Plemmons, Paul R. Jr.2016-12-062016-12-062016-05https://hdl.handle.net/1794/2196743 PagesThe expanding use of the improvised explosive device (IED) around the globe requires Department of Defense (DoD) government and military organizational leaders and associated support staff to focus on achieving actionable intelligence aimed at successfully countering this enduring and evolving threat. This annotated bibliography focuses on literature published between 2012 and 2016 and discusses the use of decentralized legacy information technologies by the DoD and the impact on gathering, analyzing and sharing of critical IED exploitation data.en-USCreative Commons BY-NC-ND 4.0-USActionable intelligenceImprovised explosive device (IED)Counter-improvised explosive device (C-IED) operationsLegacy information systemsDepartment of Defense (DoD)ExploitationIntelligence dataAchieving Actionable Intelligence: Legacy Information Technology Systems and the Improvised Explosive Device Global ThreatTerminal Project