Please activate JavaScript!
Please install Adobe Flash Player, click here for download

Pipeline Technology Journal 2-2015

Latest developments and news from the pipeline industry

RESEARCH / DEVELOPMENT / TECHNOLOGY Figure 6 illustrates a real-life security operational center. The six large dis- plays provide a common operating picture to all the security personnel, with access to long-range imagers, CCTVs, radars, distributed acoustic systems, and personnel tracking devices. A geographical map display is also provided with well-defined monitoring zones and geo-referenced entity tracking. When an alarm is raised, the software provides the oper- ator with all the necessary and available information from all the sensors (radar, cameras, mapping system, etc.), which eases the intervention op- erations. Finally, there are two operators, each one controlling his different set of sensors, being supervised by the security officer, who also acts as a liaison officer. MULTI-USER SENSOR CONTROL Stovepipe architectures often have a single location from where to oper- ate a sensor. Integrated systems allow control of any connected sensor from any control station on the network (see Figure 7). Control override may be achieved if priorities among multiple control stations exist (for example, a commander post). Otherwise, sensor control taking and grant- ing can be procedural. If not already under control, sensor control is auto- matically granted. Otherwise, the user in control can grant or decline the control request unless the requester’s control station has a higher priority. Of course, even if a control station does not have the control of a sensor, it always has access to the sensor’s output, such as video feeds, geo-ref- erenced tracks, etc. In the current case study, there are two SOC’S; at the compressor sta- tion and at the export jetty. Two operators are present at the compressor station; one is in charge of the compressor station and valve station tow- ers, and the second one is in charge of the mobile towers for the pipeline protection. Two operators are also present at the export jetty. The first operator takes charge of the land region around the export jetty and the second focuses on the maritime area. In both security centers, a supervi- sor is present to review the ongoing action. Both security centers render all information and data to the corporate chief of security office which would take decisions in case of a major threat. This office has priority in controlling sensors such as the cameras. All individuals involved are in constant communications through voice and data transfer. SECURITY SYSTEM OPERATION There are five main steps in threat management: detection, identifica- tion, communications, tracking, and intervention. Each one has its own importance and a smooth transition from one to the other is critical. Such transitions are supported by adequate system integration between com- ponents and software. The operation concept of a security solution may be referred to as the “event timeline”, as illustrated in Figure 8. Figure 5: Security Operational Center PIPELINE TECHNOLOGY JOURNAL 57

Pages Overview