Counter-IED Report Spring-Summer 2023

Page 1

ISSN2050-6732(Print)

ISSN2050-6740(Online)

DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL: ASTUDYINTOTHECOGNITIVEPROCESSESUSEDBYPRACTITIONERS ISIMPLEMENTATIONOFWESTERNC-IEDENTERPRISESSUITABLE WHENPROVIDINGDONORC-IEDASSISTANCE?

ASTRATEGICPRINCIPLESAPPROACHTOREGIONALC-IEDENTERPRISES DEVELOPMENTFROMIMPROVISEDHOMEMADETOMASSMARKET CONSUMERELECTRONICSCOMPONENTSINIEDs

AIRBORNEMAGNETICS-AVIABLETOOLFORDETECTIONANDQUALITYCONTROL NEXT-GENERATIONDEMININGWITHAIANDDRONES

UNATTENDEDPACKAGES–THESECURITYOFFICER’SDILEMMA PIRSENSORSINIEDs USINGCONSTANTPOTENTIALGENERATORS

INDIA–THEIEDCHALLENGES

“DONBASSWILAYAT”ORHOWTOPLAYWITHJIHADISMINUKRAINIANLANDS

Counter-IEDReport Spring/Summer2023

REPORTCONTRIBUTORS MEDIAPARTNERS

Theopinionsandviewsexpressedintheeditorialcontentinthisreportare thoseoftheauthorsaloneanddonotnecessarilyrepresenttheviewsofany organisationwithwhichtheymaybeassociated.Materialinadvertisements andpromotionalfeaturesmaybeconsideredtorepresenttheviewsofthe advertisersandpromoters.Theviewsandopinionsexpressedinthisreport donotnecessarilyexpresstheviewsofthepublisher.Whileeverycarehas beentakeninthepreparationofthereport,thepublisherisnotresponsible forsuchopinionsandviewsorforanyinaccuraciesinthearticles.

©2023.Theentirecontentsofthispublicationareprotectedbycopyright. Fulldetailsareavailablefromthepublisher.Allrightsreserved.Nopartofthis publicationmaybereproduced,storedinaretrievalsystemortransmittedin anyformorbyanymeans,electronic,mechanicalphotocopying,recording orotherwise,withoutthepriorpermissionofthecopyrightowner.

3 counteriedreport.com
Counter-IEDReport PublishedbyDeltaBusinessMediaLimited 3rdfoor,207RegentStreet London,W1B3HH UnitedKingdom Tel:+44(0)2071932303
www.counteriedreport.com
info@deltabusinessmedia.com
ISSN2050-6732(Print) ISSN2050-6740(Online)

CONTENTS

CONTENTS

IFCNATOEODDEMONSTRATIONSANDTRIALS2023

5ICORTECHNOLOGY

7GARRETTMETALDETECTORS

8SAFEPROGROUPINC.

83DX-RAYLTD

9FOREWORD

ByRobHyde-Bales,ConsultingEditor,Counter-IEDReport

11TELEDYNEICM

13DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL:

ASTUDYINTOTHECOGNITIVEPROCESSESUSEDBYPRACTITIONERS

ByEdwinA.Bundy,Ph.D.inF.S.,Ph.D.inEd,CIPBI ProgramManager(GS-15),EOD/EXOSubgroup, IrregularWarfareTechnicalSupportDirectorate

23ISIMPLEMENTATIONOFWESTERNC-IEDENTERPRISESSUITABLE WHENPROVIDINGDONORC-IEDASSISTANCE?

ByPaulAmoroso,anexplosivehazardsspecialist

atAssessedMitigationOptions(AMO)consultancy

30DEFENSE&SECURITY2023

31ASTRATEGICPRINCIPLESAPPROACHTOREGIONALC-IEDENTERPRISES

ByPaulAmoroso,anexplosivehazardsspecialist

atAssessedMitigationOptions(AMO)consultancy

4 COUNTER-IEDREPORT,Spring/Summer2023

SMART, STRONG, AFFORDABLE OUR LATEST CUTTING-EDGE ROBOT!

ADVANCE CAPABILITIES INCLUDE:

• Crystal-clear image transmission through IP Mesh COFDM radios

• Convenient pre-set positions for easy operation

• Real-time 3D Avatar positioning for enhance accuracy

• Integrated LIDAR and precise crosshairs targeting

• User-friendly touchscreen CCU interface for intuitive control

• Fine-tuned controls for maximum precision

• Choice of control style: gamepad or joystick

DISCOVER THE FUTURE OF ROBOTICS WITH OUR MOST ADVANCED CALIBER® YET !

CHECK OUT OTHER

CONTINUING THE LEGACY OF SAFETY AND RELIABILITY !

With new management and ownership, Proparms Limited has refreshed its product line with innovative equipment. Maintaining its position as the primary supplier of waterjet distrupters and de-armers globally for over 45 years, Proparms is serving EOD/IED operators in over 80 countries.

Experience the unmatched safety & reliability, ease of use, and swift deployment capability to render safe threats of any size.

CALIBER® MK4 MINI-CALIBER® MK3 CALIBER® CALIBER® T5
CALIBER® ROBOTS
Tel:+1.450.658.5207 | info@proparms.com | proparms.com Tel:+1.450.658.5207 | info@proparms.com | proparms.com

CONTENTS

38DEVELOPMENTFROMIMPROVISEDHOMEMADETOMASSMARKET

CONSUMERELECTRONICSCOMPONENTSINIEDs

BySerkanKoc,Major(OF-3)TUR-A,ElectronicWarfareSpecialist,NATOC-IEDCoE

47 AIRBORNEMAGNETICS-AVIABLETOOLFORDETECTIONANDQUALITYCONTROL

ByDipl.-Ing.WolfgangSuß,ManagingDirector,SENSYS

54NEXT-GENERATIONDEMININGWITHAIANDDRONES

ADVANCEDSOFTWAREALGORITHMSPOWERNEXT-GENSOLUTIONS

FORAUTOMATINGTHREATDETECTIONANDIDENTIFICATION BySafeProAI(aSafeProGroupInc.Company)

58EDEX2023

59UNATTENDEDPACKAGES–THESECURITYOFFICER’SDILEMMA

ByVincentDeery,CEO,3DX-RayLtd

62IDEF2023

63PIRSENSORSINIEDs USINGCONSTANTPOTENTIALGENERATORS

ByTeledyneICM

68INDIA–THEIEDCHALLENGES

ByColonelHRNaiduGade–IndianArmyVeteran

76“DONBASSWILAYAT”ORHOWTOPLAYWITHJIHADISMINUKRAINIANLANDS

ByLieutenantColonelJoseMRufas,ChiefofAttacktheNetworksBranch, C-IEDCentreofExcellence

IBCMILIPOLPARIS2023

OBCSCANNAMSC

6 COUNTER-IEDREPORT,Spring/Summer2023
CONTENTS

Optimum Detection

Your quest is our mission Advance technology

and highly versatile

Garrett’s AML (All Metals Locator) detector is trusted in many countries for mines, UXO, and IED searches. Low metal content targets to large metallic items are detected in ALL soils and shallow water with full detection capability.

Uncover the Unseen™
Next-GenDemining, EOD/UXO,Ballistics ServingtheneedsofGovernment, MilitaryandHumanitarianCustomers forOveraDecade PROTECTINGTHOSEWHOPROTECTUSALL AMORPHOUS SILICON PORTABLE X-RAY SYSTEM For more infomation call +44 (0) 1509 817400 or visit www.3dx-ray.com Fully integrated amorphous silicon system c/w 150kV generator High penetration with sub-millimetre resolution Powerful image enhancement and analysis tools (ISC)

FOREWORD

Theearlypartofthisyearhasbeendominatedby thecontinuingarmedconfictinUkrainewhich startedin2014andledtothefull-scaleRussian invasioninFebruary2022.

Aswithmostarmedconficts,thewarinUkraineis leavingbehindanever-growinglegacyofunexploded landmines,operationallyfunctionalImprovised ExplosiveDevices(IEDs)andotherExplosive RemnantsofWar(ERW).Anestimated174,000 squarekilometresofUkrainianterritoryarecontaminatedbylandmines–bothanti-tankandantipersonnel1 –thelatterincontraventionoftheOttawa Treaty1997banningtheuseofanti-personnelmines. ThecontaminatedareaislargerthanEngland, NorthernIrelandandWalescombinedandrepresents amassiveclearancetaskasandwhentheoperational environmentpermitssuchclearance.

Accordingtoajointassessmentreleasedon23 March2023bytheGovernmentofUkraine,theWorld BankGroup,theEuropeanCommission,andtheUnited Nations,Ukraineneeds$37.4billiontocarryout humanitariandeminingofitslands.Thissumincludes morethan$397millionneededjustfortheyear2023.2

Intermsofglobaldeminingeffortstherearesome positivenews.AccordingtoareportbytheCambodian MineActionandVictimAssistanceAuthority(CMAA), thefrstfourmonthsofthisyearsawa65percent decreaseinnumberofvictimscomparedtothesame periodlastyear.3

InYemen,thefragiletrucebetweenwarringparties bringssomepositivedevelopmentsandhopeforthe countryaftermorethaneightyearsofwar.Yemen alongsideIraq,Afghanistan,Cambodia,Bosnia& HerzegovinaandCroatia,tonameafew,isoneofthe mostLandmineandExplosiveOrdnance(EO) contaminatedcountries,makingmanyresidential neighbourhoodsuninhabitableanddangerous.

InAfghanistan,heavyERWlandcontamination spanningfordecadesbacktotheSovietinvasion posesadditionalchallengestothefarmersandrural communitiesdevastatedbyfoodshortagesand insecurity.AccordingtotheUnitedNationsOffcefor theCoordinationofHumanitarianAffairs(OCHA)some $18.3millionisneededyearlyforsurvey,explosive ordnancedisposal,andlandmine/ERWclearance inAfghanistan.4

1 https://www.hrw.org/news/2023/01/31/ukraine-banned-landmines-harm-civilians

2 https://documents1.worldbank.org/curated/en/099184503212328877/pdf/P1801740d1177f03c0ab180057556615497.pdf

3 https://phnompenhpost.com/national/cmaa-mine-victims-down-65-cent

4 https://twitter.com/OCHAAfg/status/1630094885112934407

FOREWORD
9 counteriedreport.com
ByRobHyde-Bales,ConsultingEditor,Counter-IEDReport

Theviolencecausedbyimprovisedexplosive devices(IEDs)continuesaroundtheworld.Oneofthe deadliestattacksthisyeartookplaceon30January 2023whenasuicidebomberdetonatedhisvest atthePeshawarPoliceLinesmosqueinPakistan, asnumerousworshippers,includingmanylocal policemen,wereprayinginside.Atleast100people werekilledintheblastand225wereinjured.

Theuseofcarbombingsasapreferredmethod ofattacktargetinggovernmentoffcials,securityforces, lawenforcementoffcersandjournalistsisnotedin Somalia,Kenya,Nigeria,Niger,Cameroon,Burkina Faso,Mali,Iraq,Syria,India,Pakistan,Afghanistan, Cyprus,Myanmar,RussiaandRussian-occupied territoriesofUkraine.

Inamostthought-provokingarticle, Dr.EdwinA. Bundy,a SeniorProgramManagerfortheU.S. DepartmentofDefenseattheIrregularWarfare TechnicalSupportDirectorate(IWTSD), discusses decision-makingandproblem-solvinginbombdisposal anddescribesarecentstudyundertakenintothe cognitiveprocessesusedbybombdisposal practitioners.Inearly2022datawascollectedfrom currentandformerEODpractitionersin17countriesin ordertoinvestigatecognitiveapproachesusedin problem-solvinganddecision-making.Thestudyused IEDsasthecatalysttostimulatecognitiveprocessesin studyparticipants.Theparticipantshadbetween1and 35yearsofexperienceandwidelydifferingeducation levels.Forthestudy,participantshadaccesstoan onlinesitecomprising18scenarios,eachconsistingof twoorthreeimagesofapotentialIEDcircuit,checklists oflabelstoidentifycomponentsofthecircuit,potential hazardstheyconsideredassociatedwiththecircuit,and thecircuit’stype-by-function.Thescenariosrangedfrom veryeasytoverydiffcult.Participantswerealsoasked toidentifyfactorsorfeaturesregardingthecircuitsthat drovetheirdecisionmakingandfnallytoratetheir confdencelevelsineachscenariointermsofcircuit components,potentialhazards,andtype-by-function. Datafromthestudyparticipantssuggestthattheyused pattern-matchingorheuristicstoreach90%oftheir decisions.Incontrast,thestudyfoundthatlessthan 6%ofdecision-makingistheresultofamore

deliberateandanalyticalprocess.Theauthoropines thattheresultsofthisstudyhavesomeveryserious implications,nottheleastofwhichisforhowbomb techniciansaretrained.Whilemostdecisionsmade duringanaverageday,inanyoccupationoractivity, arebasedonlearned,repetitivebehaviours,or whatcognitivescientistscallheuristics,innewor criticalsituations,relyingonheuristicscanfail catastrophically.Thecommunityowesittobomb technicianstoprovidebettertoolsandtrainingin thecognitivedomain.Notonlywillthisimprove survivability,butitwillallowourpractitionersto keeppacewithadversaries,whoaremorelikelythan ever,tousenot-yet-seencomponentsandcircuitsin theirdevices.

Inhisinformativearticleonthetransitionfromhomemadetomassproduced,commercialoff-the-shelf (COTS)electroniccomponentsintheproductionof IEDs,MajorSerkanKoç oftheTurkishArmyand currentlyservingastheEWSpecialistat theNATOCounter-IEDCentreofExcellenceexamines theimpactofthistransitionbothontheproducersof IEDsandIEDDspecialists.Hepointsoutthatthemass productionofthesecomponentshasresultedintheir ever-increasingavailabilitytogetherwithfallingprices. Inparticular,theproliferationofRadioControlledIEDs (RCIEDs)haspresentedalowcost,highlyfexibleand unpredictablethreattotheC-IEDworld.Accordingto INTERPOL,internationalorganisedcrimeisamajor componentinthehighlylucrativetradeincounterfeit goods–includingcounterfeitelectroniccomponents, manyofwhicharecomponentsofRCIEDs,toinclude transformers,relays,timers,fusesandwiring accessories.Therearestronglinksbetweenthistrade andillegalnarcotics,moneylaunderingandgeneral systemicglobalcorruption.IntheCounter-IED campaignboththeAttacktheNetworksandDefeatthe Devicepillarsofthecampaignareusedextensivelyto combattheubiquitousthreatofRCIEDs.COTS electronicdevicesenablegreateruseofthecontested electromagneticenvironment–ofparticularuseinthe RCIEDfeld.Theyalsomakeitmorediffculttoidentify theelectronicsignatureofanIEDmanufacturer.There isnodoubtthattheomnipresentRCIEDstogetherwith

FOREWORD 10 COUNTER-IEDREPORT,Spring/Summer2023

thevictimoperatedpressureplatesub-surfaceIEDs continuetocreatemajorchallengestoboththegeneral publicandtheCounter-IEDoperativesinbothcurrent andformerwarzonesandotherhostileenvironments.

Inhisthought-provokingarticleonthesuitabilityand effectivenessofWesternCounter-IEDenterprises whenprovidingdonorC-IEDassistance,PaulAmoroso ofAssessedMitigationOptionsexaminesthe challengesandpotentialpitfallsinherentinsuch assistance.Heusestheterm “Counter-IEDenterprise”asa collectivetermtodescribeallaspects ofC-IEDactivitiesdesignedand intendedtomatchandideally overmatchtheuseorthreateneduse ofIEDs.Heopinesthat,giventhe transnationalnatureoftheIEDthreat today,regionallycoherentC-IED responsesarerequired,basedon strategicapproaches.Heexamines theneedforregionalC-IED enterprisesastodate,insomecases theeffortsofWesternC-IEDdonor enterpriseshavebeendisjointed, lackingincoordination,and cooperationandoftenresultingin duplicationofeffort.Aspartofhis research,heidentifedC-IED strategicprinciplesforEastAfrica.He examinesregionalandglobalC-IED effortsincludingthoseoftheUNand AfricanUnion.Hefurtherhighlights responsesfromtheUS,NATO,the UKandAfghanistan.TheC-IED experienceoftheUKwashoned duringtheso-called“Troubles”in NorthernIrelandfrom1969onwards, whenthesecurityforcesinboth NorthernIrelandandmainlandUK facedthemostskilfulbombmakersin theworldatthattime.Hehighlights Afghanistanasonenationbeyond WesternC-IEDeffortsthathasa nationalC-IEDstrategy,dueinlarge

measuretothepresenceofNATOforcesfghtingthe Taliban2004-2014.Heconcludesthattodevelopan effectiveC-IEDstrategy,strategicprinciplesare requiredtoachieverequisiteimpactsandoutcomes whenprovidingC-IEDdonorassistance.

Dipl.-Ing.WolfgangSüß,istheManagingDirectorof SENSYS,aGermancompanybasedeastofBerlin, whichmanufacturesmagnetometersandtimedomain electromagnetics.Inhisinformativearticlehe

→ Up and running in less than 90 seconds

→ Lightweight (less than 6.5 kg/14 lbs)

→ Wireless or cable driven

→ High quality imaging

→ Radiation shielding

→ Telescopic arm (up to 65 cm/26 in) www.teledyneicm.com

FOREWORD 11 counteriedreport.com REAL-TIME X-RAY INSPECTION GO-SCAN
C-VIEW
THE PARTNER TO YOUR SECURITY INSPECTION

describeshowCOTSdronescombinedwithadditional computingpowerandmagnetometersarebeingused inthefeldforUXOdetection,areaobservationand qualitycontrol.SENSYSfocusonFluxgate Magnetometers–passivesensorsthatmeasurethe Earth’smagneticfeld.Ferrousobjectssuchas landminesdistorttheEarth’smagneticfuxlinesand thisisdetectedbythemagnetometersasanomaliesin theEarth’smagneticfeld.Thedetectionsystem describedinthearticlecomprisestheSENSYS MagDroneR4Datalogger,fveSENSYSFluxgate sensors,combinedwiththeLatvianproduced SkyHubTrueTerrainFollowingsystemallmountedon aCOTSDJIM300commercialdrone.This enablesthe droneinanautonomousterrainfollowingmode,ideally ataheightbetween0.5and1meteronapreprogrammedfightpatterntocoverupto30hectaresin asingleday.Hedescribestwoprojectsusingthis system.Thefrstisonafringrangeordnanceimpact areawhichwasusedfrstbytheSovietarmedforcesin theerstwhileDDR,andsubsequentlybytheGerman Bundeswehr.Theotherprojectisthesurveyofaformer GermanWorldWarTwoairfeldconstructedbyforced labourtowardstheendofthewar.Inbothoperationsthe SENSYSdronemountedsurveillancesystemhas provedtobehighlyeffective.Ithasalsobeenused elsewhereinGermanyandinUkraine.SENSYSisnow turningitsattentiontothechallengeoflocatingnonferrousERW.

InhishighlytopicalarticleVincentDeery,CEOof 3DX-RayLtdexaminesthesecurityissuesassociated withunattendedpackages.Hebeginswithanoverview oftheglobalsecuritysituationtodayandnotesthat therewasawelcomereductioninbothdeathsand incidentsresultingfromterroristattacksfrom2021to 2022.However,ofthetoptenmostlethalattacks,six involvedIEDstodevastatingeffect,illustratingthat explosivesremainafavouredmethodofattackby terrorists.InEuropefor2021,themajorityofreported terroristattackswereclassifedasjihadistterrorism withacontinuingintenttousebothIEDsandIIDsas weaponsofattack.Hethendescribestheproblemof anorganisation’ssecurityoffcerwhenconfrontedby anunattendedpackage.Iftheoriginofthepackage

cannotbeidentifed,thenthesecurityoffcerneedsto identifythecontentsofthepackage.Ifthiscannotbe donevisually,thedilemmaisthenwhethertoescalate toafull-scalebombthreatincidentnecessitatingthe evacuationofanareaortakereasonablestepsto identifythecontentsofthepackage.Thesurest methodofsuchidentifcationisbymeansofaportable x-rayscanner.SuchascannerallowstheEOD operatortoexaminethecontentsofthepackage withouttouchingordisturbingit.3DX-Rayoffersa comprehensiverangeofportablescanningsystems. Themostsignifcanttechnicaldevelopmentinx-ray scanningsystemshasbeentheintroductionofcolour differentiatedscanswhichenabletheoperatorto accuratelyidentifythecontentsofthepackage.The 3DX-Raysuiteofscannersutilisesthreecolourscan systems,whereasmostotherscannersusejusttwo, thusreducingtheaccuracyofpackagecontents identifcation.Astheauthorpointsout,allsecurity offcersshouldconsidertheacquisitionofaportable x-rayscanner,butseeingcontentsinjustblackand whiteisnolongergoodenough. ■

RobHyde-Balesbiography

DuringhiscareerintheUKRoyal Engineers, RobHyde-Bales was responsibleforlandmineclearancein Libyaand,morelatterly,Afghanistan intherunningofthefrstUnited Nationshumanitarianlandmine clearancetrainingprogramme–OperationSalam.TheprogrammetrainedAfghanmale refugeesinlandmineclearancetechniques,andAfghan womenandchildreninmineawarenessandavoidance training.MorerecentlyhesetuptheCaribbeanSearch CentreinKingston,Jamaica.TheCentreisdesignedto trainsecurityforcesacrosstheCaribbeaninmodern searchtechniques.Afterretiringfromthearmyhejoined CranfeldUniversityatShrivenham,nearOxford,and undertookaresearchprojectonbehalfoftheUK MinistryofDefencethatexaminedwaystoimprovethe sharingofIEDthreatinformationbetweenthemilitary andcivilianorganisationsinhazardousareas.

FOREWORD 12 COUNTER-IEDREPORT,Spring/Summer2023

DECISION-MAKINGANDPROBLEM-SOLVING INBOMBDISPOSAL:

ASTUDYINTOTHECOGNITIVEPROCESSESUSEDBYPRACTITIONERS

ByEdwinA.Bundy,Ph.D.inF.S.,Ph.D.inEd,CIPBI ProgramManager(GS-15),EOD/EXOSubgroup,IrregularWarfareTechnicalSupportDirectorate

INTRODUCTIONTOTHESTUDY

Inearly2022,datawascollectedfromcurrentand formermilitaryandpublicsafetybombtechniciansfrom 17countries,toinvestigatecognitiveapproachesused inthiscommunityforproblem-solvinganddecision making.Thestudyusedimprovisedexplosivedevices (IEDs)asthecatalysttostimulatecognitiveprocesses instudyparticipantsrelatedtodecision-makingand problem-solving,andvariousdemographicfactors wereexaminedtodetermineifvariablescouldbe identifedthatmadesomebombtechniciansbetterat performingthesecognitivefunctionsthanothers. Studyparticipantshadfrom1to35yearsof experience,andeducationlevelsrangedfromthe equivalentofahigh-schooleducation,toseveral participantswithaPh.D.Additionally,information relatedtofactorslikelengthofinitialbombdisposal training,andanyspecializedIEDelectronicstraining, wascaptured,aswellasformalelectronicstraining (i.e.,atechnicaloracademicdegreeinelectronics), andwhetherornotastudyparticipantwasanIED electronicstrainerforotherbombtechnicians.

Afterapplyingtobeconsideredforthestudy,a processthatwasusedtoverifythatapplicantswerein factcurrentorformerbombtechnicians,participants weregivenaccesstoanonlinesiteconsistingof18 scenarios(seeFigure1),witheachscenarioconsisting oftwotothreeimagesofapotentialIEDcircuit,and

checklistsoflabelstoidentifycomponentsinthecircuit; anyhazardstheyfeltwereassociatedwiththecircuit; andthecircuit’stype-by-function.Allcomponentsforthe circuitwerevisible(i.e.,nohiddencomponents),andifa nomenclaturewasstampedinto,orsilkscreenedontoa component,atleastoneoftheimagesincludedensured thatthesemarkingswereclearlyvisible.

DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL
13 counteriedreport.com

Forhazardsandcircuittype-by-function,participants werealsoaskedtofllinafree-textfeldidentifyingthe factorsorfeaturesregardingthecircuitthatdrovetheir decision-making.Participantscouldalsosuggest additionalcomponents,hazards,andcircuittypes-byfunctioniftheyfeltanywereinadvertentlyleftoutofthe relevantchecklists.Finally,studyparticipantswere alsoaskedtoratetheirownconfdencelevels regardingdecisionsmadeforeachcategory(i.e., components,associatedhazards,andcircuittype-byfunction).Qualitatively,thishelpedinunderstandingif thosewithmoretrainingorexperienceweremore confdentintheirdecision-makingcapabilitiesthan thosewithlesstrainingandexperience,andthe degreetowhichthatwaswarranted.

Inadditiontotheprincipalinvestigatorbeingan experiencedresearcherandaformerU.S.Army ExplosiveOrdnanceDisposal(EOD)technician, standardchecksandbalanceswereusedforthisstudy. Aswithallhumansubjectsresearch,approvalwas soughtandgrantedbyanInstitutionalReviewBoard, andoversightwasconductedbyanacademicreview committeeconsistingofDr.JohnFrucci,aformerbomb

squadcommanderandExecutiveDirectoroftheSchool ofForensicSciencesatOklahomaStateUniversity;Dr. KirkYeager,ChiefExplosivesScientistfortheU.S. FederalBureauofInvestigations;Dr.CJCowlin,a formerU.S.NavyEODtechnicianandcurrentDirectorat LargeforBombTechsWithoutBorders;andDr.Jason Beaman,ChairofPsychiatryandBehavioralSciencesat OklahomaStateUniversityCenterforHealthSciences.

Thecontentforthisstudywasvettedthroughuseof anexpertpanel.Thispanelconsistedofsubjectmatter experts(SMEs)inthefeldsofbombdisposalandIED electronics,andselectedbasedondepthandbreadth ofknowledgeandexperience.Thepanelconsistedof ChiefSuperintendent(Ret)MichaelCardash,Israel NationalPoliceBombDisposalDivision;Lt.Col,Adam Modd,NewZealandSpecialAirService;SpecialAgent BombTechnician(Ret)RobertvonLoewenfeldt,South CarolinaLawEnforcementDivision;SergeantRobert Epps,BombSquadCommander,RiversideCounty CaliforniaSheriffDepartment;Mr.JaredFrench,aU.S. DoDTacticalBombTechnician;andMr.RickHayworth, aForensicExaminerandTechnicalLeadforthe TechnicalExploitationUnitattheFBI’sTerrorist

DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL 14 COUNTER-IEDREPORT,Spring/Summer2023
Figure1:StudycircuitsanddegreeofdiffcultyasratedbytheExpertPanel.

ExplosiveDeviceAnalyticalCenter(TEDAC).

Mr.Hayworthwastheonlynon-bombtechnicianin thegroup,butisaninternationallyrecognizedIED electronicsexpert,andholdsanadvanceddegreein ElectronicsEngineering.

Becausethestudywasconductedusingawebbasedplatform,thestudywasnaturallylimitedto participantswhohadaccesstotheinternet,and becausethedatacollectioninstrumentwaswrittenin English,itwasalsoassumedthatparticipantshada technicalunderstandingoftheEnglishlanguage.One ofthefnalassumptionswasthatbecausethiswasa voluntarystudy,andparticipantswereself-selected, thattheywerelikelytohaveaninterestinIED electronics,andthereforetheresultsofthisstudy couldpotentiallybeskewedinthedirectionofhigher successratesforcomponentidentifcation,hazard assessment,andcircuittypes-by-functiondetermination.

FINDINGS

Itshouldbenotedbythereader,thatthesefndings shouldnotbeinterpretedeitherdirectlyorindirectly,as thisauthor,theacademicreviewcommittee,ortheexpert panel,suggestingthatbombtechniciansarenothighly capable,orprofcientatthejobstheyaretrainedtodo. Thisstudysimplyfocusesonwhattypesofcognitive reasoningapproachesbombtechniciansuseindecision making,andlooksathoweffectivetheseapproachesare usedforproblemsolvingbybombtechniciansintheIED electronicsdomain.Furtherresearchneedstobe conductedtoseeifsimilarapproachesareusedby bombtechniciansinotherdomains,suchasx-ray interpretation,andifsimilarcorrelationsexist.

Thatsaid,theresultsofthestudywererathereyeopening.Datagatheredfromstudyparticipantssuggests thatoverall,bombtechniciansusepattern-matchingfor over90%oftheirdecision-making,ratherthanusinga truehypothetico-deductivereasoningprocess.Cognitive psychologistsclassifythisasSystem1thinking,whichis anintuitivemodeofthinking,soisconductedalmost effortlessly.Thissystemisresponsibleforspontaneous orimmediatereactionstostimuli,andisoftendrivenby pre-existingbiasesoranemotionalresponse.System1 thinkingreliesalmostexclusivelyonheuristics,ormental

shortcuts,andallowsdecisionmakingtooccurwithvery littleconsciouseffortorrefection.

Conversely,System2thinkingwasusedbystudy participantslessthan6%ofthetimewhileconducting theiranalyses.System2thinkingisamoredeliberate andanalyticalprocessthatrequiresgreaterlevelsof attentionandcognitiveeffort.Thissystemisinvolvedin complexproblem-solvingtasks,andischaracterizedby deliberate,effortfulcognitiveprocessing,andcan overrideautomaticresponsesgeneratedbySystem1 thinking,whichallowstheusertoconsideralternative pathsoroptionswhileinuse.

Together,System1andSystem2thinkingarereferred toasDual-Processtheory,anditiswidelybelievedthat thesetwosystemsoperateinparallel,interactingwith eachother,butsometimescompetingforcontrolover thoughtprocesses.Inthisstudyhowever,System1 thinkingwasclearlydominant,andsuggeststhatrather thanparticipantsconductingwhatmightbethoughtofas atrueanalysisofthecircuit,theykeyedinoncertain components,presumablythosetheyhadbeentaught duringtraining,orhadencounteredatsomeotherpoint intheircareer.Theythenbasedtheremainderoftheir decisionsonlyonthepresenceofthoseveryspecifc components,andregardlessofwhatothercomponents mighthavebeenpresent,someunquestionablymore dangeroustothebombtechnicianthantheones recognized,theseunrecognizedcomponentswerenot factoredintofurtherdecisionmaking.

Anexampleisprobablywarrantedhere.Acomponentcommonlyusedinbombdisposaltraining, whetherduringinitialorsustainmenttraining,isthe555 integratedcircuit(IC).Thiscircuitiseasilyrecognized bymostbomb technicians,and iscommonlyreferredtoasa

15 counteriedreport.com
DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL
“555-timer.”Ithas aratherdistinct appearance,in thatitissmall, black,andhas8 pins/legs(see Image1).
Image1:555IC.

Thisbecomesproblematicwhenbombtechnicians starttothinkthatanysmall,black,8-pinICisa555timer,andthereforebyextension,carriesthesame

associatedhazards,andalwayscreatesaspecifc circuittype-by-function.Assuggestedbydata collectedduringthestudy,ifacomponentwithsimilar physicalcharacteristicsisusedinacircuit,even thoughavisiblenomenclatureispresent,clearly indicatingotherwise(seeImage2),manystudy participantsdefaultedtoselectingthe555IC,and indicatedthatthecircuitwasforuseasa“Time”typeby-function,aswellascarryingatimehazard.Thisis problematic,notonlybecause555ICsarecapableof beingusedforfunctionsotherthantiming,butthere arenumerousothercomponentswithsimilarphysical characteristicsthatpresentmanyothertypesof potentialhazards.

Quantitatively,thestudyfoundthataverage successratesforstudyparticipantswereonly20%for componentidentifcation,16%forassociatedhazards, and51%forcircuittype-by-function.However,study participantsratedtheirconfdenceinmakingthese decisionsratherhigh(seeFigure2).Thiswould suggestthatbombtechniciansingeneral,signifcantly overratetheaccuracyoftheirowndecisions.

DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL 16 COUNTER-IEDREPORT,Spring/Summer2023
Image2:PIC12microcontroller. Figure2.Averageself-assessedconfdencelevels.

DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL

Figures3–5providestudyresultsbydependent variables.Thereaderwilllikelynotethataverage successratesarehigherforcircuitsthatarecommonly taughtduringbombdisposaltraining.Thisisinline withthequalitativefndingssuggestingthatbomb techniciansperformtheircircuitanalysesusing pattern-matchingratherthandeductivereasoning,as theyarelikelytohaveseenthecomponentsusedin thesecircuits,taughtthehazards,andthenexplained thecircuittype-by-function.Whilesomeofthecircuits receivinghighersuccessratesmaynotbetaught duringinitialbombdisposaltraining,areviewofthe curriculafrom“advanced”coursessuggestthatthey aretaughtthere.

Datafromthestudyalsosuggeststhatindependent variableslikeyearsofexperience,specializedtraining, orevenlengthofinitialtraining,hadnoeffectona bombtechnicianbeingabletosuccessfullyidentify thecomponentsinacircuit,knowwhathazardsthat circuitpresents,orinmakingadeterminationasto circuittype-by-function.Figures6-11identifyaverage successratesbyindependentvariables.

IMPLICATIONS

Theresultsofthisstudyhavesomeveryserious implications,nottheleastofwhichisforhowbomb techniciansaretrained.Whilemostdecisionsmade duringanaverageday,inanyoccupationor activity,arebasedonlearned,repetitivebehaviors,or whatcognitivescientistscallheuristics,innewor criticalsituations,relyingonheuristicscanfail catastrophically.Andeventhoughitisprobablynot lostonanyoneinbombdisposal,thattousepattern matchingtotrainanewbombtechnicianeffectivelyto quicklyandaccuratelyidentifyalloftheelectronic componentsorcircuitstheymightencounterduring theircareer,theywouldhavetobeshownliterally thousandsofdifferentcomponents.Thefactremains however,thatmostbombtechniciansaretrainedto relyalmostexclusivelyonheuristics,evenafteronly beingshownwhatamountstoahand-fullof componentsduringinitialtraining,ratherthanbeing taughttousedeductivereasoningfortheirprincipal decision-makingstrategy.Therearemanyreasonsfor thisofcourse,suchaslimitedresourcesandtraining

17 counteriedreport.com
Figure3.Averagesuccessratesforcomponentidentifcation.

DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL

18 COUNTER-IEDREPORT,Spring/Summer2023
Figure4.Averagesuccessratesforhazardanalysis. Figure5.Averagesuccessratesforcircuittype-by-functiondetermination.
DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL 19 counteriedreport.com
Figure6.Componentidentifcationsuccessratesbyaffliation,lengthofinitialtraining,andyearsofexperience. Figure7.Componentidentifcationsuccessratesbyself-assessedknowledgelevel,specializedandformaltraining, highesteducationlevel,andtrainerexperience.

DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL

Figure9.Hazardassessmentsuccessratesbyself-assessedknowledgelevel,specializedandformaltraining,highest educationlevel,andtrainerexperience.

20 COUNTER-IEDREPORT,Spring/Summer2023
Figure8.Hazardassessmentsuccessratesbyaffliation,lengthofinitialtraining,andyearsofexperience.
DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL 21 counteriedreport.com
Figure10.Circuittype-by-Functiondeterminationsuccessratesbyaffliation,lengthofinitialtraining,andyearsof experience. Figure11.Circuittype-by-Functiondeterminationsuccessratesbyself-assessedknowledgelevel,specializedandformal training,highesteducationlevel,andtrainerexperience.

time,aswellastryingtoinstillintraineesthe perceivedneedtoresolveanincidentandreturna scenetonormalcyasquicklyaspossible.Becauseof this,initialtraininggenerallyfocusesontool-use, ratherthancriticalthinkingandproblem-solving, whicharearguablysomeofthemostvaluable skillsabombtechnicianneedswhenfacedwith,and havingtomakedecisionsregardinganytypeof hazardousdevice.

Thisdataalsohasimplicationsforwhatwebelieve tobethetypesandvarietiesofIEDsusedglobally.If wefunctionundertheworkingpremisethatstatistics regardingdeviceuseisgatheredthroughbombdata centers,andbombdatacenterscollecttheirdatafrom reporting,whichisusuallydonebybombtechnicians, andbombtechniciansareonlyrecognizingthe componentsusedincircuits16%ofthetimeon average,orcircuittype-by-function51%ofthetime, howaccuratecoulddevicereportingpossiblybe?And byextension,howaccuratecouldinformation regardingdeviceconstructionpossiblybe,unlessit hasbeenanalyzedatanexploitationlabbyproperly trainedandqualifedforensicscientistsorexaminers?

Finally,theresultsofthisstudyhaveimplications fortheuseofbombtechniciansasexpertwitnesses. IntheU.S.,itisnotuncommonforbombtechnicians, particularlyattheStateandLocallevel,tobecalled onbyprosecutingattorneystoactasexpert witnessesregardingtheconstructionandfunctioning ofadevice,oreventhepotentialforpiecesandparts foundataresidencetobeusedtoconstructadevice. Again,thisbecomesproblematicwhenthetestimony callsforanythingbeyondrecognitionofthingsother thansimplecircuitsorcomponents.Ofcourse,thisis nottosuggestthatsomebombtechniciansarenot suffcientlyqualifedtoprovideexperttestimonyon deviceconstructionorfunctioning,butitwould behooveprosecutorstoensuretheirbombtechnician expertwitnessesdonotstraytoofarbeyondthe basicgeneralizedfunctioningofadevice,unlessof course,whattheyaretestifyingtohasbeenpeer reviewed,andconfrmedthroughvalidscientifc testing.ItisjustfartooeasyinthisageoffastfactcheckingandAIcapabilitieslikeChatGPT,toaccess

whatusedtobeconsideredarcaneknowledge,like thatofbombdisposal.

CONCLUSION

Bombtechniciansdoaseriesofnon-routinetasksthat requirementalandphysicaldexterity,complexcritical thinkingskills,andcreativeproblem-solving…and that’stheeasypartofthejob.Whilethesebravemen andwomenareexpertsintheuseoftoolstodefeat IEDs,thereseemstobealackoftrainingonthe generalcognitivereasoningskillsnecessaryto enhanceabombtechnician'sabilitytoconductactual problem-solving,whichinturncreatesdown-stream issueswithdecision-making.AsnotedbyLouis Pasteur,“Chancefavorsonlythepreparedmind,”so thecommunityowesittoourbombtechniciansto providebettertoolsandtraininginthecognitive domain.Notonlywillthisimprovesurvivability,butit willallowourpractitionerstokeeppacewith adversaries,whoaremorelikelythanever,tousenotyet-seencomponentsandcircuitsintheirdevices.■

ABOUTTHEAUTHOR

Dr.EdwinA.Bundy isaSenior ProgramManagerfortheU.S. DepartmentofDefenseatthe IrregularWarfareTechnicalSupport Directorate(IWTSD).Heoversees advancedtechnologydevelopment effortsrelatedtoExplosive OrdnanceDisposalandExplosives Operations(EOD/EXO)andprovidestechnologybasedsolutionsforcombatingterroristandcriminal useofexplosivestooperationalpersonnelworldwide.

Dr.BundyservesasafederalliaisontotheNational BombSquadCommandersAdvisoryBoard(NBSCAB) intheU.S.,andisanadvisorforboththeInternational AssociationofBombTechniciansandInvestigators (IABTI)andU.S.BombTechnicianAssociation(USBTA).

Dr.BundyisalsoaformerU.S.ArmyExplosive OrdnanceDisposal(EOD)Technician,andCertifed InternationalPost-BlastInvestigator(CIPBI).Dr.Bundy holdsPh.Ds.inbothForensicScienceandEducation.

22 COUNTER-IEDREPORT,Spring/Summer2023
DECISION-MAKINGANDPROBLEM-SOLVINGINBOMBDISPOSAL

ISIMPLEMENTATIONOFWESTERNC-IEDENTERPRISES SUITABLEWHENPROVIDINGDONORC-IEDASSISTANCE?

INTRODUCTION

Owingtothetransnationalnatureofthenetworks whichfacilitateIEDuse,regionallycoherentC-IED responsesaredeemednecessary.Strategic approachestosuchregionalC-IEDeffortsarerequired forthemtobeeffective.TheresultingC-IEDenterprise developedandimplementedoftenrequiresC-IED donorassistance1 totheIEDaffectedstateorregion. Intheabsenceofsuchstrategiccoherententerprises, theresultingassistancecanoftenbedisjointedand lessthanoptimal.AttimesC-IEDefforts2 havebeen oversimplistic,promotingsilverbulletsolutionswhich areoftentechnologyandequipmentintensive.At othertimesproposedapproachescanbe overambitious,involvingthereinventionofthewheel andlackingtheresourcestomaketheinitiativesa reality.Inmanycases,C-IEDeffortshaveinvolved attemptstoshoehornelementsofpreviouslyused Westerntemplatesintoactionwithinaspecifc operationalenvironment.Thisarticlewillexamine aspectsofWesternC-IEDenterprisesillustratingtheir complexitiesandhowtheirrealisationismore challengingtoachievethanmightotherwisebe considered.Forthepurposeofthisandseveralrelated articles,C-IEDenterpriseisthecollectivetermto describeallinitiatives,activities,assistance, capabilitiesandcapacitiesthatcontributetotheC-IED effortsintendedtoatleastmatchbutideally

overmatch3 thethreatposedbytheuseorthreatened useofIEDsandcaninvolveanythingwhichisintended topredict,discover/detect,prevent,protectagainst, respondto/neutralise,recover/exploit,mitigate against,ordeterIEDattacks.Thearticlewillillustrate howattemptstoreplicateorimplementWesternC-IED enterpriseswhenprovidingC-IEDdonorassistanceis notthebestapproach.Wewillfrstexaminetheneed forregionallycoherentC-IEDenterprisesastodate, sucheffortshaveoftenbeendisjointed,lackingin coordination,andinsomecasescooperation.The contentofthisarticleisinformedfromresearch conductedbytheauthoraspartofaMAinstrategic studieswhichexaminedandidentifedC-IEDstrategic principlesforEastAfrica.

RegionalandGlobalC-IEDEfforts-UNandthe AfricanUnion(AU)C-IEDResponses

TheUNhasacknowledgedtheenduringandpervasive threatposedbyIEDsincontestedandfragilesecurity environments.Theyhavestatedthatsince2014,a steadyincreaseinthenumberandcomplexityof explosiveordnancethreatshasbeenrecordedagainst UNpersonnel,nationaldefenceandsecurityforces, civilianpopulations,andotheractorswithinUNmission areas.On24May2021,theUnitedNationsSecurity Councilrequestedanindependentreviewtoaddress

C-IEDDONORASSISTANCE–DEVELOPINGEFFECTIVEC-IEDSTRATEGY
23 counteriedreport.com
ByPaulAmoroso,anexplosivehazardsspecialistatAssessedMitigationOptions(AMO)consultancy

thenatureofthisincreasingthreatandsuggestactions thattheUNSecurityCouncil,secretariat,missions, andtroop/police-contributingcountries,amongst others,cantaketoreduceandmitigatethethreat. On23November2021,thereportwasdeliveredwith recommendationswhichemphasizethatresponses neededtobeintegrated,coherentandproactive,as wellasresponsive.

LiketheUN'sfndings,theAUC-IEDstrategystated thatitisnecessarytoconfrontthischallengeinaunited effortthroughtheAfricanUnionCommission, Regional EconomicCommunities/RegionalMechanisms, Member Statesandpeacesupportoperations.Thus,awholeof continentperspectiveisneededtodevelopregionally specifcthreat-alignedapproachestoconfrontthis transnationalthreat.Suchregionalapproaches, coordinatedandsupportedbytheAfricanUnion Commission,needtoinvolveasuiteofcomplementary enablerswhichseektoprevent,counter,andrespond totheuseofIEDs.Suchregionalstrategiesmust complementwidermemberstatenationalsecurity strategiesaswellastheirnationalsecurity architecturesandstateinterests.Whileregional approachesarerequiredforeffectiveC-IED enterprisesowingtothetransnationalnatureofthe networkswhoemploythem,therearepotentiallyother beneftstoregionallycoherentC-IEDenterprises.

C-IEDstrategiesmaybeaneffectivemeanstoachieve morewithlessresources.Onacostbeneftanalysis basisthedevelopmentofregionalC-IEDstrategies canbeworthwhileendeavoursiftheyprovidetheway toachieveagreaterimpact(closertothedesiredends) fromlessmeans(resourcesneeded).

TheUSResponsetoIEDUse

AccordingtothelatestUSArmyC-IEDstrategy (February2022),aftertheIEDrosetoprominence duringtheconfictsofAfghanistanandIraqtheUSand alliedmilitariescommencedthedevelopmentofC-IED efforts.However,beforethisresponsetoIEDusein IraqandAfghanistan,otherIEDaffectedstateshad undertakeninitiativesandcollectiveeffortstocounter theirusebutdidnotusethetermC-IED.Examples includetheUK,Turkey,SriLankaandColombia.

ThesecollectivepracticesreferredtoasC-IED continuetoevolve.

Atanationallevel,theUSestablishedtheJoint ImprovisedExplosivesDeviceDefeatOrganisation (JIEDDO).Originallycreatedin2006todeviseand feldnewtechnologiestohelpidentifyroadsidebombs andotherimprovisedexplosivesthatwerequickly becomingtheweaponofchoiceofinsurgentsagainst UStroops,by2008ithadabudgetofUS$4billionper annum.NATO,theEuropeanDefenceAgencyand manyofthenationsoperatinginboththeatres,along withthosefacingIEDattacksdomestically,also contributedtothedevelopmentofC-IED;however, JIEDDOwithitsimmensebudgetalongwiththeUS’s commandingroleinboththeatresandwithinNATO wasakeyinfuencerinhowC-IEDdeveloped.By2012 withtheon-goingeffectivenessofIEDsagainstUSand coalitionforcesinAfghanistan,JIEDDOwasatthe heightofitspowerwithintheUSmilitaryestablishment. RefectingthegrowinginfuenceofJIEDDOwithinthe USmilitaryandtheglobalincreaseinIEDuse(with IEDattacksexceeding4,000in2011),on26February 2013,theWhiteHousereleasedapolicystatementon counteringIEDs.ThisPresidentialPolicyDirectiveis referredtoasPPD17.Thesubsequentproliferationof IEDuseinPakistan,acrosstheMiddleEast,North, EastandWestAfrica,tonamebutafew,aswellas sensationalistattacksintheWest,e.g.,UK,US, France,Belgium,andSpain,sawmultiplenational, regionalandinternationalC-IEDefforts.

TheUSwhichhasoneofthemostmatureand developeddefenceandsecurityarchitectureshave strategiesdedicatedtoseveralnationalsecurityand defenceissues.However,ithasnodedicatednational C-IEDstrategybuthashadseveralsupporting documentsthatseektocoordinatenationalC-IED efforts.TheUSmilitaryhaveproducedseveralC-IED strategiessuchastheUSArmyC-IEDstrategy.Two otherinfuentialUSC-IEDdocumentswerePPD17 andtheJIEDDOC-IEDStrategicPlanfor2012–2016. WhilePPD17isnotanationalC-IEDstrategy,itdoes providethreepolicyobjectivesalongwitheightactions intendedtoguideUSsecurityanddefencepolicy makers.Italsoprovidesfveexamplesofsuccessfor

24 COUNTER-IEDREPORT,Spring/Summer2023
C-IEDDONORASSISTANCE–DEVELOPINGEFFECTIVEC-IEDSTRATEGY

theseactions.PPD17conceptualisesaC-IEDcycle4 thatinvolvesthestepsofdiscover–prevent–protect against–respondto–recoverfrom–mitigateagainst IEDattacks.ThissixcomponentC-IEDcyclecanbe adaptedintoaneight-componentcycleasshowninthe fgurebelow,5 providingagoodframeworkto appreciatepotentialpointswithinanIEDattackcycle thatC-IEDeffortsmaybefocussedontoachieve desirableeffectstoprevent,counterorrespondtoIED attacksorthreatsthereof.

PPD17offersatoolforthosewithintheUSengaged intheC-IEDenterprise,toensuretheirC-IEDefforts remainstrategicallyalignedtotheirgovernment’s C-IEDpolicy.Itsconcludingsentenceisinsightfulin termsofwhatanationalstrategyshouldendeavourto achieve.Ittalksofawholeofgovernmentapproach integratingnational,sub-national,privatesectorand globalparticipationinC-IEDactivitiestobestposition theUStodiscoverplotstouseIEDsdomesticallyor againstitscitizensabroad,beforethosethreats becomeimminent.

TheJIEDDOC-IEDstrategicplanwasatoolto providestrategicdirectiontotheUSmilitary establishment’seffortstocounterthethreatposedby IEDs.Itwasintendedtoprovideaunifedandcoherent approachtoeffortsbytheUSdefenceestablishmentto countertheuseofIEDsagainstUSforcesbothwhenon expeditionandwhennecessary,domesticallyinsupport ofUSfederalagencies.Itsoverallgoalwastomitigate theeffectsofIEDsonthecommander’sfreedomof manoeuvreandtosetthepathfortheC-IEDeffortsin collaborationwithpartnernations,interagency,and intergovernmentalorganisationstoenablethedefeatof theIEDasaweaponofstrategicinfuence.The documentheavilyinfuencedUSmilitaryC-IEDduring thedecadeofthe2010sand,bydefault,subsequently infuencedNATOC-IED,thatofUSalliesandelements oftheUSmilitary-industrialcomplex.Whileeffortsto developnationalandregionalC-IEDstrategies,can harnesscertainelementsofthisJIEDDOstrategicplan, itfallsshortofwhatIEDaffectedstatesandregions requireforseveralreasons,whichincludeinteralia:

1.DomesticC-IEDissecondary toexpeditionaryC-IED;

2.Afghanistanwasthefocus;

3.Inconsistencyinwhat counteringIEDsmeans;6

4.Explanationofattackthe networkistoonarrowand belowparforastrategic document;

5.PrimaryresponsetoIEDsis heavilytechnologyand equipmentfocussedwiththe secondarytargetaudience beingelementsoftheUS militaryindustrialcomplex.

Forthesereasons,the JIEDDOstrategicplanfailsasa guidetoC-IEDdevelopment, investmentandimplementation.

25 counteriedreport.com
C-IEDDONORASSISTANCE–DEVELOPINGEFFECTIVEC-IEDSTRATEGY Figure1.C-IEDcycle.

NATO

Mostnotably,NATOhasitsAlliedJointDoctrinefor CounteringIEDs,AJP-3.15.7 Manywesternmilitaries eitheradoptoradaptAJP-3.15asC-IEDdoctrinefor usebytheirarmedforces.Forexample,withintheIrish DefenceForcesfromcirca2007,theOrdnanceSchool ledmanyeffortstodevelopC-IEDbothatthetactical developmentlevel,throughtooperationalcapabilities andinformingstrategicperspectiveswhichincluded effortstoadaptNATOAJP-3.15C-IEDforIrish DefenceForces’use.8 Overall,theNATOAJP-3.15 publicationcouldnotbeuseddirectlybyanIED affectedstateindevelopinganationalC-IEDstrategy. Instead,itwasdesignedasmilitarydoctrineand intendedforusewithinthewiderNATOecosystemfor militariesthatareNATOconfguredandresourced accordingly.Itwasintendedformilitarystrategyand operationsratherthannationalstrategy.Thatsaid, thereismuchcontentwithintheNATOAJP-3.15 publicationthatcouldbeharnessedtoinformanIED affectedstateonwhattheymayconsiderfortheir militariesiftheirmilitaryaretobeacomponentoftheir nationalC-IEDstrategy.

WesternC-IEDApproaches

NowesternnationalC-IEDstrategieshavebeen identifedanditisnoteworthythattheUSistheonly stateidentifedashavingindependentlydevelopeda C-IEDstrategicplanandaPPDonC-IED.However, severalwesternstateshavevariousC-IEDpolicies, initiatives,strategicplans,anddoctrineswhichthey employ.IntermsofdomesticC-IED,therearevarious approachestakenbywesternstatestocounterthe threat.Inmostcases,westernnations'C-IEDis primarilyconductedundertheumbrellaofcounterterrorism(CT)oracriminaljusticeapproachandhence itisadomesticlawenforcementissue.Thisinturn meansthattypically,domesticC-IEDcomesunder nationalsecurityorcriminaljusticeorpotentiallya hybridofboth,andpredominantlyhasnomilitary involvement.Forexample,theUSJIEDDOstrategic planfortheUSmilitarywasprimarilyexpeditionary focussedand,onlyintendedtosupportUSfederal agencieswhohaveprimacydomestically.However,in

somecaseswesternmilitariescanhaveamore substantiveroleindomesticC-IED,mostnotablyinthe provisionofExplosiveOrdnanceDisposal(EOD).For example,theBelgianmilitaryprovideallnationalEOD capabilitiesasdotheDutchmilitarywithinThe NetherlandsandthesameforMalta.Thisissimilarto theprovisionofallEODcapabilitiesbytheIrish DefenceForceswithintheRepublicofIrelandtothe nationalpoliceforce,AnGardaSíochána,inanaidto thecivilpowerrole.

TheUKC-IEDEnterprise

ToexploretheprovisionofC-IEDdonorassistance,it isinformativetoexaminetheUKC-IEDenterpriseand howtheseevolvedtobeconsideredbymanyasthe leadC-IEDnationasitwasbeingdevelopedinthefrst decadeofthe2000s.Examininghowthistranspired, canassistunderstandingwhysofewWesternnations havestandaloneformalC-IEDstrategies.Thereare twoprimaryreasonswhytheUKwasconsideredthe leadingnationinthisarea.Firstly,theBritishretreat fromempiresawthemengagedinseveralsignifcant counterinsurgenciesthatexposedthemtoasymmetric threats,includingclandestineattackmethodsinthe formofboobytrapsandIEDs.UKarmedforcesand theirlocalconstabularyforceswereexposedtosuch threatsinHongKong,Aden,andCyprus.Other nations,postWWII,wereexposedtoIEDsasthey retreatedfromempire,mostnotablytheFrenchfor exampleinAlgeria.However,itistheauthor’s contentionthatitistheBritishretreatfromempireand theirexposuretoasymmetricattacksfrom‘Irish terrorism,’whichincludedIEDs,goingasfarbackas theFeniansandtheIrishRepublicanBrotherhood ‘dynamitewars’whichmarkedouttheBritish experienceasdifferent.TheLondonMetropolitan PolicealongwithotherelementsoftheUKsecurity serviceshadtocounteraclandestineorganisation undertakingterrorismusingmethodswhichincluded IEDattacks.WithinIrelandtheBritishmilitaryandother securityforceshadtocontendwithIEDattacksduring theIrishWarofIndependenceandsubsequently intermittentlyinNorthernIreland,especiallyalongthe borderupto1969,suchastheIRAbordercampaignof

26 COUNTER-IEDREPORT,Spring/Summer2023
C-IEDDONORASSISTANCE–DEVELOPINGEFFECTIVEC-IEDSTRATEGY

C-IEDDONORASSISTANCE–DEVELOPINGEFFECTIVEC-IEDSTRATEGY

1956–1962.From1969,Britishsecurityforcesfaced whatbecamethemostsophisticatedandpossiblythe mosteffectiveuseofIEDsuptothattime.‘The Troubles’sawtheUKmilitarydeployedtoNorthern Irelandinanaidtothecivilpowerroleinsupportof NorthernIrelandsecurityforces,inwhatcouldbe consideredanexpeditionaryoverseasdeploymentfor manyoftheBritishmilitarywhodeployed.Thename giventotheBritishArmedForces’operationsduring ‘TheTroubles’from1969to20079 wasOperation Bannerandwasconsideredaninternalsecurity operation.CoupledwiththeoperationsinNorthern Ireland,wastherelativelysteadyrateofIEDattackson theUKmainland.ThisresultedintheUKpoliceand securityservicesdirectinvolvementinC-IEDefforts. Itwastheseexperiencesduring‘TheTroubles’that exposedthemtosophisticatedIEDusethat signifcantlyinfuencedthedevelopmentoftheirC-IED enterprisewhichevolvedandsubsequentlysetthem apartfromotherIEDaffectedstates.Allthemilitary, policeandsecurityserviceexperiencesinC-IED,both domesticallyandinaquasi-overseasrole,resultedin theUKbecomingthemostreputable,experiencedand expertnationatC-IEDbytheturnofthetwentieth century.Thisleftthemastheleadnationwhenthe needforC-IEDaroseinIraqandAfghanistan; however,itisessentialtounderstandthecomplexities ofthisBritishC-IEDenterprise.

Bycirca2005,theBritishC-IEDenterprisehad developedfrom‘TheTroubles’andalsoinresponseto anemergingJihadithreat,requiringahybridapproach involvingamixtureofcounter-insurgency(COIN) practices,counter-terrorism(CT)andcriminaljustice approaches.TheUKhasnosingleC-IEDleadagency. Instead,ithasattimesinvolvedtheBritishmilitary, localpoliceforces,locallyraisedinfantryregiments, securityservices,domestic,foreignanddefence intelligence,stateandlocalforensiccapabilities, militaryandLondonmetropolitanEODandsearch teams,andCTpoliceunits.TheirEODcapabilities residewiththemilitary,exceptfortheGreater MetropolitanLondonareawheretheUKMetSO15 EODhasresponsibility.Thevariouselementsofthe Britishdefence,securityandjusticeapparatus

employedduringtheTroublesfrom1969to1991, whentheColdWarwason-going,facednomajor fundingorresourcingrestrictions.TheirC-IED intelligencecapabilitiesinvolvedpoliceforcesrelating tocriminaluseofIEDs,withUKSecurityServices (MI5)involvedwithnationalsecurityIEDissuesand theSecretIntelligenceService(MI6)potentially involvedifthereisaninternational,foreignstateor foreignnon-stateactorelementtoit.Thereisa potentialfortheinvolvementofmultiplesecurity agenciesinvolvingcivilian,policeandmilitary intelligenceelements.Foroffensiveattackthenetwork activities,theUKmilitary,canexecuteoverseas actionswithavarietyofUKpoliceandsecurityservice elementsinvolvedinthesamedomestically.Such attackthenetworkoperationscanincluderaids, interdictionsandarrests,beingexecutedundera criminaljusticeapproachoraCTframework.When doneunderaCTapproachtoC-IEDitbecomeseven morecomplexastheUKmilitaryactinsupportof policeelementsaswasthecaseforexamplewhen specialforcesoperativeswereembeddedwithLondon MetropolitanPoliceduringtheperiodofJune2017in relationtoterroristattacksinLondon.Thesame complexarrayofactorscanbeseenwithintheUK defence,securityandpolicesectorswhenitcomesto IEDexploitationwithforensicpersonnelandvarious laboratoriesofvaryingexpertiseandcapability involved.WhenprovidingC-IEDdonorassistancean appreciationoftheUKnationalC-IEDenterprise illustratesitsinterconnectedmulti-agencyandfexible approach.Itisequallyimportanttoappreciatethetime scaleandresourceinvestmentrequiredtodevelop suchdecentralisedcapabilitieswithinmatureandwellestablisheddefence,securityandjusticestructures.

Afghanistan’sNationalC-IEDStrategy

ExpandingthefocusbeyondwesternC-IEDefforts, onenationstandsoutforitsnationalC-IEDstrategy, Afghanistan.10,11 In2016,theIslamicRepublicof Afghanistan’soffceofnationalsecuritycouncil, internalaffairsdirectorateproducedthenation’s secondnationalC-IEDstrategy,withthefrstsuch nationalC-IEDstrategyproducedin2012.TheAfghan

27 counteriedreport.com

C-IEDDONORASSISTANCE–DEVELOPINGEFFECTIVEC-IEDSTRATEGY

InternalAffairsDirectorateweresignifcantlyassisted, supportedandadvisedbyISAFindevelopingand implementingthesestrategies.Thepartneringand outreachchiefduringthedraftingofthefrstAfghan nationalC-IEDstrategystatedthattheoutreachand partneringcelloftheISAFHQ(4Star)C-IEDbranch wasdeeplyinvolvedinthedevelopmentoftheC-IED StrategywithitsAfghangovernmentpartners; however,itwasalwaysathemeofthestrategythatit wouldbeAfghanled.Asecondkeypointisthatthese strategiesweredevelopedwithinafragilestate, counteringaviolentanddestabilisinginsurgency. Manyoftheministriesandsecurityforceswere embryonicandunderdeveloped,astheycountered IEDs.Thebackgroundtothedevelopmentofthe AfghannationalC-IEDstrategiesisanimportant considerationwhenattemptingtouseitasamodelto provideC-IEDassistance.Overall,thequestionmay beposed,whetherthewesterndominatedISAF alliance,resourcedandforcedthedevelopmentand implementationoftheirparadigmofanationalC-IED strategyforAfghanistan?

CONCLUSION

WhileregionalinitiativestocoordinateC-IEDcanbe slowpacedincomparisontonationaleffortswhichare typicallyfasterpacedtheneedforregionalapproaches tocounteringIEDuseispromotedduetothe transnationalnatureofthethreat.Thisisamonumental challengeandonethatwillbegenerationalinlength, butitcanbedoneiftheappropriateinternationally coordinatedapproachistaken,providedthereis internationalcooperationandappropriateresources allocated.Itisunrealistictothinksuchagrandstrategic endeavourwillhave193UNmemberstates’ consensus;however,evenwithmajoritybuyinfrom keyUNP5,G7andG20nations,overtheperiodofa decademassiveprogresscouldbemade.Inanysuch grandstrategicendeavour,itisnecessarytoseethat individualdevelopingnationswillnotbeabletodothis alonebutwillneedactivesupportfromacooperative internationalsecurityecosystem.Suchsupportmay involveregionalandinternationalorganisationssuch as,theUN,AU,NATO,EU,ECOWAS,INTERPOL,

WCO.Itisproposedthatowingtothematurityof Westernlawenforcement,securityanddefence architecturesandthegreaterresourcesavailableto them,coupledwiththeoften-evolutionarynatureof theirdevelopment,attemptstoreplicateorimplement suchC-IEDenterprisesintheprovisionofC-IEDdonor assistanceisnotconsideredtobebestpractice.So, howcananIEDaffectedregionanditssupporting donorsbestgoaboutdevelopingeffectiveC-IED strategy?ItisproposedthatC-IEDstrategicprinciples areneededtoachievetherequiredimpactsand outcomeswhenprovidingC-IEDdonorassistance, whichwillbethesubjectofasubsequentarticleinthe Counter-IEDReport. ■

NOTES

1.C-IEDdonorassistancereferstoC-IEDsupport providedonabilateralbasis,onajointinitiative fromtwoormoreStatesorbyaninternational organisation,e.g.,EU,LeagueofArabStates, ECOWASetcoranalliancee.g.NATO,toanIED affectedstateorregion.

2.C-IEDeffortsrefertoallinitiativesandactivities undertakenbyaState,organisationorentitytoat leastmatchbutideallyovermatchthethreatposed bytheuseorthreateneduseofIEDsandcan involveanythingwhichisintendedtopredict, discover/detect,prevent,protectagainst,respond to/neutralise,recover/exploit,mitigateagainst,or deterIEDattacks.C-IEDeffortscanincludeinter alia,training,mentoring,advising,accompanying, assisting,technologyandequipmentprovisionand intelligencesupport.

3.TheUSArmyC-IEDstrategy2022,states “developingcapabilitiestomaintainovermatchisa criticalenabler,”whenassessingIEDsasamultidomainthreatintothefuture.

4.TheC-IEDcyclepresentedhaseightsteps involvingpredict,discover/detect,prevent,protect, respond/neutralise,recover/exploit,mitigateand deter.Thesestepsintendtocollectivelyachieve thedesirableeffectsofpreventing,counteringor respondingtoIEDattacksorthethreatthereof.

28 COUNTER-IEDREPORT,Spring/Summer2023

Theeightstepsprovidedinthiscyclemaynot necessarilyalwaysbepresentinanygiven C-IEDeffort.

5.Theeightnamedstepsareasynthesisofvarious C-IEDcyclesreviewedaspartofthisresearch.In thedefningofC-IEDeffortswithinthisresearcha seventhandeighthstepofdeterrenceandpredict wereincludedtothoseintheUSArmyC-IEDcycle. InadditionthreeUSArmyC-IEDcyclestepswere expandedwithdiscovertoexplicitlyincludedetect, respondtoincludeneutralise(whenpossible)and recovertoincludeexploitsolessonscanbe learnedtofeedallotherpartsoftheC-IEDcycle.

6.Itsstrategicvisionspeaksofreducingthe effectivenessandlethalityofIEDswhichisrealistic andachievable;however,itsmissionstatement, referstodefeating"theIEDasaweaponsystem ofstrategicinfuence.”(p.1)ThedefeatofIEDs isnotarealisticendstatewiththestrategy acknowledgingtheIED“willremainanenduring globalthreatduetotheaccessibilityofmaterials andthepotentialstrategicimpactresultingfrom theiruse.”(p.3)Assuchtheacknowledgementin theforewordthat“wearenevergoingtostopall IEDs”(p.iii)shouldhavebeenfollowedthroughout, withathreatmitigationapproachtocountertheir useadoptedthroughoutthedocument.

7.AsofApril2022thisNATOCounter-IEDdoctrineis underreview.

8.Asof2015,aworkingdraftofthisadaptedC-IED doctrinewasdevelopedandbeingusedto informIrishDefenceForceC-IEDthinkingand approaches.

9.BritishArmy deploymentinNIwasunderthe militarynameOperationBannerwhichformally endedon01Aug2007;however,alatent,virulent butlowcapabilityIEDthreathaspersistedfrom dissidentrepublicangroupssincethe1998Good Friday Agreement.

10.Theauthorhasbeenmadeawareofthepotential existenceofaPakistaninationalC-IEDstrategy; however,despiteextensiveeffortstheexistence ofsuchastrategycouldnotbeconfrmedor denied.PotentialC-IEDsecuritysensitivitywithin

Pakistanmaycontributetochallengesin answeringthisquestion.

11.Theauthorisalsoawarethatfrom2018,the conceptofaC-IEDstrategyforKenyawas mooted.Asofmid-2022itwasrecordedthat Kenyawasintheprocessofdevelopinganational strategyinC-IED.

ABOUTTHEAUTHOR

PaulAmoroso isanexplosive hazardsspecialistandhas extensiveexperienceasanIED ThreatMitigationPolicyAdvisor workinginEastandWestAfrica.He servedintheIrishArmyasanIED DisposalandCBRNeoffcer,upto MNTlevel,andhasextensive tactical,operational,andstrategicexperiencein PeacekeepingOperationsinAfricaandtheMiddle East.Hehasexperienceinthedevelopmentof doctrineandpolicyandwasoneofthekeycontributors totheUnitedNationsImprovisedExplosiveDevice DisposalStandardsandtheUnitedNationsExplosive OrdnanceDisposalMilitaryUnitManual.Heworksat presentintheMENAregiononSALWcontrolaswell asinwiderAfricaadvisingonnationalandregional C-IEDstrategies.HehasaMScinExplosive OrdnanceEngineeringandanMAinStrategicStudies. Herunsaconsultancy,AssessedMitigationOptions (AMO),whichprovidesadviceandsupportinrelation toconventionalandimprovisedweaponsand explosivehazardriskmitigation.Thisarticlerefectshis ownviewsandnotnecessarilythoseofany organisationhehasworkedfororwithindeveloping theseideas.

Linkedinprofle: https://www.linkedin.com/in/paulamoroso-msc-ma-miexpe-60a63a42/

29 counteriedreport.com
C-IEDDONORASSISTANCE–DEVELOPINGEFFECTIVEC-IEDSTRATEGY

ASTRATEGICPRINCIPLESAPPROACH TOREGIONALC-IEDENTERPRISES

INTRODUCTION

InapreviousCounter-IEDReportarticleitwas outlinedhowowingtothetransnationalnatureofthe networksthatfacilitateIEDuse,thatstrategic approachescoupledwithregionalcoherenceare requiredtoachieveappropriateandeffectiveimpactin C-IEDdonorassistance1 providedtoIEDaffected states.Itwasalsoarguedthatowingtothematurityof Westernlawenforcement,securityanddefence architecturesandthegreaterresourcesavailableto themcoupledwiththeoften-evolutionarynatureoftheir development,attemptstoreplicateorimplementsuch C-IEDenterprisesintheprovisionofC-IEDdonor assistancearenotconsideredtobebestpractice. PursuitoftheperceivedgoldstandardofWestern C-IEDenterprisescreatesanunachievableendstate foranIEDaffectedstaterequiringC-IEDdonor assistance.Thisissuecanbeaddressedbyhaving C-IEDstrategicguidancewritteninclear,concise, accuratelanguagewhichcanbeemployedbyIED affectedstatesanddonorstoserveasabridgeto barriersaswellasdifferencesinexpectations.Asetof C-IEDstrategicprinciplescanservetoinformsuch C-IEDstrategicguidance.Thisarticlewilloutlinehow C-IEDstrategicprinciplesareneededtoachievethe requiredimpactsandoutcomeswhenprovidingC-IED donorassistance.Thecontentofthisarticleisinformed fromresearchconductedbytheauthoraspartofaMA

instrategicstudieswhichexaminedandidentifed C-IEDstrategicprinciplesforEastAfrica.

ASTRATEGICAPPROACH

AccordingtoColinS.Gray,strategymaybe consideredastheusemadeofforceandthethreatof forcefortheendsofpolicy.Itisthebridgethat connectspolicywithmilitarypower.Forourneeds,the conceptofstrategyexceedswhatmaybeconsidered classicalmilitarystrategy.ItrefectswhattheAfrican Union(AU)statesastheneedtocomplementwider securitystrategiesaswellastheirnationalsecurity architectureandstateinterests.Acomprehensive nationalstrategyinvolvesmoreelementsthanmilitary powertoeffectivelysupportC-IEDefforts.TheUS DODdefnitionofnationalsecuritystrategybetterfts ourneeds.Itexplainsthatitspurposeisfordeveloping, applying,andcoordinatingtheinstrumentsofnational powertoachieveobjectivesthatcontributetonational security.Securityinthiscontextcanbeconsideredas aconditionthatresultsfromtheestablishmentand maintenanceofprotectivemeasuresthatensurea stateofinviolabilityfromhostileactsorinfuences.In thiscaseitissecurityfromactualorthreatenedIED attacks.Thestrengthofthisdefnitionliesinabroad approachencompassingtheinstrumentsofnational power.Itisnotsimplyfocusedonthemilitaryand

C-IEDDONORASSISTANCE – C-IEDSTRATEGICPRINCIPLES
31 counteriedreport.com
ByPaulAmoroso,anexplosivehazardsspecialistatAssessedMitigationOptions(AMO)consultancy

C-IEDDONORASSISTANCE – C-IEDSTRATEGICPRINCIPLES

refectstheneedforastrategicwholeofgovernment approachtoC-IED.Itisproposedthatanoptimally effectivestrategicapproachtoC-IEDrequiresall elementsofstatecraft.2 Awholeofgovernment approachtoC-IEDneedstoencompassthe instrumentsofnationalpowerinvolvingmilitary; information;diplomacy;fnance;intelligence; economics;legal;developmentalongwithlaw enforcement,regulatoryinstrumentsandcivilsociety organisations.

Lykke’sends-ways-meansstrategymodel3 provides anincompleteapproachtostrategicC-IED,asitfailsto comprehendallthenecessarydimensionsofC-IED.4 Insteaditisproposedthatstrategycanbeanyhigherlevelcoordinatingmechanismthatseeksapositionof advantageandarticulateshowthismaybeachievedby recognisingstrengthsandweaknessesinagiven operationalenvironment.Multiplenationaldocuments suchaspolicydocuments,doctrines,policystatements andactionplanscaninformnationalapproaches toC-IED.Whatgoodstrategylookslikecanbe challengingtodefne;however,thosestrategic documentsthathaveproventobeeffectivetypically communicatesuccinctlyitswhy(whatisintendedtobe done)andwhomustdowhatandbywhen.Justas goodstrategydoesnotneedtofttheLykkemodel,any publicationordocumentthatarticulatesorservesto coordinateC-IEDcanqualifyasanelementofstrategy.

AccordingtoUSPresidentialPolicyDirective17, issuedin2013undertheObamaAdministration,the greatestresponsibilityoftheStateistoprovideforthe safetyandsecurityofitscitizenswhileprovidingan economicenvironmentthatpromotesopportunityand prosperity.IftheuseorthreateneduseofIEDs underminesorimpedesthenationalinterestsofsafety, securityandprosperity,thenIEDsmaybeconsidered atactical5 issuewithstrategicimpacts.6 Forexample, IEDscandisrupteconomiclifeandfragmentcohesion withinthecommunitiesinwhichtheyareemployed. Thiswillundermineeconomicdevelopmentalongwith governancetothedetrimentofnormallyfunctioning society.Nationalsecurity,safetyandprosperityare strategicissues,whichIEDuseundermines,meaning thatC-IEDenterprisesneedtobestrategic.Itis

proposedthateffortstodatetocounterIEDusehave notbeenadequate.Thishasbeenacknowledged withintheUSArmyC-IED2022strategywhichstates, thecurrentiterationexpandstheaperturetomorefully provideacohesiveandholisticapproachtothis evolvingchallengeandmakesignifcantchangestothe linesofeffort7 traditionallyassociatedwithC-IED.This USArmyC-IEDstrategyclaimsthatsuchalineofeffort frameworkalignswithestablishedstrategicguidance whileallowingfortheadaptabilitythatC-IEDdemands.

C-IEDASSISTANCEDONOR-RECIPIENT DYNAMICS

AnEastAfricanIntergovernmentalAuthorityon Development(IGAD8)meetinginFebruary2022on regionalC-IED,notedtherehadbeensomesuccesses againstIEDuseintheregion.AccordingtotheIGAD securitysectorprogramdirector,ColMuleneh,despite thechallengesinaccuratelyestimatingthenumberof IEDevents,itappearsthatthetotalnumberrecorded in2019marksforthefrsttimeaslightdiminutionin comparisontothegradualincreasesincethe beginningoftheiruseinSomalia.Onepotentialreason forthisassessedC-IEDsuccesswithintheEast AfricanregionmaybeduetoC-IEDdonorassistance toIGADstates.ThistypicallyinvolvesanIEDaffected statereceivingdonorsupport,forexampleintheform ofassistancerelatedtointeralia,training,mentoring, advising,accompanying,assisting,technologyand equipmentprovisionandintelligencesupport.This establishesarecipient-donorrelationshipbetweenthe IEDaffectedstateandthedonorprovidingC-IED assistance.ArecipientstateneedssuchC-IED assistanceastheyhaveadefciencyintheirC-IED capabilitiesorthescaleoftheIEDthreatfacedis beyondtheircapacity9 toatleastmatchbutideallyover matchthethreat.Themotivationsofadonortoprovide C-IEDassistancecanvarybutwilltypicallybe capturedundersomeaspectoftheirforeignpolicy objectivesandbealignedtotheirnationalinterests. Regardlessofthelevelofaltruismespousedbya donor,therewillinevitablybevestedinterestswhich mayormaynotbealignedtothenationalinterestsof therecipientstate.

32 COUNTER-IEDREPORT,Spring/Summer2023

Thedefcienciesinatleastsomeelement(s)of C-IEDofanIEDaffectedstateandtheprovisionof C-IEDassistancefromadonorcanleadtoapower imbalanceintheresultingrelationship.Achallenge oftenfacedbyanIEDaffectedstatereceiving assistanceisthefactthatdonorsmaydrivethe decisionmakingintermsofwhatC-IEDcapabilitiesare investedinandwhattheirprioritiesare.Thereisa requirementfortheestablishmentoftheappropriate relationshipbetweendonorsandrecipientIEDaffected states,sothemosteffectiveC-IEDassistanceis provided,insupportofthenationalsecurityand developmentobjectivesoftheaffectedstate.Itiskey thatabalanceisstruckbetweentheexpectationsof thedonor(s)supportingC-IEDdevelopmentandthe stakeholderswithinanIEDaffectedstate.Thiswill oftenrequireinitialnegotiationsbetweenthedonorand thestakeholderswithintheIEDaffectedstatewhom theysupport.Therecipientstatepotentiallyendsupin asubmissivepositionrelativetothedonorunlessthe necessarychecksandbalancesareimplementedto ensuretherecipientnationremainsinlegitimate controloftheirownsecurity,safetyandstability.Atthe veryleastadonorwillwantaccountabilityand oversightofwhereandhowitsmoneyisbeing expended.Forvariousreasonsadonormaystipulate caveatsandrestrictionsontheC-IEDassistanceitwill provide.Inextremis,thedonormayrestrictwhatC-IED assistancetheyarewillingtoprovidetosuchanextent thattherecipientnationhasnosayintheassistanceit receives,howitisimplementedandevenwhocontrols itsdeployment.SuchextremisdonorcontrolsoverCIEDassistancemayevengoasfarasunderminingthe independenceandsovereigntyoftherecipientstate. Thisextremepowerimbalanceisdetrimentalto developingindigenouscapabilitiesoftherecipient nation.Suchextremepowerimbalancesarenot consideredcommonbutrepresentaworst-case scenarioinC-IEDassistanceprovision.

STRATEGICPRINCIPLES

InmanycaseswhenadonoroffersC-IEDassistance toanIEDaffectedstatetheywilleitherhavetheirown matureC-IEDexpertiseoralternativelytheywill

engageanimplementingpartnere.g.private contractor,todeliverthenecessaryC-IEDassistance. Ineithercase,thepersonneldeliveringtheassistance willcomewiththeirownparadigmofwhattheC-IED assistancetobedeliveredwillinvolve.Thefactthata recipientstatehasaC-IEDdefciency,meansthatthey maybeunawareofwhatsupporttheyrequire.This presentsthepossibilityofthosedeliveringC-IED assistancetodelivertheirparadigmofrequirements withoutconsideringtheneedsoftherecipientstate. Theserecipientneedscanincludeinteralia,wider nationalinterests,longtermneeds,indigenous capability10 development,sustainablecapacity development,culturalnuances,environmentalfactors andtheatrespecifcrealities.Inthemostextreme casestheassistancemaynotbethreataligned. Withoutsuchcontextspecifcconsiderationstherecan beamisalignmentbetweentheC-IEDassistance deliveredandthewiderneedsoftheIEDaffected state.Suchundesirablerecipientanddonordynamics involvingpowerimbalancesandmisalignment betweentheassistanceprovidedandthelongerterm needsoftheIEDaffectedstatecanbemitigated againstifrecipientnationshaveC-IEDstrategic principlestoreferto.

C-IEDstrategicprinciplesrefertofundamentalrules andguidelinesthatserveasafoundationforreasoning anddecisionmakingaboutthelonger-termdirectionin aC-IEDenterprise.Theycanhelpstatesandregional organisationsindevelopingandsustaininganeffective C-IEDenterprisewithinagivenregion.Aneffective C-IEDstrategicprincipleneedstobeaclear,concise, memorableandactionablephrasethatrepresentsa planforhowtoeffectivelyallocateresourcesto contributetoatleastmatchingbutideallyover matchingthethreatposedbyIEDs.Theyshould provideadirectivebroadenoughtopromote enterprisingbehaviour,butspecifcenoughtoalignthe C-IEDeffortsdecidedupontocomplementwider nationalsecurityordevelopmentobjectives.Arecipient stateofC-IEDassistancecanreferencesuch principleswhenconsideringhowtoengageinaC-IED enterprise,whatassistancetobeagreedtoandhowit maybemanaged.SuchempowermentofIED

33 counteriedreport.com
C-IEDDONORASSISTANCE – C-IEDSTRATEGICPRINCIPLES

C-IEDDONORASSISTANCE – C-IEDSTRATEGICPRINCIPLES

affected statescanallowforoptimalindigenous capabilityinvestmentandintimecapacity developmenttoatleastmatchbutideallyovermatch theIEDthreatfaced.

IDENTIFYINGSTRATEGICPRINCIPLES

Toidentifystrategicprinciplesinsupportofa regionallycoherentC-IEDenterpriseweneedto assesswhichC-IEDeffortsshouldbepromotedand thosewhichshouldbeavoidedorminimized.Several approacheswereconsideredindevelopingan analysisframeworktofacilitatetheidentifcationof commonthemesforagivenIEDthreatunder examination.Theseincluded:

•Identifyingends,waysandmeans;

•Consideringthesituation,task,execution, authority,andsupportdemands;

•Thesevenplanningquestions;11

•Why,what,who,where,whenandhowofthe problem(5W+H).

Considerationoftheoverlapbetweeneachofthese approachesallowedforthemappingofrelationships betweenthemascapturedin Table1.

Thefrstofthesevenquestions,‘whatisthesituation andhowdoesitaffectus?’effectivelyprovidesthe problemstatementthatweareattemptingtoaddress. Inthiscase,wehavethestartingassumptionthatan IEDthreatexistsinagivenregion,stateorlocality requiringtheIEDaffectedstateornumberofstatesto engageinaC-IEDenterprise.Asthisproblem statementisknown,nosuchquestionneedstobe includedinanyanalysistoidentifyC-IEDstrategic principles.

ReferringtoTable1,weseethatweareleftwith sevenquestionsinadditiontotheproblemstatement question.Thesequestionsare:

•Whatend-stateisdesired?

•Whatactionsaretobetaken?

•Whoaretotaketheactions?

•Whereareactionstobetaken?

•Whenareactionstobetaken?

•Whatrisksneedtobemanaged?

•Whatresourcesdotheactionsrequire?

ApplyingthesesevenquestionstoagivenIED threat,allowscommonthemestoemergeintermsof whatmaybemostandleastimpactfulinsupportofa regionallycoherentC-IEDenterprise.Inconsidering thequestion‘whatendstateisdesired’thereisa requirementtoidentifydetailedrealitiesofthedesired endstateofaregionallycoherentC-IEDenterprise. Thequestionof‘whatactionsneedtobetaken’can bechallengingwhendevelopingC-IEDstrategic principles.ForagivenIEDthreat,asignifcant numberofspecifcC-IEDactionscaninvariablybe listed;however,thesewillbecontextspecifc.The temptationtolistactionsneededaspartofaC-IED strategyshouldberesisted.Instead,generic guidanceonthemostappropriateactionstobe takenisrequired.However,thekeyfundamental C-IEDenablingactionof‘understanding’boththe problemandtheC-IEDeffortsinvestedin,isdeemed essential.

Thequestionof‘whoaretotakeactions’isan examinationofwhothestakeholdersareintheC-IED enterprise.Thisstakeholderanalysishastwoelements toit,namely,whoaretherequiredmembersofthe C-IEDenterpriseandsecondlywhoistoleadthis communityofstakeholders.Whenconsidering‘where areactionstobetaken’fromastrategicratherthanan operationalortacticalperspective,thisquestion considerswherewithinastateoritsinstitutions,C-IED effortsshouldreside.Likethequestion‘whatactions aretobetaken,’thequestion‘whenactionsaretobe taken’canbechallengingtoanswerfromastrategic perspective.Thisquestionaddressesthechallengesin identifyingappropriatemanagementstructuresand practicesacrossanyC-IEDenterprise,whichcanbe multistakeholder,complex,dynamicandeven competitive.Suchstructuresandpracticesgobeyond timingandsynchronizationtowidercrosscutting considerationsacrossallaspectsofmanaginga C-IEDenterprise.

Thequestionof‘whatrisksneedtobemanaged’has twoaspectstoitnamelywhatwilloptimizethe likelihoodofsuccessofanationalC-IEDenterprise andsecondlywhatthreatsneedtobemitigated against.Somerecurrentriskstypicallyarisesuchas

34 COUNTER-IEDREPORT,Spring/Summer2023

interalia;lackofunderstanding;lackofcoherence, coordinationandcooperationoftenleadingto unnecessarycompetitionandwasteofresources amongststakeholders;lackofpowerofenforcementto compelstakeholderstoengageeffectivelyintheC-IED enterprise;andfnally,theriskofsomeC-IEDefforts havingnegativecounterproductiveeffectswhich overalldamagetheC-IEDenterprise.

Thefnalquestionof‘whatresourcesdowerequire’ examineshowemploymentoftechnologyand equipmentcansupportanationalC-IEDenterprise mosteffectively.Havingundertakenthisanalysisto identifywhatisconsideredasmostandleastimpactful insupportofaregionallycoherentC-IEDenterprise, distillingthesefndingsinto‘whatgoodenoughmaylook like’intermsofstrategicC-IEDprinciplesispossible.

C-IEDDONORASSISTANCE – C-IEDSTRATEGICPRINCIPLES 35 counteriedreport.com
EndsWaysMeans → Demands → 7Questions → 5W+H → QuestiontoPose → Situation → Whatisthesituationand howdoesitaffectus? → Whyarewetaking action? → ProblemStatement–AnswerKnown Ends → Mission → Whathavewebeentoldto doandwhy? → Whatistobeachieved? → Whatend-stateis desired? Ways → Execution+ Command/ Authority → Whateffectsdoweneedto achieve? → Howarewetoachieve whatistobedone? → Whatactionsareto betaken? → Wherecanwebest accomplisheacheffect? → Whoaretotakethe actions? → Whoaretotakethe actions? → Whenandwheredothe actionstakeplacein relationtoeachother? → Whenareactionstobe taken? → Whenareactionsto betaken? Whereareactionstobe taken? → Whereareactionsto betaken? → Whatcontrolmeasuresdo weneedtoimpose? Additionalto5W+H → Whatrisksneedtobe managed?
Whatwilloptimizethe likelihoodofsuccess?
Means → Support → Whatresourcesdowe needtoaccomplisheach effect? → Whatresourcesdothe actionsrequire? → Whatresourcesdo theactionsrequire?
Table1.ProcessInDevelopmentoftheSevenQuestionFrameworkforC-IEDStrategicPrinciple.
Whatthreatsneedtobe mitigatedagainst?

CONCLUSION

WhenprovidingC-IEDdonorassistance,the importanceofastrategicapproachhasbeenoutlined.

C-IEDassistancedonor-recipientdynamicscanbe challengingformultiplereasons.C-IEDstrategic principlescaninformC-IEDstrategicguidancethatcan inturnbeusedtooptimizesuchdynamics.

HowregionallycoherentC-IEDenterprisesare establishedisuniqueandcontextspecifc.Theydonot needtohaveaspecifcstandaloneC-IEDstrategy.In general,withtheUnitedStatesanexception,most WesternnationsdonothavededicatedC-IED strategies.Instead,theirstrategicapproachto addressingtheuseofIEDsisembeddedwithinother nationalsecuritystrategiesordealtwithasalaw enforcementissueandforthisreasonthereisnoneed tohaveastandalonenationalC-IEDstrategy.Infact anyinstrument,publicationordocumentthat articulatesorservestocoordinatenationalC-IEDcan qualifyasanelementofsuchstrategy.However,the meritofastandaloneC-IEDstrategicdocumentshould notbedismissed.InthecaseofsomeIEDaffected statesorregionsrequiringC-IEDdonorassistance,the impactofIEDusecanbesogreatandowingtoalack ofsuitablesecurityforcecapabilitiesandcapacities, thatastandalonenationalC-IEDstrategymaybe necessary.

Oneperspectiveisthatpolicydocuments,doctrines, policystatementsandactionplanswhicharticulateCIEDstrategy,shouldprimarilybefocusedtoinform donorswheretheinvestmentoftheirmoneyisbest servedtocountertheiruse.Insomecases,C-IED strategymaybedevelopedtoappeasedonorswho seekreassurancethatthemoneytheyareprovidingis beingdoneunderastrategicapproach.Such strategiesmaybe‘papertigers’andnothave foundationinwhatisneededorachievableinsupport ofreducingIEDuse.However,byapplyingC-IED strategicprinciples,theriskofsuchanoutcomecanbe minimized.

Finally,wehaveprovidedaframeworkofseven questionstobeusedwhentryingtoestablishwhat C-IEDstrategicprinciplesbestsuitagivenIED affectedregiontoachievetherequiredimpactsand

outcomesfromC-IEDdonorassistance.Toemploythis frameworkinidentifyingoptimalC-IEDstrategic principles,itisnecessarytohaveappropriatekey stakeholderengagementandotherbaseline assessmentscompletedtoinformtheunderstandingof theIEDthreatbeingcountered.Theapplicationofthis methodologywillbethesubjectofasubsequentarticle intheCounter-IEDReportbasedonresearch conductedinEastAfrica.■

NOTES

1.VariousformsofC-IEDsupportthatanIED affectedstatecanreceivefromadonorwhich canincludeinteralia,training,mentoring, advising,accompanying,assisting,technology andequipmentprovisionandintelligencesupport.

2.Statecraftmaybeconsideredas“theskillof governingacountry”(CambridgeDictionary Online)“theartofconductingstateaffairs” (MerriamWebsterDictionary)or“theskilful managementofstatesmanship”(Oxford LanguagesLanguage.oup.com).

3.AccordingtoHarryYargerinhisarticleinTowarda TheoryofStrategyin GuidetoNationalSecurity PolicyandStrategypublishedin2006,ArtLykke gavecoherentformtoatheoryofstrategywithhis articulationofthethree-leggedstoolmodelof strategywhichillustratedstrategy=ends+ways+ means,andifthesewerenotinbalance,the assumptionofgreaterrisk.IntheLykkemodel,the endsare“objectives,”thewaysarethe“concepts” foraccomplishingtheobjectives,andthemeansare the“resources”forsupportingtheconcepts.

4.TherearemanywhoderidetheLykkemodelfor strategy,forexample,JeffreyW.Meisierauthored anarticleinParametersintheWinter2016-2017 editionentitled“AreOurStrategicModelsFlawed? Ends+Ways+Means=(Bad)Strategy.”

5.Tacticalisusedhereinitsmilitarycontext,referring tocarefullyconsideredactionsintendedtoachieve aspecifcaim.

6.Strategicinthiscontextisconsideredtheeffects IEDusehasattheatre,nationalorinternational levels.

36 COUNTER-IEDREPORT,Spring/Summer2023
C-IEDDONORASSISTANCE – C-IEDSTRATEGICPRINCIPLES

7.Linesofeffortinthecontextofplanning,usethe purpose(causeandeffect)tofocuseffortstoward establishingoperationalandstrategicconditionsby linkingmultipletasksandmissions.

8.TheIntergovernmentalAuthorityonDevelopment (IGAD)inEastAfricawascreatedin1996to supersedetheIntergovernmentalAuthorityon DroughtandDevelopment(IGADD)whichwas foundedin1986tomitigatetheeffectsofthe recurringseveredroughtsandothernatural disastersthatresultedinwidespreadfamine, ecologicaldegradationandeconomichardshipin theregion.Djibouti,Ethiopia,Kenya,Somalia, SudanandUganda–actedthroughtheUnited Nationstoestablishtheintergovernmentalbodyfor developmentanddroughtcontrolintheirregion.

Eritreabecametheseventhmemberafterattaining independencein1993.Withthenewemerging politicalandsocio-economicchallenges,the assemblyofHeadsofStateandGovernment, meetinginAddisAbabainApril1995,resolvedto revitalizeIGADDandexpandareasofcooperation amongMemberStates.Thenewandrevitalized IGADwaslaunchedduringthe5thSummitofIGAD AssemblyofHeadsofStateandGovernmentheld on25-26November1996inDjibouti.TheSummit endorsedthedecisiontoenhanceregional cooperationinthreepriorityareasoffoodsecurity andenvironmentalprotection,economic cooperation,regionalintegrationandsocial developmentpeaceandsecurity.In2011South SudanjoinedIGADastheeighthmemberstate.

9.Capacityreferstothemeansofanindividual/ organizationtoperformassigneddutieseffectively. Thisincludeshumancapacity(individualand collectivecompetenciesandexperience),physical capacity(appropriateassets)andinstitutional capacity(systems,structuresandorganisational cultureinplace).

10.Capabilityreferstothemeansofanorganizationor entitytobeprofcientinastatedactivityfromthe collectivecontributionofassetsandcompetencyof individualsandgroupstoundertakeitsafely, effectivelyandeffciently.

11.Thisreferstoagenericsetofsevenquestions whichmaybeappliedtoanyplanningscenario whichisadaptedfromthemilitarysevenquestion estimate.

ABOUTTHEAUTHOR

PaulAmoroso isanexplosive hazardsspecialistandhas extensiveexperienceasanIED ThreatMitigationPolicyAdvisor workinginEastandWestAfrica.He servedintheIrishArmyasanIED DisposalandCBRNeoffcer,upto MNTlevel,andhasextensive tactical,operational,andstrategicexperiencein PeacekeepingOperationsinAfricaandtheMiddle East.Hehasexperienceinthedevelopmentof doctrineandpolicyandwasoneofthekeycontributors totheUnitedNationsImprovisedExplosiveDevice DisposalStandardsandtheUnitedNationsExplosive OrdnanceDisposalMilitaryUnitManual.Heworksat presentintheMENAregiononSALWcontrolaswell asinwiderAfricaadvisingonnationalandregional C-IEDstrategies.HehasaMScinExplosiveOrdnance EngineeringandanMAinStrategicStudies.Herunsa consultancy,AssessedMitigationOptions(AMO), whichprovidesadviceandsupportinrelationto conventionalandimprovisedweaponsandexplosive hazardriskmitigation.Thisarticlerefectshisown viewsandnotnecessarilythoseofanyorganisationhe hasworkedfororwithindevelopingtheseideas.

Linkedinprofle: https://www.linkedin.com/in/paulamoroso-msc-ma-miexpe-60a63a42/

37 counteriedreport.com
C-IEDDONORASSISTANCE – C-IEDSTRATEGICPRINCIPLES

USEOFMASSMARKETCONSUMERELECTRONICSCOMPONENTSINIEDs

DEVELOPMENTFROMIMPROVISEDHOMEMADE TOMASSMARKETCONSUMERELECTRONICS COMPONENTSINIEDs

INTRODUCTION

Theelectronicsindustryemergedinthe20thcentury, andsinceitsintroductionintothelivesofordinary peopleasconsumerelectronics,ithasgrownand becomeatrillion-dollarbusiness.Thepredominant characteristicoftheconsumerelectronicsmarketisthe ever-increasingavailabilityofelectronicsproducts. AccordingtoMoore’sLaw,semiconductorcomponents gaindoubleperformanceeverytwoyears.Thistrend allowedanothertendency,thatoffallingpricesinthe consumerelectronicsmarket.Generally,ithas accountedforgainsinmanufacturingeffciencyand automation,aswellasfallinglaborcostsandoverall designimprovements.

Theconsumerelectronicsindustryisvaluedatmore than$1.3trilliontodayandisexpectedtoincreaseits marketvalueinthefollowingyears.Secondly,the globalconsumerelectronicsrepairandmaintenance marketcontinuestogrow,withanestimatedincreaseto $16.52billionin2020.

TheproliferationoftheRadioControlledImprovised ExplosiveDevice(RCIED)haspresentedalowcost, highlyfexible,andunpredictablethreattoC-IED operators.Highavailabilityofconsumerelectronicsand readilyavailableelectroniccomponentsareusedby threatnetworksintheconstructionofIEDs.

OftenthecomponentsusedinIEDsareeasily obtainablecommercialgoodssuchasfertilizer,bleach (peroxide),nailpolishremover,brakefuid,herbicides, disinfectants,andcleaningsolvents.Thetrade, transportationandstorageoftheseproductsistypically subjecttoalesserdegreeofscrutinyandregulation thanthetransportationandstorageofconventional munitions.ResearchonIEDshasnotrevealeddirect transportationofcommercialgoodsfromlegal manufacturerstoarmedgroups.Rather,smalllocal tradeentities,havingobtaineddualusegoodsfrom regionaldistributioncompanies,appeartobethe weakestlinkinthechainofcustody.1

Oneofthemostimportantelectroniccomponents usedinRCIEDsisthesemiconductor.Thecentral drivingforcebehindtheconsumerelectronicsindustry isthesemiconductorindustrysector,whichbyitselfhas annualsalesnearing$500billion.

AccordingtoINTERPOL,asaglobal,multibilliondollarcrime,organizedcriminalgroupshavenot hesitatedtocashinonthetradeincounterfeitgoods.In manypartsoftheworld,international,regional,and nationallawenforcementauthoritieshaveuncovered intricatelinksbetweenthiscrimeandotherserious offencesincludingillicitdrugs,moneylaundering,and corruption.Someestimatesputthecounterfeit business

38 COUNTER-IEDREPORT,Spring/Summer2023
1Counteringthethreatposedbyimprovisedexplosivedevices,UNGeneralAssemblyReport,25July2016. BySerkanKoc,Major(OF-3)TUR-A,ElectronicWarfareSpecialist,NATOC-IEDCoE

atwellinexcessof$250billionayear,andsomeportion ofthesecounterfeitgoodscanbeusedascomponents forRCIEDs.Amongthesecounterfeitgoods,thereare manyeasy-to-usecomponentssuchaspower distributioncomponents,transformers,switchgears, relays,contacts,timers,circuitbreakers,fuses, distributionboards,wiringaccessoriesandbatteries.2

BoththeAttacktheNetworksandDefeattheDevice pillarsofcounteringIEDsareusedinordertofghtthis evolvingthreat.Severalelectroniccounter-measures willbeusedinordertodetect,prevent,orneutralizethe RCIEDinanoperationalenvironment.However,these technologiesaresupportedwiththepropermeansof attackingthreatnetworksinordertoachievealongtermsolution.

RCIEDTHREAT

RCIEDsarethemostcommonIEDinitiationsystemin theworld.Thetriggermaninitiatesthedevice,sending anelectromagneticimpulsetoinitiatethefringchainor

toarmthemainswitch.Anyelectronicdeviceableto sendandreceiveasignalthroughelectromagnetic radiationcanbeusedasanIED(RCIED)trigger switch.Accordingtotheirtypesandqualifcations, theseswitcheshaveindividualadvantagesand limitations.Forexample,accordingtolatestreports3; inBahrain,RCIEDelectronickitsandvictim-operated PassiveInfra-Red(PIR)triggercomponentswereused together.Inthisscenario,theradio-controlledunits receivethearmingsignalfortheIED,whichfunctions onlywhenthePIRsensoristriggeredbythetarget.As seeninvariousIEDevents,constructionofanRCIED varies,basedontheintendedtargetandthefriendly forcecounter-measuresandTTPs.

AccordingtolatesttrendsintheuseofIEDs,terrorist organizationschoosedevicedesignprinciples accordingtotheintendedtargetandavailable materials.Whenthetargetisimportantandmustbe attackedespeciallyinconvoy,IEDsarearmedby mobileradiosbyusingapassiveinfraredsensor.For

2FocusonTheIllicitTraffckingofCounterfeitGoodsandTransnationalOrganizedCrime,UNOffceonDrugsandCrime FocusSheet.

3TheIEDThreatinBahrain,AcomparativeanalysisofcomponentsdocumentedintheGulfregion,ConfictArmament Research,2019. 4ibid.,p.38.

39 counteriedreport.com
USEOFMASSMARKETCONSUMERELECTRONICSCOMPONENTSINIEDs
APIRtriggerrecoveredfromBahrainiHezbollahmilitantcellsin2017-20184

thesecurityofthedeviceandfortheprotectionofthe triggerman,asecondary,andtertiarymeansof initiationareincorporated.Regardingtherender-safe procedures,thiscomplexdesignseriouslycomplicates themitigationtaskofEODoperator.Accordingto reports,approximately36percentofallEODoperator deathsinthepasttwodecadeshaveoccurredduring clearanceofcommand-initiateddevices.

RCIEDsuseawidevarietyofcommercialand homemadetransceiverandreceiversetstosendthe wirelessinitiationsignalfromvariabledistances.There areseveraltypesofelectronicdevicesabletotransmit indifferentfrequencieswithvariedpower.Forthelast twodecadesseveralRCIEDswitchvariationssuchas; DualToneMultiFrequency(DTMF),LongRange CordlessTelephones(LRCTs),PersonalMobileRadios (PMRs),CarAlarms,RCControllersfortoys,telemetry devices,severalwirelesscommunicationdevicesand cellphoneswereusedbyterroristorganizations.The workingfrequenciesofconsumerelectronics(CE)can

varygreatlyfromregiontoregionduetodifferentlegal requirements.Thefrequencyrangesof,forexample, RCtoyswiththesameexternalconstructioninAsia differconsiderablyfromAfrica,EuropeorAmerica. SinceitcannotnecessarilybeassumedthatCEare onlypurchasedintheoperationalarea(theInternet makesitpossiblewithoutrestrictions),thetechnical exploitationandtheevaluationreportresultingfromit areofessentialimportanceforasuccessfuldefense againstthethreat.

Historically,itemsusedforanIEDbyoneterrorist organizationarealsousedbyotherterrorist organizations.Forexample,RCIEDcomponents capturedfrommilitantsinBahrainandHouthirebelsor AQAPmilitantsinYemenhaveverycommonelectronic componentswhichcanbeorderedinmassamounts. Asimplerelay,usedtoswitchonandoff,andtocontrol ahigh-powerelectronicdevice,canbeobtainedin massamountsandisusedinmosttypesofRCIEDs. Thistrendisalsoobservedinmicrocontrollers.

5ibid.,p.50.
40 COUNTER-IEDREPORT,Spring/Summer2023
USEOFMASSMARKETCONSUMERELECTRONICSCOMPONENTSINIEDs
Components RCIEDkits andPIR sensorsin Bahrain HouthiRCIED kitsandPIR sensorsin Yemen HouthiUAVs inYemen IslamicState inYemen/ AQAP RCIEDs IslamicState ofIraq RCIEDs HKESignalRelay X X X X X MicrochipMicrocontrollers X X MicrochipAtmel Microcontrollers X X MicrosemiMT8770DEDTMF Receiver X X NaisAGN2004HPowerDelay X X OmronGS6K-2-HPCBPower Relay X X X PanasonicSignalRelay X PrincetonTechnologyCorp PT2262RemoteControlEncoder X STMicroelectronicsVoltage Regulators X X X X X WoeHeat-ShrinkWrap X X X GreyCable X X X ElectronicComponentsinIEDsinArabianPeninsulaandIraq2016-2018 5

CountryName

DesignPrinciples ofTerrorist Organizationsin LatestIEDs

TypesofIEDs usedbyTerrorist Organizations UsedMaterial

NotesonindividualTerrorist Organization

Democratic Republicof theCongo

Simpledesign withmilitaryor dual-use commercial components

CommandWire

Recovered Militaryand/or Commercial Explosivesand Detonators

Nigeria

Simpledesign withmilitaryor dual-use commercial components

VictimOperated Person-Borne

Anincreaseinthetechnical capacityofarmedgroupsto diversify,designanddeploy increasinglysophisticateddevices hasbeenobserved

Somalia

Dual-use componentsand chemicals

Vehicle-Borne

Military explosives harvestedfrom explosive remnantsofwar

Al-Shabaabusinghome-made explosivesdemonstratesthat deviceconstructionmethodshave diversifed

Colombia

Complexdesign toselecttarget

Commandinitiate dimprovised explosivedevices

Diversifcationcouldindicatean increaseintechnicalcapacity amongarmedgroups

Yemen

Anti-personnel minesofan improvisednature

Improvised PressurePlates

Massproduction ofIED components

Newtacticsinthedesignand deploymentofvictim-operated devices,includingdisguising devicesasrockstohindertheir identifcationbyclearanceexperts

TheinformationtableisdevelopedbasedontheCounteringthethreatposedbyimprovisedexplosivedevices, UNGeneralAssemblyReport,17July2020.

AccordingtolatestreportsfromUN,thetechnical capacityofarmedgroupstodiversify,design,and deployincreasinglysophisticateddeviceshas improved.TheinformationonrecenttypesofIEDs, designprinciples,andmaterialsusedindifferent regionsisseeninthetableabove.

Inrecentyears,severalbrandedelectronic components–includingmicrocontrollers,power relays,andvoltageregulators–areconsistentacross RCIEDsrecoveredinBahrainandRCIEDsandUA (UnmannedAircraft)recoveredfromtheHouthisin Yemen.6

41 counteriedreport.com
USEOFMASSMARKETCONSUMERELECTRONICSCOMPONENTSINIEDs 6AGuidetoIllicitIranianWeaponTransfers,TheBahrainFile,AtlanticCouncil,TimMichetti,December2020. PIC16F628AMicrocontrollers.

TRENDSINCONSUMERELECTRONICSMARKET

Beforeanalysingtheeffectsoftrendsinconsumer electronicsmarketonIEDs,itisbenefcialtomakea cleardefnitionofwhatconsumerelectronicsinclude.

Intermsofdifferentapproaches,consumerelectronics areclassifedinfourdifferentways:

Inaccordancewith“ImprovisedExplosiveDevice IEDTechnicalExploitationLexicon5thEdition(2017)”:

•“ConsumerElectronics”conceptislimitedto:

◦RadioControlledToy

◦ApplianceController

◦GarageDoorOpener

◦DoorBell

•Butthisconceptwouldnotinclude:

◦Hand-HeldRadio

•PersonalMobileRadio(PMR)

•RadioTransceiver

◦Non-Hand-HeldRadio

•TaxiRadio

•TrunkMountRadio

◦CordlessPhone

•LongRangeCordlessTelephone(LRCT)

•HighPowerCordlessPhone(HPCP)

◦MobilePhone

•GlobalSystemforMobileCommunications (GSM)

•CodeDivisionMultipleAccess(CDMA) phone

◦CustomRadioControl

•WirelessCustomReceiver(WICR)

•DualtoneMultiFrequency(DTMF)MOD1-5

•Multi-hopWirelessSensorNetworksusing RadioFrequency(Multi-hopRF)

•FireworksController

◦Telemetry

•Linx(DigitalEnhancedCordlessTelecommunicationsDECT)

•Maxstream(Radiomodems)

•Others.

42 COUNTER-IEDREPORT,Spring/Summer2023
USEOFMASSMARKETCONSUMERELECTRONICSCOMPONENTSINIEDs Omron,NAISandHKEBrandedPowerRelays. STMBrandedVoltageRegulators. DTMFReceiverBoards.

Ifconsumerelectronicsareconsideredfromapoint ofviewofthewidestpublicapproach,accordingto latestestimatestoday,theconsumerelectronics industryisvaluedatmorethan$1.3trillion,andis expectedtogrowsteadilyinthefollowingyears. Emerginganddisruptivetechnologiesandinnovations willcontinuetodrivethemarket.Inaddition, capabilitiesofnewproductsfostercustomer expectations,andconsequentlytheappetitefor spendingonnewtechnologycontinuestogrow.

Threatnetworkscontinuetousecommercialoff-theshelf(COTS)componentsinthemassproductionof IEDs.Especiallytheeasyaccessibilityofcommercial radiocontrolledtransmittersandreceiverkitsfacilitates deviceproductionofadependableandsafeIED.The programmabilityofmicrocontrollersandtheavailability ofawiderangeoffrequenciesavailabletooperate makestheRCIEDaneffectivetoolagainstfriendly forces.Withtheexpanseofthecommunication electronicsmarketandeasyavailability,RCIEDs requirelittleornomodifcation.MobileradiosorRF transmittermodulesaremorecapablethanever,are

easilyusedasthefringswitchwithinaRCIED.In general,consumerelectronicsdevicesavailableinthe marketareofhighquality,reliable,andofcheapcost duetomassproduction.Theyarealsosoftware adaptableanddesignedtooperateinacongested electromagneticenvironment.

InthepastThreatNetworkswereselectingamong specifcfrequencieswhichareavailablefortheRF deviceortransmittermoduleinthemarket.

Thehighavailabilityofthesedeviceshasstemmed fromtheoveralltrendintheconsumerelectronics market.Themiddle-classpopulationisincreasing worldwide,inthepastfewyears.Moreover,urban consumershavebeenindicatingashiftinlifestyle. Soaringinternetpenetrationandincreasingincomeare allowingconsumerstousemultipleelectronicdevices. Thiswillcontinuetofuelthemarketgrowthoverthe nextfewyears.7

Traditionallyoneofthemostimportantdesign principlesforanyterrorististooperatetheRFdevice effectivelywhiletriggeringtheIEDfromasafe distance.Becauseofthislimitation,terroriststendto

USEOFMASSMARKETCONSUMERELECTRONICSCOMPONENTSINIEDs 43 counteriedreport.com
ConsumerElectronicsRevenues(USD,millions). 7ConsumerElectronicsMarketRevenuestoRakeinataCAGRof15.4%,SmartphonestoContinueDominanceover 2016-2020,PersistentMarketResearch,23December2016.

selectcommunicationchannelsthatareclearand effcientenoughtosendthesignaltothereceiver.For counter-measuredevelopment,engineersandIED expertshavefocusedmainlyonoperatingrange.The constrictionofhealthycommunicationchannelsofthe RFdevicesavailableinthepasthasledtorelatively

narrowfrequencybandsinjammers.Consideringthe abundanceofdifferentelectroniccomponentsinthe markettoday,terroristnetworkshaveawiderangeof availablefrequenciestooperateinordertotrigger theRCIED.

Counter-measuresagainstRCIEDswerefocusing onnarrowfrequenciesinthepast,buttoday’s consumerelectronicsmarketpresentsthemost effcient,effectivedevicesforverycheapprices.With commerciallyavailableRFdevicesrangingfromafew MHztomanyGHz,therangeofpossiblethreatsspans nearlytheentireRFspectrum.Thesedevicesare

44 COUNTER-IEDREPORT,Spring/Summer2023
USEOFMASSMARKETCONSUMERELECTRONICSCOMPONENTSINIEDs SimplePMRsinthepast446Mhz. ReadyWirelessRCSwitches(25Euros). PassiveInfra-RedSensors(0.44Euros). Today’sChineseBaofeng(20Euros)136-174,144-148,400-480,430-450Mhz.

obtainedinlargequantities.Asaresultoftheextentof potentialRCIEDoperatingfrequencies,CounterRCIEDdesignersshouldtakeintoaccountallofthe availablefrequenciesinRFdevices.Ontheother hand,anintelligentRFprofessionalcanmake modifcationstoanykindofRFdevicetoadaptit againstfriendlyforces’electroniccounter-measures.

Newtechnologieshaveenabledthreatnetworksto producetheirowndesignsinaneasierway.With additivemanufacturingor3Dprinting,threedimensionalproductscanbecreated(suchasnew designsforIEDcontainersetc.)bylayeringmaterial usingacomputerizedprocess.Reducedprocess time,costreduction,andbetterqualityand improvementsinthedesignofthefnalproductare beneftsobtainedfromthisemergingtechnology.With theadventof5G,InternetofThings(IoT),anothernew technologywillbeavailableforthreatnetworksand canbestartedtobeemployedinthenearfuture.In thiswayanecosystemofelectronicdevicesis connectedtothesamenetwork(inhere5G),andcan beaccessedremotelyandIEDattacksareexecuted fromadistancewiththeuseofsensortechnologies andconnecteddevices.

Additionally,the5Gtechnology,withitsdisruptive nature,seemstoaffectnotonlytheadversarieswho areaimingtousethistechnologyformoreeffective IEDattacks,butalsofriendlyforceswhoaretryingto developcounter-measuresagainstthistechnology.

Fromthepointofviewoffriendlyforces,the5G technologywillleadtotheemergenceofnew equipmentwithnewcapabilitiesintherealmof intelligence,surveillance,andreconnaissance(ISR) systems,command-and-controlapplications,manned andautonomousvehicles,anddrones.Inthisway5G willincreasethesituationalawarenessoftheIED operator.Especially,abetteruseofremoteand autonomousvehicleswithanumberofsensors connectedthroughtheInternetofThingswillincrease thestand-offdistancesoftheIEDoperatorinthe approachtotheexplosivethreat.Ontheotherhand,

theabilityforinterconnectionofdifferentequipment andsensorsenablesadversariestoplanmore complexTTPsintheoperationalarea.

However,5Gtechnologycomeswithsome restrictions,suchastherangeof5Gconnectivityis limitedbecausefrequencywavescanonlytravela shortdistance.Inordertodeliver5G,newantennas mustbeinstalled.Thisisataskwhichisboth expensiveandtime-consuming.Additionally,thereare limitationsforthreatnetworksforruralaccessto thetechnology.

ThenextthreatinNATOcountriesandAfricanareas ofoperations/crisis,isexpectedtocomefromCOTS UA(UnmannedAircraft)whicharecarryingIEDs. Advancedmanufacturingallowstheproductionoftens ofthousandsofsmall,smart,andinexpensivedrones. Itcombinesadditivemanufacturing(a.k.a3Dprinting), robots,andartifcialintelligencetomassivelyincrease thespeedandqualityofmanufacturing.Ofparticular importanceinsmalldroneproductionistherapid printingofcompositematerial.Todayacommercial3D printeris100timesfasterthanpreviousprinters.In additiontospeed,thecontinuingmassiveinvestment in3Dprintinghasimprovedbothqualityand complexityofmanufacturedproductswhilereducing prices.Priceshavedroppedtopointwhereweekend hobbyistsareprintingtheirowndrones.8

FromaC-IEDpointofview,anyplatformand technologythatcancarryexplosivestothetarget,or thatcanenablebetterTTPsforthreatnetworks,should beregardedasanareatoconsiderwhiledeveloping effectivecounter-measures.Withtheadventof emerginganddisruptivetechnologiessuchasArtifcial Intelligence,InternetofThingsandAutonomy,both friendlyforcesandthreatnetworkswillhavenewtools intheirtoolbox.

CONCLUSIONS

IntermsofDefeatingtheDevice,readilyavailable consumerelectroniccomponentsarebeingusedby threatnetworksintheconstructionofIEDs.According

45 counteriedreport.com
USEOFMASSMARKETCONSUMERELECTRONICSCOMPONENTSINIEDs 8T.X.Hammes,TechnologyConverges;Non-StateActorsBeneft, https://www.hoover.org/research/technology-convergesnon-state-actors-beneft

tolatesttrendsintheuseofIEDs,terrorist organizationsarechoosingtheirdesignprinciples accordingtotheirtargetsandavailablematerials. Consumerelectronicsdevicesavailableinthemarket areofhighqualityandcheapduetomassproduction. Inaddition,theyaredesignedtooperateinacontested electromagneticenvironment.Non-LinearJunction DetectionandHigh-PowerElectromagneticscanbe theareastofocusoninthefuture.

IntermsoftheAttackingtheNetworkspointofview, thetrendstoahigheruseofmassmarketconsumer electronicswithoutmodifcationasRadioControlled IEDswitchesbyThreatNetworksarewidelyevidenced inAfrica,whichseemsnottobethetypicalcaseinthe restoftheworld.Itseemslikethepotentialuseofmass marketconsumerelectronicsbyThreatNetworksis mainlyaffectedby:

Leveloffnancing

Higherbudgetsseemtoberelatedtolessuseof consumerelectronics,somostlyfocusingon homemade/semi-industrialRCdevicesand/or modifedelectronicdevices.

Availabilityofexperiencedinstructors(internalor externaltothegroup)

Therelativelackofspecialistsinelectronicsand/or thelackofexperiencedIEDinstructorspositively infuencesthepredominanceofconsumerelectronics over homemade/ modifed electronicdevices.

Levelofexternalsupport

Greaterexternalsupportisrelatedtolessuseof consumerelectronics,somostlyfocusingon homemade/semi-industrialRCdevicesand/or modifedelectronicdevices.

Availabilityofimportedgoods

Alowervarietyormorediffcultaccesstoimported goodscouldleadtotheuseofavailableconsumer electronics.

Adecreaseduseofhomemade/ modifed electronicdeviceswouldreduceopportunitiesfor theidentifcationofspecifcbombmakers

signaturesrelatedtodifferentincidents.Usingmass consumerproductswouldmakeithardertoidentify specifccommonsignaturesfromelectronicexperts andmaketrackingofcomponentsmorediffcult regardingdifferentincidentsfromareasof operations. ■

Disclaimer

Thisarticledoesnotrepresenttheopinionofany nationalormultinationalorganisation;itswholecontent shouldonlybeconsideredastheopinionoftheauthor. Asalltheinformationhasbeenobtainedfromopen sources,potentialmistakescouldhavebeenmade duringtheresearchprocess.Pleasefeelfreetosend yourcomments,correctionsandinputstotheauthor, theywillbehighlyappreciated.

ABOUTTHEAUTHOR

MajorSerkanKoç wascommissionedintotheC-IEDCentreof ExcellenceasanElectronicWarfare SpecialistintheDefeattheDevice BranchinAugust2020,and organized5thNATOC-IED TechnologyWorkshopinSegovia/ Spainin2022.AsanElectronics EngineerOffcer,hisbackgroundhasbeenmainly basedonIEDcounter-measureactivitiesandproject management(R&Dandprocurement)asElectronic WarfareOffcerintheTurkishArmyHeadquarters.In additiontohiselectronicsengineeringeducation,he hasanM.A.degreeinTechnologyManagementfrom TurkishMinistryofDefence,DefenceScienceInstitute andSystemsEngineeringprogramdegreefromU.S. NavalPostgraduateSchool.Hecurrentlycontinueshis PhD.Program.

Email: skoc@ciedcoe.org

46 COUNTER-IEDREPORT,Spring/Summer2023
USEOFMASSMARKETCONSUMERELECTRONICSCOMPONENTSINIEDs

AIRBORNEMAGNETICS-AVIABLETOOLFOR DETECTIONANDQUALITYCONTROL

Thescopeofthisarticleistoillustratethecurrent stateofairbornemagneticsasacommercial andviablesolutionalreadyinuseworldwidefor commercial,defense,buthumanitarianapplications. Thelastdecadeoftechnologyevolutionbroughta massiveinnovationintheareaofremotelyoperated platformsonland,waterandintheair.Self-established vehicleswithopen-sourcesoftwarewerereplacedby commercialofftheshelfsolutionsintegratingavast

numberofsensorsforoperation,navigatingand obstacleavoidanceinthefeld.

Unmannedaerialvehicles(UAVs),Unmannedground vehicles(UGVs)andUnmannedsurfacevehicles (USVs)arealreadyindailyoperationformanifoldtasks likesurveillanceofproperties,industrialinspectionand monitoringofmachineriesorindustrialchimneys, agriculturalsupport,parcelservices,orthophotography and3Dmodellingofminingareasorbuildingyards.

AIRBORNEMAGNETICS
47 counteriedreport.com
SENSYSMagDroneR4operatedwithaDJIM300overamilitarycontaminatedarea.

Sensitivefeldslikethesearchforanddetectionof bombs,ammunition,minesandIEDsarestill underdevelopedoratleastthecommercialsolutions areunderrated.Anumberofgrantsandscientifc studiesalreadyledtoverydifferentsolutionsusing largedronestocarryground-baseddesigned equipmenttoshowcaseanewapproachtothe hazardousgroundworkofpeoplewithinminefelds. Attheend,thechallengesoffnancingatruly technology-drivensolution,turninglaborcostsand competenciesupsidedownaswellashavingdifferent technicalsolutionsforsingleusecases,made remoteoperatedsensorplatformslessattractive. Nevertheless,themarketoffersafewtechnology packagescombiningacommercialdronewith additionalcomputingpowerandmagnetometersfor simple,butprofessionaluseinthefeldofUXO detection,areaobservationandprojectqualitycontrol.

SENSYSisamanufacturerofmagnetometerand TimeDomainElectromagnetics(TDEM)solutionsfor monitoring,detectionandanalysisofareasand objects.Thecompanywasfoundedin1990andis basedinGermany,EastofthecapitalBerlin.Since then,thecompanygrewto50employees developing,producingandservicingsingleFluxgate Magnetometers,hand-helddevices,multi-sensor systemstobeoperatedbyman,carorremote platformsonland,underwaterorintheair. Commercialcompanies,thedefenseindustry,military andNGOsareusingtheequipmentinmorethan90 countriesworldwide.SENSYSproductsaredesigned forsimpleoperationinharshfeldconditions, providingexcellentdata.

ClientslikeAIRBUS,Rheinmetall,SafeLaneGlobal andmanyothersrelyonSENSYSsolutionswithin theirprojects.

ThecompanyfocusonFluxgateMagnetometers allowsSENSYStooptimizethesensortechnology andenablecustomizationfordifferentapplications. Magnetometersarepassivesensorsthatarerecording magneticintensity.Comparabletotheprincipleofa temperaturesensor,Fluxgatesmeasureatthepointof thesensoritself(notatanydistance,norhavinga certainangleofoperation).ThatwayaFluxgatesensor

isalwaysmeasuringtheEarth’sMagneticfeld.Ferrous objectsaredistortingtheEarthmagneticfuxlinesin theirproximity.Thus,whenasensorcomesclosetoa buriedobject,itdetectstheanomalyintheEarth’s magneticfeld.AssuminganambientEarth’smagnetic feldofaround60,000nT,thesensornoiseofSENSYS producedFluxgateMagnetometersisaslowas 0,006nT;therefore,SENSYSsensorscandetect changesinthemagneticfuxaslowasthe10millionth partoftheEarth’smagneticfeld.

Theillustrationoppositeshowshowfasta magneticfeldofanobject(physicallydescribedvia itsmagneticmomentinAm2)decreasesover distance.Thatmeans,thatthebestchancefor detectingofburiedobjects,isalwaysbygettingas closeaspossibletoorevenintotheground(e.g. borehole/drillingsurveys).

Thejourneytowardsairbornesolutionsstartedin 2015,whenSENSYSinvestigatedintodrone-based Magnetometersurveys.Usingaself-assembled octocopterwithanopen-sourcecontrolsoftware,frst fightswerebumpyandtobesafewemaintaineda distancetogroundofseveralmeters.Theapproachof hangingtheverysensitiveFluxgateMagnetometers awayfromthedronewasgood,butnotpracticalatall asthatresultedinunstablefightcontrolsofthedrone. Thesensorswereswingingheavilyduringfight,so thataprecisepositioningofthesensordataonthe colorcodemagneticmapwasimpossible.Also,at thistime,standardizedinterfacestothedrone(GPS, control,power)werenotavailable,sothatthedrone integrationwasahassle.

Withtwoyearsofresearch,trialsandprototyping, SENSYSfocusedonacompact2-sensorsolutionwith itsownbattery,GPSanddatastorage,calledMagDrone R3.Withonly800gweightandnoeffortstointegrateand fythedeviceitrapidlymadeitswayintoGeophysics, MiningandExploration.Everybodywhohadtooperate aCessna,twopilotsandheavyequipmentonboard couldnowcoverthesamework(andproducebetter data)withabackpackloadedwithasmallcommercial droneandtheSENSYSMagDroneR3surveykit.

Withagrowingmarketaskingformoreeffcient solutions,SENSYSreleasedthe5-sensorMagDrone

48 COUNTER-IEDREPORT,Spring/Summer2023
AIRBORNEMAGNETICS

R4in2020offeringa2.5mspan/swathtobemounted onmostcommercialUAVswith2kgpayload.The systemhas5sensors,separated50cmfromeachother. TheinstalledFluxgatesaretriaxialMagnetometers, whereasallaxes(x,yandz)fromeachsensorare recordedseparately200timespersecond,generating 18,000measurementvaluesperminute.The200Hz samplingratesallowforfastfightswithoutlosingdata density.Atthesametime,thelowweightofthe MagDroneR4supportstheuseofsmalldronesand stablefightconditions.

Atthesametime,DJIreleaseditsfagshipmodel M300andtheLatviancompanySPHEngineering reachedapointinproductstabilitywiththeirUgCS SkyhubTTF(trueterrainfollowing).UsingtheM300as themainplatformandaddingtheSkyHubfor overrulingDJI’sfightcontrol,enablesustoconduct

closegroundfightswithterrainfollowingmode. Furthermore,theSkyHubcontrollercanexportthe DJIGPSinformationandforwardtotheSENSYS MagDroneR4foradirectRTKGPSbased georeferencingofallmeasurementdata.With controllableinterferencesofmountingtheMagDrone R4directlyintothelandinggear,thesetupoftheUAV magnetometersurveysystemisascompactas possible,aswellasitensuresanexcellent maneuverabilityoftheUAV.ApowerfulMagDrone DataToolcanprocessandflterthedatatocancel detectedrotornoiseoffthesurveydata,concentrating onburiedstructuresandobjectsintheground.

TheuseoftheMagDroneindozensofcustomer projectsshowsthatthisproductiswaybeyondbeing developed,ithaslongbecomeanex-stockoff-theshelfsolutionforourmarkets.

AIRBORNEMAGNETICS 49 counteriedreport.com
Illustrationofrapiddecreaseofmeasurementvalue(innT)overdistance(inm).

AIRBORNEMAGNETICS

TofurtherapprovethecombinationofDJIM300, SkyHubcontrollerandMagDroneR4magnetometerkit forthedetectionofferromagneticmines,theCroatian MineActionCentre–CentreforTesting,Development andTraining(HCR-CTRO)conductedafeldsurveyon theirBenkovactestsite,whichhas90ferromagnetic minesburiedatdifferentdepthsupto25cm 1 .The resultswerepresentedatthe19thInternational Symposium–MineAction2023,inVodice,Croatiaon May4thtoprovideawarenessofthecapabilitiesof suchadetectionsystem.

AnothercampaignwasexecutedbytheHeinz SielmannFoundationandtheGermanInstitutefor FederalRealEstate(BImA)onthegroundofthe foreignmilitarytrainingrangeKyritz-RuppinerHeide withtheso-calledBombodromascentraldropzone, NorthofBerlin.SincetheKyritz-RuppinerHeidehas beenintensivelyusedformilitarypurposesbythe Sovietarmedforcessince1950andlaterbythe GermanFederalArmedForces,upto1.5milliontons ofexplosiveordnancearesuspectedaroundthe formerBombodrom.

Nowadays,theHeinzSielmannFoundationis responsibleforthemaintenanceoftheheath,itis importanttodefnecontaminatedareasandtomakeit easiertoplanboththeriskandtheuseoftechnology onthesecontaminatedareas.

Arangeofdifferentammunitionwassurveyedto formulizethecapabilitiesandlimitsoftheairborne surveysystem,whichwillhelptobetterplanpre-scansof areasforriskmitigationaswellastheimplementationof qualitycontrolchecksbeforeandafterfeldwork.The resultsarepromisingaslongasthefeldconditions allowedforshallowfightintherangeof0.5to1mabove theground.Sincealotofammunitionisoflessferrous material,themagneticsignatureoftheseUXOitemsis weak.Forexample,somesmallcasesof20mm,23mm and30mmdiameterwerehardtodetect,whereasallthe grenadesof57mmdiameter,TM62tankmines,piecesof mortarshellsandsteelwireswereclearlydetected. Hence,thesurveysystemneedstooperateclosetoand bestableabovethegroundatconstantconditions(also withinthedrone)tobeabletodistinguishmagnetic noisefromUAVmovements,electronicsandrotors.

50 COUNTER-IEDREPORT,Spring/Summer2023
UAVdetectionsystemconsistingofDJIM300,SkyHubcontrollerandMagDroneR4.
AIRBORNEMAGNETICS 51 counteriedreport.com
MunitiondetectioncapabilitytestatKyritz-RuppinerHeideusingairbornemagnetics. Resultsofairbornemagneticssurveyat1meteraltitudeabovegroundlevelatKyritz-RuppinerHeide.

Asexplainedinitially,Magnetometersdonothavean openingangle,butoperateatthepointoftheirsensor head.Becauseofthat,ascanoftheentireareais required.Theusualdistancebetweentwosensor tracksis25or50cm.AstheMagDroneR4hasa sensorframewithsensorsat50cmspacingeach,the UAVdetectionsystemneedstofyalineevery2.5m.

With30-40minutesfighttimewithhot-swappable batteriesthedailycoveragecanbeupto30 hectares.Such,thatwasdoneduringahistorical studybytheBavarianStateDepartmentof MonumentsandSitesatGanacker,Bavaria 2 .This siteisaformer“Luftwaffe”operationalairfeld.Since February1945andunderinhumaneconditions, forcedlaborerswereusedtobuildarunwayforthe MesserschmittMe-262jet-poweredfghteraircraft. Towardstheendofthewar,theairfeldwasattacked severaltimesbyAlliedairforces(low-levelattacks

andbombardments).Within4days120haofdata weregenerated,fying8hourseachday.Thetracks wereupto700meterslong,wheretheDJIM300was fyingwith5meterpersecondat1meterabove groundlevel.Downtimestochangebatterieswere around30secondseach.

Especiallyforhistoricalandinfrastructuralsurveys, thedensecoverageofanentireareaallowstoreveal thebiggerpictureofactivities,buriedinfrastructure andlinkbetweensingleanomaliesintheground.

Thebeneftsofusingaerialapproachesare obvious.Withnocontacttotheground,thesafetyof involvedoperatorsandEODtechniciansisincreased asnobodyneedstoentertheareaofinterest.Radio connectionbetweenUAVandoperator’scontrolleris severalkilometers,whichallowstoalsosurveylarge areasfromoutside.Anotheradvantageistheprecise GPSandaclick-and-tickpre-fightplanningofthe

52 COUNTER-IEDREPORT,Spring/Summer2023
AIRBORNEMAGNETICS
120haofseamlessdata,generatedwith4daysofaerialmagneticssurveyatGanackersite.

surveyareaandfightlinesofthedrone.The operatorisnotsteeringtheUAVanymore,butonly actingasasupervisorandbackupincaseoffailure. Duringnormaloperation,theUAVcanfyvery straightandprecisetracks,havinganonboard obstacledetectionand(preferably)thetrueterrain followingmodecontributingtoincreaseeffciencyof datagenerationandfeldcoverage.Last,butnot leastistheadvantageofredundancy.Ononeside, thefailureofasinglesensorinamultisensor’s systemsismuchbetterdetectedandcompensated bytheothersensors.Withpre-plannedautomated fightsanddatacollection,asurveycanberepeated anytime.Thatallowsacomparisonbeforeandafter, whichopensthedoorformoreeffcientqualitycontrol mechanismswithinsensitiveprojectssuchasUXO andmine-clearance.

Insummary,theindustryreachedapointin technologyweretheuseofUAVswithinsensitive projectsonhazardousareasisviableintermsof achievementscomparedtothemoneytoinvest,as allusedproductsarecommerciallyavailable.The presentedairbornemagnetometersystemusing theDJIM300,theSkyHubcontrollerandthe MagDroneR4isalreadyinuseonanumberof formermilitarysitessuchasinGermanyorthe Ukraine.Withapre-planningofthesurveyarea,the UAVwillworkitswayautonomouslythroughthefeld atminimumheightsof0.5to1meter,5meterper secondfightspeed,entirelycoveringupto30 hectareswithinasingleday.InthecontextofEOD, suchasystemisdetectingshallowsmallferrous itemsuptodeeplyburiedlargebombs.Thisprovides agreatchancetointegrateaUAVbased magnetometersystemintolargeareainvestigations orfollowonqualitycontrols

Achallengesurelyremainswithnon-ferrous objects,suchasminesorIEDsaswellassurveying onhighlymineralizedsoils.Thisisduetothe natureofmagnetics.AtSENSYS,thischallengeis underinvestigationoptingforelectromagnetic sensorstobeintegratedorevencombinedwiththe Fluxgatesensorstomaximizethedetection capabilities. ■

REFERENCES

1 MilanBajić,MarkusSchikorra“Detectionofferromagnetic landmineswithaUAV-basedmagnetometer,demonstration, andverifcation”,MineActionSymposium2023

2AndreasStele1,RolandLinck,MarkusSchikorra“LargescaleUAVmagnetometryonaformerWorldWarIIairfeld atGanacker(LowerBavaria,Germany)”,DGG2022

ABOUTTHEAUTHOR

Since2016, WolfgangSuess is oneoftheManagingDirectorsat SENSYSandresponsibleforSales, MarketingandStrategicGrowth. Before,heworkedforglobal companieslikeAIRBUSIndustries andBOMBARIDERTransportation inseveralrolesinEngineering, ProductDesignandInnovation,afterhefnishedhis studyofInformationTechnologiesin2004.

AIRBORNEMAGNETICS 53 counteriedreport.com

NEXT-GENERATIONDEMININGWITHAIANDDRONES

NEXT-GENERATIONDEMININGWITHAIANDDRONES

ADVANCEDSOFTWAREALGORITHMSPOWERNEXT-GENSOLUTIONS

FORAUTOMATINGTHREATDETECTIONANDIDENTIFICATION

BySafeProAI(aSafeProGroupInc.Company)

AccordingtoLandmineandClusterMunition Monitor1, a signifcantportionoftheglobeiscontaminated bylandmines,asthisinfographicdemonstrates.The explosiveremainsofwarandlandminesbothpresent asignifcantandongoingthreattocivilians.These

weaponscanbefoundonroads,footpaths,farms, forests,deserts,borders,inandaroundhomesand schools,andotherplaceswherepeoplegoabouttheir dailylives.Theydenyaccesstofoodandwaterand hinderthedeliveryofhumanitarianaid.

1 http://www.the-monitor.org/en-gb/reports/2022/landmine-monitor-2022.aspx

Landminecontamination map2022.

54 COUNTER-IEDREPORT,Spring/Summer2023

NEXT-GENERATIONDEMININGWITHAIANDDRONES

THENEEDFORNEXT-GENMINEDETECTION

Artifcialintelligenceanddronescanbeusefultoolsin thede-miningprocessinbothactiveconficts zonessuchasUkraineorinpost-combatareassuch asAfghanistan,Kuwait,orBosnia&Herzegovina. AccordingtorecentdatafromStatistaandthe InternationalCampaigntoBanLandmines–Cluster MunitionCoalition,thethreatofanti-personnel landmines andunexplodedordnanceispresent inover60countriesacrossAfrica,theMiddleEast, SouthAmerica,SoutheastAsia,andthroughout mainlandChinaandRussia.Theseexplosivedevices exposemillionsofcivilianstolife-threatening injuriesanddeathonadailybasis(7,000+casualties peryear).

Theglobalscopeandscaleoftheissueconfrmsthe inadequacyoftoday’smanualdeminingprocessas beingslow,labor-intensive,anddangerous.Thatis whySafeProAIbelievesthereisaclearneed forinnovativeandpracticalwaystoincreasethe effciencyandsafetyofdeminingutilizingdronesand AI/machinelearningtechnology.

SafeProAI’saward-winningartifcialintelligence (AI),machinelearning(ML)andcomputervision capabilitiesenablethe rapid,automatedprocessing ofaerialandground-based imagerymakingitan idealsolutionforanumber ofapplicationsincluding deminingandinlaw enforcementandsecurity. Thetechnologycurrentlyis beingappliedtothe identifcation,classifcation, andclearanceoflandmines. Builtwithanextensive proprietarylandmineand unexplodedordnance(UXO) dataset,SafeProAIcan rapidlydetectthreatsfrom aerialimagery,relaying preciseGPSlocationand actionablereportinginfor-

mationtodecisionmakersandgroundpersonnel,greatly increasingthescaleandeffcacyofremediationefforts. ThroughthecombinationofAI,ML,anddrone technologies,SafePro’snewdeminingsolutionsdirectly addressthelimitationsofcurrentmine/UXOclearance methodologieswhichcanbeslow,expensive,and dangerous.

SAFEPROAIDISRUPTIVEMODERNIZEDMINE DETECTION

Step1:

HighAltitudelargeareasurveywithpowerfulAI& MLfromhighresolutionaerialimageryto autonomouslylocate,label,andGPStag.

Step2:

LowaltitudedronesarmedwithGPSdatahunt minesdownandgatherhighresolution3Dlidar imagery,preciselocationtag.

Step3:

Generateanalyticalreportsfordecisionmakersto analysesafeanddangerzonesandprioritizemissions, resourcesandEODteams.

55 counteriedreport.com
SafePro’s3StepDisruptiveAIApproach. Source:SafeProAI

NEXT-GENERATIONDEMININGWITHAIANDDRONES

APPLICATIONS

Next-genminedetection

SafeProAI’ssoftwarebringsartifcialintelligence, machinelearningandcomputervisioncapabilities thatenabletherapid,automatedprocessingofaerial andground-basedimageryinreal-timetodetect landminesandunexplodedordnance.

Infrastructureinspection

Providingdetailedvisualanalysisoffacilities,power andtelecommunicationsinfrastructureandequipment throughAIandmachinelearning-enhancedvideo processing.

Securityandincidentresponse

AI-basedprocessingofaerialimageryofcanrapidly detect,locateandidentifyobjectsofintereston

thegroundincludingweapons,contraband,or improvisedexplosivedevices(IEDs).

INITIALAPPLICATION: NEXT-GENMINEDETECTION

Utilizingavarietyofoff-the-shelfconsumerand commercialdronesequippedwithanarrayofsensors includingoptical/thermalinfrared/multispectral,ourAI modelsoftwarecannowdetect50+typesofminesand UXOwithover80%accuracyincludinggrenades, projectiles,andanti-personnelmines.

SafeProAIhasdevelopedanAI-assisteddrone surveymethodthatquicklyandeasilyprovidesfeld operatorswithmapsandlocationsof80-90%ofthe presentsurface-lainlandminesandUXO,enabling themtoplansaferandmoreeffcientclearance operations.

Source:SafeProAI

56 COUNTER-IEDREPORT,Spring/Summer2023
Capabilitiesthatenabletherapid,automatedprocessingofaerialandground-basedimageryinreal-timethreatdetection.

ABOUTSAFEPROAI

SafeProAI (aSafeProGroupInc.company)was foundedin2020followingyearsofresearchintothe utilizationofdronesandAI(artifcialintelligence)to automatethedetectionoflandmines,unexploded ordnance(UXO)orimprovisedexplosivedevices (IEDs)andotherexplosivethreats.

SafeProAI’smachinelearningandvision-based processingcapabilitiesarebeingleveragedwithSafe ProGroup’sdroneoperationalexpertisetodelivera powerful‘Next-Gen’approachtosituationalawareness.

ARTIFICALINTELLIGENCE& MACHINELEARNINGTECHNOLOGY

SafeProAI’ssoftwarebringsartifcial intelligence,machinelearningand computervisioncapabilitiesthatenable therapid,automatedprocessingofaerial andground-basedimageryinreal-timeto detectthreatsincluding:

•Landmines,unexplodedordnance, improvisedexplosive devices(IEDs)

•Abilitytodetectitemsofinterest includingcontrabandorweapons

ExpandedAImodelcapabilitiesto detect50+typesofminesandUXOwith over80%accuracy:

•Anti-personnelandanti-tankmines

•Projectiles

•Clustermunitions

•Grenades

ExtensiveProprietaryLandmine& UXODataset:

•Compilingtheworld’slargestaerial imagerydatabaseofminesandUXO todetectanytypeofmunition

•EnablingAItodetectminesinvisual, thermal,andmultispectralimagery

Watchhowdronesandmachine learninghelptodetectlandmines: https://youtu.be/VBnNqBzUHdQ ■

ThisnewcapabilityisalsosynergisticwithotherSafe ProGroupportfoliosolutions,forexample,more effectivelyguidingandaidinggroundpersonnel equippedwithourstate-of-the-artballisticprotection productsincompletingtheirlife-savingsecurity missionsorinacceleratingthedrone-basedanalysisof criticalinfrastructure.Formoreinformation,pleasevisit: www.SafeProGroup.com and www.SafeProAi.com

Contact: info@safeprogroup.com

NEXT-GENERATIONDEMININGWITHAIANDDRONES 57 counteriedreport.com
Drone-BasedAISolutionforthreatdetection. Source:SafeProAI ThermalProcessing. Source:SafeProAI
HELD UNDER THE PATRONAGE OF HIS EXCELLENCY, PRESIDENT ABDEL FATTAH EL-SISI THE PRESIDENT OF THE ARAB REPUBLIC OF EGYPT, THE SUPREME COMMANDER OF THE EGYPTIAN ARMED FORCES 4-7 DECEMBER 2023 EGYPT INTERNATIONAL EXHIBITION CENTRE EGYPT INTERNATIONAL EXHIBITION CENTRE 4-7 DECEMBER 2023 EGYPT’S LEADING TRI-SERVICE DEFENCE EXHIBITION @visitedex /egyptdefenceexpo @egyptdefenceexpo www.egyptdefenceexpo.com Media Partner Gold Sponsor Silver Sponsor Platinum Sponsor Platinum Sponsor Platinum Sponsor Headline Sponsor O cial Carrier Organised by WORLD EVENTS Supported by Ministry of Defence Egyptian Armed Forces Ministry of Military Production National Service Projects Organisation

UNATTENDEDPACKAGES–THESECURITYOFFICER’s DILEMMA

AccordingtotheInstituteforEconomicsand Peace,GlobalTerrorismIndex2023‘Deathsfrom terrorismfellto6,701in2022,representinganineper centdecreasefromtheprioryear.Thefallindeaths wasmirroredbyareductioninthenumberofincidents, withattacksdecliningbyalmost28percentfrom 5,463in2021to3,955in2022.’

Thedownwardtrendisgoodnews.Butterrorismis andremainsascourgeandahugechallengeforlaw enforcementandsecurityprofessionalseverywhere.

Ofthetoptenmostlethalattacks,sixemployed improvisedexplosivedevices(IEDs)usedto devastatingeffect.Refectingthatexplosivesremain aprimaryweaponintheterrorist’sarsenal.

InEurope,weonlyhave EUTerrorismSituationand TrendReport(TE-SAT)1 fguresfor2021,but‘France experiencedthehighestnumberofattacks(5), followedbyGermany(3)andSweden(2).Austria, Denmark,Hungary,Belgium,andSpainreportedone attackeach.Oftheffteenattacks,fourwere completed.Mostreportedterroristattackswere categorisedasjihadistterrorism(11),ofwhichthree werecompletedattacksconductedinFrance,Spain, andGermany,andeightwerefoiledrespectivelyin France(4),Sweden(1),Hungary(1),Denmark(1)and Germany(1).Thetwofatalitiesrecordedin2021were theresultofthejihadistattacksconductedinSpain andFrance.’

‘WeaponsusedinattacksintheEUin2021included bladedweapons,vehicles(inrammingattacks)and improvisedincendiarydevices(IIDs).Disruptedplots showedtheintentandeffortstoproduceimprovised explosivedevices(IEDs).’

Thesefguresshowthatdespitethehighnumbersof successfuldisruptionsofattacksinEurope,the intentiontouseIEDsandIIDsinattackscontinuesto beaprofoundlyseriousthreat.

ItistruethatthelikelihoodofarealIEDorIIDattack remainsextremelylow,buttheveryexistenceofthe threat,nomatterhowsmall,createsotherproblems, thatofthereceiptofsuspiciouspackages,hoax bombthreatsandunattendedpackages.

Figuresforhoaxcallsandsuspiciouspackages worldwideareimpossibletofnd,sowewillhaveto relyonthe 2021UnitedStatesBombDataCenter, ExplosivesIncidentReport 2.Accordingtotheirreport therewere4,935suspicious/unattendedpackages reportedintheUSin2021and1,876reportedbomb threatincidentsinthesameyear.

Unfortunately,thereportdoesnotbreakdownwhich oftheseweresuspiciouspackagesreceivedandwhich unattendedpackages,butitissafetoassumethat mostareinthelattercategory.

Everycountrywillhaveitsownclearlydefned protocolsandproceduresformanagingabomb threatorthereceiptofsuspiciouspackages,and

UNATTENDEDPACKAGES
59 counteriedreport.com
ByVincentDeery,CEO,3DX-RayLtd

wecanprobablysumthemupinonesentence, ‘evacuatetheimmediateareaandcallthe emergencyservices.’

Butwhattodoaboutunattendedpackages?

Weallknowthatbyfarthevastmajorityof unattendedpackageswillbelittleJonnie’s/Jennie’s sweatysportskit,theverylatestinmen’sfacialcare productsorevenafullsuitofarmour(truestory).

Buteverysecurityoffcerineveryoffcebuilding, bank,shoppingcentre,concerthall,hospitalortheme parkwillatsometimeoranotherbefacedwiththe samedilemma.Dotheyescalatethediscoveryofan unattendedpackageintofullblownbombthreat incident,ordotheytakereasonablestepstoascertain whetheritreallyisathreatornot?

Thedisruptionandcostcausedbyabuilding evacuationisdiffculttoquantifybecausefguresare hardtocomebyandeverybuildinguseisdifferent.The costofevacuatingashoppingcentreforacoupleof hourscouldrunintothousands,butthecostof evacuatingacommercialbankinthecitycouldruninto tensofmillionsinlosttransactions.Thecostof evacuatingahospitalcouldinsteadbemeasuredin humansuffering!

Thatiswhythesedecisionsaresoimportant!

Thisiswherethepropertrainingandequippingof securitystaffiskey.

So,howshouldaprofessionallytrainedand equippedsecurityoffcerhandleanunattended packageorbag?

Firstly,theywillattempttogetavisualinspectionof theinsidethebagorpackagetocheckifthereare wires,circuitboards,batteries,tape,liquids,orputtylikesubstances.Arethereunusualodourssuchas accelerants,anythingthatwouldindicateadevice?

Butasmanytimesasnot,itwillsimplynotbe possibletosafelyseeinsidethebag.

Next,theywillcheckintheimmediateareaforthe owner.TheniftheareaiscoveredbyCCTVcallinto thecontrolroomandgetthemtocheckiftheowner canbeidentifedthatway.

Butallthatdone,andtheownernotfound,security staffcannotknowforsurewhetherthepackageorbag issafeunlesstheygetagoodlookinside.

Andtherereallyisonlyonewaytodothat.Andthat iswithaportablex-rayscanner.

Portablex-rayscannershavenowbeenaroundfor agoodmanyyears.

Generally,theyconsistofanx-raygenerator,afat detectorpanelandalaptop,andareinoperationwith militaryandlawenforcementEODteamsworldwide. Theyallowtheoperatortheopportunitytoseeinside thepackageorbagwithouttouchingordisturbingit.

Theyareprobablyoneofthemostaffordableand versatilepiecesofequipmentavailabletosecurity professionalsandshouldbeinthetoolkitofany securityteamresponsibleforanybuildingorfacilityof anysize.

Andaswithallgoodtechnology,thesesystemsare beingcontinuallydevelopedandthemostsignifcant developmentofrecentyearsistheintroductionof colourdifferentiatedscans,whichhavemadeitpossible todeterminethenatureofthematerialsbeingscanned. Thisisareallyimportantdevelopmentbecauseit meansthatinsteadofrelyingonshapetodeterminethe identityofanobject,thesesystemsarenowableto accuratelyidentifymaterialsbycolour.So,orange showsorganics,suchassomeexplosives,chemicals, anddrugs,aswellasmoreinnocentitemssuchas foodstuffs.Blueisformetals,suchasmanyguns, knives,handgrenades,metalpipebombsaswellas IEDcomponentssuchasthepowersources,switches, circuitcomponentsandmetallicfragmentation.Greenis forinorganicmaterialslikeblackpowdersand aluminumizedhomemadeexplosives.Greyscaleis usedforrecognitionofshapesandtheformofobjects.

Itisimportanttonotethatmostportablex-ray systemsonthemarketonlyusetwocolourscansand leaveoutthecolourblue,thisisbecauseofalackof understandingabouthowmaterialsimagingworks, whichcouldputoperatorsatasevereandpotentially dangerousdisadvantage.Accuratethreecolour differentiationisessential.Accuracynotonlyrelatesto thecorrectcolourisationofthespecifcobjectbutalso totheconsistentcolourisationacrosstheentire scannedarea.

60 COUNTER-IEDREPORT,Spring/Summer2023
UNATTENDEDPACKAGES
3DX-Rayofferacompleterangeofportablex-ray systems.

ThreatScan®-AS1(ISC)isarobustamorphous siliconportablex-rayinspectionsystem.Itcomprises, asstandard,adetectorpanelwithanimagingareaof 430mmx347mm,anewhighpenetration150kV generator,andalaptopalongwithbatteries,chargers, theuser-friendlyThreatSpectsoftware,wireless communication,andtransportcase.

Thesystemisfullyintegrated,withaprimarydisplay, computer,communications,andpowersupplies consolidatedintoasingle,waterproofruggedcase. Asecondarydisplaytabletoffershighfexibilityin deploymenttomeetthewidevarietyofuser applicationsandthreatscenarios.

Thecombinationoftechnologiesusedin ThreatScan®-AS1(ISC)offersexceptionalX-ray imagingperformance,3DX-Ray’srenownedadvanced materialsdiscrimination,andsophisticatedimage processingsoftware.

ThreatScan®-LS1sharesthesamehighquality,high penetrationimagecharacteristicsbutwithalarger 600mmx460mmimagingarea.ThreatScan®-LS1 enablestypicalbagsandpackagestobescannedin onescan.

ThreatScan®-LS3isacompactyetpowerfulx-ray scanningsystemthatcanpenetratesteelupto40mm at120kVandupto60mmat150kV.The305mmx 256mmimagingareaenablestypicalbagsand packagestobescannedinonescan.Thecomplete systemftssecurelyintoabackpack.

3DX-RayrecentlysoldsixteenunitsofThreatScan®LS3toanundisclosedsouthernEuropeansecurity agency.

So,ifyouareresponsibleforthesecurityofyour organisation,youshouldseriouslyconsidermakinga portablex-raysystempartofyourteam’sequipment toolbox.Butremember,seeingthingsinblackand whiteisnolongergoodenough! ■

REFERENCES

1 https://www.europol.europa.eu/publication-events/mainreports/european-union-terrorism-situation-and-trendreport-2022-te-sat

2 https://www.atf.gov/fle/166841/download

UNATTENDEDPACKAGES 61 counteriedreport.com
ThreatScan®-AS1(ISC) ThreatScan®-LS1 ThreatScan®-LS3

PIRSENSORSINIEDs USINGCONSTANT POTENTIALGENERATORS

ByTeledyneICM

INTRODUCTION

ForEODteams,theuseofPIR(PassiveInfrared) sensorsinexplosivedevicescanbeamajorconcern astheyaresensitivetoX-Ray,andthencantriggera devicewhileperformingtheinspection.

TheclassicX-Raymethoduseddoesnotallowto managekVthenitbecomesverydiffculttobe undetectedbyPIR.Withthetechnologyevolving, ConstantPotentialX-Raygeneratorshaveappeared andallowtoadjustkVandmAwhilebeingabletoset thedurationofashot.Whenhavingtheparametersof

thegeneratorsettolowkVandmA,wecanremain undetectedbyPIRsensors.

Toprovethistheory,wehaveconductedastudyto determinetheoperabilityofCP(ConstantPotential) Batteryoperatedgeneratorsbelowthesensor sensitivitywhilekeepingasuffcientimagequality.

SAMPLEOFPIRSENSORS

Forthisstudy,anon-exhaustivesampleselectionof PIRsensorshasbeenused:

PASSIVEINFRAREDSENSORSINEXPLOSIVEDEVICES
63 counteriedreport.com
The4PIRsensorsappearedtohaveverysimilarresultssowewillfocusontheChacontodemonstratethefndings.

PASSIVEINFRAREDSENSORSINEXPLOSIVEDEVICES

TYPEOFGENERATORUSEDFORTHESTUDY

Features

TeledyneICMLITEX

Generatortype ConstantPotential

Beam Directional

Powersupply DewaltBattery

Outputvoltagerange 40to120kV

Tubecurrentrange 0,05to0,25mA

Tubecurrentatfulloutput 0,25mA

Weight 2,5kg/5,51lbs

Focalspot(EN12543) 0,8x0,5mm

Beamangle 50x50°

IPLevel IP54

Operatingtemperature -25to+50°C/-13to+122°F

Connections Bluetooth/Wired

MAINCHARACTERISTICS

•AdjustablekV,mAandexposuretime

•CompatibilitywithX-RayScannersandAmorphousSilicondigitaldetectors

64 COUNTER-IEDREPORT,Spring/Summer2023

TYPEOFDETECTORUSEDFORTHESTUDY

(optional)

PASSIVEINFRAREDSENSORSINEXPLOSIVEDEVICES 65 counteriedreport.com Features Unit TeledyneICM TACTX Sensortype - aSi Resolution lp/mm 4.16 Pixelsize µ/m 120 Dynamicrange(Greylevels) bits 16 Activearea mm/ indiag. 246x307/ 10x12 Maximumpenetration mm/ inofsteel 35/ 1.3 (withCP120B) mm/ inofsteel 45/ 1.7 (withCP160B) Numberofcoveredsides – 3(left,bottom,right) Deadzone mm/ in 4.6/ 0.15 (frombottom) 15/ 0.59 (fromside) Externaldimensions mm/ in 327.3x285.6x18.65/ 12.87x15.15x0.7 Weight Kg/ lbs ~2.9 / 6.39 Operatingtemperature °C/ °F -20to+50/ -4to+122 Storagetemperature °C/ °F -20to+65/ -4to+149 Communicationprotocols –Bluetooth/Wiforcabledriven
Workwith –
ImagingStation –Notebook,toughbook, Tablet,toughpad
CP120B/CP160B/LiteX X-raygenerators

SENSITIVITYTESTS

Target:identifyingtriggeringlimitversusoperatingconditionsbasedonkVandmA,distanceandduration.

a.Effectonduration

Testconditions:

•PIRSensor:Chacon

•120kV,0.25mA(Fullpower)

Conclusion:

WhileshootingatfullpoweroftheLiteXgenerator,thePIRsensortriggersimmediatelywhenx-rayed,theduration hasnoeffectevenat1second.

b.EffectofkV–mAadjustment

Conclusion:

ThekVandmAadjustmentcapabilitiesoftheLiteXCPgeneratormakeitpossibletoreducethedistance.

Testconditions: •PIRSensor:Chacon kV mA Triggeringlimitbetween…cm and…cm 120 0.1 110 120 120 0.2 220 240 100 0.1 100 110 100 0.2 180 200 80 0.1 70 80 80 0.2 140 160 Duration(s) Triggeringlimitbetween…cm/in and…cm/in 1 220/86,6” 240/94,5” 2 220/86,6” 240/94,5” 10 220/86,6” 240/94,5” 60 220/86,6” 240/94,5” PASSIVEINFRAREDSENSORSINEXPLOSIVEDEVICES 66 COUNTER-IEDREPORT,Spring/Summer2023

IMAGEQUALITY

Nowthequestionis,canwegetagoodqualityimagewhilenottriggeringthePIRsensor?

a.ImagequalityusingTactX withLiteX

b.Correctedimagequality usingTactXwithLiteX

c.Correctedimagequalityusing TactXwithLiteX–SNRValue

Parameters:

kV 80kV mA 0.1mA Distance 80cm Time 60”

d.Processedimagequalityusing TactXwithLiteX

Parameters: kV 80kV mA 0.1mA Distance 80cm Time 60”

CONCLUSION

Parameters: kV 80kV mA 0.1mA Distance 80cm Time 60”

SNRValue: 190

ConstantpotentialgeneratorscanoperatebelowPIR triggeringlimitwhilehavingagoodaveragefuxandan excellentimagequalitybecause:

•Signaliscontinuous

•Focalspotissmaller

•kVandmAareadjustable

•Timeisadjustable

So,whenPIRsystemsareused,thebestwaytonot triggerthemistodecreasekVandmAbutincrease exposuretime.Thiswillofferagreatimagequalitywhile remainingundetectable. ■

ABOUTTELEDYNEICM

Parameters: kV 80kV mA 0.1mA Distance 80cm Time 60”

TeledyneICM hasover25yearsofexpertiseindeveloping innovativeportableradiographysolutions.Itsportable generatorshaveexcellenttechnicalcapabilitiesandwhen coupledwithhigh-resolutiondetectors,providehighly accurateradiographs.Contact: icm.sales@teledyne.com

PASSIVEINFRAREDSENSORSINEXPLOSIVEDEVICES 67 counteriedreport.com

INDIA – THEIEDCHALLENGES

INTRODUCTION

AccordingtotheIndianNationalBombDataCentre, duringtheYear2021,therewerearound132reported ImprovisedExplosiveDevices(IED)blastsinIndia killing/severelyinjuring323people.Itisgenerally estimatedthatonanaverageforeveryreportedIED attempttherewereabouteightunreportedattempts, successfullyfoiledbythesecurityforcesbasedon timelyactionableintelligence.IEDshavebeenthe weaponofchoiceforinsurgents,terroristsandmilitant groupsoperatingacrossIndia’sverybroadlandscape. EventhoughtheinternalsecuritysituationinIndiahas vastlyimprovedoverthelasttwodecades,the appearanceofnewmilitantandterroristgroupsinthe arena,theinnovativetechnologiesadoptedbythese groupsinbuildingavarietyofIEDsanduseofnew mediaincludingdronesfordeliveryoftheseIEDs,pose newandvariedchallengestothesecurityforces.Is Indiafullypreparedtomeetthesechallengestokeep itspeopleandinfrastructuresecureinordertodrive development?

THREATANALYSIS

TheIEDthreatstoIndiaemanatefromtheongoing insurgencies,separatistandterroristactivitiesover somepartsofthecountry.TheUnionTerritoryof JammuandKashmir(UTJ&K)wasontheboiloverthe lastthreedecadesduetohostileactivitiesof separatists,terroristsandmilitantsinfltratingfrom

acrosstheborder.ThesituationinUTJ&Khasnow beencontrolledthroughwell-coordinatedand persistentoperationsbythesecurityforces.Theleftwingextremists’(LWE/Maoists)insurgencywhich initiallyaffected160districtsinCentralIndia–popularlyknownasthe‘RedCorridor’hasnowbeen containedandislimitedtojustabout50districts.The decadesoldseparatistinsurgenciesinNorth-East India,especiallyinthestatesofAssam,Nagaland, MizoramandManipur,havebeeneffectivelycontained throughmassivesocio–economicdevelopment, improvedroad,railandairconnectivitytotheseremote areasandstrengtheningofdemocraticinstitutions throughfairandfreeelections.Also,anumberof religiousradicalisedextremistandfundamentalist organisationshaveresortedtoterrorthroughtheuse ofIEDsinurbanandsemi-urbanareaspropounding theirmisplacedcauses.RapidlydevelopingIndiafaces bigthreatstoitsinternalsecurityfromallthese elementsthatuseIEDsasaprimarymeansof terrorisingpeople,causingdestructiontopublic propertiesanddisruptingdevelopmentalactivities. Thesehostileelementsapplygreatingenuityand intelligence,andleveragetechnologiestodesigna varietyofsophisticatedIEDsandtheirdelivery mechanisms.TheyfrequentlyadoptnewTactics TechniquesandProcedures(TTPs)thereby unbalancingthesecurityforces,andextensivelyuse

INDIA–THEIEDCHALLENGES
68 COUNTER-IEDREPORT,Spring/Summer2023
ByColonelHRNaiduGade–IndianArmyVeteran

realtimehumanintelligenceinordertothwartand frustrateanyCounter-IEDoperationsundertakenby thesecurityforces.

ThecomplexityoftheIEDSystemsisincreased sincemobilesmartphones,internetandsocialmedia

providealow-costandeasilyaccessiblemediumfor informationsharingandtheswiftadoptionofTactics, TechniquesandProcedures(TTPs),thereby facilitatingtheeffcientoperationofthesediverse systems.Suchsystemscanbeextremelyresilient,

INDIA–THEIEDCHALLENGES 69 counteriedreport.com
IEDIncidents2021India. Source:BombShell,NSG,India

INDIA–THEIEDCHALLENGES

invariablyhardtotargetandare,therefore,survivable. BecausetheIEDthreatisconstantlychanging,the Counter-IEDfghtisdynamic,andmaintaining effectivenessremainsanenduringrequirementfor operationsdevelopment.TocounterthesefastchangingTTPsbyhostileelements,thesecurityforces havealsotoinnovatethroughadoptionofnew technologiesincludingArtifcialIntelligence.

NATIONALCOUNTER-IEDSTRATEGY

Presently,Indiadoesnothaveanycomprehensive NationalCounterIEDStrategyencompassingthefour pillarsofCounter-IEDoperationsi.e.,Attackthe Networks,PreparetheForce,DefeattheDeviceand ExploittheIncidence.Thestrategyshouldhaveapan governmentapproach,beacoordinatedeffortofall applicableagenciesofnationalpower,havecommon understandingofthestrategicenvironmentwith respecttoIEDchallenges,andbuildenduring capabilities.DespiteenhancedIEDsthreatslooming

large,IndiahasnotyetevolvedCounter-IEDstrategy atanylevelofsecurityestablishmentsandgovernance. TheIndianArmyenunciatedbroadstandard proceduresandprocessestoCounter-IEDthreats mostlyrelatedtoCounterInsurgencyOperations (COIN).TheCentralPoliceForceshaveoverthe decadeevolvedstandardoperatingprocedures(SOPs) forCounter-IEDoperationsapplicabletovarious terrainstheypresentlyoperatein.However,thepolice forcesofmostofthestateshaveyettoevolveany standardCounter-IEDproceduresandstilloperatein anadhocway.EvenifacomprehensiveCounter-IED strategyisfnallyenunciatedbythecentral government,theimplementationoftheabove strategiesandproceduresbecomesverydiffcultina federalstructureofgovernanceasinIndia,which requirescoordinationandsynergybetweenmultiple agenciesatvariouslevels.Nevertheless,Indiahas madegoodprogressinthisregardoverthelast twodecades.

70 COUNTER-IEDREPORT,Spring/Summer2023
IEDs-AGlobalProblem. Source:AOAV,UK

TheIEDChallenges. Source:InertProductsLLC

ThreatsLoomingLarge. Source:www.zeenews.india.com

INDIA–THEIEDCHALLENGES 71 counteriedreport.com

COUNTER-IEDCAPACITYBUILDING

TheCounter-IEDcapacitybuildinginvolves-creating suitableorganisations;developingrequisitetraining andtraininginfrastructure;adoptinginnovativeTTPs basedonthreats;providingorganisationswithsuitable equipmentthroughleveragingoftechnology; establishingeffcientandeffectiveintelligence apparatusandbuildingaseamlessandwidenetwork forintelligencegatheringandtimelydissemination; regulatingandmonitoringsupplyofmaterialsrequired fordesigningandbuildingtheIEDs;identifyingand eliminationofsourcesofterrorfnance;creatingan adequatefrstrespondermechanism;settingup multiagencycoordinationcentresatalllevelswith effcientcommunicationnetworkslinkingthese centres;andundertakinglargescalepublicoutreach programmestoeducatethegeneralpopulationonthe Do’sandDon’tsaimedtominimisecasualtieson occurrenceofanIEDevent.Thecapacitybuildingwill havetobebasedontherealisticthreatanalysis.

INDIA’SCOUNTER-IEDCAPACITY

Organisations–TheIndianArmyhas specialcounterinsurgencyunits operatingintheUTJ&Kandthe North-East.Theseunitshave inherentCounter-IEDresourcesand capabilities.Additionally,special CounterExplosiveDevicesUnits (CEDU)arefunctionalwitheachofthe OperationalCommands.These CEDUshavebeenrestructuredand equippedforgreaterfexibilityintheir deploymentintosmallerteams.All armyfeldformationshaveintegral combatengineerunitstrainedand equippedforCounter-IEDsupport.The NationalSecurityGuard(NSG),a highlyspecialisedcontingencyforce primarilyconsistingofarmyunits–is deployedatvariousgeographicalhubs torespondtocounter-terrorand counter-hijackingthreats.TheBorder GuardingForcesallalongthe15060 kmsofinternationallandbordersfoil anycross-borderattemptsbymilitantsandterrorists. TheyhaveCounter-IEDteamslocatedattheBorder Outposts(BOPs)inthethreatenedsectorstotakecare ofanypossibleIEDincidents.TheCentralReserve PoliceForcecarryingouttheCOINoperationsinthe ‘Redcorridor’,UTJ&KandtheNorth-Easthaswell trainedsub-unitstohandleIEDs.TheCentralIndustrial SecurityForce(CISF)isdeployedalloverIndiato protectnationalstrategicassetsandcritical infrastructurefromhostileelements.TheRailway ProtectionForce(RPF)isdeployedtoprotectthe world’sthirdlargestrailwaynetworkof67,000kmsand associatedinfrastructure.AllthestatesinIndiahave dedicatedbombsquads/teamsaspartofthecrime investigationdepartmentsoftheirpoliceforces.These bombsquadsaretrainedbytheIndianArmy/NSG/ CRPFandarereasonablywellequippedforcarryingout Counter-IEDoperations.However,theseresourcesare limitedandcannotbedeployedinatimelymannerall overaparticularstate.Theirreachislimitedmostlyto

INDIA–THEIEDCHALLENGES 72 COUNTER-IEDREPORT,Spring/Summer2023
PillarsofCounter-IEDStrategy. Source:JIEDDO,USA

DronewithExplosivePayload. Source:MHA,India

urbanareas.TheCivilDefenceandHomeGuardunits ineachofthestatespossessbasicawarenessofIEDs andsupplementtheeffortsofthesecurityforceswhere required.

Training-isacontinuousprocessforhoningand updatingCounter-IEDskills.Manydecadesago,the

Indianarmyestablisheda centreofexcellence–the EDDSchoolaspartof theCollegeofMilitary Engineering.TheEDD Schooltrainshundredsof personnelbelongingto theIndianandforeign armedforcesandthe centralandstatepolice forces.TheIndianarmy’s feldformationsrunbattle schoolsatthefeld formationlevelstotrain andupdatepersonnelin Counter-IEDskillsand tasks.TheCRPFestablishedanInstituteforIED managementtotrainpersonnelfromthecentralpolice forcesandstatepolice.Likewise,theBorderForcerun similarinstitutestotrainitspersonnelonCounter-IED tasks.Inaddition,mostsecurityforcessubscribeto varioustrainingcoursesabroadforselectedpersonnel

INDIA–THEIEDCHALLENGES 73 counteriedreport.com
ConfdenceBuildingTraining. Source:InertProductsLLC
INDIA–THEIEDCHALLENGES 74 COUNTER-IEDREPORT,Spring/Summer2023
EDDSchool-CollegeofMilitaryEngineering. Source:IndianArmy MultiagencyCoordinationCentre. Source:MHA,India

inCounter-IEDtasks,proceduresandgivethem exposuretothelatesttechnologiesandprocedures availablearoundtheglobe.Eachofthesecurityforces havetheirowncaninetrainingestablishmentsforthe trainingofnewandrefresherfortheexistingcanines.

Equipment&Technology-TheIndiansecurityforces andotherspecialistCounter-IEDunitsareadoptingthe latesttechnologiesavailableglobally,whichnotonlyact asforcemultipliers,butalsoreducetherisktomanual operatorscounteringexplosivedevices.Thephilosophy andprocessof‘defeatingthedevice’hasundergonea radicalchange.High-techequipmentliketheunmanned aerialvehicles,unmannedgroundvehicles,remotely operatedvehicles,disrupters,robots,non-destructive evaluationequipment,controlleddetonationchambers/ vehicles,RCIEDjammers,GPRs,anddetectionand neutralisingequipmentarebeingdeployedonalarger scalebythesecurityforces.Requisitefundsare earmarkedtoprocurethesetechnologiesand equipmentfrombothindigenousandforeign sources.TheDefenceResearchandDevelopment Organisations(DRDO)havebeenworkingonalarge numberofprojectstodeveloptechnologiesforaerial surveillance,reconnaissance,andsafeandeffcient handlingofexplosivedevices.Theprivateindustryis beingactivelyinvolvedandpartneredtodevelopthese technologiesforthesecurityforces.Asubstantial quantityofhigh-techCounter-IEDequipmenthasbeen inductedinrecenttimesintothesecurityforces.

CONCLUSION

Asevidentfromtheabove,Indiaisslowlybutsteadily buildingcapacitiesintermsoforganisations,training, equipment,technologiesandintelligencegatheringto undertakealargenumberofCounter-IEDoperations simultaneouslyovervaryingterrainsandenvironments. However,therearestillcertaingreyareastobe addressedonapriority.Theserelatetotheaspectsof evolvingacommonnationalstrategy,closerattention totheissueof‘attackingthenetworks’,and coordinationamongstthenumeroussecurityforces. TheIndiansecurityforcesarefullygeareduptotakeup anychallengestoitsinternalsecurityarisingfromthe useofexplosives. ■

ABOUTTHEAUTHOR

ColonelHRNaiduGade -IndianArmyVeteran [BE(Civil),MSc(DefenceStudies),MBA(HR)]

CommissionedintotheCorpsofCombatEngineers. ACivilEngineer,andSecurityProfessional,with47 yearsofrichexperienceinthefeldofCombat Engineering,Chemical,Biological,Radiological, NuclearandExplosives(CBRNe)Defence,Security& DisasterManagementandCounter-IEDOperations.Is aqualifedCBRNandCounter-IEDProfessional.

IsaformerMemberoftheInternationalCivilService whileworkingasChiefCWInspector1997-2004with the‘OrganisationforProhibitionofChemicalWeapons (OPCW)’,TheNetherlands,winneroftheNobelPeace Prize2013.Ledteamsofinternationalprofessionalson manyverifcationmissionstovariousmember countries,toverifytheinventoryofChemicalWeapons andmonitortheirdestruction.

Presently,ChiefConsultantwith‘CBRNeSecure India’a‘forumandaknowledgecentre’forbringing awarenessinthegeneralpublic,governmentand securityentitiesonthethreatsarisingfromtheuseof CBRNematerialandtheirdisastrousconsequences. Aprolifcwriterandspeaker,participatedinvarious internationalanddomesticconferencesonCBRN Security,DisasterManagementandCounterExplosive Issuesandwritesarticlesforprofessionaljournals worldwideonthesesubjects.

INDIA–THEIEDCHALLENGES 75 counteriedreport.com

“DONBASSWILAYAT”ORHOWTOPLAYWITHJIHADISM INUKRAINIANLANDS

Afterthepro-RussianprotestsinDonetskand

LuhanskoblastsinMarch2014,armed separatistsdeclaredboththeDonetskandLuhansk People’sRepublics(DPRandLPR)asindependent statesfromUkraine.

FromJune2014,andinparallelwithsomeYouTube and www.mojevideo.sk publishers,acurrentlybanned channel(www.vk.com/isodal)inRussianVKontakte socialmediastartedreleasingvideosmixingproRussianseparatistforcesincombatalongwithDaesh combatantsinSyriaandNorthCaucasianfghtersin theRussianFederation.Allthosevideoshave soundtracksbasedonIslamicNasheedandTakbirs.

Almostsimultaneously,anotherVKontakteaccount (www.vk.com/isdl_jihad)createdimaginaryfags combiningthosefromDonetskandLuhanskwith jihadistsymbolism.

Atafrstglance,itlookslikethepersonsbehind thatgraphicdarkhumorinitiativearepro-separatist supporters,whoarealsocollectingmoneyfrom donationstosupporttheindependenceofDonbass:it isalldesignedindirectimitationofDaeshinfuence activitiesthroughtheworldwideweb…

From2022,theRussiangovernmenthasbeen promotinganinfuencecampaigntomitigatethe tensionsbetweenChristianandMuslimsoldiersin Russianforces,allindirectbeneftofattractingMuslim Russianstorecruitment.

Inparallel,andfromMay2022,theconfictinthe disputedDonbass(thehistoricalareawhichis currentlyunderstoodasmainlycomprisingDonetsk andLuhansk)haswitnessedsomesortoffreak propagandaandmotivationcampaignunderthe genericnameof “ImaratDonbass”

“DONBASSWILAYAT”ORHOWTOPLAYWITHJIHADISMINUKRAINIANLANDS
76 COUNTER-IEDREPORT,Spring/Summer2023
“Imaginethere'snocountries.Itisn'thardtodoNothingtokillordiefor.Andnoreligiontoo...” (JohnLennoninhissong"Imagine"frstrecordedandreleasedin1971) Figure1:Imagesandcapturesfromvideosfrom“IslamicStateofDonbassandLugant”. (Sources–VKontakte&Youtube). ByLieutenantColonelJoseMRufas,ChiefofAttacktheNetworksBranch, C-IEDCentreofExcellence

Theirfrstvideowasentitledas “Returnofthe RussianCaliphate” andstatingthat“alllandsbelongto Allah”,amongothermessagestryingtoshowthat RussiaisanallyofIslam.

Thevideosandmerchandisingfrom “Imarat Donbass” werewidelypromotedbytheassassinated RussianbloggerMaximFomin(AKAVladlenTatarsky), whowasevenfeaturinginsomeoftheproducedvideos.

Oneofthemainvectorsfordiffusionof “Imarat Donbass” productshasbeentheTelegramchannel “TVJIHAD” (www.t.me/tvjihad),whichposesan inconsistentcombinationofsarcasticproductions,proRussianpropaganda,andsomepiecesofrealistic jihadistcontentfromNorthCaucasussources.

ThepresenceofMuslimcombatantsfghtingforboth theRussianorUkrainianforceswascausingahuge debateabouthowtheMuslimcommunityshould considerthem.AdamShakhidov,oneadvisertothe ChechenpresidentKadyrov,statedthatthoseMuslims takingpartintheRussian“SpecialOperationin Ukraine”areMujahideenservinginthewayofAllah, andthosekilledonthispathbecomemartyrs (Shaheeds).

ButthefactthatMuslimfghtersarecontributingto bothsidesoftheconfict,thedebatecontinueswhen consideringwhoarereallyfollowingthepathofAllah, andwhoaremeredisbelievers:

•AbuHamza,AmiroftheMujahideen-Muhajirsofthe WilayatNokhchichoyofImaratKavkaz(Caucasus Emirate),commentedthatthepro-Russianfghters fromtheChechenRepublicarefghtingforVladimir PutinandnotinthepathofAllah.

•DaysaftertheRussianinvasionofUkraine,the

CrimeanTatarfghterIsaAkayev(commanderof thevolunteerbattalion“Crimea”)appealedtothe RussianMuslimsand“fellowbelievers”whoare fghtinginUkraineto“throwdowntheirweaponsor jointheUkrainianArmedForcesinthefghtagainst Russia”.

•SimilarmessageswerespreadbytheChechen volunteerfghtinggroupsontheUkrainianside (e.g.DzhokharDudayevBattalionandShaykh MansurBattalion).

•Inanswertothat,leadersofMuslimRussian religiousorganizationsappealedfortheirsupport oftheleadershipofRussia,justconsideringthe RussianspecialoperationinUkrainetoseekfor peaceasaforceddefensiveandpreventive measuretoprotectRussiaandallitscitizensfrom therealthreatofnuclearandbiologicalweapons byNATOandEurope.

“#NafrforUkraine”:Muslimreactionstothe Russo-Ukrainianconfictin2014

Thehashtag “#NafrforUkraine” wasoftenusedinTwitter inMarch2014:theoriginalmeaningof “nafr” (نفير) wasthe "calltowar",soitshouldbeunderstoodasthe calltojihadielementsforactiontotraveltothereferred countryandtakepartintheholywarinthenameof Allah:itwaspreviouslymadewithSyriaandEgypt.

InadditiontothepastextraditionfromCrimeato CentralAsiaandtheprosecutionofTatarsbyRussia, thereferendumforannexationofCrimeatothe RussianFederationin2014madeseveralregional andinternationalSalaf-jihadistorganizations(e.g. AlQaeda)totakeuptheTatarcause.

77 counteriedreport.com
“DONBASSWILAYAT”ORHOWTOPLAYWITHJIHADISMINUKRAINIANLANDS Figure2:Capturesfromthevideo“ReturnoftheRussianCaliphate”under“ImaratDonbass”brand. (Source–Twitter)

OneofthemostpopularTatarorganizationsis Hizb-ut-Tahrir,whichadvocatesaglobalIslamic Caliphate,andithasbeenconsideredbytheRussian Federationasaterroristorganization.

WithregardtoTatarunitsfghtingontheUkrainian sidebeforetheRussianinvasion,wecouldfnd:

•TheNomanÇelebicihanTaburuBattalion,created byLenurIslamov(ex-DeputyPrimeMinisterof Crimea)in2016andcomposedofTurkic/Crimeans alongwithotherMuslimvolunteers.

•TheDevletGirayYedekTaqimigroup,as composedofTatarsandUzbeks.

•SomeotherTatargroupsarealsosaidtobepartof the“RightSector”units.

InthecaseofChechenunits:

•ChechenRepublic’sPresidentKadyrovis supportingRussiawithpartofhisarmedforces.

•TheDeath(Смерть)battalionisfghtingalongwith DonetskPeople´sRepublic(DPR)separatists.

•TheDzhokharDudayevBattalion,ascomposed ofChechens,Azerbaijanis,Georgiansand Ingushetia’smembers.

•TheSheikhMansurbattalion,whichseemstobe morereligiouslymotivatedandradicalized.

OntheUkrainianside,manyChechenfghterswere youngfundamentalistscomingfromthe“Caucasus Emirate”,whosefghterswerecombatinginSyriaand IraqalongwithDaeshcombatants.Infact,mostofthe formermembersoftheCaucasusEmiratewerefurther

embracingtheWilayahal-Qawqaz,sotheDaesh brandinNorthCaucasus(theyissuedacallfor potentialmilitantsinRussiaandCaucasianrepublics tojointhegroupandfghtagainstRussianforces ratherthanjoiningDaeshinSyria.).

“Obportumvenies” 1,Jihadismandthe2022

RussianaggressionagainstUkraine

Foryears,Ukrainehasbeenatransitpointontheway toandfromSyria.Infact,theSecurityServiceof Ukraine(SBU)hasdisruptedseveralofthose operations.InJuly2020,itwasjudgedanAzerbaijani networkwastransportingDaeshmilitantsfromthe NorthandSouthCaucasusandCentralAsian countriesviaUkrainetoTurkey,andfromtheretoSyria andIraq.AstheintensifcationofjihadistsinSyriawas confuentwiththewarinDonbas,soUkrainepaidlittle attentiontothemilitantswhowerepassingthrough itsterritory.

Althoughmostoftheroutesforforeignfghtersgoing toSyriawereblocked,Ukraineremainsmoreorless opentothemtoday(e.g.legallyorusingfake passportsthroughanairplaneorillegallybyferry throughtheBlackSea).Ifamilitantisnotincludedin theInterpoldatabase,hecaneasilyenterUkraine inprinciple.

Themostcommonapproachfromradicaljihadism supporterstotheconfictbetweenUkrainian government,Ukrainianseparatists,andRussiawasto celebrateawarinwhichtwocrusadercountrieswere killingeachother.

78 COUNTER-IEDREPORT,Spring/Summer2023
“DONBASSWILAYAT”ORHOWTOPLAYWITHJIHADISMINUKRAINIANLANDS Figure3:Picturesofmembersof“CaucasusEmirate”&“QawqazWilayah”. (Source–www.longwarjournal.org&Twitter) 1(FromLatinlanguage)Literallymeaning"comingtowardaport",itrefersto“opportunity”.

Justbasedonreligiousjustifcations,clericsin UkraineandChechnyaencouragedMuslimsto participateinthemilitarycampaignonbehalfof UkraineandRussia:

•InChechnya,themuftiSalakhMezhievasked MuslimfghterstotakepartintheRussianspecial operationinUkraineanddeclareditasa“jihad.”

•InUkraine,themuftiSaidIsmagilov(highest Muslimreligiousauthorityinthecountry)stated thatMuslimswilldefendUkrainewithmorethan justprayers,andthenissuedafatwaurging MuslimstodefendUkraine.

•AyderRustemov,themuftioftheBlackSea peninsulaofCrimea,urgedUkrainianMuslimsto

defendthehomeland,andurgedRussianMuslims nottocontributetotheRussianaggression.

•AbuHamza,Amirofthe“Mujahideen-Muhajirsof theWilayatNokhchichoyofImaratKavkaz”(so CaucasusEmirate)hasstatedthattheChechen troopsofKadyrovcannotbeconsidered“real Chechens”duetotheirsupporttoRussia.

•TheCrimeanTatarfghterIsaAkayevappealedto theRussianMuslimswhoarefghtinginUkraineto throwdowntheirweaponsorjointheUkrainian ArmedForcesinthefghtagainstRussia.

AlthoughAlQaedawasnotmakingoffcial statements,severalsourcesofpropaganda(e.g.

79 counteriedreport.com
“DONBASSWILAYAT”ORHOWTOPLAYWITHJIHADISMINUKRAINIANLANDS Figure4:RadicaljihadistpropagandareferredtoRusso-Ukrainianconfict. (Source–Twitter,AnNaba,WolvesofManhattan) Figure5:InformationrecommendingDaeshfollowerstouseexplosive-ladendronesforJihad. (Source–www.archive.org)

“WolvesofManhattan” magazine)sawtheUkrainian confictasanopportunityfortheirfghterstoexploitthe Ukrainianwar,theopenborders,thepotentialtraining andcreationofcells,andtheaccesstoweapons…all ofitindirectbenefttoextendtheglobaljihadover Europeanterritory.

Ontheotherhand,Daeshcondemnedthe participationofChechenfghtersinsupporttoRussia andurgedMuslimstostayawayfromthiskindofwar madeby“crusaders”and“infdels”.

Infact,theUkrainianconfictiscallingtheattention ofDaeshfollowers,asitisevidencedbythecontinuous referencestohowthecurrentevolutionofimprovised explosivedevices’tactics,techniques,andprocedures inUkrainecouldsupporttheirobjectives.

NotonlyspecifcJihadistpropaganda,butseveral otherwebsitessuchas “Kavkazcenter” and “Checheninfo” havebeenindirectlysupportingtheideaoftheJihad againstRussiaandtherelevanceoftheUkrainianconfict initsdevelopment.

TheUkrainianconfictisstillcallingtheattentionto minoritiesandMuslimcommunitiesintheex-Soviet republicstocombatRussia:asanexample,wecould takealookatthefoundationoftheTurkicbattalion

“Turan”inUkraineinlate2022,whichcurrently comprisesAzerbaijani,Kazakh,Kyrgyz,Buryat, Dagestani,Uzbek,andAltaifghters.

LastFebruary,aCaucasianMuslimvolunteer combatunitformedin2022,MuslimCorps“Caucasus” (MKKavkaz),releasedthevideo “Musul’manskij korpus“Kavkaz”zashhishhaetUkrainuUAotorkov

rashistovvBahmute…!” (MuslimCorpsCaucasus defendsUkrainefromtheracistforcesinBakhmut) showingitsmilitantsfghtinginBakhmut,Ukraine. Russiansourcesindicatethegrouptobecomposedof Azerbaijani,Dagestani,Chechen,andTurkishfghters.

Firstindicatorsonradicalizationorjust unmaskedrealobjectives…

Duringlastmonths,theChechenShaikhMansur battalion(currentlyfghtingontheUkrainianside)has beenshowingaslightlydifferentapproachto improvisedexplosivedevices’tactics,techniquesand proceduresthroughsocialmedia,asfollows:

•PreparationanduseofvehicleborneIEDs

•UseofpersonborneIEDsasindividualtactical equipment

Thatspecifcuseofsuicidetacticsisbasedona coupleofexplosive-ladenmagazineholsters connectedtotheplatecarrier:thosedevicesare composedofTrinitrotoluene(TNT)blocks,detonating cord,andaUZGRMfuzeforahandgrenadewhichhas beenmostprobablymanipulatedthroughremovingits timedelaycomponenttoallowinstantdetonation.

Thatinitiativecouldmovetosomepotential consequences:

•Increaseinideologicalradicalizationbythe componentsofthereferredunit.

•BadimageforUkrainianforces,whichcouldbe exploitedbyRussiaasUkraineconnectionto terrorism…

80 COUNTER-IEDREPORT,Spring/Summer2023
“DONBASSWILAYAT”ORHOWTOPLAYWITHJIHADISMINUKRAINIANLANDS Figure6:PersonborneIEDsusedbyShaikhMansurbattalionmembersinUkraine. (Source–Twitter&SkyNews)

SinceOctober2022,militantsfromAjnadal-Kavkaz (أجنادالقوقاز,“SoldiersoftheCaucasus”)arefghting inUkraine.ItisaChechen-ledJihadistIslamic fundamentalistrebelgroupwhichhasbeenfghtingin northernSyria.Theyareactingincoordinationwith ShaikhMansurbattalion,andtheleaderofAjnadalKavkaz(RustamAzhiev,“AbdulHakimal-Shishani”)was appointedbytheleaderoftheChechenRepublicof Ichkeria'sgovernment-in-exile,AkhmedZakayev,as deputycommanderoftheChechenforcesoperating alongsidetheArmedForcesofUkraine.

TheconfuenceofthedecisionbytheUkrainian governmentaboutfacilitatingtheintegrationof ChechenfghtersfromChechnyaandSyriawiththe changeoffocusbyseveralChechengroupsregarding UkraineasabetterwayoffghtingRussiathaninSyria couldinciteotherJihadistgroupstoarriveinUkraine.

2023transnationalvisionfromDaeshinKhurasan Wilayat

FromJanuary2022,DaeshinKhurasanWilayat(ISKP)propagandameanshavebeenevolvingfrom publicationsandmaterialsintheoriginalPashto language(alsoDariandArabicones),intotheuseof Englishintheaimofaworldwideaudience.During 2022,theapproachhasmovedtotranslationsinto Urdu(PakistanandsomezonesofIndia),Uzbek (UzbekistanandminoritiesinAfghanistan,China,and otherformerSovietrepublics),Tajik(Tajikistan, Afghanistan),Hindi(India,Nepal…),Malayalam (KeralaregioninIndia),andeveninUyghur.

OnFebruary4th,2023,the21stissueoftheEnglish languageversionof“VOICEOFKHURASAN”was showingchangesindesign,makingthemagazine morevisualandmodernized.Additionally,itincluded implicitdirectionandguidanceonattacksinrevenge for2023Quranburningsaswellasexplicitreferences topastattacksinWesternterritories.

OnFebruary19th,2023,waspublishedthe22nd issueof“VOICEOFKHURASAN”,whichisbreaking theusualmonthlyreleaseofthemagazineand publishingiteachffteendaysforfrsttime.The evolutionofthepotentialthreattoEuropeandNorth Americainsidethepublicationismainlybasedonthe inclusionofrecommendationsfortargets,tactics, techniquesandproceduresregardingtheconductof attacksinWesterncountries,alongwithmore aggressiveimagespromotingarmedactions.

Inadditiontothat,Al-AzaimFoundationcontinues publishing(andredistributing)aparallelmagazine intheArabiclanguage(صوتخراسان,“Voiceof Khurasan”),whichincludesdifferentarticlesand targetsdifferentaudiences.

Ontheotherhand,theidentifeddynamics regardingpropagandabyDaeshinKhurasanare takingplaceinparallelwithahighincreasein messagesrecommendingviolentattacksagainst Europebyothermediaagenciesandforumsrelatedto Daesh,alongwiththeproductionofnewvideos, redistributionofoldones(translatedandsubtitledinto English,Spanish,French…)dealingwithterrorist actionsinEuropeandNorthAmericainthepast,and

81 counteriedreport.com
“DONBASSWILAYAT”ORHOWTOPLAYWITHJIHADISMINUKRAINIANLANDS Figure7:PagesfromVOICEOFKHURASAN#21and#22. (Source:www.archive.org)

callingforreactionsagainsttheQuranburningsand otherestimatedaggressionsbyChristiancountries toIslam.

WhataboutUkraineasapotentialgatefor terrorisminEuropeanterritory?

DaeshinKhurasanWilayatiscurrentlystrengthening linksandinfuencewithothergroupsandaudiencesin theCaucasus,alongwithtakingsomesortofmore globalrolethroughincludingwiderpropagandatarget audiences,launchinginfuencemessagestothe wholeworldwidecommunity,andprovidingdirect guidanceonplanningandconductingattacksinside Europeanterritory.

Duetoforeignfghters’presenceinmilitary operationsontheUkrainiansoil,jihadistpropaganda andterroristgroupsmightexploittheUkraineconfictto conveytheirmessageandreachabroaderaudience.

Duetoitsstrategiclocation,Ukrainemightbecome a“bridge”betweenEuropeandAsia,particularlythe MiddleEast,forjihadistandterroristgroups.The vacuumofpowerregisteredonUkrainiansoildueto theconfictandKyiv’sstrategytouseforeignfghters againsttheRussiansmightpushterroristcombatants tojointheso-called“internationallegion”toacquire Westerntrainingandweapons,andmaybeusingthem againstEuropeinviolentattacks.

Consideringthatin2021theUkrainianPresident signedadecreegrantingcitizenshiptoforeigners fghtingagainstRussia,ifUkrainewouldbecomea memberoftheEuropeanUnion,theseforeignfghters couldquicklymoveonEuropeansoilandcarryout targetedattacks.

ThepresenceofAjnadal-Kavkazmilitantsraisesthe regionalgeopoliticalrisk.Itconfrmsthefearsthatthe Ukrainianterritorycouldbecomeanattractiveplacefor jihadistfghters.■

REFERENCES

•C-IEDCoE “ThreatNetworks´TacticsTechniques &ProceduresUpdateDecember2022”

•C-IEDCoE “ThreatNetworks´TacticsTechniques &ProceduresUpdateJanuary2023”

•C-IEDCoE “PropagandaonUkrainianExplosiveladenDronesinDaeshChannels”,20FEB2023

•C-IEDCoE “DaeshinKhurasan:transnational visions&threats”,24FEB2023

• www.zaborona.com

• www.ips.ac.rs

• www.nationalinterest.org

Disclaimer

Thisarticledoesnotrepresenttheopinionofany nationalormultinationalorganisation;itswholecontent shouldonlybeconsideredastheopinionoftheauthor. Asalltheinformationhasbeenobtainedfromopen sources,potentialmistakescouldhavebeenmade duringtheresearchprocess.Pleasefeelfreetosend yourcomments,correctionsandinputstotheauthor; theywillbehighlyappreciated.

ABOUTTHEAUTHOR

LieutenantColonelJoseMRufas graduatedfrom theSpanishArmyMilitaryAcademyin1993.Hewas commissionedintotheC-IEDCentreofExcellenceas HeadoftheDefeattheDeviceBranchinAugust2016, andcurrentlyholdingapostofChiefofAttackthe NetworksBranch.AsaMilitaryEngineerOffcer,his backgroundhasbeenmainlybasedonExplosive OrdnanceDisposalactivitiesintheSpanishArmyand C-IEDstaffissuesatthemultinationalheadquarters.In additiontohisEODOperator/EODOffcereducation, heattendedsomeothermilitarycoursesregarding Parachuting,ArmyStaff,InformationOperations,War CollegeGeneral/JointStaff,MilitarySearch,Technical ExploitationOperations,WeaponsIntelligenceTeam, ExploitationLaboratories,HomemadeExplosivesand otherC-IEDcourses.Hisoperationalassignments includeBosniaandHerzegovina(3),Afghanistan(3), RepublicofEcuador,IraqandUganda.

E-mail: jrufas@ciedcoe.org

(أيها الناس خلقناكم من ذكر وأنثى وجعلناكم في عشائر وقبائل قد تتعرفون على بعضها البعض)” (TheHolyQuran,Surahal-Hujurat,Ch.49:V.14)
“Omankind,Wehavecreatedyoufromamaleanda female;andWehavemadeyouintoclansandtribesthat youmayrecogniseoneanother
82 COUNTER-IEDREPORT,Spring/Summer2023
“DONBASSWILAYAT”ORHOWTOPLAYWITHJIHADISMINUKRAINIANLANDS

X-raysystemsdesigned andbuilt forBombTechs

DualDRandCRX-rayImagersinOneX-raysystem

- Extendingyourx-raycapabilityacrossmultiplemissions.

SCANSILC-LightweightRuggedisedDRX-rayDetectors

•Remotecontrolof yourx-raysourcewithoutreapproachusinganysizedScansilcDRx-raypanel.

•Scansilcreducestimeontarget-Minimalcomponentsandsetup-getthejobdonequicklyande ciently.

•Reliablewhenitcounts-Rugged,Resilient,Dust,DirtandWaterResistantinallconditions.

SCANXSCOUT-CRX-rayImagePlates

•Flexibleplates–Truegroundlevelimaging.Slideplatesintotightareas andwraparoundobjects.

•Fastgrabandgo-nocablesorwi-fitoconnect-sonodropouts.

•Combinemultipleplatesingrid formattox-raylargetargets.

SCANSILC 1824 SCANSILC 3643 SCANSILC 8686 SCANSILC 2430
SCANX SCOUT Onecontrollerrunsboth CRandDRplates
www.scanna-msc.com info@scanna-msc.comm
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.