Welcome!

News Feed Item

New "old-world" solution for attacks on U.S. power grid could protect country's most important assets, says Infrastructure Defense Technologies

BELVIDERE, Ill., Feb. 11, 2014 /PRNewswire/ -- The April 2013 attack on a San Jose, CA, power substation serving Silicon Valley has been termed the most significant incident of domestic terrorism involving the grid that has ever occurred in the U.S. The solution for protecting such substations and other critical infrastructure could involve an old-world solution.

The well-planned and organized attack on the PG&E substation began when someone cut an important AT&T communications cable inside an underground vault near the substation. Minutes later, more than 100 bullets were fired from several AK-47 rifles at 17 giant transformers within the facility that could have led to outages in America's scientific technology hub within the Silicon Valley.

Jon Wellinghoff, who chaired the Federal Energy Regulatory Commission until last November, investigated the San Jose attack and led high-level briefings to federal agencies, Congress and the White House last year. Wellinghoff has called the potential for additional attacks, like the one in San Jose, an indication of a "huge threat" and said that it represented, "the most significant incident of domestic terrorism involving the grid that has ever occurred."

"While most of the electrical industry has been focused on the threat of cyber-terrorism, the San Jose attack points to the need for physical protection of strategic power grid assets as well," said Tom Carlton of Infrastructure Defense Technologies, LLC (IDT). "We've brought an important new component to a traditional protection method that is an effective solution for future attacks."

Since Biblical times, the method of thick-walled fortifications to halt manned and artillery attacks remains the best technology for protecting lives and important assets. IDT's physical barrier system is called METALITH™. The prefabricated steel barrier structure is filled with sand and is several feet thick. It has proven to be resistant to bullets, explosives and vehicle ramming. IDT has installed its barriers at strategic U.S. and foreign nuclear and military sites since the September 2001 attacks. The U.S. Army Corps of Engineers has designated METALITH to be a 90th percentile solution to ground-based attacks, and the product is now an important component of the U.S. military's force protection program worldwide.

"I believe that the threat of armed attacks against our nation's power grid is real," said Carlton. "IDT offers a cost-effective solution that can be easily installed to significantly reduce the threat of an attack such as the one in San Jose."

Americans have witnessed what the loss of just one important power substation can have on their lives. A 2003 incident knocked out power to 50 million people in the U.S. and Canada for days. An attack on a small number of critical substations and other assets could have a major negative impact on Internet, financial, petrochemical and military services. The U.S. Department of Energy noted in a 2009 report that "physical damage of certain system components on a large scale could result in prolonged outages."

"The cost of posting 24-hour guards at important substations can be avoided and the sites can be more effectively protected by using a proven barrier system that eliminates the need for a guard force being stationed at these sites," Carlton said. "Installing a METALITH system is a one-and-done solution that can be an effective protection against an attack for decades."

IDT's engineered physical protection barriers are currently installed at military, nuclear and petrochemical facilities around the world. The barriers are used for blast mitigation, vehicle arrest, protective delay, perimeter security, access control and ballistics protection. The company's staff of Subject Matter Experts can provide on-site analysis of vulnerabilities a facility may offer to terrorists, then customize a solution involving barriers and other protection technologies.

"Americans have become accustomed to hearing about U.S. military deaths from IEDs, suicide bombers in vehicles and RPG attacks," Carlton said. "IDT has been an important force in reducing those casualties with their barriers. We've learned what works, and METALITH has proven itself to be the most formidable anti-terrorism barrier available."

For more information on IDT, visit www.infrastructure-defense.com or call (800) 379-1822.  

SOURCE Infrastructure Defense Technologies

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data professionals...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, shared the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...