Professional Documents
Culture Documents
Front cover:$6ROGLHUIURPWKHWK(QJLQHHU%DWWDOLRQ 20 Engineer Dive Officer: An Opportunity to Broaden and Excel Within
SUHSDUHVIRUDEUHDFKLQJRSHUDWLRQDW)RUW.QR[.HQWXFN\ the Regiment
86$UP\SKRWRE\&KDUOHV/HႉHU
By Captain Ezra E. Swanson
Back cover:86$UP\SKRWRV
24 511th Engineer Dive Detachment Salvage Training: Preparing for
Deployment Without a Combat Training Center Rotation
DEPARTMENTS By First Lieutenant Grant W. Rice
30 Egypt and Israel Tunnel Neutralization Efforts in Gaza
02 Clear the Way
By Mr. Lucas Winter
By Colonel Kevin S. Brown (Interim
Commandant) 33 The Army Engineer Officer Brand
I
t may be an unpleasant reality, but a search point is flow directly adjacent to an installation perimeter. Enemies
also a kill zone. Whenever an improvised explosive choose where to attack. They probe to find the weaknesses.
device (IED) is discovered—in a vest or a vehicle—that The U.S. Marine Corps barracks area in Beirut, Lebanon,
is where someone will try to detonate it. Entry control points was destroyed by a 20,000-pound trinitrotoluene (TNT)-
(ECPs) and other checkpoints must be located and designed equivalent blast in 1983 after a truck crashed through a
as part of a comprehensive defensive perimeter and must be checkpoint. In 1996, the Khobar Towers in Saudi Arabia,
adapted as threats change. There are numerous examples housing U.S. military, was hit with 22,000 pounds of explo-
of ECPs that were designed to accommodate traffic flow, sives that were detonated from an access road. The perim-
assure the comfort of the searchers, improve the lighting, eter of the U.S. Embassy in Baghdad, Iraq, was breached in
reduce the overall footprint of the site, or meet any number 2005 by a garbage truck smashing through concrete barriers,
of secondary design criteria but neglect the primary func- then detonating to kill three and wound 30. In 2013, a truck
tion: to detect a large explosive weapon and prevent it from bomb breached the perimeter at Forward Operating Base
entering the perimeter. (FOB) Ghazni, Afghanistan, opening the way for a dozen
The enemy analyzes a base and its defenses. Any location enemy fighters to attack. Domestically, we have a history
outside the secured perimeter is a threat. A long, serpentine of vehicle bombs that stretches back from the Wall Street
approach to the ECP is irrelevant if there is a regular traffic bombing in 1920, which killed 38 and injured 143 in New
3KRWRE\/LHXWHQDQW&RORQHO&ODUHQFH%.HPSHU,,,
Refueling facilities for helicopters like the UH-60 Blackhawk above were part of the expansion that made
)2%*DUGH]DVLJQL¿FDQWWDUJHW
F
orm dictates function. Design matters. And design are often augmented with nails or other items to expand the
determines the engagement area. Successful security lethal range of the blast. Primary fragments are those that
becomes progressively detailed. In the notional FOBs are part of the shell or device. Secondary fragments consist
in Figures 1, 2, and 3 (pages 44-45), the location of the outer of gravel, concrete, glass, and other objects propelled by the
ECP is based on the design threat. It’s where defenders pre- blast, and they can be as deadly as shrapnel. The threat is
fer an IED go off rather than inside the base. Similarly, the normally calculated in terms of blast and fragment radii.
cooldown yard is situated for the design threat. While it is However, it can also be estimated in terms of volume of
impossible to absolutely prevent weapons or explosives from explosives. That volume becomes a critical size for search
being smuggled in, searches at ECPs reduce the threat (see crews to look for.
Figure 1).
/HJHQG
(&3HQWU\FRQWUROSRLQW Notional
Not to Scale
Figure 1. FOB 1
B
last analysis is the key tool in determining the critical in places such as Afghanistan, can also be imported.
critical size of the shot with respect to the termi-
Commercial packages are available. Most are designed for
nal effects, or how much damage a specific weight
commercial blasting needs and do not translate well to force
of explosives can create given the location, structures, and
protection applications, but some apply to military situations
explosive materials. The critical size is the threshold weight
as well as blast events in industrial facilities. 3D Blast© from
of explosive in a given location that overcomes the specific
Applied Research Associates can evaluate 3D blast effects on
protective measures. The critical size, in turn, is used to
nine preset building designs. ExDam®, by Breeze Software,
determine the critical volume of the explosive device. If the
models blast and effects on structures. Breeze Software has
explosive weight of the shot is known, the density of the
related software that models fire, fuel-vapor explosions, and
explosive material dictates how much space it occupies. The
chemical releases.
critical volume refers to the physical dimensions the explo-
sive material must occupy in order to be a critical shot. The Addressing Design Hazards
E
same explosive material in the same location in a smaller
ngineers use building codes to systematically develop
package has less explosive weight and cannot overcome the
safe and reliable structures. Codes require address-
protective measures. These figures set up the necessary
ing design hazards such as wind and snow loads.
search parameters. A decade ago, computer programs only
They are assessed based on historical data. The design
calculated the doughnuts of death, or the circles of various
threat is also determined based on historical data. Ideally,
hazard severity, based on theoretical blast effects on a flat,
the assumed threat is communicated to the FOB mayor cell.
open field. They did not address the way that protective
structures or terrain change blast effects or describe the In Figure 1, the blast design threat is shown by the red
vulnerability of specific structures and construction types. circles. Fragments can be stopped by structures, but standoff
The programs could not determine the effectiveness of pro- is needed to mitigate blast. Standoff requirements are used
tective structures and the resulting reduction in casualties. to position the cooldown yard and determine the distance
They were intended to provide a fast, simple hazard distance needed between the outer and inner ECPs. Enemy threat,
to troops who have no engineering experience. however, is adaptive. Once the walls are set, the enemy can
attempt to gauge what is needed to breach them. The loca-
Better tools are available. The U.S. Army Corps of Engi-
tions of the ECPs are the same—the first checkpoint leads
neers Protective Design Center (PDC) provides references,
software tools, instructional information, and training for either into the FOB or into the cooldown yard. The enemy
engineering issues concerning protective structures, blast task is to determine the size of the shot needed to defeat the
mitigation, designs to protect from indirect fire, entry con- existing standoff. This is explained in Figure 2.
trol point design, and other issues.1 These tools require Establishing a new checkpoint farther from the FOB can
detailed input. push out the first enemy contact and reduce the subsequent
As with any hazard assessment, site analysis is critical. threat. Progressing toward the FOB, each checkpoint fea-
Gathering data for blast analysis is similar to an engineer tures more detailed searches and increased use of technol-
reconnaissance of a minefield; combat engineers return with ogy and resources.
full composition, breach sites, and bypasses, while nonen- Figure 3 shows three checkpoints. The purposes of the first
gineers come back with a vague circle labeled “minefield.” are to divert traffic to the cooldown yard and conduct a quick
An analysis is only as accurate as the data input. An expe- inspection for large items. This is followed by searches at the
rienced construction commissioned or noncommissioned outer and inner ECPs. The initial checkpoint is intended to
Notional
Not to Scale
Figure 2. FOB 2
/HJHQG
&3FKHFNSRLQW
Notional
(&3HQWU\FRQWUROSRLQW
Not to Scale
Figure 3. FOB 3
A
ctions at FOB Gardez revealed how to get ahead of operational environment owner, and others as appropriate.
the enemy decision cycle. Blast analysis showed that This is the warn aspect of risk mitigation—warn the user
.FOB Gardez needed to be closed in response to the of the residual risks that cannot be eliminated by design. It
new threat. The original intent of FOB Gardez was to serve is not possible to eliminate all risks, particularly in a combat
as a small provincial reconstruction team base. These are zone. For protection from truck bombs, the terrain around a
typically intended to be austere and in close proximity to a base, together with barriers and ECPs, constrains vehicular
city to build relations with the community. This makes the approaches. Blast analysis determines the threshold dis-
location inherently unsafe with respect to a vehicle-borne tance for the payload volume of a given size of vehicle. This
becomes a defensive planning factor, which can be calculated
for protecting purpose-built bases and existing facilities.
“Blast analysis is the key tool
Expeditionary operations require the assumption of
in determining the critical size risks. Whether considering the rapid occupation of existing
of the shot with respect to the facilities or the development of purpose-built basing, engi-
terminal effects, or how much neering is needed to proactively determine the various vul-
nerabilities present and develop mitigations for them. Blast
damage a specific weight of analysis is just one tool to develop these mitigations. Failing
explosives can create . . .” to mitigate blast-related threats can be catastrophic to the
people on the base and the missions the base supports.
IED attack. Higher risk is often assumed in such cases since Endnotes:
a major attack would only harm those assisting the local 1
U.S. Army Corps of Engineers PDC, <https://pdc.usace
area. The loss of the base would not directly impact the secu- .army.mil/>, accessed on 2 August 2017.
rity of United Nations forces. 2
Henry Petroski, Design Paradigms: Case Histories of Error
Years after the base was constructed, the provincial and Judgment in Engineering, Cambridge University Press,
reconstruction team was gone and the base had expanded Cambridge, United Kingdom, 27 May 1994.
in size and intent. The assets included artillery; intelli-
gence, surveillance, and reconnaissance assets; helicopter Lieutenant Colonel Kemper is the commander of the 475th
refueling facilities; a mail office; and even a small post Engineer Detachment, a U.S. Army Reserves explosive hazards
exchange. It had become a more significant target and was coordination cell with the 412th Theater Engineer Command.
less connected to the local population. While the restricted He is a professional engineer, a consulting professional engineer,
and a board-certified forensic engineer. His practice includes
approach to other bases gave some measure of warning, a
modeling blasts and predicting structural response.
truck bomb on the highway close to FOB Gardez would pro-
vide no warning.
(“Lead the Way,” continued from page 5)
In engineering terms, this would be a “single mode fail-
ure,” where only one thing must go wrong to create cata- Finally, I look forward to visiting as many units as possi-
strophic effects with no opportunity to mitigate the results. ble in the next few months to see what great things are hap-
In this case, it was a truck bomb on a main supply route pening out there in support of the rest of the military force.
that could take out the region’s quick-reaction force, artil- Essayons!
lery overwatch, and a rotary-wing refueling point. Henry
Petroski’s book, Design Paradigms: Case Histories of Error Endnotes:
and Judgment in Engineering, explains this common failure Army Regulation 600-82, The U.S. Army Regimental Sys-
1
mechanism evolution from “safe” to “unsafe.”2 An original tem, 5 June 1990. (Status: Inactive.)
design is heavily analyzed and well understood. The design Army Regulation 870-21, The U.S. Army Regimental Sys-
2
is modified over time; and subsequent changes are made, tem, 13 April 2017.
assuming that reevaluation is not needed. The original 3
Army Regulation 670-1, Wear and Appearance of Army Uni-
assumptions and constraints are not passed forward. Even- forms and Insignia, 25 May 2017.
tually, the new design extends past the original assump- 4
Department of the Army Pamphlet 670-1, Guide to the Wear
tions and fails. Fortunately, the lesson of FOB Gardez was and Appearance of Army Uniforms and Insignia, 25 May 2017.
paid for only in treasure—not blood.