Nano Technology
PROTECTING THE FIRM Threats to property and electronic systems make security increasingly important
C
HEMICAL COMPANIES HAVEAL-
ways been conscious of the need for security, given the highly volatile and reactive na ture of their products. They placed high fences around their plants, put guards at plant entrances, and had strict rules about what materials visitors and em ployees could bring onto a plant site. But often these rules and procedures were hap hazardly enforced. In the past half year, chemical produc ers have been looking to increase security, especially against terrorists, and make it work. At Pittsburgh Chemical Day, held on the last day of April and attended by 860 chemical industry representatives, a panel discussion delved into the issue. John Connelly vice president of member relations at the American Chemistry Coun cil, pointed out that security has always been a part of the indus try's Responsible Care codes, but that the trade group is adopting a new code dealing specifically with security (C&EN, April 22, page 18; see also page 18 in this issue). Under the new code, ACC members must screen their facilities to identify any that may require the most immediate attention, assess potential secu rity vulnerabilities, identify and take spe cific steps to improve security, and obtain third-party verification that the security improvements have been implemented. However, Frederick L. Webber, ACC's president and chief executive officer, who was in the audience, noted that he is not confident that the European chemical in dustry will adopt the new security code. Other panelists worried that the code might become a nontariff barrier to limit foreign trade. Ronald S. Libengood, founder and pres ident of SecuraComm, a Pittsburgh-based security consulting firm, takes a "whole is greater than the sum of the parts" approach to plant security He told the audience that, rather than applying absolute security to every part of the plant, it is probably bet ter and more cost-effective to use "con centric circles" of protection. In this method, the circles, each ofwhich has its own security, begin at the plant
perimeter and continue to buildings and facilities and then to secure rooms. And Libengood said, "Never post signs labeling sensitive areas, such as 'Server Room.'"
Si02%
Type
DISCUSSING cyberterrorism, Bill Shore, special agent with the Federal Bureau of Investigation's High-Tech Crimes Task Force in Pittsburgh, predicted that the fo cus of terrorist attacks will probably shift to critical infrastructure systems such as finance, telecommunications, transporta tion, and industry All of these are private ly owned, he noted, but if they are target ed, the attacks will become a national security issue. Once a system is breached, the attacker can get access to data, to trade secrets, and, in the case of a government contractor, to vital plans. "In one case, someone got plans for Lockheed stealth aircraft," Shore said. According to Shore, a survey of businesses by the Computer Security Institute and the FBI showed 90% of the 503 respondents had security breaches last year and 80% had financial losses from such breaches. And in the case of 223 of the respondents who provided dollar amounts, the losses totaled $456 million from crimes including theft of trade secrets and financial fraud. These attackers, Shore said, can range from "the geek kid on a skateboard all the way up to the terrorist." Shore concluded, "Private industry is un der a real threat. % u have to be prepared, have a plan in place, know how to respond, and work with law enforcement, because the sophistication of attacks is getting much greater and the ease ofuse for the software to make the attacks is improving." Shore recommended two programs to help industry shore up security One is an outreach program of the FBI and the Na tional Infrastructure Protection Center called InfraGard. It is an information shar ing and analysis effort, with sites in any city where the FBI has an office. The second is a group of Information Sharing & Analysis Centers around the country They are part of the government's Critical Infrastructure Assurance Office.—
"Private industry is under a real threat. You have to be prepared."
HTTP://PUBS.ACS.ORG/CEN
Colloidal Silica dispersed in organic solvent.
WILLIAM STORCK
Particle Dia.(nm)
Dispersant
MT-ST MA-ST-M MA-ST-S IPA-ST IPA-ST-S EG-ST NPC-ST-30
30 Methanol 40 Methanol 30 Methanol 30 Isopropanol 30 Isopropanol 20 Ethyleneglycol 30 Ethyleneglycol-
MEK-ST MIBK-ST
30 30
DMAC-ST
20
12 22 9 12 9 12 12
mono-n-propylether Methyl ethyl ketone Methyl isobutyl ketone N,N-Dimethyl acetamide
12 12 12
Many more products are available.
200nm £ *.:■*