National Academies Press: OpenBook
« Previous: Appendix B Summary of Data-Gathering Meetings
Suggested Citation:"Appendix C Glossary." National Research Council. 2007. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version. Washington, DC: The National Academies Press. doi: 10.17226/11953.
×

Appendix C
Glossary

Asymmetry: the absence of a common basis of comparison with respect to a quality or a capability.

Data fusion: a formal framework in which means and tools for the alliance of data from different sources are expressed. It aims at obtaining information of greater quality; the exact definition of greater quality will depend upon the application (Wald, 1999).

Disruption: an action that interrupts, disables, or prematurely activates the detonation sequence of an IED.

Human terrain: the political, social, cultural and economic environment.

IED campaign: the concerted use of IEDs to achieve strategic or tactical goals.

Insurgency: A struggle between a non-ruling group and the ruling authorities in which the non-ruling group consciously uses political resources (such as organizational expertise, propaganda, and demonstrations) and violence to destroy, reformulate, or sustain the basis of legitimacy of one or more aspects of politics (O’Neil, 1990). Terrorism may be a tactic used in an insurgency.

JIEDDTF: Joint IED Defeat Task Force

JIEDDO: Joint IED Defeat Organization

ONR: Office of Naval Research

Ordnance: munitions, weapon-delivery system, or item that contains explosives, propellants, or chemical agents.

Persistent surveillance: the monitoring of targets of interest with sufficient frequency, continuity, accuracy, precision, spectral diversity,

Suggested Citation:"Appendix C Glossary." National Research Council. 2007. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version. Washington, DC: The National Academies Press. doi: 10.17226/11953.
×

and data content that the targets will not be able to move or change substantially without notice.

Terrorism: an anxiety-inspiring method of repeated violent action, used by clandestine or semi-clandestine individual, group, or state actors for idiosyncratic, criminal, or political reasons, whereby—in contrast with assassination—the direct targets of violence are not the main targets. The immediate human victims of violence are generally chosen randomly (targets of opportunity) or selectively (representative or symbolic targets) from a target population and serve as message generators. Threat- and violence-based communication processes between terrorist (organization), (imperiled) victims, and main targets are used to manipulate the main target (audience(s)), turning it into a target of terror, a target of demands, or a target of attention, depending on whether intimidation, coercion, or propaganda is primarily sought (Schmid, 1988).

Suggested Citation:"Appendix C Glossary." National Research Council. 2007. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version. Washington, DC: The National Academies Press. doi: 10.17226/11953.
×
Page 19
Suggested Citation:"Appendix C Glossary." National Research Council. 2007. Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version. Washington, DC: The National Academies Press. doi: 10.17226/11953.
×
Page 20
Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities: Abbreviated Version Get This Book
×
Buy Paperback | $29.00 Buy Ebook | $23.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Attacks in London, Madrid, Bali, Oklahoma City and other places indicate that improvised explosive devices (IEDs) are among the weapons of choice of terrorists throughout the world. Scientists and engineers have developed various technologies that have been used to counter individual IED attacks, but events in Iraq and elsewhere indicate that the effectiveness of IEDs as weapons of asymmetric warfare remains. The Office of Naval Research has asked The National Research Council to examine the current state of knowledge and practice in the prevention, detection, and mitigation of the effects of IEDs and make recommendations for avenues of research toward the goal of making these devices an ineffective tool of asymmetric warfare. The book includes recommendations such as identifying the most important and most vulnerable elements in the chain of events leading up to an IED attack, determining how resources can be controlled in order to prevent the construction of IEDs, new analytical methods and data modeling to predict the ever-changing behavior of insurgents/terrorists, a deeper understanding of social divisions in societies, enhanced capabilities for persistent surveillance, and improved IED detection capabilities.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!