Ask the Expert

This month's expert discusses options for protecting a city's water supply

With tens of thousands of public and private water systems operating in the United States, there are many opportunities for foreign or domestic terrorists to contaminate or disrupt the distribution of arguably our most valuable natural resource. Shortly after Sept 11, 2001, federal legislation was passed requiring utilities to assess their potential vulnerabilities to both terrorist attacks and natural disasters and create a plan to handle such emergencies.

ISSUE: What role can electronic security technologies play in protecting reservoirs, treatment facilities, pump stations and pipelines?

SOLUTION: That depends on many factors. For example, one city, Richfield, Minn., a Minneapolis suburb, has created a sophisticated security system using access control, surveillance cameras, wireless communications and other measures to protect the water supply for its 34,000 residents.

Richfield first looked at the entry to its treatment facility. There, stand-alone access control keypads at two exterior doors were replaced with proximity card readers. Readers were added to other areas, such as the loading dock.

Interior doors and hatches were addressed next. Card readers were added to doors to the filtering, pump, fluoride, and other rooms and offices. Roof and well house doors and hatches had position switches installed so they could be monitored via the access control system.

An IP-based camera solution was designed and implemented in the next phase. Exterior pan-tilt-zoom cameras were installed to provide coverage of the well houses, clearwater tanks and dewater building and general coverage of the water treatment buildings and 3-acre grounds. Six IP cameras were added to the 12 analog cameras already in place.

Another dozen IP cameras are planned as the budget permits. The cameras and access system have been integrated with the facility’s Supervisory Control and Data Acquisition management system that monitors the function and performance of critical operations.

ISSUE: How does such a system prevent terrorist attempts?

SOLUTION: One benefit of the system is that the wireless network allows employees to be notified of SCADA alarms and then view the cameras monitoring the gauges while moving about the grounds carrying tablet PCs.

The final phase of the initial project included new fencing and a gate to prevent unauthorized access to the grounds. Card access interface, gate monitoring and communication devices were added to allow staff and vendors to be granted remote access through the gate. Drivers deliver chemicals and other supplies on a regular basis. However, since the drivers change from time to time, it is important to verify who is behind the wheel.

The new system allows a guard in the security control room to see and talk with the driver, while cameras provide a perimeter view of the truck. That way, the guard can feel confident about who he or she allows onto the site while staying a safe distance away.

Access control and surveillance cameras for remote well houses—up to 1/4-mile from the treatment facility— and sharing of access control alarms and video with the city police department are planned for future phases. Police officers already have key fobs that allow them entry to the treatment facility at any time.

Any attack on the water supply could result in many deaths or illnesses, as well as potentially severe economic disruption. Officials in Richfield—and many others across the country—are taking steps to significantly reduce the risk. But it is a critical job that will require cooperation between water and law enforcement officials and the talents of an experienced security system integrator.

READER QUESTION: I am about to oversee a significant expansion and upgrade of the security system for our three-building company. Previously, we have worked with a system integrator that has done a fine job for us. But a law enforcement friend has recommended we begin with a security consultant. Do you think the extra expense is worthwhile?

SOLUTION: Some integrators may be more inclined to choose one product manufacturer over another and may base their opinion on past experiences of reliability and functionality.

A security consultant should have no particular allegiance to a manufacturer and may give a less biased opinion; however, they may lack the experience in dealing with installations to understand which brands produce the best quality equipment.

If the integrator you previously used does not have trained and certified technicians, then it may be wise to invest in a consultant who can give an unbiased, expert opinion on the matter.

However, if you have had experience with an integrator who did a great job and if that installation is working fine and required no additional costs, then a consultant may be unnecessary. Your integrator will be able to identify what system and products will work with your existing system and ensure that there is a seamless transmission when adding buildings to your existing setup.

This article originally appeared in the issue of .

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3