Editor's Note

When Money Talks, Security Listens

IN early January, the Department of Homeland Security announced it had a whopping $1.7 billion for this fiscal year to be used for grants specifically related to counterterrorism efforts on the state and local level. The same program provides $445 million for the protection of critical infrastructure, including seaports, mass transit systems, chemical and nuclear facilities, passenger rail and highways.

Transportation infrastructure protection has always been a top priority for the current administration, and it should be noted that DHS has taken unprecedented steps to protect critical infrastructure both at the state and local level.

DHS officials have assessed tens of thousands of critical infrastructure sites, and facilities and security plans have been poured over to examine threats, vulnerabilities and potential consequences of attacks. Homeland security experts from DHS, the Coast Guard, TSA and many interagency partners have joined forces with the private sector to assess the sites, work with owners and operators to develop and review security plans, test those plans, then make recommendations to improve protective measures.

One of the most critical veins of security is to issue rail security regulations that would improve upon the protection of rail cargo. The railroad is used to transport tons of volatile chemicals that can have very toxic effects on the population.

I believe TSA looks at the transportation system as a network that includes key pieces, such as aviation, rail, highway, transit, pipeline and ferries, as functioning parts of the network. The United States needs a functioning transportation network with overall security requirements.

As far as rail security is concerned, TSA has divided the topic into three categories: system security, access control and en-route security. System security and access control refer to practices affecting the security of the railroad and its property. En-route security refers to the actual movement and handling of railcars containing hazardous toxic inhalation materials.

While there is no one solution for all locations and circumstances, there are a number of security items that allow for flexibility in implementation based on assessed vulnerability of a particular process or operation. TSA believes the human element will always play a vital role in security, and indeed it will. TSA plans to designate an individual with overall responsibility for hazardous materials transportation security planning. This also includes training and implementation. Another person should be designated with overall responsibility for security planning and countermeasure implementation for company-designed critical infrastructure. Another key ingredient to the mix is to conduct exercises, at least annually, to verify the effectiveness of security plans.

TSA also suggests rail companies establish a liaison with other railroad security offices to promote information sharing and security enhancements; and for rail employees to immediately report to the proper authorities all suspicious people, activities and objects encountered. While there are many valid bullet points, it is imperative that railroads and employees make available emergency response planning materials when requested, and work with local communities to facilitate training and preparation to deploy and respond to an emergency or security incident.

Along the access control side, focus is primarily on community safety and security outreach. It is important to establish trespasser abatement programs adjacent to company-designated critical infrastructure, which helps reduce the likelihood of unauthorized people on company property and to enhance the importance of reporting suspicious activity.

To the extent possible and practical, railroads should implement photo identification procedures to company-designated critical infrastructure, plus implement background checks, and safety and security training for contractor employees with unmonitored access to company-designated critical infrastructure. Another effective security practice is to establish measures to deter unauthorized entry and increase the probability of detection at company-designated critical infrastructures, perhaps to include security patrols of varying patterns and time schedules.

En-route security practices vary, as well, but it would be key to maintain systems to locate rail cars transporting TIH materials in a timely manner to be able to implement security needs when necessary and provide information on the location of cars carrying hazardous materials. Another en-route security measure includes on-ground safety inspections of cars containing TIH materials and inspecting for signs of tampering, sabotage, attached explosives or other suggested items. Railroad employees should be trained to recognize suspicious activity and report security concerns.

While in rail yards, to the extent feasible, place rail cars containing hazardous materials where the most practical protection can be provided against tampering and outside interference when appropriate for the threat level in certain geographic areas. It also is important not to leave rail cars containing hazardous materials in rail yards for extended periods of time.

A terrorist attack on the rails isn’t unconceivable, as shown by bombings in Madrid’s and London’s subways. However, the nation’s railroads, both passenger and freight, need protection, as both are important pieces of the transportation network. State and local governments are primarily responsible for rail security. Nonetheless, through the Surface Transportation Security Inspection Program, TSA has deployed 100 inspectors assigned to 18 field offices nationwide. TSA also has raised the profile of rail security by deploying explosive detection canine teams to key junction points across networks, stations, terminals and other facilities.

Mobile checkpoint equipment also is used by fitting the equipment into two, standard-size shipping containers and rapidly deploying the technology for use in screening and detection at any major system in the country.

This work is not completely accomplished during the course of one year, but is improved upon year after year by learning from experience. Over time, adjustments are made, and if it’s done right and security is actually improving, this should reflect on reduced vulnerability and reduced risk.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.