Protecting Our Water Supply

Protecting Our Water Supply

Disruptions could shut down businesses, harm economy

Maintaining the security of our nation’s water supplies is serious business. Attacks from a lone vandal to a team of foreign terrorists could, within hours, result in widespread illness or economic disruption.

According to the EPA, there are about 155,000 public water systems providing water for human consumption in the United States. These range in size from privately owned systems, serving dozens of people on a seasonal basis, to huge metropolitan utilities supplying water to millions every day.

As an example, the nation’s largest municipal utility, the Los Angeles Department of Water and Power, serves its customers by annually pumping more than 2 billion gallons of water through a pipeline network of more than 7,000 miles.

WHAT THE EXPERTS SAY

Most government and other experts say with the so-called “dilution solution” it would take massive amounts of a chemical or biological contaminant to threaten consumers of large water systems. Needed quantities of contaminants would be difficult to obtain and even more difficult to introduce into a system without being detected. Yet a few studies by some private and public organizations show readily available pumps and other devices could inject deadly quantities of toxic compounds into our drinking water supplies.

The physical destruction of water system components— disrupting an area’s water supply—is a more likely event than an attempt at contamination. Disruptions could shut down businesses, leave residents without water and hinder firefighting efforts.

So what can the security industry do to help protect water system customers? Phil Lake, president of Austin, Texas-based Knight Security, has worked on major metropolitan water utilities and shared some ideas.

“Most utilities suffer from the same problem facing other organizations – a limited budget for security,” Lake said. “That means we have to carefully plan in order to get the most from the electronic security solutions being deployed.”

Lake said a water utility security plan usually begins the same as one for other facilities—protect the perimeter and work in using layers of security.

“The goal is to stop potential intruders before they get on the property,” he said. “And in the case of a mid-to-large water utility there may be 50 or more separate facilities to protect—water treatment, chemical storage, testing labs, service yards, reservoirs, pump stations, parking lots/garages and office buildings.”

COMMUNICATION IS KEY

Lake said Knight Security typically starts with video intercoms at each vehicular or pedestrian gate. Each unit is connected to the utility’s security command center. Without putting himself at risk, a guard can have a two-way conversation and clearly see the visitor before remotely opening a gate to allow access.

Video intercoms are used at remote buildings which are often unmanned. Intercoms remove the need to have guards onsite or travel to the facility to accommodate visitors. A mobile app helps make guards more efficient while on patrol, allowing them to control the intercom units using smartphones or tablets to communicate with visitors and unlock doors.

Intercoms are also very useful as part of emergency towers placed in parking garages and other remote areas. The stations’ bright blue lights attract distressed visitors and employees who can directly contact security guards with the push of a button.

A water utility will likely have hundreds—maybe thousands—of employees requiring access to one or multiple facilities. That’s where an access control system becomes important. The system can be programmed to allow employees access to only those entries required to complete their jobs. Also, temporary access can be granted when an employee is filling in for a colleague on vacation or sick leave. With both card readers and video intercoms, the utility has an audit trail to see who entered which facilities as well as the date and time. Lake said a number of utility facilities are still protected by key locks. Keys can be easily lost, stolen or copied, and keys provide no audit trails.

“It’s still not unusual for remote sites to be left unlocked throughout the day for the convenience of employees,” he said. “This can be very dangerous if the building stores dangerous chemicals or other potentially harmful or valuable items.”

Lake strongly urged utilities to keep doors locked at all times, with the exception of public entries which must remain open during regular business hours. Employees should use their access cards to enter appropriate gates and/or doors.

KEEP OUT!

Safety and liability are two other issues facing water utilities. Reservoirs, pumping stations and other remote areas can attract children looking for places to play. Fencing and gates (with electronic locks) are a good way to deter access. Again, gate-mounted video intercoms or card readers provide access for those requiring it. Some utilities are still using padlocks to secure gates. Lake said these can often be defeated.

Sensors strategically placed on fences will alarm the command center if anyone tries to climb the fence. Motion detectors can create virtual barriers around open areas. Intrusion systems are ideal for protecting buildings.

High-resolution video surveillance cameras provide live and recorded video of remote entry points, building perimeters and internal offices. For outdoor use, such as outbuildings, reservoirs and perimeters, Lake recommends the use of thermal cameras to capture the movement of people at night. Also, wireless IP-based cameras can eliminate the need for expensive cable runs to remote areas.

Cameras are useful to monitor gauges and instruments as part of a utility’s Supervisory Control and Data Acquisition (SCADA) management system. SCADA systems are installed at critical operational sites allowing utility personnel to monitor water pressure, equipment temperatures and other factors to detect potential problems before they become dangerous. Mobile apps allow guards to monitor live and recorded video—including views of SCADA instruments— as they move about the grounds.

Monitoring alarms and controlling many disparate security systems can become overwhelming for any security team. Lake said he always recommends the installation of a security management system capable of providing an integrated single-platform view of data from cameras, intercoms, access control and intrusion panels. Some systems are also capable of controlling building systems such as lighting and HVAC.

MONITORING HEALTH

Also, a wall of monitors displaying video from all cameras can be overwhelming for a single or group of guards. Video analytics can alert guards to any number of user-defined events.

based security plan developed by Knight Security is a system health monitoring program. Technology allows the integrator to identify system issues—often before a system fails—and prevent major problems such as: • Hard dive and CPU failures • UPS and battery failures • IP switch malfunctions • Power supply loss • Network communications loss • Camera outages • Access control downtime

“We don’t want to wait for a utility to experience a problem before we’re called,” he said. “We initiate about half of the service activity on the systems we monitor. That’s why we continue to invest heavily in technology to improve our system health monitoring capabilities. The systems we install need to work as intended. In securing our water supplies, there are no second chances.”

In addition to security, a fully functioning system can increase employee productivity and safety compliance, Lake said.

Cyber security is also a concern for any utility. Lake said his team leaves the cyber protection of internal systems to the utility’s own IT department. However, it is his group’s responsibility to safeguard cameras, intercoms, access systems and other security equipment from hackers.

That, Lake said, involves making sure factory-default passwords have been changed and any system firewalls are working and active. Knight Security also advocates changing passwords on a regular, and frequent, basis.

SECURITY ONLINE

A 2016 report from Verizon Enterprise Solutions reported a close call highlighting the need for utilities to maintain their computer operating systems. A foreign group breached a U.K.-based water utility’s outdated system, taking control of the SCADA platform and altering the amount of chemicals used to treat drinking water. Fortunately, utility officials were able to quickly identify and reverse the chemical flow, minimizing any serious impact on customers.

Another valuable suggestion is training not only the security staff, but all employees to be on the lookout for suspicious people and activities. The public can also be asked through their utility bills to provide information about any unusual activity around neighborhood water lines.

Some utilities also choose to have their alarms register with the local law enforcement and fire departments in order to reduce response times to potentially dangerous situations. Also, many water utilities regularly invite first responders to visit the facilities to be aware of vulnerable points and where they are located.

Operators of public and private water utilities have no choice but to do their best to protect the public from attacks on a critically vital service. In order to stretch limited budgets, it’s wise to conduct regular security assessments. These identify security strengths and weaknesses and help decision makers spend their money on those systems providing the highest degree of protection and the best return on investment. Security assessments are best conducted by an experienced outside expert.

As long as we have state-sponsored terrorists and even local vandals, our water supplies will offer a tempting target. Just because attacks on water utilities have been rare, we must continue to protect our water supplies to the best of our abilities.

This article originally appeared in the January 2017 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3