Page 95 - SyI Quarterly - Q3 and Q4 Edition 2023
P. 95

The recently published IMAS for Building Clearance , and associated GICHD Good Practice Guidance for
                                                           4
         IED Clearance is a huge step in the right direction, giving me confidence that the Mine Action sector has
         recognised and included Search in its operational toolbox. Mine Action has certainly taken on board
         lessons learnt from Military Search, particularly in their response to ISIS IED contamination in urban
         areas of Iraq and Syria. These results have been impressive and if other organisations, particularly those
         in Law Enforcement, were to also adopt these lessons and implement Search as an activity, they too
         could achieve similar tangible successes.


         All Search and EOD tasks involve Threat Assessment (TA) involving analysis of a perpetrator’s Intent,
         Capability, and Ground (or Opportunity). Traditionally, UK Search assets have analysed these three key
         factors to develop and arrive at a threat summary. As previously mentioned, these aren’t too dissimilar
         to the Mine Action TA processes:
         • The aim / intent of the adversary (terrorist/enemy/criminal)
         • Their capability / modus operandi (both current and historical). Other factors include the training and
         equipment are available to them.
         • The specific ground in question (geography/terrain/environment). Additional factors may include
         climatic conditions, history of the area, whether it’s urban or rural, and signs of conflict. Factors such as
         subterranean, working at heights, confined spaces, and health and safety must also be included.


         The TA is an analysis of all three of the above factors, including an appraisal of the terrain, environment,
         technical competence, and capability/modus operandi of the adversary in the area prior to and during
         the time of conflict. The TA is the primary tool in planning search operations . It is a fluid process that
                                                                                   5
         must be updated as the situation develops, parallel with the exploitation of what is found in tandem with
         the intelligence picture as it evolves.






         Image 11. 360 degrees
         Threat aid memoire





















         The pocket note above (Image 11) was produced to assist Search planners in understanding that the
         threat is omnidirectional and broken into 3 main areas: EO, non EO, and shoot.  The latter is more
         focused on kinetic operations; however, it is a useful reminder to the reader that the threat isn’t always
         in front of you.



         4.  IMAS 09.13 Building Clearance dated Feb 2019
         5.  As previously stated, the outcome of this holistic assessment process should be a formally written summary. This is to document (evidence) the methodology and importantly the analysis
         behind it. I can’t emphasise how important this is. In the event of an incident this will be critical to the understanding of why actions tookplace.
                                                            95
   90   91   92   93   94   95   96   97   98   99   100