Editor's Note

When Money Talks, Security Listens

IN early January, the Department of Homeland Security announced it had a whopping $1.7 billion for this fiscal year to be used for grants specifically related to counterterrorism efforts on the state and local level. The same program provides $445 million for the protection of critical infrastructure, including seaports, mass transit systems, chemical and nuclear facilities, passenger rail and highways.

Transportation infrastructure protection has always been a top priority for the current administration, and it should be noted that DHS has taken unprecedented steps to protect critical infrastructure both at the state and local level.

DHS officials have assessed tens of thousands of critical infrastructure sites, and facilities and security plans have been poured over to examine threats, vulnerabilities and potential consequences of attacks. Homeland security experts from DHS, the Coast Guard, TSA and many interagency partners have joined forces with the private sector to assess the sites, work with owners and operators to develop and review security plans, test those plans, then make recommendations to improve protective measures.

One of the most critical veins of security is to issue rail security regulations that would improve upon the protection of rail cargo. The railroad is used to transport tons of volatile chemicals that can have very toxic effects on the population.

I believe TSA looks at the transportation system as a network that includes key pieces, such as aviation, rail, highway, transit, pipeline and ferries, as functioning parts of the network. The United States needs a functioning transportation network with overall security requirements.

As far as rail security is concerned, TSA has divided the topic into three categories: system security, access control and en-route security. System security and access control refer to practices affecting the security of the railroad and its property. En-route security refers to the actual movement and handling of railcars containing hazardous toxic inhalation materials.

While there is no one solution for all locations and circumstances, there are a number of security items that allow for flexibility in implementation based on assessed vulnerability of a particular process or operation. TSA believes the human element will always play a vital role in security, and indeed it will. TSA plans to designate an individual with overall responsibility for hazardous materials transportation security planning. This also includes training and implementation. Another person should be designated with overall responsibility for security planning and countermeasure implementation for company-designed critical infrastructure. Another key ingredient to the mix is to conduct exercises, at least annually, to verify the effectiveness of security plans.

TSA also suggests rail companies establish a liaison with other railroad security offices to promote information sharing and security enhancements; and for rail employees to immediately report to the proper authorities all suspicious people, activities and objects encountered. While there are many valid bullet points, it is imperative that railroads and employees make available emergency response planning materials when requested, and work with local communities to facilitate training and preparation to deploy and respond to an emergency or security incident.

Along the access control side, focus is primarily on community safety and security outreach. It is important to establish trespasser abatement programs adjacent to company-designated critical infrastructure, which helps reduce the likelihood of unauthorized people on company property and to enhance the importance of reporting suspicious activity.

To the extent possible and practical, railroads should implement photo identification procedures to company-designated critical infrastructure, plus implement background checks, and safety and security training for contractor employees with unmonitored access to company-designated critical infrastructure. Another effective security practice is to establish measures to deter unauthorized entry and increase the probability of detection at company-designated critical infrastructures, perhaps to include security patrols of varying patterns and time schedules.

En-route security practices vary, as well, but it would be key to maintain systems to locate rail cars transporting TIH materials in a timely manner to be able to implement security needs when necessary and provide information on the location of cars carrying hazardous materials. Another en-route security measure includes on-ground safety inspections of cars containing TIH materials and inspecting for signs of tampering, sabotage, attached explosives or other suggested items. Railroad employees should be trained to recognize suspicious activity and report security concerns.

While in rail yards, to the extent feasible, place rail cars containing hazardous materials where the most practical protection can be provided against tampering and outside interference when appropriate for the threat level in certain geographic areas. It also is important not to leave rail cars containing hazardous materials in rail yards for extended periods of time.

A terrorist attack on the rails isn’t unconceivable, as shown by bombings in Madrid’s and London’s subways. However, the nation’s railroads, both passenger and freight, need protection, as both are important pieces of the transportation network. State and local governments are primarily responsible for rail security. Nonetheless, through the Surface Transportation Security Inspection Program, TSA has deployed 100 inspectors assigned to 18 field offices nationwide. TSA also has raised the profile of rail security by deploying explosive detection canine teams to key junction points across networks, stations, terminals and other facilities.

Mobile checkpoint equipment also is used by fitting the equipment into two, standard-size shipping containers and rapidly deploying the technology for use in screening and detection at any major system in the country.

This work is not completely accomplished during the course of one year, but is improved upon year after year by learning from experience. Over time, adjustments are made, and if it’s done right and security is actually improving, this should reflect on reduced vulnerability and reduced risk.

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.