Skip to content
Menu
  • Original Short Fiction
Menu

Vehicle Ambush v2.0

Posted on 24 July 2015 by The Tactical Hermit

vehicle ambush

 

The definition of hybrid warfare designates a combination of tactics and strategies; some from the conventional school, some from the asymmetrical and some from the cyber. It is this integration of cyber techniques that can make traditional and asymmetric battlefield strategies much more deadly and efficient.

Imagine this: a small insurgent force, (platoon strength or around 30 men) is planning a vehicle ambush on a convoy of enemy trucks thought to be carrying small arms, ammunition and explosives. The plan is to ambush the trucks, kill the drivers and soldiers guarding it and confiscate the weapons. The standard “L” ambush is agreed upon, and positions assigned (In this case, for the sake of clarity, the platoon is divided up into 3 “Elements”; Assault, Support and Security. The team leader of the Assault element is told  that the goal is the safe retrieval of the weapons and explosives; not the destruction of them, so pass along the word to it is crucial that the drivers are killed first so there is a smaller chance for escape. After the drivers, then focus on the small contingent of guards, which we estimate only to be around 10 men with small arms. Once all the specifics have been worked out, a key member of the ambush team, the “Cyber” element speaks.

“I will start hacking the internal systems of the lead vehicle 1/8 mile from the ambush zone, killing all the electronics in a systematic fashion and hopefully immobilizing the lead vehicle here, at or around point here.” The cyber-tech points to a spot on the map marked “Kill Box”. “Once the lead vehicle is immobilized, the other vehicles will be forced to stop and will be unable to turn around due to a blocking action of the rear element. It is imperative that the ambush starts ONLY after the lead vehicle is immobile. If the enemy are alerted to our presence too early, they will surely call for reinforcements and with the QRF response times we have monitored averaging 12 to 15 minutes, combined with the distance from the nearest base, they will be on top of us in under 45 to 50 minutes, so it is imperative that 5 minutes before the ambush, all cell phone and radio freqs are jammed by our Commo (Communications Officer). Once the lead vehicle is immobile, it will be the job of the support element to execute a blocking formation by moving our ‘requisitioned’ school bus across the road to prevent escape. With the lead vehicle immobile and the rear exit blocked, the remaining guards will either fight or flee, if they run, it will be the job of the security elements to scoop them up. Once the guards are eliminated or captured, trucks will be searched for GPS beacons and disabled. Seeing the trucks are still driveable, they will then be driven out, if not, and they are damaged, arms and ammo will be unloaded into our trucks, this will eat up valuable time, so again, all efforts must be made not to damage the enemy vehicles during the ambush!”

lshaped

Now although the above is presented as a fictional “what could be” event, a recent article in WIRED showed just how easy hacking and hijacking a vehicles internal computer can be with the right gear and know-how.

If one wanted to go even further on the “what if” scale, consider if local municipality or statewide infrastructure like traffic lights, CCTV cameras (for operational surveillance) train crossings, HOV Lanes and even drawbridge controls were hacked for the purpose of physically stopping or slowing down a vehicle so an ambush, assassination, robbery, etc., could take place.

Hollywood of course, has picked up on this theme, but focusing mainly on just the “cyber” side of things and not the “hybrid” integration we are discussing.  In the Showtime series Homeland, the United States VP’s Pacemaker is hacked by a terrorist group causing rapid heart arrhythmia and eventually death. Again, considering what the OPM hack showed us in how sensitive data (like sensitive medical records for example) are vulnerable to manipulation, this is something to consider as we traverse what will most likely be known in history as the 21st “Cyber” Century.

The “Hybrid” integration of cyber threats with asymmetrical warfare has unlimited possibilities. Of course what I have hypothesized here today is thinking very “small” in terms of overall strategy, but I wanted to show that for all practical purposes, these types of hybrid tactics, when planned and executed with violence of action, can and will work.

Stay Armed and Stay Dangerous!

1 thought on “Vehicle Ambush v2.0”

  1. Brittius says:
    24 July 2015 at 12:20

    Reblogged this on Brittius.

Leave a Reply

Your email address will not be published. Required fields are marked *

Tactical Hermit Substack

Recent Post

  • Bee PSA
  • Evening Laugh
  • Race Reality in South Africa: Anybody Can Farm, Right?
  • How Putin’s new Drone War is getting Deadlier
  • Duckmen 3 & 4
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme