Subscribe free to our newsletters via your
. Space Industry and Business News .




THE STANS
Bomb analysis lab in Kabul hunts for killer clues
by Staff Writers
Kabul (AFP) July 07, 2013


In a discreet laboratory in Kabul, a French military officer scans a long list of telephone numbers scrolling down a computer screen. "This is the call that triggered the explosion," he says, pointing.

The French-run facility is the nerve-centre of NATO efforts to analyse and trace how thousands of homemade bombs made by insurgents are evolving and becoming more sophisticated.

The team of 15 forensic specialists puzzle over how the devices are designed and how to prevent them from being detonated -- clues that could also lead back to the rebel bomb-makers themselves.

The IED (improvised explosive device) came to widespread public attention during the Iraq war and has also become the signature guerrilla tactic in Afghanistan, where the Taliban and other insurgent groups have fought US-led forces since 2001.

The device typically uses old battlefield ordnance, explosives from mining or agricultural fertiliser, and is detonated by an electronic signal such a telephone call, a manual trigger line or a pressure plate.

Cheap, relatively-easy to make and adaptable, it is the militants' weapon of choice, killing US and Afghan soldiers, government officials, and civilians on a daily basis, often planted in dirt road tracks.

The Multi-National Theatre Exploitation Laboratory is located inside the Kabul airport military complex, a large highly-secure area that is a major base for NATO's International Security Assistance Force (ISAF).

Clean, calm and quiet, the laboratory is a far cry from the frontlines where the IEDs are picked up. The devices are investigated in small rooms containing computers, monitors, spectrum analysers and oscilloscopes measuring voltage.

It is here that electronic experts Adjutant Olivier, who gave only his first name in line with French military policy, says he makes hard drives, USB memory sticks, data cards and mobile phones "talk to him".

"You can retrieve calendar items, incoming and outgoing calls, contact lists, text messages, multi-media content and even erased images, videos and files," he said enthusiastically.

He also tracks the frequencies used to detonate IEDs remotely -- a life-or-death calculation as it allows signal jammers to be set correctly and prevent bombs being triggered near ISAF vehicles.

Although the lab specialists employ the latest hi-tech equipment to fight against the IED threat, they face a difficult challenge, with the insurgents constantly re-inventing their fatal designs.

"They adapt, they are clever, they manage to combine techniques. And on the Internet, you will find many of the plans," said the adjutant.

One recent graphic example shows the rebels' ability to come up with deadly new ideas.

"In late February, an American soldier saw an American radio placed on the road," said Lieutenant Colonel Charles, head of the centre.

"The soldier recovered the radio, put it in his vehicle and a few seconds later it exploded, leaving many dead."

With materials for making IEDs freely available, their use is hard to counter.

The devices were responsible for 60 percent of ISAF fatalities in 2009, though the figure fell to 42 percent last year.

"You only need two components -- an oxidizer and a fuel, such as gasoline or motor oil. It is very easy to do," said Captain Julian, a military chemist working in the laboratory.

"This is ammonium nitrate gel," said the captain, pointing to a bottle containing a white jelly recovered after an attack in Kabul.

"It is normally used in quarries instead of dynamite. Everyone knows where it comes from, exactly which company in Pakistan," he said about the substance, which was banned by President Hamid Karzai to try to thwart bomb production.

"But on the border with Pakistan (where the Taliban have bases) the controls are very difficult to enforce."

IEDs come in all shapes and sizes, using plastic water jugs, steel cookers and pipes, and are placed on roads, footpaths and in trees.

Bigger attacks are designed to rip apart even US armoured trucks, while "daisy-chain" links are often used to attack convoys so that one explosion triggers a series of follow-up blasts.

The laboratory in Kabul tries to gather information on the identity of the bomb-makers by carefully gathering fingerprints and DNA traces.

The analysts can even lift prints off tape wrapped around a pressure plate by the insurgents.

The tape is placed in a sealed tank in which glue is heated up until it becomes a vapour. This reacts with residue from fingerprints to make them visible, and they can then be sent to a US forensic centre for checking.

With most of the NATO force about to depart Afghanistan next year, the future of IED analysis is uncertain, but Charles said that the laboratory had proved its worth many times over.

"It has enabled the arrest of... several hundred insurgents," he said. "And kept us up-to-date with new threats."

.


Related Links
News From Across The Stans






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








THE STANS
China Xinjiang security tight on riot anniversary
Beijing, China (AFP) July 05, 2013
Chinese authorities imposed tight control in the capital of Xinjiang on Friday, the fourth anniversary of ethnic rioting which killed around 200 people, said state media, exile groups and ordinary citizens. Internet users posted pictures of baton-wielding security personnel in Urumqi, a city of more than two million people and the scene of clashes in 2009 between mostly Muslim Uighurs and me ... read more


THE STANS
BBC announces decision to halt 3D television programming

Making hydrogenation greener

Inmarsat's First Fully Assembled Global Xpress Satellite Achieves Significant Testing Milestone

The quantum secret to alcohol reactions in space

THE STANS
Canada links up on secure U.S. military telecoms network

Lockheed Martin-Built MUOS Satellite Encapsulated In Launch Vehicle Payload Fairing

Northrop Grumman, MILSATCOM Conduct Preliminary Design Review of Enhanced Polar System Control and Planning Segment

Mutualink Unveils Man-Portable Multimedia Interoperable Ops Fusion Kit with Secure Tactical 4G LTE Bubble Capability

THE STANS
ISRO plans string of satellite launches, including silver jubilee flight of PSLV-C25

Russian Proton M Rocket Explodes Just After Blast Off

Arianespace takes delivery of its next Ariane 5 at the Spaceport

SpaceX Will Launch Turkmenistan Satellite For Thales Alenia Space

THE STANS
India launches satellite for new navigation system

Beidou's second trial held in Yangtze Delta

The next batch of Galileo satellites

Raytheon's latest air traffic management systems go into continuous operation

THE STANS
China anxiously awaits updates after Asiana jet crash

Canada, China to boost air links as accord reached

Two killed as chopper crashes at Libya airshow

Investigators stand by TWA explosion theory

THE STANS
Solving electron transfer

Microscopy technique could help computer industry develop 3-D components

New low-cost, transparent electrodes

Taiwan's TSMC gets orders from Apple: report

THE STANS
Long-lived oceanography satellite decommissioned after equipment fails

Images From New Space Station Camera Help U.S. Neighbor to the North

Astrium's Cloud Services will support Western Australia Lands Department

Five Years of Stereo Imaging for NASA's TWINS

THE STANS
China hit by largest-ever algae bloom

Thousands of fish die in contaminated Mexico reservoir

Singapore's clean image sullied by Indonesian smog

China and haze to dominate Asia security meeting




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement