What does ied bomb stand for




















These are just some of the attempts to encapsulate what has become the most lethal explosive weapon in use today. While the term IED may typically conjure up images of military vehicles being attacked by roadside devices in insurgent propaganda videos, their use and purpose has a much wider scope and their popularity amongst non-state actors is a growing concern in dozens of countries around the world.

An IED is rarely, if ever, produced by traditional manufacturing processes with a rigid mode of employment. An explosive charge might be constructed from commonly available chemicals, but can also include conventional munitions such as artillery shells adapted as roadside bombs.

But they continue to evolve both in their design, which is defined by available materials and by the use to which they are put. There are a number of ways to categorize IEDs. Perhaps one of the better ways is to define them by the mode by which they are initiated. Using this categorization, we can see the following:. Clearly there are many variations within each of these categories, but generally almost all IEDs fall within these three main areas. Recent developments have not essentially changed these fundamentals.

Typically, IEDs have four key components: a main charge of explosives, an explosive initiator a small amount of energetic explosives , a switching mechanism and a container of some sort. Most developments in IED design and construction involve one or more of these.

Perpetrators of IED attacks are faced with a range of targets and naturally those targets may take measures to improve their protection in the event of an attack. This naturally leads to the perpetrator considering ways in which to amplify the effect of the explosive component in order to overcome those defensive measures.

At the simplest level this might simply be the use of larger quantities of explosives. Over the last few years we have seen larger and larger VBIEDs in a variety of countries around the world as security protocols, using things such as road blocks, keep VBIEDs further from their targets. A second development is the use of a more sophisticated explosive component design.

When faced with armored targets some terrorist groups have used the physics of explosive component design to develop the design of the warhead to create a more penetrative effect, using — for instance — shaped charges. Shaped charges come in a variety of configurations, from high angle cones to dishes, all of which are deformed by the complex transition of the explosive blast wave into a range of penetrative effects.

These effects can be further developed by the use of a range of different metals, which deform in different ways. Perpetrators of IED attacks do not necessarily have access to military explosives. The Alliance focuses on reducing the frequency and severity of IED attacks, while also attacking the networks AtN that facilitate them. Understanding the various threat networks at the tactical to strategic levels is vital to success in current and future operations where battle lines are no longer linear.

It covers all levels of C-IED, from the strategic to the tactical. It is built around several different areas, including information-sharing, closer cooperation with other international organisations and law enforcement agencies. In this context, the use of biometric information is seen as a key element in countering threat anonymity.

IEDs can be hidden anywhere: on animals, planted in roads or strapped to a person. They can be detonated via cell phones or trip wires, among other methods. They can be deployed everywhere: in a combat environment or in the middle of a busy city. The adaptability of IEDs to almost any situation makes them difficult to detect and stop, which is why NATO members and partners are using several methods to increase counter IED capabilities.

These initiatives, such as joint acquisition of equipment, joint testing of new technology, technological research cooperation and development of common equipment standards, have been grouped into a C-IED Materiel Roadmap. These studies prompt information-sharing among Allies and partners, standards for effective C-IED in a coordinated and interoperable manner throughout operations, and many cooperative activities including Smart Defence initiatives.

You can change your cookie settings at any time. This publication is licensed under the terms of the Open Government Licence v3. To view this licence, visit nationalarchives. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned.

Improvised Explosive Devices IEDs are effective weapons and can be delivered to their chosen locations in a number of ways, including by suicide bombers. Although there is no definitive physical profile for a suicide bomber, there are various signs that may indicate an individual carrying a device or conducting reconnaissance.

IEDs delivered via the post are discussed specifically within the Mail Handling section of this guidance. Read more about Mail handling and Mail Screening. Read more about Vehicle Bombs. The effects of a detonated IED can be highly destructive. In addition to the initial blast which can be lethal, debris such as broken glass and metal in the form of secondary fragmentation, can cause further injury at a considerable distance away from the seat of the explosion.

The longer term disruption as a result of the blast can last for many further weeks, leading to business continuity, economic damage and infrastructure challenges. If you think your site could be at risk from an IED, there are physical and procedural mitigation measures that can be utilised to help reduce the risk. For site specific advice, contact your local CTSA. The variety of protective security measures which may be utilised to strengthen a site against an IED attack are featured throughout this guidance.

The following points and principles however may serve as points for further discussion and inform your protective security posture:. Read more about Physical Security.



0コメント

  • 1000 / 1000