Counter-IED Report Spring-Summer 2025

Page 1


ISSN2050-6732(Print)

ISSN2050-6740(Online)

UNDERSTANDINGANDTHREATALIGNMENTWITHINAC-IEDENTERPRISE

IEDCLASSIFICATION–BREAKINGDOWNBOMBATTACKS

AJOURNEYTHROUGHPIECESOFSPICEPIES WHATCOMPONENTSMAKEUPANIED–TECHNICALCOMPONENTCLASSIFICATION “OLD?”C-IEDFORA“NEW?”ALLIEDCONCEPT: THEC-IEDAPPROACHINTHELIGHTOFNATOWARFAREDEVELOPMENTIMPERATIVES

IMPROVINGUNDERWATERCAPABILITIES: THEIMPACTOFARTIFICIALINTELLIGENCEONIEDDETECTIONANDIDENTIFICATION

INFRASTRUCTUREANDCOMMERCIALPROJECTS: EOCLEARANCEANDRISKMANAGEMENT LANDMINEREMOVALINPOST-CONFLICTAZERBAIJAN 2024-2025THREATDYNAMICS: PROLIFERATIONOFONLINEINSTRUCTIONSPOTENTIALLYSUPPORTINGTERRORISTATTACKS

EDITORIALANDTECHNOLOGYPARTNERS

Counter-IEDReport PublishedbyDeltaBusinessMediaLimited 167-169GreatPortlandStreet,5th Floor London,W1W5PF UnitedKingdom

Tel:+44(0)2071932303 info@deltabusinessmedia.com www.counteriedreport.com

ISSN2050-6732(Print) ISSN2050-6740(Online)

Theopinionsandviewsexpressedintheeditorialcontentinthisreportare thoseoftheauthorsaloneanddonotnecessarilyrepresenttheviewsofany organisationwithwhichtheymaybeassociated.Materialinadvertisements andpromotionalfeaturesmaybeconsideredtorepresenttheviewsofthe advertisersandpromoters.Theviewsandopinionsexpressedinthisreport donotnecessarilyexpresstheviewsofthepublisher.Whileeverycarehas beentakeninthepreparationofthereport,thepublisherisnotresponsible forsuchopinionsandviewsorforanyinaccuraciesinthearticles.

©2025.Theentirecontentsofthispublicationareprotectedbycopyright. Fulldetailsareavailablefromthepublisher.Allrightsreserved.Nopartofthis publicationmaybereproduced,storedinaretrievalsystemortransmittedin anyformorbyanymeans,electronic,mechanicalphotocopying,recording orotherwise,withoutthepriorpermissionofthecopyrightowner.

CONTENTS

IFCSMARTRAYVISION

5ICORTECHNOLOGY/MED-ENG

7NATOEODDEMONSTRATIONSANDTRIALS2025

8SAFEPROGROUPINC.

8VIDISCOLTD.

9FOREWORD

ByRobHyde-Bales,ConsultingEditor,Counter-IEDReport

11TELEDYNEICM

16COUNTERINGEXPLOSIVETHREAT&DEMININGCONFERENCE

17UNDERSTANDINGANDTHREATALIGNMENTWITHINAC-IED ENTERPRISE

ByPaulAmoroso,anexplosivehazardsspecialist atAssessedMitigationOptions(AMO)consultancy

25IEDCLASSIFICATION–BREAKINGDOWNBOMBATTACKS

ByPaulAmoroso,anexplosivehazardsspecialist atAssessedMitigationOptions(AMO)consultancy

33AJOURNEYTHROUGHPIECESOFSPICEPIES WHATCOMPONENTSMAKEUPANIED-TECHNICALCOMPONENT CLASSIFICATION

ByPaulAmoroso,anexplosivehazardsspecialist atAssessedMitigationOptions(AMO)consultancy

CONTENTS

41FUTUREFORCESEXHIBITION&FORUM2026

42EOD/ IED&COUNTERMINESYMPOSIUM

43“OLD?”C-IEDFORA“NEW?”ALLIEDCONCEPT:THEC-IED APPROACHINTHELIGHTOFNATOWARFAREDEVELOPMENT IMPERATIVES

ByLieutenantColonelJoseMRufas,ChiefofAttacktheNetworksBranch, C-IEDCentreofExcellence

51IMPROVINGUNDERWATERCAPABILITIES:THEIMPACTOF ARTIFICIALINTELLIGENCEONIEDDETECTIONANDIDENTIFICATION

ByMuratAydoğmuş,LieutenantCommander(OF-3)TUR-N, ElectronicWarfareSpecialist,C-IEDCentreofExcellence

57INFRASTRUCTUREANDCOMMERCIALPROJECTS: EOCLEARANCEANDRISKMANAGEMENT

ByDrRobertKeeley,RKConsulting(EOD)Ltd

72DEFENSE&SECURITYASIA2025

73LANDMINEREMOVALINPOST-CONFLICTAZERBAIJAN

ByWilderAlejandroSánchez,President,SecondFloorStrategies

792024-2025THREATDYNAMICS:PROLIFERATIONOFONLINE INSTRUCTIONSPOTENTIALLYSUPPORTINGTERRORISTATTACKS

ByLieutenantColonelJoseMRufas,ChiefofAttacktheNetworksBranch, C-IEDCentreofExcellence

87MILIPOLPARIS2025

OBCSCANNAMSCLTD

FOREWORD

Aswecommemoratethe80thAnniversaryofthe endoftheSecondWorldWarinEuropeon8th May 2025,thebloodiestandthelargestwarintheworld’s recenthistory,confictcontinuesinmanyareasofthe world.InEuropewarhasreturnedafterRussia’s invasionofUkraineinFebruary2022.IntheMiddle East,IsraelremainsmiredinGazainitseffortsto defeatHamasafteritsattacksonIsraelinOctober 2023.Mostrecently,tensionshavefaredupagain betweenIndiaandPakistan–twonucleararmed nations–afterthedeathsofIndiantouristsatthe handsofsuspectedPakistanbasedmilitantsinthe disputedterritoryofKashmirinAprilthisyear.

EUROPE

Russia-Ukraineconfict

Oneofthemajorsourcesofconfictintheworldtoday remainsthebitterwarbetweenRussiaandUkraine.The initialconfictwhicherupted11yearsagoinDonbas regionwassparkedbyapoliticalunrestinUkraineand Russia'sannexationofCrimeaduringthepower vacuumintheweeksaftertheEuromaidanRevolution inMarch2014.Afterafull-scaleRussianinvasionin February2022,itremainsoneofthemostcomplexand defningissuesinworldpoliticstoday.Aftermorethan threeyearsofhostilities,Russianowoccupiessome 20%ofUkrainianterritoryincludingCrimea.

Asaresultofheavyfghting30%oftheUkrainian territoryispotentiallycontaminatedwithlandmines, unexplodedordnance(UXO),andimprovised explosivedevices(IEDs).Themostaffectedregions includeKharkiv,Kherson,Donetsk,Luhansk, Zaporizhzhia,andMykolaivregions.NGOslikeHALO Trust,MAG,andFSDareconductingclearance operationsinsaferareas.USA,EU,Japan,Canada, andotherinternationaldonorshaveprovidedfunding, equipment,andtraining;mineriskeducationisbeing rolledoutinschoolsandruralcommunities.Modern technologies,suchasdronesandremote-sensingare beingusedtomapminefeldsalongwithground-based roboticdeminingsystemsandmetaldetectors;AIassistedtoolsareusedtoimprovedetectionspeedand accuracyinclearanceoperations.IntheKurskregion ofRussia,whichbordersUkraine,deminingandUXO disposaloperationsarealsounderwayfollowingheavy fghtingduringUkraine’snine-monthsincursion.

SincethestartofRussia'sfull-scaleinvasionof Ukraine,therehavebeenanumberofhigh-profle assassinationsinRussiausingimprovisedexplosive devices.Thelatestincidentoccurredon25th April,when LieutenantGeneralYaroslavMoskalik,asenior Russianmilitaryoffcer,waskilledinasuburbeastof Moscowwhenanimprovisedexplosivedeviceflled withshrapnelwasconcealedinacarparkednearhis homeanddetonatedashewalkedpast.Thisattackis verysimilartotheonethattookplaceinDecember 2024inwhichLt.Gen.IgorKirillov,whoservedasthe commanderoftheRussianRadiological,Chemical,and BiologicalDefence,waskilledbyanexplosivedevice hiddeninsideanelectricscooter,whichwasleftnextto theentranceofthebuildingwhereLt.Gen.Kirillovlived.

Inanothernotableoperation,abatchofFPV(FirstPersonView)dronegogglessenttoRussianmilitary unitswereriggedwithexplosivesanddeliveredaspart of‘humanitarianaid’.Russianmilitarypersonnelnoticed signsoftamperingwiththepackages,leadingtoafurther inspectionandthediscoveryofconcealedexplosives. Eachdevicecontainedabout10-15gramsofexplosives, enoughtokillorseriouslyinjureaperson.

Severalroundsofindirectpeacetalksinitiatedbythe newlyelectedUSgovernment,sofarhavenot producedanytangibleresultsduetotheirreconcilable positionsofthewarringparties.Atthetimeofwriting, Kyivandwesternleaderscalledfora30-daypausein fghting.On11th May,Moscowproposedtoresume directnegotiationswithKyiv,whichwereinterrupted inApril2022.Itremainstobeseenwhetherthetalks (iftheytakeplace)willbeabletobridgethedifferences betweenthetwosidesandleadtoade-escalationof theconfict.

Ireland

Explosive-ladendroneshaveemergedasasignifcant securityconcerninIreland1,particularlyinthecontextof organisedcrimeandprisonsmuggling.Inthelatest development,Gardaíarecurrentlyinvestigatingwhat appearstobeanattempttodropapipebombfroma droneonahouseinnorthDublin.Thewreckageofthe droneandanintactpipebombwerefoundinthegarden ofahouseinGlentiesPark,Finglas,lateon4th May 2025afteritappearedtohavecrashedatthewrong address.Authoritiesareconcernedthatthegangland feudlinkedtotheincidentwillnowescalatesharply. Thesedevelopmentsrefectabroadertrendwhere criminalorganizationsareleveragingdronetechnology tocarryouttargetedattacksusingexplosives.

MIDDLEEAST

Israel–GazaConfict

IntheMiddleEast,IsraelremainsmiredinGazainits effortstoreleasetheremaininghostagesanddefeat

HamasafteritsattacksonIsraelinOctober2023.There areconfictingreportsofthenumberofhostagesinthe Hamascaptivity.Accordingtothelateststatementof IsraeliPrimeMinisterBenjaminNetanyahutherewas "uncertainty"overtheconditionofthreeofthe24 hostagespreviouslybelievedtobealive2.Amid continuationoftheongoinghostilitiesintheGazaStrip thereisagrowingconcernoverthehumanitarian situationandthepresenceofunexplodedordnance (UXO)whichposesaseriousthreattociviliansand humanitarianaideffortsfollowingintensemilitary operationsandbombardments.Inaddition,Gazalacks suffcientmineclearanceteams,accesstomodern deminingtechnologyandequipment,andtheongoing confictmakesitdiffculttoconductsurveysand explosivesclearanceoperations.

Yemencrisis

SinceIsraellaunchedamilitaryoffensiveagainstHamas intheGazaStripfollowingthePalestinianmilitant group’sdeadlyattackonIsraelon7th October2023,the Iran-backedHouthisinYemenhavesteppeduptheir militaryactions,particularlytargetingshippingintheRed SeaandIsraelimainland.

InanattempttokeepthevitalRedSeatraderoute open,theUnitedStatesandBritainhaverespondedwith airstrikesagainstHouthitargets,whileothercountries independentlypatrolthewatersnearYemen.TheIsraeli militaryhascarriedoutseveralairstrikesagainstHouthi weaponsfacilities, commandandcontrolcentres,and criticalinstallations,includingtheportofHodeidaand Yemen’smainairportinSanaa.On6th May2025,a ceasefreagreementbetweentheUnitedStatesandthe Houthiscameintoeffect,endingtheUSandUK airstrikes.TheHouthisagreedtostoptheirattackson shippingintheRedSea,howevertheystressedthatthe ceasefredoesnotapplytoIsrael“inanyway,shapeor form.”ItremainstobeseenwhethertheUS-Houthi ceasefrewillholdorwhetherIsraelcanforcethe Houthistostoptheirattacksthroughsustainedmilitary anddiplomaticefforts.

1 https://www.irishtimes.com/crime-law/2025/05/07/drone-pipe-bomb-incident-raises-concerns-of-serious-feud-escalation/ 2 https://www.bbc.co.uk/news/articles/c8d1pngdjzmo

Turkey

On1st May2025,theKurdistanWorkers'Party(PKK) declaredaceasefreafter40yearsofconfictwith Turkeythathavekilledtensofthousandsofpeople. ThePKK,whichisdesignatedaterroristgroupbythe UnitedStates,theEuropeanUnionandTurkey,called onAnkaratoreleaseitsleaderAbdullahOcalan,who hasbeenjailedsince1999.On12th May2025,ina historicmove,thePKKannouncedits plantodisbandanddisarm,potentially endingfourdecadesofconfictwith Turkey.Thelastsignifcantattack attributedtothePKKoccurredon23rd October2024,whentheytargetedthe TurkishAerospaceIndustries(TAI) headquartersnearAnkara.Theattack leftfvepeopledeadand22wounded.

Post-AssadSyria

Syriaiscurrentlydividedamong severalarmedgroupsandregional powers.HayatTahriral-Sham(HTS) controlsmuchofthewesternand centralpartsofthecountry,including Damascus,andhasinitiatedeffortsto unifyarmedfactionsunderanational defenceframework.TheSyrian DemocraticForces(SDF),aKurdishledalliance,maintainscontrolover north-easternSyriabuthasfaced pressurefromTurkish-backedSyrian NationalArmy(SNA)forces,leadingto ongoingclashesinareaslikeTalRifaat andManbij.TheIslamicState(ISIS) hasexploitedthepowervacuum carryingoutaround700attacksin 2024.ISIShasalsoattemptedtoincite sectarianviolence,includingplansto targetShiaholysites,whichwere thwartedbyHTSforces.Aseriesof masskillingsandmassacresagainst AlawitesoccurredinSyriafrom

6th to17th March2025,witharesurgenceinearlyApril. Overseveraldaysofthesustainedattacksinthe coastalareaofthecountryinTartus,Latakiaand Hamagovernorates,armedgroupskilledentire families,includingwomenandchildren3.TheUN HighCommissionerforHumanRights(OHCR) spokespersonThameenAl-Kheetansaidtheagency haddocumentedatleast111killings,thoughthetrue

3 https://edition.cnn.com/2025/03/12/middleeast/syria-sectarian-violence-un-ohcr-intl-hnk/index.html Go-Scan C-View

REAL-TIME X-RAY INSPECTION

→ Up and running in less than 90 seconds

→ Lightweight (less than 6.5 kg/14 lbs)

→ Wireless or cable driven

→ High quality imaging

→ Radiation shielding

→ Telescopic arm (up to 65 cm/26 in)

numberisbelievedtobefarhigher.Accordingtoawar monitor,thebloodshedsawmorethan800people killedinclashesbetweenarmedgroupsloyaltoBashar al-AssadandforcesloyaltothenewSyrianregime.

MineclearanceinSyriaremainsacriticaland urgenthumanitarianchallengein2025,asthecountry continuestograpplewiththelegacyofits14-yearcivil war.Internationalorganizations,includingTheHALO TrustandUNMAS,haveintensifedtheireffortsto addressthecontamination.UNMAShassurveyedover 83millionsq.mandremoved1,102explosive ordnanceitemsbetweenAugust2023andJanuary 2025,focusingonhigh-priorityareassuchasRural Damascus,Aleppo,andLatakia.Despitethese efforts,challengespersist,includinglimitedfunding, bureaucraticobstacles,andthevastscaleof contamination.TheSyrianNetworkforHumanRights (SNHR)hasdocumentedatleast3,521civiliandeaths duetolandmineexplosionssince2011.

SOUTHASIA

India–PakistanConfictinKashmir

TheIndia–PakistanconfictinKashmirisoneof thelongest-runningterritorialdisputesinmodern history,rootedinthepartitionofBritishIndiain 1947.Indian-administeredKashmirhasseena decades-longinsurgencywhichhasclaimed thousandsoflives.

InlateApril2025,tensionsbetweenIndiaand Pakistanescalateddramaticallyfollowingamilitant attackinIndian-administeredKashmirthatkilled28 civilians,mostlyHindutourists.Indiaattributedthe attacktoPakistan-basedmilitants,whichPakistan denies,andrespondedwithmissilestrikesagainst militantgroupsitclaimsarebackedbyPakistan.In response,Pakistanfredmultiplemissilesand launchedover50dronestowardsJammuand Kashmir,PunjabandRajasthan.TheUnitedStatesled effortstode-escalatetheconfict,resultinginIndiaand Pakistantoagreetoaceasefre,buttheriskoffurther escalationremainshigh,asthecountrieshave accusedeachotherofviolationsshortlyafterthe agreementcameintoforce.

JaffarExpressattackinPakistan

On11th March2025,theBalochistanLiberationArmy (BLA)attackedtheJaffarExpress,aPakistani passengertraintravelingthroughtheBolanPassin Balochistan,takingaround440passengershostage, includingasignifcantnumberofwomenandchildren. Theattackers,whowerereportedlyintouchwiththeir foreignhandlersinAfghanistanviasatellitephone, detonatedexplosivesintunnelsandonthetrain tracksbeforeopeningfreonthetrain,haltingitina mountainousareadiffcultforauthoritiestoreach.The terroristorganizationhadissueda48-hourultimatumto releasetheBalochpoliticalprisoners,threateningto executethehostages,althoughtheyhadalready releasedsomeofthem.Within30hours,securityforces killedall33militants,includingthesuicidebombers,and rescued354hostages.Theoperationleftatleast64 peopledead,including18soldiersand33attackers,and wounded38.TheBLAclaimedtohavekilled50security personneland214hostages,althoughthosefgures weredisputedbyPakistanioffcials.Thehijackingtook placeagainstthebackdropofalmostdailyIEDandgun attacksonthesecuritypersonnelandciviliansin BalochistanandKhyberPakhtunkhwaprovinces.

AFRICA

Sahel&LakeChadbasin

TheSahelcontinuestobeahotspotforextremist activity,accountingforoverhalfofallmilitantIslamist incidentsonthecontinent.GroupslikeJama’atNusrat al-Islamwal-Muslimin(JNIM)andtheIslamicStatein theGreaterSahara(ISGS)haveintensifedattacks, leadingtonearly11,000fatalitiesin2024alone.Since 2010,over1,600IED-relatedincidentshavebeen recordedacrosstheregion,resultinginatleast6,680 deathsandmorethan9,000injuries.Thesedevices havebeenusedtotargetsecurityforces,UN peacekeepers,andcivilians,particularlyincountries likeMali,BurkinaFaso,andNiger.Theproliferationof IEDshasalsoledtoenvironmentalcontaminationand signifcanteconomiclosses,impedingdevelopment effortsanddisplacingmillions.Inadequateborder controlsandregulatoryframeworksallowforthe

uncheckedmovementofIEDcomponentsandthe establishmentofmanufacturingnetworks.IntheLake Chadbasinwomenplayasignifcantroleintraffcking importantcomponentsandbomb-makingmaterials throughcheckpointsandacrossbordersbecausethey arerarelysubjectedtobodysearches4.TheBoko Haram,typicallyknownforitsconservativeviewson women’ssocialstatus,haspermittedwomengreater mobilitybecausetheyareawarewomenareusually abovesuspicionwithlawenforcementauthorities. WomenoftenconcealIEDcomponentsinvarious ways,suchasstrappingthemtotheirbacksdisguised as‘babies’,hidingtheminfour-litrebottlesor concealingcomponentsunderpillows.Oncepast checkpoints,womeneitherdeliverthecomponents directlytoremoteBokoHaramhideoutsordropthe productsoffatpre-designatedlocations,inthebushor onfarms,creatingadditionalchallengesforlaw enforcementandcounterterrorismeffortsintheregion.

Nigeria

In2024,Nigeriaexperienced197attacksfrom improvedexplosivedevices(IEDs)–anaverageof nearlyoneIEDattackeverytwodays. On8th May,an IEDexplosioninMafaLocalGovernmentAreaof BornoState,leftfvechildreninjured,oneofwhomlost ahand.Theexplosionoccurredwhenthechildren unknowinglytamperedwithanIEDdevice.On28th Aprilatleast26people,includingwomenandchildren, werekilledwhenvehiclesdetonatedbyIEDsplantedin Nigeria’snorth-easternBornoState.Thevictimswere travellinginvehiclesalongtheroadfromRannto GamboruNgala,whereBokoHaramterroristsplanted anumberofexplosivedevices.Inadditiontothe26 fatalities,threepeoplesustainedseriousinjuries.

TheNigerianNationalSecurityAdviser(NSA), MallamNuhuRibadu,hascalledfordevelopmentof effectivemechanisms5 toenhancetheabilitytoprevent andcountertheuseofIEDsbyterroristgroupsinWest Africa.Ribadusaidthatthethreatofterrorismknows

nobounds,addingthatitwasthroughcollaborative effortsbycriticalstakeholdersthattheycould effectivelyconfrontanddefeatthemenace.

On25th MarchCamerooniantroopsstationedin Wulgo,Nigeria,havebeenkilledinthejihadists’attack. AccordingtoAFP,theattackersusedrocket-propelled grenadesand‘armeddrones’toinfictheavycasualties. Theattack,oneoftheregion'sdeadliestincidentsin recentmonths,comesasarmedgroupsinwest Africapivottowardstheuseofcheap,recreational dronesmodifedintoone-way,explosives-ladenattack vehicles.ArmedgroupsinNigeriaandtheSahelhave longuseddronesforsurveillanceandflming propaganda,however,ashiftisunderwayasjihadists andseparatistsoutftthemforattacks.Jihadistgroups inMaliandBurkinaFasohaveclaimedtousedrones equippedtodropgrenadesfromabove,aswellas explosive-laden‘suicidedrones’thatcrashintotargets6

DEMININGEFFORTS

BosniaandHerzegovina

Accordingtotherecentreports,theArmedForcesof BosniaandHerzegovina(BiH)cleared903,326square metersoflandin2024aspartofongoingdemining efforts7.Intotal,over14.7millionsquaremetersofland werereturnedtocivilianuse,contributingtothe developmentandsafetyoflocalcommunities.Despite operationalchallenges,theArmedForcessuccessfully implemented61.28percentofthenationalmine actionplan.Deminingactivitiestookplaceacross18 municipalities,including13intheFederationofBiH and5inRepublikaSrpska.

Vietnam

MarkinganotherstepintheUSandVietnam’s decades-longefforttohealthescarsofwar,anew trainingrangeforexplosiveordnancedisposal(EOD) hasrecentlybeeninauguratedinHanoi’soutlying districtofBaVi.ThefacilitywasfundedbytheOffceof

4 https://enactafrica.org/enact-observer/under-the-radar-women-traffc-ied-parts-to-boko-haram

5 https://nannews.ng/2025/05/06/nsa-seeks-effective-mechanism-to-tackle-ieds-usage-by-terrorists/

6 https://www.msn.com/en-us/news/world/nigeria-sahel-militants-embrace-diy-drone-warfare/ar-AA1BLzq6

7 https://english.news.cn/europe/20250424/e84b9d702e2f414fbd81ec940c36992e/c.html

DefenceCooperation(ODC)undertheUSEmbassyin VietnamanddeliveredtotheVietnamNationalMine ActionCentre(VNMAC),aspartofVietnam’sNational MineActionProgrammeforthe2010–2025period, whichseekstoaddressthedeadlylegacyof unexplodedbombsandminesleftfromthewar.The two-hectarerangebrokegroundinJuly2024, supportedbyagrantofover700,000USDfromtheUS Government8

Cambodia

AccordingtoareportfromtheCambodianMineAction andVictimAssistanceAuthority(CMAA)releasedat theendofApril2025thenumberofpeopleinjuredor killedbylandminesdroppedby26%inthefrstfour monthsofthisyear9.Inanotherpositivedevelopment, on29th ApriltheKohKong’sBotumSakordistrict wasoffciallydeclaredmine-free10,beneftingabout 100,000residents,throughgrantaidfromtheIndian government.LyThuch,frstvicepresidentofthe CambodianMineActionandVictimAssistance Authority,expressedappreciationforIndia’ssupportin helpingthegovernmentaddressthedangersposedby landminesandexplosiveremnantsofwar.However,it wasalsoreportedthatnearlyhalfofallmineaccidents inCambodiaoverthepastdecadehaveoccurred outsideofoffciallyidentifedminefelds-analarming indicatorthatvastareasremainunsurveyed.

INTHISEDITION

Inhiscomprehensivepaper“Infrastructureand commercialprojects:EOclearanceandrisk management,”DrRobertKeeleyofRKConsulting (EOD)Ltdoutlinesthedifferencesbetween humanitarianandcommercialperspectivesofmine actionandhowtheyinfuencetheattitudetoEO clearanceincommercialprojectsandinfrastructure.He beginsbydescribingtheUNguidingprinciplesof Neutrality,Humanity,Impartiality,andIndependence. Underthe1997APMBCand2008CCMconventions

thereisarequirementforhumanitarianmineactionto clearallEOcontaminationwithinaprescribedarea, whereasincommercialprojectstherequirementisto clearEOspecifcallyrelevanttotheprojectinhand.He providesaformaldefnitionofrisk,attitudestoriskand potentialconsequences–physicalrisk,projectriskand reputationalrisk.IncommercialmineactionEO clearanceisseenasanenablertoallowthewidergoals oftheprojecttobeachieved.Hedescribestheoverall riskmanagementprocessandprovidesadetailed tableonrecommendedriskmanagement/treatment approachesfortheclearanceofcommercialproject sites.HeprovidesamostusefulSPRtabletoassistin theidentifcationofanappropriatemineaction intervention–‘S’beingtheSourceofthepotential hazard,‘P’isthePathway-theroutetothepotential hazardand‘R’istheReceptor–forexampleapersonor abuildingbenefttingfromtheclearance.Healso identifespossibleresponsestothehazard.

InhistechnicallydetailedarticleLieutenant CommanderMurat Aydogmus oftheTurkishNavyand basedattheNATOC-IEDCentreofExcellence, examinestheimpactofAIonunderwaterdetectionand identifcationofIEDsonorburiedintheseabed.He pointsoutthattheincreasingrelianceonnavaland offshoreassetsfortrade,energyproductionand defencemeansthattheunderwaterthreathasbecome acriticalconcernforglobalsecurity.HedescribeshowAI hasrevolutionisedunderwaterthreatdetection.He outlinestechnicalapproachestothreatdetectionsuch assonarscanning,magneticanomalydetection,diver inspectionandROVs.Hedescribestheoperationsof twosonarsystems,theSideScanSonar(SSS)and SyntheticApertureSonar(SAS).Bothsystemsproduce detailedimageryoftheunderwaterenvironment.The SSSisatowedsystemandemitssoundwaveswhich interactwiththeseafoorandobjectsonitorburiedinit, producinganacousticrefection.TheSASismounted onaUUVandmonitorsandrecordsbackscattered signalsfromtheseabed.Itproducesafnerresolution thantheSSSsystem.Magneticanomalydetectionuses

8 https://vietnamnet.vn/en/vn-us-boost-ties-with-new-uxo-disposal-training-site-launch-2398876.html

9 https://www.khmertimeskh.com/501675501/cmaa-reports-26-drop-in-mine-blast-victims-in-frst-quarter-of-year/

10 https://www.khmertimeskh.com/501674937/botum-sakor-district-in-koh-kong-to-be-declared-mine-free

asensitivemagnetometertodetectdisturbancesin theEarth’smagneticfeld.Forunderwaterdetection purposesitmaybeattachedtoships,UUVsoraircraft. TheintegrationofArtifcialIntelligenceintounderwater detectionsystemsenhancessituationalawareness, effciency,anddecision-makingcapabilities.

InawidelyresearchedarticleLtColJoseMRufasof theNATOC-IEDCentreofExcellencestatesthat despiteintenseeffortsbynationalandinternational authorities,theinternetremainsthemostprolifc sourceoftechnicalknowledgefortheplanningand preparationofterroristattacksduringthiscenturyto date.Itprovidesextensiveonlinedisseminationof manuals,videos,andinstructionsonthemanufactureof HMEandIEDs.Jihadistsandotherterroristsand extremistscansourceawealthofcontentdescribingthe planningofattacks,acquiringprecursorsand components,themanufactureofexplosivesandthe constructionofdevices.ThecurrentconfictinUkraine haswitnessedasignifcantuptickinthistypeofonline informationprovidedbysupportersofbothsidesofthe confict.TodatethisyearthemediaoffcesofDAESH/ ISIShaveportrayedanincreasingnumberof explosivesrelatedthreatsintheirpropagandaposters. Aworryingtrendduring2024and2025hasbeenthe increasingdiversityandlocationsofsourcesinaddition tothetraditionalArabicandEnglishlanguages information.Itisnowpossibletofndinformationin theBrazilian,German,Italian,Russian,Spanish,and Turkishlanguages.Afurtherconcernhasbeenthe reappearanceofhithertodormantsourcesofterrorist informationincluding,interalia,theDAESHrelated “AlSaqriFoundationforMilitaryScience”thatisonce againproducingawealthofterroristrelatedinformation. Itisassessedthattheongoingconfictcampaignin Ukrainewillcontinuetobeavaluablesourceof referenceforIEDmanufactureanddeployment.

InhisinformativearticleWilderAlejandroSanchez,an internationaldefenceandsecurityanalyst,reviewsthe currentstateoflandmineremovalinpost-confict Azerbaijan.TheAzerbaijanigovernmentiscurrently undertakingextensiveclearanceoflandmines,UXOand otherERWresultingfromthe2020and2023conficts betweenArmeniaandAzerbaijaninordertoreturnthe

contaminatedterritoriestocivilianandcommercialuse. ThecontaminationcomprisesbothAPandAV landminesandotherUXOandERW.TheMineAction AgencyoftheRepublicofAzerbaijanistaskedwiththe extensiveclearanceoperationsandhasmadegood progresstodate,butmuchmoreneedstobedone. Civiliansreturningtotheterritoryremaininperiland from2020to31st December2024therewere229 landmineexplosionsinKarabakhresultingin382 victimsand70fatalities.Azerbaijanwillrequire continuinginternationalassistancetodecontaminate Karabakhterritory.TodatetheUS,UK,EU,Canada, Japan,Turkey,UNHCR,UNDPandICRChaveprovided assistanceandGICHDhasprovidedsubstantial technicalassistanceincludingIMSMA.Apositive developmenthasbeentheinvolvementoffemale deminingteamsintheclearanceactivities.The decontaminationoftheKarabakhregionwillremaina long-termproject.■

RobHyde-Balesbiography

DuringhiscareerintheUKRoyal Engineers, RobHyde-Bales was responsibleforlandmineclearance inLibyaand,morelatterly, Afghanistanintherunningofthe frstUnitedNationshumanitarian landmineclearancetraining programme–OperationSalam. TheprogrammetrainedAfghanmalerefugeesin landmineclearancetechniques,andAfghanwomen andchildreninmineawarenessandavoidance training.MorerecentlyhesetuptheCaribbean SearchCentreinKingston,Jamaica.TheCentreis designedtotrainsecurityforcesacrosstheCaribbean inmodernsearchtechniques.Afterretiringfromthe armyhejoinedCranfeldUniversityatShrivenham, nearOxford,andundertookaresearchprojecton behalfoftheUKMinistryofDefencethatexamined waystoimprovethesharingofIEDthreatinformation betweenthemilitaryandcivilianorganisationsin hazardousareas.

The ONLY conference bringing together military, humanitarian groups, and industry leaders to discuss and improve operations in EOD and demining

23 - 24 September, 2025

Copthorne Tara Hotel, London, UK

Advancing EOD and C-IED Capabilities: Cooperation, Innovation, and Capacity Building

“The different perspectives across Military and NGOs were stimulating and good to see new industrial developments”

Senior Researcher, DSTL

Leading speakers from across the EOD and Demining Sector:

Colonel Darren Fisher, Commander, 29 EOD & Search Regiment

Stephen Ingram, Global Technical Advisor HMA, Mine Advisory Group

Brigadier General Jihad Al Bechelany, Director, Lebanese Mine Action Centre (LMAC)

Major Mark Fetters, Counter-Explosive Ordnance, Army Futures Directorate

View the agenda here

Georgina Darlow, Advisor in the Research and Innovation Programme, Geneva International Centre for Humanitarian Demining (GICHD)

UNDERSTANDINGANDTHREATALIGNMENT WITHINAC-IEDENTERPRISE

ByPaulAmoroso,anexplosivehazardsspecialistatAssessedMitigationOptions(AMO)consultancy.

INTRODUCTION

InpreviousarticlespublishedinTheCounter-IED Report,theauthorhasadvocatedforawhole-ofsocietyapproach1 tocounteringtheuse orthreatened use ofIEDsthroughanationalCounter-IED (C-IED)enterprise.2 Suchapproachesnecessitatea coordinatedeffortamongstakeholderswithcomplex institutionalstructures,requiringinternalcoherence andcollaborationtoensureeffectiveC-IED strategies.Aclearandsharedunderstandingofthe IEDthreatisessentialtoeffectivelycoordinate C-IEDefforts,3 alignthemwiththespecifcthreat,

andoptimiseresourcesforbothrespondingtoand preventingtheiruse.Tobeeffective,anynational C-IEDenterprisemustfrstfullyunderstandthe problemitaimstocounter.Thisbeginswith recognizingthecurrentIEDthreatandanticipating potentialfuturethreats.Thisunderstandingofthe threatwillguidethestructureandcompositionofa C-IEDenterprise,requiringacarefulandstrategic selectionofstakeholderstoensureitseffectiveness. Itwillalsoinfuencetheenterprise’sstrategicgoal alongwiththeC-IEDeffortsinvestedinandtheir

1Awhole-of-societyapproachtoC-IEDisacomprehensiveapproachtoC-IEDinvolvingabroadarrayofstakeholders contributingtoaC-IEDenterprise.Itcanincludemultipleelementsofstatesecurity,defence,governmentdepartments, ministries,offces,andagenciesalongwithcivilsocietyorganisations,commercialandindustryentitiesaswellas internationalandregionalorganizations.Whole-of-societyC-IEDapproachesoftenhavestakeholderswithcomplex institutionalstructuresandproceduresrequiringinternalcoherence,acooperativeandcollaborativeculturebetween memberstosupporteffectiveC-IEDeffortsthroughasharedunderstandingoftheIEDthreatfaced.Source: Managinga C-IEDEnterprise,TheCounter-IEDReport,Winter2024/25.

2AC-IEDenterprisereferstothecollectiveeffortsaimedatcounteringIEDthreats.Itcaninvolveanythingwhichisintended topredict,discoverordetect,prevent,protectagainst,respondtoorneutralise,recoverfromorexploit,mitigateagainst,or deterIEDattacks.

3C-IEDeffortsmayberesponsive,preventativeorcross-cuttinginnature.Sucheffortsinclude,interalia,legalinstruments, training,mentoring,advice,operationalandtacticalortechnicalassistance,technologyandequipmentprovision,intelligence activities,investigationsandactionsagainstanIEDsystem,interagencyandinternationalcooperation,controlofexplosives andotherIEDcomponentsaswellasanyotherinvestmentmadetorespondtoandultimatelypreventIEDuse.Source: ManagingaC-IEDEnterprise,TheCounter-IEDReport,Winter2024/25.

objectives.Keyentitiescentraltounderstandingina C-IEDenterprisecanincludethenationalleadentity forC-IED,theOffceoftheNationalSecurityAdvisor, andvarioussecurityservices.4 Theimportanceofa designatedleadentity5 haspreviously6 been emphasized.Itisimportanttoremembernoonesize-fts-allandthebestfttoleadanynationalC-IED enterprisewillinvolveconsiderationofthecontext, limitationsimposed,andimportantlythethreat.7 The leadentitymustmonitorandadaptC-IEDeffortsto theevolvingthreatlandscape.

Understandingisacriticalcross-cuttingelement withinanyC-IEDenterpriseandonewhichhastwo aspectstoit.Oneisunderstandingthethreatand secondisunderstandingtheeffectivenessofthe C-IEDeffortsinvestedin.Thisarticlewillexplorethe conceptofunderstandingwithinaC-IEDenterprise andtheimportanceofaligningC-IEDeffortswiththe threat.Wewillbeginbyexaminingthesignifcanceof understandingwithinaC-IEDenterprise,highlighting itscriticalroleintheenterprise'ssuccessandthe potentialrisksthatarisefromitsabsence.Wewill thenexaminetheneedforandabilitytoachieve initialandsustainedunderstandingwithinthe enterprise.TheimportanceofaC-IEDenterprise remainingthreatalignedisshownbyexaminingits importancewhenpersonnelneedtooperateina highthreatIEDenvironment.Theevolutionofthe IEDthreathasanimpactacrossallelementsofthe enterprise,whichwillbeillustratedbyexaminingits importanceregardingIEDcomponentcontroland C-IEDbordercontrols.Thisisthefrstinaseriesof

articlesexamininghowtodevelopandsustain anaccurateIEDthreatpicturetooptimize understandingandensuretheC-IEDeffortsinvested inremaineffectiveasthreatsevolve.

UNDERSTANDINGWITHINAC-IEDENTERPRISE

ApreviousarticleinTheCounterIEDReport statedthat‘beforeyoucounteraproblem,youneed toknowtheproblem.’InthecaseofC-IEDthisrefers tounderstandingtheuseorthreateneduseof IEDs,sothatintimeeffectiveandeffcientC-IED effortsmaybeinvestedinaspartofaC-IED enterprisetoatleastmatchbutideallyovermatchthe IEDthreat.’8

Oneoftheffteenpreviously9 proposedelements toformthebasisforanynationalC-IEDenterprise, wasunderstanding.SecuritycentricC-IED frameworksoftenhaveunderstandingasthe foundationuponwhichthelinesofeffortofattackthe network,defeatthedevice,andtraintheforceare builtupon.10 Assuch,understandingwithinaC-IED enterpriseiscriticaltoeffectivelyrespondingto andultimatelypreventingIEDuse.Itcanbea challengingelementofanenterprisetogetright,as itinvolvesmorethanjusthavinginsightful comprehensionoftheIEDthreat.Italsorequiresa thoroughgraspofallelementsoftheenterpriseto evaluatetheeffectivenessofalleffortsinvestedin andtheoverallimpactoncounteringtheIEDthreat. Infact,“thekeyfundamentalC-IEDenablingaction of‘understanding’boththeproblemandtheC-IED effortsinvestedin,isdeemedessential.’11

4Source: BuildingtheC-IEDEnterprisetoCountertheIEDSystem,TheCounter-IEDReport,Winter2023/24.

5Inapreviousarticleofthispublication,ColonelHRNaiduGade,spokeoftheneedtodesignatewhatiscalledanodal agency,“tocoordinateandtrackprogressacrossalltheagenciesatnational,state,andlocallevelstowardbuildingtheC-IED capabilities.Itshouldfacilitateharnessingtheinnovativepotentialoftheresearchanddevelopmentorganizationstomeeta dynamic,complex,andadaptivethreatandtopromoteaninformedandagileresearchandacquisitionsprocessthatstays aheadofthethreatanddevelopstimelyandeffectiveC-IEDsystemsandsolutions.”Source: India–TheNationalCounterIEDStrategy,TheCounter-IEDReport,Winter2023/2024,byColonelHRNaiduGade(Retd),pp.40.

6 NecessityofaDesignatedLeadEntitywithinNationalC-IEDEnterprises,TheCounter-IEDReport,Spring/Summer2024.

7 NecessityofaDesignatedLeadEntitywithinNationalC-IEDEnterprises,TheCounter-IEDReport,Spring/Summer2024.

8 UnderstandingandMaximisingC-IEDInformationSharing,TheCounter-IEDReport,Autumn2023.

9 BuildingtheC-IEDEnterprisetoCountertheIEDSystem,TheCounter-IEDReport,Winter2023/24.

10Thesethreelinesofeffortarecapturedwithintheffteenelements,outlinedin BuildingtheC-IEDEnterprisetoCounterthe IEDSystem,TheCounter-IEDReport,Winter2023/24.

11 AStrategicPrinciplesApproachtoRegionalC-IEDEnterprises,TheCounterIEDReport,Spring/Summer2023.

‘Thecriticalityofunderstandinginsupportofany coherentC-IEDenterpriseisbothcross-cutting andmulti-dimensional,referringtotheneedto comprehendinteralia:

•WhyandhowIEDsareused;

•Useofappropriateterminology;

•WhatanationalC-IEDenterpriseentails;

•MaintaininganaccurateIEDthreatpicturefor effectiveC-IEDdecisionmaking;

•Roleandimportanceofexploitationinmaintaining anaccurateIEDthreatpicture;

•TimelyinformationsharingbetweenC-IED stakeholders;

•AppropriateclassifcationofC-IEDinformation.’12

Itrequiresbothaninitialassessmentofthethreat andabaselineassessmentofexistingC-IED elementswhichcanthenbeusedtoinformthe designanddevelopmentofaC-IEDenterprise.It subsequentlyrequireson-goingthreatassessment toensuretheC-IEDeffortsinvestedinremainthreat alignedalongwithanembeddedmonitoring, evaluation,andlearning(MEL)13 processtoinform anunderstandingoftheeffectivenessoftheC-IED elementsinvestedin.Assuch,asystemto maximiseinitialandon-goingunderstanding needstobedevelopedthroughinitialbaseline assessments,on-goingthreatassessmentand embeddingaMELprocesswithintheenterprise. Withathoroughunderstandingofthethreataswell asallofitselements,anenterpriseisbestpositioned toremainthreataligned,effective,andeffcient overtime.

EvolutionofThreatandEffectivenessofC-IED EffortsInvestedIn

Anotherarticlediscussingthemanagementofa C-IEDenterprise,outlinestheneedforC-IED activitiestobesynchronizedandunityofefforttobe achievedacrossitsconstituentC-IEDefforts.It stated‘thetemptationtopursueneatandclean synchronisationacrossC-IEDeffortsshouldbe avoided,especiallythatwhichisrigidandinfexible. Thereisoftenaneedtosimultaneouslyinvestin variousC-IEDefforts,eachwithdifferentpriorities. Overtime,theseinitialprioritisationrequirementswill change,necessitatingadaptationandfurther synchronisation.Thus,fexibilityisrequiredastherate atwhichvariousC-IEDeffortsmaturetobeing impactfulcanvary,thethreatcanevolve,andthe widersecurityenvironmentcanchange.’14 This evolutionoftheIEDthreat,variationinthe effectivenessofC-IEDefforts,andchangesinthe broadersecuritylandscapeindicatethatalthoughan accurateunderstandingmaybeachievedduringthe designanddevelopmentofanenterprise,this understandingwillinevitablyneedtoadaptovertime. Therefore,thereisaneedforbothinitialandsustained understandingtosupportaC-IEDenterprise.

TheRiskPosedbyaLackofUnderstanding Employingstrategicprinciplesinsupportofa regionallycoherentC-IEDenterprisehaspreviously beenproposed.15 Severalapproacheswere consideredindevelopingananalysisframeworkto facilitatetheidentifcationofsuchprinciples. Throughtheexaminationandcombinationoffour suchapproaches16 aseven-questionframework17

12 UnderstandingandMaximisingC-IEDInformationSharing, TheCounter-IEDReport,Autumn2023.

13‘MonitoringandevaluationwithinaC-IEDenterpriseinvolvesobservationanddocumentationoftheC-IEDeffortsinvested in,followedbythesubsequentevaluationoftheirimpactontheIEDthreat.Thisprocessofobservationandanalysisis intendedtoidentifylessonsforeachoftheC-IEDeffortsinvestedin.’Source: ManagingaC-IEDEnterprise, TheCounter-IED Report,Winter2024/ 25edition.

14 ManagingaC-IEDEnterprise, TheCounter-IEDReport,Winter2024/ 25edition.

15 AStrategicPrinciplesApproachtoRegionalC-IEDEnterprises, TheCounter-IEDReport,Spring/Summer2023.

16Thesefourapproachesinvolvedidentifyingends,waysandmeans;consideringthesituation,task,execution,authority,and supportdemands;examiningwhat,why,who,where,whenandhow(5W+H)oftheproblem;andagenericsetofseven questionswhichmaybeappliedtoanyplanningscenariowhichisadaptedfromthemilitarysevenquestionestimate.

wasdevelopedtoidentifyoptimalC-IEDstrategic principlesforagivenIEDaffectedstateorregion,18 toachievetherequiredimpactsandoutcomesfrom C-IEDdonorassistance.19 Thisseven-question frameworkcanequallybeappliedasamethodology toestablishwhatC-IEDeffortsneedtobeinvested inbyanationalenterprise.Withtheproblem statementknown,20 thesevenquestionframework21 posesthefollowingquestionsintermsofcountering theuseandthreateneduseofIEDs.

1.Whatend-stateisdesired

2.Whatactionsaretobetaken?

3.Whoaretotaketheactions?

4.Whenaretheactionstobetaken?

5.Wherearetheactionstobetaken?

6.Whatrisksneedtobemanaged?

7.Whatresourcesdotheactionsrequire?

Thequestionof‘whatrisksneedtobemanaged’ hastwoaspectstoit;namely,whatwilloptimizethe likelihoodofsuccessofanationalC-IEDenterprise

andsecondlywhatrisksneedtobemitigatedagainst. Fiverecurrentriskswereidentifedwiththefrst22 beingalackofunderstandingwithintheC-IED enterprise.Assuch,notonlyisunderstanding essentialforaC-IEDenterprisetobeeffective,buta lackofunderstandingalsoposesarisktoitbeing effectiveandultimatelyasuccessbutalsooftenleads toawasteofoftenvaluableresources.

Theriskarisingfromalackofunderstandingcan beminimizedthroughfourkeysteps:conductingan initialthreatassessment,establishingabaseline evaluationofexistingC-IEDefforts,maintaining ongoingthreatassessments,andintegratinga structuredMELprocessintotheC-IEDenterprise. Assuch,understandingwithintheC-IEDenterprise occursattwocriticaljunctures:initiallyandon anongoingbasistosustainanaccurate understanding.WhenthisisdonetheC-IEDefforts investedincanremainthreataligned,andtheir effectivenesscanbemonitoredandadjustedas requiredwhenneeded.

17Theseven-questionframeworkpresentedpreviouslyusessevenquestionstoestablishwhatC-IEDstrategicprinciples bestsuitagivenIEDaffectedregiontoachievetherequiredimpactsandoutcomesfromC-IEDdonorassistance;however, itcanequallybeappliedasmethodologytoestablishwhatC-IEDeffortsneedtobeinvestedinbyanationalC-IED enterprise.

18Suchprinciplescanserveasthefoundationforreasoninganddecision-makingabouthowIEDaffectedstates,their regionalorganisations,andinternationalorganisationsprovidingC-IEDdonorassistancecanrespondstrategicallytothe threatposedbyIEDs.ThedesiredendstateforsuchprinciplesisthattheysupportthedevelopmentofcoherentC-IED enterprisestoatleastmatch,butideallyovermatch,thethreatposedbyIEDs.Source: C-IEDStrategicPrinciplesforEast Africa,TheCounter-IEDReport,Autumn2023.

19C-IEDdonorassistancereferstoC-IEDsupportprovidedonabilateralbasis,onajointinitiativefromtwoormoreStates orbyaninternationalorganisation,e.g.,EU,LeagueofArabStates,ECOWASetcoranalliancee.g.NATO,toanIED affectedstateorregion.Source: IsImplementationofWesternC-IEDEnterprisesSuitableWhenProvidingDonorC-IED Assistance,TheCounter-IEDReport,Spring/Summer2023; C-IEDStrategicPrinciplesforEastAfrica,TheCounter-IED Report,Autumn2023; NecessityofaDesignatedLeadEntitywithinNationalC-IEDEnterprises,TheCounter-IEDReport, Spring/Summer2024.

20Inthedevelopmentoftheseven-questionframeworkthestartingpointwasconsiderationof‘whatisthesituationandhow doesitaffectus?’Thisprovidestheproblemstatementbeingaddressed.Inthiscase,wehavethestartingassumptionthat anIEDthreatexistsinagivenregion,stateorlocalityrequiringanIEDaffectedstateornumberofstatestoengageinaCIEDenterprise.Asthisproblemstatementisknown,nosuchquestionneedstobeincludedintheanalysis.

21ThisframeworkusessevenquestionstoestablishwhatC-IEDstrategicprinciplesbestsuitagivenIEDaffectedregionto achievetherequiredimpactsandoutcomesfromC-IEDdonorassistance.

22Othersincluded,lackofcoherence,coordinationandcooperationoftenleadingtounnecessarycompetitionandwasteof resourcesamongststakeholders;lackofpowerofenforcementtocompelstakeholderstoengageeffectivelyintheC-IED enterprise;andfnally,theriskofsomeC-IEDeffortshavingnegativecounterproductiveeffectswhichoveralldamagethe C-IEDenterprise.

INITIALUNDERSTANDING

DuringthedesignanddevelopmentofaC-IED enterprise,itisnecessarytoundertakeaninitial IEDthreatassessmentaswellasabaseline assessment23 ofthematurityorlackthereof,of existingC-IEDeffortsbeinginvestedin.

InitiallyAssessingtheIEDThreat

Itisessentialtohaveaclearunderstandingofthe IEDthreatwhendesigninganddevelopingaC-IED enterprise,toensurethattheenterpriseisaligned withthespecifcthreatfromthebeginning.The methodologyadoptedoradaptedforthisinitialIED threatassessmentisthefocusofaseriesofarticles throughout2025.

AssessingExistingC-IEDCapabilities

Initial‘understandingisinformedbyabaseline assessment,whichcomparescurrentC-IED capabilitiestothoserequiredtoachievetheplanned C-IEDenterprise.’24 Suchabaselineassessment candetermine‘thematurityorlackthereof,ofthe keyelementswhichcontributetoaC-IED enterprise.’25 Theseven-questionsframeworkcan beadaptedtodeterminethemosteffectiveC-IED effortsfortheenterprisetoinvestin.Theseefforts canthenbeevaluatedagainstcurrenteffortsto identifythenecessarylevelofinvestmenttoachieve thedesiredoutcomes.Thisprocessmayalso highlightnewC-IEDeffortsthatrequireinvestment. Amorecommonapproachtoundertakinga nationalC-IEDbaselineassessmentistousethe UNIDIRC-IEDCMMself-assessmenttool26 or adaptationsofthis.

SUSTAINEDUNDERSTANDING

Oncethefndingsoftheinitialthreatassessmentand baselineassessmentareassimilatedintoaC-IED enterprise,themostappropriateC-IEDeffortscanbe investedinandprioritizedaspartofabroader strategicplan.Onceoperationalized,theC-IED enterpriseneedstobemanagedwiththeobjectives ofremainingthreataligned,effectiveandeffcient, which‘collectivelypresentachallengetotypical linear,rigidmanagementpractices,necessitatingthe needforfexibility.’27 AfexibleC-IEDenterpriseisone thatisagile28 thatcaneffectivelyrespondtoand ultimatelypreventIEDincidents. Oneofthe15 elementsproposedasthebasisforaC-IED enterpriseisadaptingC-IEDefforts.Adaptationofthe enterpriseisnecessaryowingtotheevolutionofthe threatandchangesintheeffectivenessoftheC-IED effortsinvestedin.Tosupportsuchadaptation,there isaneedforinternalmechanismstomonitor,evaluate andfeedbacklessonsidentifedintotheenterprisein relationtoboththeIEDthreatasitevolvesaswellas theeffectivenessoftheC-IEDeffortsinvestedin.

EvaluatingEffectivenessandAdaptation

IntegratingaMonitoring,Evaluation,andLearning (MEL)processwithintheC-IEDenterpriseservesasa tooltoassessandimprovetheeffectivenessofC-IED efforts.Itenablestheidentifcationoflessonsthat guidenecessaryadaptationstoenhanceimpact. Additionally,theMELprocessstrengthensoversightby trackingtheprogressofC-IEDinitiatives,ensuringthey remainalignedwithobjectivesorhighlightingareas requiringadjustment. This,inturn,cancontributetoa moreeffcientC-IEDenterprisebyoptimizingtheuse

23 PhaseswithinaC-IEDEnterprise,TheCounter-IEDReport,Autumn2024.

24 BuildingtheC-IEDEnterprisetoCountertheIEDSystem,TheCounter-IEDReport,Winter2023/24.

25 AConceptualFrameworkforC-IEDEnterpriseDesign,TheCounter-IEDReport,Autumn2024.

26 https://unidir.org/publication/counter-ied-capability-maturity-model-and-self-assessment-tool/

27 ManagingaC-IEDEnterprise,TheCounter-IEDReport,Winter2024/25.

28ThisneedforagileC-IEDresponsesisdiscussedin‘AgileC-IEDEnterprises’,TheCounter-IEDReport,Winter2024/25.

ofinvestedresources. Asmonitoringandevaluationof theeffectivenessofC-IEDeffortscanidentifylessons, informeddecisionsto‘modifyexistingorinvestinnew C-IEDefforts,’29 areempowered. Once‘politicalbacking tomodifytheenterprise’30 issecured,‘aneffcient process,involvingkeystakeholderengagement, resourcemobilization31 andcommunication,isneeded toensuretheresultingconstituentC-IEDeffortswithin theenterpriseremainthreataligned,effectiveand effcient.’32 Assuch,embeddingaMELprocessinto aC-IEDenterpriseisakeytooltoachievingan agileenterprise.

MaintainingAwarenessofEvolvingIEDThreats

WhiletheeffectivenessoftheC-IEDeffortsinvested inwillbedeterminedbyanumberoffactors,33 the IEDthreatwillbetheprimaryone.Parallelto anembeddedlessonslearnedprocess;threat monitoringneedstobeon-goingtodetectchanges inIEDuseandhorizonscan.

‘AnIEDthreatisnormallyanevolvingand dynamicproblem’34 as thethreatbeingconfronted willevolveovertimeintermsofthetechnical complexityandtacticalsophisticationastheIED networkemployingthemwillseektocircumventthe C-IEDeffortsinvestedagainstthem. Forthis reason,itisimportanttoacknowledgeanIED threattypicallyevolvesduetotheaction-reactioncounteractioncyclethatplaysoutbetweenIED threatactorsandthoseengagedinaC-IED

enterprise.Whateverapproachistakenbyanational C-IEDenterprise,thefactthatthethreatwill inevitablyevolveduetotheaction-reactioncounteractioncycle,theC-IEDeffortsinvestedin needtoremainagile.

TherequirementforC-IEDeffortstobeagile, implicitlyrequirestheC-IEDenterprisetomonitor theireffectivenessandevaluatethemtoensurethey remainthreataligned.35 Monitoringandevaluationof theeffectivenessoftheC-IEDeffortsinvestedincan detectIEDthreatevolution;36 however,theprimary meansbywhichIEDthreatevolutioncanbe detectedisbydedicatedeffortstomaintain awarenessoflikelyevolutionintheIEDthreat.This requiresongoingmonitoringoftheIEDthreat, enablingtimelyadjustmentstokeeptheenterprise threatalignedandagile.

Threatmonitoringisintendedtodetectboththreat evolutionaswellashorizonscanforemerging threats.37 TimelyC-IEDintelligenceproductsarethe outputsfromeffectivethreatmonitoring.These C-IEDintelligenceproductsshouldideallyprovide feedback,throughacollaborativeinformation sharingculture,tothestakeholdercommunity involvedtoensuretheeffortsinvestedinandtheir respectiveprioritizationremainthreataligned.

Thisstakeholdercommunitycanthenusethe informationprovidedbysuchintelligenceproducts, toupdateorchangetheIEDthreatpicture,sothatit remainsthreataligned.ByhavingwithinaC-IED

29 ManagingaC-IEDEnterprise,TheCounter-IEDReport,Winter2024/ 25edition.

30 ManagingaC-IEDEnterprise,TheCounter-IEDReport,Winter2024/ 25edition.

31 Resourceinvestmentwillneedtobeconsideredoverthemediumtolongtermasthevariouseffortsinvestedinwillneed tobemaintainedandprobablymodifedastheIEDthreatevolvesandtheC-IEDenterpriseneedstobeadapted,sothatitsstays threatalignedandcontinuestoinvestinthemostappropriatewaysunderthelegalframeworkitisrequiredtooperate.Source: NecessityofaDesignatedLeadEntitywithinNationalC-IEDEnterprises,TheCounter-IEDReport,Spring/Summer2024.

32 ManagingaC-IEDEnterprise,TheCounter-IEDReport,Winter2024/ 25.

33Thesefactorsincluded‘therateatwhichvariousC-IEDeffortsmaturetobeingimpactfulcanvary,thethreatcanevolve,and thewidersecurityenvironmentcanchange.’Source: ManagingaC-IEDEnterprise,TheCounter-IEDReport,Winter2024/25.

34 UnderstandingandMaximisingC-IEDInformationSharing,TheCounter-IEDReport,Autumn2023.

35 AConceptualFrameworkforC-IEDEnterpriseDesign,TheCounter-IEDReport,Autumn2024.

36 AConceptualFrameworkforC-IEDEnterpriseDesign,TheCounter-IEDReport,Autumn2024.

37Source:Regulatingcontrolofthreatexplosiveprecursorchemicalsforuseinimprovisedexplosives,Backgroundpaper, PreparedbyPaulAmorosoandManonBlancafortfortheSmallArmsSurvey,20thJanuary2025.

enterpriseanembeddedMELprocess,aswell asaneffectivethreatmonitoringsystem,informed decisions,effectiveresponses,andultimately preventativemeasures,canbeinvestedinand, whennecessary,adjusted.38

THREATALIGNMENTINHIGHTHREATIED ENVIRONMENTS

TheneedfortimelyandthreatalignedC-IED capabilitiesareessentialwhen‘securityforceand defenceforcepersonnelarerequiredtooperateina highthreatIEDenvironment.’39 Thesepersonnel‘will needtobeprovidedwithsuitablethreatalignedIED awarenessandtrainingwhich maybeconsidered specialisedpreparationandcanincludethe provisionofcertainspecialisedC-IEDequipment. Examplesofthisincludeintermediatesearch capabilitiessuchasroutesearch,theuseof electroniccountermeasures(ECM)equipmentor whatmaybeconsideredlevel1exploitation. TheaimofC-IEDspecialistpreparationisto appropriatelytrainandequipallthoserequiredto undertakekeyactivitieswithinanynationalC-IED enterprise.SuchkeyC-IEDactivitiesinclude,inter alia,informationmanagementandthreatpicture developmentaspartofunderstandingefforts aswellasdefeatthedeviceactivities,and exploitationactivities.’40

THREATALIGNMENTOFIEDCOMPONENT CONTROLANDC-IEDBORDERCONTROLS

TwoofthepreventativeC-IEDelementspreviously outlinedareIEDcomponentcontrolandborder controls.Bothneedtobethreatalignedatalltimes tobeeffectiveandarecloselyrelatedinmanyof theC-IEDeffortstheysupport.IEDcomponent controlinvolvesdevelopingandimplementing

measurestoregulateandcontrolaccesstoIED components.Thesecontrolmeasuresmaytarget explosiveprecursorchemicalsdeemedathreatdue totheirassessedriskofbeingusedinthe manufactureofimprovisedexplosives.Theymay alsobeusedtocontrolaccesstoswitches identifiedascomponentsinIEDs.Anystate securityentitywitharoleinidentifyingsuch chemicalsorcomponents,developingappropriate controlmeasures,theirimplementationand enforcementwillneedtobeinvolvedinthiselement ofanationalenterprise.

Policeorotherlawenforcementagenciesmay haveprimaryresponsibilityforinvestigatingand enforcingsuchcontrolsdomestically.Itmay alsoinvolve,bordermanagementauthorities, particularlythosewithcustomsresponsibilities requiredtomonitorandenforceregulationsrelated totheinternationalmovementofcertaincontrolled IEDcomponentsintoorfromthestate.Wider bordersecurityentitiesmayalsoberequiredtobe onthelookoutforandtrainedtoidentifytheillicit movementofIEDs,componentsthereofaswellas IEDnetworkpersonnel.Theymayalsobetrained andequippedtotakeappropriatesafeactionupon discoveryofanysuspecteditemsorpersonnel.As such,bordercontrolisakeyelementinany nationalC-IEDenterprise.

On-goingmonitoringofthechemicalsand componentsinuseinIEDswillbenecessaryto ensureevolutioninthethreatisdetected. Subsequentappropriateadjustmentintherequired regulationandcontrolmeasureswillneedtobeput inplace.Theseadjustmentswillthenneedtobe communicatedtothosewhoneedtoimplementand enforcethem,whichmayalsoentailtraininginnew proceduresorassociatedequipment.

38Source:Regulatingcontrolofthreatexplosiveprecursorchemicalsforuseinimprovisedexplosives,Backgroundpaper, PreparedbyPaulAmorosoandManonBlancafortfortheSmallArmsSurvey,20thJanuary2025.

39 NestingC-IEDAppropriatelyWithinaState’sNationalSecurityArchitecture,TheCounter-IEDReport,Spring/ Summer2024.

40 NestingC-IEDAppropriatelyWithinaState’sNationalSecurityArchitecture,TheCounter-IEDReport,Spring/ Summer2024.

CONCLUSION

Understandingisavitalcross-cuttingelementof anyC-IEDenterprise,encompassingtwokey aspects:thethreatitselfandtheeffectivenessof theC-IEDeffortsinvestedin.Toachieveeffective understanding,itmustbeinitiallyestablished duringthedesignphasetoguidethedevelopment ofanationalC-IEDenterpriseandsubsequently sustainedovertime.Initialunderstandingrequires aninitialIEDthreatassessmentaswellasa baselineassessmentofexistingC-IEDcapabilities. Sustainedunderstandingrequiresmonitoringthe evolvingIEDthreataswellasassessingthe effectivenessofC-IEDeffortsinvestedin.The importanceofensuringallC-IEDeffortsremain threat-alignedandefficienthasbeenemphasized, withtheirefficiencydependingonmaintainingthis alignment.However,asanIEDsystemevolvesto circumventtheC-IEDeffortsinvestedinagainstit, theIEDthreatisconstantlyevolvingmakingthisa dynamicandchallengingendeavour.Despitethese challenges,theC-IEDenterpriseneedstoadapt, toensure‘firstlyitremainsthreataligned, secondlytheC-IEDeffortsinvestedinare optimisedtosupporttheoverarchingstrategic goaloftheenterpriseandthirdly,toworkefficiently andeffectivelywithintheresourcesprovided totheenterprise.’ 41

Suchadaptationisonlypossiblethroughan embeddedMELprocesstoinformanunderstanding oftheeffectivenessoftheC-IEDeffortsinvestedin. Italsorequireson-goingthreatmonitoringtodetect changesinthethreatandhorizonscanforemerging threats.Theabilitytosystematicallyundertakean initialthreatassessmentandtothreatmonitoron anongoingbasisrequiresthedevelopmentand sustainmentofanIEDthreatpicture.Subsequent articlesoverthecourseof2025willexaminehowto developandsustainanaccurateIEDthreatpicture tooptimizeunderstandingandensuretheC-IED effortsinvestedinremaineffectiveasthreats evolve.■

ABOUTTHEAUTHOR

PaulAmoroso isanexplosive hazardsspecialistandhas extensiveexperienceasanIED ThreatMitigationPolicyAdvisor workinginEastandWestAfrica. HeservedintheIrishArmyasan IEDDisposalandCBRNeoffcer, uptoMNTlevel,andhasextensive tactical,operational,andstrategicexperiencein PeacekeepingOperationsinAfricaandtheMiddle East.Hehasexperienceinthedevelopmentof doctrineandpolicyandwasoneofthekey contributorstotheUnitedNationsImprovised ExplosiveDeviceDisposalStandardsandtheUnited NationsExplosiveOrdnanceDisposalMilitaryUnit Manual.HeworksatpresentintheMENAregionon SALWcontrolaswellasinwiderAfricaadvisingon nationalandregionalC-IEDstrategies.Hehasa MScinExplosiveOrdnanceEngineeringandanMA inStrategicStudies.Herunsaconsultancy, AssessedMitigationOptions(AMO),whichprovides advice,support,andtrainingdeliveryinEOD,C-IED, WAMaswellasPersonalSecurityAwareness Training(PSAT)andHostileEnvironmentAwareness Training(HEAT).Thisarticlerefectshisownviews andnotnecessarilythoseofanyorganisationhehas workedfororwithindevelopingtheseideas. LinkedInprofle: https://www.linkedin.com/in/paulamoroso-msc-ma-miexpe-60a63a42/

IEDCLASSIFICATION–BREAKINGDOWN BOMBATTACKS

ByPaulAmoroso,anexplosivehazardsspecialistatAssessedMitigationOptions(AMO)consultancy.

I NTRODUCTION

Thisisthesecondarticleinaseriesexamininghow todevelopandsustainanaccurateIEDthreatpicture tooptimizeunderstandingandensuretheC-IED effortsinvestedinremaineffectiveasthreatsevolve.

Thefrstarticletitled,‘UnderstandingandThreat AlignmentWithinaC-IEDEnterprise’emphasised understandingasavitalcross-cuttingelementofany C-IEDenterprise,encompassingtwokeyaspects:the threatitselfandtheeffectivenessoftheC-IEDefforts investedin.Therestofthisseriesofarticleswillfocus onunderstandingthethreatofIEDattacks,through anIEDthreatpicture.

Inattemptingtodevelopasystembywhichan accurateIEDpicturecaninitiallybedevelopedand subsequentlysustained,oneapproachcouldbeto workoffadefnitionofanIED.Whileseveral defnitionsofanIEDareinuse,withvaryingdegrees ofaccuracyandoftenscriptedforspecifcaudiences orcontexts,onethatisagoodfttogenerically describethisweaponssystemisgivenby:adevice placedorfabricatedinanimprovisedmanner incorporatingdestructive,lethal,noxious,pyrotechnic orincendiarychemicalsanddesignedtodestroy, incapacitate,harassordistract.Itmayincorporate

militarystoresbutisnormallydevisedfromnonmilitarycomponents.1 However,thereareaspectsof IEDs,andtheirusenotcapturedinthisdefnition,that wouldbeneededtobaseanIEDthreatpicture around.Forexample,IEDspossessthecharacteristic ofbeingclandestinewhichisnotcapturedinthis defnition.Aspreviouslynoted,defnitionsofIEDsare oftentailoredtospecifcaudiencesorcontexts, resultinginmultipledefnitions,withlittlelikelihoodof consensuswithintheinternationalC-IEDcommunity. Thishighlightstheinherentdiffcultyincreatinga methodologytoconstructanIEDthreatpicturebased solelyonadefnition.

AmoresystematicapproachtounderstandIEDuse inagivencontextinvolvesexaminingIEDattacks undertheheadingsoftheirwhat,how,where,when, whoandwhy.Morepreciselyacomprehensive understandingofthefollowingisrequired:

•WhatcomponentsmakeanIED?

•WhereareIEDattackslikelytotakeplace?

•WhenareIEDattackslikelytotakeplace?

•WhoisinvolvedinIEDattacks?

•WhyareIEDsbeingemployed?

•HowareIEDsbeingemployed?

1 UnitedNationsOffceforDisarmamentAffairs(UNODA)InternationalAmmunitionTechnicalGuidelines(IATG)datedApril2011.

Thisunderstandingcanbeconsideredthe5W+H ofIEDs.Thiscomprehensiveanalysishelpstoattain anunderstandingofthethreat,developIEDanalysis tools,andmaintainanaccurateIEDthreatpicture. Suchanapproach,helpsidentifythestrengthsand weaknessesofanIEDsystem,enablingathreatalignedC-IEDenterprisetomakewell-informed decisionsregardinginvestmentsineffective counter-IEDefforts.Severalsubsequentarticlesin TheCounter-IEDReportwillexaminethe5W+Hof IEDsasaprocessincreatingaflexibleyet systematicapproachtodevelopingandmaintaining anIEDthreatpicture.Thisarticle,however,focuses onexaminingsomecommonmethodsusedto classifyIEDs.ItwilloutlinehowIEDsandtheir employmentcanbeanalysedfrommultiple perspectives,eachemphasizingparticularaspects oftheirdesignanduse.Akeymessageisthatwhile eachclassificationmethodhasitsmerits,engaging morethanonemethodofclassificationallowsfora morecomprehensiveunderstandingofthetechnical complexityofIEDsinuse.Wewillbeginby discussingtheimportanceofexploringdifferent methodsforclassifyingIEDs,whichareessentialto developingandmaintaininganaccurateIEDthreat picture.Asupportinginformationmanagement systemwillplayakeyroleinthisprocess,inevitably requiringadatabasetoefficientlyorganizeand managethenecessarydata.

DATABASESINSUPPORTOFANIEDTHREAT PICTURE

AnyIEDthreatpicturewillneedtobebasedupon accurateinformationofsufficientdetailonIEDuse, theIEDsystememployingthemandthecontextof theiruse.Thiswillrequirethecaptureofdatarelated tothesethreeelementsoftheIEDthreatpictureand itssubsequentanalysisaspartofsomeprocessor intelligencecycle.ThiswillultimatelyproduceIED intelligenceproductswhichcanthenbeusedto supporttheunderstandingoftheC-IEDenterprise

sothattheC-IEDeffortsinvestedinremainthreat alignedatalltimes.IntermsofIEDuse,thereisa needtounderstandtheirtechnicalcomplexityand theirtacticalemployment.Thiswillnecessitatethe captureofIEDincidentdataanditsinputintoa database.DatabasesofIEDinformationand intelligencecanbeusedtofindandcompareIED incidents.Overtime,asthedatasetisgrown,this willallowfortrends,patternsandinsightstobe obtained.Itissuchtrends,patternsandinsightsthat areneededtodevelopandsustainanaccurateIED threatpicture.ForanIEDdatabasetobeusefulin informinganIEDthreatpicture,alldataentered needstobestructured,systematicandconsistent. Whileadvancedcomprehensivedatabasescanbe designed,someofthechallengeswhichneedtobe consideredinclude:

•ThevastnumberofIEDsintermsoftheir technicalcomplexityandhowtheycanbeusedin termsoftheirtacticalemploymentisimmense andisachallengetocovereverypossible scenario.

•Theacceptanceofthelikelythreatevolutionover timeowingtoaction-reaction-counteractioncycle betweentheIEDsystemandthoseengagedin theC-IEDenterprise.

•Theneedfornon-specialistsindatabase management,dataentryandIEDstobeableto engagewiththedatabaseinauserfriendlyand intuitivemannerrequiringminimaltrainingto doso.

Itisforthesereasonsthatwhendesigning anIEDdatabasethatasystematicandas comprehensiveaspossible,withoutbeingoverly complex,systemisneeded.ApplyingtheKISS principle2 inIEDdatabasedesignisagood approach.ThisiswheretheuseofIEDclassification systemscanbeusefultoassistwiththischallenging endeavour.

2KeepItSimpleandStructuredaspossible.

IEDCLASSIFICATION–BREAKINGDOWNBOMBATTACKS

IEDCLASSIFICATIONMETHODS

IEDscanbeclassifed3 inmultiplewaystoaccountfor alargenumberofdesignpossibilitiesandtactical employmentmethods.4 Itisunrealisticforevery possibleIEDtobedescribed.However,byapplying theKISSprincipleandutilizinggenericclassifcations withspecifcexamples,itbecomespossibleto systematicallyclassifyIEDsinvariouswaysthatare bothfexibleandpractical.TheIEDthreatpicture developedandsustainedbyaC-IEDenterprisewill ideallyspeaktoitsstakeholderswhichwillinclude specialistsandnon-specialistsatthestrategic, operational,andtechnical / tacticallevels.These variousaudienceswillhavevaryingrequirements whichshouldideallybeaccountedfor.Byconsidering IEDsunderthefollowingfourclassifcations,alarge numberofvariationsisreducedtoamanageable numberofgenericclasseswhichprovides understandingforthevariousstakeholderswithinthe C-IEDenterpriseandtheirdifferentrequirements:

•Methodofactuation

•Tacticalemployment

•Targeteffect

•Technicalcomponents

AnexaminationofthefrstthreemeansofIED classifcationisprovidedbelowwiththefourth,

classifcationbytechnicalcomponents,thesubjectof asubsequentarticleexaminingwhatcomponents makeupanIED.Wewillconcludebyexaminingthe issueofclassifcationcrossover,emphasizingthatthe variousmeansofclassifyingIEDsshouldnotbe viewedasisolatedormutuallyexclusive.Instead,the importanceofadoptingafexibleandcontext-driven approachwhenclassifyingIEDsisadvocated, ensuringthattheclassifcationappliedbesthighlights therelevantcharacteristicswithinagivencontext.

MethodofActuationClassifcation

IEDscanbeclassifedbytheiractuationmethod5 whichreferstohowtheIEDisdesignedtobeinitiated. IEDscanbeclassifedbyoneofthreemethodsof actuation,namely,time,victim-operated,and command.Belowanargumentissetoutthatsuicide IEDsareaspecialcategoryofcommandIEDs; however,insomesystemstheyareconsideredasa fourthmethod.Understandingthemethodof actuationcanprovideinsightintothemost appropriatedefeatthedevicecapabilitiestobe investedin.ThesethreecategoriesofIEDactuation method,arealsothethreecategoriesofIEDswitch, whichcanbeeitherafringorarmingswitches.IED switchesareoneoftheelementscapturedunderthe technicalcomponentsofanIED.

3Theactofarrangingororganizingasetofobjectsintogroupsbasedoncommonattributes,characteristics,qualities,traits, capabilities,orfeatures.

4Adescriptionofhowthedeviceandtargetwerebroughtinproximityofeachother.TheIEDIncidentReportingGuide, 6thEdition.

5ThetermsoperationandactuationaresometimesusedinterchangeablywhenreferringtohowanIEDisinitiated;however, actuationandoperationhavedistinctmeanings,particularlyintechnicalcontexts.Actuationreferstotheprocessofturning on,starting,activating i ortriggering ii anymechanical,electrical,electronicorchemicaldeviceorsystem.Mechanical actuationcaninvolveturningonoroffamotor,openingorclosingavalve,movingaleverorswitch,andinitiatinga mechanicaltimer.Electricalactuationcaninvolveswitchingonoroffanelectricalcircuit,activatingarelayorcontactor, poweringanelectricaldevice,triggeringanelectricalsignaloralarm,andinitiatinganelectricalprocess,suchasaheating element.Electronicactuationcaninvolveactivatingasemiconductordevicesuchasatransistor,poweringonanelectronic circuit,triggeringadigitalsignalorprocess,engaginganelectroniccontrolsystemandstartinganembeddedsystemor microcontroller.Chemicalactuationcaninvolveinitiatingachemicalreaction,startingacatalyticprocess,activatinga chemicalsensorordetectorandtriggeringachemicalreleasemechanism.Actuationfocusesontheinitiationstep.Onthe otherhand,operationreferstotheoverallfunctioningorperformanceofadeviceorsystem.Itencompassestheentire processfromstarttofnish,includingactuation,control,andexecutionoftheintendedtask.Forexample,theoperationofa machineincludesnotonlyturningiton(actuation)butalsoallthestepsinvolvedinitsfunctioninguntilitcompletesitstask.

i.Activationcanimplyturningonasystemorprocess,makingitreadyforoperationandisfrequentlyusedinthecontextof electricalandchemicaldevicesorsystems.

ii.Triggeringisusedtorefertocausinganeventoractiontooccur,oftenusedinelectronicstostartasequenceorresponse.

Time

TimeIEDsarethosewhichfunctionafterapredeterminedperiodoftimehaselapsed.AnIEDfred afterthepassingoftimeallowsattackerstobeata safedistanceatthemomentofinitiation,andtoescape thescenebeforesecurityforcescanrespond.Time IEDsaresuitableforstatictargetssuchasbuildings andinstallationsbutlimitedagainstmovingtargets. AnotherdisadvantageoftimeIEDsisthattheintended victimsmightnotbewithinthedangerareawhenit initiates.However,theystillposeaseriousthreatas tacticscanbeemployedwhich,drawanunwarytarget intoloiteringnearitwheninitiatedortheycanbe employedinindiscriminateattacks,targetinganybody presentatacertainlocationandtime.

VictimOperated

Avictim-operatedIEDisanIEDwithafringswitch thatisactivatedbytheactionsofanunsuspecting individual,relyingonthevictimtocarryoutsomeform ofactionthatwillcauseittofunction.Thismethod offerstheattackerameanstoensurethetargetis closetotheIEDwhenitinitiates.Themainchallenge fortheattackersistofndcircumstancesinwhichonly anintendedtargetwilltriggertheIED,i.e.,an innocentpersonwillnotinadvertentlytriggerit. However,victimoperatedIEDsmaybeemployedin indiscriminateattacks,targetinganybodyatacertain locationandtime.Victim-operatedswitchesmayalso beincorporatedintoIEDsasasecondarymeansof actuationtotargetthosewhoattempttodefeatthe device.

Command

CommandIEDsarethosewhichallowanattacker, oftencalledthetriggermanorbomber,toinitiateitat amomentoftheirchoosingbycompletinganaction thatactuatesthefringswitch.CommandIEDsare especiallysuitedtoattackingmobiletargets.This authorcontendsthat,commandIEDscanbe categorisedunder:

•EmplacedandremotelyinitiatedIEDs

•SuicideIEDs

◦Bomberinitiated

◦Triggermaninitiated

TheauthorseeslogicconsideringsuicideIEDs, whetherinvolvingsuicidebombersorproxybombers, asaformofcommandIED.Thisisbecausetheir initiationisultimatelycontrolledbyadeliberateaction, eitherbythebomberthemselvesorbyatriggerman monitoringandactivatingthedeviceremotely.Inboth cases,adeliberateintendedactionisnecessaryto initiatethedevice.However,deliveryofsuicideIEDs byahumanelementaddsalayerofcomplexitythat distinguishesthemfromothercommandIEDswith theirmeansofemploymentoftenneedingtobe capturedalso.Thishighlightstheissueof classifcationcrossoverwhichisdiscussedlater.

EmplacedandremotelyinitiatedIEDs

Anemplaced6 andremotelyinitiatedcommandIED involvesanattackerselectingtwosuitablelocations: thecontactpointwheretheIEDwillbeemplaced,and thefringpointfromwherethetriggermanwillinitiate thedevice.AnemplacedcommandIEDgivesthe attackerthemeanstoattackaspecifctargetfroma safedistanceatamomentwheninitiationwillhave optimaltargeteffects.Therearemanymethodsto initiateanemplacedcommandIED.Twocommon methodsarebyradiocontrolandbycommandwire. Othermethodsarepossible,forexample,pullinga longstring.Moreobscurecommandfringswitches havebeenusedinvolvingtheuseofvarious technologiesthatallowatriggermantocompletean actionthatcausesafringswitchtofunctionfroma distance.

SuicideIEDs

AsuicideIEDisinitiatedatanattacker’schosen moment,withanindividualcarryingthedevice intentionallykilledeitheraspartoftheattackorto

6AnIEDthatisstaticallyplacedwhereitislikelytobeencounteredbytheintendedtarget. TheIEDIncidentReportingGuide, 6thEdition.

avoidcapture.Bothsuicidebomberandproxy bomber 7 attacksareconsideredsuicideIEDs.The bomberinbothcases,isthepersoninvolvedin transportingordeliveringtheIEDtothepointwhere itisinitiated.SuicideIEDsfallunderthecommand actuationmethodastheirinitiationultimately dependsonadeliberateaction—eitherbythe bomberthemselvesorbyatriggermanremotely controllingthedevice.Thismethodofcommand actuationisoftencloselytiedtoitsdelivery mechanism,whichmayincludeaperson-borne IED(PBIED)orasuicidevehicle-borneIED (SVBIED).Distinguishingbetweensuicideand proxyattacksisfrequentlychallenginguntilafter anattack,leadingtosignificantoverlapinthe defeat-the-devicecapabilitiesdevelopedtocounter suicideIEDs.

BomberInitiatedSuicideIEDs

Suicidebomberattacksinvolveacompliantand cooperativebomberwhoactivelyparticipatesinthe attack.Suicidebombersprovidetheabilityto circumventdefencesbyavoidingthemandguidean IEDtoadesiredcontactpointearningthemthe nicknameof'guidedIEDs.'Unlessneutralisedorthey havelastminutereservationsoncompletingan attack,asuicidebombersisthetriggermaninsuch attacks.Although,proxybomberattacksinvolve someonewhoisnotawillingparticipantintheattack, theymayhavebeenintimidated,threatened,or manipulatedthroughforcedsubstanceconsumption toactivatethedeviceagainstagiventarget.

TriggermanInitiatedSuicideIEDs

Therearevariousreasonsandscenarioswhya remotetriggerisincludedeitherastheprimaryor secondarymeansoffringasuicideIED.Thisallows anattacker,otherthanthebomber,toactasa

triggermanwiththeabilitytoinitiatethedeviceasthe primaryorsecondary(backup)8 meansoffring. Thesescenariosinclude:

•Asuicidebomberisneutralisedpriortohavingthe opportunitytoinitiatethedevice.

•Asuicidebomberbecomesreluctanttocomplete theirattack.

•Aproxybomber,despitebeingthreatened, intimidated,ordruggeddoesnotcarryoutthe directionsgiventothem.

•AproxybomberisunwittinglydeliveringanIEDto atarget.

TacticalEmploymentClassifcation

TacticalemploymentisameansofIEDclassifcation, inwhichIEDsarecategorisedbyhowthedeviceand targetwerebroughtinproximityofeachother.Itoften referstothemethodofdeliveryallowingan understandingofhowanattackwasintendedtobe conducted.TacticalemploymentofIEDsinclude vehicle-borne;animal-borne;person-borne(proxyor suicidebomber);emplaced;standoff;water-borne; air-borne;andpostalIED.Itisnotedthatbothwaterborneandair-bornerefertotheirdomainofuseas muchasanyothercharacteristicandareoften consideredtypesofstandoffIEDs.

StandoffIEDsareaspecialcategoryoftactical employmentofIEDsforseveralreasons.Forthis reason,thiscategoryofIEDswillbeelaboratedon inmoredetail.StandoffIEDsrefertoamethodof IEDemployment,involvinganexplosivedevice launchedorreleasedbyanattackerfromasafe location,whichthentravelstoitspointofcontact. StandoffIEDsenableattackerstoengageatarget withoutrequiringtheirpresenceatthepointof contactatanystageoftheattack.Theyalsoallow forthebypassingofphysicalsecuritymeasures, suchasbarriersthatpreventtheemplacementor

7WhenasuicideIEDisdeliveredbyanindividualwhohasbeencoercedintocarryingouttheattackorisunknowingly transportingthedevicetoitstarget,itisclassifedasinvolvingaproxybomberratherthanasuicidebomber.Thelevelof controlandassuranceofsuccesswithproxybomberscomparedtosuicidebombersislower,asthepersondeliveringthe devicemaynotactasdirected,orifcarryingthedeviceunwittingly,mayactinanunplannedmanner.

8A'chickenswitch'referstotheuseofasecondaryfringswitchbyatriggerman.Thisservesasabackuptoremotelyinitiate asuicideIEDifthebomberhesitates,failstoact,orisneutralized,ensuringthedevicefunctionsasintended.

deliveryofIEDsbyothermeans.StandoffIEDs canbeemployedacrossland,air,andmaritime domains.

StandoffIEDscanbefurtherclassifedasunguided andguided.UnguidedstandoffIEDs,oncelaunched orreleased,havenomeansofsubsequentcontrolby theattacker.Theirtargetingreliesontheirinitial positioning,trajectoryandoftenenvironmentalfactors thatwillinfuencetheirexternalballistics.Unguided standoffIEDsareonlysuitableforattackingstatic targets,requiringtheattackertocarefullyselecttwo locations:itslaunchorreleasepointandthecontact pointwhereitwillinitiate.Theyaretypicallynot suitableforattackingmobiletargets.

Ontheotherhand,guidedstandoffIEDscanbe controlledinsomeaspectafterlaunchorreleaseby anattacker,allowingthemtoadjusttheirtrajectory orplacementtoacontactpoint.Examplesinclude remotecontrolleduncrewedvehiclesintheland domain,aerialplatforms,morecommonlyreferredto asuncrewedaerialsystems(UAS),controlledbyan attackertodeliveranIED,andguidedsurfaceand subsurfacewaterborneIEDs.GuidedstandoffIEDs canbeusedtotargetbothstatictargetsaswellas mobiletargets.Theguidanceandcontrolofsuch standoffIEDscanbelinkedorunlinked.Alinked standoffIEDretainsaphysicallinkbetweenthe attackeratthepointofreleaseandtheIED,9 whileanunlinkedstandoffIEDiscontrolledbya remotemeans,typicallyinvolvingtheuseofsome bandoftheelectromagneticspectrumatcertain frequencies.

Inthelanddomain,standoffIEDscanbedelivered usinguncrewedvehicles.Thesevehiclesaretypically controlledbytheattacker,eitherthroughlinkedor unlinkedsystems,enablingpreciseguidancetothe

desiredcontactpoint.However,casesofunguided uncrewedvehicleswhichwerenotcontrolledinterms oftheirmovementoncereleasedfromtheirlaunch/ releasepointhavebeendocumented.Insuchcases itistypicalforunguidedlandbasedstandoffIEDsto remainlinkedtotheattackertoallowforthemoment ofinitiationtobecontrolled.

Inthemaritimedomain,surfaceandsubsurface standoffIEDscanbeguidedorunguidedonce releasedfromtheirlaunchpoint.Animprovised torpedoisanexampleofasubsurfaceunguided standoffIED.Variousimprovisedsurfacevessels adaptedasIEDsaretypicallycontrolledtoguidethem ontotheirintendedtarget.

Intheairdomain,thereisafargreatervariationof standoffIEDtypes.Intermsofunguidedairstandoff IEDs,theymaybefurtherclassifedasdirector indirect.Improvisedprojectilesfreddirectlyata targetareexamplesofdirectunguidedaerialstandoff IEDs.ExamplesincludetheProvisionalIRA’sMk16 mortar10 aswelltheirProjectedRecoillessImprovised Grenade(PRIG)andtheirImprovisedProjected Grenade(IPG).Improvisedmortarsandrocketsfred withalobbedtrajectoryatatargetareexamplesof indirectunguidedaerialstandoffIEDs.Balloon-borne IEDsareanotherexampleofindirectunguidedaerial standoffwhichuponreleaserelyonwindcurrentsto reachtheirtargets,makingthemunpredictablebut canbeeffectiveincertainscenarios.Theirusehas beendocumentedbeingreleasedinGazatotarget locationsinIsrael.11

GuidedaerialstandoffIEDstypicallyinvolvesome aerialplatform(uncrewedaerialsystem(UAS)12) beingusedtodeliveranIEDtoatarget.UASmaybe usedinavarietyofwaysinstandoffattacksto deliverexplosiveeffectstoatarget.Thesesystems

9ExamplesincludefringcableorfbreopticcableremainingattachedtoanIEDorit’sdeliveryplatformandunwindingasit movesfromthelaunch/releasepointtoitscontactpoint,retainingaphysicalconnectiontotheattackerwhichtheyuseto guidetheIEDtoitstargetandorcontrolitsinitiation.

10ThedesignationofthisprojectedhorizontalshapedchargestandoffIEDismisleading,asitdoesnotalignwiththe characteristicsofamortar,whichisdefnedbyitslobbedtrajectoryfromthelaunchpointtothepointofcontact.

11 https://www.terrorism-info.org.il/app/uploads/2020/01/015_20_E.pdf

12Oftenreferredtocolloquiallybytheterm‘drone’whichhasbecomeawidelyrecognizedandinformaltermincommonuse; however,itisnotaprecisetechnicalterm.Droneisalsooftenusedcolloquiallyinthewaterdomainalso.UASinthiscontext istakentoincludeunmannedaerialvehicles(UAV)andremotelypilotedaircraftsystems(RPAS).

arecontrolledbytheattackeruntilacertainpoint, wheretheyeitherreleasetheirexplosiveordnance ontoatarget,freatatarget,orcrashintoatarget. Theactofreleasingexplosiveordnancebydropping itontoatargetisknownasimprovisedaerial bombing.WhenaUASiscrashedintoitstargetasa one-wayattackitisoftenreferredtoasa‘kamikazedrone,’withitsexplosivepayloadinitiatingupon impact.

TargetEffectClassifcation

IEDscanbeclassifedbytheirintendedprincipal targeteffect.Thisclassifcationprovidesaquick understandingofanattacker’sintendedpurposeofan attackor,alternatively,the‘intended,immediate,or directtacticaleffectofanIED’13 attack.Itcanbe usefulinsendingaquickreportororganisingthe immediateresponsetoanattack.Possibleintended purposesincludeanti-armour;anti-personnel;anti-air; anti-infrastructure;anti-vehicle;anti-maritime;tactics, techniques&procedures(TTP)identifcation;obstacle creation;breaching.

CLASSIFICATIONCROSSOVER–FLEXIBLEAND CONTEXT-DRIVENAPPROACH

WhenclassifyingIEDs,itisessentialtorecognize thatthevariousmeansofclassifcationarenot isolatedormutuallyexclusive.CertainIEDscanfall undermultiplecategories,dependingonthe perspectiveorthelensthroughwhichtheyarebeing examined.Thisoverlaphighlightstheimportanceof avoidingasiloedapproachtoclassifcation.Instead, thechosenclassifcationshouldrefectthe characteristicsmostrelevanttothecontextorthe specifcaspectsthatneedtobeemphasized.Itis alsooftenadvantageoustoconsiderIEDsunder multiplesystemsofclassifcation,especiallywhen addressingmorecomplexdevices.TheseIEDsmay exhibitcharacteristicsthatoverlapacrossdifferent

classifcationsystems,suchastheirmethodof actuation,tacticalemployment,andtargeteffect. ThefactthatsuicideIEDsareoftencloselytiedto theirdeliverymechanism,whichmayincludea person-borneIED(PBIED)orasuicidevehicle-borne IED(SVBIED)isanexampleofthemeritofusing morethanoneclassifcationsystemsforcertain IEDs.ExaminingstandoffIEDsfurtherillustratesthe realityofIEDclassifcationcrossover.Classifcation ofstandoffIEDscanbecomplicatedowingtothe largenumberofswitchtypesthatcanbeusedto launchtheIED,armitandthencauseittoinitiatei.e. thefringswitch.Forexample,commandlaunch, delayarmed,timedaerialburststandoffIEDshave beendocumented.Firingswitchclassifcationcan becomeevenmorechallengingwhenconventional itemsofexplosiveordnanceareemployedand functionintheiroriginaldesignrolee.g.impact initiatedortimedelayafterrelease.Forexample, lightdependantresistorshavebeenemployedto allowforthetimedelaylaunchofunguided conventionalrocketsfromimprovisedlaunch platformswhichfunctionbyactivationoftheir conventionalimpactfuze.AUASemployedstandoff IED,mayhaveatimed(delay)armingswitch activatedafterrelease,withaconventionalfuze functioninguponimpactintoitstarget.Integrationof improvisedfringswitcheswithconventionalitemsof explosiveordnanceisalsoknown.Hybridswitches14 areoftenusedwithaerialstandoffIEDs.For example,secondarytimedswitchescanbe integratedintostandoffIEDstopreventtheircapture andsubsequenttechnicalexploitation.Thiscanbe takenevenfurtherwithsecondaryvictimoperated switchesintegratedtotargetanypersontryingto recovertheIEDandpreventitsexploitation. ClassifyinganIEDasstandoffoffersvaluableinsight intoitstacticalemployment.However,this classifcationcanbefurtherrefnedbyincorporating

13TheIEDIncidentReportingGuide,6thEdition. 14AhybridIEDswitchreferstoanyswitchornumberofswitchesconfguredasacombinationoftimedand/orcommandand/or victimoperatedswitchestoactindependentlyand/ordependentlyoneachother.

detailssuchasthedomainofoperation,launch method,armingmethod,and,whereapplicable,the specifcsofprimaryandsecondary fringswitches. Thisexpandedapproachaddsgreaterdepthand precisiontotheclassifcation.

Byutilizingmorethanonemeansofclassifcation whenexaminingIEDs,analystscanmore comprehensivelycapturethefeaturesofdevices. Detailedunderstandingoftheinterplaybetween deliveryandactuationofanIEDisparticularly valuableinC-IEDefforts,asitempowersinformed decisionmakingforeffectivedefeatthedevice capabilities.Byadoptingafexibleandcontext-driven approach,IEDclassifcationcanremainbothpractical andinsightful.DescribinganIEDthroughmorethan onemethodofclassifcationallowsforamore comprehensiveunderstandingoftheirtechnical complexitywhichisakeypartofanyIEDthreat pictureandinturninformsanunderstandingof thethreat.

CONCLUSION

Aspartofseriesofarticlesexaminingamethodology forthedevelopmentandsustainmentofanIED threatpicture,thisarticlehasoutlinedthreeIED classifcationsystemsinuse.Ithasalsointroduced theneedforacomprehensiveunderstandingofthe 5W+HofIEDstodevelopsuchamethodology. Severalsubsequentarticlesin TheCounter-IED Report willexaminethe5W+HofIEDsasaprocess increatingafexibleyetsystematicapproachto developingandmaintaininganIEDthreatpicture. ThesesixconsiderationsofIEDswillworkfromthe technical(what)tothetactical(how)levelsbefore movingtomoreoperationalaspects(whereand whenandwho)priortoexaminingstrategiclevel considerations(why).Theexaminationofwhat componentsmakeupandIEDislinkedtothesubject ofthisarticle,usingthefourthnamedIED classifcation–technicalcomponents.Thisisthe topicofthenextarticleinthisseriesinthecuriously titleda‘JourneyThroughPIECESofSPICEPIES.’■

ABOUTTHEAUTHOR

PaulAmoroso isanexplosive hazardsspecialistandhas extensiveexperienceasanIED ThreatMitigationPolicyAdvisor workinginEastandWestAfrica. HeservedintheIrishArmyasan IEDDisposalandCBRNeoffcer, uptoMNTlevel,andhasextensive tactical,operational,andstrategicexperiencein PeacekeepingOperationsinAfricaandtheMiddle East.Hehasexperienceinthedevelopmentof doctrineandpolicyandwasoneofthekey contributorstotheUnitedNationsImprovised ExplosiveDeviceDisposalStandardsandtheUnited NationsExplosiveOrdnanceDisposalMilitaryUnit Manual.HeworksatpresentintheMENAregionon SALWcontrolaswellasinwiderAfricaadvisingon nationalandregionalC-IEDstrategies.HehasaMSc inExplosiveOrdnanceEngineeringandanMAin StrategicStudies.Herunsaconsultancy,Assessed MitigationOptions(AMO),whichprovidesadvice, support,andtrainingdeliveryinEOD,C-IED,WAMas wellasPersonalSecurityAwarenessTraining(PSAT) andHostileEnvironmentAwarenessTraining(HEAT). Thisarticlerefectshisownviewsandnotnecessarily thoseofanyorganisationhehasworkedfororwithin developingtheseideas.

LinkedInprofle: https://www.linkedin.com/in/paulamoroso-msc-ma-miexpe-60a63a42/

AJOURNEYTHROUGHPIECESOFSPICEPIES

WHATCOMPONENTSMAKEUPANIED-TECHNICALCOMPONENT

CLASSIFICATION

ByPaulAmoroso,anexplosivehazardsspecialistatAssessedMitigationOptions(AMO)consultancy

INTRODUCTION

Thisisthethirdarticleinaseriesexamininghowto developandsustainanaccurateIEDthreatpictureto optimizeunderstandingandensuretheC-IEDefforts investedinremaineffectiveasthreatsevolve.Thefrst articletitled,‘UnderstandingandThreatAlignment WithinaC-IEDEnterprise’ emphasisedunderstanding asavitalcross-cuttingelementofanyC-IED enterprise,encompassingtwokeyaspects:thethreat itselfandtheeffectivenessoftheC-IEDefforts investedin.Therestofthisseriesofarticleswillfocus onunderstandingthethreatofIEDattacks,throughan IEDthreatpicture.

TosystematicallyunderstandtheuseofIEDsbya specifcnetworkinagivencontext1,itisessentialto analyseIEDattacksusingthefollowingkeyquestions: what,how,where,when,who,andwhy.Moreprecisely acomprehensiveunderstandingofthefollowing isrequired:

•WhatcomponentsmakeupanIED?

•WhereareIEDattackslikelytotakeplace?

•WhenareIEDattackslikelytoplace?

•WhoisinvolvedinIEDattacks?

•WhyareIEDsbeingemployed?

•HowareIEDsbeingemployed?

Thisunderstandingcanbeconsideredthe5W+Hof IEDs.Thiscomprehensiveanalysishelpstoattainan understandingofthethreat,developIEDanalysis tools,andmaintainanaccurateIEDthreatpicture.By doingso,thestrengthsandweaknessesoftheIED networkcanbeidentifed,contributingtoathreat alignedC-IEDenterpriseempoweredtomake informeddecisionsoninvestmentineffectiveC-IED efforts.

AlongwithseveralfuturearticlesinTheCounter-IED Report,thisarticlewillexplorethe5W+HofIEDsasa processtocreateafexibleyetsystematicapproachfor developingandmaintaininganIEDthreatpicture.It examinesoneofthepreviouslymentionedmethods ofIEDclassifcation2 –technicalcomponentsasa meanstoexplorethefrstquestionofthe5W+H,‘what componentsmakeupanIED.’

UnderstandingtheIEDcomponentsinuseisvitalto informingmultipleC-IEDeffortsinvolvedinanyC-IED enterprise.Mostnotably,thiswillinformthemost appropriateIEDdefeatthedevicecapabilitiesthat needtobeinvestedin,developedandsustained.Itwill alsobethemostvitalinformationaroundwhichall effortstocontrolIEDcomponentswillbebased.We

1 ContextintermsofanIEDthreatpicturereferstoboththeIEDsysteminvolvedandthelocalcontext.TheIEDsystemis assessedunderitsintent,capabilitiesandtheopportunitiesithastoemployIEDsagainstdefnedtarget(s).Localcontextis defnedbyageographicarea,thetargetoftheattacksandotherlocalfactors.

2 IEDClassifcation–BreakingDownBombAttacks,TheCounter-IEDReport,Spring/ Summer2025.

willexplorehowthisquestioncanbeaddressedby recognizingthatdifferentlevelsofdetailmaybe appliedwhenansweringit.Aprogressivelydetailed examinationofIEDcomponentswillbestructuredusing threesimplemnemonics,eachprovidingasimple memoryaidtoassistinsystematicproflingofIED components.Eachmnemonicprovidesanincreasingly comprehensiveframeworkforIEDtechnicalcomponent categorisation,thesimplestbeingPIES,followedby SPICE,withPIECESbeingthemostcomprehensive. ThisexaminationinvolvesajourneythroughPIECESof SPICEPIES.Wewillfrstexamineaquestionoften askedbymanywheninitiallybeingbriefedonthethreat posedbyIEDs,‘whatdoesanIEDlooklike?’

WHATCOMPONENTSMAKEUPANIED?

Arecurrentquestionoftenaskedwhenbriefngor deliveringtrainingtothoseinvolvedinvariousC-IED efforts,is‘whatdoIEDslooklike?’Inmanycasesthe audiencearenotC-IEDspecialistsbutfromlaw enforcement,frstresponders,all-armsmilitaryunits, bordersandcustomscontrol,localinternationalNGOs, governmentoffcials,membersofthejudiciaryand evenIEDaffectedcommunities.

Examininghowtoaddressthisquestionwithout creatingfalseawarenessthroughoverlyspecifcor prescriptivedescriptionsisacrucialstartingpoint.The answerprovidedbythisauthortodatehasbeenthat anIEDmostlikelyresemblesitscontainer,3 which,due toitsimprovisednature,cantakeonanalmostlimitless varietyofitems.Thishighlightsthesignifcant challengeinsystematicallyclassifyingthetechnical componentsofIEDs,achallengerootedintheir inherentlyimprovisednature,inthatanIEDcanin theorybeconstructedfromavastarrayofcomponents.

PIES

ThebasiccomponentsneededforanyIEDinvolve someexplosivetrain,aswitchtocauseittofunction andtypicallyapowersource.4

Theexplosivetrainwilltypicallyinvolvebothamain chargeandaninitiator.Thisprovidesthebasis componentsofmostIEDs,totypicallyinclude explosives,aninitiator,oneormoreswitches,anda powersource.Thesefourcomponentscanbe arrangedtomakethemnemonicPIES,referringto Powersource;Initiator;Energeticmaterials;5 and Switches–bothfringandarmingifpresent.

Anonlinegraphic6 outliningthecomponentsofanIED–inthiscasetheterminitiatingsystemisusedtodescribe theswitch,initiatorandpowersource.

3Inmostcases,thecontainerofanIEDcanbeanyitemwithavoidwithinwhichtheothercomponentsaresecretedorheld. AcontainermayalsoacttohavesomeoftheIEDcomponentsattachedtoit.

4TheauthoracknowledgesthatitispossibletohaveanIEDwithoutapowersourceinthetraditionalsensewithsuchIEDs havingbeendocumented;however,theyarerareanddiffculttoemployeffectively,typicallyowingtothesensitivityofthe energeticmaterialinvolved.

5 Theterm"explosives"isoftenusedinthiscontexttoreferspecifcallytothemaincharge.However,inabroadersense,it encompassesallenergeticmaterialsintheIED,apartfromtheinitiator.WithinthePIESframework,the"E"accountsforthese energeticmaterials,whichcanincludehighexplosives,propellants,andpyrotechniccompositions.Consequently,the"E"in allthreemnemonicsreferstoanyenergeticmaterialinvolved.

6ImagesfromExaminingtheRoleofMetadatainTestingIEDdetectionSystem,byPaulJ.FortierandKiranDasariUniversity ofMassachusettsDartmouth,PublishedintheITEAJournal2009:30:421-433

Undereachofthetechnicalheadingsofpower sources,initiators,energeticmaterialandswitches variousfurtherclassifcationispossible,leadingtoa hierarchyoftechnology7 Asabasicexample,the typeoffringswitch,canbefurtherclassifedas command,time,victimoperatedorhybrid.8 This conceptofahierarchyoftechnologycanbeapplied tocategorizingthecomponentsofIEDsby organizingthemintolevelsbasedontheir functionality,complexity,andimportancewithinthe device.Thisapproachhelpsinsystematically analysingandunderstandingtheconstructionof IEDs,providingclaritytotheirdiverseand improvisednature.Asystematicanddetailed classifcationsystemofhowpowersources, initiators,energeticmaterialandswitchescanbe furthercategorised,alongwithextensiveexamples, isprovidedin‘ TheIEDIncidentReportingGuide ,’ 6thEdition,9 andalsoreproducedinAnnexALexiconoftheUNIEDThreatMitigationHandbook, SecondEdition,2024.

SPICE

Whenweconsiderthecomponentsaccountedforunder thePIESheadings,wemayreturntothequestionposed earlier–whatdoesanIEDlooklike?Theanswerto which,isthatittypicallylookslikeitscontainer.So,we mayneedtoaccountforanIED’scontainerwhen consideringitscomponents.Whenwedothis,wecan usethemnemonicSPICE,standingforSwitch(es), Power-source,Initiator,ContainerandEnergeticmaterial.

Fromatechnicalperspective,inadditiontoageneral descriptionofanIED,10 thekeycharacteristicsofa containerthatneedtobecapturedareanyaspects whichcontributetotheIED’sconcealmentorexplosive effects.ConcealmentcharacteristicsofanIEDcontainerreferto‘materialsusedtopreventthediscoveryof anIEDbyvisualinspection.’11 Explosiveeffects characteristicsofacontainerrefertoaspectssuchas:

•Confnementofanexplosivemainchargewhich mayleadtoadefagrationtodetonationeffectand isoftenhowpipebombsfunction.

•Confgurationofthecontainertoproducedirected explosiveeffectswhichareconsideredatypeof enhancementandarecoveredlaterinthisarticle.

7Theterm"hierarchyoftechnology"referstothestructuredarrangementorclassifcationofdifferenttechnologicalsystems, tools,orcomponentsbasedontheircomplexity,functionality,orimportance.Thishierarchyoftenhighlightstherelationship betweenfoundationaltechnologiesthatserveasbuildingblocksandmoreadvancedtechnologiesthatdependonorarebuilt uponthem.

8AhybridIEDswitchreferstoanyswitchornumberofswitchesconfguredasacombinationoftimedand/orcommandand/or victimoperatedswitchestoactindependentlyand/ordependentlyoneachother.

9 https://tripwire.dhs.gov/carousel/ied-reporting-guide-6th-edition ReleasedJanuary2024.

10Forexample,theuseofcertaincontainersinsomeareashasgivenrisetogenericdescriptionsbaseduponthecontainerin usesuchascoffeejarIED.

11TheIEDIncidentReportingGuide,6thEdition.

PIECES

WhiletheSPICEmnemonicaccountsforthemain componentsinanIEDitfailstoaccountforcomponents whichareoftenofgreatestinterest–enhancements.12 Theinclusionofenhancementsleadstothemnemonic PIECES,standingforPower-source;Initiator;Energetic material;Container;Enhancements;andSwitch(es).

ItisacknowledgedthatnotallIEDshave enhancements,withsomeIEDsproducingalltheir explosiveorincendiaryeffectsfromthemaincharge. AnIEDcanbeconsideredenhancedwhenadditional materialisintegratedintothemaincharge,positioned incloseproximitytoit,orwhenthemainchargeis confguredinaspecifcwayrelativetothecontaineror addeditems.EnhancementsareaddedtoanIEDto increasetheirharmfulanddamagingeffects.The followingsixtypesofenhancementsarepossible:

•Blastenhancements

Theblastfromsomecommonexplosivescanbe increasedbymixingcertainmaterialwiththem. CommontermsassociatedwithsuchIEDsare blastbombsandenhancedblastIEDs.

•Fragmentationenhancements

Theeffectsofblastreducequicklywithdistance fromthepointofinitiation,withthecontainerof anIEDoftenproducingnaturalfragmentation whichalongwithothercomponentsarepropelled omnidirectionallyfromthepointofinitiationoften causingmanyoftheinjuriesandincertaincases damage.Forexample,apipebombpropelsoften lethalfragmentationinthesurroundingareadue totheruptureandprojectionofthecontainer material.Theeffectsoffragmentationcanbe increasedbytheadditionofadditionaloften metallicmaterialtoanIED.Thisgivesriseto suchdescriptorsasnailbombs,ballbearingIEDs etc.Suchomnidirectionalfragmentationcharges cancausecasualtiesinalldirections. Alternatively,fragmentationmaybepositionedto channelfragmentsintoanarrowerpath, functioningsimilarlytoalargeshotgun,forming whatisknownasaDirectionalFragmentation Charge(DFC)andsometimesreferredtoas shotgunIEDs.Avariationonthisdesignisto produceacurtainoffragmentationprojected outfromonesideofanIED.SuchIEDsareoften referredtoasclaymoreIEDsorimprovised claymores.AnothervariationontheDFCdesign isaDirectedFragmentationFocussedCharge (DFFC)designedtoprojectfragmentstoapoint ofoptimalconcentrationsomedistancefrom theIED.ThisallowsustoclassifyIED fragmentationenhancementunderfoursub headingsasshownbelow.

12Anoptional,deliberatelyaddedcomponentorconfgurationoftheIEDasopposedtoasecondaryhazardwhichmodifesthe effectsoftheIED.TheIEDwouldbeeffectiveyetproduceadifferentmeasurableresultifthismaterialorconfgurationwas notpresent.Theeffectcanbeadditionalphysicaldestruction,proliferationofdangeroussubstances(radiation,chemicals, etc.),orotherresultstoenhancetheeffectoftheIED.TheIEDIncidentReportingGuide,6thEdition.

•Directionalexplosiveeffectenhancements

IEDscanbeenhancedforthepurposeof attackingarmouredvehicles,includingblastresistantarmouredvehicles,bytheuseof directionalexplosiveeffect13 enhancements.Such IEDsconcentrateexplosiveforceontoaplate, metaldiskorlinerwhichisprojectedatthetarget. Theycanhavevariousdegreesoftechnical constructionfromlooselyfttedfatplatestowellengineeredcopperconeswithresultingvariations incomplexityofdesign,effectiverange,and penetrativecapability.Therearethreebasictypes ofdirectionalexplosiveeffectenhancements:

DirectionalEffectEnhancements

Plattercharges,EFPandSCareall examplesofdirectionaleffectIEDs. ThetermdirectionaleffectIEDsis onethatreferstoIEDswhichhave eitherdirectionalexplosiveeffects, suchasplattercharges,EFPandSC aswellasthosewithdirected fragmentationeffectssuchasDFC, DFFCandimprovisedclaymores. Thisisanexampleoftheoverlap thatcanoccurwhenclassifying enhancements.Theclassifcation systememployedmaychoose separatecategoriesoffragmentationenhancementsanddirected explosiveeffectsofhavethem combinedunderthebroader directionaleffectcategory.

•Plattercharges;14 •Explosivelyformedpenetrators(EFPs);15 •Shapedcharges(SC).16

Variationincharacteristicsofdirectionalexplosiveeffect enhancements.

13Atermusedtodescribeexplosiveeffectsproducedbytheinitiationofexplosivesinintimatecontactwithalinerwhichis projectedforwardwithvaryingeffectsdependingonmanyfactorsresultingineithershapedchargejets,ExplosivelyFormed Projectiles(EFP)orplattercharges.

14InaplatterchargeIED,theenhancementisaddedintheformofafatmetalplate.WhentheIEDisinitiated,theplateis projectedtowardsthetargetathighvelocity,oftenbreakingintoseverallargefragments.Theplate,orfragments,maybe capableofpenetratinglightarmouratdistanceofafewmetres.

15Alsoreferredtoasexplosivelyformedprojectiles,explosivelyforgedprojectilesandexplosivelyforgedpenetrators.InanEFP IED,theenhancementisaddedintheformofadish,preciselyshapedfromductilemetal.WhentheIEDisinitiated,explosive forcesbendthedishcausingittoinvert.Thisformsasmallermoreaerodynamicallystablecross-sectionalareapenetrator thatisprojectedtowardsthetargetatveryhighvelocity.Dependingontheirdesign,theseprojectilesarecapableof penetratingsubstantialarmouratdistancesevenbeyond10morso.

16Shapedchargesarecommoninconventionalmunitions,oftenreferredtoasHEATwarheads.InashapedchargeIED,the enhancementofteninvolvestheadditionofacoppercone.WhentheIEDisinitiated,ajetofcopperisfredtowardsthetarget atextremelyhighvelocity.Jetscanpenetrateverythickarmour,butonlyiftheIEDisinitiatedincloseproximitytoitstarget.

•Incendiaryenhancements

IEDscanbeenhancedbytheadditionof fammableliquidsforthepurposeofincreasing casualtiesorstartingfresinbuildings. Unconfned,muchoftheeffectoffuel enhancementwillresultinafreballwhichwilllead tothermalinjuriestothosewithinthedangerarea. Wheninitiatedinsideabuildingorinclose proximitytofammablematerial,theeffectsare oftenmuchmoredestructivethantheuseof explosivesalone.Thetermblastincendiaryis sometimesusedtodescribesuchdevices.

•ChemicalBiological&Radiological(CBR) enhancements

IEDscanbemademoreterrifyingbyadding Chemical,Biological,orRadiological(CBR) enhancements.TheexplosiveblastofCBRenhancedIEDs,isdesignedtodispersechemical, biological,orradiologicalsubstancesintothe surroundingarea.Thisresultsincontaminationof theareawithtoxicmaterials,exposingthose presentatthetimeofinitiationaswellas potentiallythoserespondingtosuchanattack. BroadlytherearethreecategoriesofCBR enhancements.Thosewhichareimprovised,

thosewhichinvolvetheuseofcommercialtoxic materials17 andthosewhicharemilitaryor weaponisedagents.

ChemicallyenhancedIEDsmayinvolvetheuseof improvisedchemicals,18 toxicindustrialchemicals 19 ormilitarygradeweaponisedchemicalsalso referredtoaschemicalwarfareagents(CWA).20 For example,anexplosivechargemaybeattachedto cylindersofchlorine,withtheintentthatupon initiation,chlorineisreleasedintotheatmosphere. AttemptstousetheCWAmustardgas(sulphur mustard)21 havebeendocumentedaswellasefforts toemploythenerveagentsarin; 22 however,the developmentofsuchcomplexandrelatively unstableCWAisnoteasilyachieved,typically requiringspecialistequipmentandhigh-level competentchemistsandengineers.Thismakes improvisedCWAproductionlimitedintermsof qualityandquantityandoftenrestrictedtocertain industrialfacilitiesandinsomecasesresearch institutes.

RadiologicallyenhancedIEDsmayinvolvetheuse oftoxicindustrialradiologicalmaterials.23 Theuseof anIEDtoexplosivelydisseminateradiological particlesisoftenreferredtoasa‘dirtybomb’.

17Generictermfortoxicorradioactivesubstancesinsolid,liquid,aerosolized,orgaseousformthatmaybeused,orstoredfor use,forindustrial,commercial,medical,military,ordomesticpurposes.Toxicindustrialmaterialmaybechemical,biological, orradioactiveanddescribedastoxicindustrialchemical,toxicindustrialbiological,ortoxicindustrialradiological.

Source:TheIEDIncidentReportingGuide,6thEdition.

18Thiscategorystandsapartfromtheuseofcommercialtoxicindustrialmaterialsandmilitary-gradeweaponizedCWAsources duetoitsimprovisednatureandrelianceonnon-standardorimprovisedcomponents.Onemayconsidertheseasanalogous toimprovisedexplosivesincomparisontocommercialexplosivesandmilitarygradeexplosives.

19 Achemicaldevelopedormanufacturedforuseinindustrialoperationsorresearchbyindustry,government,oracademia.For example:pesticides,petrochemicals,fertilizers,corrosives,poisons,etc.Thesechemicalsarenotprimarilymanufacturedforthe specifcpurposeofproducinghumancasualtiesorrenderingequipment,facilities,orareasdangerousforhumanuse.Hydrogen cyanide,cyanogenchloride,phosgene,andchloropicrinareindustrialchemicalsthatcanalsobemilitarychemicalagents.

Source:TheIEDIncidentReportingGuide,6thEdition.

20Achemicalsubstancewhichisintendedtokill,seriouslyinjure,orincapacitatemainlythroughitsphysiologicaleffects. Thetermexcludesriotcontrolagentswhenusedforlawenforcementpurposes,herbicides,smoke,andfames.

Source:TheIEDIncidentReportingGuide,6thEdition.

21 https://news.un.org/en/story/2023/06/1137492;and https://ctc.westpoint.edu/islamic-state-chemical-weapons-case-contained-context/

22 https://worldview.stratfor.com/article/sarin-shell-who-might-have-used-it;and https://www.newsweek.com/ieds-secret-sarin-supply-129165

23ToxicIndustrialRadiological(TIR)enhancementreferstoanyradiologicalmaterialmanufactured,used,transported,orstored byindustrial,medical,orcommercialprocesses.Forexample,spentfuelrods,medicalsources,etc.

Source:TheIEDIncidentReportingGuide,6thEdition.

BiologicallyenhancedIEDsmayinvolvetheuseof toxicindustrialbiologicalmaterials24 ormilitarygrade weaponisedbiologicalwarfareagents(BWA).25 The explosivedisseminationofabiologicalagentisunlikely tobeeffectivewiththesamechallengespresentfor BWAproductionasfacedwithCWAproduction. However,thisdoesnotmeananattackerwiththeintent andcapabilitywillnotattempttousebiologically enhancedIEDs.

ThelethalityofadispersedCBRagentinanarea dependsonitsconcentration.However,itsuseoften hasaprofoundpsychologicalimpact–notonlyon thosewithintheimmediateareabutalsoonpeople beyondit,especiallywhennewsoftheattack, particularlyifflmed,spreadswidely.CBR-enhanced IEDsareprimarilydesignedtoterroriseatargetgroup, anditisthisimpactthatmakesthemasignifcantly impactfulcategoryofIEDcomparedtoothers.

TheacronymPIECESframeworkisusefulfor classifyingallthepossibletechnicalcomponentsof IEDs,recognizingthatnotallIEDswillincludeallsix

TheutilityofthePIECESnmemonicframeworkfor IEDcomponentidentifcationisillustratedabove,with thecomponentsshownintransitpriortoassemblyinto anIED.

components.ThemeritsofthePIECESframeworklie initsapplicabilityatboththetechnicallevelandin supportingeffortstocontrolaccesstoIEDcomponents.

CONCLUSION

Aspartofseriesofarticlesexaminingamethodologyfor thedevelopmentandsustainmentofanIEDthreat picture,wehaveexaminedthefrstquestionwithinthe 5W+HofIEDs–whatcomponentsmakeupanIED? Threesimplemnemonictoolsofincreasingdetailhave beenoutlinedthatcanbeusedwhendesigninganIED databasetosystematicallyandconsistentlycapture detailsofIEDcomponentsinuseinastructuredmanner. ItisadvocatedthatthePIECESframeworkisemployed whenproflingIEDcomponents,withthe caveatthat

24Anybiologicalmaterialmanufactured,used,transported,orstoredbyindustrial,medical,orcommercialprocesseswhich couldposeaninfectiousortoxicthreat.Source: IEDIncidentReportingGuide,6thEd,Jan24.

25 AmicroorganismoratoxinA derivedfromitthatcausesdiseaseinpersonnel,plants,oranimalsorcausesthedeteriorationof materiel.

NOTEA:Atoxicsubstanceproducedbyandderivedfromplantsandanimalsorcreatedsynthetically. Source:TheIEDIncident ReportingGuide,6thEdition.

thereisacknowledgmentthatnotallIEDshaveallsix componentspresent.Themeritsoftheuseofthe PIECESframeworkarethatitisnotonlyapplicableat technicallevel,butitcanalsosupportIEDcomponent controlefforts. Astrendsandpatternsofthe componentsinuseandtheirtechnicalconfguration emerges,deviceproflingisempoweredwhich canthen informthetechnicalcomplexityofthethreat.Detailsofthe technicalcomplexityofanIEDthreatisoneofthekey componentsthatwillmakeupanIEDthreatpicture.The nextarticleinthisserieswillexaminethetactical sophisticationofIEDsinusebyexploringthequestion, ‘howareIEDsbeingemployed?’■

ABOUTTHEAUTHOR

PaulAmoroso isanexplosive hazardsspecialistandhas extensiveexperienceasanIED ThreatMitigationPolicyAdvisor workinginEastandWestAfrica.He servedintheIrishArmyasanIED DisposalandCBRNeoffcer,up toMNTlevel,andhasextensive tactical,operational,andstrategicexperiencein PeacekeepingOperationsinAfricaandtheMiddle East.Hehasexperienceinthedevelopmentof doctrineandpolicyandwasoneofthekey contributorstotheUnitedNationsImprovised ExplosiveDeviceDisposalStandardsandtheUnited NationsExplosiveOrdnanceDisposalMilitaryUnit Manual.HeworksatpresentintheMENAregionon SALWcontrolaswellasinwiderAfricaadvisingon nationalandregionalC-IEDstrategies.HehasaMSc inExplosiveOrdnanceEngineeringandanMAin StrategicStudies.Herunsaconsultancy,Assessed MitigationOptions(AMO),whichprovidesadvice, support,andtrainingdeliveryinEOD,C-IED,WAMas wellasPersonalSecurityAwarenessTraining(PSAT) andHostileEnvironmentAwarenessTraining(HEAT). Thisarticlerefectshisownviewsandnotnecessarily thoseofanyorganisationhehasworkedfororwithin developingtheseideas.

LinkedInprofle: https://www.linkedin.com/in/paulamoroso-msc-ma-miexpe-60a63a42/

CALLFORPAPERS

COUNTER-IEDREPORT

Subscribeat: www.counteriedreport.com/subscribe

Counter-IEDReporteditorialteaminvitesgovernment bodies,armypersonnel,researchers,industryexperts tocontributetheirarticles,casestudies,whitepapers tothereport.

Wearelookingfortheoreticalandpracticebasednonpromotionaleditorialcontributions.*

Autumn2025editiondeadlines: Abstractsubmission:18July2025

Fullarticlesubmissiondeadline:2September2025

Publicationdate:6October2025

Winter2025/26editiondeadlines: Abstractsubmission:3November2025

Fullarticlesubmissiondeadline:5December2025

Publicationdate:27January2026

Spring/Summer2026editiondeadlines: Abstractsubmission:27February2026

Fullarticlesubmissiondeadline:15April2026

Publicationdate:28May2026

Abstractsandarticlesshouldbesubmittedbyemailto: editorial@deltabusinessmedia.com

*Feesapplyforpublicationofarticlessubmittedbycommercialand for-proftorganisations.Allarticlesaresubjecttoeditor’sapproval.

“OLD?”C-IEDFORA“NEW?”ALLIEDCONCEPT: THEC-IEDAPPROACHINTHELIGHTOFNATOWARFARE

ByLieutenantColonelJoseMRufas,ChiefofAttacktheNetworksBranch,C-IEDCentreofExcellence

“Yourealizethatourmistrustofthefuturemakesithardtogiveupthepast.” (ChuckPalahniukinhisbook“Survivor”,frstpublishedin1999)

Ifyou,dearreader,havebeenreading abouttheNorthAtlanticTreatyOrganization (NATO),mostprobablyyouwouldbe familiarwithhearing(andevenharderto effectivelyunderstand…)terminologysuch as“comprehensiveapproach”,“countering improvisedexplosivedevices”,“enhanced forwardpresence”,“integratinggender perspectiveasaforcemultiplier”,“attack thenetworks”,“innovationcontinuum”or “greyzone”..

Solately,undertheumbrellaof “counteringhybridthreats”approachandin thecontextoftheNATO“ Warfghting CapstoneConcept”,theNATO“Warfare DevelopmentAgenda”(WDA)framework emerges…

Figure1:Coverof“NATOWarfghting CapstoneConcept”document,as publishedin2021 (Source–www.act.nato.int)

D'oùvenons-nous? Quesommes-nous? ... 1

DespitethestrongfocusoftheAllianceontheRussian threatattheEasternFront,theNATOStrategicConcept

2022wasstillconsideringterrorismasoneofthemain threatsfortheAlliance.

Figure2:Capturefrom“NATOStrategicConcept”page8,aspublishedin2022 (Source–www.nato.int)

Additionally,thelastAnnualReportfromtheNATO SecretaryGeneral(aspublishedsomedaysbefore thepublicationofthisarticle)ismakingdirect referencenotonlytoterrorismbutalsodirectlyto C-IEDandTechnicalExploitation…

Inotherwords:doyouknowaboutanyterrorist groupwhichhasbeen/isnotemployingorwillingto employimprovisedexplosivedevicesasaweapon ofchoice?

Betweenthelines,wecouldreadandunderstand howtheCounteringImprovisedExplosiveDevices (C-IED)approachcouldpersistasabsolutely necessaryevenwithoutanycasualtyasdirectly causedbythedetonationofanyIEDoverallied troops.Infact,C-IEDisbasedontheintegration, synchronizationandcoordinationofactionsseekingfor anticipationinbeneftofthereductionofcapabilitiesof adversaryhumannetworksintheaimofdenyingthem thepotentialmanufactureanduseofthosedevices.

Figure3:Capturedfrom“NATOSecretaryGeneral2024Report”page15,aspublishedinApril2025 (Source–www.nato.int)

1TakenfromthetitleofPaulGauguin´soiloncanvas“D 'oùvenons-nous? Quesommes-nous? Oùallons-nous? ” (WhereDoWeComeFrom?WhatAreWe?WhereAreWeGoing?)aspaintedin1897.

...Oùallons-nous ? 2

TheNATOWarfghtingCapstoneConceptprovides fvewarfaredevelopmentimperativestofocusand synchronizeeffortstodeveloptheAlliancemilitary instrumentofpower(MIoP).

Figure4:NATOwarfaredevelopmentimperatives (Source–www.nato.int)

Oneofthoseimperatives is “CognitiveSuperiority” (akaCOGSUP),whichis describedasthedegree ofdominancethrough possessingandapplying faster,deeperandbroader understandingandmore effectivedecision-making thanadversaries.

Figure5:NATOdescription ofCognitiveSuperiority (Source–www.nato.int)

2TakenfromthetitleofPaulGauguin´soiloncanvas“D'oùvenons-nous?Quesommes-nous?Oùallons-nous?” (WhereDoWeComeFrom?WhatAreWe?WhereAreWeGoing?)aspaintedin1897.

FromaC-IEDperspective,theblocksderivedfrom theconceptforCognitiveSuperiorityhavealways beenconsideredfromtheAttacktheNetworks approach:

•Awareness(sensing)isessentialfordeep knowledgeaboutthethreat,ourowncapabilities, andtheHumanTerrainthroughanalyzingthe cognitiveenvironment.

•Understanding(sensemaking)posesamustfor HumanNetworkAnalysisandSupportto Targeting/Engagement.

•Advantage(acting)fullyimpliesHumanNetwork EngagementandAssessmentsteps.

Nonetheless,themainproblemsforaneffectiveand anticipatoryapplicationoftheC-IEDapproach(So AttacktheNetworks)remainactiveforachievingthe CognitiveSuperiority.Informationcollectionand intelligenceprocessingcapabilitiesneedtobe reinforced,enhanced,andrefned…which,ingeneral terms,hasneverhappenedevenduringtheAllied involvementinAfghanistan,Iraqandsoon.The emergingthreatscenariosunavoidablyrequirean increaseinintelligencecapabilitiesandanevolutionof theprocessesassociatedwiththoseintelligence capabilities!

Ontheotherhand,thedevelopmentofallied initiativesinthefeldofCognitiveWarfare(COGWAR)is directlyassociatedwithCognitiveSuperiorityimperative. FromanAttacktheNetworkspointofview,thecurrent approachtoCognitiveWarfarehasbeenconsidered insidetheessential-to-successnon-lethalactions.

COGWARintegratescyber,information, psychological,andsocialengineeringcapabilities. Theseactivities,conductedinsynchronizationwith otherinstrumentsofpower(sonotonlytheMilitary InstrumentsofPower(MIoP)),canaffectattitudesand behaviourbyinfuencing,protecting,ordisrupting individualandgroupcognitiontogainadvantageover anadversary.Infact,thereisahugeumbrellaof differentemerginganddisruptivetechnologies(EDTs) whichcouldpotentiallysupportCOGWARdevelopment.

Withregardsto

“LayeredResilience”,soasortof comprehensiveandholisticapproachtocollective defenceresilience,itwouldrefertotheabilityofa singlenationandallalliednationstowithstandand recoverfromabroadspectrumofthreatsand challenges.Accordingly,NATOemphasizesthatthe resilienceofeachmembercountrycontributestothe overallstrengthandpreparednessoftheAlliance,but alsothecommoncohesionandunityofeffortis essentialforthat.

Figure6:VisualizationofNATOcognitivewarfareworkingdefnition. (Source-https://doi.org/10.3389/fdata.2024.1452129)

(Source-www.e-arc.ro)

Althoughalayeredresilienceisnotdirectlyrelatedto agenericC-IEDapproach,itispartiallyapplicablefrom AttacktheNetworksperspectivewhenreferringtoboth:

•Thepreparationoffriendlyhumannetworksagainst thepotentialnegativeeffectsfromadversary actions.

•Theeffectivenessofownactionsdeveloped insupportoftheachievementofpositiveeffectsover friendlyhumannetworksinbeneftofstrengthening owncapabilitiesintheaimofunderminingthe potentialdevelopmentofadversarycapabilities.

Fromthecombinationoftheotherthree imperatives(“InfuenceandPowerProjection”, “Cross-DomainCommand” and “Integrated Multi-DomainDefence”)wearriveattheallied implementationoftheconceptforMulti-Domain Operations.

Multi-DomainOperations(MDO)arecurrently defnedbyNATOas“ theorchestrationofmilitary activities,acrossalldomainsandenvironments, synchronizedwithnonmilitaryactivities,toenable theAlliancetodeliverconvergingeffectsatthe speedofrelevance ”.

Afteraninitialreview,MDOconceptismostlybasedon:

•Militaryandnonmilitaryactivitiessynchronization, whichisanotherwayofconsideringtheessential “Interagency”favorofC-IED/AttacktheNetworks.

•Actionsoveralldomainsandenvironments,which havebeenamustforC-IED/AttacktheNetworks fromitsconceptualcreation.

•Integrationofeffectsatthespeedofrelevance, whichistherootoftheapplicationofC-IED/Attack theNetworksapproachintheaimofachieving effectsoverthecapabilitiesofhumannetworks.

Figure7:Structuredvisualizationofthefactorsinfuencingresilienceinthecontextofallieddefence

Figure8:RussianconceptualmodelofbilateralinteractionsbasedonUSAstrategicMDOaggression (Source-www.vm.ric.mil.ru)

Figure9:JointCommand&ControlevolutioninthesightofAll-DomainOperations (Source-www.secrss.com)

Multi-DomainOperationsisanewNATO concept...Areyoureallysure?

Infact,NATOAlliedCommand Transformation(ACT)hasmerely adoptedconcepts(Multi-Domain ExtendedBattlefeldandMultiDomainOperations)whichwere developedbytheUnitedStatesof America(USA)ArmyandMarines Corpsduringlastdecade (althoughfnallypublishedbythe Army).

Ontheotherhand,Russiahas imitatedtheUSAapproachtoMDO throughtheir“многосферной операции,multi-sphereoperations” concept.

Inparallel,Chinaadoptedthe equivalenttoMDO“全域作战 all-domainoperations”approach.

MDOfnallymovesaroundtwo essentialelements:networkcentricwarfare,anddeepstrike capabilitiesasintegratedatthe fvedomains(air,land,sea,space &cyber).

Iftherebenothingnew,butthatwhichis! 3 Firstly,itlookslikethewholespectrumofNATO WarfareDevelopmentAgenda(WDA)isnottoo revolutionaryin2025.

Figure10:Cross-domainintegrationforMulti-DomainOperations (Source–www.imrmedia.in)

3FromtheSonnet59aswrittenbyWillianShakespeare

Secondly,itlooksliketheAlliance(butmostlyits membernations)couldcurrentlynotbereadyfor effectivelyimplementingMulti-DomainOperations,due toboththeNATOlackofaccuracyindefningthe conceptandthehugeeffortinthedevelopmentof intelligenceandoperationsthatMDOwouldrequire.

Thirdly,itseemsthattheMDOapproachisalready implemented(sofullyapplicabletoC-IED)intothe AttacktheNetworksapproachfromitsverybeginning ofexistencein2008.Alongwiththeevolutionofthe emergingthreatsandthepersistenceofIEDasa futureweaponofchoice,thatmakesC-IEDstillvalid andofcoursenecessary.■

“Extinctionistherule.Survivalistheexception.” (CarlSaganinhisbook“TheVarietiesofScientifc Experience: APersonalViewoftheSearchforGod”,2006)

REFERENCES

•(NATO)2019NATOMilitaryStrategy

•(NATO)2020ConceptforDeterrenceandDefence oftheEuro-AtlanticArea(DDA)

•(NATO)2021NATOWarfghtingCapstone Concept(NWCC)

•(NATO)2022NATOWarfareDevelopmentAgenda (WDA)´

•(NATO)2022NATOStrategicConcept

•(NATO)2024SecretaryGeneral'sAnnualReport

•www.e-arc.ro

•www.irsem.fr

•www.japcc.org

•www.tandfonline.com/journals/ucst20

•www.c2coe.org

•www.act.nato.int

•www.fnabel.org

•R.McDermott,“RussianArmedForcesTestMultiDomainOperations”,JamestownFoundation,9 September2020.

•D.Solen,“ChineseViewsofAll-DomainOperations”, ChinaAerospaceStudiesInstitute,August2020

•www.cssas.unap.ro

•www.secrss.com

•UKMoDJointConceptNote1/20“Multi-Domain Integration”(archived) “OLD?”C-IEDFORA“NEW?”ALLIEDCONCEPT

•Ionita,Craisor “THECONCEPTOFMULTI-DOMAIN OPERATIONSANDITSMULTINATIONALUNDERSTANDING” (STRATEGIESXXI: TheComplexand DynamicNatureoftheSecurityEnvironment,186193)2022

Disclaimer

Thisarticledoesnotrepresenttheopinionofanynational ormultinationalorganisation;itswholecontentshould onlybeconsideredastheopinionoftheauthor.Asall informationhasbeenobtainedfromopensources, potentialmistakescouldhavebeenmadeduringthe researchprocess.Pleasefeelfreetosendyour comments,correctionsandinputstotheauthor;theywill behighlyappreciated.

ABOUTTHEAUTHOR

LieutenantColonelJoseMRufas graduatedfrom theSpanishArmyMilitaryAcademyin1993.Hewas commissionedintotheC-IEDCentreofExcellenceas HeadoftheDefeattheDeviceBranchinAugust2016 andcurrentlyholdsthepostofChiefofAttackthe NetworksBranch.AsaMilitaryEngineerOffcer,his backgroundhasbeenmainlybasedonExplosive OrdnanceDisposalactivitiesintheSpanishArmyand C-IEDstaffissuesatthemultinationalheadquarters.In additiontohisEODOperator/EODOffcereducation, heattendedsomeothermilitarycoursesregarding Parachuting,ArmyStaff,InformationOperations,War CollegeGeneral/JointStaff,MilitarySearch,Technical ExploitationOperations,WeaponsIntelligenceTeam, ExploitationLaboratories,HomemadeExplosivesand otherC-IEDcourses.Hisoperationalassignments includeBosniaandHerzegovina(3),Afghanistan(3), theRepublicofEcuador,IraqandUganda. E-mail:jrufas@ciedcoe.org

IMPROVINGUNDERWATERCAPABILITIES: THEIMPACTOFARTIFICIALINTELLIGENCE ONIEDDETECTIONANDIDENTIFICATION

ByMuratAydoğmuş,LieutenantCommander(OF-3)TUR-N,ElectronicWarfareSpecialist, C-IEDCentreofExcellence

INTRODUCTION

DetectingandidentifyingImprovisedExplosive Devices(IEDs)inunderwaterenvironmentspresents signifcantoperationalchallenges.Unliketraditional explosives,IEDsaredesignedinanimprovisedway andoftenactivatedremotely,whichmakesthema continuousthreatinbothmilitaryandcivilianmaritime contexts.Withtheincreasingimportanceand relianceonnavalandoffshoreinfrastructurefor trade,energyproduction,anddefense,theriskposed bytheunderwaterthreathasbecomeacriticalconcern forglobalsecurity.Morerecentincidents,suchasthe detonationoflimpetminesillustratethesignifcantrisks posedbyexplosivesthatcanbemanufacturedwith relativeeaseandevolveintoasymmetricthreats1

DetectingIEDsandotherpotentiallysuspicious underwaterobjectsrepresentsacriticalcomponentof operations. Thesethreatspresentsignifcantrisksnot onlytonavalandcommercialassetsbutalsotohuman life. Ensuringthesafeidentifcationandhandlingof suchunderwaterhazardsisthereforeofgreat importance.Traditionaldetectionmethods,suchas sonarscanningandmanualdiverinspections,have proventime-consuming,labor-intensive,andrisky, particularlyindeep-seaenvironmentsorareaswith

poorvisibility.Advancementsinartifcialintelligence (AI)haverevolutionizedthefeldofunderwaterthreat detection.ToolsdevelopedwithAIsupporthave improvedtheprecisionandeffectivenessofdetecting underwaterobjects 2 .Deeplearningmodelstrainedon extensivesonarandopticalimagedatasetscanquickly identifypossiblethreats,minimizefalsealarms,and enhanceoverallsituationalawareness.Additionally, AutonomousUnderwaterVehicles(AUVs)equipped withAI-drivennavigationandobjectrecognition capabilitiescanautonomouslypatrolhigh-riskareas, minimizingtheneedforhumandiversandenhancing operationalsafety.Researcheffortsaroundtheworld havefocusedondevelopingAI-supportedsonar processingtoimprovedetectioncapabilitiesin complexmarineenvironments 3

Asunderwaterthreatscontinuetoevolve,the integrationofAIsolutionsremainsanimportantaspect ofmodernnavaldefenseandmaritimesecurity.This articleexaminesthetechnologicaladvancementsinAIaideddetectionandidentifcationofsmallunderwater targetsorthreatswithanemphasisonIEDs, highlightingthebenefts,challenges,andfuture potentialofthesesystems 3

TRADITIONALMETHODS

TodetectandclassifyunderwaterIEDsorpotential suspiciousobjects,therearesometraditional approacheslikeusingsonarscanningandanalysing thescreen,magneticanomalydetection(MAD),diverbasedinspections,andremotelyoperatedvehicles (ROVs).Theprimarytechnologyusedforunderwater detectionissonarsystems.Sonardevicesrelyon soundwavestodetectobjectsorthreatsunderwater becauseelectromagneticwavesareheavilyabsorbed andattenuatedbywater,makingthemineffectivefor communicationordetection.

Sonardeviceshavedifferentmonitoringtechnology accordingtothesystem'sactiveorpassiveoperation mode.Whilepassivesystemsareusedtolistentothe environmentwithoutanyemissions,activesystems sendoutpulsesandreceivetherefections.Inthis article,exampleswillbegivenfromactiveandhighresolutionsonarsystems.Althoughtherearedifferent kindsofsonarsystemsusedforunderwatermonitoring likemulti-beamechosounders,forward-lookingsonar, side-scansonar(SSS),andsyntheticaperturesonar (SAS)systems,theuseofSSSandSASoperationwill bebriefyexplainedinthisarticle.Bothsonar systemsprovidedetailedimagesoftheunderwater environment.

Magneticanomalydetection(MAD),ontheother hand,identifeschangesintheEarth'smagneticfeld causedbymetallicobjects,andthesesystemsare usedtraditionallytodetectanomaliesandpotential underwatertargets 4 .WhileMADisparticularlyuseful fordetectingmetal-basedthreats,itislesseffective whenitcomestonon-metallicIEDs.

SonarSystemOperations:

Theunderwaterenvironmentposesmanychallenges becauseofthecomplexcharacteristicsofwater. Severalsonartechnologiesareusedforseabed scanningandsmallobjectdetection,andthese systemstypicallyoperateathigherfrequencies,which allowsforhigh-resolutionimaging.

Inthetraditionalapproach,detectingsmallobjects reliesheavilyonmanualanalysisofsonarimages,a processthatistime-consumingandhighlydependent

ontheskilloftheoperator.Thisdependencecanlead toinconsistentoutcomesandlimitsscalability, particularlywhenlargeamountsofdataneedtobe processed.Theinherentcomplexityoftheunderwater environmentaddsanadditionallayerofdiffcultyto detectionoperations 5 .Factorssuchasnoise,clutter, andvaryingseabedconditionsmakeitdiffcultfor operatorstoaccuratelyidentifyobjectsmanually.

a.SideScanSonar(SSS):

SSSisanimportanttoolfordetectingunderwater objects,includingIEDsandothersmallobjectsonthe seabed.SSSworksbyemittingconicalorfan-shaped pulsesthataredirecteddownwardtowardtheseabed atawideangle,perpendiculartothesensor'spath throughthewater.Thesensorcanbetowedbehinda surfacevesselorsubmarine,oritcanbemountedon theship'sorunmannedvehicle’shullformore stationaryscanning.

Thesonaremitssoundwaves,whichinteractwith theseafoorandanyobjectsrestingonorburiedwithin it.Thesesoundwavesrefecttothesonarsystem,and theintensityoftheseacousticrefectionsisrecorded. Theresultingdataiscapturedinaseriesofcross-track slices,whichcanthenbeanalyzedtoreveal anomaliesontheseafoor.

Thissonarisusefulfordetectingmetallicobjects likeunderwatermines,IEDs,anddebris,asthese typicallyproducestrongacousticrefections.However, side-scansonarcanalsodetectnon-metallicobjects whentheirshapeanddensityexhibitsignifcant contrastrelativetothesurroundingenvironment.For example,irregularitiescausedbyburiedobjectsor disruptionsintheseafoorstructuremightindicatethe presenceofIEDs,whichareoftenburiedor camoufaged 6 .

b.SyntheticApertureSonar(SAS):

SASisalsoapowerfultoolforobtaininghighresolutionunderwaterimagesandtheycanalsobe usedfordetectingtheobjectslikemines,underwater IEDsorotherpotentialobjects.SAS,whichismounted onaUUV,movesalongatrackandsynthesizesa muchlargervirtualarrayfrommanypings.It

continuouslyrecordsbackscatteredsignalsfromthe seafoorortheobjects.Thesystemcoherently combinestheechoesreceivedatdifferentpositions, effectivelysynthesizingalargeaperture.Muchfner resolutionisobtainedwithSAS 8

RegardingthedetectionofIEDsorsmallburied objectsunderwater;theyoffermoredetailedimageryof theseafoorandlargeareasarescannedeffciently withhigh-resolutionoutputs.

MagneticAnomalyDetection(MAD)Operations: MADsystemsutilizesensitivemagnetometers designedtodetectperturbationsintheEarth's magneticfeldinducedbythepresenceofferrous objects9.Normally,theEarth’smagneticfeldisquite stable,andnaturalunderwatermaterialslikesandor waterdon’taffectitmuch.Butwhenthereisametal object–likeaminecasingorpartsofanIED–itmight createasmall disturbanceinthemagneticfeld.

Figure1:IllustrationofSSSOperation 7
Figure2:IllustrationofSASOperation 8

MADsensorsareusedtodetectthesedisturbances, knownasmagneticanomalies.MADsensorscanbe attachedtoships,underwaterdrones,orevenaircraft fyinglowovershallowwaters.Asthesensormoves,it constantlymeasuresthemagneticfeld.Ifitdetectsan unusualmagneticsignal,itmarksthatlocationasa potentialthreat.ThisisespeciallyusefulwhenIEDsare madewithmetalparts,andMADcanhelpfndthem eveniftheyareburiedundertheseabedornotvisibleon sonarimages.That’soneofthebiggeststrengthsof MAD–itcandetecthiddenobjectsincluttered underwaterenvironments.

However,whileMADisgreatfordetectingwherea metallicobjectmightbe,itdoesn’ttelluswhattheobject is.Arockanchor,anoldpipe,oraminemightall producesimilarmagneticsignals.So,onceMADfnds somethingsuspicious,othertoolslikesonar,cameras, ordiversareusuallyneededtotakeacloserlookand identifytheobject.Thegreatestlimitationsarethatsmall deviceshaveaweakermagneticfootprint,MADonly workseffectivelyatcloserange,andsmallanomalies areonlynoticeablewhenbackgroundmagnetic noiseislow.

AISUPPORTINUNDERWATERMONITORING

Inthetraditionalapproach,operatorsvisuallyinspect thehigh-resolutionsonarimagery,andtheylookfor shapes,shadows,textures,andothercuestoidentify potentialthreatslikeIEDsormines,whichisvery dependentonexperienceandfamiliaritywithunderwater environments.

Inthefeldofunderwatertargetdetectionand identifcation,AIoffersatransformativealternativeto traditionalmethodsbyenablingautomatedprocesses thatreduceorminimizehumanintervention.Unlike traditionalapproaches–whichoftenrelyonmanual analysis,andanoperator-dependentdecision-making–AI-basedsystemsutilizedata-drivenmodelsto autonomouslydetectandidentifyunderwaterobjects. Thisshiftisparticularlysignifcantwhenconsideringthe complexanddynamicnatureoftheunderwater environment,wherefactorssuchaslightabsorption, turbidity,backgroundclutter,andnoisesubstantially hinderimageclarityandobjectvisibility.

TheeffectivenessofAIinsuchscenariosisheavily dependentonthequalityoftheinputdata.Obtaining high-resolution,noise-freeimageryisessentialfor accuratedetectionandreliableidentifcation. However,duetoenvironmentalconstraints,such idealconditionsarenotalwaysachievable. Therefore,duringthealgorithmdevelopmentphase, preprocessingtech-niquessuchasdenoising, contrastenhancement,andsuper-resolutionplaya criticalroleinpreparingthedataforsubsequent analysis.Thesepreprocessingstepsnotonly improvethevisualqualityoftheimagesbutalso enhancetheperformanceofAImodelsbyensuring thatessentialfeaturesarepreservedand emphasized.

Inaddition,thevarietyandrichnessofadatasethave adirectimpactonhowrobustandgeneralizablethe trainedmodelsare.Whenadatasetcoversdiverse objectappearances,angles,environmentalscenarios, andsensortypes,itallowsAIsystemstolearnmore detailedandrepresentativefeatures.Asaresult,this enhancesdetectionperformanceandlowersthe chancesoffalsealarmsormisseddetections.

Inrecentyears,therehasbeenincreasinginterestin utilizingdeeplearningapproaches–likeconvolutional neuralnetworks(CNNs)andtransformer-basedmodels –forautomaticallydetectingandclassifyingobjectsin underwaterenvironments.Thesetechniqueshave demonstratedstrongpotentialinrecognizingpatterns andirregularitiesthatmightbechallengingforhuman observerstodetect.EventhoughIEDsaretypically non-standardinshapeandcompositionsincetheyare constructedusingimprovisedandunpredictable methods,AI-basedapproachescanstillprovide valuableinsights.Whiletheymaynotalwaysdeliver defnitiveidentifcation,theyarehighlyeffectivein faggingpotentialthreatsanddrawingtheoperator’s attentiontoregionsofinterest.

Ultimately,theintegrationofAIintounderwater detectionsystemsenhancessituationalawareness, operationaleffciency,anddecision-making capabilities.Bycombininghigh-qualitydata acquisition,advancedpreprocessingtechniques,and powerfulAIalgorithms,itbecomespossibleto

developrobustsystemscapableofperforminginrealtime,evenunderchallengingconditions.Thisnotonly increasesthesafetyofunderwateroperationsbut alsoreducesthecognitiveloadonhumanoperators, enablingmorefocusedandinformedassessmentsof suspiciousobjects.

Althoughthisarticledoesnotaimtoexplorethe technicalbackgroundindepth,itisimportantto highlightthatsignifcantresearchhasbeendedicatedto theautomaticdetectionofunderwaterobjects.These studiesspanabroadmethodologicalspectrum, encompassingsingle-stagedetectionmodels,twostagedetectionframeworks,andmoresophisticated multi-stagesystems.

Single-stagemethodsintegrateobjectlocalization andclassifcationintoaunifedpipeline,enablingrapid inferenceandmakingthemparticularlyadvantageous forreal-timeapplicationsandresource-constrained, modularsystems.Conversely,two-stageandmultistageapproachesintroduceintermediateprocessing steps–suchasregionproposal,candidatefltering,and refnedclassifcation–that,whilecomputationallymore demanding,oftenyieldhigherdetectionprecisionand robustness,especiallyincomplexorvisuallycluttered underwaterenvironments 10 .

Variousalgorithmshavebeendevelopedwithin eachofthesemethodologicalcategories,andthe researchcommunitycontinuestoexplorenovel techniquesandarchitecturesinpursuitofimproved performance.Theseeffortsrefecttheintrinsic challengesposedbytheunderwaterdomain,where visibilitylimitations,sensornoise,andtheirregular, non-standardizedconstructionofIEDscomplicate reliableidentifcation.Assuch,thereisnosingle superiorapproach;rather,eachmethodofferscontextspecifcadvantages,andtheirrelativeeffectivenessis oftendeterminedbyoperationalconstraintssuchas processingtime,hardwarecapabilities,andmissioncriticalrequirements.

Inthiscontext,theongoingdevelopmentofAI-driven detectionsystemsisofparticularsignifcance.Even whendefnitiveclassifcationofanobjectasanIEDis notimmediatelypossible,theabilitytoautomatically faganomalousorsuspiciousitemscontributes

IMPROVINGUNDERWATERCAPABILITIES

substantiallytoenhancingoperatorsituational awarenessandfacilitatingmorefocusedhuman analysis.Therefore,thequality,speed,andadaptability ofthedetectionalgorithmsplayacrucialroleinthe overalleffcacyofunderwatersurveillanceand securityoperations.

Amongmorerecentapproaches,theintegrationof advancedpayloadsystemsonunmannedunderwater vehicles(UUVs)hassignifcantlyenhancedtarget detectioncapabilities.Theseplatformsare increasinglyequippedwithbothopticalandsonar imagingtechnologies11,enablingthecollectionof comple-mentarydatasets.Byapplyingmulti-modal datafusiontechniques–whereopticalimagery provideshigh-resolutiondetailandsonarimaging offersgreaterpenetrationinturbidorlow-visibility environments,theoverallaccuracyandreliabilityof underwaterdetectionsystemscanbesubstantially improved.

Thissynergisticuseofsensormodalitiesallowsfor amorerobustassessmentofsubmergedobjects, particularlyincomplexanddynamicunderwater conditions.Asaresult,suchtechnological advancementscontributetosaferandmoreeffective operations,whetherinmilitaryreconnaissanceor counter-IEDmissions.

Asanexample,limpetminesusedasunderwater IEDsaretypicallyrudimentaryandconstructedwith readilyavailablematerials,makingthemdiffcultto detectordefendagainst.Theimprovisednatureof thesedevicesmeansthattheymaylackthe sophisticatedtriggeringmechanismsofstandard militarymines,butthisalsomakesithardertotrace andneutralize12.Theseminesmaybemanually placedbydiversordeployedusingUUVs,making theirdetectionandidentifcationachallenge.Theuse ofAI-drivensystemstodetectandidentifysuch underwaterIEDs,includinglimpetmines,byutilizing advancedsonarimagingandopticaltechnologiesisa verygoodapplicationarea.Asitwasstated,when fusedtogether,thesetechniquesoffergreater accuracyindistinguishingbetweenbenignobjects andpotentialthreats,contributingtosaferoperations innavalenvironments.

CONCLUSION

Inrecentyears,therehavebeenmanyresearchtopics concentratedonleveragingAI-supportedsystemsfor underwaterobjectdetection.Theprimarygoalofthese studiesistoimprovesituationalawarenessandensure saferoperationsbyminimizingtheneedforhuman interventioninriskyunderwaterenvironments.The effectivenessoftheseautomateddetectionsystems heavilydependsonthevolumeanddiversityofthe trainingdata,asricherandhigher-qualitydatasetsallow AImodelstoperformmorereliablyacrossdifferent environmentsandobjectvariations.

AlthoughtheimprovisednatureofIEDs–characterizedbytheirunpredictableshapes,materials, anddeploymentmethods–posessignifcantchallenges forreliableidentifcation,theapplicationofAI-supported toolsplaysacriticalroleindrawingattentionto potentialunderwaterthreats.Ultimately,minimizing humanexposurewhilemaximizingdetectionreliability throughautomatedsystemsnotonlyimprovessafetybut alsostrengthenstheoveralleffectivenessofunderwater threatmitigationstrategies.■

REFERENCES

1TheMaritimeExecutive,"Ambrey:TankeratUst-LugaMay HaveBeenHitWithLimpetMines,"TheMaritime Executive,Feb.12,2025.[Online].Available: https://maritimeexecutive.com/article/ambrey-tanker-at-ust-luga-may-havebeen-hit-with-limpet-mines

2M.Kanguya,"SmartOceans:TheRiseofAIinDeep-Sea Exploration,"TheFutureList,Feb.2025.[Online].Available: https://www.thefuturelist.com/smart-oceans-the-rise-of-ai-indeep-sea-exploration/

3M.Aubard,A.Madureira,L.Teixeira,andJ.Pinto, “Sonar-basedDeepLearninginUnderwaterRobotics: Overview,RobustnessandChallenges,”arXivpreprint arXiv:2412.11840,2024.[Online].Available: https://arxiv.org/ abs/2412.11840

4Clem,T.;Allen,G.;Bono,J.;McDonald,R.J.;Overway,D.; Sulzberge,G.;Kumarb,S.;King,D.Magneticsensorsfor buriedminehuntingfromsmallunmannedunderwater vehicles.InProceedingsoftheOceans’04MTS/IEEE Techno-Ocean’04(IEEECat.No.04CH37600),Kobe,Japan, 9–12November2004;Volume2,pp.902–910.

5 F.Zhao,B.Huang,J.Wang,X.Shao,Q.Wu,D.Xi,Y.Liu, Y.Chen,G.Zhang,Z.Ren,J.Chen,andK.Mizuno, "Seafoordebrisdetectionusingunderwaterimagesand deeplearning-drivenimagerestoration:Acasestudyfrom

KohTao,Thailand,"MarinePollutionBulletin,vol.214, 117710,2025.[Online].Available: https://doi.org/10.1016/ j.marpolbul.2025.117710

6NOAAOceanExploration,"ExplorationTools:Side-Scan Sonar,"NOAAOceanExplorer.[Online].Available: https://oceanexplorer.noaa.gov/technology/sonar/sidescan.html [Accessed:Mar.24,2025].

7RobertWilsonMarineTechnologies(RWMT),“Side-Scan Sonar,”RWMTSurveyingTools.[Online].Available: https://www.rwmt.se/surveying-tools/side-scan-sonar [Accessed:Mar.24,2025].

8R.Edgar,“IntroductiontoSyntheticApertureSonar,”inSonar Systems,InTechOpen,2011.[Online].Available: https://cdn.intechopen.com/pdfs/18868/InTechIntroduction_to_synthetic_aperture_sonar.pdf

9CAE,"MagneticAnomalyDetectionExtendedRole (MAD-XR),"CAE,Mar.2023.[Online].Available: https://www.cae.com/media/media-center/documents/ datasheet.MAD-XR.pdf

10SharkYun,"ComputerVision—ObjectDetection,One-Stage vsTwo-Stage,"Medium,Oct.31,2024.[Online].Available: https://sharkyun.medium.com/computer-vision-objectdetection-one-stage-vs-two-stage-b05dbff88195

11Kim,H.-G.;Seo,J.;Kim,S.M.UnderwaterOptical-Sonar ImageFusionSystems.Sensors2022,22,8445. https://doi.org/10.3390/s22218445.

12J.D.Caverley,"FromtheEditors,"NavalWarCollege Review,vol.77,no.3,pp.1–2,Summer/Autumn2024. [Online].Available: https://digital-commons.usnwc.edu/cgi/ viewcontent.cgi?article=1756&context=nwc-review

ABOUTTHEAUTHOR

LieutenantCommanderMurat Aydoğmuş wascommissionedinto theC-IEDCentreofExcellenceasa C2ElectronicWarfareSpecialistin theDefeattheDeviceBranchin August2023.Afterassumingthis position,heorganizedthe6thNATO C-IEDTechnologyWorkshopin Seville,Spain,in2024.Heholdsmaster’sdegreein ElectricalEngineeringandEngineeringAcousticsfrom theNavalPostgraduateSchool.Hisbackgroundis primarilybasedonmaritimeprojectsandresearchand developmentactivitiesinthemaritimedomain.Heis currentlypursuingPhDstudiesinunderwatertarget detectionusingmoderndeep-learningmodels.

Email: maydogmus@ciedcoe.org

INFRASTRUCTUREANDCOMMERCIALPROJECTS: EOCLEARANCEANDRISKMANAGEMENT

INTRODUCTION

InternationalMineActionStandards(IMAS)have becomethebenchmarkforhumanitarianmine actionsincetheywerefrstintroducednearlya quarterofacenturyago.Yettheydon’tftexactly intocommercialclearancework.

Theaimofthispaperistoexplorethe differencesbetweenhumanitarianand commercialperspectives,howtheybothinfuence attitudestotheclearanceofcommercialprojects andinfrastructure.Thepaperalsomakes recommendationsonbestpracticeforEOrisk managementoninfrastructureandcommercial projects,drawingontherelevantelementsof IMASwherepossible.

THEHUMANITARIANPERSPECTIVE

Itmaybeusefultostartwithadefnitionof‘humanitarian’.For thisitispossibletorefertotwodifferentUnitedNations(UN) GeneralAssemblyresolutions,namely:

•46/182(19Dec1991)

•58/114(5Feb2004)

Thesedescribehumanitarianactionashavingfour principles,whichare:

•Neutrality

•Humanity

•Impartiality

•Independence(added2004)

Theprincipleshavebeendefnedinanelaborationby theUNOffcefortheCoordinationofHumanitarianAffairs (OCHA)1,assetoutin Table1 below.

Humansufferingmustbeaddressedwheneveritisfound.Thepurposeof humanitarianactionistoprotectlifeandhealthandensurerespectforhumanbeings. “whereveritisfound”

Humanitarianactorsmustnottakesidesinhostilitiesorengageincontroversies ofapolitical,racial,religiousorideologicalnature. 3 Impartiality

Neutrality

Humanitarianactionmustbecarriedoutonthebasisofneedalone,giving prioritytothemosturgentcasesofdistressandmakingnodistinctionsonthe basisofnationality,race,gender,religiousbelief,classorpoliticalopinions

“Onthebasisofneed alone” 4 Independence

Humanitarianactionmustbeautonomousfromthepolitical,economic,militaryor otherobjectivesthatanyactorsmayholdwithregardtoareaswhere humanitarianactionisbeingimplemented

Table1.OCHAelaborationonhumanitarianaction.

“Humanitarianactionmust beautonomousfrom… economic…objectives”

1 Source:OCHAonMessage:HumanitarianPrinciples,November2011 https://www.unocha.org/sites/unocha/fles/dms/Documents/v.2.%20website%20overview%20tab%20link%202%20Humanitarian%20Principles.pdf

Whenonealsotakesintoaccountthelanguageof the1997Anti-PersonnelLandmineBanConvention (APMBC),andthe2008ConventiononCluster Munitions(CCM),thereisaclearrequirementtoclear all contamination.Forexample,CCMsaysinArticle4:

“EachStatePartyundertakestoclearand destroy,orensuretheclearanceand destructionof,clustermunitionremnants locatedinclustermunitioncontaminatedareas underitsjurisdictionorcontrol…notlaterthan tenyearsfrom[itsentryintoforce}.

Itisgenerallyacceptedthattheonlylimitationon humanitarianmineactionistheavailabilityoffunding. Muchofthefocusofhumanitarianmineactionhas thereforebeenonfundraising.However,thisimperativeto clearallcontaminationdoesnotapplytocommercial projects,which,bytheirverynature,willonlybeinterested inclearingcontaminationrelevanttotheiractivities.

THECOMMERCIALPERSPECTIVE

Defnitions

Whenexploringthecommercialperspective,itisworth defningnon-proftandfor-proftorganisations.These defnitions,fromtheUnitedStatesChamberof Commerce2,aresetoutin Box1 below.

• Non-proftorganisations. Anon-proft organisation hasalegallyapprovedpurposeorsocialcause beyondproftgeneration.Theorganisation’s incomeisnotdispersedtoanyshareholdersbut insteadisinvestedbackintotheorganisation.

• For-proftorganisations. Afor-proftcompanyis anorganisationthatexiststoearnaproft.These entitiesdonothavelegalobligationsdictating wheretheirproftgoes.Instead,theycandisperse thefundsamongtheownersandemployeesor spendithowevertheychoose.

Box1.Defnitionsofnon-proftandfor-proftorganisations.

Itshouldalsoberememberedthatnon-proftandforproftorganisationsarelikelytohavedifferenttax obligations,dependingon(a)wheretheyare registeredand(b)wheretheyareworking. Therearethreeotherusefulconceptsthatare usefullydefnedhere.Theseare‘infrastructure’3 and theeconomicconceptsof‘publicgood’4 and‘market failure’5.Thesearedefnedin Box2 below.

• Infrastructure. Thebasicsystemsandservices, suchastransportandpowersupplies,thata countryororganisationusesinordertowork effectively.

• Publicgood. Apublicgoodcanbedefnedas a commodity orservicethatisprovidedwithout profttoallmembersofasociety,eitherbythe governmentorbyaprivateindividualor organisation.

• Marketfailure. Asituationinwhichamarketdoes notoperateasitshould,forexamplewherethe supplyofaproductisnotrelatedtothelevelof demandforit.

Box2.Defnitionsofinfrastructure,publicgoodandmarket failure.

Economicperspectiveonmineaction

Takingallofthesedefnitionstogether,humanitarian mineactioncanbedescribedasaformofmarket failure,asitisaproductwheretheintended benefciaryisnotthecustomer.Notleastbecause mostbenefciariescouldnotaffordtomeetthefullcost oftheservices.Commercialmineactionactivities,on theotherhand,haveaconventionalbuyer-seller relationship.Thesetwomodelsarerepresented graphicallyin Figure1 below.Infrastructureprojects maybepublicgoodsasdefnedin Box2 above,but, aswillbediscussedbelow,theyshouldberegardedin thesamelightascommercialprojectsinthatthey requirefocused,project-orientedactionratherthanthe clearanceofallEOcontamination.

2 https://www.uschamber.com/co/start/strategy/nonproft-vs-not-for-proft-vs-for-proft

3 https://dictionary.cambridge.org/dictionary/english/infrastructure#google_vignette

4Source: https://languages.oup.com/google-dictionary-en/

5 https://dictionary.cambridge.org/dictionary/english/market-failure

Figure1.Behaviourofthemarketin(A)commercialor(B)humanitarianmineaction.

Landneededbyhouseholdsfor subsistenceandlivelihoods Directfromprojectfunds,atno chargetobenefciaries

Villageschools,ponds,wells,etc 3 State-owned infrastructure

Publiclyownedinfrastructure (suchasroadnetworks)which havetheirownmaintenance andrefurbishmentbudgets

Privately-ownedlandorfacilities (beyondthosecoveredbySer1) wheretheproftfromoperationis heldbytheowners.

NGOdoestheworkonacost recoverybasis,chargedtothe infrastructureproject,withinoverall prioritysettingprocessandprogram scope

TheNGOwilldotheworkonacost +(perhaps10%)basis.Profts treatedasperlegalrequirementin countryofincorporation.

Therefore,using thesedefnitions,there isnoobjectivereason whycommercialmine clearanceorganisations cannotundertake humanitarianclearance projects,orindeedwhy mineactionNGO shouldnotbidon commercialprojects. Bothtypesof organisationwillhave differentlegalandtax liabilitiesofcourse,but thosearebeyondthe scopeofthispaper. Somethoughtsonhow NGOshouldtreattheir pricingofcommercialor infrastructurebidsare neverthelesssetoutin Table2 below.

CostscalculatedusingtheNGO’s standardbudgetingprocesses

Forlargeprojects(over$100,000),it isrecommendedthatseparate teamsnotfundedbyhumanitarian budgetsshouldbeused.

Largercommercialprojectsmayalso needapprovalbytheNGOboard.

Notes:

1.ThisfgureisfromstandardWorldBankestimatesofthelandneededbyruralhouseholdsinSouth-EastAsia.Thisfguremayvarydependingonthe carryingcapacityoflandinothercountries.However,thisfgureshouldbeusedunlessalternativeplanningdataisavailable.

Table2.NGOclearanceofinfrastructureorprivateland:possiblepricingarrangements

Economicperspectivesonprojectmanagement

Commercialandinfrastructureprojects,whetherthey beprivateorpublicsector,aregovernedtoaverylarge degreebythereturntheywillbringontheirinitial investment.Thisreturnismeasuredbyanumberof economicconceptsincluding:

•Thediscountrate

•Internalrateofreturn(IRR)

•NetPresentValue(NPV)

Briefdefnitions6 ofthesearegivenin Box3 below.

• Discountrate:arateofinterestthatyouuseto calculatethepresentvalueofanamountofmoney thatyoureceiveorpayinthefuture.

• Internalrateofreturn:theaverageamountof moneyearnedeachyearfromaparticular investment,calculatedbycomparinghowmuch moneyitmakeseachyearwiththeoriginalamount invested.

• Netpresentvalue:Thepresentvalueofan investment'sfuturenetcashfow(= difference betweenthemoneycominginandgoingout)after thecostoftheoriginalinvestmenthasbeen subtracted.

Box3.Economictermsusedinprojectmanagement.

Thekeypointsfromthesedefnitionsarethat(a) costspaidforusingtoday’smoneyand(b)today’s moneyisworthlessthantomorrow’smoney. Furthermore,becauseclearanceistypicallya preliminaryactivityitisparticularlyexpensive.A graphicalrepresentation7 ofthedecreasingvalueof moneyovertimeisshownat Figure2

Thus,anydemandbycommercialprojectswill dependontheirexposuretorisk.Thisisdiscussedin moredetailbelow.

Aformaldefnitionofrisk

Peopleoftenusetheterms‘risk’,hazard’and‘threat’ interchangeably.However,riskisamathematical conceptandassuchhasaformaldefnition.IMAS 04.108 givesaversionofthatdefnition,whichittakes fromISOGuide51:1999:

A“combinationoftheprobabilityofoccurrence ofharmandtheseverityofthatharm”.

Expressedformally,thistakesthefollowingform: R=f(ip,os)

Figure2.Anexampleoftheeffectofdiscountingonthefuturevalueofmoney.

6 https://dictionary.cambridge.org/

7 https://www.fnyear.com/On-Investors-and-Discount-Rates_a35557.html

8 https://www.mineactionstandards.org/standards/04-10/

9 https://data.unsaferguard.org/iatg/en/IATG-02.10-Introduction-risk-management-IATG-V.3.pdf

WhereR=risk,ipistheprobability oftheincidenceandOsistheseverity oftheoutcome.Practicallyspeaking, riskcanalsobeconsideredafunction ofhazardplusactivity:itdoesn’t matterhowcontaminatedanareaisif nobodygoesthere(fromarisk perspective).

Thiscanbeusedinsomething calledan‘expectedmonetaryvalue’ (EMV)calculationwhichcanbeused tocomparethecostoftakinga precautionwiththepotentialcostofan outcomeshouldthatprecautionnotbe taken.UseofanEMVcalculationis explainedinmoredetailin InternationalAmmunitionTechnical Guidelines(IATG)02.109 Para15.1.

Attitudestorisk

Riskcalculationshelpdetermine aproject’sexposuretorisk. However,theydonotfully explainpeople’s(orinstitutions’) attitudestorisk.Thesegenerally rangefromrisk-aversetorisk seeker,butonmanyoccasions thecommercialmineaction serviceproviderencounters clientswhoaretolerantof thepotentialriskfromEO contamination. Figure3 sets outagraphicalrepresentationof thespectrumofdifferent attitudestorisk10.

Incidentally,thosefamiliarwith theprovisionofexplosive ordnanceriskeducation(EORE) willrecognisewherethe twocategoriesofrisk-taking behaviour11 (theintentionaland thereckless)ftonthis spectrum.

Itmayseemstrangeto outsidersthatanycommercial projectcouldbetolerantofa riskfromEO.Theprinciples behindprojectfnanceand EMVgosomewaytoexplain that.Mineactionisan expensive,up-frontactivityto manageahazard(EO)that maynotactuallyimpactthe projectandmaynotactuallyevenbepresent. However,thereisanotherdimension,whichisthatEO posesdifferenttypesofrisk,notallofwhichactinthe samedirection.Thisisbestexplainedusingthe‘Bow Tie’riskmanagementtool12,assetoutin Figure4.

Figure4.AssemblingtheEOriskbowtie(1).Identifyingthepotentialconsequences.

alsogivesausefuldefnitionofhazard,whichitalso takesfromISOGuide51:1999: A“potentialsourceofharm”.

Ina‘bowtie’riskdiagrameverythingstartsatthe centrewiththehazardandtheincident.IMAS04.10

Italsodefnesincidentthus: “aneventthatgivesrisetoanaccidentorhas thepotentialtoleadtoanaccident”.

10 https://www.managementyogi.com/2022/04/risk-attitude-and-risk-attitude-spectrum.html 11FirstsetoutinaUNICEFhandbookin2005.

12 https://www.gov.uk/government/news/bowtie-a-visual-tool-to-keep-an-overview-of-risk-management-practices

Figure3.Thespectrumofdifferentattitudestorisk.

Inthiscontext,thehazardisthe(potential)presence ofEOandtheincidentisanincidentarisingfrom contactwiththatEO.Atfrstitisonlynecessarytoset outtheright-handsideofthe‘bowtie’,namelythe consequences.Theleft-handsidecanbecompleted later.Thesecanbeseparatedintothreedifferent potentialconsequences,whicharedefnedbelow:

• Physicalrisk. Death,injuryordamagetoproperty orequipmentarisingfromanEOincident.

• Projectrisk.Delaysoradditionalcostsarising fromanEOincident

• Reputationalrisk.Thedamagetoaprojectora projectimplementer’sreputationamongstrelevant stakeholders,arisingfromanEOincident,with potentialtoaffectfutureengagement(suchasthe allocationoffuturefundingortheawardingof subsequentcontracts).

Whereasbothphysicalandreputationalriskwould tendtomakeaprojectmoreriskaverse,projectrisk (asdefnedhere)hasthepotentialtopullinboth directions.Projectmanagersmustdecideonthe balanceofriskbetweenthecostofpreventativeaction andthepotentialcostofanincidentandforunplanned delays.Thisisexacerbatedbythehighercostof preliminaryactivitiesasdescribedinthediscussions ondiscountingabove.Thepotentialimplicationofthis needtobalancerisksisillustratedinthecasestudy describedin Box4 below.

Aninternationalpharmaceuticalcompanywas consideringundertakinganorganicmedicinalplant agribusinessprojectinacountryinSouth-EastAsia. Theirrepresentativeshadheardaboutthepotential riskofEOcontamination(theplannedprojectsite wasinthegeneralareaoftheformerHoChiMinh Trail)andtheyapproachedacommercialdemining companyforadvice.

Thecommercialdeminingcompanygaveaquote forfullclearanceoftheentiresite.Thequotedcost fortheclearancemeantthattheagribusiness projectwouldnolongerbeproftableandtheproject didnotproceed.

Box4.ArealcasestudyoftheeffectofEOclearancecosts onacommercialproject.

13 https://www.iso.org/standard/65694.html

Theexampleassetoutin Box4 aboveacritical thingaboutclearanceofcommercialprojects(or infrastructure).Unlikehumanitarianprojects–especiallyonesfocussedoncompliancewiththetwo conventions–clearanceperseisnotthefocus;rather, EOclearanceisanenablertoallowthewidergoalsof theprojecttobeachievedinasafeandtimelymanner. ThefocusofEO-relatedactivitiesonthiswiderproject Schwerpunktwillbediscussedinmoredetailinthe sectionon‘scopeofworks’below.

Onefnalpointthatshouldbeintroducedhereisthe questionofliability.Thisisnottheplacetodiscussthe legalaspectsofriskandinanyeventaproject’slegal exposurewillvarydependingontherelevantnational laws.Butingeneral,itisreasonabletosaythatboth physicalriskandreputationalriskwillenterinto considerationsofliability.

Managingrisk

Theperspectiveofthemineactionsectoronthe managementofriskissetoutinIMAS07.14.However, itissuggestedthatthisislargelyseenthroughthe humanitarianlens.

Mineactionpractitionerswillrecognisethatthe commercialdeminingcompanydescribedin Box4 presentedafalsedichotomytotheirpotentialclient. Fullclearancewasnottheonlyoptionavailable.Arisk managementapproachcouldhavebeentaken.Before thisriskmanagementapproachisdiscusseditis necessaryagaintointroducesomedefnitions,drawn fromtheInternationalStandardsOrganisation(ISO)13, asfollows:

• Riskanalysis.Riskanalysisisthe‘systematicuse ofavailableinformationtoidentifyhazardsandto estimatetherisk’.

• Riskassessment. Riskassessmentisthe‘overall processcomprising[riskidentifcation,]arisk analysisandariskevaluation’.Somesources interchange‘analysis’and‘assessment’.

• Riskevaluation.Riskevaluationisthe‘process basedonriskanalysistodeterminewhetherthe tolerablerisk[willbe]achieved’.

• Riskmanagement.Riskmanagementisthe proactivecontrolandevaluationofrisksvia policiesandmanagementdecisions.

Theoverallriskmanagementprocesscanbe representedgraphically,asshowninFigure5below.

Insomecountries,therearealreadyregulations and/orbestpracticeguidesarealreadyinplace.For example,intheUnitedKingdomtherearetwoguides publishedbytheConstructionIndustryResearchand InformationAssociation(CIRIA),namelyCIRIAReport C681andCIRIAReportC785.InGermanythereisthe Constructionguidelinesforexplosiveordnance clearance(BFRKMR)(‘Kampfmittelräumung(BFR KMR)BaufachlicheRichtlinien’intheoriginalGerman). InVietnamthereisaregulationcalledDecreeNo. 18/2019/ND-CP.

Incircumstanceswheretherearenospecifc regulationsorwhereexistingregulationsdonot providesuffcientguidance,thefollowingfour-steprisk managementprocessisproposed:

1.Riskassessment

2.Non-technicalsurvey(NTS)

3.Technicalsurvey(TS)(includingareareduction)

4.Fullclearance

Notethatfullclearanceisonlyrecommendedifall previousstepssuggestitisnecessary.Itis,ineffect, theriskmanagementoptionoflastresort.

Thereisnoneedtodescribesteps2-4 indetail here.Thesearecoveredindetailinthevarious relevantIMASornationaltechnicalstandardor guideline(NTSG).Themainissueistounderstand howaninitialriskassessmentmightworkandhowthe fndingsmighttriggersubsequentmineaction activities.

Riskassessmentpartone:riskidentifcation

Riskidentifcationinthiscontextisasimplecheckto identifyanypotentialhistoricalevidenceofEO contaminationinthecountry(orregionifpossible). Thiscannormallybedoneasadeskstudy.

Riskassessmentparttwo:riskanalysis

Ifthepotentialprojectisinacontaminatedcountryor region,thenextstepintheriskassessmentprocessis todeterminehowcloseitistoanyrecorded contaminatedareasoranypreviouslyclearedareas. Theanalysisprocessshouldtrytoidentifythe presenceofanyindicators(directorindirect)ofthe presenceofEOcontamination.

Figure5.Graphicalrepresentationoftheriskmanagementprocess(ISO13000/2018)

Thepresenceofanyindicatorswillsuggesttheneed forfurtheraction.Thiswouldfollowthesameprinciples as‘landrelease’inhumanitarianmineaction,i.e. proceedingfromanNTSviaareareductionto clearanceofanyremainingcontaminationidentifed withintheprojectarea.However,incommercial projectssomedecisionshavetobetakenaboutthe needtogofurtherdownthispath.Thisis‘risk evaluation’.

Thisriskassessmentprocedurecanbevisualised asaformofaconventional‘riskmatrix’assetoutin Figure6 below.Notethatitincludestheunfortunately rathercommonsituationwhereasiteisalreadyinuse beforetheEOriskassessmentisundertaken.

Thefrstkeypointbroughtoutby Figure6 isthat activityaffectsrisk.Aprojectsitenotinusepresentsa differentcategoryofrisktoonethatisalreadyinuse. Thesecondpointisthatanyprojectfallingintothegrey categorywilldependontheclient’sappetiteforrisk. Likewise,theimplicationsofasitefallingintothebrown

categorywillbeverycontextspecifc.Finally,itis recommendedthatanyprojectthatis‘red’willneed immediateaction,includingstoppingworkuntil contaminationistreated.

Thisriskmatrixhighlightstheimportanceofthe client’sappetiteforrisk.Thisisdiscussedabovebut notsomethingthatisnormallyconsideredin humanitarianmineaction(HMA).InHMAtheevidence ofabsenceasisimpliedinlandreleaseasaformof ‘triage’,i.e.ofbeingsuffcientinitselfasareasonnot toclear.ThismaybepragmaticinHMAwhere,as describedabove,thereisaformof‘marketfailure’(i.e. thebenefciaryoftheclearanceisnotthecustomer (thedonoris))andmayalsobereasonablewherethe landisalreadyinuseforseveralyears.However,as saidbyCarlSagan,“theabsenceofevidenceisnotthe sameasevidenceofabsence”,andinacommercial contexttheabsenceofevidencemaybenecessarybut notsuffcient.Thisleadstotherecommendedbest practiceforEOrisktreatmentassetoutinTable3.

Figure6.AformofEOriskmatrixforcommercialprojects.

1 Clearance certifcateexists. Siteinregular use.

Defnitelyclear

2 Clearance certifcateexists. Siteinregular use.

Documentreviewcandefneaspecifc pieceofgroundas‘defnitelyclear’ when(1)ithasbeenclearedtothe correctstandardbyacompetentand accreditedorganisation,(2)when appropriatequalitymanagement requirementshavebeenmet,and(3) whereanoffcialclearancecertifcate hasbeenissuedbyanappropriate authority.Furthermore,(4)the certifcatemustalsosetouttheexact perimeteroftheareacleared,the searchmethodusedandthedepthto whichasearchhasbeenundertaken.

Noclearance required.Provide EORE.

3 Indirect indicators.Site notinuse.

Probablyclear

4 Noevidenceof contamination. Siteinregular use.

5 Indirectindicators Workforcemay avoidsome areas. Probably contaminated?*

6 Indirectindicators butsiteinregular use.

7 Directindicators. Sitenotinuse. Defnitely contaminated

8 Directindicators. Siteinregular use.

Thismaybelandthatdoesnotmeet theexactstandardsof‘defnitely clear’,butitmayalsobeapieceof landwherethelocalpopulationhas beenusingthelandforseveralyears withoutanyindicationthat contaminationispresent.Another exampleof‘probablyclear’landis landwheresomeclearanceworkhas beendonebutwherethestandards setoutinPoint#1abovecannotbe met.

Moreinformation required:needs NTS.Mayneed EORE/EODlater.

Unlessallfourofthese requirementsaremet, thesitecannotbe regardedas‘defnitely’ clear.

ConsiderprovisionofoncallEODresponse service

ProvideEOREand on-callEOD responseservice.

Notpossibletocall ‘defnitelyclear’. Dependingonappetite forrisk,‘proving’the groundbyuseofanarea reductiontool(e.g.dogs ormachines)maybe acceptable.

Maybepossibleto ‘disregard’clearance basedonappetitefor risk.

Areasidentifedas‘probably contaminated’areareaswherethere areindirectindicatorsoflikely contamination(suchasproximitytoa defensiveposition)orwherelocal behaviouravoidsthelandbecauseof theperceptionofcontamination.

Defnitelycontaminatedareasare areaswherethereare‘direct’ indicatorsofcontamination,suchas visibleEOpresence,recordsoflaying minefeldsorrecordsofEOcasualties. Inordertoproperlydefneanareaas ‘defnitelycontaminated’itisusually necessarytobeabletodefnethe boundaryofthecontamination.

Areareduction/TS recommended.

NTSand/orarea reduction/TS recommended.

Conductclearance inlinewithproject worksplan

Needtounderstand workforcebehaviour

*Thisisverycontext specifc.

Typeofclearancemay varyduetocontext. BattleAreaClearance (BAC)maybesuffcient insomecircumstances.

IMMEDIATE clearancerequired Ceaseworksuntilsite clear.

Table3.Recommendedriskmanagement/treatmentapproachforcommercialprojectsites

Onerelevantconceptinriskmanagementisthat of‘Source-Pathway-Receptor’(SPR)14.Theseare defnedinBox5below.

• Source.Acontaminantorpollutantthatisin,onor underthelandandthathasthepotentialtocause harmorpollution.

• Pathway.Aroutebywhichareceptorisorcould beaffectedbyacontaminant.

• Receptor.Somethingthatcouldbeadversely affectedbyacontaminant,forexampleaperson, controlledwaters,anorganism,anecosystem,or Part2Areceptorssuchasbuildings,cropsor animals.

Box5.Defnitionsofsource,pathwayandreceptorasused inenvironmentalrisk management.

InthecontextofEOcontaminationitistheEO hazardthatisthesourceofrisk.Thepathwayisthe activityconductedonaprojectsite(eitherduring constructionorduringuse)andthereceptoristhe constructionworkforce,theconstructionequipment andthepersonnelwhoaretheend-usersofthe project.Asanexample,asiteinaregionthathasbeen subjectedtoaerialattackhasdifferentsourcesof hazardthanonethatisbeingbuiltinanareathatwas mined,andpathwayswouldbedifferentinanarea wherefoundationsarerequiredtobedug,comparedto anareawherepeoplejustneededtowalk.Thishas implicationsforthescopeofworksofEOrisk treatment,asdiscussedbelow.Similarly,battlearea clearanceusingvisualsurfacesearchmaybe suffcient,dependingoncontext.Amatrixshowinghow theSPRconceptcouldbeusedinaprojectpotentially contaminatedwithEOisincludedat AnnexA

SCOPEOFWORKS

Oneareawhereprojectmanagerscanreducethe costsofclearance(andhencechangethebalanceof projectrisk)istolimit(andclearlydefne)thescopeof

worksforaproject.Thiswillalsohavethebeneftof reducingbothphysicalandreputationalrisksfrom projectpersonnelwanderingoutofaclearedarea andhavinganaccidentinvolvingEOoutsideofthe projectarea.

Thus,projectmanagersshouldprovidemine clearancecontractorswithadetailedlarge-scalemap oftheprojecttasksitewiththeboundariesclearly defned.Itshouldalsoincludethefollowingwhere thesefalloutsidethefnishedboundaryoftheproject site:

•Stores/laydownareas

•Parkingareas

•Temporarysiteoffcespace

•Workroomforheavyplant

•Accessroutes

Also,thoughtneedstobegiventothedepthof clearance.Clearanceagencieshavethreetechniques availabletothem,namely:

•Surface(visual)search

•Shallowinstrumentsearch

•Deepinstrumentsearch

Inshort,thedeeperthesearchthelongerittakes andthemoreitcosts.Searchdepthsforshallow instrumentsearcharenormallysetbythenational mineactionauthority(NMAA);theinternationalnorm assetoutinIMASis(atthetimeofwriting)13cm.Deep instrumentsearchisusuallypossiblewithhandheld equipmentdownto3mbutcanbedeeperifboreholes aredrilled.Itshouldbenotedthatusuallyonlyaircraft bombspenetratethisdeeply:forexample,itisnot unknowntofndalargeaircraftbombatadepthof 20m,thoughthisisadmittedlyrare.Deepsearchis veryslowandexpensiveandshouldbelimitedtoareas wherefoundationsaretobedugandwherethereisa credibleEOthreat.TheSPRprocesssetoutabove helpsdeterminetheappropriateresponsetopotential EOhazards.

Consideragainthestorysetoutin Box4.Ifthe clearanceorganisationhademployedthefour-step

14 https://www.gov.uk/government/publications/land-contamination-risk-management-lcrm/lcrm-stage-1-risk-assessment#uxo

processsetouthere,andencouragedtheclientto providealimitedscopeofworks,arangeofmore positivescenarioscouldhaveunfolded,including:

“We’vedoneanNTSofyoursiteandthereisno evidenceofcontamination.Youcouldconsider thefollowingactionstodealwithresidualrisk…”

“We’velookedatyoursiteandhaveidentifed thatonlyasmallportioniscontaminated.Ifyou canworkwithoutthatareawecanmarkandfence itoffsothatyourprojectstaffdon’twanderintoit.”

“We’velookedatyoursiteandhaveidentifed thatonlyasmallportioniscontaminated.Itwill cost$Xtoclearthatarea”

Quitefrankly,iftheclearanceorganisationhadsaid anyofthesethingsthereisaverygoodchancethat theywouldhavegotthework.Asitwas,theygot

nothing.Thus,aproperriskmanagementapproachis a‘win-win’forboththeclientandtheclearance organisation.

Conversely,worktocleartheoilfeldsinKuwaitin 1991wasanexampleofhowadefnedscopeofworks facilitatedwhatwasotherwiseaverydiffcultproject. Thefrefghtersworkedoutthattheyneededanaccess laneof30metresforeachwellfre,andadefned workingareaaroundeachfre.Clearanceworkwas donemainlytoidentifyclustermunitionstrikesandthe primarysearchtechniquewasasurfacevisualsearch. See Figure7 below.

ThetaskplanningfortheKuwaitemployedthe ‘minimumoperatingstrip’conceptasusedbymilitary airfelddamagerepair.Inotherwords,whatisthe minimumworkneededtobedoneinordertogetthe jobdone?Thus,evenifa30maccesslanepassed throughaclustermunitionstrike,noactionwouldbe takenagainstanyEOoutsideofthe30mboundary.

Figure7.DealingwithoilfresinKuwait,1991.AllaccessandworkingareasweresearchedforEObeforethefrefghters couldgainaccess.

Thisisaprofoundconceptualdifferencetomuchwork undertakeninHMA,whichwilloftentendtofollow linesofcontaminationoncethesehavebeen identifed.

Themanagementofresidualriskisdiscussed below.

Itisnowpossibletocompletetheleft-handsideof theriskmanagementbowtie.Thisisdonebyadding thepotential‘contributingfactors’.Thisisshownin Figure8 below.Threemaincontributingfactorshave beenidentifed.Theseare:

•Theareahasnotbeencleared

•EOhasbeenfoundonthesite

•Personnelareunawareofthehazardand/or unawareofsafebehaviour

Probabilityoftheincidence

Rememberingtheformaldefnitionofriskasafunctionof theprobabilityoftheincidenceandtheseverityofthe outcome,itisnowpossibletoplotvariousmineaction ‘products’asmeansofreducingtheprobabilityofthe incidence.Thesecanthenbebrokendowninturnto either(a)removingthehazardor(b)changingbehaviour. Therearethreemineactionproductsthatare relevantincommercialwork.Theseare:

•Areaclearance

•Explosiveordnancedisposal(EOD)

•Explosiveordnanceriskeducation(EORE)

ThesearealldefnedinIMAS04.10.However,itis worthnotingthatallofthesefocusonreducingthe probabilityoftheincidence.EOREdoesthisby modifyingbehaviour,whilstEODandareaclearance

Figure8.BuildingtheEOriskbowtie.Notetheuseofqualitymanagementmeasuresinthegreenboxes.

addressthepresenceofahazard.Areaclearance doesthisprophylactically(anareacanbesearched evenifdefniteindicatorsarenotpresent)whilstEOD teamsareusuallydeployedonareactivebasis(after thereportofapossibleitemofEO).

Inriskbowties,risktreatmentoptionsaredrawnas boxesonthevariouscausalarrows.Thus,boxesfor thethreemineactionproductshavebeenaddedto Figure8.

Qualitymanagement

Qualitymanagement,consistingofqualityassurance (QA)andqualitycontrol(QC)playanimportantrolein EOrisktreatment,inorderfortheclienttobesurethat therisktreatmentemployedisftforpurpose.Inthe eventofanincident,accidentinvestigationisalso importantasitcanidentifyanyrootcause(suchasan inadequatescopeofworks)orcontributingfactorsand thushelppreventanyfutureincidents.Thesequality managementmeasuresareshowninthegreenboxes in Figure8

Managingtheseverityoftheoutcome

Sofarthispaperhasdiscussedmanagementofthe riskprobability.However,itisalsonecessarytotreat theseverityoftheoutcome.Threeboxeshavebeen addedtotheright-handsideof Figure8

Theseverityoftheoutcomeofphysicalriskcanbe managedtosomeextentbythetimelyavailabilityofan adequatefrstaidcapacityabletodealwithtypicalEO injuries.FirstaidprovisionisdiscussedinIMAS10.40. Thiswillalso,forremotesites,requireacasualty evacuationplantoahospitalcapableoftreatingtypical woundsfromEO.

Likewise,treatmentofprojectriskcanbedone throughtheapplicationofthe‘scopeofwork’principles assetoutabove.Thismaynecessitatearobust accidentinvestigationproceduretoidentifyany systemicissueswiththemineactionactivities undertakenonthesite.

Finally,theseverityofreputationalriskcanbe amelioratedwhenaprojectcanshowthatithas

applied‘allreasonableeffort’(asdiscussedin IMASTechnicalNoteforMineAction(TNMA) 07.11/03).Ifaprojecthasestablishedaclearscope ofworks,andemployedrelevantrisktreatment throughareaclearance,EOD,andEOREtorelevant IMASandnationalstandards,andwhereadequate frstaidcoverisavailable,thenitisheldthat itcanclaimtohavemettheconditionsof‘all reasonableeffort’.

MANAGINGRESIDUALRISK

Thereremainsthequestionofresidualrisk.Thiscan bethoughtofinseveralways.Iftheprimary treatmentofriskisbytheprophylacticremovalof hazard(withinsetboundariestotheappropriate standard)thentheprovisionofEOREandanon-call EODresponsetorecogniseanddealwithitemsthat stillturnupcanbeconsideredasonewayof managingresidualrisk.Especiallyunder circumstanceswheretheinitialriskassessment suggestedthatfullclearancemaynothavebeen necessary(see Figure6).

However,thesecondwaytodealwithresidualrisk isthroughinsurance.Insurancepremiumsare assessedthoughtheinsuranceindustry’sownrisk managementprocesses,butitispossiblethata projectthatcanshowcompliancewiththebest practicesuggestionssetoutheremaybeneftfrom reducedinsurancepremiums.

Thewillingnessofaninsurertocoverriskfora particularprojectwilldependgreatlyona presentationbytheorganisation(ortheirinsurance broker).Thepresentationwillneedtoaddressany questionsontherisksandmitigationmethodsused. AbrokerthatspecialisesinUXOriskcoverage15 reportsthatpotentialinsurerswill“wantbestpractice asabasicrequirement”.Thebrokeralsostated:

“apoorlypresentedriskcanendupbeing punitivelyexpensiveand/orendupwithcover thatisinadequatetoprotectagainstUXOrisks”

15CorrespondencewithJonathanStarkeyofSpecialistRiskGroup,March2025.

AnnexA.UsingtheSPRapproachtoidentifyingappropriatemineactionintervention

ThematrixatTable4usestheSPRapproachtoidentifypotentialreceptorsfordifferentEOhazardsandthe possiblemineactionresponse.

Notethattheenduserisnotalwaysthemostlikelypossiblereceptorbutcannotalwaysberuledout, especiallyinareasoftheprojectsitethatarenotdirectlywalkedonorotherwiseprocessedduringtheproject construction.

Theconductofthevariouspossibleresponsesshouldineachcasebeconductedinaccordancewiththe relevantIMAS/NTSG.

1 Mines

•Walkingtheland

•Handling •Digging

2 Aircraftbombs •Excavation1

3 Guided weapons •Approaching •Disturbing

4 Cluster munitions

5 OtherLSA

•Handling •Digging •Proximity

•Handling •Digging

6 IED4 •Disturbing •Proximity

•Constructionworkers

•Constructionequipment

•Endusers

Mineclearance

•Constructionworkers •Constructionequipment Deepinstrument search2

•Constructionworkers •Constructionequipment EOD

•Constructionworkers

•Constructionequipment •Endusers

•Constructionworkers

•Constructionequipment •Endusers

•Constructionworkers •Constructionequipment

Battlearea clearance(shallow instrument search3)

Battlearea clearance(shallow instrument search3)

Search/IEDD

Includingvictim-operatedIED functioningasimprovisedmines

Potentialhazardfromrecently deployedtime-fuzedweapons. A‘soaktime’maybeappropriate.3

Potentialsensitivefuzing mechanisms

Potentialhazardfromrecently deployedtime-fuzedweapons. A‘soaktime’maybeappropriate.

Landserviceammunitionother thanmines

Potentialhazardfromrecently deployedtime-fuzedweapons. A‘soaktime’maybeappropriate. Notes:

1.Defnedasdigging>30cm

2.Onlyrequiredinareasrequiringexcavationorwherethereisadefniteindicatorofaburiedbomb(e.g.presenceoftailunitor holeofentry)

3.Visualsurfacesearchmaybesuffcientonhardsurfacessuchasconcreteortarmacwherepenetrationisunlikelyorwillbe obviousonvisualinspection.

4.RefersmainlytocommandortimedelayedIED.VictimoperatedIEDdesignedasimprovisedminesshouldbetreatedasper Ser1;projectedIEDasSer5.

Table4.UsingtheSPRapproachtoidentifyingappropriatemineactionintervention

Finally,EOREremainsanappropriatemeanstomanageresidualrisk,asdoesaccesstoanEODresponse. Thepossiblepathwaysincol(c)canbeusedtoinformthecontentsoftheEOREprovided.WhereEOD responseisusedasatreatmentofresidualrisk,itmayalsobeappropriateasaformofqualitymanagement toassesswhytheEOwasnotfoundduringtheinitialrisktreatment.

MostUXOrelatedriskscanbecoveredbyinsurance heldbytheclearanceagencyandtheirclientswillwant toseetherelevantpoliciesaspartoftheirduediligence duringthecontractingprocess.Siteownersandgeneral constructioncompaniescanalsofndinsurancecover forpersonnelandequipment.Ownershipofresidualrisk coverageofUXOfndsorincidentsafterthesitehas beenhandedoverwilldependonlegislationand/or NTSG.Itishardforthecontractortomaintain responsibilityforasiteaftertheclearanceworkhasbeen completed:whoisliableifaworkerleavesthecleared areaorbringsanitemofEOontothesiteoutof curiosity?Thismayperhapsbeincludedintheclearance agency’sinsurance,butitmightbemoreappropriate (andcosteffective)tomitigateonwardliabilitybya comprehensivequalityassuranceandhandover process.Inotherwords,insuchanarrangementthe liabilityoftheclearanceagencyendsatsitehandover. ■

ABOUTTHEAUTHOR

Dr.RobertKeeley isaformerBritish ArmyBombDisposalOffceractive inhumanitarianandcommercial mineactionandexplosiveordnance disposal(EOD)since1991.Hehas workedinnumerouscountriesand forseveralgovernmentsand internationalorganisations.He specializesinprojectdesign,evaluation,andquality assuranceofallaspectsofmineactionandhashelped shapetheemerginghumanitarianimprovisedexplosive device(IED)sector.Dr.Keeleyisamemberofthe InstituteofExplosivesEngineers,aMemberofthe InternationalAssociationofBombTechniciansand Investigators,andisaFellowoftheRoyalGeographical Society. HeholdsaPhDinAppliedEnvironmental Economics;histhesiswason“theEconomicsof LandmineClearance.”

ContactInformation

Dr.RobertKeeley,Director,RKConsulting(EOD)Ltd Ashford,Kent,UnitedKingdom Bobkeeley@rk-consulting.net www.rk-consulting.net

C-IEDCOEAnnualConference2025 9–12June2025,Malaga,Spain https://www.ciedcoe.org/index.php/ events/ciedac 12thAnnualEOD/IED&Countermine Symposium 16–17July2025,NationalHarbor,MD, USA https://countermine.dsigroup.org/ CounteringExplosiveThreatand DeminingConference2025 23–24September2025,London,UK https://www.defenceiq.com/eventscountering-explosives/

NATOEODDemonstrationsand Trials2025 8–9October2025,Bratislava,Slovakia https://eodcoe.events/event-3/

Defense&Security2025 10–13November2025,Bangkok, Thailand https://www.asiandefense.com/ MilipolParis2025 18–21November2025,Paris,France https://www.milipol.com/

FutureForcesExhibition&Forum 2026 21–23October2026,Prague, CzechRepublic https://www.fff.global/

LANDMINEREMOVALINPOST-CONFLICTAZERBAIJAN

TheAzerbaijanigovernmentiscarryingouta massiveclearingoperationoflandmines, unexplodedordnance(UXO),andexplosiveremnants ofwar(ERW)afterthe2020and2023conficts betweenArmeniaandAzerbaijan.Bakuwantsto decontaminatetheterritoriessotheyareftforcivilian life,however,thisoperationwillbealengthy, expensive,andcomplexprocess.International partnerswillbeofvitalimportanceforBakutoachieve thisobjective.

BACKGROUND

ThankstoitsmilitaryvictoryintheSecondKarabakh War(2020) andaone-daymilitaryoperationon September2023, Azerbaijanrestoreditsterritorial integrityafterthelosestoArmenia intheFirst KarabakhWar(1988-1994).By2023,negotiations resultedintheArmeniangovernmentagreeingtogive uptheYerevan-controlledterritorialentityknown asNagorno-Karabakh 1 ,nowcalledtheKarabakh EconomicRegion.(Duetospaceconsiderations,we willnotdiscussthecomplexhistoricalrelations, tensions,andconfictbetweenthesetwocountries).

Sincetheendofmilitaryoperations,Bakuand Yerevanhaveengagedindiplomaticnegotiationsfora permanentpeaceagreement.Inmid-March 2 ,thetwo

1 https://www.britannica.com/place/Nagorno-Karabakh

governmentsannouncedthatthefnaltextofapeace treatyhadbeenagreedupon.However,thedocument hasyettobesigned.(OlesyaVartanyan ,aconfict analystontheSouthCaucasus,hasdiscussedthe probablereasonswhybothgovernmentshaveyet tosignthedocument).Whilediscussionsand negotiationscontinue,theremovaloflandmines,UXO, andotherERWisapriorityasBakuhaspledgedthat theinternallydisplacedpeopleduetotheKarabakh wars,canreturntoKarabakh.Additionally,forthe regiontothrive,civilianinfrastructuremustbeinplace, likehouses,schools,hospitals,roads,inadditionto agriculturalland.Landmines,UXO,andERWmustbe removedtoachievethisgoal.

TheMineActionReviewestimatesthattheextentof contaminationis“certainlymassive”asthereare decadesworthoftensionsandmilitaryoperations. Contaminationispresent“alongtheapproximately 254km-long,5km-wideformerLineofContact(LoC) betweenArmeniaandAzerbaijan.Thedefensivebelts ofberms,anti-tankditches,andbarbedwirealongthe LoCcontainhugequantitiesofbothAPandAVmines,” accordingtotheReview.However,becauseofthe historyofinter-statetensionsbetweenBakuand Yerevan,“theareasalongtheLoCwereheavilymined overthethreedecadesafter1990byallpartiestothe

2 https://eurasianet.org/a-peace-treaty-is-fnalized-but-azerbaijan-is-accusing-armenia-of-preparing-for-war

confict.Furtherminefeldsandotherexplosive ordnance(EO),includingabandonedexplosive ordnance(AXO),arefoundinareaspreviously occupiedbyArmeniaoutsideNagorno-Karabakh.”In otherwords,thecontaminationoftheterritorygoes backdecades.

TheMineActionAgencyoftheRepublicof Azerbaijan(ANAMA) 3 istheprimeagencytaskedwith thismassiveoperation.Otherentitiesinvolvedinclude theMinistryofDefense,theMinistryofEmergency Situations,theStateBorderService,andlocal companies,liketheAzerbaijanDeminingCompany andAlphaDemining 4 .Overall,2,485operationalstaff areinvolvedintheseoperations,supportedby87 mine-clearingmachinesand182mine-detectiondogs (Croatiahasdonatedeightdogs),anunknownnumber ofmine-detectionrats,accordingtoANAMAasoflate 2024.Troopsarealsoinvolvedintheseoperations, andANAMAhasconductedthree-weekcoursesfor militarypersonnel 5 on“HumanitarianMineClearance”

and“BattlefeldCleaning.”AnInteragencyWorking GroupontheClearanceofMinesandUnexploded Ordnancemeetsthroughouttheyear“toreview operationsandenforcestandards.”

THESITUATION

Decontaminationoperationshavebeenongoingsince theKarabakhregionfullyreturnedtoAzerbaijanicontrol. AccordingtoANAMA,thecontaminationofterritorywith theremnantsofwarreaches“60%offatagricultural land,30%ofgrassyhills,and10%ofmountainous regions.”In2023,MineActionReview 6 estimatedthat 10squarekmsofterritorywerecleared,including3,495 anti-personnelminesdestroyed(basedonANAMA info).Asfor2024,atotalof62,023hectaresofKarabakh territoryweredecontaminated,includingtheremovalof 59,163piecesofunexplodedordnance,4,286antipersonnelmines,and2,372anti-tankmines.According tothemostrecentstatistics,atotalof4,556hectares wereclearedinMarch2025,whichresultedinthe removalof9,755UXO,331antipersonnelmines,and105anti-tank mines.Someofthemines neutralizedincludemodelsPMN-E 7 , PMN-2 8 ,andTM-62 9

Asforrecentoperationsand fndings,inFebruary,anF-1hand grenade 10 waslocatednearwaste binsinGazakhCity,Gazakhdistrict. Improvisedexplosivedevices (IEDs)alsocontaminatethe territory:anIEDwaslocatedin Bulutanvillage,Khojavenddistrict. Theexplosiveconsistedofone PQ-7Lrocket 11,105smallarms

3 https://anama.gov.az/en

4 https://www.alfarazminiranje.hr/?lang=en

5 https://www.azernews.az/nation/238567.html

6 https://www.mineactionreview.org/assets/downloads/Azerbaijan_Clearing_the_Mines_2024.pdf

7 https://metis.fenixinsight.com/munition/mine/pmn-e

8 https://cat-uxo.com/explosive-hazards/landmines/pmn-2-landmine

9 https://cat-uxo.com/explosive-hazards/landmines/tm-62m-landmine

10 https://anama.gov.az/en/news/302

11 https://anama.gov.az/en/news/309

Anti-tankmine (Source:ANAMA)

Asformorerecentincidents, inearlyApril2025,alandmine explodedintheGalaychilar village,Aghdamregion.A civilian“sustainedinjuries 13 to hislegasaresultofanantipersonnelmineexplosion whileenteringanareathat hadnotbeenclearedof landmines.”Specialiststasked withremovingtheexplosives canalsobeinjured:inApril 2025,anANAMAemployee14 “hitananti-personnelmine whileperforminghisduties” inMehdilivillage,Jabrayil region.Hewassuccessfully evacuatedbuthisrightlegwas amputatedfromtheankle.

INTERNATIONALSUPPORT

cartridgesattachedviaadhesivetape,andahand grenadedetonator,whichwouldbetriggered viatripwire.

Theoperationisnotwithoutincidents,andcivilians whoaremovingtotheterritoriesremaininperil; accordingtoANAMA,between2020and31December 2024,therewere229landmineexplosionincidentsin Karabakh,resultingin382victims,including70 fatalities.Thetallyincludesapersonwhosteppedon alandmineinGushchuAyrimvillage,Gazakhdistrict, last14October,2024 12.Theincidentoccurredasthe individual“whilegrazinganimalsinanareathathad notbeenclearedofmines,”whichhighlightstheneed todecontaminateareaswhichwillbeusedbyfarmers andotherfeldworkers.

12 https://anama.gov.az/en/news/283

13 https://anama.gov.az/en/news/314

14 https://anama.gov.az/en/news/313

Azerbaijanwillrequire internationalassistanceto successfullydecontaminate theKarabakhterritories.Currentpartnersincludethe UnitedStates,UnitedKingdom,EuropeanUnion, Canada,Japan,andTurkiye,aswellasinternational agenciesliketheUnitedNationsDevelopment Programme(UNDP),UNICEF,theUnitedNations HighCommissionerforRefugees(UNHCR),the InternationalCommissionoftheRedCross(ICRC). Otheractorsincludeorganizationsthatspecializein thesetypesofoperations,suchasthePiperDemining Company 15 .

ThankstoapartnershipwiththeGeneva InternationalCentreforHumanitarianDemining (GICHD),ANAMA“hasimproveditsoperational effectivenessthroughtheadoptionoftheInformation ManagementSystemforMineAction(IMSMA).”

15 https://dushanbe.mfa.gov.az/ru/news/landmine-contamination-problem-in-azerbaijan

Meanwhile,theMarshallLegacyInstitute16 has contributedmine-detectiondogs(MDDs);aspartofa Spring2024visittoAzerbaijanbyInstitutestaff,the centerexplainedthat“with41MLI-sponsoredMDDs arrivingoverthelastthreeyears,ANAMAutilizesthe Horadizbasetohouse,acclimate,andtraintheirK9 capacity.”SofarthepartnershipbetweenANAMAand theMarshallInstituteisworkingwellbecausethedogs andthehandlersaregettingalong,“itwasrewardingto seetheamazingbondformedbetweentheMDDsand handlers,”theInstituteexplained 17

Toincreaseawarenessandgaininternational support,theAzerbaijaniMinistryofForeignAffairsand ANAMAhaveconductedmeetingswithpartnersand thegeneralpublic.Inrecentmonths,BakuandANAMA havemetwithBritishdiplomatsinBaku18,anda meetingwasheldinWashingtonattheHudson Institute,athinktank,todiscussthisissue.Also,during theCOP29climateconference 19 heldinlate2024in

Baku,ANAMAandUNDPco-organizedaneventtitled “ClearingthePath:AddressingMineThreatsfor ClimateResilienceandSustainableDevelopment” whileaphotojournalexhibitiontitled“SilentEchoes: UntoldStoriesofMineVictims” 20 wasorganizedby Azerbaijan’sembassyinSpain.Azerbaijanalso participatedinthe5thReviewConferenceofthe OttawaConvention 21,heldinSiemReap,Cambodia.

LOOKINGTOTHEFUTURE

Thefutureoftheremovaloflandmines,UXO,and ERWacrossAzerbaijan’sterritorywilldependon variousfactors.First,apermanentpeacetreaty betweenArmeniaandAzerbaijanwouldbeginthe healingprocessandimproverelationsbetweenthe twocountries.Moreover,Yerevancouldprovide informationaboutminezonesdeployedduringthe confict(s).Sharingthisinformationwouldbea signifcantconfdence-buildingmechanismbetween thetwogovernments, anditwouldobviously speeduptheprocess ofdecontaminatingthese areas.

AsforANAMAandother Azerbaijaniagenciesand organizationsinvolvedin thislong-termproject, unsurprisingly,budgetsare afactorthatlimitthespeed oftheprograms.“Since 2020,foreignassistance hasaccountedformerely 6%oftheresources dedicatedtohumanitarian demining,”explainsthe

16 https://www.marshall-legacy.org/

17 https://www.marshall- legacy.org/post/paws-of-progress-mli-donated-mdds-play-a-major-role-in-azerbaijan-s-mineclearance-success

18 https://anama.gov.az/en/news/315

19 https://azerbaijan.un.org/en/283794-undp-and-anama-held-side-event-mine-action-and-environmental-sustainability-within-cop29

20 https://x.com/ANAMA_gov_az/status/1867605039608459587

21 https://www.apminebanconvention.org/en/review-conferences/5revcon

ANAMA’sdeminers (Source:ANAMA)

October-December2024QuarterReportofthe agency.Countriesthathavedonatedfundsinclude SaudiArabia,Italy,andtheUnitedArabEmirates.For 2025,BakuwillincreaseANAMA’sbudgetto approximatelyUSD49.9million 22 (85millionmanats), a1.2%increasecomparedtolastyear.However, morefnancialassistanceisnecessary.

Initsfnal2024QuarterlyUpdate,ANAMAdiscussed severalprojectsthatrequireinternationalfundingand assistance.Theyincludeacquiringminedetection dogs,explosivecontainmentchambers,explosive materialtransportationvehicles,groundpenetrating radars(whichcanbemountedonadroneforfaster mappinganddetectionoperations),anddemarcation

andfencingmarkersand signs.Otherrequirements aredirectedattraining andassistance,like explosiveordnancerisk education,technical surveysandfeasibility studies,andminevictim assistance.

Thereareotherissues tomonitorregardinghow internationalactorscan assistAzerbaijan.For example,backin2024, UNDPandANAMA signedastatementof intent 23 toestablishan internationalcentreof excellenceandtraining formineaction.Ayear later,itisunclearifthe facilitieswillbebuiltbut thiscentrewouldbe helpfulfortrainingoperationsofAzerbaijanitroops andotherspecialists.Similarly,duringthe IntersessionalMeetingoftheAnti-PersonnelMine BanConventionlastJune2024,EdsonAsgaro v 24 , AttachéofthePermanentRepresentativeofthe RepublicofAzerbaijantotheUNOfficeandother InternationalOrganizationsinGenevastated,“we believethattheUnitedNationsanditsspecialized agenciessuchasUNMAScouldalsoplayarolein mobilisinginternationalsupportfordemining operationsinAzerbaijan.”ItisuncleariftheUN MineActionServicewillstartamissionin Azerbaijan,butitwouldbebeneficial.Moreover, MineActionRevie w 25 recommendsthatAzerbaijan

22 https://www.azernews.az/nation/235749.html

23 https://www.undp.org/azerbaijan/press-releases/undp-and-anama-signed-statement-intent-cooperation-establishmentinternational-centre-excellence-and-training-mine-action

24 https://www.apminebanconvention.org/fleadmin/_APMBC-DOCUMENTS/Meetings/2024/IM24-6a-UniversalizationAzerbaijan.pdf

25 https://www.mineactionreview.org/assets/downloads/Azerbaijan_Clearing_the_Mines_2024.pdf

accedestotheAnti-PersonnelMineBanConvention (APMBC) 26,adoptsitsrevisedNationalMineAction Standards(NMAS),andBakushouldalso“fnalise andadoptitsnewmineactionstrategy,refectingthe signifcantincreaseincontaminationnowunder Azerbaijan’scontrol.”

Thereisoneotherrequirementthatisworth noting,andwhichwouldbeneftfrominternational support.ANAMAlabelssupportforfemaledemining teamsasapriority.TheQuarterlyReportexplains that“encouraginggendermainstreaminginmine actionandempoweringwomeninreturn, rehabilitation,reintegrationandreconstruction phases.”Genderdiversityandtheroleofwomenas specialistswhoclearlandminesisatopicthat deservesfurtheracademicresearch.Withouta doubt,womenhavealsosteppedforwardtorisktheir livesforthisnoblecause.Afghanwomen 27,for example,clearedlandminesbefore,sadly,the Talibanreturnedtopower.Womenhavealsostepped forwardandbecomedeminersinZimbabwe,“When theopportunitycame,Iwantedtojoin.Toshowto othermen,women,supportersthatuswomencan alsobedeminers,”saidthedeminerRumbidzai 28 . Since2017,thehumanitarianorganizationMAG (MinesAdvisoryGroup) 29 hasbeenworkingin Zimbabwetomakelandsafeagainforlocal communities – femaledeminersconstitutearound 40%ofthepersonnel.

Ihavenotfoundinformationabouthowmany AzerbaijaniwomenareinvolvedinANAMA’sfeld operations.However,morefemalepersonnelwould helpimprovegenderequality,asthesemissions demonstratethatAzerbaijaniwomenarejustas courageousastheirmalecounterparts.International supportformine-removaloperationswould,thus, haveapositivecollateraleffect,demonstratingthe braveryofAzerbaijaniwomen.

26 https://www.apminebanconvention.org/en/

CONCLUSIONS

IfBakuandYerevancansignapeacetreaty, permanentpeacecouldbewithinreachintheSouth Caucasus.Whilepeaceonpaperisimportant,soare activitiesontheground.ForBaku,decontaminating theKarabakhEconomicRegionisapriority.Thedata releasedbyANAMAandotheragenciesaboutthe landmines,UXO,ERW,andIEDslocatedinthepast coupleofyearsdemonstratethatdecontamination willbealong-termproject.Sofar,internationalactors haveprovidedvitalfnancialassistance,technical assistance,expertise,andequipment–includingthe invaluableminedetectiondogs.However,asthis analysishasdemonstrated,moreassistanceis requiredfortheterritoriestobeftforcivilianlife onceagain. ■

ABOUTTHEAUTHOR

WilderAlejandroSánchez isan analystwhofocusesoninternational defense,security,andgeopolitical issuesacrosstheWestern Hemisphere,CentralAsia,and EasternEurope.HeisthePresident of Second Floor Strategies 30,a consultingfrminWashington,DC. Hewroteananalysison“Proliferation ofMines, ImprevisedExplosiveDevices(IEDs)andUnexploded Ordnance (UXO)inColombia” 31 fortheWinter2020-21 IssueoftheCounter-IEDReport.

27 https://unfoundation.org/blog/post/innovation-in-action-brave-afghan-women-clear-landmines-make-history/

28 https://www.maginternational.org/whats-happening/the-female-lens-zimbabwe-stories/

29 https://www.maginternational.org/

30 https://secondfoor-strategies.com/

31 https://counteriedreport.com/proliferation-of-mines-improvised-explosive-devices-ieds-and-unexploded-ordnance-uxo-in-colombia/

2024-2025THREATDYNAMICS:

ByLieutenantColonelJoseMRufas,ChiefofAttacktheNetworksBranch,C-IEDCentreofExcellence

“Nevertrustamanwhoteachesaboutdeathbutyethadnorealexperienceatallaboutit.” (TobaBetainhisbook“MasterofStupidity”,frstpublishedin2011)

Mostprobablyanyreaderwouldagreethatthe Internethastraditionallybeenthemosteffective

sourceoftechnicalknowledgeonplanningand preparationofterroristattacksduringthe21stCentury.

Figure1:CoversofpublicationsoncounteringonlineterrorismbyEUROPOLInternetReferralUnit

Despiteintensiveeffortsbynationalandmultinational authoritiestocombatthedisseminationofmanuals, videosandinstructionsontheInternetformaking improvisedexplosivedevices(IEDs)andhomemade explosives(HMEs),most(ifnotall)ofthevarious publicationsremainavailableonnumerousInternet sitesassociatedwithhumannetworkslinkedto jihadismorothertypesofviolentextremism(e.g. whitesupremacism,anarchism,eco-terrorism,far-left, separatism…).

Butitisnotonlyradical,terroristand/orcriminal organizationsthatareinvolvedindistributingcontenton theInternetthatdescribes:

•Planninganattack

•Acquiringprecursorsandcomponents

•Manufacturingexplosives,incendiaryand hazardoussubstances

•Constructingdevices… …unfortunately,thecurrentconfictinUkraineis posingoneofthemosteffectivesourcesforterrorist performance,asbasedonboththewidelyshownideas andthedisseminationofonlineinstructions.

Thelawofconservationofterroristpropaganda: onlinecontentcanneitherbebannednor destroyed

Aspreviouslysaid,mostofthedigitalmanualsonIEDs andHMEmanufactureareeasilyaccessiblethrough severalonlineopenaccessrepositories.

Butnotonlyjihadismisstillpotentially contributingtotheuseofhomemadeexplosives andimprovisedexplosivedevices:theimprudent socialmediasupportersofbothRussianand Ukrainiansideshavebeenactivelydistributing videosanddocumentsclearlyshowinghowto manufacturehomemadeexplosivesaswellas howtoconstructandusehundredsofdifferent improvisedexplosivedevicesagainstyour adversaries(orvictims…).Foradditional information,youcouldreadseveralarticles publishedinpreviousissuesofthe‘Counter-IED Report’digitalmagazine...

Outofsightoutofmind…

Thearticle ‘Jihadistthreatdynamicsconcerning Europe:Aretheyposingarealityorjust“Argumentum inTerrorem”?’ (Counter-IEDReport,Winter2024/2025 edition),predictsasignifcantincreaseinbothattacks andfoiledplotsrelatedtojihadisminEuropefrom January2024:nodoubtthenexteditionofEuropol's EuropeanUnionTerrorismSituationandTrends(TESAT)reportwillconfrmthistrend.

Oneofthefrstindicatorsidentifedinthefrst monthsof2024wasasignifcantincreaseinthe numberofexplosive-relatedthreatsonpropaganda postersdistributedbymediaoutletsdirectlyor indirectlylinkedtoDAESH.

Informationisnotknowledge,buteverything counts

Oneofthemostworryingmattersduring2024and 2025hasbeenthediversityandlocationofthe differentsourcesspreadingtechnicalinformation aboutthemanufactureofhomemadeexplosivesand

improvisedexplosivedevices:soalongwiththe traditionalArabicorEnglishlanguage-basedsources, hasbeenidentifedthedistributionofHME/IED instructionsinSpanish,Russian,BrazilianorTurkish languages,butalsoinGerman,French,Italian… during2024-2025.

Itwasquiteremarkabletheactivityofpreviously knownjihadistgroupsdistributingHME/IEDmanuals throughdifferentsocialmediameanssuchas Telegram,RocketChat,Element,Chirpwireoreven SImpleX:forsure,theChechenLAMANHOgrouphas beenoneofthemostactiveduring2024,andtheyare stillactiveduringthefrstmonthsof2025.

Thepotentialriskfromtheinformationasshared byLAMANHOgroupismostlybasedontheirhighly didacticalapproach,dedicationonlytoeffectiveand “battle-proven”explosives,devices,andtacticsplus aselectionofcomponentsandprecursorseasyto acquire,effectivetoemploy,andhardtotrack…

Figure5:Onlinemanuals&videosinBrazilian,Turkish&SpanishlanguagesonHMEmanufactureaspublishedduring2024 (Source–RocketChat/Youtube)
Figure6:EnglishlanguageversionofLAMANHO’scatalogueofHME/IEDmanuals (Source:RocketChat)

Theresurgenceoftheveterans

FromMarch2024onwardsbutmostlyduringthefrst monthsof2025,severalaccountsunderthelabelof DAESH-related“AlSaqriFoundationforMilitary Sciences”havenotonlybeenredistributedbutalso

publishedindifferentmanualsinbothArabicand Englishlanguagesonhomemadeexplosives, improvisedexplosivedevices,chemicalbiological radiological(CBR)agents,explosive-ladendronesand terrorist/insurgenttactics,techniquesandprocedures.

Afteryearsofceasingtoprovidetechnicaland tacticalsupporttoterrorismandinsurgency,the infamousAlSaqrimediaoffcehasonceagaintaken theleadonjihadistsocialmedia.

AlongwiththeDAESH-relatedinitiatives,AlQaeda followershavealsopublishedonlinematerialsinthe formofvideosanddocumentsrecoveringtechnical informationthatwasincludedinoldissuesof AlQaedaintheArabianPeninsula(AQAP)AlMalahem (ElectronicArmy)mediaoffce(e.g.INSPIREand WOLVESOFMANHATTANdigitalmagazines).

Additionally,thejihadist“digitallibrary”wasalso reinforcedwiththeredistributionofhundredsofold

publicationsonhomemadeexplosives,improvised explosivedevices,sabotage,guerrillas,improvised frearms,assassinationtechniques,poisons…from editorsbasedinUnitedStatesofAmerica,possiblythe PaladinPress.

Prospective

Whileitremainstobeseenwhetherthetrendof growingonlinedistributionofHME/IEDtutorials andvideoswillcontinueinthefuture,jihadist effortstodisseminatethistechnicalandtactical informationhavebeenhaltedduringRamadan2025: weshallsee!

Figure7:AlSaqriHME&CBRrelatedmanualsasdistributed/redistributedduring2025 (Source:RocketChat/Matrix)

Figure8:ReferencestoIED/HMEmanualsasreleasedbyalternatejihadistsourcesduring2024&2025 (Source:X/RocketChat)

Figure9:Referencestoarsonandincendiarydevicesbyjihadistpropagandaduring2024&2025 (Source:RocketChat/X)

AfterthehighimpactoftherecentOlympicGames andtheIsraeliattacksonPalestineandLebanon,it maybediffcultforjihadismtoregaintherhythmof disseminatingonlineinstructionsformaking improvisedexplosivedevicesandhomemade explosives.

Nonetheless,andintheshortterm,theUkrainian confictisforsuregoingtokeepalivethereferences (andideas)toIEDmanufactureanduse.■

“Whenworkingwithexplosives,I'vefound thatattitudeiseverything.”

(AlanBradleyinhisbook“IAmHalf-SickofShadows”,frstpublishedin2011)

REFERENCES

•‘JihadistthreatdynamicsconcerningEurope:Are theyposingarealityorjust“Argumentumin Terrorem”?’(Counter-IEDReport,Winter2024/25 edition)

•X(formerTwitter)

•Telegram

•RocketChat

•Element

•Chirpwire

•SimpleX

Disclaimer

Thisarticledoesnotrepresenttheopinionofanynational ormultinationalorganisation;itswholecontentshould onlybeconsideredastheopinionoftheauthor.Asall informationhasbeenobtainedfromopensources, potentialmistakescouldhavebeenmadeduringthe researchprocess.Pleasefeelfreetosendyour comments,correctionsandinputstotheauthor;theywill behighlyappreciated.

ABOUTTHEAUTHOR

LieutenantColonelJoseMRufas graduatedfromthe SpanishArmyMilitaryAcademyin1993.Hewas commissionedintotheC-IEDCentreofExcellenceas HeadoftheDefeattheDeviceBranchinAugust2016 andcurrentlyholdsthepostofChiefofAttackthe NetworksBranch.AsaMilitaryEngineerOffcer,his backgroundhasbeenmainlybasedonExplosive OrdnanceDisposalactivitiesintheSpanishArmyand C-IEDstaffissuesatthemultinationalheadquarters.In additiontohisEODOperator/EODOffcereducation, heattendedsomeothermilitarycoursesregarding Parachuting,ArmyStaff,InformationOperations,War CollegeGeneral/JointStaff,MilitarySearch,Technical ExploitationOperations,WeaponsIntelligenceTeam, ExploitationLaboratories,HomemadeExplosivesand otherC-IEDcourses.Hisoperationalassignments includeBosniaandHerzegovina(3),Afghanistan(3), theRepublicofEcuador,IraqandUganda.

E-mail:jrufas@ciedcoe.org

Counter-IEDReporteditorialteaminvitesgovernmentbodies,armypersonnel,researchers, industryexpertstocontributetheirarticles,casestudies,whitepaperstothereport.

Wearelookingforboththeoreticalandpracticebasednon-promotionaleditorialcontributions. Onlyoriginal,sofarnotpublishedarticlesareaccepted.

Allenquiriesandarticlesshouldbesubmittedbyemailto: editorial@deltabusinessmedia.com

Formoreinformationpleasevisit: www.counteriedreport.com/editorial

UniquecontentIGlobalreachIInprintandonline

Keepup-to-datewiththelatestC-IED,EODandCBRNenewsanddevelopments. Subscribeat www.counteriedreport.com/subscribe

Oneoperatingplatform

Doublethecapability

CR+DRcombinedsystems enableyourteamtorespond quickly,withanoptimised solution, for Counter-EOandCBRNE missions

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.