Intelligent Outdoor Video For CFATS Chemical Facilities

Facilities that manufacture, store or transport dangerous chemicals operate in a challenging environment with expanding regulatory compliance and security costs.  Automated surveillance systems designed specifically for protecting large outdoor areas are now available to help address Chemical Facility Anti-Terrorism Standards (CFATS) regulations while also lowering the associated costs.

While CFATS regulations do not prescribe specific technologies they do provide Risk-Based Performance Standards to assist chemical facilities in selecting and implementing appropriate protective measures to reduce vulnerability and manage risk.  Best practices are now emerging to help implement the appropriate technologies to defend against the unauthorized release, theft, or sabotage of Chemicals of Interest.  

The Role of Intelligent Video

Speed is paramount when thwarting an intruder who seeks to compromise operations. The CFATS Risk-Based Performance Standards specifically call for creating sufficient time between detection of an attack and preventing danger to site assets. In this model, early and accurate detection is critical to maintain a high level of vigilance. Various technologies exist that can provide early detection around the perimeter but knowing the size, location and nature of an event as it unfolds is key to mobilizing an effective response.

Of all the automated detection technologies (fence sensors, fiber optics, seismic sensors, etc.) only video provides the intrinsic detail to display and record the “what and where” of an alert without need for additional verification systems. Intelligent video when designed for the outdoors can detect and evaluate the presence of unauthorized persons over buffer zones and large perimeters to provide early warning and actionable data.   

Until recently, there has been disappointment among customers applying intelligent video to outdoor applications due to the nuisance alarms associated with widely varying environment of lighting, wind, reflection, and weather. The number of nuisance alarms can be so overwhelming that security teams ultimately disregard the alerts, diluting the functionality of the security system.

With the innovation of cameras with substantially more on-board image processing, intelligent video systems are now available to accurately detect the presence of unauthorized persons over site perimeters and outdoor areas.

These smart cameras are designed to filter the effects of environmental elements and provide detection over large areas, regardless of wind, weather or the movement of small animals, trees or blowing trash. When security operations receive accurate information they will mount an appropriate response to the nature of the alert. Such a system yields the necessary “security awareness” around the perimeter and internal site assets to meet these CFATS requirements.
 
Achieving security awareness is dependent on knowing the precise location and nature of an intrusion. For this reason, intelligent video cameras can be designed to employ GPS-based analytics that determine the size, speed and bearing of detected objects according to their precise location. This information can be used to superimpose the location of detected targets onto a site map of the facility for real-time, coordinated response. The same GPS information can also be used to steer PTZ cameras to zoom and follow detected objects for close-up identification once the intrusion has been detected. CFATS also requires that systems monitor their health and provide alerts should they cease to function, a capability that should be built into any security system that requires systemic accountability.
 
Intelligent video cameras are an economical solution as well. The same image processing that gives smart cameras their outdoor detection accuracy also gives them extended range. Some cameras can automatically detect human-sized objects at distances that exceed 600 meters. As a result, infrastructure requirements (poles, communications and power) can be greatly reduced, lowering overall project costs substantially. The dependability of an intelligent video-based system designed for a high degree of accuracy in the outdoors also helps strengthen the effectiveness of existing manpower.

Protecting Internal Assets

In addition to perimeter security, intelligent video surveillance of outdoor areas is a valuable tool related to other CFATS Risk-Based Performance Standards. These include screening and monitoring restricted areas where chemicals of interest are manufactured, stored or used, deterring insider sabotage, and dealing with specific threats, vulnerabilities or risks.

For example, intelligent video can play an important role in protecting internal assets, which often do not have the same types of physical or man-made boundaries found around the perimeter. In most cases, adding additional infrastructure around chemical storage tanks would be costly and likely impede the flow of business operations. In this case intelligent video can be used to create a surveillance “buffer zone” around areas of special concern to control access to volatile areas based on time of day or other criteria to mitigate possible sabotage or theft from insiders.

Intelligent video serves the chemical facility user’s need to know what is happening, and precisely where in real time. Regulating “results” rather than “methods” leaves the end-user's options open to embrace best-in-class technologies to provide the necessary levels of security. Intelligent video used at a facility's perimeter -- and to monitor outdoor areas inside a facility -- is an example of how technology has met a security challenge to deliver a superior and cost-effective solution.

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities