ROBOTICS AND AUTONOMOUS SYSTEMS in EXPLOSIVE … // FOR OFFICIAL USE ONLY PREPARE PREVENT PROTECT...
Transcript of ROBOTICS AND AUTONOMOUS SYSTEMS in EXPLOSIVE … // FOR OFFICIAL USE ONLY PREPARE PREVENT PROTECT...
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
ROBOTICS AND AUTONOMOUS SYSTEMS in EXPLOSIVE ORDNANCE DISPOSAL
LCdr John Keenan Joint Counter Explosive Threat Task Force Defeat the Device (DTD-2) [email protected]
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
DEFINING THE PROBLEM
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
The primary aim of the IEDD operations • To deny the perpetrator of an IED attack from achieving his objectives
• This is achieved by adherence to a common IEDD philosophy which is broken down into five essential priorities.
– Preventing loss of life – Protecting property and preserve infrastructure – Preserving and collecting forensic evidence where possible – Returning the scene to normalcy as quickly as possible – Permit freedom of manoeuvre of friendly forces
THE MISSION • The utility of remote and autonomous systems employed in Improvised Explosive
Ordnance Disposal can be best understood by viewing these tools through the lens of the mission which is to be achieved
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
IN THE BEGINNING
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
NECCESSITY BRINGS INNOVATION
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
MK V WHEELBARROW (1973)
RAPID REFINEMENTS
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
MK VIII WHEELBARROW
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
CUTLASS
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
RMI - CANADA
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
CANADA - TEODOR (2006 - )
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
MANDATORY ACTIONS AND PRACTICES RELATING TO THE USE OF ROBOTICS IN IEDD
• Mandatory soak times (primary and secondary) must be observed before any manual approach to a known or suspected device
• Neutralisation of an IED by remote disruption is the preferred method of Render Safe Procedure (RSP)
• Minimum operator time on target
• Manual approaches should only be attempted when use of remote means have been exhausted
• The IEDD operator is to revert to remote means whenever possible
• When the device is known or suspected to be an RCIED any manual approach must be made under active ECM protection
• Planned operations are to have at least one aviation imagery sortie flown after the cordon is firm.
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
IEDD Mandatory Actions
• A primary soak time must be observed before a manual approach can be attempted WHY IS THIS IMPORTANT ?
• During the primary soak
– Remote means can still be utilized to gain situational awareness • Confirm location and description of the device • Gain a better appreciation of device make up • Gain knowledge of the terrain between Incident Control Point and the Device
– Access can still be attempted through remote means • Excavation • Accessing containers, structures or vehicles either with manipulator or
energetics
– Operator can still carry out positive actions to disrupt a device
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
DESIREABLE CHARACTERISTICS OF IEDD ROBOTIC SYSTEMS
• Mobility – Able to navigate complex terrain, avoid obstacles, negotiate stairs, etc
• Dexterity – Able to execute intricate tasks to gain access to or potentially disrupt a device without functioning the
device including excavation of buried devices • Connectivity
– Able to maintain an uninterrupted communications link with the platform down range • Visual Acuity
– Allow the operator the clearest appreciation of the down range situation – Give the operator the best possible appreciation of the effects produced when taking positive action
through remote means • Versatility
– Able to carry multiple and varied means of kinetic/non-kinetic tools for gaining access and taking disruptive action
• Scalability – A multi-platform system or tool box employing robotic systems of varying size
• Power – Able to lift and move relatively large and heavy objects
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
ACCESS BY ENERGETICS
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
FIBRE OPTIC TETHER
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
COMING SOON TO A THEATRE OF OPERATIONS NEAR YOU
• Binocular visual systems to provide depth perception
• Feedback control systems • Multi-arm manipulators • Interchangeable purpose built arms/manipulators • Semi-autonomous navigation and obstacle avoidance
• Multi-barrel and disposable disruptors
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
THE SEA TO THE CLOUDS
• The use of remote means in the EOD/IEDD/CIED mission is not limited to the use of unmanned ground vehicles (UGV). The scope of tools used in support of countering the explosive threat has expanded at both the tactical and strategic level
• Airborne and seaborne platforms are now routinely brought to bare in
EOD and Counter IED operations in both domestic and expeditionary operations to support planned operations in aide of minimizing operator exposure to the explosive threat through reconnaissance and surveillance
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
BY AIR - EYES IN THE SKIES “Planned IEDD operations are to have at least one aviation imagery sortie flown after the cordon is firm.”
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
EXPEDITIONARY IEDD SIZE DOES MATTER
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
AERIAL IMAGERY SUPPORT TO PLANNED OPERATIONS
Photos not related and not to scale
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
BY SEA BATTLE SPACE PREPARATION - REMUS 100
• Seabed Survey / Battle Space Preparation • Mine Countermeasures • Primarily in support of amphibious and other
littoral operations • Programmable search patterns • High degree of accuracy
• Permits optimum employment of MCM divers
• Allows covert reconnaissance
• Several REMUS teams can do the work of a - conventional MCMV at significantly less cost
• Use of gateway buoy link can facilitate analysis - of contacts in near real time
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
REMUS IMAGERY
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
MK II SEAFOX
- Single use system - Launched from Surface vessel (MCMV) - Remotely piloted, fibre-optically tethered MCM weapon
- Employs multiple sensors to re-acquire, positively identify and destroy sea mines
- Manoeuvres to firing position and is capable of hovering in position
- Destroys target by means of a 2.0 kg shaped charge mounted in nose.
- Reducing requirement for mine clearance diving operations.
- Destroys mine while ship remains clear of the mine danger area
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
SEAFOX I-ROUND SEA FOX I ROUND
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
OLD SCHOOL
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
THE BOTTOM LINE
REMOTE DISRUPTION IS THE PREFERRED RSP
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
THE LESS PREFERRED OPTION
UNCLASSIFIED // FOR OFFICIAL USE ONLY
PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device
THE LAST WORD • Robotic and unmanned systems have played and continue to occupy a central
role in the conduct of IEDD operations • While advances in robotics and other remotely operated systems continue to
progress, they remain only a tool • These tools can only be used to best effect when employed by an operator who is
capable of correctly assessing the threat based on available intelligence. • The success of any EOD/IEDD operation still hinges on the operator’s ability to
rapidly and accurately determine the intended target, the perpetrator’s motive and capabilities, the probable device make-up and gain a clear appreciation of the hazards and constraints imposed by the immediate tactical environment are the essential building blocks which form a viable Render Safe Procedure (RSP) plan.
• This process may require the operator to make several life or death decisions over the course of many hours or a few minutes