Ask the Expert

This month's expert discusses options for protecting a city's water supply

With tens of thousands of public and private water systems operating in the United States, there are many opportunities for foreign or domestic terrorists to contaminate or disrupt the distribution of arguably our most valuable natural resource. Shortly after Sept 11, 2001, federal legislation was passed requiring utilities to assess their potential vulnerabilities to both terrorist attacks and natural disasters and create a plan to handle such emergencies.

ISSUE: What role can electronic security technologies play in protecting reservoirs, treatment facilities, pump stations and pipelines?

SOLUTION: That depends on many factors. For example, one city, Richfield, Minn., a Minneapolis suburb, has created a sophisticated security system using access control, surveillance cameras, wireless communications and other measures to protect the water supply for its 34,000 residents.

Richfield first looked at the entry to its treatment facility. There, stand-alone access control keypads at two exterior doors were replaced with proximity card readers. Readers were added to other areas, such as the loading dock.

Interior doors and hatches were addressed next. Card readers were added to doors to the filtering, pump, fluoride, and other rooms and offices. Roof and well house doors and hatches had position switches installed so they could be monitored via the access control system.

An IP-based camera solution was designed and implemented in the next phase. Exterior pan-tilt-zoom cameras were installed to provide coverage of the well houses, clearwater tanks and dewater building and general coverage of the water treatment buildings and 3-acre grounds. Six IP cameras were added to the 12 analog cameras already in place.

Another dozen IP cameras are planned as the budget permits. The cameras and access system have been integrated with the facility’s Supervisory Control and Data Acquisition management system that monitors the function and performance of critical operations.

ISSUE: How does such a system prevent terrorist attempts?

SOLUTION: One benefit of the system is that the wireless network allows employees to be notified of SCADA alarms and then view the cameras monitoring the gauges while moving about the grounds carrying tablet PCs.

The final phase of the initial project included new fencing and a gate to prevent unauthorized access to the grounds. Card access interface, gate monitoring and communication devices were added to allow staff and vendors to be granted remote access through the gate. Drivers deliver chemicals and other supplies on a regular basis. However, since the drivers change from time to time, it is important to verify who is behind the wheel.

The new system allows a guard in the security control room to see and talk with the driver, while cameras provide a perimeter view of the truck. That way, the guard can feel confident about who he or she allows onto the site while staying a safe distance away.

Access control and surveillance cameras for remote well houses—up to 1/4-mile from the treatment facility— and sharing of access control alarms and video with the city police department are planned for future phases. Police officers already have key fobs that allow them entry to the treatment facility at any time.

Any attack on the water supply could result in many deaths or illnesses, as well as potentially severe economic disruption. Officials in Richfield—and many others across the country—are taking steps to significantly reduce the risk. But it is a critical job that will require cooperation between water and law enforcement officials and the talents of an experienced security system integrator.

READER QUESTION: I am about to oversee a significant expansion and upgrade of the security system for our three-building company. Previously, we have worked with a system integrator that has done a fine job for us. But a law enforcement friend has recommended we begin with a security consultant. Do you think the extra expense is worthwhile?

SOLUTION: Some integrators may be more inclined to choose one product manufacturer over another and may base their opinion on past experiences of reliability and functionality.

A security consultant should have no particular allegiance to a manufacturer and may give a less biased opinion; however, they may lack the experience in dealing with installations to understand which brands produce the best quality equipment.

If the integrator you previously used does not have trained and certified technicians, then it may be wise to invest in a consultant who can give an unbiased, expert opinion on the matter.

However, if you have had experience with an integrator who did a great job and if that installation is working fine and required no additional costs, then a consultant may be unnecessary. Your integrator will be able to identify what system and products will work with your existing system and ensure that there is a seamless transmission when adding buildings to your existing setup.

This article originally appeared in the issue of .

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.