National Academies Press: OpenBook
« Previous: Appendix A Committee Membership
Suggested Citation:"Appendix B Summary of Data-Gathering Meetings." National Research Council. 2007. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version. Washington, DC: The National Academies Press. doi: 10.17226/11953.
×

Appendix B
Summary of Data-Gathering Meetings

The Committee on Defeating Improvised Explosive Devices: Basic Research to Interrupt the IED Delivery Chain held three data-gathering meetings between November 2005 and April 2006. During these meetings, the committee received briefings from government officials, academics, and outside experts on the IED threat, IED countermeasures, terrorism, and insurgency.


November 7-8, 2005, in Washington, D.C. Briefings received from the following. Office of Naval Research (ONR): briefings on current ONR investments and counter-IED research efforts and purpose of the study and charge to the committee; Combating Terrorism Technology Task Force: IED threat and challenges facing the Department of Defense; Joint IED Defeat Task Force1: briefing on the role of the JIEDDTF and joint concept of operations. Briefings from the following university affiliated research centers on basic research efforts to counter IEDs: Applied Research Laboratories of the University of Texas, Applied Research Laboratory of the University of Washington, Applied Physics Laboratory of the Johns Hopkins University, and Applied Research Laboratory at the Pennsylvania State University. Lawrence Livermore, Los Alamos, and Sandia National Laboratories: briefings on counter-IED research ongoing at the Department of Energy’s National Laboratories; Technology Support Working

1

The Joint IED Defeat Task Force is now known as the Joint IED Defeat Organization (JIEDDO).

Suggested Citation:"Appendix B Summary of Data-Gathering Meetings." National Research Council. 2007. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version. Washington, DC: The National Academies Press. doi: 10.17226/11953.
×

Group: briefing on the IED threat and currently deployed counter-IED technologies.


February 8-9, 2006, in Washington, D.C. Briefings received from the following. Office of Naval Research: briefing on ONR sponsored counter-IED research and ONR coordination with the JIEDDO and the Joint Laboratory Board; Office of the Secretary of Defense, Combating Terrorism Technology Task Force (CTTTF): briefing on the IED threat and insurgency; The Naval Postgraduate School: lessons from a graduate IED course; Washington Institute for Near East Policy, Military and Security Studies Program: briefing on the use of IEDs in Iraq and the Middle East; Institute for Defense Analyses, Joint Advanced Warfighting Program: briefing on the IED threat in Iraq; Breakout sessions with representatives from various federal agencies were held to receive briefings and participate in roundtable discussions on government counter-IED programs.2


April 18-19, 2006, in Washington, D.C. Briefings received from the following. Office of Naval Research: briefing on ONR sponsored counter-IED research; Office of the Director of Defense Research and Engineering: briefing on the Department of Defense counter-IED investment portfolio; Army Research Laboratory, Air Force Research Laboratory, Naval Research Laboratory: briefings on counter-IED research ongoing at the DoD service laboratories; Case Western Reserve University, Institute for Global Security Law and Policy: presentation on the legal aspects of countering IEDs; Core Operations Analysis Group (COAG): briefing on COAG support to the Joint IED Defeat Organization; Joint IED Defeat Organization: briefing on the IED threat, campaign, and future requirements; Breakout sessions with representatives from the RAND corporation, ONR, the Penn State University Applied Research Laboratory, the Massachusetts Institute of Technology Lincoln Laboratory, the DoD Joint Robotics Program Office, the Naval Research Laboratory and an independent consultant were held to discuss counter-IED research programs.

2

Agencies represented included the Defense Intelligence Agency, Federal Bureau of Investigation, Secret Service, Department of State, Department of Homeland Security, Department of Energy, Department of Defense, Joint Chiefs of Staff and an intelligence agency.

Suggested Citation:"Appendix B Summary of Data-Gathering Meetings." National Research Council. 2007. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version. Washington, DC: The National Academies Press. doi: 10.17226/11953.
×
Page 17
Suggested Citation:"Appendix B Summary of Data-Gathering Meetings." National Research Council. 2007. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version. Washington, DC: The National Academies Press. doi: 10.17226/11953.
×
Page 18
Next: Appendix C Glossary »
Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version Get This Book
×
Buy Paperback | $29.00 Buy Ebook | $23.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Attacks in London, Madrid, Bali, Oklahoma City and other places indicate that improvised explosive devices (IEDs) are among the weapons of choice of terrorists throughout the world. Scientists and engineers have developed various technologies that have been used to counter individual IED attacks, but events in Iraq and elsewhere indicate that the effectiveness of IEDs as weapons of asymmetric warfare remains. The Office of Naval Research has asked The National Research Council to examine the current state of knowledge and practice in the prevention, detection, and mitigation of the effects of IEDs and make recommendations for avenues of research toward the goal of making these devices an ineffective tool of asymmetric warfare. The book includes recommendations such as identifying the most important and most vulnerable elements in the chain of events leading up to an IED attack, determining how resources can be controlled in order to prevent the construction of IEDs, new analytical methods and data modeling to predict the ever-changing behavior of insurgents/terrorists, a deeper understanding of social divisions in societies, enhanced capabilities for persistent surveillance, and improved IED detection capabilities.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!