Bibliographies
Improvised Explosive Devices (IEDs)
ADM002281, Winter 2009

ADA508751
Warfighter Support. Challenges Confronting DOD's Ability to Coordinate and Oversee Its Counter-Improvised Explosive Device Efforts
Descriptive Note: Congressional testimony
Personal Author(s): Solis, William M
Report Date: 29 Oct 2009
Media Count: 23   Page(s)
Descriptors: (U) *IMPROVISED WEAPONS, *DEPARTMENT OF DEFENSE, *MANAGEMENT, COUNTERTERRORISM, MEASURES OF EFFECTIVENESS, PLANNING, TRAINING, DATA BASES, EXPLOSIVES
Identifiers: (U) GAO REPORTS, GAO TESTIMONY, *JIEDDO(JOINT IED DEFEAT ORGANIZATION), IED(IMPROVED EXPLOSIVE DEVICES), COUNTER-IED, FUNDING, INTERNAL CONTROLS, OVERSIGHT, *EFFECTIVENESS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Improvised explosive devices (IED) are the number-one threat to troops in Iraq and Afghanistan, accounting for almost 40 percent of the attacks on coalition forces in Iraq. Although insurgents' use of IEDs in Iraq has begun to decline, in Afghanistan the number of IED incidents has significantly increased. The Joint IED Defeat Organization (JIEDDO) was created to lead, advocate, and coordinate all DOD efforts to defeat IEDs. Its primary role is to provide funding to the military services and DOD agencies to rapidly develop and field counter-IED solutions. Through fiscal year 2009, Congress has appropriated over $16 billion to JIEDDO. In addition, other DOD components, including the military services, have devoted at least $1.5 billion to the counter-IED effort--which does not include $22.7 billion for Mine Resistant Ambush Protected vehicles. This testimony is based on a report that GAO is issuing today as well as preliminary observations from ongoing work that GAO plans to report in early 2010. In the report being issued today, GAO is recommending that JIEDDO (1) improve its visibility of counter-IED efforts across DOD, (2) develop a complete plan to guide the transition of initiatives, and (3) define criteria for its training initiatives to help guide its funding decisions. DOD generally concurred with GAO's recommendations and noted actions to be taken.

Back to Top


ADA508708
Warfighter Support. Actions Needed to Improve Visibility and Coordination of DOD's Counter-Improvised Explosive Device Efforts

Descriptive Note: Congressional rept.
Report Date: Oct 2009
Media Count: 45   Page(s)
Descriptors: (U) *AUDITING, *MILITARY FORCES(UNITED STATES), *BUDGETS, *VISIBILITY, TRAINING, IMPROVISED WEAPONS, EXPLOSIVE CHARGES, JOINT MILITARY ACTIVITIES, MANNED, ACQUISITION, ORGANIZATIONS, IRAQ, WARFARE, TASK FORCES
Identifiers: (U) EXPLOSIVE DEVICES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) With the escalation of the IED threat in Iraq, DOD identified several counter-IED capability gaps and began focusing on addressing counter- IED issues. These counter-IED gaps included shortcomings in the areas of counter-IED technologies, qualified personnel with expertise in counter-IED tactics, training, dedicated funding, and expedited acquisition processes. DOD's efforts to address these gaps culminated in the creation of JIEDDO in 2006. Prior to JIEDDO's establishment, many different DOD entities at the service and joint levels began focusing on counter-IED issues, but communication and cooperation among these various efforts was informal and ad hoc. In an attempt to coordinate and focus counter-IED efforts, the Army established an IED Task Force in 2003, but the Task Force lacked both the funding and authority to undertake a large-scale, department wide effort. DOD responded by elevating the Army IED Task Force to the joint level in 2004, placing it directly under the Deputy Secretary of Defense in 2005, and increasing the organization's budget from $20 million in 2004 to over $1.3 billion in 2005. In 2006, the Joint Task Force was turned into a permanent joint entity and jointly manned activity of DOD-JIEDDO-with an initial budget of over $3.7 billion and with the intention to provide the institutional stability necessary to attract and retain qualified personnel. These various actions that led to the development of JIEDDO were done in the absence of DOD having formal guidance for establishing joint organizations, and JIEDDO was developed largely through informal communication among key individuals in various services and agencies. Furthermore, DOD did not systematically evaluate all preexisting counter-IED resources in order to determine whether other DOD entities were engaged in similar efforts.

Back to Top


ADA506617
GVSET Power and Energy Preview

Descriptive Note: Briefing charts
Personal Author(s): Coutteau, Chuck
Report Date: 19 Aug 2009
Media Count: 9   Page(s)
Descriptors: (U) *ENERGY CONSUMPTION, *POWER, *GROUND VEHICLES, *MOBILITY, DETECTORS, SECURITY, EXPLOSIVE CHARGES, SOLAR ENERGY, UNMANNED, STORAGE BATTERIES, MANPORTABLE EQUIPMENT, SURVEILLANCE, RECONNAISSANCE, INTELLIGENCE, SYMPOSIA, IMPROVISED WEAPONS, WEAPONS, COMMAND CONTROL COMMUNICATIONS
Identifiers: (U) IED(IMPROVISED EXPLOSIVE DEVICES), BRIEFING CHARTS
Distribution Statement: Approved for public release; distribution is unlimited.

Abstract: (U) THE CHALLENGES: Battlefield consumption of energy increasing - New C4ISR technologies; IED Defeat Systems; New weapons (EM guns, lasers). Energy security problematic - Increasing dependence on foreign oil; Alternative sources sought - wind, solar, bio-mass, waste to energy. Operational issues - Battery usage and limitations - energy and power density; Demand for auxiliary power on-board vehicles; Emphasis on silent (quiet) watch; Unmanned vehicles (air/ground); Unattended sensors; Inefficient management/distribution of power; Demand for soldier-wearable power. Increased emphasis on system power metrics (KPPs, low consumption components).


Back to Top


ADA508203
Fire Resistant Fuel

Personal Author(s): Marty, Steven , Schmitigal, Joel
Report Date: 31 Jul 2009
Media Count: 14   Page(s)
Descriptors: (U) *FUEL TANKS, *FIRE RESISTANCE, *DIESEL FUELS, PROJECTILES, FORMULATIONS, EXPLOSIVE CHARGES, EXPLOSIVES, MIXTURES, PENETRATION, IGNITION, FLASH POINT, RESTARTING, CATASTROPHIC CONDITIONS, BALLISTICS, UNCONVENTIONAL WARFARE, NUCLEAR FIREBALL, THREATS, FUEL LINES, FORWARD AREAS, ARMY RESEARCH
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) During an Army research program in the mid-1980s, fire resistant diesel fuel that self extinguished when ignited by an explosive projectile was developed. Chemically, this fire resistant fuel (FRF) was a stable mixture of diesel fuel, 10 percent water, and an emulsifier. The Army FRF program ended in 1987 without fielding this fire resistant fuel formulation. There were both technical and logistical reasons for this. Unconventional warfare experienced in Iraq and Afghanistan involving use of Improvised Explosive Devices (IED) has led the Army to restart the FRF program in an attempt to counter the increasing threat of fuel fires. Efforts are now underway to develop new Fire Resistant Fuel to reduce and/or eliminate both the initial mist fireball and any residual pool burning. Vehicle operation and environmental conditions commonly cause the temperature of the fuel in the vehicles to rise above its flash point, thus making it more susceptible to being ignited. This elevated fuel temperature, when combined with an ignition source such as a ballistic penetration near the fuel tank or fuel line, significantly increases the potential for a catastrophic fuel fire. This paper will discuss some of the aspects and limitations of developing a fire resistant fuel water emulsion and how the use of JP-8, as intended by the single fuel forward concept, affects this development.

Back to Top


ADA502089
An Introductory Characterization of a Combat-Casualty-Care Relevant Swine Model of Closed Head Injury Resulting from Exposure to Explosive Blast

Descriptive Note: Journal article
Personal Author(s): Bauman, Richard A, Ling, Geoffrey, Tong, Lawrence, Januszkiewicz, Adolph, Agoston, Denes, Delanerolle, Nihal, Kim, Young, Ritzel, Dave, Bell, Randy, Ecklund, James, Armonda, Rocco, Bandak, Faris, Parks, Steven
Report Date: 08 Jul 2009
Media Count: 22   Page(s)
Descriptors: (U) *EXPLOSIVE CHARGES, *WOUNDS AND INJURIES, *TRAUMA, *BLAST WAVES, *HEAD(ANATOMY), PATHOLOGY, TACTICAL WEAPONS, HEMORRHAGE, SWINE, NERVE CELLS, OVERPRESSURE, BRAIN, EDEMA, REPRINTS, EXPOSURE(GENERAL)
Identifiers: (U) *EXPLOSIVE BLAST, BLAST TUBE, FREE FIELD, VASOSPASM, IED(IMPROVISED EXPLOSIVE DEVICES), COMBAT CASUALTY CARE
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Explosive blast has been extensively used as a tactical weapon in Operation Iraqi Freedom (OIF) and more recently in Operation Enduring Freedom (OEF). The polytraumatic nature of blast injuries is evidence of their effectiveness, and brain injury is a frequent and debilitating form of this trauma. In-theater clinical observations of brain-injured casualties have shown that edema, intracranial hemorrhage, and vasospasm are the most salient pathophysiological characteristics of blast injury to the brain. Unfortunately, little is known about exactly how an explosion produces these sequelae as well as others that are less well documented. Consequently, the principal objective of the current report is to present a swine model of explosive blast injury to the brain. This model was developed during Phase I of the DARPA (Defense Advanced Research Projects Agency) PREVENT (Preventing Violent Explosive Neurotrauma) blast research program. A second objective is to present data that illustrate the capabilities of this model to study the proximal biomechanical causes and the resulting pathophysiological, biochemical, neuropathological, and neurological consequences of explosive blast injury to the swine brain. In the concluding section of this article, the advantages and limitations of the model are considered, explosive and air overpressure models are compared, and the physical properties of an explosion are identified that potentially contributed to the in-theater closed head injuries resulting from explosions of improvised explosive devices (IEDs).

Back to Top
 


ADA502359
ONR C-IED STIFLE (Stigmergic Tracking of IED Factories, Locations and Events

Descriptive Note: Final rept. 16 Mar 2006-30 Jun 2009
Personal Author(s): Brueckner, Sven A, Decker, Keith, Savit, Robert
Report Date: 19 Jun 2009
Media Count: 48   Page(s)
Descriptors: (U) *COUNTERINSURGENCY, *MULTIAGENT SYSTEMS, SCHEDULING, HYBRID SIMULATION, EXPLOSIVELY FORMED PENETRATORS, FORENSIC ANALYSIS, MATHEMATICAL PREDICTION, MODELS, SELF ORGANIZING SYSTEMS
Identifiers: (U) *IEDS(IMPROVISED EXPLOSIVE DEVICES), POLYAGENTS, SWARMING
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The STIFLE project, funded by the ONR Counter-IED Basic Research program, has three major objectives, which are reflected in the three main tracks of our project execution: (1) Enhanced Representations Track: Extend the predictive polyagent modeling construct to include explicit reasoning over task execution by individuals and groups; (2) Model Analysis Track: Develop theoretical, formal and experimental analysis tools and methods to characterize and influence the dynamics of predictive polyagent models; (3) IED Prediction Prototype Track: Apply the extended modeling and analysis capabilities to the problem of IED prediction and forensics Towards the first objective, collaborated with Prof. Keith Decker (University of Delaware) to integrate our polyagent modeling approach within the TAEMS framework, a formal representation and reasoning mechanism for hierarchical task networks. Together with Prof. Bob Savit (University of Michigan), we explored various approaches to formally describe and analyze our predictive polyagent models in support of the second objective. Finally, our development and experimental analysis of alternative polyagent models of IED emplacement (based on initial models and a framework supported by the DARPA RAID adversarial reasoning module) supported the third objective.

Back to Top


ADA501748
Linking Interoperability Characters and Measures of Effectiveness: A Methodology for Evaluating Architectures

Descriptive Note: Research paper, Sep 2008-Jun 2009
Personal Author(s): Felsen, Jan von der, Insley, Darryl L, McKellar, Brian D
Report Date: 18 Jun 2009
Media Count: 123   Page(s)
Descriptors: (U) *MEASUREMENT, *MEASURES OF EFFECTIVENESS, *EXPLOSIVES DETECTION, *TRUCK CONVOYS, *PERFORMANCE(ENGINEERING), *INTEROPERABILITY, *IMPROVISED WEAPONS, OPERATIONAL EFFECTIVENESS, HELICOPTERS, INFRARED DETECTORS, FIXED WING AIRCRAFT, SYNTHETIC APERTURE RADAR, COMPUTERIZED SIMULATION, SURVEILLANCE DRONES, TURBOPROP ENGINES, ELECTROOPTICS, TRANSPORT AIRCRAFT, URBAN AREAS
Identifiers: (U) *LAYERED SENSING, *INTEROPERABILITY MEASUREMENT, *MOP(MEASURES OF PERFORMANCE), *AERIAL SURVEILLANCE, SUPPLY CONVOYS, PROCESS PATHS, ELECTROOPTICAL SENSORS, INFRARED SENSORS, RADAR SENSORS, IED(IMPROVISED EXPLOSIVE DEVICES), PERSISTENT SURVEILLANCE, COLLABORATIVE INTEROPERABILITY, DISCRETE EVENT SIMULATION, TURBOPROP AIRCRAFT
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The Air Force Research Laboratory's Sensors Directorate has crafted a long-term layered sensing project and seeks a method to compare different architectural representations. This research provides an executable methodology for quantitative architecture comparisons based on interoperability characters and measurements. The methodology has two components and is demonstrated on an urban operations mission thread scenario. The layered sensing scenario requires electrooptical (EO), infrared (IR), and synthetic aperture radar (SAR) sensor-equipped platforms to shift orbits while supporting a mission (e.g., supply convoy) reacting to an unplanned event (e.g. improvised explosive device planted along the convoy route of travel). The first component is a discrete event simulation capturing relevant sensor, platform, and mission operations and providing measures of effectiveness (MOE) and measures of performance (MOP). The second component is an application of a general purpose interoperability measurement technique applied to a scenario demonstrating collaborative interoperability. The results from experimental component comparisons show that changes in interoperability measurements do not always reflect the magnitude of changes in mission effectiveness or system performance. For net-centric applications, changes in the number of process paths may be a better indicator for the degree of interoperability present in a given architecture.

Back to Top


ADA502022
Mine-Resistant, Ambush-Protected (MRAP) Vehicles: Background and Issues for Congress

Descriptive Note: Congressional rept.
Personal Author(s): Feickert, Andrew
Report Date: 15 Jun 2009
Media Count: 11   Page(s)
Descriptors: (U) *MINE RESISTANT VEHICLES, POLICIES, EXPLOSIVE CHARGES, MILITARY PROCUREMENT, IMPROVISED WEAPONS, DEPARTMENT OF DEFENSE, OPERATIONAL EFFECTIVENESS
Identifiers: (U) MRAP(MINE-RESISTANT AMBUSH-PROTECTED), MRAP VEHICLES, HMMWVS(HIGH MOBILITY MULTI-WHEELED VEHICLES), IEDS(IMPROVISED EXPLOSIVE DEVICES)
Distribution Statement: Approved for public release; distribution is unlimited.

Abstract: (U) In late 2007, the Department of Defense (DOD) launched a major procurement initiative to replace most uparmored High Mobility, Multi-Wheeled Vehicles (HMMWVs) in Iraq with Mine- Resistant, Ambush-Protected (MRAP) vehicles by FY2009. MRAPs have been described as providing significantly more protection against Improvised Explosive Devices (IEDs) than uparmored HMMWVs. DOD's decision to acquire a new, smaller MRAP variant, the M-ATV, for use in Afghanistan; the disposition of MRAPs no longer needed in Iraq; and MRAP mechanical, logistical, and readiness concerns could be potential policy issues for congressional consideration. This report will be updated.

Back to Top


ADA501753
Seeing the Enemy: Army Air Force Aerial Reconnaissance Support to U.S. Army Operations in the Mediterranean in World War 2

Descriptive Note: Master's thesis
Personal Author(s): Dengler, David W
Report Date: 12 Jun 2009
Media Count: 231   Page(s)
Descriptors: (U) *ITALY, *PHOTOGRAPHIC RECONNAISSANCE, *SECOND WORLD WAR, *NORTH AFRICA, *ARMY AVIATION, *ARMY OPERATIONS, *AERIAL RECONNAISSANCE, PHOTOGRAPHIC INTELLIGENCE, AERIAL PHOTOGRAPHY, TIMELINESS, COMMAND AND CONTROL SYSTEMS, OPERATIONAL EFFECTIVENESS, THESES, LESSONS LEARNED, MILITARY HISTORY
Identifiers: (U) *ARMY AIR FORCES, MEDITERRANEAN THEATER OF OPERATIONS, VISUAL RECONNAISSANCE, SICILY(SICILY), GROUND OPERATIONS, AVALANCHE OPERATION, SHINGLE OPERATION, TTP(TACTICS TECHNIQUES PROCEDURES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The Army Air Forces entered World War II poorly equipped and underprepared to support ground commanders with photographic and visual reconnaissance. While doctrine fared better, it lacked the depth needed to employ reconnaissance effectively from the outset. In the Mediterranean theater, one can trace reconnaissance employment in support of ground forces. Operations in North Africa frequently failed due to decentralized control and inadequate aircraft. Photographic reconnaissance improved markedly for the invasion of Sicily, but lost relevancy after the invasion when ground forces often outpaced photographic coverage. Visual reconnaissance supplemented this coverage during mobile operations, but lacked sufficient detail for wide area coverage. The same situation persisted in Italy when aerial reconnaissance supported the Fifth Army. However, the Fifth Army achieved a greater degree of success by effectively securing tactical control over photographic and visual reconnaissance assets supporting its operations. Combined with liaison officers at all echelons, this unique situation proved quite effective for all levels during attacks against fixed defenses, but less effective at the division level and below during mobile operations due to time delays. The experience gained in this theater helps to explain the Army's current focus on obtaining unmanned aerial vehicles to minimize bureaucracy and improve intelligence timeliness.

Back to Top


ADA502075
Does the MRAP Meet the US Army's Needs as the Primary Method of Protecting Troops from the IED Threat?

Descriptive Note: Master's thesis
Personal Author(s): Russell, Robert W
Report Date: 12 Jun 2009
Media Count: 90   Page(s)
Descriptors: (U) *IMPROVISED WEAPONS, *MILITARY REQUIREMENTS, *RAPID DEPLOYMENT, *PROTECTION, *COUNTERMEASURES, *MINE RESISTANT VEHICLES, *EXPLOSIVES, MILITARY CAPABILITIES, HISTORY, MINE CLEARANCE, MILITARY PROCUREMENT, ARMY, ARMOR PLATE, BODY ARMOR, LIMITATIONS, MAINTAINABILITY, THESES, MILITARY VEHICLES, MODIFICATION, ARMY TRAINING, THREATS, SURVIVABILITY
Identifiers: (U) *IED(IMPROVISED EXPLOSIVE DEVICES), *SUPPORTABILITY, MRAP(MINE RESISTANT AMBUSH PROTECTED VEHICLES), VEHICLE MODIFICATION, ARMOR KITS, ROUTE CLEARANCE, RAPID FIELDING, SUSTAINABILITY, HMMWV(HIGH MOBILITY MULTIPURPOSE WHEELED VEHICLES), IED AVOIDANCE TRAINING
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The purpose of this paper is to discuss the Improvised Explosive Device (IED) threat to the U.S. Army and the various methods that have been used to counter this threat. The Mine Resistant Ambush Protected vehicle (MRAP) is currently the favored method of countering IEDs. The Secretary of Defense, Robert Gates, has made the MRAP the top priority for military procurement, and has accelerated the procurement process from 10 years to 9 months. The primary question this thesis addresses is as follows: Does the MRAP meet the needs of the U.S. Army to protect troops from the IED threat? The author first analyzes the IED threat to determine the requirements of a countermeasure. These requirements include protection, rapid fielding, and supportability. Both non-MRAP countermeasures (e.g., body armor, armor plate, armor kits, IED avoidance training, electronic countermeasures, thermal countermeasures, route clearance) and the MRAP are examined to determine if they meet these requirements. The author also discusses the capabilities and limitations of the MRAP. Based on the requirements of protection, rapid fielding, and supportability the MRAP has the capabilities to effectively counter the IED threat while protecting U.S. troops. Non-MRAP countermeasures do not have the capabilities to meet these requirements. The MRAP alone is not able to counter the IED threat, but as a component of a comprehensive effort, it has proven effective. The MRAP is the most critical component of the U.S. Army's combined anti-IED effort.

Back to Top


ADA503237
Wireless Sensor Networks for Detection of IED Emplacement

Descriptive Note: Conference paper
Personal Author(s): Rowe, Neil C, O'Hara, Matthew, Singh, Gurminder
Report Date: Jun 2009
Media Count: 40   Page(s)
Descriptors: (U) *COMMUNICATIONS NETWORKS, *WIRELESS LINKS, *EXPLOSIVE ACTUATORS, *EMPLACEMENT, *DETECTION, TRACKING, IMAGES, IMPROVISED WEAPONS, VISUAL SURVEILLANCE, ALGORITHMS, MOVING TARGETS, ACOUSTIC DATA, SYMPOSIA, SIMULATION, VISUAL PERCEPTION
Identifiers: (U) IED(IMPROVISED EXPLOSIVE DEVICES), BRIEFING CHARTS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) We are investigating the use of wireless nonimaging-sensor networks for the difficult problem of detection of suspicious behavior related to IED emplacement. Hardware for surveillance by nonimaging-sensor networks can cheaper than that for visual surveillance, can require much less computational effort by virtue of simpler algorithms, and can avoid problems of occlusion of view that occur with imaging sensors. We report on four parts of our investigation. First, we discuss some lessons we have learned from experiments with visual detection of deliberately staged suspicious behavior, which suggest that the magnitude of the acceleration vector of a tracked person is a key clue. Second, we describe experiments we conducted with tracking of moving objects in a simulated sensor network, showing that tracking is not always possible even with excellent sensor performance due to the ill-conditioned nature of the mathematical problems involved. Third, we report on experiments we did with tracking from acoustic data of explosions during a NATO test. Fourth, we report on experiments we did with people crossing a live sensor network. We conclude that nonimaging-sensor networks can detect a variety of suspicious behavior, but implementation needs to address a number of tricky problems.

Back to Top


ADA501124
Risk of Using Past to Predict Future: A Case Study of Jamming RCIEDs

Descriptive Note: Master's thesis
Personal Author(s): Dayton, Jeffrey A
Report Date: Jun 2009
Media Count: 95   Page(s)
Descriptors: (U) *JAMMING, *RISK, *CASE STUDIES, *EXPLOSIVES, ATTACK, EXPLOSIVE CHARGES, ELECTRONIC EQUIPMENT, JOINT MILITARY ACTIVITIES, MILITARY FORCE LEVELS, REMOTE CONTROL, TERRORISM, GAME THEORY, STRATEGY, GLOBAL, INSURGENCY, SIMULATION, MILITARY PERSONNEL
Identifiers: (U) RCIED(RADIO CONTROLLED IMPROVISED EXPLOSIVE DEVICES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The radio controlled improvised explosive device (RCIED) is one of the deadliest threats to military personnel supporting the global war on terrorism, and due to its success is expected to play a major role as a weapon of choice in future insurgencies. To mitigate the risk of a RCIED attack, electronic jamming devices are utilized to interrupt the communications between a remote control and the RCIED trigger. We consider two approaches to determine the optimal jamming strategy for the coalition force. First, we formulate a mixed integer program to find the optimal jamming strategy based on recent attack data of RCIEDs. Second, we formulate a two-person zero-sum game to determine the optimal mixed strategy for jamming. With a simulation study, we found that with the first approach the coalition force tends to be overly optimistic in predicting the outcome, and is likely to underperform. In addition, the first approach allows the possibility for smart insurgents to deploy RCIEDs to purposely mislead the coalition force on what they plan to do in the future. The second game-theoretic approach provides a robust jamming strategy no matter how Red chooses to deploy their RCIEDs.

Back to Top


ADA501551
Improving Situational Awareness in the Counter-IED Fight with the Utilization of Unmanned Sensor Systems

Descriptive Note: Master's thesis
Personal Author(s): Whiteman, Shannon J
Report Date: 01 Jun 2009
Media Count: 127   Page(s)
Descriptors: (U) *EXPLOSIVE CHARGES, *SITUATIONAL AWARENESS, *DETECTORS, SPECIFICATIONS, IMPROVISED WEAPONS, THESES, SURVIVABILITY, UNMANNED, SYSTEMS ENGINEERING
Identifiers: (U) C-IED(COUNTER-IMPROVISED EXPLOSIVE DEVICE)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) An organized and thorough systems design framework is necessary to successfully address large-scale, complex problems, such as the utilization of unmanned sensor technologies to provide situational awareness (SA) in the counter-improvised explosive device (C-IED) fight. An appropriate systems engineering design process was used to develop such a framework, as the completion of the first two phases-problem definition and solution design- provides a basis for analysis of alternatives and a design recommendation. This process generated the following problem statement: Design a system that, through the use of unmanned sensors, provides effective and efficient SA to the commander in a C-IED scenario. By effective, the system must maximize the ability to process sensor imagery and detect, classify, identify, and counter IEDs. To be efficient, the system must address important characteristics of operational suitability and survivability. Thus, providing SA, maximizing operational suitability, and maximizing Soldier survivability are the primary objectives in the effective and efficient employment of unmanned sensors in CIED. Three physical alternatives were generated and synthesized: baseline, near-term, and long-term. Each alternative consisted of a combination of sensors, satellites, and unmanned systems to ensure that the top-level SA functions are addressed. Each alternative's basic specifications, battlefield flow (highlighting each unmanned sensor's use for observe, process information, and understanding the environment), and drawbacks are addressed.

Back to Top


ADA502129
MRAPs, Irregular Warfare, and Pentagon Reform

Descriptive Note: Occasional paper no. 6
Personal Author(s): Lamb, Christopher J, Schmidt, Matthew J, Fitzsimmons, Berit G
Report Date: Jun 2009
Media Count: 63   Page(s)
Descriptors: (U) *MILITARY PROCUREMENT, *IRAQI WAR, *MINE RESISTANT VEHICLES, *COUNTERINSURGENCY, *DELAY, *MILITARY REQUIREMENTS, *DEPLOYMENT, CASUALTIES, LAND MINES, PUBLIC OPINION, VEHICULAR ARMOR, IMPROVISED WEAPONS, ASYMMETRIC WARFARE, MILITARY CAPABILITIES, EXPLOSIVE CHARGES, MODIFICATION, INDUSTRIAL PRODUCTION, THREATS, DECISION MAKING, CONGRESS, DEPARTMENT OF DEFENSE
Identifiers: (U) *IRREGULAR WARFARE, *FIELDING DELAYS, *ACQUISITION REFORM, CONTROVERSY, PROCUREMENT DELAYS, DEPLOYMENT DELAYS, DELAYED FIELDING, IED(IMPROVISED EXPLOSIVE DEVICES), ARMOR KITS, VEHICLE MODIFICATION, UP-ARMORED HUMVEES, JIEDDO(JOINT IED DEFEAT ORGANIZATION), FATALITIES, FORCE PROTECTION, ARMORED VEHICLE REQUIREMENTS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Mine resistant ambush protected (MRAP) vehicles offer an excellent case study for investigating the current debate over the Pentagon's approach to developing and fielding irregular warfare capabilities. MRAPs first gained prominence for their ability to protect U.S. forces from improvised explosive devices (IEDs) and because the Pentagon did not deploy them en masse to Iraq until almost 5 years of fighting had passed. More recently, following extraordinary efforts to field more than 10,000 MRAPs quickly, the program has been criticized as wasteful and unnecessary. Secretary of Defense Robert Gates often cites the slow fielding of MRAPs as a prime example of the Pentagon's institutional resistance to investments in irregular warfare capabilities. Some irregular warfare requirements traditionally bedevil the United States, but quickly producing and fielding vehicles is something the country has done well often in the past. Moreover, the Pentagon assessed MRAPs as 400 percent more effective at protecting U.S. troops than other vehicles, and Congress was eager to pay for them. Thus, the slow fielding of the MRAPs certainly seems like prima facie evidence for the Secretary's claim that the Pentagon does not do a good job of providing irregular warfare capabilities. Yet some analysts now argue that MRAPs are not really useful for irregular warfare and are prohibitively expensive. By the time the vehicles finally flowed into the combat zone, the need for them had diminished because the insurgency and the IED problem in Iraq were on the decline. Now the Pentagon's planned procurement of MRAPs is being slashed, Congress is demanding more accountability for controlling their costs, and the MRAP program is being accused of sidetracking important future acquisition programs such as the Joint Light Tactical Vehicle and the Future Combat System. Both MRAP proponents and detractors view the MRAP saga as an acquisition disaster.

Back to Top


ADA501365
Mine-Resistant, Ambush-Protected (MRAP) Vehicles: Background and Issues for Congress

Descriptive Note: Congressional rept.
Personal Author(s): Feickert, Andrew
Report Date: 27 Apr 2009
Media Count: 10   Page(s)
Descriptors: (U) *MINE RESISTANT VEHICLES, *MILITARY PROCUREMENT, AFGHANISTAN CONFLICT, IRAQI WAR, LOGISTICS, MAINTENANCE, PREPOSITIONING(LOGISTICS)
Identifiers: (U) *MRAP(MINE-RESISTANT AMBUSH-PROTECTED), MRAP VEHICLES, IED(IMPROVISED EXPLOSIVE DEVICES), M-ATV(MRAP ALL TERRAIN VEHICLES), DISPOSITION
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) In late 2007, the Department of Defense (DOD) launched a major procurement initiative to replace most uparmored High Mobility, Multi-Wheeled Vehicles (HMMWVs) in Iraq with Mine-Resistant, Ambush-Protected (MRAP) vehicles by FY2009. MRAPs have been described as providing significantly more protection against Improvised Explosive Devices (IEDs) than uparmored HMMWVs. DOD's decision to acquire a new, smaller MRAP variant for use in Afghanistan; MRAP mechanical, logistical, and readiness concerns could be potential policy issues for congressional consideration. This report will be updated.

Back to Top


ADA498364
The Marines' Expeditionary Fighting Vehicle (EFV): Background and Issues for Congress

Descriptive Note: Congressional rept.
Personal Author(s): Feickert, Andrew
Report Date: 02 Apr 2009
Media Count: 11   Page(s)
Descriptors: (U) *AMPHIBIOUS VEHICLES, *ARMORED VEHICLES, *COMBAT VEHICLES, *MILITARY VEHICLES, *CONGRESS, DELAY, MARINE CORPS PERSONNEL, RELIABILITY, EXPLOSIVE CHARGES, VULNERABILITY, GROWTH(GENERAL), DEPARTMENT OF DEFENSE, COSTS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The Expeditionary Fighting Vehicle (EFV) is an armored amphibious vehicle program that originated two decades ago to replace the 1970s-era Amphibious Assault Vehicle (AAV). The EFV has experienced a variety of developmental difficulties, resulting in significant program delays and cost growth. While the Marine Corps and Department of Defense remain optimistic about the future of the EFV program, there continue to be major concerns about the EFV's reliability, vulnerability to improvised explosive devices (IEDs), and escalating costs. This report will be updated as conditions warrant.

Back to Top


ADA500624
Surface Acoustic Wave Devices as Chemical Vapor Sensors

Descriptive Note: Master's thesis
Personal Author(s): Gallagher, Daniel M
Report Date: 26 Mar 2009
Media Count: 161   Page(s)
Descriptors: (U) *CHEMICALS, *DETECTORS, *VAPORS, *SURFACE ACOUSTIC WAVE DEVICES, PIEZOELECTRICITY, IMPROVISED WEAPONS, BIOLOGICAL DETECTION, NOSES, TNT, BIOMOLECULES, BIOMIMETICS, MICROELECTROMECHANICAL SYSTEMS, EXPLOSIVES, THESES, POLYMERS, PORTABLE EQUIPMENT, TRANSDUCERS
Identifiers: (U) VAPOR SENSOR, BIOSENSOR, MEMS(MICROELECTROMECHANICAL SYSTEMS), IED(IMPROVISED EXPLOSIVE DEVICE), ELECTRONIC NOSE
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The objective of this research is to develop a transducer for recognition of molecular changes in the presence of chemical vapors. This transducer is tested using polymer sensing layers known to be sensitive to ethanol vapors. A surface acoustic wave device is selected as the transducer element due to low cost, high surface sensitivity, and sensitivity. These devices are designed and fabricated in-house, and a polymer sensing layer applied. The frequency response of the coated device is probed both with and without the presence of airborne ethanol molecules in a vapor stream. By analyzing the changes in the amplitude and phase of the frequency response near resonance, vapor detection was conclusively demonstrated. Additionally, the mechanism of change was identified, allowing future work in optimizing the sensitivity of the device. Other future work will include application of a biomolecular sensing layer, design of circuitry for a portable devices, and fabrication of a MEMS preconcentrator. The final goal of the project is a portable sensor array using surface acoustic wave devices coated with different bio-molecules.

Back to Top


ADA500459
Creating Multi Objective Value Functions from Non-Independent Values

Descriptive Note: Master's thesis
Personal Author(s): Richards, Christopher D
Report Date: Mar 2009
Media Count: 100   Page(s)
Descriptors: (U) *EXPLOSIVE CHARGES, *VALUE, *IMPROVISED WEAPONS, *FUNCTIONS, INTERACTIONS, HIERARCHIES, THESES, INTERPOLATION, HIGH COSTS, DECISION MAKING, COUNTERMEASURES, MATHEMATICAL MODELS
Identifiers: (U) JIEDDO(JOINT IMPROVISED EXPLOSIVE DEVICE DEFEAT ORGANIZATION), VFT(VALUE FOCUSED THINKING), PREFERENTIAL INDEPENDENCE, SDVF(SINGLE DIMENSIONAL VALUE FUNCTION), CROSS TERMS, MULTI-DIMENSIONAL VALUE FUNCTION, DA(DECISION ANALYSIS), LINEAR INTERPOLATION
Distribution Statement: Approved for public release; distribution is unlimited.

Abstract: (U) Decisions are made every day and by everyone. As these decisions become more important, involve higher costs and affect a broader group of stakeholders it becomes essential to establish a more rigorous strategy than simply intuition or going with your gut. In the past several decades, the concept of Value Focused Thinking (VFT) has gained much acclaim in assisting Decision Makers (DMs) in this very effort. By identifying and organizing what a DM values VFT is able to decompose the original problem and create a mathematical model to score and rank alternatives to be chosen. But what if the decision should not be completely decomposed? What if there are factors that are inextricably linked rather than independent? In the past several years, Improvised Explosive Devices (IEDs) have quickly become the number one killer of American troops overseas. To this end the Joint IED Defeat Organization worked to create a VFT model to solicit and grade countermeasure proposals as candidates for funding. While much time and care was put into soliciting a valid VFT hierarchy from the appropriate DM, it does not represent the only option. With JIEDDO as an example this paper examines a strategy to better reflect a DM's combined values in a way which is understandable to the DM and maintains a level of mathematical rigor.

Back to Top


ADA496990
Dragon's Claws: The Improvised Explosive Device (IED) as a Weapon of Strategic Influence

Descriptive Note: Master's thesis
Personal Author(s): Martin, James K
Report Date: Mar 2009
Media Count: 111   Page(s)
Descriptors: (U) *IRAQI WAR, *EXPLOSIVES, *INSURGENCY, *GUERRILLA WARFARE, *COUNTERINSURGENCY, THESES, WEAPON SYSTEM EFFECTIVENESS, WEAPONS EFFECTS, MILITARY TACTICS, TACTICAL WEAPONS, PSYCHOLOGICAL WARFARE, TERRORISM, IMPROVISED WEAPONS, EXPLOSIVE CHARGES, MILITARY FORCES(FOREIGN), MILITARY STRATEGY, ASYMMETRIC WARFARE, MILITARY FORCES(UNITED STATES), IRAQ
Identifiers: (U) *IMPROVISED EXPLOSIVE DEVICES, *STRATEGIC INFLUENCE, IED (IMPROVISED EXPLOSIVE DEVICE)
Distribution Statement: Approved for public release; distribution is unlimited.

Abstract: (U) The purpose of this research is to identify how the Improvised Explosive Device (IED) is being used as a weapon of strategic influence by insurgent groups in Iraq. It is intended to explore how individual IED events, as well as an IED campaign, achieve strategic influence. This thesis will examine how immediate and cumulative effects of IED attacks achieve strategic goals politically, economically, socially and militarily. Particular goals will vary depending on the motivations and objectives of the organization carrying out the attack, so distinctions will be made between Sunni nationalist, Shi'a nationalist, and the jihadi salafist insurgent groups such as Al Qaeda in Iraq (AQI). Both terrorism and guerilla warfare are used as insurgent tactics in Iraq - sometimes by the same organization. As a symbolic weapon, the IED is particularly suited as a weapon for not only terrorist organizations, but insurgents as well. As a weapon of symbolic violence and instrument of terror, the IED aids in accomplishing the strategic political goals of the insurgent groups. IED events have a target of attack specifically chosen to reach the audience of the target of influence. Successful influence of the target of influence audience achieves both the short and long term objectives through immediate and cumulative effects related to the psychological impact of the event(s). The psychological impact the IED achieves outweighs the immediate physical damage. This thesis is not intended to provide a solution for the current IED problem in Iraq or elsewhere, but is intended to provide framework for understanding the IED problem from a strategic perspective.

Back to Top


ADA499984
Robust Sensitivity Analysis for the Joint Improvised Explosive Device Defeat Organization (JIEDDO) Proposal Selection Model

Descriptive Note: Master's thesis
Personal Author(s): Willy, Christina J
Report Date: Mar 2009
Media Count: 135   Page(s)
Descriptors: (U) *COUNTERMEASURES, *CONTRACT PROPOSALS, *SELECTION, *DECISION AIDS, *DEPARTMENT OF DEFENSE, *EXPLOSIVES, *IMPROVISED WEAPONS, JOINT MILITARY ACTIVITIES, THESES, MULTIVARIATE ANALYSIS, MODELS, VALIDATION, CLUSTERING
Identifiers: (U) *JIEDDO(JOINT IMPROVISED EXPLOSIVE DEVICE DEFEAT ORGANIZATION), *DECISION ANALYSIS, *PROPOSAL SELECTION PROCESS, LACHENBRUCH'S HOLDOUT PROCEDURE, N-WAY SENSITIVITY ANALYSIS, DISCRIMINANT ANALYSIS, VALUE MODELS, IED(IMPROVISED EXPLOSIVE DEVICES), CLUSTER ANALYSIS, C-IED(COUNTER-IMPROVISED EXPLOSIVE DEVICE PROJECTS), VALUE-FOCUSED THINKING
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Throughout Operations Iraqi Freedom and Enduring Freedom, the Department of Defense (DoD) faced challenges not experienced in its previous military operations. The enemy's unwavering dedication to the use of improvised explosive devices (IEDs) against the coalition forces continues to challenge the day-to-day operations of the current war. The Joint Improvised Explosive Device Defeat Organization's (JIEDDO) proposal solicitation process enables military and nonmilitary organizations to request funding for the development of Counter-Improvised Explosive Device (C-IED) projects. Decision Analysis (DA) methodology serves as a tool to assist the decision maker (DM) in making an informed decision. This research applies Value Focused Thinking (VFT), a specific methodology within DA, to the JIEDDO proposal selection process to assist DMs in filtering out proposals that do not meet desired C-IED objectives. This research evaluated the validity of the previously developed JIEDDO Proposal Value Model to address the following questions: (1) Does the value model adequately reflect JIEDDO's decision process; and (2) Given the dynamic environment of the current war, how confident can we be in the model's ability to continually and effectively screen proposals based JIEDDO's current values? The author utilizes multivariate techniques to investigate JIEDDO's ability to make consistent decisions within their proposal evaluation process. Once it has been determined that the model effectively screens proposals, it is possible to proceed with the second question. By consolidating and applying n-way sensitivity analysis techniques, the author proposes a consistent sensitivity analysis image profiling technique.

Back to Top


ADA497343
Sequential Pattern Detection and Time Series Models for Predicting IED Attacks

Descriptive Note: Master's thesis
Personal Author(s): Stafford, William B
Report Date: Mar 2009
Media Count: 95   Page(s)
Descriptors: (U) *IMPROVISED WEAPONS, *INFORMATION RETRIEVAL, *TIME SERIES ANALYSIS, PATTERNS, SEQUENCES, DETECTION, MATHEMATICAL MODELS, THESES
Identifiers: (U) IED(IMPROVISED EXPLOSIVE DEVICE), SEQUENTIAL PATTERN DETECTION
Distribution Statement: Approved for public release; distribution is unlimited.

Abstract: (U) Improvised explosive device (IED) attacks are a significant threat to coalition forces. Defeating IEDs as weapons of strategic influence has become a major objective of Combatant Commanders and their respective Joint Task Forces. This thesis attempts to identify new approaches that can help operational forces mitigate the risk of IED attacks by identifying common sequences of events that occur before an IED attack and forecasting the number of attacks in the immediate future. Using the CARMA association rules algorithm on historical data of religious, political, and IED attack events, a model is developed to explore commonly occurring sequences of events leading to an insurgency IED attack and to predict events that are likely to occur given the sequence observed to date. Time series models are also generated to identify trends and relationships that can be helpful in forecasting future monthly IED attacks based upon previous actual historical attacks. The identified sequences and forecasts could be used to help plan troop movements, rotations, force levels, as well as allocating limited resources to address imminent threats.

Back to Top


ADA496108
Advanced Radiometry for High Discrimination Explosive Fireball Discrimination

Descriptive Note: Master's thesis
Personal Author(s): Slagle, Steven E
Report Date: Mar 2009
Media Count: 82   Page(s)
Descriptors: (U) *NUCLEAR FIREBALL, *RADIOMETRY, PHYSICAL PROPERTIES, THESES, RADIATIVE TRANSFER, CLASSIFICATION, SPECTRUM SIGNATURES, CONFINEMENT(GENERAL), ABSORPTION COEFFICIENTS, INFRARED SPECTRA, HIGH EXPLOSIVES, TEMPERATURE, EMISSION, PHYSICAL FITNESS
Identifiers: (U) *HIGH EXPLOSIVE, *FOURIER-TRANSFORM SPECTROSCOPY, *IMPROVISED EXPLOSIVE DEVICE (IED), *FISHER LINEAR DISCRIMINATION, DETONATION, RADIOMETRIC INTENSITY, FISHER RATIO
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The high explosive fireball phenomenological model for the mid wave infrared spectrum, developed by AFIT, performs classification from spectral signatures was modified to use radiometric intensities. Five bands were sequentially fit to derive the five physical fit parameters describing the fireball's temperature, size, soot absorption coefficient within 16% and emissions from the H2O and CO2 concentrations within 333% of the spectral model. This was improved by changing the model?s the band sizes, center, and fitting methods where all five fit parameters were matched to within 17% of spectral model. This demonstrated that a combination of radiometric intensities could be used in place of the spectral data. Interpreting the intensities into fit parameters provided and increased in classification capability with a Fisher Ratio (FR) =23 as opposed to a FR=4 when using the five raw intensities. A systematic search was performed to investigate classification potential using two, three and four radiometric bands combinations. The two-band search yielded a maximum FR of 6, a poor classification capability where the three and four-band search highlighted a highly confined spectral region centered at 5000cm-1 with a FR=41.

Back to Top


ADA499590
Recognition of Combatants-Improvised Explosive Devices (ROC-IED) Training Effectiveness Evaluation

Descriptive Note: Final rept. Mar-Sep 2008
Personal Author(s): Pettitt, Rodger A, Redden, Elizabeth S, Turner, Daniel D, Carstens, Christian B
Report Date: Mar 2009
Media Count: 58   Page(s)
Descriptors: (U) *MILITARY TRAINING, *IMPROVISED WEAPONS, TRAINING DEVICES, MOBILIZATION, SELF CONTAINED, COMPUTER AIDED INSTRUCTION, QUESTIONNAIRES, MILITARY PERSONNEL, TEST AND EVALUATION, OPERATIONAL EFFECTIVENESS
Identifiers: (U) *ROC-IED(RECOGNITION OF COMBATANTS-IMPROVISED EXPLOSIVE DEVICES), *CEHC-T3(COUNTER EXPLOSIVES HAZARD CENTER TRAIN THE TRAINER)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This evaluation assessed the effectiveness of the Recognition of Combatants-Improvised Explosive Devices (ROC-IED) computer-based training program as a stand-alone training aid and as a training aid that can supplement the training given by the unit's trainer who attended the Counter Explosives Hazard Center Train the Trainer (CEHC-T3) course. It was conducted at the Camp Shelby MS Joint Forces Training Center with assistance from the 177th Armor Brigade's IED Defeat Team. The 177th Armor Brigade conducts mobilization assistance team operations at the Camp Shelby Joint Forces Training Center to deploying units. Eighty-one Soldiers from the 1186th Transportation Terminal battalion participated in the 3-day evaluation. Each day, 27 Soldiers were divided into three groups of nine each. Each group received one of three training conditions. One group received training using only ROC-IED. Another received instructor-based IED familiarization training from a graduate of the CEHC-T3 course. The third group received both ROC-IED training and the instructor-based course (combination training). Upon completion of training, each group was evaluated using three tests designed to assess the effectiveness of the training they received. The overall effectiveness of the training was analyzed based on objective performance data, data collector observations, and Soldier questionnaires.

Back to Top


ADA502251
Joint Improvised Explosive Device Defeat Organization

Descriptive Note: Annual rept.
Report Date: Jan 2009
Media Count: 21   Page(s)
Descriptors: (U) *LAND MINES, *IMPROVISED WEAPONS, *EXPLOSIVE CHARGES, *EXPLOSIVES DETECTION, *MINE DETECTORS, *COUNTERMEASURES, *MINE CLEARANCE, CASUALTIES, MILITARY TRAINING, OPTICAL DETECTORS, MILITARY BUDGETS, MINE NEUTRALIZATION, AFGHANISTAN CONFLICT, MISSIONS, MANPOWER, ROBOTS, GRAPHS, MILITARY VEHICLES, IRAQI WAR, DEPARTMENT OF DEFENSE, THREATS
Identifiers: (U) *IED(IMPROVISED EXPLOSIVE DEVICES), JIEDDO(JOINT IMPROVISED EXPLOSIVE DEVICE DEFEAT ORGANIZATION), TREND ANALYSIS, ORGANIZATIONAL STRUCTURE, RECCE I(SELF-CONTAINED RECONNAISSANCE VEHICLES), COIC(C-IED OPERATIONS INTEGRATION CENTER), IDENTITY CHECKERS, PALANTIR, DATA TRACKER, FORENSIC EXPLOITATION TEAMS, AHURA, LAPEER, TERRAPIN, CALIGO, RHINO II, ROUTE CLEARANCE, HME(HOME MADE EXPLOSIVES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) In Iraq and Afghanistan, the most effective weapon employed against coalition forces during 2008 continued to be the Improvised Explosive Device (IED). Except when disrupted by U.S. or coalition operations to attack their IED networks, the enemy continued to adapt and produce IEDs with readily available, inexpensive, and evolving commercial technologies. During 2006 and 2007, our first two years of operation, the Joint Improvised Explosive Device Defeat Organization (JIEDDO) learned that we must adapt and innovate faster than a resourceful enemy who is capable of continuously leveraging the $3 trillion commercial technology investments made globally each year. In 2007, we formalized our rapid development and acquisition procedures by creating a transparent, analytically driven, rapid acquisition process called the Joint IED Defeat Capability Approval and Acquisition Management Process (JCAAMP). Through 2008, JCAAMP continued to be enabled by Congressionally directed financial agility, accommodating a necessarily high degree of technical risk and uncertainty. With the support of the Combatant Commanders, the Department of Defense (DoD) decided in May 2008 to continue JIEDDO and our unique capabilities into the future. Internally, JIEDDO initiated a bottom-up review of the organization to ensure that the staff and components were appropriately tasked and aligned to accomplish an enduring mission. The structure of the organization was fine-tuned in July 2008. DoD now possesses a mature rapid acquisition organization that delivers counter-IED (C-IED) solutions to warfighters in months, versus the years associated with the conventional acquisition system. This report summarizes JIEDDO's activities and accomplishments for FY 2008.

Back to Top


ADA504203
Marine Corps Implementation of the Urgent Universal Needs Process for Mine Resistant Ambush Protected Vehicles

Report Date: 08 Dec 2008
Media Count: 79   Page(s)
Descriptors: (U) *MINE RESISTANT VEHICLES, *MILITARY REQUIREMENTS, *MARINE CORPS PLANNING, IMPROVISED WEAPONS, ARMORED VEHICLES, PLANNING PROGRAMMING BUDGETING, MARINE CORPS EQUIPMENT, MILITARY PROCUREMENT
Identifiers: (U) UUNS(URGENT UNIVERSAL NEED STATEMENTS), MRAP(MINE RESISTANT AMBUSH PROTECTED)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) At the request of the Assistant Commandant of the Marine Corps (MC), we reviewed the MC decision making process to determine whether the decision makers responded appropriately and timely to the February 2005 Urgent Universal Need Statement (UUNS) submitted by field commanders for Mine Resistant Ambush Protected (MRAP)-type vehicles. After June 2005 decision by Commandant of the Marine Corps to replace all High Mobility Multi-Purpose Wheeled Vehicles (HMMWV) in theater with the M1114 up-armored HMMWV, the Deputy Commandant for Installations and Logistics advised MC generals that the M1114 up-armored HMMWV was the best available, most survivable asset to protect Marine Corps forces. In reaction, the Marine Corps Combat Development Command (MCCDC) stopped processing the UUNS for MRAP-type vehicle capability in August 2005. Specifically, MCCDC officials did not develop a course of action for the UUNS, attempt to obtain funding for it, or present it to the Marine Corps Requirements Oversight Council for a decision on acquiring an MRAP-type vehicle capability. DoD was aware of the threat posed by mines and improvised explosive devices (IEDs) in low-intensity conflicts and of the availability of mine-resistant vehicles years before insurgent actions began in Iraq in 2003. Yet DoD did not develop requirements for, fund, or acquire MRAP-type vehicles for low-intensity conflicts that involved mines and IEDs. As a result, the DoD entered into operations in Iraq without having taken available steps to acquire technology to mitigate the known mine and IED risk to soldiers and Marines. We recommend that the Director, Joint Staff establish procedures to enable Service requirements developers to forward urgent requirements that may have joint-Service applicability directly to the appropriate combatant commander for endorsement and subsequent submission to the Joint Staff for validation as a Joint Urgent Operational Need.

Back to Top


ADA494766
Systems Approach to Defeating Maritime Improvised Explosive Devices in U.S. Ports

Descriptive Note: Technical rept.
Personal Author(s): Causee, Christopher, Ellis, Mark, Hellard, Mike, Jimenez, Rich, Tyler, Dan; Cheng, Hua-Lim; Nilsson, Julio; Rowden, Bobby; Wheatley, Joel; Winn, Eric; Smith, Tim
Report Date: Dec 2008
Media Count: 200   Page(s)
Descriptors: (U) *SYSTEMS ENGINEERING, *HOMELAND SECURITY, *NAVAL MINES, *PORTS(FACILITIES), *WAR GAMES, *EXPLOSIVES, *ATTACK, *IMPROVISED WEAPONS, COAST GUARD, COMPUTERIZED SIMULATION, RISK ANALYSIS, SEARCHING, UNMANNED, CLASSIFICATION, MINE NEUTRALIZATION, TERRORISM, SHIPPING, AIRBORNE, NAVY, COST ANALYSIS, THREATS, UNITED STATES GOVERNMENT, UNDERWATER VEHICLES, EXPLOSIVE ORDNANCE DISPOSAL, MINE DETECTION
Identifiers: (U) *MIED(MARITIME IMPROVISED EXPLOSIVE DEVICES), *PORT SECURITY, PERFORMANCE ANALYSIS, SUITABILITY ANALYSIS, MARITIME SECURITY, AIRBORNE MINE DETECTION, AIRBORNE MINE COUNTERMEASURES, CRITICAL INFRASTRUCTURE PROTECTION, SEDP(SYSTEMS ENGINEERING DESIGN PROCESS), SYSTEM OF SYSTEMS, AFP(ADAPTIVE FORCE PACKAGES), UUV(UNMANNED UNDERWATER VEHICLES), REMUS, TALISMAN M
Distribution Statement: Approved for public release; distribution is unlimited.

Abstract: (U) Insight gained from terrorist attacks, training exercises, and intelligence intercepts over the past few years has shown a renewed interest in the use of mining as an effective means of disrupting commerce and damaging critical infrastructure. In an attempt to develop a system-of-systems architecture to defeat mines and Maritime IEDs (MIED), the project team developed several system alternatives, or Adaptive Force Packages, that incorporate both existing systems and emerging technologies. Overall performance was assessed using a U.S. Joint Forces Command sponsored war game simulating an MIED attack on ports based on the geography of Seattle and Tacoma. A critical analysis of the alternatives based on performance, suitability, cost, and risk were carried out. The study results showed that increases in performance are attainable with mixed results in cost and risk, and highlighted necessary actions and considerations that must be taken by military and civilian leaders to adequately prepare for and counter MIEDs in U.S. Ports.

Back to Top


ADA496843
Application of Mathematical Modeling in Potentially Survivable Blast Threats in Military Vehicles

Descriptive Note: Conference paper
Personal Author(s): Arepally, Sudhakar; Gorsich, David; Hope, Karrie; Gentner, Stephen; Dotleff, Kari
Report Date: Dec 2008
Media Count: 9   Page(s)
Descriptors: (U) *MILITARY VEHICLES, *BLAST, *WOUNDS AND INJURIES, IMPROVISED WEAPONS, SYMPOSIA, MATHEMATICAL MODELS
Identifiers: (U) BLAST EVENT ACCELERATION PROFILES, OCCUPANT INJURY RISK EVALUATIONS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Crew injuries and fatalities of military personnel in vehicles are a significant concern in the U.S operations in Iraq and Afghanistan. And the predominant cause is Improvised Explosive Device (IED) attacks on vehicles. A computational model using MADYMO, a mathematical dynamics modeling software, which utilizes lumped parameter, rigid body and finite element methodologies, was developed for the study. MADYMO simulations were performed with the correlated MADYMO model to understand the occupant injury values under the influence of various generic mine blast pulses and seat system energy management design parameters. In addition, the concepts of Effective G and Delta V to relate structural performance to occupant injury risk were investigated.

Back to Top


ADA493891
Study of the Mine Resistant Ambush Protected (MRAP) Vehicle as a Model for Rapid Defense Acquisitions

Descriptive Note: Research paper
Personal Author(s): Blakeman, Seth T; Gibbs, Anthony R; Jeyasingam, Jeyanthan
Report Date: Dec 2008
Media Count: 153   Page(s)
Descriptors: (U) *MINE RESISTANT VEHICLES, *MILITARY PROCUREMENT, CONTRACT ADMINISTRATION, TRADE OFF ANALYSIS, PROJECT MANAGEMENT, PRODUCTION, TEST AND EVALUATION, LOGISTICS
Identifiers: (U) MRAP(MINE RESISTANT AMBUSH PROTECTED), *MRAP VEHICLES, EXPEDITED, *RAPID ACQUISITIONS, PROGRAM MANAGEMENT
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The purpose of this MBA Project is to analyze the procedures followed in the acquisition of the Mine Resistant Ambush Protected (MRAP) vehicle. The MRAP program, initiated in response to the improvised explosive device (IED) threat in Iraq and Afghanistan, is unprecedented in timeline and scale. As such, it provides a unique case study on the rapid acquisition of a major military system in response to an urgent operational need. The objective of this research is to provide a guide for future rapid acquisition programs by documenting the conduct of the MRAP program from the initial needs identification and program start in 2006 through production and fielding at the time of this writing. The major analysis will focus on the program as a rapid acquisition within the context of the Acquisition Management and Joint Capabilities Integration and Development System (JCIDS) framework. The goal for analysis is to answer the following question: What are the key factors and decisions that contributed to program success, with success defined as meeting program objectives and warfighter needs? In addition, this report will address the key trade-offs made within the MRAP program and the potential long-term impacts of these decisions.

Back to Top


ADA504164
Methodology for Establishing the Mine/IED Resistance Capacity of Vehicle Seats for Crew Protection

Descriptive Note: Conference paper
Personal Author(s): Kargus, R G; Li, T H; Frydman, A; Nesta, J
Report Date: Dec 2008
Media Count: 5   Page(s)
Descriptors: (U) *SEATS, *GROUND VEHICLES, CAPACITY(QUANTITY), STRUCTURAL PROPERTIES, RESISTANCE, MILITARY VEHICLES, MINES(ORDNANCE), CREWS, PROTECTION, SHOCK TESTS, BLAST, SURVIVABILITY, SYMPOSIA, EXPLOSIVE CHARGES
Identifiers: (U) IED(IMPROVISED EXPLOSIVE DEVICE)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Many Army ground vehicles possess Structural characteristics that aim to improve the crew survivability when engaged by mine or Improvised Explosive Device (IED). Increased ground clearance. a V-shaped underbody, or high curb weight cooperate to reduce acceleration effects to the crew. The seat, as a critical component of the overall mine blast protection solution, is often overlooked. as evident by the significant number of non-blast-resistant seats featured in army vehicles. Ten unique MRAP-1 candidate seat systems were obtained to evaluate their effectiveness at limiting vertical and lateral acceleration effects to the crew. Using vertical and horizontal shock machines and an instrumented THOR 50th percentile ATD. each seat was subjected to incremental vertical shock tests.

Back to Top


ADA493806
Advancing under Fire: Wartime Change and the U.S. Military

Descriptive Note: Master's thesis
Personal Author(s): Masaitis, Robert A
Report Date: Dec 2008
Media Count: 149   Page(s)
Descriptors: (U) *AFGHANISTAN CONFLICT, *MILITARY MODERNIZATION, *MILITARY DOCTRINE, *WARTIME, *VIETNAM WAR, *SECOND WORLD WAR, *ORGANIZATIONAL REALIGNMENT, *IRAQI WAR, DRONES, RIFLES, AIR POWER, SONAR, ANTISUBMARINE WARFARE, BOMBER AIRCRAFT, DEFENSE SUPPRESSION, VEHICULAR ARMOR, HERBICIDES, AIRMOBILE OPERATIONS, BOMBING, COUNTERINSURGENCY, GUNSHIPS, SEAL TEAMS, BAZOOKAS, RIVERINE WARFARE, MILITARY CRITICAL TECHNOLOGY, TIME SENSITIVE TARGETS, IMPROVISED WEAPONS, TACTICAL AIR SUPPORT, HELICOPTERS, RADAR, THESES, AMPHIBIOUS OPERATIONS, MILITARY VEHICLES, MILITARY HISTORY, MILITARY FORCES(UNITED STATES), FIGHTER AIRCRAFT
Identifiers: (U) *WARTIME CHANGES, *TECHNOLOGICAL CHANGES, *DOCTRINAL CHANGES, *ORGANIZATIONAL CHANGES, TECHNOLOGY INNOVATION, IRAQI FREEDOM OPERATION, ENDURING FREEDOM OPERATION, STRATEGIC CHANGES, TACTICAL CHANGES, OPERATIONAL CHANGES
Distribution Statement: Approved for public release; distribution is unlimited.

Abstract: (U) This study examines the underlying conditions necessary for making major changes during wartime. It first surveys the relevant literature covering both military and organizational change to build hypotheses about wartime change. It then develops a framework and typology with which to study change in the complex endeavor of a military at war. Finally, it uses the United States military's experiences in World War II, Vietnam, and the Global War on Terrorism (i.e., Operation Iraqi Freedom and Operation Enduring Freedom) as case studies with which to test these hypotheses and derive conclusions about the conditions under which change may occur during wartime. Changes that occurred during World War II involved Anti-Submarine Warfare, Sonar, Radar, High-Frequency Direction-Finding Systems, Amphibious Operations, Airborne Doctrine, Gliders, Parachutes, Mounted Cavalry, Bazookas, Hedgerow Warfare, Close Air Support, Air power, Daylight Precision Bombing, Norden Bombsight, Nighttime Low-Level Incendiary Bombing, Unmanned Bombers, Marine Raiders, Long-Range Escort Fighters, and Air Commandos. Changes that occurred during the Vietnam War involved Large Unit Operations, M16 Rifle, Pacification, SEAL Teams, Riverine Warfare, Amphibious Ready Groups, Special Landing Forces, Civilian Irregular Defense Groups, Combined Action Platoons, Search-and-Destroy, M113 Vehicles, Vertical Envelopment, Helicopters, Airmobile Divisions, Farm Gate, Herbicidal Warfare, Advanced Tactical Support Bases, Laser-Guided Bombs, Aerial Mining, Fixed-Wing Gunships, Suppression of Enemy Air Defense (SEAD) Doctrine, and B-52 Conventional Bombing. Changes mandated by OEF and OIF involve Improvised Explosive Device countermeasures, HMMWV Armor Modifications, Mine-Resistant Ambush Protected (MRAP) Vehicles, Human Terrain System, Counter-Scud Task Forces, Time-Sensitive Targeting, Counterinsurgency Doctrine, Bomber CAS, Small-Diameter Bombs, Armed UAVs, Advanced Targeting Pods, and Manportable UAVs.

Back to Top


ADA504193
Modeling Blast-Related Brain Injury

Descriptive Note: Conference paper
Personal Author(s): Nyein, M; Jerusalem, A; Radovitzky, R; Moore, D; Noels, L
Report Date: Dec 2008
Media Count: 9   Page(s)
Descriptors: (U) *HEAD(ANATOMY), *BLAST WAVES, *BRAIN, *COMPUTERIZED SIMULATION, SHOCK WAVES, TRAUMA, IMPACT, SYMPOSIA, FINITE ELEMENT ANALYSIS
Identifiers: (U) COMPONENT REPORTS, FLUID-SOLID INTERACTION, BRAIN INJURY
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Recent military conflicts in Iraq and Afghanistan have highlighted the wartime effect of traumatic brain injury (TBI). While it is not clear why TBI has been so prominent in these particular conflicts, one reason may be that improvements in body armor have led to increased survivability of blasts. Closed traumatic brain injury covers a spectrum of central nervous system (CNS) injuries and mechanisms, but it is broadly characterized as mild (mTBI), moderate, or severe TBI, with mTBI occurring most frequently. Blunt, ballistic, and blast effects may all contribute to CNS injury, but blast in particular has been suggested as a primary cause of military TBI. Little is currently known about the effects of blasts on the CNS; injury thresholds have not been established, and even direct transmission of the non-linear shock wave into the intra-cranial cavity and brain is disputed. In this study, we demonstrate the potential for a blast shockwave to directly affect the CNS using coupled computational fluid-solid dynamics simulation. The model includes a complex finite element model of the head and intracranial contents. The effects of threshold and lethal blast lung injury were compared with concussive impact injury using the full head model.

Back to Top


ADA505299
Research Challenges in Combating Terrorist Use of Explosives in the United States

Report Date: Dec 2008
Media Count: 46   Page(s)
Descriptors: (U) *TERRORISTS, *UNITED STATES GOVERNMENT, *TERRORISM, *EXPLOSIVES, *HOMELAND SECURITY, SKILLS, POLICIES, DEPARTMENT OF DEFENSE
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Terrorists have repeatedly shown their willingness and ability to use explosives as weapons worldwide and there is ample evidence to support the conclusion that they will continue to use such devices to inflict harm. In acknowledgement of this threat, the President issued Homeland Security Presidential Directive 19 (HSPD-19), ?Combating Terrorist Use of Explosives in the United States,? which establishes overall national policy, and calls for the development of a national strategy and an implementation plan to deter, prevent, detect, protect against, and respond to terrorist use of explosives in the United States. The Department of Justice (DOJ) and the Department of Homeland Security (DHS), in coordination with the Department of Defense (DoD) and other interagency partners, developed the National Strategy to Combat Terrorist Use of Explosives in the United States and the HSPD-19 Implementation Plan, which provide a way forward. Both the National Strategy and the Implementation Plan highlight the importance of a coordinated approach to a counter-IED (C-IED) RDT&E program. The co-chairs of the NSTC CHNS, with concurrence from the Office of Science and Technology Policy (OSTP) and the Homeland Security Council (HSC), established the Subcommittee on Domestic IEDs (D-IED SC) to serve as the formal mechanism for this coordination. The membership of the D-IED SC comprises representatives of the organizations in the Federal government that have responsibilities in the area of countering the terrorist use of IEDs.

Back to Top


ADA505902
Selected Research Highlights and Potential Impact for Army Applications

Descriptive Note: Briefing charts
Personal Author(s): Joannopoulos, John D
Report Date: Dec 2008
Media Count: 28   Page(s)
Descriptors: (U) *SITUATIONAL AWARENESS, *NANOTECHNOLOGY, *ARMY RESEARCH, *ARMY PERSONNEL, ROOM TEMPERATURE, COATINGS, LIGHTWEIGHT, AUTONOMOUS NAVIGATION, NIGHT VISION, MEDICAL SERVICES, INFRARED COMMUNICATIONS, EXPLOSIVE CHARGES, COMPOSITE MATERIALS, LOW COSTS, IMPROVISED WEAPONS, SURVIVABILITY
Identifiers: (U) BRIEFING CHARTS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) MISSION AND GOALS: To dramatically improve the survivability of the Soldier by working and extending the frontiers of Nano-technology through fundamental research ... and transitioning with our Army and Industry Partners.

Back to Top


ADA503517
Measurement of Trace Explosive Residues in a Surrogate Operational Environment: Implications for Tactical Use of Chemical Sensing in C-IED Operations

Descriptive Note: Conference paper
Personal Author(s): Kunz, Roderick R; Clow, Kerin; Hardy, Dennis; Fountain, III, Augustus W; Ostazeski, Stanley A; Oyler, Jonathan
Report Date: Dec 2008
Media Count: 17   Page(s)
Descriptors: (U) *TRACE ELEMENTS, *RESIDUES, *MEASUREMENT, REPRINTS, SYMPOSIA, DETECTION, DETECTORS, TRAINING, THREATS, PERFORMANCE(ENGINEERING), CHEMICALS, FIRING TESTS(ORDNANCE), PROBABILITY, FALSE ALARMS, EXPLOSIVES, CORRELATION, OPERATION, LEVEL(QUANTITY), SIGNATURES, STATISTICAL ANALYSIS, CONTAMINATION, LOW RATE, SPATIAL DISTRIBUTION, EXPLOSIVES DETECTION, SCENARIOS, MILITARY OPERATIONS
Identifiers: (U) IED(IMPROVISED EXPLOSVIE DEVICES), TRACE-EXPLOSIVE SIGNATURES, THREAT SIGNATURES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) A campaign to measure the amount of trace explosive residues in an operational military environment was conducted on May 27-31, 2007, at the National Training Center at Fort Irwin, CA. The objectives to this campaign were to develop the methods needed to collect and analyze samples from tactical military settings, to use the data obtained to determine what the trace-explosive signatures suggest about the potential capabilities of chemical-based means to detect IEDs and IED-related threats under tactical conditions, and finally, to present a framework whereby a sound understanding of the signature science can be used to guide development of new sensing technologies and sensor concepts of operation. Through our use of combined background and threat signature data, we have performed statistical analyses to estimate upper limits of notional sensor performance that is limited only by the spatial correlation of the signature chemicals to the threats of interest. Here, the threats were surrogate IEDs used in situational training exercises at the National Training Center. Even for this best case detection scenario, we estimate that tactical use of explosives detection to locate IEDs and/or IED-related threats will likely not support high detection probabilities (i.e., 50% PD at best) or low false alarm rates (i.e., 5% PFA likely). This is because, although explosive residues are spatially correlated with IED-related threats, the correlation is weak. Specifically, it was determined that only 27% of all IED-related threats exhibited trace explosive residues exceeding 1 microgram on/in their immediate vicinity, whereas for general background measurements this fraction was 1%. However, 6% of background measurements taken from live-fire areas recorded contamination levels in excess of 1 microgram. A greater understanding of explosives residue fate and transport is needed to further refine these estimates.

Back to Top
 


ADA503516
A Laser-Based Sensor for Ambient Detection of RDX and TNT

Descriptive Note: Conference paper
Personal Author(s): Roberson, Stephen D; Sausa, Rosario C
Report Date: Dec 2008
Media Count: 6   Page(s)
Descriptors: (U) *TNT, *RDX, *LASER APPLICATIONS, *DETECTION, RISK, REAL TIME, PHOTOCHEMICAL REACTIONS, EXPLOSIVE CHARGES, ELECTRON BEAMS, LOW ENERGY, LIMITATIONS, RESONANCE, PHOTOIONIZATION, ENERGETIC PROPERTIES, COUNTERTERRORISM, TERRORISM, FRAGMENTS, RESIDUES, ULTRAVIOLET LASERS, SYMPOSIA, REPRINTS, ELECTRON PROBES, FREQUENCY, LASER PUMPING
Identifiers: (U) *FRAGMENT DETECTION, *RESONANCE ENHANCED MULTIPHOTON IONIZATION, IED(IMPROVISED EXPLOSIVE DEVICES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) We detect trace residues of RDX and TNT by surface photofragmentation - fragment detection in real time at ambient conditions. An infrared or visible laser generates signature, NO molecular fragments, and a second, low energy, ultraviolet laser facilitates their detection by resonance enhanced multiphoton ionization. We present the effects of pump laser wavelength, laser energy, delay timing between the pump and probe beams, and analyze concentration on signal intensity. Sensitivity analyses yield RDX and TNT detection limits in the low nanogram/(square centimeter). The detection of energetic materials is a serious concern in the war on terror, either on the war front or in our homeland. With the widespread use of improvised explosive devices and the increased potential for homeland attack, a sensor that detects energetic materials that is robust, accurate, and easy to deploy would undoubtedly reduce the risk to warfighters and civilians. As a result, there has been much interest in developing such a sensor.

Back to Top


ADA493958
On Some Markovian Salvo Combat Models

Descriptive Note: Master's thesis
Personal Author(s): Neo, Say B
Report Date: Dec 2008
Media Count: 79   Page(s)
Descriptors: (U) *WEAPON SYSTEMS, *MARKOV PROCESSES, *EXPLOSIVE CHARGES, *ELECTRONIC WARFARE, FIRES, MILITARY PLANNING, MILITARY TACTICS, DISCRETE DISTRIBUTION, THESES, TARGET ACQUISITION, COMMAND CONTROL COMMUNICATIONS, MULTIPLE TARGETS
Identifiers: (U) *FIRE ALLOCATION, STOCHASTIC MODEL, SHOOTING STRATEGY, SHOOTING TACTICS, MARKOV CHAIN, OPERATIONAL PLANNING, IED(IMPROVISED EXPLOSIVE DEVICES), BDA(BATTLE DAMAGE ASSESSMENT), CONVOYS TRANSPORT, ASYMMETRIC WARFARE
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) In this thesis, we present Markov-based probability models for two important problems related to current combat situations: fire allocating of salvos against multiple targets, and Improvised Explosive Devices (IED) attacks on convoys transporting supply and troops. For the fire allocation problem, we suggest a certain shooting tactics, called Persistent Shooting, and explore the effect of various engagement parameters using a discrete time Markov chain. We consider the scenario where a single shooter engages a set of targets by a series of salvos. The shooter has a limited number of munitions to deliver and the question is how to allocate the fire in the presence of limited BDA capabilities. For the IED problem, we explore the effect of various tactical parameters on the IED threat and on the resulting attrition of the friendly force using a continuous time Markov chain.

Back to Top


ADA494069
Efficient Employment of Adaptive Sensor

Descriptive Note: Master's thesis
Personal Author(s): Kiang, Lee K
Report Date: Dec 2008
Media Count: 39   Page(s)
Descriptors: (U) *EXPLOSIVE CHARGES, *GUIDED MISSILE LAUNCHERS, LAND WARFARE, OPTIMIZATION, STOCHASTIC PROCESSES, DETECTORS, EMPLOYMENT, THREATS, THEORY, EFFICIENCY, THESES, APPROXIMATION(MATHEMATICS), STATIONARY, SEARCHING, ADAPTIVE SYSTEMS, ALLOCATIONS, ALGORITHMS, GUIDED MISSILES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) We consider a sensor that is subject to false-positive and false-negative errors. The sensor searches for stationary threat objects such as ballistic missile launchers or improvised explosive devices. The objects are located in a certain area of interest, which is divided into area-cells. The area-cells are defined such that each one of them may contain, at most, one threat object. The task of the sensor is to determine if an area-cell contains a threat object, and the objective of the searcher is to maximize the number of correctly determined area-cells. Since definitive identification of a threat object, and subsequent handling of that threat, are done by a limited number of available ground combat units, the correct determination of an area-cell is crucial for better allocating and directing these scarce resources. We develop an algorithm, rooted in large deviations theory and stochastic approximation theory, that leads to the optimal search effort. The computed allocation maximizes the expected number correctly determined area-cells as the number of available looks for searching becomes large.


Back to Top


ADA494895
Regression in Analysis
Descriptive Note: Research paper
Personal Author(s): Burke, Kevin
Report Date: 12 Nov 2008
Media Count: 6   Page(s)
Descriptors: (U) *PREDICTIONS, *LINEAR REGRESSION ANALYSIS, *BEHAVIOR, *ENEMY, *EMPLACEMENT, *INTELLIGENCE, *IMPROVISED WEAPONS, ANALYSTS, TIME, EXPLOSIVES, OBSERVATION, POSITION(LOCATION), VARIABLES
Identifiers: (U) *INTELLIGENCE ANALYSIS, *DATA ANALYSIS, *IED EMPLACEMENT, IED(IMPROVISED EXPLOSIVE DEVICES), PREDICTOR VARIABLES, SOCIOECONOMIC STATUS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) In regression analysis, the goal is to determine the values of parameters for a function to best fit a set of data observations. Put another way, regression attempts to best describe what inputs result in a given output. Though there are many complex forms of regression models, the simplest is a linear regression model. In this paper, the author uses linear regression analysis to determine what factors may or may not contribute to the emplacement of an improvised explosive device (IED) in and around Baghdad. The regression model he uses takes into account the following variables: the socioeconomic status of an area, previous IED activity there, time, and unattributed factors. He reminds the reader that regression analysis is nothing more than another tool available to the analyst. It is not, and should not be, the analysis itself. Also, a regression model is a very specific thing. While the intent is to create a model and analyze a data set so as to better predict, one must realize that, ultimately, the model only tells the analyst about that specific data set. It is up to the analyst, and those creating the models, to determine whether or not effective predictions can be made. Lastly, regardless of whether one understands regression a little bit or not at all, it is important to remember that the whole point is to make improvements. While the IED model presented here is clearly immature, incomplete, and overly simple, it is a beginning. Good enough is a phrase that should never enter the analyst's lexicon. To do so is to put soldiers at risk willingly. Improvement, not perfection, is the goal, and the addition of regression analysis to the analyst's tool kit would certainly be a vast improvement.

Back to Top


ADA494129
Inventory of Materials to be Used in Explosive Effects Mitigating Structures (Inventarisatie van materialen te gebruiken in constructies ter afscherming van explosie-effecten)

Descriptive Note: Final rept.
Personal Author(s): van der Jagt, O C
Report Date: Nov 2008
Media Count: 47   Page(s)
Descriptors: (U) *MATERIALS, *EXPLOSION EFFECTS, DUTCH LANGUAGE, INVENTORY, NETHERLANDS, LITERATURE SURVEYS
Identifiers: (U) FOREIGN REPORTS, AQ F09-05-01880, BLAST MITIGATION, FRAGMENT RESISTANT
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Recent developments in material science may lead to better mitigating structures for the disposal of UXOs and IEDs. Within the framework of Work Package 4000 of the MOD program V701, a new concept mitigating structure will be developed. The goal of this literature study is to survey recent developments in material science and especially if any new material has the potential to be used successfully in explosive effects mitigating structures. This study aims to make an inventory of materials used in explosion effects mitigating structures and studied materials or material combinations. The conclusion is that no new breakthrough developments in the field of material science have occurred recently, that have lead to new concepts in explosive effects mitigating structures. Current structures use traditional' materials like steel, concrete, sand, water, fibre reinforced plastics and ceramics. There is progress in material development, but this is evolutionary, not revolutionary. The material inventory of this report will used as a basis for the development of new explosion effects mitigating concepts within the program V701. To come to an efficient and effective structure, it is imperative to have a complete list of requirements. Shape, production process, and also costs and material availability are important factors.

Back to Top


ADA490963
The Joint Improvised Explosive Device Defeat Organization: DOD's Fight Against IEDs Today and Tomorrow

Descriptive Note: House subcommittee rept.
Personal Author(s): Snyder, Vic; Akin, W T; Spratt, John; Sanchez, Loretta; Tauscher, Ellen O; Andrews, Robert; Davis, Susan A; Cooper, Jim; Johnson, Hank; Sestak, Joe; Bartlett, Roscoe G; Jones, Walter B; Miller, Jeff; Gingrey, Phil
Conaway, Michael; Davis, Geoff; DeTeresa, Steven J; McErlean, Michael W; Fenner, Lorry M; Bleicher, Noah B
Report Date: Nov 2008
Media Count: 67   Page(s)
Descriptors: (U) *DEPARTMENT OF DEFENSE, *MISSIONS, *EXPLOSIVES, *IMPROVISED WEAPONS, *MEASURES OF EFFECTIVENESS, *ACCOUNTABILITY, *ORGANIZATIONS, MILITARY PROCUREMENT, BOMBS, MILITARY BUDGETS, COUNTERMEASURES, AFGHANISTAN CONFLICT, IRAQI WAR, ASYMMETRIC WARFARE, MILITARY TRAINING, PERSONNEL, THREATS, NETWORKS, INTELLIGENCE, METRICS, MILITARY FORCES(UNITED STATES), SOURCES
Identifiers: (U) *JIEDDO(JOINT IED DEFEAT ORGANIZATION), *IED(IMPROVISED EXPLOSIVE DEVICES), RECOMMENDATIONS, BOMB MAKERS, BOMB SOURCES, IED NETWORKS, C-IED(COUNTER IMPROVISED EXPLOSIVE DEVICES), C-IED OPERATIONS INTEGRATION CENTER, JOINT CENTER OF EXCELLENCE, RAPID ACQUISITION, STRATEGIC PLANNING, BUDGET ALLOCATIONS, ORGANIZATIONAL STRUCTURE
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The end of major combat operations in Iraq in 2003 was merely the beginning of a different fight, one in which an unconventional weapon has had a deadly impact on conventional forces. The Improvised Explosive Device (IED) has proven to be the number one threat to Coalition Forces in Iraq and now in Afghanistan. In response to this relatively cheap and somewhat unsophisticated killer, the Department of Defense (DoD) has invested billions of dollars and established a large organization with one goal: to defeat IEDs. The Joint IED Defeat Organization (JIEDDO) has had some success in this mission, but the use of IEDs persists. Because of the resources invested in JIEDDO and the urgency of its charge, it is important to assess the entity as it stands today and consider its role for the future. Therefore, the House Armed Services Subcommittee on Oversight and Investigations conducted this study to answer two questions: (1) Is JIEDDO winning the Counter-IED (C-IED) fight in Iraq and Afghanistan? and (2) What is the Department's long-term plan for JIEDDO and for addressing other asymmetric threats? JIEDDO's actions and activities fall under three lines of operation: (1) Defeat the Device, (2) Attack the Network, and (3) Train the Force. The primary focus of the Defeat the Device effort is on neutralizing the IED after it is emplaced. This includes funding the development of technical and nontechnical countermeasures and the ability to rapidly field new equipment. Attack the Network activities aim to find and eliminate bomb makers and their supporters before they can assemble and emplace IEDs. The C-IED Operations Integration Center is the primary enabler for attacking IED networks. The Joint Center of Excellence supports training for U.S. personnel on how to protect themselves from IEDs. Although JIEDDO spends more than $4 billion annually under these three lines of operation, this study concludes that it is not clear how well the organization is accomplishing its mission.

Back to Top


ADA494284
The Future of JIEDDO - The Global C-IED Synchronizer

Descriptive Note: Final rept.
Personal Author(s): Clark, Vincent T
Report Date: 31 Oct 2008
Media Count: 21   Page(s)
Descriptors: (U) *EXPLOSIVE CHARGES, *MILITARY ORGANIZATIONS, IMPROVISED WEAPONS, AFGHANISTAN, TASK FORCES, IRAQ, ENEMY
Identifiers: (U) IED(IMPROVISED EXPLOSIVE DEVICE), JIEDDO(JOINT IED DEFEAT ORGANIZATION), CIED(COUNTER-IED), TTP(TACTICS TECHNIQUES AND PROCEDURES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The U.S. was not prepared for the Improvised Explosive Device (IED) threat it faced in Afghanistan and Iraq. IED's were the cause of over fifty percent of the U.S. casualties, and emerged as the weapon of choice for the enemy. The warfighters were in need of solutions, which the Services were unable to deliver quickly. This precluded the warfighters from being able to exploit the enemies inherent weaknesses. Therefore, the enemy was able to adapt and change their tactics, techniques, and procedures (TTP) faster than the U.S. could respond to defeat the IED threat. As a result, the Department of Defense created an ad hoc organization, Joint IED Defeat Organization (JIEDDO), to circumvent the bureaucratic processes of the Services. Recent reports indicate that JIEDDO and some other counter-IED (CIED) Task Forces are having some success. However, JIEDDO lacks the proper command authority to truly change the outcome on the battlefield. Additionally, evidence suggests that the IED threat has the potential to proliferate beyond Iraq and Afghanistan. This paper examines the IED threat and the genesis of JIEDDO and recommends future command relationships that would better posture the U.S. for the Long War.

Back to Top


ADA489256
The Feasibility of Nonlinear Dimensionality Reduction for the Rapid Analysis of Persistent Surveillance Data, including the Detection of IED Placement Activity

Descriptive Note: Memorandum rept. 15 Apr 2007-30 Sep 2008
Personal Author(s): Bucholtz, Frank; Nichols, Jonathan M; Duncan, Michael D; Smith, Leslie N
Report Date: 31 Oct 2008
Media Count: 14   Page(s)
Descriptors: (U) *EXPLOSIVES, *DETECTION, SURVEILLANCE, IMPROVISED WEAPONS, VIDEO SIGNALS, DATA PROCESSING, ALGORITHMS
Identifiers: (U) NLDR(NONLINEAR DIMENSIONALITY REDUCTION), PCA(PRINCIPAL-COMPONENT ANALYSIS), PS(PERSISTENT SURVEILLANCE), IA(IMAGE ANALYST), PE61135N
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Our ability to analyze large, complex data sets, such as persistent surveillance data, has often far outstripped our ability to rapidly analyze that data. We have identified a class of intelligent data reduction algorithms, known collectively as Nonlinear Dimensionality Reduction (NLDR), and we believe the utilization of NLDR approaches will allow a significant performance improvement for automated data analysis systems. In this report, we review the basic elements of NLDR techniques, we discuss the advantages of these techniques over more traditional approaches such as Principal-Component Analysis (PCA), and we outline an approach for utilizing NLDR to detect activities leading to the placement of IEDs based on airborne persistent surveillance video data.

Back to Top


ADA486565
BANGEX 5 Preliminary Report

Descriptive Note: Technical rept.
Personal Author(s): Guest, Peter S; Goroch, Andreas K; Bieger, David G; Lind, Richard J; Davidson, Kenneth L
Report Date: 15 Sep 2008
Media Count: 26   Page(s)
Descriptors: (U) *TARGET DETECTION, *EXPLOSIVE CHARGES, ENVIRONMENTS, DETECTION, DETECTORS, AIRCRAFT, TEST FACILITIES, THESES, IMAGES, VISIBILITY, NAVAL RESEARCH LABORATORIES, MEASUREMENT, MATHEMATICAL MODELS, INFRARED SIGNATURES
Identifiers: (U) IED(IMPROVISED EXPLOSIVE DEVICE)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This report describes preliminary results from the BANGEX 5 field exercise which occurred at the China Lake Test Range JCIF facility 3 - 5 June, 2008. The goal of this research is to improve our forces ability to detect improvised explosive devices (IEDs) from aircraft. Considerable progress has been made toward this goal as a result of this exercise. A variety of sacrifice environmental measurements were performed to characterize the conditions associated with IEDs and the accompanying changes to the local soil conditions. These were complimented by operational aircraft imaging measurements (movies) of various simulated IED and non-IED targets. These measurements will be used to improve the physics used in IED detection numerical models. Although analysis of these data are just beginning, the authors and collaborators have already verified that IED locations can be detected from high-flying aircraft sensors by the thermal and visible signatures of disturbed soil and other changes in the local environment. The measurements described here will form the basis of the follow-up studies that will be presented in future reports and in the thesis of Capt. Bieger.

Back to Top


ADA488723
Detection of IED Emplacement in Urban Environments

Descriptive Note: Master's thesis
Personal Author(s): O'Hara, Matthew P
Report Date: Sep 2008
Media Count: 61   Page(s)
Descriptors: (U) *PREDICTIONS, *URBAN AREAS, *IMPROVISED WEAPONS, *DETECTION, PATTERNS, BEHAVIOR, COUNTERMEASURES, MAGNETIC MATERIALS, EXPLOSIVES, THESES, NETWORKS, DETECTORS, EMPLACEMENT
Identifiers: (U) *IED(IMPROVISED EXPLOSIVE DEVICES), *MOTES, *WSN(WIRELESS SENSOR NETWORKS)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This research will be focused on discovering patterns of activity that lead to the emplacement of IEDs by terrorists in urban environments. This research will employ a network in a predictive mode by looking for suspicious activity patterns and raising alerts when a pre-determined level of confidence is achieved in the prediction. The scope of this thesis will be to conduct various experiments using wireless sensor network motes to detect the presence of magnetic material. Using various configurations of the motes, a pattern will be established that best predicts the presence of IEDs in a busy urban environment. The configurations will be designed and tested for reliability and coverage to support detection in various urban settings. The results show that wireless sensor networks in conjunction with other anti-IED methods prove useful for the detection of IED material in urban settings. A wireless sensor network configured with proper equipment provides useful results for detecting IEDs and shows potential for correctly predicting behavior associated personnel carrying IED material.

Back to Top


ADA488659
Acquisition of a Static Human Target in Complex Terrain: Study of Perceptual Learning Utilizing Virtual Environments

Descriptive Note: Master's thesis
Personal Author(s): Kammerzell, Robert L
Report Date: Sep 2008
Media Count: 105   Page(s)
Descriptors: (U) *SNIPERS, *VISUAL TARGETS, *LEARNING, *VISUAL PERCEPTION, *COMPUTER GAMES, *TARGET ACQUISITION, *ARMY TRAINING, TARGET DETECTION, VIRTUAL REALITY, THESES, ENEMY, QUESTIONNAIRES, COMPUTERIZED SIMULATION, THREATS, SURVIVABILITY, SKILLS, LAND WARFARE, ARMY PERSONNEL
Identifiers: (U) *STATIC HUMAN TARGETS, *PERCEPTUAL LEARNING, STATIC TARGETS, SNIPER DETECTION, TARGET HIT RATE, SNIPER OPERATIONS, VISUAL SKILL TRAINING, DELTA3D GAME ENGINE, ENEMY SNIPERS, VISUAL INTELLIGENCE, COMPLEX TERRAIN
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Soldiers conducting ground operations must visually detect various dynamic and static threats. While enemy utilization of improvised explosive devices (IEDs) is a constant danger, there is also the requirement to detect the insurgent sniper threat. The U.S. Army has long identified enemy sniper activity as one of great importance to both our individual soldier's survivability and unit operational effectiveness. Specifically, the soldier's visual system and perceptual skills are immediately tasked with categorizing both the environment and any detected threat. This study utilized game engine technology to assess the ability to train subjects in visual target acquisition within a complex virtual environment. The prevalence of computer games within the training realm requires study as to the game engine's ability to support current operations and soldier training. The study's results determined that training improved a subject's target Hit Rate percentage 29% (p=.0001), in comparison to the control group, when presented scenes of increased difficulty. Historically, military-themed computer games have succeeded in providing strategic training value. This study indicates that military-themed computer games also assist with individual soldier skills training.

Back to Top


ADA486602
Initial Set of Use Cases for High-Fidelity Synthetic Environment/Virtial Autonomous Navigation Environment Development Tied to Unmanned Ground Vehicle Capability Gaps

Descriptive Note: Technical rept. 1 Oct 2007-31 May 2008
Personal Author(s): Nagle, Joyce A; Goerger, Niki C; DeLong, Suzanne M
Report Date: Sep 2008
Media Count: 34   Page(s)
Descriptors: (U) *UNMANNED, *ROBOTICS, *AUTONOMOUS NAVIGATION, *GROUND VEHICLES, ARCHITECTURE, ARMY OPERATIONS, SURVEILLANCE, RECONNAISSANCE, HIGH EXPLOSIVES, URBAN AREAS, ENVIRONMENTS, MILITARY OPERATIONS, IMPROVISED WEAPONS, LINE OF SIGHT, SCENARIOS
Identifiers: (U) *HIGH FIDELITY SYNTHETIC ENVIRONMENTS, *CAPABILITY GAPS, *UNMANNED GROUND VEHICLES, *USE CASES, HFSE(HIGH FIDELITY SYNTHETIC ENVIRONMENT), GRMP(GROUND ROBOTICS MASTER PLAN), FOC(FORCE OPERATING CAPABILITIES), NON LINE OF SIGHT, IMPROVISED EXPLOSIVE DEVICES, BEYOND LINE OF SIGHT, JAUS(JOINT ARCHITECTURE FOR UNMANNED SYSTEMS), WARFIGHTERS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) To help guide alternative assessments and experiments for the development of a high fidelity synthetic environment (HFSE), an initial set of Use Cases was developed based on Capability Gaps identified in the U.S. Army/U.S. Marine Corps Ground Robotics Master Plan (Robotics Systems Joint Project Office (RS JPO), 2007). Four specific scenarios were developed in which an unmanned ground vehicle (UGV) is employed to contribute to a mission. The Use Cases are narrative descriptions of a sequence of actions a Warfighter equipped with a UGV, would undertake to accomplish a goal. The Use Cases do not identify requirements, but rather imply them in the stories they tell, leaving it up to an analyst to identify the requirements. The Use Cases avoid identifying or describing specific platforms, but rather create opportunities for analysts to identify capabilities. The Use Cases developed will provide the structure in which we can analyze both the HFSE and the UGV performance in the HFSE.

Back to Top


ADA502140
Development of Nanothermite Projectile for Improvised Explosive Device (IED) and Vehicle-Borne Improvised Explosive Device (VBIED) Neutralization. National Institute of Justice Final Report

Descriptive Note: Final rept.
Personal Author(s): Bless, S J; Wilson, D; Pedersen, B A; Wienman, L; Garnier, J
Report Date: Sep 2008
Media Count: 49   Page(s)
Descriptors: (U) *IMPROVISED WEAPONS, *NEUTRALIZATION, AMMONIUM NITRATE, DEFLAGRATION, COMMERCIAL EQUIPMENT, TECHNOLOGY TRANSFER, FUEL OIL
Identifiers: (U) REACTIVE MATERIAL, CAR BOMBS, VBIED(VEHICLE-BORNE IMPROVISED EXPLOSIVE DEVICES), ANFO(AMMONIUM NITRATE-FUEL OIL), VENTED DEFLAGRATION, PAN(PERCUSSION ACTUATED NONELECTRIC) DISRUPTORS, MINIMAL COLLATERAL DAMAGE, BOMB SQUAD OPERATIONAL TACTICS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) It has been shown that ammonium nitrate-fuel oil (ANFO) charges in the range of several pounds to 80 pounds can be neutralized by impact of projectiles containing small amounts of a reactive material. The mechanism is that limited deflagration of the ANFO creates sufficient pressure to rupture plastic or steel containers.

Back to Top


ADA502021
Mine-Resistant, Ambush-Protected (MRAP) Vehicles: Background and Issues for Congress

Descriptive Note: Congressional rept.
Personal Author(s): Feickert, Andrew
Report Date: 01 Aug 2008
Media Count: 7   Page(s)
Descriptors: (U) *MINE RESISTANT VEHICLES, POLICIES, EXPLOSIVE CHARGES, MILITARY PROCUREMENT, IMPROVISED WEAPONS, DEPARTMENT OF DEFENSE, OPERATIONAL EFFECTIVENESS
Identifiers: (U) MRAP(MINE-RESISTANT AMBUSH-PROTECTED), MRAP VEHICLES, IEDS(IMPROVISED EXPLOSIVES DEVICES), HMMWVS(HIGH MOBILITY MULTI-WHEELED VEHICLES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) In late 2007, the Department of Defense (DOD) launched a major procurement initiative to replace most uparmored High Mobility, Multi-Wheeled Vehicles (HMMWVs) in Iraq with Mine-Resistant, Ambush-Protected (MRAP) vehicles by FY2009. MRAPs have been described as providing significantly more protection against Improvised Explosive Devices (IEDs) than uparmored HMMWVs. DOD's decision not to procure MRAP IIs, MRAP logistical and readiness concerns, and MRAP rollover accidents could be potential policy issues for congressional consideration. This report will be updated.

Back to Top


ADA482799
Mine-Resistant, Ambush-Protected (MRAP) Vehicles: Background and Issues for Congress

Descriptive Note: Congressional rept.
Personal Author(s): Feickert, Andrew
Report Date: 06 Jun 2008
Media Count: 7   Page(s)
Descriptors: (U) *MILITARY PROCUREMENT, *MINE RESISTANT VEHICLES, MILITARY PLANNING, PERFORMANCE(ENGINEERING), SURVIVABILITY
Identifiers: (U) *MRAP(MINE-RESISTANT AMBUSH-PROTECTED), MRAP VEHICLES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) In late 2007, the Department of Defense (DOD) launched a major procurement initiative to replace most uparmored High Mobility, Multi-Wheeled Vehicles (HMMWVs) in Iraq with Mine-Resistant, Ambush-Protected (MRAP) vehicles by FY2009. MRAPs have been described as providing significantly more protection against Improvised Explosive Devices (IEDs) than uparmored HMMWVs. The DOD's accelerated MRAP program, decisions on the number of MRAPs procured, and MRAP's performance in urban and counterinsurgency operations raise a number of potential policy issues for congressional consideration. This report will be updated.

Back to Top


ADA483489
A Unified General Framework of Insurgency Using a Living Systems Approach

Descriptive Note: Master's thesis
Personal Author(s): Kendall, Shanece L
Report Date: Jun 2008
Media Count: 108   Page(s)
Descriptors: (U) *INSURGENCY, *HIGH EXPLOSIVES, *IRAQ, THESES, HISTORY, SYSTEMS APPROACH, LIFE(BIOLOGY), BOOKS, PHYSICAL SCIENCES, SOCIAL SCIENCES, FITTINGS, EXPLOSIVE CHARGES, THEORY, FORMULATIONS, ECONOMICS
Identifiers: (U) IED(IMPROVISED EXPLOSIVE DEVICE), *IMPROVISED EXPLOSIVE DEVICES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This thesis develops a unified general framework of insurgency. The framework is unifying in that it includes all the physical and social science formulations of insurgencies and both contemporary and historical insurgencies. It is general in that it describes all insurgencies rather than a specific one. This thesis first redefines the definition of insurgency in the context of the twenty-first century and addresses the military, political, social, and economic elements. Next, it adopts the view that an insurgency is a living system. This idea is based on the characteristic that every insurgency consists of a group of people embedded in a larger society. Using this concept, this thesis argues that James Grier Miller's Living Systems Theory, from his book Living Systems, is the most fitting theory to study insurgency. To demonstrate the framework's effectiveness, it is applied to the Iraq Sunni Insurgency. The framework is used to describe the structure of the insurgency system using three levels insurgency, Improvised Explosive Device (IED) Unit, and IED Cell and the twenty critical subsystems that process information and matter energy in the insurgency's IED Cell. This framework should help clarify, focus, and support the current debates about policy, operations, and tactics for insurgencies.

Back to Top



ADA483482
Enhancing the Operational Effectiveness of the Ground-Based Operational Surveillance System (G-BOSS)

Descriptive Note: Master's thesis
Personal Author(s): Midgette, William D
Report Date: Jun 2008
Media Count: 70   Page(s)
Descriptors: (U) *SURVEILLANCE, *GROUND BASED, THESES, OPERATIONAL EFFECTIVENESS, EXPLOSIVES, IMPROVISED WEAPONS, CASUALTIES, AFGHANISTAN, SITUATIONAL AWARENESS, DETECTION, IRAQ, CAMERAS
Identifiers: (U) G-BOSS(GROUND BASED OPERATIONAL SURVEILLANCE SYSTEM)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The majority of casualties in the ongoing conflicts in Iraq and Afghanistan are due to improvised explosive devices (IEDs). To counter this threat, the Marine Corps directed that a persistent surveillance capability be identified and fielded as soon as possible. As a result, the development and fielding of the Ground Based Operational Surveillance System (G-BOSS) occurred rapidly. G-BOSS consists of a tower, multiple cameras, and a combat operations center (COC). Today, scores of these systems are in use. However, minimal guidance has been provided to operators on effective techniques, tactics, and procedures (TTPs). Furthermore, the benefits of adding additional sensors to G-BOSS and networking multiple systems are not clear. This research investigates these issues through the use of an agent-based simulation. Specifically, thousands of computational experiments utilizing a state-of-the-art experimental design, were run on a scenario based on concurrent live developmental tests at 29 Palms by the Marine Corps Operational Test and Evaluation Activity (MCOTEA). The experiments assessed the ability of the system to correctly classify objects (e.g., snipers, IED emplacement, and mortar teams, as well as neutrals and friendly forces) over a variety of enemy actions, G-BOSS configurations, and tactical choices. The results indicate that the most critical factor in determining the level of situational awareness provided by G-BOSS is, by far, placement of the towers. Moreover, little benefit is seen in coordinating the towers and COCs unless motion detection radars are used. With use of the motion detection radar, the synchronization of multiple systems dramatically enhances the overall performance of G-BOSS.

Back to Top


 

ADA483643
A Heuristic Algorithm for Optimized Routing of Unmanned Aerial Systems for the Interdiction of Improvised Explosive Devices

Descriptive Note: Master's thesis
Personal Author(s): Scioletti, Michael S
Report Date: Jun 2008
Media Count: 61   Page(s)
Descriptors: (U) *DRONES, *EXPLOSIVE CHARGES, *ALGORITHMS, IMPROVISED WEAPONS, UNMANNED, HEURISTIC METHODS, ROUTING, AIRBORNE, INTERDICTION, OPTIMIZATION, THESES
Identifiers: (U) IEDS(IMPROVISED EXPLOSIVE DEVICES), UAS(UNMANNED AERIAL SYSTEM)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Improvised explosive devices (IEDs) are effective weapons for insurgents targeting conventional military and security forces. Real-time information gathering about likely use of such weapons is one approach to reduce the effectiveness of IEDs. Unmanned aerial system (UASs) may provide the information gathering capability commanders need to interdict IEDs. Currently, UASs are not systematically utilized in that capacity. This research develops a routing tool that uses column-generation techniques and a greedy algorithm to route UASs through suspected IED locations for the purpose of IED interdiction as it transit to and from command directed missions. In empirical studies of data sets with up to 125 IED locations and missions, the routing tool provides optimal or near-optimal solutions in all instances tested. The tool produces de-conflicted routes for up to three UASs within five minutes of computing time.

Back to Top


 

ADA491163
Army AL&T, April-June 2008

Descriptive Note: Journal
Report Date: Jun 2008
Media Count: 69   Page(s)
Descriptors: (U) *IMPROVISED WEAPONS, *PROTECTIVE EQUIPMENT, *EXPLOSIVE CHARGES, *ARMORED VEHICLES, DRONES, MILITARY PUBLICATIONS, COMBAT FORCES, AFGHANISTAN, EXPLOSIVE ORDNANCE DISPOSAL, URBAN WARFARE, GROUND VEHICLES, BATTLEFIELDS, ARMY PERSONNEL, LINE OF SIGHT, IRAQ
Identifiers: (U) *FCS(FUTURE COMBAT SYSTEMS), IED(IMPROVISED EXPLOSIVE DEVICES), MGV(MANNED GROUND VEHICLES), MAV(MICRO-AIR VEHICLES), EOD(EXPLOSIVE ORDNANCE DISPOSAL), UAV(UNMANNED AERIAL VEHICLES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) With this issue, we are showcasing the Army's Future Combat Systems (FCS) in a series of articles designed to give you a better understanding of just how far this program has progressed since System Development and Demonstration began in 2003. One may think that FCS is only about providing future capabilities to our Soldiers, but FCS-like capabilities are protecting our Soldiers and giving them a decisive advantage on today's battlefield. Let me provide a few examples. The Frag Kit 5 armor protection for up-armored High-Mobility Multipurpose Wheeled Vehicles protects our troops from powerful improvised explosive devices. This technology comes from the lightweight composite armor being developed for the FCS family of manned ground vehicles (MGVs). The Micro-Air Vehicle, highly effective in U.S. Navy explosive ordnance disposal (EOD) operations in Iraq and planned for use by the Army's 25th Infantry Division in urban warfare operations there, is a forerunner to the FCS Class 1 Unmanned Aerial Vehicle. The Packbot, which is used by Soldiers and Marines in Iraq and Afghanistan during urban warfare and EOD operations, is the precursor to the FCS Small Unmanned Ground Vehicle. And, the Excalibur artillery round that is having much success in Iraq is being adapted for use with the FCS Non-Line-of-Sight Cannon. These technologies, in development for the future, are proving their success in the current fight.

Back to Top


 

ADA486730
Assessment of Electromagnetic and Passive Diffuse Infrared Sensors in Detection of IED-Related Behavior

Descriptive Note: Conference paper
Personal Author(s): Sundram, Joshua; Sim, Phua Poh; Rowe, Neil C; Singh, Gurminder
Report Date: Jun 2008
Media Count: 40   Page(s)
Descriptors: (U) *MAGNETIC DETECTORS, *INFRARED DETECTORS, *NETWORKS, *IMPROVISED WEAPONS, EMPLACEMENT, HUMANS, MONITORING, DETECTION, EXPLOSIVES
Identifiers: (U) *IED(IMPROVISED EXPLOSIVE DEVICES), *WIRELESS SENSOR NETWORKS, TESTING, IED DETECTION
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Persistent wireless sensor networks can be a cost-effective way to monitor public areas for suspicious behavior and reduce the need for military patrols. We examine here their applicability to the difficult problem of detecting emplacement of improvised explosive devices (IEDs). We first discuss the threat and how wireless sensor networks could help fight it; flexible and adaptable management of the sensor network is essential. We then report some experiments with magnetic and infrared sensors from Crossbow Technologies. We built a network of these sensors and ran human subjects through it engaged in various activities, some involving carrying of ferromagnetic materials. Results indicated that a variety of suspicious activities could be detected, though not all mock IEDs triggered detection, and triangulation was difficult due to the tendency of the signal to quickly saturate. Our network design is such that data can be easily aggregated in larger networks for broad-area automated monitoring of settings such as airports and busy urban areas.

Back to Top


ADA484369
Developing a Decision Model for Joint Improvised Explosive Device Defeat Organization (JIEDDO) Proposal Selection

Descriptive Note: Master's Thesis
Personal Author(s): Dawley, Lyle M; Marentette, Lenore A; Long, A M
Report Date: Jun 2008
Media Count: 98   Page(s)
Descriptors: (U) *DECISION MAKING, *EXPLOSIVE CHARGES, *OPERATIONAL EFFECTIVENESS, HIERARCHIES, SELECTION, AIR FORCE PLANNING, METHODOLOGY, TEST AND EVALUATION, SENSITIVITY
Identifiers: (U) *DECISION ANALYSIS, AHP(ANALYTIC HIERARCHY PROCESS), VFT(VALUE-FOCUSED THINKING), PROPOSAL SELECTION, DECISION MODELS, SENSITIVITY ANALYSIS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This research uses decision analysis to develop a structured, repeatable and most importantly defensible decision model for the evaluation of proposed IED defeat solutions submitted to the Joint IED Defeat Organization (JIEDDO). Additive value models using Value-Focused Thinking (VFT) and the Analytic Hierarchy Process (AHP) are examined as possible methodologies. VFT is determined to be the best fitfor JIEDDO's decision situation in which proposals are submitted continuously and must be scored independently of previous proposals. VFT is first used to determine desirable qualities in IED defeat options, and then to generate a hierarchal value model to evaluate these qualities in a selected group of alternatives. The most important criteria for IED defeat proposal evaluation are: Need for the Capability, Operational Effectiveness, and Usability. A group of 30 proposals, previously assessed by the current JIEDDO process, is evaluated suing the VFT decision model and the rank ordered results are compared with JIEDDO's previous selection decisions. The VFT decision model results support JIEDDO's past decisions to accept or reject IED defeat proposals, validating the model. Sensitivity analysis is then conducted to allow further insight to the robustness of the model. The resulting effort creates a decision model that, when consistently applied, provides a repeatable and defensible decision support model that reflects JIEDDO's priorities for proposal selection.

Back to Top.


ADA485623
A Cognitive Assessment of Military Approaches to Understanding

Descriptive Note: Monograph
Personal Author(s): Hibner, Daniel H
Report Date: 22 May 2008
Media Count: 61   Page(s)
Descriptors: (U) *ARMY OPERATIONS, *SYSTEMS APPROACH, *DECISION MAKING, *JUDGEMENT(PSYCHOLOGY), *MILITARY PLANNING, *COGNITION, SITUATIONAL AWARENESS, MEASURES OF EFFECTIVENESS, COMPREHENSION, KNOWLEDGE MANAGEMENT, PROBLEM SOLVING, MILITARY DOCTRINE, MILITARY COMMANDERS
Identifiers: (U) *UNDERSTANDING, *COE(CONTEMPORARY OPERATING ENVIRONMENT), OPERATIONAL DESIGN, COMPLEX PROBLEMS, INTUITION, INTUITIVE JUDGEMENT, RATIONAL ANALYSIS, PMESII-PT(POLITICAL MILITARY ECONOMIC SOCIAL INFORMATION INFRASTRUCTURE PHYSICAL ENVIRONMENT TIME), OPERATIONAL VARIABLES, SYSTEM OF SYSTEMS ANALYSIS, SYSTEMIC OPERATIONAL DESIGN, CACD(COMMANDER'S APPRECIATION AND CAMPAIGN DESIGN), COGNITIVE PSYCHOLOGY, COGNITIVE ASSESSMENT, ARMY DOCTRINE, JOINT DOCTRINE
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The U.S. Army currently finds itself in its first protracted conflict since Vietnam. Leaders at all echelons are making decisions and conducting missions that influence enemy forces, economies, civil security, governance, and politics. They do this while reacting to ambushes, improvised explosive devices (IEDs), and snipers. It requires great mental agility to succeed in a complex, changing, and high-pressure environment, and only an understanding of all the different systems of the operational environment and how they interact will allow the problem solving and rapid decision making that leads to success. It is a daunting task, but achieving understanding can and must be done, and once accomplished, leaders must stay true to conclusions that are drawn without the pressures of battle. The purpose of this monograph is to identify the most effective military approach to understanding that cues advantageous cognitive processes. By leveraging one's natural cognitive processes to understand the operational environment, better and more adaptable military planning is possible. This understanding brings leaders and soldiers closer to an expert level of knowledge that facilitates intuitive decision making. Better understanding also provides superior situational awareness to commanders at all levels. First, the monograph examines the importance and implications of understanding. Second, it provides a summary of current systemic approaches to understanding followed by an analysis and cognitive assessment of them. The military approaches to understanding examined include FM 3-0's operational variables of PMESII-PT, joint doctrine's concept of system of systems analysis, the developing concept of systemic operational design, and the developing doctrine found in TRADOC Pamphlet 525-5-500 for the commander's appreciation and campaign design. Third, the author presents recommendations on how the Army can best achieve understanding.

Back to Top



ADA485658
Organizational Implications of the U.S. Army's Increasing Demand for Explosive Ordnance Disposal Capabilities

Descriptive Note: Monograph
Personal Author(s): Riemer, Christopher F
Report Date: 22 May 2008
Media Count: 60   Page(s)
Descriptors: (U) *ORGANIZATIONAL REALIGNMENT, *EXPLOSIVE ORDNANCE DISPOSAL, *ARMY, IMPROVISED WEAPONS, IRAQI WAR, PERSIAN GULF WAR, CORPS LEVEL ORGANIZATIONS, VIETNAM WAR, BRIGADE LEVEL ORGANIZATIONS
Identifiers: (U) ARMY ENGINEERS, ARMY ORGANIZATION, DEFENSIVE OPERATIONS, FORCE PROTECTION, FORCE STRUCTURE, MANEUVER SUPPORT, ORDNANCE CORPS, EXPLOSIVE HAZARDS, TOSTI/JACKSON ORGANIZATIONAL ALIGNMENT MODEL
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This monograph traces the development and operational experiences of the U.S. Army's Explosive Ordnance Disposal (EOD) forces since Vietnam to clearly demonstrate the community's gravitational movement towards the Protection warfighting function. Since the beginning of the Global War on Terror, the U.S. Army has transformed its operational EOD forces through the entire range of DOTMLPF (doctrine, organizations, training, materials, leadership, personnel, and facilities). However, it has either failed or refused to address the implications the EOD's protection focus has for the institutional army. The friction created by resource competition and mission protectionism within the Army's traditional branch system, specifically the Engineer Regiment and the Ordnance Corps, prevents logic from prevailing against parochialism. Thus, the resulting efforts to transform both the EOD community and the overall force have yielded a sub-optimal organizational alignment that generates unnecessary friction and delays critical initiatives.

Back to Top


ADA481998
Improvised Explosive Devices: Booklet of Related Readings 25

Descriptive Note: Compilation rept.
Personal Author(s): MacLean, French
Report Date: 20 May 2008
Media Count: 61   Page(s)
Descriptors: (U) *IMPROVISED WEAPONS, *TERRORISM, *EXPLOSIVES, ATTACK, ROBOTS, CANADA, IDENTIFICATION SYSTEMS, CASUALTIES, MILITARY TRAINING, SOMALIA, COMPUTER VISION, VISUAL PERCEPTION, WOMEN, INTERNET, COUNTERTERRORISM, PERIODICALS, INTERPERSONAL RELATIONS, SAUDI ARABIA, NEWSPAPERS, INSECTS, BIONICS, YOUTH, PROPAGANDA, INSURGENCY, DOMESTIC VIOLENCE, ISLAM, IRAQI WAR, INDIA, PAKISTAN
Identifiers: (U) *IEDS(IMPROVISED EXPLOSIVE DEVICES), IED TECHNOLOGY, SOCIAL NETWORK THEORY, NEWS ARTICLES, JOURNAL ARTICLES, ISLAMIC EXTREMISM, IMAMS, WOMENS RIGHTS, LEFT-WING EXTREMISM, TERRORIST WANNABES, INTERNET PROPAGANDA, TERRORIST IDENTIFICATION, POLITICAL ISLAM, BILL WARNER, INVISIBILITY CLOAK, FEMALE SUICIDE BOMBERS, AL QAEDA, TERRORIST IDEOLOGY, TAMIL TIGERS, BLACK TIGERS, PAKISTANI SPECIAL FORCES, SHAYKH ADEN HASHI AYRO, ICO(ISLAMIC COURTS UNION)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This booklet represents the 25th in a series of compilations of print and electronic articles that are relevant to the defeat of improvised explosive devices (IEDs) that insurgent and terrorist operatives use to kill and injure U.S. military forces and civilian populations. section contains abstracts of the articles included in the booklet in alphabetical order. The articles are as follows: Acquiring Women's Rights in Saudi Arabia: Between Gradualism and Haste, by Raghida Dergham (Al-Hayat); Al-Ashaikh Urges Imams to Tackle Terror, Extremism (Arab News); Centre Points at 'Neighbouring' Country for Jaipur Blasts (The Hindu); Gamers Teach Search Engines How to See, by Colin Barras (New Scientist); Highlighting al-Qaeda's Bankrupt Ideology, by Matthew Levitt, Michael Jacobson (The Washington Institute for Near East Policy); India braces for surge in terror, by Sudha Ramachandran (Asia Times); Israel Startup Uses Behavioral Science to Identify Terrorists, by Guy Grimland (Haaretz.com); Jaipur Blasts: Woman Suicide Bomber Suspected (The Times of India); Flies' Eyes Could Enhance Robot Vision (Physorg.com); Kafir Dreams, by Jamie Glazov (FrontPageMag.com); My Daughter, the Terrorist, by Tarjei Kidd Olsen (Asia Times); New Material May Be Step Towards 3D Invisibility Cloak, by Jeff Hecht (New Scientist); Sharp Rise in Suicide Attacks by Women in Iraq Likely: US Expert, by Karin Zeitvogel (Yahoo! News); SPARK Programs Robots with Insect Perception (Gizmag); Strategy of Somalia's Islamists Survives Death of Militant Leader (The Jamestown Foundation); Terror 'Wannabes' Canada's Biggest Threat, by Colin Freeze (Globe and Mail); Those Who Go to Fight in Iraq 'Are Preachers of Evil', by Mariam Al Hakeem (Gulf News); US Trains Pakistani Killing Machine, by Syed Saleem Shahzad (Asia Times); World: RFE/RL Study Explores How Al-Qaeda Exploits Internet (Radio Free Europe/Radio Liberty).

Back to Top


ADA496894
Traumatic Brain Injury During Operation Iraqi Freedom: Findings from The United States Navy-Marine Corps Combat Trauma Registry

Descriptive Note: Journal article
Personal Author(s): Galarneau, Michael R; Woodruff, Susan I; Dye, Judy L; Mohrle, Charlene R; Wade, Amber L
Report Date: May 2008
Media Count: 10   Page(s)
Descriptors: (U) *WOUNDS AND INJURIES, *TRAUMA, *BRAIN, CASUALTIES, IRAQI WAR, MARINE CORPS PERSONNEL, MEDICAL SERVICES, NAVAL PERSONNEL, SKULL, REPRINTS
Identifiers: (U) TBIS(TRAUMATIC BRAIN INJURIES), CTR(COMBAT TRAUMA REGISTRY), PE63706N, WU60802
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The purpose of this study was to characterize traumatic brain injuries (TBIs) among military personnel (primarily Marines) during the second phase of Operation Iraqi Freedom from early in the medical care chain of evacuation through Landstuhl Regional Medical Center, a Level 4 American hospital in Germany. Data were obtained from the Navy-Marine Corps Combat Trauma Registry (CTR) and included both battle and nonbattle injuries. Follow-up of patients with TBI was conducted to examine the short-term medical and personnel- related effects of TBI among those surviving. Those injured in battle were more likely than those not injured in battle to have multiple TBI diagnoses, a greater number of all diagnoses, more severe TBIs, and to be medically evacuated. Intracranial injuries (for example, concussions) were the predominant type of TBI, although skull fractures and open head wounds were also seen. Improvised explosive devices were the most common cause of TBIs among battle injuries; blunt trauma and motor vehicle crashes were the most common causes among nonbattle injuries. Short-term follow-up of surviving patients with TBI indicated higher morbidity and medical utilization among the patients with more severe TBI, although mental conditions were higher among patients with milder TBI. Data from the Navy-Marine Corps CTR provide useful information about combatants' TBIs identified early in the combat casualty process. Results may improve clinical care for those affected and suggest strategies for primary prevention. The CTR staff plans to conduct additional follow-up studies of this group of patients with TBI.

Back to Top


ADA499228
Training Requirements for U.S. Ground Forces Deploying in Support of Operation Iraqi Freedom

Descriptive Note: Final audit rept.
Personal Author(s): Prinzbach, Robert F; Wimette, Timothy M; Quealy, Melissa; M; Smith, Hillary J; Curry, Deanne B; Hepler, Michael N; Schwersenska, Matthew D; Loughner, Loretta L; Tarmann, Allison E
Report Date: 09 Apr 2008
Media Count: 21   Page(s)
Descriptors: (U) *COMBAT FORCES, *IRAQI WAR, *MILITARY TRAINING, *MILITARY REQUIREMENTS, *LAND WARFARE, *MILITARY FORCES(UNITED STATES), *AUDITING, IMPROVISED WEAPONS, RULES OF ENGAGEMENT, LAND NAVIGATION, UNEXPLODED AMMUNITION, FIRST AID, PROTECTIVE EQUIPMENT, STRESS(PSYCHOLOGY), COMBAT READINESS, GENEVA CONVENTIONS, DEPLOYMENT
Identifiers: (U) *GROUND FORCES, *TRAINING REQUIREMENTS, IRAQI FREEDOM OPERATION, IED(IMPROVISED EXPLOSIVE DEVICES), CENTCOM TRAINING, PREDEPLOYMENT TRAINING, ANNUAL TRAINING, ANTITERRORISM TRAINING, COUNTRY ORIENTATION, RULES FOR USE OF FORCE, MEDIA AWARENESS, WEAPONS QUALIFICATION, STRESS PREVENTION, SUICIDE PREVENTION
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Our overall audit objective was to determine whether U.S. ground forces supporting Operation Iraqi Freedom received training necessary to meet operational requirements. Specifically, we determined whether requirements reflect the training necessary in the area of operation. This is the second in a series of reports addressing training for U.S. ground forces supporting Operation Iraqi Freedom. Combatant commanders are responsible for giving authoritative direction to subordinate commands and forces, while coordinating and approving the training necessary to carry out missions assigned to the command. U.S. Central Command requires that all personnel deploying in support of Operation Iraqi Freedom be trained in 14 areas: Country orientation; Anti-terrorism; Rules of engagement; Rules for use of force; Media awareness; Weapons qualification; Nuclear, biological, and chemical personal protective measures; First aid; Unexploded ordnance and improvised explosive devices; Land navigation; Combat lifesaver; Combat stress and suicide prevention; Regulatory briefings; and Compliance with law of war and Geneva and Hague conventions. The Services incorporated the 14 theater-specific training areas into their predeployment and annual training requirements. In addition, the Services effectively used a variety of means, such as lessons learned and input from units, to update predeployment training exercises. As a result, the Services provided realistic, theater-inspired training for units deploying in support of Operation Iraqi Freedom.

Back to Top


ADA480392
Small Vessel Security Strategy

Report Date: Apr 2008
Media Count: 58   Page(s)
Descriptors: (U) *POLICIES, *BOATS, *HOMELAND SECURITY, RISK, LAW ENFORCEMENT, MARITIME INDUSTRY, SMUGGLING, COAST GUARD, VULNERABILITY, THREAT EVALUATION
Identifiers: (U) *MARITIME SECURITY, SMALL VESSEL SECURITY, MTS(MARITIME TRANSPORTATION SYSTEM), WBIED(WATERBORNE IMPROVISED EXPLOSIVE DEVICES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Since the terrorist attacks of September 11, 2001, maritime security efforts have focused primarily on large commercial vessels, cargoes, and crew. Small vessels are, however, readily vulnerable to potential exploitation by terrorists, smugglers of weapons of mass destruction (WMDs), narcotics, aliens, and other contraband, and other criminals. Small vessels have also been successfully employed overseas by terrorists to deliver Waterborne Improvised Explosive Devices (WBIEDs). Law enforcement agencies face the challenge of distinguishing between the vast number of legitimate vessel operators and the relatively few individuals engaged in illicit activities. Additionally, a significant number of these craft operate internationally. Hence, there is a clear need to close security gaps and enhance the small vessel security environment. The Small Vessel Security Strategy (SVSS) addresses these concerns and provides a coherent framework to improve maritime security and safety. The Department of Homeland Security (DHS) Small Vessel Security Strategy (SVSS) exists within the framework of other security strategies. It does not replace any of the current strategies or relevant documents. Rather, this strategy harmonizes directions from related strategies into a multi-layered, unified approach for the component agencies within the DHS, and to lay the groundwork for DHS participation in coordination across all levels of government. It envisions a coordinated effort of Federal, state, local, and Tribal authorities, together with international partners, private industry, and recreational users of the waterways.

Back to Top


ADA479728
Joint Improvised Explosive Device Defeat Organization: Anomaly or Future Roadmap

Descriptive Note: Strategy research project
Personal Author(s): Sadowski, Robert W
Report Date: 25 Mar 2008
Media Count: 31   Page(s)
Descriptors: (U) *EXPLOSIVE CHARGES, MILITARY HISTORY, ASYMMETRY, IMPROVISED WEAPONS, THREATS
Identifiers: (U) IEDS(IMPROVISED EXPLOSIVE DEVICES), ASYMMETRIC THREATS, JIEDDO(JOINT IED DEFEAT ORGANIZATION)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Asymmetric threats and capabilities have long characterized the conduct of war and every era seems to have its own incarnation. Exemplars include the phalanx longbow and recently Improvised Explosive Devices (IEDs). The national response to the dramatic increase in IEDs in the current conflict began as a small cell in 2003 Within four years the response evolved into the Joint IED Defeat Organization which is currently a $3 billion 300-person organization answerable to the Deputy Undersecretary for Defense, but coordinating the activity of thousands. JIEDDO itself has been compared to a 'Manhattan-style' project This paper provides historical perspective through case studies while exploring other analogs such as the North Atlantic shipping tragedy in WWII. More important, discerning patterns that emerge offers glimpses on how we should respond to future threats. Does the JIEDDO model represent a single point in time or does it provide a representative guide for solving difficult issues that cross service, material, agency, and national lines? Solutions to asymmetric threats have perceived single answers or silver bullet approaches, but in reality require integration across a wide domain. This is not only a contemporary assessment of JIEDDO but a comment echoed at the close of World War II.

Back to Top


ADA498103
A Comparison of U.S. Responses to Unexpected Technology Breakthroughs

Descriptive Note: Strategy Research Project
Personal Author(s): Day, James V
Report Date: 04 Mar 2008
Media Count: 36   Page(s)
Descriptors: (U) *COLD WAR, *EXPLOSIVES DETECTION, *NATIONAL DEFENSE, SECOND WORLD WAR, KNOWLEDGE BASED SYSTEMS, CIVIL DISTURBANCES, ORGANIZATIONS, UNITED STATES, MILITARY FORCES(UNITED STATES), RESOURCES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The United States has a history dating back to the American Civil War of responding to perceived technology weaknesses, gaps, or unexpected technology breakthroughs. In each case an organization was formed and processes created to try and mitigate an adversary?s technology lead or close the gap. This essay examines three of the more successful responses to unexpected technology breakthroughs and gaps: the National Defense Research Committee (NDRC) during World War II, the Defense Advanced Research Project Agency (DARPA) from the Cold War and the Joint Improvised Explosive Devise Defeat Organization (JIEDDO) from Operation Iraqi Freedom. These three organizations faced similar challenges in terms of resources, coordinating and integrating with military services, and developing a knowledge base of developing and available technologies. Recommendations are developed from these histories including the creation of a Joint Functional Command for Technology Development and ensuring that the military services use both a requirements pull and a technology push to develop new technologies.

Back to Top


ADA479948
Deceptive Tactics for Protecting Cities Against Vehicle Borne Improvised Explosive Devices

Descriptive Note: Master's thesis
Personal Author(s): Lugo, Manuel X
Report Date: Mar 2008
Media Count: 91   Page(s)
Descriptors: (U) *EXPLOSIVE CHARGES, *DECEPTION, MATHEMATICAL MODELS, NETWORKS, DECOYS, GRAPHICAL USER INTERFACE, MILITARY TACTICS, THESES, INTERDICTION
Identifiers: (U) VBIED(VEHICLE BORNE IMPROVISED EXPLOSIVE DEVICES), SHAPE FILE TO ARC CONVERTER, NETWORK INTERDICTION, AGENT BASED SIMULATION
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This thesis focuses on interdiction of Vehicle Borne Improvised Explosive Devices (VBIED) on a major city by using transparent and deceptive assets. Transparent assets (e.g., road blocks) are those for which we assume positions are known by both attackers and interdictors. Decoys and traps are deceptive assets. Decoys are meant to be perceived as effective interdiction assets by attackers, while traps are not perceived. We use a mathematical optimization model to allocate interdiction assets maximizing expected interdicted value. Then, we use agent-based simulation to assess the effectiveness of those interdiction plans against a variety of attacker s behaviors: perceptive (as assumed by the optimization), na ve, communicative, route blocker (static), route blocker (dynamic) and clairvoyant. We use two test networks and seven scenarios consisting of different combinations of interdiction assets. From our analysis we note that: (a) if the network incorporates deception, any behavior other than perceptive may be advantageous to the attacker; (b) a communicative behavior proves effective for the attackers against scenarios containing traps; (c) decoys are most effective if used in defense against perceptive-like behaviors; and, (d) if the defender expects perceptive-like behavior, then adding transparent assets to traps and decoys may be of little value.

Back to Top


ADA489398
ORSA Handbook for the Senior Commander

Report Date: Mar 2008
Media Count: 37   Page(s)
Descriptors: (U) *OPERATIONS RESEARCH, *MILITARY COMMANDERS, *DECISION MAKING, HANDBOOKS, MEASURES OF EFFECTIVENESS, SYSTEMS ANALYSIS, LESSONS LEARNED, DEPLOYMENT, MILITARY PERSONNEL
Identifiers: (U) ORSA(OPERATIONS RESEARCH/SYSTEMS ANALYST), ORSA PERSONNEL, MDMP(MILITARY DECISION MAKING PROCESS), ENDURING FREEDOM OPERATION, IRAQI FREEDOM OPERATION, BUA(BATTLE UPDATE ASSESSMENT), CIED(COUNTER-IMPROVISED EXPLOSIVE DEVICE), OPERATIONAL ENVIRONMENTS, STRATEGIC COMMANDERS, MEASURES OF PERFORMANCE
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The purpose of this handbook is to provide essential information about expectations that a Commander may have regarding Operations Research/Systems Analyst (ORSA) personnel in the operational environment. This handbook is intended as a quick-reference for military Commanders at Brigade-level and above to employ the unique skill sets that ORSA personnel possess.

Back to Top


 

ADA492314
The Self-Protection Adaptive Roller Kit (SPARK) -- Negating the Improvised Explosive Device (IED) Threat for Soldiers and Vehicles

Descriptive Note: Journal article
Personal Author(s): Borjes, Karl
Report Date: Mar 2008
Media Count: 5   Page(s)
Descriptors: (U) *EXPLOSIVES, *IMPROVISED WEAPONS, *PRESSURE MINES, *ARMORED VEHICLES, *LAND MINES, *TRUCKS, *MINE COUNTERMEASURES, IRAQI WAR, OFF THE SHELF EQUIPMENT, MODIFICATION KITS, DISTRIBUTION, THREATS, PRODUCTION, REPRINTS, TEST AND EVALUATION
Identifiers: (U) *IMPROVISED EXPLOSIVE DEVICES, *SPARK(SELF-PROTECTION ADAPTIVE ROLLER KITS), IED(IMPROVISED EXPLOSIVE DEVICES), VICTIM-OPERATED IEDS, HMMWV(HIGH-MOBILITY MULTIPURPOSE WHEELED VEHICLES), PRESSURE-SENSITIVE MINES, MRAP(MINE RESISTANT AMBUSH PROTECTED), TACTICAL WHEELED PLATFORMS, MINE ROLLERS, BLAST DAMPENING, RG-31 VEHICLES, M900 VEHICLES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The number one threat to Soldiers in Iraq and Afghanistan is the Improvised Explosive Device (IED), which has been responsible for almost 40 percent of U.S. casualties in Operation Iraqi Freedom. There are numerous ways to activate IEDs, ranging from crude timers to command wires to remote activation via cell phone. However, one of the most common activation methods is a pressure-sensitive trigger that relies on targets to activate the IED by rolling over it themselves as they would, for example, in a vehicle. Commonly called the Victim-Operated IED, it is typically buried beneath the many long roads that U.S. and Coalition Forces patrol on a daily basis. One of the newest weapons in our arsenal against this threat is the SPARK, a modular mine roller system designed to be mounted on tactical wheeled platforms. It is currently being used in Iraq on three platforms: the M114/1151 armored High-Mobility Multipurpose Wheeled Vehicle (HMMWV), the RG-31, and the M900 5-ton truck series. SPARK is managed by Product Manager IED Defeat/Protect Force (PM IEDD/PF), which is a part of the Project Manager Close Combat Systems (PM CCS), Program Executive Office Ammunition (PEO Ammo), based at Picatinny Arsenal, NJ. Two SPARK configurations are currently available in theater. The track-width front roller configuration attaches to the frame of the RG-31 and the HMMWV, the two vehicles most commonly used for deliberate route-clearance operations. The full-width configuration attaches both a front and rear roller to the M900 5-ton truck series. This version is intended for use on vehicles that are part of fast-moving logistical convoys.

Back to Top


 

ADA484251
Suicide Attacks on the Rise

Descriptive Note: Journal article
Report Date: Mar 2008
Media Count: 5   Page(s)
Descriptors: (U) *CIVILIAN POPULATION, *INFORMATION WARFARE, *TARGETS, *AFGHANISTAN, *ATTACK, *TERRORISM, PSYCHOLOGICAL WARFARE, POLICE, CHILDREN, INSURGENCY, NATO FORCES, WOMEN, CASUALTIES, EXPLOSIVES, MILITARY FORCES(FOREIGN), IMPROVISED WEAPONS, REPRINTS, GOVERNMENT(FOREIGN)
Identifiers: (U) *TALIBAN ATTACKS, *AL QAEDA ATTACKS, *CIVILIAN CASUALTIES, IED(IMPROVISED EXPLOSIVE DEVICES), SUICIDE ATTACKS, SUICIDE BOMBERS, ISAF(INTERNATIONAL SECURITY ASSISTANCE FORCE), ANA(AFGHAN NATIONAL ARMY), ANP(AFGHAN NATIONAL POLICE)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The last six weeks has brought some of the worst violence in Afghanistan since 2001. In 2007, there were more than 230 Improvised Explosive Device (IED) attacks and 145 suicide attacks. Casualty rates were at least 25 percent higher in 2007 than the previous year. In the past 18 months, IED attacks have targeted numerous police and army busses, a group of legislators outside a factory at Baghlan, a five-star hotel in Kabul, and a Canadian convoy near a busy marketplace. The trends show that attacks are increasing in number and becoming more violent and dreadful to the Afghan population. The Taliban traditionally limited attacks to military and security-related officials, such as ISAF, ANA, ANP, and local militia forces. Recently, however, the Taliban have publicly stated their intent to broaden their range of targets to include those with heavy foreign exposure -- hotels, restaurants, businesses, and areas considered soft targets. At the same time, civilian casualties are becoming more palatable. This is in direct contrast to prior Taliban methods of insurgency which did not usually target civilians. To counter their psychological operations, ISAF could extend coordinated information operations to rally the local population behind the Afghan government and against the Taliban. Building an information campaign directed at the local population who is primarily anti-Taliban and nonviolent, is an essential part of minimizing future Taliban and Al Qaeda attacks.

Back to Top


 

ADA477699
Defense Management: More Transparency Needed Over the Financial and Human Capital Operations of the Joint Improvised Explosive Device Defeat Organization

Descriptive Note: Congressional rept.
Personal Author(s): Solis, William M
Report Date: Mar 2008
Media Count: 68   Page(s)
Descriptors: (U) *FINANCIAL MANAGEMENT, *PERSONNEL MANAGEMENT, *MILITARY ORGANIZATIONS, DEPARTMENT OF DEFENSE, EXPLOSIVE CHARGES, CONTRACTORS, IMPROVISED WEAPONS, GOVERNMENT EMPLOYEES, TRACKING, ACCURACY, IDENTIFICATION, INTERNAL
Identifiers: (U) *INTERNAL CONTROLS, *JIEDDO(JOINT IMPROVISED EXPLOSIVE DEVICE DEFEAT ORGANIZATION), *TRANSPARENCY, IED(IMPROVISED EXPLOSIVE DEVICES), FINANCIAL DATA, GAO REPORTS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Improvised explosive devices (IED) have been and continue to be a significant threat to U.S. forces. The Department of Defense (DOD) expanded efforts to defeat IEDs with the establishment of the Joint Improvised Explosive Device Defeat Organization (JIEDDO) in January 2006. GAO was asked to review JIEDDO's management and operations. For this second report in its series, GAO determined (1) the extent to which JIEDDO's management processes provide adequate assurances that its financial information is accurate and provides transparency over its operations and (2) the extent to which JIEDDO identifies, records, tracks, and reports numbers of all personnel, including contractors. GAO analyzed data for the first half of fiscal year 2007, which included 47 funding transactions totaling $1.34 billion for 24 initiatives to address these objectives. To help ensure that JIEDDO provides adequate transparency over its resource use and addresses specific internal control weaknesses, GAO recommends that JIEDDO develop an effective internal control system and establish a means to identify, track, and report all personnel, including its contractor support. DOD agreed with the thrust of all of the GAO recommendations.

Back to Top


 

ADA479790
A Uniform Approach to National Suicide Bomber Incident Response and Recovery

Descriptive Note: Master's thesis
Personal Author(s): Day, Dwayne C
Report Date: Mar 2008
Media Count: 141   Page(s)
Descriptors: (U) *TERRORISTS, *PREPARATION, *HUMANS, *BOMBS, *RESPONSE, *HOMELAND SECURITY, *FIRST RESPONDERS, UNITED STATES, RECOVERY, DEMOGRAPHY, PROTECTION, MOTIVATION, PUBLIC SAFETY, FEMALES, COUNTERTERRORISM, INDICATORS, MEDICAL SERVICES, MASS DESTRUCTION WEAPONS, PLANNING, THESES, THREATS, TRAINING, CRISIS MANAGEMENT, EMERGENCIES
Identifiers: (U) *SUICIDE BOMBERS, *SUICIDE BOMBER RESPONSE FRAMEWORK, HOMELAND SECURITY EXERCISES, IED(IMPROVISED EXPLOSIVE DEVICES), CRITICAL INFRASTRUCTURE PROTECTION, STANDARD OPERATING PROCEDURES, SHOOT TO KILL, INCIDENT COMMAND, EMERGENCY PREPAREDNESS, ISLAMIC EXTREMISM, RISK MITIGATION, AL QAEDA, TAMIL TIGERS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) First responders in the United States are not adequately prepared to respond to a suicide bomber attack. Police, fire, and Emergency Medical Services (EMS) are using protocols that do not anticipate the unique needs of a suicide bomber response. There is an urgent need to develop and implement a consistent approach for responding to suicide bombers. This thesis developed a Suicide Bomber Response Framework using International Association of Chiefs of Police training documents as the primary source, along with Technical Support Working Group training materials and recommendations from relevant national training institutions. A Homeland Security Exercise and Evaluation Program (HSEEP) full-scale exercise was then conducted for this thesis based on the newly written Framework to identify gaps between current standard operating procedures and operating procedures recommended by the Suicide Bomber Response Framework. Exercise evaluators identified a significant gap between standard operating procedures of first responders and the recommended response procedures in the Suicide Bomber Response Framework. The thesis argues that a unified suicide bomber response approach should be instituted nation-wide. Responding agencies would use the Suicide Bomber Response Framework as a tool to develop consistent response plans for this critical public safety concern.

Back to Top


 

ADA479938
Modeling and Simulation of Survivable Armor Design Studies for IED Threats

Descriptive Note: Master's thesis
Personal Author(s): Kaminski, Douglas L
Report Date: Mar 2008
Media Count: 85   Page(s)
Descriptors: (U) *COMPUTERIZED SIMULATION, *BLAST WAVES, *THERMAL ANALYSIS, *VEHICULAR ARMOR, *EXPLOSIVELY FORMED PENETRATORS, COMPOSITE MATERIALS, ALLOYS, ISENTROPE, IMPROVISED WEAPONS, ARMOR PLATE, PRESSURE, THREE DIMENSIONAL, THESES, LOADS(FORCES)
Identifiers: (U) *IED(IMPROVISED EXPLOSIVE DEVICES), EFP(EXPLOSIVELY FORMED PROJECTILES), MODELING AND SIMULATION
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Improvised Explosive Device (IED) is used as a strategic weapon of choice and continues to be a threat both globally and domestically. One of the deadly devices in this arsenal is the Explosively Formed Projectile (EFP). This study develops methodology for modeling and simulation of armor plates to survive EFP threats. The EFP effects are modeled as a pressure or blast wave using compressible isentropic conservation equations to get pressure loadings. The thermal effects are modeled as temperature intensities and resulting transient heat transfer analysis is conducted to obtain temperature distribution. The kinetic loads are modeled as high initial velocities applied to the plate. The combined mechanical and thermal loading is analyzed. The design space is generated for varying materials properties and thicknesses as parameters. Laminated composite and orthotropic composites are also used in addition to special high strength and high stiffness generic alloys. The analysis is done using both two-dimensional plate theories as well as three-dimensional transient dynamic analysis. The results are presented showing maximum stresses and deformations for different combinations of materials and thicknesses. The results also indicate the need to use three-dimensional analysis for designing survivable armor. Some recommendations are made for further studies.

Back to Top
 


 

ADA508971
MRAP: A Limited Capability

Personal Author(s): Stark, D R
Report Date: 19 Feb 2008
Media Count: 15   Page(s)
Descriptors: (U) *MINE RESISTANT VEHICLES, IRAQ, ACQUISITION, LOGISTICS MANAGEMENT, MILITARY CAPABILITIES, MARINE CORPS OPERATIONS, IMPROVISED WEAPONS, MANEUVERABILITY, EXPLOSIVE CHARGES
Identifiers: (U) MRAP(MINE RESISTANT AMBUSH PROTECTED), IED(IMPROVISED EXPLOSIVE DEVICE)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) If a Marine was asked on the first day of Operation Iraqi Freedom (OIF), what the greatest threat confronting him was, it is unlikely he would have said the improvised explosive device (IED). However, the IED has accounted for 41% of all deaths or 1,594 US service-member deaths, making it the number one source of casualties.1 To counter the threat of the IED, the Marine Corps is acquiring 2,225 Mine Resistant Ambush Protected (MRAP) vehicles.2 However, the Marine Corps should limit MRAP?s acquisition and planned use to what is urgently needed in Iraq because the MRAP vehicle has logistical problems, lacks maneuverability, and is irrelevant to tomorrow's battlefield.

Back to Top


 

ADA506481
Increased Aerial Resupply in COIN

Descriptive Note: Research paper
Personal Author(s): Griggs, E L
Report Date: 19 Feb 2008
Media Count: 10   Page(s)
Descriptors: (U) *IRAQI WAR, *COUNTERINSURGENCY, *AIR LOGISTICS SUPPORT, *MARINE CORPS, *AIRLIFT OPERATIONS, *UTILIZATION, *INFANTRY PERSONNEL, AERIAL DELIVERY, IMPROVISED WEAPONS, NIGHT FLIGHT, JET FIGHTERS, HELICOPTERS, EXPLOSIVES, MORALE, THREATS, RISK, THEATER LEVEL OPERATIONS
Identifiers: (U) *AERIAL RESUPPLY, FAC(FORWARD AIR CONTROLLERS), CH-46 AIRCRAFT, F/A-18 AIRCRAFT, AH-1W AIRCRAFT, ASSAULT SUPPORT ASSETS, ASSET MISUSE, IED(IMPROVISED EXPLOSIVE DEVICES), ROTARY WING CLOSE AIR SUPPORT, REQUEST DENIAL, ORM(OPERATIONAL RISK MANAGEMENT)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Marine infantry battalions operate numerous company-, platoon-, and squad-sized firm bases dispersed throughout their AOs. The sustainment of the numerous positions greatly increases battalion and company convoys, creating more targets for IED attacks. Often convoys rely on high mobility multipurpose wheeled vehicle (HMMWV) instead of the more protected seven-ton medium tactical vehicle replacement (MTVR). Aerial resupply can reduce this burden and threat. Currently aerial resupply is underutilized by the Marine Corps in al Anbar province. Underutilization is due to the misuse of assault support assets, the repeated denial of requests, and the under value of aerial resupply. A majority of the available assault support assets have been relegated to providing nightly bus service throughout western Iraq. Limited assets are misused transporting an assortment of staff members, contractors, interpreters, VIPs, and other essential personnel via the established ring routes. The ORM airspace threat level matrix, which was adopted in the spring of 2006, proved another obstacle for aerial resupply. The green through black airspace classification system effectively denied aerial resupply to the Marine infantry battalion that would most benefit from it. All Marine rotary wing aircraft were subject to these ORM restrictions that greatly limited their employment. A vicious cycle was created wherein aerial resupply requests were denied due to ORM, unavailable assets, higher priorities, and eventually, a lack of requests. In the end, the perceived risks outweighed the undervalued benefits. Aerial resupply enhances COIN operations by avoiding surfaces/exploiting gaps, boosting morale, reducing the negative impact on the local populace, and ultimately ensuring mission success.

Back to Top


 

ADA503854
A Phased Array Magnetometer for Sensing IED

Descriptive Note: Final rept. Jan-Nov 2007
Personal Author(s): Carman, Greg P; Chang, Chia-Ming; Chuang, Tien-Kan
Report Date: 04 Feb 2008
Media Count: 23   Page(s)
Descriptors: (U) *IMPROVISED WEAPONS, *DETECTION, *PHASED ARRAYS, *MAGNETOSTRICTION, THREE DIMENSIONAL, PIEZOELECTRIC MATERIALS, ARCHITECTURE, MAGNETOMETERS, DEMAGNETIZATION, EXPLOSIVE CHARGES, LAMINATES, STANDOFF, MATHEMATICAL MODELS, PIEZOELECTRICITY
Identifiers: (U) *MAGNETOELECTRIC MATERIALS, *MAGNETOSTRICTIVE, IED(IMPROVISED EXPLOSIVE DEVICE), SHEAR LAG
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) A novel magnetometer utilizing a magneto-electric (M-E) laminate was studied. The focus of this research was to analytically and experimentally evaluate the lamination scheme to understand the magneto-electric interactions and comment on its potential for use in detection and identification of improvised explosive devices (IED). A heterogeneous layered magneto-electric system composed of piezoelectric and magnetostrictive constituents were fabricated. UCLA also developed theoretical models necessary to predict magneto-electric behavior and optimize the sensitivity of the resulting material system. Based on this work, the sensitivity of a laminate is expected to exceed le-9 Gauss Analytical modeling suggests this provides defection capabilities of a 0.2 m object up to 80 m away. These highly sensitive magneto-electric laminate elements may eventually be integrated into array architectures to provide three dimensional detection at relatively large standoff distances.

Back to Top


 

ADA480515
Injury Severity and Causes of Death from Operation Iraqi Freedom and Operation Enduring Freedom: 2003-2004 Versus 2006

Descriptive Note: Journal article
Personal Author(s): Kelly, Joseph F; Ritenour, Amber E; McLaughlin, Daniel F; Bagg, Karen A; Apodaca, Amy N; Mallak, Craig T; Pearse, Lisa; Lawnick, Mary M; Champion, Howard R; Wade, Charles E
Report Date: Feb 2008
Media Count: 8   Page(s)
Descriptors: (U) *MILITARY PERSONNEL, *BATTLEFIELDS, *MORTALITY RATE, *AFGHANISTAN CONFLICT, *WOUNDS AND INJURIES, *IRAQI WAR, FILES(RECORDS), MILITARY FORCES(UNITED STATES), DEMOGRAPHY, SCORING, AUTOPSY, IMPROVISED WEAPONS, HEMORRHAGE, EPIDEMIOLOGY, CASUALTIES, TABLES(DATA), EXPLOSIVES, DISTRIBUTION, SURVIVABILITY, TIME INTERVALS
Identifiers: (U) *CAUSE OF DEATH, *INJURY SEVERITY SCORE, COMBAT CASUALTY CARE, AUTOPSY REVIEWS, FATALITY RECORDS, KIA(KILLED IN ACTION), DOW(DIED OF WOUNDS), POTENTIALLY SURVIVABLE INJURIES, NONSURVIVABLE INJURIES, MECHANISMS OF INJURY, IED(IMPROVISED EXPLOSIVE DEVICES), IRAQI FREEDOM OPERATION, ENDURING FREEDOM OPERATION, AIS(ABBREVIATED INJURY SCORES), COMBAT APPLICATION TOURNIQUET
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The opinion that injuries sustained in Iraq and Afghanistan have increased in severity is widely held by clinicians who have deployed multiple times. To continuously improve combat casualty care, the Department of Defense has enacted numerous evidence-based policies and clinical practice guidelines. The authors hypothesized that the severity of wounds has increased over time. In this study, they examined cause of death looking for opportunities to improve clinical research and training for the battlefield. Autopsies of the earliest combat deaths in Iraq and Afghanistan and the latest deaths in 2006 were analyzed to assess changes in injury severity and causes of death. Fatalities were classified as nonsurvivable (NS) or potentially survivable (PS). PS deaths were then reviewed in depth to analyze mechanism and cause. The results showed that there were 486 PS cases from March 2003 to April 2004 (group 1) and 496 from June 2006 to December 2006 (group 2) that met the inclusion criteria. Of the PS fatalities (group 1: 93 and group 2: 139), the injury severity score was lower in the first group (27 +/- 14 vs. 37 +/- 16, p 0.001), and had a lower number of abbreviated injury scores greater than tor equal to 4 (1.1 +/- 0.79 vs. 1.5 +/- 0.83 per person, p 0.001). The main cause of death among the PS fatalities was truncal hemorrhage (51% vs. 49%, p = NS). Deaths per month between groups doubled (35 vs. 71), whereas the case fatality rates between the two time periods were equivalent (11.0 vs. 9.8, p = NS). In the time periods of the wars studied, deaths per month have doubled, with increases in both injury severity and number of wounds per casualty. Truncal hemorrhage is the leading cause of potentially survivable death. Arguably, the success of the medical improvements during this war has served to maintain the lowest case fatality rate on record.

Back to Top


 

ADA476583
Mine-Resistant, Ambush-Protected (MRAP) Vehicles: Background and Issues for Congress

Descriptive Note: Congressional rept.
Personal Author(s): Feickert, Andrew
Report Date: 24 Jan 2008
Media Count: 7   Page(s)
Descriptors: (U) *REQUIREMENTS, *MILITARY PROCUREMENT, *MINE RESISTANT VEHICLES, PERFORMANCE(ENGINEERING), COUNTERINSURGENCY, URBAN WARFARE, REDUCTION, ALLOCATIONS
Identifiers: (U) MRAP VEHICLES, *MRAP(MINE-RESISTANT AMBUSH-PROTECTED)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) In late 2007, the Department of Defense (DOD) launched a major procurement initiative to replace most uparmored High Mobility, Multi-Wheeled Vehicles (HMMWVs) in Iraq with Mine-Resistant, Ambush-Protected (MRAP) vehicles by FY2009. MRAPs have been described as providing twice as much protection against Improvised Explosive Devices (IEDs) than uparmored HMMWVs. IEDs, at the height of their use, were responsible for about 70% of U.S. casualties in Iraq. The DOD's accelerated MRAP program, decisions to decrease the number of MRAPs procured, and MRAP's performance in urban and counterinsurgency operations raise a number of potential policy issues for congressional consideration. This report will be updated.

Back to Top


 

ADA487083
Efficient Employment of Non-Reactive Sensors

Personal Author(s): Kress, Moshe; Szechtman, Roberto; Jones, Jason S
Report Date: 07 Jan 2008
Media Count: 20   Page(s)
Descriptors: (U) *DETECTORS, LAND WARFARE, GUIDED MISSILE LAUNCHERS, THREATS, FIELD ARMY, GRIDS, EFFICIENCY, SEARCHING, MILITARY COMMANDERS, GUIDED MISSILES, EXPLOSIVE CHARGES
Identifiers: (U) NON-REACTIVE SENSORS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) We consider two types of non-reactive aerial sensors, which are subject to false-positive and false-negative errors. The sensors search for threat objects such as ballistic missile launchers or improvised explosive devices. The objects are located in a certain area of interest, which is divided into a grid of area-cells. The grid is defined such that each area-cell may contain at most one object. The objective of a sensor is to determine if a certain area-cell is likely or unlikely to contain an object. An area-cell is said to be determined if the searcher can ascertain with a given high probability these events. Since definitive identification of a threat object, and subsequent handling of that threat, are done by limited number of available ground combat units, the determination of an area-cell can help field commanders better allocate and direct these scarce resources. We develop two models, one for each type of sensor, that describe the search process and maximize the expected number of determined area-cells.

Back to Top


 

ADA491715
Smokeless Propellants as Vehicle Borne IED Main Charges: An Initial Threat Assessment

Descriptive Note: Master's thesis
Personal Author(s): Beggs, Steven L
Report Date: Jan 2008
Media Count: 177   Page(s)
Descriptors: (U) *SMOKELESS PROPELLANTS, THESES, IMPROVISED WEAPONS, EXPLOSIVE CHARGES, THREAT EVALUATION
Identifiers: (U) VBIED(VEHICLE BORNE IMPROVISED EXPLOSIVE DEVICES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Significant and dangerous misconceptions exist concerning the potential use of smokeless propellants as the main explosive charge in a large vehicle borne improvised explosive devices (VBIED). The unrestricted availability of smokeless powder, coupled with a lack of awareness and appreciation for its destructive potential, constitute a considerable blind spot available for exploitation by violent extremist organizations and individuals.

Back to Top


 

ADA476208
Mines and Underwater IEDs in U.S. Ports and Waterways: Context, Threats, Challenges, and Solutions

Descriptive Note: Journal article
Personal Author(s): Truver, Scott C
Report Date: Jan 2008
Media Count: 29   Page(s)
Descriptors: (U) *THREATS, *EXPLOSIVES, *WATERWAYS, *HOMELAND SECURITY, *UNDERWATER MINES, *PORTS(FACILITIES), *IMPROVISED WEAPONS, REPRINTS, MILITARY HISTORY, COASTAL REGIONS, NAVY, PROTECTION, TERRORISM, ASYMMETRIC WARFARE, SEALIFT OPERATIONS, LIMPET WEAPONS, BOOBY TRAPS, MINE WARFARE, COAST GUARD, SHIPPING, LEGISLATION, SHIPBOARD, MINE COUNTERMEASURES, UNITED STATES GOVERNMENT, STRATEGY, PREPARATION
Identifiers: (U) *MARITIME HOMELAND SECURITY, *UWIED(UNDERWATER IMPROVISED EXPLOSIVE DEVICES), MARITIME SECURITY, POST WORLD WAR II, MARITIME HOMELAND DEFENSE, TERRORIST MINING
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) A broad spectrum of nontraditional and asymmetric threats challenges U.S. maritime homeland security. Under the cloak of legal activity, groups that would do the United States harm can enter the U.S. homeland anywhere along more than 95,000 miles of coastlines and through some 360 ports from Maine to Guam. The threats of the Cold War are gone, and the United States finds itself operating in an environment where piracy, illegal migration, drug smuggling, terrorism, arms proliferation, and environmental crimes are carried out by anonymous, loosely affiliated perpetrators. Naval mines and underwater improvised explosive devices (UWIEDs, or minelike booby traps) are among these threats to U.S. maritime interests. A true sleeper threat, mines and UWIEDs can with great effect attack the good order of American ports and waterways. They are the quintessential asymmetric naval weapons, used for more than two centuries by weak naval powers against the strong. If left unaddressed, they could constitute an Achilles' heel for U.S. homeland security. Until very recently, naval mines and UWIEDs, if included in domestic maritime threat assessments at all, have usually been relegated to the status of a lesser included problem. If the United States can deal with what planners believe are the more likely maritime threats, especially vessel-borne devices, it can certainly handle mines and underwater IEDs. But the history of naval and terrorist mining since 1945 challenges this assumption, and the stakes are high if it turns out to be wrong. Indeed, the assessments and planning that have focused on the M/UWIED threat underscore critical weaknesses in how federal, regional, state, and local actors charged with ensuring America's maritime security -- as well as private entities whose assets are at risk -- must respond to weapons that can easily be deployed in U.S. ports and waterways.

Back to Top


 

ADA475851
Preventing an Improvised Explosive Device (IED) Terror Campaign in the United States

Descriptive Note: Master's thesis
Personal Author(s): Wehri, Matthew T
Report Date: Dec 2007
Media Count: 71   Page(s)
Descriptors: (U) *TERRORISM, *HOMELAND SECURITY, *IMPROVISED WEAPONS, TERRORISTS, IRAQ, UNITED STATES, INTELLIGENCE, AFGHANISTAN, LAW ENFORCEMENT OFFICERS, STATE LAW, NATIONAL SECURITY, THESES, TARGETS, INTERNATIONAL RELATIONS
Identifiers: (U) *TERROR CAMPAIGN, C-IED(COUNTER IMPROVISED EXPLOSIVE DEVICE), IED(IMPROVISED EXPLOSIVE DEVICE), FEDERAL AGENCIES, INTERAGENCY COOPERATION
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) U.S. Counter IED (C-IED) efforts continue to be directed at combating IEDs in Iraq and Afghanistan, however, as terrorists broaden their target selection standards so too should the U.S. broaden its C-IED efforts. IED attacks and IED terror campaigns are currently occurring all over the world yet America is unprepared to prevent an IED terror campaign in the homeland. This thesis will propose how to prevent a domestic IED terror campaign by utilizing the intelligence triggers indications and warnings and open source intelligence as well as placing increased emphasis on the importance of international and interagency cooperation. The benefits of this thesis could be the development of a methodology for intelligence sharing between federal agencies state authorities and local U.S. law enforcement personnel against an aspect of terrorism that has not yet affected America.

Back to Top


 

ADA475876
The Extension of Wireless Mesh Networks Via Vertical Takeoff and Landing Unmanned Aerial Vehicles

Descriptive Note: Master's thesis
Personal Author(s): Richerson, John P
Report Date: Dec 2007
Media Count: 213   Page(s)
Descriptors: (U) *AERIAL RECONNAISSANCE, *EXPLOSIVES, *REMOTE DETECTORS, *VERTICAL TAKEOFF AIRCRAFT, *IMPROVISED WEAPONS, *DRONES, TEST AND EVALUATION, WIRELESS LINKS, OFF THE SHELF EQUIPMENT, MILITARY APPLICATIONS, COMMUNICATIONS NETWORKS, THESES, INTEGRATED CIRCUITS
Identifiers: (U) *AIED(AERIAL IMPROVISED EXPLOSIVE DEVICE)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The evolution of integrated circuits, wireless communications, and data networking makes wireless networks practical for military and law enforcement applications. The objective of this thesis is to test and to evaluate network performance and suitability of an 802.11 wireless access point enabled vertical take off and land (VTOL) unmanned aerial vehicle (UAV) functioning as an airborne sensor and communications relay platform. Also, by identifying the production process of a COTS Remote Controlled Helicopter equipped with a wireless access point, a system, comprised of discrete technologies and production steps can be defined to gain insight into defeating an Aerial Improvised Explosive Device (AIED). Understanding the true capabilities of a small VTOL UAV, its applicability to a wireless network, and the production system associated with the manufacture of an AIED will allow proper planning, application and utilization in support of security and Force Protection missions and scenarios.


Back to Top


 

ADA475908
Using Wireless Sensor Networks in Improvised Explosive Device Detection

Descriptive Note: Master's thesis
Personal Author(s): Sundram, Joshua; Sim, Phua P
Report Date: Dec 2007
Media Count: 91   Page(s)
Descriptors: (U) *NETWORKS, *COMMUNICATIONS NETWORKS, *RADIO LINKS, *RADIOTELEPHONES, *EXPLOSIVES DETECTION, SCENARIOS, ENVIRONMENTS, THREATS, SOLID WASTES, AIRPORTS, SURVEILLANCE, TRIGGER CIRCUITS, URBAN AREAS, FERROMAGNETIC MATERIALS, AREA COVERAGE, MAGNETIC DETECTORS, BACKGROUND RADIATION, INFRARED RADIATION, INFRARED DETECTORS, EXPLOSIVE CHARGES, DETECTION, DETECTORS
Identifiers: (U) WIRELESS SENSOR NETWORKS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This research focused on wide-area surveillance of public environments for potential IEDs (improvised explosive devices) using wireless sensor networks. We explored magnetic and infrared sensors from Crossbow Technologies to detect simulated emplaced IEDs (emplacement is the step most susceptible to detection) in a public mall and along a typical street environment. The threat scenario was IED emplacement in a trash receptacle. A network of these sensors was built and positioned in these environments with human subjects entering (some carrying ferromagnetic materials and some not) and proceeding toward a receptacle. Results indicated that magnetic sensors could detect suspicious ferromagnetic materials, though not all simulated IEDs contained enough to trigger detection. Infrared sensors were not effective for such tasks as there is much background infrared radiation. Our network design was such that data could easily be aggregated over many sensors in larger networks. This suggests that the technology can be effective for protecting communal areas such as airports and urban areas. Other supplementary technologies such as imagery could be linked to build a more robust detection network.

Back to Top


 

ADA492329
HEAT -- Army Innovation in Action

Descriptive Note: Journal article
Personal Author(s): Myers, Vernon
Report Date: Dec 2007
Media Count: 5   Page(s)
Descriptors: (U) *TRUCKS, *TRAINING DEVICES, *ARMORED VEHICLES, *ARMY TRAINING, *ESCAPE SYSTEMS, *ROLL, *MOTOR VEHICLE ACCIDENTS, SURVIVAL(PERSONNEL), DOORS, PHYSIOLOGICAL DISORIENTATION, SAFETY BELTS, DESIGN CRITERIA, PROTOTYPES, ARMY PERSONNEL, INDUSTRIAL PRODUCTION, PREPARATION, MANUFACTURING, SIMULATORS, REPRINTS
Identifiers: (U) *HEAT(HIGH-MOBILITY MULTIPURPOSE VEHICLE EGRESS ASSISTANCE TRAINERS), *VEHICLE ROLLOVERS, *EGRESS TRAINING, HMMWV(HIGH-MOBILITY MULTIPURPOSE WHEELED VEHICLES), ESCAPE TECHNIQUES, ROLLOVER ACCIDENTS
Distribution Statement: Approved for public release; distribution is unlimited.

Abstract: (U) Imagine being in a combat environment taking enemy fire when, suddenly, your vehicle flips over violently from the force of an improvised explosive device (IED), caved road, or impact from another vehicle. Your vehicle is now upside down and water is rapidly filling the inside of the cab. How do you survive? Could you effectively respond to a similar situation and live to talk about it? Could you unfasten your seat belt, recover from being hit by radios, ammunition cans, and other equipment flying around in the vehicle, while remaining calm so you can reorient yourself and egress from the vehicle? Teaching Soldiers how to react in rollover situations had been impractical until a group of Soldiers collaborated in creating the High-Mobility Multipurpose Vehicle (HMMWV) Egress Assistance Trainer (HEAT). Before HEAT, Soldiers were not trained how to properly exit a vehicle that had turned over on its side or top because of a rollover incident. During these exit attempts, Soldiers were experiencing various problems, including disorientation. loose equipment, unlocking seat belts, and unlocking doors. The Army needed a solution to properly prepare Soldiers to survive a vehicle rollover. The solution to this problem was found in current technology used to train pilots -- the dunker trainer. Army Soldiers created the HEAT by adapting and applying the idea of the pilot dunker trainer to the HMMWV. They combined key ideas to create a lifesaving device that increases the likelihood of survival for Soldiers involved in rollovers. HEAT Army Standard is an outstanding example of innovation in action exemplifying the best in collaborative acquisition excellence. This trainer represents a great idea -- for Soldiers, by Soldiers -- that allows individual Soldiers and crews to rehearse and physically execute the necessary steps required to survive a vehicle rollover. This training will help Soldiers overcome the natural fear and panic associated with rollover incidents

Back to Top


 

ADA474696
Defense: FY2008 Authorization and Appropriations

Descriptive Note: Congressional rept.
Personal Author(s): Towell, Pat; Daggett, Stephen; Belasco, Amy
Report Date: 28 Nov 2007
Media Count: 110   Page(s)
Descriptors: (U) *MILITARY OPERATIONS, *CONGRESS, *COSTS, *PRESIDENT(UNITED STATES), *DEPARTMENT OF DEFENSE, *MILITARY BUDGETS, *LEGISLATION, NUCLEAR WEAPONS, MILITARY FORCE LEVELS, COMPENSATION, COUNTERTERRORISM, IRAQI WAR, AFGHANISTAN CONFLICT, TRICARE, SHIPBUILDING, MILITARY PROCUREMENT, SALARIES, COMBAT VEHICLES, MILITARY PERSONNEL, CONSTRUCTION, ANTIMISSILE DEFENSE SYSTEMS
Identifiers: (U) MRAP(MINE-RESISTANT AMBUSH PROTECTED VEHICLES), IED(IMPROVISED EXPLOSIVE DEVICES), FORCE PROTECTION, AFGHAN SECURITY FORCES, IRAQI SECURITY FORCES, PERSONNEL INCREASES, PAY RAISES, TRICARE FEES, LONG-RANGE STRIKE WEAPONS, LITTORAL COMBAT SHIP, BORDER SECURITY, *DEFENSE AUTHORIZATION, *DEFENSE APPROPRIATIONS BILLS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The President's FY2008 federal budget request, released February 5, 2007, included $647.4 billion in new budget authority for national defense. In addition to $483.2 billion for the regular operations of the Department of Defense (DoD), the request included $141.7 billion for continued military operations, primarily to fund the campaigns in Iraq and Afghanistan, $17.4 billion for the nuclear weapons and other defense-related programs of the Department of Energy, and $5.2 billion for defense-related activities of other agencies. On July 31, 2007, the President requested an additional $5.3 billion for war-fighting costs, and on October 22 he requested an additional $42.3 billion for that purpose, bringing his total request for FY2008 war costs to $189.3 billion and the total requested for DoD in FY2008 to $695.0 billion. The $483.2 billion requested for DoD's base budget (i.e., the request for regular operations excluding the cost of ongoing combat activity) is $46.8 billion higher than the agency's base budget for FY2007, an increase of 11% in nominal terms and an increase in real purchasing power of 8.0%. The House passed on May 17 its version of the authorization bill, H.R. 1585, approving $1.2 billion more than the President's request. The Senate Armed Services Committee reported its counterpart bill, S. 1547, on June 5. The Senate substituted the text of that measure for the House-passed text of H.R. 1585 when it took up the latter bill on July 9. After unsuccessfully attempting to force a vote on amendments requiring withdrawal of U.S. troops from Iraq, the Majority Leader, Senator Reid, set the bill aside on July 18. The Senate resumed consideration of the bill on September 17 and rejected several amendments relating to the deployment of U.S. troops in Iraq that were debated under agreements requiring 60 votes for adoption. However, the Senate did adopt an amendment adding to the bill $11.6 billion for Mine-Resistant, Ambush Protected (MRAP) vehicles.

Back to Top


 

ADA475029
Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Descriptive Note: Congressional rept.
Personal Author(s): Wilson, Clay
Report Date: 21 Nov 2007
Media Count: 7   Page(s)
Descriptors: (U) *BOMBS, *IMPROVISED WEAPONS, DEPARTMENT OF DEFENSE, IRAQ, COUNTERMEASURES, AUTOMOTIVE VEHICLES, INSURGENCY, AFGHANISTAN, EXPLOSIVE CHARGES, CASUALTIES
Identifiers: (U) *IEDS(IMPROVISED EXPLOSIVE DEVICES), ROADSIDE BOMBS, SUICIDE CAR BOMBS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Since October 2001, improvised explosive devices (IEDs, roadside bombs, and suicide car bombs) have been responsible for many of the combat deaths in Iraq and Afghanistan. Vehicle-borne IEDs and car bombs are now used to strike police stations, markets, and mosques, killing local citizens as well as U.S. troops. U.S. forces counter the devices through utilizing intelligence sources, and by disrupting portions of the radio spectrum that insurgents use to trigger IEDs. Insurgents quickly adapt to countermeasures, and new, more sophisticated IEDs are increasingly being used in both Iraq and Afghanistan. Recent trends show a decrease in the number of IED attacks in Iraq since June 2007, but an increase in the number of effective IED attacks in Afghanistan. Department of Defense (DOD) officials have also charged that Iran may be supplying new IED technology to insurgents in Iraq. There is growing concern that IEDs might eventually be used by other insurgents and terrorists worldwide. This report will be updated as events warrant.

Back to Top


 

ADA476476
The New Wizard War: Challenges and Opportunities for Electronic Warfare in the Information Age

Descriptive Note: Final rept.
Personal Author(s): Anderson, Jon M
Report Date: 06 Nov 2007
Media Count: 27   Page(s)
Descriptors: (U) *ELECTRONIC WARFARE, IRAQ, INFORMATION PROCESSING, DECENTRALIZATION, FRATRICIDE, NETWORK CENTRIC WARFARE
Identifiers: (U) SPECTRUM MANAGEMENT, INFORMATION AGE
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The emergence of distributed electronic warfare (EW) in Iraq as a response to the improvised explosive device threat has led to serious issues with electronic fratricide and frequency management. This paper assesses the roots of the information technology transformation that has benefited US adversaries in unexpected ways, and shows that the continued growth of information technology will result in spectrum management becoming necessary but insufficient for solving the electronic fratricide problem.. Finally, the paper concludes that operational commanders can alleviate the problems caused by distributed EW while effectively utilizing EW capabilities by aligning joint doctrine with new realities, ensuring planning staffs have sufficient expertise, establishing boundaries for decentralized execution, and implementing distributed EW in test, training, and exercises.

Back to Top


 

ADA474352
Optimized Routing of Unmanned Aerial Systems for the Interdiction of Improvised Explosive Devices

Descriptive Note: Master's thesis
Personal Author(s): Reber, Daniel N
Report Date: Sep 2007
Media Count: 74   Page(s)
Descriptors: (U) *EXPLOSIVE CHARGES, *IMPROVISED WEAPONS, INTEGER PROGRAMMING, THESES, CASUALTIES, EXPLOSIVES DETECTION
Identifiers: (U) *IMPROVISED EXPLOSIVE DEVICES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) As of September 2007, improvised explosive devices (IED) account for 43% of U.S. casualties in Iraq - the largest single cause of death. One reason for their high rate of effectiveness is that they are extremely difficult to detect. This research develops a tool for selecting routes that will best employ unmanned aerial systems (UAS) for the purpose of detecting IED or related activity. We refer to this tool as IED Search Optimization Model (ISOM). ISOM - which uses prediction model results as an underpinning - accounts for factors such as winds, sensor sweep-width, and aircraft deconfliction. We formulate the problem as an Integer Program and optimally solve it to select the best routes. Initial evaluation of ISOM through field experiments with actual UAS suggest that the tool produces realistic routes which can be flown in the expected amount of time. Furthermore, these routes result in a 42% increase in the likelihood of achieving a detection opportunity over searching nodes in a random manner. ISOM could be implemented as a reach-back capability with an analyst providing daily routes for tactical operators.

Back to Top


 

ADA474013
Unmanned Aerial Vehicle-Mounted High Sensitivity RF Receiver to Detect Improvised Explosive Devices

Descriptive Note: Master's thesis
Personal Author(s): Griffith, Christopher M
Report Date: Sep 2007
Media Count: 164   Page(s)
Descriptors: (U) *DETECTORS, *AIRCRAFT, *EXPLOSIVE CHARGES, *UNMANNED, *SENSITIVITY, EMISSION, ANTENNAS, GROUND BASED, RADIOFREQUENCY, LETHALITY, FEASIBILITY STUDIES, TARGETS, THESES, MODIFICATION, DETECTION
Identifiers: (U) IED (IMPROVISED EXPLOSIVE DEVICE)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Improvised Explosive Devices (IEDs) are increasing in complexity and lethality. A RE system is needed to detect the presence of RF IEDs. This thesis describes the evolution of a proven ground-based RF detection system. It is designed to collect unintended radio frequency emissions from the IED's RF triggers and receivers. Modification of the ground-based version allowed placing this RF system into an airborne platform. The detection range and corresponding time to react to a possible threat is dramatically improved. Increased time provides greater protection for the front line troops that are primary targets of RF IEDs, hence reducing the casualties of U.S. troops. Field testing and technical feasibility demonstrations are conducted using a NPS-owned TERN UAV at McMillan Airfield located at Camp Roberts, CA. The research conducted for this thesis primarily deals with the implementation and testing of this RF system onto UAVs. Several additional benefits make this RF system useable over a wide range of applications.

Back to Top


 

ADA471848
Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Descriptive Note: Congressional rept.
Personal Author(s): Wilson, Clay
Report Date: 28 Aug 2007
Media Count: 7   Page(s)
Descriptors: (U) *EXPLOSIVE CHARGES, *COUNTERMEASURES, DEPARTMENT OF DEFENSE, IRAQ, BOMBS, AFGHANISTAN, TRIGGER CIRCUITS, INSURGENCY, AUTOMOTIVE VEHICLES, ELECTROMAGNETIC SPECTRA, IRAN, RADIOFREQUENCY, INTELLIGENCE
Identifiers: (U) *IMPROVISED EXPLOSIVE DEVICES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Since October 2001, improvised explosive devices (IEDs, roadside bombs, and suicide car bombs) have been responsible for many of the more than 3,000 combat deaths in Iraq and many of the more than 240 combat deaths in Afghanistan. 1. Vehicleborne IEDs and car bombs are now used to strike police stations, markets, and mosques, killing local citizens as well as U.S. troops. U.S. forces counter the devices through utilizing intelligence sources and by disrupting portions of the radio spectrum that insurgents use to trigger IEDs. However, insurgents quickly adapt to countermeasures, and new, more sophisticated IEDs are increasingly being used in both Iraq and Afghanistan. Department of Defense (DOD) officials have also charged that Iran may be supplying new IED technology to insurgents in Iraq. There is growing concern that IEDs might eventually be used by other insurgents and terrorists worldwide. 2. This report will be updated as events warrant.

Back to Top


 

ADA472692
Mine-Resistant, Ambush-Protected (MRAP) Vehicles: Background and Issues for Congress

Descriptive Note: Congressional rept.
Personal Author(s): Feickert, Andrew
Report Date: 21 Aug 2007
Media Count: 7   Page(s)
Descriptors: (U) *ACQUISITION, *MINE RESISTANT VEHICLES, POLICIES, OPERATIONAL EFFECTIVENESS, EXPLOSIVES, IMPROVISED WEAPONS
Identifiers: (U) *MRAP(MINE-RESISTANT AMBUSH-PROTECTED) VEHICLES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The Department of Defense (DOD) recently launched a major procurement initiative to replace all uparmored High Mobility, Multi-Wheeled Vehicles (HMMWVs) in Iraq with Mine-Resistant, Ambush-Protected (MRAP) vehicles by FY2009. MRAPs have been described as providing twice as much protection against Improvised Explosive Devices (IEDs) -- responsible for about 70% of U.S. casualties in Iraq -- than uparmored HMMWVs. The DOD's accelerated MRAP program raises a number of potential policy issues for congressional consideration. This report will be updated.

Back to Top


ADA486613
Retaking Sa'ad: Successful

Descriptive Note: Journal article
Personal Author(s): Smith, Niel
Report Date: Aug 2007
Media Count: 11   Page(s)
Descriptors: (U) *COUNTERINSURGENCY, *LESSONS LEARNED, *IRAQI WAR, PSYCHOLOGICAL OPERATIONS, COMBAT PATROLS, URBAN WARFARE, HUMAN INTELLIGENCE, IMPROVISED WEAPONS, ARMY, CIVILIAN POPULATION, MILITARY OPERATIONS, URBAN AREAS
Identifiers: (U) NONKINETIC OPERATIONS, IRAQI FREEDOM OPERATION, TAL AFAR(IRAQ), ISF(IRAQI SECURITY FORCES), IED(IMPROVISED EXPLOSIVE DEVICES), AIF(ANTI-IRAQI FORCES), VBIED(VEHICLE-BORNE IMPROVISED EXPLOSIVE DEVICES), CITIZENS, CORDON AND SEARCH OPERATIONS, FORCE STRUCTURE, NEIGHBORHOODS, POPULAR SUPPORT
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Counterinsurgency is difficult. As a force, we have only begun to rediscover and process the hard lessons of the past, which we largely discarded in our march to build the perfect maneuver and combat force. As a result, the Army is struggling with nonkinetic operations the Army's entire force structure is designed for kinetic operations, leaving commanders at all levels with few nonkinetic tools at their disposal. During 2006, Team Battle, 2d Battalion, 37th (2-37) Armor successfully set conditions that resulted in pacifying insurgent-dominated territory without fighting any major pitched battles in Tal Afar. The soldiers of Team Battle applied principles learned from training, scholarship, and hard experience to achieve short-term, and hopefully long-term, success in one of Iraq's most difficult cities.

Back to Top


ADA494950
Fires, A Joint Professional Bulletin for US Field & Air Defense Artillerymen. July-August 07

Descriptive Note: Journal
Report Date: Aug 2007
Media Count: 49   Page(s)
Descriptors: (U) *ARTILLERY, *MILITARY PUBLICATIONS, DEPLOYMENT, POLITICAL ALLIANCES, TACTICAL AIR SUPPORT, IRAQI WAR, MILITARY TRAINING, POLITICAL NEGOTIATIONS, ORGANIZATIONAL REALIGNMENT, LOGISTICS SUPPORT, MILITARY HISTORY, IDENTIFICATION SYSTEMS
Identifiers: (U) FA(FIELD ARTILLERY), RECONCILIATION, ADA(AIR DEFENSE ARTILLERY), BRAC(BASE REALIGNMENT AND CLOSURE), COMBAT IDENTIFICATION, POSITIVE IDENTIFICATION
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) CONTENTS: Why Fort Sill Matters to the Air Force By Lieutenant Colonel Neil E. Roghair, USAF; Reconciliation in Iraq - Is it Achievable? By Major Jackson A. Docherty, RA; AMD Composite Battalion: Reset, Train, Ready and Deploy By Lieutenant Colonel Russell E. Bodine, ADA; Fires Center of Excellence in 2011 By James H. Wollman and Lieutenant Colonel (Retired) David S. Henderson, FA; Combat Identification - A Key to Success in the AMD Fight By Lieutenant Colonel (Retired) Casey E. Bain, ADA; A Battalion Commander's Reflections on OIF Pre-Deployment Training By Lieutenant Colonel Kevin W. Milton, FA; Preparing an FA Platoon for Operations in Iraq By Captain Clenn M. Frost, FA; Fire Support is Commanders' Business By Colonel Burdett K. Thompson, IN; A Different Approach to the Counter-IED Fight in Iraq By Major Louis J. Palazzo, FA, USMC; The New BAE - Airspace C2 By Colonel (Retired) Robert D. Carter, AV; ADA Transformation and ARFORGEN - Eagles versus Ducks By Major Alan A. Wiernicki, ADA; BCT FSCOORD in Iraq - Integration Operations By Major Christopher W. Wendland, FA; 3-43 ADA Deploying: We-Fight-Tonight Mentality By Lieutenant Colonel Brian P. Dunn, ADA

Back to Top



ADA482698
Visual Terrestrial Cues for Landmine Detection

Descriptive Note: Final rept. 1 Jul 2006-31 Mar 2007
Personal Author(s): Staszewski, James J
Report Date: 27 Jun 2007
Media Count: 23   Page(s)
Descriptors: (U) *LAND MINES, TRAINING, ARMY PERSONNEL, MINE DETECTION, COUNTERMINING, BURIED OBJECTS, HAND HELD, CUES(STIMULI), SKILLS, VISUAL PERCEPTION
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The project objective was to systematically generate foundational knowledge about the feasibility of detecting landmines via visual examination of the ground surface where such ordnance has been buried. The products of this effort were sought explicitly for their potential utility to support the design, testing, and development of training for visual detection. Such training, when used to augment current training of operators of handheld landmine detection equipment, holds potential to enhance the US Army's countermine capability and possibly counter-IED capability as well. A secondary project objective, based on the hypothesis that the data acquired would indicate that detection of landmines via visual information on the ground surface is viable, was to characterize the visual information produced by the burial of landmines that could be used to identify their locations. A related objective was to characterize changes to this information over time and with exposure to naturally changing environmental conditions. Such knowledge would dictate content requirements for visual landmine detection training and so inform its design. A third objective was to identify verbal descriptors of visual information produced by landmine burial. Such information is directly relevant to support the training of soldiers visual detection skills. That is because the instructional component of such training should include communicating clearly to trainees the visual cues and patterns of cues that need to be perceived in the natural environment to successfully and safely locate threat mines. Verbal descriptions of these cues and patterns represent the vehicles for communicating to soldier/trainees the information to which attention must be directed.

Back to Top


ADA470035
Deployment of Shaped Charges by a Semi-Autonomous Ground Vehicle

Descriptive Note: Master's thesis
Personal Author(s): Herkamp, John F
Report Date: Jun 2007
Media Count: 201   Page(s)
Descriptors: (U) *EXPLOSIVE CHARGES, *ROBOTS, *GROUND VEHICLES, MILITARY OPERATIONS, SHAPED CHARGES, EXPLOSIVES DETECTION, MINE NEUTRALIZATION, REMOTE CONTROL, GLOBAL POSITIONING SYSTEM, THESES, DEPLOYMENT
Identifiers: (U) IEDS(IMPROVISED EXPLOSIVE DEVICES), BIGFOOT
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Neutralization of remotely operated Improvised Explosive Devices (IEDs) is a dangerous task risking human lives on a daily basis. BigFoot seeks to replace the local human component by deploying and remotely detonating shaped charges to destroy IEDs. This research developed a platform that can autonomously navigate GPS waypoints, avoid obstacles, and provide remote user controls for an onboard robotic arm to deploy and remotely detonate shaped charges. BigFoot incorporates improved communication range over previous Autonomous Ground Vehicles and an updated user interface that includes controls for the arm and camera by interfacing multiple microprocessors. BigFoot is capable of avoiding static and mobile obstacles as well handling most surfaces with minor slopes. BigFoot continues to be somewhat limited by communications range and GPS availability. However, BigFoot is an ideal platform for relatively short range deployment to neutralize roadside IEDs.


Back to Top


ADP023747
Signature Evaluation for Thermal Infrared Countermine and IED Detection Systems

Descriptive Note: Conference paper
Personal Author(s): Peters, John F; Howington, Stacy E; Ballard, Jr , Jerry
Lynch, Larry N
Report Date: Jun 2007
Media Count: 9   Page(s)
Descriptors: (U) *IMPROVISED WEAPONS, *COUNTERMINING, *MINE DETECTION, *HEAT TRANSFER, OPTIMIZATION, TEST BEDS, DETECTORS, FINITE ELEMENT ANALYSIS, CRACKS, MINEFIELDS, PARALLEL PROCESSING, TOPOLOGY, TRANSPIRATION, ABSORPTION, PARALLEL ORIENTATION, INFRARED RADIATION, VEGETATION, MOISTURE, LAND MINES, PLANTS(BOTANY), MINES(ORDNANCE), SOIL MODELS, GALERKIN METHOD, SYMPOSIA, WATER FLOW, MATHEMATICAL MODELS, THERMAL PROPERTIES, HIGH RESOLUTION
Identifiers: (U) COMPONENT REPORTS, SURFACE TOPOLOGY, INFRARED ABSORPTION, VEGETATION MODELS, AUTOMATIC TARGET RECOGNITION, IED(IMPROVISED EXPLOSIVE DEVICES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) A high-resolution, computational suite has been constructed to produce synthetic thermal imagery of vegetated soil surfaces with landmines or other targets. The imagery is created by coupling models for the ground, vegetation, ray casting, and sensor characteristics to produce realistic thermal infrared simulated imagery. These simulations provide information ranging from simple temperature contrasts to high-resolution images comparable to actual sensor images that can be used to evaluate or train automatic target recognition (ATR) systems. Analyses of the ATR results allow development of recommendations for optimal sensing strategies and additional training to improve ATR performance. The modeling and characterization occurs at the centimeter scale, which requires massively parallel computational resources to meet the demands of the simulation. The models run simultaneously on a single, parallel, or serial computer and communicate using sockets or files. The soil model is a three-dimensional, spatially adaptive, continuous Galerkin, finite element model that simulates partially-saturated flow and heat transport, coupled to two-dimensional surface water flow. The vegetation model simulates infrared absorption, reflection, and transmission by discretized plant leaves and stems. Ray casting provides boundary conditions for the soil and vegetation thermal models, and produces multi-spectral images of energy reflected and emitted from the synthetic scene. Subsuface phase change, distributed root zone moisture uptake and transpiration, and flow through macro pores and cracks are processes under construction. The parallelization of the individual testbed components is relatively straight-forward. The central difficult, in achieving acceptable performance for the computational testbed in a parallel computing environment is the sequencing of data transfers between component a few meters in its longest dimension.

Back to Top


ADA493615
Wartime Test and Evaluation; Initiatives Lead to Cultural Change

Descriptive Note: Research paper
Personal Author(s): Dietrich, Shane
Report Date: 14 May 2007
Media Count: 50   Page(s)
Descriptors: (U) *AFGHANISTAN CONFLICT, *RAPID DEPLOYMENT, *ARMY PROCUREMENT, *TEST AND EVALUATION, *MILITARY ORGANIZATIONS, *WARTIME, *IRAQI WAR, CULTURE, ARMY EQUIPMENT, ARMY FACILITIES, WEAPON SYSTEMS, LEADERSHIP, DEPARTMENT OF DEFENSE, MILITARY MODERNIZATION
Identifiers: (U) *ATEC(ARMY TEST AND EVALUATION COMMAND), *ACQUISITION REFORM, *ORGANIZATIONAL CHANGE, *CULTURAL CHANGE, ORGANIZATIONAL BEHAVIOR, RAPID ACQUISITION, ARMY CULTURE, RFI(RAPID FIELDING INITIATIVE), REF(RAPID EQUIPPING FORCE), JIEDDO(JOINT IED DEFEAT ORGANIZATION), LEAN SIX SIGMA
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This is a study in organizational behavior, a look at an organization that generated a synergy to support an Army at war, and in the process created a cultural climate embracing acquisition reform and posturing itself for success. This is a study of the U.S. Army Test and Evaluation Command (ATEC) in support of Operations Enduring Freedom (OEF) and Iraqi Freedom (OIF), conflicts ongoing at this time. The paper provides a review of the initiatives and processes implemented by ATEC to support wartime rapid acquisition while building a context for the impact initiatives implemented by ATEC have had within the test and evaluation (T&E) community. Ultimately, it looks at ATEC's wartime T&E experience and its relevance to cultural change within the T&E institution, a concern leading to the 2005 Defense Acquisition Performance Assessment (DAPA) Project commissioned by the Honorable Gordon England, Deputy Secretary of Defense. The paper concludes with recommendations for further study and consideration.

Back to Top


ADA468386
Barriers, Obstacles, and Mine Warfare for Joint Operations

Report Date: 26 Apr 2007
Media Count: 154   Page(s)
Descriptors: (U) *LAND MINES, *INSENSITIVE EXPLOSIVES, *UNEXPLODED AMMUNITION, *IMPROVISED WEAPONS, MILITARY OPERATIONS, LAND MINE WARFARE, MILITARY DOCTRINE, JOINT MILITARY ACTIVITIES, BARRIERS
Identifiers: (U) *IED(IMPROVISED EXPLOSIVE DEVICES), *OBSTACLES, JFC(JOINT FORCE COMMANDERS)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This publication provides doctrinal guidance for planning and executing barrier, obstacle, and mine warfare for joint operations as they relate to strategic, operational, and tactical mobility and countermobility across the range of military operations. This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff. It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of the overall objective.

Back to Top


ADA469091
Efficient or Effective? An Assessment of the Army Lessons Learned Program

Descriptive Note: Strategy research project
Personal Author(s): Funkhouser, Anthony C
Report Date: 26 Mar 2007
Media Count: 19   Page(s)
Descriptors: (U) *COMBAT EFFECTIVENESS, *LESSONS LEARNED, *ARMY OPERATIONS, MILITARY DOCTRINE, EFFICIENCY, MILITARY TACTICS, REGULATIONS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The Army recently revised the Army Lessons Learned regulation to centralize the collection, analysis and dissemination of lessons learned. Historically, the Army has not sustained an effective lessons learned process. TRADOC has the lead for the Army in managing this process. TRADOC has attempted to create a more efficient process that may reduce effectiveness during combat operations in OEF and OIF. Today, the Army is facing a significant challenge to quickly capture lessons learned, analyze and redistribute them throughout the Army. Due to the complex environment in OEF/OIF and an adaptive enemy, doctrine and lessons learned are being derived at the unit level, redistributed and changed before TRADOC can adequately address and distribute them through doctrinal publications and military schools. The US Army Engineer School's Counter Explosive Hazard Center is currently integrated into the lesson learned process with regard to improvised explosive devices. The process is modified from the proposed lessons learned process. The Army lessons learned process and the Counter Explosive Hazard Center processes will be analyzed for efficiencies and effectiveness with recommendations provided to improve the current process.

Back to Top


ADA473109
Joint Improvised Explosive Device Defeat Organization (JIEDDO): Tactical Successes Mired in Organizational Chaos; Roadblock in the Counter-IED Fight

Descriptive Note: Research rept.
Personal Author(s): Ellis, Richard F; Rogers, Richard D; Cochran, Bryan M
Report Date: 13 Mar 2007
Media Count: 20   Page(s)
Descriptors: (U) *STRATEGY, *EXPLOSIVES, *MILITARY ORGANIZATIONS, *COUNTERMEASURES, *IMPROVISED WEAPONS, *ORGANIZATIONAL REALIGNMENT, *JOINT MILITARY ACTIVITIES, MILITARY FORCES(UNITED STATES), AFGHANISTAN CONFLICT, ASYMMETRIC WARFARE, IRAQI WAR, COUNTERINSURGENCY, BODY ARMOR, VEHICULAR ARMOR, TERRORISM, HISTORY, CASUALTIES, MILITARY PROCUREMENT
Identifiers: (U) *JIEDDO(JOINT IED DEFEAT ORGANIZATION), *IMPROVISED EXPLOSIVE DEVICES, IED(IMPROVISED EXPLOSIVE DEVICES), IRAQI FREEDOM OPERATION, ENDURING FREEDOM OPERATION, BUREAUCRATIC ORGANIZATIONS, *ORGANIZATIONAL STRUCTURE, ORGANIZATIONAL EFFECTIVENESS, STAFF ORGANIZATION, STRATEGIC PLANNING, LIMITED AUTHORITY, USJFCOM(US JOINT FORCES COMMAND)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The United States Department of Defense (DoD) estimates that Improvised Explosive Devices (IEDs) are responsible for almost 50% of the casualties (both mortal and injured) sustained in Iraq and nearly 30% of those sustained in Afghanistan since the start of combat operations. Furthermore, in Operation Iraqi Freedom (OIF) and Iraqi Enduring Freedom (OEF), deaths from IEDs have steadily increased since the cessation of major combat operations in 2003. As a result of the staggering losses inflicted by these devices, defeating this terrorist tactic has become a top priority for the DoD. The American public is swayed by many things, but none more convincingly than nightly news reports of U.S. casualties from IEDs in Iraq and Afghanistan. To win the Global War On Terrorism (GWOT), bureaucrats and warriors alike must harness the nation's ingenuity and resources to defeat this terrorist weapon, which threatens to diminish national will in the fight for freedom. Given the magnitude of the IED threat, the Secretary of Defense created the Joint IED Defeat Organization (JIEDDO) to address this problem in February, 2006. JIEDDO is chartered to focus (lead, advocate, coordinate) all DoD actions in support of the Combatant Commanders' and their respective Joint Task Forces' efforts to defeat IEDs as weapons of strategic influence. However, JIEDDO, as an organization, possesses neither the structure nor the authority to effectively prosecute the war against IEDs. As a large, bureaucratic organization rooted in the technological approach to defeating IEDs, JIEDDO lacks the agility to quickly react to a changing enemy and has no legal authority to compel other DoD entities to act. This paper analyzes JIEDDO by reviewing its origins, examining its current structure and authority, and identifying recommendations that may improve its ability to defeat IEDs.

Back to Top


ADA471571
Passive Geolocation of Low-Power Emitters in Urban Environments Using TDOA

Descriptive Note: Master's thesis
Personal Author(s): Montminy, Myrna B
Report Date: Mar 2007
Media Count: 116   Page(s)
Descriptors: (U) *LOW POWER, *POSITION(LOCATION), *EMITTERS, *URBAN AREAS, COMPUTER PROGRAMS, THESES, IMPROVISED WEAPONS, LEAST SQUARES METHOD, WEIGHTING FUNCTIONS, ANGLE OF ARRIVAL, LINE OF SIGHT
Identifiers: (U) TDOA(TIME DIFFERENCE OF ARRIVAL), WLS(WEIGHTED LEAST SQUARES), NLOS(NON-LINE OF SIGHT), MULTIPATH, PASSIVE GEOLOCATION, LOW-POWER EMITTER, GEOLOCATION SYSTEMS, MATLAB CODE
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Low-power devices are commonly used by the enemy to control Improvised Explosive Devices (IEDs), and as communications nodes for command and control. Quickly locating the source of these signals is difficult, especially in an urban environment where buildings and towers can cause interference. This research presents a geolocation system that combines several geolocation and error mitigation methods to locate an emitter in an urban environment. The proposed geolocation system uses a Time Difference of Arrival (TDOA) technique to estimate the location of the emitter of interest. Using sensors at known locations, TDOA estimates are obtained by cross-correlating the signal received at all the sensors. A Weighted Least Squares (WLS) solution is used to estimate the emitter's location. If the variance of the location estimate is too high, a sensor is detected as having a Non-Line of Sight (NLOS) path from the emitter, and is removed from the geolocation system and a new position estimate is calculated with the remaining sensor TDOA information. The performance of the system is assessed through modeling and simulations. The test results confirm the feasibility of identifying a NLOS sensor, thereby improving the geolocation system's accuracy in an urban environment.

Back to Top


ADA475552
Unmanned Ground Vehicle Radio Relay Deployment System For Non-Line-Of-Sight Operations

Personal Author(s): Pezeshkian, Narek; Nguyen, Hoa G; Burmeister, Aaron
Report Date: Jan 2007
Media Count: 7   Page(s)
Descriptors: (U) *MILITARY OPERATIONS, *ROBOTS, *RADIO RELAY SYSTEMS, *OPERATORS(PERSONNEL), LONG RANGE(DISTANCE), WIRELESS LINKS, COMMUNICATIONS NETWORKS, LAW ENFORCEMENT, EXPLOSIVE ORDNANCE DISPOSAL
Identifiers: (U) IEDS(IMPROVISED EXPLOSIVE DEVICES), NON-LINE-OF-SIGHT
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Tactical mobile robots used in military and law enforcement operations normally require a robust, long range, and non-line-of-sight (NLOS) communications link to the remote control station. This is especially true for Explosive Ordnance Disposal (EOD) operators using robots to defeat Improvised Explosive Devices (IEDs). High frequency digital radio communications, currently the preferred technology, are subject to line-of-sight (LOS) limitations, and thus are often impossible to maintain in urban environments. We have developed a system that will allow the mobile robot to carry multiple relay radios that are automatically deployed when and where needed in order to maintain robust communications. This process is completely transparent to the operator and is entirely handled by the ad-hoc network formed by the relay radios. The system is plug-and-playable, and can be attached to many manned and unmanned vehicles requiring long-range and non-LOS operational capability. Experimental data compares the effective range achieved with and without the use of our relay deployment system.

Back to Top


ADA496592
Air Force Civil Engineer, Volume 15, Number 2, 2007

Personal Author(s): Hood, Teresa; Eulberg, Del; Hague, Mike; Parker, Paul
Report Date: Jan 2007
Media Count: 41   Page(s)
Descriptors: (U) *AIR FORCE, *AIR FORCE FACILITIES, *MILITARY ENGINEERS, *CIVIL ENGINEERING, AIR FORCE PERSONNEL, MILITARY PUBLICATIONS, AIR FORCE OPERATIONS, MILITARY ENGINEERING, UNITED STATES AIR FORCE ACADEMY, TRAINING, STUDENTS, SCHOOLS, MATERIEL, CONSTRUCTION
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Air Force Civil Engineer is published quarterly as a funded newspaper by the Professional Communications staff at the Air Force Civil Engineer Support Agency, Tyndall AFB, Fla. This publication serves the Office of The Civil Engineer, HQ U.S. Air Force, Washington, D.C. Articles in this publication include: Command Focus: Air Force Materiel Command; Re-engineering AFMC; EOD Airmen Sacrifice and Make a Difference; EOD Counter IED Training; Special Civil Engineering Education Section; Technology, Education and Training and CE World.

Back to Top


ADA475002
Unmanned Systems Roadmap 2007-2032

Report Date: Jan 2007
Media Count: 189   Page(s)
Descriptors: (U) *MILITARY OPERATIONS, *DETECTORS, *UNMANNED, MILITARY INTELLIGENCE, WARFARE, THREATS, MINE DETECTION, GROUND VEHICLES, MILITARY COMMANDERS, TARGET DESIGNATORS, TIME LAG THEORY, TERRORISM, RECONNAISSANCE, DATA LINKS, DRONES, PRECISION, SIGNALS, EXPLOSIVE CHARGES, RISK, GLOBAL, ROBOTICS
Identifiers: (U) UAS(UNMANNED AIRCRAFT SYSTEMS), UGV(UNMANNED GROUND VEHICLES), UMS(UNMANNED MARITIME SYSTEMS), UUV(UNMANNED UNDERWATER VEHICLES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Today's military has seen an evolution in technology that is creating an entirely new capability to project power through the use of unmanned systems while reducing the risk to human life. The contributions of unmanned systems continue to increase. As of October 2006, coalition Unmanned Aircraft Systems (UASs), exclusive of hand-launched systems, had flown almost 400,000 flight hours in support of Operations Enduring Freedom and Iraqi Freedom, Unmanned Ground Vehicles (UGVs) had responded to over 11,000 Improvised Explosive Device (IED) situations, and Unmanned Maritime Systems (UMSs) had provided security to ports. As a result of these successes, the Quadrennial Defense Review (QDR) emphasized the importance of unmanned systems in the Global War on Terrorism (GWOT). Unmanned systems are highly desired by combatant commanders (COCOMs) for the many roles these systems can fulfill. Tasks such as mine detection; signals intelligence; precision target designation; chemical, biological, radiological, nuclear, explosive (CBRNE) reconnaissance; and communications and data relay rank high among the COCOMs' interests. These unmanned capabilities have helped reduce the complexity and time lag in the sensor component of the sensor-to-shooter chain for prosecuting actionable intelligence. Unmanned systems are changing the conduct of military operations in the GWOT by providing unrelenting pursuit combined with the elimination of threats to friendly forces; including injury, capture, or death.

Back to Top


ADA471028
Cyber Mobilization: The Neglected Aspect of Information Operations and Counterinsurgency Doctrine

Descriptive Note: Book chapter
Personal Author(s): Thomas, Timothy L
Report Date: Jan 2007
Media Count: 23   Page(s)
Descriptors: (U) *EXPLOSIVE CHARGES, *COUNTERINSURGENCY, MILITARY FORCES(UNITED STATES), MILITARY OPERATIONS, REPRINTS, MILITARY FORCES(FOREIGN), JOINT MILITARY ACTIVITIES, SAUDI ARABIA, INSURGENCY, AFGHANISTAN, MILITARY PUBLICATIONS, MOBILIZATION, MILITARY DOCTRINE, VOLUNTEERS, RECRUITING
Identifiers: (U) *CYBER MOBILIZATION, *IMPROVISED EXPLOSIVE DEVICES, *INFORMATION OPERATIONS, *WALKING IMPROVISED EXPLOSIVE DEVICES, COALITION FORCES, INSURGENCY DOCTRINE, SUICIDE BOMBERS, WIED(WALKING IMPROVISED EXPLOSIVE DEVICE)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) For over two years, the U.S. armed forces have focused on seeking ways to counter insurgent use of improvised explosive devices (IEDs) in both Afghanistan and Iraq. Less attention has been paid to countering the mobilization process that produces the seemingly unending line of insurgents willing to (1) become suicide bomber (walking IEDs or WIEDs), (2) prepare the IEDs, and (3) fight street battles. The insurgents use the Internet's cyber mobilization potential to fuel and supply this line of volunteers. They have been particularly successful in recruiting volunteers from other countries such as Saudi Arabia and Egypt. This success has forced coalition forces to continually react to the environment instead of controlling it.

Back to Top


ADA464077
Suicide Bombers: Profiles, Methods and Techniques

Descriptive Note: Research paper
Personal Author(s): Miyasato, Merle
Report Date: Jan 2007
Media Count: 31   Page(s)
Descriptors: (U) *TERRORISTS, *METHODOLOGY, *EXPLOSIVE CHARGES, *BOMBING, *PROFILES, *IMPROVISED WEAPONS, ISRAEL, LEADERSHIP, CASE STUDIES, TARGETING, PERSONALITY, IRAQI WAR, UNITED KINGDOM, SRI LANKA, INSURGENCY, MENTAL DISORDERS, EMOTIONS, FEMALES, TERRORISM, CULTURE, MOTIVATION, CASUALTIES, ARABS, ISLAM, TRAINING, ATTITUDES(PSYCHOLOGY), RECRUITING
Identifiers: (U) *SUICIDE BOMBINGS, *IED(IMPROVISED EXPLOSIVE DEVICES), *SUICIDE TERRORISTS, SUICIDE BOMBERS, AL QAEDA, ISLAMIC EXTREMISM, MUSLIMS, RELIGIOUS IDEOLOGY, PSYCHOLOGICAL TRAITS, CULTURAL FACTORS, ECONOMIC FACTORS, RECRUITER PREFERENCES, SOCIOECONOMIC STATUS, EDUCATIONAL STATUS, PALESTINIAN BOMBERS, HAMAS, LTTE(LIBERATION TIGERS OF TAMIL EELAM)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) From 1986 to 2003, 17 groups in 14 different countries used suicide bombing tactics. Less than 400 of these attacks resulted in the deaths of more than 5,000 people with injuries to more than 20,000, and economic damages in excess of $121 billion. Suicide bombing has become a popular terrorist modus operandi because it represents a low-cost, low-tech, and low-risk weapon that is readily available, requires little training, leaves little forensic trace, and strikes fear into the general population. Professor Robert Pape of the University of Chicago examined all suicide-terrorist attacks in the world that occurred from 1980 to 2001. Of the 188 worldwide suicide attacks during this period, 95% were undertaken as part of an organized political campaign. His findings indicate that suicide bombings made up 3% of total terrorist attacks but produced 45% of the casualties (not including the Twin Towers). Although profiling has been controversial because it discriminates against a selected group of people, it is evident that terrorists are not evenly distributed among the world's population. Almost exclusively, suicide bombers emanate from distinct ethnicities and religions; furthermore, recent history indicates that they come from the Arab/Muslim or East Asian cultures. As important as the suicide bombers are the activists and sympathizers who offer them support and comfort. These activists may recoil from committing acts of violence themselves but may sympathize with those who do, and offer moral and material support. Improvised explosive devices (IEDs) have emerged as the most serious threat to multinational forces participating in Operation Iraqi Freedom, with roadside bombings being the insurgents' preferred method of attack. This article explores the psychosocial aspects and methods and techniques of suicide bombers in general, but with particular focus on those operating in Israel, Sri Lanka, and Great Britain.

Back to Top


ADA462523
Investigating Ground Swarm Robotics Using Agent Based Simulation

Descriptive Note: Master's thesis
Personal Author(s): Ho, Sze-Tek T
Report Date: Dec 2006
Media Count: 141   Page(s)
Descriptors: (U) *COMPUTERIZED SIMULATION, *ROBOTICS, *EXPLOSIVES DETECTION, ROBOTS, THESES, PHEROMONES, MEASURES OF EFFECTIVENESS, IMPROVISED WEAPONS
Identifiers: (U) *AGENT BASED SIMULATION, *SWARM ROBOTICS, *DOE(DESIGN OF EXPERIMENT), ABM(AGENT BASED MODELING), MODELING AND SIMULATION, MANA(MAP AWARE NON-UNIFORM AUTOMATA), ADAPTIVE ROBOTS, NOLH(NEARLY ORTHOGONAL LATIN HYPERCUBE), IED(IMPROVISED EXPLOSIVE DEVICES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The concept of employing ground swarm robotics to accomplish tasks has been proposed for future use in humanitarian de-mining, plume monitoring, searching for survivors in a disaster site, and other hazardous activities. More importantly in the military context, with the development of advanced explosive detectors, swarm robotics with autonomous search and detection capability could potentially address the improvised explosive device (IED) problem faced by foot patrols, and aid in the search for hidden ammunition caches and weapons of mass destruction (WMDs). The intent of this research is to leverage on agent based simulation to model a ground robotic swarm on a search and detection mission in a semi-urban environment rigged with stationary IEDs. Efficient design of experiment (DOE) techniques and data farming are engaged to help identify controllable factors and capabilities that have the most impact on overall effectiveness. The focus of this thesis is to explore agent based simulation applied to swarm robotics; the technological and algorithmic aspects are not delved on. Results from the simulations provide several insights on the impact of both decision and noise factors on the performance of the swarm. Incorporation of virtual pheromones as a shared memory map is modeled as an additional capability that is found to enhance the robustness and reliability of the swarm.

Back to Top


ADA462655
Imaging of 3.4 THz Quantum Cascade Laser Beam Using an Uncooled Microbolometer Camera

Descriptive Note: Master's thesis
Personal Author(s): Lowe, Michele
Report Date: Dec 2006
Media Count: 63   Page(s)
Descriptors: (U) *MINE DETECTION, *LASER BEAMS, *BOLOMETERS, *EXPLOSIVES DETECTION, *CAMERAS, THESES, IMPEDANCE MATCHING, IMAGES, CRYOSTATS, PULSE GENERATORS
Identifiers: (U) *QCL(QUANTUM CASCADE LASER), TERAHERTZ, MICROBOLOMETERS, UNCOOLED DETECTORS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The employment of terahertz (THz) technology for applications including Improvised Explosive Device (IED) and concealed weapons detection is a rapidly growing field of research. Additionally, THz waves do not pose a health hazard as do x-rays and as such can be used for the imaging and detection of certain cancers. To date, however, most detectors are highly sophisticated, bulky systems which require extensive cooling in order to provide a signal-to-noise (SNR) ratio high enough for detection. A detection system that is simple in operation and uncooled is highly desirable and is the focus of this research. In this thesis, operation of a 3.4 THz quantum cascade laser (QCL) was successfully achieved using a closed cycle cryostat and nanosecond pulse generator with impedance matching circuitry. The laser beam was imaged in real time using an uncooled microbolometer infrared camera typically used in far-infrared wavelength band (8-12 mm). The preliminary findings offer potential for development of a compact THz imaging system for applications involving concealed object detection.

Back to Top


ADA462650
Improvised Explosive Devise Placement Detection from a Semi-Autonomous Ground Vehicle

Descriptive Note: Master's thesis
Personal Author(s): Miller, Benjamin D
Report Date: Dec 2006
Media Count: 111   Page(s)
Descriptors: (U) *ROBOTICS, *SELF OPERATION, *PERSONNEL DETECTION, *GROUND VEHICLES, THESES, IMPROVISED WEAPONS, MOTION DETECTORS, AUTONOMOUS NAVIGATION, UNMANNED, CAMERAS
Identifiers: (U) *AGV(AUTONOMOUS GROUND VEHICLES), *HUMAN PRESENCE, *IED(IMPROVISED EXPLOSIVE DEVICES)
Distribution Statement: Approved for public release; distribution is unlimited. This document is not available from DTIC in microfiche.
Abstract: (U) Improvised Explosive Devices (IED's) continue to kill and seriously injure military members throughout the Iraqi theatre. Autonomous Ground Vehicle (AGV) seeks to identify the human presence placing the IED and then report that contact to a unit of action. This research developed a semiautonomous platform that can navigate to waypoints, avoid obstacles, investigate possible threats and then detect motion that triggers a visual camera. The information is then relayed back to the user and can trigger a variety of actions. AGV has been tested in numerous environments with a wide range of success. It is limited by the communication range from its standard 802.11G router and the continuous availability of the global positioning system. Terrain with extensive peaks and valleys is not ideal for the current platform. However, for detecting the human presence that is consistent with IED placement, AGV is well suited.

Back to Top


ADA481200
Multivariate PEM/FT Spectrometry: Intrinsic Data Fusion And Applications for IED and CB Defense

Personal Author(s): Buican, Tudor N; Carrieri, Arthur H
Report Date: 01 Nov 2006
Media Count: 9   Page(s)
Descriptors: (U) *SPECTROMETRY, FOURIER TRANSFORMATION, DEFENSE SYSTEMS, OPTICAL DETECTION, INTERFEROGRAMS, CHEMICAL WARFARE, DATA FUSION, SPECTROMETERS, INTERFEROMETERS, PHOTOELASTICITY, MODULATORS, BIREFRINGENCE, BIOLOGICAL WARFARE, ILLUMINATION, MULTIVARIATE ANALYSIS, EXPLOSIVE CHARGES
Identifiers: (U) IEDS(IMPROVISED EXPLOSIVE DEVICES), UHS(ULTRA-HIGH-SPEED), PEM(PHOTOELEASTIC MODULATORS)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) We present recent developments in the theory of a new class of active multivariate FT spectrometers and describe their potential uses in the optical detection and identification of improvised explosive devices (IEDs) and CB agents and contaminants. This technology is based on the use of dual ultra-high-speed (UHS) birefringence interferometers for the simultaneous and independent modulation of both illumination and collected beams, and employs photoelastic modulators (PEM) as the birefringent elements in these interferometers. With typical scan rates of 104 105 interferograms per second and broad spectral range, these instruments can rapidly collect multivariate spectral data describing, in a correlated way, the comprehensive excitation, emission, and delay/lifetime spectral properties of the sample/target. The intrinsic process of data fusion that melds the multivariate spectral data into one interferogram signal allows for the simultaneous and correlated use of all three spectral variables for improved discrimination and identification of chemical species of interest.

Back to Top


ADA481896
Simulation of Head Impact Leading to Traumatic Brain Injury

Descriptive Note: Conference paper
Personal Author(s): Taylor, Paul A; Ford, Corey C
Report Date: Nov 2006
Media Count: 7   Page(s)
Descriptors: (U) *MOTOR VEHICLE ACCIDENTS, *HEAD(ANATOMY), *WOUNDS AND INJURIES, *BRAIN FUNCTION IMPAIRMENT, IMPACT, EXPLOSIVE CHARGES, SYMPOSIA, WARFARE, SPATIAL DISTRIBUTION, SIMULATION, MODELS
Identifiers: (U) *IEDS(IMPROVISED EXPLOSIVE DEVICES), WAVE INTERACTIONS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Traumatic brain injury, or TBI, is an unfortunate consequence of many civilian accident and military combat scenarios. Examples include head impact sustained in sports activities and automobile accidents as well as blast wave loading from detonated improvised explosive devices (IED). In the United States, over 5 million people live with disabilities associated with TBI. We present the results of a scoping study simulating the early time wave interactions in the human head as a result of impact with a windshield in an automobile accident, a scenario leading to insipient conditions necessary for the onset of TBI. Our simulation results demonstrate that wave interactions within the head generate significant levels of stress at localized regions within the brain on an early time scale (1 msec) prior to any overall motion of the head. The spatial distribution of these localized regions is consistent with the coup-contrecoup TBI mechanism observed in some patients that experience such impact events. In addition, smaller, localized regions with high stress occur in other parts of our brain model suggesting a mechanism for differential clinical outcome in TBI patients subjected to similar parameters of injury.

Back to Top


ADA476638
Crime Scene Intelligence. An Experiment in Forensic Entomology

Descriptive Note: Research paper
Personal Author(s): Cruz, Albert M
Report Date: Nov 2006
Media Count: 81   Page(s)
Descriptors: (U) *EXPLOSIVES, *ENTOMOLOGY, *FORENSIC ANALYSIS, BIOLOGICAL DETECTION, SCIENTIFIC RESEARCH, DECAY, LARVAE
Identifiers: (U) ARTHROPOD FEEDING ACTIVITY, METABOLIC ABSORPTION, ENTOMOLOGICAL EVIDENCE, CRIME SCENE INTELLIGENCE, CARRION INSECT SUCCESSION, TIME SEQUENCE, EVIDENCE COLLECTION, PMI(POSTMORTEM INTERVAL)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Forensic entomology is the study of how insects consume decomposing human remains and can aid medical/legal investigations. Common questions answered include time since death, movement of a body from one location to another, location of traumatic wound sites, identification of toxicological deaths, and location of drug trafficking. However, forensic entomology has not been commonly utilized by the Intelligence Community (IC). Carrion insects, in particular blowflies, may be a valuable tool for analysts and investigators dealing with international crimes in the area of homicide, suicide, and untimely deaths from terrorist bombings. This is made possible due to blowfly larvae feeding on postmortem human tissue, tissue which may have been exposed to the chemical residues from a detonated IED. Past entomological studies which would back up this theory of transferability through larvae have involved human DNA and drug uptake in blowfly larvae. The significance of this finding is that if human DNA can be passed to fly larvae via feeding, it is plausible that explosive residues can be absorbed by fly larvae. The relevance of such information would allow IC analysts and operators to detect and identify compounds in terrorist bombings when other means of identification are not available. These forensic determinations are possible, but only if entomological evidence is recognized, properly collected, and sent to a professional entomological laboratory for analysis by a qualified forensic entomologist. Intelligence and law enforcement officers must become fully aware of the complex processes associated with the decay process and the important role that insects play. Investigators must understand the need for specimen collection and recording of other pertinent field data. If the proper steps are followed, it is possible for insects to reveal silently the information we need to solve some international crimes, including terrorist-related bombings.

Back to Top


ADA481043
The Design and Development of a Robotically Emplaced Hand Packed Shaped Charge

Descriptive Note: Conference paper
Personal Author(s): DeFisher, S; Baker, E; Wu, I; Wu, J; Richwald, A; Miller, G
Report Date: 01 Nov 2006
Media Count: 28   Page(s)
Descriptors: (U) *THEATER LEVEL OPERATIONS, *EXPLOSIVE CHARGES, *EXPLOSIVE ORDNANCE DISPOSAL, *ROBOTS, SYMPOSIA, BURIED OBJECTS, ENERGETIC PROPERTIES, REMOTE SYSTEMS
Identifiers: (U) IEDS(IMPROVISED EXPLOSIVE DEVICES), *ANTI-IED SHAPED CHARGES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The recent use of buried Improvised Explosive Devices (IEDs) has resulted in a high cost to the U.S. Army, in terms of both lives and materiel lost in the South West Asian (SWA) theater. The safe destruction of these types of devices is currently the responsibility of explosive ordnance disposal (EOD) operators. In an attempt to make a dangerous job safer, U.S. Army EOD personnel are increasingly using robots to emplace charges that can destroy deeply buried ordnance. In an attempt to destroy these deeply buried IEDs, ARDEC EOD and Energetics, Warheads, and Environmental Technology (EWET) personnel teamed to develop a high performance anti-IED shaped charge. This was a problem for which, at least up to this point, there had been no dedicated solution. Due to the urgent need to field such a device, any potential solution would be required to be loaded locally in theater in order to preclude complications associated with the normal acquisition process. In addition, any solution would have to be capable of being deployed via a remotely controlled robot. The efforts contained within this paper were conducted over an 8 month time period from the beginning of the first test to the time that the units were actually deployed to the theater of operation.

Back to Top


ADA456446
Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Descriptive Note: Congressional rept.
Personal Author(s): Wilson, Clay
Report Date: 25 Sep 2006
Media Count: 7   Page(s)
Descriptors: (U) *DEPARTMENT OF DEFENSE, *THREATS, *MILITARY PROCUREMENT, *BOMBS, *COUNTERMEASURES, *IMPROVISED WEAPONS, TERRORISTS, EXPLOSIVE CHARGES, LEGISLATION, ARMORED VEHICLES, IRAQI WAR, AFGHANISTAN CONFLICT, INSURGENCY, DETONATORS, BOMB FUZES, ARMOR PIERCING AMMUNITION, MILITARY BUDGETS, ROBOTS, GROUND VEHICLES, CASUALTIES, LETHALITY, WEAPONS EFFECTS
Identifiers: (U) *IEDS(IMPROVISED EXPLOSIVE DEVICES), ROADSIDE BOMBS, VEHICLE-BORNE IEDS, SUICIDE BOMBINGS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Since October 2001, Improvised Explosive Devices (IEDs, or roadside bombs) have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan. IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan. The threat includes vehicle-borne IEDs, in which extremists drive cars laden with explosives directly into a target. Department of Defense (DoD) efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever on patrol. IEDs are increasingly being used in Afghanistan, and DoD reportedly is concerned that they might eventually be more widely used by other insurgents and terrorists worldwide. This report will be updated as events warrant.

Back to Top


ADA457379
Guided Standoff Weapons: A Threat to Expeditionary Air Power

Descriptive Note: Master's thesis
Personal Author(s): Vish, Jeffrey A
Report Date: Sep 2006
Media Count: 73   Page(s)
Descriptors: (U) *KILL PROBABILITIES, *ACCURACY, *AIR POWER, *TACTICAL AIRCRAFT, *GUIDED WEAPONS, STRATEGY, HOMELAND SECURITY, THESES, DRONES, MODELS, PASSIVE SYSTEMS
Identifiers: (U) *AIR BASE DEFENSE, *STAND OFF ATTACKS, IEDS(IMPROVISED EXPLOSIVE DEVICES), EXPEDITIONARY AIR FORCES, ASYMMETRIC ATTACKS, JOINT REAR AREA
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The Air Base has long been a potential target of attack for enemy planners. An effective way to attack the United States Air Force (USAF) is to avoid the United State's usual dominance in the air, attacking airbases with ground forces inserted into the Joint Rear Area. The history of airbase ground attacks from 1942 to 1994, documented in the book Snakes in the Eagle's Nest, shows that the dominant strategy employed by air base attackers has been the standoff attack. Roughly, 75 percent of all airbase attacks have been through the use of rockets or mortar fire from outside the airbase's perimeter defenses. In Vietnam, where the defenses against penetrating ground attacks were emphasized, this percentage rose to 96 percent. Historically robust main operating bases, with passive defensive measures such as hardened facilities and redundant systems, have been able to withstand standoff attacks. The relative inaccuracy of the attacker's standoff systems and their limited ability to sustain fire on the air base minimized damage. The USAF finds itself operating in an expeditionary mode across the globe. Expeditionary Air Forces cannot depend on the luxury of operating off main operating bases. In addition, the emergence of guided munitions for mortars and anti-tank missiles has increased the accuracy of potential standoff weapons. Finally, the sophistication of Improvised Explosive Devices in Iraq and of modern radiocontrolled model aircraft even suggests a potential for attackers to build guided weapons. The potential for a one shot, one kill standoff weapon is here, negating the effectiveness of passive hardening measures. Disrupting these attacks will take new strategies. Understanding current Joint and USAF doctrine is the first step. Areas for further study include disrupting the enemy forces before they launch a standoff attack, intercepting the standoff round in flight and mitigating the damage on impact are discussed.

Back to Top


ADA457303
Improvised Incendiary Devices: Risk Assessment, Threats, Vulnerabilities and Consequences

Descriptive Note: Master's thesis
Personal Author(s): Raynis, Stephen A
Report Date: Sep 2006
Media Count: 97   Page(s)
Descriptors: (U) *PREPARATION, *THREATS, *URBAN AREAS, *INCENDIARY MIXTURES, *FIRE STORMS, *WILDERNESS, *HOMELAND SECURITY, *IMPROVISED WEAPONS, POLICIES, UNITED STATES GOVERNMENT, THESES, FEAR, COUNTERTERRORISM, STATE GOVERNMENT, RISK ANALYSIS, INCENDIARY BOMBS, FIRE HAZARDS, LOCAL GOVERNMENT, FIRE PREVENTION, HAZARDOUS MATERIALS, TERRORISM, FIRE PROTECTION, RESPONSE, VULNERABILITY, CIVIL DEFENSE, STRATEGY
Identifiers: (U) *IMPROVISED INCENDIARY DEVICES, FIRST RESPONDERS, ENMERGENCY RESPONDERS, IID(IMPROVISED INCENDIARY DEVICES), PYRO-TERRORISM, ARSON, CONFLAGRATIONS, FIRESTORMS, INCENDIARY TERRORISM, WILDLAND FIRES, URBAN FIRES, WUI(WILDLAND-URBAN INTERFACES), WEAPONIZED FIRE, EMERGENCY PREPAREDNESS, CBIRNE(CHEMICAL BIOLOGICAL INCENDIARY RADIOLOGICAL NUCLEAR EXPLOSIVES), CBRNE(CHEMICAL BIOLOGICAL RADIOLOGICAL NUCLEAR EXPLOSIVES), DHS(DEPARTMENT OF HOMELAND SECURITY)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The current trend in terrorist tactics is the use of simple, inexpensive and conventional weapons. One such weapon is improvised incendiary devices (IIDs). The homeland security community has underestimated the magnitude of the threat. Policy makers must recognize the potential for terrorist cells to use IIDs to create terror and fear in the public. IIDs have the potential to create devastating fires resulting in mass casualties. In addition to evaluating the risk of an IID attack and determining the state of preparedness of first responders, this thesis includes a proposal for the creation of two new national planning scenarios, urban and wildland conflagrations or firestorms. Recommendations will include incendiary protocols in the weapon of mass destruction matrix as represented by I in CBIRNE. This organizational change can be applied to the homeland security strategies, lexicons, and documents of Federal, State, and local governments and the private sector to address the IID threat. The thesis is intended to serve as a catalyst for the Department of Homeland Security to set policy that will decrease vulnerabilities and consequences of this lesser-known threat.

Back to Top


ADA449515
Continuous Network Interdiction

Descriptive Note: Technical rept.
Personal Author(s): Washburn, Alan
Report Date: Jun 2006
Media Count: 25   Page(s)
Descriptors: (U) *INTERDICTION, *TACTICAL ANALYSIS, NETWORK ANALYSIS(MANAGEMENT), LOW INTENSITY CONFLICT, IMPROVISED WEAPONS, IRAQI WAR
Identifiers: (U) NASH EQUILIBRIUM, IMPROVIDED EXPLOSIVE DEVICES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) This report deals with network interdiction campaigns that are expected to be carried out indefinitely in time. Two sides are always involved, one desiring the unimpeded movement of some commodity, while the other desires the opposite. We consider two distinct situations. The first is motivated by warfare involving Improvised Explosive Devices (TEDs) directed against the movement of materiel in convoys on roads. It will be assumed that this kind of warfare is low level in the sense of destroying only a negligible fraction of the shipped materiel, so the objective becomes the maximization or minimization of the rate at which the convoys take lethal hits. The second situation is an economic one where the interdictor attempts to capture a significant fraction of the shipped materiel, so much so that a profit cannot be made by shipping it. This leads to a Nash equilibrium where the shipper's quantity shipped is in equilibrium with the interdictor's budget for interdiction.

Back to Top


ADA451277
EOD, Up!: How Explosive Ordnance Disposal Forces Can Best Support Special Operations Forces

Descriptive Note: Master's thesis
Personal Author(s): Draper, Stephen R
Report Date: Jun 2006
Media Count: 125   Page(s)
Descriptors: (U) *EXPLOSIVE ORDNANCE DISPOSAL, *SPECIAL OPERATIONS FORCES, TERRORISTS, INTELLIGENCE, HAZARDS, DESTRUCTION, EXPLOSIVE CHARGES, INSURGENCY, NEUTRALIZATION, TEAMS(PERSONNEL), THESES, TECHNICIANS, GAME THEORY
Identifiers: (U) HYPER-CONVENTIONAL, SOF SUPPORT, FORCE ENABLERS, SWAT, INITIAL TRUST, TECHNICAL INTELLIGENCE, HOSTAGE RESCUE, REQUIREMENTS ANALYSIS, COUNTER-TERRORISM, IED(IMPROVISED EXPLOSIVE DEVICE)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) U.S. special operations forces (SOF) are likely to undertake missions against terrorists, insurgents, and other enemies where they will encounter explosive hazards. Identification, detection, and neutralization of weapons of mass destruction, improvised explosive devices, booby-traps, and similar weapons requires the support of technicians trained in explosive ordnance disposal (EOD), an expertise that is not resident in SOF units. Consequently, there is a need for EOD technicians with SOF capabilities who can readily integrate with them. This thesis employs a variety of methodologies, from an analysis of required capabilities to an application of game theory, to determine how SOF can be best supported by existing EOD forces and how the supporting command structures and relationships may be improved. It concludes that the Navy's EOD force is best suited to provide support to SOF, and should be included in all special operations planning documents. Those Navy EOD units tasked to provide support to SOF should be consolidated into one organization dedicated to that mission. Finally, when supporting SOF, the Navy should replace its current eight-person EOD operational element with a two-man team that will better match SOF operational requirements.

Back to Top


ADA507508
Pre-Incident Indicators of Terrorist Incidents: The Identification of Behavioral, Geographic, and Temporal Patterns of Preparatory Conduct

Descriptive Note: Final rept.
Personal Author(s): Smith, Brent L; Damphousse, Kelly R; Roberts, Paxton
Report Date: Mar 2006
Media Count: 541   Page(s)
Descriptors: (U) *UNITED STATES, *TERRORISTS, *SOCIAL PSYCHOLOGY, *DOMESTIC TERRORISM, *GEOPOLITICS, *RELIGION, *WESTERN SECURITY(INTERNATIONAL), *PLANNING, INDICATORS, INTERNET, POLITICAL REVOLUTION, GEOGRAPHIC DISTRIBUTION, CRIMES, RELATIONAL DATA BASES, PREVENTION, IDENTIFICATION, VARIABLES, EXPLOSIVES, INTERDICTION, POSITION(LOCATION), SPATIAL DISTRIBUTION, WEAPONS, PATTERNS
Identifiers: (U) TIMELINES, *OPEN SOURCE DATA, SUBJECT MATTER EXPERTS, *IDEOLOGICAL JUSTIFICATION, IEDS(IMPROVISED EXPLOSIVE DEVICES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Findings from the American Terrorism Study (NIJ grant #1999-IJCX-0005 and DHS/MIPT grant #106-113-2000-064) reveal that unlike traditional criminality, terrorists are much less spontaneous, engage in substantial planning activities, and commit ancillary and preparatory crimes in advance of a terrorist incident. Building on these findings, the goals of the current project were to determine whether (1) sufficient open source data exists to examine the temporal and spatial relationships that exist in terrorist group planning, and (2) if such data do exist, can patterns of routinized preparatory conduct be identified. To accomplish these goals, subject matter experts were selected to identify terrorist groups/incidents that operated or occurred within the United States from four major categories: international; and three types of domestic terrorism -- left-wing, right-wing, and single issue (which was limited to environmental and anti-abortion terrorism). Sixty-seven cases were selected for analysis. Of these sixty seven, sixty of the cases were sufficiently fertile to provide some data for analysis. These included 22 right-wing, 9 left-wing, 10 international, and 17 single issue cases. Information on some 200 terrorist incidents (right-wing, 41; left-wing, 51; international, 58; and single issue, 50) was extracted from open source data on these cases to create a relational database composed of 265 variables. Geospatial data was recorded on some 515 terrorists' residences, planning locations, preparatory activities, and target locations.

Back to Top


ADA450176
Reproducibility Distinguishability and Correlation of Fireball and Shockwave Dynamics in Explosive Munitions Detonations

Descriptive Note: Master's thesis
Personal Author(s): Steward, Bryan J
Report Date: Mar 2006
Media Count: 171   Page(s)
Descriptors: (U) *DETONATIONS, FIELD TESTS, THESES, CORRELATION, HIGH EXPLOSIVES, MUZZLE FLASH, HIGH SPEED PHOTOGRAPHY, SCALING FACTOR, SURFACE TO AIR MISSILES, REPRODUCIBILITY
Identifiers: (U) FIREBALL EXPANSION, EXPLOSIVE MUNITION, HIGH-SPEED MULTI-BAND IMAGERY, IMPROVISED EXPLOSIVES, SMALL CALIBER MUZZLE FLASHES, SHOCKWAVE EXPANSION
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The classification of battlespace detonations is a particularly challenging problem. The intense infrared radiation produced by the detonation of high explosives is largely unstudied. Furthermore, the time-varying fireball imagery and spectra are driven by many factors. The current study investigates fireball expansion dynamics using high speed, multi-band imagery. Instruments were deployed to three field tests involving improvised explosives in howitzer shells, simulated surface-to-air missiles, and small caliber muzzle flashes. The rate of shockwave expansion for the improvised explosives was determined from apparent index of refraction variations in the visible imagery. Fits of the data to existing drag and explosive models found in the literature, as well as modifications to these models, showed agreement in the near- and mid-fields; the modified models typically predicted the time for the shockwave to arrive a kilometer away to better than 10%; and fit parameters typically had an uncertainty of less than 20%. The shockwave was distinctive within the first 2-10 milliseconds after detonation, then it decayed to an indistinguishable acoustic wave. The area profiles of the fireballs were also examined and found to be highly variable, especially after 10 milliseconds, regardless of munitions type. Scaling relationships between properties of the explosive (mass, specific energies, and theoretical energies) and detonation areas, characteristic times, and properties of the shockwave were assessed for distinguishing weights and types: Efficiency decreased with mass; early-time Mach number and overpressure were primarily dependent on energy release; fireball area increased cubically with specific energies but its time of occurrence decreased cubically. The relationship between fireball and shockwave features was fairly independent of variability, indicating that both fireball and shockwave features scale similarly with variability in detonations.

Back to Top


ADA454399
Improvised Explosive Devices (IEDs) in Iraq: Effects and Countermeasures

Descriptive Note: Congressional rept.
Personal Author(s): Wilson, Clay
Report Date: 10 Feb 2006
Media Count: 7   Page(s)
Descriptors: (U) *IRAQ, *EXPLOSIVES, THREAT EVALUATION, CASUALTIES, COUNTERMEASURES, MINES(ORDNANCE), INSURGENCY
Identifiers: (U) IEDS(IMPROVISED EXPLOSIVE DEVICES)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Improvised Explosive Devices (IEDs) in Iraq: Effects and Countermeasures Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Improvised explosive devices (IEDs) are responsible for many of the more than 2,000 deaths and numerous casualties suffered by U.S. and coalition forces since the invasion of Iraq.1 The bombs have been hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with IEDs are becoming more numerous and deadly. The threat has expanded to include vehicle-borne IEDs, where insurgents drive cars laden with explosives directly into a targeted group of service members. DOD efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever riding in vehicles in Iraq. DOD reportedly expects that mines and IEDs will continue to be weapons of choice for insurgents for the near term in Iraq, and is also concerned that they might eventually become more widely used by other insurgents and terrorists worldwide. This report will be undated as events warrant.

Back to Top


ADA503933
21st Century Mine Warfare

Descriptive Note: Research paper
Personal Author(s): White, T P
Report Date: 07 Feb 2006
Media Count: 10   Page(s)
Descriptors: (U) *MARINE CORPS PERSONNEL, *MILITARY ENGINEERS, *LAND MINES, *IMPROVISED WEAPONS, *MISSIONS, *EXPLOSIVES, *MINE COUNTERMEASURES, EXPLOSIVE ORDNANCE DISPOSAL, UNEXPLODED AMMUNITION, BOOBY TRAPS, THREATS, SKILLS, MOBILITY
Identifiers: (U) *IED(IMPROVISED EXPLOSIVE DEVICES), *MARINE COMBAT ENGINEERS, MAGTF(MARINE AIR GROUND TASK FORCES), EXPLOSIVE ORDINANCE DISPOSAL TEAMS, ROUTE CLEARANCE
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Operations Enduring Freedom and Iraqi Freedom have required Marine Corps forces to contend with repeated attacks from improvised explosive devices (IED). These devices have been perceived as a new threat that has caught the American military unprepared. To respond to the threat, ground commanders believed that the explosive ordinance disposal (EOD) community was the only viable option. This solution however, has proven insufficient due to the small number of EOD technicians. It also overlooks the similarity of IEDs to land mines in their composition and employment. Combat engineers are the members of the Marine Air Ground Task Force (MAGTF) primed to conduct countermine operations. Rather than overburdening the EOD community, combat engineers must be utilized for combating the threat of IEDs because their mission, doctrine, and task organization best support these types of operations.

Back to Top


ADA498107
Restructuring of the 1371 Military Occupational Specialty

Personal Author(s): Bright, K H
Report Date: 07 Feb 2006
Media Count: 11   Page(s)
Descriptors: (U) *MARINE CORPS PERSONNEL, *ORGANIZATIONAL REALIGNMENT, *MILITARY OCCUPATIONAL SPECIALTIES, THREATS, COMBAT READINESS, EXPLOSIVES, STANDARDS, IMPROVISED WEAPONS, MILITARY REQUIREMENTS, COMBAT FORCES, LAND MINES, MILITARY ENGINEERS, TRAINING, SKILLS, MARINE ENGINEERING
Identifiers: (U) *RESTRUCTURING, IED(IMPROVISED EXPLOSIVE DEVICE)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) With new technical demands levied upon the latest generation of Marine combat engineers to counter evolving mine, munitions, and Improvised Explosive Device (IED) threats, answering the mission call introduces an unprecedented level of complexity to the 1371 Military Occupational Specialty (MOS). Whenever operationally-required adjustments are made to further expand the 1371 MOS mission scope (as evidenced in the current operating environments of Afghanistan and Iraq), it should naturally beg the question of the engineer community's leadership as to whether or not the Individual Training Standards (ITS) currently prescribed to the 1371 MOS are both specialized enough and sufficiently training to in order for combat engineers to safely and thoroughly perform in their growing lead and support roles on the battlefield.

Back to Top


ADA503892
Engineer Manpower and MAGTF Mobility

Descriptive Note: Research paper
Personal Author(s): O'Brien, D M
Report Date: Feb 2006
Media Count: 14   Page(s)
Descriptors: (U) *SHORTAGES, *MARINE CORPS PERSONNEL, *MILITARY ENGINEERS, *MANPOWER, *EXPLOSIVE ORDNANCE DISPOSAL, *MILITARY OCCUPATIONAL SPECIALTIES, *MINE COUNTERMEASURES, UNEXPLODED AMMUNITION, EXPLOSIVES DETECTION, COUNTERINSURGENCY, LAND MINES, BATTLEFIELDS, IMPROVISED WEAPONS, MOBILITY, MARINE CORPS
Identifiers: (U) *MAGTAF(MARINE AIR-GROUND TASK FORCES), *MARINE COMBAT ENGINEERS, *IED(IMPROVISED EXPLOSIVE DEVICES), EMW(EXPEDITIONARY MANEUVER WARFARE), ROUTE CLEARANCE, ENGINEER CAPABILITIES, WEAPONS CACHES, MOS 1371, CEA(CAPTURED ENEMY AMMUNITION), MANPOWER SHORTAGES
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) The Marine Corps' capstone concept, expeditionary maneuver warfare (EMW), requires unprecedented mobility. A MAGTF cannot effectively conduct route clearance without the skills of Marine combat engineers. Combat engineer units must be properly manned to play their role within the MAGTF. In the Marine Corps a controversy has arisen around the serious threat of command detonated mines and the existence on the battlefield of ordnance, ammunition, and improvised explosive devices (IED). Competition over scarce resources for mine counter-mine operations has pitted engineers against the explosive ordnance disposal (EOD) community. This conflict has sensationalized the inherent dangers in captured enemy ammunition (CEA) destruction and politicized the battlefield roles of engineers and EOD. Despite the symbiotic relationship between engineers and EOD on the battlefield, these communities are fighting for the resources to accomplish their missions. The truth is that mobility, hence countering the IED threat, is a MAGTF task. However, the community with the most effective advocacy (EOD) received a major end strength increase not to mention the acquisition of critical equipment, including robots, optics, tool kits, and mine survivable vehicles. But this outcome had unintended consequences. The struggle for resources produced a winner and a loser. It also created the impression that one side was right and one side was wrong. This struggle created a new perception: the IED is EOD turf. While this view is demonstrably false, it is widely subscribed to and has serious ramifications for EMW. The inability to counter IEDs should be and is considered a capability gap in Marine Corps mine countermeasures that degrades MAGTF mobility. IEDs are a threat that requires the full attention and commitment of the MAGTF and the Expeditionary Force Development System. Increasing the end strength of combat engineers should be part of the solution.


ADA445195
Head, Face, and Neck Injuries During Operation Iraqi Freedom II: Results From the US Navy and Marine Corps Combat Trauma Registry

Descriptive Note: Technical rept. Mar 2004-Jan 2006
Personal Author(s): Wade, Amber L; Dye, Judy L; Mohrle, Charlene R; Galarneau, Michael R
Report Date: 12 Jan 2006
Media Count: 18   Page(s)
Descriptors: (U) *MILITARY PERSONNEL, *WOUNDS AND INJURIES, *FACE(ANATOMY), *HEAD(ANATOMY), *NECK(ANATOMY), MILITARY OPERATIONS, NAVAL RESEARCH, CASUALTIES
Identifiers: (U) IRAQ FREEDOM OPERATION, PE603729N, WU60332
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) A retrospective analysis was performed to assess characteristics of head, face, and neck injury among US military casualties from Operation Iraqi Freedom Phase Two. Data were collected from the US Navy and Marine Corps Combat Trauma Registry for the time period of 1 March to 30 September 2004. Four hundred and forty-five casualties with head, face, or neck injury were identified for analysis. Of these, 140 (31%) sustained multiple wounds to the head, face, and neck; 177(40%) had head wounds; 336(76%) had facial wounds; and 84(19%) had neck wounds. Head, face, and neck wounds accounted for 61% of the total 1,666 injuries incurred. Improvised explosive devices were the most frequent cause of injury among battle casualties, whereas motor vehicle accidents were the most common cause of injury among nonbattle casualties. The overall mean abbreviated injury severity scores for head, face, and neck injuries were 2.1,1.1, and 1.2, respectively. Although the majority of casualties incurred wounds to the face, head and neck injuries were generally more severe, especially among those who died of wounds. The high frequency of facial wounding suggests, however, that the face may be more vulnerable during armed conflict than the head or neck.

Back to Top


ADA465348
Cyber Mobilization: A Growing Counterinsurgency Campaign

Descriptive Note: Journal article
Personal Author(s): Thomas, Timothy L
Report Date: Jan 2006
Media Count: 7   Page(s)
Descriptors: (U) *INTERNET, REPRINTS, DECISION MAKING, RECRUITING, INSURGENCY, CYBERTERRORISM, CELLULAR COMMUNICATIONS, COUNTERINSURGENCY, PLANNING, CONFLICT
Identifiers: (U) *SUICIDE BOMBERS, IED(IMPROVISED EXPLOSIVE DEVICES), WTO(WORLD TRADE ORGANIZATION)
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) According to US Army publications, two types of offensive actions are key components of insurgency doctrine: armed conflict and mass mobilization. It is clear after more than three years of fighting in Afghanistan and Iraq that the insurgents use improvised explosive devices (IEDs) as their main instrument to conduct armed conflict, and that they have learned to mobilize and conduct conflict-related cognitive activities using cyber means. For example, they capitalize on Internet capabilities to plan, target, educate, recruit, and influence sympathizers. If an insurgency's strength is predicated on the support of the local population, then Coalition counterinsurgency efforts must take cybermoblization enabled by computerized devices such as cell phones and the Internet into account. The warning signs of the advent of mobile phone and Internet mobilization were evident long before the wars in Afghanistan and Iraq. In December 1999, agitators used the Internet to organize resistance to the World Trade Organization (WTO) meeting in Seattle. Net-recruited protestors converged on Seattle from all directions. They frustrated well designed police control plans by using cell phones to move crowds to unattended areas, or to focus on other advantageous spots. Both television and Internet sites picked up coverage of these successful efforts, all of which encouraged similar demonstrations and championed other causes.

Back to Top


ADA481638
Chasing U-Boats and Hunting Insurgents: Lessons from an Underhand Way of War

Descriptive Note: Journal article
Personal Author(s): Breemer, Jan S
Report Date: Jan 2006
Media Count: 8   Page(s)
Descriptors: (U) *IRAQI WAR, *MILITARY TACTICS, *ANTISUBMARINE WARFARE, *MILITARY HISTORY, *LESSONS LEARNED, *MILITARY STRATEGY, *COUNTERINSURGENCY, LAND MINES, COUNTERMEASURES, URBAN AREAS, INSURGENCY, NAVAL MINES, FIRST WORLD WAR, SECOND WORLD WAR, VIETNAM WAR, SUBMARINE DETECTION, MILITARY PUBLICATIONS, MERCHANT VESSELS, BARRIERS, IDENTIFICATION, ASYMMETRIC WARFARE, ALGERIA, REPRINTS
Identifiers: (U) *U-BOATS, *INSURGENTS, INSURGENT DETECTION, INSURGENT IDENTIFICATION, SANCTUARIES, ALGERIAN WAR, IED(IMPROVISED EXPLOSIVE DEVICES), MINE BARRIERS, PHYSICAL BARRIERS, BARRAGE SYSTEMS, MORICE LINE, MCNAMARA LINE, SEARCH AND DESTROY MISSIONS, NAVAL CONVOYS
Distribution Statement: Approved for public release; distribution is unlimited.
Abstract: (U) Just over a century ago, a British admiral condemned the newly invented submarine as an underhand, unfair, and damned un-English weapon. The officer underscored his disdain for the craft by urging that submarine crews be treated as pirates and hanged. Winston Churchill, then the Royal Navy's political head, was not willing to go quite that far, yet at one point during World War I, he ordered that captured U-boat crews be treated as criminals, not prisoners of war. Churchill's action was symptomatic of the professional naval attitude toward this below-the-belt weapon: sinking merchant ships without warning was not legitimate warfare as behooved a civilized power. Those sentiments of long ago have a familiar ring, albeit in a different context: insurgency warfare. Regular soldiers have historically looked on insurgency warfare as underhanded and unfair and, a U.S. combatant in Iraq might add, damned un-American. From the Soldier's perspective, the insurgents' war-making methods are neither those of a civilized opponent nor in accordance with the laws and customs of war. Particularly objectionable is the insurgent's stealthiness: the man, or woman, who appears to be a peaceable citizen but who may at any moment become a spy, a brigand, and assassin and a rebel. Fighting and defeating the submarine is the business of antisubmarine warfare (ASW); counterinsurgency is its counterpart in irregular war. This essay compares the problems of ASW and counterinsurgency. It explores in particular the strategic and operational similarities, as well as the different, yet strikingly similar, solutions to which antisubmarine and counterinsurgency warriors have resorted. In the end, it considers a final similarity between these forms of warfare: namely, the penchant for sailors and soldiers to repeatedly unlearn the lessons of the underhand and unfair ways of war.

Back to Top