Editor's Note

Chemical Security Is An Issue

THE American Chemistry Council took a bold step forward in March by acknowledging that chemical plants security should be paramount not only in the security industry, but also among plant operators in the chemical industry. The facts are that the private sector owns and operates most of the nation's chemical infrastructure.

At the National Chemical Security Forum, held in Washington, D.C., in March, Homeland Security Secretary Michael Chertoff said that security at chemical plants is part of a larger effort now underway to ensure that the nation is generally raising security in all the elements of significant infrastructure.

Because the vast majority of chemical plants are privately owned, the notion that the federal government can own and operate all the security for all this infrastructure is misguided. What needs to happen is raising security in a way that it doesn't hamper the businesses the government is trying to protect.

What the government and the chemical industry want to do is protect this industry against being exploited by terrorists.

The history of al Qaeda is simple. Its goal is to leverage our own technology against ourselves. In other words, there is nothing they would like more than to use our own chemicals and our own products as a means of exploding devices against us.

According to Chertoff, many large chemical companies in this country have taken steps to ensure that they are elevating their own security, though not all chemical companies have done that. And the industry, in fact the whole country, is hostage to those few who do not undertake the responsibility that they have to make sure security is at an appropriate level.

Legislation on chemical infrastructure has been offered in the last three congressional sessions. So far, nothing has generated enough support to successfully push the legislation through. That means responsibility is squarely placed on the shoulders of private industry to elevate their own security measures. And, the government's role in this is to make sure that level of security is raised sufficiently to protect our citizens and to make sure that those who have put a responsible investment in are able to reap the benefits of that security investment.

On a recent visit to Louisiana, I toured Honeywell's Specialty Materials Chemical Plant in Geismar. At this plant, security and plant automation are foremost on the minds of employees.

A Major Investment
Honeywell's industrial plant in Geismar was challenged to provide a comprehensive security strategy for the facility. What they came up with is a state-of-the-art security and process control system where one works instantly with the other. In other words, when security officials are alerted that there is a breach, the process side of the facility knows at the same time, and proper measures can be taken instantly.

Rather than an afterthought, the Geismar plant employs a comprehensive strategy that seamlessly integrates the physical, electronic and cyber layers of security with building automation, security and process control systems by sharing real-time information.

Because the Geismar plant is on the Mississippi River, company officials have employed a "beyond the perimeter" surveillance systems, including radar tracking of vessels. The chemical plant can be vulnerable to an attack, but radar keeps an open eye, even when clouds or fog diminish river visibility.

The Real Issue
The real situation at the Geismar plant is chemicals. Layered strategy weaves security and protection into its pattern, but compromising the security here can affect hundreds and thousands of people. The escape of a product from the chemical plant, whether it be accidental or via terrorism, can spell trouble for Baton Rouge, La., residents. The plant manufactures refrigerants and blowing agents and is the largest production site for hydrofluoric acid in the United States.

Honeywell must implement a security plan consistent with the Coast Guard. Company officials exceeded that and began to initiate the upgrades. Honeywell spent about $3 million, some of it grant money from the Department of Homeland Security, to secure the facility. This also means that facility managers meet the regulations of the American Chemistry Council by implementing buffer-zone protection, upgraded security and a layered approach from the outside perimeter to one of three facility control rooms.

Plant manager Bill Lessig said it best, the "integration of process control security provides risk reduction and greater safety preparedness."

Safety is Part of the Picture
Implementing the practice of industrial safety is key to security. Employees are issued smart cards for mustering in the event of a security or process control breach. It also means security personnel and plant operators know exactly where each employee is, or at least, can be accounted for. It lets them track movements of employees so they can be found by first responders, who can be directed to the exact location, and find those who need help immediately.

Part of safety is plant management. If there is an intrusion or a reason to shut the plant down, it can be completed in minutes. Security and safety are part of the power of Honeywell.

The Geismar Solution
Honeywell put itself in a unique position by installing a best-in-class security solution. It owns its own chemical plants and understands the importance of security at these facilities.

The Geismar facility is the first of its kind. The defense seamlessly integrates physical, electronic and cyber layers of security with building automation, security and process control systems. This facility is a model for how industrial security can be put into practice, even during times of potential terror.

The reality is this: Seamless integration of multiple technologies can help properly secure an industrial site. Candid comments from Honeywell leadership prove that it's possible to integrate security with process control, building management and human resources for greater efficiency, safety and plant reliability.

We don't need to wait for a threat to become reality to understand the consequences of an attack. Public health and economic vitality are at the heart of security planning and implementation. What the government needs to do now is reward those who have already taken steps on a voluntary basis.

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.