Liberation Army (SPLA) by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy