<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-29-039</article-id><article-id pub-id-type="doi">10.35467/sdq/119946</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>Operations in subterranean systems: Terrain and weather variable</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-0150-2884</contrib-id><name><surname>Bartolomeu</surname><given-names>José Paulo Silva</given-names></name><email>jpbartolomeu@gmail.com</email></contrib><aff id="aff1">Military University Institute, Portugal, R. Pedrouços 122, 1449-027 Lisboa, Portugal</aff></contrib-group><pub-date pub-type="epub"><day>14</day><month>04</month><year>2020</year></pub-date><volume>29</volume><issue>1</issue><fpage>39</fpage><lpage>60</lpage><history><date date-type="received"><day>29</day><month>12</month><year>2019</year></date><date date-type="rev-recd"><day>30</day><month>03</month><year>2020</year></date><date date-type="accepted"><day>31</day><month>03</month><year>2020</year></date></history><permissions><copyright-statement>© 2020 J. P. S. Bartolomeu published by War Studies University, Poland.</copyright-statement><copyright-year>2020</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License</license-p></license></permissions><abstract><p>The overall objective of the research is to summarize tactical considerations, resulting from terrain and weather analysis, to support the preparation, planning and execution of subterranean operations. The study used the Grounded Theory for collection, analysis, and systematic treatment of data. The main data sources for the study consisted of purposive sampling from operations in subterranean systems and lessons learned from them. Two new sub-variables are now proposed to be included in terrain and weather variable from mission analysis model for subterranean operations: Subterranean system’s location and accesses and subterranean system features. The key to finding subterranean systems is through terrain analysis, physical ground search, operational indicators, and intelligence products. The analysis of the features of the subterranean system and its mapping is critical for developing courses of action. Forces must be trained and equipped to manoeuvre and combat at short distances and poor visibility conditions. Surface access points and command and control bunkers usually are assessed as key terrain. Obstacles placed at intersections are excellent ambush sites. Accessing sophisticated structures requires specific techniques and equipment. Inside the subterranean systems, existing angles, barriers, walls, cavities, stairwells and other objects provide cover and concealment. Water can make it impossible to build subterranean systems, place obstacles, or even use them; droughts can “create” new avenues of approach. Clouds and fog difficult the detection of subterranean systems. The terrain and weather analysis model, the characteristics, and the tactical considerations presented, all combined, support the preparation, planning, and execution of operations in subterranean systems.</p></abstract><kwd-group><kwd>operations</kwd><kwd>tunnel</kwd><kwd>tactical</kwd><kwd>subterranean</kwd><kwd>terrain and weather</kwd></kwd-group></article-meta></front><body><sec id="S1" sec-type="intro"><title>Introduction</title><p>Subterranean systems (spaces or structures located beneath the ground) have been used recurrently by states, regular forces, irregular forces, terrorists, criminals and civilians throughout the history of mankind. Archaeological pieces of evidence from excavations at Troy show engineering units of King Sargon, ruler of Akkad between 2334 and 2279 BC, mining under enemy city walls (<xref ref-type="bibr" rid="ref37">Springer, 2015</xref>).</p><p>The tactical value of subterranean systems has been exploited by several actors, in varied tasks, operations, and conflicts. They have been used to store water, equipment, weapons and ammunition, lodging, command and control (C2), weaken defensive structures, avoid obstacles at the surface, access inaccessible places by other means, achieve surprise and generate attacks, protection, gain time, production, and defence, and they also have been employed as routes of communication, prison, and hospital, among other uses (<xref ref-type="bibr" rid="ref30">Richemond-Barak, 2018</xref>, pp. 3, 11, 42, 46; United States Army [USA], 2017b, pp. 1–1, 1–2; USA, 2019a, pp. 7–32, 7–34). Improvements in the capability to construct spaces and underground structures enhanced their usefulness and proliferation. Contenders with less strength or capabilities use these systems to gain freedom of action; state actors use them to hide and protect military capabilities. In the future, more conflicts will take place underground or at least incorporate elements of subterranean warfare, particularly when one party has aerial and technological superiority over another (<xref ref-type="bibr" rid="ref30">Richemond-Barak, 2018</xref>, p. 53).</p><p>Subterranean systems have very specific characteristics and present significant challenges to fire, control, and force protection (USA, 2019a, p. 7–32). The identification of the subterranean system’s location, features, and vulnerabilities, the communications and navigation, as well as assessment of the enemy, can all be very challenging. Models that reflect the main characteristics and effects of terrain and weather in operations in subterranean systems can be very useful to state operational requirements, build capabilities and draw up plans and orders.</p><p>Considering the relevance of this subject, the object of research selected for this study is the terrain and weather in subterranean operations. Data collection includes operations in subterranean systems in the contemporary age, in several regions of the World where wars and conflicts took place. Theoretical sampling and saturation delimited the number of operations analysed (<xref ref-type="bibr" rid="ref14">Glaser and Strauss, 1967</xref>, pp. 61, 62, 111, 112). In relation to content, the study only addresses operations in subterranean systems at the tactical level.</p><p>The overall objective (OO) of the research is to summarise tactical considerations that result from terrain and weather analysis to support the preparation, planning and execution of subterranean operations. The following specific objectives (SO) were established to operationalise this objective:</p><p>SO1: Propose one terrain and weather analysis model for ground forces operating in subterranean systems;</p><p>SO2: Deduce the main characteristics and effects of terrain and weather variable in subterranean systems.</p><p>The objectives presented and the inputs from systematic collection and analysis of data during the investigation allowed the construction of the following central question (CQ): what tactical considerations that result from terrain and weather analysis should guide the preparation of ground forces to conduct operations in subterranean systems?</p><p>The study is organised in such a way that the second section begins after the introduction, where a theoretical and conceptual framework is made that describes relevant concepts for ground forces operating in subterranean systems. The third section describes the methodology and method adopted. The fourth section contains data and discusses the results for formulating theories and explanations for observed patterns. The fifth section sums up the tactical considerations that result from Terrain and Weather analysis, to support preparation of ground forces to conduct operations in subterranean systems. Finally, the main conclusions obtained in the study are listed.</p></sec><sec id="S2"><title>Theoretical and conceptual framework</title><p>This section describes some structuring concepts for the theme under study. The review of the literature focuses on military operations, mission analysis terrain and weather variable, and subterranean systems categories. The analysis model adopted to conduct the research is also presented.</p><p>Military operations are complex, consisting of human endeavour (a clash of wills characterised by threat or application of force and violence), conducted in dynamic and uncertain environments (often among populations), and designed to achieve a political purpose (USA, 2019b, p. 1–1). An operation, according to NATO (2018, p. 91), consists of a sequence of coordinated military actions with a defined purpose. The publication <italic>Operations (ADRP 3-0)</italic> defines <italic>operation</italic> as a “sequence of tactical actions with a common purpose” (USA, 2017a, p. 1–7). “A tactical action is a battle or engagement employing lethal and nonlethal actions designed for a specific purpose” (enemy, terrain, friendly forces, or other entities) (USA, 2017a, p. 3–13).</p><p>Land operations occur across the entire expanse of the land domain focused on the destruction or dislocation of enemy forces or securing key land objectives that reduce the enemy’s ability to conduct operations (USA, 2017a, p. 1–8). The land domain includes surface, subsurface and supersurface areas; “subsurface areas consist of areas below the surface area” (USA, 2019a, pp. 7–32, 8–1). The analysis of the mission variables - <italic>mission, enemy, terrain and weather, troops and support available, time available, and civil considerations</italic> (METT-TC) refines the leader’s understanding of the situation and is essential for developing courses of action (COA) for a given operation (<xref ref-type="bibr" rid="ref42">USA, 2016</xref>, p. A–2; Exército Português [EP], 2012, pp. 1–12, B–23, B–24; USA, 2017a, p.1–2; <xref ref-type="bibr" rid="ref26">NATO, 2019</xref>, E–1). Terrain and weather analysis consist in collecting, processing, evaluating and interpreting geographical information on natural and man-made features, slope and elevation, soil conditions, and vegetation, on the impact of climate and weather on terrain, and their effects on the forces. At tactical level, analysts use the five military aspects of terrain expressed in the memory aid OAKOC – observation and fields of fire, avenues of approach, key and decisive terrain, obstacles, cover and concealment -, and the military aspects of weather - visibility, wind, precipitation, cloud cover, temperature, and humidity - to develop assessments (<xref ref-type="bibr" rid="ref42">USA, 2016</xref>, pp. 10-5, A–3, A–4; <xref ref-type="bibr" rid="ref9">EP, 2012</xref>, pp. 4–7, 4–8; USA, 2019a, pp. 4–5, 4–18, 4–19).</p><p>Subterranean systems are organised into three main categories: tunnels, natural cavities and caves; urban subsurface systems; and military purpose underground facilities (USA, 2017b, p. 2–1). Caves and natural cavities are formed by the erosion or dissolution of limestone and can be adapted for operational purposes. Urban subsurface systems include basements, catacombs (sometimes encountered in older sections of cities), civil defence shelters, underground garages, subway lines (which usually have electrified rails and power cables, and are located under main roads), mines, aqueducts, sewers (sanitary, storm, or combined system), passages and utility tunnels (<xref ref-type="bibr" rid="ref24">NATO, 2017</xref>, p. 4–25; USA, 2017b, pp. 2–1, 2–2; USA, 2017c, p. 1–6; <xref ref-type="bibr" rid="ref30">Richemond-Barak, 2018</xref>, p. 47; USA, 2019a, pp. 7–32, 7–34). These systems typically benefit from further protection resulting from surface constructions. In addition to being used by the population for day to day activities, they can also be used for illicit or military purposes.</p><p>Underground facilities are subdivided into shallow and deep facilities, which are known as “cut and cover” and ‘”deeply buried” (<xref ref-type="bibr" rid="ref34">Sepp, 2000</xref>, p.14). Military purpose underground facilities have redundant power, water, ventilation, and communications infrastructure, blast doors, and protection against unauthorised access in the form of at least one, if not multiple barriers (doors, gates, hatches and framing, as well as the presence of any reinforcement to hinges and locking mechanisms) (USA, 2017b, pp. 2–2).</p><p>Shallow facilities represent most underground facilities and include underground silos and bunkers, usually are dug out, built, and then re-covered with the original earth (“cut and cover”). “They frequently have down ramps that provide access from the surface to the facility and may have thick, reinforced concrete walls and ceilings” (USA, 2017b, pp. 2–5).</p><p>Deep facilities are state facilities or military bases, constructed by tunnelling operations, settled deep below the surface or deep within mountains (have more than 20 m of over-burden and are surrounded by solid rock), and are very difficult to detect (<xref ref-type="bibr" rid="ref34">Sepp, 2000</xref>, pp. 5, 6, 7). These facilities are immune to attack by most weapons, are larger, better equipped, potentially containing dozens of rooms, multiple portals, and doors designed to prevent unauthorised access and/or protect against blast effects (including nuclear blast doors) (<xref ref-type="bibr" rid="ref34">Sepp, 2000</xref>, p. 10; <xref ref-type="bibr" rid="ref30">Richemond-Barak, 2018</xref>, pp. xviii, 52; USA, 2017b, pp. 2–1, 2–2, 2–4, 2–5). The structuring concepts are extremely relevant to the construction of the conceptual framework.</p><p>During the review of the literature, it was assessed that land operations occur in surface, subsurface and supersurface areas focused on the destruction or dislocation of enemy forces or securing key land objectives that reduce the enemy’s ability to conduct operations. Land operations are conducted in dynamic and uncertain environments. Terrain and weather analysis is essential for developing COA. From the land operations perspective, subterranean systems can be organised into three main categories: tunnels, natural cavities and caves; urban subsurface systems; and underground facilities for military purpose. These categories incorporate very relevant features for this study and for conducting operations in areas below the surface area (subsurface); for this reason, a new sub-variable - subterranean system features – was added to the variable terrain and weather from the mission analysis model in use in Portuguese Army, USA, and NATO doctrines. The proposed analysis model in <xref ref-type="table" rid="T1">table 1</xref> (Provisional model for terrain and weather analysis in subterranean systems) will be further refined due to the products obtained through data collection and analysis, as specified in Grounded Theory.</p><table-wrap id="T1" orientation="portrait" position="float"><label>Table 1</label><caption><p>Provisional model for terrain and weather analysis in subterranean systems</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th>Dimension</th><th>Mission variables</th><th>Sub-variables</th></tr></thead><tbody valign="top"><tr><td rowspan="2">Land operations in subterranean systems</td><td>Terrain</td><td align="left">Subterranean system categories and their features (dimensions, depth, type of construction, level of protection, purpose and vulnerabilities), observation and fields of fire, avenues of approach, key or decisive terrain, obstacles, and cover and concealment.</td></tr><tr><td>Weather</td><td align="left">Visibility, winds, precipitation, cloud cover, temperature, and humidity.</td></tr></tbody></table><table-wrap-foot><fn id="TF1-1"><p>Source: Adapted from Portuguese Army (<xref ref-type="bibr" rid="ref9">EP, 2012</xref>), USA (2016; 2017b; 2019) and <xref ref-type="bibr" rid="ref26">NATO (2019)</xref> doctrines</p></fn></table-wrap-foot></table-wrap><p>The CQ focused the theoretical and conceptual framework and the building of a provisional model for mission analysis in subterranean systems, but this model requires consolidation and verification.</p><p>With CQ as a reference, and attending the defined SO, the following derived questions (DQ) were formulated:</p><p>DQ1: What Terrain and weather analysis model should be adopted by ground forces operating in subterranean systems?</p><p>DQ2: What are the main characteristics of terrain and weather in subterranean systems?</p><p>In order to answer to DQ1 it is possible to present the deduced analysis model as hypothesis; however, the verification of this hypothesis and the answer to DQ2 requires data analysis and an inductive generation of theories (<xref ref-type="bibr" rid="ref6">Creswell, 2009</xref>, p. 70).</p></sec><sec id="S3" sec-type="methods"><title>Methodology</title><p>This section describes the methodology followed and the method used in the research.</p><p>The methodology portrays steps that facilitate study understanding and results obtained while simultaneously allowing its replication in future investigations. The research strategy adopted is mixed, where the central premise is that of complementarity, which enables the collection, analysis and integration or relationship of qualitative and quantitative data (<xref ref-type="bibr" rid="ref6">Creswell, 2009</xref>, p. 203). To build the theoretical and conceptual framework, which consists of a review of the literature and definition of the analysis model, deductive reasoning was adopted. A qualitative research method was adopted for collection and analysis of data, as well as for testing of existing theories. This allows the emergence of new ideas and theories (<xref ref-type="bibr" rid="ref2">Bryman, 2012</xref>, p. 387), i.e., new ideas and theories for ground forces to conduct military operations in subterranean systems. As the results obtained with inductive reasoning alone do not always allow their generalisation or the replication of results to other contexts, iterative elements of deduction and abduction are incorporated again throughout the process (<xref ref-type="bibr" rid="ref3">Charmaz, 2008</xref>, pp. 155–157; <xref ref-type="bibr" rid="ref2">Bryman, 2012</xref>, pp. 26, 401).</p><p>Research privileges empirical observation and the contextual conditions in which phenomena occur to create theories, and relies on the Grounded Theory for the collection, analysis, and systematic treatment of data (<xref ref-type="bibr" rid="ref14">Glaser and Strauss, 1967</xref>; <xref ref-type="bibr" rid="ref38">Strauss, 1987</xref>). This research design exploits primary and secondary data sources, enhances research questions, and permanently combines research with data analysis, providing a rich and complete insight into subsurface operations. The method refers to the participants and procedure, data collection instrument(s) and data processing technique(s) used.</p><p>The main data sources for the study are the operations in subterranean systems and lessons learned from them. Because of the impossibility of using the entire universe of study (population), representative samples of the target population were selected (<xref ref-type="bibr" rid="ref12">Fortin, 2003</xref>, p. 202). The deliberate choice of the samples is known as “purposive sampling” (<xref ref-type="bibr" rid="ref53">Yin, 2016</xref>, p. 93). The subterranean operations were selected from the US Civil War, World War I, the 2<sup>nd</sup> Sino-Japanese War, the Korean Conflict, the Vietnam War, the Afghanistan War, and the recent conflicts in the Middle East (e.g., Turkey, Israel, Syria, Lebanon, Afghanistan and Iraq), and Tunisia. Samples included regular and irregular actors and these increased throughout the research due to the needs identified during data interpretation; and only stopped increasing when theoretical saturation was reached, i.e. when new data no longer added value. The data research was done at the Military University Institute in Portugal, primarily on the Internet, with access to international sources.</p><p>Documentary and non-documentary techniques were used for data collection. Documentary techniques relied on written and unwritten instruments to access primary and secondary sources. The written instruments consisted of books, scientific articles, doctrinal publications, and newspaper articles; the unwritten instruments comprised photographs, images and videos. As a non-documentary technique, participant observation was adopted. In this case, the researcher was part of the community under study, as well as a Portuguese Army Officer and Land Military Tactics teacher, and thus had access to the perspectives of the people with whom he interacts and to the group discussions.</p><p>Manual techniques and word documents were used for data processing. A memo prepared from the sources consulted originated from each of the operations. Relevant data is extracted from the memos and coded manually. Subsequently, the memos were used to perform analyses for each type of operation by the proposed analysis model, and the results obtained and published. The most relevant features of the variable and sub-variables were compared with memos drawn from the US and NATO doctrines on the same theme. As a result of the discussion, theories and explanations were generated for the observed patterns, providing the answer to DQ2 and CQ.</p></sec><sec id="S4"><title>Presentation of data and discussion of results</title><p>In subterranean operations, leaders analyse the same mission variables that they use in any land operation; however, they may have to do some critical thinking and “[a]dditionally, there is a high probability that the situation will be extremely unclear.” (USA, 2017b, p. 3–3). Thus, seeking to contribute to the clarification of the situation during the mission analysis for conducting operations in subterranean systems, this section initially presents data for answering to DQ1. After the consolidation of the analysis model, together with data presented for the mission variable and sub-variables, theories and explanations for observed patterns are formulated, consisting of the main characteristics and effects of the terrain and weather variable in subterranean systems and providing the answer to DQ2.</p></sec><sec id="S5"><title>Consolidation of the analysis model</title><p>The theoretical saturation obtained through the study confirmed the validity of the variable and sub-variables proposed in the provisional model of analysis. In addition, during data collection, the location and access to some categories of subterranean systems were identified as one of the major concerns of the forces (e.g., intelligence effort, search operations, and local security operations to deny location). This concern is also noted by several authors; here are some examples:
<list list-type="simple"><list-item><p>- “Tunnel detection demands extreme care and thoroughness on the part of friendly troops to locate hidden entrances or other evidence of their existence” (US Military Assistance Command, Vietnam [USMAC-V], 1966, p. 18);</p></list-item><list-item><p>- “Due to the concealed character of the tunnel, detecting it constitutes a major part of the operation” (<xref ref-type="bibr" rid="ref35">Shapir and Perel, 2014</xref>, p. 53);</p></list-item><list-item><p>- “Detecting the tunnels is a very very difficult task” (<xref ref-type="bibr" rid="ref16">Hecht, 2015</xref>);</p></list-item></list></p><p>“[S]earching for and finding underground facilities is the most important step in dealing with these targets” (<xref ref-type="bibr" rid="ref34">Sepp, 2000</xref>, p. 15).</p><p>Given the collected data (presented in this section), corroborated by the aforementioned authors, it is assessed relevant to add a new sub-variable into the variable terrain and weather: Subterranean system’s location and accesses. The data obtained also reflects the need to include the environmental factors (e.g., air quality, existence of animals or hazardous materials), slope and azimuth (especially in tunnels and sewers) in the analysis of the subterranean system features, as well as connections with other systems.</p><p>The theoretical coding given in <xref ref-type="table" rid="T2">table 2</xref> is thus obtained, also providing an answer to DQ1.</p><table-wrap id="T2" orientation="portrait" position="float"><label>Table 2</label><caption><p>Model for Terrain and Weather analysis in subterranean systems</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th>Dimension</th><th>Mission variables</th><th>Sub-variables</th></tr></thead><tbody valign="top"><tr><td rowspan="2">Land operations in subterranean systems</td><td>Terrain</td><td align="left">Subterranean system’s location and accesses, subterranean system categories and its features (dimensions, depth, type of construction, level of protection, environmental factors, slope and azimuth, connections with other systems, purpose and vulnerabilities), observation and fields of fire, avenues of approach, key or decisive terrain, obstacles, and cover and concealment.</td></tr><tr><td>Weather</td><td align="left">Visibility, winds, precipitation, cloud cover, temperature, and humidity.</td></tr></tbody></table><table-wrap-foot><fn id="TF2-1"><p>Source: Adapted from Portuguese Army (<xref ref-type="bibr" rid="ref9">EP, 2012</xref>), USA (2016; 2017b; 2019) and <xref ref-type="bibr" rid="ref26">NATO (2019)</xref> doctrines</p></fn></table-wrap-foot></table-wrap></sec><sec id="S6"><title>Subterranean system’s location and accesses</title><p>During the American Civil War, at the Siege of Petersburg (1864), the earth removed from the tunnels was concealed in the vegetation at night and fires on the surface were made to conceal smoke rising from the ventilation system (<xref ref-type="bibr" rid="ref21">Kinard, 1998</xref>, pp. 31, 32; <xref ref-type="bibr" rid="ref33">Schmutz, 2009</xref>, pp. 55, 61).</p><p>During World War I, the progress of excavation work was often slowed by bombardments in the entrances of the galleries. French tackled this problem by constructing alternative concealed entrances (15 m back) (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, p. 64). The location of subterranean systems is not easy to determine, and their existence is kept a secret from enemy forces and, sometimes, friendly forces to reduce the chances of intelligence leakage (e.g., Australian offensive against Turkish lines in September 1916 [<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, pp. 196–198]).</p><p>In the Korean War (1950-1953), false targets and disguised tunnel entrances were built on the surface, thus contributing to increased ammunition consumption by opposing forces (<xref ref-type="bibr" rid="ref17">Herman, 2014</xref>).</p><p>In the Vietnam War, Viet Cong tunnels were very well camouflaged; entrances, bunkers and vents were very difficult to locate (<xref ref-type="bibr" rid="ref51">USMAC-V, 1967</xref>, p. 17). The Americans used searching tactics and techniques to locate tunnels (<xref ref-type="bibr" rid="ref52">USMAC-V, 1968</xref>, pp. 3, 4):
<list list-type="simple"><list-item><p>- A search area, with no more than 1000 m<sup>2</sup>, was assigned to one rifle company;</p></list-item><list-item><p>- One rifle squad had a search team and a security team rotating periodically;</p></list-item><list-item><p>- Looking for tunnel entrance/presence indicators, i.e., small trails in the vegetation, fresh food or human faeces in the vicinity, worn places on the bamboo, slight depression in or around the bamboo clump, bamboo breathing tubes (the beaches and dunes were disguised in the middle of the cactus), or isolated individuals (<xref ref-type="bibr" rid="ref52">USMAC-V, 1968</xref>, pp. 3, 4, 6–17);</p></list-item><list-item><p>- Dogs for detecting Viet Cong fighters hiding in tunnels and sappers penetrating US bases (<xref ref-type="bibr" rid="ref50">USMAC-V, 1966</xref>, p.12; <xref ref-type="bibr" rid="ref51">USMAC-V, 1967</xref>, p. 17).</p></list-item></list></p><p>After the Israeli strike on Iraq’s Osirak nuclear reactor in 1981, Iraqi Armed Forces started to build the walls and roofs of structures before creating underground facilities and increased the use of deep shelters and tunnels to conceal satellites and reconnaissance aircraft (<xref ref-type="bibr" rid="ref5">Cordesman, 2003</xref>, pp. 33, 106, 218). In the Gaza Strip, the main problem for IDF in subterranean operations between 1990 and 2014 was tunnel detection. After 1990, four different systems were used (geophone systems, sensors based on optical fibres, mapping changes in ground-generated infrared radiation, and microgravity measurements), but none of them succeeded (<xref ref-type="bibr" rid="ref35">Shapir and Perel, 2014</xref>, pp. 53–54; Cohen <italic>et al.</italic>, 2017, p. 100).</p><p>During the Lebanon War in 2006, Israeli intelligence discovered a bunker and a tunnel system near the town of Maroun al-Ras, but the lack of coordination with the units on the ground (and the unmanned aerial systems) resulted in tactical failures and caused severe civilian casualties (<xref ref-type="bibr" rid="ref19">Jensen, 2019</xref>, pp. 159, 160, 162). In 2014, due to the ineffectiveness of the airstrikes, IDF conducted “Operation Protective Edge” to locate and destroy tunnels. HUMINT and ground patrols proved to be efficient ways to locate tunnels. Entrances to cross-border tunnels are generally dug from underneath buildings (apartment houses, private family houses, or public facilities) in Gaza residential neighbourhoods closest to the border (e.g. the cross-border tunnel dug from the grounds of the Al-Wafa hospital on the outskirts of the Gaza neighbourhood of Shujayia, near the Israeli village of Kfar Aza approximately 3 km away, and another, still in the process of being dug, from the basement of a mosque in Khuza’a) (<xref ref-type="bibr" rid="ref16">Hecht, 2015</xref>).</p><p>Tunnels exit points inside Israel were only dug in the last hours before being used by the attack-teams to prevent their detection (<xref ref-type="bibr" rid="ref16">Hecht, 2015</xref>). Things that point to a tunnel being built include underground vibrations, motors, and digging sounds. Unusual truck/vehicle activity in an area, an out-of-the-ordinary amount of bags or barrels, electric wire, generators, a great number of people entering and not leaving for a long time at one particular site, people with muddy clothes, headlamps, candles, piping, and water pumps.</p><p>Visual signs of the presence of tunnels after the construction include depressions, collapsed terrain, air holes, ventilation shafts, steam or smoke rising from the ground, turned or managed soil, worn and cut vegetation, trails, fresh food, lone individual, sinkholes, human faeces, the scent of burning wood, and food being cooked in uninhabited areas. In urban areas, signs of the presence of subsurface systems include manhole covers, steam rising from the ground, existing flooring and construction materials in houses, businesses, and other structures not under construction. There are also operational indicators such as movement of enemy forces in a specific direction, sniper fire from areas with no avenues of withdrawal, enemy inflicting casualties at relatively long-range and withdrawing without decisive engagement or being detected by friendly forces (hit-and-run tactics), or failure of cordons to prevent infiltration or withdrawal of enemy forces. Civilian buildings such as religious houses, schools, hospitals, chicken houses, stables, latrines and private homes are used to hide tunnel entrances; false walls and floors, laid-out wires and hoses, and modified fans can also indicate the presence of tunnels.</p><p>Military purposed underground facilities are constructed and operated with enormous security and reserve measures by states; therefore, they are quite difficult to find. The construction of underground facilities and their internal layout can be masked by mining operations, construction of civil infrastructure, and by transporting the material away from the site (USA, 2019c, p. 1–6). Indicators of the existence of deeply buried facilities include gravity perturbations, emergency exits, water and sewage hook-ups, ventilation shafts, and electrical power lines (above or below ground).</p></sec><sec id="S7"><title>Subterranean system categories and its features</title><p>During World War I, rudimentary tunnels called “Russian sap” were widely used. They were dug to a depth of 25 to 50 cm, with a width of 80 cm at the base and 1 m at the top and between 1.60 m and 1.80 m high, had no timber supports, and had a hole for ventilation every 13.7 m (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, pp. 185, 187, 190). When used for supplies and casualty evacuation, their width often needed to be greater to allow two-way traffic (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, pp. 206, 207). The sophistication of the tunnels evolved rapidly during the war. French forces built the main tunnels from 35 m to 45 m long, from 1.30 m to 1.50 m high, and 1 m width (the British ones were from 1.47 m to 1.93 m high, and 84 cm width) to provide good monitoring and ventilation; for longer tunnels, dimensions were reduced to 80 cm and 65 cm. The depth used had to be sufficient to provide protection against artillery ammunition and enemy advances (between 4 and 20 m). Whenever explosions were made inside the mine, they had to ensure that the depth and load produced “camouflets” without craters, i.e. without creating further obstacles for assaulting forces on the surface. (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, pp. 40, 53, 60).</p><p>Wherever possible, tunnels were built in pairs, 15-20 m apart, but connected to increase ventilation (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, pp. 29, 51, 53, 209). Digging tunnels at lower altitudes than the target’s altitude allowed the Germans to reach depths of 40 m, thus avoiding existing craters and detection by the French (e.g., in Vauquois, a mine of 16 500 kg was detonated at 35 m deep) (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, p. 61). In early 1918, the tunnels reached 95 m (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, p. 73). Evidence of the increasing sophistication of the tunnels can be seen in the “subways”, of 2 m high and wide enough for two laden men to pass. Subways had electric lighting, plans of the subways placed at entrances and mid-way along, direction boards at the junctions, traffic checkpoints (Military Police) with a telephone connection and traffic light systems (to allow large flows of forces to quickly reach the front line when necessary), and, in some cases, tramways (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, pp. 225, 226). From mid-1917, the excavations were covered with 8 to 10 m of earth, reinforced with strong timber, and had at least two exits, wide and high enough to allow rapid exiting by the garrison (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, p. 245). The German mined dug-outs at Arras were all designed to a pattern; the stairways, supports, and the timber used in them resulted from replication in sawmills (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, p. 232).</p><p>The caves were of varying size, some could accommodate thousands of troops, and were provided with electricity, water, gas-proof doors, and tramlines. During the Battle of Arras (April 1917), the “Thompson’s Cave” was able to accommodate 700 casualties on stretchers, had dressing and operating rooms, kitchens, and latrines (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, 230, 231). Cellars, catacombs, quarries, mines, aqueducts and sewers were some of the urban subsurface systems used (e.g., the British used a small boy to run telephone cable through the Arras sewers [<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, p. 228]). Most underground facilities with a military purpose were shallow. German bunkers were quite comfortable, their dimensions and configuration varied depending on the terrain and nature of the soil, but in general they were 10 m long, 2 m wide, and 1.8 m high; they were cased with jointed beams of 8 cm thickness and covered with 5-6 m of earth (in 1917, they increased the thickness of earth to 7-8 m, especially in the case of command posts, medical or signals bunkers) (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, pp. 215, 222). Access to the shelters was from the trench, through a hole or staircase. In 1917, the Germans began to build shellproof concrete bunkers, sized to accommodate 18 soldiers, and to permit rapid evacuation to meet an attack (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, p. 245).</p><p>The nature of the soil (sand, rock, or clay) is very pertinent in tunnel construction (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, pp. 48, 54, 96). In Flanders, geological knowledge was very relevant for deep tunnelling, assessing water levels according to the time of year, and ensuring water supply (<xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, pp. 175, 245). In Vietnam, coastal areas featured sandy or clay soils; sandstone was found in this region and was excellent for tunnelling as it required no shoring up. Laterite, a reddish-brown, hard soil rich in iron oxide was also common in the region but was difficult to dig through but, on the other hand, provided good support for tunnels, trenches, and bunker pits (<xref ref-type="bibr" rid="ref32">Rottman, 2006</xref>, p. 18). Vietnam tunnels used to have very different lengths and extents, from simple cave-like underground structures to multilevel systems many kilometres long and were built to withstand heavy air and artillery bombardment (<xref ref-type="bibr" rid="ref51">USMAC-V, 1967</xref>, p. 17).</p><p>Most underground tunnels were used as hiding places, but some were used for active de-fence, with concealed firing positions. Common features among the tunnels in Vietnam were the camouflage of the entrances; traps, spike pits, and mines placed in the vicinities of the tunnels; booby traps placed inside the tunnels near the entrance, and false passages excavated to deceive the enemy; wooden lids used for tunnel entrances strong enough to support the earth covering them and to not fall in if accidentally stepped on. The earth removed from the tunnel was spread over the surrounding area and covered with leaves, grass, and twigs. The average tunnel size was of 0.6 m wide and 0.9 m high, with several hundred metres long and consisting of a main shaft, connecting corridors, multiple entrances, several air vents, and no lighting was installed. On the perimeter of areas with tunnels, Viet Cong units and guerrillas organised defensive positions to prevent or impede enemy troop movement into the area (<xref ref-type="bibr" rid="ref49">USMAC-V, 1965</xref>; <xref ref-type="bibr" rid="ref50">USMAC-V, 1966</xref>, p. 4).</p><p>Karez (subterranean irrigation systems) can measure several km-length and are used in several countries (e.g. Afghanistan) for operational activities (<xref ref-type="bibr" rid="ref15">Grau and Jalali, 1998</xref>; <xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, p. 255). The typical cross-border tunnel in Gaza Strip was dug at a depth of approximately 20 m, 1.5 m wide, and 2 m high – a few were wider to enable heavier equipment to be moved through them; the entrances were approximately one metre; there were ventilation shafts dug every few hundred metres, sides and roof lined with concrete, and electricity and telephone wires; some had several branches and rooms for storing equipment or accommodation (<xref ref-type="bibr" rid="ref16">Hecht, 2015</xref>).</p><p>In the Lebanon War (2006), Hezbollah’s bunkers were 40 m deep, with a roof built of slabs of reinforced concrete 90 cm thick, and double blast doors designed to provide protection from destructive overpressure generated by IDF high-explosive munitions. Bunkers included firing positions, operations centres, medical facilities, weapons and ammunition stockpiles, ventilation and air conditioning, bathrooms with running water, and dormitories (<xref ref-type="bibr" rid="ref22">Lambeth, 2011</xref>, p. 44, 45, 97, 156). Under the border between North and South Korea, one of the tunnels discovered measured 1.8 km long, 2 m high, and 2 m wide and ran through bedrock at a depth of 73 m below ground (USA, 2017b, p.1–1). North Korea also built a regimental airbase into a granite mountain (USA, 2017b, p.1–1). In Jordan (2018), on the border with Iraq and Syria, the Jordanian Army unearthed part of the Trans-Arabian Pipeline (Tapline) to prevent its use by the self-proclaimed Islamic State of Iraq and Syria (ISIS) and smugglers (Future for Advanced Research and Studies [FARS], 2018).</p><p>Deep underground facilities are usually much larger and have multiple barriers, e.g., some chambers of the North American Aerospace Defense Command (NORAD) are 18.44 m high, 13.7 m wide and 417 m long (<xref ref-type="bibr" rid="ref40">USA, 1980</xref>, p. 7–7). Further power plants chambers, aqueducts, and tunnels’ excavation dimensions, rock properties and reinforcement elements can be seen in detail in the Engineering Manual “Engineering and Design Rock Reinforcement” from Department of the Army U.S. Army Corps of Engineers (<xref ref-type="bibr" rid="ref40">USA, 1980</xref>).</p><p>The data obtained allowed the three categories of subterranean systems described during the literature review to be validated: tunnels, natural cavities and caves; urban sub-surface systems; and underground facilities for military use. By analysing data, it is possible to identify new underground spaces: pipelines and subterranean irrigation systems, to be included in the category of tunnels, natural cavities and caves; and underground quarries and transit systems, to be included in the category of urban subsurface systems. The subterranean system features analysis acknowledges that the subterranean systems used in operations have very diverse characteristics. Subterranean systems vary in dimensions, depth, type of construction (rudimentary or sophisticated), level of protection (the extent to which the facility has been hardened, and with what material), nature of the soil (properties suitable or not for construction; natural protection offered by the surface under which the system has been constructed), environmental conditions (air quality, dangerous animals, collapse hazard, and visibility), slope, azimuth, and purpose (original and operational). Furthermore, subterranean systems may have segments from different subcategories.</p></sec><sec id="S8"><title>Observation and fields of fire</title><p>The subterranean systems effects evaluation on observation and fields of fire presents much more complexity than aboveground terrain, where the landscape often varies predictably, and intelligence gathering tools and techniques can be more effective.</p><p>The category of the subterranean system and its characteristics provide relevant inputs on effects evaluation on observation and fields of fire. Two more examples are given in <xref ref-type="table" rid="T3">Table 3</xref>.</p><table-wrap id="T3" orientation="portrait" position="float"><label>Table 3</label><caption><p>Limitations for observation and fields of fire</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th>Subterranean System</th><th>Limitations for observation and fields of fire</th><th>References</th></tr></thead><tbody valign="top"><tr><td align="center" rowspan="2">Tunnel</td><td align="left">Blind corners; random changes in direction and corners constructed with no less than a 60ºangle and no more than a 120ºangle (e.g., 2ndSino-Japonese War [1937-1945] and Vietnam War [1964-1967]).</td><td><xref ref-type="bibr" rid="ref51">USMAC-V, 1967</xref>; <xref ref-type="bibr" rid="ref23">Lrrp, 2008</xref>; <xref ref-type="bibr" rid="ref39">Triolet and Triolet, 2011</xref>.</td></tr><tr><td align="left">Confined space (e.g., Vietnam War [1964-1967] and border between Lebanon and Israel).</td><td><xref ref-type="bibr" rid="ref50">USMAC-V, 1966</xref>, p. 4; <xref ref-type="bibr" rid="ref1">Ahronheim, 2018</xref>.</td></tr></tbody></table></table-wrap><p>Observation may be good in sophisticated tunnels, underground military bases, transit and subway tunnels; however, in rudimentary tunnels, sewer systems, irrigation systems and aqueducts, observation is probably limited due to lack of light. Yet, existing or other light sources can be deactivated or activated by any of the contenders. Audible observation will be limited if there is overpressure due to detonations or weapon discharges. Fields of fire limits are reduced significantly when changes of direction occur at small angles, as well as in confined spaces.</p></sec><sec id="S9"><title>Avenues of approach</title><p>“Units should always assume that without control of the subterranean environment, the enemy has freedom of maneuver” (USA, 2019c, p. 1–6). Depending on the strength and depth of the above-ground defence, subterranean systems can be secondary or primary avenues of approach at lower tactical levels. Subterranean avenues of approach can lead to an objective or key terrain on subsurface or surface and became a primary concern when used by threat forces. Subterranean terrain increases forces’ possible COA. Forces (both attacker and defender) using subterranean terrain as avenues of approach have an advantage because they can develop numerous operations covered and concealed.</p><p>Manoeuvrability is a critical factor for using subterranean terrain since it is very restrictive and easy to defend or block. Sophisticated structures usually have a larger size and less restricted manoeuvre spaces. Some are large enough for tactical vehicles, trucks carrying ballistic missiles, or even used as aircraft hangars (<xref ref-type="bibr" rid="ref34">Sepp, 2000</xref>, p. 1; NORAD, n.d.; <xref ref-type="bibr" rid="ref54">Zhang, 2012</xref>; National Security Archive [NSA], 2013). Some tunnels, passageways and other spaces allow one or two soldiers to walk abreast. Sanitary sewers are usually too small for troop movement; however, storm sewers often permit forces to move beneath the combat to the surface behind the adversary (e.g. Polish resistance fighters against German forces in 1944 [<xref ref-type="bibr" rid="ref31">Rossman, 1994</xref>]).</p></sec><sec id="S10"><title>Key terrain</title><p>Key or decisive terrain analysis has to include the surface area. The seizure, retention, or control of surface access points usually gives a marked advantage to any of the forces in combat. For example, these points could prove critical in isolating the threat’s ability to reinforce or resupply, preventing large numbers of troops leaving bunkers and defend on the surface or establishing a support by fire position to protect a breach force.</p><p>Possible key terrain in subterranean systems are C2 bunker, barriers blocking C2 bunker, and tunnel connected to C2 bunker (e.g., bunkers and tunnel networks used by Hezbollah in Lebanon in 2006 [<xref ref-type="bibr" rid="ref41">USA, 2014</xref>, p. 11]). In sophisticated systems, the control rooms with panels that operate the entry portals, with maps and other relevant markings can also be key. Some terrain not assessed as key terrain for the force operating on the subterranean system may be key or decisive terrain for the force on the surface (e.g., machine gun nests and fortified positions [see <xref ref-type="table" rid="T4">table 4</xref>]); therefore, it is important for the planning to be integrated.</p><table-wrap id="T4" orientation="portrait" position="float"><label>Table 4</label><caption><p>Key terrain</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th>Key terrain</th><th>Why?</th><th>References</th></tr></thead><tbody valign="top"><tr><td>Fort</td><td>Its destruction would disrupt enemy defence and enable assault by surface forces.</td><td><xref ref-type="bibr" rid="ref33">Schmutz, 2009</xref>, p. 1.</td></tr><tr><td>Machine-guns and observation posts, armoured shelters, exits of communication trenches, and centres of resistance.</td><td>Its destruction or control would disrupt enemy defensive system, affect morale, and create conditions to defeat or destroy the enemy or achieve objectives.</td><td><xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, pp. 53, 68.</td></tr></tbody></table></table-wrap><p>The whole subterranean system when tied to terrain providing tactical advantage or manoeuvre advantage can be assessed as key terrain for some echelons/forces. During the War of the Spanish Succession, in the siege of Turin (1706), tunnels were decisive for the city’s Austrian/Savoyard defenders to withstand the French Army until reinforcements arrived to lift the siege (<xref ref-type="bibr" rid="ref19">Jensen, 2019</xref>, p. 226). In Poland, during the Warsaw Uprising in 1944, the Warsaw municipal sewer system was key for the Polish resistance fighters against the German forces (<xref ref-type="bibr" rid="ref31">Rossman, 1994</xref>). In megacities, “[v]ic-tory without butchery means employing deception, gaining support from inside, and preventing the enemy from using tunnels” (<xref ref-type="bibr" rid="ref19">Jensen, 2019</xref>, p. 213). Tunnels can also be important symbols of resistance and key for development of information operations campaigns (e.g. Gaza Strip).</p></sec><sec id="S11"><title>Obstacles</title><p>Assessment of a subterranean area as an obstacle depends on the unit mission. Due to the need to maintain the momentum of surface operations, the lack of capability to operate underground, or the high risk it poses, commanders may decide to bypass subterranean systems during the planning process. On the other hand, it could be assessed as being of great importance, requiring additional focus by friendly forces and added resources to overcome one or multiple barricades and obstacles outside of the subterranean system. <xref ref-type="table" rid="T5">Table 5</xref> includes some examples of obstacles.</p><table-wrap id="T5" orientation="portrait" position="float"><label>Table 5</label><caption><p>Obstacles</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th>Obstacle</th><th>When</th><th>References</th></tr></thead><tbody valign="top"><tr><td>Ditch (water-filled)</td><td>Middle age</td><td><xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, p. 13; <xref ref-type="bibr" rid="ref37">Springer, 2015</xref>.</td></tr><tr><td>Counter-tunnel</td><td>From ancient times to the present.</td><td><xref ref-type="bibr" rid="ref18">Illinois Central Railroad Company, 1909</xref>, pp. 73, 74; <xref ref-type="bibr" rid="ref36">Short, 2004</xref>, pp. 4, 21, 22; <xref ref-type="bibr" rid="ref17">Herman, 2014</xref>; <xref ref-type="bibr" rid="ref30">Richemond-Barak, 2018</xref>, p. 8.</td></tr><tr><td>Wire obstacles</td><td>World War I</td><td><xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, pp. 71, 99 e 100</td></tr><tr><td>Booby traps (grenades, spike traps, poison arrows, trip-wires, trap doors, and a variety of other means), and poisonous animals.</td><td>1937-1945 and 1964-1967 (Sino-Japanese War and Vietnam War).</td><td><xref ref-type="bibr" rid="ref51">USMAC-V, 1967</xref>, pp. 14, 15; <xref ref-type="bibr" rid="ref23">Lrrp, 2008</xref>; J. and L. <xref ref-type="bibr" rid="ref39">Triolet, 2011</xref>; <xref ref-type="bibr" rid="ref30">Richemond-Barak, 2018</xref>, pp. 9, 10.</td></tr><tr><td>False side tunnels</td><td>1964-1967 (Vietnam War)</td><td><xref ref-type="bibr" rid="ref51">USMAC-V, 1967</xref>, p. 17.</td></tr><tr><td>Water (flooding the tunnels)</td><td rowspan="5">1453 (Turkey)</td><td rowspan="5"><xref ref-type="bibr" rid="ref7">Crowley, 2005</xref>, pp.170–171; <xref ref-type="bibr" rid="ref10">Feldman, 2008</xref>, p. 91; <xref ref-type="bibr" rid="ref29">Philippides and Hanak, 2011</xref>, pp. 507–510.</td></tr><tr><td>Smoke and toxic smells</td></tr><tr><td>Counter-tunnel</td></tr><tr><td>Greek fire (incendiary weapon of flammable liquid)</td></tr><tr><td>Fire in the wooden structures that supported the mines, resulting in cave-ins.</td></tr><tr><td>Antitunnel system / Wall of Defense (“Obstacle”)</td><td>Since 2016 (Israel)</td><td><xref ref-type="bibr" rid="ref11">Fishman, 2017</xref>.</td></tr><tr><td>Anti-tunnel system / Deep water-canal</td><td>Tunisia (n.d.)</td><td><xref ref-type="bibr" rid="ref13">FARS, 2018</xref>.</td></tr></tbody></table></table-wrap><p>Obstacles within a subterranean system limit mobility considerably and can be existing, inherent to the terrain (natural or man-made), or reinforcing/military (constructed, demolitions, mines, contamination or expedient), to extend or improve the effectiveness of existing obstacles.</p><p>Existing obstacles can be:
<list list-type="simple"><list-item><p>- Natural: large rocks, ravines, a large volume of water, soil features (e.g., hard rock or water-permeable soil), gaps and ditches, air supply limited, non-existent, or toxic;</p></list-item><list-item><p>- Man-made: gates, doors, walls, fences, but also water, or stairs (if using robots).</p></list-item></list></p><p>Reinforcing obstacles can be:
<list list-type="simple"><list-item><p>- Constructed: counter-tunnels, deep water-canals, ditches (water-filled), walls, false side tunnels, fencing, wire obstacles, tripwires, security or reinforced doors, false walls, and opening mechanisms and physical, electromechanical or biometric checkpoints;</p></list-item><list-item><p>- Demolitions: landslides, “camouflets”, and craters;</p></list-item><list-item><p>- Mines;</p></list-item><list-item><p>- Booby traps (vary significantly based on geography, availability of materials, and technical sophistication of the force): improvised explosive devices (usually deployed near junctions and often operated by tripwires), nail boards, spike pits, grenades, poison arrows, and trap doors.</p></list-item><list-item><p>- Contamination: toxic gas, and smoke (subterranean systems prevent dispersion);</p></list-item><list-item><p>- Expedient: poisonous animals, water, foliage, fire, cement injection, rubble, debris, furniture, and other objects existing in the structure.</p></list-item></list></p><p>The classification of the obstacles is either protective and tactical. Protective obstacles are close to defensive positions and are key components of security operations. Tactical obstacles are employed to block, fix, disrupt, or turn the enemy’s movement; these obstacles also impose additional losses in personnel, equipment, and time on the enemy.</p></sec><sec id="S12"><title>Cover and concealment</title><p>The use of subterranean systems expands the physical battlefield and provides cover and concealment to its user against air and surface forces.</p><p>Inside the subterranean systems, depending on their characteristics, there may be barriers, walls, cavities (natural or man-made), stairwells and objects that can be used for cover and concealment; near C2 bunkers, limited corners and barriers provide cover and concealment; storm sewers and subway lines lack cover and concealment. The angles that exist in the systems provide cover and concealment. Gun-slits provide cover for defending forces. Surface infrastructures may be used to reinforce the coverage provided by subterranean systems. Darkness is a very relevant form of concealment. The existence of cover and concealment, including darkness, inside an underground system, favours the attacking forces. Some forces/groups may use civilians or civilian buildings as cover (“human shields”) or concealment (<xref ref-type="bibr" rid="ref8">Dershowitz, 2014</xref>; <xref ref-type="bibr" rid="ref16">Hecht, 2015</xref>).</p></sec><sec id="S13"><title>Weather</title><p>Water can make it impossible to build subterranean systems, place obstacles, or even use them (floods). For these reasons, precipitation and temperature are factors to take into account in the course of construction and while conducting operations (e.g., sewers fill rapidly during rainstorms and, though normally drained by electrical pumps, may overflow); melting snow may preclude the use of subterranean systems; cold may restrict the use of electrical equipment (see <xref ref-type="bibr" rid="ref20">Jones, 2010</xref>, p. 67). Prolonged periods of drought and heat might result in opening new subterranean avenues of approach through some aqueducts and sewers. Urban areas may require extensive analysis in the presence of microclimates. Cloud cover and fog restrict visibility, making it difficult to detect subterranean systems and their entrances and to conduct airdrop operations for resupplying (used by logistic units where terrain or enemy limit access by ground transportation assets).</p></sec><sec id="S14"><title>Tactical considerations</title><p>This section summarizes tactical considerations that result from terrain and weather analysis, to support preparing ground forces to conduct operations in subterranean systems, providing the answer to CQ. Evaluating the effects of terrain and weather in subterranean systems is substantially different from the evaluation on open terrain. The analysis of the military aspects of terrain (OAKOC) must be in the context of subterranean systems features.</p></sec><sec id="S15"><title>Subterranean system’s location and entrances</title><p>The first step during terrain analysis is to identify the environment (urban, desert, mountain, forest, etc.) where the force is going to operate, the assigned area and surrounding areas where our forces can influence the normal development of operations, or where something may affect operations.</p><p>Detection of subterranean systems demands extreme care and thoroughness to locate hidden entrances or other evidence of their existence. It’s easier to detect a tunnel when it is being built than afterwards. Sensitive microphones must be close to the location of the tunnel to be effective; and yet, the sound of digging can be reduced by working slowly, using manual tools, or by other sounds in the area.</p><p>After the construction, the key to finding a tunnel system is through terrain analysis and physical ground search. Given the surrounding environment, the reconnaissance and search forces should consider other signs of the presence of tunnels. Experienced trackers and dogs can be very useful for reconnaissance and detection. Force also must look for operational indicators of subterranean systems (e.g., movement of enemy forces in a specific direction, sniper fire and hit-and-run tactics from areas with no avenues of withdrawal, failure of cordons to prevent infiltration or withdrawal of enemy forces). In urban areas, forces must identify buildings with basements and subterranean spaces (government, military, industrial, commercial, and residential). In these cases, intelligence acquired from other sources is highly relevant. Monitoring threat communications, exploring documents on the plans of the tunnels from threat headquarters, ask/pay the local population for information about tunnels, sewers, and construction projects are very relevant sources, as well as defectors, or infiltrating agents into the digging operations.</p><p>When the presence of tunnels has been determined, the area must be isolated and secured (including other entrances and exits) to protect friendly troops and prevent threat access to and egress from the systems. Smoke or explosions inside a tunnel can be useful for detecting new accesses from outside (and flush out anyone hiding in them). To determine deeply buried facilities, each location should use an integrated combination of blueprints, maps, aerial photographs, videos, geo-prospecting instruments (to measure electric, magnetic and gravitational fields, or sound waves), satellites (for thermal, multispectral, and infrared imaging of the facility and involving area), hydrology analysis tools, and human intelligence reports (resulting from covert agents, defectors, photographs, documents, and soil samples, among others).</p></sec><sec id="S16"><title>Subterranean system categories and its features</title><p>The analysis of the features of the subterranean system and its mapping are critical to identifying information requirements, support the subsequent study of the military aspects of the terrain, and develop COA. In operations, forces must examine connections to the system, surface features and adjacent terrain (e.g., local businesses and residential structures), distance from known blind spots and dead spaces on the surface to the system perimeter, storm/sewer drainage and ventilation systems, choke points (natural and man-made), and structure’s susceptibilities to above-ground demolitions.</p><p>Systems with a high level of protection (e.g., deep underground facilities) usually require a considerable number of personnel as well as specialised breaching capabilities. Given the mission, proper analysis of the subterranean system’s supporting infrastructure (ventilation, communication lines, satellite dishes or antennas, transportation, energy, storage facilities, water supply and waste disposal) may provide the Commander with vulnerable points or umbilicals for the system to operate. These points can be used as alternative entries and properly exploited may be sufficient for functional defeat without the force having to enter the structure.</p></sec><sec id="S17"><title>Observation and fields of fire</title><p>Forces must be trained and equipped to combat at short distances and poor visibility conditions; in case of contact with the threat, audible observation must be protected.</p></sec><sec id="S18"><title>Avenues of approach</title><p>During the planning process, leaders must balance the advantage of developing operations covered and concealed vs limited manoeuvrability (terrain very restrictive and easy to defend or block).</p><p>Whenever subterranean systems have tunnels, pipes or culverts large enough to facilitate foot (crawling, standing, two men or more side by side) or vehicular movement, an analyst must prepare avenues of approach, or mobility corridor overlays. Overlays should show their size, orientation and, if possible, prioritisation based on the probability of use. Using overlays, analysts must layer surface terrain on top of subterranean terrain to see how forces using both terrains can manoeuvre against opposing forces effectively. The consequences of progression denial in any of the selected avenues of approach and identified alternative avenues of approach must be assessed.</p><p>Most movement techniques are similar to the ones used in urban areas, but some hallways can be even longer and narrower requiring the force to move in a column. In this case, soldiers must reduce space between them to maximise ballistic shield protection. The use of robots also must be maximised.</p></sec><sec id="S19"><title>Key terrain</title><p>Key terrain analysis must include the subsurface and surface areas. Surface access points and C2 bunkers usually are assessed as key terrain in subterranean operations. Subterranean systems can be assessed as decisive terrain.</p></sec><sec id="S20"><title>Obstacles</title><p>Obstacles placed at intersections provide great ambush sites, and standing water in tunnels presents excellent camouflage for booby traps and anti-personnel mines set on likely routes. Accessing sophisticated structures requires specific techniques and equipment, which may be manual, ballistic, mechanical, explosive or thermally cut.</p><p>In operations, if not using subterranean systems and there isn’t any intention to destroy or neutralise them, entry points must be sealed and early warning devices and obstacles employed (e.g., wire, heavy weights, or tack-welding).</p></sec><sec id="S21"><title>Cover and concealment</title><p>Inside the subterranean systems, attacking forces can use existing angles, barriers, walls, cavities, stairwells and other objects for cover and concealment. Whenever possible, the first man must use a ballistic shield for cover, especially in storm sewers, subway lines, and other subterranean system lacking cover and concealment. Darkness is also a very relevant form of concealment. Gun-slits and other objects can provide cover for defending forces.</p></sec><sec id="S22"><title>Weather</title><p>Forces must assess the impact of precipitation, temperature and droughts on the operations (e.g., flooding hazard and new subterranean avenues of approach), as well as cloud cover and fog restrictions on visibility during detection and airdrop resupplying operations.</p></sec><sec id="S23" sec-type="conclusions"><title>Conclusion</title><p>Historically, states, civilians, regular forces, irregular forces, terrorists, and criminals have used subterranean systems as a means to conduct operations. Improvements in the capability to construct spaces and underground structures enhanced its usefulness and proliferation.</p><p>In the future, more conflicts will take place in subsurface areas or at least incorporate subterranean warfare elements. Urban subsurface areas are more extensive, conventional, accessible, and have features favourable to forces conducting offensive, defensive, and security operations. Caves in mountains, karez in deserts, and tunnels in forests and border regions will continue to be largely used in asymmetric war tactics and insurgencies. Deeply buried facilities in the mountains will continue to be used by states to cover and conceal military capacities and secret programmes. Models reflecting the main characteristics and effects of Terrain and Weather in operations in subterranean systems can be very useful to state operational requirements for developing capabilities and theorising concepts and doctrine to support the planning process.</p><p>The research strategy adopted for this study is mixed, combining the collection, analysis and integration or relationship of quantitative and qualitative data. To build the theoretical and conceptual framework, which consists of literature review and definition of the analysis model, it was adopted using deductive reasoning. A qualitative research method was adopted for collection and analysis of data; as the results obtained with inductive reasoning alone do not always allow their generalisation or the replication of results to other contexts, iterative elements of deduction and abduction were incorporated again throughout the process. Research privileges empirical observation and the contextual conditions in which phenomena occur to create theories, and relies on the <italic>Grounded Theory</italic> for collection, analysis, and systematic treatment of data. The main data sources for the study consisted of purposive sampling from operations in subterranean systems and lessons learned from them.</p><p>The theoretical saturation obtained through the study confirmed the validity of the variables and sub-variables proposed in the provisional model of analysis. Additionally, forces have been assessed to have difficulties in detecting some subterranean systems. For this reason, a new sub-variable was added into the variable terrain and weather: subterranean system’s location and accesses. The data obtained also reflected the need to include the environmental factors slope and azimuth, as well as connections with other systems in the analysis of the subterranean system features. The theoretical coding given in <xref ref-type="table" rid="T2">Table 2</xref> is thus obtained, also providing an answer to DQ1. Ground forces operating in subterranean systems should adopt the terrain and weather analysis model shown in <xref ref-type="table" rid="T2">table 2</xref>. The same model provided the categories and sub-categories for data analysis and assessment of the main characteristics of Terrain and Weather in subterranean systems, which were assessed and presented during section 4, providing an answer to DQ 2. Some of the most relevant are discussed here.</p><p>A subterranean system’s location and entrances: the location and entrances to subterranean systems are not easy to determine; their existence is kept a secret from enemy forces and, sometimes, friendly forces to reduce the chances of intelligence leakage. Indicators of tunnel building include sounds and unusual activity in the area. After the construction, the best indicators are terrain, enemy activity and intelligence products.</p><p>Subterranean system categories and its features: subterranean systems vary in dimensions, depth, type of construction, level of protection, nature of the soil, environmental conditions, slope, azimuth, and purpose. The features of subterranean systems reduce the effectiveness of infantry, sniper, artillery and air attacks, as well as air and satellite surveillance, or even intelligence agencies, chemical, and/or nuclear attacks.</p><p>Observation and fields of fire: in most cases, observation and fields of fire in underground systems are limited to short distances and poor visibility, as well as favouring the defensive forces; if there is contact with the threat, audible observation may be affected.</p><p>Avenues of Approach: forces using subterranean terrain as avenues of approach have an advantage because they can develop numerous operations covered and concealed. Manoeuvrability is a critical factor for using subterranean terrain since it is very restrictive and easy to defend or block.</p><p>Key terrain: the seizure, retention, or control of surface access points usually provides a marked advantage to any of the forces in combat. Some terrain not assessed as key terrain for the force operating on the subterranean system it may be key or decisive terrain for the force on the surface.</p><p>Obstacles: obstacles within an underground system limit mobility considerably. Protective obstacles are close to defensive positions and are key components of security operations. Tactical obstacles are employed to block, fix, disrupt, or turn the enemy’s movement; these obstacles also impose additional losses in personnel, equipment, and time on the enemy. Subterranean systems can be assessed as obstacles.</p><p>Cover and concealment: subterranean systems provide cover and concealment to users against air and surface forces. Inside the subterranean systems, there may be barriers, walls, cavities, stairwells and objects that can be used for cover and concealment; near C2 bunkers, limited corners and barriers provide cover and concealment; storm sewers and subway lines lack cover and concealment. Some forces may use civilians as “human shields”.</p><p>Weather: water can make it impossible to build subterranean systems, place obstacles, or even use them; droughts can “create” new avenues of approach. Cloud cover and fog restrict visibility, making it difficult to detect subterranean systems and resupply forces by airdrop.</p><p>The tactical considerations in subterranean systems, resulting from terrain and weather analysis, were assessed and presented during section 5, providing an answer to CQ. Some of the most relevant are discussed here.</p><p>The analysis of the military aspects of terrain (OAKOC) must be in the context of subterranean systems features.</p><p>Subterranean system’s location and entrances: detection of a subterranean system during construction is easier than afterwards. After being built, the key to finding it is through terrain analysis, physical ground search, operational indicators, and available intelligence products.</p><p>Subterranean system categories and its feature: analysis of the features of the subterranean system and its mapping, as well as the connections to the system, surface features and adjacent terrain, are critical to identifying information requirements, support the subsequent study of the military aspects of the terrain, and develop COA. Systems with a high level of protection usually require a substantial number of personnel as well as specialised breaching capabilities. Given the mission, proper analysis of the subterranean system’s supporting infrastructure may provide the Commander with vulnerable points.</p><p>Observation and fields of fire: forces must be trained and equipped to combat at short distances and poor visibility conditions; in case of contact with the threat, audible observation must be protected.</p><p>Avenues of Approach: during the planning process, leaders must balance the advantage of developing operations covered and concealed vs limited manoeuvrability.</p><p>Key terrain: key terrain analysis must include the subsurface and surface areas. Surface access points and C2 bunkers usually are assessed as key terrain in subterranean operations. Subterranean systems can be assessed as decisive terrain.</p><p>Obstacles: obstacles placed at intersections are excellent ambush sites. Accessing sophisticated structures requires specific techniques and equipment. In operations, if not using subterranean systems and there isn’t intention to destroy or neutralise them, entry points must be sealed and early warning devices and obstacles employed.</p><p>Cover and Concealment: inside the subterranean systems, forces can use existing angles, barriers, walls, cavities, stairwells and other objects for cover and concealment. Whenever possible, the first man must use a ballistic shield for cover.</p><p>Weather: based on recent weather patterns and soil features, analysts should be aware of the potential for flooding conditions and other effects on the structure, assess potential avenues of approach resulting from droughts, and cloud cover and fog effects on visibility during detection activities, as well as on resupplying by airdrop operations.</p><p>To conclude, the terrain and weather analysis model, the characteristics and the tactical considerations presented, all combined, support the preparation, planning, and execution of land operations in subterranean systems. Developing models for other mission variable analysis is recommended for future studies on operations in subterranean systems.</p></sec></body><back><sec id="S24"><title>Funding</title><p>This research received no external funding.</p></sec><sec id="S25" sec-type="COI-statement"><title>Disclosure statement</title><p>No potential conflict of interest was reported by the authors.</p></sec><ref-list><ref id="ref1"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Ahronheim</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2018</year>) <article-title>‘IDF Hezbollah tunnel-destroying material discovered in Lebanon’</article-title>, <source>Jerusalem Post</source>, 27 December, Available from: <ext-link ext-link-type="uri" xlink:href="https://www.jpost.com/Arab-Israeli-Conflict/Conquer-the-Galilee-IDF-reveals-Hezbollahs-tunnel-attack-strategy-575616">https://www.jpost.com/Arab-Israeli-Conflict/Conquer-the-Galilee-IDF-reveals-Hezbollahs-tunnel-attack-strategy-575616</ext-link> (Accessed: 9 September 2019).</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Bryman</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2012</year>) <chapter-title>Social Research Methods</chapter-title>. 4.ª ed. Oxford: Oxford University Press.</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Charmaz</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2008</year>) <article-title>‘Grounded Theory as an emergent method’</article-title>, in <person-group person-group-type="editor"><string-name><surname>Hesse-Bilber</surname>, <given-names>S. N</given-names></string-name>. and <string-name><surname>Leavy</surname>, <given-names>P.</given-names></string-name></person-group> (eds.), <source>Handbook of emergent methods</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>The Guilford Press</publisher-name>, pp. <fpage>155</fpage>–<lpage>172</lpage>.</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Cohen</surname>, <given-names>R. S</given-names></string-name>., <string-name><surname>Johnson</surname>, <given-names>D. E</given-names></string-name>., <string-name><surname>Thaler</surname>, <given-names>D. E</given-names></string-name>., <string-name><surname>Allen</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Bartels</surname>, <given-names>E. M</given-names></string-name>., <string-name><surname>Cahill</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Efron</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2017</year>) <chapter-title>From Cast Lead to Protective Edge: Lessons from Israel’s Wars in Gaza</chapter-title>. <publisher-loc>Santa Monica, Calif</publisher-loc>: <publisher-name>RAND Corporation</publisher-name>.</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Cordesman</surname>, <given-names>A. H</given-names></string-name></person-group>. (<year>2003</year>) <chapter-title>The lessons of the Iraq War: main report</chapter-title>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>Center for Strategic and International Studies</publisher-name>.</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Creswell</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2009</year>) <chapter-title>Research design: Qualitative, quantitative and mixed methods approaches</chapter-title>. <edition>3th edn</edition>. <publisher-loc>Los Angeles</publisher-loc>: <publisher-name>Sage</publisher-name>.</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Crowley</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2005</year>) <chapter-title>Constantinople: The Last Great Siege1453</chapter-title>. <publisher-loc>London, England</publisher-loc>: <publisher-name>Faber and Faber Limited Bloomsbury House</publisher-name>.</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Dershowitz</surname>, <given-names>A. M</given-names></string-name></person-group>. (<year>2014</year>) <article-title>‘Terror Tunnels: The Case for Israel’s Just War Against Hamas’</article-title>, <source>Gatestone Institute</source>, 12 September, Available at: <ext-link ext-link-type="uri" xlink:href="https://www.gatestoneinstitute.org/4695/hamas-terror-tunnels">https://www.gatestoneinstitute.org/4695/hamas-terror-tunnels</ext-link> (Accessed: 9 September 2019).</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>EP</collab></person-group>. (<year>2012</year>) <chapter-title>Operações (PDE 3-00)</chapter-title>. <publisher-loc>Lisboa</publisher-loc>: <publisher-name>EP</publisher-name>.</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Feldman</surname>, <given-names>R. T</given-names></string-name></person-group>. (<year>2008</year>) <chapter-title>Tha fall of Constantinople</chapter-title>. <publisher-loc>Minneapolis</publisher-loc>: <publisher-name>Twenty-First Century Books</publisher-name>.</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Fishman</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2017</year>) <article-title>‘What is Israel doing about the Gaza tunnels today?’</article-title>, <source>ynetnews.com</source>, 03 July. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.ynetnews.com/articles/0,7340,L-4931788,00.html">https://www.ynetnews.com/articles/0,7340,L-4931788,00.html</ext-link> (Accessed: 12 September 2019).</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Fortin</surname>, <given-names>M. F</given-names></string-name></person-group>. (<year>2003</year>) <chapter-title>O Processo de Investigação: da concepção à realização</chapter-title>. <publisher-loc>Loures</publisher-loc>: <publisher-name>Lusociência</publisher-name>.</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>FARS</collab></person-group> (<year>2018</year>) <article-title>How Threats Posed by Tunnels Escalated in the Middle East</article-title>, Available at: <ext-link ext-link-type="uri" xlink:href="https://futureuae.com/ar-/Main-page/Item/3871/severe-risks-how-threats-posed-by-tunnels-escalated-in-the-middle-east">https://futureuae.com/ar-/Main-page/Item/3871/severe-risks-how-threats-posed-by-tunnels-escalated-in-the-middle-east</ext-link> (Accessed: 9 September 2019).</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Glaser</surname>, <given-names>B</given-names></string-name>. and <string-name><surname>Strauss</surname>, <given-names>A</given-names></string-name></person-group>. (<year>1967</year>) <chapter-title>The discovery of Grounded Theory: Strategies for qualitative research</chapter-title>. New York: Aldine de Gruyter.</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Grau</surname>, <given-names>L. W</given-names></string-name>. and <string-name><surname>Jalali</surname>, <given-names>A. A</given-names></string-name></person-group>. (<year>1998</year>) <article-title>‘Underground Combat: Stereophonic Blasting, Tunnel Rats and the Soviet-Afghan War’, Foreign Military Studies Office</article-title>, Available at: <ext-link ext-link-type="uri" xlink:href="https://community.apan.org/wg/tradoc-g2/fmso/m/fmso-monographs/200606">https://community.apan.org/wg/tradoc-g2/fmso/m/fmso-monographs/200606</ext-link> (Accessed: 10 September 2019).</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Hecht</surname>, <given-names>E</given-names></string-name></person-group>. (<year>2015</year>) <article-title>The Tunnels in Gaza: Testimony before the UN Commission of Inquiry on the 2014 Gaza Conflict</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.mideastdig.com/wp-content/uploads/2017/01/testimony.pdf">https://www.mideastdig.com/wp-content/uploads/2017/01/testimony.pdf</ext-link> (Accessed: 04 October 2019).</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Herman</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2014</year>) <article-title>Notes from the underground: the long history of tunnel warfare</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.hudson.org/research/10570-notes-from-the-underground-the-long-history-of-tunnel-warfare">https://www.hudson.org/research/10570-notes-from-the-underground-the-long-history-of-tunnel-warfare</ext-link> (Accessed: 21 October 2019).</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Illinois Central Railroad Company</collab></person-group> (<year>1909</year>) <article-title>Siege and defence of Vicksburg and the Vicksburg National Military Park</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://babel.hathitrust.org/cgi/pt?id=loc.ark:/13960/t2h712n3k;view=1up;seq=41">https://babel.hathitrust.org/cgi/pt?id=loc.ark:/13960/t2h712n3k;view=1up;seq=41</ext-link> (Accessed: 10 September 2019).</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Jensen</surname>, <given-names>B. M</given-names></string-name></person-group>. (<year>2019</year>) <chapter-title>Complex terrain: megacities and the changing character of urban combat</chapter-title>. <source>Quantico</source>, <publisher-loc>Virginia</publisher-loc>: <publisher-name>Navy, Marine Corps University Press</publisher-name>.</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Jones</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2010</year>) <chapter-title>Underground Warfare 1914-1918</chapter-title>. <publisher-loc>South Yorkshire</publisher-loc>: <publisher-name>Pen &amp; Sword Military</publisher-name>.</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Kinard</surname>, <given-names>J</given-names></string-name></person-group>. (<year>1998</year>) <chapter-title>The Battle of the Crater: Civil War campaigns and commanders</chapter-title>. <publisher-loc>Texas</publisher-loc>: <publisher-name>Mcwhiney Foundation Press</publisher-name>.</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Lambeth</surname>, <given-names>B. S</given-names></string-name></person-group>. (<year>2011</year>) <chapter-title>Air Operations in Israel’s war against Hezbollah: learning from Lebanon and getting it right in Gaza</chapter-title>. <publisher-loc>Santa Monica, CA</publisher-loc>: <publisher-name>RAND Corporation</publisher-name>.</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Lrrp</collab></person-group>. (<year>2008</year>) <article-title>Tunnel Warfare - Vietnam Experience [Web log post]</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://lrrp2.wordpress.com/2008/07/12/tunnel-warfare-vietnam-experience/">https://lrrp2.wordpress.com/2008/07/12/tunnel-warfare-vietnam-experience/</ext-link> (Accessed: 13 September 2019).</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>NATO</collab></person-group>. (<year>2017</year>) <chapter-title>Urban Tactics: Edition A Version 1 (ATP-99)</chapter-title>. <source>NATO Standardization Office</source>.</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>NATO</collab></person-group>. (<year>2018</year>) <chapter-title>Allied Land Tactics: Edition B Version 1(ATP-3.2.1)</chapter-title>. <source>NATO Standardization Office</source>.</mixed-citation></ref><ref id="ref26"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>NATO</collab></person-group>. (<year>2019</year>) <chapter-title>Tactical Planning for Land Forces: Edition A Version 1 (AAP-28)</chapter-title>. <source>NATO Standardization Office</source>.</mixed-citation></ref><ref id="ref27"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>NORAD</collab></person-group>. <article-title>(n.d.) Cheyenne Mountain Complex [Online page]</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.norad.mil/About-NORAD/Cheyenne-Mountain-Air-Force-Station/">https://www.norad.mil/About-NORAD/Cheyenne-Mountain-Air-Force-Station/</ext-link> (Accessed: 13 September 2019).</mixed-citation></ref><ref id="ref28"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>NSA</collab></person-group>. (<year>2013</year>) <article-title>Underground Facilities: Intelligence and Targeting Issues</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://nsarchive2.gwu.edu/NSAEBB/NSAEBB439/">https://nsarchive2.gwu.edu/NSAEBB/NSAEBB439/</ext-link> (Accessed: 4 October 2019).</mixed-citation></ref><ref id="ref29"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Philippides</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Hanak</surname>, <given-names>W. K</given-names></string-name></person-group>. (<year>2011</year>) <article-title>The Siege and the Fall of Constantinople in 1453: Historiography, Topography, and Military Studies</article-title>. <publisher-loc>Farnham</publisher-loc>: <publisher-name>Ashgate Publishing Limited</publisher-name>.</mixed-citation></ref><ref id="ref30"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Richemond-Barak</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2018</year>) <chapter-title>Underground Warfare</chapter-title>. <publisher-loc>New York</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>.</mixed-citation></ref><ref id="ref31"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Rossman</surname>, <given-names>J</given-names></string-name></person-group>. (<year>1994</year>) <article-title>In the Warsaw Sewers</article-title>. <source>Zeszyty Historyczne, No. 109</source>. <publisher-loc>Paris</publisher-loc>: <publisher-name>Instytut Literacki</publisher-name>. Available at: <ext-link ext-link-type="uri" xlink:href="http://www.warsawuprising.com/paper/warsaw_sewers.htm">http://www.warsawuprising.com/paper/warsaw_sewers.htm</ext-link> (Accessed: 15 September 2019).</mixed-citation></ref><ref id="ref32"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Rottman</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2006</year>) <chapter-title>Viet Cong and NVA Tunnels and Fortifications of the Vietnam War (Fortress 48)</chapter-title>. New York: Osprey Publishing.</mixed-citation></ref><ref id="ref33"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Schmutz</surname>, <given-names>J. F</given-names></string-name></person-group>. (<year>2009</year>) <chapter-title>The Battle of the Crater: A Complete History</chapter-title>. North Carolina: McFarland &amp; Company, Inc.</mixed-citation></ref><ref id="ref34"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Sepp</surname>, <given-names>E. M</given-names></string-name></person-group>. (<year>2000</year>) <article-title>Deeply Buried Facilities</article-title>. <source>Implications for Military Operations (Occasional Paper No</source>. 14). Air War College, Alabama.</mixed-citation></ref><ref id="ref35"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Shapir</surname>, <given-names>Y</given-names></string-name>. and <string-name><surname>Perel</surname>, <given-names>G</given-names></string-name></person-group>. (<year>2014</year>) <chapter-title>Subterranean Warfare: A New-Old Challenge</chapter-title>. In: <person-group person-group-type="editor"><string-name><surname>A.</surname><given-names>Kurz</given-names></string-name>, and <string-name><surname>S.</surname><given-names>Brom</given-names></string-name></person-group> (Ed.), <source>The Lessons of Operation Protective Edge</source> (pp. <fpage>51</fpage>–<lpage>57</lpage>) <publisher-loc>Tel Aviv</publisher-loc>: <publisher-name>Institute for National Security Studies</publisher-name>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.inss.org.il/publication/subterranean-warfare-a-new-old-challenge/">https://www.inss.org.il/publication/subterranean-warfare-a-new-old-challenge/</ext-link> (Accessed: 04 October 2019).</mixed-citation></ref><ref id="ref36"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Short</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2004</year>) <chapter-title>Germany’s West Wall: The Siegfried Line (Fortress 15)</chapter-title>. <publisher-loc>S.l.</publisher-loc>: <publisher-name>Osprey Publishing</publisher-name>.</mixed-citation></ref><ref id="ref37"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Springer</surname>, <given-names>P. J</given-names></string-name></person-group>. (<year>2015</year>) <article-title>‘Fighting under the earth: the history of tunneling in warfare’</article-title>. <source>Foreign Policy Research Institute</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.fpri.org/article/2015/04/fighting-under-the-earth-the-history-of-tunnelingin-warfare/">https://www.fpri.org/article/2015/04/fighting-under-the-earth-the-history-of-tunnelingin-warfare/</ext-link> (Accessed: 9 September 2019).</mixed-citation></ref><ref id="ref38"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Strauss</surname>, <given-names>A</given-names></string-name></person-group>. (<year>1987</year>) <chapter-title>Qualitative analysis for social scientists</chapter-title>. New York: Cambridge University Press.</mixed-citation></ref><ref id="ref39"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Triolet</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Triolet</surname>, <given-names>L</given-names></string-name></person-group>. (<year>2011</year>) <chapter-title>La guerre souterraine: Sous terre</chapter-title>, on se bat aussi. Paris, France: Perrin.</mixed-citation></ref><ref id="ref40"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>USA</collab></person-group> (<year>1980</year>) <chapter-title>Engineering and Design Rock Reinforcement</chapter-title>. <publisher-loc>Washington DC</publisher-loc>: <publisher-name>Department of the Army</publisher-name>.</mixed-citation></ref><ref id="ref41"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>USA</collab></person-group> (<year>2014</year>) <chapter-title>Subterranean Environment: Tunnel to Victory, the 2006 Lebanon War</chapter-title>. <publisher-loc>Fort Leavenworth</publisher-loc>: <publisher-name>Complex Operational Environment and Threat Integration Directorate</publisher-name>.</mixed-citation></ref><ref id="ref42"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>USA</collab></person-group> (<year>2016</year>) <chapter-title>Commander and Staff Organization and Operations (FM 6-0)</chapter-title>. <publisher-loc>Washington DC</publisher-loc>: <publisher-name>Department of the Army</publisher-name>.</mixed-citation></ref><ref id="ref43"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>USA</collab></person-group> (<year>2017a</year>) <chapter-title>Operations (ADRP 3-0)</chapter-title>. <publisher-loc>Washington DC</publisher-loc>: <publisher-name>Department of the Army</publisher-name>.</mixed-citation></ref><ref id="ref44"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>USA</collab></person-group> (<year>2017b</year>) <chapter-title>Small Unit Training in Subterranean Environments (TC 3-21.50)</chapter-title>. <publisher-loc>Washington DC</publisher-loc>: <publisher-name>Department of the Army</publisher-name>.</mixed-citation></ref><ref id="ref45"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>USA</collab></person-group> (<year>2017c</year>) <chapter-title>Urban Operations (ATP 3-06/ MCTP 12-10B)</chapter-title>. <publisher-loc>Washington DC</publisher-loc>: <publisher-name>Department of the Army</publisher-name>.</mixed-citation></ref><ref id="ref46"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>USA</collab></person-group> (<year>2019a</year>) <chapter-title>Intelligence Preparation of the Battlefield (ATP 2-01.3)</chapter-title>. <publisher-loc>Washington DC</publisher-loc>: <publisher-name>Department of the Army</publisher-name>.</mixed-citation></ref><ref id="ref47"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>USA</collab></person-group> (<year>2019b</year>) <chapter-title>Mission Command: Command and Control of Army Forces (ADP 6-0)</chapter-title>. <publisher-loc>Washington DC</publisher-loc>: <publisher-name>Department of the Army</publisher-name>.</mixed-citation></ref><ref id="ref48"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>USA</collab></person-group> (<year>2019c</year>) <chapter-title>Subterranean Operations (ATP 3-21.51)</chapter-title>. <publisher-loc>Washington DC</publisher-loc>: <publisher-name>Department of the Army</publisher-name>.</mixed-citation></ref><ref id="ref49"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>USMAC-V</collab></person-group>. (<year>1965</year>) <article-title>Lessons Learned no. 45: Viet Cong Turmels</article-title> Available at: <ext-link ext-link-type="uri" xlink:href="http://cgsc.contentdm.oclc.org/cdm/singleitem/collection/p4013coll11/id/1535/rec/1">http://cgsc.contentdm.oclc.org/cdm/singleitem/collection/p4013coll11/id/1535/rec/1</ext-link> (Accessed: 2 October 2019).</mixed-citation></ref><ref id="ref50"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>USMAC-V</collab></person-group>. (<year>1966</year>) <article-title>Lessons learned no. 56: operations against tunnel complexes</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://cgsc.contentdm.oclc.org/cdm/singleitem/collection/p4013coll11/id/1491/rec/1">http://cgsc.contentdm.oclc.org/cdm/singleitem/collection/p4013coll11/id/1491/rec/1</ext-link> (Accessed: 2 October 2019).</mixed-citation></ref><ref id="ref51"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>USMAC-V</collab></person-group>. (<year>1967</year>) <article-title>Counterinsurgency Lessons Learned no. 61: Salient Lessons Learned</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="http://cgsc.contentdm.oclc.org/cdm/singleitem/collection/p4013coll11/id/1422/rec/1">http://cgsc.contentdm.oclc.org/cdm/singleitem/collection/p4013coll11/id/1422/rec/1</ext-link> (Accessed: 2 October 2019).</mixed-citation></ref><ref id="ref52"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>USMAC-V</collab></person-group>. (<year>1968</year>) <article-title>Techniques for Detecting, Neutralizing and Destroying Enemy Tunnels</article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://apps.dtic.mil/dtic/tr/fulltext/u2/683375.pdf">https://apps.dtic.mil/dtic/tr/fulltext/u2/683375.pdf</ext-link> (Accessed: 3 October 2019).</mixed-citation></ref><ref id="ref53"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Yin</surname>, <given-names>R. K</given-names></string-name></person-group>. (<year>2016</year>) <chapter-title>Qualitative Research from Start to Finish</chapter-title>. 2nd edn. New York: The Guilford Press.</mixed-citation></ref><ref id="ref54"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Zhang</surname>, <given-names>H</given-names></string-name></person-group>. (<year>2012</year>) <article-title>China’s Underground Great Wall: Subterranean Ballistic Missiles</article-title>. <source>Belfer Center</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.belfercenter.org/publication/chinas-underground-great-wall-subterranean-ballistic-missiles">https://www.belfercenter.org/publication/chinas-underground-great-wall-subterranean-ballistic-missiles</ext-link> (Accessed: 2 October 2019).</mixed-citation></ref></ref-list></back></article>
