Operations in subterranean systems: Terrain and weather variable
Journal Title: Security and Defence Quarterly - Year 2020, Vol 29, Issue 2
Abstract
The overall objective of the research is to summarize tactical considerations, resulting from terrain and weather analysis, to support the preparation, planning and execution of subterranean operations. The study used the Grounded Theory for collection, analysis, and systematic treatment of data. The main data sources for the study consisted of purposive sampling from operations in subterranean systems and lessons learned from them. Two new sub-variables are now proposed to be included in terrain and weather variable from mission analysis model for subterranean operations: Subterranean system’s location and accesses and subterranean system features. The key to finding subterranean systems is through terrain analysis, physical ground search, operational indicators, and intelligence products. The analysis of the features of the subterranean system and its mapping is critical for developing courses of action. Forces must be trained and equipped to manoeuvre and combat at short distances and poor visibility conditions. Surface access points and command and control bunkers usually are assessed as key terrain. Obstacles placed at intersections are excellent ambush sites. Accessing sophisticated structures requires specific techniques and equipment. Inside the subterranean systems, existing angles, barriers, walls, cavities, stairwells and other objects provide cover and concealment. Water can make it impossible to build subterranean systems, place obstacles, or even use them; droughts can “create” new avenues of approach. Clouds and fog difficult the detection of subterranean systems. The terrain and weather analysis model, the characteristics, and the tactical considerations presented, all combined, support the preparation, planning, and execution of operations in subterranean systems.
Authors and Affiliations
José Bartolomeu
Trojan spoofing: A threat to critical infrastructure
This article explores the phenomenon of location spoofing—where the spoofer is able to “teleport” systems in and out of defined locations, either for the purpose of infiltration into no-go zones or for the “teleportation...
Near-Earth Objects (NEO) and other current space threats
The subject of the study are space threats – Near-Earth Objects (NEO) and Potentially Hazardous Asteroids (PHA). The research methods employed in this article included the classic theoretical methods used in security sci...
Turkey and Russia in Syrian war: Hostile friendship
This study considers Russian-Turkish relations within the context of the Syrian war. We elaborate on both Russia’s and Turkey’s strategies and their understanding of the Syrian War, and consider how the two countries hav...
Scientific Information in the didactics of National Defence University.
Recently we have been witnesses to the creation of information society. Knowledge is becoming the most important value of the contemporary civilization. Scientific Information Centres and libraries equip their collection...
Social security as part of the national security system of Bulgaria
Social security and social entrepreneurship are subject to special attention from the European Commission (EC), particularly in recent years. This is due to their potential to find solutions to society’s problems related...