Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Date: September 25, 2006
Creator: Wilson, Clay
Description: Since October 2001, Improvised Explosive Devices (IEDs, or roadside bombs) have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan. IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan. Department of Defense (DOD) efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever on patrol. IEDs are increasingly being used in Afghanistan, and DOD reportedly is concerned that they might eventually be more widely used by other insurgents and terrorists worldwide.
Contributing Partner: UNT Libraries Government Documents Department
High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM) Devices: Threat Assessments

Date: April 14, 2006
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Date: September 25, 2006
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Information Operations and Cyberwar: Capabilities and Related Policy Issues

Information Operations and Cyberwar: Capabilities and Related Policy Issues

Date: September 14, 2006
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Information Operations and Cyberwar: Capabilities and Related Policy Issues

Information Operations and Cyberwar: Capabilities and Related Policy Issues

Date: September 14, 2006
Creator: Wilson, Clay
Description: This report describes the emerging areas of information operations in the context of U.S. national security. It assesses known U.S. capabilities and plans, and suggests related policy issues of potential interest to Congress.
Contributing Partner: UNT Libraries Government Documents Department
Improvised Explosive Devices in Iraq: Effects and Countermeasures

Improvised Explosive Devices in Iraq: Effects and Countermeasures

Date: November 23, 2005
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Network Centric Warfare: Background and Oversight Issues for Congress

Network Centric Warfare: Background and Oversight Issues for Congress

Date: March 18, 2005
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Information Warfare and Cyberwar: Capabilities and Related Policy Issues

Information Warfare and Cyberwar: Capabilities and Related Policy Issues

Date: July 19, 2004
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Network Centric Warfare: Background and Oversight Issues for Congress

Network Centric Warfare: Background and Oversight Issues for Congress

Date: June 2, 2004
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Date: April 1, 2005
Creator: Wilson, Clay
Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Contributing Partner: UNT Libraries Government Documents Department
FIRST PREV 1 2 NEXT LAST