window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-141226144-1');

Protecting utilities – Top targets

Author – Brian Baker

That’s only one of the many security risks facing the utilities that provide necessary services to virtually every segment of U.S. society. The nation’s critical infrastructure, homes, small businesses, and other organizations count on utility power plants and grids for uninterrupted power supply.

What is Needed to Protect Utilities?

Perimeter barriers, such as fences, walls, tripwires, and motion detectors help keep intruders away from remote substations and other facilities. Access control protects gates and doors.

It’s difficult to imagine the hours of video hundreds to thousands of cameras generate daily. Even the best-trained SOC staff tires and loses concentration over a shift. To combat operator fatigue, today’s cameras with embedded analytic software create alarms when motion occurs within the field of view. However, up to 98% of these alarms are false, resulting from nothing more serious than wind-blown foliage or an animal moving along the perimeter fencing. The time spent reviewing false alarms further reduces an operator’s ability to respond to actual events. Some critical events may be missed entirely.

The broad capabilities of artificial intelligence-based technologies heighten the value of many electronic security systems, but perhaps none as much as remote video surveillance. Event-driven analytics make video a proactive tool and an information source. Through a time-consuming and expensive process, artificial intelligence, with its deep learning technology, is trained to identify humans and vehicles while ignoring nuisance events. The result is a 90+% reduction in false alarms. And that is only the start of what event-driven analytics can provide utility operators.

AI can detect a crowd forming around a substation or a person loitering or moving across multiple cameras on the same site. Watch lists enable SOC operators to upload photos of people or objects to seek and observe — or ignore. The AI-based software can spot someone tailgating an authorized employee entering an access-controlled area.

Other examples of how AI software improves utility site security and operations include:

  • Monitoring thermal cameras — AI detects generators and other devices not operating at usual working temperatures.
  • Safety and security — AI software can spot employees not wearing mandated safety gear.
  • Operational efficiency — AI analytics detect anomalies and trends of all kinds, enabling facility managers to make changes to traffic patterns and other routines to keep operations at their peak.

Event-driven analytics evaluate video from all surveillance cameras, making the technology ideal for forensic analysis. The software filters to video, looking for operator-determined events such as slips and falls.

Back to Drones

Let’s get back to drones, one of the most significant security threats facing utilities. AI-based software monitoring surveillance cameras with long-range lenses help SOC operators detect drones while still miles away from their target. Early detection of approaching drones is critical as only a few federal agencies are authorized to down UAVs. The Federal Aviation Administration is concerned that attempts by utility operators and others to shoot down a drone or jam the signal between the device and its pilot could adversely impact commercial aircraft or mobile phone and first responder networks.

A few high-end security integrators now offer anti-drone systems consisting of long-range surveillance cameras, audio and thermal detection, and other technologies to detect a drone’s direction, the pilot’s location, UAV type, and IP address. Utilities may seek federal agency assistance if an approaching drone is deemed a credible threat.

Drones also have a positive side. Camera-equipped drones can take the place of humans patrolling a utility site’s perimeter. Though most UAVs have limited flight times — usually 15 to 30 minutes, requiring frequent charging at base stations — having multiple drones helps ensure one is always available.

Don’t Forget Cybersecurity Protection

No overview of utility security is complete without a mention of cybersecurity. Utilities’ essential value to the national economy makes them attractive targets for domestic hackers and nation-state actors. A recent survey of utility chief executives showed half of the respondents expect cyberattacks against critical infrastructure to be imminent. Physical security professionals can assist by ensuring devices such as cameras, access readers, and servers are secured with regularly updated passwords, installed firmware and software updates, and robust firewalls between security devices and the internet.

Utilities require a well-integrated plan to maintain high-security standards. By weaving in a comprehensive security program using technologies such as access control, video surveillance, analytics, and attention to the cybersecurity of those physical security technologies, security leaders within utilities and critical infrastructure organizations can keep tabs on potential risks and targets.

2023-05-18T14:44:43-04:00

Share This Post With Others!

Title

Go to Top