Not for Crash Dummies

We don’t talk much about bollards and barriers, but it’s a part of security that captures my curiosity. Maybe it is just because I like the crash dummies. Part of me hasn’t grown up yet; I like cars.

On my work desk I have quite a collection of diecast cars, including a couple of race cars from the Kentucky Speedway in Sparta, a No. 19 Elliot Sadler Stanley NASCAR, an HSM electronic protection services Aston Martin and 1958 Lincoln. Just to keep all these “toys” in line, I have a 2005 Crown Victoria Texas State Trooper car.

Portable barriers seem like an economical means to provide security at some pretty high-level events. Not so long ago, the city of Pittsburgh welcomed leaders from the world’s most powerful economic nations by hosting the G-8 conference. City officials deployed nearly a dozen 12- and 16-foot mobile deployable vehicle crash barriers.

In this case, the barriers were manufactured by Delta Scientific, and the MP5000s were towed into position and controlled vehicle access within 15 minutes. Roadway excavation was not needed because there is no subsurface preparation.

Crash barriers are pretty handy to have around if you want to stop a vehicle. The barriers deployed in Pittsburgh have a K4 rating, which means they are capable of stopping a 7.5-ton vehicle traveling at 35 miles per hour. A K8 rating will stop the same vehicle traveling at 40 mph.

“From a purchasing standpoint, it can be easier to purchase portable barriers than permanent ones,” said David Dickinson, senior vice president at Delta. “The latter are oftentimes placed into an organization’s real assets budget because they are permanently installed into the ground, becoming part of the property.

“Such budgets often create complex purchasing scenarios. However, purchasing portable barriers is no different than buying a golf cart or new set of wrenches for the maintenance department.”

Mobile deployable vehicle crash barriers are used worldwide. They can be towed into place by a threequarter ton pickup, or as seen in the loose sands of the Middle East, by a military-grade Humvee. Many portable barricades are being used to protect troops from vehicle bomb attacks throughout Afghanistan.

“Both the operation of the barrier as well as deployment and retrieval are push-button controlled,” Dickinson said. “A standard system includes a battery- operated power unit, replenished from either a solar array or local low-voltage source.”

Portable barriers also have become quite popular at stadiums and concert venues on many college and university campuses. As quickly as they can be pulled into place prior to any event, they can easily be removed to preserve the aesthetic nature of the campus once the event has been completed.

Aside from the use of a barrier, security experts also rely on bollards to complement security on campuses and buildings.

With its historical significance and cultural value, there is an abundant amount of foot and vehicle traffic at the Ronald Reagan Presidential Library and Museum in Simi Valley, Calif. Security measures are paramount not only because of the buildings and valuable contents, but this is where the former president is buried.

Security experts at the campus have included not only bollards but a perimeter cabling system used to protect pedestrians, the library and museum grounds. Hundreds of researchers visit Simi Valley every year to access the library’s extensive archival holdings: nearly 50 million pages of documentation, more than 1.5 million photographs and large amounts of film and videotape.

It seems like it would be a difficult task to ensure fence wires stay at a proper height, given the propensity of ground movement in California, but security experts employ the use of a buried anchor or deadman, which with a length of light chain or galvanized wire is attached and buried in the low area. The end of the chain or wire is exposed, aboveground, so it can be tied to the fence wires above. In designing a deadman, cast-off pieces of iron can be used. Almost anything will work if it’s heavy enough. In Simi Valley, concrete is used.

“Cables are placed at 30 inches and 35 inches above ground,” Dickinson said. “The other end of the cables are terminated with ‘thimbled’ ends and attached to the anchor bolts with turnbuckles and jaws.” I suppose with the state of terrorism these days, it should come as no surprise to anyone that such fortifications are necessary.

In College Station, Texas, there sits the 90-acre George H.W. Bush Presidential Library and Museum. Decorative bollards protect the roadways that lead into the campus itself. They are usually kept in the upright position but can be lowered to allow authorized vehicles to pass. Without question, security is important to the facility.

The reason for such tight security is that the library’s collections include 38 million pages of official and personal papers. There are 1 million photographs, 2,500 hours of videotape and 70,000 museum objects. The bollard system protecting the facility allows the bollard to operate individually or in groups up to 10 at a time.

This article originally appeared in the January 2012 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3