Editor's Note

When Money Talks, Security Listens

IN early January, the Department of Homeland Security announced it had a whopping $1.7 billion for this fiscal year to be used for grants specifically related to counterterrorism efforts on the state and local level. The same program provides $445 million for the protection of critical infrastructure, including seaports, mass transit systems, chemical and nuclear facilities, passenger rail and highways.

Transportation infrastructure protection has always been a top priority for the current administration, and it should be noted that DHS has taken unprecedented steps to protect critical infrastructure both at the state and local level.

DHS officials have assessed tens of thousands of critical infrastructure sites, and facilities and security plans have been poured over to examine threats, vulnerabilities and potential consequences of attacks. Homeland security experts from DHS, the Coast Guard, TSA and many interagency partners have joined forces with the private sector to assess the sites, work with owners and operators to develop and review security plans, test those plans, then make recommendations to improve protective measures.

One of the most critical veins of security is to issue rail security regulations that would improve upon the protection of rail cargo. The railroad is used to transport tons of volatile chemicals that can have very toxic effects on the population.

I believe TSA looks at the transportation system as a network that includes key pieces, such as aviation, rail, highway, transit, pipeline and ferries, as functioning parts of the network. The United States needs a functioning transportation network with overall security requirements.

As far as rail security is concerned, TSA has divided the topic into three categories: system security, access control and en-route security. System security and access control refer to practices affecting the security of the railroad and its property. En-route security refers to the actual movement and handling of railcars containing hazardous toxic inhalation materials.

While there is no one solution for all locations and circumstances, there are a number of security items that allow for flexibility in implementation based on assessed vulnerability of a particular process or operation. TSA believes the human element will always play a vital role in security, and indeed it will. TSA plans to designate an individual with overall responsibility for hazardous materials transportation security planning. This also includes training and implementation. Another person should be designated with overall responsibility for security planning and countermeasure implementation for company-designed critical infrastructure. Another key ingredient to the mix is to conduct exercises, at least annually, to verify the effectiveness of security plans.

TSA also suggests rail companies establish a liaison with other railroad security offices to promote information sharing and security enhancements; and for rail employees to immediately report to the proper authorities all suspicious people, activities and objects encountered. While there are many valid bullet points, it is imperative that railroads and employees make available emergency response planning materials when requested, and work with local communities to facilitate training and preparation to deploy and respond to an emergency or security incident.

Along the access control side, focus is primarily on community safety and security outreach. It is important to establish trespasser abatement programs adjacent to company-designated critical infrastructure, which helps reduce the likelihood of unauthorized people on company property and to enhance the importance of reporting suspicious activity.

To the extent possible and practical, railroads should implement photo identification procedures to company-designated critical infrastructure, plus implement background checks, and safety and security training for contractor employees with unmonitored access to company-designated critical infrastructure. Another effective security practice is to establish measures to deter unauthorized entry and increase the probability of detection at company-designated critical infrastructures, perhaps to include security patrols of varying patterns and time schedules.

En-route security practices vary, as well, but it would be key to maintain systems to locate rail cars transporting TIH materials in a timely manner to be able to implement security needs when necessary and provide information on the location of cars carrying hazardous materials. Another en-route security measure includes on-ground safety inspections of cars containing TIH materials and inspecting for signs of tampering, sabotage, attached explosives or other suggested items. Railroad employees should be trained to recognize suspicious activity and report security concerns.

While in rail yards, to the extent feasible, place rail cars containing hazardous materials where the most practical protection can be provided against tampering and outside interference when appropriate for the threat level in certain geographic areas. It also is important not to leave rail cars containing hazardous materials in rail yards for extended periods of time.

A terrorist attack on the rails isn’t unconceivable, as shown by bombings in Madrid’s and London’s subways. However, the nation’s railroads, both passenger and freight, need protection, as both are important pieces of the transportation network. State and local governments are primarily responsible for rail security. Nonetheless, through the Surface Transportation Security Inspection Program, TSA has deployed 100 inspectors assigned to 18 field offices nationwide. TSA also has raised the profile of rail security by deploying explosive detection canine teams to key junction points across networks, stations, terminals and other facilities.

Mobile checkpoint equipment also is used by fitting the equipment into two, standard-size shipping containers and rapidly deploying the technology for use in screening and detection at any major system in the country.

This work is not completely accomplished during the course of one year, but is improved upon year after year by learning from experience. Over time, adjustments are made, and if it’s done right and security is actually improving, this should reflect on reduced vulnerability and reduced risk.

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.