Countering the threats of retail ­terrorist vehicle attacks

March 2019 Editor's Choice, Access Control & Identity Management, Security Services & Risk Management, Retail (Industry)

On December 19, 2016, the news exploded with information about a vehicle attack on a Christmas market in Berlin that killed at least 12 and injured more than 50. Less than a month before, the US State Department had warned about such attacks in public places, saying that extremist groups, including the Islamic State and Al Qaeda, were planning to focus on such locales during the holiday season.

Indeed, both terrorist groups have called on followers to use trucks in particular to attack crowds. On July 14, a truck ploughed into Bastille Day vacationers in Nice, France, killing 86 people. Then, an intoxicated driver injured at least 28 people when smashing into the Krewe of Endymion parade, the largest at Mardi Gras in New Orleans, at a yet unprotected intersection. Finally, four people were killed in Stockholm by a terrorist who had stolen a truck to run them down.

To stop such attacks, security professionals need to be cognisant of two different types of vehicle access points for such massive, cowardly incidents to occur. The first would be in a location where the primary use is pedestrian, but, frequently, vehicles need to pass through. An example could be a square in which the maintenance truck comes through to clean the square periodically.

Other areas could be those locations with restricted parking. At a hospital, it may be the entrance to the emergency unit. Such access points are well served by bollards, some moveable, that go up and down to let vehicles through and others fixed or stationary.

The other access points are those that are temporary. At an event, traffic may need rerouting. A store might be having an open house. In either case, sections normally open to traffic will be closed to create pedestrian paths and gathering points. However, these areas still have a need for delivery trucks and certain other authorised vehicles to enter. These locations are best protected with crash-rated portable barriers that erect in 15 minutes and are then removed once the event is over.

Bollards, the most used permanent solutions

Bollards are aesthetically pleasing and let pedestrians move between them in non-roadway applications. Bollard systems operate individually or in groups. They are used for intermediate level security applications. Individual bollards are up to 32 cm in diameter, up to 88,9 cm high and are usually mounted on 0,9–1,5 m centres. They are tested to stop and destroy an attacking vehicle weighing 4536 kg moving at 104 kmph, or a 9072 kg vehicle moving at 74 kmph. Typically kept in the ‘up’ position to stop traffic, moveable bollards lower to allow vehicles through.

Ranging from faceted, fluted, tapered, rings and ripples, colours, pillars, to shields, emblems and logos, bollards look nice and are versatile. Buyers can specify ornamental steel trim attached directly to the bollard, or select cast aluminium sleeves, which slip right over the crash tube. Bollards can be galvanised for corrosion resistance, fitted with an internal warning light for increased visibility and engineered to suit high traffic volume. If damaged, simply slip off the old and slip on the new.

Fixed post bollards are available to secure the sides of roadways with the same crash rating and appearance as their moveable cousins. Versus cement barriers such as posts and pots, many campuses prefer fixed post bollards for several reasons. First of all, when hit, cement posts and pots can explode, literally spreading shrapnel throughout the crowd, potentially creating numerous injuries. Shallow foundation bollards can be installed within sidewalks or on top of concrete deck truss bridges as well as conform to the inclines and turns of a locale. Think of the attack in London. They would be a perfect solution for such sites.

Temporary barriers are especially popular

By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas, and securing them, is critical to staving off vehicular attacks. That means being able to deploy security equipment in tough conditions, at a moment’s notice. Such equipment has existed for several years in the forms of portable temporary barriers.

Terrorists typically don’t go where they see barricades, so placing them wherever possible attacks can happen reduces security risks dramatically. Temporary barriers are often used to protect facilities while permanent ones are being built. Plus, they’ve even been effective for the long-term where physical conditions preclude permanent solutions.

Moveable self-contained barricades can be towed into position to control vehicle access within 15 minutes to answer the need of organisations that quickly require a temporary barricade system to address a specific threat or secure a facility during special events. These mobile deployable vehicle crash barriers carry a M40 rating, stopping 13 608 kg vehicles travelling at 64 kmph. No excavation or sub-surface preparation is required. Once towed into position, the portable barricade uses DC-powered hydraulic pumps to unpack and raise and lower itself off its wheels. There is no hand cranking. Wheels are stored along the sides and the vehicle ramps fold out, completing the implementation. To move the barrier from that spot to another, the procedures are just reversed.

Differing from the ‘hard stop,’ wanted with anti-terrorist barricades, the Soft Stop technology of the portable barrier decelerates and stops the vehicle over a short distance. This is important because, in many cases, the tragedies that the portables negate are accidents. Authorities want the vehicle stopped but they also want to minimise injury to the driver.

No application too large or small

Protecting people from vehicle attack is no small responsibility; it’s becoming mandatory. Knowing that you’ve got the right equipment in place to secure the campus from vehicle threat and prevent what is becoming all too common human tragedy brings a peace of mind that no amount of money can buy. Carefully researching available options and consulting with experts will ultimately lead to the right solution in helping you protect your campus from vehicle-based terrorism.

For more information go to www.deltascientific.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...