Introduction to Transportation Security

Book description

Providing transportation managers with the knowledge, skills, and abilities to effectively manage the security of transportation assets, this volume discusses the integrated nature of the nation‘s critical infrastructure and the threats to transportation in each surface mode. The authors explore federal agencies working in emergency management and transportation security and their intelligence and response requirements and capabilities. They also presents cost-beneficial security strategies aimed at preventing catastrophic failures in each transportation mode and supply effective methods for organizing, testing, and evaluating transportation security across modes and professions.

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Table of Contents
  7. Foreword
  8. Preface
  9. About the Authors
  10. SECTION I Safety, Security, and Emergency Management
    1. CHAPTER 1 — Security Theory and Practice
      1. Learning Objectives
      2. Introduction
      3. Safety, Security, and Emergency Management
        1. Security
        2. Safety
        3. Emergency Management
      4. Deter, Detect, Deny, Mitigate
      5. Risk Assessment
      6. Federal Grants for Transportation Security
      7. Critical Infrastructure/Key Resources
      8. Case Studies
        1. Transportation and Disease Outbreaks: Exotic Newcastle Disease
        2. Howard Street CSX Tunnel Fire, Baltimore, Maryland
      9. Summary
      10. References
    2. CHAPTER 2 — Emergency Management Theory and Practice
      1. Learning Objectives
      2. Introduction
      3. Emergency Management, Safety, and Security
      4. Theoretical Bases for Emergency Management: Terms
        1. Event
        2. Emergency
        3. Disaster
        4. Catastrophe
        5. Emergency Management
        6. Risk Management
        7. Crisis Management
        8. Continuity of Operations
      5. The Four Phases of Emergency Management
        1. Mitigation
        2. Preparedness/Planning
        3. Response
        4. Recovery
      6. Systems for Emergency Management: ICS, SEMS, NIMS
      7. Emergency Operations Plan
      8. Emergency Operations Center
      9. Training and Exercises
      10. Case Study
        1. Northridge Earthquake Destroys I-10 Overcrossings
      11. Summary
      12. References
    3. CHAPTER 3 — Federal Agencies and Structures: Surface Transportation Security
      1. Learning Objectives
      2. Disasters and the Surface Transportation System
      3. Department of Homeland Security: Organization for Transportation Security
        1. National Protection and Programs Directorate
        2. Customs Service and Border Patrol
        3. Coast Guard
        4. FEMA
        5. Transportation Security Administration
      4. Department of Transportation and Transportation Security
      5. Department of Energy
      6. Transportation Research Board
      7. Case Studies
        1. Northridge Earthquake: Cascading Event
        2. AWW on the Bay
        3. Coffee to Confuse the Dogs
        4. Ships of Opportunity
      8. Summary
      9. Note
      10. References
    4. CHAPTER 4 — Layers of Security
      1. Learning Objectives
      2. Security Elements
        1. Risk Assessment
        2. Security Technologies
        3. Thinking Like a Perpetrator
        4. The Human Element
        5. Testing the Threat Environment
        6. Physical Security
        7. Policies and Procedures
        8. Proprietary Knowledge
        9. Designing for Security
        10. Managing Security Assets
      3. Security Strategies
        1. Acceptance
        2. Avoidance
        3. Diversification
        4. Transference
        5. Consolidation
      4. Strategies
        1. See Something, Say Something
      5. Case Studies
        1. Security and Design for the New San Jose City Hall
          1. The Problem
          2. The Best Laid Plans
          3. How It Actually Happened
        2. Casing a Transit Station
        3. Learning to “Think Like a Perp” Through YouTube
      6. Summary
      7. References
  11. SECTION II Multimodal Surface Transportation Security: Threats and Strategies
    1. CHAPTER 5 — Road Transportation—Cars and Trucks
      1. Learning Objectives
      2. Components of the Road System
        1. Road Surface
        2. Utility Tunnels
        3. Bridges
      3. Maintenance of the Highway System
      4. Interconnectedness of Roads
      5. Risks to Road Transportation
        1. Natural Hazards
        2. Technological Hazards
          1. Cyber Attacks
        3. Human Caused
      6. Security Strategies for Roads
      7. Security Strategies for Tunnels
      8. Security Strategies for Bridges
      9. Security Strategies for Cars and Trucks
        1. Crime Prevention
        2. Cars and Trucks as a Platform for Attack
      10. Security Strategies for Trucks With Hazardous Cargo
        1. Crime Prevention
        2. Terrorism Prevention
        3. Platforms for Attack
      11. Case Studies
        1. Obtaining Explosives for VBIEDs
        2. Water Pipes Destroy the San Jose Transit Mall
      12. Summary
      13. References
    2. CHAPTER 6 — Road-Based Busses, Livery, Paratransit, Ambulances, and Delivery Vehicles
      1. Learning Objectives
      2. Components of Road-Based Transit and Delivery Systems
      3. Threats to Busses, Livery, Ambulances, Paratransit, and Delivery Systems
        1. Mass Transit Busses
        2. Livery and Medical Vehicles
        3. Delivery Vehicles
      4. Types of Attacks Against Street-Level Mass Transit Vehicles
        1. Improvised Explosive Devices
        2. Small Arms
        3. Hijacking
        4. Cloned Vehicles
      5. Security Strategies for Busses, Livery, Paratransit, Ambulances, and Delivery Vehicles
        1. Human Factors
        2. Busses
          1. Bus Stops
        3. Professionally Driven Vehicles
      6. Case Studies
        1. Commercial Chemical Purchase
        2. Attacks on Tourist Busses in Egypt
        3. Limousine Attack
        4. Driving Through the Ambush
        5. Bus Driver Awareness
      7. Summary
      8. References
    3. CHAPTER 7 — Mass Transit on Fixed Rails and Guideways
      1. Learning Objectives
      2. Components of Rail and Guideway-Based Mass Transportation Systems
        1. Locations
        2. Trolleys
        3. Light Rail
        4. Subways
        5. Elevated Systems
        6. Cable Cars
        7. Monorails
        8. Heavy Passenger Rail
        9. Cyber System Controls
      3. Threats to Rail-Based Transit Systems
      4. Types of Attacks Against Rail-Based Mass Transit Vehicles and Systems
        1. Long Island Railroad Murders
        2. Aum Shinrikyo Attacks Tokyo Subway
        3. Arson on Korean Subway
        4. European IED Attacks
      5. Security Strategies for Rail-Based Mass Transit Vehicles and Systems
        1. The Security Cycle
        2. Security Technologies
        3. Human Element in Security Systems
        4. Roving Patrols
        5. Explosives Detection
        6. Training and Exercises
        7. Cyber Security
      6. Case Studies
        1. PATH Train Evacuation Success on 9/11
        2. WMATA Cyber Failures as a Paradigm of Possible Terrorist Attack
      7. Summary
      8. Note
      9. References
    4. CHAPTER 8 — Freight and Long-Distance Passenger Heavy Rail
      1. Learning Objectives
      2. Components of the Freight and Long-Distance Passenger Heavy Rail System
        1. American History and the Railroad
        2. Categories of Rail
        3. Freight Rail Operations
        4. Nonrail Components
        5. Rail and Commerce
      3. Threats to the Freight and Long-Distance Passenger Heavy Rail System
        1. Open System
        2. Intermodal System
        3. Hazardous Materials and TIH
      4. Types of Attacks Against Freight and Long-Distance Passenger Heavy Rail
        1. Traditional Attacks on Rail Systems
        2. Cyber Attacks on Freight Rail Operations
        3. Hazardous Materials as Attack Modes
      5. Security Strategies for Freight and Long-Distance Passenger Heavy Rail
        1. Ordinary Crime
        2. Security Enhancements
        3. Hazardous Materials Security
      6. Case Studies
        1. Dunsmuir, California, Derailment
        2. Baltimore Tunnel Fire
        3. Sunset Limited Derailed in Arizona
        4. Ethanol Trains
      7. Summary
      8. Notes
      9. References
    5. CHAPTER 9 — Maritime Transportation
      1. Learning Objectives
      2. Components of the Maritime Transportation System
        1. American History and the Sea
        2. Categories of Maritime Vessels
          1. Passenger Vessels: Cruise Ships
          2. Passenger Vessels: Ferries
          3. Crew Members: Merchant Marine
          4. Commercial Vessels: Tugboats
          5. Commercial Vessels: Barges
          6. Commercial Vessels: Cargo Ships
          7. Commercial Vessels: Container Ships
          8. Nonvessel Components of the Maritime Transportation Environment
          9. Maritime Cargo Operations
          10. Maritime Commerce
      3. Threats to the Maritime Commerce System
        1. Open System
        2. Intermodal Goods Transfer
        3. Smuggling
        4. Piracy
        5. Hazardous Materials
      4. Crime, Accidents, and Attacks on Maritime Vessels
        1. Ordinary Crime in the Maritime Environment
        2. Hijacking and Piracy: Achille Lauro
        3. Explosives: Super Ferry 14
        4. Cyber Dependencies of Maritime Transportation
        5. Hazardous Materials as Attack Modes
      5. Security Strategies for Maritime Transportation
        1. Ordinary Crime in the Maritime Environment
        2. Terrorism
          1. TWIC
          2. MDA
          3. MTSA
          4. HSPD-13
          5. Piracy
          6. CSI
          7. C-TPAT
          8. Radiological Shipments Deterrence
          9. 10+2
          10. VIPR Teams in Maritime Security
      6. Case Studies
        1. Cosco Busan Oil Spill
        2. Pirates Attack Seabourn Spirit
      7. Summary
      8. References
    6. CHAPTER 10 — Air Cargo Operations Security
      1. Learning Objectives
      2. Components of the Air Cargo Transportation System
        1. History of Air Cargo
        2. Categories of Air Cargo Carriers
          1. Passenger Aircraft and Cargo Interface
          2. Air Cargo Transportation Environment: Components and Operations
          3. Air Cargo Commerce
      3. Threats to the Air Cargo Commerce System
        1. Complex System
        2. Hijacking
        3. Smuggling and Theft
        4. Mail
        5. Fuel Shipments, Pipelines, and Storage
        6. Cyber Dependencies of Air Cargo Transportation
        7. Accidents and Attacks on Air Cargo Planes
          1. ValuJet Accident, 1996
          2. Alaska Airlines Crash, 2000
        8. IEDs as Aircraft Attack Modes
          1. UPS, Dubai, 2010
          2. Al Qaeda Attacks on Cargo Planes, October 2010
      4. Security Strategies for Air Cargo Transportation
        1. Ordinary Crime in the Air Cargo Environment
        2. Terrorism
          1. Screening Cargo
          2. International Standards for Screening Cargo
          3. Screening Technologies
          4. TSA Compliance Programs
        3. VIPR Teams in Air Cargo Security
        4. The Challenge of Inbound Cargo
        5. Economic Implications of Security
      5. Case Studies
        1. Operation Hemorrhage: Printer Cartridge
        2. Pan Am 103, Lockerbie
      6. Summary
      7. References
  12. SECTION III Putting It All Together
    1. CHAPTER 11 — Transportation Security, Supply Chain, and Critical Infrastructure
      1. Learning Objectives
      2. 9/11: A Failure of Imagination
      3. Katrina and New Orleans: A Failure of Initiative
      4. Transportation and Critical Infrastructure
        1. The Northeast Power Outage of 2003
      5. Information Coordination Across Sectors
        1. TMC
        2. EOC
        3. FCs
      6. Continuity of Operations/Business Continuity
      7. New Standards for Private Sector Preparedness
      8. Case Studies
        1. 2006 European Power Blackout
        2. Impact of Great East Japan Earthquake’s Radiation Leak on Global Trade
      9. Public–Private Partnerships: Mid-Atlantic and Northeast Initiatives
        1. Regional Rail Security Integrated Planning Initiative
        2. Regional Rapid Critical Infrastructure (CI)/Key Resources (KR) Restoration Initiative
        3. Regional Disaster Food Distribution Project
      10. Summary
      11. References
  13. Glossary
  14. Acronyms
  15. Index

Product information

  • Title: Introduction to Transportation Security
  • Author(s): Frances L. Edwards, Daniel C. Goodrich
  • Release date: September 2012
  • Publisher(s): CRC Press
  • ISBN: 9781439845790