Humanitarian demining - the process of mine removal is referred to as demining. This thorough, time-intensive process seeks to locate all mines so that the land or sea area may be safely returned to normal use. Demining is one of the tools of mine action. Coordinated by Mine Action Coordination Centers run by the United Nations or a host government, civilian mine clearance agencies are tasked with the demining. In post-conflict areas, minefields are often contaminated with a mixture of explosive remnants of war (ERW) that includes unexploded ordnance as well as landmines. In that context, the humanitarian clearance effort is often referred to as battle area clearance

Military Area clearance - The military priority is to breach the minefield quickly in order to create a safe path for troops. Speed is vital, both for tactical reasons and because units attempting to breach the minefield may be under enemy fire. Both anti-personnel mines and anti-tank mines must be removed, although only in the lanes through which troops or vehicles are planned to advance.

General C-IED Tasks - Within NATO C-IED tactics guidelines, MV-4 can be used as part of Device Defeat or Mitigation equipment. 

• DEFEATING THE DEVICE is a mainly military response made up of proactive and reactive activities as a result of the existence of emplaced device. (MV-4 potential tasks: ensuring there is no secondary device, digging, interrogating, disrupting). 

• Mitigation is defined within C-IED as technical, tactical and information actions undertaken to minimize the effects of an IED Event. (MV-4 tasks: information collection-video, building barriers around IED, pulling IED, emplacement of the IED...)

EOD Tasks in C-IED - Part of C-IED tasks involving IED disposal. Within EOD, IED Defeat or (IEDD) is the location, identification, rendering safe and final disposal of IEDs. EOD tasks related to C-IED are focused upon the activities of detection, mitigation, IEDD and exploitation. EOD tasks aim to respond to, identify, render safe and dispose of explosive ordnance, including Chemical, Biological, Radiological and Nuclear (CBRN) devices that threaten/impede maneuver. This also includes destroying captured enemy explosive ordnance and assisting in the disposal of unserviceable national and foreign explosive ordnance. Unexploded Ordnance (UXO), rendering safe of IEDs.

Route Clearance - RCP is part of C-IED. RCP teams can be equipped with a mix of general and specialist vehicles, equipment and personnel integrated to conduct route clearance. Their purpose is to eliminate concealment for IEDs, munitions and caches as well as providing systematic detection and deterrence sweeps along cleared routes. A RCP can be used in both general support (e.g. to maintain main supply routes) and in close support (e.g. to provide support to maneuver units on tactical road moves). RCPs can consist of Mechanized and Combat Heavy Engineers and EOD teams. Another method for organizing an RCP is to form 5 elements within the team responsible for command and control, detection, security, improvement, and EOD. 

Digging Tasks - Part of: C-IED, EOD, Route Clearance, Deep Interrogation, Mobility / Counter mobility

Mobility Assurance - Mobility in military terms refers to the ability of a weapon system, combat unit or armed force to move toward a military objective. Mobility assurance as such does not exist in military terminology, but MV-2 could be applied as separate aspect of units advance by removing obstacles from the path and ensuring uninterrupted unit movement (mobile cover, barbed wire, trenches, man-made or natural obstacles in general, breaching tasks...)

Breaching tasks – there are two basic types of breaching operations. These are the in-stride breach and the deliberate breach. An in-stride breach is conducted on an unexpected obstacle or one that is very lightly defended. This breach is normally conducted at the small unit level with the force not requiring additional assistance from their higher headquarters. A good unit will always be prepared to conduct an in-stride breach. In contrast, the deliberate breach is conducted against an obstacle system where there is generally significant knowledge of its existence and its composition. A deliberate breach usually follows detailed reconnaissance and rehearsals. MV-2 could be used for both types of breaching. In addition, during Deliberate Breach it could also be used for information gathering component.

Counter Mobility Operations - The construction of obstacles and emplacement of minefields to delay, disrupt, and destroy the enemy by reinforcement of the terrain. The primary purpose of counter mobility operations is to slow or divert the enemy, to increase time for target acquisition, and to increase weapons effectiveness. They include destroying or disabling transportation facilities such as roads, bridges and railroads; both land and naval mining; construction of military obstacles including ditches, walls, and barbed wire entanglements, etc. 

MV-2 role: emplacement of the obstacles, building obstacles, ground preparation for obstacle placement 

Reconnaissance/Surveillance Tasks - Surveillance and reconnaissance are often confused together because these two practices involve the activity of monitoring. In reconnaissance, the military force sends their troops ahead in order to gather information. Their troops can be either military intelligence specialists, rangers, or scouts. The military sends troops for reconnaissance in order to further explore the area and obtain more vital information regarding their enemies.

Surveillance is done by monitoring the behavior and activities of people. They do this with the aid of electronic equipment, which may come in the form of CCTV cameras, for example.

MV-2 can be used in both roles with some limitations. Usually it would be MONITORING DURING THE MISSIONS as Border Control, Route Clearance, C-IED but it is secondary or tertiary purpose of the system.

Information gathering on the other hand could be used during Breaching missions or Unit Mobility in general (sending machine to gather information on enemy number inside a house).

 

© 2013 DOK-ING d.o.o. Kanalski put 1, 10000 Zagreb, Croatia • P +385 1 2481 300 • F +385 1 2481 303 • info@dok-ing.hr