Delta Scientific's Vehicle Control Systems Will Help Protect Both Republican and Democratic Conventions

Delta Scientific, manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, recently announced that 26 16-foot Delta MP5000 mobile deployable vehicle crash barriers with be used by the Secret Service at both upcoming national political conventions. The Republican Convention starts August 27 and the Democratic Convention begins September 3. Provided through Global Access Control Systems (Pittsburgh), these mobile deployable vehicle crash barriers carry a K8 rating (M40 per new ASTM rating), stopping 7.5 ton (6400 Kg) vehicles traveling 40 mph (64 kph).

“First used successfully to protect NATO troops in Kosovo and elsewhere, Delta’s quick deployment, modular portable solutions can be rapidly set up on existing concrete or asphalt roads, level compacted soils and other hard surfaces,” said Greg Hamm, Delta Scientific vice president of sales and marketing. “Towable barricades answer the needs of clients that require a temporary barricade system to address a specific threat or secure a facility during special events, such as these conventions.”

In both Tampa and Charlotte, the totally self-contained MP5000’s will be towed into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades will unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. 

Over 1,000 of the MP5000 mobile deployable vehicle crash barriers are being utilized throughout the world. Many of the MP5000s are being used in the Middle East to protect US troops from truck bomb attack. Throughout Iraq and Afghanistan, such as at Camp Victory, the 16-foot clear opening model is especially popular as large-tracked vehicles, such as Strikers, can pass through the barricade.

Both the operation of the barrier as well as deployment and retrieval are push-button controlled. A standard system includes a battery-operated power unit, replenished from either a solar array or local low voltage source. Optionally, a Delta Hydraulic Power Unit operated on a locally supplied power or full manual system, or combination, is available. Both the locally powered and battery powered hydraulic pumping unit can be sized to provide pass-through rates suitable for most inspection and identification station requirements.

Operating modes include full automatic, remote-hard line, remote-radio, card reader, key switch, local guard push button controls or via master and slave control panel. 

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3