Editor's Note

Chemical Security Is An Issue

THE American Chemistry Council took a bold step forward in March by acknowledging that chemical plants security should be paramount not only in the security industry, but also among plant operators in the chemical industry. The facts are that the private sector owns and operates most of the nation's chemical infrastructure.

At the National Chemical Security Forum, held in Washington, D.C., in March, Homeland Security Secretary Michael Chertoff said that security at chemical plants is part of a larger effort now underway to ensure that the nation is generally raising security in all the elements of significant infrastructure.

Because the vast majority of chemical plants are privately owned, the notion that the federal government can own and operate all the security for all this infrastructure is misguided. What needs to happen is raising security in a way that it doesn't hamper the businesses the government is trying to protect.

What the government and the chemical industry want to do is protect this industry against being exploited by terrorists.

The history of al Qaeda is simple. Its goal is to leverage our own technology against ourselves. In other words, there is nothing they would like more than to use our own chemicals and our own products as a means of exploding devices against us.

According to Chertoff, many large chemical companies in this country have taken steps to ensure that they are elevating their own security, though not all chemical companies have done that. And the industry, in fact the whole country, is hostage to those few who do not undertake the responsibility that they have to make sure security is at an appropriate level.

Legislation on chemical infrastructure has been offered in the last three congressional sessions. So far, nothing has generated enough support to successfully push the legislation through. That means responsibility is squarely placed on the shoulders of private industry to elevate their own security measures. And, the government's role in this is to make sure that level of security is raised sufficiently to protect our citizens and to make sure that those who have put a responsible investment in are able to reap the benefits of that security investment.

On a recent visit to Louisiana, I toured Honeywell's Specialty Materials Chemical Plant in Geismar. At this plant, security and plant automation are foremost on the minds of employees.

A Major Investment
Honeywell's industrial plant in Geismar was challenged to provide a comprehensive security strategy for the facility. What they came up with is a state-of-the-art security and process control system where one works instantly with the other. In other words, when security officials are alerted that there is a breach, the process side of the facility knows at the same time, and proper measures can be taken instantly.

Rather than an afterthought, the Geismar plant employs a comprehensive strategy that seamlessly integrates the physical, electronic and cyber layers of security with building automation, security and process control systems by sharing real-time information.

Because the Geismar plant is on the Mississippi River, company officials have employed a "beyond the perimeter" surveillance systems, including radar tracking of vessels. The chemical plant can be vulnerable to an attack, but radar keeps an open eye, even when clouds or fog diminish river visibility.

The Real Issue
The real situation at the Geismar plant is chemicals. Layered strategy weaves security and protection into its pattern, but compromising the security here can affect hundreds and thousands of people. The escape of a product from the chemical plant, whether it be accidental or via terrorism, can spell trouble for Baton Rouge, La., residents. The plant manufactures refrigerants and blowing agents and is the largest production site for hydrofluoric acid in the United States.

Honeywell must implement a security plan consistent with the Coast Guard. Company officials exceeded that and began to initiate the upgrades. Honeywell spent about $3 million, some of it grant money from the Department of Homeland Security, to secure the facility. This also means that facility managers meet the regulations of the American Chemistry Council by implementing buffer-zone protection, upgraded security and a layered approach from the outside perimeter to one of three facility control rooms.

Plant manager Bill Lessig said it best, the "integration of process control security provides risk reduction and greater safety preparedness."

Safety is Part of the Picture
Implementing the practice of industrial safety is key to security. Employees are issued smart cards for mustering in the event of a security or process control breach. It also means security personnel and plant operators know exactly where each employee is, or at least, can be accounted for. It lets them track movements of employees so they can be found by first responders, who can be directed to the exact location, and find those who need help immediately.

Part of safety is plant management. If there is an intrusion or a reason to shut the plant down, it can be completed in minutes. Security and safety are part of the power of Honeywell.

The Geismar Solution
Honeywell put itself in a unique position by installing a best-in-class security solution. It owns its own chemical plants and understands the importance of security at these facilities.

The Geismar facility is the first of its kind. The defense seamlessly integrates physical, electronic and cyber layers of security with building automation, security and process control systems. This facility is a model for how industrial security can be put into practice, even during times of potential terror.

The reality is this: Seamless integration of multiple technologies can help properly secure an industrial site. Candid comments from Honeywell leadership prove that it's possible to integrate security with process control, building management and human resources for greater efficiency, safety and plant reliability.

We don't need to wait for a threat to become reality to understand the consequences of an attack. Public health and economic vitality are at the heart of security planning and implementation. What the government needs to do now is reward those who have already taken steps on a voluntary basis.

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.