Please activate JavaScript!
Please install Adobe Flash Player, click here for download

Pipeline Technology Journal 2-2015

Latest developments and news from the pipeline industry

RESEARCH / DEVELOPMENT / TECHNOLOGY PIPELINE TECHNOLOGY JOURNAL 53 Power plants, pipelines, maritime ports, production facilities and na- tional borders all have a common dominator - they are vulnerable to criminal or terrorist acts. Political, social, and economic tensions con- stantly push industry to adapt to this reality in order to ensure the pro- tection of their personnel and assets from these acts. Consequently, companies often rush to acquire security equipment without conduct- ing the proper analyses, leading to expensive acquisition costs with mitigated results. By bringing its military experience to the public security world, Rhein- metall Canada provides fully integrated security solutions and servic- es during the entire project timeline, from initial study and analysis to in-service support. The following is a summary of Rheinmetall Canada’s paper on this sub- ject presented at the Pipeline Technology Conference in Berlin, 2015. PROJECT STUDY AND ANALYSIS OF A FICTIONAL CASE The initial phase of a security solution implementation should be an exhaustive study of the situation. The collection of various variables is paramount to a proper and tailored security solution design. Review of the infrastructure, potential threats, terrain, environment, and existing security systems and available security forces is mandatory. INFRASTRUCTURE ANALYSIS The Oil & Gas industry is well-known for its complexity and the mag- nitude of its projects. Its infrastructures vary considerably in many as- pects. As an example, the protection of a pipeline segment will differ greatly from the protection of a compressor station. The differences in the size and shape of the infrastructures will affect the deployment of the security solution. The accessibility to the infrastructure is also an important factor to consider when designing the security solution. A criminal attempt on an underground pipeline segment will allow more reaction time than on an elevated pipeline section. And finally, the potential consequences of an attack on a specific infrastructure will dictate the amount of required security. Although unfortu- nate, an explosion of a pipeline may not be as critical as an explosion in a compressor station. Each structure is de- signed with its own characteristics, hence requiring a tailored security solution. The fictional case study proposes a 75-km bur- ied pipeline segment that will be used as an example. This pipeline, along which there are one compressor station and one valve station, ending at an export jetty in a maritime port. The ex- port jetty and the compressor station are the most critical assets to be protected (see Figure 1). PipelineSafty: Integrated solutions for high-threat areas Introduction

Pages Overview