Chemically Compliant
- By Ralph C. Jensen
- Jul 16, 2007
U.S. facilities that cater mainly to the chemical industry have always been a priority when it comes to security. Soon after the 9/11 terror attacks, and without waiting for government mandates, some chemical companies formed what is known as the Responsible Care® network, taking the lead in adopting the Responsible Care Security Code. This is an aggressive chemical facility security program.
The chemical industry is not just concerned with its own security, it also takes into consideration chemical transportation systems, the local communities where the plants are located in and the products. In fact, implementation of the Responsible Care Security Code is required of all American Chemistry Council members, as well as Responsible Care partners.
Implementing the security code also means addressing facility, cyber and transportation security in which companies are expected to conduct comprehensive facility security vulnerability assessments, implement security enhancement and obtain independent verification of facility enhancements. This means following a strict timeline that also requires mandatory, periodic progress reports.
On the fifth anniversary of the 9/11 attacks, the American Chemistry Council reported on how far its members had come and what, if any, additional steps needed to be taken for enhanced security.
ACC president and CEO Jack N. Gerard said since 9/11, ACC members took aggressive steps toward further securing their communities, facilities and products against terror attacks.
“After 9/11, our members didn’t wait for an act of Congress. They immediately took up the task of identifying new vulnerabilities and implementing security plans to address them under the Responsible Care Security Code, mandatory for all members,” Gerard said.
Assessing vulnerabilities and implementing new security plans didn’t end last year. A new consortium has been developed, and plans will be announced to unveil an integrated security platform targeted to the current and future needs of U.S. chemical facilities. The consortium is participating in the upcoming Chemical Security Summit, cosponsored by DHS.
The consortium, which ARINC is a member of , is leveraging its experiencing in supplying 10 CFR 73.55 compliant security systems to Nuclear Regulatory Commission licensee facilities for more than 25 years, to the Chemical Industry. ARINC is working with technology partners BroadWare Inc. and Hirsch Electronics to demonstrate a set of integrated, field-proven security technologies for the chemical industry. The consortium—the Open Standards Security Alliance—moves the U.S. chemical facilities security industry toward open standards. The platform includes command and control, intrusion detection, video surveillance, access control and biometric integration.
In the partnership, ARINC provides the command and control platform with its Advanced Information Management (AIM®) system. Video management software comes from BroadWare (who, by the way, was recently acquired by Cisco Systems) and the access control technology comes via Hirsch, resulting in an open-ended security solution for chemical facilities. ARINC plans to deploy an integrated security technology later this year at a U.S. chemical facility.
Here’s how the three companies work hand-in-hand. The AIM platform provides command and control by offering a comprehensive situational awareness graphical display. BroadWare’s media management system allows for an end-to-end solution for viewing, managing and recording continuous IP video streams while optimizing the video network. Hirsch provides its Velocity™ security management system for a site-wide access control and biometric authentication for employees and visitors in all controlled areas.
Frank Koren, business development manager for ARINC, said as security requirements for the chemical industry evolve there likely will be temporary mandates from the Department of Homeland Security to reduce identifiable and evolving threats to the chemical industry. The Nuclear Regulatory Commission did the same thing that affected 10 CFR 73.55.
But here’s the really good part.
“End users who have adopted an open systems approach to security can adopt these changes without the economic burden presented by proprietary platforms,” Koren said.
DHS has stepped up to the plate by sponsoring the Chemical Sector Summit. The summit is organized by the Chemical Sector Coordinating Council, which is designed to bring industry professionals together to discuss implementing the new Chemical Facility Anti-Terrorism Standards. The council also seeks to secure distribution of chemicals and coordinating security programs with local responders.
ARINC has the experience as a well-named integrator and for its work in the chemical and petrochemical industries. According to Koren, while it’s a new vertical market for ARINC, the company has been in the command and control sector for years and is the world leader in transportation communications and systems engineering. ARINC with 3,200 employees worldwide, develops and operates communications and information processing systems and provides systems engineering and integration solutions to five key industries: airports, aviation, defense, government, and surface transportation.
This isn’t about physically hardening a facility. Command and control allows security officers to mitigate potential events. Koren said command and control is about providing real-time information from a variety of sensor systems coupled with surveillance and other tools allowing users to monitor and control the protected area. This is accomplished by integrating technology through layers of security with cameras, biometrics, perimeter protection systems, and remotely operated weapon systems.
Imagine having myriad of tools, such as a number of third-party components, and expecting a useable result. Pulling it all together is a daunting task, but with graphical user interface all the applications become network centric devices. The fact is it works.
A classic example of how the application works was given last year when college student Yechezhel Wells, 21, phoned in a bomb threat at the Long Beach International Airport. It seems Wells was late for his flight from Long Beach, Calif., to Fort Lauderdale, Fla., so naturally he thought this action would buy him time. What he didn’t take into consideration was the fact that the converged network at the airport had sounded an alarm and pinpointed his exact location, at a pay phone, outside the terminal. Surveillance cameras caught him making the call.