Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Preventing Copper and Coal Thefts with Video

By Diane Ritchey
August 1, 2009
Installation of the MotionViewer remote sentry, a solar powered trailer with megapixel PTZ cameras mounted on a high mast, helped to catch thieves at a coal mine in the central part of the U.S.


As George Washington once stated, “there is nothing so likely to produce peace as to be well prepared to meet the enemy.” Public utilities such as copper mines, coal mines, and power plants have to be prepared, as much as any other corporate or government entity, especially after Homeland Security experts flagged such facilities as highly vulnerable to catastrophic terrorist attacks. More commonplace, however, seems to be theft from such facilities. 
     
Such is the case at Gulf Power, which serves more than 400,000 customers in 10 counties throughout Northwest Florida, from Pensacola to Panama City. Criminals were stealing copper wires and components from remote, often unattended, power substations at frequencies reaching epidemic proportions. The threats were creating multi-faceted challenges for utility companies, and those in charge of their security.
     
Copper wiring and components have garnered increased attention from criminals because its value has gone up drastically in recent years, and it can be easy to unload: a quick trip to the scrap yard, and thieves can swap stolen copper for easy cash.
     
In addition, the U.S. Department of Energy published a study reporting that thefts of copper wire costs American industries more than $1 billion every year. The same report found that thieves hit everything from utility poles to service trucks; substations, however, are especially vulnerable.
     
But the cost of metals theft to the utility companies goes far beyond the immediate loss of materials – companies encounter losses in operating revenue, they incur the costs associates with repairing their damaged infrastructure, and have to compensate for the damaged substations being off-line while they’re under repair.
     
Gulf Power began using thermal imaging technology from FLIR Systems to help it fight the growing costs associated with the theft of copper wiring and components from its substations, which provide power to critical infrastructure assets and local military bases. The substations are typically unmanned and the network of fence sensors and security video cameras are monitored remotely from a central security facility or dispatch center.
     
Gulf Power realized that security video cameras are not optimal solutions for providing 24-hour visual security, even at facilities like substations that can be lit with floodlights, because of their limited range and potential poor lowlight imaging capability. To solve its security needs, Gulf Power worked with Pensacola-based security integrator Advanced Control Concepts (ACC) to find and implement a 24/7 visual security solution.
     
ACC installed FLIR’s PTZ-50 MS multi-sensor thermal security camera for its 24-hour imaging capability and 360-degree panning capability. Thermal security cameras provide clear imagery in total darkness, giving Gulf Power’s security personnel, including Charlie Griffith, an investigator with the power company, improved imaging performance, allowing him to monitor the substation’s fence lines and the surrounding area for approaching people and vehicles. Thermal video is naturally high in contrast, so it works well with video analytics package ACC installed in Gulf Power’s central monitoring facility.
     
The FLIR thermal security cameras were mounted on 30-inch poles for greater coverage, and the camera’s auto-slew command to respond to fence sensor alarms automatically pointing the camera at the appropriate alarm zone. This allows security crews to analyze and assess the cause of the alarm quickly and accurately.
     
“These thermal cameras have greatly enhanced our security crews’ ability to see at night, and this lets us respond more efficiently to all manner of alarms and intrusions,” said Griffith of Gulf Power.     


A Blended Video Solution

Coal mines often face the same security and theft challenges as do copper mines, as Securitas Security Services USA, Inc. recently found. The company provides security services to some of the nation’s largest utilities, mining operations and petrochemical plants, including a large coal mine in the central part of the U.S. and was the target of repeated thefts. According to Kory Best, branch manager for Securitas USA, the mine presented significant security challenges, including:
  • It was remote; 10 miles from the nearest community, homes or businesses.
  • There was no electrical power or lighting.
  • There was no broadband or telephone.
  • The site itself covered over 150 acres.
The mine had been the target of repeated thefts and tens of thousands of dollars in losses over the past few years. The mine’s security personnel worked with Securitas to protect the facility. 
     
Initially, two patrol officers were deployed to the site, as that was all the budget would allow, yet the sheer size of the site was overwhelming for only two officers. Each patrol took more than one hour to complete. While patrols did provide significant deterrence, the patrols were never able to actually identify or apprehend any thieves. The thieves became more sophisticated and began using lookouts to warn each other as the patrols approached and losses continued. While ultimately there is no substitute for a live guard to respond to an intrusion, deploying trained personnel to remote locations is costly, even in the best economy. The security solution included installation of three Mobile Surveillance Units (MSUs), essentially a solar powered trailer with megapixel PTZ cameras mounted on a high mast. Though the MSU’s enhanced the site’s surveillance beyond what the officers’ patrols could provide, the security officers still were not able to monitor 100 percent of the site or inside any buildings. In addition, the night vision was limited and there was no illumination from site lighting to assist. This made monitoring a more labor intensive feat.


The Last Straw

In early June, thieves struck again and made off with thousands of dollars of copper wire and cable. MSUs could not monitor every portion of the site (exterior and interior), thus allowing thieves to gain access undetected.  A more comprehensive solution was still needed in order to “lock down” the site from a surveillance standpoint.
     
Videofied, a wireless outdoor security system that operates up to four years on one set of batteries, became the best security solution for the problem. MotionViewers detect intruders and send a 10 second clip of the intrusion over the cell network to a monitoring operator for immediate review. The operator can dispatch law enforcement and log into the MSU cameras for streaming video to coordinate response in real time. Videofied provides the coverage needed with up to 24 MotionViewers on one system. The MotionViewers were used as “remote sentries” to support a PTZ camera on a centrally located MSU.  The Blended Video concept worked. A few days after the latest intrusion, the system detected intruders and sent a video alarm to the monitoring station, contacted Best, who then logged into the MSU (from his kitchen table) and tracked the thieves in real time across the site. While the thieves were at work, mine security personnel joined local law enforcement to aid in the capture. A Deputy Sheriff arrested the two suspects and recovered all the materials targeted for theft.


How are Power Plants Kept Safe?

In response to the events of September 11, the Nuclear Energy Institute (NEI), with support from the U.S. Nuclear Regulatory Commission (NRC), developed guidelines to address the unique challenges of security events to existing Emergency Preparedness (EP) programs at nuclear power plants across the U.S. Recent NEI guidelines are encouraging the nuclear industry to conduct unevaluated Hostile Action-Based EP Drills at all nuclear power plant sites before 2010.
     
A Hostile Action is an act toward a Nuclear Power Plant or its personnel that includes the use of violent force to destroy equipment, take hostages, and/or intimidate the licensee to achieve an end. This includes attack by air, land, or water using guns, explosives, projectiles, vehicles, or other devices used to deliver destructive force. 
     
NEI said that even though the radiological consequences will be the same whether caused by a Hostile Action or a plant event, Hostile Actions “would provide unique challenges for emergency responders.” To prepare for challenges, the nuclear industry has begun conducting drills that use Hostile Action-Based (HAB) scenarios as initiating events. The drills demonstrate the licensee’s ability to coordinate onsite security, operations, and emergency response personnel with offsite organizations, such as State and local emergency management and law enforcement. The initiative is also being incorporated into the existing emergency preparedness program as part of proposed NRC rulemaking.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Day/Night Cameras

    Maintaining Awareness with Day/Night Cameras

    See More
  • Alarm

    How Monitored Video Alarms Deliver Insurance Discounts

    See More
  • Wried or Wireless?

    Adopting Wireless Video to Tackle Covert Surveillance Operations

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing