WHAT IS NATIONAL THREAT ANALYSIS?
National threat analysis considers the macro situation with respect to how IED contamination affects MA programming. MA organisations operating in states that suffer from cyclic conflict, often involving non- state armed groups, can also use national threat analysis to make an assessment of the security situation. The GICHD’s Guide to Mine Action outlines five phases in MA programming:
1. Conflict 2. Immediate post-conflict stabilisation
3. Priority reconstruction 4. Assisted development 5. Development
National threat analysis will be of particular use in phases 2 and 3, during which there is an increased risk of recurrence of violence, as well as a rapid expansion of operational areas, as conditions evolve to facilitate MA.
ׁ WARNING. This guide does not provide detailed guidance on national threat analysis.
WHAT IS OPERATIONAL THREAT ASSESSMENT?
Operational threat assessment is focused at the task site and on the individual activity (detection, location, disposal, etc). At the task site level it adds confidence to the decision-making processes related to IMAS 07.11 Land Release and at the activity level to functions such as IMAS 09.31 IEDD and IMAS 09.13 Building Clearance.
WHAT DO NATIONAL THREAT ANALYSIS AND OPERATIONAL THREAT ASSESSMENT ENABLE?
Neither are intended to have a defined end point, and this means that as new information is obtained it should be inputted to enable continual refinement. Both enable better informed decision-making to improve the safety, effectiveness and efficiency of MA operations. A national threat analysis is conducted at the strategic level and helps ensure that an MA response is staffed with people with appropriate competencies, and that equipment and procedures are developed, tested and employed to conduct the required activities to achieve the outputs that are needed. Ultimately, this will enable the outcomes that are most needed and valued by the community. At the task level, an operational threat assessment enables the selection of a suitably qualified survey team prior to survey and the accurate classification, categorisation and identification of boundaries of confirmed hazardous areas (CHAs) containing IED contamination and to release them safely and efficiently. For example, it will enable the reduction and cancellation of suspected hazardous areas (SHAs) by providing a consistent method for the analysis of new information from both new key informants and through technical survey activities. It will also enable the most efficient clearance processes and procedures to release CHAs. This means that the appropriate level of effort can be applied to achieve the same minimum level of confidence no matter how an IED-contaminated hazardous area is released. The result will be that valuable resources are not wasted carrying out expensive clearance, if suitable evidence exists to demonstrate with confidence that IED contamination is not present. At the individual level, an operational threat assessment will ensure that search is conducted in a manner that is as safe as possible. For example, the operational threat assessment process can be used to make informed decisions on the probable locations of main charges or electrical links, and to enable the
IED threat assessment
20
Powered by FlippingBook