Chapter
II
TACTICS,
TECHNIQUES AND PROCEDURES (TTP)
IN
SUPPORT OF OPERATIONS OTHER THAN WAR (cont)
TOPIC:
Checkpoint
Tactics.
DISCUSSION:
A
high volume of pedestrian and vehicle traffic can be expected to pass through
a checkpoint. The normal congestion at checkpoints can be compounded by undisciplined
driving habits of local people and by a shortage of soldiers able to speak
the local language. Combatants usually develop techniques and ruses to get
weapons and explosives through checkpoints.
LESSON(s):
- Expect
the unexpected at checkpoints.
- Develop
and rehearse drills to prepare soldiers for all possible situations at checkpoints.
- Some
belligerent techniques and suggested responses are:
Action:
Place guns or explosives in vehicle fuel tanks or inside of component parts
of vehicles. Counter
Action:
Rehearse vehicle search techniques. Develop a checklist for soldiers to use
and obtain the proper equipment to conduct a search of vehicles (large mirrors
to inspect the undercarriage of vehicles, bolt cutters to cut locks)
Don'
t rush the search just because traffic backs up.
Action:
Weapons, explosives, and combatants can be concealed in hearses and ambulances
instead of bodies or wounded civilians. Counter
Action:
Treat these vehicles with respect but develop drills for searching vehicles
or verifying wounds. Action:
Create a diversion to sneak or rush through a checkpoint. Commonly used techniques
are: a sniper attack; an ambulance arriving at the checkpoint with sirens blaring;
staging fights or riots near the checkpoint; and staging a vehicle accident
or starting a fire. Counter
Action:
Develop drills and techniques to rapidly emplace barricades to stop both vehicle
and pedestrian traffic. Establish signals or code words to initiate closure
operations. Use a quick reaction team at each roadblock to handle unexpected
situations so checkpoint personnel do not have to leave their post. Action:
Using females to smuggle weapons and explosives. Counter
Action:
Develop techniques to search females. Male soldiers should not physically touch
females. Use female soldiers to search female civilians. Use metal detectors
or mine detectors to scan individuals for weapons. The detectors may not detect
explosives.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|