U.S. Army Improvised Munitions Handbook

U.S. Army Improvised Munitions Handbook
Author: Department of the Army
Publisher: Simon and Schuster
Total Pages: 421
Release: 2012-02-01
Genre: Technology & Engineering
ISBN: 1510720561

You don’t need to be a trained soldier to fully appreciate this edition of the U.S. Army Improvised Munitions Handbook (TM 31-210). Originally created for soldiers in guerilla warfare situations, this handbook demonstrates the techniques for constructing weapons that are highly effective in the most harrowing of circumstances. Straightforward and incredibly user-friendly, it provides insightful information and step-by-step instructions on how to assemble weapons and explosives from common and readily available materials. Over 600 illustrations complement elaborate explanations of how to improvise any number of munitions from easily accessible resources. Whether you’re a highly trained solider or simply a civilian looking to be prepared, the U.S. Army Improvised Munitions Handbook is an invaluable addition to your library.

Reducing the Threat of Improvised Explosive Device Attacks by Restricting Access to Explosive Precursor Chemicals

Reducing the Threat of Improvised Explosive Device Attacks by Restricting Access to Explosive Precursor Chemicals
Author: National Academies of Sciences, Engineering, and Medicine
Publisher: National Academies Press
Total Pages: 215
Release: 2018-05-19
Genre: Technology & Engineering
ISBN: 0309464072

Improvised explosive devices (IEDs) are a type of unconventional explosive weapon that can be deployed in a variety of ways, and can cause loss of life, injury, and property damage in both military and civilian environments. Terrorists, violent extremists, and criminals often choose IEDs because the ingredients, components, and instructions required to make IEDs are highly accessible. In many cases, precursor chemicals enable this criminal use of IEDs because they are used in the manufacture of homemade explosives (HMEs), which are often used as a component of IEDs. Many precursor chemicals are frequently used in industrial manufacturing and may be available as commercial products for personal use. Guides for making HMEs and instructions for constructing IEDs are widely available and can be easily found on the internet. Other countries restrict access to precursor chemicals in an effort to reduce the opportunity for HMEs to be used in IEDs. Although IED attacks have been less frequent in the United States than in other countries, IEDs remain a persistent domestic threat. Restricting access to precursor chemicals might contribute to reducing the threat of IED attacks and in turn prevent potentially devastating bombings, save lives, and reduce financial impacts. Reducing the Threat of Improvised Explosive Device Attacks by Restricting Access to Explosive Precursor Chemicals prioritizes precursor chemicals that can be used to make HMEs and analyzes the movement of those chemicals through United States commercial supply chains and identifies potential vulnerabilities. This report examines current United States and international regulation of the chemicals, and compares the economic, security, and other tradeoffs among potential control strategies.

Bomb Hunters: In Afghanistan with Britain’s Elite Bomb Disposal Unit

Bomb Hunters: In Afghanistan with Britain’s Elite Bomb Disposal Unit
Author: Sean Rayment
Publisher: HarperCollins UK
Total Pages: 41
Release: 2011-02-03
Genre: Fiction
ISBN: 0007413254

'Afghanistan is just like Iraq – hot, dusty and full of people who want to kill you', SSgt Simon Fuller, Royal Engineer Search Advisor Bomb Hunters tells the story of the British army's elite bomb disposal experts, men who face death every day in the most dangerous region of the most lethal country on earth – Helmand Province, Afghanistan.

Tough As They Come

Tough As They Come
Author: Travis Mills
Publisher: Convergent Books
Total Pages: 282
Release: 2016-10-25
Genre: Biography & Autobiography
ISBN: 1101904801

Thousands have been wounded in the wars in Iraq and Afghanistan. Five have survived quadruple amputee injuries. This is one soldier's story. Thousands of soldiers die every year to defend their country. United States Army Staff Sergeant Travis Mills was sure that he would become another statistic when, during his third tour of duty in Afghanistan, he was caught in an IED blast four days before his twenty-fifth birthday. Against the odds, he lived, but at a severe cost—Travis became one of only five soldiers from the wars in Afghanistan and Iraq to survive a quadruple amputation. Suddenly forced to reconcile with the fact that he no longer had arms or legs, Travis was faced with a future drastically different from the one he had imagined for himself. He would never again be able to lead his squad, stroke his fingers against his wife’s cheek, or pick up his infant daughter. Travis struggled through the painful and anxious days of rehabilitation so that he could regain the strength to live his life to the fullest. With enormous willpower and endurance, the unconditional love of his family, and a generous amount of faith, Travis shocked everyone with his remarkable recovery. Even without limbs, he still swims, dances with his wife, rides mountain bikes, and drives his daughter to school. Travis inspires thousands every day with his remarkable journey. He doesn’t want to be thought of as wounded. “I'm just a man with scars,” he says, “living life to the fullest and best I know how.”

Explosive Ordnance Disposal

Explosive Ordnance Disposal
Author: Alain Michaux
Publisher: Nova Science Publishers
Total Pages: 0
Release: 2013
Genre: Explosive ordnance disposal
ISBN: 9781628083576

"This is an edited, reformatted and augmented version ..."--Page 1.

Operation Shakespeare

Operation Shakespeare
Author: John Shiffman
Publisher: Simon and Schuster
Total Pages: 288
Release: 2015-08-25
Genre: Political Science
ISBN: 1451655169

"A Pulitzer Prize finalist presents the rare and intimate narrative of a daring national security sting designed to protect US soldiers, sailors, and pilots from the greatest danger they face on the battlefield--an enemy equipped with American-made weapons and technology. In Operation Shakespeare, investigative journalist John Shiffman traces an audacious and high-risk undercover operation--from Philadelphia to Shiraz to London to Beverly Hills to Tbilisi and Dubai. The sting is launched by an elite undercover Homeland Security unit created to stop the Iranians, Russians, Chinese, Pakistanis, and North Koreans from acquiring sophisticated American-made electronics capable of guiding missiles, jamming radar, and triggering countless weapons--from wireless IEDs to nuclear bombs. The US agents must outwit not only enemy brokers, but American manufacturers and global bankers too willing to put profit over national security. The three-year sting in Operation Shakespeare climaxes when the US agents lure the Iranian broker to a former Soviet republic with the promise of American-made radar, fighter-jet and missile components, then secretly drag him back to the United States, where he is held in secret for two years. The laptop the Iranian carries into the sting provides the CIA with a treasure trove, a virtual roadmap to Tehran's clandestine effort to obtain US military technology. Tenacious, richly detailed, broad in scope, and emotionally powerful--and boasting unprecedented access to the government agents fighting this shadow war, as well as the captured Iranian arms broker--Operation Shakespeare is a fast-paced and masterful account of the covert effort to preserve American military supremacy, and to protect US troops"--

Dodgebomb

Dodgebomb
Author: Darin Pepple
Publisher:
Total Pages:
Release: 2021-03-15
Genre:
ISBN: 9780578865799

During the height of the Global War on Terrorism, Lieutenant Eddie Fitzgerald is sent straight from school to Iraq as a casualty replacement. Immediately thrown into combat, he must quickly overcome his naivety and earn the trust of his unit in order to survive. However, if hunting Al Qaeda wasn't enough, he's quickly pulled into Arab tribal politics and Army officer rivalries that threaten to spoil any work that he accomplishes.

Digital Triage Forensics

Digital Triage Forensics
Author: Stephen Pearson
Publisher: Syngress
Total Pages: 278
Release: 2010-07-13
Genre: Computers
ISBN: 1597495972

Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. The DTF is used by the U.S. Army and other traditional police agencies for current digital forensic applications. The tools, training, and techniques from this practice are being brought to the public in this book for the first time. Now corporations, law enforcement, and consultants can benefit from the unique perspectives of the experts who coined Digital Triage Forensics. The text covers the collection of digital media and data from cellular devices and SIM cards. It also presents outlines of pre- and post- blast investigations. This book is divided into six chapters that present an overview of the age of warfare, key concepts of digital triage and battlefield forensics, and methods of conducting pre/post-blast investigations. The first chapter considers how improvised explosive devices (IEDs) have changed from basic booby traps to the primary attack method of the insurgents in Iraq and Afghanistan. It also covers the emergence of a sustainable vehicle for prosecuting enemy combatants under the Rule of Law in Iraq as U.S. airmen, marines, sailors, and soldiers perform roles outside their normal military duties and responsibilities. The remaining chapters detail the benefits of DTF model, the roles and responsibilities of the weapons intelligence team (WIT), and the challenges and issues of collecting digital media in battlefield situations. Moreover, data collection and processing as well as debates on the changing role of digital forensics investigators are explored. This book will be helpful to forensic scientists, investigators, and military personnel, as well as to students and beginners in forensics. - Includes coverage on collecting digital media - Outlines pre- and post-blast investigations - Features content on collecting data from cellular devices and SIM cards

Terrorism and U.S. Foreign Policy

Terrorism and U.S. Foreign Policy
Author: Paul R. Pillar
Publisher: Rowman & Littlefield
Total Pages: 288
Release: 2004-05-13
Genre: Political Science
ISBN: 0815798741

The United States government-backed by the overwhelming support of the American public-takes a hard line against international terrorism. The tenets of official U.S. counterterrorist policy are: make no concessions or deals with terrorists; bring them to justice for their crimes; isolate and apply pressure on states that sponsor terrorism; and bolster the counterterrorist capabilities of countries willing to work with the United States. While these tenets are sound principles, their application, specifically overseas, raises difficult questions. Does the "no deal" policy actually deter terrorists acts? Are there cases where agreements might reduce terrorism, while advancing other U.S. interests? Do isolation and pressure really force offending states to alter their support for terrorists? What factors affect the willingness, not just the capability, of foreign governments to help the United States in counterterrorism? In this critical study, a career CIA officer provides a guide to constructing and executing counterterrorist policy, urging that it be formulated as an integral part of broader U.S. foreign policy. In the first four chapters, Paul R. Pillar identifies the necessary elements of counterterrorist policy, he examines why the United States is a prime terrorist target, and he reveals why the counterterrorist policies that seem strongest are not always the most effective. Chapter 5 examines the widely varying nature of terrorist groups and the policy tools most appropriately applied to them. Chapter 6 focuses on states that sponsor terrorism (including Iran, Libya, North Korea, and Cuba), along with those that enable it to occur (particularly Greece and Pakistan). Pillar examines ways in which the American public's perspective toward terrorism can actually constrain counterterrorist policy, and he concludes that terrorism cannot be "defeated" only reduced, attenuated, and to some degree, controlled. The final chapter summarizes his recommendations f