E-Book, Englisch, 456 Seiten
Bragdon Transportation Security
1. Auflage 2011
ISBN: 978-0-08-088730-2
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
E-Book, Englisch, 456 Seiten
ISBN: 978-0-08-088730-2
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Insecure transportation systems are costing our worldwide mobility-based economy as much as 6% of GDP annually. The effectiveness of security measures vary widely. In the United States, depending on the mode of transportation, it ranges from 'medium effectiveness” for airports to 'low effectiveness” for maritime, rail, transit, and intermodal activities. Situational awareness and interoperability are lacking as we try to deal with both natural and man-made disasters. Regardless of the transport mode, improvements are essential if governments and corporations are to address security planning, response, and national preparedness. Transportation Security examines this problem in a comprehensive manner and addresses security-based technologies and solutions to minimize risk.
* Covers air, sea, roadway, rail and public transport modes
* Offers technological solutions for mobility based problems in planning, logistics and policy to improve security, combat terrorism and ensure national preparedness
* Includes work of international experts & global examples related to transportation security
Distinguished Research Professor, as well as Director of the Center for National Preparedness at the Florida Institute of Technology, located in Melbourne, Florida, USA. He is also Associate Provost, and Dean of University College at FIT
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Transportation Security;4
3;Copyright Page;5
4;Dedication Page;6
5;Contents;8
6;About the Author;16
7;Contributors;18
8;Foreword;26
9;Acknowledgments;30
10;Part I: Introduction;32
10.1;Chapter 1: Transportation Security and Its Impact;34
10.1.1;Overview;34
10.1.2;Purpose and Organizational Framework;40
10.1.2.1;Section I: Introduction;40
10.1.2.2;Section II: Modal Aspects of Transportation Security;41
10.1.2.3;Section III: Technology Applications to Transportation Security;41
10.1.2.4;Section IV: Transportation Security Solutions;42
10.2;Chapter 2: Transportation Security Through Logistics Transformation;46
10.2.1;Chapter Overview;46
10.2.2;Introduction;47
10.2.3;The Global Economy and National Security;49
10.2.3.1;Economic Security and Enhanced Productivity;52
10.2.3.2;Enhanced Productivity and Logistics Transformation;54
10.2.3.3;Multiple Scenarios of Logistics Transformation;55
10.2.3.4;Defense and Logistics Transformation;57
10.2.3.5;Transportation Security Through Logistics Transformation;59
10.2.3.6;Transportation Security and National Security;63
10.2.3.7;Summary and Conclusions;64
10.3;Chapter 3: The Need for a Transportation Systems Approach;66
10.3.1;Introduction;66
10.3.2;Impediments to an Integrated System of Movement;68
10.3.2.1;Modal Bias;68
10.3.2.2;Institutional Protectionism and Self-Interest;69
10.3.2.3;Social Conditioning: A Drive-Thru Society;70
10.3.2.4;Dominance of Motor Vehicles in Governmental Planning and Policy;74
10.3.2.5;Spatial Management and Diet Cities;76
10.3.2.6;No Consensus in the Definition of Terms: Intermodal;77
10.3.2.7;Governmental Responsibility Usurping Citizen Responsibility;78
10.3.2.8;Sustainability and Security: Conflicting Goals of Infrastructure Risk?;79
10.3.3;Transportation System Elements;80
10.3.3.1;Organizational Framework: Definition;81
10.3.3.2;Transportation-Based Modal Elements;82
10.3.3.3;Transportation Systems Network;83
10.3.3.4;Modeling and Simulation;85
10.3.3.5;Forensic Transportation Logistics Analysis;95
10.3.4;Summary;98
10.3.5;References;99
10.4;Chapter 4: Mobility Security and Human Behavior;102
10.4.1;Introduction;103
10.4.2;Mobility and Security Theory;103
10.4.2.1;Deterrence Theory;105
10.4.2.2;Terror Management Theory;106
10.4.2.3;Protection Motivation Theory;107
10.4.3;Mobility Security Initiatives;107
10.4.3.1;Expansion of Institutional Initiatives;109
10.4.3.2;Expansion of Commercial Initiatives;112
10.4.4;Commercial Fear;115
10.4.5;Fear Appeals and Human Coping Behavior;118
10.4.5.1;Fear Appeals and Psychosocial Functioning;118
10.4.5.2;Surveillance and Psychosocial Functioning;120
10.4.6;Summary and Conclusions;121
10.4.7;References;123
11;Part II: Modal Aspects of Transportation Security;128
11.1;Chapter 5: Road Transportation and Infrastructure Security;130
11.1.1;Introduction;130
11.1.2;The National Highway System;132
11.1.3;Security Issues;133
11.1.4;Security Threats;138
11.1.5;Challenges for State DOTs;143
11.1.6;Road Elements and Vulnerability;145
11.1.7;Countermeasures;146
11.1.8;Additional Resources;151
11.1.9;Summary;152
11.1.10;References;152
11.2;Chapter 6: Aviation Security;156
11.2.1;The Evolution of Aviation Security;156
11.2.1.1;Aviation Security Turning Point: 9/11;158
11.2.2;U.S. Aviation Security Players;160
11.2.2.1;Government Players;160
11.2.2.2;Airport Players;164
11.2.2.3;Airline Players;166
11.2.2.4;Industry Players;166
11.2.3;Airport Security Areas;167
11.2.3.1;Checked Baggage;167
11.2.3.2;Passenger Checkpoint;169
11.2.3.3;Cargo;171
11.2.3.4;Perimeter;172
11.2.3.5;Access Controls and Biometrics;173
11.2.4;The Future of Airport Security;174
11.2.4.1;Technologies;174
11.2.4.2;JPDO-NextGen;176
11.2.4.3;PAX 2.0;177
11.2.4.4;Pre-Operational and Operational Testing;177
11.2.5;Conclusions;178
11.2.6;Important Definitions and Terms;178
11.2.7;References;179
11.3;Chapter 7: Maritime Security;180
11.3.1;Introduction;180
11.3.2;Historical Piracy;181
11.3.3;Maritime Security Issues;182
11.3.3.1;Modern Piracy;182
11.3.4;Maritime Terrorism;185
11.3.5;The Pre-9/11 International Legal Regime Relevant to the Security of the Maritime Transportation System;189
11.3.6;The Impact of 9/11 on the International Legal Regime;192
11.3.6.1;The 2005 Protocol to the SUA Convention;192
11.3.6.2;Amendments to the 1974 Safety of Life at Sea Convention;193
11.3.6.3;Obligations and Responsibilities;197
11.3.6.4;Means and Mechanisms;200
11.3.6.5;United States Legislation and Regulations;204
11.3.7;Broad-Brush Evaluation: Is the Maritime Transportation System Now More Secure?;208
11.3.8;Conclusion;210
11.3.9;References;210
12;Part III: Technology Applications to Transportation Security;214
12.1;Chapter 8: Computer and Transportation Systems Security;216
12.1.1;Security Is Flawed;217
12.1.1.1;Holistic Security Design;217
12.1.1.2;Physical Security and Locks Have Limited Value;219
12.1.1.3;The Trade-Off Between Security and Accomplishment;220
12.1.1.4;The Attacker Has the Advantage;220
12.1.1.5;Cameras, Computers, and Physical Security;223
12.1.1.6;Computers and Physical Security;225
12.1.1.7;Holistic Security Design Is Transparent and Passive;229
12.1.1.8;Radatti's Rules of Computer Security;230
12.1.1.9;Disaster Recovery;230
12.1.1.10;Time Management Is Part of Security;234
12.1.2;Conclusion;234
12.2;Chapter 9: Intermodal Transport Security Technology;236
12.2.1;Introduction;236
12.2.2;History;239
12.2.3;The Threat;239
12.2.4;Container Security Measures;241
12.2.4.1;Customs-Trade Partnership Against Terrorism (C-TPAT);241
12.2.4.2;Container Security Initiative (CSI);242
12.2.4.3;The 24-Hour Advance Manifest Rule;242
12.2.4.4;Automated Targeting System (ATS);242
12.2.4.5;The 100% Screening Requirement;243
12.2.4.6;Secure Freight Initiative (SFI);243
12.2.5;The Problem Persists;244
12.2.6;Technological Solutions;245
12.2.7;Container Tracking Technologies;247
12.2.8;Maritime Piracy Technology;248
12.2.9;Summary;249
12.2.10;Conclusion;251
12.2.11;References;252
12.3;Chapter 10: Transportation Security: Applying Military Situational Awareness System Technology to Transportation Applications;256
12.3.1;Introduction;256
12.3.2;Situational Awareness;257
12.3.3;Integrated Situational Awareness;257
12.3.3.1;The Information Challenge;259
12.3.3.2;Situational Awareness and Decision Support;260
12.3.3.3;Visualization and Display Tools;265
12.3.3.4;Access Control Systems;267
12.3.3.5;Video Camera Systems;269
12.3.3.6;Predictive Analysis Tools;272
12.3.3.7;Information Sharing;272
12.3.3.8;Scalable and Flexible Architecture;272
12.3.3.9;Using a Situational Awareness System to Manage an Incident;274
12.3.3.10;Situational Awareness System Summary;275
12.3.4;Communications Network Management for Transportation Security;276
12.3.4.1;Network Operations Centers;277
12.3.4.2;Network Operations Center (NOC) for Situational Awareness Operations;277
12.3.4.3;FCAPS Requirements Summary;281
12.3.5;Data Fusion and Data Correlation for Transportation Security Situational Awareness Systems;285
12.3.5.1;Data Correlation and Control;287
12.3.5.2;Operational Example of a Transportation Security Situational Awareness System in a Seaport Scenario;290
12.3.6;Summary;294
12.3.7;References;294
13;Part IV: Transportation Security Solutions;298
13.1;Chapter 11: Automatic Identification and Data Capture (AIDC): The Foundation of Military Logistics;300
13.1.1;Introduction;300
13.1.2;Military Logistics Technology;301
13.1.2.1;Automated Identification Technology;301
13.1.2.2;Logistics Processes;303
13.1.2.3;Automated Information Systems Integration with AISs;323
13.1.3;Summary;326
13.1.4;References;327
13.2;Chapter 12: Infrastructure Recovery Initiatives: A Retrospective Assessment;328
13.2.1;Introduction;328
13.2.2;Recent Examples of Disaster Recovery Operations;329
13.2.3;Regional Transportation Operations: The FIRST Concept;330
13.2.3.1;Step 1: Response Cells;330
13.2.3.2;Step 2: Response Organizations and Policies;331
13.2.3.3;Step 3: Training;332
13.2.3.4;Step 4: Simulation;333
13.2.3.5;Scientific Background and Approach;334
13.2.3.6;Project Management in the Kuwait Recovery Operation;335
13.2.4;Principles of Disaster Recovery Construction;335
13.2.4.1;Project Environment and Background;336
13.2.4.2;Planning for the Recovery Operation;337
13.2.4.3;Organization and Staffing;346
13.2.4.4;The Project Management Process;348
13.2.4.5;Contracting;351
13.2.4.6;Logistics;355
13.2.4.7;Budget Control;357
13.2.4.8;Political Factors and Partnering with the Host Nation;359
13.2.4.9;Leadership and Partnership;362
13.2.5;Lessons Learned;365
13.2.6;Application to Recent Disasters;366
13.2.6.1;Planning for the Recovery Operation;367
13.2.6.2;Organization and Staffing;369
13.2.6.3;Project Management;370
13.2.6.4;Contracting;371
13.2.6.5;Budget Control;372
13.2.6.6;Leadership and Partnership;373
13.2.7;Summary;374
13.3;Chapter 13: Immigration and National Security: Best Practices;376
13.3.1;Introduction;376
13.3.2;Protecting Borders;378
13.3.3;ICAO Regulations;381
13.3.4;Evolution of the MRTD;384
13.3.5;Electronic Passport and ID Solutions;390
13.3.5.1;Border Control;395
13.3.5.2;Deportation;396
13.3.5.3;Apprehension Exercises;397
13.3.6;Data Security and Privacy;401
13.3.7;Summary: National Security Best Practices;405
13.3.8;References;406
13.4;Chapter 14: Fast Integrated Response Systems Technology (FIRST) and Establishing a Global Center for Preparedness (GCP);408
13.4.1;Overview;408
13.4.2;Global Partnership Model: Issues;410
13.4.2.1;Sector Role Players;412
13.4.2.2;Disaster Management Life Cycle;414
13.4.2.3;Disaster Prevention Planning and Management;416
13.4.2.4;A Multisensory Environment;420
13.4.3;The Global Center for Preparedness (GCP);424
13.4.3.1;Need;424
13.4.3.2;Philosophy;425
13.4.3.3;Framework;426
13.4.3.4;Missions;428
13.4.3.5;Administrative Structure;431
13.4.4;National Security and Transcommunication-Based Initiatives;431
13.4.5;Re-Examination of Modal Elements;432
13.4.6;Fast Integrated Response Systems Technology (FIRST);437
13.4.7;Conclusion;438
13.4.8;References;439
14;Index;444