• Skip to primary sidebar
  • Skip to content
  • Skip to footer
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

This article is going to focus on vehicle-borne IED attacks, but we will rule out the targeting of individuals with car bombs as this falls more into the category of targeted assassination. Instead, this article will focus on the use of VBIED’s as a means to kill and injure indiscriminately.

The real subject matter experts in this field come from the military. Soldiers deployed to war & conflict zones are dealing with this threat on a daily basis. However, for the purpose of this article, let’s view the subject from the point view of an executive protection team. The knowledge gained through the examination of this threat will be particularly useful to RST teams (Residential Security Team), those charged with the guarding of critical infrastructure, and event security personnel.

Typically, I find myself engaged in the process I’m about to describe whenever I’m patrolling the premises of a principal’s house or deployed upon a task involving the protection of critical infrastructure.

Before we dig deeper into this subject, let’s look at the terminology and understand a few key terms.

IED: Improvised Explosive Device.
An improvised explosive device (IED) is essentially a bomb, constructed and deployed in ways that differ to conventional military exploding devices. Simply put, it’s a homemade bomb. The parts required to build one and the methods in which it is deployed can vary, though the most common types tend to be roadside bombs.

VBIED: Vehicle-Borne Improvised Explosive Device.
The term VBIED specifies the delivery method used to transport the exploding device to its intended target, in this case, a vehicle.

PBIED: Person-Borne Improvised Explosive Device
The most commonly encountered PBIED would be an explosive vest worn by a suicide attacker.

Now that we’ve got the terminology in order let’s consider what you should be looking for when tasked with protecting a client or securing a venue.

Indicators

Indicators to look for include:
Cars that look heavy, a chassis sitting low on the axle and especially those with a greater amount of weight at the rear.

Vehicles that are parked illegally or parked in a no-parking zone, especially when located near to exits or where there is a heavy flow of pedestrian traffic.

Cars with tinted or covered windows, particularly when this is not in keeping with the make and model.

Vehicles that have had their license plates removed or visibly altered.

Vehicles with large containers inside, such as boxes, barrels, tanks, and large bags. Be suspicious of loads that are concealing their cargo with blankets or other materials.

If there is an unusually strong smell of gasoline, propane, or other similar chemicals.

Be alert to any visible wires, antennas, and batteries outside or inside the vehicle that are not normal.

You should be cautious of vehicles which seem abandoned, or those that have appeared during the hours of darkness.

A driver who is wearing some form of disguise or is trying to avoid being recognized.

Drivers who refuse to answer your questions when challenged or seeming overly aloof.

If you encounter a situation with two or more of the factors described above, then you may want to be extra cautious in approaching or searching the vehicle.

Entering the kill zone
There are several different methods in which the VBIED can be brought to the kill zone, here are some examples.

Passive penetration – meaning it comes without permission but doesn’t use force to enter, for example, tailgating.

Aggressive penetration – where a vehicle enters the area by force, breaching barriers, gates or buildings in the process. Deception – where the attackers use fake id’s and/or permits to gain entry to a restricted area.

Proxy – where the person driving the VBIED is not the attacker but delivering it on their behalf. An example of this would be where the driver is under duress due to extortion or kidnapping of a family member. This is a very effective way of launching a VBIED attack into a restricted area.

History
Attacks using vehicle-borne IED’S are not a new thing. They are currently being used in war and conflict zones all around the world. We have become used to hearing news about car bombs detonating in hostile regions like Iraq or Syria, but, historically they were commonplace in Europe too. Remember the London car bombs in 2007.

Two cars loaded with explosives were intended to kill people coming out of a popular nightclub. You can do a google search for more in-depth information, but the point I want to highlight is that the bombs were found by accident by an ambulance crew that came to the scene to handle another incident. They came across a few of the indicators listed above, reacted accordingly, and fortunately discovered the device.

Norway, which is considered to be one of the most peaceful countries in the world, suffered tragic events in 2011 when a massacre was initiated after a parked vehicle full of explosives detonated in front of the prime minister’s office, killing eight people and destroying nearby buildings.

The future
Unfortunately, we are going to continue seeing these types of attacks again and again. Why? The answer lies in their simplicity, not to mention, it is relatively cheap and easy to make VBIED’s. The materials required to make improvised explosives aren’t particularly difficult to acquire, though intelligence agencies and the police monitor the flow of such materials. The all-important vehicle, which serves as the delivery platform can be stolen, loaned or rented with considerable ease and there is a surprisingly low risk of actually being caught.  Large quantities of bomb-making material, loaded into vehicles, can easily avoid detection, especially in non-war zones like in the Nordic countries. Here, security personnel don’t routinely face these types of threat, and consequently, they are not practiced or instructed in threat detection and mitigation.

Combatting the threat

So how do we better protect against this threat? One basic, yet essential thing we can do is to ensure that the relevant people receive regular training on how to spot a VBIED threat. Next, we need to start implementing specific access control procedures in venues we are tasked to protect. We can reinforce buildings, so they are better prepared to withstand a blast and enforce a minimum standoff distance between parked cars and buildings. Additionally, the strategic placement of vehicle barriers will add another layer of defence. These are just a few things, to begin with, and while VBIED’s may not be your top priority threat in an executive protection setting, it is still vital that you know how to spot one.

 


VEHICLE-BORNE IED
By: Wille Heino

Gambeson is a security training & consulting company specialized in countering modern day threats. Wille Heino,  Security Specialist gambeson wille.heino@gambeson.fi

Tweet
Share
Pin
Share19
19 Shares

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

Buy Now

Latest Newsletter

Newsletter Sign Up

What you don't know CAN hurt you!

SUBSCRIBE

Latest Industry News

Ugandan Minister Killed by Bodyguard in Apparent Wage Dispute

A Ugandan government minister, Charles Engola, was shot and killed by his bodyguard early Tuesday in an apparent private dispute over wages, according to the army and local media. Engola, a retired army colonel, served as the junior minister in charge of labor in President Yoweri Museveni’s government.

Event

News - Circuit Magazine

Zelenskiy Denies Ukraine’s Involvement in Alleged Kremlin Drone Attack

Ukrainian President Volodymyr Zelenskiy has refuted Russia’s claims that Ukraine was involved in a drone attack on the Kremlin, which was allegedly aimed at killing Russian President Vladimir Putin. Zelenskiy stated that Ukraine fights and defends its territory, not attacking Putin or Moscow. The Kremlin reported that two drones were used in the attack but were disabled by Russian defenses.

News taken from Issue 65 of the Circuit Magazine

Bodyguard Saves Japanese PM from Pipe Bomb Attack

A bodyguard has been hailed as a hero for his quick-thinking actions during a suspected pipe-bomb attack on Japanese Prime Minister Fumio Kishida. Video footage captured the bodyguard kicking away a metal object as it landed near Kishida
before positioning himself between the Prime Minister and the device, shielding him with a collapsible, handheld ballistics shield.

News from Issue 65 of the Circuit Magazine

AlertEnterprise Reveals First-Ever Guardian AI Chatbot Powered by OpenAI ChatGPT

AlertEnterprise has unveiled its first-ever Guardian AI Chatbot powered by OpenAI ChatGPT. The chatbot will make its global debut at the ASIS Europe and ISC West trade events. Built on OpenAI’s GPT-3 platform, the Guardian AI Chatbot aims to provide security operators with instant access to critical physical access and security insights through quick questions and prompts.

James Bore's Cyber Security

Ways to See the Threat Before it Happens

Threat modelling is widely in use, whether knowingly or not, across every walk of life – and has been used since time immemorial to prioritise security defences. The only difference between the well-known risk assessments carried out by everyone and threat modelling in cyber security is the attempt to document and systemise it. I am hoping that this idea of formal threat modelling will be a useful tool for you to use in your future arsenal of available resources as a CP operator.

Close Protection advice

Keeping Your Edge: Building a Solid Foundation

Longevity, consistency and remaining relevant are some primary goals of all protectors. These factors are important when establishing a new contract and providing services for a new client. But what is equally important is the mindset that goes into those first days and weeks on the assignment. As such, I wanted to get the personal perspective of Vantrell Wilson, a close protection agent who I have trained with and worked alongside of for years now.

Technology in the security industry

Leveraging Technology in Industry Hiring

Increased global connectedness through technology is fast becoming the norm these days. Video conferencing and “face to face” meetings are happening daily in real-time across the world. As an industry that prides itself on having the edge over our adversaries, we are falling below our own standards when it comes to utilizing the technological resources at our availability to their fullest potential.

Global Risk Updates

Global Situation Report - November 2021

Global Situation Report – November 2021

Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Popular Tags

armed attack Bodyguard business Celebrity client clients Close Protection Communication cp Crime Elijah Shaw EP Executive Executive Protection firearm firearms government gun Intelligence Law Enforcement Media Medical military News online police Prevention professional protect protection Risk Safety Security SIA Social Media Surveillance Technology terror Terrorism terrorist Threat Training VIP weapon

On The Frontline

Non-verbal communication

Behaviors & Anomalies

In the previous article (Baselines of Behavior, Issue 53), we spoke about the four major behaviors: dominant, submissive, comfortable, and uncomfortable. These are the most prevalent and easiest to categorize and I gave you the means to identify each one. However, identifying the behaviors is not our main goal. Creating a baseline of the behaviors and then looking for clusters of anomalies is the goal. These anomalies highlight changes within the individual’s emotional state around a specific topic and can be crucial for us, as security professionals, to identify a threat early enough to counter it.

Training for Survival

“The training is necessary because of the world we live in and the kinds of issues our students face,’’ said Wilson, who travels around the entire county to help students. “We deal with emotional, physical and psychological trauma. You’re always wondering if it’s going to be you or your school next.”

Jose Casillas

Foot Steps: Mike Brown

Mike Brown is one of those individuals who has found success as an operator by envisioning where he wanted to end up and trusting the process to take him there. In his time in the industry, he has earned his stripes and now reaps the rewards running a successful business and managing the protective detail for a very well-known public figure. I speak to Mike to learn some of his keys to success.

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

Women in protection

Value Driven Integration – Women in Protection

Recently I posted an article on my professional page that stated all the reasons why a female …

Continue Reading about Value Driven Integration – Women in Protection

Keeping Your Edge – Measured Responses in Tour Security (Part II)

In the first part of this ongoing series, we discussed the challenges faced by Protectors who work …

Continue Reading about Keeping Your Edge – Measured Responses in Tour Security (Part II)

Running the Gauntlet images

Running the Gauntlet

  Author Interview with Luke Duffy Luke Duffy is a former Paratrooper, and present day …

Continue Reading about Running the Gauntlet

How to Improve your Chances with Cyber Security Hiring Managers

Cyber Security Hiring

How to Improve your Chances with Cyber Security Hiring Managers Whether you're a seasoned …

Continue Reading about Cyber Security Hiring

Promoted Event

International Security Expo

Latest Podcast Episode

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

As AI armageddon comes closer, the global challenge is discerning the line between innovation and oversight, particularly concerning decision-making biases and security implications.

Buy Now

Follow us

  • Email
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

© 2023 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept