ROBOTICS AND AUTONOMOUS SYSTEMS in EXPLOSIVE … // FOR OFFICIAL USE ONLY PREPARE PREVENT PROTECT...

28
UNCLASSIFIED // FOR OFFICIAL USE ONLY PREPARE PREVENT PROTEC Prepare the Force - Attack the Network – Defeat the Device ROBOTICS AND AUTONOMOUS SYSTEMS in EXPLOSIVE ORDNANCE DISPOSAL LCdr John Keenan Joint Counter Explosive Threat Task Force Defeat the Device (DTD-2) [email protected]

Transcript of ROBOTICS AND AUTONOMOUS SYSTEMS in EXPLOSIVE … // FOR OFFICIAL USE ONLY PREPARE PREVENT PROTECT...

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

ROBOTICS AND AUTONOMOUS SYSTEMS in EXPLOSIVE ORDNANCE DISPOSAL

LCdr John Keenan Joint Counter Explosive Threat Task Force Defeat the Device (DTD-2) [email protected]

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

DEFINING THE PROBLEM

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

The primary aim of the IEDD operations •  To deny the perpetrator of an IED attack from achieving his objectives

•  This is achieved by adherence to a common IEDD philosophy which is broken down into five essential priorities.

–  Preventing loss of life –  Protecting property and preserve infrastructure –  Preserving and collecting forensic evidence where possible –  Returning the scene to normalcy as quickly as possible –  Permit freedom of manoeuvre of friendly forces

THE MISSION •  The utility of remote and autonomous systems employed in Improvised Explosive

Ordnance Disposal can be best understood by viewing these tools through the lens of the mission which is to be achieved

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

IN THE BEGINNING

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

NECCESSITY BRINGS INNOVATION

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

MK V WHEELBARROW (1973)

RAPID REFINEMENTS

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

MK VIII WHEELBARROW

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

CUTLASS

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

RMI - CANADA

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

CANADA - TEODOR (2006 - )

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

MANDATORY ACTIONS AND PRACTICES RELATING TO THE USE OF ROBOTICS IN IEDD

•  Mandatory soak times (primary and secondary) must be observed before any manual approach to a known or suspected device

•  Neutralisation of an IED by remote disruption is the preferred method of Render Safe Procedure (RSP)

•  Minimum operator time on target

•  Manual approaches should only be attempted when use of remote means have been exhausted

•  The IEDD operator is to revert to remote means whenever possible

•  When the device is known or suspected to be an RCIED any manual approach must be made under active ECM protection

•  Planned operations are to have at least one aviation imagery sortie flown after the cordon is firm.

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

IEDD Mandatory Actions

•  A primary soak time must be observed before a manual approach can be attempted WHY IS THIS IMPORTANT ?

•  During the primary soak

–  Remote means can still be utilized to gain situational awareness •  Confirm location and description of the device •  Gain a better appreciation of device make up •  Gain knowledge of the terrain between Incident Control Point and the Device

–  Access can still be attempted through remote means •  Excavation •  Accessing containers, structures or vehicles either with manipulator or

energetics

–  Operator can still carry out positive actions to disrupt a device

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

DESIREABLE CHARACTERISTICS OF IEDD ROBOTIC SYSTEMS

•  Mobility –  Able to navigate complex terrain, avoid obstacles, negotiate stairs, etc

•  Dexterity –  Able to execute intricate tasks to gain access to or potentially disrupt a device without functioning the

device including excavation of buried devices •  Connectivity

–  Able to maintain an uninterrupted communications link with the platform down range •  Visual Acuity

–  Allow the operator the clearest appreciation of the down range situation –  Give the operator the best possible appreciation of the effects produced when taking positive action

through remote means •  Versatility

–  Able to carry multiple and varied means of kinetic/non-kinetic tools for gaining access and taking disruptive action

•  Scalability –  A multi-platform system or tool box employing robotic systems of varying size

•  Power –  Able to lift and move relatively large and heavy objects

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

ACCESS BY ENERGETICS

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

FIBRE OPTIC TETHER

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

COMING SOON TO A THEATRE OF OPERATIONS NEAR YOU

•  Binocular visual systems to provide depth perception

•  Feedback control systems •  Multi-arm manipulators •  Interchangeable purpose built arms/manipulators •  Semi-autonomous navigation and obstacle avoidance

•  Multi-barrel and disposable disruptors

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

THE SEA TO THE CLOUDS

•  The use of remote means in the EOD/IEDD/CIED mission is not limited to the use of unmanned ground vehicles (UGV). The scope of tools used in support of countering the explosive threat has expanded at both the tactical and strategic level

•  Airborne and seaborne platforms are now routinely brought to bare in

EOD and Counter IED operations in both domestic and expeditionary operations to support planned operations in aide of minimizing operator exposure to the explosive threat through reconnaissance and surveillance

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

BY AIR - EYES IN THE SKIES “Planned IEDD operations are to have at least one aviation imagery sortie flown after the cordon is firm.”

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

EXPEDITIONARY IEDD SIZE DOES MATTER

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

AERIAL IMAGERY SUPPORT TO PLANNED OPERATIONS

Photos not related and not to scale

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

BY SEA BATTLE SPACE PREPARATION - REMUS 100

•  Seabed Survey / Battle Space Preparation •  Mine Countermeasures •  Primarily in support of amphibious and other

littoral operations •  Programmable search patterns •  High degree of accuracy

•  Permits optimum employment of MCM divers

•  Allows covert reconnaissance

•  Several REMUS teams can do the work of a - conventional MCMV at significantly less cost

•  Use of gateway buoy link can facilitate analysis - of contacts in near real time

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

REMUS IMAGERY

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

MK II SEAFOX

- Single use system - Launched from Surface vessel (MCMV) - Remotely piloted, fibre-optically tethered MCM weapon

- Employs multiple sensors to re-acquire, positively identify and destroy sea mines

- Manoeuvres to firing position and is capable of hovering in position

- Destroys target by means of a 2.0 kg shaped charge mounted in nose.

- Reducing requirement for mine clearance diving operations.

- Destroys mine while ship remains clear of the mine danger area

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

SEAFOX I-ROUND SEA FOX I ROUND

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

OLD SCHOOL

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

THE BOTTOM LINE

REMOTE DISRUPTION IS THE PREFERRED RSP

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

THE LESS PREFERRED OPTION

UNCLASSIFIED // FOR OFFICIAL USE ONLY

PREPARE PREVENT PROTECT Prepare the Force - Attack the Network – Defeat the Device

THE LAST WORD •  Robotic and unmanned systems have played and continue to occupy a central

role in the conduct of IEDD operations •  While advances in robotics and other remotely operated systems continue to

progress, they remain only a tool •  These tools can only be used to best effect when employed by an operator who is

capable of correctly assessing the threat based on available intelligence. •  The success of any EOD/IEDD operation still hinges on the operator’s ability to

rapidly and accurately determine the intended target, the perpetrator’s motive and capabilities, the probable device make-up and gain a clear appreciation of the hazards and constraints imposed by the immediate tactical environment are the essential building blocks which form a viable Render Safe Procedure (RSP) plan.

•  This process may require the operator to make several life or death decisions over the course of many hours or a few minutes