“It was a late night shooting spree in early Spring of 2013, when an apparent lone rifleman situated in a thicket on a hillside in San Jose, Calif., attacked a large electrical power transmission substation by aiming and shooting at critical components as if playing an arcade game.
“Approximately 17 of the substation’s transformers were severely damaged resulting in millions of dollars of repair costs and a solid month of down time for the substation.
“In the months that followed, the North American Electric Reliability Corporation prompted by the Federal Energy Regulatory Commission approved a more stringent set of security standards under the National Infrastructure Protection Plan, more specifically within the Energy Sub-sector and established the Critical Infrastructure Protection Reliability Standard 014 (better known as CIP-014).
CSi works with energy companies and other government installations, providing NERC CIP-014 compliant solutions.
“Severe damage and physical destruction is always a showstopper for any operation. Using a total solution provider that can logically integrate physical defense system with perimeter intrusion detection systems is a solid path to successfully protecting a facility.”
CSi uses systems from both Honeywell and Genetec to create custom CIP compliant systems that are similar to systems used on military bases around the world. All video surveillance and the resulting response to an incident can be maintained and monitored from a single command center.
Another article adds the following.
“A critical infrastructure protection (CIP) standard for physical security measures (CIP-014-1) developed by the North American Electric Reliability Corporation (NERC) and approved by the Federal Energy Regulatory Commission (FERC) went into effect on January 26 of this year, a reaction in part to the PG&E substation attack. The new standard mandates that private, public, and municipal electric utilities develop security plans for critical infrastructure locations and substations, including resiliency and security measures that deter, detect, delay, assess, communicate, and respond to physical threats and vulnerabilities.”