Skip to content

Guarding the Grid: Innovative Solutions to Counter Human-Related Threats to Substations 

Substations face numerous challenges when it comes to physical security, but some of the most common are human-caused disturbances. 

Physical Threats, Attacks, Vandalism and Suspicious Activity

In the context of substation security, vandalism and suspicious activity refer to physical threats that could potentially impact electric power system adequacy or reliability, or that target components of any security system. Often, this takes the form of ballistic threats. Whether it be a coordinated assault aimed at causing widespread service disruptions or an irresponsible hunter using substation infrastructure to calibrate the sights on their firearm, these types of threats are growing more frequent in the United States. 

Theft

Substations are frequently the target for copper theft, which can lead to significant damage and operational disruption for the surrounding grid. This activity is very dangerous for the individuals involved since the mishandling of high-voltage substation equipment can result in harmful and potentially lethal electric shocks. 

Unauthorized Access 

Preventing unauthorized individuals from entering substation premises is crucial for the safety and security of these sites. Any individual who is untrained in the hazards and safety protocols of these high-voltage environments, even if they do not have malicious intent, has the potential to severely injure themself and cause widespread power outages. 

Overcoming Security Challenges 

Addressing these challenges requires a multifaceted approach that includes physical barriers, advanced surveillance technologies, regular maintenance, effective access control measures and comprehensive training for personnel. However, when factoring in unique complexity and limited resources, comprehensive security upgrades can be a daunting task. 

In 2019, POWER Engineers began offering ballistic line of sight analysis services to substation clients. The goal was to use data to produce accurate, fast and cost-efficient security solutions. 

“We knew digitalization could speed up a manual and time-consuming process that used drawings or on-site reviews,” says Chris Ott, Senior Physical Substation Security Expert at POWER Engineers, “but at the time, the technology wasn’t quite ready yet. It wasn’t until 5 years later that we finally had access to the technology that allowed us to scale this service in a meaningful way.” 

Now, POWER offers Meerkat™, a tech-enabled service that can help substation owners and operators implement comprehensive security measures that better guard the grid against physical attacks. Meerkat™ uses high-quality data to create an interactive 3D model of a substation and the surrounding terrain. It can then identify all lines of sight to critical substation components and show clients how effectively proposed mitigations will protect those assets. It can also help optimize existing security systems. The tool is provided through POWER’s team of physical security specialists and experienced engineers who are able to discuss any operational concerns as the analysis is performed. 

Here's how Meerkat™ mitigates human-related threats: 

  • Ballistic Threat Mitigation: Meerkat™ specializes in implementing protective measures to defend against projectiles or firearms aimed at critical infrastructure. In real time, it can show how barriers, bullet-resistant materials, strategic equipment placement and advanced detection systems can prevent or minimize damage from ballistic attacks. 
  • Access Control: Meerkat™ can significantly improve access control systems, which dictate who has access under which conditions, by providing detailed insights and real-time data. It can identify vulnerable points in existing systems, optimize security layouts and improve rapid response strategies. Meerkat™ can be used to identify upgrades that make existing systems more efficient.     
  • Security Device Optimization: Meerkat™ can provide precise, strategic location suggestions for security devices such as surveillance systems. Within the interactive 3D model that is created with this tool, existing devices and systems can be integrated and manipulated to optimize their performance and minimize gaps in their security. For example, a camera may have a blind spot in its current location but moving it to another spot may increase its field of view. 

 

meerkat-logo-hr-wh (1)

Ready for a Meerkat™ demo?

Book a personalized Meerkat™ demo to discuss your requirements

Book a Demo