Improvised Explosive Devices IEDs continue to be the weapon of choice for adversary networks and this phenomenon is likely to continue for decades, either with the IED as the only threat or combined with others within a hybrid complex scenario. IEDs are fabricated in an improvised manner and designed to destroy property or incapacitate people and vehicles.
The production costs in general are low, and the components used include not only military ammunition like mines or artillery shells, but also commercially available substances and that can be combined to produce the so-called home-made explosives. Although already used for many decades in military and civil conflicts worldwide, the combination of its ease of use with its mediatic impact, will likely make IEDs an enduring threat to remain.
The European Defence Agency EDA has been working on Counter-IED since , fostering the capability development in identified shortfalls, as well as carefully considering its adequate integration into the Counter-IED overarching framework, covering the full range of enabler capabilities to achieve the desired end state: the mitigation of IEDs in the battlefield.
The range of activities cover the large spectrum of Counter-IED enablers in multidomain land, air and sea , as well as covering broadly the vectors of capability development, from knowledge to education and training, lessons learned, equipment and interoperability, as listed below:.
Research and technology activities are also integrated to the main lines of effort, seeking for close alignment between real operational requirements definition and the industry, technology and research institutes and organisations priorities. Military Search MS is defined as the planning, management and application of systematic procedures and appropriate techniques to confirm the presence or absence of specified targets in support of the full spectrum of operations.
A yearly average of 5 courses are conducted under the project, as well as the deployment of Mobile Training Teams. Find more information here. Also in the field of exploitation, an activity will be launched in late to address the Technical Exploitation of IED found in the Maritime Environment, which requires the collection and preservation of evidence in underwater conditions. Organizations across many sectors have mandates and expertise that can contribute to a useful set of IED mitigation measures.
There is not one IED forum, nor should there be. Instead, it is essential to invest in coordination and information exchange. Problems arising from the accumulation of conventional ammunition stockpiles in surplus Assistance in mine action.
Enhancing the effectiveness of countering criminal threats to the tourism sector, including terrorist threats. Systems and their Development in a Changing World. Countering the threat posed by improvised explosive devices. The future of United Nations peace operations: implementation of the recommendations of the High-level Independent Panel on Peace Operations.
Plan of Action to Prevent Violent Extremism. March May Counter-terrorism Committee. Potective security measures to consider Print this page. IED attacks Improvised Explosive Devices IEDs are effective weapons and can be delivered to their chosen locations in a number of ways, including by suicide bombers. IEDs may be delivered using the following methods: This list is not exhaustive 2.
Report anyone suspicious to the police immediately. Read more about Mail handling and Mail Screening 2. Read more about Vehicle Bombs 3. Potective security measures to consider The variety of protective security measures which may be utilised to strengthen a site against an IED attack are featured throughout this guidance.
The following points and principles however may serve as points for further discussion and inform your protective security posture: Attacks may be preceded by reconnaissance or trial runs. Ensure that any suspicious behaviour is reported to the police. Effectively monitored CCTV systems may deter a terrorist attack or identify planning activity. Ensure no one visits your protected areas without you being sure of their identity, or without proper authority.
Wherever possible, establish your vehicle access control point at a distance from the protected site, setting up regular patrols and briefing staff to look out for anyone behaving suspiciously. Contents Print this page. Is this page useful? Maybe Yes this page is useful No this page is not useful. Thank you for your feedback.
Report a problem with this page.
0コメント