EOD operator conducting technical assessment of recovered ordnance
HomeWOME IntelligenceEOD Intelligence Briefing

EOD Intelligence Briefing

How Disposal Teams Use Weapons Technical Intelligence

Explosive ordnance disposal teams operate at the sharp end of an intelligence requirement that is rarely well understood outside the EOD community. The render-safe decision — whether to approach, how to approach, and which technique to apply — is a risk assessment. Like all risk assessments, its quality is a direct function of the quality of information available. EOD intelligence exists to reduce the data gap that operators face at the point of encounter. This guide explains how that intelligence is structured, produced, and applied.

The Information Challenge at Point of Encounter

An EOD operator responding to a task typically arrives with a threat report that describes what the item looks like and where it was found. Rarely does it describe the energetic fill, fuze mechanism, initiation circuit, country of manufacture, age, or storage condition — the technical parameters that most significantly affect render-safe risk. The gap between what is known and what needs to be known to make a safe render-safe decision is the data gap. EOD intelligence is the discipline of reducing that gap in advance.

In a mature theatre, EOD intelligence feeds a threat database that operators consult before each task. Entries in that database describe device types by family — Soviet-era artillery shells, Iranian 107mm rockets, Chinese anti-tank mines, commercial IED components — and record what is known about fuze states, known hazards, and historical render-safe outcomes. The database grows as operators report back from completed tasks and as Weapons Technical Intelligence (WTI) products are produced from recovered items.

Weapons Technical Intelligence

WTI is the technical exploitation of recovered or observed munitions to characterise them as intelligence products. A WTI report on a recovered anti-tank mine, for example, records: manufacturer identity (where determinable), country of origin, main charge energetic fill (type and estimated Net Explosive Quantity), fuze type and mechanism, initiation circuit (where an IED), anti-handling features, condition of energetics (sensitised, exuded, crystallised, or nominal), Hazard Division and Compatibility Group, and any historical data gaps.

WTI outputs serve two distinct customers. For tactical EOD teams, WTI provides updated threat characterisation that improves render-safe risk assessment for subsequent encounters with the same device family. For procurement and policy authorities, WTI reveals which weapons systems adversaries are deploying — intelligence that informs acquisition priorities, countermeasure development, and diplomatic assessments. ISC analyses open-source WTI-derived information as part of its WOME Intelligence programme.

The Data Gap in WTI

Effective WTI reporting is disciplined about recording what is not known as well as what is. The most critical data gaps in WOME technical assessments are typically: fuze state (armed, safe, or indeterminate), NEQ (actual explosive mass, which may differ from nominal), energetic condition (particularly for aged or environmentally stressed munitions), and country of origin (for third-party-transferred or re-manufactured items). An honest WTI product that clearly identifies its data gaps provides more operational value than one that presents confident assessments without evidential basis.

EOD Intelligence in the Clearance Context

Humanitarian Demining

In post-conflict humanitarian demining operations, EOD intelligence takes a different form from tactical military applications. Humanitarian operators need to understand the contamination profile of a survey area — which munition types are present, in what density, at what depth, and in what condition — before committing clearance assets. This intelligence is drawn from historical records (military depositions, battlefield survey reports, survivor testimony, aerial photography), ground truth from earlier clearance operations, and the survey outputs of humanitarian mine action organisations.

The primary open-source repositories for humanitarian EOD intelligence include the GICHD (Geneva International Centre for Humanitarian Demining), HALO Trust, Mines Advisory Group (MAG), and national mine action authorities. ISC monitors reporting from these organisations as a primary indicator of ERW contamination threats and clearance progress in active mine action contexts.

Explosive Remnants of War (ERW)

Protocol V to the Convention on Certain Conventional Weapons (CCW, 2003) defines Explosive Remnants of War (ERW) as all abandoned and unexploded munitions left after conflict, including artillery shells, mortar rounds, rockets, bombs, submunitions, grenades, and naval mines. ERW is distinguished from landmines, which are governed by separate instruments (Ottawa Treaty, CCW Protocol II Amended). Unexploded Ordnance (UXO) is the subset of ERW that failed to function as designed — a submunition that did not detonate on impact, a shell that failed to function — as opposed to Abandoned Explosive Ordnance (AXO), which was discarded without being fired.

This terminology matters operationally. An EOD operator encountering what appears to be a “dud” submunition needs to know whether it is a UXO (designed fuze that failed to function, and may still be armed) or an AXO (may have been rendered safe before abandonment, or may not). The answer changes the approach and the required standoff distances.

Hazard Classification in EOD Decision-Making

Every munition an EOD operator encounters carries a Hazard Division (HD) and Compatibility Group (CG) under the UN Transport of Dangerous Goods (TDG) framework, which is adopted into military use through the AASTP series. These classifications directly affect:

  • Inhabited Building Distance (IBD): The minimum separation from occupied structures required for storage or disposal activities
  • Inter-Magazine Distance (IMD): Minimum separation between explosive storage points to prevent sympathetic detonation
  • Public Traffic Route Distance (PTRD): Minimum separation from public roads
  • Personnel Blast Distance (PBD): Minimum operator separation for in-situ disposal activities

HD 1.1 (mass detonation hazard) items carry the largest required separation distances and the highest risk classification. Identifying HD 1.1 status at the point of encounter — rather than discovering it during approach — is a primary benefit of advance threat intelligence. Munitions that are nominally HD 1.3 (fire hazard) or HD 1.4 (minimal hazard) in their designed state may be reclassified to HD 1.1 if energetics have sensitised due to age, environmental stress, or damage. This reclassification is a core WTI judgment that affects standoff requirements and render-safe procedure selection.

“The render-safe decision is a risk assessment. Its quality depends entirely on the quality of the threat intelligence that precedes it. EOD intelligence is not an optional supplement — it is a force protection requirement.” — Steve Sawyers MIExpE VR

ISC’s Approach to Open-Source EOD Intelligence

ISC produces open-source WOME intelligence that supports EOD community awareness of procurement developments, doctrine changes, and threat landscape evolution. Our analytical approach applies three structured filters to all source material: a plausibility check (does the reported technical performance match what is physically achievable?), a safety audit (are reported handling or disposal procedures consistent with recognised doctrine?), and systematic data gap identification (what is not known, and what confidence should be placed on what is reported?).

All ISC analytical products are produced in the open-source, unclassified domain. They are not a substitute for classified threat intelligence products, but they complement classified holdings by providing independently assessed open-source context. Our WOME Intelligence feed tracks EOD-relevant developments including procurement of EOD equipment and clearance services, doctrine publications from GICHD and HALO Trust, and parliamentary and media reporting on contamination threats and clearance operations. For training support, ISC’s WOME technical training courses equip personnel with the analytical framework to assess and apply EOD intelligence effectively.

Frequently Asked Questions

What is EOD intelligence?
EOD intelligence is technical intelligence supporting explosive ordnance disposal operations. It covers threat identification, hazard classification, known render-safe procedures, and theatre-specific threat trends. It reduces the data gap operators face at point of encounter and informs risk assessments underpinning render-safe decisions.
What is Weapons Technical Intelligence (WTI)?
WTI is the technical exploitation of recovered or observed munitions to determine manufacturer, country of origin, energetic fill, initiation system, fuze type, and hazard classification. WTI updates threat databases, informs EOD training, and supports procurement intelligence on adversary weapons deployments.
What is the difference between EOD and IEDD?
EOD covers detection, identification, and disposal of all explosive ordnance including conventional ammunition, mines, submunitions, and improvised devices. IEDD is the specialist sub-discipline focused specifically on IEDs. All IEDD operators are EOD qualified, but not all EOD operators are IEDD specialists.
What are ERW and UXO?
Explosive Remnants of War (ERW) are all abandoned and unexploded munitions left after conflict, as defined by CCW Protocol V (2003). Unexploded Ordnance (UXO) is a subset covering munitions that were deployed but failed to function. Abandoned Explosive Ordnance (AXO) covers discarded munitions not fired in action.
What is a Hazard Division?
Hazard Division (HD) classifies explosive hazard under the UN TDG framework. HD 1.1 (mass detonation) carries the largest required separation distances. HD affects IBD, IMD, and PTRD requirements for storage and disposal. Aged or damaged munitions may reclassify to HD 1.1 even if nominally lower-hazard in designed state.
What open sources does ISC use for EOD intelligence?
ISC draws on GICHD, HALO Trust, MAG, and national mine action authority reports; procurement portals for EOD equipment and clearance services; parliamentary records; and specialist defence media. All sources are rated using NATO STANAG 2022 reliability and accuracy codes. ISC operates exclusively in the open-source, unclassified domain.