Monday, July 26, 2010



NZ in the Afghan warlogs

In case you're curious, this is what shows up about NZ in the Afghan warlogs:

  • 19/05/2005: "TF Thunder submits Medevac request from the Bamian PRT (42STC7410131926) 83K N of FB Anaconda. The PT is a New Zealand soldier with Gastro Enteritis"
  • 24/05/2005: "TF Thunder reports cache IVO Bamian PRT... EOD confirmed the munitions and all items were taken back to New Zealand PRT Bamian for disposal"
  • 25/01/2007: "Wind Power contractor and expert arrive in Panjshir: CPT Chris Nuckols (Minnesota National Guard) currently serving as an ANA trainer, but a wind power engineer in his civilian job, again arrived in Panjshir. With him was Tony Woods, a wind power contractor from New Zealand."
  • 25/01/2007: NZ LtCol Fotheringham at UNAMA meeting in Kabul with US commanders.
  • 27/01/2007: Wind testing station mentioned on 25/01/2007 (an anemometer mast, from the sound of it) completed. "The New Zealand company, Empower Consultants Limited, finished the work this morning."
  • 19/02/2007: "During a meeting with the ANP [Afghan National Police] , New Zealand forces were given two VO ["Victim Operated"] IEDs... New Zealand personnel reverse engineered one of the devices."
  • 12/03/2007: News report: New Zealand extends Afghanistan deployment to Sept 2008
  • 18/09/2007: Visit by ISAF commanders to Bamiyan. "Party arrived at the New Zealand PRT and was met by the Kiwis with their traditional Powhiri greeting. After the greeting concluded, COMISAF presented the NATO ISAF medals to the New Zealand PRT members. The New Zealand PRT Commander provided COMISAF with a their mission brief and discussed challenges the New Zealand team faced and what issues they weren't prepared to deal with."
  • 22/09/2007: News report on "Bamyan Peace Day" related to previous meeting.
  • 13/10/2007: "TF Helmand reported insurgents engaged with indirect fire at 41S PR 3212 6694, 20.0km southwest of FOB ANP Hill in Now Zad district, Helmand province. Friendly forces requested close air support and attack helicopter. Friendly forces convoy was moving but was last reported static due to vehicle breakdown. At 1320Z Reports indicate insurgents have 82mm mortar in place and all forces are in heightened alert. At 1348Z, F15 can see approximately 30 pax (possible Taliban) moving northwest from Thala. The intention is to fly over pax for a show of force. At 1404Z convoy has now linked up with force protection from New Zealand at 82N."
  • 30/03/2008: report on NZ convoy hit by IED
  • 11/04/2008: NZ soldier medevaced after being backed over by a patrol vehicle at the firing range. The soldier was eventually sent on to Germany with a broken leg.
  • 7/10/2008: report on NZ convoy hit by IED. Interesting that some of those Toyotas have anti-IED ECM on them.
  • 16/10/2008: Report of bicycle bombing in Bamiyan City.
  • 13/05/2009: NZ forces find cache of weapons.
  • 7/11/2008: NZ forces find cache of weapons.
  • 29/11/2008: Afghan forces hit by IED. "NZPRT deployed to site to investigate and discovered a secondary IED (initially reported as 2x landmines). NZPRT EOD TM [bomb disposal unit] is en route to site. No casualties or damage reported."
  • 20/01/2009: NZ soldier medevaced for suspected Appendicitis.
  • 30/04/2009: NZ forces find cache of weapons. Detailed list of weapons found.
  • 6/05/2009: NZ forces find cache of weapons.
  • 30/05/2009: "NEW ZEALAND PRT reports FF were dispatched to an IED site to investigate a Possible IEd. FF arricved on the site and started to search area and an IED detonated. Searching for signs of seconadary device ATT"
  • 20/10/2009: "A new Zealand C-130 on short final landing at KAIA recieved a missle warning indicator and deployed flares over Kabul. The A/C landed safely and no injuries or damaged occured. No missile was seen." This was Wayne Mapp's Hercules.
If you're wondering how to do this, the data is in a zipped csv file. Download it, import the first 64K records into Excel, and use the find function. Alternatively, you can just suck the whole thing into Notepad and grep it.