
Archive – ATP/FM 3-21.8 (2016) – Appendix J: Selected Battle Drills
Dec 18, 2024 · If Soldiers suspect an IED while performing the 5/25/200 meter checks, they should assume it could detonate at any moment, even if the suspected IED turns out to be a false alarm.
Do not approach the "Possible Improvised Explosive Device (IED)." If possible, avoid using any communication electronic equipment within established exclusion area.
React to an Improvised Explosive Device (IED) Attack
Oct 11, 2014 · React to an Improvised Explosive Device (IED) Attack. Conditions: As a Squad Leader your squad is conducting a mounted/dismounted military operation when an Improvised Explosive …
Series: "Battle Drills" (BD11: React to IED) - YouTube
This episode is part of our series on US Army Battle Drills. Stephen and Jacob will break down and explain US Army Battle Drill 11 (React to Improvised Explosive Device) found in Field...
React to IED attack.pptx - For Official Use Only CIED CLASS...
Mar 22, 2020 · Once the IED detonates, the enemy may attack with small arms fire and rocket propelled grenades or even secondary IEDs. The enemy may have mortars and rockets zeroed in on the IED …
Warrior Tasks # — Skill Level 3 - United States Army
052-192-3262 Prepare for an Improvised Explosive Device (IED) Threat Prior to Movement. 052-192-1251 React to Explosive Hazard Visual Indicators. 052-192-1265 Produce an Explosive Hazard...
IED Awareness: Reacting to Improvised Explosive Devices
Learn how to identify and react to IEDs. Covers IED threats, types, exclusion areas, security, and reporting procedures. Military science presentation.
Series: "Battle Drills" (BD11: React to IED) - Apple Podcasts
Mar 1, 2025 · This episode is part of our series on US Army Battle Drills. Stephen and Jacob will break down and explain US Army Battle Drill 11 (React to Improvised Explosive Device) found in Field …
Alert the vehicle commander and elements of the convoy of the possible IED/VBIED and its location using the 3 Ds (distance, direction, description).
We dug deeper into our information collection techniques and this provided several early warnings and subsequent recovery of compromised IEDs. These methods kept us safe from further direct IED …