Page 228 - Pipeline Risk Management Manual Ideas, Techniques, and Resources
P. 228

Sabotage module 9/205
              Factors  such  as  training  and  professionalism  of  personnel,   sion, newspapers, and public postings are used, however, lit-
              maintenance and sensitivity of devices, and response time to   tle feedback is received from residents.
              situations are all critical to the usefulness of the measure. As   High-Widespread   communication and campaigning for the
             with the potential itself, scoring will necessarily be quite judg-   project  are  conducted  using  the  most  effective modes  to
             mental.                                      reach the most people. This may entail visits to villages, town
               A basic assortment of protection measures such as fencing,   meetings, etc., to hold sessions (in the native language) to
              locks, signs,  and  SCADA can be  scored for each  station so   deliver information and address concerns.
              equipped.  This package  is  a  fairly  normal  arrangement  for   When attacks can be expected, the design phase presents the
              pipeline  facilities  when  there  is  no  special  sabotage  threat.   opportunity to do a few things to minimize the impact of the
              Where a significant threat does exist, adding features such as   attacks. Equipment can be selected that is more easily repaired
              guards and detection devices can add points up to the maximum   (availability of spare parts, ease of assembly/disassembly, sim-
              allowed. A surface facility  should never score as well  as the   ple design,  etc.);  aboveground facilities  can  be  located with
              absence of such a facility since its very existence creates a tar-   defense in mind; and detection and prevention options can be
              get for sabotage.                          included  in  initial  designs.  The  degree  of  success  and  risk
                                                         reduction in these efforts is covered (and scored) in previous
              Casingpipe                                 variables.
              While a buried pipeline is relatively inaccessible, casings are   B.  Construction
             possible exceptions. As a special case of surface facilities, sec-
              tions of buried pipeline that are encased in a casing pipe can be   Installation of new facilities or modification of existing facili-
             more vulnerable  than directly buried  pipe. The vulnerability   ties provides many opportunities for sabotage. Defects can be
              arises from the common use of vent pipes attached to the casing   introduced  and then  concealed, counterfeit  materials can  be
             that provide  a direct  route to the carrier pipe. An  explosive   substituted,  equipment  can  be  stolen  or  sabotaged  etc.  In
              charge, dropped into a vent pipe, can then detonate against the   today’s construction environment, a great deal of inspection is
              carrier pipe. A simple prevention is to place bends in the vent   often required to ensure that errors are not made and shortcuts
              pipe so that a dropped object no longer has a direct access to the   are not taken by constructors working against deadlines and
              carrier  pipe.  If the  bends  are below ground level, would-be   cost constraints. When the potential for intentional, malicious
              attackers may not know that there is not an unrestricted path to   acts  is  introduced,  the  problem  is  vastly  compounded.
              the main line. Permanent screens or other barriers on the vent   Inspection efforts must be greatly expanded in order to have a
              pipe entrance are also deterrents to this type of attack.   fair chance of preventing such acts. Security must be present
                                                         even when work  is not  being  performed  in  order to protect
              Incorrect operations index                 equipment and property.
                                                          Points  may  be  awarded based  on  the  degree  of  security
              In addition to the variables just discussed, other aspects of the   offered during the construction phase:
              pipeline’s design, construction, and operation can be examined   Low-No  special security measure are taken.
              with the threat of sabotage considered. Since these aspects are   Medium-The  threat is acknowledged and planned for. Some
              also covered to some degree in a standard assessment of human   steps  to  increase  security  during  construction  are  taken.
              error potential as discussed in the Incorrect Operations Index   Materials  and  equipment  are  secured;  extra  inspection  is
              (Chapter 6), the same categories can be used here.   employed.
                                                         High-Extraordinary  steps are taken to protect company inter-
              A.  Design                                  ests during construction. These include
              This is the first phase of a pipeline operation where attention   24-hour-per-day guarding and inspection
              can be focused on the threat of attack. Route selection should   Employment of several trained, trustworthy inspectors
              take into consideration all political and security factors associ-   Screened,  loyal  workforce-perhaps  brought  in  from
              ated with a proposed installation. Public relations will ideally   another location
              begin  in  the  design  phase,  long before  construction  begins.   System of checks for material handling
              Even the presence of a survey crew can generate bad will and   Otherwise  careful  attention  to  security  through  thorough
              false rumors if neighbors are surprised by the activity. Project   planning of all job aspects.
              approval from national or regional government levels may not
              be enough if this government is unpopular with the local resi-
              dents. Whereas local approval may not be feasible for a number   C.  Operations
              of reasons, any progress toward local support is valuable. For
              purposes of this sabotage module, preparatory work done in the   An  opportunity  to combat  sabotage exists  in  the training  of
              design phase can be scored as follows:     company employees. Alerting them to common sabotage meth-
                                                         ods, possible  situations that can  lead to attacks (disgruntled
              Level ojSupport,for Project                present and former employees, recruitment activities by sabo-
              Low-National  support only; no attempts are made to commu-   teurs, etc.), and suspicious activities in general will improve the
               nicate with regional or local residents.   vigilance.
              Medium-Some   attempts are made to communicate the pur-   An  aspect  of  sabotage  potential  is  intentional  attacks  by
               pose of the project; more generalized modes such as televi-   company employees or those posing as company employees.
   223   224   225   226   227   228   229   230   231   232   233