Countering the threats of retail ­terrorist vehicle attacks

March 2019 Editor's Choice, Access Control & Identity Management, Security Services & Risk Management, Retail (Industry)

On December 19, 2016, the news exploded with information about a vehicle attack on a Christmas market in Berlin that killed at least 12 and injured more than 50. Less than a month before, the US State Department had warned about such attacks in public places, saying that extremist groups, including the Islamic State and Al Qaeda, were planning to focus on such locales during the holiday season.

Indeed, both terrorist groups have called on followers to use trucks in particular to attack crowds. On July 14, a truck ploughed into Bastille Day vacationers in Nice, France, killing 86 people. Then, an intoxicated driver injured at least 28 people when smashing into the Krewe of Endymion parade, the largest at Mardi Gras in New Orleans, at a yet unprotected intersection. Finally, four people were killed in Stockholm by a terrorist who had stolen a truck to run them down.

To stop such attacks, security professionals need to be cognisant of two different types of vehicle access points for such massive, cowardly incidents to occur. The first would be in a location where the primary use is pedestrian, but, frequently, vehicles need to pass through. An example could be a square in which the maintenance truck comes through to clean the square periodically.

Other areas could be those locations with restricted parking. At a hospital, it may be the entrance to the emergency unit. Such access points are well served by bollards, some moveable, that go up and down to let vehicles through and others fixed or stationary.

The other access points are those that are temporary. At an event, traffic may need rerouting. A store might be having an open house. In either case, sections normally open to traffic will be closed to create pedestrian paths and gathering points. However, these areas still have a need for delivery trucks and certain other authorised vehicles to enter. These locations are best protected with crash-rated portable barriers that erect in 15 minutes and are then removed once the event is over.

Bollards, the most used permanent solutions

Bollards are aesthetically pleasing and let pedestrians move between them in non-roadway applications. Bollard systems operate individually or in groups. They are used for intermediate level security applications. Individual bollards are up to 32 cm in diameter, up to 88,9 cm high and are usually mounted on 0,9–1,5 m centres. They are tested to stop and destroy an attacking vehicle weighing 4536 kg moving at 104 kmph, or a 9072 kg vehicle moving at 74 kmph. Typically kept in the ‘up’ position to stop traffic, moveable bollards lower to allow vehicles through.

Ranging from faceted, fluted, tapered, rings and ripples, colours, pillars, to shields, emblems and logos, bollards look nice and are versatile. Buyers can specify ornamental steel trim attached directly to the bollard, or select cast aluminium sleeves, which slip right over the crash tube. Bollards can be galvanised for corrosion resistance, fitted with an internal warning light for increased visibility and engineered to suit high traffic volume. If damaged, simply slip off the old and slip on the new.

Fixed post bollards are available to secure the sides of roadways with the same crash rating and appearance as their moveable cousins. Versus cement barriers such as posts and pots, many campuses prefer fixed post bollards for several reasons. First of all, when hit, cement posts and pots can explode, literally spreading shrapnel throughout the crowd, potentially creating numerous injuries. Shallow foundation bollards can be installed within sidewalks or on top of concrete deck truss bridges as well as conform to the inclines and turns of a locale. Think of the attack in London. They would be a perfect solution for such sites.

Temporary barriers are especially popular

By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas, and securing them, is critical to staving off vehicular attacks. That means being able to deploy security equipment in tough conditions, at a moment’s notice. Such equipment has existed for several years in the forms of portable temporary barriers.

Terrorists typically don’t go where they see barricades, so placing them wherever possible attacks can happen reduces security risks dramatically. Temporary barriers are often used to protect facilities while permanent ones are being built. Plus, they’ve even been effective for the long-term where physical conditions preclude permanent solutions.

Moveable self-contained barricades can be towed into position to control vehicle access within 15 minutes to answer the need of organisations that quickly require a temporary barricade system to address a specific threat or secure a facility during special events. These mobile deployable vehicle crash barriers carry a M40 rating, stopping 13 608 kg vehicles travelling at 64 kmph. No excavation or sub-surface preparation is required. Once towed into position, the portable barricade uses DC-powered hydraulic pumps to unpack and raise and lower itself off its wheels. There is no hand cranking. Wheels are stored along the sides and the vehicle ramps fold out, completing the implementation. To move the barrier from that spot to another, the procedures are just reversed.

Differing from the ‘hard stop,’ wanted with anti-terrorist barricades, the Soft Stop technology of the portable barrier decelerates and stops the vehicle over a short distance. This is important because, in many cases, the tragedies that the portables negate are accidents. Authorities want the vehicle stopped but they also want to minimise injury to the driver.

No application too large or small

Protecting people from vehicle attack is no small responsibility; it’s becoming mandatory. Knowing that you’ve got the right equipment in place to secure the campus from vehicle threat and prevent what is becoming all too common human tragedy brings a peace of mind that no amount of money can buy. Carefully researching available options and consulting with experts will ultimately lead to the right solution in helping you protect your campus from vehicle-based terrorism.

For more information go to www.deltascientific.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
South African fire standards in a nutshell
Fire & Safety Editor's Choice Training & Education
The importance of compliant fire detection systems and proper fire protection cannot be overstated, especially for businesses. Statistics reveal that 44% of businesses fail to reopen after a fire.

Read more...
LidarVision for substation security
Fire & Safety Government and Parastatal (Industry) Editor's Choice
EG.D supplies electricity to 2,7 million people in the southern regions of the Czech Republic, on the borders of Austria and Germany. The company operates and maintains infrastructure, including power lines and high-voltage transformer substations.

Read more...
Standards for fire detection
Fire & Safety Associations Editor's Choice
In previous articles in the series on fire standards, Nick Collins discussed SANS 10400-T and SANS 10139. In this editorial, he continues with SANS 322 – Fire Detection and Alarm Systems for Hospitals.

Read more...
Wildfires: a growing global threat
Editor's Choice Fire & Safety
Regulatory challenges and litigation related to wildfire liabilities are on the rise, necessitating robust risk management strategies and well-documented wildfire management plans. Technological innovations are enhancing detection and suppression capabilities.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Nice unveils MyNice Smartgo
News & Events Access Control & Identity Management
Nice SA has announced the release of MyNice Smartgo, a compact access automation solution, designed specifically for the South African market, combining an easy-to-install device with a user-friendly smartphone application.friendly smartphone application.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Winners of the 2025 Southern Africa OSPAs
Editor's Choice
The winners of the 2025 Southern Africa Outstanding Security Performance Awards (OSPAs) were revealed on Wednesday, 4th June, at Securex South Africa. Winners from all categories (except the Lifetime Achievement) will be featured in the second Global OSPAs set to take place in 2026.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.