Académique Documents
Professionnel Documents
Culture Documents
b. Initiating System. The initiation system or fuse sets off the device and can at
times be complicated or very simple. Multiple initiation systems can be used to detonate
a device and trigger the IED. Some examples consist of a simple hard wire (two wires
being connected) for command detonation, a cellular telephone or remote
controlled/radio-controlled improvised explosive device (RCIED) detonation, a time fuse
detonation, or victim-operated detonation. There are typically three components to the
initiation system the power source, switch, and initiator.
(1) Power Source. Batteries or an uninterrupted power supply are used as a
power source for detonators. Batteries of all types are the primary source of power for
IEDs. Batteries could be as small as 9-volt, AA, or those used in long-range cordless
telephones (LRCTs), to car and truck batteries. IEDs may even be wired into the local
power supply of a home or office.
(2) Switch. A switch is used to complete the electrical circuit provided by the
power source allowing current to flow to arm and/or fire the initiating system.
(3)
charge.
c. Casing. Casings can be anything that can contain any or all components of the
IED. The casing can provide enhanced fragmentation and also camouflage the IED. A
myriad of containers have been used as casings, including soda cans, animal
carcasses, pressure cookers, plastic bags, and vests or satchels for suicide bombers.
3. INITIATION METHODS. There are three types of methods to initiate an IED; they
are Time, Command, and Victim.
a. Time. Time initiated IEDs are designed to function after a preset delay, allowing
the enemy to escape or target military forces which have created a pattern. Timers
used include chemical, mechanical, and electronic.
b. Command. Command-initiated IEDs are a common method of employment and
allow the enemy to choose the optimum moment of initiation. They are normally used
against targets that are in transit or where a routine pattern has been established. The
most common types of command-initiated methods are with command wires or radiocontrolled devices, such cellular telephones, and remote car openers and alarms.
c. Victim. A victim-operated IED is a means of attacking an individual or group of
individuals. The victim or victims active the IED. There are various types of initiation
devices, which include pull or trip, pressure, pressure release, movement-sensitive,
light-sensitive, and proximity.
4. EMPLOYMENT AND TARGETS.
a. Employment. IEDs can be used in multiple fashions. The following are some
examples:
(1) IEDs can be concealed with just about anything such as trash, boxes, tires,
and so on. They can be placed in, on, or under a target to include unsecured or
abandoned vehicles.
(2) Disguised moveable IEDs can consist of, vehicle borne IEDs (VBIED),
suicide vehicle borne IEDs (SVBIED), and personnel borne IEDs (PBIED).
observation for these subtle indicators can increase the likelihood of IED detection by
friendly forces before detonation.
a. IED Indicators. Most common indicators of an IED are a change in the
environment, such as unusual behavior or changes in community patterns, a normally
busy area no longer busy, or the absence of women or children. Other indicators can
consist of suspicious objects, colors that seem out of place, such as freshly disturbed
dirt, concrete that does not match the surrounding areas, colored detonating cord, or
other exposed parts of an IED.
b. VBIED. Common indicators of a VBIED are noticeable sagging of the vehicle
(increased weight due to explosives), darkened or covered windows to conceal the
vehicles contents, a newly painted vehicle to cover body alterations, odd license plates,
and signs of tampering.
c. SVBIED. Common indicators of an SVBIED may consist of a vehicle following a
convoy for a long distance and then pulling to the roadside, signals from vehicles or
bystanders (flashing headlights), lone male with unusual appearance, and a vehicle
driving erratically.
d. PBIED. Most common indicators of a PBIED may consist of an individual with
excessive clothing, nervousness, erratic behavior, and failure to follow orders given.
6. IED LOCATIONS. EDs may be emplaced anywhere that enough space exists or
can be created to hide or disguise the IED. Typically located to exploit known friendly
patterns such as supply and patrolling routes. They may also be employed to take
advantage of vulnerabilities or danger areas such as choke points and previous IED
sites.
a. Common Locations. IEDs may be commonly seen in elevated positions,
boundary turnaround points that establish a pattern, choke points, sharp turns, blind
spots under culverts and bridges, streambeds, and abandoned buildings or structures.
7. OPERATIONS. In order to minimize the effects of an IED, there are many things
coalition forces can do, regardless of the type of threat. Wearing all Personal Protective
Equipment (PPE) available is one of the most basic precautions everyone can and
should take. Other simple but critical force protective measures include wearing
seatbelts, ensuring all personnel have as much of their body inside of a vehicle as
possible, and closing all ballistic glass windows. Keep in mind that reacting to a specific
situation, such as a disabled vehicle or suspected IED the same way every time, the
enemy will quickly catch on and will use this knowledge to his advantage.
a. Patrolling. One of the most important things you can do to protect yourself and
your unit is to limit your predictability. Consider changing routes, movement techniques,
and your TTPs for dealing with different situations. It is important to keep in mind that
the enemy is always watching. For example, if you react to a specific situation (such as
a suspected IED) the same way every time, you will establish a base line and the
enemy will use this to their advantage. Consider moving against the normal flow of
traffic (when practical) this is a method of limiting predictability, but also presents the
patrol with a different and often more advantageous observation angle that may reveal
the backside of an IED that was poorly camouflaged.
b. Counter VBIED/SVBIED Considerations. The key to surviving a
VBIED/SVBIED attack is standoff and cover. Stress to security personnel that a
SVBIED can come from any direction. Vehicles turning into a patrol from oncoming
traffic, and moving in a convoy, have attacked units. Remember that there is a
difference between a VBIED and an SVBIED. Maintain an aggressive security posture
and have a plan for dealing with civilian traffic.
a.
(1) Traffic control measures can include, but are not limited to, the use of signs
in the local language, formations that take up all lanes in the road; and visual and
audible signals (using an air horn and/or flares to warn cars to stay back according to
the current Rules of Engagement (ROE)).
b.
c. Counter PBIED Considerations.
(1) When dealing with or suspected PBIED it is important to evacuate the area
immediately. A safe distances will depend on the mass of explosive carried by the
individual and the amount and type of fragmentation that is used.
(2) At no time should you try to Close and Negotiate with an individual
suspected of caring an IED, because they are usually trained to avoid surrender at all
costs.
(3) In most cases there will be a fail safe in place. This can be a cell phone or
radio-controlled initiation system that could be used in the event that the individual is
incapacitated or hesitates. This tactic would normally involve a second suspect with a
line-of-sight view of the individual and should always be considered.
(4) It is important to keep in mind that if a deadly force response is taken, a
bullet impact may initiate or detonate the explosive charge. Firing on the suspect
should only be conductive from protective cover.
(5) If the suspect is neutralized and there is no explosion, do not administer first
aid. Wait for Explosive Ordnance Disposal (EOD) to render safe the explosive charge.
c.
d. Actions At Halts. If a patrol or convoy must halt conduct rolling stops, using
optics to identify a safe position to halt during movement. Avoid clustering vehicles,
vary the vehicle interval between elements, establish your own local security, and
employ techniques to create standoff. If stopping for any length of time, improve your
position constantly, maintain observation of your position, and consider establishing a
defensive position for the site you are occupying. Maintain an aggressive security
posture and have a plan for dealing with civilian traffic. Make sure you do not present a
soft target for a SVBIED/PBIED.
(1) 5 And 25 Meter Checks. At every halt, no matter how short, the crew must
conduct 5 and 25 meter visual checks around the vehicle. Start combat observation
with hasty searches then progress to more detailed searches. For extended halts,
teams must physically clear 5-25 meters around the patrol or convoy. Begging a 5 and
25 meter checks, before stopping to avoid stopping on top of an IED. When executing 5
and 25 meter checks, you should:
(a)
(b) Look for disturbed earth, suspicious objects, loose bricks in walls, or
anything out of the ordinary (Markers and Indicators).
(c) Start search at ground level and continue up above head height. Then
conduct a physical check for a radius of 5 then 25 meters around your position. Check
quickly and be systematic.
(d) If in an armored vehicle, remain mounted during your 5 meter check to
take advantage of the vehicles protection.
(e) Once 5 meter checks are completed, continue visually scanning out to
25 meters. Remember to check under vehicle and close doors.
(f) Conduct a physical search for a radius of 25 meters around your
position.
(g)
1. Direct personnel out of the danger area and allow no one into
danger area.
2. Position crew served weapons to best cover avenues of approach.
3. Ensure Marines remain vigilant in providing protection and security
against command detonated IEDs, PBIEDs, and VBIEDs and scan for other enemy
activity, such as triggermen, cameramen, or snipers from their cordoned positions.
4. Allow entry only to authorized personnel (EOD).
(d) Check. Check the immediate area around the site and cordoned
positions for secondary devices using the 5 and 25 meter checks. Expand the search
using available optics such as the Rifle Combat Optic (RCO), looking for indicators,
secondary devices, and suspicious personnel.
(e) Control. To ensure only authorized access, control the area inside the
cordon. Only emergency services (medical, firefighting, or EOD) should be allowed to
enter the cordon. All personnel and vehicles should enter and exit the cordoned area
through any control points. All civilian and non-essential military traffic should be
diverted away from the cordon. To ensure that no tampering occurs, maintain (from a
safe distance) a visual/line-of-sight (binoculars and scopes/RCO) observation on the
IED. A 360-degree security around the cordon should be maintained until EOD has
given the all-clear signal.
(3) Suspected IED What Not To Do. There are many considerations to
remember when encountering an IED.
(a) Never Approach A Suspected IED. Establish standoff by using
binoculars and spotting scopes/RCOs from multiple angles to confirm the presence of
an IED. When in doubt, back off and call EOD. It is important to never touch a
suspected IED.
(b) Do Not Trace Command Wire (CW). The enemy has placed trip wires
and other IEDs under/in the vicinity of command wires. When a command wire is
located, rather than walking parallel to the wire or over the wire to locate the initiation
point, work in an S pattern, crossing the CW until the initiation point is located.
(c) Do Not Focus On The Found IED. Once found, an IED is not going
to move. Conduct secondary sweeps and set in cordons. Always think a couple steps
ahead and have a plan for any possible encounters that may arise. Again, once positive
IED indicators are found move to safe distances and call Explosive Ordnance Disposal
(EOD).
(b) Immediately scan outward. The biggest mistake you can make is to
focus inward toward the site of the IED detonation or injuries and forget about the
enemy. Obviously, someone will have to assess the situation, communicate with higher,
and tend to casualties. Every member of the patrol should scan around the location for
the enemy.
(c)
Move all able personnel and vehicles out of the kill zone.
(d) Search for additional IEDs (5 and 25 Meter Checks) at the new
location and at the location of cordon.
(e) Treat/evacuate casualties. Clear all casualties from kill zone, then
treat and evacuate casualties as needed.
(f)
Report situation.
(g)
(5) IED Detonation: With Or Without Casualties. After an IED is detonated, all
personnel must react immediately in accordance to the Five Cs.
(a) Confirm. Maintain a low profile, provide security, check for secondary,
identify casualties and treat utilizing care under fire.
(b) Clear. Determine safe distance from detonation site, clear the area,
and transport casualties to a 360 security. At this point it is important to conduct
accountability and five and 25-meter checks. Upon completion of accountability the
patrol leader will report a CASVAC repot and an IED report.
(c) Cordon. Immediately establish near and far secure by utilizing a fourpoint cordon at a safe distance from detonation site.
(d) Check. All members at the cordon will conduct a 5 and 25-meter
check of the area for a secondary and possible enemy.
Non
Master
Master
Remarks
Non
Performance Steps:
Master
Master
TITLE
PAGE
MCIP 3-17.01
Entire Manual
Entire Manual
MCIP 05-23
Entire Publication
Remarks
NOTES:
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________