“There are so many sources of potential threats and so many points of vulnerability, no organization has the resources to provide 100% protection from all threats,” Shepherd cautions. “It is impossible to be everywhere at once, but the more preparedness one can take in advance of any security breach, and the more points that can be monitored, the more a company will be able to do to prevent or minimize damage and return to normal operations as quickly as possible.”The U.S. Department of Homeland Security (DHS), its Federal Emergency Management Agency (FEMA) and other government groups have issued clear and valuable procedures for protective measures, says Shepherd. “Compounding the problem is that by DHS definition, 85% of the country is a ‘soft’ target, meaning that access is difficult, if not impossible, to control,” he adds. “Unlike ‘hard’ targets, such as the White House or the Washington Monument, which can be shut down and secured quickly and completely during an Orange security condition, closing a soft target like a large chemical plant can have significant economic consequences.”Even if your plant is a soft target and securing it completely seems like an impossible task, there are still many things you can do. Peter Stickles, a partner at security consulting firm ioMosaic, says the focus of plant security should be a practical and doable risk reduction based on “deter, detect and delay.” The mechanisms to accomplish this should be incorporated into internal policies and procedures, perimeter security systems, and a rapid, robust response. “The recommended practice should also incorporate a risk-based assessment approach that puts terrorist attacks in context with other plant risks,” he advises.The first line of defense, then, is good perimeter security.On the Perimeter
Robert Gruber, technology manager for the Security Solutions Group of Master Halco, a manufacturer of perimeter fences, says a good fence deters, detects and defends. “If my fence is more formidable than my neighbor’s, then the trespasser will attack my neighbor instead of me,” he says. “Fences are still designed with deterrence in mind. A fence can be built to withstand a 15,000 lb vehicle traveling at 50 mph with a penetration of only one meter. This is the U.S. State Department’s K-12 rating.”Alas, a person can still climb such a fence. “Sandia Labs testing has determined that a highly skilled trespasser could get to the other side of a well-designed fence in about four seconds,” Gruber notes. “Typically, a fence designer will aim for a 40-second delay at the perimeter by using a series of fences, barbed wire, razor wire and other devices.”
A fence with a good fiber optic cable can deter and detect intruders. A good fence tries to delay intruders by 40 seconds with razor wire and secondary fences.
Developments in video and infrared (IR) cameras are making it possible to monitor remote areas of the plant and remote sites, such as electrical distribution systems and transformers. You are probably familiar with using infrared cameras to detect maintenance problems on motors, electrical boxes and insulation. Similar devices can be used to detect intruders, day or night.“The newest generation of systems combines visual and IR cameras with airborne ultrasound detection,” says Jon Chynoweth, director of marketing at Mikron Infrared. “The infrared and visual images can be blended and transmitted to a PC via wireless, enabling clearer, faster identification and pinpointing of both physical incursions and thermal anomolies at remote sites.” In other words, you can use the same camera to detect remote maintenance problems and intruders.When the Barclay Group, a security consultant in Anderson, Ind., upgraded the surveillance systems for a major energy company, it had to provide real-time video monitoring on a 24-hour basis around the perimeter of a power generation plant. The problem was how to get images under poor light conditions. “Although many of today’s cameras can get some video signal from dark areas, it usually is not enough,” says Mark Barclay, president. “For Homeland Security projects, it’s necessary to deliver the best picture possible and for that, you need to use IR cameras and IR lighting.”
It’s not always necessary to use IR lighting. Thermal-Eye, a manufacturer of infrared cameras, says it can spot intruders in complete darkness (See Figure 2). In some installations, it integrates its cameras with an existing CCTV network so security personnel can see remote areas night and day. At night, it comes down to deciding whether you need high resolution to identify an intruder or just to detect the intrusion.
In the past, intrusion systems worked individually. Today, all the perimeter defenses – fences, wires, cables, sensors and cameras – need to be connected to security stations such as guard houses or central command centers.
This can be done via wireless or a plant network. “Devices can be connected via TCP/IP over a plant network,” says Gruber. “The devices have their own IP addresses, so the perimeter can be connected to the company LAN or WAN and provide notification of a fence breach via a wireless PDA or a Blackberry device.”
With such capability, security can get sophisticated. “Perimeter security measures are so sophisticated, we can set up intelligent video systems that will look for certain situations such as someone walking in the wrong direction, starting to climb a fence, or dropping a bag that remains stationary for a period of time,” Gruber explains.
Shepherd likes wireless. “Wireless technologies reduce costs by eliminating the need to patch into cabling,” he notes. “For some applications, the relatively low cost of wireless transmitters enables a company to monitor activity at many more points.”
Good perimeter security keeps bad guys from breaking into the plant. But what happens if they get into the plant legally, right through the front door?
The Inside Job
Leslie Arnold, services marketing manager at Honeywell Process Solutions, says a layered approach to internal plant security is needed. He suggests setting up security to:
- Identify and control who enters and exits a facility.
- Track movement of building occupants and assets.
- Control access to restricted areas.
- Track and locate equipment, products and other resources.
- Track the location of personnel on the site.
- Integrate security and control systems.
These recommendations apply to all key areas of a plant that are vulnerable to damage, such as control rooms, storage tanks, pipelines, shipping areas, laboratories, data centers and offices.
Shepherd says equipment is readily available to perform such tracking functions. “These include GPS tracking systems, RFID monitoring of people and assets, vendor verification systems, license plate recognition systems and motion sensors,” he says. “It also includes biometric systems such as facial recognition, palm readers and retinal scanners.”
A badge reader can track who comes and goes inside your plant.
- Put locked bars over the controller faceplates so no one can manually change settings.
- Lock the cabinet containing the controllers.
- Lock the room containing the cabinets.
- Control access to the building containing the controller room.
- Put the main control room on a different floor or in a different building.
- Control access to the main control room.
- Make sure that the HMIs in the main control room can only monitor the system, not change controller settings.
- Put HMIs that can change controller settings in a different locked room.
- Protect those HMIs with user names and passwords, so only a very few authorized people can change control settings.
- While these may seem excessive for a domestic plant, such Draconian procedures make it very difficult for anyone to gain access to critical control equipment.
Cyber security is outside the scope of this article, but you should be aware that your control systems are vulnerable to attack from the outside (See “A Word about Cyber Security”).
The Security Operations Center
The security control room is often seen as the “trophy” of an integrated security management system, says Gompers, and upper management may get carried away with it. “Senior management likes to see lots of flashing lights and “Star Wars”-like command consoles to help them feel better about their sizable security investment,” he says.
Unfortunately, what management likes to see may not be conducive to a well-laid-out security area. Gompers says the kinds of equipment normally installed in the security control area can include fire alarm control panels, video servers, DVRs, CCTV monitors, radio and communications systems, logging systems, workstations, terminals, key control cabinets, badging printers, 911 response systems and public address systems.
“The most effective control rooms are not defined by shoving every possible piece of equipment into the space,” he advises. “Instead, installers should place all equipment that does not require hands-on attention in an equipment room connected to the center. This provides a cleaner, less-cluttered environment and takes confusion out of the command center.”
He recommends that security control consoles and work surfaces be positioned in the center of the room to allow for movement on all sides, with the displays positioned on one wall in front of the work area, preferably on seven-foot screens “This will be where video is displayed for active and non-active monitoring,” he says.
Start with an SVA
To analyze your current state of security, you must do a Security Vulnerability Assessment (SVA). Fortunately, several industry groups have taken the lead. “Industry trade associations such as the American Chemical Council and AIChE’s Center for Chemical Process Safety (CCPS) have sponsored the development of SVA methodologies,” says Peter Stickle of ioMosaic. OSHA has gotten into the act with the OSHA Process Safety Management Rule (29CFR1910.119), and Sandia National Laboratories developed the Chemical Facility Vulnerability Assessment Methodology (VAM).
Depending on your industry, you may want to check with your industry trade association to see if they have similar programs and recommendations.
A team of researchers at the Department of Energy’s Lawrence Berkeley National Laboratory developed an interactive computer program that plant managers can use to assess their vulnerability to chemical, biological and radiological (CBR) weapon attacks or accidental toxic releases (see “Where to Get Help” in the article A Word about Cyber Security).
An SVA involves a review of a company’s assets for handling, storing and processing hazardous materials from the perspective of an individual or group intent on causing a catastrophic event, Stickle says. “It considers possible scenarios by looking at inventories or production steps involving hazardous material, potential pathways of attack, and existing security countermeasures or rings of protection,” he explains. “The scenarios are priority ranked using a system of risk-based factors which estimate the frequency and consequence of each scenario.”
Stickle says there are two main groups of adversaries -- insiders and outsiders -- and you have to address both. For internal threats, mitigation mostly involves administrative controls such as:
- Employee hiring screening
- Contractor screening
- Perimeter security
- Behavior observation
- Inventory reduction
- Emergency response planning
External threats tend to require engineered controls including:
- Inventory reduction
- Relocation of storage
- Obscuring storage or installing decoy tanks
- Improvements to physical perimeter systems
- Pre-planning and coordination with local emergency response agencies
As the Table below shows, the degree of company control, effectiveness and cost can vary considerably.
THREATS AND MITIGATION
Threat |
Mitigation |
Ability to Control |
Internal due to sabotage by third party or employee. |
Internal policies and practices: |
Entirely within plant’s control. Generally low cost for implementation. |
External due to unauthorized entry to plant site. |
Parameter security systems: |
Entirely within plant’s control. Low to medium cost for implementation. |
External due to munitions delivered from outside the fence. |
Storage inventory management and siting: |
Mostly within plant’s sphere of control but fixes may not be practical nor completely effective and can be costly. Risk/benefit analysis needed for deciding action. |
External due to munitions delivered from outside the fence. | Increased policing by local law enforcement and/or improved ER coordination. | Actions can be influenced by plant, but not totally controlled. Cost to plant may be negotiable. |
Source: ioMosaic
Procure and Deploy
Once you’ve done an SVA on your plant, and you have an idea of what’s involved in improving security, now you have to specify and install the equipment. A team of security experts who worked on the Bay Area Security Enhancement and Port of Oakland Security Enhancement programs presented a paper at the ISC Expo containing the basis for this list of lessons learned (download the entire paper at www.infrastructure-security.org):
- Pick the right people: You need help from a wide range of disciplines, from security to video encoding to Ethernet networks to wireless and so on. Their advice: “If one company comes to you and says they can handle it all, they are mistaken.” You need a team.
- Vendors lie: White lies to be sure, but vendors tend to overstate their qualifications. Be sure to check out their specs.
- Get involved in the details: Owner involvement is needed. The biggest mistake is companies that don’t commit the necessary resources because they are not involved in the project.
- Over-communicate: With many people and companies involved in the project, good communication is vital. “We communicated four times more than we do on a typical project and it was still not enough due to the complexity, diverse team and multiple departments and agencies involved.”
- Deal with dissidents: There will likely be dissidents on the team who disagree on a technique. “About half the time they will be right, and listening to them will save you time and money.”
- Make a decision timeline: The project is complex. You need to make a decision schedule and stick to it, even if you don’t have all the information you need.
- Pick the right project delivery method: Choose between design-bid-build versus design-and-build. Both have advantages and disadvantages. The team believes that design-and-build is the better method.
- Power and communication infrastructure is your biggest challenge: The budget is not going to be broken based on camera costs, the team says. Instead, it will be made or broken based on how much it costs to connect everything together.
- R&D, testing and a beta site are a must: This should take up about 50% of your total time, the team says. “If you execute correctly here and incorporate lessons back into the design…you will drastically reduce the time it takes to complete the system.”
- Do not underestimate problems that can occur because of environmental conditions, interference with existing projects and operations, and politics between departments and agencies.
Leaders relevant to this article: