Search Results

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Description: Since October 2001, Improvised Explosive Devices (IEDs, or roadside bombs) have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan. IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan. Department of Defense (DOD) efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever on patrol. IEDs are increasingly being used in Afghanistan, and DOD reportedly is concerned that they might eventually be more widely used by other insurgents and terrorists worldwide.
Date: September 25, 2006
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department

Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures

Description: This report discusses Improvised Explosive Devices (IEDs, or roadside bombs) in Iraq and Afghanistan. IEDs have been responsible for many of the more than 2,000 combat deaths in Iraq, and 178 combat deaths in Afghanistan. IEDs are hidden behind signs and guardrails, under roadside debris, or inside animal carcasses, and encounters with these bombs are becoming more numerous and deadly in both Iraq and Afghanistan. The threat includes vehicle-borne IEDs, in which extremists drive cars laden with explosives directly into a target. DOD efforts to counter IEDs have proven only marginally effective, and U.S. forces continue to be exposed to the threat at military checkpoints, or whenever on patrol. IEDs are increasingly being used in Afghanistan, and DOD reportedly is concerned that they might eventually be more widely used by other insurgents and terrorists worldwide.
Date: September 25, 2006
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department

Defense Program Issue: Global Information Grid, Bandwidth Expansion (GIG-BE)

Description: This report discusses the Global Information Grid (GIG), which is the enabling infrastructure for Network Centric Warfare (NCW), a concept that relies on communications technology to link together U.S. military personnel, ground vehicles, aircraft, and naval vessels through integrated wide and local area networks to provide improved battle space awareness for joint military forces
Date: March 11, 2005
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Date: October 17, 2003
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Date: April 1, 2005
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department

Terrorist Capabilities for Cyberattack: Overview and Policy Issues

Description: This report examines possible terrorists' objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of the U.S. homeland, and also discusses the emerging computer and other technical skills of terrorists and extremists. Policy issues include exploring ways to improve technology for cybersecurity, or whether U.S. counterterrorism efforts should be linked more closely to international efforts to prevent cybercrime.
Date: January 22, 2007
Creator: Rollins, John & Wilson, Clay
Partner: UNT Libraries Government Documents Department