Counter-IED Report Spring-Summer 2024

Page 16

ISSN2050-6732(Print)

ISSN2050-6740(Online)

SYNCHRONIZEDC-IEDSTRATEGYINEUROPETOCOUNTER THEEVOLVINGIEDTHREAT

NECESSITYOFADESIGNATEDLEADENTITYWITHINNATIONAL C-IEDENTERPRISES

NESTINGC-IEDAPPROPRIATELYWITHINASTATE’SNATIONAL SECURITYARCHITECTURE

ATOONARROWSTRAIT:EXPLOSIVETHREATDYNAMICS INTHEREDSEA

IEDATTACKSAIMEDTOIMPEDEINDIA’SECONOMICGROWTH

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN

VIPSECURITY–AMATTEROFLIFEANDDEATH

Counter-IEDReport
Spring/Summer2024
SmartRayVision PremiumX Ray Technology Extreme3XDualSystem AI SMART|RUGGED|DEPENDABLE 877.638.3868|sale s@smartrayvision.com|www.smartrayvision.com

EDITORIALANDTECHNOLOGYPARTNERS

Counter-IEDReport PublishedbyDeltaBusinessMediaLimited 167-169GreatPortlandStreet,5th Floor London,W1W5PF UnitedKingdom

Tel:+44(0)2071932303 info@deltabusinessmedia.com www.counteriedreport.com

ISSN2050-6732(Print) ISSN2050-6740(Online)

Theopinionsandviewsexpressedintheeditorialcontentinthisreportare thoseoftheauthorsaloneanddonotnecessarilyrepresenttheviewsofany organisationwithwhichtheymaybeassociated.Materialinadvertisements andpromotionalfeaturesmaybeconsideredtorepresenttheviewsofthe advertisersandpromoters.Theviewsandopinionsexpressedinthisreport donotnecessarilyexpresstheviewsofthepublisher.Whileeverycarehas beentakeninthepreparationofthereport,thepublisherisnotresponsible forsuchopinionsandviewsorforanyinaccuraciesinthearticles.

©2024.Theentirecontentsofthispublicationareprotectedbycopyright. Fulldetailsareavailablefromthepublisher.Allrightsreserved.Nopartofthis publicationmaybereproduced,storedinaretrievalsystemortransmittedin anyformorbyanymeans,electronic,mechanicalphotocopying,recording orotherwise,withoutthepriorpermissionofthecopyrightowner.

3 counteriedreport.com
MEDIAPARTNERS
CONTENTS IFCSMART RAY VISION 5 ICORTECHNOLOGY 7GARRETTMETALDETECTORS 9 AUNAV 10 SAFEPROGROUPINC. 103DX-RAYLTD 11FOREWORD ByRobHyde-Bales,ConsultingEditor,Counter-IEDReport 13 TELEDYNEICM 15 VIDISCOLTD. 15CANADIANTECHNOLOGYSYSTEMS-CTS 4 COUNTER-IEDREPORT,Spring/Summer2024 CONTENTS

SMART, STRONG, AFFORDABLE

CONTENTS

16SYNCHRONIZEDC-IEDSTRATEGYINEUROPE TOCOUNTERTHEEVOLVINGIEDTHREAT

ByJohannFischer,HeadofUnitLand&Logisticsand DannyHeerlein,ProjectOffcerC-IED EuropeanDefenceAgency

26EUROSATORY2024

27NECESSITYOFADESIGNATEDLEADENTITYWITHIN NATIONALC-IEDENTERPRISES

ByPaulAmoroso,anexplosivehazardsspecialist atAssessedMitigationOptions(AMO)consultancy

34COUNTERTERROREXPO – CTX2024

35NESTINGC-IEDAPPROPRIATELYWITHINASTATE’S NATIONALSECURITYARCHITECTURE

ByPaulAmoroso,anexplosivehazardsspecialist atAssessedMitigationOptions(AMO)consultancy 42SAHAEXPO2024–TÜRKİYE’s LEADING INTERNATIONALDEFENCE&AEROSPACEEXHIBITION

6 COUNTER-IEDREPORT,Spring/Summer2024
CONTENTS

Countermine Detectors

Find IEDs, UXO, and Mines with Garrett Detectors

Trusted worldwide. Garrett AML Pulse Induction countermine detectors save lives by finding mines, UXO, and IED threats in all-terrain conditions.

Uncover the Unseen™
Scan for more info

43ATOONARROWSTRAIT:EXPLOSIVETHREATDYNAMICS INTHEREDSEA

ByLieutenantColonelJoseMRufas,ChiefofAttackthe NetworksBranch,C-IEDCentreofExcellence

51IEDATTACKSAIMEDTOIMPEDEINDIA’S ECONOMICGROWTH

ByColonelHRNaiduGade–IndianArmyVeteran

60FUTUREFORCESFORUM2024

61ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN

ByChiefSuperintendent(ret.)MichaelCardash,Terrogence-Global

75KADEX2024 – KOREAARMYINTERNATIONAL DEFENSEINDUSTRYEXHIBITION

76VIPSECURITY–AMATTEROFLIFEANDDEATH

ByVincentDeery,CEO,3DX-RayLtd

IBCMILIPOLQATAR2024 OBCSCANNAMSCLTD 8 COUNTER-IEDREPORT,Spring/Summer2024 CONTENTS CONTENTS

FOREWORD

Itismorethan50yearsagosincetheImprovised ExplosiveDevice(IED)madeitsfrstsignifcant globalappearance,andthiswasintheconfictin NorthernIreland.Inthosedaysitwasknownasa RoadsideBomb.Itrapidlyfoundfavourwithallthe terroristfactionsintheProvinceandtheIrish RepublicanArmy,inparticular,becameveryadept bombmakers.TheindiscriminateuseoftheIED exactedahightollindeathsandinjuriesamongthe securityforcesandcivilianpopulationinboth NorthernIrelandandmainlandUK.Suchwasits effectivenessthatthemilitaryhadtousehelicopters toensuresafemovementratherthanroadtravelin partsoftheProvince.

Violentextremistorganisations,splintergroupsand terroristsaffliatedwiththemcontinuetoposea signifcantdangertohumanlifeandtocausemass casualtiestargetingpubliceventsandgatheringsas wasdemonstratedintheManchesterArenaattackin May2017,theHamasattackonIsraelinOctober 2023andveryrecentlyintheattackonamusicvenue inRussia.On22March2024,aterroristattack occurredattheCrocusCityHallinKrasnogorsk, Moscowregion.Theattackclaimedover140lives andmorethan550peoplewereinjuredbygunshot woundsandfre-relatedinjuries.Fourattackers armedwithgunsandincendiarydevicesstormedthe

packedconcertarenabeforesettingitonfre.The allegedattackersweredetainedintheBryanskregion ofRussia,400kilometressouth-westofMoscow hoursafterthemassacre.ISIS-K,theAfghanistanbasedsplintergroupoftheIslamicState(IS,formerly ISIS),claimedresponsibilityshortlyaftertheattack. Theinvestigationisongoing,andaccordingto thelatestreports12suspectswerearrestedin connectionwiththisattack.

Theconfictandtensionscontinuethroughout numerousregionsoftheworldasweapproachthe mid-pointof2024,andtwowarsinparticularshowno signsofresolution.InmainlandEurope,thewarin Ukrainehasrecentlywitnesseditsunwelcome secondanniversary.Afterarecentlullinground operationsduringthelocallynamed Rasputitsa,or theseasonofbadroads,duringwhichtimethe Russianarmedforcesregroupedandreplenished.It nowseemslikelythattheywillagainattempttobreak throughtheUkrainiandefenceswithlikelyemphasis onthestrategicallyimportantregionaroundthe cityofKharkivinnorth-easternUkraine.Asthewar continuestoexactaterriblelossoflifeonbothsides, oneofthenotablethreatswhichtranspiredfromthe Russia-Ukraineconfictistheextensiveuseof explosive-ladenaerialdrones,orone-wayattack (OWA)unmannedaircraftsystems(UAS).The

FOREWORD
11 counteriedreport.com

extensiveuseofOWAdronesaddstotheEO/UXO contaminationrisksoftheterritoriesfarbeyondthe immediatebattlefeldduetotheshootdowns, electroniccounter-measuresandmalfunctions. Emergencyservices,repairworkers,farmersand civilians,especiallychildren,maybeparticularlyatrisk duetocuriosityandbeingunfamiliarwithexplosive hazards.Also,tacticaluseoftheweaponisedfrstpersonview(FPV)dronesnowposesarealproblem tomilitarypersonnel,armouredvehiclesandother militaryassetsalongthecontactlineinUkraine.This wasdiscussedindetailbyLtColJoseRufasinhis article1 earlierthisyear ‘ProtectingSteelfromHornets: RussianreactionstothetacticalthreatbyexplosiveladendronesintheUkrainiantheatreofoperations’. TheuseoftheFPVdroneshasincreasedinthepast fewmonthsandthedevelopmentofcounter-measures isurgentlyrequired.

Throughouttheconfict,therehasbeen widespreaduseoflandminesbybothsidestobolster theirdefensivepositions.Inthethirdyearofthewar, UkrainehasovertakenAfghanistanandSyriato becomethemostheavilyminedcountryintheworld. LandmineMonitorReportof2023statesthatUkraine isheavilycontaminatedbylandmines–bothAVand AP–aswellasotherERWincludingIEDsand unexplodedclustermunitions.Itisestimatedthat some8%ofUkrainianland–some7000sqkmare affected.TheseminesdatefromtheFirstand SecondWorldWarsandalsothecurrentwarsince 2014.TheUnitedStatesisthelargesthumanitarian deminingdonortoUkraineandremainscommittedto supportingUkraine'seffortstoaddresstheimpactsof explosivehazards2.TheDepartmentofStateis leadingtheU.S.government'sresponse,having committed$182milliontotheeffortsinceFebruary 2022.Therecentinfuxofmineclearanceequipment, alongwithintensivetraining,internationalfunding andnewtechnologies,suchastheintegrationof artifcialintelligence(AI)andaerialdronesintomine

clearanceprocedures3,canspeeduptheinitial surveyprocess,aiddeminingeffortsandprovidesafe accesstoclearedland.

Theothermainareaofconficthasbeenthe MiddleEast–specifcallythewarbetweenIsraeland HamasandtheattacksbyHouthirebelsonshipping intheRedSea.Sincetheoutbreakofthiswarin October2023whenHamasbrutallyattackedIsrael, fghtinghascontinuedunabatedinGazawith increasinglossoflivesonbothsides.Thetwo primarystatedaimsofIsraelarethedestruction ofHamasandthefreedomforIsraelihostages kidnappedbyHamasmorethansixmonthsago.The conficthasresultedindestructionofinfrastructurein Gazaincludinghospitalsandlivingaccommodation. Gazahasnotbeenaffectedbylandminesperse,but veryheavilycontaminatedbyERWastheresultof artilleryandmissilestrikesduringthelatestperiodof violencesinceOctober2023.UNMASreportthat ERWposeasignifcantthreattociviliansinGazaand thelackofmedicalfacilitieswhichhavebeeneither damagedordestroyedmakesthetreatmentofthe woundedverydiffcultindeed.Additionally,Hamas hasbooby-trappeditstunnelsandotherfacilities withIEDstoimpedeIDFadvancesandhostage rescueoperations.

TheconfictintheMiddleEasthasnowwidenedto includetheactiveparticipationofIran.On1AprilIsrael launchedanattackontheIranianconsulatein Damascuskillingsevenpeopleincludingtwo membersoftheIslamicRevolutionaryGuardCorps. On14AprilIranrespondedtothisattackbylaunching morethan300missilesanddronesintoIsraeliterritory targetingmilitaryinstallations.Thisisthefrsttimethat IranhasdirectlyattackedIsraeliterritoryfromits homeland.Inresponseon19AprilIsraellauncheda limitedandtargetedstrikeonanairdefenceradarsite nearIsfahaninIran.

Elsewherearoundtheglobelandmines,IEDsand otherERWcontinuetoposesevereproblemstoboth

1 https://issuu.com/deltabusinessmedialimited/docs/counter-ied_report_winter_2023-24/69?fr=sMDQ3NTY2MjUwODM

2 https://www.state.gov/improving-food-security-in-ukraine-through-demining/

3 https://counteriedreport.com/safe-pro-ai-to-present-its-spotlightai-ai-powered-next-generation-demining-solution-at-thegeneva-international-centre-for-humanitarian-demining-innovation-conference/

FOREWORD 12 COUNTER-IEDREPORT,Spring/Summer2024

thesecurityforcesandthecivilpopulations.Thisis particularly,butnotexclusively,thecaseinAfghanistan, Syria,Iraq,India,Nigeria,PakistanandSomaliawhere theycontinuetocausewidespreadlossoflifeand impedeeconomicdevelopment.LandmineMonitor Report2023statesthatCambodiaremainsoneofthe world’smostaffectedstatesduetocontamination bymines,clustermunitionremnants,andexplosive remnantsofwar(ERW),asaresultofconfictfrom the1960suntilthe1990s.Asof theendof 2022,Cambodiahad identifed681sqkmofland contaminatedwithAPlandminesand 741sqkmcontaminatedwithcluster munitionremnants.Asastark reminderoftheinheriteddanger posedbyexplosiveordnance andintherecentunfortunate episode,anexplosionoccurredata militarybaseinKampongSpeu provinceinsouthwesternCambodia whichclaimedthelivesof20soldiers. Accordingtoanarmyspokesman theexplosionwascausedby mishandlingofammunitionbytroops.

IntheirarticleonaSynchronised C-IEDStrategyinEuropetoCounter theEvolvingIEDThreatJohann FischerandDannyHeerleinofthe EuropeanDefenceAgencyprovidea highlyinformativeinsightintothe EDA’seffortstosupportMember StateswithmultipleC-IEDprojects. Athree-dimensionalmodelfor categorisingexplosivedevice(ED) incidentsandtwonewtechnologies arediscussedalongwithfurther considerationoftheoverallIED problem.Theyhighlightthe challengeinreachingastandardised defnitionofanIED.Theyemphasise thatalltheirworkiscoherentwiththe NATOC-IEDapproachbasedonthe

principlesofPreparetheForce,AttacktheNetworks andDefeattheDevice,allsupportedbyunderstanding andintelligence.TheyoutlinetheEDAC-IED approachanddescribethedifferentprogrammesand theirobjectives.Asoftoday,19MemberStates participateintheirprogrammes.Thereisaregular validationoftheircapabilitiesandtheirinteractionby meansofliveexercises,themostrecentbeinghosted bytheSpanishArmedForces.Basedonthecurrent

→ Lightweight (2.5 Kg & 2.9/4.3 Kg) → Battery-operated generator → Large active area (up to 43x35 cm) → High-quality imaging → Reach the most inaccessible areas → User-friendly and fast set-up

Sherlock Security software

FOREWORD 13 counteriedreport.com LiteX & TactX/XL ULTRA-PORTABLE
COMPACT
SYSTEM
www.teledyneicm.com
&
X-RAY
& RELIABLE SOLUTION FOR EOD OPERATIONS
FAST

defnitionofImprovisedWeaponsathree-dimensional modelhasbeendevelopedtocategorisetheincident ratherthanthedevice.Theauthorsconcludetheir articlewithexcellentadvice;Alwaysbeonestep aheadofyouropponent;Addressingyesterday’s threatwillnotanswertomorrow’squestions;Turnour technologicaladvantageintooperationalvalue.

PaulAmorosoofAssessedMitigationOptions continueshisseriesofarticlesonnationaland regionalCounter-IEDefforts.Inapreviousarticle4 theauthoridentifedtherequirementtonamea legallyempowerednationalC-IEDleadentitywithin anationalC-IEDenterprise.Inthefrstoftwoarticles theauthorexaminestheneedforandpotential optionsforsuchaleadentity.Thememberswhowill constitutetheenterprisewillrepresentaWholeof SocietyApproachandwillvaryaccordingtofactors suchastheIEDthreatbeingcountered,theextant legalframework,resourcesavailable,statesecurity andgovernmentstructures,theneedtocoordinate withregionalandinternationalC-IEDinitiatives andthepresenceofcivilsocietyandindustry representatives.Thelegalframeworkunderwhich theentitycouldoperatemaybecriminaljustice,CT, counter-insurgencyorawarsituationdependingon theIEDthreat,andthiswillhelptodeterminethe leadentity–anewoffce,policeorjusticesystem led,militaryenterpriseled,existingnationalmine actionauthorityled,orasmallarms/lightweapons commissionlead.Theauthorexamineseachof thesepotentialleadentitiesandconcludesthatthe choiceofentitywilldependonthedesignatedlegal frameworktogetherwithotherconsiderations.The leadentitywillinevitablybefacedwithdaily challengesandwillneedtodemonstrateleadership, tact,diplomacyandnotleast,patiencetoundertake therole.Inhissecondarticletheauthorexamines howanynationalC-IEDenterpriseneedstobe appropriatelynestedwithinastate’snational securityarchitecture.AsC-IEDevolvesitshouldbe integratedaspartofwidernationalsecurity strategies.Thesestrategiesrefertoallentities

4 Counter-IEDReport,Autumn2023,pp15-21

involvedintheprovisionofpublicsafetyandnational securitywhooperateunderstategovernance.The authoridentifes15elementswithadescriptionof potentialsecurityordefenceentitieswhichcould undertaketheactivitiesassociatedwitheach, togetherwithconsiderationsforroles,duties,and responsibilities.Theelementswillformthebasisof anationalC-IEDenterpriseunderthecategories ofcross-cuttingC-IED,preventativeC-IEDand responsiveC-IEDelements.Onceastatehasan informedunderstandingoftheIEDthreatitfacesand determinedthepriorityofC-IEDelementsinwhichit willinvestalongwiththelegalframeworkunder whichitwilloperate,genericstakeholdermapping willallowallmemberswithintheC-IEDstakeholder communitytobeidentifed.Itisimportantthatthe establishedC-IEDenterpriseisadaptedtoftwithin theexistingstatesecurityarchitecture.■

DuringhiscareerintheUKRoyal Engineers, RobHyde-Bales was responsibleforlandmineclearancein Libyaand,morelatterly,Afghanistan intherunningofthefrstUnited Nationshumanitarianlandmine clearancetrainingprogramme–OperationSalam.Theprogramme trainedAfghanmalerefugeesinlandmineclearance techniques,andAfghanwomenandchildreninmine awarenessandavoidancetraining.Morerecentlyheset uptheCaribbeanSearchCentreinKingston,Jamaica. TheCentreisdesignedtotrainsecurityforcesacross theCaribbeaninmodernsearchtechniques.After retiringfromthearmyhejoinedCranfeldUniversityat Shrivenham,nearOxford,andundertookaresearch projectonbehalfoftheUKMinistryofDefencethat examinedwaystoimprovethesharingofIEDthreat informationbetweenthemilitaryandcivilian organisationsinhazardousareas.

RobHyde-Balesbiography
FOREWORD 14 COUNTER-IEDREPORT,Spring/Summer2024

SYNCHRONIZEDC-IEDSTRATEGYINEUROPE TOCOUNTERTHEEVOLVINGIEDTHREAT

ByJohannFischer,HeadofUnitLand&LogisticsandDannyHeerlein,ProjectOffcerC-IEDEuropeanDefenceAgency

ThisarticleprovidesanoverviewofhowtheEuropeanDefenceAgency(EDA)supportsthecontinuouseffortofour MemberStateswithmultipleC-IEDprojects,namely:theJointDeployableExploitationandAnalysisLaboratory(JDEAL); the EuropeanCentreofManualNeutralizationCapabilities(ECMAN); theMilitarySearchCapabilityBuilding(MSCB); SmartFutureCounterImprovisedExplosiveDevicesFieldLaboratory(SFC-IEDFL);andBisonCounterC-IEDExercises CapabilityBuilding(BC-EX).Inadditiontotheseprojects,athree-dimensionalmodelforcategorisingincidentsinvolving EDsandtwonewtechnologies,whoseaddedvaluefortheC-IEDsectorwillbetested,arepresented.Finally,further considerationsonthetopicofC-IEDareraised.

INTRODUCTION

TheIEDthreatisconstantlyevolvingdueto technologicalprogress,changingconfictpartiesand theircorrespondingintentions.Mitigatingthisthreat andadequatelypreparingthetroopsforthescenarios oftomorrowrequiresaconstanteffortbytheEU MemberStates(MS).

ButwhatisanIED?Howdoyoucounterthisthreat, andwhenareyourowncapabilitiessuffcientto adequatelycounterthethreatoftomorrow?Perhaps thefrstaspectofthequestionseemstooobvious.

Ofcourse,eachoneofusknowswhatanIEDis,but havingdiscussionswithotherexpertsshowsthat reachingastandardiseddefnitionisarealchallenge. However,ifthisdefnitionisreplacedbyamodelthat providesagenerallyvalidrepresentationofthe underlyingaspectsofthethreat,incidentscanbe clearlycategorised.

Thisarticleprovidesanoverviewofhowthe EuropeanDefenceAgency(EDA)supportsthe

continuouseffortofourMemberStateswithmultiple C-IEDprojects-allcoherentwiththeNATOC-IED approach.Thefocusisfxedonthelanddomain projectssincethemajorityofIEDshavebeenfound onland.Aswellastheintroductionofathreedimensionalmodelforthecategorisationofincidents withexplosivedevices,thisarticlepresentsan overviewoftwonewtechnologieswhoseadded valuewillbetestedinthefeldofC-IEDs.

NATOC-IEDAPPROACH

Accordingto(NATO,2018)Figure1NATO,the processofmitigatingtheriskscausedbyIED activitiestominimisetheimpactonownoperations islikeabuilding.Itsroofissupportedbythree mutuallysupportingandcomplementarypillars standingonastrongfoundation.Understandingand intelligencearethefoundationforanyoperation,and itfacilitates:

SYNCHRONIZEDC-IEDSTRATEGYINEUROPE
16 COUNTER-IEDREPORT,Spring/Summer2024

Figure1:TheC-IEDapproachwithsupportingpillarsas describedinNATOStandardAJP3.15(NATO,2018)

•attackingthenetworks(AttacktheNetwork,AtN), •enabledefeatingthedevice(DefeattheDevice, DtD)and •supportproperpreparationoftheforce(Prepare theForces,PtF).

“DtD isajointactivityaimingatdetecting, neutralizingandmitigatingIEDsandIEDevents’ effects.”(NATO,2018)todeliverfreedomto manoeuvre,protectingthepopulationandproviding physicalsecurity.

“AtN istheproactivepillaroftheC-IEDapproach andthe prevent and pursue activitiesoftheC-IED conceptofoperations.”(NATO,2018)todefeatan improvisedexplosivedevicesystem.

“PtF isajointtaskandcomprisesallmeasures requiredtopreparefriendlyforces”(NATO,2018)to accomplishtheirmissionunderapermanentIED threat.

“Understandingandintelligence supportallthree pillarsoftheC-IEDapproach.“(NATO,2018)

AsuccessfulC-IEDapproachis,amongothers, tailoredtothesuperioroperations.

EDAC-IEDAPPROACH-PROJECTTEAMFOR C-IEDANDSELECTEDPROJECTS

Ingeneral,EDAsupportstheMemberStatesin creatingcomprehensiveandcommonconceptual approachestoreducethecapabilityshortfallof thoseMemberStates.InthecontextofC-IED,the differentC-IEDeffortscanbeunderstoodas capabilitiesthatcanbecombinedbasedonthe operationalneeds.TheProjectTeamforC-IED(PT C-IED)supportsMemberStatestofurther implementaneffectiveC-IEDstrategy(EDA,2023).

ThePTC-IED’smissionisestablishinganetworkof EuropeanexpertsfromtheMemberStates dedicatedtoidentifying,assessinganddeveloping potentialcollaborativeactivities,projectspursuantto effective,coherentandtechnologicallyadvanced C-IEDandCBRNecapabilitieswithinEuropean ArmedForces.

Followingisabriefintroductionofthedifferent programsandtheirobjectives:

•The JointDeployableExploitationAndAnalysis Laboratory(JDEAL) contributestoUnderstanding andIntelligencebyexploitationofexplosive devices,providesimmediateinformationto preparetheforcesonthecurrentthreatand deliversimportantinformationasbaselinefor attackingtheenemy(IED)network(accordingto (JDEAL,2024)).

•TheEuropeanCentreofManualNeutralization Capabilities(ECMAN) empowersExplosive OrdnanceDisposal(EOD)personneluptothe highestlevelofexpertise.These“HighThreat Operators”areapremium-qualitycapabilityinthe lineof“DefeattheDevice”(accordingto(ECMAN, 2024)).

•The MilitarySearchCapabilityBuilding(MSCB) developscoursestofurtherimproveMember States’capabilitiesinthefeldofsearchanddetect IEDs.Thiscontributestothe“PreparetheForce” pillarandthereforecreatesthebaselineforlater effortsinthecontextof“DefeattheDevice”.

SYNCHRONIZEDC-IEDSTRATEGYINEUROPE 17 counteriedreport.com

•Withinthe SmartFutureCounterImprovised ExplosiveDevicesFieldLaboratory(SFC-IEDFL), newtechnologiesandtheirmilitaryusageincontext ofC-IEDareexploredtoensurethattheused techniquesarekeepingpacewiththedevelopment.

ThecenterofgravityforthePTC-IEDarethese capabilitydevelopmentprojects.Asoftoday,19MS areparticipatinginLand&Logistics’C-IEDprogram, (asinFigure2).

FREQUENTVALIDATIONOFTHE

CAPABILITIESANDTHEIRINTERACTION

Everytwoyears,theEDAProjectBisonCounter C-IEDExercisesCapabilityBuilding(BC-EX, 2024)offerstheopportunitytovalidatenewly developedorimprovedcapabilities,tactics, techniquesandproceduresintwoways.Firstly, thecapabilitiesthemselvescanbetestedlargelyinisolation-inarealisticscenario. Secondly,itisalsopossibletoverifyhowthis furtherdevelopedcapabilityftsintothe structureoftheotherC-IEDenablersinorderto counteranIEDthreatinacomplexenvironment.

BC2023,thelatestexecuted,multinational, liveexerciseunderBC-EXwashostedbythe SpanishArmedForcesandmobilizedmorethan 1,000personnelfrom16MemberStatesand

thirdcountries,eitheractivelyindifferenttrainingsor asobservers.Morethan270scenarioswere conductedbetweentwoexercisesites–landbased andmaritimeenvironment.

BC23C-IEDconceptwasbasedonafull-spectrum, multilevelandmultidomainapproach,integratingthe intelligencecyclewhichallowsinterconnectionamong alllevels.Figure3,andtheassignedC-IEDenabler illustratestheunderstandingofthis.

SYNCHRONIZEDC-IEDSTRATEGYINEUROPE 18 COUNTER-IEDREPORT,Spring/Summer2024
AT BE CH CZ CY DE ES FI FR HU IE IT LU NL NO PT RO SI SE Participating JDEAL 14 ECMAN 9 MSCB 8 SFC-IEDFL 8 BC-EX 2023 13 Participation 5 5 1 1 1 4 4 2 2 2 3 3 2 4 2 4 1 2 5 Intented Participating LeadNation
Figure2:ParticipatingMemberStatesandthirdcountriesgroupedbyLand&Logistics'C-IEDprojects.

Itisassumed,thatduringanoperationanIEDwas suspectedbytheinvolvedforces.ThissuspectedIED canbeconfrmedinvariousways,includingRoute Clearance(RC),usageofMilitaryWorkingDogs(K9) andUnderwaterWork(UW),capabilitiesthatare amongstothersalsodevelopedandimprovedwithin MSCB.

OncetheIEDisconfrmed,the(C-IED)TaskForce decideshowtoeliminatethisthreat.Thecommon approachistaskingExplosiveOrdnanceDisposal (EOD).

Insomecases,theuseofEODmaybe inappropriateortheriskofexplodingadeviceis unacceptable(i.e.directthreattohumanlife,recovery ofanintactdeviceisofinterestforexploitationetc.). Therefore,manualneutralizationisrequired.This highestlevelofskillandtrainingcanbeachievedby coursesdeliveredundertheECMAN.

Aftereliminatingthethreat,collectionofevidencefor furtherinvestigationisattempted.Thisisusuallydone byaWeaponIntelligenceTeam(WIT)orsimilar capabilities(Level1exploitation).Thecollectedpieces ofevidenceareforwardedtoLevel2Exploitation,a capabilityprovidedbyJDEAL.Theresultsprovide informationonenemyTechniques,Tactics,and Procedures(TTP),whichcanbeusedinfurther operationalplanningandthuscontributedirectlytothe preparationoftheforces(PtF).

ThedifferentiterationsofBC-EXprovedthatthe capabilityshortfallincontextofC-IEDhasbeen

reducedbycontinuousEDAprojects.This assessmentisalsosupportedbythelatestversionof theCapabilityDevelopmentPlan(CDP)in2023. Nevertheless,thefollowingchapterillustratesthat thereisstillagreatneedfortheafore-mentioned projectstosupportMemberStatesinimprovingthis operationalcapability,tomaintainthisadvantageand furtherexpandit.Inaddition,twocurrentlyplanned effortsundertheSFC-IEDFLandtheirexpected beneftinthefeldofC-IEDareintroduced.

REFLECTIONOFTHEIEDDEFINITION

InthecontextofC-IED,thetechnicalandtactical categorisationofIEDrelatedincidentsaredescribed bytheJointImprovised-ThreatDefeatOrganization (JIDO).ManyMemberStatesrefertothiscategorisationandhavemadeitasquasi-standard.

JIDO(JIDO,2017)defnesImprovisedWeaponsas following: “ImprovisedWeaponsincludemodifed weaponsandmunitions,IEDsandimprovisedCBRN, aretypicallyemployedbynon-stateactors,and canincludechemical,biological,orradiological enhancements.Theseweaponsincorporate destructivepayloadsandfllersdesignedtokill, destroy,incapacitate,harass,ordistract.Improvised weaponscanincorporatemilitaryordnancebutare normallymadefromacombinationofmilitaryordnance andnon-militarycomponents.”Phraseslike“typically”, “caninclude”and“normallymadefrom”havenotbeen suffcienteveninthepasttodefneallformsof

Figure4:CategoriesofImprovisedWeapons(JIDO,2017).

SYNCHRONIZEDC-IEDSTRATEGYINEUROPE 19 counteriedreport.com

Figure5:ExampleofAnti-TankMissiles(ATM),thathavebeendocumentedintheUKRAINE(CentreC-IEDBWJFOCOM).

incidentsorclearlydistinguishbetweenIEDsandCM (ConventionalMunitions)1.

Figure5providestwoexamplesofAnti-Tank MissilesdocumentedinUkraine.Whereastheswitch/ trigger/launchingmechanismoftherightATMwas modifed,theATMontheleftsidewasnotmodifedat all,butthemannerofdeliverywasimprovised.

Thisexamplesupportstheassessmentthatthe currentcrisishasincreasedtheissuesofaninsuffcient IEDdefnition.Finetuningintheexistingdefnitionsis nolongertherightapproach.Instead,arethink fromscratchseemstoberequiredtowardsa comprehensivedefnition.Therefore,MemberStates agreedtoaddressthisissueunderthePTC-IED.The followingproposalmustbeunderstoodasabaselinefor thisdiscussion.Basedonthecurrentdefnitionof ImprovisedWeapons(JIDO,2017),athree-dimensional modeltocategorisetheincidentinsteadoftheexplosive devicewasdeveloped,wherethedimensions correspondtofollowingcriteriaandsubcategories:

•TypeofActor: RegularForces,PrivateMilitary Contractors(PMC),IrregularForces.

•TypeofMainCharge: Military,Commercial, Improvised.

•TypeofDelivery: Accordingtothedoctrine, improvisedmanner.

Figure6givesanexampleofthismodel,together withthefollowingvisualinterpretations:

•EachincidentcanbedescribedastripleofForce, MainCharge,andMeansofDelivery.

•Theoriginofthemodel,interpretedas“Regular Forces,useMilitaryMainChargeaccordingtotheir doctrines”,describesconventionalwarfare.

•Themostexpandedcombination,describedas “IrregularForces,useimprovisedMainChargein animprovisedmanner”,describesirregular warfareandwhatwehadinmindwhensayingIED inAFGHANISTAN.

•Allcombinationsinbetweencanbeunderstoodas hybridwarfareandthe“distance”totheoriginof themodelisameasurementfor“howimprovised” theenemies’TTPsare.

Basedonthefollowingexamplestheopportunityto intuitivelycategorizeincidentswithexplosivedevices withthismodelareshown:

1.RegularforcesdeployseveralAnti-TankMinesas minefeld.

2.Regularforces,deployoneAnti-TankMissilebya UAV.

3.PrivateMilitaryContractors(PMC)attack infrastructurewithmortars.

1TheIEDLexicon,5thedition,2017isamendedandreplacedbytheIEDIncidentReportingGuide,6thedition2024,that defnesIEDasfollowing“Unconventionalexplosiveweaponthatcantakeanyformandbeactivatedinavarietyofways.It mayincorporatemilitaryand/ornon-militarycomponents.”“Thesedevicescanbeplacedorfabricatedinanimprovised mannerincorporatingdestructive,lethal,noxious,pyrotechnicorincendiarychemicalsdesignedtodestroy,incapacitate, harass,ordistract.”Themodelforcharacterizingincidentswithexplosivedevicespresentedinthisdocumentdoesnot contradictthisdefnition,butratherattemptstosupplementit.

SYNCHRONIZEDC-IEDSTRATEGYINEUROPE 20 COUNTER-IEDREPORT,Spring/Summer2024

Figure6:Three-dimensionalmodeltocategorizeincidentswithexplosivedevices.Leftimageshouldbeunderstoodas intermediatesteptodevelopthemodelontheright(Heerlein,2024).

4.ATerroristArmedGroup (TAG)usecommercial/civilian explosivesagainstaradio mast.

5.ATAGusesHomeMade Explosives(HME)toattacka militaryconvoy.

Thismodelpromisesthe followingadvantages,whichhave tobeverifedorextendedin furtherdiscussionwithintheEDA framework:

•Providingameasurementfor “Howfarawayfromregular warfare”/“howimprovisedare theenemy’sTTPs”,

•Providingcriteriatodecide whichlevelofEODtoget deployed,

Figure7:AssignmentoftheprovidedexamplesofincidentswithEDtothe combinationoptionsinthethree-dimensionalmodel(Heerlein,2024).

SYNCHRONIZEDC-IEDSTRATEGYINEUROPE 21 counteriedreport.com

•Prioritisationofpostblastinvestigation(WIT),

•Prioritisationofevidencecollection&exploitation,

•Documentandassessthegenerationofenemy’s TTPs,

•Compareenemy’sTTPsofdifferentareas,

•DevelopproflesofTTPsandestimatefuture threat.

ENHANCEDPOSTBLASTINVESTIGATION

AsreviewedundertheChapterFrequentvalidationof thecapabilitiesandtheirInteraction,andin accordancetotheNATOdoctrine,AnnexA-5(NATO, 2018),postblastexploitationisdescribedas“Tactical on-siteexploitationthatrecordsthedetailsofanIED eventandpreserves,describesandrecoversphysical, technicalandforensicmaterials”.Thistaskisusually conductedbyaweaponsintelligenceteam(WIT)after thesitehasbeenrenderedsafebyExplosive OrdnanceDisposal(EOD)andsecuredbyForce Protection(FP).Tothebestofourknowledge,most MemberStateslimitthetimeforthisexploitationtoa maximumofonehour.Asaresult,thetimeauthorised forthispost-blastinvestigationandthequalityofthe resultsarealwaysincompetitionwitheachother.Ina

warsuchastheonetakingplaceinUkraine,this competitionisfurtherexacerbatedbytheincreased timepressureresultingfromthedynamicbattles.

BasedonthearchivedresultsofsomeMember States,EDAundertheumbrellaoftheSFC-IEDFLis investigatinganopportunitytoenhanceWITwithmore effectivetechnology.Figure8showsascreenshotof anarea,whichwasdocumentedbyacameracarried byasmallUnmannedAerialVehicle(sUAV).The documentedareawasthesurroundingofapointof impact(POI),thedocumentationwasconductedunder followingcircumstances:

•Theareatodocumentwas76x90meters.

•Thedistancebetweenoperatorandspotwas 200meters.

•Thedronewasfyingatanelevationof38meters.

•Andthetimeforthedocumentationwas9minutes.

Duringthepostprocessingtheproducedimages (236images)weretransferredintoavirtual environmentthatallowsalltypesofmeasurement andvisualisation.Figure8forexamplerepresents thearea color-codedaccordingtotheelevationofthe groundtoassesschannelizingterrain.

SYNCHRONIZEDC-IEDSTRATEGYINEUROPE 22 COUNTER-IEDREPORT,Spring/Summer2024
Figure8:Screenshotofavirtualenvironmentbasedonadocumentationundertheaforementionedparameters.

Thevirtualrepresentationoftheenvironment,the so-calledvirtualtwin,allowsalsotopreciselymeasure orexploitthedimensionandshapeofspecifcpointof interest.Figure9,forexample,showsfourdifferent crosssectionsofthecratercausedbytheexplosionof asimulatedIED.Thisnewapproachallowstomeasure allcrossconnectionsandenablestheanalyststodraw morepreciseconclusionsoftheshapeandsizeofthe explosivematerial.

COLLECTIONOFENVIRONMENTALDATA

Whilethedocumentationviasmalldronesisverywell suitedtocapturealimitedspace,thismethodseems lesssuitableforthedocumentationoflargerspaces, e.g.,alongamarshroad.RedTeamingisacommon waytoidentifyvulnerablepoints.Inthecontextof C-IED,thesepointsoftenfulflseveralofthefollowing criteria:

•Channelizingterrain, •Reducingmarchingspeed, •OpportunitytoemplaceanIED(underneaththe road),

•Frequentlyused, •Reducestheeffectivenessofyourownprotective equipment.

Collectingandsynchronisingthesedatamanuallyis time-consumingandexposesthepersonnelfulflling thattasktoanincreasedrisk.Kinematicdata acquisitiondescribestheautomateddocumentationof theenvironmentvialasertechnologywhiledrivingand isthereforesometimesparaphrasedwiththeterm “MobileMapping”.Thistechnologyisalreadywidely usedinnon-militaryapplications.Basedonthe archivedresultsofsomeMemberStates,EDAunder theumbrellaoftheSFC-IEDFLisinvestigatinghowto

SYNCHRONIZEDC-IEDSTRATEGYINEUROPE 23 counteriedreport.com
Figure9:Fourdifferentcrosssectionsofthesamedocumentedcrater.

makeuseofthistechniqueinamilitarycontextcollectingenvironmentaldatawithhigherqualityinless timeandwithlessriskforthedeployedtroopsisthe desiredresultofthistesting.

Figure10providesoneexampleofadocumentationdonebyGermanyinMALI.Duringthis campaign,about90kmofamainsupplyroutewere documentedinbothdirections,inlessthanfourhours. Thecollectedrawdataneedstogetpostprocessedto createavirtualenvironment(“virtualtwin”)thatallows -similartotheintroducedresultsundertheheading EnhancedPostBlastInvestigationofalltypesof measurementsandvisualization.Followingisalistof resultsandpossibleapplicationsinamilitarycontext:

•Panoramaimagewithmetadata(drivingdirection, GPScoordinates/-time),

•Virtualenvironmentofthedocumentedarea,colorcodedaccordingto:

◦theelevationofthegroundtoidentify channelizingterrain,

◦intensityvaluestodetectdifferencesinmaterial,

◦realcolourtovisuallyidentifypointsofinterestin thevirtualenvironment.

•Precisemeasurementofdistances,areas,and dimensions,

•LineofSightanalysis,

•Bird–and1stPersonview.

CONCLUSION

ThisarticleprovidesyouanoverviewaboutEDA supportingourMemberStatesthroughcapability developmentinthewiderangeofC-IEDs,andhow theseindividualeffortsarefrequentlyverifedto ensureacommonsynchronalC-IEDstrategyin Europetocountertheconstantlyevolvingthreat ofIEDs.

•Alwaysbeonestepaheadofyouropponent. Theresponsetothisconstantlyevolvingthreatcan neverbeconsideredascompleteandweshould notdiminishoureffortsandrisklosingthe advantagegainedoverthepastfewyears.

•Addressingyesterday’sthreat,willnotanswer tomorrow’squestions.

Thisincludesacriticalrefectionofdefnitions. Amore-dimensionalmodelasasupportingtoolfor adefnitionhasbeenprovided,whichisaddressing thecomplexthreatmoreintuitively.Butthiscan onlybethestartingpointforamultinational& multiorganizationalefforttosharpenthismodel together.

•Turnourtechnologicaladvantageintooperationalvalue.

Theprovidedexampleshaveproventheexistence ofavailabletechnologiesthatcouldbeeasily adoptedandappliedtoamilitarycontext.■

SYNCHRONIZEDC-IEDSTRATEGYINEUROPE 24 COUNTER-IEDREPORT,Spring/Summer2024
Figure10:Pointofinterestalongamainsupplyroute.Panoramaimagevscolouredlaserpointcloud.

BIBLIOGRAPHY

BC-EX,E.(2024,January08). https://eda.europa.eu/ RetrievedfromBISONCOUNTEREXERCISES: https://eda.europa.eu/ what-we-do/all-activities/activities-search/bison-counter-exercises ECMAN,E.(2024,January08). https://eda.europa.eu/. RetrievedfromEUROPEANCENTERFORMANUALNEUTRALIZATION CAPABILITIES(ECMAN): https://eda.europa.eu/what-we-do/all-activities/activities-search/manual-neutralisation-techniquescourses-and-exercises-(mntce)

EDA.(2023). ProjectTeamCounter-ImprovisedExplosiveDevices,TermsofReference(EDAPTC-IEDToR),Revision2023. Brussels:EuropeanDefenceAgency. Heerlein,D.(2024).3-DimensionalCategorizationofIncidentswithExplosiveDevices. Brussels. JDEAL,E.(2024,January08). https://eda.europa.eu/ RetrievedfromJOINTDEPLOYABLEEXPLOITATIONANDANALYSIS LABORATORY(JDEAL): https://eda.europa.eu/what-we-do/all-activities/activities-search/joint-deployable-exploitation-andanalysis-laboratory-(jdeal)

JIDO.(2017). ImprovisedExplosiveDevice(IED)TechnicalExploitationLexicon. Washington:JointImprovised-ThreatDefeat Organization.

NATO.(2018,March8). https://www.gov.uk/government/publications/. RetrievedfromAlliedJointDoctrineforCounteringImprovised ExplosiveDevices(AJP-3.15),EditionCVersion1: https://assets.publishing.service.gov.uk/media/5aa10fe1e5274a7bd3417176/ doctrine_nato_countering_ied_ajp_3_15.pdf

ABOUTTHEAUTHORS

JohannFischer wasappointedasHeadofUnit Land&LogisticsattheEuropeanDefenceAgencyon 1September2016.AftergraduationfromtheAustrian MilitaryAcademy,heservedasaMainBattleTank platoonleaderandcompanycommander.Upon completionoftheAustrianCommandandGeneral StaffCourse,hewasnominatedasaHeadofTactics andLogisticsforadvancedoffcertraining,Branch HeadofMissionPlanningintheAustrianMinistryof DefencefollowedbyanappointmentintheAustrian PermanentRepresentationtotheEuropeanUnion andasubsequentassignmentintheForceCapability BranchoftheEuropeanMilitaryStaff.Afterworkingfor fouryearsinBrussels,hetookovertheBranchof InternationalForcePlanningintheAustrianMinistryof Defence.

HisportfolioattheEDAstretchesfromconceptual thinkingtoimplementationintheplanningand developmentprocessesofarmamentprogrammes withinthelandandjointenablingdomains.This includescontributionstotheCapabilityDevelopment Plan,CoordinatedAnnualReviewofDefence, PESCOandEuropeanDefenceFund.Themost

prominentprogrammesareMilitaryMobility,Additive Manufacturing,C-IEDaswellasthecollaborative procurementofammunitionwithafocuson155mm forthereplenishmentofnationalstocksandinsupport ofUkraine.

DannyHeerlein hasbeenworkingasProjectOffcer forC-IED(POC-IED)intheLand&LogisticsUnitofthe EuropeanDefenceAgencysince1September2023.

PriortohisappointmentasPOC-IED,hehadbeen workedasHeadofSectionintheCentreforC-IEDat theBundeswehrJointForcesCommandfrom2015to 2023.Aspartofhisassignments,hewasdeployed severaltimesinISAFmissionsasChiefAnalystandas C-IEDexpertforEUTMandMINIUSMAinMali.

DannyHeerleinholdsamaster’sdegreeincomputer sciencefromtheUniversityoftheGermanArmed ForcesinMunichandaMaster'sdegreeinOperations ResearchfromtheNavalPostgraduateSchoolin Monterey,USA.Duringhisstudieshewasinvolvedin severalC-IEDprojectsofTRACMontereyandformerly JIEDDOandwasabletodeepenhisexperienceduring theISAFmissionsasChiefAnalyst.

SYNCHRONIZEDC-IEDSTRATEGYINEUROPE 25 counteriedreport.com
organised by a subsidiary of a member of T H E G L O B A L E VE N T FOR D E F E N C E & S E CU R I T Y EUROSATORY.COM 1,750+ Exhibiting companies from 62 countries 250+ from 150 countries Decision makers from governements and supranational organisation
International trade visitors Official delegations
JUNE 2024 PARIS Get your badge
62,000+
17•21

NECESSITYOFADESIGNATEDLEADENTITY WITHINNATIONALC-IEDENTERPRISES

ByPaulAmoroso,anexplosivehazardsspecialistatAssessedMitigationOptions(AMO)consultancy

INTRODUCTION

Fragile,fragmented,orfailedregions,statesor localitiesarevulnerabletoIEDuse,withtheirimpact mostacuteintermsoftheirpolitical,economicand socialdestabilisingimpacts.Assuch,theIEDislikelyto beaprevalentandenduringthreatwithinsuchsecurity landscapesfortheforeseeablefuture.Theauthorhasin theSpring-Summer,AutumnandWinter2023editions ofTheCounterIEDReportpublishedaseriesofarticles relatedtonationalandregionalCounterIED(C-IED) efforts.¹ Aspartofthisseriesofarticlestheauthorhas discussedamongstotherissues,theneedtobuilda C-IEDenterprise² andempoweritlegallytocounterthe IEDsystem.³ Inonearticle,4 entitled‘C-IEDStrategic

Principles 5 forEastAfrica’ 6 oneoftenprinciples identifed,wastheneedtonamealegallyempowered nationalC-IEDleadentity.Thisarticleintendsto examinetheneedandpotentialoptionsforsucha legallyempowerednationalC-IEDleadentity.

MembersofaNationalC-IEDEnterprise AspartofawholeofsocietyapproachtoC-IED,a comprehensiveC-IEDstakeholdercommunity, appropriatelyresourcedandeffectivelymanaged, needstobeestablishedandsustained.Theexact memberswhowillmakeupanationalC-IED enterprise,willvaryaccordingtofactorssuchas:

1C-IEDeffortsrefertoallinitiatives,activities,assistance,capabilitiesandcapacitiesthatcollectivelymakeupaC-IED enterprise.C-IEDeffortscaninclude,interalia,training,mentoring,advising,accompanying,assisting,technologyand equipmentprovisionandintelligencesupport.

2AC-IEDenterpriseisthecollectivetermtodescribeallinitiatives,activities,assistance,capabilitiesandcapacitiesthat contributetotheC-IEDeffortsintendedtoatleastmatchbutideallyovermatchthethreatposedbytheuseorthreateneduse ofIEDs.Itcaninvolveanythingwhichisintendedtopredictdiscoverordetect,prevent,protectagainst,respondtoor neutralise,recoverfromorexploit,mitigateagainst,ordeterIEDattacks.

3AnIEDsystemisthecombinationofpeople,processesandmaterialthatgointosupporting,funding,procuring, manufacturing,transporting,targeting,preparing,emplacing,executingandpublicisinganyelementofanIEDattack, includingtheindoctrination,trainingandlifesupportofthepersonsinvolved.

4TheCounterIEDReport,Autumn2023,pp.15–21,ISSN2050-6732(Print)ISSN2050-6740(Online)

5C-IEDstrategicprinciplesrefertofundamentalrulesandguidelinesthatserveasafoundationforreasoninganddecision makingaboutthelonger-termdirectioninaC-IEDenterprise.Theycanhelpstatesandregionalorganisationstoatleast matchbutideallyovermatchthethreatposedbyIEDswithinagivenregion.

6ThisresearchfocusedondefningstrategicC-IEDprinciplesforEastAfricafortworeasons.Firstly,theenduringIEDthreat inEastAfricawiththelikelihoodofanincreaseintheiruseandsecondlythepotentialforover-extensionbylookingattoo broadormanyregions.

NECESSITYOFADESIGNATEDLEADENTITYWITHINNATIONALC-IEDENTERPRISES
27 counteriedreport.com

•IEDthreatbeingcounteredandideallywhenever possible,potentialemergingIEDthreats;

•Legalframeworkunderwhichtheenterpriseisto operate;

•ElementsthatwillmakeupthenationalC-IED enterprisei.e.whichC-IEDeffortstobeinvestedin;

•Resourcesmadeavailabletooperatethe enterprise;

•Statesecurityandgovernmentstructuresneeded tobepartoftheenterprise;

•RegionalandinternationalC-IEDinitiativesthe enterpriseistobecoordinatedwith;

•Civilsocietyorganisationsandindustryrepresentativeorganisationswhocancontributetovarious elementsoftheenterprise.

InapreviousarticlewithinTheCounterIED Report,7 potentialmemberswithinanationalC-IED stakeholdercommunitywereexamined,which identifedthefollowinggroupswhomaybemembers ofanationalC-IEDenterprise:

•Internalstakeholderswithinthestate;

•Externalstakeholderssupportingthestate;

•Securityanddefenceentities;

•Membersfromacrossgovernmentdepartments, ministries,offces,andagencies;

•Civilsocietyorganisations;

•Commercialandindustryentities,includingrepresentativeassociations;

•Regionalorganisationsandinternationalcommunityorganisations.

WhyaLeadEntityWithinaNationalC-IED EnterpriseisNeeded

Severalfactorsinfuencethe desiredendstate ofanationalC-IEDenterprise.Firstly,thelegal frameworkunderwhichitistofunctionwillinfuence the ways theenterprisewilloperate.Secondly,the resourcesavailabletoinvestintheC-IEDenterprise willdeterminethemeansoftheenterprise.Therewill oftenbemultiple ways oroptionsavailableintermsof howthedesiredendstatemaybeachieved.Addedto

this,willbedifferentrecommendationsfromthe membersoftheC-IEDenterpriseonwhichoptionsto choose.Incertaincases,someC-IEDstakeholders maystronglyadvocatecertainoptionsoverothers basedontheirparadigmofwhatanationalapproach toC-IEDshouldbe.Regardlessofthemyriadof potentialwaysthatmaybeavailabletoachievethe desiredendstateofanationalC-IEDenterprise, thereisinevitablyalwayslimitedresourcesavailable intermsoffnances,time,andexpertisetoinvest.The prioritizationofinvestmentoftheselimitedresources willalsobeinfuencedbythelegalframeworkunder whichthenationalC-IEDenterpriseisbeing undertaken.Resourceinvestmentwillalsoneedtobe consideredoverthemediumtolongtermasthe variouseffortsinvestedinwillneedtobenotonly maintainedbutmodifedastheIEDthreatevolves andtheC-IEDenterpriseneedstobeadapted,so thatitsstaysthreatalignedandcontinuestoinvestin themostappropriatewaysunderthelegalframework itisrequiredtooperate.Fortheseandotherreasons, signifcanttension,andsometimesunhealthy competitionbetweenthemembersofanational C-IEDenterprisecanarisewhendecidingthewaysa C-IEDenterpriseshouldinvestin,alongwiththe allocationoflimitedresources.Duetotheseissuesof lackofcoordinationandpossiblecooperationwithina nationalC-IEDenterprise,whichinsomecases canleadtodetrimentalcompetitionbetween stakeholders,allenterprisemembersinvolvedneed tobecoordinatedbyacentralentity.

Thepoliticalleadership,whoarebackingthe establishmentofanationalC-IEDenterpriseneedto demonstrateacknowledgementoftheproblemposed bytheuseandthreateneduseofIEDsalongwitha commitmenttoaddressingtheirusebydesignatinga focalpointauthoritywithoverallresponsibilityfora nationalC-IEDenterprise.Suchaleadentitywill requiregovernmentlevelagreementontheirrole, responsibilities,resourcesandlimitations,toempower themsuffcientlytoensurecoordinationand cooperationbetweentheothermembersofthe

7 TheCounterIEDReport,Winter2023/24,pp.15–22,ISSN2050-6732(Print)ISSN2050-6740(Online)

NECESSITYOFADESIGNATEDLEADENTITYWITHINNATIONALC-IEDENTERPRISES 28 COUNTER-IEDREPORT,Spring/Summer2024

NECESSITYOFADESIGNATEDLEADENTITYWITHINNATIONALC-IEDENTERPRISES

enterprisesothatacoherentnationalapproachto C-IEDisachieved.Thechoiceofadesignatednational leadentityneedstobecommunicatedtoallinternal nationalC-IEDenterprisemembersaswellasto internationalstakeholdersandpartners.

WhatisaNationalC-IEDEnterpriseLeadentity?

ThetermnationalC-IEDenterpriseleadentityisused asagenericonetodesignateanyoffce,institution, ministry,department,board,body,orother establishmentwhichhasresponsibilitiestothe nationalC-IEDenterpriseitischargedtolead.In particularitshouldhaveresponsibilityfor:

•EnsuringthesuccessofthenationalC-IED enterpriseinlinewithanationalstrategysothata coherentnationalapproachtoC-IEDisachieved toultimatelymatchbutideallyovermatchtheuse orthreateneduseofIEDs.

•Exercisegovernanceovertheenterprisetoensure allitsmembersareoperatingunderthelegal frameworkthatempowersthemintheirrole,duties andresponsibilities.

•Providecoordination,advocacy,strategiclevel awarenessandintegrationnecessarytoensure coherence,collaboration,andcomplementarity betweenthevariousC-IEDenterprisemembers.8

•Allocateandprioritizeresourceinvestmentinthe variousC-IEDeffortswhichmakeupallinitiatives, activities,assistance,capabilities,andcapacities oftheC-IEDenterprise.Forexample,theUSArmy C-IEDstrategystatesthe“entitydesignatedasthe leadtocoordinatenationalC-IEDeffortswillbe responsibletoensuretheC-IEDeffortsinvestedin areappropriatelyintegratedinacoordinated

mannerbetweenthenationalC-IEDlinesofeffort thatareengagedin.” 9

•Foster,encourageandfacilitateacollaborative timelyinformationsharingculture10 amongstallthe C-IEDenterprisemembers.

•Monitortheindividualandoveralleffectiveness ofthevariousC-IEDeffortsinvestedin,to appropriatelyadapttheC-IEDenterpriseasthe inevitablechangeintheIEDthreat,itis countering,occurs,astheIEDsystemresponds totheC-IEDeffortsintroducedagainstit. AdaptationoftheC-IEDenterprisemayalsobe necessaryduetochangesinthelegalframework underwhichitisrequiredtooperate.

Ideallysuchaleadentitywouldalsocoordinate allnationalC-IEDeffortswithanyC-IEDdonor assistance11 beingprovidedanddeterminewhereitis bestinvestedtohaveoptimalimpact.Inanarticlein theWinter2023/2024editionofthispublicationby ColonelHRNaiduGade,anotherperspectiveonwhat anationalC-IEDenterpriseleadentitymaybe responsibleforispresented.Inthisarticleonnational counterIEDstrategyforIndia,theneedtodesignate whatiscalledanodalagencyisoutlined.Theroleof suchanodalagencyis“tocoordinateandtrack progressacrossalltheagenciesatnational,state,and locallevelstowardbuildingtheC-IEDcapabilities.It shouldfacilitateharnessingtheinnovativepotentialof theresearchanddevelopmentorganizationstomeeta dynamic,complex,andadaptivethreatandtopromote aninformedandagileresearchandacquisitions processthatstaysaheadofthethreatanddevelops timelyandeffectiveC-IEDsystemsandsolutions.”

8Adaptedfrom,USDoD.2022.“ArmyC-IEDStrategy.”WashingtonDC:USDoD,February,pp.11. 9USDoD.2022.“ArmyC-IEDStrategy.”WashingtonDC:USDoD,February,pp.18.

10ThisissueofthecriticalityoftimelyinformationbetweenthemembersofnationalC-IEDenterpriseandtheassociated challengesinmakingthishappenhavepreviouslybeendiscussedinanarticleinTheCounterIEDReport,Autumn2023, entitled ‘UnderstandingandMaximizingC-IEDInformationSharing’.

11C-IEDdonorassistancereferstoC-IEDsupportprovidedonabilateralbasis,onajointinitiativefromtwoormoreStatesor byaninternationalorganisation,e.g.,EU,LeagueofArabStates,ECOWASetcoranalliancee.g.NATO,toanIEDaffected stateorregion.

12 India–TheNationalCounter-IEDStrategy,TheCounterIEDReport,Winter2023/2024,byColonelHRNaiduGade(Retd), pp.40.

29 counteriedreport.com
1 2

Overall,anationalC-IEDenterpriseleadentity shouldactasthenationalcoordinatingmechanism thatisresponsibleforthedirectionandcoordination ofallmembersofthenationalC-IEDenterprisethat itleads.

NationalCompetentAuthority

Atermthatisoftenusedinternationally,whenit comestoarmscontrolandrelatedactivitiesisnational authority,withtheModularSmallArmsControl ImplementationCompendium(MOSAIC),13 the InternationalAmmunitionTechnicalGuidelines (IATG)14 andtheInternationalMineActionStandards (IMAS),15 allreferringtotheneedforandrolesofa ‘nationalauthority.’Whilethereareslightdifferences betweenthethreepublicationsandwhatthey consideranationalauthoritytobe,torefectthe nuancesoftherespectiverequirements,anational authoritycanbroadlybetakenasthelead governmentagency,department(s),organisation(s) orinstitution(s)whichcanprovidepolitical coordinationandpolicydirectionandischargedwith theregulation,management,co-ordinationand operationofthenationalefforttheyareresponsible for.Anothertermthatisoftenusedtoleadand coordinatetheregulationofaspecifcnational endeavourorareaofpublicinterest,isanational competentauthority.Theyareanoffcialbodyor organisationwithregulatoryoversightand governanceoftheinitiatives,activities,assistance, capabilities,andcapacitiestheyhaveresponsibility for,workingcloselywithrelevantstakeholders,to supporttheeffectivenessoftheirareaof responsibility.Theyoftenplayaleadroleinpolicy development,licensing,inspection,enforcement,and publiceducationandcanactasthenationalfocal pointforinternationalcooperationandcollaboration withnationalandinternationalentitiestoensure

harmonisationofpolicies,practiceandstandards. Assuchwhenconsideringwhomayactasanational C-IEDenterpriselead,theconceptsassociatedwith anationalcompetentauthorityareworthyof consideration.

PotentialNationalC-IEDEnterpriseLeadEntities

Itisimportanttoremembernoone-size-fts-alland thebestfttoleadanynationalC-IEDenterprisewill involveconsiderationofthecontext,threatandany limitationsimposed.Apreviousarticlehasoutlined fourpotentiallegalframeworksunderwhicha nationalC-IEDenterprisemaybeundertaken.These include,acriminaljusticemodel,acounterterrorism, acounterinsurgencyandawarmodelapproach. EachoftheseapproachestoC-IEDislikelytohave adifferentleadentity.Forexample,acriminaljustice modelapproachmayhaveapoliceorjusticesystem lead.Acounterterrorismapproachmayhavea police,justice,internalsecurityorsecurityservices leaddependingonthestate’sinternalsecurity architecture.AcounterinsurgencyapproachtoC-IED mayhaveaparamilitaryormilitaryleadaswoulda warmodelapproach.Severaloptionsexistwhen decidingtheentitytoleadanationalC-IED enterprise.Optionsincludeestablishinganewoffce, organization,ordepartment;apoliceorjustice systemlead;amilitaryledenterprise;oranarms controloffcewhichcouldengageanexistingmine actionauthorityoralternativelyengageasmallarms andlightweaponsnationalcommission.Wewill examinefvepotentialnationalC-IEDenterpriselead entities.

NewOffce,Organization,orDepartment

Establishinganewentitycaninvolvechallengessuch asstrainingalreadylimitedbudgetsandtheriskof duplicationofpositionsbetweenitandpre-existing

13Source:ModularSmallArmsControlImplementationCompendiumMOSAIC01.20Glossaryofterms,defnitionsand abbreviationsVersion1.52018-04-30.

14Source:IATG01.40ThirdeditionMarch2021Glossaryofterms,defnitionsandabbreviations.

15Source:IMAS04.10SecondEdition(Amendment11,January2023)GlossaryofMineActionTerms,defnitionsand Abbreviations.

NECESSITYOFADESIGNATEDLEADENTITYWITHINNATIONALC-IEDENTERPRISES 30 COUNTER-IEDREPORT,Spring/Summer2024

entitieswhichmayhavecertaincrossovercapabilities orareasofresponsibility.Itisalsolikelythatitwilltake acertainamountoftimetosetup,recruitorsecond personnelintoandestablishprocessesand procedurestosupportasystemofworkpractices betweenthevariousmembersoftheC-IED enterprise.

PoliceorJusticeSystemLead

ApoliceledC-IEDenterprise,mayhavethelead entitybasedwithintheministryofjustice,interioror similarwiththisvaryingbetweencountries.Incertain waysajusticeledC-IEDentityhasadvantagesover amilitaryledoneaslawenforcementarelikelytobe moreappropriatelyskilledandexperiencedto undertakethevariouseffortsneededtoexploitIED incidents,prosecuteIEDsystemsandworktoward thejudicialprosecutionofIEDnetworkmembers. Anotheradvantageofajusticeleadentityisthat policetypicallyhavelessclassifcationandhandling restrictionissuesforIEDintelligencecomparedtothe militarywhichwillsupportinformationsharing.

MilitaryLedEnterprise

Duringresearchconductedbytheauthoronthis topic,16 onekeyinformant,explainedhowintheWest Africaregion,experiencehasshownthatthereare thosewhoconsidernationalC-IEDinitiativesasa nationalsecurityorstabilitymatter,makingita defenceorcounterterrorismissue.Thisshowshow theremaybecircumstanceswhenamilitaryled enterpriseisthebestoption,suchaswhennational C-IEDisundertakenunderacounterterrorism, counterinsurgency,orwarmodellegalframework. AmilitaryledC-IEDenterprisecouldinvolvea

nationalmilitaryoraparamilitaryentitywithinthe statesecurityapparatus.Amilitaryledenterprise wouldbeasecuritycentriconeandwasthetypical approachtakenwiththeemergenceofcontemporary C-IEDemanatingfromIraqandAfghanistan,which involvedthreemainpillarsorlinesofeffortofdefeat thedevice,attackthenetwork,traintheforce,with understandingandintelligenceunderpinningand providingcrossoverbetweenthem.However,witha militaryledenterprisecoordinatingvarious preventativeC-IEDefforts,beyondintelligenceled operations,maybeachallenge.Forexample,the development,sustainmentandadaptationofnational policy,regulations,andlegislation,thecontroland securityofexplosives,IEDprecursorcontrolsand bordercontrols,couldbeachallengeforamilitaryor paramilitarylead.

EngaginganExistingNationalMineActionAuthority

Theinclusionofcertaintypesofvictimoperated IEDs,whichmaybeconsideredimprovised landmines,underthe1996Anti-PersonnelMineBan Convention(APMBC),allowsthisinternational conventiontobeleveragedtoassistinaspectsof C-IED.Similarly,UNCCWAPII17 alsoconsiders sometypesofIEDstofallwithinthedefnitionsof ‘boobytraps’and‘mines’undertheconvention.18 TheseallowC-IEDapointofentry,forittobebuilt intoexistinginternationalefforts,foraandarms controlarchitectures.Withsuchanapproachto C-IED,existingnationalmineactionauthoritiesmay beengagedtoactastheleadentityforanational C-IEDenterprise.Nationalmineactionauthorities canhavecertaintransferrableskillsandcapabilities whichcanberetrainedforC-IEDpurposesalongwith

16Thecontentofthisarticleisinformedfromon-goingworkinthisareaandresearchconductedbytheauthoraspartofaMA instrategicstudieswhichexaminedandidentifedC-IEDstrategicprinciplesforEastAfrica-IdentifyingCounterImprovised ExplosiveDeviceStrategicPrinciplesforEastAfrica,PaulAmoroso,MAStrategicStudiesThesis,NationalUniversityof Ireland,Cork,SchoolofHistory,September2022.

17ProtocolonProhibitionsorRestrictionsontheUseofMines,Boobytraps,andOtherDevicesasAmendedon3May1996 (ProtocolII,asAmendedon3May1996).AnnexedtotheConventiononProhibitionsorRestrictionsontheUseofCertain ConventionalWeapons,whichMayBeDeemedToBeExcessivelyInjuriousorToHaveIndiscriminateEffects.

18OutofControl–TheTraffckingofImprovisedExplosiveDeviceComponentsandCommercialExplosivesinWestAfrica, SmallArmsSurvey(GraduateInstituteofInternationalandDevelopmentStudies),Geneva,2023Firstpublishedin November2023,ISBN978-2-940747-06-1.Pp.90.

NECESSITYOFADESIGNATEDLEADENTITYWITHINNATIONALC-IEDENTERPRISES 31 counteriedreport.com

existingaccesstokeygovernmententitiesand certaininternationalorganisationsaswellas internationalNGOswhomaybeabletosupportwith C-IEDdonorassistance.Forexample,theUN, humanitarianmineactionorganisationsaswellas certainNGOsmayassistinthetransformationof nationalmineactionauthoritiestobecomingC-IED capable.Suchaspectsareadvantageousintermsof thepotentialforhavingpre-existingcompetencies, expertiseandcapacitiesthatcanbeadaptedwith relativeeasetoallowthedevelopmentofa competentnationalC-IEDenterpriseleadwith relativeease.However,despitecertainoverlaps, C-IEDandmineactionaredifferent,andnew expertise,skillsetsandcompetenciesmayneedto bebroughtintoanexistingnationalmineaction authority,whileatthesametimeensuringspecific mineactioncompetenciesandexpertiseare maintained.Anotherconsiderationisthatexisting mineactionauthoritiesmaybetoohumanitarian focusedforthemtobeeffectiveinleadingthe development,sustainmentandinevitableadaptation ofanationalC-IEDenterprise.Thesuitabilityofan existingmineactionauthoritytobeadaptedtolead anationalC-IEDenterprisemaybeinfluencedbythe legalframeworkunderwhichthenationalC-IED enterpriseisbeingundertaken.NGOsinvolvedin mineactionwithinanIEDaffectedStatemaybe relativelycooperativeinengaginginsomeaspects ofC-IEDprovideditisinapostconflictoratleastnot activeconflictsetting;however,theremaybeNGOs workinginhumanitarianmineactionwhomaynotbe cooperativewithsecurityormilitaryforcemembers ofanationalC-IEDenterpriseastheyconsidersuch cooperationmaycompromisetheirimpartiality.Such

alackofcooperationcanbeparticularlyproblematic whenitcomestoIEDexploitationandtheassociated informationsharingwhicharecriticalforeffective C-IED.Suchanapproachrunscountertotheneed forawholeofsocietyapproachtoC-IED.These challengesanddifferencesinapproachtoC-IEDas wellasculturalnuancesbetweenNGOor humanitarianmineactorsandsecurityforceentities involvedinC-IEDneedtobeconsideredifan existingmineactionauthorityistobegiventherole ofleadwithinanationalC-IEDenterprise.

EngagingaNationalSmallArmsLightWeapons/Arms CommissionorSimilar

TherearethosewhoconsiderC-IEDasanarms controlissue,withtheUNCCWAPIIexaminingthe issueofIEDsonanannualbasisthroughtheAnnual ConferencesoftheHighContractingPartiesand meetingoftheGroupofExperts 19 Forthisreason,CIEDmaybeconsideredtobedealtwith,bynational armscontrolinstitutions,suchassmallarmslight weaponcommissionsorequivalententities.20 For example,intheWestAfricaregion,thisissueofCIEDhasemergedasanissuerelatedtosmallarms andlightweapons(SALW)control.WestAfrican regionalarmscontrolapproacheshavebeenthrough theBamakoDeclaration21 andthe2006Economic CommunityofWestAfricanStates(ECOWAS) ConventiononSmallArmsandLightWeapons,Their Ammunition,andOtherRelatedMaterial.This conventionstatesthat‘otherrelatedmaterials’ include‘...anychemicalsubstanceservingasactive materialusedasapropellingorexplosiveagent.’ 2 2

TheECOWASCommissionhastakentheposition thatIEDsfallundertheremitoftheECOWAS

19OutofControl–TheTraffckingofImprovisedExplosiveDeviceComponentsandCommercialExplosivesinWestAfrica, SmallArmsSurvey(GraduateInstituteofInternationalandDevelopmentStudies),Geneva,2023Firstpublishedin November2023,ISBN978-2-940747-06-1.Pp.90.

20Somestateshavearmscommissions,whileothershavesmallarmscommissionswithvaryingtermsofreferenceandnotall considerC-IEDasanarmscontrolissuethatfallsundertheirremit.Wewillusethetermsmallandlightweapon(SALW) commissionsinthisarticleasthecollectivetermtorefertoallsuchentities.

21BamakoDeclarationonanAfricanCommonPositionontheIllicitProliferation,CirculationandTraffckingofSmallArmsand LightWeapons,01December2000.

22 ECOWASConventiononSmallArmsandLightWeapons,TheirAmmunition,andOtherRelatedMaterial(2006),Article1,para.4.

NECESSITYOFADESIGNATEDLEADENTITYWITHINNATIONALC-IEDENTERPRISES 32 COUNTER-IEDREPORT,Spring/Summer2024

Conventionunder‘otherrelatedmaterials’and encouragedmemberstatestoworkthroughthis conventiontomitigatetherisksofIEDs.Inpractice, thenationalsmallarmscommissionsofseveral ECOWASmemberstatesapproachC-IEDbyacting asafocalpointforsmallarms,mineaction,andIEDs, intheabsenceofadedicatedbodydesignatedto coordinateonthismultifacetedissue.23

CONCLUSION

Ashasbeenoutlinedinthisarticle,noone-size-ftsallwhenassessingwhoisbesttoactasthelead entityforanationalC-IEDenterprise.Inreality,the choicewillrequireconsiderationofmanyfactors withthemembershipofthenationalenterprise itselfakeyinfuencealongwiththelegalframework underwhichtheenterprisewilloperate.Oneofthe keyrolesofanationalC-IEDleadentityistoensure coherence,coordinationandcomplementarity betweenitsmembersandminimizeunnecessaryand unproductiveinteragencycompetitionforlimited resourceswhileatthesametimeensuringa collaborativecultureoftimelyinformationsharingto maintainoptimizedunderstanding.Thiscanbe challengingtoachieveamongstwhatcanbea diversecommunityofstakeholderswhomake uptheenterpriseandmayhavetooperateina challengingandpressurizedenvironmentinwhich IEDusecanbeanongoingdestabilizingsecurity issue.Assuch,tousethedescriptionbyColonelHR NaiduGadeofthechallengesofnationalC-IED strategy,anationalC-IEDenterpriseleadentity needsgreatpatience,persuasionandpolitical statesmanship.24 ■

ABOUTTHEAUTHOR

23Source:OutofControl–TheTraffckingofImprovised ExplosiveDeviceComponentsandCommercial ExplosivesinWestAfrica,SmallArmsSurvey(Graduate InstituteofInternationalandDevelopmentStudies), Geneva,2023FirstpublishedinNovember2023,ISBN 978-2-940747-06-1.Endnote20.

24India–TheNationalCounter-IEDStrategy,TheCounter IEDReport,Winter2023/2024,byColonelHRNaidu Gade(Retd),pp.40.

PaulAmoroso isanexplosive hazardsspecialistandhas extensiveexperienceasanIED ThreatMitigationPolicyAdvisor workinginEastandWestAfrica.He servedintheIrishArmyasanIED DisposalandCBRNeoffcer,upto MNTlevel,andhasextensivetactical,operational,and strategicexperienceinPeacekeepingOperationsin AfricaandtheMiddleEast.Hehasexperienceinthe developmentofdoctrineandpolicyandwasoneofthe keycontributorstotheUnitedNationsImprovised ExplosiveDeviceDisposalStandardsandtheUnited NationsExplosiveOrdnanceDisposalMilitaryUnit Manual.HeworksatpresentintheMENAregionon SALWcontrolaswellasinwiderAfricaadvisingon nationalandregionalC-IEDstrategies.HehasaMSc inExplosiveOrdnanceEngineeringandanMAin StrategicStudies.Herunsaconsultancy,Assessed MitigationOptions(AMO),whichprovidesadvice, support,andtrainingdeliveryinEOD,C-IED,WAMas wellasPersonalSecurityAwarenessTraining(PSAT) andHostileEnvironmentAwarenessTraining(HEAT). Thisarticlerefectshisownviewsandnotnecessarily thoseofanyorganisationhehasworkedfororwithin developingtheseideas.

Linkedinprofle: https://www.linkedin.com/in/paulamoroso-msc-ma-miexpe-60a63a42/

NECESSITYOFADESIGNATEDLEADENTITYWITHINNATIONALC-IEDENTERPRISES 33 counteriedreport.com

Counter Terror Expo 2024 will provide professionals from industry, infrastructure, government and policing an opportunity to discover the latest counter-terrorism solutions.

CTX 2024 will feature exhibits, seminar and workshop content delivered by leaders in CT and Security.

To find out more and to register for a free ticket, visit our website today at ctexpo.co.uk.

- loc a te
even
s: O rga nis e d by: Register now ww
texpo.co.uk
Co
d
t
w.c
C O U NT E R I N G T OM O R R O W ’ S TH R E AT S , T O D AY FORENSICS EUROPE EXPO ExCeL London 1 -20 June 20 24 9 Premier Media Partner: PROTECT • RESPOND • RECOVER ExCeL London 1 - 20 June 20 24 9 | Tel: +44 (0) 208 191 0984 email: info@evendia.co | web: ctexpo.co.uk

NESTINGC-IEDAPPROPRIATELYWITHINASTATE’S

NATIONALSECURITYARCHITECTURE

ByPaulAmoroso,anexplosivehazardsspecialistatAssessedMitigationOptions(AMO)consultancy

INTRODUCTION

TheauthorhaspreviouslyadvocatedforaWholeof SocietyapproachtoC-IEDwheninvestingin, sustainingandwhennecessary,overtimeadapting anationalC-IEDenterprise1.Awholeofsociety approachtonationalC-IEDisacomprehensiveone andmayincludemultipleelementsofstatesecurity, defence,governmentdepartments,ministries, offces,andagenciesalongwithcivilsociety organisations,commercialandindustryentitiesas wellasinternationalandregionalorganizations. Suchawholeofsocietyapproachisintendedto ensureallstakeholderswhohavearoletoplayin respondingtoandultimatelypreventingtheuseof IEDs,haveinputintothenationalC-IEDenterprise whichisultimatelyrequiredtoatleastmatchbut ideallyovermatchtheuseofIEDsandremovethem asathreattosecurity,developmentandprosperityof theState.Ithaspreviouslybeenadvocatedforthe needtoguardagainstoverlysecuritycentric approachestoC-IED;however,nationaldefenceand

securityelementswillalwayshaveakeyroletoplay inanynationalC-IEDenterprise.

TheemergenceofC-IEDfromIraqandAfghanistan, resultedinitbeingviewedthroughabattlefeldlens, makingC-IEDamilitarizedmissionandinspiringmilitary solutions,notparticularlysuitedtosupportC-IED enterprisesbasedontheruleoflawandacriminal justiceapproach.Onekeyinformantwhenresearching thistopicstated,“militariesgotowarandwarisdevoid ofcriminaljusticethinking.” 2 Thedominanceofmilitary centricapproachesbynationalC-IEDenterprises,was highlightedbythesamekeyinformant,havingworked tocoordinateinternationalC-IEDassistance 3 inEast Africa,observingthatinmanycasesitinvolvedbilateral ormilitarytomilitaryengagementsratherthan involvementoflawenforcementagenciessuchastheir police,hampering acriminaljusticeapproachtoC-IED. Theauthorwouldadvocateforacriminaljustice approachtocounteringtheuseofIEDswhichoperates withintheruleoflawandendeavours,whenever

1AC-IEDenterpriseisthecollectivetermtodescribeallinitiatives,activities,assistance,capabilitiesandcapacitiesthat contributetotheC-IEDeffortsintendedtoatleastmatchbutideallyovermatchthethreatposedbytheuseorthreateneduse ofIEDs.Itcaninvolveanythingwhichisintendedtopredictdiscoverordetect,prevent,protectagainst,respondtoor neutralise,recoverfromorexploit,mitigateagainst,ordeterIEDattacks.

2KeyinformantinterviewconductedbyauthoraspartofresearchintoC-IEDstrategicprinciplesforEastAfrica-Identifying CounterImprovisedExplosiveDeviceStrategicPrinciplesforEastAfrica,PaulAmoroso,MAStrategicStudiesThesis, NationalUniversityofIreland,Cork,SchoolofHistory,September2022.

3VariousformsofC-IEDsupportthatanIEDaffectedstatecanreceivefromadonorwhichcanincludeinteralia,training, mentoring,advising,accompanying,assisting,technologyandequipmentprovisionandintelligencesupport.

NESTINGC-IEDAPPROPRIATELYWITHINASTATE’SNATIONALSECURITYARCHITECTURE
35 counteriedreport.com

possible,toprosecutetheIEDsystem 4 throughjudicial processesandsupportingintelligenceledoperations; however,itisalsoacknowledgedthatthismaynot alwaysbeachievable.Whilesomemayclaim “acriminaljusticeapproachtostrategicnationalC-IED, isessential,” 5 manyIEDaffectedstateswillhavean underdevelopedsecurityandjudicialsystem,which cannotmoveimmediatelytotakesuchanapproach. Instead,aprogressivetransitiontoallowtherequired structures,skillsetsandcapabilitiestobedevelopedis needed.IEDaffectedstatesmayalsolacktherequired legislativeinstruments,governmentpoliciesorlegal powersneededtoempoweraruleoflawapproachto prosecutetheIEDsystem.

Dependingonitssecuritycontext,nationalsecurity architecture,maturityofitslegalsystemandtheIED threatfacedbyastate,itisacknowledgedthatitmay benecessarytohaveaninitialfocusonresponsive C-IEDeffortsandlaterevolvetoanappropriate balancedmixtureofresponsiveandpreventative C-IEDefforts.TheC-IEDwhichemergedfromIraqand Afghanistanwasasmuchamilitaryindustrial enterpriseasitwasasecurity,stabilization,or developmentendeavor.InitialUSeffortsindeveloping C-IEDwerefocussedonrightofboombutintimethey movedmoretolookingleftofboom.Togoleftofboom, C-IEDeffortsneedagreaterlawenforcementor paramilitaryapproachthanamilitarycentricapproach.6 Libya’sdevelopmentofnationalC-IEDcapabilities providesagoodexampleofthetransitionfroma militarydominatedapproachtoacriminaljustice approachtoC-IEDledbylawenforcement.” 7

UsingthisparadigmofhowanationalC-IED enterprisemayevolve,itisclearthatmanyelementsof astate’ssecurityarchitecturewillplayacentraland keyroleintheC-IEDefforts 8 investedin,sustained, andadaptedovertime.AsIEDsarebutoneofmany weaponsystemsthatpresentasecurityissuewithina state,theauthorproposesthatitisnecessarytoadapt theC-IEDenterprisethatisdeveloped,sustained,and adaptedovertimetoftwithinastate’sestablished nationalsecurityinfrastructureandnottheotherway around.Suchanapproachwillallowthesecurityand defenceaspectsofanationalC-IEDenterpriseto ideallyftwithinexistingcapabilitiesandstructuresto complementandimprovewiderstatedefenceand securitycapabilitiesandavoidunnecessaryduplication andpotentialcompetitionforresourcesandissues relatedtothesharingofinformation.Thispaperwill seektoexaminehowanynationalC-IEDenterprise needstobeappropriatelynestedwithinaState’s nationalsecurityarchitecture.

C-IEDASAWIDERNATIONALSECURITYISSUE

ThetransitionofC-IEDfromasecuritycentric responsiveapproachtolaterevolveintoanappropriate balancedmixtureofresponsiveandpreventativeC-IED effortshasbeenoutlined.AsC-IEDevolves,itneedsto becomeintegratedaspartofwidersecuritystrategies, anelementofwhichmaybeasizeablecomponent thereofdependingontheprevailingIEDthreat.IED affectedstatesarelikelytofacemultiplesecurity challengessimultaneouslywhichoftenleadsthemto requireexternalC-IEDassistance.Previousresearchby

4 AnIEDsystemisthecombinationofpeople,processesandmaterialthatgointosupporting,funding,procuring,manufacturing, transporting,targeting,preparing,emplacing,executingandpublicisinganyelementofanIEDattack,includingthe indoctrination,trainingandlifesupportofthepersonsinvolved.

5KeyinformantinterviewconductedbyauthoraspartofresearchintoC-IEDstrategicprinciplesforEastAfrica-Identifying CounterImprovisedExplosiveDeviceStrategicPrinciplesforEastAfrica,PaulAmoroso,MAStrategicStudiesThesis, NationalUniversityofIreland,Cork,SchoolofHistory,September2022.

6Source:IdentifyingCounterImprovisedExplosiveDeviceStrategicPrinciplesforEastAfrica,PaulAmoroso,MAStrategic StudiesThesis,NationalUniversityofIreland,Cork,SchoolofHistory,September2022.

7KeyinformantinterviewconductedbyauthoraspartofresearchintoC-IEDstrategicprinciplesforEastAfrica-Identifying CounterImprovisedExplosiveDeviceStrategicPrinciplesforEastAfrica,PaulAmoroso,MAStrategicStudiesThesis, NationalUniversityofIreland,Cork,SchoolofHistory,September2022.

8 C-IEDeffortsrefertoallinitiatives,activities,assistance,capabilitiesandcapacitiesthatcollectivelymakeupaC-IEDenterprise. C-IEDeffortscaninclude,interalia,training,mentoring,advising,accompanying,assisting,technologyandequipmentprovision andintelligencesupport.

NESTINGC-IEDAPPROPRIATELYWITHINASTATE’SNATIONALSECURITYARCHITECTURE 36 COUNTER-IEDREPORT,Spring/Summer2024

theauthor,9 identifedthatinmanycases,donornations preferinvestmentinsecurityinitiativeswhichare associatedwithasuitablenationalstrategy.Thiscan resultinanIEDaffectedstatehavingseveralsecurity relatedstrategiesatthesametime.Thiscanthenleadto theneedforconsolidationofsecurityrelatedstrategies, inwhichC-IEDmaynotgetitsownstandalonestrategy butmayneedtocomeunderawiderstrategy.Evenin thecasethatanIEDaffectedstateisnotreceiving notableexternalC-IEDassistance,itisgoodpracticeto considerhowaC-IEDenterprisemaycomeunderwider securitystrategies.Assuch,nationalC-IEDenterprises mayfallunderbroadernationalsecuritystrategies10 suchascounterinsurgency,counterterrorism11 oran overallnationalsecuritystrategy.NestingC-IEDwithina broadernationalsecurity,defenceordevelopment strategythatbestftstheaspirationsofanIEDaffected statemaximisessynergiesallowingthereinforcingof commoncomplementarygoodpracticesrelatedto varioussecuritythreatsthusavoidingunnecessary replicationorsiloing.Sucheffcienciesareevenmore criticalinresourcelimiteddevelopingnations.However, shouldC-IEDcomeunderabroadernationalsecurity, defenceordevelopmentstrategy,itisnecessaryto ensuretherequisiteexpertisetoaddressIEDuse,ispart ofsuchstrategydevelopmentanditssubsequent implementation.

DEFININGASTATE'SNATIONALSECURITY ARCHITECTURE

Inthecontextofthispaper,nationalsecurity architecturereferstoallentitiesinvolvedinthe

provisionofpublicsafetyandnationalsecurity belongingtotheoffcial,legitimatedomainofthe securityforcesofthestate,whooperateunderstate governance,alongwiththeirrespectiveroles,duties, responsibilitiesandcapabilitiesandtheirassociated interrelationships.Theexactmake-upofthenational securityarchitectureforagivenstatewillbeunique ineachcase.Forthisreason,theexpression‘context isking’isaptwhenconsideringhowbesttonest C-IEDappropriatelywithinastate’ssecurity architecture.Whileacknowledgingcontextisking, entitieswhichmayformpartofastatesecurity architectureincludeinteralia,defenceforcesand alltheirbrancheswithintheland,air,maritime, andcyberdomains,alongwithcivilianpolice; presidentialguards;intelligenceservices;border guards;reserveorlocalsecurityunits;civildefence units;nationalguardsandgovernmentmilitias.12 Addedconsiderations,includetheprevailingIED threatandthelegalframeworkunderwhichthestate choosestoaddresstheiruseaswellasthe relationshipbetweenthevarioussecurityelements involvedinC-IEDandhowtheyworktogether. VariouslegalframeworksunderwhichC-IEDis undertakencanincludeacombatengineering approach,acounterinsurgencyapproach,a counterterrorismapproachoracriminaljustice approach.Eachofthesehasitsownnuanceswhich needtobeunderstood.Whicheverlegalframework C-IEDisundertaken,willinfuencewhatsecurityand defenceentitieswithinastatemaybeinvolvedina nationalC-IEDenterprise

9Author’sMAinstrategicstudieswhichexaminedandidentifedC-IEDstrategicprinciplesforEastAfrica-IdentifyingCounter ImprovisedExplosiveDeviceStrategicPrinciplesforEastAfrica,PaulAmoroso,MAStrategicStudiesThesis,National UniversityofIreland,Cork,SchoolofHistory,September2022.

10 Anationalsecuritystrategyorpolicyreferstoaformalstrategythatinvolvesalldecisionandactivitiesaboutthesecuritysector whichaffectthestatesandsocietiesexternalandinternalsecurity.Itincludesbothpolicyandstatementsandthemeasuresto implementthosepolicystatements.Source:SSRinaNutshell,ManualforIntroductoryTrainingonSSR,DCAF/ISSAT2012

11Duringpreviousresearchonthissubject,onekeyinformantstatedthat“whenC-IEDisplacedunderCTsecurityinitiativesit canoftenservetoscaresomekeystakeholdersofffromengagingwithit.”“Polarizedpositionscanbetakenbykey stakeholdersinvolvedonissuessuchasthedifferencebetweenC-IEDandCTaswellastheirnuanceswithinwidersecurity initiatives.”“Forthisreason,itisoftenprudenttoavoidhavingC-IEDunderbroaderCTsecurityinitiatives.Oneofthemain reasonsforthisisthatitisoftenverychallengingtoseparatethehumanelementsofCTfromthetechnicalelementsrequired tosupportC-IED.”Source:IdentifyingCounterImprovisedExplosiveDeviceStrategicPrinciplesforEastAfrica,Paul Amoroso,MAStrategicStudiesThesis,NationalUniversityofIreland,Cork,SchoolofHistory,September2022.

12Source:SSRinaNutshell,ManualforIntroductoryTrainingonSSR,DCAF/ISSAT2012.

NESTINGC-IEDAPPROPRIATELYWITHINASTATE’SNATIONALSECURITYARCHITECTURE 37 counteriedreport.com

STATE’SNATIONALSECURITYARCHITECTURE

ENTITIESINVOLVEDINC-IED

VariouseffortsarerequiredaspartofanationalC-IED enterprise,whichcaningeneralbeconsideredas preventative,responsive,orcross-cuttinginhowthey addresstheuseorthreateneduseofIEDs.Theauthor proposedinapreviouspaper,publishedinThe

CounterIEDReport,ffteenelementsasthebasisfora nationalC-IEDenterprise.13 Giveninthetablebelow aretheseffteenelementswithadescriptionof potentialsecurityordefenceentitieswhichcouldbe requiredtoundertaketheactivitiesassociatedwith eachalongwithconsiderationsforroles,duties, responsibilitiesandinter-relationships.

Cross-cuttingC-IEDelements

Understanding Variousintelligenceagenciesandentities,includinginternaldomesticaswellasforeign, inparticularallthosewhomaycontributetodevelopingandmaintaininganaccurateIED threatpicture.

Preparation

ThepreventativeC-IEDelementof‘preparation,’referstoalleffortswithinastatetobest makeready,thepopulation,securityanddefencepersonnel,aswellasC-IEDspecialists, sothattheyarebestpositionedtoeffectivelypreventandifnecessary,respondtoIED events.Alltrainingproviderswithinthestate’ssecurityinfrastructureinvolvedinany aspectsoftheseC-IEDactivitieswillhavearoleinpreparation.Dependingonthelegal frameworkunderwhichtheC-IEDenterpriseisbeingundertaken,preparationofthe populationmayinvolvethesecurityordefenceforcesundertakinginformationoperations toengagethepopulationwithappropriateIEDawarenessandC-IEDknowledge.Theaim ofpreparationofsecurityanddefencepersonnelistoprovideappropriateC-IEDeducation andtrainingtosecurityforce,defence,frontlineandfrstresponderpersonnelwhomay encounterorbecalledtothesceneofanIEDevent.Theintentisforthemtobe appropriatelyknowledgeableofwhattobeawareofandbeonthelookoutfor,bybeing abletoidentifypotentialIEDs,componentsthereoforexplosiveprecursorchemicals.They shouldalsobetrainedinhowtosafelyreact,whichmayinvolveclearingtheimmediate dangerareaofallpersonnel,notingdetailsofthesuspiciousitem(s)andreportingthemto specialiststorespondto.Itmayalsoextendtotheprovisionof,andtrainingon,certain equipmentsuchasmetaldetectorsorothertypesofC-IEDdetectionequipment.

Securityforceanddefenceforcepersonnelwhoarerequiredtooperateinahighthreat IEDenvironmentwillneedtobeprovidedwithsuitablethreatalignedIEDawarenessand trainingwhichmayincludetheprovisionofcertainC-IEDequipmentandmaybe consideredasspecialistpreparation.Examplesofthisincludeintermediatesearch capabilitiessuchasroutesearch,theuseofelectroniccountermeasures(ECM) equipmentorwhatmaybeconsideredlevel1exploitation.

TheaimofC-IEDspecialistpreparationistoappropriatelytrainandequipallthose requiredtoundertakekeyactivitieswithinanynationalC-IEDenterprise.SuchkeyC-IED activitiesinclude,interalia,informationmanagementandthreatpicturedevelopmentaspart ofunderstandingeffortsaswellasdefeatthedeviceactivities,andexploitationactivities.

Withinmilitaries,‘preparation’comesunderthe‘preparetheforce’lineofoperations thatmanyuseastheirC-IEDmodel.Inthiscontext,itisexpandedtoincludeallelements ofthestateinvolvedinaC-IEDenterprisenotjustthemilitaryandisexplicitlybeyond specialistC-IEDrolestoincludenon-specialistsandthewiderpopulation.

13 TheCounterIEDReport,Autumn2023,pp.15–21,ISSN2050-6732(Print)ISSN2050-6740(Online)

NESTINGC-IEDAPPROPRIATELYWITHINASTATE’SNATIONALSECURITYARCHITECTURE 38 COUNTER-IEDREPORT,Spring/Summer2024

Interagencyand international cooperation

Information management

Allentitieswithinanation’ssecurityarchitecturewhoareinvolvedinanationalC-IED enterprise,willneedtohaveappropriateliaisonandinteractionmechanismsestablished withtheotherentitiesinvolvedinC-IEDensuringsuchactivitiesareoptimisedandwastage ofresourcesisminimised.

Asecureinformationsharingcultureneedstobefosteredthatsupportsthetimelyexchange ofinformationbetweenallentitieswhoneedittoempowerinformeddecisionmaking.

Similarly,someofthestatesecurityentitiesinvolvedinC-IEDwillneedtoengageinvarious agreedforawithinternationalpartners,neighbouringstatesorregionalorganisations.This engagementmaybedirectlyorthroughsupportforadesignatedleadentitywiththis responsibility,suchasaforeignintelligenceagencyoradepartment/ministryforforeignaffairs.

AllsecurityanddefenceentitieswithinanationalC-IEDenterprise,willneedtohave appropriateinformationexchangeandstorageinfrastructureinplacetosupportthesecure andtimelyexchangeofC-IEDinformationwithallotherC-IEDstakeholderswhoneed accesstotheinformationtoempowerinformeddecisionmaking.Thismayalsoinvolve variousforaestablishedtodevelop,maintainandmonitortheIEDthreatpicturesuchasan IEDinformationfusioncentre.

AdaptingC-IED efforts

Strategy,policy, regulations,and legislation

Controland securityof explosives

IEDcomponent controls

AllsecurityanddefenceentitiesinvolvedinC-IED,willneedtohaveinternalmechanisms tomonitor,evaluateandfeedbacklessonsidentifedintothenationalC-IEDenterprisein relationto:

1.IEDthreat

2.C-IEDeffortsitisinvolvedindelivering

PreventativeC-IEDelements

AllstatesecurityentitiesinvolvedinC-IED,ideallyneedtobeconsultedwith,duringthe developmentofanystrategy,policies,regulationsorlegislationtheywillberequiredto operateunder.Ideally,wheneverpossible,existingstrategies,policies,regulationsand legislationshouldbeengagedandadapted,ifnecessary,forC-IEDpurposes,toharness thebeneftprovidedbyusingexistingpractices,processesandprocedures.

Allstatesecurityanddefenceentitieswithanytypeofexplosiveordnanceneedto ensuretheyengagewiththestate’slaiddownproceduresdesignedtocontrolandsecure them.

Anystatesecurityentitieswitharoletoplayindevelopingorimplementingthemeasures establishedtocontrolaccesstoIEDcomponentswillneedtobeinvolved.Suchcontrol measuresmayberelatedtoexplosiveprecursorchemicalsidentifedasathreatowingtothe assessedriskoftheiruseinthemanufactureofimprovisedexplosivesormayberelatedto switchesidentifedasbeingusedinIEDs.Thismayinvolve,bordermanagementauthorities withresponsibilityformonitoringandenforcingregulationsrelatedtotheinternational movementofsuchcontrolleditemsintoorfromthestate.Similarly,policeorotherlaw enforcementagenciesmayhaveprimaryresponsibilityforinvestigatingandenforcingsuch controlsdomestically.

Bordercontrols

Bordermanagementauthorities,particularlythosewithcustomsresponsibilitiesmaybe requiredtomonitorandenforceregulationsrelatedtotheinternationalmovementofcertain controlledIEDcomponentsintoorfromthestate.Thismayrelatetothreatexplosiveprecursor chemicalswhichmaybesubjecttocontrolledaccessandassociatedimportationandexport controls.Widerbordersecurityentitiesmayalsoberequiredtobeonthelookoutforand trainedtoidentifytheillicitmovementofIEDs,componentsthereofaswellasIEDnetwork personnel.Theymayalsobetrainedandequippedtotakeappropriatesafeactionupon discoveryofanysuspecteditemsorpersonnel.

NESTINGC-IEDAPPROPRIATELYWITHINASTATE’SNATIONALSECURITYARCHITECTURE 39
counteriedreport.com

Intelligenceled operations

Defeatthe device14

Exploitation

C-IEDintelligenceledoperationscanbeexecutedagainstthenetworkpersonnel,the processesinvolvedandthesupplyofmaterielthatanIEDsystemrequirestofunction. Variousintelligence,securityserviceandinvestigationentitieswithinastate’ssecurity architecturewillbeinvolvedintheplanningofsuchoperations.

Police,paramilitary,securityserviceordefencepersonnelaretypicallyinvolvedin operationsagainstIEDnetworkpersonnel.

ExamplesofhowtheprocessesthatsupportanIEDsystemmayhaveintelligenceled operationsmountedagainstthemcouldincludeoperationstotargetthoseinvolvedinthe fnancing,radicalisation/indoctrination,orprovisionoftechnicalknowledgetoIEDnetwork personneleitherinpersonorthroughtheinternet.IntelligenceledoperationsagainstIED systemprocessesdonethroughtheinternet,willinvolvecybersecurityagencies.Similarly varioussecurityentitiescanbeinvolvedinoperationsagainstthesupplyofmaterielofIED components,withbordersecurityagenciesoftenoneofthose.

InsomeStates,theuseofintelligencetoproactivelydegradetheeffectivenessofIED networksisaC-IEDlineofoperationknownas“attackthenetwork”.Attackthenetwork seekstoproactivelydegradeanIEDnetworkthroughoffensiveactionsandactivities designedtoreducetheeffectsandinterruptanIEDsystems’activities.OtherC-IEDterms whicharesometimesused,areengagethenetworkanddegradethenetwork.

ResponsiveC-IEDelements

Inmanystates,itwillbethemilitaryandorthepolicewhoprovidemostofthedefeatthe devicecapabilitiessuchasconventionalmunitionsdisposal(CMD),IEDdisposal(IEDD), searchandelectroniccountermeasures(ECM)whenneeded.InthecaseofECM; howeverthiscanofteninvolveanexusbetweenstatesecurity,intelligence,exploitation andenduserentitiesandassuchcaninvolvemanysecurityentities.

Inmostcases,astatewillhaveeithertheirtechnicalmilitarybranchesortheirpolice investigationandassociatedforensicbranchesleadtheirexploitationefforts.Ifastatehas itsmilitaryinvolvedinexploitation,itispossibletheywilldosoundertheumbrellaof weaponstechnicalintelligence(WTI).

Investigation

Judicial processes

Victim assistance

Statesecurityelementsinvolvedindefeatthedeviceandexploitationactivitieswillhavea roleineitherleadingorsupportingtheinvestigationofIEDincidentsandtheIEDsystem responsible.Suchactivitieswillbeundertakentosupportunderstandingaswellasintelligence ledoperationsandorjudicialprocesses.

Whenever,judicialprocessesarepursuedwithinanationalC-IEDenterprise,allsecurity ordefenceentitiesinvolvedinhandlingorprocessingIEDincidentevidenceorinformation andrelatedinvestigationneedtodosoinlinewiththelegalrequirementswithinthestate forsuchitemstobesubmissibletothestate’scourtsystem.

StatesecurityentitiesinvolvedinmonitoringtheIEDthreatmayneedtoestablish relationswiththosewhotreatandcareforIEDvictimstoensureanaccurateIEDthreat pictureismaintained.BymonitoringtheinjuriessustainedbyIEDvictims,understanding oftheIEDthreatcanbeenhancedwhichinturnsupportsallotherelementswithintheCIEDenterprise.Similarly,thoseinvolvedintheexploitationofIEDincidentscanprovide informationtothoseinvolvedinIEDvictimassistanceintermsofthethreatwhichisfaced.

14DefeatthedevicereferstoadefensivelineofoperationinvolvingasuiteofresponsiveC-IEDeffortswhichincludeallactions andactivitiesdesignedtoreducethenumberofortheeffectofIEDinitiations.ManyC-IEDeffortscanbeconsidereddefeat thedeviceactivities,including,mobilityplanningadvice;andForceProtection(FP)advice;searchactivities;routeclearance packagecapabilities;ConventionalMunitionsDisposal(CMD)activities;ElectronicCountermeasure(ECM)assets;and ImprovisedExplosiveDeviceDisposal(IEDD)activities.

NESTINGC-IEDAPPROPRIATELYWITHINASTATE’SNATIONALSECURITYARCHITECTURE 40 COUNTER-IEDREPORT,Spring/Summer2024

DETERMININGWHICHSTATESECURITYAND DEFENCEENTITIESWILLBEMEMBERSOF ANATIONALC-IEDENTERPRISE

Ideally,afterastatehasaninformedunderstandingof theIEDthreatitfacesanddeterminedthepriorityof C-IEDelementsitisgoingtoinvestinaspartofits nationalenterprisealongwiththelegalframeworkunder itwilloperate,genericstakeholdermappingallowsall potentialmemberswithinitsnationalC-IEDstakeholder communitytobeidentifed.Suchgenericstakeholder mappingwillidentifybothsecurityanddefenceentities alongwithotherentitieswhomaybeinvolved.The varioussecurityanddefenceentitieswhoareidentifed mayhaveoverlapintheroles,dutiesandresponsibilities theyarealignedwith,i.e.morethanonestateentitymay beabletofulflcertainC-IEDroles.Assuchassignment ofroles,dutiesandresponsibilitiesforeachofthe requiredsecurityordefencerelatedC-IEDactivities needtoconsiderwhichentityhasthemostmature capabilitytodirectlytakeonsuchroles.Alternatively,it maybenecessarytoidentifywhichentitiesarebest positionedtoundergoinvestmenttoadapttotakeon suchrolesintheshortesttime.Thisisintendedto minimiseduplicationandmaximiseutilityofexisting practices,processesandproceduresaswellas harnessingexistingcapabilities.Inthecaseof harnessingexistingcapabilities,dueconsiderationis neededtoidentifyanyexpansionincapacityintermsof increasingfnancialorotherresourcesifanentityis beinggivenadditionalC-IEDtaskingsontopofexisting securityanddefencetasks.

CONCLUSION

IthasbeenoutlinedhownationalC-IEDenterpriseshave oftenbeenmilitarycentricendeavours,butthatideally, criminaljusticeapproachestoC-IEDarepreferablein ultimatelyattemptingtopreventIEDuse.However,these areoftennotinitiallypossiblerequiringagradualtransition overtimefrommilitarytocriminaljusticeapproachesto C-IED.Overall,awholeofsocietyapproachtoC-IEDis advocated,withmanyelementsofthestatesecurity architectureplayingacentralroleintheC-IEDefforts investedin,sustained,andadaptedovertime.AsIEDs arebutonesecurityissuethatastate'sdefenseand

securityelementsmustcontendwith,itisimportantthat theC-IEDenterpriseestablishedisadaptedtoftwithin theexistingstatesecurityarchitecture.Whilesome adaptation,suchasspecifcC-IEDskillsetandexpertise development,maybenecessarywithinanexistingstate securityarchitecture,theintentshouldbetocomplement andimprovewiderstatedefenceandsecuritycapabilities andavoidunnecessaryduplicationandpotentially competitionforresourcesalongwithissuesrelatedto informationsharing.WhereverC-IEDwithinaState’s securityarchitectureisnestedwillbenuancedonhow IEDsarebeingusedineachcontextandthematurityof thenationalsecurityandjusticesystemwithintheIED affectedstatei.e.thereisno,onesizethatftsall.■

ABOUTTHEAUTHOR

PaulAmoroso isanexplosive hazardsspecialistandhasextensive experienceasanIEDThreat MitigationPolicyAdvisorworkingin EastandWestAfrica.Heservedin theIrishArmyasanIEDDisposaland CBRNeoffcer,uptoMNTlevel,and hasextensivetactical,operational, andstrategicexperienceinPeacekeepingOperationsin AfricaandtheMiddleEast.Hehasexperienceinthe developmentofdoctrineandpolicyandwasoneofthe keycontributorstotheUnitedNationsImprovised ExplosiveDeviceDisposalStandardsandtheUnited NationsExplosiveOrdnanceDisposalMilitaryUnit Manual.HeworksatpresentintheMENAregionon SALWcontrolaswellasinwiderAfricaadvisingon nationalandregionalC-IEDstrategies.HehasaMScin ExplosiveOrdnanceEngineeringandanMAinStrategic Studies.Herunsaconsultancy,AssessedMitigation Options(AMO),whichprovidesadvice,support,and trainingdeliveryinEOD,C-IED,WAMaswellas PersonalSecurityAwarenessTraining(PSAT)and HostileEnvironmentAwarenessTraining(HEAT).This articlerefectshisownviewsandnotnecessarilythoseof anyorganisationhehasworkedfororwithindeveloping theseideas.Linkedinprofle: https://www.linkedin.com/ in/paul-amoroso-msc-ma-miexpe-60a63a42/

NESTINGC-IEDAPPROPRIATELYWITHINASTATE’SNATIONALSECURITYARCHITECTURE 41 counteriedreport.com
22 - 26 OCTOBER 2024 ISTANBUL EXPO CENTER
THIS EXHIBITION IS ORGANIZED WITH THE AUDIT OF TOBB ( THE UNION OF CHAMBERS AND COMMODITY EXCHANGES OF TURKEY) IN ACCORDANCE WITH THE LAW NO.5174.
By
TÜRKİYE’S LEADING INTERNATIONAL DEFENCE & AEROSPACE EXHIBITION
Supported

ATOONARROWSTRAIT:EXPLOSIVETHREAT DYNAMICSINTHEREDSEA

“Ilookeduponthesea,itwastobemygrave.” (MaryShelley,inherbook"Frankenstein",frstpublishedin1818)

DuringtheCivilWarthatishappeninginYemen,the HouthiMovement(self-namedas “Ansar Allah”)triedtoalsofghtagainsttheopponentnaval forces,buttheircapabilitiesweremerelylimitedto attackswithfrearmsandrocketpropelledgrenades fromsmallboatsclosetotheshore.

Ontheotherhand,theYemeninavalmeanswere severelydamagedinharborduringthebattleforthe controlofAdenportin2015:theHouthifghterswere alsoabletocaptureseveralhelicoptersalongwith patrolandlandingvessels…butmostofthemwere destroyedbythesubsequentaerialbombingactions bytheSaudi-ledmultinationalcoalition.

FromOctober2015andonceachievingaccessto theseacoast,theHouthiforcesstartedattacking maritimenavigationagainstbothcoalition1 militaryor commercialvessels.Initially,theHouthisthemselves didnotreportthoseattacksinanareaalreadysuffering fromsomerateofpiracy.

ApartfromtheattacksagainstAmerican,Saudi,and Emiratiwarshipsfrom2015on,theHouthiMovement

hasbeenconductingotheractionsagainstcivilian means,amongothersasfollows:

•Releaseofdriftingseaminessince2015intothe Babal-Mandabstrait,fromwhichtheyhavefoated asfarasninetykilometerssouthwestofAdenafter passingthroughthestrait.

•Explosive-ladenboat(UnmannedSurfaceVehicle USV“Shark-33”model)attackonaSaudioffshore loadingfacilityofanoilterminalinJizan,June16,2017.

•Rocketormissileattackagainstacivilianoiltanker (“Arsan”,aSaudi-fagged,double-hulledverylarge crudecarrierVLCC)intheRedSeawestof Yemen’sHodeidahportonJuly25th,2017.

•PropagandathreatstoshippingthroughHouthi “Al Masirah” channelonNovember12th,2017.

•RocketattackagainstSaudi “Abqaia” double hulledVLCCtankeronApril3rd,2018.

•Afterdestructionofcoastalradarsystemsin October2016,anillegalmilitaryuseofradarfor targetingpurposesondockedcivilianvesselsin theHodeidahandSalifanchorageareas.

1“OperationDecisiveStorm”&“OperationRestoringHope”:composedbySaudiArabia,Egypt,Morocco,Jordan,Sudan, UnitedArabEmirates,Kuwait,Qatar,andBahrain;itwasalsosupportedbyDjibouti,Eritrea,andSomaliawhilebackedby theUnitedStates,UnitedKingdom,France,Germany,andCanada.

EXPLOSIVETHREATDYNAMICSINTHEREDSEA
43 counteriedreport.com

•TheSaudi-ledcoalitionfoiledanattackwith explosive-ladenUSVonaSaudioiltankernearthe HodeidahportonJanuary10th,2018.

•ASaudioiltankerattackedwithamissilewestof HodeidahininternationalwatersonApril3rd,2018.

•Land-basedmissileorrocketattackontheTurkishfagged “InceInebolu” vessel,abulkfoodcarrier, onMay10th,2018.

•AnotherSaudioiltankerwasattackedonJuly 25th,2018.

•AnattackwithexplosiveladenUSVsagainstthe JizanportwasfoiledonSeptember30th,2018.

Weknowaboutthe“where”andthe“who (against)”…Whataboutthe“(with)what”?

Facedwithsuperiorforces,theHouthishavebeen forcedtorelyincreasinglyonasymmetricalinsurgency tacticstopressurethecoalition.TheHouthi’s asymmetricstrategyincreasinglyreliesonattacks againstmaritimetargetsintheRedSeafromareasof theYemenicoasttheycontrol.

Aspreviouslyhighlighted,theHouthiforceswere onlycountingonfewpatrolboatsandanaverage amountofstoredanti-shipmissiles(ballistic,cruise andothers)withoutlaunchingplatforms:thosemissiles werethetoolforfrstattacksagainstvesselsnavigating aroundYemenicoast(e.g.U.S.NavydestroyerUSS “Mason”,amphibioustransportdockshipUSS “Ponce”,commercialships…).

Withlimitedeffciency,theywereusingsmallboats carryinglightweaponssuchassmallarmsandrocketpropelledgrenades(RPGs)forswarmtacticsagainst commercialoiltankers.

Thefrstuseofanexplosive-ladenunmanned surfacevehicle(USV)againstmilitaryvesselstook placein2017,whenoneoftheseremotelycontrolled boatsdetonatedatthesternoftheSaudiNavalForces frigate “Al-Madinah”,damagingthewarship,andkilling atleasttwoSaudisailors;itwas2018whenagroupof thosemeansattackedcivilianvesselssuchasaSaudifaggedtanker.

AnsarAllah’snavalinsurgenttacticsnotonlyaffect adversarywarships,butmorerelevantlyhavean economicimpactthroughtheirthreatstoattacktrade,

cargoandoilshipmentspassingthroughtheBab al-MandebStraitandfurthernorthintheRedSea.The Houthigrouphasstrategicallyusedtheseattacksto coercetheSaudi-ledCoalitionfrombothmilitaryand economicperspectives.

TheBabal-Mandabstrait,whichisabout 25kilometerswide,isastrategicallyvitalmaritime waterway,throughwhichmerchantshipsintheGulf ofAdensailtotheRedSea,andthentotheSuez CanalandtheMediterraneanSea.Itisoneofthe mostcrowdedwaterwaysforoiltransportationinthe MiddleEastandotherregionswithmorethan 3.3millionoilbarrelsperday.Thisstraitisvitally sensitive,notonlytoallcountriesborderingtheRed Sea,buttoallworldtrade.

Infact,themaritimethreatbyAnsarAllahisalso strategicallybeneftingIran,whoisbehindthe Figure1:Houthipropagandaonattackedvessels (Source–Telegram)

EXPLOSIVETHREATDYNAMICSINTHEREDSEA 44 COUNTER-IEDREPORT,Spring/Summer2024

supportwithtraining,technicalknowledge,and provisionofcomponentstotheHouthis’relatively innovativetactics,techniques,andproceduresinthe RedSea.IranunderstandstheHouthisassupportive meanstoleveragepressureontheRedSea chokepointasIranhasdoneinStraitofHormuzatthe entranceofthePersianGulf.

AclearexampleofIraniansupportcouldbethe transferofcopiesoftheChineseC-802anti-ship missile,asitwasmadewithotherIranian-backed militiassuchasHezbollah(e.g.C-802missileswere alsousedintwoHezbollahnavalattacksduringthe 2006LebanonWar).

Additionally,theHouthisarealsotaking commercialvesselshostagefrom2018on, includingtheseizureofSaudioffshoretugboat “Rabigh-3” andaSouthKorean-owneddrillingrigon November17th,2019.

MaybeGazaisclosertoHodeidahthanitcould looklike

Afterthatindicatedpersistentindirectthreatto maritimetraffcalongRedSeaandArabianSea

throughtheBabal-MandabStraitbytheHouthi groupfrom2015on,theHouthiMovementgroup reactedtotheIsraelioperationsinGazawithdirect attackstovesselsandmaritimetraffcthroughthe referredarea.

AsanarmedanswerinsupporttoPalestineafter theIsraelientryinsideGazaStripbecauseofthe coordinatedattacksovertheirterritorybyPalestinian militiasonOctober7th,2023,AnsarAllahinitiated activitiesagainstIsraeliterritoryandtheirexternal interests(includingattacksagainstIsraelivesselsor thoseconnectedwithIsraelicompanies/actors)from October19th,2023,on.

Thethreattocargovesselstravellingthroughone ofthemaincommercialmaritimeroutesresultedin numeroustransportationcompaniestochangetheir maritimeroutetoasafer-but-morecostlyandlonger route.

TheUnitedStatesandUnitedKingdomreacted againsttheHouthithreatsagainstcommercial navigationwithsurgicalattacksinYemeniterritory:that movedtheHouthiMovementtoalsoattackAmerican andBritishvesselsfromJanuary11th,2024,on.

EXPLOSIVETHREATDYNAMICSINTHEREDSEA 45 counteriedreport.com
Figure2:HouthipropagandathreateningIsraelimilitaryandcommercialvessels (Source–Telegram)

Figure3:IncidentsaroundRedSeaandArabianSeafrom15November2023to13April2024 (Source–X/@detresfa_)

Signalsfromabove:Houthinavalcapabilitieson explosive-ladenunmannedaircraftsystems(UAS) WiththeessentialtechnicalsupportfromIran,theHouthi Movementcountsonseveralmodelsofexplosiveladen drones(e.g. “Rasid”,“Qasif1”,“Qasif2K”,“Samad2”, “Samad3”,“Shihab”,“Rajum”,“Waeed1”,“Waeed2” …).

Consideringtheattackreports, “Waeed1” & “Waeed2”,locallyproducedexplosiveladendrones basedontheIranianSahed-131/136design,arethe mainmodelsusedbytheHouthiMovementagainst vessels(alongwithotherground-basedtargets).

Withanestimatedrangeof250to500Km(upto 2500Km,asitwasself-declaredbyHouthipropaganda butnotconfrmed)dependingonversionsandpayload, theattacktypicallytakesplacefromabove,andthe explosivewarheadsof “Waeed” andsimilarversions (from15Kgto40Kg)areabletocauseaholeinthe

deckspreadingfragmentation,causingminordamage andevenlimitedcasualtiesamongthecrew.

UASareestimatedtobeeffectiveagainstcivilian vessels,whileapotentialdaylightattackagainsta militaryvesselwouldmostprobablyberepelledbythe vessel’santi-aircraftdefensivesystems. “Waeed” versionsarealsoquiteresistanttoelectromagnetic warfare.

Themostdangerousadversarycourseofaction wouldbetargetingthecommunicationsandnavigation systemsantennasfromabove,whichcouldleavethe vesselwithoutcommunicationsornavigationsupport elements:thevesselwouldsuffermobilityproblems.

Additionally,oneofthepotentialusesofexplosiveladendronescouldbetheirusetoattractattentionor distractweaponsystemsintheaimofcoveringor maskingamoreeffectiveattackwithmissiles.

EXPLOSIVETHREATDYNAMICSINTHEREDSEA 46 COUNTER-IEDREPORT,Spring/Summer2024

AnalternatebeneftfromtheuseofthoseUASisthe saturationofairdefensesofAlliedmilitaryvessels taskedtoprotectagainstattacksoncivilianships: asingleUSNavyStandardMissile(SM)couldcost between$2and$4million,whilethedronesarea muchlowercostalternative.

Therearenoreportsaboutthepotentialuseofother modelsofexplosive-ladendronesthanthe “Waeed” versionsagainstnavalvehicles:nonetheless,the HouthiMovementhasused “Qasif” and “Samad” seriesagainstoilplatformsandharborfacilitiesin thepast.

Additionally,thestationorentrymaneuverinsidea harbor,alongwiththerefuelingofavesselnearthe coast,couldalsoexposeahighvulnerabilityregarding potentialattackswithexplosive-ladendroneswitha shorterrange(e.g. “Rajum”,“Rasid” …).

TheIraniandevelopmentandpotentialdistributionof radar/infraredseekingguidancesystemsforAbabilbasedUASisposinganemergingthreatagainstthe vesselscrossingwatersclosetoYemen.Thoseactive guidancesystemsaresimultaneouslyavoidingtheneed ofradiofrequencypiloting(somakingjammingmuch morediffcult)duringattack,whileprovidingexplosive-

ladendroneswithautonomoustargetselectionthrough targetinghotareas(e.g.engines)anddetection/ communicationssystemsofthetargetedvessels(e.g. radar)orevenagainstotheraerialvehicles.

Phantomvessels:Houthinavalcapabilitieson explosive-ladenunmannedsurfacevehicles(USV) Althoughtherearepreviouslyreportedattackswith unmannedexplosive-ladenboatsagainstSaudi vessels,itwaslastJanuarywhenthefrstattackofthis typeagainstaciviliancommercialshipintheRedSea wasreportedbytheU.S.Navy.

Thealreadyknownmodels(called “Shark-33”, “Blowfsh”,“Tufan-1”,“Tufan-2” & “Tufan-3”)of unmannedsurfacevehicleborneimprovisedexplosive devices(USVVBIED)arebasedoncivilianboats whichhavebeentransformedintounmanned explosive-ladensurfacevehiclesthroughinstalling radiocontrol,servodriving,globalnavigationsatellite systems(GNSS)andbulkexplosiveormunition warheadsasamaincharge.Allthosevehiclesare fttedwithcommercial-off-the-shelf(COTS)outboard engines(e.g.YAMAHA200A)insingleortwin confguration.

EXPLOSIVETHREATDYNAMICSINTHEREDSEA 47 counteriedreport.com
Figure4:Houthipropagandaontheirunmannedaircraftsystems,including “Waeed” model (Source–Telegram)

ThereferredUSVVBIEDmodelsarecurrently showingsomepotentialvulnerabilitieswhichcould facilitatetheirdetectionandengagement,solimiting theireffectiveness,asfollows:

•Daylightonlyoperations.

•COTSOutboardengines.

•Stillrelativelyhighprofleabovesealevel.

•Notverygoodmaneuverability.

•Radiocontrolbyradiofrequency.

Themainpotentialadvantagesfromtheuseofthose unmannedvehiclesare:

•Hugeexplosivemaincharges(e.g.454Kgfor “Shark-33”,150Kgfor “Tufan-1”,400Kgfor “Tufan-2”,500Kgfor “Tufan-3”).

•Highspeed(upto52nauticalmilesperhourfor “Tufan-3”).

•Longrange(e.g. “Tufan-3”).

•Groupattacksincludingmannedintelligencesurveillance-reconnaissance(ISR)andattack USVsinsupporttothetargetingbyseveral explosive-ladenones.

•EstimatedsupportbyIranianmeansregarding Intelligence,SupporttoTargeting,andTargeting selection/prioritization.

Themostdangerousadversarycourseofaction couldbetheapplicationoftechnicalandtactical lessonsidentifedfromtheUkrainianareaof operationswiththetechnologicalsupportfromIran,as basedondeveloping:

•Satellite-basedcommunications/control(extremely higherbandsthanforothermeans).

•Jetfoilengines.

•Lowersignatureandlowerprofleabovesealevel.

•Thermalcameras.

•Night-timeoperationscapability.

•Reiterationofattacks:frstblocking,second exploitingsuccesswithaccumulativeeffectsover aspecifctargetedpointatvesselhub.

•Electricalpower.

•Electromagneticprotectionmeasures.

EXPLOSIVETHREATDYNAMICSINTHEREDSEA 48 COUNTER-IEDREPORT,Spring/Summer2024
Figure5:Houthipropagandaontheirexplosive-laden unmannedunderwatervehicles (Source–Telegram)

ThereisevidenceonthepreviousHouthiuseofantihandlingswitches/devices(withestimatedIranian support)insideseizedfshingboatsastransformed intoISRUSVsplusvictimoperatedIEDs.

Thevictim-operatedswitchesshouldalsobe expectedinsideexplosive-ladenUSVs,withthe estimatedaimoflimitingtechnicalexploitationafter theirpotentialfailureand/orcapture.

Livingtorpedoes:Houthinavalcapabilitieson explosive-ladenunmannedunderwatervehicles (UUVs)

Thefrstreporteduseofexplosive-laden(alsonamed as “OneWayAttack OWA”)UUVsbyAnsarAllahwas announcedonFebruary18th2024.

Inthatline,afast-responsecutter(asassignedto U.S.NavalForcesCentralCommandtosupportU.N. SecurityCouncilresolutions2216/2675/2707inthe Arabian/RedSea)boardedavesseltransporting unmannedunderwater/surfacevehicle(UUV/USV) componentsofIranianorigintoYemenonJanuary 28th,2024.

TheIraniandesignforUUV(fromwhichtheHouthi modelisestimatedtobederivedfrom)istechnically assessedaswire-guided,soopentobemanaged frommilitaryspeedboatsorevenfshingones: accordingly,theadditionofthatkindofguidanceto anexplosive-ladenUUVwouldmostprobablypose achallengetopotentialcountermeasures(e.g. electromagneticwarfare,directfre…)includingtactics, techniquesandprocedures(e.g.evasionmaneuver).

Inadditiontothat,theharborentryofamilitary vesseloralargecargoonemeansahighlyvulnerable momentforanattack,especiallyifconsideringthe limitationofuseofelectromagneticsystemswhenthe portissharedwithcivilianuse.

Nonetheless,theestimatedmostdangerous adversarycourseofactionusingexplosive-laden UUVswouldconsistoftheirconcealeduseasapartof acombinedattackwithotheroffensivemeans.

Otherkindofthreats,othermeansofdamage… Althoughtheuseofrocketormissilelauncherboatsby theHouthiMovementhasnotbeenreportedyet,the

developmentofthatkindofweaponizedmeansbythe IslamicRevolutionaryGuardCorpscouldevolveintoa transferofdesigns,technologies,componentsor meanstoAnsarAllahorganization’sforces.

AnsarAllahcountsonseveraldesignsforseamines andtheycouldbeeasilydeployedtothreatenand deternavigationthroughtheBabal-MandabStrait, alongwiththerestofmaritimetraffcroutesalongthe ArabianandRedSeas.

Analternatelyimprovisedversionofaseamine consistsoffoatingdevicesorfshingboatsloadedwith explosivechargeswithvictim-operatedswitchesand abandonedalongnavigationroutesorintheproximity ofharbors/refuelingpoints.

Themostdangerousoptionwouldbebasedon intentionallydriftingseaminesalongseacurrentsor closetocriticallocations(e.g.straits,portaccess…).

Asithappenswithseamines,theHouthiMovement alsocountsondifferentversionsofmaritimesabotage devices,whichcouldbediscreetlyemplacedbytheir navalcommandounitsinthehullofcivilianormilitary vesselsonceplacedinsideestimatedassafeareas.

Severallocallyproducedmodelsforanti-ship missileshavebeendevelopedandshownduring militaryparades/exercisesbyAnsarAllah(e.g. “AlMandab1”,“Al-Mandab2”,“Faliq-1”,“Zubig”…):they arebasedonrefurbishingofoldSovietweaponsor copiesfromIranianandChinesedesigns.

Themostdangerouscourseofactionabouttheiruse wouldbefocusedonacombinedusealongwithother improvisedexplosivedevicesaspartofacomplex attack.

Thepotentialdevelopmentofmissilelaunchingboats bytheHouthiMovementwouldseriouslyincreasetheir capabilitiesregardingfastandmobileplatforms threateningbothcivilianandmilitarytargets.

Assomesortofconclusions

TheHouthiattacksareexpectedtodecreaseasmuch ofthetraffcthroughtheareawillbereducedduetothe threatfrompotentialattacks:lesseradversarytargets meanslessernumberofaggressiveactions!

Althoughtheirtechnologiesareeffectivelynotthe mostadvancedones,theHouthithreattomaritime

EXPLOSIVETHREATDYNAMICSINTHEREDSEA 49 counteriedreport.com

movementthroughtheRedSeaishardtodefeatas theyhavebeendevelopingtoomanydifferentmeans tobelaunchedfromdifferentplatformsandcombined withsomeinnovativetactics,techniquesand procedures…anyHouthicombinedattackusing differentmeansfromdifferentangleswouldrequiretoo manycountermeasurestobesmartlyand simultaneouslyused.

Additionally,potentialIranianlessonslearnedfrom Ukrainiantheatreofoperationscouldmakethe Houthithreatsevenmoredangerousthanthey currentlyare…■

“Ifyourenemyoffersyoutwotargets,strikeatathird.” (RobertJordan,inhisbook"CrossroadsofTwilight" frstpublishedin2003)

REFERENCES

•C-IEDCoE“ThreatanalysisbyAnsarAllah/Houthi rebelsovernavigationthroughtheRedSeaand ArabianSea”,April2024.

•C-IEDCoE“Non-StateActors´TacticsTechniques &ProceduresUpdates”products(from2020on)

•USDoDDefenseIntelligenceAgency–Iran enablingHouthiattacksacrosstheMiddleEast, February2024.

•RiskIntelligence-SecurityThreatUpdatesonRed Sea/GulfofAden.

• www.shebaintelligence.uk

• www.confictarm.com

• www.longwarjournal.org

• www.runi.ac.il

• www.washingtoninstitute.org

• www.georgetownsecuritystudiesreview.org

•Socialmedia:X(formerTwitter)/Telegram/VKontakte VK(ВКонтакте)

Disclaimer

Thisarticledoesnotrepresenttheopinionofany nationalormultinationalorganisation;itswholecontent shouldonlybeconsideredastheopinionoftheauthor. Asalltheinformationhasbeenobtainedfromopen sources,potentialmistakescouldhavebeenmade duringtheresearchprocess.Pleasefeelfreetosend yourcomments,correctionsandinputstotheauthor; theywillbehighlyappreciated.

ABOUTTHEAUTHOR

LieutenantColonelJoseMRufas graduatedfrom theSpanishArmyMilitaryAcademyin1993.Hewas commissionedintotheC-IEDCentreofExcellenceas HeadoftheDefeattheDeviceBranchinAugust2016 andcurrentlyholdsthepostofChiefofAttackthe NetworksBranch.AsaMilitaryEngineerOffcer,his backgroundhasbeenmainlybasedonExplosive OrdnanceDisposalactivitiesintheSpanishArmyand C-IEDstaffissuesatthemultinationalheadquarters.In additiontohisEODOperator/EODOffcereducation, heattendedsomeothermilitarycoursesregarding Parachuting,ArmyStaff,InformationOperations,War CollegeGeneral/JointStaff,MilitarySearch,Technical ExploitationOperations,WeaponsIntelligenceTeam, ExploitationLaboratories,HomemadeExplosivesand otherC-IEDcourses.Hisoperationalassignments includeBosniaandHerzegovina(3),Afghanistan(3), theRepublicofEcuador,IraqandUganda. E-mail:jrufas@ciedcoe.org

EXPLOSIVETHREATDYNAMICSINTHEREDSEA 50 COUNTER-IEDREPORT,Spring/Summer2024

IEDATTACKSAIMEDTOIMPEDE INDIA’SECONOMICGROWTH

INTRODUCTION

OverthelastthirtyyearsIndia’seconomy hasbeengrowingatahigherratethanmost nationsintheworld.Infact,Indiaisone ofthefastestgrowingeconomiesinthe worldtoday.Thisrapidgrowthisbeing drivenbyIndia’sleadershippositionin theever-growingInformationTechnology (IT),Services,Manufacturing,Agriculture, EnergyandHumanCapitalsectors.Foreign DirectinvestmentinIndiahasgrown manifoldduetoconfdenceinIndia’s economicreformagenda.Millionsof Indiansworkingabroadhavebeenmaking hugeremittanceshome.India,soonis poisedtobethethirdlargesteconomyin theworldaftertheUSAandChina.While theeconomyandqualityoflifearegrowing, IndiafacesmanyInternalsecurity challengesemanatingfrom,militancyinthe UnionTerritoryofJammuandKashmir, insurgenciesintheNorthEasternStates andtheMaoistdominated‘RedCorridor’ coveringabout80of100districtsofIndia, terrorismsponsoredfromacrosstheborder andcivildisorderonvarioussocialissues. Alargenumberofsecurityforcesare deployedtomeetthesechallenges.

BoomingIndianEconomy. (Source:IMF)

IEDATTACKSAIMEDTOIMPEDEINDIA’SECONOMICGROWTH
51 counteriedreport.com

India’sInternalSecurityChallenges. (Source:www.governancetoday.co.in)

ImprovisedExplosiveDevices(IEDs)haveoverthe timebecometheweaponofchoiceforthesehostile elementsandconstituteagreatpartoftheoverall securitythreatsincludingeconomicsecurity.These inimicalforceshavebeentargetingmanyeconomic hubslocatedinthemetropolitanandurbanareas acrossthenationwithanobjectivetoimpedeIndia’s rapideconomicgrowth.

ECONOMICTARGETSOFATTACKS

Inthelastthreedecades,Indiawitnessedalarge numberofviciousIEDattacksonmanyderivativesof itseconomicgrowthacrossthecountrywhichinclude urbanpublictransportationsystems,touristcentres, revenuegeneratingentities,rapidlydeveloping infrastructure,fnancialhubs,ITparks,centresoftrade, commerceandenergyindustries.SuchmajorIED attacksaredescribedbelow:

A.MumbaiSerialBombings1993 —Thebombings wereaseriesof13explosionsatvariouslocations spreadovertheMumbaiMetropolisonFriday, 12March1993.Mostofthebombswerecar bombs,butsomewereinscootersandsuitcases. Handgrenadeswerealsousedintheattacks. Bombsandhandgrenadesexplodedatverybusy marketsincludingZaveriBazaar,CenturyBazaar, KathaBazaar,ShivSenaBhavan,PlazaTheatre, SaharInternationalAirportandatFishermen's Colony.Severaldayslater,unexplodedcarbombs werediscoveredatasuburbanrailwaystation.The offcialnumberofdeadwasputat257withabout 1,500othersinjured.Propertiesworthmillionsof Dollarsweredestroyedduringtheseblasts.The entireMumbaiMetropoliswasparalysedforafew days.However,Mumbaianditspeoplehadshown greatresilience,gritanddeterminationtodefeat

IEDATTACKSAIMEDTOIMPEDEINDIA’SECONOMICGROWTH 52 COUNTER-IEDREPORT,Spring/Summer2024

DevastationMumbaiBlasts1993. (Source:TimesofIndia)

CoimbatoreBombings1998. (Source:MHA,India)

IEDATTACKSAIMEDTOIMPEDEINDIA’SECONOMICGROWTH 53 counteriedreport.com

terrorismandspeedilysprungbackintoroutine life.Aclearmessagewassentthatterrorism willneverdefeattheirwillandlongcherished cultureofharmonyandbrotherhood.Mumbai, thethrivingmetropolisandcommercialcapitalof India,ishomefornearly22millionpeople.Mumbai accountsfornearly20%ofTotalGrossDomestic ProductofIndia.

B.MumbaiSeriesofTrainBombings2006 —On 11July2006,aseriesofsevenbombblaststook placeoveraperiodof11minutesonthesuburban railwaynetworkduringtheafter-workrushhour whichkilled209andinjuredover700people. PressureCookerbombswereplacedontrainson thenetwork,whichformsthebackboneofthecity's transportnetwork.Pressurecookerswereusedin thisbombingtoincreasetheafterburnina

thermobaricreaction,morepowerfulthan conventionalhighexplosives.Thetimingofthe bombingsandthetrainssoselectedwastoinfict largenumberofcasualties,causegreaterimpact onpublicpsycheanddisrupteconomicactivities.

C.DelhiSerialBombBlasts2005and2008 —On 29Oct2005twodaysbeforeDiwaliaseriesofthree bombblaststookplaceinthecapitalofIndia.These blastswerecarriedoutbythePakistanbased terroristorganizationIslamicRevolutionaryFront. Twobombswereexplodedinmainmarketsofthe cityandthethirdblasttookplaceinabus.The attackineachmarketwasdeadlierasitwastheday ofDhanterasashoppingtimeforfestivals.The attackresultedin63deadand210injured.Again, on13Sept2008aseriesoffvesynchronised blaststookplacewithinaspanoffveminutesat

IEDATTACKSAIMEDTOIMPEDEINDIA’SECONOMICGROWTH 54 COUNTER-IEDREPORT,Spring/Summer2024
TrainofTerrorMumbai2006. (Source:IndiaToday)

(Source:IndiaTV)

variouslocationsofDelhikilling30andinjuring150 people.DelhiisnotonlythecapitalofIndia,buta largeeconomichub.

D.JaipurBlast2008 —On13May2008,aseries ofninesynchronisedbombblaststookplaceina spanof15minutes.Atenthbombwasalsofound andwasdefusedbythepolice.Thiswasa shockingincidentforIndiaasJaipurwasnever targetedbyterroristsbeforeanditisoneof India’smostpopulartouristdestinations.Oneof thebombswasexplodednearHawaMahal–an iconicmonumentofIndia.Initialpolice investigationssuggestedtheinvolvementof severalIslamicmilitantorganizations.These blastsweresynchronizedinsuchawaythat attackersknewwherepeoplewillrunnextafter ablastatoneplaceandwhentheterrifedpublic rantowardsasaferplace,anexplosiontook placethere.Thetotalcasualtiesinthisattack amountedto63peopledeadand216injured.

E.GuwahatiBombings2008 —Aserialbombblast, oneoftheworstterroristattacksinIndiawas inGuwahati,capitaloftheStateofAssam occurredon30Oct2008.Asmanyaseighteen bombblastsatdifferentlocationsshookthecity andotherareas.Mostofthebombsexploded nearamainmarketandatatimewhenthemarket wascrowded.Noneofthegroupsclaimed responsibilityfortheseattacksbutsomeevidence suggesteditwastheNationalDemocraticFrontof Bodoland(NDFB)thatexecutedthebombingsin Assam.Thetotalcasualtiesinthisattack amountedto81deadand470injured.Guwahatiis thelargestcityoftheNorthEastandathriving economicmetropolis.

F.CoimbatoreBombings1998 -—AnIslamist Fundamentalistgroup,AlUmmah,conducteda seriesoftwelveBombblastsatelevendifferent locationson14Feb1998.Mostoftheblastswere plantedatHinduinhabitedareasduetowhichthe

IEDATTACKSAIMEDTOIMPEDEINDIA’SECONOMICGROWTH 55 counteriedreport.com
DelhiBlasts2005.

GuwahatiBlasts2008. (Source:DainikBhaskar)

JaipurBlasts2008. (Source:HindustanTimes)

IEDATTACKSAIMEDTOIMPEDEINDIA’SECONOMICGROWTH 56 COUNTER-IEDREPORT,Spring/Summer2024

AhmedabadBombings2008. (Source:TheTathva)

majorityofthevictimswereHindus.Mainaimof theblastswastodisruptthecommunalharmony andcommercialandindustrialactivitiesofthe SouthernCity.Theseblastsresultedin60people deadand200injured.

G.SrinagarAttack2001 —On01Oct2001,the militantsbelongingtoJaish-e-Mohammedcarried outanattackontheJammuandKashmirState LegislativeAssemblycomplexinSrinagarusinga carbombandthreeFedayeensuicidebombers. 38peopleincludingthreeFedayeendiedinthis attack.SrinagarisIndia’smostpopulartourist centreandthestate’smainhubforeconomic activities.

H.AhmedabadBombings2008 —TheCapitalcity oftheStateofGujaratsurvivedaseriesoftwentyonebombblastson26July2008.Thesebomb blastsleft56peopledeadandmorethan200 peopleseverelyinjured.AhmedabadisIndia’s biggesttextilehub.

I.HyderabadBlasts2007 —On25August2007, twobombsexplodedalmostsimultaneouslyinthe capitaloftheStateofTelangana.Thefrstbomb explodedinLumbiniAmusementParkandthe secondbombexplodedfveminuteslaterinGokul ChatBhandari,apopularrestaurantabout5 kilometresaway.Atleast42peoplewerereported tohavediedinthetwobombings.Twomore bombsweredefusedinotherpartsofthecity. HyderabadistheffthbiggestmetropolisofIndia andabigcentreforITandPharmacompanies.It isalsoabigtouristcentre.

J.MumbaiBombings2011 —Aseriesofthree coordinatedbombexplosionsatdifferentlocations allwithin12minutesoccurredon13July2011.The frstdevicewasplantedonamotorcycle,the seconddeviceplantedinatiffnboxandthethird deviceplacedonanelectricpoleatabusstand exploded.Theblastsclaimed26livesandinjured anadditional130others.

IEDATTACKSAIMEDTOIMPEDEINDIA’SECONOMICGROWTH 57 counteriedreport.com

HyderabadBlasts2007. (Source:LiveLaw.in)

PulwamaSVBIEDAttack2019. (Source:MHAIndia)

IEDATTACKSAIMEDTOIMPEDEINDIA’SECONOMICGROWTH 58 COUNTER-IEDREPORT,Spring/Summer2024

K.PuneBombing2010 —Abombexplodedatthe GermanBakeryinthecityofPune,on13Feb 2010.Theblastkilled17people,andinjuredat least60more.TheGermanBakeryislocated neartheJewishChabadHouseandtheOsho internationalmeditationresort.Theresortand thebakeryarefrequentedbyforeignersandthe bakery,whichispopularwithtouristsandlocals alike,wasbusyatthetimeoftheblast.Twolittle knowngroups,theLaskhar-e-TaibaAlAlamiand theMujahedeenIslamiMuslimFront,claimed theywerebehindthebombattack.Punehas hugeautomobile,IT,pharmaceuticalIndustries andoneofthebiggesteducationalcentres.

L.ThePulwamaAttack2019 —On14February 2019,aconvoyofvehiclestransportingmore than2,500centralpoliceforcepersonnelfrom JammutoSrinagarwasattackedatLethpora, PulwamaDistrict.Theffthbusintheconvoy carryingsecuritypersonnelwasrammed byvancarryingalargequantityofexplosives.It causedahugeblastwhichkilled44police personnelandinjuredmanyothers.PakistanbasedterroristgroupJaisheMohammed(JeM) claimedresponsibilityfortheattack.The Pulwamaattackisthebiggestinthehistoryof Kashmirmilitancyintermsofthecasualtiesit infictedonsecurityforces.JammuandKashmir isIndia’smaintouristterritoryattractingmillions oftouristseveryyear.Tourismisthemainsource ofrevenueforthatterritory.

CONCLUSION

TheIEDattacksoverthelastthreedecades,a fewofwhichhavebeendescribedabove,onIndia’s economic,fnancialandtouristcentresundoubtedly provethemainobjectivetoimpedeeconomicgrowth ofavibrantdemocraticandprogressivenation,and frmlyinthecross-hairsofterrorgroups.Despite thesedisruptions,resilientandrobustIndiaisfrmly andconfdentlyonthepathofprogressand development.■

ABOUTTHEAUTHOR

ColonelHRNaiduGade-IndianArmyVeteran, [BE(Civil),MSc(DefenceStudies),MBA(HR)] CommissionedintotheCorpsofCombatEngineers. ACivilEngineer,andSecurityProfessional,with 47yearsofrichexperienceinthefeldofCombat Engineering,Chemical,Biological,Radiological, NuclearandExplosives(CBRNe)Defence,Security andDisasterManagementandCounterIED Operations.IsaqualifedCBRNandCounter-IED Professional.

IsaformerMemberInternationalCivilServicewhile workingasChiefCWInspector1997-2004withthe ‘OrganisationforProhibitionofChemicalWeapons (OPCW)’,TheNetherlands,winneroftheNobelPeace Prize2013.Ledteamsofinternationalprofessionalson manyverifcationmissionstovariousmember countries,toverifytheinventoryofChemicalWeapons andmonitortheirdestruction.

Presently,ChiefConsultantwith‘CBRNeSecure India’a‘forumandaknowledgecentre’forbringing awarenessinthegeneralpublic,governmentand securityentitiesonthethreatsarisingfromtheuseof CBRNematerialandtheirdisastrousconsequencesA prolifcwriterandspeaker,participatedinvarious internationalanddomesticconferencesonCBRN Security,DisasterManagementandCounterExplosive Issuesandwritesarticlesforprofessionaljournals worldwideonthesesubjects.

IEDATTACKSAIMEDTOIMPEDEINDIA’SECONOMICGROWTH 59 counteriedreport.com
EXHIBITION | EXPERT PANELS | NETWORKING 16 - 18 OCTOBER 2024 PRAGUE, Czech Republic www.FFF.global www.NATOexhibition.org

ISLAMICSTATETWINSUICIDEBOMBINGS, KERMAN,IRAN

ANALYSIS

OnJanuary3,2024,ataround2:55PM,duringa commemorativeceremonymarkingthedeathof MajorGeneralQasemSoleimani,ablastoccurred approximately700metersfromSahebal-Zaman MosqueandKerman’sMartyrsCemetery,where Soleimani’stombislocated.Theexplosionoccurredin

anareawheredozensofpeoplehadgathered, marchingtowardthecemetery.Visualevidence fromtheblastarearevealssubstantialmetalball fragmentationdamagetotheroad,nearby infrastructure,property,andvictims.Severalindividuals sustainedfragmentationimpactstothehead.

MapindicatingtheapproximatelocationsofthefrstandsecondblastsnearKerman’sMartyrsCemeteryinthecityofKerman

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN
61 counteriedreport.com

Themomentofthefrstexplosion

Thesceneoftheattack

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 62 COUNTER-IEDREPORT,Spring/Summer2024

Fragmentationdamageontheroad

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 63 counteriedreport.com
Metalballfragmentationdamagetoanearbytraffcbarrier

Ballbearingfragmentationdamageontheroad,andabenttraffcsign

Thetraffcsignthatbentfromtheexplosionwave,withvisiblefragmentationimpact

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 64 COUNTER-IEDREPORT,Spring/Summer2024

Aftertheexplosion,footagerevealsmultiplevictims,withtheabove-mentionedbenttraffcsignvisibleintheleftpartofthe image(markedwitharedarrow)

Twentyminutesafterthefrstblast,at3:15PM,a secondexplosionoccurredapproximately1,000 metersfromthetomb,nearamajorroadcurve.Videos andCCTVfootagerevealtheblastsite,capturingthe momentoftheexplosionnearparkedcars,witha signifcantcrowdpresent.Sirenscanbeheardinthe

background.CCTVfootagesuggeststhattheblast originatedfromanindividualwhowasneartheparked carsatthetime.Similartothefrstblast,thereis evidencepointingtofragmentationdamageaffecting nearbyvictimsandvehicles.

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 65 counteriedreport.com
Thesceneandthemomentoftheblast

Theexplosiontookplacenearavehiclewithitsrearcompartmentlifted.Theblastoriginatedontherightsideofthevehicle

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 66 COUNTER-IEDREPORT,Spring/Summer2024
Damagetothevehicleparkedinfrontoftheonewiththeraisedrearcompartment

Oneofthebodiesexhibitssignifcantabdominaldamage,possiblyindicatingtheuseofaPBIEDwornbytheindividual

ASSESSMENT

Accordingtovariousreports,theattacksresultedinan estimated80-90fatalitiesandleftaround280others injured.ThismarksthedeadliestterroristattackinIran sincetheCinemaRexattack of1978.Thetwinbombings tookplaceduringahighly sensitiveoccasion-the commemorativeceremony forQasemSoleimani.

Soleimani,areveredfgurein theIranianregime,servedas thecommanderoftheIslamic RevolutionaryGuardCorps (IRGC)QudsForce,specializinginunconventional warfareandspecialmilitary intelligenceoperations.

Shortlyafterthebombings, ISclaimedresponsibilityfor

theattackthroughitsAmaqNewsAgency,asserting thattwoofitsmembershadcarriedouttheattackusing PBIEDs.

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 67 counteriedreport.com
AframefromavideoofthetwosuicidebomberswearingcamoufagepatternvestPBIEDs, pledgingallegiancetoISleaderAbuHafsal-Hashimial-Qurashi (assumedoffceinAugust2023)

ISclaimofresponsibilityinEnglishfeaturingthetwosuicidebombers

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 68 COUNTER-IEDREPORT,Spring/Summer2024

Aftertheattacks,theIranianMinistryofIntelligence announcedthearrestof35suspectswhoallegedly supportedandfacilitatedthepreparationsforthe bombingsinKerman.TheMinistryreleasedfootageofthe suspectedsuicidebombersbeforetheattackand publishedincriminatingevidenceandmaterialsfoundin theirsafehouse.Thestatementprovideddetailsonthe identityofoneofthebombersandoneoftheorganizers oftheattack,aswellastheirmethodofinfltrationintoIran.

Accordingtotheinvestigation,Abdullahal-Tajiki,a Tajiknational,servedasthemastermindandprimary facilitatorofthebombings.Operatingalongsidea womanandachildwhoprovidedhiscover,heillegally enteredIranwiththeassistanceoflocalsmugglersfrom thesoutheasternborders.Al-TajikisettledinKerman Province,takingresidenceinarentedhouseonthe outskirtsofKermanCity.Inadditiontoorchestratingthe bombings,hewasinvolvedinthemanufacturingofthe PBIEDs,includingthemakingoftheexplosivesandthe assemblyofelectricalcomponents.Al-Tajikileftthe countrytwodaysbeforethebombings.

Additionally,theMinistryofIntelligenceidentifed oneofthesuicidebombersasa24-year-old Tajikistancitizen.HebecameacquaintedwithIS throughtheTelegrammessagingapp.Several monthsbeforethebombings,hetraveledtothecity ofVan,Turkey,andthenenteredIranwiththe assistanceofsmugglersoperatinginthewesternand easternborders.HeproceededtoAfghanistan, attendingatrainingcampinBadakhshanProvince managedbytheIslamicStateKhorasanProvince (ISKP).There,hestudiedISreligiousteachingsand underwentoperationalandmilitarytraining.Aftera fewmonths,hewasdispatchedtoIran.Themilitant crossedtheborderintoJaleqKalleganinSaravan Citywiththeaidoflocalsmugglers.Passingthrough thecitiesofKhash,Iranshahr,andJiroft,hereached Abdullahal-Tajiki'ssafehouseinKerman,wherehe joinedhim.Onthedayoftheincident,at1:03PMand 1:14PM,thetwosuicidebomberslefttheir safehouseandheadedtowardsKermanMartyrs Cemetery.

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 69 counteriedreport.com
Thesafehouse

Themaintargetfortheattackwaslikelytheinner complexofthecemetery,possiblyaimingatthegrave ofQasemSoleimaniorthemosque.However, stringentsecurityarrangementsduringthissensitive memorialeventmayhavecompelledthebombersto initiatetheattackhundredsofmetersawayfromthe innercomplex.

Thelocationofthesecondblastwasontheroad exitingthecemetery,featuringamajorroadcurvethat causesvehiclestoslowdown,makingthemmore vulnerable.Thisroadservesasthemostplausible evacuationroute,andinourestimation,thesecond bomberintendedtotargetfrstrespondersevacuating thewoundedfromthearea.Thiscouldalsoaccount forthetwenty-minuteinterludebetweenthetwo bombings.

Thesubstantialattendanceatthememorial ceremonysignifcantlyheightenedthepotentialfor masscasualties.Theattackservesasasymbolic glorifcationofIScapabilitiesandfanaticismagainst ShiaIslamandtheIranianregime,bothdeemedbyIS asinfdelsworthyofpersecutionanddeath.

TheIraniansecurityforcesconductedaraidon Abdullahal-Tajiki'ssafehouseinKerman,uncovering

equipmentandcomponentsusedinthemanufacturing ofIEDs.Furthermore,theydiscoveredacamoufagestylefabricresemblingthevestswornbyISmilitants inthevideowheretheypledgedallegiancetothe ISleader.

Theevidenceobtainedfromtheraidstrongly substantiatestheclaimsmadebyboththeIranian regimeandISregardingtheuseofPBIEDsin theattacks.

Thediscovereditemsincludemetalball fragmentationplates,adigitalscale,voltmeter,various electricalcomponents,anON/OFFswitch,abattery connector,andapullswitch.

Inrecentyears,particularlyin2023,ISKPhas intensifeditsfocusoncarryingoutPBIEDattacksin AfghanistanandPakistan.Pullswitches,common componentsininitiationsystems,havebeen frequentlyidentifedinISKPPBIEDs.Notably,the TalibanthwartedanattackplotinvolvingaTajikISKP militantwhowasdiscoveredwithanIEDconcealedin sandals,featuringapullswitchcomponent, suggestingapotentialuseasaPBIED.Pullswitches andPBIEDswerealsodiscoveredinvariousTaliban raidsonISKPsafehouses.

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 70 COUNTER-IEDREPORT,Spring/Summer2024
Comparisonofthecamoufage-patternedvestsinthevideospublishedbyISandtheIranianMinistryofIntelligence

Metalballfragmentationplatesfoundinthesafehouse

Componentsfoundinthesafehouse

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 71 counteriedreport.com

Explosivespacket(left)andpullswitch(right)foundconcealedinsandals, KabulProvince,Afghanistan,August28,2023

ItshouldbenotedthatISattacksare rareinIran.Thelastrecordedincident claimedbyISinthecountryoccurredon theeveningofOctober26,2022,whenan assailantenteredtheShahCheraghHoly ShrineinthecityofShiraz.

Footagefromwithintheholysite, disseminatedthroughIranianstatemedia andsocialmedia,revealedtheperpetrator enteringfreelyandindiscriminately shootingatworshippersandvisitors presentatthetime.Accordingtoreports fromstate-runandinternationalmedia,the attackresultedinthedeathsof13to15 individuals,withanadditional40 sustaininginjuries.

Anothershootingattacktookplaceat thesameshrineonAugust13,2023. At7PMonaSunday,alone-wolf shootergainedaccesstotheShah Cheraghshrinethroughitssouthern

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 72 COUNTER-IEDREPORT,Spring/Summer2024
PBIED(left)andassortedpullswitches(right)foundinanISKPworkshop,JowzjanProvince,Afghanistan,March24,2023

gate,initiatinggunfre.Reportssuggestthatatleast oneanduptofourindividualswerekilledbeforethe assailantwasapprehendedbysecurityforces.Notably, thissecondattackwasnotattributedtoIS.

Furthermore,theJanuary2024Kermanattackisthe frstsuccessfulsuicidebombinginIraninseveralyears.

InSeptember2023,theIranianMinistryofIntelligence announceditapprehendedanISnetworkthatwas planningsimultaneousattacksindenselypopulated locationsinTehran.Duringraids,securityforces recoveredIEDsandcomponents,includingthosefora vestPBIEDwithimproviseddetonatorsandanelectric initiationsystem,incorporatingatleasttwo9Vbatteries andON/OFFrockerswitches.

ThelastsuicidebombinginIranwasexecutedbythe BalochiSalafgroupJayshal-AdelonFebruary13,2019. ThesuicidebomberdetonatedanSVBIEDnearabus transportingIRGCpersonnelontheroadbetweenKhash andZahedaninSistanandBaluchestanProvince, resultingin27casualties.

Overtheyears,Iraniansecurityforceshaveconducted operationsinthecountry'sborderregions,notablyin SistanandBaluchestanProvince,leadingtothe discoveryandconfscationofseveralPBIEDsduring raids.Forexample,onJune15,2017,Iraniansecurity forceslaunchedanoperationagainstamilitantcell affliatedwiththeAnsaral-Furqangroup,aSunni organizationoperatinginsoutheasternIranandknown

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 73 counteriedreport.com
CCTVfootageshowinggunmeninShahCheraghHolyShrineattacks:October2022(top)andAugust2023(bottom)

forcarryingoutterroristattacks.Theraidonahideoutin thecityofChabaharintheprovinceuncoveredIEDs, explosives,PBIEDs,grenades,rifes,andammunition.

TheparticipationofISKPinorchestratingandproviding trainingforthepreparationsleadinguptothesuicide bombingsindicatetheescalatingregionalterrorismthreat posedbythegroup,surpassingitsusualoperations confnedwithinAfghanistan’sborders.ISKPsuccessfully coordinatedacomplexdoublesuicidebombingattack, suggestingextensivemonths-longpreparationsand meticulousplanning.Thisattackwasexecutedona signifcantmass-gatheringoccasionandatalocationof profoundsymbolicimportancetotheIranianregime.

Thisattackadditionallysignifesasubstantial escalationinthegroup’sattackTTPsinIran,andmarks ashiftfromconventionalshootingattacks,typically carriedoutbyaloneassailant,toasophisticated

operationinvolvingfacilitators,smugglers,extended trainingperiods,andthecoordinationandexpertiseofan IEDspecialist.■

ABOUTTHEAUTHOR

ChiefSuperintendent(ret.)Michael Cardash, Seniorbombtechnician andformerdeputyheadoftheIsraeli policebombdisposaldivision, commandedbombdisposalunits withintheborderguardsandpolice duringintenseterroristconfictsin Israel.Michaelcurrentlyisthesenior CIEDanalystatTerrogence-Global,IED’sandauthors theTerogenceMöbiusC-IEDreportsanalyzingand assessingglobalIED-relatedtechnicalandtactical intelligence.

ISLAMICSTATETWINSUICIDEBOMBINGS,KERMAN,IRAN 74 COUNTER-IEDREPORT,Spring/Summer2024
ComponentsofthePBIEDfoundbyIraniansecurityforces,September2023

October 2 - 6 2024

VIPSECURITY–AMATTEROFLIFEANDDEATH

Flatpanelportablex-rayscannersarealreadyfrmly establishedasanessentialtoolforbombdisposal teamsthroughouttheworld.

Theirmobility,accuracy,andspeedofusegaveEOD operatorstheabilitytoviewwhatwasinsideabagor packageinsitu,whilstmaintainingasafedistance.

Flatpanelportablex-rayscannersallowoperators toseedetailedhigh-defnitionimagesofthecontents ofasuspectpackageorbag.Theycandetermine,not onlyifitisathreat,butwhattypeofthreat,withoutthe potentiallydangerousbusinessofopeningormoving theobjectordisruptingordestroyingitonsite.

Theyenableagenciestomakequickdecisions aboutwhetherabagposesagenuinethreatoris exactlywhatitseemstobe,aninnocentpieceof baggage.Meaning,thatpeoplecangoabouttheir businessasquicklyaspossibleandavoidmass disruptiontopublicspacesandtransportthrough unnecessaryevacuations.

Overtheyears,technologyhascontinually developedandnowcolourdifferentiatedscanshave beenintroduced.Thishasmadeitpossibletodetermine ifmaterialsareorganic,suchasexplosives,chemicals, anddrugs,aswellasmoreinnocentitemssuchas foodstuffs.Whataremetals,suchasguns,knives,hand grenades,metalpipebombs,andIEDcomponents (switches,circuitcomponents,etc.)andmetallic

fragmentation.Andlastly,inorganicmaterialslikeblack powdersandaluminizedhomemadeexplosives.

Theseattributeshavenotbeenlostonother membersofthelawenforcementandsecurity community.

Thecombinationof,alargeimagingarea,withhighqualityimages,atanaffordablepricehasmadethe 3DX-RayThreatScan®-LS1apopularsolutionfor secretserviceoffcersandprivatesecuritycompanies, whorequireamobilesystem,thatcanberapidly deployedtosecurehigh-profleVIPdelegationsat eventsworldwide.

3DX-RayaskedoneoftheirThreatScan®-LS1 users,aglobalsecuritycompanyCEO,whousesthe systemfortheiroperationsinEurope,andSouthand NorthAmerica,todescribeforusthebeneftsof workingwiththesystem:

“Wesupplysecuritysolutionsatconferences worldwide,soitisimportanttohaveamobilesystem thatcanbeeasilyandsafelyshipped.Whenthesecurity teamarrivesataconferencelocation,theywillcreatea sterilezonewhereallthemediareportersanddelegates willbecheckedbeforepassingtotheconvention.

“Withtheportablex-raysystem,wearechecking everydevicethatwillproceedtotheconvention arealikecameras,microphones,phones,suitcases, laptops,pens,andmore.

VIPSECURITY
76 COUNTER-IEDREPORT,Spring/Summer2024

“Therewereseveraloccasionswhenthesystem wasabletodetectammunition,andthiswasthe differencebetweenasuccessfuloperationora failurewhichcouldresultinlossofhumanlife.

“Itisimportanttohaveasystemwithalargeimaging areathatcanscananentirecaseorseveralobjects together;wecannotcompromiseonthesecuritybut mustdoafastandeffectivejobsoastonotdelayVIP delegations”.

Themainadvantageofx-rayfatpaneltechnology isthatyoucanhaveaveryquickscanofonly 6secondstocoverthe 60x46 cmimagingarea, whichcanbeacartrunkoralargesuitcase,a simplego-no-gosituation.Thisshouldbeenoughto decidewhetheryouhaveathreatorasuspicious object,butifneededyoucantakeasecondscanof aspecifcregionofinterestandthenseeitmuch betterandlarger,seeexampleinFigures1and 2below.

Anotheradvantageisthatyoudonotneedto compromiseonthepenetrationandimagingarea. Youcanstillgetadecentpenetrationevenonthick objects,usually,itwillbescanningfordeviceshidden inawall,seeexampleinFigures3and4.

Forobviousreasons,itisnotpossibletoshare muchinformationaboutthegovernmentandsecret serviceswhousethesystem,butseveralagencies areworkingwiththesystemandbeneftfromits advantages:portability,superiorimagequality,ease ofuse,andaverylargeimagingareawhichallows themtoscananentireroom,fromthephonetothe wallsinaveryshorttimeenablingthemeetingor conferencetotakeplaceonschedule.

ManyagenciesliketopairtheThreatScan®-LS1 withthesmallerLS3detector,whichcanbe backpackedorcarriedinasmallPelicaseonaplane, orinthebootofa4x4whentravellingcrosscountry. Thissystemisknownasthe"Combi".

VIPSECURITY 77 counteriedreport.com
Figure1:Aquickscanofalargesuitcase Figure2:Sub-regionscanofaspecifcROI

Morerecently3DX-Rayaddedanewsmallerfat paneltotheirfamilyofproducts,calledtheAS2.Only 43x35cmwithimprovedresolutionandthesame materialsdiscriminationcapability,thisnewpanelis smallenoughtoftintoconfnedareassuchasunder theseatsofcars,intoshelves,drawsandrecesses, wherethelargerpanelswillnotft.

3DX-RAYLTD,CEO,VincentDeerysaid: “VIPsare someofthemostwidelytravelledpeopleonthe planet.Constantlymovingtonewvenuesandnew accommodation,onbusinessandpleasure,creating massivechallengesfortheircloseprotectionteams. Wearealwayslisteningtoourcustomers,andthey

toldusthattheyneededthesearchcapabilityand portabilityprovidedbyourlargerx-rayfatpanelsbut neededsmallerpanelswithallthecapabilitiesoftheir largercounterparts,butsmallenoughtobeslippedinto spaceswherelargerpanelsjustwon’tft.So,thenew detectorpanelhasbeenspecifcallydesignedfor operatorsworkinginareaswhereaccessisvery restricted.WenowfeelthatourThreatScanfamilyof productscaterstothewidestrangeofoperational scenarios,whetherthat’sanEODtechnicianinspecting asuspiciouspackageoracloseprotectionteam clearingahotelroominadvanceofthearrivalof their‘Principal’” ■

VIPSECURITY 78 COUNTER-IEDREPORT,Spring/Summer2024
Figure3:Regularimage Figure4:Samedevicehiddenbehind25cmofconcrete

CR + DR

DUAL SYSTEMS Scanna dual radiography systems

One operating platform

Double the capability

CR + DR combined systems enable your team to respond quickly, with an optimised solution, for Counter-EO and CBRNE missions

X-ray Systems designed and built for bomb techs

www.scanna-msc.com info@scanna-msc.com

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.