Protecting The Nation

Protecting The Nation's Power

Target practice can take down the electrical grid

It was a late night shooting spree in early Spring of 2013, when an apparent lone rifleman situated in a thicket on a hillside in San Jose, Calif., attacked a large electrical power transmission substation by aiming and shooting at critical components as if playing an arcade game. April 2015 marks the twoyear anniversary of this shooting event. What’s disappointing is that the ensuing investigation has produced no arrests and little progress has been reported on identifying a suspect.

The targeted facility is located south of San Jose and can be viewed from a major highway that passes next to it. The apparent attacker fired about 100 bullets in less than 20 minutes into the transformers, and the substation’s ability to maintain current began failing quickly—all within 14 minutes. Not realizing what was happening at this particular substation and in order to avert a major blackout, energy grid officials began rerouting power from nearby substations around the Silicon Valley. Approximately 17 of the substation’s transformers were severely damaged, resulting in millions of dollars of repair costs and a solid month of down-time for the substation.

Under most circumstances, an attack of this magnitude would have made top headlines in national news, but it happened on April 16, immediately following another very serious but unrelated event: the Boston Marathon bombings of April 15. Thus, with the nation’s attention focused on Boston, the substation shooting received mostly local news coverage. The seriousness of this attack wasn’t highlighted until the Wall Street Journal published an article about it on Feb. 5, 2014. While the utility industry was already well underway with changes addressing the newly realized vulnerability, the federal government began pushing for more meaningful protection requirements.

The operator of the attacked substation reacted by committing funds for an extensive security upgrade investment of more than $100 million spanning over three years to fortify and better secure its major substations across its Northern California service region. Many other major utilities took note and also began investing likewise in substation security upgrades. In the months that followed, the North American Electric Reliability Corporation prompted by the Federal Energy Regulatory Commission approved a more stringent set of security standards under the National Infrastructure Protection Plan, more specifically within the Energy Subsector and established the Critical Infrastructure Protection Reliability Standard 014 (better known as CIP-014). Today, CIP-014 is well into its 6th revision and major utilities are entrenched in compliance measures heavily focused on physical security improvements.

Interestingly, the Wall Street Journal article stated, “The attack was ‘the most significant incident of domestic terrorism involving the grid that has ever occurred’ in the United States, said Jon Wellinghoff, who was chairman of the Federal Energy Regulatory Commission at the time,” and “He [Wellinghoff] said he was going public about the incident out of concern that national security is at risk and critical electricgrid sites aren’t adequately protected.”

There has been much speculation as to whether the attack is a precursor to an even larger series of attacks and whether it was planned and executed by a yet-to-be identified terrorist group. Either way, it is apparent that our nation’s bulk power supply is at risk due to its current vulnerable state. Let’s face it, most industrial systems are not designed for operation in areas of conflict and will take years to adequately harden. However, by practicing and implementing an elevated level of safety and security that considers an all-hazards approach using basic concepts such as Crime Prevention through Environmental Design (CPTED), much of our national infrastructure would be less vulnerable to attack.

Severe damage and physical destruction is always a showstopper for any operation. Using a total solution provider that can logically integrate physical defense systems with perimeter intrusion detection systems is a solid path to successfully protecting a facility. More importantly, managing the fifth zone (areas outside of the protected facility) is the key to achieving advanced warnings.

Just like military operations, you want to see the enemy before he sees you and that can’t be done if security systems are focused on just the immediate perimeter. As perimeters go, stronger is better. By using “high-delay time” fencing products (entry is made no sooner than 4 minutes using conventional means), vehicle barriers, retractable bollards, crash-rated gates and sally ports, video surveillance, intrusion detection systems and advanced motion analytics around the entire perimeter, facilities can become adequately secure and protected from most crime. The weak side of a perimeter is the choice side for any criminal.

It helps to select a single provider to design and install an integrated package and to commission the systems based upon an operation’s unique set of performance objectives. These objectives should benefit the end users and support their desired response protocols during events. The alarm notifications should provide clear and concise instructions for each type of event and the associated intrusion systems should be redundant and well maintained, allowing for multiple confirmations that help reduce and eliminate false and nuisance alarms.

Because of its relatively low cost, chain link fencing dominates the perimeter security market as the most popular solution, especially in the United States. However, standard chain link products are more suited for safety purposes than security defense. It has been proven that without significant modifications, standard chain link products can be easily breached in a matter of seconds by pulling up on the mesh and passing beneath it or by snipping and unwinding one of the coils and passing through the impending opening. The ease in which this is accomplished diminishes the legitimacy of low-cost chain link fencing for consideration as a secure perimeter defense solution.

Since, it is apparent most high-security facilities require some sort of physical perimeter barrier system to control the access or lengthen the delay time required for forced entry, many organizations have moved away from chain link products and are now using combinations of welded wire, expanded metal and louvered panels, all offering much longer delay times and requiring significantly more sophisticated means of forced entry.

As perimeter protection solutions became more advanced and made with stronger steel and thicker gauges, the support posts and structural foundations also need to be sturdier and better engineered to support the additional weight and wind loads. Planning a facility’s perimeter security requires time, effort, and adequate funding. Security professionals should always assess a provider’s products, scope capability, financial health, references, and quality systems. Wire mesh products should be tested for tensile strengths whether used in chain link or woven meshes, along with strength tests of the welds used in welded wire mesh panels.

High-security fencing systems are just one of many necessary components for perimeter protection. While demonstrating a return on your security investment can be challenging to prove, we must weigh the possible outcomes of adverse events against the cost of maintaining our livelihood.

This article originally appeared in the June 2015 issue of Security Today.

Featured

  • New Research Reveals Global Video Surveillance Industry Perspectives on AI

    Axis Communications, the global industry leader in video surveillance, has released its latest research report, ‘The State of AI in Video Surveillance,’ which explores global industry perspectives on the use of AI in the security industry and beyond. The report reveals current attitudes on AI technologies thanks to in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of more than 5,800 respondents, including distributors, channel partners, and end customers across 68 countries. The resulting insights cover AI integration and the opportunities and challenges that exist with regard to security, safety, business intelligence, and operational efficiency. Read Now

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.