Welcome!

News Feed Item

New "old-world" solution for attacks on U.S. power grid could protect country's most important assets, says Infrastructure Defense Technologies

BELVIDERE, Ill., Feb. 11, 2014 /PRNewswire/ -- The April 2013 attack on a San Jose, CA, power substation serving Silicon Valley has been termed the most significant incident of domestic terrorism involving the grid that has ever occurred in the U.S. The solution for protecting such substations and other critical infrastructure could involve an old-world solution.

The well-planned and organized attack on the PG&E substation began when someone cut an important AT&T communications cable inside an underground vault near the substation. Minutes later, more than 100 bullets were fired from several AK-47 rifles at 17 giant transformers within the facility that could have led to outages in America's scientific technology hub within the Silicon Valley.

Jon Wellinghoff, who chaired the Federal Energy Regulatory Commission until last November, investigated the San Jose attack and led high-level briefings to federal agencies, Congress and the White House last year. Wellinghoff has called the potential for additional attacks, like the one in San Jose, an indication of a "huge threat" and said that it represented, "the most significant incident of domestic terrorism involving the grid that has ever occurred."

"While most of the electrical industry has been focused on the threat of cyber-terrorism, the San Jose attack points to the need for physical protection of strategic power grid assets as well," said Tom Carlton of Infrastructure Defense Technologies, LLC (IDT). "We've brought an important new component to a traditional protection method that is an effective solution for future attacks."

Since Biblical times, the method of thick-walled fortifications to halt manned and artillery attacks remains the best technology for protecting lives and important assets. IDT's physical barrier system is called METALITH™. The prefabricated steel barrier structure is filled with sand and is several feet thick. It has proven to be resistant to bullets, explosives and vehicle ramming. IDT has installed its barriers at strategic U.S. and foreign nuclear and military sites since the September 2001 attacks. The U.S. Army Corps of Engineers has designated METALITH to be a 90th percentile solution to ground-based attacks, and the product is now an important component of the U.S. military's force protection program worldwide.

"I believe that the threat of armed attacks against our nation's power grid is real," said Carlton. "IDT offers a cost-effective solution that can be easily installed to significantly reduce the threat of an attack such as the one in San Jose."

Americans have witnessed what the loss of just one important power substation can have on their lives. A 2003 incident knocked out power to 50 million people in the U.S. and Canada for days. An attack on a small number of critical substations and other assets could have a major negative impact on Internet, financial, petrochemical and military services. The U.S. Department of Energy noted in a 2009 report that "physical damage of certain system components on a large scale could result in prolonged outages."

"The cost of posting 24-hour guards at important substations can be avoided and the sites can be more effectively protected by using a proven barrier system that eliminates the need for a guard force being stationed at these sites," Carlton said. "Installing a METALITH system is a one-and-done solution that can be an effective protection against an attack for decades."

IDT's engineered physical protection barriers are currently installed at military, nuclear and petrochemical facilities around the world. The barriers are used for blast mitigation, vehicle arrest, protective delay, perimeter security, access control and ballistics protection. The company's staff of Subject Matter Experts can provide on-site analysis of vulnerabilities a facility may offer to terrorists, then customize a solution involving barriers and other protection technologies.

"Americans have become accustomed to hearing about U.S. military deaths from IEDs, suicide bombers in vehicles and RPG attacks," Carlton said. "IDT has been an important force in reducing those casualties with their barriers. We've learned what works, and METALITH has proven itself to be the most formidable anti-terrorism barrier available."

For more information on IDT, visit www.infrastructure-defense.com or call (800) 379-1822.  

SOURCE Infrastructure Defense Technologies

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, discussed how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He also discussed how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors an...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at Dell EMC, introduced a methodology for capturing, enriching and sharing data (and analytics) across the organization...
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, explained the best practices of continuous testing at high scale, which is rele...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of D...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...