IED Clearance Good Practice Guide

2.4.OPERATIONAL THREAT ASSESSMENT – SCENARIO EXAMPLES

The following three examples explain the operational threat assessment process. Each scenario is fictitious and referred to in the present tense.

2.4.1. SCENARIO 1 – OPERATIONAL THREAT ASSESSMENT

Suspected IED

Image 9. Suspected IED under road bridge (important infrastructure)

GENERAL DESCRIPTION

An MA operator receives a request to conduct NTS of a road bridge. The bridge is the primary crossing point over a 20 m-wide, fast-flowing river. It links two sides of a large city that was the scene of intense fighting between two armed groups, one of which made extensive use of IEDs.

DESKTOP INFORMATION

The following information is gathered through the desktop assessment:

• The last fighting in the area occurred 60 days prior to the tasking request being received.

• Critical infrastructure is known to have been targeted by time-initiated IEDs.

• The only command IEDs to be used were physically linked, i.e. command wire or command pull. No RCIEDs were reported.

• Civilian vehicles and people have been reported to be crossing the bridge in large numbers.

• The police checkpoint adjacent to the bridge has reported a suspect object under one of the bridge abutments.

IED threat assessment

30

Powered by