Countering the threats of retail ­terrorist vehicle attacks

March 2019 Editor's Choice, Access Control & Identity Management, Security Services & Risk Management, Retail (Industry)

On December 19, 2016, the news exploded with information about a vehicle attack on a Christmas market in Berlin that killed at least 12 and injured more than 50. Less than a month before, the US State Department had warned about such attacks in public places, saying that extremist groups, including the Islamic State and Al Qaeda, were planning to focus on such locales during the holiday season.

Indeed, both terrorist groups have called on followers to use trucks in particular to attack crowds. On July 14, a truck ploughed into Bastille Day vacationers in Nice, France, killing 86 people. Then, an intoxicated driver injured at least 28 people when smashing into the Krewe of Endymion parade, the largest at Mardi Gras in New Orleans, at a yet unprotected intersection. Finally, four people were killed in Stockholm by a terrorist who had stolen a truck to run them down.

To stop such attacks, security professionals need to be cognisant of two different types of vehicle access points for such massive, cowardly incidents to occur. The first would be in a location where the primary use is pedestrian, but, frequently, vehicles need to pass through. An example could be a square in which the maintenance truck comes through to clean the square periodically.

Other areas could be those locations with restricted parking. At a hospital, it may be the entrance to the emergency unit. Such access points are well served by bollards, some moveable, that go up and down to let vehicles through and others fixed or stationary.

The other access points are those that are temporary. At an event, traffic may need rerouting. A store might be having an open house. In either case, sections normally open to traffic will be closed to create pedestrian paths and gathering points. However, these areas still have a need for delivery trucks and certain other authorised vehicles to enter. These locations are best protected with crash-rated portable barriers that erect in 15 minutes and are then removed once the event is over.

Bollards, the most used permanent solutions

Bollards are aesthetically pleasing and let pedestrians move between them in non-roadway applications. Bollard systems operate individually or in groups. They are used for intermediate level security applications. Individual bollards are up to 32 cm in diameter, up to 88,9 cm high and are usually mounted on 0,9–1,5 m centres. They are tested to stop and destroy an attacking vehicle weighing 4536 kg moving at 104 kmph, or a 9072 kg vehicle moving at 74 kmph. Typically kept in the ‘up’ position to stop traffic, moveable bollards lower to allow vehicles through.

Ranging from faceted, fluted, tapered, rings and ripples, colours, pillars, to shields, emblems and logos, bollards look nice and are versatile. Buyers can specify ornamental steel trim attached directly to the bollard, or select cast aluminium sleeves, which slip right over the crash tube. Bollards can be galvanised for corrosion resistance, fitted with an internal warning light for increased visibility and engineered to suit high traffic volume. If damaged, simply slip off the old and slip on the new.

Fixed post bollards are available to secure the sides of roadways with the same crash rating and appearance as their moveable cousins. Versus cement barriers such as posts and pots, many campuses prefer fixed post bollards for several reasons. First of all, when hit, cement posts and pots can explode, literally spreading shrapnel throughout the crowd, potentially creating numerous injuries. Shallow foundation bollards can be installed within sidewalks or on top of concrete deck truss bridges as well as conform to the inclines and turns of a locale. Think of the attack in London. They would be a perfect solution for such sites.

Temporary barriers are especially popular

By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas, and securing them, is critical to staving off vehicular attacks. That means being able to deploy security equipment in tough conditions, at a moment’s notice. Such equipment has existed for several years in the forms of portable temporary barriers.

Terrorists typically don’t go where they see barricades, so placing them wherever possible attacks can happen reduces security risks dramatically. Temporary barriers are often used to protect facilities while permanent ones are being built. Plus, they’ve even been effective for the long-term where physical conditions preclude permanent solutions.

Moveable self-contained barricades can be towed into position to control vehicle access within 15 minutes to answer the need of organisations that quickly require a temporary barricade system to address a specific threat or secure a facility during special events. These mobile deployable vehicle crash barriers carry a M40 rating, stopping 13 608 kg vehicles travelling at 64 kmph. No excavation or sub-surface preparation is required. Once towed into position, the portable barricade uses DC-powered hydraulic pumps to unpack and raise and lower itself off its wheels. There is no hand cranking. Wheels are stored along the sides and the vehicle ramps fold out, completing the implementation. To move the barrier from that spot to another, the procedures are just reversed.

Differing from the ‘hard stop,’ wanted with anti-terrorist barricades, the Soft Stop technology of the portable barrier decelerates and stops the vehicle over a short distance. This is important because, in many cases, the tragedies that the portables negate are accidents. Authorities want the vehicle stopped but they also want to minimise injury to the driver.

No application too large or small

Protecting people from vehicle attack is no small responsibility; it’s becoming mandatory. Knowing that you’ve got the right equipment in place to secure the campus from vehicle threat and prevent what is becoming all too common human tragedy brings a peace of mind that no amount of money can buy. Carefully researching available options and consulting with experts will ultimately lead to the right solution in helping you protect your campus from vehicle-based terrorism.

For more information go to www.deltascientific.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...
Health, safety, and environmental eLearning
Training & Education Security Services & Risk Management
SHEilds is a global leader in health, safety, and environmental eLearning, delivering internationally recognised qualifications such as NEBOSH, IOSH, IEMA, and ProQual NVQs.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.