30 likes | 53 Views
What Is Hostile Vehicle Mitigation
E N D
What Is Hostile Vehicle Mitigation? Hostile Car Mitigation (HVM) is a term used to describe actions taken to reduce the threat posed by terrorist vehicle explosives, especially when protecting key infrastructure facilities like airports, retail malls, train stations, and public spaces from assault. It is a protective security discipline that focuses on lowering the dangers connected to terrorist and criminal threats that are transported by vehicles. Vehicle borne threats can be vandalism to the property to sophisticated or aggressive attack by terrorists or determined criminals. Vehicles (such as cars, vans and Lorries) are widely available and terrorists have previously gained access to them through a number of means: improvised explosive device used in vehicles (VBIED), Weaponization of vehicles (VAW), Vehicle delivering attackers and/or weapons in a layered attack. Goal of hostile vehicle mitigation strategies Protection against potential vehicle threats is provided by hostile vehicle mitigationmeasures. Around congested public spaces or important national infrastructure locations like government buildings, data centres, or power plants, these measures are frequently used. Vehicle Borne Improvised Explosive Devices (VBIED) and Vehicle as a Weapon are the two main categories of vehicle threats that HVM solutions are employed to protect against (VAW). As you'll see, due to what appears to be an evolution in attacker approach, the focus has recently switched from being only on stopping VBIED attacks to defending against the rising VAW threat. Both dangers must still be taken into account. Types of vehicle borne attacks The seven primary vehicle-borne attack types that need to be guarded against are listed below: 1.Parked- An improvised explosive device (IED)-carrying vehicle is left close to a target that it is intended to attack. It's possible that this car is parked in a totally legal manner to avoid suspicion. The car could potentially be illegally parked or abandoned. Two parked cars in London
were found to have improvised explosive devices in 2007, but fortunately, they were disarmed before they went off. This is an example of a threat of this nature. 2.Encroachment: A vehicle is used to take advantage of security flaws in a site's perimeter. This could happen if security protocols have not been properly developed or implemented, or if an attacker has insider knowledge that can be used against them. Threats like encroachment can also involve interfering with or degrading a security system in order to obtain access later. 3.Penetrative: This refers to the use of a vehicle as a tool to breach or undermine a structure or physical boundary. Typically, criminals have conducted ram-raid attacks of this nature; nevertheless, terrorists have also done so. During HVMan IED that will be set off within the vehicle, next to a physical target, or close to a busy area is another possibility. A terrible example of one of these attacks was the one that occurred at the British Consulate in Istanbul, Turkey. 4.Deception: Often referred to as a "Trojan" vehicle, a hostile vehicle may have been modified to look like a genuine vehicle, possibly covered in livery specific to the location. The occupants might have also obtained or copied a valid ID, among other methods of deceit, to get beyond an access check point. A building or an area could be the target of an IED the vehicle is carrying. 5.Duress: Under duress, a guard or employee may be forced to let a hostile vehicle approach, or a driver may be compelled to deliver and park a VBIED close to a target that is in danger. 6.Insider: A person with authorised access who helps to enable a security breach or attack by allowing an attacker to get past defences. This can also entail interfering with a security feature to let an intruder inside. 7.Tamper/Sabotage: Facilitating a hostile vehicle attack by tampering with or undermining a security feature or barrier in advance of a deliberate attack to enable or facilitate access. Tampering with the goal of eradicating all traces and averting suspicions before an assault is carried out.
Products for access control can be automatic or manually operated. These can come in a variety of different types, such as beam barriers, swing gates and manual arm barriers made up of sustainable construction materialsto name just a few, each with its own benefits and ideal applications. Through the DASA Take Cover! Initiative, we have been specifically collaborating to create solutions with the UK Ministry of Defense and DSTL, producing specific QUICKBLOCK solutions for swiftly deployed force protection.