SYST 461660 OR750 SPRING 2013 Irvin Varkonyi Adj Professor GMU School of Public Policy Transportation Security The Who What When Where Why and How Exaggerated Or real http wwwyoutubecomwatchvoXzYTDR1UZU ID: 263121
Download Presentation The PPT/PDF document "Transportation Security" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Transportation SecuritySYST 461/660, OR750 SPRING 2013
Irvin Varkonyi
Adj
Professor
GMU School of Public PolicySlide2
Transportation Security
The Who, What, When, Where, Why and
How
Exaggerated? Or real?
http://
www.youtube.com/watch?v=oXzYTDR1UZU
Slide3
Transportation Security
Your Bob Crandall video about American Airlines – Security concerns?
Are there differences between security and safety?
Are there connections between security in the aviation industry and other transportation modes?Slide4
Transportation Security
Aviation security violations
9/11
The Shoe bomber – Richard Reid
The
Underwear bomber - Umar Farouk
Abdulmutallab
Yemeni bomberSlide5
Transportation Security
Privacy and Airport Screening
http://
www.youtube.com/watch?v=rouOrvftI4c
The tip of the iceberg?
http://
www.youtube.com/watch?v=TrRC31pnOf4
Slide6
Transportation Security
Who?
Good guys
Bad guys
Passers-bySlide7
Transportation Security
What?
Protection of people, assets
Our economy and our lifestyle
Risk ManagementSlide8
Transportation Security
When?
1960’s/1970’s Hijackings/terrorism
1990’s aviation terrorism outside US, such as Pan Am Lockerbie
2000’s/aviation terrorism inside USSlide9
Transportation Security
Where?
Cuba
Europe
US –
DB Cooper
- refers
to an unidentified man who hijacked a Boeing 727 aircraft in the airspace between Portland, Oregon, and Seattle, Washington, on November 24, 1971. He extorted $
200,000
in ransom and parachuted to an uncertain fate. Despite an extensive manhunt and an ongoing FBI investigation, the perpetrator has never been located or positively identified. The case remains the only unsolved air piracy in American aviation history
.Slide10
Transportation Security
Why?
Money?
Cold War?
Middle East conflict?
Mental breakdowns?Slide11
Transportation Security
How?
Transportation Security – Edwards/Goodrich
Aviation Security – After Four Decades, It’s Time for Fundamental Review – Jenkins
TSA Transportation Systems Specific PlanSlide12
Edwards/Goodrich
Transportation is the lifeline of any nation, connecting people, goods and services, supporting the economy and facilitating the delivery of public safety response services.
Part of the critical infrastructure
Surface transportation is an open system, inherently vulnerable to attack
Ease of use for commuters
Length of systems precludes physical security
12
©
2013, CRC Press/ Taylor
& FrancisSlide13
Edwards/Goodrich
Security
= the
effort to protect assets—physical, human, or intellectual—from criminal interference, removal or destruction, whether by terrorists or domestic criminals, or incidental to technological failures or even natural hazards events.
Security =
deter, detect, deny and mitigate. These objectives may be accomplished by direct intervention by human or canine assets, or through physical barriers and the application of technology.
13
©
2013, CRC Press/ Taylor
& FrancisSlide14
Edwards/Goodrich
Safety, security, emergency management often used interchangeably, but are different.
Security is oldest = protect something valuable from deliberate interference.
Security requires a physical response to an external conscious threat, normally meaning that this is a human versus human issue.
Goods being transported, equipment and system transporting them= different priorities.
14
©
2013, CRC Press/ Taylor
& FrancisSlide15
Edwards/Goodrich
15
Open system, passengers prefer passive system but system has to discourage attacks
Transportation Research Board = Elements of security system
Deter
Detect
Deny
Mitigate
©
2013, CRC Press/ Taylor
& FrancisSlide16
Edwards/Goodrich
Risk
assessment= the
systematic analysis of the potential sources of damage or disruption to a valuable asset, with the goal of instituting mitigation or protective measures that would prevent or lessen the impact of such an event.
Risk
assessment for transportation infrastructure has four
segments
understanding
what natural and technological hazards and human caused threats exist in the target
community
determination
of the likelihood of a hazard or threat event
occurring
defining
the elements of a system that are vulnerable to the hazards or
threat
evaluating
the consequence of such an occurrence.
16
©
2013, CRC Press/ Taylor
& FrancisSlide17
Edwards/Goodrich
Point of vulnerability for a given transportation asset determines which security strategy is the best investment
Evaluate for the vulnerability, e.g. bridge piers
Concentrate surveillance and mitigation at point of vulnerability
17
©
2013, CRC Press/ Taylor
& FrancisSlide18
Edwards/Goodrich
What would happen if that transportation asset were attacked?
Destruction, denial of service?
Are there alternate methods of continuing service?
Impact on human safety? Impact on economy?
Indirect impacts from passing through contaminated areas?
18
©
2013, CRC Press/ Taylor
& FrancisSlide19
Edwards/Goodrich
Critical Infrastructure/Key Resources
Identification
, Prioritization, and
Protection
HSPD-7: “
The Nation possesses numerous key resources, whose exploitation or destruction by terrorists could cause catastrophic health effects or mass casualties comparable to those from the use of a weapon of mass destruction, or could profoundly affect our national prestige and morale. In addition, there is critical infrastructure so vital that its incapacitation, exploitation, or destruction, through terrorist attack, could have a debilitating effect on security and economic well-being.”
19
©
2013, CRC Press/ Taylor
& FrancisSlide20
Jenkins/Rand
From 9/12/01 through end of 2011, there were 75 terrorist attacks on airliners with 157 deaths
In same period, 2000 terrorist attacks on trains with 4000 fatalitiesSlide21
Jenkins/Rand
US population – a cantankerous bunch
Hostility of Congress – hostility between Executive/Legislative – hostility between Democrats and Republicans
Hawley – Permanent Emergency
Develop flexibility
Less focus on objects, more focus on passengers
Use of Pre-checkSlide22
Jenkins/Rand
Consider real changes:
Outside organizations to design optimal aviation security (i.e. take security outside of terminal?)
Trusted travelers/trusted cargo shippersSlide23
TSA Transportation Systems Specific Plan
http://
www.tsa.gov/stakeholders/intermodal-transportation-systems
Fulfill requirements of HSPD – 7 (see earlier reference by Edwards/Goodrich)
National Infrastructure Protection Plan
TSA and US Coast Guard are Sector-Specific Agencies for Transportation Systems SectorSlide24
TSA Transportation Systems Specific Plan
Expansive, open and accessible set of interconnected systems of airways, roads, tracks, terminals, and conveyances that provide services essential to our way of life
The Sector Partnership Model
Transportation Systems Sector Risk Management FrameworkSlide25
TSA Transportation Systems Specific Plan
Four goals
Prevent and deter acts of terrorism
All-hazard preparedness and resilience
Effective use of resources
Improve sector situational awareness
Risk =
f
(probability, consequence) (natural disaster
Risk =
f
(threat, vulnerability, consequence) (terrorism)Slide26
TSA Transportation Systems Specific Plan
Mission, Asset and System Specific Risk Assessments – a scenario specific approach
Modal Assessments – high risk focus with a mode of transportation
Sector Assessment and Comparative Analysis – cross modal comparative analyses focusing on two or more modes
Risk prioritization, measuring effectiveness, research and developmentSlide27
TSA Transportation Systems Specific Plan
Capability Gap Process – a tool used to develop detailed risk-based needs that focus on delivering the necessary capabilities to mitigate top risks. Slide28
Transportation SecuritySlide29
Transportation Security
Summary
History
Participants
Intermodal approach
A political process
Risk Assessment approachSlide30
Transportation Security
Irvin Varkonyi
703 863-9686
ivarkony@gmu.edu