Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceFire & Life SafetyPhysical SecurityVideo SurveillanceInfrastructure:Electric,Gas & Water

Enterprise Services

Protecting utilities: Top criminal and terrorist targets

A comprehensive, layered and thorough security program is a vital component of any utility or critical infrastructure organization’s operations.

By Brian Baker
SEC_energy_780x439.jpg
July 25, 2022

In 2020, U.S. officials reported that a small drone, or autonomous aerial vehicle (UAV), attempted the first known attack of its type on a utility power substation. Officials said the UAV, equipped with copper wire hanging from nylon cords, was meant to short circuit transformers or distribution lines at a Pennsylvania location. Fortunately, the drone, stripped of its identifying markings and internal memory card, fell short of the target. However, it shows the vulnerability of utility sites to relatively inexpensive aerial attacks.

 

That's only one of the many security risks facing the utilities that provide necessary services to virtually every segment of U.S. society. The nation's critical infrastructure, homes, small businesses and other organizations count on utility power plants and grids for uninterrupted power supply.

 

Security is a vital component of any utility or critical infrastructure organization’s operations plans. Importance to the national economy has made power facilities prime targets of criminals ranging from petty vandals to domestic and foreign terrorists. Reducing security efforts is not an option for utilities, especially as criminals become more sophisticated. 

 

What is Needed to Protect Utilities?


Perimeter barriers, such as fences, walls, tripwires and motion detectors help keep intruders away from remote substations and other facilities. Access control protects gates and doors. 

With many remote, often unstaffed sites to protect, a utility requires a robust video surveillance system to transmit events to a security operations center (SOC). Cameras are needed at all entries, along outer perimeters and inside and outside of all buildings and other facilities.

 

It’s difficult to imagine the hours of video hundreds to thousands of cameras generate daily. Even the best-trained SOC staff tires and loses concentration over a shift. To combat operator fatigue, today’s cameras with embedded analytic software create alarms when motion occurs within the field of view. However, up to 98% of these alarms are false, resulting from nothing more serious than wind-blown foliage or an animal moving along the perimeter fencing. The time spent reviewing false alarms further reduces an operator’s ability to respond to actual events. Some critical events may be missed entirely.  

 

The broad capabilities of artificial intelligence-based technologies heighten the value of many electronic security systems, but perhaps none as much as remote video surveillance. Event-driven analytics make video a proactive tool and an information source. Through a time-consuming and expensive process, artificial intelligence, with its deep learning technology, is trained to identify humans and vehicles while ignoring nuisance events. The result is a 90+% reduction in false alarms. And that is only a start to what event-driven analytics can provide utility operators.

 

AI can detect a crowd forming around a substation or a person loitering or moving across multiple cameras on the same site. Watch lists enable SOC operators to upload photos of people or objects to seek and observe — or ignore. The AI-based software can spot someone tailgating an authorized employee entering an access-controlled area. 

 

Other examples of how AI software improves utility site security and operations include: 

 

  • Monitoring thermal cameras — AI detects generators and other devices not operating at usual working temperatures.

 

  • Safety and security — AI software can spot employees not wearing mandated safety gear.

 

  • Operational efficiency — AI analytics detect anomalies and trends of all kinds, enabling facility managers to make changes to traffic patterns and other routines to keep operations at their peak.

 

Event-driven analytics evaluate video from all surveillance cameras, making the technology ideal for forensic analysis. The software filters video, looking for operator-determined events such as slips and falls. 

 

Back to Drones


Let's get back to drones, one of the most significant security threats facing utilities. AI-based software monitoring surveillance cameras with long-range lenses help SOC operators detect drones while still miles away from their target. Early detection of approaching drones is critical as only a few federal agencies are authorized to down UAVs. The Federal Aviation Administration is concerned that attempts by utility operators and others to shoot down a drone or jam the signal between the device and its pilot could adversely impact commercial aircraft or mobile phone and first responder networks.

 

A few high-end security integrators now offer anti-drone systems consisting of long-range surveillance cameras, audio and thermal detection and other technologies to detect a drone's direction, the pilot's location, UAV type and IP address. Utilities may seek federal agency assistance if an approaching drone is deemed a credible threat.  

 

Drones also have a positive side. Camera-equipped drones can take the place of humans patrolling a utility site’s perimeter. Though most UAVs have limited flight times — usually 15 to 30 minutes, requiring frequent charging at base stations — having multiple drones helps ensure one is always available.

 

Don’t Forget Cybersecurity Protection

 

No overview of utility security is complete without a mention of cybersecurity. Utilities’ essential value to the national economy makes them attractive targets for domestic hackers and nation-state actors. A recent survey of utility chief executives showed half of respondents expect cyberattacks against critical infrastructure to be imminent. Physical security professionals can assist by ensuring devices such as cameras, access readers and servers are secured with regularly updated passwords, installed firmware and software updates and robust firewalls between security devices and the internet. 

 

Utilities require a well-integrated plan to maintain high-security standards. By weaving in a comprehensive security program using technologies such as access control, video surveillance, analytics and attention to the cybersecurity of those physical security technologies, security leaders within utilities and critical infrastructure organizations can keep tabs on potential risks and targets.

 

For more articles on critical infrastructure and utilities security, visit:

 

Critical Infrastructure: The Critical Industry Everyone Must Protect

 

Protecting the Energy Grid is a Team Sport

 

GridEx: How Exercising Response and Recovery Supports Grid Reliability

Cyber-Physical Security in an Interconnected World

 

A Resilience Framework for the Future

KEYWORDS: analytics artificial intelligence (AI) critical infrastructure security drone utilities security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brian Baker is Chief Revenue Officer for Calipsa, a UK-based company and a provider of deep learning-powered analytics for false alarm reduction.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0421-Edu-FEAT_MAIN_1170x878px

    7 top tips for buying the best video analytics software for your business

    See More
  • transportation-freepik

    Preventing cargo theft

    See More
  • education and training

    The value in event-driven video analytics

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • threat and detection.jpg

    Surveillance and Threat Detection

See More Products

Events

View AllSubmit An Event
  • December 12, 2024

    AI-Powered Security: Empowering Teams and Protecting Your Future

    ON DEMAND: Discover how artificial intelligence is revolutionizing modern security practices in this webinar “AI-Powered Security: Empowering Your Team, Protecting Your Future.”
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!