DESKTOP STUDY
The desktop study is terminology for information gathering and analysis from a range of sources and is closely linked to site survey. It is an extremely valuable part of all MA operations and should begin at the earliest opportunity. The level of detail required will depend on the type of task and the information sources available. Further detail for threat assessment and sources of information can be found in IMAS 07.14 Risk Management in Mine Action, Annex C.
Information sources will include previous MA reports which should be analysed by suitable staff and the findings recorded. Previous report types include:
• Impact assessments • Incident reports • Community liaison • Explosive ordnance risk education (EORE) • Non-technical survey (NTS) • Clearance plans
• Spot tasks • Completion • EO technical reports
Key informant interviews are an extremely useful source of information, and although normally associated with NTS, can be conducted at the desktop level. These interviews may be conducted by telephone, through social media or in face-to-face meetings away from the IED-contained areas. Potential interviewees include: • Affected community. Community members will have direct and indirect information relating to IED contamination. This includes community members who left their homes during the conflict and are waiting to return, as well as those who have remained and are now living in close proximity to IED contamination. • Security forces. As part of the government, the NMAA should have links with the government security forces, who may be willing to share information on the IED contamination that they have encountered. • Explosive ordnance disposal (EOD) units. Building on general engagement with security forces, these specialist units may have important technical information, including reports. • Key infrastructure and governmental workers. These workers may be some of the first individuals entering a post-conflict area in order to start the process of rehabilitating the infrastructure needed to help the large-scale return of the community. • Hospitals and healthcare units. Casualty data aids in threat analysis. The types of injuries and where they happened are important to note.
Openly available sources of information should also be investigated and incorporated into the desktop study. These may include:
• Action on Armed Violence • The Armed Conflict Location & Event Data Project • Small Arms Survey • Insecurity Insight • IED Awareness • Conflict Armament Research • Geneva Declaration on Armed Violence and Development • Governmental foreign travel advice websites
Search planning and execution
113
Powered by FlippingBook