Quantcast Section 6: Vehicle Barrier Requirements

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search

General. Vehicles loaded with explosives can inflict severe damage on critical military
facilities, potentially injuring large numbers of DOD personnel. Vehicles are effective because they
are an expedient method for transporting large quantities of explosives to any convenient location.
The primary factor to consider when defending against this threat is the barrier penetration
capabilities of the vehicle. Once the standoff distance for a structure has been established (based on
the amount of explosives and acceptable damage and injury levels described in Appendix D), a
threat vehicle should not be allowed to get close to the structure where a greater level of damage
could occur.
The gross weight of a vehicle (vehicle weight plus the weight of explosives or any other
cargo) and its maximum attainable speed at the point of impact produces kinetic energy that must be
absorbed by the perimeter barrier to effectively stop the vehicle from getting close to the intended
target. Therefore, kinetic energy can be used as the primary basis for establishing performance
requirements for vehicle barriers.
Site Survey. The vehicle barrier selection and design process must always begin with a
site survey. To accomplish this phase, a scaled map of the protected area must be prepared. The
map should include the relative locations, major dimensions and descriptions of buildings and
structures, roads, terrain and landscaping, existing security features, and property perimeter. It must
also show features outside the perimeter that could be used to slow vehicle speed, prevent access to
the perimeter barrier, or shield the structure from damage, if an explosion occurred. Based on this
map, similar to Figure 3, distances and topographical features between the perimeter and the facility
can be carefully analyzed and the required levels of protection along the perimeter and security
deficiencies, if any, can be identified.
As shown in Figure 3, the individual segments of the perimeter can be attacked from a
variety of paths. For example, for Building 827 with a controlled area on two sides of the perimeter,
the two remaining sides (Perimeter Roads "A" and "B") are vulnerable to a vehicle attack. Two
connecting streets (Entrance Road and the extension of Perimeter Road "B"), each a potential attack
path, are perpendicular and lead directly to the compound boundary. Certain segments of the
perimeter can be attacked from more than one street. In addition, for Perimeter Roads "A" and "B",
running parallel to the perimeter, there are an infinite number of impact points and angles depending
upon vehicle location and speed. As a result, a large number of potential impact conditions (the
combination of vehicle speed and impact angles) can occur at any point along the perimeter


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.