- Page 2: ForewordAttacks from improvised exp
- Page 7 and 8: Introduction“This is not a new wa
- Page 9 and 10: Chapter 1FundamentalsWith the proli
- Page 11 and 12: Fundamentals• Avoid activities. T
- Page 13 and 14: Fundamentals• Explosive hazard. A
- Page 15 and 16: Chapter 2Contemporary Operational E
- Page 17 and 18: Contemporary Operational Environmen
- Page 19 and 20: Contemporary Operational Environmen
- Page 21 and 22: Contemporary Operational Environmen
- Page 23 and 24: Contemporary Operational Environmen
- Page 25 and 26: Chapter 3Improvised Explosive Devic
- Page 27: Improvised Explosive Device ThreatF
- Page 31 and 32: Improvised Explosive Device Charact
- Page 33 and 34: Improvised Explosive Device Charact
- Page 35 and 36: Chapter 5Organizations Involved in
- Page 37 and 38: Organizations Involved in Improvise
- Page 39 and 40: Organizations Involved in Improvise
- Page 41 and 42: Organizations Involved in Improvise
- Page 43 and 44: Organizations Involved in Improvise
- Page 45 and 46: Chapter 6Improvised Explosive Devic
- Page 47: Improvised Explosive Device Respons
- Page 51 and 52: Improvised Explosive Device Respons
- Page 53 and 54: Improvised Explosive Device Respons
- Page 55 and 56: Chapter 7Improvised Explosive Devic
- Page 57 and 58: Improvised Explosive Device Defeat
- Page 59 and 60: Improvised Explosive Device Defeat
- Page 61 and 62: Improvised Explosive Device Defeat
- Page 63 and 64: Improvised Explosive Device Defeat
- Page 65 and 66: Improvised Explosive Device Defeat
- Page 67 and 68: Improvised Explosive Device Defeat
- Page 69 and 70: Chapter 8Training RequirementsUnits
- Page 71 and 72: Training RequirementsENEMY TACTICS8
- Page 73 and 74: Training RequirementsCompany Level
- Page 75 and 76: Training RequirementsTable 8-2. Cri
- Page 77 and 78: Appendix AMetric Conversion ChartTh
- Page 79 and 80:
Appendix BIntelligenceThe process o
- Page 81 and 82:
IntelligenceB-10. As with standard
- Page 83 and 84:
IntelligenceB-16. HUMINT provides t
- Page 85 and 86:
Intelligenceturn, broadcast video v
- Page 87 and 88:
IntelligenceSECTION III - PROCESS C
- Page 89 and 90:
Appendix COrganization Contact Info
- Page 91 and 92:
Organization Contact Information an
- Page 93 and 94:
Organization Contact Information an
- Page 95 and 96:
Appendix DRecording and Tracking Im
- Page 97 and 98:
Recording and Tracking Improvised E
- Page 99 and 100:
Recording and Tracking Improvised E
- Page 101 and 102:
Appendix ETactics, Techniques, and
- Page 103 and 104:
Tactics, Techniques, and Procedures
- Page 105 and 106:
Tactics, Techniques, and Procedures
- Page 107 and 108:
Appendix FMilitary SearchMilitary s
- Page 109 and 110:
Military SearchPRINCIPLES• Ambush
- Page 111 and 112:
Military Search• Potential VBIED
- Page 113 and 114:
Appendix GSpecialized EquipmentIn g
- Page 115 and 116:
Specialized EquipmentCASSPIRG-3. Th
- Page 117 and 118:
Specialized EquipmentROBOTSFigure G
- Page 119 and 120:
Specialized EquipmentFigure G-12. A
- Page 121 and 122:
Specialized Equipment• Two shock
- Page 123 and 124:
Appendix HTraining ResourcesTASKSTh
- Page 125 and 126:
Training ResourcesH-9. A video avai
- Page 127 and 128:
GlossarySECTION I - ACRONYMS AND AB
- Page 129 and 130:
GlossaryDOTLDDOTMLPFDirectorate of
- Page 131 and 132:
GlossaryIVMMDIWJCMECJDIGSJIEDDJIMJI
- Page 133 and 134:
GlossaryOPORD operation orderops op
- Page 135 and 136:
GlossaryWITWMDwwwweapons intelligen
- Page 137 and 138:
ReferencesSOURCES USEDThese are the
- Page 139 and 140:
References*FMI 4-30.5. Modular EOD
- Page 141 and 142:
FMI 3-34.119/MCIP 3-17.0121 Septemb