SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Counter terror
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers

Check out our special report on casino security

Get it now!

Vehicle attacks: Security professionals must protect pedestrians

Vehicle attacks: Security professionals must protect pedestrians
Greg Hamm
Greg Hamm
Contact company
Contact Delta Scientific Corporation (UK) Limited
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Vehicle access points: Key targets for security experts to prevent vehicle attacks.
  • Bollards and barriers are crucial for pedestrian safety against vehicle-based terrorism.
  • Portable barriers offer rapid deployment for temporary security during high-risk events.
Related Links
  • Vehicle barrier certification sets new standards for vendors with stringent testing measures
  • High-security portable crash barriers offer security integrators and dealers new expansion opportunities

On 19th December, 2016, the news exploded with information about a vehicle attack on a Christmas market in Berlin that killed at least 12 people and injured more than 50 others. Less than a month before, the US State Department had warned about such attacks in public places throughout Europe, saying that extremist groups including the Islamic State and Al Qaeda were planning to focus on such locales during the Holiday Season.

Two types of vehicle access point

To stop these attacks, security professionals need to be cognizant of two different types of vehicle access point for such incidents to occur. The first would be in a location where the primary use is pedestrian but, frequently, vehicles need to pass through. An example could be a square in which the maintenance truck comes through to clean the square periodically. Other areas could be those locations with restricted parking. At a hospital, it may the entrance to the emergency unit. Such access points are well served by bollards, some moveable that go up and down to let vehicles through and others fixed or stationary.

The other access points are those that are temporary. At a stadium, traffic may need rerouting for sporting weekends. A hospital might be having an open house. In either case, sections normally open to traffic will be closed to create pedestrian paths and gathering points. However, these areas still have a need for delivery trucks and certain other authorised vehicles to enter. These locations are best protected with crash-rated portable barriers that erect in 15 minutes and are then removed once the event is over.

Bollards: The most used permanent solutions

Bollards are aesthetically pleasing and let pedestrians move between them in non-roadway applications. Bollard systems operate individually or in groups. They are used for intermediate level security applications. Individual bollards are up to 32 cm in diameter, up to 88.9 cm high and are usually mounted on 0.9-1.5 m centres. They are tested to stop and destroy an attacking vehicle weighing 4536 kg moving at 104 kph or a 9072 kg vehicle moving at 74 kph. Typically kept in the "up" position to stop traffic, moveable bollards can lower to allow vehicles through.

Temporary barriers are often used to protect facilities while permanent ones are being built
Terrorists typically don't go where they see barricades, so placing them wherever possible attacks can happen reduces security risks dramatically

Ranging from faceted, fluted, tapered, rings and ripples, colors, pillars, to shields, emblems and logos, bollards look nice and are versatile. Buyers can specify ornamental steel trim attached directly to the bollard, or select cast aluminum sleeves, which slip right over the crash tube. Bollards can be galvanised for corrosion resistance, fitted with an internal warning light for increased visibility and engineered to suit high traffic volume. If damaged, simply slip off the old and slip on the new.

Fixed post bollards are available to secure the sides of roadways with the same crash rating and appearance as their moveable cousins. Versus cement barriers such as posts and pots, many entertainment locations prefer fixed post bollards for several reasons. First of all, when hit, cement posts and pots can explode, literally spreading shrapnel throughout the crowd, potentially creating numerous injuries. Shallow foundation bollards can be installed within sidewalks or on top of concrete deck truss bridges, as well as conform to the inclines and turns of a locale.

Temporary barriers

By their very nature, terrorist attacks are unpredictable and predicated on surprise. Staying one step ahead by identifying vulnerable areas and securing them is critical to staving off vehicular attacks. That means being able to deploy security equipment in tough conditions, at a moment's notice. Such equipment has existed for several years in the forms of portable temporary barriers.

Terrorists typically don't go where they see barricades, so placing them wherever possible attacks can happen reduces security risks dramatically. Temporary barriers are often used to protect facilities while permanent ones are being built. Plus they've even been effective for the long-term where physical conditions preclude permanent solutions.

Staying one step ahead by identifying vulnerable areas and securing them is critical
to staving off vehicular attacks

Their most common use, though, is for when vehicle access is required temporarily. Parking for a football game, a grand opening and open houses are temporary events needing only a temporary solution. These barriers can be deployed quickly and effectively, even in places where it's impossible to excavate for a permanent foundation.

Mobile deployable vehicle crash barriers

Moveable self-contained barricades can be towed into position to control vehicle access within 15 minutes. These mobile deployable vehicle crash barriers carry a M40 rating, stopping 13,608 kg vehicles traveling 64 kph. No excavation or sub-surface preparation is required. Once towed into position, the portable barricade uses DC-powered hydraulic pumps to unpack and raise and lower itself off its wheels. There is no hand cranking. Wheels are stored along the sides and the vehicle ramps fold out, completing the implementation. To move the barrier from that spot to another, the procedures are just reversed.

Protecting people from vehicle attack is no small responsibility; it's becoming mandatory. Knowing that you've got the right equipment in place to secure the event from vehicle threat and prevent what is becoming all too common human tragedy brings a peace of mind that no amount of money can buy. Carefully researching available options and consulting with experts will ultimately lead to the right solution in helping you protect your campus from vehicle-based terrorism.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Campus security systems
  • Hospital security
  • Security access systems
  • Vehicle tracking
  • Stadium security
  • Public security
  • Sports security
  • Counter terror
  • Event security
  • Perimeter protection
  • Related links
  • Articles by Greg Hamm
  • Related categories
  • Bollards
  • Barricades
  • Gates
  • Barriers
  • Guard booths
Related white papers
Monitoring traffic flow: Everywhere, all the time

Monitoring traffic flow: Everywhere, all the time

Download
The critical importance of Trusted Execution Environment in access control

The critical importance of Trusted Execution Environment in access control

Download
How to ramp up perimeter security with license plate reader technology

How to ramp up perimeter security with license plate reader technology

Download
Related articles
Physical and cyber security precautions when travelling

Physical and cyber security precautions when travelling

Mass security screening technology for large events

Mass security screening technology for large events

2018 FIFA World Cup Russia integrates safety, security and service

2018 FIFA World Cup Russia integrates safety, security and service

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Counter terror
  4. News
  5. Expert commentary
About this page

Discover effective event security strategies to counteract vehicle terror attacks, ensuring public safety and protection.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec