Critical Infrastructures Built to Withstand Almost Anything

In an ideal world, every tunnel, train terminal, and critical building would be built like a fortress to withstand any emergency. But in the real world, construction costs matter and engineers "build to code." While Americans can take comfort that their critical infrastructure meets minimum codes for safety, when terror—or nature—hits especially hard, minimum codes provide minimal comfort.

Now, thanks to researchers at DHS S&T, communities can fortify today's critical structures—and design tomorrow's—to absorb blows and remain open if assaulted by extreme earth, wind, water, fire, or man.

A new publication series, aimed at engineers, architects, building owners, city planners, and emergency managers, makes available years of government, industry, and academic research on designs and materials to make buildings and tunnels terror-resistant and terror-resilient. The Building and Infrastructure Protection Series (BIPS) provides architects and engineers a set of aids for designing critical infrastructure to withstand all kinds of hazards…at a cost that won't break the budget.

"This series lays the foundation for designing a new generation of resilient buildings," says Mila Kennett, who oversees the series in S&T's Infrastructure Protection and Disaster Management Division, where she leads the Structural Resilience Branch. An architect by training, Kennett came from the Federal Emergency Management Agency (FEMA), where she edited a similar publication series after 9/11. Several of the BIPS guides expand upon and update her highly regarded FEMA guides.

The BIPS series comprises seven documents, four software applications, one website, and one training course:

  • Aging of Infrastructure: Issues Research and Technology (BIPS 01) makes available the proceedings from the Directorate's Aging Infrastructure Workshop, which focused on transportation.
  • Integrated Rapid Visual Screening (IRVS) software lets an inspector use a guided checklist on an iPad to quickly see how well a tunnel (BIPS 03), train station (BIPS 02), or building (BIPS 04) can withstand various assaults from nature or man. The findings can be used by police, emergency managers, facility managers, engineers, and architects as they size up and mitigate broader risks.
  • IRVS for Mass Transit Stations (BIPS 02) lets an inspector quickly weigh the risk and resilience of a terminal used for trains or buses.
  • IRVS for Tunnels (BIPS 03) lets an inspector quickly weigh the risk and resilience of a tunnel.
  • IRVS for Buildings (BIPS 04) lets an inspector quickly weigh the risk and resilience of a building. Restricted to law enforcers and other credentialed users, the software classifies the building into one of 15 types, scoring its resilience against 20 hazards.
  • Preventing Structures from Collapsing to Limit Damage to Adjacent Structures and Additional Loss of Life when Explosives Devices Impact Highly Populated Urban Centers (BIPS 05) documents the research and development that S&T conducted to develop BIPS 06.
  • Primer on Blast Load Effects in Urban Canyons: The Urban Blast Tool, or UBT (BIPS 06) is software that can quickly calculate how a bomb blast's shockwave changes strength and course as it ripples through a cluttered cityscape. The software reveals the odds that the wave will cause a specific building to collapse. It also evaluates the odds that the wave will damage building equipment needed to carry out emergency evacuation, rescue, and recovery. Designed to model the effects of a bomb blast in the Manhattan Financial District, the software was deployed there in 2011. Future UBTs will do the same for other major metropolitan business districts. SEE THE RELEASE IN NEWSISE HERE.
  • Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings (BIPS 07) refreshes FEMA 426, Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings. The manual identifies new ways to blunt the damage and limit casualties from various attacks. It also offers a new way to understand infrastructure resiliency and assess risk.
  • Primer to Design Safe School Projects in Case of Terrorist Attacks and School Shootings (BIPS 08) updates FEMA 428, Primer to Design Safe School Projects in Case of Terrorist Attacks. The primer provides school designers and administrators a set of guidelines to design a school where children, faculty and staff will be safe during a physical attack or targeted shooting.
  • The Building Design for Homeland Security Training Course (BIPS 09) teaches architects, engineers, building owners, and law enforcers how to identify and weigh the risks posed by a wide range of manmade threats. During the course, participants practice ways to mitigate a range of hazards.
  • High Performance Based Design for the Building Enclosure (BIPS 10) is a report that gives building owners, developers, and designers a standard way to evaluate the payoff from making key building attributes more resilient, energy-efficient, durable, and sustainable. A supporting application, the Owner's Performance Requirements Tool, or OPR, can be used online at http://www.oprtool.org. Eventually, the OPR will cover the key whole-building systems and other types of building.

The BIPS software applications and OPR website will be demonstrated Feb. 8 in an S&T webinar: Cutting Edge Risk and Resiliency Tools.

Launched over the last three years, the BIPS books, applications, and training course have been embraced by the Transportation Security Administration, other federal agencies, the New York City Police Department, state and local governments, and the private sector.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3