TACTICAL CONVOY OPERATIONAL

PROCEDURES

TACTICAL CONVOY OPERATIONAL PROCEDURES

 

OPERATIONAL ENVIRONMENT

 

1.   OPERATIONS SECURITY.  We make use of these four steps in the OPSEC planning sequence:

  • Determining of enemy capabilities for obtaining information about convoy operations. (inside information leakage)
  • Determining what information could be obtained by the enemy which will compromise the operation. (Strategic Planning and information gathering)
  • Determining the actions that could be taken by the tactical convoy units before an operation, if known and analysed by the enemy would give the enemy the information they need. (screening and polygraph testing and inside convoy vehicle surveillance)
  • Determining the protective measures that are necessary and where they must be implemented to maximise operations security.

Operations security measures include:

  • Counter surveillance
  • Signal security
  • Physical Security
  • Information Security

 

  1. Counter Surveillance. Counter surveillance will include all active or passive measures taken to prevent threat forces from seeing your area, equipment, movements, and so forth. Counter techniques include—

 

  • Camouflaging and toning down trucks if possible, tactical and convoy vehicles to have no distinctive markings and brandings.
  • Moving at night or during periods of reduced visibility where only certain top management and security Forces personnel to know the time and dates for movements of the convoys which must also be random.

 

  1. Signal Security. Our Signal security will be initiated through communications and electronic security techniques to prevent the disclosure of operational information. It includes—

 

  • Keeping radio transmissions short
  • Maintaining signal silence whenever possible.
  • Gps and Rf tracking units in hidden in random packages
  • Vehicle tracking of convoy and tactical vehicles
  • App which works in the whole of S.A and sends closest standby backup units to assist.
  • Control room surveillance team will communicate with tactical and crew drivers asking them locations and verifying that all convoys are together by monitoring movement on surveillance tracking systems.

 

  1. Physical Security. Physical security is the use of our security forces, barriers, dispersal, concealment, and camouflage to deny enemy access to facilities, area, equipment, material and personal. Our Physical security protects operational information and activities. Some of the practical techniques we use include—

 

 

  • Deploying of security elements to the front and rear and when required to flanks of convoys (backup vehicles sent for any suspected hi-jacking)
  • Using listening and observation tools inside the convoyed vehicle
  • Identifying avenues of approach and covering them as per any means necessary.
  • Employing obstacles that impede the enemy by means of using escort vehicles

 

  1. Information security. Information security is the control of written, verbal, and graphic information we make use of to prevent the disclosure of operational information. To ensure information security—

 

  • We never post information out in the open or unsecured WhatsApp groups, and no vehicle branding
  • Do not allow local civilians without clearances into work and assembly or loading areas.
  • Handle all classified and sensitive documents properly
  • Polygraph tests and proper screening on convoy vehicle drivers
  • Surveillance footage as well listening devices in the convoy vehicle on the passenger and driver.
  • Changing of cell phones for convoy drivers before the escort commences with a remote monitoring app to be monitored by control room. (Inside information will be monitored.
  • Control room will monitor all real time tracking on geographical maps of all convoy and tactical vehicle movements, stock movements on monitoring screens in control room.

 

  1. UNIT SOPS. We will have complete SOP facilities planning at company level, SOP’s will conform with those prepared by higher Tactical convoy management personal., the SOP will cover the following subjects:

 

  • Duties of the convoy commander and other convoy control personnel.
  • Convoy organization.
  • Weapons and ammunition to be carried.
  • Hardening of vehicles depending on the level of threat.
  • Protective equipment will be worn.
  • Preparation of convoy vehicles.
  • Counter ambush actions.
  • Operations security measures.
  • Immediate action drills.
  • Action during scheduled or unexpected halts.
  • Maintenance and recovery of disabled vehicles
  • Refuelling halts
  • Communications
  • Actions at the release points
  • Reporting

 

  1. PREPARING OUR VEHICLES FOR CONVOY. Here are the key responsibilities of key personal, as well as the elements needed in preparing vehicles for convoy.

 

  1. Command responsibilities. Our commander of the moving unit will be responsible for the mechanical condition of his vehicles. Tactical convoy drivers must inspect all vehicles according to the appropriate TM’s before departing for the convoy. Tactical convoy drivers will also ensure that—

 

  • Additional fuel (Cross border or long convoys), water and lubricants are provided for en route requirements.
  • Loads are inspected and tracking devices are hidden in product boxes.
  • Vehicles are hardened when required.
  • Weapons are inspected and recorded as per law.

 

  1. Marshalling or assembly area inspection teams. A technique will be used for larger unit movements to establish marshalling area or assembly area inspection points as convoys are ready to depart, they will then proceed to inspection points for final checks and driver briefings. Tactical drivers will be available to assist unit commanders in correcting last-minute minor deficiencies.

 

  1. Hardening vehicles. This will be done through a thorough risk assessment and investigations of the different syndicates operating within the different market of companies where our convoys will be taking place.

 

  1. Night convoys. We understand that night convoys are extremely vulnerable to ambush and easier hi-jackings. Units are trained in techniques for the night convoys. Night loading and offloading as well as night refuelling. These are the following techniques we will be implementing for night convoys—

 

  • Keep night convoys small
  • Use roads that drivers know
  • Conduct control room reconnaissance.
  • Planning night convoys in the same manner as daylight convoys.

 

  1. Hi-JACKING OR AMBUSH DEFENSE. The best defence is to avoid being ambushed or Hi-jacked.
  2. These actions we will use to avoid ambushes and Hi-jackings—
  • We select the best routes for your convoys.
  • Making map reconnaissance.
  • Obtain current intelligence information
  • Use OPSEC to deny the enemy foreknowledge of our convoys
  • We will never schedule routine times or routes.

 

  1. We will take the following actions to reduce the effectiveness of hi-jackings and ambushes:
  • We will always wear protective clothing during the convoys.
  • Use crew as drivers where needed.
  • Thoroughly briefing of all personnel on immediate action drills trained
  • We maintain the interval between vehicles.
  • Counterattack with tactical vehicle and then return fire
  • We can call for back to assist in all provinces with our national armed fleet vehicles
  • Driver can direct his crew to place heavy fire on enemy forces as rapidly as possible.
  • Control room assisting in contacting SAPS to assist.

Company Overview

We as a company have had 27 years of armed escort convoy experience from former Police and Military personnel, management and Professional escort training in real time situations. We have highly trained and Psira certified tactical officers with crew in vehicles executing trailing escorts.

Our tracking and recovery technology are state of the art as we prefer to keep up with day to day technology which makes us a cut above the rest. We will not only minimize hi-jackings but also recover the stolen goods.

Our twenty-four-hour control room which operates as the head of all our escort executions will know exactly where tac vehicles are as well as convoy vehicle with the various high value assets. We have a national backup units who will assist quickly in any hi-jack scenario or situation that could take place at any given twenty four hour cycle.

We have a team of investigators which will analyse syndicates operating within the specific fields of operation. Intelligence gathering will be performed by this Elite Investigation Unit. All former members of SAPS. This team will be deployed as soon as any situation occurs in the field.

All screening, polygraphs will be accessed before any officer is employed by our company for this sensitive operation.

 

HERE TO PROTECT YOUR HIGH VALUE ASSETS

 

Armed response